2015
DOI: 10.1109/twc.2014.2363165
|View full text |Cite
|
Sign up to set email alerts
|

Sparsity Controlled Random Multiple Access With Compressed Sensing

Abstract: The paper considers random multiple access in a network where only a small portion of users have data to forward and transmit packets in each time slot because user activity ratio is not high in practice. For this reason, the AP has to not only identify the users who transmitted but also decode the received data codewords. Exploiting the sparsity of transmitting users, Lasso, a well-known practical compressed sensing algorithm, is applied for efficient user identification. The compressed sensing algorithm enab… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
41
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 86 publications
(42 citation statements)
references
References 26 publications
1
41
0
Order By: Relevance
“…A range of CS-based random access schemes have been conceived recently, such as the family of asynchronous random access protocols [145] and compressive random access arrangement of [146]. Additionally, in [147], random multiple access relying on CS was invoked for maximizing the system's total throughput. Furthermore, the attainable throughput associated with different amount of channel knowledge was discussed, which provided useful insights into the quantitative benefits of CS in the context of throughput maximization in random multiple access schemes.…”
Section: ) Bit Division Multiplexing (Bdm)mentioning
confidence: 99%
“…A range of CS-based random access schemes have been conceived recently, such as the family of asynchronous random access protocols [145] and compressive random access arrangement of [146]. Additionally, in [147], random multiple access relying on CS was invoked for maximizing the system's total throughput. Furthermore, the attainable throughput associated with different amount of channel knowledge was discussed, which provided useful insights into the quantitative benefits of CS in the context of throughput maximization in random multiple access schemes.…”
Section: ) Bit Division Multiplexing (Bdm)mentioning
confidence: 99%
“…As mentioned before, according to a report on mobile traffic [7], the number of active users does not exceed 10% of the total number of users even in the busy hours. This implies that even if there are a lot of potential users, which is a typical characteristic of massive connectivity in 5G, only a small part of users have data to send at the same time.…”
Section: Joint User Activity and Data Detectionmentioning
confidence: 90%
“…complex Gaussian variables with zero mean and unit variance, i.e, Rayleigh fading channels are considered in this paper, and such typical channel model has been widely used in wireless communications [6] [7]. v n is the Gaussian noise on subcarrier n with zero mean and variance σ 2 .…”
Section: System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…In the 5G system, a single base station will serve 10 to 100 times more machine type devices (MTDs) than the personal mobile phones, which poses great challenges to efficiently support massive users random access [1][2][3]. According to the statistics of mobile traffics [4], the number of active users is usually much smaller than the number of all possible users even in the busy hours in cellular communications, especially for 5G MMTC applications, where users can sporadically access or leave the system. Thus, the sparsity of user activity naturally exists in massive connectivity.…”
Section: Introductionmentioning
confidence: 99%