Multiple address access method and device for signals in mobile communication
A technology of mobile communication and access method, which is applied in the field of communication, and can solve the problems of short check matrix, high computational complexity, and lack of sparsity.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0121] Embodiment 1: The check matrix is a regular small-dimensional matrix
[0122] The scheme adopts the traditional SCMA method, and the simulation adopts figure 2 As shown in the factor diagram, there are J=6 users at the sending end. Assuming that there is a near-far effect, the 6 users are divided into two groups, each group of three users, the number of subcarriers K=4, the overload rate is 150%, and the corresponding rules The check matrix is as in formula (8), with row degree 3 and column degree 2.
[0123]
[0124] The codebook used in the simulation is a 4-point codebook constructed according to the traditional SCMA codebook design. The two non-zero parts of each layer of data stream are as follows: Picture 9 Shown.
Example Embodiment
[0125] Embodiment 2: The check matrix is a regular low-density matrix
[0126] In view of the small dimension of the traditional SCMA check matrix, the present invention expands the dimension of the check matrix. The simulation adopts the number of users as 6, the length of each user’s coding information is 96, the code rate R=1 / 2, and QPSK modulation is adopted. , The number of symbols corresponding to each user is 96, use Representing the 96 symbol vectors of the j-th user, there are a total of 576 symbols before spreading, and these symbols are spread and superimposed on 384 carriers. The check matrix corresponding to the above process corresponds to a row degree of 3 and a column degree of 2.
Example Embodiment
[0127] Embodiment 3: The check matrix is an irregular low-density matrix
[0128] When there is a near-far effect, the present invention considers constructing an irregular check matrix to realize unequal protection of remote users, thereby improving the overall performance of the system. When the distance effect exists, the present invention still expands the dimension of the check matrix. The simulation adopts the number of users as 6, the length of each user's coding information is 96, the code rate R=1 / 2, and the QPSK modulation is adopted, then each user corresponds to The number of symbols is 96, use Representing the 96 symbol vectors of the j-th user, there are a total of 576 symbols before spreading, and then these symbols are spread and superimposed on 384 carriers. Corresponding irregular check matrix, row degree ρ 4 =0.5, ρ 5 =0.5, column degree is λ 2 =0.5, λ 4 =0.5, ρ i Represents the ratio of row degree i, λ i Indicates the ratio of column degree i.
[0129] Pict...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap