USER SCHEDULING AND CODEBOOK ALLOCATION METHOD FOR MAXIMIZING SUM FREQUENCY EFFICIENCY IN NON-ORTHOGONAL MULTIPLE ACCESS SYSTEM

20230106785 Β· 2023-04-06

    Inventors

    Cpc classification

    International classification

    Abstract

    The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data rates beyond a 4.sup.th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services..

    Claims

    1. A method performed by a base station in a wireless communication system, the method comprising: receiving, from a plurality of terminals, channel state information; calculating a sum frequency efficiency of a non-orthogonal multiple access (NOMA) system based on the received channel state information; selecting a terminal based on the calculated sum frequency efficiency; allocating a codebook to the selected terminal; and transmitting, to the terminal, an index of the allocated codebook, wherein the sum frequency efficiency is calculated based on mutual information.

    2. The method of claim 1, wherein the mutual information is ℐ ⁑ ( x _ ; y _ .Math. H ) = .Math. x _ i ∈ 𝒳 1 .Math. "\[LeftBracketingBar]" 𝒳 .Math. "\[RightBracketingBar]" ⁒ ∫ y _ f ⁑ ( y _ .Math. x _ = x _ i , H _ ) ⁒ log 2 ⁒ f ⁑ ( y _ .Math. x _ = x _ i , H _ ) f ⁑ ( y _ .Math. H _ ) ⁒ d ⁒ y _

    3. The method of claim 1, wherein: the terminal transmits a signal of a Gaussian distribution; a capacity upper bound is configured for the mutual information; and the capacity upper bound is ℐ ⁑ ( x _ ; y _ .Math. H _ ) ≀ .Math. n = 1 N log ( 1 + .Math. k = 1 K tot h k [ n ] 2 ⁒ f k , n ⁒ p k , n N 0 ) .

    4. The method of claim 1, wherein: allocating a codebook using a greedy scheduling algorithm; and the mutual information is ℐ ^ ( x _ ; y _ .Math. H _ ) = 2 ⁒ log 2 ⁒ M K - log 2 ⁒ .Math. x _ i ∈ 𝒳 _ .Math. x _ j ∈ 𝒳 _ exp ( - .Math. H _ ( x _ i - x _ j ) .Math. "\[RightBracketingBar]" 2 2 ⁒ N 0 )

    5. A method performed by a terminal in a wireless communication system, the method comprising: transmitting, to a base station, channel state information; and transmitting, to the base station, an index of an allocated codebook, wherein a sum frequency efficiency of a non-orthogonal multiple access (NOMA) system is calculated by the base station based on the transmitted channel state information, wherein the terminal is selected based on the calculated sum frequency efficiency, wherein the codebook is allocated to the selected terminal, and wherein the sum frequency efficiency is calculated based on mutual information.

    6. The method of claim 5, wherein the mutual information is ℐ ⁑ ( x _ ; y _ .Math. H ) = .Math. x _ i ∈ 𝒳 1 .Math. "\[LeftBracketingBar]" 𝒳 .Math. "\[RightBracketingBar]" ⁒ ∫ y _ f ⁑ ( y _ .Math. x _ = x _ i , H _ ) ⁒ log 2 ⁒ f ⁑ ( y _ .Math. x _ = x _ i , H _ ) f ⁑ ( y _ .Math. H _ ) ⁒ d ⁒ y _

    7. The method of claim 5, wherein: the terminal transmits a signal of a Gaussian distribution; a capacity upper bound is configured for the mutual information; and the capacity upper bound is ℐ ⁑ ( x _ ; y _ .Math. H _ ) ≀ .Math. n = 1 N log ( 1 + .Math. k = 1 K tot h k [ n ] 2 ⁒ f k , n ⁒ p k , n N 0 )

    8. The method of claim 5, wherein: wherein the codebook is allocated to the selected terminal using a greedy scheduling algorithm; and the mutual information is ℐ ^ ( x _ ; y _ .Math. H _ ) = 2 ⁒ log 2 ⁒ M K - log 2 ⁒ .Math. x _ i ∈ 𝒳 _ .Math. x _ j ∈ 𝒳 _ exp ⁒ ( - .Math. H _ ( x _ i - x _ j ) .Math. "\[RightBracketingBar]" 2 2 ⁒ N 0 ) .

    9. A base station comprising: a transceiver capable of transmitting and receiving at least one signal; and a controller coupled to the transceiver, wherein the controller is configured to: receive, from a plurality of terminals, channel state information; calculate a sum frequency efficiency of a non-orthogonal multiple access (NOMA) system based on the received channel state information; select a terminal based on the calculated sum frequency efficiency; allocate a codebook to the selected terminal; and transmit, to the terminal, an index of the allocated codebook, wherein the sum frequency efficiency is calculated based on mutual information.

    10. The base station of claim 9, wherein the mutual information is ℐ ⁑ ( x _ ; y _ .Math. H ) = .Math. x _ i ∈ 𝒳 1 .Math. "\[LeftBracketingBar]" 𝒳 .Math. "\[RightBracketingBar]" ⁒ ∫ y _ f ⁑ ( y _ .Math. x _ = x _ i , H _ ) ⁒ log 2 ⁒ f ⁑ ( y _ .Math. x _ = x _ i , H _ ) f ⁑ ( y _ .Math. H _ ) ⁒ d ⁒ y _

    11. The base station of claim 9, wherein: the terminal transmits a signal of a Gaussian distribution; a capacity upper bound is configured for the mutual information; and the capacity upper bound is ℐ ⁑ ( x _ ; y _ .Math. H _ ) ≀ .Math. n = 1 N log ( 1 + .Math. k = 1 K tot h k [ n ] 2 ⁒ f k , n ⁒ p k , n N 0 ) .

    12. The base station of claim 9, wherein: codebook allocation using a greedy scheduling algorithm; and the mutual information is ℐ ^ ( x _ ; y _ .Math. H _ ) = 2 ⁒ log 2 ⁒ M K - log 2 ⁒ .Math. x _ i ∈ 𝒳 _ .Math. x _ j ∈ 𝒳 _ exp ( - .Math. H _ ( x _ i - x _ j ) .Math. "\[RightBracketingBar]" 2 2 ⁒ N 0 ) .

    13. A terminal comprising: a transceiver capable of transmitting and receiving at least one signal; and a controller coupled to the transceiver, wherein the controller is configured to: transmit, to a base station, channel state information; and transmit, to the base station, an index of an allocated codebook, wherein a sum frequency efficiency of a non-orthogonal multiple access (NOMA) system is calculated by the base station based on the transmitted channel state information, wherein the terminal is selected based on the calculated sum frequency efficiency, wherein the codebook is allocated to the selected terminal, and wherein the sum frequency efficiency is calculated based on mutual information.

    14. The terminal of claim 13, wherein the mutual information is ℐ ⁑ ( x _ ; y _ .Math. H ) = .Math. x _ i ∈ 𝒳 1 .Math. "\[LeftBracketingBar]" 𝒳 .Math. "\[RightBracketingBar]" ⁒ ∫ y _ f ⁑ ( y _ .Math. x _ = x _ i , H _ ) ⁒ log 2 ⁒ f ⁑ ( y _ .Math. x _ = x _ i , H _ ) f ⁑ ( y _ .Math. H _ ) ⁒ d ⁒ y _ .

    15. The terminal of claim 13, wherein: the terminal transmits a signal of a Gaussian distribution; a capacity upper bound is configured for the mutual information; and the capacity upper bound is ℐ ⁑ ( x _ ; y _ .Math. H _ ) ≀ .Math. n = 1 N log ( 1 + .Math. k = 1 K tot h k [ n ] 2 ⁒ f k , n ⁒ p k , n N 0 ) .

    Description

    BRIEF DESCRIPTION OF THE DRAWINGS

    [0020] FIG. 1 illustrates a configuration of transceivers in a wireless communication system.

    [0021] FIG. 2 illustrates a system model for a non-orthogonal multiple access system.

    [0022] FIG. 3 illustrates a system model for a non-orthogonal multiple access system.

    [0023] FIG. 4 is a diagram comparing the approximated mutual information derived in this embodiment with the actual mutual information value through an experiment.

    [0024] FIG. 5 is a diagram for explaining an example of selecting a combination having a maximum value by calculating sum frequency efficiencies for all combinations when there are six users and six codebooks in the case of an optimal scheduling algorithm.

    [0025] FIG. 6 is a diagram for explaining an example of selecting a combination having a maximum value by calculating sum frequency efficiencies as the number of users gradually increases in the case of a greedy scheduling algorithm.

    [0026] FIG. 7 is a diagram for comparing the coded bit error rates of the related art and this embodiment.

    [0027] FIG. 8 is a diagram showing an embodiment of the disclosure.

    [0028] FIG. 9 is a diagram showing another embodiment of the disclosure.

    [0029] FIG. 10 is a diagram illustrating the structure of a base station according to an embodiment of the disclosure.

    [0030] FIG. 11 is a diagram illustrating the structure of a terminal according to an embodiment of the disclosure.

    DETAILED DESCRIPTION

    [0031] Hereinafter, embodiments of the disclosure will be described in detail with reference to the accompanying drawings. It should be noted that the same components in the drawings are denoted by the same reference numerals as much as possible. In describing the disclosure, when it is determined that a detailed description of a related disclosed technology or constitution may unnecessarily obscure the subject matter of the disclosure, the detailed description thereof will be abbreviated or omitted.

    First Embodiment

    [0032] This embodiment relates to a method of calculating sum frequency efficiency according to a NOMA codebook in a non-orthogonal multiple access system. Specifically, this embodiment relates to a system model and a sum frequency calculation method for a non-orthogonal multiple access system.

    [0033] FIG. 1 illustrates a configuration of transceivers in a wireless communication system.

    [0034] With reference to FIG. 1, the base station performs user scheduling and codebook allocation based on the received channel information, and feeds back scheduling information to each UE. In this case, the UEs that have received a grant signal can perform signal transmission according to uniquely assigned NOMA codebook indexes.

    [0035] FIG. 2 illustrates a system model for a non-orthogonal multiple access system.

    [0036] FIG. 3 illustrates a system model for a non-orthogonal multiple access system.

    [0037] With reference to FIG. 2, it is assumed that a group of some users are selected for transmission; specifically, it is assumed that N orthogonal resources (subcarriers) are shared, and a NOMA system in which K users out of a total of K.sub.tol users in a cell simultaneously accesses the base station is considered. Here, it is assumed that there are l NOMA codebooks that users can use and that cooperation between users is not possible.

    [0038] In a case where 1, 2, . . . , K-th users among k.sub.tol users are scheduled to transmit, without loss of generality, the integrated system model of a non-orthogonal multiple access system can be represented as Equation 1 below.

    [00004] [ y [ 1 ] y [ 2 ] .Math. y [ N ] ] = .Math. k = 1 K [ h k [ 1 ] h k [ 2 ] β‹± h k [ N ] ] [ x k [ 1 ] x k [ 2 ] .Math. x k [ N ] ] + [ n [ 1 ] n [ 2 ] .Math. n [ N ] ] .Math. Equation ⁒ 1 .Math.

    [0039] Here, y[n] is a signal received through the n-th subcarrier, and x.sub.k[n] is a signal transmitted by the k-th user through the n-th subcarrier. In the case of the channel matrix, as an OFDM modulator is used, it can be represented by a diagonal matrix having h.sub.k[1], h.sub.k[2], . . . , h.sub.k[N] as diagonal elements, and h.sub.k[n] is a narrowband channel experienced by the n-th subcarrier of the k-th user. n[i] is a noise signal of the i-th subcarrier, which is a Gaussian noise signal having an average of 0.

    [0040] If Equation 1 above is represented in a matrix form, it can be equivalently represented as Equation 2 below.

    [00005] y _ = [ H 1 H 2 .Math. H K ] [ x 1 x 2 .Math. x K ] + n _ = H _ ⁒ x _ + n _ .Math. Equation ⁒ 2 .Math.

    [0041] In Equation 2, y, H.sub.k, x.sub.k, n are represented respectively as in Equation 3 below.


    y=[y[1]y[2] . . . y[N]].sup.T


    H.sub.k=diag[h.sub.k[1]h.sub.k[2] . . . h.sub.k[N]].sup.T


    x.sub.k=[x.sub.k[1]x.sub.k[2] . . . x.sub.k[N]].sup.T


    n=[n[1]n[2] . . . n[N]].sup.T  Equation 3>

    [0042] Here, it is assumed that signal transmitted by the k-th user is one of the codewords of codebook x.sub.k, and the total number of possible codewords is M. Similarly, x also corresponds to one of the codewords of codebook x.sub.k that combines all the codebooks of the transmitting users.

    [0043] The sum frequency efficiency of the NOMA system can be calculated from the value of mutual information I(x,y|H) for Equation 2, and is given as Equation 4 according to the definition of the mutual information.

    [00006] I ⁑ ( x _ ; y _ .Math. H ) = h ⁑ ( y _ .Math. H _ ) - h ⁑ ( n _ ) = .Math. x _ i ∈ 𝒳 1 .Math. "\[LeftBracketingBar]" 𝒳 .Math. "\[RightBracketingBar]" ⁒ ∫ y _ f ⁑ ( y _ .Math. x _ = x _ i , H _ ) ⁒ log 2 ⁒ f ⁑ ( y _ .Math. x _ = x _ i , H _ ) f ⁑ ( y _ .Math. H _ ) ⁒ d ⁒ y _ .Math. Equation ⁒ 4 .Math.

    [0044] Here, f(y|H) and f(y|x.sub.lH) are given as in Equation 5 when the noise signal follows a Gaussian distribution (mean 0, variance N0).

    [00007] f ⁑ ( y _ .Math. H _ ) = 1 .Math. "\[LeftBracketingBar]" 𝒳 .Math. "\[RightBracketingBar]" ⁒ .Math. x _ i ∈ 𝒳 1 ( Ο€ ⁒ N 0 ) N ⁒ exp ( - .Math. y _ - H _ ⁒ x _ i .Math. 2 N 0 ) ⁒ f ⁑ ( y _ .Math. x i ⁒ H _ ) = 1 ( Ο€ ⁒ N 0 ) N ⁒ exp ( - .Math. y _ - H _ ⁒ x _ i .Math. 2 N 0 ) .Math. Equation ⁒ 5 .Math.

    [0045] By substituting Equation 5 into Equation 4, an accurate mutual information value can be calculated from Equation 6 below.

    [00008] ℐ ⁑ ( x _ ; y _ .Math. H _ ) = log ⁒ .Math. "\[LeftBracketingBar]" 𝒳 .Math. "\[RightBracketingBar]" - 1 .Math. "\[LeftBracketingBar]" 𝒳 .Math. "\[RightBracketingBar]" ⁒ .Math. x _ i ∈ 𝒳 𝔼 v _ [ log 2 ⁒ .Math. x _ j ∈ 𝒳 exp ⁑ ( - .Math. H _ ( x _ i - x _ j ) + n _ .Math. 2 - .Math. n _ .Math. 2 N 0 ) ] .Math. Equation ⁒ 6 .Math.

    [0046] Here, the channel matrix has the following structure.

    [00009] H _ = [ h 1 [ 1 ] .Math. h K [ 1 ] h 1 [ 2 ] .Math. h K [ 2 ] β‹± .Math. β‹± h 1 [ N ] .Math. h K [ N ] ] .Math. Equation ⁒ 7 .Math.

    [0047] The mutual information derived from Equation 6 may provide an optimal metric for calculating the sum frequency efficiency when each user's channel and NOMA codebook are given. However, there is a disadvantage in that a Monte Carlo method must be used to calculate the average value (expectation) for noise, and high computational complexity is required. Therefore, in this embodiment, two metrics are additionally derived to calculate the sum frequency efficiency with low complexity. The first metric is the capacity upper-bound of the NOMA system derived under the assumption that each UE transmits a Gaussian signal, and the second metric is approximated mutual information derived according to specific NOMA codebooks.

    [0048] The upper-bound of the mutual information is derived when the transmission signal x follows a Gaussian distribution (mean 0, variance N0), and is the same as Equation 8 below.

    [00010] ℐ ⁑ ( x _ ; y _ .Math. H ) ≀ log ⁑ ( ( Ο€ ⁒ e ) N ⁒ det ⁑ ( N 0 ⁒ I N + H _ ⁒ K x _ ⁒ H _ H ) ) - N ⁒ log ⁑ ( Ο€ ⁒ eN 0 ) = log ⁒ det ⁑ ( I N + 1 N 0 ⁒ H _ ⁒ K x _ ⁒ H _ H ) .Math. Equation ⁒ 8 .Math.

    [0049] Here, K.sub.x in Equation 8 means the covariance matrix of x. In the case of the NOMA system considered in this embodiment, as there is no cooperation between different users, signals independent of each other are transmitted. Hence, the transmission signals between different users are uncorrelated with each other (E(x.sub.ix.sub.j.sup.H)=0, for i≠j). Using this, the covariance matrix K.sub.x of x is calculated as follows.

    [00011] K x _ = ( E ⁑ ( x 1 ⁒ x 1 H ) .Math. E ⁑ ( x 1 ⁒ x K H ) .Math. β‹± .Math. E ⁑ ( x K ⁒ x 1 H ) .Math. E ⁑ ( x 1 ⁒ x K H ) ) = ( E ⁑ ( x 1 ⁒ x 1 H ) .Math. 0 N .Math. β‹± .Math. 0 N .Math. E ⁑ ( x 1 ⁒ x K H ) ) .Math. Equation ⁒ 9 .Math.

    [0050] If the constellation of NOMA transmission signals is generated to be diagonally symmetric, E(x.sub.ix.sub.j.sup.H) is represented as in Equation 10 below.

    [00012] E ⁑ ( x j ⁒ x j H ) = ( E ⁑ ( x k [ 1 ] 2 ) .Math. E ⁑ ( x k [ 1 ] ⁒ x k [ N ] * ) .Math. β‹± .Math. E ⁑ ( x k [ N ] ⁒ x k [ 1 ] * ) .Math. E ⁑ ( x k [ N ] 2 ) ) = ( E ⁑ ( x k [ 1 ] 2 ) .Math. 0 .Math. β‹± .Math. 0 .Math. E ⁑ ( x k [ N ] 2 ) ) .Math. Equation ⁒ 10 .Math.

    [0051] By substituting Equation 10 into Equation 9, K.sub.x is simplified as follows.


    K.sub.x=diag(E(x.sub.1[1].sup.2) . . . E(x.sub.1[N].sup.2) . . . E(x.sub.K[1].sup.2) . . . E(x.sub.K[N].sup.2))  <Equation 11>

    [0052] As a result, when the result of Equation 10 is substituted into Equation 11, the upper-bound of the mutual information is derived as Equation 12.

    [00013] ℐ ⁑ ( x _ ; y _ .Math. H ) ≀ log ⁒ det ⁑ ( I N + 1 N 0 ⁒ H _ ⁒ K x _ ⁒ H _ H ) = log ⁒ det ⁑ ( 1 + .Math. k = 1 K h k [ 1 ] 2 ⁒ E ⁑ ( x k [ 1 ] 2 ) N 0 .Math. 0 .Math. β‹± .Math. 0 .Math. 1 + .Math. k = 1 K h k [ N ] 2 ⁒ E ⁑ ( x k [ N ] 2 ) N 0 ) = .Math. n = 1 N log ( 1 + .Math. k = 1 K h k [ n ] 2 ⁒ E ⁑ ( x k [ n ] 2 ) N 0 ) ⁒ ℐ ⁑ ( x _ ; y _ .Math. H ) ≀ log ⁒ det ⁑ ( I N + 1 N 0 ⁒ H _ ⁒ K x _ ⁒ H _ H ) = log ⁒ det ⁑ ( 1 + .Math. k = 1 K h k [ 1 ] 2 ⁒ E ⁑ ( x k [ 1 ] 2 ) N 0 .Math. 0 .Math. β‹± .Math. 0 .Math. 1 + .Math. k = 1 K h k [ N ] 2 ⁒ E ⁑ ( x k [ N ] 2 ) N 0 ) = .Math. n = 1 N log ( 1 + .Math. k = 1 K h k [ n ] 2 ⁒ E ⁑ ( x k [ n ] 2 ) N 0 ) .Math. Equation ⁒ 12 .Math.

    [0053] In this embodiment, since it is assumed that the first to K-th users among K.sub.tol users are scheduled, all E(x.sub.k[n].sup.2) values are 1. In general, it is represented as Equation 13 below, where f.sub.k,n is a function indicating whether the k-th user uses the n-th subcarrier and has one of values {0,1}, and P.sub.k,n denotes the power of a symbol transmitted by the k-th user through the n-th subcarrier. In this embodiment, Equation 13 is called the capacity upper-bound.

    [00014] ℐ ⁑ ( x _ ; y _ .Math. H _ ) ≀ .Math. n = 1 N log ( 1 + .Math. k = 1 K tot h k [ n ] 2 ⁒ f k , n ⁒ p k , n N 0 ) .Math. Equation ⁒ 13 .Math.

    [0054] Equation 13 can be approximated in various ways and used. For example, if Taylor's theorem is used, the log(1+x) term can be expressed as

    [00015] .Math. n β‰₯ 0 ( - 1 ) n ⁒ x n + 1 n + 1 ,

    so that Equation 13 can be approximated using only a limited number of terms. In the case of derived Equation 13, since a Gaussian distribution is assumed for a transmission signal, there is a disadvantage that it is composed of a simple function of the channel between the base station and UEs rather than a function for specific NOMA codebooks.

    [0055] One of methods to compensate for the above disadvantage is to calculate the mutual information I(x,y|H) without Gaussian distribution assumption for the transmission signal. However, accurate calculation of the mutual information requires high computational complexity. Hence, the mutual information can be approximated for low complexity, and if Jensen's inequality is used, the lower-bound for the term I(x,y|H) in Equation 4 is given as in Equation 14.


    h(y|H)β‰₯βˆ’log 2custom-charactery[f(y|H)]  <Equation 14>

    [0056] If Equation 14 is calculated using f(y|H) of Equation 5, it is given as Equation 15 by definition.

    [00016] h ⁑ ( y _ .Math. H _ ) β‰₯ - log 2 ⁒ ∫ y _ ( 1 .Math. "\[LeftBracketingBar]" 𝒳 .Math. "\[RightBracketingBar]" ⁒ .Math. x _ i ∈ 𝒳 1 ( Ο€ ⁒ N 0 ) N ⁒ exp ⁑ ( - .Math. y _ - H _ ⁒ x _ i .Math. 2 N 0 ) ) 2 ⁒ d ⁒ y _ .Math. Equation ⁒ 15 .Math.

    [0057] When the order of integration and summation in Equation 15 is changed, the lower bound of I(x,y|H) is given by Equation 16.

    [00017] h ⁑ ( y _ .Math. H _ ) β‰₯ 2 ⁒ log 2 ⁒ .Math. "\[LeftBracketingBar]" 𝒳 .Math. "\[RightBracketingBar]" ⁒ ( Ο€ ⁒ N 0 ) N - log 2 ⁒ .Math. x _ i ∈ 𝒳 .Math. x _ j ∈ 𝒳 ∫ y _ e - .Math. y _ - H _ ⁒ x _ i .Math. 2 N 0 ⁒ e - .Math. y _ - H _ ⁒ x _ j .Math. 2 N 0 ⁒ d ⁒ y _ .Math. Equation ⁒ 16 .Math.

    [0058] If integration is performed on Equation 16, Equation 17 may be obtained.

    [00018] h ⁑ ( y _ .Math. H _ ) β‰₯ 2 ⁒ log 2 ⁒ .Math. "\[LeftBracketingBar]" 𝒳 .Math. "\[RightBracketingBar]" + log 2 ( Ο€ ⁒ N 0 ) N + N ⁒ log 2 ⁒ 2 - log 2 ⁒ .Math. x _ i ∈ 𝒳 .Math. x _ j ∈ 𝒳 exp ( - .Math. H _ ( x _ i - x _ j ) .Math. 2 2 ⁒ N 0 ) .Math. Equation ⁒ 17 .Math.

    [0059] By substituting Equation 17 above into Equation 5, the lower-bound for the mutual information I(x:y|H) can be obtained, and the lower-bound of the mutual information is denoted by custom-character.sup.Low(x:y|H) for convenience.

    [0060] custom-character.sup.Low(x:y|H) can be derived as Equation 18.

    [00019] ℐ Low ( x _ ; y _ .Math. H _ ) = 2 ⁒ log 2 ⁒ .Math. "\[LeftBracketingBar]" 𝒳 .Math. "\[RightBracketingBar]" + N ⁒ log 2 ⁒ 2 e - log 2 ⁒ .Math. x _ i ∈ 𝒳 .Math. x _ j ∈ 𝒳 exp ⁑ ( - .Math. H _ ( x _ i - x _ j ) .Math. 2 2 ⁒ N 0 ) .Math. Equation ⁒ 18 .Math.

    [0061] When the offset caused by the extremely low and high SNR is removed, an approximated expression custom-character(x:y|H) for the mutual information is derived as in Equation 19. In this embodiment, Equation 19 is called approximated mutual information. In the case of Equation 19 as in Equation 13, Equation 19 can be further approximated for usage based on the characteristics of log and exponential functions.

    [00020] ℐ _ ( x _ ; y _ .Math. H _ ) = 2 ⁒ log 2 ⁒ M K - log 2 ⁒ .Math. x _ i ∈ 𝒳 _ .Math. x _ j ∈ 𝒳 _ exp ⁑ ( - .Math. H _ ( x _ i - x _ j ) .Math. 2 2 ⁒ N 0 ) .Math. Equation ⁒ 19 .Math.

    [0062] FIG. 4 is a diagram comparing the approximated mutual information derived in this embodiment with the actual mutual information value through an experiment. The NOMA method used in this experiment is sparse code multiple access (SCMA), the fast Fourier transform (FFT) size is 4096, and the number of subcarriers shared by transmitting users is set to 4. As shown in FIG. 4, it can be seen that the proposed approximated mutual information is very similar to the actual value over the whole SNR range.

    Second Embodiment

    [0063] This embodiment relates to a user scheduling and codebook allocation algorithm for a non-orthogonal multiple access system.

    [0064] In this embodiment, two algorithms for user scheduling and codebook allocation in a non-orthogonal multiple access system are described. Specifically, an optimal scheduling algorithm considering all combinations of users and codebooks and a greedy scheduling algorithm for reducing complexity are included.

    [0065] FIG. 5 is a diagram for explaining an example of selecting a combination having a maximum value by calculating sum frequency efficiencies for all combinations when there are six users and six codebooks in the case of an optimal scheduling algorithm.

    [0066] With reference to FIG. 5, when there are 6 users and 6 codebooks, the optimal scheduling algorithm may calculate sum frequency efficiencies for all combinations and select a combination with a maximum value.

    [0067] FIG. 6 is a diagram for explaining an example of selecting a combination having a maximum value by calculating sum frequency efficiencies as the number of users gradually increases in the case of a greedy scheduling algorithm.

    [0068] With reference to FIG. 6, since the greedy scheduling algorithm allocates a codebook as the number of users gradually increases, there is an advantage of reducing complexity.

    [0069] For a specific embodiment for user scheduling and codebook allocation, a NOMA system having parameters such as K.sub.tol=4,K=3,L=3 (total number of users=4, number of users to be selected=3, number of codebooks=3) is considered. Here, it is assumed that three NOMA codebooks are given as follows.

    [00021] π’ž 1 = ( [ + 1 + 1 ] , [ - 1 - 1 ] ) , π’ž 2 = ( [ + 1 0 ] , [ - 1 0 ] ) , π’ž 3 = ( [ 0 + 1 ] , [ 0 - 1 ] ) .Math. Equation ⁒ 20 .Math.

    [0070] The user selection and codebook allocation function is defined as Ο€=[Ο€(1),Ο€(2), . . . ,Ο€(K)], where Ο€(k)=0,1, . . . , L. For example, when Ο€=[1,2,0,3)], this means that the third UE is not selected, and the first, second, and fourth UEs use the first, second, and third codebooks, respectively. If the defined user selection and codebook allocation function is used, the optimization problem is represented as Equations 21 to 23 below. Equation 21 corresponds to an optimization problem of maximizing the mutual information, Equation 22 corresponds to an optimization problem of maximizing the capacity upper-bound, and Equation 23 corresponds to an optimization problem of maximizing the mutual information.

    [00022] Ο€ * = arg max Ο€ { log 2 ⁒ M K - .Math. Equation ⁒ 21 .Math. 1 𝒳 _ Ο€ ⁒ .Math. x _ Ο€ , m ∈ 𝒳 _ Ο€ 𝔼 n _ [ log 2 ⁒ .Math. x _ Ο€ , j ∈ 𝒳 _ Ο€ exp ( - .Math. H _ ( x _ Ο€ , m - x _ Ο€ , j ) + n _ .Math. 2 2 - .Math. n _ .Math. 2 2 Οƒ 2 ) ] } Ο€ * = arg max Ο€ .Math. n = 1 N log ( 1 + .Math. k = 1 K tot h k [ n ] 2 ⁒ f k , n ⁒ p k , n ) N 0 ) .Math. Equation ⁒ 22 .Math. Ο€ * = arg max Ο€ { 2 ⁒ log 2 ⁒ M K - .Math. Equation ⁒ 23 .Math. log 2 ⁒ .Math. x _ Ο€ , i ∈ 𝒳 _ Ο€ .Math. x _ Ο€ , j ∈ 𝒳 _ Ο€ exp ⁑ ( - .Math. H _ Ο€ ( x _ Ο€ , i - x _ Ο€ , j ) .Math. 2 2 ⁒ N 0 ) }

    [0071] As all the above optimization problems correspond to a combinatorial optimization problem, the optimal solution can be obtained by calculating Equations 23 to 25 for all possible combinations of users and codebooks. In this embodiment, a total of 24 (=4*3*2) user selection and codebook allocation functions exist and are listed in the following equation.

    [00023] Ο€ 1 = [ 1 2 3 0 ] Ο€ 5 = [ 1 3 2 0 ] Ο€ 9 = [ 2 1 3 0 ] Ο€ 13 = [ 2 3 1 0 ] Ο€ 17 = [ 3 1 2 0 ] Ο€ 21 = [ 3 2 1 0 ] Ο€ 2 = [ 1 2 0 3 ] Ο€ 6 = [ 1 3 0 2 ] Ο€ 10 = [ 2 1 0 3 ] Ο€ 14 = [ 2 3 0 1 ] Ο€ 18 = [ 3 1 0 2 ] Ο€ 22 = [ 3 2 0 1 ] Ο€ 3 = [ 1 0 2 3 ] Ο€ 7 = [ 1 0 3 2 ] Ο€ 11 = [ 2 0 1 3 ] Ο€ 15 = [ 2 0 3 1 ] Ο€ 19 = [ 3 0 1 2 ] Ο€ 23 = [ 3 0 2 1 ] Ο€ 4 = [ 0 1 2 3 ] Ο€ 8 = [ 0 1 3 2 ] Ο€ 12 = [ 0 2 1 3 ] Ο€ 16 = [ 0 2 3 1 ] Ο€ 20 = [ 0 3 1 2 ] Ο€ 24 = [ 0 3 2 1 ] .Math. Equation ⁒ 24 .Math.

    [0072] For example, the joint codebook custom-character and effective channel H.sub.Ο€.sub.1 corresponding to an index function Ο€.sub.2 can be composed as shown in Equations 25 and 26 below.

    [00024] 𝒳 _ Ο€ 2 = .Math. Equation ⁒ 25 .Math. ( [ + 1 + 1 + 1 0 0 + 1 ] , [ + 1 + 1 + 1 0 0 - 1 ] , [ + 1 + 1 - 1 0 0 + 1 ] , [ + 1 + 1 - 1 0 0 - 1 ] , [ - 1 - 1 + 1 0 0 + 1 ] , [ - 1 - 1 + 1 0 0 - 1 ] , [ - 1 - 1 - 1 0 0 + 1 ] , [ - 1 - 1 - 1 0 0 - 1 ] ) H _ Ο€ 2 = [ h 1 [ 1 ] 0 h 2 [ 1 ] 0 h 4 [ 1 ] 0 0 h 1 [ 2 ] 0 h 2 [ 2 ] 0 h 4 [ 2 ] ] .Math. Equation ⁒ 26 .Math.

    [0073] Similarly, f.sub.k,n and P.sub.k,n can be computed as follows.

    [00025] F = [ f 1 , 1 f 1 , 2 f 2 , 1 f 2 , 2 f 3 , 1 f 3 , 2 f 4 , 1 f 4 , 2 ] = [ 1 1 1 0 0 0 0 1 ] ⁒ P = [ p 1 , 1 p 1 , 2 p 2 , 1 p 2 , 2 p 3 , 1 p 3 , 2 p 4 , 1 p 4 , 2 ] = [ 1 1 1 0 0 0 0 1 ] .Math. Equation ⁒ 27 .Math.

    [0074] Through the above method, the optimization problem for all possible user and codebook combinations can be solved. However, there is a disadvantage that the complexity increases exponentially as the number of codebooks or the number of users to be scheduled increases. Therefore, a greedy algorithm can be considered to lower the complexity, and the computation can proceed as follows.

    [0075] At first step, the capacity upper-bound or approximated mutual information is obtained for a case where there is only one user as shown below, and there are a total of 12 possibilities.

    [00026] Ο€ 1 = [ 1 0 0 0 ] Ο€ 4 = [ 0 1 0 0 ] Ο€ 7 = [ 0 0 1 0 ] Ο€ 10 = [ 0 0 0 1 ] Ο€ 2 = [ 2 0 0 0 ] Ο€ 5 = [ 0 2 0 0 ] Ο€ 8 = [ 0 0 2 0 ] Ο€ 11 = [ 0 0 0 2 ] Ο€ 3 = [ 3 0 0 0 ] Ο€ 6 = [ 0 2 0 0 ] Ο€ 9 = [ 0 0 3 0 ] Ο€ 12 = [ 0 0 0 3 ] ⁒ Ο€ 1 = [ 1 0 0 0 ] Ο€ 4 = [ 0 1 0 0 ] Ο€ 7 = [ 0 0 1 0 ] Ο€ 10 = [ 0 0 0 1 ] Ο€ 2 = [ 2 0 0 0 ] Ο€ 5 = [ 0 2 0 0 ] Ο€ 8 = [ 0 0 2 0 ] Ο€ 11 = [ 0 0 0 2 ] Ο€ 3 = [ 3 0 0 0 ] Ο€ 6 = [ 0 2 0 0 ] Ο€ 9 = [ 0 0 3 0 ] Ο€ 12 = [ 0 0 0 3 ] .Math. Equation ⁒ 28 .Math.

    [0076] If Ο€.sub.1=[1 0 0 0] is selected at first step, at second step, the optimization function value is calculated for the following six combinations for two users.

    [00027] Ο€ 13 = [ 1 2 0 0 ] Ο€ 15 = [ 1 0 2 0 ] Ο€ 17 = [ 1 0 0 2 ] Ο€ 14 = [ 1 3 0 0 ] Ο€ 16 = [ 1 0 3 0 ] Ο€ 18 = [ 1 0 0 3 ] ⁒ Ο€ 13 = [ 1 2 0 0 ] Ο€ 15 = [ 1 0 2 0 ] Ο€ 17 = [ 1 0 0 2 ] Ο€ 14 = [ 1 3 0 0 ] Ο€ 16 = [ 1 0 3 0 ] Ο€ 18 = [ 1 0 0 3 ] .Math. Equation ⁒ 29 .Math.

    [0077] If Ο€.sub.13=[1 2 0 0] is selected at second step, at last step, computation is performed for the following two cases only.


    Ο€.sub.19=[1 2 3 0]Ο€.sub.20=[1 2 0 3]  Equation 30>

    [0078] To verify the effect of the disclosure, the coded bit error rates of a related-art technique (random scheduling) and the technique proposed in the disclosure were compared through a simulation for verification. The NOMA method used in this simulation was multi-user shared access (MUSA), the FFT size was 4096, and the number of subcarriers shared by transmitting users was set to 4. A rate-Β½ code (336,772) was used as the channel code, and the ETU model was used as the channel model.

    [0079] FIG. 7 is a diagram for comparing the coded bit error rates of the related art and this embodiment.

    [0080] FIG. 7 compares the coded bit error rates when k.sub.tol=6,K=6,L=6 and it can be seen that a maximum 1.5 dB SNR gain can be obtained compared to a related art technique. With reference to FIG. 7, the coded bit error rates are compared when k.sub.tol=(6,12,18),K=6, L=6, and it can be seen that the proposed technique can obtain a performance gain of up to 5 dB or more compared to a related-art technique as the total number of users in the cell increases.

    [0081] FIG. 8 is a diagram showing an embodiment of the disclosure.

    [0082] With reference to FIG. 8, the base station may receive channel state information from multiple UEs (operation 801). The base station may calculate the sum frequency efficiency of a non-orthogonal multiple access (NOMA) system based on the received channel state information (operation 802). The sum frequency efficiency can be calculated based on the mutual information. The mutual information may be

    [00028] ℐ ⁑ ( x _ ; y _ .Math. H ) = .Math. x _ i ∈ 𝒳 1 .Math. "\[LeftBracketingBar]" 𝒳 .Math. "\[RightBracketingBar]" ⁒ ∫ y _ f ⁑ ( y _ .Math. x _ = x _ i , H ) ⁒ log 2 ⁒ f ⁑ ( y _ .Math. x _ = x _ i , H _ ) f ⁑ ( y _ .Math. H _ ) ⁒ d ⁒ y _ .

    Or, the mutual information may be

    [00029] ℐ _ ( x _ ; y _ .Math. H _ ) = 2 ⁒ log 2 ⁒ M K - log 2 ⁒ .Math. x _ i ∈ 𝒳 _ .Math. x _ j ∈ 𝒳 _ exp ( - .Math. H _ ( x _ i - x _ j ) .Math. 2 2 ⁒ N 0 ) .

    Alternatively, the UE may transmit a signal of a Gaussian distribution, in which case a capacity upper bound is set for the mutual information, and the capacity upper bound may be

    [00030] ℐ _ ( x _ ; y _ .Math. H _ ) ≀ .Math. n = 1 N log ( 1 + .Math. k = 1 K tot h k [ n ] 2 ⁒ f k , n ⁒ p k , n N 0 ) .

    The base station may select a UE based on the calculated sum frequency efficiency (operation 803). The base station may allocate a codebook to the selected UE (operation 804). The allocation may be performed by using a greedy scheduling algorithm. The base station may transmit the index of the allocated codebook to the UE (operation 805).

    [0083] FIG. 9 is a diagram showing another embodiment of the disclosure.

    [0084] With reference to FIG. 9, the UE may transmit channel state information to the base station (operation 901). The UE may transmit the index of an allocated codebook to the base station (operation 902). Based on the transmitted channel state information, the sum frequency efficiency of a non-orthogonal multiple access (NOMA) system may be calculated by the base station. Based on the calculated sum frequency efficiency, the UE may be selected. A codebook may be allocated to the selected UE. The allocation may be performed by using a greedy scheduling algorithm. The sum frequency efficiency may be calculated based on the mutual information. The mutual information may be

    [00031] ℐ ⁑ ( x _ ; y _ .Math. H ) = .Math. x _ i ∈ 𝒳 1 .Math. "\[LeftBracketingBar]" 𝒳 .Math. "\[RightBracketingBar]" ⁒ ∫ y _ f ⁑ ( y _ .Math. x _ = x _ i , H _ ) ⁒ log 2 ⁒ f ⁑ ( y _ .Math. x _ = x _ i , H _ ) f ⁑ ( y _ .Math. H _ ) ⁒ d ⁒ y _ ⁒ ℐ ⁑ ( x _ ; y _ .Math. H ) = .Math. x _ i ∈ 𝒳 1 .Math. "\[LeftBracketingBar]" 𝒳 .Math. "\[RightBracketingBar]" ⁒ ∫ y _ f ⁑ ( y _ .Math. x _ = x _ i , H _ ) ⁒ log 2 ⁒ f ⁑ ( y _ .Math. x _ = x _ i , H _ ) f ⁑ ( y _ .Math. H _ ) ⁒ d ⁒ y _ .

    Or, the mutual information may be

    [00032] ℐ ^ ( x _ ; y _ .Math. H _ ) = 2 ⁒ log 2 ⁒ M K - log 2 ⁒ .Math. x _ i ∈ 𝒳 _ .Math. x _ j ∈ 𝒳 _ exp ( - .Math. H _ ( x _ i - x _ j ) .Math. "\[RightBracketingBar]" 2 2 ⁒ N 0 )

    Alternatively, the UE may transmit a signal of a Gaussian distribution, in which case a capacity upper bound is set for the mutual information, and the capacity upper bound may be

    [00033] ℐ ⁑ ( x _ ; y _ .Math. H _ ) ≀ .Math. n = 1 N log ( 1 + .Math. k = 1 K tot h k [ n ] 2 ⁒ f k , n ⁒ p k , n N 0 ) .

    [0085] FIG. 10 is a diagram illustrating the structure of a base station according to an embodiment of the disclosure.

    [0086] With reference to FIG. 10, the base station may include a transceiver 1010, a controller 1020, and a storage 1030. In the disclosure, the controller may be defined as a circuit, an application specific integrated circuit, or at least one processor.

    [0087] The transceiver 1010 may transmit and receive signals to and from other network entities. The transceiver 1010 may transmit system information to, for example, a UE, and may transmit a synchronization signal or a reference signal.

    [0088] The controller 1020 may control the overall operation of the base station according to embodiments proposed in the disclosure. For example, the controller 1020 may control signal flows between blocks to perform operations according to the flowchart described above. Specifically, the controller 1020 may control operations proposed in the disclosure to transmit remaining minimum system information (RMSI) in a multi-beam based system according to an embodiment of the disclosure.

    [0089] The storage 1030 may store at least one of information transmitted and received through the transceiver 1010 or information generated through the controller 1020. For example, the storage 1030 may store scheduling information related to RMSI transmission, PDCCH time domain location and periodicity information related to RMSI, and the like.

    [0090] FIG. 11 is a diagram illustrating the structure of a UE according to an embodiment of the disclosure.

    [0091] With reference to FIG. 11, the UE may include a transceiver 1110, a controller 1120, and a storage 1130. In the disclosure, the controller may be defined as a circuit, an application specific integrated circuit, or at least one processor.

    [0092] The transceiver 1110 may transmit and receive signals to and from other network entities. The transceiver 1110 may receive system information from, for example, a base station, and may receive a synchronization signal or a reference signal.

    [0093] The controller 1120 may control the overall operation of the UE according to embodiments proposed in the disclosure. For example, the controller 1120 may control signal flows between blocks to perform operations according to the flowchart described above. Specifically, the controller 1120 may control operations proposed in the disclosure to receive remaining minimum system information (RMSI) in a multi-beam based system according to an embodiment of the disclosure.

    [0094] The storage 1130 may store at least one of information transmitted and received through the transceiver 1110 or information generated through the controller 1120. For example, the storage 1130 may store scheduling information related to RMSI transmission, PDCCH time domain location and periodicity information related to RMSI, and the like.