Professional Documents
Culture Documents
Resource Allocation For Wireless-Powered IoT PDF
Resource Allocation For Wireless-Powered IoT PDF
WPCN was studied in [7] and [15] by assuming perfect channel coding rate for a noiseless binary communication
and imperfect channel state information (CSI), respectively. channel with EH transmitter was characterized in [30], and
In addition, due to the hardware limitations of EH circuits, then the results were extended to both AWGN channels
the energy conversion efficiency is not linear in the received and discrete memoryless channels in [31]. Next, the out-
power, thus the traditional linear EH model leads to a subop- age probability and throughput of WPCN were analyzed
timal resource allocation scheme [16]. To address this issue, in [32] and [33], in which the analytical and numerical
a practical non-linear EH model is proposed for resource results were applied to investigate the interplay between the
allocation in SWIPT system [17] and WPCN system [18], time allocation between energy and information transmis-
respectively. sions, the packet error probability, and the power ratio. Then,
The above studies adopt Shannon capacity as the perfor- an approximation expression was derived in [34] to charac-
mance metric to evaluate the transmission rate or throughput, terize the performance of error probability and latency under
which implicitly assume infinite blocklength transmissions. quasi-static Nakagami-m fading. Besides, a cooperative system
However, due to the stringent latency requirement in IoT, under quasi-static Rayleigh fading was considered in [35] and
IoT networks are in general dominated by short packet commu- the error probability was derived under perfect/imperfect CSI.
nication (SPC) [19], [20], which uses finite blocklength codes
and adopts a small number of symbols in one transmission C. Main Contributions
frame. Therefore, conventional resource allocation based on As aforementioned, SPC suffers from a low transmis-
Shannon capacity achieved by infinite-length packets is not sion rate and a significant packet error rate compared to
optimal for IoT network design. In fact, the packet length the conventional long-packet communication, which assumes
has a significant impact on the IoT network. In particular, an infinite blocklength. The differences between this paper
SPC suffers from a maximum achievable rate smaller than the and the existing works, i.e., [7]–[18], [21]–[35], are mainly
Shannon capacity, as well as a significant packet error rate, two-fold. On one hand, [7]–[18] consider the conventional
even when the transmission rate is smaller than the channel long-packet communication and adopt Shannon capacity as
capacity. In other words, the designs in the existing literature the performance metric to design the resource allocation in
on WPCN cannot be directly used in IoT communications. a RF-WPT IoT network. However, IoT networks are in general
Therefore, it is important to take the packet length into dominated by SPC, and thus the resource allocation schemes
consideration in the IoT network design. in [7]–[18] are suboptimal in IoT networks. On the other
hand, [21]–[35] consider the transmission rate and the packet
B. Related Work on SPC error rate separately, and thus the algorithms therein are
To support low-latency communications, SPC has been suboptimal to balance the transmission rate and the packet
studied in the last few years [21]–[29]. In 2010, a closed- error rate. Different from [7]–[18], [21]–[35], we study the
form expression of the maximum achievable rate with resource allocation in a wireless-powered IoT network (WPIN)
single-antenna SPC was approximately obtained from an with SPC, and define effective-throughput and effective-
information-theoretic perspective in [21]. Then, the results amount-of-information as the performance metrics to balance
in [21] were extended in various SPC scenarios. In particular, the transmission rate and packet error rate.
parallel additive white Gaussian noise (AWGN) channels The main contents of this paper are summarized as follows:
were considered in [22], and a modified water-filling power • We formulate a total effective-throughput maximization
allocation scheme was proposed to maximize the lower bound problem with both the transmission time (equivalently,
of the sum rate. In addition, the maximum achievable rate packet length) and packet error rate of each user as
of multiple-antenna SPC was studied in [23], which analyzed variables. Unfortunately, this optimization problem is
the tradeoff between the reliability, throughput, and latency non-convex due to the following two reasons. First,
in Rayleigh block-fading channels. Then, a constellation and the optimization problem has an integer requirement on
channel coding rate selection problem was studied in adaptive the packet length, thus making the problem as a mixed-
modulation and coding for MIMO systems [24], where a new integer programming, which is a non-convex problem
selecting rule was proposed to achieve the maximal coding and difficult to solve in general. Second, the objective
rate. Besides, a resource allocation for downlink multi-user function is not jointly concave with respect to the packet
scenario was studied in [25], where a multi-objective optimiza- length and packet error rate of each user. Thus, it may
tion problem was formulated to balance the maximum sum cause intractable complexity to obtain the optimal solu-
rate and the minimum error probability. Also, a scheduling tion. Instead, we develop an efficient algorithm based
problem in a multi-user SPC network was investigated in [26], on the principles of the block coordinate descent (BCD)
where an energy-efficient scheduling algorithm was developed. [36], [37] and concave-convex procedure (CCCP) [38] to
In addition, an energy-latency tradeoff problem with latency solve the problem sub-optimally in an iterative manner.
constraint was studied in [27], where a dynamic programming Besides, we provide the convergence and complexity
algorithm was developed. As for SPC without channel state analysis of the proposed algorithm.
information (CSI), a packet efficiency maximization by opti- • We formulate a total transmission time (equivalently,
mizing the training overhead was studied in [28] and [29]. the total packet length) minimization problem with both
Recently, the study on SPC-enabled RF-WPT has received the transmission time and packet error rate of each
increasing attention [30]–[35]. Specifically, an achievable user as variables. In particular, we consider a minimum
CHEN et al.: RESOURCE ALLOCATION FOR WPINs WITH SPC 1449
Fig. 1. WPIN with SPC: (a) System model; (b) Block structure.
effective-amount-of-information constraint for each user divided into two stages, i.e., Stage I and Stage II. In Stage I,
to guarantee its quality of service. However, this opti- each user estimates CSI by using the pilots transmitted by the
mization problem is also non-convex and difficult to be HAP, and feeds it back to the HAP. Then, the HAP carries out
solved optimally. Again, we develop an efficient iterative the optimization of the resource allocation and broadcasts the
algorithm based on the principles of the BCD and CCCP resource allocation scheme to all users. Stage II is composed
to solve the problem sub-optimally. In addiction, we also of multiple frames with an equal length duration and each
provide the convergence and complexity analysis of the frame is divided into two successive phases, i.e., downlink
proposed algorithm. WPT phase and uplink WIT phase.
• Although the proposed algorithms are based on BCD and
CCCP, there are three main differences, i.e., 1) it is not
B. Assumption Discussion
straightforward to apply BCD or CCCP to our formulated
problems directly, 2) we have modified and combined the In the studied systems, we have three main assumptions.
two algorithms to jointly solve the formulated problems, Firstly, it is clear that estimating the CSI at users and feeding
3) we obtain the optimal semi-closed/colsed form solution the estimated CSI back to the HAP consume the energy at
in each iteration of BCD and CCCP and we theoretically users. Similar to [39] and [40], we assume that each user
prove the convergence. Besides, simulations show that has a dedicated battery, which does not rely on the harvested
the proposed algorithms can achieve similar performances energy and is only used to power basic functionalities, e.g.,
as that of the optimal solution via exhaustive search CSI estimation and exchange. Secondly, we assume perfect
(which, however, requires a prohibitive complexity as the CSI at the HAP [11], [39]–[41]. With this assumption, we can
number of users becomes large.), and also outperform the obtain the optimal resource allocation and the corresponding
benchmark schemes. performance limit, both of which can be used to shed light
The rest of this paper is organized as follows. Section II on the system design for a practical WPIN. Thirdly, since the
presents the system model of WPIN. Section III studies the locations of the HAP and the users are usually fixed in an IoT
total effective-throughput maximization problem. Section IV scenario, the channel coherence time (the length of one block)
investigates the total transmission time minimization problem. is relatively large [41]. In other words, the length of Stage I
Section V provides simulation results to validate the effective- is negligible compared to the length of the whole block [41].
ness of the proposed algorithms. Finally, Section VI concludes Thus, we will ignore the impact of the overhead in Stage I on
the paper. the system performance and focus on the resource allocation
scheme design in Stage II.
II. S YSTEM M ODEL
We consider a wireless-powered IoT network (WPIN) with C. Transmission Model
SPC shown in Fig. 1(a), which consists of a single-antenna
1) Downlink WPT: Let s0 be the downlink signal with unit
HAP and K single-antenna users, namely, U1 , U2 , · · · , UK .
power from the HAP to the users. Then, the received signal yk
Specifically, the HAP broadcasts an RF signal to charge these
at the k-th user Uk is
users wirelessly, which can be regarded as downlink WPT
phase, and then these users send short data packets to the HAP
yk = PH gk s0 + uk , (1)
using the harvested energy via a TDMA scheme, which can be
regarded as uplink wireless information transfer (WIT) phase. where PH is the transmit power of the HAP, gk and uk are the
In the following, we provide the channel model, assumption channel gain between the HAP and user Uk , and the AWGN
discussion and transmission model, respectively. at user Uk , respectively.
Due to hardware limitations of EH circuits, the energy
A. Channel Model conversion efficiency is non-linear. Hence, we adopt a non-
We assume quasi-static fading channels in the considered linear RF EH model to capture the non-linearity of practical
system, i.e., the coefficient of each channel remains constant EH circuit [16]. Specifically, if we denote τ0 as the trans-
within each block and varies independently among different mission duration of the downlink power transfer and ignore
blocks. The block structure is given in Fig. 1(b), which is the low noise power, the harvested energy at user Uk can be
1450 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 18, NO. 2, FEBRUARY 2019
T
expressed as and = [1 , 2 , · · · , K ] . Define the transmitted effective-
amount-of-information1 of user Uk in nats as
Mk
1+exp(−k (gk PH −jk )) − M k Ωk
Ek =
1 − Ωk
τ0 , fk = nk qk (1 − k ) = (1 − k )[ck (n) − ωk (n)Q−1 (k )]. (7)
1
Ωk = , (2)
1 + exp (k jk ) III. T OTAL E FFECTIVE -T HROUGHPUT M AXIMIZATION
where the constant parameters Mk , k and jk , 1 ≤ k ≤ K, In this section, we jointly optimize the transmission time
can jointly characterize the various non-linear behaviour of (equivalently, packet length) and packet error rate of each
EH models accurately [16]. user for maximizing the total effective-throughput of all users.
2) Uplink WIT: If we denote τk as the duration of the uplink In particular, we first provide the problem formulation and
signal from user Uk , the transmit power of user Uk in the analysis. Then, we provide efficient algorithms to solve this
uplink phase is Pk = Ek /τk . Then, the received signal at the problem sub-optimally.
HAP from user Uk is
xk = Pk gk sk + vk , (3) A. Problem Formulation and Analysis
where sk is the uplink signal with unit power from user Uk 1) Problem Formulation: For the scenario that all
to the HAP and vk is the AWGN at the HAP with zero mean IoT devices are regarded as an integrated transceiver system,
and power σ 2 . Accordingly, the signal-to-noise ratio (SNR) of (e.g., each user does not need to transmit information in
the uplink signal from user Uk to the HAP can be expressed each block and the HAP only focuses on the amount of
as information transmitted by this system.), we aim to jointly
optimize the packet length and the packet error rate of each
Mk user for maximizing the total effective-throughput of all users
1+exp(−ak (gk PH −bk )) − Mk Ωk gk τ0 αk τ0
γk = = , (4) in each short-length frame. Mathematically, according to (6),
(1 − Ωk ) σ τk
2 τk we formulate the optimization problem as
where αk = [ 1+exp(−aMkk(ggkk PH −bk )) − Mk Ωk gk ]/[(1 − Ωk )σ 2 ]. K
(P1) : max R (n, ) = rk (8a)
For notational simplicity, we denote τk = nk ts n, k=1
(0 ≤ k ≤ K), where ts is the symbol period of both downlink K
and uplink signals, and nk is the packet length (the number s.t. nk ≤ N , (8b)
k=0
of transmitted symbols) of the downlink/uplink signal sk .
According to [21], for a given packet error rate k and a nk ∈ N, 0 ≤ k ≤ K, (8c)
given packet length nk , the transmission rate in nats/second
(sec)/Hertz (Hz) of user Uk can be approximated as 0 < k ≤ max,k , 1 ≤ k ≤ K, (8d)
where N denotes the non-negative integer set. In particular,
αk n0 Vk −1
qk ≈ ln 1 + − Q (k ) , (5) (8b) is the maximum latency constraint (length of a frame),
nk nk
(8c) means that the number of symbols should be a non-
where Q−1 (x) is negative integer, and (8d) specifies the maximum tolerable
∞ 1 the inverse function of Q (x) = packet error rate for each user. Note that rk = 0 when
t2
x
√ exp − 2 dt, and Vk denotes the channel disper-
2π nk = 0, which guarantees the non-negative value of rk in
sion, i.e., Vk = 1 − 1/(1 + αnk kn0 )2 . the optimization.
Different from the long packet transmission in the conven- 2) Problem Analysis: To solve (P1), we first analyze the
tional wireless network, SPC suffers from a non-zero packet properties of the constraints in the following lemma.
error rate, even when the transmission rate is smaller than the Lemma 1: i The optimal n∗ should satisfy constraint (8b)
channel capacity. In this paper, we take both the transmission K
with equality, i.e., k=0 n∗k = N .
rate and the packet error rate into consideration and define the Proof: Please refer to Appendix A.
effective-throughput in nats/sec/Hz from user Uk to the HAP Note that, (P1) is a mixed-integer programming problem,
as which is generally a non-convex problem. Thus, it may cause
nk intractable complexity to obtain the globally optimal solution.
rk = qk (1 − k ) In this paper, we will solve (P1) with at least a local optimum
N
(1 − k )nk αk n0 Vk −1 in two steps. In the first step, we relax (P1) to a continuous
= [ln(1 + )− Q (k )] variable optimization problem by replacing constraint (8c)
N nk nk
1 − k
= ck (n) − ωk (n)Q−1 (k ) , (6) 1 Note that the effective-amount-of-information (nats) is a metric to char-
N acterize the amount of information that has been successfully transmitted,
while the effective-throughput (nats/sec/Hz) is a metric to characterize the
where N is defined as the overall
√ length of a frame, ck (n) = effective-amount-of-information that can be transmitted in a unit time and
T
nk ln(1 + αnk nk 0 ), ωk (n) = nk Vk , n = [n0 , n1 , · · · , nK ] , spectral resource.
CHEN et al.: RESOURCE ALLOCATION FOR WPINs WITH SPC 1451
with nk ≥ 0, 0 ≤ k ≤ K, i.e., where ‡k is the root of the equation Θ (k ) = 0, in which
Θ (k ) is given by
(P2) : max R (n, )
n, √ Q−1 (k )2
K Θ(k ) = 2πωk (n) exp( )(1 − k )
s.t. nk = N, (9) 2
k=0
nk ≥ 0, 0 ≤ k ≤ K, (10) + ωk (n)Q−1 (k ) − ck (n). (12)
(8d). Proof: Please refer to Appendix C.
Note that, ck (n) is a concave function with respect to n and Algorithm 1 BCD-CCCP Algorithm for Total Effective-
ωk (n; ni−1 ) is a linear function with respect to n. Thus, Throughput Maximization
the lower bound Rlb (n, ; ni−1 ) is concave with respect]
1: Initialize n = n(0) , t = 1.
to n.
2: repeat
Next, we optimize n to maximize the lower bound 3: Set n = n(t−1) and calculate (t) based on (11),
Rlb (n, ; ni−1 ) instead of maximizing R (n, ) directly.
4: Set = (t) , n0 = n(t−1) , i = 1,
In particular, the lower bound maximization problem can be
5: repeat
formulated as 6: Given ni , calculate ni+1 based on (15), and i ← i + 1,
(P2−c) : max Rlb (n, ; ni−1 ) s.t. (9), (10), 7: until n converges,
n
8: n(t) = ni∗ and t ← t + 1,
in which Rlb (n, ; ni−1 ) is a concave function with respect 9: until Γ = R(n(t) , (t) ) − R(n(t−1) , (t−1) )/R(n(t) , (t))
to n, while both (9) and (10) are affine sets with respect to n. converges.
Thus, (P2−c) is a convex optimization problem. By analyt-
ically solving (P2−c), we obtain the optimal solution in the
following theorem. By combining (17) with (18), we obtain
Theorem 5: The optimal solution n† for (P2−c) is given
by Rlb (ni+1 , (t) ; ni ) ≥ Rlb (ni , (t) ; ni−1 ), ∀ t, (19)
⎧
⎪
⎪ N which guarantees the convergence of the CCCP algorithm in
⎪
⎨ K z † + 1 , for k = 0, each iteration of the BCD algorithm.
n†k = k=1 k
(15)
⎪
⎪ α k n†0 Next, we prove the convergence of the BCD algorithm. Note
⎪
⎩ † , for 1 ≤ k ≤ K, that, in the (t + 1)-th iteration of the BCD algorithm, (t+1)
zk maximizes R(n(t) , ) in (P2−a), i.e.,
where zk† = −1 − 1, W (·)
λ† N
W − exp − 1− −Q−1 (k )∇ωk,k −1 R(n(t) , (t+1) ) = max R(n(t) , ) ≥ R(n(t) , (t) ). (20)
k
†
is the Lambert W-Function [12], and λ is the root of the
Then, we have
following equation (in terms of λ)
K R(n(t+1) , (t+1) )
λN −1
αk (k −1)W −exp(− −Q (k )∇ωk,k − 1) (a) (b)
k=1 1−k = R(ni∗ , (t+1) ) ≥ Rlb (ni∗ , (t+1) ; ni∗ −1 )
K
− Q−1 (k )∇ωk,0 (1 − k ) − λN = 0. (16) (c)
k=1 ≥ Rlb (n1 , (t+1) ; n0 )
Proof: Please refer to Appendix E. (d) (e)
≥ Rlb (n0 , (t+1) ; n0 ) = R(n0 , (t+1) )
(f) (g)
D. Convergence and Complexity Analysis = R(n(t) , (t+1) ) ≥ R(n(t) , (t) ), (21)
1) Convergence Analysis: In this part, we analyze the where in (a) we use n(t+1) = ni∗ in the (t + 1)-th iteration of
convergence of the proposed BCD-CCCP algorithm. To begin the BCD algorithm in Algorithm 1, in (b) and (e) we use (18),
with, we summarize the proposed algorithm in Algorithm 1 in (c) we use (19), in (d) we use (17), in (f) we use n0 = n(t)
with a double loop structure, i.e., the inner loop is from in the (t+1)-th iteration of the BCD algorithm in Algorithm 1,
step 5 to step 7 and the outer loop is from step 2 to and in (g) we use (20).
step 9. In particular, the inner loop is the iteration of the
Thus, we have R n(t+1) , (t+1) ≥ R n(t) , (t) , which
CCCP algorithm to solve (P2−b), and the outer loop is the guarantees the convergence.
iteration of BCD algorithm to solve (P2).
In the following, 2) Complexity Analysis: In this part, we analyze the com-
we will prove R n(t+1) , (t+1) ≥ R n(t) , (t) , where t is plexity of Algorithm 1, which is mainly composed of an inner
the iteration index of the BCD algorithm, which guarantees loop (i.e., CCCP algorithm) and an outer loop (i.e., BCD
the convergence of Algorithm 1. algorithm). The computational complexities of both inner loop
Since there is a CCCP algorithm in each iteration of the and outer loop are dominated by solving a non-linear equation.
BCD algorithm, we will first prove the convergence of the According to [42], the non-linear equation can be efficiently
CCCP algorithm in the t-th iteration of the BCD algorithm. solved by Newton’s method. Denote λn and λ as the gaps
Recall that, ni+1 is the optimal solution of (P2−c) in the between the initialized solutions and the exact solutions of
(i + 1)-th iteration of the CCCP algorithm. Then, we have solving the non-linear equations in the inner loop and the
Rlb (ni+1 , (t) ; ni ) = max Rlb (n, (t) ; ni ) outer loop respectively. Then, the computational complexities
n of solving the non-linear equations in the inner loop and the
≥ Rlb (ni , (t) ; ni ). (17) outer loop are O(
λn
) and O(
λ
), respectively, where
·
denotes Euclidean norm. If we denote Ic and Ib as the
Meanwhile, due to R (n, ) ≥ Rlb (n, ; ni ) from (14),
number of iterations for the inner loop and the outer loop
we have
respectively, the computational complexity of Algorithm 1
Rlb (ni , (t) ; ni ) = R(ni , (t) ) ≥ Rlb (ni , (t) ; ni−1 ). (18) can be expressed as O(Ic Ib
λn
λ
). In other words,
CHEN et al.: RESOURCE ALLOCATION FOR WPINs WITH SPC 1453
Algorithm 1 can converge to a local optimum with a poly- packet length and packet error rate to minimize the total
nomial time computational complexity. transmission time of users under the minimum effective-
amount-of-information requirement of each user. Mathemat-
E. Integer Conversion ically, we formulate the optimization problem as
K
If we denote († , n† ) as the solution of Algorithm 1, n† may (P3) : min N (n, ) = nk
violate the integer requirement in the original problem (P1). n, k=0
Thus, we need to convert n† to a feasible integer solution n∗ s.t. fk (n, k ) ≥ Dk , 1 ≤ k ≤ K,
and re-calculate the optimal , i.e., ∗ , by substituting n = (8c), (8d), (24)
n∗ into (P2−a). In the following, we focus on the integer
conversion and omit the re-calculation of the optimal . where Dk is the minimum effective-amount-of-information
In fact, the integer conversion problem belongs to a class requirement of user Uk and (24) is the individual minimum
of combinatorial optimization problem. In other words, it may effective-amount-of-information constraint.
cause intractable complexity to obtain the optimal solution. 2) Problem Analysis: Clearly, (P3) is a mixed-integer pro-
Alternatively, we develop a heuristic algorithm for the integer gramming problem, which is a non-convex problem. Thus,
conversion and obtain a suboptimal solution. The key idea is as it may cause intractable computational complexity to obtain
follows: We can rewrite each element in n† as the summation the globally optimal solution. Instead, we adopt a method
of an integer part and a fractional
part, i.e., n†k = ak +bk , 0 ≤ similar to that in the previous section and solve (P3) sub-
k ≤ K, where ak = n†k is the integer part and bk = n†k − optimally with two steps. In the first step, we relax (P3)
to a continuous variable optimization problem by replacing
n†k is the fractional part, and · denotes the integer floor constraint (8c) with (10), i.e.,
operation. Then, it is probable that the optimal integer solution K
is ak or ak + 1 for any k. Meanwhile, a large fractional part (P4) : min N (n, ) = nk s.t. (24), (10), (8d),
n, k=0
means a large chance that the optimal solution is ak + 1.
Specifically, we first initialize the integer solution as n∗k = and obtain the solution of (P4). In the second step, we perform
ak . Then, we sort bk , 0 ≤ k ≤ K, in a descending order. an integer conversion and update the solution of (P4) to satisfy
Without loss of generality, we assume b0 ≥ b1 · · · ≥ bK . constraint (8c) in (P3).
Finally, we update the integer solution as n∗k = ak + 1 for We notice that, the objective function in (P4) is regardless
K
0 ≤ k < k=0 bk . of and only determined by n. A straightforward scheme
Therefore, the heuristic integer solution is to solve (P4) is an exhaustive search over n. Specifically,
K for a specific value of n satisfying (10), if there exists a
∗ ak + 1, for 0 ≤ k < k=0 bk , satisfying both (8d) and (24), this value of n is feasible for
nk = (22)
ak , otherwise. (P4). Then, the optimal n, i.e.,n† , should be the feasible n
yielding the minimum value of K k=0 nk . In fact, a feasible n
IV. T OTAL T RANSMISSION T IME M INIMIZATION for (P4) can be alternatively stated as follows: For a specific
In this section, we consider that each user has a minimum value of n satisfying (10), if the maximum value of fk (n, k ),
effective-amount-of-information requirement, and minimize i.e., max fk (n, k ), is no smaller than Dk for any k, this
0<k ≤max
the total transmission time (equivalently, the total packet value of n is feasible for (P4).
length) to satisfy all users’ requirements by jointly optimizing It is worth noting that, for each feasible value of n, there
the transmission time and packet error rate of each user in each may exist multiple solutions of satisfying both (8d) and (24).
frame. We first provide the problem formulation and analysis. Thus, there may exist multiple optimal solutions of in (P4).
Then, we develop an efficient algorithm to solve this problem Nevertheless, we are interested in the optimal solution of
sub-optimally. maximizing the effective-amount-of-information fk (n, k )
for each k. Accordingly, the exhaustive search over n can
A. Problem Formulation and Analysis be modified as follows: for a specific value of n satisfy-
ing (10), we find the optimal by solving max fk (n, k ).
1) Problem Formulation: According to (7), the transmitted 0<k ≤max
effective-amount-of-information from user Uk can be rewritten If max fk (n, k ) is no smaller than Dk , this value of n is
0<k ≤max
as a function of n and k , i.e., feasible for (P4). Then, the optimaln, i.e., n† , is the feasible
K
fk (n, k ) = nk qk (1−k ) = (1 − k )[ck (n)−ωk (n)Q−1 (k )], n yielding the minimum value of k=0 nk and the optimal
†
k , 1 ≤ k ≤ K, is k = arg max fk (n, k ).
(23) 0<k ≤max
To avoid intractable complexity of the exhaustive search
where ck (n) and ωk (n) are defined
in the previous √ section, method, we develop a BCD algorithm to solve (P4) efficiently.
i.e., ck (n) = nk ln 1 + αnk nk 0 and ωk (n) = nk Vk , Specifically, we first decouple (P4) into two subproblems.
1 ≤ k ≤ K. The first subproblem is to maximize fk (n, k ), 1 ≤ k ≤ K,
For the scenario that all IoT devices are independent trans- by optimizing k for a given n, i.e.,
ceivers, (e.g.,the HAP requires to collect the information of
(P4−a) : max fk (n, k ) s.t. (8d).
each receiver in each block), we aim to jointly optimize the k
1454 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 18, NO. 2, FEBRUARY 2019
The second subproblem is to minimize N (n, ) by Algorithm 2 BCD-CCCP Algorithm for Total Transmission
designing n for a given , i.e., Time Minimization
(P4−b) : min N (n, ) s.t. (24), (10). 1: Initialize n = n(0) , t = 1.
n 2: repeat
Then, we iteratively solve (P4−a) and (P4−b) until N (n, ) 3: Set n = n(t−1) , calculate (t) based on (11),
converges to a global/local optimum. 4: Set = (t) , set n0 = n(t−1) , i = 1,
In the following subsections, we will develop algorithms to 5: repeat
obtain the globally/locally optimal solutions of (P4−a) and 6: Given ni , calculate ni+1 based on (27), and i ← i + 1,
(P4−b), respectively. Then, we provide the convergence and 7: until n converges.
complexity analysis of the modified BCD algorithm in this 8: n(t) = ni∗ , and t ← t + 1,
case. Finally, we design an integer conversion and update the |N (n(t) ,(t) )−N (n(t−1) ,(t−1) )|
9: until Γ = N (n(t) ,(t) )
converges.
solution of (P4) to meet constraint (8c).
Note that, ni+1 minimizes N n, (t) in the (i + 1)-th
iteration of the CCCP. Thus, we have
N (ni+1 , (t) ) ≤ N (ni , (t) ), ∀t, (33)
which guarantees the convergence of CCCP algorithm in the
each iteration of the BCD algorithm.
Meanwhile, we have
(a) (b)
N (n(t+1) , (t+1) ) = N (ni∗ , (t+1) ) ≤ N (n1 , (t+1) )
(c) (d)
≤ N (n(t) , (t+1) ) = N (n(t) , (t) ), (34)
where in (a) we use the fact that the CCCP algorithm con-
verges to the solution ni∗ in the (t + 1)-th iteration of the
BCD algorithm, i.e., n(t+1) = ni∗ , in (b) we use the conver-
gence of the CCCP algorithm, in (c) we use the fact that we
initialize n = n(t) in the CCCP algorithm in the (t + 1)-th
iteration of the BCD algorithm, and in (d) we use the fact that Fig. 2. Total effective-throughput versus the transmit power: K = 2,
N = 300, and dk = 12 m, 1 ≤ k ≤ K.
both N (n(t) , (t+1) ) and N (n(t) , (t) ) are independent of .
Therefore, we have N (n(t+1) , (t+1) ) ≤ N (n(t) , (t) ),
which guarantees the convergence. follows: Firstly, we design n∗k = ak +1, 1 ≤ k ≤ K; Secondly,
2) Complexity Analysis: In this part, we analyze the we substitute nk = n∗k in constraint (24) and obtain n∗0 , which
complexity of Algorithm 2, which is mainly composed of is the minimum integer satisfying (24).
an inner loop (i.e., CCCP algorithm) and an outer loop
(i.e., BCD algorithm). Similarly, the computational complexi- V. S IMULATION R ESULTS
ties of both inner loop and outer loop are dominated by solving In this section, we provide simulation results to evaluate
a non-linear equation, which can be expressed as O(
λn
) and the performance of the proposed algorithms. In particular,
O(
λ
), respectively. Then, the computational complexity of we assume that the noise power at the HAP is σ 2 =
Algorithm 2 can be expressed as O(Ic Ib
λn
λ
). In other −174 dBm/Hz and and the bandwidth is set as 1MHz [11].
words, Algorithm 2 can converge to a local optimum with a As for the parameters of the non-linear EH model in (2),
polynomial time computational complexity. we assume Mk = 24 mW, k = 0.0022, and jk = 1500,
1 ≤ k ≤ K [16]. Besides, we adopt a Rayleigh fading channel
E. Integer Conversion model as gk = 10−3 d−3k ρk , where dk is the distance between
If we denote († , n† ) as the solution of Algorithm 2, n† may the HAP and user Uk and ρk follows exponential distribution
violate the integer requirement in the original problem (P3). with unit mean. Note that the above channel model is assumed
Thus, we need to convert n† to satisfy integer constraint (8c) to have a 30 dB average signal power attenuation at a reference
in (P3). As aforementioned, the integer conversion problem distance of 1 meter (m) [11]. The transmit power of HAP
belongs to a class of combinatorial optimization problem, ranges form 5dbm to 15dbm based on 3GPP [43]. In addition,
and it may cause intractable computational complexity to each result is obtained by 104 Monte Carlo trials.
obtain the optimal solution. Thus, we develop a heuristic
algorithm and obtain a suboptimal solution. In particular, A. Total Effective-Throughput Maximization
the goal of the heuristic algorithm is to minimize the total In this subsection, we provide simulation results to evaluate
transmission time under the constraints in (P3), i.e., (8c), the performance of the proposed BCD-CCCP in Algorithm 1.
(8d), and (24). We notice that, it is easy to satisfy con- Two algorithms are also simulated for comparison. The first
straints (8c) and (8d). Thus, we only focus on constraint (24), one is the exhaustive search method, which is optimal but
i.e., fk (n, ) ≥ Dk , 1 ≤ k ≤ K. Recall that, fk (n, ) computationally prohibitive. The second one is the algo-
is a monotonically increasing function with respect to n0 . rithm designed for long packet communications in [11]. Note
Meanwhile, the monotonicity of fk (n, ) with respect to nk , that, [11] only invokes the transmission time allocation. For
1 ≤ k ≤ K, is unclear. Therefore, we intend to conservatively fair comparison, we provide the performance of the algo-
design n† , 1 ≤ k ≤ K to satisfy constraint (24) by adjusting rithm in [11] by adopting the time allocation therein and its
the value of n0 . corresponding optimal k , which can be obtained by solving
Specifically, we can rewrite each element in n† as the (P2−a) with the time allocation in [11]. Furthermore, since
summation of an integer part and a fractional
part, i.e., n†k = the exhaustive search requires exponential computational com-
†
ak + bk , 1 ≤ k ≤ K, where ak = nk is the integer part plexity, we only show the performance of this method with
small dimensions in some figures to validate the effectiveness
and bk = n†k − n†k is the fractional part. Then, it is probable
of the proposed algorithms.
that the optimal integer solution is ak or ak + 1 for any k. Fig. 2 shows the total effective-throughput versus the trans-
We conservatively design the suboptimal integer solution as mit power. In the figure, the total effective-throughput of
1456 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 18, NO. 2, FEBRUARY 2019
Fig. 6. Effect of the transmit powers on the system availability: K = 2, Fig. 7. Effect of the number of users on the system availability: PH =
max,k = 0.5, dk = 5 m and Dk = 100 bits, 1 ≤ k ≤ K. 15 dBm, max,k = 0.5, dk = 5 m and Dk = 100 bits, 1 ≤ k ≤ K.
K
formulated problems, we proposed BCD-CCCP algorithms value Δ satisfying n∗0 + Δ + k= n∗k = N . If we denote
to solve them efficiently in an iterative manner, and proved n‡ = [n∗0 + Δ,
n
∗
· · , n∗K ] and ‡ = ∗ = [∗1 , · · · , ∗K ]. Then,
1, ·
their convergence. Simulation results showed that the proposed we have R n , > R (n∗ , ∗ ). This contradicts with the
‡ ‡
algorithms perform similarly to the optimal exhaustive search, assumption that n∗ and ∗ are the optimal solution of (P1).
and outperform the benchmark schemes. Therefore, we have K ∗
k=0 nk = N .
A PPENDIX A
A PPENDIX B
In this appendix, we prove the equality with two steps. In the
first step, we prove that the objective function R (n, ) is an To begin with, we calculate the second-order derivative of
increasing function with respect to n0 . In the second step, rk with respect to k , and obtain
we utilize the monotonicity of the objective function R (n, )
∂ 2 rk ωk (n) −1
and prove the equality. 2 = (Q (k )) (k − 1) + 2(Q−1 (k )) , (39)
∂k N
A. Monotonicity of R (n, ) With Respect to n0 −1 dQ−1 (k ) √
where Q ( k) = = − 2π exp
By taking the first-order derivative of R (n, ), we have −1 2 dk
2 −1
1
2 Q (k ) , and Q−1 (k ) = d Qd2(k ) = 2πQ−1 (k )
K 2 k
∂R(n, ) 1 αk exp Q−1 (k ) , are the first-order and second-order
=
∂n0 N 1 + αnk kn0 derivatives of Q−1 (k ) with respect
k=1
to k , respectively.
Note
αk n3k Q−1 (k ) that, both Q−1 (k ) < 0 and Q−1 (k ) > 0 hold for
− . (35) 2
k ∈ (0, 0.5). Then, it is easy to verify ∂∂r2k < 0. In other
(nk + αk n0 )2 α2k n20 nk + 2αk n0 n2k k
words, rk is a concave function with respect to k [45]. Thus,
αk n0 K
Meanwhile, due to rk ≥ 0, we have nk ln(1 + nk ) ≥ R (n, ) = k=1 rk is also concave with respect to .
√
α2k n20 nk +2αk n0 n2k −1
nk +αk n0 Q (k ), which means
nk (nk + αk n0 ) ln(1 + αnk kn0 ) A PPENDIX C
Q−1 (k ) ≤ . (36)
α2k n20 nk + 2αk n0 n2k In this appendix, we adopt the Lagrange duality to solve
(P2−a). Firstly, we write the Lagrangian
K function of (P2−a)
By substituting (36) into (35), we have
as L (n, , ξ) = R (n, ) + k=1 ξk (max,k − k ), where
∂R(n, ) 1 K αk ξ = [ξ1 , · · · , ξK ]T is the non-negative dual variable. Accord-
≥
∂n0 N k=1 1 + αnk kn0 ing to the Karush-Kuhn-Tucker (KKT) conditions [45],
αk n0
the optimal solution needs to satisfy
αk n4k ln(1 + nk )
− ∂L (n, , ξ)
(nk + αk n0 )(α2k n20 nk + 2αk n0 n2k ) = Θ (k )/N − ξk = 0, 1 ≤ k ≤ K, (40a)
∂k
1 K αk ln(1 + zk )
= 1− 2 , (37) ξk (max,k − k ) = 0, 1 ≤ k ≤ K, (40b)
N k=1 1 + zk zk + 2zk
where zk = αk n0 where Θ( k)
is the first-order derivative of R (n, ) with
nk . To check whether N
K αk respect to k and Θ (k ) is given in (12).
k=1 1+zk 1 − ln(1+z
2 +2z
k)
in (37) is larger than zero or not,
zk k From (40a), we have ξk = Θ (k )/N ≥ 0. Recall that,
we define g(zk ) = zk2 + 2zk − ln (1 + zk ). By taking the R (n, ) is a concave function with respect to k . Then,
first-order derivative of g(zk ), we have the first-order derivative of R (n, ) with respect to k ,
2zk2 + 4zk + 1 i.e., Θ (k )/N , is a decreasing function with respect to k ,
g (zk ) = , (38) i.e., +∞ = Θ (0)/N ≥ Θ (k )/N ≥ Θ (max,k )/N for
1 + zk
0 ≤ k ≤ max,k . If Θ (max,k )/N is larger than zero,
which is obviously no smaller than zero due to zk ≥ 0.
i.e., Θ (max,k )/N > 0, we have ξk = Θ (k )/N > 0.
In other words, g(zk ) is an increasing function and we have
By substituting ξk > 0 into (40b), we obtain the optimal
g(zk ) ≥ g(0) = 0. By substituting g(zk ) ≥ 0 into (37),
solution as ∗k = max,k . If Θ (max,k )/N is equal to zero,
∂R(n,) K αk ln(1+z )
we obtain ∂n0 ≥ N1 k=1 1+z 1 − z2 +2zk ≥ 0. i.e., Θ (max,k )/N = 0, it is easy to verify that the optimal
k ( k k)
Therefore, R (n, ) is increasing with respect to n0 . solution is ∗k = max,k . If Θ (max,k )/N is smaller than zero,
the optimal solution must satisfy 0 < ∗k < max,k from (40a).
By substituting 0 < ∗k < max,k into (40b), we obtain that
B. Proof of the Equality
the optimal ξk is zero, i.e., ξk∗ = 0. Then, we substitute
We denote n∗ = [n∗0 , n∗1 , · · · , n∗K ] and ∗ = [∗1 , · · · , ∗K ] ξk∗ = 0 into (40a) and obtain the optimal solution as the root
as the optimal solution of (P1), and denote R (n∗ , ∗ ) of Θ (k )/N = 0. Furthermore, since Θ (k )/N is a monotone
as the corresponding
total effective-throughput. Meanwhile, decreasing function and +∞ = Θ (0)/N ≥ Θ (∗k )/N =
we assume K ∗
k=0 k < N . Since R (n, ) is an increasing
n 0 > Θ (max,k )/N , the optimal solution must be unique. This
function with respect to n0 , there exists a small positive completes the proof of Theorem 3.
CHEN et al.: RESOURCE ALLOCATION FOR WPINs WITH SPC 1459
In this appendix, we adopt the Lagrange duality to solve −Q−1 (k )∇ωk,0 ] = 0, (47)
(P2−c). Firstly, we write the Lagrangian function
of (P2−c) λk (Dk − fk,lb (n, k ; ni−1 )) = 0, (48)
K
as L (n, , λ; ni−1 ) = Rlb (n, ; ni−1 ) + λ(N − k=0 nk ),
zk
where λ is the dual variable. From [45], the optimal solution where m(zk ) = ln(1 + zk ) − 1+z k
− Q−1 (k )∇ωk,k , zk =
αk n0
needs to satisfy KKT conditions, i.e., nk and fk,lb (n, k ; ni−1 ) is given in (25).
From (46), we have λk > 0. By combining λk > 0 with
∂L (n, , λ; ni−1 ) m(zk )(1 − k )
= − λ = 0, 1 ≤ k ≤ K, (48), we have Dk − fk,lb (n, k ; ni−1 ) = 0, which
can be
∂nk N
rewritten as αkzkn0 ln (1 + zk ) − ∇ωk,k Q−1 (k ) = ϕk (n0 ),
(43)
K where ϕk (n0 ) is defined as in (30). Then, we have the
∂L (n, , λ; ni−1 ) 1 − k αk relationship between zk and n0 as
−1
= − Q (k )∇ωk,0
∂n0
k=1
N 1 + zk
αk n0 ϕk (n0 )
− λ = 0, (44) zk = −1 − W − exp(∇ωk,k Q−1 (k )
ϕk (n0 ) αk n0
zk −1
where m(zk ) = ln(1 + zk ) − −Q (k )∇ωk,k and ϕk (n0 )
1+zk − ) , (49)
zk = αnk kn0 . αk n0
1460 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 18, NO. 2, FEBRUARY 2019
Meanwhile, from (46), we have [16] E. Boshkovska, D. W. K. Ng, N. Zlatanov, A. Koelpin, and R. Schober,
“Robust resource allocation for MIMO wireless powered communication
−1 networks based on a non-linear EH model,” IEEE Trans. Commun.,
zk −1
λk (1 − k ) = ln(1 + zk ) − − Q (k )∇ωk,k . vol. 65, no. 5, pp. 1984–1999, May 2017.
1 + zk [17] E. Boshkovska, D. W. K. Ng, N. Zlatanov, and R. Schober,
(50) “Practical non-linear energy harvesting model and resource alloca-
tion for SWIPT systems,” IEEE Commun. Lett., vol. 19, no. 12,
pp. 2082–2085, Dec. 2015.
By substituting zk in (49) and λk (1 − k ) in (50) into (47), [18] E. Boshkovska, D. W. K. Ng, and R. Schober, “Power-efficient and
we have the equation (28) in terms of n0 . Then, we can secure WPCNs with residual hardware impairments and a non-linear
obtain the optimal n0 , i.e., n†0 by calculating the root of the EH model,” in Proc. IEEE Globecom, Dec. 2017, pp. 1–7.
[19] C. She, C. Yang, and T. Q. S. Quek, “Radio resource management for
equation (28) in terms of n0 . Note that the problem is a ultra-reliable and low-latency communications,” IEEE Commun. Mag.,
convex problem, there must be a unique value of variable n0 vol. 55, no. 6, pp. 72–78, Jun. 2017.
in the the equation (28) to satisfy the KKT conditions (46), [20] L. Zhang and Y.-C. Liang, “Average throughput analysis and optimiza-
tion in cooperative IoT networks with short packet communication,”
(47) and (48), simultaneously. Specifically, we can find the IEEE Trans. Veh. Technol., vol. 67, no. 12, pp. 11549–11562, Dec. 2018.
roots of the equation (28) by numerical search, if the obtained [21] Y. Polyanskiy, H. V. Poor, and S. Verdu, “Channel coding rate in the
value satisfies the KKT conditions (46), (47) and (48), simul- finite blocklength regime,” IEEE Trans. Inf. Theory, vol. 56, no. 5,
pp. 2307–2359, May 2010.
taneously, this is the unique optimal solution. Accordingly, [22] J. H. Park and D. J. Park, “A new power allocation method for parallel
by substituting n†0 into (49), we can obtain the optimal zk , AWGN channels in the finite block length regime,” IEEE Commun. Lett.,
i.e., zk† . Finally, we substitute n0 = n†0 and zk = zk† into vol. 16, no. 9, pp. 1392–1395, Sep. 2012.
[23] G. Durisi, T. Koch, J. Östman, Y. Polyanskiy, and W. Yang, “Short-
zk = αnk kn0 , and obtain the optimal nk , 1 ≤ k ≤ K, i.e., n†k . packet communications over multiple-antenna Rayleigh-fading chan-
This completes the proof of Theorem 6. nels,” IEEE Trans. Commun., vol. 64, no. 2, pp. 618–629, Feb. 2016.
[24] J. Meng and E. H. Yang, “Constellation and rate selection in adaptive
modulation and coding based on finite blocklength analysis and its
application to LTE,” IEEE Trans. Wireless Commun., vol. 13, no. 10,
R EFERENCES pp. 5496–5508, Oct. 2014.
[25] M. Haghifam, M. R. Mili, B. Makki, M. Nasiri-Kenari, and T. Svensson,
[1] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things “Joint sum rate and error probability optimization: Finite blocklength
(IoT): A vision, architectural elements, and future directions,” Future analysis,” IEEE Wireless Commun. Lett., vol. 6, no. 6, pp. 726–729,
Gener. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, Sep. 2013. Dec. 2017.
[2] L. Zhang, M. Xiao, G. Wu, M. Alam, Y.-C. Liang, and S. Li, “A survey [26] S. Xu, T.-H. Chang, S.-C. Lin, C. Shen, and G. Zhu, “Energy-efficient
of advanced techniques for spectrum sharing in 5G networks,” IEEE packet scheduling with finite blocklength codes: Convexity analysis and
Wireless Commun., vol. 24, no. 5, pp. 44–51, Oct. 2017. efficient algorithms,” IEEE Trans. Wireless Commun., vol. 15, no. 8,
[3] L. Zhang, Y.-C. Liang, and M. Xiao, “Spectrum sharing for Internet pp. 5527–5540, Aug. 2016.
of Things: A survey,” IEEE Wireless Commun., to be published, doi: [27] A. Avranas, M. Kountouris, and P. Ciblat. (2018). “Energy-latency trade-
10.1109/MWC.2018.1800259. off in ultra-reliable low-latency communication with retransmissions.”
[4] L. Zhang, J. Liu, M. Xiao, G. Wu, Y.-C. Liang, and S. Li, “Performance [Online]. Available: https://arxiv.org/pdf/1805.01332.pdf
analysis and optimization in downlink NOMA systems with cooperative [28] M. Mousaei and B. Smida, “Optimizing pilot overhead for ultra-reliable
full-duplex relaying,” IEEE J. Sel. Areas Commun., vol. 35, no. 10, short-packet transmission,” in Proc. ICC, May 2017, pp. 1–5.
pp. 2398–2412, Oct. 2017. [29] Q. Zhang, P. P. Liang, Y.-D. Huang, Y. Pei, and Y.-C. Liang, “Label-
[5] S. Bi, C. K. Ho, and R. Zhang, “Wireless powered communication: assisted transmission for short packet communications: A machine learn-
Opportunities and challenges,” IEEE Commun. Mag., vol. 53, no. 4, ing approach,” IEEE Trans. Veh. Technol., vol. 67, no. 9, pp. 8846–8859,
pp. 117–125, Apr. 2015. Sep. 2018.
[6] X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless networks [30] J. Yang, “Achievable rate for energy harvesting channel with finite
with RF energy harvesting: A contemporary survey,” IEEE Commun. blocklength,” in Proc. IEEE ISIT, Jul. 2014, pp. 811–815.
Surveys Tuts., vol. 17, no. 2, pp. 757–789, 2nd Quart., 2015. [31] S. L. Fong, V. Y. Tan, and J. Yang, “Non-asymptotic achievable rates
[7] G. Yang, C. K. Ho, and Y. L. Guan, “Dynamic resource allocation for for energy-harvesting channels using save-and-transmit,” IEEE J. Sel.
multiple-antenna wireless power transfer,” IEEE Trans. Signal Process., Areas Commun., vol. 34, no. 12, pp. 3499–3511, Dec. 2016.
vol. 62, no. 14, pp. 3565–3577, Jul. 2014. [32] B. Makki, T. Svensson, and M. Zorzi, “Wireless energy and information
[8] R. Zhang and C. K. Ho, “MIMO broadcasting for simultaneous wire- transmission using feedback: Infinite and finite block-length analysis,”
less information and power transfer,” IEEE Trans. Wireless Commun., IEEE Trans. Commun., vol. 64, no. 12, pp. 5304–5318, Dec. 2016.
vol. 12, no. 5, pp. 1989–2001, May 2013. [33] T. A. Khan, R. W. Heath, and P. Popovski, “Wirelessly powered
[9] Q. Shi, L. Liu, W. Xu, and R. Zhang, “Joint transmit beamforming communication networks with short packets,” IEEE Trans. Commun.,
and receive power splitting for MISO SWIPT systems,” IEEE Trans. vol. 65, no. 12, pp. 5529–5543, Dec. 2017.
Wireless Commun., vol. 13, no. 6, pp. 3269–3280, Jun. 2014. [34] O. L. A. López, H. Alves, R. D. Souza, and E. M. G. Fernández,
[10] J. Xu, L. Liu, and R. Zhang, “Multiuser MISO beamforming for “Ultrareliable short-packet communications with wireless energy trans-
simultaneous wireless information and power transfer,” IEEE Trans. fer,” IEEE Signal Process. Lett., vol. 24, no. 4, pp. 387–391, Apr. 2017.
Signal Process., vol. 62, no. 18, pp. 4798–4810, Sep. 2014. [35] O. L. A. López, E. M. G. Fernández, R. D. Souza, and H. Alves, “Ultra-
[11] H. Ju and R. Zhang, “Throughput maximization in wireless powered reliable cooperative short-packet communications with wireless energy
communication networks,” IEEE Trans. Wireless Commun., vol. 13, transfer,” IEEE Sensors J., vol. 18, no. 5, pp. 2161–2177, Mar. 2018.
no. 1, pp. 418–428, Jan. 2014. [36] M. Razaviyayn, M. Hong, and Z.-Q. Luo, “A unified convergence
[12] X. Kang, C. K. Ho, and S. Sun, “Full-duplex wireless-powered commu- analysis of block successive minimization methods for nonsmooth
nication network with energy causality,” IEEE Trans. Wireless Commun., optimization,” SIAM J. Optim., vol. 23, no. 2, pp. 1126–1153, 2013.
vol. 14, no. 10, pp. 5539–5551, Oct. 2015. [37] L. Zhang, M. Xiao, G. Wu, S. Li, and Y. C. Liang, “Energy-efficient
[13] H. Ju and R. Zhang, “Optimal resource allocation in full-duplex wireless- cognitive transmission with imperfect spectrum sensing,” IEEE J. Sel.
powered communication network,” IEEE Trans. Commun., vol. 62, Areas Commun., vol. 34, no. 5, pp. 1320–1335, May 2016.
no. 10, pp. 3528–3540, Oct. 2014. [38] G. R. Lanckriet and B. K. Sriperumbudur, “On the convergence of the
[14] Y. Zeng and R. Zhang, “Full-duplex wireless-powered relay with concave-convex procedure,” in Proc. Adv. Neural Inf. Process. Syst.,
self-energy recycling,” IEEE Wireless Commun. Lett., vol. 4, no. 2, 2009, pp. 1759–1767.
pp. 201–204, Apr. 2015. [39] Q. Wu, M. Tao, D. W. K. Ng, W. Chen, and R. Schober, “Energy-
[15] L. Liu, R. Zhang, and K.-C. Chua, “Multi-antenna wireless powered efficient resource allocation for wireless powered communication net-
communication with energy beamforming,” IEEE Trans. Commun., works,” IEEE Trans. Wireless Commun., vol. 15, no. 3, pp. 2312–2327,
vol. 62, no. 12, pp. 4349–4361, Dec. 2014. Mar. 2016.
CHEN et al.: RESOURCE ALLOCATION FOR WPINs WITH SPC 1461
[40] K. Huang and E. Larsson, “Simultaneous information and power transfer and served as the Guest/Associate Editor for the IEEE T RANSACTIONS ON
for broadband wireless systems,” IEEE Trans. Signal Process., vol. 61, W IRELESS C OMMUNICATIONS, the IEEE J OURNAL OF S ELECTED A REAS
no. 23, pp. 5972–5986, Dec. 2013. IN C OMMUNICATIONS , the IEEE Signal Processing Magazine, the IEEE
[41] X. Sun, S. Yan, N. Yang, Z. Ding, C. Shen, and Z. Zhong, “Short-packet T RANSACTIONS ON V EHICULAR T ECHNOLOGY, and the IEEE T RANS -
downlink transmission with non-orthogonal multiple access,” IEEE ACTIONS ON S IGNAL AND I NFORMATION P ROCESSING OVER N ETWORKS .
Trans. Wireless Commun., vol. 17, no. 7, pp. 4550–4564, Jul. 2018. He was also an Associate Editor-in-Chief of the World Scientific Journal on
[42] C. T. Kelley, Solving Nonlinear Equations With Newton’s Method, vol. 1. Random Matrices: Theory and Applications. He was a Distinguished Lecturer
Philadelphia, PA, USA: SIAM, 2003. of the IEEE Communications Society and the IEEE Vehicular Technology
[43] A. Damnjanovic et al., “A survey on 3GPP heterogeneous networks,” Society, and served as the TPC Chair and an Executive Co-Chair for IEEE
IEEE Wireless Commun., vol. 18, no. 3, pp. 10–21, Jun. 2011. GLOBECOM 2017.
[44] Z. Chang, Z. Wang, X. Guo, Z. Han, and T. Ristaniemi, “Energy-
efficient resource allocation for wireless powered massive MIMO system
with imperfect CSI,” IEEE Trans. Green Commun. Netw., vol. 1, no. 2, Xin Kang (M’11) received the B.Eng. degree in
pp. 121–130, Jun. 2017. electrical engineering from Xi’an Jiaotong Univer-
[45] S. Boyd and L. Vandenberghe, Convex Optimization. New York, NY, sity, China, in 2005, and the Ph.D. degree in elec-
USA: Cambridge Univ. Press, 2004. trical and computer engineering from the National
University of Singapore, Singapore, in 2011. He was
a Research Scientist with the Institute for Infocomm
Jie Chen received the B.S. degree in communication Research, A*STAR, Singapore, from 2011 to 2014.
engineering from Chongqing University of Posts and After that, he joined the Shield Lab, Huawei
Telecommunications, China, in 2016. He is currently Singapore Research Center, as a Senior Researcher.
pursuing the Ph.D. degree with the University of Since 2016, he has been with the University of
Electronic Science and Technology of China, China. Electronic Science and Technology of China as a
His research interests include convex optimization, Full Professor. He has filed more than 30 patents on security protocols, and
resource allocation in wireless communication net- contributed more than 15 technical proposals to 3GPP SA3. His research
works, and short packet communications. interests include optimization, game theory, and network security. He has
received the Best Paper Award from the IEEE ICC 2017 and the best 50 papers
of the IEEE GLOBECOM 2014.