2015
DOI: 10.1109/lcomm.2015.2473860
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Random Access Scheme With Spatial Group Based Reusable Preamble Allocation in Cellular M2M Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 66 publications
(32 citation statements)
references
References 5 publications
0
32
0
Order By: Relevance
“…However, the occurrence of erroneous detection increases due to the noise-rise among ZC sequences with different root indices. 2 Considering a Poisson arrival model, N I = NλT P 1−pc [8], where N , λ, T P , and pc denote the number of IoT devices within a cell, a packet arrival rate, a period of RA slot, and a collision probability, respectively. As pc increases, collision events cause an increasing of the load per RA slot due to backlogging [9] in the upcoming slots.…”
Section: System Modelmentioning
confidence: 99%
“…However, the occurrence of erroneous detection increases due to the noise-rise among ZC sequences with different root indices. 2 Considering a Poisson arrival model, N I = NλT P 1−pc [8], where N , λ, T P , and pc denote the number of IoT devices within a cell, a packet arrival rate, a period of RA slot, and a collision probability, respectively. As pc increases, collision events cause an increasing of the load per RA slot due to backlogging [9] in the upcoming slots.…”
Section: System Modelmentioning
confidence: 99%
“…The preamble collision issue is also dealt with from different perspectives. For example, the preamble shortage is addressed either by increasing the number of available preambles [8] or by preamble reusing [9]. Early preamble collision detection schemes were proposed to avoid RB wastage [10], [11].…”
Section: B Related Workmentioning
confidence: 99%
“…Then the nodes in hidden layer D i serve as the input for the next hidden layer A i+1 . It should be noted that, according to (9), the input for subsequent hidden layers A also includes the nodes in the input layer. However, for the clarity of presentation in Fig.…”
Section: Neural Network Structure For Dnn-mp-ad Algorithmmentioning
confidence: 99%
“…The message passing from an active CN processor to a positive VN is derived by the incoming messages from N p − 1 negative VNs. Therefore, according to (15) and (16), we have…”
Section: B Analysis For Check Node Processorsmentioning
confidence: 99%