Resource Allocation Design for Next Generation Multiple Access: A Tutorial Overview

Zhiqiang Wei,  Dongfang Xu,  Shuangyang Li,  Derrick Wing Kwan Ng, , and Giuseppe Caire, 
Z. Wei is with the School of Mathematics and Statistics, Xi’an Jiaotong University, Xi’an 710049, China (e-mail: [email protected]);D. Xu is with the Academy of Interdisciplinary Studies, The Hong Kong University of Science and Technology, Clear Water Bay, 999077, Hong Kong, China (e-mail: [email protected]);S. Li and G. Caire are with the Faculty of Electrical Engineering and Computer Science, Technische Universität Berlin, Berlin 10587, Germany, (e-mail: [email protected], [email protected]);D. W. K. Ng is with the School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW 2052, Australia (e-mail: [email protected]).
Abstract

Multiple access is the cornerstone technology for each generation of wireless cellular networks, which fundamentally determines the method of radio resource sharing and significantly influences both the system performance and the transceiver complexity. Meanwhile, resource allocation design plays a crucial role in multiple access, as its name suggests, encompassing radio resource and interference management, and it is crucial for providing high-speed and reliable communication services to multiple users. Given that resource allocation design is intrinsically scenario-specific and the optimization tools for resource allocation design are typically varied, in this paper, we present a comprehensive tutorial overview for junior researchers in this field, aiming to offer a foundational guide for resource allocation design in the context of next-generation multiple access (NGMA). Our discussion spans a broad range of fundamental topics: from typical system models, through the intricacy of problem formulation in resource allocation design, to the exploration of various potential optimization solution methodologies. Initially, we identify three types of channels where NGMA is primarily operational for future wireless cellular networks: natural channels, reconfigurable channels, and functional channels. Natural channels are traditional uplink and downlink communication channels; reconfigurable channels are defined as channels that can be proactively reshaped via emerging platforms or techniques, such as intelligent reflecting surface (IRS), unmanned aerial vehicle (UAV), movable/fluid antenna (M/FA); and functional channels support not only communication but also other functionalities simultaneously, with typical examples including integrated sensing and communication (ISAC) and joint computing and communication (JCAC) channels. We introduce NGMA models applicable to these three types channels that covers most of the practical communication scenarios of future wireless communications. Subsequently, we articulate the key optimization technical challenges inherent in NGMA’s resource allocation design for these channel types, categorizing them into rate-oriented, power-oriented, and reliability-oriented resource allocation designs. The corresponding optimization approaches for solving the formulated resource allocation design problems are then presented. Moreover, simulation results are presented and discussed to elucidate the practical implications and insights derived from resource allocation designs in NGMA.

Index Terms:
Resource allocation design, multiple access, non-convex optimization, global optimization.

I Introduction

The sixth-generation (6G) wireless networks are envisioned to provide massive, immersive, and reliable communications, which are expected to revolutionize our future daily lives. Furthermore, the IMT-2030 framework has highlighted three groundbreaking usage scenarios: ubiquitous connectivity, integrated sensing and communication, and integrated artificial intelligence (AI) and communication [IMT-2030]. These scenarios lay the groundwork for a sophisticated intelligent digital world, serving as a pivotal data foundation. Moreover, these innovative services open doors to novel business models and applications, simultaneously introducing unprecedented challenges in the evolution of 6G wireless communication technologies. In particular, massive communication is expected to accommodate an extraordinary connectivity density ranging from 106superscript10610^{6}10 start_POSTSUPERSCRIPT 6 end_POSTSUPERSCRIPT to 107superscript10710^{7}10 start_POSTSUPERSCRIPT 7 end_POSTSUPERSCRIPT devices/km2superscriptdevices/km2\mbox{devices/km}^{2}devices/km start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT [IMT-2030], encompassing a variety of ubiquitous wideband and Internet-of-Things (IoT) devices across a broad spectrum of coverage and mobility. Beyond these capabilities, immersive communication demands stringent requirements on peak and experienced data rates, latency, and connectivity capacity, which are crucial for supporting a wide variety of applications in entertainment, education, and manufacturing sectors.

Radio access technology plays a crucial role in sharing limited radio resources among multiple users in a controllable manner to achieve satisfactory quality-of-service (QoS). This is vital for providing high-speed and reliable services to massive wideband users and IoT devices. Multiple access technology is the most fundamental aspect of the physical layer and defines each generation of wireless cellular networks. Dated back to the early 80s, in the first generation (1G) cellular networks, frequency-division multiple access (FDMA) was adopted which assigns different frequency bands to various users, separated by guard bands to mitigate any potential inter-user interference (IUI). In the 1990s, the second-generation (2G) wireless networks adopted time-division multiple access (TDMA), allocating the system bandwidth based on a time-sharing scheme. Besides, code-division multiple access (CDMA)[Verdu1999, YangCDMA], utilized in both 2G and the third-generation (3G), enabled users to transmit data across the entire bandwidth simultaneously by exploiting the unique properties of code sequences to distinguish among users. As time evolves, in the fourth-generation (4G) and the fifth-generation (5G), orthogonal frequency division multiplexing (OFDM) waveform [Wong1999, Strohmer2003] has been predominantly adopted owing to its higher spectral efficiency than FDMA and the low implementation complexity of frequency domain equalization (FDE). Also, orthogonal frequency-division multiple access (OFDMA) [Kwan_AF_2010, DerrickEEOFDMA, DerrickEESWIPT, DerrickLimitedBackhaul, ZhiqiangOFDMA] further enhances this by allowing different users to occupy different subcarriers, thus providing high flexibility in resource allocation (RA) design. Furthermore, by equip** multiple antennas at transceivers, spatial division multiple access (SDMA) [yang2017noma, Ngo2011] has been recognized as an efficient strategy for supporting multi-user communication, which has gained increased popularity with the advancement of multiple-input multiple-output (MIMO) technology in recent years.

From an information-theoretical perspective, a set of orthogonal system resources can be interpreted as the system’s degrees-of-freedom (DoF)[Tse2005], enabling the transmission of multiple data streams across different DoFs without mutual interference. Traditional multiple access protocols, whether in time, frequency, spatial, or code domains, are categorized as orthogonal multiple access (OMA) schemes. In particular, these schemes are designed to allocate distinct system DoFs to different users or data streams exclusively, primarily to minimize interference, thereby facilitating interference-free transmission and simplifying channel equalization at the receiver’s end. However, despite its advantages, OMA demands a certain level of system signaling overhead to maintain this orthogonality, such as time synchronization overhead for TDMA and the required accurate channel state information (CSI) at the transmitter side for SDMA. Moreover, OMA struggles to support massive communications and ubiquitous connectivity due to the limited system DoFs. In contrast, NOMA serves as a more versatile generalization of OMA, with the former introducing a manageable level of IUI by permitting multiple users to share the same system DoF [Ding2015b, LiuSWIPT, Lei2016NOMA, 9679390]. Specifically, NOMA leverages advanced multi-user detection (MUD) techniques to distinguish users at the receiver[MUDCDMA, Hanzo2003], representing a more flexible approach to resource allocation than OMA, which strictly avoids DoF sharing among users[PerGainWei].

Through DoF sharing, NOMA can accommodate more number of users with limited system resources, i.e., time-frequency resource block, spatial DoF, or radio frequency (RF) chains [XuMassiveMIMONOMA, DingSignalAlignment, wei2018multibeam, WeiBeamWidthControl], compared to its orthogonal counterpart. Moreover, from the optimization point of view, by relaxing the orthogonality constraint of OMA, NOMA enables a more flexible management of radio resources and offers an efficient manner to improve spectral efficiency via resource allocation design[Wei2017]. Typical NOMA schemes include power-domain and code-domain NOMA, which characterize the approach for DoF sharing. Specifically, power domain NOMA exploits the discrepancy in users’ transmit/receive power levels for multi-user multiplexing, combined with superposition coding at the transmitter and successive interference cancellation (SIC) at the receivers to harness IUI[PerGainWei]. In contrast, code-domain NOMA shares the system DoF among multiple users via non-orthogonal coding/spreading, facilitating user separation at the receiver. This includes low-density spreading (LDS)[Razavi2012], sparse code multiple access (SCMA) [WeijieSCMA, WeijieSCMAII], and pattern division multiple access (PDMA)[ShanzhiPDMA], etc. On the other hand, rate splitting multiple access (RSMA) [BrunoJSAC, YijieRSMA], a generalization of power/code domain NOMA, partially decodes interference and partially treats the remainder as noise, based on rate splitting principles. Despite the standardization of NOMA and RSMA in 5G has been gradual, their related research has attracted significant attention and efforts in academia[Access2015]. Indeed, the notion of NOMA and RSMA might serve as a foundation for addressing the unique challenges of 6G, including massive communication and ubiquitous connectivity.

As we navigate the evolving service demands of 6G and the technological advancements in multiple access from 1G through 5G, a critical question emerges: what will the NGMA look like [YuanweiNGMA]? One potential new feature of NGMA could be innovative multiple access schemes that can enhance the connectivity density, spectral efficiency, and/or energy efficiency. In particular, NGMA may incorporate, solely or in combination, existing OMA, NOMA, and RSMA to address the enormous challenges and to meet the heterogeneous service demands of next-generation wireless networks. Secondly, NGMA is anticipated to exploit cutting-edge infrastructures and enabling technologies, such as intelligent reflecting surface (IRS) [ZhiqiangOFDMA, XianghaoJSAC, 9183907], UAV-assisted communication [8663615, 8644086], and movable/fluid antenna (M/FA) systems[LipengMovableAntenna, 10318134]. These technologies could offer additional design DoF via adaptive channel reconfiguration and thus improve system performance. Thirdly, NGMA aims not only to satisfy the stringent communication requirements but also to realize versatile functionalities, including sensing [Fan2020], computing [Yuyi2017], and learning [YandongCST]. In light of these considerations, this paper introduces a comprehensive framework and resource allocation strategy for NGMA, addressing its application in natural, reconfigurable, and functional channels, which cover a broad spectrum of practical scenarios.

In practice, to unleash the potential of effective multiple access schemes, meticulous resource allocation design is of utmost importance. It can make the best use of limited communication resources based on the information available at the resource allocator, such as the CSI, QoS, power budget, and the number of antennas/subcarriers, to improve overall system performance. The resource allocation designs for OMA, NOMA, and RSMA schemes have been extensively studied[Kwan_AF_2010, DerrickEEOFDMA, DerrickEESWIPT, DerrickLimitedBackhaul, ZhiqiangOFDMA, XuMassiveMIMONOMA, DingSignalAlignment, wei2018multibeam, WeiBeamWidthControl, Shuangyang_FTN_NOMA]. While it is not our goal to exhaustively list all the existing resource allocation designs for OMA, NOMA, and RSMA detailed in the literature, our focus is to present a holistic overview of the predominant models and approaches in resource allocation design for NGMA, addressing its application in natural channels, reconfigurable channels, and functional channels. In natural channels, the primary resource allocation for NGMA lies in the optimal deployment of limited resources towards achieving specific objectives, such as maximizing the sum-rate, minimizing transmit power, or enhancing communication reliability [WeiProceeding]. In the context of reconfigurable channels, resource allocation design explores the best methods of channel reconfiguration in conjunction with the usage of system resources for NGMA. This often necessitates a joint design, such as joint active and passive beamforming design [QingqingIRS] in IRS-assisted systems and joint trajectory and resource allocation design[YuanxinUAVNOMA] in UAV-enabled systems. Besides, next-generation wireless networks are anticipated to support additional capabilities of sensing, computing, and/or learning alongside communication. This anticipation has spurred the development of integrated sensing and communication (ISAC) systems [Fan2020] [10283659], integrated computing and communication systems[Yuyi2017], and integrated learning and communication systems[YandongCST]. The key challenges in resource allocation for NGMA, particularly within these functional channels, revolve around efficiently managing user access while delicately balancing the trade-offs between communication and these auxiliary functionalities.

The main objective of this tutorial paper is to provide a framework for NGMA and its resource allocation design. Section I introduces the unified framework for NGMA in different channels and provides some exemplary system models. Section II focuses on the foundational problem formulations of resource allocation design for NGMA in different types of channels. Section III introduces various advanced optimization tools for resource allocation design, highlighting their tradeoffs between computational complexity, convergence, and optimality. Some simulations and discussions are provided in Section V. Section VI concludes this work and provides an outlook on resource allocation design for NGMA. An illustrative diagram, depicted in Fig. 1, guides the reader through the logical progression and interconnectedness of the topics discussed within this paper.

Refer to caption
Figure 1: Conceptual framework and sectional outline of the paper.

The following notations are adopted in this paper. Boldface capital and lowercase letters are reserved for matrices and vectors, respectively. M×Nsuperscript𝑀𝑁\mathbb{C}^{M\times N}blackboard_C start_POSTSUPERSCRIPT italic_M × italic_N end_POSTSUPERSCRIPT denotes the set of all M×N𝑀𝑁M\times Nitalic_M × italic_N matrices with complex entries; M×Nsuperscript𝑀𝑁\mathbb{R}^{M\times N}blackboard_R start_POSTSUPERSCRIPT italic_M × italic_N end_POSTSUPERSCRIPT denotes the set of all M×N𝑀𝑁M\times Nitalic_M × italic_N matrices with real entries; 𝔹M×Nsuperscript𝔹𝑀𝑁\mathbb{B}^{M\times N}blackboard_B start_POSTSUPERSCRIPT italic_M × italic_N end_POSTSUPERSCRIPT denotes the set of all M×N𝑀𝑁M\times Nitalic_M × italic_N matrices with binary entries; ()TsuperscriptT{\left(\cdot\right)^{\mathrm{T}}}( ⋅ ) start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT and ()HsuperscriptH{\left(\cdot\right)^{\mathrm{H}}}( ⋅ ) start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT denote the transpose and the Hermitian transpose of a vector or a matrix, respectively; ||\lvert\cdot\rvert| ⋅ | denotes the absolute value of a complex scalar or the cardinality of a set, \left\|\cdot\right\|∥ ⋅ ∥ denotes the Euclidean norm of a vector, and F\left\|\cdot\right\|_{\rm F}∥ ⋅ ∥ start_POSTSUBSCRIPT roman_F end_POSTSUBSCRIPT denotes the Frobenius norm of a matrix. Tr()Tr\operatorname{Tr}\left(\cdot\right)roman_Tr ( ⋅ ) and det()\det\left(\cdot\right)roman_det ( ⋅ ) denote the trace and determinant of a matrix; Rank()Rank\mathrm{Rank}\left(\cdot\right)roman_Rank ( ⋅ ) denotes the rank of a matrix; diag{𝐱}diag𝐱\operatorname{\mathrm{diag}}\{\mathbf{x}\}roman_diag { bold_x } denotes a diagonal matrix whose main diagonal elements are given by its input vector 𝐱𝐱\mathbf{x}bold_x; 𝐈Msubscript𝐈𝑀\mathbf{I}_{M}bold_I start_POSTSUBSCRIPT italic_M end_POSTSUBSCRIPT denotes the M×M𝑀𝑀M\times Mitalic_M × italic_M identity matrix; 𝟎Msubscript0𝑀\mathbf{0}_{M}bold_0 start_POSTSUBSCRIPT italic_M end_POSTSUBSCRIPT denotes the M×1𝑀1M\times 1italic_M × 1 zero vector with all zero entries; {𝐗}ijsubscript𝐗𝑖𝑗\left\{\mathbf{X}\right\}_{ij}{ bold_X } start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT returns the entry in the i𝑖iitalic_i-th row and j𝑗jitalic_j-th column of matrix 𝐗𝐗\mathbf{X}bold_X; {𝐱}isubscript𝐱𝑖\left\{\mathbf{x}\right\}_{i}{ bold_x } start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT returns the i𝑖iitalic_i-th entry of vector 𝐱𝐱\mathbf{x}bold_x. tensor-product\otimes and f(x)x𝑓𝑥𝑥\frac{\partial f(x)}{\partial x}divide start_ARG ∂ italic_f ( italic_x ) end_ARG start_ARG ∂ italic_x end_ARG denote the Kronecker product and the differential operator, respectively. The real-valued Gaussian distribution with mean 𝝁𝝁\boldsymbol{\mu}bold_italic_μ and covariance matrix 𝚺𝚺\boldsymbol{\Sigma}bold_Σ is denoted by 𝒩(𝝁,𝚺)𝒩𝝁𝚺{\cal N}(\boldsymbol{\mu},\boldsymbol{\Sigma})caligraphic_N ( bold_italic_μ , bold_Σ ), and the circularly symmetric complex Gaussian distribution with mean 𝝁𝝁\boldsymbol{\mu}bold_italic_μ and covariance matrix 𝚺𝚺\boldsymbol{\Sigma}bold_Σ is denoted by 𝒞𝒩(𝝁,𝚺)𝒞𝒩𝝁𝚺{\cal CN}(\boldsymbol{\mu},\boldsymbol{\Sigma})caligraphic_C caligraphic_N ( bold_italic_μ , bold_Σ ). The key acronyms used in this paper are summarized in Table I.

TABLE I: List of key acronyms
Common term Acronym Common term Acronym
Sixth-generation 6G Artificial intelligence AI
Internet-of-Things IoT Next-generation multiple access NGMA
Orthogonal multiple access OMA Non-orthogonal multiple access NOMA
Frequency-division multiple access FDMA Inter-user interference IUI
Time-division multiple access TDMA Code-division multiple access CDMA
Rate splitting multiple access RSMA Delay-division multiple access DDMA
Orthogonal frequency division multiplexing OFDM Orthogonal frequency-division multiple access OFDMA
Spatial division multiple access SDMA Multiple-input multiple-output MIMO
Degrees-of-freedom DoF Quality-of-service QoS
Single-input single-output SISO Channel state information CSI
Unmanned aerial vehicle UAV Intelligent reflecting surface IRS
Integrated sensing and communication ISAC Joint computing and communication JCAC
Movable/fluid antenna M/FA Low-density spreading LDS
Uniform planar array UPA Uniform linear array ULA
Line-of-sight LoS Additive white Gaussian noise AWGN
Non-convex objective function NOF Variable coupling VC
Fractional constraint FC Binary constraint BC
Semi-infinite constraint SMIC Unit-modulus constraint UMC
Equality constraint EC Branch-and-bound BnB
Successive convex approximation SCA Semidefinite relaxation SDR
Block coordinate descent BCD Monotonic optimization MO

II Next-Generation Multiple Access in Different Channels

In this section, we introduce a unified framework accompanied by various representative system models for NGMA across natural, reconfigurable, and functional channels. This comprehensive approach encompasses a broad spectrum of NGMA scenarios anticipated in future wireless networks. By presenting these models, we aim to provide a holistic overview that encapsulates the extensive variety of NGMA categories, ensuring a thorough understanding of the challenges and prospects awaiting in the advancement of wireless network technologies.

II-A NGMA in Natural Channels

In this subsection, we first introduce the unified framework for NGMA in natural channels, which subsumes OMA, NOMA, and RSMA as special cases. For each multiple access scheme, the corresponding transceiver architectures, the available system resources, and the resource allocation design are discussed. To further illustrate this framework’s applicability, we present four exemplary NGMA systems, including OFDMA, NOMA, DDMA, and RSMA.

II-A1 A Unified Framework for NGMA in Natural Channels

The fundamental input-output relationship of NGMA in natural channels is given by

𝐲=𝐇𝐠(𝐬)+𝐳,𝐲𝐇𝐠𝐬𝐳\mathbf{y}=\mathbf{Hg}(\mathbf{s})+\mathbf{z},bold_y = bold_Hg ( bold_s ) + bold_z , (1)

where 𝐬D×1𝐬superscript𝐷1\mathbf{s}\in\mathbb{C}^{D\times 1}bold_s ∈ blackboard_C start_POSTSUPERSCRIPT italic_D × 1 end_POSTSUPERSCRIPT contains a total of D𝐷Ditalic_D data streams of all K𝐾Kitalic_K users such that 𝐬𝒞𝒩(𝟎,𝐈D)similar-to𝐬𝒞𝒩0subscript𝐈𝐷\mathbf{s}\sim\mathcal{CN}(\mathbf{0},\mathbf{I}_{D})bold_s ∼ caligraphic_C caligraphic_N ( bold_0 , bold_I start_POSTSUBSCRIPT italic_D end_POSTSUBSCRIPT ), as widely adopted in the literature[Wei2017]. Its subset 𝐬ΩkDk×1subscript𝐬subscriptΩ𝑘superscriptsubscript𝐷𝑘1\mathbf{s}_{\Omega_{k}}\in\mathbb{C}^{D_{k}\times 1}bold_s start_POSTSUBSCRIPT roman_Ω start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT × 1 end_POSTSUPERSCRIPT contains Dk=|Ωk|subscript𝐷𝑘subscriptΩ𝑘D_{k}=\left|\Omega_{k}\right|italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = | roman_Ω start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT | data streams of user k𝑘kitalic_k, k{1,,K}for-all𝑘1𝐾\forall k\in\{1,\ldots,K\}∀ italic_k ∈ { 1 , … , italic_K }, where k=1KDk=Dsuperscriptsubscript𝑘1𝐾subscript𝐷𝑘𝐷\sum_{k=1}^{K}D_{k}=D∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = italic_D and k=1KΩk={1,,D}superscriptsubscript𝑘1𝐾subscriptΩ𝑘1𝐷\cup_{k=1}^{K}{\Omega_{k}}=\left\{1,\ldots,D\right\}∪ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT roman_Ω start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = { 1 , … , italic_D }. The channel matrix 𝐇M×N𝐇superscript𝑀𝑁\mathbf{H}\in\mathbb{C}^{M\times N}bold_H ∈ blackboard_C start_POSTSUPERSCRIPT italic_M × italic_N end_POSTSUPERSCRIPT models the propagation between transmitter and receiver, where N𝑁Nitalic_N and M𝑀Mitalic_M are determined by the number of available system resource elements at the transmitter and receiver, respectively, such as the number of antennas, time slots, or subcarriers, etc. In practice, the channel matrix 𝐇𝐇\mathbf{H}bold_H needs to be defined in a proper domain such that it does not violate the intrinsic physics of wave propagation. For instance, if the channel matrix is defined in the spatial domain, we usually consider a narrowband assumption for the system [YijieRSMA], such that each entry of 𝐇𝐇\mathbf{H}bold_H can characterize the flat fading coefficient between each pair of transceiver antennas. Vectors 𝐲M×1𝐲superscript𝑀1\mathbf{y}\in\mathbb{C}^{M\times 1}bold_y ∈ blackboard_C start_POSTSUPERSCRIPT italic_M × 1 end_POSTSUPERSCRIPT and 𝐳M×1𝐳superscript𝑀1\mathbf{z}\in\mathbb{C}^{M\times 1}bold_z ∈ blackboard_C start_POSTSUPERSCRIPT italic_M × 1 end_POSTSUPERSCRIPT denote the received signal and noise at the receiver side, respectively, where the additive white Gaussian noise (AWGN) follows 𝐳𝒞𝒩(𝟎,σ2𝐈M)similar-to𝐳𝒞𝒩0superscript𝜎2subscript𝐈𝑀\mathbf{z}\sim\mathcal{CN}(\mathbf{0},\sigma^{2}\mathbf{I}_{M})bold_z ∼ caligraphic_C caligraphic_N ( bold_0 , italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT bold_I start_POSTSUBSCRIPT italic_M end_POSTSUBSCRIPT ) with the noise power of σ2superscript𝜎2\sigma^{2}italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT. If the channel matrix is defined in the frequency domain, a multicarrier communication system is usually considered with M=N𝑀𝑁M=Nitalic_M = italic_N denoting the number of subcarriers, where 𝐇𝐇\mathbf{H}bold_H denotes the frequency domain effective channel between transceiver[Al-Imari2011LDSOFDM]. For concise notation in this paper, the notations 𝐲𝐲\mathbf{y}bold_y, 𝐇𝐇\mathbf{H}bold_H, 𝐳𝐳\mathbf{z}bold_z, and 𝐬𝐬\mathbf{s}bold_s will be consistently employed to denote entities with analogous meanings, albeit with varying specifications and dimensions across different scenarios.

TABLE II: The domain of channel matrix 𝐇𝐇\mathbf{H}bold_H, modulation waveform, and corresponding multiple access schemes
Domain of channel matrix 𝐇𝐇\mathbf{H}bold_H Modulation waveform Typical multiple access schemes
Frequency domain FDM or OFDM FDMA, OFDMA, NOMA
Time domain TDM TDMA
Spatial domain Any narrowband modulation waveform SDMA, RSMA
Delay-Doppler domain OTFS DDMA

On the other hand, the channel matrix 𝐇𝐇\mathbf{H}bold_H can be defined in different domains depending on the adopted modulation waveform and on which domain NGMA is performed, as shown in Table II. Note that the channel matrix 𝐇𝐇\mathbf{H}bold_H can be defined in multiple domains, such as the frequency-spatial domain for MIMO-OFDM systems. In such a case, NGMA can be performed in the frequency domain, spatial domain, or cross the frequency-spatial domain, depending on the structure of 𝐇𝐇\mathbf{H}bold_H. Despite the domain of 𝐇𝐇\mathbf{H}bold_H, its rank Rank(𝐇)Rank𝐇\mathrm{Rank}\left(\mathbf{H}\right)roman_Rank ( bold_H ) determines the maximum available DoFs of the considered communication systems, which is the theoretical maximum number of users that can be accommodated in an interference-free manner. Moreover, the eigenvalue distribution of 𝐇𝐇\mathbf{H}bold_H determines the channel disparity in a certain domain, facilitating the exploration of multi-user diversity for efficient resource allocation design. When DRank(𝐇)𝐷Rank𝐇D\leq\mathrm{Rank}\left(\mathbf{H}\right)italic_D ≤ roman_Rank ( bold_H ), the system is known as underloaded [DerrickEEOFDMA] where the system resources are sufficient to accommodate all the data streams of all the K𝐾Kitalic_K users. In this case, OMA exhibits a handy approach to serve all the K𝐾Kitalic_K users, since each data stream can be allocated in at least one available system DoF and enjoys an interference-free transmission. In contrast, when D>Rank(𝐇)𝐷Rank𝐇D>\mathrm{Rank}\left(\mathbf{H}\right)italic_D > roman_Rank ( bold_H ), the system is overloaded [PerGainWei] and the users access the channel in a non-orthogonal manner, i.e., NOMA or RSMA. In such a case, advanced multi-user interference mitigation techniques need to be adopted to improve system performance, such as SIC[Wei2017] and message passing-based multiuser detection [BayestehSCMA].

In (1), the vector function 𝐠():D×1N×1:𝐠absentsuperscript𝐷1superscript𝑁1\mathbf{g}(\cdot):\mathbb{C}^{D\times 1}\xrightarrow{}\mathbb{C}^{N\times 1}bold_g ( ⋅ ) : blackboard_C start_POSTSUPERSCRIPT italic_D × 1 end_POSTSUPERSCRIPT start_ARROW start_OVERACCENT end_OVERACCENT → end_ARROW blackboard_C start_POSTSUPERSCRIPT italic_N × 1 end_POSTSUPERSCRIPT maps the information symbols 𝐬𝐬\mathbf{s}bold_s of all the K𝐾Kitalic_K users to the N𝑁Nitalic_N system resources at the transmitter side. In particular, this map** function captures a specific approach of multiple access as well as resource allocation among multiple users, which plays a key role in determining the system performance. In other words, the joint consideration of multiple access and resource allocation is to design the map** function, 𝐠()𝐠\mathbf{g}(\cdot)bold_g ( ⋅ ), for a given channel matrix 𝐇𝐇\mathbf{H}bold_H, such that the transmission and the channel properties match with each other so as to achieve certain purposes, e.g., interference management, rate maximization, and power minimization. In practice, advanced channel estimation technologies are generally required to acquire the channel matrix 𝐇𝐇\mathbf{H}bold_H [BigueshMMSE, zhao2017multiuser, Sun2019]. In certain scenarios, such as slow-fading channels, accurate CSI can be acquired at the transmitter with a reasonable amount of system overhead. In such cases, the estimated accurate CSI would be treated as perfect CSI to simplify the design of multiple access and resource allocation. In contrast, for the cases in which acquiring accurate CSI is not possible, only imperfect CSI is available. As such, different robust resource allocation design approaches should be performed such that the QoS of all users can be guaranteed to a certain extent, e.g., [WeiProceeding].

For a given 𝐇𝐇\mathbf{H}bold_H, OMA schedules to serve one user in each DoF, while NOMA schedules to serve more than one user in each DoF. Also, hybrid NOMA strategically combines the approaches by serving a portion of the users through OMA while allocating the remaining users via NOMA [ZengHybridNOMA]. In practice, the formulation of resource allocation design problems can be tailored to specific system design goals, depending on the chosen multiple access scheme. Specifically, OMA imposes strict constraints to ensure resource orthogonality at the expense of underutilization of limited system resources. In contrast, NOMA is more flexible in terms of resource allocation design and can degenerate to OMA configuration if the power or rate allocated to certain NOMA users is set to zero. Nonetheless, the receiver in an OMA system benefits from a reduced complexity compared to that of a NOMA system[PerGainWei]. Meanwhile, hybrid NOMA synergizes the advantages of both NOMA and OMA, enabling IUI-free transmission for certain users while simultaneously supporting a larger number of users through non-orthogonal multiplexing. In contrast, RSMA multiplexes common and private data streams via precoding in the spatial domain based on a proper rate splitting strategy at the transmitter side[BrunoJSAC]. At the RSMA receiver, the common data stream is decoded by treating the interference as noise, and the private data streams are decoded successively based on the SIC framework. This structure offers high flexibility in exploiting the spatial DoF and resource allocation, which bridges spatial-division multiple access (SDMA) and NOMA in an efficient manner[BrunoJSAC].

We note that the input-output relationship in (1) can be applied to both uplink and downlink transmission. In downlink communication systems, the BS has the full information of 𝐬𝐬\mathbf{s}bold_s and 𝐇𝐇\mathbf{H}bold_H and thus the map** function 𝐠()𝐠\mathbf{g}(\cdot)bold_g ( ⋅ ) can be designed in a centralized manner at the BS. As in uplink systems, the map** function 𝐠()𝐠\mathbf{g}(\cdot)bold_g ( ⋅ ) needs to be designed in a distributed manner, since each user only has its own specific CSI (either perfect or imperfect CSI) and information symbols.

II-A2 Uplink OFDMA

Consider an uplink system, where a single-antenna BS serves K𝐾Kitalic_K single-antenna users. All the transceivers are equipped with an OFDM modulator or demodulator [DerrickEEOFDMA] and all the users are accessed the channel concurrently based on OFDMA. In this case, M𝑀Mitalic_M in (1) is the total number of subcarriers adopted in OFDM modulation. Between user k𝑘kitalic_k and the BS, there would be a frequency domain channel matrix 𝐇kM×Msubscript𝐇𝑘superscript𝑀𝑀\mathbf{H}_{k}\in\mathbb{C}^{M\times M}bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_M × italic_M end_POSTSUPERSCRIPT. Thus, we have N=MK𝑁𝑀𝐾N=MKitalic_N = italic_M italic_K and the channel matrix in (1) can be rewritten as 𝐇=[𝐇1,,𝐇K]𝐇subscript𝐇1subscript𝐇𝐾\mathbf{H}=\left[\mathbf{H}_{1},\ldots,\mathbf{H}_{K}\right]bold_H = [ bold_H start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , bold_H start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT ]. The data streams 𝐬𝐬\mathbf{s}bold_s and the received signals 𝐲𝐲\mathbf{y}bold_y are also defined in the frequency domain. In this case, the total number of data streams DM𝐷𝑀D\leq Mitalic_D ≤ italic_M as the system DoF is limited by the number of subcarriers adopted at the BS.

For the considered uplink OFDMA system, the input-output relationship in (1) can be specified as

𝐲=k=1K𝐇k𝚷k𝚲k𝐬Ωk+𝐳,𝐲superscriptsubscript𝑘1𝐾subscript𝐇𝑘subscript𝚷𝑘subscript𝚲𝑘subscript𝐬subscriptΩ𝑘𝐳\mathbf{y}=\sum_{k=1}^{K}\mathbf{H}_{k}\mathbf{\Pi}_{k}\mathbf{\Lambda}_{k}% \mathbf{s}_{\Omega_{k}}+\mathbf{z},bold_y = ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_Λ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_s start_POSTSUBSCRIPT roman_Ω start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT + bold_z , (2)

where 𝚲k=diag{pk1,,pkDk}subscript𝚲𝑘diagsubscript𝑝𝑘1subscript𝑝𝑘subscript𝐷𝑘\mathbf{\Lambda}_{k}=\operatorname{\mathrm{diag}}\{\sqrt{p_{k1}},\ldots,\sqrt{% p_{kD_{k}}}\}bold_Λ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = roman_diag { square-root start_ARG italic_p start_POSTSUBSCRIPT italic_k 1 end_POSTSUBSCRIPT end_ARG , … , square-root start_ARG italic_p start_POSTSUBSCRIPT italic_k italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG } and pkdk0subscript𝑝𝑘subscript𝑑𝑘0p_{kd_{k}}\geq 0italic_p start_POSTSUBSCRIPT italic_k italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT ≥ 0 is the power allocation for the dksubscript𝑑𝑘d_{k}italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT-th data stream of user k𝑘kitalic_k. Note that the total transmit power of user k𝑘kitalic_k should be limited by its power budget Pk,maxsubscript𝑃𝑘maxP_{k,\mathrm{max}}italic_P start_POSTSUBSCRIPT italic_k , roman_max end_POSTSUBSCRIPT, i.e., dk=1DkpkdkPk,maxsuperscriptsubscriptsubscript𝑑𝑘1subscript𝐷𝑘subscript𝑝𝑘subscript𝑑𝑘subscript𝑃𝑘max\sum_{d_{k}=1}^{D_{k}}p_{kd_{k}}\leq P_{k,\mathrm{max}}∑ start_POSTSUBSCRIPT italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT italic_p start_POSTSUBSCRIPT italic_k italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT ≤ italic_P start_POSTSUBSCRIPT italic_k , roman_max end_POSTSUBSCRIPT. The binary matrix 𝚷k𝔹M×Dksubscript𝚷𝑘superscript𝔹𝑀subscript𝐷𝑘\mathbf{\Pi}_{k}\in\mathbb{B}^{M\times D_{k}}bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ blackboard_B start_POSTSUPERSCRIPT italic_M × italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT is the user scheduling matrix. {𝚷k}mdk=1subscriptsubscript𝚷𝑘𝑚subscript𝑑𝑘1\{\mathbf{\Pi}_{k}\}_{md_{k}}=1{ bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT = 1 denotes that the dksubscript𝑑𝑘d_{k}italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT-th data stream of user k𝑘kitalic_k is scheduled to the m𝑚mitalic_m-th subcarrier, otherwise {𝚷k}mdk=0subscriptsubscript𝚷𝑘𝑚subscript𝑑𝑘0\{\mathbf{\Pi}_{k}\}_{md_{k}}=0{ bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT = 0. Without loss of generality, we assume that each data stream is allocated to one subcarrier, i.e., m=1M{𝚷k}mdk=1superscriptsubscript𝑚1𝑀subscriptsubscript𝚷𝑘𝑚subscript𝑑𝑘1\sum_{m=1}^{M}\{\mathbf{\Pi}_{k}\}_{md_{k}}=1∑ start_POSTSUBSCRIPT italic_m = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT = 1, dkfor-allsubscript𝑑𝑘\forall d_{k}∀ italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT, and thus the total number of subcarriers allocated to user k𝑘kitalic_k is dk=1Dkm=1M{𝚷k}mdk=Dksuperscriptsubscriptsubscript𝑑𝑘1subscript𝐷𝑘superscriptsubscript𝑚1𝑀subscriptsubscript𝚷𝑘𝑚subscript𝑑𝑘subscript𝐷𝑘\sum_{d_{k}=1}^{D_{k}}\sum_{m=1}^{M}\{\mathbf{\Pi}_{k}\}_{md_{k}}=D_{k}∑ start_POSTSUBSCRIPT italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_m = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT = italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT. For OFDMA, we need to limit k=1Kdk=1Dk{𝚷k}mdk1superscriptsubscript𝑘1𝐾superscriptsubscriptsubscript𝑑𝑘1subscript𝐷𝑘subscriptsubscript𝚷𝑘𝑚subscript𝑑𝑘1\sum_{k=1}^{K}\sum_{d_{k}=1}^{D_{k}}\{\mathbf{\Pi}_{k}\}_{md_{k}}\leq 1∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT ≤ 1 to guarantee that at most one data stream of a user can be scheduled to each subcarrier.

In practice, when a static multipath propagation environment and a proper cyclic prefix length are considered, the frequency domain channel of each user 𝐇ksubscript𝐇𝑘\mathbf{H}_{k}bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is a diagonal matrix, which lays the foundation for interference-free parallel data stream transmission and facilitates low-complexity single-tap FDE at the BS. In contrast, in high-mobility channels when the Doppler is not well compensated, the frequency domain channel 𝐇ksubscript𝐇𝑘\mathbf{H}_{k}bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is generally not diagonal, leading to severe inter-carrier interference (ICI) in OFDM and IUI in OFDMA systems[Zhiqiang_magzine]. In this case, multiple access schemes designed in the delay-Doppler domain might be more beneficial [Chong2022achievable], as will be detailed in the later sections. For now, we restrict ourselves to OFDM transmission in a static environment, i.e., ICI-free, in which case OFDMA is appealing for multi-user communication. In this case, the received signal in subcarrier m𝑚mitalic_m, m{1,,M}for-all𝑚1𝑀\forall m\in\{1,\ldots,M\}∀ italic_m ∈ { 1 , … , italic_M }, at the BS is given by

{𝐲}m=k=1Kdk=1Dk{𝚷k}mdk{𝐇k}mmpkdk{𝐬Ωk}dk+{𝐳}m,m.subscript𝐲𝑚superscriptsubscript𝑘1𝐾superscriptsubscriptsubscript𝑑𝑘1subscript𝐷𝑘subscriptsubscript𝚷𝑘𝑚subscript𝑑𝑘subscriptsubscript𝐇𝑘𝑚𝑚subscript𝑝𝑘subscript𝑑𝑘subscriptsubscript𝐬subscriptΩ𝑘subscript𝑑𝑘subscript𝐳𝑚for-all𝑚\{\mathbf{y}\}_{m}=\sum_{k=1}^{K}\sum_{d_{k}=1}^{D_{k}}\{\mathbf{\Pi}_{k}\}_{% md_{k}}\{\mathbf{H}_{k}\}_{mm}\sqrt{p_{kd_{k}}}\{\mathbf{s}_{\Omega_{k}}\}_{d_% {k}}+\{\mathbf{z}\}_{m},\forall m.{ bold_y } start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT { bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_m end_POSTSUBSCRIPT square-root start_ARG italic_p start_POSTSUBSCRIPT italic_k italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG { bold_s start_POSTSUBSCRIPT roman_Ω start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT + { bold_z } start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT , ∀ italic_m . (3)

Due to k=1Kdk=1Dk{𝚷k}mdk1superscriptsubscript𝑘1𝐾superscriptsubscriptsubscript𝑑𝑘1subscript𝐷𝑘subscriptsubscript𝚷𝑘𝑚subscript𝑑𝑘1\sum_{k=1}^{K}\sum_{d_{k}=1}^{D_{k}}\{\mathbf{\Pi}_{k}\}_{md_{k}}\leq 1∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT ≤ 1, the multiple data streams of each user can be easily retrieved at the BS based on a simple single-tap FDE, and thus the achievable rate of user k𝑘kitalic_k can be formulated as:

Rk=dk=1Dkm=1M{𝚷k}mdklog2(1+|{𝐇k}mm|2pkdkσ2),k=1,,K.formulae-sequencesubscript𝑅𝑘superscriptsubscriptsubscript𝑑𝑘1subscript𝐷𝑘superscriptsubscript𝑚1𝑀subscriptsubscript𝚷𝑘𝑚subscript𝑑𝑘subscript21superscriptsubscriptsubscript𝐇𝑘𝑚𝑚2subscript𝑝𝑘subscript𝑑𝑘superscript𝜎2for-all𝑘1𝐾{R}_{k}=\sum_{d_{k}=1}^{D_{k}}\sum_{m=1}^{M}\{\mathbf{\Pi}_{k}\}_{md_{k}}\log_% {2}\left(1+\frac{\left|\{\mathbf{H}_{k}\}_{mm}\right|^{2}p_{kd_{k}}}{\sigma^{2% }}\right),\forall k=1,\ldots,K.italic_R start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_m = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( 1 + divide start_ARG | { bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_m end_POSTSUBSCRIPT | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_p start_POSTSUBSCRIPT italic_k italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG start_ARG italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG ) , ∀ italic_k = 1 , … , italic_K . (4)

The resource allocation design challenge is to schedule the data streams of all users and allocate power to each data stream based on the available CSI, for achieving the design goal while taking into the system resource constraints. Note that the user scheduling matrices 𝚷ksubscript𝚷𝑘\mathbf{\Pi}_{k}bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT, kfor-all𝑘\forall k∀ italic_k, need to be designed at the BS in a centralized manner[DerrickEEOFDMA], while the power allocation 𝚲ksubscript𝚲𝑘\mathbf{\Lambda}_{k}bold_Λ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT for user k𝑘kitalic_k can be designed distributively at each user, based on its individual CSI.

II-A3 Downlink Power Domain NOMA

Consider a downlink system where a single-antenna BS serves K𝐾Kitalic_K single-antenna users. Both the BS and users still adopt OFDM modulation and demodulation by dividing the system bandwidth into M𝑀Mitalic_M subcarriers. In this downlink system, the channel matrix in (1) is constituted by 𝐇=[𝐇1,,𝐇K]TMK×M𝐇superscriptsubscript𝐇1subscript𝐇𝐾Tsuperscript𝑀𝐾𝑀\mathbf{H}=\left[\mathbf{H}_{1},\ldots,\mathbf{H}_{K}\right]^{\mathrm{T}}\in% \mathbb{C}^{MK\times M}bold_H = [ bold_H start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , bold_H start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_M italic_K × italic_M end_POSTSUPERSCRIPT and the received signal in (1) is given by 𝐲=[𝐲1T,,𝐲KT]TMK×1𝐲superscriptsubscriptsuperscript𝐲T1subscriptsuperscript𝐲T𝐾Tsuperscript𝑀𝐾1\mathbf{y}=\left[\mathbf{y}^{\rm T}_{1},\ldots,\mathbf{y}^{\rm T}_{K}\right]^{% \mathrm{T}}\in\mathbb{C}^{MK\times 1}bold_y = [ bold_y start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , bold_y start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_M italic_K × 1 end_POSTSUPERSCRIPT, i.e., N=MK𝑁𝑀𝐾N=MKitalic_N = italic_M italic_K, where 𝐇kM×Msubscript𝐇𝑘superscript𝑀𝑀\mathbf{H}_{k}\in\mathbb{C}^{M\times M}bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_M × italic_M end_POSTSUPERSCRIPT and 𝐲kM×1subscript𝐲𝑘superscript𝑀1\mathbf{y}_{k}\in\mathbb{C}^{M\times 1}bold_y start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_M × 1 end_POSTSUPERSCRIPT denote the frequency domain channel matrix between the BS and user k𝑘kitalic_k and the received frequency domain signal at user k𝑘kitalic_k, respectively. In contrast to OFDMA, we consider an overloaded scenario and assume that the BS can schedule only one data stream to transmit for each user, i.e., K=D>M𝐾𝐷𝑀K=D>Mitalic_K = italic_D > italic_M and Dk=1subscript𝐷𝑘1D_{k}=1italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = 1, kfor-all𝑘\forall k∀ italic_k. Thus, power domain NOMA can be adopted to accommodate all the K𝐾Kitalic_K users to form multi-carrier NOMA[Wei2017]. For power-domain NOMA, superimposition coding is adopted at the transmitter [Wei2017, PerGainWei] to multiplex more than one user on each subcarrier while SIC decoding is employed at the user side to mitigate IUI. In this case, the input-output relationship in (1) can be specified as

𝐲k=𝐇k𝚷𝚲𝐬+𝐳k,k,subscript𝐲𝑘subscript𝐇𝑘𝚷𝚲𝐬subscript𝐳𝑘for-all𝑘\mathbf{y}_{k}=\mathbf{H}_{k}\mathbf{\Pi}\mathbf{\Lambda}\mathbf{s}+\mathbf{z}% _{k},\forall k,bold_y start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_Π bold_Λ bold_s + bold_z start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , ∀ italic_k , (5)

where 𝐬K×1𝐬superscript𝐾1\mathbf{s}\in\mathbb{C}^{K\times 1}bold_s ∈ blackboard_C start_POSTSUPERSCRIPT italic_K × 1 end_POSTSUPERSCRIPT collects the information symbols for all the K𝐾Kitalic_K users, 𝐳k𝒞𝒩(𝟎,σk2𝐈M)similar-tosubscript𝐳𝑘𝒞𝒩0subscriptsuperscript𝜎2𝑘subscript𝐈𝑀\mathbf{z}_{k}\sim\mathcal{CN}(\mathbf{0},\sigma^{2}_{k}\mathbf{I}_{M})bold_z start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∼ caligraphic_C caligraphic_N ( bold_0 , italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_I start_POSTSUBSCRIPT italic_M end_POSTSUBSCRIPT ) denotes the noise at user k𝑘kitalic_k with noise power of σk2subscriptsuperscript𝜎2𝑘\sigma^{2}_{k}italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT, and 𝚷𝔹M×K𝚷superscript𝔹𝑀𝐾\mathbf{\Pi}\in\mathbb{B}^{M\times K}bold_Π ∈ blackboard_B start_POSTSUPERSCRIPT italic_M × italic_K end_POSTSUPERSCRIPT denotes the user scheduling matrix at the BS. The diagonal matrix 𝚲𝚲\mathbf{\Lambda}bold_Λ is defined by 𝚲=diag{p1,,pK}K×K𝚲diagsubscript𝑝1subscript𝑝𝐾superscript𝐾𝐾\mathbf{\Lambda}=\operatorname{\mathrm{diag}}\{\sqrt{p_{1}},\ldots,\sqrt{p_{K}% }\}\in\mathbb{R}^{K\times K}bold_Λ = roman_diag { square-root start_ARG italic_p start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_ARG , … , square-root start_ARG italic_p start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT end_ARG } ∈ blackboard_R start_POSTSUPERSCRIPT italic_K × italic_K end_POSTSUPERSCRIPT, where pk0subscript𝑝𝑘0p_{k}\geq 0italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ≥ 0 is the power allocation for user k𝑘kitalic_k at the BS. {𝚷}mk=1subscript𝚷𝑚𝑘1\{\mathbf{\Pi}\}_{mk}=1{ bold_Π } start_POSTSUBSCRIPT italic_m italic_k end_POSTSUBSCRIPT = 1 denotes that user k𝑘kitalic_k is scheduled to subcarrier m𝑚mitalic_m, otherwise {𝚷}mk=0subscript𝚷𝑚𝑘0\{\mathbf{\Pi}\}_{mk}=0{ bold_Π } start_POSTSUBSCRIPT italic_m italic_k end_POSTSUBSCRIPT = 0. More explicitly, the received signal in subcarrier m𝑚mitalic_m at user k𝑘kitalic_k is given by

{𝐲k}m={𝐇k}mm(k=1K{𝚷}mkpk{𝐬}k)+{𝐳k}m.subscriptsubscript𝐲𝑘𝑚subscriptsubscript𝐇𝑘𝑚𝑚superscriptsubscript𝑘1𝐾subscript𝚷𝑚𝑘subscript𝑝𝑘subscript𝐬𝑘subscriptsubscript𝐳𝑘𝑚\{\mathbf{y}_{k}\}_{m}=\{\mathbf{H}_{k}\}_{mm}\left(\sum_{k=1}^{K}\{\mathbf{% \Pi}\}_{mk}\sqrt{p_{k}}\{\mathbf{s}\}_{k}\right)+\{\mathbf{z}_{k}\}_{m}.{ bold_y start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT = { bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_m end_POSTSUBSCRIPT ( ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT { bold_Π } start_POSTSUBSCRIPT italic_m italic_k end_POSTSUBSCRIPT square-root start_ARG italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG { bold_s } start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) + { bold_z start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT . (6)

For power domain NOMA, since more than one user can be scheduled on each subcarrier, i.e., k=1K{𝚷}mk1superscriptsubscript𝑘1𝐾subscript𝚷𝑚𝑘1\sum_{k=1}^{K}\{\mathbf{\Pi}\}_{mk}\geq 1∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT { bold_Π } start_POSTSUBSCRIPT italic_m italic_k end_POSTSUBSCRIPT ≥ 1, achieving IUI-free transmission is not a practical expectation without exploiting extra DoF from other domains. Instead, the power domain NOMA relies on power allocation and SIC decoding by exploiting the channel discrepancies such that the inherent interference can be properly harnessed. According to the principle of power domain NOMA, on subcarrier m𝑚mitalic_m, the power allocation and the SIC decoding order should be determined by the channel gain order[Wei2017]. In particular, denote the user set scheduled on subcarrier m𝑚mitalic_m as 𝒦m={k|{𝚷}mk=1,k}subscript𝒦𝑚conditional-set𝑘subscript𝚷𝑚𝑘1for-all𝑘\mathcal{K}_{m}=\{k|\{\mathbf{\Pi}\}_{mk}=1,\forall k\}caligraphic_K start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT = { italic_k | { bold_Π } start_POSTSUBSCRIPT italic_m italic_k end_POSTSUBSCRIPT = 1 , ∀ italic_k } and without loss of generality their channel gains are sorted {𝐇k}mm{𝐇k}mmsubscriptsubscript𝐇𝑘𝑚𝑚subscriptsubscript𝐇superscript𝑘𝑚𝑚\{\mathbf{H}_{k}\}_{mm}\geq\{\mathbf{H}_{k^{\prime}}\}_{mm}{ bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_m end_POSTSUBSCRIPT ≥ { bold_H start_POSTSUBSCRIPT italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_m end_POSTSUBSCRIPT, k<k𝒦mfor-all𝑘superscript𝑘subscript𝒦𝑚\forall k<k^{\prime}\in\mathcal{K}_{m}∀ italic_k < italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ caligraphic_K start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT. Accordingly, if both users k𝑘kitalic_k and ksuperscript𝑘k^{\prime}italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT are scheduled on subcarrier m𝑚mitalic_m, a higher power is allocated to the user with a lower channel gain, i.e., pkpksubscript𝑝𝑘subscript𝑝superscript𝑘{p}_{k}\leq p_{k^{\prime}}italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ≤ italic_p start_POSTSUBSCRIPT italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT. Also, the user with a higher channel gain always first decodes the information of the user with a lower channel gain before attempting to decode its own information symbol [Tse2005]. The achievable rate for user k𝑘kitalic_k is given by

Rk=m=1M{𝚷}mklog2(1+{𝐇k}mmpkk<k𝒦m{𝐇k}mmpk+σk2),subscript𝑅𝑘superscriptsubscript𝑚1𝑀subscript𝚷𝑚𝑘subscript21subscriptsubscript𝐇𝑘𝑚𝑚subscript𝑝𝑘subscriptsuperscript𝑘𝑘subscript𝒦𝑚subscriptsubscript𝐇𝑘𝑚𝑚subscript𝑝superscript𝑘subscriptsuperscript𝜎2𝑘R_{k}=\sum_{m=1}^{M}\{\mathbf{\Pi}\}_{mk}\log_{2}\left(1+\frac{\{\mathbf{H}_{k% }\}_{mm}p_{k}}{\sum_{k^{\prime}<k\in\mathcal{K}_{m}}\{\mathbf{H}_{k}\}_{mm}p_{% k^{\prime}}+\sigma^{2}_{k}}\right),italic_R start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_m = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT { bold_Π } start_POSTSUBSCRIPT italic_m italic_k end_POSTSUBSCRIPT roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( 1 + divide start_ARG { bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_m end_POSTSUBSCRIPT italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG start_ARG ∑ start_POSTSUBSCRIPT italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT < italic_k ∈ caligraphic_K start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT end_POSTSUBSCRIPT { bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_m end_POSTSUBSCRIPT italic_p start_POSTSUBSCRIPT italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT + italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG ) , (7)

where m=1M{𝚷}mk=1superscriptsubscript𝑚1𝑀subscript𝚷𝑚𝑘1\sum_{m=1}^{M}\{\mathbf{\Pi}\}_{mk}=1∑ start_POSTSUBSCRIPT italic_m = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT { bold_Π } start_POSTSUBSCRIPT italic_m italic_k end_POSTSUBSCRIPT = 1 as each user can only be allocated to at most one subcarrier in the overloaded scenario. Note that user k𝑘kitalic_k suffers from IUI from user k<k𝒦msuperscript𝑘𝑘subscript𝒦𝑚k^{\prime}<k\in\mathcal{K}_{m}italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT < italic_k ∈ caligraphic_K start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT having a stronger channel in subcarrier m𝑚mitalic_m. Particularly, for the strongest user in subcarrier m𝑚mitalic_m, it needs to perform |𝒦m|1subscript𝒦𝑚1|\mathcal{K}_{m}|-1| caligraphic_K start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT | - 1 steps SIC and then decodes its own information. As a result, IUI-free decoding is realized for this user, and its achievable rate is given by

Rk=m=1M{𝚷}mklog2(1+{𝐇k}mmpkσk2).subscript𝑅𝑘superscriptsubscript𝑚1𝑀subscript𝚷𝑚𝑘subscript21subscriptsubscript𝐇𝑘𝑚𝑚subscript𝑝𝑘subscriptsuperscript𝜎2𝑘R_{k}=\sum_{m=1}^{M}\{\mathbf{\Pi}\}_{mk}\log_{2}\left(1+\frac{\{\mathbf{H}_{k% }\}_{mm}p_{k}}{\sigma^{2}_{k}}\right).italic_R start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_m = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT { bold_Π } start_POSTSUBSCRIPT italic_m italic_k end_POSTSUBSCRIPT roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( 1 + divide start_ARG { bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_m end_POSTSUBSCRIPT italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG start_ARG italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG ) . (8)

The resource allocation for downlink power domain NOMA is performed at the BS in a centralized manner and its task is to schedule users and to allocate power based on the CSI of all the K𝐾Kitalic_K users, i.e., 𝐇1,,𝐇Ksubscript𝐇1subscript𝐇𝐾\mathbf{H}_{1},\ldots,\mathbf{H}_{K}bold_H start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , bold_H start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT, for realizing a certain system design goal.

II-A4 Uplink DDMA

OTFS modulation is a recently proposed multi-carrier waveform that aims to provide reliable communication over time-varying channels [Hadani2017orthogonal, ZhiqiangLetterPartI, ShuangyangLetterPartII, WeijieLetterPartIII]. In contrast to the conventional OFDM waveform, OTFS modulates information symbols in the delay-Doppler (DD) domain [Yuan2023survey, Yuan2019simple], offering a distinct approach to signal processing and transmission. As a result, OTFS modulation can effectively exploit the DD domain channel properties, including quasi-static, compactness, potential sparsity, and separability [Zhiqiang_magzine], which enables numerous advanced designs in various wireless applications [Mengmeng2023P2PMIMO, Ruoxi2023Globecom, Shuangyang_ISAC, Weijie2021JSTSP, Chang2023Predictive]. Notably, the coupling between the DD domain channel and the information symbols is characterized by the “twisted convolution” [Shuangyang2023Globecom, LSY_THP, Zhiqiang2022off], a specialized form of convolution that incorporates an additional phase term. The convolution nature of the DD domain channel naturally provides new design challenges and opportunities for NGMA.

Refer to caption
Figure 2: An illustration of DDMA with K=6𝐾6K=6italic_K = 6 users.

Let us consider an uplink multi-user transmission leveraging OTFS waveform with K𝐾Kitalic_K users and the channel between each user and the BS has P𝑃Pitalic_P independent resolvable paths. For the sake of illustration, both the BS and K𝐾Kitalic_K users are equipped with a single antenna. We define a DD grid of size M~×N~~𝑀~𝑁{\tilde{M}}\times{\tilde{N}}over~ start_ARG italic_M end_ARG × over~ start_ARG italic_N end_ARG for accommodating information symbols, which corresponds to a time-frequency (TF) grid with M~~𝑀{\tilde{M}}over~ start_ARG italic_M end_ARG subcarriers and N~~𝑁\tilde{N}over~ start_ARG italic_N end_ARG time slots. Besides, we consider the case of DDMA [Chong2022achievable], where each user’s information symbols are placed along the whole Doppler dimension but with a specific delay, i.e., each user occupies a row in the DD grid, as shown in Fig. 2. Notice that the coupling relationship between channel and information in the DD domain is convolutional in nature[Hadani2017orthogonal]. Particularly, we shall notice that each user’s data will spread to lmaxsubscript𝑙l_{\max}italic_l start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT adjacent rows due to the channel delay. Here, lmaxsubscript𝑙l_{\max}italic_l start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT denotes the maximum delay index that is computed as the ratio between the maximum delay spread and the delay resolution T/M~𝑇~𝑀T/{\tilde{M}}italic_T / over~ start_ARG italic_M end_ARG, where T𝑇Titalic_T denotes the duration of one time-slot (corresponding to the duration of an OFDM symbol). Specifically, the symbol multiplexing for user k𝑘kitalic_k can be characterized by the indicator matrix 𝚷kM~N~×N~subscript𝚷𝑘~𝑀~𝑁~𝑁{\bf\Pi}_{k}\in{\tilde{M}\tilde{N}\times\tilde{N}}bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ over~ start_ARG italic_M end_ARG over~ start_ARG italic_N end_ARG × over~ start_ARG italic_N end_ARG, kfor-all𝑘\forall k∀ italic_k, associated for each user [Chong2022achievable], which maps the information symbols to the k𝑘kitalic_k-th row of the DD grid. Thus, we have D=N~𝐷~𝑁D=\tilde{N}italic_D = over~ start_ARG italic_N end_ARG and N=M~N~𝑁~𝑀~𝑁N=\tilde{M}\tilde{N}italic_N = over~ start_ARG italic_M end_ARG over~ start_ARG italic_N end_ARG. We adopt 𝐇kM~N~×M~N~subscript𝐇𝑘superscript~𝑀~𝑁~𝑀~𝑁{\bf H}_{k}\in{\mathbb{C}}^{\tilde{M}\tilde{N}\times\tilde{M}\tilde{N}}bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT over~ start_ARG italic_M end_ARG over~ start_ARG italic_N end_ARG × over~ start_ARG italic_M end_ARG over~ start_ARG italic_N end_ARG end_POSTSUPERSCRIPT denoting the DD domain channel matrix between user k𝑘kitalic_k to the BS such that M=M~N~𝑀~𝑀~𝑁M=\tilde{M}\tilde{N}italic_M = over~ start_ARG italic_M end_ARG over~ start_ARG italic_N end_ARG. Thus, the input-output relationship in (1) is further specified by

𝐲=k=1Kpk𝐇k𝚷k𝐬k+𝐳,𝐲superscriptsubscript𝑘1𝐾subscript𝑝𝑘subscript𝐇𝑘subscript𝚷𝑘subscript𝐬𝑘𝐳\mathbf{y}=\sum_{k=1}^{K}\sqrt{p_{k}}\mathbf{H}_{k}\mathbf{\Pi}_{k}\mathbf{s}_% {k}+\mathbf{z},bold_y = ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT square-root start_ARG italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_s start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT + bold_z , (9)

where 𝐬kN~×1subscript𝐬𝑘~𝑁1\mathbf{s}_{k}\in{\tilde{N}\times 1}bold_s start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ over~ start_ARG italic_N end_ARG × 1, kfor-all𝑘\forall k∀ italic_k, is the symbol vector of user k𝑘kitalic_k, pk>0subscript𝑝𝑘0p_{k}>0italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT > 0 is the transmit power of user k𝑘kitalic_k, and the detailed structure of 𝐇ksubscript𝐇𝑘{\bf H}_{k}bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is specified in [Chong2022achievable, li2021cross]. Assuming that the SIC detection is adopted at the BS, i.e., the BS always first decodes information of the stronger user with a higher received signal power while treating the IUI caused by weaker users as noise. By assuming that the users’ received signal power levels are sorted in descending order, i.e., pkTr(𝐇k𝚷k𝚷kH𝐇kH)pkTr(𝐇k𝚷k𝚷kH𝐇kH)subscript𝑝𝑘Trsubscript𝐇𝑘subscript𝚷𝑘subscriptsuperscript𝚷H𝑘subscriptsuperscript𝐇H𝑘subscript𝑝superscript𝑘Trsubscript𝐇superscript𝑘subscript𝚷superscript𝑘subscriptsuperscript𝚷Hsuperscript𝑘subscriptsuperscript𝐇Hsuperscript𝑘p_{k}\operatorname{Tr}\left(\mathbf{H}_{k}\mathbf{\Pi}_{k}\mathbf{\Pi}^{\rm H}% _{k}\mathbf{H}^{\rm H}_{k}\right)\geq p_{k^{\prime}}\operatorname{Tr}\left(% \mathbf{H}_{k^{\prime}}\mathbf{\Pi}_{k^{\prime}}\mathbf{\Pi}^{\rm H}_{k^{% \prime}}\mathbf{H}^{\rm H}_{k^{\prime}}\right)italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT roman_Tr ( bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_Π start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_H start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) ≥ italic_p start_POSTSUBSCRIPT italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT roman_Tr ( bold_H start_POSTSUBSCRIPT italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT bold_Π start_POSTSUBSCRIPT italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT bold_Π start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT bold_H start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ), k<kfor-all𝑘superscript𝑘\forall k<k^{\prime}∀ italic_k < italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, the achievable rate of user k𝑘kitalic_k is given by[Chong2022achievable]

Rk=log2det(𝐈N~+pkIk+σ2𝐇k𝚷k𝚷kH𝐇kH),subscript𝑅𝑘subscript2subscript𝐈~𝑁subscript𝑝𝑘subscript𝐼𝑘superscript𝜎2subscript𝐇𝑘subscript𝚷𝑘superscriptsubscript𝚷𝑘Hsuperscriptsubscript𝐇𝑘H{R_{k}}={\log_{2}}\det\left({{{\bf{I}}_{\tilde{N}}}+\frac{{{p_{k}}}}{{{I_{k}}+% \sigma^{2}}}{{\bf{H}}_{k}}{{\bf{\Pi}}_{k}}{\bf{\Pi}}_{k}^{\rm{H}}{\bf{H}}_{k}^% {\rm{H}}}\right),italic_R start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT roman_det ( bold_I start_POSTSUBSCRIPT over~ start_ARG italic_N end_ARG end_POSTSUBSCRIPT + divide start_ARG italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG start_ARG italic_I start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT + italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT ) , (10)

where the IUI faced by user k𝑘kitalic_k is given by

Ik=1N~Tr(k=k+1Kpk𝐇k𝚷k𝚷kH𝐇kH).subscript𝐼𝑘1~𝑁Trsuperscriptsubscriptsuperscript𝑘𝑘1𝐾subscript𝑝superscript𝑘subscript𝐇superscript𝑘subscript𝚷superscript𝑘superscriptsubscript𝚷superscript𝑘Hsuperscriptsubscript𝐇superscript𝑘HI_{k}=\frac{1}{{\tilde{N}}}{\rm{Tr}}\left({\sum\limits_{k^{\prime}=k+1}^{K}{{p% _{k^{\prime}}}{{\bf{H}}_{k^{\prime}}}{{\bf{\Pi}}_{k^{\prime}}}{\bf{\Pi}}_{k^{% \prime}}^{\rm{H}}{\bf{H}}_{k^{\prime}}^{\rm{H}}}}\right).italic_I start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = divide start_ARG 1 end_ARG start_ARG over~ start_ARG italic_N end_ARG end_ARG roman_Tr ( ∑ start_POSTSUBSCRIPT italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = italic_k + 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT italic_p start_POSTSUBSCRIPT italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT bold_H start_POSTSUBSCRIPT italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT bold_Π start_POSTSUBSCRIPT italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT bold_Π start_POSTSUBSCRIPT italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT bold_H start_POSTSUBSCRIPT italic_k start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT ) . (11)

It should be noted that the rate expression given in (10) is subjected to the specific realization of channel delay, Doppler, and fading coefficients, which is generally challenging to acquire at the user side in uplink transmissions. It was shown in [Chong2022achievable] that the achievable rate in (10) can be tightly upper-bounded by the rate determined by the effective signal-to-interference-plus-noise ratio (SINR) of each user, which is only related to the effective channel gains. More importantly, compared to uplink OFDMA with SIC, a modest achievable rate improvement can be observed thanks to the fact that OTFS is insensitive to delay and Doppler, while OFDMA is prone to substantial channel variability within the TF domain due to the presence of delay and Doppler [Li2020performance, Wei2020transmitter, Shuangyang2021hybrid]. This sensitivity leads to considerable fluctuations in the effective SINR of OFDMA, and consequently decreases the achievable rate.

II-A5 Downlink RSMA

RSMA offers a versatile and generalized non-orthogonal transmission, which presents a dynamic interference management framework that softly bridges SDMA and power domain NOMA, adapting to varying interference levels and specific system requirements[BrunoJSAC].

Here, we consider a narrow-band downlink single-layer linearly precoded RSMA scheme [YijieRSMA] where a multi-antenna BS serves K𝐾Kitalic_K single-antenna users. In this case, the channel matrix in (1) is defined in the spatial domain, the number of antennas at the BS is N𝑁Nitalic_N, and M=K𝑀𝐾M=Kitalic_M = italic_K. Again, in overloaded scenarios, we assume that the BS schedules only one data stream to transmit for each user, i.e., K=D𝐾𝐷K=Ditalic_K = italic_D and Dk=1subscript𝐷𝑘1D_{k}=1italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = 1, kfor-all𝑘\forall k∀ italic_k. The message Wksubscript𝑊𝑘W_{k}italic_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT for user k𝑘kitalic_k is firstly split into two sub-messages, i.e., one common message Wc,ksubscript𝑊c𝑘W_{\mathrm{c},k}italic_W start_POSTSUBSCRIPT roman_c , italic_k end_POSTSUBSCRIPT and one private message Wp,ksubscript𝑊p𝑘W_{\mathrm{p},k}italic_W start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT. The common messages of all the K𝐾Kitalic_K users Wc,1,,Wc,Ksubscript𝑊c1subscript𝑊c𝐾W_{\mathrm{c},1},\ldots,W_{\mathrm{c},K}italic_W start_POSTSUBSCRIPT roman_c , 1 end_POSTSUBSCRIPT , … , italic_W start_POSTSUBSCRIPT roman_c , italic_K end_POSTSUBSCRIPT are combined into one common message Wcsubscript𝑊cW_{\mathrm{c}}italic_W start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT and is encoded into a common data stream scsubscript𝑠cs_{\mathrm{c}}italic_s start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT, which is decoded by all the users. The private sub-messages of all the K𝐾Kitalic_K users Wp,1,,Wp,Ksubscript𝑊p1subscript𝑊p𝐾W_{\mathrm{p},1},\ldots,W_{\mathrm{p},K}italic_W start_POSTSUBSCRIPT roman_p , 1 end_POSTSUBSCRIPT , … , italic_W start_POSTSUBSCRIPT roman_p , italic_K end_POSTSUBSCRIPT are independently encoded into private data streams sp,1,,sp,Ksubscript𝑠p1subscript𝑠p𝐾{s}_{\mathrm{p},1},\ldots,{s}_{\mathrm{p},K}italic_s start_POSTSUBSCRIPT roman_p , 1 end_POSTSUBSCRIPT , … , italic_s start_POSTSUBSCRIPT roman_p , italic_K end_POSTSUBSCRIPT, which are decoded by the corresponding users, respectively. Then, the generated K+1𝐾1K+1italic_K + 1 data streams intended for K𝐾Kitalic_K users are linearly precoded and transmitted to the channel. For the considered downlink single-layer RSMA system, the input-output relationship in (1) can be specified as

𝐲=𝐇(𝐩csc+k=1K𝐩p,ksp,k)+𝐳,𝐲𝐇subscript𝐩csubscript𝑠csuperscriptsubscript𝑘1𝐾subscript𝐩p𝑘subscript𝑠p𝑘𝐳\mathbf{y}=\mathbf{H}\left(\mathbf{p}_{\mathrm{c}}s_{\mathrm{c}}+\sum_{k=1}^{K% }\mathbf{p}_{\mathrm{p},k}{s}_{\mathrm{p},k}\right)+\mathbf{z},bold_y = bold_H ( bold_p start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT italic_s start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT + ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT bold_p start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT italic_s start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT ) + bold_z , (12)

where 𝐲K×1𝐲superscript𝐾1\mathbf{y}\in\mathbb{C}^{K\times 1}bold_y ∈ blackboard_C start_POSTSUPERSCRIPT italic_K × 1 end_POSTSUPERSCRIPT collects the received signal of all the K𝐾Kitalic_K users and 𝐇=[𝐡1,,𝐡K]TK×N𝐇superscriptsubscript𝐡1subscript𝐡𝐾Tsuperscript𝐾𝑁\mathbf{H}=[\mathbf{h}_{1},\ldots,\mathbf{h}_{K}]^{\rm T}\in\mathbb{C}^{K% \times N}bold_H = [ bold_h start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , bold_h start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_K × italic_N end_POSTSUPERSCRIPT collects the channel vectors between the BS and all the users. 𝐩cN×1subscript𝐩csuperscript𝑁1\mathbf{p}_{\mathrm{c}}\in\mathbb{C}^{N\times 1}bold_p start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_N × 1 end_POSTSUPERSCRIPT and 𝐩p,kN×1subscript𝐩p𝑘superscript𝑁1\mathbf{p}_{\mathrm{p},k}\in\mathbb{C}^{N\times 1}bold_p start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_N × 1 end_POSTSUPERSCRIPT, respectively, denote the precoding vectors for the common data stream and the private data stream of user k𝑘kitalic_k, k{1,,K}for-all𝑘1𝐾\forall k\in\{1,\ldots,K\}∀ italic_k ∈ { 1 , … , italic_K }. The received signal at user k𝑘kitalic_k is given by

{𝐲}k=𝐡kH(𝐩csc+k=1K𝐩p,ksp,k)+{𝐳}k.subscript𝐲𝑘superscriptsubscript𝐡𝑘Hsubscript𝐩csubscript𝑠csuperscriptsubscript𝑘1𝐾subscript𝐩p𝑘subscript𝑠p𝑘subscript𝐳𝑘\{\mathbf{y}\}_{k}=\mathbf{h}_{k}^{\mathrm{H}}\left(\mathbf{p}_{\mathrm{c}}s_{% \mathrm{c}}+\sum_{k=1}^{K}\mathbf{p}_{\mathrm{p},k}{s}_{\mathrm{p},k}\right)+% \{\mathbf{z}\}_{k}.{ bold_y } start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT ( bold_p start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT italic_s start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT + ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT bold_p start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT italic_s start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT ) + { bold_z } start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT . (13)

At the receiver side, each user first decodes the common data stream scsubscript𝑠cs_{\mathrm{c}}italic_s start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT into the common message W^csubscript^𝑊c\widehat{W}_{\mathrm{c}}over^ start_ARG italic_W end_ARG start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT and performs SIC to subtract its signal from the received signal while treating the interference from all the private data streams as noise. Then, user k𝑘kitalic_k decodes its private data stream sp,ksubscript𝑠p𝑘{s}_{\mathrm{p},k}italic_s start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT into its private message W^p,ksubscript^𝑊p𝑘\widehat{W}_{\mathrm{p},k}over^ start_ARG italic_W end_ARG start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT by treating the remaining interference from other private data streams as noise. After decoding the private message, user k𝑘kitalic_k reconstructs the original message by extracting Wc,ksubscript𝑊c𝑘W_{\mathrm{c},k}italic_W start_POSTSUBSCRIPT roman_c , italic_k end_POSTSUBSCRIPT from Wcsubscript𝑊cW_{\mathrm{c}}italic_W start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT and combining Wc,ksubscript𝑊c𝑘W_{\mathrm{c},k}italic_W start_POSTSUBSCRIPT roman_c , italic_k end_POSTSUBSCRIPT with Wp,ksubscript𝑊p𝑘W_{\mathrm{p},k}italic_W start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT into Wksubscript𝑊𝑘W_{k}italic_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT. Based on the above procedure, the instantaneous rates for decoding the common and private data streams at user k𝑘kitalic_k are given by

Rc,ksubscript𝑅c𝑘\displaystyle{R}_{\mathrm{c},k}italic_R start_POSTSUBSCRIPT roman_c , italic_k end_POSTSUBSCRIPT =log2(1+|𝐡kH𝐩c|2j=1K|𝐡kH𝐩p,j|2+σk2)andabsentsubscript21superscriptsuperscriptsubscript𝐡𝑘Hsubscript𝐩c2superscriptsubscript𝑗1𝐾superscriptsuperscriptsubscript𝐡𝑘Hsubscript𝐩p𝑗2subscriptsuperscript𝜎2𝑘and\displaystyle=\log_{2}\left(1+\frac{|\mathbf{h}_{k}^{\mathrm{H}}\mathbf{p}_{% \mathrm{c}}|^{2}}{\sum_{j=1}^{K}|\mathbf{h}_{k}^{\mathrm{H}}\mathbf{p}_{% \mathrm{p},j}|^{2}+\sigma^{2}_{k}}\right)\;\text{and}= roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( 1 + divide start_ARG | bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT bold_p start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT | bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT bold_p start_POSTSUBSCRIPT roman_p , italic_j end_POSTSUBSCRIPT | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG ) and (14)
Rp,ksubscript𝑅p𝑘\displaystyle R_{\mathrm{p},k}italic_R start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT =log2(1+|𝐡kH𝐩p,k|2jkK|𝐡kH𝐩p,j|2+σk2),absentsubscript21superscriptsuperscriptsubscript𝐡𝑘Hsubscript𝐩p𝑘2superscriptsubscript𝑗𝑘𝐾superscriptsuperscriptsubscript𝐡𝑘Hsubscript𝐩p𝑗2subscriptsuperscript𝜎2𝑘\displaystyle=\log_{2}\left(1+\frac{|\mathbf{h}_{k}^{\mathrm{H}}\mathbf{p}_{% \mathrm{p},k}|^{2}}{\sum_{j\neq k}^{K}|\mathbf{h}_{k}^{\mathrm{H}}\mathbf{p}_{% \mathrm{p},j}|^{2}+\sigma^{2}_{k}}\right),= roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( 1 + divide start_ARG | bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT bold_p start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG ∑ start_POSTSUBSCRIPT italic_j ≠ italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT | bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT bold_p start_POSTSUBSCRIPT roman_p , italic_j end_POSTSUBSCRIPT | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG ) , (15)

respectively. Note that the achievable rate for the common message cannot exceed {𝐑}c,ksubscript𝐑c𝑘\{\mathbf{R}\}_{\mathrm{c},k}{ bold_R } start_POSTSUBSCRIPT roman_c , italic_k end_POSTSUBSCRIPT, such that all the users can decode scsubscript𝑠cs_{\mathrm{c}}italic_s start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT successfully, i.e.,

Rc=min{Rc,1,,Rc,K}.subscript𝑅csubscript𝑅c1subscript𝑅c𝐾R_{\mathrm{c}}=\min\{{R}_{\mathrm{c},1},\ldots,{R}_{\mathrm{c},K}\}.italic_R start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT = roman_min { italic_R start_POSTSUBSCRIPT roman_c , 1 end_POSTSUBSCRIPT , … , italic_R start_POSTSUBSCRIPT roman_c , italic_K end_POSTSUBSCRIPT } . (16)

Without loss of generality, let Cksubscript𝐶𝑘C_{k}italic_C start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT denote the common rate allocation to user k𝑘kitalic_k for Wc,ksubscript𝑊c𝑘W_{\mathrm{c},k}italic_W start_POSTSUBSCRIPT roman_c , italic_k end_POSTSUBSCRIPT. The overall achievable rate for user k𝑘kitalic_k includes both the common rate Cksubscript𝐶𝑘C_{k}italic_C start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT and the private rate Rp,ksubscript𝑅p𝑘R_{\mathrm{p},k}italic_R start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT, i.e.,

Rk=Rp,k+Ck.subscript𝑅𝑘subscript𝑅p𝑘subscript𝐶𝑘R_{k}=R_{\mathrm{p},k}+C_{k}.italic_R start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = italic_R start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT + italic_C start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT . (17)

The resource allocation for downlink single-layer RSMA is also performed at the BS in a centralized manner. The resource allocation aims to design the precoding vectors and the common rate allocation based on the CSI of all the K𝐾Kitalic_K users to achieve a specific system design objective.

In summary, the choice of domain for defining the channel matrix 𝐇𝐇\mathbf{H}bold_H significantly influences the specification of the signal generation function 𝐠()𝐠\mathbf{g}(\cdot)bold_g ( ⋅ ). Indeed, the domain of 𝐇𝐇\mathbf{H}bold_H sets the foundation for the overall NGMA framework, while 𝐠()𝐠\mathbf{g}(\cdot)bold_g ( ⋅ ) specifies the particular NGMA scheme to employ. More importantly, both 𝐇𝐇\mathbf{H}bold_H and 𝐠()𝐠\mathbf{g}(\cdot)bold_g ( ⋅ ) are indicative of the available system resources that can be allocated, which determine the problem formulation and establish the resource allocation design DoF for improving the system performance.

II-B NGMA in Reconfigurable Channels

Although the previously discussed NGMA schemes can efficiently enhance the performance of multi-user communication systems, their efficiency in practical systems is not always guaranteed, especially in challenging radio propagation environments [Ding2015b, Lei2016NOMA, 9679390]. In particular, due to the random and dynamic nature of radio propagation environments, some users may experience adverse channel conditions such as fast fading in high-mobility communication scenarios or severe attenuation due to the absence of line-of-sight (LoS) link caused by the existence of blockages. Under such circumstances, the QoS requirements of the users, e.g., achievable rate or SINR, might not be satisfied, despite the deployment of OMA, NOMA, or RSMA schemes.

II-B1 A Unified Framework for NGMA in Reconfigurable Channels

Recently, several promising techniques have been proposed to proactively configure wireless channels, aiming to mitigate the issues mentioned earlier. By customizing the radio propagation environment, these approaches facilitate the creation of favorable wireless channel conditions for multiple access, thereby inherently overcoming the obstacles faced by NGMA communication systems. Generally, the NGMA model for reconfigurable channels is described by

𝐲=𝐇(𝚽)𝐠(𝐬)+𝐳,𝐲𝐇𝚽𝐠𝐬𝐳\mathbf{y}=\mathbf{H}\left(\mathbf{\Phi}\right)\mathbf{g}(\mathbf{s})+\mathbf{% z},bold_y = bold_H ( bold_Φ ) bold_g ( bold_s ) + bold_z , (18)

where 𝚽𝚽\mathbf{\Phi}bold_Φ is the channel reconfiguration variable and its dimension is determined by the specific type of channel reconfiguration techniques. In this scenario, the method of multiple access and the resource allocation among multiple users, i.e., the vector function 𝐠(𝐬)𝐠𝐬\mathbf{g}(\mathbf{s})bold_g ( bold_s ), can be jointly designed with the channel reconfiguration variable 𝚽𝚽\mathbf{\Phi}bold_Φ. Particularly, the system resources can be utilized strategically to enhance the system performance based on specific QoS requirements. Different from the fixed conditions for natural channels, the reconfigurable channel condition enabled by 𝚽𝚽\mathbf{\Phi}bold_Φ introduces greater flexibility in designing NGMA schemes. Consequently, the focus of resource allocation optimization problems shifts from merely determining an efficient strategy, 𝐠(𝐬)𝐠𝐬\mathbf{g}(\mathbf{s})bold_g ( bold_s ), for a given fixed radio propagation environment to jointly designing both the strategy 𝐠(𝐬)𝐠𝐬\mathbf{g}(\mathbf{s})bold_g ( bold_s ) and the wireless channel 𝐇(𝚽)𝐇𝚽\mathbf{H}\left(\mathbf{\Phi}\right)bold_H ( bold_Φ ). From a mathematical perspective, the former scenario is essentially a subset of the latter case. With this concept in mind, it is crystal clear that the potential for performance enhancement is greater when the overall channel is properly reconfigured by smartly designing 𝚽𝚽\mathbf{\Phi}bold_Φ. In particular, in practical scenarios where Dmin{N,M}𝐷𝑁𝑀D\leq\min\{N,M\}italic_D ≤ roman_min { italic_N , italic_M }, the original system resources are sufficient to accommodate all the K𝐾Kitalic_K users, OMA schemes remain to be an efficient approach to serve all the K𝐾Kitalic_K users. As such, the extra design DoF can be leveraged to establish more favorable radio propagation environments to achieve desired system design objectives. As such, resha** each user’s channel is possible such that the orthogonality among channels can be maintained, facilitating the mitigation of IUI. On the other hand, when the original system DoF of the natural channel is limited, i.e., D>min{N,M}𝐷𝑁𝑀D>\min\{N,M\}italic_D > roman_min { italic_N , italic_M }, the additional design DoF introduced by 𝚽𝚽\mathbf{\Phi}bold_Φ becomes crucial. It enables the creation of a more favorable radio propagation environment for NOMA or hybrid NOMA. In particular, by fine-tuning the channel gains, the user paring policy in NOMA or hybrid NOMA can be designed more flexibly and appropriately, potentially enhancing the system performance.

In the following, we will briefly introduce several promising emerging techniques in the literature that can be exploited to shape desired radio propagation environments.

II-B2 NGMA in UAV-Assisted Communication

Equip** UAVs with communication transceivers introduces the capability to establish air-to-ground NGMA links, which can significantly enhance system performance. Compared to conventional cellular systems that rely on fixed terrestrial infrastructure [wong2017key, you2021towards], UAV-assisted communication systems offer on-demand connectivity by deploying UAV-mounted wireless transceivers flexibly over a target area. This flexibility is particularly useful in emergency situations, such as natural disasters and major accidents, where UAVs can be leveraged as aerial base stations to establish temporary communication links quickly and cost-effectively [8663615]. Additionally, the high mobility and maneuverability of UAVs allow them to adapt their trajectories based on the environment and terrain variations, thus improving system performance. By properly optimizing the UAV trajectories, we can place new communication nodes at desired locations to facilitate certain optimal wireless channel conditions for NGMA schemes. Therefore, UAV-assisted communication systems offer a promising solution for providing connectivity in remote or hard-to-reach areas, emergency situations, and other scenarios where traditional infrastructure may be unavailable or insufficient.

Next, to illustrate the above advantages, we consider a toy example where a UAV-mounted BS is equipped with a uniform planar array (UPA) composing Nx×Nysubscript𝑁𝑥subscript𝑁𝑦N_{x}\times N_{y}italic_N start_POSTSUBSCRIPT italic_x end_POSTSUBSCRIPT × italic_N start_POSTSUBSCRIPT italic_y end_POSTSUBSCRIPT antenna elements, i.e., N=NxNy𝑁subscript𝑁𝑥subscript𝑁𝑦N=N_{x}N_{y}italic_N = italic_N start_POSTSUBSCRIPT italic_x end_POSTSUBSCRIPT italic_N start_POSTSUBSCRIPT italic_y end_POSTSUBSCRIPT, and serves a group of K𝐾Kitalic_K single-antenna users. In such a case, the reconfigurable channel between the UAV and user k𝑘kitalic_k is given by [8445944]

𝐡k=ϱ𝐫0𝐫k1𝐚k.subscript𝐡𝑘italic-ϱsuperscriptnormsubscript𝐫0subscript𝐫𝑘1subscript𝐚𝑘\mathbf{h}_{k}=\sqrt{\varrho}\left\|\mathbf{r}_{0}-\mathbf{r}_{k}\right\|^{-1}% \mathbf{a}_{k}.bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = square-root start_ARG italic_ϱ end_ARG ∥ bold_r start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT - bold_r start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT bold_a start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT . (19)

Here, ϱ=(c4πfc)2italic-ϱsuperscript𝑐4𝜋subscript𝑓𝑐2\varrho=(\frac{c}{4\pi f_{c}})^{2}italic_ϱ = ( divide start_ARG italic_c end_ARG start_ARG 4 italic_π italic_f start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT end_ARG ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT is a constant determined by the speed of light c𝑐citalic_c and the carrier frequency fcsubscript𝑓𝑐f_{c}italic_f start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT. Moreover, variables 𝐫0=[x0,y0,H0]Tsubscript𝐫0superscriptsubscript𝑥0subscript𝑦0subscript𝐻0T\mathbf{r}_{0}=[x_{0},~{}y_{0},~{}H_{0}]^{\mathrm{T}}bold_r start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT = [ italic_x start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT , italic_H start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT and 𝐫k=[xk,yk,0]Tsubscript𝐫𝑘superscriptsubscript𝑥𝑘subscript𝑦𝑘0T\mathbf{r}_{k}=[x_{k},~{}y_{k},~{}0]^{\mathrm{T}}bold_r start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = [ italic_x start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , 0 ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT indicate the three-dimensional (3D) Cartesian coordinates of the UAV and user k𝑘kitalic_k, respectively, where H0subscript𝐻0H_{0}italic_H start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT is the fixed altitude of the UAV. Furthermore, the term ϱ𝐫0𝐫k1italic-ϱsuperscriptnormsubscript𝐫0subscript𝐫𝑘1\sqrt{\varrho}\left\|\mathbf{r}_{0}-\mathbf{r}_{k}\right\|^{-1}square-root start_ARG italic_ϱ end_ARG ∥ bold_r start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT - bold_r start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT and vector 𝐚kN×1subscript𝐚𝑘superscript𝑁1\mathbf{a}_{k}\in\mathbb{C}^{{N}\times 1}bold_a start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_N × 1 end_POSTSUPERSCRIPT represent the channel gain between the UAV and user k𝑘kitalic_k and the corresponding antenna array response (AAR), respectively. Specifically, vector 𝐚ksubscript𝐚𝑘\mathbf{a}_{k}bold_a start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is expressed as [8974403]

𝐚ksubscript𝐚𝑘\displaystyle\mathbf{a}_{k}bold_a start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT =(1,,ej2πbfccsinθk(nx1)cosφk,,ej2πbfccsinθk(Nx1)cosφk)absent1superscript𝑒𝑗2𝜋𝑏subscript𝑓𝑐𝑐sinsubscript𝜃𝑘subscript𝑛𝑥1cossubscript𝜑𝑘superscript𝑒𝑗2𝜋𝑏subscript𝑓𝑐𝑐sinsubscript𝜃𝑘subscript𝑁𝑥1cossubscript𝜑𝑘\displaystyle=\big{(}1,\ldots,e^{-j\frac{2\pi bf_{c}}{c}\mathrm{sin}\theta_{k}% (n_{x}-1)\mathrm{cos}\varphi_{k}},\ldots,e^{-j\frac{2\pi bf_{c}}{c}\mathrm{sin% }\theta_{k}(N_{x}-1)\mathrm{cos}\varphi_{k}}\big{)}= ( 1 , … , italic_e start_POSTSUPERSCRIPT - italic_j divide start_ARG 2 italic_π italic_b italic_f start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT end_ARG start_ARG italic_c end_ARG roman_sin italic_θ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ( italic_n start_POSTSUBSCRIPT italic_x end_POSTSUBSCRIPT - 1 ) roman_cos italic_φ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT , … , italic_e start_POSTSUPERSCRIPT - italic_j divide start_ARG 2 italic_π italic_b italic_f start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT end_ARG start_ARG italic_c end_ARG roman_sin italic_θ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ( italic_N start_POSTSUBSCRIPT italic_x end_POSTSUBSCRIPT - 1 ) roman_cos italic_φ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT ) (20)
(1,,ej2πbfccsinθk(ny1)sinφk,,ej2πbfccsinθk(Ny1)sinφk)tensor-productabsent1superscript𝑒𝑗2𝜋𝑏subscript𝑓𝑐𝑐sinsubscript𝜃𝑘subscript𝑛𝑦1sinsubscript𝜑𝑘superscript𝑒𝑗2𝜋𝑏subscript𝑓𝑐𝑐sinsubscript𝜃𝑘subscript𝑁𝑦1sinsubscript𝜑𝑘\displaystyle\otimes\big{(}1,\ldots,e^{-j\frac{2\pi bf_{c}}{c}\mathrm{sin}% \theta_{k}(n_{y}-1)\mathrm{sin}\varphi_{k}},\ldots,e^{-j\frac{2\pi bf_{c}}{c}% \mathrm{sin}\theta_{k}(N_{y}-1)\mathrm{sin}\varphi_{k}}\big{)}⊗ ( 1 , … , italic_e start_POSTSUPERSCRIPT - italic_j divide start_ARG 2 italic_π italic_b italic_f start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT end_ARG start_ARG italic_c end_ARG roman_sin italic_θ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ( italic_n start_POSTSUBSCRIPT italic_y end_POSTSUBSCRIPT - 1 ) roman_sin italic_φ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT , … , italic_e start_POSTSUPERSCRIPT - italic_j divide start_ARG 2 italic_π italic_b italic_f start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT end_ARG start_ARG italic_c end_ARG roman_sin italic_θ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ( italic_N start_POSTSUBSCRIPT italic_y end_POSTSUBSCRIPT - 1 ) roman_sin italic_φ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT )
=Δ𝐚(θk,φk),Δ𝐚subscript𝜃𝑘subscript𝜑𝑘\displaystyle\overset{\Delta}{=}\mathbf{a}\big{(}\theta_{k},\varphi_{k}\big{)},overroman_Δ start_ARG = end_ARG bold_a ( italic_θ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , italic_φ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) ,

where b𝑏bitalic_b is the antenna spacing, and indices nxsubscript𝑛𝑥n_{x}italic_n start_POSTSUBSCRIPT italic_x end_POSTSUBSCRIPT and nysubscript𝑛𝑦n_{y}italic_n start_POSTSUBSCRIPT italic_y end_POSTSUBSCRIPT denote the rows and columns of the UPA, respectively. Moreover, variables θksubscript𝜃𝑘\theta_{k}italic_θ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT and φksubscript𝜑𝑘\varphi_{k}italic_φ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT represent the vertical and horizontal angle-of-departures between the UAV and user k𝑘kitalic_k, respectively. As can be seen from the above channel model 𝐡ksubscript𝐡𝑘\mathbf{h}_{k}bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT, the channel is reconfigured by varying the location of the UAV. As such, the position of the UAV 𝐫0subscript𝐫0\mathbf{r}_{0}bold_r start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT and the corresponding AAR vector 𝐚ksubscript𝐚𝑘\mathbf{a}_{k}bold_a start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT can be regarded as the channel reconfigure variable 𝚽𝚽\mathbf{\Phi}bold_Φ in (18).

In the t𝑡titalic_t-th time slot, the received signal of user k𝑘kitalic_k is given by

yk[t]=ϱ𝐫0[t]𝐫k1𝐚kH[t]𝐩k[t]sk[t]desiredsignal+r𝒦{k}ϱ𝐫0[t]𝐫k1𝐚kH[t]𝐩r[t]sr[t]IUI+zk[t],subscript𝑦𝑘delimited-[]𝑡desiredsignalitalic-ϱsuperscriptnormsubscript𝐫0delimited-[]𝑡subscript𝐫𝑘1subscriptsuperscript𝐚𝐻𝑘delimited-[]𝑡subscript𝐩𝑘delimited-[]𝑡subscript𝑠𝑘delimited-[]𝑡IUI𝑟𝒦𝑘italic-ϱsuperscriptnormsubscript𝐫0delimited-[]𝑡subscript𝐫𝑘1subscriptsuperscript𝐚𝐻𝑘delimited-[]𝑡subscript𝐩𝑟delimited-[]𝑡subscript𝑠𝑟delimited-[]𝑡subscript𝑧𝑘delimited-[]𝑡y_{k}[t]=\underset{\mathrm{desired~{}signal}}{\underbrace{\sqrt{\varrho}\left% \|\mathbf{r}_{0}[t]-\mathbf{r}_{k}\right\|^{-1}\mathbf{a}^{H}_{k}[t]\mathbf{p}% _{k}[t]s_{k}[t]}}+\underset{\mathrm{IUI}}{\underbrace{\underset{r\in\mathcal{K% }\setminus\left\{k\right\}}{\sum}\sqrt{\varrho}\left\|\mathbf{r}_{0}[t]-% \mathbf{r}_{k}\right\|^{-1}\mathbf{a}^{H}_{k}[t]\mathbf{p}_{r}[t]s_{r}[t]}}+z_% {k}[t],italic_y start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] = start_UNDERACCENT roman_desired roman_signal end_UNDERACCENT start_ARG under⏟ start_ARG square-root start_ARG italic_ϱ end_ARG ∥ bold_r start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT [ italic_t ] - bold_r start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT bold_a start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] italic_s start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] end_ARG end_ARG + underroman_IUI start_ARG under⏟ start_ARG start_UNDERACCENT italic_r ∈ caligraphic_K ∖ { italic_k } end_UNDERACCENT start_ARG ∑ end_ARG square-root start_ARG italic_ϱ end_ARG ∥ bold_r start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT [ italic_t ] - bold_r start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT bold_a start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] bold_p start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT [ italic_t ] italic_s start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT [ italic_t ] end_ARG end_ARG + italic_z start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] , (21)

where zk[t]𝒞𝒩(0,σk2)similar-tosubscript𝑧𝑘delimited-[]𝑡𝒞𝒩0subscriptsuperscript𝜎2𝑘z_{k}[t]\sim\mathcal{CN}(0,\sigma^{2}_{k})italic_z start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] ∼ caligraphic_C caligraphic_N ( 0 , italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) and 𝐩k[t]N×1subscript𝐩𝑘delimited-[]𝑡superscript𝑁1\mathbf{p}_{k}[t]\in\mathbb{C}^{N\times 1}bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] ∈ blackboard_C start_POSTSUPERSCRIPT italic_N × 1 end_POSTSUPERSCRIPT is the precoding vector for user k𝑘kitalic_k in the t𝑡titalic_t-th time slot, k{1,,K}for-all𝑘1𝐾\forall k\in\{1,\ldots,K\}∀ italic_k ∈ { 1 , … , italic_K }. For UAV-assisted NGMA systems, the position of the UAV, i.e., 𝐫0[t]subscript𝐫0delimited-[]𝑡\mathbf{r}_{0}[t]bold_r start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT [ italic_t ], can be jointly designed with beamforming vector 𝐩k[t]subscript𝐩𝑘delimited-[]𝑡\mathbf{p}_{k}[t]bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] to facilitate the implementation of NGMA schemes [8918497, 8648498]. On the other hand, according to the SIC principle for NOMA, strong users will first decode the information of the weaker users to avoid the interference caused. In particular, user k𝑘kitalic_k will first detect and remove the information signals of user r𝑟ritalic_r (r>k𝑟𝑘r>kitalic_r > italic_k) successively, and then the signal dedicated to user k𝑘kitalic_k is detected by treating the rest of the users’ signals as noise. To model this, we define a binary variable αk,r[t]{0,1}subscript𝛼𝑘𝑟delimited-[]𝑡01\alpha_{k,r}[t]\in\{0,1\}italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT [ italic_t ] ∈ { 0 , 1 }, kr𝒦for-all𝑘𝑟𝒦\forall k\neq r\in\mathcal{K}∀ italic_k ≠ italic_r ∈ caligraphic_K, to represent the SIC decoding order of users k𝑘kitalic_k and r𝑟ritalic_r in the t𝑡titalic_t-th time slot. For the case αk,r[t]=0subscript𝛼𝑘𝑟delimited-[]𝑡0\alpha_{k,r}[t]=0italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT [ italic_t ] = 0, we assume that user k𝑘kitalic_k will perform SIC to eliminate the signal intended for user r𝑟ritalic_r. For the case αk,r[t]=1subscript𝛼𝑘𝑟delimited-[]𝑡1\alpha_{k,r}[t]=1italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT [ italic_t ] = 1, we assume that user k𝑘kitalic_k will treat user r𝑟ritalic_r’s signal as noise. In addition, we should guarantee that αk,r[t]+αr,k[t]=1subscript𝛼𝑘𝑟delimited-[]𝑡subscript𝛼𝑟𝑘delimited-[]𝑡1\alpha_{k,r}[t]+\alpha_{r,k}[t]=1italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT [ italic_t ] + italic_α start_POSTSUBSCRIPT italic_r , italic_k end_POSTSUBSCRIPT [ italic_t ] = 1 since it is not reasonable to mutually implement SIC at both users [8114722, 7973146]. The received SINR of user k𝑘kitalic_k is given by

Γk[t]=ϱ𝐫0[t]𝐫k2|𝐚kH[t]𝐩k[t]|2r𝒦{k}αk,rϱ𝐫0[t]𝐫k2|𝐚kH[t]𝐩r[t]|2+σk2.subscriptΓ𝑘delimited-[]𝑡italic-ϱsuperscriptnormsubscript𝐫0delimited-[]𝑡subscript𝐫𝑘2superscriptsubscriptsuperscript𝐚𝐻𝑘delimited-[]𝑡subscript𝐩𝑘delimited-[]𝑡2𝑟𝒦𝑘subscript𝛼𝑘𝑟italic-ϱsuperscriptnormsubscript𝐫0delimited-[]𝑡subscriptsuperscript𝐫𝑘2superscriptsubscriptsuperscript𝐚𝐻𝑘delimited-[]𝑡subscript𝐩𝑟delimited-[]𝑡2subscriptsuperscript𝜎2𝑘\Gamma_{k}[t]={\frac{\frac{\varrho}{\left\|\mathbf{r}_{0}[t]-\mathbf{r}_{k}% \right\|^{2}}\left|{\mathbf{a}^{H}_{k}[t]}\mathbf{p}_{k}[t]\right|^{2}}{% \underset{r\in\mathcal{K}\setminus\left\{k\right\}}{\sum}\alpha_{k,r}\frac{% \varrho}{\left\|\mathbf{r}_{0}[t]-\mathbf{r}^{\prime}_{k}\right\|^{2}}{\left|{% \mathbf{a}^{H}_{k}[t]}\mathbf{p}_{r}[t]\right|^{2}}+\sigma^{2}_{k}}}.roman_Γ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] = divide start_ARG divide start_ARG italic_ϱ end_ARG start_ARG ∥ bold_r start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT [ italic_t ] - bold_r start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG | bold_a start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG start_UNDERACCENT italic_r ∈ caligraphic_K ∖ { italic_k } end_UNDERACCENT start_ARG ∑ end_ARG italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT divide start_ARG italic_ϱ end_ARG start_ARG ∥ bold_r start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT [ italic_t ] - bold_r start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG | bold_a start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] bold_p start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT [ italic_t ] | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG . (22)

As can be seen from the above equation, for UAV-assisted NGMA systems, the position of the UAV 𝐫0subscript𝐫0\mathbf{r}_{0}bold_r start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT can be jointly designed with the transmit precoding 𝐩ksubscript𝐩𝑘\mathbf{p}_{k}bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT to achieve the desired objective, including system sum rate or total power consumption of the UAV. Moreover, multiple UAVs can collaborate with each other to further improve the performance of NGMA systems. In this case, the position or trajectory of multiple UAVs can be jointly designed with the other available resources in the system. Besides, additional constraints, such as a collision avoidance constraint, should be considered for safety.

II-B3 NGMA in IRS-Assisted Communication

Thanks to the advances in electromagnetic meta-material, IRSs have emerged as a disruptive solution for harnessing interference in wireless communication systems [QingqingIRS, 9183907, XianghaoJSAC]. An IRS is a planar metasurface consisting of an array of small, passive, low-cost elements, such as phase shifters and printed dipoles, capable of reflecting incident signals with a controlled phase shift. By adaptively adjusting the phase shifts of the IRS elements according to the dynamic radio propagation environment, the wireless channel can be proactively manipulated, which introduces additional designing DoFs for resource allocation design[yu2019miso, 9024490]. Furthermore, the reflected signals can be strategically superimposed with the non-reflected signals constructively or destructively to enhance the desired signal power strength or mitigate detrimental interference, improving overall system performance [9154337]. The relatively simple structure of IRSs allows for flexible installation on building facades and interior walls, smoothly and seamlessly integrating them into existing cellular communication systems. By properly configuring the phase shift patterns of the IRS, we can tailor different wireless channel conditions to match the characteristics of various multiple access schemes. Therefore, IRSs offer a promising solution for improving wireless communication systems, enhancing signal strength, and mitigating interference.

Considering a wireless network comprising a BS, an IRS, and a set of K𝐾Kitalic_K single-antenna users. In particular, the BS is equipped with a uniform linear array (ULA) of N𝑁Nitalic_N antenna elements, while the IRS contains Mpssubscript𝑀psM_{\rm ps}italic_M start_POSTSUBSCRIPT roman_ps end_POSTSUBSCRIPT phase shift elements. Without loss of generality, we assume that there exist direct links between the BS and all users. In such a case, the narrow-band reconfigurable channel between the UAV and user k𝑘kitalic_k can be explicitly expressed as

𝐡k=𝐡D,k+𝐅𝚿𝐡R,k,subscript𝐡𝑘subscript𝐡D𝑘𝐅𝚿subscript𝐡R𝑘\mathbf{h}_{k}=\mathbf{h}_{\mathrm{D},k}+\mathbf{F}\mathbf{\Psi}\mathbf{h}_{% \mathrm{R},k},bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = bold_h start_POSTSUBSCRIPT roman_D , italic_k end_POSTSUBSCRIPT + bold_F bold_Ψ bold_h start_POSTSUBSCRIPT roman_R , italic_k end_POSTSUBSCRIPT , (23)

where the channel vectors 𝐡D,kN×1subscript𝐡D𝑘superscript𝑁1\mathbf{h}_{\mathrm{D},k}\in\mathbb{C}^{\mathit{N}\times 1}bold_h start_POSTSUBSCRIPT roman_D , italic_k end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_N × 1 end_POSTSUPERSCRIPT and 𝐡R,kMps×1subscript𝐡R𝑘superscriptsubscript𝑀ps1\mathbf{h}_{\mathrm{R},k}\in\mathbb{C}^{M_{\rm ps}\times 1}bold_h start_POSTSUBSCRIPT roman_R , italic_k end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_M start_POSTSUBSCRIPT roman_ps end_POSTSUBSCRIPT × 1 end_POSTSUPERSCRIPT characterize the direct link between the BS and user k𝑘kitalic_k and the link between the IRS and user k𝑘kitalic_k, respectively. In the literature, 𝐡D,ksubscript𝐡D𝑘\mathbf{h}_{\mathrm{D},k}bold_h start_POSTSUBSCRIPT roman_D , italic_k end_POSTSUBSCRIPT and 𝐡R,ksubscript𝐡R𝑘\mathbf{h}_{\mathrm{R},k}bold_h start_POSTSUBSCRIPT roman_R , italic_k end_POSTSUBSCRIPT can be modeled as Ricean or Rayleigh random variables based on the specific communication scenarios [8910627]. Also, matrix 𝐅Na×Mps𝐅superscriptsubscript𝑁asubscript𝑀ps\mathbf{F}\in\mathbb{C}^{\mathit{N_{\rm a}}\times\mathit{M_{\rm ps}}}bold_F ∈ blackboard_C start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT roman_a end_POSTSUBSCRIPT × italic_M start_POSTSUBSCRIPT roman_ps end_POSTSUBSCRIPT end_POSTSUPERSCRIPT models the channel between the BS and IRS. Moreover, the diagonal matrix 𝚿Mps×Mps𝚿superscriptsubscript𝑀pssubscript𝑀ps\mathbf{\Psi}\in\mathbb{C}^{M_{\rm ps}\times M_{\rm ps}}bold_Ψ ∈ blackboard_C start_POSTSUPERSCRIPT italic_M start_POSTSUBSCRIPT roman_ps end_POSTSUBSCRIPT × italic_M start_POSTSUBSCRIPT roman_ps end_POSTSUBSCRIPT end_POSTSUPERSCRIPT represents the phase shift matrix of the IRS with {𝚿}mm=ej2πψmsubscript𝚿𝑚𝑚superscript𝑒𝑗2𝜋subscript𝜓𝑚\{\mathbf{\Psi}\}_{mm}=e^{j2\pi\psi_{m}}{ bold_Ψ } start_POSTSUBSCRIPT italic_m italic_m end_POSTSUBSCRIPT = italic_e start_POSTSUPERSCRIPT italic_j 2 italic_π italic_ψ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT end_POSTSUPERSCRIPT, where ψm[π,π]subscript𝜓𝑚𝜋𝜋\psi_{m}\in\left[-\pi,\pi\right]italic_ψ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ∈ [ - italic_π , italic_π ], m{1,,Mps}for-all𝑚1subscript𝑀ps\forall m\in\left\{1,\ldots,M_{\rm ps}\right\}∀ italic_m ∈ { 1 , … , italic_M start_POSTSUBSCRIPT roman_ps end_POSTSUBSCRIPT }, is the phase shift introduced by the m𝑚mitalic_m-th IRS element [9154252, 9154337]. Alternatively, by employing active IRS, both the amplitude and the phase of the IRS element can be jointly optimized111The literature presents a range of IRS models, each designed for specific implementations and applications, where the phase shift matrix, 𝚿𝚿\mathbf{\Psi}bold_Ψ, is subject to distinct constraints. For detailed information, readers are encouraged to refer [XX, YY] [10134546, 10266592].

As can be seen from the above channel model, the channel is reconfigured by varying the phase shift configuration of the IRS. As such, the phase shift matrix 𝚿𝚿\mathbf{\Psi}bold_Ψ can be regarded as the channel reconfigure variable 𝚽𝚽\mathbf{\Phi}bold_Φ in (18). In fact, by deploying the IRS, an additional reflecting link is established. In the case where the direct link is present, the signals coming from the two links can be combined in a constructive or destructive manner. On the other hand, when the direct link is absent, the IRS-induced link can be smartly tuned to reflect the signal from the BS to the users to establish a strong end-to-end propagation path.

The received signal of user k𝑘kitalic_k is given by

yk=(𝐡D,kH+𝐡R,kH𝚿H𝐅H)𝐩kskdesiredsignal+r𝒦{k}(𝐡D,kH+𝐡R,kH𝚿H𝐅H)𝐩rsrIUI+zk.subscript𝑦𝑘desiredsignalsubscriptsuperscript𝐡HD𝑘subscriptsuperscript𝐡HR𝑘superscript𝚿Hsuperscript𝐅Hsubscript𝐩𝑘subscript𝑠𝑘IUI𝑟𝒦𝑘subscriptsuperscript𝐡HD𝑘subscriptsuperscript𝐡HR𝑘superscript𝚿Hsuperscript𝐅Hsubscript𝐩𝑟subscript𝑠𝑟subscript𝑧𝑘\displaystyle y_{k}=\underset{\mathrm{desired~{}signal}}{\underbrace{(\mathbf{% h}^{\rm H}_{\mathrm{D},k}+\mathbf{h}^{\rm H}_{\mathrm{R},k}\mathbf{\Psi}^{\rm H% }\mathbf{F}^{\rm H})\mathbf{p}_{k}s_{k}}}+\underset{\mathrm{IUI}}{\underbrace{% \underset{r\in\mathcal{K}\setminus\left\{k\right\}}{\sum}(\mathbf{h}^{\rm H}_{% \mathrm{D},k}+\mathbf{h}^{\rm H}_{\mathrm{R},k}\mathbf{\Psi}^{\rm H}\mathbf{F}% ^{\rm H})\mathbf{p}_{r}s_{r}}}+z_{k}.italic_y start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = start_UNDERACCENT roman_desired roman_signal end_UNDERACCENT start_ARG under⏟ start_ARG ( bold_h start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT roman_D , italic_k end_POSTSUBSCRIPT + bold_h start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT roman_R , italic_k end_POSTSUBSCRIPT bold_Ψ start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT bold_F start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT ) bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT italic_s start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG end_ARG + underroman_IUI start_ARG under⏟ start_ARG start_UNDERACCENT italic_r ∈ caligraphic_K ∖ { italic_k } end_UNDERACCENT start_ARG ∑ end_ARG ( bold_h start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT roman_D , italic_k end_POSTSUBSCRIPT + bold_h start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT roman_R , italic_k end_POSTSUBSCRIPT bold_Ψ start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT bold_F start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT ) bold_p start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT italic_s start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_ARG end_ARG + italic_z start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT . (24)

Therefore, by employing the SIC principle for NOMA, the received SINR of user k𝑘kitalic_k can be expressed as

Γk=|(𝐡D,kH+𝐡R,kH𝚿H𝐅H)𝐩k|2s𝒦{k}αk,s|(𝐡D,kH+𝐡R,kH𝚿H𝐅H)𝐩s|2+σk2,subscriptΓ𝑘superscriptsubscriptsuperscript𝐡HD𝑘subscriptsuperscript𝐡HR𝑘superscript𝚿Hsuperscript𝐅Hsubscript𝐩𝑘2𝑠𝒦𝑘subscript𝛼𝑘𝑠superscriptsubscriptsuperscript𝐡HD𝑘subscriptsuperscript𝐡HR𝑘superscript𝚿Hsuperscript𝐅Hsubscript𝐩𝑠2subscriptsuperscript𝜎2𝑘\Gamma_{k}=\frac{\left|(\mathbf{h}^{\rm H}_{\mathrm{D},k}+\mathbf{h}^{\rm H}_{% \mathrm{R},k}\mathbf{\Psi}^{\rm H}\mathbf{F}^{\rm H})\mathbf{p}_{k}\right|^{2}% }{\underset{s\in\mathcal{K}\setminus\left\{k\right\}}{\sum}\alpha_{k,s}\left|(% \mathbf{h}^{\rm H}_{\mathrm{D},k}+\mathbf{h}^{\rm H}_{\mathrm{R},k}\mathbf{% \Psi}^{\rm H}\mathbf{F}^{\rm H})\mathbf{p}_{s}\right|^{2}+\sigma^{2}_{k}},roman_Γ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = divide start_ARG | ( bold_h start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT roman_D , italic_k end_POSTSUBSCRIPT + bold_h start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT roman_R , italic_k end_POSTSUBSCRIPT bold_Ψ start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT bold_F start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT ) bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG start_UNDERACCENT italic_s ∈ caligraphic_K ∖ { italic_k } end_UNDERACCENT start_ARG ∑ end_ARG italic_α start_POSTSUBSCRIPT italic_k , italic_s end_POSTSUBSCRIPT | ( bold_h start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT roman_D , italic_k end_POSTSUBSCRIPT + bold_h start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT roman_R , italic_k end_POSTSUBSCRIPT bold_Ψ start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT bold_F start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT ) bold_p start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG , (25)

where αk,s𝔹subscript𝛼𝑘𝑠𝔹\alpha_{k,s}\in\mathbb{B}italic_α start_POSTSUBSCRIPT italic_k , italic_s end_POSTSUBSCRIPT ∈ blackboard_B is a binary variable representing the SIC decoding order between user k𝑘kitalic_k and user s𝑠sitalic_s.

We note the aforementioned characteristics of the IRSs are particularly suitable for facilitating resource allocation design for NGMA schemes in wireless networks. In conventional downlink NOMA, users with stronger channels utilize the SIC technique to cancel co-channel interference from others. In contrast, since IRS is capable of reconfiguring user channels by sha** the reflected signal amplitudes and/or phase shifts, the user decoding order of NOMA can be permuted by adjusting the IRS reflection which further facilitates a more flexible performance trade-offs among the users. Furthermore, in scenarios where multiple IRSs are present within an NGMA system [9440764], it is possible to leverage all IRSs or select a subset to assist in transmission, optimizing the balance between system performance, signaling overhead, and computational resources needed for resource allocation. Specifically, for IRS-assisted NGMA systems, the selection policy and phase shift settings of the IRSs can be strategically coordinated with the beamforming strategy of the BS, ensuring a harmonized and efficient network operation.

II-B4 M/FA-Assisted SDMA

The emerging holographic MIMO technique has been proposed to fully harness the spatial variation of wireless channels within a specific spatial transmitter area [10243545, 9264694]. Holographic MIMO surfaces consist of numerous miniature passive elements spaced at sub-wavelength distances that can manipulate the electromagnetic properties of transmitted or reflected waves. By utilizing zero-spacing continuous antenna elements, holographic MIMO can fully leverage the spatial DoFs of the spatially continuous transmitter area. However, the large number of antenna elements required for holographic MIMO presents a critical challenge for both channel estimation and data processing, hindering its practical implementation.

To bridge the gap between holographic MIMO and conventional MIMO, a new MIMO concept based on the M/FA system has been proposed. In the M/FA system, each antenna element is connected to an RF chain via a flexible cable, and its physical position can be adjusted within a designated spatial region. For solid antenna elements, this is enabled by using an electromechanical device, such as a stepper motor [10243545]. As for fluid antennas, changing the position of the antenna elements can be realized by employing a piston structure or electromagnetic device [9264694, 9650760]. Unlike conventional MIMO systems, which have a set of antenna elements mounted at fixed locations, M/FA can utilize the full spatial DoFs within the available spatial transmitter area by leveraging the flexible movement of the M/FA [10318134]. In fact, by adjusting the position of antenna elements, we can vary some characteristics of the channels, e.g., the path loss between the BS and the receivers and the correlation between the antenna elements. As a result, the M/FA can be regarded as an additional channel reconfiguration based on the conventional position-fixed antenna array, which introduces extra DoFs for resource allocation design for NGMA systems [10078147]. On the other hand, since M/FA requires only a small number of antenna elements to exploit the available DoFs, the computational complexity of the required signal processing is significantly reduced compared to holographic MIMO systems [10146274]. Therefore, M/FA offers a promising solution for fully exploiting the spatial variation of wireless channels within a given spatial transmitter area while overcoming the challenges of holographic MIMO.

We consider a multi-user wireless communication system consisting of a BS and K𝐾Kitalic_K single-antenna users. The BS is equipped with N𝑁Nitalic_N M/FA elements to serve the users. The positions of the M/FA elements can be adjusted simultaneously within a given two-dimensional (2D) rectangular region. To facilitate the resource allocation design, the 2D rectangular region is quantized, which results in Q𝑄Qitalic_Q possible positions of the M/FAs. For notational simplicity, we define a set 𝒫𝒫\mathcal{P}caligraphic_P to collect all possible positions, i.e., 𝒫={𝐫1,,𝐫Q}𝒫subscript𝐫1subscript𝐫𝑄\mathcal{P}=\{\mathbf{r}_{1},\ldots,\mathbf{r}_{Q}\}caligraphic_P = { bold_r start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , bold_r start_POSTSUBSCRIPT italic_Q end_POSTSUBSCRIPT }. In particular, the vector 𝐫q=[xq,yq]Tsubscript𝐫𝑞superscriptsubscript𝑥𝑞subscript𝑦𝑞T\mathbf{r}_{q}=[x_{q},y_{q}]^{\rm T}bold_r start_POSTSUBSCRIPT italic_q end_POSTSUBSCRIPT = [ italic_x start_POSTSUBSCRIPT italic_q end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_q end_POSTSUBSCRIPT ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT denotes the q𝑞qitalic_q-th possible position, where variable xqsubscript𝑥𝑞x_{q}italic_x start_POSTSUBSCRIPT italic_q end_POSTSUBSCRIPT and yqsubscript𝑦𝑞y_{q}italic_y start_POSTSUBSCRIPT italic_q end_POSTSUBSCRIPT are the corresponding horizontal and vertical coordinates, respectively. We note that for the n𝑛nitalic_n-th M/FA element, its feasible position, denoted by 𝐥n2×1subscript𝐥𝑛superscript21\mathbf{l}_{n}\in\mathbb{R}^{2\times 1}bold_l start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT 2 × 1 end_POSTSUPERSCRIPT, is selected from 𝒫𝒫\mathcal{P}caligraphic_P, i.e., 𝐥n𝒫subscript𝐥𝑛𝒫\mathbf{l}_{n}\in\mathcal{P}bold_l start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ∈ caligraphic_P. As such, the physical channel can be reshaped by adjusting the positions of the M/FA elements. In particular, the channel between the n𝑛nitalic_n-th M/FA element and all K𝐾Kitalic_K users is defined as 𝐡n(𝐥n)=[hn,1(𝐥n),,hn,K(𝐥n)]TK×1subscript𝐡𝑛subscript𝐥𝑛superscriptsubscript𝑛1subscript𝐥𝑛subscript𝑛𝐾subscript𝐥𝑛Tsuperscript𝐾1\mathbf{h}_{n}(\mathbf{l}_{n})=[h_{n,1}(\mathbf{l}_{n}),\ldots,h_{n,K}(\mathbf% {l}_{n})]^{\mathrm{T}}\in\mathbb{C}^{K\times 1}bold_h start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ( bold_l start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) = [ italic_h start_POSTSUBSCRIPT italic_n , 1 end_POSTSUBSCRIPT ( bold_l start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) , … , italic_h start_POSTSUBSCRIPT italic_n , italic_K end_POSTSUBSCRIPT ( bold_l start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_K × 1 end_POSTSUPERSCRIPT, where variable hn,k(𝐥n)subscript𝑛𝑘subscript𝐥𝑛h_{n,k}(\mathbf{l}_{n})\in\mathbb{C}italic_h start_POSTSUBSCRIPT italic_n , italic_k end_POSTSUBSCRIPT ( bold_l start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) ∈ blackboard_C is the channel coefficient between the n𝑛nitalic_n-th M/FA element and user k𝑘kitalic_k. We note that the channel vector is a function of 𝐥nsubscript𝐥𝑛\mathbf{l}_{n}bold_l start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT. To facilitate notational simplicity, we define a matrix 𝐂n=[𝐡n(𝐥1),,𝐡n(𝐥Q)]K×Qsubscript𝐂𝑛subscript𝐡𝑛subscript𝐥1subscript𝐡𝑛subscript𝐥𝑄superscript𝐾𝑄\mathbf{C}_{n}=[\mathbf{h}_{n}(\mathbf{l}_{1}),\ldots,\mathbf{h}_{n}(\mathbf{l% }_{Q})]\in\mathbb{C}^{K\times Q}bold_C start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT = [ bold_h start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ( bold_l start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ) , … , bold_h start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ( bold_l start_POSTSUBSCRIPT italic_Q end_POSTSUBSCRIPT ) ] ∈ blackboard_C start_POSTSUPERSCRIPT italic_K × italic_Q end_POSTSUPERSCRIPT to collect the channel vectors from the n𝑛nitalic_n-th M/FA element to all K𝐾Kitalic_K users for all Q𝑄Qitalic_Q feasible discrete locations. Then, channel vector 𝐡n(𝐥n)subscript𝐡𝑛subscript𝐥𝑛\mathbf{h}_{n}(\mathbf{l}_{n})bold_h start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ( bold_l start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) can be represented as follows

𝐡n(𝐥n)=𝐂n𝐭n,subscript𝐡𝑛subscript𝐥𝑛subscript𝐂𝑛subscript𝐭𝑛\mathbf{h}_{n}(\mathbf{l}_{n})=\mathbf{C}_{n}\mathbf{t}_{n},bold_h start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ( bold_l start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) = bold_C start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT bold_t start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT , (26)

where vector 𝐭n=[tn[1],,tn[Q]]T𝔹Q×1subscript𝐭𝑛superscriptsubscript𝑡𝑛delimited-[]1subscript𝑡𝑛delimited-[]𝑄Tsuperscript𝔹𝑄1\mathbf{t}_{n}=\big{[}t_{n}[1],\ldots,t_{n}[Q]\big{]}^{\rm T}\in\mathbb{B}^{Q% \times 1}bold_t start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT = [ italic_t start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT [ 1 ] , … , italic_t start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT [ italic_Q ] ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT ∈ blackboard_B start_POSTSUPERSCRIPT italic_Q × 1 end_POSTSUPERSCRIPT. In particular, binary variable tn[q]{0,1}subscript𝑡𝑛delimited-[]𝑞01t_{n}[q]\in\left\{0,\hskip 2.84526pt1\right\}italic_t start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT [ italic_q ] ∈ { 0 , 1 } is the indicator to determine the position of the n𝑛nitalic_n-th M/FA element and we have q=1Qtn[q]=1superscriptsubscript𝑞1𝑄subscript𝑡𝑛delimited-[]𝑞1\sum_{q=1}^{Q}t_{n}[q]=1∑ start_POSTSUBSCRIPT italic_q = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_Q end_POSTSUPERSCRIPT italic_t start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT [ italic_q ] = 1. For the considered system, the channel matrix between the BS and the K𝐾Kitalic_K users, 𝐇=[𝐡1(𝐥1),,𝐡N(𝐥N)]K×N𝐇subscript𝐡1subscript𝐥1subscript𝐡𝑁subscript𝐥𝑁superscript𝐾𝑁\mathbf{H}=[\mathbf{h}_{1}(\mathbf{l}_{1}),\ldots,\mathbf{h}_{N}(\mathbf{l}_{N% })]\in\mathbb{C}^{K\times N}bold_H = [ bold_h start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ( bold_l start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ) , … , bold_h start_POSTSUBSCRIPT italic_N end_POSTSUBSCRIPT ( bold_l start_POSTSUBSCRIPT italic_N end_POSTSUBSCRIPT ) ] ∈ blackboard_C start_POSTSUPERSCRIPT italic_K × italic_N end_POSTSUPERSCRIPT, is then given by

𝐇=𝐂𝐓,𝐇𝐂𝐓\mathbf{H}=\mathbf{C}\mathbf{T},bold_H = bold_CT , (27)

where matrices 𝐂K×NQ𝐂superscript𝐾𝑁𝑄{\mathbf{C}}\in\mathbb{C}^{K\times NQ}bold_C ∈ blackboard_C start_POSTSUPERSCRIPT italic_K × italic_N italic_Q end_POSTSUPERSCRIPT and 𝐓NQ×N𝐓superscript𝑁𝑄𝑁\mathbf{T}\in\mathbb{C}^{NQ\times N}bold_T ∈ blackboard_C start_POSTSUPERSCRIPT italic_N italic_Q × italic_N end_POSTSUPERSCRIPT are defined as follows, respectively,

𝐂=[𝐂1,,𝐂N]and𝐓=[𝐭1𝟎Q𝟎Q𝟎Q𝟎Q𝐭2𝟎Q𝟎Q𝟎Q𝟎Q𝟎Q𝐭N].𝐂subscript𝐂1subscript𝐂𝑁and𝐓matrixsubscript𝐭1subscript0𝑄subscript0𝑄subscript0𝑄subscript0𝑄subscript𝐭2subscript0𝑄subscript0𝑄subscript0𝑄subscript0𝑄subscript0𝑄subscript𝐭𝑁\displaystyle\mathbf{C}=[\mathbf{C}_{1},\ldots,\mathbf{C}_{N}]\;\text{and}\;% \mathbf{T}=\begin{bmatrix}\mathbf{t}_{1}&\mathbf{0}_{Q}&\mathbf{0}_{Q}&\ldots&% \mathbf{0}_{Q}\\ \mathbf{0}_{Q}&\mathbf{t}_{2}&\mathbf{0}_{Q}&\ldots&\mathbf{0}_{Q}\\ \ldots&\ldots&\ldots&\ldots&\ldots\\ \mathbf{0}_{Q}&\mathbf{0}_{Q}&\mathbf{0}_{Q}&\hskip 2.84526pt\ldots&\mathbf{t}% _{N}\end{bmatrix}.bold_C = [ bold_C start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , bold_C start_POSTSUBSCRIPT italic_N end_POSTSUBSCRIPT ] and bold_T = [ start_ARG start_ROW start_CELL bold_t start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_CELL start_CELL bold_0 start_POSTSUBSCRIPT italic_Q end_POSTSUBSCRIPT end_CELL start_CELL bold_0 start_POSTSUBSCRIPT italic_Q end_POSTSUBSCRIPT end_CELL start_CELL … end_CELL start_CELL bold_0 start_POSTSUBSCRIPT italic_Q end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL bold_0 start_POSTSUBSCRIPT italic_Q end_POSTSUBSCRIPT end_CELL start_CELL bold_t start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_CELL start_CELL bold_0 start_POSTSUBSCRIPT italic_Q end_POSTSUBSCRIPT end_CELL start_CELL … end_CELL start_CELL bold_0 start_POSTSUBSCRIPT italic_Q end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL … end_CELL start_CELL … end_CELL start_CELL … end_CELL start_CELL … end_CELL start_CELL … end_CELL end_ROW start_ROW start_CELL bold_0 start_POSTSUBSCRIPT italic_Q end_POSTSUBSCRIPT end_CELL start_CELL bold_0 start_POSTSUBSCRIPT italic_Q end_POSTSUBSCRIPT end_CELL start_CELL bold_0 start_POSTSUBSCRIPT italic_Q end_POSTSUBSCRIPT end_CELL start_CELL … end_CELL start_CELL bold_t start_POSTSUBSCRIPT italic_N end_POSTSUBSCRIPT end_CELL end_ROW end_ARG ] . (28)

Next, we define 𝐡^kH1×NQsuperscriptsubscript^𝐡𝑘Hsuperscript1𝑁𝑄\hat{\mathbf{h}}_{k}^{\rm H}\in\mathbb{C}^{1\times NQ}over^ start_ARG bold_h end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT 1 × italic_N italic_Q end_POSTSUPERSCRIPT as the k𝑘kitalic_k-th row of 𝐂𝐂\mathbf{C}bold_C, which denotes the channel vector between the BS and user k𝑘kitalic_k. Then, the received signal of user k𝑘kitalic_k is given by

yk=𝐡^kH𝐓𝐏𝐬+zk,subscript𝑦𝑘superscriptsubscript^𝐡𝑘H𝐓𝐏𝐬subscript𝑧𝑘y_{k}=\hat{\mathbf{h}}_{k}^{\rm H}\mathbf{T}\mathbf{P}\mathbf{s}+z_{k},italic_y start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = over^ start_ARG bold_h end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT bold_TPs + italic_z start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , (29)

where 𝐏=[𝐩1,,𝐩K]N×K𝐏subscript𝐩1subscript𝐩𝐾superscript𝑁𝐾\mathbf{P}=[\mathbf{p}_{1},\ldots,\mathbf{p}_{K}]\in\mathbb{C}^{N\times K}bold_P = [ bold_p start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , bold_p start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT ] ∈ blackboard_C start_POSTSUPERSCRIPT italic_N × italic_K end_POSTSUPERSCRIPT denotes the precoding matrix at the BS. For notational simplicity, we define sets 𝒦{1,,K}𝒦1𝐾\mathcal{K}\in\{1,\ldots,K\}caligraphic_K ∈ { 1 , … , italic_K }, 𝒩{1,,N}𝒩1𝑁\mathcal{N}\in\{1,\ldots,N\}caligraphic_N ∈ { 1 , … , italic_N }, and 𝒬{1,,Q}𝒬1𝑄\mathcal{Q}\in\{1,\ldots,Q\}caligraphic_Q ∈ { 1 , … , italic_Q } to collect the indices of the users, M/FA elements, and candidate positions of the antenna elements, respectively.

By introducing an auxiliary matrix 𝐔=𝐓𝐏,𝐔NQ×Kformulae-sequence𝐔𝐓𝐏𝐔superscript𝑁𝑄𝐾\mathbf{U}=\mathbf{T}\mathbf{P},\ \mathbf{U}\in\mathbb{C}^{NQ\times K}bold_U = bold_TP , bold_U ∈ blackboard_C start_POSTSUPERSCRIPT italic_N italic_Q × italic_K end_POSTSUPERSCRIPT, the received signal of user k𝑘kitalic_k can be rewritten as

yk=𝐡^kH𝐔𝐬+zk.subscript𝑦𝑘superscriptsubscript^𝐡𝑘H𝐔𝐬subscript𝑧𝑘y_{k}=\hat{\mathbf{h}}_{k}^{\rm H}\mathbf{U}\mathbf{s}+z_{k}.italic_y start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = over^ start_ARG bold_h end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT bold_Us + italic_z start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT . (30)

Thus, the SINR of user k𝑘kitalic_k is given by

Γk=|𝐡^kH𝐮k|2r𝒦{k}|𝐡^kH𝐮r|2+σk2,subscriptΓ𝑘superscriptsuperscriptsubscript^𝐡𝑘𝐻subscript𝐮𝑘2subscript𝑟𝒦𝑘superscriptsuperscriptsubscript^𝐡𝑘𝐻subscript𝐮𝑟2superscriptsubscript𝜎𝑘2\Gamma_{k}=\frac{|\hat{\mathbf{h}}_{k}^{H}\mathbf{u}_{k}|^{2}}{\sum_{r\in% \mathcal{K}\setminus\{k\}}|\hat{\mathbf{h}}_{k}^{H}\mathbf{u}_{r}|^{2}+\sigma_% {k}^{2}},roman_Γ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = divide start_ARG | over^ start_ARG bold_h end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT bold_u start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG ∑ start_POSTSUBSCRIPT italic_r ∈ caligraphic_K ∖ { italic_k } end_POSTSUBSCRIPT | over^ start_ARG bold_h end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT bold_u start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + italic_σ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG , (31)

where 𝐮ksubscript𝐮𝑘\mathbf{u}_{k}bold_u start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT denotes the k𝑘kitalic_k-th column of 𝐔𝐔\mathbf{U}bold_U.

The distinctive features of the M/FA system are exceptionally well-suited for enhancing NGMA schemes within wireless networks. In particular, in case some of the users suffer from unfavorable wireless channel conditions,the M/FA enables the reconfiguration of the antenna array to cultivate a more conducive radio propagation environment. For example, the positions of specific antenna elements can be modified to bypass obstructions between the antenna array and the users. Alternatively, we may assign a subset of the antenna elements to dedicatedly serve a user whose channel condition is poor. Moreover, due to the high maneuverability of the antenna elements, we can flexibly adjust the spacing between adjacent antenna elements to manipulate the correlation and coupling of the antenna elements for better interference management in NGMA.

In summary, the resource allocation design of NGMA for reconfigurable channels requires the joint design of channel reconfiguring and resource allocation variables, such as joint passive and active beamforming design for IRS-assisted communications and joint trajectory and resource allocation design for UAV-assisted communications. Compared to natural channels, the capability of channel reconfiguration provides additional DoF for accommodating more users and further improving the system performance. In Table III, we summarize the DoFs for NGMA design, limitations, and implementation complexity of different channel reconfiguration techniques. We can observe that although the channel reconfiguration techniques introduce additional flexibility in resource allocation design, they also bring new challenges. In particular, to fully exploit the potential of the UAV-assisted NGMA, the dynamic and uncertain environments have to be taken into account when designing the trajectory and transmit precoding of the UAV. Also, no-fly zones and collision avoidance should be considered for safety issues. Moreover, considering the fact that the RF chains are usually absent at the IRSs, advanced channel estimation methods should be developed to facilitate the acquisition of accurate CSI, which enables efficient IRS-assisted NGMA. Furthermore, compared to the coherence time of the wireless channels, the reconfiguration speed of the M/FA systems is significantly slower. As such, it is infeasible to reconfigure the M/FA systems per time slot. As a result, advanced hardware should be developed to facilitate fast array reconfiguration. Also, a more delicate and suitable frame structure should be proposed to perfectly accommodate the NGMA schemes in M/FA systems.

TABLE III: Comparison of different channel reconfiguration techniques
Techniques DoFs Limitations
UAV UAV position Weather dependent, safety issue
IRS Phase, amplitude Difficult to obtain accurate CSI
M/FA Antenna position, correlation Relatively low array reconfiguration speed

II-C NGMA in Functional Channels

II-C1 A Unified Framework for NGMA in Functional Channels

Future cellular networks are envisioned to support various wireless functionalities, extending well beyond the scope of traditional communication to satisfy the demands of emerging applications and use cases [10349846, WeijieLetterPartIII, 10266619]. This evolution is propelled by the growing need for sensing and computing within wireless networks, which makes the discussion of the performance of multiple functionalities under limited network resources more meaningful [Fan2020, **ke2019JCAC]. We refer to wireless channels that must support multiple functionalities simultaneously as functional channels. Particularly, the functional channel inevitably introduces new challenges and opportunities for NGMA. Firstly, in functional channels, the concurrent optimization of multiple functionalities is imperative, indicating that traditional multiple access strategies tailored for natural channels might not seamlessly apply. Secondly, the integration of multiple functionalities opens up innovative design avenues for NGMA by strategically utilizing the outcomes of these functionalities. For example, in ISAC channels, the sensing results can be leveraged to predict the future CSI of the users, which helps improve the communication performance [Weijie2021JSTSP, Shuangyang2022ISAC]. Specifically, sensing-assisted communication and communication-assisted sensing transmissions are shown to outperform the communication-only and sensing-only cases [Shuangyang2022ISAC, Weijie2021JSTSP, chang2022learning], respectively. More interestingly, it was shown in [Kobayashi2018Joint] that a careful design of the transmitted signal can improve the performance of both functionalities simultaneously. Therefore, the presence of functional channels may be beneficial for NGMA designs. In line with (1), it is convenient to discuss the NGMA designs in a functional channel according to the following model

[𝐲CT,𝐲FT]T=[𝐇C,𝐇F]𝐠(𝐬,𝐝)+[𝐳CT,𝐳FT]T,superscriptsuperscriptsubscript𝐲CTsuperscriptsubscript𝐲FTTsubscript𝐇Csubscript𝐇F𝐠𝐬𝐝superscriptsuperscriptsubscript𝐳CTsuperscriptsubscript𝐳FTT\displaystyle{\left[{{\bf{y}}_{\rm{C}}^{\rm{T}},{\bf{y}}_{\rm{F}}^{\rm{T}}}% \right]^{\rm{T}}}=\left[{{{\bf{H}}_{\rm{C}}},{{\bf{H}}_{\rm{F}}}}\right]{\bf g% }\left({\bf{s}},{\bf{d}}\right)+{\left[{{\bf{z}}_{\rm{C}}^{\rm{T}},{\bf{z}}_{% \rm{F}}^{\rm{T}}}\right]^{\rm{T}}},[ bold_y start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT , bold_y start_POSTSUBSCRIPT roman_F end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT = [ bold_H start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT , bold_H start_POSTSUBSCRIPT roman_F end_POSTSUBSCRIPT ] bold_g ( bold_s , bold_d ) + [ bold_z start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT , bold_z start_POSTSUBSCRIPT roman_F end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT , (32)

where 𝐲CMC×1subscript𝐲Csuperscriptsubscript𝑀C1{\bf y}_{\rm C}\in{\mathbb{C}}^{M_{\rm C}\times 1}bold_y start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_M start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT × 1 end_POSTSUPERSCRIPT and 𝐲FMF×1subscript𝐲Fsuperscriptsubscript𝑀F1{\bf y}_{\rm F}\in{\mathbb{C}}^{M_{\rm F}\times 1}bold_y start_POSTSUBSCRIPT roman_F end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_M start_POSTSUBSCRIPT roman_F end_POSTSUBSCRIPT × 1 end_POSTSUPERSCRIPT are the channel observations for the communication functionality and the other functionalities, respectively, e.g., radar sensing, and MCsubscript𝑀CM_{\rm C}italic_M start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT and MFsubscript𝑀FM_{\rm F}italic_M start_POSTSUBSCRIPT roman_F end_POSTSUBSCRIPT are the numbers of resource elements available at receivers. Furthermore, 𝐬DC×1𝐬superscriptsubscript𝐷C1{\bf{s}}\in{\mathbb{C}}^{D_{\rm C}\times 1}bold_s ∈ blackboard_C start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT × 1 end_POSTSUPERSCRIPT and 𝐝DF×1𝐝superscriptsubscript𝐷F1{\bf{d}}\in{\mathbb{C}}^{D_{\rm F}\times 1}bold_d ∈ blackboard_C start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT roman_F end_POSTSUBSCRIPT × 1 end_POSTSUPERSCRIPT are the symbol vectors for communication information and the other functionalities, respectively, e.g., computing, and DCsubscript𝐷CD_{\rm C}italic_D start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT and DFsubscript𝐷FD_{\rm F}italic_D start_POSTSUBSCRIPT roman_F end_POSTSUBSCRIPT are the numbers of symbols required by the communication and the other functionalities, respectively. Also, 𝐇CMC×Nsubscript𝐇Csuperscriptsubscript𝑀C𝑁\mathbf{H}_{\mathrm{C}}\in{\mathbb{C}}^{M_{\mathrm{C}}\times N}bold_H start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_M start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT × italic_N end_POSTSUPERSCRIPT and 𝐇FMF×Nsubscript𝐇Fsuperscriptsubscript𝑀F𝑁\mathbf{H}_{\mathrm{F}}\in{\mathbb{C}}^{M_{\mathrm{F}}\times N}bold_H start_POSTSUBSCRIPT roman_F end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_M start_POSTSUBSCRIPT roman_F end_POSTSUBSCRIPT × italic_N end_POSTSUPERSCRIPT denote the communication channel and the channel for other functionalities, respectively, with N𝑁Nitalic_N being the number of resource elements available at the transmitter, while 𝐳CMC×1subscript𝐳Csuperscriptsubscript𝑀C1{\bf z}_{\rm C}\in{\mathbb{C}}^{M_{\rm C}\times 1}bold_z start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_M start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT × 1 end_POSTSUPERSCRIPT and 𝐳FMF×1subscript𝐳Fsuperscriptsubscript𝑀F1{\bf z}_{\rm F}\in{\mathbb{C}}^{M_{\rm F}\times 1}bold_z start_POSTSUBSCRIPT roman_F end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_M start_POSTSUBSCRIPT roman_F end_POSTSUBSCRIPT × 1 end_POSTSUPERSCRIPT are the corresponding AWGN vectors for different functionalities. From (33), we notice that the function 𝐠():D×1N×1:𝐠superscript𝐷1superscript𝑁1{\bf g}\left(\cdot\right):{\mathbb{C}}^{D\times 1}\to{\mathbb{C}}^{N\times 1}bold_g ( ⋅ ) : blackboard_C start_POSTSUPERSCRIPT italic_D × 1 end_POSTSUPERSCRIPT → blackboard_C start_POSTSUPERSCRIPT italic_N × 1 end_POSTSUPERSCRIPT in (33) maps both the symbols for communications and other functionalities to system resources, where D=DC+DF𝐷subscript𝐷Csubscript𝐷FD=D_{\rm C}+D_{\rm F}italic_D = italic_D start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT + italic_D start_POSTSUBSCRIPT roman_F end_POSTSUBSCRIPT is the total number of symbols required by all functionalities. Different from (1), the function 𝐠()𝐠{\bf g}\left(\cdot\right)bold_g ( ⋅ ) needs to be designed carefully by jointly considering the requirements of various functionalities. To shed light on the specific NGMA designs, we propose to discuss the importance of NGMA for two representative types of functional channels in the following, namely the ISAC channel [Fan2020], and the JCAC channel [Sun2019JCAC], respectively.

II-C2 NGMA for ISAC Channels

ISAC represents a paradigm shift in the design and development of wireless networks, emphasizing providing communication and sensing functions into a single unified platform. Typically, the ISAC system can be described by the following general form [Fan2020]

[𝐲CT,𝐲ST]T=[𝐇C,𝐇S]𝐠(𝐬)+[𝐳CT,𝐳ST]T,superscriptsuperscriptsubscript𝐲CTsuperscriptsubscript𝐲STTsubscript𝐇Csubscript𝐇S𝐠𝐬superscriptsuperscriptsubscript𝐳CTsuperscriptsubscript𝐳STT\displaystyle{\left[{{\bf{y}}_{\rm{C}}^{\rm{T}},{\bf{y}}_{\rm{S}}^{\rm{T}}}% \right]^{\rm{T}}}=\left[{{{\bf{H}}_{\rm{C}}},{{\bf{H}}_{\rm{S}}}}\right]{\bf g% }\left({\bf{s}}\right)+{\left[{{\bf{z}}_{\rm{C}}^{\rm{T}},{\bf{z}}_{\rm{S}}^{% \rm{T}}}\right]^{\rm{T}}},[ bold_y start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT , bold_y start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT = [ bold_H start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT , bold_H start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT ] bold_g ( bold_s ) + [ bold_z start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT , bold_z start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT , (33)

where 𝐇CMC×Nsubscript𝐇Csuperscriptsubscript𝑀C𝑁\mathbf{H}_{\mathrm{C}}\in{\mathbb{C}}^{M_{\mathrm{C}}\times N}bold_H start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_M start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT × italic_N end_POSTSUPERSCRIPT and 𝐇SMS×Nsubscript𝐇Ssuperscriptsubscript𝑀S𝑁\mathbf{H}_{\mathrm{S}}\in{\mathbb{C}}^{M_{\mathrm{S}}\times N}bold_H start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_M start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT × italic_N end_POSTSUPERSCRIPT denote the communication and sensing channels, respectively, 𝐲CMC×1subscript𝐲Csuperscriptsubscript𝑀C1\mathbf{y}_{\mathrm{C}}\in{\mathbb{C}}^{M_{\mathrm{C}}\times 1}bold_y start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_M start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT × 1 end_POSTSUPERSCRIPT and 𝐲SMS×1subscript𝐲Ssuperscriptsubscript𝑀S1\mathbf{y}_{\mathrm{S}}\in{\mathbb{C}}^{M_{\mathrm{S}}\times 1}bold_y start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_M start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT × 1 end_POSTSUPERSCRIPT denote the received signals at the communication and sensing receivers, respectively, and 𝐳CMC×1subscript𝐳Csuperscriptsubscript𝑀C1\mathbf{z}_{\mathrm{C}}\in{\mathbb{C}}^{M_{\mathrm{C}}\times 1}bold_z start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_M start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT × 1 end_POSTSUPERSCRIPT and 𝐳SMS×1subscript𝐳Ssuperscriptsubscript𝑀S1\mathbf{z}_{\mathrm{S}}\in{\mathbb{C}}^{M_{\mathrm{S}}\times 1}bold_z start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_M start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT × 1 end_POSTSUPERSCRIPT denote the corresponding communication and sensing noise vectors, respectively. Here, MCsubscript𝑀CM_{\mathrm{C}}italic_M start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT and MSsubscript𝑀SM_{\mathrm{S}}italic_M start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT denote the numbers of resource elements available at the receiver for communication and radar sensing, respectively, and 𝐠()𝐠{\bf g}\left({\cdot}\right)bold_g ( ⋅ ) represent the resource allocation strategy that maps the information symbols 𝐬D×1𝐬superscript𝐷1{\bf s}\in{\mathbb{C}}^{D\times 1}bold_s ∈ blackboard_C start_POSTSUPERSCRIPT italic_D × 1 end_POSTSUPERSCRIPT to the transmitted symbols 𝐱N×1𝐱superscript𝑁1{\bf x}\in{\mathbb{C}}^{N\times 1}bold_x ∈ blackboard_C start_POSTSUPERSCRIPT italic_N × 1 end_POSTSUPERSCRIPT. Particularly, it is important to highlight that the parameters the values of MCsubscript𝑀CM_{\mathrm{C}}italic_M start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT, MSsubscript𝑀SM_{\mathrm{S}}italic_M start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT, and N𝑁Nitalic_N can be different due to the available system resource elements at the transmitter and receiver for both communication and radar sensing functionalities.

Denote by 𝐱N×1𝐱superscript𝑁1{\bf x}\in{\mathbb{C}}^{N\times 1}bold_x ∈ blackboard_C start_POSTSUPERSCRIPT italic_N × 1 end_POSTSUPERSCRIPT the transmitted symbol vector after map**. We shall rewrite (33) by

𝐲Csubscript𝐲C\displaystyle\mathbf{y}_{\mathrm{C}}bold_y start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT =𝐇C𝐱+𝐳Candabsentsubscript𝐇C𝐱subscript𝐳Cand\displaystyle=\mathbf{H}_{\mathrm{C}}\mathbf{x}+\mathbf{z}_{\mathrm{C}}\;\text% {and}= bold_H start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT bold_x + bold_z start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT and
𝐲Ssubscript𝐲S\displaystyle\mathbf{y}_{\mathrm{S}}bold_y start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT =𝐇S𝐱+𝐳S,absentsubscript𝐇S𝐱subscript𝐳S\displaystyle=\mathbf{H}_{\mathrm{S}}\mathbf{x}+\mathbf{z}_{\mathrm{S}},= bold_H start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT bold_x + bold_z start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT , (34)

which aligns with the conventional ISAC models [Yifeng2023fundamental]. From (33) and (II-C2), it is clear that the resource allocation problem for functional channels is to design an effective map** function for given communication and sensing channels 𝐇Csubscript𝐇C\mathbf{H}_{\mathrm{C}}bold_H start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT and 𝐇Ssubscript𝐇S\mathbf{H}_{\mathrm{S}}bold_H start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT. However, the major difference of such a resource allocation problem in comparison to the one discussed in Section II-A is the fact that 𝐠()𝐠{\bf g}\left({\cdot}\right)bold_g ( ⋅ ) needs to exploit the connection between 𝐇Csubscript𝐇C\mathbf{H}_{\mathrm{C}}bold_H start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT and 𝐇Ssubscript𝐇S\mathbf{H}_{\mathrm{S}}bold_H start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT for simultaneously satisfying both the communication and sensing requirements. In the following, we present an illustrative example system for enabling dual functionality of sensing and communication.

Downlink SDMA-based Monostatic ISAC system: Let us examine a downlink monostatic ISAC multiple access transmission with dual-functional MIMO arrays at the BS. The BS is equipped with a ULA with N𝑁Nitalic_N antennas serving K𝐾Kitalic_K single-antenna users while capturing backscattered signals from targets for radar detection and estimation purposes. We consider the case where each user transmits a data stream of length L𝐿Litalic_L denoted by 𝐬kL×1subscript𝐬𝑘superscript𝐿1{\bf s}_{k}\in{\mathbb{C}}^{L\times 1}bold_s start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_L × 1 end_POSTSUPERSCRIPT, i.e., D=K𝐷𝐾D=Kitalic_D = italic_K, and we assume that MC=MS=Ksubscript𝑀Csubscript𝑀S𝐾M_{\rm C}=M_{\rm S}=Kitalic_M start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT = italic_M start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT = italic_K and N𝑁Nitalic_N are the numbers available resource elements. Furthermore, assume that the system operates over a flat fading channel with a sufficiently long coherence time. In accordance to (II-C2), the underlying ISAC transmission is modeled by

𝐘Csubscript𝐘C\displaystyle{{\bf{Y}}_{\rm{C}}}bold_Y start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT =𝐇C𝐏𝐒+𝐙Candabsentsubscript𝐇C𝐏𝐒subscript𝐙Cand\displaystyle={{\bf{H}}_{\rm{C}}}{\bf{PS}}+{{\bf{Z}}_{\rm{C}}}\;\text{and}= bold_H start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT bold_PS + bold_Z start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT and
𝐘Ssubscript𝐘S\displaystyle{{\bf{Y}}_{\rm{S}}}bold_Y start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT =𝐇S𝐏𝐒+𝐙S,absentsubscript𝐇S𝐏𝐒subscript𝐙S\displaystyle={{\bf{H}}_{\rm{S}}}{\bf{PS}}+{{\bf{Z}}_{\rm{S}}},= bold_H start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT bold_PS + bold_Z start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT , (35)

where 𝐒=[𝐬1,𝐬2,,𝐬K]TK×L𝐒superscriptsubscript𝐬1subscript𝐬2subscript𝐬𝐾Tsuperscript𝐾𝐿{\bf S}={\left[{{{\bf{s}}_{1}},{{\bf{s}}_{2}},...,{{\bf{s}}_{K}}}\right]^{\rm{% T}}}\in{\mathbb{C}}^{K\times L}bold_S = [ bold_s start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , bold_s start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , bold_s start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_K × italic_L end_POSTSUPERSCRIPT is the information matrix to be transmitted, 𝐏N×K𝐏superscript𝑁𝐾{\bf P}\in{\mathbb{C}}^{N\times K}bold_P ∈ blackboard_C start_POSTSUPERSCRIPT italic_N × italic_K end_POSTSUPERSCRIPT is the underlying precoding matrix, and 𝐘C=[𝐲C(1),𝐲C(2),,𝐲C(K)]TK×Lsubscript𝐘Csuperscriptsuperscriptsubscript𝐲C1superscriptsubscript𝐲C2superscriptsubscript𝐲C𝐾Tsuperscript𝐾𝐿{{\bf{Y}}_{\rm{C}}}={\left[{{\bf{y}}_{\rm{C}}^{\left(1\right)},{\bf{y}}_{\rm{C% }}^{\left(2\right)},...,{\bf{y}}_{\rm{C}}^{\left(K\right)}}\right]^{\rm{T}}}% \in{\mathbb{C}}^{K\times L}bold_Y start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT = [ bold_y start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( 1 ) end_POSTSUPERSCRIPT , bold_y start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( 2 ) end_POSTSUPERSCRIPT , … , bold_y start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_K ) end_POSTSUPERSCRIPT ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_K × italic_L end_POSTSUPERSCRIPT and 𝐘S=[𝐲S(1),𝐲S(2),,𝐲S(K)]TK×Lsubscript𝐘Ssuperscriptsuperscriptsubscript𝐲S1superscriptsubscript𝐲S2superscriptsubscript𝐲S𝐾Tsuperscript𝐾𝐿{{\bf{Y}}_{\rm{S}}}={\left[{{\bf{y}}_{\rm{S}}^{\left(1\right)},{\bf{y}}_{\rm{S% }}^{\left(2\right)},...,{\bf{y}}_{\rm{S}}^{\left(K\right)}}\right]^{\rm{T}}}% \in{\mathbb{C}}^{K\times L}bold_Y start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT = [ bold_y start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( 1 ) end_POSTSUPERSCRIPT , bold_y start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( 2 ) end_POSTSUPERSCRIPT , … , bold_y start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_K ) end_POSTSUPERSCRIPT ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_K × italic_L end_POSTSUPERSCRIPT are the communication and radar received symbol matrices, respectively. In (II-C2), 𝐇C=[𝐡C(1),𝐡C(2),,𝐡C(K)]TK×Nsubscript𝐇Csuperscriptsuperscriptsubscript𝐡C1superscriptsubscript𝐡C2superscriptsubscript𝐡C𝐾Tsuperscript𝐾𝑁{{\bf{H}}_{\rm{C}}}=\left[{\bf h}_{\rm C}^{(1)},{\bf h}_{\rm C}^{(2)},...,{\bf h% }_{\rm C}^{(K)}\right]^{\rm T}\in{\mathbb{C}}^{K\times N}bold_H start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT = [ bold_h start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( 1 ) end_POSTSUPERSCRIPT , bold_h start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( 2 ) end_POSTSUPERSCRIPT , … , bold_h start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_K ) end_POSTSUPERSCRIPT ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_K × italic_N end_POSTSUPERSCRIPT and 𝐇S=[𝐡S(1),𝐡S(2),,𝐡S(K)]TK×Nsubscript𝐇Ssuperscriptsuperscriptsubscript𝐡S1superscriptsubscript𝐡S2superscriptsubscript𝐡S𝐾Tsuperscript𝐾𝑁{{\bf{H}}_{\rm{S}}}=\left[{\bf h}_{\rm S}^{(1)},{\bf h}_{\rm S}^{(2)},...,{\bf h% }_{\rm S}^{(K)}\right]^{\rm T}\in{\mathbb{C}}^{K\times N}bold_H start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT = [ bold_h start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( 1 ) end_POSTSUPERSCRIPT , bold_h start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( 2 ) end_POSTSUPERSCRIPT , … , bold_h start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_K ) end_POSTSUPERSCRIPT ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_K × italic_N end_POSTSUPERSCRIPT, where 𝐡C(k)N×1superscriptsubscript𝐡C𝑘superscript𝑁1{\bf h}_{\rm C}^{(k)}\in{\mathbb{C}}^{N\times 1}bold_h start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_k ) end_POSTSUPERSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_N × 1 end_POSTSUPERSCRIPT and 𝐡S(k)N×1superscriptsubscript𝐡S𝑘superscript𝑁1{\bf h}_{\rm S}^{(k)}\in{\mathbb{C}}^{N\times 1}bold_h start_POSTSUBSCRIPT roman_S end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_k ) end_POSTSUPERSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_N × 1 end_POSTSUPERSCRIPT are the channel vectors for communication and sensing of user k𝑘kitalic_k, respectively.

We propose to study the resource allocation in this example by optimizing the precoding matrix 𝐏𝐏{\bf P}bold_P, such that the received signal at each user requires little or no equalization, while the transmitted signals at the BS mimic a certain beampattern [AA, BB] that is favorable for radar sensing. More specifically, by rearranging the communication input-output relation into

𝐘C=𝐒+(𝐇C𝐏𝐈K)𝐒+𝐙C,subscript𝐘C𝐒subscript𝐇C𝐏subscript𝐈𝐾𝐒subscript𝐙C\displaystyle{{\bf{Y}}_{\rm{C}}}={\bf{S}}+\left({{{\bf{H}}_{\rm{C}}}{\bf{P}}-{% {\bf{I}}_{K}}}\right){\bf{S}}+{{\bf{Z}}_{\rm{C}}},bold_Y start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT = bold_S + ( bold_H start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT bold_P - bold_I start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT ) bold_S + bold_Z start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT , (36)

we can define the effective SINR by

Γk=1L𝐬k21L(𝐡C(k))T𝐏𝐒𝐬k2+σk2.subscriptΓ𝑘1𝐿superscriptnormsubscript𝐬𝑘21𝐿superscriptnormsuperscriptsuperscriptsubscript𝐡C𝑘T𝐏𝐒subscript𝐬𝑘2subscriptsuperscript𝜎2𝑘\displaystyle\Gamma_{k}=\frac{{\frac{1}{L}{{\left\|{{{\bf{s}}_{k}}}\right\|}^{% 2}}}}{{\frac{1}{L}{{\left\|{{{\left({{\bf{h}}_{\rm{C}}^{\left(k\right)}}\right% )}^{\rm{T}}}{\bf{PS}}-{{\bf{s}}_{k}}}\right\|}^{2}}+{\sigma^{2}_{k}}}}.roman_Γ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = divide start_ARG divide start_ARG 1 end_ARG start_ARG italic_L end_ARG ∥ bold_s start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG divide start_ARG 1 end_ARG start_ARG italic_L end_ARG ∥ ( bold_h start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_k ) end_POSTSUPERSCRIPT ) start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT bold_PS - bold_s start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG . (37)

Based on (37), the achievable rate for user k𝑘kitalic_k is calculated by

Rk=log2(1+Γk),subscript𝑅𝑘subscript21subscriptΓ𝑘\displaystyle{R_{k}}={\log_{2}}\left({1+\Gamma_{k}}\right),italic_R start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( 1 + roman_Γ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) , (38)

which can be adopted to evaluate communication performance. On the other hand, the radar performance is evaluated by deriving the difference between the transmit beampattern and the desired radar beampattern. Let 𝐑𝐗0=1L𝐗0𝐗0Hsubscript𝐑subscript𝐗01𝐿subscript𝐗0superscriptsubscript𝐗0H{\bf R}_{{\bf X}_{0}}=\frac{1}{L}{\bf X}_{0}{\bf X}_{0}^{\rm H}bold_R start_POSTSUBSCRIPT bold_X start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT end_POSTSUBSCRIPT = divide start_ARG 1 end_ARG start_ARG italic_L end_ARG bold_X start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT bold_X start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT be the radar beampattern of interest, where 𝐗0subscript𝐗0{\bf X}_{0}bold_X start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT is the desired radar transmitted signal [Fan2018Toward]. Then, the radar performance is characterized by the MSE of the form

MSE=1L𝐏𝐒𝐗0F2.MSE1𝐿superscriptsubscriptnorm𝐏𝐒subscript𝐗0F2\displaystyle{\rm MSE}={\frac{1}{L}{{\left\|{\bf PS}-{\bf X}_{0}\right\|}_{\rm F% }^{2}}}.roman_MSE = divide start_ARG 1 end_ARG start_ARG italic_L end_ARG ∥ bold_PS - bold_X start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT ∥ start_POSTSUBSCRIPT roman_F end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT . (39)

Note that a wide range of sensing metrics exists within the field[Fan2020]. However, for the purposes of this analysis, we have deliberately selected the MSE between the transmitted and the sensing-desired signals as the metric for assessing radar performance. This choice is motivated by the MSE’s relatively straightforward formulation for resource allocation and its direct influence on the actual performance of the radar system.

Based on (38) and (39), we observe that the choice of 𝐏𝐏\bf Pbold_P will directly affect the signal beampattern and the communication achievable rate. Therefore, we note that the resource allocation in the above example boils down to the design of 𝐏𝐏\bf Pbold_P for providing a desired tradeoff between communication and radar sensing performance. Note that the desired tradeoff may be different according to the NGMA requirements. For example, in communication-centric designs, the sensing performance is less important, and therefore the resource allocation should lean towards the communication functionality, where 𝐏𝐏\bf Pbold_P would ideally resemble a zero-forcing precoder that aims to null the interference caused by sensing signals. On the other hand, in sensing-centric designs, where the priority is on the radar sensing capabilities over communication performance, resource allocation is oriented more towards enhancing the sensing functionality. Consequently, the design of 𝐏𝐏\bf Pbold_P should aim to align 𝐏𝐒𝐏𝐒\bf PSbold_PS closely with the desired signal 𝐗0subscript𝐗0{\bf X}_{0}bold_X start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT, evaluated by the Frobenius norm as specified in (39). In summary, the resource allocation strategy for NGMA within the ISAC system framework necessitates a proper balance between communication and radar sensing functionalities, tailored according to the constraints of available resource elements. This requirement for equilibrium poses a significant difference from traditional resource allocation approaches in NGMA for natural channels, underlining the unique challenges and considerations involved in optimizing integrated systems that offer multiple functionalities.

II-C3 NGMA for JCAC Channels

Mobile edge computing (MEC) is recently emerged as a potential solution to relieve the burden of backhaul links in wireless networks[Yuyi2017]. Specifically, the MEC protocol aims to move the computing resources from the central network towards the network edges. In this context, both communication and computing functionalities are involved and therefore it falls in the category of JCAC transmissions [Feng2019multiantenna].

Let us consider the NGMA design for JCAC channels, where K𝐾Kitalic_K users aim to compute their tasks exploiting the MEC protocol and transmit information to the BS simultaneously. To leverage the computation resource at the BS and fulfill the constraint of latency, each user separates their tasks into two parts computed either at the edge or at the center via offloading and downloading. In this context, the channel model in (33) is further specified by

𝐲=𝐇𝐠(𝐬,𝐝)+𝐳,(check, I updated \displaystyle{\bf{y}}={\bf{H}}\mathbf{g}\left({{\bf{s}},{\bf{d}}}\right)+{\bf{% z}},(\text{check, I updated }bold_y = bold_Hg ( bold_s , bold_d ) + bold_z , ( check, I updatedgto 𝐠)\text{to }\mathbf{g})to bold_g ) (40)

where 𝐲M×1𝐲superscript𝑀1{\bf y}\in{\mathbb{C}}^{M\times 1}bold_y ∈ blackboard_C start_POSTSUPERSCRIPT italic_M × 1 end_POSTSUPERSCRIPT is the received signal at the BS containing information for both communication and computing, 𝐇M×N𝐇superscript𝑀𝑁{\bf H}\in{\mathbb{C}}^{M\times N}bold_H ∈ blackboard_C start_POSTSUPERSCRIPT italic_M × italic_N end_POSTSUPERSCRIPT is the corresponding channel matrix, and 𝐳M×1𝐳superscript𝑀1{\bf z}\in{\mathbb{C}}^{M\times 1}bold_z ∈ blackboard_C start_POSTSUPERSCRIPT italic_M × 1 end_POSTSUPERSCRIPT is the AWGN vector. In (40), 𝐬DC×1𝐬superscriptsubscript𝐷C1{\bf s}\in{\mathbb{C}}^{D_{\rm C}\times 1}bold_s ∈ blackboard_C start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT × 1 end_POSTSUPERSCRIPT and 𝐝DMEC×1𝐝superscriptsubscript𝐷MEC1{\bf d}\in{\mathbb{C}}^{D_{\rm MEC}\times 1}bold_d ∈ blackboard_C start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT roman_MEC end_POSTSUBSCRIPT × 1 end_POSTSUPERSCRIPT are the information symbols to be transmitted and task symbols describing the computation tasks of all users. Based on (40), we notice that 𝐠()𝐠{\bf g}\left({\cdot}\right)bold_g ( ⋅ ) needs to satisfy both the communication and computing requirements, which requires the resource allocation taking into account both communication and computation resource, e.g., energy consumption. The following example provides further details on designing 𝐠()𝐠{\bf g}\left({\cdot}\right)bold_g ( ⋅ ).

OFDMA-based Computation Offloading for JCAC channels: Let us consider the computation offloading issue for JCAC transmissions, where the K𝐾Kitalic_K users communicate and offload part of their tasks to the center BS simultaneously via OFDMA while computing the rest of their tasks locally 222The consideration of OFDMA serves as an illustrative example. The extension to a non-orthogonal framework can be achieved by following a similar approach as in previous sections.. For ease of exposition, we ignore the transmission where users collect their task symbols after computing from the central BS via the downlink [Feng2019multiantenna]. Let M𝑀Mitalic_M be the number of subcarriers available in the OFDMA system and we have N=M𝑁𝑀N=Mitalic_N = italic_M. Considering transmissions over static channels, we shall further specify (40) based on (2) by

𝐲=k=1K𝐇k𝚷k𝚲k𝐱k+𝐳,𝐲superscriptsubscript𝑘1𝐾subscript𝐇𝑘subscript𝚷𝑘subscript𝚲𝑘subscript𝐱𝑘𝐳\displaystyle{\bf{y}}=\sum\limits_{k=1}^{K}{{{\bf{H}}_{k}}{{\bf{\Pi}}_{k}}{{% \bf{\Lambda}}_{k}}{{\bf{x}}_{{k}}}+{\bf{z}}},bold_y = ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_Λ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_x start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT + bold_z , (41)

where 𝐱k=[𝐬kT,𝐝kT]TDTot,k×1subscript𝐱𝑘superscriptsuperscriptsubscript𝐬𝑘Tsuperscriptsubscript𝐝𝑘TTsuperscriptsubscript𝐷Tot𝑘1{{\bf{x}}_{k}}=\left[{{\bf{s}}_{{k}}^{\rm T}},{{\bf{d}}_{{k}}^{\rm T}}\right]^% {\rm T}\in{\mathbb{C}}^{D_{{\rm Tot},k}\times 1}bold_x start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = [ bold_s start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT , bold_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT roman_Tot , italic_k end_POSTSUBSCRIPT × 1 end_POSTSUPERSCRIPT are the transmitted symbols of user k𝑘kitalic_k, and the rest of notations follow the same definition given in (2). Specifically, 𝐬ksubscript𝐬𝑘{{\bf{s}}_{k}}bold_s start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is a subset of the total DCsubscript𝐷CD_{\rm C}italic_D start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT data streams 𝐬𝐬\bf sbold_s with cardinality DC,ksubscript𝐷C𝑘{{D_{{\rm C},k}}}italic_D start_POSTSUBSCRIPT roman_C , italic_k end_POSTSUBSCRIPT, containing the corresponding information symbols of user k𝑘kitalic_k. Similarly, 𝐝ksubscript𝐝𝑘{{\bf{d}}_{{k}}}bold_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is a subset of the total DMECsubscript𝐷MECD_{\rm MEC}italic_D start_POSTSUBSCRIPT roman_MEC end_POSTSUBSCRIPT task symbols 𝐝𝐝\bf dbold_d with cardinality DMEC,ksubscript𝐷MEC𝑘{{D_{{\rm MEC},k}}}italic_D start_POSTSUBSCRIPT roman_MEC , italic_k end_POSTSUBSCRIPT, containing the corresponding computation task symbols of user k𝑘kitalic_k. Hence, we have DTot,k=DC,k+DMEC,ksubscript𝐷Tot𝑘subscript𝐷C𝑘subscript𝐷MEC𝑘D_{{\rm Tot},k}=D_{{\rm C},k}+D_{{\rm MEC},k}italic_D start_POSTSUBSCRIPT roman_Tot , italic_k end_POSTSUBSCRIPT = italic_D start_POSTSUBSCRIPT roman_C , italic_k end_POSTSUBSCRIPT + italic_D start_POSTSUBSCRIPT roman_MEC , italic_k end_POSTSUBSCRIPT. Following the same derivation as for (3), we shall obtain the input-output relations of user k𝑘kitalic_k by highlighting both the communication and computing functionalities in the form of

ym=subscript𝑦𝑚absent\displaystyle y_{m}=italic_y start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT = k=1KlC=1DC,k{𝚷k}mlC{𝐇k}mmpklC{𝐬k}lCsuperscriptsubscript𝑘1𝐾superscriptsubscriptsubscript𝑙C1subscript𝐷C𝑘subscriptsubscript𝚷𝑘𝑚subscript𝑙Csubscriptsubscript𝐇𝑘𝑚𝑚subscript𝑝𝑘subscript𝑙Csubscriptsubscript𝐬𝑘subscript𝑙C\displaystyle\sum\limits_{k=1}^{K}{\sum\limits_{{l_{\rm C}}=1}^{{D}_{{\rm C},k% }}{{{\{{{\bf{\Pi}}_{k}}\}}_{m{l_{\rm C}}}}}}{\{{{\bf{H}}_{k}}\}_{mm}}\sqrt{{p_% {k{l_{\rm C}}}}}{\{{{\bf{s}}_{k}}\}_{{l_{\rm C}}}}∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT roman_C , italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_l start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT end_POSTSUBSCRIPT { bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_m end_POSTSUBSCRIPT square-root start_ARG italic_p start_POSTSUBSCRIPT italic_k italic_l start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG { bold_s start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT end_POSTSUBSCRIPT
+k=1KlMEC=1DMEC,k{𝚷k}m(DC,k+lMEC){𝐇k}mmpk(DC,k+lMEC){𝐝k}lMEC+zm,m.superscriptsubscript𝑘1𝐾superscriptsubscriptsubscript𝑙MEC1subscript𝐷MEC𝑘subscriptsubscript𝚷𝑘𝑚subscript𝐷C𝑘subscript𝑙MECsubscriptsubscript𝐇𝑘𝑚𝑚subscript𝑝𝑘subscript𝐷C𝑘subscript𝑙MECsubscriptsubscript𝐝𝑘subscript𝑙MECsubscript𝑧𝑚for-all𝑚\displaystyle+\sum\limits_{k=1}^{K}{\sum\limits_{{l_{\rm MEC}}=1}^{{D}_{{\rm MEC% },k}}{{{\{{{\bf{\Pi}}_{k}}\}}_{m{\left({D}_{{\rm C},k}+l_{\rm MEC}\right)}}}}}% {\{{{\bf{H}}_{k}}\}_{mm}}\sqrt{{p_{k{\left({D}_{{\rm C},k}+l_{\rm MEC}\right)}% }}}{\{{{\bf{d}}_{k}}\}_{{l_{\rm MEC}}}}+z_{m},\forall m.+ ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT roman_MEC end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT roman_MEC , italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m ( italic_D start_POSTSUBSCRIPT roman_C , italic_k end_POSTSUBSCRIPT + italic_l start_POSTSUBSCRIPT roman_MEC end_POSTSUBSCRIPT ) end_POSTSUBSCRIPT { bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_m end_POSTSUBSCRIPT square-root start_ARG italic_p start_POSTSUBSCRIPT italic_k ( italic_D start_POSTSUBSCRIPT roman_C , italic_k end_POSTSUBSCRIPT + italic_l start_POSTSUBSCRIPT roman_MEC end_POSTSUBSCRIPT ) end_POSTSUBSCRIPT end_ARG { bold_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT roman_MEC end_POSTSUBSCRIPT end_POSTSUBSCRIPT + italic_z start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT , ∀ italic_m . (42)

Notice that entries in 𝐬ksubscript𝐬𝑘{\bf s}_{k}bold_s start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT and 𝐝ksubscript𝐝𝑘{\bf d}_{k}bold_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT do not share the same subcarrier. We can characterize the communication rate of user k𝑘kitalic_k by

RC,k=lC=1DC,km=1M{𝚷k}mlClog2(1+|{𝐇k}mm|2pklCσ2).subscript𝑅C𝑘superscriptsubscriptsubscript𝑙C1subscript𝐷C𝑘superscriptsubscript𝑚1𝑀subscriptsubscript𝚷𝑘𝑚subscript𝑙Csubscript21superscriptsubscriptsubscript𝐇𝑘𝑚𝑚2subscript𝑝𝑘subscript𝑙Csuperscript𝜎2\displaystyle{R_{{\rm{C,}}k}}=\sum\limits_{{l_{\rm C}}=1}^{D_{{\rm C},k}}{\sum% \limits_{m=1}^{M}{{{\{{{\bf{\Pi}}_{k}}\}}_{ml_{\rm C}}}}}{\log_{2}}\left({1+% \frac{{{{\left|{{{\{{{\bf{H}}_{k}}\}}_{mm}}}\right|}^{2}}{p_{k{{l_{\rm C}}}}}}% }{{{\sigma^{2}}}}}\right).italic_R start_POSTSUBSCRIPT roman_C , italic_k end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT roman_C , italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_m = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_l start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT end_POSTSUBSCRIPT roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( 1 + divide start_ARG | { bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_m end_POSTSUBSCRIPT | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_p start_POSTSUBSCRIPT italic_k italic_l start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG start_ARG italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG ) . (43)

Similarly, the achievable rate for task offloading of user k𝑘kitalic_k is given by

RMEC,k=lMEC=1DMEC,km=1M{𝚷k}m(DC,k+lMEC)log2(1+|{𝐇k}mm|2pk(DC,k+lMEC)σ2).subscript𝑅MEC𝑘superscriptsubscriptsubscript𝑙MEC1subscript𝐷MEC𝑘superscriptsubscript𝑚1𝑀subscriptsubscript𝚷𝑘𝑚subscript𝐷C𝑘subscript𝑙MECsubscript21superscriptsubscriptsubscript𝐇𝑘𝑚𝑚2subscript𝑝𝑘subscript𝐷C𝑘subscript𝑙MECsuperscript𝜎2\displaystyle{R_{{\rm{MEC}},k}}=\sum\limits_{{l_{\rm MEC}}=1}^{{D_{{\rm MEC},k% }}}{\sum\limits_{m=1}^{M}{{{\{{{\bf{\Pi}}_{k}}\}}_{m{\left({D_{{\rm C},k}}+{l_% {\rm MEC}}\right)}}}}}{\log_{2}}\left({1+\frac{{{{\left|{{{\{{{\bf{H}}_{k}}\}}% _{mm}}}\right|}^{2}}{p_{k\left({D_{{\rm C},k}}+{l_{\rm MEC}}\right)}}}}{{{% \sigma^{2}}}}}\right).italic_R start_POSTSUBSCRIPT roman_MEC , italic_k end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT roman_MEC end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT roman_MEC , italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_m = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m ( italic_D start_POSTSUBSCRIPT roman_C , italic_k end_POSTSUBSCRIPT + italic_l start_POSTSUBSCRIPT roman_MEC end_POSTSUBSCRIPT ) end_POSTSUBSCRIPT roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( 1 + divide start_ARG | { bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_m end_POSTSUBSCRIPT | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_p start_POSTSUBSCRIPT italic_k ( italic_D start_POSTSUBSCRIPT roman_C , italic_k end_POSTSUBSCRIPT + italic_l start_POSTSUBSCRIPT roman_MEC end_POSTSUBSCRIPT ) end_POSTSUBSCRIPT end_ARG start_ARG italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG ) . (44)

In addition to the achievable rates, it is important to characterize the total consumed energy for each device to transmit symbols and to locally compute part of the task using the central processing unit (CPU). According to [Feng2019multiantenna], the total energy consumption is given by

Etot=k=1K(ςkCk3Lk3T~2+l=1DTot,kpklT).subscript𝐸totsuperscriptsubscript𝑘1𝐾subscript𝜍𝑘superscriptsubscript𝐶𝑘3superscriptsubscript𝐿𝑘3superscript~𝑇2superscriptsubscript𝑙1subscript𝐷Tot𝑘subscript𝑝𝑘𝑙𝑇\displaystyle{E_{{\rm{tot}}}}=\sum\limits_{k=1}^{K}\left({\frac{{{\varsigma_{k% }}C_{k}^{3}L_{k}^{3}}}{{{{\tilde{T}}^{2}}}}+\sum\limits_{l=1}^{D_{{\rm Tot},k}% }{{p_{kl}}}{{T}}}\right).italic_E start_POSTSUBSCRIPT roman_tot end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT ( divide start_ARG italic_ς start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT italic_C start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 3 end_POSTSUPERSCRIPT italic_L start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 3 end_POSTSUPERSCRIPT end_ARG start_ARG over~ start_ARG italic_T end_ARG start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG + ∑ start_POSTSUBSCRIPT italic_l = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT roman_Tot , italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT italic_p start_POSTSUBSCRIPT italic_k italic_l end_POSTSUBSCRIPT italic_T ) . (45)

In (45), T~~𝑇\tilde{T}over~ start_ARG italic_T end_ARG is the latency allowed for all users finishing computing the task, while T𝑇Titalic_T is the allowed signal transmission time to meet the latency according to the computation ability of the BS that is the inverse of the total bandwidth. Furthermore, Lksubscript𝐿𝑘L_{k}italic_L start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is the number of bits left for user k𝑘kitalic_k to compute locally, Cksubscript𝐶𝑘C_{k}italic_C start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is the number of CPU cycles for computing one input-bit for user k𝑘kitalic_k that is chosen to guarantee the task completion within T~~𝑇\tilde{T}over~ start_ARG italic_T end_ARG, ςksubscript𝜍𝑘{{\varsigma_{k}}}italic_ς start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is the effective capacitance coefficient that depends on the chip architecture of user k𝑘kitalic_k. On the other hand, the term l=1DTot,kpklTsuperscriptsubscript𝑙1subscript𝐷Tot𝑘subscript𝑝𝑘𝑙𝑇\sum\nolimits_{l=1}^{D_{{\rm Tot},k}}{{p_{kl}}}{{T}}∑ start_POSTSUBSCRIPT italic_l = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT roman_Tot , italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT italic_p start_POSTSUBSCRIPT italic_k italic_l end_POSTSUBSCRIPT italic_T denotes the average energy required for the signal transmission of user k𝑘kitalic_k. Finally, (45) can be understood as the summation of each user’s consumed energy including the energy for both task offloading, communication symbol transmission, and local computing. In fact, Etotsubscript𝐸tot{E_{{\rm{tot}}}}italic_E start_POSTSUBSCRIPT roman_tot end_POSTSUBSCRIPT in (45) depends on the achievable rate RMEC,ksubscript𝑅MEC𝑘{R_{{\rm{MEC}},k}}italic_R start_POSTSUBSCRIPT roman_MEC , italic_k end_POSTSUBSCRIPT given in (44). Let L~ksubscript~𝐿𝑘{\tilde{L}}_{k}over~ start_ARG italic_L end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT be the number of bits describing the task of user k𝑘kitalic_k. Then, in order to guarantee the computing functionality, Lk+RMEC,kL~ksubscript𝐿𝑘subscript𝑅MEC𝑘subscript~𝐿𝑘L_{k}+{R_{{\rm{MEC,}}k}}\geq{\tilde{L}}_{k}italic_L start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT + italic_R start_POSTSUBSCRIPT roman_MEC , italic_k end_POSTSUBSCRIPT ≥ over~ start_ARG italic_L end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT must hold. From (43), (44), and (45), we also observe that the resource allocation for the JCAC transmission needs to consider the tradeoff between communication rate, computing efficiency, and the total energy consumption. Particularly, we observe that the computing efficiency is translated to the latency constraint as included in (45). Therefore, the resource allocation problem is reduced to find the desired balance between the communication rate and the total energy consumption of all users.

III Resource Allocation Design for Next-Generation Multiple Access

In this section, we present the typical problem formulations for resource allocation design of different types of NGMA.

III-A Resource Allocation Design for NGMA in Natural Channel

Resource allocation design for NGMA in natural channels can be categorized into three types according to the design orientations, i.e., rate-oriented, power-oriented, and reliability-oriented resource allocation design. In particular, the rate-oriented resource allocation is suitable for rate-demanding applications or scenarios. Power-oriented resource allocation intends to reduce the system power consumption, which fits scenarios where power is a limited system resource, such as for massive IoT devices. Besides, reliability-oriented resource allocation aims to enhance the system robustness against the existence of imperfect CSI. In this subsection, we present the problem formulations for these three types of resource allocation designs for NGMA in natural channels.

III-A1 Rate-oriented Resource Allocation Design [AA, BB, CC]

We consider the downlink power domain NOMA system in (5) and formulate the rate-oriented resource allocation design problem. The main motivation of NOMA is accommodating more users and improving the spectral efficiency when the system spectrum resource is limited. In particular, the power allocation for each data stream at each user and user scheduling strategy are jointly designed to maximize the system sum rate. The system sum rate maximization problem can be formulated as the following optimization problem:

maximizepk,{𝚷}mkk𝒦Rksubscript𝑝𝑘subscript𝚷𝑚𝑘maximize𝑘𝒦subscript𝑅𝑘\displaystyle\underset{p_{k},\{\mathbf{\Pi}\}_{mk}}{\operatorname{maximize}}\,% \,\,\,\underset{k\in\mathcal{K}}{\sum}{R}_{k}start_UNDERACCENT italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , { bold_Π } start_POSTSUBSCRIPT italic_m italic_k end_POSTSUBSCRIPT end_UNDERACCENT start_ARG roman_maximize end_ARG start_UNDERACCENT italic_k ∈ caligraphic_K end_UNDERACCENT start_ARG ∑ end_ARG italic_R start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT
subject  toC1:k=1KpkPmax,subject  toC1:superscriptsubscript𝑘1𝐾subscript𝑝𝑘subscript𝑃max\displaystyle\mbox{subject\hskip 4.55244ptto}\hskip 11.38109pt\mbox{C1:}\hskip 2% .84526pt\sum_{k=1}^{K}p_{k}\leq P_{\mathrm{max}},subject to C1: ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ≤ italic_P start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ,
C2:m=1M{𝚷}mk=1,k,C2:superscriptsubscript𝑚1𝑀subscript𝚷𝑚𝑘1for-all𝑘\displaystyle\hskip 59.75078pt\mbox{C2:}\hskip 2.84526pt\sum_{m=1}^{M}\{% \mathbf{\Pi}\}_{mk}=1,\hskip 2.84526pt\forall k,C2: ∑ start_POSTSUBSCRIPT italic_m = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT { bold_Π } start_POSTSUBSCRIPT italic_m italic_k end_POSTSUBSCRIPT = 1 , ∀ italic_k ,
C3:RkRmin,k,k,C3:subscript𝑅𝑘subscript𝑅min𝑘for-all𝑘\displaystyle\hskip 59.75078pt\mbox{C3:}\hskip 2.84526pt{R}_{k}\geq R_{\mathrm% {min},k},\hskip 2.84526pt\forall k,C3: italic_R start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ≥ italic_R start_POSTSUBSCRIPT roman_min , italic_k end_POSTSUBSCRIPT , ∀ italic_k ,
C4:{𝚷}mk{0,1},m,k,C4:subscript𝚷𝑚𝑘01for-all𝑚for-all𝑘\displaystyle\hskip 59.75078pt\mbox{C4:}\hskip 2.84526pt\{\mathbf{\Pi}\}_{mk}% \in\left\{0,1\right\},\hskip 2.84526pt\forall m,\hskip 2.84526pt\forall k,C4: { bold_Π } start_POSTSUBSCRIPT italic_m italic_k end_POSTSUBSCRIPT ∈ { 0 , 1 } , ∀ italic_m , ∀ italic_k , (46)

where Rksubscript𝑅𝑘{R}_{k}italic_R start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is given by (7). C1 guarantees that the total transmit power does not exceed the power budget at the BS Pmaxsubscript𝑃maxP_{\mathrm{max}}italic_P start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT. C2 limits that each user can only be allocated to at most one subcarrier. Constraint C4 is imposed to ensure variable {𝚷}mksubscript𝚷𝑚𝑘\{\mathbf{\Pi}\}_{mk}{ bold_Π } start_POSTSUBSCRIPT italic_m italic_k end_POSTSUBSCRIPT to be an indicator. This optimization problem is also non-convex due to the non-convex objective function (NOF), variable coupling (VC) between pksubscript𝑝𝑘p_{k}italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT and {𝚷}mksubscript𝚷𝑚𝑘\{\mathbf{\Pi}\}_{mk}{ bold_Π } start_POSTSUBSCRIPT italic_m italic_k end_POSTSUBSCRIPT, fractional constraint (FC) C3, and binary constraint (BC) C4.

III-A2 Power-oriented Resource Allocation Design [AA, BB, CC]

We consider the uplink OFDMA system in (2) and formulate a power-oriented resource allocation design problem. The power allocation and the data stream scheduling strategy should be jointly designed to minimize the total transmit power of all users while satisfying the QoS requirement of each user. In particular, the power minimization problem can be formulated as the following optimization problem:

minimizepkdk,{𝚷k}mdkk𝒦dk=1Dkpkdksubscript𝑝𝑘subscript𝑑𝑘subscriptsubscript𝚷𝑘𝑚subscript𝑑𝑘minimize𝑘𝒦superscriptsubscriptsubscript𝑑𝑘1subscript𝐷𝑘subscript𝑝𝑘subscript𝑑𝑘\displaystyle\underset{p_{kd_{k}},\{\mathbf{\Pi}_{k}\}_{md_{k}}}{\operatorname% {minimize}}\,\,\,\,\underset{k\in\mathcal{K}}{\sum}\sum_{d_{k}=1}^{D_{k}}p_{kd% _{k}}start_UNDERACCENT italic_p start_POSTSUBSCRIPT italic_k italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT , { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_UNDERACCENT start_ARG roman_minimize end_ARG start_UNDERACCENT italic_k ∈ caligraphic_K end_UNDERACCENT start_ARG ∑ end_ARG ∑ start_POSTSUBSCRIPT italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT italic_p start_POSTSUBSCRIPT italic_k italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT
subject  toC1:dk=1DkpkdkPk,max,k,formulae-sequencesubject  toC1:superscriptsubscriptsubscript𝑑𝑘1subscript𝐷𝑘subscript𝑝𝑘subscript𝑑𝑘subscript𝑃𝑘maxfor-all𝑘\displaystyle\mbox{subject\hskip 4.55244ptto}\hskip 11.38109pt\mbox{C1:}\hskip 2% .84526pt\sum_{d_{k}=1}^{D_{k}}p_{kd_{k}}\leq P_{k,\mathrm{max}},\hskip 2.84526% pt\forall k,subject to C1: ∑ start_POSTSUBSCRIPT italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT italic_p start_POSTSUBSCRIPT italic_k italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT ≤ italic_P start_POSTSUBSCRIPT italic_k , roman_max end_POSTSUBSCRIPT , ∀ italic_k ,
C2:k=1Kdk=1Dk{𝚷k}mdk1,m,C2:superscriptsubscript𝑘1𝐾superscriptsubscriptsubscript𝑑𝑘1subscript𝐷𝑘subscriptsubscript𝚷𝑘𝑚subscript𝑑𝑘1for-all𝑚\displaystyle\hskip 59.75078pt\mbox{C2:}\hskip 2.84526pt\sum_{k=1}^{K}\sum_{d_% {k}=1}^{D_{k}}\{\mathbf{\Pi}_{k}\}_{md_{k}}\leq 1,\hskip 2.84526pt\forall m,C2: ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT ≤ 1 , ∀ italic_m ,
C3:RkRmin,k,C3:subscript𝑅𝑘subscript𝑅min𝑘\displaystyle\hskip 59.75078pt\mbox{C3:}\hskip 2.84526pt{R}_{k}\geq R_{\mathrm% {min},k},C3: italic_R start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ≥ italic_R start_POSTSUBSCRIPT roman_min , italic_k end_POSTSUBSCRIPT ,
C4:{𝚷k}mdk{0,1},m,k,dk,C4:subscriptsubscript𝚷𝑘𝑚subscript𝑑𝑘01for-all𝑚for-all𝑘for-allsubscript𝑑𝑘\displaystyle\hskip 59.75078pt\mbox{C4:}\hskip 2.84526pt\{\mathbf{\Pi}_{k}\}_{% md_{k}}\in\left\{0,1\right\},\hskip 2.84526pt\forall m,\hskip 2.84526pt\forall k% ,\hskip 2.84526pt\forall d_{k},C4: { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT ∈ { 0 , 1 } , ∀ italic_m , ∀ italic_k , ∀ italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , (47)

where Rksubscript𝑅𝑘{R}_{k}italic_R start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is given by (4). C1 guarantees that the total transmit power of user k𝑘kitalic_k does not exceed its power budget Pk,maxsubscript𝑃𝑘maxP_{k,\mathrm{max}}italic_P start_POSTSUBSCRIPT italic_k , roman_max end_POSTSUBSCRIPT. Besides, the user scheduling variables must obey C2 such that at most one data stream of a user can be scheduled exclusively to one subcarrier for maintaining orthogonality in resource allocation. Constant Rmin,ksubscript𝑅min𝑘R_{\mathrm{min},k}italic_R start_POSTSUBSCRIPT roman_min , italic_k end_POSTSUBSCRIPT in C3 denotes the minimum required data rate of user k𝑘kitalic_k and C3 is introduced to guarantee the QoS of each user. This optimization problem is also non-convex due to the VC between pkdksubscript𝑝𝑘subscript𝑑𝑘p_{kd_{k}}italic_p start_POSTSUBSCRIPT italic_k italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT and {𝚷k}mdksubscriptsubscript𝚷𝑘𝑚subscript𝑑𝑘\{\mathbf{\Pi}_{k}\}_{md_{k}}{ bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT, FC in C3, and BC in C4.

III-A3 Reliability-oriented Resource Allocation Design [AA, BB, CC]

For the case of imperfect CSI at the transmitter (CSIT), the resource allocation design for NGMA only has the knowledge of channel estimate 𝐡^ksubscript^𝐡𝑘\hat{\mathbf{h}}_{k}over^ start_ARG bold_h end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT, which may suffer from the channel estimation error as follows:

𝐡k=𝐡^k+Δ𝐡k,subscript𝐡𝑘subscript^𝐡𝑘Δsubscript𝐡𝑘{\mathbf{h}}_{k}=\hat{\mathbf{h}}_{k}+\Delta{\mathbf{h}}_{k},bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = over^ start_ARG bold_h end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT + roman_Δ bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , (48)

where Δ𝐡kΔsubscript𝐡𝑘\Delta{\mathbf{h}}_{k}roman_Δ bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is the channel estimation error. The channel estimation error can be modeled by a Gaussian model Δ𝐡k𝒞𝒩(𝟎,𝐂Δk)similar-toΔsubscript𝐡𝑘𝒞𝒩0subscriptsuperscript𝐂𝑘Δ\Delta{\mathbf{h}}_{k}\sim\mathcal{CN}\left(\mathbf{0},\mathbf{C}^{k}_{\Delta}\right)roman_Δ bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∼ caligraphic_C caligraphic_N ( bold_0 , bold_C start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT start_POSTSUBSCRIPT roman_Δ end_POSTSUBSCRIPT ) or a bounded model Δ𝐡kδknormΔsubscript𝐡𝑘subscript𝛿𝑘\left\|\Delta{\mathbf{h}}_{k}\right\|\leq\delta_{k}∥ roman_Δ bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ ≤ italic_δ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT, where 𝐂Δksubscriptsuperscript𝐂𝑘Δ\mathbf{C}^{k}_{\Delta}bold_C start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT start_POSTSUBSCRIPT roman_Δ end_POSTSUBSCRIPT is the covariance matrix of the channel estimation error and δksubscript𝛿𝑘\delta_{k}italic_δ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is the sphere radius where Δ𝐡kΔsubscript𝐡𝑘\Delta{\mathbf{h}}_{k}roman_Δ bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is located in. A reliability-oriented resource allocation design should be considered to guarantee communication performance even in the presence of channel estimation error. We consider the downlink RSMA system in (13) and formulate a robust resource allocation design problem concerning the worst-case achievable rates. The resource allocation design problem in the case of imperfect CSIT for RSMA is formulated as the following optimization problem:

maximize𝐩p,k,𝐩c,Ckk=1K(R~p,k+Ck)subscript𝐩p𝑘subscript𝐩csubscript𝐶𝑘maximizesuperscriptsubscript𝑘1𝐾subscript~𝑅p𝑘subscript𝐶𝑘\displaystyle\underset{\mathbf{p}_{\mathrm{p},k},\mathbf{p}_{\mathrm{c}},C_{k}% }{\operatorname{maximize}}\,\,\,\,\sum_{k=1}^{K}\left(\tilde{R}_{\mathrm{p},k}% +C_{k}\right)start_UNDERACCENT bold_p start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT , bold_p start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT , italic_C start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_UNDERACCENT start_ARG roman_maximize end_ARG ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT ( over~ start_ARG italic_R end_ARG start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT + italic_C start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT )
subject  toC1:k=1KCkmin{R~c,1,,R~c,K},subject  toC1:superscriptsubscript𝑘1𝐾subscript𝐶𝑘subscript~𝑅c1subscript~𝑅c𝐾\displaystyle\mbox{subject\hskip 4.55244ptto}\hskip 11.38109pt\mbox{C1:}\hskip 2% .84526pt\sum_{k=1}^{K}C_{k}\leq\min\left\{\tilde{R}_{\mathrm{c},1},\ldots,% \tilde{R}_{\mathrm{c},K}\right\},subject to C1: ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT italic_C start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ≤ roman_min { over~ start_ARG italic_R end_ARG start_POSTSUBSCRIPT roman_c , 1 end_POSTSUBSCRIPT , … , over~ start_ARG italic_R end_ARG start_POSTSUBSCRIPT roman_c , italic_K end_POSTSUBSCRIPT } ,
C2:k=1K𝐩p,k2+𝐩c2Pmax,C2:superscriptsubscript𝑘1𝐾superscriptnormsubscript𝐩p𝑘2superscriptnormsubscript𝐩c2subscript𝑃max\displaystyle\hskip 59.75078pt\mbox{C2:}\hskip 2.84526pt\sum_{k=1}^{K}\left\|% \mathbf{p}_{\mathrm{p},k}\right\|^{2}+\left\|\mathbf{p}_{\mathrm{c}}\right\|^{% 2}\leq P_{\mathrm{max}},C2: ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT ∥ bold_p start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + ∥ bold_p start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ≤ italic_P start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ,
C3:R~p,k+R~c,kRmin,k,k,C3:subscript~𝑅p𝑘subscript~𝑅c𝑘subscript𝑅min𝑘for-all𝑘\displaystyle\hskip 59.75078pt\mbox{C3:}\hskip 2.84526pt\tilde{R}_{\mathrm{p},% k}+\tilde{R}_{\mathrm{c},k}\geq R_{\mathrm{min},k},\hskip 2.84526pt\forall k,C3: over~ start_ARG italic_R end_ARG start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT + over~ start_ARG italic_R end_ARG start_POSTSUBSCRIPT roman_c , italic_k end_POSTSUBSCRIPT ≥ italic_R start_POSTSUBSCRIPT roman_min , italic_k end_POSTSUBSCRIPT , ∀ italic_k ,
C4:Ck0,k,C4:subscript𝐶𝑘0for-all𝑘\displaystyle\hskip 59.75078pt\mbox{C4:}\hskip 2.84526ptC_{k}\geq 0,\forall k,C4: italic_C start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ≥ 0 , ∀ italic_k , (49)

where R~p,ksubscript~𝑅p𝑘\tilde{R}_{\mathrm{p},k}over~ start_ARG italic_R end_ARG start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT and R~c,ksubscript~𝑅c𝑘\tilde{R}_{\mathrm{c},k}over~ start_ARG italic_R end_ARG start_POSTSUBSCRIPT roman_c , italic_k end_POSTSUBSCRIPT are the worst-case achievable rate in the presence of channel estimation error and they are defined by

R~p,k=minΔ𝐡kδkRp,kandR~c,k=minΔ𝐡kδkRc,k,subscript~𝑅p𝑘subscriptnormΔsubscript𝐡𝑘subscript𝛿𝑘subscript𝑅p𝑘andsubscript~𝑅c𝑘subscriptnormΔsubscript𝐡𝑘subscript𝛿𝑘subscript𝑅c𝑘\tilde{R}_{\mathrm{p},k}=\min_{\left\|\Delta{\mathbf{h}}_{k}\right\|\leq\delta% _{k}}{R_{\mathrm{p},k}}\;\;\text{and}\;\;\tilde{R}_{\mathrm{c},k}=\min_{\left% \|\Delta{\mathbf{h}}_{k}\right\|\leq\delta_{k}}{R_{\mathrm{c},k}},over~ start_ARG italic_R end_ARG start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT = roman_min start_POSTSUBSCRIPT ∥ roman_Δ bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ ≤ italic_δ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_R start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT and over~ start_ARG italic_R end_ARG start_POSTSUBSCRIPT roman_c , italic_k end_POSTSUBSCRIPT = roman_min start_POSTSUBSCRIPT ∥ roman_Δ bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ ≤ italic_δ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_R start_POSTSUBSCRIPT roman_c , italic_k end_POSTSUBSCRIPT , (50)

with Rp,ksubscript𝑅p𝑘{R_{\mathrm{p},k}}italic_R start_POSTSUBSCRIPT roman_p , italic_k end_POSTSUBSCRIPT and Rc,ksubscript𝑅c𝑘{R_{\mathrm{c},k}}italic_R start_POSTSUBSCRIPT roman_c , italic_k end_POSTSUBSCRIPT given by (14) and (15), respectively. Constraint C1 guarantees the decodability of the common stream for all users and constraint C2 is the total power constraint for the precoding vectors. Constraint C3 guarantees the minimum data rate for each user, where the sum of the private and common data rates for user k𝑘kitalic_k should not be less than its minimum required data rate Rmin,ksubscript𝑅min𝑘R_{\mathrm{min},k}italic_R start_POSTSUBSCRIPT roman_min , italic_k end_POSTSUBSCRIPT. Constraint C4 is introduced to guarantee a non-negative common rate allocation to user k𝑘kitalic_k. This optimization problem is non-convex due to the NOF, semi-infinite constraint (SMIC) in C1, and FCs in both C3 and C4.

III-B Resource Allocation Design for NGMA in Reconfigurable Channel

Emerging techniques including UAV, IRS, and M/FAs enable the joint design of wireless channels and signals. These techniques bring extra DoFs for resource allocation design. However, some challenges need to be tackled before the full potential of these emerging techniques can be unlocked. In the following, for each of these techniques, we formulate a typical optimization problem to help the readers better understand this.

III-B1 Resource Allocation for IRS-assisted NGMA [ZhiqiangOFDMA, yu2020power, wu2023globally]

We consider a passive IRS-assisted multi-user communication system. One typical design objective for resource allocation in IRS-assisted communication systems is the maximization of the sum rate. This leads to the following optimization problem:

maximize𝐩k,𝚿,αk,rk𝒦log2(1+Γk)subscript𝐩𝑘𝚿subscript𝛼𝑘𝑟maximize𝑘𝒦subscriptlog21subscriptΓ𝑘\displaystyle\underset{\mathbf{p}_{k},\mathbf{\Psi},\alpha_{k,r}}{% \operatorname{maximize}}\,\,\,\,\underset{k\in\mathcal{K}}{\sum}\mathrm{log}_{% 2}(1+\Gamma_{k})start_UNDERACCENT bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , bold_Ψ , italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT end_UNDERACCENT start_ARG roman_maximize end_ARG start_UNDERACCENT italic_k ∈ caligraphic_K end_UNDERACCENT start_ARG ∑ end_ARG roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( 1 + roman_Γ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT )
subject  toC1:k𝒦𝐩k2Pmax,subject  toC1:𝑘𝒦superscriptnormsubscript𝐩𝑘2subscript𝑃max\displaystyle\mbox{subject\hskip 4.55244ptto}\hskip 11.38109pt\mbox{C1:}\hskip 2% .84526pt\underset{k\in\mathcal{K}}{\sum}\left\|\mathbf{p}_{k}\right\|^{2}\leq P% _{\mathrm{max}},subject to C1: start_UNDERACCENT italic_k ∈ caligraphic_K end_UNDERACCENT start_ARG ∑ end_ARG ∥ bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ≤ italic_P start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ,
C2:|{𝚿}mm|=1,m{1,,Mps},formulae-sequenceC2:subscript𝚿𝑚𝑚1for-all𝑚1subscript𝑀ps\displaystyle\hskip 59.75078pt\mbox{C2:}\hskip 2.84526pt\Big{|}\{\mathbf{\Psi}% \}_{mm}\Big{|}=1,\forall m\in\left\{1,\ldots,M_{\rm ps}\right\},C2: | { bold_Ψ } start_POSTSUBSCRIPT italic_m italic_m end_POSTSUBSCRIPT | = 1 , ∀ italic_m ∈ { 1 , … , italic_M start_POSTSUBSCRIPT roman_ps end_POSTSUBSCRIPT } ,
C3:αk,r{0,1},kr𝒦,formulae-sequenceC3:subscript𝛼𝑘𝑟01for-all𝑘𝑟𝒦\displaystyle\hskip 59.75078pt\mbox{C3:}\hskip 2.84526pt\alpha_{k,r}\in\{0,1\}% ,\hskip 2.84526pt\forall k\neq r\in\mathcal{K},C3: italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT ∈ { 0 , 1 } , ∀ italic_k ≠ italic_r ∈ caligraphic_K ,
C4:αk,r+αr,k=1,kr𝒦,formulae-sequenceC4:subscript𝛼𝑘𝑟subscript𝛼𝑟𝑘1for-all𝑘𝑟𝒦\displaystyle\hskip 59.75078pt\mbox{C4:}\hskip 2.84526pt\alpha_{k,r}+\alpha_{r% ,k}=1,\hskip 2.84526pt\forall k\neq r\in\mathcal{K},C4: italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT + italic_α start_POSTSUBSCRIPT italic_r , italic_k end_POSTSUBSCRIPT = 1 , ∀ italic_k ≠ italic_r ∈ caligraphic_K , (51)

where the SINR of user k𝑘kitalic_k ΓksubscriptΓ𝑘\Gamma_{k}roman_Γ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is given by (25). In the above optimization problem, the BS transmit beamforming vector, the IRS phase shift pattern, and the SIC decoding order are jointly optimized for the maximization of the system sum rate. The constant Pmaxsubscript𝑃maxP_{\mathrm{max}}italic_P start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT in constraint C1 is the maximum BS transmit power. Due to the passive nature of the IRS, unit-modulus constraint (UMC) C2 is adopted to enforce each main diagonal element of the IRS phase shift matrix to have a unit gain [xu2021resource, yu2019enabling]. Alternatively, by employing a discrete phase shift model, the elements of 𝚿𝚿\mathbf{\Psi}bold_Ψ can be selected from a discrete feasible set [wu2023globally]. Binary constraint C3 represents the candidate SIC decoding order and constraint C4 ensures that for two users, only one possible SIC decoding order is employed for both users.

III-B2 Resource Allocation for UAV-assisted NGMA [8663615, 8445944, 8644086]

We consider a rotary-wing UAV-assisted multi-user communication system in (21). One possible design goal for resource allocation in UAV-assisted communication systems is the minimization of the UAV’s total power consumption. In time slot t𝑡titalic_t, the power minimization problem is formulated as the following optimization problem:

minimize𝐩k[t],𝐫0[t],𝐯u[t],αk,r[t]k𝒦𝐩kH[t]𝐩k[t]+Paero[t]+MPcircsubscript𝐩𝑘delimited-[]𝑡subscript𝐫0delimited-[]𝑡subscript𝐯𝑢delimited-[]𝑡subscript𝛼𝑘𝑟delimited-[]𝑡minimize𝑘𝒦subscriptsuperscript𝐩𝐻𝑘delimited-[]𝑡subscript𝐩𝑘delimited-[]𝑡subscript𝑃aerodelimited-[]𝑡𝑀subscript𝑃circ\displaystyle\underset{\begin{subarray}{c}\mathbf{p}_{k}[t],\mathbf{r}_{0}[t],% \\ \mathbf{v}_{u}[t],\alpha_{k,r}[t]\end{subarray}}{\operatorname{minimize}}\,\,% \,\,\hskip 5.69054pt\underset{k\in\mathcal{K}}{\sum}\mathbf{p}^{H}_{k}[t]% \mathbf{p}_{k}[t]+P_{\mathrm{aero}}[t]+M\cdot P_{\mathrm{circ}}start_UNDERACCENT start_ARG start_ROW start_CELL bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] , bold_r start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT [ italic_t ] , end_CELL end_ROW start_ROW start_CELL bold_v start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT [ italic_t ] , italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT [ italic_t ] end_CELL end_ROW end_ARG end_UNDERACCENT start_ARG roman_minimize end_ARG start_UNDERACCENT italic_k ∈ caligraphic_K end_UNDERACCENT start_ARG ∑ end_ARG bold_p start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] + italic_P start_POSTSUBSCRIPT roman_aero end_POSTSUBSCRIPT [ italic_t ] + italic_M ⋅ italic_P start_POSTSUBSCRIPT roman_circ end_POSTSUBSCRIPT
subject  toC1:{k𝒦𝐩k[t]𝐩kH[t]}iiPi,i,formulae-sequencesubject  toC1:subscript𝑘𝒦subscript𝐩𝑘delimited-[]𝑡subscriptsuperscript𝐩𝐻𝑘delimited-[]𝑡𝑖𝑖subscript𝑃𝑖for-all𝑖\displaystyle\mbox{subject\hskip 4.55244ptto}\hskip 11.38109pt\mbox{C1:}\hskip 2% .84526pt\{\underset{k\in\mathcal{K}}{\sum}\mathbf{p}_{k}[t]\mathbf{p}^{H}_{k}[% t]\}_{ii}\leq\mathit{P}_{i},\hskip 2.84526pt\forall i,subject to C1: { start_UNDERACCENT italic_k ∈ caligraphic_K end_UNDERACCENT start_ARG ∑ end_ARG bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] bold_p start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] } start_POSTSUBSCRIPT italic_i italic_i end_POSTSUBSCRIPT ≤ italic_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , ∀ italic_i ,
C2:Γk[t]Γreqk,k,C2:subscriptΓ𝑘delimited-[]𝑡subscriptΓsubscriptreq𝑘for-all𝑘\displaystyle\hskip 59.75078pt\mbox{C2:}\hskip 2.84526pt\Gamma_{k}[t]\geq% \Gamma_{\mathrm{req}_{k}},\hskip 2.84526pt\forall k,C2: roman_Γ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] ≥ roman_Γ start_POSTSUBSCRIPT roman_req start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT , ∀ italic_k ,
C3:𝐯u[t]𝐯u[t1]amaxδT,C3:normsubscript𝐯𝑢delimited-[]𝑡subscript𝐯𝑢delimited-[]𝑡1subscript𝑎maxsubscript𝛿𝑇\displaystyle\hskip 59.75078pt\mbox{C3:}\hskip 2.84526pt\left\|\mathbf{v}_{u}[% t]-\mathbf{v}_{u}[t-1]\right\|\leq a_{\mathrm{max}}\delta_{T},C3: ∥ bold_v start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT [ italic_t ] - bold_v start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT [ italic_t - 1 ] ∥ ≤ italic_a start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT italic_δ start_POSTSUBSCRIPT italic_T end_POSTSUBSCRIPT ,
C4:𝐯u[t]δT=𝐫0[t]𝐫0[t1],C4:normsubscript𝐯𝑢delimited-[]𝑡subscript𝛿𝑇normsubscript𝐫0delimited-[]𝑡subscript𝐫0delimited-[]𝑡1\displaystyle\hskip 59.75078pt\mbox{C4:}\hskip 2.84526pt\left\|\mathbf{v}_{u}[% t]\right\|\delta_{T}=\left\|\mathbf{r}_{0}[t]-\mathbf{r}_{0}[t-1]\right\|,C4: ∥ bold_v start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT [ italic_t ] ∥ italic_δ start_POSTSUBSCRIPT italic_T end_POSTSUBSCRIPT = ∥ bold_r start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT [ italic_t ] - bold_r start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT [ italic_t - 1 ] ∥ ,
C5:αk,r[t]{0,1},kr𝒦,formulae-sequenceC5:subscript𝛼𝑘𝑟delimited-[]𝑡01for-all𝑘𝑟𝒦\displaystyle\hskip 59.75078pt\mbox{C5:}\hskip 2.84526pt\alpha_{k,r}[t]\in\{0,% 1\},\hskip 2.84526pt\forall k\neq r\in\mathcal{K},C5: italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT [ italic_t ] ∈ { 0 , 1 } , ∀ italic_k ≠ italic_r ∈ caligraphic_K ,
C6:αk,r[t]+αr,k[t]=1,kr𝒦,formulae-sequenceC6:subscript𝛼𝑘𝑟delimited-[]𝑡subscript𝛼𝑟𝑘delimited-[]𝑡1for-all𝑘𝑟𝒦\displaystyle\hskip 59.75078pt\mbox{C6:}\hskip 2.84526pt\alpha_{k,r}[t]+\alpha% _{r,k}[t]=1,\hskip 2.84526pt\forall k\neq r\in\mathcal{K},C6: italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT [ italic_t ] + italic_α start_POSTSUBSCRIPT italic_r , italic_k end_POSTSUBSCRIPT [ italic_t ] = 1 , ∀ italic_k ≠ italic_r ∈ caligraphic_K , (52)

where the SINR of user k𝑘kitalic_k in time slot t𝑡titalic_t Γk[t]subscriptΓ𝑘delimited-[]𝑡\Gamma_{k}[t]roman_Γ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] is given by (22). The constant Pisubscript𝑃𝑖P_{i}italic_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT in constraint C1 denotes the maximum transmit power of the i𝑖iitalic_i-th antenna element, i{1,,N}for-all𝑖1𝑁\forall i\in\left\{1,\ldots,N\right\}∀ italic_i ∈ { 1 , … , italic_N }, due to the limitation of the analog RF front-end. Constraint C2 indicates a pre-defined SINR threshold of user k𝑘kitalic_k should be met to ensure the desired QoS requirement, denoted by ΓreqksubscriptΓsubscriptreq𝑘\Gamma_{\mathrm{req}_{k}}roman_Γ start_POSTSUBSCRIPT roman_req start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT. In addition to conventional communication-oriented performance metrics and constraints, UAV-assisted communication also introduces additional UAV-related terms and constraints for resource allocation design. First, Paero[t]subscript𝑃aerodelimited-[]𝑡P_{\mathrm{aero}}[t]italic_P start_POSTSUBSCRIPT roman_aero end_POSTSUBSCRIPT [ italic_t ] in the objective function denotes the UAV aerodynamic power and it is determined by the UAV speed 𝐯u[t]subscript𝐯𝑢delimited-[]𝑡\mathbf{v}_{u}[t]bold_v start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT [ italic_t ]. In particular, Paero[t]subscript𝑃aerodelimited-[]𝑡P_{\mathrm{aero}}[t]italic_P start_POSTSUBSCRIPT roman_aero end_POSTSUBSCRIPT [ italic_t ] can be modelled as Paero[t]=2Wuc12𝐯u[t]2+𝐯u[t]4+4c14+c2VT3[1+c3(𝐯u[t]VT)2]+c4𝐯u[t]3subscript𝑃aerodelimited-[]𝑡2subscript𝑊𝑢superscriptsubscript𝑐12superscriptnormsubscript𝐯𝑢delimited-[]𝑡2superscriptnormsubscript𝐯𝑢delimited-[]𝑡44superscriptsubscript𝑐14subscript𝑐2superscriptsubscript𝑉T3delimited-[]1subscript𝑐3superscriptnormsubscript𝐯𝑢delimited-[]𝑡subscript𝑉T2subscript𝑐4superscriptnormsubscript𝐯𝑢delimited-[]𝑡3P_{\mathrm{aero}}[t]=\frac{\sqrt{2}W_{u}c_{1}^{2}}{\sqrt{\left\|\mathbf{v}_{u}% [t]\right\|^{2}+\sqrt{\left\|\mathbf{v}_{u}[t]\right\|^{4}+4c_{1}^{4}}}}+c_{2}% V_{\mathrm{T}}^{3}\Big{[}1+c_{3}\Big{(}\frac{\left\|\mathbf{v}_{u}[t]\right\|}% {V_{\mathrm{T}}}\Big{)}^{2}\Big{]}+c_{4}\left\|\mathbf{v}_{u}[t]\right\|^{3}italic_P start_POSTSUBSCRIPT roman_aero end_POSTSUBSCRIPT [ italic_t ] = divide start_ARG square-root start_ARG 2 end_ARG italic_W start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT italic_c start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG square-root start_ARG ∥ bold_v start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT [ italic_t ] ∥ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + square-root start_ARG ∥ bold_v start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT [ italic_t ] ∥ start_POSTSUPERSCRIPT 4 end_POSTSUPERSCRIPT + 4 italic_c start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 4 end_POSTSUPERSCRIPT end_ARG end_ARG end_ARG + italic_c start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT italic_V start_POSTSUBSCRIPT roman_T end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 3 end_POSTSUPERSCRIPT [ 1 + italic_c start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT ( divide start_ARG ∥ bold_v start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT [ italic_t ] ∥ end_ARG start_ARG italic_V start_POSTSUBSCRIPT roman_T end_POSTSUBSCRIPT end_ARG ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] + italic_c start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT ∥ bold_v start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT [ italic_t ] ∥ start_POSTSUPERSCRIPT 3 end_POSTSUPERSCRIPT. Here, constant VTsubscript𝑉TV_{\mathrm{T}}italic_V start_POSTSUBSCRIPT roman_T end_POSTSUBSCRIPT denotes the rotor tip speed and Wusubscript𝑊𝑢W_{u}italic_W start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT, c1subscript𝑐1c_{1}italic_c start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT, c2subscript𝑐2c_{2}italic_c start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT, c3subscript𝑐3c_{3}italic_c start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT, and c4subscript𝑐4c_{4}italic_c start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT are UAV aerodynamic power consumption parameters [seddon2011basic, 8663615]. Moreover, constraints C3 and C4 are the UAV kinetic constraints. Constraints C5 and C6 are imposed to ensure the SIC decoding order. This optimization problem is non-convex due to the NOF, FC in C2, and BC in C5.

III-B3 Resource Allocation for M/FA-enabled NGMA [10283659, 10207991]

We consider a M/FA-enabled multi-user communication system in (29). One possible common design objective of M/FA-enabled communication systems is to minimize the BS total transmit power by jointly optimizing the beamforming vectors and the position of the M/FAs. This leads to the following optimization problem:

minimize𝐏,𝐓,𝐔k𝒦𝐩k22𝐏𝐓𝐔minimizesubscript𝑘𝒦superscriptsubscriptnormsubscript𝐩𝑘22\displaystyle\underset{\mathbf{P},\mathbf{T},\mathbf{U}}{\operatorname{% minimize}}\hskip 11.38109pt\sum_{k\in\mathcal{K}}\left\|\mathbf{p}_{k}\right\|% _{2}^{2}start_UNDERACCENT bold_P , bold_T , bold_U end_UNDERACCENT start_ARG roman_minimize end_ARG ∑ start_POSTSUBSCRIPT italic_k ∈ caligraphic_K end_POSTSUBSCRIPT ∥ bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT
subject  toC1:ΓkΓreqk,k,formulae-sequencesubject  toC1:subscriptΓ𝑘subscriptΓsubscriptreq𝑘for-all𝑘\displaystyle\mbox{subject\hskip 4.55244ptto}\hskip 11.38109pt\mbox{C1:}\hskip 2% .84526pt\Gamma_{k}\geq\Gamma_{\mathrm{req}_{k}},\hskip 2.84526pt\forall k,subject to C1: roman_Γ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ≥ roman_Γ start_POSTSUBSCRIPT roman_req start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT , ∀ italic_k ,
C2:tn[q]{0,1},n,q,C2:subscript𝑡𝑛delimited-[]𝑞01for-all𝑛for-all𝑞\displaystyle\hskip 59.75078pt\mbox{C2:}\hskip 2.84526ptt_{n}[q]\in\{0,1\},% \hskip 2.84526pt\forall n,\hskip 2.84526pt\forall q,C2: italic_t start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT [ italic_q ] ∈ { 0 , 1 } , ∀ italic_n , ∀ italic_q ,
C3:q=1Qtn[q]=1,n,C3:superscriptsubscript𝑞1𝑄subscript𝑡𝑛delimited-[]𝑞1for-all𝑛\displaystyle\hskip 59.75078pt\mbox{C3:}\hskip 2.84526pt\sum_{q=1}^{Q}t_{n}[q]% =1,\hskip 2.84526pt\forall n,C3: ∑ start_POSTSUBSCRIPT italic_q = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_Q end_POSTSUPERSCRIPT italic_t start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT [ italic_q ] = 1 , ∀ italic_n ,
C4:𝐔=𝐓𝐏,C4:𝐔𝐓𝐏\displaystyle\hskip 59.75078pt\mbox{C4:}\hskip 2.84526pt\mathbf{U}=\mathbf{T}% \mathbf{P},C4: bold_U = bold_TP , (53)

where the SINR of user k𝑘kitalic_k ΓksubscriptΓ𝑘\Gamma_{k}roman_Γ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is given by (31). The constant ΓreqksubscriptΓsubscriptreq𝑘\Gamma_{\mathrm{req}_{k}}roman_Γ start_POSTSUBSCRIPT roman_req start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT in constraint C1 denotes the minimum required SINR of user k𝑘kitalic_k to ensure a satisfying communication service. Constraints C2 and C3 are imposed to present the position selection of M/FA elements. Equality constraint (EC) C4 is imposed such that the beamforming and antenna selection policy can be successfully recovered after optimization. This optimization problem is non-convex due to the FC C1, BC C2, and EC C4.

III-C Resource Allocation Design for NGMA in Functional Channels

The resource allocation design for functional channels departs from the objectives for conventional communication-only channels, given the unique integrated nature, where communication functionality and other functionalities coexist. Particularly, the objective function for functional channels necessitates a careful tradeoff between communication performance and other performance of interest. Depending on the specific system requirements and objectives, the objective function in NGMA can be broadly classified into three categories. Specifically, the communication-centric design may be the most straightforward design that aims to optimize the communication performance subject to a reasonable performance requirement of the other functionalities. In contrast to the communication-centric design, the resource allocation design can focus on the performance of other functionalities while maintaining a reasonable communication performance. This design is referred to as the function-centric design. According to the above two design criteria, the resource allocation design for NGMA in functional channels is detailed as follows.

III-C1 Communication-Centric Resource Allocation [**ke2019JCAC, Fan2020, 10207991]

We study the communication-centric resource allocation based on the downlink SDMA-based monostatic ISAC system given in Section II-C. In the communication-centric resource allocation, the design objective is to optimize the communication performance while satisfying certain constraints required by the radar sensing functionality. Considering (37), the corresponding optimization problem can be formulated as follows:

maximize𝐏N×Kk=1Klog2(1+Γk)𝐏superscript𝑁𝐾maximizesuperscriptsubscript𝑘1𝐾subscript21subscriptΓ𝑘\displaystyle\underset{\mathbf{P}\in\mathbb{C}^{{N}\times{K}}}{\operatorname{% maximize}}\,\,\,\,\sum\limits_{k=1}^{K}{{{\log}_{2}}\left({1+\Gamma_{k}}\right)}start_UNDERACCENT bold_P ∈ blackboard_C start_POSTSUPERSCRIPT italic_N × italic_K end_POSTSUPERSCRIPT end_UNDERACCENT start_ARG roman_maximize end_ARG ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( 1 + roman_Γ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT )
subject  toC1:1LTr(𝐒H𝐏H𝐏𝐒)Pmax,subject  toC1:1𝐿Trsuperscript𝐒Hsuperscript𝐏H𝐏𝐒subscript𝑃max\displaystyle\mbox{subject\hskip 4.55244ptto}\hskip 11.38109pt\mbox{C1:}\hskip 2% .84526pt\frac{1}{L}{\rm{Tr}}\left({{{\bf{S}}^{\rm{H}}}{{\bf{P}}^{\rm{H}}}{\bf{% PS}}}\right)\leq P_{\mathrm{max}},subject to C1: divide start_ARG 1 end_ARG start_ARG italic_L end_ARG roman_Tr ( bold_S start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT bold_P start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT bold_PS ) ≤ italic_P start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ,
C2:1L𝐏𝐒𝐗0F2δ,C2:1𝐿superscriptsubscriptnorm𝐏𝐒subscript𝐗0F2𝛿\displaystyle\hskip 59.75078pt\mbox{C2:}\hskip 2.84526pt\frac{1}{L}\left\|{{% \bf{PS}}-{{\bf{X}}_{0}}}\right\|_{\rm{F}}^{2}\leq\delta,C2: divide start_ARG 1 end_ARG start_ARG italic_L end_ARG ∥ bold_PS - bold_X start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT ∥ start_POSTSUBSCRIPT roman_F end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ≤ italic_δ , (54)

where ΓksubscriptΓ𝑘\Gamma_{k}roman_Γ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is given by (37), δ𝛿\deltaitalic_δ is a pre-determined parameter characterizing the required sensing quality, and Pmaxsubscript𝑃P_{\max}italic_P start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT is the power constraint. As mentioned before, the radar sensing quality is evaluated by the similarity between the transmitted beampattern and the desired beampattern for radar sensing, which becomes the optimization problem constraint C2 [xu2022integrated]. Compared to the resource allocation problem for conventional communication-oriented channels, the size of the solution set for the sum rate optimization problem is reduced due to the requirement of radar sensing quality. This optimization problem is non-convex due to the NOF.

III-C2 Function-Centric Resource Allocation [AA, BB, CC]

We study the function-centric resource allocation for JCAC transmissions discussed in Section II-C. In the considered problem, the design objective is to minimize energy consumption while satisfying the constraint on the communication rate. The corresponding optimization problem can be formulated as follows:

minimizepkl,{𝚷𝐤}ml,LkEtotsubscript𝑝𝑘𝑙subscriptsubscript𝚷𝐤𝑚𝑙subscript𝐿𝑘minimizesubscript𝐸tot\displaystyle\underset{{p_{kl}},\{\mathbf{\Pi_{k}}\}_{ml},L_{k}}{\operatorname% {minimize}}\,\,\,\,{E_{\rm{tot}}}start_UNDERACCENT italic_p start_POSTSUBSCRIPT italic_k italic_l end_POSTSUBSCRIPT , { bold_Π start_POSTSUBSCRIPT bold_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_l end_POSTSUBSCRIPT , italic_L start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_UNDERACCENT start_ARG roman_minimize end_ARG italic_E start_POSTSUBSCRIPT roman_tot end_POSTSUBSCRIPT
subject  toC1:RC,kRmin,k,kformulae-sequencesubject  toC1:subscript𝑅C𝑘subscript𝑅𝑘for-all𝑘\displaystyle\mbox{subject\hskip 4.55244ptto}\hskip 11.38109pt\mbox{C1:}R_{{% \rm C},k}\geq R_{\min,k},\forall ksubject to C1: italic_R start_POSTSUBSCRIPT roman_C , italic_k end_POSTSUBSCRIPT ≥ italic_R start_POSTSUBSCRIPT roman_min , italic_k end_POSTSUBSCRIPT , ∀ italic_k
C2:RMEC,k+LkL~k,k,C2:subscript𝑅MEC𝑘subscript𝐿𝑘subscript~𝐿𝑘for-all𝑘\displaystyle\hskip 59.75078pt\mbox{C2:}\hskip 2.84526ptR_{{\rm MEC},k}+L_{k}% \geq{\tilde{L}}_{k},\forall k,C2: italic_R start_POSTSUBSCRIPT roman_MEC , italic_k end_POSTSUBSCRIPT + italic_L start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ≥ over~ start_ARG italic_L end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , ∀ italic_k ,
C3:pkl0,k,l{1,,DTot,k},formulae-sequenceC3:subscript𝑝𝑘𝑙0for-all𝑘for-all𝑙1subscript𝐷Tot𝑘\displaystyle\hskip 59.75078pt\mbox{C3:}\hskip 2.84526ptp_{kl}\geq 0,\forall k% ,\forall l\in\{1,\ldots,D_{{\rm Tot},k}\},C3: italic_p start_POSTSUBSCRIPT italic_k italic_l end_POSTSUBSCRIPT ≥ 0 , ∀ italic_k , ∀ italic_l ∈ { 1 , … , italic_D start_POSTSUBSCRIPT roman_Tot , italic_k end_POSTSUBSCRIPT } ,
C4:0LkL~k,k,formulae-sequenceC4:0subscript𝐿𝑘subscript~𝐿𝑘for-all𝑘\displaystyle\hskip 59.75078pt\mbox{C4:}\hskip 2.84526pt0\leq L_{k}\leq{\tilde% {L}}_{k},\forall k,C4: 0 ≤ italic_L start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ≤ over~ start_ARG italic_L end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , ∀ italic_k ,
C5:{𝚷k}ml{0,1},m,k,l{1,,DTot,k},formulae-sequenceC5:subscriptsubscript𝚷𝑘𝑚𝑙01for-all𝑚for-all𝑘for-all𝑙1subscript𝐷Tot𝑘\displaystyle\hskip 59.75078pt\mbox{C5:}\hskip 2.84526pt\{\mathbf{\Pi}_{k}\}_{% ml}\in\left\{0,1\right\},\hskip 2.84526pt\forall m,\hskip 2.84526pt\forall k,% \hskip 2.84526pt\forall l\in\{1,\ldots,D_{{\rm Tot},k}\},C5: { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_l end_POSTSUBSCRIPT ∈ { 0 , 1 } , ∀ italic_m , ∀ italic_k , ∀ italic_l ∈ { 1 , … , italic_D start_POSTSUBSCRIPT roman_Tot , italic_k end_POSTSUBSCRIPT } ,
C6:k=1KlC=1DC,k{𝚷k}mlC+k=1KlMEC=1DMEC,k{𝚷k}m(DC,k+lMEC)1,m.C6:superscriptsubscript𝑘1𝐾superscriptsubscriptsubscript𝑙C1subscript𝐷C𝑘subscriptsubscript𝚷𝑘𝑚subscript𝑙Csuperscriptsubscript𝑘1𝐾superscriptsubscriptsubscript𝑙MEC1subscript𝐷MEC𝑘subscriptsubscript𝚷𝑘𝑚subscript𝐷C𝑘subscript𝑙MEC1for-all𝑚\displaystyle\hskip 59.75078pt\mbox{C6:}\hskip 2.84526pt\sum_{k=1}^{K}\sum_{l_% {\rm C}=1}^{D_{{\rm C},k}}\{\mathbf{\Pi}_{k}\}_{m{l_{\rm C}}}+\sum_{k=1}^{K}% \sum_{l_{\rm MEC}=1}^{D_{{\rm MEC},k}}\{\mathbf{\Pi}_{k}\}_{m{\left(D_{{\rm C}% ,k}+l_{\rm MEC}\right)}}\leq 1,\hskip 2.84526pt\forall m.C6: ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT roman_C , italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_l start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT end_POSTSUBSCRIPT + ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT roman_MEC end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT roman_MEC , italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m ( italic_D start_POSTSUBSCRIPT roman_C , italic_k end_POSTSUBSCRIPT + italic_l start_POSTSUBSCRIPT roman_MEC end_POSTSUBSCRIPT ) end_POSTSUBSCRIPT ≤ 1 , ∀ italic_m . (55)

Note that the value of Lksubscript𝐿𝑘L_{k}italic_L start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT needs to be an integer by definition but is treated as a continuous variable here, but the performance loss is in general negligible when Lksubscript𝐿𝑘L_{k}italic_L start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is sufficiently large [Feng2019multiantenna]. In (III-C2), C1 states that the communication rate of each user needs to satisfy the corresponding minimum constraint; C2 is the constraint on the offloading rate such that the the whole task of each user can be computed either locally at the user side or at the BS; C3 is the power constraint; C4 is the length requirements of the offloading bit sequences; C5 and C6 together ensure that the communication symbol and task symbol can be allocated to at most one subcarrier in the transmission.

IV Optimization Tools for Resource Allocation Design

You better pay attention to this section. The discussions are not precise, with respect the so-called global optimality. Are you dealing with single optimization variables or multiple? FOR ALL algorithms, they are about performance, convergence, complexity, and hidden cost (e.g., signalling overhead). it’s better to address some of them, at least convergence anc complexity

In this section, we introduce several optimization approaches for addressing the optimization problems of NGMA systems formulated in Section III. In particular, we first discuss a few globally optimal approaches for handling a particular type of non-convexity, including semidefinite relaxation (SDR), branch-and-bound (BnB), and monotonic optimization (MO). Indeed, the resource allocation problems for NGMA are generally complicated involving different kinds of non-convexities. In general, one may need to exploit a combination of different global optimization methods to obtain a globally optimal solution. We note that these optimal approaches can be exploited to reveal the performance upper bound of the NGMA systems and serve as performance benchmarks for the related suboptimal approaches. While they allow us to find the globally optimal solution, they typically require a significant amount of computational resources. To strike a balance between optimality and complexity, we then introduce a few low-complexity suboptimal approaches such as successive convex approximation (SCA) and block coordinate descent (BCD). Moreover, for each approach, we will provide a clear explanation of the basic ideas behind these approaches and interpret the flow and key steps in detail. Also, we will take some optimization problems listed in Section III and briefly discuss how these approaches can be employed to tackle the optimization problems.

TABLE IV: Comparison of different resource allocation design problems from an optimization perspective.
Problem Challenges Methods Optimality Complexity
(III-A1) NOF, VC, FC, BC BnB, SCA Locally optimal Exponentially high
(III-A2) VC, FC, BC BnB Globally optimal Exponentially high
(III-A3) NOF, SMIC, FC SCA, S-procedure[boyd2004convex] Locally optimal Moderate
(III-B1) NOF, UMC, FC BCD, SCA, SDR, manifold optimization[absil2009optimization] Locally optimal Moderate
(III-B2) NOF, FC, BC MO, SDR Globally optimal Exponentially high
(III-B3) FC, BC, EC BnB, bilinear transformation[6698281] Locally optimal Exponentially high
(III-C1) NOF SCA Locally optimal Low
(III-C2) NOF FC MO Globally optimal Exponentially high

IV-A Global Optimization Approaches

IV-A1 Semidefinite Relaxation Approach

When the transmitter is equipped with multiple antennas and the targeted receivers are equipped with single antennas, the corresponding transmitter beamforming design problem, e.g., the problems in (III-B1), (III-B2), and (III-B3), can be equivalently transformed as semidefinite programming (SDP) problems 333You need to articulate clearly what variables are you talking about? The heading Global optimization can be very misleading. . We take the optimization problem in (III-B2) as an example. To dev=In particular, by defining the beamforming matrix 𝐏k[t]N×Nsubscript𝐏𝑘delimited-[]𝑡superscript𝑁𝑁\mathbf{P}_{k}[t]\in{\mathbb{C}}^{N\times N}bold_P start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] ∈ blackboard_C start_POSTSUPERSCRIPT italic_N × italic_N end_POSTSUPERSCRIPT, 𝐏k[t]=𝐩k[t]𝐩kH[t]subscript𝐏𝑘delimited-[]𝑡subscript𝐩𝑘delimited-[]𝑡superscriptsubscript𝐩𝑘𝐻delimited-[]𝑡\mathbf{P}_{k}[t]=\mathbf{p}_{k}[t]\mathbf{p}_{k}^{H}[t]bold_P start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] = bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT [ italic_t ], (III-B2) can be equivalently represented as the following SDP problem:

( Are you talking about optimization 𝐏k[t]subscript𝐏𝑘delimited-[]𝑡\mathbf{P}_{k}[t]bold_P start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] only?? or all variables?)

minimize𝐏k[t],𝐫0[t],𝐯u[t],αk,r[t]k𝒦Tr(𝐏k[t])+Paero[t]+MPcircsubscript𝐏𝑘delimited-[]𝑡subscript𝐫0delimited-[]𝑡subscript𝐯𝑢delimited-[]𝑡subscript𝛼𝑘𝑟delimited-[]𝑡minimize𝑘𝒦Trsubscript𝐏𝑘delimited-[]𝑡subscript𝑃aerodelimited-[]𝑡𝑀subscript𝑃circ\displaystyle\underset{\color[rgb]{1,0,0}\begin{subarray}{c}\mathbf{P}_{k}[t],% \mathbf{r}_{0}[t],\\ \mathbf{v}_{u}[t],\alpha_{k,r}[t]\end{subarray}}{\operatorname{minimize}}\,\,% \,\,\hskip 8.53581pt\underset{k\in\mathcal{K}}{\sum}\mathrm{Tr}(\mathbf{P}_{k}% [t])+P_{\mathrm{aero}}[t]+M\cdot P_{\mathrm{circ}}start_UNDERACCENT start_ARG start_ROW start_CELL bold_P start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] , bold_r start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT [ italic_t ] , end_CELL end_ROW start_ROW start_CELL bold_v start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT [ italic_t ] , italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT [ italic_t ] end_CELL end_ROW end_ARG end_UNDERACCENT start_ARG roman_minimize end_ARG start_UNDERACCENT italic_k ∈ caligraphic_K end_UNDERACCENT start_ARG ∑ end_ARG roman_Tr ( bold_P start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] ) + italic_P start_POSTSUBSCRIPT roman_aero end_POSTSUBSCRIPT [ italic_t ] + italic_M ⋅ italic_P start_POSTSUBSCRIPT roman_circ end_POSTSUBSCRIPT
subject  toC1:{k𝒦𝐏k[t]}iiPi,i,formulae-sequencesubject  toC1:subscript𝑘𝒦subscript𝐏𝑘delimited-[]𝑡𝑖𝑖subscript𝑃𝑖for-all𝑖\displaystyle\mbox{subject\hskip 4.55244ptto}\hskip 11.38109pt\mbox{C1:}\hskip 2% .84526pt\{\underset{k\in\mathcal{K}}{\sum}\mathbf{P}_{k}[t]\}_{ii}\leq\mathit{% P}_{i},\hskip 2.84526pt\forall i,subject to C1: { start_UNDERACCENT italic_k ∈ caligraphic_K end_UNDERACCENT start_ARG ∑ end_ARG bold_P start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] } start_POSTSUBSCRIPT italic_i italic_i end_POSTSUBSCRIPT ≤ italic_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , ∀ italic_i ,
C2:ϱ𝐫0[t]𝐫k2+H02Tr(𝐚kH[t]𝐏k[t]𝐚k[t])r𝒦{k}αk,r[t]ϱ𝐫0[t]𝐫k2+H02Tr(𝐚kH[t]𝐏r[t]𝐚k[t])+σnk2[t]Γreqk,k,C2:italic-ϱsuperscriptnormsubscriptsuperscript𝐫0delimited-[]𝑡subscriptsuperscript𝐫𝑘2superscriptsubscript𝐻02Trsuperscriptsubscript𝐚𝑘𝐻delimited-[]𝑡subscript𝐏𝑘delimited-[]𝑡subscript𝐚𝑘delimited-[]𝑡𝑟𝒦𝑘subscript𝛼𝑘𝑟delimited-[]𝑡italic-ϱsuperscriptnormsubscriptsuperscript𝐫0delimited-[]𝑡subscriptsuperscript𝐫𝑘2superscriptsubscript𝐻02Trsuperscriptsubscript𝐚𝑘𝐻delimited-[]𝑡subscript𝐏𝑟delimited-[]𝑡subscript𝐚𝑘delimited-[]𝑡subscriptsuperscript𝜎2subscript𝑛𝑘delimited-[]𝑡subscriptΓsubscriptreq𝑘for-all𝑘\displaystyle\hskip 59.75078pt\mbox{C2:}\hskip 2.84526pt\frac{\frac{\varrho}{% \left\|\mathbf{r}^{\prime}_{0}[t]-\mathbf{r}^{\prime}_{k}\right\|^{2}+H_{0}^{2% }}\mathrm{Tr}(\mathbf{a}_{k}^{H}[t]\mathbf{P}_{\mathit{k}}[t]\mathbf{a}_{k}[t]% )}{\underset{r\in\mathcal{K}\setminus\left\{k\right\}}{\sum}{\alpha_{k,r}[t]% \frac{\varrho}{\left\|\mathbf{r}^{\prime}_{0}[t]-\mathbf{r}^{\prime}_{k}\right% \|^{2}+H_{0}^{2}}\mathrm{Tr}(\mathbf{a}_{k}^{H}[t]\mathbf{P}_{\mathit{r}}[t]% \mathbf{a}_{k}[t]})+\sigma^{2}_{n_{k}}[t]}\geq\Gamma_{\mathrm{req}_{k}},\hskip 2% .84526pt\forall k,C2: divide start_ARG divide start_ARG italic_ϱ end_ARG start_ARG ∥ bold_r start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT [ italic_t ] - bold_r start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + italic_H start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG roman_Tr ( bold_a start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT [ italic_t ] bold_P start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] bold_a start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] ) end_ARG start_ARG start_UNDERACCENT italic_r ∈ caligraphic_K ∖ { italic_k } end_UNDERACCENT start_ARG ∑ end_ARG italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT [ italic_t ] divide start_ARG italic_ϱ end_ARG start_ARG ∥ bold_r start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT [ italic_t ] - bold_r start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + italic_H start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG roman_Tr ( bold_a start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT [ italic_t ] bold_P start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT [ italic_t ] bold_a start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] ) + italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_n start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT [ italic_t ] end_ARG ≥ roman_Γ start_POSTSUBSCRIPT roman_req start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT , ∀ italic_k ,
C3-C6,C3-C6\displaystyle\hskip 59.75078pt\mbox{C3-C6},C3-C6 ,
C7:𝐏k[t]𝟎,k,succeeds-or-equalsC7:subscript𝐏𝑘delimited-[]𝑡0for-all𝑘\displaystyle\hskip 59.75078pt\mbox{C7:}\hskip 2.84526pt\mathbf{P}_{k}[t]% \succeq\mathbf{0},\hskip 2.84526pt\forall k,C7: bold_P start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] ⪰ bold_0 , ∀ italic_k ,
C8:Rank(𝐏k[t])=1,k.C8:Ranksubscript𝐏𝑘delimited-[]𝑡1for-all𝑘\displaystyle\hskip 59.75078pt\mbox{C8:}\hskip 2.84526pt\mathrm{Rank}(\mathbf{% P}_{k}[t])=1,\hskip 2.84526pt\forall k.C8: roman_Rank ( bold_P start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] ) = 1 , ∀ italic_k . (56)

We note that the original quadratic function with respect to the beamforming vector is now replaced by an affine function with respect to the beamforming matrix 𝐏k[t]subscript𝐏𝑘delimited-[]𝑡\mathbf{P}_{k}[t]bold_P start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] [9723093]. This is achieved by replacing the beamforming vector to be optimized with the beamforming matrix 𝐏k[t]subscript𝐏𝑘delimited-[]𝑡\mathbf{P}_{k}[t]bold_P start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] where 𝐏k[t]=𝐩k[t]𝐩kH[t]subscript𝐏𝑘delimited-[]𝑡subscript𝐩𝑘delimited-[]𝑡superscriptsubscript𝐩𝑘𝐻delimited-[]𝑡\mathbf{P}_{k}[t]=\mathbf{p}_{k}[t]\mathbf{p}_{k}^{H}[t]bold_P start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] = bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT [ italic_t ]. To efficiently recover the beamforming vector, two additional constraints, i.e., a semidefinite constraint C7 and a rank constraint C8, are imposed. Although the rank constraint is highly non-convex, we can exploit the popular SDR approach by drop** the rank constraint. In case the unit-rank constraint is the only non-convex constraint of the problem at hand, we can then optimally solve the resulting rank constraint-relaxed version of the original optimization problem. The tightness of the SDR has been proved in the literature, e.g., [DerrickEERobust, yu2020irs]. In the following, we briefly explain the key steps. First, by exploiting the duality theory [boyd2004convex], we can express the Lagrange function of the considered optimization problem with respect to the beamforming matrix 𝐏k[t]subscript𝐏𝑘delimited-[]𝑡\mathbf{P}_{k}[t]bold_P start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ]. Then, based on the Lagrange function, we can formulate the dual problem of the original optimization problem and express the Karush-Kuhn-Tucker (KKT) conditions with respect to 𝐏k[t]subscript𝐏𝑘delimited-[]𝑡\mathbf{P}_{k}[t]bold_P start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ]. Subsequently, by analyzing the KKT conditions, we can conclude that there is always an optimal solution 𝐏k[t]subscript𝐏𝑘delimited-[]𝑡\mathbf{P}_{k}[t]bold_P start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] satisfying Rank(𝐏k[t])1Ranksubscript𝐏𝑘delimited-[]𝑡1\mathrm{Rank}(\mathbf{P}_{k}[t])\leq 1roman_Rank ( bold_P start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT [ italic_t ] ) ≤ 1.

IV-A2 Branch-and-Bound Approach

In NGMA systems, some resource allocation optimization problems, such as the subcarrier assignment or SIC decoding strategy design, involve binary optimization variables [7812683, xu2023joint]. This results in non-convex binary integer programming (BIP) problems, cf. (III-A1) and (III-B2), which are challenging to solve. On the other hand, since the available subcarriers or the feasible SIC decoding strategies are countable and finite in an NGMA system, the number of corresponding binary optimization variables is limited. Based on this observation, we can exploit enumeration-based approaches to traverse all possible binary variable-induced schemes and obtain the optimal solution. One popular and systematic enumeration-based approach is the BnB approach [lawler1966branch]. We take the subcarrier assignment optimization problem in (III-A2) as an example and rewrite it here

Refer to caption
Figure 3: Illustration of a BnB-based tree structure for solving a BIP problem involving two binary optimization variables. The solid-line arrows and dashed-line arrows denote the two cases where the optimization variable is set to 00 and 1111, respectively. The yellow-colored and red-colored nodes denote the optimal and non-optimal solutions to the BIP problem, respectively. ( what are those A, B, C??)

(Similarly here, are you talking about optimizing a variable only?)

minimizepkdk,{𝚷k}mdkk𝒦dk=1Dkpkdksubscript𝑝𝑘subscript𝑑𝑘subscriptsubscript𝚷𝑘𝑚subscript𝑑𝑘minimize𝑘𝒦superscriptsubscriptsubscript𝑑𝑘1subscript𝐷𝑘subscript𝑝𝑘subscript𝑑𝑘\displaystyle\underset{\color[rgb]{1,0,0}p_{kd_{k}},\{\mathbf{\Pi}_{k}\}_{md_{% k}}}{\operatorname{minimize}}\,\,\,\,\underset{k\in\mathcal{K}}{\sum}\sum_{d_{% k}=1}^{D_{k}}p_{kd_{k}}start_UNDERACCENT italic_p start_POSTSUBSCRIPT italic_k italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT , { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_UNDERACCENT start_ARG roman_minimize end_ARG start_UNDERACCENT italic_k ∈ caligraphic_K end_UNDERACCENT start_ARG ∑ end_ARG ∑ start_POSTSUBSCRIPT italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT italic_p start_POSTSUBSCRIPT italic_k italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT (57)
subject  toC1-C3,subject  toC1-C3\displaystyle\mbox{subject\hskip 4.55244ptto}\hskip 17.07164pt\mbox{C1-C3},subject to C1-C3 ,
C4:{𝚷k}mdk{0,1},k,m,dk.C4:subscriptsubscript𝚷𝑘𝑚subscript𝑑𝑘01for-all𝑘for-all𝑚for-allsubscript𝑑𝑘\displaystyle\hskip 65.44133pt\mbox{C4:}\hskip 2.84526pt\{\mathbf{\Pi}_{k}\}_{% md_{k}}\in\left\{0,1\right\},\hskip 2.84526pt\forall k,\forall m,\forall d_{k}.C4: { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT ∈ { 0 , 1 } , ∀ italic_k , ∀ italic_m , ∀ italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT .

We note that the above optimization problem can be optimally solved by employing the BnB approach. Next, we explain the basic concept and the key steps of the BnB approach. Specifically, the fundamental idea behind the BnB approach is to construct a search tree and check the branches of the tree to find the best solution. This is achieved by iteratively applying the three steps of partitioning, branching, and bounding until the optimal solution is obtained when upper and lower bounds are merged [lawler1966branch, 9669263]. Initially, the full feasible set is mapped onto the root node of the search tree. According to a pre-defined partitioning rule, we partition each node as two subnodes and the two subnodes represent two subsets of the full feasible set. In this case, both subsets contain one specific binary variable that is already set as 00 and 1111, respectively. Accordingly, for each subnode, we have to solve one subproblem associated with a subset and obtain the corresponding objective function value. Then, among the objective function values of all subnodes, we select the one with the minimum value as the upper bound for the original optimization problem in (57). As for the lower bound of (57), we can replace the binary constraint C4 by a convex constraint with a set of continuous variables, i.e., 0{𝚷k}mdk10subscriptsubscript𝚷𝑘𝑚subscript𝑑𝑘10\leq\{\mathbf{\Pi}_{k}\}_{md_{k}}\leq 10 ≤ { bold_Π start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_d start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT ≤ 1. We note that in the convex constraint, those variables already set as 00 or 1111 in the previous iteration of BnB will not be relaxed as continuous variables. Then, the relaxed version of (57) with the aforementioned convex constraint can be optimally solved by employing bilinear optimization approaches, e.g., McCormick envelopes [mitsos2009mccormick]. As such, the resulting objective function value of the relaxed version of (57) serves as a lower bound of the original optimization problem in (57). To simplify the traversal in each iteration, if the objective function value of one subproblem is larger than the upper bound, the associated subnode will be discarded from the tree. Along with the expansion of the search tree, the original feasible set is progressively partitioned into more subsets and the BnB approach will not be terminated until the gap between the upper bound and the lower bound is smaller than a pre-defined threshold. It has been proved in [horst2013global] that as long as the number of binary variables is finite, the BnB approach converges to the globally optimal solution of the BIP problem in a limited number of iterations. For the considered optimization problem in (57), there are in total DM𝐷𝑀DMitalic_D italic_M binary optimization variables, where k=1KDk=Dsuperscriptsubscript𝑘1𝐾subscript𝐷𝑘𝐷\sum_{k=1}^{K}D_{k}=D∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = italic_D. Hence, we need to construct an (DM+1)𝐷𝑀1(DM+1)( italic_D italic_M + 1 )-tier search tree comprising at most 2DMsuperscript2𝐷𝑀2^{DM}2 start_POSTSUPERSCRIPT italic_D italic_M end_POSTSUPERSCRIPT subnodes in the last tier. This is illustrated in Fig. 3 where the optimum of a BIP problem involving 2 binary optimization variables can be obtained by constructing a 3333-tier search tree with 4444 subnodes in the last tier.

IV-A3 Monotonic Optimization Approach

( Why did you consider a convex problem for illustrating MO? At least you should show NOMA…)

Although resource allocation designs for NGMA systems often encounter non-convexity, most resulting optimization problems do preserve monotonicity [tuy2000monotonic]. In this case, their objective function monotonically increases or decreases relative to the optimization variables over the feasible set, cf. (III-A1) and (III-B1). This property provides us with a promising means to solve this kind of problem, that is, to iteratively reduce an upper bound on the monotonic objective function until the maximum over the feasible set is obtained. In the following, we take the optimization problem in (III-A1) as an example. To deliver the basic idea, we assume that the given subcarrier assignment policy is already determined by employing enumeration-based approaches and focusing on the power allocation design. In this case, we replace the term {𝐇k}mmsubscriptsubscript𝐇𝑘𝑚𝑚\{\mathbf{H}_{k}\}_{mm}{ bold_H start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_m italic_m end_POSTSUBSCRIPT in the objective function of (III-A1) by hksubscript𝑘h_{k}\in\mathbb{C}italic_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ blackboard_C and thus the optimization problem in (III-A1) is degenerated as follows

maximizepkk𝒦log2(1+|hk|2pkσ2)subscript𝑝𝑘maximize𝑘𝒦subscript21superscriptsubscript𝑘2subscript𝑝𝑘superscript𝜎2\displaystyle\underset{p_{k}}{\operatorname{maximize}}\,\,\,\,\underset{k\in% \mathcal{K}}{\sum}\log_{2}\left(1+\frac{\left|h_{k}\right|^{2}p_{k}}{\sigma^{2% }}\right)start_UNDERACCENT italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_UNDERACCENT start_ARG roman_maximize end_ARG start_UNDERACCENT italic_k ∈ caligraphic_K end_UNDERACCENT start_ARG ∑ end_ARG roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( 1 + divide start_ARG | italic_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG start_ARG italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG )
subject  toC1,C3.subject  toC1C3\displaystyle\mbox{subject\hskip 4.55244ptto}\hskip 11.38109pt\mbox{C1},\mbox{% C3}.subject to C1 , C3 . (58)

We note that for (IV-A3), the objective function is monotonically increasing with respect to the SINR term |hk|2pkσ2superscriptsubscript𝑘2subscript𝑝𝑘superscript𝜎2\frac{\left|h_{k}\right|^{2}p_{k}}{\sigma^{2}}divide start_ARG | italic_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG start_ARG italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG. Moreover, constraints C1 and C3 define a normal set and a conormal set [zhang2013monotonic], respectively. As a result, we define an optimization variable ζksubscript𝜁𝑘\zeta_{k}italic_ζ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT, which satisfies 1ζk1+|hk|2pkσ21subscript𝜁𝑘1superscriptsubscript𝑘2subscript𝑝𝑘superscript𝜎21\leq\zeta_{k}\leq 1+\frac{\left|h_{k}\right|^{2}p_{k}}{\sigma^{2}}1 ≤ italic_ζ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ≤ 1 + divide start_ARG | italic_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG start_ARG italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG. Then, the optimization problem in (IV-A3) can be equivalently reformulated as a canonical form of MO problem which is given as follows

Refer to caption
Figure 4: Illustration of a few snapshots of the polyblock outer approximation algorithm to produce the optimum of a MO problem involving two optimization variables x1subscript𝑥1x_{1}italic_x start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT and x2subscript𝑥2x_{2}italic_x start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT. The blue-colored polyblock encloses the feasible set of the MO problem and the dashed line denotes the boundary of the feasible set. The red-colored star denotes the globally optimal solution to the considered problem.
maximizepk,ζkk𝒦log2(ζk)subscript𝑝𝑘subscript𝜁𝑘maximize𝑘𝒦subscript2subscript𝜁𝑘\displaystyle\underset{p_{k},\zeta_{k}}{\operatorname{maximize}}\,\,\,\,% \underset{k\in\mathcal{K}}{\sum}\log_{2}\left(\zeta_{k}\right)start_UNDERACCENT italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , italic_ζ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_UNDERACCENT start_ARG roman_maximize end_ARG start_UNDERACCENT italic_k ∈ caligraphic_K end_UNDERACCENT start_ARG ∑ end_ARG roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( italic_ζ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT )
subject  toζk,subject  tosubscript𝜁𝑘\displaystyle\mbox{subject\hskip 4.55244ptto}\hskip 11.38109pt\zeta_{k}\in% \mathcal{F},subject to italic_ζ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ caligraphic_F , (59)

where feasible set \mathcal{F}caligraphic_F is defined as =𝒢𝒢\mathcal{F}=\mathcal{G}\cap\mathcal{H}caligraphic_F = caligraphic_G ∩ caligraphic_H and the normal set 𝒢𝒢\mathcal{G}caligraphic_G and the conormal set \mathcal{H}caligraphic_H are given by, respectively,

𝒢=Δ{pk|pk𝒰},𝒢Δconditional-setsubscript𝑝𝑘subscript𝑝𝑘𝒰\displaystyle\mathcal{G}\overset{\Delta}{=}\left\{p_{k}\hskip 2.84526pt|\hskip 2% .84526ptp_{k}\in\mathcal{U}\right\},caligraphic_G overroman_Δ start_ARG = end_ARG { italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT | italic_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ caligraphic_U } , (60)
=Δ{ζk|ζk𝒱},Δconditional-setsubscript𝜁𝑘subscript𝜁𝑘𝒱\displaystyle\mathcal{H}\overset{\Delta}{=}\left\{\zeta_{k}\hskip 2.84526pt|% \hskip 2.84526pt\zeta_{k}\in\mathcal{V}\right\},caligraphic_H overroman_Δ start_ARG = end_ARG { italic_ζ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT | italic_ζ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ caligraphic_V } , (61)

where sets 𝒰𝒰\mathcal{U}caligraphic_U and 𝒱𝒱\mathcal{V}caligraphic_V are spanned by constraints C1 and C3, respectively. By exploiting MO theory, we can develop MO-based algorithms, e.g., two-layer polyblock outer approximation algorithm [bjornson2013optimal, 8648498, 9423667], to obtain the globally optimal solution to (IV-A3). Next, we introduce the key steps of the polyblock outer approximation algorithm. To start with, we construct a polyblock 𝒫𝒫\mathcal{P}caligraphic_P that contains the feasible set \mathcal{F}caligraphic_F. As such, the vertex of 𝒫𝒫\mathcal{P}caligraphic_P serves as an upper bound of the objective function of (IV-A3). Then, in each iteration of the outer layer of the algorithm, we continuously shrink 𝒫𝒫\mathcal{P}caligraphic_P by removing a cone that does not belong to the feasible set \mathcal{F}caligraphic_F. However, as the feasible set \mathcal{F}caligraphic_F is in general unknown in advance and difficult to characterize, we exploit the bisection projection search in the inner layer of the algorithm to find the projection of a vertex on the upper boundary of the feasible set [zhang2013monotonic]. In particular, we check the feasibility of an optimization problem subject to constraints C1 and C3 for a given projection factor. The two-layer algorithm is not terminated until the gap between the vertex of the current block 𝒫𝒫\mathcal{P}caligraphic_P and its projection on the upper boundary of the feasible set \mathcal{F}caligraphic_F is smaller than a pre-defined threshold. When the pre-defined threshold is infinitely small, we can guarantee to find the globally optimal solution of (IV-A3). A more detailed convergence proof can be found in [zhang2013monotonic]. Besides, the computational complexity of the two-layer polyblock outer approximation algorithm increases exponentially with the number of users. An example of the polyblock outer approximation algorithm is given in Fig. 4. As can be observed from the figure, although the feasible region of the considered two-variable optimization problem is a non-convex set ( I don’t see the drawing in Figure 4 as a non-convex set…), the polyblock outer approximation algorithm finds the optimum after sequentially shrinking the polyblock for roughly 20202020 times.

( Say a few words about convergence…)

IV-B Low-Complexity Suboptimal Approaches

( You were not actually solving the problems….you handled a particular non-convexity)

Although the optimization approaches introduced in Section IV-A can be employed to obtain globally optimal solutions to the considered optimization problem, most of them, e.g., BnB and MO approaches, entail high computational complexity. As such, the required computation resources may not be affordable in practical NGMA systems to perform real-time resource allocation. To overcome this issue, in the following, we introduce several low-complexity optimization approaches to facilitate the real-time design of the NGMA systems.

IV-B1 Successive Convex Approximation Approach

Wireless communication systems have become increasingly complex, necessitating the joint allocation of various wireless resources. This complexity has led to more sophisticated system models and made non-convex resource allocation optimization problems more prevalent. Often, the non-convexity in practical optimization challenges arises from specific parts of the objective function or constraints, while the rest of the optimization problem remains convex. Recognizing this, the sequential/successive convex approximation (SCA) approach was developed. The core idea behind the SCA approach is straightforward: approximating non-convex functions with tractable convex ones and iteratively solving a series of approximated convex optimization problems until convergence is achieved.

( There are some requirements (three, if I remember correctly) for the surrogate functions to ensure convergences. )

It has been shown in the literature, that the SCA approach can find a solution that is close to the global optimum in a computationally efficient manner. In the following, we briefly explain how the SCA approach is employed to tackle the resource allocation optimization problem in the NGMA systems. We take the optimization problem in (III-C1) as an example and rewrite it here:

maximize𝐏N×Kk=1Klog2(1+1L𝐬k21L(𝐡C(k))T𝐏𝐒𝐬k2+σk2)𝐏superscript𝑁𝐾maximizesuperscriptsubscript𝑘1𝐾subscript211𝐿superscriptnormsubscript𝐬𝑘21𝐿superscriptnormsuperscriptsuperscriptsubscript𝐡C𝑘T𝐏𝐒subscript𝐬𝑘2superscriptsubscript𝜎𝑘2\displaystyle\underset{\mathbf{P}\in\mathbb{C}^{{N}\times{K}}}{\operatorname{% maximize}}\,\,\,\,\sum\limits_{k=1}^{K}{\log}_{2}\left(1+\frac{{\frac{1}{L}{{% \left\|{{{\bf{s}}_{k}}}\right\|}^{2}}}}{{\frac{1}{L}{{\left\|{{{\left({{\bf{h}% }_{\rm{C}}^{\left(k\right)}}\right)}^{\rm{T}}}{\bf{PS}}-{{\bf{s}}_{k}}}\right% \|}^{2}}+{\sigma_{k}^{2}}}}\right)start_UNDERACCENT bold_P ∈ blackboard_C start_POSTSUPERSCRIPT italic_N × italic_K end_POSTSUPERSCRIPT end_UNDERACCENT start_ARG roman_maximize end_ARG ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( 1 + divide start_ARG divide start_ARG 1 end_ARG start_ARG italic_L end_ARG ∥ bold_s start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG divide start_ARG 1 end_ARG start_ARG italic_L end_ARG ∥ ( bold_h start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_k ) end_POSTSUPERSCRIPT ) start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT bold_PS - bold_s start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + italic_σ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG )
subject  toC1:1LTr(𝐒H𝐏H𝐏𝐒)Pmax,subject  toC1:1𝐿Trsuperscript𝐒Hsuperscript𝐏H𝐏𝐒subscript𝑃max\displaystyle\mbox{subject\hskip 4.55244ptto}\hskip 11.38109pt\mbox{C1:}\hskip 2% .84526pt\frac{1}{L}{\rm{Tr}}\left({{{\bf{S}}^{\rm{H}}}{{\bf{P}}^{\rm{H}}}{\bf{% PS}}}\right)\leq P_{\mathrm{max}},subject to C1: divide start_ARG 1 end_ARG start_ARG italic_L end_ARG roman_Tr ( bold_S start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT bold_P start_POSTSUPERSCRIPT roman_H end_POSTSUPERSCRIPT bold_PS ) ≤ italic_P start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ,
C2:1L𝐏𝐒𝐗0F2δ,C2:1𝐿superscriptsubscriptnorm𝐏𝐒subscript𝐗0F2𝛿\displaystyle\hskip 59.75078pt\mbox{C2:}\hskip 2.84526pt\frac{1}{L}\left\|{{% \bf{PS}}-{{\bf{X}}_{0}}}\right\|_{\rm{F}}^{2}\leq\delta,C2: divide start_ARG 1 end_ARG start_ARG italic_L end_ARG ∥ bold_PS - bold_X start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT ∥ start_POSTSUBSCRIPT roman_F end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ≤ italic_δ , (62)

We note that constraints C1 and C2 are two convex functions with respect to the optimization variable 𝐏𝐏\mathbf{P}bold_P. The non-convexity of (IV-B1) originates from the objective function. To show the basic idea of the SCA, we define a function fk(𝐏)subscript𝑓𝑘𝐏f_{k}(\mathbf{P})italic_f start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ( bold_P ) as follows

fk(𝐏)=Δlog2(1+1L𝐬k21L(𝐡C(k))T𝐏𝐒𝐬k2+N0),subscript𝑓𝑘𝐏Δsubscript211𝐿superscriptnormsubscript𝐬𝑘21𝐿superscriptnormsuperscriptsuperscriptsubscript𝐡C𝑘T𝐏𝐒subscript𝐬𝑘2subscript𝑁0f_{k}(\mathbf{P})\overset{\Delta}{=}{\log}_{2}\left(1+\frac{{\frac{1}{L}{{% \left\|{{{\bf{s}}_{k}}}\right\|}^{2}}}}{{\frac{1}{L}{{\left\|{{{\left({{\bf{h}% }_{\rm{C}}^{\left(k\right)}}\right)}^{\rm{T}}}{\bf{PS}}-{{\bf{s}}_{k}}}\right% \|}^{2}}+{N_{0}}}}\right),italic_f start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ( bold_P ) overroman_Δ start_ARG = end_ARG roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( 1 + divide start_ARG divide start_ARG 1 end_ARG start_ARG italic_L end_ARG ∥ bold_s start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG divide start_ARG 1 end_ARG start_ARG italic_L end_ARG ∥ ( bold_h start_POSTSUBSCRIPT roman_C end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_k ) end_POSTSUPERSCRIPT ) start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT bold_PS - bold_s start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + italic_N start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT end_ARG ) , (63)
Refer to caption
Figure 5: Illustration of the basic concept of an SCA approach for a maximization problem.

Instead of directly solving the above non-convex problem, we construct a surrogate function, e.g., a global underestimator, for the objective function in (IV-B1) as follows

f¯k(𝐏,𝐏(j))=Δfk(𝐏(j))+Tr([𝐏fk(𝐏(j))]H(𝐏𝐏(j)))fk(𝐏),subscript¯𝑓𝑘𝐏superscript𝐏𝑗Δsubscript𝑓𝑘superscript𝐏𝑗Trsuperscriptdelimited-[]subscript𝐏subscript𝑓𝑘superscript𝐏𝑗𝐻𝐏superscript𝐏𝑗subscript𝑓𝑘𝐏\displaystyle\underline{f}_{k}(\mathbf{P},\mathbf{P}^{(j)})\overset{\Delta}{=}% f_{k}(\mathbf{P}^{(j)})+\mathrm{Tr}\Big{(}\big{[}\nabla_{\mathbf{P}}f_{k}(% \mathbf{P}^{(j)})\big{]}^{H}(\mathbf{P}-\mathbf{P}^{(j)})\Big{)}\leq f_{k}(% \mathbf{P}),under¯ start_ARG italic_f end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ( bold_P , bold_P start_POSTSUPERSCRIPT ( italic_j ) end_POSTSUPERSCRIPT ) overroman_Δ start_ARG = end_ARG italic_f start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ( bold_P start_POSTSUPERSCRIPT ( italic_j ) end_POSTSUPERSCRIPT ) + roman_Tr ( [ ∇ start_POSTSUBSCRIPT bold_P end_POSTSUBSCRIPT italic_f start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ( bold_P start_POSTSUPERSCRIPT ( italic_j ) end_POSTSUPERSCRIPT ) ] start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ( bold_P - bold_P start_POSTSUPERSCRIPT ( italic_j ) end_POSTSUPERSCRIPT ) ) ≤ italic_f start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ( bold_P ) , (64)

where j𝑗jitalic_j is the iteration index and 𝐏(j)superscript𝐏𝑗\mathbf{P}^{(j)}bold_P start_POSTSUPERSCRIPT ( italic_j ) end_POSTSUPERSCRIPT is a feasible point in the j𝑗jitalic_j-th iteration. Then, in the j𝑗jitalic_j-th iteration of the SCA approach, a lower bound of the problem in (IV-B1) can be obtained by solving the following optimization problem

maximize𝐏N×Kk=1Kf¯k(𝐏,𝐏(j))𝐏superscript𝑁𝐾maximizesuperscriptsubscript𝑘1𝐾subscript¯𝑓𝑘𝐏superscript𝐏𝑗\displaystyle\underset{\mathbf{P}\in\mathbb{C}^{{N}\times{K}}}{\operatorname{% maximize}}\,\,\,\,\sum\limits_{k=1}^{K}\underline{f}_{k}(\mathbf{P},\mathbf{P}% ^{(j)})start_UNDERACCENT bold_P ∈ blackboard_C start_POSTSUPERSCRIPT italic_N × italic_K end_POSTSUPERSCRIPT end_UNDERACCENT start_ARG roman_maximize end_ARG ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT under¯ start_ARG italic_f end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ( bold_P , bold_P start_POSTSUPERSCRIPT ( italic_j ) end_POSTSUPERSCRIPT )
subject  toC1,C2.subject  toC1C2\displaystyle\mbox{subject\hskip 4.55244ptto}\hskip 11.38109pt\mbox{C1},\mbox{% C2}.subject to C1 , C2 . (65)

By applying the SCA approach, the lower bound for (IV-B1) is gradually tightened. It has been proved in [dinh2010local] that the SCA approach is assured to provide a locally optimal solution to the original problem in (IV-B1). Also, since in each iteration of the SCA approach, a convex optimization problem is solved, the objective function value of (IV-B1) converges efficiently. In Fig. 5, we illustrate the basic idea behind the SCA approach. As can observed from the figure, for different initial points, the SCA approach may converge to the globally optimal solution or a locally optimal solution. This becomes a drawback when compared with the global optimization approaches where the convergence point is independent of initial points. ( On the other hand, the computational complexity of the SCA approach is of polynomial time, due to the fact that it requires solving only a sequence of convex optimization problems. This efficiency highlights SCA’s practicality in managing the complex resource allocation challenges in wireless communication systems. )

IV-B2 Block Coordinate Descent Approach

Refer to caption
Figure 6: Illustration of the globally optimal solution, locally optimal solution, and saddle point of a maximization problem to which the BCD-based algorithm potentially converges.

To enhance the performance of NGMA systems, available wireless resources such as beamforming policy, subcarrier assignment, and other components in the systems should be jointly designed. Yet, this inevitably leads to the coupling between various optimization variables, which brings new a challenge for the design of NGMA systems. To circumvent this challenge, the BCD approach has been proposed in the literature [bezdek2002some]. The fundamental idea of the BCD approach is to divide the feasible set into several disjoint subsets and solve the corresponding subproblems in an alternating manner. Next, we take the optimization problem in (III-B1) as an example to show how the BCD approach works. In particular, we focus on the following optimization problem

maximize𝐩k,𝚿,αk,rk𝒦log2(1+Γk)subscript𝐩𝑘𝚿subscript𝛼𝑘𝑟maximize𝑘𝒦subscriptlog21subscriptΓ𝑘\displaystyle\underset{\mathbf{p}_{k},\mathbf{\Psi},\alpha_{k,r}}{% \operatorname{maximize}}\,\,\,\,\underset{k\in\mathcal{K}}{\sum}\mathrm{log}_{% 2}(1+\Gamma_{k})start_UNDERACCENT bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , bold_Ψ , italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT end_UNDERACCENT start_ARG roman_maximize end_ARG start_UNDERACCENT italic_k ∈ caligraphic_K end_UNDERACCENT start_ARG ∑ end_ARG roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( 1 + roman_Γ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT )
subject  toC1:k𝒦𝐩k2Pmax,subject  toC1:𝑘𝒦superscriptnormsubscript𝐩𝑘2subscript𝑃max\displaystyle\mbox{subject\hskip 4.55244ptto}\hskip 11.38109pt\mbox{C1:}\hskip 2% .84526pt\underset{k\in\mathcal{K}}{\sum}\left\|\mathbf{p}_{k}\right\|^{2}\leq P% _{\mathrm{max}},subject to C1: start_UNDERACCENT italic_k ∈ caligraphic_K end_UNDERACCENT start_ARG ∑ end_ARG ∥ bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ≤ italic_P start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ,
C2:|{𝚿}mm|=1,m{1,,Mps},formulae-sequenceC2:subscript𝚿𝑚𝑚1for-all𝑚1subscript𝑀ps\displaystyle\hskip 59.75078pt\mbox{C2:}\hskip 2.84526pt\Big{|}\{\mathbf{\Psi}% \}_{mm}\Big{|}=1,\forall m\in\left\{1,\ldots,M_{\rm ps}\right\},C2: | { bold_Ψ } start_POSTSUBSCRIPT italic_m italic_m end_POSTSUBSCRIPT | = 1 , ∀ italic_m ∈ { 1 , … , italic_M start_POSTSUBSCRIPT roman_ps end_POSTSUBSCRIPT } ,
C3:αk,r{0,1},kr𝒦,formulae-sequenceC3:subscript𝛼𝑘𝑟01for-all𝑘𝑟𝒦\displaystyle\hskip 59.75078pt\mbox{C3:}\hskip 2.84526pt\alpha_{k,r}\in\{0,1\}% ,\hskip 2.84526pt\forall k\neq r\in\mathcal{K},C3: italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT ∈ { 0 , 1 } , ∀ italic_k ≠ italic_r ∈ caligraphic_K ,
C4:αk,r+αr,k=1,kr𝒦,formulae-sequenceC4:subscript𝛼𝑘𝑟subscript𝛼𝑟𝑘1for-all𝑘𝑟𝒦\displaystyle\hskip 59.75078pt\mbox{C4:}\hskip 2.84526pt\alpha_{k,r}+\alpha_{r% ,k}=1,\hskip 2.84526pt\forall k\neq r\in\mathcal{K},C4: italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT + italic_α start_POSTSUBSCRIPT italic_r , italic_k end_POSTSUBSCRIPT = 1 , ∀ italic_k ≠ italic_r ∈ caligraphic_K , (66)

where ΓksubscriptΓ𝑘\Gamma_{k}roman_Γ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is given by (25). In the above optimization problem, the beamforming vectors 𝐩ksubscript𝐩𝑘\mathbf{p}_{k}bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT, IRS phase shift pattern 𝚿𝚿\mathbf{\Psi}bold_Ψ, and SIC decoding order αk,rsubscript𝛼𝑘𝑟\alpha_{k,r}italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT are coupled with each other. As a result, we employ the BCD approach and partition optimization variables into three blocks, i.e., {𝐩k}subscript𝐩𝑘\left\{\mathbf{p}_{k}\right\}{ bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT }, {𝚿}𝚿\left\{\mathbf{\Psi}\right\}{ bold_Ψ }, and {αk,r}subscript𝛼𝑘𝑟\left\{\alpha_{k,r}\right\}{ italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT }. Accordingly, the optimization problem in (III-B1) is decomposed into three subproblems as follows

Subproblem 1: maximize𝐩kk𝒦log2(1+Γk)subscript𝐩𝑘maximize𝑘𝒦subscriptlog21subscriptΓ𝑘\displaystyle\underset{\mathbf{p}_{k}}{\operatorname{maximize}}\,\,\,\,% \underset{k\in\mathcal{K}}{\sum}\mathrm{log}_{2}(1+\Gamma_{k})start_UNDERACCENT bold_p start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_UNDERACCENT start_ARG roman_maximize end_ARG start_UNDERACCENT italic_k ∈ caligraphic_K end_UNDERACCENT start_ARG ∑ end_ARG roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( 1 + roman_Γ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) (67)
subject  toC1.subject  toC1\displaystyle\mbox{subject\hskip 4.55244ptto}\hskip 11.38109pt\mbox{C1}.subject to C1 .
Subproblem 2: maximize𝚿k𝒦log2(1+Γk)𝚿maximize𝑘𝒦subscriptlog21subscriptΓ𝑘\displaystyle\underset{\mathbf{\Psi}}{\operatorname{maximize}}\,\,\,\,% \underset{k\in\mathcal{K}}{\sum}\mathrm{log}_{2}(1+\Gamma_{k})underbold_Ψ start_ARG roman_maximize end_ARG start_UNDERACCENT italic_k ∈ caligraphic_K end_UNDERACCENT start_ARG ∑ end_ARG roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( 1 + roman_Γ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) (68)
subject  toC2.subject  toC2\displaystyle\mbox{subject\hskip 4.55244ptto}\hskip 11.38109pt\mbox{C2}.subject to C2 .
Subproblem 3: maximizeαk,rk𝒦log2(1+Γk)subscript𝛼𝑘𝑟maximize𝑘𝒦subscriptlog21subscriptΓ𝑘\displaystyle\underset{\alpha_{k,r}}{\operatorname{maximize}}\,\,\,\,\underset% {k\in\mathcal{K}}{\sum}\mathrm{log}_{2}(1+\Gamma_{k})start_UNDERACCENT italic_α start_POSTSUBSCRIPT italic_k , italic_r end_POSTSUBSCRIPT end_UNDERACCENT start_ARG roman_maximize end_ARG start_UNDERACCENT italic_k ∈ caligraphic_K end_UNDERACCENT start_ARG ∑ end_ARG roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( 1 + roman_Γ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) (69)
subject  toC3,C4.subject  toC3C4\displaystyle\mbox{subject\hskip 4.55244ptto}\hskip 11.38109pt\mbox{C3},\mbox{% C4}.subject to C3 , C4 .

Subsequently, in each iteration of the BCD approach, one subproblem is tackled with the other two blocks fixed. In case the subproblems are still non-convex, other optimization approaches such as SCA or SDR will be used. It has been shown in [bezdek2002some] that the BCD approach is guaranteed to converge to a stationary point in a finite number of iterations (IV-B2), if all subproblems are convex with respect to the corresponding optimization variables. However, since the BCD approach overcomes the variable coupling by simply discarding the joint optimality of the original optimization problem, it can yield a range of outcomes: from globally optimal solutions to locally optimal solutions or even saddle points. Furthermore, the BCD method’s effectiveness is heavily influenced by the choice of the initial point and the sequence in which the blocks are optimized. As a result, the BCD approach may result in poor performance for practical NGMA systems. On the other hand, as the BCD approach tackles each subproblem with a subset of the original feasible space, it usually requires significantly fewer computational resources compared to that for solving the original optimization problem, which facilitates the real-time design of practical NGMA systems. In Fig. 6, we consider a toy example where a non-convex maximization problem involving two coupled optimization variables is solved by employing the BCD approach. As can be observed from the figure, for different initial points and different orders of the blocks, the BCD algorithm may converge to saddle point, locally optimal solution, or globally optimal solution [AA, BB].

IV-C Machine Learning Approach

Recent advances in machine learning have provided a new solution to general optimization problems. Conventional mathematical-based optimization may result in poor complexity scaling with respect to the size of the solution set. Therefore, it may prevent the direct application of conventional optimization tools in large-scale networks. In contrast, machine learning-based optimizations do not rely on explicit analytical models and therefore can provide a much better complexity scaling. In fact, machine learning has already shown promising performance in NGMA systems in various aspects [Guan2018DL, Kowshik2023DL, Huang2020DL], including resource allocation design. For instance, in [Huang2020DL], an effective communication deep neural network was proposed which consists of several convolutional layers and multiple hidden layers. Relying on the training algorithms, the proposed neural network is able to address the power allocation problem over challenging channel conditions with extremely complex spatial stricture limitations. A hot-booting Q-learning-based power allocation for downlink NOMA was presented in [Liang2018reinforcement], which does not rely on the explicit representation of the jamming and channel parameters. Furthermore, better performance can be observed using the proposed scheme in comparison to the standard Q-learning-based strategy. The above two examples have underscored the effectiveness of machine learning in resource allocations for natural channels. In fact, machine learning-based optimizations can also be applied to the resource allocation for reconfigurable channels and functional channels. In [Minghui2023DL], a deep learning-based RSMA scheme was proposed for RIS-assisted Tera-Hertz (THz) massive MIMO transmissions. Specifically, the proposed scheme consists of passive precoding at the RIS, analog active precoding, and RSMA digital active precoding at the BS. Furthermore, a CSI acquisition network was also devised to acquire accurate CSI. The proposed scheme enables a higher spectral efficiency compared to the conventional designs with lower signaling overhead. A predictive beamforming aided ISAC transmission with presented in [chang2022learning], where a versatile unsupervised deep learning network was devised. Specifically, the network was realized by a long short-term memory (LSTM) network with historically estimated channels as inputs. Furthermore, the resource allocation problem was formulated with the aim to maximize the system sum rate while making sure the Cramér–Rao lower bound (CRLB) is smaller than a threshold, which is solved by the deep learning network. Numerical results were presented and shown to approach the genie-aided upper bound.

Other than directly applying machine learning to design the resource allocation strategy, machine learning can also be applied as a tool to solve the optimization problem for resource allocation. An example of such design is the neural optimization machine (NOM) [Chen2022NOM], which leverages the neural network as a surrogate model and optimizes it with and without constraints. Compared to conventional optimization techniques, NOM can be applied to general objective functions, e.g., linear and quadratic programming. Furthermore, NOM is flexible, where arbitrary neural network architectures and activation functions can be adopted. More importantly, NOM can find multiple local minima, whose computational cost does not increase significantly with the dimension of the design variables. These appealing features make NOM a promising tool for solving optimization problems formulated for resource allocation. The application of NOM in NGMA is still at its early stage, which is an interesting direction for future research.

Pros and cons? The required of frequency training? The training of tunnable parameters, etc.?

V Simulations and Discussions

In this section, we present some simulation results of the introduced resource allocation design approaches and discuss the insights.

In this section, we evaluate the performance of resource allocation design for an IRS-assisted NOMA system in (III-B1). In particular, the BS is equipped with N=8𝑁8N=8italic_N = 8 antennas to serve a sector of a cell with a radius of 50505050 m. There are K=4𝐾4K=4italic_K = 4 single-antenna users randomly and uniformly distributed in the sector. To assist in the information transmission, a passive IRS is deployed 50m50m50\text{m}50 m away from the BS, cf. Fig. 7. The IRS is composed of Mps=16subscript𝑀ps16M_{\rm ps}=16italic_M start_POSTSUBSCRIPT roman_ps end_POSTSUBSCRIPT = 16 phase shift elements. From a practical perspective, we assume that the IRS elements employ 2-bit phase shifters, i.e., the discrete phase shift values are from the set {0,π2,π,3π2}0𝜋2𝜋3𝜋2\{0,\frac{\pi}{2},\pi,\frac{3\pi}{2}\}{ 0 , divide start_ARG italic_π end_ARG start_ARG 2 end_ARG , italic_π , divide start_ARG 3 italic_π end_ARG start_ARG 2 end_ARG }. All channels in the considered system are assumed to be Rician distributed with the path loss exponent of 3333 and the Rician factor of 1111. The noise variances of all users are set to σk2=117superscriptsubscript𝜎𝑘2117\sigma_{k}^{2}=-117italic_σ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT = - 117 dBm. We focus on solving the optimization problem in (III-B1). In particular, we propose a two-layer optimization algorithm to obtain the globally optimal of the considered problem. In the inner layer, for a given decoding order, we solve (III-B1) for the maximization of the system sum rate. In this case, the corresponding optimization problem in (III-B1) is a mixed integer programming problem and is solved optimally by employing the BnB algorithm. In the outer layer, since there are K=4𝐾4K=4italic_K = 4 users, the total number of the corresponding decoding order combinations is K!=24𝐾24K!=24italic_K ! = 24. As such, we check the objective function value for each decoding order and select the one with the maximum objective function value among all decoding orders. Due to the exponentially high complexity of the proposed optimal scheme, we also develop a low-complexity suboptimal scheme capitalizing on alternating optimization, big-M [XX], and SCA methods.

Refer to caption
Figure 7: Simulation setup of the IRS-assisted NGMA system.

For comparison, we also consider three baseline schemes. For baseline scheme 1, we randomly select an SIC decoding order from the set and jointly optimize the beamforming vectors at the BS and the phase shift matrix at the IRS. For baseline scheme 2, we randomly generate the phase shift matrix at the IRS and jointly optimize the beamforming vectors and the SIC decoding order. For baseline scheme 3, we assume that there is no IRS deployed in the considered system and jointly optimize beamforming vectors and the SIC decoding order.

Refer to caption
Figure 8: Average system sum rate (bits/s/Hz) versus the maximum transmit power of the BS Pmaxsubscript𝑃maxP_{\mathrm{max}}italic_P start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT (dBm) for different resource allocation schemes.

Fig. 8 illustrates the average system sum rate (bits/s/Hz) versus the maximum transmit power of the BS Pmaxsubscript𝑃maxP_{\mathrm{max}}italic_P start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT (dBm). The figure shows that both the proposed and baseline schemes exhibit a consistent increase in the average system sum rate with an increase in the maximum transmit power budget. This phenomenon can be attributed to the proposed optimization framework, which effectively enhances the SINRs of users by providing them with additional transmit power. This leads to a significant improvement in the overall system sum rate. Moreover, the figure also highlights that the proposed optimal scheme outperforms the suboptimal scheme. This is because the optimal scheme jointly optimizes all available wireless resources, thereby achieving better results. However, both the optimal and suboptimal schemes exhibit a remarkable sum rate gain compared to the three baseline schemes. This can be attributed to the fact that the three baseline schemes employ simple implementation methods, which often come at the cost of performance. Therefore, the results clearly confirm the effectiveness of the proposed optimal and suboptimal optimization algorithms. Overall, the figure provides valuable insights into the performance of different wireless resource allocation schemes and highlights the importance of optimizing all available resources for achieving optimal system performance.

Can we have a section of future research direction?

VI Conclusions

This article provided an overview of system models, problem formulations, and potential optimization approaches for resource allocation design of NGMA in three types of channels, i.e., natural channels, reconfigurable channels, and functional channels. For each type of channel, we proposed a unified framework for NGMA by formulating the essential input-output relationship, emphasizing the system resources and design DoF, and highlighting the key performance metrics for resource allocation design. Diverse NGMA system models applicable to these three channels were methodically discussed, including OFDMA, NOMA, RSMA, DDMA, IRS-assisted NGMA, UAV-assisted NGMA, M/FA-enabled NGMA, NGMA-based ISAC, and NGMA-enabled JCAC. Even for a given channel type and NGMA scheme, diverse resource allocation designs can be formulated according to the available system information (perfect or imperfect CSI), QoS requirements, and design goals. To cover more resource allocation designs, we formulated different types of resource allocation design problems for different NGMA system models, which are mainly categorized as rate-oriented, power-oriented, and reliability-oriented designs. Corresponding optimization tools for solving the formulated resource allocation design problems were presented, including both the global optimization approaches and low-complexity suboptimal approaches. The machine learning approaches for resource allocation design were briefly discussed. A simulation example of resource allocation design for IRS-assisted NOMA systems was provided and discussed, which highlights the importance of resource allocation designs for improving system performance. We believe that resource allocation design will continuously play the most important role in multiple access in future wireless cellular networks. Emerging technologies would pose new challenges and interesting research topics for resource allocation design, which deserves continuous research efforts invested in this area. We hope this article provides a starter pack for junior researchers studying resource allocation design for NGMA and can stimulate more interesting problems and directions in this prosperous research area.