Next Article in Journal
Generic IoT for Smart Buildings and Field-Level Automation—Challenges, Threats, Approaches, and Solutions
Previous Article in Journal
A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Interference Management Based on Meta-Heuristic Algorithms in 5G Device-to-Device Communications

1
Department of Computer Science, University of El Oued, El Oued 39000, Algeria
2
Energy Systems Modelling (MSE) Laboratory, Mohamed Khider University, Biskra 07000, Algeria
3
College of Engineering and Information Technology, University of Dubai, Dubai 14143, United Arab Emirates
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Computers 2024, 13(2), 44; https://doi.org/10.3390/computers13020044
Submission received: 13 December 2023 / Revised: 20 January 2024 / Accepted: 25 January 2024 / Published: 1 February 2024

Abstract

:
Device-to-Device (D2D) communication is an emerging technology that is vital for the future of cellular networks, including 5G and beyond. Its potential lies in enhancing system throughput, offloading the network core, and improving spectral efficiency. Therefore, optimizing resource and power allocation to reduce co-channel interference is crucial for harnessing these benefits. In this paper, we conduct a comparative study of meta-heuristic algorithms, employing Genetic Algorithms (GAs), Particle Swarm Optimization (PSO), Bee Life Algorithm (BLA), and a novel combination of matching techniques with BLA for joint channel and power allocation optimization. The simulation results highlight the effectiveness of bio-inspired algorithms in addressing these challenges. Moreover, the proposed amalgamation of the matching algorithm with BLA outperforms other meta-heuristic algorithms, namely, PSO, BLA, and GA, in terms of throughput, convergence speed, and achieving practical solutions.

1. Introduction

Over the past decade, there has been a significant increase in the number of mobile users, resulting in a substantial burden on the cellular network core [1,2]. To keep pace with advancements in cellular networks, extensive research is being conducted to drive the evolution toward the next generation of cellular networks, commonly referred to as the fifth generation (5G) and beyond (5GB) [3,4]. These technologies aim to alleviate network strain, improve energy and spectral efficiency, reduce latency, and increase throughput. One promising solution to achieve these benefits is Device-to-Device (D2D) communication [5,6]. D2D communication technology enables direct communication between devices without involving the Base Station (BS) [7,8]. It is characterized by three primary modes, as illustrated in Figure 1: relay mode, controlled direct mode, and uncontrolled direct mode. In relay mode, User Equipment (UE) extends the coverage of the BS by acting as a relay between a receiver and the BS or between two devices [9]. In controlled direct mode, the transmitter and receiver communicate directly, but under the control of the BS. Conversely, in uncontrolled direct mode, the transmitter and receiver communicate directly without any intervention from the BS or other devices [10].
The classification of D2D communication is based on the spectrum utilized, as depicted in Figure 2. The first category is the licensed class, also known as in-band, where the communicating devices operate in either overlay or underlay mode using licensed spectrum resources. The second category is the unlicensed class, or out-band, which can be further divided into two types depending on the involvement of the Base Station (BS): controlled by the BS or operating without BS control [11].
D2D communication technology encounters numerous challenges, including interference mitigation, mode selection, resource allocation, and power control. Another critical issue is ensuring security, especially in the exchange of sensitive information [12,13]. The effective allocation of resources and adept power management are key to reducing interference and maximizing overall network throughput [14]. This research investigates the application of meta-heuristic algorithms to address the challenges of channel allocation and power control in 5G cellular networks.
The field of D2D communication technology confronts several challenges, including interference mitigation, mode selection, resource allocation, and power control [15,16]. A significant concern is the aspect of security, especially when exchanging sensitive information [13,17]. Efficient resource allocation and effective power management lead to reduced interference and maximized overall throughput [14,18]. This research investigates the efficacy of meta-heuristic algorithms in addressing channel allocation and power control challenges in 5G cellular networks.
In practical scenarios, uplink spectra are often less utilized compared to downlinks. Therefore, optimizing channel utilization can be achieved by sharing uplink resources [19,20]. Additionally, the Base Station (BS) can more effectively manage interference from D2D pairs when they reuse the uplink. This led us to consider dividing uplink channels between D2D and cellular communications.
In this paper, we focus on D2D communication underlaid within cellular networks, where multiple D2D users can communicate over uplink channels concurrently used by a single cellular communication in each Block of Resource (BR). Consequently, the interference is primarily between CUs and D2D users, as well as among D2D users sharing the same channel. The objective of this study is to explore the effectiveness of various bio-inspired methods for channel and power allocation, with the goal of reducing interference and enhancing overall network throughput.
Overall, the main contributions of this study are summarized as follows:
  • Focusing on Device-to-Device (D2D) communication as a key component in the advancement of cellular networks, including 5G and beyond.
  • Highlighting D2D communication’s potential in improving system throughput, offloading network cores, and increasing spectral efficiency.
  • Emphasizing the importance of optimizing resource and power allocation to minimize co-channel interference and maximize the benefits of D2D communication.
  • Conducting a comparative analysis of meta-heuristic algorithms, such as Genetic Algorithms (GAs), Particle Swarm Optimization (PSO), and Bee Life Algorithm (BLA).
  • Introducing a novel combination of matching techniques with BLA for joint channel and power allocation, enhancing the optimization process.
  • Demonstrating that the combined matching algorithm and BLA outperform PSO, BLA, and GA in terms of throughput, convergence speed, and practicality.
  • Investigating the use of D2D communication within cellular networks, particularly over uplink channels shared with cellular communications.
  • Aiming to reduce interference between Cellular Users (CUs) and D2D users, as well as among D2D users sharing the same channel.
  • Seeking to enhance overall network throughput by effectively managing channel and power allocation.

1.1. Related Work

In their study, Austine et al. [14] proposed a combined algorithm integrating Genetic Algorithm (GA) and Adaptive Bat optimization for resource allocation. This algorithm outperforms other approaches, such as Ant Colony optimization and game theory, in achieving more effective solutions. The researchers in [21] introduced a solution for channel allocation using GA and Binary Particle Swarm Optimization (PSO). Their simulation results highlight GA’s superiority over PSO for this specific issue. Xia et al. [22] suggested a hybrid approach combining the Simulated Annealing algorithm with PSO to avoid local optima in power control problems. The study in [23] focuses on optimizing resource efficiency in D2D communication by introducing a sharing optimization algorithm based on PSO. In [24], a PSO-based algorithm is proposed for data transmission between high-speed devices, such as Unmanned Aerial Vehicles (UAVs) [25], energy systems [26,27], indoor monitoring [28,29], smart cities [30,31], healthcare [32,33], indoor localization [34,35], etc., aiming to minimize energy consumption while maintaining minimum Quality-of-Service (QoS) requirements. Mehdi et al. [36] applied an algorithm inspired by bee flight patterns to find optimal resource allocation solutions for D2D communication. To enhance network throughput, the authors of [37] employed the Bee Life Algorithm for channel and power allocation in D2D communication. A novel approach called E-BLAD2D, which combines the Bee Life Algorithm with simulated annealing, was proposed in [38] to address the joint problem of spectral and power allocation. The research in [39] focuses on minimizing interference between D2D and cellular users to maximize network throughput, with Shamaei et al. utilizing the Poisson Point Process (PPP) to model user spatial positions and proposing a many-to-many matching approach for resource allocation. In [40], a many-to-many matching method was proposed to solve the joint power and channel allocation problem in non-orthogonal multiple-access cellular networks (NOMAs) underlaid with orthogonal multiple-access D2D communication, aiming to maximize the downlink network sum-rate. Most research on interference mitigation addresses the resource allocation and power allocation problems separately. Our approach aims to concurrently solve the channel allocation and power allocation issues, iterating between the two to find the most effective combination of allocated channels and transmission power.

1.2. Main Contribution

This paper delves into the application of meta-heuristic paradigms to the challenge of channel and power allocation in D2D communication. Our primary aim is to diminish or manage interference between cellular users and D2D pairs, thereby enhancing network throughput and accommodating a greater number of D2D users. We have formulated the problem as one of joint channel and power allocation for D2D communication and approached its resolution through various meta-heuristic paradigms. The bio-inspired algorithms employed in our study include Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Bee Life Algorithm (BLA), and a novel combination of BLA with matching theory.
The structure of this paper is outlined as follows: Section 2 introduces the system model and outlines the problem formulation. Section 3 details the joint channel allocation and power control algorithm for each of the bio-inspired methods. In Section 4, we present the emulation of these meta-heuristic algorithms along with the results obtained. Finally, Section 5 concludes the study, summarizing our findings and discussing potential avenues for future research.

2. System Model and Problem Formulation

This study examines a system comprising one BS, a certain number of communications (including ‘nbC’ cellular User Equipment (UE) and ‘nbD’ D2D pairs), as illustrated in Figure 3. We assume that D2D communications utilize uplink resources. Despite using uplink channels, D2D users encounter interference from cellular UE. In such underlay systems, D2D pairs have the capability for direct communication, while the BS oversees channel allocation and facilitates the establishment of connections between devices [20]. We represent the communications (both cellular and D2D) as follows:
U = [ U E 1 , U E 2 , , U E n b C , U E n b C + 1 , , U E n b r ]
In this context, UEi denotes the i-th communication among the collective of CUs and Device-to-Device (D2D) users. The spectrum is divided into K of BRs, and the set of these BRs is represented as follows:
B R = [ b r 1 , b r 2 , , b r K ]
We designate A 0 , 1 n b r , K , the allocation matrix, where, when A i , r contains 1, it signifies that the r-th resource block is being used by the i-th communication, while, when A i , r = 0 , it signifies that r-th resource block does not belong to i-th communication.
In accordance with Shannon’s equation [41], we expressed the throughput on the r-th BR while used by the i-th communication as:
T h p u t i - th = B log 2 1 + S I N R i r
The available bandwidth is designated by B, and the signal-to-interference and noise ratio is identified by S I N R i r . The S I N R i r is expressed as follows:
S I N R i r = G i i P i A i r W G N + j E , j i G j i P j A j r
where A i r equals 1 if a communicating device is using a BR equal to 1 if that device (i-th) utilizes that BR (r-th) and 0 otherwise. The power of transmission used by the i-th communication is P i . Additionally, we symbolize the White Gaussian Noise using WGN. As used in [42], we opt to use a Urban Micro System (UMi). The UMi exhibits a single small cell that contains high traffic loads and great user density in dense urban space [43], in which the path loss model adopted is Rayleigh fading [44]. The model of path loss is expressed as:
P L = 36.7 log 10 ( d ) + 22.7 + 26 log 10 ( F )
We consider i-th and j-th as transmitter and receiver, respectively. The distance between i-th and j-th is d (in meters) and F (in GHz) symbolizes the medium of the communication frequency. Thus, between the two users, the channel gain is G i , j , expressed as [42]:
G i , j = 10 P L / 10
Therefore, the expression for the throughput of cellular devices is the sum of all cellular devices:
C T h p u t = i = 1 n b C r = 1 K B log 2 ( 1 + S I N R i r )
The throughput of every D2D user is the sum of all D2D pairs, it can be written as follows:
D T h p u t = i = n b C + 1 n b r r = 1 K B log 2 ( 1 + S I N R i r )
The sum of (7) and (8) is the overall throughput. Thus, it is expressed by the following equation:
T h p u t = C T h p u t + D T h p u t
If we replace each entity with its equivalent and simplify the expression, we obtain the following equation:
T h p u t = i = 1 n b r r = 1 K B log 2 ( 1 + S I N R i r )
By efficiently allocating resources and adjusting the transmission power of devices, we target the maximization of overall network throughput. The maximization problem of joint power and channel allocation is mathematically expressed as follows:
M a x T h p u t = M a x i = 1 n b r r = 1 K B log 2 ( 1 + S I N R i r )
Subject to:
P i P d m a x i = n b C + 1 n b r
P i P c m a x i = 1 n b C
S I N R i , r S I N R m i n i = 1 n b C , r = 1 K
A i , r 1 i = 1 n b c , r = 1 K
Constraints (12) and (13) ensure that the transmission powers P i for both CUs and D2D pairs do not exceed their respective maximum limits, P c m a x and P d m a x . Constraint (15) stipulates that the value of A i , r must be either 0 or 1, signifying that each BR can be allocated to no more than one CU at a time. This is because the primary recipient of cellular communication is the BS, and if a BR is allocated to two CUs, the BS would be unable to differentiate their signals. However, a single BR can be allocated to multiple D2D pairs, as they have different receivers. Constraint (14) establishes a minimum SINR limit ( S I N R m i n ) for CUs while also allowing multiple D2D communications to share the same BR, provided that the SINR constraint is satisfied.
Finding an optimal solution to the optimization problem posed in (11), which involves numerous constraints, may not be feasible through exhaustive search due to the immense search space. To address the constrained problem of resource and power allocation, which aims to enhance overall network throughput, we propose using bio-inspired methods. These methods have shown promising results in previous works [37,45,46,47,48]. In the following section, we will detail the bio-inspired algorithms and their application in optimizing channel and power allocation for D2D communication within cellular networks.

3. Bio-Inspired Algorithms

In this section, we first outline the individual representation and its corresponding fitness evaluation. Subsequently, we delve into the specifics of each bio-inspired algorithm and their implementation in optimizing power and channel allocation for Device-to-Device (D2D) communication underlaying a cellular network.

3.1. Individual Representation and Fitness

In optimization tasks, the concept of fitness refers to a mathematical function used to evaluate the performance of each candidate solution within a population. In our context, an individual is conceptualized as a specific solution encompassing a set allocation of channels and a regulated transmission power, as detailed in Table 1. Therefore, the fitness of an individual in relation to our problem is quantified based on their throughput, which can be calculated using the following formula:
F i t n e s s ( B e e s ) = i = 1 n b C + n b D r = 1 K B log 2 ( 1 + S I N R i , r )

3.2. Genetic Algorithm (GA)

A genetic algorithm is a method of optimization that mimics Darwin’s theory of the survival of the fittest across a population of competing individuals evolving from one generation to the next. To simulate the evolutionary process of the genetic algorithm, we employ two primary operations: Crossover and Mutation [49].

3.2.1. Crossover Operation

This operation is crucial for mimicking the reproductive behavior and ensuring the diversity of solutions. Crossover involves combining genetic information from two individuals—each representing a portion of the solution—to produce offspring with novel genetic traits. The crossover threshold is denoted as Th_C. In our study, we propose an algorithm employing a two-point crossover technique. The points for slicing the chromosomes of the two parent individuals are randomly determined by selecting two communications from the total number of communications (ranging from 1 to nbr).
I n d i v i d u a l 1 = U E 1 , U E 2 , U E 3 , U E 4 , U E 5 , , U E n b r
I n d i v i d u a l 2 = U E 1 , U E 2 , U E 3 , U E 4 , U E 5 , , U E n b r
In this scenario, we randomly select the third and fifth communications for the crossover process. Consequently, the offspring will comprise three segments, potentially incorporating one or two parts from one parent and the remaining segments from the other parent. This is further elucidated as follows:
o f f e r s p r i n g j = U E 1 , U E 2 , U E 3 , U E 4 , U E 5 , , U E n b r
where j = 1:6.

3.2.2. Mutation Operation

Genetic mutations occasionally occur in the genes of offspring. The likelihood of such mutations is determined by a probability known as the mutation threshold (Th_M). For instance, the mutation process can be exemplified as follows: two communications within the offspring’s chromosome are randomly selected, and their respective Block of Resource (BR) allocations are interchanged. This mutation process is illustrated below [50]. It is important that the two chosen communications are of the same type. If a D2D pair is selected, the counterpart with whom the BR will be exchanged should also be a D2D user, and similarly, for cellular users [51].
For our example, we select the fifth communication. The offspring will maintain the same communications, except for U 5 , which will undergo the mutation process:
Brood = U E 1 , U E 2 , U E 3 , U E 4 , UE 5 , U E 6 , , U E n b r

3.3. Particle Swarm Optimization (PSO)

The notion and construction of the PSO algorithm were inspired by perceiving the social comportment of birds gathering and fish schooling. Originally in nature, a group of birds hovers in the space behind a leader who has the nearby position of nourishment. The social conduct of birds can be interpreted into algorithmic processes, as in PSO, to decipher optimization problems where the horde of birds is taken as a swarm of particles and each particle symbolizes a contender solution. The swarm of particles explores the space in certain dimensions and discovers the best way out of an optimization problem [52]. Figure 4 depicts the PSO algorithm function for the channels and power allocation in 5G D2D communication.

3.4. Bee Life Algorithm (BLA)

3.4.1. Bees in Nature

Bees engage in a very precise kind of communication characterized by two distinct forms of dances, employed during their foraging activities. The first dance, known as the circular dance, is utilized when a food source is in close proximity. Conversely, the second dance, like the symbol for infinity (), is performed when the food source is situated at a considerable distance. The reproductive process of bees is facilitated by the queen. The female engages in several copulations during flight, until her spermatheca becomes replete. According to the cited source [53], unfertilized eggs have the potential to develop into drones, whereas fertilized eggs have the capacity to give rise to either a worker in the hive or a queen, depending on the food quality.

3.4.2. The Bee Life Algorithm

The Bee Life Algorithm was proposed as an advanced method for optimization that has been applied to job scheduling, resource allocation, and routing optimization, and it has given good results in previous work [37,38,54]. The composition of BLA is constructed from two distinct components that are inspired by the fundamental behaviors exhibited by bees during their lifespan. The first behavior consists of reproduction in which the queen mates with many drones while hovering. Basically, this behavior is coupling, which can be modeled through a Genetic Algorithm, with Crossover and Mutation as optimization operators and that is the first part of BLA. Food foraging is the second behavior, where worker bees search the neighborhood for a source of nourishment based on two criteria: merit and amount of nutrition. This second behavior is modeled with a local search algorithm. We adopted the same Crossover and Mutation methods used in GA for reproduction. Thus, in the following, we will discuss in detail the food foraging method used in BLA for the problem at hand whereas the its pseudo code for power and resource allocation is shown in Appendix A.

3.4.3. Food Foraging

The laborers engage in a process of exploration within the local vicinity in order to identify and locate food sources of sustenance. In the context of BLA, a greedy local search strategy is employed for each worker bee (solution) to determine whether a more optimal solution exists within its local vicinity, resulting in the identification of local optimal solutions. Local search is employed to ensure the attainment of the optimal solution inside a certain region, hence mitigating the risk of overlooking superior solutions due to a failure to fully explore the vicinity surrounding a satisfactory answer. In order to achieve this objective, a random D2D pair link is selected and enhances the power of transmission to the highest level. The better-found individuals are kept; if not, we disregard them as follows:
w o r k e r = [ C U 1 , C U 2 2 , , D 2 D 1 , , D 2 D i w i t h P i = x i d B m , , D 2 D n ]
N e i g h b o r i = [ C U 1 , C U 2 2 , , D 2 D 1 , , D 2 D j w i t h P i = y i d B m , , D 2 D n ]
Figure 5 presents a diagram of the proposed algorithm based on the life of bees in nature:

4. The Matching Bees Algorithm (MBA)

The algorithm utilized in this study is derived from a modified version of the BLA that incorporates enhancements to its optimization procedures. Techniques from matching theory are employed to enhance the performance of BLA [55]. The enhancement process begins by applying a one-to-many matching approach, which includes externalities in the allocation of channels. This step is specifically aimed at effectively serving D2D couples. A resource block is exclusively allocated to a D2D communication only if this allocation results in superior throughput. The MBA pseudo code for power and resource allocation are presented in Appendix B.
After establishing an improved initial population, the iterative BLA process begins, following enhancements to reproductive capabilities and food-foraging strategies. This improvement in the initial population through matching theory involves selecting a resource block that demonstrates a higher improvement in throughput compared to the initially allocated BRs.
The throughput for each pair of D2D users is calculated for every Resource Block (BR). These computed throughputs are then sorted, and the pair comprising a D2D user and BR that achieves the highest throughput is selected. This process is executed iteratively for each D2D pair. If multiple pairs achieve the maximum throughput, the selection prioritizes the resource block with the fewest D2D pairs sharing it. If more than one BR has an equal number of D2D pairs, the BR selection is made randomly. Figure 6 illustrates the Matching Bees Algorithm, incorporating comprehensive optimization operators.

5. Simulation and Discussion

This section presents the validation of the proposed algorithms through simulation. The objective of this study was to perform a comparison analysis of the MBA algorithm and several other meta-heuristic algorithms, including GA, PSO, and BLA. The network analyzed in our simulations consists of a single cell, as illustrated in Figure 7, which provides a snapshot of the simulated system. In this depiction, D2D users are represented by red and blue stars, while cellular users are indicated by black triangles. The circle represents the macro cell, with the BS positioned at its center.
In general, the macro cell radius is commonly set at 1 km [56], as set in our simulation. The typical distance between the transmitter and receiver in a pair of Device-to-Device (D2D) users, frequently cited in numerous academic articles [57], is 50 m. The cell center acts as the central hub for our base station, which accommodates both cellular and D2D users. Additionally, with the simulation utilizing a centralized technique, the Base Station (BS) provides channel state information. A radio frequency of 2.4 GHz was employed, with the power for both communication types adjusted to be less than or equal to 23 dBm. The optimization operators and number of D2D pairs of used algorithms have been summarized in Table A1 (Appendix C).
In our simulations, the system parameters are detailed in Table 2. The population size is set at 20 individuals for all algorithms. For the BLA and MBA, the population consists of 12 Workers, 7 Drones, and 1 Queen. The Crossover operation used in this study is a two-point crossover for the MBA, BLA, and Genetic Algorithm (GA). Consequently, the number of broods produced in each mating event is 6, resulting in a total of 42 offspring in each generation.
Our findings are compared to those obtained via MBA, BLA, Particle Swarm Optimization (PSO), and GA using the same metrics as cited in [58], which are based on PSO.

5.1. Convergence of the Algorithms

The algorithms employed are characterized by their iterative nature, highlighting the importance of achieving rapid convergence. Consequently, we assess the convergence of all algorithms in two different scenarios. The first scenario involves a total of eight cellular users and ten pairs of D2D users. Moreover, the second scenario consists of twenty pairs of D2D users, while maintaining eight CUs. Each user is required to have a minimum data rate of 250 kilobits per second (kbps).
Figure 8 demonstrates that the total network throughput is lower in the first scenario compared to the second, indicating that an increase in the number of D2D pairs enhances network throughput. The Matching Bees Algorithm (MBA) achieves higher throughputs in both scenarios compared to the Biogeography-Based Algorithm (BLA), Particle Swarm Optimization (PSO), and Genetic Algorithm (GA), and does so within a reasonable timeframe; while BLA, GA, and PSO tend to converge to local optimal solutions, MBA manages to escape these local optima and searches for a globally better solution with higher throughput.

5.2. Network Performance Based on D2D Pairs Number

To understand the impact of D2D communications on network throughput, we analyzed the throughput as the ratio of D2D pair to Cellular User (CUs) increases. The number of CUs was fixed at eight, and the ratio was varied from 1 to 5 in increments of 0.5. Consequently, one to five D2D pairs share the same Resource Block (BR) for each CU. For each configuration, the simulations were conducted 50 times. Figure 9 and Figure 10 display the throughput (cellular, D2D, and total network) achieved by the algorithms. In Figure 9, no rate requirements are established for each individual user. Moreover, as depicted in Figure 10, every user is assigned a minimum rate requirement of 250 kilobits per second (kbps).
According to Figure 9, there is a positive correlation between the number of D2D pairs and both D2D communication and network throughput. Moreover, there is a decrease in cellular throughput in relation to the increasing number of Device-to-Device pairings. The rise in the number of D2D pairs leads to a corresponding increase in interference in cellular communications. The MBA attains better throughput of all types (cellular, D2D, and network) compared to the other algorithms.
In Figure 10, it can be shown that the network throughput D2D and CUs, experiences a decline when the number of D2D to cellular communication ratio increases starting at 1.5 to 5. The primary factor contributing to this phenomenon is the imposition of a minimum rate requirement for each user, which restricts the ability of algorithms to enhance throughputs.
In the next scenario, the number of cellular users is held constant at eight throughout the next simulation, while the number of D2D pairs grows from two to four to eight to sixteen.
Figure 11 illustrates that with an increase in the number of D2D pairs, there is a corresponding rise in both network and D2D throughputs for each of the four techniques evaluated. However, as the number of D2D communications increases, the cellular throughput achieved by these techniques decreases. This decline is attributed to the enhanced interference on cellular users resulting from the higher density of D2D pairings. Notably, the MBA demonstrates a clear advantage in achieving higher throughput for cellular communications compared to the other algorithms. This advantage is also evident in the throughput for D2D communications.
In Figure 12, the MBA’s throughput remains consistent when the number of D2D pairings is less than the number of cellular communications. It shows an increase when the number of D2D pairings is less than 12. A comparison of the network throughput in both scenarios (with and without a rate constraint) using the MBA reveals that when the number of D2D pairs exceeds sixteen, the throughput drops below 164 Mbps in scenarios without rate constraints and falls to 118 Mbps when rate constraints are imposed. As demonstrated in both Figure 11 and Figure 12, the MBA consistently achieves higher overall throughput than the GA and BLA, as well as PSO, thus outperforming them in these metrics.

5.3. Effects of Rate Restrictions on Acceptance Ratio

We analyze how the four algorithms fare when their acceptance rate is constrained. After time T of the simulation, if the method converges to a feasible solution P times, we can determine the algorithm’s acceptance ratio like in [58]:
A c c e p t a n c e r a t i o = P T
The simulation results presented above were achieved using a configuration wherein the number of CUs was set to 8, and the number of D2D pairs was set to (10, 20). The algorithms were executed fifty times to determine the acceptance ratio. By increasing the rate by 125 kbps, the initial rate of 250 kbps increased to 1250 kbps.
Upon comparing Figure 13 and Figure 14, it becomes evident that the acceptance ratios depicted in the former exhibit a greater magnitude than those presented in the latter. The underlying cause can be attributed to the number of users, as an increased number of D2D users results in heightened mutual interference. Upon comparing the two figures, it becomes evident that the acceptance ratios are higher in Figure 13 compared to those of Figure 14.
Subsequently, we proceed to examine the impact of the rate condition on the acceptance ratio in the presence of a comprehensive minimum constraint on the rate of cellular users. For this investigation, we establish a scenario wherein the number of cellular users is fixed to eight, while the number of D2D user pairs amounts to twenty. The acceptance ratios of all algorithms are depicted in Figure 15.
Based on the data presented in Figure 15, it is evident that the acceptance ratios attained by the MBA algorithm exhibit a higher level of performance when compared to other methods.
Through simulation results, we conclude that the best bio-inspired algorithms for the joint channel and power allocation are the MBA algorithms in terms of speed of convergence, network throughput, number of served D2D pairs, and converging to feasible solutions. However, the complexity of the MBA algorithm is higher compared to BLA, GA, and PSO.

6. Conclusions

In this study, we delved into the efficacy of bio-inspired optimization algorithms for channel and power allocation in 5G cellular networks with Device-to-Device (D2D) communication underlays. The setup involved multiple D2D user pairs sharing a resource block with a cellular user, with the primary goal of maximizing overall network throughput while ensuring a minimum rate for cellular communications. The Modified Bee Algorithm (MBA) was utilized to avoid infeasible solutions, using a fitness value defined by rate constraint. Our simulation results demonstrate that the MBA outperforms BLA, GA, and PSO across various scenarios, particularly in terms of convergence speed, solution quality, and the realization of practical solutions. Following the MBA, BLA exhibited the next best performance, succeeded by GA, and then PSO.
For future work, we propose further enhancing the MBA approach by incorporating the impact of interference from adjacent cells in resource allocation and power control strategies. This paper’s scope was limited to users within a single cell and did not account for interference from neighboring cells. However, in practical scenarios, this external interference can significantly influence the Signal-to-Interference-plus-Noise Ratio (SINR) of users. Therefore, an extended study that includes this aspect could offer a more comprehensive understanding and a robust solution applicable in real-world multi-cell environments. Additionally, exploring the application of MBA in various network topologies and user densities could yield valuable insights into its adaptability and effectiveness in diverse network settings.

Author Contributions

Conceptualization, K.T. and M.K.B.; methodology, K.T. and O.K.; software, M.K.B. and K.T.; validation, M.K.B. and O.K.; formal analysis, M.K.B. and K.T.; investigation, M.K.B.; data curation, K.T.; writing—original draft preparation, K.T. and M.K.B.; writing—review and editing, K.T., O.K., Y.H., S.A. and W.M.; visualization, K.T.; supervision, O.K. and M.K.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data will be shared upon request of the readers.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
UThe set of users
U E n b C / U E n b D CU and D2D pairs number, respectively
B R Resource blocks set
KResource blocks number
AMatrix of allocation
T h p u t , C T h p u t , D T h p u t Throughput
S I N R m i n CUs minimum SINR
G i j Gain between UEi and UEj
P L Path Loss model
BBandwidth
P c m a x CUs maximum power
P d m a x D2D pairs maximum power
T h C Crossover threshold
T h M Mutation threshold
W G N White Gaussian Noise
FCarrier frequency
XPopulation account
DNumber of drones
WNumber of workers
YNumber of broods
5GBFifth Generation and Beyond
PPPPoisson Point Process
BLABee Life Algorithm
PSOParticle Swarm Optimization
BRBlock of Resource
QoSQuality of Service
BSBase Station
SINRSignal-to-Interference-plus-Noise Ratio
CUCellular User
UAVUnmanned Aerial Vehicle
D2DDevice to Device
UEUser Equipment
GAGenetic Algorithm
UMiUrban Micro System
kbpsKilobits per second
MBAMatching Bees Algorithm

Appendix A

BLA pseudo code for power and resource allocation:
  • Generate X random bees: Initialization
  • Calculate Fitness (X bees): Evaluation
  • Categorization: One Queen, W workers, D drones // Reproduction: first optimization operator (endin g c criteria not met)
  • do
  • Crossover (Queen, Drone) // Queen and Drones mate with probability ThC
  • while (there is a drone who did not mate with Queen)
  • for (some broods)
  • Mutation (brood) // The broods mutate with probability ThM
  • end for // Food Foraging: second optimization operator
  • for (all workers)
  • Random selection (D2Dpair)
  • Transmission power optimization (D2Dpair)
  • end for
  • Calculate Fitness (broods, new workers): Evaluation
  • Keep X best bees: Selection
  • end while
  • Best Solution (Queen) BLA

Appendix B

MBA pseudo code for resource and power allocation
  • for (i 1 to X) do
  • for (r RB1 to RBK) do
  • if (Best fitness < fitness (i-th, r-th)) then
  • Best fitness (i-th, r-th)
  • end if
  • end for
  • end for // end of initialization of X bees with matching theory
  • while (not (stopping criteria)) do
  • Evaluation: calculate fitness (X bees)
  • Categorization: One Queen, W workers, D drones
  • Reproduction
  • Crossover
  • Mutation
  • Food Foraging
  • Optimize transmission power D2Dpair
  • Calculate fitness (broods, new workers): Evaluation
  • Keep X best bees: Selection while
  • Best Solution (Queen)
  • End MBA

Appendix C

Table A1. Bio-inspired algorithms for channel and power allocation.
Table A1. Bio-inspired algorithms for channel and power allocation.
GAPSOBLAMBA
SourceGeneticsParticle SwarmsBeesCombination of bees and matching theory
Optimization operatorsCrossover and MutationUpdating power and resource allocated to D2D pairsReproduction (Crossover and Mutation) and food foraging (Local search)Matching theory to optimize first population and BLA (reproduction and food foraging) to enhance the optimized first population
Number of D2D pairs supportedMultiple

References

  1. Jayakumar, S. A review on resource allocation techniques in D2D communication for 5G and B5G technology. Peer-to-Peer Netw. Appl. 2021, 14, 243–269. [Google Scholar] [CrossRef]
  2. Kheddar, H.; Himeur, Y.; Atalla, S.; Mansoor, W. An Efficient Model for Horizontal Slicing in 5G Network using Practical Simulations. In Proceedings of the 2022 5th International Conference on Signal Processing and Information Security (ICSPIS), Dubai, United Arab Emirates, 7–8 December 2022; pp. 158–163. [Google Scholar]
  3. Gismalla, M.S.M.; Azmi, A.I.; Salim, M.R.B.; Abdullah, M.F.L.; Iqbal, F.; Mabrouk, W.A.; Othman, M.B.; Ashyap, A.Y.; Supa’at, A.S.M. Survey on device-to-device (D2D) communication for 5GB/6G networks: Concept, applications, challenges, and future directions. IEEE Access 2022, 10, 30792–30821. [Google Scholar] [CrossRef]
  4. Lekouaghet, B.; Khelifa, M.A.; Himeur, Y.; Boukabou, A. Node localization in WSN using the slime mould algorithm. In Proceedings of the 2023 6th International Conference on Signal Processing and Information Security (ICSPIS), Dubai, United Arab Emirates, 8–9 November 2023; pp. 82–86. [Google Scholar]
  5. Pradhan, D.; Sahu, P.K.; Dash, A.; Tun, H.M. Sustainability of 5G green network toward D2D communication with RF-energy techniques. In Proceedings of the 2021 International Conference on Intelligent Technologies (CONIT), Hubli, India, 25–27 June 2021; pp. 1–10. [Google Scholar]
  6. Ioannou, I.; Vassiliou, V.; Christophorou, C.; Pitsillides, A. Distributed artificial intelligence solution for D2D communication in 5G networks. IEEE Syst. J. 2020, 14, 4232–4241. [Google Scholar] [CrossRef]
  7. Salim, M.M.; Elsayed, H.A.; Abdalzaher, M.S. A survey on essential challenges in relay-aided D2D communication for next-generation cellular networks. J. Netw. Comput. Appl. 2023, 216, 103657. [Google Scholar] [CrossRef]
  8. Hayat, O.; Ngah, R.; Zahedi, Y. In-band device to device (D2D) communication and device discovery: A survey. Wirel. Pers. Commun. 2019, 106, 451–472. [Google Scholar] [CrossRef]
  9. Malik, P.K.; Wadhwa, D.S.; Khinda, J.S. A survey of device to device and cooperative communication for the future cellular networks. Int. J. Wirel. Inf. Netw. 2020, 27, 411–432. [Google Scholar] [CrossRef]
  10. Ahmed, A.; Al-Dweik, A.; Iraqi, Y.; Mukhtar, H.; Naeem, M.; Hossain, E. Hybrid automatic repeat request (HARQ) in wireless communications systems and standards: A contemporary survey. IEEE Commun. Surv. Tutor. 2021, 23, 2711–2752. [Google Scholar] [CrossRef]
  11. Wu, H.; Gao, X.; Xu, S.; Wu, D.O.; Gong, P. Proximate device discovery for D2D communication in LTE advanced: Challenges and approaches. IEEE Wirel. Commun. 2020, 27, 140–147. [Google Scholar] [CrossRef]
  12. Gandotra, P.; Jha, R.K.; Jain, S. A survey on device-to-device (D2D) communication: Architecture and security issues. J. Netw. Comput. Appl. 2017, 78, 9–29. [Google Scholar] [CrossRef]
  13. Gómez, A.; Muñoz, A. Deep learning-based attack detection and classification in Android devices. Electronics 2023, 12, 3253. [Google Scholar] [CrossRef]
  14. Austine, A.; Pramila, R.S. Hybrid Optimization Algorithm for Resource Allocation in LTE-Based D2D Communication. Comput. Syst. Sci. Eng. 2023, 46, 2263–2276. [Google Scholar] [CrossRef]
  15. Wang, D.; Qin, H.; Song, B.; Xu, K.; Du, X.; Guizani, M. Joint resource allocation and power control for D2D communication with deep reinforcement learning in MCC. Phys. Commun. 2021, 45, 101262. [Google Scholar] [CrossRef]
  16. Kumar Jadav, N.; Gupta, R.; Tanwar, S. A survey on energy-efficient resource allocation schemes in device-to-device communication. Int. J. Commun. Syst. 2022, 35, e5112. [Google Scholar] [CrossRef]
  17. Safdar, G.A.; Ur-Rehman, M.; Muhammad, M.; Imran, M.A.; Tafazolli, R. Interference mitigation in D2D communication underlaying LTE-A network. IEEE Access 2016, 4, 7967–7987. [Google Scholar] [CrossRef]
  18. Modak, K.; Rahman, S. Multi-cell interference management in in-band D2D communication under LTE-A network. In Proceedings of the 2021 International Conference on Computing, Electronics & Communications Engineering (iCCECE), Southend, UK, 16–17 August 2021; pp. 13–18. [Google Scholar]
  19. Zhang, W.; Wang, C.X.; Ge, X.; Chen, Y. Enhanced 5G cognitive radio networks based on spectrum sharing and spectrum aggregation. IEEE Trans. Commun. 2018, 66, 6304–6316. [Google Scholar] [CrossRef]
  20. Lai, W.K.; Wang, Y.C.; Lin, H.C.; Li, J.W. Efficient resource allocation and power control for LTE-A D2D communication with pure D2D model. IEEE Trans. Veh. Technol. 2020, 69, 3202–3216. [Google Scholar] [CrossRef]
  21. Hamdi, M.; Zaied, M. Resource allocation based on hybrid genetic algorithm and particle swarm optimization for D2D multicast communications. Appl. Soft Comput. 2019, 83, 105605. [Google Scholar] [CrossRef]
  22. Xia, X.; Kang, G. Particle Swarm Optimization based Power Control Algorithms for SWIPT-Assisted D2D Communications Underlaying Cellular Networks. IOP Conf. Ser. Mater. Sci. Eng. 2020, 790, 012006. [Google Scholar] [CrossRef]
  23. Nethravathi, H.M.; Akhila, S. Optimal Resource Sharing Amongst Device-to-Device Communication Using Particle Swarm Algorithm. In Evolutionary Computing and Mobile Sustainable Networks: Proceedings of ICECMSN 2020; Springer: Singapore, 2021; pp. 1–11. [Google Scholar]
  24. Shi, L.; Xu, S. UAV path planning with QoS constraint in device-to-device 5G networks using particle swarm optimization. IEEE Access 2020, 8, 137884–137896. [Google Scholar] [CrossRef]
  25. Telli, K.; Kraa, O.; Himeur, Y.; Ouamane, A.; Boumehraz, M.; Atalla, S.; Mansoor, W. A comprehensive review of recent research trends on unmanned aerial vehicles (uavs). Systems 2023, 11, 400. [Google Scholar] [CrossRef]
  26. Sayed, A.; Himeur, Y.; Alsalemi, A.; Bensaali, F.; Amira, A. Intelligent edge-based recommender system for internet of energy applications. IEEE Syst. J. 2021, 16, 5001–5010. [Google Scholar] [CrossRef]
  27. He, C.; Tian, C.; Zhang, C.; Feng, D.; Pan, C.; Zheng, F.C. Energy efficiency optimization for distributed antenna systems with D2D communications under channel uncertainty. IEEE Trans. Green Commun. Netw. 2020, 4, 1037–1047. [Google Scholar] [CrossRef]
  28. Nguyen, N.T.; Choi, K.W.; Song, L.; Han, Z. ROOMMATEs: An unsupervised indoor peer discovery approach for LTE D2D communications. IEEE Trans. Veh. Technol. 2018, 67, 5069–5083. [Google Scholar] [CrossRef]
  29. Berkani, M.R.A.; Chouchane, A.; Himeur, Y.; Ouamane, A.; Amira, A. An Intelligent Edge-Deployable Indoor Air Quality Monitoring and Activity Recognition Approach. In Proceedings of the 2023 6th International Conference on Signal Processing and Information Security (ICSPIS), Dubai, United Arab Emirates, 8–9 November 2023; pp. 184–189. [Google Scholar]
  30. Reddy, N.R.; Kalaivani, K.; Prasanthi, K.N.; Azmal, S.M.; Teja, P.R. Enhancing 5G Networks with D2D Communication: Architectures, Protocols, and Energy-Efficient Strategies for Future Smart Cities. Int. J. Intell. Syst. Appl. Eng. 2024, 12, 168–174. [Google Scholar]
  31. Zhou, L.; Wu, D.; Chen, J.; Dong, Z. Greening the smart cities: Energy-efficient massive content delivery via D2D communications. IEEE Trans. Ind. Inform. 2017, 14, 1626–1634. [Google Scholar] [CrossRef]
  32. Kong, P.Y. Cellular-assisted device-to-device communications for healthcare monitoring wireless body area networks. IEEE Sens. J. 2020, 20, 13139–13149. [Google Scholar] [CrossRef]
  33. Khujamatov, K.; Akhmedov, N.; Reypnazarov, E.; Khasanov, D.; Lazarev, A. Device-to-device and millimeter waves communication for 5G healthcare informatics. In Blockchain Applications for Healthcare Informatics; Elsevier: Amsterdam, The Netherlands, 2022; pp. 181–211. [Google Scholar]
  34. Sulaiman, B.; Tarapiah, S.; Natsheh, E.; Atalla, S.; Mansoor, W.; Himeur, Y. Radio map generation approaches for an rssi-based indoor positioning system. Syst. Soft Comput. 2023, 5, 200054. [Google Scholar] [CrossRef]
  35. Fan, H.; Kilari, A.; Vemuri, K.; Daffron, I.; Wang, J.; Ramamurthy, V. Indoor location for emergency responders using LTE D2D communications waveform. In Proceedings of the IPIN (Short Papers/Work-in-Progress Papers), Pisa, Italy, 30 September–3 October 2019; pp. 347–354. [Google Scholar]
  36. Mahdi, W.H.; Taşpinar, N. Bee System-based Self Configurable Optimized Resource Allocation Technique in Device-to-Device (D2D) Communication Networks. IEEE Access 2023, 12, 3039–3053. [Google Scholar] [CrossRef]
  37. Benbraika, M.K.; Bitam, S.; Mellouk, A. Joint resource allocation and power control based on Bee Life Algorithm for D2D Communication. In Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco, 15–18 April 2019; pp. 1–6. [Google Scholar]
  38. Benbraika, M.K.; Bitam, S. Spectrum allocation and power control for D2D communication underlay 5G cellular networks. Int. J. Commun. Netw. Distrib. Syst. 2021, 27, 299–322. [Google Scholar] [CrossRef]
  39. Shamaei, S.; Bayat, S.; Hemmatyar, A.M.A. Interference-Aware Resource Allocation Algorithm for D2D-Enabled Cellular Networks Using Matching Theory. IEEE Trans. Netw. Serv. Manag. 2023. [Google Scholar] [CrossRef]
  40. Awad, M.K.; Baidas, M.W.; Ahmad, A.; Al-Mubarak, N. A matching-theoretic approach to resource allocation in D2D-enabled downlink NOMA cellular networks. Phys. Commun. 2022, 54, 101837. [Google Scholar] [CrossRef]
  41. Shannon, C.E. A mathematical theory of communication. ACM Sigmobile Mob. Comput. Commun. Rev. 2001, 5, 3–55. [Google Scholar] [CrossRef]
  42. Hassan, Y.; Hussain, F.; Hossen, S.; Choudhury, S.; Alam, M.M. Interference minimization in D2D communication underlaying cellular networks. IEEE Access 2017, 5, 22471–22484. [Google Scholar] [CrossRef]
  43. Series, M. Guidelines for Evaluation of Radio Interface Technologies for IMT-2020. Available online: https://www.itu.int/dms_pub/itu-r/opb/rep/R-REP-M.2412-2017-PDF-E.pdf (accessed on 13 December 2023).
  44. Makhija, D. Performance of Mission Critical Device To Device Communication in Rayleigh Fading Channel. In Proceedings of the 2023 International Conference on Recent Advances in Electrical, Electronics & Digital, New Delhi, India, 1–3 May 2023. [Google Scholar]
  45. Gen, M.; Lin, L. Genetic algorithms and their applications. In Springer Handbook of Engineering Statistics; Springer: London, UK, 2023; pp. 635–674. [Google Scholar]
  46. Yashoda, M.; Shivashetty, V. Bi-crs: Bio-inspired cluster-based routing scheme for d2d communication in iot. In Proceedings of International Conference on Recent Trends in Computing: ICRTC 2021; Springer: Singapore, 2022; pp. 187–199. [Google Scholar]
  47. Jain, M.; Saihjpal, V.; Singh, N.; Singh, S.B. An overview of variants and advancements of PSO algorithm. Appl. Sci. 2022, 12, 8392. [Google Scholar] [CrossRef]
  48. Nguyen, K.K.; Vien, N.A.; Nguyen, L.D.; Le, M.T.; Hanzo, L.; Duong, T.Q. Real-time energy harvesting aided scheduling in UAV-assisted D2D networks relying on deep reinforcement learning. IEEE Access 2020, 9, 3638–3648. [Google Scholar] [CrossRef]
  49. Kamyab, T.; Daealhaq, H.; Ghahfarokhi, A.M.; Beheshtinejad, F.; Salajegheh, E. Combination of Genetic Algorithm and Neural Network to Select Facial Features in Face Recognition Technique. Int. J. Robot. Control Syst. 2023, 3, 50–58. [Google Scholar] [CrossRef]
  50. An, Q.; Wu, S.; Yu, J.; Gao, C. Multi-modal mutation cooperatively coevolving algorithm for resource allocation of large-scale D2D communication system. Complex Intell. Syst. 2023. [Google Scholar] [CrossRef]
  51. Hershberg, R. Mutation—the engine of evolution: Studying mutation and its role in the evolution of bacteria. Cold Spring Harb. Perspect. Biol. 2015, 7, a018077. [Google Scholar] [CrossRef] [PubMed]
  52. Shami, T.M.; El-Saleh, A.A.; Alswaitti, M.; Al-Tashi, Q.; Summakieh, M.A.; Mirjalili, S. Particle swarm optimization: A comprehensive survey. IEEE Access 2022, 10, 10031–10061. [Google Scholar] [CrossRef]
  53. Bitam, S.; Batouche, M.; Talbi, E.G. A survey on bee colony algorithms. In Proceedings of the 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW), Atlanta, GA, USA, 19–23 April 2010; pp. 1–8. [Google Scholar]
  54. Bitam, S. Bees life algorithm for job scheduling in cloud computing. In Proceedings of the Third International Conference on Communications and Information Technology, Chengde, China, 14–16 September 2012; Volume 7, pp. 186–191. [Google Scholar]
  55. Cioabă, S.M.; Murty, M.R. Matching Theory. In A First Course in Graph Theory and Combinatorics, 2nd ed.; Springer: Singapore, 2022; pp. 111–126. [Google Scholar]
  56. Hussain, Z.; Mehdi, H.; Saleem, S.M.A.; Mahboob, A. Performance Analysis of Relay-Assisted Device-to-Device Communication. Int. J. Electron. Telecommun. 2022, 68, 587–593. [Google Scholar] [CrossRef]
  57. Fujitsu. High-Capacity Indoor Wireless Solutions: Picocell Femtocell? Available online: https://www.fujitsu.com/downloads/TEL/fnc/whitepapers/High-Capacity-Indoor-Wireless.pdf (accessed on 13 December 2023).
  58. Xu, J.; Guo, C.; Zhang, H. Joint channel allocation and power control based on PSO for cellular networks with D2D communications. Comput. Netw. 2018, 133, 104–119. [Google Scholar] [CrossRef]
Figure 1. D2D communication modes.
Figure 1. D2D communication modes.
Computers 13 00044 g001
Figure 2. Classification of D2D communication.
Figure 2. Classification of D2D communication.
Computers 13 00044 g002
Figure 3. System illustration.
Figure 3. System illustration.
Computers 13 00044 g003
Figure 4. Particle Swarm Optimization diagram.
Figure 4. Particle Swarm Optimization diagram.
Computers 13 00044 g004
Figure 5. BLA diagram.
Figure 5. BLA diagram.
Computers 13 00044 g005
Figure 6. The MBA diagram for channel and power allocation in 5G D2D communication.
Figure 6. The MBA diagram for channel and power allocation in 5G D2D communication.
Computers 13 00044 g006
Figure 7. Snapshot of system simulation.
Figure 7. Snapshot of system simulation.
Computers 13 00044 g007
Figure 8. Convergence evaluation of simulated algorithms.
Figure 8. Convergence evaluation of simulated algorithms.
Computers 13 00044 g008
Figure 9. Effect of D2D pair number on cellular throughput. There is no rate requirement.
Figure 9. Effect of D2D pair number on cellular throughput. There is no rate requirement.
Computers 13 00044 g009
Figure 10. Effect of D2D pair number on cellular throughput with 250 Kbps as rate requirement.
Figure 10. Effect of D2D pair number on cellular throughput with 250 Kbps as rate requirement.
Computers 13 00044 g010
Figure 11. Changing number of D2D pairs with no rate condition.
Figure 11. Changing number of D2D pairs with no rate condition.
Computers 13 00044 g011
Figure 12. Changing number of D2D pairs with 250 Kbps as rate requirement.
Figure 12. Changing number of D2D pairs with 250 Kbps as rate requirement.
Computers 13 00044 g012
Figure 13. Acceptance ratio with rate constraint. Cellular communication equals 8 and 10 D2D communication.
Figure 13. Acceptance ratio with rate constraint. Cellular communication equals 8 and 10 D2D communication.
Computers 13 00044 g013
Figure 14. Acceptance ratio with rate constraint. Cellular communication equals 8 and 20 D2D communication.
Figure 14. Acceptance ratio with rate constraint. Cellular communication equals 8 and 20 D2D communication.
Computers 13 00044 g014
Figure 15. Impact of total rate requirement for cellular communication on acceptance ratio.
Figure 15. Impact of total rate requirement for cellular communication on acceptance ratio.
Computers 13 00044 g015
Table 1. Individual representation.
Table 1. Individual representation.
BR#User Equipment (UE)Power (P)
BR1UE4P4
UE2P2
UE5P5
BR2UE1P1
UE6P6
BR1UE7P7
Table 2. Simulation parameters.
Table 2. Simulation parameters.
ParametersValues
Radius of the cell1000 m
Coverage of D2D users50 m
WGN−174
Max power (CU and D2D)23 dBm
B1 MHz
F2.4 GHz
nbC8
Y42
X20
D7
W12
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Benbraika, M.K.; Kraa, O.; Himeur, Y.; Telli, K.; Atalla, S.; Mansoor, W. Interference Management Based on Meta-Heuristic Algorithms in 5G Device-to-Device Communications. Computers 2024, 13, 44. https://doi.org/10.3390/computers13020044

AMA Style

Benbraika MK, Kraa O, Himeur Y, Telli K, Atalla S, Mansoor W. Interference Management Based on Meta-Heuristic Algorithms in 5G Device-to-Device Communications. Computers. 2024; 13(2):44. https://doi.org/10.3390/computers13020044

Chicago/Turabian Style

Benbraika, Mohamed Kamel, Okba Kraa, Yassine Himeur, Khaled Telli, Shadi Atalla, and Wathiq Mansoor. 2024. "Interference Management Based on Meta-Heuristic Algorithms in 5G Device-to-Device Communications" Computers 13, no. 2: 44. https://doi.org/10.3390/computers13020044

APA Style

Benbraika, M. K., Kraa, O., Himeur, Y., Telli, K., Atalla, S., & Mansoor, W. (2024). Interference Management Based on Meta-Heuristic Algorithms in 5G Device-to-Device Communications. Computers, 13(2), 44. https://doi.org/10.3390/computers13020044

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop