Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
net/publication/329461201
CITATIONS READS
3 414
4 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Tri Nhu Do on 03 January 2019.
symbol to the FD H-AP, and thus needs to harvest energy represents the UL channel vector from U to S; Gsi ∈ CN ×M
from the RF signal, as in [6]. To exploit self-energy recycling, and µS ∈ [0, 1] represent the SI channel matrix and the degree
we assume that U transmits an information signal to S with of SI mitigation at S, respectively; nS ∼ CN(0, σS2 IM ) denotes
one antenna while receiving energy from the other antenna the AWGN at S.
at the same time. DL user is an HD single-antenna user We assume that the aggregate interferences for both DL and
since it intends to receive only the information signal from UL are Gaussian distributed. Then, the DL and UL achievable
the FD H-AP. DL and UL transmissions of the proposed rates in nat/sec/Hz can be written as
WPCN can be described as follows. On the DL transmission, S
RSD (w, v, pU ) = ln 1 + γSD (w, v, pU ) , (3a)
communicates with D via an information beamforming while
RUS (w, v, pU ) = ln 1 + γUS (w, v, pU ) , (3b)
concurrently powering U using an energy beamforming. On
the UL transmission, U transmits its information signal to S respectively, where γSD (w, v, pU ) and γUS (w, v, pU ) are the
by using the harvested energy. It is noteworthy that DL and signal-to-interference-plus-noise ratio (SINR) at D and S,
UL transmissions are carried out on the same time-frequency which are given by γSD (w, v, pU ) = |hH 2 H 2
D w| /(|hD v| +
2 2 2 2 H −1
resource. pU |gcci | +σD ), γUS (w, v, pU ) = pU ĥU Θ(w, v) ĥU , with
The complex baseband equivalent signal transmitted at the Θ(w, v) , µS GH H H H 2
si ww Gsi +µS Gsi vv Gsi +σS IM . Herein,
source can be written as x = wxD + vxe , where w ∈ CN ×1 to maximize the UL rate we adopt the minimum mean square
and v ∈ CN ×1 denote the information and energy beamform- error receiver (MMSE) at the source in decoding the UL
ing vectors for D and U, respectively, xD with E[|xD |2 ] = 1 signal. Clearly, as seen in (3), both DL and UL transmissions
and xe with E[|xe |2 ] = 1 are the information and energy use a full communication time block to transmit their signals,
signals intended for D and U, respectively. Assuming a flat while only a fraction of time block is used for UL transmis-
fading channel, the received signals at D and U on the DL sion in [6]. Therefore, the proposed transmission scheme is
channel, respectively, can be expressed as expected to achieve better performance.
ySD = hH H
D wxD + hD vxe + pU gcci xU + nD , (1) B. Optimization Problem Formulation
H H √
ySU = ȟU wxD + ȟU vxe + pU µU gsi xU + nU , (2) Let r̄D and r̄U (nat/sec/Hz) set the rate thresholds for the DL
N ×1 N ×1 and UL users, respectively; PS is a given power budget at the
where hD ∈ C and ȟU ∈ C denote the channel vectors
from S to D and to U, respectively; pU and xU with E[|xU |2 ] = 1 H-AP and PUeh (w, v, pU ) , EU (w, v, pU )/T . The objective of
are the transmit power coefficient and message transmitted this study is to maximize the sum-rate of the system, which
by U to S; gcci ∈ C denotes a channel coefficient for the can be mathematically expressed as
co-channel interference (CCI) from U to D; nD ∼ CN(0, σD2 ) maximize RSD (w, v, pU ) + RUS (w, v, pU ) (4a)
w,v,pU
and nU ∼ CN(0, σU2 ) represent the additive white Gaussian
noise (AWGN) at D and U, respectively; gsi denotes a channel subject to RSD (w, v, pU ) ≥ r̄D , (4b)
coefficient for the SI created by the FD transmission at U, while RUS (w, v, pU ) ≥ r̄U , (4c)
µU ∈ [0, 1] is used to stand for the degree of SI mitigation after p2U ≤ PUeh (w, v, pU ), (4d)
interference isolation and cancellation process at U.
pU > 0, (4e)
To fully utilize the SI, we further assume that the SI is un-
2 2
suppressed, i.e., the SI cancellation (SIC) is inactivated, at the kwk + kvk ≤ PS . (4f)
UL user. Thus, in the sequel of the paper, we set µU = 1, i.e., Since both RSD (w, v, pU ) and RUS (w, v, pU ) are nonconcave
µU = 0 dB, and omit the symbol in equations. The harvested functions, problem (4) is nonconvex. Hence, it is challenging
energy at U, i.e., EU (w, v, pU ) = ηE[|ySU |2 ]T , can be detailed to find the optimal solution in general. In the following
from (2) as EU (w, v, pU ) = η(|ȟH 2 H 2 2 2
U w| + |ȟU v| + pU |gsi | )T , section, we propose a computationally efficient path-following
where η and T are the energy conversion efficiency at U and procedure that leads to a stationary point of (4). Note that
the length of a communication time block, respectively. The the UL and DL users may change their roles in another
term p2U |gsi |2 represents the energy recycled from the transmit communication time block, which leads to a different network
signal of U. As a result of energy recycling, the UL user scenario and the corresponding new optimization problem.
is expected to harvest more energy from the RF signal than Nevertheless, the following mathematical framework of con-
the counterpart in [6]. Note that the energy recycling model vexification method proposed to solve (4) can still be applied
considered in this paper is different from that proposed in to such a problem.
[7] since U does not need to use up the harvested energy to
transmit its signal. Specifically, the transmit power1 of U is
III. P ROPOSED PATH -F OLLOWING M ETHOD
constrained as described in (4d) in the next subsection, i.e.,
p2U ≤ PUeh , EU (w, v, pU )/T . The proposed path-following algorithm is based on the inner
Meanwhile, UL user U transmits its signal to the source approximation framework in [8]. The main idea is to provide a
S on the UL channel, which can be expressed as yUS = minorant of RSD (w, v, pU ) and RUS (w, v, pU ), which has been
√ √ M ×1
pU ĥU xU + µS GH H
si wxD + µS Gsi vxe +nS , where ĥU ∈ C widely used in wireless communication designs, e.g., [6], [9].
Let us deal with the nonconcavity of the function
1 We assume that the energy harvested at the UL user can be temporarily
RSD (w, v, pU ) first by using the following inequality:
stored in the UL user’s battery and then is used to transmit data, where the
delay is negligible, as in [3], [4]. f (z) , ln(1 + 1/z) ≥ Ψ(z̄) − Ξ(z̄)z , f¯(z), ∀z, z̄, > 0, (5)
3
where Ψ(z̄) , ln(1+1/z̄)+1/(z̄ +1) and Ξ(z̄) , 1/z̄(z̄ +1). Algorithm 1 Proposed Path-following Algorithm to Solve (4)
Inequality (5) holds true due to the convexity of the function Initialization:
f (z) [9], and the function f¯(z) is a concave minorant of 1: Solve (16) to generate an initial feasible point.
f (z) at z̄. Let 1/z := γSD (w, v, pU ) and 1/z̄ = 1/z (k) := 2: Set k := 0.
(k) (k)
γSD (w(k) , v(k) , pU ), where (w(k) , v(k) , pU ) is a feasible Path-following procedure:
point at the (k − 1)-th iteration. Then, it follows that 3: repeat
(k)
|hH v|2 +p2U |gcci |2 +σD2 4: Solve (15) with (w(k) , v(k) , pU ) to obtain the optimal
RSD (w, v, pU ) ≥ Ψ(z (k) )−Ξ(z (k) ) D . (6) solution (w? , v? , p?U ).
|hH
D w|
2
(k+1)
5: Update w(k+1) := w? , v(k+1) := v? , pU := p?U .
In addition, we can equivalently replace |hH D w|
2
by
H 2 H 6: Set k := k + 1.
(<{hD w̄}) with <{hD w̄} ≥ 0 [9]. Due to the convexity
7: until Convergence
of function |t|2 , the following inequality holds:
|t|2 ≥ 2(t(k) )∗ t − |t(k) |2 , ∀t, t(k) ∈ C. (7)
is given as
eh,(k)
PU (w, v, pU ) := η 2<{(w(k) )H ȟU ȟH H (k) 2
From (6) and (7), a concave quadratic minorant of U w} − |ȟU w |
(k)
RSD (w, v, pU ) at (w(k) , v(k) , pU ) reads as + 2<{(v(k) )H ȟU ȟH H (k) 2
U v} − |ȟU v |
2 (k) (k) 2
+ |gsi | (2pU pU − (pU ) ) ,
|hH 2 2 2 2 by using (7). In summary, the following convex quadratic
(k) D v| +pU |gcci | +σD
RSD (w,v,pU ) := Ψ(z (k) )−Ξ(z (k) ) (k)
(8) program, which provides a minorant maximization for (15),
Φ (w)
over the trust region is solved at the k-th iteration:
(k) (k)
Φ(k) (w) , <{hH (k)
}(2<{hH H (k) maximize ψ (k) , RSD (w, v, pU ) + RUS (w, v, pU ) (15a)
D w D w} − <{hD w }) > 0. (9) w,v,pU
subject to (4e), (4f), (9), (12), (13), (14). (15b)
Next, we turn our attention to the nonconcave function The proposed path-following procedure used to solve the sum-
RUS (w, v, pU ). It is clear that the steps used for tackling rate optimization problem (4) is summarized in Algorithm 1.
RSD (w, v, pU ) cannot be extended to RUS (w, v, pU ) since the Generation of an Initial Point: To successfully initialize
approximate function resulting from (5) is still highly noncon- the computational procedure, we now present a variant of
cave. At this point, we resort on the following inequality [6, Algorithm 1 as follows. We start with modifying (4) into
Eq. (20)]: the following problem of Quality-of-Service (QoS) feasi-
ln 1 + |x|2 /y ≥ ln 1 + |x̄|2 /ȳ − |x̄|2 /ȳ + 2<{x̄∗ x}/ȳ
bility: maximize min {RSD (w, v, pU ) − r̄D , RUS (w, v, pU ) −
w,v,pU
− ȳ − (|x̄|2 + ȳ)−1 (|x|2 + y),
−1
r̄U , PUeh (w, v, pU ) − p2U }, subject to (4e), (4f), (9).
∀x ∈ C, x̄ ∈ C, y > 0, ȳ > 0. (10) Next, we randomly generate pU > 0 and (w, v) over CN ×1 ,
Applying (10) to RUS (w, v, pU ), the concave quadratic mino- and then scale (w, v) properly to satisfy (4f) and (9). Then,
(k)
rant of RUS (w, v, pU ) at (w(k) , v(k) , pU ) is given by the following convex program is invoked:
RUS (w, v, pU ) ≥ α(k) + β (k) pU − ϕ(w, v, pU ) (11) maximize φ, subject to (4e), (4f), (9), (16)
w,v,pU
(k) (k) (k)
:= RUS (w, v, pU ), where φ , min{RSD (w, v, pU ) − r̄D , RUS (w, v, pU ) − r̄U ,
eh,(k)
where PU (w, v, pU ) − p2U }. The solution of (16) can provide an
(k) (k)
α(k) , ln 1 + γUS (w(k) , v(k) , pU ) − γUS (w(k) , v(k) , pU ), initial feasible point to execute Algorithm 1 whenever φ ≥ 0.
(k)
β (k) , 2pU ĥH (k)
, v(k) )−1 ĥU , Convergence Analysis: The transformation of nonconcave
U Θ(w
ϕ(w, v, pU ) , Tr [Θ(w(k) , v(k) )−1 − (Θ(w(k) , v(k) ) + objective function (4a) and nonconvex constraints (4b), (4c),
(k) −1
(4d) satisfy the properties listed in [8], i.e., the feasible point of
(pU )2 ĥU ĥH
U ) ](Θ(w, v) + p2U ĥU ĥH U ) .
the transformed function is also guaranteed to be feasible for
As a result, constraints (4b) and (4c) are innerly approximated
the original function. Therefore, the proposed path-following
by the following convex quadratic constraints
(k) procedure to solve (4) generates a non-decreasing sequence of
RSD (w, v, pU ) ≥ r̄D , (12) objective values, i.e. ψ (k+1) ≥ ψ (k) that provably converges
(k)
RUS (w, v, pU ) ≥ r̄U . (13) to a limited point due to (4f). One can prove that, as in [8]–
[10], the sequence of the obtained solutions for (4) converges
For constraint (4d), it can be observed that both sides at least to a locally optimal solution satisfying the Karush-
are quadratic functions, which are also convex functions. Kuhn-Tucker (KKT) optimality conditions.
Naturally, we can apply the inner approximation method to Complexity Comparison: As problem (15) has 2N + 1
expose the hidden convexity of (4d). Specifically, we itera- real-valued scalar decision variables and 6 quadratic and
tively replace (4d) by linear constraints, its computational complexity per iteration is
O 62.5 (4N 2 + 4N + 7) . On the other hand, the per-iteration
eh,(k)
p2U ≤ PU (w, v, pU ), (14)
complexity of solving (48) in [6] for two-user WPCN system
eh,(k)
where PU (w, v, pU ) is the global lower bound of is O 72.5 (9N 2 + 4M 2 + 12M N + 24N + 16M + 23) , which
(k)
PUeh (w, v, pU ) at the feasible point (w(k) , v(k) , pU ) and it is indeed higher than that of the proposed convex quadratic
4
problem (15). 8
The proposed scheme with EB
Sum-rate (bps/Hz)
Application of a Conic Programming: As an effort to reduce
6 The proposed scheme without EB
the computation time, we further formulate (15) as a second-
The scheme in [6]
order cone (SOC) programming which can be solved more 4
efficiently by modern convex solvers. To arrive at the SOC
η = 0.5
representation, we use the fact that a hyperbolic constraint 2 η = 0.1
z 2 ≤ xy for x, y ≥ 0 is equivalent to k[z 0.5(x −
y)]T k2 ≤ 0.5(x+y). In doing so, we introduce slack variables 0
10 15 20 25 30
(k)
ϑ ≥ 0 and ω ≥ 0 to equivalently rewrite RSD (w, v, pU ) Downlink power budget (dBm)
(k) (k)
and RUS (w, v, pU ) by RSD (ϑ) := Ψ(z (k) ) − Ξ(z (k) )ϑ and
(k)
RUS (pU , ω) := α(k) +β (k) pU −ω, with imposing the following Fig. 2. Sum-rate comparison between the proposed scheme with and without
SOC constraints: EB, and the scheme in [6] with µS = −110 dB and r̄U = 1 (bps/Hz).
hD v, pU gcci , σD , 0.5(Φ(k) (w) − ϑ) T
≤ 0.5(Φ(k) (w) + ϑ),
H
2
3.5
R EFERENCES [6] V.-D. Nguyen, T. Q. Duong, H. D. Tuan, O.-S. Shin, and H. V. Poor,
“Spectral and energy efficiencies in full-duplex wireless information and
[1] D. Korpi, J. Tamminen, M. Turunen, T. Huusari, Y. S. Choi, L. Anttila,
power transfer,” IEEE Trans. Commun., vol. 65, no. 5, pp. 2220–2233,
S. Talwar, and M. Valkama, “Full-duplex mobile device: Pushing the
May 2017.
limits,” IEEE Commun. Mag., vol. 54, no. 9, pp. 80–87, Sep. 2016.
[7] Y. Zeng and R. Zhang, “Full-duplex wireless-powered relay with self-
[2] W. Afifi, M. J. Abdel-Rahman, M. Krunz, and A. B. MacKenzie, “Full-
energy recycling,” IEEE Wireless Commun. Lett., vol. 4, no. 2, pp. 201–
duplex or half-duplex: A bayesian game for wireless networks with
204, Apr. 2015.
heterogeneous self-interference cancellation capabilities,” IEEE Trans.
[8] B. R. Marks and G. P. Wright, “A general inner approximation algorithm
Mobile Comput., vol. 17, no. 5, pp. 1076–1089, May 2018.
for nonconvex mathematical programs,” Operations Research, vol. 26,
[3] H. Liu, K. J. Kim, K. S. Kwak, and H. V. Poor, “Power splitting-based
no. 4, pp. 681–683, Jul.-Aug. 1978.
SWIPT with decode-and-forward full-duplex relaying,” IEEE Trans.
[9] V.-D. Nguyen, H.-V. Nguyen, O. A. Dobre, and O.-S. Shin, “A new
Wireless Commun., vol. 15, no. 11, pp. 7561–7577, Nov. 2016.
design paradigm for secure full-duplex multiuser systems,” IEEE J.
[4] D. Wang, R. Zhang, X. Cheng, and L. Yang, “Capacity-enhancing full-
Select. Areas Commun., vol. 36, no. 7, pp. 1480–1498, Jul. 2018.
duplex relay networks based on power-splitting (PS-)SWIPT,” IEEE
[10] A. Yadav, O. A. Dobre, and H. V. Poor, “Is self-interference in full-
Trans. Veh. Commun., vol. 66, no. 6, pp. 5445–5450, Jun. 2017.
duplex communications a foe or a friend?” IEEE Sig. Processing Lett.,
[5] S. Bi, Y. Zeng, and R. Zhang, “Wireless powered communication
vol. 25, no. 7, pp. 951–955, Jul. 2018.
networks: An overview,” IEEE Wireless Commun., vol. 23, no. 2, pp.
10–18, Apr. 2016.