ﻻ يوجد ملخص باللغة العربية
Full-duplex millimeter wave (mmWave) communication has shown increasing promise for self-interference cancellation via hybrid precoding and combining. This paper proposes a novel mmWave multiple-input multiple-output (MIMO) design for configuring the analog and digital beamformers of a full-duplex transceiver. Our design is the first to holistically consider the key practical constraints of analog beamforming codebooks, a minimal number of radio frequency (RF) chains, limited channel knowledge, beam alignment, and a limited receive dynamic range. To prevent self-interference from saturating the receiver of a full-duplex device having limited dynamic range, our design addresses saturation on a per-antenna and per-RF chain basis. Numerical results evaluate our design in a variety of settings and validate the need to prevent receiver-side saturation. These results and the corresponding insights serve as useful design references for practical full-duplex mmWave transceivers.
This paper investigates the application of non-orthogonal multiple access in millimeter-Wave communications (mmWave-NOMA). Particularly, we consider downlink transmission with a hybrid beamforming structure. A user grouping algorithm is first propose
In this work, we consider the design of hybrid analog-digital (HAD) multi-carrier MIMO-OFDM two-way relaying systems, where the relay station is equipped with a HAD amplify-and-forward architecture and every mobile station is equipped with a fully-di
In this paper, we focus on reduced complexity full duplex Multiple-Input Multiple-Output (MIMO) systems and present a joint design of digital transmit and receive beamforming with Analog and Digital (A/D) self-interference cancellation. We capitalize
This paper studies intelligent reflecting surface (IRS)-aided full-duplex (FD) wireless-powered communication network (WPCN), where a hybrid access point (HAP) broadcasts energy signals to multiple devices for their energy harvesting in the downlink
In this paper, we present a novel scenario for directional modulation (DM) networks with a full-duplex (FD) malicious attacker (Mallory), where Mallory can eavesdrop the confidential message from Alice to Bob and simultaneously interfere Bob by sendi