Simulations validate the proposed UAV‑CRN optimization algorithm, showing improved rates, convergence, and insights into propulsion power and IT constraints.Simulations validate the proposed UAV‑CRN optimization algorithm, showing improved rates, convergence, and insights into propulsion power and IT constraints.

Numerical Validation of UAV‑CRN Optimization: Improved Rates Under Energy and PLoS Constraints

2025/08/25 10:30

Abstract and I. Introduction

II. System Model

III. Problem Formulation

IV. Proposed Algorithm for Problem P0

V. Numerical Results

VI. Conclusion

APPENDIX A: PROOF OF LEMMA 1 and References

V. NUMERICAL RESULTS

In this section, extensive simulations are conducted to validate the effectiveness and the convergence of the proposed algorithm. To illustrate the advantages of the proposed algorithm, the following three benchmark schemes are compared.

\

  1. Benchmark I: B transmit signals with the average power and both 3D trajectory of B and user scheduling are jointly optimized based on the PLoS model, which is denoted by ‘NPC’.

    \

  2. Benchmark II: The 2D trajectory of B, the transmission power of B, and user scheduling are jointly optimized based on the LoS model, which is denoted by ‘2D-LoS’.

    \

  3. Benchmark III: B works with fixed vertical trajectory and its horizontal and transmission power of B, and user scheduling are jointly optimized based on the PLoS model, which is denoted by ‘2D-PLoS’.

\ TABLE II: List of Simulation Parameters.

\

\ Fig. 5: Simulation results with different schemes.

\

\ Figs. 4(a) and 4(b) provide the 3D trajectory of B with the different schemes and in the scenarios with different propulsion power limitations, respectively. From Fig. 4(a), it can be observed that compared with the scenarios with the 2D-PLoS scheme, B in the 2D-LoS scheme must keep away from D to meet IT constraints. This requirement for B to keep away from D in the 2D-LoS scheme is due to the exaggerated probability of LoS for the A2G link. The results in Fig. 4(b) show that different propulsion power limitation results in different vertical trajectories

\

\

\

\

VI. CONCLUSION

This work investigated the achievable rate of the underlay IoT system with an energy-constrained UAV under PLoS channels. The achievable rate of the considered systems was maximized by jointly considering the UAV’s 3D trajectory, transmission power, and user scheduling, which is a nonlinear mixed-integer non-convex problem. The lower bound of the average achievable rate was utilized and the original nonconvex problem was transformed into several solvable convex subproblems by using BCD and SCA techniques, and an efficient iterative algorithm was proposed. The numerical results not only verified the convergence and effectiveness of the algorithm but also illustrated the impact of propulsion power and interference thresholds on the average achievable rate

\

APPENDIX A

PROOF OF LEMMA 1

\

\ \ From the above Jacobian matrix, we can obtain the Hessian matrix of f(x, y) as

\ \

\ \ According to (33) and (34), for any given A ≥ 0, We can determine that the determinant of the cofactor matrix of the Hessian matrix of function f(x, y) is greater than or equal to 0. Therefore, the Hessian matrix of f(x, y) is a semi-positive definite matrix, so f(x, y) is a convex function.

\

REFERENCES

[1] Q. Wu, J. Xu, Y. Zeng, D. W. K. Ng, N. Al-Dhahir, R. Schober, and A. L. Swindlehurst, “A comprehensive overview on 5G-and-beyond networks with UAVs: From communications to sensing and intelligence,” IEEE J. Sel. Areas Commun., vol. 39, no. 10, pp. 2912-2945, Oct. 2021.

\ [2] B. Li, Z. Fei, and Y. Zhang, “UAV communications for 5G and beyond: recent advances and future trends,” IEEE Internet Things J., vol. 6, no. 2, pp. 2241-2263, Apr. 2019.

\ [3] Y. Zeng, Q. Wu, and R. Zhang, “Accessing from the sky: A tutorial on UAV communications for 5G and beyond,” Proc. IEEE, vol. 107, no. 12, pp. 2327-2375, Dec. 2019.

\ [4] Q. Wu, L. Liu, and R. Zhang, “Fundamental trade-offs in communication and trajectory design for UAV-enabled wireless network,” IEEE Wireless Commun., vol. 26, no. 1, pp. 36-44, Feb. 2019.

\ [5] Q. Wu, Y. Zeng, and R. Zhang, “Joint trajectory and communication design for multi-UAV enabled wireless networks,” IEEE Trans. Wireless Commun., vol. 17, no. 3, pp. 2109-2121, Mar. 2018.

\ [6] Z. Li, M. Chen, C. Pan, N. Huang, Z. Yang, and A. Nallanathan, “Joint trajectory and communication design for secure UAV networks,” IEEE Commun. Lett., vol. 23, no. 4, pp. 636-639, Apr. 2019.

\ [7] H. Fu, Z. Sheng, A. A. Nasir, A. H. Muqaibel, and L. Hanzo, “Securing the UAV-aided non-orthogonal downlink in the face of colluding eavesdroppers,” IEEE Trans. Veh. Technol., vol. 71, no. 6, pp. 6837-6842, Jun. 2022.

\ [8] M. Cui, G. Zhang, Q. Wu, and D. W. K. Ng, “Robust trajectory and transmit power design for secure UAV communications,” IEEE Trans. Veh. Technol., vol. 67, no. 9, pp. 9042-9046, Sep. 2018.

\ [9] Y. Zeng and R. Zhang, “Energy-efficient UAV communication with trajectory optimization,” IEEE Trans. Wireless Commun., vol. 16, no. 6, pp. 3747-3760, Jun. 2017.

\ [10] S. Eom, H. Lee, J. Park, and I. Lee, “UAV-aided wireless communication designs with propulsion energy limitations,” IEEE Trans. Veh. Technol., vol. 69, no. 1, pp. 651-662, Jan. 2020.

\ [11] Y. Wu, W. Yang, X. Guan, and Q. Wu, “Energy-efficient trajectory design for UAV-enabled communication under malicious jamming,” IEEE Wireless Commun. Lett., vol. 10, no. 2, pp. 206-210, Feb. 2021.

\ [12] J. Zhang, Y. Zeng, and R. Zhang, “Receding horizon optimization for energy-efficient UAV communication,” IEEE Wireless Commun. Lett., vol. 9, no. 4, pp. 490-494, Apr. 2020.

\ [13] A. Bejaoui, K.-H. Park, and M.-S. Alouini, “A QoS-oriented trajectory optimization in swarming unmanned-aerial-vehicles communications,” IEEE Wireless Commun. Lett., vol. 9, no. 6, pp. 791-794, Jun. 2020.

\ [14] Y. Zeng, J. Xu, and R. Zhang, “Energy minimization for wireless communication with rotary-wing UAV,” IEEE Trans. Wireless Commun., vol. 18, no. 4, pp. 2329-2345, Apr. 2019.

\ [15] C. Zhan and H. Lai, “Energy minimization in internet-of-things system based on rotary-wing UAV,” IEEE Wireless Commun. Lett., vol. 8, no. 5, pp. 1341-1344, Oct. 2019.

\ [16] B. Duo, Q. Wu, X. Yuan, and R. Zhang, “Energy efficiency maximization for full-duplex UAV secrecy communication,” IEEE Trans. Veh. Technol., vol. 69, no. 4, pp. 4590-4595, Apr. 2020.

\ [17] R. Zhang, X. Pang, W. Lu, N. Zhao, Y. Chen, and D. Niyato, “Dual-UAV enabled secure data collection with propulsion limitation,” IEEE Trans. Wireless Commun., vol. 20, no. 11, pp. 7445-7459, Nov. 2021.

\ [18] M. Li, X. Tao, N. Li, H. Wu, and J. Xu, “Secrecy energy efficiency maximization in UAV-enabled wireless sensor networks without eavesdropper’s CSI,” IEEE Internet Things J., vol. 9, no. 5, pp. 3346-3358, Mar. 2022.

\ [19] A. Al-Hourani, S. Kandeepan, and S. Lardner, “Optimal LAP altitude for maximum coverage,” IEEE Wireless Commun. Lett., vol. 3, no. 6, pp. 569-572, Dec. 2014.

\ [20] B. Duo, H. Hu, Y. Li, and X. Yuan, “Joint trajectory and power design in probabilistic LoS channel for UAV-enabled cooperative jamming,” Proc. IEEE International Conference on Communications (ICC 2021), Montreal, QC, Canada, Jun. 2021, pp. 1-6.

\ [21] C. You and R. Zhang, “Hybrid offline-online design for UAV-enabled data harvesting in probabilistic LoS channels,” IEEE Trans. Wireless Commun., vol. 19, no. 6, pp. 3753-3768, Jun. 2020.

\ [22] B. Duo, Q. Wu, X. Yuan, and R. Zhang, “Anti-jamming 3D trajectory design for UAV-enabled wireless sensor networks under probabilistic LoS channel,” IEEE Trans. Veh. Technol., vol. 69, no. 12, pp. 16288-16293, Dec. 2020.

\ [23] Z. Guan, S. Wang, L. Gao, and W. Xu, “Energy-efficient UAV communication with 3D trajectory optimization,” Proc. 2021 7th International Conference on Computer and Communications (ICCC), Chengdu, China, Dec. 2021, pp. 312-317.

\ [24] A. Meng, X. Gao, Y. Zhao, and Z. Yang, “Three-dimensional trajectory optimization for energy-constrained UAV-enabled IoT system in probabilistic LoS channel,” IEEE Internet Things J., vol. 9, no. 2, pp. 1109- 1121, Jan. 2022.

\ \ [25] H. Lei, H. Ran, I. S. Ansari, K.-H. Park, G. Pan, and M.-S. Alouini, “DDPG-based aerial secure data collection,” IEEE Trans. Commun., doi: 10.1109/TCOMM.2024.3379417, 2024.

\ [26] Y. Saleem, M. H. Rehmani, and S. Zeadally, “Integration of cognitive radio technology with unmanned aerial vehicles: Issues, opportunities, and future research challenges,” J. Netw. Comput. Appl., vol. 50, pp. 15- 31, Apr. 2015.

\ [27] H. Lei, H. Yang, K.-H. Park, I. S. Ansari, J. Jiang, and M.-S. Alouini, “Joint trajectory design and user scheduling for secure aerial underlay IoT systems,” IEEE Internet Things J., vol. 10, no. 15, pp. 13637-13648, Aug. 2023.

\ [28] H. Lei, J. Jiang, H. Yang, K.-H. Park, I. S. Ansari, G. Pan, and M.-S. Alouini. “Trajectory and power design for aerial CRNs with colluding eavesdroppers,” arXiv:2310.13931, Oct. 2023, [Online]: https://arxiv.org/abs/2310.13931

\ [29] P. X. Nguyen, V.-D. Nguyen, H. V. Nguyen, and O.-S. Shin, “UAVassisted secure communications in terrestrial cognitive radio networks: Joint power control and 3D trajectory optimization,” IEEE Trans. Veh. Technol., vol. 70, no. 4, pp. 3298-3313, Apr. 2021.

\ [30] Z. Wang, F. Zhou, Y. Wang, and Q. Wu, “Joint 3D trajectory and resource optimization for a UAV relay-assisted cognitive radio network,” China Commun., vol. 18, no. 6, pp. 184-200, Jun. 2021.

\ [31] Y. Huang, W. Mei, J. Xu, L. Qiu, and R. Zhang, “Cognitive UAV communication via joint maneuver and power control,” IEEE Trans. Commun., vol. 67, no. 11, pp. 7872-7888, Nov. 2019.

\ [32] Y. Jiang and J. Zhu, “Three-dimensional trajectory optimization for secure UAV-enabled cognitive communications,” China Commun., vol. 18, no. 12, pp. 285-296, Dec. 2021.

\ [33] Y. Sun, D. Xu, D. W. K. Ng, L. Dai, and R. Schober, “Optimal 3D-trajectory design and resource allocation for solar-powered UAV communication systems,” IEEE Trans. Commun., vol. 67, no. 6, pp. 4281- 4298, Jun. 2019.

\ [34] J. Yao and J. Xu, “Joint 3D maneuver and power adaptation for secure UAV communication with CoMP reception,” IEEE Trans. Wireless Commun., vol. 19, no. 10, pp. 6992-7006, Oct. 2020.

\ [35] E. Tzoreff and A. J. Weiss, “Path design for best emitter location using two mobile sensors,” IEEE Trans. Signal Process., vol. 65, no. 19, pp. 5249-5261, Oct. 2017.

\ [36] H. Xing, L. Liu, and R. Zhang, “Secrecy wireless information and power transfer in fading wiretap channel,” IEEE Trans. Veh. Technol., vol. 65, no. 1, pp. 180-190, Jan. 2016.

\ [37] T. Liu, M. Cui, G. Zhang, Q. Wu, X. Chu, and J. Zhang, “3D trajectory and transmit power optimization for UAV-enabled multi-link relaying systems,” IEEE Trans. Green Commun. Netw., vol. 5, no. 1, pp. 392- 405, Mar. 2021.

\ [38] S. Boyd and L. Vandenberghe, Convex Optimization: Cambridge Univ Press, 2004.

\ [39] A. Filippone, Flight Performance of Fixed and Rotary Wing Aircraft. Amsterdam, The Netherlands: Elsevier, 2006.

\

:::info Authors:

(1) Hongjiang Lei, School of Communications and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China (leihj@cqupt.edu.cn);

(2) Xiaqiu Wu, School of Communications and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China (cquptwxq@163.com);

(3) Ki-Hong Park, CEMSE Division, King Abdullah University of Science and Technology (KAUST), Thuwal 23955-6900, Saudi Arabia (kihong.park@kaust.edu.sa);

(4) Gaofeng Pan, School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China (gaofeng.pan.cn@ieee.org).

:::


:::info This paper is available on arxiv under CC BY 4.0 DEED license.

:::

\

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

BFX Presale Raises $7.5M as Solana Holds $243 and Avalanche Eyes $1B Treasury — Best Cryptos to Buy in 2025

BFX Presale Raises $7.5M as Solana Holds $243 and Avalanche Eyes $1B Treasury — Best Cryptos to Buy in 2025

BFX presale hits $7.5M with tokens at $0.024 and 30% bonus code BLOCK30, while Solana holds $243 and Avalanche builds a $1B treasury to attract institutions.
Share
Blockchainreporter2025/09/18 01:07
OCC Findings Suggest Major U.S. Banks Restricted Access for Digital Asset Firms Amid Debanking Probe

OCC Findings Suggest Major U.S. Banks Restricted Access for Digital Asset Firms Amid Debanking Probe

The post OCC Findings Suggest Major U.S. Banks Restricted Access for Digital Asset Firms Amid Debanking Probe appeared on BitcoinEthereumNews.com. The Office of the Comptroller of the Currency (OCC) has confirmed that nine major U.S. banks engaged in debanking practices from 2020 to 2023, restricting access for digital asset firms and other sectors. This marks the first official acknowledgment of these policies, which limited services based on customer types, affecting crypto businesses significantly. OCC report highlights inappropriate distinctions by banks like JPMorgan Chase and Bank of America, targeting crypto and high-risk sectors. Nine banks reviewed showed similar policies restricting customer access without objective risk assessments. Impacted industries include digital asset firms, with potential referrals to the Attorney General for unlawful practices. Discover how major U.S. banks’ debanking policies hit crypto firms hard, per OCC’s 2025 report. Learn the implications for digital assets and what regulators are doing next—stay informed on banking risks today! What Are the OCC’s Findings on Banks Debanking Crypto Firms? Banks debanking crypto firms involves major financial institutions limiting or denying services to digital asset businesses based on perceived risks, as detailed in a recent Office of the Comptroller of the Currency (OCC) report. From 2020 to 2023, nine of the largest U.S. banks implemented policies that required escalated reviews or outright restrictions for certain customers, including those in the crypto sector. This practice, now publicly confirmed, underscores ongoing tensions between traditional banking and emerging digital asset industries. How Did These Debanking Practices Affect Digital Asset Companies? The OCC’s six-page report, released on Wednesday, revealed that institutions such as JPMorgan Chase, Bank of America, Citigroup, Wells Fargo, U.S. Bancorp, Capital One, PNC Financial Services Group, Toronto-Dominion Bank, and Bank of Montreal made distinctions among customers that were deemed inappropriate. For digital asset firms, this meant heightened scrutiny or complete denial of banking services, hindering operations in an already volatile market. The regulator noted that these policies spanned…
Share
BitcoinEthereumNews2025/12/11 11:01