Next Article in Journal
Neural Network Control Design for an Unmanned Aerial Vehicle with a Suspended Payload
Previous Article in Journal
Electro-Mechanical Design and Creep Analysis of Proposed Enclosure for Flexible Gas Insulated Line Regarding Subsurface Metropolitan Applications of High-Voltage Transmission Lines
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Robust Joint Optimization of Transmit Power and Decoding Order in Uplink NOMA Systems

Department of ICMC Convergence Technology, School of Electronic Engineering, Soongsil University, 369 Sangdo-Ro, Dongjak-Gu, Seoul 06978, Korea
*
Author to whom correspondence should be addressed.
Electronics 2019, 8(9), 930; https://doi.org/10.3390/electronics8090930
Submission received: 20 July 2019 / Revised: 19 August 2019 / Accepted: 20 August 2019 / Published: 25 August 2019
(This article belongs to the Section Microwave and Wireless Communications)

Abstract

:
We consider a robust design problem for achieving max-min fairness amongst users in an uplink non-orthogonal multiple access system under imperfect channel state information. Contrary to the conventional approach adopted in the literature, we propose an optimal decoding order-based successive interference cancellation technique by introducing new binary variables, which results in a difficult class of mixed-integer nonconvex optimization problem. For a practical application, we devise an efficient suboptimal solution based on the inner convex approximation framework, which solves a second-order-cone program at each iteration. Simulation results are provided to demonstrate its performance gain over state-of-the-art designs. The proposed design also yields data rates close to those obtained by an exhaustive search method.

1. Introduction

Power domain non-orthogonal multiple access (NOMA) has recently been recognized as a promising solution for next generation of mobile communications, due to its capability of delivering higher throughput, improved reliability and increased spectral efficiency [1,2]. Contrary to the well-known water-filling method, NOMA aims at concurrently allocating different power levels to the users over the same spectrum. In particular, NOMA tends to allocate more power to the users with poorer channel conditions to guarantee the user fairness, while users in better channel conditions benefit from canceling the strong interference by using a successive interference cancellation (SIC) technique [3].
In downlink NOMA systems, SIC technique should be performed at users who have high processing power, especially in the case that the number of users in one resource block is large. However, the probability of successful implementation of SIC may decrease gradually when the number of users increases [4]. Therefore, a popular technique used in downlink NOMA systems is either to pair two users or to group a few users into one cluster with distinct channel conditions.
Compared to downlink NOMA, there has been less attention on uplink (UL) NOMA (see [2] and references therein). In a typical scenario of two-user uplink NOMA (i.e., users i and j), SIC is carried out at the base station (BS) to detect the signal of user i first by treating user j’s signal as interference. By using the SIC technique, it re-encodes the recovered signal and subtracts the interference imposed by user i before decoding the user j’s signal. It is evident that the SIC decoding order has a strong impact on the individual rate. The works in [5,6] considered a random decoding order with respect to the users’ indices, leading to a suboptimal solution. Recently, the users’ descending channel gain-based decoding order has been widely investigated in [7,8,9,10,11], which has the advantage in terms of fairness. In this scheme, the signal of user with the strongest channel gain is decoded first and the signal of user with the weakest channel gain is decoded last. For the case of perfect channel state information (CSI), the strongest user can transmit with full power, while the throughput of the weakest user is clearly improved due to no multiuser interference (MUI). However, these results do not hold true when imperfect CSI is taken into account. The reason is that the strongest user may not be able to transmit with full power due to the additional term appearing in the denominator of the signal-to-interference-plus-noise ratio (SINR) function caused by the channel estimation error. To the authors’ best knowledge, optimization of individual rates of UL-NOMA systems taking the imperfect CSI into account has not been investigated.
In this paper, we formulate a novel optimization problem to maximize the minimum data rate among all users in the UL-NOMA system. Unlike the aforementioned works, the problem of interest considers the following completely new issues: (i) a joint uplink users’ decoding order and power control is investigated to better exploit different channel conditions, which is done by introducing binary association variables; and ( i i ) imperfect channel state information (CSI) due to estimation inaccuracies is taken into account. In addition, the MUI cannot be completely removed by SIC, and thus a robust receiver together with an efficient power control method is crucial to guarantee user fairness. Even for a fixed decoding order, the resulting problem is known to be NP-hard, and, thus, is nonconvex. We first derive an optimal decoder based on the minimum mean-square error and SIC (MMSE-SIC) at the BS to arrive at the robust design problem. To approximately solve this problem, we relax binary association variables to be continuous and develop a low-complexity iterative algorithm based on the inner approximation (IA) framework [12,13], which can be transformed into a second-order cone programming (SOCP) at each iteration. The proposed algorithm is proved to converge monotonically to at least locally optimal solution of the continuous relaxation problem. Finally, extensive numerical results are provided to confirm that our proposed approach is efficient in terms of the rate fairness and robustness against the estimation error under imperfect CSI.
Notation: X T , X H and tr ( X ) are the transpose, Hermitian transpose and trace of a matrix X , respectively. · denotes the Euclidean norm of a matrix or vector, while | · | stands for the absolute value of a complex scalar. E [ · ] and { · } denote the statistical expectation and the real part of the argument, respectively. x CN ( η , Γ ) represents a random vector x following a complex circularly symmetric Gaussian distribution with mean η and covariance matrix Γ . 1 m × n denotes the m × n matrix of all ones.

2. System Model

This section describes UL-NOMA system model and formulates an optimization problem for achieving max-min fairness among all users.

2.1. Signal Model

In a UL system, as illustrated in Figure 1, we consider a BS equipped with N antennas serving a set of K single-antenna UL users, denoted by K { 1 , 2 , , K } . Assuming a frequency-flat fading channel, the received signal at the BS is
y = k K p k h k x k + n ,
where h k C N × 1 is the channel vector from the kth UL user, denoted by U k , to the BS; p k and x k with E { | x k | 2 } = 1 are the transmission power coefficient and the transmit data symbol of U k , respectively; and n CN ( 0 , σ 2 I ) is the additive white Gaussian noise at the BS.
Let us introduce binary association variables α k { 0 , 1 } to represent the SIC decoding order at the BS as
α k = { 1 , if   the   U k s   message   is   successfully   decoded   prior   to   the   U s   one   , k , 0 , otherwise .
By following the NOMA principle, the following constraints must be satisfied:
α k k = 0 , k K ,
α k + α k = 1 , k , k , K ,
| 1 1 × K α k 1 1 × K α k | 1 , k k , k , k K ,
where α k [ α k 1 , , α k K ] T { 0 , 1 } K . From Equation (2) and by applying MMSE-SIC receiver [14], the data rate of U k can be written as
R k ( α , p ) = ln 1 + γ k ( α , p ) , k K ,
where the SINR is defined by
γ k ( α , p ) = p k 2 h k H Φ k ( α , p ) 1 h k , k K ,
with Φ k ( α , p ) K α k p 2 h h H + σ 2 I , α { α k } k , K , and p { p k } k K . It is worth mentioning that the interference-plus-noise matrix experienced by U k is simplified to Φ k ( p ) = = k + 1 K p 2 h h H + σ 2 I , k K , if the SIC decoding order is assumed to be from 1 to K [14].

2.2. CSI Model

For imperfect CSI, each channel vector h k is modeled as h k = h ¯ k + Δ h k , where h ¯ k is the channel estimate and Δ h k is the CSI error due to estimation inaccuracies. In this paper, we assume that Δ h k is independent of h ¯ k and distributed as Δ h k CN ( 0 , ε k 2 I ) , where ε k 2 is the variance of the CSI error and assumed to be known a priori [15]. Since Δ h k is unbounded, the actual rate R k ( α , p ) cannot be considered as a design metric. Toward a robust design, we consider the following worst-case achievable rate of U k :
R ¯ k ( α , p ) = min h k H k R k ( α , p ) , k K ,
where H k { h k | h k = h ¯ k + Δ h k , Δ h k CN ( 0 , ε k 2 I ) } .

3. Problem Formulation

3.1. Optimization Problem Formulation

We are interested in the robust optimization problem for achieving rate fairness, which can be mathematically expressed as
max α , p min k K R ¯ k ( α , p )
s . t . p k 2 P k max , k K ,
α { 0 , 1 } K × K ,
α k k = 0 , k K ,
α k + α k = 1 , k , k , K ,
| 1 1 × K α k 1 1 × K α k | 1 , k k , k , k K ,
where P k max is the transmit power budget of U k . Herein, Equation (7b) represents the power constraint at each user while the constraints in Equations (7c)–(7f) guarantee the SIC-based decoding order for K users. The constraint in Equation (7e) is a direct result from Equation (2). In addition, the constraint in Equation (7f) is sufficient condition to ensure that the BS will decode a single signal at each iteration, which can be explained intuitively as follows. Assuming that BS decodes the signals following the order from U 1 to U K . The optimal values of α should have the following form:
α 1 , 1 α 1 , 2 α 1 , K α 2 , 1 α 2 , 2 α 2 , K α K , 1 α K , 2 α K , K = 0 1 1 0 0 1 0 0 0 .
It can be seen that the object in Equation (7a) is a non-concave and non-smooth function and Equation (7f) is also a non-convex constraint, which result in the mixed-integer non-convex optimization problem in Equation (7).

3.2. Relations to Exhaustive Search and Random SIC

Exhaustive Search

With K users, there are K ! possible cases of decoding order, in which the following subproblem for given α :
max p min k K R ¯ k ( p | α )
s . t . p k 2 P k max , k K ,
corresponds to one possible case. In other words, it requires to solve K ! subproblems of Equation (8), and the final optimal solution corresponds to the solution of the subproblem having the highest objective value. It is clear that the exhaustive search method can provide the global optimal solution, but its computational complexity is extremely high, especially when K increases. Thus, the solution of Equation (8) is considered the benchmark (an upper bound) for our considered problem.
On the other hand, the random decoding order at the BS, so-called random SIC, is widely used in [14,16] due to its low complexity. Clearly, the optimization problem based on random SIC is a subproblem of Equation (8), which can be stated as:
max p min k K R ¯ k ( p )
s . t . p k 2 P k max , k K ,
where R ¯ k ( p ) is derived from R ¯ k ( p | α ) for a random value of α .
It can be foreseen that the two problems in Equations (8) and (9) are also non-convex due to their non-concave objective functions. However, the solutions for these two problems can be found by applying the proposed algorithm for solving Equation (7) presented shortly, after some slight modifications.

4. Proposed Method for Solving Equation (7)

In this section, we derive an optimal MMSE-SIC receiver to further simplify the worst-case achievable rate in Equation (6) and then propose an IA-based algorithm to solve the resulting nonconvex problem.

4.1. Robust MMSE-SIC Receiver

We first derive an optimal MMSE-SIC receiver to further simplify Equation (6). Let y ¯ k C N × 1 and r k C N × 1 be the post-SIC signal and the output of the optimal MMSE-SIC receiver corresponding to U k under imperfect CSI, respectively.
Lemma 1.
The optimal MMSE-SIC receiver r k can be obtained by solving
r k = arg min r k E | x k r k H y ¯ k | 2 , k K ,
which is given as
r k = p k ( p k 2 h ¯ k h ¯ k H + Φ ¯ k ( α , p ) ) 1 h ¯ k , k K ,
where Φ ¯ k ( α , p ) K α k p 2 h ¯ h ¯ H + K p 2 ε 2 I + σ 2 I . By treating CSI errors as noise, the worst-case achievable rate of U k in Equation (6) can be re-expressed as
R ¯ k ( α , p ) = ln 1 + γ ¯ k ( α , p ) , k K ,
where
γ ¯ k ( α , p ) = p k 2 h ¯ k H Φ ¯ k ( α , p ) 1 h ¯ k , k K .
Proof. 
The proof of Lemma 1 is given in Appendix A. □

