2014 European Conference on Networks and Communications (EuCNC) 2014
DOI: 10.1109/eucnc.2014.6882650
|View full text |Cite
|
Sign up to set email alerts
|

Full duplex device-to-device communication in cellular networks

Abstract: To address the problem of radio spectrum congestion due to increasing demand for wireless communications services, cellular communication systems are going towards small cells with small transmit powers. At the same time, in-band full-duplex (FD) radio design has gained considerable attention due to achievements in signal processing that can make design of full-duplex radios possible for systems with small transmit power. In theory full-duplex radios can double the spectral efficiency of the system. However ex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 59 publications
(40 citation statements)
references
References 44 publications
0
40
0
Order By: Relevance
“…As stated in Lemma 1, the gain achieved by clustering equals the aggregation of the individual gains. Therefore, Lemma 2 can be directly derived from (15).…”
Section: Lemma 1 the Creation Of A Cluster With Two Uesmentioning
confidence: 98%
See 1 more Smart Citation
“…As stated in Lemma 1, the gain achieved by clustering equals the aggregation of the individual gains. Therefore, Lemma 2 can be directly derived from (15).…”
Section: Lemma 1 the Creation Of A Cluster With Two Uesmentioning
confidence: 98%
“…In a first step of the algorithm, clusters in which CHs have H i = ∅ are created (lines [3][4][5][6][7][8][9][10][11][12][13][14]. Subsequently, in a second phase (lines [15][16][17][18][19][20][21][22][23][24][25][26][27][28][29], conflicting situations between UEs that could be either simple CMs or CHs are resolved. Specifically, the most beneficial association in terms of resources' usage is investigated for these UEs.…”
Section: Lemma 1 the Creation Of A Cluster With Two Uesmentioning
confidence: 99%
“…However, most of them have focused on resource allocation and interference management or mode selection [6]- [10] while only very few efforts have been made on security issues [11]- [13]. Specifically, instead of interference mitigation and avoidance, the authors in [12] exploit interference against eavesdropping, which is an effective way to enhance information-theoretic secrecy capacity.…”
Section: Related Workmentioning
confidence: 99%
“…D2D permits user equipment such as mobile phone or any devices to communicate with other devices in short distances on requiring that low power consumption without routing to traditional base station [BS]. The traffic routing in D2D communication should be offloaded from macro base station [21][22][23]. Based on predicted higher data rate that will be offered or applicable as a result of evolution sequences, we should introduce this newest type of communication.…”
Section: Full Duplex In Wireless Networkmentioning
confidence: 99%