2015 IEEE International Conference on Communication Workshop (ICCW) 2015
DOI: 10.1109/iccw.2015.7247489
|View full text |Cite
|
Sign up to set email alerts
|

Joint channel estimation and activity detection for multiuser communication systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 55 publications
(46 citation statements)
references
References 13 publications
0
46
0
Order By: Relevance
“…Hence, considerable storage resources are required for storing these sequences at the AP. At the receiver, CS algorithms, such as Basis Pursuit (BP) [11], Orthogonal Matching Pursuit (OMP) [12] and approximate message passing (AMP) [13] [14], are utilized for detecting the active users. However, all these algorithms impose a high complexity that is related either to the size of sequence space or to the number of potential users in the system.…”
Section: B Related Workmentioning
confidence: 99%
“…Hence, considerable storage resources are required for storing these sequences at the AP. At the receiver, CS algorithms, such as Basis Pursuit (BP) [11], Orthogonal Matching Pursuit (OMP) [12] and approximate message passing (AMP) [13] [14], are utilized for detecting the active users. However, all these algorithms impose a high complexity that is related either to the size of sequence space or to the number of potential users in the system.…”
Section: B Related Workmentioning
confidence: 99%
“…W l γ , W one→h , and W l vγ→h are diagonal weighting matrices with size d c K × d c K. Layer 5: The weighted output message vectorγ l = {γ l k , ∀k} is derived as follows, and O l A m 2 , whose elements correspond to the terms in the cumulative summation in (11). (20) where P = {P n,kd , ∀n, k, d} is a row vector with length L t d c K.…”
Section: B Weighted Message Passingmentioning
confidence: 99%
“…4. Withλ l−1 , v l−1 δ→z , m l−1 δ→z in the (l − 1)-th iteration and v l h , m l h in the l-th iteration, update v l δ→z and m l δ→z by (20) and (21). 5.…”
Section: With V Lmentioning
confidence: 99%
“…For example, the joint UAD and CE problem was addressed by a modified Bayesian compressed sensing algorithm [5] for the cloud radio access network (C-RAN). In addition, the powerful approximate message passing (AMP) algorithm was employed for the joint UAD and CE problem when the BS is equipped either with a single antenna [6], [7] or with multiple antennas [8].…”
Section: A Grant-based Random Accessmentioning
confidence: 99%