Data-Aided Active User Detection With False Alarm Correction in Grant-Free Transmission

نویسندگان

چکیده

In most existing grant-free (GF) studies, the two key tasks, namely active user detection (AUD) and payload data decoding, are handled separately. this letter, a two-step data-aided AUD scheme is proposed, initial step false alarm correction respectively. To implement step, an embedded low-density-signature (LDS) based preamble pool constructed. addition, message passing algorithm (MPA) estimators developed. redundant factor graph constructed on set, which MPA employed for decoding. The remaining detected inactive users will be further by corrector with aid of decoded symbols. Simulation results reveal that both decoding performance significantly enhanced more than 1.5 dB at target accuracy $10^{-3}$ compared traditional compressed sensing (CS) counterparts.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data-Aided Secure Massive MIMO Transmission with Active Eavesdropping

In this paper, we study the design of secure communication for time division duplexing multi-cell multi-user massive multiple-input multiple-output (MIMO) systems with active eavesdropping. We assume that the eavesdropper actively attacks the uplink pilot transmission and the uplink data transmission before eavesdropping the downlink data transmission phase of the desired users. We exploit both...

متن کامل

Probability of false alarm estimation in oversampled active sonar systems

The probability of false alarm (Pfa) in active sonar systems is an important system performance measure. This measure is typically estimated by the proportion of alarms to opportunities over some finite window, essentially forming the sample exceedance distribution function (EDF). It is common for sonar systems to be ‘over-sampled’; that is, to have a sampling rate higher than the minimum requi...

متن کامل

Role of smile correction in mineral detection on hyperion data

This work aims to extract the mineralogical constituents of the Lahroud Hyperion scene situated in the NW of Iran. Like the other push-broom sensors, Hyperion images suffer from spectral distortions, namely the smile effect. The corresponding spectral curvature is defined as an across-track wavelength shift from the nominal central wavelength, and alters the pixel spectra. The common “column me...

متن کامل

Reducing the False Alarm Rate of Chinese Character Error Detection and Correction

The main drawback of previous Chinese character error detection systems is the high false alarm rate. To solve this problem, we propose a system that combines a statistic method and template matching to detect Chinese character errors. Error types include pronunciationrelated errors and form-related errors. Possible errors of a character can be collected to form a confusion set. Our system auto...

متن کامل

User-aided data authentication

All classical authentication protocols are based on pre-shared authentic information such as long-term secret keys or a public key infrastructure. However, there are many practical settings, where participants can additionally employ authentic OutOf-Band (OOB) communication, e.g., manual message transfer. In this paper, we study the corresponding user-aided message authentication and key agreem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Wireless Communications Letters

سال: 2023

ISSN: ['2162-2337', '2162-2345']

DOI: https://doi.org/10.1109/lwc.2022.3219414