2019
DOI: 10.1109/tccn.2019.2922263
|View full text |Cite
|
Sign up to set email alerts
|

Data Dissemination in IoT Using a Cognitive UAV

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 43 publications
(30 citation statements)
references
References 20 publications
0
30
0
Order By: Relevance
“…To unlock the potential of UAV-enabled communication systems, joint UAV's trajectory and transmit power design has been studied under different scenarios [29]- [33]. However, these works assumed perfect channel estimations, which depends on the availability of accurate estimation for the locations of ground nodes.…”
Section: A Background and Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…To unlock the potential of UAV-enabled communication systems, joint UAV's trajectory and transmit power design has been studied under different scenarios [29]- [33]. However, these works assumed perfect channel estimations, which depends on the availability of accurate estimation for the locations of ground nodes.…”
Section: A Background and Motivationmentioning
confidence: 99%
“…By jointly optimizing the base station/UAV transmit power and the UAV's trajectory, the achievable rate of the ground user can be maximized. In [33], the authors deployed a cognitive UAV to convey data to a set of Internetof-Things devices. Although the above literature discussed the application of cognitive UAVs in various scenarios, they did not address the robust UAV's trajectory and transmit power design issues in UAV-enabled CR networks when the locations of ground nodes cannot be accurately estimated.…”
Section: ) Traditionally Terrestrial Cr Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors in [ 67 ] proposed a data-dissemination mechanism for a UIoT network using a cognitive UAV. Their main objective was to maximize the number of bits received by the IoT devices from the UAV.…”
Section: Mac Protocols For Uiotmentioning
confidence: 99%
“…In SSU [ 67 ], the optimal transmission strategy is employed to maximize the number of bits received by the IoT from the cognitive UAV. The UAV keeps the number of slots interfering with the primary user (PU) below a certain threshold, to protect the PU from harmful interference.…”
Section: Comparison Of Mac Protocols For Uiotmentioning
confidence: 99%