Hybrid Heuristic-Waterfilling Game Theory Approach in MC

1
Hybrid Heuristic-Waterfilling Game Theory
Approach in MC-CDMA Resource Allocation
Lucas Dias H. Sampaio, Taufik Abrão, Bruno A. Angélico, Moisés Fernando Lima, Mario Lemes Proença Jr., and
Paul Jean E. Jeszensky
Abstract—This paper discusses the power allocation with fixed
rate constraint problem in multi-carrier code division multiple
access (MC-CDMA) networks, that has been solved through
game theoretic perspective by the use of an iterative waterfilling algorithm (IWFA). The problem is analyzed under various
interference density configurations, and its reliability is studied in
terms of solution existence and uniqueness. Moreover, numerical
results reveal the approach shortcoming, thus a new method
combining swarm intelligence and IWFA is proposed to make
practicable the use of game theoretic approaches in realistic
MC-CDMA systems scenarios. The contribution of this paper
is twofold: i) provide a complete analysis for the existence and
uniqueness of the game solution, from simple to more realist
and complex interference scenarios; ii) propose a hybrid power
allocation optimization method combining swarm intelligence,
game theory and IWFA. To corroborate the effectiveness of
the proposed method, an outage probability analysis in realistic
interference scenarios, and a complexity comparison with the
classical IWFA are presented.
Index Terms—Power-rate allocation control; SISO multi-rate
MC-CDMA; Game Theory; iterative water-filling algorithm;
QoS.
I. I NTRODUCTION
In the last years the telecommunications scenario has been
passing through a huge increase in traffic demand due to
the arrival of new devices and services. In this context, the
multiple access networks represent an important solution,
once these systems can admit more users and, at the same
time, achieve a higher throughput than other technologies.
Thus, a specific multiple access system draws the attention of
many researchers nowadays: the MC-CDMA networks. Even
with all these avails, since all users transmit at the same
time and in the same spectrum a resource allocation scheme
must be adopted in order to guarantee acceptable quality of
service (QoS) requirements, associated with minimum rates,
maximum allowed delay, maximum permitted bit error rate
(BER) and so forth.
A. Motivation
The study of resource allocation problems in wireless networks have been discussed for many years due to its impacts in
This work was supported in part by the National Council for Scientific and
Technological Development (CNPq) of Brazil under Grant 303426/2009-8.
L. H. Sampaio, Taufik Abrão, Moisés Fernando Lima, and Mario Lemes
Proença Jr. are with Computer Science Department, State University of
Londrina, PR, 86051-990, Brazil. E-mails: [email protected];
[email protected]; [email protected]; [email protected].
Bruno A. Angélico is with Federal Technological University of Paraná. PR,
Brazil. E-mail: [email protected]
Paul Jean E. Jeszensky is with Escola Politécnica of University of São
Paulo. SP, Brazil. E-mail: [email protected]
companies profits and users satisfaction. Additionally, current
technologies do not provide enough bandwidth at low operational costs for corporations which also affects their customers.
So, a practical resource allocation scheme is desirable in order
to save power1 , increase the throughput and guarantee the QoS.
B. Related Work
Several studies have been conducted in recent years in
order to find good resource allocation algorithms. Within this
context, some works may be highlighted [1]–[9].
The distributed power control algorithm (DPCA) proposed
in [1] is considered the base of many well known DPCAs. In
[2] a multi-objective resource allocation scheme is presented.
The algorithm considers three different non-linear parameters
that weight the procedure goals: minimize the power, guarantee the QoS (in terms of target rate) and maximize the rate. In
addition, a DPCA for single-rate [3] and multi-rate networks
[4] inspired on Verhulst equilibrium analytical-iterative model
is proposed in order to solve the power allocation with rate
constraints problem in DS/CDMA networks.
On the other hand, heuristic approach based on swarm
intelligence was applied to solve the power allocation with
rate constraints [5] and the rate maximization problem [6].
Besides, the total network power minimization problem subject to multi-class information rate constraints, as well as the
problem of throughput maximization constrained to power
limitation were analyzed in [7] applying swarm intelligence.
The motivation to use heuristic search algorithms is due to the
nature of the NP complexity posed by the wireless network
optimization problems. The challenge is to obtain suitable
performances in solving those hard complexity problem in a
polynomial time.
Previous results indicated that the application of heuristic
search algorithm in several wireless optimization problems
have been achieved excellent performance-complexity tradeoffs, particularly the use of genetic algorithm, evolutionary
program, particle swarm optimization (PSO), and local search
algorithm. Concerning the resource allocation issue, there
are several challenging single- or multi-objective optimization
problems associated, such as the total network power minimization subject to multi-class information rate constraints,
as well as the throughput maximization while minimizing
the total transmitted power. Multi-rate users associated with
different types of traffic can be aggregated to distinct classes
of users, with the assurance of minimum target rate allocation
per user and quality of service (QoS). In order to achieve
promising performance-complexity tradeoffs, both continuous
1 Saving
power may increase battery lifetime.
2
or discrete PSO search algorithms have been successfully
employed in the resource allocation problems [7].
A game theoretic approach for power control with rate
constraints in Gaussian parallel interference channels using
water-filling algorithm is proposed in [8], while in [9] a multilinear fractional programming approach is used to solve the
weighted throughput maximization problem in multiple access
systems. However, under strong interference density configurations, iterative water-filling algorithm (IWFA) is unable
to offer promising solutions to power allocation with fixed
rate constraint in multi-carrier code division multiple access
(MC-CDMA) networks. Hence, in this work the existence and
uniqueness of the solution are studied and shown by numerical
results that a new method combining swarm intelligence and
IWFA is more promising and suitable for realistic MC-CDMA
scenarios.
C. Organization
This paper is organized as follows: Section II presents the
system model and description; the game theoretic approach is
presented in Section III. Section III-C discusses the iterative
water-filling algorithm (IWFA); moreover, in Section IV the
scenarios are characterized and further the game theoretic plus
IWFA approach are applied in orde to solve the power-rate
allocation problem. Finally, the proposed hybrid approach is
discussed in Section V and conclusions in Section VI.
where U is a total number of users sharing the channel, N
is the number of sub-carriers available, and ri∗ is the target
information rate at the ith user.
III. G AME T HEORY A PPROACH
A simple game G can be easily defined as a tuple composed by the set of players U, strategies P, and utilities F.
Mathematically:
G = {U, P, F}
In multiple access networks resource allocation games, the
players would be the active users in the system, U in (3),
the strategies would be the resources allocated to each one,
e.g. the power each user utilizes to transmit, P in (3), and
the utilities the payoff functions, F in (3), that evaluate the
strategies chosen.
Games may be played either with or without cooperation
among users. Herein a non-cooperative scenario is considered.
Hence, as it is well known, non-cooperative games may be
solved finding the Nash equilibrium(s) (NE) of the problem
[8], [10]. A NE is a set of strategies where any unilateral
change in the user strategy will not increase the user’s utility
without decreasing others payoffs. Therefore, problem (2) may
be rewritten as follows [10]:
min
II. S YSTEM D ESCRIPTION
(3)
U ∑
N
∑
pi (k)
i=1 k=1
In multiple access networks an important QoS measure is
the signal to interference plus noise ratio (SINR) since all
users transmit over the same channel at the same time causing
what is known as multiple access interference (MAI), which
is responsible for the soft capacity of CDMA systems. The
spectrum may be divided in N uncorrelated CDMA subchannels such that each one is a flat channel, therefore, more
appropriate to high transmission rates.
In MC-CDMA systems the SINR at the ith user kth subcarrier may be computed as follows [9]:
s.t.
ri (pi ) ∈ Ri∗
pi ∈ P
(4)
where Ri∗ is the set of possible achievable information rates,
P is the set of possible strategies (allocated powers) at each
sub-carrier and ri (pi ) is the rate function given the set of
power through all sub-carriers, defined as:
ri (pi ) =
N
∑
log [1 + δi (k)]
(5)
k=1
δi (k) =
ρ
∑
pi (k)|gii (k)|2
pj (k)|gij (k)|2 + σi2 (k)
(1)
j̸=i
where p is the allocated power, |g|2 is the channel gain, ρ is
proportional to the average channel cross-correlation among
all users, and σ 2 is the power noise at the respective users (i)
and sub-carriers (k).
The power allocation with rate constrains problem is a
well known telecommunications issue of non-convex nature. A
generalized statement of this problem for MC-CDMA systems
follows:
min
U ∑
N
∑
pi (k)
i=1 k=1
s.t.
N
∑
ri (k) ≥ ri∗
k=1
0 ≤ pi (k) ≤ pmax
(2)
In multiple access scenarios it is important to observe
that each choice of user power interferes in all other users’
performance. In this case it is possible to rewrite the NE
problem as generalized Nash equilibrium (GNE) problem as
follows:
min
U ∑
N
∑
pi (k)
i=1 k=1
s.t.
ri (pi , p−i ) ∈ Ri∗
(6)
pi ∈ P
where ri (pi , p−i ) is the rate allocated to the ith user given
his own power vector pi and all the other users power vectors
p−i , defined just like (5). Note that the constraints in the GNE
problem (6) are convex [10].
Furthermore, the problem in (6) may be constrained by an
average power along the N sub-channels of the i−th user, p̄i ,
3
instead of a maximum power per sub-channel pi . Thus it can
be rewritten as:
min
U ∑
N
∑
pi (k)
i=1 k=1
s.t.
ri (pi , p−i ) ∈ Ri∗
p̄i ∈ P
(7)
In order to further evaluate this approach, the conditions
in which the problem has a GNE and it is unique are
presented; hence, the existence and uniqueness of the GNE are
determined for each channel, system and interference density
scenario.
A. Existence
In order to present the existence condition of the GNE we
define matrix Zk in (8). The problem has a GNE if, and only
if, Zk is a P-matrix ∀k ∈ N [8], i.e. Zk is a complex square
matrix with every principal minor being positive.
B. Uniqueness
To evaluate the uniqueness of the GNE we must consider
the matrix B:
{ −R∗
e i,
if i = j
Bij ≡
(9)
Ri∗ max
−e β̂ij ,
otherwise
with:
max
β̂ij
(
= max
k∈N
∑
2
|gij (k)|2 σr (k) +
|gjj (k)|2
′
j ′ ̸=j |gjj (k)|
2
σi (k)
2
pej ′ (k)
)
(10)
e (k) is a column vector, such that p
e (k) =
where p
[e
p1 (k), . . . , pei (k), . . . , peU (k)]T and can be obtained as follows:

 2
∗
σ1 (k)(eR1 − 1)


..
e (k) = (Zk (R∗ ))−1 
∀k ∈ N ;
p
,
.
∗
σi2 (k)(eRi
Algorithm 1 IWFA
Input: p, N ;
Output: p∗
begin
1. initialize first population and set n = 0;
2.
while n ≤ I
3.
for i = 0 until U
4.
if i = n mod U
5.
pi [n + 1] = WF(pi [n], p−i [n])
else
7.
pi [n + 1] = pi [n]
end if
end for
8.
set n = n + 1
end while
—————————————p = initial power vectors;
p∗ = power vector solution;
I = maximum number of iterations;
Algorithm 2 Practical algorithm for single water-filling solution
Input: set of pairs {(ai , bi )}, function g;
Output: p∗i and waterlevel µ
begin
e = N;
1. set N
2. sort {(ai , bi )} such that ai /bi are in decreasing order;
3. define aN +1 = bN +1 = 0;
4. while bNe /aNe ≥ bNe +1 /aNe +1 or g(bNe /aNe ) ≥ 0
e =N
e − 1;
set N
end while
5. find µ ∈ (bNe /aNe , bNe +1 /aNe +1 ]|g(µ) = 0
6. xi = (µai − bi )+ ,
1≤i≤N
—————————————(·)+ = max(·, 0);
e is defined below;
N
and a constraint function g, the water-level may be obtained
through the practical Algorithm 2 [11].
The following particularizations apply to the problem in (7):
ai (k)
=
− 1)
(11)
The problem has an unique GNE if, and only if, it satisfy
the existence conditions, i.e. if Zk is a P-matrix ∀k ∈ N , and
B is a P-matrix [8].
bi (k)
=
1
U
∑
(13)
pj (k)|gij (k)|2 + σi2 (k)
j̸=i
|gii (k)|2
∀ i ∈ U and k ∈ N
ri∗
C. Water-Filling Solution
g(µ)
As shown in [8] the water-filling algorithm is the simplest
solution for the GNE problem in (7) when the level of
interference is low or moderate. Therein, the following GaussSeidel IWFA is used as a reference in order to obtain the GNE
problem solution:
The water-filling operator in Algorithm 1 is applied to each
subcarrier of each user considering the interference of U − 1
users, and is defined as [11]:
+
WF (pi [n], p−i [n]) = (µi ai − bi )
∀i = 1, . . . , U (12)
with (·) = max(0, ·), µi is the water-level that satisfies
the rate constraints, and ai , bi are arbitrary positive numbers.
Given a set of pairs {(ai , bi )} for each user in the system
+
2 Nf + log2 (Γ)
=
µ−
=
2 Nf + log2 (Γ)
1
2 Nf log2 (bi (k))
(14)
ri∗
µ
(15)
1
−1
2 Nf log2 (bi (k) )
where Γ is the gap between Shannon capacity and the real
e is the index of
information rate, considered here as 0dB, and N
e )) < 0.
the first sub-channel (after ordering) that satisfy g(bi (N
IV. I NTERFERENCE S CENARIOS
In this section, the game theoretic approach applicability
is studied under three different scenarios and degrees of
reality resemblance. From the first to the third the reality and
4

∗
∗
|g11 (k)|2
 −(e − 1)|g21 (k)|2

Zk = 
..

.
−(eR1 − 1)|g12 (k)|2
|g22 (k)|2
..
.
···
···
..
.
−(eR1 − 1)|g1U (k)|2
∗
−(eR2 − 1)|g2U (k)|2
..
.
−(eRU − 1)|gU 1 (k)|2
−(eRU − 1)|gU 2 (k)|2
···
|gU U (k)|2
R2∗
∗
∗
the multiple access interference increases while the global
performance decreases. For each one scenario, a table with
simulation parameters values is offered. Note that in all the
three simulations scenarios, results were obtained assuming
flat Rayleigh fading channels with zero mean and σ 2 = d2 ,
where d is the normalized distance between transmitterreceiver link. For the interfering links, it was assumed the
normalized distance between the interfering user and receiver.
A. Scenario One
The first scenario is characterized by a seven-hexagonalcell with only one link per cell and a low multiple access
interference density per sub-carrier, as described in Fig. 1.
The signal is sent from the base station (BS) to the mobile
terminals (MT) (direct link) such that each BS signal interferes
on the MTs that do not belong to that cell. Parameters for this
scenario are shown in Table I.
Multi-cell: base and mobile stations location
5000





(8)
TABLE I
PARAMETER VALUES FOR S CENARIO 1.
Parameters
Adopted Values
MC-CDMA Power-Rate Allocation System
Noise Power
Pn = −63 [dBm]
Chip rate
Rc = 3.84 × 106
Min. Signal-noise ratio
SN Rmin = 4 dB
Max. power per user per sub-carrier
Pmax = 7.8 [dBm]
Time slot duration
Tslot = 666.7µs
or Rslot = 1500 slots/s
# mobile terminals
K=7
# base station
BS = 7
cell geometry
hexagonal,
with xcell = ycell = 1 Km
# sub-carriers
32
[
]
Interference density per sub-carrier
I ≈ 0.24 Interf
Km2
Channel Gain
path loss exponent, dist.γ
γ = −2 or −6, or
γ defined as Eq. (16)
fading,
Rayleigh with 6 paths (equal
gain combining rule), σ 2 = d2
(for each link), σ 2 = (dist./S)2
(for the interfering base stations)
User Types
User Target Rates
1 or 2 bits/symb/subch ∀ U users
S
4500
4000
d
Cell 6
Cell 5

distance [m]
3500
3000




γ =




Cell 4
2500
Cell 7
2000
1500
Cell 3
Cell 1
1000
2
4
6
6
6
4
4
4
2
4
6
6
6
4
6
4
2
4
6
6
4
6
6
4
2
4
6
4
6
6
6
4
2
4
4
4
6
6
6
4
2
4
4
4
4
4
4
4
2










(16)
500
Cell 2
0
0
500
1000
1500
2000
2500
3000
B. Scenario Two
3500
4000
4500
5000
distance [m]
Fig. 1. Scenario
[
] One with d = 0.5. Forward link, interference density,
I ≈ 0.24 Interf
. ∆ indicates BS location, and • indicates the MT position.
Km2
Note in Fig. 1 that the distance d is the normalized distance
from the border of the cell. Increasing d brings the mobile
terminals closer to the respective base station; thus, signal to
multiple access interference levels are heightened and, as a
consequence, the channel conditions between transmitter and
receiver link are improved.
Considering a more realistic assignment for the path loss
exponents, matrix γ in Eq. (16) represents different γ for intercellular interference which takes into account the distances of
the interfering base stations, such that each row represents the
path loss exponents for the ith BS (from ith cell) in relation to
the other jth BS (or cell). So, for adjacent cells it was assigned
a γ = 4; for non-adjacent cells γ = 6 and for the links in each
cell γ = 2 was adopted.
This is a more realistic scenario based on the scenario
described in [9]. This case is a four-cell each one with one
link, where the information is sent from the mobile terminals
to their respective base station (reverse link). Additionally, two
parameters d1 and d2 reshape the scenario such that d1 brings
all 4 cells closer/farther to each other and d2 decrease/increase
the distance between each MT and its BS. Note that both d1
and d2 are normalized distances by S, as described in Fig.
2. As a result, the MAI
density
can be classified as medium,
]
[
.
The
simulation parameter values
meaning I ≥ 0.75 Interf
2
Km
for Scenario Two are presented in Table II.
C. Scenario Three
Scenario three describes a situation with higher user density with four-quadratic-cells each one containing four users,
resulting
[ in] high interference density per sub-carrier, I ≈
. The analysis is done in the reverse link, such that
3.75 Interf
Km2
5
Multi-cell: base and mobile stations location
2000
S
1800
1600
1600
1400
1400
1200
distance [m]
distance [m]
1800
d1
1000
800
1000
S
800
600
400
400
200
200
d2
0
200
400
600
800
1000
d
1200
600
0
Multi-cell: base and mobile stations location
2000
1200
1400
1600
1800
2000
0
0
200
400
600
distance [m]
Fig. 2. A more realistic scenario,
[ d1 =
] 0.2 and d2 = 0.1. Reverse link,
interference density, I ≥ 0.75 Interf
. ∆ indicates BS location, and •
Km2
indicates the MT position.
800
1000
1200
1400
1600
1800
2000
distance [m]
Fig. 3. A more realistic[scenario
] with higher user and interference density.
Reverse link, I ≈ 3.75 Interf
. ∆ indicates BS location, and • indicates
Km2
the MT position.
TABLE III
PARAMETER
TABLE II
PARAMETER VALUES FOR S CENARIO 2
Adopted Values
MC-CDMA Power-Rate Allocation System
Noise Power
Pn = −63 [dBm]
Chip rate
Rc = 3.84 × 106
Min. Signal-noise ratio
SN Rmin = 4 dB
Max. power per user per sub-carrier
Pmax = 7.8 [dBm]
Time slot duration
Tslot = 666.7µs
or Rslot = 1500 slots/s
# mobile terminals
K=4
# base station
BS = 4
cell geometry
rectangular, with S = 1 Km
# sub-carriers
32
]
[
Interference density per sub-carrier
I ≈ 0.75 Interf
Km2
Channel Gain
path loss exponent, dist.γ
γ = −6
fading
Rayleigh with 1 path, σ 2 = d22
(for each link), σ 2 = (dist./S)2
(for each interfering MT)
User Types
User Target Rates
1 bit/symb/subch ∀ U users
Parameters
S CENARIO 3
Adopted Values
MC-CDMA Power-Rate Allocation System
Noise Power
Pn = −63 [dBm]
Chip rate
Rc = 3.84 × 106
Min. Signal-noise ratio
SN Rmin = 4 dB
Max. power per user per sub-carrier
Pmax = 7.8 [dBm]
Time slot duration
Tslot = 666.7µs
or Rslot = 1500 slots/s
# mobile terminals
K = 16
# base station
BS = 4
cell geometry
quadratic,
with xcell = ycell = 1 Km
# sub-carriers
32
]
[
Interference density per sub-carrier
I ≈ 3.75 Interf
Km2
Channel Gain
path loss exponent, dist.γ
γ = −6
fading
Rayleigh, 1 path, σ 2 = d2
(for each link), σ 2 = (dist./S)2
(for each interfering MT)
User Types
User Target Rates
1 bit/symb/subch ∀ U users
VALUES FOR
Parameters
D. Scenario One – Applicability
each BS receives interfering in cell and out cell MT signals.
Fig. 3 shows the mobile terminals and base stations placement
through each cell coverage. The parameter d is the normalized
(by the cell size) distance that each user is from its cell border.
This scenario characterizes cellular communication systems
in a more realist way than the previous two scenarios. Table
III shows the parameters used in the simulations for Scenario
Three.
Aiming to evaluate the non-cooperative game theoretic
approach under the three scenarios, in the sequel, the probabilities of existence and uniqueness of the GNE were evaluated
by simulation through the mean over 500 different channel
realizations. The three previous scenarios were tested using
the conditions for the existence and uniqueness presented in
Section III. Numerical results are shown on the following
subsections.
The probabilities of existence and uniqueness were calculated for two different rate profiles (R = 1 and R = 2
bit/symb/subchannel), for a set of parameters d ∈ [0.1, 0.9]
and for two different values of interference cross-correlation
ρ = 0.35, and ρ = 1. Fig. 4 shows the simulations results.
As expected, the probabilities of existence and uniqueness for
the same d ∈ [0.1, 0.2] are higher for a low rate profile, i.e.
R = 1bit/symb/subchannel. Besides, P (d) → 1 as d → 0.9.
For the lower cross-correlation case, the interference assumes
smaller values, so the results for the P (d) are better than the
ones for the higher cross-correlation case, as one can see in
Fig. 5. Observe, also, that for a R = 1 bit/symb/subchannel
rate profile, the GNE existence and uniqueness probability
have the same values.
From Fig. 4 and Fig. 5 one would ask if the power-rate
GNE problem in Eq. (7) could be efficiently solved using
IWFA approach if a more realistic multiple access multi-
6
Scenario 1 – Existence and Uniqueness Probability; γ = −2; ρ = 1
1
0.9
0.9
0.8
0.8
0.7
0.7
0.6
0.6
P (d)
P (d)
Scenario 1 – Existence and Uniqueness Probability; γ = −6; ρ = 1
1
0.5
0.5
0.4
0.4
0.3
Existence – R = 1
0.3
0.2
Uniqueness – R = 1
0.2
Uniqueness – R = 1
Uniqueness – R = 2
0.1
Existence –R = 1
Uniqueness – R = 2
0.1
Existence – R = 2
Existence – R = 2
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
0
0.1
0.2
0.3
0.4
0.5
Fig. 4. Probability of the GNE existence and uniqueness with path loss
exponent γ = −6 and ρ = 1. Scenario One.
0.6
0.7
0.8
0.9
d
d
Fig. 6. Probability of the GNE existence and uniqueness with path loss
exponent γ = −2. Scenario One.
Scenario 1 – Existence and Uniqueness Probability; γ = −6; ρ = 0.35
1
and uniqueness for a given random d is characterized, when
compared to bucolic or LOS scenarios. However, the larger is
the path loss exponent the higher is the power level needed to
surpass the channel attenuation.
0.9
0.8
0.7
P (d)
0.6
E. Scenario Two and Three – Applicability
0.5
0.4
0.3
Existence – R = 1
0.2
Uniqueness – R = 1
Uniqueness – R = 2
0.1
0
0.1
Existence – R = 2
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
d
Fig. 5. Probability of the GNE existence and uniqueness with path loss
exponent γ = −6 and ρ = 0.35. Scenario One.
For the second scenario, only one rate profile was considered (R = 1bit/symb/subchannel). Also the simulations were
done with combinations of the two different parameters, d1
and d2 . Both ρ = 1 and ρ = 0.35 average cross-correlation
values were considered. Reverse link is analyzed under a
higher interference density that generated in Scenario One.
This characterizes a more realistic scenario and, thus, has a
more appealing importance.
Scenario 2 - Existence and Uniqueness; γ = −2; ρ = 1
1
0.8
P (d1 , d2 )
carrier systems is considered, meaning interference density I
increasing substantially. As already stated, Scenario One does
not represent a totally realistic system configuration. Also, for
a path loss exponent γ = −6, the channel gains achieve values
in the range of −270dB, which characterizes an unfeasible
situation once too much power is needed to equalize the
channel state.
Under Scenario One, and assuming now a line-of-sight
(LOS) link, i.e., a path loss exponent γ = −2, representing
higher multiple access interference than in previous situations
(Fig. 4 and Fig. 5), Fig. 6 indicates that the probability of
GNE existence and uniqueness is more restrictive. On the other
hand, the simulation results for γ , as in (16); i.e. γ = −2 for
each link while γ = −4 for adjacent interference signals and
γ = −6 for non-adjacent interference, were not shown herein
since for any γ and d values combination the GNE always
exist and it is unique.
In conclusion, for this scenario the difference in the path loss
exponent results only shift of the probability values. Besides,
in this case of high number of reflections and strong channel
attenuation (γ ≥ −4), a favorable situation for GNE existence
Existence
Uniqueness
0.6
0.4
0.2
0
1
0.8
d1 0.6
0.4
0.2
0
0.9
0.8
0.7
0.6
d2
0.5
0.4
0.3
0.2
0.1
Fig. 7. Probability of the GNE existence and uniqueness with γ = −2 and
ρ = 1. Scenario Two.
Note in Fig. 7 that for a more realistic scenario the probabilities of existence and uniqueness of the GNE are even more
restricted (in terms of feasible combinations of (d1 , d2 )) than
the previous scenario. Besides, Fig. 8 confirms that the main
effect of considering a lower average cross-correlation is a
7
Scenario 2 — Existence and Uniqueness; ρ = 0.35; γ = −2; R = 1 bit/symb
1
Existence
60
40
ΣN
k=1 pi (k)
20
0
10
20
30
40
50
60
70
80
90
100
ii) Channel Capacity for each user at each iteration
0.4
0.2
0
1
0.8
d1
80
Uniqueness
0.6
Sum Rate [bits/symb]
P (d1 , d2 )
0.8
i) Sum power for each user at each iteration
100
Sum Power [mW ]
slight improvement in the existence and a substantial increase
in the uniqueness probability.
0.6
30
20
Ropt
10
R (xik , xi−k )
0
10
20
30
40
50
Iterations
0.4
60
70
80
90
100
(a)
0.2
0.8
0.7
0.6
0.5
d2
0.4
0.3
0.2
Fig. 8. Probability of the GNE existence and uniqueness with γ = −2 and
ρ = 0.35. Scenario Two.
Furthermore, for the third and most realistic scenario,
where[ the interference
density per sub-carrier achieves I ≈
]
3.75 Interf
,
there
was
none d for which the problem would
2
Km
have a GNE, even for ρ = 0.35.
With these results one could ask: i) what does happen with
the algorithm convergence when does not exist GNE? ii) is
there another tool that could efficiently and pragmatically solve
the power allocation with rate constraints problem in real
multiple access networks with low-moderate computational
complexity? For the first question, simulation results demonstrate that the algorithm convergence is not guaranteed2 when
a GNE does not exist, as shown in Fig. 9(b).
From these simulations we can infer that the noncooperative game theoretic approach is not totally efficient to
implement power-rate resource allocation policies in realistic
multiple access multi-carrier systems under medium or high
interference scenarios, due to the absence of guarantee of GNE
existence in those scenarios.
V. H EURISTIC PLUS IWFA A PPROACH
Due to the limitations of the game theoretic approach in
more realistic scenarios, an approach combining a heuristic
and IWFA is proposed. The main idea is to select the users
with the best channel conditions using particle swarm optimization (PSO) and then use the IWFA to solve the resource
allocation problem. Under realistic channel and system operation scenarios, it is necessary to remove some users from the
system, mainly the ones with bad channel conditions, since
the IWFA has no guarantee of convergence when there is
not a GNE for some determined system configuration, i.e. for
some combination of high interference density condition, QoS
requirements, and deeply fading (sub-)channel states.
2 The algorithm convergence is guaranteed when the number of maximum
iterations tends to infinity. However, in real systems the convergence must be
achieved within a shorter number of iterations as possible, due to lack of time
and energy.
i) Sum power for each user at each iteration
160
Sum Power [mW ]
0.9
0.1
140
120
100
ΣN
k=1 pi (k)
80
60
10
20
30
40
50
60
70
80
90
100
ii) Channel Capacity for each user at each iteration
Sum Rate [bit/symb]
0
Ropt
30
R(xik , xi−k )
20
10
0
10
20
30
40
50
60
70
80
90
100
Iterations
(b)
Fig. 9. Power-rate allocation under Scenario One, γ = −2 and R = 1
bit/symb/subchannel: (a) Existent and Unique GNE: typical power and rate
allocation, d = 0.6; (b) Non-existent GNE: typical power and rate allocation,
d = 0.1.
The first step in this approach consists of applying the PSO
algorithm to solve the average-power allocation with average
rate constraint:
min
U
∑
p̄i
i=1
s.t.
r̄i = r̄i∗
(17)
0 < p̄i ≤ p̄max
∀i ∈ U
In order to minimize the average power of all users, the
following cost function is employed [2], [5]:
)
(
U
1 ∑ th
p̄i
J(p̄) =
F
1−
(18)
U i=1
p̄max
where F th is defined as:
{
1,
th
F =
0,
if r̄i ≥ r̂i∗
otherwise
(19)
8
The mean power minimization problem in (17) is solved
through a heuristic method, considering the mean channel
conditions over the N sub-channels. Once PSO has completed
its procedure the users with p̄i = 0 are removed from the
system in that time slot (they come back in the next time slot
if p̄i > 0).
A. Particle Swarm Optimization
The particle swarm optimization (PSO) algorithm was designed by Kennedy and Eberhart [12], [13] based on birds
social behavior in which the principle is the movement of
particles, distributed in the search space, each one with its
position and velocity. Basically, the algorithm consists in
updating the velocity of each particle and applying it to
their position. Given a particle bp , also denominated solution
candidate, its velocity at iteration t can be computed as:
vp [n + 1]
=
ω[n] · vp [n] + ϕ1 · Up1 [n](bbest
p [n] − bp [n])
+ϕ2 · Up2 [n](bbest
g [n] − bp [n])
(20)
where ω[n] is the inertia at the nth iteration, ϕ1 is the local
solution acceleration coefficient, ϕ2 is the global solution
acceleration coefficient, Up1 [n] and Up2 [n] are diagonal matrices with dimension U whose elements are random variables
with uniform distribution ∼ U ∈ [0, 1] generated for the pth
best
particle at iteration n, bbest
p [n] and bg [n] are the local best
candidate and the global best candidate at iteration n.
Once the velocity is computed, the position of each particle
should be updated through:
bp [n + 1] = bp [n] + vp [n + 1]
(21)
where bp [n + 1] and bp [n] are the particle position at iteration
n + 1 and n, respectively. The PSO algorithm consists in
applying equations (20) and (21). A pseudo-code for power
minimization with rate constraints PSO algorithm is presented
in Algorithm 3.
Aiming to reduce the possibility that the particles might
leave the search space, a maximum velocity factor, Vmax , is
introduced and will be responsible for limiting each particles
velocity in the range ±Vmax , such that:
vp [n] = min {Vmax ; max {−Vmax ; vp [n]}}
(22)
Besides, in order to improve convergence rate, an adaptive
inertia value was implemented such that [14]:
(
)m
I −n
w[n] = (winitial − wfinal ) ·
+ wfinal
(23)
I
where winitial and wfinal are the initial and final weight inertia,
respectively, winitial > wfinal , I is the maximum number of
iterations, and m ∈ [0.6; 1.4] is the nonlinear modulation index
[14].
Table IV shows the PSO input parameters used in the
simulations. These input parameters were optimized according
to the methodology developed in [7]. In that work, both
multiuser detection and resource allocation problems were
analyzed under the PSO heuristic optimization perspective,
with emphasis on the input parameters optimization. For more
details on the choice of input parameters values for resource
allocation problems, see [7, Sections 3.2.1, 3.3.2].
Algorithm 3 SOO Continuous PSO Algorithm for the Power
Allocation Problem
Input: M , I, ω, ϕ1 , ϕ2 , Vmax ;
Output: p∗
begin
1. initialize first population: n = 0;
bp [0] ∼ U [pmin ; pmax ] ∀p ∈ M
best
bbest
p [0] = bp [0] and bg [0] = Pmax ;
vp [0] = 0: null initial velocity;
2. while n ≤ N
a. calculate J(bp [n]), ∀bp [n] ∈ B[n] using (18);
b. update velocity vp [n], p = 1, . . . , P, through (20);
c. update best positions:
for p = 1, . . . , P
if J(bp [n]) < J(bbest
p [n]) ∧ Rp [n] ≥ rp,min ,
bbest
p [n + 1] ← bp [n]
best
else bbest
p [n + 1] ← bp [n]
end
]
[
if ∃ bp [n] such that J(bp [n]) < J(bbest
g [n]) ∧ Rp [n] ≥
rp,min
[
]
∧ J(bp [n]) ≤ J(b′p [n]), ∀ p′ ̸= p ,
bbest
g [n + 1] ← bp [n]
best
else bbest
g [n + 1] ← bg [n]
d. Evolve to a new swarm population bp [n + 1], using (21);
e. set n = n + 1.
end
3. p∗ = bbest
g [I].
end
−−−−−−−−−−−−−−−−−−−−−−−−−
M : population size.
I: maximum number of swarm iterations.
pmax and pmin : maximum and minimum allowed power, respectively.
TABLE IV
PSO I NPUT PARAMETERS .
Parameter
ϕ1
ϕ2
vmax
vmin
m
M
Value
2
2
0.01 · (pmax − pmin )
−vmax
1
U
B. Power-Rate Allocation Comparison
In order to characterize the power allocation optimization
over the iterations using PSO-IWFA approach, the numerical
results for allocated power, sum power and sum rate versus
PSO number of iterations are presented in Fig. 10. Note in
Fig. 10 that after reducing the number of active users in the
system the QoS could be achieve for all users. On the other
hand, Fig. 11 shows the difference, in terms of guaranteed
QoS and power allocation, if IWFA is used without PSO. It
is worthy of note that using jointly PSO and IWFA does not
guarantee 100% times QoS satisfaction as show in the next
subsection.
C. Existence, Uniqueness and Outage Probability
In order to evaluate the improvement of the proposed
approach the existence and uniqueness probability tests were
conducted. Also, since the PSO algorithm decides which users
are dropped of the system, the outage probability was calculated. Simulations were carried out considering ρ ∈ 1, 0.35,
γ = −2, ri∗ = 1bit/symb/sub-channel and an average value
over 500 realizations.
9
Allocated Power, K = 16, Swarm Population, M = 16 particles φ1 = 2 φ2 = 2
0
Allocated Power [mW ]
10
−1
10
Figure 12 shows the simulations results for different average interference cross correlation coefficients. Note that, the
perturbation over the existence and uniqueness probability is
caused mainly by the stochastic characteristic of the channel
conditions. Moreover, a substantial decrease in outage probability caused by a reduction of ρ can be observed. However, a
decrement in outage probability does not have a simple relation
to the GNE existence probability. In fact, one may infer from
Figure 12 that for a d ≃ 0.3 the GNE existence and uniqueness
probability achieve its peak value with a 90% outage chance,
i.e. only 10% of the users still are on the system.
Scenario 3 —- Existence, Uniqueness and Outage — γ = −2; ρ = 1
−2
10
1
bbest
g
Existence — R = 1
0.9
0
100
200
300
400
500
600
700
800
900
Uniqueness — R = 1
1000
Iterations
0.8
(a)
0.6
P (d)
Sum Power [mW ]
0.7
i) Sum power for each user at each iteration
150
100
0.5
0.4
50
0.3
ΣN
k=1 pi (k)
0.2
0
Sum Rate [bits/symb]
Outage — R = 1
10
20
30
40
50
60
70
80
90
100
0.1
ii) Channel Capacity for each user at each iteration
40
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
d
30
(a)
20
Scenario 3 — Existence, Uniqueness and Outage — γ = −2; ρ = 0.35
1
10
R(xik , xi−k )
Existence — R = 1
0.9
0
0
10
20
30
40
50
60
70
80
90
Uniqueness — R = 1
100
0.8
Iterations
0.7
Fig. 10. Typical power allocation through PSO plus IWFA in Scenario Three.
(a) Allocated power using PSO for d = 0.6, R = 1bit/symb/subchannel,
γ = −2; (b) Sum Power and Sum Rate allocation through IWFA after PSO
average power allocation in Fig. 10(a).
0.6
P (d)
(b)
Outage — R = 1
0.5
0.4
0.3
i) Sum power for each user at each iteration
Sum Power [mW ]
120
0.2
110
0.1
100
0
0.1
90
0.2
0.3
0.4
70
0.6
0.7
0.8
0.9
(b)
ΣN
k=1 pi (k)
60
50
0.5
d
80
10
20
30
40
50
60
70
80
90
100
Fig. 12. Scenario 3, γ = −2,
ρ = 0.35.
ri∗
= 1bit/symb/sub-channel: (a) ρ = 1; (b)
Sum Rate [bit/symb]
ii) Channel Capacity for each user at each iteration
30
20
Ropt
10
R(xik , xi−k )
0
10
20
30
40
50
60
70
80
90
100
Iterations
Fig. 11. Typical power and rate allocation in Scenario Three using IWFA
without PSO, d = 0.6, ρ = 0.35.
Considering the results, one may rise some questions: i) if
the objective was to improve the GNE existence and uniqueness probability why the results for PSO-IWFA in scenario
three are so different from the ones for scenario one and two
using only IWFA? ii) even without GNE, is the QoS satisfied
or partially satisfied? and iii) if partially satisfied what is the
probability that a fraction of the QoS is satisfied?
In order to answer those questions, results in Figure 13
should be carefully analyzed. Firstly, once the target rate can-
10
not be achieved by the maximum allowed power, the algorithm
considers better to transmit a fraction of the minimum rate
instead of no rate. Hence, Fig. 13 shows the probability of
achieving – fully or partially (90% and 70%) – the QoS for
different normalized distance parameters. That explains why
GNE existence and uniqueness probability in Scenario Three
are not as good as their parameters values for scenarios one
and two.
Probability of QoS Assurance — γ = −2; ρ = 1
1
0.9
0.8
DPCA
IWFA
Eq.
Algorithm 1
Algorithm 2
(1)
(18)
(20)
(21)
PSO
Sum
1
N2 + N + 1
U2 + U
2U
U ×M
U ×M
90%
70%
0.6
0.5
0.4
0.3
0.2
CIW F A (U ) =
0.1
=
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
CP SO (U )
(a)
Probability of QoS Assurance — γ = −2; ρ = 0.35
0.8
90%
70%
0.7
0.6
P (d)
4U (3U 2 + 3U + 8)
12U 3 + 12U 2 + 32U
(24)
= 1000(8U 2 + 9U + 1)
= 8000U 2 + 9000U + 1000
(25)
where C(U ) is the total number of operations for a given number of users U . Moreover, the total number of mathematical
operations for different system loadings is presented in Figure
14.
100%
0.9
Exponen.
0
4
0
0
0
0
and, considering M = U :
d
1
Multipl.
1
N 2 + 2N + 1
2U 2 + 2U
2U + 1
(3U + 2) × M
0
For the IWFA we might consider that the number of subchannels and users are in the same magnitude, such that
U ≡ N . Also, note that for the PSO algorithm the number
of iterations I = 1000 and for IWFA a non-exhaustive
search revealed that a I ≡ 4 U is enough for the algorithm
to converge. Besides, each Algorithm 1 iteration executes a
sorting algorithm through the N sub-channels. As it is known,
the worst case complexity for sorting algorithms (such as
bubble sort) is O(N 2 ). Therefore, according to Table V and
the last statement, one may imply:
100%
0.7
P (d)
TABLE V
N UMBER OF OPERATIONS PER ITERATION .
Mathematical Operations for PSO and IWFA
7
10
0.5
6
10
0.3
0.2
0.1
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
d
(b)
Fig. 13. Probability of QoS Assurance, averaged over 500 trials, ri∗ =
1bit/symb/sub-channel, γ = −2. Scenario 3. (a) ρ = 1; (b) ρ = 0.35.
# Mathematical Operations
0.4
5
10
4
10
3
10
2
10
IWFA
PSO
1
10
Note that the performance considering full interference, i.e.
ρ = 1, is better. This is a consequence of the high outage
probability when compared to ρ = 0.35, which means that
there are fewer users in the system.
D. Complexity Analysis
A computational complexity analysis was conducted taking
into account the number of mathematical operations. Note that
in MC-CDMA system we must consider three variables (users,
sub-channels and iterations) instead of two in single carrier
cases (users and iterations). Table V contains the number of
operations for each algorithm.
2
4
6
8
10
12
14
16
Users, U
Fig. 14.
PSO and IWFA computational complexity, assuming U = N .
The computational complexity asymptotic behavior of the
PSO algorithm is about O(U 2 ) and the IWFA O(U 3 ). So, in
asymptotically, the proposed approach complexity would be
O(U 3 + U 2 ) which means O(U 3 ), i.e. there is no increase in
the complexity of the proposed method in asymptotic terms.
VI. C ONCLUSION
The paper pointed out the main flaws of the game theoretic
approach alone. In most cases the game does not have a GNE
11
and, thus, the IWFA does not truly converge, either by using
more than the maximum allowed transmitted power or by not
satisfying QoS requirements. Therefore, a method combining
PSO and IWFA is proposed in order to find a solution in the
situations that there are no GNE present.
Tested through different scenarios, the game theoretic approach does not have a GNE for scenarios with low interference density, e.g. in scenario three a interference density
of 3.75 interf.
is observed, which is considered still low, and
Km2
yet simulations results manage to find no GNE. A huge
improvement was achieved combining the heuristic approach
with IWFA, such that for more realist scenarios the IWFA was
able to find solutions to the power control problem.
Moreover, it is important to highlight that, asymptotically,
the computational complexity of the proposed method did not
increased. Since IWFA can be implemented in a totally distributed way, this is an important result once mobile terminals
are restricted in terms of computational power.
Finally, future work includes finding a way to redistribute
the average power found by the PSO algorithm into the N subchannels of the system, reducing even more the computational
complexity. Besides other simpler heuristic methods and a
reformulation of the game may be tested.
ACKNOWLEDGEMENT
The authors would like to express gratitude to the anonymous reviewers for their thorough reviews and for the thoughtful comments and suggestions, which have enhanced the
readability and quality of the manuscript.
R EFERENCES
[1] G. Foschini and Z. Miljanic, “A simple distributed autonomous power
control algorithm and its convergence,” IEEE Transactions on Vehicular
Technology, vol. 42, no. 4, pp. 641–646, Nov. 1993.
[2] M. Moustafa, I. Habib, and M. Naghshineh, “Genetic algorithm for
mobiles equilibrium,” MILCOM 2000. 21st Century Military Communications Conference Proceedings, October 2000.
[3] T. J. Gross, T. Abrão, and P. J. E. Jeszensky, “Distributed power control
algorithm for multiple access systems based on verhulst model,” AEÜ.
International Journal of Electronics and Communications, vol. 37, no. 5,
pp. 631–643, November 2010.
[4] L. D. H. Sampaio, M. F. Lima, B. B. Zarpelão, M. L. Proença Jr.,
and T. Abrão, “Power allocation in multirate ds/cdma systems based
on verhulst equilibrium,” in IEEE ICC 2010 - Communication QoS,
Reliability and Modeling Symposium, May 2010, pp. 1–6.
[5] H. Elkamchouchi, H. EIragal, and M. Makar, “Power control in cdma
system using particle swarm optimization,” in 24th National Radio
Science Conference, March 2007, pp. 1–8.
[6] L. D. H. Sampaio, M. F. Lima, B. B. Zarpelão, M. L. Proença Jr.,
and T. Abrão, “Swarm power-rate optimization in multi-class services
ds/cdma networks,” in XXVIII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuı́dos, May 2010, pp. 615–628.
[7] T. Abrão, L. D. H. Sampaio, B. A. Angélico, M. L. P. Jr., and P. J. E.
Jeszensky, Multiple Access Wireless Networks Optimization via Heuristic
Search Algorithms, In: Search Algorithms, 1st ed. Vienna, Austria:
Intech, April 2011, vol. 1, pp. 261–298.
[8] J.-S. Pang, G. Scutari, F. Facchinei, and C. Wang, “Distributed power
allocation with rate constraints in gaussian parallel interference channels,” IEEE Transactions on Information Theory, vol. 54, no. 8, pp.
3471–3489, August 2008.
[9] J. H. Li Ping Qian, Ying Jun Zhang, “Mapel: Achieving global optimality for a non-convex wireless power control problem,” in IEEE
Transactions on Wireless Communications, vol. 8, no. 3, March 2009,
pp. 1553–1563.
[10] G. Scutari, D. P. Palomar, F. Facchinei, and J.-S. Pang, “Convex
optimization, game theory, and variational inequality theory,” IEEE
Signal Processing Magazine, pp. 35–49, May 2010.
[11] D. P. Palomar and J. R. Fonollosa, “Practical algorithms for a family
of water-filling solutions,” IEEE Transactions on Signal Processing,
vol. 53, no. 2, pp. 686–695, February 2005.
[12] J. Kennedy and R. Eberhart, “Particle swarm optimization,” in IEEE
International Conference on Neural Networks, 1995, pp. 1942–1948.
[13] J. Kennedy and R. C. Eberhart, Swarm Intelligence, 1st ed. Morgan
Kaufmann, March 2001.
[14] A. Chatterjee and P. Siarry, “Nonlinear inertia weight variation for
dynamic adaptation in particle swarm optimization,” Computers &
Operations Research, vol. 33, no. 3, pp. 859–871, March 2006.