2021
DOI: 10.1109/tgcn.2021.3085867
|View full text |Cite
|
Sign up to set email alerts
|

Trajectory Design for Throughput Maximization in UAV-Assisted Communication System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(9 citation statements)
references
References 37 publications
0
9
0
Order By: Relevance
“…Regarding access techniques, we found that 31.53% of the analyzed papers have modeled various techniques, including FDMA, OFDMA, TDMA, and NOMA. Specifically, 12.3% of the papers have focused on FDMA (i.e., ( [63], [72], [77], [88], [92], [107], [112], [120], [134], [135], [149], [165], [173], [182], [189], [190]) as depicted in Figure 10. For example, studies such as You et al [182] and Hayanjneh et al [149] employed FDMA, where UAVs divide the available bandwidth into sub-bands, with each frequency sub-band transmitting data independently to a ground user.…”
Section: B: Access and Interference Techniquementioning
confidence: 99%
See 2 more Smart Citations
“…Regarding access techniques, we found that 31.53% of the analyzed papers have modeled various techniques, including FDMA, OFDMA, TDMA, and NOMA. Specifically, 12.3% of the papers have focused on FDMA (i.e., ( [63], [72], [77], [88], [92], [107], [112], [120], [134], [135], [149], [165], [173], [182], [189], [190]) as depicted in Figure 10. For example, studies such as You et al [182] and Hayanjneh et al [149] employed FDMA, where UAVs divide the available bandwidth into sub-bands, with each frequency sub-band transmitting data independently to a ground user.…”
Section: B: Access and Interference Techniquementioning
confidence: 99%
“…Citation information: DOI 10.1109/OJVT.2024.3379751 a sequence of simpler problems, sometimes even incorporating non-convex constraints. Also, some studies like [63], [69], [92], [118], [119], [152] use Bisections research or their variant Golden section search or line search in polynomial time to resolve the MINLP. Additionally, certain studies, such as [63], [69], [92], [118], [119], [152], utilize Bisection research or their variants, like the Golden Section Search or Line Search.…”
Section: Volume 29mentioning
confidence: 99%
See 1 more Smart Citation
“…But it considered the online decision mode and neglected UAV's flight energy consumption. The authors in [44] proposed an iterative solution for obtaining optimal UAV trajectory in online mode, which took into account the same propulsion energy consumption as in [16]. However, the optimization of transmission power was neglected in this paper.…”
Section: A Related Workmentioning
confidence: 99%
“…Similarly, outage probability, as well as throughput, is optimized in Reference 21 for multiple UAV‐assisted cooperative communication networks to enhance the performance of the UAV‐aided relay network. In Reference 22, the trajectory optimization for a UAV‐assisted communication network has been discussed to maximize the average sum rate of all the users.…”
Section: Introductionmentioning
confidence: 99%