Downlink Power Allocation Optimization in Pattern Division Multiple Access

Jie Zeng, Xiaochang Fan, Yi Zhong*, Mingyao Peng, Tiejun Lv, Ting Jiang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

5 Citations (Scopus)

Abstract

Non-orthogonal multiple access (NOMA), in particular pattern division multiple access (PDMA), has been recently considered as the critical multiple access technologies deployed for 5G applications. However, optimizing power allocation (PA) at the base station (BS) to increase the sum throughput of the downlink (DL) PDMA system still remains a challenge. Although this problem has been explored to some extent by assuming that the BS can obtain perfect channel state information (CSI), this assumption is unfeasible in harsh environments. Therefore, to effectively improve the sum throughput of communications in the real world, we propose using PDMA with optimized PA. With perfect CSI, iterative power allocation (IPA) that can iteratively update the Lagrange multipliers is proposed. Using the Karush-Kuhn-Tucher (KKT) conditions, a PA solution with closed-form expressions is derived from increasing the sum throughput. With imperfect CSI, the outage probability is considered when maximizing the sum throughput. The probabilistic mixture problem can be converted into a non-probability problem, and thus, PA under imperfect CSI can be optimized with the proposed IPA algorithm. The simulation results demonstrate that the proposed scheme outperforms the existing schemes and can be effective in harsh environments.

Original languageEnglish
Article number9316268
Pages (from-to)14649-14659
Number of pages11
JournalIEEE Access
Volume9
DOIs
Publication statusPublished - 2021

Keywords

  • Channel state information (CSI)
  • non-orthogonal multiple access (NOMA)
  • outage probability
  • pattern division multiple access (PDMA)
  • power allocation

Fingerprint

Dive into the research topics of 'Downlink Power Allocation Optimization in Pattern Division Multiple Access'. Together they form a unique fingerprint.

Cite this