Next Article in Journal
Introducing the Second-Order Features Adjoint Sensitivity Analysis Methodology for Fredholm-Type Neural Integral Equations
Next Article in Special Issue
Coupled Optimization of UAV Cluster Path Optimization and Task Assignment on a Mobile Platform
Previous Article in Journal
Optimizing Dynamic Evacuation Using Mixed-Integer Linear Programming
Previous Article in Special Issue
Multi-Objective Optimized GPSR Intelligent Routing Protocol for UAV Clusters
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Optimization of UAV-Assisted Downlink Transmission Based on RSMA

1
School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan 430074, China
2
Wuhan Maritime Communication Research Institute, Wuhan 430079, China
3
School of Electronic Information, Wuhan University, Wuhan 430072, China
*
Authors to whom correspondence should be addressed.
Mathematics 2025, 13(1), 13; https://doi.org/10.3390/math13010013
Submission received: 16 November 2024 / Revised: 11 December 2024 / Accepted: 17 December 2024 / Published: 24 December 2024

Abstract

:
Unmanned Aerial Vehicles (UAVs) provide exceptional flexibility, making them ideal for mitigating communication disruptions in disaster-affected or high-demand areas. When functioning as communication base stations, UAVs can adopt either orthogonal or non-orthogonal multiple access schemes. However, traditional Orthogonal Multiple Access (OMA) techniques are constrained by limited user access capacity and system throughput, necessitating the study of non-orthogonal access mechanisms for UAV-assisted communication systems. While much of the research on non-orthogonal multiple access focuses on Non-Orthogonal Multiple Access (NOMA), Rate-Splitting Multiple Access (RSMA), a novel non-orthogonal technique, offers superior throughput performance compared to NOMA. This paper, therefore, investigates the optimization of UAV-assisted downlink communication systems based on RSMA. We first develop a mathematical model of the system and decompose the primary optimization problem into multiple subproblems according to parameter types. To solve these subproblems, we propose an optimization algorithm that combines the Augmented Lagrange Method (ALM) with the Artificial Fish Swarm Algorithm (AFSA). The optimization algorithm is further enhanced by incorporating dynamic step size and visual strategies, as well as memory behaviors to improve convergence speed and optimization accuracy. To address linear equality constraints, we introduce a correction factor to modify the behavior of the artificial fish. The final optimization is achieved through cross-iterative solutions. Simulation results show that the system throughput under the RSMA strategy can be improved by 13.30% compared with NOMA, validating the effectiveness and superiority of RSMA in UAV-assisted communication systems.

1. Introduction

Compared to ground-based equipment such as communication vehicles and fixed base stations, Unmanned Aerial Vehicles (UAVs) offer a superior environment for signal transmission, as they experience less interference from external factors. In complex disaster scenarios, deploying ground equipment can be challenging and it is often difficult to find suitable locations. UAVs, on the other hand, can be easily deployed and positioned according to real-time demands, providing service to a wider range of users and overcoming coverage challenges in such environments.
One of the key challenges in UAV-assisted emergency communication is ensuring high Quality of Service (QoS). Enhancing QoS in emergency communication networks can be addressed at various levels, including network architecture [1], protocols at the network layer [2], and data link layer [3] designs. Previous studies [4] have explored routing protocols at the network layer for UAV-assisted emergency communication systems, while this paper focuses on improving QoS through a physical-layer-assisted Medium Access Control (MAC) design.
MAC protocols can be broadly categorized into orthogonal and non-orthogonal types. Traditional orthogonal MAC protocols, such as Time Division Multiple Access (TDMA) [5], Frequency Division Multiple Access (FDMA) [6], and Code Division Multiple Access (CDMA) [7], have been widely used in earlier generations of mobile communication systems (1G to 4G). However, these protocols struggle to meet the demands of large-scale user access and ultra-low latency scenarios, making them less suitable for modern communication needs. To address these limitations, the fifth generation (5G) of mobile communication systems has adopted non-orthogonal MAC protocols, such as Rate-Splitting Multiple Access (RSMA) [8], Sparse Code Multiple Access (SCMA) [9], and Non-Orthogonal Multiple Access (NOMA) [10], to manage user access.
This paper focuses on UAV-assisted emergency communication networks where UAVs serve as communication base stations. Specifically, we study the rate optimization problem in RSMA-based UAV communication networks. RSMA, as a non-orthogonal MAC protocol, differs from Spatial Division Multiple Access (SDMA) [11], which treats interference as noise, and from NOMA, which decodes all interference. RSMA partially decodes interference and treats part of it as noise, allowing users in the same group to share time-frequency resources. A key design aspect of non-orthogonal MAC protocols is beamforming, which, when optimized, can significantly enhance network throughput. Poor beamforming design, however, can lead to resource wastage and fail to meet rate requirements. Therefore, optimizing RSMA system parameters is crucial for achieving higher data transmission rates.
Additionally, both emergency communication systems and regular communication systems exhibit asymmetry between uplink and downlink communications, with the QoS demands typically higher for downlink. Therefore, optimizing the downlink system in RSMA-based UAV-assisted networks is of particular importance.
In this study, we address the rate optimization problem in the downlink of RSMA-based UAV communication systems, with the objective of maximizing transmission rates. We decompose the problem into three subproblems: UAV parameter optimization, RSMA parameter optimization, and user group parameter optimization. To solve these subproblems, we propose an optimization algorithm that combines the Augmented Lagrange Method (ALM) with the Artificial Fish Swarm Algorithm (AFSA) [12]. A ternary cross-iterative algorithm is designed to solve the original problem and achieve optimal performance in the downlink system.

2. Related Work

Since the proposal of RSMA, numerous researchers have investigated its application in various communication systems, including Cloud Radio Access Networks (C-RAN) [13], multibeam satellite systems [14], overloaded cellular Internet of Things (IoT) [15], and UAV communication systems [16]. The core concept of RSMA is to split messages into common and private parts, which are then decoded using Successive Interference Cancellation (SIC) [17].
Sidiropoulos [18] designed a full-duplex cooperative multicast mechanism based on RS. The authors developed specific beamforming methods for cooperative rate splitting and multicast beams, proposing an optimization scheme. They introduced a low-complexity iterative algorithm based on Successive Convex Approximation (SCA) to solve the problem. This approach effectively mitigates inter-group interference, improves resource utilization, and reduces system energy consumption. In reference [19], RS was introduced in an uplink NOMA system and its application in high-throughput satellite systems was examined. By modeling the channel, the authors derived a closed-form expression for the average system throughput. Numerical simulations demonstrated that the proposed scheme outperforms NOMA and SDMA in terms of throughput.
Further, Z. Yang [20] explored rate optimization in uplink communication systems using RSMA, focusing on optimizing user transmission power and the decoding order at the base station to maximize system throughput. In reference [21], RSMA was applied to an uplink cognitive radio system comprising a primary and secondary user, where the authors proposed an RSMA-based protocol and a SIC-based protocol for message decoding. Meanwhile, O. Dizdar [22] investigated RSMA in downlink multi-antenna cognitive radio systems, focusing on joint communication and interference cancellation for multicarrier waveforms. By employing RSMA, the authors aimed to communicate with secondary users while simultaneously mitigating interference to primary users.
Recent literature on RS/RSMA can be broadly categorized into studies of its applications in uplink systems [19,20,21] and downlink systems [22]. It is evident that most research focuses on RS/RSMA in uplink communication systems. However, RS/RSMA also holds significant potential for downlink systems. Therefore, further investigation into its application and performance in downlink systems is essential.

3. Mathematic Modeling

The location deployment of the base station as well as the resource allocation between and within user groups affect the overall transmission rate of the system. Therefore, it is important to study how to jointly deploy UAVs for rate optimization of RSMA downlink multi-user group systems under the uncertainty of UAV as a base station location. This section focuses on modeling and analyzing the UAV-assisted downlink RSMA system.

3.1. The Downlink RSMA System’s Modeling

The downlink RSMA system model studied in this paper is shown in Figure 1. Different groups of users use different communication channels, and users within the same group communicate using the RSMA mechanism, where users need to parse the public messages sent by the base station as well as the private messages sent to themselves.
The rate optimization problem for downlink RSMA systems can be described as Equation (1), where n u d o w n i is the number of users in the group i ; v d o w n i , j is the downlink transmission rate of user j in group i ; p o s u = p o s u . x , p o s u . y , p o s u . z is the location of the UAV base station; x m i n , y m i n , z m i n , x m a x , y m a x and z m a x are UAV position restrictions; α i , j is the rate proportion allocated to user j in the public message of the user group i ; p c i is the public message downlink transmission power of the i -th group; B d o w n = B d o w n i , B d o w n 2 , . . . , B d o w n n c d o w n is the bandwidth allocation for each user group; B d a is the total bandwidth of the system; P d o w n _ a l o c is the power allocation for each user group and user member; P B S is the power limit of the base station; and v e d o w n i , j is the downlink rate requirement of the corresponding user.
arg max p o s u , B down , R , P down _ aloc i = 1 n c down j = 1 n u down i v down i , j s . t . x min p o s u . x x max , y min p o s u . y y max , z min p o s u . z z max i = 1 n c d o w n B down i = B d a , B down i 0 , 1 i n c down j = 1 n u d o w n i α i , j = 1 , 1 i n c down α i , j 0 , 1 i n c down , 1 j n u down i p c i + j = 1 n u down i p p i , j = P down i i = 1 n c down P down i P BS v down i , j v e down i , j , 1 i n c down , 1 j n u down i

3.2. Model Solving Optimization

Due to the significant complexity of solving a problem directly (1), this paper decomposes it into three sub-problems: UAV position parameter optimization, user group parameter optimization and RSMA parameter optimization, and designs a ternary cross iterative optimization algorithm to complete the original problem solving. By grouping the UAV position p o s u as the UAV parameter, the bandwidth allocation B d o w n as well as the inter-group power allocation in P d o w n _ a l o c act as the user group resource parameter. The intra-group power allocation in P d o w n _ a l o c is grouped into RSMA parameters, and the RSMA parameters of the downlink optimization system can still be solved independently for each user group.
  • UAV parameter’s optimization problem
Optimizing UAV parameters such as position, altitude, and power is crucial for enhancing communication performance, especially when UAVs are used as flying base stations in areas with limited infrastructure. This improves coverage, reduces interference, and ensures efficient energy use, making it vital for applications like disaster recovery and remote connectivity. The optimization problem regarding the UAV position parameter can be abstracted into the following form:
arg min p o s u V target subject   to   u a v l c v r c
where V t a r g e t is the opposite number of the sum of downlink transmission rate. u a v l c is the location constraint of the UAV. v r c is the user’s downlink transmission rate constraint. In this case, the user group parameters as well as the RSMA parameters are treated as constants. In Equation (2), the first constraint determines the deployable region of the UAV, i.e., the search space of the solution, and the second constraint is the rate constraint, which corresponds to the rate demand constraint of Equation (1), which are inequality constraints. The Augmented Lagrange Method (ALM) is used in this paper to transform an inequality constrained optimization problem into an unconstrained optimization problem for further solution. We transform the rate requirement constraints of Equation (1) into the forms of Equation (3), then the left-hand side of the inequality is denoted as g i , j X . The objective function of (2) is denoted as f X , where X = x , y , z is the coordinates of the UAV. According to reference [10], the augmented Lagrange function of (2) is calculated as (4), where n c is the number of user groups, n u i is the number of users in group i , λ i , j is the Lagrange multiplier, and ρ ρ > 0 is the penalty parameter. The Lagrange multiplier is updated by λ t i , j = min max 0 , λ t 1 i , j ρ g i , j X t 1 , λ m a x i , j , where λ t i , j represents the value of λ i , j when the number of iterations reaches t , λ m a x i , j represents the upper limit of λ i , j , and X t 1 represents the value of solution obtained when the number of iterations reaches t 1 . In this paper, we use dynamic penalty function; the penalty parameter ρ is updated by ρ t = ρ t m i n + ρ t m a x ρ t m i n t t 1 t m t m 1 , where t is the number of iterations, ρ t m i n , ρ t m a x is the range of values of ρ , and t m is the maximum number of iterations. As the number of iterations increases, the penalty parameter ρ also increases.
v down i , j v e down i , j 0 , 1 i n c down , 1 j n u down i
L ρ X , λ = f X + 1 2 ρ i = 1 n c j = 1 n u i max 0 , λ i , j ρ g i , j X 2 λ i , j 2
Eventually, the inequality constraint problem (2) is transformed into the unconstrained problem (4), which can be further solved using an unconstrained optimization algorithm. Considering the complexity of the problem and the shortcomings of traditional methods for solving this type of problems [11], this paper will use a heuristic algorithm to solve the problem and finally designs a dynamic memory fish swarm algorithm, which is described in Section 3.
  • User group parameters’ optimization problem
Group parameters optimization involves managing resources such as power and bandwidth among multiple users in multicast or broadcast scenarios. It ensures efficient resource utilization, prevents service degradation, and balances power allocation, providing reliable service for all users in dense networks.
Firstly, the problem is abstractly modeled by considering the optimization of the user group parameters of the downlink system, whose optimization parameters include the bandwidth allocation ratio (5) and the power allocation ratio (6) between the groups, and thus the problem can be described as solving for the optimal downlink bandwidth allocation ratio as well as the power allocation ratio P d o w n S P so that the downlink rate and the optimal and satisfy the user’s rate requirements.
arg min B down sp V target s . t . B down sp = b f down 1 , b f down 2 , , b f down n c down i = 1 n c down b f down i = 1 b f down i 0 , 1 i n c down
where b f d o w n i represents the uplink bandwidth allocated to user group i , p f d o w n i represents the proportion of power shared by the i -th user group.
arg min P down sp V target s . t . P down sp = p f down 1 , p f down 2 , , p f down n c down i = 1 n c down p f down i = 1 p f down i 0 , 1 i n c down
  • RSMA parameters’ optimization problem
RSMA optimizes the splitting of user messages, power allocation, and bandwidth distribution to manage interference and enhance network efficiency. It enables better handling of user heterogeneity, improves spectral efficiency, and plays a key role in next-generation networks like 5G and 6G, particularly in UAV-assisted communications.
Consider the optimization of RSMA parameters for the downlink system, which consists of the common message splitting ratio R d o w n s p and the power allocation ratio within the group P U d o w n s p . The problem can be described as solving for the optimal R d o w n s p (as in Equation (7)) and P U d o w n s p (as in Equation (8)) such that the transmission rate and is maximized while satisfying the user rate requirements.
arg min R down sp V target s . t . R down sp = r f down 1 , r f down 2 , , r f down n u down i = 1 n u down r f down i = 1 r f down i 0 , 1 i n u down
arg min P U down s p V target s . t . P U down sp = p u f down 1 , p u f down 2 , , p u f down n u down + 1 i = 1 n u down + 1 p u f down i = 1 P U f down i 0 , 1 i n u down + 1
where n u d o w n is the number of users in the user group, r f d o w n i represents the rate share of the i -th user in the user group in public messages, and p u f d o w n i represents the proportion of power allocated to the i -th message in the group (the total number of messages is the number of users plus one). It can be transformed into a typical linear equation constrained optimization problem with the help of the augmented Lagrange function multiplier method [23], for which an algorithm is designed in this paper to optimize the solution algorithm of an artificial fish school under the constraints of linear equation, which is realized by adding constraints for each step of the operation of the artificial fish.

4. Optimization Problem Solving

4.1. Memory-Based Dynamic Artificial Fish Swarm Algorithm

This paper employs the improved Artificial Fish Swarm Algorithm to resolve the UAV parameter optimization problem presented in Section 3. The position of the artificial fish in AFSA provides a feasible solution to the optimization problem. AFSA’s optimization objective is to find the best position with the highest food concentration in the fish swarm, which represents the best solution [24]. Because the traditional Artificial Fish Swarm Algorithm (AFSA) is based on fixed step and fixed field of view for iteration, which may lead to relatively slow convergence or failure to reach the convergence point later. Therefore, this paper introduces a memory approach, dynamic step size, and dynamic field of view strategies. Finally, we design a Dynamic Memory Artificial Fish Swarm Algorithm (MD-AFSA) that can adjust the current movement strategy of the fish swarm according to the historical operation to achieve rapid convergence.
Figure 2 illustrates the improved model MD-AFSA proposed in this paper. Building upon the basic operations of the standard fish swarm algorithm, this model introduces a memory-based behavior operation, allowing the simultaneous execution of three search paths to locate the next state. After completing the state transition of the artificial fish, the step size and visual range are updated accordingly.
  • First search path
Use f X t < f X t 1 to determine whether to perform the memory operation, indicating the artificial fish found a better position in the last iteration. If the condition is met, the Memory behavior is executed and the position of the artificial fish is updated by X i t + 1 = X i t + r a n d 0 , 1 × s t e p i t β 1 d i r c + β 2 d i r p , where X i t denotes the position of the artificial fish i after t iterations. s t e p i t is the step size after iterating t times. β 1 + β 2 = 1, which is the constant coefficient factor. d i r c and d i r p are calculated as shown in (9), representing the current and historical direction. X t b e s t represents the optimal solution among all solutions after iterating for t times. μ t and μ t 1 represent the current and historical position validity, respectively.
  • Second search path
Use f X c n n b < ϑ f X i to determine whether to perform Swarm behavior, where X c is the center position of the current artificial fish’s neighbors, n n b is the number of neighbors of the current artificial fish, and ϑ is the crowding factor. Satisfying this condition means that the partner center is not crowded, and thus Swarm behavior can be executed by X i t + 1 = X i t + r a n d 0 , 1 × s t e p i t X c X i t X c X i t . On the contrary, the artificial fish attempts to perform Foraging behavior. The prerequisite for performing Foraging behavior is that in the number of t r y m a x attempts, the presence of X n = X i t + v i s u a l i t × R a n d 1 , 1 and f X n < f X i t . If the condition is met, the artificial fish will perform Foraging behavior by X i t + 1 = X i t + r a n d 0 , 1 × s t e p i t X n X i t X n X i t . Otherwise, it will execute Random behavior by X i t + 1 = X i t + v i s u a l i t × R a n d 1 , 1 .
  • Third search path
Use f X j n n b < ϑ f X i to determine whether the artificial fish is capable of Rear-End behavior, where X j is the position of the optimal node between the current neighbor nodes.
d i r c = μ t X t best X i t + μ t 1 X t best X i t 1 μ t X t best X i t + μ t 1 X t best X i t 1 d i r p = μ t X t 1 best X i t + μ t 1 X t 1 best X i t 1 μ t X t 1 best X i t + μ t 1 X t 1 best X i t 1 μ t = f X i t f X t best f X i t f X t best + f X i t 1 f X t best μ t 1 = f X i t 1 f X t best f X i t f X t best + f X i t 1 f X t best
If condition is met, use X i t + 1 = X i t + r a n d 0 , 1 × s t e p i t X j X i t X j X i t to execute Rear-End behavior. Conversely, trying to perform Foraging behavior.
In particular, the standard AFSA uses a fixed field of view and a step size, however, early in the algorithm iteration process, larger v i s u a l and s t e p are required to enhance the search capability and the convergence speed, but later it need smaller v i s u a l and s t e p to improve the search accuracy [25]. To address this problem, MD-AFSA designs a separate field of view as well as a step size for each artificial fish, and the field of view and step size of the artificial fish are updated after each iteration in the manner of (10) and (11), where t m is the algorithm’s maximum allowed number of iterations. s t e p i t is the step length after t iterations. v i s u a l i t is the field of view after t iterations. s t h i m i n is the lower limit of the step size of artificial fish i and v t h i m i n is the lower limit of the field of view of the artificial fish i . It is easy to prove that s t e p i t and v i s u a l i t are non-increasing and will eventually reach the lower limit.
s t e p i t + 1 = min cos t t t m t m p i 2 s t e p i t + s t h i min , s t e p i t
v i s u a l i t + 1 = min cos t t t m t m p i 2 v i s u a l i t + v t h i min , v i s u a l i t
In addition, based on the behavioral performance of artificial fish, MD-AFSA provides an updated strategy for s t h i m i n and v t h i m i n :
  • After consecutive t t h iterations, if the current artificial fish view cannot capture the optimal solution after the previous iteration and no better position is found:
    s t h ˜ i min = t m 4 s t h i min v t h ˜ i min = t m 4 v t h i min
  • After consecutive t t h iterations, if the current artificial fish field of view captures the optimal solution after the previous iteration:
    s t h ˜ i min = s t h i min t m 4 v t h ˜ i min = v t h i min t m 4
In this paper, the inequality problem of UAV position is transformed into an unconstrained problem by ALM in Section 3, which is solved by MD-AFSA in this section, and the complete algorithm flow is shown in Figure 2.

4.2. Memory-Based Dynamic AFSA Under Linear Equality Constraints

In this algorithm, user group parameters and RSMA parameters are optimized. Aiming at (7)and (8) in Section 3, this paper designs an artificial fish swarm optimization algorithm under linear equality constraints, which is realized by adding constraints to each step of the artificial fish. Let P = I A T A A T 1 A . For X 1 , satisfying A X 1 = b . Denote X 2 = X 1 + α · P X r , where α is the non-negative proportional control factor and represents the scalar multiplication by a vector and X r is an arbitrary vector. A X 2 = b + α · A P X and because of A P = 0 , A X 2 = b , which satisfies the constraints of linear equality.
MD-AFSA in Section 3.1 is further optimized to obtain a Memory-based Dynamic Fish Swarm Algorithm Under Linear Equality Constraints (LEC-MD-AFSA). LEC-MD-AFSA modifies the relevant operational behavior of the artificial fish, so that the new solution obtained still satisfies the linear equality constraints.
Due to X 1 and X 2 satisfying the constraint A X = b , it is easy to prove that A X 3 = b , where X 3 = X 1 + k X 2 X 1 , so the new solutions obtained from the Swarm and Rear-End behaviors of MD-AFSA still satisfy the constraint without correction. Similarly, the direction factor of the Memory behavior remains a linear combination of feasible solutions without correction. For the Foraging behavior, the artificial fish needs to try to find a new location within the field of view, and in order to make the found location satisfy the linear equality constraint, correct by X n = X i t + v i s u a l i t P R a n d 1 , 1 . For the random behavior, the correction is X i t + 1 = X i t + P R a n d 1 , 1 v i s u a l i t . In the problem considered in this paper, the row vectors of matrix A are orthogonal to each other and the values in A only contain {0,1}. All elements in the vector b are 1, therefore, several random numbers in the [0,1] interval can be randomly generated, and then divide each element by the sum of all numbers to get the initial solution of the artificial fish. The original user group and RSMA parameters’ optimization problems are turned into linear constraint problems in Section 3 using the augmented Lagrange function, and the solution algorithm is implemented based on MD-AFSA.
In conclusion, this paper decomposes the problem of UAV-assisted communication rate optimization based on RSMA into three sub-problems for solution. When solving a parameter optimization sub-problem, the parameters of other sub-problems are treated as constants; finally, the original optimization problem is solved by the ternary cross iteration method.

5. Simulation Analysis

Aiming at the downlink UAV-aided RSMA system designed in this paper, the proposed key algorithm and related systems are simulated and analyzed in MATLAB R2016a.

5.1. Simulation Analysis of MD-AFSA Algorithm Performance

In this study, the AFSA algorithm is improved and designed, and the MD-AFSA algorithm is proposed to improve the optimization ability and convergence speed of the algorithm, and realize the optimal solution of UAV deployment position. In the experiment, some test functions introduced in reference [26] are selected to analyze and compare the performance of the algorithm. The information of the selected test functions is shown in Table 1 and Table 2.
The standard AFSA and the dynamic strategy and memory strategy proposed in this paper are tested on the test functions in Table 1 and Table 2, respectively. Figure 3 shows the test results of single extreme function.
In Figure 3, AFSA represents the standard artificial fish school algorithm, M-AFSA represents the memory strategy proposed in this paper to the standard artificial fish school algorithm, D-AFSA represents the dynamic step size and dynamic field strategy proposed in this paper to the standard artificial fish school algorithm, and MD-AFSA represents the dynamic memory fish school algorithm proposed in this paper. According to Figure 3, it can be seen that D-AFSA usually has a good convergence speed in the early stage of algorithm iteration, but the convergence speed is even lower than that of AFSA in the late stage of algorithm iteration; compared with D-AFSA and AFSA, M-AFSA can achieve faster convergence speed and lower error; the convergence speed of MD-AFSA in the iteration process of algorithm is close to that of M-AFSA (slightly lower in the early stage of F3), but it has a lower error. The final error of three single-extreme functions after 100 iterations using different optimization algorithms is shown in Table 3. In this test, the error is defined as the difference between the sought objective function value and the actual minimum value. On the F1 function, the solution error of MD-AFSA is reduced by 99.63% compared with AFSA; on the F2 function, the solution error of MD-AFSA is reduced by 98.68% compared with AFSA; on the F3 function, the solution error of MD-AFSA is reduced by 91.76% compared with AFSA.
Figure 4 shows the test results of multi-extreme function, and the maximum iteration number of the algorithm is set to 100 times.
In Figure 4, the meaning of each curve is consistent with that of Figure 3. In the multi-extreme function test, D-AFSA still performs poorly, even lower than the standard AFSA algorithm; M-AFSA and MD-AFSA have better performance than AFSA and D-AFSA; On the basis of M-AFSA, MD-AFSA incorporates dynamic step size and dynamic field of view strategies, which is conducive to faster convergence and algorithm optimization.
The final errors of the three multi-extreme functions after 100 iterations using different optimization algorithms are shown in Table 4. The analysis shows that MD-AFSA has the lowest error only in all test functions. On the F4 function, the solution error of MD-AFSA is reduced by 99.71% compared with AFSA; on the F5 function, the solution error of MD-AFSA is reduced by 83.70% compared with AFSA; on the F6 function, the solution error of MD-AFSA is 93.67% lower than that of AFSA.
The optimization test of single extremum function and multi-extremum function shows that the MD-AFSA algorithm proposed in this paper has better convergence speed and optimization ability than the original algorithm, and can quickly find the optimal solution point of the objective function and solve the optimization problem.
Under the same experimental conditions (the hardware platform parameters and algorithm parameters are consistent), the time characteristics of different algorithms are tested, and the end condition of the algorithm is that the maximum number of iterations is reached or the difference between the optimization function value and the actual optimal value is less than 0.01. The test results are shown in Table 4.
According to Table 5, when the optimization error is 0.01, D-AFSA can’t reduce the time consumption of the algorithm, while M-AFSA and MD-AFSA can effectively reduce the running time of the algorithm and improve the efficiency and practicability of the algorithm.

