2019
DOI: 10.1109/lwc.2019.2932674
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Activity-Aware Iterative Detection for Massive Machine-Type Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
45
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 36 publications
(45 citation statements)
references
References 9 publications
0
45
0
Order By: Relevance
“…[15] reports a detection order method based on the activity probability of devices and the sorted QR decomposition (SQRD), in order to increase the efficiency of SA-SIC. The work in [16] investigates the reliability of each soft-estimate obtained by a regularized MMSE-SIC detector while [17] proposed an algorithm based on the direction method of multipliers (ADMM). The ones described in [18] and [19] are iterative and belong to the class of Bayesian inference algorithms.…”
Section: A Relevant Prior Artmentioning
confidence: 99%
See 1 more Smart Citation
“…[15] reports a detection order method based on the activity probability of devices and the sorted QR decomposition (SQRD), in order to increase the efficiency of SA-SIC. The work in [16] investigates the reliability of each soft-estimate obtained by a regularized MMSE-SIC detector while [17] proposed an algorithm based on the direction method of multipliers (ADMM). The ones described in [18] and [19] are iterative and belong to the class of Bayesian inference algorithms.…”
Section: A Relevant Prior Artmentioning
confidence: 99%
“…Rewriting the signal model in a way to increase the sparsity of the transmitted vector, the performance of the OLS is improved in [36]. By exchanging extrinsic information between active user detector and symbol detector, the schemes in [37]- [43] propose adaptive and iterative detectors that also employ channel coding.…”
Section: A Relevant Prior Artmentioning
confidence: 99%
“…The ML receiver calculates an estimate of the vector of symbols sent by the sourcesx[i]. Other suboptimal detection techniques could be considered in future work [17], [18], [19], [20], [21], [22], [54], [24], [25], [26], [27], [28], [31], [32], [33].…”
Section: B System Modelmentioning
confidence: 99%
“…Considering perfect synchronization, we employ the ML receiver at the cluster-head processor: . Alternative suboptimal detection techniques could also be considered in future work [29], [30], [31], [32], [33], [34], [73], [36], [37], [38], [39], [40], [41], [46], [47], [48], [49].…”
Section: B System Descriptionmentioning
confidence: 99%