Home > Research > Publications & Outputs > User Scheduling in NOMA Random Access Using Con...

Electronic data

  • accepted version

    Rights statement: © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

    Accepted author manuscript, 604 KB, PDF document

View graph of relations

User Scheduling in NOMA Random Access Using Contextual Multi-Armed Bandits

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Forthcoming

Standard

User Scheduling in NOMA Random Access Using Contextual Multi-Armed Bandits. / Wang, Weixuan; Yu, Wenjuan; Foh, Chuan Heng et al.
Proceedings of 2022 IEEE Globecom Workshops (GC Wkshps). IEEE, 2022.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Wang, W, Yu, W, Foh, CH, Gao, D & Ni, Q 2022, User Scheduling in NOMA Random Access Using Contextual Multi-Armed Bandits. in Proceedings of 2022 IEEE Globecom Workshops (GC Wkshps). IEEE, IEEE Global Communications Conference 2022, Rio de Janeiro, Brazil, 4/12/22.

APA

Wang, W., Yu, W., Foh, C. H., Gao, D., & Ni, Q. (in press). User Scheduling in NOMA Random Access Using Contextual Multi-Armed Bandits. In Proceedings of 2022 IEEE Globecom Workshops (GC Wkshps) IEEE.

Vancouver

Wang W, Yu W, Foh CH, Gao D, Ni Q. User Scheduling in NOMA Random Access Using Contextual Multi-Armed Bandits. In Proceedings of 2022 IEEE Globecom Workshops (GC Wkshps). IEEE. 2022

Author

Wang, Weixuan ; Yu, Wenjuan ; Foh, Chuan Heng et al. / User Scheduling in NOMA Random Access Using Contextual Multi-Armed Bandits. Proceedings of 2022 IEEE Globecom Workshops (GC Wkshps). IEEE, 2022.

Bibtex

@inproceedings{99056285843d43bfb383601a7a538d3e,
title = "User Scheduling in NOMA Random Access Using Contextual Multi-Armed Bandits",
abstract = "Random access (RA) is a common technique to admit users to a network. Non-orthogonal multiple access-based RA (NOMA-RA) is a promising solution to support a large number of devices competing to access a limited number of radio resources. This paper aims to propose an intelligent access control and user scheduling technique for NOMA-RA by leveraging machine learning (ML) algorithms. We first theoretically derive the maximum throughput of NOMA-RA and the optimal access probabilities for all NOMA power levels, which can serve as the upper bound in the ideal environment. We then introduce our ML design based on multi-armed bandit (MAB) that controls users participation and their NOMA channel access to achieve the optimal throughput. Our ML design consists of two ML agents where the first agent manages the flow of traffic entering the preamble selection process and the second agent controls the user access to NOMA channels. To achieve the joint optimization of both decisions, the outcome of the first agent is used as a context for the second agent to synchronize its learning, while the overall performance is used as a feedback to both agents. Simulation experiments confirm the effectiveness of our joint agent design and its ability to make joint decisions to achieve the optimal performance.",
author = "Weixuan Wang and Wenjuan Yu and Foh, {Chuan Heng} and Deyun Gao and Qiang Ni",
year = "2022",
month = sep,
day = "19",
language = "English",
booktitle = "Proceedings of 2022 IEEE Globecom Workshops (GC Wkshps)",
publisher = "IEEE",
note = "IEEE Global Communications Conference 2022, IEEE Globecom 2022 ; Conference date: 04-12-2022 Through 08-12-2022",
url = "https://globecom2022.ieee-globecom.org/",

}

RIS

TY - GEN

T1 - User Scheduling in NOMA Random Access Using Contextual Multi-Armed Bandits

AU - Wang, Weixuan

AU - Yu, Wenjuan

AU - Foh, Chuan Heng

AU - Gao, Deyun

AU - Ni, Qiang

PY - 2022/9/19

Y1 - 2022/9/19

N2 - Random access (RA) is a common technique to admit users to a network. Non-orthogonal multiple access-based RA (NOMA-RA) is a promising solution to support a large number of devices competing to access a limited number of radio resources. This paper aims to propose an intelligent access control and user scheduling technique for NOMA-RA by leveraging machine learning (ML) algorithms. We first theoretically derive the maximum throughput of NOMA-RA and the optimal access probabilities for all NOMA power levels, which can serve as the upper bound in the ideal environment. We then introduce our ML design based on multi-armed bandit (MAB) that controls users participation and their NOMA channel access to achieve the optimal throughput. Our ML design consists of two ML agents where the first agent manages the flow of traffic entering the preamble selection process and the second agent controls the user access to NOMA channels. To achieve the joint optimization of both decisions, the outcome of the first agent is used as a context for the second agent to synchronize its learning, while the overall performance is used as a feedback to both agents. Simulation experiments confirm the effectiveness of our joint agent design and its ability to make joint decisions to achieve the optimal performance.

AB - Random access (RA) is a common technique to admit users to a network. Non-orthogonal multiple access-based RA (NOMA-RA) is a promising solution to support a large number of devices competing to access a limited number of radio resources. This paper aims to propose an intelligent access control and user scheduling technique for NOMA-RA by leveraging machine learning (ML) algorithms. We first theoretically derive the maximum throughput of NOMA-RA and the optimal access probabilities for all NOMA power levels, which can serve as the upper bound in the ideal environment. We then introduce our ML design based on multi-armed bandit (MAB) that controls users participation and their NOMA channel access to achieve the optimal throughput. Our ML design consists of two ML agents where the first agent manages the flow of traffic entering the preamble selection process and the second agent controls the user access to NOMA channels. To achieve the joint optimization of both decisions, the outcome of the first agent is used as a context for the second agent to synchronize its learning, while the overall performance is used as a feedback to both agents. Simulation experiments confirm the effectiveness of our joint agent design and its ability to make joint decisions to achieve the optimal performance.

M3 - Conference contribution/Paper

BT - Proceedings of 2022 IEEE Globecom Workshops (GC Wkshps)

PB - IEEE

T2 - IEEE Global Communications Conference 2022

Y2 - 4 December 2022 through 8 December 2022

ER -