 Research
 Open Access
Increasing sumrate in largescale cognitive radio networks by centralized power and spectrum allocation
 Luxmiram Vijayandran^{1}Email author,
 SangSeon Byun^{2},
 Geir E Øien^{1} and
 Torbjörn Ekman^{1}
https://doi.org/10.1186/168714992012362
© Vijayandran et al.; licensee Springer. 2012
 Received: 16 March 2012
 Accepted: 16 November 2012
 Published: 11 December 2012
Abstract
We revisit the widely investigated problem of maximizing the centralized sumrate capacity in a cognitive radio network. We consider an interferencelimited multiuser multichannel environment, with a transmit sumpower constraint over all channels as well as an aggregate average interference constraint towards multiple primary users. Until very recently only suboptimal algorithms were proposed due to the inherent nonconvexity of the problem. Yet, the problem at hand has been neglected in the largescale setting (i.e., number of nodes and channels) as usually encountered in practical scenarios. To tackle this issue, we first propose an exact mathematical adaptation of the wellknown successive convex geometric programming with condensation approximations (SCVX) to better cope with large systems while keeping the convergence proof intact. Alternatively, we also propose a novel efficient lowcomplexity heuristic algorithm, ELCI. ELCI is an iterative approach, where the constraints are handled alternately based on the special property of the optimal solution, with a particular power update formulation based on the KKT conditions of the problem. In order to demonstrate ELCI’s efficiency we compare it to two stateoftheart algorithms, SCVX, and the recently proposed global optimum approach, MARL. The salient highlight of ELCI is the relatively fast and very good suboptimal performance in largescale CR systems.
Keywords
 Cognitive Radio
 Cognitive Radio Network
 Primary System
 Cognitive Radio System
 Interference Constraint
1 Introduction
The throughput maximization in multiuser interferencelimited wireless networks has been a long standing major problem, since it is typically nonconvex due to complicated interference coupling among different links. In particular, we consider a cognitive radio (CR) system composed of secondary users (SUs) and multichannel. We aim to maximize the sumrate capacity of the secondary system, taking into account the average interference constraint at the incumbent primary users (PUs). The centralized radio resource allocation (RRA) is performed at a fusion center (FC).
Although, one of the most widely investigated problems in RRA (see e.g., [1] for an exhaustive review of related problems), only very recently few theoretically optimal algorithms were proposed [2–4]. In particular Qian et al. proposed one of the very first centralized algorithm MARL in [2]. Before MARL a significant number of suboptimal algorithms were proposed to handle equivalent problems. In order to circumvent the complexity of solving the initial problems, assumptions have often been made to create more tractable ones. High signaltointerferencenoiseratio (SINR) is one of the most employed assumptions (e.g., [5, 6]). In the underlay CR setting [7], in addition to the classical transmit power constraint, there exists also the interference constraint (called also interference temperature) toward the primary system. To avoid the complexity of having both constraints, the authors in [8] assume the system to be in such a state that one of the two constraints becomes loose, thus can be omitted (i.e., either transmit powerlimited or primary interferencelimited system). In [9], the multiple access channel approach using successive interference cancelation yields an interferencefree formulation, thus the problem becomes convex. In particular, convex problem formulations are highly desired since the global optimum can be obtained using welldeveloped technics, e.g., the interiorpoint methods (IPM) [10]. However, those assumptions are not always valid. In particular, the opportunistic approach of the CR paradigm in addition to the interference constraint imposed by the primary system can lead to a lowSINR system with heavy interference among SUs, while some SUs can enjoy a surrounding environment free of PUs and other SUs, such that the entire system is neither in the transmit powerlimited or primary interferencelimited state (i.e., in a mix state). In contrast, other works, e.g., [2, 11–15] have directly handled the problems without major assumptions. Some of the most popular applied approaches are: the iterative waterfilling (e.g., [16, 17]), the sequential quadratic programming (e.g., [14]), the Lagrange duality method (e.g., [18]). Many other particular iterative algorithms have been also proposed (e.g., [19]). In particular, the algorithm proposed in [11] has been considered one of the stateoftheart centralized algorithms. The algorithm (referred here as SCVX) is based on a successive convexification of the problem using the socalled condensation approximation. While, all the aforementioned algorithms are only suboptimal, the centralized optimal algorithm [2] Monotonic optimizationbAsed poweR controL (MARL), proposed by Qian et al., is based on recent advances in global optimization, including monotonic optimization and fractional programming. Later, they also proposed a distributed algorithm, aSynchrornous distributEd powEr contRol (SEER) in [20], based on the theory of Gibbs sampling. Note that the authors also proposed in [12] the MAPEL algorithm, very similar to MARL, to cope with the additional minimum rate constraints.
