PRECODING AND SCHEDULING WHILE MINIMIZING AGE OF INCORRECT INFORMATION FOR MULTIPLE ACCESS SYSTEMS

Information

  • Patent Application
  • 20250192832
  • Publication Number
    20250192832
  • Date Filed
    December 11, 2023
    2 years ago
  • Date Published
    June 12, 2025
    6 months ago
Abstract
In some implementations, a transmitter may determine that a difference between a total age of incorrect information (AoII) obtained in a current iteration of an iterative algorithm and a total AoII in a previous iteration of the iterative algorithm satisfies a tolerance factor for algorithm convergence. The transmitter may use the iterative algorithm to solve a convex optimization problem based on a plurality of iterations that continue until an objective function associated with AoII converges to within the tolerance factor for algorithm convergence. The transmitter may determine a precoder matrix and a vector of scheduling indicators from a solving of the convex optimization problem. The transmitter may transmit, using a downlink multi-user communication framework based on rate-splitting multiple access (RSMA) in a semantic-aware network, one or more updates to one or more receivers based on the precoder matrix and the vector of scheduling indicators.
Description
BACKGROUND

Wireless communication systems are widely deployed to provide various telecommunication services such as telephony, video, data, messaging, and broadcasts. A wireless network may include one or more network nodes that support communication for wireless communication devices, such as a user equipment (UE).


SUMMARY

In some implementations, a method includes determining, by a transmitter, that a difference between a total age of incorrect information (AoII) obtained in a current iteration of an iterative algorithm and a total AoII in a previous iteration of the iterative algorithm satisfies a tolerance factor for algorithm convergence; using, by the transmitter and based on the difference satisfying the tolerance factor for algorithm convergence, the iterative algorithm to solve a convex optimization problem based on a plurality of iterations that continue until an objective function associated with AoII converges to within the tolerance factor for algorithm convergence; determining, by the transmitter, a precoder matrix and a vector of scheduling indicators from a solving of the convex optimization problem; and transmitting, by the transmitter and using a downlink multi-user communication framework based on rate-splitting multiple access (RSMA) in a semantic-aware network, one or more updates to one or more receivers based on the precoder matrix and the vector of scheduling indicators.


In some implementations, a transmitter includes one or more memories; and one or more processors, communicatively coupled to the one or more memories, configured to: determine that a difference between a total AoII obtained in a current iteration of an iterative algorithm and a total AoII in a previous iteration of the iterative algorithm satisfies a tolerance factor for algorithm convergence; use, based on the difference satisfying the tolerance factor for algorithm convergence, the iterative algorithm to solve a convex optimization problem based on a plurality of iterations that continue until an objective function associated with AoII converges to within the tolerance factor for algorithm convergence; determine a precoder matrix and a vector of scheduling indicators from a solving of the convex optimization problem; and transmit, using a downlink multi-user communication framework based on RSMA in a semantic-aware network, one or more updates to one or more receivers based on the precoder matrix and the vector of scheduling indicators.


In some implementations, a non-transitory computer-readable medium storing a set of instructions includes one or more instructions that, when executed by one or more processors of a transmitter, cause the transmitter to: determine that a difference between a total AoII obtained in a current iteration of an iterative algorithm and a total AoII in a previous iteration of the iterative algorithm satisfies a tolerance factor for algorithm convergence; use, based on the difference satisfying the tolerance factor for algorithm convergence, the iterative algorithm to solve a convex optimization problem based on a plurality of iterations that continue until an objective function associated with AoII converges to within the tolerance factor for algorithm convergence; determine a precoder matrix and a vector of scheduling indicators from a solving of the convex optimization problem; and transmit, using a downlink multi-user communication framework based on RSMA in a semantic-aware network, one or more updates to one or more receivers based on the precoder matrix and the vector of scheduling indicators.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a diagram of an example associated with a transmission model of K-receiver 1-layer RSMA.



FIG. 2 is a diagram of an example associated with precoding and scheduling while minimizing AoII for multiple access systems.



FIG. 3 is a diagram of an example environment in which systems and/or methods described herein may be implemented.



FIG. 4 is a diagram of example components of one or more devices of FIG. 3.



FIG. 5 is a flowchart of an example process relating to precoding and scheduling while minimizing AoII for multiple access systems.





DETAILED DESCRIPTION

The following detailed description of example implementations refers to the accompanying drawings. The same reference numbers in different drawings may identify the same or similar elements.


RSMA is an emerging multiple access technique for multi-antenna systems that relies on precoded rate-splitting at a transmitter and successive interference cancellation (SIC) at receivers (e.g., UEs). RSMA may manage multi-receiver interference in a flexible and robust manner by partially decoding interference and partially treating the interference as noise. RSMA may encapsulate and outperform existing multiple access schemes, such as space division multiple access (SDMA) and non-orthogonal multiple access (NOMA).


Semantic communications may be used in order to address the requirements of next generation networks with the advancement of machine learning techniques. Semantic communications focuses on the communication problem beyond the “Technical Level”, the fundamentals of which are laid out by Shannon, and aims to convey meaning or features of information instead of transmitting correct bits. Semantic communications is expected to change approaches for designing and measuring the performance of wireless networks, since the conventional design metrics and approaches fail to capture its potential and waste available resources. Consequently, new metrics may be considered to properly capture the needs of semantic networks, such as, AoII. AoII may address the shortcomings of the metric age of information (AoI) (e.g., an end-to-end metric that captures a semantic property known as the timeliness of information) by capturing the effect of content and data freshness together. AoII may capture not only the freshness of information but also the information content of transmitted packets. AoII has been considered among the candidate metrics to be used for designing semantic-aware networks.


The usage of RSMA may be considered in the context of semantic communications or AoI-based metrics. For example, RSMA may be considered for joint communication and computation in semantic communication networks. An optimization problem may be formulated to minimize the total energy consumption of the network under a latency constraint to find the optimal beamformers, transmit information accuracy, computation capacity, rate, and/or power allocation schemes for downlink transmission. RSMA may perform with the smallest total communication and computation energy among the compared multiple access schemes, which may include SDMA, NOMA and frequency division multiple access (FDMA). As another example, the AoI performance of RSMA for a two-receiver single-antenna downlink communication system over an AoI minimization problem may be investigated to find the optimal power allocation policy. In this case, RSMA may achieve a better AoI-energy trade-off than NOMA and orthogonal multiple access (OMA) under the considered system model.


However, the usage of RSMA has not been considered in the context of semantic communications and AoII-based metrics. The usage of RSMA has not been considered to minimize AoII in a multi-antenna network with an arbitrary number of receivers. RSMA may encapsulate and outperform existing multiple access schemes (e.g., SDMA and NOMA), so a design that minimizes AoII for multiple access systems using RSMA may be useful to improve an overall network performance.


In some implementations, a downlink multi-receiver communication framework based on RSMA (e.g., an RSMA-based transmission scheme) may be defined for semantic-aware networks. An optimization problem, such as an AoII minimization problem, may be formulated to obtain jointly an optimal receiver scheduling, precoding, resource allocation, and/or power allocation schemes, while minimizing AoII for multiple access systems. The AoII minimization problem may be formulated to jointly find the optimal receiver scheduling, precoding scheme, and power allocation design for RSMA in the multi-antenna network with the arbitrary number of receivers. The formulated AoII minimization problem may be non-convex and include conditional objective functions and constraints. The metric AoII may be considered in the objective function of the formulated problem to maximize the freshness of the overall information to be transmitted. Big-M techniques (e.g., “Big M” refers to a large number associated with artificial variables, represented by the letter M) and successive convex approximation (SCA) techniques may be used to convert the resulting non-convex problem with conditional objective and constraints into a convex one, and an iterative algorithm may be defined to solve the convex problem.


In some implementations, by designing a downlink multi-receiver communication framework based on RSMA in semantic-aware networks, and by formulating an optimization problem to jointly obtain optimal receiver scheduling, power allocation, and precoding, AoII may be minimized for multiple access systems. Such an approach using RSMA may result in a lower AoII than SDMA and other related techniques due to superior performance under multi-receiver interference, thereby improving an overall system performance.



FIG. 1 is a diagram of an example 100 associated with a transmission model of K-receiver 1-layer RSMA.


In some implementations, in a system model, a single transmitter 102 with N antennas may perform downlink communications with K single-antenna receivers 104 (e.g., K single-antenna receivers). A set of indexes associated with receivers may be denoted by custom-character. Transmissions may be performed in a time-slotted framework and time may be assumed to be normalized to a slot duration, such that the slot duration is taken as 1 and each transmission occurs at a time instance t∈N. An information process Xt,k, t∈N, k∈custom-character, may be observed for each receiver at the transmitter 102, which may change over time. Each receiver may have an estimate of the process Xt,k at time instance t, denoted by custom-character. The aim of the transmitter 102 is to update the receivers about the changes in Xt,k, e.g., keep custom-character up-to-date. Accordingly, the transmitter 102 may decide to transmit to receiver-k at time instance t when the transmitter 102 observes a certain amount of change in Xt,k.


In some implementations, when the transmitter 102 decides to send updates at time instance t, the transmitter 102 may schedule a particular number of receivers for transmission. The set of indexes for such receivers may be denoted as custom-charactertcustom-character. The transmission to the scheduled receivers may start at time instance t and finish at t+1. When receiver-k is able to successfully receive the update intended for receiver-k, receiver-k may update its estimate at t+1. The model custom-character=XUt may be considered for the process estimate at receiver-k, where Ut is the timestamp of the last successfully received packet by a receiver at time t. In some implementations, when receiver-k is able to decode its update successfully, receiver-k may transmit an acknowledgement (ACK) packet to the transmitter 102. A transmission time for the ACK may be assumed to be negligible. When the ACK is not received at time instance t+1 from receiver-k, the transmitter 102 may drop the update Xt,k and generate a new update Xt+1,k.


As indicated above, FIG. 1 is provided as an example. Other examples may differ from what is described with regard to FIG. 1.


In some implementations, RSMA may be considered for transmissions to scheduled receivers. RSMA is a robust and flexible multiple-access technique for multi-antenna networks. RSMA may involve performing message splitting at a transmitter by splitting receiver messages into common and private parts. The common parts of the receiver messages may be combined and encoded into a common stream to be decoded by a plurality of receivers (e.g., all receivers), and the private parts of the receiver messages may be encoded into private streams. A plurality of messages (e.g., all messages) may be superimposed in a non-orthogonal manner.


In some implementations, the message of receiver-k at time t, and its common and private parts may be denoted as Wk, Wc,k and Wp,k, respectively. The subscript t may be dropped from the rate expressions for ease of notation. The transmitter may combine Wc,k, ∀k∈custom-character, into a common message Wc. The common message Wc and private messages Wp,k may be independently encoded into streams sc and sk, respectively. Linear precoding may be applied to a plurality of streams (e.g., all streams), and the precoders for the common stream and the private stream of receiver-k may be denoted as pc∈Cnt and pk∈Cnt, respectively. Accordingly, a transmit signal may be expressed as:









x
=



p
c



s
c


+







k
=
1

K



p
k




s
k

.







(
1
)







In some implementations, the streams may have unit power, such that, E{ssH}=I for s=[sc, s1, . . . , sK]. The transmitter may be assumed to have perfect channel state information at transmitter (CSIT) to calculate the precoders. The received signal at receiver-k may be represented as:















y
k

=



h
k
H


x

+

z
k



,






k

𝒦





,




(
2
)







where hk∈CN is a channel vector and zk˜custom-character(0, σn2) is an additive white Gaussian noise (AWGN) at receiver-k.


In some implementations, at a receiver (e.g., UE side), the messages may be detected using a successive interference cancellation (SIC) algorithm. Each receiver may decode the common stream first to obtain a common message estimate Ŵc and extract its common message estimate custom-character by treating the private streams for the plurality of receivers (e.g., all receivers) as noise. The common stream may be reconstructed using Ŵc and subtracted from the received signal. Each UE may decode its intended private message custom-character by treating the private messages of other receivers as noise. Further, each receiver may combine the message estimates custom-character and custom-character to obtain its original message estimate Ŵk.


In some implementations, a signal-to-interference-plus-noise ratio (SINR) for the common and private streams at receiver-k may be expressed by:











γ

c
,
k


=





"\[LeftBracketingBar]"



h
k
H



p
c




"\[RightBracketingBar]"


2


1
+







i

𝒦







"\[LeftBracketingBar]"



h
k
H



p
i




"\[RightBracketingBar]"


2





,


γ
k

=





"\[LeftBracketingBar]"



h
k
H



p
k




"\[RightBracketingBar]"


2


1
+








i

𝒦

,

i

k








"\[LeftBracketingBar]"



h
k
H



p
i




"\[RightBracketingBar]"


2





,




(
3
)







respectively. Accordingly, the achievable rates Rk=log2 (1+γk) and Rc,k=log2 (1+γc,k) bits/s/Hz may be defined. The common message should be decodable by the plurality of receivers (e.g., all receivers), and its achievable rate may be defined as







R
c

=


min

k



𝓉






R

c
,
k


.






Further the common rate portion for receiver-k may be defined as ck, such that, custom-character ck=Rc.


In some implementations, AoII may be considered to design a transmission framework based on RSMA. AoII may be used as a metric to capture the needs of semantics-empowered communications. AoII may address the shortcomings of AoI and error-based metrics in semantic communications by inferring the importance of data packets not only through their timestamps but also their content. AoII may be used as one of the metrics to design and evaluate semantic-aware networks.


In some implementations, Vt,k may be defined as the last time instant where receiver-k had sufficiently accurate information about the process Xt,k. The AoII may be defined as:











Δ

AoII
,
k


(


X

t
,
k


,
,
t

)

=


f

(
t
)

×


g

(


X

t
,
k


,

)

.






(
4
)







In (4), f(t) may increasingly penalize the system as long as the mismatch between custom-character and custom-character lasts, and g(Xt,k, custom-character) quantifies the gap between custom-character and custom-character [10]. Some alternatives may be defined for f and g, such as:













f
lin



(
t
)


=

t
-

V

t
,
k




,






f

t

h

r




(
t
)


=

1


{


t
-

V

t
,
k




ζ

}






,

and









g

s

q


(


X

t
,
k


,

)

=


(


X

t
,
k


-

)

2


,



g

t

h

r


(


X

t
,
k


,

)

=

1


{




"\[LeftBracketingBar]"



X

t
,
k


-



"\[RightBracketingBar]"



c

}



,




where ζ and c are predefined thresholds. The f and g with 1{.} function may be used to design systems where small mismatches are tolerated, while the ones with linear and square functions may be used to penalize any mismatch.


In some implementations, an AoII minimization problem may be formulated to jointly optimize receiver scheduling, power allocation and precoding for an RSMA-based semantic-aware system design, and an iterative algorithm may be defined to solve the formulated problem, as described further herein.



FIG. 2 is a diagram of an example 200 associated with precoding and scheduling while minimizing AoII for multiple access systems. As shown in FIG. 2, example 200 includes a transmitter 102 and a receiver 104.


As shown by reference number 202, the transmitter 102 may determine that a difference between a total AoII obtained in a current iteration of an iterative algorithm and a total AoII in a previous iteration of the iterative algorithm satisfies a tolerance factor for algorithm convergence. The tolerance factor for algorithm convergence may be predefined at the transmitter 102. The transmitter 102 may be able to determine total AoII at different iterations, and the transmitter 102 may be able to determine when the difference in total AoII between consecutive iterations satisfies the tolerance factor for algorithm convergence.


As shown by reference number 204, the transmitter 102 may use, based on the difference satisfying the tolerance factor for algorithm convergence, the iterative algorithm to solve a convex optimization problem based on a plurality of iterations that continue until an objective function associated with AoII converges to within the tolerance factor for algorithm convergence. The convex optimization problem may be derived from a non-convex problem formulated to jointly obtain user scheduling, precoding, resource allocation, and power allocation schemes. The AoII may be a metric in the objective function of the convex optimization problem to maximize a freshness of overall information to be transmitted, and the freshness of overall information is maximized by minimizing the AoII. The transmitter 102 may update an iteration number between iterations when using the iterative algorithm to solve the convex optimization problem.


In some implementations, the transmitter 102 may solve the convex optimization problem using interior-point techniques to obtain the precoder matrix, the vector of scheduling indicators, a vector of auxiliary variables for a private stream SINR lower bound, a vector of auxiliary variables for a private stream SINR upper bound, a vector of auxiliary variables for a common stream SINR lower bound, a vector of auxiliary variables for a private stream IN upper bound, and a vector of auxiliary variables for a common stream IN upper bound.


In some implementations, at iteration n, the transmitter 102 may use variables obtained in the previous iteration in related constraints to solve the convex optimization problem using interior-point techniques, and the variables may be associated with a precoder matrix at iteration n, a vector of scheduling indicators at iteration n, a vector of auxiliary variables for a private stream SINR bound at iteration n, and a vector of auxiliary variables for a common stream IN upper bound at iteration n.


As shown by reference number 206, the transmitter 102 may determine a precoder matrix and a vector of scheduling indicators from a solving of the convex optimization problem. In other words, by solving the convex optimization problem, the transmitter 102 may obtain the precoder matrix and the vector of scheduling indicators. The transmitter 102 may derive the precoder matrix and the vector of scheduling indicators by iteratively solving the convex optimization problem, where iterations the continue until the objective function converges within the tolerance factor for algorithm convergence.


As shown by reference number 208, the transmitter 102 may transmit, using a downlink multi-user communication framework based on RSMA in a semantic-aware network, one or more updates to one or more receivers 104 (e.g., UEs) based on the precoder matrix and the vector of scheduling indicators. The RSMA may be associated with lower AoII as compared to SDMA, thereby improving an overall network performance.


In some implementations, as part of a problem formulation and solution, a sample may be assumed to be taken at t for each receiver 104, and g(Xt,k, custom-character)≠0, ∀k∈custom-character. The transmitter 102 may aim to schedule the receivers 104 for transmission at t to minimize the AoII at time t+1. A slow process may be assumed for Xt,k, so that g(Xt+1,k, custom-character)=0 when a transmission decision is given and the transmission decision is successful. Otherwise, the transmission decision may not affect the freshness of the update and even the successfully transmitted packets may become obsolete by the time the packets are received.


In some implementations, Ik may be defined as the rate required to successfully transmit the update Xt,k in an interval between t and t+1 to achieve g(Xt+1,k, custom-character)=0. Since a time window of interest may be a single time duration (between t and t+1), the subscript t may be dropped in It,k for ease of notation (similar as in the achievable rate expressions). An update may be successfully transmitted when the achievable rate at t for receiver-k is larger than a required rate, e.g., ck+Rk≥Ik. Since Xt,k is assumed to be a slow process, a successful transmission of the update for receiver-k may result in ΔAoII,k(Xt,k, custom-character, t)=0 (since g(Xt+1,k, custom-character)=0). Accordingly, AoII at t+1 may be expressed as:











Δ

AoII
,
k


(


X


t
+
1

,
k


,
,

t
+
1


)

=

{






(

t
+
1
-

V


t
+
1

,
k



)


g


(


X


t
+
1

,
k


,

)


,







if



c
k


+

R
k




I
k


,






0
,



otherwise








(
5
)







In some implementations, defining custom-character={k∈custom-character:ck+Rk≥Ik} as a set of scheduled receivers 104 and P=[pc, p1, . . . , pK], the following optimization problem may be formulated to obtain the optimal scheduling, precoder, and power allocation scheme.










min

c
,
P











k

𝒦






Δ

AoII
,
k


(


X


t
+
1

,
k


,


X
^



t
+
1

,
k


,

t
+
1


)





(

6

a

)
















s
.
t
.
















k



𝒦





c

k







R

c
,
l


(
P
)


,







l




,









(

6

b

)













c

0

,




(

6

c

)













tr

(

PP
H

)




P
total

.





(

6

d

)







In some implementations, the objective and constraint (6b) may be conditional in the formulated problem. A big-M technique may be used to convert the problem into a conventional form. The scheduling indicator vector z=[z1, z2, . . . , zK] with binary variables zk∈{0,1} may be defined to denote the case where receiver-k is not scheduled at time t, e.g., zk=1 when k∉custom-character and zk=0 otherwise. Then, (6) may be converted into the following problem.










min

c
,
P
,
z







k

𝒦





(

t
+
1
-

V


t
+
1

,
k



)



g

(


X


t
+
1

,
k


,


X
^



t
+
1

,
k



)



z
k







(

7

a

)















s
.
t
.








I
k

-

c
k

-

R
k




Mz
k



,







k

𝒦


,







(

7

b

)


















c
k

+

R
k

-

I
k




M

(

1
-

z
k


)


,







k

𝒦


,







(

7

c

)


























k



𝒦





c

k








R

c
,
k


(
P
)

+

Mz
k



,







k

𝒦


,







(

7

d

)




















z
k



{

0
,
1

}


,







k

𝒦


,










(

6

c

)

,



(

6

d

)

.








(

7

e

)







In some implementations, the constraints (7b)-(7e) may be non-convex, which makes the problem a non-convex optimization problem. The constraint (7e) may be converted to a convex constraint by relaxing a binary requirement. The constraints (7b)-(7d) may be converted to convex constraints by applying SCA. Accordingly, the variables αk, βk, ωk, σp,k, σc,k and vectors α=[α1, . . . , αK], β=[β1, . . . , βK], ω=[ω1, . . . , ωK], σp=[σp,1, . . . , σp,K], σc=[σ1, . . . , σc,K] may be introduced to write:










min


c
,
P
,
z
,



α
,
β
,
ω
,



σ
p

,

σ
k










k

𝒦





(

t
+
1
-

V


t
+
1

,
k



)



g

(


X


t
+
1

,
k


,


X
^



t
+
1

,
k



)



z
k







(

8

a

)















s
.
t
.








I
k

-

c
k

-


log



(

1
+

α
k


)



log



(
2
)






Mz
k



,







k

𝒦


,







(

8

b

)


















c
k

+


log



(

1
+

β
k


)



log



(
2
)



-

I
k




M

(

1
-

z
k


)



,







k

𝒦


,







(

8

c

)


























k



𝒦





c

k







log



(

1
+

ω
k


)



log



(
2
)





Mz
k



,






k

𝒦








(

8

d

)





















"\[LeftBracketingBar]"



h
k
H



p
k




"\[RightBracketingBar]"


2


σ

p
,
k





α
k


,










"\[LeftBracketingBar]"



h
k
H



p
k




"\[RightBracketingBar]"


2


σ

p
,
k





β
k


,










"\[LeftBracketingBar]"



h
k
H



p
c




"\[RightBracketingBar]"


2


σ

c
,
k





ω
k


,







(

8

e

)

















σ

p
,
k




1
+






i

𝒦

,


i

k








"\[LeftBracketingBar]"



h
k
H



p
i




"\[RightBracketingBar]"


2




,







k

𝒦


,







(

8

f

)

















σ

c
,
k




1
+




i

𝒦







"\[LeftBracketingBar]"



h
k
H



p
i




"\[RightBracketingBar]"


2




,







k

𝒦


,







(

8

g

)
















0


z
k


1

,







k

𝒦


,







(

8

h

)




















k

𝒦



z
k


=
0

,







(

6

c

)

,



(

6

d

)

.








(

8

i

)







In some implementations, the constraint (8i) may be added for easy convergence after a binary constraint is relaxed. First-order Taylor approximation may be applied to relax the constraints (8c), (8e), (8i) and obtain the following convex problem.










min


c
,
P
,
z
,



α
,
β
,
ω
,



σ
p

,

σ
c










k

𝒦





(

t
+
1
-

V


t
+
1

,
k



)



g

(


X


t
+
1

,
k


,


X
^



t
+
1

,
k



)



z
k







(

9

a

)















s
.
t
.


c
k


-


log



(

1
+

β
k

[

n
-
1

]



)



log



(
2
)



+


(


β
k

-

β
k

[

n
-
1

]



)



(

1
+

β
k

[

n
-
1

]



)


log



(
2
)



-



I
k




M

(

1
-

z
k


)



,




k

𝒦


,




(

9

b

)
















2




{



(

p
k

[

n
-
1

]


)

H



h
k



h
k
H



p
k


}



σ

p
,
k


[

n
-
1

]



-






"\[LeftBracketingBar]"



h
k
H



p
k

[

n
-
1

]





"\[RightBracketingBar]"


2



(

σ

p
,
k


[

n
-
1

]


)

2




σ

p
,
k






α
k


,




(

9

c

)
















2




{



(

p
k

[

n
-
1

]


)

H



h
k



h
k
H



p
k


}



σ

p
,
k


[

n
-
1

]



-






"\[LeftBracketingBar]"



h
k
H



p
k

[

n
-
1

]





"\[RightBracketingBar]"


2



(

σ

p
,
k


[

n
-
1

]


)

2




σ

p
,
k






β
k


,




(

9

d

)
















2




{



(

p
c

[

n
-
1

]


)

H



h
k



h
k
H



p
c


}



σ

c
,
k


[

n
-
1

]



-






"\[LeftBracketingBar]"



h
k
H



p
c

[

n
-
1

]





"\[RightBracketingBar]"


2



(

σ

c
,
k


[

n
-
1

]


)

2




σ

c
,
k






ω
k


,




(

9

e

)





















k

𝒦



z
k

[

n
-
1

]



+




k

𝒦




(


z
k

-

z
k

[

n
-
1

]



)







l

𝒦

,

l

k




z
l

[

n
-
1

]






=
0

,







(

8

b

)

,


(

8

d

)

,

(

8

f

)

,

(

8

g

)

,

(

8

h

)

,

(

6

c

)

,


(

6

d

)

.








(

9

f

)







In some implementations, parameters with superscript [n−1] may represent variables to which the Taylor approximation is applied. The iterative algorithm may be defined to obtain the precoder matrix and receiver scheduling (or user scheduling). At iteration n, optimal variables obtained in a previous iteration, e.g., P[n−1], z[n−1], β[n−1], σp[n−1], σc[n−1] may be used in the related constraints to solve the convex problem using interior-point techniques. An interior-point technique (or interior-point method) may be an algorithm for solving convex optimization problems. The iterations may continue until the objective function converges within a tolerance of ϵ.


In some implementations, the iterative algorithm (Algorithm 1) may be defined in accordance with the following:












Algorithm 1: Proposed Algorithm

















n ← 1, P[0], z[0], β[0], σc[0], σP[0], ΣΔAoII,k[0]



while |ΣΔAoII,k[n] − ΣΔAoII,k[n−1]| ≤ ϵ do










 |
Solve (9) using interior-point methods to obtain



 |
 ΣΔAoII,k*, P*, z*, α*, β*, ω*, σc*, σp*;



 |
ΣΔAoII,k[n] ← ΔAoII,k*, P[n] ← P*, z[n] ← z*,



 |
 β[n] ← β*, σc[n] ← σc*, σp[n] ← σp*;



 |
n ← n + 1,









end



return P ← P[n], z ← z[n]










In some implementations, the definitions of the parameters updated at each iteration of the iterative algorithm are defined as follows. The parameter P[n] may indicate a precoder matrix at iteration n. The parameter z[n] may indicate a vector of scheduling indicators at iteration n. The parameter β[n] may indicate a vector of auxiliary variables for private stream SINR upper bound at iteration n. The parameter σp[n] may indicate a vector of auxiliary variables for private stream interference-plus-noise (IN) upper bound at iteration n. The parameter σc[n] may indicate a vector of auxiliary variables for common stream IN upper bound at iteration n. The parameter P* may indicate a precoder matrix obtained by solving the problem (9) using interior-point techniques. The parameter z* may indicate a vector of scheduling indicators obtained by solving the problem (9) using interior-point techniques. The parameter α* may indicate a vector of auxiliary variables for private stream SINR lower bound obtained by solving the problem (9) using interior-point techniques. The parameter β* may indicate a vector of auxiliary variables for private stream SINR upper bound obtained by solving the problem (9) using interior-point techniques. The parameter ω* may indicate a vector of auxiliary variables for common stream SINR lower bound obtained by solving the problem (9) using interior-point techniques. The parameter σp* may indicate a vector of auxiliary variables for private stream IN upper bound obtained by solving the problem (9) using interior-point techniques. The parameter σc* may indicate a vector of auxiliary variables for common stream IN upper bound obtained by solving the problem (9) using interior-point techniques. The parameter e may indicate a tolerance factor for algorithm convergence.


In some implementations, an algorithm output z may contain the relaxed receiver scheduling indicators. Therefore, any type of algorithm may be used to obtain binary z variables, if required. A possible algorithm to obtain such variables is given as follows.










z
k


=

{




1
,





if



z
k


=



1


or




c
k

(
P
)


+


R
k

(
P
)





I
k

.








0
,




otherwise
.









(
10
)







The rates in (10) may be calculated using the precoders obtained from the iterative algorithm.


In some implementations, when using the iterative algorithm, the transmitter 102 may initialize a precoder matrix (P[0]), a vector of scheduling indicators (z[0]), a vector of auxiliary variables for a private stream SINR upper bound (β[0]), a vector of auxiliary variables for a private stream IN upper bound (σp[0]), and a vector of auxiliary variables for a common stream IN upper bound (σc[0]).


In some implementations, during the usage of the iterative algorithm, while the difference between the total AoII in the current iteration and the total AoII in the previous iteration is above the tolerance factor for algorithm convergence, the transmitter 102 may solve the problem formulation in (9) using interior point techniques to obtain a total AoII (ΣΔAoII), the precoder matrix (P*), the vector of scheduling indicators (z*), the vector of auxiliary variables for the private stream SINR lower bound (α*), the vector of auxiliary variables for the private stream SINR upper bound (β*), the vector of auxiliary variables for the common stream SINR lower bound (α*), the vector of auxiliary variables for the private stream IN upper bound (σp*), and the vector of auxiliary variables for common stream IN upper bound (σc*). Further, the transmitter 102 may solve the problem formulation in (9) using a precoder matrix at the previous iteration (P[n−1]), the vector of scheduling indicators at the previous iteration (z[n−1]), the vector of auxiliary variables for private stream SINR upper bound at the previous iteration (β[n−1]), the vector of auxiliary variables for private stream IN upper bound at the previous iteration (σp[n−1]), and the vector of auxiliary variables for common stream IN upper bound at the previous iteration (σc[n−1]). In some implementations, the transmitter 102 may update such values and update an iteration number. The transmitter 102 may continue the iterations until the objective function converges within the tolerance of ϵ, at which point the precoder matrix and the vector of scheduling indicators may be returned. The transmitter 102 may use the iterative algorithm to obtain the precoder matrix and the receiver scheduling. A convergence of the iterative algorithm may be guaranteed since the solution of (9) at iteration n is also a feasible solution at iteration n+1. Therefore, the objective function is monotonically decreasing and is bounded below by zero.


In some implementations, a performance of the iterative algorithm may be analyzed and compared with that of SDMA. SDMA may be a special case of RSMA when no power is allocated to a common stream sc and Wk is encoded into sk. RSMA may schedule both receivers 104 for larger I values than SDMA, especially in scenarios where the receivers 104 are spatially close. In such scenarios, canceling the multi-receiver interference becomes challenging, which affects the SINR of the interference-free streams, and thus limits the achievable rates. This results in SDMA failing to satisfy the rate requirements of one of the receivers 104 when I is increased above certain levels. RSMA may achieve such performance by splitting the required rate between common and private streams and increasing the achievable rate of each receiver 104 using the common stream when using the private streams only is not enough to satisfy the rate requirements.


In some implementations, the performance of RSMA for downlink multi-receiver communications in semantic-aware networks may be evaluated. The optimization problem may be formulated to design the optimal receiver scheduling, precoding, and power allocation schemes jointly. The sum AoII may be considered as the objective function to minimize. Further, big-M and SCA may be applied to the formulated problem, and the iterative algorithm may be used to solve the formulated problem. RSMA may achieve a lower AoII than SDMA owing to its superior performance under multi-receiver interference even under perfect CSIT.


As indicated above, FIG. 2 is provided as an example. Other examples may differ from what is described with regard to FIG. 2. The number and arrangement of devices shown in FIG. 2 are provided as an example. In practice, there may be additional devices, fewer devices, different devices, or differently arranged devices than those shown in FIG. 2. Furthermore, two or more devices shown in FIG. 2 may be implemented within a single device, or a single device shown in FIG. 2 may be implemented as multiple, distributed devices. Additionally, or alternatively, a set of devices (e.g., one or more devices) shown in FIG. 2 may perform one or more functions described as being performed by another set of devices shown in FIG. 2.



FIG. 3 is a diagram of an example environment 300 in which systems and/or methods described herein may be implemented. As shown in FIG. 3, environment 300 may include a transmitter 102, a receiver 104, and a network 302. Devices of environment 300 may interconnect via wired connections, wireless connections, or a combination of wired and wireless connections.


The transmitter 102 may include one or more devices capable of receiving, processing, storing, routing, and/or providing information associated with precoding and scheduling while minimizing AoII for multiple access systems, as described elsewhere herein. The transmitter 102 may be an aggregated network node, meaning that the aggregated network node is configured to utilize a radio protocol stack that is physically or logically integrated within a single radio access network (RAN) node (e.g., within a single device or unit). The transmitter 102 may be a disaggregated network node (sometimes referred to as a disaggregated base station), meaning that the transmitter 102 is configured to utilize a protocol stack that is physically or logically distributed among two or more nodes (such as one or more central units (CUs), one or more distributed units (DUs), or one or more radio units (RUs)). The transmitter 102 may include, for example, a New Radio (NR) base station, a Long Term Evolution (LTE) base station, a Node B, an eNB (e.g., in Fourth Generation (4G)), a gNB (e.g., in Fifth Generation (5G)), an access point, a transmission reception point (TRP), a DU, an RU, a CU, a mobility element of a network, a core network node, a network element, a network equipment, and/or a RAN node.


The receiver 104 may include one or more devices capable of receiving, generating, storing, processing, and/or providing information associated with precoding and scheduling while minimizing AoII for multiple access systems, as described elsewhere herein. The receiver 104 may be a UE, which may include a communication device and/or a computing device. For example, the receiver 104 may include a wireless communication device, a mobile phone, a user equipment, a laptop computer, a tablet computer, a desktop computer, a gaming console, a set-top box, a wearable communication device (e.g., a smart wristwatch, a pair of smart eyeglasses, a head mounted display, or a virtual reality headset), or a similar type of device.


The network 302 may include one or more wired and/or wireless networks. For example, the network 302 may include a cellular network (e.g., a 5G network, a 4G network, an LTE network, a Third Generation (3G) network, a code division multiple access (CDMA) network, etc.), a public land mobile network (PLMN), a local area network (LAN), a wide area network (WAN), a metropolitan area network (MAN), a telephone network (e.g., the Public Switched Telephone Network (PSTN)), a private network, an ad hoc network, an intranet, the Internet, a fiber optic-based network, and/or a combination of these or other types of networks. The network 302 may enable communication among the one or more devices of environment 300.


The number and arrangement of devices and networks shown in FIG. 3 are provided as an example. In practice, there may be additional devices and/or networks, fewer devices and/or networks, different devices and/or networks, or differently arranged devices and/or networks than those shown in FIG. 3. Furthermore, two or more devices shown in FIG. 3 may be implemented within a single device, or a single device shown in FIG. 3 may be implemented as multiple, distributed devices. Additionally, or alternatively, a set of devices (e.g., one or more devices) of environment 300 may perform one or more functions described as being performed by another set of devices of environment 300.



FIG. 4 is a diagram of example components of a device 400 associated with precoding and scheduling while minimizing AoII for multiple access systems. The device 400 may correspond to a transmitter (e.g., transmitter 102). In some implementations, the transmitter may include one or more devices 400 and/or one or more components of the device 400. As shown in FIG. 4, the device 400 may include a bus 410, a processor 420, a memory 430, an input component 440, an output component 450, and/or a communication component 460.


The bus 410 may include one or more components that enable wired and/or wireless communication among the components of the device 400. The bus 410 may couple together two or more components of FIG. 4, such as via operative coupling, communicative coupling, electronic coupling, and/or electric coupling. For example, the bus 410 may include an electrical connection (e.g., a wire, a trace, and/or a lead) and/or a wireless bus. The processor 420 may include a central processing unit, a graphics processing unit, a microprocessor, a controller, a microcontroller, a digital signal processor, a field-programmable gate array, an application-specific integrated circuit, and/or another type of processing component. The processor 420 may be implemented in hardware, firmware, or a combination of hardware and software. In some implementations, the processor 420 may include one or more processors capable of being programmed to perform one or more operations or processes described elsewhere herein.


The memory 430 may include volatile and/or nonvolatile memory. For example, the memory 430 may include random access memory (RAM), read only memory (ROM), a hard disk drive, and/or another type of memory (e.g., a flash memory, a magnetic memory, and/or an optical memory). The memory 430 may include internal memory (e.g., RAM, ROM, or a hard disk drive) and/or removable memory (e.g., removable via a universal serial bus connection). The memory 430 may be a non-transitory computer-readable medium. The memory 430 may store information, one or more instructions, and/or software (e.g., one or more software applications) related to the operation of the device 400. In some implementations, the memory 430 may include one or more memories that are coupled (e.g., communicatively coupled) to one or more processors (e.g., processor 420), such as via the bus 410. Communicative coupling between a processor 420 and a memory 430 may enable the processor 420 to read and/or process information stored in the memory 430 and/or to store information in the memory 430.


The input component 440 may enable the device 400 to receive input, such as user input and/or sensed input. For example, the input component 440 may include a touch screen, a keyboard, a keypad, a mouse, a button, a microphone, a switch, a sensor, a global positioning system sensor, a global navigation satellite system sensor, an accelerometer, a gyroscope, and/or an actuator. The output component 450 may enable the device 400 to provide output, such as via a display, a speaker, and/or a light-emitting diode. The communication component 460 may enable the device 400 to communicate with other devices via a wired connection and/or a wireless connection. For example, the communication component 460 may include a receiver, a transmitter, a transceiver, a modem, a network interface card, and/or an antenna.


The device 400 may perform one or more operations or processes described herein. For example, a non-transitory computer-readable medium (e.g., memory 430) may store a set of instructions (e.g., one or more instructions or code) for execution by the processor 420. The processor 420 may execute the set of instructions to perform one or more operations or processes described herein. In some implementations, execution of the set of instructions, by one or more processors 420, causes the one or more processors 420 and/or the device 400 to perform one or more operations or processes described herein. In some implementations, hardwired circuitry may be used instead of or in combination with the instructions to perform one or more operations or processes described herein. Additionally, or alternatively, the processor 420 may be configured to perform one or more operations or processes described herein. Thus, implementations described herein are not limited to any specific combination of hardware circuitry and software.


The number and arrangement of components shown in FIG. 4 are provided as an example. The device 400 may include additional components, fewer components, different components, or differently arranged components than those shown in FIG. 4. Additionally, or alternatively, a set of components (e.g., one or more components) of the device 400 may perform one or more functions described as being performed by another set of components of the device 400.



FIG. 5 is a flowchart of an example process 500 associated with precoding and scheduling while minimizing AoII for multiple access systems. In some implementations, one or more process blocks of FIG. 5 may be performed by a transmitter (e.g., transmitter 102). Additionally, or alternatively, one or more process blocks of FIG. 5 may be performed by one or more components of device 400, such as processor 420, memory 430, input component 440, output component 450, and/or communication component 460.


As shown in FIG. 5, process 500 may include determining, by the transmitter, that a difference between a total AoII obtained in a current iteration of an iterative algorithm and a total AoII in a previous iteration of the iterative algorithm satisfies a tolerance factor for algorithm convergence (block 510).


As shown in FIG. 5, process 500 may include using, by the transmitter and based on the difference satisfying the tolerance factor for algorithm convergence, the iterative algorithm to solve a convex optimization problem based on a plurality of iterations that continue until an objective function associated with AoII converges to within the tolerance factor for algorithm convergence (block 520). The convex optimization problem may be derived from a non-convex problem formulated to jointly obtain user scheduling, precoding, resource allocation, and power allocation schemes. The AoII may be a metric in the objective function of the convex optimization problem to maximize a freshness of overall information to be transmitted, and the freshness of overall information is maximized by minimizing the AoII. The transmitter may update an iteration number between iterations when using the iterative algorithm to solve the convex optimization problem.


In some implementations, the transmitter may solve the convex optimization problem using interior-point techniques to obtain the precoder matrix, the vector of scheduling indicators, a vector of auxiliary variables for a private stream SINR lower bound, a vector of auxiliary variables for a private stream SINR upper bound, a vector of auxiliary variables for a common stream SINR lower bound, a vector of auxiliary variables for a private stream IN upper bound, and a vector of auxiliary variables for a common stream IN upper bound.


In some implementations, at iteration n, variables obtained in the previous iteration may be used in related constraints to solve the convex optimization problem using interior-point techniques, and the variables may be associated with a precoder matrix at iteration n, a vector of scheduling indicators at iteration n, a vector of auxiliary variables for a private stream SINR bound at iteration n, and a vector of auxiliary variables for a common stream IN upper bound at iteration n.


As shown in FIG. 5, process 500 may include determining, by the transmitter, a precoder matrix and a vector of scheduling indicators from a solving of the convex optimization problem (block 530). In other words, by solving the convex optimization problem, the transmitter may obtain the precoder matrix and the vector of scheduling indicators.


As shown in FIG. 5, process 500 may include transmitting, by the transmitter and using a downlink multi-user communication framework based on RSMA in a semantic-aware network, one or more updates to one or more receivers based on the precoder matrix and the vector of scheduling indicators (block 540). The RSMA may be associated with lower AoII as compared to space division multiple access (SDMA), thereby improving an overall network performance.


Although FIG. 5 shows example blocks of process 500, in some implementations, process 500 may include additional blocks, fewer blocks, different blocks, or differently arranged blocks than those depicted in FIG. 5. Additionally, or alternatively, two or more of the blocks of process 500 may be performed in parallel.


The foregoing disclosure provides illustration and description, but is not intended to be exhaustive or to limit the implementations to the precise forms disclosed. Modifications and variations may be made in light of the above disclosure or may be acquired from practice of the implementations.


As used herein, the term “component” is intended to be broadly construed as hardware, firmware, or a combination of hardware and software. It will be apparent that systems and/or methods described herein may be implemented in different forms of hardware, firmware, and/or a combination of hardware and software. The actual specialized control hardware or software code used to implement these systems and/or methods is not limiting of the implementations. Thus, the operation and behavior of the systems and/or methods are described herein without reference to specific software code—it being understood that software and hardware can be used to implement the systems and/or methods based on the description herein.


As used herein, satisfying a threshold may, depending on the context, refer to a value being greater than the threshold, greater than or equal to the threshold, less than the threshold, less than or equal to the threshold, equal to the threshold, not equal to the threshold, or the like.


Even though particular combinations of features are recited in the claims and/or disclosed in the specification, these combinations are not intended to limit the disclosure of various implementations. In fact, many of these features may be combined in ways not specifically recited in the claims and/or disclosed in the specification. Although each dependent claim listed below may directly depend on only one claim, the disclosure of various implementations includes each dependent claim in combination with every other claim in the claim set. As used herein, a phrase referring to “at least one of” a list of items refers to any combination of those items, including single members. As an example, “at least one of: a, b, or c” is intended to cover a, b, c, a-b, a-c, b-c, and a-b-c, as well as any combination with multiple of the same item.


When “a processor” or “one or more processors” (or another device or component, such as “a controller” or “one or more controllers”) is described or claimed (within a single claim or across multiple claims) as performing multiple operations or being configured to perform multiple operations, this language is intended to broadly cover a variety of processor architectures and environments. For example, unless explicitly claimed otherwise (e.g., via the use of “first processor” and “second processor” or other language that differentiates processors in the claims), this language is intended to cover a single processor performing or being configured to perform all of the operations, a group of processors collectively performing or being configured to perform all of the operations, a first processor performing or being configured to perform a first operation and a second processor performing or being configured to perform a second operation, or any combination of processors performing or being configured to perform the operations. For example, when a claim has the form “one or more processors configured to: perform X; perform Y; and perform Z,” that claim should be interpreted to mean “one or more processors configured to perform X; one or more (possibly different) processors configured to perform Y; and one or more (also possibly different) processors configured to perform Z.”


No element, act, or instruction used herein should be construed as critical or essential unless explicitly described as such. Also, as used herein, the articles “a” and “an” are intended to include one or more items, and may be used interchangeably with “one or more.” Further, as used herein, the article “the” is intended to include one or more items referenced in connection with the article “the” and may be used interchangeably with “the one or more.” Furthermore, as used herein, the term “set” is intended to include one or more items (e.g., related items, unrelated items, or a combination of related and unrelated items), and may be used interchangeably with “one or more.” Where only one item is intended, the phrase “only one” or similar language is used. Also, as used herein, the terms “has,” “have,” “having,” or the like are intended to be open-ended terms. Further, the phrase “based on” is intended to mean “based, at least in part, on” unless explicitly stated otherwise. Also, as used herein, the term “or” is intended to be inclusive when used in a series and may be used interchangeably with “and/or,” unless explicitly stated otherwise (e.g., if used in combination with “either” or “only one of”).

Claims
  • 1. A method, comprising: determining, by a transmitter, that a difference between a total age of incorrect information (AoII) obtained in a current iteration of an iterative algorithm and a total AoII in a previous iteration of the iterative algorithm satisfies a tolerance factor for algorithm convergence;using, by the transmitter and based on the difference satisfying the tolerance factor for algorithm convergence, the iterative algorithm to solve a convex optimization problem based on a plurality of iterations that continue until an objective function associated with AoII converges to within the tolerance factor for algorithm convergence;determining, by the transmitter, a precoder matrix and a vector of scheduling indicators from a solving of the convex optimization problem; andtransmitting, by the transmitter and using a downlink multi-user communication framework based on rate-splitting multiple access (RSMA) in a semantic-aware network, one or more updates to one or more receivers based on the precoder matrix and the vector of scheduling indicators.
  • 2. The method of claim 1, wherein the convex optimization problem is derived from a non-convex problem formulated to jointly obtain user scheduling, precoding, resource allocation, and power allocation schemes.
  • 3. The method of claim 1, wherein the AoII is a metric in the objective function of the convex optimization problem to maximize a freshness of overall information to be transmitted, and the freshness of overall information is maximized by minimizing the AoII.
  • 4. The method of claim 1, further comprising solving the convex optimization problem using interior-point techniques to obtain: the precoder matrix,the vector of scheduling indicators,a vector of auxiliary variables for a private stream signal-to-interference-plus-noise ratio (SINR) lower bound,a vector of auxiliary variables for a private stream SINR upper bound,a vector of auxiliary variables for a common stream SINR lower bound,a vector of auxiliary variables for a private stream interference-plus-noise (IN) upper bound, anda vector of auxiliary variables for a common stream IN upper bound.
  • 5. The method of claim 1, wherein at iteration n, where n is an integer, variables obtained in the previous iteration are used in related constraints to solve the convex optimization problem using interior-point techniques, and the variables are associated with a precoder matrix at iteration n, a vector of scheduling indicators at iteration n, a vector of auxiliary variables for a private stream signal-to-interference-plus-noise ratio (SINR) bound at iteration n, and a vector of auxiliary variables for a common stream interference-plus-noise (IN) upper bound at iteration n.
  • 6. The method of claim 1, wherein the RSMA is associated with lower AoII as compared to space division multiple access (SDMA).
  • 7. The method of claim 1, further comprising: updating an iteration number between iterations when using the iterative algorithm to solve the convex optimization problem.
  • 8. A transmitter, comprising: one or more memories; andone or more processors, communicatively coupled to the one or more memories, configured to: determine that a difference between a total age of incorrect information (AoII) obtained in a current iteration of an iterative algorithm and a total AoII in a previous iteration of the iterative algorithm satisfies a tolerance factor for algorithm convergence;use, based on the difference satisfying the tolerance factor for algorithm convergence, the iterative algorithm to solve a convex optimization problem based on a plurality of iterations that continue until an objective function associated with AoII converges to within the tolerance factor for algorithm convergence;determine a precoder matrix and a vector of scheduling indicators from a solving of the convex optimization problem; andtransmit, using a downlink multi-user communication framework based on rate-splitting multiple access (RSMA) in a semantic-aware network, one or more updates to one or more receivers based on the precoder matrix and the vector of scheduling indicators.
  • 9. The transmitter of claim 8, wherein the convex optimization problem is derived from a non-convex problem formulated to jointly obtain user scheduling, precoding, resource allocation, and power allocation schemes.
  • 10. The transmitter of claim 8, wherein the AoII is a metric in the objective function of the convex optimization problem to maximize a freshness of overall information to be transmitted, and the freshness of overall information is maximized by minimizing the AoII.
  • 11. The transmitter of claim 8, wherein the one or more processors are further configured to solve the convex optimization problem using interior-point techniques to obtain: the precoder matrix,the vector of scheduling indicators,a vector of auxiliary variables for a private stream signal-to-interference-plus-noise ratio (SINR) lower bound,a vector of auxiliary variables for a private stream SINR upper bound,a vector of auxiliary variables for a common stream SINR lower bound,a vector of auxiliary variables for a private stream interference-plus-noise (IN) upper bound, anda vector of auxiliary variables for a common stream IN upper bound.
  • 12. The transmitter of claim 8, wherein at iteration n, where n is an integer, variables obtained in the previous iteration are used in related constraints to solve the convex optimization problem using interior-point techniques, and the variables are associated with a precoder matrix at iteration n, a vector of scheduling indicators at iteration n, a vector of auxiliary variables for a private stream signal-to-interference-plus-noise ratio (SINR) bound at iteration n, and a vector of auxiliary variables for a common stream interference-plus-noise (IN) upper bound at iteration n.
  • 13. The transmitter of claim 8, wherein the RSMA is associated with lower AoII as compared to space division multiple access (SDMA).
  • 14. The transmitter of claim 8, wherein the one or more processors are further configured to: update an iteration number between iterations when using the iterative algorithm to solve the convex optimization problem.
  • 15. A non-transitory computer-readable medium storing a set of instructions, the set of instructions comprising: one or more instructions that, when executed by one or more processors of a transmitter, cause the transmitter to: determine that a difference between a total age of incorrect information (AoII) obtained in a current iteration of an iterative algorithm and a total AoII in a previous iteration of the iterative algorithm satisfies a tolerance factor for algorithm convergence;use, based on the difference satisfying the tolerance factor for algorithm convergence, the iterative algorithm to solve a convex optimization problem based on a plurality of iterations that continue until an objective function associated with AoII converges to within the tolerance factor for algorithm convergence;determine a precoder matrix and a vector of scheduling indicators from a solving of the convex optimization problem; andtransmit, using a downlink multi-user communication framework based on rate-splitting multiple access (RSMA) in a semantic-aware network, one or more updates to one or more receivers based on the precoder matrix and the vector of scheduling indicators.
  • 16. The non-transitory computer-readable medium of claim 15, wherein the convex optimization problem is derived from a non-convex problem formulated to jointly obtain user scheduling, precoding, resource allocation, and power allocation schemes.
  • 17. The non-transitory computer-readable medium of claim 15, wherein the AoII is a metric in the objective function of the convex optimization problem to maximize a freshness of overall information to be transmitted, and the freshness of overall information is maximized by minimizing the AoII.
  • 18. The non-transitory computer-readable medium of claim 15, wherein the one or more instructions, when executed by the one or more processors, further cause the transmitter to solve the convex optimization problem using interior-point techniques to obtain: the precoder matrix,the vector of scheduling indicators,a vector of auxiliary variables for a private stream signal-to-interference-plus-noise ratio (SINR) lower bound,a vector of auxiliary variables for a private stream SINR upper bound,a vector of auxiliary variables for a common stream SINR lower bound,a vector of auxiliary variables for a private stream interference-plus-noise (IN) upper bound, anda vector of auxiliary variables for a common stream IN upper bound.
  • 19. The non-transitory computer-readable medium of claim 15, wherein at iteration n, where n is an integer, variables obtained in the previous iteration are used in related constraints to solve the convex optimization problem using interior-point techniques, and the variables are associated with a precoder matrix at iteration n, a vector of scheduling indicators at iteration n, a vector of auxiliary variables for a private stream signal-to-interference-plus-noise ratio (SINR) bound at iteration n, and a vector of auxiliary variables for a common stream interference-plus-noise (IN) upper bound at iteration n.
  • 20. The non-transitory computer-readable medium of claim 15, wherein the RSMA is associated with lower AoII as compared to space division multiple access (SDMA).