Machine Learning for Predictive Deployment of UAVs with Multiple Access

03/02/2020 ∙ by Linyan Lu, et al. ∙ Princeton University King's College London 0

In this paper, a machine learning based deployment framework of unmanned aerial vehicles (UAVs) is studied. In the considered model, UAVs are deployed as flying base stations (BS) to offload heavy traffic from ground BSs. Due to time-varying traffic distribution, a long short-term memory (LSTM) based prediction algorithm is introduced to predict the future cellular traffic. To predict the user service distribution, a KEG algorithm, which is a joint K-means and expectation maximization (EM) algorithm based on Gaussian mixture model (GMM), is proposed for determining the service area of each UAV. Based on the predicted traffic, the optimal UAV positions are derived and three multi-access techniques are compared so as to minimize the total transmit power. Simulation results show that the proposed method can reduce up to 24% of the total power consumption compared to the conventional method without traffic prediction. Besides, rate splitting multiple access (RSMA) has the lower required transmit power compared to frequency domain multiple access (FDMA) and time domain multiple access (TDMA).

READ FULL TEXT VIEW PDF
POST COMMENT

Comments

There are no comments yet.

Authors

page 1

page 2

page 3

page 4

This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

I Introduction

Since user demands for communication services grow dramatically, traditional base stations (BSs) cannot meet the required demand of the cellular traffic, which can lead to a bottleneck of cellular communication [16, 10]. Recently, there has been a growing interest in the study of unmanned aerial vehicle (UAV) communication due to its excellent attributes of versatility, maneuverability and flexibility [14]. UAV gradually plays an important role in wireless communications, which can offer low-cost and efficient wireless connectivity for devices. UAVs acting as flying BSs is one of the most important research objects in the UAV communication. Through locations adjustment, obstacle avoidance, and line-of-sight (LoS) link reinforcement, UAVs are able to offload data traffic from loaded BSs and increase the connectivity of wireless network so as to improve the communication throughput, coverage, and energy efficiency [11].

Therefore, it is a feasible and beneficial option to utilize UAVs to ensure the connectivity of wireless communication network via meeting the surging data demands. For efficient and rapid dispatch of UAVs, the prediction of potential hotspot areas plays a crucial role to help network operators acquire the information of occurrence and degrees of congestion in advance to reduce the entire network communication delay [26, 9, 22]. Machine learning techniques is a useful tool which has the ability to efficiently predict the distribution of future traffic data [3, 7, 17, 8, 5, 23, 19]. With such predictions, the target locations of UAVs can be specified beforehand and the deployment can be more intelligent and on-demand.

There are a number of existing works investigating the applications of UAV deployment in communication. In UAV deployment, UAV service areas and their optimal placements are two critical factors [12, 13, 18, 21]. In [12], UAV latitudes and 2-D locations are optimized based on circle packing theory. Then, UAV placements and service area boundaries are separately determined for power efficiency in [13]. To efficiently dispatch UAVs, some intelligent and practical methods are proposed. A functional split scheme selection of each UAV is jointed with UAV deployment in [18]. In [21], an adaptive deployment scheme is introduced to optimize UAV displacement direction, time-dependent traffic of mobile users can be served in real time.

In UAV communication, machine learning techniques are also applied to improve system performance [28, 20, 4]. The aerial channel environment is predom field position (CRF) in [29]. In [28], in order to provide more efficient downlink service, a learning approach based on the weighted expectation maximization (WEM) algorithm is used to predict downlink user traffic demand, meanwhile a traffic load contract using contract theory is introduced.

The main contribution of this work is a predictive UAV deployment scheme for UAV-assisted networking with ML approaches. Our key contributions include:

  • The cellular traffic is predicted according to the analysis of previous data by BP Neural Network model. Then, a joint K-means and EM algorithm of a Gaussian Mixture Model (KEG) is proposed to divide the entire service area into clusters as UAV service areas in the temporal and spatial patterns

    [27]. UAV locations are optimized so as to minimize the total transmit power of the whole UAV swarm network. Three different access techniques have been compared in the simulation.

  • The results show that the proposed UAV deployment framework can reduce the overall transmit power by over 23.85% compared to the conventional method. Besides, it is also shown that rate splitting multiple access (RSMA) can decrease up to 35.5% and 66.4% total power compared to frequency domain multiple access (FDMA) and time domain multiple access (TDMA), respectively.

Ii System Model and Problem Formulation

Given a time-dependent UAV-assisted wireless network, a group of ground users in the network are distributed in a geographical area . A set of UAVs assist a set of ground BSs to offload amounts of cellular traffic for congestion alleviation, so the ground users in a time-variant hotspot area have the air-ground communications with UAVs when ground BSs are overloaded.

It is assumed that the height of all users and BSs is zero compared to the UAVs. Besides, each UAV has directional antennas, so the transmissions of different UAVs will not be interfered with each other. For convenient elaboration, we specify the ground users served by a UAV as aerial users and the service area of a UAV as an aerial cell which can be expressed as . In order to consider the communication of all users fairly, the aerial cells are supposed to completely cover the entire area without any overlaps.

Because UAVs have limited energy amounts, UAVs should be efficiently deployed

Ii-a Air-ground Model

We assume that a ground user located at and a UAV located at with the aerial cell , so the uplink received power of a UAV and a ground user is calculated as:

(1)

where is the transmit power, is the antenna gain, is the free space path loss,

is the excessive path loss with a Gaussian distribution which depends on the category of link. For mathematical tractability, we give a hypothesis that all of beam alignment of ground-air links are perfect and UAV antenna gains are same. Thus,

can be a constant number . The free space path loss has a specific formula to be acquired:

(2)

where is the path loss exponent, is the system carrier frequency, is the light speed, is the distance between a UAV and a user [27].

In general, the air-to-ground transmission is separated into two main cateogories: the line-of-sight link (LoS) and the non-line-of-sight link (NLoS) . The NLoS link suffers a higher excessive path loss owing to shadowing and blockage. Figure 2 has shown these two links in the picture.


Fig. 1: The LoS Link and the NLoS Link of UAV Transmission

The excessive path loss in these two links can be expressed as and

respectively. The probability of the occurance of LoS link is similar to a sigmoid function

[1]:

(3)

where and are environment constant coefficients, is the elevation angle of a UAV and a user , so the NLoS link existing probability is [27]. Therefore, the average excessive path loss in the uplink transmission is:

(4)

To this end, the uplink data rate of a UAV and a user can be expressed as:

(5)

where is the bandwidth of a UAV and a user which can be , is the power of addictive white Gaussian noise and is its average power spectral density. For tractable formulation, each UAV can offer sufficient overall bandwidth and all transmit bandwidths are assumed to be a constant value .

Ii-B Multi-access Modes

In this paper, three different multi-access techniques will be used. They are rate splitting multiple access (RSMA), frequency division multiple access (FDMA) and time division multiple access (TDMA) [25]. We set two users as an example to give a series of theoretical formulas and set and are the actual data rates of two users, and are the channel gains of two users which include the antenna gain, free space path loss and the excessive path loss.

RSMA is a multi-access mode with coding and decoding techniques, the equations for maximizing the sum-rate of users for uplink transmission are shown below [24, 25]:

(6)

FDMA is a technique of BS bandwidth allocation for users to avoid interference of transmissions in the same area, where and are the weight coefficients.

(7)

Similarly, TDMA assigns the partial time period to users who can use the whole bandwidth, the equations have been represented.

(8)

In simulation and analysis section, we will compare these three multi-access modes for choosing a best one to minimize the total transmit power.

Ii-C Uplink Transmit Power Computation

Network operators require to assign UAVs to those traffic congestion areas so as to offload the heavy traffic from busy BSs. For UAVs, continuous movements will consume too much transmit power. Thus, we need to analyze the situation of traffic offloading. A data set is presented as a matrix :

(9)

where is the time of an hour,

is the time moment and

is the day. represents the amount of cellular traffic offloaded from a BS located at in a period of in the day [27]. In this paper, for the conveinience of simulation and analysis, we assume that all cellular traffic of BSs are totally offloaded to UAVs.

Since the positions of mobile users are uncertain and most of mobile users only move around a single BS in a period of an hour, we assume that all ground receivers have the same positions as their nearst BSs.

