Technical Field
The present invention relates to energy efficiency and, more particularly, to energy efficient downlink scheduling in LTE-Advanced networks.
Description of the Related Art
Energy efficiency is becoming an increasingly popular paradigm in wireless networks. The main motivation behind energy efficient resource allocation is to reliably transmit as many bits as possible for every joule of energy spent, thereby ensuring that the explosive growth in wireless services is managed with as low a carbon footprint as possible. Additionally, increased energy efficiency would decrease the overall operating cost for the operators of wireless networks.
Furthermore, each base station in a wireless network does not consume the same quantity of energy and, for each base station, the amount of energy consumed may continuously change. This is particularly true for Long-Term Evolution (LTE) wireless networks. For instance, if the number of users accessing a particular base station or their aggregate traffic demand in a wireless network decreases, the base station need not transmit in the downlink as many bits as it would if the number of users connected to the base station were greater or their aggregate traffic demand were greater. Therefore, to conserve energy, a method for efficient downlink scheduling is needed.
According to an aspect of the present invention, a method is provided for performing downlink scheduling in Long Term Evolution-Advanced networks. The method includes assigning resource blocks and transmission modes to users such that (i) each of the users that is assigned at least one of the resource blocks is assigned only one transmission mode chosen from a finite set of transmission modes, (ii) a sum of normalized costs across all of the resource blocks that are assigned to the users is less than unity. The method further includes incorporating a resource block and transmission mode assignment for a user into downlink scheduler of a base station to cause the downlink scheduler to perform downlink scheduling in accordance with the resource block and transmission mode assignment.
According to another aspect of the present principles, a computer program product is provided for performing downlink scheduling in Long Term Evolution-Advanced networks. The computer program product includes a computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a computer to cause the computer to perform a method. The method includes assigning resource blocks and transmission modes to users such that (i) each of the users that is assigned at least one of the resource blocks is assigned only one transmission mode chosen from a finite set of transmission modes, (ii) a sum of normalized costs across all of the resource blocks that are assigned to the users is less than unity. The method further includes incorporating a resource block and transmission mode assignment for a user into downlink scheduler of a base station to cause the downlink scheduler to perform downlink scheduling in accordance with the resource block and transmission mode assignment.
These and other features and advantages will become apparent from the following detailed description of illustrative embodiments thereof, which is to be read in connection with the accompanying drawings.
The disclosure will provide details in the following description of preferred embodiments with reference to the following figures wherein:
In accordance with the present principles, systems and methods are provided for maximizing energy efficiency in downlink scheduling in Long-Term Evolution-Advanced (LTE-A) systems.
For Long Term Evolution (LTE)-Advanced (LTE-A) systems, a downlink scheduling problem is considered in which the objective is maximizing the weighted sum of throughputs through a base station in a wireless network. In analyzing this problem, several constraints are imposed. The constraints are listed below, with the motivation for each. In particular, these constraints are:
In one embodiment, the system determines a set of 3-tuples, each containing a user, a transmission mode, and a bit-loading vector, to schedule downlink transmission in a base station in a wireless network.
Referring now to the drawings in which like numerals represent the same or similar elements and initially to
A first storage device 122 and a second storage device 124 are operatively coupled to system bus 102 by the I/O adapter 120. The storage devices 122 and 124 can be any of a disk storage device (e.g., a magnetic or optical disk storage device), a solid state magnetic device, and so forth. The storage devices 122 and 124 can be the same type of storage device or different types of storage devices.
A speaker 132 is operatively coupled to system bus 102 by the sound adapter 130. A transceiver 142 is operatively coupled to system bus 102 by network adapter 140. A display device 162 is operatively coupled to system bus 102 by display adapter 160.
A first user input device 152, a second user input device 154, and a third user input device 156 are operatively coupled to system bus 102 by user interface adapter 150. The user input devices 152, 154, and 156 can be any of a keyboard, a mouse, a keypad, an image capture device, a motion sensing device, a microphone, a device incorporating the functionality of at least two of the preceding devices, and so forth. Of course, other types of input devices can also be used, while maintaining the spirit of the present principles. The user input devices 152, 154, and 156 can be the same type of user input device or different types of user input devices. The user input devices 152, 154, and 156 are used to input and output information to and from system 100.
Of course, the processing system 100 may also include other elements (not shown), as readily contemplated by one of skill in the art, as well as omit certain elements. For example, various other input devices and/or output devices can be included in processing system 100, depending upon the particular implementation of the same, as readily understood by one of ordinary skill in the art. For example, various types of wireless and/or wired input and/or output devices can be used. Moreover, additional processors, controllers, memories, and so forth, in various configurations can also be utilized as readily appreciated by one of ordinary skill in the art. These and other variations of the processing system 100 are readily contemplated by one of ordinary skill in the art given the teachings of the present principles provided herein.
Moreover, it is to be appreciated that systems 500 and 600, described with respect to
Further, it is to be appreciated that processing system 100 may perform at least part of the method described herein including, for example, at least part of method 200 of
Referring now to
At block S210, input the following: user set; set of modes; queue sizes; per-RB normalized costs, a scalar k; a module to compute weighted expected throughput on any RB for any user, any mode, and any permissible bit loading. Alternatively, the weighted expected throughputs on all RBs for all users and all permissible bit loadings can be provided as inputs.
At block S215, define a ground set of all feasible 3-tuples (user, mode, permissible bit-loading vector). Also, define a set (different from the ground set) that includes all selected 3-tuples. Initialize the latter set to be the null (empty) set. Set a scalar ω=0.
At block S220, using method 300 (as described with respect to
At block S225, determine if the termination conditions are satisfied. If so, then proceed to block S230. Otherwise, return to block S220.
At block S230, determine if the set of 3-tuples satisfies the cost constraint. If not, then proceed to block S235. Otherwise, proceed to block S240.
At block S235, apply greedy pruning to the selected set.
At block S240, incorporate the final set of selected 3-tuples into a processor-based downlink scheduler of a base station to cause the downlink scheduler to perform downlink scheduling in accordance with the final set of 3-tuples.
Referring now to
At block S310, input the following: unselected user set; set of modes; queue sizes; per-RB normalized costs; per-RB effective normalized costs; a module to compute weighted expected throughput on any RB for any user, any mode and any permissible bit loading; and a selected set of 3-tuples.
At block S315, consider an unselected user and each mode as follows. Define a vector of selected permissible bit-loadings and initialize it to a vector of all zeros. Define three scalars where the first scalar is used to enforce the queue constraint and the second scalar is used to enforce the constraint that the sum of the effective normalized costs across occupied RBs should be less than unity.
At block S320, considering all RBs, determine the RB and associated permissible bit-loading such that the ratio of the gain and weighted cost is maximized over each RB and each bit-loading permissible under that mode. The weighted cost is the weighted sum of the bit-loading normalized by the queue size and weighted by the first scalar, and the effective cost of that RB weighted by the second scalar. At block S325, select the bit-loading and update the vector of selected bit loadings, and update the two scalars.
At block S330, determine if the maximal ratio is zero or if the sum of the two scalars exceeds the third scalar. If so, then proceed to block S335. Otherwise, return to block S320.
At block S335, store the 3-tuple formed by the considered user, mode and determined bit-loading vector and compute a gain.
At block S340, determine if all modes and unselected users have been considered. If so, then proceed to block S345. Otherwise, return to block S315.
At block S345, output the 3-tuple yielding the largest gain among all stored 3-tuples.
Referring now to
System 500 includes a base station 515. The base station 515 is configured to receive and transmit signals, including a downlink transmission 515, and includes a transmitter and a receiver. The base station 515 communicates with user equipment (collectively denoted by the reference numeral 551).
System 500 further includes a processor 520. The processor 520 computes in each subframe a final set of 3-tuples from a set of users and their weights, a set of transmission modes, a list of queues, a list of normalized costs for each resource block in a set of resource blocks, a ground set of 3-tuples, each 3-tuple including a user from the set of users, a transmission mode from a set of transmission modes, and a bit-loading vector.
The processor 520 includes a storage device 530, configured to store the at least a set of users, the set of transmission modes, the list of queues, the list of normalized costs for each resource block in the set of resource blocks, the ground set of 3-tuples, and the final set of 3-tuples.
The processor 520 further includes a downlink scheduler 525 configured to schedule downlink scheduling of a downlink transmission 515 from the base station 515 to the users.
The system 500 further includes a user interface 540 connected to the processor 520 to enable a user receive the downlink transmission determined as per the downlink scheduler 525.
Referring now to
While many aspects of system 600 are described in singular form for the sakes of illustration and clarity, the same can be applied to multiples ones of the items mentioned with respect to the description of system 600. For example, while a single downlink scheduler 620 may be mentioned with respect to system 600, more than one downlink scheduler 620 can be used in accordance with the teachings of the present principles, while maintaining the spirit of the present principles. Moreover, it is appreciated that the downlink scheduler 620 is but one aspect involved with system 600 than can be extended to plural form while maintaining the spirit of the present principles.
In an embodiment, the system 600 may include a plurality of components, which may include one or more processors, downlink schedulers 620, uplink schedulers 630, storage devices (e.g., computer readable storage medium) 640, circuits 650, base stations 660, user interfaces 670, and/or displays. The above components may be connected by, for example, a bus 601, and data (e.g., system condition data, temperature, voltage, etc.) may be collected according to various embodiments of the present principles. The bus may be connected to any components via a wired or wireless connection.
In an embodiment, a processor 610 may be employed to determine a final set of 3-tuples, based on information, such as a user set, transmission modes, and bit-loading data, stored on the storage device 640. In an embodiment, a downlink scheduler 620 may be employed to perform downlink scheduling at a base station 660, based on the final set of 3-tuples. In an embodiment, the downlink scheduler 620 is processor-based.
In an embodiment, a user interface 670 may be employed to enable a user to input any or all of the data parameters used by the downlink scheduler 620.
In an embodiment, at least one display 680 may be employed to display any of the information and data input or output from the system 600.
The expected throughput obtained upon scheduling user u with mode m on RB n and loading bn bits, is given by:
bn(1−pu,nm(bn)) (1)
where pu,nm(bn) is the corresponding block error probability. B denotes the set of all possible bit loadings that can be done on any RB. Bmin==min{b: b∈B} and Bmax=max{b: b∈B}. The set B can be any arbitrary finite set or it can be an uncountable albeit compact interval, [Bmin, Bmax]. Then, letting αu>0 denote the given (input) weight assigned to user u, and maximizing over the bit loading, the maximum expected weighted throughput is obtained, as:
The throughput model in problem (1) enables imperfections (or errors) in the channel state information to be accommodated at the processor-based downlink scheduler and is more general than the typical assumption made in many previous works, where any variable number of bits bn (subject to an upper bound) can be allocated on RB n and then all of them are then successfully delivered. Indeed, this latter model, henceforth referred to as the 0-1 throughput model, assumes that each error probability is a step function, i.e., pu,nm(bn)=1{bn>Bu,nm}, where 1{.} denotes the indicator function that is equal to one if the input argument is true and equal to zero otherwise. Bu,nm>0 denotes the maximal number of information bits that can be loaded on RB n when scheduling user u with mode m. In addition, under this model, the set B is assumed to be an interval with Bmax≥Bu,nm, ∀ u, m, n.
xu,nm is defined as the indicator variable, which is equal to one if user u is scheduled on RB n with transmission mode m, and equal to zero otherwise. Let K, M be the total number of users and transmission modes, respectively. K is defined as the maximum number of users that can be scheduled in a subframe. Also, N={1, . . . , N} denotes the set of available RBs.
Under a backlogged traffic model, using equation (2), the scheduling problem is formulated as:
where the first set of constraints requires that on each RB (e.g., for a carrier subfrequency in a time-frequency grid), at most one user with one transmission mode (e.g., out of the seven transmission modes in 3GPP) can be scheduled, the second set of constraints stipulates that each user can only have one transmission mode (i.e., one common transmission mode is used across all RBs allocated to the user), the third constraint requires that the maximum number of scheduled users cannot exceed K, and the last constraint dictates that the sum cost of all occupied RBs should be no greater than unity. Notice that the non-negative scalars {an}, n∈N are used to denote the normalized costs associated with using the RBs. Without loss of generality, an ∈ [0, 1], ∀ n∈N is assumed.
Under a finite queue model, it is assumed that user u has a finite queue size Qu. bu,nm is denoted as the number of information bits allocated on RB n when user u is assigned to that RB with transmission mode m (i.e., when xu,nm=1). The scheduling problem is then formulated as:
where the penultimate set of constraints model the queue size limit for each user.
To prove the hardness of the problems in problems (3) and (4), it suffices to consider the 0-1 throughput model and instances where the sum cost constraint is irrelevant (i.e., Σn∈N an≤1). Then, it can be seen that problem (3) allows for more than 2 transmission modes. On the other hand, it can be seen that problem (4) allows for more than one mode. Invoking the hardness results, the following theorem (Theorem 1) can be deduced:
The simplified version of problem (4) is the classical combinatorial auction problem with submodular valuations, i.e., where the RBs have to be distributed among the users with each user's utility being a submodular function. For this problem, a classical greedy algorithm is well suited. Regarding the original version in problem (4), the following theorem (Theorem 2) can be shown:
In accordance with the present principles, a unified algorithm is presented to solve the downlink scheduling problems in problems (3) and (4). The unified algorithm achieves a competitive approximation ratio under both of the traffic models.
The unified algorithm constructs a set S of scheduled users, a set R of selected RBs with Σn∈R an≤1, a transmission mode and a distinct set of RBs in R allocated to each user u∈S. To achieve this objective, a two-stage approach is adopted wherein the first stage selects a set of users in which each user is assigned one mode and a distinct set of RBs. This selection is feasible with respect to all constraints of problems (3) and (4), except for the cost constraint. Consequently, in the second stage, the output of the first stage is pruned in order to obtain a (fully) feasible solution. According to the present principles, the cost constraint is enforced in a soft manner in the first stage. This enables a solution from the first stage to be obtained that is close to the optimal solution, while not significantly violently violating the cost constraint. Then, pruning the solution so obtained yields a feasible solution for which a competitive approximation guarantee can be derived. The pseudo-code of the two-stage unified algorithm is illustrated in Table 1.
The First Stage of the Unified Algorithm 1.
U is denoted as the set of candidate users that have not so far been selected. Initially, U={1, . . . , K} and S=Ø. A current value Vn is defined for each RB n∈N, representing the weighted throughput of the current allocation on that RB, and, initially, Vn=0 for all n∈N.
In an embodiment, Vn is considered to be the weighted throughput barrier that a new selection (of user and mode) should exceed on RB n in order to obtain an assignment. Then, scalar w tracks the accumulated cost of all the occupied RBs, i.e., w=λΣ
The first stage of the unified algorithm is iterative. At each iteration, in order to select a new user (and its mode), the following problem must be solved for each candidate user u∈U and each mode m∈{1, . . . , M}:
where v(u, n, m) denotes the weighted throughput obtained upon assigning user u to RB n with mode m. Let {{circumflex over (v)}(u, n, m)}n∈N denote a good feasible solution to problem (5). Define g(u, m)=Σn=1N max {{circumflex over (v)}(u, n, m)−Vn, 0} to be the net gain of adding user u to S with transmission mode m. The exact computation of {circumflex over (v)}(u, n, m) (and, thus, of g(u, m)) depends on the traffic model.
Let (u*, m*)=argmaxu∈U,m≤Mg(u, m). Then, user u* is added to the scheduled user list (and removed from U) and assigned transmission mode m*. For each RB n∈N, if {circumflex over (v)}(u*, n, m*)>Vn, then it is allocated to user u* and removed from its previous allocation, if it was allocated previously to any user. This ensures that each user is selected once (with one mode), and that each RB is always assigned to at most one user. Note that the RB allocation is subject to change as an assigned RB may be re-allocated to another user layer, or that RB itself may be dropped from the set R that is eventually selected. Vn is now updated as:
Vn=max{Vn,{circumflex over (v)}(u*,n,m*)},∀n∈N (6)
followed by w=λΣ
The Second Stage of the Unified Algorithm
In the second stage of the unified algorithm, the set of all selected RBs R′={n: Vn>0}. The obtained solution is feasible if Σn∈R, an≤1 and set R=R′. Otherwise, the following standard knapsack problem is solved:
in a greedy based manner to determine the feasible subset R. Finally, considering each user u which is assigned one or more RBs within the set R, its best mode is reselected without changing the RB allocation. Note that the latter optimization is decoupled across users and is simple since the RB allocations are not altered.
Now considered is sub-problem (5), which needs to be solved at each iteration, for each one of the two following traffic models.
Backlogged Traffic Model
Under the backlogged traffic model, without loss of optimality, it can be deduced that, if the nth RB is selected, then {circumflex over (v)}(u, n, m) must be the maximum weighted expected throughput of allocating user u on RB n with transmission mode m, i.e.,
{circumflex over (v)}(u,n,m)=znru,nm (8)
where zn ∈{0,1}, ∀ n is an indicator variable that is equal to one if RB n is chosen and is equal to zero otherwise. g (u, n) can hence be calculated by solving the following problem:
Finite Queue Model
Given u, m, and the finite queue size Qu for each user u, the weighted throughput {circumflex over (v)}(u, n, m) is a function of the bit loading bn on RB n, i.e., {circumflex over (v)}(u, n, m)=aubn (1−pu,nm(bn)). As a result, the major issue here is to find an adequate bit allocation subject to the queue size constraint. Towards that end, set Bu is defined as Bu={b∈B: b≤Qu}. Without loss of generality, it is assumed that set Bu is non-empty (otherwise a user u, from the set of candidate users, can simply be removed). Then, the problem of interest can be posed as the following:
Now proposed is an approximation algorithm to solve both problems (9) and (10).
First, ru,m−m is set as
and a subset of candidate RBs is defined as
Clearly, there is no reason to allocate to user u any RBs outside of Rcand. Subsequently, two conditions are defines.
If both of these conditions are true ((C1, C2)=(True, True)), then problem (10) can optimally be solved by simply setting {circumflex over (v)}(u, n, m)=ru,n−2, ∀n∈Rcand with {circumflex over (v)}(u, n, m)=0∀n∈N/Rcand. For the remaining possibilities, non-negative scalars Θ, ζ1, ζ2 and the effective normalized RB costs ān, ∀n are determined using problem (12):
Then, an adequate feasible solution to problem (5) is determined using the greedy procedure that is outlined in Table 2.
Regarding step 2 of Table 2, it is assumed that the locally optimal RB {circumflex over (l)}, together with the corresponding optimal bit loading {circumflex over (b)}{circumflex over (l)}, can be efficiently determined. This is indeed true when the set B (and thus Bu) is finite. It is also true for the 0-1 throughput model, in which case an optimal bit loading for the inner maximization on any RB l is given by {circumflex over (b)}{circumflex over (l)}=Bu,lm. Furthermore, in case the optimal bit loading on any RB is not unique, the largest bit loading is selected among all such optimal loading. While the approximation guarantee that will be proved next holds true for any arbitrary tie breaking, it has been seen in simulation results that the recommended method works better.
An approximation guarantee for Table 1 is now established. Towards that end, a guarantee for Table 2 is first derived.
Table 2 is a constant-factor approximation algorithm for problem (10), where the constant factor is given by
The definition of Rcand is recalled and a ground set of tuples, {tilde over (Ψ)}={(l,bl), ∀l∈Rcand & bl∈Bu}. Note that, for the same RB l, there can be several distinct tuples in {tilde over (Ψ)} corresponding to different bit loading bl. Then, a normalized non-negative set function, ƒ: 2{tilde over (Ψ)}→IR+, is defined, such that ƒ (Ø)=0 and, for all other subsets A⊂{tilde over (Ψ)}, obtained is:
Where (x)+=max{0, x} for all real-valued scalar x. Problem (10) can now be expressed as:
It can be readily verified that the set function ƒ(.) is a normalized non-decreasing submodular set function. Consequently, problem (13) is that of maximizing such a set function subject to two linear packing (knapsack) constraints. The conditions in problem (11) and the three scenarios subsequently listed in problem (12) identify which of the two knapsack constraints are vacuous. Then, in case only one of the constraints is relevant, Table 2 reduces to a greedy algorithm, which considers submodular set function maximization subject to one knapsack constraint, and yields a guarantee of 1−1/e. In the most general case, in which both constraints are relevant, Table 2 becomes a simple enhancement of a multiplicative updates based algorithm, which considers submodular set function maximization subject to multiple general knapsack constraints. Then, if the solution obtained upon termination (of the while-loop) is infeasible, it would compare an objective value attained by just the last tuple added, against that yielded by all the other selected tuples (i.e., the first to the penultimate one) together, and pick the choice yielding the larger objective value. One of the enhancements of the present principles can be readily seen to yield a solution at-least as good as this direct adaptation. Consequently, we can claim the guarantee of
∀Θ>2 (for the problem with two knapsack constraints). The desired result then corresponds to the latter smaller guarantee.
The approximation guarantee for Table 1 will now be established. Towards that end, a ground set containing all possible 3-tuples, Ψ={(u, m, b)}, is defined, where, for each such 3-tuple (or element) e=(u, m, b), u denotes the user, m denotes the mode, and b=[b1, . . . , bN]T is an N length bit loading vector such that, for each RB l∈N, bl>0⇒bl∈Bu and Σl∈N bl≤Qu. Furthermore, Σl∈N an1{bl>0}≤1. With these qualifications, it is concluded that Ψ includes all possible elements, where each such element represents a valid assignment of mode, RBs, and bits to a user. Furthermore, a family of subsets of Ψ, denoted by I, is defined as:
A⊂Ψ: Σ(u′,m′,b′)∈A1{u′=u}≤1∀u&|A|≤
Any subset of 3-tuples from A in which each user appears at most once and whose cardinality does not exceed the user limit
Lemma 1: The set function h(.) is a normalized non-decreasing submodular set function and (Ψ,I) is a matroid.
Problem (4) is now reformulated as:
From the definition of I, it follows that, by restricting A∈I, it is ensured that each user is selected at most once with one mode and that the associated bit loading is feasible, thereby meeting the per-user mode and bit loading constraints of problem (4). Then, the definition of the set function h(.) ensures that each RB is implicitly assigned to at most one user (since only the weighted throughput of at most one user is chosen via the max(.) function). Consequently, any feasible solution to problem (15) maps to a feasible solution to problem (4), yielding the same objective value and vice versa. Thus, problem (4) has been reformulated as that of maximizing a submodular objective subject to one matroid and one knapsack constraint. A most subtle and useful point is that, without loss of optimality, the linear knapsack constraint in problem (15) can be replaced with the following submodular constraint:
Σn∈Nan1{∃(u,m,b)∈A:bn>0}≤1. (16)
Considering problem (15), let Oopt denote an optimal solution and let O denote the final output yielded by Table 1. Furthermore, let O denote the intermediate solution obtained after stage one of Table 1. With some abuse of notation, let aO denote the total cost of all the RBs occupied under O, i.e., aO=Σn∈R, an, where R′ is defined in step 19 of Table 1. Recall that the intermediate solution O need not be feasible with respect to the cost constraint, i.e., aO can be greater than 1.
Next, it is shown that the intermediate solution O at most incurs a constant-factor loss with respect to the optimal one.
The key challenges to surmount are that the ground set Bu can be uncountable and that problem (10) can only be approximately solved. For convenience, the notation 1{n∈A} is used for any RB n∈N and subset A⊂Ψ to return one, if there exists an element e=(u, m, b)∈A under which the bit loading on the nth RB is strictly positive (bn>0), and return zero otherwise. Next, aeis defined as ae=Σn∈N an1{n∈e}, ∀e∈Ψ. Furthermore, for any set A⊂Ψ and element e∈Ψ, hA(e)=(A∪e)−h(A). Then, let ej∈Ψ, j=1, . . . , J be the element (3-tuple) chosen by Table 1 at the jth iteration of stage-1 and J is the number of iterations after which stage-1 of the algorithm terminates. Letting wj denote the scalar w after the jth iteration of Table 1, it is seen that wj=λΣ
Proposition 2: The intermediate solution yielded by Table 1 satisfies:
Proof: The elements of the ground set are expanded as the following ordered sequence of elements: V={e1, F1, e2, F2, . . . , eJ, FJ}. Here, FJ⊂Ψ, j=1, . . . , J−1 is the set of all elements which are rendered infeasible after the selection of the 3-tuple ej. In particular, each element e in this set FJ either shares the same user, as in ej, or violates the soft cost constraint, i.e., aewj>λ (which precludes its subsequent selection by Table 1. The last set FJ is the set of elements that are rendered infeasible given that elements in O=∪j=1Jej have been selected. It includes all the remaining elements in Ψ. Notice that an element in this set can have a user distinct from the one in eJ and satisfy aewj≤λ, only if either |O|=
Let {tilde over (F)}j=ej∪Fj j=1, . . . , J. Consider a traversal of the ordered sequence V (starting from e1) such that Table 1 selects elements e1, . . . eJ while discarding the rest. Suppose that it can be shown that, at every instance in this traversal, the cardinality of the set selected by Table 1 remains at least a certain constant fraction of that selected by the optimal one. Then, invoking the approximate local optimality of the selection made by Table 1 in each iteration, the desired result is established.
To obtain the bound in problem (17) the standard simple inequality is used (which follows from monotonicity and submodularity of h(.)):
h(Oopt)≤h(O)+Σe∈O
Then, all elements e, from Oopt, are discarded that belong to Oopt\O and for whom hO(e)=0. Let Õopt denote the set after expurgating such elements from Oopt and note that
h(Oopt)≤h(O)Σe∈Õ
Next, Lemma 2 is invoked.
Lemma 2: The optimal solution (after expurgation), Õopt, can be partitioned as Õopt=ÕI
ÕI
|ÕI
Let Oj=∪l=1j el, ∀j=1, . . . , J with O0=Ø so that O=OJ. Using Lemma 2 in problem (19), and again invoking the monotonicity and submodularity of h(.), the following inequality is obtained:
Then, a key observation that we can deduce from Proposition 1 is
hO
Using problems (20) and (22) in problem (21) yields that
which is the desired result.
Theorem 3: Table 1 yields an
approximation guarantee for problem (15) (or problem (4)).
Proof: It is can extrapolated that that
where γ∈(0, 1) is a constant. We next prove that ao (which represents the sum cost after stage one) scales at most logarithmically.
Suppose problem (23) holds. Then, define a sequence Sk, k=0, 1, . . . such that S0=0 and Sk=Σn=1Nan1{n∈{e1, . . . , ek}}, ∀k=1, . . . , J so that wk=λS
This implies that
∀k≥1. Then, upon defining Sk=Sj, ∀k>J, it can be deduced that {Sk}k=1∞ represents a sequence in the family S(λ), defined in Lemma 3.
Lemma 3: Let S(λ) denote a family of non-negative and non-decreasing sequences parameterized by the scalar λ>1. Each sequence {Sk}k=1∞ in S(λ) must satisfy S0=0 and
∀k≥0. Then, given any positive scalar Δ such that Δ ln(λ)>1, there exists a finite integer {circumflex over (k)}≥1, such that Sk≤Δ ln(k), ∀k≥{circumflex over (k)} holds true for all sequences in the family S(λ).
It is noted that, in the sequence {Sk}k=1∞, the number of strictly positive increments Sk−Sk-1, ∀k≥1 can be at most min{N, K}. Using this observation and invoking Lemma 2, together with Proposition 2, it is concluded that the theorem is true.
It remains thus to prove problem (22). To do so, first notice that h(O)=Σn∈R′Vn. Furthermore, the knapsack problem in problem (7) can be solved by the greedy based pruning method employed in step 21 (in stage-2 of Table 1) with ½ guarantee, so that:
Then, suppose that all the RBs in R′ can be divided into L bins such that the sum of the cost of the RBs in each bin is less than one. It can be inferred using problem (24) that
A simple bound on such L can be derived using the standard bin packing argument. In particular, there must be only one bin for which the sum cost is less than or equal to ½, else two such bins could be combined into one bin. As a result, L−1 bins must have their respective costs no less than ½, from which it can be deduced that L≤2aO+1, where aO is the total cost of all the RBs in R′. This yields the desired result in problem (23).
Embodiments described herein may be entirely hardware, entirely software or including both hardware and software elements. In a preferred embodiment, the present invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, etc.
Embodiments may include a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. A computer-usable or computer readable medium may include any apparatus that stores, communicates, propagates, or transports the program for use by or in connection with the instruction execution system, apparatus, or device. The medium can be magnetic, optical, electronic, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. The medium may include a computer-readable storage medium such as a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk, etc.
Each computer program may be tangibly stored in a machine-readable storage media or device (e.g., program memory or magnetic disk) readable by a general or special purpose programmable computer, for configuring and controlling operation of a computer when the storage media or device is read by the computer to perform the procedures described herein. The inventive system may also be considered to be embodied in a computer-readable storage medium, configured with a computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner to perform the functions described herein.
A data processing system suitable for storing and/or executing program code may include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code to reduce the number of times code is retrieved from bulk storage during execution. Input/output or I/O devices (including but not limited to keyboards, displays, pointing devices, etc.) may be coupled to the system either directly or through intervening I/O controllers.
Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.
The foregoing is to be understood as being in every respect illustrative and exemplary, but not restrictive, and the scope of the invention disclosed herein is not to be determined from the Detailed Description, but rather from the claims as interpreted according to the full breadth permitted by the patent laws. It is to be understood that the embodiments shown and described herein are only illustrative of the principles of the present invention and that those skilled in the art may implement various modifications without departing from the scope and spirit of the invention. Those skilled in the art could implement various other feature combinations without departing from the scope and spirit of the invention. Having thus described aspects of the invention, with the details and particularity required by the patent laws, what is claimed and desired protected by Letters Patent is set forth in the appended claims.
This application claims priority to application No. 62/214,343 filed on Sep. 4, 2015, incorporated herein by reference in its entirety.
Entry |
---|
Azar, et al., “Efficient Submodular Function Maximization Under Linear Packing Constraints,” 39th Intl. Colloquium on Automata, Languages and Programming, Apr. 2012, pp. 1-18. |
Tutuncuoglu, et al., “Sum-rate Optimal Power Policies for Energy Harvesting Transmitters in an Interference Channel,” CoRR, vol. abs/1110.6161, Feb. 2012, pp. 1-10. |
Lee, et al., “Downlink mimo with Frequency-domain Packet Scheduling for 3gpp lte,” in IEEE Infocom, Apr. 2009, pp. 1-9. |
Andrews, et al., “Scheduling Algorithms for Multi-carrier Wireless Data Systems,” IEEE/ACM Transactions on Networking, Apr. 2011,pp. 447-455, vol. 19, No. 2. |
Ng, et al., “Energy-efficient Resource Allocation in OFDMA Systems with Large Numbers of Base Station Antennas,” IEEE Transactions on Wireless Communications, Sep. 2012, pp. 3292-3304, vol. 11, No. 9. |
Venturino, et al., “Energy-efficient Scheduling and Power Allocation in Downlink OFDMA Networks with Base Station Coordination,” IEEE Trans. on Wireless Comm., Jan. 2015, pp. 1-14, vol. 14. |
Ahmed, et al., “Queue-aware Optimal Resource Allocation for the LTE Downlink”, Globecom 2013 Wireless Comminication Symposium, Dec. 2013, 7 pages. |
Wang, et al., “Energy-subchannel allocation for energy harvesting nodes in frequency-selective channels,” in Information Theory (ISIT), 2015 IEEE International Symposium on, pp. 2712-2716, Jun. 2015. |
Ozel,et al., “Transmission with Energy Harvesting Nodes in Fading Wireless Channels: Optimal policies,” Selected Areas in Communications, IEEE Journal, Sep. 2011, pp. 1732-1743, vol. 29. |
Lin, et al., “Multi-document Summarization via Budgeted Maximization of Submodular Functions,” in HLT10: Human Language Technologies, Jun. 2010, pp. 912-920. |
Number | Date | Country | |
---|---|---|---|
20170070956 A1 | Mar 2017 | US |
Number | Date | Country | |
---|---|---|---|
62214343 | Sep 2015 | US |