# On the polar code for the 60-GHz millimeter-wave systems

- Zhuangkun Wei
^{1}Email author, - Bin Li
^{1}Email author and - Chenglin Zhao
^{1}

**2015**:31

https://doi.org/10.1186/s13638-015-0264-y

© Wei et al.; licensee Springer. 2015

**Received: **22 September 2014

**Accepted: **20 January 2015

**Published: **18 February 2015

## Abstract

Given the high operating frequency band and high emission power, 60-GHz millimeter radars or communications will suffer seriously from realistic hardware impairments. Among this, a nonlinear power amplifier (PA) will significantly degrade its transmission performance. In this investigation, a polar code scheme originally developed by Arikan is suggested to enhance the transmission performance of 60-GHz millimeter communications. Considering the realistic difficulties remained in calculating the Bhattacharyya parameters and likelihood ratios, unfortunately, the classical polar coding scheme only limited to a 2 × 2 matrix \( \left[\begin{array}{l}1\kern1em 0\\ {}1\kern1em 1\end{array}\right], \) which may lose its effect when flexibly applying other *l* × *l* matrix instead. To deal with this major challenge in flexibly applying polar code, polarization feature, a method to seek out a matrix on which can be based, to construct polar code schemes, will be demonstrated mathematically. That is, any specified not upper triangular matrix can be used to generate a generalized polar code scheme. Secondly, two efficient recursive algorithms, i.e., recursive Z algorithm and recursive likelihood ratio algorithm, are innovatively proposed, in order to design such a generalized polar code scheme after an *l* × *l* matrix with polarization feature is specified. Then, the process of constructing a new polar code scheme, based on a 3 × 3 matrix, is presented to test the effectiveness of the recursive Z algorithm and the recursive likelihood ratio algorithm. Experimental simulations that show a significant promotion on bit error ratio (BER) of that new polar code scheme, and illustrate a similar performance of BER with Arikan’s original scheme, verify a successful process of flexibly constructing a generalized polar code scheme, on which a more sophisticated scheme based on other *l* × *l* matrix can be rested. It is further demonstrated that polar coding schemes can surpass the popular low-density parity-check (LDPC) code, especially when dealing with nonlinear distortions in 60-GHz communication system, which hence provides a greater promise for practical use.

## Keywords

## 1 Introduction

Compared with the traditional radars, a 60-GHz millimeter-wave (mm-Wave) radar is promising to more adverse environmental conditions, e.g., fog, rain, and snow, which may recognize the target more accurately [1,2]. The earlier research of 60-GHz systems is mainly focused on some military applications, e.g., the frequency-modulated continuous wave (FM-CW) radars and crash-avoidance radars [3]. With the potential of providing high data rate of Gbps, 60-GHz mm-Wave communications have also drawn the world-wide attentions, which have also been considered as not only a promising candidate for the emerging fifth-generation (5G) communications but also an innovative idea for radar and sonar systems [3]. A major advantage of 60-GHz communications over other techniques is the enormous vacant bandwidth available at this mm-Wave band. For instance, the USA has assigned 57- to 64- [4] GHz for 60-GHz communications. Further adopting a large effective isotropic radiated power (EIRP), the achieved transmission rate may easily surpass IEEE 802.11n or UWB [5]. In the current wireless personal area networks standard, e.g., IEEE 802.11ad and 802.15.3c, the single-carrier modulations have also been recommended as a physical layer (PHY) solution due to its flexibility and implementation simplicity.

As a double-edge sword, both the 60-GHz radars and commercial communications, however, also encounters some challenges from practical hardware impairments. Due to its high operating frequencies and high emission power, 60-GHz millimeter communications may suffer seriously from nonlinear power amplifier (PA) [5,6], which will significantly degrade its transmission performance. It is well known that the coding approach may reduce the bit error ratio (BER) even in the presence of nonlinear distortions, which can be suggested as a feasible approach to combat the performance degradation aroused by nonlinear PA.

Since the 60-GHz communications are mainly oriented toward high-speed transmissions, the date rate is very huge and the frame length is therefore extremely long. This may, in practice, facilitate the designing of coding schemes, by concentrating on improving the transmission performance. For example, in the IEEE 802.11ad standard draft, low-density parity-check (LDPC) with a length of 672 bits can be specified in the encoding method [6]. Unfortunately, with the nonlinear PA, it is shown that even such a long LDPC code has been applied, the BER performance seems still to be less attractive to practical use (especially for the high-order modulations).

In this paper, we suggest a promising coding scheme to further promote the BER performance of 60-GHz communication with nonlinear PA. Firstly, an original construction scheme for polar code is applied to a 60-GHz system, which however has been constrained only to the 2 × 2 matrix: **F** = \( \left[\begin{array}{cc}\hfill 1\hfill & \hfill 0\hfill \\ {}\hfill 1\hfill & \hfill 1\hfill \end{array}\right] \). Secondly, after mathematically analyzing the polarization feature of any *l* × *l* matrix, two algorithms are proposed to calculate the Bhattacharyya parameters and likelihood ratios, respectively, the former of which are the most vital components for constructing a generalized polar code scheme after an *l* × *l* matrix with polarization feature is specified, while the latter of which are the necessary preparation for a mature decoding method. Therefore, generalized polar code schemes can be created after given a specified *l* × *l* matrix with polarization feature. In order to testify the validity of two algorithms, as well as to testify the effectiveness of polar code schemes when combatting with nonlinear distortion in a 60-GHz system, a new polar code scheme based on an example 3 × 3 matrix is proposed. Experimental simulations verify firstly the two algorithms for constructing generalized polar code schemes and decoding schemes, secondly the effectiveness of our new polar code scheme, which will significantly promote the transmission performance of 60-GHz communications, especially in the presence of nonlinear distortions aroused by the radio frequency PA. It is also demonstrated that, compared with the popular LDPC code, the two polar code schemes can acquire more competitive BER performance, which hence provides a greater promise to practical use.

The rest of this investigation is listed as follows. Section 2 described the system model and successive cancellation (SC) modulation schemes on 60-GHz millimeter-wave communications. Then, in Section 3, the basic idea of polar code is introduced, based on which, polarization feature is provided and testified through mathematical means. Then come recursive Z algorithm and recursive likelihood ratio algorithm in order to deal with two difficulties in designing constructing and decoding schemes, for any generalized polar code specified by matrix with a polarization feature. In addition, a generalized polar coding scheme is given, which not only testifies the effectiveness of recursive Z algorithm and recursive likelihood ratio algorithm, but can be considered as a newly proposed polar code scheme designed for 60-GHz millimeter-wave communications. Experimental simulations and performance evaluations are provided in Section 4. The whole investigation is finally concluded in Section 5.

## 2 System model

### 2.1 Nonlinearity of PA

According to the IEEE 802.11ad standard, *A* and *G*(*A*) represent the amplitude of input and output, respectively, the latter of which has a saturation that *A*sat = 0.58, while *g*, the linear gain, takes its value at 4.65. Parameter *s* = 0.81 denotes smoothness of the inflection point of distortion. In the latter expression, *φ*(*A*) denotes the distortion of PM, and parameters *a*, *b*, *q*1, and *q*2 take value at 2560, 0.114, 2.4, 2.3, respectively [6].

### 2.2 Modulation schemes

In this paper, binary phase shift keying (BPSK), quadrature phase shift keying (QPSK), 16 quadrature amplitude modulation (16QAM), and orthogonal frequency-division multiplexing (OFDM) will be considered for modulation methods. According to Figure 2, the distortions of PSK signals after passing through a nonlinear power amplifier (NLPA) can be neutralized by tilting the coordinate axis back, a fixed angel that equals to the distortion of phase, since the PSK signals have the identical amplitudes. QAM signals can be also calibrated through a method that proportional reduces the signal’s amplitude into a linear area, which can still maintain a relatively distinguished constellation map for demodulating. Unfortunately, OFDM signals, which are extremely sensitive to nonlinear distortions due to its high peak-to-average power ratio (PAPR), may have the worst effect of NLPA distortion since the IFFT process builds an irregular set of OFDM signals.

## 3 Polar code for 60-GHz communication

A polar code is a kind of **G**
_{
N
}-coset code inspired by a phenomenon called channel polarization, which can be achieved by recursively combining with *N* channel \( W:\mathcal{X}\to \mathcal{Y} \) and then splitting the combined channels into *N* channels through information theory. With this method, the theoretical BER of some channels approach nearly to 0, while the rest of them are close to 1. And the channel capacities among those channels go through opposite directions. Those channels whose theoretical BER are approaching to 0, in other words, whose channel capacities are approaching to 1, are defined as good channels and will be selected to transmit data since the lower the theoretical BER means a better distribution of channel capacity.

We firstly utilize \( {\mathbf{a}}_i^j \) to denote a vector (*a*
_{
i
},*a*
_{
i+1},…,*a*
_{
j
}), where *i* and *j* are natural numbers with normally *i* ≤ *j*. Otherwise, \( {\mathbf{a}}_i^j \) is regarded as void while *i > j*.

Define a binary-input discrete memoryless channel (B-DMC) \( W:\mathcal{X}\to \mathcal{Y} \), with a fixed input set {0,1}, and an arbitrary output set, is defined as symmetric only when a permutation \( \varPi :\mathcal{Y}\to \mathcal{Y} \) exists, that is, there exists a π makes sense for *W*(*y|*0) = *W*(*Π*(*y*)*|*1) for all \( y\in \mathcal{Y} \).

*I*(

*W*) is defined as the mutual information between the input and output of \( W:\mathcal{X}\to \mathcal{Y} \)

*. I*(

*W*) has a spectrum of [0,1], and only when inputs have uniform distribution,

*I*(

*W*) can be considered as the capacity of channel with an expression below:

*Z*(

*W*) is defined to quantize the theoretical BER as the Bhattacharyya parameter of \( W:\mathcal{X}\to \mathcal{Y} \) and has an expression as:

And the lower the Bhattacharyya parameter of one channel, the higher the channel capacity it obtains [8].

_{ε}= 1 only when a group of variables (

*x*,

*y*) that correspond with a set where \( \varepsilon = \left\{x\in X,y\in \mathcal{Y}:W\left(y\Big|x\right)\ \le\ W\left(y\Big|x + 1\right)\right\} \), otherwise, 1ε = 0. Therefore,

where *P*
_{
e
}(*W*) is the theoretical BER through maximum likelihood ratio decoding method. So *Z*(*W*) is an upper bound of theoretical BER and can be reduced to improve the transmission performance.

### 3.1 Channel combining

*l*and an

*l*×

*l*invertible matrix

**F**with entries in {0,1}, consider a process that a random

*l*-vector \( {\mathbf{U}}_1^l \) with a uniform distribution over {0,1}

^{ l }firstly multiply the matrix

**F**over GF(2) and then passes through the channel \( W:\mathcal{X}\to \mathcal{Y} \) to generate a random vector of output. Let \( {\mathbf{Y}}_1^l \) denote the output. Therefore, the channel transmission probabilities between \( {\mathbf{U}}_1^l \) and \( {\mathbf{Y}}_1^l \) can be expressed as below:

where \( {\mathbf{u}}_1^l \) and \( {y}_1^l \) denote a sample of \( {\mathbf{U}}_1^l \) and \( {\mathbf{Y}}_1^l \), respectively.

*n*-step (

*N*=

*l*

^{ n }) of channel combination, where input (U

_{1},U

_{2},…,U

_{ N }) denotes a random vector of variables while output (Y

_{1},Y

_{2},…,Y

_{ N }) denotes another vector of variables. \( {\mathbf{R}}_N^l \) is a kind of permutation matrix that reassigns a series of random variables (V

_{1},V

_{2},…,V

_{ N }) generated by (U

_{1},U

_{2},…,U

_{ N }) passing through matrix

**F.**

where \( {\mathbf{v}}_{1,k}^N \) is a newly generated vector created by permutation matrix \( {\mathbf{R}}_N^l \), a reassignment method that alters the order of the random vector \( {\mathbf{V}}_1^N \) into \( {\mathbf{V}}_{1,k}^N=\left({V}_k,{V}_{l+k},\dots, {V}_{ml+k}\right),\ k=1,2,\dots, l,\kern0.5em \left(\mathrm{m}+1\right)l\le N<\left(\mathrm{m}+2\right)l \). Also, \( {\mathbf{u}}_1^N,\ {\mathbf{y}}_1^N \) and \( {\mathbf{v}}_1^N \) denote a sample of \( {\mathbf{U}}_1^l,{\mathbf{Y}}_1^l\ \mathrm{and}\ {\mathbf{V}}_1^N \), respectively.

*N*-number of

*W*, the input data \( {\mathbf{u}}_1^N \) can be equivalently transform into \( {\mathbf{x}}_1^N \) through a linear transformation, that is:

**G**

_{ N }is called generator matrix. According to the combination process in Figure 4,

**G**

_{ N }can be calculated recursively as below:

where **I**
_{
k
} is defined as *k* × *k* unit matrix and ⊗ denotes the Kronecker multiplication and **G**
_{1} represents 1 × 1 unit matrix.

### 3.2 Channel splitting

where \( I\left({U}_i;{U}_1^{\left(i-1\right)}\right)=0 \) because of the independent source \( {\mathbf{U}}_1^N \).

In Formula 12 \( {\mathbf{v}}_{\left(i-1\right)l+1}^{il}={\mathbf{u}}_{\left(i-1\right)l+1}^{il}\cdotp \mathbf{F} \), 1 ≤ *i* ≤ *N*/*l*, and 1 ≤ *j* ≤ *l*.

**Example 1**: Arikan’s scheme given that:

**G**

_{ N }. with a specified

*N*= 2

^{ n }. In order to select split channels for transmissions, Arikan has provided a set of formulas [8] to calculate the Bhattacharyya parameter of each split channel, that is:

These formulas are only available for the 2 × 2 matrix \( \mathbf{F}=\left[\begin{array}{cc}\hfill 1\hfill & \hfill 0\hfill \\ {}\hfill 1\hfill & \hfill 1\hfill \end{array}\right] \), however, but not for other specified matrix, which limits the wide application of polar code. In order to tackle this problem, we first should to identify what kind of matrix has the feature to generate polar code, and this feature referred as to polarization feature.

### 3.3 Polarization feature

*x*, outputs \( {\mathbf{y}}_1^k \) and transmission probabilities:

Note that *Z*(*W*)∈[0,1], so lim_{k→∞}Z(*W*)^{
k
} = 0, which implies that by extending channel \( W:\mathcal{X}\to \mathcal{Y} \), we, to some extent, can improve the transmission performance.

**F**is a polarizing matrix when there exists at least an

*i*∈{1,2,…,

*l*}, makes sense that:

**F**maybe of interest. When the last row of

**F**has

*k >*1 unit elements, whose subscripts compose a set

*J*= {

*j*

_{1},

*j*

_{2},…,

*j*

_{ k }}, then the transmission probability of \( {W}_l^l \) can be calculated by:

which satisfies Equation 17, and **F**
_{
l-1} denotes a sub-matrix of **F** by removing its last row.

**F**has only one unit element, due to the permutation feature, we assume the unit element is the last element in this row; then, the channel transmission probability can be rewritten into:

Therefore, the output *Y*
_{
l
} is independent of inputs to the channel \( {W}_l^{l-i} \), indicating that the split channels \( {W}_l^1,{W}_l^2,\dots, {W}_l^{l-1} \) are defined on matrix **F**
^{
l − 1}, which are obtained by removing the last row and last column of **F**.

Based in a recursive analysis on **F**
^{
l − i
}, we may finally conclude that a matrix **F** does not have polarization feature when **F** is an upper triangular matrix.

### 3.4 Two difficulties of a polar code

Two technical difficulties remain in how to design constructing and decoding schemes for a generalized polar code that based on any specified matrix. That is, firstly, we need Bhattacharyya parameters of each split channels to select channels for data transmission. Secondly, a group of recursive formulas is demanded as a necessity of preparation to implement decoding scheme, the successive cancellation decode (SC). There come two algorithms we proposed, to cope with the two realistic challenges we mentioned.

### 3.5 Recursive Z algorithm

*S*

_{0}is a set of indices that where both

**c**

_{0}and

**c**

_{1}are equal to 0, while

*S*

_{1}is a set of indices that indicate the elements of both

**c**

_{0}and

**c**

_{1}are equal to 1. Therefore, the Bhattacharyya parameter of each split channel \( {W}_l^l \) can be calculated below:

where (**c**
_{0})_{
j
} and (**c**
_{1})_{
j
} denote the *j*th element of **c**
_{0} and **c**
_{1}. Thus, by traversing \( {\mathbf{y}}_1^l,{\mathbf{u}}_1^{i-1},{\mathbf{t}}_{i+1}^l,{\mathbf{w}}_{i+1}^l \), respectively, we can obtain \( Z\left({W}_l^i\right) \); therefore, calculate \( Z\left({W}_N^i\right) \), recursively.

**Example 2:**given a matrix

*e*number of split channels, while the right one represents the Bhattacharyya parameter. Knots on the right side are the split channels through this three-step polarization, of which the green ones are those good channels selected to transmit data since the lower the Bhattacharyya parameter, the higher the channel capacity they have gained.

Therefore, by generating a 3 × 3 based polar code scheme, we testified the recursive Z algorithm is effective on constructing generalized polar coding scheme, which means as long as we can find a matrix that has a polarization feature, we can realize a new polar coding scheme based on that matrix. It has been testified that in order to gain a higher error exponent than 0.5, the length of a polarization matrix has to be more than 16 [9,10].

### 3.6 Recursive likelihood ratio algorithm

where \( {\widehat{\mathrm{u}}}_1^{i-1} \) denotes the received data whose values have been decided successively, while *û*
_{
i
} denotes a statistical decision of *u*
_{
i
}, whose value has not been decided yet.

Obviously, through Expression 13, we can literally calculate \( {L}_N^i\left({\mathbf{y}}_1^N,{\widehat{\mathrm{u}}}_1^{i-1}\right) \), but amounts of complexity accompanies. Instead, a more efficient FFT-like method is proposed to calculate \( {L}_N^i\left({\mathbf{y}}_1^N,{\widehat{\mathrm{u}}}_1^{i-1}\right) \) based on the recursive feature of polar code.

*S*

_{0}as a set of indices where

**c**

_{0}equal to 0, while

*S*

_{1}denotes a set of indices where

**c**

_{1}equals to 0. Consider that:

By traversing \( {\widehat{\mathrm{u}}}_1^{i-1},{\mathbf{t}}_{i+1}^l,{\mathbf{w}}_{i+1}^l \), respectively, we can calculate \( {L}_l^i\left({\mathbf{y}}_1^l,{\widehat{\mathrm{u}}}_1^{i-1}\right) \) depending on various \( {\widehat{\mathrm{u}}}_1^{i-1} \), and recursively calculate \( {L}_N^i\left({\mathbf{y}}_1^N,{\widehat{\mathrm{u}}}_1^{i-1}\right) \).

*Example 3:*Consider the matrix given before with a BEC channel:

According to Equation 29, a FFT-like SC decode method can be created; that is, calculating each \( {L}_N^i\left({\mathbf{y}}_1^N,{\widehat{\mathrm{u}}}_1^{i-1}\right) \) demands only its three ex-step parameters, which recursively, creates a method that has only a complexity of *O*(*N*log3*N*).

## 4 Experimental simulations

In the experimental simulations, we mainly focus on the line-of-sight (LOS) scenarios, in which the first LOS path may have an extremely strong energy [11]. This is justified by wide adoptions of beam-forming techniques [12,13]. In this case, the single-path complex Gaussian channel can be used for the simplicity of analysis [14,15]. The sampling rate is relatively high at 60GHz band, which may be further reduced by some recent signal processing techniques, such as sampling conversion [16] or compressive sensing. The code rate is fixed at 1/2, the erasure probability (∈) is 0.1. We give the rest of channels with 0 bits. In the experiments, the classical polar code composed by Arikan (i.e., *l* = 2), which is denoted by polarcode 2, is also used for comparative analysis. Meanwhile, the popular LDPC scheme, based on a 336/672 check matrix, proposed and approved by the IEEE 802.11ad standard [6] has also been adopted.

**F**

_{ = }\( \left[\begin{array}{lll}1\hfill & 0\hfill & 0\hfill \\ {}1\hfill & 0\hfill & 1\hfill \\ {}1\hfill & 1\hfill & 1\hfill \end{array}\right] \) is shown in Figure 6. We may notice that the ratio of Bhattacharyya parameters approaching to 0 is 90%, while the ratio of those channels whose capacities are approaching to 1 is less than 10%. According to the channel polarization theory proposed by Arikan [7], we can conclude that the generalized matrix has the polarization feature and the recursive Z algorithm can be used to effectively calculate Bhattacharyya parameters.

^{−3}. In comparison, the BER value of LDPC is only 4 × 10

^{−2}. Roughly, a detection gain of 0.6 dB can be acquired by the polar code. Third, it is shown that the 16QAM is more vulnerable to 60-GHz nonlinear PAs (NLPAs), compared with other lower-order modulation schemes. Finally, we may note that, in the case of 16QAM signals with NLPA, the designed polar code seems to be comparative with the class polar code of

*l*= 2, which (with

*l*= 3), however, may be of more flexibility and efficiency in frame designing and multi-complexity.

## 5 Conclusion

The transmission performance of 60-GHz mm-Wave communications is significantly vulnerable to hardware impairments, especially the evitable nonlinearity of PA. To deal with such drawbacks, polar code is proposed for 60-GHz systems in this investigation. In order to generalize the originally posed classical scheme that only is applied to a 2 × 2 matrix, a promising recursive Z algorithm and recursive likelihood ratio algorithm are proposed for selecting split channels and SC decoding scheme, which can be then conveniently applied in construction of polar code of any fixed matrix with polarization features. The provided experimental simulations have verified the proposed algorithms as well as polar coding schemes, which may obtain more promising BER performance in the presence of either linear PA or nonlinear PA than LDPC scheme and which have a lesser decoding complexity than LDPCs. By significantly reducing the BER, polar code schemes may be considered as a potential candidate for the emerging 5G mm-Wave communications of extremely high data rates.

## Declarations

### Acknowledgements

This work was supported by the National Science and Technology Major Project of the Ministry of Science and Technology of China (2015ZX03004008) and the Natural Science Foundation of China (NSFC) under Grant 61271180.

## Authors’ Affiliations

## References

- Q Liang, Radar sensor wireless channel modeling in foliage environment: UWB versus narrowband. IEEE Sensors J
**11**(6), 1448–1457 (2011)View ArticleGoogle Scholar - Q Liang, Automatic target recognition using waveform diversity in radar sensor networks. Pattern Recognit Lett (Elsevier)
**29**(2), 377–381 (2008)View ArticleGoogle Scholar - J Liang, Q Liang, Design and analysis of distributed radar sensor networks. IEEE Trans Parallel Distributed Process
**22**(11), 1926–1933 (2011)View ArticleGoogle Scholar - Federal Communications Commission. Code of federal regulations, part 15-Radio frequency devices section 15.255: operation within the band 57.0-64.0 GHz. http://law.justia.com/cfr/title47/47-1.0.1.1.12.html 47:1.0.1.1.12.3.236.35, Jan., 2001
- SK Yong, P Xia, A Valdes-Garcia,
*60 GHz Technology for Gbps WLAN and WPAN [M]*(Wiley, Chichester, 2011). pp. 2–5Google Scholar - IEEE 802.11ad,
*Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 3: Enhancements for Very High Throughput in the 60 GHz Band [S]*, 2012Google Scholar - E Perahia, M Park, R Stacey, H Zhang, J Yee, V Ponnampalam, V Erceg, A Bourdoux, C Cordeiro, R Maslennikov, S Shankar, A Maltsev, A Lomayev, C Choi, A Jain, M Hossein Taghavi, H Sampath,
*IEEE P802.11 wireless LANs TGad evaluation methodology [R]. IEEE 802.11 TGad Technology Report 09/0296r16, 2010: 3–5, 9–15*, 2010Google Scholar - E Arikan, Channel polarization: a method for constructing capacity achieving codes for symmetric binary-input memoryless channels. IEEE Trans Inform Theory
**IT-55**, 3051–3073 (2009)View ArticleMathSciNetGoogle Scholar - S Dong-Min, L Seung-Chan, Y Kyeongcheol, Mapping selection and code construction for 2Am-ary polar-coded modulation. Commun Lett
**16**, 905–908 (2012)View ArticleGoogle Scholar - Sasoglu, E Telatar, E Yeh,
*Polar codes for the two-user multiple access channel, Proceedings of the 2010 IEEE Information Theory Workshop, Cairo, Egypt, January 6–8*, 2010Google Scholar - RG Gallager,
*Information Theory and Reliable Communication*(Wiley, New York, 1968)MATHGoogle Scholar - S Kato, H Harada, R Funada, T Baykas, C Sum, J Wang, M Rahman, Single carrier transmission for multi-gigabit 60-GHz WPAN system [J]. IEEE J Selected Areas Commun
**27**(8), 1466–1478 (2009)View ArticleGoogle Scholar - H Xu, K Liu,
*Research on wireless communication networks in the 60GHz frequency band [C]*(International Conference on Internet Technology and Applications, Wuhan, China, 2010), pp. 1–4Google Scholar - B Li, Z Zhou, W Zou, On the efficient beam pattern training for 60GHz wireless personal area networks. IEEE Trans Wirel Commun
**12**(2), 504–515 (2013)View ArticleGoogle Scholar - B Li, Z Zhou, H Zhang, A Nallanathan, Efficient beamforming training for 60-GHz millimeter-wave communications: a novel numerical optimization framework. IEEE Trans Vehicular Technol
**63**(2), 703–771 (2014)View ArticleGoogle Scholar - G Bi, K Mitra Sanjit, S Li, Sampling rate conversion based on DFT and DCT. Signal Process
**93**(2), 476–486 (2013)View ArticleGoogle Scholar

## Copyright

This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.