Phu Tran Tin
YOU?
Author Swipe
View article: Enhancing short-packet communications: BLER performance in RIS-assisted ambient backscatter NOMA systems
Enhancing short-packet communications: BLER performance in RIS-assisted ambient backscatter NOMA systems Open
Short-packet communication (SPC) is a key enabler for ultra-reliable low-latency communication (URLLC) in next-generation wireless networks. In this paper, we investigate the block error rate (BLER) performance of a reconfigurable intellig…
View article: Combination of RIS and Fountain Codes in NOMA relay wireless networks for enhancing system performance and security
Combination of RIS and Fountain Codes in NOMA relay wireless networks for enhancing system performance and security Open
Non-orthogonal multiple access (NOMA) and reconfigurable intelligent surface (RIS) are critical technologies for future wireless communications that provide spectral efficiency while consuming little power. In this research, we explore the…
View article: Performance and Secrecy Analysis of Cooperative Full-Duplex NOMA System With Fountain Codes and Intelligent Reflective Surface
Performance and Secrecy Analysis of Cooperative Full-Duplex NOMA System With Fountain Codes and Intelligent Reflective Surface Open
Intelligent Reflective Surfaces (IRSs) are recognized as fundamental technology in the context of the forthcoming sixth-generation (6G) communication systems. Non-Orthogonal Multiple Access (NOMA) can augment fifth-generation (5G) wireless…
View article: System Modeling and Deep Learning-Based Security Analysis of Uplink NOMA Relay Networks with IRS and Fountain Codes
System Modeling and Deep Learning-Based Security Analysis of Uplink NOMA Relay Networks with IRS and Fountain Codes Open
View article: Enhancing Secrecy Performance Using Fountain Codes and NOMA Under Joint Cooperative Jamming Technique and Intelligent Reflective Surface
Enhancing Secrecy Performance Using Fountain Codes and NOMA Under Joint Cooperative Jamming Technique and Intelligent Reflective Surface Open
Ensuring content security and copyright protection is a critical concern in wireless communication networks. Furthermore, the emergence of services demanding high-band width and very low delay such as online Games, extended reality (XR), M…
View article: Power Beacon and NOMA-Assisted Cooperative IoT Networks With Co-Channel Interference: Performance Analysis and Deep Learning Evaluation
Power Beacon and NOMA-Assisted Cooperative IoT Networks With Co-Channel Interference: Performance Analysis and Deep Learning Evaluation Open
This study investigates a two-way relaying non-orthogonal multiple access (TWR-NOMA) enabled Internet-of-Things (IoT) network, in which two NOMA users communicate via an IoT access point (IAP) relay using a decode-and-forward (DF) protocol…
View article: Exploiting User Clustering and Fixed Power Allocation for Multi-Antenna UAV-Assisted IoT Systems
Exploiting User Clustering and Fixed Power Allocation for Multi-Antenna UAV-Assisted IoT Systems Open
Internet of Things (IoT) systems cooperative with unmanned aerial vehicles (UAVs) have been put into use for more than ten years, from transportation to military surveillance, and they have been shown to be worthy of inclusion in the next …
View article: Outage Performance of Full-Duplex Unmanned Aerial Vehicle-aided Cooperative Non-orthogonal Multiple Access
Outage Performance of Full-Duplex Unmanned Aerial Vehicle-aided Cooperative Non-orthogonal Multiple Access Open
Unmanned Aerial Vehicles (UAVs) are
\nenvisioned to play a key role in the Sixth-Generation
\n(6G) and Beyond Fifth-Generation (B5G)
\nnetworks. Resolving spectrum constraints in UAV
\ncommunications remains a critical issue. This
\narticl…
View article: Reliability-Security in Wireless-Powered Cooperative Network with Friendly Jammer
Reliability-Security in Wireless-Powered Cooperative Network with Friendly Jammer Open
n this paper, we study the Outage Probabil-
\nity (OP) and the Intercept Probability (IP) of Wireless-
\nPowered Cooperative Networks (WPCNs) in the pres-
\nence of a malicious eavesdropper and a friendly jam-
\nmer. We specifically presen…
View article: Security–Reliability Tradeoff Analysis for SWIPT- and AF-Based IoT Networks With Friendly Jammers
Security–Reliability Tradeoff Analysis for SWIPT- and AF-Based IoT Networks With Friendly Jammers Open
Radio-frequency (RF) energy harvesting (EH) in wireless relaying networks has attracted considerable recent interest, especially for supplying energy to relay nodes in the Internet of Things (IoT) systems to assist the information exchange…
View article: Security-Reliability Trade-Off Analysis for SWIPT- and AF-Based IoT Networks with Friendly Jammers
Security-Reliability Trade-Off Analysis for SWIPT- and AF-Based IoT Networks with Friendly Jammers Open
Radio-frequency (RF) energy harvesting (EH) in wireless relaying networks has attracted considerable recent interest, especially for supplying energy to relay nodes in Internet-of-Things (IoT) systems to assist the information exchange bet…
View article: SWIPT-Based Nonorthogonal Multiple Access under Arbitrary Nakagami-m Fading with Direct Links
SWIPT-Based Nonorthogonal Multiple Access under Arbitrary Nakagami-m Fading with Direct Links Open
This paper studies the joint impact of simultaneous wireless information and power transfer (SWIPT) and nonorthogonal multiple access (NOMA) to the cooperative relay (CoR) network where direct links exist. Over Nakagami-m fading environmen…
View article: Outage Analysis of the Power Splitting Based Underlay Cooperative Cognitive Radio Networks
Outage Analysis of the Power Splitting Based Underlay Cooperative Cognitive Radio Networks Open
In the present paper, we investigate the performance of the simultaneous wireless information and power transfer (SWIPT) based cooperative cognitive radio networks (CCRNs). In particular, the outage probability is derived in the closed-for…
View article: Throughput enhancement for multi-hop decode-and-forward protocol using interference cancellation with hardware imperfection
Throughput enhancement for multi-hop decode-and-forward protocol using interference cancellation with hardware imperfection Open
View article: Lower and upper bound intercept probability analysis in amplifier-and-forward time switching relaying half-duplex with impact the eavesdropper
Lower and upper bound intercept probability analysis in amplifier-and-forward time switching relaying half-duplex with impact the eavesdropper Open
In this paper, we proposed and investigated the amplifier-and-forward (AF) time switching relaying half-duplex with impact the eavesdropper. In this system model, the source (S) and the destination (D) communicate with each other via a hel…
View article: Unmanned aerial vehicle-aided cooperative regenerative relaying network under various environments
Unmanned aerial vehicle-aided cooperative regenerative relaying network under various environments Open
This paper studies a cooperative relay network that comprises an unmanned aerial vehicle (UAV) enabling amplify-and-forward (AF) and power splitting (PS) based energy harvesting. The considered system can be constructed in various environm…
View article: Performance analysis for three cases of outage probability in one-way DF full-duplex relaying network with presence of direct link
Performance analysis for three cases of outage probability in one-way DF full-duplex relaying network with presence of direct link Open
In this paper, the one-way decode-and-forward (DF) full-duplex relaying network system with presence of direct link is investigated. In the analysis section, we derived the exact, lower, and upper bound for outage probability (OP) with max…
View article: Lower and upper bound form of outage probability in one-way AF full-duplex relaying network under impact of direct link
Lower and upper bound form of outage probability in one-way AF full-duplex relaying network under impact of direct link Open
<p>This paper proposed and investigated the one-way amplify-and-forward (AF) full-duplex relaying network under impact of direct link. For the system performance analysis, the exact and lower and upper bound form of the system outage…
View article: Influence of loopback interference channel in energy harvesting full-duplex relaying network over block rayleigh fading channel: performance analysis
Influence of loopback interference channel in energy harvesting full-duplex relaying network over block rayleigh fading channel: performance analysis Open
The main idea of this paper is to investigate the system performance (SP) ofenergy harvesting FD relaying network over block rayleigh fading channelunder the influence of the loopback interference channel. In the first stage,we proposed th…
View article: Performance Analysis in DF Energy Harvesting Full-Duplex Relaying Network with MRC and SC at the Receiver under Impact of Eavesdropper
Performance Analysis in DF Energy Harvesting Full-Duplex Relaying Network with MRC and SC at the Receiver under Impact of Eavesdropper Open
This paper investigates the decode-and-forward (DF) full-duplex (FD) relaying system under the presence of an eavesdropper. Moreover, the relay node is able to harvest energy from a transmitter, and then it uses the harvested energy for co…
View article: Outage Analysis in SWIPT-Based Decode-and-Forward Relay Networks with Partial Relay Selection
Outage Analysis in SWIPT-Based Decode-and-Forward Relay Networks with Partial Relay Selection Open
This work studies the SWIPT-based half-duplex (HD) decode-and-forward (DF) relay network, wherein the relay user can scavenge power from the source’s radio-frequency (RF) signals and then utilize it to convey the information to the destina…
View article: Performance Enhancement for Full-Duplex Relaying with Time-Switching-Based SWIPT in Wireless Sensors Networks
Performance Enhancement for Full-Duplex Relaying with Time-Switching-Based SWIPT in Wireless Sensors Networks Open
Full-duplex (FD) with simultaneous wireless information and power transfer (SWIPT) in wireless ad hoc networks has received increased attention as a technology for improving spectrum and energy efficiency. This paper studies the outage per…
View article: Inter-Frame Based Interpolation for Top–Bottom Packed Frame of 3D Video
Inter-Frame Based Interpolation for Top–Bottom Packed Frame of 3D Video Open
The frame-compatible packing for 3D contents is the feasible approach to archive the compatibility with the existing monocular broadcasting system. To perceive better 3D quality, the packed 3D frames are expanded to the full size at the de…
View article: Performance Analysis in the Decode-and-Forward Full-Duplex Relaying Network with SWIPT
Performance Analysis in the Decode-and-Forward Full-Duplex Relaying Network with SWIPT Open
This paper investigates the decode-and-forward (DF) full-duplex (FD) cooperative relaying system with SWIPT. Specifically, the relay node can harvest energy from the source’s RF signal, and then the harvested energy is used for transferrin…
View article: Backscatter-Assisted Data Offloading in OFDMA-Based Wireless-Powered Mobile Edge Computing for IoT Networks
Backscatter-Assisted Data Offloading in OFDMA-Based Wireless-Powered Mobile Edge Computing for IoT Networks Open
Mobile edge computing (MEC) has emerged as a prominent technology to overcome sudden demands on computation-intensive applications of the Internet of Things (IoT) with finite processing capabilities. Nevertheless, the limited energy resour…
View article: Performance Analysis for Exact and Upper Bound Capacity in DF Energy Harvesting Full-Duplex with Hybrid TPSR Protocol
Performance Analysis for Exact and Upper Bound Capacity in DF Energy Harvesting Full-Duplex with Hybrid TPSR Protocol Open
In this paper, we investigate the full-duplex (FD) decode-and-forward (DF) cooperative relaying system, whereas the relay node can harvest energy from radiofrequency (RF) signals of the source and then utilize the harvested energy to trans…
View article: Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysis Open
In this letter, the system performance of the DF full-duplex (FD) Relaying communication network is investigated with Physical Layer Security (PLS). In this system model, the source (S) and the destination (D) communicate via a helping rel…
View article: Performance of multi-hop cognitive MIMO relaying networks with joint constraint of intercept probability and limited interference
Performance of multi-hop cognitive MIMO relaying networks with joint constraint of intercept probability and limited interference Open
In this paper, we propose a multi-hop multiple input multiple output (MIMO) decode-and-forward relaying protocol in cognitive radio networks. In this protocol, a multi-antenna secondary source attempts to send its data to a multi antenna s…
View article: Lower and upper bound form for outage probability analysis in two-way of half-duplex relaying network under impact of direct link
Lower and upper bound form for outage probability analysis in two-way of half-duplex relaying network under impact of direct link Open
In this paper, the system performance of the two-way of half-duplex (HD) relaying network under the impact of the direct link is studied. The model system has two sources (S) and one destination (D) communicate by direct link and via relay…
View article: Non-linear energy harvesting based power splitting relaying in full-duplex AF and DF relaying networks: system performance analysis
Non-linear energy harvesting based power splitting relaying in full-duplex AF and DF relaying networks: system performance analysis Open
Wireless power transfer is considered as a novel solution for energy harvesting in wireless communication networks. In this paper, the system performance of the non-linear energy harvesting based power splitting relaying in the full-duplex…