Multiple Access Techniques for 5G Wireless Networks and Beyond 2018
DOI: 10.1007/978-3-319-92090-0_12
|View full text |Cite
|
Sign up to set email alerts
|

Sparse Code Multiple Access (SCMA)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…In [36], an overview of multi-dimensional constellations as well as their applications in CB design for uplink SCMA systems has been presented. A book chapter is reported in [37], where the basic principles of SCMA are briefly covered along with CB designing and MUD. An introduction to SCMA was given in [38], covering an overview survey of the CB design, detector designs, and some other aspects like resource allocation, practical implementations.…”
Section: B Motivations and Contributionsmentioning
confidence: 99%
“…In [36], an overview of multi-dimensional constellations as well as their applications in CB design for uplink SCMA systems has been presented. A book chapter is reported in [37], where the basic principles of SCMA are briefly covered along with CB designing and MUD. An introduction to SCMA was given in [38], covering an overview survey of the CB design, detector designs, and some other aspects like resource allocation, practical implementations.…”
Section: B Motivations and Contributionsmentioning
confidence: 99%
“…In Reference 14, a low‐complexity iterative uplink SCMA receiver is proposed based on the Expectation Propagation Algorithm. The contents of the codebook design, the structure of the codewords, factor graph, optimal MUD, MPA Detection, and other detectors in SCMA are expressed in Reference 34. It has also been concluded that multi‐user codebook plays an essential role in improving system performance 34 …”
Section: Introductionmentioning
confidence: 99%
“…In this section, numerical results are provided to compare the performance of the proposed ISD scheme with Log-MPA (e.g., [119]) and ML for the following scenarios 3). We also use a single antenna at the transmitter of all users and at the receiver.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…In practical implementations, the exponential operations in (C2) causes large dynamic ranges, which may result in a high storage burden [119]. As such, MPA in the logarithmic domain (Log-MPA) is used instead.…”
Section: Users Resourcesmentioning
confidence: 99%