Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Next Article in Journal
Power Control Techniques for Interference Management—A Systematic Review
Previous Article in Journal
A Multi-Objective Approach for Optimizing Virtual Machine Placement Using ILP and Tabu Search
Previous Article in Special Issue
Two-Level Clustering Algorithm for Cluster Head Selection in Randomly Deployed Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fountain Coding Based Two-Way Relaying Cognitive Radio Networks Employing Reconfigurable Intelligent Surface and Energy Harvesting

by
Hieu T. Nguyen
1,
Nguyen-Thi Hau
2,3,
Nguyen Van Toan
4,
Vo Ta Ty
4 and
Tran Trung Duy
1,*
1
Faculty of Electronics Engineering, Posts and Telecommunications Institute of Technology, Ha Noi 100000, Vietnam
2
Faculty of Electronics Technology, Industrial University of HoChiMinh City, Ho Chi Minh City 700000, Vietnam
3
Faculty of Electronics and Telecommunications, SaiGon University, Ho Chi Minh City 700000, Vietnam
4
Faculty of Electrical and Electronics Engineering, Ho Chi Minh City University of Technology and Education, Ho Chi Minh City 700000, VietNam
*
Author to whom correspondence should be addressed.
Submission received: 6 November 2024 / Revised: 15 December 2024 / Accepted: 16 December 2024 / Published: 25 December 2024
(This article belongs to the Special Issue Performance Criteria for Advanced Wireless Communications)

Abstract

:
This paper examines two-way relaying cognitive radio networks utilizing fountain coding (FC), reconfigurable intelligent surfaces (RIS), and radio frequency energy harvesting (EH). In the proposed schemes, two secondary sources attempt to exchange data with each other through the assistance of an RIS deployed in the network. Using FC, one source sends its encoded packets to the other source, which must collect enough packets for a successful data recovery. The transmit power of the two sources is adjusted according to an interference constraint given by a primary user and the energy harvested from a power station. In the conventional scheme, one source continuously transmits FC packets to the other, using the maximum number of transmissions allowed. In the modified scheme, as soon as one source collects a sufficient number of FC packets, it notifies the other source to stop transmission. We derive closed-form expressions of outage probability (OP) at each source, system outage probability (SOP), and average number of FC-packet transmissions for the successful data exchange of the considered schemes over Rayleigh fading channels. Simulation results are provided to validate our analysis, to compare the performance of the considered schemes, and to examine the impact of key parameters on performance.

1. Introduction

Two-way relaying TWR is an effective method for addressing key challenges in wireless networks, including reliability, spectral efficiency, and energy constraints [1,2,3]. In TWR , two source nodes exchange data through one common relay(s), which processes the received data and forwards the processed data to both sources. In [4,5,6], the common relays perform an XOR operation on the packets received from the two sources and then broadcast the XOR-ed packet back to them. Therefore, this scheme is known as the three-phase Digital Network Coding DNC   TWR . Moreover, the schemes introduced in [4,6] operate in cognitive radio CR environments, where the transmit power of the secondary users is limited by an interference threshold set by the primary users. In [7,8,9], the authors proposed two-phase Analogue Network Coding ANC   TWR schemes, where the common relays amplify the signals received from two sources during the first phase and then broadcast the amplified signals to both sources in the second phase. Although the ANC   TWR schemes achieve higher throughput than the DNC TWR ones, the sources in ANC   TWR must perform interference cancellation, which is too complex to implement in practice. In [10,11,12,13], joint Successive Interference Cancellation SIC and DNC are applied at the common relays and these TWR schemes also use only two phases for the data exchange. In particular, during the first phase, both sources simultaneously transmit their packets to the common relays with different transmit power levels. The common relays then perform SIC to decode the received packets. Finally, the relays apply XOR to the decoded packets and transmit the XOR-ed packet to both sources in the second phase. Recently, many TWR models utilizing new communication techniques have been developed, proposed, and analyzed. The authors in [14,15] studied the performance of the TWR schemes using radio-frequency energy harvesting EH , where the transmitters have to harvest energy from the radio signals of the surrounding nodes to transmit data. In [16,17,18], the TWR schemes using full-duplex FD techniques were proposed, where the source and/or relay nodes were equipped with multi-antennas. Although the FD   TWR schemes use only one time slot for the data exchange between two sources, they require high synchronization between all nodes as well as complex interference cancellation implementation. However, the related works in [4,5,6,7,8,9,10,11,12,13,14,15,16,17,18] did not consider fountain coding FC , which is studied in this paper.
Fountain coding FC [19,20] can be efficiently used in wireless communication applications due to its simple implementation and environment condition adaptation ability. In fact, an FC source encodes its data to generate encoded packets (or FC packets), which are continuously sent to a destination. The destination only needs to collect a sufficient number of FC packets to recover the original data from the source. Another advantage of FC is to provide high information security. As proven in [21,22,23], if the destination receives a sufficient number of FC packets before the eavesdroppers, the source data will be secure. The authors in [24] proposed a cooperative transmission model that employs FC , non-orthogonal multiple access NOMA , cooperative jamming technique, and intelligent reflective surfaces IRS (or reconfigurable intelligent surface RIS ) to enhance secrecy performance.
IRS or RIS are flat-structured surfaces whose arrays of passive and programmable components used to reflect incoming signals to the intended receivers for enhancing the quality of the received signals [25,26]. Published works [27] evaluated secrecy performance of IRS -assisted wireless communication networks with presence of an eavesdropper. The authors in [28] proposed a down-link system where a multi-antenna base station uses NOMA to serve two users with the help of RIS . Additionally, both continuous and discrete phase shifting were considered in [28]. Another report [29] also considered the IRS -assisted wireless communication system using NOMA , and evaluated the performance of the proposed system in an interference-limited environment. In [30], the authors considered a multi-IRS down-link scheme utilizing wirelessly EH . Recently, the TWR schemes using RIS have gained much attention of researchers. In [31], the authors evaluated outage probability OP and average throughput of IRS -aided TWR schemes, where two sources communicate through the RIS (instead of common relays in the conventional TWR schemes). Reference [32] analyzed performance of IRS -aided TWR networks employing SIC , in terms of OP and ergodic rate. The authors in [33] proposed three power allocation algorithms for RIS -based Decode-and-forward DF   TWR models to improve the system sum rate. In [34,35], IRS -aided TWR networks using full-duplex techniques were proposed and analyzed. However, the published works [27,28,29,30,31,32,33,34,35] did not apply FC into the RIS -based TWR systems.
This paper investigates TWR   CR schemes that incorporate FC , RIS , and wirelessly energy harvesting EH . In our model, two secondary sources aim to exchange data with the help of a RIS deployed in the network. Using FC , one source continuously sends FC packets until the other source has collected enough to fully recover the original data. Moreover, the transmit power of each source is adjusted based on an interference constraint set by a primary user and the energy harvested from a power station. The new points and main contributions of this work are summarized as follows:
-
Firstly, this paper considers two TWR schemes, i.e., conventional scheme (named Cov-Scm) and modified scheme (named Mod-Scm). The purpose of proposing the Mod-Scm scheme is to enhance the reliability of data transmission and reduce delay time, compared to the Cov-Scm.
-
Secondly, we derive closed-form expressions for OP at each source, system outage probability SOP , and average number of FC packet transmissions needed for successful data exchange in the proposed schemes over Rayleigh fading channels.
-
Next, simulation results are presented to validate our analytical findings and compare the performance of the considered schemes.
-
Finally, we examine the effects of key parameters on overall performance. The results also present that the Mod-Scm scheme obtains better performance, as compared with the Cov-Scm scheme, in terms of reliability (OP, SOP) and delay time (average number of FC packet transmission).
The remaining structure of this paper is as follows: Section 2 describes the system model for the considered TWR   CR schemes along with operational principles. In Section 3, we compute the performance via mathematical expressions. Section 4 validates the analytical findings through simulations. Finally, Section 5 gives important conclusions and insights.

2. System Model

Figure 1 shows the system model of the proposed FC -based TWR CR model, where secondary sources ( SS 1 and SS 2 ) exchange data with each other.
Let m 1 and m 2 denote the data sent by SS 1 and SS 2 , respectively. Since direct communication between SS 1 and SS 2 is outage due to their far distance, a reconfigurable intelligent surface RIS is deployed to assist these data exchange. Let K K 2 represent the number of small reflective elements in the RIS . Additionally, a power beacon station (denoted by SB ) is deployed in the secondary network to provide energy for SS 1 and SS 2 . To prevent co-channel interference, the frequencies used for energy harvesting differ from those used for the data transmission. The transmit power of SS 1 and SS 2 is constrained by an interference threshold established by a primary user ( PU ). Assume that all channels experience block Rayleigh fading and that all devices are single-antenna nodes.
The proposed scheme can be applied to IoT networks, where SS 1 and SS 2 are IoT devices with limited power and energy. Therefore, the station power (SB) is deployed to provide energy for two source nodes. Moreover, due to spectrum scarcity, the underlay cognitive radio technique is employed for the IoT networks.
Following the operational principle of FC ,   SS i i = 1 , 2 divides m i into small, equally sized packets, which are then used to create FC packets. Let p i denote one FC packet of SS i . To successfully recover m i , SS j j = 1 , 2 , j i must collect at least H min , i packets p i . In addition, let N max , i as the maximum number of FC packets sent by SS i . For simplicity in presentation and analysis, we can assume that H min , i = H min , j = H min and N max , i = N max , j = N max   i , j .
In the conventional FC-TWRCR scheme Cov-Scm , SS 1 continuously transmits packets p 1 to SS 2 through the RIS . After N max transmission times, SS 1 stops the transmission. If SS 2 correctly receives at least H min packets p 1 , the data transmission is successful, and otherwise, SS 2 experiences an outage. Then, SS 2 in turn transmits packets p 2 to SS 1 through the RIS , also using N max transmission times. Similarly, for the successful recovery of m 2 , SS 1 must receive at least H min packets p 2 by the end of this transmission.
In the modified FC-TWRCR scheme Mod-Scm , SS i i = 1 , 2 first transmits packets p i to SS j j = 1 , 2 , j i . If SS j gathers enough H min packets p i after N i transmission times N i N max , SS j sends an ACK message back to SS i . Upon receiving the ACK message, SS i ends its transmission, and SS j begins its transmission. Notably, if N i = N max , SS j does not need to send feedback to SS i because SS i must stop its transmission, regardless of whether SS j has received enough H min packets p i or not. Otherwise, if N i < N max , the remaining transmission times N max N i can be allocated to SS j in the second transmission phase, i.e., allowing SS j to send at most N max + N max N i packets p j to SS i . Similarly, as soon as SS i receives enough H min packets p j , it also sends an ACK message to inform SS j .
Remark 1.
In the  Cov-Scm  scheme [36], the data transmission of  SS 1  and  SS 2  operates independently, making the transmission order of  SS 1  and  SS 2  irrelevant. However, in the  Mod-Scm  scheme, the system performance depends on whether  SS 1  or  SS 2  transmits first (this issue will be examined in Section 4). Moreover, the  Cov-Scm  scheme always uses a total of  2 N max  transmission times, while the  Mod-Scm  scheme uses fewer, because the transmission stops as soon as each source gathers enough desired packets.
Let g XY represent the channel gains between nodes X and Y, and its distribution functions expressed as
F g XY x = 1 exp λ XY x , f g XY x = λ XY exp λ XY x ,
where F g XY . and f g XY . are cumulative distribution function CDF and probability density function PDF of g XY , respectively, λ XY = d XY PL [36] with PL   2 PL 6 being the path-loss factor and d XY being the physical distance between X and Y .
Let d XRIS k as the distance between the node X and the k th reflector component of the RIS , where k = 1 , 2 , , K , X SS 1 , SS 2 . As assumed in [37], we can assume that all the distances d XRIS k are identical, i.e., d XRIS k = d XRIS ( λ XRIS k = λ XRIS ) k .
Considering the transmission of a packet p i from SS i to SS j via the RIS . Assume that the total delay for each transmission of p i is normalized to 01 (time unit). During the interval α 0 < α < 1 , SS i harvests energy from SB , and its harvested energy can be calculated as
Q i = η α P SB g SBSS i ,
where η represents a conversion efficiency, and P SB is the transmit power of SB .
The remaining interval 1 α is allocated for the transmission of p i . Therefore, the average transmit power of SS i can be formulated as
P SS i ( 1 ) = Q i 1 α = χ P SB g SBSS i ,
where χ = η α / 1 α . Moreover, the transmit power of SS i must satisfy the interference threshold set by PU, i.e.,
P SS i ( 2 ) = I PU g SS i PU ,
where I PU is the interference threshold.
From Equations (3) and (4), the transmit power of SS i can be formulated by
P SS i = min P SS i ( 1 ) , P SS i ( 2 ) = min χ P SB g SBSS i , I PU g SS i PU .
Next, SS i transmits p i to SS j , and the received signal at SS j is given as (see [38,39,40]):
y SS j = P SS i k = 1 K h SS i RIS k r RIS k h RIS k SS j p i modu + n SS j ,
where h SS i RIS k and h RIS k SS j are channel coefficients of the SS i RIS k and RIS k SS j links, respectively, r RIS k is response of the k th component of the RIS , p i modu is the modulated signals of p i , and n SS j is zero-mean Gaussian noise at SS j . We assume that variance of all Gaussian noises is identical and equal to σ 0 2 , i.e., Var n SS j = σ 0 2 .
We note that g SS i RIS k = h SS i RIS k 2 and g RIS k SS j = h RIS k SS j 2 , where h SS i RIS k and h RIS k SS j are amplitude of h SS i RIS k and h RIS k SS j , respectively. Moreover, we can express h SS i RIS k and h RIS k SS j in exponential form as follows: h SS i RIS k = | h SS i RIS k | exp j ς SS i RIS k and h RIS k SS j = h RIS k SS j exp j ς RIS k SS j , where ς SS i RIS k and ς RIS k SS j are phases of h SS i RIS k and h RIS k SS j , respectively. Similarly to [37], we can express r RIS k as r RIS k = exp j ς RIS k , where ς RIS k is the phase response of r RIS k , which can be optimally adjusted by ς RIS k = ς SS i RIS k + ς RIS k SS j . Therefore, the maximum SNR obtained at SS j for decoding p i can be given as
γ SS i SS j = P SS i k = 1 K h SS i RIS k r RIS k h RIS k SS j 2 σ 0 2 = P SS i k = 1 K h SS i RIS k h RIS k SS j 2 σ 0 2 = P SS i k = 1 K g SS i RIS k g RIS k SS j 2 σ 0 2 = P SS i σ 0 2 Z i , Sum 2 ,
where Z i , Sum = k = 1 K g SS i RIS k g RIS k SS j .
Using [37], we can obtain CDF of Z i , Sum as
F Z i , Sum x = 1 Γ θ γ θ , x ϕ ,
where Γ x = 0 + t x 1 exp t d t and γ x , y = 0 y t x 1 exp t d t are gamma and lower incomplete gamma functions [41], respectively, and
θ = K π 2 16 π 2 , ϕ = 16 π 2 4 π λ SS 1 RIS λ SS 2 RIS .
From Equations (7) and (8), we can see that Z 1 , sum and Z 2 , sum have the same CDF . Hence, we can omit the subscripts i and j , i.e., F Z i , Sum x = F Z j , Sum x = F Z Sum x . Then, we can obtain CDF of Z 1 , sum 2 and Z 2 , sum 2 as
F Z Sum 2 x = F Z Sum x = 1 Γ θ γ θ , x ϕ .
Differentiating Equation (9) with respect to x , we obtain PDF of Z 1 , sum and Z 2 , sum as
f Z Sum 2 x = 1 2 Γ θ ϕ θ x θ 2 1 exp x ϕ .
Next, setting Y i = P SS i / σ 0 2 , we see that Y i is also a random variable whose CDF can be formulated as
F Y i x = Pr min χ P SB σ 0 2 g SBSS i , I PU σ 0 2 g SS i PU < x = 1 Pr g SBSS i σ 0 2 x χ P SB Pr g SS i PU < I PU σ 0 2 x = 1 1 F g SBSS i σ 0 2 x χ P SB F g SS i PU I PU σ 0 2 x .
Substituting Equation (1) into Equation (12), we obtain
F Y i x = 1 exp λ SBSS i σ 0 2 χ P SB x 1 exp λ SS i PU I PU σ 0 2 x = 1 exp λ SBSS i σ 0 2 χ P SB x + exp λ SBSS i σ 0 2 χ P SB x λ SS i PU I PU σ 0 2 x = 1 exp κ i x + exp κ i x μ i x ,
where κ i = λ SBSS i σ 0 2 χ P SB , μ i = λ SS i PU I PU σ 0 2 .
Finally, the channel capacity of the SS i RIS SS j link can be formulated as
C SS i SS j = 1 α log 2 1 + γ SS i SS j .

3. Performance Evaluation

This section derives expressions of CDF of γ SS i SS j   F γ SS i SS j x , where the probability that one FC packet p i can be unsuccessfully relayed from SS i to SS j   Φ i , OP at each user, the system OP of the two considered schemes and the average number of transmission times of the FC packet for a successful data exchange in the Cov-Scm and Mod-Scm schemes T avg .

3.1. Derivation of F γ SS i SS j x and Φ i

From Equation (7), we can formulate F γ SS i SS j x as
F γ SS i SS j x = Pr Y i Z i , Sum 2 < x = Pr Y i < x Z i , Sum 2 = 0 + F Y i x z f Z Sum 2 z d z .
Substituting Equations (11) and (13) into Equation (15), which yields
F γ SS i SS j x = 1 1 2 Γ θ ϕ θ 0 + exp κ i x z 1 exp μ i z x z θ 2 1 exp z ϕ d z .
By inter-changing variable t = z / ϕ , we can rewrite (16) as
F γ SS i SS j x = 1 1 Γ θ 0 + t θ 1 exp t exp κ i x ϕ 2 t 2 1 exp μ i ϕ 2 t 2 x d t .
The integral in Equation (17) can be computed by using computer tools.
Next, we define Φ i as the probability that C SS i SS j is below a pre-determined data rate C th . Indeed, Φ i can be calculated as
Φ i = Pr C SS i SS j < C th = F γ SS i SS j γ th ,
where γ th = 2 C th / 1 α 1 .
We note that the probability that one packet p i is correctly relayed from SS i to SS j and is computed as Φ i ¯ = 1 Φ i .

3.2. OP at Each User

In the Cov-Scm scheme, we first denote r 2 as the number of packet p 1 that SS 2 successfully receives after the transmission from SS 1 is complete. As mentioned above, if r 2 < H min , SS 2 cannot recover the data m 1 , resulting in an outage at SS 2 . Therefore, we can formulate OP at SS 2 as
OP 2 Cov-Scm = r 2 = 0 H min 1 C N max r 2 1 Φ 1 r 2 Φ 1 N max r 2 ,
where C N max r 2 C N max r 2 = N max ! r 2 ! N max r 2 ! is the binomial coefficient in NewTon expansion, and also represents the total number of possible cases in which SS 2 can decode correctly the p 1 packet. Then, substituting Equation (18) into Equation (19), we obtain expression of OP at SS 2 .
Similarly, OP at SS 1 can be given as
OP 1 Cov-Scm = r 1 = 0 H min 1 C N max r 1 1 Φ 2 r 1 Φ 2 N max r 1 .
In the Mod-Scm scheme; assume that the source SS i transmits its data first. Similarly to Equations (19) and (20), OP of SS j can be calculated as
OP j Mod-Scm = r j = 0 H min 1 C N max r j 1 Φ i r j Φ i N max r j .
As mentioned above, let N i denote the number of transmission of SS i , where H min N i N max . If N i < N max , this indicates the SS j source can gather enough H min packets p i before SS i reaches its maximum transmission times N max . The probability that SS j obtains enough H min packets p i after N i attempts of SS i is computed as
Pr r j = H min N i < N max = C N i 1 H min 1 1 Φ i H min Φ i N i H min .
Equation (22) can be explained that after the N i 1 th transmission of SS i , SS j must receive successfully H min 1 packets p i , and the probability of this event is given as C N i 1 H min 1 1 Φ i H min 1 Φ i N i H min . Then, at the N i th transmission of SS i , SS j decodes correctly p i , and hence, we obtain Equation (22).
Next, we consider the case where N i = N max , and this case occurs when SS j correctly receives at most H min 1 packets p i after N max 1 transmission times of SS i . As a result, we can calculate the probability of this case as
Pr N i = N max = r j = 0 H min 1 C N max 1 r j 1 Φ i r j Φ i N max 1 r j .
We now consider OP at SS i under condition that the maximum number of transmissions of SS j is 2 N max N i ; similar to (19)–(21), we have
OP i | N i Mod-Scm = r i = 0 H min 1 C 2 N max N i r i 1 Φ j r i Φ j 2 N max N i r i .
From Equations (22)–(24), OP at SS i can be expressed as follows:
OP i Mod-Scm = N i = H min N max Pr r j = H min N i < N max + Pr N i = N max × OP i | N i Mod-Scm = N i = H min N max C N i 1 H min 1 1 Φ i H min Φ i N i H min u N max 1 N i + r j = 0 H min 1 C N max 1 r j 1 Φ i r j Φ i N max 1 r j u N i N max       × r i = 0 H min 1 C 2 N max N i r i 1 Φ j r i Φ j 2 N max N i r i ,
where
u x = 1 ,   if   x 0 0 ,   if   x < 0
Remark 2.
From Equations (21) and (24), we can see that  OP  at  SS j   in the  Cov-Scm   and  Mod-Scm  schemes is same. However,  OP  at  SS i   in  Mod-Scm   is lower than that in  Cov-Scm  due to the higher number of transmission times of  SS j  in  Mod-Scm .

3.3. System OP (SOP)

Since the proposed schemes involve two sources, this paper evaluates the combined performance of both sources, referred to as system performance or SOP . Indeed, SOP is defined as the probability that one of two sources is outage. Therefore, we can express SOP of the scheme X, X Cov-Scm , Mod-Scm , as follows:
SOP X = 1 1 OP 1 X 1 OP 2 X .
In Equation (27), 1 OP 1 X 1 OP 2 X is the probability that both sources in the X scheme successfully recover their desired data.

3.4. Average Number of Transmission Times ( T a v g )

At first, we can see that the Cov-Scm scheme always uses 2 N max transmission times of the FC packets for each successful data exchange, i.e., T avg Cov-Scm = 2 N max .
For Mod-Scm , we again assume that SS i transmits its data first, and it stops its transmission after N i N i N max attempts. By re-using Equation (22), we obtain the probability that SS j sufficiently collects H min packets p i after N i transmission times of SS i as
Pr r j = H min N i = C N i 1 H min 1 1 Φ i H min Φ i N i H min .
Next, let N j denote the number of transmission times of SS j , where H min N j 2 N max N i . Also, the probability that SS i collects enough H min packets p j after N j transmission times of SS j is written as
Pr r i = H min N j = C N j 1 H min 1 1 Φ j H min Φ j N j H min .
Now, we can formulate the average number of transmission times of two sources per successful data exchange in Mod-Scm as
T avg Mod-Scm = N i = H min N max N j = H min 2 N max N i N i + N j Pr r j = H min N i Pr r i = H min N j 1 OP 1 Mod-Scm 1 OP 2 Mod-Scm ,
where N i + N j is the total number of transmission times of two sources in Mod-Scm , and 1 OP 1 Mod-Scm 1 OP 2 Mod-Scm is the probability that the data exchange between two sources is successful.
Substituting Equations (27)–(29) into Equation (30), we obtain an expression of T avg Mod-Scm as T avg Mod-Scm = A / B , where
A = N i = H min N max N j = H min 2 N max N i N i + N j C N i 1 H min 1 1 Φ i H min Φ i N i H min × C N j 1 H min 1 1 Φ j H min Φ j N j H min .
B = 1 1 r j = 0 H min 1 C N max r j 1 Φ i r j Φ i N max r j × 1 N i = H min N max C N i 1 H min 1 1 Φ i H min Φ i N i H min u N max 1 N i + r j = 0 H min 1 C N max 1 r j 1 Φ i r j Φ i N max 1 r j u N i N max      × r i = 0 H min 1 C 2 N max N i r i 1 Φ j r i Φ j 2 N max N i r i .

4. Simulation and Analytical Results

Section 4 validates the formulas derived in Section 3 using Monte Carlo simulations. Throughout this section, we fix positions of two sources and the PU node at SS 1 0 , 0 , SS 2 1 , 0 , PU 0.5 , 0.75 , and RIS 0.5 , 0.75 , while the SB station is positioned at SB x SB , 0.5 , where 0 < x SB < 1 . We also assign values to the following parameters as follows: PL = 3 , σ 0 2 = 1 ,   H min = 5 ,   C th = 1 , and η = 0.5 (see Table 1). In all results, we fix I PU = 0.5 P SB , and denote the simulation and analytical results by SIM and ANA , respectively. It is noted that our derived expressions are applicable to all parameter values in practice. The reason we fix the values of these parameters is to focus on analyzing the impact of the key parameters (i.e., Δ Δ = P SB / σ 0 2 ,   α ,   x SB ,   K ,   N max ) on the OP and SOP performance of the considered schemes. Next, as shown in figures below, the SIM and ANA results align closely, verifying the accuracy of our derivations.
Figure 2 illustrates the probability of the unsuccessful transmission of the packet p i as a function of Δ Δ = P SB / σ 0 2 in dB with x SB = 0.7 and α = 0.35 . As seen, both Φ 1 and Φ 2 decrease as Δ increases. This is due to the fact that increasing Δ also increases the transmit power of SS 1 and SS 2 . Additionally, Φ 1 and Φ 2 with K = 5 are lower than those with K = 3 , which is due to the improved quality of the SS i SS j links at higher values of K . We also observe from Figure 2 that Φ 2 is lower than Φ 1 . This is because SS 2 is closer to SB than SS 1 , resulting in a higher average transmit power for SS 2 as compared to SS 1 .
Figure 3 presents Φ i as a function of the fraction of time α allocated for the EH operation. The system parameters in this figure are set to Δ = 15   dB and K = 4 . We can see that both Φ 1 and Φ 2 change significantly with variations in α . It is straightforward that with very low values of α , the transmit power of SS i is also low, resulting in the low channel capacity and high Φ i . However, when α is very high, the time allocated for the data transmission phase is reduced, which also leads to low channel capacity and high Φ i . Therefore, Φ i reaches its lowest value at a medium value of α . For example, with x SB = 0.3 , Φ 1 and Φ 2 obtain their minimum values at α = 0.5 . In addition, the position of SB significantly impacts on Φ 1 and Φ 2 . Indeed, as shown in Figure 3, the value of Φ 1 Φ 2 as x SB = 0.3 is lowest (highest) because SS 1 SS 2 is nearest (farthest) to SB . When x SB = 0.65 , Φ 2 is lower than Φ 1 because SS 2 is closer to SB than SS 1 .
In Figure 4, we present OP at two sources in the Cov-Scm scheme as a function of Δ (dB) when x SB = 0.35 , α = 0.5 and N max = 6 . With x SB = 0.35 , the distance from SS 1 to SB is shorter than that from SS 2 to SB , resulting in Φ 2 < Φ 1 , and OP at SS 2 is lower than that at SS 1 . Hence, we observe from Figure 4 that the OP performance of SS 2 is better than that of SS 1 for all values of Δ and K . It is also shown that OP of both sources decreases when the values of Δ and K increase. Furthermore, the OP gap between the two sources also increases as Δ increases. It is worth noting that the results obtained in this figure can be used to design/optimize the OP performance. For example, with K = 4 , the OP of both sources in the Cov-Scm is lower than 0.01 when the value of Δ is from 11 dB to 20 dB. In other words, the SB station can use a minimum transmit power of 11 dB to ensure that OP of both sources remains below 0.01.
Figure 5 shows OP at two sources in the Mod-Scm scheme as a function of Δ (dB) when x SB = 0.35 , α = 0.5 ,   K = 3 , and N max = 6 . Furthermore, we consider two scenarios: (i) SS 1 transmits first (named Mod-Scm-1 ); (ii) SS 2 transmits first (named Mod-Scm-2 ). We observe that in Mod-Scm-1 , OP of SS 2 is lower than that of SS 1 at low and medium Δ values, and at high Δ values, OP of SS 1 is higher. In Mod-Scm-2 , OP of SS 2 is always better than that of SS 1 for all values of Δ . Moreover, the OP gap between the two sources in Mod-Scm-2 is much higher than that in Mod-Scm-1 , and OP at SS 2 and SS 1 in Mod-Scm-2 are lowest and highest, respectively. Therefore, Figure 5 shows that Mod-Scm-1 achieves greater performance fairness for two sources.
To determine whether Mod-Scm-1 or Mod-Scm-2 performs better, Figure 6 compares SOP of all the considered schemes. In this figure, the parameters are set to x SB = 0.35 , α = 0.5 ,   K = 5 , and N max = 6 . As shown, Mod-Scm-1 obtains the best SOP performance, while that of Cov-Scm is worst. We also observe that SOP of Mod-Scm-1 is much lower than those of Mod-Scm-2 and Cov-Scm . Therefore, in this simulation, the source SS 1 in Mod-Scm should be prioritized to transmit its data first.
Figure 7 presents both OP and SOP of the considered schemes as a function of α when Δ = 8.5 dB, x SB = 0.35 ,   K = 3 , and N max = 7 . It is noted that because SB is located at 0.65 , 0.5 , we have Φ 2 < Φ 1 ; hence, in Cov-Scm , OP of SS 1 is lower than that of SS 2 . As emphasized in Section 3, we can confirm from Figure 4 that OP of SS 1 in Cov-Scm is equal to that of SS 1 in Mod-Scm-2 , and OP of SS 2 in Cov-Scm is equal to that of SS 2 in Mod-Scm-1 . This figure also shows that there are optimal values of α at which OP of each user is lowest. For example, in Mod-Scm-2 , the OP performance at SS 1 and SS 2 is best when α = 0.35 and α = 0.4 , respectively. For the SOP performance, we see that Mod-Scm-2 obtains the best performance, while Mod-Scm-1 still outperforms Cov-Scm . Similarly, there exists optimal values of α which provides the best SOP performance for the considered schemes. Based on the results obtained from Figure 6 and Figure 7, we can conclude that in the Mod-Scm scheme, if Φ j < Φ i (then SOP of Mod-Scm- j is lower than that of Mod-Scm- i ), hence, the source SS j should be prioritized to transmit data first. Now, let us consider examples of designing the proposed schemes. If the required quality of service (QoS) dictates that the SOP performance must be below 0.01, then, as shown in Figure 7, only the Mod-Scm-2 scheme can satisfy this requirement. Moreover, the value of α must be designed within the range of 0.325 to 0.4. For another example, to determine the optimal value of α in the Mod-Scm-2 scheme, we follow the following steps:
-
Step 1: As shown in Figure 7, the simulation and theoretical results of the SOP performance over a wide range of α were used to confirm the existence of an optimal value of α .
-
Step 2: Identifying the interval that contains the optimal value of α . For example, in Figure 7, the interval of α is (0.325, 0.4).
-
Step 3: Using the derived expression of SOP (i.e., Equation (27)) to search the optimal value of α within the interval determined in Step 2.
Figure 8 studies the impact of the positions of the power station SB on the OP and SOP performance when Δ = 11 dB, α = 0.375 , K = 4 , and N max = 7 . Due to the symmetry, we can see that in Cov-Scm , OP of SS 1 at x SB = a equals to that of SS 2 at x SB = 1 a , where 0 < a < 1 . Similarly, OP of SS 1 in Mod-Scm-1 at x SB = a equals to that of SS 2 in Mod-Scm-2 at x SB = 1 a . For the SOP performance, we see that SOP of Cov-Scm is symmetrical about x SB = 0.5 , while SOP of Mod-Scm-1 at x SB = a equals to that of Mod-Scm-2 at x SB = 1 a . Therefore, as x SB < 0.5   x SB > 0.5 , the source SS 1   SS 2 should be selected to transmit data first. Finally, it is worth noting from Figure 8 that the SOP of Cov-Scm , Mod-Scm-1 , and Mod-Scm-2 is lowest when x SB = 0.5 , x SB = 0.3 , and x SB = 0.7 , respectively.
In Figure 9, we present the average number of transmissions of FC packets for the successful data exchange between two sources in the Mod-Scm scheme as a function of Δ (dB) when x SB = 0.4 , α = 0.2 , and N max = 7 . It is worth noting that the number of transmissions in Cov-Scm is always 2 N max . Figure 9 presents that the average number of transmissions in Mod-Scm-1 and Mod-Scm-2 decreases with the increasing of Δ . When the Δ values are high enough, the average number of transmissions in Mod-Scm-1 and Mod-Scm-2 will reach 2 H min . Therefore, the proposed Mod-Scm scheme not only obtains a better OP and SOP performance, but also achieves a lower average number of transmissions. As shown in Figure 9, the average number of transmissions of Mod-Scm-2 is lower than that of Mod-Scm-1 . However, at high Δ regimes, the performance of Mod-Scm-1 and Mod-Scm-2 is almost the same. Finally, as observed, increasing the number of reflective elements in the RIS also reduces the average number of transmissions significantly.
Figure 10 presents the impact of α on the average number of transmissions of FC packets for the successful data exchange between two sources in the Mod-Scm scheme when Δ = 8.5 dB, K = 5 , and N max = 7 . As seen in Figure 10, the average number of transmissions in Mod-Scm-1 and Mod-Scm-2 achieves the minimum value as α = 0.5 . Moreover, the positions of the SB station also impacts the average number of transmissions significantly. In this figure, the average number of transmissions in Mod-Scm-1 and Mod-Scm-2 with x SB = 0.5 is the same, and is lowest as compared with x SB = 0.1 and x SB = 0.2 .

5. Conclusions

This paper evaluated the performance of two FC-based TWRCR schemes through both simulation and analysis, focusing on OP, SOP, and the average number of transmissions for the successful data exchange. The results showed that the Mod-Scm scheme achieves better OP and SOP performance compared to the Cov-Scm scheme. Additionally, the Mod-Scm scheme can reduce the average number of FC packet transmissions, which in turn lowers delay and power consumption. In Cov-Scm, the order in which the source transmits data also significantly affects the performance. Finally, key parameters such as K ,   N max , and α should be appropriately designed to enhance performance for both the Cov-Scm and Mod-Scm schemes.

Author Contributions

Conceptualization, H.T.N. and T.T.D.; methodology, N.-T.H.; software, N.V.T.; validation, V.T.T.; investigation, N.-T.H., N.V.T. and V.T.T.; writing—original draft preparation, H.T.N. and T.T.D.; writing—review and editing, N.-T.H., N.V.T. and V.T.T.; supervision, H.T.N. and T.T.D. All authors have read and agreed to the published version of the manuscript.

Funding

This paper is supported by Posts and Telecommunications Institute of Technology under grant number 07-2024-HV-KTĐT2.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Ju, H.; Oh, E.; Hong, D. Catching resource-devouring worms in next-generation wireless relay systems: Two-way relay and full-duplex relay. IEEE Commun. Mag. 2009, 47, 58–65. [Google Scholar]
  2. Son, P.N.; Kong, H.Y. Exact outage probability of two-way decode-and-forward scheme with opportunistic relay selection under physical layer security. Wirel. Pers. Commun. 2014, 77, 2889–2917. [Google Scholar] [CrossRef]
  3. Liu, Z.; Tao, X.; Rehman, W. Resource allocation for two-way amplify and forward OFDM relay networks. China Commun. 2017, 14, 76–82. [Google Scholar] [CrossRef]
  4. Duy, T.T.; Kong, H.Y. Exact Outage Probability of Cognitive Two-Way Relaying Scheme with Opportunistic Relay Selection under Interference Constraint. IET Commun. 2012, 6, 2750–2759. [Google Scholar] [CrossRef]
  5. Chen, Z.; Lim, T.J.; Motani, M. Fading Two-Way Relay Channels: Physical-Layer Versus Digital Network Coding. IEEE Trans. Wirel. Commun. 2014, 13, 6275–6285. [Google Scholar] [CrossRef]
  6. Cao, Z.; Ji, X.; Wang, J.; Zhang, S.; Ji, Y.; Wang, J. Security-Reliability Tradeoff Analysis for Underlay Cognitive Two-Way Relay Networks. IEEE Trans. Wirel. Commun. 2019, 18, 6030–6042. [Google Scholar] [CrossRef]
  7. Song, L.; Hong, G.; Jiao, B.; Debbah, M. Joint Relay Selection and Analog Network Coding Using Differential Modulation in Two-Way Relay Channels. IEEE Trans. Veh. Technol. 2010, 59, 2932–2939. [Google Scholar] [CrossRef]
  8. Upadhyay, P.K.; Prakriya, S. Performance of Two-Way Opportunistic Relaying With Analog Network Coding Over Nakagami-m Fading. IEEE Trans. Veh. Technol. 2011, 60, 1965–1971. [Google Scholar] [CrossRef]
  9. Wang, H.-M.; Yin, Q.; Xia, X.-G. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks. IEEE Trans. Signal Process. 2012, 60, 3532–3545. [Google Scholar] [CrossRef]
  10. Son, P.N.; Duy, T.T. A new approach for two-way relaying networks: Improving performance by successive interference cancellation, digital network coding and opportunistic relay selection. Wirel. Netw. 2020, 26, 1315–1329. [Google Scholar] [CrossRef]
  11. Dao, T.-T.T.; Son, P.N. Cancel-Decode-Encode Processing on Two-Way Cooperative NOMA Schemes in Realistic Conditions. Wirel. Comm. Mob. Comput. 2012, 2021, 8828443. [Google Scholar] [CrossRef]
  12. Althunibat, S.; Hassan, H.; Khattab, T.; Zorba, N. A New NOMA-Based Two-Way Relaying Scheme. IEEE Trans. Veh. Technol. 2023, 72, 12300–12310. [Google Scholar] [CrossRef]
  13. Hesam, A.; Bastami, A.H.; Abdel-Hafez, M. Performance Analysis of NOMA-Based Transmission in Two-Way Relay Network. IEEE Access 2024, 12, 37051–37068. [Google Scholar] [CrossRef]
  14. Li, E.; Wang, Y.; Liang, Z.; Zheng, M. Improving the Security and Reliability of Energy-Constrained Two-Way Relay Systems With Nonlinear Energy Harvesting. IEEE Access 2023, 11, 136793–136808. [Google Scholar] [CrossRef]
  15. Dao, T.-T.T.; Son, P.N. Two-Way SWIPT Relaying Networks with Nonlinear Power Splitting, Digital Network Coding and Selection Combining. Wirel. Pers. Commun. 2024, 133, 2445–2465. [Google Scholar] [CrossRef]
  16. Phong, N.H.; Khuong, H.-V.; Bao, V.N.Q. Secrecy outage analysis of energy harvesting two-way relaying networks with friendly jammer. IET Commun. 2019, 13, 1877–1885. [Google Scholar]
  17. Shafrin, K.S.; Rajamohan, N. Generalized Spatial Modulation in Full-Duplex Two-Way Relay Channel. IEEE Commun. Lett. 2022, 26, 1918–1922. [Google Scholar] [CrossRef]
  18. Liu, Z.; Ye, Y.; Lu, G.; Hu, R.Q. System Outage Performance of SWIPT Enabled Full-Duplex Two-Way Relaying with Residual Hardware Impairments and Self-Interference. IEEE Syst. J. 2023, 17, 337–348. [Google Scholar] [CrossRef]
  19. Niu, H.; Iwai, M.; Sezaki, K.; Sun, L.; Du, Q. Exploiting Fountain Codes for Secure Wireless Delivery. IEEE Commun. Lett. 2014, 18, 777–780. [Google Scholar] [CrossRef]
  20. Sun, L.; Ren, P.; Du, Q.; Wang, Y. Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks. IEEE Trans. Ind. Informat. 2016, 12, 291–300. [Google Scholar] [CrossRef]
  21. Sun, L.; Huang, D.; Lee Swindlehurst, A. Fountain-coding aided secure transmission with delay and content awareness. IEEE Trans. Veh. Technol. 2020, 69, 7992–7997. [Google Scholar] [CrossRef]
  22. Abughalwa, M.; Hasna, M.O. A secrecy study of UAV based networks with fountain codes and FD jamming. IEEE Commun. Lett. 2021, 25, 1796–1800. [Google Scholar] [CrossRef]
  23. Duy, T.T.; Khan, L.C.; Binh, N.T.; Nhat, N.L. Intercept Probability Analysis of Cooperative Cognitive Networks Using Fountain Codes and Cooperative Jamming. EAI Trans. Ind. Netw. Intell. Syst. 2021, 8, 1–9. [Google Scholar] [CrossRef]
  24. Tin, P.T.; Van Nguyen, M.S.; Duy, T.T.; Minh, B.V.; Kim, B.S.; Rejfek, L. Enhancing Secrecy Performance Using Fountain Codes and NOMA under Joint Cooperative Jamming Technique and Intelligent Reflective Surface. IEEE Access 2024, 12, 117399–117417. [Google Scholar] [CrossRef]
  25. Basar, E.; Di Renzo, M.; De Rosny, J.; Debbah, M.; Alouini, M.S.; Zhang, R. Wireless Communications Through Reconfigurable Intelligent Surfaces. IEEE Access 2019, 7, 116753–116773. [Google Scholar] [CrossRef]
  26. ElMossallamy, M.A.; Zhang, H.; Song, L.; Seddik, K.G.; Han, Z.; Li, G.Y. Reconfigurable Intelligent Surfaces for Wireless Communications: Principles, Challenges, and Opportunities. IEEE Trans. Cogn. Commun. Netw. 2020, 6, 990–1002. [Google Scholar] [CrossRef]
  27. Yang, L.; Yang, J.; Xie, W.; Hasna, M.O.; Tsiftsis, T.; Di Renzo, M. Secrecy Performance Analysis of RIS-Aided Wireless Communication Systems. IEEE Trans. Veh. Technol. 2020, 69, 12296–12300. [Google Scholar] [CrossRef]
  28. Sun, Z.; Jing, Y. On the Performance of Multi-Antenna IRS-Assisted NOMA Networks with Continuous and Discrete IRS Phase Shifting. IEEE Trans. Wireless Commun. 2022, 21, 3012–3023. [Google Scholar] [CrossRef]
  29. Almaghthawi, S.; Alsusa, E.; Al-Dweik, A. On the Performance of IRS-Aided NOMA in Interference-Limited Networks. IEEE Wirel. Commun. Lett. 2024, 13, 560–564. [Google Scholar] [CrossRef]
  30. Fu, M.; Mei, W.; Zhang, R. Multi-Active/Passive-IRS Enabled Wireless Information and Power Transfer: Active IRS Deployment and Performance Analysis. IEEE Commun. Lett. 2023, 27, 2217–2221. [Google Scholar] [CrossRef]
  31. Atapattu, S.; Fan, R.; Dharmawansa, P.; Wang, G.; Evans, J. Two–Way Communications via Reconfigurable Intelligent Surface. In Proceedings of the 2020 IEEE Wireless Communications and Networking Conference (WCNC), Seoul, Republic of Korea, 25–28 May 2020. [Google Scholar]
  32. Liu, Z.; Yue, X.; Zhang, C.; Liu, Y.; Yao, Y.; Wang, Y.; Ding, Z. Performance Analysis of Reconfigurable Intelligent Surface Assisted Two-Way NOMA Networks. IEEE Trans. Veh. Technol. 2022, 71, 13091–13104. [Google Scholar] [CrossRef]
  33. Wang, X.; Zhang, P.; Shu, F.; Shi, W.; Wang, J. Power Allocation for IRS-Aided Two-Way Decode-and-Forward Relay Wireless Network. IEEE Trans. Veh. Technol. 2023, 72, 1337–1342. [Google Scholar] [CrossRef]
  34. Kumar, D.; Singya, P.K.; Krejcar, O.; Choi, K.; Bhatia, V. Performance of IRS-Aided FD Two-Way Communication Network with Imperfect SIC. IEEE Trans. Veh. Technol. 2023, 72, 5491–5496. [Google Scholar] [CrossRef]
  35. Jose, J.; Bisen, S.; Shaik, P.; Biswas, S.; Singh, K.; Krejcar, O.; Bhatia, V. Performance Analysis of IRS Assisted Full-Duplex Systems with Different Downlink and Uplink Users. IEEE Trans. Veh. Technol. 2024, 73, 15848–15853. [Google Scholar] [CrossRef]
  36. Hau, N.T.; Nam, P.M.; Tin, P.T.; Duy, T.T.; Hanh, T. Outage Performance of Two-Way Relaying Secure Multicast Networks Using Fountain Codes and Digital Network Coding. In Proceedings of the 7th International Conference on Green Technology and Sustainable Development (GTSD 2024), HoChiMinh City, Vietnam, 25–26 July 2024. [Google Scholar]
  37. Quang, P.M.; Kien, N.T.; Duy, T.T.; An, N.H.; Tung, N.T.; Le, A.V. Performance Evaluation of Reconfigurable Intelligent Surface Aided Multi-Hop Relaying Schemes with Short Packet Communication. Adv. Electr. Electron. Eng. 2024, 22, 97–106. [Google Scholar] [CrossRef]
  38. Zhu, G.; Xu, J.; Huang, K.; Cui, X. Over-the-Air Computing for Wireless Data Aggregation in Massive IoT. IEEE Wirel. Commun. 2021, 28, 57–65. [Google Scholar] [CrossRef]
  39. Tegin, B.; Duman, T.M. Federated Learning with Over-the-Air Aggregation Over Time-Varying Channels. IEEE Trans. Wirel. Commun. 2023, 22, 5671–5684. [Google Scholar] [CrossRef]
  40. Tang, M.; Cai, S.; Lau, V.K.N. Remote State Estimation With Asynchronous Mission-Critical IoT Sensors. IEEE J. Sel. Areas Commun. 2021, 39, 835–850. [Google Scholar] [CrossRef]
  41. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products; Academic Press: Brookline, MA, USA, 2014. [Google Scholar]
Figure 1. The proposed FC-based TWR CR scheme.
Figure 1. The proposed FC-based TWR CR scheme.
Telecom 06 00001 g001
Figure 2. Φ i as a function of Δ dB with x SB = 0.7 and α = 0.35 .
Figure 2. Φ i as a function of Δ dB with x SB = 0.7 and α = 0.35 .
Telecom 06 00001 g002
Figure 3. Φ i as a function of α with Δ = 15   dB and K = 4 .
Figure 3. Φ i as a function of α with Δ = 15   dB and K = 4 .
Telecom 06 00001 g003
Figure 4. OP of the Cov-Scm scheme as a function of Δ (dB) when x SB = 0.35 ,   α = 0.5 , and N max = 6 .
Figure 4. OP of the Cov-Scm scheme as a function of Δ (dB) when x SB = 0.35 ,   α = 0.5 , and N max = 6 .
Telecom 06 00001 g004
Figure 5. OP of the Mod-Scm scheme as a function of Δ (dB) when x SB = 0.35 , α = 0.5 ,   K = 3 , and N max = 6 .
Figure 5. OP of the Mod-Scm scheme as a function of Δ (dB) when x SB = 0.35 , α = 0.5 ,   K = 3 , and N max = 6 .
Telecom 06 00001 g005
Figure 6. SOP as a function of Δ (dB) when x SB = 0.35 , α = 0.5 ,   K = 5 , and N max = 6 .
Figure 6. SOP as a function of Δ (dB) when x SB = 0.35 , α = 0.5 ,   K = 5 , and N max = 6 .
Telecom 06 00001 g006
Figure 7. OP and SOP as a function of α when Δ = 8.5 dB, x SB = 0.65 , K = 3 and N max = 7 .
Figure 7. OP and SOP as a function of α when Δ = 8.5 dB, x SB = 0.65 , K = 3 and N max = 7 .
Telecom 06 00001 g007
Figure 8. OP and SOP as a function of x SB when Δ = 11 dB, α = 0.375 , K = 4 , and N max = 6 .
Figure 8. OP and SOP as a function of x SB when Δ = 11 dB, α = 0.375 , K = 4 , and N max = 6 .
Telecom 06 00001 g008
Figure 9. The average number of transmissions for the successful data exchange as a function of Δ (dB) when x SB = 0.4 ,   α = 0.2 and N max = 7 .
Figure 9. The average number of transmissions for the successful data exchange as a function of Δ (dB) when x SB = 0.4 ,   α = 0.2 and N max = 7 .
Telecom 06 00001 g009
Figure 10. The average number of transmissions for the successful data exchange as a function of α when Δ = 8.5 dB, K = 5 , and N max = 7 .
Figure 10. The average number of transmissions for the successful data exchange as a function of α when Δ = 8.5 dB, K = 5 , and N max = 7 .
Telecom 06 00001 g010
Table 1. Mathematical notations and their values.
Table 1. Mathematical notations and their values.
NotationsMeaningValue
PL Path-loss exponential3
σ 0 2 Variance of Gaussian noise1
H min Minimum number of FC packets required for data recovery5
N max Maximum number of FC packets exchanged between two sourcesChange
C th Target rate1
η Conversion efficiency0.5
Δ Δ = P SB / σ 0 2 : Transmit SNRChange
x SB x-coordinate of the SB node 0 < x SB < 1
α Fraction of time allocated for EH 0 < α < 1
Φ i Probability   that   one   FC   packet   p i   is   unsuccessfully   relayed   from   SS i   to   SS j , where   i , j = 1 , 2 ,   i j 0 < Φ i < 1
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Nguyen, H.T.; Hau, N.-T.; Toan, N.V.; Ty, V.T.; Duy, T.T. Fountain Coding Based Two-Way Relaying Cognitive Radio Networks Employing Reconfigurable Intelligent Surface and Energy Harvesting. Telecom 2025, 6, 1. https://doi.org/10.3390/telecom6010001

AMA Style

Nguyen HT, Hau N-T, Toan NV, Ty VT, Duy TT. Fountain Coding Based Two-Way Relaying Cognitive Radio Networks Employing Reconfigurable Intelligent Surface and Energy Harvesting. Telecom. 2025; 6(1):1. https://doi.org/10.3390/telecom6010001

Chicago/Turabian Style

Nguyen, Hieu T., Nguyen-Thi Hau, Nguyen Van Toan, Vo Ta Ty, and Tran Trung Duy. 2025. "Fountain Coding Based Two-Way Relaying Cognitive Radio Networks Employing Reconfigurable Intelligent Surface and Energy Harvesting" Telecom 6, no. 1: 1. https://doi.org/10.3390/telecom6010001

APA Style

Nguyen, H. T., Hau, N.-T., Toan, N. V., Ty, V. T., & Duy, T. T. (2025). Fountain Coding Based Two-Way Relaying Cognitive Radio Networks Employing Reconfigurable Intelligent Surface and Energy Harvesting. Telecom, 6(1), 1. https://doi.org/10.3390/telecom6010001

Article Metrics

Back to TopTop