2020
DOI: 10.1109/jiot.2020.2972274
|View full text |Cite
|
Sign up to set email alerts
|

Deep Reinforcement Learning for Throughput Improvement of the Uplink Grant-Free NOMA System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
44
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 94 publications
(48 citation statements)
references
References 36 publications
0
44
0
Order By: Relevance
“…On the other hand, the complexity mainly comes from the MMSE-SIC calculations at the receiver with the maximum decodable number of packets in a sub-frame. According to the literature [28]- [29], the complexity of MMSE-SIC detector can be expressed as O(K 3 max ), whereK max is defined as the maximum decodable number of connections overall with K max ≤ θ max L. To further reduce the complexity of the MMSE-SIC detector, some low-complexity MMSE-SIC detection techniques could also be exploited in the RPC scheme [30]- [31]. Besides, the complexity of SIC for each replica of the proposed scheme is just the same as that of CRDSA-like schemes, and it grows with the achievable throughput and the average number of packet replicas of each device.…”
Section: A Computational Complexitymentioning
confidence: 99%
“…On the other hand, the complexity mainly comes from the MMSE-SIC calculations at the receiver with the maximum decodable number of packets in a sub-frame. According to the literature [28]- [29], the complexity of MMSE-SIC detector can be expressed as O(K 3 max ), whereK max is defined as the maximum decodable number of connections overall with K max ≤ θ max L. To further reduce the complexity of the MMSE-SIC detector, some low-complexity MMSE-SIC detection techniques could also be exploited in the RPC scheme [30]- [31]. Besides, the complexity of SIC for each replica of the proposed scheme is just the same as that of CRDSA-like schemes, and it grows with the achievable throughput and the average number of packet replicas of each device.…”
Section: A Computational Complexitymentioning
confidence: 99%
“…To avoid collisions, two techniques can be leveraged. One is to apply novel multiple access techniques, such as non-orthogonal multiple access (NOMA) [5]. The other is to exploit learning algorithms so users can distributively adjust their transmissions, minimizing collisions.…”
Section: Introductionmentioning
confidence: 99%
“…The use of reinforcement learning (RL) for uncoordinated spectrum access has recently garnered some attention. To maximize the accumulated data rate and the number of successful transmissions, [3] and [4] adopt Q-learning, while [5] considers a NOMA system and applies deep RL. The related framework of multi-player multi-armed bandits (MAB) [9] has also been widely used to study uncoordinated spectrum access.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Then, this high potential of DL networks has attracted great attention by the community [21], [22] and the DL networks applications have been implemented in more timely topics such as index modulations [23] and mmWave communications [24]. Therefore, the DL-based algorithms have also been implemented in NOMA schemes where grantfree and multi-user detection are investigated in CD-NOMA [25]- [27] and along with PD-NOMA schemes for classification/optimization [28]- [30], resource allocation [31], [32], modulation design [33], [34], signal detection [35]- [40]. However, all aforementioned studies assume basic downlink and/or uplink NOMA schemes and to the best of the authors' knowledge, there is no study to design DL-aided joint signal detection to improve the error performance of C-NOMA, yet.…”
mentioning
confidence: 99%