SlideShare a Scribd company logo
1 of 10
Download to read offline
TELKOMNIKA, Vol.17, No.4, August 2019, pp.1625~1634
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v17i4.10135  1625
Received June 1, 2018; Revised November 12, 2018; Accepted March 26, 2019
Energy efficient resources allocations for wireless
communication systems
Vinsensius Sigit Widhi Prabowo*1
, Arfianto Fahmi2
, Nachwan Mufti Adriansyah3
,
Nur Andini4
Telkom University Telekomunikasi no.1 St.,
Terusan Buah Batu, Sukapura, Dayeuhkolot, Bandung, Indonesia
*Corresponding author, e-mail: vinsensiusvsw@telkomuniversity.ac.id1
, arfiantof@telkomuniversity.ac.id2
,
nachwanma@telkomuniversity.ac.id3
, nurandini@telkomuniversity.ac.id4
Abstract
The energy consumption level of the telecommunication process has become a new
consideration in resource management scheme. It is becoming a new parameter in the resource
management scheme besides throughput, spectral efficiency, and fairness. This work proposes a power
control scheme and user grouping method to keep the rational energy consumption level of the resource
management scheme. Inverse water-filling power allocation is a power allocation scheme that optimizes
the energy efficiency by giving the power to the user which have good channel conditions. The user
grouping method becomes the solution for carrier aggregation (CA) scheme that prevents edge cell user
get the resources from the high-frequency carrier. This can prevent energy wastage in the transmission
process. This power control scheme and user grouping method can optimize the spectral and energy
efficiency without increasing the time complexity of the system.
Keywords: energy efficient, mean-greedy, user grouping, water-filling
Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
Background on data transmission process, LTE systems use OFDMA technique which
divides one frequency band into several subcarriers (chunk/physical resources block (PRB))
that will be allocated to several users [1, 2]. This is a system that can achieve higher data rate,
and seamless mobility across several distinct technologies [3]. In recent works, the purpose of
resource management scheme (RMS) is not only to achieve a higher throughput, but it is
starting to achieve a higher level of energy efficiency. Energy efficiency is becoming a new
performance parameter on wireless network, as observed in [4]. Energy consumption level
become a new consideration in resource management scheme (RMS). The most popular way to
reduce the energy consumption level is power control scheme, which allocates and controls the
transmitted power that being used, to avoid energy wastage. This scheme exploits the
multi-user diversity on OFDMA system [5]. Inverse water-filling power control is one of power
control schemes that try to optimize the energy efficiency level by giving more power to user
with good channel conditions.
The new LTE-A system uses Carrier Aggregation (CA) to get additional bandwidth for
the system. It is possible to use several adjacent frequency carriers [6]. To improve the energy
efficiency in CA, user grouping method is proposed. User grouping will divides each user
depends on the distance and carriers coverage. This method will give the resources from
the lowest frequency to the furthest user in the cell (edge cell user), and give the resources from
the highest frequency to the nearest user. This can improve the energy efficiency in the system.
In [7-9], RMS on the downlink side of LTE systems with single carrier (without CA) is
proposed. It is assumed all users can be scheduled on the same carrier. Works [7, 8] proposed
the proportional fair algorithm, while [9] proposed the modified greedy (mean-greedy) algorithm.
Work [10] tries to improve the RMS by using QoS provisioning. The modified greedy algorithm
also tried on uplink side in [11-13]. Work [14] tries RMS on LTE-A downlink system with CA
scheme, works [15, 16] proved that the CA scheme makes the proportional fair algorithm not
optimal because there are some problem caused by CA and its different fading on each
component carrier. To overcome this new problem, user grouping (UG) method was proposed.
 ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 4, August 2019: 1625-1634
1626
In [15], UG process only applied on the user side, while in [16], UG process applied both on
user side and chunk side of each carrier. This process increases the fairness among users,
but decrease average user throughput.
Work [17] try to implement grouping process in [16] on mean-greedy-based algorithm.
Simulation process shows that the result is same between mean-greedy algorithm with grouping
and without grouping. Then the grouping process is modified in work [18] to improve the
performance of mean-greedy algorithm process on LTE-A with inter band non-contiguous CA
scheme. In terms of energy saving, work [19] tries to use fractional power control,
and works [20, 21] proposed power control process to meet the energy saving issue on LTE
heterogeneous network. While [22] tries to propose the power allocation on CA system.
Water-filling power control scheme discussed in [23]. This principle is being used in this work to
create a proper water-filling method to be implemented on the system as in [24]. This works try
to analyze the performances of mean-greedy algorithm [9] on LTE-A system with CA by
combining user grouping on [18] and power control principle method on [23]. By the simulation,
the ombined scheme has better energy and spectral efficiency, but the fairness will be lower
compared with the original mean-greedy algorithm.
Model System Design
This work tries to observe the performance of the proposed algorithm through
simulation process, that will be conducted at LTE-A system’s downlink path. The cell that being
observed is a single cell environment, using three aggregated component carriers with the same
amount of bandwidth, same transmit power. The Carrier Aggregation (CA) schemes that being
used is non-contiguous CA, which aggregated several carriers on different band. The allocation
process performed only in observed cell, without handover or user movement. There are no
interference parameters from the other cells. The observed cell condition explained in Figure 1.
A group of aggregated carrier can be defined as [15]:
F = f1, f2, … , fK; f1 < f2 < ⋯ < fK (1)
the path loss value for a carrier can be calculated by the spatial channel model:
PLk = 58.83 + 37.6 log(Rk(km)) + 21 log(fk(Mhz)) (2)
according to (1), for a constant value of PL, the coverage of 𝑓3 must be smaller than 𝑓2 and
so on. The coverage of each carrier can be formulated by:
R1 > R2 > ⋯ > RK (3)
According to Figure 1, user 3 is in the coverage of all carriers, so user 3 can use
the resource from all carriers, while user 1 only can use the resources from 𝑓1 because it is only
in coverage of 𝑓1. This condition will be the basic condition for the grouping process.
Problem Formulation
The main purpose of this work are to analyze the performance of the proposed
algorithm. To analyze the performance, there are several constraints that have to be fulfilled:
∑ 𝛼 𝑛,𝑣
𝑁
𝑛=1 = 1; ∀ 𝑣∈ 𝑉 (4)
∑ ∑ 𝛼 𝑛,𝑣
𝑉
𝑣=1
𝑁
𝑛=1 = 𝑉 (5)
𝛽 𝑛,𝑣 ∈ [0, 𝓍] | 𝓍 ≤ 𝑃𝑡; ∀ 𝑣∈ 𝑉; ∀ 𝑛∈ 𝑁 (6)
∑ ∑ 𝛽 𝑛,𝑣
𝑉
𝑣=1
𝑁
𝑛=1 ≤ 𝑃𝑡 (7)
𝛼 𝑛,𝑣 ≠ 0 → 𝛽 𝑛,𝑣 ≠ 0; ∀ 𝑣∈ 𝑉; ∀ 𝑛∈ 𝑁 (8)
𝛼 represents a chunk allocation matrix, 𝛼 𝑛,𝑣 = 1 if v-th chunk is allocated to n-th user
(n,v is user-chunk pair), otherwise 𝛼 𝑛,𝑣 = 0. 𝛽 represents power allocation matrix. (4) explains
that each chunk only assigned for 1 specific user, cannot be shared with another, while
(5) makes sure all chunks have to be allocated to a specific user. (6) and (7) are contraint that
TELKOMNIKA ISSN: 1693-6930 
Energy efficient resources allocations for wireless... (Vinsensius Sigit Widhi Prabowo)
1627
the total power allocated to each chunk cannot exceed the total power from eNB, and (8) is to
make sure all chunks get power to transmit.
Figure 1. Observed cell condition
2. The Proposed Algorithm
This work tries to combine the User Chunk Grouping (UCG) method and
Inverse-Water-filling (IWF) power control on mean-greedy (MG) algorithm. At first, the UCG
method will be performed to divide the users to several groups, depends on each user location
on cell. Then, the MG algorithm on [9] and [13] will be performed with Equal Power Allocation
(EPA) scheme. After all resources are allocated to a specific user, IWF power control will be
take place in order to manage the power that being used by each resource/chunk. The flowchart
of the proposed algorithm can be seen on Figure 2.
Figure 2. Proposed algorithm’s flowchart
 ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 4, August 2019: 1625-1634
1628
2.1. User Chunk Grouping (UCG) Method
User Chunk Grouping method is a modified user grouping method that divided both
the resources and users on a specified group. Resources and users from each group will be
managed independently on the allocation process. UCG method performed based on