This said, the performance investigations have however been generally neglected in the largescale settings as it is usually encountered in practical scenarios. In particular, as also stated by the same authors in [20], MARL and MAPEL already exhibit a very slow convergence for a problem dimension of less than 8. Thus, large systems become prohibited in complexity. Alternatively, even the wellknow good suboptimal SCVX algorithm exhibits nonnegligible complexity (as later detailed), in particular with multiple channels. Therefore, although theoretically optimal, when it comes to numerical experiments, even with powerful machines, those approaches become quickly limited in terms of the problem size.
Motivated by this issue, we aim to propose algorithms with very good suboptimal performance while exhibiting good scalability. Those familiar with real numerical experiments in RRA are likely to immediately recognize that these two goals are, in general, fairly difficult to achieve together. We first propose a mathematical adaptation of the initial SCVX framework to cope with largescale settings, called LSSCVX, while preserving the SCVX convergence property [11] intact. As a second alternative, taking advantage of an important property of the problem, i.e., the optimal solution lies at the boundary of the feasible region [2], we propose an heuristic iterative algorithm called Enhanced LowComplexity Iterative approach (ELCI). The key idea of ELCI is to handle the different constraints separately, and further use a specific formulation for the iterative power updates based on the Karush–Kuhn–Tucker (KKT) conditions ([10], Section 5.5.3) of the problem. By numerical evaluations we first show that MARL, although theoretically optimal, exhibits large complexity even for small systems; Second, very similar performance to the enhanced LSSCVX can be obtained with ELCI but with much lower complexity.
It is wellknown that the main practical drawback of ELCI, as well as SCVX, MARL or MAPEL is the centralized setting with full channel state information requirement. The current trend is toward distributed approaches for practical implementation purposes and scalability of the network. It is however interesting to quantify the loss of those distributed algorithms compared to the ideal centralized sumrate case. We believe that ELCI as well as the enhanced LSSCVX can provide in practice good approximate benchmarks in the case of largescale problems as advocated by distributed algorithms. Note that although stated as an optimal distributed algorithm, the one proposed in [21] do not cope with multichannel and sumpower constraint over all bands. Similarly, in addition to the fact that the interference constraint is not considered in [20], the adaptation for multichannel and sumpower constraint is not so straightforward, in particular for largescale systems (i.e., see ([20], Eq. 13) for the multilevel integral required in the denominator).
We recently proposed an algorithm in [22] to cope with the sumrate problem. The current article builds on those results while improving the followings; First, the new algorithm has been improved for the case of multiband varying channels. Second, a lowcomplexity and optimal method is proposed to solve for the Lagrange multipliers (LGM), required in the ELCI algorithm. The method being customized for the specific need of the algorithm, the resolution exhibits much faster performance compared to using a general optimization approach (commercial tool) as in [22]. Third, only the initial SCVX provided in [11] was used in [22] such that the numerical experiments were handled with less than only 6 optimization variables. In this article, thanks to LSSCVX, we simulate with over 30 users and 128 channel bands (i.e., 3840 variables). Finally, we also consider the optimal MARL as a comparison for the small size experiments.
The remainder of this article is organized as follows: In Section 2., we define the system model. Section 3. briefly reviews the SCVX approach before describing the LSSCVX adaptation. Section 4. describes the ELCI algorithm. Section 5. reviews the key features of MARL, (LS)SCVX and ELCI. Section 6. provides numerical results to evaluate their performance, before we conclude in Section 7.
Notation: Boldface lowercase letters refer to vectors (x); boldface capital letters refer to matrices (X); single variables are referred to by simple lowercase letters (x); x_{m,n} denotes the variable in the m th row and n th column of matrix X; a constant is defined by a capital letter (X); sets are defined using script capital letters ($\mathcal{X}$).
2 System model
where ${g}_{\mathrm{ij}}^{\left(k\right)}$ is the channel power from the i th transmitter SU to the j th receiver on the k th channel, n_{ m } denotes the attributed receiver n of the m th SU such that n_{ m }∈{1,…,N}. For the adhoc scenario each transmitter m is associated to its predefined receiver n_{ m }. For the CB scenario each SU transmitter m selects the best^{a} BS n_{ m }. The term ${\sigma}_{{n}_{m},k}^{2}$ denotes the constant noise variance (N_{0}) plus the aggregate interference generated by the primary transmitters at the n_{ m }th receiver on the k th channel. It is reasonable to assume that the primary aggregate interference at a secondary receiver (i.e., ${\sigma}_{{n}_{m},k}^{2}{N}_{0}$) is known if it can distinguish between a secondary and primary signal, e.g., using different pilots. Thus, integrating over the power spectrum densities (PSD) of the PUs’ signals, the total interference from the primary system can be evaluated at each secondary receiver. The sum term $\sum _{j=1,\ne m}^{M}{p}_{j,k}{g}_{j,{n}_{m}}^{\left(k\right)}$ represents the aggregate interference generated at the m th user’s receiver on channel k created by all other SUs, i.e., from intercell as well as intracell. Therefore, ${I}_{m,k}={\sigma}_{{n}_{m},k}^{2}+\sum _{j=1,\ne m}^{M}{p}_{j,k}{g}_{j,{n}_{m}}^{\left(k\right)}$ defines the total interference experienced by user m communication on channel k at its receiver, n_{ m }.
We now define the main assumptions used in this work. The receiver n can estimate the instantaneous channel ${g}_{m,{n}_{m}}^{\left(k\right)}$ from, its respective (in adhoc) or each (in CB), transmitter m, on each channel k. However, the exact instantaneous interference created by the secondary transmitters to the primary receivers cannot be known, in particular if the primary system does not collaborate. Instead, based on the information given by a deployed wireless sensor network (WSN) (as advocated by, e.g., the SENDORA project [23]), the average interference channel ${h}_{m,l}^{\left(k\right)}$ from the m th SU to the l th PU can be assumed known (e.g., based on the approximative location of the receiver, etc.). The maximum aggregate interference power threshold at the PUs, ${I}_{\mathrm{th}}^{\mathrm{PU}}$, should be adopted to the known sensitivity of the primary system (e.g., linked to the outage probability of the PUs). As mentioned earlier, the major drawback, in practice, of this centralized configuration is the control overhead between the FC and the SUs.
where the received SINR Γ_{m,k}is given in (1). The objective (2) is to allocate the resource (i.e., power and channels) such that the sumrate capacity is maximized. Constraint (3) defines the aggregate average interference power constraint (${I}_{\mathrm{th}}^{\mathrm{PU}}$ assumed identical for all PUs for the sake of notation simplicity) for each subchannel k at each PU receiver l using that channel and denoted by ${\mathcal{\mathcal{L}}}_{k}$. Constraint (4) defines the total transmit power per SU over all channels. The optimization problem (2) is promptly applicable for the adhoc system. Whereas, for the intracell CB uplink case, we need to assume that a base station is capable of receiving simultaneously the signals from its associated transmitters interfering each other on noncontiguous channels. Note that the selection of the channels (i.e., spectrum allocation) is directly related to the power levels, i.e., p_{m,k}=0 implies that user m cannot use the k th channel. It is wellknown that the sumrate capacity is a theoretical metric not often used in real networks. However, it provides a useful upperbound to compare metrics which account for different realistic constraints such as fairness issues (e.g., see [24] which considers the maxmin capacity problem for multihop CR network with interference constraint).
This problem is known to be NPcomplete [25], even with one channel and without considering the CR constraint in Equation (3). The main problem is the interference among users. As shown in [26], if the crosstalk interference is larger than some value (see [26]), the optimal RRA is an FDMA type allocation. In fact, if the crosstalk exists but is very small (e.g., imagine very far apart set of transceivers), then the optimal solution could even be obtained using distributed approach (e.g., iterative waterfilling) to converge to a unique Nash equilibrium (NE). If the crosstalk is not negligible, multiple NE points can exist, which can be far from the social optimum.
3 Adapting SCVX for largescale problem, LSSCVX
In this section, we first briefly derive the convex GP form of our initial problem given by (24) to fit the successive convexification approach as in [11]. We show the exponential increase in monomial summations compared to the simplified highSINR assumption case [6][5] and one frequency band. To overcome this problem, without affecting the convergence property, we combine the approach of [11] with another convexification approach described in [27].
The successive convex approximation simply repeats the GP formulation (7) and solves it using the constraints (3), (4). Let a^{(i)}=a_{i 1},…,a_{ iMK }^{ T }, $\mathbf{\text{A}}={[{\mathbf{\text{a}}}^{\left(0\right)},{\mathbf{\text{a}}}^{\left(1\right)},\dots ,{\mathbf{\text{a}}}^{\left({M}^{\mathrm{MK}}\right)}]}^{T}$, and $\mathbf{\text{b}}={[{b}^{\left(0\right)},{b}^{\left(1\right)},\dots ,{b}^{\left({M}^{\mathrm{MK}}\right)}]}^{T}$. All elements of A and b remain unchanged at each iteration, except the coefficient a^{(0)}and b^{(0)}, updated using the Condensation method. Although the standard GP form (7) can be solved, it is not a convex optimization problem. However, any problem in GP standard form can be further transformed into a convex problem using logsumexp transformation [10], ([11], Eq. 2). Finally, the convex problem can be, in general, efficiently solved using IPM^{c} with at most polynomial complexity [10].
Although the optimization variable vector in (7) has only MK elements (i.e., P), the posynomial function contains M^{ MK } monomials. All the power exponents (e.g., ${a}_{1}^{\left(i\right)}{a}_{1}^{\left(0\right)}$) need to be updated at each iteration which correspond to {M^{ MK }MK}elements. The size expansion obviously creates a bottleneck. Taking for example the CB scenario where {N M K} equal to {2,4,2} respectively, requires some matrices with length M^{ MK }=65536. Using simply one additional SU per cell (i.e., M=6) would require matrices of length 6^{12}. This is obviously not easy to handle for larger system sizes as used in our numerical experiments (i.e., {M=32,K=128}). In order to tackle the exponential increase in monomial summations we next use the convexification approach similar to the one used in [27].
The convexity of the objective function in terms of X is due to the fact that the first element follows the logsumexp type expression which is convex ([10], p. 72), and the remaining part is linear. Note that in (8), the summations remain over MK elements. Finally, the exact same successive approach with updated condensation approximation is used as previously presented, but the more practical convex problem (8) is solved instead of (7)–(3), (4). Since the same condensation method is used, minimization in (8) is exactly equivalent to the minimization problem of the convex form of (7) with constraints (3), (4). Hence, the convergence property does not change, since each subproblem obtained from the condensation approach, being the GP convex formulation based on (7) or our proposed convex formulation (8), are to be solved optimally. The optimization problem (8) is solved using IPM, for which the gradient and Hessian derivations of the Lagrangian are relegated in the appendix. It is now possible to solve for (2)–(4) using (8) in the case of large problem, which is obviously intractable with (7). We call this approach the LSSCVX algorithm.
4 Enhanced lowcomplexity iterative approach, ELCI
Further motivated to obtain even lower complexity algorithms, while providing good suboptimal solutions, we present hereafter a novel heuristic algorithm, called, ELCI. ELCI is based on a similar iterative approach proposed in [28], where the authors deal with the same problem defined in (2)–(4) but without the interference constraint (3). The ELCI algorithm is designed to cope with the additional interference constraint, and also provides a fast and efficient method for solving for the required Lagrangian multipliers.
4.1 Mathematical bases
The three power update expressions (13–15) form the mathematical basis of ELCI.
4.2 Solving the Lagrangian multipliers
In order to compute (14) and (15), it is first required to evaluate μ_{k,l} and λ_{ m }, respectively. We present here a simple and efficient method, optimized for the particular need of ELCI. The solutions are obtained substituting (14) and (15) into (3) and (4) respectively, with equality instead of inequality constraint (i.e., becomes an active constraint).
where ${a}_{m}=\frac{{\Gamma}_{m,k}}{1+{\Gamma}_{m,k}}{h}_{m,l}^{\left(k\right)}$, ${b}_{m}=\sum _{i=1,\ne m}^{M}\left(\frac{{\Gamma}_{i,k}}{1+{\Gamma}_{i,k}}\phantom{\rule{1em}{0ex}}\frac{{g}_{m,{n}_{i}}^{\left(k\right)}}{{I}_{i,k}}\right)$, and ${c}_{m}={h}_{m,l}^{\left(k\right)}ln\left(2\right)$. Let us define the function $\zeta \left({\mu}_{k,l}\right)=\sum _{m=1}^{M}{a}_{m}/({b}_{m}+{\mu}_{k,l}{c}_{m})$. We need to solve μ_{k,l}such that $\zeta \left({\mu}_{k,l}\right){I}_{\mathrm{th}}^{\mathrm{PU}}=0$, i.e., a nonlinear equation with a unique unknown. It is easy to note from (16) that a_{ m }b_{ m }c_{ m },∀m∈[1,…,M are all nonnegatives. Moreover, c_{ m },∀m∈[1,…,M are also nonzero. Thus, the function ζ(μ_{k,l}) is strictly decreasing and positive for μ_{k,l}positive. If $\zeta \left(0\right)<{I}_{\mathrm{th}}^{\mathrm{PU}}$, the Equation (16) has no positive solution. In fact, this case means that PU l on channel k is not violated (i.e., $\sum _{k=1}^{K}{p}_{m,k}<{P}_{max}^{\mathrm{TX}}$). Thus, this cannot happen since in the ELCI algorithm (to be described shortly) the LGMs computations are only required when the respective constraint is violated (i.e., above the constraint). In the other case, if $\zeta \left(0\right)\ge {I}_{\mathrm{th}}^{\mathrm{PU}}$, a solution exists and can be obtained using for example the simple and fast bisection or golden interval methods [29]. The search is stopped when $\left\zeta \left({\mu}_{k,l}\right){I}_{\mathrm{th}}^{\mathrm{PU}}\right\le {\epsilon}_{1}$ (with, e.g., ε_{1}=10^{−20}). Note that the number of iterations for the bisection search increases as the slope of $\zeta \left({\mu}_{k,l}\right){I}_{\mathrm{th}}^{\mathrm{PU}}$ in terms of μ_{k,l} tends to 0 (e.g., for very large M or K). Yet, in practice, the bisection or golden methods are very simple and extremely fast, as later confirmed through largescale experiments. The same approach applies for solving λ_{ m }.
Algorithm description
The main iterative loop of the algorithm contains three blocks A, B, and C related to the updates (13), (14), and (15), respectively. Block A updates the power without considering any of the constraints, i.e., (3) and (4). Block B updates the power, while only guaranteeing that the interference constraint (3) is satisfied for all PUs on all channels. Block C updates the power, while only guaranteeing that the transmit power constraint (4) is satisfied for all SUs.
Algorithm 1 ELCI Algorithm
Initialize: t=0, ${p}_{m,k}\left(t\right)={P}_{max}^{\mathrm{TX}}$∀(m,k) [INIT]
repeat
t=t + 1
Update ∀(m,k): [Block A]
$\phantom{\rule{2em}{0ex}}\phantom{\rule{2em}{0ex}}{p}_{m,k}\left(t\right)=\left\{\begin{array}{c}{P}_{max}^{\mathrm{TX}}\phantom{\rule{2.77695pt}{0ex}}\text{if}\left({p}_{m,k}(t1)>0,\right.\\ \phantom{\rule{2em}{0ex}}\phantom{\rule{1em}{0ex}}\phantom{\rule{2.77695pt}{0ex}}\phantom{\rule{0.3em}{0ex}}{p}_{i,k}(t1)=0,\\ \phantom{\rule{2em}{0ex}}\phantom{\rule{1em}{0ex}}\phantom{\rule{2.77695pt}{0ex}}\phantom{\rule{0.3em}{0ex}}\left.\forall i\ne m\right)\\ \text{(13)}\phantom{\rule{2.77695pt}{0ex}}\phantom{\rule{2.77695pt}{0ex}}\phantom{\rule{2.77695pt}{0ex}}\text{else}\end{array}\right.$
[Block B]
for k=1to K do
Set B_{duplicate}=OFF; Empty set ${\mathcal{\mathcal{L}}}^{\left(v\right)}$ (i.e., setwhich will contain violated PUs)
repeat
$\mathrm{Find}\phantom{\rule{2.77695pt}{0ex}}{l}_{k}^{\ast}={\text{argmax}}_{l\in {\mathcal{\mathcal{L}}}_{k}}\sum _{m=1}^{M}{p}_{m,k}\left(t\right){h}_{m,l}^{\left(k\right)}$
if ($\sum _{m=1}^{M}{p}_{m,k}\left(t\right){h}_{m,{l}_{k}^{\ast}}^{\left(k\right)}>{I}_{\text{th}}^{\mathrm{PU}}$) then
if$({l}_{k}^{\ast}\in {\mathcal{\mathcal{L}}}^{\left(v\right)})$then B_{duplicate}=ON else${\mathcal{\mathcal{L}}}^{\left(v\right)}\leftarrow {l}_{k}^{\ast}$end if
Compute (∀m): tm p_{ m }=(14) with $l={l}_{k}^{\ast}${need to compute${\mu}_{k,{l}_{k}^{\ast}}$}
Update (∀m): p_{m,k}(t)=$\phantom{\rule{48.0pt}{0ex}}\left\{\begin{array}{c}\mathrm{tm}{p}_{m}\phantom{\rule{2em}{0ex}}\phantom{\rule{2em}{0ex}}\phantom{\rule{2em}{0ex}}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\text{if}({B}_{\text{duplicate}}=\text{OFF})\\ \text{min}\phantom{\rule{0.3em}{0ex}}\left(\mathrm{tm}{p}_{m},{p}_{m,k}\left(t\right)\right)\phantom{\rule{0.3em}{0ex}}\text{else}\end{array}\right.$
end if
until interference constraint (3)satisfied$\forall l\in {\mathcal{\mathcal{L}}}_{k}$
end for
[Block C]
Find set ${\mathcal{\mathcal{M}}}_{v}:=\left\{m\left\sum _{k=1}^{K}{p}_{m,k}\right(t)>{P}_{max}^{\mathrm{TX}}\right\}$
for all $m\in {\mathcal{\mathcal{M}}}_{v}$do
Compute (∀k)tm p_{ k }=(15){need to compute λ_{ m }}
Update(∀k): ${p}_{m,k}\left(t\right)=\left\{\begin{array}{c}\mathrm{tm}{p}_{k}\phantom{\rule{2em}{0ex}}\phantom{\rule{2em}{0ex}}\phantom{\rule{2em}{0ex}}\phantom{\rule{0.3em}{0ex}}\phantom{\rule{0.3em}{0ex}}\text{(in general)}\\ \text{min}\phantom{\rule{0.3em}{0ex}}\left(\mathrm{tm}{p}_{k},{p}_{m,k}\left(t\right)\right)\phantom{\rule{0.3em}{0ex}}\text{(if Finaliteration)}\end{array}\right.$
end for
untilf(P(t))−f(P(t−1))≤ε_{0}, ε_{0}>0, (then apply an additional iteration with Finaliteration mode)

Block A: In the special case defined by the if statement, using (13) would lead to p_{m,k}(t)=∞. This stems from the fact that there is no one competing with user m on that channel k and none of the constraints (i.e., (3), (4)) are handled in (13). Thus, we constrain to ${p}_{m,k}={P}_{max}^{\mathrm{TX}}$.

Block B: For a given channel k, the repeat loop handles sequentially and independently the interference at the current worst interfered PU, ${l}_{k}^{\ast}$. The independent handling of the PUs means that the update to satisfy the current worst PU could cancel the previously handled worst PU’s interference constraint. within the repeat loop. Thus, if any given PU reappears a second time (i.e., already ${l}_{k}^{\ast}\in {\mathcal{\mathcal{L}}}^{\left(v\right)}$), all the remaining updates in the current repeat loop cannot increase the power (i.e., B_{duplicate}=ON).

Block C: The power update in Block C satisfying the power constraint (4) is handled independently from the power update in Block B satisfying the interference constraint (3). As such, power updates from Block C can violate the interference constraint (3). To make the final solution always feasible, after ELCI’s convergence criteria^{d} is satisfied, i.e., f(P(t))−f(P(t−1))≤ε_{0}, the algorithm performs an additional Finaliteration. The Finaliteration assures that all the constraints (i.e., (3) and (4)) are satisfied when terminating the ELCI algorithm thanks to Block C (i.e., through min(tm p_{ k },p_{m,k}(t))).
It is interesting to note that the power updates in Blocks B and C, generally, contract the powers to fulfill the different constraints, whereas Block A expand them. Although ELCI separates the interferencelimited update (i.e., (14)) and the sumpowerlimited update (i.e., (15)) cases, the iterative method presented in Algorithm 1 basically aims to recombine (yet nonoptimal) the two independent updates. Thus, ELCI does not only aim one of the two system cases, as opposed to, e.g., [8].
5 Performance and complexity
5.1 MARL
5.2 SCVX/LSSCVX
Although the convexification approach in [11] has been generally considered to be quite efficient, it does not necessarily converge to the globally optimal solution(s) due to the condensation approximations. An improper initialization may also impact its optimality performance [2]. Although not addressed in this current article, [30] provides some efficient methods for guessing good initial points. The barrier method (classical IPM), used in this article to solve the convex optimization (8), has the nice property that the number of Newton steps grows very slowly with the problem dimension [10]. However, the computational effort to carry out one Newton step also grows with the dimension. As explained in [31], in general, when exact second derivatives can be computed with reasonable computational effort, it is usually a good idea to use them, since the IPM normally converges in fewer iterations and is more robust. When the problem has a dense Hessian or nonsparse Hessian, using the quasiNewton approximation might be better, even if the number of iterations increases, since the computation time per iteration for the search direction using the exact derivative might be significantly higher. However, since we noticed some losses with the quasiNewton (BFGS) compared to the IPM, we use the latter approach in our simulations where the Hessian for the Lagrangian of (8) is provided as appendix.
5.3 ELCI
The suboptimality of ELCI is mainly due to the fact that the constraints (3) and (4) are taken into account in alternation instead of simultaneously. In order to circumvent possible local optima, most of the heuristics algorithms proposed in the literature can repeat the locallyoptimal algorithm with different random initial values. However, like MARL, we always initialize ${p}_{m,k}={P}_{max}^{\mathrm{TX}}\phantom{\rule{1em}{0ex}}\forall (m,k)$. We now characterize the complexity of ELCI for the worst case behavior. In particular, we focus on the notable total number of LGM computations denoted by N_{ L } and the total number of updates (13), (14), and (15) denoted by N_{ U }. It is easy to see that only the LGM computations has nonnegligible complexity and vary with the problem size. We define I as the total number of iterations, where one iteration represents the loop composed of Blocks A, B, and C. The size of I is influenced by the number of SUs and channels, as well as the level of interference interaction in the system. In our various simulations I is relatively small (i.e., average range [10–20]). In the worst case, in Block B, all PUs can be violated and processed twice (i.e., using B_{duplicate} in Block B). Thus, Block B needs at the most K2L LGM computations per iteration. It easy to see that Block C needs at the most M LGM computations. Therefore, the ELCI algorithm yields at worst N_{ L }=I×(K 2L + M) and N_{ U }=I×(MK + K 2LM + MK).
Although ELCI is not proved to necessarily converge, extensive simulations (i.e., some presented in Section 6.) indicate that the algorithm, always converges, or approximately converges with continuous slight oscillation^{d}. As later shown, comparing ELCI to LSSCVX algorithm no divergence of the former algorithm has been observed.
6 Numerical experiments
This section compares through various numerical experiments the performance of ELCI against LSSCVX.
We define the channel gain such that ${g}_{m,{n}_{m}}^{\left(k\right)}={d}_{m,{n}_{m}}^{\alpha}1{0}^{{\beta}_{m,k}/10}$, where ${d}_{m,{n}_{m}}$ is the distance from the m th SU and the n_{ m }th receiver, α is the path loss exponent, and β_{m,k} is a random variable with Gaussian distribution $\mathcal{N}(0,{\sigma}^{2}),\sigma >0$. The same approach applies for the interference channel ${h}_{m,l}^{\left(k\right)}$ characterization. For simplicity we fix L=12, where each randomly located PU node simultaneously transmits (at 10 dBm) and receives, on 2 random channels out of K. The remaining parameters are set such that: α=2, σ=7 dB, ${I}_{\mathrm{th}}^{\mathrm{PU}}=40$ dBm, ${P}_{max}^{\mathrm{TX}}=30$ dBm, and N_{0}=−70 dBm. The simulations we provide are for both CB and adhoc networks, separately. The purpose of this separation is to independently analyze the adhoc environment which exhibits more complicated interference couplings compared to a CB network. For the CB case, we set N=4 adjacent cells, with equal number of randomly placed SUs (i.e., M/N) within a cell radius equal to 150 m each. For the adhoc case, SUs are randomly placed within a 500 m^{2} square area, with 10 and 50 m minimum and maximum distance respectively for the SUs pair. These small areas are purposely chosen to create enough complex interference coupling between different links, while the large variance of β_{m,k} implies that channel gains can highly fluctuate among different channels of a given user. Thus, a given user, e.g., the closest to the BS, will not be necessarily allocated all the channels.
7 Conclusion
The problem of interferencelimited sumrate capacity in wireless network has been one of the most widely investigated problem, with and without cognitive radio constraint. Yet, only very recently centralized algorithms like MARL have been proposed yielding the optimal solution. However, in practical numerical experiments MARL cannot cope with large problems. Motivated by this issue, we propose two alternatives. First, we propose a clear mathematical adaptation LSSCVX of the wellknown stateoftheart suboptimal algorithm, SCVX, to cope with large problems, while keeping the initial convergence proof unchanged. Second, as a further alternative, we propose a new lowcomplexity heuristic algorithm, ELCI, based on the fact that the optimal solution lies on the boundary of the feasible region. The key idea of ELCI is to handle the different constraints separately, and further use a specific formulation for the iterative power updates based on the KKT conditions of the problem. Compared to LSSCVX, ELCI was shown to provide an excellent tradeoff for very largescale system applications where both good performance and low complexity is required.
Appendix 1
Endnotes
^{a} Simple attribution in terms of the highest channel power. In case each subchannel have different gains, a SU selects the BS with the best channel averaged over all subchannels.
^{b}$\sum _{i=1}^{N}{b}^{\left(i\right)}{p}_{1}^{{a}_{1}^{\left(i\right)}}{p}_{1}^{{a}_{2}^{\left(i\right)}}\dots {p}_{\mathrm{MK}}^{{a}_{\mathrm{MK}}^{\left(i\right)}}$ is a posynomial composed of N monomials; p is the optimization variable, where the initial matrix optimization variable P of size {M,K} is simply represented into a vector format p of size {MK,1}; b^{(i)}>0 and ${a}_{j}^{\left(i\right)}\in \mathcal{R},\forall (i,j)$.
^{c} IPM is one of the most popular generic approach for solving any convex problems, but one can also use other generic methods, e.g., cuttingplane method.
^{d} When ε_{0}is too small, a continuous small oscillation may appear, and the convergence criteria (i.e., f(P(t))−f(P(t−1))≤ε_{0}) cannot be satisfied. In such a case it suffices to terminate the algorithm and apply the Finaliteration.
Declarations
Authors’ Affiliations
References
 Weeraddana PC, Codreanu M, Latvaaho M, Ephremides A: Weighted sumrate maximization for a set of interfering links via branch and bound. IEEE Trans. Signal Process 2011, 59(8):39773996.MathSciNetView ArticleGoogle Scholar
 Qian LP, Jun Y: Monotonic optimization for nonconcave power control in multiuser multicarrier network systems. In Proc. IEEE INFOCOM. Rio de Janeiro, Brazil; 2009.Google Scholar
 Eriksson K, Shi S, Vucic N, Schubert M, Larsson EG: Globally optimal resource allocation for achieving maximum weighted sum rate. In Proc. IEEE GLOBECOM. Fl, Miami, USA; 2010.Google Scholar
 Tan CW, Friedland S, Low SH: Spectrum management in multiuser cognitive wireless networks: optimality and algorithm. IEEE J. Sel. Areas Commun 2011, 29(2):421430.View ArticleGoogle Scholar
 Xing Y, Mathur CN, Haleem MA, Chandramouli R, Subbalakshmi KP: Dynamic spectrum access with QoS and interference temperature constraints. IEEE Trans. Mob. Comput 2007, 6(4):423433.View ArticleGoogle Scholar
 Jin Q, Yuan D, Guan Z: Distributed geometricprogrammingbased power control in cellular cognitive radio networks. In Proc. IEEE VTC. Barcelona, Spain; 2009.Google Scholar
 Hossain E, Niyato D, Han Z: Dynamic Spectrum Access and Management in Cognitive Radio Networks. Cambridge University Press, Cambridge; 2009.View ArticleGoogle Scholar
 Khoshkholgh MG, Navaie K, Yanikomeroglu H: Impact of the secondary service transmit power constraint on the achievable capacity of spectrum sharing in Rayleigh fading environment. IEEE Commun. Lett 2008, 12(12):856867.View ArticleGoogle Scholar
 Zhang L, Xin Y, Liang YC, Poor HV: Cognitive multiple access channels: optimal power allocation for weighted sum rate maximization. IEEE Trans. Commun 2009, 57(9):27542762.View ArticleGoogle Scholar
 Boyd S, Vandenberghe L: Convex Optimization. Cambridge University Press, Cambridge; 2004.View ArticleMATHGoogle Scholar
 Chiang M, Tan C, Palomar D, O’Neill D, Julian D: Power control by geometric programming. IEEE Trans. Wirel. Commun 2007, 6(7):26402651.View ArticleGoogle Scholar
 Qian LP, Zhang YJ, Huang J: MAPEL: achieving global optimality for a nonconvex wireless power control problem. IEEE Trans. Wirel. Commun 2009, 8(3):15531563.View ArticleGoogle Scholar
 Kim DI, Le LB, Hossain E: Joint rate power allocation for cognitive radios in dynamic spectrum access environment. IEEE Trans. Wireless Commun 2008, 7(12):55175527.View ArticleGoogle Scholar
 Attar A, Holland O, Nakhai M, Aghvami A: Interferencelimited resource allocation for cognitive radio in orthogonal frequencydivision multiplexing networks. IET Commun 2008, 2(6):806814. 10.1049/ietcom:20070355View ArticleGoogle Scholar
 Ma Y, Kim D, Leith A: Weighted sum rate optimization of multicell cognitive radio networks. In Proc. IEEE GLOBECOM. NewOrleans, USA; 2008.Google Scholar
 Yu D, Cioffi JM: Iterative waterfilling for optimal resource allocation in OFDM multipleaccess and broadcast channels. In Proc. IEEE GLOBECOM. San Francisco; 2006.Google Scholar
 Yu W, Ginis G, Cioffi JM: Distributed multiuser power control for digital subscriber lines. IEEE J. Sel. Top. Signal Process 2002, 20(5):11051115.Google Scholar
 Yu W, Lui R: Dual methods for nonconvex spectrum optimization of multicarrier systems. IEEE Trans. Commun 2006, 54(7):13101322.View ArticleGoogle Scholar
 Papandriopoulos J, Evans J: Lowcomplexity distributed algorithms for spectrum balancing in multiuser DSL networks. In Proc. IEEE ICC. Istanbul, Turkey; 2006.Google Scholar
 Qian LP, Zhang YJ, Chiang M: Globally optimal distributed power control for nonconcave utility maximization. In Proc. IEEE GLOBECOM. Miami, Florida, USA; 2010.Google Scholar
 Hande P, Rangan S, Chiang M, Wu X: Distributed uplink power control for optimal SIR assignment in cellular data networks. IEEE/ACM Trans. Network 2008, 16(6):14301443.View ArticleGoogle Scholar
 Vijayandran L, Byun SS, Øien GE, Ekman T: Increasing sum rate in multiband cognitive radio networks by centralized power allocation schemes. In Proc. IEEE PIMRC. Tokyo, Japan; 2009.Google Scholar
 SENDORA project: EU, FP7. available at: http://www.sendora.eu/
 Girnyk M, Xiao M, Rasmussen L: Optimal power allocation in multihop cognitive radio networks. In Proc. IEEE PIMRC. Toronto, Canada; 2011.Google Scholar
 Luo ZQ, Zhang S: Dynamic spectrum management: complexity and duality. IEEE J. Sel. Top. Signal Process 2008, 2: 5773.View ArticleGoogle Scholar
 Hayashi S, Luo ZQ: Spectrum management for interferencelimited multiuser communication systems. IEEE Trans. Inf. Theory 2009, 55(3):11531175.MathSciNetView ArticleGoogle Scholar
 Le L, Hossain E: Resource allocation for spectrum underlay in cognitive radio networks. IEEE Trans. Wirel. Commun 2008, 7(12):53065315.View ArticleGoogle Scholar
 Yih C, Geranotis E: Centralized power allocation algorithms for OFDM cellular networks. In Proc. IEEE MILCOM. Boston, USA; 2003.Google Scholar
 Nocedal J, Wight S: Numerical Optimization. Springer, Berlin; 2006.MATHGoogle Scholar
 Chinneck J: Feasibility and Infeasibility in Optimization: Algorithms and Computational Methods. Springer, Berlin; 2007.Google Scholar
 Wachter A, Biegler LT: On the implementation of a primaldual interior point filter line search algorithm for largescale nonlinear programming. Math. Programm 2006, 106(1):2557. 10.1007/s101070040559yMathSciNetView ArticleGoogle Scholar
Copyright
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.