CN113056027B - Unlicensed access method in communication - Google Patents

Unlicensed access method in communication Download PDF

Info

Publication number
CN113056027B
CN113056027B CN202110134805.5A CN202110134805A CN113056027B CN 113056027 B CN113056027 B CN 113056027B CN 202110134805 A CN202110134805 A CN 202110134805A CN 113056027 B CN113056027 B CN 113056027B
Authority
CN
China
Prior art keywords
active
area
unlicensed access
user
users
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110134805.5A
Other languages
Chinese (zh)
Other versions
CN113056027A (en
Inventor
王磊
黄博文
郑宝玉
崔景伍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Nanyou Communication Network Industry Research Institute Co ltd
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Nanyou Communication Network Industry Research Institute Co ltd
Nanjing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Nanyou Communication Network Industry Research Institute Co ltd, Nanjing University of Posts and Telecommunications filed Critical Nanjing Nanyou Communication Network Industry Research Institute Co ltd
Priority to CN202110134805.5A priority Critical patent/CN113056027B/en
Publication of CN113056027A publication Critical patent/CN113056027A/en
Application granted granted Critical
Publication of CN113056027B publication Critical patent/CN113056027B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0036Systems modifying transmission characteristics according to link quality, e.g. power backoff arrangements specific to the receiver
    • H04L1/0038Blind format detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0045Arrangements at the receiver end
    • H04L1/0047Decoding adapted to other signal detection operation
    • H04L1/0048Decoding adapted to other signal detection operation in conjunction with detection of multiuser or interfering signals, e.g. iteration between CDMA or MIMO detector and FEC decoder
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/32Carrier systems characterised by combinations of two or more of the types covered by groups H04L27/02, H04L27/10, H04L27/18 or H04L27/26
    • H04L27/34Amplitude- and phase-modulated carrier systems, e.g. quadrature-amplitude modulated carrier systems

Abstract

The invention discloses an unauthorized access method in communication, which comprises the steps that user terminal equipment shares a CTU through a soft SIM card, wherein the CTU means a competitive transmission unit; the user terminal equipment adopts a CTU self-competition mode to strive for uplink resources; and performing unlicensed transmission by using the FQAM modulation scheme by the user terminal equipment, and acquiring the number of active users through the FQAM modulation scheme. The scheme has the advantages of reducing the signaling load of the access network and the core network and having low complexity.

Description

Unlicensed access method in communication
Technical Field
The invention relates to the technical field of mobile communication, in particular to an unauthorized access method in communication.
Background
With the development of networks and communications, 4G has failed to meet the demands of various devices, services, and people for networks, and fifth generation mobile communication systems have been used. The 5G is not a brand new technology, and is used for expanding the service and perfecting other functions on the basis of the 4G. The 5G has the characteristics of super high speed, low power consumption, ultra-low time delay, high reliability and the like. Because of the development of the characteristics, the 5G can meet the technologies of the Internet of things, virtual reality and the like, and truly realizes the prospect of 'everything interconnection'. For wireless communication, a key and fundamental technology developed is the manner in which users access multiple access in a channel. The development of each generation of mobile communication system is not separated from the multiple access technology until the final maturity. FDMA starting from 1G up to OFDM technology of 4G up to now NOMA technology of 5G (Non-orthogonal Multiple Access, NOMA), iterative updating of technology is followed by a constant pursuit of lower latency, more access, more reliable connection, and faster speed.
Compared with 4G, 5G needs to solve the larger capacity requirement of 1000 times and above, large-scale equipment connection of 10-100 times, spectrum efficiency improvement of 5-15 times, and solves the problems of scarcity of spectrum and the like. If the 4G OFDM multiple access technology is also used in 5G, the problems of multipath fading resistance, high sensitivity to carrier frequency offset, large side lobes generated by the adopted baseband waveform and the like can be faced.
Therefore, a new multiple access technology with higher spectrum utilization, stronger access capability and larger system capacity is urgently needed for 5G.
Disclosure of Invention
The invention aims to overcome the defects in the prior art, and provides an unauthorized access method in communication, which can reduce the signaling plane loads of an access network and a core network.
In order to achieve the above purpose, the invention is realized by adopting the following technical scheme:
the invention provides an unauthorized access method in communication, which is characterized by comprising the following steps: the user terminal equipment shares a CTU through a soft SIM card, wherein the CTU means a competitive transmission unit; the user terminal equipment adopts a CTU self-competition mode to strive for uplink resources; and performing unlicensed transmission on the user side equipment by using an FQAM modulation scheme, wherein the FQAM modulation scheme comprises the step of acquiring the number of active users.
Further, the method for obtaining the number of active users includes: the modulation mode and the coding parameters used on the active area of each unlicensed access area are predefined by the base station, and the user and the base station both know the modulation mode and the coding parameters; an expected average number of active subcarriers over an active area for a given number of users is calculated and a number of active subcarriers is estimated based on signals received in the active area.
Further, the unlicensed access method in communication further comprises a preconfigured unlicensed access area, wherein the preconfigured unlicensed access area is composed of a time-frequency block; blind detection of the number of active users is performed on a given unlicensed access area.
Further, the method for performing blind detection on the number of active users in a given unlicensed access area includes: dividing the unlicensed access area into an active area and a data area; FQAM modulation detects whether a user is active in the active region; the data area can adjust the whole area according to the system requirement through a network; dividing available resource elements in the active area into u=n a /M F Each FSK subcarrier subset will represent one FQAM symbol, where N a Representing the number of resource elements in the active area.
Further, when new data transmitted by users arrives, each user selects any unauthorized access area for transmission; the user will use the modulation and coding parameters of the active area in the selected unlicensed access area; if the network is undefined, the user will use the modulation and coding parameters in the data region based on the channel conditions and the required QoS, which refers to the underlying technology that the network can utilize.
Further, the method for performing blind detection on the number of active users in a given unlicensed access area comprises the following steps: the base station will calculate the active sub-carriers a (K, N) over the active area for a given number of users a ,M F ) Is a desired average number of (2); the base station will estimate the number of active subcarriers based on the signal received in the active region.
Further, the method for performing blind detection on the number of active users in a given unlicensed access area comprises the following steps: estimating the number of active sub-carriers from the received noise-interfered user signal and comparing the estimated number of active sub-carriers with the expected number of active sub-carriers alpha (K, N a ,M F ) A comparison is made and the number of active users is estimated accordingly.
Further, transmitting, by the base station, to the user: the location and size of the unlicensed access areas, the size of the active areas in each unlicensed access area, the modulation and coding parameters for each active area, the parameters for open loop power control, the base station may set the modulation and coding parameters for each data area.
Further, the parameters for open loop power control include a path loss compensation coefficient, and an expected received power of the base station.
Compared with the prior art, the invention has the beneficial effects that: the invention can acquire the number of the active users by using the unlicensed transmission of FQAM, thereby better obtaining demodulation.
Drawings
Fig. 1 is a diagram of the definition of a Contention Transmission Unit (CTU) of the present invention;
fig. 2 is a schematic diagram of a CTU access region for uplink contention based transmission according to the present invention;
FIG. 3 is a schematic illustration of the invention with M F =4 subcarriers and M Q FQAM example plot for qam=4;
FIG. 4 is an exemplary diagram of physical resources for unauthorized access in accordance with the present invention;
fig. 5 is a schematic diagram of multi-user unlicensed data transmission according to the present invention;
FIG. 6 is a flow chart of unauthorized access, blind detection of user activity in accordance with the present invention
Fig. 7 is a schematic diagram of the average number of subcarriers in FQAM symbols of the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings. The following examples are only for more clearly illustrating the technical aspects of the present invention, and are not intended to limit the scope of the present invention.
The NOMA is generally thought of as allowing multiple users to use uniform resources at the transmitting end, and separating signals at the receiving end, extracting information of different users. Many NOMA access technologies are proposed by researchers, many related technologies are proposed by the scientific research institute in our country, including multi-user shared multiple access technology (Multiple User Shared Access, MUSA) proposed by the emerging communication, pattern division multiple access technology (Pattern Division Multiple Access, PDMA) proposed by the telecom institute, and sparse code division multiple access technology (Sparse Code Multiple Access, SCMA) proposed by the chinese research institute. Under the premise of the same resource allocation, in a plurality of non-orthogonal multiple access schemes, because the codebook of the SCMA has the characteristic of low density, various frequency modulation devices are additionally arranged, so that the codebook is easier to change, and the SCMA has better performance than MUSA and PDMA links. In addition, SCMA is more suitable for 5G low-delay and high-capacity scenes by virtue of the characteristics of high overload, high throughput and the like.
In addition, the reason why SCMA uses the unlicensed mode to access the base station is that: the essence is based on competition between users, which is more suitable for unlicensed use. For unlicensed uplink transmission, all users are first allocated different SCMA codebooks to complete non-orthogonal multiple access. And then, by utilizing the sparse code word characteristic of the SCMA, the base station can separate the superimposed signals into information of each independent user, so that the uplink transmission capacity of the SCMA is greatly improved.
The process of the unlicensed transmission is: users compete to strive for uplink resources. In this process, the user randomly selects the competing unit for transmission, and thus means for blind detection for multiple users will be involved. For blind detection, idle users in the channel will send a 0 codeword, while active users will send a 1 codeword. The blind detector will perform iterative screening of the list of potential users, progressively screening out active users. In this process, the number of active users determines the user list and the number of iterations performed. It is therefore critical that the number of active users is preferentially obtained for the whole unlicensed process, and the number of active users in the unlicensed region is estimated in view of the characteristics of FQAM modulation.
In order to be able to support unlicensed multiple access for an upstream SCMA system, we have to determine the correct radio resources. As shown in fig. 1, the most basic resources for unlicensed transmission are called Contention Transmission Units (CTUs), which consist of time, frequency, SCMA codebook and pilot. At one time-frequency resource we define codebook J. For each codebook, the L pilot sequences will be correlated with the codebook. Next, lxj is defined as a unique pilot sequence. Thus, in this time-frequency resource, there are a total of l×j Competing Transmission Units (CTUs). According to fig. 2, the specified time-frequency resources of the codebook form the access region of the CTU. The size and number of access areas depends on many factors, such as the number of terminals and applications suitable for unlicensed multiple access. And the dynamic uplink authorization process of the SCMA access mode based on competition is eliminated by utilizing the predefined CTU access area and CTU allocation to the user equipment.
In multicarrier communication, the available bandwidth of the system is divided into N subcarriers (n= {1,.), N }) the user K e K can transmit data to the base station by selecting a subcarrier. In the conventional QAM modulation scheme employed in the current wireless communication system, a user transmits symbols on all subcarriers allocated thereto. On the other hand, M carries q=log 2 FQAM of (M) information bits by a bit pattern of M F One subcarrier is selected from the subcarriers (the number of FSKs is expressed), and M-ary QAM modulation is performed on the subcarrier. Thus, the modulation order of FQAM symbols can be defined by m=m F M Q Represented, and each FQAM symbol is represented by M F The subcarriers. M is shown in FIG. 3 F =4 subcarriers and M Q Example of QAM constellation for=4. It is worth emphasizing that the sub-carriers selected in each transmission time depend on the incoming data, which are not pre-allocated. Let subcarrier d= {1, M F The (i.e., the QAM modulated carrier set for each FSK subcarrier) represents the (u) th subset, where when |d|=m F For transmitting the u-th FQAM symbol, the m-th subcarrier of the subset (the carrier to which the QAM symbol corresponds) will carry one QAM symbol with the remaining subcarriers being zero. Log using input bit vectors 2 (M F ) Selecting subcarrier index mE D u Using other logs 2 (M Q ) Bit selects a transmitted QAM symbol (a e a), where a is a symbol with |a|=m Q QAM constellation of (c). FQAM is proposed for downlink transmission to improve throughput for edge users. The study of FQAM comes mainly from practical applications: the worst-case distribution of additive noise is a gaussian distribution, depending on the channel capacity. By having some subcarriers inactive in FQAM, the inter-cell interference will have a non-gaussian distribution, which will increase the channel capacity. Under interference limited conditions, FQAMThe advantages are even more pronounced, for example for cell edge users where inter-cell interference is dominant.
In the unlicensed access method, a user is transmitted to a base station without a prior scheduling/grant permission of the base station. To achieve unlicensed access and avoid collisions between unlicensed access and legacy timing access, the network will pre-configure unlicensed access areas, as shown in fig. 4. Each unlicensed access area will consist of one time-frequency block. Since users can access the system without prior scheduling, multiple users can select the same time and frequency resources. Thus, the base station does not know in advance the number of users that are actually transmitting and the transmissions that occur over the unlicensed access area. Thus, the base station must perform a blind detection of the number of active/transmitting users over a given unlicensed access area.
In the proposed method, as shown in fig. 5, the unlicensed access area will be divided into two blocks. The first region is called the active region. FQAM modulation is used therein to detect if a user is active. The second area is called the data area, which can be adjusted by the network according to the system requirements, so that the data area is allowed to use any modulation scheme (FQAM, QAM, etc.). But it is worth noting that both areas will carry the user's data. However, the modulation used on the active region will help to blindly detect the number of users transmitting on the unlicensed access region. Furthermore, the unlicensed access area is essentially constituted by only the active area, and the data area is merely performing the regulatory functions of the area. The available resource elements in the active area will be divided into u=n a /M F Each FSK subcarrier subset will represent one FQAM symbol, indexed by u= {1,..a., U }, where N a Representing the number of resource elements (i.e., the number of subchannels or subcarriers) in the active region.
The modulation scheme and coding parameters (i.e., M F 、M Q Code rate, etc.) is predefined by the base station, both the user and the base station know the modulation scheme and the coding parametersA number. To do this, the base station should transmit (e.g., by control broadcasting) to the user: the location and size of the unlicensed access areas, the size of the active areas in each unlicensed access area, the modulation and coding parameters for each active area, the parameters for open loop power control (e.g., path loss compensation coefficients, expected received power of the base station), the modulation and coding parameters for each data area that the base station can set.
When new data transmitted by users arrives, each user selects any unauthorized access area for transmission. The user will then use the modulation and coding parameters of the active area in the selected unlicensed access area. If the network is undefined, the user will use the modulation and coding parameters in the data area based on the channel conditions and the required QoS, qoS (Quality of Service ) refers to a network that can utilize various basic techniques to provide better service capability for the specified network communication, is a security mechanism for the network, and is a technique for solving the problems of network delay and blocking. Among the data transmitted over the active area, there are: modulation and coding information of the data region, its user ID (and other required identification information) and a small amount of data (depending on the active region size and modulation and coding scheme).
In the data transmitted over the data area, its user ID (if not included in the active area) and any other payload data may be included.
In order to blindly detect the number of active users in the unlicensed access area, the base station will perform the following steps:
first, the base station will calculate the active subcarriers α (K, N) over the active area for a given number of users a ,M F ) Is a desired average number of (a) is provided. As will be shown later, the average number of active subcarriers is the number of active areas (N a ) And M F A function of the number of resource elements in the network. Thus, this step can be done once and need not be performed at each transmission.
The base station will then estimate the number of active sub-carriers (β) based on the signals received in the active area. As in FQAM, each user will activate one FQAM symbol and the number of active resource elements will depend on the number of transmitting users on the same unlicensed access area.
If there is no signal to send on a given subcarrier, the base station should receive gaussian noise (in some cases inter-cell interference) only on that subcarrier, which has a probability density function:
wherein is sigma 2 Power noise per subcarrier.
On the other hand, if there is a transmission on a subcarrier (from one or more users), the base station will receive the user signal that is interfered with by the noise. Conventional energy detection methods may be used to detect active subcarriers. Once the number of active subcarriers (β) is estimated, the base station will match it with the expected number of active subcarriers α (K, N a ,M F ) A comparison is made and the number of active users is estimated accordingly.
Estimated number of usersWill be passed to a detection and decoding block (as shown in fig. 6) to retrieve user data on the active area. For example, if the base station estimates that only one user is active, it will perform single user detection and channel decoding on one user. However, if the base station detects that both users are in an active state, it will perform multi-user detection and then channel decode both users. The base station uses the information retrieved from the active area to detect and decode user data on the data area. If the base station successfully retrieves the IDs of all users from the active area, it will be able to send out: 1) Ack+id for each user (whose data has been successfully decoded), or 2) nack+id for each user (whose data has not been successfully decoded).
We provide active subcarriers a (K, N) over the active area for a given number of users a ,M F ) Comprises the steps of: first we get the average number of active subcarriers for all FQAM symbols and extend them to N by simple scaling a Resource elements. Let n denote the number of active subcarriers in one FQAM symbol, i.e. M F Number of subsets of subcarriers. Since each FQAM symbol is composed of M F Subcarrier composition, M which can be activated thereby F The sub-carriers do not exceed M F Furthermore, the number of active subcarriers cannot be greater than the number of active users (users transmitting on the same subset of subcarriers). Thus, depending on the number of users using the subset of subcarriers, there may be 1 to min (K, M F ) Active subcarriers of 1.ltoreq.n.ltoreq.min (K, M) F )。
The general formula for the average number of active subcarriers per FQAM symbol is as follows:
wherein p (n|K, M) F ) Is M assuming that K users are on the same subcarrier F The probability of transmission on the subset, i.e. the probability that one FQAM symbol has n active subcarriers.
For the case where only one user is transmitting (k=1), we will have a probability of 1, i.e. using only one M F The subcarriers (i.e., p (n= 1|k =1, m F =1)), therefore the expected average number of active subcarriers will be α (k=1, m) F ) =1. For the case of two users, the probability of having one subcarrier active is given by the probability that the two users select the same subcarrier. Since the probability of the user selecting the subcarrier is 1/M F And M is present F Subcarriers, the probability will therefore be:
similarly, the number of active states for two subcarriers, n=2, is equal to the probability that one user selects a subcarrier and the second user selects a different subcarrier:
thus, for the two user case, the average number of active subcarriers per FQAM symbol would be:
for different numbers of users, the same derivation steps can be followed to derive the average number of active subcarriers for each FQAM symbol, we provide the following examples (assuming M F ≥4):
FIG. 7 shows M F The expected average number of active subcarriers for=4 and 8 relative to the number of active users. By using N a /M F Scaling (representing the number of FQAM symbols in the active region) to summarize the average number of active subcarriers from one FQAM symbol to N a A large active area. It is worth mentioning that the average number of active sub-carriers may be calculated offline once and need not be performed at each transmission time. In additionA higher number of active users may not be of practical significance because even if the number of active users is determined, it is less likely that the transmitted data will be successfully detected (due to the increase in inter-user interference).
Although embodiments of the present invention have been shown and described above, it will be understood that the above embodiments are illustrative and not to be construed as limiting the invention, and that variations, modifications, alternatives, and variations may be made in the above embodiments by those skilled in the art without departing from the spirit and principles of the invention.

Claims (8)

1. An unlicensed access method in communication, comprising the steps of:
the user terminal equipment shares a CTU through a soft SIM card, wherein the CTU means a competitive transmission unit;
the user terminal equipment adopts a CTU self-competition mode to strive for uplink resources;
performing unlicensed transmission by using a FQAM modulation scheme by using a user terminal device, where the FQAM modulation scheme includes obtaining the number of active users;
the method for acquiring the number of active users comprises the following steps:
the modulation mode and the coding parameters used on the active area of each unlicensed access area are predefined by the base station, and the user and the base station both know the modulation mode and the coding parameters;
an expected average number of active subcarriers over an active area for a given number of users is calculated and a number of active subcarriers is estimated based on signals received in the active area.
2. The method of unlicensed access in communication according to claim 1, further comprising pre-configuring an unlicensed access area, the pre-configuring an unlicensed access area being comprised of one time-frequency block; blind detection of the number of active users is performed on a given unlicensed access area.
3. The method of unlicensed access in communications according to claim 2, wherein the method of blind detection of the number of active users over a given unlicensed access area comprises:
dividing the unlicensed access area into an active area and a data area; detecting whether a user is active in the active area through FQAM modulation; the data area adjusts the whole area according to the system requirement through a network;
dividing available resource elements in the active area into u=n a /M F Each FSK subcarrier subset will represent one FQAM symbol, where N a Representing the number of resource elements in an active region, M F Indicating the number of FSKs.
4. A method of unlicensed access in a communication according to claim 3, wherein each user will select any unlicensed access area for transmission when new data arrives for transmission by the user;
the user will use the modulation and coding parameters of the active area in the selected unlicensed access area; if the network is undefined, the user will use the modulation and coding parameters in the data region based on the channel conditions and the required QoS, which refers to the quality of service.
5. The method of unlicensed access in communications according to claim 4, wherein the method of blind detection of the number of active users over a given unlicensed access area comprises the steps of:
the base station will calculate the active sub-carriers a (K, N) over the active area for a given number of users a ,M F ) Is a desired average number of (2);
the base station will estimate the number of active subcarriers based on the signal received in the active region.
6. The method of unlicensed access in communications according to claim 5, wherein the method of blind detection of the number of active users over a given unlicensed access area comprises the steps of:
estimating the number of active sub-carriers from the received noise-interfered user signal and comparing the estimated number of active sub-carriers with the expected number of active sub-carriers alpha (K, N a ,M F ) A comparison is made and the number of active users is estimated accordingly.
7. The unlicensed access method in communication according to claim 6, wherein the transmission to the user is performed by the base station: the location and size of the unlicensed access areas, the size of the active areas in each unlicensed access area, the modulation and coding parameters for each active area, the parameters for open loop power control, the base station setting the modulation and coding parameters for each data area.
8. The unlicensed access method in communication according to claim 7, wherein the parameters for open loop power control include a path loss compensation coefficient, an expected received power of a base station.
CN202110134805.5A 2021-02-01 2021-02-01 Unlicensed access method in communication Active CN113056027B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110134805.5A CN113056027B (en) 2021-02-01 2021-02-01 Unlicensed access method in communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110134805.5A CN113056027B (en) 2021-02-01 2021-02-01 Unlicensed access method in communication

Publications (2)

Publication Number Publication Date
CN113056027A CN113056027A (en) 2021-06-29
CN113056027B true CN113056027B (en) 2023-11-17

Family

ID=76508429

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110134805.5A Active CN113056027B (en) 2021-02-01 2021-02-01 Unlicensed access method in communication

Country Status (1)

Country Link
CN (1) CN113056027B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB201621509D0 (en) * 2016-12-16 2017-02-01 Samsung Electronics Co Ltd A method for detecting a number of active users in a communication system
CN107852722A (en) * 2015-07-27 2018-03-27 华为技术有限公司 Exempt to authorize the link circuit self-adapting in multiple access system
CN108811143A (en) * 2018-05-18 2018-11-13 哈尔滨工业大学 Uplink based on user activity is exempted to authorize the CTU distribution methods of SCMA

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10028302B2 (en) * 2013-03-08 2018-07-17 Huawei Technologies Co., Ltd. System and method for uplink grant-free transmission scheme
US9750056B2 (en) * 2015-01-27 2017-08-29 Huawei Technologies Co., Ltd. System and method for transmission in a grant-free uplink transmission scheme

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107852722A (en) * 2015-07-27 2018-03-27 华为技术有限公司 Exempt to authorize the link circuit self-adapting in multiple access system
GB201621509D0 (en) * 2016-12-16 2017-02-01 Samsung Electronics Co Ltd A method for detecting a number of active users in a communication system
CN108811143A (en) * 2018-05-18 2018-11-13 哈尔滨工业大学 Uplink based on user activity is exempted to authorize the CTU distribution methods of SCMA

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
韩玉玺.高阶SCMA系统关键技术研究.《中国优秀博士学位论文全文数据库 信息科技辑》.2019,全文. *

Also Published As

Publication number Publication date
CN113056027A (en) 2021-06-29

Similar Documents

Publication Publication Date Title
CN107786482B (en) Multi-terminal information receiving and sending method based on grid mapping and corresponding equipment
CN108289018B (en) Method and equipment for transmitting reference signal
CN1674572B (en) Apparatus and method for sub-carrier allocation in orthogonal frequency division multiplexing (OFDM) communication system
CN105530217B (en) The signal of GFDM systems based on weighted score Fourier transformation emits and method of reseptance
KR100539925B1 (en) Apparatus and method for sub-carrier alocation in ofdm system
KR100967774B1 (en) Method and apparatus for control channel transmission and reception
US20050111492A1 (en) Channel estimation apparatus and method for adaptive channel allocation in an orthogonal frequency division multiple access system
KR101622955B1 (en) Apparatus and method for transmitting and receiving control information in multiple input multiple output system
CN101383793B (en) Method, apparatus and system for signal transmission and channel estimation
CN108260215B (en) Low-density code NOMA (non-orthogonal multiple access) channel condition optimization resource allocation method
Abebe et al. Grant-free uplink transmission with multi-codebook-based sparse code multiple access (MC-SCMA)
CN108990142A (en) A kind of transmission method of the multicarrier non-orthogonal multiple access system of low signaling overheads
CN112911711A (en) Resource allocation method of multi-carrier NOMA system
CN110234160A (en) A kind of downlink transmission method suitable for non-orthogonal multiple access system
CN103780528A (en) Communication system and signal sending method and apparatus as well as signal receiving method and apparatus thereof
CN111600826A (en) Non-orthogonal access-transmission communication method in communication network
CN103152125B (en) The blind checking method of control information in LTE system and device
Zhong et al. Bit error rate analysis of a MIMO-generalized frequency division multiplexing scheme for 5th generation cellular systems
CN109167748B (en) Partial maximum likelihood detection method based on energy sorting
CN104780130B (en) A kind of improved SIM OFDM based on pilot tone channel estimation methods
CN106788893A (en) A kind of sparse Interleave Division Multiple Access method
CN113056027B (en) Unlicensed access method in communication
EP2234361A1 (en) Ordered successive cancellation in MIMO wireless communication systems
WO2012019450A1 (en) Pairing method for multi-user multiple input multiple output system, data transmission method and devices thereof
US10050820B2 (en) Apparatus and method for modulation/demodulation for transmitting and receiving signal in wireless communication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant