Skip to main content
Top
Published in: Complex & Intelligent Systems 1/2024

Open Access 17-08-2023 | Original Article

Multi-modal mutation cooperatively coevolving algorithm for resource allocation of large-scale D2D communication system

Authors: Qing An, Shisong Wu, Jun Yu, Cuifen Gao

Published in: Complex & Intelligent Systems | Issue 1/2024

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the rapid growth in cellular user quantity and quality of service demand, the resource allocation in device-to-device communication system significantly affects the overall efficiency and user experience. In this study, the resource allocation for large-scale device-to-device communication system is modelled as a constrained optimization problem with thousands of dimensionalities. Then, the variable-coupling relationship of the developed model is analysed and the mathematical proof is firstly provided, and a novel algorithm namely multi-modal mutation cooperatively coevolving particle swarm optimization is developed to optimize the ultra-high dimensional model. Finally, efficacy of the developed method is verified by a comprehensive set of case studies, some famous algorithms for the specialized literature are also employed for comparison. Experimental results shown that the developed algorithm can obtain accurate and robust optimization performance for different system scales. In addition, when the system scale increases to 1000 cellular users and 300 D2D-pair users, the developed method can still outperform the compared algorithms and output accurate resource allocation solution.
Notes

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Introduction

In the modern society, the complexity of the communication system increases exponentially as the number of cellular users (CU), demand for quality of service (QoS) and the service data volume keep growing all the time. In order to overcome this problem and improve spectrum efficiency, the device-to-device (D2D) communication technique is considered one of the most important approach in IMT-2020(5G) system [1]. The D2D communication implies that the user equipment (UE) nearby can communicate with each other by directly connecting or through the enhanced-Node B (eNB) [2, 3]. Instead of the traditional cellular connections, the UE in D2D communication system can be connected with another adjacent equipment using direct links, which brings a considerable offloading potential. In addition, the D2D communication paradigm also provides significant performance gains in terms of spectral efficiency, energy efficiency and system capacity due to the physical proximity [4].
Due to the aforementioned advantages, the D2D communication technique has attracted the attention of scholars worldwide in recent years. In order to verify the efficiency and potential benefits of D2D communication technique, extensive studies have been carried out in the literature [57]. Among the existing studies, the research contributions concerning D2D communications mainly include the resource allocation [8], mode selection [9], interference management [10], power control [11] and so on.
This study mainly focuses on the resource allocation problem of large-scale D2D communication for maximizing the system energy efficiency. Specifically, the D2D-pair users (DP) can reuse certain CU uplink resources under the control of eNB to provide communication service. However, when the communication links are established, the transmission of DP transmitter (DT) will cause interference to eNB, and the transmission of CU may also interfere the DP receiver (DR). As a result, the detailed resource allocation strategy for CUs and DPs significantly affects the system spectrum efficiency and QoS. In order to solve this problem, some advanced resource allocation methodologies are widely developed. For example, Jiang et al. investigated the clustering and resource allocation problem in D2D multicast transmission underlay cellular networks, and a hybrid intelligent clustering strategy and joint resource allocation scheme were developed by considering the QoS constraints [12]. In Jiang’s study, the numbers of CUs and DPs included in the evaluated system were all less than 50. Xu et al. focused on the unfair resource usage and limited energy storage problems in D2D communications, and a multi-objective resource allocation method was developed for maximizing the security-aware efficiency and optimizing the transmit power [13]. However, the system scale of Xu’s study was very small, in which only 3 CUs and 3pairs of DPs were included in their case study. Pawar et al. developed a joint uplink-downlink resource allocation approach for maximizing the network throughput while guaranteeing the QoS for both CUs and DPs [14]. In addition, a mixed-integer nonlinear programming-based resource allocation model was established, and a two-stage (i.e., sub-channel assignment stage and power allocation stage) allocation methodology was also developed for optimizing the aforementioned model. In Pawar’s study, the evaluated system was also in normal scale, in which the numbers of CUs and DPs were all less than 50. Sultana et al. introduced the sparse code multiple access (SCMA) method to a D2D-enabled cellular network, in order to utilize the overloading feature of SCMA to support a massive device connectivity while enhancing the overall network performance [15]. According to the simulation parameter settings in Sultana’s study, the total number of DPs was 5–40, and the total number of CUs was 12–24. Mohamad et al. proposed a dynamic sectorization method for effectively allocating the resource block to D2D users (DU). In their developed method, eNB can vary the number of sectors dynamically. According to the experimental results provided in Mohamad’s study, the signal-to-interference-noise-ratio (SINR) and overall allocation performance were significantly improved [16]. However, the evaluated system in Mohamad’s study was also in normal scale. Specifically, the number of CUs included in the system was 50 and the number of DPs was 20.
With the fast development of artificial intelligence (AI) in recent years, the AI-based methodologies are also widely employed for solving the resource allocation problem in D2D communications, e.g. the machine learning (ML) based algorithms [17] and the meta-heuristic algorithms [18]. Based on the Q-learning theory, Amin et al. developed a ML-based resource allocation algorithm, in which the multi-agent learners from multiple DU were created, and the system throughput was determined by the state-learning of Q value list [19]. Sun et al. developed a resource allocation strategy by using differential evolution (DE) algorithm, in order to balance the energy efficiency and system throughput [20]. Gu et al. employed the particle swarm optimization (PSO) to optimally allocate the DU power by introducing a set of penalty functions. In addition, the optimal relationships of CU and DP were matched by proposing the Kuhn–Munkres algorithm [21]. Kuang et al. employed PSO algorithm to optimize the resource allocation model of D2D communications, which was proved to be a non-convex and mixed-integer optimization problem. In Kuang’s study, the total transmission power of DU equipment, as well as the load balance of base station was considered as the model constraints. Experimental results showed that the system energy efficiency was significantly improved by employing the developed algorithm [22].
As discussed above, in most of the existing studies, the resource allocation problem of D2D communications is always solved by using traditional methods. Although the intelligent approaches, e.g., the ML or meta-heuristic algorithms have been already introduced into the D2D communications, the existing studies mainly focus on D2D communication system with normal size. Specifically, the resource allocation problem with normal size means the model dimensionality is less than 100. When the model dimensionality increases to more than 100, the problem is always called the high dimensional resource allocation problem. Moreover, when the model dimensionality further increases to 1000, the problem is called the ultra-high dimensional or large-scale resource allocation problem. Obviously, the model complexity increases exponentially with the system size (i.e., model dimensionality) due the “curse of dimensionality”, and performance of the existing PSO or DE based algorithms will deteriorate rapidly.
Considering the aforementioned research gap, the resource allocation for large D2D communication system is established as a constrained large-scale optimization problem (LSOP) in this study. Then, on one hand, the variable-coupling relationship of the developed model is analysed and the mathematical proof is firstly provided. On the other hand, a novel meta-heuristic algorithm namely multi-modal mutation cooperatively coevolving particle swarm optimization (MMCC-PSO) is developed for effectively optimize the LSOP-based resource allocation model.
The rest of this study is organized as follows. In “Constrained LSOP-based resource allocation model in D2D communications”, the resource allocation problem in D2D communications is comprehensively discussed, and the LSOP-based resource allocation model is developed. In “Variable-coupling analysis and mathematical proof”, the variable-coupling relationship of the developed model is analysed and proved in detail. Then, the novel MMCC-PSO algorithm for optimizing LSOP is proposed in “A novel MMCC-PSO algorithm”. The detailed simulation experiments and analysis are conducted in “Simulation experiments and analysis”. Finally, this paper is concluded in “Conclusion”.

Constrained LSOP-based resource allocation model in D2D communications

Resource allocation in D2D communications

In this study, a cellular network of LTE-Advance systems is employed. In the evaluated system, the eNB locates at the center of a hexagonal region, and all the CUs and DPs are randomly distributed within the hexagonal region. Denote C = {CUn | n = 1, 2, …, N} and D = {DPm | m = 1, 2, …, M} as the sets of CU and DP, in which N and M represent the numbers of CU and DP in the evaluated system. Structure of the evaluated D2D communication system can be illustrated as Fig. 1, in which DTm and DRm represent the transmitter and receiver of DPm, respectively.
As shown in Fig. 1, the transmission of DT will cause interference to eNB, and the transmission of CU will also interfere DR. In the resource allocation of D2D communications, the entire energy efficiency of the system should be maximized by satisfying certain constraints like QoS. According to reference [23], the system energy efficiency SEE to be maximized can be formulized as
$$ SEE = \frac{{\sum\nolimits_{m = 1}^{M} {\sum\nolimits_{n = 1}^{N} {k_{m,n} \cdot \log_{2} \left( {1 + \frac{{TP_{m,n} \cdot G_{m} }}{{TP_{n} \cdot G_{m,n} + n_{0} }}} \right)} } }}{{\sum\nolimits_{m = 1}^{M} {\sum\nolimits_{n = 1}^{N} {k_{m,n} \cdot TP_{m,n} + PC_{m} } } }} $$
(1)
where TPm,n denotes the transmission power of DPm when the uplink resource of CUn is reused; Gm denotes the channel gain from DTm to DRm; TPn denotes the transmission power of CUn; Gm,n denotes the channel gain from DTm to CUn; n0 denotes the channel noise power under the effect of white Gaussian noise; PCm denotes the circuit power consumption of DPm; km,n is a binary variable, which denotes whether the uplink resource of CUn is reused by DPm. The detailed definition for km,n can be formulized as
$$ k_{m,n} { = }\left\{ {\begin{array}{*{20}l} {1,} & {if\;{\text{the}}\;{\text{uplink}}\;{\text{resource}}\;{\text{of}}\;CU_{n} \;{\text{is}}\;{\text{reused}}\;{\text{by}}\;DP_{m} } \\ {0,} & {otherwise} \\ \end{array} } \right. $$
(2)
Considering that the uplink resource of each CU can be reused by at most one DP, and each DP can reuse one or more CU uplink resources, the constraints formulized in Eq. (3) should be included into the resource allocation model.
$$ s.t.\;\;\left\{ {\begin{array}{*{20}c} {\;\sum\limits_{m = 1}^{M} {k_{m,n} \le 1} \;\;(n = 1,\;2,\;...,\;N)\;} \\ {\;\sum\limits_{n = 1}^{N} {k_{m,n} \ge 1} \;\;(m = 1,\;2,\;...,\;M)} \\ \end{array} } \right.\; $$
(3)

Encoding and decoding schemes

In order to effectively optimize the resource allocation model described in “Resource allocation in D2D communications”, an efficient encoding scheme is required. As discussed in “Resource allocation in D2D communications”, the uplink resource of each CU can be reused by at most one DP. As a result, the variable xn which indicates the relationship between a certain CUn and each DPm (m = 1, 2, …, M) is employed to form the optimization vector. Specifically, the encoding scheme for optimization vector \(\vec{x}\) is defined as
$$ {\vec{x}} = (x_{1} ,\;x_{2} ,\;...,\;x_{N} ),\quad x_{n} \in [0.5,\;M + 0.5]\;\;(n = 1,\;2,\;...,\;N) $$
(4)
As shown in Eq. (4), each optimization variable xn is defined to describe the reuse relationship between the nth CU and each DP. For example, the nth CU will be reused by the mth DP if the optimization variable \(x_{n} \in [m - 0.5,\;m + 0.5]\). Obviously, the lower boundary for xn is 0.5, which indicates the minimum value corresponding to DP1. In addition, the upper boundary for xn is M + 0.5, which indicates the maximum value corresponding to DPM. As a result, the lower and upper boundaries for each optimization variable are set to 0.5 and M + 0.5, respectively.
According to Eq. (4), the encoding scheme for optimization variable xn is defined as
$$ CU_{n} \;{\text{is reused by}}\;\left\{ {\begin{array}{*{20}l} {DP_{1} ,} & {if\;x_{n} \in [0.5,\;1.5)} \\ {DP_{2} ,} & {if\;x_{n} \in [1.5,\;2.5)} \\ {} & {...} \\ {DP_{M} ,\;} & {if\;x_{n} \in [M - 0.5,\;M + 0.5)} \\ \end{array} } \right.(n = 1,\;2,\;...,\;N) $$
(5)
For example, if the optimization vector \(\vec{x}\) is equal to {2.85, 4.12, 4.96, 3.09, 2.43, 1.35, 1.65, 2.11, 1.39}, the detailed relationships between each CUn and DPm can be decoded as Table 1.
Table 1
Decoding scheme for \(\vec{x}\) = {2.85, 4.12, 4.96, 3.09, 2.43, 1.35, 1.65, 2.11, 1.39}
Optimization variable
Meaning
x1 = 2.85
CU1 is reused by DP3
x2 = 4.12
CU2 is reused by DP4
x3 = 4.96
CU3 is reused by DP5
x4 = 3.09
CU4 is reused by DP3
x5 = 2.43
CU5 is reused by DP2
x6 = 1.35
CU6 is reused by DP1
x7 = 1.65
CU7 is reused by DP2
x8 = 2.11
CU8 is reused by DP2
x9 = 1.39
CU9 is reused by DP1

Fitness function

As discussed in “Resource allocation in D2D communications”, target of the resource allocation in D2D communications is to maximize the system energy efficiency SEE as shown in Eq. (1). According to reference [23], the maximization of Eq. (1) is equal to minimize the following equation
$$ f_{SEE} = \sum\limits_{m = 1}^{M} {\sum\limits_{n = 1}^{N} {k_{m,n} \cdot \frac{{G_{n,m} \cdot G_{m,n} }}{{G_{m} \cdot G_{n} }}} } $$
(6)
where Gn denotes the channel gain from CUn to eNB; Gm denotes the channel gain from DTm to DRm; Gn,m denotes the channel gain from CUn to DRm; Gm,n denotes the channel gain from DTm to CUn. The channel gains Gn, Gm, Gn,m and Gm,n are calculated using the following equation
$$ G = 10^{{( - P_{L} - L_{f} )/10}} $$
(7)
where PL denotes the pathloss; Lf denotes the lognormal fading between the corresponding transmitter and receiver.
In order to ensure that each DP should be allocated with at least one CU uplink resource, this constraint is satisfied by introducing the following penalty function
$$ \left\{ {\begin{array}{*{20}c} {\;f_{p} = \lambda \cdot \sum\limits_{m = 1}^{M} {(f_{judge} \cdot } f_{guide} )} \\ {f_{judge} = \prod\limits_{n = 1}^{N} {\sqrt[{10}]{{\left| {m - y_{n} } \right|}}} \;\;\;} \\ {f_{guide} = \prod\limits_{n = 1}^{N} {\sqrt[{10}]{{\left| {m - x_{n} } \right|}}} \;\;\;} \\ \end{array} } \right. $$
(8)
where \(\lambda\) is the penalty factor which is used for controlling the punishment intensity; xn and yn denotes the continuous and discrete optimization variables, respectively (i.e., before and after decoding by using Eq. (5)).
As shown in Eq. (8), definition of the penalty function mainly contains the following two items:
1.
fjudge is the judging item used to judge whether the solution \(\vec{x}{\text{ = \{ }}x_{1} {,}\;x_{2} {,}\;...{,}\;x_{N} {\text{\} }}\) can satisfy the constraint. By introducing fjudge, the punish function fp is equal to 0 only if for each m (m = 1, 2, …, M), there is at least one value in yn (n = 1, 2, …, N) is equal to m. In another word, fp = 0 only if each DPm is allocated with at least one CU uplink resource. Otherwise, the solution will be punished by Eq. (8).
 
2.
fguide is the guiding item used to guide the individuals to converge to the potential optimum. As xn in fguide is the continuous variable before decoding, the difference between m and xn is defined as the “penalty gradient” to accelerate the convergence speed for satisfying the constraint.
 
As a result, the entire fitness function for the resource allocation problem is the summary of system energy efficiency fSEE and the penalty function fp. Then, the overall resource allocation model can be formulized as
$$ \min \;f = f_{SEE} + f_{p} $$
(9)
As shown in Eq. (9), the penalty function fp is directly added to the fitness function f. That is to say, if a solution is not feasible, a large penalty value will be directly added to the fitness function f. Obviously, in the minimization problem, this large penalty value will make the solution poor enough to be eliminated by the algorithmic mechanism.

Variable-coupling analysis and mathematical proof

As discussed in “Constrained LSOP-based resource allocation model in D2D communications”, dimensionality of the developed resource allocation model is equal to N. Obviously, for a large-scale D2D communication system, the model complexity will increase exponentially with the total number of CUs within the system. Although a lot of intelligent methods are widely developed for solving the complex engineering problems [2428], performance of the existing optimization algorithms will deteriorate rapidly due to the “curse of dimensionality”.
Based on the philosophy of “divide and conquer”, the cooperatively coevolving (CC) framework is developed to effectively optimize the high-dimensional problems [29]. According to the basic theory of CC, the CC framework performs efficiently when solving the separable problem, which means there is no coupling-relationship between each of the optimization variables. However, for the partial-separable or non-separable problems, most of the basic CC based algorithms will also lose their efficacies.

Definitions for separable variable and component

In this study, before employing the CC framework to solve the aforementioned resource allocation problem, the variable-coupling relationships of the developed model are comprehensively analysed. First of all, the definition for separable variable is given as
Definition 1
The optimization variable xi is separable for fitness function f, if satisfying
$$ \forall \;\vec{x}_{a} = (x_{a1} ,\;x_{a2} ,\;...,\;x_{aD} ) \in S^{D} ,\;\;\;if\;\exists \;x_{bi} \;\;\;s.t.\;\;f(x_{bi} |\vec{x}_{a} ) < f(\vec{x}_{a} )\;\; \Rightarrow \;\forall \;\vec{x}_{c} = (x_{c1} ,\;x_{c2} ,\;...,\;x_{cD} ) \in S^{D} ,\;\;f(x_{bi} |\vec{x}_{c} ) < f(x_{ai} |\vec{x}_{c} ) $$
(10)
where SD denotes the D-dimensional solution space;\({\vec{\text{x}}} = x_{bi} |\vec{x}_{a}\) denotes the values for optimization vector \({\vec{\text{x}}}\) in which all the variables are set the same with \(\vec{x}_{a}\) except that the ith variable is replaced by xbi. That is to say, \(f(x_{bi} |\vec{x}_{a} )\), \(f(x_{bi} |\vec{x}_{c} )\) and \(f(x_{ai} |\vec{x}_{c} )\) in Eq. (10) are defined as
$$ \left\{ {\begin{array}{*{20}c} {f(x_{bi} |\vec{x}_{a} ) = f(x_{a1} ,\;...,\;x_{a(i - 1)} ,\;x_{bi} ,\;x_{a(i + 1)} ,\;...,\;x_{aD} )} \\ {f(x_{bi} |\vec{x}_{c} ) = f(x_{c1} ,\;...,\;x_{c(i - 1)} ,\;x_{bi} ,\;x_{c(i + 1)} ,\;...,\;x_{cD} )} \\ {f(x_{ai} |\vec{x}_{c} ) = f(x_{c1} ,\;...,\;x_{c(i - 1)} ,\;x_{ai} ,\;x_{c(i + 1)} ,\;...,\;x_{cD} )} \\ \end{array} } \right. $$
(11)
According to Definition 1, the “divide and conquer” philosophy proposed in basic CC framework can be expressed as Remark 1 [29].
Remark 1
For the fitness function f, the minimization for all the variables \({\vec{\text{x}}}\) is equivalent to the minimization for each separable component (i.e., the collection of several separable variables). This can be formulized as
$$ \arg \;\mathop {\min }\limits_{{{\vec{\text{x}}}}} \;f\; = \;\bigg(\arg \;\mathop {\min }\limits_{{{\vec{\text{x}}}_{1} }} \;f,\;\arg \;\mathop {\min }\limits_{{{\vec{\text{x}}}_{2} }} \;f,\;..,\;\arg \;\mathop {\min }\limits_{{{\vec{\text{x}}}_{C} }} \;f\bigg) $$
(12)
where \({\vec{\text{x}}}\) denotes the entire D-dimensional optimization vector; \({\vec{\text{x}}}_{1}\), \({\vec{\text{x}}}_{2}\), …, \({\vec{\text{x}}}_{C}\) denote each of the separable components in \({\vec{\text{x}}}\).

Mathematical proof for variable-coupling relationships in resource allocation model

As shown in Remark 1, in order to decrease the dimensionality of the aforementioned resource allocation model, the separable components within the model can be decomposed into different groups and coevolved separately.
1.
Variable-coupling relationship for fSEE
 
Actually, all the continuous variables xi (i = 1, 2, …, N) are separable for the system energy efficiency fSEE. This can be described as Lemma 1.
Lemma 1
Each of the optimization variables xi (i = 1, 2, …, N) is separable for the fitness function fSEE in Eq. (6).
Lemma 1 can be proved in detail as follows:
Proof
For the each of the variable, say the ith xi (i = 1, 2, …, N), satisfying
$$ \forall \;\vec{x}_{a} = (x_{a1} ,\;x_{a2} ,\;...,\;x_{aN} ) \in S^{N} ,\;\;\;\;if\;\;\exists \;\;{\text{a}} \;value\;of\;\;x_{i} = \;x_{bi} \;\;\;\;s.t.\;\;f_{SEE} (x_{bi} |\vec{x}_{a} ) < f_{SEE} (\vec{x}_{a} ) $$
(13)
That is
$$ f_{SEE} (x_{a1} ,\;...,\;x_{a(i - 1)} ,\;x_{bi} ,\;x_{a(i + 1)} ,...,\;x_{aN} ) < f_{SEE} (x_{a1} ,\;...,\;x_{a(i - 1)} ,\;x_{ai} ,\;x_{a(i + 1)} ,...,\;x_{aN} ) $$
(14)
Put Eq. (6) into Eq. (14), then Eq. (14) can be rewritten as
$$ \begin{aligned} &\sum\limits_{m = 1}^{M} \left( \sum\limits_{n = 1}^{i} {k_{m,n} \cdot \frac{{G_{n,m} \cdot G_{m,n} }}{{G_{m} \cdot G_{n} }}} + k_{{x_{bi} ,i}} \cdot \frac{{G_{{i,x_{bi} }} \cdot G_{{x_{bi} ,i}} }}{{G_{{x_{bi} }} \cdot G_{i} }} \right.\\ &\left. \qquad + \sum\limits_{n = i + 1}^{N} {k_{m,n} \cdot \frac{{G_{n,m} \cdot G_{m,n} }}{{G_{m} \cdot G_{n} }}} \right) \\ &\quad < \sum\limits_{m = 1}^{M} \left( \sum\limits_{n = 1}^{i} {k_{m,n} \cdot \frac{{G_{n,m} \cdot G_{m,n} }}{{G_{m} \cdot G_{n} }}} + k_{{x_{ai} ,i}} \cdot \frac{{G_{{i,x_{ai} }} \cdot G_{{x_{ai} ,i}} }}{{G_{{x_{ai} }} \cdot G_{i} }} \right.\\ &\qquad \left.+ \sum\limits_{n = i + 1}^{N} {k_{m,n} \cdot \frac{{G_{n,m} \cdot G_{m,n} }}{{G_{m} \cdot G_{n} }}} \right) \end{aligned} $$
(15)
As the ith CU is allocated to the xaith DP in solution \(\vec{x}_{a}\), and allocated to the xbith DP in solution \(\vec{x}_{b}\), then \(k_{{x_{ai} ,i}} = k_{{x_{bi} ,i}} = 1\). Obviously, Eq. (15) can be further simplified as
$$ \frac{{G_{{i,x_{bi} }} \cdot G_{{x_{bi} ,i}} }}{{G_{{x_{bi} }} }} < \frac{{G_{{i,x_{ai} }} \cdot G_{{x_{ai} ,i}} }}{{G_{{x_{ai} }} }} $$
(16)
Then, \(\forall \;\vec{x}_{c} = (x_{c1} ,\;x_{c2} ,\;...,\;x_{cN} ) \in S^{N}\), according to Eq. (16), the following equation can be easily derived
$$ \begin{aligned} f_{SEE} (x_{bi} |\vec{x}_{c} ) &= \sum\limits_{m = 1}^{M} \left( \sum\limits_{n = 1}^{i} {k_{m,n}^{c} \cdot \frac{{G_{n,m}^{c} \cdot G_{m,n}^{c} }}{{G_{m}^{c} \cdot G_{n}^{c} }}} + k_{{x_{bi} ,i}} \cdot \right.\\ & \qquad \left.\frac{{G_{{i,x_{bi} }} \cdot G_{{x_{bi} ,i}} }}{{G_{{x_{bi} }} \cdot G_{i} }} + \sum\limits_{n = i + 1}^{N} {k_{m,n}^{c} \cdot \frac{{G_{n,m}^{c} \cdot G_{m,n}^{c} }}{{G_{m}^{c} \cdot G_{n}^{c} }}} \right) \\ & < \sum\limits_{m = 1}^{M} \left( \sum\limits_{n = 1}^{i} {k_{m,n}^{c} \cdot \frac{{G_{n,m}^{c} \cdot G_{m,n}^{c} }}{{G_{m}^{c} \cdot G_{n}^{c} }}} + k_{{x_{ai} ,i}} \cdot \right.\\ &\qquad \left.\frac{{G_{{i,x_{ai} }} \cdot G_{{x_{ai} ,i}} }}{{G_{{x_{ai} }} \cdot G_{i} }} + \sum\limits_{n = i + 1}^{N} {k_{m,n}^{c} \cdot \frac{{G_{n,m}^{c} \cdot G_{m,n}^{c} }}{{G_{m}^{c} \cdot G_{n}^{c} }}} \right) \\ &= f_{SEE} (x_{ai} |\vec{x}_{c} ) \end{aligned} $$
(17)
Obviously, according to Definition 1, the variable xi is separable for the fitness function fSEE. Lemma 1 is proved.
2.
Variable-coupling relationship for fp
 
For the penalty function fp, all the continuous variables xi (i = 1, 2, …, N) are non-separable. This can be described as Lemma 2.
Lemma 2
Each of the optimization variables xi (i = 1, 2, …, N) is non-separable for the penalty function fp in Eq. (8).
For the each of the variable, say the ith xi (i = 1, 2, …, N), satisfying
$$ \forall \;\vec{x}_{a} = (x_{a1} ,\;x_{a2} ,\;...,\;x_{aN} ) \in S^{N} ,\;\;\;\;if\;\;\exists \;\;{\text{a}} \;value\;of\;\;x_{i} = \;x_{bi} \;\;\;\;s.t.\;\;f_{p} (x_{bi} |\vec{x}_{a} ) < f_{p} (\vec{x}_{a} ) $$
(18)
Equation (18) can be illustrated as Fig. 2.
However, a counter-example for supporting that xi is separable can be provide as
$$ \exists \;\;\vec{x}_{c} = (x_{c1} ,\;x_{c2} ,\;...,\;x_{cN} ) \in S^{N} ,\;\;\;s.t.\;\;f_{p} (x_{bi} |\vec{x}_{c} ) > f_{p} (\vec{x}_{c} ) $$
(19)
Equation (19) can be illustrated as Fig. 3.
Obviously, according to Definition 1, the variable xi is not separable for the penalty function fp. Lemma 2 is proved.

A novel MMCC-PSO algorithm

In order to effectively optimize the resource allocation model, a novel MMCC-PSO algorithm is developed based on the result of variable-coupling analysis.

Particle swarm optimization

PSO is one of the most widely used optimization algorithms proposed originally by Kennedy and Eberhart, which exploits the concepts of the social behavior of animals like fish schooling and bird flocking [30]. In recent years, a lot of PSO-variants are developed and successfully employed to solve real-world optimization problems [3133].
In classical PSO algorithm, a population with Np particles is randomly initialized within a certain search space. Then, the personal best position for each particle and the global best position found so far are initialized. After that, each of the particles evolves using the following equations
$$ v_{i} (t + 1) = \omega \cdot v_{i} (t) + \alpha_{l} (t) \cdot [\hat{x}_{i} (t) - x_{i} (t)] + \alpha_{g} (t) \cdot [\hat{x}_{g} (t) - x_{i} (t)] $$
(20)
$$ x_{i} (t + 1) = x_{i} (t) + v_{i} (t + 1) $$
(21)
where vi(t + 1) and xi(t + 1) represent the velocity and position of the ith particle in the (t + 1)th iteration; \(\hat{x}_{i} (t)\) represents the personal best position for the ith particle in the tth iteration; \(\hat{x}_{g} (t)\) represents the global best position in the tth iteration; \(\omega\) is the inertia weight; \(\alpha_{l} (t)\) and \(\alpha_{g} {(}t{)}\) are independent random numbers uniquely generated at every iteration.
At the end of the iteration, compare and update each personal best position \(\hat{x}_{i} (t)\) and the global best position \(\hat{x}_{g} (t)\). Then, start another iteration till the stopping criteria are satisfied.

Cooperatively coevolving framework

As most of the existing meta-heuristic algorithms will lose their efficacies when optimizing high-dimensional problems, the cooperatively coevolving (CC) framework is developed to improve the ability for overcoming the so-called “curse of dimensionality” [29].
According to the basic principle of CC framework, the high-dimensional problem is decomposed into several low-dimensional subproblems to be optimized one-by-one. In addition, the context vector with entire dimensionalities is introduced to provide reference when calculating the fitness function value of each subproblem. That is because each of the subproblem only contains a certain part of the variables in the original problem, and the fitness function value cannot be calculated without a reference of the other dimensionalities.
The basic principle of CC framework can be summarized as follows.
1.
Initialize the population with a certain number of D-dimensional individuals. Initialize the context vector using the global best individual within the current population.
 
2.
Decompose the original D-dimensional problem into K subproblems, and each subproblem represents certain d dimensionalities of the original problem. Obviously, d = D/K.
 
3.
Evolve each subproblem using a certain evolutionary algorithm principle (e.g., PSO, DE and so on). When compute the fitness function value of a certain subproblem, the dimensionalities corresponding to the other subproblems are kept the same with context vector.
 
4.
Proceed another cycle if the stopping criteria are not satisfied. Otherwise, stop the evolution process.
 

Multi-modal mutation strategy for context vector

As discussed in “Fitness function”, most of the solutions within the solution space are infeasible solutions because of the introduced penalty function as listed in Eq. (8). That is to say, the continuous solution space is seriously destroyed by the penalty function, and the feasible solutions are only distributed in the dispersed feasible sub-spaces. This can be illustrated as Fig. 4.
As shown in Fig. 4, the feasible solutions only locate in the sub-spaces which are not punished by the penalty function, and these sub-spaces widely distribute within the original solution space because of the introducing of penalty function. As a result, in order to obtain accurate optimization performance and fast convergence speed, the population should have the global and local exploring abilities. On one hand, each of the individual should avoid the infeasible sub-spaces, on the other hand, all the individuals should not gather within a single feasible sub-space to avoid the prematurity.
As discussed above, in order to improve the performance of CC-based algorithms on optimizing the resource allocation model, a novel multi-modal mutation (MM) strategy is developed. The detailed principles of MM strategy can be illustrated as the following steps.
Step 1: Randomly generate a mutation-selection factor Fms within the interval (0, 1). Then, go to Step 2 to execute mutation modal I (MM-I) if 0 < Fms < 1/3. Go to Step 3 to execute mutation modal II (MM-II) if 1/3 < Fms < 2/3; Otherwise, go to Step 4 to execute mutation modal III (MM-III).
Step 2: Execute MM-I (namely self-mutation). For each context vector, say the ith context vector (denote as CVi), randomly exchange a certain proportion (denote as pI%, \(p_{I} {\text{\% }} \in [0\% ,\;100\% ]\)) dimensionalities of CVi itself. The self-mutation for context vector (i.e., MM-I) can be formulized as
$$ {\text{exchange}}\;\;CV_{i} (x_{k1} ) \Leftrightarrow CV_{i} (x_{k2} )\;\;{\text{for}}\;\;(p_{I} {\text{\% }} \cdot D)\;\;{\text{times}} $$
(22)
where CVi(xk1) and CVi(xk2) denote two randomly selected variables of CVi.
Step 3: Execute MM-II (namely cross-mutation). Randomly select two context vectors, say the CVi and CVj, then randomly exchange a certain proportion (denote as pII%, \(p_{II} {\text{\% }} \in [0\% ,\;100\% ]\)) dimensionalities of CVi and CVj. The cross-mutation for context vector (i.e., MM-II) can be formulized as
$$ {\text{exchange}}\;\;CV_{i} (x_{k1} ) \Leftrightarrow CV_{j} (x_{k2} )\;\;{\text{for}}\;\;(p_{II} {\text{\% }} \cdot D)\;\;{\text{times}} $$
(23)
where CVi(xk1) and CVj(xk2) denote two randomly selected variables of CVi and CVj, respectively.
Step 4: Execute MM-III (namely individual-mutation). Randomly select a context vector, say the ith CVi, then randomly select an individual within the current population, say the jth individual (denote as INj). Randomly exchange a certain proportion (denote as pIII%, \(p_{III} {\text{\% }} \in [0\% ,\;100\% ]\)) dimensionalities of CVi and INj. The individual-mutation for context vector (i.e., MM-III) can be formulized as
$$ {\text{exchange}}\;\;CV_{i} (x_{k1} ) \Leftrightarrow IN_{j} (x_{k2} )\;\;{\text{for}}\;\;(p_{III} {\text{\% }} \cdot D)\;\;{\text{times}} $$
(24)
where CVi(xk1) and INj(xk2) denote two randomly selected variables of CVi and INj, respectively.
Step 5: Compare the newly mutated context vector (denote as CVmut) and the original context vector (denote as CVorg) before mutation, update CVmut using CVorg if better.

Evolution principle for MMCC-PSO

In this study, a novel evolution principle is developed for effectively optimize the resource allocation model. Specifically, in the developed evolution principle, the position for each individual is updated using the following four “best positions”.
1.
The global best individual within the current population, i.e., Xbest-I(t) = \(\hat{X}_{g} (t)\), in which Xbest-I(t) represents the first best-position employed for evolution at the tth iteration; \(\hat{X}_{g} (t)\) represents the global best individual at the tth iteration.
 
2.
The personal best position for the target individual, i.e., Xbest-II(t) = \(\hat{X}_{i} (t)\), in which Xbest-II(t) represents the second best-position employed for evolution at the tth iteration; \(\hat{X}_{i} (t)\) represents the personal best position of the ith individual at the tth iteration.
 
3.
The randomly selected context vector, i.e., Xbest-III(t) = CVrand(t), in which Xbest-III(t) represents the third best-position employed for evolution at the tth iteration; CVrand-i(t) represents the randomly selected context vector for the ith individual at the tth iteration.
 
4.
The best individual within the neighbor sub-population, i.e., Xbest-IV(t) = XN-i(t), in which Xbest-IV(t) represents the fourth best-position employed for evolution at the tth iteration; XN-i(t) represents the neighbor best position of the ith individual at the tth iteration. Note that in order to obtain XN-i(t), the original population should be divided into several sub-populations with a certain topology, e.g., the ring-topology. Then, the neighbor best of the ith individual is randomly generated from the best individual of the connected sub-populations. The generation of neighbor best position can be illustrated as Fig. 5.
 
As shown in Fig. 5, the neighbour best of xi(t) is randomly generated from the best individuals of sub-population 2 and sub-population 4 as these sub-populations are connected with xi(t).
Based on the definitions of Xbest-I(t) to Xbest-IV(t), the evolution principle employed in MMCC-PSO is developed as
$$ \left\{ {\begin{array}{*{20}l} {x_{i} (t + 1) = \frac{1}{2} \cdot [A(t + 1) + B(t + 1)] + N(0,1) \cdot \left| {A(t + 1) - B(t + 1)} \right|\;\;\;\;\;\;\;\;\;} \\ {\;A(t + 1) = \frac{1}{2} \cdot [X_{best - I} (t) + X_{best - II} (t)] + N(0,1) \cdot \left| {X_{best - I} (t) - X_{best - II} (t)} \right|\;\;\;} \\ {\;\;B(t + 1) = \frac{1}{2} \cdot [X_{best - III} (t) + X_{best - IV} (t)] + N(0,1) \cdot \left| {X_{best - III} (t) - X_{best - IV} (t)} \right|} \\ \end{array} } \right. $$
(25)
Note that in Eq. (25), N(0,1) denotes a randomly generated value which follows the Gaussian distribution. As shown in Eq. (25), A(t + 1) denotes the newly generated position between Xbest-I(t) and Xbest-II(t), and the distance between A(t + 1) and the midpoint of Xbest-I(t) and Xbest-II(t) follows Gaussian distribution. Similarly, B(t + 1) denotes the newly generated position between Xbest-III(t) and Xbest-IV(t), and the distance between B(t + 1) and the midpoint of Xbest-III(t) and Xbest-IV(t) also follows Gaussian distribution. Equation (25) can be further illustrated as Fig. 6.
In addition, as discussed in “Encoding and decoding schemes”, the lower and upper boundaries for each optimization variable are 0.5 and M + 0.5, respectively. That is to say, the solution space of the developed model is [0.5, M + 0.5]N. In order to avoid the exceeding of solution space, each of the xi(t + 1) computed by Eq. (25) will be checked using Eq. (26).
$$ x_{{i{ - }update}} (t + 1){ = }\left\{ {\begin{array}{*{20}c} {x_{i} (t + 1),} & {if\;x_{i} (t + 1) \in [0.5,\;M + 0.5]} \\ {\frac{{x_{i} (t) + 0.5}}{2},} & {if\;x_{i} (t + 1) < 0.5} \\ {\frac{{x_{i} (t) + [M + 0.5]}}{2},} & {if\;x_{i} (t + 1) > M + 0.5} \\ \end{array} } \right. $$
(26)
where xi-update(t + 1) denotes xi(t + 1) after boundary checking. As shown in Eq. (26), the computed xi(t + 1) is directly used to update the particle position if it is within the solution space. However, if the computed xi(t + 1) exceeds the lower boundary, the particle will move to the midpoint of the current position xi(t) and the lower boundary 0.5. Similarly, if the computed xi(t + 1) exceeds the upper boundary, the particle will move to the midpoint of the current position xi(t) and the upper boundary M + 0.5.

The MMCC-PSO algorithm

Based on the multi-modal mutation strategy described in “Multi-modal mutation strategy for context vector” and the evolution principle described in “The MMCC-PSO algorithm”, the MMCC-PSO algorithm is developed in this section. Procedure of the MMCC-PSO algorithm can be illustrated as Table 2.
Table 2
Pseudo code of MMCC-PSO
https://static-content.springer.com/image/art%3A10.1007%2Fs40747-023-01202-4/MediaObjects/40747_2023_1202_Tab2_HTML.png

Simulation experiments and analysis

Parameter setting and tuning

1.
Parameter setting
 
In this section, the developed MMCC-PSO algorithm is tested by a comprehensive set of simulation experiments. On one hand, efficiencies of the developed multi-modal mutation strategy and evolution principle are verified. On the other hand, the overall MMCC-PSO algorithm is compared with some famous algorithms for different dimensional cases. In the following experiments, the detailed parameter settings for MMCC-PSO are listed in Table 3.
Table 3
Parameter settings for the developed MMCC-PSO algorithm
Parameter
Meaning
Value
Parameter
Meaning
Value
Np
Population size
50
Nsp
Number of sub-populations
5
Max_ges
Maximum number of fitness function evaluations
1 × 106
\(\xi_{L}\)
Lower bound for each optimization variable
0.5
pI
Exchange proportion for MM-I
0.1
\(\xi_{U}\)
Upper bound for each optimization variable
M + 0.5
pII
Exchange proportion for MM-II
0.1
S
Pre-defined set for group-size
{5, 10, 20, 30, 40, 50}
pIII
Exchange proportion for MM-III
0.1
2.
Parameter tuning.
 
In order to verify the effect of algorithm parameters on the final optimization performance, the parameter tuning experiments are conducted in this section. Specifically, the MMCC-PSO algorithm with different parameter values are compared in detail, and the parameters to be tuned include pI, pII, pIII, Nsp and S.
In the following experiments, the assumption of communication scenario is based on the common practices in most of the existing studies. Specifically, in the evaluated D2D communication system, the numbers of CU and DP are set to 200 and 50, respectively. All the users are assumed to be randomly distributed within a square region with a side-length of 500 m. The distributions of these 250 users are shown as Fig. 7. The average result for 30 independent runs is recorded. The final optimization results of MMCC-PSO with different pI, pII and pIII values are compared in Table 4. Note that the values of the other parameters are kept the same with Table 3.
Table 4
Experimental results of MMCC-PSO with different pI, pII and pIII values for 30 independent runs
Result
pI = pII = pIII = 0.01
pI = pII = pIII = 0.05
pI = pII = pIII = 0.1
pI = pII = pIII = 0.5
pI = pII = pIII = 0.8
Best
42.1205
39.5623
38.1025
38.0221
38.7785
Worst
77.6236
51.9652
48.8696
48.9910
49.0012
Average
56.1250
45.2532
41.7821
41.1523
42.0514
Standard deviation
3.9699
3.2512
2.8895
2.7852
2.9142
Note that the best performance is set in bold
As shown in Table 4, performance of the MMCC-PSO is not very sensitive to the parameters pI, pII and pIII. Specifically, when these parameters are set to 0.1, 0.5 and 0.8, the average performance for 30 independent runs is almost the same. However, when pI, pII and pIII are set too small (e.g., pI = pII = pIII = 0.01 or pI = pII = pIII = 0.05), the performance of MMCC-PSO will deteriorate to different degrees. That is because the developed multi-modal mutation mechanism will lose its efficacy if the exchange proportions are too small.
The final optimization results of MMCC-PSO with different Nsp values are compared in Table 5. As shown in the table, the effect of the parameter Nsp is significant. Specifically, the best choice for the number of sub-populations is Nsp = 5, and the average optimization result is 41.2454. The performance of Nsp = 10 is slightly worse than that of Nsp = 5. However, when the values of Nsp are set too small (e.g., Nsp = 1, which means the population contains only 1 sub-population), the final optimization performance deteriorate significantly. Similarly, when the values of Nsp are set too large (e.g., Nsp = 50, which means the population contains 50 sub-populations but each with only 1 particle), the final optimization performance is also very poor. Actually, for the original population with 50 particles, the better decomposition strategy is to divide it into five sub-populations and each with ten particles, or to divide it into ten sub-populations and each with five particles.
Table 5
Experimental results of MMCC-PSO with different Nsp values for 30 independent runs
Result
Nsp = 1
Nsp = 2
Nsp = 5
Nsp = 10
Nsp = 50
Best
41.2154
39.9956
38.2154
38.9653
88.2546
Worst
70.2154
59.6520
47.9964
49.5263
138.6952
Average
59.6525
51.2154
41.2454
42.2365
112.2563
Standard deviation
4.0012
3.8541
2.8695
3.0021
7.2651
Note that the best performance is set in bold
Finally, the optimization results of MMCC-PSO with different S values are compared in Table 6. As shown in the table, performance of MMCC-PSO becomes poor when S is set too small or too large. For example, the population cannot obtain enough iterations when S = {1, 2, 3, 5}, so the average optimization result is 88.0918, which is significantly worse than S = {5, 10, 20, 30, 40, 50}. However, for S = {50, 100, 150, 200}, although the population can obtain enough iterations, the sub-problem is still too complex to be optimized efficiently, and the average optimization performance is still worse than S = {5, 10, 20, 30, 40, 50}.
Table 6
Experimental results of MMCC-PSO with different S values for 30 independent runs
Result
S = {1, 2, 3, 5}
S = {5, 10, 20, 30, 40, 50}
S = {50, 100, 150, 200}
Best
80.8637
38.1256
79.6525
Worst
69.9898
47.1458
112.2540
Average
88.0918
41.9652
96.5214
Standard deviation
3.9990
2.8012
5.0112
Note that the best performance is set in bold
As discussed above, the developed MMCC-PSO is not very sensitive to the exchange proportions pI, pII and pIII. In addition, for the number of sub-populations Nsp, a good choice is to use 5–10 sub-populations and each with 10–5 particles. Moreover, the set of group-size S should contain a wide range to effectively balance the number of iterations and the complexity of each sub-problem. Although the settings of Nsp and S can affect the performance of MMCC-PSO, the fault tolerance intervals are still large.

Verification for the multi-modal mutation strategy

In this section, the MMCC-PSO with and without the developed multi-modal mutation strategy (described in “Multi-modal mutation strategy for context vector”) are compared. Parameter settings for the evaluated D2D communication system are the same with “Parameter setting and tuning”. The average result for 30 independent runs is recorded. The final optimization results of MMCC-PSO with and without the developed multi-modal mutation strategy are compared in Table 7, in which MMCC-PSO denotes the algorithm integrated with mutation strategy and MMCC-PSOwithoutMM denotes the opposite. In addition, the convergence graphs obtained by MMCC-PSO and MMCC-PSOwithoutMM are compared in Fig. 8.
Table 7
Experimental results of MMCC-PSO and MMCC-PSOwithoutMM for 30 independent runs
Result
MMCC-PSO
MMCC-PSOwithoutMM
Best
38.0059
141.5266
Worst
48.5627
178.0159
Average
41.9982
157.2159
Standard deviation
2.8651
10.6985
Note that the best performance is set in bold
As shown in Table 7, with the integration of multi-modal mutation strategy, the MMCC-PSO significantly outperforms MMCC-PSOwithoutMM on optimization accuracy and robustness. Specifically, the average error (i.e., the total cost of the resource allocation solution) obtained by MMCC-PSO for 30 independent runs is just 41.9982, which is significantly smaller than 157.2159 obtained by MMCC-PSOwithoutMM. In addition, the best and worst performance obtained by MMCC-PSO is also better than those of MMCC-PSOwithoutMM. Moreover, the standard deviation obtained by MMCC-PSO is just 2.8651, which is smaller than 10.6985 obtained by MMCC-PSOwithoutMM. This implies that with the integration of multi-modal mutation strategy, robustness of the algorithm is also improved.
Figure 8 shown the convergence graphs obtained by MMCC-PSO and MMCC-PSOwithoutMM. Obviously, the MMCC-PSO significantly outperforms MMCC-PSOwithoutMM on both accuracy and convergence speed.

Verification for the developed evolution principle

In this section, the MMCC-PSO with and without the developed evolution principle (described in “Evolution principle for MMCC-PSO”) are compared. Parameter settings for the evaluated D2D communication system are the same with “Parameter setting and tuning”. In the following experiments, the MMCC-PSO integrated with the developed evolution principle is denoted as MMCC-PSO, while MMCC-PSOwithoutEP denotes the opposite. The average result for 30 independent runs is recorded. The final optimization results of MMCC-PSO and MMCC-PSOwithoutEP are compared in Table 8. The corresponding convergence graphs are plotted in Fig. 9.
Table 8
Experimental results of MMCC-PSO and MMCC-PSOwithoutEP for 30 independent runs
Result
MMCC-PSO
MMCC-PSOwithoutEP
Best
37.5420
69.5455
Worst
46.4301
123.0025
Average
42.1126
101.5988
Standard deviation
2.7996
17.4325
Note that the best performance is set in bold
As shown in Table 8 and Fig. 9, with the integration of the developed evolution principle, MMCC-PSO significantly outperforms MMCC-PSOwithoutEP on both optimization accuracy and convergence speed. Specifically, for the 30 independent runs, the average result obtained by MMCC-PSO is just 42.1126, which is significantly smaller than 101.5988 obtained by MMCC-PSOwithoutEP. In addition, the standard deviation of MMCC-PSO and MMCC-PSOwithoutEP is 2.7996 and 17.4325, respectively. The improvement on standard deviation implies a better performance on the algorithm robustness. Moreover, as shown in Fig. 9, the slope for convergence graph of MMCC-PSO is steeper than that of MMCC-PSOwithoutEP, and the location for convergence graph of MMC-PSO is lower than that of MMCC-PSOwithoutEP during most of the evolution process. This implies that the developed evolution principle can increase the convergence speed of algorithm for exploring the potential global optimum.

Comparison with other famous algorithms

In this section, the developed MMCC-PSO algorithm is compared with some famous algorithms for the specialized literature, including the AMCCPSO [34], DTC-DE [35], AMCCDE [36], CCPSO2 [37], VGCC-PSO [38] and DFS-CPSO [39]. Note that this study concerns the resource allocation problem of large-scale D2D communication system, and the developed MMCC-PSO algorithm is also mainly about improving the performance on optimizing ultra-high dimensional model. As a result, the compared algorithms are all chosen from the famous algorithms which are specifically designed for optimizing large-scale optimization problems. Specifically, the compared CCPSO2, AMCCPSO and AMCCDE algorithms are the classic and famous algorithms for optimizing large-scale problem, and the compared DTC-DE, VGCC-PSO and DFS-CPSO are the most recent and competitive large-scale optimization algorithms.
In order to compare the efficiency of these algorithms on optimizing different scales of allocation models, the comparison experiments are conducted on different cases with the dimensionalities from 100 to 1000. The detailed parameter settings of the compared algorithms follow their original studies. The evaluated D2D communication system for different cases are listed in Table 9.
Table 9
D2D communication systems for different cases
Case number
Number of CU
Number of DP
Model dimensionality
Case 1
100
20
100
Case 2
200
60
200
Case 3
300
80
300
Case 4
500
100
500
Case 5
800
200
800
Case 6
1000
300
1000
The distributions of CU and DP for each case are plotted as Fig. 10.
The final optimization results for 30 independent runs of each algorithm are compared in Table 10. The convergence graphs of each algorithm are plotted in Fig. 11.
Table 10
Comparisons of MMCC-PSO and some other famous algorithms
Cases
Result
MMCC-PSO
AMCCPSO
AMCCDE
CCPSO2
DTC-DE
VGCC-PSO
DFS-CPSO
Case 1
Best
24.5960
29.9859
48.1129
26.0002
27.5124
27.9996
25.6951
Worst
30.9696
43.6593
56.1125
31.3010
45.2542
47.5215
33.2651
Average
27.2169
33.4569
53.5692
27.4596
38.0889
39.1930
29.1695
Standard deviation
1.8159
3.3969
2.5965
1.1921
3.0215
3.6952
2.5215
Case 2
Best
74.9652
117.0215
194.1963
109.9563
115.2512
125.2653
89.9652
Worst
84.4969
137.2365
237.8951
134.5123
233.2365
169.6953
120.2152
Average
81.5124
130.6985
223.9563
119.2149
206.9199
153.7829
101.3251
Standard deviation
5.0215
5.4965
11.6962
6.6325
19.5263
10.2652
6.9656
Case 3
Best
117.7120
117.8963
261.1259
149.5429
144.2653
233.1253
121.2156
Worst
133.9658
159.4851
284.5901
261.9690
255.2541
262.1025
162.3690
Average
126.1985
143.4239
272.8886
180.8561
175.5711
250.4959
153.0431
Standard deviation
4.7425
16.6910
6.5421
53.5210
41.2563
11.0112
14.5236
Case 4
Best
131.1025
245.0025
359.6952
299.0532
280.1562
302.2369
188.2653
Worst
152.9652
282.3596
372.8541
354.6235
309.2652
350.1256
221.1569
Average
142.0965
260.1125
367.9658
321.0025
292.2859
332.2516
207.8569
Standard deviation
10.2969
12.8514
5.7795
27.9541
13.0010
27.6596
7.8956
Case 5
Best
208.1125
465.9696
483.11588
614.6953
270.1562
321.2563
220.1560
Worst
228.8965
481.5962
677.8320
719.8596
301.2563
360.2633
289.9696
Average
215.1458
474.8527
554.6696
667.1584
287.1025
347.3378
264.5236
Standard deviation
11.7854
7.2159
106.8594
47.0195
13.2563
10.2653
20.2153
Case 6
Best
410.1007
790.5874
804.2548
1847.3339
501.2652
753.2623
521.2112
Worst
423.9987
977.6587
835.2547
1992.1580
570.6236
789.6953
566.3965
Average
420.1205
857.1021
813.9685
1914.7789
536.6956
773.0766
542.0007
Standard deviation
8.0021
105.1578
11.3369
69.2151
15.5696
12.0365
13.2154
Note that the best performance is set in bold
As shown in Table 10, the developed MMCC-PSO can obtain the best performance on most of the cases of which the model dimensionality varies from 100 to 1000. Specifically, for the 100-dimensional case 1, the performance obtained by MMCC-PSO and CCPSO2 is almost the same (i.e., the average results are 27.2169 for MMCC-PSO and 27.4596 for CCPSO2). In addition, the performance of AMCCPSO, DTC-DE, VGCC-PSO and DFS-CPSO are 33.4569, 38.0889, 39.1930 and 29.1695 respectively, which are slightly worse than those of MMCC-PSO and CCPSO2. However, the performance of AMCCDE is 53.5692 and is significantly worse than the other algorithms.
For the cases 2 and 3, the model dimensionality increases to 200 and 300 respectively. The developed MMCC-PSO algorithm can also obtain the best performance, while the performance of its competitors deteriorates significantly. Specifically, the second-best performers are DFS-CPSO for case 2 and AMCCPSO for case 3, but their performance is significantly worse than that of MMCC-PSO. For example, the second-best performance is 101.3251 for case 2 (obtained by DFS-CPSO) and 143.4239 for case 3 (obtained by AMCCPSO), but the performance obtained by MMCC-PSO is 81.5124 for case 2 and 126.1985 for case 3. Moreover, the performance obtained by AMCCDE deteriorates rapidly with the increasing of model dimensionalities. The final results AMCCDE is 223.5963 for case 2 and 272.8886 for case 3, which are significantly worse than the other algorithms.
When the model dimensionality further increases to 500 in case 4 and 800 in case 5, with the integration of the developed multi-modal mutation strategy and evolution principle, the MMCC-PSO algorithm can still keep its efficiency. However, performance of the compared algorithms deteriorates rapidly with the increasing of model dimensionality. Moreover, when the dimensionality increases to 1000 in case 6, MMCC-PSO still obtains the best performance of 420.1205. However, all the compared algorithms lose their efficacies for optimizing 1000-dimensional model due to the exponential increasing complexity. In addition, as shown in Fig. 11, the developed MMCC-PSO algorithm can obtain the fastest convergence speed for most of the cases.

Conclusion

This study focuses on the optimal resource allocation for large-scale D2D communication system, in order to improve the overall system efficiency. Specifically, the numerical resource allocation model is established as a constrained large-scale optimization problem (LSOP). Then, the variable-coupling relationship of link resource allocation model is analysed in detail. According to the mathematical proof provided in this study, each optimization variable is separable for the fitness function fSEE which is related to the overall system efficiency, while each optimization variable is non-separable for the penalty function fp which is related the system constraints.
Based on the variable-coupling relationship analysis, a novel MMCC-PSO algorithm is developed to overcome the ultra-high dimensional and variable-coupling characteristics of the aforementioned LSOP-based resource allocation problem. According to the result of simulation experiments, the developed multi-modal mutation strategy and evolution principle in MMCC-PSO can significantly improve the performance on optimization accuracy, convergence speed and algorithm robustness.
Finally, efficiency of the developed methodology is verified by a comprehensive set of case studies, and some famous algorithms for the specialized literature are also employed for comparison. According to the experimental results, the developed MMCC-PSO significantly outperforms the compared algorithms on both accuracy and convergence speed, especially on optimizing the ultra-high dimensional problems with up to 500–1000 dimensionalities.
In the future, more efforts will be made to further improve the performance of MMC-PSO on optimizing the resource allocation problem with higher dimensionalities. The effectiveness of the developed model and algorithm will be furtherly verified by hardware system experiments. In addition, the real-world application of the developed methodology will be also considered in our future work.

Acknowledgements

This work was supported by the Opening Foundation of State Key Laboratory of Cognitive Intelligence, iFLYTEK (CIOS-2022SC07).

Declarations

Conflict of interest

The authors declare that they have no conflict of interests regarding the publication of this paper.
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://​creativecommons.​org/​licenses/​by/​4.​0/​.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Literature
1.
go back to reference Gupta A, Jha RK (2015) A survey of 5G network: architecture and emerging technologies. IEEE Access 3:1206–1232CrossRef Gupta A, Jha RK (2015) A survey of 5G network: architecture and emerging technologies. IEEE Access 3:1206–1232CrossRef
2.
go back to reference Alves LHD, Rebelatto JL, Souza RD, Brante G (2022) Network-coded cooperative LoRa network with D2D communication. IEEE Internet Things J 9(7):4997–5008CrossRef Alves LHD, Rebelatto JL, Souza RD, Brante G (2022) Network-coded cooperative LoRa network with D2D communication. IEEE Internet Things J 9(7):4997–5008CrossRef
3.
go back to reference Ji PS, Jia J, Chen J, Xie YH, Wang XW (2022) Joint optimization for RIS-assisted multicast D2D communications. Comput Netw 211:108977CrossRef Ji PS, Jia J, Chen J, Xie YH, Wang XW (2022) Joint optimization for RIS-assisted multicast D2D communications. Comput Netw 211:108977CrossRef
4.
go back to reference Jiang F, Wang BC, Sun CY, Liu Y, Wang R (2016) Mode selection and resource allocation for device-to-device communications in 5G cellular networks. China Commun 13(6):32–47ADSCrossRef Jiang F, Wang BC, Sun CY, Liu Y, Wang R (2016) Mode selection and resource allocation for device-to-device communications in 5G cellular networks. China Commun 13(6):32–47ADSCrossRef
5.
go back to reference Zhang ZF, Wang LS (2019) Social tie-driven content priority scheme for D2D communications. Inf Sci 480:160–173CrossRef Zhang ZF, Wang LS (2019) Social tie-driven content priority scheme for D2D communications. Inf Sci 480:160–173CrossRef
6.
go back to reference Wang LJ, Tian YL, Zhang D, Lu YH (2019) Constant-round authenticated and dynamic group key agreement protocol for D2D group communications. Inf Sci 503:61–71MathSciNetCrossRef Wang LJ, Tian YL, Zhang D, Lu YH (2019) Constant-round authenticated and dynamic group key agreement protocol for D2D group communications. Inf Sci 503:61–71MathSciNetCrossRef
7.
go back to reference Das A, Das N, Barman AD (2022) Multi-hop D2D communication in cellular networks to minimize EMR. IEEE Trans Green Commun Netw 6(2):713–722CrossRef Das A, Das N, Barman AD (2022) Multi-hop D2D communication in cellular networks to minimize EMR. IEEE Trans Green Commun Netw 6(2):713–722CrossRef
8.
go back to reference Liang L, Li GY, Xu W (2017) Resource allocation for D2D-enabled vehicular communications. IEEE Trans Commun 65(7):3186–3197CrossRef Liang L, Li GY, Xu W (2017) Resource allocation for D2D-enabled vehicular communications. IEEE Trans Commun 65(7):3186–3197CrossRef
9.
go back to reference Huang J, Zou JY, Xing CC (2019) Energy-efficient mode selection for D2D communications in cellular networks. IEEE Trans Cogn Commun Netw 4(4):869–882CrossRef Huang J, Zou JY, Xing CC (2019) Energy-efficient mode selection for D2D communications in cellular networks. IEEE Trans Cogn Commun Netw 4(4):869–882CrossRef
10.
go back to reference Xu YL, Liu F, Wu P (2018) Interference management for D2D communications in heterogeneous cellular networks. Pervasive Mob Comput 51:138–149CrossRef Xu YL, Liu F, Wu P (2018) Interference management for D2D communications in heterogeneous cellular networks. Pervasive Mob Comput 51:138–149CrossRef
11.
go back to reference da Silva JMB, Fodor G (2016) A binary power control scheme for D2D communications. IEEE Wirel Commun Lett 4(6):669–672CrossRef da Silva JMB, Fodor G (2016) A binary power control scheme for D2D communications. IEEE Wirel Commun Lett 4(6):669–672CrossRef
12.
go back to reference Jiang F, Zhang L, Sun CY, Yuan Z (2021) Clustering and resource allocation strategy for D2D multicast networks with machine learning approaches. China Commun 18(1):196–211CrossRef Jiang F, Zhang L, Sun CY, Yuan Z (2021) Clustering and resource allocation strategy for D2D multicast networks with machine learning approaches. China Commun 18(1):196–211CrossRef
13.
go back to reference Xu YJ, Gu BW, Li D, Yang ZH, Huang CW, Wong KK (2022) Resource allocation for secure SWIPT-enabled D2D communications with alpha fairness. IEEE Trans Veh Technol 71(1):1101–1106CrossRef Xu YJ, Gu BW, Li D, Yang ZH, Huang CW, Wong KK (2022) Resource allocation for secure SWIPT-enabled D2D communications with alpha fairness. IEEE Trans Veh Technol 71(1):1101–1106CrossRef
14.
go back to reference Pawar P, Trivedi A (2022) Joint uplink-downlink resource allocation for D2D underlaying cellular network. IEEE Trans Commun 69(12):8352–8362CrossRef Pawar P, Trivedi A (2022) Joint uplink-downlink resource allocation for D2D underlaying cellular network. IEEE Trans Commun 69(12):8352–8362CrossRef
15.
go back to reference Sultana A, Woungang I, Anpalagan A, Zhao L, Ferdouse L (2020) Efficient resource allocation in SCMA-enabled device-to-device communication for 5G networks. IEEE Trans Veh Technol 69(5):5343–5354CrossRef Sultana A, Woungang I, Anpalagan A, Zhao L, Ferdouse L (2020) Efficient resource allocation in SCMA-enabled device-to-device communication for 5G networks. IEEE Trans Veh Technol 69(5):5343–5354CrossRef
16.
go back to reference Mohamad NMV, Ambastha P, Gautam S, Jain R, Subramaniyam H, Muthukaruppan L (2020) Dynamic sectorization and parallel processing for device-to-device (D2D) resource allocation in 5G and B5G cellular network. Peer Peer Netw Appl 14(1):296–304CrossRef Mohamad NMV, Ambastha P, Gautam S, Jain R, Subramaniyam H, Muthukaruppan L (2020) Dynamic sectorization and parallel processing for device-to-device (D2D) resource allocation in 5G and B5G cellular network. Peer Peer Netw Appl 14(1):296–304CrossRef
17.
go back to reference Pandey K, Arya R (2021) Lyapunov optimization machine learning resource allocation approach for uplink underlaid D2D communication in 5G networks. IET Commun 16(5):476–484CrossRef Pandey K, Arya R (2021) Lyapunov optimization machine learning resource allocation approach for uplink underlaid D2D communication in 5G networks. IET Commun 16(5):476–484CrossRef
18.
go back to reference Mishra PK, Kumar A, Pandey S, Singh VP (2018) Hybrid resource allocation scheme in multi-hop device-to-device communication for 5G networks. Wirel Pers Commun 103(3):2553–2573CrossRef Mishra PK, Kumar A, Pandey S, Singh VP (2018) Hybrid resource allocation scheme in multi-hop device-to-device communication for 5G networks. Wirel Pers Commun 103(3):2553–2573CrossRef
19.
go back to reference Amin A, Liu XH, Khan I, Uthansakul P, Forsat M, Mirjavadi SS (2020) A robust resource allocation scheme for device-to-device communications based on Q-learing. CMC Comput Mater Contin 65(2):1487–1505 Amin A, Liu XH, Khan I, Uthansakul P, Forsat M, Mirjavadi SS (2020) A robust resource allocation scheme for device-to-device communications based on Q-learing. CMC Comput Mater Contin 65(2):1487–1505
20.
go back to reference Sun YJ, Wu WT, Zuo XJ, Liu ZJ (2019) A tradeoff between throughput and energy efficiency for D2D underlaying communication systems. Telecommun Syst 72(4):633–639CrossRef Sun YJ, Wu WT, Zuo XJ, Liu ZJ (2019) A tradeoff between throughput and energy efficiency for D2D underlaying communication systems. Telecommun Syst 72(4):633–639CrossRef
21.
go back to reference Gu WY, Zhu Q (2019) Stackelberg game based social-aware resource allocation for NOMA enhanced D2D communications. Electronics 8(11):1360CrossRef Gu WY, Zhu Q (2019) Stackelberg game based social-aware resource allocation for NOMA enhanced D2D communications. Electronics 8(11):1360CrossRef
22.
go back to reference Kuang ZF, Li GQ, Zhang LB, Zhou HB, Li CY, Liu AF (2020) Energy efficient mode selection, base station selection and resource allocation algorithm in D2D heterogeneous networks. Peer Peer Netw Appl 13(5):1814–1829CrossRef Kuang ZF, Li GQ, Zhang LB, Zhou HB, Li CY, Liu AF (2020) Energy efficient mode selection, base station selection and resource allocation algorithm in D2D heterogeneous networks. Peer Peer Netw Appl 13(5):1814–1829CrossRef
23.
go back to reference Li XW, Liu WK (2017) Particle swarm optimization based energy efficiency maximizing strategy in device-to-device(D2D) communications. Telecommun Eng 57(10):1171–1176 Li XW, Liu WK (2017) Particle swarm optimization based energy efficiency maximizing strategy in device-to-device(D2D) communications. Telecommun Eng 57(10):1171–1176
24.
go back to reference Tang RL, An Q, Xu F, Zhang XD, Li X, Lai JG, Dong ZC (2020) Optimal operation of hybrid energy system for intelligent ship: an ultrahigh-dimensional model and control method. Energy 211:119077CrossRef Tang RL, An Q, Xu F, Zhang XD, Li X, Lai JG, Dong ZC (2020) Optimal operation of hybrid energy system for intelligent ship: an ultrahigh-dimensional model and control method. Energy 211:119077CrossRef
25.
go back to reference An Q, Chen XJ, Zhang JQ, Shi RZ, Yang YJ, Huang W (2022) A robust fire detection model via convolution neural net-works for intelligent robot vision sensing. Sensors 22(8):2929ADSCrossRefPubMedPubMedCentral An Q, Chen XJ, Zhang JQ, Shi RZ, Yang YJ, Huang W (2022) A robust fire detection model via convolution neural net-works for intelligent robot vision sensing. Sensors 22(8):2929ADSCrossRefPubMedPubMedCentral
26.
go back to reference Tang RL, Li X, Lai JG (2018) A novel optimal energy-management strategy for a maritime hybrid energy system based on large-scale global optimization. Appl Energy 228:254–264ADSCrossRef Tang RL, Li X, Lai JG (2018) A novel optimal energy-management strategy for a maritime hybrid energy system based on large-scale global optimization. Appl Energy 228:254–264ADSCrossRef
27.
go back to reference An Q, Chen X, Wang H, Yang H, Yang Y (2022) Segmentation of concrete cracks by using fractal dimension and UHK-net. Fractal Fract 6(2):95CrossRef An Q, Chen X, Wang H, Yang H, Yang Y (2022) Segmentation of concrete cracks by using fractal dimension and UHK-net. Fractal Fract 6(2):95CrossRef
28.
go back to reference Tang RL, Wu Z, Li X (2018) Optimal operation of photovoltaic/battery/diesel/cold-ironing hybrid energy system for maritime application. Energy 162:697–714CrossRef Tang RL, Wu Z, Li X (2018) Optimal operation of photovoltaic/battery/diesel/cold-ironing hybrid energy system for maritime application. Energy 162:697–714CrossRef
29.
go back to reference Potter M, Jong KD (1994) A cooperative coevolutionary approach to function optimization. Lect Notes Comput Sci 866(1):249–257CrossRef Potter M, Jong KD (1994) A cooperative coevolutionary approach to function optimization. Lect Notes Comput Sci 866(1):249–257CrossRef
30.
go back to reference Kennedy J, Eberhart R (1995) Particle swarm optimization (pso). Proceedings of IEEE international conference on neural networks, Perth, Australia, pp 1942–1948 Kennedy J, Eberhart R (1995) Particle swarm optimization (pso). Proceedings of IEEE international conference on neural networks, Perth, Australia, pp 1942–1948
31.
go back to reference Gad AG (2022) Particle swarm optimization algorithm and its applications: a systematic review. Arch Comput Methods Eng 29(5):2531–2561MathSciNetCrossRef Gad AG (2022) Particle swarm optimization algorithm and its applications: a systematic review. Arch Comput Methods Eng 29(5):2531–2561MathSciNetCrossRef
32.
go back to reference Engelbrecht AP (2015) Particle swarm optimization with crossover: a review and empirical analysis. Artif Intell Rev 45(2):131–165CrossRef Engelbrecht AP (2015) Particle swarm optimization with crossover: a review and empirical analysis. Artif Intell Rev 45(2):131–165CrossRef
33.
go back to reference Bonyadi MR, Michalewicz Z (2017) Particle swarm optimization for single objective continuous space problems: a review. Evol Comput 25(1):1–54CrossRefPubMed Bonyadi MR, Michalewicz Z (2017) Particle swarm optimization for single objective continuous space problems: a review. Evol Comput 25(1):1–54CrossRefPubMed
34.
go back to reference Tang RL, Wu Z, Fang YJ (2017) Adaptive multi-context cooperatively coevolving particle swarm optimization for large-scale problems. Soft Comput 21(16):4735–4754CrossRef Tang RL, Wu Z, Fang YJ (2017) Adaptive multi-context cooperatively coevolving particle swarm optimization for large-scale problems. Soft Comput 21(16):4735–4754CrossRef
35.
go back to reference Xu BB, Chen C, Tang JR, Tang RL (2022) A novel coevolving differential evolution and its application in intelligent device-to-device communication systems. J Intell Fuzzy Syst 42(3):1607–1621CrossRef Xu BB, Chen C, Tang JR, Tang RL (2022) A novel coevolving differential evolution and its application in intelligent device-to-device communication systems. J Intell Fuzzy Syst 42(3):1607–1621CrossRef
36.
go back to reference Tang RL, Li X (2018) Adaptive multi-context cooperatively coevolving in differential evolution. Appl Intell 48(9):2719–2729CrossRef Tang RL, Li X (2018) Adaptive multi-context cooperatively coevolving in differential evolution. Appl Intell 48(9):2719–2729CrossRef
37.
go back to reference Li XD, Yao X (2012) Cooperatively coevolving particle swarms for large-scale optimization. IEEE Trans Evol Comput 16(2):210–224MathSciNetCrossRef Li XD, Yao X (2012) Cooperatively coevolving particle swarms for large-scale optimization. IEEE Trans Evol Comput 16(2):210–224MathSciNetCrossRef
38.
go back to reference Liang MX, Liu JD, Tang JR, Tang RL (2021) Ultrahigh-dimensional model and optimization algorithm for resource allocation in large-scale intelligent D2D communication system. Complexity 2021:7321719CrossRef Liang MX, Liu JD, Tang JR, Tang RL (2021) Ultrahigh-dimensional model and optimization algorithm for resource allocation in large-scale intelligent D2D communication system. Complexity 2021:7321719CrossRef
39.
go back to reference Wang J, Xie YF, Xie SW, Chen XF (2022) Cooperative particle swarm optimizer with depth first search strategy for global optimization of multimodal functions. Appl Intell 52(9):10161–10180CrossRef Wang J, Xie YF, Xie SW, Chen XF (2022) Cooperative particle swarm optimizer with depth first search strategy for global optimization of multimodal functions. Appl Intell 52(9):10161–10180CrossRef
Metadata
Title
Multi-modal mutation cooperatively coevolving algorithm for resource allocation of large-scale D2D communication system
Authors
Qing An
Shisong Wu
Jun Yu
Cuifen Gao
Publication date
17-08-2023
Publisher
Springer International Publishing
Published in
Complex & Intelligent Systems / Issue 1/2024
Print ISSN: 2199-4536
Electronic ISSN: 2198-6053
DOI
https://doi.org/10.1007/s40747-023-01202-4

Other articles of this Issue 1/2024

Complex & Intelligent Systems 1/2024 Go to the issue

Premium Partner