You are on page 1of 15

SPECIAL SECTION ON INNOVATIVE TRENDS IN 6G ECOSYSTEMS

Received 5 February 2023, accepted 27 February 2023, date of publication 27 March 2023, date of current version 30 March 2023.
Digital Object Identifier 10.1109/ACCESS.2023.3262117

Joint QoS Aware Admission Control and Power


Allocation in NOMA Downlink Networks
SOTIRIOS K. GOUDOS 1 , (Senior Member, IEEE),
PANAGIOTIS D. DIAMANTOULAKIS 2 , (Senior Member, IEEE),
ACHILLES D. BOURSIANIS 1 , (Member, IEEE),
PANAGIOTIS SARIGIANNIDIS 3 , (Member, IEEE),
KONSTANTINOS E. PSANNIS 4 , (Member, IEEE),
MOHAMMAD ABDUL MATIN 5 , (Senior Member, IEEE),
SHAOHUA WAN 6 , (Senior Member, IEEE),
AND GEORGE K. KARAGIANNIDIS 2,7 , (Fellow, IEEE)
1 ELEDIA@AUTH, School of Physics, Aristotle University of Thessaloniki, 54 124 Thessaloniki, Greece
2 School of Electrical and Computer Engineering, Aristotle University of Thessaloniki, 50 124 Thessaloniki, Greece
3 Department of Electrical and Computer Engineering, University of Western Macedonia, 50 131 Kozani, Greece
4 Department of Applied Informatics, School of Information Sciences, University of Macedonia, 54 636 Thessaloniki, Greece
5 Department of Electrical and Computer Engineering, North South University, Dhaka 1229, Bangladesh
6 Shenzhen Institute for Advanced Study, University of Electronic Science and Technology of China, Shenzhen 518110, China
7 Cyber Security Systems and Applied AI Research Center, Lebanese American University (AUL), Chouran Beirut 1102 2801, Lebanon

Corresponding author: Sotirios K. Goudos (sgoudo@physics.auth.gr)


This work was supported by the European Union’s Horizon 2020 Research and Innovation Programme [NexT GEneRation SMart
INterconnectEd IoT (TERMINET)] under Agreement 957406.

ABSTRACT In this work, we talk about the problem of joint power allocation and user association based
on quality-of-service for non-orthogonal multiple access (NOMA) to downlink networks. The problem is
especially difficult due to its non-convex form and the large number of optimization variables, which are
solved using two different nature-inspired algorithms with low complexity. We investigate the effect of
different network parameters on increasing users. Numerical results show that, for a growing number of users,
the problem is becoming increasingly difficult, which indicates the increasing network resources required
to solve it. The results of the simulations show that using evolutionary algorithms is a fast and effective way
to solve this kind of problem. Moreover, the NOMA advantage over OMA becomes clear as the number of
users increases. Evolutionary techniques outperform randomly generated solutions, as expected.

INDEX TERMS 5G, 6G, NGIoT, cellular network, NOMA, QoS, optimization techniques.

I. INTRODUCTION increasing at an exponential rate. Therefore, multiple access


The introduction of NGIoT next-generation Internet of technology is being highlighted for the provision of massive
Things (NG-IoT) creates new research challenges and priori- access to IoT devices. Moreover, providing a large amount of
ties. The identified priorities encompass multiple components intelligent IoT devices within a given bandwidth while simul-
of the IoT stack and thus relate to 6G, Distributed Ledgers, taneously ensuring QoS parameters such as low latency and
Big Data, Artificial Intelligence, Cybersecurity, and Cloud high throughput can be difficult. Non-orthogonal multiple
Computing. The deployment of 5G/B5G paves the way for access (NOMA) is expected to be one of the core technologies
the NGIoT to become a reality. Due to the increasing popu- in fifth-generation (5G) mobile communication networks and
larity of the internet, the number of communication devices is in NGIoT [1], [2].
In typical orthogonal multiple access (OMA) systems,
The associate editor coordinating the review of this manuscript and users with poor channel conditions are allotted network
approving it for publication was Pavlos I. Lazaridis . resources, but the spectral efficiency of these systems has

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.


VOLUME 11, 2023 For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/ 30873
S. K. Goudos et al.: Joint QoS Aware Admission Control and Power Allocation in NOMA Downlink Networks

deteriorated. But when the power domain NOMA technique Moreover, in [16] the authors examine the power con-
is taken into account, this feature does not apply a typical sumption minimization problem for a generic multi-cell
NOMA scheme, users can cancel the same frequency in the multiple input and single output non-orthogonal multiple
spectrum domain, the same time in the time domain, and even access (MISO-NOMA) system. They use an iterative dis-
the same code in the code domain; however, they cannot share tributed methodology to solve the optimization problem of
the same level of power in the power domain [3]. The funda- the associated joint user grouping, beamforming (BF), and
mental concept behind this case in a typical NOMA scheme power control problems. Additionally, the joint subcarrier and
is the utilization of successive interference cancellation (SIC) power allocation problem for the downlink of a multi-carrier
techniques by users with satisfactory channel conditions in nonorthogonal multiple access (MC-NOMA) system is stud-
order to mitigate the interference of users with low-quality ied in [17]. The problem of joint power and sub-carrier allo-
channel conditions. As a result, SIC techniques lead to a cation for the NOMA system in multi-cell is studied in [18].
considerable reduction of users’ intra-cell and intra-cluster The authors in [18] propose a polyblock optimization-based
interference [4]. NOMA has been proposed as the main tech- algorithm for obtaining a globally optimal solution.
nique by several authors in order to solve the challenge of Moreover, the authors in [19] examine NOMA and cog-
broadcast and unicast convergence as well as the convergence nitive radio (CR) benefits to vehicle-to-everything (V2X) as
between broadband and broadcast, [5], [6], [7]. a spectrum-efficient application. The application of NOMA
The user association problem in deployed NOMA net- in IoT networks in combination with mobile edge computing
works exhibits various challenges due to its unique features, (MEC) is reported in another paper in [20].
such as co-channel interference. The authors in [8] utilize a In hybrid networks, the different kinds of technologies
game-theoretic approach to associate the users of a NOMA that are used are one of the important factors in the user
network example in different resource blocks and group association problem. To this end, the authors in [21] inves-
them into orthogonal clusters to address the user association tigate a complex, yet practical, indoor scenario, by incor-
problem. However, several assumptions and certain limita- porating visible light communication (VLC) technology and
tions that are derived from the application of game-theoretic radio frequency (RF) technology in a hybrid NOMA network.
techniques to user association problems in NOMA networks Furthermore, the authors of [22] investigate the effects of a
make this approach rather complex and difficult to imple- VLC NOMA system on the provided QoS by proposing a
ment. On the contrary, evolutionary algorithms (EAs) [9] QoS-based virtual user association scheme with adaptation.
are global optimization techniques that perform satisfactorily The authors in [23] propose a deep learning framework
under virtually any given optimization problem, each with its to handle user association, as well as subchannel and power
own restrictions or peculiarities. allocation problems in NOMA networks. The authors focus
The authors in [10] and [11] introduced the utilization of on game-theoretic system energy efficiency (EE) under QoS
EAs to address both the power allocation and the user associ- constraints. Additionally, in [24] the authors address the prob-
ation problems of typical NOMA networks having multiple lem of optimizing both power control and user association
base stations (BSs) as a key parameter in network topology. using a convex optimization framework subject to total trans-
In [12], the authors study uplink NOMA scenarios with user mit power and user-specific quality-of-service constraints.
association having different quality-of-service (QoS) require- The user association problem for NOMA-based fog radio
ments, and propose a solution using game theory techniques. access networks (F-RANs) is studied in [25], by analyzing its
Finally, the authors in [13] consider non-ideal SIC NOMA performance characteristics. The authors apply a stochastic
schemes with QoS constraints to propose a distributed cluster geometry tool to provide closed-form analytical results. They
formation and a power-bandwidth allocation approach for presented two different algorithmic approaches based on
downlink heterogeneous networks. evolutionary games and reinforcement learning, respectively,
A unified NOMA scheme that encompasses both power to address the user association problem in NOMA-based F-
and code domains and provides user association along with RANs. Moreover, the energy efficiency maximization prob-
resource allocation in heterogeneous ultra-dense networks lem was analyzed in [26], by considering a downlink NOMA
(HUDNs) for 5G mobile communication networks is pro- multicell heterogeneous network under imperfect CSI for
posed in [14]. specific QoS constraints, such as maximum transmit power,
Expanding the work of [8], the authors in [15] introduced a small-cell users, and cross-tier interference.
new formulation for the user association problem in NOMA The authors in [15] proposed a new framework for NOMA
cellular networks. They grouped the users of the given cel- cellular networks, namely the FDH-NOMA framework, that
lular network into orthogonal clusters and associated them combines NOMA schemes and Full-Duplex (FDH) tech-
with different physical resource blocks by utilizing a game- niques. For the user association problem, they proposed two
theoretic technique. In their work, the authors provide all different modes, the selection criterion mode, and the NOMA
the main parameters of their proposed formulation, including pairing scheme mode. Moreover, to maximize the sum-rate
the complexity, convergence, stability, and optimality of their of the NOMA network system, the authors in [27] employed
solution. a coalition game approach that allowed cooperation between

30874 VOLUME 11, 2023


S. K. Goudos et al.: Joint QoS Aware Admission Control and Power Allocation in NOMA Downlink Networks

the small base stations and proposed two distinguished algo-


rithms to address this problem.
NOMA techniques are combined with mobile edge
computing (MEC) in [28]. The authors proposed a new
formulation to address a complex optimization problem,
by combining the individual problems of user associa-
tion, resource allocation, and transmitting power control.
To address this complex problem, they employed a matching-
coalition approach.
Researchers have also used evolutionary algorithms to
solve a number of optimization problems that have been
written about. There is a vast number of open-source software
packages and libraries that can be used for this purpose [29].
Several papers can be found in the literature using swarm
FIGURE 1. Network topology.
intelligence approaches for solving optimization problems in
wireless communications [30], [31], [32]. In [33] an evolu-
tionary approach is employed for joint channel estimation
and turbo multiuser detection in the context of orthogonal
frequency-division multiplexing (OFDM) multiple-access • Introduce an evolutionary optimization framework for
systems. In the same context, the authors in [34] solve the solving the QoS-aware joint power allocation and user
Unmanned aerial vehicles (UAVs) localization problem using association problems.
an improved Particle Swarm Optimization (PSO) algorithm. • Develop a specific heuristic algorithm for forming the
Furthermore, the authors in [35] address the problem of fitness function.
jointly optimizing the computation offloading and resource • Apply two nature-inspired algorithms, namely the GWO
management of ultradense mobile devices using an approach and the WOA optimizers.
of both genetic algorithms and PSO. Additionally, the authors • Study the effect of varying different network parameters
in [36] apply both PSO and GWO for cell planning in 4G on overall QoS.
cellular networks. The problem of predicting the outage prob- • Compare the results of two algorithms with randomly
ability for mobile IoT networks is addressed by the authors generated solutions.
in [37] by applying a combination of an improved GWO To the best of the author’s knowledge, this is the first time
algorithm and Elman neural network. The motivation for our that evolutionary algorithms have been applied to address and
work stems from the above-mentioned discussion and from solve the given problem. The computed results reveal network
the fact that we want to provide a global solution method- performance for various cases and demonstrate the benefits of
ology that does not use relaxation or other approximation the NOMA approach. Moreover, it seems that WOA clearly
techniques. In this work, we look at the problems of power outperforms GWO in all cases. An evolutionary approach
allocation and user association in the downlink connections of proves to be more efficient than producing random solutions.
a typical NOMA communication network with a single base
station and multiple physical resource blocks (PRBs). One
of the parameters that increases considerably the complexity II. SYSTEM MODEL
of the given problem, which is an optimization one, is the In general, let’s think about a single base station (BS) in a
power control. In a common approach, the power of the users cell network that serves several mobile users using NOMA
in the network is controlled by the power coefficient, i.e., techniques. Moreover, the BS uses physical resource blocks
one coefficient for each user, and these are considered con- (PRBs) to transmit its data (Fig 1). Thus, we consider a
stants for the whole network [8]. In our proposed approach, downlink NOMA network that is being utilized by U =
we compute the power coefficient for each user of the NOMA {1, 2, · · · , Nu } set of users, while |U| = Nu denotes the set
network by utilizing EAs, as a suitable technique to solve cardinality or the number of users. Additionally, we consider
this kind of optimization problem [9]. In detail, we utilize V = {1, 2, . . . VRB }, which denotes the set of PRBs with
the Whale Optimization Algorithm (WOA) [38] and the Grey cardinality |V| = VRB . Hence, VRB orthogonal clusters exist.
Wolf Optimizer (GWO) [39], as representative examples of If PRB v is associated with a set of users, then this is denoted
EAs, to address the given optimization problem. The main Ov with cardinality |Ov | = Ov . One PRB is assigned to
contributions of this work are summarized as follows: one user in OMA systems. However, several users share the
• Formulation of the QoS aware joint power allocation and same PRB with varying power levels in NOMA networks.
user association problems for downlink NOMA cellular In this case, SIC in user receivers is used to eliminate the
networks. intra-cluster interference.
• Problem solution using optimal power coefficients We make the assumption that all users in each cluster
instead of constant ones. use the NOMA techniques. Hence user q in any cluster Ov

VOLUME 11, 2023 30875


S. K. Goudos et al.: Joint QoS Aware Admission Control and Power Allocation in NOMA Downlink Networks

receives the signal that is expressed by Therefore, in the case of a NOMA scheme, we can express
the data rate at the user q assigned to PRB v as
q |Ov | q
X
Yqv = hvq pvq sq + nq + hvq pvi si (1) RNOMA
q,v = log2 (1 + γqv )
| {z } i=1,i̸=q
desired signal | {z } where WPRB is the bandwidth of a PRB in KHz.
intra−cluster interference The admission control variable of the i-th user with v-th
where hvq denotes the channel coefficient among user q and PRB is denoted with another binary variable, svi formulated
PRB v that is assigned by the BS, sq represents the transmitted as
signal, pvq denotes the power allocation coefficient, and nq

1, if user i is assigned to PRB v
denotes the noise. siv = (8)
0, otherwise.
Furthermore, the channel power gain is expressed as
We can then, formulate the QoS-aware joint admission
|hvq |2 = |ĥvq |2 GPL (dq ) (2) control and power allocation problem for downlink NOMA
scheme as
where ĥvq ∼ CN (0, 1) denotes the circular-symmetric com- X
max H (max (0, Ri − Ri,min ))
plex Gaussian zero-mean noise from PRB v to user q, GPL (dq ) {s,a}
i∈U
denotes the propagation path loss. The propagation path loss
between user q and the BS is modeled with path gain (loss) s.t. C1 : suv ∈ {0, 1}, ∀u ∈ U, ∀v ∈ V,
XVRB
GPL(d). In this work, we will use a propagation model C2 : suv = 1, ∀u ∈ U,
from [40]. This is an outdoor macrocell line-of-sight (LOS) v=1
XOv
model and it is defined by C3 : suv ≤ Q, ∀v ∈ V,
u=1
XOv
GPL (dq ) = −128.1 − 37.6 log10 (dq ) (dB) (3) C4 : siv avi ≤ 1∀v ∈ V, (9)
i=1
where dq denotes the distance among the user q and the BS where H () denotes the Heaviside step function given by
expressed in km. (
The power allocation coefficients satisfy in any cluster Ov : 0, if ρ < 0,
H (ρ) = (10)
X|Ov | 1, if ρ ≥ 1.
pvj ≤ 1. (4)
j=1 where a and s are the set of all indicators a and s, respectively.
The constraint C1 describes whether user u and PRBs v are
Moreover, we consider that a maximum number of Q NOMA
associated or not. The constraint C2 expresses the unique
users can be connected to each PRB. If q-user needs to decode
association of one user u with one PRB v. Furthermore, con-
its own signal, then it is necessary to decode and remove
straint C3 indicates that in any PRB, a maximum of Q users
intra-cluster interference from the previous user. The SIC
can be handled. Constraint C4 states that each cluster’s total
technique employed by the u-th user is considered ideal.
power allocation coefficients should be less than or equal to
Therefore, in this case for perfect SIC the necessary condition
one. The problem presented above is non-convex and difficult
for u > v is given by
to solve.

Q(Ov ) =|hvOv |2 ≥, . . . |hvu |2 ≥ |hvq |2 . . . , ≥ |hv1 |2 (5)
III. OPTIMIZATION ALGORITHMS
. We can assume that the Q − th user in each cluster is well- In this study, we have applied to the Qos aware joint admis-
served. The q-th user’s receiver in Ov detects the j-th user’s sion control and power allocation problem two different
signal as noise (q < j) and decodes its own signal based on the low-complexity, nature-inspired algorithms. These are the
signal-to-interference-plus-noise ratio (SINR) given below WOA [38], and the GWO [39]. WOA uses math to model
how humpback whales interact with each other, while GWO
|hvq |2 pvq is based on how grey wolves hunt. There are no control
γqv = , (6)
|O
Pv | N0 WPRB
parameters in either algorithm. As a result, they don’t require
|hvq |2 pvi + Pv any further settings except the maximum number of iterations
j=q+1
or generations and the population size.
where WPRB is the bandwidth of a PRB, Pv denotes the
transmit power, and N0 denotes the noise power spectral A. PROBLEM MODELING ALGORITHM
density. We specify the transmit signal-to-noise ratio (SNR) To tackle the Qos aware joint admission control and power
as ρ = N0 W
Pv
PRB
. Additionally, the receiver at the Ov -th user allocation problem using evolutionary algorithms, we need
removes intra-cluster interference with SIC and decodes its first to model properly the objective function and the decision
own signal with SINR: vector of the unknown variables. To do this, we make a new
heuristic algorithm that computes the value of the objective
γOv v = ρ|hvOv |2 pvOv (7) function and deals with the different constraints. This is

30876 VOLUME 11, 2023


S. K. Goudos et al.: Joint QoS Aware Admission Control and Power Allocation in NOMA Downlink Networks

Algorithm 1 Calculate Objective Function Value Algorithm 2 GWO Algorithm for NOMA User Association
1: Input a possible solution vector z
1: Initialize a population of association variables and power
2: Set Ncover = 0, the users served by the BS, fitness = 0 ⃗ i (i = 1, 2, · · · ,NP)
values of size 2Nu × NP W
3: for i=1 to Nu do ⃗ 1 , and C ⃗2
2: Set up u ⃗, C
4: for v=1 to VRB do 3: for each vector W ⃗ i of the population do
5: if users in VRB = Q then 4: Calculate the fitness value F(W ⃗ i ) using Algorithm 1
6: Continue and find the user association vector if W ⃗ i is feasible
7: else 5: end for
8: Assign user i to PRB v, siv = 1 6: Compute the position vectors for each wolf type: W ⃗ α,
9: Assign power value avi to user i W⃗ β , and W⃗δ
10: end if 7: while (t < MaxNumIter) do
11: if user i assignment is feasible according to (9) then 8: for each vector of the population do
11: Calculate rate Ri for the i-th user 9: Calculate new position vector W ⃗ i of the current
12: if Ri ≥ Ri,min then member using (17) and update its value
13: if the BS can support the user’s desired rate, 10: end for
QoS is feasible then 11: Calculate u⃗, C ⃗ 1 , and C⃗2
14: Ncover = Ncover + 1, 12: for each vector W ⃗ i of the population do
15: end if 13: Calculate the fitness value F(W ⃗ i ) using Algorithm 1
16: end if and find the user association vector W ⃗ i is feasible
17: else 14: end for
18: fitness = fitness + 1020 15: Compute the position vectors of all population mem-
19: end if bers
20: end for 16: Renew W ⃗ α, W⃗ β , and W ⃗δ
21: end for
17: Increase t by one
22: fitness = fitness − (Ncover /Nu) ∗ 100
18: end while
23: Return fitness value
19: Return the best feasible solution vector of association
variables and power values

presented in Algorithm 1, which returns the fitness value, for of association and power values), and the current genera-
⃗ 1 and C
tion is denoted by G. The vectors C ⃗ 2 are given by
a possible solution vector z. The solution vector is defined in
the form z = (s1v , s2v , .., siv , .., sNu v , av1 , av2 , .., avi , .., avNu ) (13) and (14):
⃗ 1 = 2⃗u · ⃗v1 − u⃗
C (13)
B. GREY WOLF OPTIMIZER FOR NOMA USER ⃗ 2 = 2 · ⃗v2
C (14)
ASSOCIATION
The GWO method is based on mathematical models of grey where u⃗ ∈ [2, 0] and ⃗v1 , ⃗v2 ∈ [0, 1] are randomly obtained
wolf hierarchy and hunting behavior in the wild. Its major vectors from uniform distribution. The GWO algorithm’s
feature is the preservation of search space information during hunting process, like the social behavior of a grey wolf pack,
the iteration process. GWO does not require any additional can be described as the formulation below.
control settings to be configured. The GWO algorithm clas- ⃗ 12 · W
V⃗α = |C ⃗α − W ⃗|
sifies the wolf vectors into four groups. The alpha (alpha),
beta (beta), and delta (delta) categories are the first three best V⃗β = |C⃗ 22 · W
⃗β − W ⃗|
2
vectors of association and power values. The omega (omega) V⃗δ = |C
⃗3 · W ⃗δ − W ⃗| (15)
category contains all unclassified solutions. In a wolf pack, W⃗1 = W ⃗α − C 1
⃗ 1 · V⃗α

a social behavior group hunting (optimization process) is
⃗2 = W ⃗β − C ⃗ 21 · V⃗β

oriented by the aforementioned population categories (alpha, W
⃗3 = W ⃗δ − C ⃗ 31 · V⃗δ

beta, delta). The following formulas give a mathematical W (16)
representation of the encirclement of prey during the hunting ⃗ ⃗ ⃗
process: W⃗ G+1 = W1 + W2 + W3 (17)
3
⃗2 · P
V⃗x,G = |C ⃗ x,G − W⃗ x , G| (11) The pseudo-code of GWO algorithm is outlined in
⃗ x,G+1 = P
W ⃗ x,G − C 1
⃗ · V⃗x,G (12) algorithm 2.

where the position vector of the prey is denoted by P ⃗x, C. WHALE OPTIMIZATION ALGORITHM FOR NOMA
the coefficient vectors are denoted as C⃗ 1 and C
⃗ 2, W
⃗ mod- USER ASSOCIATION
els the position vector of the grey wolf (e.g. the position The WOA is a swarm-based nature-inspired algorithm [38].
vector, in this case, corresponds to the size 2 × Nu vector WOA is based on humpback whales’ hunting and social

VOLUME 11, 2023 30877


S. K. Goudos et al.: Joint QoS Aware Admission Control and Power Allocation in NOMA Downlink Networks

behavior. Whales can detect the location of prey in the wild this type of behavior and is defined by:
and make particular maneuvers to encircle them. The prey is r b

represented by WOA as the best solution identified in each Qd = Ud × xd,G − xd,G (24)
b r
iteration. All members of the population (user associations xd,G+1 = xd,G − Sd Dd (25)
and power vectors) aim to get as near as possible to the
where r, with r ̸= b denotes a randomly selected vector of
optimum solution. Then they update their position vectors
association and power values that the b − th member will
appropriately. The following equations can be used to express
follow.
the whale behavior and in particular the prey encirclement
The pseudo-code is presented in Algorithm 3 to better
part in WOA:
understand the WOA functionality. The WOA generates a
best b set of random vectors of association variables and power

Qd = Ud × xd,G − xd,G (18)
b best values during initialization. The location vectors and distance
xd,G+1 = xd,G − Sd Qd (19) vectors to the prey are then calculated at each iteration either
b denotes the b−th vector of association and power in terms of a random search pattern or the best fitness values
where xd,G
best denotes the best solu- achieved thus far. The sd parameter regulates the algorithm’s
values in the d −th dimension, and xd,G
exploitation and exploration phases. Finally, the rb option
tion found in current iteration G. Moreover, the coefficient
toggles between an encircling process with a reducing radius
vectors in the d − th dimension (the d − th dimension refers
and a spiral trajectory updating position mechanism.
to the vector of association and power values containing the
The time complexity of both GWO and WOA algorithms
unknowns in the optimization problem) are denoted by Ud ,
is comparable to that of other swarm intelligence algorithms,
Sd , while Qd corresponds to the distance vector of the current
that is at the end of each iteration given by O(Np Nc D +
whale position to the prey position. The following equations
Np Nc f ), where D denotes the search space dimension and f
show how the latter vectors are calculated:
denotes the time complexity of the fitness function.
Sd = 2sd rd − ad (20)
D. CONVERGENCE ANALYSIS OF THE GWO ALGORITHM
Ud = 2rd (21)
FOR NOMA ADMISSION CONTROL
where sd is a variable ∈ [2, 0], that decreases linearly over The theoretical analysis of the evolutionary algorithms pre-
iteration, and rd denotes a random number from a uniform sented in the previous section can be made according to the
distribution ∈ [0, 1]. framework presented in [41], [42], and [43]. The convergence
The whale bubble-net behavior is modeled mathematically analysis is based on the two conditions reported in [41].
in WOA as the exploitation phase of the algorithm. This is If we define the optimization problem ⟨S, f ⟩, an objective
achieved by the integration of two distinct movements, the function f and a feasible solution space S. A new solution
first one is an encircling movement with a reducing radius xn+1 is obtained after an evolutionary algorithm A iterates for
and the second one is a spiral trajectory updating position. n iterations. This solution is found by the previous iteration
This type of spiral trajectory movement in WOA is modeled solution xn by
by a spiral equation that replicates humpback whales’ helix- xn+1 = A(xn , η), (26)
shaped movements. It is written as:
where algorithm A obtains the solution set η during the itera-
b
xd,G+1 = Ld egs cos(2πl) + xd,G
best
(22) tive process.
The essential infimum of f on S is defined as [41]
where Ld represents the the distance vector of the b−th vector
of association and power values to the best solution (i.e the β = inf{n : u[x ∈ S|f (x) < n] > 0}, (27)
d − th coordinate of L), g is a fixed value that determines
where u[X ] is the measure of X . This has the meaning that
the shape of the logarithmic spiral, and l is a random number
there exist non-empty subsets in the search space and the
∈ [−1, 1] from a uniform distribution.
objective function value that corresponds to the element in
Humpback whales follow a spiral-shaped path in a cir-
the non-empty subset can be infinitely close to β. Hence, the
cle with a decreasing radius while performing two separate
neighborhood or optimality region is defined as
mechanism actions at the same time. This type of movement 
is modeled by the WOA authors using a 50% probability  {x ∈ S|f (x) < β + ε}, −∞ < β < ∞,
distribution, which is mathematically expressed as: Rε,K =
 {x ∈ S|f (x) < K }, β = −∞,
xd,G − Sd Qd , if rb < 0.5
 best
b
xd,G+1 = (23) (28)
best ,
Ld eks cos(2πl) + xd,G otherwise
where ε > 0 and K < 0. We can assume that if an evolu-
where rb denotes a random number ∈ [0, 1]. tionary algorithm obtains a point in Rε,K , then the algorithm
Additionally, the whales follow a random pattern when obtains either the global optimal solution or an approximation
looking for prey. The WOA exploration phase is denoted by of that global optimal solution.

30878 VOLUME 11, 2023


S. K. Goudos et al.: Joint QoS Aware Admission Control and Power Allocation in NOMA Downlink Networks

Algorithm 3 WOA for NOMA User Association The guaranteed global convergence of any evolutionary
1: Initialize a population of vectors of association variables algorithm or any stochastic optimization method is based on
and power values of size 2Nu × NP the criteria listed in [41], [42], and [43]
2: for each vector x ⃗i of the population do Criterion 1: Assuming that f is measurable and the feasi-
3: Calculate the fitness value F(⃗x i ) using Algorithm 1 and ble solution space S is a measurable subset of Rn , the evolu-
find the user association vector if x⃗i is feasible tionary algorithm A satisfies both Condition 1 and Condition
4: end for 2. If {xn }∞
n=0 denotes a sequence generated by the algorithm
5: Obtain the best user association solution xjbest A then the following relation should be satisfied
6: while (G < Gmax ) do
lim P(xn ∈ Rε,K ) = 1, (30)
7: for (j = 1 : 2Nu ) do n→∞
8: Compute sj , rj , Sj , Uj where P(xn ∈ Rε,K ) denotes the probability that the found
9: for (i = 1 : NP) do after n iterations or generations by algorithm A is in the
10: if (rb < 0.5) then subset Rε,K .
11: if (|Sj | ≥ 1) then This means that if the number of iterations is high enough,
12: Calculate the distance vector Qj using (18) the evolutionary algorithm will certainly converge, or we
i
Calculate the position vector xj,G+1 using
13: may say that the evolutionary algorithm can have almost
(19) guaranteed global convergence. So in order to prove that the
Calculate the fitness value F(⃗xG+1 i ) using
14: GWO algorithm converges, we need to prove that GWO may
Algorithm 1 and find the user association satisfy the above criterion. Without loss of generality, we may
i
vector if x⃗G+1 is feasible express the update equation of GWO of the i-th vector after
15: else n + 1 iterations as
16: Compute distance vector Qj using (24) 1 n
wn+1 wa − r1n r2n wna − wni

17: Compute position vector xj,G+1i using (24) =
i
i
3
18: Calculate the fitness value F(⃗xG+1 ) using 
+ wnβ − r3n r4n wnβ − wni

Algorithm 1 and find the user association
i
+ wn − r n r n wn − wn

vector if x⃗G+1 is feasible δ 5 6 δ i (31)
19: end if
20: else where rmn , m = 1, 2, . . . , 6 are uniform random numbers
21: Compute position vector xj,G+1 i using (22) from the distribution U (0, c) on [0, c] where c is a positive
i constant.
22: Calculate the fitness value F(⃗xG+1 ) using
The states of grey wolves and the state space are expressed
Algorithm 1 and find the user association vec-
i as below:
tor if x⃗G+1 is feasible
Definition 1: The grey wolf individual x position, histor-
23: end if
ical best position wα , historical second best position wβ ,
24: end for
and historical third best position wδ , creates the state or
25: end for
status, which can represented by ζ = (x, wα , wβ , wδ ), where
26: Increase G by one
x, wα , wβ , wδ ∈ S.
27: end while
Moreover, it is also f (wα ) ≤ f (wβ ) ≤ f (wδ ) ≤ f (x).
28: Return the best feasible solution vector of association
Thus, we consider that the set of all possible states of all grey
variables and power values
wolf vectors creates a state space for vectors, which can be
expressed as
n
Z = ζ = (x, wα , wβ , wδ )|x, wα , wβ , wδ ∈ S, (32)
Thus, we may consider two conditions that are needed to o
ensure that global optimality can be obtained: f (wα ) ≤ f (wβ ) ≤ f (wδ ) ≤ f (x) . (33)
Condition 1: The condition that the sequence {f (x n )}∞
n=0
is converging to the infimum of f on S should be satisfied Additionally, we may define the states and state space of
by an optimization algorithm A. This means that if there is the grey wolves population by the following:
f (A(x, η)) ≤ f (x), and η ∈ S then f (A(x, η)) ≤ f (η) Definition 2: We call the grey wolves group set of all N
Condition 2: For all subsets ∀D ∈ S subject to v(D) > 0, grey wolves vectors. Moreover, The states of this grey wolf
we have group are represented by ψ = (ζ1 , ζ2 , . . . , ζN ). We also
define the grey wolves group status space as the set of all

Y possible grey wolves group states and this is denoted by
(1 − vn (D)) = 0, (29) n o
9 = ψ = (ζ1 , ζ2 , . . . , ζN ), ζi ∈ Z (1 ≤ i ≤ N ) . (34)
n=0
where vn (D) denotes the probability measure of the n-th It is clear from the above that the best solution vector is
iteration best result of the evolutionary algorithm A on D. included in the grey wolves status 9. Additionally, we define

VOLUME 11, 2023 30879


S. K. Goudos et al.: Joint QoS Aware Admission Control and Power Allocation in NOMA Downlink Networks

the state transition for the grey wolves’ positions modeling r1n + 12 ε r3n + 21 ε
R R
solutions by the following: dψ dψ
r1n − 12 ε r3n − 12 ε
For ∀ζi = (x i , wiα , wiβ , wiδ ) ∈ Z and ∀ζj = × ×
j j j xRι n xRι n
(x j , wα , wβ , wδ ) ∈ Z during the iterations of the GWO dψ dψ
algorithm, we denote the state transition from ζi to ζj as xin −r1n |wna −xin | xin −r3n |wnb −xin |

Aζ (ζi ) = ζj , (35) r5n + 21 ε


R

where Aζ denotes the transition function from ζi to ζj in the r5n − 12 ε
×
state space Z . xRι n
Correspondingly, for ∀ψi = (ζi,1 , ζi,2 , . . . , ζi,N ) ∈ S and dψ
∀ψj = (ζj,1 , ζj,2 , . . . , ζj,N ) ∈ S, the iterative process of the xin −r5n |wnδ −xin |
GWO algorithm essentially, the grey wolves’ group states are ε ε
= ×
c wa − xin

transferred from ψi to ψj . This is 1
w n + wn + wn n
3 a β δ
ε ε
Aψ (ψi ) = ψj . (36) × × n n
(40)
c w − x n c wδ − xi
n
β i
In the GWO algorithm, the grey wolves’ status ζi is basically
changed to the status ζj in a single step, and its transition Moreover, it is
probability (
a ) < f (wa ),
1, f (wn+1 n
Lemma 1: The transition probability of the i-th vector of P(wna → wn+1
a )= (41)
GWO population from state ζn to state ζn + 1 is found by the 0, f (wn+1 n
a ) ≥ f (wa ).
joint probability □
We may now give the proof of the following theorem using
P(Aζ (ζi,n ) = ζi,n+1 ) = P(xin → xin+1 )P(wna → wn+1
a ) (37) these findings:
where P(xin → xin+1 ) is the probability for the i-th particle Theorem 1: During the iterative procedure of the GWO
changing from the position xin to the spherical region centered algorithm, the transition probability of the grey wolves group
status changes from ψi to ψj is given by
at xin+1 with radius ϵ and P(wna → wn+1 a ) is the transition
probability of the best solution of GWO. N
Y
Proof: Any individual i of the GWO changes sta- P(Aψ (ψi ) = ψj ) = P(Aζ (ζi,n ) = ζj,n ), (42)
tus from from (xin , wnα , wnβ , wnδ ) to (xin+1 , wn+1
α , wβ , wδ ).
n+1 n+1
n=1
n n+1 n n+1
This means that the xi → xi , and wa → wa are where N denotes the current number of iterations.
performed synchronously. Thus, the joint probability is given Proof: As Aψ (ψi ) = ψj ) shows that each state in the
by grey wolf group state, ψi is concurrently moved to group state
ψj ; this is expressed as
P(Aζ (ζi,n ) = ζi,n+1 ) = P(xin → xin+1 )P(wna → wn+1
a ). (38)
Aζ (ζi,1 ) = ζj,1 , Aζ (ζi,2 ) = ζj,2 , . . . , Aζ (ζi,N ) = ζj,N .
We consider the single vector model given by (39). Then it
obvious that the value of xin+1 is determined by the six random Then, we can deduct that the transition probability of a group
variables rmn , m = 1, 2, . . . , 6. Without loss of generality we transition of the grey wolf group is actually each iteration
may write r2n = r4n = r6n = 1. Thus, (39) becomes step’s joint probability. Hence, we may write

1 n P(Aψ (ψi ) = ψj ) = P(Aζ (ζi,1 ) = ζj,1 )P(Aζ (ζi,2 ) = ζj,2 )


xin+1 = wa − r1n wna − xin

3  . . . P(Aζ (ζi,N ) = ζj,N ),
+ wnβ − r3n wnβ − xin

YN
= P(Aζ (ζi,n ) = aj,n ), (43)
+ wnδ − r5n wnδ − xin

(39) n=1
which concludes the proof. □
Then we have similarly with [44] The state sequence ζ can thus be proven to be a finite,
homogeneous Markov chain.
xin+1 + 21 ε
R Theorem 2: The grey wolf group state sequence ζ consti-

tutes a finite homogeneous Markov chain.
  xin+1 − 12 ε
P xin → xin+1 ==   Proof: The number of iterations or generations and
xι n + 13 wna +wnβ +wnδ the population size are both finite, thus every evolutionary
algorithm’s search space for the entire iterative process is
R

xin finite. Thus, each of the grey wolf state ζ = (x, wα , wβ , wδ )

30880 VOLUME 11, 2023


S. K. Goudos et al.: Joint QoS Aware Admission Control and Power Allocation in NOMA Downlink Networks

among the x, wα , wβ , wδ are finite. As a result, the state space


of the grey wolf is finite.
If we consider the position, global optimal values, second
global optimal value, and third optimal value to be grouped
in one state 9, then it is obvious that state 9(n + 1) will not
depend on previous states but just on state 9(n). Thus, the
sequence 9 has the proper Markov chain features.
It is clear that the system state 9(n − 1) and its transition
at time n to the new state 9(n) is totally predetermined by
its state at time n. Moreover, the random numbers rmn , m =
1, 2, . . . , 6 and the iteration n are independent of the system
state prior to n.
From 9(n − 1) to 9(n) of grey wolf group state sequence
{9(n); n ≥ o}, The transition probability P(A9 (9(n − 1)) = FIGURE 2. Number of users versus percentage of users served for
9(n)) of the two states is given by the transition probability M = 2, T = 50 for different association algorithms.

of all individuals in the grey wolf group. This transition


probability is given by (1). This probability is only related
to the state ζi,n−1 , 1 ≤ i ≤ N of all grey wolves at iter- The following theorem has been proven in [45] and [46].
ation n − 1. Thus, the Markov chains are finite. Moreover, Theorem 4: If we assume that a Markov chain has a
we deduct from Theorem 1, that P(Aζ (ζ (n − 1)) = ζ (n)) non-empty
T set U and there is not any closed set G satisfying
is independent of time (iteration) n − 1. In similar way, U G = ∅, then the following relation is valid
we notice that P(A9 (9(n − 1)) = 9(n)) is also independent = σi , only if i ∈ U

lim P(xn = i) (47)
of n − 1. Thus, we have proven that the finite Markov chains n→∞ = 0, only if i ∈/U
are homogeneous. □ Moreover, the following theorem can be derived from the
Next, we can define the optimal state set of the grey wolf above theorems:
algorithm for the global optimum solution gα , the second best Theorem 5: When the number of iterations reaches infinity
global optimum solution, gβ , and the third global optimum or is sufficiently large, then the grey wolf group state sequence
solution gδ as will converge to the optimal state (solution) set 8.
Definition 3: Additionally, from the above four theorems, it is straightfor-
n ward to prove the following global convergence theorem:
E = ζ = (x, wα , wβ , wδ ), f (wα ) = f (gα ), f (wβ ) = f (gβ ), Theorem 6: The GWO algorithm with the Markov
chain model as defined previously has guaranteed global
o
f (wδ ) = f (gδ ), ζ ∈ Z . (44)
convergence.
Clearly, the E is a subset of Z , it is E ⊆ Z Moreover, we can
Proof: We need to prove that GWO satisfies both Con-
define the optimal grey wolf state group as
dition 1 and Condition 2 defined earlier in this subsection.
Definition 4:
n o If this is valid, then GWO will converge to global optimality.
8 = ψ = (ζ1 , ζ2 , . . . , ζN ) ∃ζm ∈ E(1 ≤ m ≤ N ) . (45) The iterative process of GWO, where the global best value

The above definition implies that the optimal grey wolf wα of the population is kept or is updated after every iteration,
state set 8 is defined as the set of all grey wolf groups such ensures that the first convergence condition is met. Moreover,
that at least one vector grey wolf individual of the population we may deduct from the previous theorem, that after a suffi-
with its state belong to E. cient number of iterations, the GWO group state sequence
will converge toward the optimal set. or when the number
Theorem 3: When T 8 ⊂ E, there is no closed set J other of iterations tends to infinity. Thus, we may conclude that in
than E such that J 8 = ∅.
Proof: Reductio ad absurdum. If we assume there is this case, the probability of not obtaining the globally optimal
a closed set J so that J 8 = ∅ and that f (wa,j ) >
T solution is 0. Hence, the second convergence condition is
f (wa,b ) for ψi = (wa,b , wa,b , . . . , wa,b ) ∈ 8 and ∀ψj = satisfied. As an outcome, the global convergence of GWO
(ζj1 , ζj2 , . . . , ζjn ) ∈ J , this implies that to global optimality is assured. □
The above proof uses a Markov chain framework, sim-
N
Y ilar to the literature [45], [46]. This means that the con-
P(Aψ (ψj ) = ψi ) = P(Aζ (ζj,n ) = ζi,n ), (46) vergence concept is in a probabilistic sense. It shows that
n=1 the GWO can certainly converge. However, the above theo-
For each P(Aζ (ζj ) = ζi ), it holds that P(Aζ (ζj ) = ζi ) == rem provides no information about the convergence rate or
P(xi → xi )P(wa,i → wa,j ). It is P(wa,i → wa,j ) = 1 then how the population size and the number of iterations may
P(Aζ (ζj ) = ζi ) ̸ = 0, implying that J is not closed, which con- have an impact on the GWO convergence behavior. The
tradicts the assumption. Thus, there is no non-empty closed global convergence of WOA may be proven similar to the
set outside 8 in 9. □ above.

VOLUME 11, 2023 30881


S. K. Goudos et al.: Joint QoS Aware Admission Control and Power Allocation in NOMA Downlink Networks

FIGURE 3. Number of users versus percentage of users served for T = 50 and different Pt values.

FIGURE 4. Number of users versus percentage of users served for T = 50 and different Rc values.

FIGURE 5. Number of users versus percentage of users served for different T values.

IV. NUMERICAL RESULTS the Invasive Weed Optimization (IWO) [50], and the Particle
A. BENCHMARK FUNCTIONS Swarm Optimization (PSO) [51]. The numerical benchmark
In this subsection, we evaluate the performance of GWO and functions and their properties are listed in Table 1. In order
WOA in high-dimensional problems using different types of to evaluate the algorithm’s performance in high-dimensional
test functions, both unimodal and multimodal. We compare problems, we run two different sets of tests, one for problem
GWO and WOA on a set of nine numerical benchmark func- dimension D = 100, and one for D = 200. All benchmark
tions. Additionally, we also compare the above-mentioned problems run for 100 independent trials. The maximum num-
algorithms with other popular evolutionary algorithms. These ber of iterations is set to 1000, while the population size is set
are namely the Artificial Bee Colony (ABC) [47], the Differ- to 100 for all algorithms. The unknown variables limits are set
ential Evolution (DE) [48], the Harmony Search (HS) [49], to [−10, 10] for all problems. Table 2 holds the algorithm’s

30882 VOLUME 11, 2023


S. K. Goudos et al.: Joint QoS Aware Admission Control and Power Allocation in NOMA Downlink Networks

FIGURE 7. Convergence rate graph for 1000 runs for a) N=50 users,
b)N=100 users.

FIGURE 6. Boxplot results of all algorithms for 1000 runs for a) N=50
users, b)N=100 users.

a standard deviation equal to 8 dB. The PRB bandwidth


WPRB is selected to be equal to 180 kHz as the bandwidth
comparative results for D = 100. We notice that WOA and in 4G/LTE. We compare the results between the two algo-
GWO obtained the best results in most of the cases. The rithms WOA, and GWO. In order to evaluate if using EAs
corresponding results for D = 200 are presented in Table 3. is worth, we additionally generate random solutions and
Again the results are similar as previously, WOA and GWO compare them with the EA approach. Moreover, we apply
perform better or the same with the other algorithms in most all algorithms to both NOMA and OMA cases. We choose
of the cases. The latter is shown directly using the Friedman a population of parametric vectors and 100 is the maximum
ranking, a non-parametric statistical test [52], [53]. Table 4 number of iterations. The algorithms run for 1000 different
holds the algorithm rankings according to the Friedman test. simulations. We generate a random topology in each simu-
It is clear that the WOA and the GWO emerge as the first and lation run that each algorithm tries to solve. Therefore, we
the second algorithm in ranking. obtain results that are from 1000 different random topologies
We run the simulations with QoS constraints and without
B. NOMA SIMULATIONS any additional constraints. The desired user data ranges from
The numerical results of the simulations and the optimization 100 to 500 kbps, which QoS-aware selected for each user. The
problem solutions are presented in this section. We have used problem dimensions are 2Nu , thus for the maximum number
both GWO and WOA algorithms to solve the QoS-aware of 100 users the total number of unknowns is 200. In all cases,
admission control problem by performing several simula- a user can be served or not only if the required data rate can be
tions. Table 5 lists the values for all simulations. achieved. All values presented in the figures that follow are
We consider the following scenario where the total number mean values and each point corresponds to the mean result of
of users ranges from 10 to 100 with step 5. The BS deploys 1000 random topologies. Fig. 2 illustrates the number of users
and serves the users at random. We assume that the BS versus the percentage of users served for M = 2, T = 50 for
operates having 50 PRBs. Moreover, each PRB supports at all cases. We notice that NOMA schemes become better
the maximum M = 2 NOMA users. when the total number of users is larger than the available
Additionally, we generate users randomly from a uni- PRBs. It is also clear that both algorithms achieve better
form distribution and they are placed in a circle of 700 m performance than the random case. The difference between
radius. We consider shadowing lognormal that a value with the random and the EAs becomes more significant for the

VOLUME 11, 2023 30883


S. K. Goudos et al.: Joint QoS Aware Admission Control and Power Allocation in NOMA Downlink Networks

TABLE 1. Numerical benchmark functions.

TABLE 2. Numerical benchmark functions results for D = 100.

TABLE 3. Numerical benchmark functions results for D=200.

TABLE 4. Average ranking achieved by the friedman test. TABLE 5. Simulation parameters.

cases, the results become worse as the cell radius increases.


However, in the NOMA case, there is only a small drop in the
NOMA case. Additionally, WOA performs, in general, better user percentage served and the lines are almost straight. This
than GWO. means that NOMA schemes perform better regardless of the
Moreover, Figs. 3a-3b show the total number of users ver- cell radius.
sus the percentage of users served for increasing BS transmis- Additionally, we study the effect of increasing PRBs.
sion power for Nu = 50, and Nu = 100. By increasing the BS Figs. 5a-5b present the total number of users versus the
transmission power for Nu = 50 equal to the number of PRBs percentage of users served for increasing PRBs. It is clear that
almost all users can be served. This is quite similar to both by increasing the PRB number the problem becomes easier
OMA and NOMA cases. However, the NOMA advantage is to solve since more slots are available for the users. It is
clearly shown in Nu = 100, where clearly with NOMA about evident that WOA performs better than GWO. In all cases,
90% of the users can be served. the evolutionary algorithms are better than the random case.
Figs. 4a-4b depict the total number of users versus the per- The details of the algorithm’s performance are further
centage of users served for increasing cell radius. In all OMA presented in the boxplots of Figs. 6a-6b. We notice that for

30884 VOLUME 11, 2023


S. K. Goudos et al.: Joint QoS Aware Admission Control and Power Allocation in NOMA Downlink Networks

Nu = 50 the distribution of values seem similar in all cases, [9] S. Goudos, Emerging Evolutionary Algorithms for Antennas and Wireless
while the EAs clearly outperform the random case. The differ- Communications (Electromagnetic Waves. Institution of Engineering and
Technology). London, U.K.: Institution of Engineering and Technology,
ence between the OMA and the NOMA case can be seen more 2021.
clearly in Fig. 6b. Moreover, WOA outperforms the GWO in [10] S. K. Goudos, ‘‘Joint power allocation and user association in non-
terms of median values. However, GWO obtained results with orthogonal multiple access networks: An evolutionary approach,’’ Phys.
Commun., vol. 37, Dec. 2019, Art. no. 100841.
a smaller dispersion of values. [11] S. K. Goudos, P. D. Diamantoulakis, A. D. Boursianis, V. K. Papanikolaou,
Finally, the average convergence speed of the algorithms and G. K. Karagiannidis, ‘‘Joint user association and power allocation
over 1000 runs for two user cases is shown in Figs. 7a-7b. using swarm intelligence algorithms in non-orthogonal multiple access
networks,’’ in Proc. 9th Int. Conf. Mod. Circuits Syst. Technol. (MOCAST),
We notice that in both figures the algorithms converge at a Sep. 2020, pp. 1–4.
similar speed. However, it is apparent that WOA converges at [12] F. Guo, H. Lu, D. Zhu, and Z. Gu, ‘‘Joint user association, grouping and
better objective function values. power allocation in uplink NOMA systems with QoS constraints,’’ in Proc.
IEEE Int. Conf. Commun. (ICC), May 2019, pp. 1–6.
[13] A. Celik, M.-C. Tsai, R. M. Radaydeh, F. S. Al-Qahtani, and M.-S. Alouini,
‘‘Distributed cluster formation and power-bandwidth allocation for imper-
V. CONCLUSION fect NOMA in DL-HetNets,’’ IEEE Trans. Commun., vol. 67, no. 2,
In this paper, we provide the formulation for the QoS aware pp. 1677–1692, Feb. 2019.
admission control and power allocation optimization problem [14] Z. Qin, X. Yue, Y. Liu, Z. Ding, and A. Nallanathan, ‘‘User associa-
tion and resource allocation in unified NOMA enabled heterogeneous
in NOMA downlink networks. We have solved this problem ultra dense networks,’’ IEEE Commun. Mag., vol. 56, no. 6, pp. 86–92,
using emerging swarm intelligence algorithms inspired by Jun. 2018.
nature with low complexity. The results indicate that when [15] K. Wang, Y. Liu, Z. Ding, A. Nallanathan, and M. Peng, ‘‘User association
and power allocation for multi-cell non-orthogonal multiple access net-
the number of users that are trying to connect to the net- works,’’ IEEE Trans. Wireless Commun., vol. 18, no. 11, pp. 5284–5298,
work increases, the problem becomes harder to solve. NOMA Nov. 2019.
schemes outperform the OMA ones especially as the number [16] Y. Fu, M. Zhang, L. Salaün, C. W. Sung, and C. S. Chen, ‘‘Zero-forcing
oriented power minimization for multi-cell MISO-NOMA systems: A joint
of users grows higher. Evolutionary algorithms in general user grouping, beamforming, and power control perspective,’’ IEEE J. Sel.
perform better than randomly generated solutions. We have Areas Commun., vol. 38, no. 8, pp. 1925–1940, Aug. 2020.
provided proof that the GWO algorithm has the potential to [17] Y. Fu, L. Salaün, C. W. Sung, and C. S. Chen, ‘‘Subcarrier and power
allocation for the downlink of multicarrier NOMA systems,’’ IEEE Trans.
converge to a global optimum using Markov chain modeling. Veh. Technol., vol. 67, no. 12, pp. 11833–11847, Dec. 2018.
We have applied two different algorithms, the GWO and [18] S. Banerjee, C. S. Chen, M. Coupechoux, and A. Sinha, ‘‘Joint power
WOA. The results show that for this type of problem, WOA and subcarrier allocation in multi-cell multi-carrier NOMA,’’ 2022,
arXiv:2204.00120.
performs better or is similar to other algorithms. However, [19] C.-B. Le, D.-T. Do, Z. Zaharis, C. Mavromoustakis, G. Mastorakis,
both algorithms can be applied to obtain feasible solutions and E. Markakis, ‘‘System performance analysis in cognitive radio-
quickly. In our future work, we will expand this framework aided NOMA network: An application to vehicle-to-everything commu-
nications,’’ Wireless Pers. Commun., vol. 120, no. 3, pp. 1975–2000,
to other network types where NOMA techniques may play 2021.
an important role e.g. visual light communications (VLC) [20] M.-S. Van Nguyen, D.-T. Do, Z. Zaharis, C. Mavromoustakis,
networks. G. Mastorakis, and E. Pallis, ‘‘Enabling full-duplex in MEC networks
using uplink NOMA in presence of hardware impairments,’’ Wireless
Pers. Commun., vol. 120, no. 3, pp. 1945–1973, 2021.
[21] V. K. Papanikolaou, P. D. Diamantoulakis, Z. Ding, S. Muhaidat, and
REFERENCES
G. K. Karagiannidis, ‘‘Hybrid VLC/RF networks with non-orthogonal
[1] Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, and H. V. Poor, ‘‘Applica- multiple access,’’ in Proc. IEEE Global Commun. Conf. (GLOBECOM),
tion of non-orthogonal multiple access in LTE and 5G networks,’’ IEEE Dec. 2018, pp. 1–6.
Commun. Mag., vol. 55, no. 2, pp. 185–191, Feb. 2015. [22] Q. Li, T. Shang, T. Tang, and F. Zhou, ‘‘QOS-oriented adaptive user
association for NOMA in visible light communications,’’ in Proc. IEEE
[2] S. Khwandah, J. Cosmas, P. Lazaridis, Z. Zaharis, and I. Chochliouros,
20th Int. Conf. Commun. Technol. (ICCT), Oct. 2020, pp. 599–604.
‘‘Massive MIMO systems for 5G communications,’’ Wireless Pers. Com-
mun., vol. 120, no. 3, pp. 2101–2115, 2021. [23] H. Zhang, H. Zhang, K. Long, and G. K. Karagiannidis, ‘‘Deep learning
based radio resource management in NOMA networks: User association,
[3] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, ‘‘On the performance of non-
subchannel and power allocation,’’ IEEE Trans. Netw. Sci. Eng., vol. 7,
orthogonal multiple access in 5G systems with randomly deployed users,’’
no. 4, pp. 2406–2415, Oct. 2020.
IEEE Signal Process. Lett., vol. 21, no. 12, pp. 1501–1505, Dec. 2014.
[24] H. V. Nguyen, V. Nguyen, O. A. Dobre, D. N. Nguyen, E. Dutkiewicz,
[4] Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and and O. Shin, ‘‘Joint power control and user association for NOMA-
K. Higuchi, ‘‘Non-orthogonal multiple access (NOMA) for cellular future based full-duplex systems,’’ IEEE Trans. Commun. Mag., vol. 67, no. 11,
radio access,’’ in Proc. IEEE 77th Veh. Technol. Conf., Jun. 2013, pp. 1–13. pp. 8037–8055, Aug. 2019.
[5] E. Iradier, J. Montalban, L. Fanari, P. Angueira, L. Zhang, Y. Wu, and [25] L. Qi, M. Peng, Y. Liu, and S. Yan, ‘‘Advanced user association in non-
W. Li, ‘‘Using NOMA for enabling broadcast/unicast convergence in 5G orthogonal multiple access-based fog radio access networks,’’ IEEE Trans.
networks,’’ IEEE Trans. Broadcast., vol. 66, no. 2, pp. 503–514, Jun. 2020. Commun., vol. 67, no. 12, pp. 8408–8421, Dec. 2019.
[6] J. Li, X. Li, A. Wang, and N. Ye, ‘‘Beamspace MIMO-NOMA for [26] X. Wang, Y. Xu, J. Wang, and S. Fu, ‘‘Joint user association and power
millimeter-wave broadcasting via full-duplex D2D communications,’’ allocation in heterogeneous NOMA networks with imperfect CSI,’’ IEEE
IEEE Trans. Broadcast., vol. 66, no. 2, pp. 545–554, Jun. 2020. Access, vol. 8, pp. 47607–47618, 2020.
[7] E. Iradier, A. Abuin, R. Cabrera, I. Bilbao, J. Montalban, P. Angueira, [27] M. Eliodorou, C. Psomas, I. Krikidis, and S. Socratous, ‘‘User associ-
S. Kwon, N. Hur, and S.-I. Park, ‘‘Advanced NOMA-based RRM schemes ation coalition games with zero-forcing beamforming and NOMA,’’ in
for broadcasting in 5G mmWave frequency bands,’’ IEEE Trans. Broad- Proc. IEEE 20th Int. Workshop Signal Process. Adv. Wireless Commun.
cast., vol. 68, no. 1, pp. 143–155, Mar. 2022. (SPAWC), Jul. 2019, pp. 1–5.
[8] K. Wang, Y. Liu, A. Nallanathan, and Z. Ding, ‘‘User association in non- [28] C. Xu, G. Zheng, and L. Tang, ‘‘Energy-aware user association for noma-
orthogonal multiple access networks,’’ in Proc. IEEE ICC, May 2018, based mobile edge computing using matching-coalition game,’’ IEEE
pp. 1–6. Access, vol. 8, pp. 61943–61955, 2020.

VOLUME 11, 2023 30885


S. K. Goudos et al.: Joint QoS Aware Admission Control and Power Allocation in NOMA Downlink Networks

[29] V. Grout, M. Akinsolu, B. Liu, P. Lazaridis, K. Mistry, and Z. Zaharis, [51] J. Kennedy and R. Eberhart, ‘‘Particle swarm optimization,’’ in Proc. IEEE
‘‘Software solutions for antenna design exploration: A comparison of Int. Conf. Neural Netw., Piscataway, NJ, USA, Nov. 1995, pp. 1942–1948.
packages, tools, techniques, and algorithms for various design challenges,’’ [52] J. Derrac, S. García, D. Molina, and F. Herrera, ‘‘A practical tutorial on
IEEE Antennas Propag. Mag., vol. 61, no. 3, pp. 48–59, Apr. 2019. the use of nonparametric statistical tests as a methodology for comparing
[30] Z. Zaharis, D. Kampitaki, P. Lazaridis, A. Papastergiou, A. Hatzigaidas, evolutionary and swarm intelligence algorithms,’’ Swarm Evol. Comput.,
and P. Gallion, ‘‘Improving the radiation characteristics of a base station vol. 1, no. 1, pp. 3–18, Mar. 2011.
antenna array using a particle swarm optimizer,’’ Microw. Opt. Technol. [53] S. García, D. Molina, M. Lozano, and F. Herrera, ‘‘A study on the
Lett., vol. 49, no. 7, pp. 1690–1698, 2007. use of non-parametric tests for analyzing the evolutionary algorithms’
[31] Z. D. Zaharis, I. P. Gravas, P. I. Lazaridis, I. A. Glover, C. S. Antonopoulos, behaviour: A case study on the CEC’2005 special session on real param-
and T. D. Xenos, ‘‘Optimal LTE-protected LPDA design for DVB- eter optimization,’’ J. Heuristics, vol. 15, no. 6, pp. 617–644, 2008, doi:
T reception using particle swarm optimization with velocity muta- 10.1007/S10732-008-9080-4.
tion,’’ IEEE Trans. Antennas Propag., vol. 66, no. 8, pp. 3926–3935,
Aug. 2018.
[32] I. Gravas, Z. Zaharis, T. Yioultsis, P. Lazaridis, and T. Xenos, ‘‘Adaptive
beamforming with sidelobe suppression by placing extra radiation pattern
nulls,’’ IEEE Trans. Antennas Propag., vol. 67, no. 6, pp. 3853–3862,
Jun. 2019.
[33] J. Zhang, S. Chen, X. Mu, and L. Hanzo, ‘‘Evolutionary-algorithm-assisted
joint channel estimation and turbo multiuser detection/decoding for
OFDM/SDMA,’’ IEEE Trans. Veh. Technol., vol. 63, no. 3, pp. 1204–1222,
Mar. 2014.
[34] W. Zhang and W. Zhang, ‘‘An efficient UAV localization technique based SOTIRIOS K. GOUDOS (Senior Member, IEEE)
on particle swarm optimization,’’ IEEE Trans. Veh. Technol., vol. 71, no. 9,
received the B.Sc. degree in physics, the M.Sc.
pp. 9544–9557, Sep. 2022.
degree in electronics, and the Ph.D. degree in
[35] T. Zhou, D. Qin, X. Nie, X. Li, and C. Li, ‘‘Energy-efficient compu-
tation offloading and resource management in ultradense heterogeneous
physics from the Aristotle University of Thes-
networks,’’ IEEE Trans. Veh. Technol., vol. 70, no. 12, pp. 13101–13114, saloniki (AUTH), in 1991, 1994, and 2001,
Dec. 2021. respectively, the master’s degree in informa-
[36] H. Ghazzai, E. Yaacoub, M.-S. Alouini, Z. Dawy, and A. Abu-Dayya, tion systems from the University of Macedonia,
‘‘Optimized LTE cell planning with varying spatial and temporal user Greece, in 2005, and the Diploma degree in elec-
densities,’’ IEEE Trans. Veh. Technol., vol. 65, no. 3, pp. 1575–1589, trical and computer engineering from the AUTH,
Mar. 2016. in 2011. He joined the Department of Physics,
[37] L. Xu, X. Yu, and T. A. Gulliver, ‘‘Intelligent outage probability prediction AUTH, in 2013, where he is currently an Associate Professor. He is also
for mobile IoT networks based on an IGWO-Elman neural network,’’ IEEE the Director of the ELEDIA@AUTH Laboratory Member of the ELEDIA
Trans. Veh. Technol., vol. 70, no. 2, pp. 1365–1375, Feb. 2021. Research Center Network. He is the author of the book titled Emerging
[38] S. Mirjalili and A. Lewis, ‘‘The whale optimization algorithm,’’ Adv. Eng. Evolutionary Algorithms for Antennas and Wireless Communications (Insti-
Softw., vol. 95, pp. 51–67, Feb. 2016. tution of Engineering and Technology, 2021). His research interests include
[39] S. Mirjalili, S. M. Mirjalili, and A. Lewis, ‘‘Grey wolf optimizer,’’ Adv. antenna and microwave structure design, evolutionary algorithms, wireless
Eng. Softw., vol. 69, pp. 46–61, Mar. 2014. communications, and semantic web technologies. He is currently serving as
[40] Further Advancements for E-Utra Physical Layer Aspects,
an IEEE Greece Section Secretary. He is the Founding Editor-in-Chief of
document TR 36.814, 3GPP, Mar. 2010.
the Telecom open-access journal (MDPI publishing). He is also serving as
[41] F. J. Solis and R. J.-B. Wets, ‘‘Minimization by random search techniques,’’
Math. Oper. Res., vol. 6, no. 1, pp. 19–30, Feb. 1981. an Associate Editor for IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION,
[42] M. Jiang, Y. P. Luo, and S. Y. Yang, ‘‘Stochastic convergence analysis IEEE ACCESS, and IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY.
and parameter selection of the standard particle swarm optimization algo-
rithm,’’ Inf. Process. Lett., vol. 102, no. 1, pp. 8–16, Apr. 2007.
[43] S. Chen, G.-H. Peng, X.-S. He, and X.-S. Yang, ‘‘Global conver-
gence analysis of the bat algorithm using a Markovian framework and
dynamical system theory,’’ Expert Syst. Appl., vol. 114, pp. 173–182,
Jan. 2018.
[44] F. Pan, Q. Zhou, W.-X. Li, and Q. Gao, ‘‘Analysis of standard particle
swarm optimization algorithm based on Markov chain,’’ Acta Autom.
Sinica, vol. 39, no. 4, pp. 381–389, 2013.
[45] X. He, X.-S. Yang, M. Karamanoglu, and Y. Zhao, ‘‘Global conver-
gence analysis of the flower pollination algorithm: A discrete-time PANAGIOTIS D. DIAMANTOULAKIS (Senior
Markov chain approach,’’ Proc. Comput. Sci., vol. 108, pp. 1354–1363, Member, IEEE) received the Diploma (five years)
Jan. 2017. and Ph.D. degrees from the Department of Elec-
[46] J. He, Z. Tang, Z. Tang, H. Chen, and C. Ling, ‘‘Design and optimization of trical and Computer Engineering (ECE), Aristo-
scheduling and non-orthogonal multiple access algorithms with imperfect tle University of Thessaloniki (AUTH), Greece,
channel state information,’’ IEEE Trans. Veh. Technol., vol. 67, no. 11, in 2012 and 2017, respectively. Since 2017,
pp. 10800–10814, Nov. 2018. he has been a Postdoctoral Fellow with the Wire-
[47] D. Karaboga and B. Basturk, ‘‘A powerful and efficient algorithm for less Communications and Information Processing
numerical function optimization: Artificial bee colony (ABC) algorithm,’’ (WCIP) Group, AUTH. Since 2021, he has been
J. Glob. Optim., vol. 39, no. 3, pp. 459–471, 2007. a Postdoctoral Fellow with the ITHACA Labo-
[48] R. Storn and K. Price, ‘‘Differential evolution—A simple and efficient
ratory, Department of ECE, University of Western Macedonia, Kozani,
heuristic for global optimization over continuous spaces,’’ J. Global
Greece. Since 2021, he has also been a Visiting Assistant Professor with
Optim., vol. 11, no. 4, pp. 341–359, 1997.
the Key Laboratory of Information Coding and Transmission, Southwest
[49] Z. W. Geem, J. H. Kim, and G. V. Loganathan, ‘‘A new heuristic opti-
mization algorithm: Harmony search,’’ J. Simul., vol. 76, no. 2, pp. 60–68, Jiaotong University (SWJTU), China. His research interests include opti-
Feb. 2001. mization theory and applications in wireless networks and smart grids,
[50] A. R. Mehrabian and C. Lucas, ‘‘A novel numerical optimization algorithm game theory, and optical wireless communications. He serves as an Editor
inspired from weed colonization,’’ Ecol. Inform., vol. 1, no. 4, pp. 355–366, for IEEE WIRELESS COMMUNICATIONS LETTERS, IEEE OPEN JOURNAL OF THE
Dec. 2006. [Online]. Available: https://www.sciencedirect.com/science/ COMMUNICATIONS SOCIETY, Physical Communication (Elsevier), and Frontiers
article/pii/S1574954106000665 in Communications and Networks.

30886 VOLUME 11, 2023


S. K. Goudos et al.: Joint QoS Aware Admission Control and Power Allocation in NOMA Downlink Networks

ACHILLES D. BOURSIANIS (Member, IEEE) MOHAMMAD ABDUL MATIN (Senior Member,


received the B.Sc. degree in physics, the M.Sc. IEEE) received the B.Sc. degree in electrical and
degree in electronic physics (radioelectrology) electronic engineering from BUET, Bangladesh,
in the area of electronics telecommunications the M.Sc. degree in digital communication from
technology, and the Ph.D. degree in telecommuni- Loughborough University, U.K., and the Ph.D.
cations from the School of Physics, Aristotle Uni- degree in wireless communication from Newcastle
versity of Thessaloniki (AUTH), in 2001, 2005, University, U.K. He has been a Professor with the
and 2017, respectively. Since 2019, he has been Department of Electrical and Computer Engineer-
serving as a Postdoctoral Researcher and an Aca- ing, North South University (NSU), since 2008.
demic Fellow with the School of Physics, AUTH. He was first appointed as an assistant professor,
He is a member of the ELEDIA@AUTH Research Group. He has authored then promoted to Associate Professor, in 2011, and later to Professor with
or coauthored more than 40 papers in international peer-reviewed journals NSU. While in that position, he was the Coordinator of the EEE Pro-
and conferences. His research interests include wireless sensor networks, gram. From 2012 to 2017, he was an Associate Professor with Univer-
the Internet of Things, antenna design and optimization, 5G communica- siti Teknologi Brunei (UTB), Brunei Darussalam. He has been a Visiting
tion networks, radio frequency energy harvesting, and artificial intelligence. Academic Staff with the National University of Malaysia (UKM) and the
He serves as a reviewer for several international journals and conferences and University of Malaya (UM). He has published over 120 peer-reviewed
as a member of the technical program committees of various international journals and conference papers. He is the author/editor of 17 academic books
conferences, which were technically sponsored by IEEE. He is a member and 21 book chapters. He serves as a member for the Editorial Board for
of the editorial board of Telecom. He is also a member of the Hellenic several international journals, including IEEE Communications Magazine
Physical Society and the Scientific Committee of the National Association and IET Wireless Sensor Systems. He has received a number of prizes and
of Fédération des Ingénieurs des Télécommunications de la Communauté scholarships including the Best Student Prize (Loughborough University),
Européenne. Commonwealth Scholarship, and Overseas Research Scholarship (ORS)
conferred by the Committee of Vice Chancellors and Principals (CVCP) in
PANAGIOTIS SARIGIANNIDIS (Member, IEEE) the U.K.
received the B.Sc. and Ph.D. degrees in computer
science from the Aristotle University of Thessa- SHAOHUA WAN (Senior Member, IEEE)
loniki, Thessaloniki, Greece, in 2001 and 2007, received the Ph.D. degree from the School of
respectively. He has published over 200 papers Computer, Wuhan University, in 2010. He is cur-
in international journals and conferences and rently a Professor with the Shenzhen Institute for
book chapters, including IEEE COMMUNICATIONS Advanced Study, University of Electronic Science
SURVEYS AND TUTORIALS, IEEE TRANSACTIONS and Technology of China. From 2016 to 2017,
ON COMMUNICATIONS, IEEE INTERNET OF THINGS he was a Visiting Professor with the Department
JOURNAL, IEEE TRANSACTIONS ON BROADCASTING, of Electrical and Computer Engineering, Tech-
IEEE SYSTEMS JOURNAL, IEEE Wireless Communications Magazine, IEEE nical University of Munich, Germany. He is the
OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, IEEE/OSA JOURNAL OF author of over 150 peer-reviewed research arti-
LIGHTWAVE TECHNOLOGY, IEEE ACCESS, and Computer Networks. He has been cles and books, including over 40 IEEE/ACM TRANSACTIONS articles such
involved in several national, European, and international projects. He is as IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, IEEE TRANSACTIONS ON
currently the Project Coordinator of three H2020 projects, namely a) H2020- INTELLIGENT TRANSPORTATION SYSTEMS, ACM TOIT, IEEE TRANSACTIONS ON
DS-SC7-2017 (DS-07-2017), SPEAR: Secure and PrivatE smArt gRid, b) NETWORK SCIENCE AND ENGINEERING, IEEE TRANSACTIONS ON MULTIMEDIA,
H2020-LC-SC3-EE-2020-1 (LC-SC3-EC-4-2020), EVIDENT: bEhaVioral IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, ACM TOMM, IEEE
Insights anD Effective eNergy policy acTions, and c) H2020-ICT-2020- TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, and PR,
1 (ICT-56-2020), TERMINET: nexT gEneRation sMart INterconnectEd and many top conference papers in the fields of edge intelligence. His main
ioT, while he coordinates the Operational Program MARS: sMart fArming research interest includes deep learning for the Internet of Things.
with dRoneS (Competitiveness, Entrepreneurship, and Innovation), and the
Erasmus+ KA2 ARRANGE-ICT: SmartROOT: Smart faRming innOvatiOn
Training. He serves as a Principal Investigator of the H2020-SU-DS-2018 GEORGE K. KARAGIANNIDIS (Fellow, IEEE) is
(SU-DS04-2018), SDN-microSENSE: SDN-microgrid reSilient Electrical currently a Professor of the Electrical and Com-
eNergy SystEm and in three Erasmus+ KA2: a) ARRANGE-ICT: pArt- puter Engineering Department, Aristotle Univer-
neRship foR AddressiNG mEgatrends in ICT, b) JAUNTY: Joint undergAd- sity of Thessaloniki, Greece, and the Head of the
uate coUrses for smart eNergy managemenT sYstems, and c) STRONG: Wireless Communications and Information Pro-
advanced firST RespONders traininG (Cooperation for Innovation and the cessing (WCIP) Group. He is also a Faculty Fellow
Exchange of Good Practices). His research interests include telecommunica- with the Cyber Security Systems and Applied AI
tion networks, the Internet of Things, and network security. He participates Research Center, Lebanese American University.
in the editorial boards of various journals, including International Journal His research interests include the areas of wire-
of Communication Systems and EURASIP Journal on Wireless Communica- less communications systems and networks, sig-
tions and Networking. nal processing, optical wireless communications, wireless power transfer
and applications, and communications and signal processing for biomed-
KONSTANTINOS E. PSANNIS (Member, IEEE) ical engineering. He is currently a Steering Committee Member of IEEE
is currently an Associate Professor of communica- TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING. Recently,
tions systems and networking with the Department he received three prestigious awards: The 2021 IEEE ComSoc RCC Tech-
of Applied Informatics, University of Macedonia, nical Recognition Award, the 2018 IEEE ComSoc SPCE Technical Recog-
Greece; the Director of the Mobility2net Research nition Award, and the Humboldt Research Award from Alexander von
and Development and Consulting JP-EU Labora- Humboldt Foundation. He is one of the highly cited authors across all areas
tory; and a member of the EU–JAPAN Centre for of electrical engineering, recognized by Clarivate Analytics as a Web-of-
Industrial Cooperation. He is the TPC Co-Chair of Science Highly Cited Researcher consecutively for eight years (2015–2022).
ICCCI 2021, Japan, and the Conference Chair of He was an editor in several IEEE journals. From 2012 to 2015, he was the
WSCE 2021, Greece. He has also been included Editor-in-Chief of IEEE COMMUNICATIONS LETTERS. From September 2018 to
in the list of top 2% influential researchers globally (prepared by Scientists June 2022, he served as an Associate Editor-in-Chief of IEEE OPEN JOURNAL
from Stanford University), in October 2020 and October 2021. He is serving OF THE COMMUNICATIONS SOCIETY.
as an Associate Editor for IEEE ACCESS and IEEE COMMUNICATIONS LETTERS.

VOLUME 11, 2023 30887

You might also like