• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Design Framework of Unsourced Multiple Access for 6G Massive IoT

    2024-02-29 10:33:42ChunlinYanSiyingLyuSenWangYuhongHuangXiaodongXu
    China Communications 2024年1期

    Chunlin Yan ,Siying Lyu ,Sen Wang ,Yuhong Huang ,Xiaodong Xu

    1 China Mobile Communication Research Institute,Beijing 100053,China

    2 ZGC Institute of Ubiquitous-X Innovation and Applications,Beijing 100080,China

    3 State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China

    Abstract: In this paper,ambient IoT is used as a typical use case of massive connections for the sixth generation(6G)mobile communications where we derive the performance requirements to facilitate the evaluation of technical solutions.A rather complete design of unsourced multiple access is proposed in which two key parts:a compressed sensing module for active user detection,and a sparse interleaver-division multiple access (SIDMA) module are simulated side by side on a same platform at balanced signal to noise ratio(SNR)operating points.With a proper combination of compressed sensing matrix,a convolutional encoder,receiver algorithms,the simulated performance results appear superior to the state-of-the-art benchmark,yet with relatively less complicated processing.

    Keywords: channel coding;compressed sensing;massive Internet-of-Things (IoT);sparse interleaverdivision multiple access (SIDMA);the sixth generation(6G)mobile communications;unsourced multiple access

    I.INTRODUCTION

    Multiple access is one of the core technologies of wireless communications and has enormous impact on the system capacity and network performance.From the first generation (1G) to the fifth generation (5G)mobile wireless communication systems,orthogonal multiple access (OMA) has been the primary access scheme especially for enhanced mobile broadband(eMBB) in 4G and 5G systems with large package size.For eMBB,control signalling such as scheduling grant can facilitate the link adaptation which is crucial for the data throughput.Control signaling also includes various messages exchanged during the initial access to wake up terminals from idle state to connected state.Due to the small percentage of control information compared to the large packet size of eMBB and the continuous traffic flows,the benefit of control signaling overwhelms its overhead.Hence,OMA works reasonably well for eMBB where the number of connected terminals is not large in general.

    For the sixth generation (6G) networks,it is envisioned that the number of connections for massive Internet-of-Things (IoT) will be 10 ?100 times more than that of 5G[1].The traffics of massive IoT are mainly small data packages sporadically generated.One typical scenario is the Ambient IoT currently being studied in the 3rd Generation Partnership Project (3GPP)[2].The traditional grant-based transmission of OMA is no longer suitable due to the excessive control overhead,access delays and device power consumption associated with the multi-step random access procedure and link adaptation.Therefore,a lightly-controlled transmission without connectionsetup or dynamic link adaptation is desirable.

    To reduce signaling overhead,delay and terminal consumption,grant-free transmission was introduced which has two types:1)contention-free where the data is transmitted using pre-allocated signatures such as spreading sequences,interleaver patterns,scrambling codes,preamble,etc;2) contention-based where signatures are randomly selected by users.In the study on 5G multiple access[3][4],the contention-free type of grant-free was studied more thoroughly.

    Considering the much denser connections of 6G massive IoT,contention-based grant-free seems more suitable as it can more efficiently handle the signature collision problem.Recently there has been some breakthrough in information-theoretic analysis of contention-based transmission which is also called unsourced multiple access[5][6].Drastically different from the traditional Shannon formula,Polyanskiy’s team at Massachusetts Institute of Technology (MIT)proved that the capacity bound of unsourced multiple access is much higher than that of OMA [7].Their theoretical work also reveals the potential of joint processing across multiple users for short-length blocks,which cannot be achieved by OMA where each user’s data is individually processed.

    Inspired by the finding in [7],several unsourced multiple access schemes were proposed for massive IoT scenarios[8–10].The BCH/forward error correction (FEC) cascaded scheme [11] can tackle the collision and noise problems in Gaussian multiple access channel(GMAC)channel by using an BCH outer code and an inner forward error connection(FEC)code,respectively.In tree search-based compressed sensing(CS) approaches [12],the transmission code word is mapped to columns of CS matrix,e.g.,direct mapping of information bits to the symbol vector of multiple access codes.In[13]a sparse Kronecker-product coding scheme is proposed for unsourced multiple access.The data of each active user is encoded as the Kronecker product of two component codewords with one being sparse and the other being forward-errorcorrection coded.Its performance is very close to the random coding bound.In [14] a data only transmission scheme was proposed where a blind equalization performs the channel estimation without relying on reference signals.In CS preamble coding+sparse interleaver-division multiple access (IDMA)coding scheme [15],CS is employed for active user detection and channel estimation,while an iterative receiver is used for multi-user detection.

    In sparse code multiple access(SCMA)[16],zeros are inserted in the codewords to reduce the cross-user interference and the complexity of maximum likelihood(ML)receiver.In[17],Reed-Muller codes based CS was proposed where multi-slot transmission strategy is used for random access.In[18][19]low-density parity check (LDPC) code is employed as channel coding scheme for sparse-IDMA where the multi-user detector is of belief propagation (BP) type.In addition,multi-slot transmission is used to reduce the computational complexity.Compared to traditional IDMA which typically allows 10 ?20 users to transmit simultaneously,sparse-IDMA can support much larger scale of superposition transmissions,e.g.,200 ?300 users.Also,sparse-IDMA relies on channel code optimization to improve the performance,whereas in 5G IDMA study the channel codes were limited to New Radio(NR)LDPC.

    The main contributions are summarized below.

    1.Performance requirements are derived from a typical application scenario of ambient IoT which can guide key parameter setting of unsourced multiple access,such as information block length,code rate of channel encoder,number of repetitions,size of CS matrix,etc.

    2.A complete design is proposed where the CS and multi-user detection work together,e.g.,the results of CS for active user detection and channel estimation would be used for multi-user detection where collision probability is also considered.

    3.Elementary signal estimator (ESE),instead of joint detection with belief-propagation,is used for multi-user detection of sparse-IDMA.In addition,smaller size of FFT-type compressed sensing matrix is used,resulting in better estimation of channel and active user detection.Hence,an overall performance closer to the capacity bound for unsourced multiple access is achieved,yet with reduced computational complexity.

    4.The impact of channel coding scheme on the performance of sparse-IDMA is assessed via evolution functions.Compared to LDPC,the potential of convolutional codes in sparse-IDMA is clearly shown and verified by the simulation results.

    5.Realistic channel estimation and active user detection are carried out for sparse-IDMA and the performance degradation compared to the ideal channel estimation is shown.

    II.THE REQUIREMENTS FROM AMBIENT IOT

    Originally from Radio frequency identification(RFID) technology,ambient IoT requires no power or very little power,and may fulfill the vision of“100 billion interconnection”.Ambient IoT will adopt a cellular architecture that supports a larger scale expansion of system capabilities.The study on deployment scenarios of ambient IoT is a hot topic in 3GPP R19 System Aspect Working Group 1 (SA1).A total of 32 use cases have been identified,including typical indoor cases such as warehousing,medical,manufacturing retail,home furnishings,and outdoor cases such as power,supply chain distribution,airport,municipal,and animal husbandry.Based on the characteristics and performance requirements,these use cases can be grouped into four categories: inventory,environmental sensing,terminal positioning,and control commands.Among them,the inventory category is the most challenging in terms of connection density and thus will be the focus in the following analysis.Some key performance requirements of inventory category are listed in Table 1.

    Table 1. Key performance requirements.

    According to Table 1,the communication range of an indoor reader is 30 m.In a cellular set up,it means that the cell radius is about 30 m.Hence,the coverage area of a cell(or a reader)is about 2800 square meters.Considering 1.5 million devices per square kilometer,there are roughly 4200 devices in an cell.Although not all of these 4200 devices would transmit simultaneously,up to 100 devices of them would access the network per second when the reader should be able to process in one second.In a typical indoor inventory scenario,the floor area would be around 600,000 square meters.This implies that over two hundred readers (cells) would be deployed where significant inter-cell interference is expected.To overcome this issue,cell-free access can be considered in which each cell (reader) would try to decode devices in neighbor cells.A rule of thumb is that contributions of 3 times of devices in a cell would count for most of uplink received power.Hence,each cell(reader)roughly needsto decode up to 300 devices’data per second.

    Similar to RFID,ambient IoT needs to have good coverage.While 30 m does not seem long,the requirement can be quite challenging considering the extremely low transmit power to maximize the battery life.That is why the typical deployment of ambient IoT is in low band,e.g.,800 MHz to ensure small pathloss,together with narrow bandwidth,e.g,smaller than 200 kHz to ensure the enough power spectral density.Because of the low data rate (e.g.,less than 1 kbps),binary phase shift keying(BPSK)or quadrature phase shift keying(QPSK)would be sufficient,allowing more efficient amplifiers and better coverage.

    Low-band operation also means limited number of antennas on a reader,e.g.,2 or 4 may be typical.Hence,antenna technology would play minor role in improving the performance of ambient IoT,as opposed to eMBB operating in higher bands.It is also seen from Table 1 that the mobility speed of devices in inventory category is less than 6 km/h.This implies that at 800 MHz operating band,the small-scale fading would be slow-varying.

    III.AN UNSOURCED SPARSE SUPERPOSITION SCHEME FOR AMBIENT IOT

    3.1 Basic Building Blocks of Unsourced Multiple Access

    Figure 1 and Figure 2 show the transmitter(of a user)and the multi-user receiver,respectively,for unsourced multiple access using CS and sparse-IDMA.LetKtotandKabe the total number of users and the number of active users,respectively,whereKa?Ktot..In light of the performance requirements discussed in previous section,Ktot≤4200×3=12600,andKa≤300.Each active user hasBinformation bits to send.To facilitate the comparison with results in literature,in this paper we setB=100 which is within the value of 256 bits in Table 1.A user’s information bits are first partitioned into two segments e.g.B=Bp+Bd.The first segment is to generate preambles for CS of bit lengthBp.The second segment is to generate modulation symbols for multi-user (MU) detection of bit lengthBd.There are two approaches to transmit the second segment: single-slot vs.multi-slot.In the single-slot approach,all active users transmit simultaneously in a relatively long slot.In the multi-slot approach,each user would pick one of the short slots for transmission.

    Figure 1. Transmitter for unsourced multiple access.

    Figure 2. Receiver for unsourced multiple access.

    By using compressed sensing matrix and channel coding,repetition,zero padding,the information bits will be mapped toNtchannel uses (e.g.radio resources) for transmission.The value ofNtdepends on the time duration and bandwidth.According to Table 1,the transmission duration is typically no greater than 1 second and the bandwidth is less than 200 kHz.In the simulation evaluation of this paper,Nt=30000 is assumed.In the case of BPSK modulation and 200 kHz system bandwidth,the transmission duration is 0.15 second which meets the requirement.Based on the previous discussion,the channel can be assumed constant within 0.15 second when the mobility speed is below 6 km/h and the operating band is 800 MHz.

    It should be emphasized that the encoding process here is independent of a user’s identity (which is exactly the meaning of unsourced multiple access).The information vectoru(k)of thek-th active user,k∈{1,2,...,Ka} is split into two segments:u(k)=.The frist segmentup(k),whose length isBp,is used to encode the CS part.TheBd-bit vector that consists the rest of the information is used to modulate the multi-user part,whereBp?Bd,andBd=B?Bp.The lengths of the encoded CS and MU parts equalNpandNdrespectively,whereNp+Nd=Nt.Ntis the total message length for each user.

    For the CS part of the encoding process,the sensing matrixFpartialof sizeM×Nis listed below(elements in each column are normalized to meet the power constraint)

    Usually,M<N.The received signal of CS part can represented as

    wherexp∈CN×1is aKa-sparse signal vector whose non-zero entries correspond to the channels of active users to be estimated.In the case of GMAC,non-zero entries ofxpare 1.yp∈CM×1is the received signal,andn~CN(0,σ2I)is the complex Gaussian noise.M=Npwhich is essentially the spreading length of the preamble.N=which is the total number of permutations ofBpbits.Fpartialconsists ofMrandomly selected and reordered rows of the unitary discrete Fourier Transform (DFT) matrixF∈CN×N.The entries of the sparse signalxpis assumed to be independently identically distributed (i.i.d.),following Bernoulli-Gaussian distribution.

    The partial DFT matrix in Eq.(2)can be rewritten as

    whereSis a selection matrix consisting ofMrandomly selected and reordered rows of theN×Nidentity matrix.The above row selection involves a binary to decimal conversion and bit interleaving,e.g.,the row of the decimal index corresponding to the interleaved binary sequenceup(k)would be selected.By defining

    together with Eq.(3),the system model in Eq.(2) can be rewritten as

    The data partxd,kis generated by encoding the second segment,followed by repetition,zeropadding and interleaving.More specifically,is encoded with code rate ofRto obtain a (Bd/R)-bit vectorvd,k.Each bit in the vectorvd,kis then repeated several times,and then zero-padded to obtain a vectorxd,kof lengthNd.The repetition and interleaving pattern ofk-th user are determined by the first segmentup(k).Hence,the receiver can obtain the interleaver and repetition information about thek-th user after decoding the first segment.WhenKaactive users transmit simultaneously,the received signal in the data part can be represented as:

    For CS receiver in Figure 2,turbo CS algorithm is employed for iterative detection.The algorithm contains two key modules: a minimum mean square error (MMSE) estimator and a MMSE denoiser [20–22].When multiple receiver antennas are employed,signals from different antennas can be combined by using spatial MMSE or maximal ratio combination(MRC) operations.For the multi-user detection part(e.g.,the second segment of data),another iterative algorithm is used where the extrinsic information propagates between multi-user signal estimator and channel decoder.More details will be elaborated in the next sub-section.

    3.2 Signal Detection for CS

    Besides MMSE estimator and MMSE denoiser,auxiliary modules in CS receiver include Fast Fourier Transform (FFT) and Inverse fast Fourier Transform(IFFT)for the signal transformation[20]as shown in the upper part of Figure 2.The Turbo CS algorithm can be described below.

    CS matrix has two key parameters:MandN.Mis the number of rows which corresponds to the physical resources for the preamble.Larger value ofMmeans lower signal-to-noise ratio (SNR) operating point for CS.Nis the number of columns in the sensing matrix,which is essentially the number of CS (or spreading)sequences to be selected by users.For unsourced multiple access,larger value ofNmeans lower probability of signature collisions.From hardware implementation perspective,Ncannot be too large.Otherwise,the memory requirement and the processing complexity would be infeasible in practical engineering.On the other hand,Nneeds be sufficiently large to ensure low collision probability.

    WhenKa=300 andNp=212,the probability of collision-free for each user can be calculated by=0.9294.This means the collision probability is about 0.07 which cannot meet the requirement ofPeless than 0.05.To reduce the collision probability,larger size of compressed sensing matrix is needed which makes the computational complexity less affordable.Thus new paradigm for compress sensing matrix design and its detection is an important research topic.

    3.3 Multi-User Detection for Unsourced Multiple Access

    Iterative detection is typically used for unsourced multiple access.Here ESE can be applied for multi-user detection in unsourced multiple access [23–25].Figure 3 shows the transmitter and receiver for IDMA using ESE.

    Figure 3. Transmitter and receiver for IDMA.

    For simplicity,the subscriptdis omitted in this subsection.Hereck={ck(j)} andxk={xk(j)} denote the bits before and after the interleaving.The elements ofck(j)andxk(j)are either 1 or-1.The received signal can be represented asr(j)=+n(j),j=1,2,...,J.Herehkis the channel coefficient of thek-th user,n(j) is the additive white gaussian(AWGN)with zero-mean and varianceσ2=N0/2,andJis the length of the frame,e.g.,J=Ndin single-slot approach.For simplicity,GMAC channel is considered.Hencehk=1.

    The received signal can be rewritten as[23]

    where

    denotes the interference part.The mean and variance ofxk(j),denoted asE(xk(j)) and Var(xk(j)),respectively,can be calculated according to the central limit theorem.

    The initialization is done by settingE(xk(j))=0 and Var(xk(j))=1.The soft-input information for the channel decoder can be calculated as

    The extrinsic information can be calculated as

    This updated prior information will be used as the input in the next iteration.The above iterative detection is summarized as below.

    1)Calculation of the means and variances of interference by using Eq.(9)and Eq.(10).

    2)Calculation of the soft information using Eq.(11).

    3) Carrying out the decoding (DEC) function to generate.

    4)Calculation of the means and variances of the user’s signal using Eq.(13)and Eq.(14).

    For the receiver with ESE+soft decoder,the performance can be analyzed by plotting the transfer functions betweenf(γ)andg(v)which can be calculated as below[26]for GMAC.

    HereKis the average number of users whose nonzero symbols occupying the same resource.vis the mean of Var(xk(j)) andtis the index of iterations.γis the signal-to-interference-plus-noise ratio at the output of the detector and also the post-SNR at the input to the decoder.For sparse-IDMA a large number of zeros are padded,thus the multi-user interference can be diluted sufficiently.For example,the average number of users multiplexed on the same resource is around 6 forKa=250.

    If the curves off(γ) andg(v) do not cross,the iterative detection can converge.However,when there is crossing,the iterative detection will be stuck at the crossing point.

    It is noted that in[15]a belief propagation(BP)type of multi-user detection is used for signal detection ofKausers which tends to have high computation complexity.

    3.4 Channel Coding Aspect and Detection Complexity

    As a very preliminary study,performances of sparse-IDMA with LDPC codes of 5G NR and convolutional codes(CC)have been evaluated.The rationale of considering convolutional codes is as follows.Unsourced multiple access is featured by short-length packets.e.g.,100 bits where convolutional codes may have advantages over random codes such as turbo or LDPC which typically rely on long interleavers or large parity check matrices to perform well.For unsourced multiple access,decoding and multi-user detection need to cooperate closely,e.g.,their transfer functions need to match each other,so that the iteration can converge to a satisfying point.Powerful channel codes for singleuser case may not fare well in this case.Note that Polar codes are not considered in this paper due to the incompatibility to iterative receiver.Although softoutput decoding for Polar codes does exist,significant performance degradation is observed compared with conventional decoding schemes of Polar codes[27].

    In [14] a joint detection is applied for the signal detection of sparse-IDMA whose complexity tends to be significantly higher than that of ESE.Taking the example of 28000 samples for data transmission,the complexity of the multi-user detection (compared to ESE)is proportional to the number of inner iterations(within BP) and the mean of the column weight.ForKa=250 the mean of column weight(average number of users occupying the same resource)is around 6,and when the number of iterations is 5,the total complexity of BP for sparse-IDMA is about 30 times of that of ESE.WhenKais a small value,the complexity of sparse-IDMA using BP may be reduced (when the mean of column weight is 2),however,it is still ten times of that of ESE detector.

    IV.PRELIMINARY EVALUATIONS

    Some key simulation parameters are listed in Table 2.BPSK modulation is used.The channel is AWGN.The channel code rateR=1/2 for both LDPC and convolutional codes.The code length (physical resources)of CS isNp=2000.The physical resources of multiuser detection isNd=28000.Hence,the total physical resources isNt=30000.

    Table 2. Simulation parameters.

    In Figure 4 the detection error probability vs.chip level SNR is illustrated forKa=300 by using Turbo CS algorithm with different values of FFT size.The required SNRs for detection error probability of 0.01 are -16.2,-12.8,and -9.5 dB for FFT size values of 4096,8192 and 16384,respectively.Thus larger FFT size results in higher probability of detection error.By reducing the FFT size the required SNR can be reduced significantly.To improve the performance of sparse-IDMA,a CS matrix with a small FFT size is preferred.

    Figure 4. Performance of CS with different FFT sizes.

    In Figure 5,the evolution functions of LDPC and convolutional codes for sparse-IDMA are compared atEb/N0=3 dB.The convergence of iterative detection can be characterized by the interplay betweenf(γ)andg(v).WhenKais 250 and 200,the value ofKcan be regarded as 6 and 4,respectively.No crossing is observed betweenf(γ) for CC andg(v) withK=6.This implies that sparse-IDMA using convolutional codes can reach convergence atγ=?1.77 dB.However,crossing point is observed betweenf(γ)for LDPC andg(v) wherevis about 1.This implies that sparse-IDMA by using LDPC cannot converge.By reducing the value ofKfrom 6 to 4,sparse-IDMA using LDPC can reach convergence as Figure 5 shows.

    Figure 5. Evolution functions of LDPC codes based and convolutional codes based for sparse-IDMA system. is set to-1.77 dB,corresponding to Eb/N0=3dB.

    Figure 6 shows the estimated channel for different cases.The left figure is for Case I and the right figure is for Case II.Parameters for these cases are illustrated in Table 3.Here SNR1is the SNR defined only by CS signals and SNR2is the SNR defined only by sparse-IDMA signals.For Case I,SNR1is not high.Thus the active user detection and channel estimation are not very accurate.The number of detected active users is 249.And the smallest value of estimated channel is about 0.2.SNR1in Case II is higher,leading to the improved performance of active user detection and channel estimation.The number of detected active users is 250 and the smallest value of estimated channel is about 0.6.

    Figure 6. Real channel estimation and real active user detection for Ka=250.

    Table 3. Parameters for case I,II and III with FFT size 8192

    Figure 7 shows the performance of multi-user interference vs.number of iterations in different cases.It can be seen that the estimated channel is not equal,which somehow facilitates the iterative detection,e.g.,smaller number of iterations is needed compared with that of ideal channel estimation case.All cases can achieve convergence after 10 iterations.Compared with ideal channel estimation and ideal active user detection,realistic channel estimation and active user detection shows performance degradation about 1.2 dB in terms of SNR2.

    Figure 7. Multi-user interference vs.iterative number by using CC,Ka=250.

    Figure 8 shows the requiredEb/N0forPe≤0.05 with different values ofKa.The value ofEb/N0is calculated as

    Figure 8. Required SNR vs.Number of active terminals.

    HereP1is the power for CS parts with length ofNp,andP2is the power for sparse-IDMA part with length of.Hereis the length of non-zero values amongNddata.And we fixKb=just as what is done in [15].For simplicity we chooseP1which achievesPe=0.01 for CS part andP2which achievesPe=0.04 for sparse-IDMA part.

    It is found in Figure 8 that the performance of sparse-IDMA in[15]is worse than the simulation result of this paper because a smaller FFT size is applied and different channel coding is employed in our scheme.The performance of sparse-IDMA with CC is superior to that with LDPC becausef(snr) of CC is better than that of LDPC just as Figure 5 shows.The performance of sparse-IDMA and IDMA is evaluated in[15]where sparse-IDMA is preferred.

    V.PRACTICAL ISSUES IN UNCOORDINATED/UNSOURCED TRANSMISSION

    In the academic study on unsourced multiple access,hardware impairments are often neglected,such as frequency offset due to the drifting of the crystal oscillator.In unsourced multiple access the multi-user signals are superposed together.When there is frequency offset which can vary between different terminals,the estimation algorithms designed for single user case cannot be used.The severe multi-user interference makes the signal-to-noise-plus-interference very low,thus estimation of the frequency offset for multi-user is a challenging work.There is also multi-cell interference in practice which may leave some unsourced multiple access schemes not workable or performance significantly degraded.The impact of multi-cell interference on unsourced multiple access should be considered.

    Multi-path fading channel should be considered as well.So far AWGN channel has been assumed in many studies on unsourced multiple access,while in wireless communications multi-path fading channel exists.CS often assumes that the channel is constant within a code block.However,channel fading would make CS detection more challenging.Another difficulty is channel estimation over multi-path fading channel where several path coefficients should be considered.

    Multiple-antenna can improve the performance greatly via transmitter-diversity or receiver-diversity.It may be difficult to equip multiple-antenna in transmitter due to the cost constraint and low band frequency applied.However,for base station multiple receiver antennas are possible.Multiple antenna at receiver can improve system performance,but,the computational complexity also increases.Thus how to make a balance is a research topic.

    5G LDPC codes are binary codes.Non-binary LDPC is the extension of binary LDPC.Because nonbinary LDPC has better performance than that of binary LDPC for small code length [28],and it is verified in this paper that channel coding has significant impact on the performance of unsourced multiple access,non-binary LDPC can be studied for unsourced multiple access in future.

    Coverage and energy efficiency are important requirements for 6G applications.To extend the signal coverage or achieve high energy efficiency,low peak-to-average-power-ratio(PAPR)waveform is preferred.Candidate waveforms include single-carrier or constant envelope orthogonal frequency division multiplexing [29].The later has a PAPR of 0 dB,leading to the wide coverage.Low PAPR waveform is one promising research topic for unsource multiple access.

    VI.CONCLUSION

    In this paper the requirements of 6G massive IoT were proposed with ambient IoT as a typical use case.The stringent requirements called for unsourced multiple access where a framework of transmitter and receiver processing was discussed.Two key processes were elaborated and simulated jointly.One is called sparse-IDMA where a large number of zeros are added to reduce the multi-user interference after user-specific interleaver,and the other is CS for active user detection and channel estimation.With suitable combination of CS matrix,convolutional codes,Turbo CS receiver,ESE algorithm,a superior performance was achieved,compared to the state-of-the-art proposals,yet with relatively less computation complexities.Future work was outlined which includes feature enhancements such as multi-antennas,channel coding and sensing matrix optimization,as well as practical design aspects such as frequency offset estimation,CS for multi-path fading channels,etc.

    女人被狂操c到高潮| 真人做人爱边吃奶动态| 在线免费观看的www视频| 高潮久久久久久久久久久不卡| 免费观看人在逋| 免费看光身美女| 一本久久中文字幕| 婷婷精品国产亚洲av在线| 久久精品91蜜桃| 精品国产亚洲在线| 中出人妻视频一区二区| 久久99热这里只有精品18| 99久久精品一区二区三区| 母亲3免费完整高清在线观看| 精品电影一区二区在线| 黄色丝袜av网址大全| 一夜夜www| 国产极品精品免费视频能看的| 99久久综合精品五月天人人| 色综合站精品国产| h日本视频在线播放| 久久久久性生活片| 亚洲,欧美精品.| 成人国产综合亚洲| 国内精品久久久久久久电影| 亚洲,欧美精品.| 欧美激情久久久久久爽电影| 可以在线观看的亚洲视频| 香蕉av资源在线| 白带黄色成豆腐渣| 日本黄色片子视频| 女生性感内裤真人,穿戴方法视频| 在线a可以看的网站| 特大巨黑吊av在线直播| 99在线人妻在线中文字幕| 成人特级黄色片久久久久久久| 国内精品久久久久久久电影| 亚洲av美国av| 免费av不卡在线播放| 国产v大片淫在线免费观看| 99国产综合亚洲精品| 日韩人妻高清精品专区| 在线播放国产精品三级| 精品久久久久久久末码| 色噜噜av男人的天堂激情| 国产亚洲精品综合一区在线观看| 老司机午夜福利在线观看视频| 色综合婷婷激情| 欧美日韩一级在线毛片| 最好的美女福利视频网| 一个人免费在线观看的高清视频| 亚洲午夜精品一区,二区,三区| 亚洲人成伊人成综合网2020| 亚洲美女视频黄频| netflix在线观看网站| 午夜精品久久久久久毛片777| 久久婷婷人人爽人人干人人爱| 亚洲avbb在线观看| 男女做爰动态图高潮gif福利片| 亚洲成av人片在线播放无| x7x7x7水蜜桃| or卡值多少钱| 亚洲片人在线观看| 久久精品91蜜桃| 亚洲va日本ⅴa欧美va伊人久久| 国产 一区 欧美 日韩| 狂野欧美白嫩少妇大欣赏| 91久久精品国产一区二区成人 | 亚洲国产欧美一区二区综合| 久久精品aⅴ一区二区三区四区| 久久久久免费精品人妻一区二区| 国产成人一区二区三区免费视频网站| 国产亚洲欧美在线一区二区| 亚洲 国产 在线| 国产伦精品一区二区三区四那| 国产美女午夜福利| 欧美黄色片欧美黄色片| 亚洲 欧美 日韩 在线 免费| 国产又黄又爽又无遮挡在线| 欧美色欧美亚洲另类二区| 岛国在线免费视频观看| 久久精品夜夜夜夜夜久久蜜豆| 亚洲va日本ⅴa欧美va伊人久久| 色av中文字幕| 夜夜爽天天搞| 色综合亚洲欧美另类图片| 少妇熟女aⅴ在线视频| 色av中文字幕| 国产精品av久久久久免费| 午夜影院日韩av| 亚洲一区二区三区不卡视频| 成人鲁丝片一二三区免费| 九色成人免费人妻av| 老熟妇乱子伦视频在线观看| 91麻豆av在线| 18美女黄网站色大片免费观看| 精品乱码久久久久久99久播| 在线观看免费视频日本深夜| 一本精品99久久精品77| 一本一本综合久久| 成人特级av手机在线观看| 女人高潮潮喷娇喘18禁视频| 老司机深夜福利视频在线观看| 亚洲国产精品久久男人天堂| 国产成人影院久久av| 色综合站精品国产| 亚洲成人中文字幕在线播放| 婷婷亚洲欧美| 午夜久久久久精精品| 亚洲色图 男人天堂 中文字幕| 国产欧美日韩精品亚洲av| 亚洲av成人不卡在线观看播放网| 香蕉久久夜色| svipshipincom国产片| 国产精华一区二区三区| 国产精品九九99| 日韩成人在线观看一区二区三区| 99久久99久久久精品蜜桃| 中出人妻视频一区二区| 这个男人来自地球电影免费观看| 国产精品免费一区二区三区在线| 悠悠久久av| 日日摸夜夜添夜夜添小说| 中文字幕精品亚洲无线码一区| 国产黄色小视频在线观看| 久久精品国产亚洲av香蕉五月| 一进一出抽搐gif免费好疼| 久久久精品大字幕| 无人区码免费观看不卡| 99国产精品一区二区蜜桃av| 精品国产美女av久久久久小说| 国产伦一二天堂av在线观看| 97超级碰碰碰精品色视频在线观看| 在线永久观看黄色视频| 麻豆一二三区av精品| 国产97色在线日韩免费| 亚洲av熟女| 国内揄拍国产精品人妻在线| 三级男女做爰猛烈吃奶摸视频| 日韩大尺度精品在线看网址| 在线观看免费午夜福利视频| 听说在线观看完整版免费高清| 成人三级黄色视频| 曰老女人黄片| 亚洲国产精品久久男人天堂| 精品久久久久久久末码| 97超视频在线观看视频| 嫩草影视91久久| 国产爱豆传媒在线观看| 国产精品99久久99久久久不卡| 日本熟妇午夜| 99国产精品一区二区三区| 国产精品99久久久久久久久| 91九色精品人成在线观看| 人人妻人人看人人澡| 精品国内亚洲2022精品成人| 国产aⅴ精品一区二区三区波| 亚洲精品乱码久久久v下载方式 | 亚洲色图 男人天堂 中文字幕| 国产精华一区二区三区| 男插女下体视频免费在线播放| a级毛片在线看网站| 亚洲国产欧美一区二区综合| 免费人成视频x8x8入口观看| 91久久精品国产一区二区成人 | 无遮挡黄片免费观看| 日本与韩国留学比较| 亚洲乱码一区二区免费版| 婷婷精品国产亚洲av在线| 久久久久亚洲av毛片大全| 欧美一区二区精品小视频在线| 欧美一区二区精品小视频在线| 99久久久亚洲精品蜜臀av| 两个人的视频大全免费| 成人av一区二区三区在线看| 免费在线观看影片大全网站| 国内精品美女久久久久久| 身体一侧抽搐| 欧美成人免费av一区二区三区| 老司机福利观看| 法律面前人人平等表现在哪些方面| 欧洲精品卡2卡3卡4卡5卡区| 日本在线视频免费播放| www.熟女人妻精品国产| 最近最新中文字幕大全电影3| 国产 一区 欧美 日韩| 天堂网av新在线| 国产探花在线观看一区二区| 日日摸夜夜添夜夜添小说| 久久久久久久久中文| 小蜜桃在线观看免费完整版高清| 亚洲午夜理论影院| 亚洲自偷自拍图片 自拍| 免费看光身美女| 又黄又爽又免费观看的视频| 国产精品一区二区精品视频观看| 亚洲精品一卡2卡三卡4卡5卡| 九九在线视频观看精品| 欧美日韩黄片免| 黄色 视频免费看| 日韩免费av在线播放| 午夜福利在线在线| 欧美日本亚洲视频在线播放| 91av网一区二区| 最新中文字幕久久久久 | 免费观看人在逋| 啪啪无遮挡十八禁网站| 丝袜人妻中文字幕| 亚洲成av人片免费观看| 亚洲国产色片| 夜夜夜夜夜久久久久| 色av中文字幕| 一本精品99久久精品77| 日本一本二区三区精品| 欧美一级a爱片免费观看看| 夜夜躁狠狠躁天天躁| 日日摸夜夜添夜夜添小说| 91九色精品人成在线观看| 搞女人的毛片| 欧美日韩综合久久久久久 | av黄色大香蕉| 中文字幕最新亚洲高清| 免费观看精品视频网站| 淫妇啪啪啪对白视频| 99国产精品99久久久久| 日韩国内少妇激情av| 亚洲精品一卡2卡三卡4卡5卡| 999久久久精品免费观看国产| 一进一出抽搐gif免费好疼| 亚洲av成人不卡在线观看播放网| 日韩成人在线观看一区二区三区| 少妇丰满av| 亚洲国产欧洲综合997久久,| 天天添夜夜摸| 母亲3免费完整高清在线观看| 男人和女人高潮做爰伦理| 99久久精品国产亚洲精品| 婷婷丁香在线五月| 日本一本二区三区精品| 亚洲国产欧美网| 成年版毛片免费区| 国产极品精品免费视频能看的| 国产精品久久久久久亚洲av鲁大| 亚洲乱码一区二区免费版| 国产伦精品一区二区三区视频9 | 亚洲人成网站在线播放欧美日韩| 12—13女人毛片做爰片一| 午夜福利18| 丰满的人妻完整版| 九色成人免费人妻av| 18禁美女被吸乳视频| 国产精华一区二区三区| 欧美色欧美亚洲另类二区| 精品99又大又爽又粗少妇毛片 | 观看免费一级毛片| 成人精品一区二区免费| 在线十欧美十亚洲十日本专区| 动漫黄色视频在线观看| 2021天堂中文幕一二区在线观| 99re在线观看精品视频| 国产私拍福利视频在线观看| 亚洲av电影在线进入| 久久精品91无色码中文字幕| 国产麻豆成人av免费视频| 精品久久久久久成人av| 国产欧美日韩精品一区二区| 国产精品国产高清国产av| 午夜视频精品福利| 少妇丰满av| 国产一区二区激情短视频| 免费人成视频x8x8入口观看| 成人性生交大片免费视频hd| 狂野欧美激情性xxxx| 淫妇啪啪啪对白视频| 欧美绝顶高潮抽搐喷水| 国产午夜福利久久久久久| 91av网一区二区| 99在线人妻在线中文字幕| cao死你这个sao货| 亚洲人与动物交配视频| 色尼玛亚洲综合影院| 亚洲国产日韩欧美精品在线观看 | 亚洲va日本ⅴa欧美va伊人久久| 国产一级毛片七仙女欲春2| 亚洲成人精品中文字幕电影| 亚洲av免费在线观看| 制服丝袜大香蕉在线| 欧美成狂野欧美在线观看| 中出人妻视频一区二区| 窝窝影院91人妻| 一级黄色大片毛片| 色在线成人网| 老汉色av国产亚洲站长工具| cao死你这个sao货| 精品无人区乱码1区二区| 国产又黄又爽又无遮挡在线| 无限看片的www在线观看| 1000部很黄的大片| 久久这里只有精品中国| 亚洲性夜色夜夜综合| 欧美乱妇无乱码| 精品99又大又爽又粗少妇毛片 | 色综合婷婷激情| 欧美三级亚洲精品| 午夜福利欧美成人| 露出奶头的视频| 国产成人影院久久av| 久久这里只有精品19| 亚洲人成网站高清观看| 日韩精品中文字幕看吧| 日韩欧美国产一区二区入口| 在线免费观看的www视频| av视频在线观看入口| 国产真实乱freesex| www.熟女人妻精品国产| 搡老熟女国产l中国老女人| 亚洲成人久久性| 最新中文字幕久久久久 | 五月玫瑰六月丁香| 久久亚洲真实| 亚洲人成伊人成综合网2020| 最近最新中文字幕大全电影3| 国产毛片a区久久久久| 国产男靠女视频免费网站| 偷拍熟女少妇极品色| 欧美乱妇无乱码| 高清在线国产一区| 又黄又粗又硬又大视频| 嫩草影视91久久| 99在线人妻在线中文字幕| 又大又爽又粗| 午夜成年电影在线免费观看| 久久久久免费精品人妻一区二区| 午夜视频精品福利| 亚洲av美国av| 麻豆av在线久日| 欧美另类亚洲清纯唯美| 熟妇人妻久久中文字幕3abv| 男人舔奶头视频| 久久久久久久久久黄片| 国产精品久久视频播放| 欧美极品一区二区三区四区| netflix在线观看网站| 18禁观看日本| 国产欧美日韩精品亚洲av| 桃红色精品国产亚洲av| 欧美国产日韩亚洲一区| 久久久久国产精品人妻aⅴ院| 亚洲真实伦在线观看| 九色成人免费人妻av| 欧美乱妇无乱码| 久久人妻av系列| 在线观看免费视频日本深夜| 国内揄拍国产精品人妻在线| а√天堂www在线а√下载| x7x7x7水蜜桃| 波多野结衣巨乳人妻| 国内少妇人妻偷人精品xxx网站 | 国产成人啪精品午夜网站| 在线十欧美十亚洲十日本专区| 久久久国产欧美日韩av| 黄色视频,在线免费观看| 99热6这里只有精品| 中文字幕av在线有码专区| 国产乱人视频| 亚洲精品美女久久av网站| tocl精华| 看免费av毛片| 亚洲 欧美 日韩 在线 免费| 宅男免费午夜| 国产成人影院久久av| 中文字幕最新亚洲高清| 欧美日韩综合久久久久久 | 在线a可以看的网站| 色噜噜av男人的天堂激情| 国产伦人伦偷精品视频| 国产单亲对白刺激| 搞女人的毛片| av国产免费在线观看| 亚洲欧美日韩卡通动漫| 欧美极品一区二区三区四区| www日本在线高清视频| 国产一区二区在线观看日韩 | 99国产极品粉嫩在线观看| 噜噜噜噜噜久久久久久91| 亚洲欧美激情综合另类| 久久久久免费精品人妻一区二区| 2021天堂中文幕一二区在线观| 俄罗斯特黄特色一大片| 美女高潮的动态| 国产成+人综合+亚洲专区| 美女大奶头视频| 18禁美女被吸乳视频| 老司机福利观看| 又黄又爽又免费观看的视频| 国产一区在线观看成人免费| 亚洲欧美一区二区三区黑人| 久久精品国产99精品国产亚洲性色| 一个人看视频在线观看www免费 | 亚洲欧美日韩无卡精品| 国产高清有码在线观看视频| 美女扒开内裤让男人捅视频| 国产乱人伦免费视频| 1024香蕉在线观看| 男人和女人高潮做爰伦理| 99热精品在线国产| 97碰自拍视频| 免费看美女性在线毛片视频| 又爽又黄无遮挡网站| 成人国产综合亚洲| 色综合亚洲欧美另类图片| 亚洲成av人片免费观看| 窝窝影院91人妻| 亚洲精品一区av在线观看| 搡老妇女老女人老熟妇| 成熟少妇高潮喷水视频| 一级黄色大片毛片| 国产精品一区二区三区四区久久| 亚洲成人久久爱视频| 久久久久免费精品人妻一区二区| 丁香欧美五月| 国产黄色小视频在线观看| 亚洲avbb在线观看| 亚洲熟女毛片儿| 九色成人免费人妻av| 日本撒尿小便嘘嘘汇集6| 国内精品一区二区在线观看| 久久亚洲精品不卡| 桃红色精品国产亚洲av| 丁香六月欧美| 在线视频色国产色| 国产精品久久视频播放| 亚洲欧美日韩高清在线视频| 中文字幕精品亚洲无线码一区| 高清毛片免费观看视频网站| 老熟妇乱子伦视频在线观看| 观看美女的网站| 精品久久久久久久人妻蜜臀av| 一进一出好大好爽视频| av女优亚洲男人天堂 | 亚洲 欧美一区二区三区| 每晚都被弄得嗷嗷叫到高潮| 90打野战视频偷拍视频| 成年女人毛片免费观看观看9| 亚洲最大成人中文| 18禁国产床啪视频网站| 久久久国产成人免费| 成人永久免费在线观看视频| 日韩 欧美 亚洲 中文字幕| 禁无遮挡网站| 久久久久久久久中文| 亚洲乱码一区二区免费版| 久久天躁狠狠躁夜夜2o2o| 两个人看的免费小视频| 男人舔女人的私密视频| 俄罗斯特黄特色一大片| 色尼玛亚洲综合影院| 欧美一区二区精品小视频在线| 一个人免费在线观看电影 | 啦啦啦免费观看视频1| 午夜福利视频1000在线观看| 亚洲av片天天在线观看| 午夜福利欧美成人| 1024手机看黄色片| 国产熟女xx| 国产91精品成人一区二区三区| 可以在线观看的亚洲视频| 亚洲国产精品合色在线| www.999成人在线观看| 美女高潮的动态| 亚洲成人免费电影在线观看| 90打野战视频偷拍视频| 欧美中文综合在线视频| 午夜视频精品福利| 亚洲av熟女| 成人欧美大片| 一区福利在线观看| 18禁黄网站禁片午夜丰满| 成年版毛片免费区| 久久香蕉国产精品| 99热这里只有精品一区 | 99精品欧美一区二区三区四区| 国产亚洲欧美98| 日本黄色视频三级网站网址| 91av网站免费观看| 久久热在线av| 日韩欧美精品v在线| 亚洲色图 男人天堂 中文字幕| 免费在线观看视频国产中文字幕亚洲| 黄片小视频在线播放| 日本撒尿小便嘘嘘汇集6| 国产亚洲精品久久久久久毛片| av在线天堂中文字幕| 久久国产精品人妻蜜桃| 在线视频色国产色| 国产欧美日韩一区二区精品| 久久久久国产精品人妻aⅴ院| 国产午夜精品久久久久久| 亚洲男人的天堂狠狠| 999久久久国产精品视频| 久久亚洲真实| 亚洲成av人片在线播放无| 国产精品,欧美在线| 国产精品亚洲av一区麻豆| 色哟哟哟哟哟哟| 免费人成视频x8x8入口观看| 国产精品野战在线观看| 久久久成人免费电影| 亚洲成a人片在线一区二区| 日韩中文字幕欧美一区二区| 观看美女的网站| 国内精品久久久久精免费| 午夜a级毛片| 非洲黑人性xxxx精品又粗又长| 久久香蕉精品热| 亚洲欧美一区二区三区黑人| 免费一级毛片在线播放高清视频| 黄色女人牲交| 欧美中文日本在线观看视频| 99久久久亚洲精品蜜臀av| 久久精品91无色码中文字幕| 久久久久免费精品人妻一区二区| 亚洲国产欧洲综合997久久,| 欧美中文综合在线视频| 欧美日本亚洲视频在线播放| 久久久色成人| 在线a可以看的网站| 亚洲av第一区精品v没综合| 丁香六月欧美| 在线免费观看的www视频| 精品久久久久久成人av| 亚洲精品在线观看二区| 亚洲色图 男人天堂 中文字幕| 婷婷精品国产亚洲av| 免费观看人在逋| 小蜜桃在线观看免费完整版高清| 欧美黑人欧美精品刺激| 法律面前人人平等表现在哪些方面| 亚洲真实伦在线观看| 一级作爱视频免费观看| 国产精品久久久久久久电影 | 天天添夜夜摸| 国产精品野战在线观看| 欧美黑人欧美精品刺激| 国产精品永久免费网站| 亚洲成人中文字幕在线播放| 很黄的视频免费| 亚洲成人久久性| 久久性视频一级片| 精品福利观看| 国产伦人伦偷精品视频| 久久精品国产综合久久久| 亚洲熟妇熟女久久| 日本一本二区三区精品| 国产精品久久久人人做人人爽| 色综合欧美亚洲国产小说| 久久久国产欧美日韩av| x7x7x7水蜜桃| 又粗又爽又猛毛片免费看| 久久久国产成人免费| 精品一区二区三区视频在线观看免费| 欧美在线一区亚洲| 欧美精品啪啪一区二区三区| 在线观看美女被高潮喷水网站 | 亚洲中文字幕一区二区三区有码在线看 | 久久久久久久精品吃奶| 老司机深夜福利视频在线观看| 亚洲中文av在线| 淫妇啪啪啪对白视频| 日韩欧美三级三区| 久久午夜综合久久蜜桃| 丰满的人妻完整版| 国产精品永久免费网站| 国产高清激情床上av| 熟女少妇亚洲综合色aaa.| www日本黄色视频网| 首页视频小说图片口味搜索| 波多野结衣高清无吗| 在线观看免费午夜福利视频| 黄色 视频免费看| 国产欧美日韩一区二区精品| 午夜福利在线观看免费完整高清在 | 男人舔女人的私密视频| 最近在线观看免费完整版| 日本黄色视频三级网站网址| 欧美xxxx黑人xx丫x性爽| 手机成人av网站| 国产成人精品久久二区二区91| 亚洲va日本ⅴa欧美va伊人久久| 99国产综合亚洲精品| 在线观看舔阴道视频| 欧美性猛交╳xxx乱大交人| 欧美高清成人免费视频www| 国产一区二区在线av高清观看| 精品国产乱子伦一区二区三区| 男女床上黄色一级片免费看| 亚洲在线观看片| 中文字幕人妻丝袜一区二区| 夜夜躁狠狠躁天天躁| 哪里可以看免费的av片| 亚洲天堂国产精品一区在线| 香蕉av资源在线| 日本一本二区三区精品| www.999成人在线观看| 精品国内亚洲2022精品成人| 久久香蕉国产精品| 看黄色毛片网站| 淫秽高清视频在线观看| 搡老熟女国产l中国老女人| 欧美性猛交╳xxx乱大交人| 亚洲无线观看免费| а√天堂www在线а√下载| 欧美激情久久久久久爽电影| 亚洲aⅴ乱码一区二区在线播放| 欧美不卡视频在线免费观看|