The device-to-device (D2D) in 5G assimilates high-speed routing and terahertz communication to ease uplink and downlink resource allocations and sharing. A common frequency is shared and allocated to improve the spectrum efficiently. This paper aims to achieve better communication, without interferences, in a 5G platform where the multiple radio resource transmissions are simultaneous. The proposed optimization model is explained under the following models: Network model, Channel model, and interference model. These models are discussed in the sections below, where efficient communication in the 5G platform is carried out. It is observed on the uplink and downlink communication medium where the D2D transmission takes place. From this examination step, the uplink is responsible for forwarding the information to the network, whereas the downlink is the reverse process. This mechanism illustrates the high capacity to satisfy the user demand on the allocated time interval. This study is defined for data transmission on uplink and downlink mechanisms. The proposed NCOP in the 5G network is presented in Fig. 1.

Proposed NCOP in the 5G Network.
The processing step is considered for the radio resources and provides efficient channel allocation for the requested devices. This evaluation step is considered and provides better channel detection; based on this, it observes the interference in the transmission. If the interference is detected, then the level of interference is analyzed. In this step, the convergence is stated from the non-convex method and provides the efficient output. Based on this part, all these models are introduced to discuss the communication of D2D. By processing this, interference is detected to ensure convergence. For this process, the preliminary step is discussed on the network model. Using historical interference patterns and real-time power level analysis, NCOP can classify interference. A typical instance of high-priority interference is when a D2D user’s signal goes beyond a certain threshold compared to nearby uplink broadcasts; this triggers quick mitigation. Using a dynamic thresholding methodology, the convergence detection method iteratively minimizes interference power while retaining signal integrity until the optimization target stabilizes within a 0.01% margin of change. To guarantee computational economy without sacrificing accuracy, the method terminates if, for example, the interference power decrease varies by less than 0.01% across three consecutive rounds.
Network model
The network model integrates 5G communication to enable efficient communication. It is mainly based on orthogonal frequency division multiplexing, which transfers the data through the channel here\(\:\:n\) channels are introduced to achieve better transmission of the data, such as\(\:\:\left\{{c}_{1}^{{\prime\:}},{c}_{2}^{{\prime\:}},{c}_{3}^{{\prime\:}},\:and\:{c}_{n}^{{\prime\:}}\right\}\), and the signals are\(\:\:\left\{{s}_{g\left(1\right)},{s}_{g\left(2\right),\:}{s}_{g\left(3\right)},\:upto\:{s}_{g\left(n\right)}\right\}\). In processing this phase, routing is done accurately to improve the networking model under 5G. The infrastructure that covers the necessary equipment is described as a network model. The Equation below is used to uplink channels and process signals.
$$\:{x}^{{\prime\:}}\left({u}_{k}\right)=\left(\begin{array}{c}{c}_{1}^{{\prime\:}}\\\:{c}_{2}^{{\prime\:}}\\\:\begin{array}{c}{c}_{3}^{{\prime\:}}\\\:{c}_{n}^{{\prime\:}}\end{array}\end{array}\right)X\left(\begin{array}{c}\sum_{{n}_{w}}\left({d}_{0}\to\:{d}_{1}\right)*{\left({n}_{w}+{f}_{i}\right)}^{2}+{w}_{i}\left({f}_{i}\right(1\left)\right){s}_{g\left(1\right)}-t^{\prime\:}\\\:\sum_{{n}_{w}}\left({d}_{0}\to\:{d}_{1}\right)*{\left({n}_{w}+{f}_{i}\right)}^{2}+{w}_{i}\left({f}_{i}\right(2\left)\right){s}_{g\left(2\right)}-t^{\prime\:}\\\:\begin{array}{c}{\sum_{{n}_{w}}\left({d}_{0}\to\:{d}_{1}\right)*{\left({n}_{w}+{f}_{i}\right)}^{2}+{w}_{i}\left({f}_{i}\right(3\left)\right)s}_{g\left(3\right)}-t^{\prime\:}\\\:{\sum_{{n}_{w}}\left({d}_{0}\to\:{d}_{1}\right)*{\left({n}_{w}+{f}_{i}\right)}^{2}+{w}_{i}\left({f}_{i}\right(n\left)\right)s}_{g\left(n\right)}-t^{\prime\:}\end{array}\end{array}\right)$$
(1a)
The signal processing is done on the above Equation for uplink communication, and they are symbolized as\(\:\:{u}_{k}\). The communication is\(\:\:x^{\prime\:}\), where the network is\(\:\:{n}_{w}\), the initial device is\(\:\:{d}_{0}\), whereas the second device is\(\:\:{d}_{1}\), here the D2D communication is carried out. The bandwidth is\(\:\:{w}_{i}\), \(\:{f}_{i}\) Is the finding of the communication accurate. This computation step relies on the efficient communication between D2D on the respective time interval, and it is\(\:\:t\). Executing this network model illustrates the uplink communication on varying channels, and based on this, signal processing is carried out at the desired time interval. This study relates to the efficient process of uplink communication to ensure D2D resource sharing.
This network model for uplink and downlink is observed for the signal process among the channels to distribute the signal and achieve efficient output without interference. This state relies on uplink communication to transmit the data to the network, observed in the channel-based computation. The desired time is considered to observe the uplink communication where the detection phase is introduced here, and it is formulated as\(\:\:{\left({u}_{k}+{f}_{i}\right)}^{2}\). This runs multiple times to define the communication from the device to the network. From this downlink is examined below.
$$\:{x}^{{\prime\:}}\left({d}_{k}\right)=\left(\begin{array}{c}\prod_{{n}_{w}}\left({d}_{0}\to\:{d}_{1}\right)*\|{\left({u}_{r}+{u}_{g}\right)}^{-1}\|+{w}_{i}\left({u}_{g}\right(1\left)\right){s}_{g\left(1\right)}*\frac{1}{{d}_{n}}-t^{\prime\:}\\\:\prod_{{n}_{w}}\left({d}_{0}\to\:{d}_{1}\right)*\|{\left({u}_{r}+{u}_{g}\right)}^{-1}\|+{w}_{i}\left({u}_{g}\right(2\left)\right){s}_{g\left(1\right)}*\frac{1}{{d}_{n}}-t^{\prime\:}\\\:\begin{array}{c}\prod_{{n}_{w}}\left({d}_{0}\to\:{d}_{1}\right)*\|{\left({u}_{r}+{u}_{g}\right)}^{-1}\|+{w}_{i}\left({u}_{g}\right(3\left)\right){s}_{g\left(1\right)}*\frac{1}{{d}_{n}}-t^{\prime\:}\\\:\prod_{{n}_{w}}\left({d}_{0}\to\:{d}_{1}\right)*\|{\left({u}_{r}+{u}_{g}\right)}^{-1}\|+{w}_{i}\left({u}_{g}\right(n\left)\right){s}_{g\left(1\right)}*\frac{1}{{d}_{n}}-t^{\prime\:}\end{array}\end{array}\right)X\left(\begin{array}{c}{c}_{1}^{{\prime\:}}\\\:{c}_{2}^{{\prime\:}}\\\:\begin{array}{c}{c}_{3}^{{\prime\:}}\\\:{c}_{n}^{{\prime\:}}\end{array}\end{array}\right)$$
(1b)
The downlink is established from the network to the device channel; the downlink is\(\:\:{d}_{k}\), the \(\:n\) number of devices is\(\:\:{d}_{n}\), whereas the resource used to transmit the data from one device to another is\(\:\:{u}_{r},\) which is processed from\(\:\:{\{u}_{g}\left(1\right),{u}_{g}\left(2\right),{u}_{g}\left(3\right){,\dots\:,u}_{g}\left(n\right)\}\). In executing this approach, the D2D process is considered under the downlink communication. This technique used in the network model defines the efficient communication medium among the devices by sharing the resource requested. For this analysis step, the initial step is to identify the device, and routing is done, and it is\(\:\:{r}_{g}\). For every step of downlink communication, the routing is observed without latency. This process is considered and provides an efficient mechanism for the radio resource transmission on the network model.
