Sei sulla pagina 1di 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/329461201

Simultaneous Uplink and Downlink Transmissions for Wireless Powered


Communication Networks

Article  in  IEEE Communications Letters · December 2018


DOI: 10.1109/LCOMM.2018.2885303

CITATIONS READS
3 414

4 authors:

Tri Nhu Do Van-Dinh Nguyen


Hongik University University of Luxembourg
33 PUBLICATIONS   347 CITATIONS    65 PUBLICATIONS   436 CITATIONS   

SEE PROFILE SEE PROFILE

Oh-Soon Shin Beongku An


Soongsil University Hongik University
172 PUBLICATIONS   1,652 CITATIONS    134 PUBLICATIONS   920 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Device-to-Device Communications View project

Simultaneous wireless information and power transfer (SWIPT) View project

All content following this page was uploaded by Tri Nhu Do on 03 January 2019.

The user has requested enhancement of the downloaded file.


1

Simultaneous Uplink and Downlink Transmissions


for Wireless Powered Communication Networks
Tri-Nhu Do, Van-Dinh Nguyen, Oh-Soon Shin, and Beongku An

Abstract—In this letter, we propose a novel simultaneous ...


uplink (UL) and downlink (DL) transmission scheme aiming to hD
achieve a higher spectral efficiency for wireless power communi- ȟU
Gsi
cation networks (WPCNs). Specifically, by exploiting full-duplex gcci
(FD) radio and wireless power transfer techniques, an FD hybrid D
S ...
access point is able to communicate with a wireless powered UL ĥU DL user
user and a DL user over the same time-frequency resource. The gsi energy harvesting
optimization problem of interest is to maximize the sum-rate of and recycling
the scheme under a given power budget, which is formulated as FD H-AP U energy
a nonconvex problem. To this end, we propose a low-complexity
information
path-following algorithm for its solution. Numerical results reveal FD UL user
interference
that the proposed scheme indeed achieves substantial sum-rate
improvement for the WPCNs.
Fig. 1. Illustration of a WPCN with full-duplex uplink transmission.
Index Terms—Wireless powered communication networks,
full-duplex, sum-rate maximization, path-following algorithm. UL and DL communications of FD-WPCNs can be carried out
simultaneously without dividing a time slot into multiple sub-
I. I NTRODUCTION phases. Moreover, we take advantage of the self-interference
Full-duplex (FD) radio has been considered as a potential (SI) introduced by the UL user as a recycling energy resource
technology to improve the spectral efficiency of wireless for itself [7]. In summary, the contributions of the paper
communications [1], [2]. Besides, in order to realize the are two-fold: (i) We propose a novel simultaneous DL and
future of self-sustainable wireless devices, radio-frequency UL transmission scheme for WPCNs, which has not been
energy harvesting (RF-EH) has been emerging as an aus- reported in the literature. This allows UL user to harvest
picious method [3], [4]. By adopting RF-EH, the authors more energy for its UL transmission and exploit the temporal
in [5] proposed a wireless powered communication network degrees of freedom (DoF) more effectively than [6]. (ii) We
(WPCN) where a hybrid access point (H-AP) first performs formulate a sum-rate maximization problem of the considered
wireless power transfer (WPT) to power downlink (DL) users system, which is intractable since it has a nonconcave objective
and then processes information received from uplink (UL) function subject to nonconvex constraints. Nonetheless, a
users. To improve the spectral efficiency of the prior WPCN, low-complexity path-following algorithm is developed for its
the authors in [6] proposed an FD-WPCN, whose operation solution. Numerical results show that the proposed scheme
in a time slot is carried out in two phases. Specifically, in the offers significant sum-rate improvement as compared to a very
first phase, an FD multi-antenna base station (BS) forms an recent existing transmission scheme for WPCNs, i.e., [6]. A
information-energy beam to transfer information and energy trade-off between UL and DL rates is also given to provide
simultaneously on DL, while in the second phase, the BS more insights into the proposed scheme.
keeps transferring only information on DL while processes Notation: Lower-case, bold lower-case, and bold upper-case
the information received on UL. letters represent scalars, vectors, and matrices, respectively.
Differently from existing works, including [6] in particular, (·)H , (·)T , and (·)∗ denote the Hermitian transpose, normal
in this paper, UL users are equipped with FD radio so that the transpose, and conjugate operations, respectively. Tr(·) and
T.-N. Do is with the Ubiquitous Networks and Convergence Laboratory,
E[·] denote the trace and expectation operations, respectively.
Hongik University, Sejong 30016, Korea (email: dotrinhu@gmail.com). | · | and k·k2 denotes the absolute value and l2 norm, respec-
V.-D. Nguyen and O.-S. Shin are with the School of Electronic Engineering tively. <{·} represents the real part of a complex number.
and the Department of ICMC Convergence Technology, Soongsil University,
Seoul 06978, Korea (e-mails: nguyenvandinh@ssu.ac.kr; osshin@ssu.ac.kr).
B. An is with the Department of Software and Communications Engineer- II. S YSTEM M ODEL AND P ROBLEM F ORMULATION
ing, Hongik University, Sejong 30016, Korea (email: beongku@hongik.ac.kr).
The work of T.-N. Do and B. An was supported in part by the Basic A. System Model
Science Research Program through the National Research Foundation of Let us consider a WPCN consisting of a source S, i.e., FD
Korea (NRF), Ministry of Education, under Grant 2016R1D1A1B03934898
and in part by the Leading Human Resource Training Program of Regional H-AP, one UL user denoted by U and one DL user denoted
Neo Industry through NRF, Ministry of Science, ICT and Future Planning, by D, as depicted in Fig. 1. The source S is equipped with N
under Grant 2016H1D5A1910577. The work of V.-D. Nguyen and O.-S. transmit and M receive antennas, and operates in FD mode.
Shin was supported by Basic Science Research Program through the National
Research Foundation of Korea (NRF) funded by the Ministry of Education In this paper, we consider a worst-case design where the UL
(No. 2017R1D1A1B03030436). user does not have available power to convey its information
2

symbol to the FD H-AP, and thus needs to harvest energy represents the UL channel vector from U to S; Gsi ∈ CN ×M
from the RF signal, as in [6]. To exploit self-energy recycling, and µS ∈ [0, 1] represent the SI channel matrix and the degree
we assume that U transmits an information signal to S with of SI mitigation at S, respectively; nS ∼ CN(0, σS2 IM ) denotes
one antenna while receiving energy from the other antenna the AWGN at S.
at the same time. DL user is an HD single-antenna user We assume that the aggregate interferences for both DL and
since it intends to receive only the information signal from UL are Gaussian distributed. Then, the DL and UL achievable
the FD H-AP. DL and UL transmissions of the proposed rates in nat/sec/Hz can be written as
WPCN can be described as follows. On the DL transmission, S

RSD (w, v, pU ) = ln 1 + γSD (w, v, pU ) , (3a)
communicates with D via an information beamforming while 
RUS (w, v, pU ) = ln 1 + γUS (w, v, pU ) , (3b)
concurrently powering U using an energy beamforming. On
the UL transmission, U transmits its information signal to S respectively, where γSD (w, v, pU ) and γUS (w, v, pU ) are the
by using the harvested energy. It is noteworthy that DL and signal-to-interference-plus-noise ratio (SINR) at D and S,
UL transmissions are carried out on the same time-frequency which are given by γSD (w, v, pU ) = |hH 2 H 2
D w| /(|hD v| +
2 2 2 2 H −1
resource. pU |gcci | +σD ), γUS (w, v, pU ) = pU ĥU Θ(w, v) ĥU , with
The complex baseband equivalent signal transmitted at the Θ(w, v) , µS GH H H H 2
si ww Gsi +µS Gsi vv Gsi +σS IM . Herein,
source can be written as x = wxD + vxe , where w ∈ CN ×1 to maximize the UL rate we adopt the minimum mean square
and v ∈ CN ×1 denote the information and energy beamform- error receiver (MMSE) at the source in decoding the UL
ing vectors for D and U, respectively, xD with E[|xD |2 ] = 1 signal. Clearly, as seen in (3), both DL and UL transmissions
and xe with E[|xe |2 ] = 1 are the information and energy use a full communication time block to transmit their signals,
signals intended for D and U, respectively. Assuming a flat while only a fraction of time block is used for UL transmis-
fading channel, the received signals at D and U on the DL sion in [6]. Therefore, the proposed transmission scheme is
channel, respectively, can be expressed as expected to achieve better performance.
ySD = hH H
D wxD + hD vxe + pU gcci xU + nD , (1) B. Optimization Problem Formulation
H H √
ySU = ȟU wxD + ȟU vxe + pU µU gsi xU + nU , (2) Let r̄D and r̄U (nat/sec/Hz) set the rate thresholds for the DL
N ×1 N ×1 and UL users, respectively; PS is a given power budget at the
where hD ∈ C and ȟU ∈ C denote the channel vectors
from S to D and to U, respectively; pU and xU with E[|xU |2 ] = 1 H-AP and PUeh (w, v, pU ) , EU (w, v, pU )/T . The objective of
are the transmit power coefficient and message transmitted this study is to maximize the sum-rate of the system, which
by U to S; gcci ∈ C denotes a channel coefficient for the can be mathematically expressed as
co-channel interference (CCI) from U to D; nD ∼ CN(0, σD2 ) maximize RSD (w, v, pU ) + RUS (w, v, pU ) (4a)
w,v,pU
and nU ∼ CN(0, σU2 ) represent the additive white Gaussian
noise (AWGN) at D and U, respectively; gsi denotes a channel subject to RSD (w, v, pU ) ≥ r̄D , (4b)
coefficient for the SI created by the FD transmission at U, while RUS (w, v, pU ) ≥ r̄U , (4c)
µU ∈ [0, 1] is used to stand for the degree of SI mitigation after p2U ≤ PUeh (w, v, pU ), (4d)
interference isolation and cancellation process at U.
pU > 0, (4e)
To fully utilize the SI, we further assume that the SI is un-
2 2
suppressed, i.e., the SI cancellation (SIC) is inactivated, at the kwk + kvk ≤ PS . (4f)
UL user. Thus, in the sequel of the paper, we set µU = 1, i.e., Since both RSD (w, v, pU ) and RUS (w, v, pU ) are nonconcave
µU = 0 dB, and omit the symbol in equations. The harvested functions, problem (4) is nonconvex. Hence, it is challenging
energy at U, i.e., EU (w, v, pU ) = ηE[|ySU |2 ]T , can be detailed to find the optimal solution in general. In the following
from (2) as EU (w, v, pU ) = η(|ȟH 2 H 2 2 2
U w| + |ȟU v| + pU |gsi | )T , section, we propose a computationally efficient path-following
where η and T are the energy conversion efficiency at U and procedure that leads to a stationary point of (4). Note that
the length of a communication time block, respectively. The the UL and DL users may change their roles in another
term p2U |gsi |2 represents the energy recycled from the transmit communication time block, which leads to a different network
signal of U. As a result of energy recycling, the UL user scenario and the corresponding new optimization problem.
is expected to harvest more energy from the RF signal than Nevertheless, the following mathematical framework of con-
the counterpart in [6]. Note that the energy recycling model vexification method proposed to solve (4) can still be applied
considered in this paper is different from that proposed in to such a problem.
[7] since U does not need to use up the harvested energy to
transmit its signal. Specifically, the transmit power1 of U is
III. P ROPOSED PATH -F OLLOWING M ETHOD
constrained as described in (4d) in the next subsection, i.e.,
p2U ≤ PUeh , EU (w, v, pU )/T . The proposed path-following algorithm is based on the inner
Meanwhile, UL user U transmits its signal to the source approximation framework in [8]. The main idea is to provide a
S on the UL channel, which can be expressed as yUS = minorant of RSD (w, v, pU ) and RUS (w, v, pU ), which has been
√ √ M ×1
pU ĥU xU + µS GH H
si wxD + µS Gsi vxe +nS , where ĥU ∈ C widely used in wireless communication designs, e.g., [6], [9].
Let us deal with the nonconcavity of the function
1 We assume that the energy harvested at the UL user can be temporarily
RSD (w, v, pU ) first by using the following inequality:
stored in the UL user’s battery and then is used to transmit data, where the
delay is negligible, as in [3], [4]. f (z) , ln(1 + 1/z) ≥ Ψ(z̄) − Ξ(z̄)z , f¯(z), ∀z, z̄, > 0, (5)
3

where Ψ(z̄) , ln(1+1/z̄)+1/(z̄ +1) and Ξ(z̄) , 1/z̄(z̄ +1). Algorithm 1 Proposed Path-following Algorithm to Solve (4)
Inequality (5) holds true due to the convexity of the function Initialization:
f (z) [9], and the function f¯(z) is a concave minorant of 1: Solve (16) to generate an initial feasible point.
f (z) at z̄. Let 1/z := γSD (w, v, pU ) and 1/z̄ = 1/z (k) := 2: Set k := 0.
(k) (k)
γSD (w(k) , v(k) , pU ), where (w(k) , v(k) , pU ) is a feasible Path-following procedure:
point at the (k − 1)-th iteration. Then, it follows that 3: repeat
(k)
|hH v|2 +p2U |gcci |2 +σD2 4: Solve (15) with (w(k) , v(k) , pU ) to obtain the optimal
RSD (w, v, pU ) ≥ Ψ(z (k) )−Ξ(z (k) ) D . (6) solution (w? , v? , p?U ).
|hH
D w|
2
(k+1)
5: Update w(k+1) := w? , v(k+1) := v? , pU := p?U .
In addition, we can equivalently replace |hH D w|
2
by
H 2 H 6: Set k := k + 1.
(<{hD w̄}) with <{hD w̄} ≥ 0 [9]. Due to the convexity
7: until Convergence
of function |t|2 , the following inequality holds:
|t|2 ≥ 2(t(k) )∗ t − |t(k) |2 , ∀t, t(k) ∈ C. (7)
is given as
eh,(k)
PU (w, v, pU ) := η 2<{(w(k) )H ȟU ȟH H (k) 2

From (6) and (7), a concave quadratic minorant of U w} − |ȟU w |
(k)
RSD (w, v, pU ) at (w(k) , v(k) , pU ) reads as + 2<{(v(k) )H ȟU ȟH H (k) 2
U v} − |ȟU v |
2 (k) (k) 2 
+ |gsi | (2pU pU − (pU ) ) ,
|hH 2 2 2 2 by using (7). In summary, the following convex quadratic
(k) D v| +pU |gcci | +σD
RSD (w,v,pU ) := Ψ(z (k) )−Ξ(z (k) ) (k)
(8) program, which provides a minorant maximization for (15),
Φ (w)
over the trust region is solved at the k-th iteration:
(k) (k)
Φ(k) (w) , <{hH (k)
}(2<{hH H (k) maximize ψ (k) , RSD (w, v, pU ) + RUS (w, v, pU ) (15a)
D w D w} − <{hD w }) > 0. (9) w,v,pU
subject to (4e), (4f), (9), (12), (13), (14). (15b)
Next, we turn our attention to the nonconcave function The proposed path-following procedure used to solve the sum-
RUS (w, v, pU ). It is clear that the steps used for tackling rate optimization problem (4) is summarized in Algorithm 1.
RSD (w, v, pU ) cannot be extended to RUS (w, v, pU ) since the Generation of an Initial Point: To successfully initialize
approximate function resulting from (5) is still highly noncon- the computational procedure, we now present a variant of
cave. At this point, we resort on the following inequality [6, Algorithm 1 as follows. We start with modifying (4) into
Eq. (20)]: the following problem of Quality-of-Service (QoS) feasi-
ln 1 + |x|2 /y ≥ ln 1 + |x̄|2 /ȳ − |x̄|2 /ȳ + 2<{x̄∗ x}/ȳ
 
bility: maximize min {RSD (w, v, pU ) − r̄D , RUS (w, v, pU ) −
w,v,pU
− ȳ − (|x̄|2 + ȳ)−1 (|x|2 + y),
 −1 
r̄U , PUeh (w, v, pU ) − p2U }, subject to (4e), (4f), (9).
∀x ∈ C, x̄ ∈ C, y > 0, ȳ > 0. (10) Next, we randomly generate pU > 0 and (w, v) over CN ×1 ,
Applying (10) to RUS (w, v, pU ), the concave quadratic mino- and then scale (w, v) properly to satisfy (4f) and (9). Then,
(k)
rant of RUS (w, v, pU ) at (w(k) , v(k) , pU ) is given by the following convex program is invoked:
RUS (w, v, pU ) ≥ α(k) + β (k) pU − ϕ(w, v, pU ) (11) maximize φ, subject to (4e), (4f), (9), (16)
w,v,pU
(k) (k) (k)
:= RUS (w, v, pU ), where φ , min{RSD (w, v, pU ) − r̄D , RUS (w, v, pU ) − r̄U ,
eh,(k)
where PU (w, v, pU ) − p2U }. The solution of (16) can provide an
(k)  (k)
α(k) , ln 1 + γUS (w(k) , v(k) , pU ) − γUS (w(k) , v(k) , pU ), initial feasible point to execute Algorithm 1 whenever φ ≥ 0.
(k)
β (k) , 2pU ĥH (k)
, v(k) )−1 ĥU , Convergence Analysis: The transformation of nonconcave
U Θ(w
ϕ(w, v, pU ) , Tr [Θ(w(k) , v(k) )−1 − (Θ(w(k) , v(k) ) + objective function (4a) and nonconvex constraints (4b), (4c),
(k) −1
 (4d) satisfy the properties listed in [8], i.e., the feasible point of
(pU )2 ĥU ĥH
U ) ](Θ(w, v) + p2U ĥU ĥH U ) .
the transformed function is also guaranteed to be feasible for
As a result, constraints (4b) and (4c) are innerly approximated
the original function. Therefore, the proposed path-following
by the following convex quadratic constraints
(k) procedure to solve (4) generates a non-decreasing sequence of
RSD (w, v, pU ) ≥ r̄D , (12) objective values, i.e. ψ (k+1) ≥ ψ (k) that provably converges
(k)
RUS (w, v, pU ) ≥ r̄U . (13) to a limited point due to (4f). One can prove that, as in [8]–
[10], the sequence of the obtained solutions for (4) converges
For constraint (4d), it can be observed that both sides at least to a locally optimal solution satisfying the Karush-
are quadratic functions, which are also convex functions. Kuhn-Tucker (KKT) optimality conditions.
Naturally, we can apply the inner approximation method to Complexity Comparison: As problem (15) has 2N + 1
expose the hidden convexity of (4d). Specifically, we itera- real-valued scalar decision variables and 6 quadratic and
tively replace (4d) by linear constraints, its computational complexity per iteration is
O 62.5 (4N 2 + 4N + 7) . On the other hand, the per-iteration

eh,(k)
p2U ≤ PU (w, v, pU ), (14)
complexity of solving (48) in [6] for two-user WPCN system
eh,(k)
where PU (w, v, pU ) is the global lower bound of is O 72.5 (9N 2 + 4M 2 + 12M N + 24N + 16M + 23) , which
(k)
PUeh (w, v, pU ) at the feasible point (w(k) , v(k) , pU ) and it is indeed higher than that of the proposed convex quadratic
4

problem (15). 8
The proposed scheme with EB

Sum-rate (bps/Hz)
Application of a Conic Programming: As an effort to reduce
6 The proposed scheme without EB
the computation time, we further formulate (15) as a second-
The scheme in [6]
order cone (SOC) programming which can be solved more 4
efficiently by modern convex solvers. To arrive at the SOC
η = 0.5
representation, we use the fact that a hyperbolic constraint 2 η = 0.1
z 2 ≤ xy for x, y ≥ 0 is equivalent to k[z 0.5(x −
y)]T k2 ≤ 0.5(x+y). In doing so, we introduce slack variables 0
10 15 20 25 30
(k)
ϑ ≥ 0 and ω ≥ 0 to equivalently rewrite RSD (w, v, pU ) Downlink power budget (dBm)
(k) (k)
and RUS (w, v, pU ) by RSD (ϑ) := Ψ(z (k) ) − Ξ(z (k) )ϑ and
(k)
RUS (pU , ω) := α(k) +β (k) pU −ω, with imposing the following Fig. 2. Sum-rate comparison between the proposed scheme with and without
SOC constraints: EB, and the scheme in [6] with µS = −110 dB and r̄U = 1 (bps/Hz).
hD v, pU gcci , σD , 0.5(Φ(k) (w) − ϑ) T ≤ 0.5(Φ(k) (w) + ϑ),
 H 
2
3.5

Avg. DL rate (bps/Hz)


(17)
√ √ 3
µ wH Gsi Θ̄0.5 , µ vH Gsi Θ̄0.5 , σS Tr(Θ̄)0.5 ,
S S
T
pU ĥH 0.5

U Θ̄ , 0.5(ω − 1) 2 ≤ 0.5(ω + 1), (18) 2 µS = 0 dB
where µS = −50 dB
(k) −1 µS = −110 dB
Θ̄ , Θ(w(k) , v(k) )−1 − Θ(w(k) , v(k) ) + (pU )2 ĥU ĥH

U . 1
1 2 3 4
Since constraints (4f) and (14) admit SOC representation, we
UL rate threshold (bps/Hz)
reformulate problem (15) as the following SOC programming:
Fig. 3. Trade-off between UL and DL rates under different values of the
(k) (k)
maximize ψ (k) , RSD (ϑ) + RUS (pU , ω) (19a) degree of SI mitigation at the H-AP with η = 0.5 and PS = 25 dBm.
w,v,pU ,ϑ,ω
(k) (k)
subject to RSD (ϑ) ≥ r̄D , RUS (pU , ω) ≥ r̄U , achieve much higher sum-rate than that in [6]. The sum-
(4e), (4f), (9), (14), (17), (18). (19b) rates of all considered schemes significantly decrease as the
energy conversion efficiency drops from 0.5 to 0.1. Also, when
The equivalence between (15) and (19) is guaranteed by
η = 0.1, the performance gaps between the schemes are not
noting the fact that constraints (17) and (18) must hold with
significant. Additionally, according to our study, the power
equality at optimum. Note that we consider a simplified
allocated for the EB is around 0.7% to 1% of the total effective
system to facilitate the performance evaluation of the proposed
transmit power budget.
scheme. Nonetheless, for a large-scale network, the proposed
In Fig. 3, we study the impact of the UL data rate threshold
mathematical framework of convexification method can still
and the degree of SI mitigation on the achievable average DL
be applied to the corresponding optimization problem.
data rate, which is obtained by reformulating problem (15) as
(k)
maximize RSD (w, v, pU ), subject to (4e), (4f), (9), (12), (14).
w,v,pU
IV. N UMERICAL R ESULTS As can be seen, for a given power budget and a given UL
data rate threshold, the average DL rate decreases as µS
For the purpose of exposition, the simulation conditions are increases since there is a stronger SI at the H-AP. In addition,
set up as follows. The channels (hD , ȟU , ĥU , gcci ) are assumed the average DL data rate decreases as the QoS of the UL
to follow complex Gaussian distribution with zero mean, as transmission increases. Moreover, we numerically observe
in [6]. The variance of hD is set to −30 dB while that of that when PS is low, the recycled energy highly contributes
(ȟU , ĥU ) to −20 dB, which implies that the UL user should to the transmit power of the UL user; in contrast, when PS is
be deployed closer to the H-AP than the DL user due to the high, the role of the energy recycling at the UL user becomes
practical constraint of the RF-EH. The variance of the CCI less significant.
channel gcci is set to −20 dB. The SI channels (Gsi , gsi )
are generated as independent and identically distributed Rician
random variables with unit non-centrality parameter and the V. C ONCLUSION
scale parameter. Other parameters are set as M = N = 3,
σS2 = σD2 = σU2 = −80 dBm, the signal bandwidth is 1 MHz. In this paper, we have proposed a novel simultaneous UL
In Fig. 2, we provide the performance comparison of and DL transmission scheme for the WPCNs. Specifically, by
the proposed scheme with and without energy beamforming adopting WPT and FD techniques, the UL user can harvest
(EB), and the scheme proposed in [6], where the sum-rate energy from the H-AP and recycle energy from the SI. We
is plotted as a function of the transmit power budget under have formulated the nonconvex optimization problem of the
different values of η. As can be observed, the proposed sum-rate maximization and proposed the path-following algo-
scheme indeed provides better performance than the prior rithm to attain at least a locally optimal solution. Numerical
work in [6]. Specifically, when η = 0.5, the use of the results have shown that the proposed scheme provides essential
EB shows its effectiveness since the proposed scheme can performance improvements for the WPCNs.
5

R EFERENCES [6] V.-D. Nguyen, T. Q. Duong, H. D. Tuan, O.-S. Shin, and H. V. Poor,
“Spectral and energy efficiencies in full-duplex wireless information and
[1] D. Korpi, J. Tamminen, M. Turunen, T. Huusari, Y. S. Choi, L. Anttila,
power transfer,” IEEE Trans. Commun., vol. 65, no. 5, pp. 2220–2233,
S. Talwar, and M. Valkama, “Full-duplex mobile device: Pushing the
May 2017.
limits,” IEEE Commun. Mag., vol. 54, no. 9, pp. 80–87, Sep. 2016.
[7] Y. Zeng and R. Zhang, “Full-duplex wireless-powered relay with self-
[2] W. Afifi, M. J. Abdel-Rahman, M. Krunz, and A. B. MacKenzie, “Full-
energy recycling,” IEEE Wireless Commun. Lett., vol. 4, no. 2, pp. 201–
duplex or half-duplex: A bayesian game for wireless networks with
204, Apr. 2015.
heterogeneous self-interference cancellation capabilities,” IEEE Trans.
[8] B. R. Marks and G. P. Wright, “A general inner approximation algorithm
Mobile Comput., vol. 17, no. 5, pp. 1076–1089, May 2018.
for nonconvex mathematical programs,” Operations Research, vol. 26,
[3] H. Liu, K. J. Kim, K. S. Kwak, and H. V. Poor, “Power splitting-based
no. 4, pp. 681–683, Jul.-Aug. 1978.
SWIPT with decode-and-forward full-duplex relaying,” IEEE Trans.
[9] V.-D. Nguyen, H.-V. Nguyen, O. A. Dobre, and O.-S. Shin, “A new
Wireless Commun., vol. 15, no. 11, pp. 7561–7577, Nov. 2016.
design paradigm for secure full-duplex multiuser systems,” IEEE J.
[4] D. Wang, R. Zhang, X. Cheng, and L. Yang, “Capacity-enhancing full-
Select. Areas Commun., vol. 36, no. 7, pp. 1480–1498, Jul. 2018.
duplex relay networks based on power-splitting (PS-)SWIPT,” IEEE
[10] A. Yadav, O. A. Dobre, and H. V. Poor, “Is self-interference in full-
Trans. Veh. Commun., vol. 66, no. 6, pp. 5445–5450, Jun. 2017.
duplex communications a foe or a friend?” IEEE Sig. Processing Lett.,
[5] S. Bi, Y. Zeng, and R. Zhang, “Wireless powered communication
vol. 25, no. 7, pp. 951–955, Jul. 2018.
networks: An overview,” IEEE Wireless Commun., vol. 23, no. 2, pp.
10–18, Apr. 2016.

View publication stats

Potrebbero piacerti anche