2019
DOI: 10.1109/lwc.2019.2923410
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Power Control for NOMA Transmissions in Wireless Caching Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 49 publications
(23 citation statements)
references
References 4 publications
0
23
0
Order By: Relevance
“…(15) makes sure that the sum of computational resource allocated to the offloading users can not exceed the computing capacity of MEC server. (16) guarantees that the cached computation results do not exceed the caching capacity of the MEC server. In formula (17), it represents the energy consumption of N users in the same BS is limited to maximum energy consumption.…”
Section: Problem Formulationmentioning
confidence: 99%
See 2 more Smart Citations
“…(15) makes sure that the sum of computational resource allocated to the offloading users can not exceed the computing capacity of MEC server. (16) guarantees that the cached computation results do not exceed the caching capacity of the MEC server. In formula (17), it represents the energy consumption of N users in the same BS is limited to maximum energy consumption.…”
Section: Problem Formulationmentioning
confidence: 99%
“…According to the above method, GRU algorithm is used to predict the popularity of different tasks in the near future periods. In the case of not exceeding the cache capacity of the MEC server, that is, in order to satisfy the constraint of formula (16), it is important to determine what computation results are stored on the server. Considering the cache capacity of the server and the size of computation results, the computing results of the task are cached on the server in order of popularity from large to small, so as to cache the computing results of the task as much as possible.…”
Section: A Gated Recurrent Unitmentioning
confidence: 99%
See 1 more Smart Citation
“…5 Let r b k ,ℓx,0 (d j,ℓx,0 ) denote the distance between BS b k ∈ Φ k (jammer j ∈ Φ J ) and ℓ x,0 . Based on (3), the received signal at ℓ x,0 is given by (4), as shown at the top of this page, where b n,k,0 ∈ Φ n,k,0 denotes the index of the serving BS of the typical user ℓ ,0 in tier k ,0 ∈ K, 6 b n,ke,0 ∈ Φ n,ke,0 denotes the index of an arbitrary BS storing file n in tier k e,0 ∈ K, and (·) T denotes the conjugate transpose operation. Then, the SIR at ℓ x,0 can be expressed as (5), as shown at the top of this page, where I x b n,k x,0…”
Section: Received Signal-to-interference Ratiosmentioning
confidence: 99%
“…However, the majority of such traffic is asynchronously but repeatedly requested by many users at different times and thus a tremendous amount of mobile data traffic has actually been redundantly generated over the mobile networks [2]. Against this backdrop, caching popular contents at the base stations (BSs) has been proposed as a promising approach for shifting the huge mobile data traffic from remote clouds to the edges in mobile networks [3], [4], thereby significantly improving the users' quality of service (QoS). Motivated by this, cacheenabled wireless networks has recently been attracting great research attention.…”
Section: Introductionmentioning
confidence: 99%