Computation Rate Maximization in UAV-Enabled Wireless Powered Mobile-Edge Computing Systems
Computation Rate Maximization in UAV-Enabled Wireless Powered Mobile-Edge Computing Systems
Abstract—Mobile edge computing (MEC) and wireless power computation offloading, partial computation offloading.
transfer (WPT) are two promising techniques to enhance the
computation capability and to prolong the operational time I. I NTRODUCTION
of low-power wireless devices that are ubiquitous in Internet
arXiv:1806.04589v2 [eess.SP] 17 Jul 2018
the noise power at the mth user. 2) Users Choosing to Perform Task Offloading: Each user
After all users offload their computation tasks at the nth in M1 exploits all the harvested energy to perform task of-
slot, the UAV performs computing task and sends the com- floading. The TDMA protocol is applied to avoid interference
puting results back to all the users. Similar to [14]-[16], the among these users during the offloading process. Since the
computation time and the downloading time of the UAV are total offloading time of all users in M1 at the nth slot cannot
neglected since the UAV has a much stronger computation exceed the duration of a time slot, one has
capability than the users and the number of the bits related to X
the computation result is very small. Since the total offloading tj [n] ≤ 1, n ∈ N . (9)
time of all users does not exceed the duration of one time slot, j∈M1
Let RjO denote the total computation rate of the jth user in constraint imposed on each user; C2 represents the energy
the set M1 . Then, one has harvesting causal constraint; C3 is the time constraint that the
N total time of all users offloading the computation bits cannot
O
X BT tj [n] hj [n] Pj [n] exceed the duration of each time slot; C4 and C5 are the
Rj = log2 1 + , j ∈ M1 .
n=1
νj N σ02 speed constraint and the initial and final horizontal location
(10) constraint of the UAV, respectively. P1 is non-convex since
The energy harvesting causal constraint for a user in M1 can there exist non-linear couplings among the variables, fm [n],
be given as Pm [n],qu [n], tm [n] and the objective function is non-concave
with respect to the trajectory of the UAV. In order to solve it, a
n n
T X η0 T X two-stage alternative optimization algorithm is proposed. The
tj [k] Pj [k] ≤ hj [k] P0 , n ∈ N , j ∈ M1 .
N N details for the algorithm are presented as follows.
k=1 k=1
(11) B. Two-Stage Alternative Optimization Algorithm
Sections III and IV will respectively formulate the compu- Let zm [n] = tm [n] Pm [n] , n ∈ N . For a given trajectory,
tation rate maximization problem for the partial and binary P1 can be transformed into P2 .
computation offloading modes. M
X
III. R ESOURCE A LLOCATION U NDER T HE PARTIAL P2 : max wm
fm [n],zm [n],tm [n]
m=1
C OMPUTATION O FFLOADING M ODE " #
N
In this section, the resource allocation problem is studied
X T fm [n] BT tm [n] hm [n] zm [n]
× + log2 1 +
under the partial computation offloading mode. The weighted n=1
NC νm N tm [n] σ02
sum computation bits are maximized by jointly optimizing the (13a)
CPU frequencies, the offloading times and the transmit powers s.t. C1, C3, (13b)
of users as well as the trajectory of the UAV. In order to tackle n n
this non-convex problem, a two-stage alternative algorithm is T X 3
η0 T X
C5 : γc fm [k] + zm [k] ≤ hm [k] P0 ,
proposed. N N
k=1 k=1
where l denotes the iteration index; θ (l) and ϑ (l) represent where the equality holds when qu [n] = qu, [n].
a
the iterative steps at the lth iteration. In (16), ∆λm,n (l) and Proof: Let f (z) = b+z , where a and b are positive
∆αn (l) are the corresponding subgradients, given as constants, and z ≥ 0. Since f (z) is convex with respect to z,
the following inequality can be obtained:
n
η0 T X
∆λm,n (l) = hm [k] P0 a a a
N ≥ −
k=1
b+z b + z0 2 (z − z0 ) , (20)
n (b + z0 )
T Xh l,opt
3 i
− γc fm [k] + zm l,opt [k] , (17a)
N where z0 is a given local point. By using (20), Theorem 4 is
k=1
M
X proved.
∆αn (l) = 1 − tl,opt
m [n], n ∈ N , (17b) In order to tackle the objective function of P3 , Lemma 2 is
m=1 given as follows.
Lemma 2: [27] Using the SCA method, the following optimization algorithm denoted by Algorithm 1 is further
inequality can be obtained, developed to solve P1 . The details for Algorithm 1 can be
found in Table I. In Table I, Ri denotes the value of the
β0 Pm [n] objective function of P1 at the ith iteration.
log2 1 + ≥ ym, ({qu [n]}) ,
2 2 2
σ0 H + kqu [n] − qm k IV. R ESOURCE A LLOCATION IN B INARY C OMPUTATION
(21a) O FFLOADING M ODE
β0 Pm [n] In this section, the weighted sum computation bits max-
ym, ({qu [n]}) = log2 1 + imization problem is studied in the UAV-enabled wireless
2 2 2
σ0 H + kqu, [n] − qm k powered MEC system under the binary computation offloading
β0 Pm [n] log2 e mode. The CPU frequencies of the users that choose to
− perform local computation, the offloading times, the transmit
2 2
σ02 H 2 + β0 Pm [n] + σ02 kqu, [n]k H 2 + kqu, [n]k powers of users that choose to perform task offloading, the
trajectory of the UAV, and the mode selection are jointly
2 2
× kqu [n]k − kqu, [n]k , (21b)
optimized to maximize the weighted sum computation bits
where the equality holds when qu [n] = qu, [n]. of all users. The formulated problem is a mixed integer
non-convex optimization problem, for which a three-stage
TABLE I: Two-stage alternative optimization algorithm alternative optimization problem is proposed.
A. Resource Allocation Problem Formulation
Algorithm 1: The two-stage alternative optimization algorithm
1: Setting:
Under the binary computation offloading mode, the
P0 , T , N , Vmax , q0 , qF , and the tolerance errors ξ, ξ1 ; weighted sum computation bit maximization problem subject
2: Initialization: to the energy harvesting causal constraints, the UAV speed and
The iterative number i = 1, λim,n , αin and qiu [n];
position constraints is formulated as P5 ,
3: Repeat 1:
opt,i opt,i N
calculate fm [n] and Pm [n] using Theorem 1 X X fi [n] T
for given qiu [n]; P5 : max wi
use the bisection method to solve (20) and obtain ti,optm [n]; fi [n],Pj [n],q[n], CN
tj [n],M0 ,M1 i∈M0 n=1
update λim,n and αin using the subgradient algorithm;
initialize the iterative number j = 1; X wj BT XN
Repeat 2:
hj [n] Pj [n]
+ tj [n] log2 1 + (23a)
solve P4 by using CVX for the given fm opt,i opt,i
[n], Pm [n] νj N n=1 σ02
i,opt
j∈M1
and tm [n]; n n
update j = j + 1, and qju [n]; T X η0 T X
N
s.t. γc fi3
[k] ≤ hi [k] P0 , n ∈ N , i ∈ M0 ,
if
P
qju [n] − qj−1 [n] ≤ ξ
N N
u k=1 k=1
n=1
(23b)
qiu [n] = qju [n] ;
n n
break; T X η0 T X
end tj [k] Pj [k] ≤ hj [k] P0 , n ∈ N , j ∈ M1 ,
end Repeat 2 N N
k=1 k=1
update the iterative number i = i + 1; (23c)
if Ri − Ri−1 ≤ ξ1 X
break; tj [n] ≤ 1, n ∈ N , (23d)
end
j∈M1
end Repeat 1
4: Obtain solutions: M = M0 ∪ M1 , M0 ∩ M1 = Θ, (23e)
opt opt
fm [n], Pm [n] and topt opt
m [n] and qu [n].
fi [n] ≥ 0, Pj [n] ≥ 0, i ∈ M0 , j ∈ M1 , (23f)
C4 and C5. (23g)
Using Theorem 4 and Lemma 2, P3 can be solved by
iteratively solving the approximate problem P4 , given as (23b) and (23c) are the energy harvesting causal constraints
"N # imposed on these users who choose to perform local computa-
M X BT tm [n] ym, ({qu [n]})
X tion and on these users who choose to perform task offloading,
P4 : max wm (22a)
qu [n] νm N respectively; (23d) is the offloading time constraint during
m=1 n=1
each slot and (23e) is the user operation selection constraint.
s.t. C4 and C5, (22b)
In P5 there exist close couplings among different optimiza-
n
X 3
tion variables. Furthermore, the binary user operation mode
γc fm [k] + tm [k] Pm [k] ≤ η0 P0 β0 hm [n],
selection makes P5 a mixed integer programming problem.
k=1
The exhaustive search method leads to a prohibitively high
m ∈ M, n ∈ N . (22c)
computational complexity, especially when there exist a large
It can be seen that P4 is convex and can be readily solved by number of users. Motivated by how we solve P1 , P5 has a
using CVX [4]. By solving P2 and P4 , a two-stage alternative similar structure as P1 when the operation modes of users
are determined. Thus, the optimal CPU frequency, transmit where υm,n ≥ 0 and εn ≥ 0 are the dual variables associated
power, and offloading time of users can be obtained by using with the constraints given by (24b) and (24c), respectively.
the same method as the one used for P1 and the trajectory Proof: See Appendix B.
optimization for the UAV can also be achieved by using the Remark 4: Theorem 5 indicates that the user operation
SCA method. As such, a three-stage alternative optimization selection scheme depends on the tradeoff between the achiev-
algorithm is proposed based on the two-stage Algorithm 1. able computation rate and the operation cost. If the tradeoff
The details for the algorithm are presented as follows. of the user achieved by local computing is better than that
B. Three-Stage Alternative Optimization Algorithm obtained by task offloading, the user chooses to perform
local computing; otherwise, the user chooses to offload its
In order to efficiently solve P5 , a binary variable denoted computation tasks to the UAV for computing.
by ρm is introduced, where ρm ∈ {0, 1} and m ∈ M.
