Intelligent Signal Identification of NOMA Signal with 256-QAM Modulation Using SVM Algorithm
Keywords:
SVM, NOMA, 5G, ZFE, MMSE, BFAbstract
Non-Orthogonal Multiple Access (NOMA) has emerged as a promising technique to enhance the spectral efficiency and connectivity in wireless communication systems. This paper presents a novel approach for the detection of NOMA signals using Support Vector Machines (SVM), aiming to improve the efficiency and reliability of NOMA-enabled communication networks. The inherent challenge in NOMA lies in decoding multiple signals transmitted simultaneously on the same frequency channel. Conventional methods often struggle with the interference between these signals, leading to degraded performance. In this study, SVM, a machine learning algorithm known for its robust classification capabilities, is applied to effectively distinguish and demodulate NOMA signals. The proposed SVM-based detection system leverages the capability of SVM to find optimal hyperplanes in a high-dimensional space, enabling the classification of NOMA signals even in the presence of interference. The training phase involves the use of labelled datasets, where the SVM learns to differentiate between NOMA signals and potential interference patterns the parameters such as bit error rate (BER), Peak to average power ratio (PAPR) and power spectral density (PSD) are evaluated and analysed. Simulation results demonstrate the superior performance of the SVM-based NOMA signal detection compared to traditional methods. The SVM model exhibits high accuracy, robustness, and adaptability to varying signal conditions, making it a promising solution for the challenges posed by NOMA communication systems.
Downloads
References
Kaba VB, Patil RR (2021) A Precoding Based PAPR Minimization Schemes for NOMA in 5G Network. SN Comput Sci 2:262. https://doi.org/10.1007/s42979-021-00639-z
Kumara A, Gupta M (2018) A review on activities of fifth generation mobile communication system. Alex Eng J 57(2):1125–1135
Mohammady S, Farrell R, Malone D, Dooley J (2020) Performance Investigation of Peak Shrinking and Interpolating the PAPR Reduction Technique for LTE-Advance and 5G Signals. Information 11:20. https://doi.org/10.3390/info11010020
Gerzaguet R, Bartzoudis N, Baltar LG et al (2017) The 5G candidate waveform race: a comparison of complexity and performance. J Wireless Com Network 2017:13. https://doi.org/10.1186/s13638-016-0792-0.
Hu C, Wang L, Zhou Z (2020) A Modified SLM Scheme for PAPR Reduction in OFDM Systems. In 2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC), Beijing, China, pp 61–64. https://doi.org/10.1109/ICEIEC49280.2020.9152350
Sayyari R, Pourrostam J, Ahmadi H (2022) A Low Complexity PTS-Based PAPR Reduction Method for the Downlink of OFDM-NOMA Systems. IEEE Wirel Commun Netw Conf (WCNC) 2022:1719–1724. https://doi.org/10.1109/WCNC51071.2022.9771812
Lin P, Ye K, Xu CZ (2019) Dynamic Network Anomaly Detection System by Using Deep Learning Techniques. In: Da Silva D, Wang Q, Zhang LJ (eds) Cloud Computing – CLOUD 2019. CLOUD 2019. Lecture Notes in Computer Science, vol 11513. Springer, Cham. https://doi.org/10.1007/978-3-030-23502-4_12
Kumari S, Kumar R, Kadry S (2021) Suyel Namasudra and David Taniar,"Maintainable stochastic communication network reliability within tolerable packet error rate". Comput Commun 178:161–168
Wang M, Yi H, Jiang F, Lin L, Gao M (2022) Review on Offloading of Vehicle Edge Computing. J Artif Intell Technol 2:132–143.
Narengerile and J. Thompson, "Deep Learning for Signal Detection in Non-Orthogonal Multiple Access Wireless Systems," 2019 UK/ China Emerging Technologies (UCET), Glasgow, UK, 2019, pp. 1-4, doi: 10.1109/UCET.2019.8881888.
K. Kavitha, K. Thilagavathi, R. Dhivyapraba, K. Jasmine and D. Sugumar, "Non-Orthogonal Multiple Access (NOMA) Signal Detection using SVM over Rayleigh Fading Channel," 2022 6th International Conference on Devices, Circuits and Systems (ICDCS), Coimbatore, India, 2022, pp. 494-497, doi: 10.1109/ICDCS54290.2022.9780685.
Arun Kumar, Nidhi Gour, Himanshu Sharma, Mohammad Shorfuzzaman, Mehedi Masud,"Hybrid detection techniques for 5G and B5G M-MIMO system",Alexandria Engineering Journal,Volume 75,Pages 429-437,2023.
Arun Kumar, Sumit Chakravarty, S. Suganya, Himanshu Sharma, Rajneesh Pareek, Mehedi Masud, Sultan Aljahdali, Intelligent conventional and proposed hybrid 5G detection techniques, Alexandria Engineering Journal,Volume 61, Issue 12,Pages 10485-10494,2022.
Astharini, D., Asvial, M. & Gunawan, D. Performance of signal detection with trellis code for downlink non-orthogonal multiple access visible light communication. Photon Netw Commun 43, 185–192 (2022). https://doi.org/10.1007/s11107-021-00957-5.
Cai, D., Fan, P., Zou, Q. et al. Active device detection and performance analysis of massive non-orthogonal transmissions in cellular Internet of Things. Sci. China Inf. Sci. 65, 182301 (2022). https://doi.org/10.1007/s11432-021-3328-y.
Lin C, Chang Q, Li X. A Deep Learning Approach for MIMO-NOMA Downlink Signal Detection. Sensors. 2019; 19(11):2526. https://doi.org/10.3390/s19112526.
Kumar, Arun, Gaur, Nishant and Chakravarti, Sumit. "Improving and analysing the spectral access performance of QAM-64 optical NOMA using a hybrid ED-CSD algorithm" Journal of Optical Communications, 2023. https://doi.org/10.1515/joc-2023-0217.
Kumar, Arun, Gour, Nidhi and Sharma, Himanshu. "A CA and ML approach for M-MIMO optical non-orthogonal multiple access power efficiency" Journal of Optical Communications, 2023. https://doi.org/10.1515/joc-2023-0194.
Kim, D.S., Park, J.S. (2003). Network-Based Intrusion Detection with Support Vector Machines. In: Kahng, HK. (eds) Information Networking. ICOIN 2003. Lecture Notes in Computer Science, vol 2662. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45235-5_73
Lee, J., Kim, D.S., Chi, S., Park, J.S.: Using the Support Vector Machine to Detect the Host-based Intrusion. In: IRC 2002 international conference (2002)
Stolfo, S.J., Fan, W., Lee, W., Prodromidis, A., Chan, P.K.: Cost-based Modeling and Evaluation for Data Mining With Application to Fraud and Intrusion Detection: Results from the JAM Project, Technical Rep. (2000).
Guo, G., Li, S.Z., Chan, K.: Face Recognition by Support Vector Machines. In: 4th IEEE International Conference on Automatic Face and Gesture Recognition, pp. 196–201 (2000)
Y. Zhang, Q. Yang, S. Lambotharan, K. Kyriakopoulos, I. Ghafir and B. AsSadhan, "Anomaly-Based Network Intrusion Detection Using SVM," 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP), Xi'an, China, 2019, pp. 1-6, doi: 10.1109/WCSP.2019.8927907.
A. Kumar and K. Kumar, "Deep Learning-Based Joint NOMA Signal Detection and Power Allocation in Cognitive Radio Networks," in IEEE Transactions on Cognitive Communications and Networking, vol. 8, no. 4, pp. 1743-1752, Dec. 2022, doi: 10.1109/TCCN.2022.3193389.
A. Emir, F. Kara, H. Kaya and X. Li, "Deep learning-based flexible joint channel estimation and signal detection of multi-user OFDM-NOMA", Phys. Commun., vol. 48, Oct. 2021.
A. Emir, F. Kara, H. Kaya and H. Yanikomeroglu, "DeepMuD: Multi-user detection for uplink grant-free NOMA IoT networks via deep learning", IEEE Wireless Commun. Lett., vol. 10, no. 5, pp. 1133-1137, May 2021.
Kumar, A. PAPR Reduction in Beyond 5G Waveforms Using a Novel SLM Algorithm. Natl. Acad. Sci. Lett. 46, 535–538 (2023). https://doi.org/10.1007/s40009-023-01289-w
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.