Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/62972
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zaidi, Syeda Kanwal | en |
dc.contributor.author | Hasan, Syed Faraz | en |
dc.contributor.author | Gui, Xiang | en |
dc.contributor.author | Siddique, Nazmul | en |
dc.contributor.author | Ahmad, Salmiah | en |
dc.date.accessioned | 2024-09-18T06:05:16Z | - |
dc.date.available | 2024-09-18T06:05:16Z | - |
dc.date.issued | 2024 | - |
dc.identifier.citation | Proceedings of the 2nd International Conference on Computer Applications & Information Security, ICCAIS 2019, p. 1-5 | en |
dc.identifier.isbn | 9781728101088 | en |
dc.identifier.isbn | 9781728101095 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/62972 | - |
dc.description.abstract | <p>Unmanned aerial vehicles (UAVs) aided communication has acquired research interest in many civilian and military applications. The use of UAV as base stations and as aerial relays to improve coverage of existing cellular networks is prevalent in current literature. Along with this, a few studies have proposed the use of non-orthogonal multiple access (NOMA) in UAV communications. In this paper, we propose a network where a ground user and an aerial UAV relay is accessed using NOMA, where the UAV acts as decode-and-forward (DF) relay to extend the coverage of source. The performance of the proposed model is shown by evaluating outage behaviour for different transmit power and fading environments with Monte Carlo simulations. System throughput of proposed network appears to be better than orthogonal multiple access (OMA) based equivalent network. The results show that with an adequate height of the UAV NOMA based relay, quality of service (QoS) of cell edge user is satisfactory.</p> | en |
dc.language | en | en |
dc.publisher | Institute of Electrical and Electronics Engineers | en |
dc.relation.ispartof | Proceedings of the 2nd International Conference on Computer Applications & Information Security, ICCAIS 2019 | en |
dc.title | Exploiting UAV as NOMA based Relay for Coverage Extension | en |
dc.type | Conference Publication | en |
dc.relation.conference | ICCAIS 2019: 2nd International Conference on Computer Applications & Information Security | en |
dc.identifier.doi | 10.1109/CAIS.2019.8769542 | en |
local.contributor.firstname | Syeda Kanwal | en |
local.contributor.firstname | Syed Faraz | en |
local.contributor.firstname | Xiang | en |
local.contributor.firstname | Nazmul | en |
local.contributor.firstname | Salmiah | en |
local.profile.school | Research Services | en |
local.profile.email | shasan3@une.edu.au | en |
local.output.category | E1 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.date.conference | 1st - 3rd May, 2019 | en |
local.conference.place | Riyadh, Saudi Arabia | en |
local.publisher.place | United States of America | en |
local.format.startpage | 1 | en |
local.format.endpage | 5 | en |
local.peerreviewed | Yes | en |
local.contributor.lastname | Zaidi | en |
local.contributor.lastname | Hasan | en |
local.contributor.lastname | Gui | en |
local.contributor.lastname | Siddique | en |
local.contributor.lastname | Ahmad | en |
dc.identifier.staff | une-id:shasan3 | en |
local.profile.orcid | 0009-0006-5345-2790 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1959.11/62972 | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | Exploiting UAV as NOMA based Relay for Coverage Extension | en |
local.output.categorydescription | E1 Refereed Scholarly Conference Publication | en |
local.conference.details | ICCAIS 2019: 2nd International Conference on Computer Applications & Information Security, Riyadh, Saudi Arabia, 1st - 3rd May, 2019 | en |
local.search.author | Zaidi, Syeda Kanwal | en |
local.search.author | Hasan, Syed Faraz | en |
local.search.author | Gui, Xiang | en |
local.search.author | Siddique, Nazmul | en |
local.search.author | Ahmad, Salmiah | en |
local.uneassociation | No | en |
local.atsiresearch | No | en |
local.sensitive.cultural | No | en |
local.year.published | 2024 | en |
local.year.presented | 2024 | en |
local.subject.for2020 | 4006 Communications engineering | en |
local.subject.seo2020 | tbd | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.date.moved | 2024-09-19 | en |
Appears in Collections: | Conference Publication |
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.