Energy Efficient Semantic Communication Over Wireless Networks With Rate Splitting
Energy Efficient Semantic Communication Over Wireless Networks With Rate Splitting
5, MAY 2023
Abstract— In this paper, the problem of wireless resource Index Terms— Rate splitting multiple access, semantic commu-
allocation and semantic information extraction for energy effi- nication, energy efficient design.
cient semantic communications over wireless networks with rate
splitting is investigated. In the considered model, a base station I. I NTRODUCTION
(BS) first extracts semantic information from its large-scale data,
and then transmits the small-sized semantic information to each
user which recovers the original data based on its local common
knowledge. At the BS side, the probability graph is used to extract
T HE rapid development of emerging applications such
as digital twin, edge learning, and metaverse requires
wireless networks to support high transmission data rate,
multi-level semantic information. In the downlink transmission,
a rate splitting scheme is adopted, while the private small-sized ultra low latency, and seamless connectivity [1], [2], [3], [4].
semantic information is transmitted through private message However, due to limited wireless resources such as fre-
and the common knowledge is transmitted through common quency and time, conventional orthogonal multiple access
message. Due to limited wireless resource, both computation schemes cannot support massive connectivity concern for next-
energy and transmission energy are considered. This joint
computation and communication problem is formulated as an generation wireless communication networks [5]. Through
optimization problem aiming to minimize the total communica- using the same time or frequency resource, multiple users
tion and computation energy consumption of the network under can be served in non-orthogonal multiple access (NOMA)
computation, latency, and transmit power constraints. To solve [6], [7], [8], [9], [10], [11], where users can be split in the
this problem, an alternating algorithm is proposed where the power or code domain. Since additional users can be served
closed-form solutions for semantic information extraction ratio
and computation frequency are obtained at each step. Numerical with superposition coding at the transmitter and successive
results verify the effectiveness of the proposed algorithm. interference cancellation (SIC) at the receiver, the spectral
efficiency of NOMA is generally higher than conventional
Manuscript received 25 July 2022; revised 20 October 2022; accepted orthogonal multiple access schemes.
1 December 2022. Date of publication 30 January 2023; date of current version In downlink NOMA transmission, the receiver side decodes
18 April 2023. This work was supported in part by the National Natural
Science Foundation of China under Grant 61725104 and Grant U20A20158 the interference for all received strong messages [11]. Thus,
and in part by the National Key Research and Development Program of the computation capacity of NOMA decoding is generally
China under Grant 2018YFB1801104 and Grant 2020YFB1807101. The work high. To balance the decoding tradeoff of intended signal
of Chongwen Huang was supported in part by the China National Key
Research and Development Program under Grant 2021YFA1000500, in part and interference signal, the concept of rate splitting multiple
by the National Natural Science Foundation of China under Grant 62101492, access (RSMA) was introduced in [12], [13], [14] and [15].
in part by the Zhejiang Provincial Natural Science Foundation of China For downlink RSMA transmission, the transmission message
under Grant LR22F010002, in part by the National Natural Science Fund for
Excellent Young Scientists Fund Program (Overseas), in part by the Zhejiang intended for each user is divided into both common and
University Education Foundation Qizhen Scholar Foundation, and in part by private parts. All users intend to receive the common part
the Fundamental Research Funds for the Central Universities under Grant of the message, i.e., common message, while only part of
2021FZZX001-21. (Corresponding author: Zhaoyang Zhang.)
Zhaohui Yang is with the Zhejiang Laboratory, Hangzhou, Zhejiang the users wish to receive and decode the specific private
311121, China, also with the College of Information Science and Electronic part of the message, i.e., private message. At the user side,
Engineering, Zhejiang University, Hangzhou, Zhejiang 310027, China, and the common message is decoded first with regarding all
also with the Zhejiang Provincial Key Laboratory of Information Processing,
Communication and Networking (IPCAN), Hangzhou, Zhejiang 310007, private messages as interference, while the intended private
China (e-mail: [email protected]). message is decoded with only considering the private messages
Mingzhe Chen is with the Department of Electrical and Computer Engineer- intended for other users as interference. Through dynamically
ing and the Institute for Data Science and Computing, University of Miami,
Coral Gables, FL 33146 USA (e-mail: [email protected]). controlling the split of private and common messages, the
Zhaoyang Zhang and Chongwen Huang are with the College of Information computation complexity of RSMA can be adjusted to achieve
Science and Electronic Engineering, Zhejiang University, Hangzhou, Zhejiang the specific spectral efficiency requirements. To implement
310027, China, and also with the Zhejiang Provincial Key Laboratory
of Information Processing, Communication and Networking (IPCAN), RSMA for wireless communication systems, there are still
Hangzhou, Zhejiang 310007, China (e-mail: [email protected]; many challenges, which include the resource allocation for
[email protected]). private and common messages, decoding order optimization,
Color versions of one or more figures in this article are available at
https://doi.org/10.1109/JSAC.2023.3240713. system design in imperfect channel and hardware mismatch
Digital Object Identifier 10.1109/JSAC.2023.3240713 cases.
0733-8716 © 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on May 14,2023 at 14:21:10 UTC from IEEE Xplore. Restrictions apply.
YANG et al.: ENERGY EFFICIENT SEMANTIC COMMUNICATION OVER WIRELESS NETWORKS WITH RATE SPLITTING 1485
There are many contributions investigating the problems to meet the multimodal quality-of-experience (QoE) require-
of RSMA in wireless communication systems. The general ments with massive data, which makes the traditional Shan-
challenges of RSMA were pointed out in [14] for multi- non capacity characterized transmission infeasible. Especially
ple input multiple output (MIMO) communication systems. in human-computer interaction scenarios, humans can con-
To maximize the sum rate of all users, a distributed rate trol multiple IoE devices simultaneously through voice and
splitting technique was proposed in [16]. For a two-receiver augmented/virtual reality commands, making communication
multiple input single output (MISO) communication system ubiquitous in small-range wireless networks, which poses
with limited rate feedback, the rate analysis was investigated severe challenges to traditional bit-oriented communication
in [17]. Compared with NOMA and space-division multi- challenge. Supporting real-time human-machine interaction
ple access (SDMA), it was shown in [18] that RSMA can and machine-to-machine interaction through the use of text,
achieve the best performance in terms of spectral and energy speech, images, and augmented/virtual reality is important
efficiency [19]. In particular, the energy efficiency optimiza- for future wireless communications. In order to support this
tion for RSMA and NOMA transmissions in a unmanned interaction, the important information finally received depends
aerial vehicle assisted wireless communication system was mainly on the intent, rather than the bit information depen-
investigated in [20]. Considering wireless energy transfer and dence of common sense. These applications use advanced
information transmission, the linear precoding method for signal processing to facilitate the development of task-oriented
RSMA was investigated in [21]. For the case with imperfect semantic communication [3], [46], [47]. In semantic commu-
channel state information, the sum rate maximization with nication, both transmitter and receiver share common knowl-
partial channel state information for RSMA was studied in edge, which can be used to extract small-size information
[22], while a downlink MISO RSMA system with bounded at the transmitter and recover the original information at
channel errors was investigated in [23]. the receiver [48]. Similarly, in downlink RSMA, all users
The interplay between rate splitting with emerging tech- also need to receive both common information and pri-
nologies has been investigated. With the help of reconfigurable vate information. Due to the inherent similarity of common
intelligent surface, the energy efficient resource allocation for knowledge and common message, RSMA can be utilized
reconfigurable intelligent surface assisted RSMA was investi- to enhance the system performance of downlink semantic
gated in [24], where the phase shift, rate allocation, and trasn- communication. To our best knowledge, there is no prior works
mit beamforming were jointly scheduled. The learning based that consider the integration of semantic communication and
traffic prediction method was studied in [25] for unmanned RSMA.
aerial vehicle enabled wireless communication system with The main contributions of this paper include:
rate splitting. The neural network was proposed in [26] to • The problem of wireless resource allocation and semantic
solve the user clustering problem in hierarchical rate splitting information extraction for energy efficient semantic com-
communication systems. Due to coupled rate and power allo- munications over wireless networks with rate splitting is
cation relationship, the resource allocation of RSMA usually investigated. In the considered model, the BS first extracts
leads to the nonconvex problem, which can be solved by the semantic information from its large-scale data, and
utilizing the learning techniques such as deep reinforcement then transmits the small-sized semantic information to
learning. Several deep learning algorithms were designed each user which recovers the original data based on the
to solve various complex resource allocation problems for local common knowledge.
RSMA, which include total power minimization problem [27], • In the downlink transmission, the rate splitting scheme is
joint power control, beamforming design, and splitting opti- adopted, while the private small-sized semantic informa-
mization problem [28], [29], power allocation problem with tion is transmitted through private message and the com-
limited channel state information knowledge [30], [31], joint mon knowledge is transmitted through common message.
transmit power, user clustering, and resource block allocation Due to limited wireless resource, both computational
problem [32], joint passive precoding at the reconfigurable energy and transmission energy must be considered.
intelligent surface and active precoding at the transmitter [33]. This joint computation and communication problem is
In the federated learning frameworks [34], the authors in [35] formulated as an optimization problem whose goal is to
utilized RSMA for uplink model transmission to minimize the minimize the total energy consumption of the network
total delay of the whole system. A model-based deep learning under a latency constraint.
algorithm was developed to solve the receiver design problem • To solve this problem, an iterative algorithm is proposed
of RSMA in [36]. where, at every step, closed-form solutions for semantic
Recently, semantic communication has attracted a lot of information extraction ratio and computation frequency
attention [37], [38], [39], [40], [41], [42], [43], [44], [45]. For are derived. Numerical results show the effectiveness of
the wireless communication system characterized by Shannon the proposed algorithm.
capacity, the receiver side needs to recover the information that The rest of this paper is organized as follows. The system
is exactly the same as the transmitted information. However, model and problem formulation are described in Section II.
in the emerging wireless applications such as virtual reality, The algorithm design is presented in Section III. Simulation
personalized healthcare, autonomous driving, and the Internet- results are analyzed in Section IV. Conclusions are drawn in
of-Everything (IoE), the wireless communication systems aim Section V.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on May 14,2023 at 14:21:10 UTC from IEEE Xplore. Restrictions apply.
1486 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 41, NO. 5, MAY 2023
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on May 14,2023 at 14:21:10 UTC from IEEE Xplore. Restrictions apply.
YANG et al.: ENERGY EFFICIENT SEMANTIC COMMUNICATION OVER WIRELESS NETWORKS WITH RATE SPLITTING 1487
where hk stands for the channel between user k and the BS.
To decode the common message s0 , the rate of user k can be
Fig. 4. Illustration of the computation and communication time.
given by:
!
p0 |hHk w0 |
2
With private rate (7) and allocated common rate ak , the
ck = B log2 1 + PK H
. (4)
2
j=1 pj |hk w j | + σ
2 downlink transmission time for transmitting Sk is given by
where B is the bandwidth of the BS. Note that all users need Z(Sk )
t2k1 = , (10)
to decode the same common message. To ensure that all users rk + ak
can successfully decode the common message, the rate of the where Z(Sk ) is the data size of set Sk . To transmit the
common message can be set as [18] renewed information about the knowledge base, i.e., updated
c0 = min ck . (5) information of directional probability graph, the transmission
k∈K time of all users can be formulated as
In our considered SWC with rate splitting, the common K0
knowledge is shared by all users. Thus, the common knowl- t0 = , (11)
a0
edge required for semantic communication can be encoded
in the common message. Besides, the common message also where K0 is the size of updated information of directional
includes the parts that are allocated for different users, i.e., the probability graph. Combining (10) and (11), the downlink
rate in the common message allocated to user k is denoted by transmission time for user k is
ak . As a result, the rate constraint for the common message t2k = max{t2k1 , t0 }. (12)
can be given by
K
The transmission energy for sending Sk is
X
a0 + ak ≤ ck , ∀k ∈ K, (6) E2k = t2k1 pk , (13)
k=1
where a0 is the rate allocated to updated common knowledge and the transmission energy for broadcasting updated infor-
that all users need to receive. In SWC, a0 represents the rate of mation of directional probability graph is
transmitting the information of updated directional probability E20 = t0 p0 . (14)
graph.
For each user, the common message is decoded first, and At user k, to recover the original data, the user needs to
then the common message can be subtracted for decoding the compute the semantic information Sk . The computation time
private message. As a result, the rate for decoding the private of user k
message for user k can be calculated as y2k (Dk , Sk )
t3k = , (15)
gk
pk |hH
k wk |
2
rk = B log2 1 + K P
p |hH w |2 +σ 2
. (7)
j=1,j̸=k j k j where y2k (Dk , Sk ) is the number of computation cycles of
recovering Dk from Sk and gk is the computation capac-
C. Transmission and Computation Model ity at user k. The total complete time for user k includes
For each user k, the computation time for extracting seman- computation time at the BS, downlink transmission time, and
tic information from data Dk is computation time at user k, as shown in Fig. 4. The overall
complete time of user k including both computation and
y1k (Dk , Sk )
t1k = , (8) computation is
fk
where y1k (Dk , Sk ) is the required amount of CPU cycles for tk = t1k + t2k + t3k
calculating Sk out of Dk , and fk is the computing capacity of y1k (Dk , Sk ) Z(Sk ) K0 y2k (Dk , Sk )
= + max , + .
user k. The local computation energy can be given by: fk rk + ak a0 gk
(16)
E1k = κy1k (Dk , Sk )fk2 , (9)
The energy consumption at user k is
where κ is a constant coefficient to measure the effective
switched capacitance. E3k = κy2k (Dk , Sk )gk2 . (17)
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on May 14,2023 at 14:21:10 UTC from IEEE Xplore. Restrictions apply.
1488 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 41, NO. 5, MAY 2023
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on May 14,2023 at 14:21:10 UTC from IEEE Xplore. Restrictions apply.
YANG et al.: ENERGY EFFICIENT SEMANTIC COMMUNICATION OVER WIRELESS NETWORKS WITH RATE SPLITTING 1489
selecting the information with extraction rate ρk out from the Ck4 (ρ∗k2 (λ1k2 )|1Γk )−Ck5
+ = T, (28)
directional probability graph. Since ρk = 0 or ρk = 1, the gk
selection scheme is straightforward, which leads to the lowest with a|cb = min{max{a, b}, c}.
computation cycles. Hence, the computation of the second Proof: Denoting λ11 , · · · , λ1K > 0 as the Lagrange
part first increases and then decreases with the extraction rate multiplier variables associated with constraint (25a), we obtain
ρk . As an example, computation function y1k (Dk , ρk ) can be the Lagrange function of problem (25) as
expressed as
K
y1k (Dk , ρk ) = y3k (Dk ) + Ck1 (ρk − Ck2 )Ck3 ,
X
(23) L1 (ρ, λ1 ) = κfk2 (y3k (Dk ) + Ck1 (ρk − Ck2 )Ck3 )
where Ck1 > 0, Ck2 ∈ (0, 1), and Ck3 > 0 are constant k=1
parameters and theses parameters can be obtained through sim- Z(G(Dk ))pk ρk K p
0 0
+ + κCk4 ρ−C
k
k5 2
gk +
ulations. For computation function y2k (Dk , ρk ), the number rk + ak a0
of computation cycles decreases with ρk since more semantic K y (D ) + C (ρ − C )Ck3
3k k k1 k k2
X
information can be helpful in recovering the original infor- + λ1k
fk
mation. As an example, the computation function y2k (Dk , ρk ) k=1
can be expressed as Z(G(Dk ))ρk K0
+ max ,
rk + ak a0
y2k (Dk , ρk ) = Ck4 ρ−C
k
k5
, (24) −Ck5
Ck4 ρk
where Ck4 > 0 and Ck5 > 0 are constant parameters through + −T , (29)
gk
simulations.
With the above variable substitution (21) and expressions where λ1 = [λ11 , · · · , λ1K ]T . The first derivative of (29)
(22)-(24), problem (20) can be reformulated as: becomes
K ∂L1 (ρ, λ1 )
X = κfk2 Ck1 Ck3 (ρk − Ck2 )Ck3 −1
min κfk2 (y3k (Dk ) + Ck1 (ρk − Ck2 )Ck3 ) ∂ρk
ρ
k=1 Z(G(Dk ))pk
Z(G(Dk ))pk ρk + − κCk4 Ck5 ρ−C
k
k5 −1 2
gk
+ + κCk4 ρ−C k5 2
gk rk + ak
k
rk + ak C C (ρ − C )Ck3−1
k1 k3 k k2 Z(G(Dk ))
K0 p0 +λ1k +
+ (25) fk rk + ak
a0 −Ck5 −1
Ck4 Ck5 ρk
y3k (Dk ) + Ck1 (ρk − Ck2 )Ck3 − (30)
s.t. gk
fk
Z(G(Dk ))ρk K0
Ck4 ρ−Ck5 for
k
+ max , + ≤ T, K0 (ak + rk )
rk + ak a0 gk ρk ≥ , (31)
∀k ∈ K, (25a) a0 Z(G(Dk ))
Γk ≤ ρk ≤ 1, ∀k ∈ K, (25b) and
where ρ = [ρ1 , · · · , ρK ]T . Since both objective function and ∂L1 (ρ, λ1 )
feasible set are convex, problem (25) is a convex problem. ∂ρk
Thus, we can apply the dual method to obtain the Karush- = κfk2 Ck1 Ck3 (ρk − Ck2 )Ck3 −1
Kuhn-Tucker (KKT) point. To calculate the solution of prob- Z(G(Dk ))pk
lem (25), we can obtain the following theorem. + − κCk4 Ck5 ρ−C
k
k5 −1 2
gk
rk + ak
Theorem 1: The optimal solution of problem (25) is C C (ρ − C )Ck3−1 Ck4 Ck5 ρ−Ck5 −1
k1 k3 k k2 k
K0 (ak + rk ) +λ1k −
ρ∗k1 (λ1k1 ) if ρ∗k1 (λ11 ) ≥
fk gk
∗ a0 Z(G(Dk )) (32)
ρk = K , (26)
∗ ∗ 0 (ak + rk )
ρk2 (λ1k2 ) if ρk2 (λ12 ) <
for
a0 Z(G(Dk ))
where ρ∗k1 (λ1k ) and ρ∗k2 (λ1k ) are respectively the solutions to K0 (ak + rk )
ρk < , (33)
∂L1 (ρ,λ1k ) a0 Z(G(Dk ))
∂ρk = 0 in (30) and (32), λ1k1 and λ1k2 respectively
satisfy Denote the solution of ∂L1∂ρ (ρ,λ1 )
k
= 0 to equations (30) and
y3k (Dk ) + Ck1 (ρ∗k1 (λ1k1 )|1Γk − Ck2 )Ck3 Z(G(Dk )) (32) by ρ∗k1 (λ1 ) and ρ∗k2 (λ1k ), respectively. Note that the left
+ hand sides of (30) and (32) are monotonically increasing with
fk rk + ak
respect to ρk , solutions ρ∗k1 (λ1k ) and ρ∗k2 (λ1k ) can be obtained
Ck4 (ρ∗k1 (λ1k1 )|1Γk )−Ck5 via the bisection method. Considering constraints (25b), (31),
+ = T, (27)
gk and (33), the Lagrange multiplier should meet the KKT con-
y3k (Dk ) + Ck1 (ρ∗k2 (λ1k2 )|1Γk − Ck2 )Ck3 K0 dition, i.e., the optimal solution of problem can be presented
+ in (26).
fk a0
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on May 14,2023 at 14:21:10 UTC from IEEE Xplore. Restrictions apply.
1490 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 41, NO. 5, MAY 2023
B. Optimal Computation Capacity the gradient method. In the t-th iteration, the value of λ2k and
With given semantic information extraction, power control, λ3 are updated by
"
rate allocation, and beamforming design, problem (19) can be y (D , S )
1k k k
simplified as λ2k (t) = λ2k (t − 1) − υ(t)
fk
K +
#
X Z(Sk )pk Z(Sk ) K0 y2k (Dk , Sk )
min κy1k (Dk , Sk )fk2 + + κy2k (Dk , Sk )gk2 + max , + −T ,
f ,g rk + ak rk + ak a0 gk
k=1
K0 p0 (40)
+ (34)
a0 and
y1k (Dk , Sk ) Z(Sk ) K0 " K
!#+
s.t. + max ,
fk rk + ak a0
X
max
λ3 (t) = λ3 (t − 1) − υ(t) fk −F , (41)
y2k (Dk , Sk ) k=1
+ ≤ T, ∀k ∈ K, (34a)
gk where [a]+ = max a, 0 and υ(t) > 0 is the dynamic step size.
K
X Through iteratively updating (fk , gk ) and (λ2k , λ3 ), the overall
fk ≤ F max (34b) procedure yields the global optimal solution of problem (34).
k=1
fk ≥ 0, ∀k, (34c) C. Joint Power Control, Rate Allocation, and Beamforming
Design
0 ≤ gk ≤ gkmax , ∀k ∈ K. (34d)
With given semantic information extraction and computa-
The Language function of problem (34) can be given by tion capacity, problem (19) can be simplified as
K
L2 (f , g, λ2 , λ3 )
X Z(Sk )pk
min κy1k (Dk , Sk )fk2 + + κy2k (Dk , Sk )gk2
K p,a,w rk + ak
X Z(Sk )pk k=1
= κy1k (Dk , Sk )fk2 + K0 p 0
rk + ak + , (42)
k=1 a0
K p
0 0
+κy2k (Dk , Sk )gk2 + y1k (Dk , Sk ) Z(Sk ) K0
a0 s.t. + max ,
fk rk + ak a0
K y (D , S )
X 1k k k Z(Sk ) K0 y2k (Dk , Sk )
+ λ2k + max , + ≤ T, ∀k ∈ K, (42a)
fk rk + ak a0 gk
k=1
K
! K
y2k (Dk , Sk ) X
ak ≤ ck , ∀k ∈ K,
X
+ − T + λ3 fk −F max , (35) a0 + (42b)
gk k=1
k=1
K
X
T
where λ2 = [λ21 , · · · , λ2K ] is the Language multiplier p0 ≤ P max (42c)
associated with constraint (34a) and λ3 > 0 is the Language k=0
multiplier associated with constraint (34b). The first derivative a0 , ak , pk ≥ 0, ∀k, (42d)
of (35) becomes ∥wk ∥ = 1, ∀k ∈ K ∪ {0}, (42e)
∂L2 (f , g, λ2 , λ3 ) Problem (42) is nonconvex owing to the nonconvex objec-
∂fk tive function and constraints (42a), (42b) and (42e). To handle
λ2k y1k (Dk , Sk ) the nonconvexity of the objective function, we introduce new
= 2κy1k (Dk , Sk )gk − + λ3 (36) variable rk and use variable p2k to replace power pk . Thus,
gk2
∂L2 (f , g, λ2 , λ3 ) problem (42) can be equivalently transformed to
K
∂gk Z(Sk )p2k
X
λ2k y2k (Dk , Sk ) min κy1k (Dk , Sk )fk2 + + κy2k (Dk , Sk )gk2
= 2κy2k (Dk , Sk )fk − (37) p,a,r,w rk + ak
k=1
fk2
K0 p20
∂L2 (f ,g,λ2 ,λ3 ) ∂L2 (f ,g,λ2 ,λ3 )
+ , (43)
Setting = 0 and = 0 yields a0
∂fk ∂gk
y1k (Dk , Sk ) Z(Sk ) K0
s.t. + max ,
2κy1k (Dk , Sk )fk3 + λ3 fk2 − λ2k y1k (Dk , Sk ) = 0, (38) fk rk + ak a0
1 y2k (Dk , Sk )
λ2k y2k (Dk , Sk ) 3 + ≤ T, ∀k ∈ K, (43a)
gk = . (39) gk
2κy2k (Dk , Sk ) !
K
X p20 |hH
k w0 |
2
The value of fk can be obtained via solving the cubic function a0 + ak ≤ B log2 1+ PK ,
2 H 2 2
in (38). Having obtained the value of computation capacity fk k=1 j=1 pj |hk w j | + σ
and gk , the value of Language multiplier can be updated via ∀k ∈ K, (43b)
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on May 14,2023 at 14:21:10 UTC from IEEE Xplore. Restrictions apply.
YANG et al.: ENERGY EFFICIENT SEMANTIC COMMUNICATION OVER WIRELESS NETWORKS WITH RATE SPLITTING 1491
!
p2k |hH
k wk |
2
constraint (47) can be approximated by
rk ≤ B log2 1 + PK ,
2 H 2 σ2
j=1,j̸=k pj |hk w j | +
R(hH
kqwk )
∀k ∈ K, (43c) (n) (n)
q
(n)
γk αk γk
a0 , ak , pk ≥ 0, ∀k, (43d) ≥ +
(n)
(αk − αk )
(n)
q
∥wk ∥ ≤ 1, ∀k ∈ K ∪ {0}, (43e) pk (n)
2pk αk
(n)
q q
(n) (n) (n)
where r = [r0 , r1 , · · · , rK ]T , the objective function is convex, αk (n)
γk α k (n)
and constraint (43e) is replaced by the inequality without + q (γk − γk ) − (n) 2
(pk − pk ),
(n) (n) (pk )
loss of generality. In problem (43), we only need to deal 2pk γk
with the nonconvexity of constraints (43b) and (43c). Through (48)
introducing slacking variables γk and ηk , problem (43) can be
reformulated as: where the superscript (n) means the value of the variable
in the n-th iteration. Moreover, (46) can be reformulated
K
X Z(Sk )p2k as
min κy1k (Dk , Sk )fk2 +
p,a,r,w,γ,η rk + ak K
k=1 X 1 2
K p2 ((p + |hH 2 2 2 H 2 2
k w j | ) − (pj − |hk w j | ) )
0 0 4 j
+ κy2k (Dk , Sk )gk2 + , (44) j=1,j̸=k
a0 K
y1k (Dk , Sk ) Z(Sk ) K0
X
s.t. + max , = p2j |hH 2 2
k w j | + σ ≤ αk . (49)
fk rk + ak a0 j=1,j̸=k
y2k (Dk , Sk )
+ ≤ T, ∀k ∈ K, (44a) Through replacing the left hand side of (49) with its first-order
gk
Taylor approximation, we can obtain
XK
K
a0 + ak ≤ B log2 (1 + ηk ) , ∀k ∈ K,
X 1 (n) (n) 2 2 (n) 2
k=1 ((pj )2 + |hHk w j | ) + 4((pj )
4
(44b) j=1,j̸=k
(n) (n) (n)
rk ≤ B log2 (1 + γk ) , ∀k ∈ K, (44c) +|hH 2 2 H 2 2
k w j | )pj (pj − pj ) − (pj − |hk w j | )
a0 , ak , pk ≥ 0, ∀k, (44d) (n) (n) 2 H (n) H H (n) 2
+4((pj )2 +|hH
k w j | )(R(hk w j hk w j )−|hk w j | )
∥wk ∥ ≤ 1, ∀k ∈ K ∪ {0}, (44e)
p2k |hH 2 +σ 2 ≤ αk . (50)
k wk |
PK ≥ γk , ∀k ∈ K,
2 H 2 + σ2
j=1,j̸=k pj |hk w j | Similarly, we can introduce slack variable βk and constraint
(44f) (44g) can be rewritten as:
p20 |hH
k w0 |
2 1 2
≥ ηk , ∀k ∈ K, (44g) ((p + |hH 2 2 2 H 2 2
k w 0 | ) − (p0 − |hk w 0 | ) )
PK 2 H 2 σ2 4 0
j=1 pj |hk w j | +
1
= p20 |hH 2 2 2
k w 0 | ≥ βk ηk = ((βk + ηk ) − (βk − ηk ) ),
where γ = [γ1 , · · · , γK ]T and η = [η1 , · · · , ηK ]T . 4
In problem (44), the objective function is transformed into (51)
K
convex. Because of nonconex constraints (44f) and (44g), X
p2j |hH 2 2
k w j | + σ ≤ βk . (52)
problem (44) is nonconvex. In the following, we uti-
j=1
lize the SCA method to handle these two nonconvex
constraints. Note that we cannot make hH k w 0 as real values for all k
For constraint (44f), it can be equivalent to through changing the phase of w0 . To handle the nonconvexity
of (52), we use first-order Taylor approximation on both
p2k |hH 2
k w k | ≥ γk αk , (45) sides of (52), which is different from the method in [51].
K
X Considering the first-order Taylor approximation on both sides,
p2j |hH 2 2
k w j | + σ ≤ αk , (46)
(52) can be transformed to
j=1,j̸=k
(n) (n) (n)
where αk is a nonnegative slack variable. In (45), we can ((p0 )2 + |hH 2 2
k w 0 | ) + 4((p0 )
2
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on May 14,2023 at 14:21:10 UTC from IEEE Xplore. Restrictions apply.
1492 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 41, NO. 5, MAY 2023
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on May 14,2023 at 14:21:10 UTC from IEEE Xplore. Restrictions apply.
YANG et al.: ENERGY EFFICIENT SEMANTIC COMMUNICATION OVER WIRELESS NETWORKS WITH RATE SPLITTING 1493
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on May 14,2023 at 14:21:10 UTC from IEEE Xplore. Restrictions apply.
1494 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 41, NO. 5, MAY 2023
semantic information is transmitted through private message [18] Y. Mao, B. Clerckx, and V. O. K. Li, “Rate-splitting multiple access for
and the common knowledge is transmitted through common downlink communication systems: Bridging, generalizing, and outper-
forming SDMA and NOMA,” EURASIP J. Wireless Commun. Network.,
message. Due to limited wireless resource, both computational vol. 2018, no. 1, pp. 1–54, May 2018.
energy and transmission energy need to be considered. This [19] X. Li et al., “Rate-splitting multiple access-enabled security analysis
joint computation and communication problem is considered in cognitive satellite terrestrial networks,” IEEE Trans. Veh. Technol.,
vol. 71, no. 11, pp. 11756–11771, Nov. 2022.
as an optimization problem whose goal is to minimize the
[20] A. Rahmati, Y. Yapıcı, N. Rupasinghe, I. Guvenc, H. Dai, and
total energy consumption of the network under both task A. Bhuyany, “Energy efficiency of RSMA and NOMA in cellular-
completion and semantic accuracy constraints. An iterative connected mmWave UAV networks,” 2019, arXiv:1902.04721.
algorithm is presented to solve this problem, where at each [21] Y. Mao, B. Clerckx, and V. O. K. Li, “Rate-splitting for multi-
user multi-antenna wireless information and power transfer,” 2019,
step, the optimal solutions for semantic information extraction arXiv:1902.07851.
ratio and computation frequency are derived. Numerical results [22] H. Joudeh and B. Clerckx, “Sum-rate maximization for linearly precoded
show the effectiveness of the proposed algorithm. downlink multiuser MISO systems with partial CSIT: A rate-splitting
approach,” IEEE Trans. Commun., vol. 64, no. 11, pp. 4847–4861,
Nov. 2016.
R EFERENCES [23] H. Joudeh and B. Clerckx, “Robust transmission in downlink multiuser
MISO systems: A rate-splitting approach,” IEEE Trans. Signal Process.,
[1] Y. Mao, O. Dizdar, B. Clerckx, R. Schober, P. Popovski, and vol. 64, no. 23, pp. 6227–6242, Dec. 2016.
H. V. Poor, “Rate-splitting multiple access: Fundamentals, survey, and [24] Z. Yang, J. Shi, Z. Li, M. Chen, W. Xu, and M. Shikh-Bahaei, “Energy
future research trends,” IEEE Commun. Surveys Tuts., vol. 24, no. 4, efficient rate splitting multiple access (RSMA) with reconfigurable
pp. 2073–2126, 4th Quart., 2022. intelligent surface,” in Proc. IEEE Int. Conf. Commun. Workshops (ICC
[2] B. Clerckx et al., “A primer on rate-splitting multiple access: Tutorial, Workshops), Jun. 2020, pp. 1–6.
myths, and frequently asked questions,” 2022, arXiv:2209.00491. [25] L. Lu, Y. Hu, Y. Zhang, G. Jia, J. Nie, and M. Shikh-Bahaei, “Machine
[3] W. Xu, Z. Yang, D. W. K. Ng, M. Levorato, Y. C. Eldar, and M. Debbah, learning for predictive deployment of UAVs with rate splitting multiple
“Edge learning for B5G networks with distributed signal processing: access,” in Proc. IEEE Globecom Workshops (GC Wkshps), Dec. 2020,
Semantic communication, edge computing, and wireless sensing,” 2022, pp. 1–6.
arXiv:2206.00422. [26] R. Pereira et al., “User clustering for rate splitting using machine
[4] M. Chen et al., “Distributed learning in wireless networks: Recent learning,” 2022, arXiv:2205.11373.
progress and future challenges,” IEEE J. Sel. Areas Commun., vol. 39, [27] M. R. Camana, C. E. Garcia, and I. Koo, “Deep learning-assisted power
no. 12, pp. 3579–3605, Dec. 2021. minimization in underlay MISO-SWIPT systems based on rate-splitting
[5] W. Saad, M. Bennis, and M. Chen, “A vision of 6G wireless systems: multiple access,” IEEE Access, vol. 10, pp. 62137–62156, 2022.
Applications, trends, technologies, and open research problems,” IEEE [28] J. Liu, C.-H.-R. Lin, Y.-C. Hu, and P. K. Donta, “Joint beamforming,
Netw., vol. 34, no. 3, pp. 134–142, May 2019. power allocation, and splitting control for SWIPT-enabled IoT networks
[6] Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan, and L. Hanzo, with deep reinforcement learning and game theory,” Sensors, vol. 22,
“Nonorthogonal multiple access for 5G and beyond,” Proc. IEEE, no. 6, p. 2328, Mar. 2022.
vol. 105, no. 12, pp. 2347–2381, Dec. 2017. [29] Z. Yang, M. Chen, W. Saad, W. Xu, and M. Shikh-Bahaei, “Sum-rate
[7] M. Vaezi, Z. Ding, and H. V. Poor, Multiple Access Techniques maximization of uplink rate splitting multiple access (RSMA) commu-
for 5G Wireless Networks and Beyond. Cham, Switzerland: Springer, nication,” IEEE Trans. Mobile Comput., vol. 21, no. 7, pp. 2596–2609,
2018. Jul. 2020.
[8] L. Dai, B. Wang, Y. Yuan, S. Han, and Z. Wang, “Non-orthogonal [30] N. Q. Hieu, D. T. Hoang, D. Niyato, and D. I. Kim, “Optimal power
multiple access for 5G: Solutions, challenges, opportunities, and future allocation for rate splitting communications with deep reinforcement
research trends,” IEEE Commun. Mag., vol. 53, no. 9, pp. 74–81, learning,” IEEE Wireless Commun. Lett., vol. 10, no. 12, pp. 2820–2823,
Sep. 2015. Dec. 2021.
[9] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan, and [31] J. Huang, Y. Yang, L. Yin, D. He, and Q. Yan, “Deep reinforcement
V. Bhargava, “A survey on non-orthogonal multiple access for 5G learning-based power allocation for rate-splitting multiple access in 6G
networks: Research challenges and future trends,” IEEE J. Sel. Areas LEO satellite communication system,” IEEE Wireless Commun. Lett.,
Commun., vol. 35, no. 10, pp. 2181–2195, Oct. 2017. vol. 11, no. 10, pp. 2185–2189, Oct. 2022.
[10] K. Wang, Y. Liu, A. Nallanathan, and Z. Ding, “User association in non- [32] M. Z. Hassan, M. J. Hossain, J. Cheng, and V. C. M. Leung, “Joint
orthogonal multiple access networks,” in Proc. IEEE ICC, Kansas City, throughput-power optimization of fog-RAN using rate-splitting multiple
MO, USA, May 2018, pp. 1–6. access and reinforcement-learning based user clustering,” IEEE Trans.
[11] Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and Veh. Technol., vol. 70, no. 8, pp. 8019–8036, Aug. 2021.
K. Higuchi, “Non-orthogonal multiple access (NOMA) for cellular [33] M. Wu et al., “Deep learning-based rate-splitting multiple access
future radio access,” in Proc. 77th IEEE VTC-Spring, Dresden, Germany, for reconfigurable intelligent surface-aided tera-hertz massive MIMO,”
Jun. 2013, pp. 1–5. 2022, arXiv:2209.08456.
[12] B. Rimoldi and R. Urbanke, “A rate-splitting approach to the Gaussian [34] M. Chen, Z. Yang, W. Saad, C. Yin, H. V. Poor, and S. Cui, “A joint
multiple-access channel,” IEEE Trans. Inf. Theory, vol. 42, no. 2, learning and communications framework for federated learning over
pp. 364–375, Mar. 1996. wireless networks,” IEEE Trans. Wireless Commun., vol. 20, no. 1,
[13] T. Han and K. Kobayashi, “A new achievable rate region for the inter- pp. 269–283, Jan. 2021.
ference channel,” IEEE Trans. Inf. Theory, vol. IT-27, no. 1, pp. 49–60, [35] S.-H. Park and H. Lee, “Completion time minimization of fog-RAN-
Jan. 1981. assisted federated learning with rate-splitting transmission,” IEEE Trans.
[14] B. Clerckx, H. Joudeh, C. Hao, M. Dai, and B. Rassouli, “Rate splitting Veh. Technol., vol. 71, no. 9, pp. 10209–10214, Sep. 2022.
for MIMO wireless networks: A promising PHY-layer strategy for LTE [36] R. Cerna Loli, O. Dizdar, B. Clerckx, and C. Ling, “Model-based
evolution,” IEEE Commun. Mag., vol. 54, no. 5, pp. 98–105, May 2016. deep learning receiver design for rate-splitting multiple access,” 2022,
[15] H. Liu, T. A. Tsiftsis, K. J. Kim, K. S. Kwak, and H. V. Poor, “Rate arXiv:2205.00849.
splitting for uplink NOMA with enhanced fairness and outage perfor- [37] Z. Weng and Z. Qin, “Semantic communication systems for speech
mance,” IEEE Trans. Wireless Commun., vol. 19, no. 7, pp. 4657–4670, transmission,” IEEE J. Sel. Areas Commun., vol. 39, no. 8,
Jul. 2020. pp. 2434–2444, Aug. 2021.
[16] J. Cao and E. M. Yeh, “Asymptotically optimal multiple-access commu- [38] Y. Wang et al., “Performance optimization for semantic communications:
nication via distributed rate splitting,” IEEE Trans. Inf. Theory, vol. 53, An attention-based reinforcement learning approach,” IEEE J. Sel. Areas
no. 1, pp. 304–319, Jan. 2007. Commun., vol. 40, no. 9, pp. 2598–2613, Sep. 2022.
[17] C. Hao, Y. Wu, and B. Clerckx, “Rate analysis of two-receiver MISO [39] H. Xie, Z. Qin, G. Y. Li, and B.-H. Juang, “Deep learning enabled
broadcast channel with finite rate feedback: A rate-splitting approach,” semantic communication systems,” IEEE Trans. Signal Process., vol. 69,
IEEE Trans. Commun., vol. 63, no. 9, pp. 3232–3246, Sep. 2015. pp. 2663–2675, 2021.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on May 14,2023 at 14:21:10 UTC from IEEE Xplore. Restrictions apply.
YANG et al.: ENERGY EFFICIENT SEMANTIC COMMUNICATION OVER WIRELESS NETWORKS WITH RATE SPLITTING 1495
[40] M. Chen, Y. Wang, and H. V. Poor, “Performance optimization for Mingzhe Chen (Member, IEEE) received the
wireless semantic communications over energy harvesting networks,” Ph.D. degree from the Beijing University of Posts
in Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP), and Telecommunications, Beijing, China, in 2019.
May 2022, pp. 8647–8651. From 2016 to 2019, he was a Visiting Researcher
[41] J. Kang et al., “Personalized saliency in task-oriented semantic com- at the Department of Electrical and Computer
munications: Image transmission and performance analysis,” 2022, Engineering, Virginia Tech. From 2019 to 2021,
arXiv:2209.12274. he was a Post-Doctoral Research Associate with the
[42] R. Kaewpuang et al., “Cooperative resource management in quantum Department of Electrical and Computer Engineering,
key distribution (QKD) networks for semantic communication,” 2022, Princeton University. In 2022, he worked as an AI
arXiv:2209.11957. Researcher at Ericsson Research, USA. Currently,
[43] S. Xie, Y. Wu, S. Ma, M. Ding, Y. Shi, and M. Tang, “Robust information he is an Assistant Professor with the Department
bottleneck for task-oriented communication with digital modulation,” of Electrical and Computer Engineering and Institute of Data Science and
2022, arXiv:2209.10382. Computing, University of Miami. His research interests include federated
[44] S. Wang et al., “Wireless deep video semantic transmission,” 2022, learning, reinforcement learning, virtual reality, unmanned aerial vehicles, and
arXiv:2205.13129. the Internet of Things. He has received from the IEEE Communication Society
[45] H. Zou, C. Zhang, S. Lasaulce, L. Saludjian, and V. Poor, “Goal-oriented two paper awards, including the 2021 Young Author Best Paper Award and
quantization: Analysis, design, and application to resource allocation,” the 2022 Fred W. Ellersick Prize Award, and three Conference Best Paper
2022, arXiv:2209.15347. Awards at IEEE ICC in 2020, IEEE GLOBECOM in 2020, and IEEE WCNC
[46] D. Gunduz et al., “Beyond transmitting bits: Context, semantics, and in 2021. He currently serves as an Associate Editor for IEEE W IRELESS
task-oriented communications,” 2022, arXiv:2207.09353. C OMMUNICATIONS L ETTERS, IEEE T RANSACTIONS ON G REEN C OMMU -
[47] Z. Qin, X. Tao, J. Lu, W. Tong, and G. Ye Li, “Semantic communica- NICATIONS AND N ETWORKING , and IEEE T RANSACTIONS ON M ACHINE
tions: Principles and challenges,” 2021, arXiv:2201.01389. L EARNING IN C OMMUNICATIONS AND N ETWORKING. Previously, he guest
[48] H. Tong, Z. Yang, S. Wang, Y. Hu, W. Saad, and C. Yin, “Federated edited a Special Issue on Distributed Learning over Wireless Edge Networks
learning based audio semantic communication over wireless networks,” for IEEE J OURNAL ON S ELECTED A REAS IN C OMMUNICATIONS.
in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2021,
pp. 1–6.
[49] L. Deng and Y. Liu, Deep Learning in Natural Language Processing.
Cham, Switzerland: Springer, 2018.
[50] B. Clerckx et al., “Rate-splitting unifying SDMA, OMA, NOMA, Zhaoyang Zhang (Senior Member, IEEE) received
and Multicasting in MISO broadcast channel: A simple two-user rate the Ph.D. degree from Zhejiang University,
analysis,” IEEE Wireless Commun. Lett., vol. 9, no. 3, pp. 349–353, Hangzhou, China, in 1998.
Mar. 2020. He is currently a Qiushi Distinguished Professor
[51] Z. Yang, M. Chen, W. Saad, and M. Shikh-Bahaei, “Optimization of rate with Zhejiang University. His research interests
allocation and power control for rate splitting multiple access (RSMA),” include the fundamental aspects of wireless
IEEE Trans. Commun., vol. 69, no. 9, pp. 5988–6002, Sep. 2021. communications and networking, such as
information theory and coding theory, network
[52] M. S. Lobo, L. Vandenberghe, S. Boyd, and H. Lebret, “Applications
signal processing and distributed learning, AI-
of second-order cone programming,” Linear Algebra Appl., vol. 284,
empowered communications and networking, and
nos. 1–3, pp. 193–228, Nov. 1998.
synergetic sensing, computing, and communication.
[53] M. S. Ali, E. Hossain, A. Al-Dweik, and D. I. Kim, “Downlink
He has coauthored more than 300 peer-reviewed international journals and
power allocation for CoMP-NOMA in multi-cell networks,” IEEE Trans.
conference papers, including eight conference best papers awarded by IEEE
Commun., vol. 66, no. 9, pp. 3982–3998, Sep. 2018.
ICC 2019 and IEEE GlobeCom 2020. He was awarded the National Natural
[54] W. Ammar et al., “Construction of the literature graph in semantic Science Fund for Distinguished Young Scholars by NSFC in 2017. He is
scholar,” 2018, arXiv:1805.02262. serving or has served as an Editor for IEEE T RANSACTIONS ON W IRELESS
[55] K. Seong, M. Mohseni, and J. M. Cioffi, “Optimal resource allocation C OMMUNICATIONS, IEEE T RANSACTIONS ON C OMMUNICATIONS, and
for OFDMA downlink systems,” in Proc. IEEE Int. Symp. Inf. Theory, IET Communications, and the General Chair, the TPC Co-Chair or the
Seattle, WA, USA, Jul. 2006, pp. 1394–1398. Symposium Co-Chair for PIMRC 2021 Workshop on Native AI Empowered
[56] Z. Yang, C. Pan, J. Hou, and M. Shikh-Bahaei, “Efficient resource allo- Wireless Networks, VTC-Spring 2017 Workshop on HMWC, WCSP
cation for mobile-edge computing networks with NOMA: Completion 2013/2018, and Globecom 2014 Wireless Communications Symposium.
time and energy minimization,” IEEE Trans. Commun., vol. 67, no. 11, He was also a Keynote Speaker for APCC 2018 and VTC-Fall 2017
pp. 7771–7784, Nov. 2019. Workshop NOMA.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY GUWAHATI. Downloaded on May 14,2023 at 14:21:10 UTC from IEEE Xplore. Restrictions apply.