Multiple access schemes with interference mitigation
Abstract:
Methods, systems, and devices for multiple access with interference mitigation are described. An exemplary implementation of interference mitigation in a multiple access scheme includes rearranging a N-th bit stream corresponding to a N-th portion of the input bit stream to generate a N-th rearranged bit stream of K rearranged bit streams, for N=1, 2, . . . , K, generating a modulated symbol stream of hierarchical QAM symbols based on the K rearranged bit streams, where bits from the first rearranged bit stream correspond to one or more most significant bits of the hierarchical QAM symbols, bits from the K-th rearranged bit stream correspond to one or more least significant bits of the hierarchical QAM symbols, and bits from a second to (K−1)-th rearranged bit stream correspond to one or more remaining bits of the hierarchical QAM symbols, and transmitting a signal generated from the modulated symbol stream.
Public/Granted literature
Information query
Patent Agency Ranking
0/0