IEEE EUROCON 2017 -17th International Conference on Smart Technologies 2017
DOI: 10.1109/eurocon.2017.8011071
|View full text |Cite
|
Sign up to set email alerts
|

NOMA with imperfect SIC implementation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
18
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(18 citation statements)
references
References 5 publications
0
18
0
Order By: Relevance
“…To increase the system throughput and to ensure secure communications, the authors in [18] derived closed-form expressions of the ergodic secrecy rates under both non-colluding and colluding eavesdroppers in a TWR C-NOMA network. In order to achieve a balance between spectral efficiency and energy conservation, power allocation was discussed for a TWR C-NOMA system in [19].According to the principle of NOMA, downlink users with stronger channel gains need to decode signals of other users with lower channel gains before decoding their own signals based on the SIC technique [20]. The NOMA systems with perfect SIC (pSIC) conditions were investigated in most of the above works, which is too idealistic.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…To increase the system throughput and to ensure secure communications, the authors in [18] derived closed-form expressions of the ergodic secrecy rates under both non-colluding and colluding eavesdroppers in a TWR C-NOMA network. In order to achieve a balance between spectral efficiency and energy conservation, power allocation was discussed for a TWR C-NOMA system in [19].According to the principle of NOMA, downlink users with stronger channel gains need to decode signals of other users with lower channel gains before decoding their own signals based on the SIC technique [20]. The NOMA systems with perfect SIC (pSIC) conditions were investigated in most of the above works, which is too idealistic.…”
mentioning
confidence: 99%
“…According to the principle of NOMA, downlink users with stronger channel gains need to decode signals of other users with lower channel gains before decoding their own signals based on the SIC technique [20]. The NOMA systems with perfect SIC (pSIC) conditions were investigated in most of the above works, which is too idealistic.…”
mentioning
confidence: 99%
“…Towards this end, scenarios with both direct {S→D} connectivity and relay selection can provide additional degrees of freedom to the transmission [52], thus improving the performance of NOMA. Also, practical issues, such as outdated CSI [9]- [11] and imperfect SIC [53] should be considered when selecting the relay in NOMA and hybrid NOMA/OMA networks.…”
Section: Discussionmentioning
confidence: 99%
“…NOMA is able to distinguish different users via successive interference cancellation (SIC) [10] or multiple user decoding (MUD) [11]. Besides the very first version [12], the state-of-the-art (SOA) NOMA includes multiuser shared access (MUSA) [13], pattern division multiple access (PDMA) [14], sparse code multiple access (SCMA) [15], etc. SIC was employed in [12][13][14] and has practical challenges:…”
Section: A Challenges For Existing Nomamentioning
confidence: 99%