[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Next Article in Journal
A Spectral Investigation of Criticality and Crossover Effects in Two and Three Dimensions: Short Timescales with Small Systems in Minute Random Matrices
Next Article in Special Issue
Multi-Server Multi-Function Distributed Computation
Previous Article in Journal
Thermodynamic Entropy-Based Fatigue Life Assessment Method for Nickel-Based Superalloy GH4169 at Elevated Temperature Considering Cyclic Viscoplasticity
Previous Article in Special Issue
Structural Properties of the Wyner–Ziv Rate Distortion Function: Applications for Multivariate Gaussian Sources
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Joint Communication and Computation Design for Probabilistic Semantic Communications

1
College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China
2
Zhejiang Provincial Key Laboratory of Information Processing, Communication and Networking (IPCAN), Hangzhou 310027, China
3
Department of Electrical and Computer Engineering, Institute for Data Science and Computing, University of Miami, Coral Gables, FL 33146, USA
4
Department of Electrical and Computer Engineering, Princeton University, Princeton, NJ 08544, USA
*
Author to whom correspondence should be addressed.
Entropy 2024, 26(5), 394; https://doi.org/10.3390/e26050394
Submission received: 25 February 2024 / Revised: 22 April 2024 / Accepted: 26 April 2024 / Published: 30 April 2024

Abstract

:
In this paper, the problem of joint transmission and computation resource allocation for a multi-user probabilistic semantic communication (PSC) network is investigated. In the considered model, users employ semantic information extraction techniques to compress their large-sized data before transmitting them to a multi-antenna base station (BS). Our model represents large-sized data through substantial knowledge graphs, utilizing shared probability graphs between the users and the BS for efficient semantic compression. The resource allocation problem is formulated as an optimization problem with the objective of maximizing the sum of the equivalent rate of all users, considering the total power budget and semantic resource limit constraints. The computation load considered in the PSC network is formulated as a non-smooth piecewise function with respect to the semantic compression ratio. To tackle this non-convex non-smooth optimization challenge, a three-stage algorithm is proposed, where the solutions for the received beamforming matrix of the BS, the transmit power of each user, and the semantic compression ratio of each user are obtained stage by stage. The numerical results validate the effectiveness of our proposed scheme.

1. Introduction

The rapid development of wireless communication technology has initiated an era of unprecedented connectivity [1,2] that brings with it a growing complexity of data transmission. Moreover, the principles of information theory have undeniably shaped modern communication systems. While this model has been invaluable, it inherently falls short of capturing the richer semantic dimension of the information being exchanged [3]. In response to the limitations of traditional information theory, the concept of semantic communication has emerged as a compelling technology [4] to handle the growing complexity of data transmission. Semantic communication transcends the mere exchange of abstract symbols, instead placing an emphasis on the meaning and purpose of a message [5]. Different from conventional communication that focuses on data rate maximization, semantic communication prioritizes data meaning transmission.
The advent of semantic communication has gained significant attention in the realm of communication research, representing a departure from established paradigms [6]. However, despite its growing importance, the concept of semantic communication remains in a state of ongoing evolution [7] characterized by the lack of a universally accepted definition, a comprehensive theoretical framework, and a unified understanding [8]. Research in this field is exploratory, reflecting the challenges and opportunities of semantic communication in modern communication systems.
To achieve the advantages of semantic communication, one of the intriguing challenges is how to effectively obtain key performance indicators (KPIs) for performance evaluation. These KPIs include various aspects such as semantic computation consumption, the quality of semantic information extraction, and the semantic capacity. Current research mainly employs two methodologies to derive KPIs in semantic communication. The first approach relies on simulation, where semantic-related metrics, such as the semantic rate, are obtained utilizing functions derived from simulation results [9,10,11,12]. The second approach involves analysis, where expressions related to semantic communication, such as semantic computation consumption, are derived through theoretical analysis [13,14,15,16]. In simulation-based studies, Yan et al. achieved a maximum spectral efficiency by optimizing channel assignment and the number of semantic symbols [9,17]. Addressing energy efficiency, the authors of [18] conducted optimization for total energy consumption under latency constraints. Cang et al. integrated semantic communication with mobile edge computing (MEC), minimizing energy consumption by optimizing semantic-aware division factors and managing communication and computation resources [19]. In analysis-based studies, the authors of [13] optimized the total energy of the entire system through strategic semantic-level selections.
In addition to characterizing the KPIs of semantic communication, the representation of semantic information is also a challenging aspect of semantic communication [20]. Although many approaches use auto-encoders for semantic compression [21,22,23], resulting in data of a small size that are considered to be semantic information, this output often lacks interpretability and cannot be directly validated by interaction with human understanding. To address this limitation, some works [24,25] proposed the use of knowledge graphs as a representation method aligned with human logic. A knowledge graph generally consists of a set of nodes connected by edges [26]. Each node represents an entity, which can be a real-world object, a concept, a temporal reference, etc. The edges represent the semantic relationship between these entities. An illustrative example of a knowledge graph is shown in Figure 1. Notably, knowledge graphs efficiently encapsulate substantial information within a compact data size, making them an ideal candidate for semantic information representation.
Recently, there has been significant research investigating semantic communication over wireless networks. The authors of [27] introduced deep learning techniques to join the source–channel coding of text, which laid the foundation for a semantic communication system for text transmission. This research offered novel perspectives and methods for effectively encoding and transmitting textual information. Building upon this, Yao et al. further explored the design of text transmission by proposing an iterative semantic coding approach [28]. The objective of this approach was to accurately capture and transmit the semantic content of text, thereby enhancing the efficiency and accuracy of transmission. Further, semantic triples and knowledge graphs have been employed to enable semantic communication. Liu et al. investigated a task-oriented semantic communication approach based on semantic triples [29]. This approach focused on effectively encoding and transmitting key semantic information based on specific task requirements. Additionally, the work in [30] proposed a cognitive semantic communication framework with knowledge graphs. This work presented a simple, general, and interpretable solution for detecting semantic information by utilizing triples as semantic symbols. Considering the unique properties of semantic communication, resource allocation and performance optimization are crucial factors to consider in the development of semantic communication systems. Wang et al. employed deep reinforcement learning to address the resource allocation problem in semantic communication [31]. This study introduced new strategies to effectively allocate communication resources to ensure efficient transmission of semantic information. However, the aforementioned works [27,28,29,30,31] did not take into account the computational power requirements of semantic communication systems, which is important for energy-constrained wireless networks [32].
In this paper, we develop a multi-user probabilistic semantic communication (PSC) framework that jointly considers transmission and computation consumption. The key contributions of this work are summarized as follows:
  • We consider a PSC network in which multiple users employ semantic information extraction techniques to compress their original large-sized data and transmit the extracted information to a multi-antenna base station (BS). In our model, users’ large-sized data are extracted as extensive knowledge graphs and are compressed based on the shared probability graph between the users and the BS.
  • We formulate an optimization problem that aims to maximize the sum equivalent rate of all users while considering total power and semantic resource limit constraints. This joint optimization problem takes into account the trade-off between the transmission efficiency and computation complexity.
  • To solve this non-convex, non-smooth problem, a low-complexity three-stage algorithm is proposed. In stage 1, the received beamforming matrix is optimized using the minimum mean square error (MMSE) strategy. In stage 2, we substitute the transmit power with the semantic compression ratio and develop an alternating optimization (AO) method to perform a rough search for the semantic compression ratio. In stage 3, gradient ascent is used to refine the semantic compression ratio. Numerical results show the effectiveness of the proposed algorithm.
The remainder of this paper is organized as follows. The system model and problem formulation are described in Section 2. The algorithm design is presented in Section 3. Simulation results are analyzed in Section 4. Conclusions are drawn in Section 5.

2. System Model and Problem Formulation

Consider an uplink wireless PSC network with one multi-antenna BS and N single-antenna users, as shown in Figure 2. The BS is equipped with M antennas, and the set of users is represented by N . Each user, denoted by n, has large-sized data D n to be transmitted. Due to limited wireless resources, the users need to extract the small-sized semantic information C n from the original data D n . In the considered model, users first extract the semantic information based on their individual local probability graphs and then transmit the semantic data to the BS.

2.1. Semantic Communication Model

We employ probability graphs as the knowledge base between the semantic transmitter (each user) and the semantic receiver (BS). A probability graph integrates information from multiple knowledge graphs, extending the conventional knowledge graph by introducing the dimension of relational probability. An illustrative example of a probability graph is depicted in Figure 3. A traditional knowledge graph comprises numerous triples, and each triple can be represented by
ε = ( h , r , t ) ,
where h is the head entity, t denotes the tail entity, and r represents the relation between h and t. In a traditional knowledge graph, the relations are typically fixed. In contrast, in a probability graph, each relation is associated with a specific probability, representing the likelihood of that particular relation occurring under the given conditions of a fixed head entity and tail entity.
We assume that each user needs to transmit several knowledge graphs. These knowledge graphs are generated from extensive textual data (picture/audio/video data can also be applied) after undergoing named entity recognition (NER) [33] and relation extraction (RE) [34], resulting in abstracted information. Using the shared probability graph between a user and the BS, one can further compress the transmitted knowledge graphs.
The probability graph extends the dimensionality of relations by statistically enumerating the occurrences of various relations associated with the same head and tail entities across diverse knowledge graph samples. Leveraging the statistical information from the probability graph, a multidimensional conditional probability matrix can be constructed. This matrix reflects the likelihood of a specific triple being valid under the condition that certain other triples are valid. This enables the omission of relations in the knowledge graph before transmission, resulting in data compression. However, it is crucial to note that achieving a smaller data size necessitates a lower semantic compression ratio, which demands higher-dimensional conditional probabilities. This decrease in semantic compression ratio comes at the cost of an increased computational load, thus presenting a trade-off between communication and computation for the considered PSC network. The specific implementation details of the probability graph can be found in [13].
Within the framework of the considered PSC network, each user possesses a personalized local probability graph that stores statistical information about their historical data. Each user n individually performs semantic information extraction, compressing original large-sized data D n based on its stored probability graph, with the semantic compression ratio denoted by ρ n . Subsequently, the obtained compressed data, C n , are transmitted to the BS with transmit power p n t . Meanwhile, the BS maintains identical probability graphs corresponding to all N users. Once the BS receives the semantic data from user n, it conducts semantic inference to recover the compressed semantic information using the shared probability graph of user n. The overall framework of the considered PSC network is depicted in Figure 4.
Remark 1.
The fundamental concept of PSC is the utilization of the historical data transmitted by the transceivers, which are then condensed into a probability graph containing specific data features. This probability graph serves as a common knowledge base for the transceivers. The probability graph is stored in the transceivers, and when new data are sent, the transceivers can compress and recover the data according to the shared probability graph, thereby achieving the effect of saving communication resources.

2.2. Transmission Model

As mentioned above, the BS is equipped with M antennas to serve N single-antenna users. We assume that the number of users is not greater than the number of antennas in the BS, that is, N M . Therefore, space-division multiple access (SDMA) can be employed.
We consider the uplink transmission from all users to the BS, and the received signal at the BS can be mathematically represented by
y = W H H x + W H n ,
where W = [ w 1 , w 2 , , w N ] C M × N represents the received beamforming matrix at the BS, with w n C M × 1 being the receive beamforming vector for user n. The matrix H = [ h 1 , h 2 , , h N ] C M × N denotes the multiple-access channel matrix from all N users to the antenna array of the BS. Each vector h n C M × 1 represents the channel vector between the BS and user n, and is determined by the specific propagation environment. Here, we assume [ H ] i , j CN ( 0 , β ) , where [ · ] i , j denotes an element in a matrix and β signifies the long-term channel power gain. The vector x = [ x 1 , x 2 , , x N ] T C N × 1 denotes the transmitted signals of the users with transmit power p = [ p 1 t , p 2 t , , p N t ] T , where the transmit power of user n is denoted by p n t . The vector n = [ n 1 , n 2 , , n M ] T represents additive white Gaussian noise (AWGN) at the BS. We assume that [ n ] i CN ( 0 , σ 2 ) , where [ · ] i denotes an element in a vector and σ 2 denotes the average noise power.
For the uplink transmission that utilizes linear combining at the BS, the received signal-to-interference-plus-noise ratio (SINR) for the signal from user n can be given by
γ n = w n H h n 2 p n t k = 1 , k n N w n H h k 2 p k t + w n 2 2 σ 2 ,
and the achievable rate of user n can be expressed as
C n = log 2 ( 1 + γ n ) .
In the considered PSC network, the original large-sized data D n are compressed into small-sized data C n with a semantic compression ratio prior to transmission. The semantic compression ratio for user n is defined as
ρ n = size ( C n ) size ( D n ) ,
where the function size ( · ) quantifies the data size in terms of bits.
Hence, we can calculate an equivalent rate for user n, denoted by
R n = 1 ρ n C n ,
which represents the transmission rate perceived by the receiver following the process of decoding. Due to the fact that one bit in the compressed data C n can represent 1 / ρ n bits in the original data D n , we multiply by the factor 1 / ρ n in equivalent expression (6).

2.3. Computation Model

Each user n needs to perform semantic information extraction based on their local probability graph to compress the original data D n into smaller-sized data C n . This operation relies on computational resources, and it is important to note that the lower the semantic compression ratio ρ n , the higher the computation load becomes.
According to Equation (19) in [13], the computation load for the considered probability graph-based PSC network can be expressed as
g ρ = A 1 ρ + B 1 , L 1 < ρ 1 , A 2 ρ + B 2 , L 2 < ρ L 1 , A S ρ + B S , L S ρ L S 1 ,
where A s < 0 represents the slope, B s > 0 stands for the constant term, and L s is the boundary for each segment s = 1 , 2 , , S . These parameters are system-specific and are determined by the characteristics of the probability graphs. From (7), the computation load expression is a piecewise function, which is due to the fact that semantic inference involves multiple levels of conditional probability functions and each level of conditional probability function results in one linear computation load expression.
Based on (7), the computation load, denoted by g ( ρ ) , exhibits a segmented structure with S levels, and the slope magnitude decreases in discrete segments, as depicted in Figure 5. This is because when the compression ratio is high, only low-dimensional conditional probabilities are employed, resulting in lower computational demands. However, as the compression ratio decreases, the need for higher-dimensional information arises. With higher information dimensions, the computation load becomes more intensive. Each transition in the segmented function g ( ρ ) represents the utilization of probabilistic information with more information for semantic information extraction.
Given the piecewise property of the computation load function, the computation power of user n can be written as
p n c = g n ( ρ n ) p 0 ,
where p 0 represents a positive constant denoting the computation power coefficient, g n ( ρ n ) = A n s ρ n + B n s , if L n s ρ n L n ( s 1 ) , s = 1 , 2 , , S , and L n s < L n ( s 1 ) < < L n 1 < L n 0 = 1 .
In this paper, our primary focus is on the computation load at the user side, as we are specifically addressing the uplink transmission scenario. In this context, each user needs to perform an information transmission task, and as such, the computational overhead associated with semantic decoding at the BS is ignored since the BS always has a high power budget.

2.4. Problem Formulation

Given the considered system model, our objective is to maximize the sum of equivalent rates for all users through jointly optimizing the semantic compression ratio of each user and the transmit power of each user, and to receive the beamforming matrix of the BS while considering the maximum total power of each user. The sum rate maximization problem can be formulated as
max ρ , p , W n = 1 N R n ,
s . t . p n t + p n c p n max , n N ,
p n t 0 , n N ,
ρ n min ρ n 1 , n N ,
where ρ = [ ρ 1 , ρ 2 , , ρ N ] T , N = { 1 , 2 , , N } , and ρ n min is the semantic compression limit for user n. Constraint (9b) reflects a limit on the sum of the transmit power and computation power for user n, ensuring it remains within the overall power limit p n max . Constraint (9c) enforces the non-negativity of the user’s transmit power. Lastly, constraint (9d) bounds the semantic compression ratio for each user.
It is essential to recognize that the semantic compression ratio and transmit power are tightly coupled in problem (9a). Smaller compression ratios lead to larger values of the objective function, but the presence of constraint (9b) limits the transmit power, consequently reducing the objective function. Therefore, achieving the right balance between the effects of the semantic compression ratio and the transmit power is the key to the solution of problem (9a). Another important aspect of problem (9a) is the inclusion of the segmented function g n ( ρ n ) in constraint (9b), which introduces a distinct challenge to the optimization process. Since the objective function is highly non-convex and constraint (9b) is non-smooth, it is generally hard to obtain the optimal solution of problem (9a) with existing optimization tools in polynomial time. Thus, we develop a suboptimal solution in the next section.

3. Algorithm Design

In this section, a three-step algorithm is proposed to solve problem (9a), i.e., MMSE for the received beamforming matrix, rough search for the semantic compression ratio, and refined search for the semantic compression ratio. These three stages will be explained in detail below.

3.1. Stage 1: MMSE for the Received Beamforming Matrix

With the advancement of multiple-input multiple-output (MIMO) technology, various beamforming methods, including maximum ratio combining (MRC), zero forcing (ZF), and MMSE, have been developed to deal with multi-user interference. In this section, we employ the MMSE strategy to identify the received beamforming matrix W , which is effective in dealing with high noise power situations. Based on the MMSE technique, the closed-form solution of received beamforming matrix W is given in the following lemma.
Lemma 1.
For any given transmit power of each user, i.e., p , the optimal linear received beamforming matrix W of the BS under the MMSE strategy can be written as
W ( P ) = H P H H + σ 2 I M 1 H P ,
where P = diag { p } represents a diagonal matrix with [ P ] i , i = [ p ] i , and I M is an identical matrix of size M × M .
Proof. 
See Appendix A.    □
According to Lemma 1, optimal MMSE received beamforming is achieved using a closed-form solution, which is a function of the transmit power of all users. Based on the obtained W ( P ) , we have
w n = p n t H P H H + σ 2 I M 1 h n .
For notation convenience, we define
U n k w n H h k 2 = p n t 2 h n H H P H H + σ 2 I M 1 h k 2 ,
and
v n w n 2 2 σ 2 = p n t σ 2 H P H H + σ 2 I M 1 h n 2 2 .
Thus, by substituting (11) into (3), the received SINR for the signal from user n can be rewritten as
γ n = U n n p n t k = 1 , k n N U n k p k t + v n .
With the above variable substitution, problem (9a) can be reformulated as
max ρ , p n = 1 N 1 ρ n log 2 1 + U n n p n t k = 1 , k n N U n k p k t + v n ,
s . t . p n t + p n c p n max , n N ,
p n t 0 , n N ,
ρ n min ρ n 1 , n N .
In this stage, the received beamforming matrix W is optimized using the MMSE strategy with a closed-form solution. Hence, the variables that require optimization in problem (9a) are reduced, and the problem we need to solve becomes problem (15a).

3.2. Stage 2: Rough Search for the Semantic Compression Ratio

In stage 2, we will roughly determine the semantic compression ratio ρ n for each user by identifying the segment in the piecewise function g n ( ρ n ) where ρ n falls.
Without loss of generality, it is assumed that when the semantic compression ratio is equal to ρ n min , the computation power p n c exceeds the total power limit p n max , i.e.,
g n ( ρ n min ) p 0 p n max , n N .
This is because as the semantic compression ratio tends to ρ n min , the computation load rises dramatically as the probability dimension of the computation becomes very high.
With the above assumption, the following theorem can be derived.
Theorem 1.
The optimal semantic compression ratio ρ n * and transmit power p n t * of problem (15a) must satisfy
p n t * + g n ( ρ n * ) p 0 = p n max , n N .
Proof. 
See Appendix B.    □
Remark 2.
Theorem 1 enables our algorithm to achieve fairness [35] in terms of the equivalent rate of each user in the considered PSC system. Due to the fact that each user possesses a specific power budget for communication and computation, and our algorithm takes full advantage of each user’s power for communication and computation in accordance with Theorem 1, it follows that every user will receive a relatively fair equivalent rate with our algorithm.
Theorem 1 implies that constraint (15b) will always hold with equality for the optimality of problem (15a). Based on Theorem 1, we can substitute p n t = p n max g n ( ρ n ) p 0 into problem (15a). Thus, problem (15a) can be rewritten as
max ρ n = 1 N 1 ρ n log 2 1 + U n n p n max g n ( ρ n ) p 0 k = 1 , k n N U n k p k max g n ( ρ k ) p 0 + v n ,
s . t . p n max g n ( ρ n ) p 0 0 , n N ,
ρ n min ρ n 1 , n N .
Note that U n k and v n are variables associated with the transmit power p according to Equations (12) and (13). Since the transmit power p n t is also a function of the semantic compression ratio ρ n , U n k and v n become variables only associated with the semantic compression ratio ρ . Therefore, problem (18a) is related solely to the semantic compression ratio.
However, the difficulty of solving problem (18a) still exists due to the non-convexity of the objective function and the non-smoothness of the computation load function, g n ( ρ n ) . To handle the non-smoothness of g n ( ρ n ) , it can be reformulated as
g n ( ρ n ) = s = 1 S θ n s ( A n s ρ n + B n s ) , θ n s { 0 , 1 } , s = 1 S θ n s = 1 ,
where S is the number of segments of the piecewise function g n ( ρ n ) , and θ n s identifies the specific segment within which ρ n falls.
Therefore, problem (18a) can be rewritten as
max Θ , ρ n = 1 N 1 ρ n log 2 1 + U n n p n max p 0 s = 1 S θ n s ( A n s ρ n + B n s ) k = 1 , k n N U n k p k max p 0 s = 1 S θ k s ( A k s ρ k + B k s ) + v n ,
s . t . s = 1 S θ n s ( A n s ρ n + B n s ) p n max p 0 , n N ,
ρ n min ρ n 1 , n N ,
s = 1 S θ n s = 1 , n N ,
θ n s { 0 , 1 } , n N ,
where Θ = [ θ 1 , θ 2 , , θ N ] , and θ n = [ θ n 1 , θ n 2 , , θ n S ] T .
In problem (20a), both the binary integer matrix Θ and continuous variable ρ are involved. Thus, problem (20a) becomes a challenging mixed-integer programming problem.
It is important to note that Θ and ρ are highly coupled in objective function (20a) and constraint (20b). If ρ is determined, then so is Θ . However, a determined Θ cannot result in a determined ρ , but it can narrow down the possible range of ρ by specifying the particular segment in which ρ exists.
Therefore, we obtain an approximate estimation of the semantic compression ratio ρ by determining Θ as follows.
For convenience, we define
ρ n s = L n ( s 1 ) + L n s 2 , 1 s S ,
which represents the middle value of the semantic compression ratio in segment s for user n.
We can see that ρ n s is a fixed value denoting the midpoint of segment s in g n ( ρ n ) . Therefore, we use ρ n s for approximating the value of ρ n in every segment s. By making this approximation, problem (20a) can be simplified as
max Θ n = 1 N 1 s = 1 S θ n s ρ n s log 2 1 + U n n p n max p 0 s = 1 S θ n s ( A n s ρ n s + B n s ) k = 1 , k n N U n k p k max p 0 s = 1 S θ k s ( A k s ρ k s + B k s ) + v n ,
s . t . s = 1 S θ n s ( A n s ρ n s + B n s ) p n max p 0 , n N ,
s = 1 S θ n s = 1 , n N ,
θ n s { 0 , 1 } , n N .
Problem (22a) is an integer programming problem with respect to the Boolean matrix Θ .
Since the objective function of problem (22a) remains intractable and challenging to convert into a convex function, we present an AO method to iteratively determine the integer matrix Θ .
With the given semantic compression ratio level indicating vectors of other N 1 users, we need to determine the optimal θ n for the current user n. Then, we have the following problem
max θ n n = 1 N 1 s = 1 S θ n s ρ n s log 2 1 + U n n p n max p 0 s = 1 S θ n s ( A n s ρ n s + B n s ) k = 1 , k n N U n k p k max p 0 s = 1 S θ k s ( A k s ρ k s + B k s ) + v n ,
s . t . s = 1 S θ n s ( A n s ρ n s + B n s ) p n max p 0 , n N ,
s = 1 S θ n s = 1 , n N ,
θ n s { 0 , 1 } , n N .
Since θ n is a one-hot vector of size S × 1 , we can simply iterate through all the possible locations where ‘1’ could occur, which has S possibilities. The θ n corresponding to the maximum objective function value is saved for subsequent iterations.
The iteration terminates when the objective function value of problem (23a) converges or the iteration count reaches the maximum limit of I max . Algorithm 1 summarizes the AO method for solving the integer programming problem (22a).
Algorithm 1 Alternating Optimization for Determining Integer Matrix Θ
1:
Initialize Θ ( 0 ) . Set iteration index i = 0 .
2:
repeat
3:
   for  n = 1 to N do
4:
     for  s = 1 to S do
5:
        if Constraint (23b) is satisfied then
6:
            Calculate the objective value for θ n s = 1 , θ n t = 0 , t s .
7:
        else
8:
            Set the objective value as zero.
9:
        end if
10:
     end for
11:
     Update θ n which corresponds to the maximum objective value.
12:
   end for
13:
   Obtain Θ ( i + 1 ) .
14:
   Set i = i + 1 .
15:
until the objective value of problem (9a) converges or i > I max .
16:
Output: The optimized Boolean matrix Θ .
In this stage, the transmit power p is substituted with the semantic compression ratio ρ according to Theorem 1. Furthermore, the matrix Θ , which determines the range of ρ n for each user, is optimized employing the AO method. Next, we need to perform a refined search for the semantic compression ratio ρ .

3.3. Stage 3: Refined Search for the Semantic Compression Ratio

To achieve an accurate value for the semantic compression ratio, a refined search is required in stage 3. This is because the result obtained in stage 2 is only an approximate estimate of the semantic compression ratio.
Based on the Boolean matrix Θ obtained in stage 2, we can determine the segment in which ρ falls. Denote the selected segment for user n by S n , which means
g n ( ρ n ) = A n ( S n ) ρ n + B n ( S n ) , L n ( S n ) ρ n L n ( S n 1 ) .
Once the segment of ρ n is determined, the computation load function g n ( ρ n ) becomes a linear function instead of a non-smooth piecewise function.
Therefore, the problem needing to be solved in stage 3 can be reformulated as
max ρ n = 1 N 1 ρ n log 2 1 + U n n p n max p 0 A n ( S n ) ρ n + B n ( S n ) k = 1 , k n N U n k p k max p 0 A k ( S k ) ρ k + B k ( S k ) + v n ,
s . t . A n ( S n ) ρ n + B n ( S n ) p n max p 0 , n N ,
L ( S n ) ρ n L n ( S n 1 ) , n N .
Problem (25a) is no longer non-smooth, as the piecewise function g n ( ρ n ) has been degraded to a linear function. However, problem (25a) remains non-convex, as the objective function is highly non-convex with respect to ρ . Thus, it is generally hard to obtain the globally optimal solution for problem (25a). Next, we employ the gradient ascent method to obtain a suboptimal solution.
For convenience, we define
f ρ = n = 1 N 1 ρ n log 2 1 + U n n p n max p 0 A n ( S n ) ρ n + B n ( S n ) k = 1 , k n N U n k p k max p 0 A k ( S k ) ρ k + B k ( S k ) + v n ,
which is the objective function of problem (25a). Note that it is only related to the semantic compression ratio ρ .
Thus, problem (25a) can be rewritten as
max ρ f ρ ,
s . t . ρ n p n max / p 0 B n ( S n ) A n ( S n ) , n N ,
L n ( S n ) ρ n L n ( S n 1 ) , n N .
To begin, set the initial semantic compression ratio as
ρ ( 0 ) = ρ 1 ( S 1 ) , ρ 2 ( S 2 ) , , ρ N ( S N ) .
Let ρ ( t 1 ) denote the semantic compression ratio obtained in the ( t 1 ) -th iteration. Subsequently, we can calculate the gradient of the objective function f ρ at ρ ( t 1 ) according to the definition, i.e.,
ρ f ρ ( t 1 ) n = f ρ ρ n | ρ = ρ ( t 1 ) = lim δ 0 f ρ ( t 1 ) + δ o N n f ρ ( t 1 ) δ ,
where o N n is a Boolean vector of size N × 1 with [ o N n ] n = 1 and [ o N n ] m = 0 , m n .
Then, we can update ρ ( t ) in the t-th iteration towards the gradient ascent direction for a higher f ρ . The update strategy can be written as
ρ ( t ) = B ρ ( t 1 ) + τ ( t ) ρ f ρ ( t 1 ) ,
where τ ( t ) represents the step size in the t-th iteration, and B ρ refers to a boundary function which ensures that the semantic compression ratio stays within the range determined by constraints (27b) and (27c). Specifically, the boundary function B ρ can be expressed as
B ρ n = [ ρ ] n min , [ ρ ] n < [ ρ ] n min , ρ ] n , [ ρ ] n min [ ρ ] n [ ρ ] n max , ρ ] n max , [ ρ ] n > [ ρ ] n max ,
where
[ ρ ] n min = max p n max / p 0 B n ( S n ) A n ( S n ) , L ( S n ) ,
and
[ ρ ] n max = L n ( S n 1 ) .
Both the convergence rate and the ultimate outcome of the gradient ascent algorithm exhibit a pronounced sensitivity to the chosen step size. Oversized step sizes may expedite convergence but risk non-convergence. Conversely, overly small step sizes encourage convergence with more iterations, although resulting in a more optimal solution. Consequently, this paper employs the backtracking linear search method to ascertain a judicious step size. Concretely, within the t-th iteration, the step size initiates with a sizeable positive value, i.e., τ ( t ) = τ ¯ , and diminishes gradually by repeating
τ ( t ) α τ ( t ) , α ( 0 , 1 ) ,
until the Armijo–Goldstein condition is satisfied, expressed as
f ρ ( t ) f ρ ( t 1 ) + ξ τ ( t ) ρ f ρ ( t 1 ) 2 2 ,
where ξ ( 0 , 1 ) serves as a hyper-parameter regulating the step size magnitude.
The algorithm will terminate when the increase in f ρ between the two most recent iterations is less than a very small positive number, denoted by ϵ , or the algorithm reaches the maximum iteration limit of T max . Algorithm 2 provides a summary of the gradient ascent algorithm.
Algorithm 2 Gradient Ascent Algorithm for a Refined Search of the Semantic Compression Ratio
1:
Initialize ρ ( 0 ) . Set iteration index t = 0 .
2:
Obtain f ρ according to (26).
3:
repeat
4:
   Calculate ρ f ρ ( t 1 ) according to (29).
5:
   Initialize the step size τ ( t ) = τ ¯ .
6:
   Update ρ according to (30).
7:
   repeat
8:
       Diminish the step size according to (34).
9:
       Update ρ according to (30).
10:
  until the Armijo–Goldstein condition (35) is satisfied.
11:
  Set t = t + 1 .
12:
until  f ρ ( t ) f ρ ( t 1 ) < ϵ or t > T max .
13:
Output: Semantic compression ratio ρ for all users.
In this stage, the non-smooth computation function g n ( ρ n ) is degenerated to a linear function according to the Boolean matrix Θ obtained in stage 2. Then, a gradient ascent algorithm is employed to tackle the non-convex problem (25a). This stage outputs the refined semantic compression ratio ρ for all users.

3.4. Algorithm Analysis

The overall joint transmission and computation resource allocation algorithm for a multi-user PSC network is presented in Algorithm 3. Algorithm 3 consists of three stages that are executed sequentially. Therefore, the overall complexity of Algorithm 3 can be calculated as O ( Stage 1 ) + O ( Stage 2 ) + O ( Stage 3 ) , where O ( Stage i ) denotes the computation complexity of stage i. The complexity of these three stages is analyzed as follows.
In stage 1, we derive the closed-form solution of the received beamforming matrix W using the MMSE strategy. Therefore, the computation complexity of stage 1 lies in computing W . To compute W , we need to perform four matrix multiplications and one matrix inversion. Hence, the computation complexity of stage 1 can be expressed as O ( M N 2 + M 2 N + M 3 ) .
In stage 2, we employ the AO method to obtain the Boolean matrix Θ . If we exhaustively search all possibilities of Θ , the computation complexity would be O ( S N ) , which is infeasible. Although the result obtained by the AO method may not be the globally optimal solution, it significantly reduces the complexity to O ( I max S N ) . In Algorithm 1, the computation complexity for calculating the objective value in line 6 is O ( N 2 ) . Therefore, the computation complexity of stage 2 is O ( I max S N 3 ) .
In stage 3, we utilize the gradient ascent algorithm to search for the refined semantic compression ratio ρ . In Algorithm 2, the computation complexity for calculating the gradient in line 4 is O ( N 3 ) . Let B max denote the maximum iterations of the backtracking linear search in lines 7 to 10 of Algorithm 2. Thus, the complexity of Algorithm 2 is O ( B max N ) . Consequently, the computation complexity of stage 3 is O ( T max ( N 3 + B max N ) ) .
As a result, the total complexity of Algorithm 3 can be expressed as O ( M N 2 + M 2 N + M 3 + I max S N 3 + T max ( N 3 + B max N ) ) = O ( M 3 + I max S N 3 ) since N M .
Algorithm 3 Joint Transmission and Computation Resource Allocation Algorithm for Multi-User PSC Network
1:
Initialize W , p , and ρ .
2:
Stage 1:
3:
   Update the received beamforming matrix W according to (10).
4:
Stage 2:
5:
   Substitute the transmit power p with the semantic compression ratio ρ according to Theorem 1.
6:
   Rewrite g n ( ρ n ) according to (19).
7:
   Calculate ρ n s according to (21).
8:
   Solve problem (22a) using Algorithm 1.
9:
Stage 3:
10:
   Update g n ( ρ n ) according to (24).
11:
   Solve problem (25a) using Algorithm 2.
12:
Output: The optimized W , p and ρ .
Since deducing the optimality of problem (9a) is challenging in theory, obtaining the globally optimal solution would generally lead to an exponential computation complexity, which is unrealistic. Therefore, we propose Algorithm 3 to provide a suboptimal solution for problem (9a) with a polynomial computation complexity.
Remark 3.
A re-optimization process is needed when significant changes in the network state are detected. This ensures that the allocations remain efficient and adaptive to the prevailing conditions. Based on the aforementioned analysis, the computation complexity of our proposed optimization algorithm is of polynomial complexity. Consequently, the re-optimization process will not have a significant impact on performance.

4. Simulation Results

In the simulations, the considered PSC network comprises eight users, while the BS is equipped with 16 antennas. The multiple-access channel matrix H is configured with a long-term channel power gain β set to −90 dB, and the noise power is set to −10 dBm. Furthermore, we set the computation power coefficient to 1 and the maximum power limit to 30 dBm. For the semantic information extraction task based on the probability graph, we adopt the same parameters as in [15]. A summary of the main system parameters is provided in Table 1.
The proposed multi-user PSC system, enhanced by the probability graph with joint transmission and computation optimization, is labeled as the ‘PSC’ scheme. For comparisons, we incorporate several benchmark schemes as follows.
  • ‘Non-semantic’: This benchmark scheme represents a conventional communication approach where the original data are directly transmitted without employing semantic compression. In this scheme, all users’ power is allocated solely to transmission, without any optimization for joint transmission and computation.
  • ‘PSC-S2’: This scheme is a simplified version of the ‘PSC’ scheme, where the optimization process is performed only up to stage 2. The final result is the roughly estimated semantic compression ratio obtained from this stage.
  • ‘PSC-ZF’: In this scheme, the ZF strategy is employed at stage 1. This means that the received beamforming matrix W is calculated as W = H ( H H H ) 1 . The remaining stages are the same with the ‘PSC’ scheme.
In Figure 6, we assess the convergence of the proposed ‘PSC’ scheme. Two convergent platforms are discernible: the first pertains to the AO algorithm, while the second corresponds to the gradient ascent algorithm. During stage 2, the objective value exhibits a rapid ascent and subsequent convergence. This can be attributed to the fact that, in this stage, the AO algorithm addresses an integer programming problem with a discrete and relatively small variable space. Upon convergence of the AO algorithm, the ‘PSC’ scheme progresses to stage 3, wherein the gradient ascent algorithm is activated. In stage 3, the objective function converges to a value higher than that achieved in stage 2. This observation serves as validation for the effectiveness of the gradient ascent algorithm. Throughout the iterative process, the objective value steadily increases, eventually reaching a highly stable value. This outcome substantiates the efficacy of the comprehensive algorithm design.
In Figure 7, the correlation between the sum of the equivalent rate and the number of users is depicted. The figure reveals a consistent increase in the sum of the equivalent rate across all schemes as the number of users increases. However, it is observed that this increase does not follow a linear trend with a slope of one. Specifically, when N = 8 , the sum of the equivalent rate is found to be less than twice as high as that when N = 4 within the same scheme. This phenomenon is attributed to the emergence of inter-user interference at the receiver. Furthermore, the growth rate of the ‘PSC’ scheme surpasses that of the ‘PSC-ZF’ scheme, indicating that the MMSE strategy outperforms the ZF strategy in the examined scenario. It is important to emphasize that, consistently, the ‘PSC’ scheme demonstrates the highest performance, while the sum rate of the ‘non-semantic’ scheme consistently remains the lowest. In Figure 8, the variation in the sum of the equivalent rate with changing noise power is illustrated. The figure highlights a consistent decrease in the sum of the equivalent rate across all schemes as the noise power increases. When the noise power is small, the performance of the ‘PSC’ scheme and the ‘PSC-ZF’ scheme is comparable, suggesting that the ZF strategy is more effective in low-noise environments. It is important to note that, theoretically, when the noise power is zero, the formulas for both MMSE and ZF strategies yield identical results. However, in real-world scenarios, complete absence of noise is implausible. Consequently, the superiority of the MMSE strategy over the ZF strategy becomes evident as the noise power increases. This is demonstrated in Figure 8, where the ‘PSC’ scheme consistently outperforms the ‘PSC-ZF’ scheme across various noise power levels, affirming the general superiority of the MMSE strategy. Note that when the noise power is sufficiently high, the sum of the equivalent rate of all schemes tends to saturate at zero, since the channel capacity tends to zero [36].
In Figure 9, the relationship between the sum of the equivalent rate and the computation power coefficient is depicted. Notably, the ‘non-semantic’ scheme maintains a constant sum of the equivalent rate across different p 0 values due to its lack of utilization of semantic communication techniques, consistently exhibiting the lowest performance among the considered schemes. As the computation power coefficient decreases, the sum of the equivalent rate for the other three schemes increases. This trend is attributed to the enhanced efficiency in computation with a lower p 0 , facilitating a lower semantic compression ratio. Consequently, a higher sum of the equivalent rate is achieved. It is found that the ‘PSC-S2’ scheme exhibits variable proximity to the ‘PSC’ scheme, illustrating a dynamic relationship. A small gap between the two indicates that the solution of the ‘PSC’ scheme closely aligns with the midpoint solution of the ‘PSC-S2’ scheme. Moreover, the sum of the equivalent rate for the ‘PSC-S2’ scheme demonstrates a segmented function concerning the computation power coefficient p 0 . This behavior arises because the solution of the ‘PSC-S2’ scheme jumps to the midpoint of another segment of the computation load function g n ( ρ n ) only when p 0 changes significantly.
In Figure 10, the evolution of the sum of the equivalent rate is traced across varying maximum power limits. A consistent upward trajectory is observed for all schemes as the maximum power limit increases. This behavior is a direct consequence of the positive correlation between augmented power levels and increased achievable rates for all users. Distinctly, in comparison to the ‘non-semantic’ scheme, the advantages of the ‘PSC’ scheme become more pronounced with higher maximum power limits p n max . This enhancement can be attributed to the ‘PSC’ scheme’s ability to allocate more power to semantic compression as the maximum power limit increases. The reduction in data size achieved through semantic compression significantly contributes to the overall sum of the equivalent rate. Conversely, the ‘non-semantic’ scheme can only allocate all power to transmission, which does not contribute as significantly to the sum of the equivalent rate. Consequently, the proposed ‘PSC’ scheme exhibits substantial superiority when there is sufficient power.
To depict the allocation of computation power and transmission power within the considered network, Figure 11 illustrates the distribution in both the ‘PSC’ and ‘PSC-S2’ schemes across various computation power coefficients. It can be seen that the sum of the computation power and transmission power consistently equals the predefined maximum power limit p n max , set at 30 dBm. This figure reveals no discernible pattern in the variation in computation power with respect to p 0 , and the computation power of the ‘PSC-S2’ scheme fluctuates, at times surpassing and at other times falling below that of the ‘PSC’ scheme. This variability underscores the inherent challenge in achieving a balance between transmission and computation within the considered PSC network.

5. Conclusions

This paper has introduced the PSC network, a novel paradigm where multiple users employ semantic information extraction techniques to compress extensive original data before transmission to a multi-antenna BS. Our model represents large-sized data through comprehensive knowledge graphs, utilizing a shared probability graph between users and the BS to facilitate efficient semantic compression. We formulated an optimization problem aimed at maximizing the sum of the equivalent rate for all users, while considering the total power constraints and semantic requirements. To tackle the non-convex and non-smooth nature of the optimization problem, we proposed a three-stage algorithm. This algorithm determines the received beamforming matrix of the BS, transmit power, and semantic compression ratio for each user step by step. The numerical results underscore the effectiveness of our proposed scheme, emphasizing its ability to achieve a harmonious equilibrium between transmission and computation.
In our model, we considered knowledge graphs extracted from various modal data and compressed them to be transmitted based on shared probability graphs at the transceivers. Fortunately, at the level of the knowledge graph, our semantic compression is lossless because the receiver can recover the information that is vacant in the knowledge graph through the probability graph. However, it is important to note that during the process of extracting the knowledge graph from the original data and recovering the original data from the knowledge graph, there exists a semantic loss problem, which is an area for potential future research.

Author Contributions

Methodology, Z.Z. (Zhouxiang Zhao), Z.Y., M.C. and H.V.P.; Validation, Z.Z. (Zhouxiang Zhao); Formal analysis, Z.Z. (Zhouxiang Zhao), Z.Y. and M.C.; Investigation, Z.Z. (Zhouxiang Zhao); Writing—original draft, Z.Z. (Zhouxiang Zhao) and Z.Y.; Writing—review & editing, M.C., Z.Z. (Zhaoyang Zhang) and H.V.P.; Supervision, Z.Z. (Zhaoyang Zhang) and H.V.P.; Funding acquisition, Z.Z. (Zhaoyang Zhang). All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key R&D Program of China (Grant No. 2023YFB2904804), National Natural Science Foundation of China (NSFC) under Grants 62394292, 62394290, and Young Elite Scientists Sponsorship Program by CAST 2023QNRC001.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proof of Lemma 1

The received signals at the BS without beamforming can be expressed as
y ^ = H x + n ,
which means that y = W H y ^ based on (2) and (A1).
The goal of the MMSE strategy is to minimize the mean square error (MSE) between the transmitted signals x and the received signals y . The error between x and y is
e = y x = W H y ^ x .
To minimize the MSE between x and y , represented by E e H e , where E · denotes the expected value of a random variable, the following condition must be satisfied
E e y ^ H = 0 ,
which means there is no correlation between y ^ and e . Condition (A3) is equivalent to the condition that minimizes E e H e , because if the correlation between y ^ and e is non-zero, it can still be used to decrease E e H e .
Substituting (A2) into (A3), we have
E ( W H y ^ x ) y ^ H = 0 ,
which is equivalent to
W H E y ^ y ^ H E x y ^ H = 0 .
According to (A5), we have
W H = E x y ^ H E y ^ y ^ H 1 .
Let us deal with E x y ^ H first. Substituting (A1) into E x y ^ H , we obtain
E x y ^ H = E x H x + n H = E x x H H H + x n H .
Since there is no correlation between the transmitted signals x and the noise n , i.e., E x n H = 0 , we have
E x y ^ H = E x x H H H = P H H .
Following the similar procedure, we can obtain
E y ^ y ^ H = H E x x H H H + E n n H = H P H H + σ 2 I M .
Now, substituting (A8) and (A9) into (A6), we have
W H = P H H H P H H + σ 2 I M 1 ,
which is equivalent to
W = H P H H + σ 2 I M 1 H P .
From (A11), the obtained receive beamforming matrix is associated with the transmit power P .

Appendix B. Proof of Theorem 1

Theorem 1 can be proved by the contradiction method. If there exists a user n such that
p n t + g n ( ρ n ) p 0 < p n max .
Then, for user n, we can always decrease its semantic compression ratio ρ n due to (16) and constraint (15c).
It is evident that the objective function of problem (15a) decreases monotonically for ρ n , indicating that a lower semantic compression ratio ρ n produces a higher value of the objective function in problem (15a). Therefore, when the objective function of problem (15a) reaches its maximum, the semantic compression ratio ρ n and transmit power p n t of each user must satisfy
p n t + g n ( ρ n ) p 0 = p n max , n N .
Hence, Theorem 1 is proved.

References

  1. Xu, W.; Yang, Z.; Ng, D.W.K.; Levorato, M.; Eldar, Y.C.; Debbah, M. Edge Learning for B5G Networks With Distributed Signal Processing: Semantic Communication, Edge Computing, and Wireless Sensing. IEEE J. Sel. Top. Signal Process. 2023, 17, 9–39. [Google Scholar] [CrossRef]
  2. Saad, W.; Bennis, M.; Chen, M. A Vision of 6G Wireless Systems: Applications, Trends, Technologies, and Open Research Problems. IEEE Netw. 2020, 34, 134–142. [Google Scholar] [CrossRef]
  3. Lu, K.; Zhou, Q.; Li, R.; Zhao, Z.; Chen, X.; Wu, J.; Zhang, H. Rethinking Modern Communication from Semantic Coding to Semantic Communication. IEEE Wirel. Commun. 2023, 30, 158–164. [Google Scholar] [CrossRef]
  4. Gündüz, D.; Qin, Z.; Aguerri, I.E.; Dhillon, H.S.; Yang, Z.; Yener, A.; Wong, K.K.; Chae, C.B. Beyond Transmitting Bits: Context, Semantics, and Task-Oriented Communications. IEEE J. Sel. Areas Commun. 2023, 41, 5–41. [Google Scholar] [CrossRef]
  5. Zhao, Z.; Yang, Z.; Hu, Y.; Lin, L.; Zhang, Z. Semantic Information Extraction for Text Data with Probability Graph. In Proceedings of the 2023 IEEE/CIC International Conference on Communications in China (ICCC Workshops), Dalian, China, 10–12 August 2023. [Google Scholar] [CrossRef]
  6. Chaccour, C.; Saad, W.; Debbah, M.; Han, Z.; Poor, H.V. Less data, more knowledge: Building next generation semantic communication networks. arXiv 2022, arXiv:2211.14343. [Google Scholar]
  7. Peng, X.; Qin, Z.; Huang, D.; Tao, X.; Lu, J.; Liu, G.; Pan, C. A Robust Deep Learning Enabled Semantic Communication System for Text. In Proceedings of the GLOBECOM 2022-2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 4–8 December 2022; pp. 2704–2709. [Google Scholar] [CrossRef]
  8. Luo, X.; Chen, H.H.; Guo, Q. Semantic Communications: Overview, Open Issues, and Future Research Directions. IEEE Wirel. Commun. 2022, 29, 210–219. [Google Scholar] [CrossRef]
  9. Yan, L.; Qin, Z.; Zhang, R.; Li, Y.; Li, G.Y. Resource Allocation for Text Semantic Communications. IEEE Wirel. Commun. Lett. 2022, 11, 1394–1398. [Google Scholar] [CrossRef]
  10. Mu, X.; Liu, Y.; Guo, L.; Al-Dhahir, N. Heterogeneous Semantic and Bit Communications: A Semi-NOMA Scheme. IEEE J. Sel. Areas Commun. 2023, 41, 155–169. [Google Scholar] [CrossRef]
  11. Hu, Z.; Liu, T.; You, C.; Yang, Z.; Chen, M. Multiuser Resource Allocation for Semantic-Relay-Aided Text Transmissions. arXiv 2023, arXiv:2311.06854. [Google Scholar]
  12. Xie, H.; Qin, Z.; Li, G.Y.; Juang, B.H. Deep Learning Enabled Semantic Communication Systems. IEEE Trans. Signal Process. 2021, 69, 2663–2675. [Google Scholar] [CrossRef]
  13. Zhao, Z.; Yang, Z.; Pham, Q.V.; Yang, Q.; Zhang, Z. Semantic Communication with Probability Graph: A Joint Communication and Computation Design. In Proceedings of the hl2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall), Hong Kong, 10–13 October 2023. [Google Scholar] [CrossRef]
  14. Yang, Z.; Chen, M.; Li, G.; Yang, Y.; Zhang, Z. Secure semantic communications: Fundamentals and challenges. arXiv 2023, arXiv:2301.01421. [Google Scholar]
  15. Zhao, Z.; Yang, Z.; Gan, X.; Pham, Q.V.; Huang, C.; Xu, W.; Zhang, Z. A Joint Communication and Computation Design for Semantic Wireless Communication with Probability Graph. arXiv 2023, arXiv:2312.13975. [Google Scholar]
  16. Yang, Z.; Chen, M.; Zhang, Z.; Huang, C. Energy efficient semantic communication over wireless networks with rate splitting. IEEE J. Sel. Areas Commun. 2023, 41, 1484–1495. [Google Scholar] [CrossRef]
  17. Yan, L.; Qin, Z.; Zhang, R.; Li, Y.; Li, G.Y. QoE-Aware Resource Allocation for Semantic Communication Networks. In Proceedings of the GLOBECOM 2022-2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 4–8 December 2022; pp. 3272–3277. [Google Scholar] [CrossRef]
  18. Yang, Z.; Chen, M.; Zhang, Z.; Huang, C.; Yang, Q. Performance Optimization of Energy Efficient Semantic Communications over Wireless Networks. In Proceedings of the 2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall), London, UK, 26–29 September 2022. [Google Scholar] [CrossRef]
  19. Cang, Y.; Chen, M.; Yang, Z.; Hu, Y.; Wang, Y.; Zhang, Z.; Wong, K.K. Resource Allocation for Semantic-Aware Mobile Edge Computing Systems. arXiv 2023, arXiv:2309.11736. [Google Scholar]
  20. Qin, Z.; Gao, F.; Lin, B.; Tao, X.; Liu, G.; Pan, C. A Generalized Semantic Communication System: From Sources to Channels. IEEE Wirel. Commun. 2023, 30, 18–26. [Google Scholar] [CrossRef]
  21. Huang, D.; Gao, F.; Tao, X.; Du, Q.; Lu, J. Toward Semantic Communications: Deep Learning-Based Image Semantic Coding. IEEE J. Sel. Areas Commun. 2023, 41, 55–71. [Google Scholar] [CrossRef]
  22. Han, T.; Yang, Q.; Shi, Z.; He, S.; Zhang, Z. Semantic-Preserved Communication System for Highly Efficient Speech Transmission. IEEE J. Sel. Areas Commun. 2023, 41, 245–259. [Google Scholar] [CrossRef]
  23. Weng, Z.; Qin, Z. Semantic Communication Systems for Speech Transmission. IEEE J. Sel. Areas Commun. 2021, 39, 2434–2444. [Google Scholar] [CrossRef]
  24. Hu, L.; Li, Y.; Zhang, H.; Yuan, L.; Zhou, F.; Wu, Q. Robust Semantic Communication Driven by Knowledge Graph. In Proceedings of the 2022 9th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Milan, Italy, 29 November–1 December 2022. [Google Scholar] [CrossRef]
  25. Wang, Y.; Chen, M.; Saad, W.; Luo, T.; Cui, S.; Poor, H.V. Performance Optimization for Semantic Communications: An Attention-based Learning Approach. In Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM), Madrid, Spain, 7–11 December 2021. [Google Scholar] [CrossRef]
  26. Gaur, M.; Faldu, K.; Sheth, A. Semantics of the Black-Box: Can Knowledge Graphs Help Make Deep Learning Systems More Interpretable and Explainable? IEEE Internet Comput. 2021, 25, 51–59. [Google Scholar] [CrossRef]
  27. Farsad, N.; Rao, M.; Goldsmith, A. Deep Learning for Joint Source-Channel Coding of Text. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, AB, Canada, 15–20 April 2018; pp. 2326–2330. [Google Scholar] [CrossRef]
  28. Yao, S.; Niu, K.; Wang, S.; Dai, J. Semantic Coding for Text Transmission: An Iterative Design. IEEE Trans. Cogn. Commun. Netw. 2022, 8, 1594–1603. [Google Scholar] [CrossRef]
  29. Liu, C.; Guo, C.; Wang, S.; Li, Y.; Hu, D. Task-Oriented Semantic Communication Based on Semantic Triplets. In Proceedings of the 2023 IEEE Wireless Communications and Networking Conference (WCNC), Glasgow, UK, 26–29 March 2023. [Google Scholar] [CrossRef]
  30. Zhou, F.; Li, Y.; Zhang, X.; Wu, Q.; Lei, X.; Hu, R.Q. Cognitive Semantic Communication Systems Driven by Knowledge Graph. In Proceedings of the ICC 2022-IEEE International Conference on Communications, Seoul, Republic of Korea, 16–20 May 2022; pp. 4860–4865. [Google Scholar] [CrossRef]
  31. Wang, Y.; Chen, M.; Luo, T.; Saad, W.; Niyato, D.; Poor, H.V.; Cui, S. Performance Optimization for Semantic Communications: An Attention-Based Reinforcement Learning Approach. IEEE J. Sel. Areas Commun. 2022, 40, 2598–2613. [Google Scholar] [CrossRef]
  32. Erol-Kantarci, M.; Mouftah, H.T. Energy-Efficient Information and Communication Infrastructures in the Smart Grid: A Survey on Interactions and Open Issues. IEEE Commun. Surv. Tuts. 2014, 17, 179–197. [Google Scholar] [CrossRef]
  33. Li, J.; Sun, A.; Han, J.; Li, C. A Survey on Deep Learning for Named Entity Recognition. IEEE Trans. Knowl. Data Eng. 2022, 34, 50–70. [Google Scholar] [CrossRef]
  34. Hu, Y.; Shen, H.; Liu, W.; Min, F.; Qiao, X.; Jin, K. A Graph Convolutional Network With Multiple Dependency Representations for Relation Extraction. IEEE Access 2021, 9, 81575–81587. [Google Scholar] [CrossRef]
  35. Cordeschi, N.; Amendola, D.; Baccarelli, E. Fairness-constrained optimized time-window controllers for secondary-users with primary-user reliability guarantees. Comput. Commun. 2018, 116, 63–76. [Google Scholar] [CrossRef]
  36. Talebi, S.P. Primary service outage and secondary service performance in cognitive radio networks. Wirel. Commun. Mob. Comput. 2015, 15, 1982–1990. [Google Scholar] [CrossRef]
Figure 1. Illustration of a knowledge graph.
Figure 1. Illustration of a knowledge graph.
Entropy 26 00394 g001
Figure 2. An illustration of the considered probabilistic semantic communication (PSC) network.
Figure 2. An illustration of the considered probabilistic semantic communication (PSC) network.
Entropy 26 00394 g002
Figure 3. Illustration of the probability graph considered in the PSC system.
Figure 3. Illustration of the probability graph considered in the PSC system.
Entropy 26 00394 g003
Figure 4. The framework of considered PSC network.
Figure 4. The framework of considered PSC network.
Entropy 26 00394 g004
Figure 5. Illustration of computation load versus semantic compression ratio ρ .
Figure 5. Illustration of computation load versus semantic compression ratio ρ .
Entropy 26 00394 g005
Figure 6. Sum of equivalent rate vs. number of iterations.
Figure 6. Sum of equivalent rate vs. number of iterations.
Entropy 26 00394 g006
Figure 7. Sum of equivalent rate vs. number of users.
Figure 7. Sum of equivalent rate vs. number of users.
Entropy 26 00394 g007
Figure 8. Sum of equivalent rate vs. noise power.
Figure 8. Sum of equivalent rate vs. noise power.
Entropy 26 00394 g008
Figure 9. Sum of equivalent rate vs. computation power coefficient.
Figure 9. Sum of equivalent rate vs. computation power coefficient.
Entropy 26 00394 g009
Figure 10. Sum of equivalent rate vs. maximum power limit.
Figure 10. Sum of equivalent rate vs. maximum power limit.
Entropy 26 00394 g010
Figure 11. The allocation of the computation power and transmission power with different computation power coefficients.
Figure 11. The allocation of the computation power and transmission power with different computation power coefficients.
Entropy 26 00394 g011
Table 1. Main system parameters.
Table 1. Main system parameters.
ParameterSymbolValue
Number of usersN8
Number of antennasM16
Long-term channel power gain β −90 dB
Noise power σ 2 −10 dBm
Computation power coefficient p 0 1
Maximum power limit p n max 30 dBm
Parameter in (29) δ 10 9
Initial step size τ ¯ 10 3
Scaling factor in (34) α 0.5
Hyper-parameter in (35) ξ 0.1
Threshold in Algorithm 2 ϵ 10 6
Maximum iteration limit in Algorithm 2 T max 1000
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhao, Z.; Yang, Z.; Chen, M.; Zhang, Z.; Poor, H.V. A Joint Communication and Computation Design for Probabilistic Semantic Communications. Entropy 2024, 26, 394. https://doi.org/10.3390/e26050394

AMA Style

Zhao Z, Yang Z, Chen M, Zhang Z, Poor HV. A Joint Communication and Computation Design for Probabilistic Semantic Communications. Entropy. 2024; 26(5):394. https://doi.org/10.3390/e26050394

Chicago/Turabian Style

Zhao, Zhouxiang, Zhaohui Yang, Mingzhe Chen, Zhaoyang Zhang, and H. Vincent Poor. 2024. "A Joint Communication and Computation Design for Probabilistic Semantic Communications" Entropy 26, no. 5: 394. https://doi.org/10.3390/e26050394

APA Style

Zhao, Z., Yang, Z., Chen, M., Zhang, Z., & Poor, H. V. (2024). A Joint Communication and Computation Design for Probabilistic Semantic Communications. Entropy, 26(5), 394. https://doi.org/10.3390/e26050394

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop