Content area
ABSTRACT
This paper proposes a sub‐optimal Kuhn–Munkres‐based resource assignment algorithm to maximize both the number of connected links and the mean throughput per link in ultra‐dense networks (UDNs) consisting of densely distributed co‐channel access points (APs) and user equipment (UEs). The proposed seven‐step algorithm first assigns UEs to APs that provide higher data rates while accounting for the interference of all APs. Next, only the interference from the selected APs is considered to identify UEs that meet the minimum throughput threshold level. In subsequent steps, considering both the interference of previously assigned APs and the remaining candidate APs, additional UEs are connected. Simulation results in MATLAB for a service area with randomly distributed APs and varying numbers of UEs (25–) demonstrate that the proposed algorithm achieves higher connectivity and total throughput with significantly reduced processing time compared to the Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Cuckoo Search (CS), and Gray Wolf Optimization (GWO). Specifically, as the number of UEs increases from to of the number of APs, the proposed algorithm improves the number of connected UEs by , , , and , and the total throughput by , , , and , respectively, over the four benchmark algorithms. Moreover, owing to its lower computational complexity, the proposed method achieves at least reduction in processing time.
Introduction
The advancement of mobile wireless and optical networks has led to a surge in users of smart terminals—such as cell phones, smart watches, vehicle-mounted intelligent devices, and wearables—as well as new services and applications, including Artificial Intelligence (AI), the Internet of Things (IoT), and caching. This growth has driven a significant increase in mobile data traffic. In 2023, approximately exabytes of data were generated per day, or zettabytes per year. Data volume is expected to reach zettabytes in 2024 and zettabytes in 2025, with projections indicating that global mobile data traffic will reach exabytes by 2025 [1, 2].
A key approach to increasing the total network data rate and Area Spectrum Efficiency (ASE) is network densification and the transition from homogeneous networks to heterogeneous networks (HetNets) [3–5]. By deploying a large number of Access Points (APs) or Base Stations (BSs), networks can support User Equipment (UEs) requiring high data rates and low-latency wireless links. The rapid growth of mobile broadband traffic will challenge traditional macrocell-based networks, which cannot meet future communication demands. To address this, network densification is essential [6]. Ultra Dense Networks (UDNs)—a key concept in 5G and 6G—deploy a very high density of small cells, base stations, or access points, far beyond conventional networks. By shortening the distance between transmitters and receivers, UDNs improve signal quality, boost data rates, lower latency, and enhance overall system performance [7]. UDNs often feature more than access points per square kilometer [8], where the primary optimization challenge is resource allocation (assignment). Extensive research has focused on designing resource allocation schemes to serve an increasing number of UEs while maintaining acceptable data rates [9–13]. Consequently, achieving high Quality of Service (QoS) and supporting a large total throughput and number of UEs in UDNs requires low-complexity, sub-optimal resource allocation methods for effectively assigning APs to UEs.
An UDN includes access points and user equipment. The number of single-channel APs, or equivalently, the number of multi-channel APs multiplied by the number of channels per AP, is greater than the number of UEs. Both APs and UEs are densely distributed in the service area. In such a network, the resource allocation problem must be solved to address the following questions:
- Which frequency channels, among available channels, should be activated at each AP?
- Which AP should be connected to which UE?
- For active links, what transmit power should be assigned to maximize total throughput while satisfying all constraints?
By solving the corresponding optimization problem, we aim to achieve the following goals:
- Select the best APs and frequency channels to serve UEs, ensuring both high data rates and low latency.
- Maximize utilization of APs and frequency channels to increase the number of active links.
- Increase the total throughput, defined as the product of the average data rate per unit bandwidth of an AP-UE link and the number of active AP-UE links.
In this study, we formulate a four-variable single-objective optimization problem, which seeks proper solutions for the following decisions:
- To which AP should each UE be connected?
- Which frequency channel should be assigned to each AP–UE link?
- What transmit power should be allocated to each active AP–UE link?
Without loss of generality, and assuming uplink and downlink channels are symmetric, we focus on the downlink case, where APs act as transmitters and UEs as receivers. We propose a three-step optimization framework to solve the general problem:
- Random clustering: Partition UEs into independent, non-overlapping subsets, while all APs are included in each cluster.
- Resource assignment: Determine AP–UE links within each cluster.
- Power control: Optimize transmit power for the links assigned in the previous step.
Since all frequency channels assigned to APs are orthogonal (i.e., an Orthogonal Multiple Access (OMA) model is assumed), each cluster corresponds to one frequency channel.
The work reported in this paper focuses exclusively on the second step—the resource assignment process. We propose a suboptimal resource assignment algorithm based on the Kuhn–Munkres algorithm to determine AP–UE links in each cluster. Our main contribution is a Kuhn–Munkres-based assignment scheme for AP–UE links under a single-frequency channel per cluster.
The goal of resource assignment is to allocate resources (APs or BSs) to requesters (UEs) in order to maximize (or minimize) a given objective (or cost) function. This can be formulated as selecting elements from an matrix such that each row has exactly one selected element, with no repetitions in columns. Specifically, the assignment algorithm selects elements from the Signal to Interference plus Noise Ratio (SINR) or throughput (data rate per Hz) matrix to maximize the total SINR or throughput of the assigned AP–UE links. The Time Complexity Order (TCO) of the optimal solution using Exhaustive Search (ES) is given in (1), which is computationally infeasible for large and .
When the number of requesters equals the number of resources, the time complexity order is given in Equation (2).
For UDNs, where , the TCO of the ES is given in Equation (3).
One popular sub-optimal solution for the case , is the first version of the Hungarian algorithm, whose time complexity order is given in Equation (4) [14].
In the works of Kuhn and Munkres [15, 16], the processing speed of the Hungarian algorithm was improved and the method extended to handle non-square matrices. The algorithm selects elements from a matrix with non-identical rows and columns. It has been proven that the time complexity order of the Kuhn–Munkres (KM) algorithm for the case is given in [15, 16].
Recent studies [17, 18] addressed the assignment problem for scenarios where the number of requesters exceeds the number of available resources . This case is particularly relevant to wireless systems that require resource reuse [19], such as Device-to-Device (D2D) and Vehicle-to-Vehicle (V2V) communications. In these investigations, the locations of secondary UEs requesting resources and the active BSs serving primary UEs were assumed to be known. During the first stage of the KM-based algorithm, resources for the secondary UEs are assigned while accounting for interference from the primary links. If resources are still insufficient, subsequent stages of the Multi-Stage Kuhn–Munkres (MS-KM) algorithm perform resource reuse by re-allocating the resources used in the first stage, considering the interference from both the primary users' links and the secondary links selected in earlier stages.
When , the time complexity order of the MS-KM-based assignment algorithm follows the order given in (6), reflecting the worst case of running the algorithm up to times.
Network densification improves coverage probability (or reduces outage probability), increases throughput and sum-rate (b/s/Hz), enhances Energy Efficiency (EE, measured as data rate per unit power in b/j), and improves Spectral Efficiency (SE, measured as average bits per hertz in b/Hz). However, implementing resource allocation algorithms in dense and ultra-dense networks introduces significant time, memory, computational complexity, and signaling/control overhead. To address these challenges, researchers have applied convex and combinatorial optimization, graph and game theory, stochastic and sparse optimization, binary assignment algorithms such as the Kuhn–Munkres method, grouping/clustering schemes, and thresholding/sorting algorithms [20–26]. Building on related studies [17, 18] that applied the Kuhn–Munkres approach to D2D and V2V communications, this paper proposes a novel Kuhn–Munkres-based resource allocation algorithm tailored for UDNs.
In UDNs, where APs and/or UEs are densely deployed to meet stringent low-latency and high-reliability requirements, the resource assignment problem for maximizing the objective function is a non-convex, NP-hard challenge. A key paradox arises: we must allocate resources to UEs and activate a subset of APs, yet we simultaneously seek APs that provide the best data rates and lowest delay without knowing in advance which APs are active and potentially interfering with other UEs.
In this study, we assume that all APs operate on a single shared resource, and that UEs requesting resources can activate and connect to co-channel APs. This configuration enables the UDN to accommodate a larger number of UEs and achieve higher total throughput. Consequently, when assigning an AP to a UE, it is essential to identify the optimal AP while accounting for the interference from other links, whose impact cannot be fully determined until the overall problem is solved.
In this research, we establish a seven-step KM-based assignment algorithm to find sub-optimal links between APs and UEs in UDNs. This work extends Ref. [27] with the following key contributions:
- Formulation of the main four-variable single-objective optimization problem and a three-step suboptimal solution for clustering, co-channel resource assignment, and power control.
- Inclusion of two additional well-known algorithms—Cuckoo Search (CS) and Gray Wolf Optimization (GWO)—alongside Genetic and Particle Swarm Optimization (PSO) to demonstrate the superiority of the proposed KM-based resource assignment algorithm for UDNs.
- Enhancement of the KM-based algorithm with a flowchart illustrating the main concept and a pseudo-code for practical implementation.
- Increased the number of simulation runs to produce more accurate and realistic numerical results and analysis.
The next six sections complete the objectives of this article. Section 2 presents the system model and the corresponding NP-hard, non-convex optimization problem. Section 3 provides a brief overview of the Kuhn–Munkres, Genetic, PSO, CS, and GWO algorithms. Section 4 introduces the seven-step KM-based resource allocation algorithm for UDNs with numerous co-channel APs and/or UEs, accompanied by a flowchart and pseudo-code. Section 5 presents MATLAB simulation results and numerical analyses. Finally, Sections 6 and 7 discuss the conclusions and outline directions for future work.
System Model and Optimization Problem
Optimization in UDNs can be categorized into two types of problems: multi-objective problems [28] and multi-variable single-objective problems. To address these optimization problems, three main approaches are commonly used [29]:
- Convex or relaxed convex optimization: The problem is solved directly using convex optimization techniques or by relaxing it into a convex form.
- Divide-and-conquer: The original problem is decomposed into multiple subproblems, each solved individually, and then their solutions are combined to obtain the overall solution.
- Iterative variable optimization: The problem is solved iteratively by optimizing one variable at a time while keeping the others fixed, and repeating this process until convergence.
In this work, we focus on a single-objective optimization problem, which is distinct from a multi-objective optimization problem in terms of both formulation and target.
As shown in Figure 1, a UDN consists of densely distributed UEs and APs within the service area. In this study, APs have similar resources and may interfere with each other. Consequently, some APs are assigned to the UEs, while the remaining APs are turned off.
[IMAGE OMITTED. SEE PDF]
Generally, the problem can be formulated as a four-variable single-objective optimization problem, or equivalently a four-sigma optimization problem, subject to five constraints, denoted as (7).
The first constraint, , demonstrates whether a link is established () or not (). The second constraint, , indicates that each AP can be assigned to at most user equipment. Constraint forces each UE to be connected to just one AP. The fourth constraint, , guarantees the minimum required throughput for each active AP-UE link. The fifth constraint, , limits the transmit power between minimum and maximum levels.
Solving this problem by exhaustive search has the time complexity order given in (8), which is practically infeasible. The three terms in this complexity expression make the problem NP-hard, and therefore it must be addressed using suboptimal solution methods.
According to Figure 2, we propose a suboptimal solution that addresses the main problem through a three-step procedure.
[IMAGE OMITTED. SEE PDF]
Therefore, the time and memory complexity of solving this four-variable single-objective optimization problem can be significantly reduced. In brief, we transform the original 4-variable (or 4-sigma) problem (7), which involves access points, user equipment, orthogonal channels, and transmit power levels, into a three-step procedure:
- Select UEs to form clusters, randomly;
- Solve a 2-variable (2-sigma) resource assignment problem independently for each of the clusters;
- Evaluate transmit power levels and select the optimal values for the assigned AP–UE links.
Given that the frequency channels are orthogonal, we construct clusters, each containing all access points and UEs (9) randomly selected from the main UE set.
In the first step, clusters are formed, where each cluster functions as a small UDN consisting of access points and UEs, all of which can communicate over a single frequency channel. Since all active APs and UEs within a cluster operate on the same channel, a low-complexity assignment algorithm is required to manage frequency reuse efficiently. In the second step, independent assignments are performed to establish AP–UE links within each cluster, assuming fixed transmit powers. Finally, in the third step, a power control algorithm is applied to the selected AP–UE links that are active across different frequency channels.
Using the proposed solution, the total time complexity orders of exhaustive search for Steps 1, 2, and 3 are given by (10–12), respectively.
Hence, the overall complexity order for exhaustive search is given by (13).
Although the total computational order of the proposed suboptimal solution for UDN resource allocation is significantly lower than of the original exhaustive solution, the AP–UE assignment and power control for active transmitters still require time-efficient suboptimal algorithms. The primary focus of this study, as presented below, is solving the assignment problem in the second step of the proposed solution using a new, low-complexity, seven-step Kuhn–Munkres-based assignment algorithm.
The non-convex optimization problem, consisting of an objective function subject to four constraints, is formulated in (14).
The channel power gain is modeled by . the channel gain between ith user equipment and jth access point, is modeled by (17) in the linear scale and (18) in the deci-Bell scale, both including the multipath fading component, , and the shadowing component, [30–32].
For each link, we have the Rayleigh fading probability density function (pdf) according to (19) [32].
Considering in the power gain, we have a negative exponential pdf for random variable as (20) [31].
For each link, we can model the shadowing effect in linear scale using a Log-normal distribution as (21) with a pdf shown in (22) or in deci-Bell scale using a Gaussian (Normal) distribution as (23) with a pdf shown in (24) [30, 31].
In all simulations of this research, the variance of Rayleigh fading, , is and the variance of shadowing, , is in linear scale equivalent to . Moreover, an Additive White Gaussian Noise (AWGN) is considered by a power equal to .
The first constraint, , demonstrates whether a link is established () or not (). The second constraint, , shows that each AP can be assigned to just one UE. Constraint forces each UE to be connected to just one AP. The fourth constraint, , guarantees the minimum required throughput for each active link.
Five Well-Known Algorithms for Sub-Optimum Resource Allocation
Recent advances in wireless systems and networks for communications, broadcasting, and sensing have created new challenges in optimizing the allocation of key resources—such as time, frequency, space, and power—in wireless radio applications and services [33, 34]. In UDNs, the resulting resource-allocation problems are typically non-convex. Some studies address this by reformulating the problem into a convex form for solution, wherwas others—like this research—apply sub-optimal heuristic or metaheuristic algorithms. In this work, we present an enhanced Kuhn–Munkres assignment algorithm for resource assignment in UDNs and compare its performance with results obtained using Genetic, PSO, CS, and GWO algorithms.
Kuhn-Munkres Algorithm
Harold Kuhn proposed the Hungarian algorithm in 1955 [14], combining the ideas of Egervary's ideas for simplification and graph theory-based methods to solve the binary (on/off) assignment problem. Kuhn expanded it in 1956 [15], and James Munkres reviewed it in 1957 [16]. The algorithm assigns each requester to exactly one resource at the lowest total cost. Given an ()-dimension square cost matrix, where rows represent requesters and columns represent resources, the main steps are:
- Row reduction: Subtract the largest element of each row from every element in that row;
- Column reduction: Repeat the process for each column;
- Cover zeros: Draw the minimum number of horizontal and vertical lines needed to cover all zeros. If all requesters are covered, the process stops;
- Adjust matrix (if not done): If the number of covering lines is less than NNN, find the largest uncovered value. Subtract it from every element in rows containing at least one uncovered cell, and add it to every element in fully covered columns;
- Repeat covering: Recalculate the minimum set of lines to cover all zeros. Stop when every requester is covered.
Genetic Algorithm
The genetic algorithm is a stochastic search method that evolves a population of candidate solutions through successive iterations until a stopping criterion is met [35]. It relies on three key operators inspired by natural evolution: selection, crossover, and mutation.
- Selection chooses parent individuals to produce the next generation [36];
- Crossover exchanges genetic material between two parents to create offspring;
- Mutation alters the value of a gene at a specific chromosome location by replacing it with an alternative allele, introducing new variation into the population.
The PSO algorithm is a stochastic search method proposed by Kennedy and Eberhart in 1995 [37]. A key feature of PSO is velocity control, which governs how each particle updates its position within the search space to explore and converge toward the optimal solution. The velocity of the mth particle in the (n+1)th iteration is updated using Equation (25), and its position is updated using Equation (26). Here, denotes the velocity of the mth particle at (n+1)th iteration and is its position at the th iteration. represents the best position found so far by mth particle up to the nth iteration. is the global best position among all particles at the nth iteration. is the inertia weight, and are the real acceleration coefficients, and and are independent random numbers uniformly distributed in [0,1].
The CS algorithm is a metaheuristic, population-based global search algorithm developed by Yang and Deb in 2009. Inspired by natural mechanisms, it mimics the breeding behavior of certain cuckoo species that lay their eggs in the nests of host birds [38, 39]. The algorithm can be summarized by three key rules:
- Each cuckoo lays one egg at a time, depositing it in a randomly selected nest;
- The best nests, containing high-quality eggs, are carried over to the next generation;
- The number of available host nests is fixed, and hosts can detect and remove alien eggs.
The GWO algorithm, developed by Mirjalili et al. in 2014, is a nature-inspired metaheuristic algorithm based on swarm intelligence. It mimics the leadership hierarchy and hunting behavior of gray wolves and models them mathematically [40, 41]. The algorithm begins with a randomly generated population of gray wolves (candidate solutions). During iterations, the , , and wolves estimate the prey's position, and each candidate solution updates its distance accordingly. The algorithm concludes by producing an optimized final solution.
Proposed Sub-Optimum Kuhn-Munkres-Based Resource Allocation Algorithm
The proposed Kuhn–Munkres-based resource allocation algorithm consists of seven main steps. It reduces the dimensions of the throughput matrix by activating only APs that can provide acceptable throughput to at least one unconnected UE, thereby lowering processing time while increasing the total number of connected UEs and overall throughput. In the first iteration, it establishes some AP–UE links as in the conventional KM algorithm, and then connects the remaining UEs to available APs through a recursive process.
Step 1: Initialize the Scalars, Vectors, and Matrices
Initialize the number of user equipment, , the number of access points, , the matrix of distances showing the distances () between UEs and APs, as (27), the transmit power of APs, , the path loss exponent, , the variance of noise, , the throughput threshold level, , the channel gain matrix, as (28), showing the effect of Rayleigh multipath fading and Log-normal shadowing. Set the number of selected user equipment equal to the total number of user equipment in each cluster, that is , the number of selected access points equals to the total number of access points, that is , the number of remaining user equipment equal to the total number of user equipment, that is , the number of remaining access points equal to the total number of access points, that is . Moreover, set the vector of active APs, as (29), to zero, that is , the vector of connected users, as (30), to zero, that is , and the matrix of all AP-UE links, as (31), to zero, that is .
Step 2: Make the Throughput Matrix
Make -dimension throughput matrix using (15) and (16).
Step 3: Resize the Throughput Matrix
If all elements of a column are below the throughput threshold level, , then that column (associated AP) should be deleted and . If all elements of a row are below the threshold level, that row (the associated user equipment) must be removed and . If or , terminate the algorithm. Otherwise, go to the next step.
Step 4: Refresh the Throughput Matrix
Refresh throughput matrix only considering number of UEs and number of APs at the output of Step 3, and combining the effect of APs assigned to active links in the previous iterations. Change elements below the threshold level to .
Step 5: Run the
Run the KM resource allocation algorithm to assign the number of access points to the number of user equipment that supports the maximum total throughput of these new links.
Step 6: Update the Scalars, Vectors, and Matrices
Update to show the connected and remaining UEs, to show the assigned and remaining APs, to show AP-UE links, , . Refresh the throughput of links. If , finish the algorithm. Otherwise, go to the next step.
Step 7: Check the Remaining Access Points
Check the remaining access points from 1 to . The effect of the first access point of this list on the throughput of the links that have been extracted before. If enabling this access point reduces the throughput of at least one of the dedicated links below the throughput threshold level, , it should be removed. Otherwise, update the throughput of the previously allocated links in a temporary throughput vector of links considering a newly added access point. Do this for the next access points up to the endpoint by checking the last temporary throughput vector of links. Therefore, is the number of access points that have affected the temporary throughput vector, and If , finish the algorithm. Otherwise, make -dimension throughput matrix using (15) and (16) considering the effect of APs of the active links selected in the previous iterations and go back to Step 3.
Figure 3 presents the flowchart of the proposed KM-based resource allocation algorithm, which comprises the seven steps described above. Algorithm 1 provides the corresponding pseudocode.
[IMAGE OMITTED. SEE PDF]
ALGORITHM
The Pseudo-Code of the Proposed Kuhn-Munkres-Based Resource Allocation Algorithm.
Input: The number of user equipment N_U, number of access points N_AT, path loss exponent gamma, threshold level R_B,noise variance var_N, distance matrix M_d, channel gain matrix M_h
Initialization: N_US=N_U, N_AS=N_AT, N_UR=N_U, N_AR=N_AT, vector of assigned/non-assigned access points V_A=0, vector of connected/non-connected users V_U=0, matrix of AP-UE links M_UA=0
Declare N_US×N_AS throughput_matrix
While True do
Remove all the columns and rows in the throughput_matrix with all values less than R_B
N_AS=N_AS-removed columns, N_US=N_US-removed rows
if N_AS=0 or N_US=0 do
break
end if
Refresh the values of the throughput_matrix considering the removed values
Change all elements of the throughput_matrix less than R_B to -inf
Apply KM_algorithm on the throughput_matrix
Refresh values of M_UA, V_A, V_U based on the result of KM_algorithm
N_UR=N_UR-N_US, N_AR=N_AR-N_AS
Declare three lists temp_V_A, temp_V_U and throughput_links based on the result of KM_algorithm
for all items in M_UA equal to 1 do
calculate value of throughput_links
end for
if all items in V_U = 1 do
N_UR=0
break
end if
Declare temp_throughput_links list
N_AS = 0
for all items in V_A do
if item = 0 do
Temporarly make item = 1
Fill the temp_throughput_links list based on this value
Refresh temp_throughput_links considering the interference of new access points
if all items in temp_throughput_links >=R_B do
Add the item to temp_V_A
N_AS += 1
end if
end if
end for
if all items in temp_V_A = 0 do
break
end if
for all items in V_U do
Add the item to temp_V_U if all items in V_U = 0
end for
N_US = length(V_U)
Make new N_US×N_AS throughput_matrix based on temp_V_A, temp_V_U considering the interference of all selected andactive APs
end while
Numerical Analysis and Simulation Results
According to Figure 4, a service area is simulated, containing APs and up to UEs, randomly distributed. In the simulations, with parameters summarized in Table 1, the number of UEs served by APs varies from to of the total APs, both densely and randomly distributed. Using a thresholding process, APs with no UEs within their coverage radius are turned off, and UEs without APs in range are excluded from the assignment process. The path loss exponent is set to , transmit power to , and the variances of noise, Rayleigh fading, and Log-normal shadowing are , , and respectively. The minimum acceptable SINR is , corresponding to a throughput threshold of per link.
[IMAGE OMITTED. SEE PDF]
TABLE 1 Symbols in the system model and their values in the numerical analysis.
| Symbol | Description | Value |
| Number of user equipment | ||
| Number of access points | ||
| Area of service area | ||
| Transmit power | ||
| Path loss exponent | ||
| Noise power | ||
| Rayleigh fading variance | ||
| Log-normal shadowing variance | ||
| threshold level | ||
| Throughput threshold level | ||
| Number of random simulations |
The population size, iteration limits, and stopping criteria for GA, PSO, CS, and GWO are not fixed; they are typically determined by the problem size, complexity, and the desired trade-off between accuracy and computational cost. In this work, we used the same settings across all algorithms to ensure fairness, with a population size of and a maximum of iterations. The stopping criterion was defined as reaching the maximum number of iterations or when no further improvement in fitness was observed.
The performance of the proposed KM-based algorithm is evaluated in terms of the number of connected UEs, average throughput per UE, total throughput, and processing time, based on random simulations. Its results were compared with four metaheuristic algorithms—Genetic, PSO, CS, and GWO. The time complexity of each algorithm is also analyzed and compared with respect to the number of iterations, fitness function evaluations, APs, and UEs. All simulations in MATLAB are run on a system, Intel core with RAM, Cache, and Max. CPU speed.
Number of Connected
Figure 5 depicts the number of connected users, whereas Figure 6 shows the ratio of connected users to the total number of UEs for varying UE-to-AP ratios. As the number of UEs increases, the absolute number of connected users rises; however, the percentage of connected users decreases due to the higher number of active APs and the resulting increase in interference.
[IMAGE OMITTED. SEE PDF]
[IMAGE OMITTED. SEE PDF]
The proposed KM-based algorithm achieves a higher number of connected UEs compared to the PSO, Genetic, CS, and GWO algorithms, as it effectively controls interference from active APs. By activating the most suitable APs, more UEs can be connected, making the KM-based algorithm a more efficient solution than the other four algorithms.
Figure 7 shows that the total throughput of connected UEs is higher for the proposed KM-based algorithm than for the Genetic, PSO, CS, and GWO algorithms. This improvement is primarily due to the significantly greater number of UEs connected by the KM-based algorithm.
[IMAGE OMITTED. SEE PDF]
Mean Value and the Ratio of the Standard Deviation to the Mean Value of Throughput Per User
Figure 8 depicts the average throughput per UE for the five resource allocation algorithms. The proposed KM-based algorithm achieves higher average throughput than the Genetic and GWO algorithms, but slightly lower than the CS and PSO algorithms. This is because CS and PSO connect fewer users, resulting in higher per-UE throughput, whereas the KM-based, Genetic, and GWO algorithms connect more users, distributing resources among a larger set of UEs (as shown in Figures 4 and 5).
[IMAGE OMITTED. SEE PDF]
For a fair comparison, Figure 9 shows the ratio of the standard deviation to the average throughput per UE for the five resource allocation algorithms. This ratio is higher in the proposed KM-based algorithm, indicating greater variability in throughput among connected UEs. The increased standard deviation arises from the initial AP selection in the KM-based algorithm, whereas Genetic, PSO, CS, and GWO algorithms address this through multiple iterations at the cost of higher processing time. Nevertheless, as shown in Figures 5–7, the KM-based algorithm achieves higher numbers of connected UEs and greater total throughput. In future improvements, introducing a hysteresis mechanism in the throughput threshold during the second step of the algorithm could reduce this ratio by increasing the number of active APs.
[IMAGE OMITTED. SEE PDF]
Time Complexity Order and the Required Elapsed Processing Time to Solve the Optimization Problem
The time complexity order of the proposed KM-based algorithm is given in Equation (32).
For the Genetic algorithm, the TCO can be expressed as Equation (33).
The time complexity order of the PSO algorithm is given in Equation (34).
For the CS algorithm, the time complexity order can be expressed as Equation (35).
The time complexity order of the GWO algorithm is given in Equation (36).
The differences in the time complexity order of the proposed KM-based, Genetic, PSO, CS, and GWO algorithms arise from two factors: (i) the number of APs selected for resource allocation, and (ii) the number of algorithm repetitions. Moreover, unlike the Genetic, PSO, CS, and GWO algorithms, the proposed KM-based algorithm does not require fitness function evaluations.
Figure 10 shows the elapsed simulation time for these five resource allocation algorithms in a UDN service area with APs and varying numbers of UEs from to . Consistent with their time complexity orders, the proposed KM-based algorithm requires significantly less processing time than the Genetic, PSO, CS, and GWO algorithms. This reduction is due to the absence of fitness function evaluations, the smaller number of APs selected for checking, and the fewer iterations required compared to the other algorithms.
[IMAGE OMITTED. SEE PDF]
Conclusion
A seven-step sub-optimal algorithm was proposed to address the non-convex NP-hard resource allocation problem in ultra-dense networks (UDNs) with densely distributed APs and UEs. Based on the Kuhn–Munkres (KM) assignment algorithm, the method was evaluated in a area with randomly distributed APs and UEs. The simulation accounted for path loss, additive white Gaussian noise, multipath Rayleigh fading, Log-normal shadowing, and co-channel interference among AP–UE links sharing the same resources. Numerical results show that the proposed KM-based algorithm outperforms Genetic, PSO, CS, and GWO algorithms by achieving more connected UEs, higher total throughput, lower time complexity, and reduced processing time, demonstrating its efficiency for resource allocation in UDNs.
Future Work
The following directions can be considered for the continuation of this research:
- Neighborhood radius evaluation: Determining the coverage radius of each AP and identifying the APs around each UE in order to exclude UEs outside the coverage area of an AP as well as APs that are too far from a given UE.
- Interference reduction: In the first step of the proposed KM-based algorithm, we avoid the consideration of interference from all APs by applying a suitable hysteresis in SINR calculation and using an appropriate threshold for the throughput of each link.
- Sensitivity analysis: Examining the robustness of the five proposed algorithms by introducing random deviations in the relative locations of UEs and APs. Additional standby APs (not limited to on/off operation) can be employed to ensure coverage for UEs that move outside the range of their associated APs.
- Resource assignment extension: Extending the KM-based algorithm to handle resource assignment when each AP is equipped with multiple orthogonal resources.
- Two-dimensional clustering: Applying two-dimensional clustering to both APs and UEs within the service area to decompose the UDN resource allocation problem into several smaller problems. Each sub-area cluster of UEs can then be assigned to the corresponding cluster of APs.
- Incorporating power control mechanisms to enhance energy efficiency, similar to the approach in Ref. [28].
Acknowledgments
This work was supported by Shahid Rajaee Teacher Training University (SRTTU) under grant number 1404.388028(17.03.1404). AP and UE icons are extracted from .
Conflicts of Interest
The authors declare no conflicts of interest.
Data Availability Statement
The data that support the findings of this study are available on request from the corresponding author. The data are not publicly available due to privacy or ethical restrictions.
B. U. Kazi and G. A. Wainer, “Next Generation Wireless Cellular Networks: Ultra‐Dense Multi‐Tier and Multi‐Cell Cooperation Perspective,” Wireless Networks 25, no. 4 (2019): 2041–2064, https://doi.org/10.1007/s11276‐018‐1796‐y.
S. Shirvani Moghaddam, “The Past, Present, and Future of the Internet: A Statistical, Technical, and Functional Comparison of Wired/Wireless Fixed/Mobile Internet,” Electronics 13, no. 10 (2024): 1986, https://doi.org/10.3390/electronics13101986.
A. Habibzadeh, S. Shirvani Moghaddam, S. M. Razavizadeh, and M. Shirvanimoghaddam, “Modeling and Analysis of Traffic‐Aware Spectrum Handover Schemes in Cognitive HetNets,” Transactions on Emerging Telecommunications Technologies 28, no. 12 (2017): e3199, https://doi.org/10.1002/ett.3199.
A. Habibzadeh, S. Shirvani Moghaddam, S. M. Razavizadeh, and M. Shirvanimoghaddam, “Analysis and Performance Evaluation of an Efficient Handover Algorithm for Cognitive HetNets,” International Journal of Communication Systems 30, no. 16 (2017): e3315, https://doi.org/10.1002/dac.3315.
S. Shirvani Moghaddam, M. Shirvanimoghaddam, and A. Habibzadeh, “Clustering‐Based Handover and Resource Allocation Schemes for Cognitive Radio Heterogeneous Networks, Presented at the 28th International Telecommunication Networks and Applications Conference (ITNAC), Sydney, Australia, 21‐23,” (2018).
V. Stoynov, V. Poulkov, Z. Valkova‐Jarvis, G. Iliev, and P. Koleva, “Ultra‐Dense Networks: Taxonomy and Key Performance Indicators,” Symmetry 15, no. 1 (2023): 2.
C. Pan, M. Elkashlan, J. Wang, J. Yuan, and L. Hanzo, “User‐Centric C‐RAN Architecture for Ultra‐Dense 5G Networks: Challenges and Methodologies,” IEEE Communications Magazine 56, no. 6 (2018): 14–20, https://doi.org/10.1109/MCOM.2018.
X. Wang, L. Kong, F. Kong, et al., “Millimeter Wave Communication: A Comprehensive Survey,” IEEE Communications Surveys & Tutorials 20, no. 3 (2018): 1616–1653, https://doi.org/10.1109/COMST.2018.2844322.
Y. Teng, M. Liu, F. R. Yu, V. C. M. Leung, M. Song, and Y. Zhang, “Resource Allocation for Ultra‐Dense Networks: A Survey, Some Research Issues and Challenges,” IEEE Communications Surveys & Tutorials 21, no. 3 (2019): 2134–2168, https://doi.org/10.1109/COMST.2018.2867268.
N. Sharma and K. Kumar, “Resource Allocation Trends for Ultra Dense Networks in 5G and Beyond Networks: A Classification and Comprehensive Survey,” Physical Communication 48 (2021): 101415, https://doi.org/10.1016/j.phycom.2021.101415.
T. T. Bui, L. D. Nguyen, H. H. Kha, N.‐S. Vo, and T. Q. Duong, “Joint Clustering and Resource Allocation Optimization in Ultra‐Dense Networks With Multiple Drones as Small Cells Using Game Theory,” Sensors 23 (2023): 3899, https://doi.org/10.3390/s23083899.
Y. Zhou, Z. M. Fadlullah, B. Mao, and N. Kato, “A Deep‐Learning‐Based Radio Resource Assignment Technique for 5G Ultra Dense Networks,” IEEE Network 32, no. 6 (2018): 28–34, https://doi.org/10.1109/MNET.2018.1800085.
Z. Ye, “Intelligent Resource Allocation for Ultradense Networks Based on Improved Reinforcement Learning,” Scientific Programming 2022 (2022): 9312847, https://doi.org/10.1155/2022/9312847.
H. W. Kuhn, “The Hungarian Method for the Assignment Problem,” Naval Research Logistics Quarterly 2, no. 1–2 (1955): 83–97, https://doi.org/10.1002/nav.3800020109.
H. W. Kuhn, “Variants of the Hungarian Method for Assignment Problems,” Naval Research Logistics Quarterly 3, no. 4 (1956): 253–258.
J. Munkres, “Algorithms for the Assignment and Transportation Problems,” Journal of the Society for Industrial and Applied Mathematics 5, no. 1 (1957): 32–38, https://doi.org/10.1137/0105003.
M. Hosseini and S. Shirvani Moghaddam, “Sub‐Optimum Radio Resource Allocation in Vehicle‐To‐Vehicle Communications Based on a Multi‐Step Hungarian Algorithm, Presented at the IEEE Workshop on Microwave Theory and Techniques in Wireless Communications (MTTW), Riga, Latvia, 7‐8 Oct,” (2021).
S. Shirvani Moghaddam and N. Afzalkhani, “A Munkres‐Based D2D Resource Allocation Algorithm Aware of Cluster Information, Presented at the IEEE Workshop on Microwave Theory and Techniques in Wireless Communications (MTTW), Riga, Latvia, 5‐7 Oct,” (2022).
S. Shirvani Moghaddam, “Chapter 1: Introductory: Primary and Secondary Users in Cognitive Radio‐Based Wireless Communication Systems,” in Cognitive Radio in 4G/5G Wireless Communication Systems (IntechOpen Publisher, 2018), 1–12.
S. Shirvani Moghaddam, Cognitive Radio in 4G/5G Wireless Communication Systems (IntechOpen Publisher, 2018).
K. Shirvani Moghaddam and S. Shirvani Moghaddam, “Sorting Algorithm for Medium and Large Data Sets Based on Multi‐Level Independent Subarrays, Presented at the 10th IEEE International Conference on Communications, Network, and Satellite (COMNETSAT), Purwokerto, Indonesia, 17‐18 July,” (2021).
S. Shirvani Moghaddam and K. Shirvani Moghaddam, “A Threshold‐Based Sorting Algorithm for Dense Wireless Communication Networks,” IET Wireless Sensor Systems 13, no. 2 (2023): 37–47, https://doi.org/10.1049/wss2.12048.
S. Shirvani Moghaddam and K. Shirvani Moghaddam, “A General Framework for Sorting Large Data Sets Using Independent Subarrays of Approximately Equal Length,” IEEE Access 10 (2022): 11584–11607, https://doi.org/10.1109/ACCESS.2022.3145981.
S. Shirvani Moghaddam and K. Shirvani Moghaddam, “On the Performance of Mean‐Based Sort for Large Data Sets,” IEEE Access 9 (2021): 37418–37430, https://doi.org/10.1109/ACCESS.2021.3063205.
K. Shirvani Moghaddam and S. Shirvani Moghaddam, “A Fast Sub‐Optimum Access Point Selection in Ultra‐Dense Networks, Presented at the 10th IEEE International Conference on Communications, Network, and Satellite (COMNETSAT), Purwokerto, Indonesia, 17‐18 July,” (2021).
S. Shirvani Moghaddam and K. Shirvani Moghaddam, “Efficient Base‐Centric/User‐Centric Clustering Algorithm Based on Thresholding and Sorting, Presented at the 14th IEEE International Conference on Innovations in Information Technology (IIT), AlAin, UAE, 17–18 Nov,” (2020).
S. Shirvani Moghaddam and E. Ashoor, “Kuhn‐Munkres‐Based Sub‐Optimum Resource Allocation Algorithm for Ultra‐Dense Networks,” In Presented at the 11th International Symposium on Telecommunication (IST) (IEEE, 2024), 9–10.
J. Galeano‐Brajones, F. Luna‐Valero, J. Carmona‐Murillo, P. H. Zapata Cano, and J. F. Valenzuela‐Valdes, “Designing Problem‐Specific Operators for Solving the Cell Switch‐Off Problem in Ultra‐Dense 5G Networks With Hybrid MOEAs,” Swarm and Evolutionary Computation 78 (2023): 101290, https://doi.org/10.1016/j.swevo.2023.101290.
Y.‐F. Liu, T.‐H. Chang, M. Hong, et al., “A Survey of Recent Advances in Optimization Methods for Wireless Communications,” IEEE Journal on Selected Areas in Communications 42, no. 11 (2024): 2992–3031, https://doi.org/10.1109/JSAC.2024.3443759.
A. Goldsmith, Wireless Communications, 1st ed. (Cambridge University Press, 2005).
J. G. Proakis and M. Salehi, Digital Communications, 5th ed. (McGraw‐Hill, 2007).
A. Papoulis and S. U. Pillai, Probability, Random Variables, and Stochastic Processes, 4th ed. (McGraw‐Hill, 2002).
C. Serodio, J. Cunha, G. Candela, S. Rodriguez, X. R. Sousa, and F. Branco, “The 6G Ecosystem as Support for IoE and Private Networks: Vision, Requirements, and Challenges,” Future Internet 15, no. 11 (2023): 348, https://doi.org/10.3390/fi15110348.
S. Shirvani Moghaddam and M. Ghasemi, “A Low‐Complex/High‐Throughput Resource Allocation for Multicast D2D Communications, Presented at the 7th International Conference on Computer and Communication Engineering (ICCCE), Kuala Lumpur, Malaysia, 19‐20 Sept,” (2018).
A. K. Das, S. Sengupta, and S. Bhattacharyya, “A Group Incremental Feature Selection for Classification Using Rough Set Theory Based Genetic Algorithm,” Applied Soft Computing 65 (2018): 400–411, https://doi.org/10.1016/j.asoc.2018.01.040.
W. Qian, J. Chai, Z. Xu, and Z. Zhang, “Differential Evolution Algorithm With Multiple Mutation Strategies Based on Roulette Wheel Selection,” Applied Intelligence 48, no. 10 (2018): 3612–3629, https://doi.org/10.1007/s10489‐018‐1153‐y.
J. Li, Q. Pan, and K. Mao, “Hybrid PSO Optimization for Hybrid Flowshop Scheduling Problem With Maintenance Activities,” Scientific World Journal 2014 (2014): 596850, https://doi.org/10.1155/2014/596850.
X.‐S. Yang and S. Deb, “Cuckoo Search via Lévy Flights,” In Presented at the World Congress on Nature & Biologically Inspired Computing (NaBIC) (IEEE, 2009), 9–11.
A. H. Gandomi, X. S. Yang, and A. H. Alavi, “Cuckoo Search Algorithm: A Metaheuristic Approach to Solve Structural Optimization Problems,” Engineering With Computers 29 (2013): 17–35, https://doi.org/10.1007/s00366‐011‐0241‐y.
S. Mirjalili, “How Effective Is the Grey Wolf Optimizer in Training Multi‐Layer Perceptrons,” Applied Intelligence 43 (2015): 150–161, https://doi.org/10.1007/s10489‐014‐0645‐7.
S. Saremi, S. Z. Mirjalili, and S. M. Mirjalili, “Evolutionary Population Dynamics and Grey Wolf Optimizer,” Neural Computing and Applications 26 (2015): 1257–1263, https://doi.org/10.1007/s00521‐014‐1806‐7.
© 2025. This work is published under http://creativecommons.org/licenses/by/4.0/ (the "License"). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.