2013
DOI: 10.20535/2411-2976.12013.14-20
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Control of Telecommunication Aeroplatform in the Area of Emergency

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 3 publications
0
10
0
Order By: Relevance
“…We assume that each drone-BS adopts a frequency division multiple access (FDMA) technique (as done in [19] and [28]) when servicing its associated drone-UEs. Hence, the average downlink 1 Note that, drone-BSs are an essential part of a 3D cellular network, since drone-UEs are not capable of continuously maintaining LoS links and sending uplink data directly to HAPs due to their mobility and energy limitations.…”
Section: System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…We assume that each drone-BS adopts a frequency division multiple access (FDMA) technique (as done in [19] and [28]) when servicing its associated drone-UEs. Hence, the average downlink 1 Note that, drone-BSs are an essential part of a 3D cellular network, since drone-UEs are not capable of continuously maintaining LoS links and sending uplink data directly to HAPs due to their mobility and energy limitations.…”
Section: System Modelmentioning
confidence: 99%
“…Initialize: H ← set of candidate for {hx, hy, hz}, L(hbest) ← ∞ for hx, hy, hz ∈ H do for j = 1, · · · , L do Build a model using (28) with Xi, i ∈ {1, · · · , L}, i = j sum← sum+ 1 2 log hx + 1 2 log hy Fig. 9 shows the negative log-likelihood function.…”
Section: Algorithm 1 Drone-ues' Distribution Estimation Algorithmmentioning
confidence: 99%
“…Let s i = (x i , y i , h i ) be the three-dimensional (3D) coordinate of each UAV i ∈ M with h i being the altitude of UAV i. We consider a downlink scenario in which each UAV adopts a frequency division multiple access (FDMA) technique to provide service for the ground users as done in [2] and [23]. Let P i and B i be, respectively, the maximum transmit power and the total available bandwidth for UAV i.…”
Section: System Modelmentioning
confidence: 99%
“…Proof: We use the Kantorovich duality theorem (23) in which f (x, y) and Γ = i∈M ω i δ s i are two probability measures, and J(v, s) is the cost function. Clearly, due to the continuity of f (x, y) and J(v, s i ), the Monge's problem is equivalent to the Monge-Kantorovich problem.…”
Section: B Optimal Cell Partitioningmentioning
confidence: 99%
“…The transmission time ttransj consists of the following intervals: establishment of connection tvsvj (exchange of service messages), waiting for transmission tпрj (according to the protocol of multiple access to the channel) and transmission of monitoring data tbperj (the transmission rate s in the radio channel depends on the distance d between the node and the TA, protocols (pkf ) channel and physical layers). The data exchange time must exceed the lifetime of the radio channel during the flight of the TA over this node (12). Therefore, the flight altitude of a TA is determined taking into account the target control functions and restrictions on its resources.…”
Section: Fig 2 -Components Of the Ekahau Positioning Systemmentioning
confidence: 99%