0% Complete
فارسی
Home
/
سیزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Mode Selection and Resource Allocation in D2D-Enabled MC-NOMA using Matching Theory
Authors :
Alireza Gholamrezaee
1
Hamid Farrokhi
2
Javad Zeraatkar Moghaddam
3
1- University of Birjand
2- University of Birjand
3- University of Birjand
Keywords :
D2D communications،matching algorithm،mode selection،MC-NOMA،power allocation،sub-channel allocation
Abstract :
Device-to-Device (D2D) communications and multi-carrier non-orthogonal multiple access (MC-NOMA) are promising techniques for enhancing energy and spectrum efficiency in the 5G cellular network. On the other hand, one of the most critical issues in these techniques is interference. So, in this paper, we study mode selection, sub-channel allocation, and power allocation problems in a underlay D2D-enabled MC-NOMA network, to manage the co-channel interference and increase the spectrum efficiency of the network, while users’ minimum signal-to-interference-plus-noise ratio (SINR) requirements is considered, where users can operate in underlay D2D mode or cellular mode. For this purpose, we formulate the joint problem as a system sum-rate maximization problem. Since the maximization problem is NP-hard, the problem is divided into 1-sub-channel assignment and mode selection problem and 2- power allocation problem. To jointly solve the problem of sub-channel allocation and mode selection, we propose an advanced matching algorithm and use the sequential convex programming technique to solve the power allocation. Finally, to indicate the effectiveness of the proposed algorithms, we present simulation results.
Papers List
List of archived papers
Integration of Electric Vehicles in Smart Grid using Deep Reinforcement Learning
Farkhondeh Kiaee
Classification and Evaluation of Privacy Preserving Data Mining Methods
Negar Nasiri - Mohammadreza Keyvanpour
An Improved Drone Detection Method Using Deep Learning for Augmentation Detection Speed
Mohammad Bahrami - Seyyed Amir Asghari - Mohammadreza Binesh Marvasti - Sajjad Ansaria
Dealing with Black-hole Attacks in Inter-vehicle Networks Using the Packet Delivery Rate Algorithm
Marzieh Sedighi - Mehdi Hamidkhani - Mostafa Sadeghi
A clonal selection mechanism for load balancing in the cloud computing system
Melika Mosayyebi - Reza Azmi
A qualitative spoofing detection system based on LSTMs for IoMT
Iman Jafarian - Amirmasoud Sepehrian - Siavash Khorsandi
Real-Time EEG-Based Analysis Of Stress-Inducing Stimuli
Mohsen Mahmoudi - Fattaneh Taghiyareh - Yasamin Akhavein - Elnaz Ghorbani
Stock Market Prediction Using Hard and Soft Data Fusion
Saeed Mohammadi Dashtaki - Masoud Alizadeh - Behzad Moshiri
Information Technology Risk Management Model for Remote Control Vehicles
Hamid Reza Naji - Aref Ayati
OENMOP: Loss-Aware 4×4 and 5×5 and Scalable Non‑blocking Optical Switches Designed for Odd-Even Routing Algorithm for Chip-Scale Interconnection Networks
Negin Bagheri Renani - Elham Yaghoubi - Mina Mohammadirad
more
Samin Hamayesh - Version 42.5.2