Home > Research > Publications & Outputs > User Scheduling in NOMA Random Access Using Con...

Electronic data

  • accepted version

    Rights statement: © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

    Accepted author manuscript, 604 KB, PDF document

View graph of relations

User Scheduling in NOMA Random Access Using Contextual Multi-Armed Bandits

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Forthcoming
Close
Publication date19/09/2022
Host publicationProceedings of 2022 IEEE Globecom Workshops (GC Wkshps)
PublisherIEEE
<mark>Original language</mark>English
EventIEEE Global Communications Conference 2022 - Rio de Janeiro, Brazil, Rio de Janeiro, Brazil
Duration: 4/12/20228/12/2022
https://globecom2022.ieee-globecom.org/

Conference

ConferenceIEEE Global Communications Conference 2022
Abbreviated titleIEEE Globecom 2022
Country/TerritoryBrazil
CityRio de Janeiro
Period4/12/228/12/22
Internet address

Conference

ConferenceIEEE Global Communications Conference 2022
Abbreviated titleIEEE Globecom 2022
Country/TerritoryBrazil
CityRio de Janeiro
Period4/12/228/12/22
Internet address

Abstract

Random access (RA) is a common technique to admit users to a network. Non-orthogonal multiple access-based RA (NOMA-RA) is a promising solution to support a large number of devices competing to access a limited number of radio resources. This paper aims to propose an intelligent access control and user scheduling technique for NOMA-RA by leveraging machine learning (ML) algorithms. We first theoretically derive the maximum throughput of NOMA-RA and the optimal access probabilities for all NOMA power levels, which can serve as the upper bound in the ideal environment. We then introduce our ML design based on multi-armed bandit (MAB) that controls users participation and their NOMA channel access to achieve the optimal throughput. Our ML design consists of two ML agents where the first agent manages the flow of traffic entering the preamble selection process and the second agent controls the user access to NOMA channels. To achieve the joint optimization of both decisions, the outcome of the first agent is used as a context for the second agent to synchronize its learning, while the overall performance is used as a feedback to both agents. Simulation experiments confirm the effectiveness of our joint agent design and its ability to make joint decisions to achieve the optimal performance.