2022
DOI: 10.1049/cmu2.12378
|View full text |Cite
|
Sign up to set email alerts
|

Completion time minimization for UAV enabled data collection with communication link constrained

Abstract: This paper studies unmanned aerial vehicles (UAV) enabled industrial Internet of Things while a UAV dispatched to collect data of low‐power ground sensor nodes (SNs) in multi‐obstacle environment. The authors aim to minimize the completion time while satisfying the communication link constraints of each SN and obstacle avoidance, data collection requirements etc. To this end, the authors first formulate the completion time minimization problem by jointly optimizing the UAV trajectory and collection sequence of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(15 citation statements)
references
References 44 publications
0
15
0
Order By: Relevance
“…A similar proof can be found in Appendix A. □ C 3 can be converted to the stability constraint of virtual priority deficit queue F i (t ) that is, C 3 is satisfied when F i (t ) is mean rate stable [5]. Define the Lyapunov function as…”
Section: Problem Transformationmentioning
confidence: 99%
See 2 more Smart Citations
“…A similar proof can be found in Appendix A. □ C 3 can be converted to the stability constraint of virtual priority deficit queue F i (t ) that is, C 3 is satisfied when F i (t ) is mean rate stable [5]. Define the Lyapunov function as…”
Section: Problem Transformationmentioning
confidence: 99%
“…C 3 can be converted to the stability constraint of virtual priority deficit queue Fi(t)$F_i(t)$ that is, C 3 is satisfied when Fi(t)$F_i(t)$ is mean rate stable [5]. Define the Lyapunov function as Lfalse(normalΘ(t)false)=12uiUFi2false(tfalse)$$\begin{align} L(\Theta (t))=\frac{1}{2} \sum _{u_i \in \mathcal {U}} F_i^2(t) \end{align}$$…”
Section: Priority‐aware Dqn‐based Intelligent Access Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…Authors in [8] used a UAV-aided communication network to serve randomly moving users and proposed an adaptive deployment strategy. With the UAV being used to collect data of low-power ground sensor nodes in an obstacle environment, the completion time can be minimized by jointly optimizing the UAV trajectory and collection sequence of sensor nodes [9,10]. UAVs have significant advantages in high mobility, and a rational trajectory can effectively improve the quality of the network.…”
Section: Introductionmentioning
confidence: 99%
“…However, these studies did not consider the existence of obstacles in the paths of UAVs, whereas there can be many obstacles (e.g., buildings, mountains, big trees, and no-fly zone areas) in a UAV's trajectory that need to be avoided when it flies from one sensor to another. Although some studies considered obstacles in the UAV trajectories [16][17][18][19][20][21], they did not consider the UAV path as the Hamiltonian path, which is impractical because UAVs are battery-constrained devices and need to return to the base station (BS) to recharge their batteries after a given period of data collection.…”
Section: Introductionmentioning
confidence: 99%