Skip to main content

Power allocation for maximizing the MAC capacity via majorization

Abstract

Optimal power allocation for maximizing the sum capacity of multiple access channel (MAC) with quality-of-service (QoS) constraints is investigated in this paper. Majorization theory is the underlying mathematical theory on which our method hinges. It is shown that the optimal structure of the solution can be easily obtained via majorization theory. Furthermore, based on our new approach, an efficient searching method for power allocation is developed by restricting the attention to a new searching variable. Our new method requires less than half of the computational cost of the existing method in the worst case and is even much faster in general. Simulation results demonstrate the effectiveness of our method.

1 Introduction

In order to interface to broadband networks of the future, wireless system will be required to support real-time and non-real-time multi-rate services [1, 2]. For the real-time services having little tolerance for delay, such as voice and low-rate video, rate adaptation is not desirable, while for the non-real-time services, such as data communication (paging, electronic mail, etc.), rate adaptation is allowed since they are tolerant to latencies though sensitive to transmission errors. It is well known that the radio spectrum can be utilized more efficiently if the delay-tolerant traffic users are managed with an optimal resource allocation policy [36].

In this paper, we are more interested in the optimal power allocation policy that maximizes sum capacity of non-real-time users in multiple access channel (MAC). It has captured considerable attention during the past years. Maximizing the reverse link (uplink) sum capacity of non-real-time users has been studied in [2]. However, the maximum sum capacity is usually achieved via unfair resource allocation that ignores the throughput from users with poor channel conditions. To avoid this situation, additional quality-of-service (QoS) requirements are introduced to practical systems. A method to obtain the maximal reverse link sum capacity, under some QoS constraints, is proposed in [3, 4]. It is shown that the optimal solution can be obtained by a numerical search over a finite number of one-dimensional search spaces. In order to reduce the computational cost, an improved method is developed to eliminate the numerical search [5]. With the introduction of some specific hyperplanes, it is shown that the candidate solutions can be determined in a closed form so that the search space is reduced into a finite set of points. However, the main theorem in [5] is explained by graphical visualization only, instead of strict mathematical proof. Consequently, some important relationships are not revealed properly.

Inspired by the treatment proposed in [6], we try to refine the results in [35] via majorization theory, where the proof procedure can be adapted to a great number of design criteria, as long as their objective functions are Schur-concave or Schur-convex [79]. It turns out from our new derivation that the size of the search space in the original method can be further reduced if we change the search variable and rearrange the constraints. Compared to the existing method, less than half of the computational cost is required in the worst case.

2 Preliminaries

In this section, we introduce the basic notations and a lemma of majorization, which will be used in Section 4. For a detailed description of majorization, the readers are referred to [8] and [9].

Definition 1

For any vector x= [ x 1 , x 2 , , x n ] T R n , let x[1]x[2]x[n] denote its components in a non-increasing order, and let

x = x [ 1 ] , x [ 2 ] , , x [ n ] T

denote the decreasing rearrangement of x.

Definition 2.

For any two vectors x,y R n , we say x is majorized by y if

i = 1 k x [ i ] i = 1 k y [ i ] , 1 k n 1 , i = 1 n x [ i ] = i = 1 n y [ i ] .

and we represent it by xy.

Definition 3.

A real-valued function ϕ defined on a set A R n is said to be Schur-convex on if

x y on A ϕ ( x ) ϕ ( y ) .

Similarly, ϕ is said to be Schur-concave on if

x y on A ϕ ( x ) ϕ ( y ) .

Lemma 1.

f(x)= i x i is Schur-concave on the set of {x|i,x i ≥0}.

Proof.

Assume x 1 , x 2 R n with x1x2. According to B.1. Lemma in [8], x1 can be derived from x2 by successive applications of a finite number of T transforms, e.g.,

x 1 = T 1 T 2 T m x 2
(1)

where m is a positive integer and T i s, i=1,2,…,m, are the T-transform matrices. Each T-transform matrix has the form of λ I+(1−λ)Q, where 0≤λ≤1 and Q is a permutation matrix that just interchanges two coordinates. Obviously, if f(T x)≥f(x) holds for any T-transform matrix T, we will achieve the desired result f(x1)≥f(x2). The reason is given as follows:

f ( x 2 ) f ( T m x 2 ) f ( T m 1 T m x 2 ) f ( T 1 T 2 T m x 2 ) = f ( x 1 ) .
(2)

What remains is to prove f(T x)≥f(x). Without loss of generality, assume that the permutation matrix interchanges the j th and k th coordinates. Then, we have

[ Tx ] i = x i i j , k λ x j + ( 1 λ ) x k , i = j λ x k + ( 1 λ ) x j , i = k
(3)

where [ ·] i stands for the i th element of a vector. With (3), we obtain:

f ( Tx ) = i j , k x i · λ x j + ( 1 λ ) x k λ x k + ( 1 λ ) x j = i j , k x i λ ( 1 λ ) x j x j 2 + x j x k = i j , k x i λ ( 1 λ ) x j x j 2 + i x i f ( x ) .

3 Problem formulation

Consider a MAC wireless network supporting M data mobile stations (MS), whose link gains are g1,g2,,g M . Without loss of generality, assume g1g2g M ≥0. Defining p i as the i th MS’s transmit power, the signal-to-interference-plus-noise ratio (SINR) for the i th MS at the base station is given by

SINR i = p i g i I + j = 1 , j i M p j g j ,i=1,2,,M
(4)

where I is the power of the background noise and interferences from other traffic-type users. Note that the BS is assumed to independently decode different users, i.e., it is not using a successive cancelation scheme at the receiver. From Shannon formula, the sum capacity of data users in MAC becomes:

C= log 2 I + j = 1 M p j g j M i = 1 M I + j = 1 , j i M p j g j
(5)

Our goal is to derive an optimal power allocation that maximizes the sum capacity of the data users. There are generally three constraints that must be satisfied. First, the transmission power at node i must not exceed a certain maximum power pmax, which is set by the hardware. Second, the SINR of link i must be above a certain minimum SINR γ, which is determined by QoS requirements. The third constraint is that the summation of interferences generated from M data users is limited by i = 1 M p i g i P R max . This constraint is due to the fact that the total received power from the data users is an interference to other classes of users, like the voice users in the same cell [35]. Note that the way to obtain P R max is described in [10]. Thus, the classical QoS-constrained optimization problem is formulated as

max p log 2 I + j = 1 M p j g j M i = 1 M I + j = 1 , j i M p j g j , subject to : i , 0 p i p max i , p i g i I + j = 1 , j i M p j g j γ Σ i = 1 M p i g i P R max
(6)

where p p 1 , p 2 , , p M T .

4 Maximizing the sum capacity with QoS constraints

In this section, we first try to review the optimal structure of the power allocation via majorization theory. Then, we present a fast algorithm by restricting the attention to a new searching variable, and we show that our new method requires less than half of the computational cost of the existing method in the worst case and is even much faster in general.

4.1 Review of the optimal structure of the power allocation via majorization theory

Let x i p i g i /I and T j = 1 M x j , problem (6) can be equivalently rewritten as

min x , T i = 1 M 1 + T x i 1 + T , subject to : i , φ ( 1 + T ) x i l i i = 1 M x i = T , 0 T X max
(7)

where x x 1 , x 2 , , x M T , l i g i p max /I, φγ/(γ+1), X max P R max /I. Note that in deriving (7), the logarithm part is dropped because of its monotonicity. This optimization problem is rather difficult to solve directly, due to its non-convexity. However, if the value of T is fixed, it is possible to solve the optimization problem via majorization theory in a specific hyperplane described by a linear equation j = 1 M x j =T. After that, we are able to find the optimal solution by performing a one-dimensional search on T. Defining y i 1 + T x i 1 + T , the corresponding problem becomes

min y i = 1 M y i = min y f ( y ) , subject to : i , max 1 + T l i 1 + T , 0 y i 1 φ i = 1 M y i = M T 1 + T , 0 T X max
(8)

where y y 1 , y 2 , , y M T and f:y i = 1 M y i . Since i = 1 M y i is a constant for fixed T, according to Schur-concavity of f(y) (see Lemma 1), it is easy to see that

y yf( y )f(y)
(9)

where y [ y 1 , y 2 , , y M ] T and i = 1 M y i =M T 1 + T . Therefore, solving the optimization problem (8) for fixed T is equivalent to finding the optimal vector y such that yy for any feasible y. The corresponding y can be explicitly determined as follows.

Theorem 1.

For any fixed T, the optimal y among the constraints of problem (8) must be structured as

y = l ~ 1 , , l ~ k 1 k 1 , y k , 1 φ , , 1 φ M k T
(10)

where l ~ i 1 + T l i 1 + T , the value of k is determined by the following inequality

i = k + 1 M (w l ~ i )<M T 1 + T i = 1 M l ~ i i = k M (w l ~ i )
(11)

and y k is given by

y k = l ~ k + M T 1 + T i = 1 M l ~ i i = k + 1 M (w l ~ i ).
(12)

Proof.

In order to simplify the presentation, we rewrite the constraints in (8) as

i , q i y i w , Q i = 1 M y i = M T 1 + T

where q i max l ~ i , 0 and w1φ. It is easy to see that q i qi+1 and Q i = 1 M q i , due to their definitions. To obtain the optimal vector y, we employ an induction argument (similarly as in [6]).

  1. 1.

    If Q= i = 1 M q i , i, y i = q i must be satisfied.

  2. 2.

    Increasing Q with a small value (0<Δwq M ), i.e., Q= i = 1 M q i +Δ, the vector y must be structured as

    y i = q i , i = 1 , 2 , , M 1 , y M = q M + Δ.

The proof of this result is trivial, and is omitted for brevity.

  1. 3.

    Further increase Q (w q M <Δ i = M 1 M (w q i )), then the vector y will be

    y i = q i , i = 1 , 2 , , M 2 , y M 1 = q M 1 + Δ ( w q M ) , y M = w.
  2. 4.

    If i = M 1 M (w q i )<Δ i = M 2 M (w q i ), we have

    y i = q i , i = 1 , 2 , , M 3 , y M 2 = q M 2 + Δ i = M 1 M ( w q i ) , y M 1 = y M = w.
  3. 5.

    Generally, if i = k + 1 M (w q i )<Δ i = k M (w q i ), the most majority y is

    y i = q i , i = 1 , 2 , , k 1 , y k = q k + Δ i = k + 1 M ( w q i ) , y k + 1 = = y M = w.

Now, it is clear that the optimal y is related to the value of Q, and is structured as

y = q 1 , , q k 1 k 1 , y k , w , , w M k T ,
(13)

where the value of k is determined by the following inequality

i = k + 1 M (w q i )<M T 1 + T i = 1 M q i i = k M (w q i )
(14)

and y k is given by

y k = q k + M T 1 + T i = 1 M q i i = k + 1 M (w q i ).
(15)

Recall that q i =max l ~ i , 0 and l ~ i l ~ i + 1 . There always exists a value of n (0≤nk−1) such that

q i = 0 , i n q i = l ~ i , i > n
(16)

Consequently, the optimal solution may be rewritten as

y = 0 , , 0 n , l ~ n + 1 , , l ~ k 1 k n 1 , y k , w , , w M k T .
(17)

On the other hand, it should be noted that y i = 1 + T x i 1 + T > 1 1 + T >0, which implies n must be 0. Thus, we achieve desired results in Theorem 1. Additionally, we know that for the case of l ~ i <0 or, equivalently, l i >T+1, if there exists any feasible solution it must be [w,w,,w]T

Drawn from above discussions, the following theorem can be obtained.

Theorem 2.

If there is any solution to problem (7), it is structured as

x = l 1 , , l k 1 k 1 , x k , φ ( 1 + T ) , , φ ( 1 + T ) M k T
(18)

where T= i = 1 M [ x ] i , k is determined by (11), and x k equals

x k = ( 1 + T ) ( 1 y k ) = ( 1 + T ) ( 1 ( M k ) φ ) i = 1 k 1 l i 1 .
(19)

4.2 Our improved method

Although the solution structure (18) has been addressed in [5], the relationship among k, x k , and T is not well revealed due to the limitation of the proof procedure therein. According to the results in [5], a triplet (k,x k ,T) can be determined by any two of its elements, for example k and x k . Our new derivation shows that (k,x k ,T) in fact can be simply determined by a single element T, while k and x k can be obtained by (11) and (19) given T. Therefore, the candidate solution of (18) can be evaluated over different values of T instead of (k,x k ). As will be shown later, this plays an important role in reducing the computational complexity of our improved method.

A numerical search for different values of k is used in [3] to find the optimal x k , and the search is reduced to a finite number of one-dimensional spaces. The search is further reduced in [5] from a set of one-dimensional spaces to a finite set of points by employing the following lemma.

Lemma 2.

In the optimal solution to problem (7), x k must accept one of the marginal values given in

x k min l k , ( X max + 1 ) 1 ( M k ) φ L 1 , l M 1 ( M k ) φ φ L 1 x k φ ( L + 1 ) 1 ( M k + 1 ) φ
(20)

where L i = 1 k 1 l i (see Theorem 3 and Theorem 4 in [5]).

Applying Lemma 2, it is clear that the process of finding all the possible power allocations requires checking k, 1≤kM, while trying two marginal values given in (20). Therefore, almost 2M candidate points need to be searched in the algorithm proposed in [5]. However, we note that if the constraints in Lemma 2 are rearranged, a more efficient method can be derived. The key observations for the development of our improved method are:

  1. 1.

    x k is a monotonic increasing function of T and vice versa (see (19)).

  2. 2.

    If the optimal x k accepts one of the marginal values given in (20), x k must be one of the values among l k , ( X max + 1 ) 1 ( M k ) φ L 1 , l M 1 ( M k ) φ φ L 1 , φ ( L + 1 ) 1 ( M k + 1 ) φ .

  3. 3.

    Given T, the values of k and x k are uniquely determined and vice versa (the relationship among k, x k , and T is given in Theorem 2). Therefore, searching candidate values of T instead of k and x k does not result in any loss of optimality

Keeping these observations in mind, we now proceed to derive our efficient method based on the following theorem.

Theorem 3.

In the optimal solution to problem (7), T must accept one of the candidate values given by

T k T k < X max , l M φ 1 , k = 0 , 1 , , M min X max , l M φ 1
(21)

where T k i = 1 k l i + ( M k ) φ 1 ( M k ) φ and T k <Tk+1.

Proof.

Relying on Observation 2 and 3, it is clear that proving the above theorem is equivalent to specifying the values of T corresponding to the candidate values of k and x k , where x k l k , ( X max + 1 ) 1 ( M k ) φ L 1 , l M 1 ( M k ) φ φ L 1 , φ ( L + 1 ) 1 ( M k + 1 ) φ and 1≤kM. To gain some insight, we now discuss the possible values of x k , respectively.

  1. 1.

    For the case of x k =l k , based on (19), the corresponding T is given by

    T = L + x k + ( M k ) φ 1 ( M k ) φ = i = 1 k l i + ( M k ) φ 1 ( M k ) φ T k
    (22)

where 1≤kM. Thus, the candidate values of T in this case are given by

T 1 = T k k = 1 , , M .
(23)
  1. 2.

    For the case of x k =(X max+1)[1−(Mk)φ]−L−1, using the expression for x k in (19), we obtain

    ( X max + 1 ) 1 ( M k ) φ L 1 = ( 1 + T ) ( 1 ( M k ) φ ) L 1
    (24)

or, equivalently, T=Xmax. Hence, in this case, the candidate set of T is

T 2 = X max .
(25)
  1. 3.

    For the case of x k = l M 1 ( M k ) φ φ L1, similarly, we get

    l M =φ(1+T).
    (26)

Consequently, the candidate set is given as

T 3 = l M φ 1 .
(27)
  1. 4.

    For the case of x k = φ ( L + 1 ) 1 ( M k + 1 ) φ , we have

    T = L + x k + ( M k ) φ 1 ( M k ) φ = i = 1 k 1 l i + ( M ( k 1 ) ) φ 1 ( M k + 1 ) φ
    (28)

where 1≤kM. Therefore, the candidate set of T is

T 4 = T k k = 0 , , M 1 .
(29)

Putting all the possible T together and using the fact that any feasible T satisfies T<Xmax and T< l M φ 1, we are able to derive the whole candidate set of T as

T = T 1 T 2 T 3 T 4 T min X max , l M φ 1 = T k T k < min X max , l M φ 1 , k = 0 , 1 , , M min X max , l M φ 1 .
(30)

For any T k and Tk+1, the solutions are structured as

x k = l 1 , , l k 1 k 1 , l k , φ ( 1 + T k ) , , φ ( 1 + T k ) M k T ,
(31)
x k + 1 = l 1 , , l k k , l k + 1 , φ ( 1 + T k + 1 ) , , φ ( 1 + T k + 1 ) M k 1 T .
(32)

Further, we note that x k can be written as

x k = l 1 , , l k k , φ ( 1 + T k ) , φ ( 1 + T k ) , , φ ( 1 + T k ) M k 1 T
(33)

In this form, it is easy to see that the structures of (32) and (33) are equivalent and φ(1+T k )≤lk+1 (which follows from the first constraint of (7)). So, according to Observation 1 and

φ(1+ T k )= x k k + 1 < x k + 1 k + 1 = l k + 1 ,
(34)

we achieve the desired result that T k <Tk+1. It should be noted that since T k <Tk+1, there always exists a unique j such that

T j min X max , l M φ 1 T j + 1

which means the structure of solution for the case of T=min X max , l M φ 1 has been determined by the value of j.

Obviously, the candidate set of T contains less than M+2 points that need to be searched to find the optimal solution. Based on these conclusions, our improved algorithm is outlined as follows. Compared with the original 2M search points, less than half of the computational calculations are required by our method in the worst casea.

  1. 1.

    Initialization: X max=P R max/I, φ= γ 1 + γ , l i =p max g i /I.

  2. 2.

    For all 0≤kM, do the following:

(a) Compute T k as

T k = Σ i = 1 k l i + ( M k ) φ 1 ( M k ) φ .

(b) If T k min X max , l M φ 1 , compute ϕ k as

ϕ k = ( 1 φ ) ( M k ) ( 1 + T k ) k i = 1 k ( 1 + T k l i ) .

(c) If T k >min X max , l M φ 1 , compute ϕ k as

ϕ k = 1 + min X max , l M φ 1 ( M k ) φ + i = 1 k 1 l i + 1 ( 1 φ ) ( M k ) 1 + min X max , l M φ 1 k · i = 1 k 1 1 + min X max , l M φ 1 l i

and go to step 3, else continue (go to step 2a).

  1. 3.

    Find the smallest ϕ k , denoted as ϕ , and retrieve the corresponding x.

  2. 4.

    Output the p i and C:

    p i = Ix i / g i , C = log 2 ϕ .

Discussions:

  • If the value of min X max , l M φ 1 is small, according to our method, very few points need to be searched. In particular, if T 0 min X max , l M φ 1 T 1 , just a point T=min X max , l M φ 1 needs to be searched. However, if min X max , l M φ 1 < T 0 , there is no feasible solution.

  • If the value of min X max , l M φ 1 is large, e.g., min X max , l M φ 1 T M , it is clear that the third constraint in (6) does not affect the final solution and can be removed from the optimization problem.

5 Simulation result

The simulation results in this section illustrate the performance of our method. The computer codes are developed in MATLAB 7.8.0 and are run on a PC with an Intel Core2 2.66GHz CPU and 4GB of RAM. We will compare the proposed method to the original methods in [5] (the original method 1 considers the same optimization problem as our method, while the original method 2 considers a new optimization problem which includes an additional capacity upper bound for each MS) and the max-min method in [6].

To justify whether the sum capacity achieved by the proposed method is consistent with the original method 1, in simulation 1, we first consider the same scenario used in [5], where γ =−50 dB, I=−113 dBm, P R max =106 dBm and pmax=23 dBm (η dBm1 0 η 10 ×1 0 3 ). M data MSs are randomly dropped with a uniform distribution over a hexagonal cell. Assume that there is a sample where M=10, and the values of g i are 10−12× [0.52, 0.018, 0.016, 0.0091, 0.0082, 0.0081, 0.0075, 0.0059, 0.0059, 0.0045] [5]. Table 1 shows the optimal solutions for our method and the original method 1, including the power allocation p i and capacity C i , i=1,2,,M. The results illustrate that two methods achieve the same results.

Table 1 Comparison of optimal solutions between our method and the original method 1

To testify the performance of an algorithm, we should prove that the algorithm can work for a wide variety of scenarios, which mainly depend on the number of MSs, their locations, and the services they want to use. In simulation 2, we run some Monte Carlo simulations to show the sum capacity achieved by our proposed method. We work on a practical scenario from 3GPP2 [11], where the configurations used in this simulation are summarized in Table 2. M MSs are randomly dropped with a uniform distribution over a hexagonal cell, and the base station is located at the center of the cell. A set of M dropped users is said to be valid if the minimum QoS requirements are achievable. When the set is invalid, the entire users are re-dropped. Each path gain, g i , takes into account distance loss and log-normal shadowing. However, fast fading and power control aspects are not considered in the simulation because the optimization problem does not consider the time-varying condition. The rise-over-thermal (ROT) limiting the total received power at the base station is defined as P R max + σ th 2 / σ th 2 , where σ th 2 is the thermal noise variance at the base station. Figures 1 and 2 show the sum capacity achieved by transmission strategies versus the number of MSs with ROT being 7 and 10 dB, respectively. All the results are obtained by averaging the sum capacity over 10,000 channel realizations, and the optimal power allocations are optimized for each channel realization. As can be seen from the figures, the sum capacity curves for our method and the original method 1 coincide, which again illustrates that our method always achieves the same solution as the original method 1. These two methods always outperform the original method 2, as well as the max-min method, in terms of the sum capacity. The reasons are (1) the feasible region of the new optimization problem, which includes an additional capacity upper bound for each MS (C i <0.3), is less than the feasible region of (6) and (2) the max-min method is designed to maximize the minimum rate rather than the sum capacity. Moreover, we observe some similar results about inconsistent reduction of the system capacity as in [3, 4]. Without a QoS requirement, the sum capacity increases as M increases because of the multi-user diversity. In contrary, if there is a QoS requirement (e.g., −21 dB or −18 dB), the sum capacity decreases by increasing M. The reason is that the statistics of the poor channel gets worse as M increases. Hence, meeting the QoS of the poor channel users will drag the system capacity. Note that QoS requirements of −21 dB and −18 dB are related to the typical SINR level for 9.6 Kbps traffic channel throughput maintenance and reverse pilot channel maintenance, respectively [4, 12].

Table 2 Configurations for simulation 2
Figure 1
figure 1

Sum capacity for different QoS constraints with ROT being 7 dB.

Figure 2
figure 2

Sum capacity for different QoS constraints with ROT being 10 dB.

Simulation 3 illustrates capacity shares for the major user, where the same scenario is considered as in simulation 2. Figures 3 and 4 show the capacity share of the major user achieved by transmission strategies versus the QoS requirement γ with ROT being 7 and 10 dB, respectively. All the results are obtained by averaging maxi C i /C over 10,000 channel realizations, and the optimal power allocations are optimized for each channel realization. From the figures, we observe that: (1) the optimization problem (6) produces an unfair solution that is dominantly dependent on the major user, if the QoS requirement γ is low, (2) the new optimization problem that includes an additional capacity upper bound for each MS (C i <0.3) will improve the fairness, (3) the max-min method achieves the most fair solution because it is designed for this purpose, and (4) the gap of capacity shares among our method, the original method 2 and the max-min method trend to close in higher QoS requirement regime.

Figure 3
figure 3

Capacity share of the major user with ROT being 7 dB.

Figure 4
figure 4

Capacity share of the major user with ROT being 10 dB.

In simulation 4, we run another Monte Carlo simulation to evaluate the exact computational cost of our proposed method. Consider the same scenario in simulation 2, except that the QoS requirement is set to −21 dB and the number of MSs changes from 10 to 200. Figure 5 gives the running time of our method and the method in [5] versus the number of MSs with ROT being 10 dB. All the results are obtained by summing the running time over 10,000 channel realizations, and the optimal power allocations are optimized for each channel realization. The simulation results demonstrate that our proposed method has a much lower computational complexity than the state-of-art method under comparison.

Figure 5
figure 5

Comparison of the running time between our method and the original method 1.

6 Conclusions

Optimal power allocation for maximizing the MAC capacity of non-real-time users with QoS constraints has been investigated in this paper. Based on majorization theory, we show that the optimal structure of the solution can be easily obtained. Additionally, by rearranging the constraints in Lemma 2 and restricting the attention to searching candidate values of T instead of k and x k , a more efficient method is derived. Compared with the original method, less than half of the computational cost is required by our method in the worst case. Simulation results demonstrate the effectiveness of our method. For future work, it will be interesting to see if one can extend the method to the case of joint power constraints [13, 14].

Endnote

a The computational cost of the existing method is of O( M 2 ) with 8M2 flops in the worst case [5]. The computational cost of our method is of the same order but with 1.5M2 flops in the worst case. Step 2a and step 2b totally require 0.5M2 and M2 flops, respectively. As Step 2c is executed once, its computational cost is neglectable.

References

  1. Muqattash A, Krunz M, Tao S: Performance enhancement of adaptive orthogonal modulation in wireless CDMA systems. IEEE J. Selec. Areas Commun 2006, 24(3):565-578.

    Article  Google Scholar 

  2. Jafar SA, Goldsmith A: Adaptive multirate CDMA for uplink throughput maximization. IEEE Trans. Wireless Commun 2003, 2(2):218-228. 10.1109/TWC.2003.808958

    Article  Google Scholar 

  3. Oh SJ, Soong ACK: QoS-constrained information-theoretic sum capacity of reverse link CDMA systems. IEEE Trans. Wireless Commun 2006, 5(1):3-7.

    Article  Google Scholar 

  4. Zhang D, Oh SJ, Bhushan N: Optimal resource allocation for data service in CDMA reverse link. IEEE Trans. Wireless Commun 2007, 6(10):3648-3656.

    Article  Google Scholar 

  5. Abadpour A, Alfa AS, Soong ACK: Closed form solution for maximizing the sum capacity of reverse-link CDMA system with rate constraints. IEEE Trans. Wireless Commun 2008, 7(4):1179-1183.

    Article  Google Scholar 

  6. Dai J, Ye Z, Xu X: Power allocation for maximizing the minimum rate with QoS constraints. IEEE Trans. Vehic. Technol 2009, 58(9):4989-4996.

    Article  Google Scholar 

  7. Palomar DP, Cioffi JM, Lagunas MA: Joint Tx-Rx beamforming design for multicarrier MIMO channels: a unified framework for convex optimization. IEEE Trans. Signal Process 2003, 51(9):2381-2401. 10.1109/TSP.2003.815393

    Article  Google Scholar 

  8. Marshall AW, Olkin I: Inequalities: Theory of Majorization and Its Applications. Academic, New York; 1979.

    MATH  Google Scholar 

  9. Palomar DP, Jiang Y: MIMO Transceiver Design via Majorization theory. Foundations and trends in communications and information theory 2006, 3(4–5):331-551.

    Article  MATH  Google Scholar 

  10. Oh SJ: Resource allocation in wireless networks. Ph. D. dissertation,. Univ. of Michigan 2000.

    Google Scholar 

  11. Working Group 5 Evaluation Ad-Hoc Group, 1xEV-DV evaluation methodology - Addendum (V6) Third Generation Partnership Project 2 (3GPP2), Contribution C50-20010820-026 2001.

  12. Chakravarty S, Pankaj R, Esteves E: An algorithm for reverse traffic channel rate control for CDMA2000 high rate packet data systems. Proc. IEEE Globecom 2001, 3733-3737.

    Google Scholar 

  13. Dai J, Chang C, Xu X, Ye Z: Linear precoder optimization for MIMO systems with joint power constraints. IEEE Trans. Commun 2012, 60(8):2240-2254.

    Article  Google Scholar 

  14. Dai J, Bao X: Homotopy algorithm for energy-efficient MIMO systems with joint power constraints. IEEE Wireless Commun. Lett 2014, 3(2):121-124.

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China (61102054), the Open Research Fund of National Mobile Communications Research Laboratory, Southeast University (No. 2013D08), the Jiangsu Planned Projects for Postdoctoral Research Funds (No. 1302004A), the Project funded by China Postdoctoral Science Foundation, and the Project Foundation for Priority Academic Program Development (PAPD) of Jiangsu Higher Education Institutions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunqi Chang.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dai, J., Chang, C. Power allocation for maximizing the MAC capacity via majorization. EURASIP J. Adv. Signal Process. 2014, 113 (2014). https://doi.org/10.1186/1687-6180-2014-113

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-6180-2014-113

Keywords