2019
DOI: 10.1109/twc.2019.2928539
|View full text |Cite
|
Sign up to set email alerts
|

UAV-Assisted Relaying and Edge Computing: Scheduling and Trajectory Optimization

Abstract: In this paper, we study an unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) architecture, in which a UAV roaming around the area may serve as a computing server to help user equipment (UEs) compute their tasks or act as a relay for further offloading their computation tasks to the access point (AP). We aim to minimize the weighted sum energy consumption of the UAV and UEs subject to the task constraints, the information-causality constraints, the bandwidth allocation constraints and the UAV's… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
161
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 305 publications
(163 citation statements)
references
References 29 publications
1
161
0
1
Order By: Relevance
“…IV. SIMULATION RESULTS In this section, simulation results are given to show the UAV's trajectory and the performance of the proposed algo- (10,10), (−10, 10), (−10, −10), (10, −10)] in the following figures. Fig.…”
Section: B Uav Trajectory Designmentioning
confidence: 99%
See 1 more Smart Citation
“…IV. SIMULATION RESULTS In this section, simulation results are given to show the UAV's trajectory and the performance of the proposed algo- (10,10), (−10, 10), (−10, −10), (10, −10)] in the following figures. Fig.…”
Section: B Uav Trajectory Designmentioning
confidence: 99%
“…For the conventional MEC architectures, the AP plays a vital role in helping the UEs compute their offloaded tasks. In order to relieve the burden of the AP for computing and improve users' experience, the unmanned aerial vehicle (UAV)-enabled MEC has drawn great attention [9][10][11], mainly due to the attractive advantages of the UAVs, such as flexible movement, line-of-sight (LoS) connections, and moderate computing and caching capabilities, etc. [12].…”
Section: Introductionmentioning
confidence: 99%
“…[8] studied the secrecy performance analysis in a UAV DF relay system with energy harvesting. In [9], HU et al considered the energy consumption minimization problem in UAV-assisted relay system, where UAV is regarded as a computation server for user equipments (UEs) and forwards the result to the access point. In [10], Li et al provided a UAV-enable two-way relay system, where a set of UEs was considered.…”
Section: Introductionmentioning
confidence: 99%
“…where w 1 = vec (W 1 ) . Similarly, we can convert other terms in (9). We define Φ i w i w H i , then the sum retained energy becomes…”
mentioning
confidence: 99%
“…However, it is impossible to take full use of the computing resources at the AP if the UEs' links to the AP are seriously degraded. Besides, it is risky to rely only on the UAVs for completing UEs' computation-intensive latency-critical tasks since the UAVs are also resource-limited [14]. For these reasons, this paper studies a UAV-assisted MEC architecture, where the computing resources at the UAV and the AP are utilized at the same time.…”
Section: Introductionmentioning
confidence: 99%