5.2. Simulation of Downlink RSMA System

This paper validates the UAV-assisted communication downlink transmission optimization based on RSMA by MATLAB. The key parameters of the simulation are in Table 6. Assume that the upstream transmission bandwidth allocated to a user group is 0.5 MHz, and the upper limit of transmit power for a single user is 10 dBm.
We first consider a scenario with a single user group (comprising two users) in the downlink system. In this case, the user group is allocated a bandwidth of 0.5 MHz and a total transmission power of 25 dBm. The rate curves for the users in the group are shown in Figure 5. As is illustrated, among the three mechanisms—OMA, NOMA, and RSMA—OMA achieves the smallest capacity region, while RSMA has the largest capacity region. This discrepancy arises because RSMA is equivalent to NOMA when no power is allocated to the common message for the user group. By allocating power to the common message appropriately, RSMA can achieve higher transmission rates than NOMA.
Next, we examine how varying the number of users and the system’s signal-to-noise ratio (SNR) impacts system throughput, as shown in Figure 6. All three access mechanisms utilize the optimization algorithm described in this paper to allocate power and bandwidth resources. The results indicate that as the number of users increases, the system throughput gradually approaches saturation. Additionally, higher system SNR results in increased throughput without any upper limit. Among the three approaches, the one presented in this paper demonstrates the best performance, with the RSMA strategy achieving 13.30% higher system throughput compared to the NOMA strategy.
By fixing the position of the UAV and allocating resources between and within user groups, we assess the downlink RSMA system throughput, as shown in Figure 7.
In Figure 7, RSMA-A represents the optimization strategy proposed in this paper. RSMA-SP denotes a scenario where the UAV base station position is fixed, followed by resource allocation using the described strategy for both inter-group and intra-group resources. RSMA-SA-1 and RSMA-SA-2 represent situations where the resource allocations between and within groups are fixed (matching the optimal solution derived by RSMA-A), followed by the random selection of two UAV deployment positions for base station deployment. The results show that changing the UAV deployment position significantly impacts system throughput in the downlink system. This trend aligns with findings in the uplink system: when the UAV position is fixed and the resource allocation strategy is optimized, throughput can be effectively enhanced.

6. Conclusions

This paper has investigated the application of UAVs as base stations in emergency communication scenarios. With their flexible deployment and excellent line-of-sight communication capabilities, UAVs can provide better QoS compared to ground-based stations. To enhance system access capacity and transmission rates, this study adopted RSMA as the access mechanism for UAV base stations and focused on optimizing the downlink rate of the RSMA system through joint UAV deployment strategies.
First, the downlink system was modeled, and the optimization parameters were divided into three categories: UAV positioning parameters, user group parameters, and RSMA parameters. The original optimization problem was decomposed into three subproblems, each solved using a ternary iterative approach. For the UAV positioning optimization subproblem, a solution algorithm combining the ALM and AFSA was proposed. Moreover, the AFSA was enhanced into the MD-AFSA algorithm, incorporating dynamic step size, vision, and memory strategies. For the optimization of user group and RSMA parameters, a detailed analysis was performed, followed by the design of a modified MD-AFSA algorithm under linear equality constraints—LEC-MD-AFSA. The effectiveness of both MD-AFSA and LEC-MD-AFSA algorithms was validated through simulations, and the performance of the downlink RSMA system was evaluated.
Simulation results showed that the MD-AFSA and LEC-MD-AFSA algorithms can reduce errors by more than 85% compared to the original algorithm, with error reductions exceeding 99% across multiple test functions. Additionally, in the downlink system, the RSMA scheme improved system throughput by 13.30% compared to NOMA.
Future research could focus on optimizing RSMA systems in more complex channel conditions to further enhance system throughput. Moreover, practical implementation of the proposed algorithms on hardware platforms could be considered for future validation and development.

Author Contributions

Conceptualization, L.H.; methodology, L.H. and D.Q.; software, L.H., D.Q. and J.Z. (Jianguo Zhou); validation, D.Q., J.Z. (Jianguo Zhou) and J.Z. (Jialin Zhang); investigation, L.H. and J.Z. (Jialin Zhang); writing—review and editing, J.Z. (Jianguo Zhou) and J.Z. (Jialin Zhang) All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Due to the nature of this research, participants of this study did not agree for their data to be shared publicly, so supporting data are not available.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

UAVunmanned aerial vehicle
DDQNdeep double Q-learning network
GPSRgreedy perimeter stateless routing
DDQN-MTGPSRmulti-objective optimized GPSR routing protocol
DSDVdestination-sequenced distance-vector
OLSRoptimized link state routing
DSRdynamic source routing
AODVdistance vector routing
HRPhybrid routing protocol
RLreinforcement learning
DLdeep learning
DRLdeep reinforcement learning-based
MDPMarkov decision process
QLQ-learning
QGeogeographic routing protocol
RFLQGEOreward function learning for QL-based geographic routing protocol
GLANgeolocation ad hoc network
AGLANadaptive GLAN
DNNdeep neural networks
QoSquality of service
DDQNdeep double Q-learning network
SAannealing
GAgenetic algorithm
PSOparticle swarm optimization
ReLUrectified linear unit
RWPrandomized waypoint model
PDRpacket delivery rate
Average E2E delayaverage end-to-end delay
PREpercentage of node average residual energy

References

  1. Zhao, N.; Lu, W.; Sheng, M.; Chen, Y.; Tang, J.; Yu, F.R.; Wong, K.K. UAV-assisted emergency networks in disasters. IEEE Wirel. Commun. 2019, 26, 45–51. [Google Scholar] [CrossRef]
  2. Arafat, M.Y.; Moh, S. Localization and Clustering Based on Swarm Intelligence in UAV Networks for Emergency Communications. IEEE Internet Things J. 2019, 6, 8958–8976. [Google Scholar] [CrossRef]
  3. Park, S.H.; Park, Y.J.; Jeon, Y.J.; Kang, S.J. Self-organized low-power multihop failover protocol for a cellular-based public safety device network. IEEE Internet Things J. 2022, 9, 18238–18250. [Google Scholar] [CrossRef]
  4. Dong, S.Y. Optimization of OLSR routing protocol in UAV ad HOC network. In Proceedings of the 2016 13th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, China, 16–18 December 2016; pp. 90–94. [Google Scholar]
  5. Zhang, T.; Zhu, Q. EVC-TDMA: An enhanced TDMA based cooperative MAC protocol for vehicular networks. J. Commun. Netw. 2020, 22, 316–325. [Google Scholar] [CrossRef]
  6. Pan, H.; Liew, S.C. Information Update: TDMA or FDMA? IEEE Wirel. Commun. Lett. 2020, 9, 856–860. [Google Scholar] [CrossRef]
  7. Patel, J.; Seto, M. CDMA-based multi-domain communications network for marine robots. J. Acoust. Soc. Am. 2020, 148, 2510. [Google Scholar] [CrossRef]
  8. Mao, Y.; Clerckx, B.; Li, V. Rate-splitting multiple access for downlink communication systems: Bridging, generalizing, and outperforming SDMA and NOMA. EURASIP J. Wirel. Commun. Netw. 2018, 1, 133. [Google Scholar] [CrossRef]
  9. Vidal-Beltrn, S.; Acevedo-Mosqueda, M.A. Impact of Subcarrier Allocation By Rows on Total Sum Rate for Scma Systems. Fractals-Complex Geom. Patterns Scaling Nat. Soc. 2021, 29, 125–141. [Google Scholar] [CrossRef]
  10. Ju, J.; Zhang, G.; Sun, Q.; Jin, L.; Duan, W. On the performance of receiver strategies for cooperative relaying cellular networks with NOMA. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 67. [Google Scholar] [CrossRef]
  11. Adriansyah, N.M.; Asvial, M.; Budiardjo, B. Capacity, Quality, and Coverage Trade-Off in Spatial Time Division Multiple Access Based Wireless Mesh Network. Adv. Sci. Lett. 2015, 21, 3526–3529. [Google Scholar] [CrossRef]
  12. Zhang, L.; Fu, M.; Fei, T.; Liang, J. The Artificial Fish Swarm Algorithm Optimized by RNA Computing. Autom. Control. Comput. Sci. 2021, 55, 346–357. [Google Scholar] [CrossRef]
  13. Ahmad, A.A.; Mao, Y.; Sezgin, A.; Clerckx, B. Rate Splitting Multiple Access in C-RAN: A Scalable and Robust Design. IEEE Trans. Commun. 2021, 69, 5727–5743. [Google Scholar] [CrossRef]
  14. Li, Z.; Han, S.; Lit, C. Low-Complexity Grouping Precoding Based on RSMA for Multibeam Satellite System. In Proceedings of the 2024 IEEE International Conference on Communications Workshops (ICC Workshops), Denver, CO, USA, 9–13 June 2024; pp. 1–6. [Google Scholar]
  15. Mao, Y.; Piovano, E.; Clerckx, B. Rate-Splitting Multiple Access for Overloaded Cellular Internet of Things. IEEE Trans. Commun. 2021, 69, 4504–4519. [Google Scholar] [CrossRef]
  16. Singh, S.K.; Agrawal, K.; Singh, K.; Li, C.P. Outage Probability and Throughput Analysis of UAV-Assisted Rate-Splitting Multiple Access. IEEE Wirel. Commun. Lett. 2021, 10, 2528–2532. [Google Scholar] [CrossRef]
  17. Zhang, S.; Clerckx, B.; Vargas, D.; Haffenden, O.; Murphy, A. Rate-splitting multiple access: Finite constellations, receiver design, and SIC-free implementation. IEEE Trans. Commun. 2024, 72, 5319–5333. [Google Scholar] [CrossRef]
  18. Sidiropoulos, N.D.; Davidson, T.N.; Luo, Z.Q. Transmit beamforming for physical-layer multicasting. IEEE Trans. Signal Process. 2006, 54, 2239–2251. [Google Scholar] [CrossRef]
  19. Kong, H.; Lin, M.; Wang, Z.; Wang, J.Y.; Zhu, W.P.; Wang, J. Performance Analysis for Rate Splitting Uplink NOMA Transmission in High Throughput Satellite Systems. IEEE Wirel. Commun. Lett. 2022, 11, 816–820. [Google Scholar] [CrossRef]
  20. Yang, Z.; Chen, M.; Saad, W.; Xu, W.; Shikh-Bahaei, M. Sum-Rate Maximization of Uplink Rate Splitting Multiple Access (RSMA) Communication. IEEE Trans. Mob. Comput. 2020, 21, 2596–2609. [Google Scholar] [CrossRef]
  21. Liu, H.; Kim, K.J.; Tsiftsis, T.A.; Clerckx, B.; Kwak, K.S.; Poor, H.V. Cognitive Radio Inspired Uplink Rate-Splitting Multiple Access. arXiv 2024, arXiv:2204.05825v2. [Google Scholar]
  22. Dizdar, O.; Clerckx, B. Rate-Splitting Multiple Access for Communications and Jamming in Multi-Antenna Multi-Carrier Cognitive Radio Systems. IEEE Trans. Inf. Forensics Secur. 2022, 17, 628–643. [Google Scholar] [CrossRef]
  23. Burman, E.; Hansbo, P.; Larson, M.G. The augmented Lagrangian method as a framework for stabilised methods in computational mechanics. Arch. Comput. Methods Eng. 2023, 30, 2579–2604. [Google Scholar] [CrossRef]
  24. Zheng, Z.; Li, J.; Duan, P. Optimal chiller loading by improved artificial fish swarm algorithm for energy saving. Math. Comput. Simul. 2019, 155, 227–243. [Google Scholar] [CrossRef]
  25. Pourpanah, F.; Wang, R.; Lim, C.P.; Wang, X.Z.; Yazdani, D. A review of artificial fish swarm algorithms: Recent advances and applications. Artif. Intell. Rev. 2023, 56, 1867–1903. [Google Scholar] [CrossRef]
  26. Yang, Z.; Tang, K.; Yao, X. Differential evolution for high-dimensional function optimization. In Proceedings of the 2007 IEEE Congress on Evolutionary Computation, Singapore, 25–28 September 2007. [Google Scholar]
Figure 1. Downlink RSMA network.
Figure 1. Downlink RSMA network.
Mathematics 13 00013 g001
Figure 2. Memory-based dynamic fish swarming algorithm.
Figure 2. Memory-based dynamic fish swarming algorithm.
Mathematics 13 00013 g002
Figure 3. Single Extremum Function Test.
Figure 3. Single Extremum Function Test.
Mathematics 13 00013 g003
Figure 4. Multi-extremum function test.
Figure 4. Multi-extremum function test.
Mathematics 13 00013 g004
Figure 5. Downstream user group rate profile.
Figure 5. Downstream user group rate profile.
Mathematics 13 00013 g005
Figure 6. Variation of the throughput of downlink system with number of users and SNR.
Figure 6. Variation of the throughput of downlink system with number of users and SNR.
Mathematics 13 00013 g006
Figure 7. RSMA downlink system throughput under different strategies.
Figure 7. RSMA downlink system throughput under different strategies.
Mathematics 13 00013 g007
Table 1. Single extremum test function.
Table 1. Single extremum test function.
FunctionFunction ExpressionRangeMinimum Value
Step F 1 x = i = 1 D x i + 0.5 2 100 , 100 D 0
Schwefel 2.22 F 2 x = i = 1 D x i + i = 1 D x i 10 , 10 D 0
Cigar F 3 x = x 1 2 + 10 6 i = 2 D x i 6 100 , 100 D 0
Table 2. Multi-extremum test function.
Table 2. Multi-extremum test function.
FunctionFunction ExpressionRangeMinimum Value
Himmelblau F 4 x = 1 D i = 1 D x i 4 16 x i 2 + 5 x i 5 , 5 D −78.3326
Schaffer F 5 x = 0.5 + s i n i = 1 D x i 2 2 0.5 1 + 0.001 i = 1 D x i 2 2 100 , 100 D 0
Alpine F 6 x = i = 1 D x i sin x i + 0.1 x i 10 , 10 D 0
Table 3. Error after 100 iterations of a single extremum function.
Table 3. Error after 100 iterations of a single extremum function.
FunctionF1F2F3
AFSA1.71 × 10−47.51 × 10−31.82 × 102
M-AFSA1.69 × 10−57.52 × 10−48.14 × 101
D-AFSA8.46 × 10−11.15 × 10−12.53 × 102
MD-AFSA6.40 × 10−79.91 × 10−51.50 × 101
Table 4. Error after 100 iterations of a multi extremum function.
Table 4. Error after 100 iterations of a multi extremum function.
FunctionF4F5F6
AFSA2.94 × 10−16.64 × 10−27.61 × 10−4
M-AFSA8.36 × 10−41.91 × 10−22.29 × 10−4
D-AFSA7.50 × 10−17.97 × 10−21.02 × 10−2
MD-AFSA8.44 × 10−41.08 × 10−24.81 × 10−5
Table 5. Algorithm time characteristics (unit: s).
Table 5. Algorithm time characteristics (unit: s).
FunctionAFSAM-AFSAD-AFSAMD-AFSA
F11.721.511.651.50
F21.971.332.011.48
F33.242.613.522.43
F43.632.653.632.58
F54.063.744.144.22
F62.141.542.281.70
Table 6. Key parameters of downlink RSMA system simulation.
Table 6. Key parameters of downlink RSMA system simulation.
ParametersValue
System bandwidth10 MHz
Area size500 × 500 × 75 m3
UAV height75 m
Noise power spectral density−174 dBm/Hz
Range of Signal-to-noise ratio0~30 dB
Number of users10~130
Users DistributionRandom distribution
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Huang, L.; Qu, D.; Zhou, J.; Zhang, J. The Optimization of UAV-Assisted Downlink Transmission Based on RSMA. Mathematics 2025, 13, 13. https://doi.org/10.3390/math13010013

AMA Style

Huang L, Qu D, Zhou J, Zhang J. The Optimization of UAV-Assisted Downlink Transmission Based on RSMA. Mathematics. 2025; 13(1):13. https://doi.org/10.3390/math13010013

Chicago/Turabian Style

Huang, Lin, Daiming Qu, Jianguo Zhou, and Jialin Zhang. 2025. "The Optimization of UAV-Assisted Downlink Transmission Based on RSMA" Mathematics 13, no. 1: 13. https://doi.org/10.3390/math13010013

APA Style

Huang, L., Qu, D., Zhou, J., & Zhang, J. (2025). The Optimization of UAV-Assisted Downlink Transmission Based on RSMA. Mathematics, 13(1), 13. https://doi.org/10.3390/math13010013

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop