Boniface Uwizeyimana, Ahmed H. Abd El‐Malek, O. Muta, M. Abo-Zahhad, M. Elsabrouty
{"title":"5G网络中用户准入和信道分配的多臂强盗和重复拍卖方法","authors":"Boniface Uwizeyimana, Ahmed H. Abd El‐Malek, O. Muta, M. Abo-Zahhad, M. Elsabrouty","doi":"10.1109/JAC-ECC56395.2022.10043930","DOIUrl":null,"url":null,"abstract":"Heterogeneous network and cognitive radio technology were introduced as part of 5G architecture to improve spectrum utilization and user capacity. Admitting secondary users in the wireless network is a challenge in the deployment of 5G. This paper presents a learning algorithm based on the multi-armed bandit technique to intelligently associate secondary users to the secondary base stations available in the network. Availing spectrum to secondary base stations and their associated users is done through a repeated auction game. The multi-armed bandit algorithm applied to the problem of user association enables secondary users oblivious about the channel environment to achieve higher data rates through association with the adequate secondary base station. Simulation results show a noticeably superior performance of the proposed multi-armed bandit algorithm compared to the matching game and random selection.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Multi-Armed Bandit and Repeated Auction Approaches for User Admission and Channel Allocation in 5G HetNets\",\"authors\":\"Boniface Uwizeyimana, Ahmed H. Abd El‐Malek, O. Muta, M. Abo-Zahhad, M. Elsabrouty\",\"doi\":\"10.1109/JAC-ECC56395.2022.10043930\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Heterogeneous network and cognitive radio technology were introduced as part of 5G architecture to improve spectrum utilization and user capacity. Admitting secondary users in the wireless network is a challenge in the deployment of 5G. This paper presents a learning algorithm based on the multi-armed bandit technique to intelligently associate secondary users to the secondary base stations available in the network. Availing spectrum to secondary base stations and their associated users is done through a repeated auction game. The multi-armed bandit algorithm applied to the problem of user association enables secondary users oblivious about the channel environment to achieve higher data rates through association with the adequate secondary base station. Simulation results show a noticeably superior performance of the proposed multi-armed bandit algorithm compared to the matching game and random selection.\",\"PeriodicalId\":326002,\"journal\":{\"name\":\"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/JAC-ECC56395.2022.10043930\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JAC-ECC56395.2022.10043930","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Multi-Armed Bandit and Repeated Auction Approaches for User Admission and Channel Allocation in 5G HetNets
Heterogeneous network and cognitive radio technology were introduced as part of 5G architecture to improve spectrum utilization and user capacity. Admitting secondary users in the wireless network is a challenge in the deployment of 5G. This paper presents a learning algorithm based on the multi-armed bandit technique to intelligently associate secondary users to the secondary base stations available in the network. Availing spectrum to secondary base stations and their associated users is done through a repeated auction game. The multi-armed bandit algorithm applied to the problem of user association enables secondary users oblivious about the channel environment to achieve higher data rates through association with the adequate secondary base station. Simulation results show a noticeably superior performance of the proposed multi-armed bandit algorithm compared to the matching game and random selection.