Semidefinite and Conic Programming for Robust wireless OFDMA networks

Semidefinite and Conic Programming for Robust wireless OFDMA networks

Electronic Notes in Discrete Mathematics 36 (2010) 1225–1232 www.elsevier.com/locate/endm Semidefinite and Conic Programming for Robust wireless OFDMA...

228KB Sizes 0 Downloads 73 Views

Electronic Notes in Discrete Mathematics 36 (2010) 1225–1232 www.elsevier.com/locate/endm

Semidefinite and Conic Programming for Robust wireless OFDMA networks Pablo Adasme a,1 , Abdel Lisser a,2 a

Laboratoire de Recherche en Informatique, Universit´ e Paris-Sud XI, Bˆ atiment 490, 91405, Orsay Cedex France

Abstract In this paper, we study three robust optimization approaches [1]. The first one is based on the worst case scenario approach from Kouvelis and Yu [8]. The second, corresponds to a scaled simplex polyhedral approach due to Bertsimas and Sim [3] whilst the third, correspond to an ellipsoidal uncertainty approach proposed by Ben Tal and Nemirovski [2]. The study of the different approaches is made on the basis of a binary quadratic constrained program (BQCP). We derive two semidefinite programming (SDP) relaxations for the first two approaches whilst we use a second order conic program for the last one. Numerical results are given for a resource allocation of OFDMA wireless networks. Keywords: Robust Optimization, Semidefinite Programming, Quadratic Constrained Programs, Resource Allocation in OFDMA.

1

Introduction

Robust Optimization is an important field in mathematical programming. It deals with the uncertainty which arises in the input data of a mathematical 1 2

Email: [email protected] Email: [email protected]

1571-0653/$ – see front matter © 2010 Elsevier B.V. All rights reserved. doi:10.1016/j.endm.2010.05.155

1226

P. Adasme, A. Lisser / Electronic Notes in Discrete Mathematics 36 (2010) 1225–1232

model. There are mainly two research directions on robust optimization. The first one deals with uncertainty by means of scenarios while the second one is based on convex uncertainty sets. Kouvelis and Yu pioneered the scenarios approach for the special case of uncertainty on the objective function [8]. In [2], on the other hand, Ben Tal and Nemirovski consider a convex ellipsoidal uncertainty set within linear programs which derives in solving conic robust problems. In [3], Bertsimas and Sim add a convex max term in each constraint of a linear program leading to a linear robust counterpart. In this paper, we propose three robust optimization models for resource allocation in OFDMA networks [9]. The first one is based on the worst case scenario approach [8]. The second and third ones are based on convex uncertainty sets [3,2]. The study is made on the basis of an OFDMA binary quadratic constrained program (BQCP) [1]. Two robust OFDMA quadratic models are proposed using Kouvelis and Yu and Bertsimas and Sim approaches and two SDP relaxations. An OFDMA conic program is also derived using Nemirovski robust approach. We use Fortet linearization method [6] as an intermediate step to obtain the second robust quadratic model and the conic one. The paper is organized as follows: Section 2 presents two robust OFDMA quadratic models and a conic one. Section 3 presents two SDP relaxations. Section 4 gives numerical results for the different robust approaches. Finally, section 5 concludes this paper.

2

Robust Models for Resource Allocation in OFDMA

An OFDMA network is composed by a single cell with one base station (BS) and several mobile users. The BS handles a set of N sub-carriers (or subchannels) that must be assigned to a set of K users using a modulation size of c ∈ {1, . . . , M } bits in each sub-carrier. The goal is to distribute efficiently sub-carriers to users while using adaptive modulation and minimizing the total power consumption in the network. To this purpose, we consider the following OFDMA quadratic model from [1]: K N M c (1) QIP0 : min{xk,n ,yn,c } k=1 n=1 c=1 Pk,n xk,n yn,c   N M st: (2) x ∀k k,n n=1 c=1 c · yn,c = Rk K (3) k=1 xk,n ≤ 1 ∀n M (4) c=1 yn,c ≤ 1 ∀n (5) xk,n , yn,c ∈ {0, 1}

1227

P. Adasme, A. Lisser / Electronic Notes in Discrete Mathematics 36 (2010) 1225–1232

Here, the decision variable xk,n is equal to 1 if user k is assigned sub-carrier n and 0 otherwise. Similarly, yn,c is equal to 1 if sub-carrier n uses a modulation size of c bits. The objective function represents the power consumption of the network. The first constraint represents the amount of bits needed by user k. The second constraint ensures that each sub-carrier should be assigned to only one user at a time while the third, represents a modulation linear constraint imposing that each sub-carrier must use only one integer modulation size. To formulate a first OFDMA robust model under the worst case scenario approach [8], we suppose we have a set S of power scenario matrices. Thus, we write the following quadratic model we call hereby RoQIP1: (6) RoQIP1 : (7)

st:

(8) (9)

min{xk,n ,yn,c ,t} t    s K N M c P x y n,c ≤ t ∀s ∈ S k,n k=1 n=1 k,n c=1 to constraints (2), (3) and (4) xk,n , yn,c ∈ {0, 1}, t ∈ R

In the case of Bertsimas and Sim approach, we introduce a variable ϕck,n = xk,n yn,c to linearize the quadratic terms of QIP0 using Fortet method. Then, we consider each power entry pck,n to be in an interval [pck,n − pck,n , pck,n + pck,n ], c where pck,n = εpck,n for some ε > 0. We also define the set J = {Pk,n : (k, n, c) ∈ K × N × M } as the set of all power entries and the set Υ = {Ω ∪ (k  , n , c ), Ω ⊆ J, |Ω| = Γ, (k  , n , c ) ∈ J\Ω}. The latter represents all possible combinations of a subset Ω ⊆ J with cardinality |Ω| = Γ when using a parameter Γ ∈ [0, KN M ] to control the number of uncertain power entries in J. Since Γ is a continuous real value, then a fractional element (k  , n , c ) ∈ J\Ω appears in Υ. Hence, we use the Fortet linearized model of QIP0 to get: (10) RoBSim st: (11) (12) (13) (14) (15) (16) (17)

min{xk,n ,yn,c ,ϕck,n ,t} K  N  M k=1

n=1

c=1 

t c Pk,n ϕck,n +

c  c c c + maxΥ (k,n,c)∈Ω Pk,n ϕk,n + (Γ − Γ)Pk ,n ϕk ,n N M c ∀k n=1 c=1 c · ϕk,n = Rk , to constraints (3) and (4) xk,n ≥ ϕck,n ∀k, n, c yn,c ≥ ϕck,n ∀k, n, c ϕck,n ≥ xk,n + yn,c − 1 ∀k, n, c xk,n , yn,c , ϕck,n ∈ [0, 1], t ∈ R



≤t

1228

P. Adasme, A. Lisser / Electronic Notes in Discrete Mathematics 36 (2010) 1225–1232

Constraints (14),(15) and (16) are due to Fortet linearization method. We evaluate the max term of the first constraint in the optimal solution |ϕck,n |∗ . Then, we use Proposition 1 from [3] to deduce the following linear program: K N M c c ,ρ β(ϕ∗ , Γ) = minwk,n (18) k=1 n=1 c=1 wk,n + Γρ st:

c c ρ + wk,n ≥ Pk,n |ϕck,n |∗ c wk,n ≥ 0 ∀k, n, c ρ≥0

∀k, n, c

Using theorem 1 from [3] and strong duality theory from linear programming, we can remove linearization constraints in RoBSim to state the following robust quadratic model we call hereafter RoQIP2: (19)

(20) (21) (22) (23) (24) (25)

c ,ρ} min{xk,n ,yn,c ,t,wk,n t   M N  c x P y + st: K k,n n,c k=1 n=1 c=1 k,n K N M c + k=1 n=1 c=1 wk,n + Γρ ≤ t ρ + wc ≥ Pc xk,n yn,c ∀k, n, c

RoQIP2 :

k,n

k,n

to constraints in (8) c wk,n ≥ 0 ∀k, n, c ρ≥0 xk,n , yn,c ∈ {0, 1}, t ∈ R

Another model can be obtained using Ben Tal and Nemirovski robust approach [2]. Using the linearized Fortet model, we state the following conic model: c ,t} (26) RoNem : min{ϕck,n ,xk,n ,yn,c ,φck,n ,ψk,n t K  N  M  c c K  N  M c c st: k=1 n=1 c=1 Pk,n ϕk,n + k=1 n=1 c=1 |Pk,n |φk,n +

   K N M c c 2 +ϑ (27) k=1 n=1 c=1 (Pk,n ψk,n ) ≤ t

(28) (29) (30)

c ≤ φck,n ∀k, n, c −φck,n ≤ ϕck,n − ψk,n to constraints (3), (4), (12), (14), (15) and (16) c ϕck,n , xk,n , yn,c ∈ [0, 1], φck,n , ψk,n ≥ 0, t ∈ R

Here, a positive root square term multiplied by a parameter ϑ is added to control the uncertainty level. Although it has more constraints and variables than Bertsimas and Sim robust approach, we study both approaches in order to see how the optimal values behave when varying parameters ϑ and Γ respectively.

P. Adasme, A. Lisser / Electronic Notes in Discrete Mathematics 36 (2010) 1225–1232

3

1229

Semidefinite Relaxations

In this section we derive two SDP relaxations for RoQIP1 and RoQIP2. Let Sn = {Z ∈ Mn , Z = Z T } be the set of all n symmetric matrices and Sn+ = {Z ∈ Sn , a ∈ Rn , aT Za ≥ 0} be the set of all symmetric matrices satisfying the condition of positive semidefiniteness [7]. In order to formulate a SDP relaxation for RoQIP1, we define the (0-1) vector z as: (31) z T = x1,1 · · · x1,N · · · xK,1 · · · xK,N y1,1 · · · y1,M · · · yN,1 · · · yN,M Then, let Z be a symmetric positive semidefinite matrix defined by: ⎞ ⎛ T zz z 0 ⎟ ⎜ .. ⎟ ⎜ T (32) Z=⎜ z 1 .⎟ 0 ⎠ ⎝ 0 ··· t We construct symmetric matrices A, Λs for all s, Uk for all k, [exn ][exn ]T and c [eyn ][eyn ]T for all n, and ζk,n for all k, n, c to have positive terms in Z. The SDP relaxation for RoQIP1 is: (33) RoSDP1 : (34) (35) (36) (37) (38) (39) (40)

min Z

st:

T race{AZ} T race{Λs Z} − T race{AZ} ≤ 0 ∀s ∈ S T race{Uk Z} = Rk ∀k T race{[exn ][exn ]T Z} ≤ 1, ∀n T race{[eyn ][eyn ]T Z} ≤ 1, ∀n c T race{ζk,n Z} ≥ 0 ∀k, n, c diag(D) = z Z 0

Here [exn ] and [eyn ] are coefficient vectors for constraints in (3) and (4) according to vector z as defined above. Hence, the rank-1 matrices we construct with these vectors are used to strength the SDP relaxation as in [7]. In the case of RoQIP2, we use the same vector z to propose a SDP relaxation. In ad1 2 M 1 c M dition, we define vector = (w1,1 , w1,1 , . . . , w1,1 , w1,2 , . . . , wk,n , . . . , wK,N , ρ, t) c  (wk,n ≥ 0) and add it to the diagonal of matrix Z to obtain a new matrix Z. The SDP relaxation for RoQIP2 can be stated as: Z}  (41) RoSDP2 : min T race{A  Z

(42) (43)

st:

 Z}  − T race{A Z}  ≤0 T race{Λ c  T race{Vk,n Z} ≤ 0 ∀k, n, c

1230

P. Adasme, A. Lisser / Electronic Notes in Discrete Mathematics 36 (2010) 1225–1232

k Z}  = Rk T race{U

(44)

∀k

 ≤ 1, ∀n T race{[exn ][exn ] Z}  ≤ 1, ∀n T race{[eyn ][eyn ]T Z} c  T race{ζk,n Z} ≥ 0 ∀k, n, c T

(45) (46) (47) (48)

diag(D) = z Z 0

(49)

k for all k, ζc for all k, n, c are symmetric  Λ,  V c for all k, n, c, U where A, k,n k,n  input matrices of appropriate size according to matrix Z.

4

Numerical Results

In this section we present our numerical results concerning the robust approaches above-mentioned. We call RoIP1, RoIP2, the integer linear models obtained from RoQIP1 and RoQIP2 respectively. Similarly, we call RoLP1 and RoLP2 their LP relaxations. We generate power data using a wireless channel [9]. A Matlab program is developed using Cplex 9.1 for solving RoIP1, RoIP2, RoLP1, RoLP2. We use Csdp [4] to solve RoSDP1, RoSDP2 and Cvx [5] for solving RoNem. The numerical experiments have been carried out on a Pentium IV, 1.9GHz with 2 GoBytes of RAM under windows XP. Without loss of generality, we set M = 4 in our test instances. Numerical results are shown in table 1 for the Kouvelis and Yu approach. Table 2 shows results for the Bertsimas and Sim approach. In these tables, column RoLP1

# Users

RoSDP1

Integrality Gaps

RoIP1

Feasible

Lower bound

Cpu time (s)

Feasible

Lower bound

RoSDP1

RoLP1

K=6

0.6538

1.8558

0.4074

7.3440

1.7809

0.6377

Cpu time (s) 4131.80

0.0252

0.6048

K=8

0.6167

1.6796

0.3279

9.3130

0.9983

0.5773

9623.10

0.0683

0.8811

K=10

0.8073

1.7436

0.4858

17.6560

1.4350

0.7805

14818.00

0.0342

0.6618

K=12

1.0664

1.8629

0.5370

28.5780

1.2505

1.0423

15425.00

0.0231

0.9859

K=14

0.9428

2.0687

0.4439

76.6720

1.3376

0.9282

25724.00

0.0157

1.1239

Table 1 Results for Worst Case Scenario Approach for S=10 and N=128

1 gives the number of users, column 2 shows the optimal solution obtained by applying Fortet method to RoQIP1 and RoQIP2. Column 3 and 6 show feasible solutions obtained from the outputs of LP and SDP relaxations when using a simple randomized rounding algorithm [1]. Columns 4 and 7 give lower bounds for LP and SDP relaxations while columns 5 and 8 show the

1231

P. Adasme, A. Lisser / Electronic Notes in Discrete Mathematics 36 (2010) 1225–1232

cpu times in seconds for Cplex and Csdp. Finally, columns 9 and 10 show 1−RoLP 1 integrality gaps for the LP and SDP relaxations i.e. GapLP = RoIPRoLP 1 RoIP 1−RoSDP 1 RoIP 2−RoLP 2 and GapSDP = = in table 1 and Gap and LP RoSDP  1 RoLP 2 2−RoSDP 2 GapSDP = RoIPRoSDP in table 2, respectively. We observe from these 2 RoLP2

# Users

RoSDP2

RoIP2

Feasible

Lower bound

Cpu time (s)

Feasible

Lower bound

K=6

0.4561

0.7232

0.2485

1.0000

0.4561

0.4561

Integrality Gaps Cpu time (s)

RoSDP2

RoLP2

2619.50

0

0.8356

K=8

0.3227

0.5403

0.1963

1.1410

0.3749

0.3191

6878.60

0.0111

0.6441

K=10

0.5607

0.9884

0.3435

1.3290

0.6537

0.5511

20934.00

0.0174

0.6325

K=12

0.2608

0.4444

0.1593

1.4370

0.2860

0.2599

18737.00

0.0033

0.6370

K=14

0.1816

0.3218

0.1187

1.7190

0.2566

0.1776

23060.00

0.0221

0.5295

Table 2 Results for Bertsimas and Sim Approach with ε = 5%, Γ =0.3KNM and N=64

tables that SDP outperform LP bounds. The feasible solutions obtained from the SDP solutions are close to the optimal values for all the instances. The integrality gaps confirm SDP tightness. Regarding the cpu times, Csdp requires a larger cpu time than Cplex to get a solution. We observe that cpu times are higher in table 2. This can be explained by the size of matrix Z which is larger than Z. Table 3 show numerical results for the OFDMA conic model (RoNem). Here, column 1 gives the instance number. Column 2 to 4 Instance

1

2

K

10

10

N

32

64

M

4

4

Γ

RoIP2

RoLP2

Cplex cpu time (s)

ϑ

RoNem

Cvx cpu time (s)

0

0.2496

0.1508

2.4

0

0.1507

55.6

512

0.2621

0.1583

1.1

2

0.1583

45.7

1280

0.2621

0.1583

0.8

5

0.1583

49.4

0

0.5274

0.2948

8.8

0

0.2947

323.6

1024

0.5381

0.3095

2.8

2

0.3094

262.4

2560

0.5381

0.3095

2.4

5

0.3094

260.2

Table 3 Results for RoNem and RoLP2 Relaxations

give instances sizes. Column 5 gives values for Γ ∈ [0, KN M ] while column 6 shows the optimal values obtained by RoIP2. Columns 7 and 10 give the lower bounds obtained by RoLP2 and RoNem, respectively. Columns 8 and 11 show the cpu time in seconds for Cplex and Cvx [5]. Finally, column 9 gives values for the input parameter ϑ used to control the uncertainty level in RoNem. We arbitrarily set three levels for parameters Γ and ϑ. The latter is varied within the interval [0, 5]. We observe that RoLP2 and RoNem give almost the same lower bounds. These lower bounds are weak when compared

1232

P. Adasme, A. Lisser / Electronic Notes in Discrete Mathematics 36 (2010) 1225–1232

to the optimal solution of RoIP2. Moreover, Cvx requires larger cpu time to solve RoNem than Cplex does for solving RoLP2.

5

Conclusions

In this paper, we proposed three robust models for resource allocation in OFDMA networks. The study is made on the basis of a BQCP [1] in which Fortet method is applied as an intermediate step to derive (0-1) robust linear counterparts. In particular, we transform back the second linear robust counterpart into a quadratic one. Then, the robust models are handled by building SDP and conic relaxations. Our numerical results show tight bounds for the SDP relaxations.

References [1] Adasme Pablo, Abdel Lisser and Ismael Soto, Robust Semidefinite Relaxations for a New Quadratic OFDMA Resource Allocation Approach, Working Paper Number 1522, LRI, University of Paris Sud, France. [2] Ben-Tal Aharon, and Arkadi Nemirovski, Robust solutions of Linear Programming problems contaminated with uncertain data, Mathematical Programming, Springer Berlin-Heidelberg, 88 (2000), 411-424. [3] Bertsimas Dimitris, and Melvyn Sim, The Price of Robustness, Operations Research, 52 (2004). [4] CSDP is a Brian Borchers C code project of COIN-OR for SDP. https://projects.coin-or.org/Csdp/ . [5] CVX was designed by Michael Grant and Stephen Boyd, with input from Yinyu Ye. http://www.stanford.edu/∼boyd/cvx/. [6] Fortet R.,Applications de l algebre de boole en recherche operationelle, Revue Francaise de Recherche Operationelle, 4 (1960). [7] Helmberg, C., F. Rendl, and R. Weismantel, A Semidefinite Programming Approach to the Quadratic Knapsack Problem, Journal of combinatorial optimization, 4 (2000), 197-215. [8] Kouvelis, and G. Yu, Robust discrete optimization and its applications, Kluwer Academic Publishers, 1997. [9] Wong Ian C., and Brian L. Evans, Optimal OFDMA Subcarrier, Rate, and Power Allocation for Ergodic Rates Maximixation with Imperfect Channel Knowledge, Acoustics, Speech and Signal Processing, ICASSP, IEEE International Conference, 2007.