Next Article in Journal
Rényi Entropy in Statistical Mechanics
Next Article in Special Issue
Coding for Large-Scale Distributed Machine Learning
Previous Article in Journal
Information Theoretic Methods for Variable Selection—A Review
Previous Article in Special Issue
Coded Caching for Broadcast Networks with User Cooperation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Degrees of Freedom of a K-User Interference Channel in the Presence of an Instantaneous Relay

by
Ali H. Abdollahi Bafghi
1,
Mahtab Mirmohseni
2,* and
Masoumeh Nasiri-Kenari
1
1
Department of Electrical Engineering, Sharif University of Technology, Tehran P932+FM4, Iran
2
Institute for Communication Systems (ICS), University of Surrey, Guildford GU2 7XH, UK
*
Author to whom correspondence should be addressed.
Entropy 2022, 24(8), 1078; https://doi.org/10.3390/e24081078
Submission received: 6 June 2022 / Revised: 25 July 2022 / Accepted: 26 July 2022 / Published: 4 August 2022
(This article belongs to the Special Issue Information Theoretic Methods for Future Communication Systems)

Abstract

:
In this paper, we study the degrees of freedom (DoF) of a frequency-selective K-user interference channel in the presence of an instantaneous relay (IR) with multiple receiving and transmitting antennas. We investigate two scenarios based on the IR antennas’ cooperation ability. First, we assume that the IR receiving and transmitting antennas can coordinate with each other and that the transmitted signal of each transmitting antenna can depend on the received signals of all receiving antennas, and we derive lower and upper bounds for the sum DoF of this model. In an interference alignment scheme, we divide receivers into two groups called clean and dirty receivers. We design our scheme such that a part of the messages of clean receivers can be de-multiplexed at the IR. Thus, the IR can use these message streams for an interference cancellation at the clean receivers. Next, we consider an IR, the antennas of which do not have coordination with each other and where the transmitted signal of each transmitting antenna depends only on the received signal of its corresponding receiving antenna. We also derive lower and upper bounds for the sum DoF for this model of IR. We show that the achievable sum DoF decreases considerably compared with the coordinated case. In both of these models, our schemes achieve the maximum K sum DoF if the number of transmitting and receiving antennas is more than a finite threshold.

1. Introduction

Spectrum sharing in wireless networks seems to be an inevitable solution to increasing bandwidth demands. How to treat interference is one of the main challenges in these scenarios. Interference alignment has proved to be a useful solution that aligns all interference signals into a smaller subspace, allowing the remaining signal space to be used for the transmission of main signals. Thereby, it can achieve the maximum degrees of freedom (DoF) of K 2 in a K-user interference channel [1]. An interesting question would be to find tools that can improve this maximum value for the DoF. Instantaneous relay (relay-without-delay; IR) is one of these tools [2,3].
For an IR, a transmitted signal in a t-th time slot ( X IR ( t ) ) is a function of all received signals ( Y IR ( t ) ) from a first time slot up to a current (t-th) time slot, i.e., Y IR ( t ) = f IR ( X IR ( 1 ) , , X IR ( t ) ) , while for a classic relay, a transmitted signal in a t-th time slot does not depend on a received signal in the t-th (current) time slot (it was shown in [4] that a classic relay cannot increase the DoF of a K-user interference channel), i.e., Y R ( t ) = f R ( X R ( 1 ) , , X R ( t 1 ) ) . Though for the current technology, an IR might seem impractical, there have been significant results on an IR, and active reconfigurable intelligent surface (RIS) is a promising technology that makes it possible to realize an IR in the near future [5]. An RIS is a special case of the IR model for which a transmitted signal in the t-th time slot ( X RIS ( t ) ) is a function of the received signal ( Y RIS ( t ) ) in the t-th time slot only, i.e., Y RIS ( t ) = f RIS ( X RIS ( t ) ) .
The capacities of wireless networks in the presence of an IR were studied in [6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30]. El Gamal et al., in [6], showed that in the presence of an IR, rates higher than an existing cut-set bound for a classic relay can be achieved for a point-to-point channel. In [7], a new upper bound was derived for the capacity of a channel with an IR. The authors in [8] studied a two-user interference channel in the presence of an IR and derived an outer bound for the Gaussian case under strong and very strong interference conditions. They also introduced an achievable scheme based on instantaneous amplify-and-forward relaying. In [9], the authors studied a K-user interference channel in the presence of an IR in two scenarios, wherein transmitters and receivers were aware and not aware of the existence of an IR. It was shown that in both cases, an IR can enlarge the rate region and increase user fairness. In [10], the authors studied general networks in the presence of an IR and derived cut-set bounds for two cases of the IR having or not having its own message; they showed that the proposed bounds are tight in some cases. In [11], it was proven that the networks with an IR can be considered a channel with in-block memory. Then, a cut-set bound was characterized that generalizes existing cut-set bounds.
As we stated before, an RIS is a special case of the generic IR model; thus, we will review some related work on the capacities of RIS-assisted networks. In [12], the fundamental capacity limit of RIS-assisted multiple-input multiple-output (MIMO) communications systems was studied by using a joint optimization of a MIMO transmit covariance matrix and RIS phase shifts. In [13], RIS-assisted communication systems were studied wherein a transmitter could control an RIS with a finite-rate link and information-theoretic limits were derived. It was proven that the capacity is achievable if information is jointly encoded in a transmitted signal and RIS phase shifts. In [14], a downlink non-orthogonal multiple-access (NOMA) RIS-assisted communication system was studied wherein multiple users were served by only one base station (BS). The sum rate of the users was maximized by using a joint optimization of a beamforming vector at the BS and the phase shifts of the RIS, wherein a successive interference cancellation decoding rate and RIS scattering element constraints existed. In [15], the usage of an RIS was studied for a rank improvement of MIMO communication channels.
From a DoF perspective, an interference alignment signaling scheme for a MIMO X-channel, which outperforms the achievable DoF of previous signaling schemes, was proposed in [16]. It is well known that the DoF of the frequency or time-selective K-user interference channel is K 2 [1], which is an important result of the interference alignment technique. We remark that the DoF of interference channels is an important problem, which has been studied vastly in the literature; e.g., the DoF of a multi-input multi-output (MIMO) interference channel [17], the DoF region of an interference channel [18,19], and the DoF of an interference channel with a partial network topology [20,21,22,23,24,25]. Interference alignment is an important technique, which has a vital impact on proving DoF achievability theorems for multi-user wireless networks. A survey of the results available on the interference alignment technique was reviewed in [26]. For the DoF of networks in the presence of an IR, the sum DoF of a two-user interference channel assisted by an IR, with M antennas for all nodes, was studied in [3], and it was proven that the DoF of 3 M 2 can be achieved. The DoF of an M antenna three-user interference channel assisted by an IR was studied in [27], and it was shown that a DoF of 2 M is achievable. The DoF of a two-way K-user IR-aided interference channel, when the IR is equipped with 2 K antennas, was studied in [28]. It was demonstrated that the DoF of K can be achieved. The DoF of a two-user interference channel in the presence of an IR, when there is an arbitrary number of IR transmitting and receiving antennas, was studied in [29]. An inner and two outer bounds were obtained. For a K-user interference channel assisted by an IR wherein the IR can only instantaneously amplify and forward a received signal in a current channel use, with the same number of antennas at all nodes, an achievable scheme and an outer bound were proposed in [30]. Though the DoF in some special cases wherein K = 2 or K ( K 1 ) IRs was derived, a general achievable DoF was not obtained. For a K-user interference channel in the presence of active and passive RISs, inner and outer bounds on a DoF region and lower and upper bounds on a sum DoF were derived in [31]. For both active and passive RISs, it was shown that by employing a sufficient number of elements for RIS, a K sum DoFs can be achieved. In [32], it was shown that when there is a line-of-sight link between an RIS and transceivers and there is no direct link between the transceivers, the phases of RIS elements can be adjusted such that all interference can be canceled and a maximum K DoF can be achieved in a K-user interference channel if the number of RIS elements is more than a finite value.
The goal of this paper was to study the sum DoF of a frequency-selective K-user interference channel in the presence of an IR. To the best of our knowledge, although the DoF of two- and three-user interference channels and a scenario in which there are K ( K 1 ) IRs have been studied, the sum DoF of a frequency-selective K-user interference channel (wherein symbol extensions are in the frequency domain) in the presence of a multi-input multi-output (MIMO) IR has not been characterized. Our contributions are as follows:
  • We provide lower and upper bounds for the sum DoF of a K-user interference channel in the presence of a MIMO IR with Q receiving antennas and W transmitting antennas, which can coordinate with each other, i.e., each transmit antenna has access to all receiving antennas. For this purpose, we propose an interference alignment-based coding scheme in which we divide the receivers into two groups called clean and dirty receivers. We design beamforming vectors such that some message symbols corresponding to the clean receivers can be de-multiplexed at the IR. By de-multiplexing, we mean that the IR separates only some of the message symbols using linear operations without removing additive noise. Then, the IR utilizes the de-multiplexed symbols for an interference cancellation at the clean receivers. Our proposed scheme increases the DoF for W > K 2 compared to a case without an IR. Moreover, we show that if the number of IR antennas exceeds a finite threshold, the maximum DoF of K can be achieved, and we characterize this threshold.
  • Moreover, we derive lower and upper bounds for the sum DoF for a special kind of IR for which the IR has the same number of receiving and transmitting antennas and the antennas do not have coordination with each other, i.e., the i-th transmitting antenna has access to the i-th receiving antenna only. We extend the coding scheme for this case and derive an achievable DoF. Similar to a coordinated IR, we show that by considering a number of IR antennas more than a finite threshold, the maximum DoF of K can be achieved. Our derivations show that the achievable DoF decreases considerably compared with the coordinated IR.
This paper is organized as follows. In Section 2, we present the system model. In Section 3 and Section 4, we discuss our main results for the coordinated and non-coordinated IRs, respectively. In Section 5, we present some numerical results to evaluate our proposed schemes. Finally, in Section 6, we conclude the paper.
Notations: Bold letters demonstrate matrices. Calligraphic uppercase letters denote sets and vector spaces. R is the set of real numbers. For the set A , | A | indicates the cardinality of A . V T and V H are the transposition and Hermitian of matrix V , respectively. diag ( a 1 , , a m ) denotes a diagonal matrix with the diagonal elements a 1 , , a m . The function f ( ρ ) is o ( log ( ρ ) ) if
lim ρ | f ( ρ ) | log ( ρ ) = 0 .
Sequence a ( n ) goes to infinity with O ( g ( n ) ) if
0 < lim n a ( n ) | g ( n ) | < .
N is the set of natural numbers, and W is the set of non-negative integers.

2. System Model and Preliminaries

2.1. System Model

We consider a K-user interference channel with an IR in which K single-antenna transmitters send their messages to K single-antenna receivers. In this system, the i-th transmitter sends the message w [ i ] W [ i ] = 1 , , 2 T r i to the i-th receiver, where r i is the transmission rate corresponding to the i-th transmitter and T is the number of channel uses (in this paper, each channel use corresponds to each frequency slot and all transmissions are in the same time cycle). We assume an IR with Q receiving antennas and W transmitting antennas. Figure 1 shows the system model.
We consider a frequency-selective channel. Due to the instantaneity of the IR, it can process the signals received from all frequency slots in the current time cycle and transmit signals in different frequency slots in the same time cycle, which affects the received signals at the receivers in all frequency slots. The received signal at the j-th receiver in the t-th frequency slot ω t is shown by Y [ j ] ( ω t ) and is presented as follows (note that in the general case, the IR-transmitted signal is a function of the received signal in the past time cycles in addition to the current time cycle. In the achievability proofs of this paper, the signals of past time cycles are not needed and transmissions in different frequency slots are at the same time cycle. However, for the upper bounds, the general case is considered.):
Y [ j ] ( ω t ) = i = 1 K H [ j i ] ( ω t ) X [ i ] ( ω t ) + u = 1 W H IR R [ j u ] ( ω t ) X IR [ u ] ( ω t ) + Z [ j ] ( ω t ) ,
where X [ i ] ( ω t ) is the signal of the i-th transmitter, H [ j i ] ( ω t ) is the channel coefficient between the i-th transmitter and the j-th receiver, X IR [ u ] ( ω t ) is the transmitted signal of the u-th IR transmitting antenna, H IR R [ j u ] ( ω t ) is the channel coefficient between the u-th IR transmitting antenna and the j-th receiver, and Z [ j ] ( ω t ) is additive white Gaussian noise (AWGN) at the j-th receiver in the t-th frequency slot ω t , where t { 1 , 2 , , T } . We assume a perfect self-interference cancellation at the IR; thus, the received signal at the q-th IR receiving antenna in the t-th frequency slot, which is shown by Y IR [ q ] ( ω t ) , is given as follows:
Y IR [ q ] ( ω t ) = i = 1 K H T IR [ q i ] ( ω t ) X [ i ] ( ω t ) + Z IR [ q ] ( ω t ) ,
where H T IR [ q i ] ( ω t ) is the channel coefficient from the i-th transmitter to the q-th IR receiving antenna (for an NC-IR, before a transmission begins, all required channel-state information and the transmission strategy are shared between all nodes and all receiving and transmitting antennas of the NC-IR. However, when the transmission begins, the i-th transmitting antenna of the NC-IR has access to the i-th receiving antenna only and its received signal cannot be exchanged between other transmitting antennas (the same holds for the active RIS [31])), q { 1 , , Q } , and Z IR [ q ] ( ω t ) are the AWGN at the q-th IR receiving antenna in the t-th frequency slot. We assume that the perfect channel-state information for all frequency slots is available at all nodes (this ideal assumption is vastly considered in the literature [1,33]. Noisy channel-state information will be an interesting subject of future work.). We consider two types of IR: (1) a MIMO IR, the antennas of which can have a coordination with each other, called MIMO-coordinated IR (C-IR) and (2) an IR with no coordination among its antennas because the u-th transmitting antenna has access to only the u-th receiving antenna ( W = Q ). We call this model non-coordinated IR (NC-IR). At each time cycle, for the MIMO C-IR, we have:
X IR [ u ] ( ω t ) = f [ u , ω t ] ( Y IR [ 1 ] ( ω 1 ) , , Y IR [ 1 ] ( ω T ) , , Y IR [ Q ] ( ω 1 ) , , Y IR [ Q ] ( ω T ) ) ,
where f [ u , ω t ] indicates the encoding function of the IR for the u-th transmitting antenna at the t-th frequency slot ω t . For the NC-IR, we have:
X IR [ u ] ( ω t ) = f [ u , ω t ] ( Y IR [ u ] ( ω 1 ) , , Y IR [ u ] ( ω T ) ) , u { 1 , , Q } .
We limit the functions f [ u , ω t ] to be linear. (1) and (2) can be rewritten into the following vector form:
Y [ j ] = i = 1 K H [ j i ] X [ i ] + u = 1 W H IR R [ j u ] X IR [ u ] + Z [ j ] ,
Y IR [ q ] = i = 1 K H T IR [ q i ] X [ i ] + Z IR [ q ] ,
where X [ i ] is a T × 1 column vector including the channel inputs X [ i ] ( ω t ) , i.e.,
X [ i ] = X [ i ] ( ω 1 ) X [ i ] ( ω 2 ) X [ i ] ( ω T ) T .
Y [ i ] , Y IR [ q ] , X IR [ u ] , Z [ j ] and Z IR [ q ] are also defined in the similar way. H [ j i ] is a diagonal matrix defined as follows:
H [ j i ] = diag H [ j i ] ( ω 1 ) , , H [ j i ] ( ω T ) .
H IR R [ j u ] and H T IR [ q i ] are also defined similarly. Considering functions f [ u , ω t ] to be linear, the operation of the the MIMO C-IR can be represented as follows:
X IR [ u ] = q = 1 Q A [ u q ] Y IR [ q ] ,
where A [ u q ] are T × T matrices. Moreover, the linear operation of the NC-IR can be represented as follows:
X IR [ u ] = A [ u ] Y IR [ u ] .
Since we assume a frequency-selective K-user interference channel, H [ j i ] ( ω t ) , H IR R [ j u ] ( ω t ) and H T IR [ q i ] ( ω t ) are independent random variables for different values of i , j , u , q and ω t , whose cumulative distribution functions (CDFs) are continuous due to the frequency selectivity of the channel. In the case of complex channel coefficients, their real and imaginary parts are independent random variables, whose CDFs are continuous (e.g., complex Gaussian random variable).
Remark 1.
The assumption of frequency selectivity is essential for our coding scheme not only for the realization of independent channel coefficients for each channel use but also because if we assume the channel to be time selective and channel uses are in different time slots, by using (7) and (8), the matrices A [ u q ] for the MIMO C-IR and the matrices A [ u ] for the NC-IR must be lower triangular matrices due to the definition of the IR (the transmitted signal of an IR for the t-th time slot is a function of the received signals for the time slots t { 1 , , t } ). However, if we assume the channel to be frequency selective and consider our different channel uses in different frequency slots in the same time cycle, the transmitted signals of the IR for each frequency slot can be a function of all received signals for all frequency slots; thus, there would not be any constraint on the matrices A [ u q ] and A [ u ] and our proposed achievability schemes will be realizable.
We assume that all transmitters can send a signal with a maximum average power of ρ , i.e., 1 T t = 1 T X [ i ] ( ω t ) 2 ρ , i { 1 , , K } . We say the rate vector r = ( r 1 , , r K ) is achievable if lim T Pr i { w ^ [ i ] w [ i ] } = 0 , where w ^ [ i ] is the estimated message at the i-th receiver. In addition, C ( ρ ) indicates the closure of all the achievable rate vectors r = ( r 1 , , r K ) .

2.2. Preliminaries

In the following section, we introduce some definitions that are used throughout this paper.
Degrees of freedom (DoF): Similar to [1], we define the DoF region D for a K-user interference channel as follows:
D = ( d 1 , , d K ) R + K : ( w 1 , , w K ) R + K ,
w 1 d 1 + + w K d K lim sup ρ 1 log ( ρ ) sup r ( ρ ) C ( ρ ) w 1 r 1 + + w K r K .
Span: The span ( V ) denotes the space spanned by the column vectors of the matrix V.
Dimension: We define the number of dimensions of the span ( V ) as the dimension of V and show it by using d ( V ) , which is equal to rank ( V ) .
Normalized asymptotic dimension: We will see in our analysis that for a given K , Q and for W, the dimensions of the beamforming matrices and the vector spaces will have an order of O ( n l ) , l , n N . For the matrix V, we define the normalized asymptotic dimension ( D N ) as follows:
D N ( V ) = lim n d ( V ) n l ,
where l is the maximum integer number that satisfies lim n d ( V ) n l < .
These definitions are also used for the vector space A ; therefore, d ( A ) indicates the dimension of A , and D N ( A ) indicates the normalized asymptotic dimension of A .

3. K -User Interference Channel in the Presence of MIMO C-IR

In this section, we present the lower and upper bounds for the sum DoF of the frequency-selective K-user interference channel with a MIMO C-IR. First, we introduce the lower bound as follows:
Theorem 1.
For a frequency-selective K-user interference channel with a MIMO C-IR, where max { W , Q } K , the following DoF is achievable:
DoF = max K 2 + max 0 , K W K 1 2 1 + 2 W Q , min Q , W .
We can see from (11) that when W K > 1 2 , the DoF always increases over K 2 , i.e., the DoF increases in the absence of an IR.
Proof. 
We will prove the achievability of the first term K 2 + max 0 , K W K 1 2 1 + 2 W Q in (11) in the following. The proof of the second term, i.e., min { Q , W } , is provided in Appendix A.
We present this proof in six steps. In Step 1, we divide the transmitters and the receivers into two groups (clean and dirty). In Step 2, some message streams are considered to have the capability of being de-multiplexed at the MIMO C-IR; thus, the MIMO C-IR can use them for an interference cancellation in the clean receivers. After the interference cancellation, the equivalent channel coefficients are derived for other receivers (dirty receivers). In Step 3, we introduce the interference alignment equations such that the assumption of the previous step (the de-multiplexing of some message streams) and the interference alignment for each receiver and MIMO C-IR receiving antenna are satisfied. In Step 4, we present the beamforming design for each symbol stream. In Step 5, we analyze the satisfaction of the interference alignment equations at each receiver and MIMO C-IR receiving antenna. Finally, in Step 6, we derive the achieved DoF, presented in the first term of (11).
Step 1: Partitioning the Transmitters and Receivers
We divide the transmitters into two partitions. For the transmitters i { 1 , , W } , we provide two sets of symbol streams: x ¯ [ i ] and x ˜ [ i ] (each element of the vectors x ¯ [ i ] and x ˜ [ i ] is the extended symbols). The matrices V ¯ [ i ] and V ˜ [ i ] are the beamforming matrices, the columns of which are the beamforming vectors corresponding to the elements of x ¯ [ i ] and x ˜ [ i ] , respectively. We can write:
X [ i ] = V ¯ [ i ] x ¯ [ i ] + V ˜ [ i ] x ˜ [ i ] , i { 1 , , W } .
For the transmitters i { W + 1 , , K } , we only provide one set of extended symbols ( x ¯ [ i ] ), and V ¯ [ i ] is the beamforming matrix for the symbols x ¯ [ i ] . Thus, we have:
X [ i ] = V ¯ [ i ] x ¯ [ i ] , i { W + 1 , , K } .
Note that the matrices V ˜ [ i ] and V ¯ [ i ] have T rows because we have T frequency slots. The dimensions of x ¯ [ i ] and x ˜ [ i ] and the number of columns of V ¯ [ i ] and V ˜ [ i ] are determined in the next steps.
In the following steps, we design the beamforming vectors V ˜ [ i ] and V ¯ [ i ] such that the extended symbols x ˜ [ i ] can be de-multiplexed at the MIMO C-IR. By de-multiplexing, we mean that the MIMO C-IR can separate each symbol of message streams x ˜ [ i ] using zero forcing without decoding the symbol. The symbol streams x ¯ [ i ] act as interference signals, and their beamforming vectors align into a smaller subspace.
We also divide the receivers into clean and dirty sets. In the next steps, the signal transmitted by the MIMO C-IR is designed such that the interference induced by the symbols x ˜ [ i ] will be removed at the receivers j { 1 , , W } , called clean receivers, but this interference will remain at the receivers j { W + 1 , , K } , called dirty receivers. The main reason for choosing these terms (clean and dirty receivers) is that in our scheme, the interference of some symbol streams is canceled at clean receivers by the MIMO C-IR (the MIMO C-IR can de-multiplex these symbols and use them for interference cancellation) and the clean receivers will observe fewer dimensions for the interference; however, all interference remains at the dirty receivers.
Step 2: Interference Cancellation at Clean Receivers and Equivalent Channel for Dirty Receivers
We design the beamforming vectors V ˜ [ i ] and V ¯ [ i ] such that the interference induced by the symbols x ˜ [ i ] will be removed at the clean receivers. We denote this interference as I ˜ [ j ] , which is written as follows:
I ˜ [ j ] = i { 1 , , W } , i j H [ j i ] V ˜ [ i ] x ˜ [ i ] , j { 1 , , W } ,
The MIMO C-IR can de-multiplex the streams corresponding to x ˜ [ i ] (this will be shown in Steps 3–5), which is only contaminated by an additive noise, i.e., it will separate them into the form of x ˜ ^ [ i ] = x ˜ [ i ] + z ˜ [ i ] . Thus, for the interference cancellation, the MIMO C-IR designs its transmitted signal such that:
u { 1 , , W } H IR R [ j u ] X IR [ u ] =
i { 1 , , W } , i j H [ j i ] V ˜ [ i ] x ˜ ^ [ i ] = i { 1 , , W } , i j H [ j i ] V ˜ [ i ] x ˜ [ i ] + z ˜ [ i ] = I ˜ [ j ] + Z ˜ [ j ] ,
where
Z ˜ [ j ] = i { 1 , , W } , i j H [ j i ] V ˜ [ i ] z ˜ [ i ] .
The vector Equation (15) generates a linear set of equations, an equation for each element of X IR [ u ] , which can be written for the t-th element as:
u { 1 , , W } H IR R [ j u ] ( ω t ) X IR [ u ] ( ω t ) = I ˜ [ j ] ( ω t ) + Z ˜ [ j ] ( ω t ) , j { 1 , , W } , t { 1 , , T } ,
which is a linear set of equations with W variables for each ω t . This set of equations is almost surely solvable since the coefficients of the linear equations are drawn independently and their CDFs are continuous; thus, the determinant of the matrix of linear equations will be a non-zero polynomial in terms of independent random variables and by using ([34], Lemma 1), it will be a non-zero with a probability equal to 1. Applying (16), the interference cancellation will be conducted. Thus, for each ω t , we will have:
X IR [ u ] ( ω t ) = j { 1 , , W } H inv [ j u ] ( ω t ) ( I ˜ [ j ] ( ω t ) ( ω t ) + Z ˜ [ j ] ( ω t ) ) ,
where H inv [ j u ] ( ω t ) , the factor of I ˜ [ j ] ( ω t ) + Z ˜ [ j ] ( ω t ) in (17), is a function of H IR R [ j u ] ( ω t ) , u , j { 1 , , W } obtained by solving Equation (16). We can write Equation (17) in the vector form as follows:
X IR [ u ] = j { 1 , , W } H inv [ j u ] ( I ˜ [ j ] + Z ˜ [ j ] )
= j { 1 , , W } i { 1 , , W } , i j H inv [ j u ] H [ j i ] V ˜ [ i ] x ˜ [ i ] + j { 1 , , W } H inv [ j u ] Z ˜ [ j ] ,
where H inv [ j u ] is a diagonal matrix as follows:
H inv [ j u ] = diag H inv [ j u ] ( ω 1 ) , , H inv [ j u ] ( ω T ) .
We highlight two properties of H inv [ j u ] :
  • Similar to H [ j i ] , diagonal elements H inv [ j u ] ( ω t ) are independent random variables for different t { 1 , , T } because the channel coefficients are independent random variables for each t { 1 , , T } .
  • Each diagonal element H inv [ j u ] ( ω t ) is a fractional polynomial constructed by the matrices H IR R [ j u ] ( ω t ) , j , u { 1 , , W } . A fractional polynomial is the ratio of the polynomial P 1 ( · ) to the non-zero polynomial P 2 ( · ) .
Although we cancel the interference I ˜ [ j ] at the clean receivers, this interference remains at the dirty receivers with new equivalent channel coefficients. Now, we derive the new channel coefficients for V ˜ [ i ] x ˜ [ i ] , i { 1 , , W } at the dirty receivers j { W + 1 , , K } . By combining (5), (12), and (13), we have:
Y [ j ] = i { 1 , , K } H [ j i ] V ¯ [ i ] x ¯ [ i ] + i { 1 , , W } H [ j i ] V ˜ [ i ] x ˜ [ i ] + u { 1 , , W } H IR R [ j u ] X IR [ u ] + Z [ j ]
= i { 1 , , K } H [ j i ] V ¯ [ i ] x ¯ [ i ] + i { 1 , , W } H [ j i ] V ˜ [ i ] x ˜ [ i ] + u , d , i { 1 , , W } , i d H IR R [ j u ] H inv [ d u ] H [ d i ] V ˜ [ i ] x ˜ [ i ] + Z ˜ ˜ [ j ] ,
where (21) follows from (19) and:
Z ˜ ˜ [ j ] = u , d H IR R [ j u ] H inv [ d u ] Z ˜ [ d ] + Z [ j ] .
(21) can be rewritten as:
Y [ j ] = i { 1 , , K } H [ j i ] V ¯ [ i ] x ¯ [ i ] + i { 1 , , W } H ˜ [ j i ] V ˜ [ i ] x ˜ [ i ] + Z ˜ ˜ [ j ] ,
H ˜ [ j i ] = H [ j i ] + u , d { 1 , , W } , d i H IR R [ j u ] H inv [ d u ] H [ d i ] , i { 1 , , W } ,
where H ˜ [ j i ] is the equivalent channel coefficient matrix from the transmitter i { 1 , , W } to the receiver j { W + 1 , , K } (dirty receivers) for V ˜ [ i ] x ˜ [ i ] . By using (23), we can see that H ˜ [ j i ] has the following properties:
  • H ˜ [ j i ] is a diagonal matrix.
  • H ˜ [ j i ] = H [ j i ] , j { 1 , , W } .
  • For j { W + 1 , , K } , its t-th diagonal element has the following form:
    H ˜ [ j i ] ( ω t ) =
    u , i , j { 1 , W } , i j H IR R [ j u ] ( ω t ) H [ j i ] ( ω t ) P [ u i j ] ( { H IR R [ m e ] ( ω t ) : m , e { 1 , , W } } ) + H [ j i ] ( ω t ) ,
    where P [ u i j ] ( S ) indicates a fractional polynomial constructed from the variables s S .
Step 3: Interference Alignment
In this step, we determine the interference alignment equations in the clean and dirty receivers and MIMO C-IR receiving antennas. In our interference alignment scheme, we align the subspace of the interference of each user into a bigger subspace with an equal normalized asymptotic dimension. Note that for the matrices V and V , we can have the following relations simultaneously: d ( V ) > d ( V ) , D N ( V ) = D N ( V ) , e.g., d ( V ) = ( n + 1 ) l > d ( V ) = n l , D N ( V ) = D N ( V ) = 1 . We begin with clean receivers.
(1) Interference alignment at clean receivers: Consider the clean receiver j { 1 , , W } ; for each i { 1 , , K } , i j , we must have:
span H [ j i ] V ¯ [ i ] A ¯ j ,
where A ¯ j is considered a subspace that encompass all interference at the j-th receiver induced by x ¯ [ i ] , i { 1 , , K } , i j , for which we have:
max i { 1 , , K } , i j D N span H [ j i ] V ¯ [ i ] = D N ( A ¯ j ) ,
which implies that the normalized asymptotic dimension of A ¯ j is equal to the maximum asymptotic dimension of span H [ j i ] V ¯ [ i ] for i j . Moreover, we define the message subspaces as:
C ¯ j = span H [ j j ] V ¯ [ j ] ,
C ˜ j = span H ˜ [ j j ] V ˜ [ j ] .
and we require C ¯ j , C ˜ j and A ¯ j to be full-rank and linearly independent; thus, we can ensure the decodability of the message streams x ˜ [ j ] and x ¯ [ j ] by using zero forcing at the j-th receiver.
(2) Interference alignment at dirty receivers: Consider the dirty receiver j { W + 1 , , K } . Here, we have two interference subspaces at each receiver j; the interference induced by x ¯ [ i ] aligns in subspace A ¯ j , while the interference induced by x ˜ [ i ] aligns in subspace A ˜ j . For each i { 1 , , K } , i j , we must have:
span H [ j i ] V ¯ [ i ] A ¯ j ,
where A ¯ j is considered a subspace for which we have:
max i { 1 , , K } , i j D N span H [ j i ] V ¯ [ i ] = D N ( A ¯ j ) ,
and for every i { 1 , , W } , we must have:
span H ˜ [ j i ] V ˜ [ i ] A ˜ j ,
where A ˜ j is considered a subspace for which we have:
max i { 1 , , W } D N span H ˜ [ j i ] V ˜ [ i ] = D N ( A ˜ j ) .
Moreover, we define the message subspace as:
C ¯ j = span H [ j j ] V ¯ [ j ] ,
and we want C ¯ j , A ˜ j and A ¯ j to be full-rank and linearly independent; hence, we can ensure the decodability of the message stream x ¯ [ j ] by using zero forcing in the j-th receiver.
(3) Interference alignment at the MIMO C-IR q-th receiving antenna: We assume that W = Q Z + P , 0 P < Q ; we divide the transmitters i { 1 , , W } , into Q distinct sets, and the first P sets include Z + 1 transmitters and the other Q P sets include Z transmitters. We name these sets B q , q { 1 , , Q } . We designed our interference alignment scheme such that the symbol streams x ˜ [ i ] , i B q can be de-multiplexed at the q-th receiving antenna of the MIMO C-IR. To this end, all the interference induced by the symbol streams x ¯ [ i ] , i { 1 , , K } must align into a limited subspace at each receiving antenna of the MIMO C-IR. Thus, at each receiving antenna q { 1 , , Q } , and for each i { 1 , , K } , we must have:
span H T IR [ q i ] V ¯ [ i ] A ¯ r q ,
where A ¯ r q is considered a subspace for which we have:
max i { 1 , , K } D N span H T IR [ q i ] V ¯ [ i ] = D N ( A ¯ r q ) .
In addition, at the q-th receiving antenna of the MIMO C-IR, the interference induced by the symbol streams x ˜ [ i ] , i { 1 , , W } , i B q must align into a subspace named A ˜ r q . Hence, for each i { 1 , , W } , i B q , we must have:
span H T IR [ q i ] V ˜ [ i ] A ˜ r q ,
where A ˜ r q is considered a subspace for which we have:
max i { 1 , , W } , i B q D N span H T IR [ q i ] V ˜ [ i ] = D N ( A ˜ r q ) .
Furthermore, we define C ˜ i , r q , i B q as the message subspaces, which can be de-multiplexed at the q-th MIMO C-IR receiving antenna as follows:
C ˜ i , r q = span H T IR [ q i ] V ˜ [ i ] , i B q .
We want C ˜ i , r q , i B q , A ¯ r q and A ˜ r q to be full-rank and linearly independent; thus, we can make sure that the message streams x ˜ [ i ] , i B q can be de-multiplexed at the q-th MIMO C-IR receiving antenna by using zero forcing. Note that the q-th receiving antenna of the MIMO C-IR de-multiplexes the message streams x ˜ [ i ] , i B q without having the coordination with other receiving antennas. After each antenna de-multiplexes its own message streams x ˜ [ i ] , i B q , all of these message streams are passed to the MIMO C-IR transmitting antennas so the transmitting antennas can have coordination with each other for an interference cancellation at the clean receivers (as in Equation (19)). A simple illustration of the interference alignment scheme is shown in Figure 2 for K = 3 and W = 2 . In Steps 4 and 5, we prove the existence of such beamforming vectors, messages, and interference subspaces, which satisfies the previous interference alignment Equations (24)–(33) for the clean and dirty receivers and the MIMO C-IR. In Step 6, we analyze the achieved DoF by using these beamforming vector designs.
Step 4: Beamforming Matrix Design
In this step, we design beamforming matrices such that the alignment Equations (24)–(33) are satisfied and all users’ message streams are decodable.
(1) Beamforming matrix design for i { 1 , , W } : To introduce the beamforming matrix design, we must define some new notations. First, we define set F ( A , B ) as the set of all functions g ( x ) : A B , i.e.,
F ( A , B ) = { g ( x ) | g ( x ) : A B } .
It is obvious that | F ( A , B ) | = | A | | B | . Moreover, we define matrix M ( g ( x ) , N [ x ] , A ) as follows:
M ( g ( x ) , N [ x ] , A ) = x A N [ x ] g ( x ) .
Then, consider the vector w = 1 1 1 H . We design the beamforming matrices V ¯ [ i ] and V ˜ [ i ] as the following:
V ¯ [ i ] = M ( g 1 ( i , j ) , H [ j i ] , S ¯ 1 ) M ( g 2 ( i , q ) , H T IR [ q i ] , S ¯ 2 ) w :
g 1 F S ¯ 1 , { 1 , , n } , g 2 F S ¯ 2 , { 1 , , s n } ,
where
S ¯ 1 = ( i , j ) i , j { 1 , , K } , i j ,
S ¯ 2 = ( i , q ) i { 1 , , K } , q { 1 , , Q } ,
where n N is an auxiliary variable that can go to infinity, and s is a parameter for controlling the dimension of V ¯ [ i ] , i.e., d ( V ¯ [ i ] ) . This notation means that the right-hand side of (36) is the set of column vectors, which forms the beamforming matrix V ¯ [ i ] . For V ˜ [ i ] , we have:
V ˜ [ i ] = M ( g 1 ( i , j ) , H ˜ [ j i ] , S ¯ 1 ) M ( g 2 ( i , q ) , H T IR [ q i ] , S ˜ 2 ) M ( g 3 ( i , q ) , T [ q i ] , S ˜ 3 ) w :
g 1 F S ¯ 1 , { 1 , , n } , g 2 F S ˜ 2 , { 1 , , s n } , g 3 F S ˜ 3 , { 1 , , υ n } ,
where S ¯ 1 is given in (37), and we have:
S ˜ 2 = ( i , q ) i { 1 , , K } , i B q , q { 1 , , Q } ,
S ˜ 3 = ( i , q ) i B q , q { 1 , , Q } ,
T [ q i ] s are T × T diagonal random matrices for each i and q, where each of the diagonal elements for each matrix is drawn independently and its CDF is continuous.
(2) Beamforming matrix design for i { W + 1 , , K } : We consider the beamforming matrix V ¯ [ i ] as the following:
V ¯ [ i ] = M ( g 1 ( i , j ) , H [ j i ] , S ¯ 1 ) M ( g 2 ( i , q ) , H T IR [ q i ] , S ¯ 2 ) w :
g 1 F S ¯ 1 , { 1 , , n } , g 2 F S ¯ 2 , { 1 , , t n } ,
where S ¯ 1 and S ¯ 2 are given by using (37) and (38), respectively. t is a parameter for controlling the dimension of V ¯ [ i ] , i.e., d ( V ¯ [ i ] ) .
We note that each value of parameters s , υ and t can be approximated by using rational numbers with arbitrarily small errors, and by choosing a sufficiently large n, parameters s n , υ n and t n will be integers and our proposed scheme will be realizable.
Step 5: Validity of Interference Alignment Conditions and Decodability of Message Symbols
Now, we analyze the spaces of messages and interference.
(1) Validity of interference alignment conditions at the clean receivers j { 1 , , W } : For the clean receivers j { 1 , , W } , we have the following lemma:
Lemma 1.
For the clean receivers j { 1 , , W } , consider C ¯ j as the message subspace corresponding to the symbol stream x ¯ [ j ] , consider C ˜ j as the message subspace corresponding to the symbol stream x ˜ [ j ] , and consider A ¯ j as the interference subspace induced by the symbol stream x ¯ [ j ] , j j . Then, C ¯ j ,   C ˜ j and A ¯ j are full-rank and linearly independent, i.e., all base vectors of these subspaces are linearly independent. Thus, the message streams x ¯ [ j ] and x ˜ [ j ] are decodable by using zero forcing. In addition, we have:
D N ( C ¯ j ) = Γ ,
D N ( C ˜ j ) = χ ,
D N ( A ¯ j ) = max { Γ , ζ } ,
where
Γ = s Q K , χ = s Q K W υ W , ζ = t Q K .
Proof. 
The proof is provided in Appendix B.  □
(2) Validity of interference alignment conditions at the dirty receivers j { W + 1 , , K } : For the dirty receivers j { W + 1 , , K } , we have the following lemma:
Lemma 2.
For the dirty receivers j { W + 1 , , K } , consider C ¯ j the message subspace corresponding to the symbol stream x ¯ [ j ] , consider A ˜ j as the interference subspace corresponding to the symbol stream x ˜ [ j ] , j j , and consider A ¯ j as the interference subspace induced by the symbol streams x ¯ [ j ] , j j . Then, C ¯ j , A ˜ j and A ¯ j are full-rank and linearly independent, i.e., all base vectors of these subspaces are linearly independent. Thus, the message stream x ¯ [ j ] is decodable by using zero forcing. In addition, we have:
D N ( C ¯ j ) = ζ ,
D N ( A ¯ j ) = max { Γ , ζ } ,
D N ( A ˜ j ) = χ .
Proof. 
The proof is provided in Appendix C.  □
(3) Validity of interference alignment conditions at the MIMO C-IR q-th receiving antenna q { 1 , , Q } : For the q-th receiving antenna of the MIMO C-IR q { 1 , , Q } , we have the following lemma:
Lemma 3.
For the q-th receiving antenna of the MIMO C-IR q { 1 , , Q } , consider C ˜ i , r q the message subspace corresponding to the symbol streams x ˜ [ i ] , i B q , consider A ˜ r q the interference subspace corresponding to the symbol streams x ˜ [ j ] , j B q , and consider A ¯ r q the interference subspace induced by the symbol streams x ¯ [ j ] , j . Then, C ˜ i , r q , i B q , A ¯ r q , and A ˜ r q are full-rank and linearly independent, i.e., all base vectors of these subspaces are linearly independent. Thus, the message stream x ˜ [ i ] , i B q can be de-multiplexed by using zero forcing. In addition, we have:
D N ( C ˜ i , r q ) = χ ,
i B q D N ( C ˜ i , r q ) = B q χ ,
D N ( A ¯ r q ) = max { Γ , ζ } ,
D N ( A ˜ r q ) = χ .
Proof. 
The proof is provided in Appendix D.  □
Now, we can calculate the dimension of the whole signal space at each receiver. We define d t , j as the total dimension at the j-th receiver and d t , r q as the total dimension at the q-th receiving antenna of the MIMO C-IR; thus, we have:
d t , j = d ( C ¯ j ) + d ( C ˜ j ) + d ( A ¯ j ) , j { 1 , , W } ,
d t , j = d ( C ¯ j ) + d ( A ¯ j ) + d ( A ˜ j ) , j { W + 1 , , K } ,
d t , r q = i B q d ( C ˜ i , r q ) + d ( A ¯ r q ) + d ( A ˜ r q ) , q { 1 , , Q } ,
where the dimension of the message and the interference subspaces are derived in (A8)–(A10), (A20)–(A22), and (A26)–(A28) in Appendix B, Appendix C and Appendix D. Similarly, define D N , t , j as the total normalized asymptotic dimension at the j-th receiver and D N , t , r q as the total normalized asymptotic dimension at the q-th receiving antenna of the MIMO C-IR; thus, from (43)–(52), we have:
D N , t , j = D N ( C ¯ j ) + D N ( C ˜ j ) + D N ( A ¯ j ) = Γ + χ + max { Γ , ζ } , j { 1 , , W } ,
D N , t , j = D N ( C ¯ j ) + D N ( A ¯ j ) + D N ( A ˜ j ) = ζ + χ + max { Γ , ζ } , j { W + 1 , , K } ,
D N , t , r q = i B q D N ( C ˜ i , r q ) + D N ( A ¯ r q ) + D N ( A ˜ r q ) = B q χ + χ + max { Γ , ζ } , q { 1 , , Q } .
Now, we determine the minimum value for the parameter T (for which the interference alignment equations are satisfied) as follows:
T = max max j { 1 , , K } { d t , j } , max q { 1 , , Q } { d t , r q } ,
and from (53)–(59), we have
lim n T n K 2 K + Q K = χ + max Γ , ζ + max max q { 1 , , Q } B q χ , ζ , Γ .
However, we have:
max q { 1 , , Q } B q = W Q ,
so we conclude that:
lim n T n K 2 K + Q K = χ + max Γ , ζ + max W Q χ , ζ , Γ .
Up until now, we have considered any arbitrary real values for each parameter Γ , χ and ζ . Now, we make two additional assumptions for these parameters, which give us an achievable DoF. First, we set the normalized asymptotic dimension of the space at the clean receivers equal to that of the dirty receivers. Hence:
Γ = ζ .
Second, we set the maximum normalized asymptotic dimension of the space at each MIMO C-IR receiving antenna to be less than or equal to that of the dirty receivers. Therefore, we have:
ζ W Q χ .
Having (62) and (63), (61) will have the following form:
lim n T n K 2 K + Q K = χ + 2 Γ .
Step 6: DoF Analysis
Now, we characterize the total DoF. As stated before, we have W clean receivers, each with a normalized message dimension equal to Γ + χ , and K W dirty receivers, each with a normalized message dimension equal to ζ (note that we set ζ = Γ ).The total normalized transmission length is equal to χ + 2 Γ , so the total DoF has the following form:
DoF = max χ 0 , Γ W Q χ W ( χ + Γ ) + ( K W ) Γ χ + 2 Γ ,
and by assuming Γ = β χ , we have:
DoF = max β W Q W ( 1 + β ) + ( K W ) β 1 + 2 β
= K 2 + max β W Q K W K 1 2 1 + 2 β = K 2 + max K W K 1 2 1 + 2 W Q , 0 .
We remark that if W K > 1 2 , we set β = W Q , and if W K < 1 2 , we tend β to . This completes the proof of the achievability of the first term of (11). The proof of the second term, i.e., min { Q , W } , is provided in Appendix A. □
Remark 2.
It is known that the DoF is an appropriate performance metric that provides a capacity approximation accurate within o ( log ( ρ ) ) [1]. Therefore, Theorem 1 indicates that the approximate sum capacity of the K-user interference channel in the presence of a MIMO C-IR is lower bounded by max K 2 + max 0 , K W K 1 2 1 + 2 W Q , min Q , W ϵ log ( 1 + ρ ) + o ( log ( ρ ) ) , ϵ > 0 . Now, we prove an improved achievable DoF for a special case of W and Q.
Theorem 2.
Assume W = Q Z + P , P = 1 . Then, the achievable DoF (11) can be improved as follows:
DoF = max K 2 + max 0 , K W K 1 2 1 + 2 W Q , min Q , W .
Proof. 
The proof is provided in Appendix E.  □
Remark 3.
Theorem 2 shows that the approximate sum capacity of the K-user interference channel with a MIMO C-IR is lower bounded by max K 2 + max 0 , K W K 1 2 1 + 2 W Q , min Q , W ϵ log ( 1 + ρ ) + o ( log ( ρ ) ) , ϵ > 0 , where P = 1 (we have W = Q Z + P , 0 P < Q ). From (11) and (68), we note that this lower bound is tighter than the previous bound.
Remark 4.
As expected, if we set Q = W = K , the maximum K DoF, which is the DoF at the absence of interference, is achievable for the MIMO C-IR.
Remark 5.
It was shown in [4] that an ordinary relay cannot increase the DoF of a K-user interference channel. The main difference here is that the instantaneity of the relay can significantly improve the DoF.
Remark 6.
Although we derived the achievable DoF for the asymptotic case, the achievability results are also valid for finite values of the auxiliary variable n, which determines the dimensions of beamforming vectors (see Equations (36)–(42)). Thus, if all interference alignment conditions (24)–(33) are satisfied and T is sufficiently large (as in Equation (59), i.e., larger than the sum of the interference and message subspaces), then for each receiver j { 1 , , K } , there is the matrix E j such that if we multiply the vector of received signals in all frequency slots ( Y [ j ] ) by E j , the transmitted streams will be separated at each receiver with additive noise. Then, for the clean receivers j { 1 , , W } , we have:
E j Y [ j ] = x ¯ [ j ] x ˜ [ j ] + n ^ [ j ] ,
where n ^ [ j ] is additive Gaussian noise, which is not necessarily white. Moreover, for the dirty receivers j { W + 1 , , K } , we have:
E j Y [ j ] = x ¯ [ j ] + n ^ [ j ] .
Thus, the proposed achievability scheme can be used for resource allocation problems, such as sum-rate optimization problems. This kind of utilization of interference alignment coding schemes for optimization problems was used in [35]. However, finding the optimal input distributions for the symbol streams x ¯ [ i ] and x ˜ [ i ] and the optimal values for other parameters ( t , s , and υ) in order to compare the performance of the proposed scheme with the performance of other signaling strategies (e.g., [36,37]) from the rate region perspective are still complicated problems and need complex optimization algorithms, which are directions for future research.
Next, we introduce an upper bound for the sum DoF of the frequency-selective K-user interference channel assisted by the MIMO C-IR.
Theorem 3.
Considering the functions f [ u , ω t ] to be linear in (3), the sum DoF of the frequency-selective K-user interference channel assisted by the MIMO C-IR can be upper-bounded as follows:
i = 1 K d i min K 2 + W Q 2 ( K 1 ) , K .
Proof. 
By using (5)–(7), we have:
Y [ j ] = i = 1 K H [ j i ] X [ i ] + u = 1 W H IR R [ j u ] q = 1 Q A [ u q ] i = 1 K H T IR [ q i ] X [ i ] + Z IR [ q ] + Z [ j ]
= i = 1 K H [ j i ] + u = 1 W q = 1 Q H IR R [ j u ] A [ u q ] H T IR [ q i ] X [ i ] + Z ^ [ j ] = i = 1 K H ^ [ j i ] X [ i ] + Z ^ [ j ] ,
where
H ^ [ j i ] = H [ j i ] + u = 1 W q = 1 Q H IR R [ j u ] A [ u q ] H T IR [ q i ] ,
Z ^ [ j ] = u = 1 W q = 1 Q H IR R [ j u ] A [ u q ] Z IR [ q ] + Z [ j ] .
Now, consider the given i , j { 1 , , K } , i j . The matrices A [ u q ] must be chosen such that rank ( H ^ [ i i ] ) = T , i ; otherwise, the messages of each transmitter cannot be transmitted completely and the resulting upper bound for the sum DoF will decrease. For more clarity of the proof, we eliminate messages w [ k ] , k i , j , and this causes the rates r i and r j to increase because of a data processing inequality [38] (Theorem 2.8.1). Hence, we have:
Y [ i ] = H ^ [ i i ] X [ i ] + H ^ [ i j ] X [ j ] + Z ^ [ i ] ,
Y [ j ] = H ^ [ j i ] X [ i ] + H ^ [ j j ] X [ j ] + Z ^ [ j ] .
Now, we define new variables as follows:
Y [ j ] = H ^ [ i j ] H ^ [ j j ] 1 Y [ j ] = H ^ [ i j ] H ^ [ j j ] 1 H ^ [ j i ] X [ i ] + H ^ [ j j ] X [ j ] + H ^ [ i j ] H ^ [ j j ] 1 Z ^ [ j ] ,
Y [ j ] = H ^ [ i j ] H ^ [ j j ] 1 H ^ [ j i ] X [ i ] + H ^ [ j j ] X [ j ] + Z ^ [ i ] .
Then, we obtain:
T r i I w [ i ] ; Y [ i ] + ε ,
T r j I w [ j ] ; Y [ j ] + ε I w [ j ] ; Y [ j ] , Y [ j ] + ε = I w [ j ] ; Y [ j ] + I w [ j ] ; Y [ j ] Y [ j ] + ε
I w [ j ] ; Y [ j ] w [ i ] + I w [ j ] ; Y [ j ] Y [ j ] + ε
= I w [ j ] ; Y [ i ] w [ i ] + I w [ j ] ; Y [ j ] Y [ j ] + ε .
Thus, we have:
T ( r i + r j ) I w [ i ] , w [ j ] ; Y [ i ] + I w [ j ] ; Y [ j ] Y [ j ] + 2 ε 2 T R [ i j ] log ( 1 + ρ ) + o log ( ρ ) ,
where R [ i j ] = rank ( H ^ [ i j ] ) . By using the same argument, we obtain:
r i + r j 2 max rank H ^ [ i j ] , rank H ^ [ j i ] T log ( 1 + ρ ) + o log ( ρ ) .
Therefore, we obtain:
( K 1 ) i = 1 K r i = i j r i + r j
i j 2 max rank H ^ [ i j ] , rank H ^ [ j i ] T log ( 1 + ρ ) + o log ( ρ )
= K ( K 1 ) i j max rank H ^ [ i j ] , rank H ^ [ j i ] T log ( 1 + ρ ) + o log ( ρ ) .
To minimize the term i j max rank H ^ [ i j ] , rank H ^ [ j i ] T , there are W Q T 2 variables in the matrices A [ u q ] . Every unit decrement of the rank of cross-link matrices requires T linear dependencies (T independent linear equations, which follow from the form of the arrangement of coefficients of equations); thus, we can see that:
i j max rank H ^ [ i j ] , rank H ^ [ j i ] T K ( K 1 ) 2 W Q 2 .
Considering (83) and (84), the upper bound (71) can be obtained. We note that i = 1 K d i K is obvious because of (79).  □
Remark 7.
Theorem 3 indicates that the approximate sum capacity of the frequency-selective K-user interference channel assisted by the MIMO C-IR is upper-bounded by min K 2 + W Q 2 ( K 1 ) , K log ( 1 + ρ ) + o log ( ρ ) .

4. K -User Interference Channel in the Presence of NC-IR

In this section, we provide the lower and upper bounds for the sum DoF of the frequency-selective K-user interference channel in the presence of an NC-IR as follows.
Theorem 4.
Consider U , p , e , e W such that
U = p e + e , 0 e < p , K 2 < U K .
Then, with an NC-IR with W = Q = p U antennas, the following DoF is achievable:
DoF = K 2 + max K U K 1 2 1 + 2 U p , 0 .
Proof. 
The proof is provided in Appendix F.  □
Remark 8.
Theorem 4 indicates that the approximate sum capacity of a frequency-selective K-user interference channel in the presence of the NC-IR is lower bounded by K 2 + max K U K 1 2 1 + 2 U p , 0 ϵ log ( 1 + ρ ) + o ( log ( ρ ) ) , ϵ > 0 .
Remark 9.
The active reconfigurable intelligent surface RIS can be modeled as a special case of an NC-IR [34]. It was proven in [34] that for an active RIS with Q = U ( K 1 ) + U ( K U ) antennas, the following DoF is achievable:
DoF = K + U 2 , 0 U K .
Therefore, we can see that for 0 < Q < 2 ( K 1 ) , the achievable DoF (86) is dominant, and for Q 2 ( K 1 ) , the maximums of (86) and (87) form the maximum achievable DoF for the NC-IR.
Remark 10.
Considering Theorem 1, we can conclude that the maximum K DoF can be achieved by using Q = W = K antennas for a MIMO C-IR, but Q = K ( K 1 ) antennas for achieving the maximum K DoF by an NC-IR is required, which grows quadratically and shows a loss of performance.
Finally, we introduce an upper bound for the sum DoF of the frequency-selective K-user interference channel assisted by the NC-IR.
Theorem 5.
Considering the functions f [ u , ω t ] to be linear in (4), the sum DoF of the frequency-selective K-user interference channel assisted by the NC-IR can be upper-bounded as follows:
i = 1 K d i min K 2 + Q 2 ( K 1 ) , K = min K 2 + W 2 ( K 1 ) , K = min K 2 + W Q 2 ( K 1 ) , K .
Proof. 
This theorem can be proven by using the same argument given for Theorem 3, except for the fact that the linear operation of the NC-IR can be represented as (8). Thus, matrices A [ u ] provide Q T 2 variables, which changes (84) as follows:
i j max rank H ^ [ i j ] , rank H ^ [ j i ] T K ( K 1 ) 2 Q 2 ,
and which yields (88).  □
Remark 11.
By considering Theorem 5, it can be seen that the approximate sum capacity of the frequency-selective K-user interference channel assisted by the NC-IR is upper-bounded by the expression min K 2 + Q 2 ( K 1 ) , K log ( 1 + ρ ) + o log ( ρ ) .

5. Numerical Results

In this section, we numerically evaluate the lower and upper bounds for the sum DoF provided in the previous sections by using some examples. We note that the proposed bounds of the DoF of the MIMO C-IR and NC-IR and the existing bounds for the active RIS [31] (Theorems 1–5) do not depend on the distribution of channel coefficients, and the only required properties are independence and being drawn from a CDF, which is continuous. In Figure 3, we compare the lower and upper bounds for the sum DoF of a six-user interference channel in the presence of the MIMO C-IR for different values of Q and W and the case without the MIMO C-IR. We see that the achievable DoF can approach only a maximum value ( K = 6 ) when W = K = 6 . Additionally, we can observe that the maximum achieved DoF is equal to W when W 4 . Moreover, the maximum K DoFs can be achieved when Q = W .
In Figure 4, we compare the lower and upper bounds for the sum DoF of four-user interference channels in the presence of the MIMO C-IR, NC-IR, and active RIS [34], and the case without an IR. We note that to have a fair comparison, we assume the same number of receiving and transmitting antennas for the MIMO C-IR ( W = Q ) as for the NC-IR and active RIS. These figures show that the maximum K DoF can be achieved by employing enough antennas for the MIMO C-IR, NC-IR, and active RIS. We see that the achievable DoF is considerably decreased for the NC-IR and active RIS, and this reduction is due to a lack of coordination between the antennas in the NC-IR and active RIS. Moreover, these figures show that the required number of antennas to allow the NC-IR and active RIS to achieve the maximum K DoF is quadratically larger than the required number of antennas for a MIMO C-IR, which shows a performance loss for the NC-IR due to a lack of coordination between the NC-IR antennas. In addition, the achievable DoF for the NC-IR is better than for the active RIS because the NC-IR can combine the received signals from different frequency slots (see Equation (4)); however, the model of the active RIS cannot conduct this operation.
In Figure 5, we compare the achievable sum DoF of a three-user interference channel in the presence of the MIMO C-IR (with W = Q ), NC-IR, and active RIS, a time-selective channel without an IR [1], and a channel with constant coefficients using Improper Gaussian Signaling (IGS) [39] and Widely Linear Precoding (WLP) [40]. We can see that the proposed scheme for the MIMO C-IR has the best performance and the IGS and WLP schemes for the constant channel have the worst performance.

6. Conclusions

In this paper, we studied the lower and upper bounds for the sum DoF of the IR-assisted frequency-selective K-user interference channel and proposed novel interference alignment-based coding schemes. The main novelty of this work is proposing a new interference alignment-based coding scheme in which receivers are partitioned into two groups called clean and dirty receivers. In this scheme, a part of the message streams of transmitters corresponding to clean receivers is de-multiplexed at the IR, and the IR uses these streams for an interference cancellation at the clean receivers, which causes an improvement of the DoF. This DoF improvement is achieved because in the interference alignment scheme, the dimension of interference subspaces decreases and the dimension of message subspaces increases at the clean receivers. For a MIMO C-IR, the antennas of which can have coordination with each other, and for an NC-IR (an IR with no coordination between the antennas), we derived achievable DoFs and observed a performance loss for the NC-IR compared with the MIMO C-IR. Moreover, we showed that by considering a number of antennas more than a finite value, a maximum K DoF is achievable for both the MIMO C-IR and NC-IR. The directions of our future work will contains the following aspects: (1) Finding tight bounds for the DoF of a time-selective K-user interference channel in the presence of an IR; (2) Extending our proposed coding scheme for more general wireless channels, e.g., an X network; (3) Extending our coding scheme to a scenario with an imperfect CSI.

Author Contributions

Conceptualization, A.H.A.B.; Formal analysis, A.H.A.B. and M.M.; Supervision, M.M. and M.N.-K.; Validation, M.M. and M.N.-K.; Writing—original draft, A.H.A.B.; Writing—review & editing, M.M. and M.N.-K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

In this scheme, we use only one frequency slot: ω 1 . We set L = min { W , Q } . We assume that only the transmitters i { 1 , , L } send their messages to the receivers j { 1 , , L } via the symbols X [ i ] ( ω 1 ) , i { 1 , , L } , and other transmitters are silent ( X [ i ] ( ω 1 ) = 0 , i { L + 1 , , K } ). Considering (2), the MIMO C-IR can de-multiplex X [ i ] ( ω 1 ) , i { 1 , , L } by using L linear equations in the first L receiving antennas almost surely because the matrix of the coefficients is in terms of independent random variables; thus, the matrix’s determinant is a non-zero polynomial of independent random variables with a continuous cumulative probability distribution, and considering [34] (Lemma 1), it is a non-zero with the probability 1. Then, the MIMO C-IR designs its transmitted signal to remove the interference in each receiver j { 1 , , L } by solving the following linear equations:
i { 1 , , L } , i j H [ j i ] ( ω 1 ) ( X [ i ] ( ω 1 ) + Z ˜ [ i ] ( ω t ) ) = u = 1 L H IR R [ j u ] X IR [ u ] , j 1 , , L ,
Z ˜ ˜ [ j ] ( ω t ) = i { 1 , , L } , i j H [ j i ] ( ω 1 ) Z ˜ [ i ] ( ω t ) ,
where Z ˜ [ i ] ( ω t ) is the detection noise for symbol X [ i ] ( ω t ) at the MIMO C-IR. Note that by using this procedure, the interference cancellation is conducted, but we have the additional noise Z ˜ ˜ [ j ] ( ω t ) , which is negligible in a high signal to noise ratio (SNR) regime. Therefore, L symbols can be transmitted in one frequency slot, and the total L DoF is achievable. Thus, the second term in (11) is achievable, which completes the proof.

Appendix B

Using (36) and (39), we characterize the message subspaces C ¯ j and C ˜ j as follows:
C ¯ j = span H [ j j ] V ¯ [ j ] =
span H [ j j ] M ( g 1 ( i , j ) , H [ j i ] , S ¯ 1 ) M ( g 2 ( i , q ) , H T IR [ q i ] , S ¯ 2 ) w : g 1 F S ¯ 1 , { 1 , , n } , g 2 F S ¯ 2 , { 1 , , s n } ,
where S ¯ 1 , S ¯ 2 , F ( · , · ) , and M ( · , · , · ) are given by using (37), (38), (34), and (35), respectively.
C ˜ j = span H ˜ [ j j ] V ˜ [ j ] =
span H ˜ [ j j ] M ( g 1 ( i , j ) , H ˜ [ j i ] , S ¯ 1 ) M ( g 2 ( i , q ) , H T IR [ q i ] , S ˜ 2 ) M ( g 3 ( i , q ) , T [ q i ] , S ˜ 3 ) w :
g 1 F S ¯ 1 , { 1 , , n } , g 2 F S ˜ 2 , { 1 , , s n } , g 3 F S ˜ 3 , { 1 , , υ n } ,
where S ˜ 2 and S ˜ 3 are given by using (40) and (41), respectively.
To satisfy interference alignment Equation (24), the subspace A ¯ j must be chosen such that:
i { 1 , , K } , i j span H [ j i ] V ¯ [ i ] A ¯ j .
Therefore, we characterize A ¯ j as follows:
A ¯ j =
span M ( g 1 ( i , j ) , H [ j i ] , S ¯ 1 ) M ( g 2 ( i , q ) , H T IR [ q i ] , S ¯ 2 ) w : g 1 F S ¯ 1 , { 1 , , n + 1 } , g 2 F S ¯ 2 , { 1 , , n max { s , t } } ,
where S ¯ 1 and S ¯ 2 are given by using (37) and (38), respectively. Note that to use the zero-forcing technique, the subspace of the interference must be a vector space, but the set of interference vectors, which is equal to i { 1 , , K } , i j span H [ j i ] V ¯ [ i ] , is not a vector space; thus, we choose the subspace of interference (A5), which is easier to work with and includes i { 1 , , K } , i j span H [ j i ] V ¯ [ i ] .
After that step, we analyze the dimension and the normalized asymptotic dimension of the messages and interference subspaces. First, we assume that the parameter T (the number of frequency slots) is sufficiently large, and at the end of Step 5 of the proof, we will choose the minimum value for T such that all message streams can be decodable and all interference alignment equations can be satisfied. Considering the natures of A ¯ j in (A5), C ¯ j in (A3), and C ˜ j in (A4), we can see from a statement of [34] (Lemma 2) that if we choose the variables x k as H [ j i ] ( ω t ) , H T IR [ q i ] ( ω t ) , i , i , j { 1 , , K } , q { 1 , , Q } , y k as H IR R [ j u ] ( ω t ) , j { W + 1 , , K } , u { 1 , , W } , and z k as H IR R [ j u ] ( ω t ) , j { 1 , , W } , u { 1 , , W } , then by using [34] (Lemmas 1–3), the subspaces A ¯ j , C ¯ j and C ˜ j are almost surely full-rank and linearly independent (all base vectors of these subspaces are linearly independent). In fact, if we take the constructing base vectors of A ¯ j , C ¯ j and C ˜ j and construct a square matrix by choosing some rows of the matrix, we can see by using [34] (Lemmas 2–3) that the determinant of this square matrix will be a non-zero polynomial, and by using [34] (Lemma 1), it will be a non-zero with a probability equal to one; thus, all message streams are decodable at the clean receivers (by using zero forcing).
For more clarity, we will review [34] (Lemmas 1–3) as follows:
Ref. [34] (Lemma 1): Consider the k independent random variables X 1 , , X k , each constructed from a CDF, which is continuous. The probability of the event that the non-zero polynomial P k ( X 1 , , X k ) , constructed from X 1 , , X k with a finite degree, assumes the value zero is zero, i.e., Pr { P k ( X 1 , , X k ) = 0 } = 0 .
Ref. [34] (Lemma 2): Consider the three sets of variables { x i , i A x , A x < } , { y i , i A y , A y < } , and { z i , i A z , A z < } . Consider the following functions:
f j = i = 1 A x x i + i C j , i D j x i y i P 1 [ i i j ] ( z k : k A z ) + y i P 2 [ i i j ] ( z k : k A z ) a i j ,
( a 1 j , , a A x j ) W A x , j { 1 , , J } ,
where P 1 [ i i j ] ( · ) and P 2 [ i i j ] ( · ) are fractional polynomials and for j , we have C j , D j < . If for j , j with j j , ( a 1 j , , a A x j ) ( a 1 j , , a A x j ) , then the functions f j will be linearly independent.
Ref. [34] (Lemma 3): Consider the set of non-zero linearly independent fractional polynomials { P [ j ] ( · ) , j { 1 , , J } } and consider the J sets of variables X j = { x i j : i I , I N , | I | < } , j { 1 , , J } . The determinant of the following matrix will be a non-zero fractional polynomial:
A = P [ 1 ] ( X 1 ) P [ 2 ] ( X 1 ) P [ J ] ( X 1 ) P [ 1 ] ( X 2 ) P [ 2 ] ( X 2 ) P [ J ] ( X 2 ) P [ 1 ] ( X J ) P [ 2 ] ( X J ) P [ J ] ( X J ) .
Now, we have to make sure that interference alignment Equations (24) and (25) are satisfied by analyzing the dimension of message streams and interference. The dimension of the message subspaces C ¯ j and C ˜ j , which is equal to the number of its base vectors in (A3) and (A4), can be characterized as follows:
d ( C ¯ j ) = n K 2 K ( s n ) Q K ,
d ( C ˜ j ) = n K 2 K ( s n ) φ ( υ n ) θ ,
where
φ = q = 1 Q ( K B q ) = K Q q = 1 Q B q = K Q W ,
θ = q = 1 Q B q = W .
The dimension of the interference subspace A ¯ j , which is equal to the number of its base vectors in (A5), is:
d ( A ¯ j ) = ( n + 1 ) K 2 K max { s n , t n } Q K .
We can see from (A8)–(A10) and (10) that l = K 2 K + Q K . We define the following parameters:
Γ = s Q K ,
χ = s Q K W υ W ,
ζ = t Q K .
Considering (A8)–(A13) and (10), the normalized asymptotic dimensions of the message and interference subspaces are:
D N ( C ¯ j ) = Γ ,
D N ( C ˜ j ) = χ ,
D N ( A ¯ j ) = max { Γ , ζ } .
Interference alignment Equations (24) and (25) are satisfied because we can see that the normalized asymptotic dimension of the interference induced by V ¯ [ i ] x ¯ [ i ] , i { 1 , , W } , i j is Γ and the normalized asymptotic dimension of the interference induced by V ¯ [ i ] x ¯ [ i ] , i { W + 1 , , K } is ζ .

Appendix C

Using (42), we can characterize the message subspace C ¯ j as follows:
C ¯ j = span H [ j j ] V ¯ [ j ] =
span H [ j j ] M ( g 1 ( i , j ) , H [ j i ] , S ¯ 1 ) M ( g 2 ( i , q ) , H T IR [ q i ] , S ¯ 2 ) w : g 1 F S ¯ 1 , { 1 , , n } , g 2 F S ¯ 2 , { 1 , , t n } ,
where S ¯ 1 , S ¯ 2 , F ( · , · ) , and M ( · , · , · ) are given by using (37), (38), (34), and (35), respectively.
To satisfy interference alignment Equation (26), the subspace A ¯ j must be chosen such that:
i { 1 , , K } , i j span H [ j i ] V ¯ [ i ] A ¯ j .
Therefore, we characterize A ¯ j as follows:
A ¯ j =
span M ( g 1 ( i , j ) , H [ j i ] , S ¯ 1 ) M ( g 2 ( i , q ) , H T IR [ q i ] , S ¯ 2 ) w : g 1 F S ¯ 1 , { 1 , , n + 1 } , g 2 F S ¯ 2 , { 1 , , n max { s , t } } ,
where S ¯ 1 and S ¯ 2 are given by (37) and (38), respectively. To satisfy interference alignment Equation (28), the subspace A ˜ j must be chosen such that:
i { 1 , , W } span H ˜ [ j i ] V ˜ [ i ] A ˜ j .
Therefore, we characterize subspace A ¯ j as follows:
A ˜ j = span M ( g 1 ( i , j ) , H ˜ [ j i ] , S ¯ 1 ) M ( g 2 ( i , q ) , H T IR [ q i ] , S ˜ 2 ) M ( g 3 ( i , q ) , T [ q i ] , S ˜ 3 ) w :
g 1 F S ¯ 1 , { 1 , , n + 1 } , g 2 F S ˜ 2 , { 1 , , s n } , g 3 F S ˜ 3 , { 1 , , υ n } ,
where S ˜ 2 and S ˜ 3 are given by using (40) and (41), respectively.
By using the same argument given for the clean receivers, subspaces A ¯ j , A ˜ j , and C ¯ j are full-rank and linearly independent almost surely, i.e., all base vectors of these subspaces are linearly independent. Now, we analyze the dimensions of the message and interference subspaces. By calculating the number of base vectors of the message subspace C ¯ j in (A17), we have:
d ( C ¯ j ) = n K 2 K ( t n ) Q K ,
D N ( C ¯ j ) = ζ ,
and for the interference subspaces in (A18) and (A19), we have:
d ( A ¯ j ) = ( n + 1 ) K 2 K max { s n , t n } Q K ,
D N ( A ¯ j ) = max { Γ , ζ } ,
d ( A ˜ j ) = ( n + 1 ) K 2 K ( s n ) Q K W ( υ n ) W ,
D N ( A ˜ j ) = χ .
Therefore, we can see that interference alignment Equations (26)–(29) are satisfied because the normalized asymptotic dimension of the interference subspace induced by V ˜ [ i ] x ˜ [ i ] , i { 1 , . . , W } is χ , the normalized asymptotic dimension of the interference subspace induced by V ¯ [ i ] x ¯ [ i ] , i { 1 , . . , W } is Γ , and the normalized asymptotic dimension of the interference subspace induced by V ¯ [ i ] x ¯ [ i ] , i { W + 1 , . . , K } , i j is ζ .

Appendix D

Using (39), we can characterize the message subspaces C ˜ i , r q , i B q as follows:
C ˜ i , r q = span H T IR [ q i ] V ˜ [ i ] =
span H T IR [ q i ] M ( g 1 ( i , j ) , H ˜ [ j i ] , S ¯ 1 ) M ( g 2 ( i , q ) , H T IR [ q i ] , S ˜ 2 ) M ( g 3 ( i , q ) , T [ q i ] , S ˜ 3 ) w :
g 1 F S ¯ 1 , { 1 , , n } , g 2 F S ˜ 2 , { 1 , , s n } , g 3 F S ˜ 3 , { 1 , , υ n } ,
where S ˜ 2 , S ˜ 3 , F ( · , · ) , and M ( · , · , · ) are given by using (40), (41), (34), and (35), respectively.
To satisfy interference alignment Equation (30), the subspace A ¯ r q must be chosen such that:
i { 1 , , K } span H T IR [ q i ] V ¯ [ i ] A ¯ r q .
Therefore, we can characterize A ¯ j as follows:
A ¯ r q =
span M ( g 1 ( i , j ) , H [ j i ] , S ¯ 1 ) M ( g 2 ( i , q ) , H T IR [ q i ] , S ¯ 2 ) w : g 1 F S ¯ 1 , { 1 , , n } , g 2 F S ¯ 2 , { 1 , , n max { s , t } + 1 } ,
where S ¯ 1 and S ¯ 2 are given by using (37) and (38), respectively.
To satisfy interference alignment Equation (32), the subspace A ˜ r q must be chosen such that:
i { 1 , , W } , i B q span H T IR [ q i ] V ˜ [ i ] A ˜ r q .
Therefore, we characterize A ˜ j as follows:
A ˜ r q = span M ( g 1 ( i , j ) , H ˜ [ j i ] , S ¯ 1 ) M ( g 2 ( i , q ) , H T IR [ q i ] , S ˜ 2 ) M ( g 3 ( i , q ) , T [ q i ] , S ˜ 3 ) w :
g 1 F S ¯ 1 , { 1 , , n } , g 2 F S ˜ 2 , { 1 , , s n + 1 } , g 3 F S ˜ 3 , { 1 , , υ n } ,
where S ˜ 2 and S ˜ 3 are given by using (40) and (41), respectively.
By using the same argument given for the clean receivers, subspaces A ¯ r q , A ˜ r q and C ˜ i , r q , i B q are full-rank and linearly independent almost surely, i.e., all base vectors of these subspaces are linearly independent. Now, by calculating the number of base vectors, we can analyze the dimensions of the subspaces C ˜ i , r q , i B q , A ¯ r q and A ˜ r q :
d ( C ˜ i , r q ) = n K 2 K ( s n ) Q K W ( υ n ) W , i B q ,
D N ( C ˜ i , r q ) = χ .
Thus, the normalized dimension of the total subspaces, the message symbols of which may be de-multiplexed ( x ˜ [ i ] , i B q ) at the MIMO C-IR q-th receiving antenna is:
i B q D N ( C ˜ i , r q ) = B q χ .
For A ¯ r q , we have:
d ( A ¯ r q ) = n K 2 K max { s n , t n } + 1 K Q ,
D N ( A ¯ r q ) = max { Γ , ζ } ,
and for A ˜ r q , we have:
d ( A ˜ r q ) = n K 2 K ( s n + 1 ) Q K W ( υ n ) W ,
D N ( A ˜ r q ) = χ .
Thus, we can see that interference alignment Equations (30)–(33) are satisfied.

Appendix E

The second term of (68) is exactly the same as the second term of (11) in Theorem 1. The proof of the first term is similar to the proof of the first term of (11) in Theorem 1 with a difference in the MIMO C-IR de-multiplexing method. In the proof of Theorem 1, each MIMO C-IR receiving antenna q de-multiplexes the message streams x ˜ i , i B q separately without a coordination with other receiving antennas. However, in the proof of this theorem, we use a coordination between the MIMO C-IR receiving antennas. Without a loss of generality, assume that B 1 = Z + 1 and B q = Z , q 1 . To de-multiplex the message streams x ˜ i , i { 1 , , W } at the MIMO C-IR, first we de-multiplex the message streams x ˜ i , i B q , q 1 at the q-th MIMO C-IR receiving antenna separately. Then, to de-multiplex the message streams x ˜ i , i B 1 , we first remove the interference induced by the message streams x ˜ i , i { 1 , , W } , i B 1 . This results in a decrement in the total normalized asymptotic dimension at the first receiving antenna of the MIMO C-IR (the amount of decrement is χ ), so (58) changes into the following form for q = 1 :
D N , t , r 1 = W Q χ + χ + max { Γ , ζ } ,
and the constraint (63) changes into the following form:
ζ W Q χ .
Then, we see that the DoF (68) is achievable.

Appendix F

The proof of this theorem is similar to the first term in the proof of Theorem 1. Here, we use the variable U introduced in the statement of the theorem to denote the number of clean receivers. Note that to avoid several notations, we use the same notations (such as the name of sets and vector subspaces) used in the proof of Theorem 1. Thus, from now on, these notations belong to this theorem. Our proof has six steps as follows.
Step 1: Dividing Receivers, Transmitters, and NC-IR Antennas
Using the same method as Step 1 of the proof of the first term in Theorem 1, we divide the transmitters into two partitions. For the transmitters i { 1 , , U } , we provide two sets of symbol streams: x ¯ [ i ] and x ˜ [ i ] . The matrices V ¯ [ i ] and V ˜ [ i ] are beamforming matrices, the columns of which are the beamforming vectors for each element of x ¯ [ i ] and x ˜ [ i ] , respectively. For the transmitters i { U + 1 , , K } , we provide only one set of the symbol stream x ¯ [ i ] , and the matrix V ¯ [ i ] is the beamforming matrix for the symbols x ¯ [ i ] . Hence, the vectors X [ i ] will have the forms of (12) and (13) by using the setting W = U . The reason for this kind of partitioning is the same as in Theorem 1. The main difference here is in the interference alignment scheme used for de-multiplexing the message streams x ˜ [ i ] , i { 1 , , U } in the NC-IR receiving antennas.
Next, we divide the transmitters i { 1 , , U } into the p distinct sets E l , l { 1 , , p } such that for l { 1 , , e } , we have E l = e + 1 , and for l { e + 1 , , p } , we have E l = e . Similarly, we divide the NC-IR antennas into the p distinct sets F l , l { 1 , , p } such that F l = U , l { 1 , , p } . Now, we design the beamforming matrices V ¯ [ i ] and V ˜ [ i ] such that the message streams x ˜ [ i ] , i E l may be de-multiplexed in each of the NC-IR antennas u F l for l { 1 , , p } .
Step 2: Interference Cancellation at the Clean Receivers and Equivalent Channel at the Dirty Receivers
For the interference cancellation, we design the outputs of antennas in the set F l such that the interference induced by the message streams x ˜ [ i ] , i E l is removed at the clean receivers j { 1 , , U } . Thus, the NC-IR antennas’ transmitted signal must be designed such that they satisfy the following:
i E l , i j H [ j i ] V ˜ [ i ] x ˜ [ i ] = u F l H IR R [ j u ] X IR [ u ] , j 1 , , U , l 1 , , p .
The solution to (A31) can be derived as follows:
X IR [ u ] = j { 1 , , U } i E l , i j H inv [ j u ] H [ j i ] V ˜ [ j i ] x ˜ [ i ] , u F l ,
where H inv [ j u ] is a T × T diagonal matrix and its t-th diagonal element is a fractional polynomial in terms of H IR R [ j u ] ( ω t ) , u F l , j { 1 , , U } . This solution exists almost surely because the matrix of the coefficients of the linear equations is in terms of independent random variables, its determinant is a non-zero polynomial in terms of these random variables drawn from a CDF, which is continuous, and by using [34] (Lemma 1), it is a non-zero with the probability 1. Note that each NC-IR receiving antenna de-multiplexes the symbol streams x ˜ [ i ] with additive noise. This event does not disturb the equations above because if each symbol is replaced by a symbol with additive noise, the interference cancellation holds but we have additional noise, which is negligible in a high SNR regime. We can see that the received signals at the receivers have the same forms as (22) and H inv [ j u ] and the equivalent channel matrix H ˜ [ j i ] has the same properties introduced in Step 2 of the proof of the first term in Theorem 1.
Step 3: Interference Alignment Equations
The interference alignment equations and message and interference subspaces for the clean and dirty receivers are the same as in Step 3 of the proof of the first term in Theorem 1 ((24)–(29)) if we replace W with U. Consider q { 1 , , p U } : we define the function L ( q ) = l if q F l (l is unique because the sets F l are disjointed). We designed the interference alignment scheme such that the symbol streams x ˜ [ i ] , i E L ( q ) can be de-multiplexed at the q-th receiving antenna of the NC-IR. Thus, the interference alignment equations for the NC-IR change as follows.
To this end, all the interference induced by the symbol streams x ¯ [ i ] must align into a limited subspace. Therefore, at the q-th receiving antenna of the NC-IR and for each i { 1 , , K } , we must have:
span H T IR [ q i ] V ¯ [ i ] A ¯ r q ,
where A ¯ r q is considered a subspace for which we have:
max i { 1 , , K } D N span H T IR [ q i ] V ¯ [ i ] = D N ( A ¯ r q ) .
Then, for each i { 1 , , U } , i E L ( q ) , we have:
span H T IR [ q i ] V ˜ [ i ] A ˜ r q ,
where A ˜ r q is considered a subspace for which we have:
max i { 1 , , U } , i E L ( q ) D N span H T IR [ q i ] V ˜ [ i ] = D N ( A ˜ r q ) .
Moreover, we define C ˜ i , r q , i E L ( q ) as the message subspaces, which can be de-multiplexed at the NC-IR q-th antenna as follows:
C ˜ i , r q = span H T IR [ q i ] V ˜ [ i ] , i E L ( q ) .
We want C ˜ i , r q , i E L ( q ) , A ¯ r q and A ˜ r q to be full-rank and linearly independent, so we can make sure that the message streams x ˜ [ i ] , i E L ( q ) can be de-multiplexed at the q-th NC-IR antenna. In Steps 4 and 5, we prove the existence of such beamforming vectors, messages, and interference subspaces, which satisfies the previous interference alignment equations for the clean and dirty receivers and the MIMO C-IR. In Step 6, we analyze the achieved DoF by using the beamforming vectors’ design.
Step 4: Beamforming Matrix Design
The beamforming matrices V ¯ [ i ] , i { 1 , , K } are the same as (36) and (42) if we replace W with U. For V ˜ [ i ] , we have:
V ˜ [ i ] = M ( g 1 ( i , j ) , H ˜ [ j i ] , S ¯ 1 ) M ( g 2 ( i , q ) , H T IR [ q i ] , S ˜ 2 ) M ( g 3 ( i , q ) , T [ q i ] , S ˜ 3 ) w :
g 1 F S ¯ 1 , { 1 , , n } , g 2 F S ˜ 2 , { 1 , , s n } , g 3 F S ˜ 3 , { 1 , , υ n } ,
where S ¯ 1 , F ( · , · ) and M ( · , · , · ) are given by using (37), (34), and (35), respectively, and we have:
S ˜ 2 = ( i , q ) i { 1 , , K } , i E L ( q ) , q { 1 , , Q } ,
S ˜ 3 = ( i , q ) i E L ( q ) , q { 1 , , Q } .
T [ q i ] s are T × T diagonal random matrices for each ( i , q ) , where each diagonal element for each matrix is drawn independently and its CDF is continuous.
Note that similar to the proof of Theorem 1, each value of the parameters s , υ and t can be approximated by using rational numbers with arbitrarily small errors, and by choosing a sufficiently large n, the parameters s n , υ n and t n will be integers.
Step 5: Validity of Interference Alignment Conditions and Decodability of Message Symbols
(1) Validity of Interference Alignment Conditions at Clean Receivers j { 1 , , U } : The message subspace C ¯ j and the interference subspace A ¯ j will be exactly the same as (A3) and (A5). The message subspaces C ˜ j will change as follows:
C ˜ j = span H ˜ [ j j ] V ˜ [ j ] =
span H ˜ [ j j ] M ( g 1 ( i , j ) , H ˜ [ j i ] , S ¯ 1 ) M ( g 2 ( i , q ) , H T IR [ q i ] , S ˜ 2 ) M ( g 3 ( i , q ) , T [ q i ] , S ˜ 3 ) w :
g 1 F S ¯ 1 , { 1 , , n } , g 2 F S ˜ 2 , { 1 , , s n } , g 3 F S ˜ 3 , { 1 , , υ n } ,
where S ˜ 2 and S ˜ 3 are given by using (A40) and (A41).
Considering the natures of A ¯ j in (A5), C ¯ j in (A3), and C ˜ j in (A42), we can see from a statement by [34] (Lemma 2) that if we choose the variables x k as H [ j i ] ( ω t ) , H T IR [ r i ] ( ω t ) , i , i , j { 1 , , K } , u { 1 , , Q } , y k as H IR R [ j u ] ( ω t ) , j { U + 1 , , K } , u { 1 , , Q } , and z k as H IR R [ j u ] ( ω t ) , j { 1 , , U } , u { 1 , , Q } , then by using [34] (Lemmas 1–3), subspaces A ¯ j , C ¯ j and C ˜ j are full-rank and linearly independent (all base vectors of these subspaces are linearly independent) almost surely. The reason is that if we take the constructing base vectors of A ¯ j , C ¯ j , and C ˜ j and construct a square matrix by choosing some rows of it, we can see by using [34] (Lemmas 2–3) that the determinant of this square matrix is a non-zero polynomial, which is non-zero with the probability 1 by using [34] (Lemma 1). Thus, all the message streams are decodable at the clean receivers (by using zero forcing). For more clarity, [34] (Lemmas 1–3) are reviewed in Appendix B.
Similar to the proof of Theorem 1, first we assume that the parameter T is sufficiently large, and at the end of this step, we determine the minimum required T. The dimensions of the subspaces C ¯ j and A ¯ j are the same as (A8) and (A10), respectively. Hence, we calculate the dimension of C ˜ j by calculating the number of its base vectors in (A42) as follows:
d ( C ˜ j ) = n K 2 K ( s n ) φ ( υ n ) θ ,
where
φ = q = 1 Q ( K E L ( q ) ) = K Q q = 1 Q E L ( q ) = K Q U 2 ,
θ = q = 1 Q E L ( q ) = U 2 .
We can see from (10) that l = K 2 K + Q K . We can define the following parameters:
Γ = s Q K ,
χ = s Q K U 2 υ U 2 ,
ζ = t Q K .
Therefore, the normalized asymptotic dimensions of the message and interference subspaces are:
D N ( C ¯ j ) = Γ ,
D N ( C ˜ j ) = χ ,
D N ( A ¯ j ) = max { Γ , ζ } .
Thus, interference alignment Equations (24) and (25) are satisfied.
(2) Validity of interference alignment conditions at the dirty receivers j { U + 1 , , K } : For the dirty receivers, the message subspace C ¯ j and the interference subspace A ¯ j are exactly the same as (A17) and (A18). To satisfy interference alignment Equation (28) (if W is replaced with U), the subspace A ˜ j must be chosen such that:
i { 1 , , U } span H ˜ [ j i ] V ˜ [ i ] A ˜ j .
Therefore, we can characterize subspace A ˜ j as follows:
A ˜ j = span M ( g 1 ( i , j ) , H ˜ [ j i ] , S ¯ 1 ) M ( g 2 ( i , q ) , H T IR [ q i ] , S ˜ 2 ) M ( g 3 ( i , q ) , T [ q i ] , S ˜ 3 ) w :
g 1 F S ¯ 1 , { 1 , , n + 1 } , g 2 F S ˜ 2 , { 1 , , s n } , g 3 F S ˜ 3 , { 1 , , υ n } ,
where S ˜ 2 and S ˜ 3 are given by using (A40) and (A41).
By using the same argument given for A ¯ j , C ¯ j and C ˜ j at the clean receivers, subspaces A ¯ j , A ˜ j and C ¯ j are full-rank and linearly independent almost surely. Then, we have:
D N ( C ¯ j ) = ζ ,
D N ( A ¯ j ) = max { Γ , ζ } ,
d ( A ˜ j ) = ( n + 1 ) K 2 K ( s n ) Q K U 2 ( υ n ) U 2 ,
D N ( A ˜ j ) = χ .
Hence, we can see that interference alignment Equations (26)–(29) are satisfied.
(3) Validity of interference alignment conditions at the q-th antenna of the NC-IR q { 1 , , Q } :The interference subspace A ¯ r q is exactly the same as (A24) if we replace W with U. The message subspaces C ˜ i , r q , i E L ( q ) and the interference subspace A ˜ r q will change as follows:
C ˜ i , r q = span H T IR [ q i ] V ˜ [ i ] =
span H T IR [ q i ] M ( g 1 ( i , j ) , H ˜ [ j i ] , S ¯ 1 ) M ( g 2 ( i , q ) , H T IR [ q i ] , S ˜ 2 ) M ( g 3 ( i , q ) , T [ q i ] , S ˜ 3 ) w :
g 1 F S ¯ 1 , { 1 , , n } , g 2 F S ˜ 2 , { 1 , , s n } , g 3 F S ˜ 3 , { 1 , , υ n } ,
where S ˜ 2 and S ˜ 3 are given by using (40) and (41), respectively.
C ˜ i , r q = span H T IR [ q i ] V ˜ [ i ] =
span H T IR [ q i ] M ( g 1 ( i , j ) , H ˜ [ j i ] , S ¯ 1 ) M ( g 2 ( i , q ) , H T IR [ q i ] , S ˜ 2 ) M ( g 3 ( i , q ) , T [ q i ] , S ˜ 3 ) w :
g 1 F S ¯ 1 , { 1 , , n } , g 2 F S ˜ 2 , { 1 , , s n } , g 3 F S ˜ 3 , { 1 , , υ n } ,
where S ˜ 2 and S ˜ 3 are given by using (A40) and (A41), respectively.
To satisfy interference alignment Equation (A35), the subspace A ˜ r q must be chosen such that:
i { 1 , , U } , i E L ( q ) span H T IR [ q i ] V ˜ [ i ] A ˜ r q .
Therefore, we can characterize A ˜ j as follows:
A ˜ r q = span M ( g 1 ( i , j ) , H ˜ [ j i ] , S ¯ 1 ) M ( g 2 ( i , q ) , H T IR [ q i ] , S ˜ 2 ) M ( g 3 ( i , q ) , T [ q i ] , S ˜ 3 ) w :
g 1 F S ¯ 1 , { 1 , , n } , g 2 F S ˜ 2 , { 1 , , s n + 1 } , g 3 F S ˜ 3 , { 1 , , υ n } ,
where S ˜ 2 and S ˜ 3 are given by using (A40) and (A41), respectively.
By using the same argument given before, subspaces A ¯ r q , A ˜ r q , and C ˜ i , r q , i E L ( q ) are full-rank and linearly independent almost surely. We can see that:
d ( C ˜ i , r q ) = n K 2 K ( s n ) Q K U 2 ( υ n ) U 2 , i E L ( q ) ,
D N ( C ˜ i , r q ) = χ ,
so the normalized dimension of the total subspaces that can be de-multiplexed at the NC-IR q-th antenna is:
i E L ( q ) D N ( C ˜ i , r q ) = E L ( q ) χ .
For A ¯ r q , the same as in the proof of Theorem 1, we have:
D N ( A ¯ r q ) = max { Γ , ζ } .
For A ˜ r q , we have:
d ( A ˜ r q ) = n K 2 K ( s n + 1 ) Q K U 2 ( υ n ) U 2 ,
D N ( A ˜ r q ) = χ .
Thus, we can see that interference alignment Equations (30)–(33) are satisfied.
The same as in the proof of scheme 1 in Theorem 1, we derive the dimension of the whole received signal space at each receiver. Therefore, if we define d t , j as the total dimension at the j-th receiver and d t , r q as the total dimension at the q-th receiving antenna of the NC-IR, then we can see (53)–(55) will be obtained if we replace W and B q with U and E L ( q ) , respectively. Therefore, considering D N , t , j as the total normalized asymptotic dimension at the j-th receiver and D N , t , r q as the total normalized asymptotic dimension at the q-th antenna of the NC-IR, we have:
D N , t , j = Γ + χ + max { Γ , ζ } , j { 1 , , U } ,
D N , t , j = ζ + χ + max { Γ , ζ } , j { U + 1 , , K } ,
D N , t , r q = E L ( q ) χ + χ + max { Γ , ζ } , q { 1 , , Q } .
Considering the parameter T as (59), we have:
lim n T n K 2 K + Q K = χ + max Γ , ζ + max max q { 1 , , Q } E L ( q ) χ , ζ , Γ .
Moreover, we have:
max q { 1 , , Q } E L ( q ) = U p .
Therefore, from using (A64) and (A65), we can conclude that:
lim n T n K 2 K + Q K = χ + max Γ , ζ + max U p χ , ζ , Γ .
Moreover we let:
Γ = ζ ,
ζ U p χ .
By using assumptions (A67) and (A68), we can see that the total normalized length is:
lim n T n K 2 K + Q K = χ + 2 Γ .
Step 6: DoF Analysis
Now, we can characterize the total DoF. As stated before, we have U clean receivers, each with a normalized message dimension equal to Γ + χ , and K U dirty receivers, each with a normalized message dimension equal to ζ (note that we assumed ζ = Γ ). Therefore, the total normalized length of T is equal to χ + 2 Γ . Thus, the total DoF has the following form:
DoF = max χ 0 , Γ U p χ U ( χ + Γ ) + ( K U ) Γ χ + 2 Γ .
By assuming that Γ = β χ , we have:
DoF = max β U p U ( 1 + β ) + ( K U ) β 1 + 2 β
= K 2 + max β U p K U K 1 2 1 + 2 β = K 2 + max K U K 1 2 1 + 2 U p , 0 ,
where (A72) follows from the fact that if U K > 1 2 , we set β = U p , and if U K < 1 2 , we tend β to . This completes the proof.

References

  1. Cadambe, V.R.; Jafar, S.A. Interference alignment and the degrees of freedom of the K-User interference channel. IEEE Trans. Inf. Theory 2008, 54, 2334–2344. [Google Scholar] [CrossRef] [Green Version]
  2. El Gamal, A.; Hassanpour, N. Relay-without-delay. In Proceedings of the International Symposium on Information Theory (ISIT), Adelaide, SA, Australia, 4–9 September 2005. [Google Scholar]
  3. Lee, N.; Wang, C. Aligned interference neutralization and the degrees of freedom of the two-user wireless networks with an instantaneous relay. IEEE Trans. Commun. 2013, 61, 3611–3619. [Google Scholar] [CrossRef]
  4. Cadambe, V.R.; Jafar, S.A. Degrees of freedom of wireless networks with relays, feedback, cooperation, and full duplex operation. IEEE Trans. Inf. Theory 2009, 55, 2334–2344. [Google Scholar] [CrossRef]
  5. Di Renzo, M.; Debbah, M.; Phan-Huy, D.T.; Zappone, A.; Alouini, M.S.; Yuen, C.; Sciancalepore, V.; Alexandropoulos, G.C.; Hoydis, J.; Gacanin, H.; et al. Smart radio environments empowered by AI reconfigurable meta-surfaces: An idea whose time has come. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 129. [Google Scholar] [CrossRef] [Green Version]
  6. El Gamal, A.; Hassanpour, N.; Mammen, J. Relay networks with delays. IEEE Trans. Inf. Theory 2007, 53, 3413–3431. [Google Scholar] [CrossRef]
  7. Salimi, A.; Mirmohseni, M.; Aref, M.R. A new capacity upper bound for “relay-with-delay” channel. In Proceedings of the International Symposium on Information Theory (ISIT), Seoul, Korea, 28 June–3 July 2009. [Google Scholar]
  8. Chang, H.; Chung, S.-Y.; Kim, S. Interference channel with a causal relay under strong and very strong interference. IEEE Trans. Inf. Theory 2014, 60, 859–865. [Google Scholar] [CrossRef]
  9. Ho, Z.K.M.; Jorswieck, E.A. Instantaneous relaying: Optimal strategies and interference neutralization. IEEE Trans. Signal Process. 2012, 60, 6655–6668. [Google Scholar] [CrossRef] [Green Version]
  10. Baik, I.-J.; Chung, S.-Y. Causal relay networks. IEEE Trans. Inf. Theory 2015, 61, 5432–5440. [Google Scholar] [CrossRef]
  11. Kramer, G. Information networks with in-block memory. IEEE Trans. Inf. Theory 2014, 60, 2105–2120. [Google Scholar] [CrossRef] [Green Version]
  12. Zhang, S.; Zhang, R. Capacity characterization for intelligent reflecting surface aided MIMO communication. IEEE J. Sel. Areas Commun. 2020, 38, 1823–1838. [Google Scholar] [CrossRef]
  13. Karasik, R.; Simeone, O.; Di Renzo, M.; Shamai, S. Beyond Max-SNR: Joint encoding for reconfigurable intelligent surfaces. In Proceedings of the International Symposium on Information Theory (ISIT), Los Angeles, CA, USA, 21–26 June 2020. [Google Scholar]
  14. Mu, X.; Liu, Y.; Guo, L.; Lin, J.; Al-Dhahir, N. Exploiting intelligent reflecting surfaces in NOMA networks: Joint beamforming optimization. IEEE Trans. Wirel. Commun. 2020, 19, 6884–6898. [Google Scholar] [CrossRef]
  15. Ozdogan, O.; Bjornson, E.; Larsson, E.G. Using intelligent reflecting surfaces for rank improvement in MIMO communications. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, Barcelona, Spain, 4–8 May 2020. [Google Scholar]
  16. Maddah-Ali, M.A.; Motahari, A.S.; Khandani, A.K. Communication over MIMO X channels: Interference alignment, decomposition, and performance analysis. IEEE Trans. Inf. Theory 2008, 54, 3457–3470. [Google Scholar] [CrossRef]
  17. Gou, T.; Jafar, S.A. Degrees of freedom of the K user M × N MIMO interference channel. IEEE Trans. Inf. Theory 2010, 56, 6040–6057. [Google Scholar] [CrossRef] [Green Version]
  18. Ke, L.; Ramamoorthy, A.; Wang, Z.; Yin, H. Degrees of freedom region for an interference network with general message demands. IEEE Trans. Inf. Theory 2012, 58, 3787–3797. [Google Scholar] [CrossRef]
  19. Khalil, M.; Khattab, T.; El-Keyi, A.; Nafie, M. On the degrees of freedom region of the M × N interference channel. In Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, Vancouver, BC, Canada, 15–18 May 2016. [Google Scholar]
  20. Ruan, L.; Lau, V.K.N. Dynamic interference mitigation for generalized partially connected quasi-static MIMO interference channel. IEEE Trans. Signal Process. 2011, 59, 3788–3798. [Google Scholar] [CrossRef] [Green Version]
  21. Khatiwada, M.; Choi, S.W. On the interference management for K-user partially connected fading interference channels. IEEE Trans. Commun. 2012, 60, 3717–3725. [Google Scholar] [CrossRef]
  22. Gou, T.; da Silva, C.R.C.M.; Lee, J.; Kang, I. Partially connected interference networks with No CSIT: Symmetric degrees of freedom and multicast across alignment blocks. IEEE Commun. Lett. 2013, 17, 1893–1896. [Google Scholar] [CrossRef]
  23. Liu, T.; Yang, C. On the degrees of freedom of partially-connected symmetrically-configured MIMO interference broadcast channels. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, Florence, Italy, 4–9 May 2014. [Google Scholar]
  24. Liu, G.; Sheng, M.; Wang, X.; Jiao, W.; Li, Y.; Li, J. Interference alignment for partially connected downlink MIMO heterogeneous networks. IEEE Trans. Commun. 2015, 63, 551–564. [Google Scholar] [CrossRef]
  25. Liu, W.; Cai, J.; Li, J.; Sheng, M. Interference alignment with finite extensions in partially connected networks. IEEE Trans. Commun. 2017, 65, 851–862. [Google Scholar] [CrossRef]
  26. Zhao, N.; Yu, F.R.; Jin, M.; Yan, Q.; Leung, V.C. Interference alignment and its applications: A survey, research issues, and challenges. IEEE Commun. Soc. Mag. 2016, 18, 1779–1803. [Google Scholar] [CrossRef]
  27. Wang, Q.; Shu, Y.; Dong, M.; Xu, J.; Tao, X. Degrees of freedom of 3-user MIMO interference channels with instantaneous relay using interference alignment. KSII Trans. Internet Inf. Syst. 2015, 9, 1624–1641. [Google Scholar]
  28. Cheng, Z.; Devroye, N.; Liu, T. The degrees of freedom of fullduplex bidirectional interference networks with and without a MIMO relay. IEEE Trans. Wirel. Commun. 2016, 15, 2912–2924. [Google Scholar] [CrossRef]
  29. Liu, T.; Tuninetti, D.; Chung, S.Y. On the DoF region of the MIMO Gaussian two-user interference channel with an instantaneous relay. IEEE Trans. Inf. Theory 2017, 63, 4453–4471. [Google Scholar] [CrossRef]
  30. Azari, A. On the DoF and secure DoF of K-user MIMO interference channel with instantaneous relays. Wirel. Netw. 2020, 26, 1921–1936. [Google Scholar] [CrossRef] [Green Version]
  31. Abdollahi Bafghi, A.H.; Jamali, V.; Nasiri-Kenari, M.; Schober, R. Degrees of freedom of the K-user interference channel assisted by active and passive IRSs. IEEE Trans. Commun. 2022, 70, 3063–3080. [Google Scholar] [CrossRef]
  32. Jiang, T.; Yu, W. Interference nulling using reconfigurable intelligent surface. IEEE J. Sel. Areas Commun. 2022, 40, 1392–1406. [Google Scholar] [CrossRef]
  33. Cadambe, V.R.; Jafar, S.A. Interference alignment and the degrees of freedom of wireless X-networks. IEEE Trans. Inf. Theory 2009, 55, 3893–3908. [Google Scholar] [CrossRef]
  34. Abdollahi Bafghi, A.H.; Jamali, V.; Nasiri-Kenari, M.; Schober, R. Degrees of freedom of the K-user interference channel in the presence of intelligent reflecting surfaces. arXiv 2020, arXiv:2012.13787. Available online: https://arxiv.org/abs/2012.13787 (accessed on 26 December 2020).
  35. Abdollahi Bafghi, A.H.; Mirmohseni, M.; Ashtiani, F.; Nasiri-Kenari, M. Joint optimization of power consumption and transmission delay in a cache-enabled C-RAN. IEEE Wirel. Commun. Lett. 2020, 9, 1137–1140. [Google Scholar] [CrossRef]
  36. Lagen, S.; Agustin, A.; Vidal, J. Coexisting linear and widely linear transceivers in the MIMO interference channel. IEEE Trans. Signal Process. 2016, 64, 652–664. [Google Scholar] [CrossRef] [Green Version]
  37. Soleymani, M.; Santamaria, I.; Schreier, P.J. Improper Gaussian signaling for the K-user MIMO interference channels with hardware impairments. IEEE Trans. Veh. Technol. 2020, 69, 11632–11645. [Google Scholar] [CrossRef]
  38. Cover, T.; Thomas, J.A. Elements of Information Theory; Wiley-Interscience: Hoboken, NJ, USA, 2006. [Google Scholar]
  39. Cadambe, V.R.; Jafar, S.A.; Wang, C. Interference alignment with asymmetric complex signaling—Settling the Høst–Madsen–Nosratinia conjecture. IEEE Trans. Inf. Theory 2010, 56, 4552–4565. [Google Scholar] [CrossRef]
  40. Medra, A.; Davidson, T.N. Widely linear interference alignment precoding. In Proceedings of the International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Toronto, ON, Canada, 22–25 June 2014. [Google Scholar]
Figure 1. IR-assisted K-user interference channel. The IR has W transmitting antennas and Q receiving antennas. Direct links are shown by solid arrows, cross-links are shown by dotted arrows, and links between the IR and transmitters or receivers are shown by dashed arrows.
Figure 1. IR-assisted K-user interference channel. The IR has W transmitting antennas and Q receiving antennas. Direct links are shown by solid arrows, cross-links are shown by dotted arrows, and links between the IR and transmitters or receivers are shown by dashed arrows.
Entropy 24 01078 g001
Figure 2. Interference alignment scheme for 3-user interference channel in the presence of MIMO C-IR with 2 receiving antennas. Subspaces corresponding to symbol streams in common dashed boxes align into a joint subspace at each node. We can see that the interference of the message streams x ˜ [ 1 ] and x ˜ [ 2 ] is canceled at clean receivers.
Figure 2. Interference alignment scheme for 3-user interference channel in the presence of MIMO C-IR with 2 receiving antennas. Subspaces corresponding to symbol streams in common dashed boxes align into a joint subspace at each node. We can see that the interference of the message streams x ˜ [ 1 ] and x ˜ [ 2 ] is canceled at clean receivers.
Entropy 24 01078 g002
Figure 3. Comparison of lower and upper bounds for the sum DoF of the six-user interference channel in the presence of MIMO C-IR for the case without MIMO C-IR.
Figure 3. Comparison of lower and upper bounds for the sum DoF of the six-user interference channel in the presence of MIMO C-IR for the case without MIMO C-IR.
Entropy 24 01078 g003
Figure 4. Comparison of lower and upper bounds for the sum DoF of the four-user interference channel in the presence of MIMO C-IR (with W = Q ), NC-IR, active RIS and for the case without IR.
Figure 4. Comparison of lower and upper bounds for the sum DoF of the four-user interference channel in the presence of MIMO C-IR (with W = Q ), NC-IR, active RIS and for the case without IR.
Entropy 24 01078 g004
Figure 5. Comparison of the achievable sum DoF of the three-user interference channel in the presence of MIMO C-IR (with W = Q ), NC-IR, and active RIS, the time-selective channel without IR [1], and the channel with constant coefficients using Improper Gaussian Signaling (IGS) [39] and Widely Linear Precoding (WLP) [40].
Figure 5. Comparison of the achievable sum DoF of the three-user interference channel in the presence of MIMO C-IR (with W = Q ), NC-IR, and active RIS, the time-selective channel without IR [1], and the channel with constant coefficients using Improper Gaussian Signaling (IGS) [39] and Widely Linear Precoding (WLP) [40].
Entropy 24 01078 g005
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Abdollahi Bafghi, A.H.; Mirmohseni, M.; Nasiri-Kenari, M. Degrees of Freedom of a K-User Interference Channel in the Presence of an Instantaneous Relay. Entropy 2022, 24, 1078. https://doi.org/10.3390/e24081078

AMA Style

Abdollahi Bafghi AH, Mirmohseni M, Nasiri-Kenari M. Degrees of Freedom of a K-User Interference Channel in the Presence of an Instantaneous Relay. Entropy. 2022; 24(8):1078. https://doi.org/10.3390/e24081078

Chicago/Turabian Style

Abdollahi Bafghi, Ali H., Mahtab Mirmohseni, and Masoumeh Nasiri-Kenari. 2022. "Degrees of Freedom of a K-User Interference Channel in the Presence of an Instantaneous Relay" Entropy 24, no. 8: 1078. https://doi.org/10.3390/e24081078

APA Style

Abdollahi Bafghi, A. H., Mirmohseni, M., & Nasiri-Kenari, M. (2022). Degrees of Freedom of a K-User Interference Channel in the Presence of an Instantaneous Relay. Entropy, 24(8), 1078. https://doi.org/10.3390/e24081078

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop