DOI QR코드

DOI QR Code

Resource allocation in downlink SWIPT-based cooperative NOMA systems

  • Wang, Longqi (Wireless Communication Key Lab of Jiangsu Province Nanjing University of Posts and Telecommunications) ;
  • Xu, Ding (Wireless Communication Key Lab of Jiangsu Province Nanjing University of Posts and Telecommunications)
  • Received : 2019.05.22
  • Accepted : 2019.07.09
  • Published : 2020.01.31

Abstract

This paper considers a downlink multi-carrier cooperative non-orthogonal multiple access (NOMA) transmission, where no direct link exists between the far user and the base station (BS), and the communication between them only relies on the assist of the near user. Firstly, the BS sends a superimposed signal of the far and the near user to the near user, and then the near user adopts simultaneous wireless information and power transfer (SWIPT) to split the received superimposed signal into two portions for energy harvesting and information decoding respectively. Afterwards, the near user forwards the signal of the far user by utilizing the harvested energy. A minimum data is required to ensure the quality of service (QoS) of the far user. We jointly optimize power allocation, subcarrier allocation, time allocation, the power allocation (PA) coefficient and the power splitting (PS) ratio to maximize the number of data bits received at the near user under the energy causality constraint, the minimum data constraint and the transmission power constraint. The block-coordinate descent method and the Lagrange duality method are used to obtain a suboptimal solution of this optimization problem. In the final simulation results, the superiority of the proposed NOMA scheme is confirmed compared with the benchmark NOMA schemes and the orthogonal multiple access (OMA) scheme.

Keywords

1. Introduction

Recently, the spectrum resources become more precious with the increasing demand for wireless transmission. As a new multiple-access technique, Non-Orthogonal Multiple Access (NOMA) has received a lot of attention in the upcoming 5G wireless networks because of its high spectral efficiency [1]-[4]. Different from the conventional orthogonal multiple access (OMA) which serves only one user within the same time or frequency, NOMA performs multiplexing in the power domain and allows multiple users to transmit information in the same time and frequency. The implementation of NOMA depends on superposition coding (SC) technique used at the transmitters to send signals of multiple users and successive interference cancellation (SIC) technique applied at receivers to eliminate the co-channel interference [5]. Since NOMA uses a new dimension to realize multiple access, it has the potential to improve the spectrum efficiency [6] as well as the energy efficiency [7]. The existing researches on NOMA mainly include the following aspects: NOMA with multiple-input multiple-output (MIMO) [8]-[10], cognitive radio inspired NOMA (CR-NOMA) [11]-[13], cooperative NOMA [14]-[16], etc. For example, in [8], the application of MIMO techniques to NOMA systems was considered and the ergodic capacity of the system was maximized subject to the constraints of total transmission power and minimum rate. In [11], the performance of CR-NOMA influenced by user pairing was studied compared with the fixed power allocation (PA) NOMA. According to SIC principle, the strong user decodes the message of the weak user before obtaining its own message. Hence, the strong user can act as a relay to forward the message of the weak user. In this context, reference [14] proposed a cooperative NOMA system and analyzed the outage probability and diversity order of this system.

Radio-frequency (RF) energy harvesting is a technology which can harvest energy from RF signals to power communication devices in energy constrained wireless network, such as Internet of Things (IoT) networks [17][18], low-power cognitive radio networks [19]-[21], and device-to-device networks [22]-[24]. In particular, simultaneous wireless information and power transfer (SWIPT) is a RF energy harvesting technology that can harvest energy and decode information from the same signal [25][26]. In [27], the problem of energy efficiency proportional fairness for SWIPT was investigated based on the stochastic geometry. In [28], cooperative resource allocation for SWIPT secondary users and primary users in cognitive radio networks was studied. Reference [29] proposed two relaying protocols for SWIPT based on the power splitting (PS) and time switching (TS) receiver architectures. For TS, the transmission time is divided into two portions for harvesting energy and transmitting information. For PS, the signals received by relay are divided into two portions for harvesting energy and transmitting information. In [30], the TS and PS schemes were considered in MIMO systems and some fundamental tradeoffs were revealed for maximizing the efficiency of simultaneous information and energy transmission. In [31], the TS and PS schemes were employed for the TDMA-based and OFDMA-based information transmission respectively. The author in [31] maximized the weighted sum-rate by optimizing the resource allocation under the minimum harvested energy constraint and the transmission power constraint. In [32], the outage performance of a multiuser OFDM system with SWIPT was investigated. Reference [33] proposed a novel protocol for energy harvesting cooperative communication systems based on a PS scheme and validated the average achievable capacity of the proposed protocol outperforms the existing PS protocol.

For cooperative NOMA, there is inevitably energy consumption when the near user forwards a signal to the far user. However, it is unreasonable for the energy-constrained near user to provide the energy used for forwarding the far user’s signal. Hence, SWIPT can be applied at the near user for decoding information and harvesting energy simultaneously in cooperative NOMA systems and the harvested energy can be used for forwarding signals. Many works have been investigated to jointly consider NOMA and SWIPT, such as [34]-[37]. In [34], TS scheme was used to transfer information and energy for a MISO system with cooperative NOMA transmission, and the rate of the best-of-the-effort node was maximized by jointly optimizing the beamforming vectors, time and forwarding power, under the constraint of the passive node’s QoS. Reference [35] proposed a new PS protocol for energy harvesting relay and studied its impact on the outage performance of users in a cooperative NOMA system with SWIPT. In [36], the authors adopted a PS scheme to assist the weak user, and jointly optimized the beamforming vectors and the PS ratio to maximize the transmission rate at the strong user, limited by the QoS requirement of the weak user in the MISO and SISO NOMA cases, respectively. In [37], a new cooperative NOMA protocol based on SWIPT was proposed, and the outage probability and the diversity of all users were derived to verify the performance of the proposed protocol. As far as we know, most of the existing researches considered there exists direct link between the information source and the far user in SWIPT assisted cooperative NOMA systems. However, there are situations where the far users who are outside the coverage of the information source want to communicate. Therefore, it is necessary to consider the case where no direct link exists between the far user and the information source. It is worth pointing out that in [38], a downlink NOMA system with no direct link between the far user and the source was considered, and the near user was proposed to act as a full-duplex relay for the information transmission of the far user. In [38], the author minimized the outage probability of the system and maximized the minimum rate of the two users by jointly optimizing the transmission power of the near user and the PA parameters of different users’ signals. However, RF energy harvesting was not considered in [38]. To the best of our knowledge, cooperative NOMA systems using SWIPT where the far user is out of the coverage of the BS have not been investigated yet. This motivates the research in this paper.

In this paper, a SWIPT assisted downlink cooperative NOMA transmission system consisted of one BS and a pair of users (one far user and one near user) is studied. Different from the previous researches, we consider the case that between the BS and the far user, there is no direct link, and PS SWIPT technique is applied at the near user to provide energy for forwarding the signal of the far user. The duration of transmission is split into two portions, one for simultaneous wireless energy and information transmission from the BS to the near user, as well as the other one for information forwarding from the near user to the far user. The main contributions of this paper can be summarized as:

1) We consider a multi-carrier cooperative NOMA system where no direct link exists between the far user and the BS. In order to enable the far user to communicate with the BS, the near user plays a role of an energy harvesting relay to forward the signal of the far user.

2) To ensure the QoS requirement of the far user, the number of data bits transmitted to the far user cannot be lower than a given threshold. Subject to the constraints of the energy causality, the minimum data and the transmission power, we aim to maximize the number of data bits received at the near user by jointly optimizing power allocation, subcarrier allocation, time allocation, the PA coefficient and the PS ratio.

3) The optimization problem is non-convex and complex. Before solving the optimization problem, an iterative scheme based on the block-coordinate descent method and the Lagrange duality method is proposed to check the feasibility of this problem. Then we propose an iterative scheme which adopts the same methods to efficiently obtain a suboptimal solution.

4) Finally, we compare the proposed scheme with three reference schemes which include NOMA schemes with fixed variables and conventional OMA scheme. Simulation results are given to prove the superiority of the proposed new NOMA scheme.

The rest of the paper is organized as follows. In Section 2, the system model and optimization problem formulation are presented. In Section 3, the block-coordinate descent method and the Lagrange duality method are adopted to solve the non-convex and complex optimization problems. Simulation results are given in Section 4, and conclusions follow in Section 5.

2. SYSTEM MODEL AND PROBLEM FORMULATION

We consider a downlink cooperative NOMA system consisting of one BS and a pair of users denoted by U1 (the near user) and U2 (the far user), as shown in Fig 1. It is supposed that between the BS and U2, there is no direct link, and U1 acts as a relay for U2 using the energy harvested from the superimposed signal sent from the BS. The total spectrum bandwidth is divided into N subcarriers on average, and the set of these subcarriers is denoted as Ω . Let h1i and h2i denote the channel coefficients of subcarrier i from BS to U1, and from U1 to U2, respectively. It is assumed that U1 adopts the PS scheme for harvesting energy and decoding information at the same time. The transmission time is normalized to be 1 and split into two phases. In the first phase whose duration is τ , U1 receives the superimposed signal of U1 and U2 coming from the BS and splits it into two portions for harvesting energy and decoding information. Let β ∈[0,1] denote the PS ratio where a faction of β signal power is split to harvest energy and the remaining 1-β signal power is split to decode information. In the second phase whose duration is 1-τ , U1 forwards the signal of U2 by utilizing the harvested energy. To ensure the QoS requirement of U2, the number of data bits received by U2 cannot be lower than a given threshold denoted as D .

E1KOBZ_2020_v14n1_20_f0001.png 이미지

Fig. 1. Downlink cooperative NOMA system model

2.1 Phase 1: Transmission from the BS to U1

On subcarrier i , the BS transmits a superimposed signal denoted as \(\sqrt{p_{1}^{i} \alpha^{i}} x_{1}^{i}+\sqrt{p_{1}^{i}\left(1-\alpha^{i}\right)} x_{2}^{i}\)

to U1, where x1i is the signal for U1, x2i is the signal for U2, αi is the PA coefficient for x1i , and p1i is the transmission power of the BS. Assuming that the maximum transmission power of the BS on all subcarriers is P , thus we have \(\sum_{i \subseteq \Omega} p_{1}^{i} \leq P\). The signal received at U1 is given by

\(y_{1}^{i}=h_{1}^{i}\left(\sqrt{p_{1}^{i} \alpha^{i}} x_{1}^{i}+\sqrt{p_{1}^{i}\left(1-\alpha^{i}\right)} x_{2}^{i}\right)+n_{1}^{i}\)       (1)

where \(n_{1}^{i} \sim C N\left(0, \sigma_{1}^{2}\right)\) denotes the additive white Gaussian noise (AWGN) at U1 on subcarrier i . Using the SWIPT technique, U1 divides y1i into two portions which are used to decode information and harvest energy. The harvested energy at U1 can be written as

\(E=\sum_{i \in \Omega} \beta \eta p_{1}^{i}\left|h_{1}^{i}\right|^{2} \tau,\)       (2)

where η ∈[0,1] denotes the energy conversion efficiency. The signal used for information decoding can be described as

\(y_{1}^{i(I D)}=\sqrt{1-\beta} h_{1}^{i}\left(\sqrt{p_{1}^{i} \alpha^{i}} x_{1}^{i}+\sqrt{p_{1}^{i}\left(1-\alpha^{i}\right)} x_{2}^{i}\right)+n_{1}^{i}.\)       (3)

Assume that the successive interference cancellation (SIC) is applied at U1 to retrieve x1 and x2. Specifically, on subcarrier i , U1 first decodes x2i and then subtracts it from the superimposed signal to decode x1i . Thus, the signal-to-interference-plus-noise ratio (SINR) to decode x2i at U1 on subcarrier i can be expressed as

\(\gamma_{1, x_{2}}^{i}=\frac{(1-\beta)\left(1-\alpha^{i}\right) p_{1}^{i}\left|h_{1}^{i}\right|^{2}}{(1-\beta) \alpha^{i} p_{1}^{i}\left|h_{1}^{i}\right|^{2}+\sigma_{1}^{2}}.\)       (4)

The signal-to-noise ratio (SNR) to decode x1i at U1 on subcarrier i can be expressed as

\(\gamma_{1, x_{1}}^{i}=\frac{(1-\beta) \alpha^{i} p_{1}^{i}\left|h_{1}^{i}\right|^{2}}{\sigma_{1}^{2}}.\)       (5)

Therefore, the number of data bits decoded for x1 and x2 at U1 can be given by

\(D_{1}=\tau R_{1},\)       (6)

and

\(D_{1, x_{2}}=\tau R_{1, x_{2}},\)       (7)

respectively, where R1 and R1,x2 denote the data rate for decoding x1 and x2, respectively, at U1, as given by

\(R_{1}=\sum_{i \in \Omega} \log _{2}\left(1+\frac{(1-\beta) \alpha^{i} p_{1}^{i}\left|h_{1}^{i}\right|^{2}}{\sigma_{1}^{2}}\right),\)       (8)

and

\(R_{1, x_{2}}=\sum_{i \in \Omega} \log _{2}\left(1+\frac{(1-\beta)\left(1-\alpha^{i}\right) p_{1}^{i}\left|h_{1}\right|^{2}}{(1-\beta) \alpha^{i} p_{1}^{i}\left|h_{1}^{i}\right|^{2}+\sigma_{1}^{2}}\right).\)       (9)

2.2 Phase 2: Transmission from U1 to U2

U1 utilizes the energy harvested in the first phase to forward x2 to U2. The signal received at U2 on subcarrier i can be written as

\(y_{2}^{i}=\sqrt{p_{2}^{i}} h_{2}^{i} x_{2}^{i}+n_{2}^{i}\)       (10)

where \(n_{2}^{i} \sim C N\left(0, \sigma_{2}^{2}\right)\) denotes the AWGN at U2, and p2i denotes the transmission power of U1 for forwarding x2, on subcarrier i . Since the energy consumed by U1 for forwarding x2 cannot exceed the harvested energy, the energy causality constraint can be given as \(\sum_{i \in \Omega} p_{2}^{i}(1-\tau) \leq \sum_{i \in \Omega} \beta \eta p_{1}^{i}\left|h_{1}^{i}\right|^{2} \tau\). The SNR to decode x2 at U2 on subcarrier i is given by

\(\gamma_{2, x_{2}}^{i}=\frac{p_{2}^{i}\left|h_{2}^{i}\right|^{2}}{\sigma_{2}^{2}}\)       (11)

Thus, the number of data bits decoded by U2 can be given as

\(D_{2, x_{2}}=(1-\tau) R_{2, x_{2}},\)       (12)

where R2,x2 denotes the data rate for decoding x2 at U2 as given by

\(R_{2, x_{2}}=\sum_{i \in \Omega} \log _{2}\left(1+\frac{p_{2}^{i}\left|h_{2}^{i}\right|^{2}}{\sigma_{2}^{2}}\right).\)       (13)

Thus, the number of data bits received by U2 can be written as

\(D_{2}=\min \left\{D_{1, x_{2}}, D_{2, x_{2}}\right\}\)       (14)

To ensure the QoS requirement of U2, the number of data bits received by U2 cannot be lower than the target number of data bits D . Thus, the minimum data constraint requires that D2 ≥D, i.e., D1,x2 ≥ D and D2,x2 ≥ D. The notations are given in Table 1.

Table 1. Important Notations

E1KOBZ_2020_v14n1_20_t0001.png 이미지

2.3 Optimization Problem Formulation

The goal of our paper is to maximize the number of data bits received at U1 by jointly optimizing power allocation, subcarrier allocation, time allocation, the PA coefficient and the PS ratio, subjected to the transmission power constraint, the energy causality constraint and the minimum data constraint. The optimization problem is formulated as

\((P 1): \max _{\beta, \tau,\left\{\alpha^{i}\right\},\left\{p_{1}^{i} \geq 0\right\},\left\{p_{2}^{i} \geq 0\right\}} D_{1}\)       (15)

\(\text { s.t. } \sum_{i \in \Omega} p_{1}^{i} \leq P,\)       (16)

\(D_{1, x_{2}} \geq D,\)       (17)

\(D_{2, x_{2}} \geq D,\)       (18)

\(\sum_{i \in \Omega} p_{2}^{i}(1-\tau) \leq \sum_{i \in \Omega} \beta \eta p_{1}^{i}\left|h_{1}^{i}\right|^{2} \tau,\)       (19)

\(0 \leq \alpha^{i} \leq 1,\)       (20)

\(0 \leq \beta \leq 1,\)       (21)

\(0 \leq \tau \leq 1.\)       (22)

The constraint (16) denotes the transmission power constraint of the BS. The constraints (17) and (18) are used to ensure the QoS requirement of U2. The constraint (19) denotes the energy causality constraint which indicates that the energy consumed by U1 for forwarding x2 cannot exceed the harvested energy. This problem is difficult to solve due to the non-convexity with respect to the optimization variables. In the next sections, we will propose to solve such optimization problem based on the block-coordinate descent method and the Lagrange duality method.

3. RESOURCE ALLOCATION SCHEME

Since the constraints in (17) and (18) may not be satisfied, we first check the feasibility of P1, and then propose a scheme to solve it.

3.1 Problem Feasibility Check

When the number of data bits received by U2 can meet the target number of data bits D , i.e., the constraints in (17) and (18) can be satisfied, P1 is feasible. Thus, the following problem P2 aiming to obtain the maximum number of data bits received by U2 is formulated as

\(\begin{equation} (P 2): \max _{\beta, \tau,\left\{\alpha^{i}\right\},\left\{p_{1}^{i} \geq 0\right\},\left\{p_{2}^{i} \geq 0\right\}} \min \left\{D_{1, x_{2}}, D_{2, x_{2}}\right\} \end{equation}\\ s.t. (16),(19),(20),(21),(22).\)       (23)

We can easily verify that the objective function in (23) prefers a smaller αi. Thus, the optimal αi for P2 is zero and P2 can be reformulated as

\(\begin{equation} \begin{aligned} (P 3): & \max _{\beta, \tau,\left\{p_{1}^{\prime} \geq 0\right\},\left\{p_{2}^{i} \geq 0\right\}} \min \left\{D_{1, x_{2}}^{\prime}, D_{2, x_{2}}\right\} \\ & \text { s.t. }(16),(19),(21),(22) \end{aligned} \end{equation}\)       (24)

where \(\begin{equation} D_{1, x_{2}}^{\prime}=\tau R_{1, x_{2}}^{\prime} \end{equation}\) and

\(\begin{equation} R_{1, x_{2}}^{\prime}=\sum_{i \in \Omega} \log _{2}\left(1+\frac{(1-\beta) p_{1}^{i}\left|h_{1}^{i}\right|^{2}}{\sigma_{1}^{2}}\right) \end{equation}.\)       (25)

P3 is non-convex because of the objective function in (24), and we can solve P3 based on the block-coordinate descent method by iteratively optimizing {p1i} and {p2i} with given τ and β , and optimizing τ and β with given {p1i} and {p2i}.

Firstly, we optimize {p1i} and {p2i} with given τ and β . This problem is non-convex, and we first optimize {p1i} to obtain the largest D'1,x2 by solving the following problem

\(\begin{equation} \begin{array}{l} \max _{\left\{p_{1}^{t} \geq 0\right\}} D_{1, x_{2}}^{\prime} \\ \text { s.t. }(16) . \end{array} \end{equation}\)       (26)

The above problem is convex and can be solved by the Lagrange multiplier method. The solution is

\(\begin{equation} p_{1}^{i}=\left(\frac{\tau}{\lambda \ln 2}-\frac{\sigma_{1}^{2}}{(1-\beta)\left|h_{1}^{i}\right|^{2}}\right)^{+} \end{equation},\)       (27)

where (.)+ = max{.,0}, λ is the Lagrange multiplier and is numerically obtained from \(\begin{equation} \sum_{i \in \Omega} p_{1}^{i}=P \end{equation}\). Then, we optimize {p2i} with given p1i in (27) by solving the following problem

\(\begin{equation} \begin{array}{l} \max _{\left\{p_{2}^{i} \geq 0\right\}} D_{2, x_{2}} \\ \text { s.t. }(19). \end{array} \end{equation}\)       (28)

The above problem is convex and can be solved similar to the problem in (26). The solution is

\(\begin{equation} p_{2}^{i}=\left(\frac{1}{v \ln 2}-\frac{\sigma_{2}^{2}}{\left.h_{2}^{i}\right|^{2}}\right)^{+} \end{equation},\)       (29)

where ν is the Lagrange multiplier and is numerically obtained from \(\begin{equation} \sum_{i \in \Omega} p_{2}^{i}(1-\tau)=\sum_{i \in \Omega} \beta \eta p_{1}^{i}\left|h_{1}^{i}\right|^{2} \tau \end{equation}\). After that, we compare D'1,x2 and D2,x2 based on the obtained p1i in (27) and p2i in (29). If \(\begin{equation} D_{1, x_{2}}^{\prime} \leq D_{2, x_{2}} \end{equation}\), this means the largest D'1,x2 is no larger than D2,x2 and the optimal function value of (26) is equal to the optimal function value of (24), and in this case, the above solution in (27) and (29) is the solution of p1i and p2i with given τ and β . Otherwise, we obtain the largest D2,x2 in what follows. Let \(\begin{equation} p_{\min }=\sum_{i \in \Omega} \beta \eta p_{1}^{i}\left|h_{1}^{i}\right|^{2} \tau \end{equation}\), where p1i is obtained in (27). It is easy to verify that a larger \(\begin{equation} \sum_{i \in \Omega} \beta \eta p_{1}^{i}\left|h_{1}^{i}\right|^{2} \tau \end{equation}\) leads to a larger D2,x2. Thus, we allocate all the power to the subcarrier with the maximum channel gain, i.e.,

\(\begin{equation} p_{1}^{i}=P, p_{1}^{i}=0, i^{*}=\arg \max _{i \in \Omega}\left|h_{1}^{i}\right|^{2}, i \neq i^{*}, i \in \Omega \end{equation}\)       (30)

Then, we optimize {pi2} to maximize D2,x2 by solving the following problem

\(\begin{equation} \max _{\left\{p_{2}^{\prime} \geq 0\right\}} D_{2, x_{2}} \end{equation}\)       (31)

\(\begin{equation} \text { s.t. } \sum_{i \in \Omega} p_{2}^{i}(1-\tau) \leq \beta \eta P\left|h_{1}^{i}\right|^{2} \tau \end{equation}.\)       (32)

The above problem is convex and can be solved as

\(\begin{equation} p_{2}^{i}=\left(\frac{1}{\omega \ln 2}-\frac{\sigma_{2}^{2}}{\left|h_{2}^{i}\right|^{2}}\right)^{+} \end{equation},\)       (33)

where ω is the Lagrange multiplier and is numerically obtained from \(\begin{equation} \sum_{i \in \Omega} p_{2}^{i}(1-\tau)=\beta \eta P\left|h_{1}^{i}\right|^{2} \tau \end{equation}\). We then compare D'1,x2 and D2,x2 based on the obtained pi1 in (30) and pi2 in (33) again. If \(\begin{equation} D_{1, x_{2}}^{\prime} \geq D_{2, x_{2}} \end{equation}\), this means the largest D2,x2 is no larger than D'1,x2 and the optimal function value of (31) is equal to the optimal function value of (24), and in this case, the above solution in (30) and (33) is the solution of pi1 and pi2 with given τ and β . Otherwise, we obtain the solution of P3 as follows. Let \(\begin{equation} p_{\max }=\beta \eta P\left|h_{1}^{i}\right|^{2} \tau \end{equation}\) and \(\begin{equation} p=\left(p_{\min }+p_{\max }\right) / 2 \end{equation}\), then we optimize {pi2} by solving the following problem

\(\begin{equation} \max _{\left\{p_{2}^{\prime} \geq 0\right\}} D_{2, x_{2}} \end{equation}\)       (34)

\(\begin{equation} \text { s.t. } \sum_{i \in \Omega} p_{2}^{i}(1-\tau) \leq p \end{equation}.\)       (35)

The above problem is convex and can be solved as

\(\begin{equation} p_{2}^{i}=\left(\frac{1}{\sigma \ln 2}-\frac{\sigma_{2}^{2}}{\left|h_{2}^{i}\right|^{2}}\right)^{+} \end{equation},\)       (36)

where ϖ is the Lagrange multiplier and is numerically obtained from \(\begin{equation} \sum_{i \in \Omega} p_{2}^{i}(1-\tau)=p \end{equation}\).

Similarly, we optimize {pi1} by solving the following problem

\(\begin{equation} \max _{\left\{p_{1}^{\prime} \geq 0\right\}} D_{1, x_{2}}^{\prime} \end{equation}\)       (37)

\(\begin{equation} \text { s.t. } \sum_{i \in \Omega} p_{1}^{i}=P \text { , } \end{equation}\)       (38)

\(\begin{equation} \sum_{i \in \Omega} \beta \eta p_{1}^{i}\left|h_{1}^{i}\right|^{2} \tau=p \end{equation}\)       (39)

Such problem is convex and can be solved with the Lagrange duality method [39][40]. The Lagrangian of the problem can be written as

\(\begin{equation} L\left(\mu_{1}, \mu_{2},\left\{p_{1}^{i}\right\}\right)=D_{1, x_{2}}^{\prime}-\mu_{1}\left[\sum_{i \in \Omega} p_{1}^{i}-P\right]-\mu_{2}\left[\sum_{i \in \Omega} \beta \eta p_{1}^{i}\left|h_{1}^{i}\right|^{2} \tau-p\right] \end{equation},\)       (40)

where µ1 and µ2 are the non-negative dual variables. The dual function is written as

\(\begin{equation} \max _{\left\{p_{1}^{i} \geq 0\right\}} L\left(\mu_{1}, \mu_{2},\left\{p_{1}^{i}\right\}\right) \end{equation}.\)       (41)

Since \(\begin{equation} L\left(\mu_{1}, \mu_{2},\left\{p_{1}^{i}\right\}\right) \end{equation}\) is a concave function of pi1, the solution of pi1 can be obtained by setting the first derivative of \(\begin{equation} L\left(\mu_{1}, \mu_{2},\left\{p_{1}^{i}\right\}\right) \end{equation}\) with respect to pito zero as

\(\begin{equation} p_{1}^{i}=\left(\frac{\tau}{\left(\mu_{1}+\mu_{2} \beta \eta \tau\left|h_{1}^{i}\right|^{2}\right) \ln 2}-\frac{\sigma_{1}^{2}}{(1-\beta)\left|h_{1}^{i}\right|^{2}}\right)^{+} \end{equation},\)       (42)

where µ1 and µ2 can be obtained by the ellipsoid method [41]. Finally, we compare D'1,x2 and D2,x2 based on the obtained pi1 in (42) and pi2 in (36). If \(\begin{equation} D_{1, x_{2}}^{\prime}>D_{2, x_{2}} \end{equation}\), we set \(\begin{equation} p_{\min }=p \end{equation}\), otherwise we set \(\begin{equation} p_{\max }=p \end{equation}\). Then, let \(\begin{equation} p=\left(p_{\min }+p_{\max }\right) / 2 \end{equation}\) and obtain pi1 and pi2 from (42) and (36) respectively. The above process continues until the gap between the values of D'1,x2 and D2,x2 cannot be further reduced.

Secondly, we optimize τ and β with given {pi1} and {pi2}. It can be verified that D'1,x2 and D2,x2 are monotonically increasing and decreasing functions of τ , respectively. With any given β , pi1 and pi2 , D'1,x2 is smaller than D2,x2 when τ =0 and D'1,x2 is larger than D2,x2 when τ =1 . Thus, there exists an optimal point (τ*, β*) such that \(\begin{equation} D_{1, x_{2}}^{\prime}=D_{2, x_{2}} \end{equation}\). From \(\begin{equation} D_{1, x_{2}}^{\prime}=D_{2, x_{2}} \end{equation}\) we obtain that

\(\begin{equation} \tau=\frac{R_{2, x_{2}}}{R_{1, x_{2}}^{\prime}+R_{2, x_{2}}} \end{equation}\)       (43)

By inserting (43) into the problem in (24), we get

\(\begin{equation} \max _{\beta} \frac{R_{2, x_{2}} R_{1, x_{2}}^{\prime}}{R_{1, x_{2}}^{\prime}+R_{2, x_{2}}} \end{equation}\)       (44)

For any β ∈[0 ,1], the constraint in (19) requires that

\(\begin{equation} \tau \geq \frac{\sum_{i \in \Omega} p_{2}^{i}}{\sum_{i \in \Omega} \beta \eta p_{1}^{i}\left|h_{1}^{i}\right|^{2}+\sum_{i \in \Omega} p_{2}^{i}} \end{equation}\)       (45)

Therefore, combining (43) with (45), we get the inequality with respect to β denoted as

\(\begin{equation} R_{2, x_{2}} \sum_{i \in \Omega} \beta \eta p_{1}^{i}\left|h_{1}^{i}\right|^{2} \geq \sum_{i \in \Omega} p_{2}^{i} R_{1, x_{2}}^{\prime} \end{equation}\)       (46)

We can note that the left formula of (46) monotonically increases with β , while the right formula of (46) monotonically decreases with β . Besides, the left formula is smaller than the right formula when β =0 and the left formula is larger than the right formula when β =1. Thus, there is an unique and constant C ∈(0,1) such that (46) is satisfied only if β ∈[C,1]. Note that the objective function in (44) is a decreasing function of β . Thus, the optimal β is equal to C , which is obtained by a bisection search within [0,1] from (46) at equality. Then the value of τ can be obtained from (43).

The iterative procedure of optimizing {pi1} and {pi2} with given τ and β and optimizing τ and β with given {pi1} and {pi2} terminates until the value of the objective function in P3 cannot be further improved. If the objective function value obtained in P3 reaches the target number of data bits D , P1 is considered to be feasible, otherwise, it is infeasible. Table 2 outlines the procedure of checking the feasibility of P1.

Table 2. Proposed scheme to check the feasibility of P1.

E1KOBZ_2020_v14n1_20_t0002.png 이미지

3.2 Resource allocation scheme

We propose to solve P1 by the block-coordinate descent method and the Lagrange duality method. The solution obtained in Table 2 is chosen to be a feasible initialization to start the iteration.

We first optimize {pi1} and {pi2} with given τ , β and {αi}. Such problem is convex and can be solved with the Lagrange duality method. The Lagrangian of the problem can be given as

\(\begin{equation} \begin{array}{c} L\left(\lambda_{1}, \lambda_{2}, \lambda_{3}, \lambda_{4},\left\{p_{1}^{i}\right\},\left\{p_{2}^{i}\right\}\right)=D_{1}-\lambda_{1}\left[\sum_{i \in \Omega} p_{1}^{i}-P\right]-\lambda_{2}\left[D-D_{1, x_{2}}\right]- \\ \lambda_{3}\left[D-D_{2, x_{2}}\right]-\lambda_{4}\left[\sum_{i \in \Omega} p_{2}^{i}(1-\tau)-\sum_{i \in \Omega} \beta \eta p_{1}^{i}\left|h_{1}^{i}\right|^{2} \tau\right] \end{array} \end{equation},\)       (47)

where λ1 , λ2 , λ3 and λ4 are the non-negative dual variables. The dual function is written as

\(\begin{equation} \max _{\left\{p_{1} \geq 0\right\},\left\{p_{2}^{i} \geq 0\right\}} L\left(\lambda_{1}, \lambda_{2}, \lambda_{3}, \lambda_{4},\left\{p_{1}^{i}\right\},\left\{p_{2}^{i}\right\}\right) \end{equation}.\)       (48)

Since \(\begin{equation} L\left(\lambda_{1}, \lambda_{2}, \lambda_{3}, \lambda_{4},\left\{p_{1}^{i}\right\},\left\{p_{2}^{i}\right\}\right) \end{equation}\) is a concave function of pi1 and pi2, the solution of pi1 and pi2 can be respectively obtained by setting the partial derivative of \(\begin{equation} L\left(\lambda_{1}, \lambda_{2}, \lambda_{3}, \lambda_{4},\left\{p_{1}^{i}\right\},\left\{p_{2}^{i}\right\}\right) \end{equation}\) with respect to pi1 or pi2 to zero as

\(\begin{equation} p_{1}^{i}=\left(\frac{-b+\sqrt{b^{2}-4 a c}}{2 a}\right)^{+} \end{equation},\)       (49)

\(\begin{equation} p_{2}^{i}=\left(\frac{\lambda_{3}}{\lambda_{4} \ln 2}-\frac{\sigma_{2}^{2}}{\left|h_{2}^{i}\right|^{2}}\right)^{+} \end{equation},\)       (50)

where \(\begin{equation} \bar{\gamma}=\frac{\sigma_{1}^{2}}{(1-\beta)\left|h_{1}^{i}\right|^{2}}, a=\alpha^{i}\left(\lambda_{4} \beta \eta\left|h_{1}^{i}\right|^{2}-\frac{\lambda_{1}}{\tau}\right) \ln 2, b=\left(\bar{\gamma}+\alpha^{i} \bar{\gamma}\right)\left(\lambda_{4} \beta \eta\left|h_{1}^{i}\right|^{2}-\frac{\lambda_{1}}{\tau}\right) \ln 2+\alpha^{i}, c=\bar{\gamma}^{2}\left(\lambda_{4} \beta \eta\left|h_{1}^{i}\right|^{2}-\frac{\lambda_{1}}{\tau}\right) \ln 2+\lambda_{2} \bar{\gamma}-\lambda_{2} \alpha^{i} \bar{\gamma}+\alpha^{i} \bar{\gamma} \end{equation},\)and the dual variables λ1 , λ2 , λ3 and λ4 can be obtained by the ellipsoid method.

Next, τ is optimized with given {pi1}, {pi2} β and {αi}. From the constraints (17), (18) and (19), the range of τ can be derived as

\(\begin{equation} \max \left(\frac{\sum_{i \in \Omega} p_{2}^{i}}{\sum_{i \in \Omega} p_{2}^{i}+\sum_{i \in \Omega} \beta \eta p_{1}^{i}\left|h_{1}^{i}\right|^{2}}, \frac{D}{R_{1, x_{2}}}\right) \leq \tau \leq 1-\frac{D}{R_{2, x_{2}}} \end{equation}.\)       (51)

Moreover, it is noted that the objective function in (15) is an increasing function of τ . Thus, the optimal τ is obtained as

\(\begin{equation} \tau=1-\frac{D}{R_{2, x_{2}}} \end{equation}.\)       (52)

Then, β is optimized with given {pi1}, {pi2} τ and {αi}. From (19), we can draw that

\(\begin{equation} \beta \geq \frac{\sum_{i \in \Omega} p_{2}^{i}(1-\tau)}{\sum_{i \in \Omega} \eta p_{1}^{i}\left|h_{1}^{i}\right|^{2} \tau} \end{equation}.\)       (53)

Since the objective in (15) is a decreasing function of β , the optimal β is obtained as

\(\begin{equation} \beta=\frac{\sum_{i \in \Omega} p_{2}^{i}(1-\tau)}{\sum_{i \in \Omega} \eta p_{1}^{i}\left|h_{1}^{i}\right|^{2} \tau} \end{equation}.\)       (54)

At last, we optimize {αi} with given τ , β , {pi1} and {pi2}. The constraint (17) can be rewritten as \(\begin{equation} \sum_{i \in \Omega} \tau \log _{2}\left((1-\beta) \alpha^{i} p_{1}^{i}\left|h_{1}^{i}\right|^{2}+\sigma_{1}^{2}\right) \leq \sum_{i \in \Omega} \tau \log _{2}\left((1-\beta) p_{1}^{i}\left|h_{1}^{i}\right|^{2}+\sigma_{1}^{2}\right)-D \end{equation}\) and the objective function in (15) can be rewritten as \(\begin{equation} \sum_{i \in \Omega} \tau \log _{2}\left((1-\beta) \alpha^{i} p_{1}^{i}\left|h_{1}^{i}\right|^{2}+\sigma_{1}^{2}\right)-N \tau \log _{2} \sigma_{1}^{2} \end{equation}\). Let

\(\begin{equation} t^{i}=\tau \log _{2}\left((1-\beta) \alpha^{i} p_{1}^{i}\left|h_{1}^{i}\right|^{2}+\sigma_{1}^{2}\right) \end{equation}.\)       (55)

Therefore, P1 is reformulated as

\(\begin{equation} \max _{\left\{t^{i}\right\}} \sum_{i \in \Omega} t^{i}-N \tau \log _{2} \sigma_{1}^{2} \end{equation}\)       (56)

\(\begin{equation} \text { s.t. } \sum_{i \in \Omega} t^{i} \leq \sum_{i \in \Omega} \tau \log _{2}\left((1-\beta) p_{1}^{i}\left|h_{1}^{i}\right|^{2}+\sigma_{1}^{2}\right)-D \end{equation}\)       (57)

\(\begin{equation} N \tau \log _{2} \sigma_{1}^{2} \leq \sum_{i \in \Omega} t^{i} \leq \sum_{i \in \Omega} \tau \log _{2}\left((1-\beta) p_{1}^{i}\left|h_{1}^{i}\right|^{2}+\sigma_{1}^{2}\right) \end{equation}\)       (58)

It is easy to verify that \(\begin{equation} \sum_{i \in \Omega} \tau \log _{2}\left((1-\beta) p_{1}^{i}\left|h_{1}^{i}\right|^{2}+\sigma_{1}^{2}\right)-D \geq N \tau \log _{2} \sigma_{1}^{2} \end{equation}\). Thus, we obtain the maximum value of the objective function in (56) as long as (57) is taken into equal. Let \(\begin{equation} t^{i}=\tau \log _{2}\left((1-\beta) p_{1}^{i}\left|h_{1}^{i}\right|^{2}+\sigma_{1}^{2}\right)-\frac{D}{N} \end{equation}\). Then, the optimal αi can be expressed as

\(\begin{equation} \alpha^{i}=\frac{2^{\frac{t^{i}}{\tau}}-\sigma_{1}^{2}}{(1-\beta) p_{1}^{i}\left|h_{1}^{i}\right|^{2}} \end{equation}\)       (59)

The iterative procedure of optimizing {pi1} and {pi2} with given τ , β and {αi}, optimizing τ with given {pi1} , {pi2}, β and {αi}, optimizing β with given {pi1} , {pi2}, τ and {αi}, optimizing {αi} with given {pi1} , {pi2}, τ and β terminates until the number of data bits received at U1 cannot be further improved. In summary, the proposed resource allocation scheme is outlined in Table 3.

Table 3. Proposed resource allocation scheme for cooperative SWIPT NOMA.

E1KOBZ_2020_v14n1_20_t0003.png 이미지

4. SIMULATION RESULTS

This section presents some simulation results to prove the performance of the proposed NOMA scheme. In the simulation, both the distance between the BS and U1, U1 and U2 are assumed to be 3m and we set the energy conversion efficiency η = 0.5 . The total system bandwidth is 10MHz and it is equally divided into 10 subcarriers. Without loss of generality, the large-scale path loss is modeled by 10-3d-2.5, where d denotes the distance. Moreover, we assume that the channels of all subcarriers follow the standard Rayleigh fading and the noise power at U1 and U2 is set to -90dBm, i.e., \(\begin{equation} \sigma_{1}^{2}=\sigma_{2}^{2}=-90 d B m \end{equation}\).

For comparison, we provide three reference schemes. In the first reference scheme named as NOMA with fixed β , the PS ratio is set to 0.5 and other variables are optimized similar to the proposed NOMA scheme. In the second scheme named as NOMA with fixed α , the PA coefficient is set to 0.2 while the other variables are also optimized similar to the proposed NOMA scheme. In the third reference scheme named as conventional OMA scheme, the TDMA mode is adopted to serve U1 and U2 with variable optimization method similar to the proposed NOMA scheme.

Fig. 2 presents the number of U1 data bits versus the maximum transmission power of the BS P for different schemes, where the target number of U2 data bits D is set to 10Mb. On the one hand, we can observe from the Fig. 2 that the number of U1 data bits grows with the increase of P and as P increases, the growth rate of U1 data slows down. This is reasonable, because a larger P enables U1 to harvest more energy and results in a higher number of transmitted data bits for U1. Besides, the U1 data in (6) is a logarithmic function of P which leads to the slower growth at the higher P . On the other hand, it is also shown that the proposed NOMA scheme outperforms the other schemes. This proves the superiority of the proposed NOMA scheme. This is because the proposed NOMA scheme harvests the energy of two users' signals together, while conventional OMA scheme can only collect the energy of one user.

E1KOBZ_2020_v14n1_20_f0002.png 이미지

Fig. 2. Number of U1 data bits versus P .

Fig. 3 shows the number of U1 data bits versus the target number of U2 data bits D for different schemes, where the maximum transmission power of the BS P is set to 10W. It can be observed that the number of U1 data bits decreases as the target number of U2 data bits D increases. This is because a higher D makes U2 take more resources which reduces the resources allocated to U1. We can observe that the numbers of U1 data bits of NOMA with fixed α or β schemes are much lower than the proposed NOMA scheme when D is small, while the performance of conventional OMA scheme is similar to the proposed NOMA scheme. This is because allocating a large amount of power to U2's signal and splitting too much power for forwarding U2’s signal are both unreasonable when D is small. As D increases, the performance gap between NOMA with fixed α or β schemes and the proposed scheme reduces, while the performance gap between conventional OMA scheme and the proposed scheme gets larger. The reasons are two-fold. Firstly, when D gets larger, U1 is required to harvest more energy for forwarding the signal of U2. The NOMA schemes provide the higher gain in the case of a higher D because of the simultaneous energy harvesting of two users, compared to the conventional OMA scheme. Secondly, it is reasonable to split a large amount of power for forwarding U2’s signal when D is large. It is worth mentioning that although the performances of NOMA with fixed α scheme approaches the proposed NOMA scheme when D is high, NOMA with fixed α has no feasible solution in the very high D regime.

E1KOBZ_2020_v14n1_20_f0003.png 이미지

Fig. 3. Number of U1 data bits versus D .​​​​​​​

In Fig. 4, we present the optimal values of α and β obtained by the proposed scheme versus the maximum transmission power of the BS P , where the target number of U2 data bits D is set to 10Mb. From Fig. 4 (a) we can observe that the optimal value of α increases with the increase of P . This is because a larger P makes it easier to satisfy the transmission requirement of U2, and U1 can get a greater proportion of power to improve its performance. Fig. 4 (b) shows that the optimal value of β decreases as P increases. The reason is that as P increases, a larger proportion of signal power received by U1 can be split for information decoding to improve the performance of U1.

E1KOBZ_2020_v14n1_20_f0004.png 이미지

Fig. 4. Optimal α and β obtained by the proposed scheme versus P​​​​​​​.

In Fig. 5, we depict the optimal values of α and β obtained by the proposed scheme versus the target number of U2 data bits D , where the maximum transmission power of the BS P is set to 10W. We can find that as D increase, the optimal value of α decreases, while the optimal value of β increases. This is reasonable, because when D gets larger, the power allocated to the signal of U2 and the energy harvested by U1 need to increase to meet U2’s transmission target. Besides, it is noted that for D <19 , the optimal values of α and β gradually approach the value of α = 0.2 and β = 0.5 fixed in reference NOMA schemes. This can reasonably explain why the performance of NOMA with fixed α or β schemes approaches the performance of the proposed scheme with the increase of D , as shown in Fig. 3.

E1KOBZ_2020_v14n1_20_f0005.png 이미지

Fig. 5. Optimal α and β obtained by the proposed scheme versus D .​​​​​​​

5. Conclusions

In summary, we considered a downlink multi-carrier cooperative NOMA system, which consists of one BS and a pair of the near and far users. It was assumed that between the BS and the far user, there is no direct link, and SWIPT is applied at the near user to harvest energy for forwarding the signal of the far user. Considering constraints of the energy causality, the minimum data and the transmission power, we maximized the number of data bits transmitted to the near user by jointly optimizing power allocation, subcarrier allocation, time allocation, the PA coefficient and the PS ratio. First of all, an iterative scheme based on the block-coordinate descent method and the Lagrange duality method was proposed to check the feasibility of the optimization problem. After that, another iterative scheme based on the same methods was proposed to achieve a suboptimal solution of the problem. Finally, simulation results demonstrated that our proposed scheme outperforms the reference NOMA schemes with fixed PS ratio or PA coefficient and the conventional OMA scheme.

References

  1. Haijun Zhang, Fang Fang, Julian Cheng, Keping Long, Wei Wang and Victor C. M. Leung, "Energy-Efficient Resource Allocation in NOMA Heterogeneous Networks," IEEE Wireless Communications, vol. 25, no. 2, pp. 48-53, April, 2018. https://doi.org/10.1109/mwc.2018.1700074
  2. Yuanwei Liu, Zhijin Qin, Maged Elkashlan, Zhiguo Ding, Arumugam Nallanathan and Lajos Hanzo, "Nonorthogonal Multiple Access for 5G and Beyond," Proceedings of the IEEE, vol. 105, no. 12, pp. 2347-2381, December, 2017. https://doi.org/10.1109/JPROC.2017.2768666
  3. Haijun Zhang, Ning Yang, Keping Long, Miao Pan, George K. Karagiannidis and Victor C. M. Leung, "Secure Communications in NOMA System: Subcarrier Assignment and Power Allocation," IEEE Journal on Selected Areas in Communications, vol. 36, no. 7, pp. 1441-1452, July, 2018. https://doi.org/10.1109/JSAC.2018.2825559
  4. Zhiguo Ding, Yuanwei Liu, Jinho Choi, Qi Sun,Maged Elkashlan, Chih-Lin I and H. Vincent Poor, "Application of Non-Orthogonal Multiple Access in LTE and 5G Networks," IEEE Communications Magazine, vol. 55, no. 2, pp. 185-191, February, 2017. https://doi.org/10.1109/MCOM.2017.1500657CM
  5. Haijun Zhang, Yu Qiu, Keping Long, George K. Karagiannidis, Xianbin Wang and Arumugam Nallanathan, "Resource Allocation in NOMA-Based Fog Radio Access Networks," IEEE Wireless Communications, vol. 25, no. 3, pp. 110-115, June, 2018. https://doi.org/10.1109/MWC.2018.1700326
  6. Zhiguo Ding, Xianfu Lei, George K. Karagiannidis, Robert Schober, Jinhong Yuan and Vijay K. Bhargava, "A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends," IEEE Journal on Selected Areas in Communications, vol. 35, no. 10, pp. 2181-2195, October, 2017. https://doi.org/10.1109/JSAC.2017.2725519
  7. Haijun Zhang, Baobao Wang, Chunxiao Jiang, Keping Long, Arumugam Nallanathan, Victor C. M. Leung and H. Vincent Poor, "Energy Efficient Dynamic Resource Optimization in NOMA Systems," IEEE Transactions on Wireless Communications, vol. 17, no. 9, pp. 5671-5683, September, 2018. https://doi.org/10.1109/TWC.2018.2844359
  8. Qi Sun, Shuangfeng Han, Chin-Lin I and Zhengang Pan, "On the Ergodic Capacity of MIMO NOMA Systems," IEEE Wireless Communications Letters, vol. 4, no. 4, pp. 405-408, August, 2015. https://doi.org/10.1109/LWC.2015.2426709
  9. Zhiguo Ding, Fumiyuki Adachi and H. Vincent Poor, "The Application of MIMO to Non-Orthogonal Multiple Access," IEEE Transactions on Wireless Communications, vol. 15, no. 1, pp. 537-552, January, 2016. https://doi.org/10.1109/TWC.2015.2475746
  10. Qi Sun, Shuangfeng Han, Zhikun Xu, Sen Wang, Chih-Lin I and Zhengang Pan, "Sum Rate Optimization for MIMO Non-Orthogonal Multiple Access Systems," in Proc. of IEEE Wireless Communications and Networking Conference, pp. 747-752, June, 2015.
  11. Zhiguo Ding, Pingzhi Fan and H. Vincent Poor, "Impact of User Pairing on 5G Nonorthogonal Multiple-Access Downlink Transmissions," IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6010-6023, August, 2016. https://doi.org/10.1109/TVT.2015.2480766
  12. Yi Zhang, Qian Yang, Tong-Xing Zheng, Hui-Ming Wang, Ying Ju and Yue Meng, "Energy Efficiency Optimization in Cognitive Radio Inspired Non-Orthogonal Multiple Access," in Proc. of IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, pp. 1-6, December, 2016.
  13. Sultangali Arzykulov, Galymzhan Nauryzbayev, Theodoros A. Tsiftsis and Mohamed Abdallah, "Outage Performance of Underlay CR-NOMA Networks," in Proc. of 10th International Conference on Wireless Communications and Signal Processing, pp. 1-6, December, 2018.
  14. Zhiguo Ding, Mugen Peng and H. Vincent Poor, "Cooperative Non-Orthogonal Multiple Access in 5G Systems," IEEE Communications Letters, vol. 19, no. 8, pp. 1462-1465, August, 2015. https://doi.org/10.1109/LCOMM.2015.2441064
  15. Jung-Bin Kim and In-Ho Lee, "Capacity Analysis of Cooperative Relaying Systems Using Non-Orthogonal Multiple Access," IEEE Communications Letters, vol. 19, no. 11, pp. 1949-1952, November, 2015. https://doi.org/10.1109/LCOMM.2015.2472414
  16. Zhiguo Ding, Huaiyu Dai and H. Vincent Poor, "Relay Selection for Cooperative NOMA," IEEE Wireless Communications Letters, vol. 5, no. 4, pp. 416-419, August, 2016. https://doi.org/10.1109/LWC.2016.2574709
  17. Jooncherl Ho and Minho Jo, "Offloading Wireless Energy Harvesting for IoT Devices on Unlicensed Bands," IEEE Internet of Things Journal, vol. 6, no. 2, pp. 3663-3675, April, 2019. https://doi.org/10.1109/JIOT.2018.2890114
  18. Suzhi Bi, Chin Keong Ho and Rui Zhang, "Wireless Powered Communication: Opportunities and Challenges," IEEE Communications Magazine, vol. 53, no. 4, pp. 117-125, April, 2015. https://doi.org/10.1109/MCOM.2015.7081084
  19. Ding Xu and Qun Li, "Cooperative Resource Allocation in Cognitive Radio Networks with Wireless Powered Primary Users," IEEE Wireless Communications Letters, vol. 6, no.5, pp. 658-661, October, 2017. https://doi.org/10.1109/LWC.2017.2727493
  20. Hongyuan Gao, Waleed Ejaz and Minho Jo, "Cooperative Wireless Energy Harvesting and Spectrum Sharing in 5G Networks," IEEE Access, vol. 4, pp. 3647-3658, July, 2016. https://doi.org/10.1109/ACCESS.2016.2579598
  21. Ding Xu and Qun Li, "Resource Allocation for Secure Communications in Cooperative Cognitive Wireless Powered Communication Networks," IEEE Systems Journal, pp. 1-12, 2018.
  22. Jun Huang, Cong-Cong Xing, Yi Qian and Zygmunt J. Haas, "Resource Allocation for Multicell Device-to-Device Communications Underlaying 5G Networks: A Game-Theoretic Mechanism with Incomplete Information," IEEE Transactions on Vehicular Technology, vol. 67, no. 3, pp. 2557-2570, March, 2018. https://doi.org/10.1109/TVT.2017.2765208
  23. Dong-Woo Lim, Joonhyuk Kang, Chang-Jae Chun and Hyung-Myung Kim, "Joint Transmit Power and Time-Switching Control for Device-to-Device Communications in SWIPT Cellular Networks," IEEE Communications Letters, vol. 23, no. 2, pp. 322-325, February, 2019. https://doi.org/10.1109/LCOMM.2018.2883432
  24. Jun Huang, Shuai Huang, Cong-Cong Xing, and Yi Qian, "Game-Theoretic Power Control Mechanisms for Device-to-Device Communications Underlaying Cellular System," IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp. 4890-4900, Jan, 2018. https://doi.org/10.1109/TVT.2018.2800051
  25. Lav R. Varshney, "Transporting Information and Energy Simultaneously," in Proc. of IEEE International Symposium on Information Theory, Toronto, Canada, pp. 1612-1616, July, 2008.
  26. Jun Huang, Cong-Cong Xing and Chonggang Wang, "Simultaneous Wireless Information and Power Transfer: Technologies, Applications, and Research Challenges," IEEE Communications Magazine, vol. 55, no. 11, pp. 26-32, Nov, 2017. https://doi.org/10.1109/MCOM.2017.1600806
  27. Jing Zhang, Qingjie Zhou, Derrick Wing Kwan Ng and Minho Jo, "Optimal Energy Efficiency Fairness of Nodes in Wireless Powered Communication Networks," Sensors, vol. 17, no. 9, pp. 2125, September, 2017. https://doi.org/10.3390/s17092125
  28. Ding Xu and Qun Li, "Resource Allocation in Cognitive Wireless Powered Communication Networks with Wirelessly Powered Secondary Users and Primary Users," Science China Information Sciences, vol. 62, no. 2, pp. 29303, 2018. https://doi.org/10.1007/s11432-017-9387-5
  29. Ali A. Nasir, Xiangyun Zhou, Salman Durrani and Rodney A. Kennedy, "Relaying Protocols for Wireless Energy Harvesting and Information Processing," IEEE Transactions on Wireless Communications, vol. 12, no. 7, pp. 3622-3636, July, 2013. https://doi.org/10.1109/TWC.2013.062413.122042
  30. Rui Zhang and Chin Keong Ho, "MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer," IEEE Transactions on Wireless Communications, vol. 12, no. 5, pp. 1989-2001, May, 2013. https://doi.org/10.1109/TWC.2013.031813.120224
  31. Xun Zhou, Rui Zhang and Chin Keong Ho, "Wireless Information and Power Transfer in Multiuser OFDM Systems," IEEE Transactions on Wireless Communications, vol. 13, no. 4, pp. 2282-2294, April, 2014. https://doi.org/10.1109/TWC.2014.030514.131479
  32. Ding Xu and Hongbo Zhu, "Outage Minimized Resource Allocation for Multiuser OFDM Systems with SWIPT," IEEE Access, vol. 7, pp. 79714-79725, June, 2019. https://doi.org/10.1109/ACCESS.2019.2922965
  33. Mateen Ashraf, Ju-Wook Jang, Jong-Ki Han and Kyung Geun Lee, "Capacity Maximizing Adaptive Power Splitting Protocol for Cooperative Energy Harvesting Communication Systems," IEEE Communications Letters, vol. 22, no. 5, pp. 902-905, May, 2018. https://doi.org/10.1109/LCOMM.2018.2808960
  34. Lu Liu, Zhifei Zhang, Chao Shen, Jie Gong and Tsung-Hui Chang, "Wireless Powered Cooperative Non-Orthogonal Multiple Access Transmission," in Proc. of IEEE International Conference on Communications Workshops, pp. 1-6, July, 2018.
  35. Yinghui Ye, Yongzhao Li, Dan Wang and Guangyue Lu, "Power Splitting Protocol Design for the Cooperative NOMA with SWIPT," in Proc. of IEEE International Conference on Communications, pp. 1-5, July, 2017.
  36. Yanqing Xu, Chao Shen, Zhiguo Ding, Xiaofang Sun, Shi Yan, Gang Zhu and Zhangdui Zhong, "Joint Beamforming and Power-Splitting Control in Downlink Cooperative SWIPT NOMA Systems," IEEE Transactions on Signal Processing, vol. 65, no. 18, pp. 4874-4886, September, 2017. https://doi.org/10.1109/TSP.2017.2715008
  37. Yuanwei Liu, Zhiguo Ding, Maged Elkashlan and H. Vincent Poor, "Cooperative Non-Orthogonal Multiple Access in 5G Systems with SWIPT," in Proc. of 23rd European Signal Processing Conference, pp. 1999-2003, December, 2015.
  38. Lin Zhang, Jiaqi Liu, Ming Xiao, Gang Wu, Ying-Chang Liang and Shaoqian Li, "Performance Analysis and Optimization in Downlink NOMA Systems With Cooperative Full-Duplex Relaying," IEEE Journal on Selected Areas in Communications, vol. 35, no. 10, pp. 2398-2412, October, 2017. https://doi.org/10.1109/JSAC.2017.2724678
  39. Stephen Boyd and Lieven Vandenberghe, Convex Optimization, Cambridge University Press, 2004.
  40. Ding Xu and Qun Li, "Joint Power Control and Time Allocation for Wireless Powered Underlay Cognitive Radio Networks," IEEE Wireless Communications Letters, vol. 6, no. 3, pp. 294-297, June, 2017. https://doi.org/10.1109/LWC.2017.2676102
  41. Robert G. Bland, Donald Goldfarb and Michael J. Todd, "Feature Article-The Ellipsoid Method: A Survey," Operations Research, vol. 29, no. 6, pp. 1039-1091, December, 1981. https://doi.org/10.1287/opre.29.6.1039