2018 IEEE International Conference on Communications (ICC) 2018
DOI: 10.1109/icc.2018.8422277
|View full text |Cite
|
Sign up to set email alerts
|

UAV-Enabled Mobile Edge Computing: Offloading Optimization and Trajectory Design

Abstract: With the emergence of diverse mobile applications (such as augmented reality), the quality of experience of mobile users is greatly limited by their computation capacity and finite battery lifetime. Mobile edge computing (MEC) and wireless power transfer are promising to address this issue. However, these two techniques are susceptible to propagation delay and loss. Motivated by the chance of short-distance line-of-sight achieved by leveraging unmanned aerial vehicle (UAV) communications, an UAV-enabled wirele… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
98
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 172 publications
(100 citation statements)
references
References 19 publications
(51 reference statements)
0
98
0
2
Order By: Relevance
“…Notice that the WPT power of the UAV antenna is usually far greater than the communication transmit power of the IoTD antenna [34], [35]. If the IoTD transmits its data and the UAV transfers wireless energy at the same time, the communication signal will be drowned out by the WPT signal.…”
Section: B the Tdma Based Workflow Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Notice that the WPT power of the UAV antenna is usually far greater than the communication transmit power of the IoTD antenna [34], [35]. If the IoTD transmits its data and the UAV transfers wireless energy at the same time, the communication signal will be drowned out by the WPT signal.…”
Section: B the Tdma Based Workflow Modelmentioning
confidence: 99%
“…In eq. (35a)-(35c), we divide the optimal solution F * as f * ij,a , f * ij,b and f * ij,c , respectively, in accordance with the three parts of µ's defined domain in (35). Let µ i,a , µ i,b and µ i,c represent three different kinds of µ i in (35) intervals.…”
Section: Computing Resources Allocationmentioning
confidence: 99%
“…In [10], a UAV-enabled wireless-powered MEC system is studied and a power minimization problem is formulated by jointly optimizing the number of the offloading computation bits and the UAV flight path. A similar UAV-based MEC system is presented in [11], where the UAV trajectory was optimized under latency and UAVs energy budget constraints.…”
Section: Related Workmentioning
confidence: 99%
“…In [9], the authors investigate a UAV-mounted cloudlet in which UAVs equipped with a computing processor offload and compute the tasks offloaded from ground devices. The authors in [10] study UAV-enabled wireless powered mobile edge computing system. The authors in [11] propose a relaying system that uses a UAV to store the processed data in a buffer and optimize the receiving and transmitting data size to minimize the energy consumption.…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, x I is updated to the value given by max (x I , 1/(d i /r j * )) where j * = argmin j 1/r j , j ∈ J . The update of x I satisfies constraints (10) and (11). Otherwise, if the UAVs in J i do not satisfy (2) and 3, then, the tasks arriving after task i cannot be computed, i.e., y ij = 0.…”
mentioning
confidence: 99%