2014 IEEE Globecom Workshops (GC Wkshps) 2014
DOI: 10.1109/glocomw.2014.7063573
|View full text |Cite
|
Sign up to set email alerts
|

Reliable activity detection for massive machine to machine communication via multiple measurement vector compressed sensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 12 publications
0
13
0
Order By: Relevance
“…References CS-Multiuser detection algorithms [6,[21][22][23][24][25][26][27][28][29][30][31][32][33][34] CS-Medium access schemes [35][36][37][38][39][40][41][42][43][44] Combination of CS-MUD with other techniques [45][46][47][48][49][50] To overcome the limitations of the code domain NOMA and to more efficiently exploit the MTC traffic pattern, recently, compressive sensing based multiuser detection (CS-MUD) techniques are used for enabling the code domain NOMA. In order to accommodate large number of nodes within the available resources, non-orthogonal spreading sequences are assigned to the nodes.…”
Section: Categorymentioning
confidence: 99%
See 4 more Smart Citations
“…References CS-Multiuser detection algorithms [6,[21][22][23][24][25][26][27][28][29][30][31][32][33][34] CS-Medium access schemes [35][36][37][38][39][40][41][42][43][44] Combination of CS-MUD with other techniques [45][46][47][48][49][50] To overcome the limitations of the code domain NOMA and to more efficiently exploit the MTC traffic pattern, recently, compressive sensing based multiuser detection (CS-MUD) techniques are used for enabling the code domain NOMA. In order to accommodate large number of nodes within the available resources, non-orthogonal spreading sequences are assigned to the nodes.…”
Section: Categorymentioning
confidence: 99%
“…In [32], MMV-CS model was considered to reduce the complexity of the receiver and increase the computation speed. The activity is detected based on the covariance matrix of the received signal Y ∈ C Ns×N d which is given as [32]…”
Section: Sparsity Aware Map Based Algorithmsmentioning
confidence: 99%
See 3 more Smart Citations