NOMA based VR Video Transmissions Exploiting User Behavioral Coherence

Ping Xiang, Hangguan Shan, Zhaoyang Zhang, Lu Yu, Tony Q.S. Quek

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this work, we study the cooperative and non-cooperative transmission schemes design for live VR video broadcast scenarios by utilizing non-orthogonal multiple access (NOMA), considering that users' viewports partly overlap due to behavioral coherence. To characterize the performance of the proposed cooperative and non-cooperative transmission schemes, the exact and asymptotic expressions of outage probability, as well as the average outage capacity under imperfect successive interference cancellation (SIC), are derived, respectively. Based on the asymptotic outage probability results, we optimize the power allocation to maximize the average outage capacity of the proposed schemes. Finally, simulation results demonstrate that both of the proposed schemes can achieve a considerable performance gain over the traditional orthogonal multiple access (OMA) scheme in average outage capacity, and each of the proposed schemes has its advantages and applicable scenarios.

Original languageEnglish
Title of host publication2020 IEEE Wireless Communications and Networking Conference, WCNC 2020 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728131061
DOIs
Publication statusPublished - 2020 May
Event2020 IEEE Wireless Communications and Networking Conference, WCNC 2020 - Seoul, Korea, Republic of
Duration: 2020 May 252020 May 28

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
Volume2020-May
ISSN (Print)1525-3511

Conference

Conference2020 IEEE Wireless Communications and Networking Conference, WCNC 2020
CountryKorea, Republic of
CitySeoul
Period20-05-2520-05-28

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint Dive into the research topics of 'NOMA based VR Video Transmissions Exploiting User Behavioral Coherence'. Together they form a unique fingerprint.

Cite this