… , resourceallocation policy, and beamforming design for multicarrier (MC) MISO-NOMA … throughput for NOMA and full-duplex (FD) systems, respectively. However, the base station (…
… In this paper, the resourceallocation algorithm design for secureMISO-URLLC is based on (… , “Robust and secureresourceallocation for full-duplexMISOmulticarrierNOMAsystems,” …
H Fu, S Feng, W Tang, DWK Ng - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… for multiuser full-duplex wireless communication systems was … our proposed secure transmission strategy to the NOMA scheme… In this paper, we studied the robustresourceallocation …
J Zhou, Y Sun, Q Cao, S Li, Z Sun… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… In this section, we consider a multi-user MISONOMAsystem as shown in Fig. 1 in which one N-… , “Robust and secureresourceallocation for full-duplexmisomulticarriernomasystems,” …
Y Xu, R Xu, D Li, G Yang, G Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
… a sum-rate maximization problem for a multicarrier wirelesspowered BackCom system was … a robust RA problem for an MU-MISO wireless-powered BackCom system with NOMA under …
X Ou, X Xie, H Lu, H Yang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… used in ultra-reliable and lowlatency … allocation and subcarrier allocation to maximize the weighted throughput of a downlink MC-NOMAsystem and a full-duplex MC-NOMAsystem, …
… a resourceallocation for multicarrier (MC) multiple input single output (MISO) non-orthogonal multiple access (NOMA) … , ‘‘Robust and secureresourceallocation for full-duplexMISO …
Z Xu, S Wang, D Liu, Z Wen - Physical Communication, 2021 - Elsevier
… resourceallocation optimization problem to maximize the weighted system throughput in MISO multicarrierNOMAsystem… robust cooperative NOMAsystem to maximize the strong user’s …
M Ghasemlou, N Neda, JS Harsini - Physical Communication, 2024 - Elsevier
… the framework of a multicarrier (MC)-NOMAsystem is realized … data rate in MC MISO-NOMA HetNets when nonlinear EH … with SWIPT was investigated in which the strong users relayed …