2019
DOI: 10.48550/arxiv.1906.05410
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Sparse IDMA: A Joint Graph-Based Coding Scheme for Unsourced Random Access

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(16 citation statements)
references
References 0 publications
0
16
0
Order By: Relevance
“…Although the coding architecture has not been fully optimized, its performance is excellent and complexity remains manageable. Original AMP+Tree [5] Enhanced AMP+Tree Sparse IDMA [6] Fig. 3: The figure compares the performance of the proposed scheme with existing schemes.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…Although the coding architecture has not been fully optimized, its performance is excellent and complexity remains manageable. Original AMP+Tree [5] Enhanced AMP+Tree Sparse IDMA [6] Fig. 3: The figure compares the performance of the proposed scheme with existing schemes.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…Further extensions of the CSS framework for URA were also made in [11] where a low-complexity algorithm based on chirps for CS decoding was introduced. A number of other algorithmic solutions to the unsourced random access problem were also reported in [12]- [14]. However, all the aforementioned works assume a single receive antenna at the BS and it was only recently that the use of large-scale antenna arrays in the context of URA has been investigated in [15].…”
Section: A Background and Motivationmentioning
confidence: 99%
“…The decoding algorithm performs multiple iterations on the received signal by canceling the contribution of successfully decoded signals in the spirit of successive interference cancellation. Through a numerical study, we demonstrate that the proposed approach outperforms the schemes in [8,9] in pertinent regimes.…”
Section: Introductionmentioning
confidence: 97%
“…Ever since the introduction of the unsourced MAC challenge, there has been significant effort in designing coding schemes that operate close to the FBL bound while maintaining low computational complexity. Proposed schemes achieve this by either splitting the payload [2][3][4], sparsifying collisions [5][6][7][8][9], or a combination thereof [10]. Schemes that rely on splitting the payload take a compressed sensing view of the unsourced MAC problem, and they use a divide-and-conquer approach to limit complexity.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation