Professional Documents
Culture Documents
Energy-Efficient Power Allocation For Millimeter
Energy-Efficient Power Allocation For Millimeter
ABSTRACT Massive multi-input multi-output (MIMO) is envisioned as a key technology for the emerging
fifth generation of communication networks (5G). However, considering the energy consumption of the large
number of radio frequency (RF) chains, massive MIMO poses a problem to energy efficiency (EE) require-
ment of 5G. In this paper, we propose an energy-efficient power allocation method for millimeter-wave
(mmWave) beamspace MIMO non-orthogonal multiple access (NOMA) systems, where there may be
multiple users in each selected beam. First, according to the beam selection (BS) results, we get the
precoding matrix through zero-forcing (ZF) beamforming method. Second, we formulate the energy effi-
ciency (EE) maximization optimization problem as a fractional programming. Through sequential convex
approximation (SCA) and second-order cone (SOC) transformation, the original optimization problem can
be transformed to a convex optimization problem. By using iterative optimization algorithm, we can get the
power allocation results. Then, we analyze the convergence of our proposed iterative optimization method
and get that the solution in each iteration is a suboptimal solution to the original non-convex optimization
problem. Simulation results show that the proposed energy-efficient power allocation scheme has better
EE performance comparing with the conventional methods when the transmitted power exceeds the power
threshold.
INDEX TERMS Beamspace, NOMA, energy efficiency, power allocation, convex optimization.
114582 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see http://creativecommons.org/licenses/by/4.0/ VOLUME 7, 2019
P. Liu et al.: Energy-Efficient Power Allocation for mmWave Beamspace MIMO-NOMA Systems
an EE-optimal power allocation strategy was proposed. under conventional OMA schemes. Especially, with pre-
For considering the constraints on minimum user qual- condition of satisfying the users’ quality of service (QoS),
ity of service and the maximum transmitted power con- it makes no sense to purse SRMax blindly.
straint, energy-efficient dynamic power allocation in NOMA In this paper, we study on the energy-efficient power
networks is explored by using the Lyapunov optimiza- allocation method for mmWave beamspace MIMO-NOMA
tion method [18]. Different from energy-efficient power systems. The contributions of this paper can be summarized
allocation for MIMO-NOMA with multiple users in a as follows:
cluster [19], Haitham et al. investigated the design of an • Based on the BS method for mmWave beamspace
energy-efficient beamforming technique for downlink trans- MIMO-NOMA [26] and ZF beamforming technique,
mission in the context of a multiuser multi-input single-output we formulate the energy-efficient power allocation prob-
(MISO) NOMA system [20]. Based on sequential convex lem as a non-convex fractional programming, which
approximation (SCA) and Dinkelbach’s method, the origi- considers the constraints of all users, i.e., minimum rate
nal non-convex fractional programming optimization prob- constraints, successive interference cancellation (SIC)
lem was reformulated, respectively. Two novel algorithms constraints and maximum power budget. Especially,
were proposed for solving the downlink beamforming prob- complex SIC constraints were ignored in [26].
lem for the multiuser MISO-NOMA system. Different from • The original optimization problem is a fractional pro-
the single-cell EE analyses, [21]–[23] examined the problem gramming problem. Through SCA and SOC trans-
of energy-efficient user scheduling and power allocation in formation, the EEMax optimization problem can be
NOMA heterogeneous networks (HetNets). reformulated as a convex second-order cone program-
In order to further improve the EE, based on beam selec- ming (SOCP), which is tractable. We choose iterative
tion (BS) method [28], the power consumption of large-scale optimization algorithm to solve the reformulated prob-
antenna array can be reduced by introducing discrete lens lem, so get the power allocation results. Then, we ana-
array (DLA) [24], where the SE performance degeneration lyze the convergence of the proposed algorithm.
is slight comparing with the conventional antenna selec- • We verify our proposed energy-efficient power allo-
tion strategies. By classifying all users into two groups, cation method. The simulation results show that the
i.e., the interference-users (IUs) and noninterference-users proposed iterative optimization method can converge
(NIUs), [25] proposed an interference-aware beam selection quickly. Comparing with the conventional power allo-
(IA-BS) method with keeping only one user in one beam. cation methods, the developed method has higher
In the conventional beamspace MIMO, the number of sup- EE when the power budget exceeds the power
ported users cannot be larger than the number of RF chains. threshold.
Based on NOMA, combing with DLA, Wang et al. proposed The rest of this paper is organized as follows. In Section II,
a spectrum and energy-efficient beamspace MIMO-NOMA we construct the model for the mmWave beamspace
for mm-Wave communications [26]. To maximize the achiev- MIMO-NOMA systems and formulate the energy-efficient
able SR, a dynamic power allocation was proposed by solv- power allocation problem. In order to get the power allocation
ing the joint power optimization problem, which included results, we introduce a series of mathematical transforma-
the intra-beam and inter-beam power allocation. Based on tions to reformulate the original optimization problem in
the Sherman-Morrison-Woodbury formula and iterative opti- Section III. In Section IV, the convergence and computational
mization method [27], the dynamic power allocation problem complexity analysis is performed. We verify our proposed
was solved for mmWave massive MIMO-NOMA with simul- power allocation method in Section V. Finally, our conclu-
taneous wireless information and power transfer. We point sions are presented in Section VI.
out that the main difference between BS MIMO-NOMA The following notations are used in this paper. The bold
method [26] and IA-BS method [25] is the number of users lower-case and upper-case letters denote vectors and metri-
in each selected beam. The former method allows multiple ces, respectively. (·)T , (·)H , (·)−1 , (·)† represent the trans-
users in each selected beam; the latter just guarantees that pose, Hermitian transpose, inverse, Moore-Penrose matrix
there is only one user in each selected beam. Especially, it’s inversion of matrix, respectively. E {·} denotes the expecta-
more likely that there are multiple users corresponding to one tion. B denotes the selected beams set and |B| denotes the
selected beam in the user dense scenarios. number of selected beams. |Ki | and Ki denote the number of
According to the above references, we can find that served users and served users set in the i-th selected beam,
some papers have discussed the EE performance of respectively. k · k2 and | · | denote the 2-norm of a vector and
mmWave MIMO-NOMA communication systems. Without absolute value of a complex number, respectively. I denotes
DLA, reference [20] discussed energy-efficient beamforming the identity matrix.
design for MISO-NOMA systems. Reference [26] consid-
ered the EE of mmWave beamspace MIMO-NOMA. How- II. SYSTEM MODEL AND PROBLEM FORMULATION
ever, the power allocation method was designed with SEMax In this section, we introduce the mmWave beamspace
as metric. Without NOMA and DLA, [29] considered the MIMO-NOMA model [26]. Then, we formulate the energy-
joint beamforming and antenna selection (JBAS) problem efficient power allocation optimization problem.
A. SYSTEM MODEL H̃ denotes the beamspace CSI matrix, which can be repre-
We consider a single-cell downlink mmWave communication sented as
system, where the base station has N antennas and NRF RF h i
chains and serves K users. In the conventional MIMO system, H̃ = h̃1 , h̃2 , · · · , h̃K = [Uh1 , Uh2 , · · · , UhK ] . (5)
each antenna corresponds to one RF chain, which means
N = NRF . The K ×1 received signal vector y can be described In (5), h̃i is the beamspace CSI vector for the i-th user.
as
B. PROBLEM FORMULATION
y = H H WPs + n, (1) In the conventional BS system, there is only one user in
one beam. In this part, we focus on cluster based beamspace
where n is a K × 1 additive white Gaussian noise (AWGN) MIMO-NOMA, which means that more than one user can be
vector, which follows the distribution CN 0, σ 2 I K ; s =
simultaneously served in one beam through NOMA. Accord-
[s1 , s2 , · · · , sK ]T denotes the K × 1 transmitted signal of ing to [26], we select |B| beams to serve K users and |B| ≤ K .
K users and E |si |2 = 1, i = 1, · · · , K ; the K × K
The selected beams set and corresponding user set can be
diagonal matrix represents the transmitted power matrix P = 1
represented as B and K = {1, 2, · · · , K }, respectively. With
√ {p},
diag where p can be expressed as a column vector p =
√ √ T the beam selection results, we suppose that the i-th (i ≤ |B|)
p1 , p2 , · · · , pK and pi , i = 1, · · · , K denotes the
selected beam serves |Ki | users, where |Ki | and Ki denote
power allocation for the i-th user; W = w1 w2 · · · wK
the number of served users and servedPusers set in the i-th
denotes the N × K precoding matrix, where wi , i = 1, · · · , K |B |
selected beam, respectively. |Ki | meets i=1 |Ki | = K . With
is the N × 1 precoding vector for the i-th user; the N × K
the beamspace channel vector of the first user (strong user)
channel state information (CSI) matrix is given by H =
in each beam as the equivalent channel vector, the |B| × |B|
[h1 , h2 , · · · , hK ], where hi , i = 1, · · · , K is the N × 1 CSI
vector.
equivalent
h channel i matrix Ĥ can be represented as Ĥ =
ĥ1 , ĥ2 , · · · , ĥ|B| , where ĥi , i ∈ {1, 2, · · · , |B|} denotes the
According to the mmWave propagation characteristics [11],
the mmWave CSI vector from the BS to the k-th user can be equivalent channel vector of i-th selected beam. Through ZF
expressed as follows [26]: beamforming technique, we can get the |B| × |B| precoding
matrix Ŵ as
X L
Ŵ = ŵ1 , ŵ2 , · · · , ŵ|B|
hk = ρk0 a θk0 + ρkl a θkl , (2)
l=1 H †
= Ĥ
where ρk0 a θk0 is the line
of sight (LoS) component of hk , H −1
in which ρk0 and a θk0 represent the LoS complex gain = Ĥ Ĥ Ĥ , (6)
and spatial direction information, respectively; ρkl a θkl , i =
1, · · · , L is the non-line of sight (NLoS) component and L where ŵi , i ∈ {1, 2, · · · , K } denotes the precoding vector
total number of NLoS components, in which ρk
denotes the l for i-th selected beam, and all the precoding vectors should
and a θkl represent the complex gain and spatial direction be normalized. For convenience, we use hi,j to denote the
information for NLoS, respectively. For the uniform linear beamspace CSI of j-th user in the i-th selected beam and use
array (ULA), the array steering vector can be represented wi instead of ŵi as the normalized precoding vector. The users
as are indexed as the descending order of equivalent channel
gains as
1 h −j2πθ m i
a (θ) = √ e ,
H 2 H 2
2
N i,|Ki | .
hi,1 wi ≥ hi,2 wi ≥ · · · ≥ hH w (7)
i
m ∈ q − (N − 1) 2, q = 0, 1, · · · , N − 1 . (3)
The DLA acts as an N × N spatial discrete fourier transform According to the right side of (8), the first part denotes the
matrix U. According to (3), the matrix U can be repre- desired signal; the second part is the intra-beam interference,
sented as U = [a (θ1 ) , a (θ2 ) , · · · , a (θN )], where θi , i ∈ the third part denotes the inter-beam interference, and the last
{1, 2, · · · , N } are defined uniformly ranging from −1 to 1. part is the noise. The received signal to interference and noise
ratio (SINR) for the l-th user to decode the j-th user in the i-th As we know, the optimization problem OP1 is a
selected beam can be formulated as non-convex fractional programming, which is intractable.
H 2 In order to transform the original problem to a tractable one,
h wi pi,j
l
ri,j =
i,l
. (9) in next section, we will reformulate the above optimization
H 2 j−1 |Km | problem by using a series of mathematical transformations,
h wi P pi,n + P hH wm 2 P pm,n + σ 2
i,l
m6=i
i,l i.e., SCA, SOC transformation, relaxation and iterative opti-
n=1 n=1
mization algorithm.
Then, the achievable rate of user j in the i-th beam can be
represented as III. SOLVING THE ENERGY-EFFICIENT POWER
n
j j−1
o ALLOCATION PROBLEM
Ri,j = log2 1 + min ri,j , ri,j · · · , ri,j
1
. (10) Different from the Dinkelbach’s method [29], [30], we deal
with the objective function by using a slack variable, so the
In this paper, we suppose the bandwidth is a unit bandwidth,
objective function is transformed into a linear objective
which means SR is equivalent to SE and all K users share the
function. For the non-linear constraints, we deal with them
same spectral resource elements.
through SCA [30], [32] and SOCP [32], [34]. By solving
For formulating the EE maximization optimization,
SPMin problem [31], we get the power allocation results.
we should firstly analyze the total power consumption of the
Then, by using the above results from SPMin as an initial
modeled beamspace MIMO-NOMA communication system.
iteration point, we solve the energy-efficient power allocation
The total power consumption can be denoted as
problem through iterative optimization method.
1 According to references [20] and [29], by introducing two
Ptot = Ptr + Pext , (11)
slack variables α and β, which denotes squared energy effi-
in which Ptr is the transmitted power defined as Ptr = ciency and squared power consumption, respectively. The
|B| |P
Ki | original problem OP1 can be equivalently reformulated as
pi,j ; 0 < < 1 is the energy efficiency of
P
follows:
i=1 j=1
power amplifier; Pext denotes the power consumption of OP2 : max α (13a)
circuits [26], which is given by Pext = NRF PRF + NRF PSW + {pi,j }
PBB ; PRF ,PSW and PBB denote the power consumption of |B | X
X |Ki |
αβ,
p
each RF chain, switching and baseband, respectively. s.t. Ri,j ≥ (13b)
According to the above definitions, the EEMax optimiza- i=1 j=1
tion problem can be formulated as follows:
β,
p
Ptot ≤ (13c)
|B| |P
P Ki | (12b) (12c) (12d) . (13d)
Ri,j
i=1 j=1 √
OP1 : max EE = (12a) In OP2, maximizing α is equal to maximizing α.
{pi,j } Ptot As we know, the constraint (13b) is non-convex. According
i,j ,
Rmin ∀i ≤ |B| , j ≤ |Ki | ,
s.t. Ri,j ≥ (12b) to (10), (13b) can be rewritten as
pi,j ≥ 0, ∀i ≤ |B| , j ≤ |Ki | , (12c) |B | X
|Ki | n o p
j j−1
X
|B | X
X |Ki | log2 1 + min ri,j , ri,j · · · , ri,j
1
≥ αβ. (14)
pi,j ≤ Pbud . (12d) i=1 j=1
i=1 j=1
For dealing with the non-convexity of (14), by introducing
In the problem OP1, (12a) denotes the EE of the system, new slack variables δi,j and ηi,j , we define two new constraints
the numerator of (12a) is the SR, the denominator is the total for the j-th user in the i-th selected beam as follows:
power consumption as (11); (12b) means that each user’s n o
j j−1
achievable rate should meet the minimum rate requirement 1 log2 1 + min ri,j , ri,j · · · , ri,j
1
≥ δi,j , (15)
Rmin
i,j ; (12c) insures that the optimal power allocation factors
n
j j−1
o
are nonnegative; (12d) guarantees the maximum transmitted 1 + min ri,j , ri,j · · · , ri,j
1
≥ ηi,j . (16)
power should not exceed the power budget Pbud .
Based on (15), the constraint (14) can be rewritten as
1 Under the assumption of a given SIC decoding order, the constraint (12b)
|B| X
|Ki |
guarantees SIC performed successfully. In this paper, the SIC decoding order X
δi,j ≥ αβ.
p
is the ascending order of equivalent channel gains. Alavi et al. [31] and (17)
Cui et al. [35] also considered about the SIC constraints, where both of i=1 j=1
them pointed out that the inter-cluster/inter-beam interference also affects
the SIC decoding process significantly. While Wang et al. [26] simplified The new constraint (17) is still non-convex. By using
the constraints. Especially, Wei et al. [36] discussed the relationship among
√ expansion around the point α , β ,
t t
SR, SIC decoding order and target data rate, which in this paper we don’t first-order Taylor series
discuss them in detail. we can approximate αβ from the upper bound, which can
j−1 Km |
2 |X
be written as H 2 X
X
hi,l wi pi,n + H
hi,l wm pm,n + σ 2 ≤ ϑi,j .
s
βt αt
r
p 1 1 n=1 m6=i n=1
αβ ≤ α t β t + α−α t + β −β t .
p
(18)
2 αt 2 βt (22b)
With (18), the non-convex constraint (17) can be transformed The constraint (22a) is a quadratic non-convex constraint.
into With
first-order
Taylor series expansion around the point
|B| X
|Ki |
s ηi,l , ϑi,l , (22a) can be rewritten as
t t
1 βt 1 αt
r
X p
δi,j ≥ α β + α−α + t
β −β t .
t t
2 α 2 β H 2
t t
i=1 j=1 hi,l wi pi,j ≥ ηi.j
t
− 1 ϑi,j
t
+ ϑi,j
t
ηi,j − ηi.j
t
(19)
+ ηi.jt
− 1 ϑi,j − ϑi,j t
. (23)
Based on (16), we can rewrite the constraint (15) as
The constraint (22b) is a linear convex constraint about vari-
δi,j
ηi,j ≥ 2 . (20) ables pi,j and ϑi,j .
We can certify that the right-hand expression of (13c) is a
The Hessian Matrix
δ of 2the right-hand expression can be concave function, so the constraint (13c) is convex. By intro-
2 i,j (ln 2) 0 ducing auxiliary variable β̃, we can transform the original
represented as , which means 2δi,j is a convex
0 0 constraint (13c) into new constraints as follows:
function.
β ≥ β̃,
p
Without considering about the other constraints, (20) is a (24a)
non-linear convex constraint, which has the exponential func- β̃ ≥ Ptot . (24b)
tion 2δi,j . About the non-linear programming, the available
non-linear solver such as Fmincon, which is a MATLAB According to SOCP, the constraint (24a) can be reformulated
optimization toolbox, can be used to solve non-linear prob- as
T
lem. The constraint (20) satisfies the constraint types, β +1
β −1
≥
, β̃
. (25)
which was defined in the CVX guide (Section 4.4) [34], 2
2
but it’s a non-linear constraint. Reference [29] proposed 2
that the constraint (20) can be approximated by a sys- The constraint (25) is equal to (24a).
tem of SOC constraints with a given accuracy. Fortunately, According to the minimum rate requirement Rmin i,j of i-th
the new version of CVX tool can approximate the expo- user in the j-th selected beam, the minimum SINR require-
min
nential function dynamically. In this paper, we just ignore min can be represented as r min = 2Ri,j − 1. On the
ment ri,j i,j
the non-linearity of the constraint (20) and let CVX solver basis of (9), the constraint (12b) can be rewritten as
deal with it. Especially, we should pay attention to the H 2
h wi pi,j
difference between Bit and Nat when we approximate the i,l min
≥ ri,j .
exponential function before using CVX toolbox. That’s H 2 j−1 P H 2 | K Pm |
pm,n + σ 2
P
h wi pi,n + h wm
because the approximating transformation in [29] is based on
i,l i,l
n=1 m6=i n=1
Nat2 .
(26)
According to (9), the constraint (16) can be reformulated
as The above inequation can be reformulated as
H 2
H 2
h wi pi,j
i,l
≥ ηi,j − 1,
min
hi,l wi pi,j − ri,j (PIntra + PInter ) ≥ ri,j σ ,
min 2
(27)
H 2 j−1 P H 2 |K
Pm |
pm,n + σ 2
P
h wi pi,n + h wm where PIntra denotes the power of intra-beam interfer-
i,l i,l
n=1 m6=i n=1 2 j−1
ence hH
P pi,n , the power of inter-beam interference
(21) i,l wi
n=1
in which i, j and l meet ∀i ≤ |B| , j ≤ |Ki | , l ≤ j, respectively. P H 2 |K
Pm |
hi,l wm pm,n is denoted by PInter . Based on the
We point out that i, j and l satisfy the above constraints in m6=i n=1
the following content of section III if we don’t state them above mathematical transformations, the original optimiza-
again. The constraint (21) is still non-convex, by introducing tion problem OP1 can be reformulated as follows:
a new auxiliary variable ϑi,j ∈ R1+ (∀i ≤ |B| , j ≤ |Ki |), then
OP3 : max α (28a)
the constraint can be reformulated into two new constraints {pi,j }
as follows: s.t. (19) (20) (23) (22b) (25)
H 2 (24b) (27) (12c) (12d)
hi,l wi pi,j ≥ ηi,j − 1 ϑi,j ,
(22a) (28b)
Especially, we point out that the constraint (13c) is convex
2 Bit and Nat are two different units of information. and non-linear. By using SOC, we transform it into two new
constraints (24b) and (25). That’s because with considering IV. CONVERGENCE AND COMPUTATIONAL
about the constraint (20), the solver for SOCP is faster than COMPLEXITY ANALYSIS
the average time of non-linear solver [29]. A. CONVERGENCE ANALYSIS
In order to solve the problem OP3, we choose iterative The reference [29] analyzed the convergence of its proposed
method. The initial iterative point can be got by solving a SCA-based beamformer design for EEMax, where iterative
SPMin problem, which can be formulated as follows: optimization algorithm was introduced to solve the original
optimization problem. About the optimality, [20] used the
|B| |Ki |
X X Dinkelbach’s method as the benchmark to verify the optimal-
OP4 : min pi,j (29a) ity of the proposed algorithm; [29] proved that the solutions
{pi,j } i=1 j=1
of iterative algorithm satisfy the Karush-Kunhn-Tucker con-
s.t. Ri,j ≥ Ri,j ,
min
(29b) ditions via simulations.
pi,j ≥ 0, (29c) Before we analyze the convergence of the proposed iter-
|Si |
NRF X ative algorithm, we point out that the SCA transformation
X
pi,j ≤ Pbud . (29d) is a sequential parametric convex
√ approximation (SPCA)
type method [38]. Given that αβ in (18) and ηi,j − 1 ϑi,j
i=1 j=1
in (22a) are two nonconvex functions, the SCA transforma-
By solving OP4, we can get the initial power allocation results tion of this paper is a convex upper approximation4 . That’s
defined as a K × 1 vector p0 . We denote the initial point by because the first Taylor series expansion result is less or equal
α 0 , β 0 , η0 , ϑ 0 . And β 0 can be calculated from (13c); based to the original nonconvex function.
on (13b) and β 0 , α 0 can be got; ϑi,j 0 can be achieved by (22b);
For ensuing analysis, we use α t to denote the set of
ηi,j can be got through (22a).
0 optimal value of each iteration via the proposed algorithm;
After getting the initial point, we use iterative method to g (α, β) and G (α, β) denote the left part and the right part
|B| |P
Ki |
solve the problem OP2. We supposed that the initial point
δi,j
t denotes the sum rate
P
of (18), respectively; SRt =
of (t+1)-th iteration is defined as α t , β t , ηt , ϑ t . With the
i=1 j=1
above initial point, we can get pt+1 and α t , β t , ηt , ϑ t by of the t-th iteration, where δi,jt is the optimal value of slack
solving OP3. The iteration procedure continues until achiev- variable δi,j in the t-th iteration. According to OP2 and OP3,
ing the pre-defined accuracy ε or maximum number of iter- we can reformulate a new optimization problem, where the
ations Tmax . The accuracy 3 ε is defined as the difference nonconvex constraints (17) and (22a) have not been trans-
between two sequential optimal values (the square root of α). formed via SCA method. The new optimization OP5 is pre-
Especially, without the pre-defined accuracy, the algorithm sented as follows:
will continue doing iteration with just few changes of optimal
value (EE value). Above all, we summarize the procedure of OP5 : min α (30a)
{pi,j }
the proposed iterative optimization method in Algorithm 1.
s.t. (17) (20) (22a) (22b) (25)
(24b) (27) (12c) (12d) . (30b)
Algorithm 1 Proposed Iterative Optimization Algorithm
Input: α 0 , β 0 , η0 , ϑ 0
Based on the analyses in Section III, we point out that OP5 is
Output: The optimal power allocation result p∗ . equivalent to OP1.
1 Initialization: Set t = 0, by solving OP4, get the initial According to the Lemma 2.2 and Corollary 2.3 in [38],
t we can get the conclusion that the sequence α t is conver-
power allocation vector p , then generate the initial point
α ,β ,η ,ϑ ;
t t t t gent. Next, we proof the above conclusion.
2 while ε ≤ 0.01 × 10
−3 or t ≤ T Proof
max do
3 t = t + 1; For t ≥ 0, in the t-th iteration, the constraint (19) can be
4 Solve OP3, get the power allocation vector pt+1 and represented as
the next initial point α t+1 , β t+1 , ηt+1 , ϑ t+1 ;
5 end
g (α, β) ≤ G α, β, α t−1 , β t−1 ≤ SRt . (31)
In the (t + 1)-th iteration, (19) can be described as Then, the total number of iterations to decrease the dual-
ity gap to a constant fraction of
itself is bounded above
g (α, β) ≤ G α, β, α t , β t ≤ SRt+1 .
√
(33)
by O log E1 4 (1 + K ) + qc , where ε is the required
As the number of iterations increases, the SR meets SRt ≤ accuracy of the iterative algorithm. The amount of work per
SRt+1 , which means that SR is a nondecreasing function. iteration is O (4 (1 + K ) + qc )2 (5 (1 + K ) + qc ) , where
According to (32) and (33), we can get 4 (1 + K ) + qc and 5 (1 + K ) + qc are the total number of
variables and constraint dimensions, respectively.
g α t , β t ≤ SRt+1 ,
(34)
V. SIMULATION RESULTS
which means that α t , β t is a feasible point of the optimiza-
In this section, the performances of the proposed energy-
tion problem corresponding to the (t+1)-th iteration. Suppose
efficient power allocation method for mmWave beamspace
that the maximum sum rate corresponding to the original non-
MIMO-NOMA scheme are evaluated through numerical sim-
convex optimization problem OP5 is SR∗ , according to (34),
ulations. In this paper, we just consider a single-cell downlink
we can get
communication system, where the base station has N =
g α t , β t ≤ SRt+1 ≤ SR∗ ,
(35) 256 antennas and the antenna spacing is half of wavelength.
We define = 1. The number of selected RF chains
which means α t , β t is a feasible point of non-convenx
is variable according to the different transmission strate-
optimization problem OP5. By solving OP3, we can get that gies (schemes), which are based on different beam selec-
the next optimal value α t+1 meets α t+1 ≥ α t , which indi- tion methods. For example, if we adopt full digital (FD)
cates that the optimal value is nondecreasing. Considering transmission strategy, the number of selected RF chains is
the bounded power constraint, our proposed energy-efficient NRF = N = 256; if we choose BS strategy, the number is
power allocation design is convergent. NRF ≤ K , which has been discussed in the above section.
According to (32) and (35), we supposed that the iteration We suppose that the base station has perfect beamspace CSI
terminates in the n-th iteration, (32) can be reformulated as of all users. The parameters of the proposed iterative algo-
rithm are identical to Algorithm 1.
g α n , β n ≤ G α n , β n , α n−1 , β n−1 ≤ SRn ≤ SR∗ , (36)
TABLE 2. Power allocation results (mW), where K = 20, SNR = 10dB, Ptr = 40dBm.
FIGURE 6. The SE against number of users, where Ptr = 40dBm, FIGURE 8. The SE under dense user scenario, where K = 20,
SNR = 10dB. Ptr = 35dBm, SNR = 10dB.
selection/antenna selection. The power exhausted by RF cir- E. SIMULATION UNDER DENSE USER SCENARIO
cuits can degrade the EE performance of communication In this simulation, we consider a dense user scenario, where
system. there is a high probability that several users may be in one
selected beam. Therefore, different from the previous CSI
C. SE AND EE AGAINST NUMBER OF USERS setup, we suppose that several users have the same spatial
In this section, we evaluate the performance of the pro- direction information of LoS path but with different path gain,
posed energy-efficient power allocation scheme under dif- and NLoS components of each user can modeled according
ferent number of users. Fig. 6 depicts that the SEs of FD to the corresponding LoS path. The constructed dense user
and BS-OMA remain almost unchanged, while the other scenario is suitable for large-scale conference room, sports
two schemes augment as the number of users increases. center and so on, where multiple users may locate in the same
Fig. 7 indicates that the proposed power allocation scheme beam.
has best EE performance comparing with the other three From Fig. 8 and Fig. 9, we can find that under dense
schemes. As shown in Fig. 5, we find that the power threshold user scenario, the BS-NOMA EEMax scheme has better
[29] O. Tervo, L.-N. Tran, and M. Juntti, ‘‘Optimal energy-efficient transmit YONG LI received the B.S. degree in avionics
beamforming for multi-user MISO downlink,’’ IEEE Trans. Signal Pro- engineering and the M.S. and Ph.D. degrees in
cess., vol. 63, no. 20, pp. 5574–5588, Oct. 2015. circuits and systems from Northwestern Polytech-
[30] X. Sun, N. Yang, S. Yan, Z. Ding, D. W. K. Ng, C. Shen, and nical University, Xi’an, China, in 1983, 1988, and
Z. Zhong, ‘‘Joint beamforming and power allocation in downlink NOMA 2005, respectively, where he joined the School
multiuser MIMO networks,’’ IEEE Trans. Wireless Commun., vol. 17, of Electronic Information, in 1993, and was pro-
no. 8, pp. 5367–5381, Aug. 2018. moted to a Professor, in 2002. His research inter-
[31] F. Alavi, K. Cumanan, Z. Ding, and A. G. Burr, ‘‘Beamforming techniques
ests include digital signal processing and radar
for nonorthogonal multiple access in 5G cellular networks,’’ IEEE Trans.
signal processing.
Veh. Technol., vol. 67, no. 10, pp. 9474–9487, Oct. 2018.
[32] Z.-Q. Luo and W. Yu, ‘‘An introduction to convex optimization for com-
munications and signal processing,’’ IEEE J. Sel. Areas Commun., vol. 24,
no. 8, pp. 1426–1438, Aug. 2006.
[33] S. Boyd and L. Vandenberghe, Convex Optimication. Cambridge, U.K.:
Cambridge Univ. Press, 2004. WEI CHENG received the B.S. degree in elec-
[34] M. Grant and S. Boyd. (Dec. 2018). The CVX Users’ Guide. Version 2.1. tronic and information engineering and the M.S.
[Online]. Available: http://web.cvxr.com/cvx/doc/ and Ph.D. degrees in communication and infor-
[35] J. Cui, Y. Liu, Z. Ding, P. Fan, and A. Nallanathan, ‘‘Optimal user schedul- mation system from Northwestern Polytechnical
ing and power allocation for millimeter wave NOMA systems,’’ IEEE University, Xi’an, China, in 2003, 2006, and 2011,
Trans. Wireless Commun., vol. 17, no. 3, pp. 1502–1517, Mar. 2017. respectively. From April 2011 to April 2013,
[36] Z. Wei, D. W. K. Ng, J. Yuan, and H. M. Wang, ‘‘Optimal resource he worked in the Postdoctoral Research Station of
allocation for power-efficient MC-NOMA with imperfect channel state the School of Electronic Information, Northwest-
information,’’ IEEE Trans. Commun., vol. 65, no. 9, pp. 3944–3961, ern Polytechnical University, where he has been
Sep. 2017. a Lecturer, since 2013, and was promoted to an
[37] N. Zhao, W. Wang, J. Wang, Y. Chen, Y. Lin, Z. Ding, and Associate Professor, in 2015. His research interests include wireless sensor
N. C. Beaulieu, ‘‘Joint beamforming and jamming optimization for secure networks and ad hoc networks, and radar signal processing.
transmission in MISO-NOMA networks,’’ IEEE Trans. Commun., vol. 67,
no. 3, pp. 2294–2305, Mar. 2019.
[38] A. Beck, A. Ben-Tal, and L. Tetruashvili, ‘‘A sequential paramet-
ric convex approximation method with applications to nonconvex WENJIE ZHANG received the B.S. degree in elec-
truss topology design problems,’’ J. Global Optim., vol. 47, no. 1, tronic and information engineering from Yangtze
pp. 29–51, May 2010.
University, Jinzhou, China, in 2011, and the M.S.
[39] M. S. Lobo, L. Vandenberghe, S. Boyd, and H. Lebret, ‘‘Applications
degree in communication and information sys-
of second-order cone programming,’’ Linear Algebra Appl., vol. 284,
nos. 1–3, pp. 193–228, Nov. 1998. tem from Guizhou University, Guiyang, China,
in 2015. He is currently pursuing the Ph.D. degree
in electronic science and technology with North-
western Polytechnical University, Xi’an, China.
His research interests include wireless communi-
cations, information theory, massive MIMO, Mil-
limeter wave communication, and signal processing for communication.
PENGLU LIU received the M.S. degree from the XIANG GAO received the B.S. degree in com-
Xi’an University of Posts and Telecommunica- munication engineering from the North Univer-
tions, China, in 2017. He is currently pursuing sity of China, Taiyuan, China, in 2017. He is
the Ph.D. degree with Northwestern Polytechnical currently pursuing the M.S. degree in commu-
University. His current research interests include nication and information system with North-
resource allocation of wireless communication western Polytechnical University, Xi’an, China.
networks, millimeter wave communication, and His research interests include physical layer secu-
mobile edge computing. rity, signal processing, convex optimization, and
its applications.