This evaluation step is used to define the accurate model for networking, where it acquires the data from the network and forwards it to the device. It is commonly considered cloud data sharing, where the required data is fetched from the cloud and processed the step accordingly. On observing this step, the network model with two communication mediums is discussed as uplink and downlink communication\(\:\:x^{\prime\:}\left({u}_{k\:}and{\:d}_{k}\right)\). From this communication between the devices by sharing the resources, the interference is detected and is equated below.
$$\:{x}^{{\prime\:}}\left({u}_{r}\right)={w}_{i}+\sum_{{u}_{k}}^{{d}_{k}}\left({f}_{i}-{i}_{f}\right)+{n}_{w}*{c}_{4}^{{\prime\:}}+\frac{1}{{s}_{g\left(n\right)}},$$
It is derived as,
$$\begin{aligned}&\left(\begin{array}{c}{c}_{1}^{{\prime}}\\{c}_{2}^{{\prime}}\\\begin{array}{c}{c}_{3}^{{\prime}}\\{c}_{n}^{{\prime}}\end{array}\end{array}\right)=\left(\begin{array}{c}{s}_{g\left(1\right)}\\{s}_{g\left(2\right)}\\\begin{array}{c}{s}_{g\left(3\right)}\\{s}_{g\left(n\right)}\end{array}\end{array}\right)+\sum_{{n}_{w}}\left\{{d}_{0},\dots{d}_{n}\right\}-t^{\prime}\\& \quad =\prod_{{s}_{g\left(n\right)}}^{4}*\prod_{{c}_{1}^{{\prime}}}^{4}\|{\left({f}_{i}+{i}_{f}\right)}^{-1}\|+\left(\begin{array}{cc}{d}_{1}&{s}_{g\left(1\right)}\\{d}_{2}&{s}_{g\left(2\right)}\\\begin{array}{c}{d}_{3}\\{d}_{4}\end{array}&\begin{array}{c}{s}_{g\left(3\right)}\\{s}_{g\left(n\right)}\end{array}\end{array}\right)-\left(\begin{array}{c}{c}_{1}^{{\prime}}\\{c}_{2}^{{\prime}}\\\begin{array}{c}{c}_{3}^{{\prime}}\\{c}_{n}^{{\prime}}\end{array}\end{array}\right)-t^{\prime}\left({i}_{f}\right)\end{aligned}$$
(2)
Communication between the resources is considered, and efficient sharing among the D2D pairs is provided. The delay factor is defined for this case, where for each signal, the delay is detected based on the assigned devices, such as\(\:\:\left\{{d}_{1},{d}_{2}.{d}_{3},{d}_{n}\right\}\:\)which are devices taken into consideration and work for\(\:\:n\) number of devices. This process is considered to identify the interference in the channel, and it is represented as\(\:\:{i}_{f}\). The evaluation takes into consideration and provides the efficient communication of D2D and establishes reliable communication with the use of uplink and downlink\(\:\:{x}^{{\prime\:}}\in\:\left({u}_{k}+{d}_{k}\right)>{i}_{f}\). In Fig. 2, the network model is illustrated.
To identify the interference in the channel, the delay factor for the first device is the analysis phase and its initial step is described as,\(\:\:{d}_{1},\:\forall\:\:{t}^{{\prime\:}}-{i}_{f})\). This step includes reliable communication with the use of signal processing. It is based on\(\:\:n\) channel processing, where the delay factor is used to identify the interferences in the network model. This approach discusses the channel model concerning the radio resource analysis for detecting channel allocation to estimate better processing among the D2Ds.

Channel model
The channel model is defined as the allocation of radio resources to address the delay factor in networking. Based on this strategy, it defines better interference detection if delay is addressed for the device. The delay is\(\:\:\{{y}_{1},{y}_{2},{y}_{3},\dots\:,{y}_{n}\}\). So, the main purpose of this channel model is to identify the interferences by classification model included in this channel model as follows.
$$\varphi={x}^{{\prime}}\left({d}_{0}\to{d}_{1}\right)-{t}^{{\prime}}+\left(\begin{array}{c}{c}_{1}^{{\prime}}\\{c}_{2}^{{\prime}}\\\begin{array}{c}{c}_{3}^{{\prime}}\\{c}_{n}^{{\prime}}\end{array}\end{array}\right)*\left(\begin{array}{cc}{d}_{1}&{s}_{g\left(1\right)}\\{d}_{2}&{s}_{g\left(2\right)}\\\begin{array}{c}{d}_{3}\\{d}_{n}\end{array}&\begin{array}{c}{s}_{g\left(3\right)}\\{s}_{g\left(n\right)}\end{array}\end{array}\right)-\left(\begin{array}{c}{y}_{1}\\{y}_{2}\\\begin{array}{c}{y}_{3}\\{y}_{n}\end{array}\end{array}\right)+\sum_{min}{i}_{f}+\left\{\left[{\left({n}_{w}+{f}_{i}\right)}^{-1}\right]*{w}_{i}\right\}+q^{\prime}$$
It is expressed as,
$$=\left(\begin{array}{ccc}{c}_{1}^{{\prime}}&{d}_{1}&{s}_{g\left(1\right)}\\{c}_{2}^{{\prime}}&{d}_{2}&{s}_{g\left(2\right)}\\\begin{array}{c}{c}_{3}^{{\prime}}\\{c}_{n}^{{\prime}}\end{array}&\begin{array}{c}{d}_{3}\\{d}_{n}\end{array}&\begin{array}{c}{s}_{g\left(3\right)}\\{s}_{g\left(n\right)}\end{array}\end{array}\right)\left(\begin{array}{c}{a}_{1}\\{a}_{2}\\\begin{array}{c}{a}_{3}\\{a}_{n}\end{array}\end{array}\right)\sum_{{i}_{f}-t^{\prime}}{n}_{w}*({u}_{g}\left(1\right),.{u}_{g}\left(n\right))$$
$$=\left(\begin{array}{c}{u}_{g}\left(1\right)\\{u}_{g}\left(2\right)\\\begin{array}{c}{u}_{g}\left(3\right)\\{u}_{g}\left(n\right)\end{array}\end{array}\right)*\left(\begin{array}{c}{a}_{1}\\{a}_{2}\\\begin{array}{c}{a}_{3}\\{a}_{n}\end{array}\end{array}\right)+\|{\left({f}_{i}+{i}_{f}\right)}^{-1}\|$$
(3a)
The radio resource analysis is processed in the above Equation and represented as\(\:\:\varphi\:\), and here, the quality measures are taken to attain the better channel; quality is\(\:\:q^{\prime\:}\). The allocation process is carried out from devices 1 to n, and it is labelled as\(\:\:\{{a}_{1},{a}_{2},{a}_{3},\dots\:,{a}_{n}\}\). The resources are processed based on the allocation step when executing this method. The\(\:\:{a}_{n}\) analysis for\(\:\:\varphi\:\) is presented in Fig. 3.

\(\:\:{\varvec{a}}_{\varvec{n}}\) Analysis for\(\:\:\varvec{\varphi}\).
The\(\:\:{a}_{n}\forall\:{c}_{n}\) under\(\:\:{u}_{k}\) and\(\:\:{d}_{k}\) is estimated for\(\:\:\left({d}_{0}\to\:{d}_{1}\right)\) inferred from Fig. 2. The above illustration is given for\(\:\:n=12\) (sample consideration) such that\(\:\:{x}^{{\prime\:}}\left({u}_{r}\right)=\frac{1}{{s}_{g\left(n\right)}}\) and\(\:\:{x}^{{\prime\:}}\left({d}_{k}\right)={w}_{i}\left({u}_{g}\left(n\right)\right){S}_{g}\forall\:{x}^{{\prime\:}}\left({u}_{k}\right)\) is optimal. The cases of\(\:\:{u}_{k}={d}_{k}\) and\(\:\:{u}_{k}>{d}_{k}\) are analyzed for maximizing\(\:\:{f}_{i}\). In this analysis, the\(\:\:{c}_{n}\) allocation exploits the\(\:\:{S}_{g}\) rate to ensure\(\:\:{r}_{g}\) without interference. If the interference occurs in any\(\:\:{c}_{n}\), then a consecutive channel is allocated to reduce the active\(\:\:{i}_{f}\) (minimum of\(\:\:{r}_{g}=1\)). If the\(\:\:{r}_{g}\) exceeds the range of 1, then allocations are cancelled to identify the existing interference level. Thus, the first classification is the\(\:\:{y}_{n}\left({r}_{g}=0\:and\:1\right)\) and\(\:\:{i}_{f}\left(\forall\:{r}_{g}>1\right)\) as presented in Fig. 3 for\(\:\:{u}_{k}={d}_{k}\) and\(\:\:{u}_{k}>{d}_{k}\). This allocation process addresses the interference where the delay is achieved if multiple resources are transmitted on a single channel. So, the traffic occurs, and the radio resource analysis is done as the initial step here. From this computation step, allocation is done and expressed below.
$$c^{\prime}\left({a}_{0}\right)=\left(\begin{array}{c}{u}_{g}\left(1\right)\\{u}_{g}\left(2\right)\\\begin{array}{c}{u}_{g}\left(3\right)\\{u}_{g}\left(n\right)\end{array}\end{array}\right)\text{*}\left(\begin{array}{c}{s}_{g\left(1\right)}\\{s}_{g\left(2\right)}\\\begin{array}{c}{s}_{g\left(3\right)}\\{s}_{g\left(n\right)}\end{array}\end{array}\right)+\prod_{q^{\prime}}{f}_{i}+{d}_{n}$$
It is computed as,
$$=\frac{1}{{d}_{n}}*\left\{\left(\begin{array}{ccc}{c}_{1}^{{\prime}}&{d}_{1}&{s}_{g\left(1\right)}\\{c}_{2}^{{\prime}}&{d}_{2}&{s}_{g\left(2\right)}\\\begin{array}{c}{c}_{3}^{{\prime}}\\{c}_{n}^{{\prime}}\end{array}&\begin{array}{c}{d}_{3}\\{d}_{n}\end{array}&\begin{array}{c}{s}_{g\left(3\right)}\\{s}_{g\left(n\right)}\end{array}\end{array}\right)+\left(\begin{array}{c}{a}_{1}\\{a}_{2}\\\begin{array}{c}{a}_{3}\\{a}_{n}\end{array}\end{array}\right)+\sum_{max}{q}^{{\prime}}+({i}_{f}-{u}_{r}\left(n\right))\right\},$$
$$=\frac{1}{{u}_{r}\left(n\right)}*\frac{1}{{d}_{n}}+\left\{\left(\begin{array}{ccc}{s}_{g\left(1\right)}&{c}_{1}^{{\prime}}&{a}_{1}\\{s}_{g\left(2\right)}&{c}_{2}^{{\prime}}&{a}_{2}\\\begin{array}{c}{s}_{g\left(3\right)}\\{s}_{g\left(n\right)}\end{array}&\begin{array}{c}{c}_{3}^{{\prime}}\\{c}_{n}^{{\prime}}\end{array}&\begin{array}{c}{a}_{3}\\{a}_{n}\end{array}\end{array}\right)-{i}_{f}*\left(\begin{array}{c}{u}_{g}\left(1\right)\\{u}_{g}\left(2\right)\\\begin{array}{c}{u}_{g}\left(3\right)\\{u}_{g}\left(n\right)\end{array}\end{array}\right)-t^{\prime}\right\}$$
(3b)
The channel allocation is done to decrease the transmission loss, which leads to interference. The channel allocation is\(\:\:c{\prime\:}\left({a}_{0}\right)\), from this number of allocations and channels processed in this study, we take the same allocations for\(\:\:n\) channels; the allocation is stated as\(\:\:\{{a}_{1},{a}_{2},{a}_{3},{a}_{n}\}\), the channels are\(\:\:\{{c}_{1}^{{\prime\:}},{c}_{2}^{{\prime\:}},{c}_{3}^{{\prime\:}},{c}_{n}^{{\prime\:}}\}\). On this basis, maximum quality is achieved by detecting the interference and radio resource allocation method. From this\(\:\:n\) devices and resources are considered and examined. The classification is followed up and derived from this study as follows.
$$\:{L}_{0}=\left\{\begin{array}{c}\left({i}_{f}-t^{\prime\:}\right)+{\sum_{{a}_{0}}\left({w}_{i}+x^{\prime\:}\right)\text{*}u}_{g}\left(1\right)*\left({q}^{{\prime\:}}+{d}_{n}\right)*{n}_{w},\:{s}_{g\left(n\right)}<\varphi\:\\\:\frac{1}{{d}_{n}}*\left({q}^{{\prime\:}}-{i}_{f}\right)+\prod_{{a}_{n}}\left({n}_{w}\text{*}{s}_{g\left(n\right)}\right)\text{*}{d}_{0}\to\:{d}_{1}\text{*}{f}_{i}>\varphi\:\end{array}\right.$$
(3c)
The classification is described as\(\:\:{L}_{0}\), the first condition is interference level detection whereas the second condition is non-interference level. This condition bases the process on the desired time and provides better communication. The D2D communication is done to ensure the detection of interferences in the channel. Based on this allocation of resources in the channel provides better detection of interference and non-interference\(\:\:{i}_{f}\approx\:{l}_{v}+({c}^{{\prime\:}}-{t}^{{\prime\:}})\). If the interferences occur, the reduction phase is performed, where the detection level is observed. The classifications presented in Fig. 3 are analyzed based on the conditions in Eq. (3c) for achieving maximum quality of channel allocation.

Classification analysis for the conditions in Eq. (3c).
In Fig. 4, the\(\:\:{y}_{n}\) and\(\:\:{i}_{f}\) based\(\:\:{L}_{o}\) detection for\(\:\:{c}_{n}\) under\(\:\:\varphi\:\) conditions are analyzed. In Eq. (3c), the\(\:\:{L}_{o}\) variations are derived for\(\:\:{u}_{g}\left(1\right)\) to\(\:\:{u}_{g}\left(n\right)\) for which\(\:\:\left({i}_{f}={t}^{{\prime\:}}\right)\forall\:{S}_{g\left(n\right)}\) must be true. This is cross-verified using\(\:\:{c}^{{\prime\:}}\left({a}_{o}\right)\forall\:\left({f}_{i}+{d}_{n}\right)\) such that\(\:\:\left[{c}^{{\prime\:}}n*{d}_{n}*{S}_{g\left(n\right)}\right]+\left[{a}_{n}\right]+\left({f}_{i}-{t}^{{\prime\:}}\right)=unity\). If the unity constraint fails, then\(\:\:{L}_{o}\) changes its deviation to ensure\(\:\:{c}_{n}^{{\prime\:}}\) is allocated with\(\:\:{y}_{n}\) and not\(\:\:{i}_{f}\). In this consecutive\(\:\:{L}_{o},\left[{u}_{g}\left(n\right)*{S}_{g\left(n\right)}+{{\Pi\:}}_{{q}_{i}}{f}_{i}\right]\ne\:0\) is the increasing condition, which holds for \(\:<\varphi\:\) condition alone. For\(\:\:>\varphi\:\) condition, the\(\:\:{r}_{g}>1\) is achieved such that\(\:\:\frac{1}{{u}_{r}\left(n\right)}*\frac{1}{{d}_{n}}*\left[{s}_{g\left(n\right)}\cdot\:{a}_{n}\right]-{i}_{f}\cdot\:\left[{u}_{g}\left(n\right)\right]-{t}^{{\prime\:}}\) is the\(\:\:{L}_{o}\) leveraging condition. This classification is mandatory to enhance the convergence in NCOP for\(\:\:{u}_{r}\) allocation. The interference model is observed based on the level analysis where the non-convex process is executed in the following part.
Interference model
The interference model is observed for the varying devices and is associated with channel allocation for resource sharing. The level of interference detection is processed from high to low and maintains the low as a constant value representing non-convex. At the point of interference level, it is detected at the lowest value and stated as convex. The below Equation is formulated as,
$$\begin{aligned}\nabla&=\left(\begin{array}{ccc}{\text{s}}_{\text{g}\left(1\right)}&{\text{c}}_{1}^{{\prime}}&{\text{a}}_{1}\\{\text{s}}_{\text{g}\left(2\right)}&{\text{c}}_{2}^{{\prime}}&{\text{a}}_{2}\\\begin{array}{c}{\text{s}}_{\text{g}\left(3\right)}\\{\text{s}}_{\text{g}\left(\text{n}\right)}\end{array}&\begin{array}{c}{\text{c}}_{3}^{{\prime}}\\{\text{c}}_{\text{n}}^{{\prime}}\end{array}&\begin{array}{c}{\text{a}}_{3}\\{\text{a}}_{\text{n}}\end{array}\end{array}\right)\text{X}\sum_{\text{q}^{\prime}}\left({\text{d}}_{0}\to{\text{d}}_{1}\right)+\left(\begin{array}{c}{\text{a}}_{1}\\{\text{a}}_{2}\\\begin{array}{c}{\text{a}}_{3}\\{\text{a}}_{\text{n}}\end{array}\end{array}\right)\text{*}\left(\begin{array}{c}{\text{u}}_{\text{g}}\left(1\right)\\{\text{u}}_{\text{g}}\left(2\right)\\\begin{array}{c}{\text{u}}_{\text{g}}\left(3\right)\\{\text{u}}_{\text{g}}\left(\text{n}\right)\end{array}\end{array}\right)+\prod_{\text{q}^{\prime}}({\text{n}}_{\text{w}}+{\varphi})-\text{t}^{\prime} \\&=\left(\begin{array}{c}{\text{a}}_{1}\\{\text{a}}_{2}\\\begin{array}{c}{\text{a}}_{3}\\{\text{a}}_{\text{n}}\end{array}\end{array}\right)\text{*}\left(\begin{array}{c}{\text{u}}_{\text{g}}\left(1\right)\\{\text{u}}_{\text{g}}\left(2\right)\\\begin{array}{c}{\text{u}}_{\text{g}}\left(3\right)\\{\text{u}}_{\text{g}}\left(\text{n}\right)\end{array}\end{array}\right)+\|{\left({\text{s}}_{\text{g}\left(\text{n}\right)}+{\text{v}}_{\text{x}}\right)}^{2}\|>{\text{l}}_{\text{v}}\end{aligned}$$
(4a)
The level identification is done for the interference detection, and based on this case, the convergence is detected. The interference level is\(\:\:{l}_{v}\), \(\:{v}_{X}\) is described as non-convex. The non-convex is achieved with the use of high quality and ensures reliable communication of the D2D process\(\:\:{d}_{1}\to\:{d}_{2}*c{\prime\:}\left({q}^{{\prime\:}}\right)\). The identification is described as\(\:\:\nabla\:\:\)follows: The allocation is followed up based on the device data transmission quality enhancement. The interference identification is followed up in a non-convex manner\(\:\:{i}_{f}<t^{\prime\:}\left({a}_{0}\right)\), and from this, allocation and re-allocation are executed. The interference levels before and after allocation and reallocation are analyzed under convex optimization.
$$\begin{aligned}{\text{a}}_{0},{\text{l}}_{\text{r}}&={\text{l}}_{\text{v}}+\frac{{\text{u}}_{\text{g}}}{{\text{s}}_{\text{g}\left(\text{n}\right)+{\text{c}}_{\text{n}}^{{\prime}}}}+\left({\text{p}}_{\text{h}}+{\text{w}}_{\text{i}}|{\text{f}}_{\text{i}}\text{*}\text{x}^{\prime}\right)\text{*}\sum_{{\text{u}}_{\text{g}}\in{\text{n}}_{\text{w}}}\left(\nabla\text{*}\frac{1}{{\text{d}}_{\text{n}}}\right)\\& \quad +\left(\begin{array}{c}{\text{a}}_{1}\\{\text{a}}_{2}\\\begin{array}{c}{\text{a}}_{3}\\{\text{a}}_{\text{n}}\end{array}\end{array}\right)-\left({\text{i}}_{\text{f}}-{\text{t}}^{{\prime}}\right)+\underset{\text{c}^{\prime}\in{\text{v}}_{\text{x}}}{\text{max}}\left({\varphi}+{\text{w}}_{\text{i}}\right)\text{*}\left(\begin{array}{c}{\text{s}}_{\text{g}\left(1\right)}\\{\text{s}}_{\text{g}\left(2\right)}\\\begin{array}{c}{\text{s}}_{\text{g}\left(3\right)}\\{\text{s}}_{\text{g}\left(\text{n}\right)}\end{array}\end{array}\right)\end{aligned}$$
Whereas,
$$=\frac{{\varphi}}{{\text{d}}_{\text{n}}}.\frac{{\text{f}}_{\text{i}}}{\nabla}+\left(\begin{array}{c}{\text{c}}_{1}^{{\prime}}\\{\text{c}}_{2}^{{\prime}}\\\begin{array}{c}{\text{c}}_{3}^{{\prime}}\\{\text{c}}_{\text{n}}^{{\prime}}\end{array}\end{array}\right)\text{*}\left(\begin{array}{c}{\text{a}}_{1}\\{\text{a}}_{2}\\\begin{array}{c}{\text{a}}_{3}\\{\text{a}}_{\text{n}}\end{array}\end{array}\right)\text{*}\left(\begin{array}{c}{\text{s}}_{\text{g}\left(1\right)}\\{\text{s}}_{\text{g}\left(2\right)}\\\begin{array}{c}{\text{s}}_{\text{g}\left(3\right)}\\{\text{s}}_{\text{g}\left(\text{n}\right)}\end{array}\end{array}\right)+\underset{{\text{i}}_{\text{f}}\in\text{t}^{\prime}}{\text{min}}\; {\text{u}}_{\text{r}}+\left(\begin{array}{c}{\text{y}}_{1}\\{\text{y}}_{2}\\\begin{array}{c}{\text{y}}_{3}\\{\text{y}}_{\text{n}}\end{array}\end{array}\right)$$
(4b)
The interference level is detected post to this, allocation and re-allocation are followed up, and it is represented as\(\:\:{l}_{r}\), the delay is calculated for each channel process, and it is\(\:\:\{{y}_{1},{y}_{2},{y}_{3},{y}_{n}\}\). Here,\(\:\:{l}_{v}\) is interference level, the threshold value, the before and greater than is declared as interference. The maximization of quality is achieved, whereas interferences are reduced accurately. The interference cases are illustrated in Fig. 5 for the\(\:\:{i}_{f}\) over\(\:\:{y}_{n}\) for estimation.

Interference case illustrations for\(\:\:{\varvec{i}}_{\varvec{f}}\) over\(\:\:{\varvec{y}}_{\varvec{n}}\).
The channel allocation imposes two different sequences for\(\:\:{d}_{0}\) and\(\:\:{d}_{1}\) for interference cancellation. The\(\:\:{d}_{0}\) (Base station say) is responsible for the organization as\(\:\:\left({w}_{i}\colon\colon\:{u}_{r}\right)\forall\:{a}_{o}\left({c}^{{\prime\:}}\right)\) in on\(\:\:t\); this is violated\(\:\:{i}_{f}\left[{S}_{g\left(n\right)}\cdot\:{c}_{n}^{{\prime\:}}\cdot\:{a}_{n}\right]+\left[{a}_{n}\right]*\left[{u}_{g}\left(n\right)\right]\) is not a unity matrix. This refers to the existence of\(\:\:{i}_{f}\) accordingly where\(\:\:{v}_{x}\) is the extractable solution. Therefore, the allocation error is experienced under\(\:\:\|{S}_{g\left(n\right)}+{v}_{x}\|>{l}_{v}\) condition. This imposes\(\:\:\left[{i}_{f}<{t}^{{\prime\:}}\left({a}_{o}\right)\right]\) as\(\:\:\varphi\:\) for multiple\(\:\:{y}_{n}\) and\(\:\:{u}_{g}\) augmentations. Thus,\(\:\:\left({a}_{o},{l}_{r}\right)\) is the difference between various channel allocation instances apart from\(\:\:\left({y}_{1}to\:{y}_{n}\right)\) timelines. Thus,\(\:\:\nabla\:\) is identified under\(\:\:{i}_{f}\) the analysis represented in Fig. 5 which\(\:\:{L}_{o}\) is required. The interference cancellation is done for the convergence’s detection for the signal transfer, and it is derived below.
$${\text{i}}_{\text{e}}=\left\{\frac{\nabla}{{\text{s}}_{\text{g}\left(\text{n}\right)}}+\|\left(\left(\begin{array}{c}{\text{s}}_{\text{g}\left(1\right)}\\{\text{s}}_{\text{g}\left(2\right)}\\\begin{array}{c}{\text{s}}_{\text{g}\left(3\right)}\\{\text{s}}_{\text{g}\left(\text{n}\right)}\end{array}\end{array}\right)\text{*}\left(\begin{array}{c}{\text{y}}_{1}\\{\text{y}}_{2}\\\begin{array}{c}{\text{y}}_{3}\\{\text{y}}_{\text{n}}\end{array}\end{array}\right)\right)+\sum_{{\text{i}}_{\text{f}}\in{\text{l}}_{\text{v}}}\left({\text{q}}^{{\prime}}+{\text{L}}_{0}\right)\|\right\}\text{*}\frac{{\text{u}}_{\text{r}}\left(\text{n}\right)}{{\text{l}}_{\text{r}}+{\text{a}}_{0}}\text{*}\left(\begin{array}{c}{\text{c}}_{1}^{{\prime}}\\{\text{c}}_{2}^{{\prime}}\\\begin{array}{c}{\text{c}}_{3}^{{\prime}}\\{\text{c}}_{\text{n}}^{{\prime}}\end{array}\end{array}\right)$$
(5)
The interference cancellation is done for the convergence rate achievement, where it executes the better detection of interference and observes its level of processing. The interference cancellation is symbolized as\(\:\:{i}_{e}\), which is done convergence detection. This evaluation is considered and provides efficient signal transmission at the allocated time interval. From this approach, it relies on the radio resource sharing the data \(\:\:{u}_{r}\to\:x^{\prime\:}\left({d}_{1}\right)\) through the channel\(\:\:{c}^{{\prime\:}}\left({a}_{0}\right)<{f}_{i}\left({i}_{f}\right)\). On processing this evaluation step, it observes the interference level and executes the better signal-processing\(\:\:{l}_{v}\approx\:{i}_{f}\left({t}^{{\prime\:}}\right)\). The convergence rate is estimated in the below Equation as follows.
$${\text{g}}_{\text{c}}\left({\text{M}}^{{\prime}}\right)=\frac{1}{{\text{d}}_{\text{n}}}\text{*}\|\left(\sum_{{\text{u}}_{\text{k}}+{\text{d}}_{\text{k}}}{\text{f}}_{\text{i}}\left({\text{c}}^{{\prime}}\to{\text{a}}_{0}\right)\right)\text{*}{\text{s}}_{\text{g}\left(1\right)\dots}{\text{s}}_{\text{g}\left(\text{n}\right)}\|,\text{f}\text{o}\text{r}\text{a}\text{l}\text{l}{\text{c}}^{{\prime}}\in{\text{u}}_{\text{r}\left(1\right)}-\left(\begin{array}{c}{\text{y}}_{1}\\{\text{y}}_{2}\\\begin{array}{c}{\text{y}}_{3}\\{\text{y}}_{\text{n}}\end{array}\end{array}\right)$$
It is rewritten as,
$$=\left(\begin{array}{c}{\text{y}}_{1}\\{\text{y}}_{2}\\\begin{array}{c}{\text{y}}_{3}\\{\text{y}}_{\text{n}}\end{array}\end{array}\right)\text{*}\left(\sum_{{\text{u}}_{\text{k}}+{\text{d}}_{\text{k}}}{\text{f}}_{\text{i}}\left({\text{c}}^{{\prime}}\to{\text{a}}_{0}\right)\right)+\left(\begin{array}{c}{\text{c}}_{1}^{{\prime}}\\{\text{c}}_{2}^{{\prime}}\\\begin{array}{c}{\text{c}}_{3}^{{\prime}}\\{\text{c}}_{\text{n}}^{{\prime}}\end{array}\end{array}\right)\text{*}\left(\sum_{{\text{a}}_{0}\in{\text{u}}_{\text{r}}}\left({\text{u}}_{\text{k}}+{\text{d}}_{\text{k}}\right)\right)-{\text{t}}^{{\prime}}\text{*}\frac{{\text{d}}_{\text{n}}}{{\varphi}},$$
It is further derived as,
$$=\left(\begin{array}{c}{\text{y}}_{1}\\{\text{y}}_{2}\\\begin{array}{c}{\text{y}}_{3}\\{\text{y}}_{\text{n}}\end{array}\end{array}\right)\text{*}\left(\begin{array}{c}{\text{c}}_{1}^{{\prime}}\\{\text{c}}_{2}^{{\prime}}\\\begin{array}{c}{\text{c}}_{3}^{{\prime}}\\{\text{c}}_{\text{n}}^{{\prime}}\end{array}\end{array}\right)+\left(\sum_{{\text{a}}_{0}\in{\text{u}}_{\text{r}}}\left({\text{u}}_{\text{k}}+{\text{d}}_{\text{k}}\right)\right)\text{*}\left|{\left({\text{l}}_{\text{r}}-{\text{l}}_{\text{v}}\right)}^{2}\right|$$
(6)
The estimation is\(\:\:M{\prime\:}\), whereas convergence is\(\:\:{g}_{c},\) this method states the delay factor and reduces it to achieve the convergence rate. The radio resources are used to allocate better channel detection and transmit the information with the use of uplink and downlink\(\:\:{x}^{{\prime\:}}\left({u}_{k}+{d}_{W}\right)-t^{\prime\:}\). Based on these techniques, it illustrates the non-convex account and defines better information sharing from device to device. This part estimates the convergence rate using delay factor recognition, which uses self-interference cancellation. This technique classifies interference and non-interference allocations in the rate of uplink communications. The\(\:\:{g}_{c}\left({M}^{{\prime\:}}\right)\) analysis for two combinations of\(\:\:{u}_{k}\) and\(\:\:{d}_{k}\) is presented in Fig. 6.

\(\:\:{\varvec{g}}_{\varvec{c}}\left({\varvec{M}}^{\varvec{{\prime\:}}}\right)\) Analysis for Two\(\:\:({\varvec{y}}_{\varvec{n}},\:{\varvec{i}}_{\varvec{f}})\) Combinations of\(\:\:{\varvec{u}}_{\varvec{k}}\) and\(\:\:{\varvec{d}}_{\varvec{k}}\)
The\(\:\:{g}_{c}\left({M}^{{\prime\:}}\right)\) for\(\:\:{u}_{k}\) and\(\:\:{d}_{k}\) are significantly different, as presented in Fig. 6. In this\(\:\:{g}_{c}\left({M}^{{\prime\:}}\right)\) assessment,\(\:\:{c}^{{\prime\:}}\left({a}_{o}\right)<{f}_{i}\left({i}_{f}\right)\) is the violating condition balancing\(\:\:\left[{l}_{v}\approx\:{i}_{f}\left({t}^{{\prime\:}}\right)\right]\). For the\(\:\:{d}_{k},\left({l}_{r}-{l}_{v}\right)\) is the normalized\(\:\:{y}_{n}\) condition and\(\:\:\left[{u}_{r\left(1\:to\:n\right)}-{y}_{n}\right]\) is the\(\:\:{i}_{f}\) companion to achieve faster\(\:\:{g}_{c}\left({M}^{{\prime\:}}\right)\). Depending on the\(\:\:{L}_{o}\) the variant, the intensity for\(\:\:>\varphi\:\) and\(\:\:<\varphi\:\left(not=\varphi\:\right)\) are validated across\(\:\:\frac{\nabla\:}{{S}_{g\left(n\right)}}\) to ensure\(\:\:\left({q}^{{\prime\:}}+{L}_{o}\right)\) jointly reduces allocation errors in\(\:\:{d}_{k}\). This case is inverse for\(\:\:{u}_{k}\) where\(\:\:\left[\frac{{u}_{r}\left(n\right)}{{l}_{r}+{a}_{o}}\right]\) is the balancing constraint for new\(\:\:{u}_{r}\). If this relies on the same\(\:\:n\) as in the previous\(\:\:t\), then\(\:\:{f}_{i}\left({c}^{{\prime\:}}\to\:{a}_{o}\right)\) is the relying condition. Therefore, the inverse of\(\:\:\left[{y}_{n}*{c}_{n}^{{\prime\:}}\right]\) is the allocation constraint for\(\:\:{y}_{n}\in\:{u}_{k}\). Besides, the\(\:\:{i}_{f}\) requires\(\:\:\left[{S}_{g\left(n\right)}*{y}_{n}\right]\forall\:\frac{\nabla\:}{{S}_{g\left(n\right)}}\) under\(\:\:\left({l}_{r}+{a}_{o}\right)\in\:{g}_{c}\left({M}^{{\prime\:}}\right)\) to reduce its allocation error. The channel reassignment is addressed as an NCOP based on the available interference levels.
$${\text{S}}_{\text{l}}={\text{g}}_{\text{c}}+\left({\text{v}}^{{\prime}}-{\text{v}}_{\text{x}}\right)\text{*}{\text{u}}_{\text{r}}\left(1\right)+\left(\frac{{\text{d}}_{\text{n}}+{\text{s}}_{\text{g}\left(4\right)}}{\prod_{{\text{L}}_{0}}\left({\text{i}}_{\text{f}}+{\text{n}}_{\text{f}}\right)}\right)\text{*}\left(\begin{array}{c}{\text{a}}_{1}\\{\text{a}}_{2}\\\begin{array}{c}{\text{a}}_{3}\\{\text{a}}_{\text{n}}\end{array}\end{array}\right)\text{*}\left(\begin{array}{c}{\text{s}}_{\text{g}\left(1\right)}\\{\text{s}}_{\text{g}\left(2\right)}\\\begin{array}{c}{\text{s}}_{\text{g}\left(3\right)}\\{\text{s}}_{\text{g}\left(\text{n}\right)}\end{array}\end{array}\right)>\left({\text{t}}^{{\prime}}-{\text{i}}_{\text{f}}\right),\text{f}\text{orall}\; \text{x}^{\prime}\in\left(\begin{array}{c}{\text{y}}_{1}\\{\text{y}}_{2}\\\begin{array}{c}{\text{y}}_{3}\\{\text{y}}_{\text{n}}\end{array}\end{array}\right),$$
$$=\left(\begin{array}{ccc}{\text{a}}_{1}&{\text{c}}_{1}^{{\prime}}&{\text{s}}_{\text{g}\left(1\right)}\\{\text{a}}_{2}&{\text{c}}_{2}^{{\prime}}&{\text{s}}_{\text{g}\left(2\right)}\\\begin{array}{c}{\text{a}}_{3}\\{\text{a}}_{\text{n}}\end{array}&\begin{array}{c}{\text{c}}_{3}^{{\prime}}\\{\text{c}}_{\text{n}}^{{\prime}}\end{array}&\begin{array}{c}{\text{s}}_{\text{g}\left(3\right)}\\{\text{s}}_{\text{g}\left(\text{n}\right)}\end{array}\end{array}\right)-\left(\begin{array}{c}{\text{y}}_{1}\\{\text{y}}_{2}\\\begin{array}{c}{\text{y}}_{3}\\{\text{y}}_{\text{n}}\end{array}\end{array}\right)\text{*}\frac{\nabla}{{\text{s}}_{\text{g}\left(\text{n}\right)}}+\frac{{\varphi}}{\left({\text{v}}^{{\prime}}-{\text{v}}_{\text{x}}\right)}$$
(7)
From the above Equation, the self-interference cancellation is followed up on when the allocation is done. The self-interference is\(\:\:{S}_{l}\), here the convex and non-convex are used for this processing step, and they are labelled as\(\:\:{v}_{x}\:\text{a}\text{n}\text{d}\:v{\prime\:}\). In this part, it illustrates the interference and non-interferences, and it is represented as\(\:\:{n}_{f}\). Hence, the self-interference cancellation relies on non-convex channel allocations across various switching. In this part, the self-cancellation is done if interference occurs beyond the threshold where the channel transmission delay is the resultant. This strategy is addressed by introducing the NCOP method and is discussed below.
Non-Convex optimization inclusion
The radio resource allocation and usage for massive users results in interference between the D2D uplink channels. The NCOP method is introduced to resolve this issue, identifying the chances of self-interference cancellations. This technique classifies interference and non-interference allocations in the rate of uplink communications. The channel reassignment is carried out efficiently based on the available interference levels. In this section, the overlapping resource allocation is addressed and derived below.
$${z}_{p}={u}_{r}\left({o}_{p}\right)*\left({i}_{f}+{f}_{i}\right)+\left\{\left(\begin{array}{c}{c}_{1}^{{\prime}}\\{c}_{2}^{{\prime}}\\\begin{array}{c}{c}_{3}^{{\prime}}\\{c}_{n}^{{\prime}}\end{array}\end{array}\right)+\left(\begin{array}{c}{s}_{g\left(1\right)}\\{s}_{g\left(2\right)}\\\begin{array}{c}{s}_{g\left(3\right)}\\{s}_{g\left(n\right)}\end{array}\end{array}\right)\right\}-\left\{\left(\begin{array}{c}{a}_{1}\\{a}_{2}\\\begin{array}{c}{a}_{3}\\{a}_{n}\end{array}\end{array}\right)-\left(\begin{array}{c}{y}_{1}\\{y}_{2}\\\begin{array}{c}{y}_{3}\\{y}_{n}\end{array}\end{array}\right)\right\},$$
It is computed for the non-convex and convex functionality,
$${=\text{o}}_{\text{p}}+{\text{u}}_{\text{r}\left(1\right)}\to{\text{u}}_{\text{r}\left(\text{n}\right)}\text{*}\left(\begin{array}{c}{\text{c}}_{1}^{{\prime}}\\{\text{c}}_{2}^{{\prime}}\\\begin{array}{c}{\text{c}}_{3}^{{\prime}}\\{\text{c}}_{\text{n}}^{{\prime}}\end{array}\end{array}\right)\to\left(\begin{array}{cc}{\text{s}}_{\text{g}\left(1\right)}&{\text{a}}_{1}\\{\text{s}}_{\text{g}\left(2\right)}&{\text{a}}_{2}\\\begin{array}{c}{\text{s}}_{\text{g}\left(3\right)}\\{\text{s}}_{\text{g}\left(\text{n}\right)}\end{array}&\begin{array}{c}{\text{a}}_{3}\\{\text{a}}_{\text{n}}\end{array}\end{array}\right),\text{f}\text{o}\text{r}\text{a}\text{l}\text{l}{\text{o}}_{\text{p}}\in\left({\text{d}}_{1}+.{\text{d}}_{\text{n}}\right)$$
(8)
This process of optimization results in better D2D communication by decreasing the overlapping rate of resources allocated to the same devices. This leads to interference between the radio resources. The optimization is described as\(\:\:{z}_{p}\), whereas overlapping is\(\:\:{o}_{p}\). This is observed,\(\:\:{x}^{{\prime\:}}\left({d}_{1}\to\:{d}_{n}\right)*\frac{\varphi\:}{{u}_{r\left(n\right)}}\), on executing this self-interference cancellation, it is followed up accurately and ensures device-to-device communication. The overlapping instances and their joint mitigation under NCOP’s first classification inclusion are presented in Fig. 7. The\(\:\:{Z}_{p}\) analysis in the NCOP differs for\(\:\:\left({i}_{f}+{f}_{i}\right)\forall\:{d}_{k}\)and\(\:\:\left({a}_{n}-{y}_{n}\right)\forall\:{u}_{k}\). In both cases,\(\:\:{u}_{r\left(1\right)}\:to\:{u}_{r\left(n\right)}\) and vice versa is required to meet the\(\:\:\left[\frac{{u}_{r}\left(n\right)}{{l}_{r}+{a}_{o}}\right]\) case fittings to reduce\(\:\:{i}_{f}\). In particular, the chances of\(\:\:{i}_{e}\) is overlooked for\(\:\:{S}_{l}\) such that\(\:\:\left[{S}_{g\left(n\right)}>\left({t}^{{\prime\:}}-{i}_{f}\right)\forall\:\frac{\varphi\:}{\left({v}^{{\prime\:}}-{v}_{x}\right)}\right]\) is the\(\:\:{u}_{k}\) and\(\:\:{d}_{k}\) mapping features for\(\:\:{Z}_{p}\). Therefore, as this case does not fit for non-convex optimization where\(\:\:{g}_{c}\left({M}^{{\prime\:}}\right)\) is required\(\:\:\frac{\nabla\:}{{S}_{g\left(n\right)}}\), the chances of\(\:\:\left[{a}_{n}\cdot\:{c}_{n}^{{\prime\:}}\cdot\:{S}_{g\left(n\right)}\right]\) forming a unity matrix is less. Thus, the alternating response is the chance verification of\(\:\:\left[{c}_{n}^{{\prime\:}}+{S}_{g\left(n\right)}-\left({a}_{n}-{y}_{n}\right)\right]\) to form the unity matrix. If this is achievable, then the\(\:\:{g}_{c}\left({M}^{{\prime\:}}\right)\) is the converging decision for multiple\(\:\:t\) under\(\:\:\left[{l}_{v}\approx\:{i}_{f}\left({t}^{{\prime\:}}\right)\right]\) instances. In these instances, the\(\:\:{i}_{e}\) is active, and maximum convergence conditions are admitted (Fig. 7).

\(\:\:{\varvec{z}}_{\varvec{p}}\) Analysis for Joint Mitigation of\(\:\:{\varvec{i}}_{\varvec{f}}\) under NCOP.
The channel re-assigning is performed after the interference and non-interference allocation classifications. This requires the uplink communications rate examination for further allocation. Based on the available interference levels, they are done using the re-assigning method.
$${r}_{h}=\left(\begin{array}{c}{c}_{1}^{{\prime}}\\{c}_{2}^{{\prime}}\\\begin{array}{c}{c}_{3}^{{\prime}}\\{c}_{n}^{{\prime}}\end{array}\end{array}\right)+\left(\begin{array}{cc}{s}_{g\left(1\right)}&{a}_{1}\\{s}_{g\left(2\right)}&{a}_{2}\\\begin{array}{c}{s}_{g\left(3\right)}\\{s}_{g\left(n\right)}\end{array}&\begin{array}{c}{a}_{3}\\{a}_{n}\end{array}\end{array}\right)\text{*}{o}_{p}+\left(\begin{array}{c}{u}_{g}\left(1\right)\\{u}_{g}\left(2\right)\\\begin{array}{c}{u}_{g}\left(3\right)\\{u}_{g}\left(n\right)\end{array}\end{array}\right)-\left\{\left(\begin{array}{c}{a}_{1}\\{a}_{2}\\\begin{array}{c}{a}_{3}\\{a}_{n}\end{array}\end{array}\right)-\left(\begin{array}{c}{y}_{1}\\{y}_{2}\\\begin{array}{c}{y}_{3}\\{y}_{n}\end{array}\end{array}\right)\right\}$$
(9)
Channel re-assigning is done using level-based interference detection associated with device communication. The convergence rate is estimated using the interference level and the number of channels reassigned for the uplink devices. This is based on the interference cancellation method, where the convergences are fixed for efficient communication. For this process, the delay factor is addressed by re-assigning the channel for the reliable establishment of communication between device and device. The re-assigning of the channel is\(\:\:{r}_{h}\), performed for the convex achievement in this work. The channel improvement is done using detected allocations, represented as follows.
$${\text{f}}_{\text{i}}\left({\text{c}}^{{\prime}}\right)=\left(\begin{array}{ccc}{\text{a}}_{1}&{\text{c}}_{1}^{{\prime}}&{\text{s}}_{\text{g}\left(1\right)}\\{\text{a}}_{2}&{\text{c}}_{2}^{{\prime}}&{\text{s}}_{\text{g}\left(2\right)}\\\begin{array}{c}{\text{a}}_{3}\\{\text{a}}_{\text{n}}\end{array}&\begin{array}{c}{\text{c}}_{3}^{{\prime}}\\{\text{c}}_{\text{n}}^{{\prime}}\end{array}&\begin{array}{c}{\text{s}}_{\text{g}\left(3\right)}\\{\text{s}}_{\text{g}\left(\text{n}\right)}\end{array}\end{array}\right)-\left(\begin{array}{c}{\text{y}}_{1}\\{\text{y}}_{2}\\\begin{array}{c}{\text{y}}_{3}\\{\text{y}}_{\text{n}}\end{array}\end{array}\right)+\sum_{{\text{i}}_{\text{f}}\in{\text{r}}_{\text{h}}}\left({\text{o}}_{\text{p}}-{\text{v}}_{\text{x}}\right)+\left(\begin{array}{c}{\text{u}}_{\text{g}}\left(1\right)\\{\text{u}}_{\text{g}}\left(2\right)\\\begin{array}{c}{\text{u}}_{\text{g}}\left(3\right)\\{\text{u}}_{\text{g}}\left(\text{n}\right)\end{array}\end{array}\right)\text{*}\|{\left({\text{g}}_{\text{c}}+{\text{d}}_{\text{n}}\right)}^{2}\|+\left(\begin{array}{c}{\text{d}}_{1}\\{\text{d}}_{2}\\\begin{array}{c}{\text{d}}_{3}\\{\text{d}}_{\text{n}}\end{array}\end{array}\right)-\text{t}^{\prime},$$
Whereas, it is derived as,
$$=\left(\begin{array}{cc}{\text{u}}_{\text{g}\left(1\right)}&{\text{c}}_{1}^{{\prime}}\\{\text{u}}_{\text{g}\left(2\right)}&{\text{c}}_{2}^{{\prime}}\\\begin{array}{c}{\text{u}}_{\text{g}\left(3\right)}\\{\text{u}}_{\text{g}\left(\text{n}\right)}\end{array}&\begin{array}{c}{\text{c}}_{3}^{{\prime}}\\{\text{c}}_{\text{n}}^{{\prime}}\end{array}\end{array}\right)-\left(\begin{array}{cc}{\text{d}}_{1}&{\text{y}}_{1}\\{\text{d}}_{2}&{\text{y}}_{2}\\\begin{array}{c}{\text{d}}_{3}\\{\text{d}}_{\text{n}}\end{array}&\begin{array}{c}{\text{y}}_{3}\\{\text{y}}_{\text{n}}\end{array}\end{array}\right)\text{*}\sum_{{\text{u}}_{\text{k}}+{\text{d}}_{\text{k}}}\left({\text{p}}_{\text{h}}+{\text{w}}_{\text{i}}\right)+{\text{z}}_{\text{p}}\text{*}\frac{{\text{d}}_{\text{n}}}{{\varphi}+\left({\text{l}}_{\text{v}}\right)}$$
(10)
The channel improvement is estimated using the above Equation by analyzing interference and self-cancellation methods. This is associated with reliable communication without any delay and data loss. Based on the NCOP for\(\:\:{f}_{i}\left({c}^{{\prime\:}}\right)\), the\(\:\:{i}_{e}\) and its cancellation rates are analyzed in Fig. 8.

Algorithm 1 shows the Pseudocode of Proposed NCOP.

\(\:\:{\varvec{f}}_{\varvec{i}}\left({\varvec{c}}^{\varvec{{\prime\:}}}\right)\) and\(\:\:{\varvec{i}}_{\varvec{e}}\) Analysis based on\(\:\:{\varvec{L}}_{0}\).
Figure 8 consolidates the relevant metrics, such as\(\:\:{f}_{i}\left({c}^{{\prime\:}}\right),\:{i}_{e},\:{r}_{h},\:and\:{o}_{p}\forall\:{y}_{n}\) and\(\:\:{i}_{f}\). As mentioned earlier, the\(\:\:{L}_{o}\) is the crucial factor that determines the\(\:\:{u}_{k}\) and\(\:\:{d}_{k}\) balance under various\(\:\:t\). The\(\:\:{i}_{f}\) identified\(\:\:\forall\:\frac{\nabla\:}{{S}_{g\left(n\right)}}\) is suppressed under\(\:\:\left({o}_{p}-{v}_{x}\right)\forall\:convex\) outputs that are generated by\(\:\:\left[{a}_{n}\cdot\:{c}_{n}^{{\prime\:}}\cdot\:{S}_{g\left(n\right)}\right]\) as a unity matrix. Considering the\(\:\:{r}_{h}\) for such cases, the\(\:\:\left({p}_{h}+{w}_{i}\right)\forall\:\left[{u}_{g\left(n\right)}\cdot\:{c}_{n}^{{\prime\:}}-{d}_{n}{y}_{n}\right]\) is the\(\:\:{Z}_{p}\) separating point. The more precise point is the \(\:<\varphi\:\) and\(\:\:>\varphi\:\) defined from\(\:\:{L}_{o}\) for multiple\(\:\:\left[\frac{{d}_{n}}{\varphi\:+\left({l}_{v}\right)}\right]\) suppressing\(\:\:{r}_{h}\) under\(\:\:{i}_{f}\) and\(\:\:{y}_{n}\). Thus, the\(\:\:\left[{c}^{{\prime\:}}\left({a}_{o}\right)<{f}_{i}\left({i}_{f}\right)\right]\) is the\(\:\:{r}_{h}\) reducing constraint for\(\:\:{o}_{p}\) balance and\(\:\:\varphi\:\) classification. This requires a convex and non-convex point separation such that the\(\:\:\left({d}_{n}-{t}^{{\prime\:}}\right)\) is the\(\:\:\left({p}_{h}+{w}_{i}\right)\) achieving factor. All these combinations enhance the\(\:\:{i}_{e}\) reduction under\(\:\:{Z}_{p}>\varphi\:\) and\(\:\:<\varphi\:\) cases identifying\(\:\:{L}_{o}\) value. This study illustrates the NCOP method for detecting interferences where the re-assigning is processed efficiently, which provides a better convergence rate and enhances device communication. Therefore, the 5G communication features coexist with the D2D uplinks for interference cancellations to improve channel allocation.
Network heterogeneity, resource availability, and fluctuations in interference caused by mobility are three of the main obstacles to implementing NCOP in real-world 5G networks. Uniform optimization becomes more challenging when dealing with various devices, each with its unique combination of power, computing capability, and antenna arrangement. Due to the computing demands of real-time convex optimization, which may cause delay problems in high-traffic situations with limited computational resources, another restriction is the availability of resources. NCOP must make real-time adjustments because user movement brings about dynamic interference variations. Because of handoffs, changing channel conditions, and unanticipated variations in network traffic, a mobile device’s interference levels might fluctuate suddenly, making it hard to keep an optimization framework consistent.