2018
DOI: 10.1109/twc.2017.2786231
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Modulation and Filter Configuration in Universal Filtered Multi-Carrier Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
23
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(25 citation statements)
references
References 35 publications
0
23
0
Order By: Relevance
“…The number of the IDFT points is set as N = 64; the number of sub-bands is B = 2, which are allocated to two different UEs. Following the setting of [19], each sub-band occupies n s = 16 subcarriers. Transmitters using the length L Dolph-Chebyshev filter whose Fourier transform side-lobe magnitude is α dB below the mainlobe magnitude, where L = 6, α = 120.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…The number of the IDFT points is set as N = 64; the number of sub-bands is B = 2, which are allocated to two different UEs. Following the setting of [19], each sub-band occupies n s = 16 subcarriers. Transmitters using the length L Dolph-Chebyshev filter whose Fourier transform side-lobe magnitude is α dB below the mainlobe magnitude, where L = 6, α = 120.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…On the one hand, the trained autoencoder for a certain value of M cannot work in the scenarios with different values of M. On the other hand, the performance of DL-based communication system will not be optimal when the trained autoencoder is applied to different SNR scenarios. For these reasons, there is a need for an adaptive transmission strategy for the autoencoder to improve the applicability and optimize the system performances, such as maximizing the data rate and satisfying the QoS constraint [37], [38].…”
Section: B Motivationsmentioning
confidence: 99%
“…In conventional multiantenna systems, e.g., [6], [7], orthogonal multiple access (OMA) schemes are often exploited. In these OMA techniques, the resources (time, frequency, or code) are allocated to each user exclusively and hence multiuser interference can be avoided.…”
Section: Introductionmentioning
confidence: 99%