I Introduction
Recently, the use of unmanned aerial aircraft (UAV) as mobile vehicle is emerging as an effective complementary technique for future fifth generation due to the UAV’s flexible mobility [1, 2, 3, 4, 5, 6]. In particular, the UAV can play a key role in enabling wireless connectivity in various scenarios, e.g., UAVaided ubiquitous coverage, UAVaided relaying and UAVaided information dissemination, etc [7, 8, 9, 10, 11, 12, 13, 14, 15]. In some hot spots or in some harsh areas where the base stations are difficult to be deployed, by means of using multiUAV deployed as aerial base stations (ABSs) has become an promising solution to provide seamless wireless coverage within the serving area [7, 8, 9]. The UAV used as mobile relaying provides new opportunities for system enhancement compared with conventional static relaying, since it can successively adjust its location for experiencing good channel condition [10],[11]. In addition, the UAV can be used for dispatching to disseminate data to the sensor nodes in internet of thing (IoT) scenario [12, 13, 14, 15].
As briefly reviewed above, the prior works about UAV assume that they use UAV as either mobile relaying or ABS. However, the UAV used as flying cloudlet in which the small cloudlet has an abundance of computation resource as well as communication resource is obtaining great attention [16, 17, 18, 19, 20]. In the traditional cellular network, the processor unit always resides in the cloud and the distance between mobile user and cloud is always long, which may cause long latency and power consumption for transmission in the uplink when the mobile user located in cellular edge. In order to reduce the latency and power consumption, some researchers have been paying attention to dealing with it. However, by far, only a few works have studied the UAVenabled mobile edge computing system. The authors in [16] proposed a UAVmounted cloudlet scenario where the UAV provided offloading opportunities to a single mobile user. The goal of [16] was to minimize the mobile energy consumption by optimizing bit allocation with a predetermined UAV trajectory. The same authors extended their work [16] into a more general case where the UAV was employed as cloudlet to offer computation offloading opportunities to multiple mobile users [17]. The [17] aimed at minimizing the total of mobile users energy consumption by jointly optimizing bit allocation and UAV trajectory. For maintaining the sustainable offloading task, a UAVenabled wireless powered mobile edge computing system was studied in [19]. Specifically, [19] considered a scenario where the energy transmitter and cloudlet are mounted on UAV, the UAV firstly transmitted energy to multiple mobile users and then mobile users exploited the harvested energy for computation tasks offloading. In order to extend the coverage in the cellular networks, a cellularconnected UAV communication has being proposed as a promising solution where the UAV is integrated into cellular networks as a new mobile user[2], [18], [21], [22]. In addition, the emerging diverse mobile applications such as virtual reality (VR), high definition videos, mobile online gaming, etc., which require low latency and high computation capability. To tackle this issue, the work in [18] established a cellularconnected UAV networks, the goal of this work was to minimize the UAV’s mission completion time by jointly optimizing UAV trajectory and time allocation.
However, all the above mentioned works have not addressed the energy consumption problem of UAVs for computation tasks offloading. On the one hand, due to the onboard battery capacity is constrained by the limited size of UAVs, the energy consumption of UAVs becomes a huge challenging in a cellularconnected UAV system. Therefore, how to prolong the UAV flying time become an open problem. It should be pointed out that we should carefully consider three parts of energy consumption of UAV, including communicationrelated energy consumption, computation energy consumption and propulsionrelated energy consumption [13], [23, 24, 25, 26, 27, 28]. On the other hand, for deeply comprehending the impacts of access manners on the system performance, the multiaccess schemes should be carefully designed. Based on this fact, in this paper, we study a cellularconnected UAV system where multiUAV simultaneously communicate with one TBS for computation task offloading under different access schemes. Different from previous works [16, 17, 18, 19] where the authors assume that the computation tasks can be completely migrated from mobile users to TBS for computing, whereas it will not work as the number of bits for computing is very large. Indeed, the number of bits used for offloading for computing is constrained by many factors, such as the TBS energy budget, UAV transmit power, UAVTBS channel condition, etc. For this, we propose a resource partitioning strategy where one portion of tasks is migrated to TBS for computation in the uplink transmission and the other portion of tasks is locally computed at UAV. Based on these, our goal is to minimize the total UAVs energy consumption while ensuring that the total number of bits of UAVs are completely computed in a given horizon time. Since the formulated problem is in a nonconvex form, which cannot be efficiently solved by the standard optimization technique. To tackle this nonconvex problem, we obtain a suboptimal solution by leveraging successive convex approximation (SCA) technique. To the best of our knowledge, it is the first work to investigate the optimization of offloading process from multiUAV to TBS by jointly considering the communicationrelated energy consumption, local computation energy consumption and propulsionrelated energy consumption. The main contributions of this paper can be summarized as follows:

We study a model for multiUAV mobile edge computing system, where the tasks at UAVs are migrated to TBS for computation. For deeply comprehending the impacts of access manners on the system performance, we present four access schemes in the uplink transmission in our model, i.e., time division multiple access (TDMA), orthogonal frequency division multiple access (OFDMA), OnebyOne access and nonorthogonal multiple access (NOMA). An energy minimization of UAVs is then formulated to jointly optimize bit allocation, UAV trajectory, UAV power allocation and resource partitioning with a given horizon time, subject to practical UAV mobility, transmit power and bitcasuality constraints.