After obtaining the future predictive traffic information through the implementation of ML methods based on the matrix , the required average data rate within a aerial cell in a period of will be given. Only when the communication throughput of UAV is not less than the demanded data rate, the communication can be ensured. Therefore, the communication condition is formulated as:

(10)

where R(x,y) is the maximum data rate of the overall transmission between a group of ground users in a ground cell with a BS at and a UAV . We can simplify this equation as

(11)

Let us set , is the minimal requirement of average data rate. Combining the formula (3.5) and (3.10), the minimum power for transmission should be provided by a UAV will be:

(12)

where both and are between the UAV and the group of ground users in a ground cell of the BS at , is the path loss in free space, is the excessive path loss. This equation provide a target basis for UAV location optimization.

This section proposes a novel predictive scheduling scheme of UAV based on ML. According to the real data set in City Cellular Traffic Map [6] and the characteristics of celluar data traffic, for the sake of the efficiency of UAV deployment, we make some rational assumptions. Because humans have a certain pace of life with periodic acitivity, the change of cellular data traffic has a repetitive pattern in daily life [15]

. Thus, we assume that the cellular traffic amount has specific distribution in the same hour in different days and the data of each hour in the same day is independent. To this end, the real data set can be classified into 24 independent models and we assume each single model follows the Guassian mixture model which will be explained in section 4.3.

The logical procedure diagram of UAV predictive deployment is shown in Figure 3. At first, the acquired real data set is preprocessed to get the cellular traffic amount of every hour in the first 5 days and the topology information of every BS , where is the relative longitude of BS and is the relative latitude of BS. Then, a BP neural network model for cellular traffic amount prediction is come up to predict the cellular amount in hours in the day. At the same time, a joint K-means and EM algorithm relying on a GMM for aerial cell classification (ground user clustering) is created, the point cluster label of every single point is obtained, the point with the same label value consists of an aerial cell. Then, the optimal UAV locations for minimizing total transmit power is derived according to the system model introduced in section 3. The purpose of whole process is to achieve an UAV aid of the on-demand, power-effective, lantency-free network services.


Fig. 2: The Logical Procedure Diagram of UAV Predictive Deployment

Ii-D Cellular Demand Prediction

In this part, a simple BP neural network model is utilized to predict the future cellular demand in an hour. Neural network has a variety of categories and BP neural network is the most basic one. The theory introduction is shown below.

Ii-D1 The Neuron Model

Refere to biological neural systems, the basic component of neural networks is neuron model. In a biological neural system, every neuron is connected to other neurons. A neuron accepts some chemical materials (chemical messages) as its input emanated from other connected neurons, the electrical potential in this neuron changes; If the amount of the input is enough, the electrical potential exceeds to a threshold, this neuron will be activated and send chemical materials to other neurons.

The famous McCulloch and Pitts model (M-P) of neuron as Figure 4 is based on the above description, which can be formulated in a mathematical form:

(13)

where is the input of the neuron, is its corresponding weight, is a threshold of activation, and

is an activation function with multiple forms. The step function is the most ideal activation function, but it is discontinuous and not smooth, so it is not convenient to do the operations of integral and differential. Hence, in most cases, we usually use a canonical example, the sigmoid function which can squash the large range of input values into the range from 0 to 1 of outputs. The step function and the sigmoid function are shown in the Figure 5.


Fig. 3: M-P Neuron Model

Fig. 4: The Step Function and the Sigmoid Function

When enough training data sets are given, the weights and threshold can be obtained by learning. The threshold can be seen as a dummy node with fixed input , so the learning of weights and threshold can be jointed together. For a single training data set (,), the current output is for the input . Weight updating can be shown as:

(14)
(15)

where is a learning rate. In this way, the weight will be adjusted until . This is a single functional neuron, its learning ability is very limited. Thus, we always add the hidden layers to compose a multi-layer feedforward nerual network.

Ii-D2 Error Backpropagation

For multi-layer networks, BP(backpropagation) is one of the most successful learning algorithms. BP algorithm is not only used in the multi-layer feed forward networks, but also used in other networks such as recurrent neural networks. The basic structure of the neural networks consists of an input layer and an output layer with multiple hidden layers between them. For clear and concise description, the number of hidden layers is set to

.

The input layer is , the hidden layer is , and the output layer is . The weight between the input layer node and the hidden layer node is , The weight between the hidden layer node and the output layer node is . The variable symbols and the BP network model with three layers are shown in Figure 6, the weights are also represented.


Fig. 5: Multilayer Network Sketch

For node of hidden layer and node of output layer, the inputs and the outputs are shown below:

(16)

Then the mean square error can be obtained as following, where is for the convenience of the subsequent calculation.

(17)

Because BP algorithm is based on gradient descent algorithm, parameters are adjusted according to the negative gradient. Set the gradient of output layer as an example, the change of weight can be written as

(18)

Besides, the chain rule can make the formula as

(19)
(20)

The intermediate variable of gradient can be obtained as

(21)

Therefore, the gradient of the hidden layer is similar,

(22)

Finally, we can get the update of weights and thresholds for the hidden and output layer,

(23)

Note that the aim of BP algorithm is to minimize the accumulate error for all training data sets. The workflow of BP algorithm is represented in Algorithm 1. The stop condition is that the iteration has achieved the peak value or the error is smaller than a minimum threshold.

0:  A training data set , a learning rate .
  Randomly initiate all weights and thresholds , , ,
  repeat
     for all  do
        Calculate the current output using Equation (4.4)
        Calculate intermediate variable of gradient and using Equation (4.9) and (4.10)
        Update weights and threshold , , , using Equation (4.11)
     end for
  until The stop condition is reached
  Weights and thresholds , , ,
Algorithm 1 BP Algorithm [30]

However, BP algorithm has some inadequacies. Overfitting problem is very obvious because of the powerful presentation of BP networks, early stopping method and regularization method are often used to prevent this situation. The limitation of local minimum is another problem, people usually utilize simulated annealing, genetic algorithm and random gradient descent algorithm to solve it

[30].

Ii-E Ground User Clustering

Ground user clustering is a key step in UAV deployement, which also means the partition of UAV aerial cells. In order to satisfy the fairness and globality of division, we adopt a KEG algorithm to implement service area classification. And To show the algorithm practicability, we use the topology information part of City Cellular Traffic Map [6] as the real data set.

Ii-E1 The K-means Algorithm

The K-means algorithm is a most basic non-hierarchical iterative clustering algorithm, belonging to unsupervised learning. The goal of this algorithm is to cluster data points with very low inter-cluster similarity as well as very high intra-cluster similarity

[2]. The similarity often denotes the distances between data points.

Giving a data set composed of number of -dimensional variables . We divide this data set into clusters, each cluster has a centroid. At first, we set the centroids of clusters are vectors with dimensions. These vectors usually randomly take variables from the given data set for initialisation. To realize the algorithm goal, each data point is supposed to be as close as possible to its cluster centroid, and the distances of each data point and other cluster centroids should be as large as possible. Thus, we set that point cluster label indicates which cluster the data point belongs to, this variable can be formulated as:

(24)

Then, we assign every data point to its nearest cluster and update the point cluster label after the distances between each data point and cluster centroids are calculated. The third one is to update cluster centroids according to those data point label. The specific K-means algorithm is shown as Algorithm 2.

0:  The cluster number , the data point set .
1:  Initialize as variables chose from randomly, initialize as an

all-zero matrix

2:  repeat
3:     for all  do
4:        Allocate each data point to cluster
5:        Update point labels
6:        Calculate cluster centroids ,
7:     end for
8:  until  will not be changed.
8:  The point cluster label , the cluster centroids
Algorithm 2 K-means Algorithm [2]

On the one side, although the K-means algorithm has the capability to cluster data points, it cannot find the latent variables corresponding the observed data. On the other side, the principle of the K-means is simple and it is easy to implement the simulation because of its fast convergence and good clusting effect, it can be a pratical data initializer for other complex algorithms.

Ii-E2 The EM Algorithm

The EM algorithm has the ability to recognize the important role of latent variables in a joint distribution. Its goal is to acquire maximum likelihood results for the models with latent variables

[2].

In a mixed distribution model, given a sample data set with an unknown latent variable set , we want to find the suitable parameter set to well discribe the joint distribution [2]. However, the observed variable set and the latent variable set are determined by parameter set . And we are only given the incomplete data set without , so we cannot get the optimal parameter set . To facilitate analysis, a log likelihood function is defined as:

(25)

And a posterior distribution about the latent variable set is introduced. Thus, our goal is changed to get the maximum likelihood function with regard to

. The iteration of EM mainly consists of two step: Expectation step (E step) and Maximum step (M step). In E step, we evalulate the posterior probability

; In M step, we operate the log likelihood maximization to update parameter set [2]. The iteration stops until the convergence of the log likelihood function is checked. The specific algorithm is shown in Algorithm 3.

0:  The observed variable set
1:  Initialize the parameter set ,
2:  repeat
3:     E step Calculate the posterior probability
4:     M step Calculate
5:     Update the parameter set ,
6:  until The log likelihood function converges.
6:  The posterior probability , the parameter set
Algorithm 3 EM Algorithm [2]

The EM algorithm can also have good performance in the situation of missing some observed variable values, the observed variable distribution can be aquired by marginializing those missing value and taking the whole joint variable distribution. In this case, the data returned by the sensor which has some values missing can also be well processed. Therefore, in the scenario of our ground user clustering, EM algorithm is a useful method to find the latent variables in data set and classify users in a fair manner.

Ii-E3 The KEG Algorithm

In this paper, the cellular traffic distribution is complex and time-varying, but a GMM, a linear Gaussian-component superposition model has a remarkable advantage of abundantly representing data distribution. We model the cellular traffic distribution by the GMM as:

(26)

where is the tolopogy information of the whole area and is every data point with dimensions. represents as a probability function, is Gaussian component number and denotes a specific one Gaussian component, the mixing coefficient equals one or zero has , is the mean values corresponding to the cluster centroids with dimensions, is the covariance with dimensions. Besides, in a GMM, the latent variables are discrete.

To this end, we introduce the KEG algorithm based on the K-means algorithm and the EM algorithm. In the KEG algorithm, the EM part aims to find the discrete latent variables and the suitable parameters for analyzing data distribution and clustering data set. Even if a data set is incomplete with missing some values, the EM can also process the data set in a suitable manner. In the EM part, the value of the log likelihood function will increase with the number of iteration rising. When the log likelihood function does not change anymore, the current parameters are the aims we want to obtain. But since this algorithm usually needs many iterations to reach the convergent point, the K-means part is utilized as a data initializer to provide appropriate and rational initialized values. The integrated KEG algorithm is demonstrated in Algorithm 4.

0:  The topology data set , the clustering number
1:  Set a variable as the dimension of , initialize the means as a -by- matrix by using the K-means algorithm, the covariance as a -by-identical matrix and mixing coefficients , .
2:  repeat
3:     for all  do
4:        E step: Compute the posterior probability of all by
5:        For every , allocate it to the cluster
6:        M step: Calculate the new parameters
7:     end for
8:     Calculate the log likelihood using , and , for
9:     Update the parameters as , ,
10:  until The log likelihood function is converged.
10:  The parameters , , , the cluster labels .
Algorithm 4 KEG algorithm

When the parameters are obtained, the predicted cellular traffic amount data is used as the input, only step and step of Algorithm 4 is operated, we can get the cluster label of the data points that indicates which cluster the data point belongs to.

Ii-F UAV Location Optimization

After determining the aerial cells using the KEG algorithm, our next aim is to select a optimal location for every UAV so that the minimum transmit power can be gotten. No matter whether UAVs are in a high altitude platform or a low altitude platform, we assume that all UAVs are in the same altitude , we can formulate this problem as:

(27)

where is not relevant to the locations of BS in the service area, is the BS distribution and denotes the cellular data amount of BS at in a hour in the predictive day, is the distance between the UAV and the BS at , is also related to for the computation of LoS link probability.

According to the Theorem 1 of paper [13], the function to get is a convex function, UAV optimal locations can be calculated as:

(28)
(29)

where there is a condition or to be satisfied [13].

At last, we accumulate the transmit power of all operating UAV to get the minimum total power for transmission:

(30)

Iii Simulation and Analysis

Iii-a Illustration of Simulation Process

For simulation, we consider two scenrios, one is the entire area given from the raw data, the other is the limited area with the relative longitude from to degrees and the relative altitude from to degrees. The limited area is the contrast of the entire area. And for a specific contrast, we classify the entire area and the limited area into clusters. Some parameters used in the simulation have been given the specific values which are shown in Table 1. Moreover, for getting the rational simulation results, we assume that all BSs have a basic celluar amount bytes for basic operation, so all the cellular amounts we get from the raw data add .

Carrier frequency 5GHz
Noise power spectral -140dBm/Hz
Excessive path loss for LoS link 3dB
Excessive path loss for NLoS link 23dB
Bandwidth 1MHz
UAV’s altitude 200m
Antenna gain 10dB
TABLE I: Simulation Parameters

For BP neural network part, we use the nftool built-in box of MATLAB to implement the cellular traffic amount prediction. We assume that every BS has the same cellular traffic distribution, we set that the input is the cellular traffic amount of the first six days and the output is the amount of the seventh day. The input in the training data set form is , where the input layer is the first days cellular amount and the output layer is the day cellular amount.

We choose trainrp as the training function and set that the neural network has 2 hidden layers with and neurons respectively, the network structure is shown in Figure 7. Then we do data training to find the suitable parameters for our neural network model. The user interface of neural network training is shown in Figure 8.


Fig. 6: Neural Network Structure

Fig. 7: Neural Network Training

After training, the input layer is set as , then this output layer is what we want to obtain. Furthermore, the ratio of training data is , valuating data is and testing data is . The data training is for updating weights, the data evaluation is to detect the overfitting problem and to avoid it as soon as possible, the data testing is to examine the performance of the neuron network. In addition, all the cellular data amounts are normalized using min-normalizaion mothed to make sure every single value is ranged from to .

Then, for the application of the KEG algorithm, we give two conditions for finishing the iterations: the first one is the minimum threshold for parameter error of two neighboring iterations, the second one is the maximum iteration times. If any of these conditions are met, the algorithm ends.

Iii-B The Comparision of Three Multi-access Techniques

In the proposed UAV deployment framework, RSMA as an excellent option of multiple access technique is adopted in the uplink transmission. FDMA and TDMA have been developed maturely, but RSMA with excellent robustness and energy effeciency enjoys great popularity in the new generation of communications.

The Figure 9 is shown below which represents the comparison the performance of RSMA, FDMA and TDMA. For all three of multi-access techniques, with the increasing of bandwidth, the system can reduce the total power. But RSMA is the best one which has the lowest power consumption in all bandwidths. Then FDMA is the second best and it is better than TDMA. RSMA can reduce 35.3% power than FDMA and 66.4% than TDMA. Therefore, in this paper, we use RSMA for uplink transmission.


Fig. 8: Comparison of Three Multi-access Modes

Iii-C The Simulation Results of the Limited Area and the Entire Area

In order to verify the usefulness and robustness of the KEG algorithm, we use the data of the limited area and the entire area to do the simulation. The comparison results of the K-means part are shown in Figure 10 and Figure 11 and the EM part are shown in Figure 12 and Figure 13.


Fig. 9: K-means for the Limited Area

Fig. 10: EM for the Entire Area

Fig. 11: EM for the Limited Area

In the Figure 9, 10, 11 and 12, the scattering points are the locations of BS. The group of the points with the same color represents a cluster which is an aerial cell of a UAV. The black crosses denotes the centroids of every cluster. As we can see, for the K-means part, both the entire area and the limited area have distinct boundaries of service cell and the centroids locate at the clusters with the corresponding colors. But for the EM part, the clusters have the containing and contained states, the centroids may not appear in the clusters with their own colors. The corresponding situation of the limited area is much better than that the entire area.

Iii-D The Effect of Proposed UAV Scheduling Framework

The main goal of UAV deployment in this paper is to minimize the total transmit power in the uplink transmission. Thus, based on this goal, we divide the area into the ground user clusters for aerial cell classification and determine the optimal locations of UAVs. The Figure 14 shows the schematic sketch of UAV deployment for the entire area and the limited area.


Fig. 12: Deployment Results

As shown in the Figure 14, the number of UAV of the limited area is , but the one of the entire area changes into because the system with our proposed framework judges that UAVs are enough to supply the offloaded cellular data amount, this decision is made during the clustering of the K-means part. Because the initial centroid of the merged category chooses an unfavorable position leading to a low similarity in the cluster.


Fig. 13: Power Comparison for the Limited Area

Fig. 14: Power Comparison for the Entire Area

Then we use the total transmit power of four different schemes to evaluate the performance of the proposed framework. Experimental schemes are a scheme with KEG and location optimization, a scheme without KEG but with location optimization, a scheme with KEG but without location optimization, and a scheme without neither KEG or location optimization.

For the limited area, the power comparison of four schemes is represented in Figure 15. In general, the scheme with KEG and location optimization consume the least total transmit power. The performance of the one with no KEG and no location optimization is worst. The remaining two types of scheme have similar performance in general. The scheme with KEF and location optimization reduce 24% power consumption than the worst one. For the entire area, four schemes have been contrasted in Figure 16. Obviously, the scheme without KEG but with location optimization has the best effect for system performance improvement. Next, the scheme with KEG but no location optimization is better than the one with location optimization but no KEG. The scheme with no KEG and no location is the worst scheme. The scheme with KEF and location optimization reduce 0.47% power consumption than the worst one.

Based on the above simulation results, our proposed framework is not suitable to apply only several UAVs in the entire area. The number of UAVs is too small to carry the full range of traffic of an entire city. But still in this situation, the scheme with KEG and location optimization has some contributions for reducing the total transmit power consumption. Our UAV deployment framework has good performance for relatively small area below dozens of square kilometers, especially for those areas with the approximate GMM cellular data amount distribution.

Iv Conclusion

In this paper, we have investigated the UAV location optimization in a downlink system. To effectively optimize the UAV location, we fist predice the user traffic distribution by a joint K-means and EM algorithm based on GMM. With the predicted traffic distribution, the optimal locations for UAVs are accordingly obtained. Simulation results show that RSMA reduces total power consumption compared to FDMA, and TDMA.

References

  • [1] A. Al-Hourani, S. Kandeepan, and S. Lardner (2014) Optimal lap altitude for maximum coverage. IEEE Wireless Communications Letters 3 (6), pp. 569–572. Cited by: §II-A.
  • [2] C. M. Bishop (2006) Pattern recognition and machine learning. Cited by: §II-E1, §II-E2, §II-E2, §II-E2, Algorithm 2, Algorithm 3.
  • [3] M. Chen, U. Challita, W. Saad, C. Yin, and M. Debbah (2019-Fourthquarter) Artificial neural networks-based machine learning for wireless networks: a tutorial. IEEE Commun. Surveys Tut. 21 (4), pp. 3039–3071. Cited by: §I.
  • [4] M. Chen, M. Mozaffari, W. Saad, C. Yin, M. Debbah, and C. S. Hong (2017-05) Caching in the sky: proactive deployment of cache-enabled unmanned aerial vehicles for optimized quality-of-experience. IEEE J. Sel. Areas Commun. 35 (5), pp. 1046–1061. Cited by: §I.
  • [5] M. Chen, Z. Yang, W. Saad, C. Yin, H. V. Poor, and S. Cui (2019) A joint learning and communications framework for federated learning over wireless networks. arXiv preprint arXiv:1909.07972. Cited by: §I.
  • [6] X. Chen, Y. Jin, S. Qiang, W. Hu, and K. Jiang (2015) Analyzing and modeling spatio-temporal dependence of cellular traffic at city scale. In 2015 IEEE International Conference on Communications (ICC), pp. 3585–3591. Cited by: §II-C, §II-E.
  • [7] P. Dong, H. Zhang, G. Y. Li, I. S. Gaspar, and N. NaderiAlizadeh (2019)

    Deep cnn-based channel estimation for mmwave massive mimo systems

    .
    IEEE J. Sel. Topics Signal Process. 13 (5), pp. 989–1000. Cited by: §I.
  • [8] G. Jia, Z. Yang, H. Lam, J. Shi, and M. Shikh-Bahaei (2020) Channel assignment in uplink wireless communication using machine learning approach. arXiv preprint arXiv:2001.03952. Cited by: §I.
  • [9] Z. Li, M. Chen, C. Pan, N. Huang, Z. Yang, and A. Nallanathan (2019-04) Joint trajectory and communication design for secure uav networks. IEEE Commun. Lett. 23 (4), pp. 636–639. Cited by: §I.
  • [10] J. Lyu, Y. Zeng, and R. Zhang (2018) UAV-aided offloading for cellular hotspot. Vol. 17, pp. 3988–4001. Cited by: §I.
  • [11] M. Mamdouh, M. A. Elrukhsi, and A. Khattab (2018) Securing the internet of things and wireless sensor networks via machine learning: a survey. In 2018 International Conference on Computer and Applications (ICCA), pp. 215–218. Cited by: §I.
  • [12] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah (2016) Efficient deployment of multiple unmanned aerial vehicles for optimal wireless coverage. Vol. 20, pp. 1647–1650. Cited by: §I.
  • [13] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah (2016) Optimal transport theory for power-efficient deployment of unmanned aerial vehicles. In 2016 IEEE international conference on communications (ICC), pp. 1–6. Cited by: §I, §II-F.
  • [14] M. Mozaffari, W. Saad, M. Bennis, Y. Nam, and M. Debbah (2019) A tutorial on uavs for wireless networks: applications, challenges, and open problems. Cited by: §I.
  • [15] U. Paul, A. P. Subramanian, M. M. Buddhikot, and S. R. Das (2011) Understanding traffic dynamics in cellular data networks. In 2011 Proceedings IEEE INFOCOM, pp. 882–890. Cited by: §II-C.
  • [16] W. Saad, M. Bennis, and M. Chen (2019) A vision of 6G wireless systems: Applications, trends, technologies, and open research problems. arXiv preprint arXiv:1902.10265. Cited by: §I.
  • [17] Y. Shi, K. Yang, T. Jiang, J. Zhang, and K. B. Letaief (2020) Communication-efficient edge ai: algorithms and systems. arXiv preprint arXiv:2002.09668. Cited by: §I.
  • [18] L. Wang and S. Zhou (2018) Energy-efficient uav deployment with flexible functional split selection. In 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), pp. 1–5. Cited by: §I.
  • [19] Y. Wang and V. Friderikos (2019)

    Caching as an image characterization problem using deep convolutional neural networks

    .
    arXiv preprint arXiv:1907.07263. Cited by: §I.
  • [20] Y. Wang, M. Chen, Z. Yang, T. Luo, and W. Saad (2019) Deep learning for optimal deployment of uavs with visible light communications. arXiv preprint arXiv:1912.00752. Cited by: §I.
  • [21] Z. Wang, L. Duan, and R. Zhang (2019) Adaptive deployment for uav-aided communication networks. IEEE Transactions on Wireless Communications 18 (9), pp. 4531–4543. Cited by: §I.
  • [22] Z. Yang, C. Pan, M. Shikh-Bahaei, W. Xu, M. Chen, M. Elkashlan, and A. Nallanathan (2018-Aug.) Joint altitude, beamwidth, location, and bandwidth optimization for UAV-enabled communications. IEEE Commun. Lett. 22 (8), pp. 1716–1719. External Links: Document, ISSN 2373-7891 Cited by: §I.
  • [23] Z. Yang, M. Chen, W. Saad, C. S. Hong, and M. Shikh-Bahaei (2019) Energy efficient federated learning over wireless communication networks. arXiv preprint arXiv:1911.02417. Cited by: §I.
  • [24] Z. Yang, M. Chen, W. Saad, and M. Shikh-Bahaei (2019) Optimization of rate allocation and power control for rate splitting multiple access (RSMA). arXiv preprint arXiv:1903.08068. Cited by: §II-B.
  • [25] Z. Yang, M. Chen, W. Saad, W. Xu, and M. Shikh-Bahaei (2019) Sum-rate maximization of uplink rate splitting multiple access (RSMA) communication. arXiv preprint arXiv:1906.04092. Cited by: §II-B, §II-B.
  • [26] J. Zhang, X. Zhu, and Z. Zhou (2010) Design of time delayed control systems in uav using model based predictive algorithm. In 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics (CAR 2010), Vol. 1, pp. 269–272. Cited by: §I.
  • [27] Q. Zhang, M. Mozaffari, W. Saad, M. Bennis, and M. Debbah (2018) Machine learning for predictive on-demand deployment of uavs for wireless communications. In 2018 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. Cited by: 1st item, §II-A, §II-A, §II-C.
  • [28] Q. Zhang, W. Saad, M. Bennis, X. Lu, M. Debbah, and W. Zuo (2018) Predictive deployment of uav base stations in wireless networks: machine learning meets contract theory. arXiv preprint arXiv:1811.01149. Cited by: §I.
  • [29] S. Q. Zhang, F. Xue, N. A. Himayat, S. Talwar, and H. Kung (2018) A machine learning assisted cell selection method for drones in cellular networks. In 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), pp. 1–5. Cited by: §I.
  • [30] Z. Zhou (2010) Machine learning. In Bioinformatics (Oxford, England), External Links: Document, 0-387-31073-8, ISBN 9787302423287, ISSN 1367-4811 Cited by: §II-D2, Algorithm 1.