Professional Documents
Culture Documents
Abstract—In this article, we investigate joint trajectory design UAVs. In [22]–[24], the UAVs are regarded as aerial users and
and resource allocation algorithms to maximize the minimum connected to the ground BSs of cellular networks. In [22], the
average rate among ground users for unmanned aerial vehicle pathloss between the UAV UE and the ground BS is measured.
(UAV) communication systems, where both the orthogonal mul-
tiple access (OMA) and non-orthogonal multiple access (NOMA) In [23] and [24], the uplink of the cellular-connected UAV
modes are considered. We first formulate the problems for UAV network is investigated and the interference due to the unique
communications with the OMA and NOMA modes, respectively, air-to-ground channel is managed. While in [25]–[30], the
which contain binary variables and highly coupled nonconvex UAVs are considered as aerial quasi-static BSs or relays to
objective functions and constraints. In order to handle the support ground users in a given area. The deployment and al-
challenging problems, we transform the original problems into
more tractable forms and then develop novel algorithms based titudes of the UAVs are optimized to improve the performance
on penalty dual-decomposition (PDD) technique to solve them. of the network with a limit number of UAVs. Mobile-UAV
Simulation results show that the proposed algorithms outperform networks, with the moving UAV BS instead of hovering at
the benchmarks. a fixed place, are also investigated. In [31], the UAV relay
Index Terms—UAV communications, trajectory optimization, flies in a circular trajectory and the resource allocation is
resource allocation, NOMA. optimized to maximize the energy efficiency. Recently, the
UAV trajectory is also considered in optimization to further
improve the capacity [32], [33], physical security [34], energy
I. I NTRODUCTION efficiency [35], [36], and average age-of-information [37].
Non-orthogonal multiple access (NOMA) can improve the In [37], the authors jointly optimize the trajectory as well as
capacity and support massive connectivity in the fifth gen- energy and service time allocations to minimize the average
eration (5G) and Internet of Things (IoT) networks [1]–[4]. age-of-information for IoT networks.
Different from traditional orthogonal multiple access (OMA),
Usually, the users are assumed to be multiplexed in a time
NOMA1 utilizes power domain in multiplexing in order to
division multiple access (TDMA) mode when performing UAV
support multiple users sharing the same resource block. As a
trajectory optimization [32], [34], [36], [37]. In TDMA, a user
result, more users can be served with limited resource blocks
either communicates in a basic time slot or not. Therefore,
and the network capacity is also improved but at the cost of
the scheduling variable must be binary. However, for the
extra interference and additional complexity at the receiver.
algorithms already proposed in the literature, the scheduling
The basic NOMA has been first proposed in [5]. Then,
variables are usually non-binary for optimal performance. One
various NOMA related techniques have been investigated,
way to address the issue is to divide the original time slots into
including multiple antenna based NOMA [6]–[8], cooperative
more sub-slots and assign fractional resource accordingly [32],
NOMA [9]–[11], power allocation in NOMA [12]–[14], phys-
[34], [36]. Nevertheless, dividing a large time slot into too
ical layer security in NOMA [15], and spectral and energy
many small time slots may increase the burden of synchro-
efficiency in NOMA [16]–[18].
nization and cause other practical issues. Motivated by this, we
Unmanned aerial vehicle (UAV) communications are also
investigate the algorithm that can directly converge to binary
attracting increasing interest recently due to flexible deploy-
solutions in this paper. On the other hand, NOMA with proper
ment, high mobility, and low cost [19], [20]. The UAV can be
power allocation may achieve higher transmission rate than
either used as an aerial user equipment (UE) [21]–[24] or a
OMA [5], which can be potentially used in UAV networks.
base station (BS) [25]–[37]. In [21], a three-dimensional (3D)
There have been several studies that investigate the application
cellular network is introduced, where both the BS and UE are
of NOMA in UAV networks [38]–[40]. The work in [38]
F. Cui, Y. Cai and M. Zhao are with the College of Information Science analyzes the outage performance of mobile-UAV network with
and Electronic Engineering, Zhejiang University, Hangzhou 310027, China a fixed circular trajectory. In [39], NOMA is employed in
(e-mail: cfy531@zju.edu.cn; ylcai@zju.edu.cn; mjzhao@zju.edu.cn). the network where the UAV works as the static BS and
Z. Qin is with the School of Electronic Engineering and Computer
Science, Queen Mary University of London, London E1 4NS, U.K. (email: optimize the altitude. However, to the best of our knowledge,
z.qin@qmul.ac.uk). the trajectory optimization for NOMA based UAV network has
G. Y. Li is with the School of Electrical and Computer Engineering, Georgia not been investigated yet. The challenge of this issue comes
Institute of Technology, Atlanta, USA (e-mail: liye@ece.gatech.edu).
from the varying successive interference cancellation (SIC)
1 Power domain NOMA [5] is considered in this article. order in NOMA detection during the flight of the UAV. In this
2
where ρ0 denotes the channel power gain at the reference αk (n) ∈ {0, 1}, ∀n, k, (11e)
distance 1 m.
where (11d) and (11e) ensure that at most one user is sched-
The main difference between the OMA and NOMA modes
uled at each time slot.
is the access scheme of ground users. In the OMA mode, the
UAV only communicates with one user during each time slot
so that all the transmission power is allocated to one user. C. NOMA mode
Therefore, the signal-to-noise ratio (SNR) for user k at time We formulate the optimization problem for the NOMA
slot n in OMA can be expressed as mode here. The achievable average rate of user k over all
|hk (n)|2 P ρ0 P the N time slots can be expressed as
γOMA,k (n) ≜ = 2 2 , ∀n, k,
σ (dh + ∥q(n) − wk ∥2 ) 1 ∑
σ 2 N
Both problems in (11) and (13) contain binary variables Moreover, the binary variables {αk (n)} are also hard
and highly coupled nonconvex terms in the objective function, to handle. Therefore, we introduce the auxiliary vari-
which makes it hard to find the global optimal solution. ables {α̃k (n)} and equivalently transform the binary con-
Moreover, the problem in (13) is even more challenging due straints in (11e) as
to the additional binary indicators {βk,l (n)} determined by
αk (n)(1 − α̃k (n)) = 0, ∀ n, k, (17)
the trajectory variables. Therefore, we transform the prob-
lems into more tractable forms and propose PDD based and
joint optimization schemes to find the local stationary so- αk (n) = α̃k (n), ∀ n, k. (18)
lutions in the following sections. The basic framework of
the PDD method can be found in Appendix A. Note that if We can easily find that the equality constraints hold only
nonconvex constraints exist in the problem, concave-convex when αk (n) = α̃k (n) ∈ {0, 1}. Therefore, the actual feasible
procedure (CCCP) method [41] can be employed in the inner set of the solution is not changed if we utilize these two
loops of the PDD method to handle them. We summarize the equality constraints, which are easier to tackle in the PDD
procedures on developing the PDD-based algorithm in this based algorithm, to replace the binary constraints in (11e).
paper in Fig. 2. From the above discussion, we can finally transform the
problem in (11) to the following equivalent problem
max t̃ (19a)
III. O PTIMIZATION FOR OMA MODE Z̃OMA
s.t. (14b) − (14d), (15), (16), (19b)
In this section, we first transform the original problem for
the OMA mode, i.e., (11), into an equivalent one that is more (17), (18), (11b) − (11d), (19c)
tractable. Then we develop a PDD based algorithm to solve where Z̃OMA ≜ {t̃, tk (n), q(n), αk (n), θk (n), θ̃k (n), πk (n),
it. α̃k (n)}. We can observe that the objective function t̃ is a
scalar continuously differentiable function. All the variables
in Z̃OMA can be searched in the real number field, which is a
A. Problem transformation
closed convex set. Moreover, the functions in inequality con-
First, in order to handle the highly coupled objective func- straints (11b), (11d), (14b) − (14d), (15), and (16) are all dif-
tion, we introduce the auxiliary variables {t̃, tk (n), θk (n), ferentiable. While the functions in equality constraints (11c),
θ̃k (n)} and transform the problem in (11) as (17) and (18) are continuously differentiable. Therefore, the
problem in (19) satisfies the general framework for the PDD
max t̃ (14a) method, which is shown in (45) in Appendix A.
ZOMA
∑
N
s.t. tk (n) ≥ t̃, ∀k, (14b) B. Algorithm
n=1 In this subsection, we utilize the PDD method to solve
αk (n)θ̃k (n) ≥ tk (n), ∀n, k, (14c) the problem in (19). First, in order to tackle the equality
constraints, we incorporate the corresponding AL terms into
log(1 + θk (n)) ≥ θ̃k (n), ∀n, k, (14d)
the objective function. In each outer loop, the penalty param-
γOMA,k (n) ≥ θk (n), ∀n, k, (14e) eter, ϱ, or the dual variable, λ, will be updated according to
(11b) − (11e), (14f) the constraint violation. Then, by applying linearization, we
approximate the nonconvex constraints of the AL problem as
where ZOMA ≜ {t̃, tk (n), q(n), αk (n), θk (n), θ̃k (n)}. The convex ones and propose an algorithm to solve the problem
equivalence between (11) and (14) is demonstrated in Ap- in each inner loop. Finally, we present the overall PDD based
pendix B. double-loop iterative algorithm.
Since the expression of SNR, i.e., γOMA,k (n), is in fractional 1) AL problem: In order to address the equality constraints,
form, the constraint in (14e) is hard to handle. Therefore, we incorporate the corresponding AL terms into the objective
we introduce the auxiliary variables {πk (n)} as the upper function and obtain the following AL problem
bound of the expression σ 2 (d2h + ∥q(n) − wk ∥2 )), and then
1 ∑∑(
N K
equivalently transform (14e) as the following two constraints max t̃ − |αk (n) − α̃k (n) + ϱλ1,k (n)|2
Z̃OMA 2ϱ n=1 k=1
πk (n)θk (n) ≤ ρ0 P, ∀ n, k, (15) )
+ |αk (n)(1 − α̃k (n)) + ϱλ2,k (n)|2 (20a)
and s.t. (14b) − (14d), (15), (16), (11b) − (11d), (20b)
σ 2 (d2h + ∥q(n) − wk ∥2 )) ≤ πk (n), ∀ n, k. (16) 0 ≤ αk (n) ≤ 1, ∀n, k, (20c)
5
Fig. 2: The procedures on developing the PDD-based algorithm in this paper.
where (20c) has no influence on the optimality and is intro- method to approximate (14c) to the SOC constraint in (23)
convergence speed4 . The PDD method
duced to improve the Besides, following the same procedure in Appendix D, the
utilizes a double-loop structure. In each outer loop, the dual convex constraint in (16) can also be rewritten as the following
variable, λ, is updated when the constraint violation is under SOC form
some threshold, otherwise the penalty coefficient, ϱ, is up-
dated. While in the inner loops, we iteratively solve the AL
[ ]
2
2
problem in (20) to find the optimal solution of the current
(q(n) − wk )T , πk (n) − dh − 1
≤ πk (n) − dh + 1 .
2σ 2 2 2
2σ 2 2 2
outer loop.
(24)
2) Proposed iterative algorithm for solving (20): As dis-
cussed above, in the outer loops we only need to update the
dual variable, λ, or the penalty coefficient, ϱ. Therefore, the From all the discussion above, the AL problem in (20) can be
main procedure in the proposed algorithm is to solve the AL approximated to
problem in (20) with the fixed λ and ϱ in the inner loops.
Referring to the PDD framework in Appendix A, the AL
1 ∑∑(
N K
problem in (20) is solved in a block coordinate descent fashion
max t̃ − |αk (n) − α̃k (n) + ϱλ1,k (n)|2
in the inner loops. Since there exist nonconvex constraints in Z̃OMA 2ϱ n=1
the AL problem, CCCP method is employed for the inner
k=1
)
loops to approximate them as convex ones. In this case, + |αk (n)(1 − α̃k (n)) + ϱλ2,k (n)|2 (25a)
the subproblems corresponding to the variable blocks are s.t. (14b), (14d), (22) − (24), (25b)
approximated as convex problems in each inner loop and we (11b) − (11d), (20c), ∀n, k, (25c)
can easily provide the solution.
After the problem transformation in the previous subsection,
we obtain the problem in (20) and can avoid the fractional in the i-th inner loop according to the CCCP concept.
form, binary variables, and the equality constraints. However, To solve the AL problem in (25), for each inner loop, we
there are still some nonconvex constraints, such as (14c) divide the variables Z̃OMA into two blocks and update each
and (15), that complicate the problem. By rewriting the non- block successively. The first block contains variables {α̃k (n)},
convex constraints into the difference-of-convex (DC) forms which only exist in the objective function. Therefore, we can
and then linearizing the subtracted convex terms, we can easily obtain optimal {α̃k (n)} by closed-form solutions. We
approximate them as convex constraints. For example, by can use the convex programming toolbox CVX [42] to find
applying first-order Taylor expansion in linearization, (15) can the solution for the rest variables in the second block. Hence,
be transformed to the convex constraint in (21), where πki (n) the i-th inner loop of the proposed algorithm can be expressed
and θki (n) denote the current values of the variables πk (n) as the following two steps:
and θk (n) in the i-th inner loop, respectively. The detailed Step 1: By fixing the variables in the second block, we can
derivation can be found in Appendix C. We can further rewrite obtain the closed-form solutions for {α̃k (n)} expressed as
the convex constraint in (21) as the second-order cone (SOC)
form, which is shown in (22). The derivation of (22) is
presented in Appendix D. Similarly, we can use the same αk (n) + αk2 (n) + ϱλ1,k (n) + ϱλ2,k (n)αk (n)
α̃k (n) = , ∀ n, k.
1 + αk2 (n)
4 The original searching range of α (n) is the whole real number field.
k
(26)
Since αk (n) will finally converge to the binary solution, we can reduce
the searching range to [0, 1] without affecting the optimality, which can
Step 2: In order to update the variables in the second
significantly accelerate the convergence. block Z̄OMA ≜ Z̃OMA \ {α̃k (n)}, we fix {α̃k (n)} and utilize
6
( )
(πk (n) + θk (n))2 (πki (n) − θki (n))(πk (n) − θk (n)) (πki (n) − θki (n))2
− ρ0 P − − ≤ 0, (21)
4 2 4
[ ]
(πk (n) + θk (n)) (πki (n) − θki (n))(πk (n) − θk (n)) (πki (n) − θki (n))2 ρ0 P 1
, − + −
2 4 8 2 2
(22)
(π i (n) − θki (n))(πk (n) − θk (n)) (πki (n) − θki (n))2 ρ0 P 1
≤ k − + + .
4 8 2 2
[ ]
(αk (n) − θ̃k (n)) (αki (n) + θ̃ki (n))(αk (n) + θ̃k (n)) (αki (n) + θ̃ki (n))2 tk (n) 1
, − − −
2 4 8 2 2
(23)
(αi (n) + θ̃ki (n))(αk (n) + θ̃k (n)) (αki (n) + θ̃ki (n))2 tk (n) 1
≤ k − − + .
4 8 2 2
CVX to solve the following problem Algorithm 1 Proposed iterative algorithm for problem (20)
1. Define the tolerance of accuracy δ and the maximum
1 ∑∑(
N K
max t̃ − |αk (n) − α̃k (n) + ϱλ1,k (n)|2 number of iterations Nmax . Initialize the algorithm with
Z̄OMA 2ϱ n=1 a feasible point Z̃OMA . Set the iteration number i = 0.
k=1
) 2. Repeat
+ |αk (n)(1 − α̃k (n)) + ϱλ2,k (n)|2 (27a)
– Update {α̃k (n)} based on (26).
s.t. (14b), (14d), (22) − (24), (27b)
– Update the variables in the second block based on
(11b) − (11d), (20c), ∀n, k. (27c) solving the problem in (27).
– Update the iteration number : i = i + 1.
The proposed iterative algorithm to solve the AL problem |L (Z̃ )−L (Z̃ )|
in (20), i.e., the algorithm for each inner loop of the PDD 3. Until OMA,i+1|L OMA (Z̃ OMA,i OMA
≤ δ, or the maximum
OMA,i OMA )|
method is summarized in Algorithm 1, where LOMA,i (Z̃OMA ) number of iterations is reached, i.e., i > Nmax .
denotes the objective function of the AL problem in (20) in
the i-th inner loop. Moreover, the overall PDD based algo-
rithm is summarized in Algorithm 2, where gOMA,r (Z̃OMA )
denotes the vector that combines all functions in the equality Algorithm 2 Proposed PDD based algorithm for problem (11)
constraints of the problem in (19) and ηr denotes the constraint 1. Define the tolerance of accuracy δO . Initialize the al-
violation parameter. From the discussion in Appendix A, we gorithm with a feasible point. Set the iteration number
can see that the proposed algorithm converges to a stationary r = 0. Set c < 1 and ϱ0 > 0.
solution of the problem in (19)5 . It is worth noting that there 2. Repeat
is no approximation or relaxation during the transformation – Apply the proposed algorithm in Algorithm 1 to
from the original problem in (11) to the problem in (19). update the optimization variables iteratively.
Hence, they share the same solutions. Moreover, since the – if ∥gOMA,r (Z̃OMA )∥∞ ≤ ηr
obtained stationary solution meets the necessary conditions for – λr+1 = λr + ϱ1r gOMA,r (Z̃OMA )
the optimal solution of the problem in (19), it also meets the – ϱr+1 = ϱr
necessary conditions for the optimal solution of the original – else
problem in (11). – λr+1 = λr
– ϱr+1 = cϱr
IV. O PTIMIZATION FOR NOMA MODE – end
– Update the iteration number : r = r + 1.
In this section, we first transform the original problem for 3. Until ∥gOMA,r (Z̃OMA )∥∞ ≤ δO .
the NOMA mode, i.e., (13), into an equivalent and more
tractable one. Then we develop a PDD based algorithm to
solve it.
5 In the absence of better alternative, it is readily seen that this proposed
algorithm is the best choice for solving this optimization problem under study. A. Problem transformation
The problem is NP-hard and it seems not possible to obtain the optimal
solution based on the current optimization techniques. At the present time, the
best we can do is to ensure the convergence to a stationary point for this kind
of constrained optimization problem. The characterization of the performance
gap between the optimal and iterative solutions remains an open problem for Similar to Section III, we first handle the highly cou-
the future research. pled objective function by introducing the auxiliary variables
7
transform (31) as the following constraints + |βk,l (n)(1 − β̃k,l (n)) + ϱλ2,k,l (n)|2
l=1
βk,l (n)(1 − β̃k,l (n)) = 0, ∀ n, k, l, (34) ∑ )
k−1
(
− |βk,l (n) + βl,k (n) − 1 + ϱλ3,k,l (n)|2
and l=1
βk,l (n) = β̃k,l (n), ∀ n, k, l. (35) (42a)
s.t. (28b), (28c), (38) − (41), (42b)
From the discussion above, we can finally transform the
problem in (13) to the following equivalent problem (13b) − (13e), (37c), ∀n, k, l, (42c)
max t̃ (36a)
Z̃NOMA in the i-th inner loop.
s.t. (28b), (28c), (29), (30), (36b) To solve the AL problem in (42) for each inner loop,
(32) − (35), (13b) − (13e), (13g), (36c) we divide variables Z̃NOMA into two blocks and update each
successively. The first block only contains variables {β̃k,l (n)}
where Z̃NOMA ≜ {t̃, tk (n), q(n), Pk (n), θk (n), πk (n), βk,l (n), that can be easily optimized by closed-form solutions. We
π̃k (n), β̃k,l (n)}. Similar to the problem in (19), the problem can utilize CVX to find the solution for the rest variables in
in (36) also satisfies the general framework for the PDD the second block. Hence, the i-th inner loop of the proposed
method, which is shown in (45) in Appendix A. algorithm can be expressed as the following two steps:
8
1 ∑∑∑( )
N K K
max t̃ − |βk,l (n) − β̃k,l (n) + ϱλ1,k,l (n)|2 + |βk,l (n)(1 − β̃k,l (n)) + ϱλ2,k,l (n)|2
Z̃NOMA 2ϱ n=1
k=1 l=1
1 ∑∑∑( )
N K k−1
− |βk,l (n) + βl,k (n) − 1 + ϱλ3,k,l (n)|2 (37a)
2ϱ n=1
k=1 l=1
s.t. (28b), (28c), (29), (30), (32), (33), (13b) − (13e), (37b)
0 ≤ βk,l (n) ≤ 1, ∀n, k, l, (37c)
[ ]
(πk (n) + θk (n)) (πki (n) − θki (n))(πk (n) − θk (n)) (πki (n) − θki (n))2 ρ0 Pk (n) 1
, − + −
2 4 8 2 2
(38)
(π i (n) − θki (n))(πk (n) − θk (n)) (πki (n) − θki (n))2 ρ0 Pk (n) 1
≤ k − + + .
4 8 2 2
[ ∑ ( i )
(βk,l (n) − Pl (n))(βk,l (n) − Pl (n)) (βk,l (n) − Pl (n))
i i i 2
πk (n) − σ 2 d2h 1 σ
− + − , √ (q(n) − wk )T ,
4 8 2ρ0 2 ρ0
l∈K,l̸=k
]
(βk,1 (n) + P1 (n)) (βk,k−1 (n) + Pk−1 (n)) (βk,k+1 (n) + Pk+1 (n)) (βk,K (n) + PK (n))
≤ 1 (39)
,..., , ,...,
2
2 2 2 2
( )
πk (n) − σ 2 d2h ∑ i
(βk,l (n) − Pli (n))(βk,l (n) − Pl (n)) (βk,l i
(n) − Pli (n))2
+ + − ,
2ρ0 4 8
l∈K,l̸=k
[
βk,l (n) + π̃l (n) (βk,l
i
(n) − π̃li (n))(βk,l (n) − π̃l (n)) (βk,l
i
(n) − π̃li (n))2
, − + (qi (n) − wk )T (q(n) − qi (n))
2 4 8
]
∥qi (n) − wk ∥2 d2 1
(βk,l i
(n) − π̃li (n))(βk,l (n) − π̃l (n)) (βk,li
(n) − π̃li (n))2
+ + h−
≤ − (40)
2 2 2
4 8
∥q i
(n) − w k ∥2
d2 1
+(qi (n) − wk )T (q(n) − qi (n)) + + h+ .
2 2 2
Step 1: By fixing the variables in the second block, we can can be referred in Algorithm 1. We only need to replace the
obtain the closed-form solutions for {β̃k,l (n)} expressed as set of variables Z̃OMA by Z̃NOMA and employ (43) and (44)
2 in the iterations instead of (26) and (27). The overall PDD
βk,l (n) + βk,l (n) + ϱλ1,k,l (n) + ϱλ2,k,l (n)βk,l (n)
β̃k,l (n) = , based algorithm for the NOMA mode is similar to that for the
2 (n)
1 + βk,l OMA mode, which can be referred in Algorithm 2. Besides
∀ n, k, l. applying the above proposed algorithm for inner iterations, we
(43) need to replace gOMA,r (Z̃OMA ) by gNOMA,r (Z̃NOMA ), which
denotes the vector that combines all functions in the equality
Step 2: In order to update the variables in the second
constraints of the problem in (36). From the discussion in
block Z̄NOMA ≜ Z̃NOMA \ {β̃k,l (n)}, we fix {β̃k,l (n)} and Appendix A, the proposed algorithm converges to a stationary
utilize CVX to solve the following problem solution of the problem in (36). Since the problem in (36)
N K ( K
1 ∑∑ ∑ and the original one in (13) share the same optimal solution,
max t̃ − |βk,l (n) − β̃k,l (n) + ϱλ1,k,l (n)|2 the obtained stationary solution also meets the necessary
Z̄NOMA 2ϱ n=1
k=1 l=1 conditions for the optimal solution of the original problem
∑K
shown in (13).
+ |βk,l (n)(1 − β̃k,l (n)) + ϱλ2,k,l (n)|2
l=1
) V. C OMPUTATIONAL C OMPLEXITY
∑
k−1
(
− |βk,l (n) + βl,k (n) − 1 + ϱλ3,k,l (n)|2 In this section, we analyze the complexity for the proposed
l=1 PDD based algorithms. Here, we apply the basic elements of
(44a) complexity analysis as in [43].
s.t. (28b), (28c), (38) − (41), (44b) The complexity of the proposed PDD based algorithm for
the OMA mode is dominated by solving the problem in (27),
(13b) − (13e), (37c), ∀n, k, l. (44c)
which contains 3KN SOC constraints, including KN SOC
The proposed iterative algorithm to solve the AL problem in constraints of dimension 4 and 2KN SOC constraints of
(37), i.e., the algorithm for each inner loop of the PDD method, dimension 3. The number of variables n1 is on the order
9
−2
final location, qT = [0, −500]T , with the altitude dh = 100 m. 10
Moreover, the maximum UAV speed and the time slot length
are set as Vmax = 50 m/sec and δt = 0.5 sec, respectively. The −4
10
channel gain is ρ0 = −70 dB at the reference distance 1 m and
the noise level is σ 2 = −110 dBm. The tolerance parameters
are set as δ = δO = 10−6 , the maximum number of the inner 10
−6
0 5 10 15 20 25
outer iteration. Number of iterations
First, we consider the convergence of the proposed algo-
rithms for the OMA and NOMA modes. The flight time is Fig. 4: The convergence performance of the proposed PDD based
assumed to be T = 25 sec and the transmit power is set algorithms for the OMA and NOMA modes: penalty value versus the
as P = 20 dBm. Fig. 3 shows the max-min rate versus number of iterations.
the number of iterations. From the figure, both algorithms
converge within 10 iterations. Fig. 4 shows the penalty value
versus the number of iterations. From the figure, the penalty However, in the NOMA mode, when T is small so that the
values of both algorithms decrease below 10−6 within 25 UAV cannot reach the remote users, more power is allocated
iterations. Therefore, the proposed PDD based optimization to the remote users to increase the transmission rates to realize
algorithms can effectively handle the complicated constraints fairness. As a result, the UAV stays close to the nearby users
in the OMA and NOMA problems, respectively. for some time. Fig. 5b and Fig. 5d present the trajectories and
In Fig. 5, we present the trajectories and speeds of the UAV speeds for the OMA and NOMA modes when T = 50 sec.
optimized by the proposed algorithms for different modes and Due to the longer flight time T , the UAV is able to reach
the corresponding flight time T . The transmit power is set the remote users. Therefore, the UAV flies over each user
as P = 20 dBm. Fig. 5a and Fig. 5c present the trajectories successively in both the OMA and NOMA modes. However,
and speeds for the OMA and NOMA modes when T = 25 sec. the trajectories and speeds are different because of different
From the figure, in the OMA mode, the UAV intends to fly modes.
close to each user successively for fairness. Moreover, the Fig. 6 illustrates the max-min rate performance versus
UAV always flies at the maximum speed, Vmax , to move close flight time T for different schemes, including the following
to each user since the flight time, T , is not large enough. algorithms for comparison:
10
500 500
OMA, T=25 sec OMA, T=50 sec
400 NOMA, T=25 sec 400 NOMA, T=50 sec
300 300
200 200
100 100
y (m)
y (m)
0 0
−100 −100
−200 −200
−300 −300
−400 −400
−500 −500
−500 −400 −300 −200 −100 0 100 200 300 400 500 −500 −400 −300 −200 −100 0 100 200 300 400 500
x (m) x (m)
(a) (b)
60 60
OMA OMA
NOMA NOMA
50 50
40 40
UAV speed (m/sec)
30 30
20 20
10 10
0 0
−10 −10
0 5 10 15 20 25 0 10 20 30 40 50
t (sec) t (sec)
(c) (d)
Fig. 5: Optimized UAV trajectories for: (a) T = 25 sec and (b) T = 50 sec. (c) and (d) are the corresponding speeds of the UAV for
scenarios in (a) and (b), respectively. Each trajectory is sampled every 2.5 sec and the sampled points are marked with ‘△’ and ‘□’ for the
OMA and NOMA modes, respectively. The user locations are marked by ‘◦’.
• OMA traditional: the UAV flies in a straight line trajec- • NOMA straight traj: the UAV flies in a straight line tra-
tory with a constant speed. As for scheduling, the users jectory with a constant speed while the power allocation
occupy the time slots one by one periodically. is optimized.
• OMA straight traj: the UAV flies in a straight line • NOMA proposed: the trajectory and the power allocation
trajectory with a constant speed while the user scheduling are jointly optimized.
is optimized.
“OMA proposed” and “NOMA proposed” are the algorithms
• OMA proposed: the trajectory and the user scheduling
proposed in this paper. While the others are benchmarks to
are jointly optimized.
show the effectiveness of our algorithms. The transmit power
• OMA upper bound: the flight time is assumed to be
is set as P = 20 dBm. From the figure, the proposed joint
large enough so that the fraction of moving time between
optimization schemes achieve the best performance, followed
users is negligible. Therefore, the UAV can be regarded
by the schemes that only optimize resource allocation and the
as hovering above each user sequentially and the upper
traditional OMA scheme without optimization. Moreover, the
bound of the performance is achieved.
performance of joint optimization schemes improves with T
11
2.5 3
OMA traditional
OMA traditional
OMA straight traj
OMA straight traj
OMA proposed
OMA proposed 2.5
OMA upper bound
OMA upper bound
2 NOMA straight traj
NOMA straight traj
Max−min rate (bit/sec/Hz)
1.5 1.5
0.5
0.5 0
25 30 35 40 45 50 55 60 65 70 10 15 20 25 30
T (sec) P (dBm)
Fig. 6: Max-min rate performance versus flight time T (P = Fig. 7: Max-min rate performance versus transmit power P (T =
20 dBm). 25 sec).
NOMA random
the transmit power for different schemes. The flight time 2
Besides, the gap between the NOMA mode and the OMA
mode increases with the transmit power. When P = 30 dBm, 0
10 15 20 25 30
the NOMA mode without trajectory optimization can achieve P (dBm)
better performance than the OMA mode that employs joint
optimization. Fig. 8: Max-min rate performance versus transmit power P (T =
Fig. 8 shows the effectiveness of user scheduling optimiza- 25 sec).
tion in our proposed algorithms by comparing them with the
following benchmarks:
• OMA relaxed: the trajectory and the user scheduling
random” is seriously degraded compared to our proposed
are jointly optimized, where the binary scheduling vari- algorithms and the relaxed benchmarks. Therefore, we can
ables {αk (n)} are relaxed to continuous ones in [0, 1]. conclude that our proposed algorithms can well optimize the
• NOMA relaxed: the trajectory and the power allo-
user scheduling.
cation are jointly optimized, where the binary vari-
ables {βk,l (n)} are relaxed to continuous ones in [0, 1]. VII. C ONCLUSION
• OMA random: the user scheduling is randomly generated In this paper, we have investigated the joint trajectory design
while the trajectory is optimized. and resource allocation for UAV-enabled multiple access sys-
• NOMA random: the SIC order is randomly generated tems. We have first formulated the problems to maximize the
while the trajectory and the power allocation are jointly minimum average rate among multiple users for both the OMA
optimized. and NOMA modes with the constraints of the UAV speed,
The flight time is set as T = 25 sec. From the figure, the initial and final locations, transmit power, and flight time. In
performance of the proposed algorithms are very close to order to handle the binary variables, highly coupled nonconvex
the relaxed benchmarks, which indicates that the bias caused terms in the objective functions and nonconvex constraints, we
by equalities does not significantly block the optimization. have introduced auxiliary variables and applied linearization
Moreover, the performance of “OMA random” and “NOMA to transform the original problems into more tractable forms
12
A PPENDIX A ∑
N
10. r =r+1 − k .
4
11. until some termination criterion is met Substituting (50) and (53) into (52), we finally obtain the
convex constraint (21).
13
A PPENDIX D R EFERENCES
D ERIVATION OF (22)
[1] Y. Cai, Z. Qin, F. Cui, G. Y. Li, and J. A. McCann, “Modulation and
Let us first rewrite (21) as multiple access for 5G networks,” IEEE Commun. Surv. Tut., vol. 20,
no. 1, pp. 629–646, first quarter 2018.
f3 (z) ≤ f4 (z), (54) [2] Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan, and L. Hanzo,
“Nonorthogonal multiple access for 5G and beyond,” Proc. IEEE, vol.
where 105, no. 12, pp. 2347–2381, Dec. 2017.
(πk (n) + θk (n))2 [3] M. Shirvanimoghaddam, M. Dohler, and S. Johnson, “Massive non-
f3 (z) = , (55) orthogonal multiple access for cellular IoT: potentials and limitations,”
4 IEEE Commun. Mag., vol. 55, no. 9, pp. 55–61, Sep. 2017.
and [4] Z. Qin, X. Yue, Y. Liu, Z. Ding, and A. Nallanathan, “User association
and resource allocation in unified non-orthogonal multiple access enabled
(πki (n) − θki (n))(πk (n) − θk (n)) heterogeneous ultra dense networks,” IEEE Commun. Mag., vol. 56, no.
f4 (z) = 6, pp. 86-92, June 2018.
2 (56) [5] Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and
(πki (n) − θki (n))2 K. Higuchi, “Non-orthogonal multiple access (NOMA) for cellular future
− + ρ0 P. radio access,” in Proc. IEEE Veh. Technol. Conf. (VTC Spring), Dresden,
4
Germany, Jun. 2013, pp.1–5.
It can be easily seen that f3 (z) and f4 (z) contain the quadratic [6] Z. Ding, F. Adachi, and H. V. Poor, “The application of MIMO to non-
terms and linear terms, respectively. We can equivalently orthogonal multiple access,” IEEE Trans. Wireless Commun., vol. 15,
no. 1, pp. 537–552, Jan. 2016.
rewrite (54) as [7] Z. Chen, Z. Ding, X. Dai, and G. K. Karagiannidis, “On the application
(f4 (z) − 1)2 (f4 (z) + 1)2 of quasi-degradation to MISO-NOMA downlink,” IEEE Trans. Signal
f3 (z) + ≤ . (57) Process., vol. 64, no. 23, pp. 6174–6189, Dec. 2016.
4 4 [8] Z. Ding, R. Schober, and H. V. Poor, “A general MIMO framework for
NOMA downlink and uplink transmission based on signal alignment,”
By taking the square root of both sides of (57), (21) can be IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 4438–4454, Jun. 2016.
converted to [9] Z. Ding, M. Peng, and H. V. Poor, “Cooperative non-orthogonal multiple
[ ]
√ f4 (z) − 1
access in 5G systems,” IEEE Commun. Lett., vol. 19, no. 8, pp. 1462–
f (z),
≤ f4 (z) + 1 . (58) 1465, Aug. 2015.
3
2
2 [10] Y. Tian, A. Nix, and M. Beach, “On the performance of opportunistic
NOMA in downlink CoMP networks,” IEEE Commun. Lett., vol. 20, no.
Substituting (55) and (56) into (58), we finally obtain the SOC 5, pp. 998–1001, May 2016.
constraint (22). [11] Z. Ding, H. Dai, and H. V. Poor, “Relay selection for cooperative
NOMA,” IEEE Wireless Commun. Lett., vol. 5, no. 4, pp. 416–419, Aug.
2016.
A PPENDIX E [12] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance of non-
T RANSFORMATION OF CONSTRAINT (13f) orthogonal multiple access in 5G systems with randomly deployed users,”
IEEE Signal Process. Lett., vol. 21, no. 12, pp. 1501–1505, Dec. 2014.
By regarding {βk,l (n)} as auxiliary variables, we rewrite [13] Y. Liu, M. Elkashlan, Z. Ding, and G. K. Karagiannidis, “Fairness of
(13f) as the following constraints user clustering in MIMO non-orthogonal multiple access systems,” IEEE
Commun. Lett., vol. 20, no. 7, pp. 1465–1468, Jul. 2016.
[14] J. Cui, Z. Ding, and P. Fan, “A novel power allocation scheme under
βk,l (n) ∈ {0, 1}, (59) outage constraints in NOMA systems,” IEEE Signal Process. Lett., vol.
23, no. 9, pp. 1226–1230, Sep. 2016.
and [15] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, “Enhancing the
physical layer security of non-orthogonal multiple access in large-scale
βk,l (n)(d2h +∥q(n)−wl ∥2 ) ≤ d2h +∥q(n)−wk ∥2 , ∀ n, k, l ̸= k. networks,” IEEE Trans. Wireless Commun., vol. 16, no. 3, pp. 1656–1672,
(60) Mar. 2017
The first constraint (59) ensures that {βk,l (n)} are binary. [16] Y. Liu, Z. Qin, M. Elkashlan, A. Nallanathan, and J. A. McCann, “Non-
orthogonal multiple access in large-scale heterogeneous networks,” IEEE
Then, from (60) we can obtain βk,l (n) = 0 when d2h +∥q(n)− J. Sel. Areas Commun., vol. 35, no. 12, pp. 2667–2680, Dec. 2017.
wl ∥2 > d2h + ∥q(n) − wk ∥2 , i.e., dk (n) < dl (n). However, [17] F. Fang, H. Zhang, J. Cheng, and V. C. M. Leung, “Energy-efficient re-
we cannot make sure that βk,l (n) = 1 when dk (n) > dl (n). source allocation for downlink non-orthogonal multiple access network,”
IEEE Trans. Commun., vol. 64, no. 9, pp. 3722–3732, Sep. 2016.
As a result, we take the constraint (13g) into account to [18] Y. Zhang, H. M. Wang, T. X. Zheng, and Q. Yang, “Energy-efficient
avoid the case where βk,l (n) = βl,k (n) = 0. Moreover, transmission design in non-orthogonal multiple access,” IEEE Trans. Veh.
when dk (n) = dl (n), constraint (13g) also avoids the case Tech., vol. 66, no. 3, pp. 2852–2857, Mar. 2017.
[19] Y. Zeng, R. Zhang, and T. J. Lim, “Wireless communications with
where βk,l (n) = βl,k (n) = 1. unmanned aerial vehicles: opportunities and challenges,” IEEE Commun.
Furthermore, the multiplication between the linear term Mag., vol. 54, no. 5, pp. 36–42, May 2016.
and the quadratic term in constraint (60) is hard to handle. [20] H. Menouar, I. Guvenc, K. Akkaya, A. S. Uluagac, A. Kadri, and A.
Tuncer, “UAV-enabled intelligent transportation systems for the smart
Therefore, by introducing auxiliary variables {π̃k (n)} as the city: applications and challenges,” IEEE Commun. Mag., vol. 55, no. 3,
upper bound of d2h + ∥q(n) − wk ∥2 , (60) can be equivalently pp. 22–28, Mar. 2017.
converted as [21] M. Mozaffari, A. T. Z. Kasgari, W. Saad, M. Bennis, M. Debbah,
“Beyond 5G with UAVs: foundations of a 3D wireless cellular network,”
d2h + ∥q(n) − wk ∥2 ≤ π̃k (n), (61) May 2018. [Online]. Available: https://arxiv.org/abs/1805.06532
[22] R. Amorim, P. Mogensen, T. Sorensen, I. Z. Kovacs, J. Wigard, “Pathloss
and measurements and modeling for UAVs connected to cellular networks,” in
Proc. IEEE Veh. Technol. Conf. (VTC Spring), Sydney, NSW, Australia,
Jun. 2017, pp.1–6.
βk,l (n)π̃l (n) ≤ d2h + ∥q(n) − wk ∥2 , ∀ n, k, l ̸= k. (62) [23] L. Liu, S. Zhang, and R. Zhang, “Multi-beam UAV com-
munication in cellular uplink: cooperative interference cancella-
Finally, the constraint (13f) is transformed to constraints (31)- tion and sum-rate maximization,” Aug. 2018. [Online]. Available:
(33). https://arxiv.org/abs/1808.00189
14