1,107 research outputs found

    Grant-Free Massive MTC-Enabled Massive MIMO: A Compressive Sensing Approach

    Full text link
    A key challenge of massive MTC (mMTC), is the joint detection of device activity and decoding of data. The sparse characteristics of mMTC makes compressed sensing (CS) approaches a promising solution to the device detection problem. However, utilizing CS-based approaches for device detection along with channel estimation, and using the acquired estimates for coherent data transmission is suboptimal, especially when the goal is to convey only a few bits of data. First, we focus on the coherent transmission and demonstrate that it is possible to obtain more accurate channel state information by combining conventional estimators with CS-based techniques. Moreover, we illustrate that even simple power control techniques can enhance the device detection performance in mMTC setups. Second, we devise a new non-coherent transmission scheme for mMTC and specifically for grant-free random access. We design an algorithm that jointly detects device activity along with embedded information bits. The approach leverages elements from the approximate message passing (AMP) algorithm, and exploits the structured sparsity introduced by the non-coherent transmission scheme. Our analysis reveals that the proposed approach has superior performance compared to application of the original AMP approach.Comment: Submitted to IEEE Transactions on Communication

    Joint Domain Based Massive Access for Small Packets Traffic of Uplink Wireless Channel

    Full text link
    The fifth generation (5G) communication scenarios such as the cellular network and the emerging machine type communications will produce massive small packets. To support massive connectivity and avoid signaling overhead caused by the transmission of those small packets, this paper proposes a novel method to improve the transmission efficiency for massive connections of wireless uplink channel. The proposed method combines compressive sensing (CS) with power domain NOMA jointly, especially neither the scheduling nor the centralized power allocation is necessary in the method. Both the analysis and simulation show that the method can support up to two or three times overloading.Comment: 6 pages, 5 figures.submitted to globecom 201

    Sparse Signal Processing Concepts for Efficient 5G System Design

    Full text link
    As it becomes increasingly apparent that 4G will not be able to meet the emerging demands of future mobile communication systems, the question what could make up a 5G system, what are the crucial challenges and what are the key drivers is part of intensive, ongoing discussions. Partly due to the advent of compressive sensing, methods that can optimally exploit sparsity in signals have received tremendous attention in recent years. In this paper we will describe a variety of scenarios in which signal sparsity arises naturally in 5G wireless systems. Signal sparsity and the associated rich collection of tools and algorithms will thus be a viable source for innovation in 5G wireless system design. We will discribe applications of this sparse signal processing paradigm in MIMO random access, cloud radio access networks, compressive channel-source network coding, and embedded security. We will also emphasize important open problem that may arise in 5G system design, for which sparsity will potentially play a key role in their solution.Comment: 18 pages, 5 figures, accepted for publication in IEEE Acces

    Compressive Sensing Based Massive Access for IoT Relying on Media Modulation Aided Machine Type Communications

    Full text link
    A fundamental challenge of the large-scale Internet-of-Things lies in how to support massive machine-type communications (mMTC). This letter proposes a media modulation based mMTC solution for increasing the throughput, where a massive multi-input multi-output based base station (BS) is used for enhancing the detection performance. For such a mMTC scenario, the reliable active device detection and data decoding pose a serious challenge. By leveraging the sparsity of the uplink access signals of mMTC received at the BS, a compressive sensing based massive access solution is proposed for tackling this challenge. Specifically, we propose a block sparsity adaptive matching pursuit algorithm for detecting the active devices, whereby the block-sparsity of the uplink access signals exhibited across the successive time slots and the structured sparsity of media modulated symbols are exploited for enhancing the detection performance. Moreover, a successive interference cancellation based structured subspace pursuit algorithm is conceived for data demodulation of the active devices, whereby the structured sparsity of media modulation based symbols found in each time slot is exploited for improving the detection performance. Finally, our simulation results verify the superiority of the proposed scheme over state-of-the-art solutions.Comment: submitted to IEEE Transactions on Vehicular Technology [Major Revision

    Active User Detection for Massive Machine-type Communications via Dimension Spreading Deep Neural Network

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ •๋ณด๊ณตํ•™๋ถ€, 2019. 2. ์‹ฌ๋ณ‘ํšจ.๋Œ€์šฉ๋Ÿ‰ ์‚ฌ๋ฌผ ํ†ต์‹  (massive machine type communication, mMTC)์€ ๋‹ค์ˆ˜์˜ ์‚ฌ๋ฌผ ํ†ต์‹  ๊ธฐ๊ธฐ๋“ค์ด ๊ธฐ์ง€๊ตญ์— ์ ‘์†ํ•˜๋Š” ์ƒํ™ฉ๊ณผ ๊ด€๊ณ„๊ฐ€ ์žˆ๋‹ค. ๋Œ€๊ทœ๋ชจ ์—ฐ๊ฒฐ์„ฑ์„ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•˜์—ฌ ์ตœ๊ทผ์— ๋น„์Šน์ธ ์ ‘์†๊ณผ ๋น„์ง๊ต ๋‹ค์ค‘ ์ ‘์† (non-orthogonal multiple access, NOMA)์ด ๊ณ ๋ ค๋˜์—ˆ๋‹ค. ๋น„์Šน์ธ ๊ธฐ๋ฐ˜ ์ „์†ก ์‹œ, ๊ฐ ๊ธฐ๊ธฐ๋Š” ์Šน์ธ ์ ˆ์ฐจ ์—†์ด ์ •๋ณด๋ฅผ ์ „์†กํ•˜๊ธฐ ๋•Œ๋ฌธ์— ๊ธฐ์ง€๊ตญ์€ ๋ชจ๋“  ๊ธฐ๊ธฐ๋“ค ์ค‘ ํ™œ์„ฑ ์ƒํƒœ์— ์žˆ๋Š” ๊ธฐ๊ธฐ๋“ค๋งŒ์„ ๊ฒ€์ถœํ•˜๋Š” ๊ณผ์ •์„ ์ˆ˜ํ–‰ํ•ด์•ผ ํ•œ๋‹ค. ์ด๋Ÿฌํ•œ ์ ˆ์ฐจ๋ฅผ ํ™œ์„ฑ ๊ธฐ๊ธฐ ๊ฒ€์ถœ (active user detection, AUD)์ด๋ผ๊ณ  ํ•˜๋ฉฐ, ๋น„์ง๊ต ๋‹ค์ค‘ ์ ‘์† ๊ธฐ๋ฐ˜์˜ ์‹œ์Šคํ…œ์—์„œ๋Š” ์ˆ˜์‹  ์‹ ํ˜ธ์— ํ™œ์„ฑ ๊ธฐ๊ธฐ๋“ค์˜ ์‹ ํ˜ธ๋“ค์ด ์ค‘์ฒฉ๋˜์–ด ์žˆ๊ธฐ ๋•Œ๋ฌธ์— ํ™œ์„ฑ ๊ธฐ๊ธฐ๋ฅผ ๊ฒ€์ถœํ•˜๋Š” ๊ฒƒ์€ ์–ด๋ ค์šด ๋ฌธ์ œ์ด๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์ „์ฒด ๊ธฐ๊ธฐ์˜ ์ˆ˜๊ฐ€ ๋งค์šฐ ๋งŽ์€ ๋Œ€์šฉ๋Ÿ‰ ์‚ฌ๋ฌผ ํ†ต์‹ ์— ์ ํ•ฉํ•œ ์ƒˆ๋กœ์šด ๋ฐฉ์‹์˜ ํ™œ์„ฑ ๊ธฐ๊ธฐ ๊ฒ€์ถœ ๊ธฐ์ˆ ์„ ์ œ์•ˆํ•œ๋‹ค. ์ด ๊ธฐ์ˆ ์„ ์ฐจ์› ํ™•์žฅ ์‹ฌ์ธต ์‹ ๊ฒฝ๋ง ๊ธฐ๋ฐ˜์˜ ํ™œ์„ฑ ๊ธฐ๊ธฐ ๊ฒ€์ถœ (dimension spreading deep neural network based active user detection, DSDNN-AUD)์ด๋ผ๊ณ  ๋ช…๋ช…ํ•˜๋ฉฐ, ๋ณธ ๊ธฐ์ˆ ์˜ ํ•ต์‹ฌ์ ์ธ ํŠน์ง•์€ ์€๋‹‰์ธต์˜ ์ฐจ์›์„ ์†ก์‹  ์ •๋ณด ๋ฒกํ„ฐ์˜ ํฌ๊ธฐ๋ณด๋‹ค ํฌ๊ฒŒ ์„ค์ •ํ•จ์œผ๋กœ์จ ์„œํฌํŠธ ๊ฒ€์ถœ ๋Šฅ๋ ฅ์„ ํ–ฅ์ƒ์‹œํ‚ค๋Š” ๊ฒƒ์ด๋‹ค. ๋ชจ์˜ ์‹คํ—˜ ๊ฒฐ๊ณผ๋ฅผ ํ†ตํ•ด ์ œ์•ˆํ•˜๋Š” ํ™œ์„ฑ ๊ธฐ๊ธฐ ๊ฒ€์ถœ ๊ธฐ์ˆ ์ด ๊ธฐ์กด์˜ ๊ธฐ๋ฒ•๋“ค๋ณด๋‹ค ํ™œ์„ฑ ๊ธฐ๊ธฐ ๊ฒ€์ถœ ์„ฑ๊ณต ํ™•๋ฅ ๊ณผ ์Šค๋ฃจํ’‹ ์„ฑ๋Šฅ ๊ด€์ ์—์„œ ์šฐ์ˆ˜ํ•จ์„ ํ™•์ธํ–ˆ๋‹ค.Massive machine-type communication (mMTC) concerns the access of massive machine-type communication devices to the basestation. To support the massive connectivity, grant-free access and non-orthogonal multiple access (NOMA) have been recently introduced. In the grant-free transmission, each device transmits information without the granting process so that the basestation needs to identify the active devices among all potential devices. This process, called an active user detection (AUD), is a challenging problem in the NOMA-based systems since it is difficult to find out the active devices from the superimposed received signal. An aim of this paper is to propose a new type of AUD scheme suitable for the highly overloaded mMTC, referred to as dimension spreading deep neural network-based AUD (DSDNN-AUD). The key feature of DSDNN-AUD is to set the dimension of hidden layers being larger than the size of a transmit vector to improve the representation quality of the support. Numerical results demonstrate that the proposed AUD scheme outperforms the conventional approaches in both AUD success probability and throughput performance.1 Introduction 2 Grant-free Non-orthogonal Multiple Access 2.1 AUD System Model 2.2 Conventional AUD 3 Support Function Approximation via DNN 3.1 Network Description 3.2 Training Issue in DSDNN 4 Simulations and Discussions 4.1 Simulation Setup 4.2 Simulation Results 5 ConclusionMaste
    • โ€ฆ
    corecore