Next Article in Journal
Collaborative Mixture-of-Experts Model for Multi-Domain Fake News Detection
Previous Article in Journal
Adaptive Absolute Attitude Determination Algorithm for a Fine Guidance Sensor
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Joint Unmanned Aerial Vehicle Location and Beamforming and Caching Optimization for Cache-Enabled Multi-Unmanned-Aerial-Vehicle Networks

1
School of Information and Electronics, Beijing Institute of Technology, Beijing 100081, China
2
Chongqing Innovation Center, Beijing Institute of Technology, Chongqing 400031, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(16), 3438; https://doi.org/10.3390/electronics12163438
Submission received: 6 June 2023 / Revised: 3 August 2023 / Accepted: 7 August 2023 / Published: 14 August 2023

Abstract

:
Due to the advantages such as high flexibility, low cost and easy implementation offered by unmanned aerial vehicles (UAVs), a UAV-assisted network is regard as an appealing solution to a seamless coverage, high disaster-tolerant and on-demand wireless system. In this paper, we focus on the downlink transmission in a cache-enabled UAV-assisted wireless communication network, where UAVs cache popular content from a macro base station in advance and cooperatively transfer the content to users. We aim to minimize the average transmission latency of the system and to formulate an optimization problem that jointly optimizes the UAV location, beamforming and caching strategy. However, the formulated problem is very challenging because of its non-convexity and the highly coupled optimization variables. To solve this resulting problem efficiently, we decompose it into two subproblems, namely UAV location and beamforming optimization, and UAV caching strategy optimization. The first subproblem is an NP-hard joint optimization problem, while the second one is a linear programing problem. By adopting the first-order Taylor expansion, we propose a convex optimization algorithm based on the difference-of-convex (DC) method. Specifically, we bring out a method to apply linear approximation in the DC-based algorithm, which is particularly suitable to the problems involving complicated summations. The numerical results demonstrate that the proposed DC-based iterative optimization algorithm can efficiently reduce the average transmission latency of the system.

1. Introduction

In recent years, unmanned aerial vehicles (UAVs) have been increasingly employed in a variety of applications [1,2,3]. Due to many attractive advantages such as swift mobility, high flexibility, low cost and quick deployment, UAVs have been used to perform various tasks like photo taking, video recording, delivery and communication relay.
In particular, the feature of line-of-sight (LoS) channels makes it quite suitable for UAVs to provide wireless relay, such that the multi-UAV-assisted wireless network is supposed to be a powerful complement to conventional wireless cellular networks. For example, UAV-assisted communication could help deal with disasters as an alternative mode of emergency communication. Another important application is using UAVs to offload data traffic from crowded areas. In scenarios which temporarily involve large crowds, such as festivals, concerts and sporting events, UAVs could help mitigate the lack of capacity [2]. The ability to provide flexible and effective capacity expansion for existing network makes UAVs potential tools to improve the wireless coverage. Due to its promising performance, UAV-assisted communication has recently become an emerging research field. The Third Generation Partnership Project (3GPP) has submitted several technical specifications related to UAV-assisted communication systems, in which the requirements [4] and architecture [5] of Uncrewed Aerial Systems are defined.

1.1. Background of Cache-Enabled UAV-Assisted Network

Wireless caching has turned out to be an effective solution to meet the demand for low latency data traffic [6,7,8]. Studies have shown that in cellular networks, there is usually some popular content that is repeatedly requested by users [6]. This popular content would be requested and transferred multiple times in a period of time, which would result in a decrease in the data-transferring efficiency. In order to save on network resources, forwarding caching of some popular content at edge nodes is regarded as a promising solution. During idle periods of the network, edge nodes could cache popular content from a macro base station (MBS) via backhaul networks. Once the cached content is requested, it can be delivered directly to the user through edge nodes, and the user would enjoy low communication latency.
By employing cache-enabled UAVs as edge nodes, a wireless network could provide high-quality, high-efficiency and on-demand wireless coverage [9,10,11,12,13]. Consider UAV-assisted communication systems with cache-enabled multi-antenna UAVs; there are mainly three key issues in improving the system performance: UAV deployment, beamforming scheme and caching strategy. First, it is easy to understand that the locations of UAVs determine the distances from the served users, thus affecting the channel quality [14,15,16,17,18]. Second, multiple antennae enable UAVs to utilize beamforming to obtain higher SINRs; accordingly, an appropriate beamforming scheme is required [19,20,21,22]. At the same time, the caching strategy, or content placement, has been extensively researched in traditional cellular networks [6,7,8,19,20], and it is also important in UAV-assisted networks.

1.2. Related Work

The impact of UAV deployment has been intensively investigated in [14,15,16,17,18]. To optimize the 3D deployment of UAVs, the authors in [14] establish an integer linear programming model, while the authors in [15] approximate the rate expression to identify the concave regions and to apply alternating optimization. Particle swarm optimization [16] and game-theoretic framework [17] are also studied to optimize UAV deployment. Differently, ref. [18] not only determines the 3D coordinates but also minimizes the number of UAVs, in which a K-Means algorithm is proposed.
The work in [23,24] focuses on the caching problems in UAV-assisted networks. In [23], the caching strategy is optimized by investigating the user request preference with the aid of latent Dirichlet allocation, while [24] proposes a dual dynamic adaptive caching algorithm. Refs. [9,10,11] consider the optimization of UAV location and caching strategy. Refs. [19,20] focus on beamforming and caching optimization in cellular networks, in which the locations of base stations are fixed, different from UAV scenarios. Ref. [21] optimizes UAV location and beamforming jointly, where a framework based on difference of convex (DC) is proposed. Moreover, UAV trajectory is considered in [25,26], while resource is considered in [27,28]. Ref. [12] jointly optimizes resource, deployment and caching; ref. [22] jointly optimizes UAV location, beamforming, and power control; and ref. [13] optimizes UAV location, association, caching and computing resource. Much research has been carried out in the field of cache-enable UAV-assisted communications. However, we find that existing work has not sufficiently considered the impact of the joint design of UAV caching, beamforming and location, and the optimization in this scenario remains an open problem.

1.3. Contributions

The main contributions of this paper are enumerated as follows.
  • We consider the downlink transmission in a cache-enabled UAV-assisted wireless communication system, which consists of UAVs, users, and an MBS. The design of UAV deployment, caching and beamforming is investigated. As far as we are concerned, this is a positive attempt to jointly optimize UAV location, caching and beamforming in a UAV-assisted network.
  • We decompose the formulated problem into two subproblems and solve them iteratively. Inspired by [21], we use the DC-based method to convert the original problem into a convex form. Specifically, we bring out a method to apply linear approximation in the DC-based algorithm, which is particularly suitable to the problems involving complicated summations.
  • Finally, via numerical results, we show that the proposed DC-based algorithm can efficiently reduce transmission latency. The DC-based algorithm outperforms the benchmark algorithms, especially in the case of the UAV caching capacity being small or the Zipf parameter of content popularity being large.
The rest of this paper is organized as follows. Section 2 introduces the system model. Then, in Section 3, the problem formulation is presented and a DC-based joint optimization algorithm is proposed. Section 4 presents and analyzes the numerical results. Finally, the conclusion of this paper is drawn in Section 5.

2. System Model

2.1. System Description

As shown in Figure 1, we consider the downlink of a distributed cache network consisting of one MBS, UAVs and ground users. The set of UAVs is denoted by M = 1 , 2 , , M , and the set of users is denoted by N = 1 , 2 , , N . Assume that the number of antennas for each UAV is the same, and the number is N T . Consider that there are K popular content, denoted by set K = 1 , 2 , , K .
Compared with MBS, UAVs are usually closer to users, so they provide higher transmission rates for related users. To simplify the discussion, it is assumed that the service rate of an MBS for each user is the same. The service rate of an MBS is set as a constant, which is lower than the average of UAVs.

2.2. UAVs and User Distribution Model

Without loss of generality, we assume all UAVs always hover at a constant height H. During the interested time slot, the positions of users are considered to be quasistatic, while all the horizontal positions of UAVs can be changed over time.
We denote the i th UAV as UAV i , i M and the j th user as U E j , j N . The position vectors of UAV i and U E j are denoted by v i = ( x i v , y i v , H ) and u j = ( x j u , y j u , 0 ) , respectively. For convenience of the subsequent formula expressions, we denote the position vector of the n t th antenna of UAV i as v i n t = ( x i n t v , y i n t v , H ) , n t = 1 , 2 , , N T , and if U E j is required for the k th content, denote the position of U E j as u j k = ( x j k v , y j k v , 0 ) , where k K .
We assume that each UAV serves several nearest users and each user could be served by several UAVs. For simplicity, the user association is considered to be fixed, which means the connection between UAVs and users would be unchanged during the interested time. The connection relationship between UAV i and U E j is denoted by q i j q i j = 1 represents that a connection exists, and q i j = 0 represents that a connection does not exist. That is,
q i j = 1 , connection exists 0 , connection does not exist .
The set of users served by UAV i is denoted as A i , i M , and  A i N .

2.3. Content Request, Caching and Fetching

In the considered system, each user randomly requests content following a certain probability distribution. We denote the probability of content k being requested as p k , k K and  k = 1 K p k = 1 . For convenience, it is assumed that the content has been sorted by popularity, which means that content k is the k th most popular content of all content. Content popularity is modeled using a Zipf distribution, and the probabilities of popular content being requested by a user can be described as P K Zipf ( α , K ) , and the probability of requesting the k th most popular content is
p k = 1 k α n = 1 K n α .
In (2), α is called the Zipf parameter, and  α 0 , 1 . Zipf distribution indicates the popularity of the content, and  α affects the differences in content popularity. The smaller the parameter α is, the smaller the popularity differences among content will be, and the converse is also true. In extreme cases, if  α = 0 , all content will have the same probability of being requested, or if α = 1 , the probability of content being requested will be in an inverse ratio to the ranking of the content.
The MBS is considered to be available for all users in the system and cached all contents. Differently, due to the limited power and capacity, each UAV can only connect some of the users and cache some of the content. Every UAV could choose to cache a complete content or just a part of it. The size of the k th content is denoted by L k , and proportion of the k th content cached in UAV i is denoted by z i k , z i k 0 , 1 , i M , k K . UAVs are able to implement the caching strategy through the high-capacity backhaul link with the MBS, which means that z i k is changeable and that limited storage of UAV could be reasonably allocated.
As for content fetching, UAVs and MBS cooperatively provide content for users. When the user initiates a data file request, the UAV serving the user only transmits the part of the file cached by the BTS, and the user reconstructs the file data from every connected UAV to obtain a complete file. If the requested file is not cached in the related UAVs, the missing file or part will be provided by MBS.

2.4. Signal, Channel and Noise Model

The number of antennas of each UAV is N T ; thus, the transmit signals could be denoted by N T -dimension vectors. We denote the beamforming vector of the transmit signal UAV i sent to U E j as
w i j = ( w i j 1 , w i j 2 , , w i j n t , , w i j N T ) T , i M , j N ,
where w i j is a complex vector.
The channel coefficient between U E j and the n t th antenna of UAV i is denoted by h i j n t , which consists of two parts: path loss and small-scale fading. We denote that h i j n t ( θ i j n t ) = θ i j n t h ˜ i j n t , where θ i j n t reflects the pass loss, while h ˜ i j n t represents the small-scale fading. θ i j n t is a function of u j k and v i n t , described as
θ i j n t = [ ( x i n t v x j k u ) 2 + ( y i n t v y j k u ) 2 + H 2 ] 0.5 .
h ˜ i j n t is considered to follow a Rician distribution. We adopt a Rician channel in our system model because a line of sight (LoS) signal usually exists in a UAV-assisted network. A Rician channel can be decomposed into a LoS propagation channel and a scattering channel, as shown in Equation (5).
h ˜ i j n t = K R 1 + K R h ¯ i j n t + 1 1 + K R h ^ i j n t ,
where h ¯ i j n t and h ^ i j n t represent the LoS component and NLoS component, respectively, and  h ^ i j n t usually follows a Rayleigh distribution. K R is the parameter of the Rician distribution, which determines the proportion of LoS and NLoS in the channel. These parameters are considered to be constant during the interested time slot. Let
h ˜ i j = ( h ˜ i j 1 , h ˜ i j 2 , , h ˜ i j N T ) T ,
and
θ i j = ( θ i j 1 , θ i j 2 , , θ i j N T ) T .
Then, we can denote the channel between UAV i and U E j as h i j = θ i j h ˜ i j , where ∘ is the operator of the Hadamard product. Here, h ˜ i j is a constant complex vector, and  θ i j is a complex vector variable. h i j is a function of variable θ i j , so it is also denoted as h i j ( θ i j ) .
It is assumed that MBS uses different frequency resources from UAVs, so there would be no interference between MBS and UAVs. Additive white gaussian noise (AWGN) and the interferences among UAVs are both considered. The signal to interference plus noise ratio (SINR) of the downlink transmission from UAV i to U E j could be denoted as
S I N R i j = | h i j H w i j | 2 m i n A m , n j | h m j H w m n | 2 + σ 2 ,
where σ 2 represents the power of AWGN. The transfer data rate from UAV i to U E j could be calculated using
R i j = log 2 ( 1 + S I N R i j ) = log 2 1 + | h i j H w i j | 2 m i n A m , n j | h m j H w m n | 2 + σ 2 , i M , j N .
Specially, we denote the downlink data rate between MBS and U E j as R 0 j . To simplify the discussion, R 0 j is set as constant R 0 for j N , where the link details of MBS are not considered. Generally, we set R 0 as a lower value compared with R i j because UAVs could usually achieve higher data rate by getting closer to users.

3. Problem Formulation and Solution

We minimize the average transmission latency of the network, which is related to locations, beamforming and caching strategies of UAVs. Specifically, the calculation of average latency is
τ ( w , u , z ) = k = 1 K j = 1 N p k z 0 k L k R 0 + i = 1 M q i j z i k L k R i j ( w i j , θ i j ) ,
where R is the data rate, which is related to the beamforming weight w and path loss θ , and  θ is mapped to UAV locations v . The system latency consists of two parts: MBS transmission latency and UAV transmission latency.
The related latency minimization problem is formulated as follows:
min w , θ , v , z k = 1 K j = 1 N p k z 0 k L k R 0 + i = 1 M q i j z i k L k R i j ( w i j , θ i j ) ,
where R i j = log 2 1 + | h i j H w i j | 2 m i n A m , n j | h m j H w m n | 2 + σ 2 .
s . t . j = 1 N | | w i j | | 2 P , i M ,
θ i j n t 1 = ( x i n t x j k ) 2 + ( y i n t y j k ) 2 + H 2 , i M , j N ,
k = 1 M z i k L k L max , i M ,
z 0 k + i = 1 M z i k 1 , k K ,
0 z i k 1 , 0 z 0 k 1 , i M , k K .
Here, inequality (10b) is the power constraint. The transmit power of UAV is limited, and we assume that the maximum power budget of every UAV is P. Equation constraint (10c) reflects the relationship between path loss θ and UAV location v . Inequality (10d) is the capacity constraint of every UAV, ensuring the cached contents are not larger than the capacity L max . Inequality (10e) represents the content integrity constraint. For all popular content, the data transmitted by MBS should be able to be combined into complete content with the data transmitted by UAVs, as is shown in (10e). Furthermore, (10f) reflects the physical meaning of z as the caching proportions.
As shown in (10a), caching variable z , UAV location variable v and beamforming variable w in the objective function are coupled, which means that it would be quite difficult to solve the problem directly. In order to reduce the complexity of the solution, a step-by-step iterative optimization method is adopted. We fix one of the variables, solve the remaining variables and iteratively solve the original problem.
We fix the caching variable z first, and the proportion of the content k cached in UAV i is set as z i k * . Then, the optimization problem becomes
min w , θ , R k = 1 K j = 1 N p k q i j z ik * L k R ˜ i j ,
s . t . j = 1 N | | w i j | | 2 P , i M ,
θ i j n t 1 ( x i n t x j k ) 2 + ( y i n t y j k ) 2 + H 2 , i M , j N ,
R ˜ i j log 2 1 + | h i j H w i j | 2 m i n A m , n j | h m j H w m n | 2 + σ 2 , i M , j N .
Here, inequality (11c) is the relaxed version of the equality constraint (10c). Since the optimality always occurs at the equality, the relax of the constraint would not cause any loss of generality, and this treatment could reduce the complexity of the problem.
Due to the complex form of the denominator, the whole function is non-convex in (10a). We introduce variable R ˜ i j and its constraint, so that the objective function (11a) is convex now. Note that the constraint of R ˜ i j is also a relaxed version, and it is easy to prove that constraint (11d) turns into the tight constraint when the problem (11) obtains the optimal solution, which means that R ˜ i j is equal to R i j when the optimal problem is solved.
Problem (11) is still not a convex problem due to constraints (11c) and (11d) being neither concave nor convex. For (11c), we can make the left-hand side linearized via the first-order Taylor expansion, as shown in (12).
2 θ i j [ ] θ i j θ i j [ ] 2 ( x i x j k ) 2 + ( y i y j k ) 2 + H 2 , i M , j N ,
where θ i j [ ] represents the Taylor expansion point.
We now consider transforming inequality (11d) into a convex constraint via DC method. The basic idea of DC method is, first, to transform the original problem into the difference of two convex functions, and, then, to apply an approximation method to eliminate the non-convexity.
For inequality (11d), we introduce a strongly convex function, which is added to and then taken away from the right-hand side of the original inequality, as shown in inequality (13). Inspired by [21], we choose a quadratic form as the introduced strongly convex function. We write inequality (11d) as
R ˜ i j log 2 1 + | h i j H w i j | 2 m M , m i n A m , n j | h m j H w m n | 2 + σ 2 + ξ i j ( | | w | | 2 + | | θ | | 2 ) ξ i j ( | | w | | 2 + | | θ | | 2 ) , i M , j N .
In inequality (13), ξ i j is a positive constant we set. It is proved in [21] that, if  ξ i j is set to be positive and large enough, function ξ i j ( | | w | | 2 + | | θ | | 2 ) will have strong convexity. Although the form of R ˜ i j is non-convex and non-concave, the sum of R ˜ i j and the introduced function would be a convex function, as long as the convexity of the introduced function is strong enough. In this way, a form of difference between two convex functions is constructed. Let
f i j ( w , θ ) = log 2 1 + | h i j H w i j | 2 m i n A m , n j | h m j H w m n | 2 + σ 2 + ξ i j ( | | w | | 2 + | | θ | | 2 ) = R i j ( w , θ ) + ξ i j ( | | w | | 2 + | | θ | | 2 ) ,
then constraint (13) is changed into
R ˜ i j f i j ( w , θ ) ξ i j ( | | w | | 2 + | | θ | | 2 ) , i M , j N .
Constraint (15) is in the form of the difference of two convex functions. To actually eliminate the non-convexity, we need to apply an approximation method, as it is noted earlier. The factor leading constraint (15) to be non-convex is f i j ( w , θ ) because it is a convex function on the right-hand side of “≤”. We tighten constraint (15) by replacing f i j ( w , θ ) with its lower-bound Taylor linearization. The first-order Taylor expansion for f i j ( w i j , θ i j ) can change the original formula into a convex constraint. The gradient of R i j ( θ , w ) is defined as R i j ( θ , w ) = [ θ R i j ( θ , w ) ; w R i j ( θ , w ) ] .
As shown in Equation (8), the transmission rate R i j ( θ , w ) has a complicated form, which is mainly caused by the SINR part. There are a series of summations of variables, making the derivative of R i j ( θ , w ) hard to express. To deal with this, we bring out a method to convert the summations into matrix multiplications and subsequently derive the gradient for applying the linear approximation. We reconstruct the optimization variables by introducing a series of vectors and matrices. Let
w = w 11 , w 12 , , w 1 j , , w 1 N N · N T , w 21 , , w 2 N N · N T , , w i j , , w M N M · N · N T T .
As one of optimization variables in this problem, w is a vector variable with M · N · N T dimensions, contains all beamforming weight information. The expression of SINR in matrix form can be constructed as follows:
Denote H ^ i j = h i j h i j H , i M , j N , and then, let
H ˜ i j = B d i a g H ^ 1 j , , 0 , , H ^ 1 j the j th block is 0 N blocks , H ^ 2 j , , 0 , , H ^ 2 j the ( N + j ) th block is 0 N blocks , , 0 , 0 , , 0 N blocks blocks in the i th group are all 0 , , H ^ M j , , 0 , , H ^ M j the ( ( M 1 ) N + j ) th block is 0 N blocks M · N blocks .
Note that every H ^ i j is a N T -dimension square matrix and that  H ˜ i j is a block diagonal matrix with M · N blocks. Specifically, the diagonal blocks of H ˜ i j are divided into M groups, and each group contains N blocks. Every diagonal block is a N T × N T matrix, so we can see that each H ˜ i j is a square matrix with M · N · N T dimensions. Actually, H ˜ i j consists of a series of H ^ i j and zero matrices. The N blocks of a group are all nearly the same, except the j th block of every group is a zero matrix. Furthermore, the N blocks of the i th group are all zero matrices. Except those above blocks, the blocks in the i * th group are set as H ^ i * j . The blocks of the i * th group roughly represent the channels between interference source UAV i * and U E j . For the downlink channel from UAV i to U E j , the interference caused by signals sent from other UAVs to other users can be represented by w i j H H ˜ i j ( θ ) w i j . Let
H i j = B d i a g H ^ 1 j , , 0 , , H ^ 1 j the j th block is 0 N blocks , H ^ 2 j , , 0 , , H ^ 2 j the ( N + j ) th block is 0 N blocks , , 0 , , H ^ i j , , 0 N blocks the i th group are all 0 , except the ( ( i 1 ) N + j ) th block , , H ^ M j , , 0 , , H ^ M j the ( ( M 1 ) N + j ) th block is 0 N blocks M · N blocks .
H i j is almost the same as H ˜ i j ; the only difference is the j th block in the i th group. To be specific, the  ( ( i 1 ) N + j ) th block of H i j is H ^ i j instead of 0 . Then, we can give a concise form of the channel data rate as follows:
R i j = log 2 w i j H H i j ( θ ) w i j + σ 2 w i j H H ˜ i j ( θ ) w i j + σ 2 = log 2 w i j H H i j ( θ ) w i j + σ 2 log 2 w i j H H ˜ i j ( θ ) w i j + σ 2 , i M , j N .
The partial difference of R i j for w can be calculated as
w R i j ( θ , w ) = 2 w i j H H i j ( θ ) w i j H H i j ( θ ) w i j + σ 2 2 w i j H H ˜ i j ( θ ) w i j H H ˜ i j ( θ ) w i j + σ 2 / ln 2 , i M , j N .
At this point, we have reconstructed the expression of R i j , and it is much easier to seek the partial difference of R i j in Equation (19), compared with Equation (8). The main idea behind this proposed reconstruction method is to specially design the variables as structured vectors and to construct the form of matrix multiplications according to the summations in the original expression. This method turned out to be effective in dealing with complicated summations, such as the interference among UAVs in this study.
Equation (19) is a concise form with respect to variable w . To obtain the partial difference for θ , we need to construct a new form of R i j . Let ω i j 1 j 2 ( w ) = h ˜ i j 1 w i j 2 , Ω ^ i j 1 j 2 ( w ) = ω i j 1 j 2 ω i j 1 j 2 H , i M , j 1 , j 2 N . The dimension of vector ω i j 1 j 2 is N T , and every Ω ^ i j 1 j 2 is a N T -dimension square matrix.
We define
θ j = θ 1 j , θ 2 j , , θ M j M · N T T , j N .
and
θ = θ 1 , θ 2 , , θ N M · N · N T T .
where θ i j = ( θ i j 1 , θ i j 2 , , θ i j N T ) T , as defined in (7). Every θ j is a vector with M · N T dimensions, and  θ is a vector with M · N · N T dimensions, which consists of θ j for all j N . We use θ j as one of the optimization variables and seek the partial difference for it. Let
Ω ¨ i j 1 j 2 ( w ) = B d i a g Ω ^ i j 1 j 2 , Ω ^ 2 j 1 j 2 , , Ω ^ i 1 j 1 j 2 , 0 , Ω ^ i + 1 j 1 j 2 , , Ω ^ M j 1 j 2 the i th block is 0 M blocks T , i M , j 1 , j 2 N .
and
Ω ˙ i j ( w ) = B d i a g 0 , 0 , 0 , Ω ^ i j j , 0 , , 0 the i th block is Ω ^ M blocks T , i M , j N .
Then, we define
Ω ˜ i j ( w ) = n A m , n j N Ω ¨ i j n , i M , j N ,
and
Ω i j ( w ) = n A m , n j N Ω ¨ i j n + Ω ˙ i j , i M , j N .
Note that the only difference between Ω ˜ i j ( w ) and Ω i j ( w ) is that Ω i j ( w ) has one more summation term than Ω ˜ i j ( w ) . Similar to (19), we can transform (8) into
R i j = log 2 θ j H Ω i j ( w ) θ j + σ 2 θ j H Ω ˜ i j ( w ) θ j + σ 2 = log 2 θ j H Ω i j ( w ) θ j + σ 2 log 2 θ j H Ω ˜ i j ( w ) θ j + σ 2 . i M , j 1 , j 2 N .
The partial difference of R i j for θ can be calculated as
θ R i j ( θ , w ) = 2 θ j H Ω i j ( w ) θ j H Ω i j ( w ) θ j + σ 2 2 θ j H Ω ˜ i j ( w ) θ j H Ω ˜ i j ( w ) θ j + σ 2 / ln 2 , i M , j N .
The first-order Taylor expansion for f i j ( w i j , θ i j ) at w [ ] , θ [ ] is denoted as F i j ( w , θ ; w [ ] , θ [ ] ) :
F i j ( w , θ ; w [ ] , θ [ ] ) = f i j ( w [ ] , θ [ ] ) + 2 Re ( w [ ] ) H H i j ( θ [ ] ) w ( w [ ] ) H H i j ( θ [ ] ) w [ ] ( w [ ] ) H H i j ( θ [ ] ) w [ ] + σ 2 2 Re ( w [ ] ) H H ˜ i j ( θ [ ] ) w ( w [ ] ) H H ˜ i j ( θ [ ] ) w [ ] ( w [ ] ) H H ˜ i j ( θ [ ] ) w [ ] + σ 2 + 2 Re ( θ j [ ] ) H Ω ( w [ ] ) θ j ( θ j [ ] ) H Ω ( w [ ] ) θ j [ ] ( θ j [ ] ) H Ω ( w [ ] ) θ j [ ] + σ 2 2 Re ( θ j [ ] ) H Ω ˜ ( w [ ] ) θ j ( θ j [ ] ) H Ω ˜ ( w [ ] ) θ j [ ] ( θ j [ ] ) H Ω ˜ ( w [ ] ) θ j [ ] + σ 2 2 ξ i j Re ( w [ ] ) H w | | w [ ] | | 2 + ( θ [ ] ) H θ | | θ [ ] | | 2 i M , j 1 , j 2 N .
Until now, the optimization subproblem (11) has been converted as
min w , θ , R k = 1 K j = 1 N p k q i j z ik * L k R ˜ i j ,
s . t . j = 1 N | | w i j | | 2 P , i M ,
2 θ i j [ ] θ i j θ i j [ ] 2 ( x i x j k ) 2 + ( y i y j k ) 2 + H 2 , i M , j N ,
R ˜ i j F i j ( w , θ ; w [ ] , θ [ ] ) ξ i j ( | | w | | 2 + | | θ | | 2 ) , i M , j N .
Problem (30) is a convex optimization problem, and it is a transformation of problem (11), which corresponds to the optimization of UAV location and beamforming variables with caching variable fixed.
Then, we oppositely consider optimizing a caching variable with the UAV location and beamforming variables fixed. UAV caching optimization subproblem is formulated as   
min z k = 1 K j = 1 N p k z 0 k L k R 0 + i = 1 M q i j z i k L k R i j * ( w i j , θ i j ) ,
s . t . k = 1 K z i k L i k L max , i M ,
i = 0 M z i k 1 , k K ,
0 z i k , z 0 k 1 , i M , k K .
It is obvious that problem (31) is a linear programming problem.
Algorithm 1 outlines the DC-based method to solve (10).   
Algorithm 1: The DC-based joint optimization algorithm.
Initiation:
1. Set user positions u and connection relationship q i j .
2. Set the iteration number = 0 , and initialize start values of w [ ] , v [ ] and z [ ] .
 Calculate θ [ ] from v [ ] and u .
Repeat:
3. Solve problem (30) to obtain the optimal solutions w * , v * .
 Calculate θ * from v * and u .
4. Solve problem (31) to obtain the optimal solution z * .
5. = + 1 .
6. w [ ] = w * , v [ ] = v * , z [ ] = z * .
Until convergence of the objective function in (30).
7. Output w [ ] , v [ ] and z [ ] as the optimal solution.

4. Simulation Results

In this section, Matlab-based simulations are presented, and we evaluate the performance of the proposed joint optimization algorithm through numerical results. In our simulations, we randomly distribute ground users in a 500 m × 500 m square area, and the number of users is N = 9 . We set the number of UAVs as M = 3 , and the initial locations of the UAVs are roughly uniformly distributed. Specifically, we decided the connection relationships first, in which each user is served by two UAVs. The initial locations of UAVs are set as the average location of served users. We also set the UAV altitude as H = 100 m , the antenna number as N T = 16 , and the popular content amount as K = 12 . As for channels, we set the K R = 2 , h ¯ i j n t = 1 , and  h ^ i j n t as a complex random number with an average modulus of 1 in Equation (5). Moreover, we define the ratio of total capacity of UAVs to the total size of popular content as the UAV capacity coefficient, denoted by r c c , which represents the capacity-to-content ratio. Specifically, we decide the capacity limit of UAVs as L max = r c c i = 1 M k = 1 K z i k L k M in constraint (31b).
To show the effectiveness of the DC-based optimization algorithm, we present two benchmark algorithms, denoted by Algorithms 2 and 3, respectively. Algorithm 2 optimizes the beamforming and caching strategy with the UAV locations fixed, while Algorithm 3 optimizes the beamforming and UAV locations with cache fixed. These two benchmark algorithms are both variants of the proposed DC-based algorithm, and they are supposed to help evaluate the impact of different optimization variables in this model. Furthermore, we change the parameters in simulations to observe the performance changes in the algorithms.
The optimization problem of Algorithm 2 is shown in (32).
min w , R k = 1 K j = 1 N p k q i j z ik * L k R ˜ i j ,
s . t . j = 1 N | | w i j | | 2 P , i M ,
R ˜ i j log 2 1 + | h i j * H w i j [ ] | 2 m i n A m , n j | h m j * H w m n [ ] | 2 + σ 2 + ξ i j | | w [ ] | | 2 + 2 Re ( w [ ] ) H H i j * w ( w [ ] ) H H i j * w [ ] ( w [ ] ) H H i j * w [ ] + σ 2 2 Re ( w [ ] ) H H ˜ i j * w ( w [ ] ) H H ˜ i j * w [ ] ( w [ ] ) H H ˜ i j * w [ ] + σ 2 2 ξ i j Re ( w [ ] ) H w | | w [ ] | | 2 ξ i j | | w | | 2 , i M , j N .
Algorithm 2 optimizes the beamforming and caching strategy iteratively, and the UAV locations are fixed as the average position of the connected users. In the case of Algorithm 2, the system is similar to a traditional cache network, with several small cellular base stations in it. To ensure the rigor of the conclusions, Algorithm 2 adopts the same DC-based method and reconstruction method as Algorithm 1, although the form is simplified because of the reduction in optimization variables.
Algorithm 3 is a variant with cache fixed, which jointly optimizes UAV location and beamforming. For reasonableness, we consider the cache occupied by each content being proportional to its size in Algorithm 3, where the proportion of every content cached in each UAV is r c c M . Compared with Algorithm 1, Algorithm 3 eliminates the step of cache iterative optimization, and the other steps are almost the same.
Compared with Algorithm 1, the benchmark Algorithm 2 indicates the impact of UAV location optimization, while Algorithm 3 reflects the effect of caching optimization. The two benchmark algorithms are outlined in Algorithms 2 and 3.    
Algorithm 2: The beamforming and caching iterative optimization algorithm.
Initiation:
1. Set user positions u and connection relationship q i j . Set v to the average of
 connected users’ positions. Calculate h i j * from u and v .
2. Set the iteration number = 0 , and initialize start values of w [ ] and z [ ] .
Repeat:
3. Solve problem (32) to obtain the optimal solutions w * .
4. Solve problem (31) to obtain the optimal solution z * .
5. = + 1 .
6. w [ ] = w * , z [ ] = z * .
Until convergence of the objective function in (32).
7. Output w [ ] and z [ ] as the optimal solution.
Algorithm 3: The joint beamforming and location optimization algorithm.
Initiation:
1. Set user positions u and connection relationship q i j . Set every elements of z
 to  r c c M .
2. Set the iteration number = 0 , and initialize start values of w [ ] , v [ ] .
 Calculate θ [ ] from v [ ] and u .
Repeat:
3. Solve problem (30) to obtain the optimal solutions w * , v * .
 Calculate θ * from v * and u .
4. = + 1 .
5. w [ ] = w * , v [ ] = v * .
Until convergence of the objective function in (30).
6. Output w [ ] and v [ ] as the optimal solution.
Firstly, we observe the impact of the UAV capacity coefficient r c c on the system latency. We set the Zipf parameter α = 0.5 . As it is shown in Figure 2, the latency performance of the proposed algorithm is better than those of the two benchmark algorithms. The delay decreases with the increase in UAV coefficient, which means expanding the cache capacity of UAVs would achieve a higher network efficiency. And, note that the average transmission latency of Algorithm 3 gets closer and closer to that of proposed Algorithm 1, while r c c changes from 0.7 to 1. When r c c = 1 , the latency of Algorithm 3 is almost the same as that of Algorithm 1 because if r c c 1 , which means UAVs obtain enough capacity to cache all the contents, users do not need to request content from MBS. In this case, the content placement in UAVs has little impact on the average transmission latency.
Then, in Figure 3, we consider the impact of Zipf parameter α . The UAV capacity coefficient is set as r c c = 0.8 . We increase α from 0.3 to 1, and it is observed that the latency of Algorithm 1 is decreased. Predictably, the performance of Algorithm 2 is relatively poor compared with Algorithm 1, and the trend of its curve is consistent with that of Algorithm 1. Note that the performance of Algorithm 3 is much worse and that the trend of its curve is different from those of Algorithms 1 and 2. Via an analysis, the reason behind the difference is whether the caching strategy is optimized. Content placement is fixed in Algorithm 3, and the trend of its curve is related to the sizes of the files. The latency of Algorithm 3 is directly proportional to the expectation of the content size. If the size of content with a high popularity is relatively larger, the expectation of the content size will increase with the increase in the Zipf parameter; otherwise, the opposite happens. Especially, if all the contents are the same size, no matter how the request probability changes, the expectation of the content size will not change, and the curve mentioned above tends to be a horizontal straight line. In general, we can observe that the optimization of the caching strategy is more effective when the Zipf parameter is larger.
Furthermore, the impact of UAV altitude is considered. We vary the height of UAVs from 100 m to 500 m, and the latency performance is shown in Figure 4. The curves of three algorithms are generally flat and very slowly ascending. We consider that all the interference between UAVs exists simultaneously in the system, and accordingly, the interference has a significant impact on the system latency. As the UAV height increases, the received signal weakens and the interference also decreases; as a result, the overall transmission delay remains almost stable. Note that the curves show a slight upward trend because the AWGN will not decrease as the height increase, which causes a decrease in SINR. The proposed Algorithm 1 performs better than the other two in different UAV height situations.
After a comparison and analysis, we found that the performance of Algorithm 2 is usually better than Algorithm 3, excluding the situation that the UAV capacity is extremely large. This indicates that the caching strategy plays a more important role than UAV locations in this system model. Moreover, the proposed DC-based algorithm performs better in situations where the Zipf parameter of content popularity is large or the UAV caching capacity is limited.

5. Conclusions

In this paper, we investigated UAV deployment, and a beamforming scheme and caching strategy in a cache-enabled UAV-assisted wireless network. We formulated a joint optimization problem to minimize the average transformation latency. The problem was decomposed into two subproblems, a caching optimization and a location beamforming joint optimization, which were addressed in an iterative manner. We proposed a DC-based algorithm to convert the joint optimization subproblem into a convex one. Firstly, we introduced a quadratic form function to transform the original problem into the difference of two convex functions. Secondly, we adopted linear approximation to eliminate the non-convexity. The second step was the major difficulty when applying the DC-based method because the complicated form of the transmission rate function made it hard to obtain the derivative. Thus, we brought out a method to reconstruct the optimization variables and the functions, which simplified the linear approximate process effectively. Finally, the numerical results illustrated the benefits brought by optimizing the UAV deployment and the caching strategy. The proposed DC-based algorithm could efficiently reduce the transmission latency, especially when the Zipf parameter of content popularity was large as well as when the UAV caching capacity was relatively limited. Combined with the method of reconstruction we proposed, the DC-based method is supposed to be a promising approach to solving a series of complicated optimization problems.

Author Contributions

Conceptualization, Z.F. and M.Z.; methodology, Z.F.; software, Z.C.; validation, Z.C., M.Z. and Z.F.; formal analysis, M.Z.; investigation, Z.C.; resources, Z.F.; data curation, Z.C.; writing—original draft preparation, Z.C.; writing—review and editing, M.Z.; visualization, Z.C.; supervision, M.Z.; project administration, Z.F.; funding acquisition, M.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by National Natural Science Funds of China grant number 62001028.

Data Availability Statement

Publicly available datasets were analyzed in this study. This data can be found here: https://github.com/czk01/UavOptimizationData01.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ullah, Z.; Al-Turjman, F.; Mostarda, L. Cognition in UAV-Aided 5G and Beyond Communications: A Survey. IEEE Trans. Cogn. Commun. Netw. 2020, 6, 872–891. [Google Scholar] [CrossRef]
  2. Ahmad, I.; Kaur, J.; Abbas, H.T.; Abbasi, Q.H.; Zoha, A.; Imran, M.A.; Hussain, S. UAV-assisted 5G Networks for Optimized Coverage under Dynamic Traffic Load. In Proceedings of the 2022 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting (AP-S/URSI), Denver, CO, USA, 10–15 July 2022; pp. 1692–1693. [Google Scholar]
  3. Ji, J.; Zhu, K.; Niyato, D.; Wang, R. Joint Cache Placement, Flight Trajectory, and Transmission Power Optimization for Multi-UAV Assisted Wireless Networks. IEEE Trans. Wirel. Commun. 2020, 19, 5389–5403. [Google Scholar] [CrossRef]
  4. 3GPP. Technical Specification 22.125. Uncrewed Aerial System (UAS) Support in 3GPP; Stage 1. 2022. Available online: https://www.3gpp.org/ftp/Specs/archive/22_series/22.125 (accessed on 6 August 2023).
  5. 3GPP. Technical Specification 23.256. Support of Uncrewed Aerial Systems (UAS) Connectivity, Identification and Tracking; Stage 2. 2022. Available online: https://www.3gpp.org/ftp/Specs/archive/23_series/23.256 (accessed on 6 August 2023).
  6. Erman, J.; Gerber, A.; Hajiaghayi, M.; Sen, D.P.S.; Spatscheck, O. To Cache or Not to Cache: The 3G Case. IEEE Internet Comput. 2011, 15, 27–34. [Google Scholar] [CrossRef]
  7. Lee, M.-C.; Molisch, A.F. Caching Policy and Cooperation Distance Design for Base Station-Assisted Wireless D2D Caching Networks: Throughput and Energy Efficiency Optimization and Tradeoff. IEEE Trans. Wirel. Commun. 2018, 17, 7500–7514. [Google Scholar] [CrossRef]
  8. Paschos, G.S.; Iosifidis, G.; Tao, M.; Towsley, D.; Caire, G. The Role of Caching in Future Communication Systems and Networks. IEEE J. Sel. Areas Commun. 2018, 36, 1111–1125. [Google Scholar] [CrossRef] [Green Version]
  9. Chen, M.; Mozaffari, M.; Saad, W.; Yin, C.; Debbah, M.; Hong, C.S. Caching in the Sky: Proactive Deployment of Cache-Enabled Unmanned Aerial Vehicles for Optimized Quality-of-Experience. IEEE J. Sel. Areas Commun. 2017, 35, 1046–1061. [Google Scholar] [CrossRef]
  10. Fazel, F.; Abouei, J.; Jaseemuddin, M.; Anpalagan, A.; Plataniotis, K.N. Secure Throughput Optimization for Cache-Enabled Multi-UAVs Networks. IEEE Internet Things J. 2022, 9, 7783–7801. [Google Scholar] [CrossRef]
  11. Luo, J.; Song, J.; Zheng, F.-C.; Gao, L.; Wang, T. User-Centric UAV Deployment and Content Placement in Cache-Enabled Multi-UAV Networks. IEEE Trans. Veh. Technol. 2022, 71, 5656–5660. [Google Scholar] [CrossRef]
  12. Zhang, T.; Wang, Z.; Liu, Y.; Xu, W.; Nallanathan, A. Joint Resource, Deployment, and Caching Optimization for AR Applications in Dynamic UAV NOMA Networks. IEEE Trans. Wirel. Commun. 2022, 21, 3409–3422. [Google Scholar] [CrossRef]
  13. Nasir, A.A. Latency Optimization of UAV-Enabled MEC System for Virtual Reality Applications under Rician Fading Channels. IEEE Wirel. Commun. Lett. 2021, 10, 1633–1637. [Google Scholar] [CrossRef]
  14. Zhao, K.; Peng, L. UAV Deployment with Flexible Height Under SINR Constraint. In Proceedings of the 2021 International Conference on Networking and Network Applications (NaNA), Lijiang, China, 29 October 2021–1 November 2021; pp. 456–460. [Google Scholar]
  15. Gupta, N.; Agarwal, S.; Mishra, D. UAV Deployment for Throughput Maximization in a UAV-Assisted Cellular Communications. In Proceedings of the 2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Helsinki, Finland, 13–16 September 2021; pp. 1055–1060. [Google Scholar]
  16. Ruan, L.; Wang, J.; Chen, J.; Xu, Y.; Yang, Y.; Jiang, H.; Zhang, Y.; Xu, Y. Energy-efficient multi-UAV coverage deployment in UAV networks: A game-theoretic framework. China Commun. 2018, 15, 194–209. [Google Scholar] [CrossRef]
  17. Zhang, Y.; Zhang, L.; Liu, C. 3-D Deployment Optimization of UAVs Based on Particle Swarm Algorithm. In Proceedings of the 2019 IEEE 19th International Conference on Communication Technology (ICCT), Xi’an, China, 16–19 October 2019; pp. 954–957. [Google Scholar]
  18. Qu, H.; Zhang, W.; Zhao, J.; Luan, Z.; Chang, C. Rapid Deployment of UAVs Based on Bandwidth Resources in Emergency Scenarios. In Proceedings of the 2020 Information Communication Technologies Conference (ICTC), Nanjing, China, 29–31 May 2020; pp. 86–90. [Google Scholar]
  19. Yang, X.; Fu, Y.; Wen, W.; Quek, T.Q.S.; Fei, Z. Mixed-Timescale Caching and Beamforming in Content Recommendation Aware Fog-RAN: A Latency Perspective. IEEE Trans. Commun. 2018, 69, 2427–2440. [Google Scholar] [CrossRef]
  20. Yang, X.; Zheng, J.; Fei, Z.; Li, B. Optimal File Dissemination and Beamforming for Cache-Enabled C-RANs. IEEE Access 2018, 6, 6390–6399. [Google Scholar] [CrossRef]
  21. Dinh, P.; Nguyen, T.M.; Assi, C.; Ajib, W. Joint Beamforming and Location Optimization for Cooperative Content-Aware UAVs. In Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco, 15–18 April 2019; pp. 1–7. [Google Scholar]
  22. Zhu, L.; Zhang, J.; Xiao, Z.; Cao, X.; Xia, X.-G.; Schober, R. Millimeter-Wave Full-Duplex UAV Relay: Joint Positioning, Beamforming, and Power Control. IEEE J. Sel. Areas Commun. 2022, 38, 2057–2073. [Google Scholar] [CrossRef]
  23. Zhang, M.; EI-Hajjar, M.; Ng, S.X. Intelligent Caching in UAV-Aided Networks. IEEE Trans. Veh. Technol. 2022, 71, 739–752. [Google Scholar] [CrossRef]
  24. Wu, G.; Miao, Y.; Alzahrani, B.; Barnawi, A.; Alhindi, A.; Chen, M. Adaptive Edge Caching in UAV-assisted 5G Network. In Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM), Madrid, Spain, 7–11 December 2021; pp. 1–6. [Google Scholar]
  25. Lakew, D.S.; Masood, A.; Cho, S. 3D UAV Placement and Trajectory Optimization in UAV Assisted Wireless Networks. In Proceedings of the 2020 International Conference on Information Networking (ICOIN), Barcelona, Spain, 7–10 January 2020; pp. 80–82. [Google Scholar]
  26. Zhang, T.; Wang, Y.; Yi, W.; Liu, Y.; Nallanathan, A. Joint Optimization of Caching Placement and Trajectory for UAV-D2D Networks. IEEE Trans. Commun. 2022, 70, 5514–5527. [Google Scholar]
  27. Liu, B.; Liu, C.; Peng, M. Computation Offloading and Resource Allocation in Unmanned Aerial Vehicle Networks. IEEE Trans. Veh. Technol. 2022, 1, 1–15. [Google Scholar]
  28. Xi, X.; Cao, X.; Yang, P.; Chen, J.; Quek, T.; Wu, D. Joint User Association and UAV Location Optimization for UAV-Aided Communications. IEEE Wirel. Commun. Lett. 2019, 8, 1688–1691. [Google Scholar]
Figure 1. Illustration of the cache-enable UAV-assisted wireless system.
Figure 1. Illustration of the cache-enable UAV-assisted wireless system.
Electronics 12 03438 g001
Figure 2. The latency performance versus UAV capacity coefficient.
Figure 2. The latency performance versus UAV capacity coefficient.
Electronics 12 03438 g002
Figure 3. The latency performance versus Zipf parameter α .
Figure 3. The latency performance versus Zipf parameter α .
Electronics 12 03438 g003
Figure 4. The latency performance versus UAV height.
Figure 4. The latency performance versus UAV height.
Electronics 12 03438 g004
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chen, Z.; Zeng, M.; Fei, Z. Joint Unmanned Aerial Vehicle Location and Beamforming and Caching Optimization for Cache-Enabled Multi-Unmanned-Aerial-Vehicle Networks. Electronics 2023, 12, 3438. https://doi.org/10.3390/electronics12163438

AMA Style

Chen Z, Zeng M, Fei Z. Joint Unmanned Aerial Vehicle Location and Beamforming and Caching Optimization for Cache-Enabled Multi-Unmanned-Aerial-Vehicle Networks. Electronics. 2023; 12(16):3438. https://doi.org/10.3390/electronics12163438

Chicago/Turabian Style

Chen, Zikang, Ming Zeng, and Zesong Fei. 2023. "Joint Unmanned Aerial Vehicle Location and Beamforming and Caching Optimization for Cache-Enabled Multi-Unmanned-Aerial-Vehicle Networks" Electronics 12, no. 16: 3438. https://doi.org/10.3390/electronics12163438

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop