2017 IEEE International Conference on Communications (ICC) 2017
DOI: 10.1109/icc.2017.7996497
|View full text |Cite
|
Sign up to set email alerts
|

SIC vs. JD: Uplink NOMA techniques for M2M random access

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(16 citation statements)
references
References 16 publications
0
16
0
Order By: Relevance
“…Due to the complicated expression of the objective function T P A (I, q) as shown in (32) and (35), our formulated problem cannot be easily solved. Consequently, we employ a two-step scheme to solve efficiently the throughput maximization problem.…”
Section: Pso Algorithm Based Solutionmentioning
confidence: 99%
See 2 more Smart Citations
“…Due to the complicated expression of the objective function T P A (I, q) as shown in (32) and (35), our formulated problem cannot be easily solved. Consequently, we employ a two-step scheme to solve efficiently the throughput maximization problem.…”
Section: Pso Algorithm Based Solutionmentioning
confidence: 99%
“…If the MTCD requires high target data rate, e.g., future smart grid requires data rate larger than 3.072 bps/Hz [45], we have that β = 2 R0 − 1 is usually much larger than one. In this case, we can know that the interval [1/β, 1) occupies most part of the domain for the back-off factor q as indicated by (32). Consequently, the optimal solution for q ∈ [1/β, 1) should achieve the near-optimal performance when the target data rate is high, i.e., we can regard the optimal solution within the interval q ∈ [1/β, 1) as the suboptimal solution within the entire interval q ∈ (0, 1) under the high data rate requirement.…”
Section: Analysis Under High Data Rate Requirementmentioning
confidence: 99%
See 1 more Smart Citation
“…Likewise sequential algorithms, the order in which the system operates is a critical factor. With regard to SIC, however, setting the user-decoding order (UO) requires some knowledge of the received user strengths (powers or symbol energies) [2].…”
Section: Introductionmentioning
confidence: 99%
“…Information theory analyses have proved the benefit of SIC, which relies on successive decoding and subtraction of usersignals, in interference-limited scenarios [4]. SIC attains the corner points of the Gaussian channel's capacity region, and, in contrast to joint detection, decoding complexity is reduced at the exchange of enabling CSI [5], [6]. Hence, the practical application of SIC needs the design of an appropriate power control scheme featuring user-power imbalance, under the specific SIC implementation and energy-aware user constraints.…”
Section: Introductionmentioning
confidence: 99%