Professional Documents
Culture Documents
Received 5 February 2023, accepted 27 February 2023, date of publication 27 March 2023, date of current version 30 March 2023.
Digital Object Identifier 10.1109/ACCESS.2023.3262117
ABSTRACT In this work, we talk about the problem of joint power allocation and user association based
on quality-of-service for non-orthogonal multiple access (NOMA) to downlink networks. The problem is
especially difficult due to its non-convex form and the large number of optimization variables, which are
solved using two different nature-inspired algorithms with low complexity. We investigate the effect of
different network parameters on increasing users. Numerical results show that, for a growing number of users,
the problem is becoming increasingly difficult, which indicates the increasing network resources required
to solve it. The results of the simulations show that using evolutionary algorithms is a fast and effective way
to solve this kind of problem. Moreover, the NOMA advantage over OMA becomes clear as the number of
users increases. Evolutionary techniques outperform randomly generated solutions, as expected.
INDEX TERMS 5G, 6G, NGIoT, cellular network, NOMA, QoS, optimization techniques.
deteriorated. But when the power domain NOMA technique Moreover, in [16] the authors examine the power con-
is taken into account, this feature does not apply a typical sumption minimization problem for a generic multi-cell
NOMA scheme, users can cancel the same frequency in the multiple input and single output non-orthogonal multiple
spectrum domain, the same time in the time domain, and even access (MISO-NOMA) system. They use an iterative dis-
the same code in the code domain; however, they cannot share tributed methodology to solve the optimization problem of
the same level of power in the power domain [3]. The funda- the associated joint user grouping, beamforming (BF), and
mental concept behind this case in a typical NOMA scheme power control problems. Additionally, the joint subcarrier and
is the utilization of successive interference cancellation (SIC) power allocation problem for the downlink of a multi-carrier
techniques by users with satisfactory channel conditions in nonorthogonal multiple access (MC-NOMA) system is stud-
order to mitigate the interference of users with low-quality ied in [17]. The problem of joint power and sub-carrier allo-
channel conditions. As a result, SIC techniques lead to a cation for the NOMA system in multi-cell is studied in [18].
considerable reduction of users’ intra-cell and intra-cluster The authors in [18] propose a polyblock optimization-based
interference [4]. NOMA has been proposed as the main tech- algorithm for obtaining a globally optimal solution.
nique by several authors in order to solve the challenge of Moreover, the authors in [19] examine NOMA and cog-
broadcast and unicast convergence as well as the convergence nitive radio (CR) benefits to vehicle-to-everything (V2X) as
between broadband and broadcast, [5], [6], [7]. a spectrum-efficient application. The application of NOMA
The user association problem in deployed NOMA net- in IoT networks in combination with mobile edge computing
works exhibits various challenges due to its unique features, (MEC) is reported in another paper in [20].
such as co-channel interference. The authors in [8] utilize a In hybrid networks, the different kinds of technologies
game-theoretic approach to associate the users of a NOMA that are used are one of the important factors in the user
network example in different resource blocks and group association problem. To this end, the authors in [21] inves-
them into orthogonal clusters to address the user association tigate a complex, yet practical, indoor scenario, by incor-
problem. However, several assumptions and certain limita- porating visible light communication (VLC) technology and
tions that are derived from the application of game-theoretic radio frequency (RF) technology in a hybrid NOMA network.
techniques to user association problems in NOMA networks Furthermore, the authors of [22] investigate the effects of a
make this approach rather complex and difficult to imple- VLC NOMA system on the provided QoS by proposing a
ment. On the contrary, evolutionary algorithms (EAs) [9] QoS-based virtual user association scheme with adaptation.
are global optimization techniques that perform satisfactorily The authors in [23] propose a deep learning framework
under virtually any given optimization problem, each with its to handle user association, as well as subchannel and power
own restrictions or peculiarities. allocation problems in NOMA networks. The authors focus
The authors in [10] and [11] introduced the utilization of on game-theoretic system energy efficiency (EE) under QoS
EAs to address both the power allocation and the user associ- constraints. Additionally, in [24] the authors address the prob-
ation problems of typical NOMA networks having multiple lem of optimizing both power control and user association
base stations (BSs) as a key parameter in network topology. using a convex optimization framework subject to total trans-
In [12], the authors study uplink NOMA scenarios with user mit power and user-specific quality-of-service constraints.
association having different quality-of-service (QoS) require- The user association problem for NOMA-based fog radio
ments, and propose a solution using game theory techniques. access networks (F-RANs) is studied in [25], by analyzing its
Finally, the authors in [13] consider non-ideal SIC NOMA performance characteristics. The authors apply a stochastic
schemes with QoS constraints to propose a distributed cluster geometry tool to provide closed-form analytical results. They
formation and a power-bandwidth allocation approach for presented two different algorithmic approaches based on
downlink heterogeneous networks. evolutionary games and reinforcement learning, respectively,
A unified NOMA scheme that encompasses both power to address the user association problem in NOMA-based F-
and code domains and provides user association along with RANs. Moreover, the energy efficiency maximization prob-
resource allocation in heterogeneous ultra-dense networks lem was analyzed in [26], by considering a downlink NOMA
(HUDNs) for 5G mobile communication networks is pro- multicell heterogeneous network under imperfect CSI for
posed in [14]. specific QoS constraints, such as maximum transmit power,
Expanding the work of [8], the authors in [15] introduced a small-cell users, and cross-tier interference.
new formulation for the user association problem in NOMA The authors in [15] proposed a new framework for NOMA
cellular networks. They grouped the users of the given cel- cellular networks, namely the FDH-NOMA framework, that
lular network into orthogonal clusters and associated them combines NOMA schemes and Full-Duplex (FDH) tech-
with different physical resource blocks by utilizing a game- niques. For the user association problem, they proposed two
theoretic technique. In their work, the authors provide all different modes, the selection criterion mode, and the NOMA
the main parameters of their proposed formulation, including pairing scheme mode. Moreover, to maximize the sum-rate
the complexity, convergence, stability, and optimality of their of the NOMA network system, the authors in [27] employed
solution. a coalition game approach that allowed cooperation between
receives the signal that is expressed by Therefore, in the case of a NOMA scheme, we can express
the data rate at the user q assigned to PRB v as
q |Ov | q
X
Yqv = hvq pvq sq + nq + hvq pvi si (1) RNOMA
q,v = log2 (1 + γqv )
| {z } i=1,i̸=q
desired signal | {z } where WPRB is the bandwidth of a PRB in KHz.
intra−cluster interference The admission control variable of the i-th user with v-th
where hvq denotes the channel coefficient among user q and PRB is denoted with another binary variable, svi formulated
PRB v that is assigned by the BS, sq represents the transmitted as
signal, pvq denotes the power allocation coefficient, and nq
1, if user i is assigned to PRB v
denotes the noise. siv = (8)
0, otherwise.
Furthermore, the channel power gain is expressed as
We can then, formulate the QoS-aware joint admission
|hvq |2 = |ĥvq |2 GPL (dq ) (2) control and power allocation problem for downlink NOMA
scheme as
where ĥvq ∼ CN (0, 1) denotes the circular-symmetric com- X
max H (max (0, Ri − Ri,min ))
plex Gaussian zero-mean noise from PRB v to user q, GPL (dq ) {s,a}
i∈U
denotes the propagation path loss. The propagation path loss
between user q and the BS is modeled with path gain (loss) s.t. C1 : suv ∈ {0, 1}, ∀u ∈ U, ∀v ∈ V,
XVRB
GPL(d). In this work, we will use a propagation model C2 : suv = 1, ∀u ∈ U,
from [40]. This is an outdoor macrocell line-of-sight (LOS) v=1
XOv
model and it is defined by C3 : suv ≤ Q, ∀v ∈ V,
u=1
XOv
GPL (dq ) = −128.1 − 37.6 log10 (dq ) (dB) (3) C4 : siv avi ≤ 1∀v ∈ V, (9)
i=1
where dq denotes the distance among the user q and the BS where H () denotes the Heaviside step function given by
expressed in km. (
The power allocation coefficients satisfy in any cluster Ov : 0, if ρ < 0,
H (ρ) = (10)
X|Ov | 1, if ρ ≥ 1.
pvj ≤ 1. (4)
j=1 where a and s are the set of all indicators a and s, respectively.
The constraint C1 describes whether user u and PRBs v are
Moreover, we consider that a maximum number of Q NOMA
associated or not. The constraint C2 expresses the unique
users can be connected to each PRB. If q-user needs to decode
association of one user u with one PRB v. Furthermore, con-
its own signal, then it is necessary to decode and remove
straint C3 indicates that in any PRB, a maximum of Q users
intra-cluster interference from the previous user. The SIC
can be handled. Constraint C4 states that each cluster’s total
technique employed by the u-th user is considered ideal.
power allocation coefficients should be less than or equal to
Therefore, in this case for perfect SIC the necessary condition
one. The problem presented above is non-convex and difficult
for u > v is given by
to solve.
△
Q(Ov ) =|hvOv |2 ≥, . . . |hvu |2 ≥ |hvq |2 . . . , ≥ |hv1 |2 (5)
III. OPTIMIZATION ALGORITHMS
. We can assume that the Q − th user in each cluster is well- In this study, we have applied to the Qos aware joint admis-
served. The q-th user’s receiver in Ov detects the j-th user’s sion control and power allocation problem two different
signal as noise (q < j) and decodes its own signal based on the low-complexity, nature-inspired algorithms. These are the
signal-to-interference-plus-noise ratio (SINR) given below WOA [38], and the GWO [39]. WOA uses math to model
how humpback whales interact with each other, while GWO
|hvq |2 pvq is based on how grey wolves hunt. There are no control
γqv = , (6)
|O
Pv | N0 WPRB
parameters in either algorithm. As a result, they don’t require
|hvq |2 pvi + Pv any further settings except the maximum number of iterations
j=q+1
or generations and the population size.
where WPRB is the bandwidth of a PRB, Pv denotes the
transmit power, and N0 denotes the noise power spectral A. PROBLEM MODELING ALGORITHM
density. We specify the transmit signal-to-noise ratio (SNR) To tackle the Qos aware joint admission control and power
as ρ = N0 W
Pv
PRB
. Additionally, the receiver at the Ov -th user allocation problem using evolutionary algorithms, we need
removes intra-cluster interference with SIC and decodes its first to model properly the objective function and the decision
own signal with SINR: vector of the unknown variables. To do this, we make a new
heuristic algorithm that computes the value of the objective
γOv v = ρ|hvOv |2 pvOv (7) function and deals with the different constraints. This is
Algorithm 1 Calculate Objective Function Value Algorithm 2 GWO Algorithm for NOMA User Association
1: Input a possible solution vector z
1: Initialize a population of association variables and power
2: Set Ncover = 0, the users served by the BS, fitness = 0 ⃗ i (i = 1, 2, · · · ,NP)
values of size 2Nu × NP W
3: for i=1 to Nu do ⃗ 1 , and C ⃗2
2: Set up u ⃗, C
4: for v=1 to VRB do 3: for each vector W ⃗ i of the population do
5: if users in VRB = Q then 4: Calculate the fitness value F(W ⃗ i ) using Algorithm 1
6: Continue and find the user association vector if W ⃗ i is feasible
7: else 5: end for
8: Assign user i to PRB v, siv = 1 6: Compute the position vectors for each wolf type: W ⃗ α,
9: Assign power value avi to user i W⃗ β , and W⃗δ
10: end if 7: while (t < MaxNumIter) do
11: if user i assignment is feasible according to (9) then 8: for each vector of the population do
11: Calculate rate Ri for the i-th user 9: Calculate new position vector W ⃗ i of the current
12: if Ri ≥ Ri,min then member using (17) and update its value
13: if the BS can support the user’s desired rate, 10: end for
QoS is feasible then 11: Calculate u⃗, C ⃗ 1 , and C⃗2
14: Ncover = Ncover + 1, 12: for each vector W ⃗ i of the population do
15: end if 13: Calculate the fitness value F(W ⃗ i ) using Algorithm 1
16: end if and find the user association vector W ⃗ i is feasible
17: else 14: end for
18: fitness = fitness + 1020 15: Compute the position vectors of all population mem-
19: end if bers
20: end for 16: Renew W ⃗ α, W⃗ β , and W ⃗δ
21: end for
17: Increase t by one
22: fitness = fitness − (Ncover /Nu) ∗ 100
18: end while
23: Return fitness value
19: Return the best feasible solution vector of association
variables and power values
presented in Algorithm 1, which returns the fitness value, for of association and power values), and the current genera-
⃗ 1 and C
tion is denoted by G. The vectors C ⃗ 2 are given by
a possible solution vector z. The solution vector is defined in
the form z = (s1v , s2v , .., siv , .., sNu v , av1 , av2 , .., avi , .., avNu ) (13) and (14):
⃗ 1 = 2⃗u · ⃗v1 − u⃗
C (13)
B. GREY WOLF OPTIMIZER FOR NOMA USER ⃗ 2 = 2 · ⃗v2
C (14)
ASSOCIATION
The GWO method is based on mathematical models of grey where u⃗ ∈ [2, 0] and ⃗v1 , ⃗v2 ∈ [0, 1] are randomly obtained
wolf hierarchy and hunting behavior in the wild. Its major vectors from uniform distribution. The GWO algorithm’s
feature is the preservation of search space information during hunting process, like the social behavior of a grey wolf pack,
the iteration process. GWO does not require any additional can be described as the formulation below.
control settings to be configured. The GWO algorithm clas- ⃗ 12 · W
V⃗α = |C ⃗α − W ⃗|
sifies the wolf vectors into four groups. The alpha (alpha),
beta (beta), and delta (delta) categories are the first three best V⃗β = |C⃗ 22 · W
⃗β − W ⃗|
2
vectors of association and power values. The omega (omega) V⃗δ = |C
⃗3 · W ⃗δ − W ⃗| (15)
category contains all unclassified solutions. In a wolf pack, W⃗1 = W ⃗α − C 1
⃗ 1 · V⃗α
a social behavior group hunting (optimization process) is
⃗2 = W ⃗β − C ⃗ 21 · V⃗β
oriented by the aforementioned population categories (alpha, W
⃗3 = W ⃗δ − C ⃗ 31 · V⃗δ
beta, delta). The following formulas give a mathematical W (16)
representation of the encirclement of prey during the hunting ⃗ ⃗ ⃗
process: W⃗ G+1 = W1 + W2 + W3 (17)
3
⃗2 · P
V⃗x,G = |C ⃗ x,G − W⃗ x , G| (11) The pseudo-code of GWO algorithm is outlined in
⃗ x,G+1 = P
W ⃗ x,G − C 1
⃗ · V⃗x,G (12) algorithm 2.
where the position vector of the prey is denoted by P ⃗x, C. WHALE OPTIMIZATION ALGORITHM FOR NOMA
the coefficient vectors are denoted as C⃗ 1 and C
⃗ 2, W
⃗ mod- USER ASSOCIATION
els the position vector of the grey wolf (e.g. the position The WOA is a swarm-based nature-inspired algorithm [38].
vector, in this case, corresponds to the size 2 × Nu vector WOA is based on humpback whales’ hunting and social
behavior. Whales can detect the location of prey in the wild this type of behavior and is defined by:
and make particular maneuvers to encircle them. The prey is r b
represented by WOA as the best solution identified in each Qd = Ud × xd,G − xd,G (24)
b r
iteration. All members of the population (user associations xd,G+1 = xd,G − Sd Dd (25)
and power vectors) aim to get as near as possible to the
where r, with r ̸= b denotes a randomly selected vector of
optimum solution. Then they update their position vectors
association and power values that the b − th member will
appropriately. The following equations can be used to express
follow.
the whale behavior and in particular the prey encirclement
The pseudo-code is presented in Algorithm 3 to better
part in WOA:
understand the WOA functionality. The WOA generates a
best b set of random vectors of association variables and power
Qd = Ud × xd,G − xd,G (18)
b best values during initialization. The location vectors and distance
xd,G+1 = xd,G − Sd Qd (19) vectors to the prey are then calculated at each iteration either
b denotes the b−th vector of association and power in terms of a random search pattern or the best fitness values
where xd,G
best denotes the best solu- achieved thus far. The sd parameter regulates the algorithm’s
values in the d −th dimension, and xd,G
exploitation and exploration phases. Finally, the rb option
tion found in current iteration G. Moreover, the coefficient
toggles between an encircling process with a reducing radius
vectors in the d − th dimension (the d − th dimension refers
and a spiral trajectory updating position mechanism.
to the vector of association and power values containing the
The time complexity of both GWO and WOA algorithms
unknowns in the optimization problem) are denoted by Ud ,
is comparable to that of other swarm intelligence algorithms,
Sd , while Qd corresponds to the distance vector of the current
that is at the end of each iteration given by O(Np Nc D +
whale position to the prey position. The following equations
Np Nc f ), where D denotes the search space dimension and f
show how the latter vectors are calculated:
denotes the time complexity of the fitness function.
Sd = 2sd rd − ad (20)
D. CONVERGENCE ANALYSIS OF THE GWO ALGORITHM
Ud = 2rd (21)
FOR NOMA ADMISSION CONTROL
where sd is a variable ∈ [2, 0], that decreases linearly over The theoretical analysis of the evolutionary algorithms pre-
iteration, and rd denotes a random number from a uniform sented in the previous section can be made according to the
distribution ∈ [0, 1]. framework presented in [41], [42], and [43]. The convergence
The whale bubble-net behavior is modeled mathematically analysis is based on the two conditions reported in [41].
in WOA as the exploitation phase of the algorithm. This is If we define the optimization problem ⟨S, f ⟩, an objective
achieved by the integration of two distinct movements, the function f and a feasible solution space S. A new solution
first one is an encircling movement with a reducing radius xn+1 is obtained after an evolutionary algorithm A iterates for
and the second one is a spiral trajectory updating position. n iterations. This solution is found by the previous iteration
This type of spiral trajectory movement in WOA is modeled solution xn by
by a spiral equation that replicates humpback whales’ helix- xn+1 = A(xn , η), (26)
shaped movements. It is written as:
where algorithm A obtains the solution set η during the itera-
b
xd,G+1 = Ld egs cos(2πl) + xd,G
best
(22) tive process.
The essential infimum of f on S is defined as [41]
where Ld represents the the distance vector of the b−th vector
of association and power values to the best solution (i.e the β = inf{n : u[x ∈ S|f (x) < n] > 0}, (27)
d − th coordinate of L), g is a fixed value that determines
where u[X ] is the measure of X . This has the meaning that
the shape of the logarithmic spiral, and l is a random number
there exist non-empty subsets in the search space and the
∈ [−1, 1] from a uniform distribution.
objective function value that corresponds to the element in
Humpback whales follow a spiral-shaped path in a cir-
the non-empty subset can be infinitely close to β. Hence, the
cle with a decreasing radius while performing two separate
neighborhood or optimality region is defined as
mechanism actions at the same time. This type of movement
is modeled by the WOA authors using a 50% probability {x ∈ S|f (x) < β + ε}, −∞ < β < ∞,
distribution, which is mathematically expressed as: Rε,K =
{x ∈ S|f (x) < K }, β = −∞,
xd,G − Sd Qd , if rb < 0.5
best
b
xd,G+1 = (23) (28)
best ,
Ld eks cos(2πl) + xd,G otherwise
where ε > 0 and K < 0. We can assume that if an evolu-
where rb denotes a random number ∈ [0, 1]. tionary algorithm obtains a point in Rε,K , then the algorithm
Additionally, the whales follow a random pattern when obtains either the global optimal solution or an approximation
looking for prey. The WOA exploration phase is denoted by of that global optimal solution.
Algorithm 3 WOA for NOMA User Association The guaranteed global convergence of any evolutionary
1: Initialize a population of vectors of association variables algorithm or any stochastic optimization method is based on
and power values of size 2Nu × NP the criteria listed in [41], [42], and [43]
2: for each vector x ⃗i of the population do Criterion 1: Assuming that f is measurable and the feasi-
3: Calculate the fitness value F(⃗x i ) using Algorithm 1 and ble solution space S is a measurable subset of Rn , the evolu-
find the user association vector if x⃗i is feasible tionary algorithm A satisfies both Condition 1 and Condition
4: end for 2. If {xn }∞
n=0 denotes a sequence generated by the algorithm
5: Obtain the best user association solution xjbest A then the following relation should be satisfied
6: while (G < Gmax ) do
lim P(xn ∈ Rε,K ) = 1, (30)
7: for (j = 1 : 2Nu ) do n→∞
8: Compute sj , rj , Sj , Uj where P(xn ∈ Rε,K ) denotes the probability that the found
9: for (i = 1 : NP) do after n iterations or generations by algorithm A is in the
10: if (rb < 0.5) then subset Rε,K .
11: if (|Sj | ≥ 1) then This means that if the number of iterations is high enough,
12: Calculate the distance vector Qj using (18) the evolutionary algorithm will certainly converge, or we
i
Calculate the position vector xj,G+1 using
13: may say that the evolutionary algorithm can have almost
(19) guaranteed global convergence. So in order to prove that the
Calculate the fitness value F(⃗xG+1 i ) using
14: GWO algorithm converges, we need to prove that GWO may
Algorithm 1 and find the user association satisfy the above criterion. Without loss of generality, we may
i
vector if x⃗G+1 is feasible express the update equation of GWO of the i-th vector after
15: else n + 1 iterations as
16: Compute distance vector Qj using (24) 1 n
wn+1 wa − r1n r2n wna − wni
17: Compute position vector xj,G+1i using (24) =
i
i
3
18: Calculate the fitness value F(⃗xG+1 ) using
+ wnβ − r3n r4n wnβ − wni
Algorithm 1 and find the user association
i
+ wn − r n r n wn − wn
vector if x⃗G+1 is feasible δ 5 6 δ i (31)
19: end if
20: else where rmn , m = 1, 2, . . . , 6 are uniform random numbers
21: Compute position vector xj,G+1 i using (22) from the distribution U (0, c) on [0, c] where c is a positive
i constant.
22: Calculate the fitness value F(⃗xG+1 ) using
The states of grey wolves and the state space are expressed
Algorithm 1 and find the user association vec-
i as below:
tor if x⃗G+1 is feasible
Definition 1: The grey wolf individual x position, histor-
23: end if
ical best position wα , historical second best position wβ ,
24: end for
and historical third best position wδ , creates the state or
25: end for
status, which can represented by ζ = (x, wα , wβ , wδ ), where
26: Increase G by one
x, wα , wβ , wδ ∈ S.
27: end while
Moreover, it is also f (wα ) ≤ f (wβ ) ≤ f (wδ ) ≤ f (x).
28: Return the best feasible solution vector of association
Thus, we consider that the set of all possible states of all grey
variables and power values
wolf vectors creates a state space for vectors, which can be
expressed as
n
Z = ζ = (x, wα , wβ , wδ )|x, wα , wβ , wδ ∈ S, (32)
Thus, we may consider two conditions that are needed to o
ensure that global optimality can be obtained: f (wα ) ≤ f (wβ ) ≤ f (wδ ) ≤ f (x) . (33)
Condition 1: The condition that the sequence {f (x n )}∞
n=0
is converging to the infimum of f on S should be satisfied Additionally, we may define the states and state space of
by an optimization algorithm A. This means that if there is the grey wolves population by the following:
f (A(x, η)) ≤ f (x), and η ∈ S then f (A(x, η)) ≤ f (η) Definition 2: We call the grey wolves group set of all N
Condition 2: For all subsets ∀D ∈ S subject to v(D) > 0, grey wolves vectors. Moreover, The states of this grey wolf
we have group are represented by ψ = (ζ1 , ζ2 , . . . , ζN ). We also
define the grey wolves group status space as the set of all
∞
Y possible grey wolves group states and this is denoted by
(1 − vn (D)) = 0, (29) n o
9 = ψ = (ζ1 , ζ2 , . . . , ζN ), ζi ∈ Z (1 ≤ i ≤ N ) . (34)
n=0
where vn (D) denotes the probability measure of the n-th It is clear from the above that the best solution vector is
iteration best result of the evolutionary algorithm A on D. included in the grey wolves status 9. Additionally, we define
the state transition for the grey wolves’ positions modeling r1n + 12 ε r3n + 21 ε
R R
solutions by the following: dψ dψ
r1n − 12 ε r3n − 12 ε
For ∀ζi = (x i , wiα , wiβ , wiδ ) ∈ Z and ∀ζj = × ×
j j j xRι n xRι n
(x j , wα , wβ , wδ ) ∈ Z during the iterations of the GWO dψ dψ
algorithm, we denote the state transition from ζi to ζj as xin −r1n |wna −xin | xin −r3n |wnb −xin |
The above definition implies that the optimal grey wolf wα of the population is kept or is updated after every iteration,
state set 8 is defined as the set of all grey wolf groups such ensures that the first convergence condition is met. Moreover,
that at least one vector grey wolf individual of the population we may deduct from the previous theorem, that after a suffi-
with its state belong to E. cient number of iterations, the GWO group state sequence
will converge toward the optimal set. or when the number
Theorem 3: When T 8 ⊂ E, there is no closed set J other of iterations tends to infinity. Thus, we may conclude that in
than E such that J 8 = ∅.
Proof: Reductio ad absurdum. If we assume there is this case, the probability of not obtaining the globally optimal
a closed set J so that J 8 = ∅ and that f (wa,j ) >
T solution is 0. Hence, the second convergence condition is
f (wa,b ) for ψi = (wa,b , wa,b , . . . , wa,b ) ∈ 8 and ∀ψj = satisfied. As an outcome, the global convergence of GWO
(ζj1 , ζj2 , . . . , ζjn ) ∈ J , this implies that to global optimality is assured. □
The above proof uses a Markov chain framework, sim-
N
Y ilar to the literature [45], [46]. This means that the con-
P(Aψ (ψj ) = ψi ) = P(Aζ (ζj,n ) = ζi,n ), (46) vergence concept is in a probabilistic sense. It shows that
n=1 the GWO can certainly converge. However, the above theo-
For each P(Aζ (ζj ) = ζi ), it holds that P(Aζ (ζj ) = ζi ) == rem provides no information about the convergence rate or
P(xi → xi )P(wa,i → wa,j ). It is P(wa,i → wa,j ) = 1 then how the population size and the number of iterations may
P(Aζ (ζj ) = ζi ) ̸ = 0, implying that J is not closed, which con- have an impact on the GWO convergence behavior. The
tradicts the assumption. Thus, there is no non-empty closed global convergence of WOA may be proven similar to the
set outside 8 in 9. □ above.
FIGURE 3. Number of users versus percentage of users served for T = 50 and different Pt values.
FIGURE 4. Number of users versus percentage of users served for T = 50 and different Rc values.
FIGURE 5. Number of users versus percentage of users served for different T values.
IV. NUMERICAL RESULTS the Invasive Weed Optimization (IWO) [50], and the Particle
A. BENCHMARK FUNCTIONS Swarm Optimization (PSO) [51]. The numerical benchmark
In this subsection, we evaluate the performance of GWO and functions and their properties are listed in Table 1. In order
WOA in high-dimensional problems using different types of to evaluate the algorithm’s performance in high-dimensional
test functions, both unimodal and multimodal. We compare problems, we run two different sets of tests, one for problem
GWO and WOA on a set of nine numerical benchmark func- dimension D = 100, and one for D = 200. All benchmark
tions. Additionally, we also compare the above-mentioned problems run for 100 independent trials. The maximum num-
algorithms with other popular evolutionary algorithms. These ber of iterations is set to 1000, while the population size is set
are namely the Artificial Bee Colony (ABC) [47], the Differ- to 100 for all algorithms. The unknown variables limits are set
ential Evolution (DE) [48], the Harmony Search (HS) [49], to [−10, 10] for all problems. Table 2 holds the algorithm’s
FIGURE 7. Convergence rate graph for 1000 runs for a) N=50 users,
b)N=100 users.
FIGURE 6. Boxplot results of all algorithms for 1000 runs for a) N=50
users, b)N=100 users.
TABLE 4. Average ranking achieved by the friedman test. TABLE 5. Simulation parameters.
Nu = 50 the distribution of values seem similar in all cases, [9] S. Goudos, Emerging Evolutionary Algorithms for Antennas and Wireless
while the EAs clearly outperform the random case. The differ- Communications (Electromagnetic Waves. Institution of Engineering and
Technology). London, U.K.: Institution of Engineering and Technology,
ence between the OMA and the NOMA case can be seen more 2021.
clearly in Fig. 6b. Moreover, WOA outperforms the GWO in [10] S. K. Goudos, ‘‘Joint power allocation and user association in non-
terms of median values. However, GWO obtained results with orthogonal multiple access networks: An evolutionary approach,’’ Phys.
Commun., vol. 37, Dec. 2019, Art. no. 100841.
a smaller dispersion of values. [11] S. K. Goudos, P. D. Diamantoulakis, A. D. Boursianis, V. K. Papanikolaou,
Finally, the average convergence speed of the algorithms and G. K. Karagiannidis, ‘‘Joint user association and power allocation
over 1000 runs for two user cases is shown in Figs. 7a-7b. using swarm intelligence algorithms in non-orthogonal multiple access
networks,’’ in Proc. 9th Int. Conf. Mod. Circuits Syst. Technol. (MOCAST),
We notice that in both figures the algorithms converge at a Sep. 2020, pp. 1–4.
similar speed. However, it is apparent that WOA converges at [12] F. Guo, H. Lu, D. Zhu, and Z. Gu, ‘‘Joint user association, grouping and
better objective function values. power allocation in uplink NOMA systems with QoS constraints,’’ in Proc.
IEEE Int. Conf. Commun. (ICC), May 2019, pp. 1–6.
[13] A. Celik, M.-C. Tsai, R. M. Radaydeh, F. S. Al-Qahtani, and M.-S. Alouini,
‘‘Distributed cluster formation and power-bandwidth allocation for imper-
V. CONCLUSION fect NOMA in DL-HetNets,’’ IEEE Trans. Commun., vol. 67, no. 2,
In this paper, we provide the formulation for the QoS aware pp. 1677–1692, Feb. 2019.
admission control and power allocation optimization problem [14] Z. Qin, X. Yue, Y. Liu, Z. Ding, and A. Nallanathan, ‘‘User associa-
tion and resource allocation in unified NOMA enabled heterogeneous
in NOMA downlink networks. We have solved this problem ultra dense networks,’’ IEEE Commun. Mag., vol. 56, no. 6, pp. 86–92,
using emerging swarm intelligence algorithms inspired by Jun. 2018.
nature with low complexity. The results indicate that when [15] K. Wang, Y. Liu, Z. Ding, A. Nallanathan, and M. Peng, ‘‘User association
and power allocation for multi-cell non-orthogonal multiple access net-
the number of users that are trying to connect to the net- works,’’ IEEE Trans. Wireless Commun., vol. 18, no. 11, pp. 5284–5298,
work increases, the problem becomes harder to solve. NOMA Nov. 2019.
schemes outperform the OMA ones especially as the number [16] Y. Fu, M. Zhang, L. Salaün, C. W. Sung, and C. S. Chen, ‘‘Zero-forcing
oriented power minimization for multi-cell MISO-NOMA systems: A joint
of users grows higher. Evolutionary algorithms in general user grouping, beamforming, and power control perspective,’’ IEEE J. Sel.
perform better than randomly generated solutions. We have Areas Commun., vol. 38, no. 8, pp. 1925–1940, Aug. 2020.
provided proof that the GWO algorithm has the potential to [17] Y. Fu, L. Salaün, C. W. Sung, and C. S. Chen, ‘‘Subcarrier and power
allocation for the downlink of multicarrier NOMA systems,’’ IEEE Trans.
converge to a global optimum using Markov chain modeling. Veh. Technol., vol. 67, no. 12, pp. 11833–11847, Dec. 2018.
We have applied two different algorithms, the GWO and [18] S. Banerjee, C. S. Chen, M. Coupechoux, and A. Sinha, ‘‘Joint power
WOA. The results show that for this type of problem, WOA and subcarrier allocation in multi-cell multi-carrier NOMA,’’ 2022,
arXiv:2204.00120.
performs better or is similar to other algorithms. However, [19] C.-B. Le, D.-T. Do, Z. Zaharis, C. Mavromoustakis, G. Mastorakis,
both algorithms can be applied to obtain feasible solutions and E. Markakis, ‘‘System performance analysis in cognitive radio-
quickly. In our future work, we will expand this framework aided NOMA network: An application to vehicle-to-everything commu-
nications,’’ Wireless Pers. Commun., vol. 120, no. 3, pp. 1975–2000,
to other network types where NOMA techniques may play 2021.
an important role e.g. visual light communications (VLC) [20] M.-S. Van Nguyen, D.-T. Do, Z. Zaharis, C. Mavromoustakis,
networks. G. Mastorakis, and E. Pallis, ‘‘Enabling full-duplex in MEC networks
using uplink NOMA in presence of hardware impairments,’’ Wireless
Pers. Commun., vol. 120, no. 3, pp. 1945–1973, 2021.
[21] V. K. Papanikolaou, P. D. Diamantoulakis, Z. Ding, S. Muhaidat, and
REFERENCES
G. K. Karagiannidis, ‘‘Hybrid VLC/RF networks with non-orthogonal
[1] Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, and H. V. Poor, ‘‘Applica- multiple access,’’ in Proc. IEEE Global Commun. Conf. (GLOBECOM),
tion of non-orthogonal multiple access in LTE and 5G networks,’’ IEEE Dec. 2018, pp. 1–6.
Commun. Mag., vol. 55, no. 2, pp. 185–191, Feb. 2015. [22] Q. Li, T. Shang, T. Tang, and F. Zhou, ‘‘QOS-oriented adaptive user
association for NOMA in visible light communications,’’ in Proc. IEEE
[2] S. Khwandah, J. Cosmas, P. Lazaridis, Z. Zaharis, and I. Chochliouros,
20th Int. Conf. Commun. Technol. (ICCT), Oct. 2020, pp. 599–604.
‘‘Massive MIMO systems for 5G communications,’’ Wireless Pers. Com-
mun., vol. 120, no. 3, pp. 2101–2115, 2021. [23] H. Zhang, H. Zhang, K. Long, and G. K. Karagiannidis, ‘‘Deep learning
based radio resource management in NOMA networks: User association,
[3] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, ‘‘On the performance of non-
subchannel and power allocation,’’ IEEE Trans. Netw. Sci. Eng., vol. 7,
orthogonal multiple access in 5G systems with randomly deployed users,’’
no. 4, pp. 2406–2415, Oct. 2020.
IEEE Signal Process. Lett., vol. 21, no. 12, pp. 1501–1505, Dec. 2014.
[24] H. V. Nguyen, V. Nguyen, O. A. Dobre, D. N. Nguyen, E. Dutkiewicz,
[4] Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and and O. Shin, ‘‘Joint power control and user association for NOMA-
K. Higuchi, ‘‘Non-orthogonal multiple access (NOMA) for cellular future based full-duplex systems,’’ IEEE Trans. Commun. Mag., vol. 67, no. 11,
radio access,’’ in Proc. IEEE 77th Veh. Technol. Conf., Jun. 2013, pp. 1–13. pp. 8037–8055, Aug. 2019.
[5] E. Iradier, J. Montalban, L. Fanari, P. Angueira, L. Zhang, Y. Wu, and [25] L. Qi, M. Peng, Y. Liu, and S. Yan, ‘‘Advanced user association in non-
W. Li, ‘‘Using NOMA for enabling broadcast/unicast convergence in 5G orthogonal multiple access-based fog radio access networks,’’ IEEE Trans.
networks,’’ IEEE Trans. Broadcast., vol. 66, no. 2, pp. 503–514, Jun. 2020. Commun., vol. 67, no. 12, pp. 8408–8421, Dec. 2019.
[6] J. Li, X. Li, A. Wang, and N. Ye, ‘‘Beamspace MIMO-NOMA for [26] X. Wang, Y. Xu, J. Wang, and S. Fu, ‘‘Joint user association and power
millimeter-wave broadcasting via full-duplex D2D communications,’’ allocation in heterogeneous NOMA networks with imperfect CSI,’’ IEEE
IEEE Trans. Broadcast., vol. 66, no. 2, pp. 545–554, Jun. 2020. Access, vol. 8, pp. 47607–47618, 2020.
[7] E. Iradier, A. Abuin, R. Cabrera, I. Bilbao, J. Montalban, P. Angueira, [27] M. Eliodorou, C. Psomas, I. Krikidis, and S. Socratous, ‘‘User associ-
S. Kwon, N. Hur, and S.-I. Park, ‘‘Advanced NOMA-based RRM schemes ation coalition games with zero-forcing beamforming and NOMA,’’ in
for broadcasting in 5G mmWave frequency bands,’’ IEEE Trans. Broad- Proc. IEEE 20th Int. Workshop Signal Process. Adv. Wireless Commun.
cast., vol. 68, no. 1, pp. 143–155, Mar. 2022. (SPAWC), Jul. 2019, pp. 1–5.
[8] K. Wang, Y. Liu, A. Nallanathan, and Z. Ding, ‘‘User association in non- [28] C. Xu, G. Zheng, and L. Tang, ‘‘Energy-aware user association for noma-
orthogonal multiple access networks,’’ in Proc. IEEE ICC, May 2018, based mobile edge computing using matching-coalition game,’’ IEEE
pp. 1–6. Access, vol. 8, pp. 61943–61955, 2020.
[29] V. Grout, M. Akinsolu, B. Liu, P. Lazaridis, K. Mistry, and Z. Zaharis, [51] J. Kennedy and R. Eberhart, ‘‘Particle swarm optimization,’’ in Proc. IEEE
‘‘Software solutions for antenna design exploration: A comparison of Int. Conf. Neural Netw., Piscataway, NJ, USA, Nov. 1995, pp. 1942–1948.
packages, tools, techniques, and algorithms for various design challenges,’’ [52] J. Derrac, S. García, D. Molina, and F. Herrera, ‘‘A practical tutorial on
IEEE Antennas Propag. Mag., vol. 61, no. 3, pp. 48–59, Apr. 2019. the use of nonparametric statistical tests as a methodology for comparing
[30] Z. Zaharis, D. Kampitaki, P. Lazaridis, A. Papastergiou, A. Hatzigaidas, evolutionary and swarm intelligence algorithms,’’ Swarm Evol. Comput.,
and P. Gallion, ‘‘Improving the radiation characteristics of a base station vol. 1, no. 1, pp. 3–18, Mar. 2011.
antenna array using a particle swarm optimizer,’’ Microw. Opt. Technol. [53] S. García, D. Molina, M. Lozano, and F. Herrera, ‘‘A study on the
Lett., vol. 49, no. 7, pp. 1690–1698, 2007. use of non-parametric tests for analyzing the evolutionary algorithms’
[31] Z. D. Zaharis, I. P. Gravas, P. I. Lazaridis, I. A. Glover, C. S. Antonopoulos, behaviour: A case study on the CEC’2005 special session on real param-
and T. D. Xenos, ‘‘Optimal LTE-protected LPDA design for DVB- eter optimization,’’ J. Heuristics, vol. 15, no. 6, pp. 617–644, 2008, doi:
T reception using particle swarm optimization with velocity muta- 10.1007/S10732-008-9080-4.
tion,’’ IEEE Trans. Antennas Propag., vol. 66, no. 8, pp. 3926–3935,
Aug. 2018.
[32] I. Gravas, Z. Zaharis, T. Yioultsis, P. Lazaridis, and T. Xenos, ‘‘Adaptive
beamforming with sidelobe suppression by placing extra radiation pattern
nulls,’’ IEEE Trans. Antennas Propag., vol. 67, no. 6, pp. 3853–3862,
Jun. 2019.
[33] J. Zhang, S. Chen, X. Mu, and L. Hanzo, ‘‘Evolutionary-algorithm-assisted
joint channel estimation and turbo multiuser detection/decoding for
OFDM/SDMA,’’ IEEE Trans. Veh. Technol., vol. 63, no. 3, pp. 1204–1222,
Mar. 2014.
[34] W. Zhang and W. Zhang, ‘‘An efficient UAV localization technique based SOTIRIOS K. GOUDOS (Senior Member, IEEE)
on particle swarm optimization,’’ IEEE Trans. Veh. Technol., vol. 71, no. 9,
received the B.Sc. degree in physics, the M.Sc.
pp. 9544–9557, Sep. 2022.
degree in electronics, and the Ph.D. degree in
[35] T. Zhou, D. Qin, X. Nie, X. Li, and C. Li, ‘‘Energy-efficient compu-
tation offloading and resource management in ultradense heterogeneous
physics from the Aristotle University of Thes-
networks,’’ IEEE Trans. Veh. Technol., vol. 70, no. 12, pp. 13101–13114, saloniki (AUTH), in 1991, 1994, and 2001,
Dec. 2021. respectively, the master’s degree in informa-
[36] H. Ghazzai, E. Yaacoub, M.-S. Alouini, Z. Dawy, and A. Abu-Dayya, tion systems from the University of Macedonia,
‘‘Optimized LTE cell planning with varying spatial and temporal user Greece, in 2005, and the Diploma degree in elec-
densities,’’ IEEE Trans. Veh. Technol., vol. 65, no. 3, pp. 1575–1589, trical and computer engineering from the AUTH,
Mar. 2016. in 2011. He joined the Department of Physics,
[37] L. Xu, X. Yu, and T. A. Gulliver, ‘‘Intelligent outage probability prediction AUTH, in 2013, where he is currently an Associate Professor. He is also
for mobile IoT networks based on an IGWO-Elman neural network,’’ IEEE the Director of the ELEDIA@AUTH Laboratory Member of the ELEDIA
Trans. Veh. Technol., vol. 70, no. 2, pp. 1365–1375, Feb. 2021. Research Center Network. He is the author of the book titled Emerging
[38] S. Mirjalili and A. Lewis, ‘‘The whale optimization algorithm,’’ Adv. Eng. Evolutionary Algorithms for Antennas and Wireless Communications (Insti-
Softw., vol. 95, pp. 51–67, Feb. 2016. tution of Engineering and Technology, 2021). His research interests include
[39] S. Mirjalili, S. M. Mirjalili, and A. Lewis, ‘‘Grey wolf optimizer,’’ Adv. antenna and microwave structure design, evolutionary algorithms, wireless
Eng. Softw., vol. 69, pp. 46–61, Mar. 2014. communications, and semantic web technologies. He is currently serving as
[40] Further Advancements for E-Utra Physical Layer Aspects,
an IEEE Greece Section Secretary. He is the Founding Editor-in-Chief of
document TR 36.814, 3GPP, Mar. 2010.
the Telecom open-access journal (MDPI publishing). He is also serving as
[41] F. J. Solis and R. J.-B. Wets, ‘‘Minimization by random search techniques,’’
Math. Oper. Res., vol. 6, no. 1, pp. 19–30, Feb. 1981. an Associate Editor for IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION,
[42] M. Jiang, Y. P. Luo, and S. Y. Yang, ‘‘Stochastic convergence analysis IEEE ACCESS, and IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY.
and parameter selection of the standard particle swarm optimization algo-
rithm,’’ Inf. Process. Lett., vol. 102, no. 1, pp. 8–16, Apr. 2007.
[43] S. Chen, G.-H. Peng, X.-S. He, and X.-S. Yang, ‘‘Global conver-
gence analysis of the bat algorithm using a Markovian framework and
dynamical system theory,’’ Expert Syst. Appl., vol. 114, pp. 173–182,
Jan. 2018.
[44] F. Pan, Q. Zhou, W.-X. Li, and Q. Gao, ‘‘Analysis of standard particle
swarm optimization algorithm based on Markov chain,’’ Acta Autom.
Sinica, vol. 39, no. 4, pp. 381–389, 2013.
[45] X. He, X.-S. Yang, M. Karamanoglu, and Y. Zhao, ‘‘Global conver-
gence analysis of the flower pollination algorithm: A discrete-time PANAGIOTIS D. DIAMANTOULAKIS (Senior
Markov chain approach,’’ Proc. Comput. Sci., vol. 108, pp. 1354–1363, Member, IEEE) received the Diploma (five years)
Jan. 2017. and Ph.D. degrees from the Department of Elec-
[46] J. He, Z. Tang, Z. Tang, H. Chen, and C. Ling, ‘‘Design and optimization of trical and Computer Engineering (ECE), Aristo-
scheduling and non-orthogonal multiple access algorithms with imperfect tle University of Thessaloniki (AUTH), Greece,
channel state information,’’ IEEE Trans. Veh. Technol., vol. 67, no. 11, in 2012 and 2017, respectively. Since 2017,
pp. 10800–10814, Nov. 2018. he has been a Postdoctoral Fellow with the Wire-
[47] D. Karaboga and B. Basturk, ‘‘A powerful and efficient algorithm for less Communications and Information Processing
numerical function optimization: Artificial bee colony (ABC) algorithm,’’ (WCIP) Group, AUTH. Since 2021, he has been
J. Glob. Optim., vol. 39, no. 3, pp. 459–471, 2007. a Postdoctoral Fellow with the ITHACA Labo-
[48] R. Storn and K. Price, ‘‘Differential evolution—A simple and efficient
ratory, Department of ECE, University of Western Macedonia, Kozani,
heuristic for global optimization over continuous spaces,’’ J. Global
Greece. Since 2021, he has also been a Visiting Assistant Professor with
Optim., vol. 11, no. 4, pp. 341–359, 1997.
the Key Laboratory of Information Coding and Transmission, Southwest
[49] Z. W. Geem, J. H. Kim, and G. V. Loganathan, ‘‘A new heuristic opti-
mization algorithm: Harmony search,’’ J. Simul., vol. 76, no. 2, pp. 60–68, Jiaotong University (SWJTU), China. His research interests include opti-
Feb. 2001. mization theory and applications in wireless networks and smart grids,
[50] A. R. Mehrabian and C. Lucas, ‘‘A novel numerical optimization algorithm game theory, and optical wireless communications. He serves as an Editor
inspired from weed colonization,’’ Ecol. Inform., vol. 1, no. 4, pp. 355–366, for IEEE WIRELESS COMMUNICATIONS LETTERS, IEEE OPEN JOURNAL OF THE
Dec. 2006. [Online]. Available: https://www.sciencedirect.com/science/ COMMUNICATIONS SOCIETY, Physical Communication (Elsevier), and Frontiers
article/pii/S1574954106000665 in Communications and Networks.