Next Article in Journal
Investigating Fourteen Countries to Maximum the Economy Benefit by Using Offline Reconfiguration for Medium Scale PV Array Arrangements
Next Article in Special Issue
Energy Efficient Design and Control of Non-Orthogonal Multiple Access Systems
Previous Article in Journal
Zero Average Surface Controlled Boost-Flyback Converter
Previous Article in Special Issue
Deep Learning Based Successive Interference Cancellation Scheme in Nonorthogonal Multiple Access Downlink Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Rate Fairness and Power Consumption Optimization for NOMA-Assisted Downlink Networks

1
School of Electronic Engineering and Department of Information Communication Convergence Technology, Soongsil University, Seoul 06978, Korea
2
Faculty of Electronics and Telecommunication Engineering, The University of Danang-University of Science and Technology, Danang 550000, Vietnam
3
Department of Office Administration, The University of Danang, Danang 550000, Vietnam
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Energies 2021, 14(1), 58; https://doi.org/10.3390/en14010058
Submission received: 19 November 2020 / Revised: 14 December 2020 / Accepted: 18 December 2020 / Published: 24 December 2020

Abstract

:
This paper considers a non-orthogonal multiple access (NOMA) downlink network, where a hybrid of NOMA and beamforming designs is developed to enhance the channel capacity. We aim to improve the system performance in terms of rate fairness and power consumption. Hence, a multi-objective problem with a joint optimization of user equipment pairing, power control, and quality-of-service requirements is addressed. To efficiently solve the problem, we propose two low-complexity algorithms based on the inner-approximation method, with the first algorithm using the relaxation method and the second one using graph theory. Numerical results are provided to demonstrate the effectiveness of the two proposed algorithms in comparison with the exhaustive search and existing methods.

1. Introduction

Non-orthogonal multiple access (NOMA) can be considered to be a promising multiple access technology for fifth-generation networks for accommodating the rapid growth of data traffic [1,2,3,4]. Unlike orthogonal multiple access, NOMA allows user equipment (UE) to share the same time-frequency resource; hence, the spectral efficiency (SE) and energy efficiency (EE) are improved. The NOMA technique is classified into two main categories: the power domain [5] and code domain [6]. Herein, we focus power-domain NOMA, referred to as NOMA for convenience. The key idea of power-domain NOMA is to allocate a higher power to the UE with poorer channel gain. Meanwhile, a UE with a strong channel gain is equipped with successive interference cancellation (SIC) to remove the signal intended to the UE with poorer channel gain before decoding its own signal [5,7].

1.1. Related Works and Motivation

Recently, many new approaches have been proposed for UE grouping/clustering [8,9,10,11]. The number of clusters is selected based on the cell size and channel gain in [8], whereas a clustering strategy based on channel correlation was investigated in [11]. In [9], a tensor model was proposed to manage UE association, in which clusters of UEs were formed by different circular zones. Owing to the channel conditions and computational capacity of UE, SIC is restricted to limited groups/clusters of UE [8,9].
To ease implementationin a small-sized network, UE pairing is essential. In [12], pairing of one near UE and another far UE was shown to be efficient. A cognitive radio inspired NOMA system with a single-antenna base station (BS) was also investigated in [12], where a cell is divided into inner and outer zones, including cognitive UEs (CUs) with strong channel gain and primary UEs (PUs) with poor channel gain. A two-zone scheme assisted by the multiple-antenna technique was studied in [13], in which each pair comprised one inner-zone UE and the other outer-zone UE. The authors in [14] proposed a distance-based UE pairing scheme to improve the sum throughput, in which the far UEs were paired with an available nearest UEs using a distance threshold. Another pairing scheme based on the vector norms of channel responses was developed for a massive MIMO-NOMA system in [15]. The effect of UE pairing on the performance of NOMA-based systems was studied in [16], in which a CR-NOMA and an F-NOMA system were considered under fixed power allocation.
To fully exploit the advantages of UE pairing, many algorithms have been developed for pairing two arbitrary UEs without separate zones. In addition to random pairing scheme used in [17], UE pairing schemes based on channel condition arrangement have been proposed [17,18,19]. The typical pre-processing step is to place all UE into an unpaired set with sorted channel gains (SCG). Under the setting, various strategies have been proposed to pop and pair two UEs until the SCG is empty or only contains one UE. In [19], two UEs with the best and worst channel gains were popped and paired consecutively. In [18], two best-channel conditions were selected, whereas the first and middle UEs in the SCG were paired together in [17]. Unlike the aforementioned work, a more flexible approach was proposed [20], where any two users in a cell can be dynamically paired together to improve the fairness throughput among all UEs.
Most of the aforementioned works investigated NOMA-based systems to improve SE. In power-domain NOMA, power control is extremely challenging owing to SIC. In addition, the power consumption or EE has been considered to be one of the immediate concerns for the upcoming wireless networks, as indicated by the energy for information and communication technologies, which constitute approximately five percents of the total world’s energy consumption [21,22]. Therefore, power consumption has been recently reported in a few studies. The authors in [10] investigated a joint optimization problem of user assignment and power allocation for a downlink (DL) NOMA network in terms of EE maximization. Another power allocation strategy was proposed in [23] to evaluate the EE of a broadcast DL NOMA network. These studies investigated the sub-channels assignment for UEs; hence, the UE association is still unknown for exploiting the channel capacity using NOMA. This motivates us to develop algorithms with a joint UE pairing and beamforming design that accounts for both the SE fairness and power consumption.

1.2. Contributions

In this paper, we consider a cellular DL NOMA network, where a multi-objective problem for rate fairness among all UEs and power consumption were investigated under the minimum per-UE rate requirement and signal-to-noise ratio (SNR) constraints for decoding the message. To further improve the channel capacity, the NOMA technique can be applied to two UEs in a cell, instead of UE pairing with two near and far groups. The resulting problem belongs to a mixed-integer non-convex class that is difficult to solve. Therefore, we devise two low-complexity algorithms, based on inner approximation (IA) and graph theory. The main contributions of this paper are described as follows:
  • First, we investigate a hybrid system comprising NOMA and conventional beamforming to reap their advantages for a unique design. A beamforming design with SIC can be applied to a pair of UE, or conventional beamforming can be used for certain UE depending on the number of UEs and channel conditions. Accordingly, the approach is referred to as dynamic pairing because it enables the pairing of two arbitrary UEs in a cell.
  • To manage the dynamic pairing, we introduce a new binary variable matrix for UE association. By using the NOMA principle and sorted channel gains, the computational complexity is reduced with the variables forced into an upper triangular matrix. Next, we formulate a problem for joint optimization of UE pairing and beamforming design, thereby enabling the selection of the objective function: the max-min rate (MMR) and power consumption. However, a strong coupling of binary and continuous variables under non-convex constraints results in a hard class of mixed-integer non-convex programs.
  • To efficiently solve the resulting problem, we propose two approaches based on the IA framework as well as the relaxation method and bipartite graph. The first approach is based on a combination of the relaxation and IA methods; it can transform the complicated original problem into a more tractable form without integer variables. Therefore, an iterative algorithm based on the IA framework is derived to obtain a local optimal solution at the least. To further reduce the time complexity, we develop an algorithm in which UE pairing and the beamforming design are managed using a bipartite graph and the IA method. For UE pairing, this approach uses the channel correlation as the weights of edges on the graph, resulting in a linear bottleneck assignment problem. Hence, we apply the binary search and augmenting path algorithm to obtain the UE pair, and then use the solution of the first approach for the beamforming design based on a specified integer variable value.

1.3. Paper Organization and Notation

The rest of this paper is organized as follows. The system model and problem formulation are described in Section 2 and Section 3, respectively. Two proposed solutions based on the IA framework with the relaxation method and graph theory are detailed in Section 4 and Section 5, respectively. For the benchmark purpose, the optimal solution based on exhaustive search is also studied in Section 5. Section 6 presents numerical results, whereas Section 7 concludes the paper.
Notation: Lowercase and uppercase letters in bold indicate vectors and matrices, respectively. x H is the Hermitian transpose of x . The set of all complex and real numbers are represented by C and R , respectively. · stands for the Euclidean norm. E { · } is the expectation and { . } denotes the real part of a complex number.

2. System Model

We consider a DL NOMA cellular system, where a BS is equipped N transmit antennas to serve K single-antenna UEs. As illustrated in Figure 1, NOMA technique can be applied to a pair of two arbitrary UEs in a set of UEs, denoted by K { 1 , , K } . For simplicity, we denotes the k-th UE by UE k .

2.1. Data Transmission Model

The DL channel from BS to UE k and the corresponding beamforming vector are denoted as h k C N × 1 and w k C N × 1 , respectively. Without loss of generality, the channel gains of all UEs are sorted as h 1 2 h 2 2 h K 2 . The signal received at UE k can be written as
y k = K h k H w x + n k ,
where x k with E { | x k | 2 } = 1 represents the symbol intended for UE k , and n k represents the additive white Gaussian noise (AWGN) at UE k . To perform UE pairing, we introduce binary variables α k , { 0 , 1 } , k , K , which are expressed as
α k , = 1 , if UE k and UE are paired with the channel gains satisfying h k 2 h 2 , 0 , otherwise .
By defining α [ α k , ] K × K , it is clear that α is an upper triangle matrix with the main diagonal of zeros. The signal-to-interference-plus-noise ratio (SINR) at UE k can be written as
γ k ( w , α ) = min γ 0 , k ( w , α ) , min K { γ , k ( w , α ) } ,
where w [ w k ] k K . The SINRs for decoding the UE k ’s signals at itself and UE are denoted by γ 0 , k ( w , α ) and γ , k ( w , α ) , respectively, which can be expressed as
γ 0 , k ( w , α ) = | h k H w k | 2 χ k ( w , α ) ,
γ , k ( w , α ) = | h H w k | 2 α , k Φ , k ( w ) ,
where χ k ( w , α ) and Φ , k ( w , α ) are respectively given as
Φ k ( w , α ) = K \ { k } ( 1 α k , ) | h k w | 2 + σ k 2 ,
Θ , k ( w ) = k K \ { k } | h w k | 2 + σ 2 .
It is seen that when UE k and UE are not paired together, i.e., α k , = α , k = 0 , k , K , only  γ 0 , k ( w , α ) is involved in Equation (3), since γ , k ( w , α ) .

2.2. Power Consumption Model

To measure power-efficiency, we consider the power consumption for transmission with beamforming, which can be expressed as
P T ( w ) = k K 1 ζ PA w k 2 radiated power ,
where ζ PA is the efficiency of the power amplifier (PA) at the BS. In other words, the power consumption is the power for data transmission from the BS to all the UE in the form of electromagnetic wave radiation. It is clear that P T ( w ) is a function of beamforming vectors.
Remark 1.
In addition to the power for beamforming, the power consumption in a wireless communication system includes the power for signal processing, device activation, and circuit operation [24,25]. However, these values are constant, and hence can be omitted in the objective function without affecting the search for the optimal solution. For convenience, we consider only the power consumption for beamforming in this paper.

3. Problem Formulation

The achievable rate of UE k in nats/s/Hz can be expressed as
R ( γ k ( w , α ) ) = ln ( 1 + γ k ( w , α ) ) , k K .
We introduce a parameter υ { 0 , 1 } for the objective selection between rate fairness and power consumption optimization. As a result, a multi-objective problem can be formulated as
max w , α υ min k K R ( γ k ( w , α ) ) ( 1 υ ) P T ( w ) ,
s . t . k K w k 2 P BS max ,
α k , { 0 , 1 } , k , K ,
α k , = 0 , ( k , ) { K × K | k } ,
k K α k , 1 , K ,
K α k , 1 , k K ,
α k , + k K α , k 1 ( k , ) { K × K | k < } ,
α k , + K α , k 1 ( k , ) { K × K | k < } ,
| h k H w k | 2 ρ sn σ k 2 ,
R ( γ k ( w , α ) ) ( 1 υ ) R ¯ k , k K .
Objective Equation (8a) can be selected for fairness rate maximization (or power consumption minimization) by setting υ = 1 (or υ = 0 ). Constraints Equation (8c–h) correspond to the NOMA criteria for user pairing. Specifically, Equation (8d) ensures that in a certain pair, UE with the better channel employs SIC to remove the interference from the remaining UE. Constraints Equation (8e–h) guarantee that each UE can be paired with at most one other UE. The signal-to-noise ratio (SNR) threshold ρ sn in Equation (8i) is used for detecting the signal at the receivers, whereas constraint Equation (8j) provides the minimum bit rate, R ¯ k , such that UEs satisfy the QoS requirement. Owing to a strong coupling of continuous and binary variables under the non-convex objective function and constraints, Equation (8) is a mixed-integer non-convex problem, and thus, it is hard to obtain a globally optimal solution.
Remark 2.
Although the proposed dynamic pairing approach can further enhance the system performance, it leads to a large number of possible pairing cases. To overcome this issue and to accelerate the application of NOMA technique, the rest of the paper will devise two algorithms which provide low complexity and fast convergence.

4. Proposed Solution Based on Relaxation Method

To convert Equation (8) to a tractable form, the binary variables in constraint Equation (8c) are relaxed to continuous ones as 0 α k , 1 , k , K . Then, the optimization problem Equation (8) can be rewritten as
max w , α , λ , η υ η ( 1 υ ) P T ( w ) ,
s . t . 0 α k , 1 , k , K ,
R ( γ k ( w , α ) ) λ k , k K ,
λ k ( 1 υ ) R ¯ k , k K ,
η λ k , k K ,
E q u a t i o n ( 8b ) , E q u a t i o n ( 8d i ) ,
where η is a new variable representing the minimum rate among all UEs and λ { λ 1 , λ 2 , , λ K } denotes the rate of each UE. Furthermore, Equation (9d) is the QoS constraint, which is equivalent to Equation (8j).
It can be observed that constraints Equations (8i) and (9c) are non-convex and thus difficult to solve directly. To deal with the issue, we first introduce some useful IA functions as follows.
  • We consider the multiplication function f mul ( x , z ) = x z . Then an upper bound of f mul ( x , z ) is provided in Equation (B.1) in [26]:
    f mul ( x , z ) x ( i ) 2 z ( i ) z 2 + z ( i ) 2 x ( i ) x 2 = f mul ( i ) ( x , z ) , x 0 , y 0 .
  • The logarithm function R ( | x | 2 / z ) = ln ( 1 + | x | 2 / z ) with x C , y R + , has a lower bound around a feasible point ( x ( i ) , z ( i ) ) [27]:
    ln ( 1 + | x | 2 z ) R ( | x ( i ) | 2 z ( i ) ) | x ( i ) | 2 z ( i ) + 2 R { x ( i ) x } z ( i ) | x ( i ) | 2 ( | x | 2 + z ) ( z ( i ) ) 2 ( z ( i ) + | x ( i ) | 2 ) .
  • A lower bound of the quadratic function f qu ( x ) = | x | 2 can be expressed as
    f qu ( x ) 2 R { ( x ( i ) ) x } | x ( i ) | 2 , x C .
Let us convexify the QoS constraint Equation (8c). By using Equation (12), Equation (8c) can be approximated as
| h k H w k | 2 2 R { ( h k H w k ( i ) ) ( h k H w k ) } | h k H w k ( i ) | 2 ,
resulting in an alternative convex constraints:
2 R { ( h k H w k ( i ) ) ( h k H w k ) } | h k H w k ( i ) | 2 ρ sn σ k 2 , k K .
To convexify constraint Equation (9c), we can split Equation (9c) into two sub-constraints as
{ R ( γ 0 , k ( w , α ) ) λ k ,     k K ,   ( 15a ) R ( γ , k ( w , α ) ) λ k ,     k K .   ( 15b )
Using Equation (11), a lower bound of γ 0 , k ( w , α ) around a feasible point ( w ( i ) , α ( i ) ) at iteration ( i + 1 ) is derived as
R ( γ 0 , k ( w , α ) ) A 0 , k ( i ) + A 1 , k ( i ) ( w ) A 2 , k ( i ) ( w , α ) ,
where A 0 , k ( i ) , A 1 , k ( i ) ( w ) , and A 2 , k ( i ) ( w , α ) are respectively given as
A 0 , k ( i ) = R ( γ 0 , k ( i ) ) γ 0 , k ( i ) , A 1 , k ( i ) ( w ) = 2 R { ( h k H w k ( i ) ) ( h k H w k ) } χ k ( i ) , A 2 , k ( i ) ( w , α ) = Θ k ( i ) | h k H w k | 2 + Θ k ( i ) K \ { k } ( 1 α k , ) | h k H w | 2 + Θ k ( i ) σ k 2 ,
with γ 0 , k ( i ) γ 0 , k ( w ( i ) , α ( i ) ) , χ k ( i ) χ k ( w ( i ) , α ( i ) ) and Θ k ( i ) ( χ k ( i ) ) 1 ( χ k ( i ) + | h k H w k ( i ) | 2 ) 1 . Clearly, A 2 , k ( i ) ( w , α ) is still non-convex; hence, we apply Equation (10) to convexify A 2 , k ( i ) ( w , α )  as
A 2 , k ( i ) ( w , α ) Θ k ( i ) τ k , k + Θ k ( i ) K \ { k } ( 1 α k , ) τ k , + Θ k ( i ) σ k 2 Θ k ( i ) τ k , k + Θ k ( i ) K \ { k } f mul ( i ) ( 1 α k , , τ k , ) + Θ k ( i ) σ k 2 A ˜ 2 , k ( i ) ( w , α , τ ) ,
where τ = { τ k , } k , K is introduced as a new variable satisfying the following second-order cone (SOC) constraint:
| h k H w | 2 τ k , , k , K .
Therefore, the convex approximation for constraint Equation (15a) at iteration ( i + 1 ) can be written as
A 0 , k ( i ) + A 1 , k ( i ) ( w ) A ˜ 2 , k ( i ) ( w , α , τ ) λ k , k K .
It can be observed that constraints Equation (15a,b) take the same form. Hence, constraint Equation (15b) at iteration ( i + 1 ) is approximated by the same steps as Equations (16)–(19), i.e., Equation (15b) is convexified as
B 0 , , k ( i ) + B 1 , , k ( i ) ( w ) B ˜ 2 , , k ( i ) ( w , α , τ ) λ k , , k K ,
where B 0 , , k ( i ) , B 1 , , k ( i ) ( w ) , and B ^ 1 , , k ( i ) ( w , α ) are respectively defined as
B 0 , , k ( i ) R ( γ , k ( i ) ) γ , k ( i ) , B 1 , , k ( i ) ( w ) 2 R { ( h H w k ( i ) ) ( k H w k ) } α , k ( i ) Φ , k ( i ) , B ˜ 2 , , k ( i ) ( w , α , τ ) Ξ , k ( i ) τ , k + Ξ , k ( i ) k K \ { k } f mul ( i ) ( α , k , τ , k ) + Ξ , k ( i ) α , k σ 2 ,
where γ , k ( i ) γ , k ( w ( i ) , α ( i ) ) , Φ , k ( i ) Φ , k ( w ( i ) ) , and Ξ , k ( i ) ( Φ , k ( i ) ) 1 ( Φ , k ( i ) + | h H w k ( i ) | 2 ) 1 .
In summary, a successive convex program at iteration ( i + 1 ) , which provides minorant maximization for Equation (9), can be formulated as
c c max w , α , τ , λ , η υ η ( 1 υ ) P T ( w ) ,
s . t . E q u a t i o n ( 8b ) , E q u a t i o n ( 8d h ) , E q u a t i o n ( 9b ) , E q u a t i o n ( 9d , e ) , E q u a t i o n ( 14 ) , E q u a t i o n s ( 18 ) ( 20 ) .
Clearly, when the iterative algorithm terminates, the value of the relax variable α is approximately the binary value, and not a solution of Equation (8). To address this point, the binary values of α for the optimal solution of Equation (8) is recovered by the rounding function Equation (22), i.e.,
α k , = α k , ( i ) + 1 2 , k , K ,
where x returns the maximum integer that is not larger than x , x R .
For implementation purposes, it is necessary to find an initial feasible point for Equation (21). This can be achieved by solving the following sub-problem:
c c max w , α , τ , λ , ω ω ,
s . t . λ k R ¯ k ω , k K ,
ω 0 , k K ,
E q u a t i o n ( 8b ) , E q u a t i o n ( 8d h ) , E q u a t i o n ( 9b ) , E q u a t i o n ( 14 ) , E q u a t i o n s ( 18 ) ( 20 ) ,
where ω is a new slack variable. Constraint Equation (23b) guarantees that the initial feasible point can satisfy the QoS requirement. It can be seen that a starting point ( w ( 0 ) , α ( 0 ) , τ ( 0 ) ) is obtained when ω is approximately zero. The proposed iterative algorithm based on the IA method to solve the problem Equation (8) is summarized in Algorithm 1. In particular, the solution of continuous variables for the relaxation problem is found in Phase 1, while Phase 2 is devoted to re-compute the solution for the original problem with a fixed value of the integer variable α .
Convergence analysis: Our proposed algorithm based on the IA method has the convergence properties as in [28]. Let F ( i ) be the feasible point set of Equation (21) at iteration i, then the properties of IA method indicate that the optimal solution X ^ ( i ) F ( i ) obtained at iteration i satisfies X ^ ( i ) F ( i + 1 ) as well. In addition, F ( i ) is a connected set [29]. Therefore, our proposed algorithm can provide at least a local optimal solution that satisfies the Karush-Kuhn-Tucker conditions.
Complexity analysis: The approximated problem Equation (21) includes 5 K 2 + 4 K + 1 SOC/linear constraints and 2 K 2 + N K + 1 variables, which complicates the solving of Equation (21) in terms of the big-O expressed as O ( ( 2 K 2 + N K + 1 ) 2.5 ( ( 5 K 2 + 4 K + 1 ) 2 + 2 K 2 + N K + 1 ) ) [30].
Algorithm 1 Proposed Algorithm for Solving Problem Equation (8) based on IA Method.
Phase 1:
1:
Input-1: h k , R ¯ k ( k K ) , P BS max , and ρ sn .
2:
Initialization: Set i : = 0 .
3:
Get an initial point: Execute the sub-problem Equation (23) to obtain an initial point ( w ( 0 ) , α ( 0 ) , τ ( 0 ) ) for Equation (21).
4:
repeat
5:
 Solve the optimization problem Equation (21) to find ( w , α , τ ) at the i-th iteration.
6:
 Update ( w ( i + 1 ) , α ( i + 1 ) , τ ( i + 1 ) ) : = ( w , α , τ ) .
7:
 Set i : = i + 1 .
8:
until Convergence
9:
Use the rounding function Equation (22) to recover α .
10:
Output-1: The optimal solution α for the binary variable α .
Phase 2:
11:
Input-2: h k , R ¯ k ( k K ) , P BS max , ρ sn , and α .
12:
Reset i : = 0 and repeat steps 1–7 with binary α to obtain the exact beamforming vector w .
13:
Output-2: The optimal solution ( w , α ).

5. Proposed Solutions Based on Integer-Variable Reduction

This section presents the reduction in the computational complexity using integer-variable reduction (IVR). Unlike the relaxation method, this approach first determines the value of α for UE pairing; subsequently, power allocation is computed by solving a sub-problem with respect to the given α . We investigate two methods to find the UE pairs: (i) a graph-based IVR method to reduce the complexity; and (ii) an IVR using exhaustive search for benchmarking.

5.1. Proposed Solution Using Graph-Based IVR

In this subsection, we propose a low-complexity pairing scheme based on channel vectors. Accordingly, a dynamic pair of UE is determined based on a high channel correlation, to which the SIC technique can be effectively applied. It is observed that when the UEs with high channel correlation are paired to each other, the BS has more degree of freedom for beamforming design to mitigate the inter-pair interference.
To implement this method, we first define a weight matrix C [ c k , ] k , K R K × K , in which each entry c k , denoting the channel correlation between the k-th and -th UEs is calculated as
c k , = | < h k , h > | h k h ,
where < x , y > denotes the inner product of two vectors x and y . Subsequently, the UE pairs can be determined by solving the following linear bottleneck assignment problem (LBAP):
max α min k K K α k , c k , ,
s . t . E q u a t i o n ( 8c ) , E q u a t i o n ( 8e ) , E q u a t i o n ( 8f ) .
It is noteworthy that when c k , = 0 , no edge exists between the k-th and -th UEs. To solve problem Equation (25), we use the bipartite graph and binary search methods as follows.

5.1.1. Bipartite Graph for UE Pairing

We employ a balanced bipartite graph G = ( K 1 , K 2 ; D ) , where K 1 and K 2 are the vertex sets of all UEs with | K 1 | = | K 2 | = K , and D is the set of edges, i.e., D = { { k , } | k , K and k } , with the weight of an edge { k , } being c k , . UE pairing can be performed by using the augmenting path algorithm [31]. Some definitions for developing the pairing algorithm are as follow:
  • A matching M is a subset of D without any two edges sharing the same vertex. For convenience, we define an unmatched set M ¯ = D \ M . Furthermore, a maximum matching corresponds to a special case, in which M is enlarged to the maximum.
  • A free vertex is defined as a vertex not contained in M .
  • An alternating path P is a path in graph G , such that two arbitrary successive edges in P are from both sets M and M ¯ .
  • An alternating path P becomes an augmenting path when both the starting and ending points of P are free vertexes.
We can use the augmenting path algorithm to expand M until a maximum matching is obtained. In particular, at each iteration of an iterative algorithm, the augmenting path P is determined for a given matching M ( M = at the beginning), and then, M is updated as M = ( M \ P ) ( P \ M ) . The algorithm terminates when no augmenting path is found. However, a maximum matching with the augmenting path algorithm merely addresses the maximum pairs of UEs, which is insufficient for obtaining the optimal solution for problem Equation (25) under a balanced bipartite graph in a polynomial-time complexity. Hence, the augmenting path algorithm is integrated into a binary search method as will be described in the following subsection.

5.1.2. Binary Search with Augmenting Path Algorithm

The optimal solution for problem Equation (25) is a maximum matching with channel correlation fairness among UE pairs. In other words, the pairs of UEs are determined such that the minimum channel correlation of UE pairs in the achieved maximum matching is maximized. Moreover, the maximal value for the weight fairness is one of the entries in C . Therefore, the binary search algorithm [32] is used to find the solution for Equation (25). The search region is given by an auxiliary vector v [ v i ] i { 1 , , K 2 } R 1 × K 2 , of which the components involving all entries of matrix C are sorted in the ascending order, i.e., v 1 v 2 v K 2 . Let id min and id max be the lower and upper indexes for the search region on vector v , respectively. Clearly, id min = 1 and id max = K 2 at the initialization. The search region is denoted by S ( id min , id max ) [ v id min , , v id max ] . At each iteration, the index of the median in the search region is determined as
id med = id min + id max 2 .
Subsequently, the augmenting path algorithm is executed on sub-graph G ˜ = ( K 1 , K 2 ; D ˜ ) G to find the maximum matching M , where D ˜ D \ { { k , } | c k , < v id med } . The search region is updated as
S ( id min , id max ) = S ( id med , id max ) , if | M | = K S ( id min , id med ) , if | M | < K .
The binary search algorithm terminates when S ( id min , id max ) contains only one element, i.e.,  id med = id min = id max , which results in the value of α . After obtaining the value of α , we solve the optimization problem Equation (21) with the given α to obtain the solution for Equation (8). The proposed algorithm using graph-based IVR is summarized in Algorithm 2. By applying binary search and augmenting path methods for the bipartite graph, a dynamic pairing solution is computed in Phase 1, at which the binary value of variable α is determined to satisfy the constraints of the original problem. In Phase 2, a convex approximation program is solved under the binary value of α obtained in Phase 1.
Complexity Analysis: The binary search requires O ( log 2 ( K 2 ) ) steps to find the optimal value c med , while the augmenting path algorithm takes O ( K 3 ) [33]. Therefore, the total complexity for finding α in problem Equation (25) is O ( K 3 log 2 ( K 2 ) ) . With a given value of α , a sub-problem derived from problem Equation (21) has K 2 + N K + 1 variables and K 2 + 3 K + K / 2 + 1 SOC/linear constraints; consequently, the total complexity of Algorithm 2 is O ( K 3 log 2 K 2 + ( K 2 + N K + 1 ) 2.5 ( ( K 2 + 3 K + K / 2 + 1 ) 2 + K 2 + N K + 1 ) ) .
Algorithm 2 Proposed Algorithm for Solving Problem Equation (8) using Graph-based IVR.
Phase 1:
1:
Input-1: h k , ( k K ) .
2:
Compute the weight matrix C as in Equation (24).
3:
Generate an auxiliary vector v which is sorted in an ascending order.
4:
Set id min : = 1 , id max : = K 2 .
5:
repeat
6:
 Compute id med as in Equation (26).
7:
 Build a sub-graph G ˜ using the median v id med .
8:
 Apply augmenting path algorithm to find the maximum matching M in G ˜ .
9:
if | M | = K then
10:
  Set id min : = id med .
11:
else
12:
  Set id max : = id med .
13:
end if
14:
until  id min = id max
15:
Create α corresponding to the given M .
16:
Output-1: The pairing solution α for the binary variable α .
Phase 2:
17:
Input-2: h k , R ¯ k ( k K ) , P BS max , ρ sn , and α .
18:
Apply Steps 1–7 in Algorithm 1 with the given value of α to find the beamforming vector w .
19:
Output-2: The optimal solution ( w , α ).

5.2. Proposed Solution Based on Exhaustive Search

For benchmarking, this section presents the optimal solution using exhaustive search (ES), where all possible cases of α are considered while satisfying constraints Equations (8c)–(8h). For each case, a sub-problem is derived from Equation (8) by fixing the value of α . Instead of only one subproblem, we obtain many sub-problems as in the graph-based method. Subsequently, we use Equation (21) to find the solutions to the sub-problems. The solution ( w , α ) that provides the best performance is selected as the optimal solution. It can be observed that each sub-problem can be solved with a fast convergence since it only needs to handle the continuous variables of the beamforming vectors. However, this approach typical incurs high computational complexity owning to the large number of sub-problems.
Complexity Analysis: The ES method examines k = 1 K / 2 K k ( 2 k ) ! 2 k k ! sub-problems as all possible cases of α . For a given value of α , a sub-problem based on Equation (21) contains the same numbers of variables and constraints as in Algorithm 2. Therefore, the total complexity of the ES method is determined as O k = 1 K / 2 K k ( 2 k ) ! 2 k k ! ( K 2 + N K + 1 ) 2.5 ( ( K 2 + 3 K + K / 2 + 1 ) 2 + K 2 + N K + 1 ) .

6. Numerical Results

6.1. Parameter and Simulation Settings

We consider a DL cellular system where one BS equipped with N-antennas serves K single-antenna UEs. The BS is located at the center of the cell, whereas the UEs are uniformly distributed within radius R from the cell center. To evaluate the performance of the proposed algorithms, we adopt Monte-Carlo simulations. The channel from the BS to each UE includes the path loss, PL ( d BS , UE ) with distance d BS , UE , and small-scale fading expressed as a Gaussian random variable h CN ( 0 , PL ( d BS , UE ) I ) . The other simulation parameters are shown in Table 1,in which the realistic parameters of power consumption and PA efficiency are provided by [24]. We compare Algorithm 1 (Algorithm 1), Algorithm 2 (Algorithm 2) and the ES scheme with the existing schemes. Before UE pairing, we first sort all UEs in descending order of their channel gains. The pairing strategies are described as follows:
  • Greedy pairing with difference fairness for channel gains (GP-DFCG): A pair comprises the k-th and ( K K / 2 + k ) -th UEs, resulting in α k , K K / 2 + k = 1 , 1 k K / 2 .
  • Greedy pairing with the strongest-to-weakest channel-gain strategy (GP-SWCG): Considering all sorted UEs in an unpaired set, a pair is selected by popping the strongest and weakest channel-gain UEs until the unpaired set is empty or contains one UE, i.e., a pair including the k-th and ( K k + 1 ) -th UEs, resulting in α k , K k + 1 = 1 , 1 k K / 2 .
  • Consecutive pairing (CP): As in [19], the ( 2 k 1 ) -th and 2 k -th UEs are paired together, resulting in α 2 k 1 , 2 k = 1 , 1 k K / 2 .
Furthermore, we also investigate two other typical schemes: (i) Random pairing, where two UEs in the cell are randomly paired with each other; (ii) Beamforming design, where conventional beamforming is applied to all UEs, resulting in an all-zero matrix α . Except for Algorithm 1, the sub-problems, which are derived as the cases of problem Equation (21) for achieved values of α , are solved for the beamforming vectors.

6.2. Rate Fairness Performance

To evaluate the effectiveness of the proposed algorithms in terms of rate fairness, the cumulative distribution functions (CDFs) of all schemes are investigated with respect to the MMR. We use 1000 random channels to estimate the CDFs in Figure 2. In general, the GP-based and CP-based schemes exhibit better performance than random pairing and the conventional beamforming design, i.e., gains of 0.4–0.8 bps/Hz at the mid-point. As expected, the proposed algorithms outperform GP- and CP-based schemes. In particular, when comparing to the GP-DFCG scheme at the mid-point, the performance gains of Algorithms 1 and 2 are 0.7 and 0.3 bps/Hz, respectively. Except for beamforming, the other schemes provide high rate fairness for all UEs, exceeding 3 bps/Hz at the 95-percentile points. These CDFs spread in a wide range of MMR (approximately 2 bps/Hz from the 5- to 95-percentile points), adapting to the channel responses. This figure verifies the importance of the channel-gain disparities as well as the strategies of UE pairing for NOMA-based systems.
Figure 3 depicts the average MMR of the eight schemes along with the change in the budget at the BS. For comparison, the conventional beamforming and ES schemes are also investigated as two baselines. In comparison with the beamforming scheme, the random pairing scheme provides the least MMR gain, whereas the two proposed algorithms outperform the other existing schemes. The performance of Algorithm 1 is approximately 0.5 bps/Hz better than that of Algorithm 2, compensating for the computational complexity of jointly optimizing the mixed-integer variables. Interestingly, the performance of Algorithm 1 is quite close to that of the ES schemes (approximately 0.3 bps/Hz loss on average), thereby confirming the effectiveness of the proposed scheme.

6.3. Power Consumption Minimization

We first examine the minimum rate of all UEs and power-consumption percentage at the BS with the various values of power budget at the BS, P BS max , as illustrated in Figure 4. The minimum rates obtained using Algorithms 1 and 2 are only 1 bps/Hz when considering power consumption minimization (i.e., υ = 0 ), which is exactly the minimum bit-rate threshold associated with the QoS requirements. This allows the BS to consume sufficient power and hence reduce the major part of the power budget. For example, the power-consumption percentage is lower than 1 % of P BS max and inversely proportional to P BS max . Meanwhile, when the design problem is targeted at the MMR ( υ = 1 ) , the minimum rate and power-consumption percentage obtained by Algorithms 1 and 2 increase along with P BS max . The minimum rates are equal to MMRs of Algorithms 1 and 2, consistent with the results in Figure 3. As shown, the power-consumption percentages for the MMR are much higher than those for power consumption minimization; however, the entire power budget is not used. Typically, at P BS max = 18 dBm, the power consumption percentages of Algorithms 1 and 2 are 56.7 % and 97.8 % , respectively. This supports interference management for achieving rate fairness among all UEs, resulting in a decrease in the power-consumed percentages and MMR saturation at high values of P BS max .
To understand the behavior of the proposed algorithms, Figure 5 depicts the power consumption as a function of the QoS requirement. It is clear that the power consumption of all schemes increases with the minimum bit rate. As expected, the proposed algorithms outperform the others, and satisfy the high level of the minimum bit rate. In particular, from R ¯ = 2 (bps/Hz), the proposed algorithms still yield good solution for satisfying the QoS requirement constraint, whereas the other existing schemes could not easily yield the feasible point. Figure 6 demonstrates the power consumption performance versus SNR thresholds. For convenience, we only examine the GP-SWCG scheme, which provides the best performance among the three greedy-based schemes. It is observed that the proposed algorithms provide performance comparable to that of the ES method even at a low SNR threshold. Compared with random pairing, the proposed schemes use approximately 4 dBm, while GP-SWCG provides more than 1 dBm of power saving. These results confirm the flexibility of the proposed methods for the UE pairing to enhance the rate fairness and reduce power consumption.
To further realize the effect of the SNR threshold on system performance, we investigate MMR and power-consumption as a function of SNR threshold, as shown in Figure 7. For power consumption minimization ( υ = 0 ) , the percentage of consumed power is small and proportional to the SNR threshold, whereas the minimum rate remains almost constant. In this case, both proposed algorithms maintain sufficient consumed power to satisfy the QoS requirement, i.e., the minimum rate of 1 bps/Hz. Specifically, for a low SNR threshold, the power consumption percentage of both Algorithms 1 and 2 are less than 1 % , whereas the percentage of consumed power for the higher SNR threshold increases to satisfy the requirement for decoding messages, i.e., approximately 15% at ρ sn = 25 dB. In addition, for the MMR problem ( υ = 1 ) , the percentage of power consumption differs significantly from that of the power-minimization case. In particular, more than 90 % of power budget is required for both algorithms at ρ sn = 25 dB. Moreover, when ρ sn increases, the MMR performance degrades slightly. This is because the power allocated to each UE is increased to satisfy the SNR threshold at all UEs, resulting in more interference among the UEs and a decrease in the minimum rate. However, between ρ sn = 0 and ρ sn = 25 dB, the minimum rates obtained by Algorithms 1 and 2 reduces by only approximately 0.2 bps/Hz, indicating the adaption of the proposed schemes even under a strict received-SNR condition for NOMA-based beamforming design.

6.4. Convergence Behaviors

We investigate the convergence behaviors of the proposed algorithms by referencing to the beamforming design. Figure 8 shows the MMR performance of the three schemes at P BS max = 18 dBm and ρ sn = 0 dB. Because the ES method contains many sub-problems, it is difficult to show its convergence behavior; hence, the ES method is omitted in this figure. As previously mentioned, Algorithm 1 includes two phases where the relaxed variable α is rounded after the first phase, and the optimal solution for the original problem is obtained in the second phase. Hence, the convergence line of Algorithm 1 in Figure 8 consists of a bumpy period before reaching the saturation value. Furthermore, the two proposed algorithms achieve 99% performance with fast convergence. In particular, Algorithm 1 converges almost from iteration 13, whereas Algorithm 2 and beamforming require only a few iterations for a faster convergence rate (i.e., convergence at the 10-th iteration). However, it can be concluded that both proposed algorithms provide fast convergence.

7. Conclusions

We studied a hybrid of NOMA and conventional beamforming design, where a dynamic pairing technique was investigated with two arbitrary UEs in a cell that can be paired together. The aim of this paper was to improve the performance in terms of both fairness rate among all UEs and power consumption. To tackle the resulting mixed-integer non-convex problem, we proposed two low-complexity algorithms. The first algorithm was based on a combination of the relaxation and IA methods to jointly optimize UE pairing and beamforming. In the second algorithm, we used the bipartite graph and binary search methods to achieve UE pairing before using the IA method to obtain the beamforming vectors, which can further reduce the computational complexity. Numerical results with realistic parameters demonstrated that the two proposed algorithms outperform the existing schemes in terms of both MMR and the power consumption.
Besides the advantage of novel dynamic UE pairing, some research gaps would be investigated for future works. Even when two proposed algorithms provide good performance and low complexity, an advanced optimization technique for NOMA could be expected to reduce the rate loss. In addition, the channel estimation is not perfect in practice; thus, a robust design under the channel uncertainty would be essential for UE pairing and beamforming in NOMA-based systems. Finally, the effectiveness of dynamic UE pairing in massive device networks is still unknown, which motivates us to develop a new method for the upcoming requirement and environment.

Author Contributions

Conceptualization, K.-H.N., H.V.N., and O.-S.S.; methodology, K.-H.N., H.V.N., and O.-S.S.; validation, K.-H.N., H.V.N., and O.-S.S.; investigation, K.-H.N., H.V.N., M.T.P.L., T.X.C., and O.-S.S.; writing—original draft preparation, K.-H.N. and H.V.N.; writing—review and editing, K.-H.N., H.V.N., M.T.P.L., T.X.C., and O.-S.S.; visualization, O.-S.S.; supervision, O.-S.S.; project administration, O.-S.S.; funding acquisition, O.-S.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Institute for Information & Communications Technology Promotion (IITP) grant funded by the Korean government (MSIT) (No. 2017-0-00724, Development of Beyond 5G Mobile Communication Technologies (Ultra-Reliable, Low-Latency, and Massive Connectivity) and Combined Access Technologies for Cellular-based Industrial Automation Systems), in part by the National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIT) (No. 2019R1A2C1084834), and in part by Ministry of Education and Training under project number B2020-DNA-06.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Please refer to suggested Data Availability Statements in section “MDPI Research Data Policies” at https://www.mdpi.com/ethics.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Dai, L.; Wang, B.; Yuan, Y.; Han, S.; Chih-Lin, I.; Wang, Z. Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends. IEEE Commun. Mag. 2015, 53, 74–81. [Google Scholar] [CrossRef]
  2. Ding, Z.; Liu, Y.; Choi, J.; Sun, Q.; Elkashlan, M.I.C.; Poor, H.V. Application of non-orthogonal multiple access in LTE and 5G networks. IEEE Commun. Mag. 2017, 55, 185–191. [Google Scholar] [CrossRef] [Green Version]
  3. Liu, Y.; Qin, Z.; Elkashlan, M.; Ding, Z.; Nallanathan, A.; Hanzo, L. Nonorthogonal multiple access for 5G and beyond. Proc. IEEE 2017, 105, 2347–2381. [Google Scholar] [CrossRef] [Green Version]
  4. Saito, Y.; Kishiyama, Y.; Benjebbour, A.; Nakamura, T.; Li, A.; Higuchi, K. Non-orthogonal multiple access (NOMA) for cellular future radio access. In Proceedings of the 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), Dresden, Germany, 2–5 June 2013; pp. 1–5. [Google Scholar]
  5. Islam, S.M.R.; Avazov, N.; Dobre, O.A.; Kwak, K. Power-domain non-orthogonal multiple access (NOMA) in 5G systems: Potentials and challenges. IEEE Commun. Surv. Tutor. 2017, 19, 721–742. [Google Scholar] [CrossRef] [Green Version]
  6. Le, M.T.P.; Ferrante, G.C.; Quek, T.Q.S.; Benedetto, M.D. Fundamental limits of low-density spreading NOMA with fading. IEEE Trans. Wirel. Commun. 2018, 17, 4648–4659. [Google Scholar] [CrossRef] [Green Version]
  7. Saito, Y.; Benjebbour, A.; Kishiyama, Y.; Nakamura, T. System-level performance evaluation of downlink non-orthogonal multiple access (NOMA). In Proceedings of the 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), London, UK, 8–11 September 2013; pp. 611–615. [Google Scholar]
  8. Ali, M.S.; Tabassum, H.; Hossain, E. Dynamic user clustering and power allocation for uplink and downlink nonorthogonal multiple access (NOMA) systems. IEEE Access 2016, 4, 6325–6343. [Google Scholar]
  9. Nguyen, H.V.; Nguyen, V.-D.; Dobre, O.A.; Nguyen, D.N.; Dutkiewicz, E.; Shin, O.-S. Joint power control and user association for NOMA-based full-duplex systems. IEEE Trans. Commun. 2019, 67, 8037–8055. [Google Scholar] [CrossRef] [Green Version]
  10. Fang, F.; Zhang, H.; Cheng, J.; Roy, S.; Leung, V.C.M. Joint user scheduling and power allocation optimization for energy-efficient NOMA systems with imperfect CSI. IEEE J. Select. Areas Commun. 2017, 35, 2874–2885. [Google Scholar] [CrossRef]
  11. Ali, S.; Hossain, E.; Kim, D.I. Non-orthogonal multiple access (NOMA) for downlink multiuser MIMO systems: User clustering, beamforming, and power allocation. IEEE Access 2017, 5, 565–577. [Google Scholar] [CrossRef]
  12. Liang, W.; Ding, Z.; Li, Y.; Song, L. User pairing for downlink non-orthogonal multiple access networks using matching algorithm. IEEE Trans. Commun. 2017, 65, 5319–5332. [Google Scholar] [CrossRef] [Green Version]
  13. Bui, V.-P.; Nguyen, P.X.; Nguyen, H.V.; Nguyen, V.-D.; Shin, O.-S. Optimal user pairing for achieving rate fairness in downlink NOMA networks. In Proceedings of the 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Okinawa, Japan, 11–13 February 2019; pp. 575–578. [Google Scholar]
  14. Mounchili, S.; Hamouda, S. Pairing distance resolution and power control for massive connectivity improvement in NOMA systems. IEEE Trans. Veh. Technol. 2020, 69, 4093–4103. [Google Scholar] [CrossRef]
  15. Chen, X.; Gong, F.; Li, G.; Zhang, H.; Song, P. User pairing and pair scheduling in massive MIMO-NOMA systems. IEEE Commun. Lett. 2018, 22, 788–791. [Google Scholar] [CrossRef]
  16. Ding, Z.; Fan, P.; Poor, H.V. Impact of user pairing on 5G nonorthogonal multiple-access downlink transmissions. IEEE Trans. Veh. Technol. 2016, 65, 6010–6023. [Google Scholar] [CrossRef]
  17. Zhang, H.; Zhang, D.; Meng, W.; Li, C. User pairing algorithm with SIC in non-orthogonal multiple access system. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 23–27 May 2016; pp. 1–6. [Google Scholar]
  18. Zhu, L.; Zhang, J.; Xiao, Z.; Cao, X.; Wu, D.D. Optimal user pairing for downlink non-orthogonal multiple access (NOMA). IEEE Wirel. Commun. Lett. 2019, 8, 328–331. [Google Scholar] [CrossRef]
  19. Cheng, Y.; Li, K.H.; Teh, K.C.; Luo, S. Joint user pairing and subchannel allocation for multisubchannel multiuser nonorthogonal multiple access systems. IEEE Trans. Veh. Technol. 2018, 67, 8238–8248. [Google Scholar] [CrossRef]
  20. Nguyen, K.-H.; Nguyen, H.V.; Bui, V.-P.; Shin, O.-S. Dynamic user pairing for non-orthogonal multiple access in downlink networks. arXiv 2020, arXiv:2006.14297. [Google Scholar]
  21. Auer, G.; Blume, O.; Giannini, V.; Godor, I.; Imran, M.A.; Jading, Y.; Katranaras, E.; Olsson, M.; Sabella, D.; Skillermark, P.; et al. Energy Efficiency Analysis of the Reference Systems, Areas of Improvements and Target Breakdown; Technical Report INFSO-ICT-247733; Deliverable D2.3: Valencia, Spain, 2012; pp. 1–68. [Google Scholar]
  22. Zappone, A.; Lin, P.-H.; Jorswieck, E.A. Energy efficiency in secure multi-antenna systems. arXiv 2015, arXiv:1505.02385. [Google Scholar]
  23. Zhang, Y.; Wang, H.; Zheng, T.; Yang, Q. Energy-efficient transmission design in non-orthogonal multiple access. IEEE Trans. Veh. Technol. 2017, 66, 2852–2857. [Google Scholar] [CrossRef] [Green Version]
  24. Bjornson, E.; Sanguinetti, L.; Hoydis, J.; Debbah, M. Optimal design of energy-efficient multi-user MIMO systems: Is massive MIMO the answer? IEEE Trans. Wirel. Commun. 2015, 14, 3059–3075. [Google Scholar] [CrossRef] [Green Version]
  25. Tombaz, S.; Vastberg, A.; Zander, J. Energy- and cost-efficient ultra-high-capacity wireless access. IEEE Wirel. Commun. 2011, 18, 18–24. [Google Scholar] [CrossRef]
  26. Nguyen, V.-D.; Nguyen, H.V.; Dobre, O.A.; Shin, O.-S. A new design paradigm for secure full-duplex multiuser systems. IEEE J. Select. Areas Commun. 2018, 36, 1480–1498. [Google Scholar] [CrossRef]
  27. Nguyen, V.-D.; Duong, T.Q.; Tuan, H.D.; Shin, O.-S.; Poor, H.V. Spectral and energy efficiencies in full-duplex wireless information and power transfer. IEEE Trans. Commun. 2017, 65, 2220–2233. [Google Scholar] [CrossRef] [Green Version]
  28. Marks, B.R.; Wight, G.P. A general inner approximation algorithm for nonconvex mathematical programs. Oper. Res. 1978, 26, 681–683. [Google Scholar] [CrossRef]
  29. Nguyen, H.V.; Nguyen, V.-D.; Dobre, O.A.; Wu, Y.; Shin, O.-S. Joint antenna array mode selection and user assignment for full-duplex MU-MISO systems. IEEE Trans. Wirel. Commun. 2019, 18, 2946–2963. [Google Scholar] [CrossRef]
  30. Labit, Y.; Peaucelle, D.; Henrion, D. SEDUMI INTERFACE 1.02: A tool for solving LMI problems with SEDUMI. In Proceedings of the IEEE International Symposium on Computer Aided Control System Design, Glasgow, UK, 20 September 2002; pp. 272–277. [Google Scholar]
  31. Burkard, R.; Dell’Amico, M.; Martello, S. Assignment Problems; Society for Industrial and Applied Mathematics. 2012. Available online: https://epubs.siam.org/doi/abs/10.1137/1.9781611972238 (accessed on 21 December 2020).
  32. Cormen, T.H.; Leiserson, C.E.; Rivest, R.L.; Stein, C. Introduction to Algorithms, 2nd ed.; MIT Press: Cambridge, MA, USA, 2001. [Google Scholar]
  33. Nguyen, H.V.; Duong, Q.; Nguyen, V.-D.; Shin, Y.; Shin, O.-S. Optimization of resource allocation for underlay device-to-device communications in cellular networks. Peer-to-Peer Netw. Appl. 2016, 9, 965–977. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Energies 14 00058 g001
Figure 2. Cumulative distribution function of max-min rate.
Figure 2. Cumulative distribution function of max-min rate.
Energies 14 00058 g002
Figure 3. Average max-min rate versus power budget at BS.
Figure 3. Average max-min rate versus power budget at BS.
Energies 14 00058 g003
Figure 4. Minimum rate and percentage of power consumption with respect to power budget at BS.
Figure 4. Minimum rate and percentage of power consumption with respect to power budget at BS.
Energies 14 00058 g004
Figure 5. Power consumption versus minimum bit rate.
Figure 5. Power consumption versus minimum bit rate.
Energies 14 00058 g005
Figure 6. Power consumption versus received SNR threshold.
Figure 6. Power consumption versus received SNR threshold.
Energies 14 00058 g006
Figure 7. Minimum rate and percentage of power consumption versus SNR threshold.
Figure 7. Minimum rate and percentage of power consumption versus SNR threshold.
Energies 14 00058 g007
Figure 8. Convergence behaviors of MMR.
Figure 8. Convergence behaviors of MMR.
Energies 14 00058 g008
Table 1. Simulation Parameters.
Table 1. Simulation Parameters.
ParameterValue
Noise power spectral density−174 dBm/Hz
Radius of the cell, R100 m
Path loss from BS to UEs, PL BS , UE 128.1 + 37.6 log 10 ( d BS , UE ) dB
The nearest distance from between UEs and BS10 m
Power budget at BS, P BS max 18 dBm
Rate threshold, R ¯ k = R ¯ = R ¯ , k , K 1 bits/s/Hz
Number of UEs, K6
Number of antennas at BS, N4
SNR threshold at receivers, ρ sn 0 dB
PA efficiency at BS, ζ PA 0.3
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Nguyen, K.-H.; Nguyen, H.V.; Le, M.T.P.; Cao, T.X.; Shin, O.-S. Rate Fairness and Power Consumption Optimization for NOMA-Assisted Downlink Networks. Energies 2021, 14, 58. https://doi.org/10.3390/en14010058

AMA Style

Nguyen K-H, Nguyen HV, Le MTP, Cao TX, Shin O-S. Rate Fairness and Power Consumption Optimization for NOMA-Assisted Downlink Networks. Energies. 2021; 14(1):58. https://doi.org/10.3390/en14010058

Chicago/Turabian Style

Nguyen, Kha-Hung, Hieu V. Nguyen, Mai T. P. Le, Tuan X. Cao, and Oh-Soon Shin. 2021. "Rate Fairness and Power Consumption Optimization for NOMA-Assisted Downlink Networks" Energies 14, no. 1: 58. https://doi.org/10.3390/en14010058

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop