0% Complete
English
صفحه اصلی
/
سیزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Mode Selection and Resource Allocation in D2D-Enabled MC-NOMA using Matching Theory
نویسندگان :
Alireza Gholamrezaee
1
Hamid Farrokhi
2
Javad Zeraatkar Moghaddam
3
1- University of Birjand
2- University of Birjand
3- University of Birjand
کلمات کلیدی :
D2D communications،matching algorithm،mode selection،MC-NOMA،power allocation،sub-channel allocation
چکیده :
Device-to-Device (D2D) communications and multi-carrier non-orthogonal multiple access (MC-NOMA) are promising techniques for enhancing energy and spectrum efficiency in the 5G cellular network. On the other hand, one of the most critical issues in these techniques is interference. So, in this paper, we study mode selection, sub-channel allocation, and power allocation problems in a underlay D2D-enabled MC-NOMA network, to manage the co-channel interference and increase the spectrum efficiency of the network, while users’ minimum signal-to-interference-plus-noise ratio (SINR) requirements is considered, where users can operate in underlay D2D mode or cellular mode. For this purpose, we formulate the joint problem as a system sum-rate maximization problem. Since the maximization problem is NP-hard, the problem is divided into 1-sub-channel assignment and mode selection problem and 2- power allocation problem. To jointly solve the problem of sub-channel allocation and mode selection, we propose an advanced matching algorithm and use the sequential convex programming technique to solve the power allocation. Finally, to indicate the effectiveness of the proposed algorithms, we present simulation results.
لیست مقالات
لیست مقالات بایگانی شده
Classification of Personality Traits on Facebook Using Key Phrase Extraction, Language Models and Machine Learning
Faezeh Safari - Abdolah Chalechale
توسعه مدل مفهومی طراحی فرآیند مدیریت بحران سیلاب از طریق بهینه سازی استفاده از دستگاه های اینترنت اشیاء (IoT Devices) در تصمیم گیری
محمود رسولی - سید احسان ملیحی
Improving Fog Computing Scalability in Software Defined Network using Critical Requests Prediction in IoT
Hajar Ghanbari
جانمایی توزیعشده محتوا برای ذخیرهسازی موقت در شبکههای سلولی کوچک با حضور کاربران مخرب
زهرا رشیدی - دکتر وصال حکمی - حانیه سلمانطاهری زهرا رشیدی - وصال حکمی - حانیه سلمانطاهری -
Securing the Internet of Things via Blockchain-Aided Smart Contracts
S. Mohammadali Zanjani - Hossein Shahinzadeh - Jalal Moradi - Zohreh Rezaei - Bahareh Kaviani-Baghbaderani - Sudeep Tanwar
Towards Provable Privacy Protection in IoT-Health Applications
Samane Sobuti - دکتر سیاوش خرسندی
DynamicEvoStream : خوشه بندی پویای جریان داده تکاملی در زمانهای بیکاری
زهرا عمیقی - مرتضی یوسف صنعتی - میرحسین دزفولیان
Effective Design of Reversible 2×2 Vedic Multiplier With Low Cost
Mojtaba Noorallahzadeh - Mohammad Mosleh - Ali Shahidikia
IT-based and Non-IT-based methods to separate and collect waste
Hoda Harati - Farzad Haghighi-Rad - Reza Yousefi Zenouz
A novel approach audio watermarking based on (GBT,DCT,SVD)
Mahdi Mosleh
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 40.3.1