This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Power-Efficient Optimization for Coexisting Semantic and Bit-Based Users in NOMA Networks

Ximing Xie, , Fang Fang, , Lan Zhang, ,
and Xianbin Wang
Ximing Xie, Fang Fang and Xianbin Wang are with the Department of Electrical and Computer Engineering, and Fang Fang is also with the Department of Computer Science, Western University, London, ON N6A 3K7, Canada (e-mail: {xxie269, fang.fang, xianbin.wang}@uwo.ca).Lan Zhang is with the Department of Electrical and Computer Engineering, Clemson University, Clemson, SC 29634 USA (e-mail: [email protected]).
Abstract

Semantic communication focuses on transmitting the meaning of data, aiming for efficient, relevant communication, while non-orthogonal multiple access (NOMA) enhances spectral efficiency by allowing multiple users to share the same spectrum. Integrating semantic users into a NOMA network with bit-based users improves both transmission and spectrum efficiency. However, the performance metric for semantic communication differs significantly from that of traditional communication, posing challenges in simultaneously meeting individual user demands and minimizing transmission power, especially in scenarios with coexisting semantic and bit-based users. Furthermore, the different hardware architectures of semantic and bit-based users complicate the implementation of successive interference cancellation (SIC). To address these challenges, in this paper, we propose a clustered framework to mitigate the complexity of SIC and two multiple access (MA) schemes, e.g., pure cluster-based NOMA (P-CNOMA) and hybrid cluster-based NOMA (H-CNOMA), to minimize the total transmission power. The P-CNOMA scheme can achieve the minimum transmission power, but may not satisfy the high quality of service (QoS) requirement. In contrast, H-CNOMA addresses these issues with a slight increase in power and a reduced semantic rate. These two schemes complement each other, enabling an adaptive MA selection mechanism that adapts to specific network conditions and user requirements.

Index Terms:
beamforming design, non-orthogonal multiple access (NOMA), semantic communication

I Introduction

Rapid growth in connected devices and wireless applications, such as remote healthcare (RHC) [1], virtual reality (VR), and augmented reality (AR) [2], is driving an unprecedented increase in data traffic. As multimedia technologies continue to mature, the demand for ubiquitous high-quality communication services has increased, resulting in a significant increase in the volume of data that must be transmitted. This increased data traffic has led to major challenges in wireless communication systems, especially in terms of resource scarcity and spectrum constraints. Addressing these challenges has become crucial to ensuring that future communication systems can meet user expectations. There are two main directions to overcome these challenges, which are improving resource utilization efficiency and reducing overall traffic. One efficient approach to enhance spectrum efficiency is non-orthogonal multiple access (NOMA), which allows multiple users to share the same resource block by allocating different power levels. This approach uses superposition coding at the transmitter and successive interference cancellation (SIC) at the receiver to improve spectrum efficiency [3, 4]. On the other hand, semantic communication, which focuses on conveying the intended meaning of information instead of transmitting raw data, has garnered considerable attention to reduce the amount of data and improve transmit efficiency [5, 6, 7]. Recent advances in deep learning have further empowered semantic communication, which enables the efficient processing of diverse data types, such as text, speech, images, and video [8, 9, 10, 11]. As a result, it is natural to explore the integration of semantic communication with NOMA networks motivated by these advantages.

I-A Related Works

Shannon and Weaver first introduced the concept of semantic communication in [12], 1949. After that, research on semantic communication has continued to progress steadily, such as the concept of semantic web [13] and the novel framework of semantic communication [14]. With the rapid development in artificial intelligence and machine learning in recent years, semantic communication has entered a new era. Many studies focus on improving performance, particularly in terms of semantic similarity or semantic accuracy, across various data types, including text, speech, images, and video. The authors of [15] proposed DeepSC for text transmission, which outperforms than conventional schemes. The authors of [8] extended DeepSC to a multi-user scenario for text data transmission. Then, the research shifts focus to various data types. For example, the authors of [9] presented a deep learning-enabled semantic communication system that converts speech transmission to text-related semantic features, significantly reducing data requirements while maintaining high performance, the authors of [10] proposed an end-to-end semantic communication system for efficient image transmission by implementing a deep learning-based classifier at the sender and a diffusion model at the receiver and the authors of [11] extended the method in [10] to transmit videos by converting videos into frames. Besides the above works that primarily focus on enhancing transmission performance, some works investigate semantic communication from a task-oriented perspective. For example, the authors of [16] established a multi-user semantic communication system called MU-DeepSC, which leverages correlated image and text data for the visual question answering (VQA) task. MU-DeepSC effectively processes and combines semantic information from images and text to accurately predict answers. The authors in [17] developed a semantic communication system based on deep learning that simultaneously performs image recovery and classification tasks by integrating JSCC. The system employs a novel loss function to enhance robustness and reduce communication overhead under varying channel conditions.

The aforementioned studies focus primarily on optimizing semantic communication at the structural level. Specifically, they emphasize designing innovative encoders and decoders or developing new system architectures by integrating novel components. However, since most semantic devices function within wireless communication networks, some research shifts the focus to network-level optimization. This includes adopting NOMA techniques and designing efficient resource allocation schemes to enhance overall performance. For example, recent work [18] studied the downlink scenario where the base station (BS) serves multiple semantic users by adopting NOMA. However, conventional bit communication still dominates at current stage, it is unrealistic to completely replace all bit-based devices with semantic devices. Hence, it is more worthy to investigate the practical scenario where semantic users and bit-based users co-exist. Recently, work [19] studied the simplest case where one semantic user and one traditional user simultaneously transmit data to a single antenna BS by adopting NOMA. Based on [19], the authors also proposed a semi-NOMA scheme for this case in [20].

I-B Motivations and Contributions

Given the significant performance benefits of both NOMA and semantic communication, extending the semantic-bit NOMA network to a multi-user scenario is a critical research direction. Additionally, with the growing emphasis on green communication, many applications demand systems that deliver high performance while minimizing energy consumption. Therefore, it is essential to investigate resource allocation strategies in multi-user semantic-bit NOMA networks to achieve minimal transmission power. To the best of our knowledge, no existing work has addressed resource allocation optimization in multi-user NOMA systems where semantic and bit-based users coexist. In this paper, we focus on this challenging scenario where one BS serves multiple semantic users and multiple conventional bit users simultaneously by adopting NOMA. To introduce spatial diversity, the BS is assumed to be equipped with multiple antennas, which consequently introduces more challenges. We propose a multi-cluster NOMA network to accommodate each two users into one cluster. Two MA transmission schemes are proposed: the P-CNOMA scheme and the H-CNOMA scheme. For the P-CNOMA scheme, an iteration-free algorithm is developed to efficiently solve the optimization problem. The optimization problem for the H-CNOMA scheme is reformulated as a constraint-free problem, which is effectively solved using a deep neural network.

The main contributions of this paper are summarized as follows:

  • We propose a multi-cluster NOMA network that groups semantic and conventional bit users into clusters, with each cluster comprising two users of the same type to take care of two different hardware architectures. SIC is applied only within each cluster, treating signals from other clusters as interference, thus significantly reducing the complexity of the SIC process. The BS, equipped with multiple antennas, simultaneously serves multiple clusters by generating a unique beam for each cluster. Within the same cluster, two users share the same beam, performing power allocation accordingly.

  • We develop the P-CNOMA scheme to minimize the total transmission power. The formulated problem is non-convex due to the coupling of the beamforming vector and the power allocation coefficient. Moreover, since the objective function is not directly related to the power allocation coefficient, the alternating algorithm may exhibit poor convergence performance. We propose an iteration-free algorithm to solve the problem. The formulated problem is first transformed to a problem without composite constraints 111The composite constraint in this paper refers to a constraint that can be equivalently decomposed into two or more individual constraints. For example, min(A,B)C\min(A,B)\geq C is equivalent to ACA\geq C and BCB\geq C, hence, min(A,B)C\min(A,B)\geq C is a composite constraint. By determining the upper and lower bounds of the power allocation coefficient, the primal problem is approximately transformed into a single-variable optimization problem. Subsequently, semi-definite relaxation (SDR) is employed to efficiently solve this problem.

  • We develop the H-CNOMA scheme to compensate for the shortcomings of P-CNOMA. Although the aforementioned P-CNOMA scheme can achieve the lowest transmission power, it faces feasibility issues, particularly when conventional bit users demand high data rates or when semantic users require high semantic similarity. In the H-CNOMA scheme, the primal problem can be solved on a per-cluster basis due to the absence of inter-cluster interference. It is reformulated into a constraint-free problem, and a deep neural network is introduced to efficiently find the solution. This scheme can meet the high data rate demands of bit users and the high semantic similarity requirements of semantic users with a slight increase in transmission power. However, the maximum achievable semantic rate is constrained by the use of multiple frequency sub-channels. Consequently, these two schemes complement each other, and the choice between them should be made based on specific system requirements.

  • The simulation results introduce the concepts of effective semantic similarity, the semantic similarity domination region, and the semantic rate domination region. We analyze the impact of these two regions on the effective semantic similarity from the simulation results. Generally, the effective semantic similarity matches the target semantic similarity when the target semantic rate falls within the similarity domination region. However, when the target semantic rate falls within the semantic rate domination region, the effective semantic similarity depends solely on the target semantic rate. Moreover, reveal how the two proposed MA schemes effectively complement one another.

I-C Organization and Notation

The rest of the paper is organized as follows. In Section II, the system model is introduced and the total transmission power minimization problem is formulated. In Section III, two schemes are proposed along with the optimization algorithms. In Section IV, simulation results are provided. Finally, a conclusion is summarized in Section V.

Notations: 𝐗\mathbf{X}, 𝐱\mathbf{x} and xx represent matrix, vector and scalar, respectively. 𝐱H\mathbf{x}^{H} represents the conjugate transpose of vector 𝐱\mathbf{x}. N×1\mathbb{C}^{N\times 1} represents the space of a N×1N\times 1 complex vector and N×M\mathbb{C}^{N\times M} represents the space of a N×MN\times M complex matrix. ||.||2||.||_{2} represents l2l_{2} norm.

II System Model and Problem Formulation

The system model shown in Fig. 1 consists of a BS equipped with NN antennas, serving MM single-antenna semantic users (S-users) and MM single-antenna bit users (B-users). S-users and B-users receive signals in a semantic communication manner and a traditional communication manner, respectively. It is known that the complexity of SIC grows significantly with the number of users increasing [21]. To mitigate this, we assume that each cluster consists only of two users and that SIC is applied only within each cluster. The BS simultaneously transmits semantic and bit streams to the S-users and B-users and generates a unique beam for each cluster, with two users in the same cluster sharing the beam through different power levels.

Due to the different decoding methods employed by the two types of communication, the hardware architecture of a semantic device differs from that of a traditional device. Specifically, semantic devices are equipped with artificial intelligence (AI) chips that store pre-trained models for decoding semantic information, while traditional devices use digital signal processing (DSP) chips to decode bit information. To reduce hardware complexity, it is assumed that semantic users only decode semantic information and bit users only decode bit information. Consequently, each cluster consists of users of the same type.

The clustering strategy pairs users with the most disparate channel gains to improve SIC performance. According to previous work [22, 23], a greater disparity in channel gains between users can significantly enhance the efficiency of SIC in NOMA systems. This performance enhancement arises because SIC relies on distinguishing between user signals based on power levels. When there is a larger difference in the channel gains of the users, it becomes easier to allocate power such that one user’s signal can be decoded without interference from the other. Specifically, the user with the highest channel gain is paired with the user having the lowest channel gain, followed by pairing the second-highest user with the second-lowest channel gain user, and so on.

II-A Semantic Rate

It is critical to define the semantic rate for network-level performance optimization. In this paper, we assume the typical DeepSC text transmission system described in [24] is deployed. Let KK denote the average number of semantic symbols per word and γ\gamma denote the SNR. According to [24], semantic similarity, which describes the similarity between the recovered sentence and the original sentence in a DeepSC text transmission system, is highly related to KK and γ\gamma. The resultant expression of the semantic similarity can be a function of KK and γ\gamma, i.e., ε(K,γ)\varepsilon\left(K,\gamma\right). [25] evaluated the semantic rate based on the semantic similarity, which is given by

S=WIKLε(K,γ),S=\frac{WI}{KL}\varepsilon\left(K,\gamma\right), (1)

where WW denotes the transmission bandwidth as well as the symbol rate and II denotes average semantic information per sentence measured by semantic unit per second (suts). To obtain a traceable closed-form expression of the semantic similarity, [20] utilized a data regression method to approximate ε(K,γ)\varepsilon\left(K,\gamma\right) by a generalized logistic function. For any given KK, the semantic similarity can be expressed as follows:

εK(γ)=AK,L+AK,RAK,L(1+elk(γγk,0))1vk,\varepsilon_{K}\left(\gamma\right)=A_{K,L}+\frac{A_{K,R}-A_{K,L}}{\left(1+e^{-l_{k}\left(\gamma-\gamma_{k,0}\right)}\right)^{\frac{1}{v_{k}}}}, (2)

where AK,LA_{K,L} and AK,RA_{K,R} are both positive and respectively denote the left asymptote and the right asymptote. lkl_{k} is the logistic growth rate, γk,0\gamma_{k,0} affects the logistic mid-point and vkv_{k} affects near which asymptote maximum growth occurs. Note that εK(γ)\varepsilon_{K}\left(\gamma\right) is monotonically increasing with γ\gamma, hence, we have AK,R>AK,LA_{K,R}>A_{K,L}.

Refer to caption
Figure 1: Multi-cluster NOMA semantic-bit system

II-B Problem Formulation

To reduce the complexity associated with SIC and hardware requirements, it is assumed that each cluster consists of only two users of the same type. In each cluster, which consists of either two S-users or two B-users 222It is assumed that MM is even, which means each type of users can be allocated into M2\frac{M}{2} clusters., the user with the higher channel gain is referred as the strong user, while the one with the lower channel gain is referred as the weak user. In the ii-th S-user cluster, the strong and weak users are denoted as Us,iS{\rm U}_{s,i}^{\rm S} and Us,iW{\rm U}_{s,i}^{\rm W}, respectively. Likewise, in the ii-th B-user cluster, they are represented as Ub,iS{\rm U}_{b,i}^{\rm S} and Ub,iW{\rm U}_{b,i}^{\rm W}. xs,iSx_{s,i}^{\rm S} and xs,iWx_{s,i}^{\rm W} are the corresponding signals of Us,iS{\rm U}_{s,i}^{\rm S} and Us,iW{\rm U}_{s,i}^{\rm W}, while xb,iSx_{b,i}^{\rm S} and xb,iWx_{b,i}^{\rm W} are corresponding signals to Ub,iS{\rm U}_{b,i}^{\rm S} and Ub,iW{\rm U}_{b,i}^{\rm W}. The superimposed signal transmitted by the BS can be expressed as follows:

𝐱HO=\displaystyle\mathbf{x}_{\rm HO}= i=1M2𝐰s,i(αs,ixs,iS+1αs,ixs,iW)\displaystyle\sum_{i=1}^{\frac{M}{2}}\mathbf{w}_{s,i}\left(\sqrt{\alpha_{s,i}}x_{s,i}^{\rm S}+\sqrt{1-\alpha_{s,i}}x_{s,i}^{\rm W}\right)
+\displaystyle+ i=1M2𝐰b,i(αb,ixb,jS+1αb,ixb,iW).\displaystyle\sum_{i=1}^{\frac{M}{2}}\mathbf{w}_{b,i}\left(\sqrt{\alpha_{b,i}}x_{b,j}^{\rm S}+\sqrt{1-\alpha_{b,i}}x_{b,i}^{\rm W}\right). (3)

𝐰s,iN×1\mathbf{w}_{s,i}\in\mathbb{C}^{N\times 1} and 𝐰b,iN×1\mathbf{w}_{b,i}\in\mathbb{C}^{N\times 1} represent beamforming vectors for the ii-th S-user cluster and ii-th B-user cluster, respectively. αs,i\alpha_{s,i} and αb,i\alpha_{b,i} respectively denote power allocation coefficients in the ii-th S-user cluster and B-user cluster. Thus, the received signal by Us,iS{\rm U}_{s,i}^{\rm S} and Us,iW{\rm U}_{s,i}^{\rm W} can be expressed as:

ys,iT=𝐡s,iTH𝐱HO+ns,iT,T{S,W},y_{s,i}^{\rm T}=\mathbf{h}_{s,i}^{{\rm T}H}\mathbf{x}_{\rm HO}+n_{s,i}^{\rm T},\rm{T}\in\{\rm{S},\rm{W}\}, (4)

where 𝐡s,iS\mathbf{h}_{s,i}^{\rm S} and 𝐡s,iW\mathbf{h}_{s,i}^{\rm W} denote the channel vectors on the BS-Us,iS{\rm U}_{s,i}^{\rm S} link and the BS-Us,iW{\rm U}_{s,i}^{\rm W} link, respectively, and ns,iSn_{s,i}^{\rm S} and ns,iWn_{s,i}^{\rm W} denote the zero-mean additive white Gaussian noise (AWGN) with variance σ2\sigma^{2}. Similarly, the received signal by Ub,iS{\rm U}_{b,i}^{\rm S} and Ub,iW{\rm U}_{b,i}^{\rm W} in the ii-th B-user cluster can be expressed as:

yb,iT=𝐡b,iTH𝐱HO+nb,iT,T{S,W}.y_{b,i}^{\rm T}=\mathbf{h}_{b,i}^{{\rm T}H}\mathbf{x}_{\rm HO}+n_{b,i}^{\rm T},\rm{T}\in\{\rm{S},\rm{W}\}. (5)

Let first consider the SIC procedure in S-user clusters. As SIC is only applied in each cluster, the decoding order is assumed to be that the strong user first decodes the weak user’s signal and then its own signal and the weak user directly decodes its own signal. During SIC, signals from users in other clusters are considered as interference. We assume the perfect channel state information (CSI) is available to all users and all signals have the unit power, satisfying 𝔼(|xs,iS|2)=𝔼(|xs,iW|2)=𝔼(|xb,iS|2)=𝔼(|xb,iW|2)=1,i\mathbb{E}\left(|x_{s,i}^{\rm S}|^{2}\right)=\mathbb{E}\left(|x_{s,i}^{\rm W}|^{2}\right)=\mathbb{E}\left(|x_{b,i}^{\rm S}|^{2}\right)=\mathbb{E}\left(|x_{b,i}^{\rm W}|^{2}\right)=1,\forall i with the expectation operation 𝔼()\mathbb{E}(\cdot). For the simple notation, we define a function to express inter-cluster interference to the ii-th S-user cluster through channel fading 𝐱\mathbf{x}, which is expressed as

s,i(𝐱)=k=1M2|𝐱H𝐰b,k|2+k=1kiM2|𝐱H𝐰s,k|2.\mathcal{I}_{s,i}(\mathbf{x})=\sum\limits_{k=1}^{\frac{M}{2}}|\mathbf{x}^{H}\mathbf{w}_{b,k}|^{2}+\sum\limits_{k=1\atop k\neq i}^{\frac{M}{2}}|\mathbf{x}^{H}\mathbf{w}_{s,k}|^{2}. (6)

Similarly, the inter-cluster interference function of the ii-th B-user cluster is expressed as

b,i(𝐱)=k=1M2|𝐱H𝐰s,k|2+k=1kiM2|𝐱H𝐰b,k|2.\mathcal{I}_{b,i}(\mathbf{x})=\sum\limits_{k=1}^{\frac{M}{2}}|\mathbf{x}^{H}\mathbf{w}_{s,k}|^{2}+\sum\limits_{k=1\atop k\neq i}^{\frac{M}{2}}|\mathbf{x}^{H}\mathbf{w}_{b,k}|^{2}. (7)

Therefore, the signal-to-interference-plus-noise ratio (SINR) of Us,iW{\rm U}_{s,i}^{\rm W}’s signal decoded by Us,iS{\rm U}_{s,i}^{\rm S} is given by

γs,iWS=(1αs,i)|𝐡s,iSH𝐰s,i|2αs,i|𝐡s,iSH𝐰s,i|2+s,i(𝐡s,iSH)+σ2,\gamma_{s,i}^{{\rm W}\rightarrow{\rm S}}=\frac{(1-\alpha_{s,i})|\mathbf{h}_{s,i}^{{\rm S}H}\mathbf{w}_{s,i}|^{2}}{\alpha_{s,i}|\mathbf{h}_{s,i}^{{\rm S}H}\mathbf{w}_{s,i}|^{2}+\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm S}H}\right)+\sigma^{2}}, (8)

After Us,iW{\rm U}_{s,i}^{\rm W}’s signal was successfully decoded, Us,iS{\rm U}_{s,i}^{\rm S} removes intra-cluster interference. Hence, the SNR of Us,iS{\rm U}_{s,i}^{\rm S}’s signal is given by

γs,iS=αs,i|𝐡s,iSH𝐰s,i|2s,i(𝐡s,iSH)+σ2.\gamma_{s,i}^{\rm S}=\frac{\alpha_{s,i}|\mathbf{h}_{s,i}^{{\rm S}H}\mathbf{w}_{s,i}|^{2}}{\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm S}H}\right)+\sigma^{2}}. (9)

The SNR of Us,iW{\rm U}_{s,i}^{\rm W}’s signal decoded by itself is given by

γs,iW=(1αs,i)|𝐡s,iWH𝐰s,i|2αs,i|𝐡s,iWH𝐰s,i|2+s,i(𝐡s,iWH)+σ2,\gamma_{s,i}^{{\rm W}}=\frac{(1-\alpha_{s,i})|\mathbf{h}_{s,i}^{{\rm W}H}\mathbf{w}_{s,i}|^{2}}{\alpha_{s,i}|\mathbf{h}_{s,i}^{{\rm W}H}\mathbf{w}_{s,i}|^{2}+\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm W}H}\right)+\sigma^{2}}, (10)

Then, the achievable semantic rate of Us,iS{\rm U}_{s,i}^{\rm S} and Us,iW{\rm U}_{s,i}^{\rm W} can be expressed as

SiS=WIKLεK(γs,iS),S_{i}^{\rm S}=\frac{WI}{KL}\varepsilon_{K}\left(\gamma_{s,i}^{\rm S}\right), (11)

and

SiW=min{WIKLεK(γs,iWS),WIKLεK(γs,iW)},S_{i}^{\rm W}=\min\left\{\frac{WI}{KL}\varepsilon_{K}\left(\gamma_{s,i}^{\rm W\rightarrow S}\right),\frac{WI}{KL}\varepsilon_{K}\left(\gamma_{s,i}^{\rm W}\right)\right\}, (12)

respectively.

The SIC procedure in B-user clusters is similar to the above. Therefore, the SINR of Ub,iW{\rm U}_{b,i}^{\rm W}’s signal decoded by Ub,iS{\rm U}_{b,i}^{\rm S} is given by

γb,iWS=(1αb,i)|𝐡b,iSH𝐰b,i|2αb,i|𝐡b,iSH𝐰b,i|2+b,i(𝐡b,iSH)+σ2,\gamma_{b,i}^{{\rm W}\rightarrow{\rm S}}=\frac{(1-\alpha_{b,i})|\mathbf{h}_{b,i}^{{\rm S}H}\mathbf{w}_{b,i}|^{2}}{\alpha_{b,i}|\mathbf{h}_{b,i}^{{\rm S}H}\mathbf{w}_{b,i}|^{2}+\mathcal{I}_{b,i}\left(\mathbf{h}_{b,i}^{{\rm S}H}\right)+\sigma^{2}}, (13)

After removing intra-cluster interference, the SNR when Ub,iS{\rm U}_{b,i}^{\rm S} decodes its own signal is given by

γb,iS=αb,i|𝐡b,iSH𝐰b,i|2b,i(𝐡b,iSH)+σ2.\gamma_{b,i}^{\rm S}=\frac{\alpha_{b,i}|\mathbf{h}_{b,i}^{{\rm S}H}\mathbf{w}_{b,i}|^{2}}{\mathcal{I}_{b,i}\left(\mathbf{h}_{b,i}^{{\rm S}H}\right)+\sigma^{2}}. (14)

As Ub,iW{\rm U}_{b,i}^{\rm W} directly decodes its own signal, the SNR can be expressed as follows:

γb,iW=(1αb,i)|𝐡b,iWH𝐰b,i|2αb,i|𝐡b,iWH𝐰b,i|2+b,i(𝐡b,iWH)+σ2,\gamma_{b,i}^{{\rm W}}=\frac{(1-\alpha_{b,i})|\mathbf{h}_{b,i}^{{\rm W}H}\mathbf{w}_{b,i}|^{2}}{\alpha_{b,i}|\mathbf{h}_{b,i}^{{\rm W}H}\mathbf{w}_{b,i}|^{2}+\mathcal{I}_{b,i}\left(\mathbf{h}_{b,i}^{{\rm W}H}\right)+\sigma^{2}}, (15)

Then, the achievable data rate of Ub,iS{\rm U}_{b,i}^{\rm S} and Ub,iW{\rm U}_{b,i}^{\rm W} can be expressed as

RiS=Wlog2(1+γb,iS),R_{i}^{\rm S}=W\log_{2}\left(1+\gamma_{b,i}^{\rm S}\right), (16)

and

RiW=min{Wlog2(1+γb,iWS),Wlog2(1+γb,iW)},R_{i}^{\rm W}=\min\left\{W\log_{2}\left(1+\gamma_{b,i}^{{\rm W}\rightarrow{\rm S}}\right),W\log_{2}\left(1+\gamma_{b,i}^{\rm W}\right)\right\}, (17)

respectively.

It is assumed that all S-users have the same target semantic rate S0S_{0} and target semantic similarity ε0\varepsilon_{0}, and all B-users have the same target data rate R0R_{0}. The transmission power minimization problem can be formulated as follows:

P0:\displaystyle{\rm P_{0}}: min{𝐖,𝜶}k=1M2(𝐰s,k22+𝐰b,k22)\displaystyle\min_{\{\mathbf{W},\bm{\alpha}\}}\quad\sum_{k=1}^{\frac{M}{2}}\left(||\mathbf{w}_{s,k}||_{2}^{2}+||\mathbf{w}_{b,k}||_{2}^{2}\right) (18a)
s.t.min(SiS,SiW)S0,i\displaystyle~{}\mathrm{s.t.}\;\;\;\min(S_{i}^{\rm S},S_{i}^{\rm W})\geq S_{0},\forall i (18b)
min(εK(γs,iS),εK(γs,iW),εK(γs,iWS))ε0,i\displaystyle\qquad\;\;\min\left(\varepsilon_{K}\left(\gamma_{s,i}^{\rm S}\right),\varepsilon_{K}\left(\gamma_{s,i}^{\rm W}\right),\varepsilon_{K}\left(\gamma_{s,i}^{\rm W\rightarrow S}\right)\right)\geq\varepsilon_{0},\forall i (18c)
min(RiS,RiW)R0,i\displaystyle\qquad\;\;\min\left(R_{i}^{\rm S},R_{i}^{\rm W}\right)\geq R_{0},\forall i (18d)
  0αs,i1,i\displaystyle\qquad\;\;0\leq\alpha_{s,i}\leq 1,\forall i (18e)
  0αb,i1,i,\displaystyle\qquad\;\;0\leq\alpha_{b,i}\leq 1,\forall i, (18f)

where 𝐖N×M\mathbf{W}\in\mathbb{C}^{N\times M} is a beamforming matrix collecting all beamforming vectors and 𝜶𝐑M\bm{\alpha}\in\mathbf{R}^{M} is a vector collecting all power allocation coefficients. Constraint (18b) guarantees each S-user to achieve the target semantic rate. Constraint (18c) is introduced to guarantee the minimal requirement of semantic similarity. The reason to introduce constraint (18c) is that the semantic rate can be large if the transmission bandwidth WW is sufficiently large even the semantic similarity is small according to (1). Therefore, the semantic similarity is another critical metric to evaluate the performance of semantic communication. Constraint (18d) guarantees each B-user to achieve the target data rate and constraints (18b), (18c) and (18d) jointly guarantee a successful SIC procedure.

III Optimization Algorithms

In this section, two MA transmission schemes are proposed. The first one is P-CNOMA scheme, where each user utilizes the entire bandwidth for signal transmission, but inter-cluster interference occurs. The second one is H-CNOMA scheme, where frequency sub-channels are allocated to each cluster to cancel inter-cluster interference, though this results in reduced transmission bandwidth resources.

III-A Pure Cluster-based NOMA Transmission Scheme

It is noted that two optimization variables, the beamforming vector and the power allocation coefficient, are coupled together in P0{\rm P_{0}}. One common method to solve a multi-variable optimization problem is the alternating algorithm, where one variable is fixed and only another is optimized. However, the power allocation coefficient will not affect the objective function of P0{\rm P_{0}} directly. As a result, the alternating algorithm may have the difficulty on convergence when solving this problem. The idea is to transfer P0{\rm P_{0}} to a problem only related to beamforming and then solve it by convex optimization.

According to the definition of semantic rate, constraint (18b) can be rewritten as

min(εK(γs,iS),εK(γs,iW),εK(γs,iWS))ε~0,i\min\left(\varepsilon_{K}\left(\gamma_{s,i}^{\rm S}\right),\varepsilon_{K}\left(\gamma_{s,i}^{\rm W}\right),\varepsilon_{K}\left(\gamma_{s,i}^{\rm W\rightarrow S}\right)\right)\geq\tilde{\varepsilon}_{0},\forall i (19)

where ε~0=KLS0WI\tilde{\varepsilon}_{0}=\frac{KLS_{0}}{WI}. It is noted that constraint (18c) and constraint (19) can be combined as one constraint, which is given by

min(εK(γs,iS),εK(γs,iW),εK(γs,iWS))ε¯0,i\min\left(\varepsilon_{K}\left(\gamma_{s,i}^{\rm S}\right),\varepsilon_{K}\left(\gamma_{s,i}^{\rm W}\right),\varepsilon_{K}\left(\gamma_{s,i}^{\rm W\rightarrow S}\right)\right)\geq\bar{\varepsilon}_{0},\forall i (20)

where ε¯0=max{ε0,ε~0}\bar{\varepsilon}_{0}=\max\{\varepsilon_{0},\tilde{\varepsilon}_{0}\} denotes the effective semantic similarity. Therefore, P0{\rm P_{0}} can be rewritten as

P1:\displaystyle{\rm P_{1}}: min{𝐖,𝜶}k=1M2(𝐰s,k22+𝐰b,k22)\displaystyle\min_{\{\mathbf{W},\bm{\alpha}\}}\quad\sum_{k=1}^{\frac{M}{2}}\left(||\mathbf{w}_{s,k}||_{2}^{2}+||\mathbf{w}_{b,k}||_{2}^{2}\right) (21a)
s.t.(20),(18d),(18e),(18f).\displaystyle~{}\mathrm{s.t.}\qquad\eqref{combined},\eqref{P03},\eqref{P04},\eqref{P05}.

P1{\rm P_{1}} is a non-convex problem because of constraint (18d) and constraint (20). According to optimization theory, constraint (20) can be equivalently split into three sub-constraints εK(γs,iS)ε¯0\varepsilon_{K}\left(\gamma_{s,i}^{\rm S}\right)\geq\bar{\varepsilon}_{0}, εK(γs,iW)ε¯0\varepsilon_{K}\left(\gamma_{s,i}^{\rm W}\right)\geq\bar{\varepsilon}_{0} and εK(γs,iWS)ε¯0\varepsilon_{K}\left(\gamma_{s,i}^{\rm W\rightarrow S}\right)\geq\bar{\varepsilon}_{0}, for any given ii. These three sub-constraints can be further recast into γs,iSεK1(ε¯0)\gamma_{s,i}^{\rm S}\geq\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0}), γs,iWεK1(ε¯0)\gamma_{s,i}^{\rm W}\geq\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0}) and γs,iWSεK1(ε¯0)\gamma_{s,i}^{\rm W\rightarrow S}\geq\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0}), where εK1\varepsilon_{K}^{-1} denotes the inverse function of (2). Similarly, constraint (18d) can be equivalently split into two sub-constraints RiSR0R_{i}^{\rm S}\geq R_{0} and RiWR0R_{i}^{\rm W}\geq R_{0}, which can be further rewritten as γb,iSγ0\gamma_{b,i}^{\rm S}\geq\gamma_{0}, γb,iWSγ0\gamma_{b,i}^{\rm W\rightarrow S}\geq\gamma_{0} and γb,iWγ0\gamma_{b,i}^{\rm W}\geq\gamma_{0} with γ0=2R0W1\gamma_{0}=2^{\frac{R_{0}}{W}}-1. As a result, P1{\rm P_{1}} can be recast into

P2:\displaystyle{\rm P_{2}}: min{𝐖,𝜶}k=1M2(𝐰s,k22+𝐰b,k22)\displaystyle\min_{\{\mathbf{W},\bm{\alpha}\}}\;\sum_{k=1}^{\frac{M}{2}}\left(||\mathbf{w}_{s,k}||_{2}^{2}+||\mathbf{w}_{b,k}||_{2}^{2}\right) (22a)
s.t.γs,iSεK1(ε¯0),i\displaystyle~{}\mathrm{s.t.}\quad\;\gamma_{s,i}^{\rm S}\geq\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0}),\forall i (22b)
γs,iWεK1(ε¯0),i\displaystyle\qquad\quad\gamma_{s,i}^{\rm W}\geq\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0}),\forall i (22c)
γs,iWSεK1(ε¯0),i\displaystyle\qquad\quad\gamma_{s,i}^{\rm W\rightarrow S}\geq\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0}),\forall i (22d)
γb,iSγ0,i\displaystyle\qquad\quad\gamma_{b,i}^{\rm S}\geq\gamma_{0},\forall i (22e)
γb,iWγ0,i\displaystyle\qquad\quad\gamma_{b,i}^{\rm W}\geq\gamma_{0},\forall i (22f)
γb,iWSγ0,i\displaystyle\qquad\quad\gamma_{b,i}^{\rm W\rightarrow S}\geq\gamma_{0},\forall i (22g)
(18e)(18f).\displaystyle\qquad\quad\eqref{P04}\;\eqref{P05}.

Although there is no min{}\min\{\cdot\} constraint in P2{\rm P_{2}}, constraints (22b)-(22g) are non-convex. Hence, P2{\rm P_{2}} is still a NP hard problem, which is difficult to be solved in polynomial time. After the algebraic transformation, constraint (22b) can be rewritten as follows

εK1(ε¯0)(s,i(𝐡s,iSH)+σ2)αs,i|𝐡s,iSH𝐰s,i|20,i.\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})\left(\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm S}H}\right)+\sigma^{2}\right)-\alpha_{s,i}|\mathbf{h}_{s,i}^{{\rm S}H}\mathbf{w}_{s,i}|^{2}\leq 0,\forall i. (23)

From (23), a relationship between αs,i\alpha_{s,i} and 𝐰s,i\mathbf{w}_{s,i} is obtained, which is

αs,iεK1(ε¯0)(s,i(𝐡s,iSH)+σ2)|𝐡s,iSH𝐰s,i|2,i.\alpha_{s,i}\geq\frac{\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})\left(\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm S}H}\right)+\sigma^{2}\right)}{|\mathbf{h}_{s,i}^{{\rm S}H}\mathbf{w}_{s,i}|^{2}},\forall i. (24)

Similarly, another two relationships between αs,i\alpha_{s,i} and 𝐰s,i\mathbf{w}_{s,i} can be obtained from (22c) and (22d), which are

αs,i|𝐡s,iWH𝐰s,i|2εK1(ε¯0)(s,i(𝐡s,iWH)+σ2)(εK1(ε¯0)+1)|𝐡s,iWH𝐰s,i|2,i,\alpha_{s,i}\leq\frac{|\mathbf{h}_{s,i}^{{\rm W}H}\mathbf{w}_{s,i}|^{2}-\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})\left(\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm W}H}\right)+\sigma^{2}\right)}{\left(\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})+1\right)|\mathbf{h}_{s,i}^{{\rm W}H}\mathbf{w}_{s,i}|^{2}},\forall i, (25)

and

αs,i|𝐡s,iSH𝐰s,i|2εK1(ε¯0)(s,i(𝐡s,iSH)+σ2)(εK1(ε¯0)+1)|𝐡s,iSH𝐰s,i|2,i.\alpha_{s,i}\leq\frac{|\mathbf{h}_{s,i}^{{\rm S}H}\mathbf{w}_{s,i}|^{2}-\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})\left(\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm S}H}\right)+\sigma^{2}\right)}{\left(\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})+1\right)|\mathbf{h}_{s,i}^{{\rm S}H}\mathbf{w}_{s,i}|^{2}},\forall i. (26)

Considering 0αs,i10\leq\alpha_{s,i}\leq 1 and εK1(ε¯0)(s,i(𝐡s,iSH)+σ2)|𝐡s,iSH𝐰s,i|20\frac{\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})\left(\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm S}H}\right)+\sigma^{2}\right)}{|\mathbf{h}_{s,i}^{{\rm S}H}\mathbf{w}_{s,i}|^{2}}\geq 0, the lower bound of αs,i\alpha_{s,i} is given by

Ls,i=εK1(ε¯0)(s,i(𝐡s,iSH)+σ2)|𝐡s,iSH𝐰s,i|2,i,L_{s,i}=\frac{\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})\left(\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm S}H}\right)+\sigma^{2}\right)}{|\mathbf{h}_{s,i}^{{\rm S}H}\mathbf{w}_{s,i}|^{2}},\forall i, (27)

and the upper bound of αs,i\alpha_{s,i} is given by

Us,i=min(fi(𝐡s,iW),fi(𝐡s,iS),1),i.U_{s,i}=\min\left(f_{i}\left(\mathbf{h}_{s,i}^{{\rm W}}\right),f_{i}\left(\mathbf{h}_{s,i}^{{\rm S}}\right),1\right),\forall i. (28)

where fi(𝐱)|𝐱H𝐰s,i|2εK1(ε¯0)(s,i(𝐱H)+σ2)(εK1(ε¯0)+1)|𝐱H𝐰s,i|2f_{i}(\mathbf{x})\triangleq\frac{|\mathbf{x}^{H}\mathbf{w}_{s,i}|^{2}-\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})\left(\mathcal{I}_{s,i}\left(\mathbf{x}^{H}\right)+\sigma^{2}\right)}{\left(\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})+1\right)|\mathbf{x}^{H}\mathbf{w}_{s,i}|^{2}}.

Lemma 1

fi(𝐱)1f_{i}\left(\mathbf{x}\right)\leq 1 always holds.

Proof.

Please refer to Appendix A. ∎

According to Lemma 1, the upper bound of αs,i\alpha_{s,i} is

Us,i=min(f(𝐡s,iW),f(𝐡s,iS)),i.U_{s,i}=\min\left(f\left(\mathbf{h}_{s,i}^{{\rm W}}\right),f\left(\mathbf{h}_{s,i}^{{\rm S}}\right)\right),\forall i. (29)

A feasible αs,i\alpha_{s,i} always exists as long as Ls,iUs,iL_{s,i}\leq U_{s,i} holds.

The next step is to find the lower bound and upper bound of αb,i\alpha_{b,i}. According to (22e)-(22g), we have

αb,iγ0(b,i(𝐡b,iSH)+σ2)|𝐡b,iSH𝐰b,i|2,i\alpha_{b,i}\geq\frac{\gamma_{0}\left(\mathcal{I}_{b,i}\left(\mathbf{h}_{b,i}^{{\rm S}H}\right)+\sigma^{2}\right)}{|\mathbf{h}_{b,i}^{{\rm S}H}\mathbf{w}_{b,i}|^{2}},\forall i (30)
αb,i|𝐡b,iWH𝐰b,i|2γ0(b,i(𝐡b,iWH)+σ2)(γ0+1)|𝐡b,iWH𝐰b,i|2,i\alpha_{b,i}\leq\frac{|\mathbf{h}_{b,i}^{{\rm W}H}\mathbf{w}_{b,i}|^{2}-\gamma_{0}\left(\mathcal{I}_{b,i}\left(\mathbf{h}_{b,i}^{{\rm W}H}\right)+\sigma^{2}\right)}{\left(\gamma_{0}+1\right)|\mathbf{h}_{b,i}^{{\rm W}H}\mathbf{w}_{b,i}|^{2}},\forall i (31)

and

αb,i|𝐡b,iSH𝐰b,i|2γ0(b,i(𝐡b,iSH)+σ2)(γ0+1)|𝐡b,iSH𝐰b,i|2,i.\alpha_{b,i}\leq\frac{|\mathbf{h}_{b,i}^{{\rm S}H}\mathbf{w}_{b,i}|^{2}-\gamma_{0}\left(\mathcal{I}_{b,i}\left(\mathbf{h}_{b,i}^{{\rm S}H}\right)+\sigma^{2}\right)}{\left(\gamma_{0}+1\right)|\mathbf{h}_{b,i}^{{\rm S}H}\mathbf{w}_{b,i}|^{2}},\forall i. (32)

Similarly, we have the lower bound of αb,i\alpha_{b,i}

Lb,i=γ0(b,i(𝐡b,iSH)+σ2)|𝐡b,iSH𝐰b,i|2,i,L_{b,i}=\frac{\gamma_{0}\left(\mathcal{I}_{b,i}\left(\mathbf{h}_{b,i}^{{\rm S}H}\right)+\sigma^{2}\right)}{|\mathbf{h}_{b,i}^{{\rm S}H}\mathbf{w}_{b,i}|^{2}},\forall i, (33)

and the upper bound of αb,i\alpha_{b,i}

Ub,i=min(g(𝐡b,iWH),g(𝐡b,iSH),1),i,U_{b,i}=\min\left(g\left(\mathbf{h}_{b,i}^{{\rm W}H}\right),g\left(\mathbf{h}_{b,i}^{{\rm S}H}\right),1\right),\forall i, (34)

where gi(𝐱)|𝐱H𝐰b,i|2γ0(b,i(𝐱H)+σ2)(γ0+1)|𝐱H𝐰b,i|2g_{i}(\mathbf{x})\triangleq\frac{|\mathbf{x}^{H}\mathbf{w}_{b,i}|^{2}-\gamma_{0}\left(\mathcal{I}_{b,i}\left(\mathbf{x}^{H}\right)+\sigma^{2}\right)}{\left(\gamma_{0}+1\right)|\mathbf{x}^{H}\mathbf{w}_{b,i}|^{2}}. gi(𝐱)g_{i}(\mathbf{x}) can be proved less than 1 by following the method in Lemma 1. Then, the upper bound of αb,i\alpha_{b,i} is

Ub,i=min(g(𝐡b,iWH),g(𝐡b,iSH)),i.U_{b,i}=\min\left(g\left(\mathbf{h}_{b,i}^{{\rm W}H}\right),g\left(\mathbf{h}_{b,i}^{{\rm S}H}\right)\right),\forall i. (35)

A feasible αb,i\alpha_{b,i} always exists as long as Lb,iUb,iL_{b,i}\leq U_{b,i} holds.

Consequently, P2{\rm P_{2}} can be recast into the following form:

P3:\displaystyle{\rm P_{3}}: min{𝐖}k=1M2(𝐰s,k22+𝐰b,k22)\displaystyle\min_{\{\mathbf{W}\}}\quad\sum_{k=1}^{\frac{M}{2}}\left(||\mathbf{w}_{s,k}||_{2}^{2}+||\mathbf{w}_{b,k}||_{2}^{2}\right) (36a)
s.t.Ls,iUs,i,i\displaystyle~{}\mathrm{s.t.}\quad\;\;\;L_{s,i}\leq U_{s,i},\forall i (36b)
Lb,iUb,i,i.\displaystyle\qquad\quad\;\;L_{b,i}\leq U_{b,i},\forall i. (36c)

Only beamforming vectors in P3{\rm P_{3}} need to be optimized. The next step is to deal with constraint (36b). Constraint (36b) is equivalent to the following two constraints

Ls,ifi(𝐡s,iS),iL_{s,i}\leq f_{i}\left(\mathbf{h}_{s,i}^{{\rm S}}\right),\forall i (37)

and

Ls,ifi(𝐡s,iW),i.L_{s,i}\leq f_{i}\left(\mathbf{h}_{s,i}^{{\rm W}}\right),\forall i. (38)

It is noted that Ls,iL_{s,i} and fi(𝐡s,iS)f_{i}\left(\mathbf{h}_{s,i}^{{\rm S}}\right) have the same denominator, hence, (37) can be rewritten into

εK1(ε¯0)(εK1(ε¯0)+2)(s,i(𝐡s,iSH)+σ2)|𝐡s,iSH𝐰s,i|2,i,\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})(\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})+2)\left(\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm S}H}\right)+\sigma^{2}\right)\leq|\mathbf{h}_{s,i}^{{\rm S}H}\mathbf{w}_{s,i}|^{2},\forall i, (39)

which becomes a quadratic form. As for (38), it represents a quadratic fractional form, which has significant challenges when attempting to transform it into a convex form.

Proposition 1

Constraint (38) can be removed by assuming |𝐡s,iSH𝐰s,i|2|𝐡s,iWH𝐰s,i|2|\mathbf{h}_{s,i}^{{\rm S}H}\mathbf{w}_{s,i}|^{2}\leq|\mathbf{h}_{s,i}^{{\rm W}H}\mathbf{w}_{s,i}|^{2} and s,i(𝐡s,iSH)s,i(𝐡s,iWH)\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm S}H}\right)\geq\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm W}H}\right).

Proof.

Please refer to Appendix B. ∎

According to Proposition 1, constraint (36b) can be replaced by constraint (39). Follow the step above, constraint (36c) can be replaced by

γ0(γ0+2)(b,i(𝐡b,iSH)+σ2)|𝐡b,iSH𝐰b,i|2,i,\gamma_{0}(\gamma_{0}+2)\left(\mathcal{I}_{b,i}\left(\mathbf{h}_{b,i}^{{\rm S}H}\right)+\sigma^{2}\right)\leq|\mathbf{h}_{b,i}^{{\rm S}H}\mathbf{w}_{b,i}|^{2},\forall i, (40)

when assuming |𝐡b,iSH𝐰b,i|2|𝐡b,iWH𝐰b,i|2|\mathbf{h}_{b,i}^{{\rm S}H}\mathbf{w}_{b,i}|^{2}\leq|\mathbf{h}_{b,i}^{{\rm W}H}\mathbf{w}_{b,i}|^{2} and b,i(𝐡b,iSH)b,i(𝐡b,iWH)\mathcal{I}_{b,i}\left(\mathbf{h}_{b,i}^{{\rm S}H}\right)\geq\mathcal{I}_{b,i}\left(\mathbf{h}_{b,i}^{{\rm W}H}\right). Then, P3{\rm P_{3}} can be recast into

P4:\displaystyle{\rm P_{4}}: min{𝐖,t}k=1M2(𝐰s,k22+𝐰b,k22)\displaystyle\min_{\{\mathbf{W},t\}}\;\;\sum_{k=1}^{\frac{M}{2}}\left(||\mathbf{w}_{s,k}||_{2}^{2}+||\mathbf{w}_{b,k}||_{2}^{2}\right) (41a)
s.t.(39)(40),\displaystyle~{}\mathrm{s.t.}\quad\;\eqref{unfold1rewritten}\;\eqref{unfold12rewritten},
|𝐡s,iSH𝐰s,i|2|𝐡s,iWH𝐰s,i|2,i\displaystyle\qquad\quad|\mathbf{h}_{s,i}^{{\rm S}H}\mathbf{w}_{s,i}|^{2}\leq|\mathbf{h}_{s,i}^{{\rm W}H}\mathbf{w}_{s,i}|^{2},\forall i (41b)
|𝐡b,iSH𝐰b,i|2|𝐡b,iWH𝐰b,i|2,i\displaystyle\qquad\quad|\mathbf{h}_{b,i}^{{\rm S}H}\mathbf{w}_{b,i}|^{2}\leq|\mathbf{h}_{b,i}^{{\rm W}H}\mathbf{w}_{b,i}|^{2},\forall i (41c)
s,i(𝐡s,iSH)s,i(𝐡s,iWH),i\displaystyle\qquad\quad\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm S}H}\right)\geq\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm W}H}\right),\forall i (41d)
b,i(𝐡b,iSH)b,i(𝐡b,iWH),i.\displaystyle\qquad\quad\mathcal{I}_{b,i}\left(\mathbf{h}_{b,i}^{{\rm S}H}\right)\geq\mathcal{I}_{b,i}\left(\mathbf{h}_{b,i}^{{\rm W}H}\right),\forall i. (41e)

P4{\rm P_{4}} is still non-convex due to the quadratic term. One efficient way to deal with quadratic constraint is SDR [26]. Auxiliary matrices 𝐖s,i=𝐰s,i𝐰s,iH\mathbf{W}_{s,i}=\mathbf{w}_{s,i}\mathbf{w}_{s,i}^{H}, 𝐇s,iS=𝐡s,iS𝐡s,iSH\mathbf{H}_{s,i}^{\rm S}=\mathbf{h}_{s,i}^{\rm S}\mathbf{h}_{s,i}^{{\rm S}H}, 𝐇s,iW=𝐡s,iW𝐡s,iWH\mathbf{H}_{s,i}^{\rm W}=\mathbf{h}_{s,i}^{\rm W}\mathbf{h}_{s,i}^{{\rm W}H}, 𝐖b,i=𝐰b,i𝐰b,iH\mathbf{W}_{b,i}=\mathbf{w}_{b,i}\mathbf{w}_{b,i}^{H}, 𝐇b,iS=𝐡b,iS𝐡b,iSH\mathbf{H}_{b,i}^{\rm S}=\mathbf{h}_{b,i}^{\rm S}\mathbf{h}_{b,i}^{{\rm S}H} and 𝐇b,iW=𝐡b,iW𝐡b,iWH\mathbf{H}_{b,i}^{\rm W}=\mathbf{h}_{b,i}^{\rm W}\mathbf{h}_{b,i}^{{\rm W}H} are introduced. By applying SDR, the trace of matrix replaces the quadratic term. For example, 𝐰s,k22||\mathbf{w}_{s,k}||_{2}^{2} is replaced by Tr(𝐖s,i){\rm Tr}(\mathbf{W}_{s,i}) and |𝐡s,iSH𝐰s,i|2|\mathbf{h}_{s,i}^{{\rm S}H}\mathbf{w}_{s,i}|^{2} is replaced by Tr(𝐇s,iS𝐖s,i){\rm Tr}(\mathbf{H}^{\rm S}_{s,i}\mathbf{W}_{s,i}). The inter-cluster interference function after SDR can be expressed as

s,i(𝐗)=k=1M2Tr(𝐗𝐖b,k)+k=1kiM2Tr(𝐗𝐖s,k),\mathfrak{I}_{s,i}(\mathbf{X})=\sum\limits_{k=1}^{\frac{M}{2}}{\rm Tr}(\mathbf{X}\mathbf{W}_{b,k})+\sum\limits_{k=1\atop k\neq i}^{\frac{M}{2}}{\rm Tr}(\mathbf{X}\mathbf{W}_{s,k}), (42)

and

b,i(𝐗)=k=1M2Tr(𝐗𝐖s,k)+k=1kiM2Tr(𝐗𝐖b,k).\mathfrak{I}_{b,i}(\mathbf{X})=\sum\limits_{k=1}^{\frac{M}{2}}{\rm Tr}(\mathbf{X}\mathbf{W}_{s,k})+\sum\limits_{k=1\atop k\neq i}^{\frac{M}{2}}{\rm Tr}(\mathbf{X}\mathbf{W}_{b,k}). (43)

Hence, P4{\rm P_{4}} can be recast as the following form

P5:\displaystyle{\rm P_{5}}: min{𝐖}k=1M2(Tr(𝐖s,k)+Tr(𝐖b,k))\displaystyle\min_{\{\mathbf{W}\}}\;\;\sum_{k=1}^{\frac{M}{2}}\left({\rm Tr}(\mathbf{W}_{s,k})+{\rm Tr}(\mathbf{W}_{b,k})\right) (44a)
s.t.C1(s,i(𝐇s,iS)+σ2)Tr(𝐇s,iS𝐖s,i),i\displaystyle~{}\mathrm{s.t.}\quad C_{1}\left(\mathfrak{I}_{s,i}\left(\mathbf{H}_{s,i}^{\rm S}\right)+\sigma^{2}\right)\leq{\rm Tr}(\mathbf{H}_{s,i}^{\rm S}\mathbf{W}_{s,i}),\forall i (44b)
C2(b,i(𝐇b,iS)+σ2)Tr(𝐇b,iS𝐖b,i),i\displaystyle\qquad\;\;\;C_{2}\left(\mathfrak{I}_{b,i}\left(\mathbf{H}_{b,i}^{\rm S}\right)+\sigma^{2}\right)\leq{\rm Tr}(\mathbf{H}_{b,i}^{\rm S}\mathbf{W}_{b,i}),\forall i (44c)
Tr(𝐇s,iS𝐖s,i)Tr(𝐇s,iW𝐖s,i),i\displaystyle\qquad\quad{\rm Tr}(\mathbf{H}_{s,i}^{\rm S}\mathbf{W}_{s,i})\leq{\rm Tr}(\mathbf{H}_{s,i}^{\rm W}\mathbf{W}_{s,i}),\forall i (44d)
Tr(𝐇b,iS𝐖b,i)Tr(𝐇b,iW𝐖b,i),i\displaystyle\qquad\quad{\rm Tr}(\mathbf{H}_{b,i}^{\rm S}\mathbf{W}_{b,i})\leq{\rm Tr}(\mathbf{H}_{b,i}^{\rm W}\mathbf{W}_{b,i}),\forall i (44e)
s,i(𝐇s,iS)s,i(𝐇s,iW),i\displaystyle\qquad\quad\mathfrak{I}_{s,i}\left(\mathbf{H}_{s,i}^{\rm S}\right)\geq\mathfrak{I}_{s,i}\left(\mathbf{H}_{s,i}^{\rm W}\right),\forall i (44f)
b,i(𝐇b,iS)b,i(𝐇b,iW),i\displaystyle\qquad\quad\mathfrak{I}_{b,i}\left(\mathbf{H}_{b,i}^{\rm S}\right)\geq\mathfrak{I}_{b,i}\left(\mathbf{H}_{b,i}^{\rm W}\right),\forall i (44g)
𝐖s,i0,i\displaystyle\qquad\quad\mathbf{W}_{s,i}\succeq 0,\forall i (44h)
𝐖b,i0,i\displaystyle\qquad\quad\mathbf{W}_{b,i}\succeq 0,\forall i (44i)
rank(𝐖s,i)=1,i\displaystyle\qquad\quad{\rm rank}(\mathbf{W}_{s,i})=1,\forall i (44j)
rank(𝐖b,i)=1,i,\displaystyle\qquad\quad{\rm rank}(\mathbf{W}_{b,i})=1,\forall i, (44k)

where C1=εK1(ε¯0)(εK1(ε¯0)+2)C_{1}=\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})(\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})+2) and C2=γ0(γ0+2)C_{2}=\gamma_{0}(\gamma_{0}+2). To ensure P5{\rm P_{5}} is convex, we temporarily disregard the rank one constraints (44j) and (44k). As a result, we obtain a convex formulation that

P6:\displaystyle{\rm P_{6}}: min{𝐖,t}k=1M2(Tr(𝐖s,k)+Tr(𝐖b,k))\displaystyle\min_{\{\mathbf{W},t\}}\quad\sum_{k=1}^{\frac{M}{2}}\left({\rm Tr}(\mathbf{W}_{s,k})+{\rm Tr}(\mathbf{W}_{b,k})\right) (45a)
s.t.(44b)(44i).\displaystyle~{}\mathrm{s.t.}\quad\;\eqref{P51}-\eqref{P58}.

Since the rank one constraint is disregarded in P6{\rm P_{6}}, the optimal value of P6{\rm P_{6}} might not be the optimal value of P4{\rm P_{4}}. Let 𝐖s,i,i\mathbf{W}_{s,i}^{*},\forall i and 𝐖b,i,i\mathbf{W}_{b,i}^{*},\forall i denote the optimal solution of P6{\rm P_{6}}. If rank(𝐖s,i)=1,i{\rm rank}(\mathbf{W}_{s,i}^{*})=1,\forall i and rank(𝐖b,i)=1,i{\rm rank}(\mathbf{W}_{b,i}^{*})=1,\forall i hold, it suggests the optimal solution of P5{\rm P_{5}} can be successfully recovered from 𝐖s,i,i\mathbf{W}_{s,i}^{*},\forall i and 𝐖b,i,i\mathbf{W}_{b,i}^{*},\forall i by eigen-decomposition. However, if the above equations do not hold, only the suboptimal solution of P5{\rm P_{5}} can be obtained by Gaussian Randomization.

Proposition 2

The rank of 𝐖s,i,i\mathbf{W}_{s,i}^{*},\forall i and 𝐖b,i,i\mathbf{W}_{b,i}^{*},\forall i can be guaranteed as 1.

Proof.

Please refer to Appendix B. ∎

III-B Hybrid Cluster-based NOMA Transmission Scheme

Although the aforementioned P-CNOMA scheme allows each user to fully utilize the whole spectrum and achieve the minimal transmission power, however, it has the feasibility issue that arises from the interference (6) and (7). As transmission power increases, interference power rises accordingly. Consequently, once the target QoS exceeds a certain threshold, further increases in transmission power cannot achieve the desired target. To address this issue, we propose the H-CNOMA scheme, where each cluster occupies one orthogonal frequency sub-channel, with two users within the same cluster sharing the sub-channel. In this scheme, OMA is adopted between clusters while NOMA is adopted between users within the same cluster. Due to orthogonality of sub-channels, the inter-cluster interference is eliminated, but at the cost of reduced bandwidth. Since each cluster is independent to other clusters, we can focus on a single cluster when formulating the optimization problem. Let take a S-user cluster as an example, the transmission power minimization problem can be expressed as

P0s:\displaystyle{\rm P^{s}_{0}}: min{𝐰𝐬,αs}𝐰s22\displaystyle\min_{\{\mathbf{w_{s}},\alpha_{s}\}}\quad||\mathbf{w}_{s}||_{2}^{2} (46a)
s.t.min(SS,SW)S0,\displaystyle~{}\mathrm{s.t.}\;\;\;\min(S_{\rm S},S_{\rm W})\geq S_{0}, (46b)
min(εK(γSs),εK(γWs),εK(γWSs))ε0,\displaystyle\qquad\;\;\min\left(\varepsilon_{K}\left(\gamma_{\rm S}^{s}\right),\varepsilon_{K}\left(\gamma_{\rm W}^{s}\right),\varepsilon_{K}\left(\gamma_{\rm W\rightarrow S}^{s}\right)\right)\geq\varepsilon_{0}, (46c)
  0αs1,\displaystyle\qquad\;\;0\leq\alpha_{s}\leq 1, (46d)

where SSS_{\rm S} and SWS_{\rm W} denote the semantic rates of the strong user and the weak user, respectively. The terms γSs\gamma_{\rm S}^{s}, γWs\gamma_{\rm W}^{s} and γWSs\gamma_{\rm W\rightarrow S}^{s} denote the SINR/SNR of the strong user’s signal, the weak user’s signal, and the weak user’s signal as decoded by the strong user, respectively. After some algebraic transformations, we have the following equations:

SS=WIMKLεk(γSs),S_{\rm S}=\frac{WI}{MKL}\varepsilon_{k}\left(\gamma_{\rm S}^{s}\right), (47)
SW=min(WIMKLεk(γWs),WIMKLεk(γWSs)),S_{\rm W}=\min\left(\frac{WI}{MKL}\varepsilon_{k}\left(\gamma_{\rm W}^{s}\right),\frac{WI}{MKL}\varepsilon_{k}\left(\gamma_{\rm W\rightarrow S}^{s}\right)\right), (48)
γSs=αs|𝐡SsH𝐰s|2σ2,\gamma_{\rm S}^{s}=\frac{\alpha_{s}|\mathbf{h}_{\rm S}^{sH}\mathbf{w}_{s}|^{2}}{\sigma^{2}}, (49)
γWs=(1αs)|𝐡WsH𝐰s|2αs|𝐡WsH𝐰s|2+σ2,\gamma_{\rm W}^{s}=\frac{(1-\alpha_{s})|\mathbf{h}_{\rm W}^{sH}\mathbf{w}_{s}|^{2}}{\alpha_{s}|\mathbf{h}_{\rm W}^{sH}\mathbf{w}_{s}|^{2}+\sigma^{2}}, (50)

and

γSWs=(1αs)|𝐡SsH𝐰s|2αs|𝐡SsH𝐰s|2+σ2.\gamma_{\rm S\rightarrow W}^{s}=\frac{(1-\alpha_{s})|\mathbf{h}_{\rm S}^{sH}\mathbf{w}_{s}|^{2}}{\alpha_{s}|\mathbf{h}_{\rm S}^{sH}\mathbf{w}_{s}|^{2}+\sigma^{2}}. (51)

𝐡Ts,T=S,W\mathbf{h}_{\rm T}^{s},{\rm T=S,W} denotes the channel vector between the BS and the strong user and the weak user in this S-user cluster. After decoupling constraints (46b) and (46c), P0s{\rm P^{s}_{0}} is recast into

P1s:\displaystyle{\rm P^{s}_{1}}: min{𝐰𝐬,αs}𝐰s22\displaystyle\min_{\{\mathbf{w_{s}},\alpha_{s}\}}\quad||\mathbf{w}_{s}||_{2}^{2} (52a)
s.t.γSsεK1(ε^0),\displaystyle~{}\mathrm{s.t.}\quad\quad\;\gamma_{\rm S}^{s}\geq\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0}), (52b)
γWsεK1(ε^0),\displaystyle\qquad\qquad\gamma_{\rm W}^{s}\geq\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0}), (52c)
γWSsεK1(ε^0),\displaystyle\qquad\qquad\gamma_{\rm W\rightarrow S}^{s}\geq\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0}), (52d)
 0αs1,\displaystyle\qquad\qquad\;0\leq\alpha_{s}\leq 1, (52e)

where the effective semantic similarity ε^0=max(ε0,MKLS0WI)\hat{\varepsilon}_{0}=\max\left(\varepsilon_{0},\frac{MKLS_{0}}{WI}\right) It is noted that 𝐰s=Ps𝐰~s\mathbf{w}_{s}=\sqrt{P_{s}}\tilde{\mathbf{w}}_{s}, where Ps=𝐰s22P_{s}=||\mathbf{w}_{s}||_{2}^{2} and 𝐰~s=𝐰s𝐰s2\tilde{\mathbf{w}}_{s}=\frac{\mathbf{w}_{s}}{||\mathbf{w}_{s}||_{2}}. Similarly, 𝐡is=PTs𝐡~Ts,T=S,W\mathbf{h}_{i}^{s}=\sqrt{P_{\rm T}^{s}}\tilde{\mathbf{h}}_{\rm T}^{s},{\rm T=S,W}.

Proposition 3

If P1s{\rm P^{s}_{1}} is feasible, 0<αs<1εK1(ε^0)+10<\alpha_{s}<\frac{1}{\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0})+1} and 𝐰~s\tilde{\mathbf{w}}_{s} are not orthogonal to 𝐡~Ss\tilde{\mathbf{h}}_{\rm S}^{s} and 𝐡~Ws\tilde{\mathbf{h}}_{\rm W}^{s} should be satisfied.

Proof.

Please refer to Appendix D. ∎

When the conditions in Proposition 3 are satisfied, constraints (52b) - (52d) can be rewritten as

PsεK1(ε^0)σ2αsP1s|𝐡~SsH𝐰~s|2B1(αs,𝐰~s),P_{s}\geq\frac{\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0})\sigma^{2}}{\alpha_{s}P_{1}^{s}|\tilde{\mathbf{h}}_{\rm S}^{sH}\tilde{\mathbf{w}}_{s}|^{2}}\triangleq B_{1}(\alpha_{s},\tilde{\mathbf{w}}_{s}), (53)
PsεK1(ε^0)σ2(1αsεK1(ε^0)αs)P2s|𝐡~WsH𝐰~s|2B2(αs,𝐰~s),P_{s}\geq\frac{\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0})\sigma^{2}}{\left(1-\alpha_{s}-\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0})\alpha_{s}\right)P_{2}^{s}|\tilde{\mathbf{h}}_{\rm W}^{sH}\tilde{\mathbf{w}}_{s}|^{2}}\triangleq B_{2}(\alpha_{s},\tilde{\mathbf{w}}_{s}), (54)

and

PsεK1(ε^0)σ2(1αsεK1(ε^0)αs)P1s|𝐡~SsH𝐰~s|2B3(αs,𝐰~s).P_{s}\geq\frac{\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0})\sigma^{2}}{\left(1-\alpha_{s}-\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0})\alpha_{s}\right)P_{1}^{s}|\tilde{\mathbf{h}}_{\rm S}^{sH}\tilde{\mathbf{w}}_{s}|^{2}}\triangleq B_{3}(\alpha_{s},\tilde{\mathbf{w}}_{s}). (55)

B1B_{1}, B2B_{2} and B3B_{3} are three functions related to αs\alpha_{s} and 𝐰~s\tilde{\mathbf{w}}_{s}. The optimal value of P1s{\rm P^{s}_{1}} is

Ps=max(B1(αs,𝐰~s),B2(αs,𝐰~s),B3(αs,𝐰~s)).P_{s}^{*}=\max\left(B_{1}(\alpha_{s},\tilde{\mathbf{w}}_{s}),B_{2}(\alpha_{s},\tilde{\mathbf{w}}_{s}),B_{3}(\alpha_{s},\tilde{\mathbf{w}}_{s})\right). (56)

Therefore, P1s{\rm P^{s}_{1}} can be recast into

P2s:\displaystyle{\rm P^{s}_{2}}: min{𝐰~s,αs}Ps(αs,𝐰~s)\displaystyle\min_{\{\tilde{\mathbf{w}}_{s},\alpha_{s}\}}\quad P_{s}^{*}(\alpha_{s},\tilde{\mathbf{w}}_{s}) (57a)
s.t. 0αs1εK1(ε^0)+1.\displaystyle~{}\mathrm{s.t.}\quad\quad\;0\leq\alpha_{s}\leq\frac{1}{\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0})+1}. (57b)

If we want to transform P2s{\rm P^{s}_{2}} into an unconstrained problem, we need to remove constraint (57b). By introducing an auxiliary variable α~s\tilde{\alpha}_{s} and letting

αs=sig(α~s)εK1(ε^0)+1,\alpha_{s}=\frac{\textbf{sig}(\tilde{\alpha}_{s})}{\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0})+1}, (58)

constraint (57b) can be eliminated. sig(x)=11+ex\textbf{sig}(x)=\frac{1}{1+e^{-x}} is a sigmoid function, whose output is in the range 0 to 1. It is noted that the domain of α~s\tilde{\alpha}_{s} is \mathbb{R}. Finally, P2s{\rm P^{s}_{2}} can be recast into

P3s:\displaystyle{\rm P^{s}_{3}}: min{𝐰~s,α~s}Ps(α~s,𝐰~s).\displaystyle\min_{\{\tilde{\mathbf{w}}_{s},\tilde{\alpha}_{s}\}}\quad P_{s}^{*}(\tilde{\alpha}_{s},\tilde{\mathbf{w}}_{s}). (59a)

P3s{\rm P^{s}_{3}} is unconstrained but non-convex, which can be efficiently solved by a neural network. In particular, unsupervised learning can be utilized to solve this problem. In this paper, we utilize a four-layer fully connected neural network, whose input is 𝐡Ss\mathbf{h}_{\rm S}^{s} and 𝐡Ws\mathbf{h}_{\rm W}^{s} and output is α~s\tilde{\alpha}_{s} and 𝐰~s\tilde{\mathbf{w}}_{s}. The loss function is (59a).

The method above can be also applied to minimize the transmission power in a B-user cluster. The only difference is that εK1(ε^0)\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0}) is replaced by γ^0=2MR0W1\hat{\gamma}_{0}=2^{\frac{MR_{0}}{W}}-1. The detail is not provided due to the space limitation. Once the minimal transmission power for each cluster is determined, the total minimal transmission power of the system is obtained by summing the powers of all clusters.

Refer to caption
Figure 2: Semantic similarity versus semantic rate

It is noted that the semantic rate in this transmission scheme is also related to the number of clusters due to the introduction of frequency sub-channels. Fig. 2 illustrates the relationship between semantic similarity and semantic rate for various numbers of clusters when W=1W=1MHz and K=4K=4. It suggests that the maximum semantic rate decreases when the network accommodates more clusters. This is because the maximum semantic similarity is 1, then the maximum semantic rate is

Smax=WIMKL,S_{max}=\frac{WI}{MKL}, (60)

which explains Fig. 2. Once the target semantic similarity ε0\varepsilon_{0} is set, there are two regions named semantic similarity domination region and semantic rate domination region. If the target semantic rate is located in the semantic similarity domination region, the effective semantic similarity is always equal to the target semantic similarity ε0\varepsilon_{0}, whereas if it is located in the semantic rate domination region, the effective semantic similarity ε^\hat{\varepsilon} is only related to the target semantic rate.

IV Simulation Results

In this section, simulation results are provided to illustrate the superior performance of the proposed transmission schemes compared with the benchmarks. In the simulation results, the first benchmark scheme, referred as ’Random P-CNOMA’, employs the same MA transmission approach as the P-CNOMA scheme. However, unlike the proposed scheme, the clustering strategy in Random P-CNOMA does not follow the channel condition order and instead clusters users randomly. The second benchmark, referred as ’Non-Cluster OMA’, does not group users into clusters. Instead, each user is assigned an orthogonal frequency sub-channel to communicate with the BS. This scheme is also named as orthogonal frequency-division multiple access (OFDMA). The last benchmark scheme is refereed as ’Random Beam’, which employs the same MA transmission approach as the H-CNOMA scheme but the direction of the beam vector is randomly selected.

It is assumed that the channels between the BS and all users follow the Rician fading channel model, which is model as

𝐡=κ1+κ𝐡LoS+11+κ𝐡nLoSdβ,\mathbf{h}=\frac{\sqrt{\frac{\kappa}{1+\kappa}}\mathbf{h}^{\rm LoS}+\sqrt{\frac{1}{1+\kappa}}\mathbf{h}^{\rm nLoS}}{\sqrt{d^{\beta}}}, (61)

where 𝐡LoS\mathbf{h}^{\rm LoS} is the line-of-sight (LoS) component, 𝐡nLoS\mathbf{h}^{\rm nLoS} is the non-Los (nLoS) component following the Rayleigh fading model, dd denotes the distance between the BS and the user, and β\beta denote the pass loss coefficient. All users are randomly distributed in a square service area with a side length of 40 meters, with the BS is positioned at the center. The distance between the BS and the user can be calculated based on user’s coordinate. The pass loss coefficient is set as 0.8, the noise power spectral density is set as -80 dBm/Hz, the transmission bandwidth is set as 1 MHz and the number of clusters is set as 4.

Refer to caption
Figure 3: Loss versus training iteration.

Fig. 3 illustrates the loss function value as a function of training iterations when the deep neural network solves P3s{\rm P^{s}_{3}}. The loss starts at a relatively high value and exhibits a rapid decline in the initial iterations, indicating that the model quickly adjusts during the early training phase. As training progresses, the loss continues to decrease at a slower rate, demonstrating a general trend of convergence. The curve exhibits noticeable fluctuations, especially during the early stages of training, which gradually diminish as the model stabilizes. This behavior is attributed to the high variance in the loss caused by the randomly generated channel data when the model is insufficiently trained. As training progresses, the model becomes more robust, and the impact of data variance on the loss decreases significantly. Finally, the loss is stable at a low value, indicating successful learning and convergence of the model.

Refer to caption
Figure 4: The total transmission power versus the number of antennas at the BS.

Fig. 4 illustrates the total transmission power as a function of the number of antennas at the BS for different transmission schemes. In this experiment, parameters are set as follows: the target data rate R0=0.2R_{0}=0.2 Mbits/s, the target similarity ε0=0.6\varepsilon_{0}=0.6, the target semantic rate S0=0.02S_{0}=0.02 Msuts/s ×IL\times\frac{I}{L}. The figure shows that, in general, the total transmission power decreases as the number of antennas increases, demonstrating the benefits of increasing antenna count on power efficiency. The P-CNOMA scheme consistently achieves the lowest transmission power across the range of antenna numbers, indicating its effectiveness in power reduction. However, if users are randomly grouped, a slight performance drop occurs. The H-CNOMA scheme shows a similar downward trend in transmission power; however, its power consumption is slightly higher compared to the P-CNOMA scheme. The random beamforming scheme performs the worst, with the highest transmission power that remains almost constant regardless of the number of antennas.

Refer to caption
Figure 5: The total transmission power versus the target data rate.

Fig. 5 illustrates the relationship between the total transmission power and the target data rate for different transmission schemes. In this experiment, parameters are set as follows: the number of antennas at the BS M=40M=40, the target semantic similarity ε0=0.6\varepsilon_{0}=0.6, the target semantic rate S0=0.02S_{0}=0.02 Msuts/s ×IL\times\frac{I}{L}. As the target data rate increases, all schemes demonstrate an upward trend in transmission power. The P-CNOMA scheme consistently requires the least transmission power, highlighting its efficiency in achieving higher data rates of bit users with minimal power consumption. If the random grouping strategy is utilized, the total transmission power consumption sightly increases. The H-CNOMA scheme also show competitive performance but with slightly higher power requirements compared to the P-CNOMA scheme. The random beamforming scheme has the highest and most rapidly increasing power demands, indicating its inefficiency under higher target data rates of bit users. It is noted that the graph is divided into two regions under the P-CNOMA scheme: a feasible region where target data rates are achievable and an infeasible region where the required data rates exceed the capacity. It indicates that while the P-CNOMA scheme achieves the lowest transmission power consumption, it becomes unsuitable in scenarios where bit users have high QoS requirements, particularly when demanding higher data rates. This issue arises due to inter-cluster interference. On one hand, the network attempts to meet user demands by increasing transmission power; on the other hand, the inter-cluster interference also escalates with increased transmission power. This creates a conflicting situation that inherently limits the system’s ability to effectively manage high QoS requirements. As a result, if the target data rate of bit users falls within the infeasible region, the H-CNOMA scheme becomes the optimal choice.

Refer to caption
Figure 6: The total transmission power versus the target semantic similarity.

Fig. 6 illustrates the total transmission power as a function of the target semantic similarity for different transmission schemes. In this experiment, the parameters are set as follows: the number of antennas in the BS M=40M=40, the target data rate R0=0.2R_{0}=0.2 Mbits/s, the target semantic rate S0=0.02S_{0}=0.02 Msuts/s ×IL\times\frac{I}{L}. As the target semantic similarity increases, all schemes exhibit an upward trend in transmission power, indicating that higher semantic similarity requirements demand more power. The P-CNOMA scheme consistently achieves the lowest transmission power when the semantic similarity requirement is not very high. When the target semantic similarity exceeds a certain threshold, the H-CNOMA scheme demonstrates superior efficiency compared to the P-CNOMA scheme. This highlights the hybrid approach’s enhanced capability to maintain higher semantic similarity with lower power consumption. The random beamforming scheme consistently requires the highest transmission power, showing its inefficiency in handling higher semantic similarity requirements. It is noted that under the H-CNOMA scheme, the total transmission power initially remains the same despite increasing target semantic similarity requirements. This is due to the semantic rate initially falls within the semantic rate domination region, where the effective semantic similarity depends solely on the semantic rate. As the target semantic similarity increases, the semantic rate eventually shifts into the semantic similarity domination region, leading to a rise in total transmission power in response to further increases in target semantic similarity.

Refer to caption
Figure 7: The total transmission power versus the target semantic rate.

Fig. 7 illustrates the total transmission power as a function of the target semantic rate for different transmission schemes. In this experiment, parameters are set as follows: the number of antennas at the BS M=40M=40, the target data rate R0=0.2R_{0}=0.2 Mbits/s, the target semantic similarity ε0=0.6\varepsilon_{0}=0.6. As the target semantic rate increases, all schemes exhibit an upward trend in transmission power, indicating that higher semantic rate requirements demand more power. Similar to above, the P-CNOMA scheme consumes the lowest transmission power compared with other schemes. It is observed that the total transmission power remains unchanged under both proposed schemes, even as the target semantic rate increases. This occurs because the semantic rate consistently falls within the semantic similarity domination region. As long as the target semantic similarity is met, the corresponding target semantic rate is also inherently satisfied. In this experiment, an infeasible region emerges for both the H-CNOMA scheme and the non-cluster OMA scheme. This is due to (60), which indicates more frequency sub-channels will decrease the maximum semantic rate. The non-cluster OMA scheme has a larger infeasible region compared to the the H-CNOMA scheme due to the presence of more frequency sub-channels without clustering, which limits its ability to achieve higher semantic rates.

Refer to caption
Figure 8: The total transmission power versus the average number of semantic symbols per word, S0=0.02S_{0}=0.02 Msuts/s ×IL\times\frac{I}{L}.
Refer to caption
Figure 9: The total transmission power versus the average number of semantic symbols per word, S0=0.06S_{0}=0.06 Msuts/s ×IL\times\frac{I}{L}.

Fig. 8 and Fig. 9 illustrate the total transmission power as a function of the total transmission power versus the average number of semantic symbols per word (KK) for different transmission schemes. The target semantic rate is set as 0.02 Msuts/s ×IL\times\frac{I}{L} and 0.06 Msuts/s ×IL\times\frac{I}{L} in Fig. 8 and Fig. 9, respectively. When S0=S_{0}= 0.02 Msuts/s ×IL\times\frac{I}{L}, an increase in KK leads to a general decrease in total transmission power across all schemes. This trend reflects the reduced power demand associated with higher density of semantic symbols. Although, the P-CNOMA scheme can achieve the lowest total transmission power, however, they encounter feasibility issues when the average number of semantic symbols per word is small. In this scenario, the H-CNOMA scheme effectively resolves the feasibility issue, albeit with a slightly higher transmission power consumption. When S0=S_{0}= 0.06 Msuts/s ×IL\times\frac{I}{L}, the total transmission power of the H-CNOMA scheme begins to increase again when KK exceeds 6. This occurs because the semantic rate is influenced by KK; a larger KK reduces the semantic rate. Once KK surpasses 6, the semantic rate of the H-CNOMA scheme enters the semantic rate domination region. Consequently, the total transmission power rises as both the semantic rate and KK increase. The semantic rate of the non-cluster OMA scheme falls within the semantic rate domination region from the beginning, therefore, the total transmission power rises as KK increases. Moreover, this scheme has a significantly large infeasible region due to the introduction of additional frequency sub-channels, as indicated by (60).

Overall, both proposed MA transmission schemes effectively minimize total transmission power, but each is better suited to different scenarios. In particular, the P-CNOMA scheme offers a higher semantic rate as each user can utilize the entire bandwidth; however, this comes at the cost of restricting users’ demands. In contrast, the H-CNOMA scheme can accommodate any user demand when the semantic rate requirement remains below the maximum achievable semantic rate.

V Conclusion

This paper presents two innovative MA transmission schemes, the P-CNOMA scheme and the H-CNOMA scheme, designed to minimize total transmission power in a semantic-enhanced NOMA network. Both schemes effectively achieve low transmission power, but are suitable for different scenarios. The P-CNOMA scheme provides the lowest power consumption and higher semantic rates by allowing each user to utilize the full bandwidth. However, it is constrained by feasibility issues under high QoS demands due to inter-cluster interference. Conversely, the H-CNOMA scheme, while consuming slightly more power, is more adaptable, meeting diverse user requirements and managing interference effectively, especially when semantic rate demands fall below the maximum threshold. The results of this study offer valuable guidance for selecting appropriate MA schemes based on specific network conditions and user requirements. By highlighting the strengths and limitations of each approach, this work provides a framework for optimizing resource allocation in next-generation semantic communication networks, aiding in the design of power-efficient and adaptable wireless systems.

Appendix A Proof of Lemma 1

According to (6), s,i(𝐱H)>0\mathcal{I}_{s,i}\left(\mathbf{x}^{H}\right)>0 is positive and εK1(ε¯0)\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0}) represents the SNR, which is positive. Therefore, we have

εK1(ε¯0)(s,i(𝐱H)+σ2)εK1(ε¯0)|𝐱H𝐰s,i|2-\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})\left(\mathcal{I}_{s,i}\left(\mathbf{x}^{H}\right)+\sigma^{2}\right)\leq\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})|\mathbf{x}^{H}\mathbf{w}_{s,i}|^{2}

The direction of an inequality is not affected when the same number is added to both sides. Hence, we have

|𝐱H𝐰s,i|2εK1(ε¯0)(s,i(𝐱H)+σ2)(εK1(ε¯0)+1)|𝐱H𝐰s,i|2.\begin{split}|\mathbf{x}^{H}\mathbf{w}_{s,i}|^{2}-\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})&\left(\mathcal{I}_{s,i}\left(\mathbf{x}^{H}\right)+\sigma^{2}\right)\\ &\leq\left(\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})+1\right)|\mathbf{x}^{H}\mathbf{w}_{s,i}|^{2}.\end{split}

Note (εK1(ε¯0)+1)|𝐱H𝐰s,i|2>0\left(\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})+1\right)|\mathbf{x}^{H}\mathbf{w}_{s,i}|^{2}>0, after the algebraic transformation, f(𝐱)1f(\mathbf{x})\leq 1 is proved.

Appendix B Proof of Proposition 1

After some algebraic transformations, fi(𝐡s,iW)f_{i}\left(\mathbf{h}_{s,i}^{{\rm W}}\right) and fi(𝐡s,iS)f_{i}\left(\mathbf{h}_{s,i}^{{\rm S}}\right) can be respectively rewritten as

fi(𝐡s,iW)=1εK1(ε¯0)(s,i(𝐡s,iWH)+σ2)|𝐡s,iWH𝐰s,i|2εK1(ε¯0)+1,f_{i}\left(\mathbf{h}_{s,i}^{{\rm W}}\right)=\frac{1-\frac{\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})\left(\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm W}H}\right)+\sigma^{2}\right)}{|\mathbf{h}_{s,i}^{{\rm W}H}\mathbf{w}_{s,i}|^{2}}}{\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})+1},

and

fi(𝐡s,iS)=1εK1(ε¯0)(s,i(𝐡s,iSH)+σ2)|𝐡s,iSH𝐰s,i|2εK1(ε¯0)+1.f_{i}\left(\mathbf{h}_{s,i}^{{\rm S}}\right)=\frac{1-\frac{\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})\left(\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm S}H}\right)+\sigma^{2}\right)}{|\mathbf{h}_{s,i}^{{\rm S}H}\mathbf{w}_{s,i}|^{2}}}{\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})+1}.

By assuming |𝐡s,iSH𝐰s,i|2|𝐡s,iWH𝐰s,i|2|\mathbf{h}_{s,i}^{{\rm S}H}\mathbf{w}_{s,i}|^{2}\leq|\mathbf{h}_{s,i}^{{\rm W}H}\mathbf{w}_{s,i}|^{2} and s,i(𝐡s,iSH)s,i(𝐡s,iWH)\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm S}H}\right)\geq\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm W}H}\right), we have

s,i(𝐡s,iWH)|𝐡s,iWH𝐰s,i|2s,i(𝐡s,iSH)|𝐡s,iSH𝐰s,i|2.\frac{\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm W}H}\right)}{|\mathbf{h}_{s,i}^{{\rm W}H}\mathbf{w}_{s,i}|^{2}}\leq\frac{\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm S}H}\right)}{|\mathbf{h}_{s,i}^{{\rm S}H}\mathbf{w}_{s,i}|^{2}}.

Due to εK1(ε¯0)\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0}) and σ2\sigma^{2} are positive, we further hvave

εK1(ε¯0)(s,i(𝐡s,iWH)+σ2)|𝐡s,iWH𝐰s,i|2εK1(ε¯0)(s,i(𝐡s,iSH)+σ2)|𝐡s,iSH𝐰s,i|2.\frac{\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})\left(\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm W}H}\right)+\sigma^{2}\right)}{|\mathbf{h}_{s,i}^{{\rm W}H}\mathbf{w}_{s,i}|^{2}}\leq\frac{\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})\left(\mathcal{I}_{s,i}\left(\mathbf{h}_{s,i}^{{\rm S}H}\right)+\sigma^{2}\right)}{|\mathbf{h}_{s,i}^{{\rm S}H}\mathbf{w}_{s,i}|^{2}}.

Since εK1(ε¯0)+10\varepsilon_{K}^{-1}(\bar{\varepsilon}_{0})+1\geq 0, f(𝐡s,iS)f(𝐡s,iW)f\left(\mathbf{h}_{s,i}^{{\rm S}}\right)\leq f\left(\mathbf{h}_{s,i}^{{\rm W}}\right). When constraint (37) is satisfied, constraint (38) is satisfied as well. The proposition is proved.

Appendix C Proof of Proposition 2

The Lagrangian function of P6{\rm P_{6}} can be expressed as

=k=1M2(Tr(𝐖s,k)+Tr(𝐖b,k))+k=1M2λ1,k(C1(s,k(𝐇s,kS)+σ2)Tr(𝐇s,kS𝐖s,k))+k=1M2λ2,k(C2(b,k(𝐇b,kS)+σ2)Tr(𝐇b,kS𝐖b,k))+k=1M2λ3,k(Tr(𝐇s,kS𝐖s,k)Tr(𝐇s,kW𝐖s,k))+k=1M2λ4,k(Tr(𝐇b,kS𝐖b,k)Tr(𝐇b,kW𝐖b,k))+λ5(s,i(𝐇s,iW)s,i(𝐇s,iS))+λ6(b,i(𝐇b,iW)b,i(𝐇b,iS))k=1M2Tr(𝐗s,k𝐖s,k)k=1M2Tr(𝐗b,k𝐖b,k),\begin{split}\mathcal{L}&=\sum_{k=1}^{\frac{M}{2}}\left({\rm Tr}(\mathbf{W}_{s,k})+{\rm Tr}(\mathbf{W}_{b,k})\right)\\ &+\sum_{k=1}^{\frac{M}{2}}\lambda_{1,k}\left(C_{1}\left(\mathfrak{I}_{s,k}\left(\mathbf{H}_{s,k}^{\rm S}\right)+\sigma^{2}\right)-{\rm Tr}(\mathbf{H}_{s,k}^{\rm S}\mathbf{W}_{s,k})\right)\\ &+\sum_{k=1}^{\frac{M}{2}}\lambda_{2,k}\left(C_{2}\left(\mathfrak{I}_{b,k}\left(\mathbf{H}_{b,k}^{\rm S}\right)+\sigma^{2}\right)-{\rm Tr}(\mathbf{H}_{b,k}^{\rm S}\mathbf{W}_{b,k})\right)\\ &+\sum_{k=1}^{\frac{M}{2}}\lambda_{3,k}\left({\rm Tr}(\mathbf{H}_{s,k}^{\rm S}\mathbf{W}_{s,k})-{\rm Tr}(\mathbf{H}_{s,k}^{\rm W}\mathbf{W}_{s,k})\right)\\ &+\sum_{k=1}^{\frac{M}{2}}\lambda_{4,k}\left({\rm Tr}(\mathbf{H}_{b,k}^{\rm S}\mathbf{W}_{b,k})-{\rm Tr}(\mathbf{H}_{b,k}^{\rm W}\mathbf{W}_{b,k})\right)\\ &+\lambda_{5}\left(\mathfrak{I}_{s,i}\left(\mathbf{H}_{s,i}^{\rm W}\right)-\mathfrak{I}_{s,i}\left(\mathbf{H}_{s,i}^{\rm S}\right)\right)\\ &+\lambda_{6}\left(\mathfrak{I}_{b,i}\left(\mathbf{H}_{b,i}^{\rm W}\right)-\mathfrak{I}_{b,i}\left(\mathbf{H}_{b,i}^{\rm S}\right)\right)\\ &-\sum_{k=1}^{\frac{M}{2}}{\rm Tr}(\mathbf{X}_{s,k}\mathbf{W}_{s,k})-\sum_{k=1}^{\frac{M}{2}}{\rm Tr}(\mathbf{X}_{b,k}\mathbf{W}_{b,k}),\end{split} (62)

where λ1,k\lambda_{1,k}, λ2,k\lambda_{2,k}, λ3,k\lambda_{3,k}, λ4,k\lambda_{4,k}, λ5\lambda_{5}, λ6\lambda_{6}, 𝐗s,k\mathbf{X}_{s,k} and 𝐗b,k,k={1,,M2}\mathbf{X}_{b,k},k=\{1,\cdots,\frac{M}{2}\} are Lagrangian multipliers of inequality constraints and μ\mu is the Lagrangian multiplier of the equality constraint. Let 𝐗s,i\mathbf{X}_{s,i}^{*}, 𝐗b,i\mathbf{X}_{b,i}^{*}, λ1,i\lambda_{1,i}^{*}, λ2,i\lambda_{2,i}^{*}, λ3,i\lambda_{3,i}^{*}, λ4,i\lambda_{4,i}^{*}, λ5\lambda_{5}^{*}, λ6\lambda_{6}^{*} and μ\mu^{*} denote the optimal Lagrangian multiplier. According to the Karush-Kuhn-Tucker (KKT) conditions, the following inequalities hold, which can be formulated as

λ1,i,λ2,i,λ3,i,λ4,i,λ5,λ60,\lambda_{1,i}^{*},\lambda_{2,i}^{*},\lambda_{3,i}^{*},\lambda_{4,i}^{*},\lambda_{5},\lambda_{6}\geq 0, (63)
𝐗s,i0,𝐗b,i0.\mathbf{X}_{s,i}^{*}\succeq 0,\mathbf{X}_{b,i}^{*}\succeq 0. (64)

Without loss of generality, we take 𝐖s,i\mathbf{W}_{s,i}^{*} as an example to analyze the rank condition. Since P6{\rm P_{6}} is a convex problem, the KKT conditions should be satisfied. According to the stationarity and complementary slackness, we have

𝐖s,i=𝐈λ1,i𝐇s,iS+λ3,i𝐇s,iSλ3,i𝐇s,iW𝐗s,i=𝟎,\begin{split}\frac{\partial\mathcal{L}}{\partial\mathbf{W}_{s,i}^{*}}=\mathbf{I}&-\lambda_{1,i}^{*}\mathbf{H}_{s,i}^{\rm S}+\lambda_{3,i}^{*}\mathbf{H}_{s,i}^{\rm S}-\lambda_{3,i}^{*}\mathbf{H}_{s,i}^{\rm W}-\mathbf{X}_{s,i}^{*}=\mathbf{0},\end{split} (65)

and

𝐗s,i𝐖s,i=𝟎,\mathbf{X}_{s,i}^{*}\mathbf{W}_{s,i}^{*}=\mathbf{0}, (66)

where 𝐈\mathbf{I} denotes the identical matrix and 𝟎\mathbf{0} denotes the matrix with all elements are 0. The dimension of 𝐈\mathbf{I} and 𝟎\mathbf{0} are aligned with the dimension of 𝐖s,i\mathbf{W}_{s,i}^{*}. According to (65),

𝐗s,i=𝐈Δ,\mathbf{X}_{s,i}^{*}=\mathbf{I}-\Delta, (67)

where Δ=λ1,i𝐇s,iSλ3,i𝐇s,iS+λ3,i𝐇s,iW\Delta=\lambda_{1,i}^{*}\mathbf{H}_{s,i}^{\rm S}-\lambda_{3,i}^{*}\mathbf{H}_{s,i}^{\rm S}+\lambda_{3,i}^{*}\mathbf{H}_{s,i}^{\rm W}, can be obtained. Let δ\delta represent the maximum eigenvalue of Δ\Delta. Given the inherent randomness of channels, the probability that the channel-determined matrix Δ\Delta has more than one same maximum eigenvalues is nearly zero, leading to the following discussions:

  • If 1<δ1<\delta, 𝐗s,i\mathbf{X}_{s,i}^{*} has a negative eigenvalue, which violates (64).

  • If 1>δ1>\delta, all eigenvalue are positive, which shows 𝐗s,i\mathbf{X}_{s,i}^{*} is a full rank matrix. According to (66), 𝐖s,i=0\mathbf{W}_{s,i}^{*}=0, which is not reasonable in practice.

  • If 1=δ1=\delta, and all other eigenvalues of Δ\Delta are smaller than δ\delta, hence, the rank of 𝐗s,i=M1\mathbf{X}_{s,i}^{*}=M-1. According to (66), the rank of 𝐖s,i\mathbf{W}_{s,i}^{*} is 1.

As a result, rank(𝐖s,i)=1{\rm rank}\left(\mathbf{W}_{s,i}^{*}\right)=1. This proof is also applicable to other beamforming matrices. The proposition is proved.

Appendix D Proof of Proposition 3

Constraint (52b) can be rewritten as

αsPSsPs|𝐡~Ss𝐰~s|2εK1(ε^0)σ2.\alpha_{s}P_{\rm S}^{s}P_{s}|\tilde{\mathbf{h}}_{\rm S}^{s}\tilde{\mathbf{w}}_{s}|^{2}\geq\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0})\sigma^{2}. (68)

There always exists a PsP_{s} that satisfies (68) only when αs>0\alpha_{s}>0 and 𝐰~s\tilde{\mathbf{w}}_{s} is not orthogonal to 𝐡~Ss\tilde{\mathbf{h}}_{\rm S}^{s}.

Constraints (52c) and (52d) can be rewritten as

(1αsεK1(ε^0)αs)PwsPs|𝐡~ws𝐰~s|2εK1(ε^0)σ2,\left(1-\alpha_{s}-\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0})\alpha_{s}\right)P_{\rm w}^{s}P_{s}|\tilde{\mathbf{h}}_{\rm w}^{s}\tilde{\mathbf{w}}_{s}|^{2}\geq\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0})\sigma^{2}, (69)

and

(1αsεK1(ε^0)αs)PSsPs|𝐡~Ss𝐰~s|2εK1(ε^0)σ2,\left(1-\alpha_{s}-\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0})\alpha_{s}\right)P_{\rm S}^{s}P_{s}|\tilde{\mathbf{h}}_{\rm S}^{s}\tilde{\mathbf{w}}_{s}|^{2}\geq\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0})\sigma^{2}, (70)

respectively. We notice that there always exists a PsP_{s} that can satisfy (69) and (70) when 1αsεK1(ε^0)αs>01-\alpha_{s}-\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0})\alpha_{s}>0 and 𝐰~s\tilde{\mathbf{w}}_{s} is not orthogonal to 𝐡~1\tilde{\mathbf{h}}_{1} and 𝐡~2\tilde{\mathbf{h}}_{2}.

As a result, if P1s{\rm P^{s}_{1}} is feasible, the conditions that 0<αs<11+εK1(ε^0)0<\alpha_{s}<\frac{1}{1+\varepsilon_{K}^{-1}(\hat{\varepsilon}_{0})} and 𝐰~s\tilde{\mathbf{w}}_{s} is not orthogonal to 𝐡~Ss\tilde{\mathbf{h}}_{\rm S}^{s} and 𝐡~Ws\tilde{\mathbf{h}}_{\rm W}^{s} should be satisfied. The proposition is proved.

References

  • [1] P. V. Matre, A. Kumbhare, R. Gedam, A. Sharma, N. K. Vaishnav, and D. Naidu, “6G enabled smart iot in healthcare system: Prospect, issues and study areas,” in 2023 International Conference on Artificial Intelligence for Innovations in Healthcare Industries (ICAIIHI), vol. 1.   IEEE, 2023, pp. 1–6.
  • [2] M.-H. Chen, K.-W. Hu, I.-H. Chung, and C.-F. Chou, “Towards VR/AR multimedia content multicast over wireless LAN,” in 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).   IEEE, 2019, pp. 1–6.
  • [3] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan, and V. K. Bhargava, “A survey on non-orthogonal multiple access for 5G networks: Research challenges and future trends,” IEEE J. Sel. Areas Commun., vol. 35, no. 10, pp. 2181–2195, 2017.
  • [4] F. Fang, K. Wang, Z. Ding, and V. C. Leung, “Energy-efficient resource allocation for NOMA-MEC networks with imperfect CSI,” IEEE Trans. Commun., vol. 69, no. 5, pp. 3436–3449, 2021.
  • [5] W. Tong and G. Y. Li, “Nine challenges in artificial intelligence and wireless communications for 6G,” IEEE Wirel. Commun., vol. 29, no. 4, pp. 140–145, 2022.
  • [6] W. Yang, H. Du, Z. Q. Liew, W. Y. B. Lim, Z. Xiong, D. Niyato, X. Chi, X. Shen, and C. Miao, “Semantic communications for future internet: Fundamentals, applications, and challenges,” IEEE Commun. Surv. Tutor., vol. 25, no. 1, pp. 213–250, 2022.
  • [7] X. Luo, H.-H. Chen, and Q. Guo, “Semantic communications: Overview, open issues, and future research directions,” IEEE Wirel. Commun., vol. 29, no. 1, pp. 210–219, 2022.
  • [8] W. Huang, J. Wang, X. Chen, Q. Peng, and Y. Zhu, “Flag vector assisted multi-user semantic communications for downlink text transmission,” IEEE Commun. Lett., 2024.
  • [9] Z. Weng, Z. Qin, X. Tao, C. Pan, G. Liu, and G. Y. Li, “Deep learning enabled semantic communications with speech recognition and synthesis,” IEEE Trans. Wirel. Commun., vol. 22, no. 9, pp. 6227–6240, 2023.
  • [10] C. Liang, D. Li, Z. Lin, and H. Cao, “Selection-based image generation for semantic communication systems,” IEEE Commun. Lett., 2023.
  • [11] Z. Zhang, Q. Yang, S. He, and J. Chen, “Deep learning enabled semantic communication systems for video transmission,” in 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall).   IEEE, 2023, pp. 1–5.
  • [12] C. E. Shannon and W. Weaver, The mathematical theory of communication.   Champaign, IL: U. Illinois Press, 1949.
  • [13] O. Lassila, J. Hendler, and T. Berners-Lee, “The semantic web,” Scientific American, vol. 284, no. 5, pp. 34–43, 2001.
  • [14] J. Choi, S. W. Loke, and J. Park, “A unified view on semantic information and communication: A probabilistic logic approach,” in 2022 IEEE International Conference on Communications Workshops (ICC Workshops).   IEEE, 2022, pp. 705–710.
  • [15] H. Xie, Z. Qin, G. Y. Li, and B.-H. Juang, “Deep learning enabled semantic communication systems,” IEEE Trans. Signal Process., vol. 69, pp. 2663–2675, 2021.
  • [16] H. Xie, Z. Qin, and G. Y. Li, “Task-oriented multi-user semantic communications for VQA,” IEEE Wireless Commun. Lett., vol. 11, no. 3, pp. 553–557, 2021.
  • [17] Z. Lyu, G. Zhu, J. Xu, B. Ai, and S. Cui, “Semantic communications for image recovery and classification via deep joint source and channel coding,” IEEE Trans. Wirel. Commun., 2024.
  • [18] W. Li, H. Liang, C. Dong, X. Xu, P. Zhang, and K. Liu, “Non-orthogonal multiple access enhanced multi-user semantic communication,” IEEE Trans. Cogn. Commun. Netw., 2023.
  • [19] X. Mu and Y. Liu, “Exploiting semantic communication for non-orthogonal multiple access,” IEEE J. Sel. Areas Commun., 2023.
  • [20] X. Mu, Y. Liu, L. Guo, and N. Al-Dhahir, “Heterogeneous semantic and bit communications: A semi-NOMA scheme,” IEEE J. Sel. Areas Commun., vol. 41, no. 1, pp. 155–169, 2023.
  • [21] Z. Ding, L. Lv, F. Fang, O. A. Dobre, G. K. Karagiannidis, N. Al-Dhahir, R. Schober, and H. V. Poor, “A state-of-the-art survey on reconfigurable intelligent surface-assisted non-orthogonal multiple access networks,” Proc. IEEE., vol. 110, no. 9, pp. 1358–1379, 2022.
  • [22] Z. Ding, P. Fan, and H. V. Poor, “Impact of user pairing on 5G nonorthogonal multiple-access downlink transmissions,” IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6010–6023, 2015.
  • [23] J. Guo, X. Wang, J. Yang, J. Zheng, and B. Zhao, “User pairing and power allocation for downlink non-orthogonal multiple access,” in 2016 IEEE Globecom Workshops (GC Wkshps).   IEEE, 2016, pp. 1–6.
  • [24] H. Xie, Z. Qin, G. Y. Li, and B.-H. Juang, “Deep learning enabled semantic communication systems,” IEEE Trans. Signal Process., vol. 69, pp. 2663–2675, 2021.
  • [25] L. Yan, Z. Qin, R. Zhang, Y. Li, and G. Y. Li, “Resource allocation for text semantic communications,” IEEE Wireless Commun. Lett., vol. 11, no. 7, pp. 1394–1398, 2022.
  • [26] Z. Luo, W. Ma, A. M. C. So, Y. Ye, and S. Zhang, “Semidefinite relaxation of quadratic optimization problems,” IEEE Signal Process. Mag., vol. 27, no. 3, pp. 20–34, 2010.