4.7 Article

ENERGY-EFFICIENT RESOURCE ALLOCATION IN NOMA HETEROGENEOUS NETWORKS

Journal

IEEE WIRELESS COMMUNICATIONS
Volume 25, Issue 2, Pages 48-53

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/MWC.2018.1700074

Keywords

-

Funding

  1. National Natural Science Foundation of China [61471025, 61771044]
  2. Young Elite Scientist Sponsorship Program by CAST [2016QNRC001]
  3. Research Foundation of Ministry of Education of China [MCM20170108]
  4. Beijing Municipal Natural Science Foundation [L172025]
  5. Fundamental Research Funds for the Central Universities [FRF-GF-17-A6, RC1631]
  6. China Mobile [MCM20170108]

Ask authors/readers for more resources

Non-orthogonal multiple access has attracted much recent attention due to its capability of improving the system spectral efficiency in wireless communications. Deploying NOMA in a heterogeneous network can satisfy users' explosive data traffic requirements, arid NOMA will likely play an important role in the next generation mobile communication networks. However, NOMA brings new technical challenges on resource allocation due 10 the mutual cross-tier interference in heterogeneous networks. In this article, to study the trade-off between data rate performance and energy consumption in NOMA, we examine the problem of energy-efficient user scheduling and power optimization in NOMA heterogeneous networks. The energy-efficient user scheduling and power allocation schemes are introduced for the downlink NOMA heterogeneous network for perfect and imperfect CSI, respectively. Simulation results show that the resource allocation schemes can significantly increase the energy efficiency of NOMA heterogeneous networks for cases of both perfect CSI and imperfect CSI.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Theory & Methods

Honeyword-based Authentication Techniques for Protecting Passwords: A Survey

Nilesh Chakraborty, Jianqiang Li, Victor C. M. Leung, Samrat Mondal, Yi Pan, Chengwen Luo, Mithun Mukherjee

Summary: This paper presents a comprehensive survey of honeyword-based authentication techniques, covering twenty-three techniques reported since 2013. The paper aims to help readers understand the practical workings of honeyword-based security mechanisms, compare existing techniques, and identify gaps and research opportunities.

ACM COMPUTING SURVEYS (2023)

Article Computer Science, Information Systems

Facilitating Serverless Match-based Online Games with Novel Blockchain Technologies

Feijie Wu, Ho Yin Yuen, Henry Chan, Victor C. M. Leung, Wei Cai

Summary: Applying P2P architecture to online video games has attracted attention due to its cost-saving benefits. However, issues with distributed data storage and cheating prevention have hindered its adoption. Inspired by blockchain techniques, we propose PoP, a decentralized data storage system with an anti-cheating mechanism for P2P games. Our game-theory model and experiments demonstrate the effectiveness of PoP compared to PoW.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2023)

Article Computer Science, Information Systems

IoTSL: Toward Efficient Distributed Learning for Resource-Constrained Internet of Things

Xingyu Feng, Chengwen Luo, Jiongzhang Chen, Yijing Huang, Jin Zhang, Weitao Xu, Jianqiang Li, Victor C. M. Leung

Summary: This article proposes a distributed learning framework called IoTSL for efficient cloud-edge collaboration in IoT systems. By using generative adversarial networks and differential privacy techniques, IoTSL trains local data-based generators on devices with privacy protection, reduces communication costs and alleviates the catastrophic forgetting phenomenon. Experimental results show that compared to conventional SL, IoTSL significantly reduces communication costs and efficiently alleviates the forgetting phenomenon.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Automation & Control Systems

A Kriging model-based evolutionary algorithm with support vector machine for dynamic multimodal optimization

Xunfeng Wu, Qiuzhen Lin, Wu Lin, Yulong Ye, Qingling Zhu, Victor C. M. Leung

Summary: Dynamic multimodal optimization problems (DMMOPs) require searching multiple global optimal solutions with changing objectives and constraints over time. However, DMMOPs have not received enough attention and limited studies have been done in this area. This paper proposes a Kriging Model-based Evolutionary Algorithm with Support Vector Machine (KMEA-SVM) to tackle DMMOPs by addressing the challenges induced by both multimodality and dynamics. Experimental results on twenty-four test DMMOPs demonstrate that KMEA-SVM outperforms several state-of-the-art evolutionary algorithms in seeking multiple optima in dynamic environments.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2023)

Article Engineering, Civil

Joint Secure Offloading and Resource Allocation for Vehicular Edge Computing Network: A Multi-Agent Deep Reinforcement Learning Approach

Ying Ju, Yuchao Chen, Zhiwei Cao, Lei Liu, Qingqi Pei, Ming Xiao, Kaoru Ota, Mianxiong Dong, Victor C. M. Leung

Summary: This paper proposes a deep reinforcement learning based joint secure offloading and resource allocation scheme to improve the secrecy performance and resource efficiency of multi-user vehicular edge computing networks.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Information Systems

Joint Client Selection and Bandwidth Allocation Algorithm for Federated Learning

Haneul Ko, Jaewook Lee, Sangwon Seo, Sangheon Pack, Victor C. M. Leung

Summary: In federated learning, low computing power, poor wireless channel conditions, and insufficient data can result in a long convergence time. To address this, a constrained Markov decision process (CMDP) problem is formulated to minimize the average round time while maintaining minimum numbers of trained data and trained data classes. The CMDP problem is converted into a linear programming (LP) to obtain the optimal scheduling policy. Additionally, a joint client selection and bandwidth allocation algorithm (JCSBA) is developed to reduce the curse of dimensionality in CMDP and effectively reduce the convergence time by up to 49%.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Engineering, Electrical & Electronic

Beamforming Optimization for Reconfigurable Intelligent Surface With Power Splitting Aided Broadcasting Networks

Hui Ma, Haijun Zhang, Wenyu Zhang, Victor C. M. Leung

Summary: This article investigates the use of reconfigurable intelligent surface (RIS) as a promising technology for 6G networks. The study focuses on a power splitting aided broadcasting network where one access point (AP) transmits identical messages to multiple users. By controlling reflect amplitude coefficients, the RIS is able to assist the AP while achieving power self-sustainability through energy harvesting. An algorithm based on block coordinate descent, convex approximation, and alternating direction method of multipliers techniques is proposed to optimize the AP transmit beamforming vector and the RIS reflect beamforming matrix. Simulation results demonstrate the effectiveness of the algorithm.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

Energy-Efficient Resource Allocation for Dual-NOMA-UAV Assisted Internet of Things

Zechen Liu, Xin Liu, Victor C. M. Leung, Tariq S. Durrani

Summary: In this paper, a dual-UAV-assisted IoT using non-orthogonal multiple access (NOMA) is proposed to improve IoT capacity. By optimizing communication scheduling, UAV transmit power and UAV motion parameters, energy consumption of the UAVs can be reduced while ensuring a certain throughput. The numerical results show that optimizing UAV motion parameters can effectively improve energy efficiency of UAVs, and the proposed dual-NOMA-UAV assisted IoT achieves higher energy efficiency than the OMA-UAV assisted IoT.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

RIS-UAV Enabled Worst-Case Downlink Secrecy Rate Maximization for Mobile Vehicles

Xin Liu, Yingfeng Yu, Bao Peng, Xiangping Bryce Zhai, Qiuming Zhu, Victor C. M. Leung

Summary: This paper studies secure downlink communication in worst-case scenarios where a base station communicates with a mobile vehicle with the presence of an eavesdropper. A reconfigurable intelligent surface mounted unmanned aerial vehicle (RIS-UAV) is employed as an aerial passive relay to assist the communication. The goal is to maximize the worst-case downlink secrecy rate by optimizing power allocation, RIS passive beamforming, and UAV trajectory. The formulated optimization problem is non-convex and non-smooth, and is divided into three subproblems for solution using successive convex approximation (SCA), $\mathcal {S}$-Procedure, and semidefinite relaxation (SDR). An alternating iterative optimization algorithm is proposed to obtain suboptimal solutions. Numerical simulations demonstrate the effectiveness of the proposed scheme compared to other benchmarks.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Engineering, Multidisciplinary

User Association, Subchannel and Power Allocation in Space-Air-Ground Integrated Vehicular Network With Delay Constraints

Yupei Liu, Haijun Zhang, Huan Zhou, Keping Long, Victor C. M. Leung

Summary: This paper focuses on the resource allocation problem in the space-air-ground integrated vehicular networks (SAGVN). It proposes a user association and subchannel/power allocation scheme to optimize the connection and communication performance of small cells. Edge computing is also applied to offload local tasks to improve communication performance.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Telecommunications

Energy Efficient Joint Computation Offloading and Service Caching for Mobile Edge Computing: A Deep Reinforcement Learning Approach

Huan Zhou, Zhenyu Zhang, Yuan Wu, Mianxiong Dong, Victor C. M. Leung

Summary: This paper considers the joint optimization of computation offloading, service caching, and resource allocation in a collaborative MEC system with multi-users. The problem is formulated as a Mixed-Integer Non-Linear Programming (MINLP) aiming to minimize the long-term energy consumption of the system. A Deep Deterministic Policy Gradient (DDPG) based algorithm is proposed to solve the optimization problem and determine the strategies for computation offloading, service caching, and resource allocation. Simulation results show that the proposed DDPG based algorithm can significantly reduce the long-term energy consumption of the system and outperform other benchmark algorithms in different scenarios.

IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING (2023)

Article Engineering, Civil

Temporal Correlation Characteristics of Air-to-Ground Wireless Channel With UAV Wobble

Xiaobo Yang, Daosen Zhai, Ruonan Zhang, Lei Liu, F. Richard Yu, Victor C. M. Leung

Summary: This paper proposes an A2G channel model with UAV 3D wobbles based on the geometry-based stochastic model (GBSM) and analyzes its characteristics. The study finds that even slight wobbles of UAVs can significantly affect the channel's temporal correlation. Numerical results show that the channel's correlation function decreases rapidly with increasing wobble angles and carrier frequency. This research contributes to the theoretical exploration and system design of A2G communication based on UAVs.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

Redefined decision variable analysis method for large-scale optimization and its application to feature selection

Yongfeng Li, Lingjie Li, Huimei Tang, Qiuzhen Lin, Zhong Ming, Victor C. M. Leung

Summary: This paper proposes a low-consumption redefined decision variable analysis (R-DVA) method for solving large-scale multiobjective optimization problems (LMOPs). R-DVA detects the interrelationship among convergent decision variables using a distance-based hierarchical clustering method, saving a large number of evaluations. Additionally, an evolutionary-state-oriented evolutionary (EsoE) strategy with two search models is designed to monitor the population's evolutionary state and achieve a good trade-off between convergence and diversity.

SWARM AND EVOLUTIONARY COMPUTATION (2023)

Article Computer Science, Information Systems

Nested Hash Access With Post Quantum Encryption for Mission-Critical IoT Communications

Dongyang Xu, Lei Liu, Ning Zhang, Mianxiong Dong, Victor C. M. Leung, James A. Ritcey

Summary: Protecting the initial access of IoT devices over wireless channels is challenging, especially when malicious quantum adversaries tamper critical wireless messages. We propose a nested hash access system with post-quantum encryption to solve this issue. The system encodes and decodes preambles precisely and resiliently using random repetition coding and nested hash coding on multidomain physical-layer resources.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Engineering, Electrical & Electronic

Wireless-Powered Interference Networks: Applications, Approaches, and Challenges

Kisong Lee, Hyun-Ho Choi, Woongsup Lee, Victor C. M. Leung

Summary: Interference, traditionally seen as detrimental to wireless communications, can be converted into a viable energy source for low-powered IoT devices through wireless energy harvesting. This paper introduces a wireless-powered interference network (WPIN) that proactively controls interference to improve bidirectional transmission rates. It presents an overview of WPIN applications in various wireless topologies, introduces a wireless interference harvesting protocol, and investigates coordinated resource management and beamforming schemes to improve WPIN performance. The simulation results demonstrate that properly utilizing interference decreases negative effects on information decoding and increases harvested energy, thus improving both downlink and uplink capacities.

IEEE VEHICULAR TECHNOLOGY MAGAZINE (2023)

No Data Available