-
Distributed Combinatorial Optimization of Downlink User Assignment in mmWave Cell-free Massive MIMO Using Graph Neural Networks
Authors:
Bile Peng,
Bihan Guo,
Karl-Ludwig Besser,
Luca Kunz,
Ramprasad Raghunath,
Anke Schmeink,
Eduard A Jorswieck,
Giuseppe Caire,
H. Vincent Poor
Abstract:
Millimeter wave (mmWave) cell-free massive MIMO (CF mMIMO) is a promising solution for future wireless communications. However, its optimization is non-trivial due to the challenging channel characteristics. We show that mmWave CF mMIMO optimization is largely an assignment problem between access points (APs) and users due to the high path loss of mmWave channels, the limited output power of the a…
▽ More
Millimeter wave (mmWave) cell-free massive MIMO (CF mMIMO) is a promising solution for future wireless communications. However, its optimization is non-trivial due to the challenging channel characteristics. We show that mmWave CF mMIMO optimization is largely an assignment problem between access points (APs) and users due to the high path loss of mmWave channels, the limited output power of the amplifier, and the almost orthogonal channels between users given a large number of AP antennas. The combinatorial nature of the assignment problem, the requirement for scalability, and the distributed implementation of CF mMIMO make this problem difficult. In this work, we propose an unsupervised machine learning (ML) enabled solution. In particular, a graph neural network (GNN) customized for scalability and distributed implementation is introduced. Moreover, the customized GNN architecture is hierarchically permutation-equivariant (HPE), i.e., if the APs or users of an AP are permuted, the output assignment is automatically permuted in the same way. To address the combinatorial problem, we relax it to a continuous problem, and introduce an information entropy-inspired penalty term. The training objective is then formulated using the augmented Lagrangian method (ALM). The test results show that the realized sum-rate outperforms that of the generalized serial dictatorship (GSD) algorithm and is very close to the upper bound in a small network scenario, while the upper bound is impossible to obtain in a large network scenario.
△ Less
Submitted 9 June, 2024;
originally announced June 2024.
-
RISnet: A Domain-Knowledge Driven Neural Network Architecture for RIS Optimization with Mutual Coupling and Partial CSI
Authors:
Bile Peng,
Karl-Ludwig Besser,
Shanpu Shen,
Finn Siegismund-Poschmann,
Ramprasad Raghunath,
Daniel Mittleman,
Vahid Jamali,
Eduard A. Jorswieck
Abstract:
Multiple access techniques are cornerstones of wireless communications. Their performance depends on the channel properties, which can be improved by reconfigurable intelligent surfaces (RISs). In this work, we jointly optimize MA precoding at the base station (BS) and RIS configuration. We tackle difficulties of mutual coupling between RIS elements, scalability to more than 1000 RIS elements, and…
▽ More
Multiple access techniques are cornerstones of wireless communications. Their performance depends on the channel properties, which can be improved by reconfigurable intelligent surfaces (RISs). In this work, we jointly optimize MA precoding at the base station (BS) and RIS configuration. We tackle difficulties of mutual coupling between RIS elements, scalability to more than 1000 RIS elements, and channel estimation. We first derive an RIS-assisted channel model considering mutual coupling, then propose an unsupervised machine learning (ML) approach to optimize the RIS. In particular, we design a dedicated neural network (NN) architecture RISnet with good scalability and desired symmetry. Moreover, we combine ML-enabled RIS configuration and analytical precoding at BS since there exist analytical precoding schemes. Furthermore, we propose another variant of RISnet, which requires the channel state information (CSI) of a small portion of RIS elements (in this work, 16 out of 1296 elements) if the channel comprises a few specular propagation paths. More generally, this work is an early contribution to combine ML technique and domain knowledge in communication for NN architecture design. Compared to generic ML, the problem-specific ML can achieve higher performance, lower complexity and symmetry.
△ Less
Submitted 6 March, 2024;
originally announced March 2024.
-
Learning Based Dynamic Cluster Reconfiguration for UAV Mobility Management with 3D Beamforming
Authors:
Irshad A. Meer,
Karl-Ludwig Besser,
Mustafa Ozger,
Dominic Schupke,
H. Vincent Poor,
Cicek Cavdar
Abstract:
In modern cell-less wireless networks, mobility management is undergoing a significant transformation, transitioning from single-link handover management to a more adaptable multi-connectivity cluster reconfiguration approach, including often conflicting objectives like energy-efficient power allocation and satisfying varying reliability requirements. In this work, we address the challenge of dyna…
▽ More
In modern cell-less wireless networks, mobility management is undergoing a significant transformation, transitioning from single-link handover management to a more adaptable multi-connectivity cluster reconfiguration approach, including often conflicting objectives like energy-efficient power allocation and satisfying varying reliability requirements. In this work, we address the challenge of dynamic clustering and power allocation for unmanned aerial vehicle (UAV) communication in wireless interference networks. Our objective encompasses meeting varying reliability demands, minimizing power consumption, and reducing the frequency of cluster reconfiguration. To achieve these objectives, we introduce a novel approach based on reinforcement learning using a masked soft actor-critic algorithm, specifically tailored for dynamic clustering and power allocation.
△ Less
Submitted 31 January, 2024;
originally announced February 2024.
-
Reinforcement Learning Based Dynamic Power Control for UAV Mobility Management
Authors:
Irshad A. Meer,
Karl-Ludwig Besser,
Mustafa Ozger,
H. Vincent Poor,
Cicek Cavdar
Abstract:
Modern communication systems need to fulfill multiple and often conflicting objectives at the same time. In particular, new applications require high reliability while operating at low transmit powers. Moreover, reliability constraints may vary over time depending on the current state of the system. One solution to address this problem is to use joint transmissions from a number of base stations (…
▽ More
Modern communication systems need to fulfill multiple and often conflicting objectives at the same time. In particular, new applications require high reliability while operating at low transmit powers. Moreover, reliability constraints may vary over time depending on the current state of the system. One solution to address this problem is to use joint transmissions from a number of base stations (BSs) to meet the reliability requirements. However, this approach is inefficient when considering the overall total transmit power. In this work, we propose a reinforcement learning-based power allocation scheme for an unmanned aerial vehicle (UAV) communication system with varying communication reliability requirements. In particular, the proposed scheme aims to minimize the total transmit power of all BSs while achieving an outage probability that is less than a tolerated threshold. This threshold varies over time, e.g., when the UAV enters a critical zone with high-reliability requirements. Our results show that the proposed learning scheme uses dynamic power allocation to meet varying reliability requirements, thus effectively conserving energy.
△ Less
Submitted 7 December, 2023;
originally announced December 2023.
-
RISnet: A Scalable Approach for Reconfigurable Intelligent Surface Optimization with Partial CSI
Authors:
Bile Peng,
Karl-Ludwig Besser,
Ramprasad Raghunath,
Vahid Jamali,
Eduard A. Jorswieck
Abstract:
The reconfigurable intelligent surface (RIS) is a promising technology that enables wireless communication systems to achieve improved performance by intelligently manipulating wireless channels. In this paper, we consider the sum-rate maximization problem in a downlink multi-user multi-input-single-output (MISO) channel via space-division multiple access (SDMA). Two major challenges of this probl…
▽ More
The reconfigurable intelligent surface (RIS) is a promising technology that enables wireless communication systems to achieve improved performance by intelligently manipulating wireless channels. In this paper, we consider the sum-rate maximization problem in a downlink multi-user multi-input-single-output (MISO) channel via space-division multiple access (SDMA). Two major challenges of this problem are the high dimensionality due to the large number of RIS elements and the difficulty to obtain the full channel state information (CSI), which is assumed known in many algorithms proposed in the literature. Instead, we propose a hybrid machine learning approach using the weighted minimum mean squared error (WMMSE) precoder at the base station (BS) and a dedicated neural network (NN) architecture, RISnet, for RIS configuration. The RISnet has a good scalability to optimize 1296 RIS elements and requires partial CSI of only 16 RIS elements as input. We show it achieves a high performance with low requirement for channel estimation for geometric channel models obtained with ray-tracing simulation. The unsupervised learning lets the RISnet find an optimized RIS configuration by itself. Numerical results show that a trained model configures the RIS with low computational effort, considerably outperforms the baselines, and can work with discrete phase shifts.
△ Less
Submitted 18 August, 2023; v1 submitted 1 May, 2023;
originally announced May 2023.
-
Reliability and Latency Analysis for Wireless Communication Systems with a Secret-Key Budget
Authors:
Karl-Ludwig Besser,
Rafael F. Schaefer,
H. Vincent Poor
Abstract:
We consider a wireless communication system with a passive eavesdropper, in which a transmitter and legitimate receiver generate and use key bits to secure the transmission of their data. These bits are added to and used from a pool of available key bits. In this work, we analyze the reliability of the system in terms of the probability that the budget of available key bits will be exhausted. In a…
▽ More
We consider a wireless communication system with a passive eavesdropper, in which a transmitter and legitimate receiver generate and use key bits to secure the transmission of their data. These bits are added to and used from a pool of available key bits. In this work, we analyze the reliability of the system in terms of the probability that the budget of available key bits will be exhausted. In addition, we investigate the latency before a transmission can take place. Since security, reliability, and latency are three important metrics for modern communication systems, it is of great interest to jointly analyze them in relation to the system parameters. In particular, we show under what conditions the system may remain in an active state indefinitely, i.e., never run out of available secret-key bits. The results presented in this work will allow system designers to adjust the system parameters in such a way that the requirements of the application in terms of both reliability and latency are met.
△ Less
Submitted 12 January, 2024; v1 submitted 5 April, 2023;
originally announced April 2023.
-
Approaching Globally Optimal Energy Efficiency in Interference Networks via Machine Learning
Authors:
Bile Peng,
Karl-Ludwig Besser,
Ramprasad Raghunath,
Eduard A. Jorswieck
Abstract:
This work presents a machine learning approach to optimize the energy efficiency (EE) in a multi-cell wireless network. This optimization problem is non-convex and its global optimum is difficult to find. In the literature, either simple but suboptimal approaches or optimal methods with high complexity and poor scalability are proposed. In contrast, we propose a machine learning framework to appro…
▽ More
This work presents a machine learning approach to optimize the energy efficiency (EE) in a multi-cell wireless network. This optimization problem is non-convex and its global optimum is difficult to find. In the literature, either simple but suboptimal approaches or optimal methods with high complexity and poor scalability are proposed. In contrast, we propose a machine learning framework to approach the global optimum. While the neural network (NN) training takes moderate time, application with the trained model requires very low computational complexity. In particular, we introduce a novel objective function based on stochastic actions to solve the non-convex optimization problem. Besides, we design a dedicated NN architecture for the multi-cell network optimization problems that is permutation-equivariant. It classifies channels according to their roles in the EE computation. In this way, we encode our domain knowledge into the NN design and shed light into the black box of machine learning. Training and testing results show that the proposed method without supervision and with reasonable computational effort achieves an EE close to the global optimum found by the branch-and-bound algorithm. Hence, the proposed approach balances between computational complexity and performance.
△ Less
Submitted 14 December, 2023; v1 submitted 25 November, 2022;
originally announced December 2022.
-
QMKPy: A Python Testbed for the Quadratic Multiple Knapsack Problem
Authors:
Karl-Ludwig Besser,
Eduard A. Jorswieck
Abstract:
QMKPy provides a Python framework for modeling and solving the quadratic multiple knapsack problem (QMKP). It is primarily aimed at researchers who develop new solution algorithms for the QMKP. QMKPy therefore mostly functions as a testbed to quickly implement novel algorithms and compare their results with existing ones. However, the package also already includes implementations of established al…
▽ More
QMKPy provides a Python framework for modeling and solving the quadratic multiple knapsack problem (QMKP). It is primarily aimed at researchers who develop new solution algorithms for the QMKP. QMKPy therefore mostly functions as a testbed to quickly implement novel algorithms and compare their results with existing ones. However, the package also already includes implementations of established algorithms for those who only need to solve a QMKP as part of their research.
△ Less
Submitted 14 November, 2022;
originally announced November 2022.
-
Multi-User Frequency Assignment for Ultra-Reliable mmWave Two-Ray Channels
Authors:
Karl-Ludwig Besser,
Eduard A. Jorswieck,
Justin P. Coon
Abstract:
We consider a multi-user two-ray ground reflection scenario with unknown distances between transmitter and receivers. By using two frequencies per user in parallel, we can mitigate possible destructive interference and ensure ultra-reliability with only very limited knowledge at the transmitter. In this work, we consider the problem of assigning two frequencies to each receiver in a multi-user com…
▽ More
We consider a multi-user two-ray ground reflection scenario with unknown distances between transmitter and receivers. By using two frequencies per user in parallel, we can mitigate possible destructive interference and ensure ultra-reliability with only very limited knowledge at the transmitter. In this work, we consider the problem of assigning two frequencies to each receiver in a multi-user communication system such that the average minimum receive power is maximized. In order to solve this problem, we introduce a generalization of the quadratic multiple knapsack problem to include heterogeneous profits and develop an algorithm to solve it. Compared to random frequency assignment, we report a gain of around 6 dB in numerical simulations.
△ Less
Submitted 14 November, 2022;
originally announced November 2022.
-
An Efficient Frequency Diversity Scheme for Ultra-Reliable Communications in Two-Path Fading Channels
Authors:
Karl-Ludwig Besser,
Eduard A. Jorswieck,
Justin P. Coon
Abstract:
We consider a two-ray ground reflection scenario with unknown distance between transmitter and receiver. By utilizing two frequencies in parallel, we can mitigate possible destructive interference and ensure ultra-reliability with only very limited knowledge at the transmitter. In order to achieve this ultra-reliability, we optimize the frequency spacing such that the worst-case receive power is m…
▽ More
We consider a two-ray ground reflection scenario with unknown distance between transmitter and receiver. By utilizing two frequencies in parallel, we can mitigate possible destructive interference and ensure ultra-reliability with only very limited knowledge at the transmitter. In order to achieve this ultra-reliability, we optimize the frequency spacing such that the worst-case receive power is maximized. Additionally, we provide an algorithm to calculate the optimal frequency spacing. Besides the receive power, we also analyze the achievable rate and outage probability. It is shown that the frequency diversity scheme achieves a significant improvement in terms of reliability over using a single frequency. In particular, we demonstrate the effectiveness of the proposed approach by a numerical simulation of an unmanned aerial vehicle (UAV) flying above flat terrain.
△ Less
Submitted 14 June, 2024; v1 submitted 27 June, 2022;
originally announced June 2022.
-
Securing Data in Multimode Fibers by Exploiting Mode-Dependent Light Propagation Effects
Authors:
Stefan Rothe,
Karl-Ludwig Besser,
David Krause,
Robert Kuschmierz,
Nektarios Koukourakis,
Eduard Jorswieck,
Jürgen W. Czarske
Abstract:
Multimode fibers hold great promise to advance data rates in optical communications but come with the challenge to compensate for modal crosstalk and mode-dependent losses, resulting in strong distortions. The holographic measurement of the transmission matrix enables not only correcting distortions but also harnessing these effects for creating a confidential data connection between legitimate co…
▽ More
Multimode fibers hold great promise to advance data rates in optical communications but come with the challenge to compensate for modal crosstalk and mode-dependent losses, resulting in strong distortions. The holographic measurement of the transmission matrix enables not only correcting distortions but also harnessing these effects for creating a confidential data connection between legitimate communication parties, Alice and Bob. The feasibility of this physical-layer-security-based approach is demonstrated experimentally for the first time on a multimode fiber link to which the eavesdropper Eve is physically coupled. Once the proper structured light field is launched at Alice's side, the message can be delivered to Bob, and, simultaneously, the decipherment for an illegitimate wiretapper Eve is destroyed. Within a real communication scenario, we implement wiretap codes and demonstrate confidentiality by quantifying the level of secrecy. Compared to an uncoded data transmission, the amount of securely exchanged data is enhanced by a factor of 538. The complex light transportation phenomena that have long been considered limiting and have restricted the widespread use of multimode fiber are exploited for opening new perspectives on information security in spatial multiplexing communication systems.
△ Less
Submitted 10 March, 2023; v1 submitted 1 March, 2022;
originally announced March 2022.
-
Reconfigurable Intelligent Surface Phase Hop** for Ultra-Reliable Communications
Authors:
Karl-Ludwig Besser,
Eduard A. Jorswieck
Abstract:
We introduce a phase hop** scheme for reconfigurable intelligent surfaces (RISs) in which the phases of the individual RIS elements are randomly varied with each transmitted symbol. This effectively converts slow fading into fast fading. We show how this can be leveraged to significantly improve the outage performance especially for small outage probabilities without channel state information (C…
▽ More
We introduce a phase hop** scheme for reconfigurable intelligent surfaces (RISs) in which the phases of the individual RIS elements are randomly varied with each transmitted symbol. This effectively converts slow fading into fast fading. We show how this can be leveraged to significantly improve the outage performance especially for small outage probabilities without channel state information (CSI) at the transmitter and RIS. Furthermore, the same result can be accomplished even if only two possible phase values are available. Since we do not require perfect CSI at the transmitter or RIS, the proposed scheme has no additional communication overhead for adjusting the phases. This enables robust ultra-reliable communications with a reduced effort for channel estimation.
△ Less
Submitted 3 May, 2022; v1 submitted 25 July, 2021;
originally announced July 2021.
-
Achievable Physical-Layer Secrecy in Multi-Mode Fiber Channels using Artificial Noise
Authors:
Eduard Jorswieck,
Andrew Lonnstrom,
Karl-Ludwig Besser,
Stefan Rothe,
Juergen W. Czarske
Abstract:
Reliable and secure communication is an important aspect of modern fiber optic communication. In this work we consider a multi-mode fiber (MMF) channel wiretapped by an eavesdropper. We assume the transmitter knows the legitimate channel, but statistical knowledge of the eavesdropper's channel only. We propose a transmission scheme with artificial noise (AN) for such a channel. In particular, we f…
▽ More
Reliable and secure communication is an important aspect of modern fiber optic communication. In this work we consider a multi-mode fiber (MMF) channel wiretapped by an eavesdropper. We assume the transmitter knows the legitimate channel, but statistical knowledge of the eavesdropper's channel only. We propose a transmission scheme with artificial noise (AN) for such a channel. In particular, we formulate the corresponding optimization problem which aims to maximize the average secrecy rate and develop an algorithm to solve it. We apply this algorithm to actual measured MMF channels. As real fiber measurements show, for a 55 mode MMF we can achieve positive average secrecy rates with the proper use of AN. Furthermore, the gain compared to standard precoding and power allocation schemes is illustrated.
△ Less
Submitted 7 May, 2021;
originally announced May 2021.
-
On Fading Channel Dependency Structures with a Positive Zero-Outage Capacity
Authors:
Karl-Ludwig Besser,
Pin-Hsun Lin,
Eduard A. Jorswieck
Abstract:
With emerging wireless technologies like 6G, many new applications like autonomous systems evolve which have strict demands on the reliability and latency of data communications. In the scenario of the commonly investigated independent slow fading links, the zero-outage capacity (ZOC) is zero and retransmissions are therefore inevitable. In this work, we show that a positive ZOC can be achieved un…
▽ More
With emerging wireless technologies like 6G, many new applications like autonomous systems evolve which have strict demands on the reliability and latency of data communications. In the scenario of the commonly investigated independent slow fading links, the zero-outage capacity (ZOC) is zero and retransmissions are therefore inevitable. In this work, we show that a positive ZOC can be achieved under the same setting of slow fading with constant transmit power and without perfect channel state information at the transmitter, if the joint distribution of the channel gains follows certain structures. This allows reliable reception without any outages, thus not requiring retransmissions. Based on a systematic copula approach, we show that there exists a set of dependency structures for which positive ZOCs can be achieved for both maximum ratio combining (MRC) and selection combining (SC). We characterize the maximum ZOC within a finite number of bits. The results are evaluated explicitly for the special cases of Rayleigh fading and Nakagami-$m$ fading in order to quantify the ZOCs for common fading models.
△ Less
Submitted 12 July, 2021; v1 submitted 4 February, 2021;
originally announced February 2021.
-
Copula-Based Bounds for Multi-User Communications -- Part II: Outage Performance
Authors:
Karl-Ludwig Besser,
Eduard A. Jorswieck
Abstract:
In the first part of this two-part letter, we introduced methods to study the impact of dependency on the expected value of functions of two random variables. In this second part, we present tools to derive worst- and best-case bounds on the outage probability of multi-user communication systems, including multiple access channels, wiretap channels, and reconfigurable intelligent surface-assisted…
▽ More
In the first part of this two-part letter, we introduced methods to study the impact of dependency on the expected value of functions of two random variables. In this second part, we present tools to derive worst- and best-case bounds on the outage probability of multi-user communication systems, including multiple access channels, wiretap channels, and reconfigurable intelligent surface-assisted channels.
△ Less
Submitted 21 September, 2020;
originally announced September 2020.
-
Copula-Based Bounds for Multi-User Communications -- Part I: Average Performance
Authors:
Eduard A. Jorswieck,
Karl-Ludwig Besser
Abstract:
Statistically independent or positively correlated fading models are usually applied to compute the average performance of wireless communications. However, there exist scenarios with negative dependency and it is therefore of interest how different performance metrics behave for different general dependency structures of the channels. Especially best-case and worst-case bounds are practically rel…
▽ More
Statistically independent or positively correlated fading models are usually applied to compute the average performance of wireless communications. However, there exist scenarios with negative dependency and it is therefore of interest how different performance metrics behave for different general dependency structures of the channels. Especially best-case and worst-case bounds are practically relevant as a system design guideline. In this two-part letter, we present methods and tools from dependency modeling which can be applied to analyze and design multi-user communications systems exploiting and creating dependencies of the effective fading channels. The first part focuses on fast fading with average performance metrics, while the second part considers slow fading with outage performance metrics.
△ Less
Submitted 21 September, 2020;
originally announced September 2020.
-
Bounds on the Secrecy Outage Probability for Dependent Fading Channels
Authors:
Karl-Ludwig Besser,
Eduard A. Jorswieck
Abstract:
The amount of sensitive data, which is transmitted wirelessly will increase with future technologies. This raises many questions about secure data transmission. Besides cryptography, information-theoretic security gained increasing attention over the recent years. Among others, it deals with the problem of secure data transmission on the physical layer to a legitimate receiver (Bob) in the presenc…
▽ More
The amount of sensitive data, which is transmitted wirelessly will increase with future technologies. This raises many questions about secure data transmission. Besides cryptography, information-theoretic security gained increasing attention over the recent years. Among others, it deals with the problem of secure data transmission on the physical layer to a legitimate receiver (Bob) in the presence of an eavesdropper (Eve). In this work, we investigate upper and lower bounds on the secrecy outage probability for slowly-fading wiretap channels with an arbitrary dependency structure between the fading channels to Bob and Eve. Both cases of absence of channel-state information at the transmitter (CSI-T) and availability of CSI-T of only the main channel to the legitimate receiver are considered. Furthermore, we derive explicit expressions for the upper and lower bounds for Rayleigh fading and compare them to the case of independent channels. The joint distribution of the legitimate and eavesdropper channels has a tremendous impact on the achievable secrecy outage probability. The bounds enable develo** guaranteed secrecy schemes by only measuring the marginal channel distributions.
△ Less
Submitted 21 September, 2020; v1 submitted 14 April, 2020;
originally announced April 2020.
-
Reliability Bounds for Dependent Fading Wireless Channels
Authors:
Karl-Ludwig Besser,
Eduard A. Jorswieck
Abstract:
Unreliable fading wireless channels are the main challenge for strict performance guarantees in mobile communications. Diversity schemes including massive number of antennas, huge spectrum bands and multi-connectivity links are applied to improve the outage performance. The success of these approaches relies heavily on the joint distribution of the underlying fading channels. In this work, we cons…
▽ More
Unreliable fading wireless channels are the main challenge for strict performance guarantees in mobile communications. Diversity schemes including massive number of antennas, huge spectrum bands and multi-connectivity links are applied to improve the outage performance. The success of these approaches relies heavily on the joint distribution of the underlying fading channels. In this work, we consider the $\varepsilon$-outage capacity of slowly fading wireless diversity channels and provide lower and upper bounds for fixed marginal distributions of the individual channels. This answers the question about the best and worst case outage probability achievable over $n$ fading channels with a given distribution, e.g., Rayleigh fading, but not necessarily statistically independent. Interestingly, the best-case joint distribution enables achieving a zero-outage capacity greater than zero without channel state information at the transmitter for $n \geq 2$. Furthermore, the results are applied to characterize the worst- and best-case joint distribution for zero-outage capacity with perfect channel state information everywhere. All results are specialized to Rayleigh fading and compared to the standard assumption of independent and identically distributed fading component channels. The results show a significant impact of the joint distribution and the gap between worst- and best-case can be arbitrarily large.
△ Less
Submitted 22 May, 2020; v1 submitted 3 September, 2019;
originally announced September 2019.
-
A Globally Optimal Energy-Efficient Power Control Framework and its Efficient Implementation in Wireless Interference Networks
Authors:
Bho Matthiesen,
Alessio Zappone,
Karl-L. Besser,
Eduard A. Jorswieck,
Merouane Debbah
Abstract:
This work develops a novel power control framework for energy-efficient power control in wireless networks. The proposed method is a new branch-and-bound procedure based on problem-specific bounds for energy-efficiency maximization that allow for faster convergence. This enables to find the global solution for all of the most common energy-efficient power control problems with a complexity that, a…
▽ More
This work develops a novel power control framework for energy-efficient power control in wireless networks. The proposed method is a new branch-and-bound procedure based on problem-specific bounds for energy-efficiency maximization that allow for faster convergence. This enables to find the global solution for all of the most common energy-efficient power control problems with a complexity that, although still exponential in the number of variables, is much lower than other available global optimization frameworks. Moreover, the reduced complexity of the proposed framework allows its practical implementation through the use of deep neural networks. Specifically, thanks to its reduced complexity, the proposed method can be used to train an artificial neural network to predict the optimal resource allocation. This is in contrast with other power control methods based on deep learning, which train the neural network based on suboptimal power allocations due to the large complexity that generating large training sets of optimal power allocations would have with available global optimization methods. As a benchmark, we also develop a novel first-order optimal power allocation algorithm. Numerical results show that a neural network can be trained to predict the optimal power allocation policy.
△ Less
Submitted 3 December, 2019; v1 submitted 17 December, 2018;
originally announced December 2018.