Next Article in Journal
Improved SH0 Guided Wave Transducers Based on Piezoelectric Fiber Patches
Previous Article in Journal
Gait Phase Detection for Lower-Limb Exoskeletons using Foot Motion Data from a Single Inertial Measurement Unit in Hemiparetic Individuals
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Throughput Maximization for UAV-Enabled Relaying in Wireless Powered Communication Networks

1
Information Engineering School, Nanchang University, Nanchang 330031, China
2
Electronic Information School, Wuhan University, Wuhan 430072, China
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(13), 2989; https://doi.org/10.3390/s19132989
Submission received: 11 May 2019 / Revised: 26 June 2019 / Accepted: 2 July 2019 / Published: 6 July 2019
(This article belongs to the Section Sensor Networks)

Abstract

:
This paper investigates mobile relaying in wireless powered communication networks (WPCN), where an unmanned aerial vehicle (UAV) is employed to help information delivery from multiple sources to destination with communication channels severely blocked. The sources are low-power without energy supply. To support information transmission, the UAV acts as a hybrid access point (AP) to provide wireless power transfer (WPT) and information reception for sources. We set the issue of system throughput maximization as the optimization problem. On the one hand, the system is subject to the information causality constraint due to the dependent processes of information reception and transmission for the UAV. On the other hand, the sources are constrained by a so-called neutrality constraints due to the dependent processes of energy harvesting and energy consumption. In addition, we take account of the access delay issue of all ground nodes. Specifically, two paradigms of delay-tolerant case and delay-sensitive case are presented. However, the formulated problem including optimizations for time slot scheduling, power allocation and UAV trajectory is non-convex and thus is difficult to obtain its optimal solution. To tackle this problem, we apply the successive convex approximation (SCA) technique and propose an iterative algorithm by which a suboptimal solution can be achieved. Simulation results validate our proposed design, and show that the obtained suboptimal solution is high-quality, as compared to benchmark scheme.

1. Introduction

Owing to their swift mobility, unmanned aerial vehicles (UAV) have been widely and increasingly applied in wireless communication [1]. At present, artificial intelligence (AI), internet of things (IoT) and big data have induced a great deal of interests in academia. How to support massive low-power wireless devices in future wireless communication system is a critical and attractive topic considering the dramatic growth of devices.
On the one hand, wireless power transfer (WPT) is considered to be a prospective technology applied to replenish power for low-power rechargeable wireless devices (WDs) by radio frequency [2,3,4,5]. In general, WPT can be divided into two applications: simultaneous wireless information and power transfer (SWIPT) and wireless powered communication networks (WPCN). In WPCN, an access point (AP) is dedicated to charge the WDs in downlink with WPT, and then the WDs can perform wireless information transfer using the harvested energy. In particular, the AP in WPCN is usually fixed at a location, which is generally faced with “doubly near–far" problem [2] or leads to the terrible efficiency if the distance between the AP and rechargeable wireless device is large. To deal with these challenges, UAV-enabled WPCN is proposed in [6,7,8]. In these works, UAV is used as a hybrid AP, namely the UAV first charges the WDs via WPT, and then receives the data from WDs via wireless information transmit (WIT), to enhance the performance of both WPT and WIT.
On the other hand, UAV-enabled mobile relaying is considered to be able to enlarge the communication coverage [9,10,11,12,13,14,15,16]. Compared with traditional static relaying, UAV-enabled relaying provides a new possibility for on-demand communication with its swift deployment/placement. Furthermore, UAV-enabled relaying can provide line-of-sight (LoS) links. By flying in proximity to the ground user, low-pathloss communication channels can be achieved. In [9], UAVs is employed to combine with wireless caching, where the UAVs are dedicated to provide content caching service for users as an airborne relay with the goal of users’ quality-of-experience maximization. In [10], significant performance gain for UAV relaying is achieved via trajectory optimization as well as power control. The authors of [11] studied both the spectrum efficiency and energy efficiency when a UAV acts as a relay, but only the circular trajectory pattern is considered. The authors of [12] maximized the UAV-enabled relaying throughput. The authors of [13] also studied throughput maximization problem in UAV-enabled relaying by joint transmit power allocation optimization and relay trajectory design. The authors of [14] studied the optimal placement of UAV relay, and obtained the altitude of both static and mobile UAV. The authors of [15] also studied the placement problem in UAV relaying networks, and optimized the transmission power, bandwidth and UAV’s position to maximize the system throughput. However, only the static UAV was considered in [15]. The problem of decoding error probability minimization was studied in UAV relaying system [16], by finding the optimal position of UAV and optimizing the block length allocation.
Given the advantages of UAV-enabled WPCN and mobile relaying, a new UAV-enabled relaying system combined with WPCN is proposed, as shown in Figure 1. In this system model, a UAV is employed as a decode-and-forward (DF) relay to assists information transmission from multiple rechargeable ground sources to a ground destination with direct links seriously blocked. In addition, the UAV plays a role as a hybrid AP, namely in each time slot it first broadcasts energy RF signal to charge all the sources via WPT, and then collects the information from the sources. We assume the destination acts as the information collection and processing node that can obtain stable power supply. Furthermore, the access delay issues for all ground nodes including sources and destination are considered, which are partitioned into two cases" delay-tolerant case and delay-sensitive case. Specifically, each source’s throughput during the finite period time or in each time slot is taken account. For convenience of adjusting the fairness or access delay among sources, we are dedicated to set a factor to balance each source’s throughput. Certainly, the access delay of destination is adjustable by another factor. In this work, we aim to achieve the throughput maximization, namely the information that successfully receives by destination from UAV or the information that successfully forwards from UAV to destination, subject to the maximum speed, information causality as well as so-called neutrality constraints [4]. To this end, we jointly optimize the time slot scheduling, power allocation and UAV’s trajectory for achieving the maximum throughput. Nevertheless, the non-convexity results in that the formulated original problem cannot be directly solved.
It is worth noting that there have been few prior studies on UAV-enabled relaying in WPCN in academia. The authors of [17] studied UAV-enabled amplify-and-forward (AF) relaying to assist information transmission from base station (BS) to destination with the goal of network throughput maximization, in which the UAV is energy-constrained and harvests energy from the BS via WPT. Evidently, our paper is significantly different from this work in scenario setup [17]. To illustrate the innovations, we summarize the main contributions of this paper as follows.
  • Firstly, for the mobile relaying, the UAV acted as a DF relay to help information delivery. Due to the processing delay of the DF relay, the information transmission is subject to the information causality constraint, namely the transmitted information to destination from the UAV in one time slot cannot exceed the total received information from sources before this slot.
  • Secondly, for the WPCN, we consider multiple rechargeable sources with no residual energy at the beginning. The sources first harvest the energy from the hybrid AP (i.e., UAV) in downlink via WPT and then transmit information in uplink via WIT. In the process of WIT, the sources are restricted by neutrality constraints, i.e., each source’s energy consumption in one slot cannot exceed the total harvested energy before.
  • Thirdly, the access delay problem is considered in this paper. For the delay-tolerant case, it is assumed that the sources and destination operate the communication protocol without strict access delay consideration in each time slot. In other words, the transmitted datas are delay-insensitive for ground nodes in delay-tolerant case. To guarantee the fairness among sources, a specific factor is set to adjust each source’s throughput over the finite period time.
  • Next, for the delay-sensitive case, each source is requested to upload a certain amount of data to the UAV in each time slot, and the destination is also required to receive a certain amount of data forwarded by the UAV. To this end, two other specific factors are introduced to design this case.
  • Finally, we jointly optimize time slot scheduling, power allocation and UAV trajectory to achieve a maximum throughput by applying successive convex approximation (SCA) technique. An effective iteration algorithm is proposed to solve the non-convex problem, leading to a suboptimal solution. The simulation results validate the feasibility and superiority of the proposed design. The proposed algorithm and simulation results provide helpful insights for UAV-enabled relaying design in WPCN, in which the impact of delay is considered and the UAV trajectory is optimized as well. The simulation results show that, in practice, the proposed algorithm contributes to achieve different delay required UAV-enabled WPCN system design.

2. System Model

A UAV-enabled WPCN is considered as illustrated in Figure 1. In this model, a UAV acts as a mobile relay that is dispatched to transmit the information from multiple sources to the destination over the area of interest. Assume that the destination has stable power supply, and the UAV also has stable power supply onboard and the equipped energy is sufficient to support the task in the finite period time T, but there is no power supply embedded in the sources. For information reception, the UAV needs to travel over the sources to operate WPT in downlinks, and the sources utilize the harvested energy to support WIT in uplinks. All sources are equipped with two antennas that are dedicated for energy harvesting and WIT, respectively. The UAV is also equipped with two antennas for WPT and information reception or transmission, while the destination is equipped with single antenna for information reception.
In this paper, the UAV’s location projected on the ground at time instant t [ 0 , T ] is denoted by [ x ( t ) , y ( t ) ] T . We use K { 1 , 2 , . . . , K } to denote the sources set. For source k K , its location is denoted by w k = [ x k , y k ] T , while the location of the destination is denoted by w d = [ x d , y d ] T . In addition, we assume that the UAV flies at a fixed altitude H and the locations of the sources and destination are fixed. For convenience of discussion, the time horizon T is equally discretized into N time slots that are represented by N { 1 , 2 , . . . , N } by using a sufficient small step δ t , i.e., T = N δ t . Thus, the trajectory of the UAV can be determined by the sequence { q [ n ] = [ x [ n ] , y [ n ] ] T } n = 1 N , where the equality q [ n ] = q ( n δ t ) holds. We assume the UAV must fly back to the initial location after period T for equipment maintenance or battery charge. Hence, we obtain the following constraints
q [ 1 ] = q [ N ] ,
| | q [ n + 1 ] q [ n ] | | 2 ( V max δ t ) 2 , n N ˘ ,
where N ˘ { 1 , 2 , . . . , N 1 } , and  V max denotes the maximum speed. The expression in Equation (2) indicates the maximum travel distance of the UAV in one time slot. During the period T, the distance between the source k and the UAV and that between the UAV and the destination can be expressed as follows, respectively,
d k r [ n ] = | | q [ n ] w k | | 2 + H 2 , k K , n N ,
d r d [ n ] = | | q [ n ] w d | | 2 + H 2 , n N .
It is assumed that the air-to-ground/ground-to-air channel is dominated by LoS link and the Doppler effect is perfectively compensated [18,19,20,21,22,23]. Hence, we can obtain the channel power gain as
h k r [ n ] = β 0 | | q [ n ] w k | | 2 + H 2 , k K , n N ,
h r d [ n ] = β 0 | | q [ n ] w d | | 2 + H 2 , n N ,
where h k r [ n ] denotes the channel power gain from the source k to UAV, and  h r d [ n ] is the channel power gain from the UAV to destination. In addition, β 0 denotes the channel power at the reference distance d 0 = 1 m.
In the WPCN, a DF relaying is considered based on time-division duplexing (TDD) model that equal bandwidth is allocated for information reception and forwarding. For the multiple sources, each source can share the whole frequency for information transmission through a time-division multiple access (TDMA) approach. Specifically, the communication protocol of our system is shown as Figure 2. We divide time slot n N into K + 2 subslots that are denoted by K ˘ { 0 } K { K + 1 } , and introduce an time allocation variable τ k [ n ] , with  k K ˘ , to determine the duration of the k-th subslot. Specifically, the 0-th slot of duration τ 0 [ n ] δ t is used to operate WPT, and k-th slot of duration τ k [ n ] δ t is used for WIT, with  k K . The last subslot of duration τ K + 1 [ n ] δ t belongs to the relay for forwarding the information to the destination. As a result, the time allocation variable τ k [ n ] needs to satisfy the following constraints,
0 τ k [ n ] 1 , k K ˘ , n N ,
k = 0 K + 1 τ k [ n ] 1 , n N .
In addition, it is assumed that in the first subslot of each time slot, the UAV broadcasts wireless energy signals in downlink with the constant transmit power. Thus, the harvested energy of the source k in time slot n can be expressed as    
E k [ n ] = τ 0 [ n ] δ t ζ k h k r [ n ] P E = τ 0 [ n ] δ t ζ k β 0 P E | | q [ n ] w k | | 2 + H 2 , k K , n N .
In Equation (9), the parameter ζ k denotes the energy harvesting efficiency for the source k. In this paper, we let ζ k = ζ , k K , namely all the sources have the same energy harvesting efficiency. For simplicity, we consider that the source k transmit wireless information to the relay with a transmit power p k r [ n ] , and the relay forwards the received information to the destination with the power of p r d [ n ] . Assume that p k r [ n ] and p r d [ n ] satisfy the peak power and average power budget constraints, i.e.,
0 p k r [ n ] P k r m a x ,
1 N n = 1 N p r d [ n ] P ¯ r d ,
0 p r d [ n ] P r d m a x ,
where P ¯ r d is the average power budget constraints for the relay. P k r m a x and P r d m a x are the peak power that can be achieved by the sources and relay in each time slot, respectively. For the purpose of ensuring the non-trivial effects of the constraint (11), we let P r d m a x P ¯ r d .
Then, the maximum transmit rate (bps/Hz) from the source k to the relay in time slot n can be written by
R k r [ n ] = log 2 1 + h k r [ n ] p k r [ n ] σ 2 = log 2 1 + γ 0 p k r [ n ] | | q [ n ] w k | | 2 + H 2 , k K , n N ,
where γ 0 = β 0 / σ 2 denotes the reference received signal-to-noise ratio (SNR) at d 0 = 1 m. Similarly, the achievable transmit rate of the relay or the achievable reception rate of the destination in slot n is written by
R r d [ n ] = log 2 1 + h r d [ n ] p r d [ n ] σ 2 = log 2 1 + γ 0 p r d [ n ] | | q [ n ] w d | | 2 + H 2 , n N ,
It is worth noting that, due to the processing delay of the energy circuits of the sources, the harvested energy in time slot n can only be available in future time slot m > n , with  m N . Therefore, for each source, we obtain the energy neutrality constraint as follows,
j = 2 n τ k [ j ] δ t p k r [ n ] j = 1 n 1 E k [ j ] , k K , n N ˘ ,
where N ˘ { 2 , 3 , . . . , N } . Furthermore, the inequality in Equation (15) indicates the 1st time slot just for WPT, i.e.,  τ 0 [ 1 ] = 1 , and the N-th time slot do not operate WPT, i.e.,  τ 0 [ N ] = 0 .
Next, the information causality is considered because the processing delay incurred by DF relaying is nonegligible. For simplicity, we adopt one time slot to represent the processing delay of the UAV. As a result, the information causality constraint is given by
j = 3 n τ K + 1 [ j ] R r d [ j ] k = 1 K j = 2 n 1 τ k [ j ] R k r [ j ] , n N ^ ,
where N ^ { 3 , 4 , . . . , N } . Here, we give a brief explanation for Equation (16). First, from the above statement, we know the first and second time slots are allocated for WPT and information uploading, respectively. Namely, the information transmit for the relay starts from the third slot. In addition, due to the assumption of processing delay for the relay, resulting in that the last time slot, i.e., the Nth slot, cannot be used to operate WIT for sources, otherwise it would cause time resource waste. The information causality indicates that the WIT starts from the second time slot and the Nth slot can only be used for information forwarding to the destination, i.e., τ K + 1 [ N ] = 1 . It can be easily proved that, at the optimal solution, the inequality in Equation (16) would hold with equality. Otherwise, we can always increase the value of τ K + 1 [ j ] R r d [ j ] by enlarging the value of τ K + 1 [ j ] , which does not violate our design.
In delay-tolerant case, we use a factor θ k [ 0 , 1 ] to stand for the required throughput of the source k over the average achievable throughput of all sources in period time T, i.e.,
n = 2 N τ k [ n ] R k r [ n ] θ k 1 K k = 1 K n = 2 N τ k [ n ] R k r [ n ] , k K .
While in the delay-sensitive case, each source is requested to upload a certain amount of data to the UAV in each time slot, and simultaneously the destination also requires receiving a certain amount of data forwarded by the UAV. To this end, we introduce two factors of λ k [ 0 , 1 ] and υ [ 0 , 1 ] to indicate the ratio of required throughput of the source k and destination in per time slot over the average achieved throughput of sources and destination, respectively, which are shown in Equations (18) and (19),
τ k [ n ] R k r [ n ] λ k K N k = 1 K n = 2 N τ k [ n ] R k r [ n ] , k K , n N ˘ .
τ K + 1 [ n ] R r d [ n ] υ N n = 3 N τ K + 1 [ n ] R r d [ n ] , n N ^ .
In the system, we intend to maximize the achievable throughput of the destination by taking account of the optimizations of scheduling, power allocation and UAV trajectory. Thus, for the delay-tolerant case, the problem is given by
( P 1 ) max τ k [ n ] , p k r [ n ] , p r d [ n ] , q [ n ] 1 N n = 3 N τ K + 1 [ n ] R r d [ n ] s . t . ( 1 ) , ( 2 ) , ( 7 ) , ( 8 ) , ( 10 ) ( 12 ) , ( 15 ) ( 17 ) .
As for the delay-sensitive case, the corresponding problem can be given by
( P 2 ) max τ k [ n ] , p k r [ n ] , p r d [ n ] , q [ n ] 1 N n = 3 N τ K + 1 [ n ] R r d [ n ] s . t . ( 1 ) , ( 2 ) , ( 7 ) , ( 8 ) , ( 10 ) ( 12 ) , ( 15 ) , ( 16 ) , ( 18 ) , ( 19 ) .
Note that Problem (P1) is the same as Problem (P2) except for the constraints (17)–(19), while actually the expressions in Equations (17) and (18) are similar, and the constraint (19) is also related to the objective function of Problem (P1), which inspires us to find a solution to Problem (P1) that can be equivalently applied to solve Problem (P2). However, Problem (P1) is a non-convex problem due to the non-convex objective function and the non-convexity in Equations (15)–(17). To obtain the solution of this problem, an effective iteration algorithm is designed, with which a suboptimal solution is achieved in the Section 3.

3. Proposed Design

To solve Problem (P1), the original problem can be considered as one consisting of three subproblems. The first subproblem is to optimize time slot scheduling { τ k [ n ] } , the second subproblem is to optimize power allocation p k r [ n ] , p r d [ n ] , and UAV trajectory { q [ n ] } optimization is the last subproblem. Given the other variables, each subproblem can be well tackled. Based on this decomposition, we propose an effective iterative algorithm by alternately optimizing these three subproblems until they converge to a locally optimal value.

3.1. Time Slot Scheduling Optimization

In this subsection, the time slot scheduling { τ k [ n ] } is optimized by given power allocation { p k r ( i ) [ n ] , p r d ( i ) [ n ] } and UAV trajectory { q ( i ) [ n ] } , with i denoting i-th iteration. Thus, the subproblem can be formulated as
( P 1.1 ) max τ k [ n ] n = 3 N τ K + 1 [ n ] R r d [ n ] s . t . ( 7 ) , ( 8 ) , ( 15 ) ( 17 ) .
Note that we neglect the constant 1 N in objective function of Problem (P1.1) and other deduced problems hereinafter. Problem (P1.1) is a convex problem, as Equations (7), (8), and (15)–(17) are affine with respect to { τ k [ n ] } , and the objective function is linear. Thus, it can be easily solved by using linear programming (LP) methods or convex optimization tools such as CVX [24]. For convenience of notation, let { τ k ( i + 1 ) [ n ] } denote the optimized solution for Problem (P1.1).

3.2. Power Allocation Optimization

For given { q ( i ) [ n ] } and { τ k ( i + 1 ) [ n ] } , the optimization problem of power allocation is formulated as
( P 1.2 ) max p k r [ n ] , p r d [ n ] n = 3 N τ K + 1 ( i + 1 ) [ n ] R r d [ n ] s . t . ( 10 ) ( 12 ) , ( 15 ) ( 17 ) .
Obviously, the non-convexity in the constraints in constraints (16) and (17) makes Problem (P1.2) non-convex. For further processing, introducing nonnegative slack variables { g ^ k [ n ] } and { g ˇ [ n ] } that meet the following constraints, respectively,
g ^ [ n ] R r d [ n ] , n N ,
g ˜ k [ n ] R k r [ n ] , k K , n N .
The obtained constraints in constraints (20) and (21) are convex. As a result, Problem (P1.2) can be converted into a new form as below
( P 1.2 . 1 ) max p k r [ n ] , p r d [ n ] , g ^ [ n ] , g ˇ k [ n ] n = 3 N τ K + 1 ( i + 1 ) [ n ] g ^ [ n ] s . t . ( 10 ) ( 12 ) , ( 15 ) ,
j = 3 n τ K + 1 ( i + 1 ) [ j ] g ^ [ j ] k = 1 K j = 2 n 1 τ k ( i + 1 ) [ j ] g ˇ k [ j ] , n N ^ ,
n = 2 N τ k ( i + 1 ) [ n ] g ˇ k [ n ] θ k 1 K k = 1 K n = 2 N τ k ( i + 1 ) [ n ] g ˇ k [ n ] , k K .
g ^ [ n ] log 2 1 + α n p r d [ n ] , n N ,
g ˇ k [ n ] log 2 1 + β n p k r [ n ] , k K , n N ,
g ^ [ n ] 0 , n N ,
g ˇ k [ n ] 0 , k K , n N ,
where α n = γ 0 | | q [ n ] w d | | 2 + H 2 and β n = γ 0 | | q [ n ] w k | | 2 + H 2 . It can be easily proved that the inequalities in constraints (24) and (25) must be satisfied with equalities when the optimal solution is achieved for Problem (P1.2.1). Otherwise, the value of the objective function is always nondecreasing by increasing the value of { g ^ k [ n ] } and { g ˇ [ n ] } . Hence, (P1.2.1) and (P1.2) are equivalent, which means that these two problems share the same optimal solution.
By analyzing the above, by solving the approximately convex Problem (P1.2.1) of Problem (P1.2) using CVX, the optimal power allocation, denoted by { p k r ( i + 1 ) [ n ] , p r d ( i + 1 ) [ n ] } , can be achieved.

3.3. UAV Trajectory Optimization

In this section, we optimize the UAV trajectory { q [ n ] } with given τ k ( i + 1 ) [ n ] and { p k r ( i + 1 ) [ n ] , p r d ( i + 1 ) [ n ] } . Based on Problem (P1), this subproblem can be formulated as
( P 1.3 ) max q [ n ] n = 3 N τ K + 1 ( i + 1 ) [ n ] R r d [ n ] s . t . ( 1 ) , ( 2 ) , ( 15 ) ( 17 ) .
Obviously, Problem (P1.3) is non-convex caused by the constraints in constraints in Equations (15)–(17) as well as the objective function. We first consider introducing slack variables { u k [ n ] } and { u d [ n ] } that satisfy u k [ n ] | | q [ n ] w k | | 2 + H 2 and u d [ n ] | | q [ n ] w d | | 2 + H 2 , respectively. In addition, we define z E k , j ( i + 1 ) τ 0 ( i + 1 ) [ j ] ζ k β 0 P E . Thus, Problem (P1.3) is given by
( P 1.3 . 1 ) max q [ n ] , u k [ n ] , u d [ n ] n = 3 N τ K + 1 ( i + 1 ) [ n ] log 2 ( 1 + γ 0 p r d ( i + 1 ) [ n ] u d [ n ] ) s . t . ( 1 ) , ( 2 ) ,
j = 2 n τ k ( i + 1 ) [ j ] p k r ( i + 1 ) [ j ] j = 1 n 1 z E k , j ( i + 1 ) u k [ j ] , k K , n N ˘ ,
j = 3 n τ K + 1 ( i + 1 ) [ j ] log 2 ( 1 + γ 0 p r d ( i + 1 ) [ j ] u d [ j ] ) k = 1 K j = 2 n 1 τ k ( i + 1 ) [ j ] log 2 ( 1 + γ 0 p k r ( i + 1 ) [ j ] u k [ j ] ) , n N ^ ,
n = 2 N τ k ( i + 1 ) [ n ] log 2 ( 1 + γ 0 p k r ( i + 1 ) [ n ] u k [ n ] ) θ k 1 K k = 1 K n = 2 N τ k ( i + 1 ) [ n ] log 2 ( 1 + γ 0 p k r ( i + 1 ) [ n ] u k [ n ] ) , k K ,
u k [ n ] | | q [ n ] w k | | 2 + H 2 , n N ˘ ,
u d [ n ] | | q [ n ] w d | | 2 + H 2 , n N ^ .
It can be verified that the equality must hold in both Equations (31) and (32) at the optimal solution to Problem (P1.3.1), otherwise we can also increase the objective value by decreasing the value of { u d [ n ] } , or enlarge the upper bound of the objective value by decreasing the value of { u k [ n ] } , as shown in Equation (29). Therefore, Problem (P1.3.1) is equivalent to Problem (P1.3). Nevertheless, we still need to tackle the non-convex constraints in Equations (28)–(30) and the objective function to make Problem (P1.3.1) tractable. To deal with the non-convexity of the objective function in Problem (P1.3.1), we introduce the slack variables { s [ n ] } that satisfy the conditions as follows,
0 s [ n ] log 2 ( 1 + γ 0 p r d ( i + 1 ) [ n ] u d [ n ] ) ,
Then we employ SCA technique to deal with the the constraint in (33). For given feasible u d ( i ) [ n ] , the lower bound function of log 2 1 + γ 0 p r d ( i + 1 ) [ n ] u d [ n ] via its first-order first-order Taylor expansion with respect to u d [ n ] can be obtained as,
log 2 1 + γ 0 p r d ( i + 1 ) [ n ] u d [ n ] log 2 1 + γ 0 p r d ( i + 1 ) [ n ] u d ( i ) [ n ] 1 ln 2 γ 0 p r d ( i + 1 ) [ n ] u d [ n ] u d ( i ) [ n ] u d ( i ) [ n ] u d ( i ) [ n ] + γ 0 p r d ( i + 1 ) [ n ] φ r d L B [ n ] .
The obtained function φ r d L B [ n ] is convex with regard to u d [ n ] . Similarly, the lower bound function of log 2 1 + γ 0 p k r ( i + 1 ) [ n ] u k [ j ] in Equations (29) and (30) can be expressed as
log 2 1 + γ 0 p k r ( i + 1 ) [ n ] u k [ j ] log 2 1 + γ 0 p k r ( i + 1 ) [ n ] u k ( i ) [ j ] 1 ln 2 γ 0 p k r ( i + 1 ) [ n ] u k [ j ] u k ( i ) [ j ] u k ( i ) [ j ] u k ( i ) [ j ] + γ 0 p k r ( i + 1 ) [ j ] φ k r L B [ j ] .
where { u k ( i ) [ j ] } denotes given feasible points at the i-th iteration.
Next, note that the non-convexity of the constraint in Equation (28) is determined by the term of z E k , j ( i + 1 ) u k [ j ] , but we know that it is convex with respect to u k [ j ] . With given { u k ( i ) [ j ] } , we can also have
z E k , j ( i + 1 ) u k [ j ] z E k , j ( i + 1 ) u k ( i ) [ j ] z E k , j ( i + 1 ) ( u k ( i ) [ j ] ) 2 ( u k [ j ] u k ( i ) [ j ] ) φ E k L B [ j ] .
With Equations (33)–(36), the problem (P1.3.1) can be converted into a new form as
( P 1.3 . 2 ) max q [ n ] , u k [ n ] , u d [ n ] , s [ n ] n = 3 N τ K + 1 ( i + 1 ) [ n ] s [ n ] s . t . ( 1 ) , ( 2 ) , ( 31 ) , ( 32 ) ,
0 s [ n ] , n N ^ ,
s [ n ] φ r d L B [ n ] , n N ^ ,
j = 2 n τ k ( i + 1 ) [ j ] p k r ( i + 1 ) [ n ] j = 1 n 1 φ E k L B [ j ] , k K , n N ˘ ,
j = 3 n τ K + 1 ( i + 1 ) [ j ] s [ j ] k = 1 K j = 2 n 1 τ k ( i + 1 ) [ j ] φ k r L B [ j ] , n N ^ ,
n = 2 N τ k ( i + 1 ) [ n ] φ k r L B [ n ] θ k 1 K k = 1 K n = 2 N τ k ( i + 1 ) [ n ] φ k r L B [ n ] , k K ,
It can be verified that, for the optimal solution to Problem (P1.3.2), the inequality s [ n ] φ r d L B [ n ] in Equation (38) must be satisfied with equality, otherwise we can increasing the value of objective function by increasing the value of s [ n ] . Similarly, it also can be easily verified that the inequalities in Equations (34)–(36) hold with equalities for the optimal solution. Thus, Problem (P1.3.2) is equivalent to Problem (P1.3.1), hence also Problem (P1.3). For convex Problem (P1.3.2), it can be effectively solved by CVX. Let { q ( i + 1 ) [ n ] } denote the optimized solution of Problem (P1.3.2). In the next iteration, the obtained { q ( i + 1 ) [ n ] } would be new given points to optimize Problem (P1.1).
Note that, as for the delay-sensitive case, i.e., Problem (P2), it can be solved similarly by substituting Equation (17) with Equations (18) and (19), and the non-convexity in Equations (18) and (19) are tractable using the obtained lower-bounded expressions above. In other words, the solution to Problem (P1) can also be readily applied to solve Problem (P2). Hence, we can solve the both delay-tolerant case and delay-sensitive case by a same set of procedures, which is summarized into an efficient algorithm presented in the next subsection.

3.4. Proposed Algorithm

Based on the analysis above, an effective iterative algorithm can be proposed via alternatively optimizing these three subproblems. Via this algorithm, at least a locally optimal solution to the original Problem (P1) or Problem (P2) can be obtained.

3.5. Convergence and Complexity Analysis of Proposed Algorithm

To explain the convergence of the proposed design, we use G ( τ , P , Q ) , G τ ( τ , P , Q ) , G P ( τ , P , Q ) and G Q ( τ , P , Q ) as objective values of Problems (P1), (P1.1), (P1.2.1) and (P1.3.2), respectively, where τ { τ k [ n ] } , P { p k r [ n ] , p r d } , Q { q [ n ] } . For any one iteration i > 0 , we can get the following expressions,
G ( τ ( i ) , P ( i ) , Q ( i ) ) G τ ( τ ( i + 1 ) , P ( i ) , Q ( i ) )
= G ( τ ( i + 1 ) , P ( i ) , Q ( i ) ) ,
since τ ( i + 1 ) is the globally optimal solution to Problem (P1) by solving Problem (P1.1) with given P ( i ) and Q ( i ) . Considering Problem (P1.2) always offers a lower-bounded solution to Problem (P1), we can obtain
G ( τ ( i + 1 ) , P ( i ) , Q ( i ) ) = G P ( τ ( i + 1 ) , P ( i ) , Q ( i ) )
G P ( τ ( i + 1 ) , P ( i + 1 ) , Q ( i ) )
G ( τ ( i + 1 ) , P ( i + 1 ) , Q ( i ) ) ,
the equality Equation (44) holds because Equations (20) and (21) are tight bounds for Problem (P1). Similarly, it can be easily obtained
G ( τ ( i + 1 ) , P ( i + 1 ) , Q ( i ) ) = G Q ( τ ( i + 1 ) , P ( i + 1 ) , Q ( i ) )
G Q ( τ ( i + 1 ) , P ( i + 1 ) , Q ( i + 1 ) )
G ( τ ( i + 1 ) , P ( i + 1 ) , Q ( i + 1 ) )
Based on Equations (42)–(49), we have
G ( τ ( i ) , P ( i ) , Q ( i ) ) G ( τ ( i + 1 ) , P ( i + 1 ) , Q ( i + 1 ) )
As a result, the proposed algorithm is verified to be non-decreasing in iterations. In addition, the objective value of Problem (P1) is upper-bounded, which means that the algorithm is guaranteed to converge.
In the proposed Algorithm 1, the original Problem (P1) is decomposed into three subproblems that can be efficiently solved by typical method, as applied in [18,20,23] with low complexity. Then, these subproblems are optimized in an alternate manner. Furthermore, the optimization tool CVX is high-efficiency for solve the such convex problems [24], which makes the complexity of Algorithm 1 affordable.
Algorithm 1 An iterative algorithm for solving Problems (P1) and (P2)
1:
Initialize power allocation { p k r ( i ) [ n ] , p r d ( i ) [ n ] } and UAV trajectory { q ( i ) [ n ] } , slack variables { u k ( i ) [ n ] } , { u d ( i ) [ n ] } . Set iteration i = 0 , the precision ε > 0 .
2:
repeat
3:
    Solve subproblem (P1.1) with { p k r ( i ) [ n ] , p r d ( i ) [ n ] } and { q ( i ) [ n ] } , obtain the optimized result denoted by { τ k ( i + 1 ) [ n ] } .
4:
    Solve subproblem (P1.2.1) with { τ k ( i + 1 ) [ n ] } and { q ( i ) [ n ] } , obtain the optimized result denoted by { p k r ( i + 1 ) [ n ] , p r d ( i + 1 ) [ n ] } .
5:
    Solve subproblem (P1.3.2) with { q ( i ) [ n ] } , { τ k ( i + 1 ) [ n ] } and { p k r ( i + 1 ) [ n ] , p r d ( i + 1 ) [ n ] } as well as { u k ( i ) [ n ] , u d ( i ) [ n ] } , obtain the optimized result denoted by { q ( i + 1 ) [ n ] , u k ( i + 1 ) [ n ] , u d ( i + 1 ) [ n ] } .
6:
    Update i = i + 1 .
7:
until
8:
    The algorithm converges to ε .

4. Numerical Results

In this section, we present the numerical results to evaluate and validate Algorithm 1, as compared to the benchmark. We considered three source nodes in the area of interest, i.e., K = 3 . The UAV’s altitude was fixed at H = 10 m. The transmit power of the UAV for WPT was set as P E = 10 w, and the sources’ peak power was set as P k r m a x = 20 dBm. The UAV’s average power budget and peak power were set as P ¯ r d = 25 dBm and P r d m a x = 20 dBm, respectively. In addition, we set the energy harvesting efficiency as ζ = 0.55 , and the length of time slot as δ t = 1 s. The communication bandwidth is B = 1 MHz. Furthermore, we set σ 2 = 90 dBm and β 0 = 30 dB. The maximum speed of the UAV was set as V max = 3 m/s. For convenience of expression, we use vectors θ R 1 × K and λ R 1 × K to present the factor values of multiple sources for delay-tolerant case and delay-sensitive case, respectively, with θ k θ denoting the required throughput of the source k over the average system throughput throughout the whole period time, and λ k λ denoting the required throughput of the source k over the average system throughput in each time slot. For illustrating the location changes of the UAV, the trajectory is marked by “◯”s every 2 s. Meanwhile, the initial/final location of the UAV is marked by “□”s, as shown in Figure 3 and Figure 4.
In Figure 3, we illustrate the UAV trajectory of delay-tolerant case under different factor θ for a given period T = 60 s. The UAV trajectory is varying with the different values of θ . It can be readily comprehended that the UAV must satisfy each source requirement for information throughput in terms of θ , as shown in Equation (17). In other words, the UAV has to change its trajectory as the cost for the purpose of achieving the required fairness.
In Figure 4, the UAV trajectory of delay-sensitive case under different factor λ and υ for a given period T = 60 s. Due to the delay-sensitive design for the required throughput in each time slot, the trajectories under this case are more restricted compared to those under delay-tolerant case. Specifically, in Figure 4b, the UAV hovers in place or creeps at a small scale because all sources desire to be served to the greatest extent, thus the UAV has to sacrifice the mobility to meet the requirements of the sources.
Figure 5 shows the system scheduling along the trajectory over the period T = 60 s under different cases. Specifically, we use “▵”, “◯”, and “∇” to signify energy harvesting (denoted by EH), information transmit from sources to UAV (denoted by S2U) and data forwarding from UAV to destination (denoted by U2D), respectively. Figure 5a shows that the executions of S2U and U2D are separated in many time slots. This is reasonable for delay-tolerant case, as the system scheduling is not severely limited in each time slot to satisfy the average throughput requirement over T. This gives more degree of freedom to the UAV as well as the sources for the utility of each time slot. For the delay-sensitive case, i.e., in Figure 5b, the scheduling is overlapped in most time slots because of the causality constraints in Equations (15) and (16), which means that each source and the UAV must be scheduled for communication in each time slot, except for the first, second and last time slots, in order to satisfy the delay-sensitive factor requirement of λ = ( 1 , 1 , 1 ) , υ = 1 .
Figure 6 shows the specified time proportion of scheduling in each time slot for delay-tolerant case with θ = ( 1 , 1 , 1 ) and delay-sensitive case with λ = ( 1 , 1 , 1 ) , υ = 1 under period T = 60 s. The scheduling in each slot is sorted into three operations, i.e., EH, S2U and U2D, as illustrated in Figure 5. As shown in the picture, EH is first operated as some sources have no residual power at the beginning. For the delay-tolerant case (i.e, Figure 6a), both the information uploading and information forwarding executions depend on the channel quality in each time slot. In other words, the UAV tends to communicate with the nearest node for enjoying larger information transmit rate. For the delay-sensitive case (i.e, Figure 6b), due to the severe delay constraint in each time slot, the UAV must meet certain information transmit requirements from sources to destination in each time slot. Therefore, the executions of EH, S2U and U2D are always scheduled.
Figure 7 and Figure 8 show the UAV trajectory under different period time T for delay-tolerant case and delay-sensitive case, respectively. In Figure 7 (i.e, the delay-tolerant case), it is observed that, with the increase of the value of T, the UAV tries to fly closer to sources to access better channels, which results in much wireless energy transfer as well as information reception. Meanwhile, the UAV tends to fly in close proximity to the destination for larger forwarding rate. For a lower value of T, the UAV is limited in terms of coverage because of the maximum mobility restriction in Equation (2). With the increasing of the value of T, the UAV obtains much more freedom to exploit its mobility, and even hovers over each ground user. In the delay-sensitive case (i.e., Figure 8), the UAV’s trajectories are more intensive, which indicates that the degree of freedom achieved by the UAV for trajectory design is limited to meet the delay requirement in each time slot.
Figure 9 shows the convergence performance of Algorithm 1 applied in delay-tolerant case and delay-sensitive case. It can be observed that the proposed algorithm is always non-decreasing and can quickly converge to an optimized point for different factors, which indicates that the proposed design in this paper that uses SCA technique to solve the formulated non-convex problem is effective.
To show the effectiveness of Algorithm 1, Figure 10 shows the information rate received by the destination versus the fixed energy harvesting duration in each time slot, i.e., τ 0 [ n ] , for given period T = 60 s. For the convenience of comparison, we plot the achievable rate of proposed design in which the value of τ 0 [ n ] is optimized. It can be observed that the case of fixed τ 0 [ n ] is worse than the proposed design, and the delay-tolerant case always outperforms the delay-sensitive case. Specifically, for the delay-tolerant case of θ = ( 0 , 0 , 0 ) , the achievable rate decreases as the value of τ 0 [ n ] increases, while, for the delay-sensitive case, the achievable rate first increases and then decreases. This phenomenon can be well comprehended by combining Figure 6 and Figure 10; the operation of WPT in each time slot is not the best choice for delay-tolerant case but is for the delay-sensitive case. In general, with the increasing value of τ 0 [ n ] , less time can be utilized for information transmit in each time slot, thus resulting in the rate decrease for large values of τ 0 [ n ] .
In Figure 11, we plot the throughput of each source under different factor θ of delay-tolerant case. In this picture, it can be intuitively observed that the different factors bring significant influence to the sources’ throughput, e.g., by comparing the case of θ = ( 1.4 , 0.2 , 1.4 ) with the case of θ = ( 1.4 , 1.4 , 0.2 ) . It illustrates that the sources achieve the largest throughput under the delay-tolerant case with θ = ( 0 , 0 , 0 ) , because, in this case, the UAV can fully exploit the mobility. Besides, under the fairest case, i.e., θ = ( 1 , 1 , 1 ) , equal throughput performance can be achieved by each source, but the sum amount of throughput is much lower than the case of θ = ( 0 , 0 , 0 ) , which means that the UAV satisfies the fairness requirement at the cost of sacrificing mobility.
In Figure 12, we illustrate the information causality for period T = 60 s under θ = ( 1 , 1 , 1 ) of delay-tolerant case and λ = ( 1 , 1 , 1 ) , υ = 1 of delay-sensitive case. We compare the proposed design with the static UAV case where the UAV is fixed at an optimal location during the period T. It can be observed that the proposed design outperforms the static UAV case, as the static UAV case cannot enhance the relay’s throughput by trajectory design due to the static position, while the proposed design can enjoy the performance gains brought by UAV’s mobility. However, these two cases have some common characteristics in terms of curve tendency. Specifically, it can be observed that, at the beginning, no information transmit in the system, as the sources have to harvest energy first because they are initially assumed to be with no residual energy. When sources have enough energy to support WIT, they transmit information to the UAV in uplink until the harvested energy cannot support WIT. For the delay-tolerant case, the UAV would chose the suitable ground nodes including sources and destination to communicate as per the channel conditions, even though the factor of θ = ( 1 , 1 , 1 ) poses a fairness requirement over whole period. Different from this, the delay-sensitive case needs to severely satisfy the factor of λ = ( 1 , 1 , 1 ) , υ = 1 requirement in each time slot, which, as a result, causes the throughputs of S2U and U2D to be generally increasing. In addition, we can also find that the total received information from sources equals the forwarded information to destination, which is in accordance with our expectation that the equality holds in Equation (16).
In Figure 13, we plot the throughput (i.e., the information bits that the UAV/relay assists to deliver from sources to destination) for both delay-tolerant case and delay-sensitive case versus different period T. To illustrate our proposed design, we set the static design as a benchmark. Note that the benchmark can also be solved by our proposed Algorithm 1. Firstly, it can be observed that the delay-tolerant case outperforms the delay-sensitive case in terms of the throughput over the period T. This is readily comprehended as the UAV’s mobility and the scheduling are more restricted in delay-sensitive case. Next, it can be also observed that the proposed design greatly outperforms the benchmark for each case, and the case of θ = ( 0 , 0 , 0 ) is superior to the case of θ = ( 1 , 1 , 1 ) , while the fairness cannot be guaranteed (e.g., see Figure 11). As a result, Figure 13 validates our proposed design as well as indicates that performance gains can be achieved by our design.

5. Conclusions

In this paper, we investigate UAV-enabled relaying that assists information delivery in WPCN, in which the UAV also acts as a hybrid AP to provide WPT for sources that then perform WIT to the UAV by using harvested energy. Specifically, we design the delay-tolerant case and delay-sensitive case for satisfying different communication delay demands. Our goal is to maximize the system throughput, subject to information causality and so-called neutrality constraints. By applying SCA technique, the formulated non-convex problem is effectively solved by jointly optimizing three subproblems, based on which an iterative algorithm is proposed. Finally, numerical results have shown the validation of our proposed design as well as substantial performance gains over the benchmark.

Author Contributions

Conceptualization, Y.L., D.Y., Y.X. and H.C.; methodology, Y.L., D.Y. and Y.X.; validation, Y.L., D.Y, Y.X., L.X. and H.C.; formal analysis, Y.L., H.C.; writing, original draft preparation, Y.L.and Y.X.; writing, review and editing, Y.L. and Y.X.; all authors reviewed the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grant 61703197, Grant 61561032 and Grant 61461029, in part by the Graduate Student Innovation Special Funds of Nanchang University under Grant YC2018-S073.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zeng, Y.; Zhang, R.; Lim, T.J. Wireless communications with unmanned aerial vehicles: Opportunities and challenges. IEEE Commun. Mag. 2016, 54, 36–42. [Google Scholar] [CrossRef]
  2. Ju, H.; Zhang, R. Throughput maximization in wireless powered communication networks. IEEE Trans. Wirel. Commun. 2014, 13, 418–428. [Google Scholar] [CrossRef]
  3. Huang, Y.; Clerckx, B. Waveform design for wireless power transfer with limited feedback. IEEE Trans. Wirel. Commun. 2018, 17, 415–429. [Google Scholar] [CrossRef]
  4. Zeng, Y.; Clerckx, B.; Zhang, R. Communications and signals design for wireless power transmission. IEEE Trans. Wirel. Commun. 2017, 65, 2264–2290. [Google Scholar] [CrossRef]
  5. Zhou, X.; Ho, C.K.; Zhangt, R. Wireless power meets energy harvesting: A joint energy allocation approach. In Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Atlanta, GA, USA, 3–5 December 2014; pp. 198–202. [Google Scholar]
  6. Xu, J.; Zeng, Y.; Zhang, R. UAV-enabled wireless power transfer: Trajectory design and energy optimization. IEEE Trans. Wirel. Commun. 2018, 17, 5092–5106. [Google Scholar] [CrossRef]
  7. Xu, J.; Zeng, Y.; Zhang, R. UAV-enabled wireless power transfer: Trajectory design and energy region characterization. In Proceedings of the IEEE Globecom Workshop, Singapore, 4–8 December 2017; pp. 1–7. [Google Scholar]
  8. Xie, L.; Xu, J.; Zhang, R. Throughput Maximization for UAV-Enabled Wireless Powered Communication Networks. IEEE Int. Things J. 2019, 6, 1690–1703. [Google Scholar] [CrossRef]
  9. Chen, M.; Mozaffari, M.; Saad, W.; Yin, C.; Debbah, M.; Hong, C.S. Caching in the sky: Proactive deployment of cache-enabled unmanned aerial vehicles for optimized quality-of-experience. IEEE J. Sel. Areas Commun. 2017, 35, 1046–1061. [Google Scholar] [CrossRef]
  10. Zhang, S.; Zhang, H.; He, Q.; Bian, K.; Song, L. Joint Trajectory and Power Optimization for UAV Relay Networks. IEEE Wirel. Commun. Lett. 2018, 22, 161–164. [Google Scholar] [CrossRef]
  11. Zhang, J.; Zeng, Y.; Zhang, R. Spectrum and energy efficiency maximization in uav-enabled mobile relaying. In Proceedings of the IEEE International Conference on Communications Workshops (ICC), Paris, France, 21–25 May 2017; pp. 1–6. [Google Scholar]
  12. Zeng, Y.; Zhang, R.; Lim, T.J. Throughput maximization for uav-enabled mobile relaying systems. IEEE Trans. Commun. 2016, 64, 4983–4996. [Google Scholar] [CrossRef]
  13. Wang, Q.; Chen, Z.; Mei, W.; Fang, J. Improving Physical Layer Security Using UAV-Enabled Mobile Relaying. IEEE Wirel. Commun. Lett. 2017, 6, 310–313. [Google Scholar] [CrossRef]
  14. Chen, Y.; Feng, W.; Zheng, G. Optimum placement of UAV as relays. IEEE Commun. Lett. 2018, 22, 248–251. [Google Scholar] [CrossRef]
  15. Fan, R.; Cui, J.; Jin, S.; Yang, K.; An, J. Optimal node placement and resource allocation for UAV relaying network. IEEE Commun. Lett. 2018, 22, 808–811. [Google Scholar] [CrossRef]
  16. Pan, C.; Ren, H.; Deng, Y.; Elkashlan, M.; Nallanathan, A. Joint Blocklength and Location Optimization for URLLC-Enabled UAV Relay Systems. IEEE Commun. Lett. 2019, 23, 498–501. [Google Scholar] [CrossRef] [Green Version]
  17. Hua, M.; Li, C.; Huang, Y.; Yang, L. Throughput Maximization for UAV-Enabled Wireless Power Transfer in Relaying System. In Proceedings of the 9th International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 9–11 November 2017; pp. 2472–7628. [Google Scholar]
  18. Wu, Q.; Zeng, Y.; Zhang, R. Joint Trajectory and Communication Design for Multi-UAV Enabled Wireless Networks. IEEE Trans. Wirel. Commun. 2018, 17, 2109–2121. [Google Scholar] [CrossRef]
  19. Yang, D.; Wu, Q.; Zeng, Y.; Zhang, R. Energy Tradeoff in Ground-to-UAV Communication via Trajectory Design. IEEE Trans. Veh. Technol. 2018, 67, 6721–6726. [Google Scholar]
  20. Zeng, Y.; Zhang, R. Energy-efficient UAV communication with trajectory optimization. IEEE Trans. Wirel. Commun. 2017, 16, 3747–3760. [Google Scholar] [CrossRef]
  21. Wu, F.; Yang, D.; Xiao, L.; Cuthbert, L. Energy Consumption and Completion Time Tradeoff in Rotary-Wing UAV Enabled WPCN. IEEE Access 2019, 7, 79617–79635. [Google Scholar] [CrossRef]
  22. Xu, Y.; Xiao, L.; Yang, D.; Wu, Q.; Cuthbert, L. Throughput Maximization in Multi-UAV Enabled Communication Systems With Difference Consideration. IEEE Access 2018, 6, 55291–55301. [Google Scholar] [CrossRef]
  23. Xu, Y.; Xiao, L.; Yang, D.; Cuthbert, L.; Wang, Y. Energy-Efficient UAV Communication with Multiple GTs Based on Trajectory Optimization. Mob. Inf. Syst. 2018, 2018, 5629573. [Google Scholar] [CrossRef]
  24. Grant, M.; Boyd, S. CVX: MATLAB Software for Disciplined Convex Programming, Version 2.1. 2016. Available online: http://cvxr.com/cvx (accessed on 31 March 2016).
Figure 1. A UAV-enabled WPCN.
Figure 1. A UAV-enabled WPCN.
Sensors 19 02989 g001
Figure 2. Communication protocol for the WPCN.
Figure 2. Communication protocol for the WPCN.
Sensors 19 02989 g002
Figure 3. The trajectory of delay-tolerant case for period T = 60 s under different factor θ .
Figure 3. The trajectory of delay-tolerant case for period T = 60 s under different factor θ .
Sensors 19 02989 g003
Figure 4. The trajectory of delay-sensitive case for period T = 60 s under different factor λ , υ .
Figure 4. The trajectory of delay-sensitive case for period T = 60 s under different factor λ , υ .
Sensors 19 02989 g004
Figure 5. The illustration of scheduling in each slot for period T = 60 s.
Figure 5. The illustration of scheduling in each slot for period T = 60 s.
Sensors 19 02989 g005
Figure 6. Time proportion of the scheduling in each slot under period T = 60 s.
Figure 6. Time proportion of the scheduling in each slot under period T = 60 s.
Sensors 19 02989 g006
Figure 7. The trajectories of delay-tolerant case for different T under delay-tolerant case with θ = ( 0 , 0 , 0 ) .
Figure 7. The trajectories of delay-tolerant case for different T under delay-tolerant case with θ = ( 0 , 0 , 0 ) .
Sensors 19 02989 g007
Figure 8. The trajectories of delay-sensitive case for different T under delay-sensitive case with λ = ( 1 , 1 , 1 ) , υ = 1 .
Figure 8. The trajectories of delay-sensitive case for different T under delay-sensitive case with λ = ( 1 , 1 , 1 ) , υ = 1 .
Sensors 19 02989 g008
Figure 9. The convergence performance of the proposed algorithm for period T = 60 s.
Figure 9. The convergence performance of the proposed algorithm for period T = 60 s.
Sensors 19 02989 g009
Figure 10. The transmit rate under fixed energy harvesting duration τ 0 [ n ] for period T = 60 s.
Figure 10. The transmit rate under fixed energy harvesting duration τ 0 [ n ] for period T = 60 s.
Sensors 19 02989 g010
Figure 11. The Throughput of each source under different θ for T = 60 s.
Figure 11. The Throughput of each source under different θ for T = 60 s.
Sensors 19 02989 g011
Figure 12. The information causality illustration for period T = 60 s.
Figure 12. The information causality illustration for period T = 60 s.
Sensors 19 02989 g012
Figure 13. The throughput of the relaying system versus period T.
Figure 13. The throughput of the relaying system versus period T.
Sensors 19 02989 g013

Share and Cite

MDPI and ACS Style

Li, Y.; Yang, D.; Xu, Y.; Xiao, L.; Chen, H. Throughput Maximization for UAV-Enabled Relaying in Wireless Powered Communication Networks. Sensors 2019, 19, 2989. https://doi.org/10.3390/s19132989

AMA Style

Li Y, Yang D, Xu Y, Xiao L, Chen H. Throughput Maximization for UAV-Enabled Relaying in Wireless Powered Communication Networks. Sensors. 2019; 19(13):2989. https://doi.org/10.3390/s19132989

Chicago/Turabian Style

Li, Yinfeng, Dingcheng Yang, Yu Xu, Lin Xiao, and Haole Chen. 2019. "Throughput Maximization for UAV-Enabled Relaying in Wireless Powered Communication Networks" Sensors 19, no. 13: 2989. https://doi.org/10.3390/s19132989

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop