This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Joint Discrete Antenna Positioning and Beamforming Optimization in Movable Antenna Enabled Full-Duplex ISAC Networks

Zhendong Li, Jianle Ba, Zhou Su, Haixia Peng, Yuntao Wang, Wen Chen and Qingqing Wu Z. Li, J. Ba and H. Peng are with the School of Information and Communication Engineering, Xi’an Jiaotong University, Xi’an 710049, China (email: [email protected], [email protected], [email protected]). Z. Su and Y. Wang are with the School of Cyber Science and Engineering, Xi’an Jiaotong University, Xi’an 710049, China (email: [email protected], [email protected]).W. Chen and Q. Wu are with the Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai 200240, China (e-mail: [email protected], [email protected]). (Corresponding author: Zhou Su)
Abstract

In this paper, we propose a full-duplex integrated sensing and communication (ISAC) system enabled by a movable antenna (MA). By leveraging the characteristic of MA that can increase the spatial diversity gain, the performance of the system can be enhanced. We formulate a problem of minimizing the total transmit power consumption via jointly optimizing the discrete position of MA elements, beamforming vectors, sensing signal covariance matrix and user transmit power. Given the significant coupling of optimization variables, the formulated problem presents a non-convex optimization challenge that poses difficulties for direct resolution. To address this challenging issue, the discrete binary particle swarm optimization (BPSO) algorithm framework is employed to solve the formulated problem. Specifically, the discrete positions of MA elements are first obtained by iteratively solving the fitness function. The difference-of-convex (DC) programming and successive convex approximation (SCA) are used to handle non-convex and rank-1 terms in the fitness function. Once the BPSO iteration is complete, the discrete positions of MA elements can be determined, and we can obtain the solutions for beamforming vectors, sensing signal covariance matrix and user transmit power. Numerical results demonstrate the superiority of the proposed system in reducing the total transmit power consumption compared with fixed antenna arrays.

Index Terms:
Full-duplex integrated sensing and communication (ISAC), movable antenna (MA), discrete position, binary particle swarm optimization (BPSO).

I Introduction

With the advancement of technology, the demand for efficient and reliable sensing and communication is increasingly high. For instance, in the Internet-of-vehicles (IoV), the capability to simultaneously offer vehicle positioning, speed monitoring and collision warning is essential to enhance road safety and traffic efficiency. To enhance spectrum and hardware efficiency, and to achieve integration gains, integrated sensing and communication (ISAC) combines sensing with communication, realizing a truly collaborative design of communication and sensing functions. ISAC possesses the capability to provide high-quality wireless communication services to target users while simultaneously offering high-precision sensing services [1, 2, 3]. Given the significant advantages of ISAC, it is poised to facilitate numerous emerging applications and is widely regarded as one of the key technologies for next-generation mobile communication networks.

In recent years, the investigation of ISAC utilizing multiple-input multiple-output (MIMO) technology has attracted considerable interest. This is because MIMO can profoundly enhance system performance by deeply exploiting spatial dimension resources with beamforming design [2, 4]. Specifically, MIMO-based ISAC systems, equipped with multiple antennas at both the transmitter and receiver, can further increase spatial degrees of freedom. Simultaneously, the system employs beamforming to concentrate signal energy in the direction of the target transmission, thereby improving the quality of ISAC signals and reducing interference to other users. Moreover, multiple data streams can be transmitted by MIMO systems within the same time-frequency resource block, which significantly improves spectrum efficiency compared to single-antenna systems [5, 6]. The academic community conducted a series of studies on MIMO-based ISAC systems [7, 8, 9, 10, 11, 12]. In [7], a hybrid beamforming design was proposed by the authors to maximize the system’s energy efficiency. [10] and [11] focused on improving the signal-to-clutter-plus-noise ratio and the eavesdropping signal-to-noise ratio using beamforming in MIMO-based ISAC systems. However, [7, 8, 9, 10, 11] did not focus on system’s data transmission mode, whereas [12] specifically studied a full-duplex data transmission model. It proposed a sensing-assisted uplink communication framework between a single-antenna user and a full-duplex base station (BS), which improved the secrecy rate by jointly optimizing radar waveforms and receiving beamforming vectors. The full-duplex model does not require different frequencies to be assigned to transmit and receive, further improving spectrum utilization compared to simplex and half-duplex systems. Although effective beamforming can improve the performance of MIMO-based ISAC systems, traditional MIMO systems face challenges due to the limitation of antennas being deployed in fixed positions. The ability to dynamically adjust the channel is limited, and when massive MIMO is deployed to improve wireless channel capacity, more antennas and radio frequency chains are required [13, 14].

Fortunately, movable antenna (MA) is proposed as a promising technology to address the aforementioned challenges. In the novel MIMO systems enabled by MA, the positions of the MA elements can be dynamically adjusted in real-time by controllers, such as stepper motors or servo systems [15, 16], thus fully utilizing the available degrees of freedom with only a limited number of antenna elements. In the literature, various efforts have been made to further explore the potential of MA-enabled MIMO systems, validated their advantages in terms of improved system performance compared with existing systems to fixed antenna positions [17, 18, 19, 20]. Both [17] and [18] considered the positions of the MA elements as one of the optimization variables to enhance the system’s security performance. [19] investigated the joint optimization of the positions of transmitting and receiving MA elements along with the covariance matrix of the transmitted signals to maximize the capacity of MIMO systems supported by point-topology. Different from [17, 18, 19], [20] characterized the movement of MA elements as discrete motion and concurrently optimized the transmit beamforming along with the MA positioning at the BS to minimize total transmit power in multiple-input single-output (MISO) systems. Moreover, [21] provided a general comparison with traditional fixed phased arrays (FPAs), and summarized that MA-enabled communication systems can fully leverage the spatial variations of wireless channels in limited areas, thereby increasing signal power, suppressing interference, achieving beamforming and enhancing spatial multiplexing performance. Overall, MA-enabled novel MIMO systems can significantly enhance system performance by leveraging the characteristics of MA.

Owing to its numerous advantages, MA has garnered extensive attention from both industry and academia [21, 22, 23, 24, 25, 26, 27]. The application of MA research in industrial Internet-of-things (IoT), satellite communication, smart homes, and other fields is expected to further promote industry development [21]. Current research not only focuses on the comparison between traditional MIMO systems and MA-enabled MIMO systems but also extends to various communication system models enabled by MA. [22] investigated the communication quality of multi-user in a unmanned aerial vehicle (UAV) system enhanced by the MA. [23] studied a system featuring multiple MAs at the BS and multiple sets of users each equipped with single MA, with the objective of maximizing the minimum weighted signal-to-noise ratio across all users. [24] examined the physical layer security of a MA-enabled full-duplex system. Due to the mobility of the elements of the MA, the integration of MA and ISAC systems can further leverage the characteristics of wireless channel spatial variation to enhance system performance. [25] showed the similarity of user channels in ISAC systems can be reduced by applying MA, thereby improving channel gain. [26] significantly improved the communication rate and sensing mutual information of ISAC compared to fixed uniform arrays. In addition, [27] explored the potential of MA in enhancing the performance of ISAC. However, research on MA-enabled ISAC systems is relatively scarce and is in its infancy.

Based on the aforementioned discussion, this paper primarily considers a minimization of transmit power consumption for the MA-enabled full-duplex ISAC system. Specifically, we consider a more practical case where MA has a spatially discrete set of candidate positions. The objective is to minimize the total transmit power consumption through the joint optimization of the MA elements’ discrete positions, beamforming vectors, sensing signal covariance matrix and user transmit power. Given the highly coupled optimization variables, we aim to design an efficient joint optimization algorithm for the MA-enabled full-duplex ISAC system to address the transmit power consumption minimization problem. The main contributions of this paper are summarized as follows:

  • We propose a novel MA-enabled full-duplex ISAC system, where the deployed MA can improve the system performance by increasing the spatial degrees of freedom. In this paper, we adopt a more practical MA model, where the candidate positions of MA elements are discrete. Then, a total transmit power consumption minimization problem is formulated via jointly optimizing the discrete position of MA elements, beamforming vectors, sensing signal covariance matrix and user transmit power. Considering the interdependence of the optimization variables, the minimization problem is non-convex, rendering it difficult to attain solutions.

  • To address the issue of minimizing the total transmit power consumption of the system, we propose a discrete binary particle swarm optimization (BPSO) algorithm framework. More specifically, by applying the difference-of-convex (DC) programming and successive convex approximation (SCA) to transform the non-convex and rank-1 terms in fitness function, we can iteratively solve the fitness function to determine the discrete positions of MA elements. Given the obtained discrete positions of MA elements, the solutions for beamforming vectors, sensing signal covariance matrix and user transmit power are also determined.

  • Numerical simulation results indicate that the system has performance advantages over traditional ISAC systems. Due to the enhanced spatial degrees of freedom that MA offers, the MA-enabled ISAC system can reduce the system’s total transmit power consumption compared with fixed antenna arrays. In addition, beampattern simulation also shows that the proposed BPSO-based optimization algorithm framework in the MA-enabled full-duplex ISAC network can achieve multi-beam alignment and interference suppression to a certain extent.

The structure of this paper is organized as follows. In Section II, we present the MA-enabled full-duplex ISAC system model and the formulation of total transmit power consumption minimization problem. Section III provides the joint discrete antenna positioning and beamforming optimization algorithm based on BPSO algorithm framework. In Section IV, numerical results elaborate that the proposed system has better performance in terms of reducing the transmit power consumption compared with fixed antenna array. Finally, Section V concludes the paper.

Notation: Lower-case letters are used to represent scalar values. Vectors are indicated with bold lower-case letters, while matrices are represented by bold upper-case letters. ()T\left(\cdot\right)^{T} and ()H\left(\cdot\right)^{H} respectively denote transpose and conjugate transpose of a matrix. () - 1{\left(\cdot\right)^{{\text{ - }}1}} represents the inverse of the matrix. Tr(){\text{Tr}}\left(\cdot\right) denotes the trace of a square matrix. Denote \left\|\cdot\right\| by norm of a vector and ||\left|\cdot\right| by the absolute value of a scalar. Let rank(){\text{rank}}\left(\cdot\right) and []i,j{\left[\cdot\right]_{i,j}} return the rank and the (i,j)\left({i,j}\right)-th entry of a matrix, respectively. M×N{\mathbb{C}^{M\times N}} and M×N{\mathbb{R}^{M\times N}} are the sets of M×NM\times N-dimensional complex and real matrices. 𝐈N{{\mathbf{I}}_{N}} refers to the identity matrix of dimension NN. 𝐀0{\mathbf{A}}\succeq 0 indicates that 𝐀\bf{A} is a positive semidefinite (PSD)matrix. Let 𝐀0{\mathbf{A}}\succ 0 imply that 𝐀\bf{A} is a positive definite matrix. We use 𝔼{}\mathbb{E}\left\{\cdot\right\} for the expectation operation. jj denotes the imaginary unit, i.e., j2=1j^{2}=-1. 𝐀,𝐁\left\langle{{\bf{A}},{\bf{B}}}\right\rangle represents the Frobenius inner product of matrices 𝐀\bf{A} and 𝐁\bf{B}. 𝐀\partial\left\|{\bf{A}}\right\| represents the subgradient of the spectral norm of the matrix 𝐀\bf{A}. % represents the modulo operation.

II MA-Enabled Full-Duplex ISAC System Model and Problem Formulation

Firstly, we consider the model of a MA-enabled ISAC system with full-duplex operation, as illustrated in Fig. 1. Specifically, the full-duplex dual-function radar and communication base station (FD-DFRC-BS) is equipped with two MAs for receiving and transmitting signals. The receiving MA is used to receive communication signals from UU single-antenna uplink users and echo signals from radar sensing targets, while simultaneously being subject to KK non-target radar sensing interference. The transmitting MA sents downlink ISAC signals over the same time-frequency resources, communicates with DD single-antenna downlink users, and senses a radar sensing target. The number of elements in the receiving MA is Nr{N_{r}}, and the number of elements in the transmitting MA is Nt{N_{t}}. This paper considers a more practical MA, where the candidate positions of the antenna elements are discrete. Specifically, it is assumed that all elements of the transmitting MA have a total of NN candidate discrete positions (N>NtN>{N_{t}}). The matrix representing these candidate discrete positions are denoted as 𝐏t = [𝐩t,1,,𝐩t,N]{{\mathbf{P}}_{t}}{\text{ = }}\left[{{{\mathbf{p}}_{t,1}},\ldots,{{\mathbf{p}}_{t,N}}}\right], where 𝐩t,n=[xt,n,yt,n]T{{\mathbf{p}}_{t,n}}={\left[{{x_{t,n}},{y_{t,n}}}\right]^{T}}. All receiving MA elements have a total of MM candidate discrete positions (M>Nr)(M>{N_{r}}), and the corresponding candidate discrete position matrix is expressed as 𝐏r = [𝐩r,1,,𝐩r,M]{{\mathbf{P}}_{r}}{\text{ = }}\left[{{{\mathbf{p}}_{r,1}},\ldots,{{\mathbf{p}}_{r,M}}}\right], where 𝐩r,M=[xr,m,yr,m]T{{\mathbf{p}}_{r,M}}={\left[{{x_{r,m}},{y_{r,m}}}\right]^{T}}. Note that in this paper, the distance between candidate discrete positions of the MA is equal to ll in either the horizontal or vertical direction. Additionally, the full-duplex mode allows for simultaneous operation in both directions of communication (transmitting and receiving) without mutual interference. Theoretically, for communication, this improves the efficiency of data transmit and the utilization of bandwidth, while for radar sensing, the available bandwidth increases, enhancing the radar’s sensing performance. Moreover, the MA leverages the flexibility of moving MA elements to exploit the degrees of freedom available in the area, and the discretization of MA element candidate positions facilitates their deployment and application in practical systems. At the same time, for the sake of analysis, this paper assumes that channel state information (CSI) can be perfectly obtained at the FD-DFRC-BS [19, 28]. The scenario of more practical imperfect CSI can be considered as future research work.

Refer to caption
Figure 1: MA-enabled full-duplex ISAC system.

II-A Channel Model

In this subsection, we primarily elaborate on the channel model for radar sensing and communication in the MA-enabled full-duplex ISAC system. Firstly, we introduce the radar sensing channel model of the system. Specifically, for the MA system, its MA elements can move among the candidate discrete positions within a two-dimensional area, leading to changes in the physical channel. Assuming that the channel sensing information is line-of-sight (LoS), taking the receiving MA as an example, the actual location vector of the nr{n_{r}}-th MA element is expressed as 𝐭r,nr=[trx,nr,try,nr]T{{\mathbf{t}}_{r{\text{,}}{n_{r}}}}={\left[{{t_{{r_{x}},{n_{r}}}},{t_{{r_{y}},{n_{r}}}}}\right]^{T}}, which can be represented by a two-dimensional vector 𝐛r,nr{{\mathbf{b}}_{r,{n_{r}}}} as follows: 𝐭r,nr = 𝐏r𝐛r,nr{{\mathbf{t}}_{r{\text{,}}{n_{r}}}}{\text{ = }}{{\mathbf{P}}_{r}}{{\mathbf{b}}_{r,{n_{r}}}}, where 𝐛r,nr=[br,nr[1],,br,nr[M]]T{{\mathbf{b}}_{r,{n_{r}}}}={\left[{{b_{r,{n_{r}}}}\left[1\right],...,{b_{r,{n_{r}}}}\left[M\right]}\right]^{T}}, nr{1,,Nr}\forall{n_{r}}\in\left\{{1,...,{N_{r}}}\right\}, br,nr[m]{0,1}{b_{r,{n_{r}}}}\left[m\right]\in\left\{{0,1}\right\}, m{1,,M}\forall m\in\left\{{1,...,M}\right\} and m=1Mbr,nr[m]=1\sum\nolimits_{m=1}^{M}{{b_{r,{n_{r}}}}\left[m\right]=1}. Similarly, the actual position of the nt{n_{t}}-th transmitting MA element is defined as 𝐭t,nt=[ttx,nt,tty,nt]T{{\mathbf{t}}_{t{\text{,}}{n_{t}}}}={\left[{{t_{{t_{x}},{n_{t}}}},{t_{{t_{y}},{n_{t}}}}}\right]^{T}}, and a binary direction vector 𝐛t,nt{{\mathbf{b}}_{t,{n_{t}}}} is used to express it as 𝐭t,nt = 𝐏t𝐛t,nt{{\mathbf{t}}_{t,{n_{t}}}}{\text{ = }}{{\mathbf{P}}_{t}}{{\mathbf{b}}_{t,{n_{t}}}}. The binary direction 𝐛t,nt{{\mathbf{b}}_{t,{n_{t}}}} is given by 𝐛t,nt=[bt,nt[1],,bt,nt[N]]T{{\mathbf{b}}_{t,{n_{t}}}}={\left[{{b_{t,{n_{t}}}}\left[1\right],...,{b_{t,{n_{t}}}}\left[N\right]}\right]^{T}}, nt{1,,Nt}\forall{n_{t}}\in\left\{{1,...,{N_{t}}}\right\} and it follows that bt,nt[n]{0,1}{b_{t,{n_{t}}}}\left[n\right]\in\left\{{0,1}\right\}, n{1,,N}\forall n\in\left\{{1,...,N}\right\} and n=1Nbt,nt[n]=1\sum\nolimits_{n=1}^{N}{{b_{t,{n_{t}}}}\left[n\right]=1}. Let the angles be the elevation angle and azimuth angle between the signal and the radar sensing target θ\theta , ϕ[π/2,π/2]\phi\in\left[{{{-\pi}\mathord{\left/{\vphantom{{-\pi}2}}\right.\kern-1.2pt}2},{{-\pi}\mathord{\left/{\vphantom{{-\pi}2}}\right.\kern-1.2pt}2}}\right], respectively. Therefore, the steering vector for the transmitting MA array is expressed as

𝐚t(θ,ϕ) = 1Nt[1,ej2π((ttx,2ttx,1)cosθsinϕ+(tty,2tty,1)sinθ)λ,\displaystyle{{\mathbf{a}}_{t}}\left({\theta,\phi}\right){\text{ = }}\frac{1}{{\sqrt{{N_{t}}}}}\left[{1,{e^{\frac{{j2\pi\left({\left({{t_{{t_{x}},2}}-{t_{{t_{x}},1}}}\right)\cos\theta\sin\phi+({t_{{t_{y}},2}}-{t_{{t_{y}},1}})\sin\theta}\right)}}{\lambda}}},}\right. (1)
,ej2π((ttx,Ntttx,1)cosθsinϕ+(tty,Nttty,1)sinθ)λ].\displaystyle\left.{\ldots,{e^{\frac{{j2\pi\left({\left({{t_{{t_{x}},{N_{t}}}}-{t_{{t_{x}},1}}}\right)\cos\theta\sin\phi+\left({{t_{{t_{y}},{N_{t}}}}-{t_{{{\text{t}}_{y}},1}}}\right)\sin\theta}\right)}}{\lambda}}}}\right].

Similarly, the steering vector for the array receiving is expressed as

𝐚r(θ,ϕ) = 1Nr[1,ej2π((trx,2trx,1)cosθsinϕ+(try,2try,1)sinθ)λ,\displaystyle{{\mathbf{a}}_{r}}\left({\theta,\phi}\right){\text{ = }}\frac{1}{{\sqrt{{N_{r}}}}}\left[{1,{e^{\frac{{j2\pi\left({\left({{t_{{r_{x}},2}}-{t_{{r_{x}},1}}}\right)\cos\theta\sin\phi+({t_{{r_{y}},2}}-{t_{{r_{y}},1}})\sin\theta}\right)}}{\lambda}}},}\right. (2)
,ej2π((trx,Nttrx,1)cosθsinϕ+(try,Nrtry,1)sinθ)λ].\displaystyle\left.{\ldots,{e^{\frac{{j2\pi\left({\left({{t_{{r_{x}},{N_{t}}}}-{t_{{r_{x}},1}}}\right)\cos\theta\sin\phi+({t_{{r_{y}},{N_{r}}}}-{t_{{r_{y}},1}})\sin\theta}\right)}}{\lambda}}}}\right].

Then, we describe the communication channel model of the system. Based on the field response-based channel model, the channel between the transmitting and receiving MA can be modeled as 𝐇SINr×Nt{{\mathbf{H}}_{{\text{SI}}}}\in{\mathbb{C}^{{N_{r}}\times{N_{t}}}}, the channel between UU uplink users and the receiving MAs can be modeled as 𝐆U×Nr{\mathbf{G}}\in{\mathbb{C}^{U\times{N_{r}}}}, and the channel between DD downlink users and the transmitting MA can be modeled as 𝐇D×Nt{\mathbf{H}}\in{\mathbb{C}^{D\times{N_{t}}}} as follows.

For the FD-DFRC-BS, the channel between the transmitting and receiving MA is denoted as 𝐇SI{{\mathbf{H}}_{{\text{SI}}}}, where the channel from the nr{n_{r}}-th receiving MA element to the nt{n_{t}}-th transmitting MA element is expressed as [𝐇SI]nr,nt=ηnr,ntSIej2πdnr,ntλ{\left[{{\mathbf{H}}_{{\text{SI}}}}\right]_{{n_{r}},{n_{t}}}}=\sqrt{\eta_{{n_{r}},{n_{t}}}^{\text{SI}}}{e^{-j2\pi\frac{{{d_{{n_{r}},{n_{t}}}}}}{\lambda}}}, which represents the element in the nr{n_{r}}-th row and nt{n_{t}}-th column of matrix 𝐇SI{{\mathbf{H}}_{{\text{SI}}}}. Here, ηnr,ntSI\eta_{{n_{r}},{n_{t}}}^{\text{{SI}}} and dnr,nt{d_{{n_{r}},{n_{t}}}} denote the path loss and distance between the nr{n_{r}}-th receiving MA element and the nt{n_{t}}-th transmitting MA element.

For UU users in the uplink and the receiving MA, the channel matrix 𝐆\bf{G} is expressed as 𝐆 = [𝐠1(𝐭r,1),,𝐠Nr(𝐭r,Nr)]U×Nr{\mathbf{G}}{\text{ = }}\left[{{{\mathbf{g}}_{1}}\left({{{\mathbf{t}}_{r{\text{,1}}}}}\right){\text{,}}...{\text{,}}{{\mathbf{g}}_{{N_{r}}}}\left({{{\mathbf{t}}_{r{\text{,}}{N_{r}}}}}\right)}\right]\in{\mathbb{C}^{U\times{N_{r}}}}, where 𝐠nr(𝐭r,nr){{\mathbf{g}}_{{n_{r}}}}\left({{{\mathbf{t}}_{r{\text{,}}{n_{r}}}}}\right) represents the uplink channel between UU users and the nr{n_{r}}-th MA element. It is expressed as 𝐠nr(𝐭r,nr)=[gnr,1(𝐭r,nr),,gnr(𝐭r,nr),U]TU×1{{\mathbf{g}}_{{n_{r}}}}\left({{{\mathbf{t}}_{r{\text{,}}{n_{r}}}}}\right)={\left[{{g_{{n_{r}}}}_{,1}\left({{{\mathbf{t}}_{r{\text{,}}{n_{r}}}}}\right),...,{g_{{n_{r}}}}{{{}_{,}}_{U}}\left({{{\mathbf{t}}_{r{\text{,}}{n_{r}}}}}\right)}\right]^{T}}\in{\mathbb{C}^{U\times 1}}, where gnr,u(𝐭r,nr){g_{{n_{r}}}}_{,u}\left({{{\mathbf{t}}_{r{\text{,}}{n_{r}}}}}\right)\in\mathbb{C} denotes the channel coefficient between the nr{n_{r}}-th receiving MA element and the uu-th uplink user. To facilitate subsequent processing, we define the channel between the UU uplink users and the MM candidate discrete positions of the receiving MA as 𝐆^ = [𝐆^1,,𝐆^Nr]U×MNr{\mathbf{\hat{G}}}{\text{ = }}\left[{{{{\mathbf{\hat{G}}}}_{1}},...,{{{\mathbf{\hat{G}}}}_{{N_{r}}}}}\right]\in{\mathbb{C}^{U\times M{N_{r}}}}, where 𝐆^nr = [𝐠nr(𝐩r,1),,𝐠nr(𝐩r,M)]U×M{{\mathbf{\hat{G}}}_{{n_{r}}}}{\text{ = }}\left[{{{\mathbf{g}}_{{n_{r}}}}\left({{{\mathbf{p}}_{r,1}}}\right),...,{{\mathbf{g}}_{{n_{r}}}}\left({{{\mathbf{p}}_{r,M}}}\right)}\right]\in{\mathbb{C}^{U\times M}} represents the channel vector of the MM candidate discrete positions from UU uplink users to the nr{n_{r}}-th receiving MA element. The channel vector at the candidate discrete position 𝐩r,m{{\mathbf{p}}_{r,m}} for the UU uplink users and the nr{n_{r}}-th receiving MA element is given by 𝐠nr(𝐩r,m)=[gnr,1(𝐩r,m),,gnr(𝐩r,m),U]TU×1{{\mathbf{g}}_{{n_{r}}}}\left({{{\mathbf{p}}_{r,m}}}\right)={\left[{{g_{{n_{r}}}}_{,1}\left({{{\mathbf{p}}_{r{\text{,}}m}}}\right),...,{g_{{n_{r}}}}{{{}_{,}}_{U}}\left({{{\mathbf{p}}_{r{\text{,}}m}}}\right)}\right]^{T}}\in{\mathbb{C}^{U\times 1}}. Here, gnr,u(𝐩r,m){g_{{n_{r}}}}_{,u}\left({{{\mathbf{p}}_{r{\text{,}}m}}}\right)\in\mathbb{C} denotes the channel coefficient between the nr{n_{r}}-th receiving MA element and the uu-th uplink user, when the latter is located at the candidate discrete position 𝐩r,m{{\mathbf{p}}_{r,m}}. Suppose that lp{1,,Lp}{l_{p}}\in\left\{{1,...,{L_{p}}}\right\} represents the number of paths from the nr{n_{r}}-th receiving MA element to the uu-th uplink user, let θu,lpU\theta_{{}_{u,{l_{p}}}}^{U} and ϕu,lpU\phi_{{}_{u,{l_{p}}}}^{U} respectively represent the elevation angle and azimuth angle of the lp{l_{p}}-th path of the uu-th uplink user, then gnr,u(𝐩Nr,m){g_{{n_{r}}}}_{,u}\left({{{\mathbf{p}}_{{N_{r}}{\text{,}}m}}}\right) can be expressed as

gnr,u(𝐩Nr,m)=ej2π((xr,mxr,1)cosθu,l1Usinϕu,l1U+(yr,myr,1)sinθu,l1U)λ\displaystyle{g_{{n_{r}}}}_{,u}\!\left({{{\mathbf{p}}_{{N_{r}}{\text{,}}m}}}\right)\!=\!{e^{\frac{{j2\pi\left(\!{\left(\!{{x_{r,m}}\!-\!{x_{r,1}}}\!\right)\!\cos\theta_{u,{l_{1}}}^{U}\!\sin\phi_{u,{l_{1}}}^{U}\!+\left({{y_{r,m}}\!-\!{y_{r,1}}}\right)\sin\theta_{u,{l_{1}}}^{U}}\!\right)}}{\lambda}}} (3)
++ej2π((xr,mxr,1)cosθu,LpUsinϕu,LpU+(yr,myr,1)sinθu,LpU)λ.\displaystyle+...+{e^{\frac{{j2\pi\left({\left({{x_{r,m}}-{x_{r,1}}}\right)\cos\theta_{u,{L_{p}}}^{U}\sin\phi_{u,{L_{p}}}^{U}+\left({{y_{r,m}}-{y_{r,1}}}\right)\sin\theta_{u,{L_{p}}}^{U}}\right)}}{\lambda}}}.

Let 𝐠^u{{\mathbf{\hat{g}}}_{u}} denote the uu-th row of 𝐆^{\mathbf{\hat{G}}}, which can represent the channel loss of the uu-th uplink user and the MM candidate discrete positions of the Nr{N_{r}} receiving MA elements. The channel matrix 𝐆\bf{G} between UU uplink users and receiving MA can be represented as

𝐆 = 𝐆^𝐁r,{\mathbf{G}}{\text{ = }}{\mathbf{\hat{G}}}{{\mathbf{B}}_{r}}, (4)

where 𝐁rNrM×Nr{{\mathbf{B}}_{r}}\in{\mathbb{C}^{{N_{r}}M\times{N_{r}}}}. It can also be specifically expressed as

𝐁r = [𝐛r,1𝟎M𝟎M𝟎M𝐛r,2𝟎M𝟎M𝟎M𝐛r,Nr].{{\mathbf{B}}_{r}}{\text{ = }}\left[\begin{matrix}{{\mathbf{b}}_{r,}}_{1}&{{\mathbf{0}}_{M}}&\cdots&{{\mathbf{0}}_{M}}\hfill\\ {{\mathbf{0}}_{M}}&{{\mathbf{b}}_{r,2}}&\cdots&{{\mathbf{0}}_{M}}\hfill\\ \cdots&\cdots&\cdots&\cdots\hfill\\ {{\mathbf{0}}_{M}}&{{\mathbf{0}}_{M}}&\cdots&{{\mathbf{b}}_{r,{N_{r}}}}\hfill\\ \end{matrix}\right]. (5)

In addition, for the wireless channel of this system between DD downlink users and the transmitting MA, we have 𝐇 = [𝐡1(𝐭t,1),,𝐡Nt(𝐭t,Nt)]D×Nt,{\mathbf{H}}{\text{ = }}\left[{{{\mathbf{h}}_{1}}\left({{{\mathbf{t}}_{t{\text{,1}}}}}\right){\text{,}}...{\text{,}}{{\mathbf{h}}_{{N_{t}}}}\left({{{\mathbf{t}}_{t{\text{,}}{N_{t}}}}}\right)}\right]\in{\mathbb{C}^{D\times{N_{t}}}}, where 𝐡nt(𝐭t,nt){{\mathbf{h}}_{{n_{t}}}}\left({{{\mathbf{t}}_{{\text{t,}}{n_{t}}}}}\right) represents the channel coefficient between the nt{n_{t}}-th MA element and D downlink user. It can be expressed as 𝐡nt(𝐭t,nt)=[hnt,1(𝐭t,nt),,hnt(𝐭t,nt),D]TD×1{{\mathbf{h}}_{{n_{t}}}}\left({{{\mathbf{t}}_{t{\text{,}}{n_{t}}}}}\right)={\left[{{h_{{n_{t}}}}_{,1}\left({{{\mathbf{t}}_{t{\text{,}}{n_{t}}}}}\right),...,{h_{{n_{t}}}}{{{}_{,}}_{D}}\left({{{\mathbf{t}}_{t{\text{,}}{n_{t}}}}}\right)}\right]^{T}}\in{\mathbb{C}^{D\times 1}}, where hnt,d(𝐭t,nt){h_{{n_{t}}}}_{,d}\left({{{\mathbf{t}}_{t{\text{,}}{n_{t}}}}}\right)\in\mathbb{C} represents the channel coefficient between the nt{n_{t}}-th transmitting MA element and the dd-th downlink user. In order to facilitate subsequent processing, we define the channel between DD different users and NN candidate discrete positions of transmitting MA as 𝐇^ = [𝐇^1,,𝐇^Nt]D×NNt{\mathbf{\hat{H}}}{\text{ = }}\left[{{{{\mathbf{\hat{H}}}}_{1}},...,{{{\mathbf{\hat{H}}}}_{{N_{t}}}}}\right]\in{\mathbb{C}^{D\times N{N_{t}}}}. 𝐇^nt = [𝐡nt(𝐩t,1),,𝐡nt(𝐩t,N)]D×N{{\mathbf{\hat{H}}}_{{n_{t}}}}{\text{ = }}\left[{{{\mathbf{h}}_{{n_{t}}}}\left({{{\mathbf{p}}_{t,1}}}\right),...,{{\mathbf{h}}_{{n_{t}}}}\left({{{\mathbf{p}}_{t,N}}}\right)}\right]\in{\mathbb{C}^{D\times N}} is the channel matrix from the DD downlink users to the NN candidate discrete channels of the nt{n_{t}}-th transmitting MA element. Additionally, 𝐡nt(𝐩t,n)=[hnt,1(𝐩t,n),,hnt(𝐩t,n),D]TD×1{{\mathbf{h}}_{{n_{t}}}}\left({{{\mathbf{p}}_{t,n}}}\right)={\left[{{h_{{n_{t}}}}_{,1}\left({{{\mathbf{p}}_{t,n}}}\right),...,{h_{{n_{t}}}}{{{}_{,}}_{D}}\left({{{\mathbf{p}}_{t,n}}}\right)}\right]^{T}}\in{\mathbb{C}^{D\times 1}} represents the channel vector of DD downlink users and the nt{n_{t}}-th transmitting MA element at the candidate discrete position 𝐩t,n{{\mathbf{p}}_{t,n}}. Here, hnt,d(𝐩t,n){h_{{n_{t}}}}_{,d}\left({{{\mathbf{p}}_{t{\text{,}}n}}}\right)\in\mathbb{C} represents the channel coefficient between the nt{n_{t}}-th transmitting MA element and the dd-th downlink user. Let lp{1,,Lp}\forall{l_{p}}\in\left\{{1,...,{L_{p}}}\right\} represent the number of paths between the nt{n_{t}}-th transmitting MA element and the dd-th downlink user, where are a total of Lp{L_{p}} such paths. Denote by θd,lpD\theta_{{}_{d,{l_{p}}}}^{D}, ϕd,lpD\phi_{{}_{d,{l_{p}}}}^{D} the elevation angle and azimuth angle for the lp{l_{p}}-th path to the dd-th downlink user, respectively, then hnt,d(𝐩Nt,n){h_{{n_{t}}}}_{,d}\left({{{\mathbf{p}}_{{N_{t}}{\text{,}}n}}}\right) can be expressed as

hnt,d(𝐩Nt,n)=ej2π((xt,nxt,1)cosθd,l1Dsinϕd,l1D+(yt,nyt,1)sinθd,l1D)λ\displaystyle{h_{{n_{t}}}}_{,d}\left({{{\mathbf{p}}_{{N_{t}}{\text{,n}}}}}\right)\!=\!{e^{\frac{{j2\pi\left({\left({{x_{t,n}}-{x_{t,1}}}\right)\cos\theta_{d,{l_{1}}}^{D}\sin\phi_{d,{l_{1}}}^{D}+\left({{y_{t,n}}-{y_{t,1}}}\right)\sin\theta_{d,{l_{1}}}^{D}}\right)}}{\lambda}}} (6)
++ej2π((xt,nxt,1)cosθd,LpDsinϕd,LpD+(yt,nyt,1)sinθd,LpD)λ.\displaystyle+...+{e^{\frac{{j2\pi\left({\left({{x_{t,n}}-{x_{t,1}}}\right)\cos\theta_{d,{L_{p}}}^{D}\sin\phi_{d,{L_{p}}}^{D}+\left({{y_{t,n}}-{y_{t,1}}}\right)\sin\theta_{d,{L_{p}}}^{D}}\right)}}{\lambda}}}.

Let 𝐡^d{{\mathbf{\hat{h}}}_{d}} denote the dd-th row of 𝐇^{\mathbf{\hat{H}}}, which represents the channel gain between the dd-th downlink user and the NN candidate discrete positions of the Nt{N_{t}} transmitting MA elements. The channel matrix 𝐇\bf{H} between DD downlink users and transmitting MA can be represented as

𝐇 = 𝐇^𝐁t,{\mathbf{H}}{\text{ = }}{\mathbf{\hat{H}}}{{\mathbf{B}}_{t}}, (7)

where 𝐁tNtN×Nt{{\mathbf{B}}_{t}}\in{\mathbb{C}^{{N_{t}}N\times{N_{t}}}}, specifically represented as

𝐁t = [𝐛t,1𝟎N𝟎N𝟎N𝐛t,2𝟎N𝟎N𝟎N𝐛t,Nt].{{\mathbf{B}}_{t}}{\text{ = }}\left[\begin{matrix}{{\mathbf{b}}_{t,}}_{1}&{{\mathbf{0}}_{N}}&\cdots&{{\mathbf{0}}_{N}}\hfill\\ {{\mathbf{0}}_{N}}&{{\mathbf{b}}_{t,2}}&\cdots&{{\mathbf{0}}_{N}}\hfill\\ \cdots&\cdots&\cdots&\cdots\hfill\\ {{\mathbf{0}}_{N}}&{{\mathbf{0}}_{N}}&\cdots&{{\mathbf{b}}_{t,{N_{t}}}}\hfill\\ \end{matrix}\right]. (8)

II-B Signal Model

For the downlink transmission process of the MA-enabled full-duplex ISAC system, the FD-DFRC-BS transmits narrowband ISAC signals 𝐱Nt×1{\mathbf{x}}\in{\mathbb{C}^{{N_{t}}\times 1}} via multi-antenna beamforming, which serves for radar target sensing and downlink communication for multiple users. According to [29, 30], it can be represented as

𝐱=d=1D𝐰dsd+𝐬0,{\mathbf{x}}=\sum\limits_{d=1}^{D}{{{\mathbf{w}}_{d}}{s_{d}}+{{\mathbf{s}}_{0}}}, (9)

where 𝐰dNt×1{{\mathbf{w}}_{d}}\in{\mathbb{C}^{{N_{t}}\times 1}} represents the beamforming vector associated with the dd downlink user. sd{s_{d}} denotes the data transmitted to the dd-th user for communication, satisfying 𝔼{|sd|2}=1\mathbb{E}\left\{{{{\left|{{s_{d}}}\right|}^{2}}}\right\}=1. 𝐬0Nt×1{{\mathbf{s}}_{0}}\in{\mathbb{C}^{{N_{t}}\times 1}} represents the dedicated sensing signal sent to the radar sensing target, determined by 𝐖0𝔼{𝐬0𝐬0H}{{\mathbf{W}}_{0}}\triangleq\mathbb{E}\left\{{{\mathbf{s}}_{0}}{{\mathbf{s}}_{0}^{H}}\right\} and is mutually orthogonal to {sd}d=1D\left\{{{s_{d}}}\right\}_{d=1}^{D}. Therefore, the signal received by the dd-th user in the downlink can be expressed as

ydDL\displaystyle y_{d}^{{\text{DL}}} =(αd𝐡^d𝐁t)H𝐰dsdDesired signal+ddD(αd𝐡^d𝐁t)H𝐰dsdMultiuser interference\displaystyle=\underbrace{{{\left({\sqrt{{\alpha_{d}}}{{{\mathbf{\hat{h}}}}_{d}}{{\mathbf{B}}_{t}}}\right)}^{H}}{{\mathbf{w}}_{d}}{s_{d}}}_{{\text{Desired signal}}}+\underbrace{\sum\limits_{d^{\prime}\neq d}^{D}{{{\left({\sqrt{{\alpha_{d}}}{{{\mathbf{\hat{h}}}}_{d}}{{\mathbf{B}}_{t}}}\right)}^{H}}{{\mathbf{w}}_{d^{\prime}}}{s_{d^{\prime}}}}}_{{\text{Multiuser interference}}} (10)
+(αd𝐡^d𝐁t)H𝐬0Sensing signal+nd,d,\displaystyle+\underbrace{{{\left({\sqrt{{\alpha_{d}}}{{{\mathbf{\hat{h}}}}_{d}}{{\mathbf{B}}_{t}}}\right)}^{H}}{{\mathbf{s}}_{0}}}_{{\text{Sensing signal}}}+{n_{d}},\forall d,

where αd{\alpha_{d}} is the channel fading factor from the FD-DFRC-BS to the dd-th downlink user, and nd{n_{d}} represents the additive Gaussian white noise (AWGN) with a variance of σd2\sigma_{d}^{2} introduced at the receiving end of the dd-th downlink user.

Then, considering the uplink transmission process of the system, when FD-DFRC-BS communicates and senses in the downlink, it will receive the data sent by the uplink users as well as the sensing echo signal of radar at the same time. Suppose that the uu-th uplink user sends data du{d_{u}}\in\mathbb{C}. Supposed to be detected sensing target is located at θ0,ϕ0{\theta_{0}},{\phi_{0}}, then the reflection of target is β0𝐚r(θ0,ϕ0)𝐚tH(θ0,ϕ0)𝐱{\beta_{0}}{{\mathbf{a}}_{r}}\left({{\theta_{0}},{\phi_{0}}}\right){\mathbf{a}}_{t}^{H}\left({{\theta_{0}},{\phi_{0}}}\right){\mathbf{x}}, where β0{\beta_{0}}\in\mathbb{C} represents the gain of the target sensing channel, mainly influenced by path loss and radar. Using parameter estimation scheme [31, 32], we can obtain parameters β0{\beta_{0}}, θ0{\theta_{0}}, ϕ0{\phi_{0}} at FD-DFRC-BS, so the received signal at FD-DFRC-BS can be expressed as

𝐲BS\displaystyle{{\mathbf{y}}^{{\text{BS}}}} =u=1Uαu𝐠^u𝐁rduCommunication signal+β0𝐀(θ0,ϕ0)𝐱Target reflection\displaystyle=\underbrace{\sum\limits_{u=1}^{U}{\sqrt{{\alpha_{u}}}{{{\mathbf{\hat{g}}}}_{u}}{{\mathbf{B}}_{r}}}{d_{u}}}_{{\text{Communication signal}}}+\underbrace{{\beta_{0}}{\mathbf{A}}\left({{\theta_{0}},{\phi_{0}}}\right){\mathbf{x}}}_{{\text{Target reflection}}} (11)
+k=1Kβk𝐀(θk,ϕk)𝐱Non-target reflection+𝐇SI𝐱SI+𝐧,\displaystyle+\underbrace{\sum\limits_{k=1}^{K}{{\beta_{k}}}{\mathbf{{A}}}\left({{\theta_{k}},{\phi_{k}}}\right){\mathbf{x}}}_{{\text{Non-target reflection}}}+\underbrace{{{\mathbf{H}}_{{\text{SI}}}}{\mathbf{x}}}_{{\text{SI}}}+{\mathbf{n}},

where 𝐀(θ,ϕ)=𝐚r(θ,ϕ)𝐚tH(θ,ϕ){\mathbf{A}}\left({\theta,\phi}\right)={{\mathbf{a}}_{r}}\left({\theta,\phi}\right){\mathbf{a}}_{t}^{H}\left({\theta,\phi}\right), αu{\alpha_{u}} is the channel attenuation of the uu-th uplink user to FD-DFRC-BS, 𝐧Nr×1{\mathbf{n}}\in{\mathbb{C}^{{N_{r}}\times 1}} represents the AWGN with variance σr2𝐈Nr\sigma_{r}^{2}{{\bf{I}}_{{N_{r}}}}. βk{\beta_{k}} is the amplitude of the interference signal introduced by the kk-th non-target sensing radar.

SINRr\displaystyle{\text{SIN}}{{\text{R}}^{r}} =𝔼{|β0𝐯H𝐀(θ0,ϕ0)𝐱|2}u=1U𝔼{|𝐯Hαu𝐠^u𝐁rdu|2}+k=1K𝔼{|𝐯H(βk𝐀(θk,ϕk)+𝐇SI)𝐱|2}+𝔼{|𝐯H𝐧|2}\displaystyle=\frac{{\mathbb{E}\left\{{|{\beta_{0}}{{\mathbf{v}}^{H}}{\mathbf{A}}\left({{\theta_{0}},{\phi_{0}}}\right){\mathbf{x}}{|^{2}}}\right\}}}{{\sum\limits_{u=1}^{U}{\mathbb{E}\left\{{{{\left|{{{\mathbf{v}}^{H}}\sqrt{{\alpha_{u}}}{{{\mathbf{\hat{g}}}}_{u}}{{\mathbf{B}}_{r}}{d_{u}}}\right|}^{2}}}\right\}+\sum\limits_{k=1}^{K}{\mathbb{E}\left\{{{{\left|{{{\mathbf{v}}^{H}}({\beta_{k}}{\mathbf{A}}({\theta_{k}},{\phi_{k}})+{{\mathbf{H}}_{{\text{SI}}}}){\mathbf{x}}}\right|}^{2}}}\right\}+\mathbb{E}\left\{{{{\left|{{{\mathbf{v}}^{H}}{\mathbf{n}}}\right|}^{2}}}\right\}}}}} (12)
=|β0|2𝐯H𝐀(θ0,ϕ0)(d=1D𝐰d𝐰dH+𝐖0)𝐀(θ0,ϕ0)H𝐯𝐯H(u=1U|αu|2pu𝐠^u𝐁r(𝐠^u𝐁r)H+𝐐(d=1D𝐰d𝐰dH+𝐖0)𝐐H+σr2𝐈Nr)𝐯,\displaystyle=\frac{{{{\left|{{\beta_{0}}}\right|}^{2}}{{\bf{v}}^{H}}{\bf{A}}\left({{\theta_{0}},{\phi_{0}}}\right)\left({\sum\limits_{d=1}^{D}{{{\bf{w}}_{d}}{\bf{w}}_{d}^{H}+{{\bf{W}}_{0}}}}\right){\bf{A}}{{\left({{\theta_{0}},{\phi_{0}}}\right)}^{H}}{\bf{v}}}}{{{{\bf{v}}^{H}}\left({\sum\limits_{u=1}^{U}{{{\left|{\sqrt{{\alpha_{u}}}}\right|}^{2}}{p_{u}}{{{\bf{\hat{g}}}}_{u}}{{\bf{B}}_{r}}{{\left({{{{\bf{\hat{g}}}}_{u}}{{\bf{B}}_{r}}}\right)}^{H}}}+{\bf{Q}}\left({\sum\limits_{d=1}^{D}{{{\bf{w}}_{d}}{\bf{w}}_{d}^{H}+{{\bf{W}}_{0}}}}\right){{\bf{Q}}^{H}}+\sigma_{r}^{2}{{\bf{I}}_{{N_{r}}}}}\right){\bf{v}}}},
SINRuU=puαu𝐫uH𝐠^u𝐁r(𝐠^u𝐁r)H𝐫u𝐫uH(uuUpuαu𝐠^u𝐁r(𝐠^u𝐁r)H+𝐂(d=1D𝐰d𝐰dH+𝐖0)𝐂H+σr2𝐈Nr)𝐫u,u,{\text{SINR}}_{u}^{U}=\frac{{{p_{u}}{\alpha_{u}}{\bf{r}}_{u}^{H}{{{\bf{\hat{g}}}}_{u}}{{\bf{B}}_{r}}{{\left({{{{\bf{\hat{g}}}}_{u}}{{\bf{B}}_{r}}}\right)}^{H}}{{\bf{r}}_{u}}}}{{{\bf{r}}_{u}^{H}\left({\sum\limits_{u^{\prime}\neq u}^{U}{{p_{u^{\prime}}}{\alpha_{u^{\prime}}}{{{\bf{\hat{g}}}}_{u^{\prime}}}{{\bf{B}}_{r}}{{\left({{{{\bf{\hat{g}}}}_{u^{\prime}}}{{\bf{B}}_{r}}}\right)}^{H}}+{\bf{C}}\left({\sum\limits_{d=1}^{D}{{{\bf{w}}_{d}}{\bf{w}}_{d}^{H}+{{\bf{W}}_{0}}}}\right){{\bf{C}}^{H}}+\sigma_{r}^{2}{{\bf{I}}_{{N_{r}}}}}}\right){{\bf{r}}_{u}}}},\forall u, (13)
SINRdD=|(αd𝐡^d𝐁t)H𝐰d|2d=1,ddD|(αd𝐡^d𝐁t)H𝐰d|2+(αd𝐡^d𝐁t)H𝐖0αd𝐡^d𝐁t+σd2,d.{\text{SINR}}_{d}^{D}=\frac{{{{\left|{{{\left({\sqrt{{\alpha_{d}}}{{{\bf{\hat{h}}}}_{d}}{{\bf{B}}_{t}}}\right)}^{H}}{{\bf{w}}_{d}}}\right|}^{2}}}}{{\sum\limits_{d^{\prime}=1,d^{\prime}\neq d}^{D}{{{\left|{{{\left({\sqrt{{\alpha_{d}}}{{{\bf{\hat{h}}}}_{d}}{{\bf{B}}_{t}}}\right)}^{H}}{{\bf{w}}_{d^{\prime}}}}\right|}^{2}}+{{\left({\sqrt{{\alpha_{d}}}{{{\bf{\hat{h}}}}_{d}}{{\bf{B}}_{t}}}\right)}^{H}}{{\bf{W}}_{0}}\sqrt{{\alpha_{d}}}{{{\bf{\hat{h}}}}_{d}}{{\bf{B}}_{t}}+\sigma_{d}^{2}}}},\forall d. (14)

II-C Communication and Radar Sensing SINR

Signal-to-interference-plus-noise ratio (SINR) can be used as a metric to measure the performance of communication and sensing systems, so we use communication SINR and sensing SINR as the metric for the communication and sensing capabilities of the system. In this paper, we assume that 𝐯Nr×1{\mathbf{v}}\in{\mathbb{C}^{{N_{r}}\times 1}} is the receiving beamforming vector at FD-DFRC-BS to capture the desired reflection sensing signal from the target. For radar sensing target, its sensing SINR can be expressed as Eq. (12), where we define 𝐐=k=1Kβk𝐀(θk,ϕk)+𝐇SI{\bf{Q}}=\sum\nolimits_{k=1}^{K}{{\beta_{k}}{\bf{A}}\left({{\theta_{k}},{\phi_{k}}}\right)}+{{\bf{H}}_{{\rm{SI}}}}. Similarly, we assume {𝐫u}u=1UNr×1\left\{{\bf{r}}_{u}\right\}_{{u=}1}^{U}\in{{\mathbb{C}}^{{N_{r}}\times 1}} is the receiving beamforming vector at FD-DFRC-BS to obtain uplink transmitted signal. For the uplink, the SINR of the communication data sent by the uu-th user can be expressed as Eq. (13), where 𝐂=k=0Kβk𝐀(θk,ϕk)+𝐇SI{\bf{C}}=\sum\nolimits_{k=0}^{K}{{\beta_{k}}{\bf{A}}\left({{\theta_{k}},{\phi_{k}}}\right)}+{{\bf{H}}_{{\rm{SI}}}} represents the interference channel of the downlink path. In addition, for downlink communication, the SINR received by the dd-th user can be expressed as Eq. (14). For downlink communication, it is assumed that users cannot eliminate the interference from dedicated radar sensing signal 𝐬0{{\bf{s}}_{0}}. In this paper, through the optimization of the beamforming vectors, it can suppress the non-target radar sensing interference and multi-user interference in Eq. (12), the radar snesing interference and multi-user interference in Eq. (13) and Eq. (14).

II-D Problem Formulation

Since MA elements have a certain volume, and different MA elements cannot be in the same candidate discrete position, this paper assumes thatthe distance from the center of one MA element to the center of another must exceed the specified minimum distance Dmin{D_{\min}}. Define a matrix 𝐃rM×M{{\bf{D}}_{r}}\in{{\mathbb{C}}^{M\times M}}, where the element at row ii and column jj represents the distance between the receiving MA’s ii-th candidate discrete position and its jj-th candidate discrete position. Hence, the distance between any two receiving MA elements can be articulated as 𝐛r,nrT𝐃r𝐛r,nr{\bf{b}}_{r,{n_{r}}}^{T}{{\bf{D}}_{r}}{{\bf{b}}_{r,{n_{r}}^{\prime}}}, nrnr{n_{r}}\!\neq\!{n_{r}}^{\prime}, nr,nr{1,,Nr}\forall{n_{r}},{n_{r}}^{\prime}\in\left\{{1,...,{N_{r}}}\right\}. According to the definition, let 𝐃tN×N{{\bf{D}}_{t}}\in{{\mathbb{C}}^{N\times N}} be defined such that its element in the ii-th row and jj-th column represents the distance between the ii-th transmitting MA element’s position and the jj-th receiving MA element’s position. Therefore, the distance between any pair of transmitting MA elements can be expressed as 𝐛t,ntT𝐃t𝐛t,nt{\bf{b}}_{t,{n_{t}}}^{T}{{\bf{D}}_{t}}{{\bf{b}}_{t,{n_{t}}^{\prime}}}, ntnt{n_{t}}\!\neq\!{n_{t}}^{\prime}, nt,nt{1,,Nt}\forall{n_{t}},{n_{t}}^{\prime}\in\left\{{1,...,{N_{t}}}\right\}. For the downlink, the transmit power of FD-DFRC-BS is d=1D𝐰d2+Tr(𝐖0)\sum\nolimits_{d=1}^{D}{||{{\bf{w}}_{d}}|{|^{2}}}+{\rm{Tr}}({{\bf{W}}_{0}}). In addition, for the uplink, the transmit power of user is represented as pu = 𝔼{|du|2}{p_{u}}{\text{ = }}{\mathbb{E}}\left\{{{{\left|{{d_{u}}}\right|}^{2}}}\right\}, u\forall u. Therefore, the total transmit power of the system can be expressed as d=1D𝐰d2+Tr(𝐖0)+u=1Upu\sum\nolimits_{d=1}^{D}{||{{\bf{w}}_{d}}|{|^{2}}}+{\rm{Tr}}({{\bf{W}}_{0}})+\sum\nolimits_{u=1}^{U}{{p_{u}}}. In this paper, while ensuring the minimum SINR requirements for uplink communication, downlink communication, and radar sensing, we jointly optimize 𝐁r{{\bf{B}}_{r}}, 𝐁t{{\bf{B}}_{t}}, {𝐰d}d=1D\left\{{{{\bf{w}}_{d}}}\right\}_{d=1}^{D}, 𝐖0{{\bf{W}}_{0}}, {𝐫u}u=1U\left\{{{{\bf{r}}_{u}}}\right\}_{u=1}^{U}, 𝐯{\bf{v}} and {pu}u=1U\left\{{{p_{u}}}\right\}_{u=1}^{U} to minimize the total transmit power consumption of the system. The specific optimization problem can be formulated as follows

(P1) min𝐁t,𝐁r,{𝐰d}d=1D,𝐯,𝐖0,{pu}u=1U,{𝐫u}u=1Ud=1D𝐰d2+Tr(𝐖0)+u=1Upu,\displaystyle\mathop{\min}\limits_{\scriptstyle{{\bf{B}}_{t}},{{\bf{B}}_{r}},\left\{{{{\bf{w}}_{d}}}\right\}_{d=1}^{D},{\bf{v}},\hfill\atop\scriptstyle{{\bf{W}}_{0}},\left\{{{p_{u}}}\right\}_{u=1}^{U},\left\{{{{\bf{r}}_{u}}}\right\}_{u=1}^{U}\hfill}\sum\limits_{d=1}^{D}{||{{\bf{w}}_{d}}|{|^{2}}+{\rm{Tr}}\left({{{\bf{W}}_{0}}}\right)+\sum\limits_{u=1}^{U}{{p_{u}}}},
s.t.SINRrγr,\displaystyle~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}{\textrm{s.t.}}\qquad{\text{SIN}}{{\text{R}}^{r}}\geq{\gamma^{r}}, (15a)
SINRuUγuU,u\displaystyle~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}{\text{SINR}}_{u}^{U}\geq\gamma_{u}^{U},\forall u (15b)
SINRdDγdD,d\displaystyle~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}{\text{SINR}}_{d}^{D}\geq\gamma_{d}^{D},\forall d (15c)
br,nr[m]{0,1},\displaystyle~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}{b_{r,{n_{r}}}}\left[m\right]\!\in\!\left\{{0,1}\right\}, (15d)
bt,nt[n]{0,1},\displaystyle~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}{b_{t,{n_{t}}}}\left[n\right]\!\in\!\left\{{0,1}\right\}, (15e)
m=1Mbr,nr[m]=1,\displaystyle~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}\sum\limits_{m=1}^{M}{{b_{r,{n_{r}}}}\left[m\right]}=1, (15f)
n=1Nbt,nt[n]=1,\displaystyle~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}\sum\limits_{n=1}^{N}{{b_{t,{n_{t}}}}\left[n\right]}=1, (15g)
𝐛r,nrT𝐃r𝐛r,nrDmin,\displaystyle~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}{\bf{b}}_{r,{n_{r}}}^{T}{{\bf{D}}_{r}}{{\bf{b}}_{r,{n_{r}}^{\prime}}}\!\geq\!{D_{\min}}, (15h)
𝐛t,ntT𝐃t𝐛t,ntDmin,ntnt,\displaystyle~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}{\bf{b}}_{t,{n_{t}}}^{T}{{\bf{D}}_{t}}{{\bf{b}}_{t,{n_{t}}^{\prime}}}\!\geq\!{D_{\min}},{n_{t}}\!\neq\!{n_{t}}^{\prime}, (15i)

where constraints (15a)-(15c) are used to ensure the quality-of-service (QoS) for radar sensing, uplink communication and downlink communication. γr{\gamma^{r}}, γuU\gamma_{u}^{U} and γdD\gamma_{d}^{D} are constant thresholds for the minimum SINR requirement for sensing, the minimum SINR requirement for the uplink transmitting user uu and the minimum SINR requirement for the downlink transmitting user dd. Constraints (15d) and (15e) restrict 𝐁r{{\bf{B}}_{r}} and 𝐁t{{\bf{B}}_{t}} to be binary matrices. Constraints (15f) and (15g) ensure that each MA element is only in one candidate discrete position. Constraints (15h) and (15i) ensure that the inter-center separation for any two MA elements is in excess of the minimum allowable distance Dmin{D_{\min}}. Note that any two different MA elements cannot be in the same candidate discrete position. Due to SINR constraints and the existence of binary variables, it is a mixed-integer non-convex optimization problem, which is hard to obtain the optimal solutions. Next, we will propose a joint optimization framework based on BPSO to solve it.

III Joint Discrete Antenna Positioning and Beamforming Optimization Algorithm

In this section, we propose a joint optimization algorithm to address the problem (P1). We first establish a framework based on the BPSO algorithm in subsection A. Within this framework, we update {𝐰d}d=1D\left\{{{{\bf{w}}_{d}}}\right\}_{d=1}^{D}, 𝐖0{{\bf{W}}_{0}} and {pu}u=1U\left\{{{p_{u}}}\right\}_{u=1}^{U} according to the discrete candidate positions of MA by solving the fitness function. Since {𝐫u}u=1U\left\{{{{\bf{r}}_{u}}}\right\}_{u=1}^{U} and 𝐯\bf{v} do not directly affect the value of the fitness function, we transform and rewrite {𝐫u}u=1U\left\{{{{\bf{r}}_{u}}}\right\}_{u=1}^{U} and 𝐯\bf{v} with {𝐰d}d=1D\left\{{{{\bf{w}}_{d}}}\right\}_{d=1}^{D}, 𝐖0{{\bf{W}}_{0}} and {pu}u=1U\left\{{{p_{u}}}\right\}_{u=1}^{U} in subsection B. Since the fitness function is non-convex, we use DC programming and SCA to transform the problem into a convex problem and solve in subsection C. Then, based on the value of fitness function, we search for the current local and global optimal solutions for the MA candidate discrete positions to update the MA candidate discrete positions. In turn, we solve for the corresponding {𝐰d}d=1D\left\{{{{\bf{w}}_{d}}}\right\}_{d=1}^{D}, 𝐖0{{\bf{W}}_{0}} and {pu}u=1U\left\{{{p_{u}}}\right\}_{u=1}^{U} based on the new MA candidate discrete positions. When the iteration is complete, we can obtain the MA candidate discrete positions and their corresponding {𝐰d}d=1D\left\{{{{\bf{w}}_{d}}}\right\}_{d=1}^{D}, 𝐖0{{\bf{W}}_{0}} and {pu}u=1U\left\{{{p_{u}}}\right\}_{u=1}^{U}. At last, the value of {𝐫u}u=1U\left\{{{{\bf{r}}_{u}}}\right\}_{u=1}^{U} and 𝐯\bf{v} can be determined based on the value of {𝐰d}d=1D\left\{{{{\bf{w}}_{d}}}\right\}_{d=1}^{D}, 𝐖0{{\bf{W}}_{0}} and {pu}u=1U\left\{{{p_{u}}}\right\}_{u=1}^{U}.

III-A BPSO Algorithm Framework

Traditional alternating position optimization methods involve fixing the positions of all other MA elements and only moving one to alternate. However, since the candidate positions of MA elements are discrete, there is a possibility of converging to an undesired suboptimal solution. Moreover, as the solution space grows, the computational load increases exponentially. The BPSO algorithm reduces the computational load through the collaborative efforts of discrete particles in a swarm, allowing for a faster approach to the suboptimal solution. Taking all factors into account, the BPSO algorithm framework is applied to solve the problem (P1) formulated in this paper. Specifically, taking the receiving MA as an example, BPSO algorithm workflow can be expressed as follows.

Initialization Position and Speed: In order to facilitate subsequent calculations, we first assume 𝐛~r,i=[𝐛r,1T,𝐛r,2T,,𝐛r,NrT]TMNr×1{{\bf{\tilde{b}}}_{r,i}}={\left[{{\bf{b}}_{{}_{r,1}}^{T},{\bf{b}}_{{}_{r,2}}^{T},\ldots,{\bf{b}}_{{}_{r,{N_{r}}}}^{T}}\right]^{T}}\in{{\mathbb{C}}^{M{N_{r}}\times 1}}. The BPSO algorithm initializes the positions of II particles to (0)={𝐛~r,1(0),𝐛~r,2(0),,𝐛~r,I(0)}{{\cal B}^{\left(0\right)}}=\left\{{{\bf{\tilde{b}}}_{r,1}^{\left(0\right)},{\bf{\tilde{b}}}_{r,2}^{\left(0\right)},\ldots,{\bf{\tilde{b}}}_{r,I}^{\left(0\right)}}\right\}, where each particle represents a possible distribution of the position of the Nr{N_{r}} receiving MA elements in MM candidate discrete positions. The velocity of II particles is initialized as 𝒱(0)={𝐯1(0),𝐯2(0),,𝐯I(0)}{{\cal V}^{\left(0\right)}}=\left\{{{\bf{v}}_{1}^{\left(0\right)},{\bf{v}}_{2}^{\left(0\right)},\ldots,{\bf{v}}_{I}^{\left(0\right)}}\right\}, where 𝐯i(0)=[𝐯r,1T,𝐯r,2T,,𝐯r,NrT]TMNr×1{\bf{v}}_{i}^{\left(0\right)}={\left[{{\bf{v}}_{{}_{r,1}}^{T},{\bf{v}}_{{}_{r,2}}^{T},\ldots,{\bf{v}}_{{}_{r,{N_{r}}}}^{T}}\right]^{T}}\in{{\mathbb{C}}^{M{N_{r}}\times 1}} indicates that the speed at which the nr{n_{r}}-th receiving MA element moves in the MM candidate discrete positions, and vmin𝐯r,nrT(m)vmax{v_{\min}}\leqslant{\bf{v}}_{{}_{r,{n_{r}}}}^{T}\left(m\right)\leqslant{v_{\max}}.

Local Optimal Position and Global Optimal Position: Let 𝐛~r,i{\bf{\tilde{b}}}_{r,i}^{*} be the local optimal position of the ii-th particle. For the ii-th particle, this position is the optimal solution to the fitness function that it has encountered in its history. Let 𝐛~r{\bf{\tilde{b}}}_{r}^{*} be the global optimal position, which is the optimal solution to the fitness function found among the local optimal positions of all II particles in the swarm.

Velocity Update Criterion: In the jj-th iteration, the velocity update of each particle is given by

𝐯i(j)(d)\displaystyle{\bf{v}}_{i}^{\left(j\right)}\left(d\right) =ω𝐯i(j1)(d)+c1e1(𝐛~r,i(d)𝐛~r,i(j1)(d))\displaystyle=\omega{\bf{v}}_{i}^{\left({j-1}\right)}\left(d\right)+{c_{1}}{e_{1}}\left({{\bf{\tilde{b}}}_{r,i}^{*}\left(d\right)-{\bf{\tilde{b}}}_{r,i}^{\left({j-1}\right)}\left(d\right)}\right) (16)
+c2e2(𝐛~r(d)𝐛~r,i(j1)(d)),\displaystyle+{c_{2}}{e_{2}}\left({{\bf{\tilde{b}}}_{r}^{*}\left(d\right)-{\bf{\tilde{b}}}_{r,i}^{\left({j-1}\right)}\left(d\right)}\right),

where jj is the number of iterations and 0jJ0\leq\textit{j}\leq\textit{J}. ω\omega is the inertia weight, which can be expressed as

ω=(ωmaxωmin)(Jj)/J+ωmin.\omega=\left({{\omega_{\max}}-{\omega_{\min}}}\right)\left({J-j}\right)/J+{\omega_{\min}}. (17)

with ωmax=1.2{\omega_{\max}}=1.2, ωmin=0.4{\omega_{\min}}=0.4 generally taken. c1{c_{1}} and c2{c_{2}} are local and global learning factors that push each particle towards the local and global optimal positions, respectively. e1{e_{1}} and e2{e_{2}} are uniformly distributed random numbers in the range [0,1][0,1]. They are used to increase randomness and reduce the possibility of converging to an unexpected local optimum.

Position Update Criterion: Given the method of probability mapping, we use the sigmoid function to map speed to [0,1][0,1] as the probability. This probability is the likelihood that the particle will take a value of 1 in the next step and can be expressed as

s(𝐯i(j)(d))=11+e(𝐯i(j)(d)).s\left({{\bf{v}}_{i}^{\left(j\right)}\left(d\right)}\right)=\frac{1}{{1+{e^{\left({-{\bf{v}}_{i}^{\left(j\right)}\left(d\right)}\right)}}}}. (18)

Absolute Probability of Position Change: The position of the receiving MA element is updated according to the probability of the candidate discrete position. Since different MA element positions cannot be at the same candidate discrete position, the position update can be expressed as

𝐛~r,i(j)(d)={1,s(𝐯i(j)(d))s(𝐯i(j)(k)),k[(dd%Nr),(d+Nrd%Nr)],0,others.\displaystyle{\bf{\tilde{b}}}_{r,i}^{\left(j\right)}\left(d\right)=\left\{\begin{array}[]{l}1,s\left({{\bf{v}}_{i}^{\left(j\right)}\left(d\right)}\right)\geq s\left({{\bf{v}}_{i}^{\left(j\right)}\left(k\right)}\right),\\ ~{}~{}~{}~{}~{}~{}~{}~{}k\subseteq\left[{\left({d-d\%{N_{r}}}\right),\left({d+{N_{r}}-d\%{N_{r}}}\right)}\right],\\ 0,{\rm{others}}{\rm{.}}\end{array}\right. (19)

Fitness Function: During each iteration, the local and global optimal positions are updated based on the fitness function value. Assuming the positions meet the constraint conditions, but considering constraints (15f) and (15h). A penalty term is added in the problem (P1), which can be represented as the problem (P2) as follows

(P2) min{𝐰d}d=1D,𝐯,𝐖0,{pu}u=1U,{𝐫u}u=1Ud=1D𝐰d2+Tr(𝐖0)+u=1Upu+κF(𝐭~i(j)),\displaystyle\mathop{\min}\limits_{\scriptstyle\left\{{{{\bf{w}}_{d}}}\right\}_{d=1}^{D},{\bf{v}},{{\bf{W}}_{0}},\hfill\atop\scriptstyle\left\{{{p_{u}}}\right\}_{u=1}^{U},\left\{{{{\bf{r}}_{u}}}\right\}_{u=1}^{U}\hfill}\!\!\sum\limits_{d=1}^{D}||{{\bf{w}}_{d}}|{|^{2}}\!+\!{\text{Tr}}\left({{{\bf{W}}_{0}}}\right)\!+\!\!\sum\limits_{u=1}^{U}{{p_{u}}}\!\!+\!\kappa F\!\left({{\bf{\tilde{t}}}_{i}^{\left(j\right)}}\right)\!, (20)
s.t.(15a)-(15c),\displaystyle~{}~{}~{}~{}~{}~{}~{}~{}{\textrm{s.t.}}\qquad\text{(15a)-(15c)},

where F(𝐭~i(j))F\left({{\bf{\tilde{t}}}_{i}^{\left(j\right)}}\right) is a function that returns the number of MA elements that violate the minimum MA distance constraint at position 𝐭~{\bf{\tilde{t}}}, 𝐭~i(j)=[𝐭r,1T,,𝐭r,NrT]2Nr×1,{\bf{\tilde{t}}}_{i}^{\left(j\right)}=\left[{{\bf{t}}_{{}_{r,1}}^{\text{T}},\ldots,{\bf{t}}_{{}_{r,{N_{r}}}}^{\text{T}}}\right]\in{{\mathbb{C}}^{2{N_{r}}\times 1}}, and κ\kappa is a very large number. Because of the complex SINR constraints, it remains a non-convex optimization problem. When two different MA elements are in the same candidate discrete position, their push particles satisfy constraints (15f) and (15h). Through iteration, we can generally obtain a suboptimal solution. Generally, as the number of iterations increases, it becomes easier to find a suboptimal solution that is closer to the optimal solution. However, the computational load also increases. How to balance this trade-off is also a potential direction for the future research.

III-B Transform of {𝐫u}u=1U\left\{{{{\bf{r}}_{u}}}\right\}_{u=1}^{U} and 𝐯\bf{v} in (P2)

In this paper, objective function of the problem (P2) is independent of {𝐫u}u=1U\left\{{{{\bf{r}}_{u}}}\right\}_{u=1}^{U} and 𝐯\bf{v}. When 𝐁r{{\bf{B}}_{r}}, 𝐁t{{\bf{B}}_{t}}, {𝐰d}d=1D\left\{{{{\bf{w}}_{d}}}\right\}_{d=1}^{D}, 𝐖0{{\bf{W}}_{0}} and {pu}u=1U\left\{{{p_{u}}}\right\}_{u=1}^{U} are given, {𝐫u}u=1U\left\{{{{\bf{r}}_{u}}}\right\}_{u=1}^{U} and 𝐯\bf{v} only affect SINRuU{\text{SINR}}_{u}^{U} and SINRr{\text{SIN}}{{\text{R}}^{r}} respectively. In order to better realize (P2), the constraints (15a) and (15b) are transformed into

max{𝐫u}u=1U SINRuU,u,\mathop{{\text{max}}}\limits_{\left\{{{{\bf{r}}_{u}}}\right\}_{u=1}^{U}}{\text{ SINR}}_{u}^{U},\forall u, (21)
max𝐯 SINRr,\mathop{{\text{max}}}\limits_{\bf{v}}{\text{ SIN}}{{\text{R}}^{r}}, (22)

to solve for {𝐫u}u=1U\left\{{{{\bf{r}}_{u}}}\right\}_{u=1}^{U} and 𝐯\bf{v}. In order to facilitate expression, we define

𝛀u\displaystyle{{\bf{\Omega}}_{u}} =uuUpuαu𝐠^u𝐁r(𝐠^u𝐁r)H\displaystyle=\sum\limits_{u^{\prime}\neq u}^{U}{p_{u^{\prime}}}{\alpha_{u^{\prime}}}{{{\bf{\hat{g}}}}_{u^{\prime}}}{{\bf{B}}_{r}}{{\left({{{{\bf{\hat{g}}}}_{u^{\prime}}}{{\bf{B}}_{r}}}\right)}^{H}} (23)
+𝐂(d=1D𝐰d𝐰dH+𝐖0)𝐂H+σr2𝐈Nr,u,\displaystyle+{\bf{C}}\left({\sum\limits_{d=1}^{D}{{{\bf{w}}_{d}}{\bf{w}}_{d}^{H}+{{\bf{W}}_{0}}}}\right){{\bf{C}}^{H}}+\sigma_{r}^{2}{{\bf{I}}_{{N_{r}}}},\forall u,
𝚯\displaystyle{\bf{\Theta}} =u=1U|αu|2pu𝐠^u𝐁r(𝐠^u𝐁r)H\displaystyle=\sum\limits_{u=1}^{U}{{{\left|{\sqrt{{\alpha_{u}}}}\right|}^{2}}{p_{u}}{{{\bf{\hat{g}}}}_{u}}{{\bf{B}}_{r}}{{\left({{{{\bf{\hat{g}}}}_{u}}{{\bf{B}}_{r}}}\right)}^{H}}} (24)
+𝐐(d=1D𝐰d𝐰dH+𝐖0)𝐐H+σr2𝐈Nr.\displaystyle+{\bf{Q}}\left({\sum\limits_{d=1}^{D}{{{\bf{w}}_{d}}{\bf{w}}_{d}^{H}+{{\bf{W}}_{0}}}}\right){{\bf{Q}}^{H}}+\sigma_{r}^{2}{{\bf{I}}_{{N_{r}}}}.

The solutions to optimization problems (21) and (22) are expressed as

𝐫u=𝛀u1αu𝐠^u𝐁r,u,{\bf{r}}_{u}^{*}={{\bf{\Omega}}_{u}}^{-1}\sqrt{{\alpha_{u}}}{{\bf{\hat{g}}}_{u}}{{\bf{B}}_{r}},\forall u, (25)
𝐯=𝚯1𝐚r(θ0,ϕ0).{{\bf{v}}^{*}}={{\bf{\Theta}}^{-1}}{{\bf{a}}_{r}}\left({{\theta_{0}},{\phi_{0}}}\right). (26)

III-C Solution of {𝐰d}d=1D\left\{{{{\bf{w}}_{d}}}\right\}_{d=1}^{D},𝐖0{{\bf{W}}_{0}} and {pu}u=1U\left\{{{p_{u}}}\right\}_{u=1}^{U} in (P2)

By introducing the {𝐫u}u=1U\left\{{{{\bf{r}}_{u}}}\right\}_{u=1}^{U}, 𝐯{\bf{v}}, 𝐁r{{\bf{B}}_{r}} and 𝐁t{{\bf{B}}_{t}} into the corresponding constraints, the problem is transformed into minimizing the total transmit power of the system by optimizing variables {𝐰d}d=1D\left\{{{{\bf{w}}_{d}}}\right\}_{d=1}^{D},𝐖0{{\bf{W}}_{0}} and {pu}u=1U\left\{{{p_{u}}}\right\}_{u=1}^{U}. We can rewrite the problem (P2) into the problem (P3) as follows

(P3) min{𝐰d}d=1D,𝐖0,{pu}u=1Ud=1D𝐰d2+Tr(𝐖0)+u=1Upu+κF(𝐭~i(j)),\displaystyle\mathop{\min}\limits_{\left\{{{{\bf{w}}_{d}}}\right\}_{d=1}^{D},\hfill\atop{{\bf{W}}_{0}},\left\{{{p_{u}}}\right\}_{u=1}^{U}}\sum\limits_{d=1}^{D}{||{{\bf{w}}_{d}}|{|^{2}}\!+\!{\text{Tr}}\left({{{\bf{W}}_{0}}}\right)\!+\!\sum\limits_{u=1}^{U}{{p_{u}}}}\!+\!\kappa F\left({{\bf{\tilde{t}}}_{i}^{\left(j\right)}}\right), (27)
s.t.(15a)-(15c).\displaystyle~{}~{}~{}~{}~{}{\textrm{s.t.}}\qquad\text{(15a)-(15c)}.

Due to the non-convex constraints, the problem (P3) is still a non-convex optimization problem. To solve the problem, we introduce a set of auxiliary variables, 𝐖d=𝐰d𝐰dH{{\bf{W}}_{d}}={{\bf{w}}_{d}}{\bf{w}}_{d}^{H}, 𝐖d0{{\bf{W}}_{d}}\succeq 0, rank(𝐖d) = 1{\text{rank}}\left({{{\bf{W}}_{d}}}\right){\text{ = }}1, d\forall d, and further assume that 𝐖~=d=0D𝐖d{\bf{\tilde{W}}}=\sum\nolimits_{d=0}^{D}{{{\bf{W}}_{d}}},𝐖~0{\bf{\tilde{W}}}\succeq 0, rank(𝐖~)=1{\text{rank}}\left({{\bf{\tilde{W}}}}\right)=1. Next, by substituting 𝐖~{\bf{\tilde{W}}}, we can rewrite Eq. (23) and Eq. (24) as

𝚯=u=1U|αu|2pu𝐠^u𝐁r(𝐠^u𝐁r)H+𝐐𝐖~𝐐H+σr2𝐈Nr,{\bf{\Theta}}=\sum\limits_{u=1}^{U}{{{\left|{\sqrt{{\alpha_{u}}}}\right|}^{2}}{p_{u}}{{{\bf{\hat{g}}}}_{u}}{{\bf{B}}_{r}}{{\left({{{{\bf{\hat{g}}}}_{u}}{{\bf{B}}_{r}}}\right)}^{H}}}+{\bf{Q\tilde{W}}}{{\bf{Q}}^{H}}+\sigma_{r}^{2}{{\bf{I}}_{{N_{r}}}}, (28)
𝛀u=uuUpuαu𝐠^u𝐁r(𝐠^u𝐁r)H+𝐂𝐖~𝐂H+σr2𝐈Nr,u.{{\bf{\Omega}}_{u}}=\sum\limits_{u^{\prime}\neq u}^{U}{{p_{u^{\prime}}}{\alpha_{u^{\prime}}}{{{\bf{\hat{g}}}}_{u^{\prime}}}{{\bf{B}}_{r}}{{\left({{{{\bf{\hat{g}}}}_{u^{\prime}}}{{\bf{B}}_{r}}}\right)}^{H}}+{\bf{C\tilde{W}}}{{\bf{C}}^{H}}+\sigma_{r}^{2}{{\bf{I}}_{{N_{r}}}}},\forall u. (29)

By introducing this variable into the constraints (15a)-(15c), the problem (P3) can be transformed into the problem (P4) as follows

(P4) min{𝐖d}d=1D,{pu}u=1UTr(𝐖~)+u=1Upu+κF(𝐭~i(j)),\displaystyle\mathop{\min}\limits_{\left\{{{{\bf{W}}_{d}}}\right\}_{d=1}^{D},\left\{{{p_{u}}}\right\}_{u=1}^{U}}{\text{Tr}}\left({{\bf{\tilde{W}}}}\right)+\sum\limits_{u=1}^{U}{{p_{u}}}+\kappa F\left({{\bf{\tilde{t}}}_{i}^{\left(j\right)}}\right),
s.t. |β0|2𝐚tH(θ0,ϕ0)𝐖~𝐚t(θ0,ϕ0)𝐚rH(θ0,ϕ0)\displaystyle{\left|{{\beta_{0}}}\right|^{2}}{\bf{a}}_{t}^{H}\left({{\theta_{0}},{\phi_{0}}}\right){\bf{\tilde{W}}}{{\bf{a}}_{t}}\left({{\theta_{0}},{\phi_{0}}}\right){\bf{a}}_{r}^{H}\left({{\theta_{0}},{\phi_{0}}}\right)
𝚯1𝐚r(θ0,ϕ0)γr,\displaystyle{{\bf{\Theta}}^{-1}}{{\bf{a}}_{r}}\left({{\theta_{0}},{\phi_{0}}}\right)\geq{\gamma^{r}}, (30a)
puαu𝐠^u𝐁r𝛀u1(𝐠^u𝐁r)HγuU,u,\displaystyle{p_{u}}{\alpha_{u}}{{{\bf{\hat{g}}}}_{u}}{{\bf{B}}_{r}}{\bf{\Omega}}_{u}^{-1}{\left({{{{\bf{\hat{g}}}}_{u}}{{\bf{B}}_{r}}}\right)^{H}}\geq\gamma_{u}^{U},\forall u, (30b)
(1+1γdD)(αd𝐡^d𝐁t)H𝐖dαd𝐡^d𝐁t\displaystyle\left({1+\frac{1}{{\gamma_{d}^{D}}}}\right){\left({\sqrt{{\alpha_{d}}}{{{\bf{\hat{h}}}}_{d}}{{\bf{B}}_{t}}}\right)^{H}}{{\bf{W}}_{d}}\sqrt{{\alpha_{d}}}{{{\bf{\hat{h}}}}_{d}}{{\bf{B}}_{t}}
(αd𝐡^d𝐁t)H𝐖~αd𝐡^d𝐁t+σd2,d1,\displaystyle\geq{\left({\sqrt{{\alpha_{d}}}{{{\bf{\hat{h}}}}_{d}}{{\bf{B}}_{t}}}\right)^{H}}{\bf{\tilde{W}}}\sqrt{{\alpha_{d}}}{{{\bf{\hat{h}}}}_{d}}{{\bf{B}}_{t}}+\sigma_{d}^{2},\forall d\geq 1, (30c)
𝐖d0,d,\displaystyle{{{\bf{W}}_{d}}}\succeq 0,\forall d, (30d)
rank(𝐖d)=1,d,\displaystyle{\text{rank}}\left({{{\bf{W}}_{d}}}\right)=1,\forall d, (30e)

where 𝐖~=d=0D𝐖d{\bf{\tilde{W}}}=\sum\nolimits_{d=0}^{D}{{{\bf{W}}_{d}}}, rank(𝐖d) = 1{\text{rank}}\left({{{\bf{W}}_{d}}}\right){\text{ = }}1. Due to constraints (30a), (30b) and (30e), the problem is non-convex. Next, we deal with constraints (30a), (30b) and (30e). Since 𝐖d0{{{\bf{W}}_{d}}}\succeq 0, γr>0{\gamma^{r}}>0, 𝐚tH(θ0,ϕ0)𝐖~𝐚t(θ0,ϕ0)>0{\bf{a}}_{t}^{H}\left({{\theta_{0}},{\phi_{0}}}\right){\bf{\tilde{W}}}{{\bf{a}}_{t}}\left({{\theta_{0}},{\phi_{0}}}\right)>0, constraint (30a) can be rewritten as

𝐚rH(θ0,ϕ0)𝚯1𝐚r(θ0,ϕ0)γr|β0|2(𝐚tH(θ0,ϕ0)𝐖~𝐚t(θ0,ϕ0))1.{\bf{a}}_{r}^{H}\!\!\left({{\theta_{0}},{\phi_{0}}}\right)\!{{\bf{\Theta}}^{-1}}{{\bf{a}}_{r}}\!\!\left({{\theta_{0}},{\phi_{0}}}\right)\!\!\geq\!\!\frac{{{\gamma^{r}}}}{{{{\left|{{\beta_{0}}}\right|}^{2}}}}{\left(\!{{\bf{a}}_{t}^{H}\left({{\theta_{0}},{\phi_{0}}}\right)\!{\bf{\tilde{W}}}{{\bf{a}}_{t}}\!\left({{\theta_{0}},{\phi_{0}}}\!\right)}\!\right)^{-1}}. (31)

Considering that f(𝐗)=𝐟H𝐗1𝐟f\left({\bf{X}}\right)={{\bf{f}}^{H}}{{\bf{X}}^{-1}}{\bf{f}} is a convex function for 𝐗0{\bf{X}}\succ 0, the left-hand side of the inequality is a convex function with respect to 𝚯{\bf{\Theta}}. The right-hand side is a convex function with respect to {𝐖d}d=0D\left\{{{{\bf{W}}_{d}}}\right\}_{d=0}^{D}. Therefore, Eq. (31) is still an non-convex constraint, which can be approximated by a first-order Taylor expansion at the boundary. For the ii-th iteration of SCA, we consider the following lower bound

𝐚rH(θ0,ϕ0)𝚯1𝐚r(θ0,ϕ0)\displaystyle{\mathbf{a}}_{r}^{H}\left({{\theta_{0}},{\phi_{0}}}\right){{\mathbf{\Theta}}^{-1}}{{\mathbf{a}}_{r}}\left({{\theta_{0}},{\phi_{0}}}\right)\geq (32)
𝐚rH(θ0,ϕ0)(𝚯(i1))1𝐚r(θ0,ϕ0)\displaystyle{\bf{a}}_{r}^{H}\left({{\theta_{0}},{\phi_{0}}}\right){\left({{{\bf{\Theta}}^{\left({i-1}\right)}}}\right)^{-1}}{{\bf{a}}_{r}}\left({{\theta_{0}},{\phi_{0}}}\right)
𝐚rH(θ0,ϕ0)(𝚯(i1))1(𝚯𝚯(i1))\displaystyle-{\bf{a}}_{r}^{H}\left({{\theta_{0}},{\phi_{0}}}\right){\left({{{\bf{\Theta}}^{\left({i-1}\right)}}}\right)^{-1}}\left({{\bf{\Theta}}-{{\bf{\Theta}}^{\left({i-1}\right)}}}\right)
(𝚯(i1))1𝐚r(θ0,ϕ0)f(𝚯,𝚯(i1)),\displaystyle{\left({{{\bf{\Theta}}^{\left({i-1}\right)}}}\right)^{-1}}{{\bf{a}}_{r}}\left({{\theta_{0}},{\phi_{0}}}\right)\triangleq f\left({{\mathbf{\Theta}},{{\mathbf{\Theta}}^{\left({i-1}\right)}}}\right),

where

𝚯(i1)\displaystyle{{\mathbf{\Theta}}^{\left({i-1}\right)}} =u=1U|αu|2pu(i1)𝐠^u𝐁r(𝐠^u𝐁r)H\displaystyle=\sum\limits_{u=1}^{U}{{{\left|{\sqrt{{\alpha_{u}}}}\right|}^{2}}p_{u}^{\left({i-1}\right)}{{{\mathbf{\hat{g}}}}_{u}}{{\mathbf{B}}_{r}}{{\left({{{{\mathbf{\hat{g}}}}_{u}}{{\mathbf{B}}_{r}}}\right)}^{H}}} (33)
+𝐐𝐖~(i1)𝐐H+σr2𝐈Nr,\displaystyle+{\mathbf{Q}}{{\mathbf{\tilde{W}}}^{\left({i-1}\right)}}{{\mathbf{Q}}^{H}}+\sigma_{r}^{2}{{\mathbf{I}}_{{N_{r}}}},

𝐖~(i1)=d=0D𝐖d(i1){{\bf{\tilde{W}}}^{\left({i-1}\right)}}=\sum\nolimits_{d=0}^{D}{{\bf{W}}_{d}^{\left({i-1}\right)}}. {pu(i1)}u=1U\left\{{p_{u}^{\left({i-1}\right)}}\right\}_{u=1}^{U} and {𝐖d(i1)}d=0D\left\{{{\bf{W}}_{d}^{\left({i-1}\right)}}\right\}_{d=0}^{D} are obtained at the (i1)(i-1)-th iteration. Therefore, a convex subset of the non-convex constraint (30a) is established as

f(𝚯,𝚯(i1))γr|β0|2(𝐚tH(θ0,ϕ0)𝐖~𝐚t(θ0,ϕ0))1.f\left({{\bf{\Theta}},{{\bf{\Theta}}^{\left({i-1}\right)}}}\right)\geq\frac{{{\gamma^{r}}}}{{{{\left|{{\beta_{0}}}\right|}^{2}}}}{\left({{\bf{a}}_{t}^{H}\left({{\theta_{0}},{\phi_{0}}}\right){\bf{\tilde{W}}}{{\bf{a}}_{t}}\left({{\theta_{0}},{\phi_{0}}}\right)}\right)^{-1}}. (34)

Similarly, we handle the constraint (15b) by first converting constraint (30b) into

αu𝐠^u𝐁r𝛀u1(𝐠^u𝐁r)HγuUpu,u.{\alpha_{u}}{{\bf{\hat{g}}}_{u}}{{\bf{B}}_{r}}{\bf{\Omega}}_{u}^{{}^{-1}}{\left({{{{\bf{\hat{g}}}}_{u}}{{\bf{B}}_{r}}}\right)^{H}}\geq\frac{{\gamma_{u}^{U}}}{{{p_{u}}}},\forall u. (35)

By processing with the lower bound obtained from the first-order Taylor expansion iteration, for the ii-th iteration of SCA, we consider the following lower bound

αu𝐠^u𝐁r𝛀u1(𝐠^u𝐁r)Hαu(𝐠^u𝐁r)H(𝛀u(i1))1𝐠^u𝐁r\displaystyle{\alpha_{u}}{{{\bf{\hat{g}}}}_{u}}{{\bf{B}}_{r}}{\bf{\Omega}}_{u}^{{}^{-1}}{\left({{{{\bf{\hat{g}}}}_{u}}{{\bf{B}}_{r}}}\right)^{H}}\geq{\alpha_{u}}{\left({{{{\bf{\hat{g}}}}_{u}}{{\bf{B}}_{r}}}\right)^{H}}{\left({{\bf{\Omega}}_{u}^{\left({i-1}\right)}}\right)^{-1}}{{{\bf{\hat{g}}}}_{u}}{{\bf{B}}_{r}} (36)
αu(𝐠^u𝐁r)H(𝛀u(i1))1(𝛀u𝛀u(i1))\displaystyle-{\alpha_{u}}{\left({{{{\bf{\hat{g}}}}_{u}}{{\bf{B}}_{r}}}\right)^{H}}{\left({{\bf{\Omega}}_{u}^{\left({i-1}\right)}}\right)^{-1}}\left({{{\bf{\Omega}}_{u}}-{\bf{\Omega}}_{u}^{\left({i-1}\right)}}\right)
(𝛀u(i1))1𝐠^u𝐁rfu(𝛀u,𝛀u(i1)),u,\displaystyle{\left({{\bf{\Omega}}_{u}^{\left({i-1}\right)}}\right)^{-1}}{{{\bf{\hat{g}}}}_{u}}{{\bf{B}}_{r}}\triangleq{f_{u}}\left({{{\bf{\Omega}}_{u}},{\bf{\Omega}}_{u}^{\left({i-1}\right)}}\right),\forall u,

where

𝛀u(i1)\displaystyle{\bf{\Omega}}_{u}^{\left({i-1}\right)} =uuUpu(i1)αu𝐠^u𝐁r(𝐠^u𝐁r)H\displaystyle=\sum\limits_{u^{\prime}\neq u}^{U}p_{{}_{u^{\prime}}}^{\left({i-1}\right)}{\alpha_{u^{\prime}}}{{{\bf{\hat{g}}}}_{u^{\prime}}}{{\bf{B}}_{r}}{{\left({{{{\bf{\hat{g}}}}_{u^{\prime}}}{{\bf{B}}_{r}}}\right)}^{H}} (37)
+𝐂𝐖~(i1)𝐂H+σr2𝐈Nr,u,\displaystyle+{\bf{C}}{{{\bf{\tilde{W}}}}^{\left({i-1}\right)}}{{\bf{C}}^{H}}+\sigma_{r}^{2}{{\bf{I}}_{{N_{r}}}},\forall u,

is obtained at the (i1)(i-1)-th iteration. Therefore, a convex subset of the non-convex constraint in constraint (30b) is given by

fu(𝛀u,𝛀u(i1))γuUpu,u.{f_{u}}\left({{{\bf{\Omega}}_{u}},{\bf{\Omega}}_{u}^{\left({i-1}\right)}}\right)\geq\frac{{\gamma_{u}^{U}}}{{{p_{u}}}},\forall u. (38)

Based on the convex approximations in Eq. (34) and Eq. (38), in the ii-th iteration, the problem (P5) is represented as

(P5) min{𝐖d}d=1D,{pu}u=1UTr(𝐖~)+u=1Upu+κF(𝐭~i(j)),\displaystyle\mathop{\operatorname{min}}\limits_{\left\{{{{\bf{W}}_{d}}}\right\}_{d=1}^{D},\left\{{{p_{u}}}\right\}_{u=1}^{U}}{\text{Tr}}\left({{\bf{\tilde{W}}}}\right)+\sum\limits_{u=1}^{U}{{p_{u}}}+\kappa F\left({{\bf{\tilde{t}}}_{i}^{\left(j\right)}}\right), (39)
s.t.(34), (38), (30c)-(30e).\displaystyle~{}~{}~{}~{}~{}~{}~{}~{}~{}{\textrm{s.t.}}\qquad\text{(34), (38), (30c)-(30e)}.

Since the existence of rank-1 constraint (30e), the problem (P5) is still non-convex. According to the Proposition 1, it can be equivalently written as a DC function constraint.

Proposition 1: For a PSD matrix 𝐖dNt×Nt,Tr(𝐖d)1{{{\bf{W}}_{d}}}\in{{\mathbb{C}}^{{N_{t}}\times{N_{t}}}},{\text{Tr}}\left({{{\bf{W}}_{d}}}\right)\geqslant 1, d\forall d, the rank-1 constraint can be equivalent to the difference between two convex functions, which can be expressed as

rank(𝐖d)=1Tr(𝐖d)𝐖d=0,\text{rank}\left({{{\bf{W}}_{d}}}\right)=1\Leftrightarrow{\text{Tr}}\left({{{\bf{W}}_{d}}}\right)-{\left\|{{{\bf{W}}_{d}}}\right\|}=0, (40)

where Tr(𝐖d)=d=1Dσi(𝐖d){\text{Tr}}\left({{{\bf{W}}_{d}}}\right)=\sum\nolimits_{d=1}^{D}{{\sigma_{i}}\left({{{\bf{W}}_{d}}}\right)}, σi(𝐖d){\sigma_{i}}\left({{{\bf{W}}_{d}}}\right) represents the ii-th largest singular value of matrix 𝐖d{{\bf{W}}_{d}}, 𝐖d=σ1(𝐖d).{\left\|{{{\bf{W}}_{d}}}\right\|}={\sigma_{1}}\left({{{\bf{W}}_{d}}}\right).

Since 𝐖~=d=0D𝐖d{\bf{\tilde{W}}}=\sum\nolimits_{d=0}^{D}{{{\bf{W}}_{d}}}, 𝐖~{\bf{\tilde{W}}} can also be subjected to this transformation. According to Proposition 1, the problem (P6) can then be formulated as

(P6) min{𝐖d}d=1D,{pu}u=1UTr(𝐖~)+ρ(Tr(𝐖~)𝐖~)\displaystyle\mathop{\operatorname{min}}\limits_{\left\{{{{\bf{W}}_{d}}}\right\}_{d=1}^{D},\left\{{{p_{u}}}\right\}_{u=1}^{U}}{\text{Tr}}\left({{\bf{\tilde{W}}}}\right)\!+\!\rho\left({{\text{Tr}}\left({{\bf{\tilde{W}}}}\right)\!-\!{{\left\|{{\bf{\tilde{W}}}}\right\|}}}\right)\! (41)
+u=1Upu+κF(𝐭~i(j)),\displaystyle~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}~{}+\sum\limits_{u=1}^{U}{{p_{u}}}\!+\!\kappa F\left({{\bf{\tilde{t}}}_{i}^{\left(j\right)}}\right),
s.t.(34), (38), (30c), (30d),\displaystyle~{}~{}~{}~{}~{}~{}~{}~{}{\textrm{s.t.}}\qquad\text{(34), (38), (30c), (30d)},

where ρ>0\rho>0 is a penalty factor. Since 𝐖~-{{\left\|{{\bf{\tilde{W}}}}\right\|}} is concave, the problem (P6) is still non-convex. It can be solved by iterative optimization-minimization techniques. The main idea is to linearize the quartic term ρ𝐖~-\rho{\left\|{{\bf{\tilde{W}}}}\right\|} in the objective function and transform into the problem (P7) as follows

(P7) min{𝐖d}d=1D,{pu}u=1UTr(𝐖~)+ρTr(𝐖~),𝐈𝐖~i1\displaystyle\!\!\!\!\!\!\!\mathop{\operatorname{min}}\limits_{\left\{{{{\bf{W}}_{d}}}\right\}_{d=1}^{D},\left\{{{p_{u}}}\right\}_{u=1}^{U}}{\text{Tr}}\left({{\bf{\tilde{W}}}}\right)\!+\!\rho\left\langle{{\text{Tr}}\left({{\bf{\tilde{W}}}}\right),{\bf{I}}\!-\!\partial{{\left\|{{{{\bf{\tilde{W}}}}^{i-1}}}\right\|}}}\right\rangle (42)
+u=1Upu+κF(𝐭~i(j)),\displaystyle~{}~{}~{}~{}~{}~{}~{}~{}~{}+\sum\limits_{u=1}^{U}{{p_{u}}}+\kappa F\left({{\bf{\tilde{t}}}_{i}^{\left(j\right)}}\right),
s.t.(34), (38), (30c), (30d),\displaystyle~{}~{}~{}~{}~{}{\textrm{s.t.}}~{}~{}~{}~{}\text{(34), (38), (30c), (30d)},

where 𝐖~i1{{\bf{\tilde{W}}}^{i-1}} is the optimal solution of the subproblem at (i1)(i-1)-th iteration. At this point, the problem (P7) is convex and can be solved efficiently using existing solvers such as CVX [33]. In addition, by solving the following Proposition 2, we can effectively calculate the gradient 𝐖~\partial{\left\|{{\bf{\tilde{W}}}}\right\|}[34].

Proposition 2: For a given PSD matrix 𝐖~Nt×Nt{\bf{\tilde{W}}}\in{{\mathbb{C}}^{{N_{t}}\times{N_{t}}}}, the gradient 𝐖~\partial{\left\|{{\bf{\tilde{W}}}}\right\|} can be calculated as 𝐰𝐰H{{\bf{w}}}{\bf{w}}^{H}, where 𝐰Nt×1{{\bf{w}}}\in{{\mathbb{C}}^{{N_{t}}\times 1}} is the principal eigenvector of the matrix 𝐖~{\bf{\tilde{W}}}.

Therefore, when the penalty term is set to zero, the problem (P7) should lead to a rank-1 solution 𝐖~{{\bf{\tilde{W}}}^{*}}, so we can solve it through Cholesky decomposition 𝐖~=𝐰(𝐰)H{{\bf{\tilde{W}}}^{*}}={\bf{w}}^{*}{\left({\bf{w}}^{*}\right)^{H}}.

Algorithm 1 BPSO Algorithm Framework to Solve (P1)
0:  {𝐰d(0)}d=1D\left\{{{\bf{w}}_{d}^{(0)}}\right\}_{d=1}^{D}, 𝐖0(0){\bf{W}}_{0}^{(0)} and {pu(0)}u=1U\left\{{p_{u}^{(0)}}\right\}_{u=1}^{U} and iteration index of BPSO jj = 0.
0:  𝐁t{{\bf{B}}_{t}}, 𝐁r{{\bf{B}}_{r}}, {𝐰d}d=1D\left\{{{{\bf{w}}_{d}}}\right\}_{d=1}^{D}, 𝐯{\bf{v}}, 𝐖0{{\bf{W}}_{0}}, {pu}u=1U\left\{{{p_{u}}}\right\}_{u=1}^{U} and {𝐫u}u=1U.\left\{{{{\bf{r}}_{u}}}\right\}_{u=1}^{U}.
1:  repeat
2:  Update jj = jj + 1.
3:  Given {𝐰d(j1)}d=1D\left\{{{\bf{w}}_{d}^{(j-1)}}\right\}_{d=1}^{D}, 𝐖0(j1){\bf{W}}_{0}^{(j-1)} and {pu(j1)}u=1U\left\{{p_{u}^{(j-1)}}\right\}_{u=1}^{U}, calculate the value of the fitness function to obtain local optimal 𝐛~i{\bf{\tilde{b}}}_{i}^{*} and the current global optimal 𝐛~{\bf{\tilde{b}}}^{*}. Then solve Eq. (16)-(19) and store the intermediate solutions 𝐁t(j){\bf{B}}_{t}^{(j)} and 𝐁r(j){\bf{B}}_{r}^{(j)}.
4:  Given 𝐁t(j){\bf{B}}_{t}^{(j)}, 𝐁r(j){\bf{B}}_{r}^{(j)}, solve the problem (P7) and store the intermediate solutions {𝐰d(j)}d=1D\left\{{{\bf{w}}_{d}^{(j)}}\right\}_{d=1}^{D}, 𝐖0(j){\bf{W}}_{0}^{(j)} and {pu(j)}u=1U\left\{{p_{u}^{(j)}}\right\}_{u=1}^{U}.
5:  Until j=Jj=J.
6:  According to the global optimal 𝐛~{\bf{\tilde{b}}}^{*}, obtain the corresponding solution 𝐁t{{\bf{B}}_{t}^{*}}, 𝐁r{{\bf{B}}_{r}^{*}}, {𝐰d}d=1D\left\{{{{\bf{w}}_{d}^{*}}}\right\}_{d=1}^{D}, 𝐖0{{\bf{W}}_{0}^{*}}, {pu}u=1U\left\{{{p_{u}^{*}}}\right\}_{u=1}^{U}.
7:  Calculate the receiving beamforming {𝐫u}u=1U\left\{{{{\bf{r}}_{u}^{*}}}\right\}_{u=1}^{U} and 𝐯{{\bf{v}}^{*}} according to Eq. (25) and Eq. (26), respectively.

III-D Computational Complexity Analysis

The joint optimization algorithm based on the BPSO framework proposed in this paper can be summarized as Algorithm 1. In this subsection, we analyze its computational complexity. According to [35], a detailed method is proposed to calculate the computational complexity of solving a convex problem through interior point method quantitative analysis. We get the solution to the problem (P3) with complexity order as 𝒪(NtD+U(Nt6D3+Nt4D2U+U3))\mathcal{O}\left({\sqrt{{N_{t}}D+U}\left({N_{t}^{6}{D^{3}}+N_{t}^{4}{D^{2}}U+{U^{3}}}\right)}\right). Since it serves as the process of solving the fitness function of BPSO algorithm, therefore, the overall complexity of the algorithm is 𝒪(2IJLsumNtD+U(Nt6D3+Nt4D2U+U3))\mathcal{O}\left({2IJ{L_{sum}}\sqrt{{N_{t}}D+U}\left({N_{t}^{6}{D^{3}}+N_{t}^{4}{D^{2}}U+{U^{3}}}\right)}\right), where Lsum=Lr,SI+Lr,U+Lt,SI+Lt,D{L_{sum}}={L_{r,SI}}+{L_{r,U}}+{L_{t,SI}}+{L_{t,D}}.

IV Numerical Results

TABLE I: Simulation Parameters
Parameters Value
Number of candidate
discrete positions
MM=NN=9
Number of MA elements Nt{N_{t}}=Nr{N_{r}}=2
Distance between two adjacent
candidate discrete positions
ll=0.03m
Number of uplink users UU=2
Number of downlink users DD=2
Number of paths between
FD-DFRC-BS and users
LL=3
Noise powers at the
FD-DFRC-BS and each user
σr2\sigma_{r}^{2}=σd2,d\sigma_{d}^{2},\forall d
=-100dBm
Residual SI channel power ηnr,ntSI\eta_{{n_{r}},{n_{t}}}^{\text{SI}}=-100dB
Channel fading factor from
the FD-DFRC-BS to each user
αd{\alpha_{d}} = αu{\alpha_{u}}=-120dB
Gain of target sensing channel β0{\beta_{0}}=9dB
Amplitude of the interference signal
β1{\beta_{1}}=β2{\beta_{2}}=-9dB

In this section, we demonstrate on the effectiveness of the algorithm through numerical simulations. The candidate discrete positions for transmitting MA elements and receiving MA elements are MM = NN = 9. Assume that both the transmitting and receiving MAs of the FD-DFRC-BS have Nt{N_{t}} = Nr{N_{r}} = 2 elements. The frequency is fixed at 5GHz, which corresponds to a wavelength of λ\lambda = 0.06m. Specifically, the distance between two adjacent candidate discrete positions is ll = λ\lambda / 2 = 0.03m. The FD-DFRC-BS serves UU = 2 uplink users and DD = 2 downlink users. Additionally, the number of paths between the FD-DFRC-BS and both the uplink and downlink users are LL = 3. The noise powers at the FD-DFRC-BS and each downlink user are set to σr2=σd2,d\sigma_{r}^{2}=\sigma_{d}^{2},\forall d = -100dBm. We assume the residual self-interference (SI) channel power ηnr,ntSI\eta_{{n_{r}},{n_{t}}}^{\text{SI}} = -110dB. For simplicity, it is assumed that the channel fading factor from the FD-DFRC-BS to each user is αd{\alpha_{d}} = αu{\alpha_{u}} = -120dB. The gain of target sensing channel and the amplitude of the interference signal are set to β0{\beta_{0}} = 9dB and β1=β2={\beta_{1}}={\beta_{2}}= -9dB. The specific simulation parameters are shown in Table I [36]. We primarily consider the impact of sensing SINR constraints, downlink user communication SINR constraints, uplink user transmit power, the number of transmission paths, and the number of users on total transmit power. Meanwhile, we compare MA-enabled ISAC system with the ISAC system equipped with fixed antenna arrays.

Refer to caption
Figure 2: Transmit power consumption versus the sensing SINR threshold.

Fig. 2 describes the relationship between the sensing SINR constraint and transmit power at the FD-DFRC-BS with different types of antennas. In summary, with a higher minimum necessary sensing SINR, the FD-DFRC-BS expends additional transmit power to fulfill the more rigorous service quality standards expected by the users. In addition, we can observe that within the given range, the fixed linear antenna array, due to suboptimal spatial degrees of freedom, requires more transmit power compared to the MA. Random1 and Random2 are two non-overlapping positions randomly selected from 9 candidate locations, which may lead to poorer channels. Consequently, they need to consume higher transmit power to meet the same sensing requirements. In general, as the sensing SINR increases, the MA-enabled ISAC, due to its superior spatial degrees of freedom, performs better in minimizing transmit power.

Refer to caption
Figure 3: Transmit power consumption versus communication SINR threshold.

Fig. 3 describes the relationship between the downlink user communication SINR constraint and transmit power at the FD-DFRC-BS with different antenna configurations. Overall, as the downlink user communication SINR constraint increases, the FD-DFRC-BS consumes more transmit power to meet the stricter quality of service requirements of the users. Additionally, we can observe that within the given range, the fixed linear antenna array, due to suboptimal spatial degrees of freedom, requires more transmit power compared to the MA, and the transmit power consumption varies significantly with the increase of the downlink user communication SINR constraint. Random1 and Random2 are two non-overlapping positions randomly selected from 9 candidate locations, which may lead to more random channel quality. Therefore, compared to the MA, they need to consume higher transmit power to meet the same downlink user communication requirements.

Refer to caption
Figure 4: Transmit power consumption versus changing transmit path.

Fig. 4 describes the relationship between the downlink user communication SINR constraint and transmit power at the FD-DFRC-BS under different paths. Overall, as the number of paths decreases, the diversity gain obtained diminishes, hence the FD-DFRC-BS consumes more transmit power to meet the stricter quality of service requirements of the users. Additionally, we can observe that under the same conditions, the fixed linear antenna array, due to suboptimal spatial degrees of freedom, requires more transmit power compared to the MA with the same number of paths.

Refer to caption
Figure 5: Transmit power consumption versus minimum transmit power.

Fig. 5 describes the relationship between the minimum transmit power and the total transmit power. Overall, it is evident that the transmit power rises progressively as the minimum transmit power threshold is elevated. Meanwhile, under the same conditions, when the number of uplink users is 1, the transmit power is significantly lower than when there are 2 uplink users. When the number of uplink users is consistent, the transmit power is slightly lower when the number of downlink users decreases to 1, compared to when there are 2 downlink users. The linear antenna array has slightly higher transmit power in the same scenarios due to its inferior spatial correlation compared to the MA. Since Random is based on randomly selected positions, the channel quality cannot be predicted. In contrast, MA is selected through an algorithm to find the globally suboptimal antenna positions, so under the same circumstances, they consume higher transmit power than MA.

Refer to caption
Figure 6: Transmit beampattern regarding radar sensing functionality.
Refer to caption
Figure 7: Receive beampattern regarding radar sensing functionality.

Next, we demonstrate the beampattern gain in radar sensing capabilities that is attained through the algorithm. Based on the optimized radar sensing receiving beamforming 𝐯{{\bf{v}}^{*}}, which is normalized 𝐯=1\left\|{{{\bf{v}}^{*}}}\right\|=1 and the transmitted signal 𝐱{{\bf{x}}^{*}}, we define the following beampattern

p1(θ,ϕ) = |𝐚tH(θ,ϕ)𝐱|2,{p_{1}}\left({\theta,\phi}\right){\text{ = }}{\left|{{\bf{a}}_{t}^{H}\left({\theta,\phi}\right){{\bf{x}}^{*}}}\right|^{2}}, (43)
p2(θ,ϕ) = |(𝐯)H𝐚r(θ,ϕ)|2.{p_{2}}\left({\theta,\phi}\right){\text{ = }}{\left|{{{\left({{{\bf{v}}^{*}}}\right)}^{H}}{{\bf{a}}_{r}}\left({\theta,\phi}\right)}\right|^{2}}. (44)

Fig. 6 and Fig. 7 show the two beampatterns achieved by the designed algorithm. Fig. 6 illustrates that the primary transmission beams are oriented towards the target user as well as the downlink users individually. The Fig. 7 shows that when the interference user is relatively close to the uplink user, the interference signal cannot be effectively suppressed due to the insufficiently narrow bandwidth. However, when there is a significant angular separation between the two, the interference signals can be effectively suppressed. Overall, the algorithm is effective for the radar sensing functionality.

Refer to caption
Figure 8: Receive beampattern for uplink user 1 regarding communication functionality.
Refer to caption
Figure 9: Receive beampattern for uplink user 2 regarding communication functionality.

Fig. 8 and Fig. 9 show the beampattern for communication purposes. Using the optimized communication receiving beamforming, we define the receive beampattern for the uplink user uu as |(𝐫u)H𝐚r(θ,ϕ)|2{\left|{{{\left({{\bf{r}}_{u}^{*}}\right)}^{H}}{{\bf{a}}_{r}}\left({\theta,\phi}\right)}\right|^{2}}. It describes the receive beampattern gain for the two uplink users. From Fig. 8, it can be seen that for the uplink user 1, a main beam pointing towards the user’s direction is allocated. Meanwhile, interference user and downlink user are suppressed. Similar observations can also be seen in Fig. 9. Considering the fact that the two main beams of the transmitted signal are directed towards the downlink users, as shown in Fig. 6, it can be concluded that the design is effective in terms of communication functionality.

V Conclusions

This paper has investigated the minimization of transmit power in a full-duplex ISAC system enabled by MA. To solve this problem, we have adopted a framework based on the BPSO algorithm. Initially, the discrete positions of the MA have been determined by iteratively solving the fitness function. For the solution of the fitness function, we have used the DC programming and SCA to handle the non-convex and rank-1 issues within the fitness function. Once the BPSO iteration was completed, the discrete position of the MA elements could be ascertained, and subsequently, the corresponding beamforming vectors, sensing signal covariance matrix, and user transmit power could be obtained or solved. Numerical results have indicated that the system has a performance improvement over traditional ISAC systems. This advantage is mainly due to MA, which increases the spatial degrees of freedom of the system, allowing the MA-enabled ISAC system to more effectively reduce the total transmit power consumption compared to systems using fixed antenna arrays. In addition, beampattern simulation results also have confirmed that the framework based on the BPSO algorithm was capable of accomplishing a degree of multi-beam alignment and interference suppression.

References

  • [1] J. A. Zhang, F. Liu, C. Masouros, R. W. Heath, Z. Feng, L. Zheng, and A. Petropulu, “An overview of signal processing techniques for joint communication and radar sensing,” IEEE J. Sel. Topics Signal Process., vol. 15, no. 6, pp. 1295–1315, Nov. 2021.
  • [2] J. A. Zhang, M. L. Rahman, K. Wu, X. Huang, Y. J. Guo, S. Chen, and J. Yuan, “Enabling joint communication and radar sensing in mobile networks—a survey,” IEEE Commun. Surveys & Tutorials, vol. 24, no. 1, pp. 306–345, 1st Quar. 2022.
  • [3] F. Liu, Y. Cui, C. Masouros, J. Xu, T. X. Han, Y. C. Eldar, and S. Buzzi, “Integrated sensing and communications: Toward dual-functional wireless networks for 6G and beyond,” IEEE J. Sel. Areas Commun., vol. 40, no. 6, pp. 1728–1767, Jun. 2022.
  • [4] E. Björnson, M. Matthaiou, and M. Debbah, “Massive MIMO with non-ideal arbitrary arrays: Hardware scaling laws and circuit-aware design,” IEEE Trans. Wireless Commun., vol. 14, no. 8, pp. 4353–4368, Aug. 2015.
  • [5] A. PAULRAJ, D. GORE, R. NABAR, and H. BOLCSKEI, “An overview of MIMO communications-a key to gigabit wireless,” Proc. IEEE, vol. 92, no. 2, pp. 198–218, Feb. 2004.
  • [6] A. Goldsmith, S. Jafar, N. Jindal, and S. Vishwanath, “Capacity limits of MIMO channels,” IEEE J. Sel. Areas Commun., vol. 21, no. 5, pp. 684–702, Jun. 2003.
  • [7] J. Singh, S. Srivastava, and A. K. Jagannatham, “Energy-efficient hybrid beamforming for integrated sensing and communication enabled mmave MIMO systems,” arXiv e-prints, Jun. 2024. [Online]. Available: 10.48550/arXiv.2406.03737
  • [8] B. Liao, H. Q. Ngo, M. Matthaiou, and P. J. Smith, “Power allocation for massive MIMO-ISAC systems,” IEEE Trans. Wireless Commun., pp. 1–1, Oct. 2024.
  • [9] M. Zhu, L. Li, S. Xia, and T.-H. Chang, “Information and sensing beamforming optimization for multi-user multi-target mimo isac systems,” in Proc. ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Rhodes Island, Greece, May 2023, pp. 1–5.
  • [10] Y. Niu, Z. Wei, D. Ma, X. Yang, H. Wu, Z. Feng, and J. Yuan, “Interference management in MIMO-ISAC systems: A transceiver design approach,” arXiv e-prints, Jul. 2024. [Online]. Available: 10.48550/arXiv.2407.05391
  • [11] J. Chu, R. Liu, M. Li, Y. Liu, and Q. Liu, “Joint secure transmit beamforming designs for integrated sensing and communication systems,” IEEE Trans. Veh. Technol., vol. 72, no. 4, pp. 4778–4791, Apr. 2023.
  • [12] X. Wang, Z. Fei, J. A. Zhang, and J. Huang, “Sensing-assisted secure uplink communications with full-duplex base station,” IEEE Commun. Lett., vol. 26, no. 2, pp. 249–253, Feb. 2022.
  • [13] M. Z. Chowdhury, M. Shahjalal, S. Ahmed, and Y. M. Jang, “6G wireless communication systems: Applications, requirements, technologies, challenges, and research directions,” IEEE Open J. Commun. Society, vol. 1, pp. 957–975, Jul. 2020.
  • [14] L. Zhu, J. Zhang, Z. Xiao, X. Cao, D. O. Wu, and X.-G. Xia, “Millimeter-wave NOMA with user grouping, power allocation and hybrid beamforming,” IEEE Trans. Wireless Commun., vol. 18, no. 11, pp. 5065–5079, Nov. 2019.
  • [15] J. Hejres, “Null steering in phased arrays by controlling the positions of selected elements,” IEEE Trans. Antennas Propag., vol. 52, no. 11, pp. 2891–2895, Nov. 2004.
  • [16] S. Basbug, “Design and synthesis of antenna array with movable elements along semicircular paths,” IEEE Antennas Wireless, vol. 16, pp. 3059–3062, Oct. 2017.
  • [17] J. Tang, C. Pan, Y. Zhang, H. Ren, and K. Wang, “Secure MIMO communication relying on movable antennas,” arXiv e-prints, Mar. 2024. [Online]. Available: 10.48550/arXiv.2403.04269
  • [18] J. Ding, Z. Zhou, and B. Jiao, “New paradigm for secure full-duplex transmission: Movable antenna-aided multi-user systems,” arXiv e-prints, Jul. 2024. [Online]. Available: 10.48550/arXiv.2407.10393
  • [19] W. Ma, L. Zhu, and R. Zhang, “MIMO capacity characterization for movable antenna systems,” IEEE Trans. Wireless Commun., vol. 23, no. 4, pp. 3392–3407, Apr. 2024.
  • [20] Y. Wu, D. Xu, D. W. K. Ng, W. Gerstacker, and R. Schober, “Movable antenna-enhanced multiuser communication: Jointly optimal discrete antenna positioning and beamforming,” in Proc. GLOBECOM 2023-2023 IEEE Global Communications Conference, Kuala Lumpur, Malaysia, Feb. 2024, pp. 7508–7513.
  • [21] L. Zhu, W. Ma, and R. Zhang, “Movable antennas for wireless communication: Opportunities and challenges,” IEEE Commun. Mag., vol. 62, no. 6, pp. 114–120, Jun. 2024.
  • [22] W. Liu, X. Zhang, H. Xing, J. Ren, Y. Shen, and S. Cui, “UAV-enabled wireless networks with movable-antenna array: Flexible beamforming and trajectory design,” IEEE Wireless Commun. Lett., pp. 1–1, 2024.
  • [23] Y. Gao, Q. Wu, and W. Chen, “Joint transmitter and receiver design for movable antenna enhanced multicast communications,” arXiv e-prints, Apr. 2024. [Online]. Available: 10.48550/arXiv.2404.11881
  • [24] J. Ding, Z. Zhou, C. Wang, W. Li, L. Lin, and B. Jiao, “Secure full-duplex communication via movable antennas,” arXiv e-prints, Mar. 2024. [Online]. Available: 10.48550/arXiv.2403.20025
  • [25] H. Wu, H. Ren, C. Pan, and Y. Zhang, “Movable antenna-enabled RIS-aided integrated sensing and communication,” arXiv e-prints, Jul. 2024. [Online]. Available: 10.48550/arXiv.2407.03228
  • [26] W. Lyu, S. Yang, Y. Xiu, Z. Zhang, C. Assi, and C. Yuen, “Flexible beamforming for movable antenna-enabled integrated sensing and communication,” arXiv e-prints, May 2024. [Online]. Available: 10.48550/arXiv.2405.10507
  • [27] H. Qin, W. Chen, Q. Wu, Z. Zhang, Z. Li, and N. Cheng, “Cramér-rao bound minimization for movable antenna-assisted multiuser integrated sensing and communications,” IEEE Wireless Commun. Lett., pp. 1–1, early access 2024.
  • [28] L. Zhu, W. Ma, B. Ning, and R. Zhang, “Movable-antenna enhanced multiuser communication via antenna position optimization,” IEEE Trans. Wireless Commun., vol. 23, no. 7, pp. 7214–7229, Jul. 2024.
  • [29] Z. Lyu, G. Zhu, and J. Xu, “Joint maneuver and beamforming design for UAV-enabled integrated sensing and communication,” IEEE Trans. Wireless Commun., vol. 22, no. 4, pp. 2424–2440, Apr. 2023.
  • [30] F. Liu, Y.-F. Liu, A. Li, C. Masouros, and Y. C. Eldar, “Cramér-Rao bound optimization for joint radar-communication beamforming,” IEEE Trans. Signal Process., vol. 70, pp. 240–253, Dec. 2022.
  • [31] L. Chen, Z. Wang, Y. Du, Y. Chen, and F. R. Yu, “Generalized transceiver beamforming for DFRC with MIMO radar and MU-MIMO communication,” IEEE J. Sel. Areas Commun., vol. 40, no. 6, pp. 1795–1808, Jun. 2022.
  • [32] C. G. Tsinos, A. Arora, S. Chatzinotas, and B. Ottersten, “Joint transmit waveform and receive filter design for dual-function radar-communication systems,” IEEE J. Sel. Topics Signal Process., vol. 15, no. 6, pp. 1378–1392, Nov. 2021.
  • [33] M. Grant, “CVX: Matlab software for disciplined convex programming,” 2008. [Online]. Available: http://cvxr.com/cvx
  • [34] H. A. Le Thi, H. P. H. Luu, and T. P. Dinh, “Online stochastic DCA with applications to principal component analysis,” IEEE Trans. Neural Netw. Learning Syst., vol. 35, no. 5, pp. 7035–7047, Oct. 2024.
  • [35] K.-Y. Wang, A. M.-C. So, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, “Outage constrained robust transmit optimization for multiuser MISO downlinks: Tractable approximations by conic optimization,” IEEE Trans. Signal Process., vol. 62, no. 21, pp. 5690–5705, Nov. 2014.
  • [36] Z. He, W. Xu, H. Shen, D. W. K. Ng, Y. C. Eldar, and X. You, “Full-duplex communication for ISAC: Joint beamforming and power optimization,” IEEE J. Sel. Areas Commun., vol. 41, no. 9, pp. 2920–2936, Sep. 2023.