the maximum path loss (𝑃𝐿 𝑚𝑎𝑥) for each carrier. This work uses non-contiguous CA scheme
that aggregated several carriers on different band frequencies. There are some differences in
fading characteristic from each carrier. To maintain the system performances, the path loss for
each carrier cannot exceed 𝑃𝐿 𝑚𝑎𝑥 value. The value of 𝑃𝐿 𝑚𝑎𝑥 can be calculated by [15]:
PLmax = 58.83 + 37.6 log(Rk(km)) + 21 log(fk(Mhz)) (9)
the same value of 𝑃𝐿 𝑚𝑎𝑥 will result different coverage for each carrier (as in (1)-(3)). The higher
frequency will have smaller coverage and vice versa. Users will be divided into several groups
according to the location of each user on the cell. The formulation is [15]:
βn = {βk|PLk
n
< PLmax, 1 ≤ k ≤ K} ; 1 ≤ n ≤ N (10)
thus, 𝛽 𝑛 = 𝛽𝑘 means that the n-th user is the member of group 𝛽𝑘. It also means the n-th user is
on the 𝑘-th carrier coverage and can use 𝑘 carrier(s). The pseudocode algorithm of this process
can be seen on Table 1.
Table 1. Algorithm of User-Grouping Method
Pseudocode for User Grouping Method
Gice each user to a specific group
1 G=0 // G = group for each user
2 for n=1 to N
3 if d(n) ≤ R1 // d = user distance
4 G(n)=1 // R1 = max coverage of carrier 1
5 else if d(n) ≤ R2 // R2 = max coverage of carrier 2
6 G(n)=2
7 else if d(n) ≤ R3 // R3 = max coverage of carrier 3
8 G(n)=3
9 end if
Each group will get chunks from the corresponding component carrier(s).
Group 3 (user 3 on Figure 1) is the nearest user group because they are on carrier 3 coverage
as well as carrier 2 and 1, so group 3 can use chunk from all carrier. Group 2 (user 2 on
Figure 1) is on carrier 2 coverage, but on the outside of carrier 3, so they cannot use resources
from carrier 3. So that group 1 (user 1 on Figure 1), they only can use resources from carrier 1,
because they are on the outside of carrier 2 and 3. Thus, carrier 1 has to divides its chunk to 3
different groups proportionally, and carrier 3 only distributes its chunk to 1 group. 𝛽𝑗 is one of the
group in the system (𝑗 ≤ 𝐾). The resource distribution process to group 𝛽𝑗 can be performed
based on:
∂j = {∑ PLj
nN
n=1 |βn = βj} (11)
where 𝜕𝑗is the total value of PL from carrier k=j on group j. To distribute chunk to each group
can be formulated by:
⌊Cj⌋ =
∂j
∑ ∂k
K
k=1
. V (12)
∑ Cj
K
j=1 ≤ V (13)
the output from this process is a separated CSI matrix for each group. This separated CSI
matrix will be processed independently with MG algorithm and IWF scheme.
TELKOMNIKA ISSN: 1693-6930 
Energy efficient resources allocations for wireless... (Vinsensius Sigit Widhi Prabowo)
1629
2.2. Mean-Greedy (MG) Allocation Algorithm
Mean-Greedy allocation algorithm is a modified greedy algorithm that tries to maximize
both spectral efficiency and fairness [9]. On each TTI, before the chunk allocation takes place,
this algorithm tries to sort each user based on average CSI the system. This average CSI value
will be sorted from the smallest to be used as a sequence number for each user. A user with
the smallest average CSI value will have first chance to get the best chunk for itself, followed by
the second user and so on [9]. The chunk selection by each user are based on greedy principal.
User n* will choose v-th chunks which have the best CSI value based on [9]:
n∗
= arg maxv rn,v(s) (14)
where 𝑟𝑛,𝑣(𝑠) is the CSI value for n-th user and v-th chunk pair on the s-th TTI. This process will
be executed repeatedly until all chunks are allocated to a specific user. If there are unallocated
chunks when all users got at least 1 chunk, the user with the smallest sequence number can
can get chunk again, followed by the second sequence number, and so on. This process
explained by Table 2.
Table 2. Algorithm of Mean-Greedy Process
Pseudocode for Mean-greedy Algorithm
Calculate each user average CSI
1 for n=1 to N // N = total user
2 Cav(n)=average CSI for n-th user
3 Q-number(n)=n // queuing number of each user
4 end for
Sort average user CSI from the lowest
5 for i=1 to (N-1)
6 for j=1 to (N-1)
7 if Cav(j)<Cav(j+1)
8 interchange Q-number(j) and Q-number(j+1)
9 end if
10 end for
11 end for
Allocates the chunk to a specific user
12 C’=0 // C’ = allocated CSI matrix
13 for n=1 to N
14 a=Q-number(n),x=0,y=0
15 for v=1 to V // V = total chunk
16 if x<C(a,j) // C= CSI matrix
17 X=C(a,j),y=j
18 end if
19 end for
20 C(:,y)=0,C’(a,y)=x
21 end for
2.3. Inverse Water-filling Power Control
Inverse Water-filling (IWF) power control is a water-filling scheme that gives more
power transmit to chunks with better channel condition, and reducing the power on chunks with
bad channel condition. This scheme can improve the spectral efficiency on the system, but will
disrupt the system’s fairness [23]. This scheme will maximize the energy efficiency by not
wasting a lot power on worse chunks. The transmitted power will be distributed to each
user-chunk pair according to:
Pn,v(s) =
Hn,v(s)
∑ ∑ Hn,v(s)V
v=1
N
n=1
. Pt (15)
where 𝐻 𝑛,𝑣(𝑠) is a channel condition on n-th user and v-th chunk set on s-th TTI, and 𝑃𝑡 is total
power from eNB. The process of Inverse Water-filling power control explained by Table 3.
2.4. The Proposed Algorithm Flow
At first, each chunk will calculate all CSI to each user to form a CSI matrix. This process
will assume the power allocated equally to each chunk (EPA). This CSI matrix will be used as
 ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 4, August 2019: 1625-1634
1630
an input in the MG allocation algorithm process. MG algorithm will allocates this CSI matrix and
will form an allocated CSI matrix that contains allocated user-chunk pair as an output. IWF
scheme will be take place right after the MG allocation algorithm process. IWF will use
allocation matrix from MG algorithm as an input, then control and distribute the power of each
allocated user-chunk pair and then re-calculate the CSI on each user-chunk pair. The output
from this process will be analyzed to know how is the performance of the proposed algorithm.
The system flowchart can be seen on Figure 2.
Table 3. Algorithm of Inverse Water-Filling Power Control
Pseudocode for Inverse Waterfilling Method
Calculate total channel mitigation
1 CMsum = 0
2 for n = 1 to N
3 for v = 1 to V
4 if C’(n,v)≠0 //all calculations in dB
5 CM(n,v)=C’(n,v) - EPA //EPA=equal power allocation
6 CMsum = CMsum + CM(n,v)
7 end if
8 end for
9 end for
Allocate power to each chunk
10 for n = 1 to N
11 for v = 1 to V
12 Pallocated(n,v)=(CM(n,v)/CMsum)*Ptotal //Pallocated=power allovated to each chunk
13 CPA(n,v)(dB)=CM(n,v)+Pallocated(n,v) //CPA=CSI matrix with allocated power
14 end for
15 end for
3. Research Method
The proposed algorithm is analyzed and simulated by computer software. This results
will be compared to the original algorithm. The algorithm that will be compared are original MG
algorithm on [9], UCG-MG algorithm, MG-IWF algorithm, and the proposed algorithm. The
system performance parameter that being observed in this work are spectral efficiency, energy
efficiency, and system fairness. The simulation parameters shown in Table 4.
Table 4. Simulation Parameters
Parameter Value
Bandwidth per carrier 5 MHz
Chunk bandwidth 180 kHz
Number of chunk per carrier 25
TTI 200
Cell radius
1000 meter
1 km-2 km with 100 m increment value
Cell layout Single cell
Frequency 700 MHz, 900 MHz, 1800 MHz
Gain eNB 18 dBi
Gain UE 0 dBi
Noise figure 7 dB
Total power 40 Watt
Shadowing Lognormal, µ=0, =3
Number of user
75-150 with 5 increment value
75 users
The achievable data rate µ of n-th on v-th chunk can be calculated by [25]:
μn,v = b log2 [1 +
rn,v
Γ
] (16)
Γ =
−ln(5 BER)
1.5
(17)
TELKOMNIKA ISSN: 1693-6930 
Energy efficient resources allocations for wireless... (Vinsensius Sigit Widhi Prabowo)
1631
where b is chunk bandwidth and Γ called SNR gap. The spectral efficiency (SE) and energy
efficiency (EE) of the system be calculated by:
SEsystem =
∑ ∑ μn,v
V
v=1
N
n=1
B
(18)
EEsystem =
∑ ∑ μn,v
V
v=1
N
n=1
Pt
(19)
where B is bandwidth system. There are 2 simulation scenario. The first is a simulation on
a varied number of user, and the other one is a simulation on varied cell coverage.
4. Results and Discussion
4.1. Results on Varied Number of User
For a varied number of users, the proposed algorithm (UCG-MG-IWF) has the best
spectral and energy efficiency, but has the worst fairness index. The addition of UCG and IWF
scheme can increase the energy and spectral efficiency, because this two scheme prioritize
user with the best channel condition. But this constraint will decrease the system fairness
because user with bad channel condition will get less power which makes that user quality will
drop drastically.
The proposed algorithm can improve spectral efficiency up to 1.507 bps/Hz and can
improve energy efficiency up to 188.21 kbps/Watt. This means the proposed algorithm works
well in terms with the energy efficient scheme. But the proposed algorithm’s fairness index
decreased 29.52% compared with the original one. Individually, UCG scheme (UCG-MG) will
increase more energy and spectral efficiency, and decrease less fairness index compared with
IWF scheme (MG-IWF). It means, the performances of UCG scheme is better than IWF
scheme. The simulation results for varied number of users can be seen in Figures 3-5.
4.2. Results on Varied Cell Coverage
On varied cell coverage, the proposed algorithm improved the energy efficiency up to
121.24 kbps/Watt and spectral efficiency up to 0.97 bps/Hz. The fairness index will decrease
up to 27.08% compared with the original MG algorithm. Individually, UCG scheme still a better
scheme than IWF scheme. UCG scheme improves the efficiencies more than IWF, and
decrease the fairness index less than IWF. This scenario’s results explained by Figures 6-8.
Overall results of the simulation can be seen in Table 5.
Figure 3. Energy efficiency of
each algorithm on varied number of users
Figure 4. Spectral efficiency of
each algorithm on varied number of users
 ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 4, August 2019: 1625-1634
1632
Figure 5. Fairness index of
each algorithm on varied number of users
Figure 6. Energy efficiency of
each algorithm on varied cell coverage
Figure 7. Spectral efficiency of
each algorithm on varied cell coverage
Figure 8. Fairness index of
each algorithm on varied cell coverage
Table 5. Simulation Results
VARIED NUMBER OF USER
Algorithm Fairness Index Energy Efficiency (kpbs/Watt) Spectral Efficiency (bps/Hz)
Original MG 0.5695 88.35 0.7068
UCG-MG 0.5343 263.58 2.1086
MG-IWF 0.2815 122.48 0.9799
UCG-MG-IWF 0.2743 276.56 2.2125
VARIED CELL COVERAGE
Algorithm Fairness Index Energy Efficiency (kpbs/Watt) Spectral Efficiency (bps/Hz)
Original MG 0.4934 23.237 0.185
UCG-MG 0.4359 100.153 0.801
MG-IWF 0.2339 45.374 0.362
UCG-MG-IWF 0.2226 144.482 1.155
4.3. Time Complexity
To quantify the complexity of the proposed algorithm, time complexity with asymptotic
approach is used. This approach depends on the time restriction within time transmission
interval [12]. The complexity is determined by the number of iterations. The proposed algorithm
consists of 3 stages of allocation: UCG scheme, MG algorithm, and IWF power control. UCG
scheme divides users and chunks into several groups based on the carrier’s coverage,
it needs 𝑂(𝑁). The MG algorithm sorts the user and allocate chunks to a specific user,
it needs 𝑂(𝑁𝑉). The IWF power control allocates the power for each chunk, it needs 𝑂(𝑁𝑉).
TELKOMNIKA ISSN: 1693-6930 
Energy efficient resources allocations for wireless... (Vinsensius Sigit Widhi Prabowo)
1633
Then, the total complexity is 𝑂(𝑁𝑉) + 𝑂(𝑁𝑉) + 𝑂(𝑁𝑉) ≈ 𝑂(𝑁𝑉). This means, the proposed
algorithm’s time complexity is almost the same with the original MG algorithm. This caused by
the number of iteration of the proposed algorithm and the original MG algorithm is of
the same value. The comparison between each algorithm shown in Table 6.
Table 6. Time Complexity on Each Algorithm
Algorithm
Process Complexity
Total
UCG MG IWF
Original MG - O(NV) -  O(NV)
UCG-MG O(N) O(NV) -  O(NV)
MG-IWF - O(NV) O(NV)  O(NV)
UCG-MG-IWF O(N) O(NV) O(NV)  O(NV)
5. Conclusion
This work proposed an allocation algorithm that tries to maximize the energy efficiency.
By the simulation results, the proposed algorithm can improve both energy efficiency and
spectral efficiency. The proposed algorithm improves spectral efficiency by 1.507 bps/Hz and
improve energy efficiency by 188.21 kbps/Hz. This condition happens because UCG tries to
limit the transmit distance for each carrier, so the system quality can be maintained. Meanwhile
IWF try to maximize the energy and spectral efficiency by adding more power to user with better
channel conditions. In contrary, the proposed algorithm reduces fairness index by 29.51% in
average. This caused by the UCG limit the transmit distance so user in the cell edge will get
less chunk. IWF will reduce allocated power for user with bad channel condition, so it cannot
maintain its quality and reduce the fairness index overall.
References
[1] Zhu H, Wang J. Chunk-based resource allocation in OFDMA systems-part I: chunk allocation. IEEE
Transactions on Communications. 2009; 57(9): 2734-2744.
[2] Zhu H, Wang J. Chunk-based resource allocation in OFDMA systems—Part II: Joint chunk, power
and bit allocation. IEEE Transactions on Communications. 2012; 60(2): 499-509.
[3] Tran SV, Eltawil AM. Optimized scheduling algorithm for LTE downlink system. 2012 IEEE Wireless
Communications and Networking Conference (WCNC). Shanghai. 2012: 1462-1466.
[4] Chen Y, Zhang S, Xu S, Li GY. Fundamental trade-offs on green wireless networks. IEEE
Communications Magazine. 2011; 49(6): 30-37.
[5] Feng D, Jiang C, Lim G, Cimini LJ, Feng G, Li GY. A survey of energy-efficient wireless
communications. IEEE Communications Surveys & Tutorials. 2013; 15(1): 167-178.
[6] Lee H, Vahid S, Moessner K. A survey of radio resource management for spectrum aggregation in
LTE-advanced. IEEE Communications Surveys & Tutorials. 2014; 16(2): 745-760.
[7] Ma Y. Proportional fair scheduling for downlink OFDMA. 2007 IEEE International Conference on
Communications. 2007: 4843-4848.
[8] Wengerter C, Ohlhorst J, von Elbwart AG. Fairness and throughput analysis for generalized
proportional fair frequency scheduling in OFDMA. 2005 IEEE 61st
vehicular technology conference.
Stockholm. 2005; 3: 1903-1907.
[9] Nwamadi O, Zhu X, Nandi AK. Multi-criteria ranking based greedy algorithm for physical resource
block allocation in multi-carrier wireless communication systems. Signal Processing. 2012;
92(11): 2706-17.
[10] Nguyen TD, Han Y. A proportional fairness algorithm with QoS provision in downlink OFDMA
systems. IEEE Communications Letters. 2006; 10(11): 760-2.
[11] Fahmi A, Asvial M, Gunawan D. Improved Performance of Mean-Greedy Algorithm for Chunk
Allocation in SC-FDMA Uplink Systems using Joint-User and Chunk-Based Allocation. Journal of ICT
Research and Applications. 2013; 7(1): 59-81.
[12] Fahmi A, Asvial M, Gunawan D. Combined-order algorithm using promethee method approach and
analytic hierarchy decision for chunk allocation in LTE uplink systems. International Journal of
Communication Networks and Information Security. 2013; 5(1): 39.
[13] Fahmi A, Astuti RP, Meylani L, Asvial M, Gunawan D. A Combined User-order and Chunk-order
Algorithm to Minimize the Average BER for Chunk Allocation in SC-FDMA Systems. TELKOMNIKA
Telecommunication Computing Electronics and Control. 2016; 14(2): 574-587.
[14] Lin LX, Liu YA, Fang LI, Gang XI, Liu KM, Ge XY. Resource scheduling in downlink LTE-Advanced
system with carrier aggregation. The Journal of China Universities of Posts and Telecommunications.
2012; 19(1): 44-123.
 ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 4, August 2019: 1625-1634
1634
[15] Shi S, Feng C, Guo C. A resource scheduling algorithm based on user grouping for LTE-advanced
system with carrier aggregation. 2009 International Symposium on Computer Network and
Multimedia Technology. Wuhan. 2009: 1-4.
[16] Prabowo VSW. Analysis of Resource Scheduling Algorithm Based-on User Grouping for
LTE-Advanced System With Carrier Aggregation. eProceedings of Engineering. 2015;
2(2): 2425-2434.
[17] Fahmi A, Astuti RP, Meylani L, Prabowo VSW. Utilizing mean-greedy algorithm using user grouping
for chunk allocation in OFDMA systems with carrier aggregation. 2015 9th
International Conference
on Telecommunication Systems Services and Applications (TSSA). Banduung. 2015: 1-4.
[18] Prabowo VSW, Fahmi A, Perdana D. Modified Mean-Greedy Algorithm in OFDMA System With
Carrier Aggregation. Advanced Research in Engineering and Information Technology International
Conference. Bandung. 2017: 932-938.
[19] Fahmi A, Asvial M, Gunawan D. Uplink resource allocation algorithms with fractional power control as
power constraints for OFDMA system. TENCON 2011-2011 IEEE Region 10 Conference. Bali.
2011: 592-596.
[20] Morimoto A, Miki N, Okumura Y. Performance evaluation of reduced power inter-cell interference
coordination for downlink in LTE-advanced heterogeneous networks. European Wireless 2013; 19th
European Wireless Conference. Guildford. 2013: 1-6.
[21] Yang K, Martin S, Yahiya TA, Wu J. Energy-efficient resource allocation for downlink in LTE
heterogeneous networks. 2014 IEEE 80th
Vehicular Technology Conference (VTC2014-Fall). 2014: 1-5.
[22] Ding Y, Xiao D, Yang D. An improved downlink power allocation restriction method based on carrier
aggregation. 2010 2nd
IEEE InternationalConference on Network Infrastructure and Digital Content.
Beijing. 2010: 460-464.
[23] Molisch AF. Wireless Communication. 2nd. California: A John WIley and Sons. 2011: 436-438.
[24] Narottama B, Fahmi A, Syihabuddin B, Saputri DM, Christy PE, Ludwiniananda OR. Device
Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D. TELKOMNIKA
Telecommunication Computing Electronics and Control. 2017; 15(1): 203-211.
[25] Fraimis IG, Kotsopoulos SA. QoS-based proportional fair allocation algorithm for OFDMA wireless
cellular systems. IEEE Communications Letters. 2011; 15(10): 1091-1093.

More Related Content

What's hot

MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYMESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYijwmn
 
Receiver cooperation in topology control for wireless ad hoc networks
Receiver cooperation in topology control for wireless ad hoc networksReceiver cooperation in topology control for wireless ad hoc networks
Receiver cooperation in topology control for wireless ad hoc networksPvrtechnologies Nellore
 
M-EPAR to Improve the Quality of the MANETs
M-EPAR to Improve the Quality of the MANETsM-EPAR to Improve the Quality of the MANETs
M-EPAR to Improve the Quality of the MANETsIJERA Editor
 
Equity-Based free channels assignment for secondary users in a cognitive radi...
Equity-Based free channels assignment for secondary users in a cognitive radi...Equity-Based free channels assignment for secondary users in a cognitive radi...
Equity-Based free channels assignment for secondary users in a cognitive radi...IJECEIAES
 
Ijircee paper-template
Ijircee paper-templateIjircee paper-template
Ijircee paper-templateijircee
 
Performance of CBR Traffic on Node Overutilization in MANETs
Performance of CBR Traffic on Node Overutilization in MANETsPerformance of CBR Traffic on Node Overutilization in MANETs
Performance of CBR Traffic on Node Overutilization in MANETsRSIS International
 
QoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN controlQoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN controlUniversity of Piraeus
 
GPS Enabled Energy Efficient Routing for Manet
GPS Enabled Energy Efficient Routing for ManetGPS Enabled Energy Efficient Routing for Manet
GPS Enabled Energy Efficient Routing for ManetCSCJournals
 
Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...eSAT Publishing House
 
A HYBRID GENETIC ALGORITHM APPROACH FOR OSPF WEIGHT SETTING PROBLEM
A HYBRID GENETIC ALGORITHM APPROACH FOR OSPF WEIGHT SETTING PROBLEMA HYBRID GENETIC ALGORITHM APPROACH FOR OSPF WEIGHT SETTING PROBLEM
A HYBRID GENETIC ALGORITHM APPROACH FOR OSPF WEIGHT SETTING PROBLEMEM Legacy
 
Loss allocation in distribution networks with distributed generators undergoi...
Loss allocation in distribution networks with distributed generators undergoi...Loss allocation in distribution networks with distributed generators undergoi...
Loss allocation in distribution networks with distributed generators undergoi...IJECEIAES
 
Adaptive resources assignment in OFDM-based cognitive radio systems
Adaptive resources assignment in OFDM-based cognitive radio systemsAdaptive resources assignment in OFDM-based cognitive radio systems
Adaptive resources assignment in OFDM-based cognitive radio systemsIJECEIAES
 
A downlink scheduler supporting real time services in LTE cellular networks
A downlink scheduler supporting real time services in LTE cellular networksA downlink scheduler supporting real time services in LTE cellular networks
A downlink scheduler supporting real time services in LTE cellular networksUniversity of Piraeus
 
Incorporate ACO routing algorithm and mobile sink in wireless sensor networks
Incorporate ACO routing algorithm and mobile sink in wireless sensor networks Incorporate ACO routing algorithm and mobile sink in wireless sensor networks
Incorporate ACO routing algorithm and mobile sink in wireless sensor networks IJECEIAES
 

What's hot (20)

MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYMESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
 
Receiver cooperation in topology control for wireless ad hoc networks
Receiver cooperation in topology control for wireless ad hoc networksReceiver cooperation in topology control for wireless ad hoc networks
Receiver cooperation in topology control for wireless ad hoc networks
 
EESRDA
EESRDAEESRDA
EESRDA
 
M-EPAR to Improve the Quality of the MANETs
M-EPAR to Improve the Quality of the MANETsM-EPAR to Improve the Quality of the MANETs
M-EPAR to Improve the Quality of the MANETs
 
Equity-Based free channels assignment for secondary users in a cognitive radi...
Equity-Based free channels assignment for secondary users in a cognitive radi...Equity-Based free channels assignment for secondary users in a cognitive radi...
Equity-Based free channels assignment for secondary users in a cognitive radi...
 
Ijircee paper-template
Ijircee paper-templateIjircee paper-template
Ijircee paper-template
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
 
Performance of CBR Traffic on Node Overutilization in MANETs
Performance of CBR Traffic on Node Overutilization in MANETsPerformance of CBR Traffic on Node Overutilization in MANETs
Performance of CBR Traffic on Node Overutilization in MANETs
 
Fy3111571162
Fy3111571162Fy3111571162
Fy3111571162
 
L0947075
L0947075L0947075
L0947075
 
QoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN controlQoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN control
 
1 s2.0-s0142061515005086-main
1 s2.0-s0142061515005086-main1 s2.0-s0142061515005086-main
1 s2.0-s0142061515005086-main
 
GPS Enabled Energy Efficient Routing for Manet
GPS Enabled Energy Efficient Routing for ManetGPS Enabled Energy Efficient Routing for Manet
GPS Enabled Energy Efficient Routing for Manet
 
Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
 
A HYBRID GENETIC ALGORITHM APPROACH FOR OSPF WEIGHT SETTING PROBLEM
A HYBRID GENETIC ALGORITHM APPROACH FOR OSPF WEIGHT SETTING PROBLEMA HYBRID GENETIC ALGORITHM APPROACH FOR OSPF WEIGHT SETTING PROBLEM
A HYBRID GENETIC ALGORITHM APPROACH FOR OSPF WEIGHT SETTING PROBLEM
 
Loss allocation in distribution networks with distributed generators undergoi...
Loss allocation in distribution networks with distributed generators undergoi...Loss allocation in distribution networks with distributed generators undergoi...
Loss allocation in distribution networks with distributed generators undergoi...
 
Adaptive resources assignment in OFDM-based cognitive radio systems
Adaptive resources assignment in OFDM-based cognitive radio systemsAdaptive resources assignment in OFDM-based cognitive radio systems
Adaptive resources assignment in OFDM-based cognitive radio systems
 
A downlink scheduler supporting real time services in LTE cellular networks
A downlink scheduler supporting real time services in LTE cellular networksA downlink scheduler supporting real time services in LTE cellular networks
A downlink scheduler supporting real time services in LTE cellular networks
 
Incorporate ACO routing algorithm and mobile sink in wireless sensor networks
Incorporate ACO routing algorithm and mobile sink in wireless sensor networks Incorporate ACO routing algorithm and mobile sink in wireless sensor networks
Incorporate ACO routing algorithm and mobile sink in wireless sensor networks
 

Similar to Energy efficient resources allocations for wireless communication systems

A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...ijmnct
 
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...iosrjce
 
01 16286 32182-1-sm multiple (edit)
01 16286 32182-1-sm multiple (edit)01 16286 32182-1-sm multiple (edit)
01 16286 32182-1-sm multiple (edit)IAESIJEECS
 
Cost Allocation of Reactive Power Using Matrix Methodology in Transmission Ne...
Cost Allocation of Reactive Power Using Matrix Methodology in Transmission Ne...Cost Allocation of Reactive Power Using Matrix Methodology in Transmission Ne...
Cost Allocation of Reactive Power Using Matrix Methodology in Transmission Ne...IJAAS Team
 
Abrol2018 article joint_powerallocationandrelayse
Abrol2018 article joint_powerallocationandrelayseAbrol2018 article joint_powerallocationandrelayse
Abrol2018 article joint_powerallocationandrelayseRakesh Jha
 
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...IRJET Journal
 
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...IOSR Journals
 
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs cscpconf
 
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...IJCNCJournal
 
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...IJCNCJournal
 
MPR selection to the OLSR quality of service in MANET using minmax algorithm
MPR selection to the OLSR quality of service in MANET using minmax algorithmMPR selection to the OLSR quality of service in MANET using minmax algorithm
MPR selection to the OLSR quality of service in MANET using minmax algorithmIJECEIAES
 
An Energy Efficient Mobile Sink Based Mechanism for WSNs.pdf
An Energy Efficient Mobile Sink Based Mechanism for WSNs.pdfAn Energy Efficient Mobile Sink Based Mechanism for WSNs.pdf
An Energy Efficient Mobile Sink Based Mechanism for WSNs.pdfMohammad Siraj
 
Improved Algorithm for Throughput Maximization in MC-CDMA
Improved Algorithm for Throughput Maximization in MC-CDMAImproved Algorithm for Throughput Maximization in MC-CDMA
Improved Algorithm for Throughput Maximization in MC-CDMAVLSICS Design
 
Implementation of optimal solution for network lifetime and energy consumptio...
Implementation of optimal solution for network lifetime and energy consumptio...Implementation of optimal solution for network lifetime and energy consumptio...
Implementation of optimal solution for network lifetime and energy consumptio...TELKOMNIKA JOURNAL
 
Optimum capacity allocation of distributed generation units using parallel ps...
Optimum capacity allocation of distributed generation units using parallel ps...Optimum capacity allocation of distributed generation units using parallel ps...
Optimum capacity allocation of distributed generation units using parallel ps...eSAT Journals
 
USAGE BASED COST ALLOCATION TECHNIQUE FOR EHV NETWORKS USING NON-LINEAR UTILI...
USAGE BASED COST ALLOCATION TECHNIQUE FOR EHV NETWORKS USING NON-LINEAR UTILI...USAGE BASED COST ALLOCATION TECHNIQUE FOR EHV NETWORKS USING NON-LINEAR UTILI...
USAGE BASED COST ALLOCATION TECHNIQUE FOR EHV NETWORKS USING NON-LINEAR UTILI...ELELIJ
 
Energy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneousEnergy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneousIJCNCJournal
 
Cooperative ad hoc networks for energy efficient improve connectivity
Cooperative ad hoc networks for energy efficient improve connectivityCooperative ad hoc networks for energy efficient improve connectivity
Cooperative ad hoc networks for energy efficient improve connectivityeSAT Publishing House
 
13_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-293813_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-2938Vennila Raja
 
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSN
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSNRecent Developments in Routing Algorithms for Achieving Elongated Life in WSN
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSNijsrd.com
 

Similar to Energy efficient resources allocations for wireless communication systems (20)

A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
 
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...
 
01 16286 32182-1-sm multiple (edit)
01 16286 32182-1-sm multiple (edit)01 16286 32182-1-sm multiple (edit)
01 16286 32182-1-sm multiple (edit)
 
Cost Allocation of Reactive Power Using Matrix Methodology in Transmission Ne...
Cost Allocation of Reactive Power Using Matrix Methodology in Transmission Ne...Cost Allocation of Reactive Power Using Matrix Methodology in Transmission Ne...
Cost Allocation of Reactive Power Using Matrix Methodology in Transmission Ne...
 
Abrol2018 article joint_powerallocationandrelayse
Abrol2018 article joint_powerallocationandrelayseAbrol2018 article joint_powerallocationandrelayse
Abrol2018 article joint_powerallocationandrelayse
 
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
 
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...
 
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
 
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
 
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
 
MPR selection to the OLSR quality of service in MANET using minmax algorithm
MPR selection to the OLSR quality of service in MANET using minmax algorithmMPR selection to the OLSR quality of service in MANET using minmax algorithm
MPR selection to the OLSR quality of service in MANET using minmax algorithm
 
An Energy Efficient Mobile Sink Based Mechanism for WSNs.pdf
An Energy Efficient Mobile Sink Based Mechanism for WSNs.pdfAn Energy Efficient Mobile Sink Based Mechanism for WSNs.pdf
An Energy Efficient Mobile Sink Based Mechanism for WSNs.pdf
 
Improved Algorithm for Throughput Maximization in MC-CDMA
Improved Algorithm for Throughput Maximization in MC-CDMAImproved Algorithm for Throughput Maximization in MC-CDMA
Improved Algorithm for Throughput Maximization in MC-CDMA
 
Implementation of optimal solution for network lifetime and energy consumptio...
Implementation of optimal solution for network lifetime and energy consumptio...Implementation of optimal solution for network lifetime and energy consumptio...
Implementation of optimal solution for network lifetime and energy consumptio...
 
Optimum capacity allocation of distributed generation units using parallel ps...
Optimum capacity allocation of distributed generation units using parallel ps...Optimum capacity allocation of distributed generation units using parallel ps...
Optimum capacity allocation of distributed generation units using parallel ps...
 
USAGE BASED COST ALLOCATION TECHNIQUE FOR EHV NETWORKS USING NON-LINEAR UTILI...
USAGE BASED COST ALLOCATION TECHNIQUE FOR EHV NETWORKS USING NON-LINEAR UTILI...USAGE BASED COST ALLOCATION TECHNIQUE FOR EHV NETWORKS USING NON-LINEAR UTILI...
USAGE BASED COST ALLOCATION TECHNIQUE FOR EHV NETWORKS USING NON-LINEAR UTILI...
 
Energy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneousEnergy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneous
 
Cooperative ad hoc networks for energy efficient improve connectivity
Cooperative ad hoc networks for energy efficient improve connectivityCooperative ad hoc networks for energy efficient improve connectivity
Cooperative ad hoc networks for energy efficient improve connectivity
 
13_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-293813_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-2938
 
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSN
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSNRecent Developments in Routing Algorithms for Achieving Elongated Life in WSN
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSN
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 

Recently uploaded (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 

Energy efficient resources allocations for wireless communication systems

  • 1. TELKOMNIKA, Vol.17, No.4, August 2019, pp.1625~1634 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v17i4.10135  1625 Received June 1, 2018; Revised November 12, 2018; Accepted March 26, 2019 Energy efficient resources allocations for wireless communication systems Vinsensius Sigit Widhi Prabowo*1 , Arfianto Fahmi2 , Nachwan Mufti Adriansyah3 , Nur Andini4 Telkom University Telekomunikasi no.1 St., Terusan Buah Batu, Sukapura, Dayeuhkolot, Bandung, Indonesia *Corresponding author, e-mail: vinsensiusvsw@telkomuniversity.ac.id1 , arfiantof@telkomuniversity.ac.id2 , nachwanma@telkomuniversity.ac.id3 , nurandini@telkomuniversity.ac.id4 Abstract The energy consumption level of the telecommunication process has become a new consideration in resource management scheme. It is becoming a new parameter in the resource management scheme besides throughput, spectral efficiency, and fairness. This work proposes a power control scheme and user grouping method to keep the rational energy consumption level of the resource management scheme. Inverse water-filling power allocation is a power allocation scheme that optimizes the energy efficiency by giving the power to the user which have good channel conditions. The user grouping method becomes the solution for carrier aggregation (CA) scheme that prevents edge cell user get the resources from the high-frequency carrier. This can prevent energy wastage in the transmission process. This power control scheme and user grouping method can optimize the spectral and energy efficiency without increasing the time complexity of the system. Keywords: energy efficient, mean-greedy, user grouping, water-filling Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction Background on data transmission process, LTE systems use OFDMA technique which divides one frequency band into several subcarriers (chunk/physical resources block (PRB)) that will be allocated to several users [1, 2]. This is a system that can achieve higher data rate, and seamless mobility across several distinct technologies [3]. In recent works, the purpose of resource management scheme (RMS) is not only to achieve a higher throughput, but it is starting to achieve a higher level of energy efficiency. Energy efficiency is becoming a new performance parameter on wireless network, as observed in [4]. Energy consumption level become a new consideration in resource management scheme (RMS). The most popular way to reduce the energy consumption level is power control scheme, which allocates and controls the transmitted power that being used, to avoid energy wastage. This scheme exploits the multi-user diversity on OFDMA system [5]. Inverse water-filling power control is one of power control schemes that try to optimize the energy efficiency level by giving more power to user with good channel conditions. The new LTE-A system uses Carrier Aggregation (CA) to get additional bandwidth for the system. It is possible to use several adjacent frequency carriers [6]. To improve the energy efficiency in CA, user grouping method is proposed. User grouping will divides each user depends on the distance and carriers coverage. This method will give the resources from the lowest frequency to the furthest user in the cell (edge cell user), and give the resources from the highest frequency to the nearest user. This can improve the energy efficiency in the system. In [7-9], RMS on the downlink side of LTE systems with single carrier (without CA) is proposed. It is assumed all users can be scheduled on the same carrier. Works [7, 8] proposed the proportional fair algorithm, while [9] proposed the modified greedy (mean-greedy) algorithm. Work [10] tries to improve the RMS by using QoS provisioning. The modified greedy algorithm also tried on uplink side in [11-13]. Work [14] tries RMS on LTE-A downlink system with CA scheme, works [15, 16] proved that the CA scheme makes the proportional fair algorithm not optimal because there are some problem caused by CA and its different fading on each component carrier. To overcome this new problem, user grouping (UG) method was proposed.
  • 2.  ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 4, August 2019: 1625-1634 1626 In [15], UG process only applied on the user side, while in [16], UG process applied both on user side and chunk side of each carrier. This process increases the fairness among users, but decrease average user throughput. Work [17] try to implement grouping process in [16] on mean-greedy-based algorithm. Simulation process shows that the result is same between mean-greedy algorithm with grouping and without grouping. Then the grouping process is modified in work [18] to improve the performance of mean-greedy algorithm process on LTE-A with inter band non-contiguous CA scheme. In terms of energy saving, work [19] tries to use fractional power control, and works [20, 21] proposed power control process to meet the energy saving issue on LTE heterogeneous network. While [22] tries to propose the power allocation on CA system. Water-filling power control scheme discussed in [23]. This principle is being used in this work to create a proper water-filling method to be implemented on the system as in [24]. This works try to analyze the performances of mean-greedy algorithm [9] on LTE-A system with CA by combining user grouping on [18] and power control principle method on [23]. By the simulation, the ombined scheme has better energy and spectral efficiency, but the fairness will be lower compared with the original mean-greedy algorithm. Model System Design This work tries to observe the performance of the proposed algorithm through simulation process, that will be conducted at LTE-A system’s downlink path. The cell that being observed is a single cell environment, using three aggregated component carriers with the same amount of bandwidth, same transmit power. The Carrier Aggregation (CA) schemes that being used is non-contiguous CA, which aggregated several carriers on different band. The allocation process performed only in observed cell, without handover or user movement. There are no interference parameters from the other cells. The observed cell condition explained in Figure 1. A group of aggregated carrier can be defined as [15]: F = f1, f2, … , fK; f1 < f2 < ⋯ < fK (1) the path loss value for a carrier can be calculated by the spatial channel model: PLk = 58.83 + 37.6 log(Rk(km)) + 21 log(fk(Mhz)) (2) according to (1), for a constant value of PL, the coverage of 𝑓3 must be smaller than 𝑓2 and so on. The coverage of each carrier can be formulated by: R1 > R2 > ⋯ > RK (3) According to Figure 1, user 3 is in the coverage of all carriers, so user 3 can use the resource from all carriers, while user 1 only can use the resources from 𝑓1 because it is only in coverage of 𝑓1. This condition will be the basic condition for the grouping process. Problem Formulation The main purpose of this work are to analyze the performance of the proposed algorithm. To analyze the performance, there are several constraints that have to be fulfilled: ∑ 𝛼 𝑛,𝑣 𝑁 𝑛=1 = 1; ∀ 𝑣∈ 𝑉 (4) ∑ ∑ 𝛼 𝑛,𝑣 𝑉 𝑣=1 𝑁 𝑛=1 = 𝑉 (5) 𝛽 𝑛,𝑣 ∈ [0, 𝓍] | 𝓍 ≤ 𝑃𝑡; ∀ 𝑣∈ 𝑉; ∀ 𝑛∈ 𝑁 (6) ∑ ∑ 𝛽 𝑛,𝑣 𝑉 𝑣=1 𝑁 𝑛=1 ≤ 𝑃𝑡 (7) 𝛼 𝑛,𝑣 ≠ 0 → 𝛽 𝑛,𝑣 ≠ 0; ∀ 𝑣∈ 𝑉; ∀ 𝑛∈ 𝑁 (8) 𝛼 represents a chunk allocation matrix, 𝛼 𝑛,𝑣 = 1 if v-th chunk is allocated to n-th user (n,v is user-chunk pair), otherwise 𝛼 𝑛,𝑣 = 0. 𝛽 represents power allocation matrix. (4) explains that each chunk only assigned for 1 specific user, cannot be shared with another, while (5) makes sure all chunks have to be allocated to a specific user. (6) and (7) are contraint that
  • 3. TELKOMNIKA ISSN: 1693-6930  Energy efficient resources allocations for wireless... (Vinsensius Sigit Widhi Prabowo) 1627 the total power allocated to each chunk cannot exceed the total power from eNB, and (8) is to make sure all chunks get power to transmit. Figure 1. Observed cell condition 2. The Proposed Algorithm This work tries to combine the User Chunk Grouping (UCG) method and Inverse-Water-filling (IWF) power control on mean-greedy (MG) algorithm. At first, the UCG method will be performed to divide the users to several groups, depends on each user location on cell. Then, the MG algorithm on [9] and [13] will be performed with Equal Power Allocation (EPA) scheme. After all resources are allocated to a specific user, IWF power control will be take place in order to manage the power that being used by each resource/chunk. The flowchart of the proposed algorithm can be seen on Figure 2. Figure 2. Proposed algorithm’s flowchart
  • 4.  ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 4, August 2019: 1625-1634 1628 2.1. User Chunk Grouping (UCG) Method User Chunk Grouping method is a modified user grouping method that divided both the resources and users on a specified group. Resources and users from each group will be managed independently on the allocation process. UCG method performed based on the maximum path loss (𝑃𝐿 𝑚𝑎𝑥) for each carrier. This work uses non-contiguous CA scheme that aggregated several carriers on different band frequencies. There are some differences in fading characteristic from each carrier. To maintain the system performances, the path loss for each carrier cannot exceed 𝑃𝐿 𝑚𝑎𝑥 value. The value of 𝑃𝐿 𝑚𝑎𝑥 can be calculated by [15]: PLmax = 58.83 + 37.6 log(Rk(km)) + 21 log(fk(Mhz)) (9) the same value of 𝑃𝐿 𝑚𝑎𝑥 will result different coverage for each carrier (as in (1)-(3)). The higher frequency will have smaller coverage and vice versa. Users will be divided into several groups according to the location of each user on the cell. The formulation is [15]: βn = {βk|PLk n < PLmax, 1 ≤ k ≤ K} ; 1 ≤ n ≤ N (10) thus, 𝛽 𝑛 = 𝛽𝑘 means that the n-th user is the member of group 𝛽𝑘. It also means the n-th user is on the 𝑘-th carrier coverage and can use 𝑘 carrier(s). The pseudocode algorithm of this process can be seen on Table 1. Table 1. Algorithm of User-Grouping Method Pseudocode for User Grouping Method Gice each user to a specific group 1 G=0 // G = group for each user 2 for n=1 to N 3 if d(n) ≤ R1 // d = user distance 4 G(n)=1 // R1 = max coverage of carrier 1 5 else if d(n) ≤ R2 // R2 = max coverage of carrier 2 6 G(n)=2 7 else if d(n) ≤ R3 // R3 = max coverage of carrier 3 8 G(n)=3 9 end if Each group will get chunks from the corresponding component carrier(s). Group 3 (user 3 on Figure 1) is the nearest user group because they are on carrier 3 coverage as well as carrier 2 and 1, so group 3 can use chunk from all carrier. Group 2 (user 2 on Figure 1) is on carrier 2 coverage, but on the outside of carrier 3, so they cannot use resources from carrier 3. So that group 1 (user 1 on Figure 1), they only can use resources from carrier 1, because they are on the outside of carrier 2 and 3. Thus, carrier 1 has to divides its chunk to 3 different groups proportionally, and carrier 3 only distributes its chunk to 1 group. 𝛽𝑗 is one of the group in the system (𝑗 ≤ 𝐾). The resource distribution process to group 𝛽𝑗 can be performed based on: ∂j = {∑ PLj nN n=1 |βn = βj} (11) where 𝜕𝑗is the total value of PL from carrier k=j on group j. To distribute chunk to each group can be formulated by: ⌊Cj⌋ = ∂j ∑ ∂k K k=1 . V (12) ∑ Cj K j=1 ≤ V (13) the output from this process is a separated CSI matrix for each group. This separated CSI matrix will be processed independently with MG algorithm and IWF scheme.
  • 5. TELKOMNIKA ISSN: 1693-6930  Energy efficient resources allocations for wireless... (Vinsensius Sigit Widhi Prabowo) 1629 2.2. Mean-Greedy (MG) Allocation Algorithm Mean-Greedy allocation algorithm is a modified greedy algorithm that tries to maximize both spectral efficiency and fairness [9]. On each TTI, before the chunk allocation takes place, this algorithm tries to sort each user based on average CSI the system. This average CSI value will be sorted from the smallest to be used as a sequence number for each user. A user with the smallest average CSI value will have first chance to get the best chunk for itself, followed by the second user and so on [9]. The chunk selection by each user are based on greedy principal. User n* will choose v-th chunks which have the best CSI value based on [9]: n∗ = arg maxv rn,v(s) (14) where 𝑟𝑛,𝑣(𝑠) is the CSI value for n-th user and v-th chunk pair on the s-th TTI. This process will be executed repeatedly until all chunks are allocated to a specific user. If there are unallocated chunks when all users got at least 1 chunk, the user with the smallest sequence number can can get chunk again, followed by the second sequence number, and so on. This process explained by Table 2. Table 2. Algorithm of Mean-Greedy Process Pseudocode for Mean-greedy Algorithm Calculate each user average CSI 1 for n=1 to N // N = total user 2 Cav(n)=average CSI for n-th user 3 Q-number(n)=n // queuing number of each user 4 end for Sort average user CSI from the lowest 5 for i=1 to (N-1) 6 for j=1 to (N-1) 7 if Cav(j)<Cav(j+1) 8 interchange Q-number(j) and Q-number(j+1) 9 end if 10 end for 11 end for Allocates the chunk to a specific user 12 C’=0 // C’ = allocated CSI matrix 13 for n=1 to N 14 a=Q-number(n),x=0,y=0 15 for v=1 to V // V = total chunk 16 if x<C(a,j) // C= CSI matrix 17 X=C(a,j),y=j 18 end if 19 end for 20 C(:,y)=0,C’(a,y)=x 21 end for 2.3. Inverse Water-filling Power Control Inverse Water-filling (IWF) power control is a water-filling scheme that gives more power transmit to chunks with better channel condition, and reducing the power on chunks with bad channel condition. This scheme can improve the spectral efficiency on the system, but will disrupt the system’s fairness [23]. This scheme will maximize the energy efficiency by not wasting a lot power on worse chunks. The transmitted power will be distributed to each user-chunk pair according to: Pn,v(s) = Hn,v(s) ∑ ∑ Hn,v(s)V v=1 N n=1 . Pt (15) where 𝐻 𝑛,𝑣(𝑠) is a channel condition on n-th user and v-th chunk set on s-th TTI, and 𝑃𝑡 is total power from eNB. The process of Inverse Water-filling power control explained by Table 3. 2.4. The Proposed Algorithm Flow At first, each chunk will calculate all CSI to each user to form a CSI matrix. This process will assume the power allocated equally to each chunk (EPA). This CSI matrix will be used as
  • 6.  ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 4, August 2019: 1625-1634 1630 an input in the MG allocation algorithm process. MG algorithm will allocates this CSI matrix and will form an allocated CSI matrix that contains allocated user-chunk pair as an output. IWF scheme will be take place right after the MG allocation algorithm process. IWF will use allocation matrix from MG algorithm as an input, then control and distribute the power of each allocated user-chunk pair and then re-calculate the CSI on each user-chunk pair. The output from this process will be analyzed to know how is the performance of the proposed algorithm. The system flowchart can be seen on Figure 2. Table 3. Algorithm of Inverse Water-Filling Power Control Pseudocode for Inverse Waterfilling Method Calculate total channel mitigation 1 CMsum = 0 2 for n = 1 to N 3 for v = 1 to V 4 if C’(n,v)≠0 //all calculations in dB 5 CM(n,v)=C’(n,v) - EPA //EPA=equal power allocation 6 CMsum = CMsum + CM(n,v) 7 end if 8 end for 9 end for Allocate power to each chunk 10 for n = 1 to N 11 for v = 1 to V 12 Pallocated(n,v)=(CM(n,v)/CMsum)*Ptotal //Pallocated=power allovated to each chunk 13 CPA(n,v)(dB)=CM(n,v)+Pallocated(n,v) //CPA=CSI matrix with allocated power 14 end for 15 end for 3. Research Method The proposed algorithm is analyzed and simulated by computer software. This results will be compared to the original algorithm. The algorithm that will be compared are original MG algorithm on [9], UCG-MG algorithm, MG-IWF algorithm, and the proposed algorithm. The system performance parameter that being observed in this work are spectral efficiency, energy efficiency, and system fairness. The simulation parameters shown in Table 4. Table 4. Simulation Parameters Parameter Value Bandwidth per carrier 5 MHz Chunk bandwidth 180 kHz Number of chunk per carrier 25 TTI 200 Cell radius 1000 meter 1 km-2 km with 100 m increment value Cell layout Single cell Frequency 700 MHz, 900 MHz, 1800 MHz Gain eNB 18 dBi Gain UE 0 dBi Noise figure 7 dB Total power 40 Watt Shadowing Lognormal, µ=0, =3 Number of user 75-150 with 5 increment value 75 users The achievable data rate µ of n-th on v-th chunk can be calculated by [25]: μn,v = b log2 [1 + rn,v Γ ] (16) Γ = −ln(5 BER) 1.5 (17)
  • 7. TELKOMNIKA ISSN: 1693-6930  Energy efficient resources allocations for wireless... (Vinsensius Sigit Widhi Prabowo) 1631 where b is chunk bandwidth and Γ called SNR gap. The spectral efficiency (SE) and energy efficiency (EE) of the system be calculated by: SEsystem = ∑ ∑ μn,v V v=1 N n=1 B (18) EEsystem = ∑ ∑ μn,v V v=1 N n=1 Pt (19) where B is bandwidth system. There are 2 simulation scenario. The first is a simulation on a varied number of user, and the other one is a simulation on varied cell coverage. 4. Results and Discussion 4.1. Results on Varied Number of User For a varied number of users, the proposed algorithm (UCG-MG-IWF) has the best spectral and energy efficiency, but has the worst fairness index. The addition of UCG and IWF scheme can increase the energy and spectral efficiency, because this two scheme prioritize user with the best channel condition. But this constraint will decrease the system fairness because user with bad channel condition will get less power which makes that user quality will drop drastically. The proposed algorithm can improve spectral efficiency up to 1.507 bps/Hz and can improve energy efficiency up to 188.21 kbps/Watt. This means the proposed algorithm works well in terms with the energy efficient scheme. But the proposed algorithm’s fairness index decreased 29.52% compared with the original one. Individually, UCG scheme (UCG-MG) will increase more energy and spectral efficiency, and decrease less fairness index compared with IWF scheme (MG-IWF). It means, the performances of UCG scheme is better than IWF scheme. The simulation results for varied number of users can be seen in Figures 3-5. 4.2. Results on Varied Cell Coverage On varied cell coverage, the proposed algorithm improved the energy efficiency up to 121.24 kbps/Watt and spectral efficiency up to 0.97 bps/Hz. The fairness index will decrease up to 27.08% compared with the original MG algorithm. Individually, UCG scheme still a better scheme than IWF scheme. UCG scheme improves the efficiencies more than IWF, and decrease the fairness index less than IWF. This scenario’s results explained by Figures 6-8. Overall results of the simulation can be seen in Table 5. Figure 3. Energy efficiency of each algorithm on varied number of users Figure 4. Spectral efficiency of each algorithm on varied number of users
  • 8.  ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 4, August 2019: 1625-1634 1632 Figure 5. Fairness index of each algorithm on varied number of users Figure 6. Energy efficiency of each algorithm on varied cell coverage Figure 7. Spectral efficiency of each algorithm on varied cell coverage Figure 8. Fairness index of each algorithm on varied cell coverage Table 5. Simulation Results VARIED NUMBER OF USER Algorithm Fairness Index Energy Efficiency (kpbs/Watt) Spectral Efficiency (bps/Hz) Original MG 0.5695 88.35 0.7068 UCG-MG 0.5343 263.58 2.1086 MG-IWF 0.2815 122.48 0.9799 UCG-MG-IWF 0.2743 276.56 2.2125 VARIED CELL COVERAGE Algorithm Fairness Index Energy Efficiency (kpbs/Watt) Spectral Efficiency (bps/Hz) Original MG 0.4934 23.237 0.185 UCG-MG 0.4359 100.153 0.801 MG-IWF 0.2339 45.374 0.362 UCG-MG-IWF 0.2226 144.482 1.155 4.3. Time Complexity To quantify the complexity of the proposed algorithm, time complexity with asymptotic approach is used. This approach depends on the time restriction within time transmission interval [12]. The complexity is determined by the number of iterations. The proposed algorithm consists of 3 stages of allocation: UCG scheme, MG algorithm, and IWF power control. UCG scheme divides users and chunks into several groups based on the carrier’s coverage, it needs 𝑂(𝑁). The MG algorithm sorts the user and allocate chunks to a specific user, it needs 𝑂(𝑁𝑉). The IWF power control allocates the power for each chunk, it needs 𝑂(𝑁𝑉).
  • 9. TELKOMNIKA ISSN: 1693-6930  Energy efficient resources allocations for wireless... (Vinsensius Sigit Widhi Prabowo) 1633 Then, the total complexity is 𝑂(𝑁𝑉) + 𝑂(𝑁𝑉) + 𝑂(𝑁𝑉) ≈ 𝑂(𝑁𝑉). This means, the proposed algorithm’s time complexity is almost the same with the original MG algorithm. This caused by the number of iteration of the proposed algorithm and the original MG algorithm is of the same value. The comparison between each algorithm shown in Table 6. Table 6. Time Complexity on Each Algorithm Algorithm Process Complexity Total UCG MG IWF Original MG - O(NV) -  O(NV) UCG-MG O(N) O(NV) -  O(NV) MG-IWF - O(NV) O(NV)  O(NV) UCG-MG-IWF O(N) O(NV) O(NV)  O(NV) 5. Conclusion This work proposed an allocation algorithm that tries to maximize the energy efficiency. By the simulation results, the proposed algorithm can improve both energy efficiency and spectral efficiency. The proposed algorithm improves spectral efficiency by 1.507 bps/Hz and improve energy efficiency by 188.21 kbps/Hz. This condition happens because UCG tries to limit the transmit distance for each carrier, so the system quality can be maintained. Meanwhile IWF try to maximize the energy and spectral efficiency by adding more power to user with better channel conditions. In contrary, the proposed algorithm reduces fairness index by 29.51% in average. This caused by the UCG limit the transmit distance so user in the cell edge will get less chunk. IWF will reduce allocated power for user with bad channel condition, so it cannot maintain its quality and reduce the fairness index overall. References [1] Zhu H, Wang J. Chunk-based resource allocation in OFDMA systems-part I: chunk allocation. IEEE Transactions on Communications. 2009; 57(9): 2734-2744. [2] Zhu H, Wang J. Chunk-based resource allocation in OFDMA systems—Part II: Joint chunk, power and bit allocation. IEEE Transactions on Communications. 2012; 60(2): 499-509. [3] Tran SV, Eltawil AM. Optimized scheduling algorithm for LTE downlink system. 2012 IEEE Wireless Communications and Networking Conference (WCNC). Shanghai. 2012: 1462-1466. [4] Chen Y, Zhang S, Xu S, Li GY. Fundamental trade-offs on green wireless networks. IEEE Communications Magazine. 2011; 49(6): 30-37. [5] Feng D, Jiang C, Lim G, Cimini LJ, Feng G, Li GY. A survey of energy-efficient wireless communications. IEEE Communications Surveys & Tutorials. 2013; 15(1): 167-178. [6] Lee H, Vahid S, Moessner K. A survey of radio resource management for spectrum aggregation in LTE-advanced. IEEE Communications Surveys & Tutorials. 2014; 16(2): 745-760. [7] Ma Y. Proportional fair scheduling for downlink OFDMA. 2007 IEEE International Conference on Communications. 2007: 4843-4848. [8] Wengerter C, Ohlhorst J, von Elbwart AG. Fairness and throughput analysis for generalized proportional fair frequency scheduling in OFDMA. 2005 IEEE 61st vehicular technology conference. Stockholm. 2005; 3: 1903-1907. [9] Nwamadi O, Zhu X, Nandi AK. Multi-criteria ranking based greedy algorithm for physical resource block allocation in multi-carrier wireless communication systems. Signal Processing. 2012; 92(11): 2706-17. [10] Nguyen TD, Han Y. A proportional fairness algorithm with QoS provision in downlink OFDMA systems. IEEE Communications Letters. 2006; 10(11): 760-2. [11] Fahmi A, Asvial M, Gunawan D. Improved Performance of Mean-Greedy Algorithm for Chunk Allocation in SC-FDMA Uplink Systems using Joint-User and Chunk-Based Allocation. Journal of ICT Research and Applications. 2013; 7(1): 59-81. [12] Fahmi A, Asvial M, Gunawan D. Combined-order algorithm using promethee method approach and analytic hierarchy decision for chunk allocation in LTE uplink systems. International Journal of Communication Networks and Information Security. 2013; 5(1): 39. [13] Fahmi A, Astuti RP, Meylani L, Asvial M, Gunawan D. A Combined User-order and Chunk-order Algorithm to Minimize the Average BER for Chunk Allocation in SC-FDMA Systems. TELKOMNIKA Telecommunication Computing Electronics and Control. 2016; 14(2): 574-587. [14] Lin LX, Liu YA, Fang LI, Gang XI, Liu KM, Ge XY. Resource scheduling in downlink LTE-Advanced system with carrier aggregation. The Journal of China Universities of Posts and Telecommunications. 2012; 19(1): 44-123.
  • 10.  ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 4, August 2019: 1625-1634 1634 [15] Shi S, Feng C, Guo C. A resource scheduling algorithm based on user grouping for LTE-advanced system with carrier aggregation. 2009 International Symposium on Computer Network and Multimedia Technology. Wuhan. 2009: 1-4. [16] Prabowo VSW. Analysis of Resource Scheduling Algorithm Based-on User Grouping for LTE-Advanced System With Carrier Aggregation. eProceedings of Engineering. 2015; 2(2): 2425-2434. [17] Fahmi A, Astuti RP, Meylani L, Prabowo VSW. Utilizing mean-greedy algorithm using user grouping for chunk allocation in OFDMA systems with carrier aggregation. 2015 9th International Conference on Telecommunication Systems Services and Applications (TSSA). Banduung. 2015: 1-4. [18] Prabowo VSW, Fahmi A, Perdana D. Modified Mean-Greedy Algorithm in OFDMA System With Carrier Aggregation. Advanced Research in Engineering and Information Technology International Conference. Bandung. 2017: 932-938. [19] Fahmi A, Asvial M, Gunawan D. Uplink resource allocation algorithms with fractional power control as power constraints for OFDMA system. TENCON 2011-2011 IEEE Region 10 Conference. Bali. 2011: 592-596. [20] Morimoto A, Miki N, Okumura Y. Performance evaluation of reduced power inter-cell interference coordination for downlink in LTE-advanced heterogeneous networks. European Wireless 2013; 19th European Wireless Conference. Guildford. 2013: 1-6. [21] Yang K, Martin S, Yahiya TA, Wu J. Energy-efficient resource allocation for downlink in LTE heterogeneous networks. 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall). 2014: 1-5. [22] Ding Y, Xiao D, Yang D. An improved downlink power allocation restriction method based on carrier aggregation. 2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content. Beijing. 2010: 460-464. [23] Molisch AF. Wireless Communication. 2nd. California: A John WIley and Sons. 2011: 436-438. [24] Narottama B, Fahmi A, Syihabuddin B, Saputri DM, Christy PE, Ludwiniananda OR. Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D. TELKOMNIKA Telecommunication Computing Electronics and Control. 2017; 15(1): 203-211. [25] Fraimis IG, Kotsopoulos SA. QoS-based proportional fair allocation algorithm for OFDMA wireless cellular systems. IEEE Communications Letters. 2011; 15(10): 1091-1093.