2019
DOI: 10.1109/tcomm.2018.2874239
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative Non-Orthogonal Layered Multicast Multiple Access for Heterogeneous Networks

Abstract: This paper proposes a novel design of cooperative non-orthogonal layered multicast multiple access in a heterogeneous network, where the information is encoded into the messages of high-priority (HP) and low-priority (LP). Two types of multicast users coexist in the network: 1) regular users (RUs), which are located far away from the base-station (BS) and expect to decode only the HP message (due to the weak channels); 2) advanced users (AUs), which are located close to the BS and expect to decode both HP and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 42 publications
(29 citation statements)
references
References 37 publications
0
29
0
Order By: Relevance
“…Proof: Refer to Appendix F. , and calculate D ij andT i according to (18) and (21), respectively. 3: Check the feasibility conditions (23) and (24). If (20) has a feasible solution, set T max = T .…”
Section: Lemmamentioning
confidence: 99%
See 1 more Smart Citation
“…Proof: Refer to Appendix F. , and calculate D ij andT i according to (18) and (21), respectively. 3: Check the feasibility conditions (23) and (24). If (20) has a feasible solution, set T max = T .…”
Section: Lemmamentioning
confidence: 99%
“…From Appendix D, the complexity of solving Problem (17) For the spacial case with ω = 1, the optimal solution of Problem (10) is obtained by using Algorithm 2. According to Algorithm 2, the main complexity in each step lies in checking the feasibility conditions (23) and (24), which involves complexity O(M). As a result, the total complexity of Algorithm 2 is O(M log 2(1/ǫ)), where O(log 2(1/ǫ)) is the complexity of the bisection method with accuracy ǫ.…”
Section: Algorithm Analysismentioning
confidence: 99%
“…To enhance the spectral efficiency and reduce the co-channel interference, user scheduling has been integrated into cooperative NOMA in some recent work [20]- [26]. Specifically, only the users that are scheduled can participate in the cooperative NOMA transmissions, which is formally called opportunistic cooperative NOMA.…”
Section: Introductionmentioning
confidence: 99%
“…Note that these studies [20]- [23] only focus on wireless unicast applications, where all users require individually different information. When some users demand the same data via wireless multicast, several user scheduling schemes are proposed in [24]- [26]. In these schemes, one of the users that have successfully decoded the multicast messages is selected to forward all its decoded messages.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the outage probability of failing to support a minimum target rate is a critical performance metric. The outage analysis of NOMA has received considerable research attention both under the assumptions of only having statistical CSI 1 (e.g., [8]- [12]), imperfect CSI (e.g., [13], [14]), and also imperfect SIC (e.g., [15], [16]). These studies have been focused mainly on single-carrier NOMA systems.…”
Section: Introductionmentioning
confidence: 99%