A Real-Complex Hybrid User Scheduling Algorithm Under the Delay-Restricted Scenario

被引:0
|
作者
Xiong, Xiaoxiong [1 ]
Dong, Chao [1 ]
Bian, Yaohui [1 ]
Niu, Kai [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Key Lab Universal Wireless Commun, Minist Educ, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
Modulation; Symbols; Streams; Scheduling; Correlation; Scheduling algorithms; Simulation; Real-complex hybrid modulation; widely-linear receiver; multi-slot user scheduling; delay-restricted scenario; MIMO;
D O I
10.1109/LWC.2024.3363709
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For delay-restricted multi-slot scenarios, this letter proposes a real-complex hybrid user scheduling (RCHS) algorithm. RCHS is designed for real-complex hybrid modulation (RCHM) and widely-linear receivers. The RCHM allows the user equipment devices (UEs) to transmit symbols through the real or imaginary part of the complex channel. It enables RCHS to have finer scheduling granularity than the complex scheduling algorithms. Because of the finer scheduling granularity, RCHS can achieve higher sum capacity through selection. The RCHS proposed in this letter can enable repeated service of those UEs which bring higher sum capacity gain on multiple slots. Meanwhile, RCHS adopts a low-complexity updating method to improve the sum capacity. Simulation results under interference-limited scenarios demonstrate that the sum capacity of RCHS outperforms the comparative algorithms under both fully- and over-loaded scenarios. And RCHS does not exhibit significant sum capacity loss under lightly over-loaded scenarios.
引用
下载
收藏
页码:1163 / 1167
页数:5
相关论文
共 50 条
  • [31] Hybrid genetic algorithm based fuel restricted real power optimization for utility system
    Kumarappan, N
    Mohan, MR
    CEC: 2003 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-4, PROCEEDINGS, 2003, : 1294 - 1301
  • [32] The hybrid neural model to strengthen the e-nose restricted in real complex conditions
    Ouhmad, Slimane
    Beni-Hssane, Abderrahim
    Hajami, Abdelmajid
    15TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2018) / THE 13TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2018) / AFFILIATED WORKSHOPS, 2018, 134 : 107 - 113
  • [33] μ-Synchronization of Complex Networks with Unbounded Delay Under Hybrid Impulsive Control
    Hu, Xiaohan
    Liu, Xiwei
    NEURAL PROCESSING LETTERS, 2022, 54 (03) : 1903 - 1918
  • [34] Implementation and Experiments with an Algorithm for Parallel Scheduling of Complex Dags under Uncertainty
    Malewicz, Grzegorz
    PROCEEDINGS OF THE EIGHTH WORKSHOP ON ALGORITHM ENGINEERING AND EXPERIMENTS AND THE THIRD WORKSHOP ON ANALYTIC ALGORITHMICS AND COMBINATORICS, 2006, : 66 - 74
  • [35] Exploring the Potential of a Genetic Algorithm on a Real-World Complex Scheduling Problem
    Jahn-Erdos, Szilvia
    Kovari, Bence
    2022 9TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING & MACHINE INTELLIGENCE, ISCMI, 2022, : 113 - 117
  • [36] A cooperative coevolution algorithm for complex hybrid seru-system scheduling optimization
    Wu, Yuting
    Wang, Ling
    Chen, Jing-fang
    COMPLEX & INTELLIGENT SYSTEMS, 2021, 7 (05) : 2559 - 2576
  • [37] A cooperative coevolution algorithm for complex hybrid seru-system scheduling optimization
    Yuting Wu
    Ling Wang
    Jing-fang Chen
    Complex & Intelligent Systems, 2021, 7 : 2559 - 2576
  • [38] Scheduling real-time of the synchronous hybrid tasks under energy constraint
    Abbas, Akli
    Hentous, Hamid
    Kenaza, Tayeb
    2009 3RD INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM 2009), 2009, : 240 - +
  • [39] A hybrid scenario cluster decomposition algorithm for supply chain tactical planning under uncertainty
    Zanjani, Masoumeh Kazemi
    Bajgiran, Omid Sanei
    Nourelfath, Mustapha
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2016, 252 (02) : 466 - 476
  • [40] Priority-based Scheduling Policy For a Hybrid Routing Algorithm in a Vehicular Delay Toleant Network
    Penurkar, Milind R.
    Deshpande, Umesh A.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 578 - 583