Finally, the trajectory optimization for any given ρm , fm [n],
ρm = 0 indicates that the mth user performs local computation
Pm [n] and tm [n] can be obtained by solving P7 , given as
mode while ρm = 1 means that the mth user performs task
offloading. Moreover, the user operation selection indicator M
"N
#
X X BT tm [n] ym, ({qu [n]})
variable ρm is relaxed as a sharing factor ρm ∈ [0, 1]. Thus, P7 : max wm ρm
P5 can be rewritten as qu [n]
m=1 n=1
νm N
M X N (26a)
X fm [n] T
P6 : max wm (1 − ρm ) s.t. C4 and C5, (26b)
fm [n],Pn [n],q[n],
m=1 n=1
CN n n
tm [n],ρm X X
3
(1 − ρm ) γc fm [k] + ρm tm [k] Pm [k]
BT tm [n] ρm hm [n] Pm [n]
+ log2 1 + (24a) k=1 k=1
νm N σ02
n n
≤ η0 P0 β0 hm [n], m ∈ M, n ∈ N , (26c)
T X 3 T X
s.t. (1 − ρm ) γc fm [k] + ρm tm [k] Pm [k]
N N where hm [n] and yj ({qu [n]}) are given by (19b) and (21b),
k=1 k=1
n respectively. P7 is convex and can be efficiently solved by
η0 T X
≤ hm [k] P0 , m ∈ M, (24b) using CVX [4]. Based on Theorem 1, Theorem 5 and the so-
N lutions of P7 , a three-stage alternative optimization algorithm
k=1
M
X denoted by Algorithm 2 is proposed to solve P5 . The details
ρm tm [n] ≤ 1, n ∈ N , (24c) for Algorithm 2 are presented in Table 2. In Table 2, Rl and
m=1 Ri denote the value of the objective function of P5 at the lth
fm [n] ≥ 0, Pm [n] ≥ 0, n ∈ N , m ∈ M, (24d) and i iteration, respectively.
C4 and C5. (24e)
C. Complexity Analysis
Even by relaxing the binary variable ρm , P6 is still difficult
to solve as there exist couplings among different variables. The complexity of Algorithm 1 comes from four aspects.
For any given ρm and the trajectory of the UAV, P6 has The first aspect is from the computation of the CPU frequency
a similar structure as P1 . Thus, using the same techniques and the offloading power. The second aspect is from the
applied to P1 , the optimal CPU frequency, transmit power bisection method for obtaining the offloading time. The third
and offloading time of users for a given ρm and the UAV aspect is from the subgradient method for computing the
trajectory can be obtained. It is easy to verify that the optimal dual variables. The fourth aspect comes from the application
CPU frequency, transmit power and offloading time of users of CVX for solving P4 . Let L1 and L2 denote the num-
for a given trajectory have the same forms given by Theorem ber of iterations required for the outer loop and the inner
1 and Theorem 3. loop of Algorithm 1, respectively. Let `1 and `2 denote the
Theorem 5: For any given fm [n], Pm [n], tm [n] and qu [n], tolerance error for the bisection method and the subgradi-
the user operation selection scheme can be obtained by ent method, respectively. Thus, according to the works in
0 if G1 ≥ G2 , [35],
[38] and [39], the total complexity of Algorithm 1 is
opt
ρm = (25a)
1 otherwise; O L1 2M N + M log2 (`1 /T ) + 1/`22 + L2 N 3 and O (·)
N
( n
) is the big-O notation [35].
X wm fm [n] X
3 The complexity of Algorithm 2 comes from five aspects.
G1 = − υm,n γc fm [k] , (25b)
n=1
C Four aspects are the same as these of Algorithm 1. The fifth
k=1
N aspect is from the computation of the operation selection
X Btm [n] hm [n] Pm [n] indicator variable ρm . Let L1 , L2 and L3 denote the number
G2 = log2 1 +
n=1
νm σ02 of iterations required for the first, second and third loop of
Algorithm 2, respectively. Similar to the complexity analysis
n
)
X N
−υm,n tm [k] Pm [k] − εn tm [n] , (25c) for Algorithm 1, the total complexity of Algorithm 2 is
T
k=1 O L1 L2 2M N + M + M log2 (`1 /T ) + 1/`22 + L3 N 3 .
