帳號:guest(216.73.216.146)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目
作者(中文):阮文強
作者(外文):Nguyen Van Cuong
論文名稱(中文):無人機軌跡優化與資源分配用於中繼通訊和影像監視
論文名稱(外文):UAV Trajectory Optimization and Resource Allocation for Relay Communication and Image Surveillance
指導教授(中文):許健平
指導教授(外文):Sheu, Jang-Ping
口試委員(中文):方凱田
古孟霖
高榮駿
洪樂文
口試委員(外文):Feng, Kai-Ten
Ku, Meng-Lin
Kao, Jung-Chun
Hong, Yao-Win
學位類別:博士
校院名稱:國立清華大學
系所名稱:通訊工程研究所
學號:104064708
出版年(民國):112
畢業學年度:112
語文別:英文
論文頁數:92
中文關鍵詞:無人機通信圖像監控軌跡優化資源分配吞吐量最大化比例公平逐次凸逼近
外文關鍵詞:UAV communicationimage surveillancetrajectory optimizationresource allocationthroughput maximizationproportional fairnesssuccessive convex approximation
相關次數:
  • 推薦推薦:0
  • 點閱點閱:233
  • 評分評分:*****
  • 下載下載:0
  • 收藏收藏:0
本篇論文研究了無人機在中繼通訊和影像監視中的應用,我們使用多架影像監視無人機,研究地面用戶和遠程基地台 (BS) 之間的中繼通訊,無人機將監控區域的航拍影像轉發給基地台,同時滿足地面用戶的上行傳輸需求。我們首先考慮單無人機場景,在受監視覆蓋範圍、影像傳輸要求和中繼容量的約束,透過最大化用戶的總和對數吞吐量來決定無人機的軌跡、任務分配、用戶關聯和速率分配。我們將此一問題表示成混合整數非線性規劃問題,並利用不精確區塊坐標下降 (Block Coordinate Decent, BCD) 演算法解決此一問題。在BCD算法中我們繼承了具有平衡約束的數學規劃的精確懲罰方法的概念,以放寬整數約束和逐次凸逼近方法來解決非凸性的軌跡優化問題。然後,我們將所提出的框架擴展到具有多個無人機的情況,這些無人機被派往覆蓋廣泛的監視區域。無人機可以透過協作和適當的任務分配,更高效地完成中繼和監視任務,我們採用相似的 BCD 演算法來解決多無人機的問題。

除此之外,我們研究影像監視無人機的任務分配、傳輸調度和軌跡設計,這些無人機為地面用戶提供即時影像捕獲和交付有時效性的服務。例如,尋求交通壅塞影像的駕駛或請求私人住宅影像的保全單位。在每項任務中,無人機都需要拍攝指定監控區域的影像,並在截止時間前將影像交付給請求用戶,並確定任務分配、傳輸調度和軌跡設計,以最大化已完成任務的總監視區域。在這個問題,我們首先研究單無人機,並提出一種交替優化方法,該方法採用精確懲罰方法來完成近似二元解,並採用逐次凸逼近來處理非凸軌跡優化。我們也擴展酖無人機到多無人機場景,其中跨無人機任務可能需要由不同無人機拍攝和傳送影像。為了實現分散式演演算法,我們引入輔助期限來限制本地任務的可用時間,從而將聯合優化問題解耦成為多個單無人機問題,這些問題可以按照前一案例中推導出的程序平行處理。最後,我們提供了數值模擬來證明以上解決方法的有效性。
This work studies the employment of UAVs in relay communications and image surveillance. We examine the use of image surveillance UAVs for relay communication between ground users and a remote base station (BS). UAVs take aerial images of the surveillance region and forward them to the BS while serving the uplink transmission demands of ground users. We first consider the single-UAV scenario and jointly determine the UAV's trajectory, task assignment, user association, and rate allocation by maximizing the sum-log-throughput of the users subject to constraints on the surveillance coverage, image transmission requirements, and relay capacity. The resulting mixed-integer nonlinear programming problem is solved by an inexact block coordinate descent (BCD) algorithm where we inherit ideas from the exact penalty method for mathematical programming with equilibrium constraints to relax the integer constraints and the successive convex approximation (SCA) approach to address the non-convexity of the trajectory optimization problem. Then, we extend the proposed framework to the case with multiple UAVs dispatched to cover a broad surveillance region. The UAVs may complete both relay and surveillance tasks more efficiently through cooperation and proper task allocation for UAVs. A similar BCD algorithm is adopted to solve the problem of multiple-UAV case.

We further examine the task assignment, transmission scheduling, and trajectory design of image-surveillance UAVs dispatched to serve on-demand image capture and delivery services to ground users, e.g., from drivers seeking images of traffic jams or security units requesting pictures of private homes. In each task, the UAVs must capture the image of a specified surveillance region and deliver the image to the requesting user before the deadline. The task assignment, transmission scheduling, and trajectory design are jointly determined to maximize the total surveillance area of the completed tasks. In this problem, we first examine the single-UAV problem and propose an alternating optimization approach that adopts the exact penalty method to promote near-binary solutions and employs the SCA method to deal with the non-convex trajectory optimization. We then extend to the multiple-UAV scenario where cross-UAV tasks may require images to be captured and delivered by different UAVs. To enable distributed implementation, we introduce auxiliary deadlines to limit the time available for local tasks and, thus, decouple the joint optimization problem into multiple single-UAV problems that can be solved in parallel following the procedure derived in the previous case. Numerical simulations are provided to demonstrate the effectiveness of the proposed solutions.
Contents
Abstract (Chinese) i
Abstract iii
Acknowledgements v
Contents vi
List of Figures ix
List of Abbreviations xi
List of Symbols xii
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Motivations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
1.2 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
1.3 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
2. Related Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
3. UAV Trajectory Optimization and Resource Allocation for Joint Relay Communication and Image Surveillance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.1 System Model and Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.2 Joint Optimization of UAV Trajectory, Task Assignment, and User Association via Inexact Block Coordinate Descent . . . . . . . . . . . . .. . . . . . . . . . . . 21
3.2.1 Subproblem I: UAV Trajectory and Task Assignment Optimization . . . . 23
3.2.2 Subproblem II: User Association Optimization . . . . . . . . . . . . . . . . . . . . . . .27
3.2.3 Subproblem III: Penalty Variables Update . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.3 Extension to the case with Multiple Cooperative UAVs . . . . . . . . . . . . . . . . . 30
3.3.1 Subproblem I: Multiple-UAV Trajectory and Task Assignment
Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
3.3.2 Subproblem II: Multiple-UAV User Association Optimization. . . . . . . . . 39
3.3.3 Subproblem III: Multiple-UAV Penalty Variables Update . . . . . . .. . . . . . . 40
3.4 Numerical Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41
3.4.1 Experiments for the Single-UAV Case . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . 41
3.4.2 Experiments for the Multiple-UAV Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
4. UAV Trajectory Optimization and Resource Allocation for On-Demand Image Capture and Wireless Delivery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
4.1 System Model and Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
4.1.1 Image Surveillance Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
4.1.2 Communications Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
4.1.3 Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57
4.2 Joint UAV Trajectory, Task Assignment, and Transmission Scheduling
Algorithm for the Single-UAV Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58
4.2.1 Subproblem I: Task Assignment & Transmission Scheduling . . . . . . . . . 59
4.2.2 Subproblem II: Task Assignment, UAV Trajectory & Rate Optimization .60
4.2.3 Subproblem III: Penalty Variables Update . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
4.3 Extension to the Multiple-UAV Scenario with UAV Relaying . . . . . . . . . . . . 65
4.3.1 System Model and Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
4.3.2 Proposed Decentralized Solution for the Multiple-UAV Problem . . . . . .69
4.4 Numerical Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
4.4.1 Results for the Single-UAV Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
4.4.2 Results for the Multiple-UAV case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
5. Conclusion and Future Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
5.1 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85
5.2 Future Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86

[1] Y. Zeng, R. Zhang, and T. J. Lim, “Wireless communications with unmanned aerial vehicles: Opportunities and challenges,” IEEE Communications Magazine.”, vol. 54, no. 5, pp. 36–42, 2016.
[2] A. Fotouhi, H. Qiang, M. Ding, M. Hassan, L. G. Giordano, A. Garcia-Rodriguez, and J. Yuan, “Survey on UAV cellular communications: Practical aspects, standardization advancements, regulation, and security challenges,” IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3417–3442, 2019.
[3] G. Reus-Muns and K. R. Chowdhury, “Classifying UAVs with proprietary waveforms via preamble feature extraction and federated learning,” IEEE Transactions on Vehicular Technology, vol. 70, no. 7, pp. 6279–6290, 2021.
[4] H. Shakhatreh, A. H. Sawalmeh, A. Al-Fuqaha, Z. Dou, E. Almaita, I. Khalil, N. S. Othman, A. Khreishah, and M. Guizani, “Unmanned aerial vehicles (UAVs): A survey on civil applications and key research challenges,” IEEE Access, vol. 7, pp. 48572–48634, 2019.
[5] “ZENADRONE, remote aerial surveillance solutions.” https://www.zenadrone.com/. Accessed: 5-Sep-2023.
[6] “AIRVIS, specialists in drone security and surveillance.” https://airvis.co.uk/. Accessed: 5-Sep-2023.
[7] “DRONITECH, drone surveillance security.” https://www.dronitech.com/. Accessed: 5-Sep-2023.
[8] N. Van Cuong, Y.-W. Peter Hong, and J.-P. Sheu, “UAV trajectory optimization for joint relay communication and image surveillance,” IEEE Transactions on Wireless Communications, vol. 21, no. 12, pp. 10177–10192, 2022.
[9] N. Van Cuong, Y.-W. Peter Hong, and J.-P. Sheu, “UAV-enabled image capture and wireless delivery for on-demand surveillance tasks,” submitted, IEEE Transactions on Wireless Communications, 2023.
[10] S. Hu, Q. Wu, and X. Wang, “Energy management and trajectory optimization for UAV-enabled legitimate monitoring systems,” IEEE Transactions on Wireless Communications, vol. 20, no. 1, pp. 142–155, 2021.
[11] H. Zhao, H. Wang, W.Wu, and J. Wei, “Deployment algorithms for UAV airborne networks toward on-demand coverage,” IEEE Journal on Selected Areas in Communications, vol. 36, no. 9, pp. 2015–2031, 2018.
[12] Q. Wu, Y. Zeng, and R. Zhang, “Joint trajectory and communication design for multi-UAV enabled wireless networks,” IEEE Transactions on Wireless Communications, vol. 17, no. 3, pp. 2109–2121, 2018.
[13] Y. Zeng, R. Zhang, and T. J. Lim, “Throughput maximization for UAV-enabled mobile relaying systems,” IEEE Transactions on Communications, vol. 64, no. 12, pp. 4983–4996, 2016.
[14] Y. Ji, Z. Yang, H. Shen, W. Xu, K. Wang, and X. Dong, “Multi-cell edge coverage enhancement using mobile UAV-relay,” IEEE Internet of Things Journal, vol. 7, no. 8, pp. 7482–7494, 2020.
[15] R. Ding, F. Gao, and X. Shen, “3D UAV trajectory design and frequency band allocation for energy-efficient and fair communication: A deep reinforcement learning approach,” IEEE Transactions on Wireless Communications, vol. 19, no. 12, pp. 7796–7809, 2020.
[16] Q. Hu, Y. Cai, A. Liu, G. Yu, and G. Y. Li, “Low-complexity joint resource allocation and trajectory design for UAV-aided relay networks with the segmented raytracing channel model,” IEEE Transactions on Wireless Communications, vol. 19, no. 9, pp. 6179–6195, 2020.
[17] S. Zeng, H. Zhang, B. Di, and L. Song, “Trajectory optimization and resource allocation for OFDMA UAV relay networks,” IEEE Transactions on Wireless Communications, vol. 20, no. 10, pp. 6634–6647, 2021.
[18] D.-H. Tran, V.-D. Nguyen, S. Chatzinotas, T. X. Vu, and B. Ottersten, “UAV relay assisted emergency communications in IoT networks: Resource allocation and trajectory optimization,” IEEE Transactions on Wireless Communications, vol. 21, no. 3, pp. 1621–1637, 2022.
[19] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Mobile unmanned aerial vehicles (UAVs) for energy-efficient internet of things communications,” IEEE Transactions on Wireless Communications, vol. 16, no. 11, pp. 7574–7589, 2017.
[20] Z. Jia, M. Sheng, J. Li, D. Niyato, and Z. Han, “LEO-satellite-assisted UAV: Joint trajectory and data collection for internet of remote things in 6G aerial access networks,” IEEE Internet of Things Journal, vol. 8, no. 12, pp. 9814–9826, 2021.
[21] X. Li and A. Savkin, “Networked unmanned aerial vehicles for surveillance and monitoring: A survey,” Future Internet, vol. 13, p. 174, 07 2021.
[22] M. Elloumi, R. Dhaou, B. Escrig, H. Idoudi, and L. A. Saidane, “Monitoring road traffic with a UAV-based system,” in Proceedings of IEEE Conference on Wireless Communications and Networking (WCNC), pp. 1–6, 2018.
[23] L. Xing, H. Xiaoxuan, W. Guoqiang, and L. He, “A multi-UAV deployment method for border patrolling based on stackelberg game,” Journal of Systems Engineering and Electronics, vol. 34, no. 1, pp. 99–116, 2023.
[24] M. L. Laouira, A. Abdelli, and J. B. Othman, “Wireless energy supply scheduling strategy in a combined border surveillance architecture,” in Proceedings of IEEE Global Communications Conference (GLOBECOM), pp. 1–6, 2020.
[25] S. Kim, D. Kim, S. Jeong, J.-W. Ham, J.-K. Lee, and K.-Y. Oh, “Fault diagnosis of power transmission lines using a UAV-mounted smart inspection system,” IEEE Access, vol. 8, pp. 149999–150009, 2020.
[26] A. Raja, L. Njilla, and J. Yuan, “Adversarial attacks and defenses toward AI-assisted UAV infrastructure inspection,” IEEE Internet of Things Journal, vol. 9, no. 23, pp. 23379–23389, 2022.
[27] P. K. Reddy Maddikunta, S. Hakak, M. Alazab, S. Bhattacharya, T. R. Gadekallu, W. Z. Khan, and Q.-V. Pham, “Unmanned aerial vehicles in smart agriculture: Applications, requirements, and challenges,” IEEE Sensors Journal, vol. 21, no. 16, pp. 17608–17619, 2021.
[28] Y. Liang, W. Xu, W. Liang, J. Peng, X. Jia, Y. Zhou, and L. Duan, “Nonredundant information collection in rescue applications via an energy-constrained UAV,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2945–2958, 2019.
[29] D. Ebrahimi, S. Sharafeddine, P.-H. Ho, and C. Assi, “Autonomous UAV trajectory for localizing ground objects: A reinforcement learning approach,” IEEE Transactions on Mobile Computing, vol. 20, no. 4, pp. 1312–1324, 2021.
[30] F. P. Kelly, A. K. Maulloo, and D. K. H. Tan, “Rate control in communication networks: shadow prices, proportional fairness and stability,” Journal of the Operational Research Society, vol. 49, no. 3, pp. 237–252, 1998.
[31] X. Wang, Z. Fei, J. A. Zhang, J. Huang, and J. Yuan, “Constrained utility maximization in dual-functional radar-communication multi-UAV networks,” IEEE Transactions on Communications, vol. 69, no. 4, pp. 2660–2672, 2021.
[32] P. D. Diamantoulakis and G. K. Karagiannidis, “Maximizing proportional fairness in wireless powered communications,” IEEE Communications Letters, vol. 6, no. 2, pp. 202–205, 2017.
[33] H. Huang, A. V. Savkin, and C. Huang, “Decentralised autonomous navigation of a UAV network for road traffic monitoring,” IEEE Transactions on Aerospace and Electronic Systems, vol. 57, no. 4, pp. 2558–2564, 2021.
[34] Z. Zhang, Q. Zhang, J. Miao, F. R. Yu, F. Fu, J. Du, and T. Wu, “Energy-efficient secure video streaming in UAV-enabled wireless networks: A safe-DQN approach,” IEEE Transactions on Green Communications and Networking, vol. 5, no. 4, pp. 1892–1905, 2021.
[35] D. Han, W. Chen, and J. Liu, “Energy-efficient UAV communications under stochastic trajectory: A markov decision process approach,” IEEE Transactions on Green Communications and Networking, vol. 5, no. 1, pp. 106–118, 2021.
[36] S. Hu, W. Ni, X. Wang, A. Jamalipour, and D. Ta, “Joint optimization of trajectory, propulsion, and thrust powers for covert UAV-on-UAV video tracking and surveillance,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1959–1972, 2021.
[37] J. Cho, J. Sung, J. Yoon, and H. Lee, “Towards persistent surveillance and reconnaissance using a connected swarm of multiple UAVs,” IEEE Access, vol. 8, pp. 157906–157917, 2020.
[38] V. T. Hoang, M. D. Phung, T. H. Dinh, and Q. P. Ha, “System architecture for real-time
surface inspection using multiple UAVs,” IEEE Systems Journal, vol. 14, no. 2, pp. 2925–2936, 2020.
[39] S. Zhang, H. Zhang, B. Di, and L. Song, “Cellular UAV-to-X communications: Design and optimization for multi-UAV networks,” IEEE Transactions on Wireless Communications, vol. 18, no. 2, pp. 1346–1359, 2019.
[40] S. Zhang, H. Zhang, Z. Han, H. V. Poor, and L. Song, “Age of information in a cellular internet of UAVs: Sensing and communication trade-off design,” IEEE Transactions on Wireless Communications, vol. 19, no. 10, pp. 6578–6592, 2020.
[41] S. Zhang, H. Zhang, B. Di, and L. Song, “Cooperative sensing and transmission for cellular network controlled unmanned aerial vehicles,” in Proceedings of IEEE Global Communications Conference (GLOBECOM), pp. 1–6, 2018.
[42] C. D. Franco and G. Buttazzo, “Coverage path planning for UAVs photogrammetry with energy and resolution constraints,” Journal of Intelligent & Robotic Systems, vol. 83, pp. 445–462, 2016.
[43] X.-W. Tang, S. Zhang, C. You, X.-L. Huang, and R. Zhang, “UAV-assisted image acquisition: 3D UAV trajectory design and camera control,” in Proceedings of IEEE 96th Vehicular Technology Conference (VTC Spring), pp. 1–6, 2022.
[44] N. Masmoudi, W. Jaafar, S. Cherif, J. B. Abderrazak, and H. Yanikomeroglu, “UAV-based crowd surveillance in post COVID-19 era,” IEEE Access, vol. 9, pp. 162276–162290, 2021.
[45] L. Xie, J. Xu, and R. Zhang, “Throughput maximization for UAV-enabled wireless powered communication networks,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1690–1703, 2019.
[46] Y. Liu, K. Xiong, Q. Ni, P. Fan, and K. B. Letaief, “UAV-assisted wireless powered cooperative mobile edge computing: Joint offloading, CPU control, and trajectory optimization,” IEEE Internet of Things Journal, vol. 7, no. 4, pp. 2777–2790, 2020.
[47] X. Hu, K.-K. Wong, and Y. Zhang, “Wireless-powered edge computing with cooperative UAV: Task, time scheduling and trajectory design,” IEEE Transactions on Wireless Communications, vol. 19, no. 12, pp. 8083–8098, 2020.
[48] M. Khosravi, S. Enayati, H. Saeedi, and H. Pishro-Nik, “Multi-purpose drones for coverage and transport applications,” IEEE Transactions on Wireless Communications, vol. 20, no. 6, pp. 3974–3987, 2021.
[49] M. Samir, S. Sharafeddine, C. M. Assi, T. M. Nguyen, and A. Ghrayeb, “UAV trajectory planning for data collection from time-constrained IoT devices,” IEEE Transactions on Wireless Communications, vol. 19, no. 1, pp. 34–46, 2020.
[50] A. Mrad, A. Al-Hilo, S. Sharafeddine, and C. Assi, “NOMA-aided UAV data collection from time-constrained IoT devices,” in Proceedings of IEEE International Conference on Communications (ICC), pp. 1–6, 2022.
[51] C. Zhan, H. Hu, Z. Liu, Z. Wang, and S. Mao, “Multi-UAV-enabled mobile edge computing for time-constrained IoT applications,” IEEE Internet of Things Journal, vol. 8, no. 20, pp. 15553–15567, 2021.
[52] K. Liu and J. Zheng, “UAV trajectory optimization for time-constrained data collection in UAV-enabled environmental monitoring systems,” IEEE Internet of Things Journal, vol. 9, no. 23, pp. 24300–24314, 2022.
[53] D.-H. Tran, V.-D. Nguyen, S. Chatzinotas, T. X. Vu, and B. Ottersten, “UAV relay-assisted emergency communications in IoT networks: Resource allocation and trajectory optimization,” IEEE Transactions on Wireless Communications, vol. 21, no. 3, pp. 1621–1637, 2022.
[54] A. M. Almasoud, M. Y. Selim, A. Alqasir, T. Shabnam, A. Masadeh, and A. E. Kamal, “Energy efficient data forwarding in disconnected networks using cooperative UAVs,” in Proceedings of IEEE Global Communications Conference (GLOBECOM), pp. 1–6, 2018.
[55] J. Scherer and B. Rinner, “Multi-UAV surveillance with minimum information idleness and latency constraints,” IEEE Robotics and Automation Letters, vol. 5, no. 3, pp. 4812–4819, 2020.
[56] K. Meng, X. He, Q. Wu, and D. Li, “Multi-UAV collaborative sensing and communication: Joint task allocation and power optimization,” IEEE Transactions on Wireless Communications, vol. 22, no. 6, pp. 4232–4246, 2023.
[57] N. Kumar, M. Ghosh, and C. Singhal, “UAV network for surveillance of inaccessible regions with zero blind spots,” in Proceedings of IEEE International Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1213–1218, 2020.
[58] M. Shenoy, A. Roy, and S. Misra, “QoI-aware camera network-as-a-service for social behavior analysis,” in Proceedings of IEEE International Conference on Communications (ICC), pp. 1–6, 2021.
[59] X. Lin, V. Yajnanarayana, S. D. Muruganathan, S. Gao, H. Asplund, H.-L. Maattanen, M. Bergstrom, S. Euler, and Y.-P. E. Wang, “The sky is not the limit: LTE for unmanned aerial vehicles,” IEEE Communications Magazine, vol. 56, no. 4, pp. 204–210, 2018.
[60] G. Yuan and B. Ghanem, “An exact penalty method for binary optimization based on MPEC formulation,” in Proceedings of 31st AAAI Conference on Artificial Intelligence (AAAI), p. 2867–2875, 2017.
[61] Z. Q. Luo, J. S. Pang, and D. Ralph, Mathematical Programs with Equilibrium Constraints. U.K.: Cambridge Univ. Press, 1996.
[62] X. Hu and D. Ralph, “Convergence of a penalty method for mathematical programming with complementarity constraints,” Journal of Optimization Theory and Applications, vol. 123, no. 2, pp. 365–390, 2004.
[63] T. Ma, H. Zhou, B. Qian, N. Cheng, X. Shen, X. Chen, and B. Bai, “UAV-LEO integrated backbone: A ubiquitous data collection approach for B5G internet of remote things networks,” IEEE Journal on Selected Areas in Communications, vol. 39, no. 11, pp. 3491–3505, 2021.
[64] CENELEC, “Video surveillance systems for use in security applications,” Standard CENELEC EN 62676-4:2015, European Committee for Electrotechnical Standardization, 2015.
[65] M. Grant and S. Boyd, “CVX: Matlab software for disciplined convex programming, version 2.2,” Jan. 2020.
[66] A. Meng, X. Gao, Y. Zhao, and Z. Yang, “Three-dimensional trajectory optimization for energy-constrained UAV-enabled IoT system in probabilistic LoS channel,” IEEE Internet of Things Journal, vol. 9, no. 2, pp. 1109–1121, 2022.
[67] C. You and R. Zhang, “Hybrid offline-online design for UAV-enabled data harvesting in probabilistic LoS channels,” IEEE Transactions on Wireless Communications, vol. 19, no. 6, pp. 3753–3768, 2020.
[68] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms. MIT Press, 2nd ed., 2001.
[69] Y.-W. P. Hong, R.-H. Cheng, Y.-C. Hsiao, and J.-P. Sheu, “Power-efficient trajectory adjustment and temporal routing for multi-UAV networks,” IEEE Transactions on Green Communications and Networking, vol. 4, no. 4, pp. 1106–1119, 2020.
[70] F. Diara and M. Roggero, “Quality assessment of DJI Zenmuse L1 and P1 LiDAR and photogrammetric systems: Metric and statistics analysis with the integration of trimble SX10 data,” Geomatics, vol. 2, no. 3, pp. 254–281, 2022.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *