Next Article in Journal
Passive Source Localization Using Compressive Sensing
Next Article in Special Issue
An Innovative Technique for Identification of Missing Persons in Natural Disaster Based on Drone-Femtocell Systems
Previous Article in Journal
Impact of Physiological Signals Acquisition in the Emotional Support Provided in Learning Scenarios
Previous Article in Special Issue
Risk-Aware Resource Management in Public Safety Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Energy-Efficient UAV-Enabled MEC System: Bits Allocation Optimization and Trajectory Design

1
School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
Beijing Key Laboratory of Network System Architecture and Convergence, Beijing University of Posts and Telecommunications, Beijing 100876, China
3
Beijing Laboratory of Advanced Information Networks, Beijing University of Posts and Telecommunications, Beijing 100876, China
4
School of Computing and Information Engineering, Hubei University, Wuhan 430062, China
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(20), 4521; https://doi.org/10.3390/s19204521
Submission received: 13 September 2019 / Revised: 14 October 2019 / Accepted: 15 October 2019 / Published: 17 October 2019
(This article belongs to the Special Issue UAV-Based Applications in the Internet of Things (IoT))

Abstract

:
The unmanned aerial vehicle (UAV) enabled mobile edge computing (MEC) system is attracting a lot of attentions for the potential of low latency and low transmission energy consumption, due to the advantages of high mobility and easy deployment. It has been widely applied to provide communication and computing services, especially in Internet of Things (IoT). However, there are still some challenges in the UAV-enabled MEC system. Firstly, the endurance of the UAV is limited and further impacts the performance of the system. Secondly, mobile devices are battery-powered and the batteries of some devices are hard to change. Therefore, in this paper, a UAV-enabled MEC system in which the UAV is empowered to have computing capability and provides tasks offloading service is studied. The total energy consumption of the UAV-enabled system, which includes the energy consumption of the UAV and the energy consumption of the ground users, is minimized under the constraints of the UAV’s energy budget, the number of each task’s bits, the causality of the data and the velocity of the UAV. The bits allocation of uploading data, computing data, downloading data and the trajectory of the UAV are jointly optimized with the goal of minimizing the total energy consumption. Moreover, a two-stage alternating algorithm is proposed to solve the non-convex formulated problem. Finally, the simulation results show the superiority of the proposed scheme compared with other benchmark schemes. Finally, the performance of the proposed scheme is demonstrated under different settings.

1. Introduction

With the technological evolution of user devices, the computation-intensive and latency-critical applications, such as virtual reality, face recognition and Industrial Internet of Things (IIoT), have become more and more popular. However, the requirements of high quality communications have simultaneously posed big pressure on the user devices [1,2]. Although the user devices are equipped with powerful central processing unit (CPU), they are not able to deal with the ever-increasing amount of data. Mobile cloud computing (MCC) gives the chance to overcome the computing difficulties of users, which can offload some computation tasks to the resource-rich cloud infrastructures and relieve the computing pressure for users [1].
The latency and the energy consumption of the user devices are reduced owing to the popularity of MCC. Nevertheless, the cloud infrastructures are not always located nearby the user devices, which causes the huge additional load and long latency [2]. Then, the concept of mobile edge computing (MEC) is introduced. MEC offers the capacity of storage and processing by deploying cloud resources in proximity to the user devices [3]. In the MEC framework, mobile devices can offload their tasks to the MEC servers on the edge of the network, rather than utilizing the core network [3,4]. MEC brings the opportunity to reduce the energy consumption and the long latency caused by the long-distance transmission between user devices and remote servers.
MEC enables the mobile base station (BS) to be equipped with powerful computing capability, which significantly relieves the pressure of mobile networks. However, in the areas where the communication facilities are sparsely distributed, especially in IoT, the fixed MEC server can not satisfy the computation requirements of the remotes users. Besides, when communication infrastructures are damaged, malfunctional or overloaded, the computing tasks of the users can not be processed in time. Hence, it is necessary to devise a scheme that the MEC servers can satisfy the computation demand in a timely fashion. Fortunately, UAVs have the characteristics of high mobility and easy deployment, making the on-demand communication services provision possible [5,6]. Recently, UAVs have attracted a lot of attention in many applications, such as delivery, farming, rescue response and communication services [7]. UAVs are expected to play the role of wireless communication platforms equipped with communication modules [8]. An UAV-enabled MEC system can provide on-demand computation services for the mobile users with on-demand mobility compared with the fixed communication infrastructures. In the areas where the fixed communication infrastructures can not satisfy the computing requirements of ground users, such as the places which are remote from the communication facilities and the places destroyed by the natural disasters, the advantages of UAV-enable MEC system are highlighted. The UAV is capable of flying to the specific areas to help the users with computational requirements, e.g., monitoring devices, to compute the tasks. Owing to the on-demand mobility, the UAV-enabled MEC system can greatly relieve the load of computation in the specific areas.
Despite the advantages UAV-enabled MEC systems bring, there are still some challenges. Among these challenges, the most typical and urgent one is the energy-efficient problem. UAV’s time of endurance is finite due to the limitation of the battery technology [9]. The duration of flight is also affected due to the payload and the energy consumption of the communication and computation in a UAV-enabled MEC system. Moreover, the mobile devices are always battery-powered, which compromises the performance of offloading owing to the long-distance transmission. It is difficult to change the batteries of the mobile devices in some areas which are hard to reach, e.g., monitoring devices in IoT [10,11]. Therefore, it is necessary to design an energy-efficient UAV-assisted MEC system in order to minimize the energy consumption of both the UAV and mobile devices.

1.1. Related Work

The first concept of edge computing is proposed in 2009, which is named cloudlet [2,12]. There  has been a lot of research about MEC in recent years, concerning the energy consumption, latency and so on. In [4], the authors designed an energy-efficient MEC offloading mechanism for mobile devices in 5G heterogeneous networks. The mechanism aimed at minimizing the system’s energy consumption and ensuring the latency constraints of the computation task. Authors in [1] proposed an algorithm aiming at solving the minimum energy consumption problem in deadline-aware MEC system. The mobility of the mobile devices was also considered in the deadline-aware MEC system. In addition to the energy-efficient mechanisms, the latency is also investigated. In [10], an effective dynamic computation offloading scheme for energy harvesting mobile devices was proposed, aiming at minimizing the execution cost which consists of execution delay and task failure.
Although MEC reduces the energy consumption and latency compared with MCC, it is difficult to satisfy the communication requirements of mobile users in some specific areas, such as hotspot areas or the areas where the communication facilities are distributed sparsely. UAV is recognized to be one of promising wireless communication platforms due to the advantages of high mobility and easy deployment [13]. UAVs, acting as flying base stations or relays, have attracted people’s attention in recent years. The placement of the UAV to maximize the coverage has been studied in a lot of research. In [14], the optimal altitude of the UAV-based base station was analyzed for the maximal communication coverage. In [15], an efficient UAV 3D placement with the purpose of maximizing the covered users based on the optimal altitude was proposed. In [16], the authors studied a novel 3D UAV placement with the objective of maximizing the number of covered users according to different requirements of quality of service (QoS). Besides, the energy consumption of both the UAV and mobile users have also been taken into consideration. In [17], the propulsion energy consumption model of the fixed-wing UAV was derived and an efficient trajectory maximizing the UAV’s energy efficiency was designed. In [11], given the locations of active devices, the optimal locations of the UAVs and the associations with devices were determined with the objective of minimizing the transmission power of devices. Moreover, the resource management of the UAV-aided communications has also been investigated. In [18], an energy efficient solution in UAV-supported multi-level architecture is employed by grouping uer equipments in clusters based on reinforcement learning. In [19], based on the above cluster solution, the authors proposed a framework that combined UAV-support with wireless powered communication (WPC) techniques to further improve energy efficiency in a distributed non-orthogonal multiple access (NOMA) public safety networks (PSN). The optimal position of the UAV in the Euclidean 3D space was determined by maximizing the coalition head’s total energy availability. In [20], a game theoretic framework for load balancing between LTE-Unlicensed unmanned aerial base stations (UABSs) and WiFi access points (APs) based on the loads at the UABSs and the ground APs was proposed. In [21], a framework for the coverage and rate analysis was derived, considering the coexistence between the UAV as a flying base station, and an underlaid device-to-device (D2D) communication network. The framework considered two scenarios: a static UAV and a mobile UAV. The overall outage probabiliy of the D2D users was derived considering multiple retransmissions for the UAV and D2D users.
UAVs endowed with computing capabilities have become more and more popular in recent years, owing to the on-demand communication services provision and flexible deployment. The study of latency has been one of the research directions. The objective of [22] was to minimize the sum of the maximum delay among all the users in each slot. The trajectory of the UAV, the ratio of offloading task and the user scheduling variables were jointly optimized. In addition, energy efficient schemes have attracted wide attention due to the battery technology limitation of the mobile devices and the UAVs. In [23], the energy consumption of the mobile users was minimized considering two types of access schemes, namely, orthogonal and non-orthogonal access. The bits allocation and the trajectory of the UAV were jointly optimized. However, the energy efficient algorithms of the UAVs, which significantly influence the performance of the UAV-enabled MEC system, were not considered. The authors in [24] studied the minimization problem of the weighted sum energy consumption of the UAV and users. The computation resources scheduling, the bandwidth allocation and the trajectory of the UAV were optimized in the minimization problem. In [25], a UAV-enabled wireless powered MEC server was studied to minimize the energy consumption consumed at the UAV. In [26], the weighted sum computation bits were maximized under both the partial and binary offloading mode in UAV-enabled wireless powered MEC system. However, the energy consumption constraint of the UAV was not taken into consideration in [24,25,26]. The energy consumption of the UAV impacts the duration of flight and then impacts the performance of the UAV-enabled MEC system. Hence, it is necessary to design an energy-efficient UAV-enabled MEC systems considering both the energy consumption of the UAV and mobile devices.

1.2. Contribution and Organization

Different from the aforementioned study, this paper proposes an energy-efficient UAV-enabled MEC system with the objective of minimizing the total energy consumption of the system. Moreover, the constraints of the UAV energy budget, the number of each task’s bits, the causality of the data, and the velocity of the UAV are taken into consideration. The bits allocation and the trajectory of the UAV are jointly optimized under the constraints. Besides, an alternating algorithm is designed to solve the non-convex optimization problem. The main contributions are described as follows:
  • An energy-efficient scheme subjecting to the constraints of UAV’s energy budget, the number of each task’s bits, the causality of the data, and the velocity limitation of the UAV is proposed. The aim of the problem is to minimize the total energy-consumption of the UAV-enabled MEC system, which includes the energy consumption of the ground users and the UAV. The bits allocation and the trajectory of the UAV are cooperatively optimized.
  • A two-stage alternating algorithm is presented to solve the optimization problem. The formulated optimization problem is non-convex due to the non-convex objective function and non-convex constraints. The dual variables also enhance the difficulty of the problem. To solve the optimization problem, an alternating algorithm is proposed. The subproblems are solved by Lagrange duality method and CVX solver respectively.
  • The simulation results are shown to indicate the superiority of the proposed scheme compared with other benchmark schemes. In contrast to the fixed trajectory of the UAV, the energy consumption of the proposed scheme is greatly decreased. Besides, the performance of the proposed scheme is also demonstrated under different settings.
The remainder of this paper is organized as follows. Section 2 sets up the system model and formulates the optimization problem. An alternating algorithm to solve the optimization problem is designed in Section 3. Then, the simulation results are shown in Section 4. Finally, the paper is concluded in Section 5.

2. System Model and Problem Formulation

The offloading modes of MEC include binary offloading and partial offloading [27]. In the first mode, the computation task cannot be partitioned, which can only be computed locally or offloaded wholely. In the last mode, a part of the computation task can be computed locally and the other part offloaded. In this paper, we only consider the binary offloading mode to relieve the computation load of the users. Considering the superiority of rotary-wing UAV’s agility in turning, the rotary-wing UAV is assumed to provide offloading services in this paper. The UAV-enabled MEC system is depicted in Figure 1, consisting of one UAV-enabled MEC server and K users denoted as K { 1 , 2 , 3 , , K } . Moreover, taking the energy constraints of the UAV and the short task deadline of ground users into consideration, the area where the UAV-enabled MEC system can provide offloading services is not large. Thus, it is assumed that the ground users are not distributed over a large area and the ground users are always in the communication range of the UAV. The scenario that the ground users are distributed over a large scale will be further investigated in our future work.

2.1. System Model

The notation of user k’s task is denoted as A k ( I k , τ k , C k , O k ) . I k means the task input-data size of user k in bits. τ k means the task deadline of user k. C k represents the computation/intensity of user k, i.e., the number of CPU cycles needed to compute one input bit for user k. O k is the ratio of the number of output information bits to the number of input information bits for user k. The minimal task deadline of all the K users is considered as the time duration T of the UAV-enabled MEC system to finish the offloading tasks. The K users offload their computation tasks using a time division multiple access (TDMA) mode. The time duration T is divided into N slots, whose duration is Δ = T N . Each  slot Δ is divided into K sub-slots, whose duration is δ = Δ K = T N K . The slot and sub-slot are depicted as Figure 2. To reduce the additional noise from other users when user k is transmitting the data to the UAV and receiving the data from the UAV, user k only uploads its input information and the UAV only downloads the output results for user k in the kth sub-slot in each slot. The symbols used in the system model are listed in Table 1.
In this paper, a three-dimensional Euclidean coordinate is adopted without the loss of generality, which is measured in meters. The mobile users are located on the ground, whose coordinate is expressed as q k = ( x k , y k , 0 ) for k K . A UAV mounted with MEC server provides the computation services for the mobile users in the altitude h. The position of the UAV at the end of nth slot is expressed as q u [ n ] = ( x u [ n ] , y u [ n ] , h ) , which is considered as the position of the UAV in nth slot. We assume that the communication link between the UAV and the ground user is dominated by the line of sight (LoS) channel. The UAV-ground channel is more likely to have the LoS link compared to the terrestrial ground-ground channels. Besides, the Doppler effect due to the UAV mobility is assumed to be compensated [17,28]. Hence, the channel gain from the ground user k to the UAV in the nth slot follows the free-space loss model, which is given by [29,30]
g k [ n ] = g 0 h 2 + q u [ n ] q k 2 ,
where g 0 is the channel power gain at reference distance 1 m. From (1), it can be observed that optimizing the 2D position of the UAV ( x k , y k ) has the same effect of optimizing the altitude of the UAV. Therefore, for ease of explanation, we assume that the UAV fly at a fixed altitude H and ingore the slight altitude changes.
The energy consumption of the UAV-enabled MEC system is consisted of two parts: the energy consumption of the UAV and the energy consumption of the ground users. Hence, the total energy consumption of the system E is the sum of the energy consumption of the UAV and the energy consumption of the ground users, which is given as:
E = E G + E U .

2.1.1. Energy Consumption Model of Ground Users

In the binary mode of the UAV-enabled MEC system, all the K users upload their computation tasks to the UAV and the ground users have no local computing tasks. Consequently, the energy consumption of the ground users E G only depends on the communication energy consumption for uploading data of the ground users E G U as given [30,31]:
E G = E G U = n = 1 N k = 1 K 2 I k u [ n ] B δ 1 g k [ n ] σ 2 δ ,
where B and σ 2 denote the communication bandwidth and the noise power at the receiver respectively; I k u [ n ] represents the number of uploading input bits of the user k in the nth slot.

2.1.2. Energy Consumption Model of the UAV

The energy consumption of the UAV consists of three parts: the energy consumption of computation E U C , the energy consumption of flying E U F and the energy consumption of downloading the output results to the ground users E U D , which is shown as
E U = E U C + E U F + E U D ,
After the ground users uploading the input data to the UAV, the UAV will execute the computation immediately. The frequency of the UAV’s CPU in the nth slot for computing the tasks of user k depends on the number of computing bits for user k in the nth slot, which is expressed as
f U , k [ n ] = I k c [ n ] C k Δ ,
where the I k c [ n ] is the number of the computing bits at the UAV in the nth slot for ground user k. The computing energy consumption of the UAV depends on the frequency of the CPU. Thus, the computation energy consumption of the UAV for ground user k in the nth slot is shown as
E U , k C [ n ] = Δ γ u ( f U , k [ n ] ) 3 = γ u ( I k c [ n ] ) 3 C k 3 Δ 2 ,
where γ u is the effective switched capacitance of the UAV’s CPU [23,25,26,32,33]. The total energy consumption of computation in all slots of the UAV is calculated as
E U C = n = 1 N k = 1 K γ u ( I k c [ n ] ) 3 C k 3 Δ 2 .
The flying energy consumption of the UAV in slot n depends on the velocity v [ n ] and the weight of the UAV M. The total energy consumption for propulsion of the UAV in all slots is given as
E U F = n = 1 N κ v [ n ] 2 ,
where κ = 0.5 M Δ and M is the weight of the UAV [34,35,36,37]. The velocity of the UAV in nth slot can be calculated as the distance difference in nth slot divided by the time duration of one slot Δ . And the distance difference of the UAV in nth slot is related to the position of the UAV in nth slot q u [ n ] and in ( n 1 ) th slot q u [ n 1 ] . Thus, the velocity of the UAV in nth slot v [ n ] is expressed as
v [ n ] = q u [ n ] q u [ n 1 ] Δ , n = 1 , 2 , , N .
And the value of the UAV’s velocity in nth slot should be lower than the maximal velocity of the UAV as expressed as
v [ n ] = q u [ n ] q u [ n 1 ] Δ V m a x , n = 1 , 2 , , N .
where V m a x denotes the maximal velocity of the UAV. The energy consumption of downloading the output results from the UAV to the ground users is related to the number of downloading bits and the channel gain, which is given as
E U D = n = 1 N k = 1 K 2 I k d [ n ] B δ 1 g k [ n ] σ 2 δ ,
where I k d [ n ] denotes the number of the downloading bits from the UAV to the ground user k in the nth slot.

2.2. Problem Formulation

The objective of the formulated problem is to minimize the total energy consumption of the system, by joint optimizing the trajectory of the UAV q u [ n ] and the bits allocation I k u [ n ] , I k c [ n ] , I k d [ n ] . In this paper, the initial position of the UAV is preset as the position of q 1 , and the final point of the UAV is the position of q K , which are expressed as
q u [ 1 ] = q 1 , q u [ n ] = q k .
All users offload their computation tasks to the UAV and the computing results should be distributed to ground users in the duration of N slots. There are three steps for user k to offload the task to the UAV: the ground user k uploads the task to the UAV, the UAV processes data for user k, and the UAV downloads the computation results to the ground user k, as shown in Figure 3. These  three steps are conducted in time sequence. Consequently, the ground users do not upload the input information in the last two slots. The UAV does not execute the computation tasks in 1st slot and Nth slot. Moreover, the UAV does not download the computation results to the ground users in 1st slot and 2nd slot. Thus, considering the causality of the data and the chronological order, the bit allocations follow the constraints:
i = 1 n 1 I k u [ i ] i = 2 n I k c [ i ] , n = 2 , , N 1 ,
O k i = 2 n I k c [ i ] i = 3 n + 1 I k d [ i ] , n = 2 , , N 1 ,
I k u [ N 1 ] = I k u [ N ] = 0 ,
I k c [ 1 ] = I k c [ N ] = 0 ,
I k d [ 1 ] = I k d [ 2 ] = 0 .
Moreover, the total number of the uploading bits of the ground user k, computing bits and downloading bits of the UAV for the user k are expressed as follows:
n = 1 N 2 I k u [ n ] = I k ,
n = 2 N 1 I k c [ n ] = I k ,
n = 3 N I k d [ n ] = O k I k .
The objective of the energy-efficient problem is to minimize the total energy consumption of the UAV-enable MEC system. The bit allocations I k u [ n ] , I k c [ n ] , I k d [ n ] and the trajectory of the UAV q u [ n ] are jointly optimized, under the constraints of data causality, the velocity and the position of the UAV. The corresponding energy consumption minimization problem P 1 is formulated as
P 1 : min I k u [ n ] , I k c [ n ] , I k d [ n ] , q u [ n ] E
s . t . E U ε ,
n = 1 N 2 I k u [ n ] = I k ,
n = 2 N 1 I k c [ n ] = I k ,
n = 3 N I k d [ n ] = O k I k ,
i = 1 n 1 I k u [ i ] i = 2 n I k c [ i ] , n = 2 , , N 1 ,
O k i = 2 n I k c [ i ] i = 3 n + 1 I k d [ i ] , n = 2 , , N 1 ,
I k u [ N 1 ] = I k u [ N ] = 0 ,
I k c [ 1 ] = I k c [ N ] = 0 ,
I k d [ 1 ] = I k d [ 2 ] = 0 ,
I k u [ n ] , I k c [ n ] , I k d [ n ] 0 , for k K and n N .
q u [ 0 ] = q 1 , q u [ N ] = q K ,
q u [ n ] q u [ n 1 ] Δ V m a x , for n N ,
where ε denotes the energy budget of the UAV, and  N { 1 , , N } . (21b) indicates that the energy consumption of the UAV, including the computing energy consumption, communication energy consumption and flying energy consumption, is lower than a certain energy budget. (21c), (21d) and (21e) represent that all the ground users offload all the computation tasks to the UAV in the binary mode. (21f)–(21k) ensure the data causality and the non-negative condition. (21l) guarantees that the UAV initiates the flying trajectory at the position of q 1 and stops at the position of q K . (21m) ensures that the UAV flies under the constraint of the maximal velocity.

3. Algorithm Design

The problem of P 1 is a non-convex problem due to the non-convex objective function (21a), non-convex constraint (21b) and the coupling characteristics of the optimization variables. Thus, in this paper, we bring forward a two-stage alternating algorithm to solve the non-convex problem. The details of the two-stage alternating algorithm are shown in the following part.

3.1. Bits Allocation under Given Trajectory

It can be seen that with if the trajectory of the UAV is fixed, the problem of P 1 is convex with regard to the variables I k u [ n ] , I k c [ n ] , I k d [ n ] . Given the trajectory of the UAV, the problem P 1 can be transformed into:
P 2 : min I k u [ n ] , I k c [ n ] , I k d [ n ] E U + E G
s . t . ( 21 b ) ( 21 k ) .
Because P 2 is convex, Lagrange duality method can be applied [38]. The optimal solution of P 2 is given in the following theorem. I k u * [ n ] , I k c * [ n ] and I k d * [ n ] represent the optimal number of uploading bits of user k in nth slot, the optimal number of computing bits of the UAV in nth slot for user k and the optimal number of downloading bits from the UAV to the user k in nth slot respectively under the given trajectory of the UAV.
Theorem 1.
For a given trajectory of the UAV, the optimal bits allocation I k u [ n ] , I k c [ n ] , I k d [ n ] can be expressed  as:
I k u * [ n ] = B δ log 2 ( μ k + i = n + 1 N 1 β k , n ) g k [ n ] B σ 2 ln 2 , n = 1 , , N 2 , 0 , n = N 1 or N ,
I k c * [ n ] = Δ C k ν k + O k i = n N 1 η k , n i = n N 1 β k , n 3 ( λ + 1 ) γ u C k , n = 2 , , N 1 , 0 , n = 1 or N ,
I k d * [ n ] = B δ log 2 ( ρ k i = n 1 N 1 η k , n ) g k [ n ] B ( λ + 1 ) ln 2 σ 2 , n = 3 , , N , 0 , n = 1 or 2 .
where λ, μ k , ν k , ρ k , β k , n , η k , n denote the dual variable related to the constraints (21b)–(21g) respectively.
Proof. 
See Appendix A. ☐
The dual variables λ , μ k , ν k , ρ k , β k , n , η k , n in (23a)–(23c) are obtained with the subgradient algorithm [39] as shown in Lemma 1.
Lemma 1.
At the ( j + 1 ) th iteration in the subgradient method, λ j + 1 , μ k , j + 1 , ν k , j + 1 , ρ k , j + 1 , β k , n , j + 1 , η k , n , j + 1 are obtained from
λ k , j + 1 = λ k , j α j ( λ ) g j ( λ ) ,
μ k , j + 1 = μ k , j α j ( μ ) g j ( μ ) ,
ν k , j + 1 = ν k , j α j ( ν ) g j ( ν ) ,
ρ k , j + 1 = ρ k , j α j ( ρ ) g j ( ρ ) ,
β k , n , j + 1 = β k , n , j α j ( β ) g n , j ( β ) ,
η k , n , j + 1 = η k , n , j α j ( η ) g n , j ( η ) ,
where α j ( λ ) , α j ( μ ) , α j ( ν ) , α j ( ρ ) , α j ( β ) and α j ( η ) denote the jth step size respectively. The corresponding subgradients g j ( λ ) , g j ( μ ) , g j ( ν ) , g j ( ρ ) , g n , j ( β ) and g n , j ( η ) are given as
g j ( λ ) = n = 1 N k = 1 K γ u C u 4 ( I k , j c * [ n ] ) 3 Δ 3 + n = 1 N k = 1 K 2 I k , j d * [ n ] B Δ 1 g k [ n ] σ 2 Δ + n = 1 N v [ n ] 2 ε ,
g j ( μ ) = I k n = 1 N 1 I k , j u * [ n ] ,
g j ( ν ) = I k n = 2 N 1 I k , j c * [ n ] ,
g j ( ρ ) = O k I k n = 3 N I k , j d * [ n ] ,
g n , j ( β ) = i = 2 n I k , j c * [ i ] i = 1 n 1 I k , j u * [ i ] ,
g n , j ( η ) = i = 2 n I k , j d * O k i = 2 n 1 I k , j c * [ i ] ,
where I k , j u * , I k , j c * and I k , j d * denote the optimal bits allocation at the jth iteration which are obtained from (23a)–(23c).

3.2. Trajectory Design under Given Bits Allocation

When the bits allocation of each slot I k u [ n ] , I k c [ n ] and I k d [ n ] are given, the problem P 1 is transformed  into
P 3 : min v [ n ] E U + E G ,
s . t . ( 21 b ) , ( 21 l ) and ( 21 m ) .
It can be seen that the objective function and the constraints of P3 are convex, and the duality of the variables is weak. Then, P3 can be solved by the CVX solver [38,40].
A two-stage alternating algorithm is proposed based on the solution of P2 and P3. The details of the alternating algorithm are shown in Algorithm 1, where E j i and E i denote the total energy consumption of the UAV-enabled MEC system in each iteration as calculated in (2).
Algorithm 1. The alternating algorithm for P1.
Input:K, N, B, Δ , δ O k , C k , κ , γ u , σ 2 , g 0 , V m a x , ε q k , and tolerant thresholds ξ and ξ 1 ;
1:
 
2:
Initialize: iterative number i = 1 and q u 1 [ n ] ;
3:
 
4:
repeat
5:
 
6:
    Initialize: iterative number j = 1 and λ 1 , μ k , 1 , ν k , 1 , ρ k , 1 , β k , n , 1 , η k , n , 1 ;
7:
 
8:
    repeat
9:
 
10:
        Calculate the I k , j u , i * [ n ] , I k , j c , i * [ n ] and I k , j d , i * [ n ] by Theorem 1 under the given trajectory q u i [ n ] ;
11:
 
12:
        Update the iterative number j = j + 1 ;
13:
 
14:
        Update λ j , μ k , j , ν k , j , ρ k , j , β k , n , j , η k , n , j through Lemma 1;
15:
 
16:
    until E j i E j 1 i ξ 1 ( j > 1 ) ;
17:
 
18:
    Let I k u , i * = I k , j u , i * , I k c , i * = I k , j c , i * and I k d , i * = I k , j d , i * ;
19:
 
20:
    Solve P3 with the CVX solver and obtain q u i * [ n ] under the given bits allocation I k u , i * , I k c , i * and I k d , i * ;
21:
 
22:
    Let q u i [ n ] = q u i * [ n ] ;
23:
 
24:
    Update the iterative number i = i + 1 ;
25:
 
26:
until  E i E i 1 ξ ( i > 1 ) ;
27:
 
28:
Let E = E i , I k u [ n ] = I k u , i * , I k c [ n ] = I k c , i * , I k d [ n ] = I k d , i * and q u [ n ] = q u i [ n ] ;
29:
 
Output:E, I k u [ n ] , I k c [ n ] , I k d [ n ] and q u [ n ] .
30:

3.3. Complexity Analysis

The Complexity of Algorithm 1 comes from three parts. The first part is from the computation of I k u * [ n ] , I k c * [ n ] and I k d * [ n ] in Theorem 1. The second part comes from the subgradient method for computing the dual variables. The third part is from the application of CVX to solve the trajectory of the UAV. Let L denote the number of interations of outer loop. According to the work in [38,41], the complexity of Algorithm 1 is O [ L ( K N + 1 ξ 1 2 + N 3 ) ] Generally, small values of K and N are enough for good performance. Thus the proposed algorithm is feasible in practice.

4. Simulation Results

In this section, we evaluate the performance of the proposed algorithm by simulation. The parameters of the simulation are shown in Table 2 [22,23,24,25,26].
We consider five trajectories of the UAV to compare the energy consumption of the UAV-enabled MEC system. The size of input tasks of each user are assumed to be I 1 = 4 × 10 7 bits, I 2 = 5 × 10 7 bits, I 3 = 6 × 10 7 bits, I 4 = 7 × 10 7 bits and I 5 = 8 × 10 7 bits respectively. All tasks should be processed within T = 5 s. The duration of each slot and sub-slot are set as 5 × 10 2 s and 10 2 s separately. The positions of each user are p 1 = ( 0 , 0 , 0 ) , p 2 = ( 16 , 0 , 0 ) , p 3 = ( 8 , 8 , 0 ) , p 4 = ( 16 , 16 , 0 ) and p 5 = ( 0 , 16 , 0 ) . The starting position of the UAV is ( 0 , 0 , H ) and the final position is ( 0 , 16 , H ). The simulation compares five trajectories: the trajectory using the proposed algorithm, the square trajectory whose length is 16m, the semicircle whose radius is 8m, the line trajectory from ( 0 , 0 , H ) to ( 0 , 16 , H ) and the fixed point in ( 8 , 8 , H ), as shown in Figure 4.
The total energy consumption of four pre-defined trajectories and the proposed algorithm are compared under the same parameter settings. In four pre-defined trajectories, the bits allocation is optimized under given trajectory. The total energy consumption of the UAV-enabled system under five trajectories are 1.8468 × 10 4 J, 1.9812 × 10 4 J, 1.8735 × 10 4 J, 1.9343 × 10 4 J and 1.8665 × 10 4 J respectively, as given in Figure 5. The trajectory of the proposed scheme tends to user 2, user 3 and user 4 to receive the input data and transmit output results. Compared with the pre-defined trajectories, the trajectory of the proposed scheme is optimized to minimize the total energy consumption. In comparison with four pre-defined trajectories, the proposed scheme performs the lowest system energy consumption as shown in Figure 5. It is not necessary for the UAV to go through every ground user to provide MEC services. Consequently, the energy consumption of the square trajectory exceeds the proposed scheme. In the semicircle trajectory, the UAV flies beyond the proposed scheme, causing the augment of the energy consumption of mobility. Although the length of the line trajectory and fixed point decrease compared with the length of the proposed scheme, the energy consumption of communication leads to the increase of the total energy consumption of the system.
Figure 6 shows the optimized bits allocation of each user in each slot for the trajectory using the proposed algorithm of Figure 4. It can be seen from Figure 6 that the tendency of the number of uploading bits, computing bits and downloading bits are similar. The number of uploading bits is relatively high in the beginning slots and decreases over time. Therefore, the UAV can receive all the tasks and provide the input data for the MEC server timely. Then, the UAV deals with the input data and the number of computing bits maintains a steady value. When the computing results output from the MEC server, the UAV needs to transmit the results to the ground users with time constraints. Therefore, the number of the downloading bits increases over time. The number of downloading bits is relatively low compared with the number of uploading bits because of the output/input ratio O k .
The trajectory of the UAV varies under different time duration constraints for the proposed scheme. Figure 7 shows the trajectories of the UAV under different time constraints 4 s, 4.5 s and 5 s, assuming that I 1 = 4 × 10 7 bits, I 2 = 5 × 10 7 bits, I 3 = 6 × 10 7 bits, I 4 = 7 × 10 7 bits and I 5 = 8 × 10 7 bits. When T = 5 s, the trajectory of the UAV tends to user 2, user 3 and user 4 to receive the input data and download the computing results. As the time constraint decreases, the trajectory of the UAV shrinks to user 1 and user 2, because the velocity of the UAV is limited and the UAV should complete the offloading tasks under the finite time duration constraint. Figure 8 shows the velocities of the UAV for the trajectories shown in Figure 7 under different time constraints. The UAV flies fast at the start to fly forward to the ground users to receive the uploading data. Then, the UAV reduces the speed over time to ensure that all ground users can upload the data and the UAV has time to process the data. Finally, the UAV speeds up in the end to finish the offloading tasks and to reach the destination timely. Moreover, as the time constraint decreases, the velocity of the UAV increases to complete the tasks under the limited task deadline.
In the two-stage alternating algorithm, the subproblem at a certain iteration is solved given the optimized variables derived from last iteration or last stage. So the alternating algorithm proposed in this paper should perform convergence. Figure 9 shows the convergence of the total energy consumption of the UAV-enabled MEC system under different time constraints when I 1 = 4 × 10 7 bits, I 2 = 5 × 10 7 bits, I 3 = 6 × 10 7 bits, I 4 = 7 × 10 7 bits and I 5 = 8 × 10 7 bits. It can be seen from Figure 9 that the total energy consumption of the UAV-enabled MEC system converges to a certain value using the proposed algorithm. Only a few iteration numbers are needed to converge by applying the alternating algorithm. Besides, the total energy consumption rises as the time constraint decreases, because the increase of the UAV’s velocity leads to the growth of the total energy consumption under the limited task deadline.
The superiority of the proposed algorithm is also demonstrated. In Figure 10, the proposed two-stage alternating scheme and the successive convex approximation (SCA) scheme are compared. The SCA algorithm is used to tackle the non-convex problems by applying the convex approximation of the non-convex objective and constraints [23,42,43]. For the generality, the users are assumed to be randomly distributed. Under the same distribution of the ground users, the optimizing trajectories of the UAV using the proposed scheme and the SCA scheme are compared. Figure 11 shows the total energy consumption of the UAV-enabled MEC system using the proposed two-stage alternating algorithm and the SCA algorithm, assuming that T = 5 s, I 1 = I 3 = I 5 = 2 × 10 7 bits and I 2 = I 4 = 8 × 10 7 bits. It can be seen from Figure 11 that the proposed scheme outperforms the SCA scheme in terms of the total energy consumption of the UAV-enabled MEC system. The UAV under the SCA algorithm flies further than the proposed algorithm as shown in Figure 10. The longer distance leads to the larger energy consumption of the UAV and the UAV-enabled MEC system.
In Figure 11, the energy consumption of the system using the proposed algorithm, the energy consumption of the ground users using the proposed algorithm, the energy consumption of the system using the SCA algorithm and the energy consumption of the ground users by computing the tasks locally are shown respectively. The energy consumption is compared under different time constraints and the same user distribution as shown in Figure 10, assuming that T = 5 s, I 1 = I 3 = I 5 = 2 × 10 7 bits and I 2 = I 4 = 8 × 10 7 bits. Figure 11 demonstrates that the proposed algorithm performs lower energy consumption of the system than the SCA algorithm under different time constraints. Moreover, from Figure 11, we observe that offloading the computing tasks to the UAV-enabled MEC system alleviates the burden of the ground users greatly. We also note that as the time constraint becomes more stringent, the energy savings of the UAV-enabled system using the proposed scheme becomes more prominent compared with computing locally. It should be noted that if the time constraint is too short for the UAV to complete the offloading tasks under the velocity limit, the optimization problem becomes infeasible.
To show the comlexity of Algorithm 1, the run time of Algorithm 1 is given in Table 3. The run time is obtained by using a computer with 64-bit Intel(R) i5-4210 CPU, 8GB RAM. From Table 3, it can be seen that it is feasible to implement Algorithm 1. The complexity of Algorithm 1 is affected by the number of slots N and the number of ground users K. And the table shows that N has a larger influence on the complexity than K, as analyzed in Section 4. Besides, how to reduce the complexity of the algorithm, especially when N increases, will be further studied in our future work.

5. Conclusions

In this paper, a UAV-enabled MEC system is studied in which the UAV carries computing resources to provide computation offloading services for the ground users. The bits allocation of uploading data, computing data, downloading data and the trajectory of the UAV are jointly optimized with the goal of minimizing the total energy consumption of the UAV-enabled system, including the flying energy consumption and the transmission energy consumption. The energy consumption minimization problem is optimized under the constraints of the number of each task’s bits, the causality of the data and the velocity of the UAV. On account of the fact that the optimization problem is non-convex, an alternating algorithm is proposed in this paper to solve the formulated problem. The simulation results illustrate that the proposed scheme is superior to the benchmark schemes. Moreover, the simulation results also show the performance of the proposed scheme with different parameters. In the future work, we will consider the more complicated models for flying and communications, such as the fading factors and the mobility of ground users.

Author Contributions

Conceptualization, L.L., X.W. and Z.L.; methodology, L.L.; software, L.L.; validation, L.L. and Q.P.; formal analysis, L.L.; investigation, Q.P. and W.J.; resources, X.W.; writing—original draft preparation, L.L.; writing—review and editing, L.L. and Z.H.; visualization, L.L.; supervision, Z.L.; project administration, X.W. and Z.L.

Funding

This research was supported in part by the National Natural Science Foundation of China (61801036), in part by the National Science and Technology Major Project under Grant 2018ZX030110004, in part by the National Key R&D Program of China under Project 2017YFC0112802, in part by the National Natural Science Foundation of China (61901163).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proof of Theorem 1

In this appendix, we derive the Lagrangian dual function of P2, and then obtain the optimal solution of P2 given the Lagrangian function. The partial Lagrangian function of P2 is given by (A1), where I denotes the bits allocation I k u [ n ] , I k c [ n ] , I k d [ n ] . And λ > 0 , μ > 0 , ν > 0 , ρ > 0 , β > 0 , η > 0 denote the dual variables according to the constraints (21b)–(21k).
L ( I , λ , μ , ν , ρ , β , η ) = n = 1 N k = 1 K γ u C k 3 ( I k c [ n ] ) 3 Δ 2 + n = 1 N k = 1 K 2 I k d [ n ] B δ 1 g k [ n ] σ 2 δ + n = 1 N v [ n ] 2 + λ [ n = 1 N k = 1 K γ u C k 3 ( I k c [ n ] ) 3 Δ 2 + n = 1 N k = 1 K 2 I k d [ n ] B δ 1 g k [ n ] σ 2 δ + n = 1 N v [ n ] 2 ε ] + k = 1 K μ k ( I k n = 1 N 2 I k u [ n ] ) + k = 1 K ν k ( I k n = 2 N 1 I k c [ n ] ) + k = 1 K ρ k ( O k I k n = 3 N I k d [ n ] ) k = 1 K n = 2 N 1 β k , n ( i = 2 n I k c [ i ] i = 1 n 1 I k u [ i ] ) + k = 1 K n = 2 N 1 η k , n ( i = 3 n + 1 I k d [ i ] O k i = 2 n I k c [ i ] )
Based on (A1), the optimal solution of P2 can be derived by solving the Lagrangian dual function. Then, the Lagrangian dual function of P2 can be presented as
min I L ( I , λ , μ , ν , ρ , β , η )
s . t . ( 21 h ) ( 21 k ) .
According to (A1) and (A2), the derivations of the Lagrangian of P1 with respect of I k u [ n ] , I k c [ n ] , I k u [ n ] are expressed as
L ( I , λ , μ , ν , ρ , β , η ) I k d [ n ] = 2 I k u [ n ] B δ σ 2 ln 2 g k [ n ] B μ k i = n + 1 N 1 β k , i , n = 1 , , N 2 ,
L ( I , λ , μ , ν , ρ , β , η ) I k c [ n ] = 3 ( λ + 1 ) γ u C k 3 ( I k c [ n ] ) 2 Δ 2 ν k + i = n N 1 β k , i O k i = n N 1 η k , i , n = 2 , , N 1 ,
L ( I , λ , μ , ν , ρ , β , η ) I k d [ n ] = ( λ + 1 ) 2 I k d [ n ] B δ ln 2 σ 2 g k [ n ] B ρ k + i = n 1 N 1 η k , i , n = 3 , , N .
Let the derivations be zero, and the optimal solution of bits allocation I k u * [ n ] , I k c * [ n ] and I k d * [ n ] can be solved separately. Thus, (23a), (23b) and (23c) shows the optimal solution of P2.

References

  1. Zhu, T.; Shi, T.; Li, J.; Cai, Z.; Zhou, X. Task Scheduling in Deadline-Aware Mobile Edge Computing Systems. IEEE Internet Things J. 2019. [Google Scholar] [CrossRef]
  2. Mach, P.; Becvar, Z. Mobile Edge Computing: A Survey on Architecture and Computation Offloading. IEEE Commun. Surv. Tutor. 2017, 19, 1628–1656. [Google Scholar] [CrossRef]
  3. Abbas, N.; Zhang, Y.; Taherkordi, A.; Skeie, T. Mobile Edge Computing: A Survey. IEEE Internet Things J. 2018, 5, 450–465. [Google Scholar] [CrossRef]
  4. Zhang, K.; Mao, Y.; Leng, S.; Zhao, Q.; Li, L.; Peng, X.; Pan, L.; Maharjan, S.; Zhang, Y. Energy-Efficient Offloading for Mobile Edge Computing in 5G Heterogeneous Networks. IEEE Access 2016, 4, 5896–5907. [Google Scholar] [CrossRef]
  5. Zeng, Y.; Zhang, R.; Lim, T.J. Wireless communications with unmanned aerial vehicles: Opportunities and challenges. IEEE Commun. Mag. 2016, 54, 36–42. [Google Scholar] [CrossRef]
  6. Li, B.; Fei, Z.; Zhang, Y. UAV Communications for 5G and Beyond: Recent Advances and Future Trends. IEEE Internet Things J. 2019, 6, 2241–2263. [Google Scholar] [CrossRef]
  7. Hossein Motlagh, N.; Taleb, T.; Arouk, O. Low-Altitude Unmanned Aerial Vehicles-Based Internet of Things Services: Comprehensive Survey and Future Perspectives. IEEE Internet Things J. 2016, 3, 899–922. [Google Scholar] [CrossRef]
  8. Sekander, S.; Tabassum, H.; Hossain, E. Multi-Tier Drone Architecture for 5G/B5G Cellular Networks: Challenges, Trends, and Prospects. IEEE Commun. Mag. 2018, 56, 96–103. [Google Scholar] [CrossRef] [Green Version]
  9. Xu, X.; Zeng, Y.; Guan, Y.L.; Zhang, R. Overcoming Endurance Issue: UAV-Enabled Communications With Proactive Caching. IEEE J. Sel. Areas Commun. 2018, 36, 1231–1244. [Google Scholar] [CrossRef] [Green Version]
  10. Mao, Y.; Zhang, J.; Letaief, K.B. Dynamic Computation Offloading for Mobile-Edge Computing With Energy Harvesting Devices. IEEE J. Sel. Areas Commun. 2016, 34, 3590–3605. [Google Scholar] [CrossRef] [Green Version]
  11. Mozaffari, M.; Saad, W.; Bennis, M.; Debbah, M. Mobile Unmanned Aerial Vehicles (UAVs) for Energy-Efficient Internet of Things Communications. IEEE Trans. Wirel. Commun. 2017, 16, 7574–7589. [Google Scholar] [CrossRef]
  12. Satyanarayanan, M.; Bahl, P.; Caceres, R.; Davies, N. The Case for VM-Based Cloudlets in Mobile Computing. IEEE Pervasive Comput. 2009, 8, 14–23. [Google Scholar] [CrossRef]
  13. Zhang, S.; Zeng, Y.; Zhang, R. Cellular-Enabled UAV Communication: A Connectivity-Constrained Trajectory Optimization Perspective. IEEE Trans. Commun. 2019, 67, 2580–2604. [Google Scholar] [CrossRef]
  14. Al-Hourani, A.; Kandeepan, S.; Lardner, S. Optimal LAP Altitude for Maximum Coverage. IEEE Wirel. Commun. Lett. 2014, 3, 569–572. [Google Scholar] [CrossRef]
  15. Alzenad, M.; El-Keyi, A.; Lagum, F.; Yanikomeroglu, H. 3-D Placement of an Unmanned Aerial Vehicle Base Station (UAV-BS) for Energy-Efficient Maximal Coverage. IEEE Wirel. Commun. Lett. 2017, 6, 434–437. [Google Scholar] [CrossRef]
  16. Alzenad, M.; El-Keyi, A.; Yanikomeroglu, H. 3-D Placement of an Unmanned Aerial Vehicle Base Station for Maximum Coverage of Users With Different QoS Requirements. IEEE Wirel. Commun. Lett. 2018, 7, 38–41. [Google Scholar] [CrossRef]
  17. Zeng, Y.; Zhang, R. Energy-Efficient UAV Communication With Trajectory Optimization. IEEE Trans. Wirel. Commun. 2017, 16, 3747–3760. [Google Scholar] [CrossRef] [Green Version]
  18. Sikeridis, D.; EleniTsiropoulou, E.; Devetsikiotis, M.; Papavassiliou, S. Self-Adaptive Energy Efficient Operation in UAV-Assisted Public Safety Networks. In Proceedings of the 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata, Greece, 25–28 June 2018; pp. 1–5. [Google Scholar] [CrossRef]
  19. Sikeridis, D.; Tsiropoulou, E.E.; Devetsikiotis, M.; Papavassiliou, S. Wireless powered Public Safety IoT: A UAV-assisted adaptive-learning approach towards energy efficiency. J. Netw. Comput. Appl. 2018, 123, 69–79. [Google Scholar] [CrossRef]
  20. Athukoralage, D.; Guvenc, I.; Saad, W.; Bennis, M. Regret Based Learning for UAV Assisted LTE-U/WiFi Public Safety Networks. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–7. [Google Scholar] [CrossRef]
  21. Mozaffari, M.; Saad, W.; Bennis, M.; Debbah, M. Unmanned Aerial Vehicle With Underlaid Device-to-Device Communications: Performance and Tradeoffs. IEEE Trans. Wirel. Commun. 2016, 15, 3949–3963. [Google Scholar] [CrossRef]
  22. Hu, Q.; Cai, Y.; Yu, G.; Qin, Z.; Zhao, M.; Li, G.Y. Joint Offloading and Trajectory Design for UAV-Enabled Mobile Edge Computing Systems. IEEE Internet Things J. 2019, 6, 1879–1892. [Google Scholar] [CrossRef]
  23. Jeong, S.; Simeone, O.; Kang, J. Mobile Edge Computing via a UAV-Mounted Cloudlet: Optimization of Bit Allocation and Path Planning. IEEE Trans. Veh. Technol. 2018, 67, 2049–2063. [Google Scholar] [CrossRef]
  24. Hu, X.; Wong, K.K.; Yang, K.; Zheng, Z. UAV-Assisted Relaying and Edge Computing: Scheduling and Trajectory Optimization. arXiv 2018, arXiv:1812.02658. [Google Scholar] [CrossRef]
  25. Zhou, F.; Wu, Y.; Sun, H.; Chu, Z. UAV-Enabled Mobile Edge Computing: Offloading Optimization and Trajectory Design. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar] [CrossRef]
  26. Zhou, F.; Wu, Y.; Hu, R.Q.; Qian, Y. Computation Rate Maximization in UAV-Enabled Wireless-Powered Mobile-Edge Computing Systems. IEEE J. Sel. Areas Commun. 2018, 36, 1927–1941. [Google Scholar] [CrossRef] [Green Version]
  27. Mao, Y.; You, C.; Zhang, J.; Huang, K.; Letaief, K.B. A Survey on Mobile Edge Computing: The Communication Perspective. IEEE Commun. Surv. Tutor. 2017, 19, 2322–2358. [Google Scholar] [CrossRef] [Green Version]
  28. Xie, L.; Xu, J.; Zhang, R. Throughput Maximization for UAV-Enabled Wireless Powered Communication Networks. IEEE Internet Things J. 2019, 6, 1690–1703. [Google Scholar] [CrossRef]
  29. Lyu, J.; Zeng, Y.; Zhang, R. UAV-Aided Offloading for Cellular Hotspot. IEEE Trans. Wirel. Commun. 2018, 17, 3988–4001. [Google Scholar] [CrossRef]
  30. Zeng, Y.; Xu, X.; Zhang, R. Trajectory Design for Completion Time Minimization in UAV-Enabled Multicasting. IEEE Trans. Wirel. Commun. 2018, 17, 2233–2246. [Google Scholar] [CrossRef]
  31. Goldsmith, A. Wireless Communications; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  32. Zhang, W.; Wen, Y.; Guan, K.; Kilper, D.; Luo, H.; Wu, D.O. Energy-Optimal Mobile Cloud Computing under Stochastic Wireless Channel. IEEE Trans. Wirel. Commun. 2013, 12, 4569–4581. [Google Scholar] [CrossRef]
  33. Dao, N.; Vu, D.; Na, W.; Kim, J.; Cho, S. SGCO: Stabilized Green Crosshaul Orchestration for Dense IoT Offloading Services. IEEE J. Sel. Areas Commun. 2018, 36, 2538–2548. [Google Scholar] [CrossRef]
  34. Xue, N. Design and Optimization of Lithium-Ion Batteries for Electric-Vehicle Applications. 2014. Available online: http://hdl.handle.net/2027.42/107299 (accessed on 15 October 2019).
  35. Borst, C.; Sjer, F.; Mulder, M.; Van Paassen, M.; Mulder, J. Ecological approach to support pilot terrain awareness after total engine failure. J. Aircr. 2008, 45, 159–171. [Google Scholar] [CrossRef]
  36. Chakrabarty, A.; Langelaan, J. Energy maps for long-range path planning for small-and micro-UAVs. In Proceedings of the AIAA Guidance, Navigation, and Control Conference, Chicago, IL, USA, 13 August 2009; p. 6113. [Google Scholar]
  37. Chakrabarty, A.; Langelaan, J.W. Energy-based long-range path planning for soaring-capable unmanned aerial vehicles. J. Guid. Control. Dyn. 2011, 34, 1002–1015. [Google Scholar] [CrossRef]
  38. Stephen, B.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  39. Boyd, S.; Xiao, L.; Mutapcic, A. Subgradient methods. Lecture Notes of EE392o, Stanford University, Autumn Quarter 2003, 2004, 2004–2005. [Google Scholar]
  40. Grant, M.; Boyd, S. CVX: Matlab Software for Disciplined Convex Programming, Version 2.1. Available online: http://cvxr.com/cvx (accessed on 15 October 2019).
  41. Bubeck, S. Convex optimization: Algorithms and complexity. Found. Trends® Mach. Learn. 2015, 8, 231–357. [Google Scholar] [CrossRef]
  42. Scutari, G.; Facchinei, F.; Lampariello, L. Parallel and Distributed Methods for Constrained Nonconvex Optimization—Part I: Theory. IEEE Trans. Signal Process. 2017, 65, 1929–1944. [Google Scholar] [CrossRef]
  43. Scutari, G.; Facchinei, F.; Lampariello, L.; Sardellitti, S.; Song, P. Parallel and Distributed Methods for Constrained Nonconvex Optimization-Part II: Applications in Communications and Machine Learning. IEEE Trans. Signal Process. 2017, 65, 1945–1960. [Google Scholar] [CrossRef]
Figure 1. UAV-enabled MEC system.
Figure 1. UAV-enabled MEC system.
Sensors 19 04521 g001
Figure 2. The slots and sub-slots in time division multiple access (TDMA).
Figure 2. The slots and sub-slots in time division multiple access (TDMA).
Sensors 19 04521 g002
Figure 3. The slots and sub-slots in TDMA.
Figure 3. The slots and sub-slots in TDMA.
Sensors 19 04521 g003
Figure 4. Different trajectory of the Unmanned Aerial Vehicle (UAV) under the time constraint T = 5 s ( I 1 = 4 × 10 7 bits, I 2 = 5 × 10 7 bits, I 3 = 6 × 10 7 bits, I 4 = 7 × 10 7 bits and I 5 = 8 × 10 7 bits).
Figure 4. Different trajectory of the Unmanned Aerial Vehicle (UAV) under the time constraint T = 5 s ( I 1 = 4 × 10 7 bits, I 2 = 5 × 10 7 bits, I 3 = 6 × 10 7 bits, I 4 = 7 × 10 7 bits and I 5 = 8 × 10 7 bits).
Sensors 19 04521 g004
Figure 5. Energy consumption of the UAV-enabled mobile edge computing (MEC) system in different trajectory.
Figure 5. Energy consumption of the UAV-enabled mobile edge computing (MEC) system in different trajectory.
Sensors 19 04521 g005
Figure 6. The bits allocation of all users under the time constraint T = 5 s, I 1 = 4 × 10 7 bits, I 2 = 5 × 10 7 bits, I 3 = 6 × 10 7 bits, I 4 = 7 × 10 7 bits and I 5 = 8 × 10 7 bits.
Figure 6. The bits allocation of all users under the time constraint T = 5 s, I 1 = 4 × 10 7 bits, I 2 = 5 × 10 7 bits, I 3 = 6 × 10 7 bits, I 4 = 7 × 10 7 bits and I 5 = 8 × 10 7 bits.
Sensors 19 04521 g006
Figure 7. The trajectory of the UAV under different time constraint ( I 1 = 4 × 10 7 bits, I 2 = 5 × 10 7 bits, I 3 = 6 × 10 7 bits, I 4 = 7 × 10 7 bits and I 5 = 8 × 10 7 bits).
Figure 7. The trajectory of the UAV under different time constraint ( I 1 = 4 × 10 7 bits, I 2 = 5 × 10 7 bits, I 3 = 6 × 10 7 bits, I 4 = 7 × 10 7 bits and I 5 = 8 × 10 7 bits).
Sensors 19 04521 g007
Figure 8. The velocity of the UAV ( I 1 = 4 × 10 7 bits, I 2 = 5 × 10 7 bits, I 3 = 6 × 10 7 bits, I 4 = 7 × 10 7 bits and I 5 = 8 × 10 7 bits).
Figure 8. The velocity of the UAV ( I 1 = 4 × 10 7 bits, I 2 = 5 × 10 7 bits, I 3 = 6 × 10 7 bits, I 4 = 7 × 10 7 bits and I 5 = 8 × 10 7 bits).
Sensors 19 04521 g008
Figure 9. The total energy consumption of the system ( I 1 = 4 × 10 7 bits, I 2 = 5 × 10 7 bits, I 3 = 6 × 10 7 bits, I 4 = 7 × 10 7 bits and I 5 = 8 × 10 7 bits).
Figure 9. The total energy consumption of the system ( I 1 = 4 × 10 7 bits, I 2 = 5 × 10 7 bits, I 3 = 6 × 10 7 bits, I 4 = 7 × 10 7 bits and I 5 = 8 × 10 7 bits).
Sensors 19 04521 g009
Figure 10. The trajectory of the UAV using the proposed scheme and the SCA scheme under the time constraint T = 5 s ( I 1 = I 3 = I 5 = 2 × 10 7 bits, I 2 = I 4 = 8 × 10 7 bits).
Figure 10. The trajectory of the UAV using the proposed scheme and the SCA scheme under the time constraint T = 5 s ( I 1 = I 3 = I 5 = 2 × 10 7 bits, I 2 = I 4 = 8 × 10 7 bits).
Sensors 19 04521 g010
Figure 11. The total energy consumption of the MEC system under different time constraints ( I 1 = I 3 = I 5 = 2 × 10 7 bits, I 2 = I 4 = 8 × 10 7 bits).
Figure 11. The total energy consumption of the MEC system under different time constraints ( I 1 = I 3 = I 5 = 2 × 10 7 bits, I 2 = I 4 = 8 × 10 7 bits).
Sensors 19 04521 g011
Table 1. List of symbols.
Table 1. List of symbols.
SymbolDescription
K , k The set of ground users, k K
KNumber of ground users
A k The notation of user k’s task
I k Task input-data size of user k
τ k Task deadline of user k
C k Number of CPU cycles needed to compute one input bit of user k
O k Ratio of the number of output bits to the number of input bits for user k
TTime constraint of the tasks
NNumber of time slots of T
Δ Time duration of one slot
δ Time duration of one sub-slot
q k Location of user k
q u [ n ] Location of the UAV in nth slot
v [ n ] Velocity of the UAV in nth slot
V m a x Maximal velocity of the UAV
hVariable of the UAV’ altitude
HFixed altitude of the UAV
BCommunication bandwidth
σ 2 Noise power at the receiver
g 0 Channel power gain at reference distance 1m
g k [ n ] Channel gain from the ground user k to the UAV in nth slot
I k u [ n ] Number of uploading bits of user k in nth slot
I k c [ n ] Number of computing bits of the UAV for user k in nth slot
I k d [ n ] Number of downloading bits from the UAV to user k in nth slot
f U , k [ n ] Frequency of the UAV’s CPU in the nth slot for computing the tasks of user k
f u [ n ] Frequency of the UAV’s CPU in the nth slot
E U , k c [ n ] Computation energy consumption of the UAV for ground user k in the nth slot
γ u Effective switched capacitance of the UAV’s CPU
κ Coefficient of the flying energy consumption ( κ = 0.5 M Δ )
ETotal energy consumption of the UAV-enabled MEC system
E G Energy consumption of K ground users
E U Energy consumption of the UAV
E G U Communication energy consumption for uploading data of the ground users
E U C Computing energy consumption of the UAV
E U F Flying energy consumption of the UAV
E U D Energy consumption of downloading the results from the UAV to ground users
I k u * [ n ] , I k c * [ n ] , I k d * [ n ] Optimal number of I k u [ n ] , I k c [ n ] and I k d [ n ] under the given trajectory of the UAV
λ , μ , ν , ρ , β , η Dual variables according to the constraints (21b)–(21k)
λ j , μ k , j , ν k , j , ρ k , j , β k , n , j , η k , n , j Dual variables at the jth iteration in the subgradient method
α j ( λ ) , α j ( μ ) , α j ( ν ) , α j ( ρ ) , α j ( β ) , α j ( η ) jth step size computed in subgradient algorithm
g j ( λ ) , g j ( μ ) , g j ( ν ) , g j ( ρ ) , g n , j ( β ) , g n , j ( η ) Subgradients calculated by (25a)–(25f)
Table 2. List of symbols.
Table 2. List of symbols.
ParameterDescriptionValue
C k Number of CPU cycles needed to compute one input bit of user k1500 cycles/bit
O k Ratio of the number of output bits to the number of input bits for user k0.5
KNumber of ground users5
NNumber of time slots of T100
V m a x Maximal velocity of the UAV15 m/s
HAltitude of the UAV10 m
BCommunication bandwidth40 Mhz
σ 2 Noise power at the receiver 10 9 W
g 0 Channel gain from the ground user k in nth slot 30 dB
γ u Effective switched capacitance of the UAV’s CPU 10 28
κ Coefficient of the flying energy consumption ( κ = 0.5 M Δ ) 0.0675
ETotal energy consumption of energy consumption of the UAV-enabled MEC system 5 × 10 5
ξ 1 , ξ tolerant thresholds of the iterations 5 × 10 4
Table 3. Run time of Algorithm 1.
Table 3. Run time of Algorithm 1.
(N,K)(25,2)(50,2)(75,2)(25,4)(50,4)(75,4)(25,6)(50,6)(75,6)
Algorithm 123.56 s41.31 s108.42 s25.48 s81.09 s203.32 s71.73 s132.18 s315.42 s

Share and Cite

MDPI and ACS Style

Li, L.; Wen, X.; Lu, Z.; Pan, Q.; Jing, W.; Hu, Z. Energy-Efficient UAV-Enabled MEC System: Bits Allocation Optimization and Trajectory Design. Sensors 2019, 19, 4521. https://doi.org/10.3390/s19204521

AMA Style

Li L, Wen X, Lu Z, Pan Q, Jing W, Hu Z. Energy-Efficient UAV-Enabled MEC System: Bits Allocation Optimization and Trajectory Design. Sensors. 2019; 19(20):4521. https://doi.org/10.3390/s19204521

Chicago/Turabian Style

Li, Linpei, Xiangming Wen, Zhaoming Lu, Qi Pan, Wenpeng Jing, and Zhiqun Hu. 2019. "Energy-Efficient UAV-Enabled MEC System: Bits Allocation Optimization and Trajectory Design" Sensors 19, no. 20: 4521. https://doi.org/10.3390/s19204521

APA Style

Li, L., Wen, X., Lu, Z., Pan, Q., Jing, W., & Hu, Z. (2019). Energy-Efficient UAV-Enabled MEC System: Bits Allocation Optimization and Trajectory Design. Sensors, 19(20), 4521. https://doi.org/10.3390/s19204521

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop