{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2017:KNUYP6W4J6KB5OSEVSR5MNEZWI","short_pith_number":"pith:KNUYP6W4","schema_version":"1.0","canonical_sha256":"536987fadc4f941eba44aca3d63499b2161904b6d42fc6c0c094fe0793409a93","source":{"kind":"arxiv","id":"1703.10666","version":1},"attestation_state":"computed","paper":{"title":"Interference Exploitation in Full Duplex Communications: Trading Interference Power for Both Uplink and Downlink Power Savings","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Christos Masouros, Mahmoud T. Kabir, Muhammad R. A. Khandaker","submitted_at":"2017-03-30T20:34:20Z","abstract_excerpt":"This paper considers a multiuser full-duplex (FD) wireless communication system, where a FD radio base station (BS) serves multiple single-antenna half-duplex (HD) uplink and downlink users simultaneously. Unlike conventional interference mitigation approaches, we propose to use the knowledge of the data symbols and the channel state information (CSI) at the FD radio BS to exploit the multi-user interference constructively rather than to suppress it. We propose a multi-objective optimisation problem (MOOP) via the weighted Tchebycheff method to study the trade-off between the two desirable sys"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1703.10666","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.IT","submitted_at":"2017-03-30T20:34:20Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"9802827c1f1e649712ec50ee0ff2de05763cdf8b06834ab4b2c2e78b6062d3c2","abstract_canon_sha256":"7b8dd3cd21b330980dffa5b1d612558330b7ba4c4499e984f49757f5446e9a72"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:47:33.032387Z","signature_b64":"QVWlRk9ogo7uRSWNfyYmUoP8kvXaQ3MhF9yIunuLGYNyzm1YeWqiTNcJdBcHRGFxmS3AiyyqtFrUWgHYfZqdDQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"536987fadc4f941eba44aca3d63499b2161904b6d42fc6c0c094fe0793409a93","last_reissued_at":"2026-05-18T00:47:33.031797Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:47:33.031797Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Interference Exploitation in Full Duplex Communications: Trading Interference Power for Both Uplink and Downlink Power Savings","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Christos Masouros, Mahmoud T. Kabir, Muhammad R. A. Khandaker","submitted_at":"2017-03-30T20:34:20Z","abstract_excerpt":"This paper considers a multiuser full-duplex (FD) wireless communication system, where a FD radio base station (BS) serves multiple single-antenna half-duplex (HD) uplink and downlink users simultaneously. Unlike conventional interference mitigation approaches, we propose to use the knowledge of the data symbols and the channel state information (CSI) at the FD radio BS to exploit the multi-user interference constructively rather than to suppress it. We propose a multi-objective optimisation problem (MOOP) via the weighted Tchebycheff method to study the trade-off between the two desirable sys"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1703.10666","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1703.10666","created_at":"2026-05-18T00:47:33.031878+00:00"},{"alias_kind":"arxiv_version","alias_value":"1703.10666v1","created_at":"2026-05-18T00:47:33.031878+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1703.10666","created_at":"2026-05-18T00:47:33.031878+00:00"},{"alias_kind":"pith_short_12","alias_value":"KNUYP6W4J6KB","created_at":"2026-05-18T12:31:24.725408+00:00"},{"alias_kind":"pith_short_16","alias_value":"KNUYP6W4J6KB5OSE","created_at":"2026-05-18T12:31:24.725408+00:00"},{"alias_kind":"pith_short_8","alias_value":"KNUYP6W4","created_at":"2026-05-18T12:31:24.725408+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/KNUYP6W4J6KB5OSEVSR5MNEZWI","json":"https://pith.science/pith/KNUYP6W4J6KB5OSEVSR5MNEZWI.json","graph_json":"https://pith.science/api/pith-number/KNUYP6W4J6KB5OSEVSR5MNEZWI/graph.json","events_json":"https://pith.science/api/pith-number/KNUYP6W4J6KB5OSEVSR5MNEZWI/events.json","paper":"https://pith.science/paper/KNUYP6W4"},"agent_actions":{"view_html":"https://pith.science/pith/KNUYP6W4J6KB5OSEVSR5MNEZWI","download_json":"https://pith.science/pith/KNUYP6W4J6KB5OSEVSR5MNEZWI.json","view_paper":"https://pith.science/paper/KNUYP6W4","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1703.10666&json=true","fetch_graph":"https://pith.science/api/pith-number/KNUYP6W4J6KB5OSEVSR5MNEZWI/graph.json","fetch_events":"https://pith.science/api/pith-number/KNUYP6W4J6KB5OSEVSR5MNEZWI/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/KNUYP6W4J6KB5OSEVSR5MNEZWI/action/timestamp_anchor","attest_storage":"https://pith.science/pith/KNUYP6W4J6KB5OSEVSR5MNEZWI/action/storage_attestation","attest_author":"https://pith.science/pith/KNUYP6W4J6KB5OSEVSR5MNEZWI/action/author_attestation","sign_citation":"https://pith.science/pith/KNUYP6W4J6KB5OSEVSR5MNEZWI/action/citation_signature","submit_replication":"https://pith.science/pith/KNUYP6W4J6KB5OSEVSR5MNEZWI/action/replication_record"}},"created_at":"2026-05-18T00:47:33.031878+00:00","updated_at":"2026-05-18T00:47:33.031878+00:00"}