Catalyzing Random Access at Physical Layer for Internet of Things:An Intelligence Enabled User Signature Code Acquisition Approach
Catalyzing Random Access at Physical Layer for Internet of Things: An Intelligence Enabled User Signature Code Acquisition Approach作者机构:School of Electronic and Information EngineeringHarbin Institute of TechnologyHarbin 1500001China Science and Technology on Communication Networks LaboratoryShijiazhuang 050050China School of Computer Science and TechnologyHarbin Institute of TechnologyHarbin 150001China
出 版 物:《China Communications》 (中国通信(英文版))
年 卷 期:2021年第18卷第10期
页 面:181-192页
核心收录:
学科分类:1305[艺术学-设计学(可授艺术学、工学学位)] 080904[工学-电磁场与微波技术] 0810[工学-信息与通信工程] 13[艺术学] 0809[工学-电子科学与技术(可授工学、理学学位)] 081104[工学-模式识别与智能系统] 08[工学] 0804[工学-仪器科学与技术] 080402[工学-测试计量技术及仪器] 081001[工学-通信与信息系统] 081101[工学-控制理论与控制工程] 0811[工学-控制科学与工程]
基 金:supported in part by Natural Science Foundation of Heilongjiang Province of China under Grant YQ2021F003 in part by the National Natural Science Foundation of China under Grant 61901140 in part by China Postdoctoral Science Foundation Funded Project under Grant 2019M650067 in part by Science and Technology on Communication Networks Laboratory under Grant SCX21641X003
主 题:Internet of Things(IoT) artificial intelligence physical layer cross-entropy random access
摘 要:Exploiting random access for the underlying connectivity provisioning has great potential to incorporate massive machine-type communication(MTC)devices in an Internet of Things(Io T)***,massive access attempts from versatile MTC devices may bring congestion to the IIo T network,thereby hindering service increasing of IIo T *** this paper,an intelligence enabled physical(PHY-)layer user signature code acquisition(USCA)algorithm is proposed to overcome the random access congestion problem with reduced signaling and control *** the proposed scheme,the detector aims at approximating the optimal observation on both active user detection and user data reception by iteratively learning and predicting the convergence of the user signature codes that are in *** crossentropy based low-complexity iterative updating rule is present to guarantee that the proposed USCA algorithm is computational feasible.A closed-form bit error rate(BER)performance analysis is carried out to show the efficiency of the proposed intelligence USCA *** results confirm that the proposed USCA algorithm provides an inherent tradeoff between performance and complexity and allows the detector achieves an approximate optimal performance with a reasonable computational complexity.