4.2. Proposed IA-Based Algorithm

To tackle the discrete part of Equation (7), we first relax binary variables to be continuous, which is a standard step in solving a mixed-integer problem. To this end, we consider the following continuous relaxation of Equation (7):
max α , p min k K R ¯ k ( α , p )
s . t . 0 α k 1 , k , K ,
p k 2 P k max , k K ,
α k k = 0 , k K ,
α k + α k = 1 , k , k , K ,
| 1 1 × K α k 1 1 × K α k | 1 , k k , k , k K ,
which can be rewritten equivalently as
max α , p , ν ν
s . t . R ¯ k ( α , p ) ν , k K ,
0 α k 1 , k , K ,
p k 2 P k max , k K ,
α k k = 0 , k K ,
α k + α k = 1 , k , k , K ,
| 1 1 × K α k 1 1 × K α k | 1 , k k , k , k K ,
where ν is a newly introduced variable. It can be easily foreseen that Equation (15b) must hold with equality at optimum, leading to the equivalence between Equations (14) and (15). Since the objective is monotonic in its argument, we now focus on convexifying the nonconvex constraints in Equations (15b) and (15g).
Convex approximation of the constraint in Equation (15b): Let ( α ( i ) , p ( i ) ) be a feasible point found at iteration i of the proposed IA algorithm presented shortly. By customizing the inequality [16] (Equation (20)) a global lower bound of R ¯ k ( α , p ) is given by
R ¯ k ( α , p ) A k ( i ) + B k ( i ) p k C k ( i ) ( α , p ) , k K ,
where
A k ( i ) ln 1 + γ ¯ k ( α ( i ) , p ( i ) ) γ ¯ k ( α ( i ) , p ( i ) ) , B k ( i ) 2 γ ¯ k ( α ( i ) , p ( i ) ) / p k ( i ) , C k ( i ) ( α , p ) p k 2 h ¯ k H Θ k ( i ) h ¯ k + K α k p 2 h ¯ H Θ k ( i ) h ¯ + K p 2 ε 2 tr ( Θ k ( i ) ) + σ 2 tr ( Θ k ( i ) ) ,
with
Θ k ( i ) ( Φ ¯ k ( i ) ) 1 ( p k ( i ) ) 2 h ¯ k h ¯ k H + Φ ¯ k ( i ) 1 , Φ ¯ k ( i ) K α k ( i ) ( p ( i ) ) 2 h ¯ h ¯ H + K ( p ( i ) ) 2 ε 2 I + σ 2 I .
We note that A k ( i ) and B k ( i ) are constant, while C k ( i ) ( α , p ) is a nonconvex function due to the product of α k p 2 , leading to a non-concavity of the right-hand side of Equation (16). We now introduce new variables τ { τ k } k K to iteratively replace Equation (15b) by
{ (17a) A k ( i ) + B k ( i ) p k C k ( i ) ( α , p , τ ) ν , k K , (17b) p k 2 τ k P k max , k K ,
where
C k ( i ) ( α , p , τ ) p k 2 h ¯ k H Θ k ( i ) h ¯ k + K α k τ h ¯ H Θ k ( i ) h ¯ + K p 2 ε 2 tr ( Θ k ( i ) ) + σ 2 tr ( Θ k ( i ) ) .
From [17] (Equation (B.1)) we make use of inequality
α k τ α k ( i ) 2 τ ( i ) τ 2 + τ ( i ) 2 α k ( i ) α k 2 , k , K ,
to convexify Equation (17a) as
R ¯ k ( i ) ( α , p , τ ) A k ( i ) + B k ( i ) p k C ¯ k ( i ) ( α , p , τ ) ν , k K ,
where
C ¯ k ( i ) ( α , p , τ ) p k 2 h ¯ k H Θ k ( i ) h ¯ k + K α k ( i ) 2 τ ( i ) τ 2 + τ ( i ) 2 α k ( i ) α k 2 h ¯ H Θ k ( i ) h ¯ + K p 2 ε 2 tr ( Θ k ( i ) ) + σ 2 tr ( Θ k ( i ) ) .
Note that R ¯ k ( i ) ( α , p , τ ) is concave and satisfies R ¯ k ( i ) ( α ( i ) , p ( i ) , τ ( i ) ) = R ¯ k ( α ( i ) , p ( i ) ) .
Convex approximation of constraint in Equation (15g): We note that Equation (15g) is a nonconvex constraint due to the quasi-convexity of the left-hand side. Herein, we define b k 1 1 × K α k and b k 1 1 × K α k to rewrite Equation (15g) equivalently as
| b k b k | = 2 max ( b k , b k ) ( b k + b k ) 1 , k , k K .
To overcome the nonsmooth function max ( b k , b k ) , we consider the following lower bound:
max ( b k , b k ) 1 Ω ln exp ( Ω b k ) + exp ( Ω b k ) ln ( 2 ) ψ ( b k , b k ) ,
