Cargando…
Energy-Efficient UAV-Enabled MEC System: Bits Allocation Optimization and Trajectory Design
The unmanned aerial vehicle (UAV) enabled mobile edge computing (MEC) system is attracting a lot of attentions for the potential of low latency and low transmission energy consumption, due to the advantages of high mobility and easy deployment. It has been widely applied to provide communication and...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6832730/ https://www.ncbi.nlm.nih.gov/pubmed/31627444 http://dx.doi.org/10.3390/s19204521 |
Sumario: | The unmanned aerial vehicle (UAV) enabled mobile edge computing (MEC) system is attracting a lot of attentions for the potential of low latency and low transmission energy consumption, due to the advantages of high mobility and easy deployment. It has been widely applied to provide communication and computing services, especially in Internet of Things (IoT). However, there are still some challenges in the UAV-enabled MEC system. Firstly, the endurance of the UAV is limited and further impacts the performance of the system. Secondly, mobile devices are battery-powered and the batteries of some devices are hard to change. Therefore, in this paper, a UAV-enabled MEC system in which the UAV is empowered to have computing capability and provides tasks offloading service is studied. The total energy consumption of the UAV-enabled system, which includes the energy consumption of the UAV and the energy consumption of the ground users, is minimized under the constraints of the UAV’s energy budget, the number of each task’s bits, the causality of the data and the velocity of the UAV. The bits allocation of uploading data, computing data, downloading data and the trajectory of the UAV are jointly optimized with the goal of minimizing the total energy consumption. Moreover, a two-stage alternating algorithm is proposed to solve the non-convex formulated problem. Finally, the simulation results show the superiority of the proposed scheme compared with other benchmark schemes. Finally, the performance of the proposed scheme is demonstrated under different settings. |
---|