Perfomance Comparison of Genetic and Greedy Algorithms in Underlay Device-to-Device Communication
Abstract
The number of cellular users (CU) continues to increase in Indonesia. This impacts a large network load for the number of devices connected to the main network so it will have an impact on the quality of service. Device-to-Device (D2D) communication as components for LTE-A technology enabling a direct wireless link between the CUs without routing the data via the evolved Node B (eNB) signal or the core network. The need for algorithm and power control used to allocate radio resources so it can get a good quality of service because of communications technology D2D. In this study, we analyze and compare the performance parameters of D2D communication systems, including system interference, system sum-rate, system spectral efficiency, total energy system, and system energy efficiency based on Genetic and Greedy Algorithms in allocating radio resources and controlling the power of users. The genetic algorithm works with three operators in allocating resource block (RB), including proportional selection, crossover, and mutation. This process is repeated many times to produce several generations so that the best allocation can be got. The genetic algorithm has a flexible number of D2D and cellular communications in several RBs, minimum signal to interference plus noise ratio (SINR) also considered for mobile communication in ensuring the quality of its services. Numerical evaluations demonstrate the superior performance of the Genetic Algorithm in terms of system power, energy efficiency, and interference mitigation. As repetition gets larger, the Genetic algorithm results in better spectral efficiency.
Downloads
References
R. D. Ainul, H. Mahmudah, A. Wijayanti, Performance Analysis of Scheduling Schemes for Femto to Macro Interference Coordination in LTE-Femtocell Deployment Scenario, EMITTER International Journal of Engineering Technology, vol. 4, no. 11, pp 65-90, 2016 DOI: https://doi.org/10.24003/emitter.v4i1.114
Afif Osseiranetal, Scenarios for 5G mobile and wireless communications: The vision of the METIS project, IEEE Commun. Mag., vol. 52, no. 5, pp. 26–35, 2014. DOI: https://doi.org/10.1109/MCOM.2014.6815890
Li Wang, Huan Tang, Device-to-Device Communications in Cellular Networks, Springer International Publishing, 2016. DOI: https://doi.org/10.1007/978-3-319-30681-0
Y. Priatama, Radio Resource Management and Interference Mitigation for Device to Device Communication Underlaying 5G Network, Undergraduated Thesis, Telkom University (Bandung), 2019.
Guanding Yu, Lukai Xu, Daquan Feng, Rui Yin, Geoffrey Ye Li, Yuhuan Jiang, Joint mode selection and resource allocation for device-to-device communications, IEEE Trans. Commun., vol. 62, no. 11, pp. 38143824, 2014.
Hengameh Takshi, Gulustan Dogan, Huseyin Arslan, Joint Optimization of Device to Device Resource and Power Allocation Based on Genetic Algorithm, IEEE Access, vol. 6, pp. 21173–83, 2018.
V. S. W. Prabowo, B. Pamukti, A. Fahmi, N. M. Adriansyah and N. Andini, Joint-Greedy Allocation Algorithm on D2D Communication Underlaying Networks, 2019 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob), BALI, Indonesia, 2019, pp. 48-52. DOI: https://doi.org/10.1109/APWiMob48441.2019.8964175
H. Ding, S. Ma, and C. Xing, ‘Feasible D2D communication distance in D2D-enabled cellular networks,’ in Proc. IEEE Int. Conf. Commun. Syst. (ICCS), Nov. 2014, pp. 1–5. DOI: https://doi.org/10.1109/ICCS.2014.7024754
K. Deb, Multi-Objective Optimization Using Evolutionary Algorithms, vol. 16. Hoboken, NJ, USA: Wiley, 2001.
Copyright (c) 2020 EMITTER International Journal of Engineering Technology
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The copyright to this article is transferred to Politeknik Elektronika Negeri Surabaya(PENS) if and when the article is accepted for publication. The undersigned hereby transfers any and all rights in and to the paper including without limitation all copyrights to PENS. The undersigned hereby represents and warrants that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required. The undersigned represents that he/she has the power and authority to make and execute this assignment. The copyright transfer form can be downloaded here .
The corresponding author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors. This agreement is to be signed by at least one of the authors who have obtained the assent of the co-author(s) where applicable. After submission of this agreement signed by the corresponding author, changes of authorship or in the order of the authors listed will not be accepted.
Retained Rights/Terms and Conditions
- Authors retain all proprietary rights in any process, procedure, or article of manufacture described in the Work.
- Authors may reproduce or authorize others to reproduce the work or derivative works for the author’s personal use or company use, provided that the source and the copyright notice of Politeknik Elektronika Negeri Surabaya (PENS) publisher are indicated.
- Authors are allowed to use and reuse their articles under the same CC-BY-NC-SA license as third parties.
- Third-parties are allowed to share and adapt the publication work for all non-commercial purposes and if they remix, transform, or build upon the material, they must distribute under the same license as the original.
Plagiarism Check
To avoid plagiarism activities, the manuscript will be checked twice by the Editorial Board of the EMITTER International Journal of Engineering Technology (EMITTER Journal) using iThenticate Plagiarism Checker and the CrossCheck plagiarism screening service. The similarity score of a manuscript has should be less than 25%. The manuscript that plagiarizes another author’s work or author's own will be rejected by EMITTER Journal.
Authors are expected to comply with EMITTER Journal's plagiarism rules by downloading and signing the plagiarism declaration form here and resubmitting the form, along with the copyright transfer form via online submission.