Affiliation:
1. University of Salahaddin
Abstract
Abstract
In this paper, we study the relay selection and power allocation to maximize the achievable sum rate of all the users in the cooperative Massive Multiple Input-Multiple Output (mMIMO) system. Some users have direct paths to the base station (BS) to communicate in the considered system model. In contrast, there is no direct path for the rest users, and the relay helps transmit information signals from BS to these users (indirect users). Firstly, we design a beamforming matrix at BS and relay according to the block diagonalization (BD) and Zero-Forcing (ZF) methods, respectively. Then, relay selection and power allocation problems are analyzed. Generally, the joint power allocation and relay selection problem is a combinatorial problem, and it needs a global search algorithm to solve, which is complex and time-consuming. Therefore, we convert this joint problem into two sub-problems. The first sub-problem selects the suitable relay based on some criteria. The convex optimization method solves the power allocation problem in the second sub-problem based on the selection. The simulation results showed that the proposed algorithms are significantly close to the benchmark methods.
Publisher
Research Square Platform LLC
Reference13 articles.
1. Gupta, A., & Jha, R. K. (2015). "A Survey of 5G Network: Architecture and Emerging Technologies," in IEEE Access, vol. 3, pp. 1206–1232, doi: 10.1109/ACCESS.2015.2461602.
2. Two-Stage Constant-Envelope Precoding for Low-Cost Massive MIMO Systems;Liu A;IEEE Transactions on Signal Processing,2016
3. Denis, J., & Assaad, M. (2021). "Improving Cell-Free Massive MIMO Networks Performance: A User Scheduling Approach," in IEEE Transactions on Wireless Communications, vol. 20, no. 11, pp. 7360–7374, Nov. doi: 10.1109/TWC.2021.3083139.
4. On the Performance of Zero-Forcing Processing in Multi-Way Massive MIMO Relay Networks;Ho CD;IEEE Communications Letters
5. Resource Allocation for a Massive MIMO Relay Aided Secure Communication;Chen J;IEEE Transactions on Information Forensics and Security