# Novel self-interference suppression schemes based on Dempster-Shafer theory with network coding in two-way full-duplex MIMO relay

- Yanhua Sun
^{1, 2}Email author, - Yi Yang
^{2}, - Pengbo Si
^{1, 2}, - Ruizhe Yang
^{1, 2}and - Yanhua Zhang
^{1, 2}

**2016**:109

https://doi.org/10.1186/s13638-016-0597-1

© Sun et al. 2016

**Received: **9 October 2015

**Accepted: **3 April 2016

**Published: **18 April 2016

## Abstract

A two-way full-duplex multiple-input multiple-output (MIMO) relay provides effective spectral efficiency and system capacity improvement. However, self-interference (SI) as a serious problem limits the development of a full-duplex relay. In this paper, the novel SI suppression schemes based on the Dempster-Shafer (DS) evidence theory are proposed to suppress SI in the two-way full-duplex MIMO relay. DS evidence theory can appropriately characterize uncertainty and make full use of multiple evidence source information by DS combination rule to obtain reliable decisions. The first proposed DS network coding (DS-NC) scheme adopts DS evidence theory to detect the signal of each source node, considering SI suppression in the basic probability assignment computation in the multiple access phase. Moreover, different from the DS-NC scheme, the further proposed DS physical-layer network coding (DS-PNC) scheme considers SI suppression from the vector space perspective and combines the PNC mapping rule with the DS theory to obtain a network-coded signal without estimating each source node signal. In the broadcast phase, antenna selection is adopted at the relay and DS evidence theory is also applied at each source node for SI suppression. Meanwhile, the effects of imperfect SI channel estimation and the intended channel estimation on the proposed schemes are also studied. Finally, the proposed DS-PNC scheme is studied with the SI signal model which considers analog radio frequency cancellation, the effects of I/Q modulator imbalances, and power amplifier nonlinearity of the transmitter. Simulation results reveal that the proposed DS-PNC scheme is a little more sensitive to the channel estimation errors than the traditional spatial-domain schemes. However, with the perfect channel state information, the proposed DS-NC with one iteration and DS-PNC schemes outperform traditional spatial-domain schemes. Furthermore, considering the SI signal model with nonlinear distortion and radio frequency cancellation, the DS-PNC scheme is also superior to the traditional schemes. Meanwhile, the DS-PNC scheme is more robust to the SI and achieves the same diversity gain as the ideal cancellation.

### Keywords

Two-way full-duplex MIMO relay Self-interference Dempster-Shafer evidence theory## 1 Introduction

Relaying is regarded as a key technique in cooperation communication to provide more extensive coverage and mitigate the transmit power [1]. Furthermore, the multiple-input multiple-output (MIMO) technique has attracted the most research interest and is widely used in wireless communication systems. Hence, the MIMO relay is considered as a promising technique to obtain better reliability and higher capacity. Considering the traditional two-way half-duplex (HD) MIMO relay [2–4], four orthogonal transmission phases are required to finish information exchange between two source nodes via relay. To improve the spectral efficiency, the two-way HD MIMO relay with network coding (NC) [5–7] is proposed to reduce the phases of exchanging information. Two source nodes send their own signals to the relay at the same time in the multiple access (MA) phase, and the relay transmits the network-coded signal to each source node simultaneously in the broadcast (BC) phase. Finally, each source node detects the network-coded signal and obtains the other’s transmitted signal by XOR operation. Furthermore, the physical-layer network coding (PNC) proposed in [8, 9] can obtain network-coded signal directly at the relay without estimating the signal of each source node. Recently, full-duplex (FD) communication is proposed as a potential technique to further improve the spectral efficiency, which can transmit and receive simultaneously at the same frequency band. However, the main challenge in a two-way FD MIMO relay system [10, 11] is the self-interference (SI) caused by the self-feedback signal from the relay transmitter to the receiver. At the relay input, the SI is much larger than the interested signals, which reduces the reliability and system throughput [12]. Therefore, the SI suppression in the FD relay system is considered as an important technique to enable simultaneous transmission and reception.

Various SI suppression schemes in a one-way FD relay have been proposed in earlier works. The SI suppression techniques are usually classified into passive and active suppressions. Passive SI suppression is defined as the signal power attenuation imposed by the physical separation between the transmit and receive antennas [13, 14]. Active suppression techniques are divided into analog suppression, digital suppression, and combined suppression. This paper focuses on digital baseband suppression techniques, which are subdivided into time-domain cancellation [15, 16] and spatial-domain suppression [17–25]. Time-domain cancellation cancels the SI by subtracting its own transmitted signal at the reception. However, as the MIMO technique is widely used at the relay, the biggest disadvantage of time-domain cancellation is that it cannot take full advantage of spatial-domain resources. Hence, spatial-domain suppression schemes are proposed to design different transceiver matrices to meet different system objectives, e.g., null-spacing projection [17–19], minimum mean square error (MMSE) filter [17, 18], antenna selection [20–22], maximum signal-to-interference ratio (SIR) [23], eigenbeamforming [24], and linear transceiver [25]. For a two-way FD relay, most previous researches mainly aim at improving the achievable sum rate, outage probability, capacity, and throughput with SI existing and do not consider the SI suppression problem. For example, the author in [26] compares the performances of the two-way FD and HD relays and illustrates the benefit of power optimization. The Alamouti-based scheme used in [27] enhances the capacity and outage probability without considering the SI suppression. The power allocation scheme used in [28] focuses on maximizing the sum rate of the two-way FD amplify-forward (AF) relay. Moreover, in [29], the paper mainly aims at maximizing the end-to-end sum rate by exploiting joint beamforming optimization and power control.

Recently, the Dempster-Shafer (DS) evidence theory has been proved to obtain good performance in many fields such as data fusion [30], artificial intelligence research [31], and cooperative communication [32]. In this paper, two novel SI suppression schemes based on the DS theory are proposed for the two-way FD MIMO relay system. According to the DS theory, uncertainty of the received signals caused by channel fading, SI, and noise can be characterized by the basic probability assignment (BPA) function, which is a likelihood measure and computed by the proposed probability density function (PDF) with the SI suppression considered. The first proposed scheme called DS-NC exploits the Dempster’s rule to combine the BPAs from different receive antennas to explicitly estimate the signal of each source node in the MA phase. Then, the network-coded signal is achieved by XOR operation. Different from DS-NC, another SI suppression scheme called DS-PNC is proposed, which considers the SI suppression from the vector space perspective and combines the PNC mapping rule with the DS theory to directly decide the network-coded signal without estimating each source node signal. For comparison, the DS-PNC scheme is used to further suppress the SI after traditional spatial-domain schemes. In the BC phase, antenna selection [33] is adopted at the relay and DS evidence theory is also applied at each source node for SI suppression. Meanwhile, the effects of imperfect SI channel estimation and the intended channel estimation on the proposed schemes are also studied. Finally, we build a SI signal model which considers analog radio frequency (RF) cancellation, the effects of I/Q modulator imbalances, and power amplifier (PA) nonlinear distortion at the transmitter.

The rest of paper is organized as follows. Section 2 depicts a theoretical system model without nonlinear distortion considered for the two-way FD MIMO relay. In Section 3, the DS evidence theory is briefly reviewed and two SI suppression schemes based on the DS evidence theory are proposed. In Section 4, the transmit scheme adopted in the BC phase is briefly introduced. Section 5 shows the influence of channel estimation errors on the proposed schemes. In Section 6, the proposed DS-PNC scheme is studied with transmitter impairments considered. The simulation results are presented and described in Section 7. Section 8 shows the complexity analysis of the proposed schemes. Finally, Section 9 concludes the paper.

## 2 System model without nonlinear distortion

*n*

_{ R }receive antennas and

*n*

_{ T }transmit antennas. In this paper, we assume that

*n*

_{ T }≤

*n*

_{ R }and no direct link exists between the source nodes. Both the relay node and two source nodes work in FD mode, and physical isolation between transmit and receive antennas is considered. At the

*t*-th time slot, each source node detects the signal of (

*t*−1)-th time with a fixed delay of a single time slot. The MA, BC, and self-feedback channels are assumed to be quasi-static flat fading and remain static during the one-frame transmission phase.

*t*-th time slot at the relay is depicted as follows

where **H**
_{
MA
} and **H**
_{
L
} denote a *n*
_{
R
}×2 MA channel and *n*
_{
R
}×*n*
_{
T
} self-feedback channel, respectively. The source nodes transmit a 2×1 signal vector **x**(*t*), and the relay node transmits a *n*
_{
T
}×1 signal vector **x**
_{
L
}(*t*) while it simultaneously receives a *n*
_{
R
}×1 signal vector **y**(*t*); **n**
_{
R
}(*t*) is a *n*
_{
R
}×1 additive white Gaussian noise vector with zero mean and variance *σ*
^{2}.

where *y*
_{
i
}(*t*) denotes the received signal of the *i*-th antenna at the relay in the *t*-th time slot.

where **r**
_{
si
}(*t*) denotes the received signal vector at the *i*-th source node, \(\mathbf {H}_{i}^{BC}\) is the corresponding 2×*n*
_{
T
} BC channel submatrix for each source node, **H**
_{
Li
} denotes the 2×1 self feedback channel of the *i*-th source node, and **n**
_{
si
}(*t*) is the white Gaussian noise vector.

## 3 The proposed self-interference suppression schemes based on Dempster-Shafer evidence theory

In this section, the basic concept of the DS evidence theory [34] is briefly reviewed at first, then two novel SI suppression schemes based on the DS evidence theory are proposed to obtain better bit error rate (BER) performance.

### 3.1 A brief review of Dempster-Shafer evidence theory

*Θ*indicate the finite set which contains mutually exclusive and exhaustive hypotheses, called the framework of discernment. All subsets of the framework of discernment constitute a power set 2

^{ Θ }. After establishing the concept of framework of discernment, Shafer presents a mathematical model for evidence processing as shown in Fig. 2.

*m*(·) from the power set 2

^{ Θ }mapping to the interval [ 0,1] as follows

*Φ*is a null set and each subset

*A*⊂

*Θ*is called a focal element set (FES), which satisfies

*m*(

*A*)≥0. Based on the BPA function

*m*(

*A*), belief function Bel(

*A*) can be expressed as

*A*) denotes the total belief assigned to the proposition

*A*. It is important for the DS evidence theory to combine several different evidences from the same framework of discernment through Dempster’s combining rule, which is defined as the orthogonal sum [34, 35]. We assume that Bel

_{1},…,Bel

_{ n }are belief functions of the same framework of discernment and

*m*

_{1},…,

*m*

_{ n }are the corresponding BPAs. If Bel

_{1}⊕⋯⊕Bel

_{ n }exists, Dempster’s combining rule can be expressed as follows [36]

*k*is shown as

where *A*
^{
n
} denotes the FES for the n-th evidence source. The normalization coefficient *k* denotes the conflict among several different evidences. DS theory can combine multiple evidences to counteract uncertainty contained in different evidences and make a more reliable decision.

In this paper, the frame of discernment is selected as modulation constellation set *Ψ*. A FES *A*⊂*Ψ* contains some constellation points. For example, *A*={*φ*
_{
a
}} or *A*={*φ*
_{
a
},*φ*
_{
b
}} or *A*={*φ*
_{
a
},*φ*
_{
b
},*φ*
_{
c
}}⋯, where *φ*
_{
a
},*φ*
_{
b
},*φ*
_{
c
} are constellation points and *a*≠*b*≠*c,a,b,c*=1,2,⋯,*M*. *M* is the modulation constellation set cardinality. FES *A* represents the uncertainty of decisions. For example, *A*={*φ*
_{
a
},*φ*
_{
b
}} implies that the transmitted signal is likely to be *φ*
_{
a
} or *φ*
_{
b
}. That is, the more elements FES *A* contains, the more uncertainty it reflects. DS theory characterizes this uncertainty of FES *A* by BPA function *m*(*A*). Actually, the *m*(*A*) can be defined by several methods such as the cumulative density function (CDF) and probability density function (PDF). In this paper, PDF is used to denote the BPA of a FES *A*. From the above description, we can see that the complexity of the algorithm increases with the number of FES. In this paper, Binary Phase Shift Keying (BPSK) and Quadrature Phase Shift Keying (QPSK) modulation are considered. For BPSK modulation, all the FESs such as single-point set *A*
_{1}={−1},*A*
_{1}={1} and two-point set *A*
_{2}={−1,1} are considered because the number of FES is only three. For high order modulation, due to large number of FES, the FES which only contains single-point or two-point is considered for simplicity. The following sections will discuss the proposed SI suppression schemes based on the DS theory in details.

### 3.2 The proposed Dempster-Shafer network coding scheme for self-interference suppression in two-way full-duplex MIMO relay

Different from traditional spatial-domain suppression schemes, the DS-NC scheme employs the DS evidence theory to estimate the signal of each source node and suppresses the SI without designing the transceiver filter matrices.

In DS-NC, the decision statistics of each source node needs to be obtained at each receive antenna for BPA computation. However, due to SI, the decreased accuracy of decision statistics leads to the bad performance of DS-NC. Hence, the iteration method is adopted for BPA computation to mitigate this problem.

*n*

_{ R }decision statistics at the relay. According to Eq. (2), the

*n*

_{ R }decision statistics of the

*j*-th source node signal

*x*

_{ j }is shown as

**w**

_{ l }denotes a zero-forcing (ZF) linear detection weight vector for the

*l*-th source. Substitute Eqs. (2) and (11) into Eq. (10), then Eq. (10) is rewritten as

*i*-th row of self-feedback channel matrix

**H**

_{ L }and the equivalent noise \(\breve {n}_{i}^{R}(t)\) can be expressed as

*m*

_{ ij }(

*A*) of each FES

*A*is defined as the conditional PDF of decision statistics \(\hat {x}_{ij}(t)\). According to Eq. (12), \(\hat {x}_{ij}(t)\) is a complex Gaussian random variable with mean \(x_{j}(t)-h_{ij}^{\text {MA}^{-1}}(-\mathbf {h}_{i}^{L}+\sum _{l=1,l\neq j}^{2}h_{il}^{\text {MA}}\mathbf {w}_{l}\mathbf {H}_{L})\mathbf {x}_{L}(t)\) and variance \(\parallel h_{ij}^{\text {MA}^{-1}}{\breve {\mathbf {g}}_{i} }\parallel ^{2}\sigma ^{2}\). The vector

**x**

_{ L }(

*t*) belongs to the set

*Ω*which contains \(M^{n_{T}}\phantom {\dot {i}\!}\) possible vectors (for BPSK modulation,

*M*=2; for QPSK modulation,

*M*=4). So, the conditional PDF of \(\hat {x}_{ij}(t)\) can be written as

*U*is the set that contains all the considered FESs and

*α*(

*A*) denotes the eigenvalue of FES

*A*, which is defined as the mean of all elements of FES

*A*[34, 35]. As shown in Eq. (14), the SI is considered as a part of the expectation of \(\hat {x}_{ij}(t)\) in the BPA computation. According to the DS theory, BPA

*m*

_{ ij }(

*A*) must be normalized to satisfy Eq. (6) and is written as

*r*

_{ ij }is the normalization coefficient expressed as

*m*

_{ ij }(

*A*) from each receive antenna and the

*m*

_{ j }(

*A*) for each source node is obtained. In [34] and [35], a least point decision (LPD) rule is proposed to make a final decision as follows

*A*

_{ n }denotes the FES that has

*n*constellation points. \(\bar {A}_{n-1}\) is the FES which has the maximum credibility in all the FESs which satisfy

*A*

_{ n−1}⊂

*U*. For LPD,

*n*−1 comparisons are needed. In order to reduce the decision complexity, a maximum single-point credibility (MC) rule is adopted to decide the signal estimation \(\hat {x}_{j}(t)\) corresponding to the maximum BPA(

*A*

_{1}) as follows

where \(\bar {A}_{1}\) is the FES which has the maximum credibility among all the single-point FESs.

Although the signal estimation \(\hat {x}_{j}(t)\) is obtained at the relay, the result is not good because of inaccurate initial estimation. In order to further enhance the estimation performance, \(\hat {x}_{j}(t)\) instead of the initial estimation \(\tilde {x}_{l}(t)\) is substituted into Eq. (10), then the BPA *m*
_{
j
}(*A*
_{1}) is computed again by Eqs. (8), (14), and (15). The final signal estimation is decided according to the MC rule. In this paper, we only use one iteration in DS-NC for complexity problem. Finally, the network-coded signal *x*
_{1}⊕*x*
_{2} is obtained by XOR operation at the relay (for QPSK modulation, the XOR operation is applied for the in-phase part and the quadrature-phase part).

### 3.3 The proposed Dempster-Shafer physical-layer network coding scheme for self-interference suppression in two-way full-duplex MIMO relay

#### 3.3.1 The proposed Dempster-Shafer physical-layer network coding scheme

*A*

_{1}={−1} or

*A*

_{1}={1} or

*A*

_{2}={−1,1}. According to the PNC mapping rule, the combined transmit vector

**x**

_{ s }(

*t*)=[

*x*

_{1}(

*t*),

*x*

_{2}(

*t*),

**x**

_{ L }(

*t*)]

^{ T }is divided into two groups corresponding to

*x*

_{1}⊕

*x*

_{2}=1 and

*x*

_{1}⊕

*x*

_{2}=−1. The number of elements in each group is decided by the number of transmit antennas

*n*

_{ T }at the relay, and each group contains \(2^{n_{T}+1}\phantom {\dot {i}\!}\) candidate vectors. One group

*B*={[−1,1,

**x**

_{ L }(

*t*)]

^{ T },[1,−1,

**x**

_{ L }(

*t*)]

^{ T }} corresponds to

*x*

_{1}⊕

*x*

_{2}=1, and the other group

*C*={[−1,−1,

**x**

_{ L }(

*t*)]

^{ T },[1,1,

**x**

_{ L }(

*t*)]

^{ T }} corresponds to

*x*

_{1}⊕

*x*

_{2}=−1. The vector

**x**

_{ L }(

*t*) also belongs to the set

*Ω*presented in DS-NC. Different from DS-NC, the BPA

*m*(

*A*) is defined as a conditional PDF of the received signal

*y*

_{ i }(

*t*). For all single-point FESs

*A*

_{1}, the conditional PDF of

*y*

_{ i }(

*t*) can be written as

where *σ*
^{2} denotes the variance of additional Gaussian white noise **n**
_{
R
}(*t*) and \(\mathbf {h}_{i}^{L}\) is the *i*-th row of the self-feedback channel matrix.

*A*

_{2}, the conditional PDF is defined as the sum of the PDFs for all single-point FESs

*A*

_{1}as follows

where *α*(*A*
_{2}) denotes the eigenvalue of FES *A*
_{2} defined as the mean of vectors for each FES.

**x**

_{ s }(

*t*) is divided into four groups denoted by

*λ*

_{ k },

*k*=1,2,⋯,4. Each group contains \(4^{n_{T}+1}\phantom {\dot {i}\!}\) vectors which are decided by the number of transmit antennas

*n*

_{ T }at the relay. For example, the group

*λ*

_{1}={[−1−

*j*,1+

*j*,

**x**

_{ L }(

*t*)]

^{ T },[−1+

*j*,1−

*j*,

**x**

_{ L }(

*t*)]

^{ T },[1−

*j*,−1+

*j*,

**x**

_{ L }(

*t*)]

^{ T },[1+

*j*,−1−

*j*,

**x**

_{ L }(

*t*)]

^{ T }} corresponds to

*x*

_{1}⊕

*x*

_{2}=(1+

*j*). The other groups

*λ*

_{2},

*λ*

_{3}, and

*λ*

_{4}correspond to

*x*

_{1}⊕

*x*

_{2}=(−1+

*j*),

*x*

_{1}⊕

*x*

_{2}=(1−

*j*),

*x*

_{1}⊕

*x*

_{2}=(−1−

*j*), respectively. The vector

**x**

_{ L }(

*t*) also belongs to the set

*Ω*that contains \(4^{n_{T}}\phantom {\dot {i}\!}\) candidate vectors. For the single-point FES in QPSK, similar to the case of BPSK, the conditional PDF is described as

*m*

_{ i }(

*A*) of the

*i*-th receive antenna must be normalized to satisfy Eq. (6) and is written as

*U*is the set that contains all the considered FESs and

*r*

_{ i }is the normalization coefficient, indicated by

After obtaining the BPA *m*
_{
i
}(*A*) of FES *A*, Dempster’s combination rule is applied to combine the BPAs *m*
_{
i
}(*A*) from each receive antenna. Then, the final decision of network-coded signal *x*
_{1}⊕*x*
_{2} is decided by the maximum *m*(*A*
_{1}) according to the MC rule.

#### 3.3.2 The combination of Dempster-Shafer physical-layer network coding and minimum mean square error scheme

For comparison, the proposed DS-PNC scheme combined with the MMSE spatial-domain scheme is presented in this part. In fact, DS-PNC regarded as the detection algorithm is applied to further suppress the SI after the traditional MMSE spatial-domain scheme.

*i*-th row vector of the equivalent self-feedback channel matrix, \(\hat {y}_{i}^{\text {mmse}}(t)\) denotes the

*i*-th row of the received signal \(\widehat {\mathbf {y}}_{mmse}(t)\), and \(\sigma _{\text {ieq}}^{2}\) denotes the equivalent noise variance at the

*i*-th receive antenna that can be written as

where \(\mathbf {g}_{i}^{rx}\) denotes the *i*-th row vector of the MMSE receive filter matrix **G**
_{
rx
}. For QPSK, the BPA computation for single-point FES is obtained by substituting Eq. (25) into Eq. (21).

For two-point FES, the BPA computation is still defined as Eqs. (20) and (22) for the BPSK and QPSK modulations, respectively. After obtaining the BPAs of all the FESs, Dempster’s combination rule and the MC rule are used to obtain the network-coded symbol.

### 3.4 The Dempster-Shafer scheme for self-interference suppression at the source nodes

*Ψ*still acts as the framework of discernment. The combined transmit vector

**x**

_{ ri }(

*t*)=[

**x**

_{ L }(

*t*),

*x*

_{ i }(

*t*)]

^{ T }is divided into two groups for BPSK and four groups for QPSK. According to Eq. (3), for the

*j*-th receive antenna of the

*i*-th source node, the BPA computation of all single-point FES can be denoted as

where *r*
_{
sij
}(*t*) denotes the received signal of the *j*-th antenna at the *i*-th source node, \(\mathbf {h}_{j}^{BCi}\) denotes the BC channel vector for the *j*-th receive antenna of the *i*-th source node, and \(h_{j}^{Lsi}\) is the *j*-th row of the self-feedback channel matrix **H**
_{
Li
} for the *i*-th source node. For two-point FES, the BPA computation is similar to the method in the proposed DS-PNC schemes.

## 4 The transmit scheme in the BC phase

*n*

_{ T }singular values are obtained by singular value decomposition (SVD) of the channel from each relay transmit antenna to the source node, denoted by

*η*

_{ ij }(

*j*=1,2,⋯,

*n*

_{ T }

*i*=1,2). For each relay transmit antenna

*j*∈{1,2,⋯,

*n*

_{ T }}, the source node corresponding to the minimum value of

*η*

_{ ij }is selected as follows

*l*is selected as follows

Then the antenna *l* is exploited to broadcast the network-coded symbol to the two source nodes.

## 5 The effect of channel estimation errors on the proposed schemes in the MA phase

*Δ*

**H**

_{ MA }and

*Δ*

**H**

_{ L }are channel estimation error matrices, whose elements are Gaussian random variables with zero mean, variances \({\sigma ^{2}}_{\Delta h_{\text {MA}}}\) and \({\sigma ^{2}}_{\Delta h_{L}}\), respectively. After considering channel estimation errors, Eq. (1) is rewritten as

**n**

_{ eq }=

*Δ*

**H**

_{ MA }

**x**(

*t*)+

*Δ*

**H**

_{ L }

**x**

_{ L }(

*t*)+

**n**

_{ R }(

*t*). For the proposed DS-PNC scheme, the BPA computation of single-point FES for BPSK can be denoted by

*i*-th row vector of the estimated self-feedback channel matrix \({\hat {\mathbf {H}}_{L}}\). The sets

*C*and

*B*are the same with the ones mentioned above. The equivalent noise variance

*σ*

^{2}

_{total}at the

*i*-th receive antenna is denoted by

where *n*
_{
st
} denotes the number of transmit antennas from all the source nodes.

For QPSK, the BPA computation for single-point FES is obtained by substituting Eq. (32) into Eq. (21). For two-point FES, the BPA computation is still defined as Eqs. (20) and (22) for the BPSK and QPSK modulations, respectively.

## 6 The Dempster-Shafer physical-layer network coding scheme under the self-interference signal model with nonlinear distortion

### 6.1 The self-interference signal model with nonlinear distortion

In this paper, we build a SI signal model which includes radio frequency (RF) analog cancellation, the effects of PA nonlinearity, and I/Q imbalance of the transmitter. For simplicity, we assume the receiver I/Q imbalance can be calibrated with some methods [39].

*j*is denoted as

*s*

_{ j }(

*t*), and the output signal of I/Q modulator model is written as follows [39]

where *ρ*
_{
j
} and *φ*
_{
j
} denote the gains and phase imbalance parameters of transmitter *j*, respectively. Actually, the imbalance coefficients *g*
_{1,j
} and *g*
_{2,j
} are satisfied with |*g*
_{1,j
}|≫|*g*
_{2,j
}| for any practical transmitter front end.

*P*-order PA nonlinear model with Taylor’s series is denoted by

*a*

_{ p,j }is Taylor’s series coefficient and \(s^{\text {PA}}_{j}(t)\) is the output signal of PA at the relay transmitter

*j*. Then, substituting Eq. (35) into Eq. (37), \(s^{\text {PA}}_{j}(t)\) is rewritten as

*p*only considers an odd number (

*p*=1,3,5,⋯), such as for

*p*=1

*p*=3 as

The other higher orders are computed similarly but are not written out in this part.

**H**

^{ S I }denotes the

*n*

_{ R }×

*n*

_{ T }actual SI channel matrix and the PA output signal vector is \(\mathbf {s}^{PA}(t)=[s^{PA}_{1}(t),s^{PA}_{2}(t),\cdots,s^{PA}_{n_{T}}(t)]^{T}\). For simplicity, we assume the transmit power of each relay antenna is satisfied with \( E\{|\sqrt {E_{s}}s^{\text {PA}}_{j}(t)|^{2}\}=1\), \(E_{s}=\sum \limits _{s_{j}(t)\in \Psi }|\sum \limits _{p=1\atop {p\,\text {odd}}}^{P} \sum \limits _{q=0}^{p} a^{(q,p-q)}_{p,j}\times {s_{j}(t)}^{q}{s^{\ast }_{j}(t)}^{(p-q)}|^{2}\) denotes the power normalization coefficient, and

*Ψ*is the modulation constellation point set. The received signal at the

*i*-th relay receiver is denoted by

where \(h^{\text {SI}}_{ik}\) is the elements of the actual SI channel matrix.

**H**

^{ R F }, the cancellation matrix operated on the PA output signals. After analog RF cancellation, the received signal at the relay becomes

**H**

^{ R S I }=

**H**

^{ S I }−

**H**

^{ R F }denotes the

*n*

_{ R }×

*n*

_{ T }residual self-interference (RSI) channel after RF analog cancellation. For simplicity, we assume that

**H**

^{ S I }and

**H**

^{ R F }can be estimated at the RF receiver front end with several methods [42] and

**H**

^{ R S I }is a Gaussian matrix whose elements are zero mean and variance

*λ*random variables. The variance

*λ*reflects the quality of RF analog cancellation. The smaller

*λ*represents a high quality of analog cancellation at the RF front end. Then, substituting Eqs. (39) and (40) into Eq.(41), the RSI signal at the

*i*-th receiver is given as

where \(h^{\text {RSI}}_{ik}=h^{\text {SI}}_{ik}-h^{\text {RF}}_{ik}\) is the element of the matrix **H**
^{
R
S
I
} and \(y^{\text {RSI}}_{i}(t)\) denotes the RSI signal at the *i*-th receiver after RF analog cancellation.

### 6.2 The Dempster-Shafer physical-layer network coding scheme under the self-interference signal model with nonlinear distortion

**x**

_{ L }(

*t*) in Eq. (41). The framework of discernment is still selected as modulation constellation set

*Ψ*. For BPSK, there are also three FESs considered in BPA computation and the combined transmit vector \(\mathbf {x}_{s}(t)=[x_{1}(t),x_{2}(t),\sqrt {E_{s}}\mathbf {s}^{PA}(t)]^{T}\) is also divided into two groups. One group \(E= \{[-1,-1,\sqrt {E_{s}}\mathbf {s}^{PA}(t)]^{T}, [1,1,\sqrt {E_{s}}\mathbf {s}^{PA}(t)]^{T}\}\) corresponds to

*x*

_{1}⊕

*x*

_{2}=1 and the other group \(F=\{[-1,1,\sqrt {E_{s}}\mathbf {s}^{PA}(t)]^{T}, [1,-1,\sqrt {E_{s}}\mathbf {s}^{PA}(t)]^{T}\}\) corresponds to

*x*

_{1}⊕

*x*

_{2}=−1. The elements of vector

**s**

^{ P A }(

*t*) belong to the set \(\Lambda =\{\sum \limits _{p=1\atop {p\,\text {odd}}}^{P} \sum \limits _{q=0}^{p} a^{(q,p-q)}_{p,j}\times {s_{j}(t)}^{q}{s^{\ast }_{j}(t)}^{(p-q)}\},s_{j}(t)\in \Psi \). Because the cardinality of set

*Λ*is

*M*, the vector

**s**

^{ P A }(

*t*) has \(M^{n_{T}}\phantom {\dot {i}\!}\) possible vectors. So, the size of each group is also decided by the modulation constellation order

*M*and the number of relay transmit antennas

*n*

_{ T }. For all single-point FES

*A*

_{1}, the conditional PDF of \(y^{\text {RSI}}_{i}(t)\) is denoted by

where the \(\mathbf {h}^{RSI}_{i}\) is the *i*-th row of the RSI channel. The groups *E* and *F* contain \(M^{n_{T}+1}\phantom {\dot {i}\!}\) possible vectors.

For two-point FES *A*
_{2}, the BPA can be computed by Eq. (20). For QPSK, the BPAs are computed similarly as Eqs. (21) and (22). After obtaining the BPAs of all the FESs, Dempster’s combination rule and the MC rule are used to obtain the network-coded signal.

## 7 Simulation results and analysis

In this section, compared with traditional spatial-domain schemes, BER performances of the proposed schemes are evaluated in a two-way FD MIMO relay system. For comparison, DS-PNC regarded as detection algorithm is applied to further suppress the residual SI after traditional spatial-domain schemes such as the MMSE filter. Hence, the combination of DS-PNC and the MMSE filter called the DS-PNC-MMSE scheme is also presented in this paper. For simplicity, we assume *n*
_{
R
}=2 and *n*
_{
T
}=1 or *n*
_{
T
}=2 at the relay. Meanwhile, BPSK and QPSK modulations are considered at all the nodes. The transmit power at each antenna is normalized to one. The signal-to-interference ratio (SIR) and the signal-to-noise ratio (SNR) are defined respectively as the ratio of the received useful signal power to the SI power and the ratio of the received useful signal power to the noise power at each receive antenna. In order to achieve better performance for traditional spatial-domain suppression schemes, maximum likelihood (ML) detection is used at the relay after spatial-domain suppression schemes in our simulation.

### 7.1 Simulation and discussion for the relay equipped with one and two transmit antennas

^{−2}with a little complexity increase. Meanwhile, DS-NC with one iteration also outperforms the ZF filter and MMSE filter, which proves that iteration can indeed improve the performance and the DS-NC scheme at least needs one iteration to obtain better performance. In addition, compared with DS-NC, the proposed DS-PNC not only obtains about a 4-dB performance gain at a BER of 10

^{−3}but also has a reduced complexity. Meanwhile, DS-PNC achieves the same diversity gain as ideal cancellation. The combined DS-PNC-MMSE has an inferior performance to DS-PNC and DS-NC with one iteration, but it outperforms the traditional spatial-domain schemes.

*S*

*I*

*R*=0 dB at each source node, the BER performance of the DS scheme at the source nodes is depicted in Fig. 4 for the BPSK modulation. Compared with the ZF and MMSE schemes, the DS scheme obtains obvious performance gain and achieves the same diversity gain as ideal cancellation.

^{−2}compared with the traditional spatial-domain schemes. Furthermore, the proposed DS-PNC/DS is superior to DS-NC with one iteration/DS and has about a 6-dB gain than the traditional spatial-domain schemes at a BER of 10

^{−2}. Similar to Fig. 3, the DS-PNC-MMSE/DS scheme is inferior to DS-PNC/DS and DS-NC with one iteration/DS but is superior to spatial-domain schemes.

^{−2}. Moreover, DS-PNC obtains about 2-dB gains over DS-NC with one iteration at a BER of 10

^{−2}and has a lower complexity. Meanwhile, DS-PNC achieves the same diversity gain as ideal cancellation.

^{−3}. In addition, end-to-end average BER performance is still decided by the worst link between the MA and BC phases. Compared with Fig. 6, similar conclusions are obtained. The end-to-end average BER performances of the proposed schemes are much better than those of spatial-domain schemes. The proposed DS-NC with one iteration/DS is superior to spatial-domain schemes but is inferior to the DS-PNC/DS scheme. Moreover, the proposed DS-PNC/DS achieves the same diversity gain as ideal cancellation.

Secondly, considering the relay equipped with two transmit antennas, the BER performances of the DS scheme and traditional spatial-domain schemes are also discussed for the BPSK and QPSK modulations. In this situation, the relay selects one antenna to transmit the signal according to the antenna selection method mentioned in Section 4.

### 7.2 Simulation results for the effects of different signal-to-interference ratio and channel estimation errors

### 7.3 Simulation results under the self-interference signal model with nonlinear distortion

*P*is three and the Taylor coefficients

*a*

_{ p,j }are set according to the reference [43]. The amplitude gains and phase parameters for I/Q imbalance are set as

*ρ*=0.95 and

*φ*=5° [44]. In Fig. 14, the BER performance of the proposed DS-PNC scheme with nonlinear distortion and RF analog cancellation is compared with spatial-domain suppression schemes in the MA phase. Considering

*λ*=0.5 after RF analog cancellation, it can be seen that the proposed DS-PNC scheme outperforms the ZF and MMSE filters by about 7 and 3 dB, respectively, at a BER of 10

^{−2}, which proves that the DS-PNC scheme is also superior to the traditional schemes for considering the transmitter nonlinear distortion and RF analog cancellation. Meanwhile, DS-PNC also achieves the same diversity gains as ideal cancellation.

*λ*varying in the interval [0.1,1] when the SNR is 20 dB. As shown in the figure, the BER performance of the MMSE filter becomes worse obviously with

*λ*increasing but the performance of DS-PNC similar to that of the ZF filter almost keeps unchanged. It proves that the proposed DS-PNC scheme is more robust to the SI than the MMSE filter scheme no matter how the RF analog cancellation quality is. This conclusion is consistent with the results obtained in Fig. 12.

## 8 Complexity analysis

For the proposed schemes based on the DS theory, the complexities of the proposed schemes mainly depend on the complexities of the computations and combinations for multiple BPAs. There are \(\frac {M^{2}+M}{2}\) uncertain decision propositions with only single-point and two-point FES considered in this paper, where *M* denotes the modulation constellation set cardinality. In [36], a BPA calculation or a combination of two BPAs is defined as a BPA evaluation. For simplicity, the complexities of the proposed schemes are determined by the number of BPA evaluation involved. According to [36], the complexity of a BPA evaluation is considered as *O*(*M*
^{2}) without existing SI. Considering the SI suppression in BPA computation, a BPA evaluation defined in this paper is the sum of \(M^{n_{T}}\phantom {\dot {i}\!}\) terms of the BPA computation. Therefore, the complexity of a BPA evaluation in this paper is approximately denoted by \(O(M^{n_{T}+2})\phantom {\dot {i}\!}\).

For DS-NC without the iteration scheme, the complexity is mainly decided by the complexity of DS detection. The relay obtains *n*
_{
st
} estimation signals for each receive antenna, where *n*
_{
st
} denotes the number of all transmit antennas at the source nodes. Therefore, each receive antenna has *n*
_{
st
} BPA evaluations. Since Dempster’s combination rule is exploited to combine the BPAs from each receive antenna, the number of BPA evaluation can be expressed as *n*
_{
R
}
*n*
_{
st
}. Therefore, the complexity of DS-NC without iteration is approximately \(\phantom {\dot {i}\!}O(M^{n_{T}+2}n_{R}n_{st})\). With one iteration exploited in DS-NC, the complexity is increased to \(\phantom {\dot {i}\!}O(2M^{n_{T}+2}n_{R}n_{st})\). However, the relay only has *n*
_{
R
} BPA evaluations in DS-PNC because the signal detection is not needed at each receive antenna. So, the complexity is reduced to \(\phantom {\dot {i}\!}O(M^{n_{T}+2}n_{R})\). For comparison, the complexity of the MMSE SI suppression can be considered as *O*(*n*
_{
R
}
^{3}) according to [45]. From the above analysis, the complexity of the proposed DS-PNC is lower than that of the proposed DS-NC.

## 9 Conclusions

In this paper, the novel SI suppression schemes based on the DS theory were proposed at the relay and source nodes for the two-way FD MIMO relay system. In the MA phase, DS-NC adopted the DS evidence theory to estimate the signals of each source node with SI considered in the BPA computation. Furthermore, the proposed DS-PNC scheme considered SI suppression from the vector space perspective and combined the PNC mapping rule with the DS theory to obtain the network-coded signal directly. For comparison, DS-PNC-MMSE that combined the DS-PNC and MMSE filter schemes was presented. In the BC phase, antenna selection was adopted at the relay and the DS scheme exploited at the source nodes was similar to DS-PNC but without considering the PNC mapping rule in the BPA computation. Meanwhile, the effects of imperfect SI channel estimation and the intended channel estimation on the proposed schemes was also studied. Finally, the proposed DS-PNC scheme was studied under the SI signal model with nonlinear distortion and RF analog cancellation. Simulation results revealed that the proposed DS-PNC scheme was a little more sensitive to the channel estimation errors than the traditional spatial-domain schemes. However, the proposed schemes outperformed spatial-domain schemes with the perfect channel state information. Furthermore, considering the SI signal model with nonlinear distortion and RF cancellation, the DS-PNC scheme was also superior to the traditional schemes and more robust to the SI. Meanwhile, the DS-PNC scheme achieved the same diversity gain as the ideal cancellation.

## Declarations

### Acknowledgements

This work is jointly supported by the National Natural Science Foundation of China under Grant 61201198, Beijing Natural Science Foundation of China under Grant 4132015, 4132007, and 4132019.

**Open Access** This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

## Authors’ Affiliations

## References

- B Rankov, A Wittneben, Spectral efficient protocols for half-duplex fading relay channels. IEEE J. Sel. Areas Commun.
**25**(2), 379–389 (2007).View ArticleGoogle Scholar - C Eşli, A Wittneben, in
*IEEE Global Telecommunications Conference*. One- and two-way decode-and-forward relaying for wireless multiuser MIMO networks (IEEENew Orleans, USA, 2008), pp. 1–6.Google Scholar - T Unger, A Klein, in
*Proceeding of the 16th Imaging Systems and Techniques on Mobile and Wireless Communications Summit*. On the performance of two-way relaying with multiple-antenna relay stations (IEEEBudapest, Hungary, 2007), pp. 1–5.Google Scholar - I Hammerström, M Kuhn, C Eşli, J Zhao, A Wittneben, G Bauch, in
*Proceeding of the 8th Workshop On Signal Processing Advances in Wireless Communications*. MIMO two-way relaying with transmit CSI at the relay (IEEEHelsinki, Finland, 2007), pp. 1–5.Google Scholar - M Peng, H Liu, W Wang, H-H Chen, Cooperative network coding with MIMO transmission in wireless decode-and-forward relay networks. IEEE Trans. Veh. Technol.
**59**(7), 3577–3588 (2010).View ArticleGoogle Scholar - CH Liu, F Xue, in
*Proceeding of IEEE International Conference on Communications*. Network coding for two-way relaying: rate region, sum rate and opportunistic scheduling (IEEEBeijing, China, 2008), pp. 1044–1049.Google Scholar - S-YR Li, RW Yeung, N Cai, Linear network coding. IEEE Trans. Inf. Theory.
**49**(2), 371–381 (2003).MathSciNetView ArticleMATHGoogle Scholar - Z Shengli, S-C Liew, PP Lam, Physical layer network coding. arXiv preprint arXiv: 0704.2475 (2007).Google Scholar
- S Zhang, QF Zhou, C Kai, W Zhang, Full diversity physical-layer network coding in two-way relay channels with multiple antennas. IEEE Trans. Wirel. Commun.
**13**(8), 4273–4282 (2014).View ArticleGoogle Scholar - O Taghizadeh, R Mathar, in
*Proceeding of the 18th International ITG Workshop On Smart Antennas*. Full-duplex decode-and-forward relaying with limited self-interference cancellation (VDEErlangen, Germany, 2014), pp. 1–7.Google Scholar - AC Cirik, R Wang, Y Rong, Y Hua, in
*Proceeding of the 15th International Workshop On Signal Processing Advances in Wireless Communications*. MSE based transceiver designs for bi-directional full-duplex MIMO systems (IEEEToronto, Canada, 2014), pp. 384–388.Google Scholar - K Haneda, E Kahra, S Wyne, C Icheln, P Vainikainen, in
*Proceeding of the 4th European Conference On Antennas and Propagation*. Measurement of loop-back interference channels for outdoor-to-indoor full-duplex radio relays (IEEEBarcelona, Spain, 2010), pp. 1–5.Google Scholar - W Slingsby, J McGeehan, in
*Proceeding of the 9th International Conference on Antennas and Propagation*. Antenna isolation measurements for on-frequency radio repeaters (IETEindhoven, Holland, 1995), pp. 239–243.Google Scholar - CR Anderson, S Krishnamoorthy, CG Ranson, TJ Lemon, WG Newhall, T Kummetz, JH Reed, in
*Proc. IEEE SoutheastCon*. Antenna isolation, wideband multipath propagation measurements, and interference mitigation for on-frequency repeaters (IEEEGreensboro, USA, 2004), pp. 110–114.Google Scholar - H Hamazumi, K Imamura, N Iai, K Shibuya, M Sasaki, in
*Proceeding of Global Telecommunications Conference*. A study of a loop interference canceller for the relay stations in an SFN for digital terrestrial broadcasting (IEEESan Francisco, USA, 2000), pp. 167–171.Google Scholar - KM Nasr, JP Cosmas, M Bard, J Gledhill, Performance of an echo canceller and channel estimation for on-channel repeaters in DVB-T/H networks. IEEE Trans. Broadcast.
**53**(3), 609–618 (2007).View ArticleGoogle Scholar - T Riihonen, S Werner, R Wichman, in
*Proceeding of IEEE Conference Record of the Forty-Third Asilomar Conference On Signals, Systems and Computers*. Spatial loop interference suppression in full-duplex MIMO relays (IEEEPacific Grove, USA, 2009), pp. 1508–1512.Google Scholar - B Chun, E-R Jeong, J Joung, Y Oh, YH Lee, in
*Proceeding of 2009 Annual Summit and Conference*. Asia-Pacific Signal and Information Processing Association, Pre-nulling for self-interference suppression in full-duplex relays (IEEESapporo, Japan, 2009), pp. 91–97.Google Scholar - M Ahmed, CC Tsimenidis, SY Le Goff, in
*Proceeding of the 10th International Conference On Wireless and Mobile Computing, Networking and Communications*. Performance analysis of full-duplex MIMO-SVD-SIC based relay in the presence of channel estimation errors (IEEELarnaca, Republic of Cyprus, 2014), pp. 467–472.Google Scholar - T Riihonen, S Werner, R Wichman, Mitigation of loopback self-interference in full-duplex MIMO relays. IEEE Trans. Signal Process.
**59**(12), 5983–5993 (2011).MathSciNetView ArticleGoogle Scholar - Y Sung, J Ahn, B Van Nguyen, K Kim, in
*Proceeding of IEEE International Symposium on Intelligent Signal Processing and Communications Systems*. Loop-interference suppression strategies using antenna selection in full-duplex MIMO relays (IEEEChiang Mai, Thailand, 2011), pp. 1–4.Google Scholar - K Yang, H Cui, L Song, Y Li, in
*Proceeding of IEEE International Conference On Communications*. Joint relay and antenna selection for full-duplex AF relay networks (IEEESydney, Australia, 2014), pp. 4454–4459.Google Scholar - P Lioliou, M Viberg, M Coldrey, F Athley, in
*Proceeding of IEEE Record of the Forty Fourth Asilomar Conference On Signals, Systems and Computers*. Self-interference suppression in full-duplex MIMO relays (IEEEPacific Grove, USA, 2010), pp. 658–662.Google Scholar - T Riihonen, A Balakrishnan, K Haneda, S Wyne, S Werner, R Wichman, in
*Proceeding of the 45th Annual Conference On Information Sciences and Systems*. Optimal eigenbeamforming for suppressing self-interference in full-duplex MIMO relays (IEEEBaltimore, USA, 2011), pp. 1–6.Google Scholar - CYA Shang, PJ Smith, GK Woodward, H Suraweera, in
*Proceeding of Australian Communications Theory Workshop*. Linear transceivers for full duplex MIMO relays (IEEESydney, Australia, 2014), pp. 11–16.Google Scholar - X Cheng, B Yu, X Cheng, L Yang, in
*Proceeding of IEEE Military Communications Conference*. Two-way full-duplex amplify-and-forward relaying (IEEESan Deigo, USA, 2013), pp. 1–6.Google Scholar - G Bi, H Gao, T Lv, W Wang, in
*Proceeding of IEEE Military Communications Conference*. Alamouti-based schemes for full-duplex two-way relay networks (IEEEBaltimore, Maryland, 2014), pp. 1601–1607.Google Scholar - J Yang, X Liu, Q Yang, in
*Proceeding of the 14th International Symposium On Communications and Information Technologies*. Power allocation of two-way full-duplex AF relay under residual self-interference (IEEEIncheon, Republic of Korea, 2014), pp. 213–217.Google Scholar - G Zheng, Joint beamforming optimization and power control for full-duplex MIMO two-way relay channel. IEEE Trans. Signal Process.
**63**(3), 555–566 (2015).MathSciNetView ArticleGoogle Scholar - D Zeng, J Xu, G Xu, Data fusion for traffic incident detector using DS evidence theory with probabilistic SVMS. J. Comput.
**3**(10), 36–43 (2008).View ArticleGoogle Scholar - T Denoeux, A neural network classifier based on Dempster-Shafer theory. IEEE Trans. Syst. Man Cybern. Syst. Hum.
**30**(2), 131–150 (2000).MathSciNetView ArticleGoogle Scholar - L Qin, Y Li, Z He, J Lin, Y Lu, in
*Proceeding of the 8th International ICST Conference On Communications and Networking in China*. Cooperative signal processing scheme for multiple-cell based on evidence theory (IEEEBeijing, China, 2013), pp. 643–647.Google Scholar - M Eslamifar, WH Chin, C Yuen, YL Guan, Performance analysis of two-step bi-directional relaying with multiple antennas. IEEE Trans. Wirel. Commun.
**11**(12), 4237–4242 (2012).View ArticleGoogle Scholar - G Shafer, A mathematical theory of evidence. Princeton University Press Princeton. 1: (1976).Google Scholar
- J Xia, T Lv, DST-based combining scheme outperforms maximal-ratio combining. Electron. Lett.
**46**(7), 536–537 (2010).View ArticleGoogle Scholar - J Xia, T Lv, Y Li, in
*Proceeding of the 70th Vehicular Technology Conference Fall*. A novel MIMO detection scheme based on DS evidence theory (IEEEAnchorage, USA, 2009), pp. 1–5.Google Scholar - C Chiong, Y Rong, Y Xiang, Channel estimation for two-way MIMO relay systems in frequency-selective fading environments. IEEE Trans. Wirel. Commun.
**14**(1), 399–409 (2015).View ArticleGoogle Scholar - F Zhaoxi, S Jiong, S Hangguan, in
*Proceeding of Cross Strait Quad-Regional Radio Science and Wireless Technology Conference*. Comparison of channel estimation schemes for MIMO two-way relaying systems (IEEEHarbin, China, 2011), pp. 719–722.View ArticleGoogle Scholar - L Anttila, Digital front-end signal processing with widely-linear signal models in radio devices, Ph.D. dissertation, Tampere University of Technology (2011).Google Scholar
- J Cha, J Yi, J Kim, B Kim, Optimum design of a predistortion RF power Amplifier for multicarrier WCDMA applications. IEEE Trans. Microw. Theory Tech.
**52**(2), 655–663 (2004).View ArticleGoogle Scholar - Y Yang, B Kim, A new linear amplifier using low-frequency second-order intermodulation component feed-forwarding. IEEE Microw. Guided Wave Lett.
**9**(10), 419–421 (1999).MathSciNetView ArticleGoogle Scholar - L Anttila, D Korpi, V Syrjala, M Valkama, in
*Proceeding of 2013 Asilomar Conference on Signals, Systems and Computers*. Cancellation of power amplifier induced nonlinear self-interference in full-duplex transceivers (IEEEPacific Grove, USA, 2013), pp. 1193–1198.View ArticleGoogle Scholar - L Anttila, Research on nonlinear and mobile communication key technology of RF power amplifier, PH.D. dissertation, Zhejiang University (2005).Google Scholar
- A Gokceoglu, S Dikmese, M Valkama, M Renfors, Energy detection under IQ imbalance with single- and multi-channel direct-conversion receiver: analysis and mitigation. IEEE J. Sel. Areas Commun.
**32**(3), 411–424 (2014).View ArticleGoogle Scholar - J Benesty, Y Huang, J Chen, A fast recursive algorithm for optimum sequential signal detection in a BLAST system. IEEE Trans. Signal Process.
**51**(7), 1722–1730 (2003).View ArticleGoogle Scholar