Pham Ngoc Son

Pham Ngoc Son
Ho Chi Minh City University of Technology and Education

About

55
Publications
4,879
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
302
Citations

Publications

Publications (55)
Article
Full-text available
This paper studies the simultaneous wireless information and power transfer multi-antenna network with heterogeneous users and intelligent reflecting surface (IRS). Information decoding (ID) users, energy harvesting (EH) users, and power-splitting (PS) hybrid users require data and energy at the same time from the base station (BS) in the assistanc...
Article
Full-text available
This article proposes an underlay two-way (UTW) scheme in which the Reconfigurable Intelligent Surface (RIS) is used to support two secondary sources that transmit their data to each other in full-duplex mode. This scheme is operated under interference constraints of multiple primary receivers (MPR), called the MPR-UTW-RIS scheme. To evaluate the s...
Preprint
Full-text available
This paper investigates short-packet communications for the dual-hop decode-and-forward relaying system to facilitate ultra-reliable and low-latency communications. In this system, a selected relay having the highest signal-to-noise ratio (SNR) serves as a forwarder to support the unavailable direct link between the source and destination, whereas...
Preprint
div>This paper investigates short-packet communications for the dual-hop decode-and-forward relaying system to facilitate ultra-reliable and low-latency communications. In this system, a selected relay having the highest signal-to-noise ratio (SNR) serves as a forwarder to support the unavailable direct link between the source and destination, wher...
Article
Full-text available
This paper presents an approach to the power management of nanogrid clusters assisted by a novel form of peer-to-peer (P2P) electricity trading. DC nanogrids have lower power loss in real time and are suitable for P2P trading. Here, cost of electricity for clusters involving different kinds of photovoltaic (PV) power production (as a secondary sour...
Article
Full-text available
In this paper, we propose secure relaying transmission protocols using rateless codes, where a source sends encoded packets to two intended destinations via help of intermediate relays. Employing non-orthogonal multiple access, two encoded packets can be sent to the destinations at the same time. In addition, two partial relay selection methods are...
Article
Full-text available
This paper considers the effects of perfect/imperfect successive interference cancellation (SIC) and perfect/imperfect ' information (CSI) in a multiple-relay two-way cooperative network using nonorthogonal multiple access (NOMA) and digital network coding (DNC). In this model, a relay is selected by maximizing estimated channel gains to enhance th...
Article
Full-text available
In this paper, we propose an underlay two-way relaying scheme with the successive interference cancellation (SIC) solution in which two secondary sources transmit simultaneously their data to each other through secondary relays. The proposed scheme is operated in only two time slots and under an interference constraint of a primary receiver, denote...
Article
Full-text available
In this paper, the optimization of downlink beamforming vectors, uplink transmission power, and power-splitting factors is investigated for a secure two-way SWIPT network in the presence of a hidden eavesdropper and non-linear energy harvesting circuits over both perfect and imperfect channels. The eavesdropper is inactive, so its channel informati...
Article
Full-text available
In this paper, we evaluate end-to-end outage probability of a multi-hop decode-and-forward relaying protocol in underlay cognitive radio network. In the proposed protocol, named COOP, secondary nodes including source and relays have to harvest radio-frequency energy from multiple secondary power beacons, and adjust their transmit power, follows a p...
Article
Full-text available
In this paper, we propose a new approach based on combination of successive interference cancellation (SIC), digital network coding (DNC), and opportunistic relay selection in a two-way cooperative scheme in which two source nodes send simultaneously their packets to each other with a help of multiple relaying nodes, called as SIC–DNC protocol. In...
Article
Full-text available
In this paper, we investigate joint impacts of hardware impairments, imperfect channel state information (CSI) and interference constraints at secondary users in an underlay decode-and-forward cognitive network with multiple primary receivers, called as JIC protocol. A best secondary relay is derived from the reactive relay selection which maximize...
Article
Full-text available
In this paper, an underlay cooperative cognitive network using a non-orthogonal multiple access (UCCN-NOMA) system is investigated, in which the intermediate multiple relays help to decode and forward two signals x 1 and x 2 from a source node to two users D1 and D2, respectively, under wiretapping of an eavesdropper (E). We study the best relay se...
Article
In this paper, we propose an underlay cooperative cognitive network (UCCN), where an energy-harvesting (EH) two-antenna relay operating on full-duplex (FD) mode is used to assist a secondary source to forward the data to a secondary destination (FDEHSN protocol). In the FDEHSN protocol, the secondary relay harvests the energy from the radio-frequen...
Chapter
Full-text available
In this paper, we propose a two-way energy-harvesting scheme (called a TWEH protocol) in which an intermediate full-power relay provides energy for two source nodes and implements digital network coding to compress received data from these source nodes. In the proposed TWEH protocol, two source nodes do not have enough energy to exchange data with...
Article
Full-text available
In this paper, we propose an energy-harvesting cooperation scheme in which relays suffer in-phase and quadrature-phase imbalances (IQI) and harvest energy from a wireless transmit source. A best relay is selected based on end-to-end signal-to-interference-plus-noise ratios (SINRs) in both Amplify-and-Forward (called an EHAF protocol) and Decode-and...
Conference Paper
Full-text available
Half-duplex energy harvesting (EH) amplify-and-forward (AF) two-way relaying (TWR) significantly improves spectral and energy efficiency, excellently satisfying stringent requirements of 5G (Fifth-Generation) mobile communication networks. The current paper proposes an outage probability analysis framework for such relaying over Nakagami-m fading c...
Article
Full-text available
In this paper, we propose a decode-and-forward relaying scheme under the effects of hardware impairments. In this proposed scheme, a cooperative relay uses a power-splitting receiver to harvest energy from the radio-frequency signals of a source node and applies a decode-and-forward technique to process the arriving signals. The system performance...
Article
Full-text available
In this paper, co-channel interferences are exploited for energy harvesting in a Cooperative Network (CICN) in which a power constrained relay uses a power splitting architecture (CICN-PS) and a time switching architecture (CICN-TS) to harvest energy from the radio-frequency signals received from a source node and co-channel interferences. In the p...
Article
Full-text available
In this paper, we propose an adaptive spectrum access protocol for secondary users (SUs) be used to access licensed bands in cognitive radio networks. Specifically, if the primary network, which uses multicast communication to transmit data from one primary source to multiple primary destinations, satisfies a required system quality of service (QoS...
Article
Full-text available
A cooperative cognitive radio scheme exploiting primary signals for energy harvesting is proposed. The relay sensor node denoted as the secondary transmitter (ST) harvests energy from the primary signal transmitted from the primary transmitter, and then uses it to transmit power superposed codes of the secrecy signal of the secondary network (SN) a...
Article
Full-text available
In this paper, a decode-and-forward cooperative communication network (DFCCN) with energy harvesting relays is investigated in which a selected best relay with the N t h channel gain harvests energy from received radio frequency signals and then consumes the harvested energy by forwarding the recoded signals to a destination. Based on the studied e...
Article
Full-text available
The impact of unavailable relays is a serious issue in cooperative communication schemes, where the operation state of relays affects optimal relay selection. In addition, secure signal transmission is an interesting approach to prevent the wiretapping actions of eavesdropper nodes in a wireless environment. In this paper, we propose two cooperativ...
Article
Full-text available
In this paper, we analyze a cooperative communication network with multi energy-harvesting and decode-and-forward relays in which the best relay is selected based on criteria such as Maximizing First-Hop Signal to Noise Ratios (SNRs) (MFHS protocol), Maximizing Second-Hop SNRs (MSHS protocol), and Maximizing End-to-End SNRs (MEES protocol). In thes...
Article
Full-text available
This paper considers physical-layer security protocols in multicast cognitive radio (CR) networks. In particular, we propose dual-hop cooperative decode-and-forward (DF) and randomize-and-forward (RF) schemes using partial relay selection method to enhance secrecy performance for secondary networks. In the DF protocol, the secondary relay would use...
Article
Full-text available
By cooperative spectrum sharing schemes, primary network leases a part of the licensed band to secondary network. Secondary transmitter acts as a relay for the primary transmitter to improve endto- end link quality of primary network and as a reward the secondary transmitter gets the opportunity to transmit its own data by superposition coding. In...
Article
Full-text available
In this study, the authors propose a cooperative transmission scheme with energy-harvesting (EH) relays under wiretapping of an eavesdropper. In this scheme, the relays harvest energy from radio-frequency (RF) signals of a source through power-splitting receivers, and process arrived signals by amplify-and-forward (EH-AF protocol) and decode-and-fo...
Article
Full-text available
In this paper, a decode-and-forward type cooperative spectrum sharing scheme exploiting energy harvesting and power superposition coding is proposed. The secondary transmitter (ST) acting as a relay harvests energy in the first phase of every two phases from the radio frequency signal transmitted by the primary transmitter (PT) of the primary netwo...
Article
Full-text available
In this paper, we propose a two-way decode-and-forward scheme with an energy-harvesting relay in which the relay harvests energy from radio-frequency signals of source nodes by applying a power-splitting receiver and broadcasts coded signals using digital network coding (NCTW protocol). The system performance of the proposed NCTW protocol is compar...
Article
Full-text available
Multi-hop cooperative communication has been investigated in order to overcome disadvantages such as fading, obstruction and low power. In addition, with the goal of increasing access capacity, the orthogonal frequency division multiplexing (OFDM) modulation is being advanced as a solution. In this paper, we propose the approach of relay ordering i...
Article
Full-text available
In this paper, an energy harvesting architecture in an Underlay Cooperative Cognitive Network (UCCN) is investigated, in which power constrained Decode-and-Forward relays harvest energy from radio-frequency signals received from a source, and then consume the harvested energy by forwarding the recoded signals to their destination. These recoded sig...
Article
Full-text available
In this paper, we propose and analyze the integration of source and jammer for a decode-and-forward two-way scheme under physical layer security where the source nodes not only transmit data signals, but also transmit jamming signals to degrade the quality of eavesdropping links, and a selected relay forwards the combined data signals using an XOR...
Article
Full-text available
The communication efficiency of primary networks in cognitive radio depends on wireless environments, such as obstacles (e.g. buildings), distances between transmitter and receiver, and limited transmit power. A cooperative model between primary and secondary networks has the potential to overcome these problems. In this paper, we propose and analy...
Conference Paper
Full-text available
In this paper, the line-of sight and non line-of sight characteristics of a received signal are exploited to analyze the secrecy performance of the decode-and-forward scheme over Dual-Hop Asymmetric Fading Channels. In this scheme, the first hop from a source to relays is subject to Rician fading, whereas the second hop from relays to a destination...
Article
Full-text available
In this paper, we propose a cooperative scheme between primary and secondary networks. In this scheme, a secondary user (SU) accepts a lease of a part of the licensed band according to a cooperative request of a primary user (PU). Hence, the SU helps the PU in transmitting primary signals and has an opportunity to access the frequency spectrum. On...
Article
Full-text available
As demand for highly reliable data transmission in wireless networks has increased rapidly, cooperative communication technology has attracted a great deal of attention. In cooperative communication, some nodes, called eavesdroppers, illegally receive information that is intended for other communication links at the physical layer because of the br...
Conference Paper
Full-text available
In this paper, we propose and analyze an underlay cooperative cognitive network with Physical Layer Security where a best relay is selected based on maximizing end-to-end secrecy capacity. The cooperative system performance is evaluated by an outage secrecy probability and is compared with the direct transmission protocol. Our simulation results sh...
Article
Full-text available
The underlay protocol is a cognitive radio method in which secondary or cognitive users use the same frequency without affecting the quality of service (QoS) for the primary users. In addition, because of the broadcast characteristics of the wireless environment, some nodes, which are called eavesdropper nodes, want to illegally receive information...
Conference Paper
Full-text available
In this paper, we propose and evaluate the performance of the decode-and-forward scheme under physical layer security over Rician fading channel. The best relay is chosen to help the source to transmit data signals to the destination based on achievable secrecy rate (ASR) following criterions as: maximum first-single-hop, maximum second-single-hop...

Network

Cited By