which is done by using the smooth approximation via the log-sum-exp function with Ω being a predefined positive large number. In Equation (22), ψ ( b k , b k ) is a convex function with respect to ( b k , b k ) , which can be easily proved by checking its Hessian matrix. By using the IA method, we iteratively replace Equation (21) by the following convex constraint:
ψ ( i ) ( b k , b k ) 1 2 ( b k + b k + 1 ) , k k , k , k K ,
where
ψ ( i ) ( b k , b k ) ψ ( b k ( i ) , b k ( i ) ) + exp ( Ω b k ( i ) ) b k b k ( i ) exp ( Ω b k ( i ) ) + exp ( Ω b k ( i ) ) + exp ( Ω b k ( i ) ) b k b k ( i ) exp ( Ω b k ( i ) ) + exp ( Ω b k ( i ) )
is the lower bound concave function of ψ ( b k , b k ) at the feasible point ( b k ( i ) , b k ( i ) ) = ( 1 1 × K α k ( i ) , 1 1 × K α k ( i ) ) .
Summing up, the approximate convex program of Equation (14) solved at iteration ( i + 1 ) is given by
max α , p , ν , τ ν
s . t . p k 2 τ k P k max , k K ,
0 α k , 1 , k , K ,
α k k = 0 , k K ,
α k + α k = 1 , k , k , K ,
R ¯ k ( i ) ( α , p , τ ) ν , k , K ,
ψ ( i ) ( b k , b k ) 1 2 ( b k + b k + 1 ) , k k .
We note that the problem in Equation (25) can be cast as an SOCP since all the constraints are linear and quadratic.
Convergence and complexity analysis: After solving the problem in Equation (25) at each iteration, the involved variables are updated for the next iteration until convergence. Since the approximate functions in Equations (19) and (23) satisfy the IA properties presented in [13], the non-decreasing sequence of the objective values in Equation (25a) is not difficult to see (i.e., ν ( i + 1 ) ν ( i ) ). In addition, the proposed iterative algorithm is guaranteed to converge due to the limited transmit power. Following the same convergence analysis in [13], we can prove that the optimal solution obtained from Equation (25) satisfies the Karush–Kuhn–Tucker (KKT) conditions of Equation (14). The problem in Equation (25) has ( K + 1 ) 2 real variables and 4 K 2 + 2 K conic constraints. Then, the worst-case per-iteration complexity for solving Equation (25) is O 4 K 2 + 2 K ( K 2 + 2 K ) 3 .
Recovering binary solution from continuous relaxation: We have numerically observed that some relaxed association variables obtained from solving Equation (25) do not take binary values. To guarantee the feasibility of Equation (7), we further consider a post-processing. We first introduce the rounding process, i.e., α k = α k ( i ) + 1 2 , to obtain exact binary values of the association variables, and then re-run the algorithm with fixed α to find the optimal solution of p by solving the following convex program:
max p , ν ν
s . t . p k 2 P k max , k K ,
A k ( i ) + B k ( i ) p k C k ( i ) ( p ) ν , k K .
The proposed method for solving Equation (7) is summarized in Algorithm 1.
Algorithm 1 Proposed IA-based Algorithm for Solving Equation (7)
Initialization: 
Set i : = 0 and generate feasible initial points ( α ( 0 ) , p ( 0 ) , τ ( 0 ) ) .
Phase-1: 
Solving continuous relaxation problem in Equation (14)
1:
repeat
2:
  Solve Equation (25) to obtain the optimal solution ( α , p , τ ) .
3:
  Update ( α ( i + 1 ) , p ( i + 1 ) , τ ( i + 1 ) ) = ( α , p , τ ) .
4:
  Set i : = i + 1 .
5:
until Convergence
6:
Output-1: ( p , τ , α ) = ( p ( i ) , τ ( i ) , α ( i ) ) .
Phase-2: 
Recovering binary solution for Equation (7)
7:
Set α k = α k ( i ) + 1 2 , k , K .
8:
Run Steps 1–5 again to find p with α found in Step 7 (replace Equation (25) in Step 2 by Equation (26)).
9:
Output-2: ( p , α )

5. Numerical Results

In this section, we demonstrate the effectiveness of the proposed method by using SeDuMi solver in MATLAB environment. We consider a small-cell network with a centered-BS serving K = 4 users, which are randomly and uniformly distributed in the area from 10 m to 100 m. The path loss (in dB) from a user to BS is modeled as PL dB = 145.4 + 37.5 log 10 ( d ) , where d is the distance in meters. The signal bandwidth and noise power spectral density are set to 10 MHz and 174 dBm/Hz, respectively. All the users are assumed to use the same power budget, i.e., P k max = P max , k K . The variance of the CSI errors is modeled as ε k 2 μ ξ k θ ( k K ) , where μ , θ 0 capture a variety of CSI acquisition schemes and ξ k denotes the SNR of the kth link [15]. For performance comparison, “Exhaustive search” and “Random SIC” schemes (i.e., (8) and (9)) are considered. In addition, the SIC decoding order based on the descending channel gains, called “SIC-channel gain” for short, is also investigated [18].
We evaluate the effect of imperfect CSI on different resource allocation schemes as a function of μ for N = 4 in Figure 2a and N = 8 in Figure 2b. As expected, Algorithm 1 yields the max-min rate very close to the exhaustive search method, especially for a small μ . However, we note that the exhaustive search method requires solving L ! subproblems of the power control, which is computationally expensive even for networks of small-to-medium size, and thus it only acts as a benchmark. As can be seen, the proposed algorithm significantly outperforms the random SIC and SIC-channel gain schemes. For μ = 0 corresponding to the case of perfect CSI, the SIC-channel gain offers better user fairness compared to the random SIC, and performs close to the proposed algorithm when N = 8 . However, the performance of this scheme drops quickly in the case of imperfect CSI (i.e., μ > 0 ) and tends to worse than that of other schemes. This also supports our statement given in Section 1. Another observation is that the post-processing procedure (i.e., Step 8 in Algorithm 1) is needed to refine the optimal solution.
In Figure 3, we demonstrate the robustness of Algorithm 1. Herein, “Non-Robust” refers to the problem in Equation (7), where we use the presumed CSIs h ¯ k , k K (rather than the true ones) to compute the solutions and then evaluate the resultant worst-case achievable rate. We can see that the proposed algorithm achieves much better max-min rate performance compared to the non-robust design. Moreover, the performance gap is found to rapidly increase as P max increases.
In Figure 4, we show the impact of the number of users on the system performance. We have numerically observed that the exhaustive search method may be infeasible in terms of the computational complexity when K 6 due to the requirement of solving K ! subproblems of the power control. It can be seen that the average max-min rates of all the considered schemes are dramatically degraded as K increases. Again, our proposed algorithm provides better performance compared to random SIC and SIC-channel gain, and its performance gains are even more higher when K is relatively large. This result further confirms the importance of jointly optimizing SIC decoding order.
Figure 5 illustrates the average max-min rate versus P max . We note that increasing P max also results in a strong severe interference situation. Thus, when P max becomes larger, the performance gain of the proposed scheme over the random SIC one is more remarkable, thanks to the optimal SIC decoding order. Figure 6 plots the cumulative distribution functions (CDFs) of the max-min rate. Again, the proposed scheme tends to outperform the random SIC scheme when the number of receive antennas is relatively small.

6. Conclusions

We propose a novel optimization problem of maximizing the minimum rate among all users by jointly considering users’ decoding order and transmit power in a UL-NOMA system. The IA-based algorithm has been developed to solve the nonconvex optimization problem, which can be cast as an SOCP. Numerical results reveal that the proposed algorithm is very efficient in the scenario of strong network interference. In addition, the robustness of the proposed design against CSI errors was confirmed.

Author Contributions

Conceptualization, V.-P.B., H.V.N. and V.-D.N.; methodology, V.-P.B. and V.-D.N.; software, V.-P.B. and H.V.N.; validation, V.-P.B., H.V.N., V.-D.N. and O.-S.S.; formal analysis, V.-P.B., H.V.N. and V.-D.N.; investigation, V.-P.B., H.V.N. and V.-D.N.; resources, O.-S.S.; data curation, V.-P.B., H.V.N. and V.-D.N.; writing—original draft preparation, V.-P.B.; writing—review and editing, H.V.N., V.-D.N. and O.-S.S.; visualization, V.-P.B. and V.-D.N.; supervision, O.-S.S.; project administration, V.-D.N. and O.-S.S.; and funding acquisition, O.-S.S.

Funding

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (No. 2017R1D1A1B03030436).

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ICMCInformation Communication, Materials, and Chemistry Convergence
NOMANon-orthogonal multiple access
SICSuccessive interference cancellation
ULUplink
BSBase station
NP-HardNon-deterministic polynomial-time hard
MMSEMinimum mean-square error
IAInner approximation
SOCPSecond-order cone programming
SINRSignal-to-interference-plus-noise ratio
KKTKarush–Kuhn–Tucker
CSIChannel state information
CDFCumulative distribution function

Appendix A

We note that a detailed analysis for Lemma 1 with similar structure can be found, e.g., in Appendix C of [19]. However, to be self-contained, we follow the same steps as those in [19] but customize them to our considered problem. It follows from r k = arg min r k E | x k r k H y ¯ k | 2 that
r k = arg min r k { 1 2 p k r k H h ¯ k + r k H C k r k } ,
where C k E { y ¯ k y ¯ k H } = p k 2 h ¯ k h ¯ k H + Φ ¯ k ( α , p ) . Then, r k in Equation (11) is easily found by solving
r k { 1 2 p k r k H h ¯ k + r k H C k r k } = 0 ,
which is achieved at r k = p k C k 1 h ¯ k , as shown in Equation (11). Next, by treating CSI errors as noise, the SINR of U k can be expressed as
γ ¯ k ( α , p ) = p k 2 r k H h ¯ k h ¯ k H r k r k H Φ ¯ k ( α , p ) r k .
As a result, we can further simplify γ ¯ k ( α , p ) as
γ ¯ k ( α , p ) = ( 1 p k 2 h ¯ k H C k 1 h ¯ k ) 1 1 .
Making use of the Woodbury matrix identity to have
1 p k 2 h ¯ k H C k 1 h ¯ k = 1 + p k 2 h ¯ k H ( Φ ¯ k ( α , p ) ) 1 h ¯ k 1 ,
we arrive at the compact form of SINR in Equation (13).

References

  1. Ding, Z.; Liu, Y.; Choi, J.; Sun, Q.; Elkashlan, M.I.C.; Poor, H. Application of Non-Orthogonal Multiple Access in LTE and 5G Networks. IEEE Commun. Mag. 2017, 55, 185–191. [Google Scholar] [CrossRef]
  2. Liu, Y.; Qin, Z.; Elkashlan, M.; Ding, Z.; Nallanathan, A.; Hanzo, L. Nonorthogonal Multiple Access for 5G and Beyond. Proc. IEEE 2017, 105, 2347–2381. [Google Scholar] [CrossRef] [Green Version]
  3. Nguyen, V.N.; Tuan, H.; Duong, T.; Poor, H.; Shin, O. Precoder Design for Signal Superposition in MIMO-NOMA Multicell Networks. IEEE J. Sel. Areas Commun. 2017, 35, 2681–2695. [Google Scholar] [CrossRef]
  4. Muller, R. Power and Bandwidth Efficiency of Multiuser Systems with Random Spreading; Shaker: Aachen, Germany, 1999. [Google Scholar]
  5. Ding, Z.; Schober, R.; Poor, H. A General MIMO Framework for NOMA Downlink and Uplink Transmission Based on Signal Alignment. IEEE Trans. Wirel. Commun. 2016, 15, 4438–4454. [Google Scholar] [CrossRef]
  6. Wang, H.; Leung, S.; Song, R. Precoding Design for Two-Cell MIMO-NOMA Uplink with CoMP Reception. IEEE Commun. Lett. 2018, 22, 2607–2610. [Google Scholar] [CrossRef]
  7. Gao, Y.; Xia, B.; Xiao, K.; Chen, Z.; Li, X.; Zhang, S. Theoretical Analysis of the Dynamic Decode Ordering SIC Receiver for Uplink NOMA Systems. IEEE Commun. Lett. 2017, 21, 2246–2249. [Google Scholar] [CrossRef]
  8. Pischella, M.; Le Ruyet, D. NOMA-Relevant Clustering and Resource Allocation for Proportional Fair Uplink Communications. IEEE Wirel. Commun. Lett. 2019, 8, 873–876. [Google Scholar] [CrossRef]
  9. Salehi, M.; Tabassum, H.; Hossain, E. Meta Distribution of SIR in Large-Scale Uplink and Downlink NOMA Networks. IEEE Trans. Commun. 2019, 67, 3009–3025. [Google Scholar] [CrossRef]
  10. Ali, M.; Tabassum, H.; Hossain, E. Dynamic User Clustering and Power Allocation for Uplink and Downlink Non-Orthogonal Multiple Access (NOMA) Systems. IEEE Access 2016, 4, 6325–6343. [Google Scholar] [CrossRef]
  11. Wang, H.; Zhang, R.; Song, R.; Leung, S. A Novel Power Minimization Precoding Scheme for MIMO-NOMA Uplink Systems. IEEE Commun. Lett. 2018, 22, 1106–1109. [Google Scholar] [CrossRef]
  12. Marks, B.; Wright, G. Technical Note—A General Inner Approximation Algorithm for Nonconvex Mathematical Programs. Oper. Res. 1978, 26, 681–683. [Google Scholar] [CrossRef]
  13. Beck, A.; Ben-Tal, A.; Tetruashvili, L. A sequential parametric convex approximation method with applications to nonconvex truss topology design problems. J. Glob. Optim. 2009, 47, 29–51. [Google Scholar] [CrossRef]
  14. Tse, D.; Viswanath, P. Fundamentals of Wireless Communication; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  15. Maurer, J.; Jalden, J.; Seethaler, D.; Matz, G. Vector Perturbation Precoding Revisited. IEEE Trans. Signal Proc. 2011, 59, 315–328. [Google Scholar] [CrossRef]
  16. Nguyen, V.; Duong, T.; Tuan, H.; Shin, O.; Poor, H. Spectral and Energy Efficiencies in Full-Duplex Wireless Information and Power Transfer. IEEE Trans. Commun. 2017, 65, 2220–2233. [Google Scholar] [CrossRef]
  17. Nguyen, V.; Nguyen, H.; Dobre, O.; Shin, O. A New Design Paradigm for Secure Full-Duplex Multiuser Systems. IEEE J. Sel. Areas Commun. 2018, 36, 1480–1498. [Google Scholar] [CrossRef]
  18. Islam, S.; Durrani, S.; Sadeghi, P. A novel user pairing scheme for functional decode-and-forward multi-way relay network. Phys. Commun. 2015, 17, 128–148. [Google Scholar] [CrossRef] [Green Version]
  19. Nguyen, H.; Nguyen, V.; Dobre, O.; Wu, Y.; Shin, O. Joint Antenna Array Mode Selection and User Assignment for Full-Duplex MU-MISO Systems. IEEE Trans. Wirel. Commun. 2019, 18, 2946–2963. [Google Scholar] [CrossRef]
Figure 1. Illustration of a UL-NOMA system with assumption that the decoding order is from U 1 to U K . A BS with N antennas serves K single-antenna users.
Figure 1. Illustration of a UL-NOMA system with assumption that the decoding order is from U 1 to U K . A BS with N antennas serves K single-antenna users.
Electronics 08 00930 g001
Figure 2. Comparison of different schemes in terms of average max-min rate ( P max = 18 dBm and θ = 1 ) .
Figure 2. Comparison of different schemes in terms of average max-min rate ( P max = 18 dBm and θ = 1 ) .
Electronics 08 00930 g002
Figure 3. Improvement of average max-min rate based on robust design ( μ = 4 and θ = 1 ).
Figure 3. Improvement of average max-min rate based on robust design ( μ = 4 and θ = 1 ).
Electronics 08 00930 g003
Figure 4. Average max-min rate versus the number of users ( P max = 18 dBm, N = 4 , μ = 4 and θ = 1 ) .
Figure 4. Average max-min rate versus the number of users ( P max = 18 dBm, N = 4 , μ = 4 and θ = 1 ) .
Electronics 08 00930 g004
Figure 5. Average max-min rate versus P max with different schemes ( N = 4 , μ = 4 and θ = 1 ).
Figure 5. Average max-min rate versus P max with different schemes ( N = 4 , μ = 4 and θ = 1 ).
Electronics 08 00930 g005
Figure 6. CDF of max-min rate performance ( P max = 18 dBm , μ = 2 and θ = 1 ).
Figure 6. CDF of max-min rate performance ( P max = 18 dBm , μ = 2 and θ = 1 ).
Electronics 08 00930 g006

Share and Cite

MDPI and ACS Style

Bui, V.-P.; Nguyen, H.V.; Nguyen, V.-D.; Shin, O.-S. Robust Joint Optimization of Transmit Power and Decoding Order in Uplink NOMA Systems. Electronics 2019, 8, 930. https://doi.org/10.3390/electronics8090930

AMA Style

Bui V-P, Nguyen HV, Nguyen V-D, Shin O-S. Robust Joint Optimization of Transmit Power and Decoding Order in Uplink NOMA Systems. Electronics. 2019; 8(9):930. https://doi.org/10.3390/electronics8090930

Chicago/Turabian Style

Bui, Van-Phuc, Hieu V. Nguyen, Van-Dinh Nguyen, and Oh-Soon Shin. 2019. "Robust Joint Optimization of Transmit Power and Decoding Order in Uplink NOMA Systems" Electronics 8, no. 9: 930. https://doi.org/10.3390/electronics8090930

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop