Next Article in Journal
Estimation of 3D Knee Joint Angles during Cycling Using Inertial Sensors: Accuracy of a Novel Sensor-to-Segment Calibration Procedure Based on Pedaling Motion
Previous Article in Journal
A Differential Detection Method Based on a Linear Weak Measurement System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Exploiting Joint Base Station Equipped Multiple Antenna and Full-Duplex D2D Users in Power Domain Division Based Multiple Access Networks

1
Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City 700000, Vietnam
2
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City (IUH), Ho Chi Minh City 700000, Vietnam
3
School of Intelligent Mechatronics Engineering, Sejong University, Seoul 05006, Korea
*
Authors to whom correspondence should be addressed.
Sensors 2019, 19(11), 2475; https://doi.org/10.3390/s19112475
Submission received: 13 May 2019 / Revised: 24 May 2019 / Accepted: 27 May 2019 / Published: 30 May 2019
(This article belongs to the Section Sensor Networks)

Abstract

:
In this paper, we investigate power domain division-based multiple access (PDMA) to support the base stations (BS) equipped with multiple antennas to serve mobile users. Such a system deploys multiple input single output (MISO)-based wireless transmission and a full-duplex (FD) scheme. Furthermore, such MISO PDMA system consists of BS employing transmit antenna selection to reduce complexity in signal processing at the receivers. We distinguish two kinds of mobile users, device-to-device (D2D) users and traditional users. In such MISO PDMA, there exists a trade-off between outage performance of each PDMA user and power allocation factors. Since the implementation of the FD scheme at PDMA users, bandwidth efficiency will be enhanced despite the existence of self-interference related to such FD. In particular, exact expressions of outage probability are derived to exhibit system performance with respect to D2D users. Finally, valuable results from the simulated parameters together with the analytical results show that MISO PDMA can improve its performance by increasing the number of transmit antennas at the BS.

1. Introduction

To adapt fast development in wireless techniques, many protocols and topologies have been introduced. One of these schemes, relaying networks has recently attracted the research community due to extended coverage and improved reliability [1,2,3,4]. Full-duplex is considered a scheme that exhibits higher bandwidth efficiency and such schemes are proposed in wireless powered relaying networks as in [2,3]. However, multiple users need to be served to access the core network, and it requires the base station in a cellular network that can transmit a mixture of signals to them. To address this shortcoming, PDMA or non-orthogonal multiple access (NOMA) has been recently introduced to improve the spectral efficiency and to provide fairness in resource allocation. These advantages can be performed by multiplexing multiple users on the same time/frequency resource [5,6,7,8,9,10,11,12]. In particular, NOMA employs the power domain to serve multiple access and harnesses interference via superposition coding at the transmitter, while successive interference cancellation (SIC) is required at the receiver. In [6], the authors investigated maximal performance of single-input single output (SISO) single-carrier (SC) NOMA systems in terms of system throughput and they explored the optimal power allocation design. The higher spectral efficiency can be achieved in SISO NOMA compared to conventional SISO OMA [6]. The suboptimal precoding design is presented for minimization of the transmit power in multiple-input single-output (MISO) SC-NOMA systems [7]. In addition, zero-forcing downlink (DL) beamforming was analyzed in MISO SC-NOMA systems [8].
Furthermore, it is very expensive to deploy a MISO system since both space-time codes and transmit beamforming require multiple RF chains [13]. Fortunately, the antenna selection scheme is proposed to overcome such disadvantage, providing a good trade-off between cost, complexity, and performance [13]. Antenna selection can be implemented at both ends, and transmit antenna selection with maximal-ratio combining (TAS/MRC) is presented in [14]. This scheme can be mainly described as follows: by using CSI feedback, the best transmit antenna out of all transmit candidates to maximize the post processing signal to noise ratio (SNR) at the MRC output of receive antennas, is selected to transmit data for the corresponding user. These analytical discussions motivate us to explore improved performance of MISO PDMA.
With distant transmission, relaying schemes are required but in close distance transmission, and so new protocols need to be exhibited. Recently, in project 3GPP for long term evolution (LTE), device to device (D2D) communication has been introduced. As one of the effective technologies of the forthcoming 5th generation (5G) cellular standard, D2D is explored as in [15]. By using new paradigm, i.e., without or limited controlling and signaling information from the base station (BS), two users can communicate in instant and direct ways with each other (when in proximity) in context of D2D scenario [16,17,18,19,20]. Furthermore, potential application in disaster-affected areas needs fast connections and D2D can be adopted in such case. In particular, the local connectivity is provided to devices even in a case of damage to the network infrastructure. D2D can be employed in several other emerging applications. For example, vehicular-to-vehicular (V to V) communication, vehicular-to-infrastructure (V to I) communication are introduced with applications of D2D communication to exhibit proximity based add-on services and multi-party gaming or public safety applications are studied as well [21,22]. It can be exhibited commercial D2D communication to improve the throughput, spectrum utilization, and energy efficiency of the cellular network. Other challenges are raised such as interference management security. To meet the capacity requirements of the 5G cellular system, a project was deployed and it is known as METIS (mobile and wireless communications enablers for the twenty-twenty information society). The METIS has recently been funded by the European Union [23].
Regarding exploiting advantages of D2D into NOMA, the authors in [24] investigated a model of the integration of a downlink NOMA system with D2D communications. D2D reported in [25] with resource allocation scheme is promising approach. They further derived expressions of the outage probability that both users obtain higher rates in NOMA under a fixed power control strategy. In addition, the uplink multi-carrier is considered in NOMA with support of D2D underlaid cellular networks [26]. More specifically, an iterative algorithm applying Karush-Kuhn-Tucker conditions is proposed to solve the power allocation problem in D2D NOMA [26]. The authors in [27] studied the device-to-device (D2D) assisted and NOMA-based mobile edge computing (MEC) system by deploying D2D communication for enabling user collaboration and reducing the edge server’s load.
In this paper, we consider a D2D transmission existing in a downlink PDMA system. The selected antenna at one BS communicating has two D2D far receivers with the aid of D2D implementation. Different from existing works on D2D PDMA [26,27], where the end-user operating half-duplex, we assume that the D2D users operate in the FD mode and investigate outage performance taking into account both the downlink and D2D links. The key contributions of this study are summarized as follows:
  • In the presence of a downlink under support of multiple antenna based BS, two D2D users exhibit different outage performance. We individually investigated the performance of each end-user in such a MISO NOMA system. Compared to most existing cooperative PDMA schemes, FD scheme is enabled at the end-user. To look how good performance two far users have, two far D2D users with different QoS requirements can be paired with each other and get benefit from D2D transmission.
  • Different from [25], transmit selection and full-duplex are joint investigated in this study. Most important is that we provide simulation results of integration of a D2D connection to a downlink two-user PDMA system.
  • We provide simulation results showing that, under the fixed power allocation strategies, D2D users achieve outage behavior in the NOMA scheme. The results also indicate the probability that both D2D users obtain improved outage performance in MISO PDMA depends on the power level of the BS and the required target rates.
  • For system performance evaluation, the closed-form expressions for the outage probabilities are derived for both two D2D users. To highlight the impact of the system parameters on the outage performance, outage probabilities achieved at both two D2D users are simulated to verify derived expressions.
Notation: The cumulative distribution function of a real-valued random variable X is denoted by F X ( . ) , f X ( . ) stands for probability density functions, while P r ( . ) symbolizes outage probability.

2. System Model

We consider a downlink MISO aided PDMA network as shown in Figure 1, in which the base station (BS) is equipped with multiple antennas to serve two PDMA users. There are conventional cellular users (CUE) in this model, such CUE devices are able to receive signal under coverage of this BS, but this paper focuses on more complex operations of D2D users. It is assumed that interference from CUE to D2D users is smaller than self-interference at each D2D user. In this case, two PDMA users ( D 1 , D 2 ) operate in full-duplex (FD) mode and they can communicate directly without helping of the BS as underlay topology. Two PDMA users are able to communicate directly on channel h i , i = 1 , 2 . It is noted that g i , k denotes the channel gain between the BS and user D i , i = 1 , 2 , the BS has k , ( k = 1 , 2 , K ) antennas. Further, in this scenario PDMA users are double-antenna devices and operate in a FD mode, except for the BS equipped multiple antenna. The direct links between the source node and the users are assumed available, which is common in the scenarios where two PDMA users acquire device to device transmission in reliable coverage of such BS. We assume that all users are clustered very close such that a homogeneous network topology is considered in our paper. The channels associated with each link exhibit the Rayleigh fading and additive white Gaussian noise (AWGN).
In first phase, the BS sends signal x = a 1 P S x 1 + a 2 P S x 2 to D 1 and D 2 according to direct transmissions. Here, P S is the transmitted power of the BS, x 1 x 2 is the signal of D 1 D 2 , and a 1 , a 2 is the power allocation coefficient with a 1 + a 2 = 1 , a 1 > a 2 .

2.1. Calculation of Signal to Noise Ratio (SNR)

The received signal at D i is given by
y D i F D P D M A = g i , k a 1 P S x 1 + a 2 P S x 2 + f i ϖ P D i x F D i + w i ,
where ϖ = 1 denotes user 1 working in FD, P D i is transmit power of D i , i = 1 , 2 and w i is the additive white Gaussian noise with zero mean and variance N 0 . We call x F D i a signal related to self-interference at user i, and f i is the self-interference channel and follows f i C N 0 , λ f i .
Then, the received signal-to-interference-plus-noise ratio (SINR) at user 1 D 1 becomes
y S D 1 , k F D P D M A = a 1 ρ g 1 , k 2 a 2 ρ g 1 , k 2 + ϖ ρ f 1 2 + 1 ,
where ρ = P S P S N 0 N 0 is the transmit signal-to-noise ratio (SNR) which was measured at the BS.
In this scenario, D 2 is so-called as SIC user, i.e., SIC is required to eliminate interference from signal of D 1 . Firstly, the received SINR at user 2 to detect user1’s message x 1 is given by
γ S D 1 2 , k F D P D M A = a 1 ρ g 2 , k 2 a 2 ρ g 2 , k 2 + ϖ ρ f 2 2 + 1 .
Then SIC is activated to eliminate interference from D 1 , the received SINRs at the user 2 D 2 is calculated to decode its own signal as
γ S D 2 , k F D P D M A = a 2 ρ g 2 , k 2 ϖ ρ f 2 2 + 1 .

2.2. D2D Transmission

In this phase, the cooperation signal is transmitted from the user with a stronger channel gain to the user with a weaker gain. The cooperation signal can help user 1 to decode its data, or user 2 to perform SIC better. The cooperation signal received by user 1 D 1 is given by
z D i P D M A = h i P S s + f i ϖ P D i x F D i + n i ,
where h 1 is a Rayleigh fading channel coefficient from user 1 to user 2 and vice versa. As mentioned in the channel information exchange phase, when g 1 , k 2 > g 2 , k 2 , only z D 2 P D M A exists, and when g 1 , k 2 < g 2 , k 2 , only z D 1 P D M A is transmitted from D 2 .
Generally, the received SINR at user i is given by
χ D i P D M A = ρ h i 2 ϖ ρ f i 2 + 1 .
The SINR for decoding x 1 is given by
χ = min max γ S D 1 , k P D M A , χ D 1 P D M A , γ S D 1 2 , k P D M A , if g 1 , k 2 < g 2 , k 2 min γ S D 1 , k P D M A , max γ S D 1 2 , k P D M A , χ D 2 P D M A , otherwise .
The antenna index can be selected to strengthen the BS to serve user i link as follows:
k * = arg m a x k = 1 , , K g i , k 2 .
In this case, CDF and PDF related selected channel are given respectively by
F g i , k * 2 x = 1 k = 1 K K k 1 k 1 exp k x λ g ,
and
f g i , k * 2 x = k = 1 K K k 1 k 1 k λ g exp k x λ g .
Here, λ u is the channel gain of u.

3. Outage Probability Performance Analysis

When the targeted data rates, R 1 and R 2 are determined by the users’ QoS requirements for user D 1 , D 2 . In fact, the outage probability is an important performance criterion which needs to be investigated. If the outage event occurs at the non-SIC user, the SIC user does not use the D2D signal, and the outage of the SIC user does not allow D2D transmission from the SIC user to the non-SIC user.

3.1. Outage Probability of D2D User 1

Considering outage probability of D 1 : According to PDMA protocol, the complementary events of outage at D 1 can be explained as: D 1 can detect x 2 as well as its own message x 1 . From the above description, the outage probability of D 1 is expressed as
O P D 1 b i = Pr γ S D 1 , k * P D M A < ε 1 , γ S D 1 2 , k * P D M A < ε 1 B 1 + Pr max γ S D 1 , k * P D M A , χ D 1 P D M A < ε 1 , γ S D 1 2 , k * P D M A > ε 1 B 2 ,
Proposition 1.
The closed-form expression of outage probability at D1 is given by
O P D 1 b i = 1 k = 1 K K k 1 k 1 ϑ 1 1 k = 1 K K k 1 k 1 ϑ 2 + 1 k = 1 K K k 1 k 1 ϑ 1 × 1 ρ λ h 1 ρ λ h 1 + ε 1 ϖ ρ λ f 1 exp ε 1 ρ λ h 1 k = 1 K K k 1 k 1 ϑ 2
where ε 1 = 2 2 R 1 , R 1 is target rate for signal x 1 .
Proof. 
See Appendix A. □

3.2. Outage Probability of D2D User 2

The outage events of D 2 can be explained as below. The first is that D 1 cannot detect x 2 . The second is that D 2 cannot detect its own message x 2 on the conditions that D 1 can detect x 2 successfully. Based on these, the outage probability of D 2 is expressed as
O P D 2 b i = Pr γ S D 2 , k * P D M A < ε 2 γ S D 1 2 , k * P D M A < ε 1 , γ S D 1 , k * P D M A < ε 2 Ψ 1 + Pr γ S D 2 , k * P D M A < ε 2 max γ S D 1 2 , k * P D M A , χ D 2 P D M A < ε 1 , γ S D 1 , k * P D M A > ε 1 Ψ 2 ,
where ε 2 = 2 2 R 2 , R 2 is denoted as target rate for signal x 2 , and with the help of (5) and (7), terms Ψ 1 and Ψ 2 can be calculated, the first being
Ψ 1 = Pr γ S D 2 , k * P D M A < ε 2 γ S D 1 2 , k * P D M A < ε 1 , γ S D 1 , k * P D M A < ε 2 = 1 Pr γ S D 2 , k * P D M A ε 2 , γ S D 1 2 , k * P D M A ε 1 D 11 1 Pr γ S D 1 , k * P D M A ε 2 D 12 .
Therefore, D 11 can be expressed as
D 11 = Pr g 2 , k 2 ε 2 ϖ ρ f 2 2 + ε 2 a 2 ρ , g 2 , k 2 ε 1 ϖ ρ f 2 2 + ε 1 a 1 ρ ε 1 a 2 ρ = Pr g 2 , k 2 ε 2 ϖ ρ f 2 2 + 1 a 2 ρ , g 2 , k 2 ε 1 ϖ ρ f 2 2 + 1 a 1 ρ ε 1 a 2 ρ = Pr g 2 , k 2 ϖ ρ f 2 2 + 1 max ε 2 a 2 ρ , ε 1 a 1 ρ ε 1 a 2 ρ ,
where θ = max ε 2 a 2 ρ , ε 1 a 1 ρ ε 1 a 2 ρ .
It worth noting that, we can achieve important computations as below:
D 11 = Pr g 2 , k 2 ϖ ρ f 2 2 + 1 θ = 1 λ f 2 0 k = 1 K K k 1 k 1 exp ϖ ρ y + 1 θ k λ 2 y λ f 2 d y = k = 1 K K k 1 k 1 λ 2 θ k ϖ ρ λ f 2 + λ 2 exp θ k λ 2 .
Similarly, D 12 can be expressed as
D 12 = 1 Pr γ S D 1 , k * P D M A ε 2 = 1 Pr g 1 , k 2 ε 2 ϖ ρ f 1 2 + ε 2 a 1 ρ ε 2 a 2 ρ = 1 1 λ f 1 0 k = 1 K K k 1 k 1 exp ε 2 ϖ ρ x + ε 2 k a 1 ρ ε 2 a 2 ρ λ 1 x λ f 1 d x = 1 k = 1 K K k 1 k 1 υ 1 ,
where υ 1 = a 1 ρ ε 2 a 2 ρ λ 1 a 1 ρ ε 2 a 2 ρ λ 1 + ε 2 ϖ ρ k λ f 1 exp ε 2 k a 1 ρ ε 2 a 2 ρ λ 1 .
From (16) and (17), we find the expression Ψ 1
Ψ 1 = 1 k = 1 K K k 1 k 1 λ 2 θ k ϖ ρ λ f 2 + λ 2 exp θ k λ 2 × 1 k = 1 K K k 1 k 1 υ 1 .
Next, Ψ 2 can be calculated by
Ψ 2 = Pr γ S D 2 , k * P D M A < ε 2 max γ S D 1 2 , k * P D M A , χ D 2 P D M A < ε 1 , γ S D 1 , k * P D M A > ε 1 = Pr γ S D 2 , k * P D M A < ε 2 + Pr max γ S D 1 2 , k * P D M A , χ D 2 P D M A < ε 1 D 21 Pr γ S D 2 , k * P D M A < ε 2 max γ S D 1 2 , k * P D M A , χ D 2 P D M A < ε 1 D 22 × Pr γ S D 1 , k * P D M A > ε 1 .
Interestingly, we have the following result:
Pr γ S D 2 , k * P D M A < ε 2 = 1 Pr γ S D 2 , k * P D M A ε 2 = 1 Pr g 2 , k 2 ε 2 ϖ ρ f 2 2 + ε 2 a 2 ρ = 1 k = 1 K K k 1 k 1 a 2 ρ λ 2 a 2 ρ λ 2 + ε 2 ϖ ρ k λ f 2 exp ε 2 k a 2 ρ λ 2 ,
and
Pr γ S D 1 , k * P D M A > ε 1 = Pr g 1 , k 2 > ε 1 ϖ ρ f 1 2 + ε 1 a 1 ρ ε 1 a 2 ρ = 1 λ f 1 0 k = 1 K K k 1 k 1 exp ε 1 ϖ ρ x + ε 1 k a 1 ρ ε 1 a 2 ρ λ 1 x λ f 1 d x = k = 1 K K k 1 k 1 ϑ 1 .
After this step, two lemmas as shown below need to be considered.
Lemma 1. 
The closed-form expression of D 21 is calculated as
D 21 = 1 ρ λ h 2 ρ λ h 2 + ε 1 ϖ ρ λ f 2 exp ε 1 ρ λ h 2 1 k = 1 K K k 1 k 1 ϑ 2 .
Proof. 
See in Appendix B. □
Lemma 2.
D 22 is computed in closed-form by
D 22 = 1 k = 1 K K k 1 k 1 a 2 ρ λ 2 a 2 ρ λ 2 + ε 2 ϖ ρ k λ f 2 exp ε 2 k a 2 ρ λ 2 × 1 k = 1 K K k 1 k 1 ϑ 2 1 ρ λ h 2 ρ λ h 2 + ε 1 ϖ ρ λ f 2 exp ε 1 ρ λ h 2 .
Proof. 
See in Appendix C. □
From (20)–(23) we find the expression of Ψ 2 as below:
Ψ 2 = 1 k = 1 K K k 1 k 1 a 2 ρ λ 2 a 2 ρ λ 2 + ε 2 ϖ ρ k λ f 2 exp ε 2 k a 2 ρ λ 2 + 1 ρ λ h 2 ρ λ h 2 + ε 1 ϖ ρ λ f 2 exp ε 1 ρ λ h 2 1 k = 1 K K k 1 k 1 ϑ 2 1 k = 1 K K k 1 k 1 a 2 ρ λ 2 a 2 ρ λ 2 + ε 2 ϖ ρ k λ f 2 exp ε 2 k a 2 ρ λ 2 × 1 k = 1 K K k 1 k 1 ϑ 2 1 ρ λ h 2 ρ λ h 2 + ε 1 ϖ ρ λ f 2 exp ε 1 ρ λ h 2 × k = 1 K K k 1 k 1 ϑ 1 .
From (18) and (24), the outage probability of D2D user D 2 can be examined through the formulation
O P D 2 b i = 1 k = 1 K K k 1 k 1 λ 2 θ k ϖ ρ λ f 2 + λ 2 exp θ k λ 2 × 1 k = 1 K K k 1 k 1 υ 1 + 1 k = 1 K K k 1 k 1 a 2 ρ λ 2 a 2 ρ λ 2 + ε 2 ϖ ρ k λ f 2 exp ε 2 k a 2 ρ λ 2 + 1 ρ λ h 2 ρ λ h 2 + ε 1 ϖ ρ λ f 2 exp ε 1 ρ λ h 2 1 k = 1 K K k 1 k 1 ϑ 2 1 k = 1 K K k 1 k 1 a 2 ρ λ 2 a 2 ρ λ 2 + ε 2 ϖ ρ k λ f 2 exp ε 2 k a 2 ρ λ 2 × 1 k = 1 K K k 1 k 1 ϑ 2 1 ρ λ h 2 ρ λ h 2 + ε 1 ϖ ρ λ f 2 exp ε 1 ρ λ h 2 × k = 1 K K k 1 k 1 ϑ 1 .

4. Analysis On Asymptotic Outage Probability

Based on the previous results, an asymptotic analysis for both D 1 and D 2 will be carried out to evaluate the outage behavior, i.e., O P D 1 b i and O P D 2 b i , respectively. Particularly, the following expressions are provide insight observation for the proposed system in the high SNR regime.

4.1. Asymptotic Outage Probability at D2D User 1

Based on the above analytical results in (12), by using e x 1 x the asymptotic outage probability of D2D User 1 with is given by
O P D 1 a s y m = 1 k = 1 K K k 1 k 1 a 1 ε 1 a 2 λ 1 k ε 1 ϖ λ f 1 + a 1 ε 1 a 2 λ 1 1 ε 1 k a 1 ρ ε 1 a 2 ρ λ 1 × 1 k = 1 K K k 1 k 1 a 1 ε 1 a 2 λ 2 a 1 ε 1 a 2 λ 2 + ε 1 ϖ k λ f 2 1 ε 1 k a 1 ρ ε 1 a 2 ρ λ 2 + 1 k = 1 K K k 1 k 1 a 1 ε 1 a 2 λ 1 a 1 ε 1 a 2 λ 1 + ε 1 ϖ k λ f 1 1 ε 1 k a 1 ρ ε 1 a 2 ρ λ 1 × 1 λ h 1 λ h 1 + ε 1 ϖ λ f 1 1 ε 1 ρ λ h 1 k = 1 K K k 1 k 1 a 1 ε 1 a 2 λ 2 a 1 ε 1 a 2 λ 2 + ε 1 ϖ k λ f 2 1 ε 1 k a 1 ρ ε 1 a 2 ρ λ 2 .
To look lower bound, when ρ , the asymptotic outage probability of D2D User 1 with is determined by
O P D 1 f l o o r = 1 k = 1 K K k 1 k 1 a 1 ε 1 a 2 λ 1 k ε 1 ϖ λ f 1 + a 1 ε 1 a 2 λ 1 × 1 k = 1 K K k 1 k 1 a 1 ε 1 a 2 λ 2 a 1 ε 1 a 2 λ 2 + ε 1 ϖ k λ f 2 + 1 k = 1 K K k 1 k 1 a 1 ε 1 a 2 λ 1 a 1 ε 1 a 2 λ 1 + ε 1 ϖ k λ f 1 × 1 λ h 1 λ h 1 + ε 1 ϖ λ f 1 k = 1 K K k 1 k 1 a 1 ε 1 a 2 λ 2 a 1 ε 1 a 2 λ 2 + ε 1 ϖ k λ f 2 .

4.2. Asymptotic Outage Probability at D2D User 2

Similar to the derivation of O P D 1 a s y m , an asymptotic outage expression for O P D 2 b i . It is noted that the related exact expression is presented in (25), now it can be derived as
O P D 2 a s y m = 1 k = 1 K K k 1 k 1 λ 2 θ k ϖ ρ λ f 2 + λ 2 1 θ k λ 2 × 1 k = 1 K K k 1 k 1 a 1 ε 2 a 2 λ 1 a 1 ε 2 a 2 λ 1 + ε 2 ϖ k λ f 1 1 ε 2 k a 1 ρ ε 2 a 2 ρ λ 1 + 1 k = 1 K K k 1 k 1 a 2 λ 2 a 2 λ 2 + ε 2 ϖ k λ f 2 1 ε 2 k a 2 ρ λ 2 + 1 λ h 2 λ h 2 + ε 1 ϖ λ f 2 1 ε 1 ρ λ h 2 1 k = 1 K K k 1 k 1 a 1 ε 1 a 2 λ 2 a 1 ε 1 a 2 λ 2 + ε 1 ϖ k λ f 2 1 ε 1 k a 1 ρ ε 1 a 2 ρ λ 2 1 k = 1 K K k 1 k 1 a 2 λ 2 a 2 λ 2 + ε 2 ϖ k λ f 2 1 ε 2 k a 2 ρ λ 2 × 1 k = 1 K K k 1 k 1 a 1 ε 1 a 2 λ 2 a 1 ε 1 a 2 λ 2 + ε 1 ϖ k λ f 2 1 ε 1 k a 1 ρ ε 1 a 2 ρ λ 2 1 λ h 2 λ h 2 + ε 1 ϖ λ f 2 1 ε 1 ρ λ h 2 × k = 1 K K k 1 k 1 a 1 ε 1 a 2 λ 1 a 1 ε 1 a 2 λ 1 + ε 1 ϖ k λ f 1 1 ε 1 k a 1 ρ ε 1 a 2 ρ λ 1 ,
and with regard to lower bound, it can be obtained lower bound of user D 2 as
O P D 2 f l o o r = 1 k = 1 K K k 1 k 1 λ 2 θ k ϖ ρ λ f 2 + λ 2 1 k = 1 K K k 1 k 1 a 1 ε 2 a 2 λ 1 a 1 ε 2 a 2 λ 1 + ε 2 ϖ k λ f 1 + 1 k = 1 K K k 1 k 1 a 2 λ 2 a 2 λ 2 + ε 2 ϖ k λ f 2 + 1 λ h 2 λ h 2 + ε 1 ϖ λ f 2 1 k = 1 K K k 1 k 1 a 1 ε 1 a 2 λ 2 a 1 ε 1 a 2 λ 2 + ε 1 ϖ k λ f 2 1 k = 1 K K k 1 k 1 a 2 λ 2 a 2 λ 2 + ε 2 ϖ k λ f 2 × 1 k = 1 K K k 1 k 1 a 1 ε 1 a 2 λ 2 a 1 ε 1 a 2 λ 2 + ε 1 ϖ k λ f 2 1 λ h 2 λ h 2 + ε 1 ϖ λ f 2 × k = 1 K K k 1 k 1 a 1 ε 1 a 2 λ 1 a 1 ε 1 a 2 λ 1 + ε 1 ϖ k λ f 1 .
Remark 1. 
These approximate performances provide easy way to evaluate system performance rather than complex manner of derived expressions in term of outage probability. It is expected that these approximate expressions exhibits corresponding curves in simulation and they will match with exact curves achieved by analytical expressions presented in Section 3.

5. Numerical Results

In this section, numerical examples are performed to verify the outage performance of the downlink MISO PDMA network under Rayleigh fading channels with FD scheme. We denote d 1 , d 2 as distances between the BS and the first D2D user and the second one, repetitively. Such distance is normalized as unit. Moreover, Monte Carlo simulation is run in 10 6 times to compare with analytical results as proved in previous section.
In Figure 2, the outage probability versus transmit SNR at the BS ρ is presented in different power allocation parameters. We assume the distance between BS and D 1 is d 1 = 0.4 , path loss exponent is α = 2 , channel gain λ 2 = d 2 α , while d 2 = 0.2 , λ h 1 = λ h 2 = 1 , λ f 1 = λ f 2 = 0.01 , the number of antenna at BS is K = 1 . As a clear observation, the exact analytical results and simulation results are in excellent agreement, and the outage probability will be constant at high-SNR regimes. Moreover, as the transmit SNR increases, the outage probability decreases. Another important observation is that the outage probability for User 2 D 2 outperforms User 1 D 1 . Figure 3 shows outage performance for user D 1 . The parameters for this case are a 1 = 0.7 , λ 1 = d 1 α , d 1 = 0.4 , α = 2 , λ 2 = d 2 α , d 2 = 0.2 , λ h 1 = λ h 2 = 1 , λ f 1 = λ f 2 = 0.01 , K = 1 . It can be seen that lower target rate R 1 results in better outage performance. It is intuitively that floor outage values match with analytical curves at high ρ . Such observation confirms our analysis on finding lower bound of outage probability. While asymptotic lines also match with exact lines at several points within the range of considered transmit SNR at the BS.
In Figure 4, the outage probabilities are shown as a function of the transmit SNR. Reported from the impact of target rate R 2 , there is a decrease in outage probability for such user as change to lower level of R 2 . This figure requires several parameters as a 1 = 0.7 , R 1 = 0.5 , λ 1 = d 1 α , d 1 = 0.4 , α = 2 , λ 2 = d 2 α , d 2 = 0.2 , λ h 1 = λ h 2 = 1 , λ f 1 = λ f 2 = 0.01 , K = 1 . Similar trends with Figure 3 in terms of approximate and floor value of outage for D 2 can be observed in this figure.
Figure 5 plots the outage probability versus SNR with the different numbers of transmit antennas at the BS (other parameters as declarations in Figure 5 as a 1 = 0.7 , R 1 = 0.5 , λ 1 = d 1 α , d 1 = 0.4 . α = 2 , λ 2 = d 2 α , d 2 = 0.2 , λ h 1 = λ h 2 = 1 , λ f 1 = λ f 2 = 0.01 ). More antennas at the BS indicates better outage probability in such PDMA. K = 3 case provides the best performance and an important observation in this study.
Due to self-interference related to FD scheme at users, it need be considered performance of user D 1 in four cases of λ f 1 as observation in Figure 6. In this case, we set a 1 = 0.7 , R 1 = 0.5 , λ 1 = d 1 α , d 1 = 0.4 , α = 2 , λ 2 = d 2 α , d 2 = 0.2 , λ h 1 = λ h 2 = 1 , K = 1 for both Figure 6 and Figure 7. It is noted that λ f 2 = 0.01 , λ f 1 = 0.01 for Figure 6, Figure 7, respectively. Obviously, strong self-interference makes outage performance worse. The main reason is that achievable SNR will be smaller as existence of self-interference and hence outage event easily happens. Similarly, performance of D 2 in Figure 7 is changed as varying λ f 2 .

6. Conclusions

This paper analytically investigated the impact of number of transmit antennas at the BS on outage performance of each D2D user in the MISO PDMA. Closed-form analytical expressions for the outage probability were obtained. Our theoretical analysis indicated that the outage performance gap between two D2D users exists due to different power allocation factors given. The best performance can be raised at a higher number of transmit antennas at the BS. Furthermore, we observed that target rates have only a small impact on outage performance.

Author Contributions

D.T.D. provided idea, wrote paper and verified expressions, M.S.V.N. and T.A.H. derived mathematical problems and performed experiments; B.M.L. contributed to prepare manuscript and delivered valuable comments.

Funding

This work was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by Korea government (MSIT) (Grant No.: NRF-2017R1D1A1B03028350).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A.

Proof of Proposition 1.
The terms B 1 and B 2 can be calculated with the help of (2) and (3). The former becomes
B 1 = Pr γ S D 1 , k * P D M A < ε 1 , γ S D 1 2 , k * P D M A < ε 1 = 1 Pr γ S D 1 , k * P D M A ε 1 B 11 1 Pr γ S D 1 2 , k * P D M A ε 1 B 12 .
Therefore, B 11 can be expressed as
B 11 = 1 Pr γ S D 1 , k P D M A ε 1 = 1 Pr g 1 , k 2 ε 1 ϖ ρ f 1 2 + ε 1 a 1 ρ ε 1 a 2 ρ = 1 1 λ f 1 0 k = 1 K K k 1 k 1 exp ε 1 ϖ ρ x + ε 1 k a 1 ρ ε 1 a 2 ρ λ 1 x λ f 1 d x = 1 k = 1 K K k 1 k 1 ϑ 1 ,
where ϑ 1 = a 1 ρ ε 1 a 2 ρ λ 1 k ε 1 ϖ ρ λ f 1 + a 1 ρ ε 1 a 2 ρ λ 1 exp ε 1 k a 1 ρ ε 1 a 2 ρ λ 1 .
It is noted that λ 1 is average channel gain of g 1 , k , then λ 2 is average channel gain of g 2 , k , λ f 1 , λ f 2 are average channel gain of f 1 , f 2 , respectively; λ h 1 , λ h 2 are average channel gains of h 1 , h 2 , respectively.
Similarly, B 12 can be expressed by
B 12 = 1 Pr γ S D 1 2 , k P D M A ε 1 = 1 Pr g 2 , k 2 ε 1 ϖ ρ f 2 2 + ε 1 a 1 ρ ε 1 a 2 ρ = 1 1 λ f 2 0 k = 1 K K k 1 k 1 exp ε 1 ϖ ρ y + ε 1 k a 1 ρ ε 1 a 2 ρ λ 2 y λ f 2 d y = 1 k = 1 K K k 1 k 1 ϑ 2 ,
where ϑ 2 = a 1 ρ ε 1 a 2 ρ λ 2 a 1 ρ ε 1 a 2 ρ λ 2 + ε 1 ϖ ρ k λ f 2 exp ε 1 k a 1 ρ ε 1 a 2 ρ λ 2 .
From (A2) and (A3) we find the expression B 1 as
B 1 = 1 k = 1 K K k 1 k 1 ϑ 1 1 k = 1 K K k 1 k 1 ϑ 2 .
In similar way, B 2 can be computed as
B 2 = Pr max γ S D 1 , k * P D M A , χ D 1 P D M A < ε 1 , γ S D 1 2 , k * P D M A > ε 1 = Pr γ S D 1 , k * P D M A < ε 1 Pr χ D 1 P D M A < ε 1 Pr γ S D 1 2 , k * P D M A > ε 1 = 1 Pr γ S D 1 , k * P D M A ε 1 B 21 1 Pr χ D 1 P D M A ε 1 B 22 × Pr γ S D 1 2 , k * P D M A > ε 1 B 23 .
In this step, B 21 is formulated as
B 21 = Pr γ S D 1 , k * P D M A ε 1 = Pr g 1 , k 2 ε 1 ϖ ρ f 1 2 + ε 1 a 1 ρ ε 1 a 2 ρ = 1 λ f 1 0 k = 1 K K k 1 k 1 exp ε 1 ϖ ρ x + ε 1 k a 1 ρ ε 1 a 2 ρ λ 1 x λ f 1 d x = k = 1 K K k 1 k 1 ϑ 1 .
Then, B 22 is calculated as
B 22 = Pr χ D 1 P D M A ε 1 = Pr h 1 2 ε 1 ϖ ρ f 1 2 + ε 1 ρ = 0 exp ε 1 ϖ ρ x + ε 1 ρ λ h 1 1 λ f 1 exp x λ f 1 d x = 1 λ f 1 exp ε 1 ρ λ h 1 0 exp ε 1 ϖ ρ ρ λ h 1 + 1 λ f 1 x d x = ρ λ h 1 ρ λ h 1 + ε 1 ϖ ρ λ f 1 exp ε 1 ρ λ h 1 .
Similarly, B 23 is calculated as
B 23 = Pr γ S D 1 2 , k * P D M A > ε 1 = Pr g 2 , k 2 > ε 1 ϖ ρ f 2 2 + ε 1 a 1 ρ ε 1 a 2 ρ = 1 λ f 2 0 k = 1 K K k 1 k 1 exp ε 1 ϖ ρ y + ε 1 k a 1 ρ ε 1 a 2 ρ λ 2 y λ f 2 d y = k = 1 K K k 1 k 1 ϑ 2 .
From (A6), (A7) and (A8) we find the expression B 2 to be
B 2 = 1 k = 1 K K k 1 k 1 ϑ 1 × 1 ρ λ h 1 ρ λ h 1 + ε 1 ϖ ρ λ f 1 exp ε 1 ρ λ h 1 k = 1 K K k 1 k 1 ϑ 2 .
This completes the proof of Proposition 1. □

Appendix B.

Proof of Lemma 1.
D 21 = 1 Pr χ D 2 P D M A ε 1 κ 1 1 Pr γ S D 1 2 , k P D M A ε 1 κ 2 .
Here, κ 1 can be calculated as
κ 1 = 1 Pr χ D 2 P D M A ε 1 = 1 Pr h 2 2 ε 1 ϖ ρ f 2 2 + ε 1 ρ = 1 1 λ f 2 0 exp ε 1 ϖ ρ y + ε 1 ρ λ h 2 y λ f 2 d y = 1 ρ λ h 2 ρ λ h 2 + ε 1 ϖ ρ λ f 2 exp ε 1 ρ λ h 2 .
Similarly, κ 2 can be calculated as
κ 2 = 1 Pr γ S D 1 2 , k P D M A ε 1 = 1 Pr g 2 , k 2 ε 1 ϖ ρ f 2 2 + ε 1 a 1 ρ ε 1 a 2 ρ = 1 1 λ f 2 0 k = 1 K K k 1 k 1 exp ε 1 ϖ ρ y + ε 1 k a 1 ρ ε 1 a 2 ρ λ 2 y λ f 2 d y = 1 k = 1 K K k 1 k 1 ϑ 2 .
This completes the proof of Lemma 1. □

Appendix C.

Proof of Lemma 2. 
By definition, we have following outage probability:
D 22 = Pr γ S D 2 , k * P D M A < ε 2 max γ S D 1 2 , k * P D M A , χ D 2 P D M A < ε 1 = 1 Pr γ S D 2 , k P D M A ε 2 Ξ 1 1 Pr γ S D 1 2 , k P D M A ε 1 Ξ 2 × 1 Pr χ D 2 P D M A ε 1 Ξ 3 .
Firstly, Ξ 1 can be calculated as
Ξ 1 = 1 Pr γ S D 2 , k P D M A ε 2 = 1 Pr g 2 , k 2 ε 2 ϖ ρ f 2 2 + ε 2 a 2 ρ = 1 1 λ f 2 0 k = 1 K K k 1 k 1 exp ε 2 ϖ ρ y + ε 2 k a 2 ρ λ 2 y λ f 2 d y = 1 k = 1 K K k 1 k 1 a 2 ρ λ 2 a 2 ρ λ 2 + ε 2 ϖ ρ k λ f 2 exp ε 2 k a 2 ρ λ 2 .
Similarly, Ξ 2 can be calculated as
Ξ 2 = 1 Pr γ S D 1 2 , k P D M A ε 1 = 1 Pr g 2 , k 2 ε 1 ϖ ρ f 2 2 + ε 1 a 1 ρ ε 1 a 2 ρ = 1 1 λ f 2 0 k = 1 K K k 1 k 1 exp ε 1 ϖ ρ y + ε 1 k a 1 ρ ε 1 a 2 ρ λ 2 y λ f 2 d y = 1 k = 1 K K k 1 k 1 ϑ 2 .
It is noted that Ξ 3 can be formulated as
Ξ 3 = 1 Pr χ D 2 P D M A ε 1 = 1 Pr h 2 2 ε 1 ϖ ρ f 2 2 + ε 1 ρ = 1 1 λ f 2 0 exp ε 1 ϖ ρ y + ε 1 ρ λ h 2 y λ f 2 d y = 1 ρ λ h 2 ρ λ h 2 + ε 1 ϖ ρ λ f 2 exp ε 1 ρ λ h 2 .
This completes the proof of Lemma 2. □

References

  1. Do, D.-T.; Nguyen, H.-S.; Voznak, M.; Nguyen, T.-S. Wireless powered relaying networks under imperfect channel state information: System performance and optimal policy for instantaneous rate. Radioengineering 2017, 26, 869–877. [Google Scholar] [CrossRef]
  2. Nguyen, X.-X.; Do, D.-T. Optimal power allocation and throughput performance of full-duplex DF relaying networks with wireless power transfer-aware channel. EURASIP J. Wirel. Commun. Netw. 2017, 2017, 152. [Google Scholar] [CrossRef]
  3. Nguyen, X.-X.; Do, D.-T. Maximum Harvested Energy Policy in Full-Duplex Relaying Networks with SWIPT. Int. J. Commun. Syst. 2017, 30, e3359. [Google Scholar] [CrossRef]
  4. Nguyen, T.-L.; Do, D.-T. A new look at AF two-way relaying networks: Energy harvesting architecture and impact of co-channel interference. Ann. Telecommun. 2017, 72, 669–678. [Google Scholar]
  5. Wong, V.W.S.; Schober, R.; Ng, D.W.K.; Wang, L.-C. Key Technologies for 5G Wireless Systems, 1st ed.; Cambridge University Press: Cambridge, UK, 2017. [Google Scholar]
  6. Zhu, J.; Wang, J.; Huang, Y.; He, S.; You, X.; Yang, L. On Optimal Power Allocation for Downlink Non-Orthogonal Multiple Access Systems. IEEE J. Select. Areas Commun. 2017, 35, 2744–2757. [Google Scholar] [CrossRef]
  7. Chen, Z.; Ding, Z.; Dai, X.; Karagiannidis, G.K. On the Application of Quasi-Degradation to MISO-NOMA Downlink. IEEE Trans. Signal Process. 2016, 64, 6174–6189. [Google Scholar] [CrossRef] [Green Version]
  8. Chen, X.; Zhang, Z.; Zhong, C.; Ng, D.W.K. Exploiting Multiple Antenna Techniques for Non-Orthogonal Multiple Access. IEEE J. Select. Areas Commun. 2017, 35, 2207–2220. [Google Scholar] [CrossRef]
  9. Do, D.-T.; Nguyen, M.-S.V.; Hoang, T.-A.; Voznak, M. NOMA-Assisted Multiple Access Scheme for IoT Deployment: Relay Selection Model and Secrecy Performance Improvement. Sensors 2019, 19, 736. [Google Scholar] [CrossRef]
  10. Do, D.-T.; Le, C.-B. Application of NOMA in Wireless System with Wireless Power Transfer Scheme: Outage and Ergodic Capacity Performance Analysis. Sensors 2018, 18, 3501. [Google Scholar] [CrossRef] [PubMed]
  11. Nguyen, T.-L.; Do, D.-T. Power Allocation Schemes for Wireless Powered NOMA Systems with Imperfect CSI: System model and performance analysis. Int. J. Commun. Syst. 2018, 31, e3789. [Google Scholar] [CrossRef]
  12. Nguyen, T.-L.; Do, D.-T. Exploiting Impacts of Intercell Interference on SWIPT-assisted Non-orthogonal Multiple Access. Wirel. Commun. Mob. Comput. 2018, 2018. [Google Scholar] [CrossRef]
  13. Molish, A.F.; Win, M.Z. Capacity of MIMO systems with antenna selection. IEEE Trans. Wirel. Commun. 2005, 4, 1759–1772. [Google Scholar] [CrossRef] [Green Version]
  14. Thoen, S.; Perre, L.V.; Gyselinckx, B.; Engels, M. Performance analysis of combined transmit-SC/receive-MRC. IEEE Trans. Commun. 2001, 49, 5–8. [Google Scholar] [CrossRef]
  15. Mumtaz, S.; Huq, K.M.S.; Rodriguez, J. Direct mobile-to-mobile communication: Paradigm for 5G. IEEE Wirel. Commun. 2014, 21, 14–23. [Google Scholar] [CrossRef]
  16. Doppler, K.; Rinne, M.; Wijting, C.; Ribeiro, C.B.; Hugl, K. Device-todevice communication as an underlay to LTE-advanced networks. IEEE Commun. Mag. 2009, 47, 42–49. [Google Scholar] [CrossRef]
  17. Lei, L.; Zhong, Z.; Lin, C.; Shen, X. Operator controlled device-to-device communications in LTE-advanced networks. IEEE Wirel. Commun. 2012, 19, 96–104. [Google Scholar] [CrossRef]
  18. Asadi, A.; Mancuso, V. Network-assisted outband D2D-clustering in 5G cellular networks: Theory and practice. IEEE Trans. Mob. Comput. 2017, 16, 2246–2259. [Google Scholar] [CrossRef]
  19. Tseng, H.-W.; Yu, Y.-J.; Wu, B.-S.; Kuo, C.-F.; Chen, P.-S. A resource allocation scheme for device-to-device communication over ultra-dense 5G cellular networks. In Proceedings of the 2017 International Conference on Applied System Innovation (ICASI), Sapporo, Japan, 13–17 May 2017; pp. 80–83. [Google Scholar]
  20. Ma, R.; Chang, Y.-J.; Chen, H.-H.; Chiu, C.-Y. On relay selection schemes for relay-assisted D2D communications in LTE-A systems. IEEE Trans. Veh. Technol. 2017, 66, 8303–8314. [Google Scholar] [CrossRef]
  21. Tehrani, M.N.; Uysal, M.; Yanikomeroglu, H. Device-to-device communication in 5G cellular networks: Challenges, solutions, and future directions. IEEE Commun. Mag. 2014, 52, 86–92. [Google Scholar] [CrossRef]
  22. Lien, S.-Y.; Chien, C.-C.; Liu, G.S.-T.; Tsai, H.-L.; Li, R.; Wang, Y.J. Enhanced LTE device-to-device proximity services. IEEE Commun. Mag. 2016, 54, 174–182. [Google Scholar] [CrossRef]
  23. Osseiran, A.; Boccardi, F.; Braun, V.; Kusume, K.; Marsch, P.; Maternia, M.; Queseth, O.; Schellmann, M.; Schotten, H.; Taoka, H.; et al. Scenarios for 5G mobile and wireless communications: The vision of the METIS project. IEEE Commun. Mag. 2014, 52, 26–35. [Google Scholar] [CrossRef]
  24. Madani, N.; Sodagari, S. Performance Analysis of Non-Orthogonal Multiple Access With Underlaid Device-to-Device Communications. IEEE Access 2018, 6, 39820–39826. [Google Scholar] [CrossRef]
  25. Bithas, P.S.; Maliatsos, K.; Foukalas, F. An SINR-Aware Joint Mode Selection, Scheduling, and Resource Allocation Scheme for D2D Communications. IEEE Trans. Veh. Technol. 2019. [Google Scholar] [CrossRef]
  26. Zheng, H.; Hou, S.; Li, H.; Song, Z.; Hao, Y. Power Allocation and User Clustering for Uplink MC-NOMA in D2D Underlaid Cellular Networks. IEEE Wirel. Commun. Lett. 2018, 7, 1030–1033. [Google Scholar] [CrossRef]
  27. Diao, X.; Zheng, J.; Wu, Y.; Cai, Y. Joint Computing Resource, Power, and Channel Allocations for D2D-Assisted and NOMA-Based Mobile Edge Computing. IEEE Access 2019, 7, 9243–9257. [Google Scholar] [CrossRef]
Figure 1. System model of FD aware D2D transmission mode in Power Domain based Multiple Access with Multiple Antenna at the BS.
Figure 1. System model of FD aware D2D transmission mode in Power Domain based Multiple Access with Multiple Antenna at the BS.
Sensors 19 02475 g001
Figure 2. Outage performance of D 1 and D 2 versus ρ as varying a 1 .
Figure 2. Outage performance of D 1 and D 2 versus ρ as varying a 1 .
Sensors 19 02475 g002
Figure 3. Outage performance of D 1 as varying R 1 .
Figure 3. Outage performance of D 1 as varying R 1 .
Sensors 19 02475 g003
Figure 4. Outage performance of D 2 versus ρ as varying R 2 .
Figure 4. Outage performance of D 2 versus ρ as varying R 2 .
Sensors 19 02475 g004
Figure 5. Outage performance of D 1 and D 2 as varying K.
Figure 5. Outage performance of D 1 and D 2 as varying K.
Sensors 19 02475 g005
Figure 6. Outage behavior of user D 1 versus ρ as varying λ f 1 .
Figure 6. Outage behavior of user D 1 versus ρ as varying λ f 1 .
Sensors 19 02475 g006
Figure 7. Consideration on outage of D 1 and D 2 versus ρ as varying λ f 2 .
Figure 7. Consideration on outage of D 1 and D 2 versus ρ as varying λ f 2 .
Sensors 19 02475 g007

Share and Cite

MDPI and ACS Style

Do, D.-T.; Van Nguyen, M.-S.; Hoang, T.-A.; Lee, B.M. Exploiting Joint Base Station Equipped Multiple Antenna and Full-Duplex D2D Users in Power Domain Division Based Multiple Access Networks. Sensors 2019, 19, 2475. https://doi.org/10.3390/s19112475

AMA Style

Do D-T, Van Nguyen M-S, Hoang T-A, Lee BM. Exploiting Joint Base Station Equipped Multiple Antenna and Full-Duplex D2D Users in Power Domain Division Based Multiple Access Networks. Sensors. 2019; 19(11):2475. https://doi.org/10.3390/s19112475

Chicago/Turabian Style

Do, Dinh-Thuan, Minh-Sang Van Nguyen, Thi-Anh Hoang, and Byung Moo Lee. 2019. "Exploiting Joint Base Station Equipped Multiple Antenna and Full-Duplex D2D Users in Power Domain Division Based Multiple Access Networks" Sensors 19, no. 11: 2475. https://doi.org/10.3390/s19112475

APA Style

Do, D. -T., Van Nguyen, M. -S., Hoang, T. -A., & Lee, B. M. (2019). Exploiting Joint Base Station Equipped Multiple Antenna and Full-Duplex D2D Users in Power Domain Division Based Multiple Access Networks. Sensors, 19(11), 2475. https://doi.org/10.3390/s19112475

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop