This section formulates the UAV‑CRN rate maximization problem and proposes a BCD‑SCA algorithm, decomposing it into convex subproblems with proven convergence.This section formulates the UAV‑CRN rate maximization problem and proposes a BCD‑SCA algorithm, decomposing it into convex subproblems with proven convergence.

BCD‑SCA Based Optimization for UAV‑CRN: Joint Trajectory, Power, and Scheduling Design

2025/08/25 03:36

Abstract and I. Introduction

II. System Model

III. Problem Formulation

IV. Proposed Algorithm for Problem P0

V. Numerical Results

VI. Conclusion

APPENDIX A: PROOF OF LEMMA 1 and References

II. SYSTEM MODEL

\ The channel coefficient between B and X in the nth time slot is expressed a

\

\

\ The horizontal energy consumption of B is expressed as [14]

\

\ The energy consumption of B in the vertical direction is as expressed as [24], [39]

\

\ Fig. 2: The comparison among different schemes.

\ The average rate of the considered system is expressed as

\

\

III. PROBLEM FORMULATION

In this work, the average rate of the system is optimized, which is related to user scheduling, the transmission power and 3D trajectory, the horizontal and vertical velocities of B. Then the following optimization problem is formulated

\ \

\ \ \

\ \ \

\

IV. PROPOSED ALGORITHM FOR PROBLEM P0

To solve P0, we utilize the BCD technology to decompose the original problem into multiple subproblems. Specifically, for the given other variables, A, P, H, and Q are optimized in each subproblem respectively. In addition, the SCA technology is utilized to transform the non-convex constraints into convex constraints.

\ A. Subproblem 1: Optimizing User Scheduling Variable

\ \

\ \ \

\ \ B. Subproblem 2: Optimizing Transmit Power of B

\ \

\ \ C. Subproblem 3: Optimizing Horizontal Trajectory and Velocity of B

\ In this subsection, the horizontal trajectory and velocity of B is optimized for provided {A,P,H}. The original optimization problem is rewritten as

\ \

\ \ \

\ \ \

\ \ \

\ \ \

\ \ To address the non-convexity in (19a), Lemma 1 is introduced.

\ \

\ \ \

\ \ D. Subproblem 4: Optimizing Horizontal Trajectory and Velocity of B

\ In this subsection, for given {A,P,Q}, the vertical trajectory H of B is optimized. The optimization problem is expressed as

\ \

\ \ With the same method as (13b), (23b) is reformulated as (19a)-(19d) and (1a) and (1b) are reformulated as (16c), (16e), and (19c). With the same method in Subproblem 3, (9) in this subsection is reformulated as (16a)-(16f) wherein (16b) and (16d) are reformulated as (18a) and (18b), respectively.

\ \

\ \ \

\ \ P4.2 is a convex optimization problem that can be solved using existing optimization tools such as CVX.

\ E. Convergence Analysis of Algorithm 1

\ \

\ \ The obtained suboptimal solution of the transformed subproblem is also the suboptimal solution of the original nonconvex subproblem, and each subproblem is solved using SCA convex transformation iteration. Finally, all suboptimal solutions of the subproblems that satisfy the threshold ε constitute the suboptimal solution of the original problem. Therefore, our algorithm is to alternately solve the subproblem P1.1, P2.1, P3.2 and P4.2 to obtain the suboptimal solution of the original problem until a solution that satisfies the threshold ε is obtained.

\ It is worth noting that in the classic BCD, to ensure the convergence of the algorithm, it is necessary to accurately solve and update the subproblems of each variable block with optimality in each iteration. But when we solve P3.1 and P4.1 , we can only optimally solve their approximation problem P3.2 and P4.2. Therefore, we cannot directly apply the convergence analysis of the classical BCD, and further proof of the convergence of Algorithm 1 is needed, as shown below.

\ \

\ \ \

\ \ (30) This is similar to the representation in (29), and from (27) to (30), we obtain

\ 1 . (31) The above analysis indicates that the target value of P0 does not decrease after each iteration of Algorithm 1. Due to the objective value of P0 is a finite upper bound, therefore the proposed Algorithm 1 ensures convergence. The simulation results in the next section indicate that the proposed BCDbased method converges rapidly for the setting we are considering. In addition, since only convex optimization problems need to be solved in each iteration of Algorithm 1, which have polynomial complexity, Algorithm 1 can actually converge

\ \ Fig. 3: The average rate and user scheduling.

\ \ \ Fig. 4: 3D trajectories of B under different schemes and scenarios.

\ \ quickly for wireless networks with a moderate number of users.

\ \

\

:::info Authors:

(1) Hongjiang Lei, School of Communications and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China (leihj@cqupt.edu.cn);

(2) Xiaqiu Wu, School of Communications and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China (cquptwxq@163.com);

(3) Ki-Hong Park, CEMSE Division, King Abdullah University of Science and Technology (KAUST), Thuwal 23955-6900, Saudi Arabia (kihong.park@kaust.edu.sa);

(4) Gaofeng Pan, School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China (gaofeng.pan.cn@ieee.org).

:::


:::info This paper is available on arxiv under CC BY 4.0 DEED license.

:::

\

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Share Insights

You May Also Like

Cleaning Up Crypto ATMs Isn’t Anti-Crypto

Cleaning Up Crypto ATMs Isn’t Anti-Crypto

The post Cleaning Up Crypto ATMs Isn’t Anti-Crypto appeared on BitcoinEthereumNews.com. When Iowa Attorney General Brenna Bird filed lawsuits against CoinFlip and Bitcoin Depot earlier this year, a few astroturfed voices cried that this consumer protection push was “anti-crypto.” They’re wrong. Crypto ATMs – physical kiosks that let users buy crypto – have become a vehicle for fraud, and they need reform. Law enforcement, regulators, and consumer advocates have all raised concerns about these machines for years. DC AG Brian Schwalb sued Athena Bitcoin in September. Pennsylvania AG Dave Sunday has warned that BATMs are a “magnet for scammers.” Arizona AG Kris Mayes even posted “STOP” signs at some crypto ATM locations.  Congressional scrutiny is also increasing. Senator Cynthia Lummis (R-WY), a longtime Bitcoin advocate, has called for stronger safeguards. Earlier this year, Senate Judiciary Ranking Member Dick Durbin highlighted abuses, and a few weeks ago, Senator Elizabeth Warren called out crypto ATM operators, signaling that regulatory pressure will only intensify. The Evidence Nationwide, the FBI estimates that in the first half of 2025 , Americans lost $240 million to crypto ATM fraud. The Iowa AG’s office contacted the top 50 Bitcoin Depot users in Iowa between 2021 and 2024, representing more than $2.4 million in transactions. Of the 34 who responded, every single one confirmed they had been scammed. Likewise, an investigation by the DC Attorney General uncovered that 93% (!) of Athena ATM deposits in the District of Columbia during a five-month period were scam transactions.  The stories follow a predictable pattern: romance scams, bogus police calls, phony tech support. Scammers play on panic, steering victims to crypto ATMs where they’re told to pour in cash and send crypto to wallets run by criminals. Store clerks at the convenience stores and smoke shops where the kiosks are hosted have tried to intervene, but to do so effectively, they need training…
Share
BitcoinEthereumNews2025/11/05 08:29