期刊文献+

LTE-A网络中D2D通信的资源分配算法研究 被引量:11

Research on Resource Allocation Algorithm for D2D Communications Underlaying LTE-A Networks
下载PDF
导出
摘要 该文研究了D2D通信使用LTE-A网络上行链路的资源分配问题。首先将问题建模为混合整数非线性规划问题(MINLP),其次根据待接入用户对各信道的青睐程度计算特征值列表并形成相应联盟。在保证各用户服务质量(QoS)的情况下,利用最大加权二部图匹配(MWBM)方法为待接入网络用户寻找合适的资源及复用的组合。仿真结果表明,该算法打破了D2D用户在数据传输过程中一直处于专用或者复用模式的束缚,扩大了D2D用户对可选用的资源范围,与现有算法相比,可有效提高系统的总速率。 Uplink resource allocation problem in Device-to-Device (D2D) communications underlaying LTE-A networks is analyzed. First, tile problem is modeled as a Mixed Integer NonLinear Programming (MINLP). Then the algorithm calculates each waiting user's identity list in accordance with the preference for channels to form coalitions. On the premise of guaranteeing the Quality of Service (QoS) of users in the system, the suitable resource and reuse partner are assigned to each user through Maximum Weighted Bipartite Matching (MWBM). The simulation results show that this algorithm can break the constraint that D2D pairs can only stay on dedicated or reused mode when they are on data transmission, and expand the range of available resource for D2D users, which increases effectively the system sum-rate compared with the existing algorithm.
作者 钱志鸿 阎双叶 田春生 王鑫 QIAN Zhihong1,YAN Shuangye1,TIAN Chunsheng1,WANG Xin1,2(1. College of Communication Engineering, Jilin University, Changchun 130012, China;2.College of Information & Technology, Jilin Agricultural University, Changchun 130018, China)
出处 《电子与信息学报》 EI CSCD 北大核心 2018年第10期2287-2293,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61771219) 吉林大学基础科研项目(SXGJQY2017-9 2017TD-19)~~
关键词 无线通信 D2D通信 资源分配 最大加权二部图匹配 Wireless communications D2D communications Resource allocation Maximum Weighted Bipartite Matching (MWBM)
  • 相关文献

参考文献3

二级参考文献59

  • 1李洁,高新波,焦李成.基于克隆算法的网络结构聚类新算法[J].电子学报,2004,32(7):1195-1199. 被引量:24
  • 2宁焕生,张瑜,刘芳丽,刘文明,渠慎丰.中国物联网信息服务系统研究[J].电子学报,2006,34(B12):2514-2517. 被引量:151
  • 3Jam A J, et al. A pharmaceutical intelligent information system to detect allergies and adverse drugs reactions based on inter- net of things[ A]. 2010 Eighth IEEE International Conference on Pervasive Computing and Communications Workshops [ C]. Mannheim, Germany: IEEE Press,2010. 809 - 812.
  • 4Luigi A, Antonio I, Giacomo M. The intemet of things: A sur- vey[ J]. Computer Networks,2010.2784- 2805.
  • 5Rolfh W. Intemet of things-new security and privacy chal- lenges[ J]. Computer LAW Security Review, 2010, 26:23 - 30.
  • 6Jens-Matthias Bohli, Christoph Sorge, Dirk Westhoff. Initial observations on economics, pricing and penetration of the in- temet of things market[ J]. ACM SIGCOMM Computer Com- munication Revie w, 2009,31 (2) : 50 - 55.
  • 7Huang Y H, Li G Y. Descriptive models for internet of things [A]. International Conference on Intelligent Control and Infor- marion Processing[ C ] - Harbin, China: IEEE Press, 2010. 483 - 486.
  • 8Welboume E, et al. Building the intemet of things using RFID: The RFID ecosystem experience[ J]. IEEE Intemet Computing, 2009, 13(3) :48 - 55.
  • 9Broll G, et al. Perci: Pervasive service interaction with the inter- net of things [J]. IEEE Intemet Computing, 2009, 13 ( 6 ) : 74 - 81.
  • 10Kranz M, et al. Embedded interaction: Interacting with the in- temet of things [ J ]. IEEE Intemet Computing, 2010, 14 (2) : 46 - 53.

共引文献506

同被引文献63

引证文献11

二级引证文献50

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部