TABLE II: Three-stage alternative optimization algorithm TABLE III: Simulation Parameters
Parameters Notation Typical Values
Algorithm 2: The three-stage alternative optimization algorithm
Numbers of Users M 4
1: Setting:
The height of the UAV H 10 m
P0 , T , N , Vmax , q0 , qF , and the tolerance errors ξ, ξ1 and ξ2 ;
The time length of the UAV flying T 2 sec
2: Initialization:
i Numbers of CPU cycles C 103 cycles/bit
The iterative number i = 1, υm,n and εin , and qiu [n];
Energy conversation efficiency η0 0.8
3: Repeat 1: Communication bandwidth B 40 MHz
initialize the iterative number l = 1 and ρlm ; The receiver noise power σ02 10−9 W
Repeat 2: The number of time slots N 50
opt,i opt,i
calculate fm [n] and Pm [n] using Theorem 1 The effective switched capacitance γc 10−28
for given qiu [n] and ρopt,l
m ; The channel power gain β0 −50 dB
use the bisection method to solve (20) and obtain ti,opt m [n]; The tolerance error ξ, ξ1 10−4
i
update υm,n and εin using the subgradient algorithm; The initial position of the UAV q0 [0, 0]
calculate ρopt,l using Theorem 5 and update l = l + 1; The final position of the UAV qF [10, 0]
m
The maximum speed of the UAV Vmax 20 m/s
if Rl − Rl−1 ≤ ξ
break;
end
initialize the iterative number j = 1; 10
Repeat 3:
opt,i opt,i 9
solve P7 by using CVX for the given fm [n], Pm [n], User 2 (0,10)
i,opt opt,l
tm [n] and ρm ; 8 User 3 (10,10)
update j = j + 1, and qju [n];
N 7
qju [n] − qj−1
P
if u [n] ≤ ξ
n=1 6 A semi−circle
qiu [n] = qju [n] ; The offloading mode
y(m)
break; 5
end
end Repeat 3 4
break;
2
end User 1 (0,0) User 4 (10,0)
A constant speed
end Repeat 2 1
end Repeat 1
4: Obtain solutions: 0
opt opt 0 1 2 3 4 5 6 7 8 9 10
fm [n], Pm [n] and topt opt opt
m [n], ρm and qu [n]. x (m)
In this section, simulation results are presented to compare the operation modes. The reason is that the weights of user 2
the performance of our proposed designs with that of other and user 3 are larger than these of user 1 and user 4. Thus,
benchmark schemes. The convergence performance of the the UAV needs to fly close to user 2 and user 3 so as to
proposed algorithms is also evaluated. The simulation settings provide more energy to them. This indicates that the priority
are based on the works in [7], [14], [16] and [23]. The and the fairness among users can be obtained by using the
positions of users are set as: q1 = [0, 0], q2 = [0, 10], weight vector.
q3 = [10, 10], q4 = [10, 0]. The detailed settings are given Fig. 4 shows the weighted sum computation bits of all users
in Table III. The weight vector of each user [w1 w2 w3 w4 ] versus the transmit power of the UAV under different schemes.
is set as [0.1 0.4 0.3 0.2]. The optimal local computing is the mode that all users
Fig. 3 shows the UAV trajectory under different schemes only perform local computing while the optimal offloading
with T = 2 seconds. The UAV transmit power is set as mode is that all users only perform task offloading. And the
P0 = 0.1 W. In the constant speed scenario, the UAV flies trajectory of the UAV is jointly optimized under these two
straight with a constant speed from the initial position to the benchmark schemes. The results under the binary mode and
final position. In the semi-circle scenario, the UAV flies along the partial offloading mode are obtained by using Algorithm
the trajectory that is a semi-circle with its diameter being 2 and Algorithm 1, respectively. In Fig. 4 the weighted sum
kqF − q0 k. The trajectory of the offloading mode is obtained computation bits achieved under the partial offloading mode is
by using Algorithm 1 for the partial computation offloading the largest among these obtained by other schemes. The reason
mode and the trajectory of the binary mode is obtained by is that all the users can dynamically select the operation mode
using Algorithm 2 for the binary computation offloading mode. based on the quality of the channel state information under the
It can be seen from the trajectories of our proposed schemes partial computation offloading mode. Moreover, the optimal
the UAV is always close to user 2 and user 3, irrespective of offloading mode outperforms the optimal local computing.
7 7
x 10 x 10
4.5 4.5
3
3
2.5
2.5
2
1.5
1.5
1
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
The transmit power of the UAV (W)
1
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Fig. 4: The weighted sum computation bits of all users versus The transmit power of the UAV (W)
the transmit power of the UAV under different schemes. x 10
7
4.5
the fact that the harvesting energy increases with the transmit
power of the UAV. Thus, users have more energy to perform 3
local commutating or task offloading.
Fig. 5 shows the weighted sum computation bits of all the
2.5
users versus the transmit power of the UAV under different
trajectories with the partial computation offloading mode and
2
the binary computation offloading mode. As shown in Fig. 5,
the weighted sum computation bits of all the users achieved
by using our proposed schemes are larger than that obtained 1.5
5
3
2.5
0 1
User 1 User 2 User 3 User 4 2 3 4 5 6 7 8 9 10 11 12
Users The number of users
Fig. 6: The total computation bits of each user under different Fig. 8: The weighted sum computation bits of all users versus
operation modes with P0 = 0.1 W. the number of users under different transmit powers of the
UAV and different operation modes.
7
x 10
2.8
The weighted sum computation bits of all users (bits)
N
A PPENDIX A $m,n =
P
υm,k . Thus, according to [37], the optimal ρm
P ROOF OF T HEOREM 1 k=n
denoted by ρopt be obtained by (35) at the tope of the next
m can
Let λm,n and αn denote the dual variables associated with
page. Based on (35), since zm [n] = tm [n] Pm [n], Theorem
the constraint C2 and C3, respectively, where λm,n ≥ 0 and
5 is proved.
αn ≥ 0. Then, the Lagrangian of P2 can be given by (27) at
the tope of this page, where Ξ denotes a collection of all the
N
P R EFERENCES
primal and dual variables related to P2 . Let µm,n = λm,k
k=n [1] F. Zhou, Y. Wu, R. Q. Hu, Y. Wang, and K. K. Wong, “Energy-
3
and gm [k] = η0 hm [k] P0 − γc fm [k] − zm [k]. Then, the efficient NOMA enabled heterogeneous cloud radio access networks,”
Lagrangian function L (Ξ) can be rewritten by (28) at the IEEE Network, vol. 32, no. 2, pp.152-160, 2018.
[2] Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A survey
tope of this page. And the Lagrangian dual function of P2 on mobile edge computing: The communication perspective,” IEEE
can be presented as Commun. Surveys Tuts., vol. 19, no. 4, pp. 2322-2358, Fourth Quarter,
2017.
g (λm,n , αn ) = max L (Ξ). (29) [3] X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless networks
0≤fm [n]
with RF energy harvesting: A contemporary survey,” IEEE Commun.
Surveys Tuts., vol. 17, pp. 757-789, Second Quarter, 2015.
Based on (29), the optimal solutions of P2 can be obtained
[4] F. Zhou, Z. Li, J. Cheng, Q. Li, and J. Si, “Robust AN-aided beamform-
by solving its dual problem, given as ing and power splitting design for secure MISO cognitive radio with
SWIPT,” IEEE Trans. Wireless Commun., vol. 16, no. 4, pp. 2450-2464,
min g (λm,n , αn ) . (30) April 2017.
λm,n ,αn
[5] S. Sardellitti, G. Scutari, and S. Barbarossa, “Joint optimization of radio
and computational resources for multicell mobile-edge computing,”
It can be seen from (30) that the dual problem can be IEEE Trans. Signal Inf. Process. Over Netw., vol. 1, no. 2, pp. 89-103,
decoupled into M independent optimization problems, given Jun. 2015.
by (31) at the tope of the next page. Thus, let the derivation [6] C. You, K. Huang, H. Chae, and B. Kim, “Energy-efficient resource al-
of (31b) with respect to fm [n] andzm [n] be zero, one has location for mobile-edge computation offloading,” IEEE Trans. Wireless
Commun., vol. 16, no. 3, pp. 1397-1411, Mar. 2017.
2 N [7] C. Wang, C. Liang, F. R. Yu, Q. Chen, L. Tang, “Computation offloading
T wm 3T γc fm [k] X and resource allocation in wireless cellular networks with moible edge
− λm,k = 0, (32a)
NC N computing,” IEEE Trans. Wireless Commun., vol. 16, no. 8, pp. 4924-
k=n 4938, Aug. 2017.
N [8] J. Du, L. Zhao, J. Feng, and X. Chu, “Computation offloading and
wm BT tm [n] hm [n] T X
− λm,k =0. resource allocation in mixed fog/cloud computing systems with min-
νm N ln 2 σ02 tm [n] + hm [n] zm [n] N max fairness guarantee,” IEEE Trans. Commun., vol. 66, no. 4, pp.
k=n
1594-1608, April 2018.
(32b) [9] L. Liu, Z. Chang, X. Guo, S. Mao, and T. Ristaniemi, “Multi-objective
optimization for computation offloading in fog computing,” IEEE Inter-
Note that zm [k] = tm [k] Pm [k] and Pm [k] ≥ 0. Moreover, net Things J., vol. 5, no. 1, pp. 283-294, Jan. 2018.
the case that tm [n] = 0 can be identified as Pm [n] = 0. Thus, [10] W. Zhang, Y. Wen, K. Guan, D. Kilper, H. Luo, and D. O. Wu, “Energy-
based on (32), Theorem 1 is proved. The proof for Theorem optimal mobile cloud computing under stochastic wireless channel,”
IEEE Trans. Wireless Commun., vol. 12, no. 9, pp. 4569-4581, Sep.
1 is complete. 2013.
[11] J. Xu, L. Chen, and S. Ren, “Online learning for offloading and
A PPENDIX B autoscaling in energy harvesting mobile edge computing,” IEEE Trans.
P ROOF OF T HEOREM 5 Cogn. Netw., vol. 3, no. 3, pp. 361-373, Sep., 2017.
[12] Y. Mao, J. Zhang, and K. B. Letaief, “Dynamic computation offloading
Let υm,n and εn denote the dual variables with respect to for mobile-edge computing with energy harvesting devices,” IEEE J.
the constraints given by (24b) and (24c), respectively, where Sel. Areas Commun., vol. 34, no. 12, pp. 3590-3605, Dec., 2016.
υm,n ≥ 0 and εn ≥ 0. Then, for any given fm [n], Pm [n], [13] C. You, K. Huang, and H. Chae, “Energy efficient mobile cloud
computing powered by wireless energy transfer,” IEEE J. Sel. Areas
tm [n] and qu [n], the Lagrangian of P6 can be expressed Commun., vol. 34, no. 5, pp. 1757-1771, May, 2016.
by (33) at the tope of the next page, where Ξ1 denotes a [14] F. Wang, J. Xu, X. Wang, and S. Cui, “Joint offloading and computing
collection of all the primal and dual variables related to P6 . optimization in wireless powered mobile-edge computing systems,”
Ξ2 denotes a collection of υm,n , αn , fm [n] , zm [n], tm [n] and IEEE Trans. Wireless Commun., vol. 17, no. 3, pp. 1784-1797, March
2018.
ρm . Using the same techniques that are used for the proof of [15] S. Mao, S. Leng, K. Yang, X. Huang, and Q. Zhao, “Fair energy-efficient
Theorem 1, for any given fm [n], zm [n], tm [n] and qu [n], scheduling in wireless powered full-duplex mobile-egde computing
P6 can be solved by solving M independent optimization systems,” in Proc. IEEE Global Commun. Conf., Singapore, 2017.
[16] S. Bi and Y. Zhang, “Computation rate maximization for wireless
problems, given by (34) at the tope of the next page, where powered mobile egde computing with binary computation offloading,”
3
`m [n] = η0 hm [n] P0 − (1 − ρm ) γc fm [n] − ρm zm [n] and IEEE Trans. Wireless Commun., to be published, 2018.
M N
" #
X X fm [n] T BT tm [n] hm [n] zm [n]
L (Ξ) = wm + log2 1 +
m=1 n=1
C N νm N σ02 tm [n]
M X N
( n n
) N
( M
)
X η0 T X T X 3
X X
+ λm,n hm [k] P0 − γc fm [k] + zm [k] + αn 1 − tm [n] , (27)
m=1 n=1
N N n=1 m=1
k=1 k=1
M X
N
X T fm [n] BT tm [n] hm [n] zm [n] αn
L (Ξ) = wm + log2 1 + +µm,n gm [k] + − αn tm [n]. (28)
m=1 n=1
N C νm N σ02 tm [n] M
M
" N #
X X fm [n] T BT ρm tm [n] hm [n] zm [n]
L1 (Ξ1 ) = wm (1 − ρm ) + log2 1 +
m=1 n=1
C N νm N tm [n] σ02
M X N
( n n
)
X η0 T X T X 3
+ υm,n hm [k] P0 − (1 − ρm ) γc fm [k] + ρm zm [k]
m=1 n=1
N N
k=1 k=1
N
( M
)
X X
+ εn 1 − ρm tm [n] , (33)
n=1 m=1
< 0, ρopt
m = 0,
∂L1m(Ξ2 )
= 0, 0 < ρopt
m < 1, m∈M (35a)
∂ρopt
m
> 0, ρopt = 1;
m
(N )
1
∂Lm (Ξ2 ) X wm fm [n] T BT tm [n] hm [n] zm [n]
= − + log2 1 +
∂ρopt
m n=1
C N νm N tm [n] σ02
N
( n
) N
X T X 3
X
+ υm,n − −γc fm [k] + zm [k] − εn tm [n]. (35b)
n=1
N n=1
k=1
[17] H. Wang, J. Wang, G. Ding, L. Wang, T. A. Tsiftsis, P. K. Sharma, Fuhui Zhou received the Ph. D. degree from Xidian
“Resource allocation for energy harvesting-powered D2D communica- University, Xian, China, in 2016. He is an associate
tion underlaying UAV-assisted networks,” IEEE Trans. Cogn. Netw., vol. Professor with School of Information Engineering,
2, no. 1, pp. 14-24, Jan. 2018. Nanchang University. He is now a Research Fellow
[18] S. Yin, J. Tan, and L. Li, “UAV-assisted cooperative communications at Utah State University. He has worked as an
with wireless information and power transfer,” submitted to IEEE Trans. international visiting Ph. D student of the University
Wireless Commun., https://arxiv.org/abs/1710.00174v1. of British Columbia from 2015 to 2016. His research
[19] J. Xu, Y. Zeng, and R. Zhang, “UAV-enabled wireless power transfer: interests focus on cognitive radio, green communi-
Trajectory design and energy region charaterization,” in Proc. IEEE cations, edge computing, machine learning, NOMA,
Global Commun. Conf. Singapore, 2017, physical layer security, and resource allocation. He
[20] J. Xu, Y. Zeng, and R. Zhang, “UAV-enabled wireless power transfer: has published more than 40 papers, including IEEE
Trajectory design and energy optimization,” IEEE Trans. Wireless Com- Journal of Selected Areas in Communications, IEEE Transactions on Wireless
mun., to be published, 2018. Communications, IEEE Wireless Communications, IEEE Network, IEEE
[21] N. H. Motlagh, M. Bagaa, and T. Taleb, “UAV-based IoT platform: A GLOBECOM, etc. He has served as Technical Program Committee (TPC)
crowd surveillance use case,” IEEE Commun. Mag., vol. 55, no. 2, pp. member for many International conferences, such as IEEE GLOBECOM,
128-134, Feb. 2017. IEEE ICC, etc. He serves as an Associate Editor of IEEE Access.
[22] N. Zhao, F. Cheng, F. R. Yu, J. Tang, Y. Chen, G. Gui, and H. Sari,
“Caching UAV assisted secure transmission in hyper-dense networks
based on interference alignment,” IEEE Trans. Commun., vol. 66, no. 5,
pp. 2281-2294, May 2018.
[23] S. Jeong, O. Simeone, and J. Kang, “Mobile edge computing via a UAV- Yongpeng Wu (S’08–M’13–SM’17) received the
mounted cloudlet: Optimization of bit allocation and path planning,” B.S. degree in telecommunication engineering from
IEEE Trans. Vehicular Technol., vol. 67, no. 3, pp. 2049-2063, Mar. Wuhan University, Wuhan, China, in July 2007,
2018. the Ph.D. degree in communication and signal pro-
[24] S. Jeong, O. Simeone, and J. Kang, “Mobile edge computing with a cessing with the National Mobile Communications
UAV-mounted cloudlet: Optimal bit allocation for communication and Research Laboratory, Southeast University, Nanjing,
computation,” IET Commmn., vol. 11, no. 7, pp. 969-974, Nov. 2017. China, in November 2013.
[25] M. A. Messous, H. Sedjelmaci, N. Houari, and S. M. Senouci, “Compu- Dr. Wu is currently a Tenure-Track Associate
tation offloading game for an UAV network in mobile egde computing,” Professor with the Department of Electronic Engi-
in Proc. IEEE Int. Conf. Commuun., France, May, 2017. neering, Shanghai Jiao Tong University, China. Pre-
[26] Y. Zeng, R. Zhang, and T. J. Lim, “Wireless communications with un- viously, he was senior research fellow with Institute
manned aerial vehicles: Opportunities and challenges,” IEEE Commun. for Communications Engineering, Technical University of Munich, Germany
Mag., vol. 54, no. 5, pp. 36-42, May 2016. and the Humboldt research fellow and the senior research fellow with Institute
[27] Y. Zeng and R. Zhang, “Energy-efficient UAV communication with for Digital Communications, University Erlangen-Nürnberg, Germany. During
trajectory optimization,” IEEE Trans. Wireless Commun., vol. 16, no. his doctoral studies, he conducted cooperative research at the Department
6, pp. 3747-3760, June 2017. of Electrical Engineering, Missouri University of Science and Technology,
[28] P. Yang, X. Cao, C. Yin, Z. Xiao, X. Xi, and D. Wu, “Proactive drone- USA. His research interests include massive MIMO/MIMO systems, physical
cell deployment: Overload relief for a cellular network under flash crowd layer security, signal processing for wireless communications, and multivariate
traffic,” IEEE Trans. Intell. Transportation Sys., vol. 18, no. 10, pp. statistical theory.
2877-2892, Oct, 2017. Dr. Wu was awarded the IEEE Student Travel Grants for IEEE Inter-
[29] E. Kalantari, H. Yanikomeroglu, and A. Yongacoglu, “On the number national Conference on Communications (ICC) 2010, the Alexander von
and 3D placement of drone base stations in wireless cellular networks,”in Humboldt Fellowship in 2014, the Travel Grants for IEEE Communication
Proc. IEEE VTC fall, 2016, Montreal, Canada, Sept. 2016. Theory Workshop 2016, and the Excellent Doctoral Thesis Awards of China
[30] E. Kalantari, M. Z. Shakir, H. Yanikomeroglu, and A. Yongacoglu, Communications Society 2016. He was an Exemplary Reviewer of the IEEE
“Backhaul-aware robust 3D drone placement in 5G+ wireless net- Transactions on Communications in 2015, 2016. He is the lead guest editor
works,”in Proc. ICC Workshops, 2017, Paris, France, May 2017. for the upcoming special issue “Physical Layer Security for 5G Wireless
[31] L. Zeng, X. Cheng, C. X. Wang, and X. Yin, “A 3D geometry-based Networks” of the IEEE Journal on Selected Areas in Communications. He is
stochastic channel model for UAV-MIMO channels,” in Proc. IEEE currently an editor of the IEEE Access and IEEE Communications Letters. He
WCNC 2017, San Francisco, USA, Mar. 2017. has been a TPC member of various conferences, including Globecom, ICC,
[32] C. X. Wang, A. Ghazal, B. Ai, P. Fan, and Y. Liu, “Channel mea- VTC, and PIMRC, etc.
surements and models for high-speed train communication systems: a
survey,” IEEE Commun. Surveys Tuts., vol. 18, no. 2, pp. 974-987, 2nd
Quart., 2016.
[33] N. Cheng, W. Xu, W. Shi, Y. Zhou, N. Lu, H. Zhou, and X. Shen,
“Aire-ground integrated mobile edge networks: Architecture, challenges Rose Qingyang Hu is a Professor of Electri-
and opportunities,” IEEE Commun. Mag., to be published, 2018. cal and Computer Engineering Department at Utah
[34] M. Mozaffari, W. Saad, M. Bennis, Y. H. Nam, and M. Debbah, State University. She received her B.S. degree from
“A tutorial on UAVs for wireless networks: Applications, challenges, University of Science and Technology of China,
and open problems,” IEEE Commun. Surveys Tuts., submitted, 2018. her M.S. degree from New York University, and
https://arxiv.org/abs/1803.00680 her Ph.D. degree from the University of Kansas.
[35] S. P. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, She has more than 10 years of R&D experience
U.K.: Cambridge Univ. Press, 2004. with Nortel, Blackberry and Intel as a technical
[36] F. Zhou, N. C. Beaulieu, Z. Li, J. Si, and P. Qi, “Energy-efficient manager, a senior wireless system architect, and
optimal power allocation for fading cognitive radio channels: Ergodic a senior research scientist, actively participating in
capacity, outage capacity and minimum-rate capacity,” IEEE Trans. industrial 3G/4G technology development, standard-
Wireless Commun., vol. 15, no. 4, pp. 2741-2755, Apr. 2016. ization, system level simulation and performance evaluation. Her current
[37] F. Zhou, Z. Li, J. Cheng, Q. Li, and J. Si, “Robust max-min fairness research interests include next-generation wireless communications, wireless
resource allocation in sensing-based wideband cognitive radio with system design and optimization, green radios, Internet of Things, Cloud
SWIPT: Imperfect channel sensing,” IEEE Syst. J., to be published, 2017. computing/fog computing, multimedia QoS/QoE, wireless system modeling
[38] S. Bubeck, “Convex optimization: Algorithms and complexity,” In and performance analysis. She has published over 180 papers in top IEEE
Foundations and Trends in Machine Learning, vol. 8, no. 3, pp. 231-357, journals and conferences and holds numerous patents in her research areas.
2015. https://arxiv.org/abs/1405.4980 Prof. Hu is an IEEE Communications Society Distinguished Lecturer Class
[39] C. Gutierrez, F. Gutierrez, M.C. Rivara, “Complexity on the bisection 2015-2018 and the recipient of Best Paper Awards from IEEE Globecom
method,” Theoretical Computer Science, vol. 382, pp. 131-138, 2007. 2012, IEEE ICC 2015, IEEE VTC Spring 2016, and IEEE ICC 2016.
Yi Qian received a Ph.D. degree in electrical engi-
neering from Clemson University. He is a professor
in the Department of Electrical and Computer En-
gineering, University of Nebraska-Lincoln (UNL).
Prior to joining UNL, he worked in the telecommu-
nications industry, academia, and the government.
Some of his previous professional positions include
serving as a senior member of scientific staff and a
technical advisor at Nortel Networks, a senior sys-
tems engineer and a technical advisor at several start-
up companies, an assistant professor at University
of Puerto Rico at Mayaguez, and a senior researcher at National Institute of
Standards and Technology. His research interests include information assur-
ance and network security, network design, network modeling, simulation and
performance analysis for next generation wireless networks, wireless ad-hoc
and sensor networks, vehicular networks, smart grid communication networks,
broadband satellite networks, optical networks, high-speed networks and the
Internet. Prof. Yi Qian is a member of ACM and a senior member of IEEE.
He was the Chair of IEEE Communications Society Technical Committee for
Communications and Information Security from January 1, 2014 to December
31, 2015. He is a Distinguished Lecturer for IEEE Vehicular Technology
Society and IEEE Communications Society. He is serving on the editorial
boards for several international journals and magazines, including serving as
the Associate Editor-in-Chief for IEEE Wireless Communications Magazine.
He is the Technical Program Chair for IEEE International Conference on
Communications (ICC) 2018.