2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall) 2015
DOI: 10.1109/vtcfall.2015.7391094
|View full text |Cite
|
Sign up to set email alerts
|

Primary Synchronization Signal Detection Method for Device-to-Device in LTE-Rel 12 and Beyond

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…This section is dedicated to the description of the NSSS model [2]. It is assumed that the time-frequency synchronization has been properly performed thanks to NPSS [6][7][8][9], in such way that the residual synchronization errors are negligible. Furthermore, since the signal is narrowband, it can be reasonably supposed that the frequency response of the channel is constant over the NSSS resource block of 12 subcarriers.…”
Section: Nsss Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…This section is dedicated to the description of the NSSS model [2]. It is assumed that the time-frequency synchronization has been properly performed thanks to NPSS [6][7][8][9], in such way that the residual synchronization errors are negligible. Furthermore, since the signal is narrowband, it can be reasonably supposed that the frequency response of the channel is constant over the NSSS resource block of 12 subcarriers.…”
Section: Nsss Modelmentioning
confidence: 99%
“…The total number of complex multiplications involved in the suggested method is reduced to 8 × 65 + 132 × 128 = 17416, where 8 × 65 corresponds to (15), and 132 × 128 corresponds to (16) or (17). Thus, it is of order 15 times less complex than the exhaustive cell ID search through (8) or (9). Moreover, we can still reduce the complexity by using the symmetry of En(u) allowing us to factorize elements in the sum in (16) and (17).…”
Section: Description Of the Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Fig. 2, we compare the suggested method with the exhaustive ML cell ID estimation for N R = 1, where the channel is supposed to be known as in (8) and (16), and unknown as in (9) and (17 largely outperforms the suggested method. However, it must be reminded that the ML is 30 times computationally more complex than the sub-optimal technique.…”
Section: Hybrid Hard Decision-ml Combinationmentioning
confidence: 99%
“…Moreover, every device must be synchronized with an evolved node B (eNB) to connect the network. The synchronization process is carried out according to two main steps: the devices physically synchronize with the eNBs using the narrowband primary synchronization signal (NPSS) [8][9][10][11] and then seek the cell identifier (ID) of the neighboring eNBs through the narrowband secondary synchronization signal (NSSS). In this paper, we focus on the cell ID estimation process.…”
Section: Introductionmentioning
confidence: 99%