For tackling the large number of bits for computation, we propose a resource partitioning strategy where one portion of tasks is migrated to TBS for computation in the uplink transmission and the other portion of tasks is locally computed at UAV, which has been verified the effectiveness of this strategy in Section VII.

Since the formulated problems are in different forms under different access schemes, we solve these formulated problems separately for different access schemes. For TDMA and OFDMA schemes, we obtain a suboptimal solution by leveraging SCA technique. For OnebyOne and NOMA schemes, we decompose the original problem into two subproblems, and develop an efficient iterative algorithm by optimizing the two subproblems alternately. The numerical results show that our proposed four schemes save a large amount of energy compared with propulsion minimization scheme. What’s more, while the NOMA scheme saves more energy consumption of UAVs compared with TDMA, OFDMA and OnebyOne scheme, the successive interference cancellation (SIC) technique used for NOMA, which may bring an additional interference and implementation complexity of NOMA.
The rest of this paper is organized as follows. Section II describes the system model and introduces the energy consumption of UAV in mathematical expression. In Section III, we formulate the UAV energy consumption minimization problem based on TDMA scheme, and obtain a suboptimal solution by applying SCA technique. In Section IV, we formulate the UAV energy consumption minimization problem based on OFDMA scheme, and obtain a suboptimal solution by applying SCA technique. In Section V, we formulate the UAV energy consumption minimization problem based on OnebyOne scheme, we decompose the original problem into two subproblems, and develop an efficient iterative algorithm by optimizing the UAV trajectory and UAVTBS scheduling alternately. In Section VI, we formulate the UAV energy consumption minimization problem based on NOMA scheme, we decompose the original problem into two subproblems, and develop an efficient iterative algorithm by optimizing the UAV trajectory and UAV transmission power alternately. In Section VII, the simulation results are given to validate the performance of our proposed schemes. Finally, we conclude the paper in Section VIII.
Ii System Model
As shown in Fig. 1, we consider an uplink transmission scenario where a set of singleantenna UAVs are serviced by one singleantenna TBS for tasks offloading. We study the optimization of offloading process from the UAVs to TBS with the goal of minimizing the total energy consumption of all UAVs for a finite time horizon . In Fig. 1, we can see that one portion of total bits of UAV , , is computed locally at UAV , and the other portion of bits, , is migrated to TBS for computation. In particular, means that all the number of bits at UAV are completely migrated to TBS for computation, and indicates that all the number of bits at UAV are used for locally computing.
For the sake of mathematical description simplicity, we consider a threedimensional Cartesian coordinate system, with all dimensions being measured in meters, where the horizontal coordinate of UAV at time instant is denoted by . Without loss of generality, the TBS is located at origin of the horizonal coordinate, denoted as . We assume that the UAVs move at a fixed altitude under the initial/final location, maximization UAV speed and acceleration constraints. For tackling the problem more tractable, the continuous horizon time is equally divided into time slots with each slot duration . As such, the UAV trajectory , UAV speed , UAV acceleration over time can be approximately denoted by length sequences as , , , where , , , .
It can be assumed that the channels between the UAVs and TBS are dominated by lineofsight (LoS) without smallscale fading, which have been verified by taking measurements in [29] and [30]. Thus, the channel power gain from UAV to TBS in the uplink at time slot can be modeled as [10],[14],[24],
(1) 
where denotes the distance between UAV and TBS at time slot , represents the reference channel gain at .
Next, we will discuss the energy consumption models of UAV. As it is mentioned before, the total energy consumption of UAV consists of three parts, i.e., UAV’s computation energy, UAV’s communication energy and UAV’s propulsion energy, which are described in below.
Ii1 Execution Energy Consumption Model
The energy consumption of local computation is directly determined by the CPU workload , which is related to the data size and the complexity algorithm of application [31], [32], and is defined as
(2) 
where denotes the input data size, and
represents the complexity of the application, which has been shown that follows Gamma distribution
[32], [33]. Three factors can be contributed to the CPU power consumption including dynamic power, short circuit power and leakage power. As stated in [34], the energy consumption of CPU is dominated by dynamic power and other two factors can be neglected. In order to minimize the energy consumption of CPU power (dynamic power), the optimal clockfrequency scheduling in each CPU cycle is achieved in [32],[35]. Let denote the number of bits of UAV as , . Based on [32],[35], the energy computation consumption model with data size and completion execution time can be expressed as(3) 
where the coefficient
is a constant that accounts for the effective switched capacity and application execution completion probability. As we can see from formula (
3), the increased number of bits or the reduced time will drastically increase the computation energy consumption.Ii2 Communication Energy Consumption Model for Offloading
The required transmission power of UAV for completely transmitting bits in the uplink within time slot should satisfy Shannon theory, we thus have
(4) 
where denotes the system bandwidth and is the additive white Gaussian noise power. After some algebraic manipulations, the transmit power can be expressed as
(5) 
As such, the required energy of UAV for completely transmitting bits within time slot can be obtained as
(6) 
Ii3 Propulsionrelated Energy Consumption of UAV for Flying
Based on the model in [17], [24], the total UAV’s propulsion energy consumption of UAV over can be expressed as
(7) 
where represents the change of UAV’s kinetic energy, which is a invariant scalar with fixed final/initial location of UAV, and and are constants which are related to the UAV’ wing area, load factor and wing span efficiency etc. Without loss of generality, we assume that the UAV’s initial speed and final speed are same, thus, can be omitted in term (7). In addition, the formula (7) shows that the UAV’s propulsion energy is related to UAV velocity and acceleration. Especially, as UAV hovers over a fixed location, i.e., , then tends to be infinite.
In this paper, four access frame structures are discussed, namely TDMA, OFDMA, OnebyOne access and NOMA. For the frame structure of TDMA scheme, each time slot duration is equally divided into subslot with duration , i.e., . However, each UAV shares the same bandwidth with each subslot; For the frame structure of OFDMA scheme, each UAV occupies the same time slot duration, whereas shares the bandwidth ; For the frame structure of OnebyOne scheme, we assume that at most one UAV can be scheduled within each time slot; For the frame structure of NOMA scheme, each UAV shares the same time and same bandwidth.
In addition, it should be mentioned that the bitcasuality in the processed phase at TBS must be carefully designed, i.e., the TBS can only process the bits that have already been received from UAVs [17], [19]. Without loss of generality, we assume that the processing delay at TBS is one slot. Furthermore, due to the fact that the size of computation outcome data in general is much smaller than that of the computation input data. Thus, the downlink transmission for bit allocation is ignored in this paper [18], [36], [37].
Iii Energy minimization for TDMA Scheme
In this section, we tackle the problem of minimizing the total energy consumption of UAVs for offloading by assuming the system operated in TDMA scheme. Specifically, the joint bit allocation, resource partitioning, power allocation and UAV trajectory under the TBS’s budget energy and UAV mobility constraints are optimized for minimizing the total energy consumption of UAVs. As each time slot is equally split into subslot with duration (), the communicationrelated energy consumption of UAV within time slot , denoted as , can be obtained by substituting the in (6) with . For notation brevity, we define bit allocation as , UAV trajectory as , set and set . In this case, the energy minimization problem can be reformulated as
(8a)  
(8b)  
(8c)  
(8d)  
(8e)  
(8f)  
(8g)  
(8h)  
(8i)  
(8j) 
Eq.(8b) represents the TBS energy budget allocated to UAVs for computation. Note that in (P0), the constraint (8c) is obtained from (4) by replacing the equality sign with inequality constraints. Indeed, this will not change the optimal solution to problem (P0). To see this, suppose that the optimal solution to problem (P0) is satisfied with the strict inequality, one can always decrease the power allocation to obtain a strictly less objective value. As a result, at the optimal solution to (P0), the constraint (8c) must be satisfied with equality. (8d) denotes the bitcasuality constraint. (8e) represents that the total number of bits for transmission in the uplink, and (8f) denotes that the transmitted bits are completely processed by TBS. (8g) represents the UAV trajectory constraints. (8h)(8j) are the feasible and boundary constraints of the optimization variables. We can see that the constraints set (8b) and (8d)(8j) are all convex, however, the constraint set (8c) and objective function are not convex, which cannot be solved by standard convex technique. To proceed, we first introduce slack variable in term , then the UAV’s propulsion energy consumption, denoted as , can be reformulated as
(9) 
with additional constraint
(10) 
However, the new first constraint of (10) is not convex. To tackle this nonconvex constraint, we develop an SCA technique. Specifically, with a given local point over iteration, we have
(11) 
where (11
) follows from the fact that its firstorder Taylor expansion of convex function is a global underestimator
[38]. It can be seen that is a linear function with respect to , which is convex. As such, the constraint (10) can be rewritten as(12) 
In the next, we tackle the nonconvex constraint (8c). To this end, we first relax constraint (8c) by introducing slack variable , which can reformulate constraint (8c) as
(13) 
and
(14) 
where denotes the reference signaltonoise (SNR). Similarly, by taking the firstorder Taylor expansion of left hand side (LHS) in constraint (13) with given local point over iteration, the following global lower bound can be obtained as
(15) 
where and .
By replacing the nonconvex objective function and (8c) of (P0) with their corresponding lower bounds at given local point obtained above, we have the following optimization problem
It can be verified that the problem (P0.1) is a convex optimization problem, which can be efficiently solved by standard convex technique. By successively updating the local point at each iteration via solving (P0.1), an efficient algorithm is obtained for the nonconvex optimization problem (P0).
Iv Energy minimization for OFDMA Scheme
In this section, we study the design of bit allocation, power allocation, resource partitioning and UAV trajectory for OFDMA scheme. In OFDMA system, the total bandwidth is equally divided into subbandwidth, each with a bandwidth of . The formulated problem, denoted as P1, can be obtained by substituting the new bandwidth allocation and time allocation in P0. We summarized the resulting problem as
where . The problem (P1) is a nonconvex problem, whereas can be obtain approximation solution by taking same manipulation operations of (P0) on (P1), and the detailed procedures are omitted here for brevity.
V Energy minimization for OnebyOne Scheme
In this section, we consider OnebyOne access scheme in the uplink transmission. For OnebyOne access scheme, each time slot with duration
can only be occupied by at most one UAV. We define a UAVTBS scheduling indicator binary variable
, if UAV is serviced by TBS at time slot , then , otherwise . It is noteworthy that within each time slot , there is at most one UAV can be scheduled, i.e., . The corresponding design problem can be formulated as follows:(16a)  
(16b)  
(16c)  
(16d)  
where . Note that the term in the first constraint of problem (P2) makes sure that when UAV is in a ’mute’ condition, there have no bits transmitted in the uplink; The term in ensures that as UAV is not scheduled by TBS, the power allocation must be zero.
One can find that problem (P2) is a nonconvex and mixedinteger optimization problem due to the nonconvex objective function and integer constraints (16b) and (16d). To tackle this nonconvex and mixedinteger optimization problem, we decompose the original problem into two subproblems, namely UAV trajectory optimization with fixed UAVTBS scheduling and UAVTBS scheduling optimization with fixed UAV trajectory.
Va UAV Trajectory Optimization with Fixed UAVTBS Scheduling
In this subsection, we consider the first subproblem of (P2), denoted as (P2.1), for optimizing UAV trajectory, bit allocation, resource partitioning and power allocation by assuming that UAVTBS scheduling is fixed, which can be formulated as
We can see that the problem (P2.1) have same structure as (P0). Therefore, it can be tackled with same way as (P0) and the detailed manipulations can refer to Section III.
VB UAVTBS Scheduling Optimization with Fixed UAV Trajectory
In this subsection, we consider the second subproblem of (P2), denoted as (P2.2), for jointly optimizing UAVTBS scheduling, bit allocation, resource partitioning and power allocation by assuming that UAV trajectory is fixed, which can be formulated as
Though the problem (P2.2) is in a nonconvex and mixedinteger form, we can obtain a suboptimal solution by using relaxing method and SCA technique. Firstly, we relax the binary scheduling variable into continuous variable, as such, the constraint (16d) can be reformulated as
(18) 
Secondly, for nonconvex term in objective function, we tackle with it by taking firstTaylor expansion of at given local points. Specifically, for any given local points and over iteration, we have the following inequality
(19) 
As such, the term can be replaced by its upper bound result, which is given by
(20) 
We can easily see that the expression is convex with respect to and . For the nonconvex expression with respect to and , we first introduce a slack variable , and then take the firstTaylor expansion of , the detailed procedures can refer to Section III. At last, for nonconvex constraint (16b), we first introduce the slack variable , as a consequence, the constraint (16b) can be reformulated as
(21) 
and
(22) 
We can see that the reformulated constraints are still nonconvex due to the coupled variables and in (22). However, this constraint can still approximately obtained by leveraging SCA technique, we thus have
(23) 
where is given in (24) (see the expression on top of the next page).
(24) 
By replacing the new convex constraints (12), (18), (20), (21) and (23) of (P2.2) at the iteration obtained above, we have the following optimization problem:
It can be verified that problem (P2.3) is a convex optimization problem, which can be efficiently solved by standard convex technique. To reconstruct the binary variable, we have
(26) 
It should be noted that the feasible region of (P2.2) is in general a subset of that (P2.3), as a result, and the optimal value of (P2.3) provides an upper bound solution to that of (P2.2). Based on the solutions to its two subproblems obtained by optimizing UAV trajectory and UAVTBS scheduling via solving (P2.1) and (P2.3), we propose an iterative algorithm for problem (P2), which is summarized in Algorithm 1. Note that after each iteration in Algorithm 1, the objective value of (P2) is monotonically nonincreasing. In addition, the objective value of (P2) is lower bounded by a finite value, Algorithm 1 is thus guaranteed to converge.
Vi Energy minimization for NOMA Scheme
In this section, we tackle the problem of minimizing the total energy consumption of UAVs for offloading by assuming the system operated in NOMA scheme. For NOMA scheme [39, 40, 41], each UAV occupies the same bandwidth resource and time resource. Based on this access manner, the problem can be formulated as
(27)  
The problem (P3) is different from previous problems due to the signal interference involved in (27), which is nonconvex and hard to tackle. In general, there is no standard method for solving this nonconvex problem efficiently. In the following, we develop a twolayer iterative algorithm and solve it using SCA technique. We first split problem (P3) into two subproblems, namely UAV trajectory optimization with fixed power allocation and transmission power optimization with fixed UAV trajectory. Based on the solutions obtained, an iterative algorithm is proposed for problem (P3) via alternately optimizing the above two subproblems.
Via UAV Trajectory Optimization with Fixed power Allocation
In this section, we consider the first subproblem of (P3) for optimizing UAV trajectory with fixed transmission power allocation. The problem can be written as
Note that the problem (P3.1) is still a nonconvex problem due to the nonconvex term in objective function and nonconvex constraint in (27). In the following, we adopt the SCA technique for solving the trajectory optimization problem. To this end, we define , and can be rewritten as
(28) 
where . Define , , then the constraint (27) can be rewritten as
(29) 
and
(30) 
While the term in (29) is convex with respect to , the term is not convex with respect to . In addition, it also introduces a nonconvex set in (30). To tackle the nonconvex constraints (29) and (30), we apply the SCA technique. For the term , we take the firstorder Taylor expansion of with respect to any given point over iteration, we thus have the following inequality (31) (see the inequation on top of the next page), where .
(31) 
Then, (29) can be replaced by its lower bound approximation result as
(32) 
It is not difficult to verify that constraint (32) is now convex. To tackle the nonconvex (30), a local convex approximation is still applied. Specifically, for given local point over iteration, we have
(33) 
Define the new constraint
(34) 
For nonconvex term in objective function of (P3.1), it can still be replaced by a convex form by introducing the slack variable , which can refer to Section III. As a result, for any given point , define the following optimization problem
Problem (P3.2) is now convex, which can be efficiently solved by standard convex optimization technique. Note that it can be readily verified that the objective value of (P3.2) gives a upper bound result to that of problem (P3.1).
ViB Power Allocation Optimization with Fixed UAV Trajectory
In this section, we consider the second subproblem of problem (P3) in which the transmission power of UAV is optimized while the UAV trajectory is fixed. The problem can be reformulated as
(35)  
Problem (P3.3) is a nonconvex optimization problem due to the nonconvex constraint in (35). Define . To tackle the nonconvex constraint of (35), we apply the successive convex optimization technique to approximate with a convex function in each iteration. Specifically, for any given local point over iteration, we have the inequality given in (36) (see the inequation on top of the next page).
(36) 
As a result, for any given point , problem (P3.3) is approximated as
(37)  
The problem (P3.4) is a convex optimization problem, which can be efficiently solved by standard optimization technique. As a consequence, (P3.3) can be approximated solved by successively updating the power allocation based on the optimal solution to (P3.4) . It should be pointed out that the obtained solution by solving problem (P3.4) can be served as the upper bound of problem (P3.3).
Based on the solutions to its two subproblems obtained by optimizing UAV trajectory and power allocation via solving (P3.2) and (P3.4), we propose an iterative algorithm for problem (P3), which is summarized in Algorithm 2. The proof of convergence of Algorithm 2 can refer to Algorithm 1 provided in Section V.
Vii Numerical Results
In this section, we present the numerical results to illustrate the effectiveness of our proposed four schemes. In the simulations, the altitude of UAV is fixed at with the maximum transmission power . The communication bandwidth is with the reference SNR . We assume that the maximum energy budget of TBS allocated for computing is unless otherwise specified. The total number of bits for UAV 1 and UAV 2 are set to be and , respectively. We assume that there have two UAVs, i.e., , which can move to any direction subject to the maximum UAV speed and acceleration . In addition, we assume that , as in [25] and [42], and the computation coefficient is set to as stated in [35]. In addition, the time slot is assumed to be . It is worth mentioning that we plot the curves of UAV trajectory, bit allocation and resource partitioning for TDMA scheme, and the curves of UAV trajectory, bit allocation and resource partitioning for other schemes are not plotted. This is because the similar results can be obtained compared with TDMA scheme.
In Fig. 2, we plot the optimized UAVs’ trajectories obtained by the TDMA scheme with horizon time . We let UAV 1’s initial location and final location respectively as and with corresponding UAV 1’ initial velocity and final velocity , and UAV 2’s initial location and final location respectively as and with corresponding UAV 2’ initial velocity and final velocity . In addition, the horizon coordinate of TBS is located at . Three prominent insights can be achieved in Fig. 2. Firstly, the curves of UAVs’ trajectories for minimizing the total UAVs energy consumption yield a straight flight mostly, which indicates that the energyminimization strategy is simply straight flight manner with constant UAV speed. Secondly, for offloading bits from UAVs to TBS as more as possible, the UAVs tend to adjust itself location to shorten the distance between UAV and TBS. Thirdly, the propulsionrelated energy consumption of UAVs is dominated compared with communicationrelated energy consumption, otherwise the UAVs prefer to move directly to TBS and hover above TBS for saving communication energy. For describing more detailed information about UAV’s mobility, the curves of UAV 1 speed and acceleration are plotted in Fig. 3. We can observe that UAV 1 firstly flies at a higher speed, and then flies at a constant lower speed. In addition, the UAV 1 acceleration almost equal to 0 from time slot to , which results in a low energy consumption for flying. The results of speed and acceleration for UAV 2 have similar results as UAV 1, and is not discussed here for brevity.
Fig. 4 shows the achieved bit allocation of uplink transmission phase and TBS local computation phase for UAV 1 and UAV 2. From the first subfigure of Fig. 4 for UAV 1, we can see that a large number of bits are allocated in the uplink transmission for UAV 1 at begin, and then the number of bits are allocated in uplink transmission for UAV 1 decrease. This conclusion is contrary to the results stated in [17], which shows that as the UAV is closer to mobile user, a larger number of bits should be allocated. This is attributed to the fact that the work [17] focuses on minimizing the mobile users’ communication energy, however, our work pays attention to minimizing the total energy consumption of UAVs, including communicationrelated energy consumption, local computation energy consumption and propulsionrelated energy consumption. While as the distance between UAV and TBS become shorter, the larger number of bits allocated for TBS will reduce the communicationrelated energy consumption of UAVs, the energy used for flying and computing will increase. For TBS local computation phase, the TBS prefers to process the equal number of bits in each time slot for saving TBS’ computation energy, which has same conclusion as in [17]. Moveover, we can see that from the second subfigure of Fig. 4 for UAV 2, the number of bits allocated for uplink transmission and computation is almost same as in the subfigure of Fig. 4 for UAV 1. The reason can be explained as the energy budget for computation is limited, thus it only can process a limited number of bits received from UAVs.
Fig. 5 shows the impacts of TBS energy budget on UAV’ resource partitioning strategy. Two dash lines, i.e., blue dash line and red dash line, represent the maximum resource partitioning values for UAV 1 and UAV 2, respectively. The maximum resource partitioning values are derived from the special case for TDMA which discussed in Fig. 6. In Fig. 5, we can observe that the optimized resource partitioning, , is monotonically increasing with TBS energy budget, which means that the more number of bits of UAVs can be offloaded to TBS for computation as TBS energy budget increases. This can be explained as the more TBS energy budget, the more number of bits can be processed. Furthermore, it can be observed that the resource partitioning of UAV 1 is higher than UAV 2. This is because from Fig. 4, it shows that the number of bits of two UAVs allocated for TBS is almost same, and also the total number of bits of UAV 1 is smaller than the total number of bits of UAV 2, thus the results can be directly obtained.
At last, we compare our proposed four schemes with comparison benchmarks in terms of minimizing the total energy consumption of UAVs as shown in Fig. 6. For propulsion minimization scheme, the UAV’s trajectory is firstly optimized for minimizing the UAV’s propulsionrelated energy, then with the obtained UAV trajectory, we optimize bit allocation and resource partitioning of UAV for jointly minimizing communicationrelated energy and local computation energy. We also consider four special schemes as comparison benchmarks which the TBS allocated energy budget for computation is sufficient large and the bitcasuality constraint (namely we assume that the TBS can completely process the bits received from UAVs within one time slot) is ignored. Obviously, these four special benchmarks can be served as lower bound results for the proposed four schemes. In Fig. 6, it can be observed that the adopted propulsion minimization scheme consumes more energy than the other schemes. We can conclude that the propulsionrelated UAV energy consumption is not the only prominent factor for the total UAV energy consumption, it also indicates that the bits used for computation consume a large amount of energy. It can also be see that the NOMA scheme has better performance than the orthogonal schemes (TDMA, OFDMA, OnebyOne), the larger gain for NOMA scheme can be attributed to the property of sharing of entire time and bandwidth resource simultaneously among UAVs. However, the successive interference cancellation (SIC) technique used for NOMA may bring an additional interference and implementation complexity compared with orthogonal schemes [40],[41]. Furthermore, the gap among proposed four schemes is not large, thus, there exists a tradeoff between implementation complexity and performance gain. In addition, we can see that the four solid curves plotted in Fig. 6 firstly decrease with horizon time from to , and increase with horizon time from to . This can be explained since the horizon time is small in the first phase, the energy consumption used for computation is larger than the UAV used for flying; In the second phase, as horizon time becomes larger, the energy consumption used for flying is larger than the UAV used for computation; In other words, the energy of UAV used for flying increases with horizon time and the energy of UAV used for computation decreases with time . Therefore, there exists a tradeoff between propulsion energy consumption of UAVs and local computation energy consumption of UAVs, and the optimal time for minimizing the total energy consumption of UAVs is left in our future work.
Viii Conclusion
In this paper, we propose four types of access schemes in the uplink transmission for mobile edge computing system. We formulate the problem as a energy minimization problem while ensuring the large number of bits of UAVs are completely computed in a given horizon time. For solving the nonconvex optimization problem, a suboptimal result is achieved by using successive convex approximation technique. The numerical results show that there exists a tradeoff between propulsion energy consumption of UAVs and computation energy consumption of UAVs. In addition, it also shows that our proposed four schemes save a large amount of energy compared with the propulsion minimization scheme.
References
 [1] Y. Zeng, R. Zhang, and J. L. Teng, “Wireless communications with unmanned aerial vehicles: opportunities and challenges,” IEEE Communications Magazine, vol. 54, no. 5, pp. 36–42, 2016.
 [2] M. Mozaffari, W. Saad, M. Bennis, Y.H. Nam, and M. Debbah, “A tutorial on uavs for wireless networks: Applications, challenges, and open problems,” arXiv preprint arXiv:1803.00680, 2018.
 [3] Z. Xiao, P. Xia, and X. G. Xia, “Enabling uav cellular with millimeterwave communication: potentials and approaches,” IEEE Communications Magazine, vol. 54, no. 5, pp. 66–73, 2016.
 [4] Q. Wu and R. Zhang, “Common throughput maximization in uavenabled ofdma systems with delay consideration,” arXiv preprint arXiv:1801.00444, 2018.
 [5] Q. Wu, J. Xu, and R. Zhang, “Capacity characterization of uavenabled twouser broadcast channel,” arXiv preprint arXiv:1801.00443, 2018.
 [6] G. Zhang, Q. Wu, M. Cui, and R. Zhang, “Securing uav communications via joint trajectory and power control,” arXiv preprint arXiv:1801.06682, 2018.
 [7] M. Alzenad, A. ElKeyi, F. Lagum, and H. Yanikomeroglu, “3d placement of an unmanned aerial vehicle base station (uavbs) for energyefficient maximal coverage,” IEEE Wireless Communications Letters, vol. 6, no. 4, pp. 434–437, 2017.
 [8] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Efficient deployment of multiple unmanned aerial vehicles for optimal wireless coverage,” IEEE Communications Letters, vol. 20, no. 8, pp. 1647–1650, 2016.
 [9] R. I. BorYaliniz, A. ElKeyi, and H. Yanikomeroglu, “Efficient 3d placement of an aerial base station in next generation cellular networks,” in Communications (ICC), 2016 IEEE International Conference on. IEEE, 2016, pp. 1–5.
 [10] Y. Zeng, R. Zhang, and T. J. Lim, “Throughput maximization for uavenabled mobile relaying systems,” IEEE Transactions on Communications, vol. 64, no. 12, pp. 4983–4996, 2016.
 [11] W. Zhao, M. Ammar, and E. Zegura, “A message ferrying approach for data delivery in sparse mobile ad hoc networks,” in Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing. ACM, 2004, pp. 187–198.
 [12] Y. Zeng, X. Xu, and R. Zhang, “Trajectory design for completion time minimization in uavenabled multicasting,” IEEE Transactions on Wireless Communications, 2018.
 [13] Y. Zeng, J. Xu, and R. Zhang, “Energy minimization for wireless communication with rotarywing uav,” arXiv preprint arXiv:1804.02238, 2018.
 [14] Q. Wu, Y. Zeng, and R. Zhang, “Joint trajectory and communication design for multiuav enabled wireless networks,” IEEE Transactions on Wireless Communications, vol. 17, no. 3, pp. 2109–2121, 2018.
 [15] D. Yang, Q. Wu, Y. Zeng, and R. Zhang, “Energy tradeoff in groundtouav communication via trajectory design,” IEEE Transactions on Vehicular Technology, 2018.
 [16] S. Jeong, O. Simeone, and J. Kang, “Mobile cloud computing with a uavmounted cloudlet: optimal bit allocation for communication and computation,” IET Communications, vol. 11, no. 7, pp. 969–974, 2017.
 [17] ——, “Mobile edge computing via a uavmounted cloudlet: Optimization of bit allocation and path planning,” IEEE Transactions on Vehicular Technology, vol. 67, no. 3, pp. 2049–2063, 2018.
 [18] X. Cao, J. Xu, and R. Zhang, “Mobile edge computing for cellularconnected uav: Computation offloading and trajectory optimization,” arXiv preprint arXiv:1803.03733, 2018.
 [19] F. Zhou, Y. Wu, H. Sun, and Z. Chu, “Uavenabled mobile edge computing: Offloading optimization and trajectory design,” arXiv preprint arXiv:1802.03906, 2018.
 [20] F. Cheng, S. Zhang, Z. Li, Y. Chen, N. Zhao, R. Yu, and V. C. M. Leung, “Uav trajectory optimization for data offloading at the edge of multiple cells,” IEEE Transactions on Vehicular Technology, vol. PP, no. 99, pp. 1–1, 2018.
 [21] J. Lyu and R. Zhang, “Blocking probability and spatial throughput characterization for cellularenabled uav network with directional antenna,” arXiv preprint arXiv:1710.10389, 2017.
 [22] S. Zhang, Y. Zeng, and R. Zhang, “Cellularenabled uav communication: Trajectory optimization under connectivity constraint,” arXiv preprint arXiv:1710.11619, 2017.
 [23] O. J. Faqir, E. C. Kerrigan, and D. Gündüz, “Joint optimization of transmission and propulsion in aerial communication networks,” arXiv preprint arXiv:1710.01529, 2017.
 [24] Y. Zeng and R. Zhang, “Energyefficient uav communication with trajectory optimization,” IEEE Transactions on Wireless Communications, vol. 16, no. 6, pp. 3747–3760, 2017.
 [25] M. Hua, Y. Wang, Z. Zhang, C. Li, Y. Huang, and L. Yang, “Powerefficient communication in uavaided wireless sensor networks,” IEEE Communications Letters, vol. 22, no. 6, pp. 1264–1267, 2018.
 [26] S. Zhang, Q. Wu, S. Xu, and G. Y. Li, “Fundamental green tradeoffs: Progresses, challenges, and impacts on 5g networks,” IEEE Communications Surveys & Tutorials, vol. 19, no. 1, pp. 33–56, 2016.
 [27] Q. Wu, G. Y. Li, W. Chen, D. W. K. Ng, and R. Schober, “An overview of sustainable green 5g networks,” IEEE Wireless Communications, vol. 24, no. 4, pp. 72–80, 2017.
 [28] Q. Wu, L. Liu, and R. Zhang, “Fundamental tradeoffs in communication and trajectory design for uavenabled wireless network,” arXiv preprint arXiv:1805.07038, 2018.
 [29] D. W. Matolak and R. Sun, “Air–ground channel characterization for unmanned aircraft systems part iii: The suburban and nearurban environments,” IEEE Transactions on Vehicular Technology, vol. 66, no. 8, pp. 6607–6618, 2017.
 [30] X. Lin, V. Yajnanarayana, S. D. Muruganathan, S. Gao, H. Asplund, H.L. Maattanen, S. Euler, Y.P. E. Wang et al., “The sky is not the limit: Lte for unmanned aerial vehicles,” arXiv preprint arXiv:1707.07534, 2017.
 [31] A. P. Miettinen and J. K. Nurminen, “Energy efficiency of mobile clients in cloud computing,” in Usenix Conference on Hot Topics in Cloud Computing, 2010, pp. 4–4.
 [32] W. Zhang, Y. Wen, K. Guan, D. Kilper, H. Luo, and D. O. Wu, “Energyoptimal mobile cloud computing under stochastic wireless channel,” IEEE Transactions on Wireless Communications, vol. 12, no. 9, pp. 4569–4581, 2013.
 [33] J. R. Lorch and A. J. Smith, “Improving dynamic voltage scaling algorithms with pace,” in ACM SIGMETRICS Performance Evaluation Review, vol. 29, no. 1. ACM, 2001, pp. 50–61.
 [34] W. Yuan and K. Nahrstedt, “Energyefficient cpu scheduling for multimedia applications,” ACM Transactions on Computer Systems (TOCS), vol. 24, no. 3, pp. 292–331, 2006.
 [35] Z. Sheng, C. Mahapatra, V. Leung, M. Chen, and P. Sahu, “Energy efficient cooperative computing in mobile wireless sensor networks,” IEEE Transactions on Cloud Computing, 2015.
 [36] C. Wang, C. Liang, F. R. Yu, Q. Chen, and L. Tang, “Computation offloading and resource allocation in wireless cellular networks with mobile edge computing,” IEEE Transactions on Wireless Communications, vol. 16, no. 8, pp. 4924–4938, 2017.
 [37] X. Chen, “Decentralized computation offloading game for mobile cloud computing,” Parallel & Distributed Systems IEEE Transactions on, vol. 26, no. 4, pp. 974–983, 2015.
 [38] D. P. Bertsekas, Nonlinear programming. Athena scientific Belmont, 1999.
 [39] Q. Wu, W. Chen, D. W. K. Ng, and R. Schober, “Spectral and energy efficient wireless powered iot networks: Noma or tdma?” IEEE Transactions on Vehicular Technology, vol. PP, no. 99, pp. 1–1, 2018.
 [40] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance of nonorthogonal multiple access in 5g systems with randomly deployed users,” IEEE Signal Processing Letters, vol. 21, no. 12, pp. 1501–1505, 2014.
 [41] J. Zhu, J. Wang, Y. Huang, S. He, X. You, and L. Yang, “On optimal power allocation for downlink nonorthogonal multiple access systems,” IEEE Journal on Selected Areas in Communications, vol. 35, no. 12, pp. 2744–2757, 2017.
 [42] D. H. Choi, S. H. Kim, and D. K. Sung, “Energyefficient maneuvering and communication of a single uavbased relay,” Aerospace & Electronic Systems IEEE Transactions on, vol. 50, no. 3, pp. 2320–2327, 2014.
Comments
There are no comments yet.