0% Complete
English
صفحه اصلی
/
سیزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Mode Selection and Resource Allocation in D2D-Enabled MC-NOMA using Matching Theory
نویسندگان :
Alireza Gholamrezaee
1
Hamid Farrokhi
2
Javad Zeraatkar Moghaddam
3
1- University of Birjand
2- University of Birjand
3- University of Birjand
کلمات کلیدی :
D2D communications،matching algorithm،mode selection،MC-NOMA،power allocation،sub-channel allocation
چکیده :
Device-to-Device (D2D) communications and multi-carrier non-orthogonal multiple access (MC-NOMA) are promising techniques for enhancing energy and spectrum efficiency in the 5G cellular network. On the other hand, one of the most critical issues in these techniques is interference. So, in this paper, we study mode selection, sub-channel allocation, and power allocation problems in a underlay D2D-enabled MC-NOMA network, to manage the co-channel interference and increase the spectrum efficiency of the network, while users’ minimum signal-to-interference-plus-noise ratio (SINR) requirements is considered, where users can operate in underlay D2D mode or cellular mode. For this purpose, we formulate the joint problem as a system sum-rate maximization problem. Since the maximization problem is NP-hard, the problem is divided into 1-sub-channel assignment and mode selection problem and 2- power allocation problem. To jointly solve the problem of sub-channel allocation and mode selection, we propose an advanced matching algorithm and use the sequential convex programming technique to solve the power allocation. Finally, to indicate the effectiveness of the proposed algorithms, we present simulation results.
لیست مقالات
لیست مقالات بایگانی شده
GanjNet: Leveraging Network Modeling with Large Language Models for Persian Word Sense Induction
Amir Mohammad Kouyeshpour - Hadi Veisi - Saman Haratizadeh
UltraLearn: Next-Generation CyberSecurity Learning Platform
Saeed Raisi - Saeid Ghasemshirazi - Ghazaleh Shirvani
Human Resource Allocation to the Credit Requirement Process, A Process Mining Approach
Omid Mahdi Ebadati - Mohammad Mehrabioun - Shokoofeh Sadat Hosseini
LuckyAgent2022: A Stop-Learning Multi-Armed Bandit Automated Negotiating Agent
Arash Ebrahimnezhad - Faria Nassiri-Mofakham
AI-based Message Spam Classification Framework for Secure Autonomous Vehicles Communication
Riya Upadhyay - Mili Virani - Lakshit Pathak - Rajesh Gupta - Sudeep Tanwar - Hossein Shahinzadeh
A Biased Random Key Genetic Algorithm for the Dial-a-Ride Problem
ُSomayeh Sohrabi - Koorush Ziarati - Morteza Keshtkaran
A qualitative spoofing detection system based on LSTMs for IoMT
Iman Jafarian - Amirmasoud Sepehrian - Siavash Khorsandi
Binary water stream algorithm: a new meta-heuristic optimization technique
Faezeh Rahimi Sebdani - Mehdi Nasri
A Survey on Utilizing Reinforcement Learning in Wireless Sensor Networks Routing Protocols
Ali Forghani Elah Abadi - Seyedeh Elham Asghari - Sepideh Sharifani - Seyyed Amir Asghari - Mohammadreza Binesh Marvasti
A Novel Approach to Data mining algorithms and IoT based data mining machine learning
Danial Ramezani - Seyed Hossein Siadat
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2