2020
DOI: 10.1109/tcomm.2020.3024203
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Detectors for Telegram Splitting-Based Transmission in Low Power Wide Area Networks With Bursty Interference

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…The related work focuses on traffic as the sole reason for the occurrence of interference bursts. An optimal maximum a-posteriori symbol detection method for bursty external interference is presented in [20]. Although the total received interference is a random process with memory, the interference correlation is not used to analyze the interference burstiness.…”
Section: Related Work On Burstiness Of Interferencementioning
confidence: 99%
See 1 more Smart Citation
“…The related work focuses on traffic as the sole reason for the occurrence of interference bursts. An optimal maximum a-posteriori symbol detection method for bursty external interference is presented in [20]. Although the total received interference is a random process with memory, the interference correlation is not used to analyze the interference burstiness.…”
Section: Related Work On Burstiness Of Interferencementioning
confidence: 99%
“…Similar to how channel dynamics is exploited, information on interference dynamics can help in the design of robust communication systems. For example, knowledge on the burstiness of the interference pikes can be used for opportunistic interference management techniques, e.g., multiuser diversity [17][18][19], efficient detectors [20], opportunistic scheduling [21], dynamic resource management [22], and channel coding [23]. Scientific results on interference dynamics include the derivation of expressions for interference correlation and interference coherence time (i.e., the time until the interference correlation becomes very small) [24][25][26][27].…”
Section: Introductionmentioning
confidence: 99%
“…1: IoT connections (include impact of COVID-19) [7] . Z-Wave, and others [10,11,12]. With the explosive growth of 5G new radio technologies, industry and academia are focusing their efforts on enhanced mobile broadband (eMBB), massive machine-type communications (mMTCs), and ultra-reliable low latency communications (URLLCs) [13].…”
Section: Introductionmentioning
confidence: 99%
“…The typical characteristics that are used to describe RA are medium access (MAC) load, packet length and number of users. The knowledge of these quantities at the receiver can be exploited to improve the detection reliability [8].…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, SIC relies on the capture effect, i.e., on sufficiently separable signals with large power discrepancy[11] 2. Here, we refer to the interference from the colliding transmissions which have not yet been removed by SIC, cf [8]…”
mentioning
confidence: 99%