The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2020
DOI: 10.1109/tcomm.2020.2969184
|View full text |Cite
|
Sign up to set email alerts
|

Deep Neural Network-Based Active User Detection for Grant-Free NOMA Systems

Abstract: As a means to support the access of massive machine-type communication devices, grant-free access and non-orthogonal multiple access (NOMA) have received great deal of attention in recent years. In the grant-free transmission, each device transmits information without the granting process so that the basestation needs to identify the active devices among all potential devices. This process, called an active user detection (AUD), is a challenging problem in the NOMA-based systems since it is difficult to identi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
67
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 77 publications
(67 citation statements)
references
References 28 publications
0
67
0
Order By: Relevance
“…From ( 27) and ( 29) we can conceive that when the AP does not know the active UEs, it has to first carry out the symbol-based channel estimation, and then average the estimates obtained from the N P pilot symbols to give the final estimation. Furthermore, while AP knows b (p) i from the pilot sequences of UEs and it can also construct A A A i from the UEs' spreading sequences, AP has to know R R R a , in order to compute W W W i,p of (26) to fulfill the channel estimation based on (29). However, AP does not have the knowledge about the active UEs and even the number of them, R R R a is unable to be constructed using the knowledge available to AP, but has to be obtained from alternative approaches.…”
Section: B Channel Estimation With Active Ues Unknown To Ap -Estimator-ukmentioning
confidence: 99%
See 1 more Smart Citation
“…From ( 27) and ( 29) we can conceive that when the AP does not know the active UEs, it has to first carry out the symbol-based channel estimation, and then average the estimates obtained from the N P pilot symbols to give the final estimation. Furthermore, while AP knows b (p) i from the pilot sequences of UEs and it can also construct A A A i from the UEs' spreading sequences, AP has to know R R R a , in order to compute W W W i,p of (26) to fulfill the channel estimation based on (29). However, AP does not have the knowledge about the active UEs and even the number of them, R R R a is unable to be constructed using the knowledge available to AP, but has to be obtained from alternative approaches.…”
Section: B Channel Estimation With Active Ues Unknown To Ap -Estimator-ukmentioning
confidence: 99%
“…Owing to this, in recent years, various CSbased joint UAI, channel estimation and/or multiuser detection (MUD) algorithms have been developed and investigated in the context of mGFMA, when various sparsity structures are considered [6,7,10,11,[17][18][19][20][21][22][23][24][25][26][27][28]. While CS-based methods have some outstanding merits as claimed in references, they are not appearing for operation in the mGFMA systems where the number of active UEs is large [29]. This is because the recovery performance of CS-based methods is limited by the restricted isometric property (RIP) condition [30].…”
Section: Introductionmentioning
confidence: 99%
“…In the field of signal processing, algorithms based on ML have been applied to recover sparse signals [13], [14]. In related research on signature codes, by applying training data to a properly designed DNN, the scheme proposed in [15] learns the nonlinear mapping between the received signal and the support for detecting active users. Unlike traditional algorithms and ML methods based on conventional models, neural network-based solutions can improve the model's performance through a large amount of data, which is not present in traditional ML because of the influence of the standard model used.…”
Section: Introductionmentioning
confidence: 99%
“…Although GF schemes are able to achieve the low-latency requirements, they lack in reliability in TIoT environments where a massive number of devices may need to be supported. To address this, GF-NOMA approaches have been presented and examined as possible solutions [13]- [17]. Particularly, in [13], the authors derived simplified expressions that approximate the outage probability and system throughout for both successive joint decoding (SJD) and successive interference cancellation (SIC), while in [14], Du et al developed an algorithm that exploits the block sparsity to effectively carry out the multi-user detection (MUD) process.…”
Section: Introductionmentioning
confidence: 99%
“…Jiang et al [15] presented a distributed transmission scheme that aims to mitigate collisions in massive machine-type communications (mMTC) scenarios, while, in [16], they developed a joint user and signal detection algorithm by leveraging the message passing principles of GF-NOMA systems. Finally, in [17], the authors utilized a deep neural network to develop an active user detection (AUD) method for mMTC.…”
Section: Introductionmentioning
confidence: 99%