Startseite Throughput analysis of optical NOMA waveform through RNN and CNN neural networks with 256-QAM
Artikel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

Throughput analysis of optical NOMA waveform through RNN and CNN neural networks with 256-QAM

  • Arun Kumar , P. Radhakrishnan , Ch. Raja und Aziz Nanthaamornphong ORCID logo EMAIL logo
Veröffentlicht/Copyright: 24. April 2025
Veröffentlichen auch Sie bei De Gruyter Brill

Abstract

Optical non-orthogonal multiple access (NOMA) is a critical communication technology that allows multiple users to access the same frequency spectrum at the same time, greatly improving spectral efficiency. This paper explores neural network-based encryption methods to protect NOMA systems with high throughput. In particular, convolutional neural networks (CNNs) and recurrent neural networks (RNNs) are used to study and improve encryption mechanisms. CNNs learn spatial features of the data, whereas RNNs are good at modeling temporal dependencies. Simulation outcomes show that RNN-based encryption provides better performance in dynamic scenarios with increased security against eavesdropping and lower bit error rate (BER). Under a Rayleigh fading channel, RNN encryption lowers the BER at SNR to 6.1 dB, which is better than CNN (8.1 dB), MIMO-NOMA (10.2 dB), OFDM (13 dB), and OTFS (15 dB). In the same way, in Rician channel conditions, RNN attains 5 dB BER, outperforming CNN (7.1 dB), MIMO-NOMA (9.1 dB), OFDM (12.1 dB), and OTFS (10.1 dB). RNN also enhances power spectral density (PSD), reducing it to −810 dB from −700 dB of CNN, −590 dB of MIMO-NOMA, and −400 dB and −510 dB of OFDM and OTFS, respectively. These advancements emphasize the compromises between complexity, throughput, and present a promising avenue for optical NOMA systems using deep learning-based methods.


Corresponding author: Aziz Nanthaamornphong, College of Computing, Prince of Songkla University, Phuket, Thailand, E-mail:

  1. Research ethics: Not applicable.

  2. Informed consent: Not applicable.

  3. Author contributions: The authors have accepted responsibility for the entire content of this manuscript and approved its submission.

  4. Use of Large Language Models, AI and Machine Learning Tools: Not applicable.

  5. Conflict of interest: The authors state no conflict of interest.

  6. Research funding: Not applicable.

  7. Data availability: Not applicable.

References

1. Pakravan, S, Chouinard, JY, Li, X, Zeng, M, Hao, W, Pham, QV, et al.. Physical layer security for NOMA systems: requirements, issues, and recommendations. IEEE Internet Things J 2023;10:21721–37. https://doi.org/10.1109/jiot.2023.3296319.Suche in Google Scholar

2. Mohsan, SAH, Sadiq, M, Li, Y, Shvetsov, AV, Shvetsova, SV, Shafiq, M. NOMA-based VLC systems: a comprehensive review. Sensors 2023;23:2960. https://doi.org/10.3390/s23062960.Suche in Google Scholar PubMed PubMed Central

3. Chamkhia, H, Al-Ali, A, Mohamed, A, Guizani, M, Erbad, A, Refaey, A. Performance analysis of PLS key generation-based secure NOMA-enabled IoT networks in the presence of untrusted users. In: 2021 IEEE 7th world forum on internet of things (WF-IoT). New Orleans, LA, USA: IEEE; 2021:633–8 pp.10.1109/WF-IoT51360.2021.9595800Suche in Google Scholar

4. Jaiman, A, Kumar, A, Sharma, H, Gour, N, Gour, N, Chakravarty, S. A mathematical analysis of M-MIMO using ML based signal detection algorithms. J Discrete Math Sci Cryptogr 2023;26:759–66. https://doi.org/10.47974/JDMSC-1751.Suche in Google Scholar

5. Al-Musawi, IM, Al-Hussaibi, WA, Ali, FH. Efficient secure NOMA schemes based on chaotic physical layer security for wireless networks. IEEE Open J Commun Soc 2022;3:2425–43. https://doi.org/10.1109/ojcoms.2022.3226883.Suche in Google Scholar

6. Rajkumar, S, Jayakody, DNK, Alkanhel, R, Muthanna, A. Physical layer security in N-pair NOMA-PLNC wireless networks. IEEE Access 2022;10:91356–71. https://doi.org/10.1109/access.2022.3198978.Suche in Google Scholar

7. Jacob, LM, Sreelakshmi, P, Deepthi, PP. Physical layer security in power domain NOMA through key extraction. In: 2021 12th international conference on computing communication and networking technologies (ICCCNT). Kharagpur, India: IEEE; 2021:1–7 pp.10.1109/ICCCNT51525.2021.9580039Suche in Google Scholar

8. Choudhary, S, Kumar, A, Sharma, MK, Masud, M. A mathematical investigation of multi-carrier waveform with AI based matched filter detection. J Interdiscipl Math 2023;26:321–8. https://doi.org/10.47974/JIM-1663.Suche in Google Scholar

9. Kumar, A, Yamini, AP, Gaur, N, Nanthaamornphong, A. A mathematical analysis of the PAPR in the NOMA waveform using SLM algorithm for 64-QAM. J Interdiscipl Math 2024;27:223–32. https://doi.org/10.47974/JIM-1815.Suche in Google Scholar

10. Kumar, A. Analysis of PAPR on NOMA waveforms using hybrid algorithm. Wirel Pers Commun 2023;132:1849–61. https://doi.org/10.1007/s11277-023-10683-y.Suche in Google Scholar

Received: 2025-03-20
Accepted: 2025-04-08
Published Online: 2025-04-24

© 2025 Walter de Gruyter GmbH, Berlin/Boston

Heruntergeladen am 8.9.2025 von https://www.degruyterbrill.com/document/doi/10.1515/joc-2025-0093/pdf
Button zum nach oben scrollen