• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Robust trajectory planning for UAV communication systems in the presence of jammers

    2022-11-13 07:29:30LingyunZHOUXiotongZHAOXinGUANEninSONGXinZENGQingjingSHI
    CHINESE JOURNAL OF AERONAUTICS 2022年10期

    Lingyun ZHOU, Xiotong ZHAO, Xin GUAN, Enin SONG, Xin ZENG,Qingjing SHI

    a School of Software Engineering, Tongji University, Shanghai 200092, China

    b College of Mathematics and School of Aeronautics and Astronautics, Sichuan University, Chengdu 610064, China

    c Department of Information and Communication Engineering, Tongji University, Shanghai 200092, China

    KEYWORDS 6G;UAV communications;Jamming resistance;Trajectory optimization;Robust design;Non-convex optimization

    Abstract Unmanned Aerial Vehicle (UAV) has emerged as a promising novel application for the Sixth-Generation (6G) wireless communication by leveraging more favorable Line-of-Sight (LoS)propagation. However, the jamming resistance by exploiting UAV’s mobility is a new challenge in the UAV-ground communication. This paper investigates the trajectory planning problem in an UAV communication system, where the UAV is operated by a Ground Control Unit (GCU)to perform certain tasks in the presence of multiple jammers with imperfect power and location information. To ensure the reliability of the GCU-to-UAV link, we formulate the problem as a non-convex semi-infinite optimization, aiming to maximize the average worst-case Signal-to-Interference-plus-Noise Ratio(SINR)over a given flight duration by designing the robust trajectory of the UAV under stringent energy availability constraints. To handle this problem efficiently, we develop an iterative algorithm for the solution with the aid of S-procedure and Successive Convex Approximation (SCA) method. Numerous results demonstrate the efficacy of our proposed algorithm and offer some useful design insights to practical system.

    1. Introduction

    With the advancement in the Sixth-Generation(6G)communication systems,there is an urgent need to push the envelope of the performance to accommodate the surging traffic demands,which poses stringent requirements on both the radio resources and existing communication infrastructures.1,2Equipped with intelligent sensors and precise Global Positioning System(GPS), Unmanned Aerial Vehicles (UAVs) are gaining everincreasing popularity in the field of 6G wireless communication due to their highly controllable maneuverability,on-demand coverage and Line-of-sight (LoS) links.3-7Compared with the terrestrial communication system, deploying UAVs in the air to complete certain tasks is envisioned as a promising solution to enhance the performance of the existing communication networks.On one hand,the LoS channel facilitates the establishment of high-rate communication between the UAV and Ground Control Unit (GCU). On the other hand, the communication quality can be improved significantly since the wireless channel from the GCU to UAV is dominated by LoS with generally a small path loss. Due to these desirable features,a proliferation of interests has recently been inspired from both the academic and industrial communities.8-11

    According to the actual role of UAVs in the communication network, prior works can be roughly divided into two parts, namely UAV-assisted communication and cellularenabled UAV communication. In UAV-assisted communication, the UAV usually serves as a new aerial communication device to provide services for ground users.To serve edge users and alleviate data traffic from the GCU, Ref. 12 conceived a novel offloading technique to maximize the energy efficiency of UAVs by jointly optimizing communication scheduling,user partitioning,and flying trajectory.To alleviate the performance bottleneck caused by the ‘‘doubly near-far” phenomenon, the authors in Ref. 13 advocated a Radio Frequency (RF) Wireless Power Transfer (WPT) scheme in UAV network, and formulated a joint resource allocation and trajectory planning strategy to maximize the system throughput, subject to both UAVs’ maximum speed and energy constraints.In Ref.14,a UAV-assisted mobile relaying system was investigated,wherein the throughput of the ground node was improved with the optimization of transmit power along with the relay trajectory. Considering limited energy budget for propulsion and communication, Ref. 15 jointly optimized the power and 3D trajectory to minimize the outage probability for the UAV-enabled relaying system to the ground users. On the other hand, UAVs can be effectively manipulated by the GCU to perform various missions in the cellular-enabled UAV system.Specifically,Ref.16 investigated the UAV trajectory optimization design to minimize the mission completion time while ensuring the information retrieval with a high probability, subject to the UAV’s initial and final location constraints, the speed constraint, as well as a minimum received Signal-to-interference-plus-noise Ratio (SINR)constraint. Furthermore, a joint time-frequency scheduling and power allocation framework is proposed in Ref. 17 to guarantee the reliable signals reception in the uplink communication, where many UAVs are controlled by a GCU to carry out various tasks. Meanwhile, in order to eliminate the cochannel interference and maximize the UAV network throughput, Ref. 18 invoked a novel interference cancellation strategy to fully utilize the limited backhaul links among GCUs in the cellular network.

    Despite the alluring benefits come from UAVs, the broadcasting nature of radio propagation brings severe challenge to the communication system.In fact,the control signal reception of UAV is not only affected by the quality of communication channels,but also vulnerable to any potential threats(e.g.,eavesdropping and jamming). Hence, fully exploring the antijamming technology in UAV network can provide some effective ways to improve the communication performance.19-22In particular,Ref.19 advocated the usage of a novel smart attack game between a UAV and subjective jammers, and adapted a reinforcement-learning-based power allocation strategy to increase the secrecy capacity of the network. In Ref. 20, the authors provided an analytical approach to optimize a UAV’s trajectory to combat jamming signals and provide high-quality services to ground nodes. What’s more,some practical studies for jamming resistance technology of multi-UAV formation were proposed in Refs.21,22.To provide reliable communication and efficient control in the GCU-controlled-UAV network, Ref. 21 investigated an UAV-priority-based resource coordination method to reduce the impact of jammers and improve Quality of Service (QoS) of the system. Inspired by,21Ref. 22 fully analyzed the distinctive characteristics of different interferences, and subsequently devised a powerful resource allocation strategy to maximize the minimum SINR among the UAV swarm.

    In addition, some existing works also assumed that jammers’ information was imperfectly known (e.g., Refs. 23-25),which is more suitable for the realistic scene.Ref.23 proposed a joint robust trajectory and power design for a single-UAV network with multiple jammers located in uncertain regions.To provide different QoS requirements for diverse applications, Ref. 24 investigated the throughput-maximum problem in the UAV-assisted communication system, where multiple ground users are scheduled to communicate with multi-UAV swarm in the presence of jammers with uncertain location information. In Ref. 25, the authors considered the worstcase secrecy rate maximum problem in an UAV-aided cognitive radio network relying on joint resource allocation and trajectory optimization.

    Motivated by the above observations,this paper focuses on designing the trajectory for efficient control and reliable communication in a GCU-controlled-UAV network. Specifically,we consider a practical scenario where a GCU controls a UAV to perform certain tasks with multiple jammers distributed across the regions. It is assumed that the jammers’power and location are partially known to the UAV, subject to norm-bounded estimated errors. Accordingly, the quality of wireless link largely depends on the UAV’s position (i.e.,trajectory)over time.The goal of this paper is to design robust flight trajectory to reduce the impact of jammers and improve the quality of control signals. In comparison to the prior works,to the best of our knowledge, this is the first work that conceives the energy constraint along with the mobility constraint to maximize the average worst-case SINR in a UAV network. However, it is quite challenging to solve the intractable optimization problem, due to the highly non-convex and semi-infinite nature of the objective function. The key contributions are listed as follows:

    (1) We present a general optimization framework for a UAV network in the presence of multiple jammers with uncertain power and location information. An average worst-case SINR maximization problem is proposed to provide reliable QoS of the received signals by robust trajectory design under stringent energy availability constraints.

    (2) To tackle the formulated intractable problem, we first recast this semi-infinite problem into an equivalent but more compact form with the aid of slack variables and S-Procedure,and then develop an efficient iterative algorithm to obtain the solution based on SCA technique.

    (3) We perform in-depth experiments under diverse system parameter configurations. The simulations clearly demonstrate the efficacy of our proposed method. The results also shed light on the design and performance analysis of the UAV communication system.

    The reminder of this paper is organized as follows.Section 2 presents the UAV communication model and formulates the corresponding trajectory planning problem of interest. In Section 3,a low-complexity iterative algorithm is proposed for the considered problem. The simulation results are provided in Section 4. Finally, this article is concluded in Section 5.

    Notations. In this paper, scalars are denoted by lower case,vectors and matrics are respectively denoted by boldface lower-case and boldface upper-case letters. RM×Ndenotes the set of M - by - N real-valued matrics, and HMdenotes the set of M - by - M Hermitian matrics. For a vector a, ||a||represents its Euclidean norm and aTdenotes its transpose.

    2. System model

    2.1. Network architecture and communication model

    An uplink wireless UAV communication system is considered in Fig. 1, where a GCU controls a UAV to carry out certain tasks with M ≥1 jammers distributed across the region. In such scenario, the GCU periodically sends control signals to UAV at each time slot. Simultaneously, multiple jammers are sending jamming signals to interfere with legitimate communication. In this paper, we consider the locations in Three-dimensional (3D) Cartesian coordinate system with all dimensions measured in meters (m). Suppose that the GCU locates at [xs,ys,0], and the location of each jammer m ∈M?{1,2,...,M} is [xj,m,yj,m,0], where ws=[xs,ys]T∈R2×1and wj,m=[xj,m,yj,m]T∈R2×1represent the horizontal locations of the GCU and jammer m,respectively.The objective of the UAV is to ease the interference caused by jammers and enhance the quality of control signals,by designing UAV’s flight trajectory over a finite flight duration T. For this purpose, an optimization strategy is required. Before stating the problem formulation,we first present the models for jammers’uncertain information, UAV trajectory, GCU-to-UAV transmission channel, and energy consumption.

    2.1.1. Bounded error model

    According to the works in Refs. 23,24, in practice, the UAV knows the exact information (e.g., location, power) of the GCU via proper information exchange,but the accurate information of jammers is uncertain due to the existence of estimation errors and quantization errors. It is assumed that the potential location region and power level can be estimated by the UAV. This assumption is reasonable from two aspects.On one hand, owing to the LoS link in communication systems, it is possible for UAV to obtain the approximate location of jammers through the camera or Synthetic Aperture Radar(SAR).25On the other hand,the UAV can detect carrier energy to acquire the approximate jammers’ power by applying for carrier detection technology.26As a result, we can adopt the bounded error model to characterize the relation between the actual and estimated information (i.e., location,power) of jammers, which can be represented as

    2.1.2. UAV trajectory model

    In the sequel, we elaborate the trajectory model of UAV. It is assumed that a UAV flies from a pre-determined starting point[xI,yI,H]to the endpoint[xF,yF,H]to execute certain missions over a finite time T. We define qI=[xI,yI]T∈R2×1and qF=[xF,yF]T∈R2×1as the horizontal initial and final coordinate. Note that the UAV should not ascend and descend frequently in consideration of avoiding unnecessary energy consumption, thereby we assume the flying altitude of UAV is a fixed value H,which corresponds to the minimum altitude required for obstacles avoidance.27For analytical simplicity,the total flight time T is equally discretized into N slots,indexed by n ∈N?{1,2,...,N}. Therefore, the slot duration is given by δ = T/N, which is chosen sufficiently small such that the UAV is assumed to be stationary within each time slot.17As such, the horizontal trajectory of UAV can be approximately characterized as q[n]=[x[n],y[n]]T∈R2×1. Let u[n]=[ux[n],uy[n]]T∈R2×1denote the speed vector at the UAV over the whole flight duration, and a[n]=[ax[n],ay[n]]T∈R2×1denote the corresponding acceleration vector. Considering the limited mobility of UAV, it strictly satisfies the following constraints:

    where qI, uIand aIindicate the initial location, speed and acceleration respectively;qFand uFrepresent the final location and speed respectively;umin,umaxand amaxdenote the minimum flying speed, maximum speed and maximum acceleration respectively.

    2.1.3. Ground-to-air channel model

    As recorded in practical tests,28,29,7the ground-to-air communication channels can be well dominated by the LoS links,especially when the UAV flies at a relatively moderate altitude from the certain environment with little blockage and scattering. In addition, it is assumed that the Doppler effect caused by UAV’s mobility can be perfectly compensated based on existing techniques.30As a result, we adopt the widely-used large scale path-loss model for the LoS links between the GCU to UAV. Consequently, the channel gain between the GCU and UAV in time slot n is given by

    2.1.4. Energy consumption model

    In the practical UAV flight scenario, the total energy consumption is composed of two parts. The first one is the communication-related energy, which is used to maintain signaling exchange between the UAV and GCU. The other part is the propulsion energy,which is required for UAV to remain aloft and maintain its maneuverability. In fact, the communication-related energy is far less than the propulsion energy, so it is often ignored (e.g., Refs. 27,31). Based on the above assumption,the energy consumption of the UAV during N time slots is given by

    where c1and c2are two parameters related to the aerodynamics, g indicates the gravitational acceleration constant, and Δk=0.5J(u2F-u11) denotes the change of kinetic energy of the UAV, whose value is determined by the initial speed, final speed, as well as the UAV’s mass J.

    2.2. Problem formulation

    This section formally presents the problem formulation. Since the information of each jammer is incomplete, based on the above bounded error model, the worst-case received SINR of the UAV at time slot n can be specialized as

    where p0denotes the transmit power of the GCU,pj,mdenotes the statistical value of jammer m′s transmitting power, and σ2represents the power of Additive White Gaussian Noise(AWGN) at the receiver.

    Our objective is to maximize the UAV’s average worst-case SINR over N time slots, by jointly optimizing its trajectory q[n], speed u[n] and acceleration a[n], subject to the UAV mobility constraints and energy consumption constraints.Mathematically, the investigated problem can be formulated as

    where in Eq. (8b) means the energy consumption constraint,and Γ indicates the maximum propulsion energy allowed for the UAV over the whole flight duration. Moreover, Eqs.(8c)-(8i) represent the trajectory, speed, and acceleration constraints of the UAV.

    Note that problem P1 is challenging to be solved optimally for the following two aspects.First,the nonlinear objective function and the constraints Eq.(8b)and Eq.(8i)render the problem non-differentiable and non-convex. In addition, due to the uncertainty in each jammers’ location, P1 is an intractable semi-infinite optimization problem, which makes the solution more difficult. In short, we are faced with an intractable nonconvex semi-infinite problem, which is usually considered as NP-hard.In what follows,we will perform a series of transformations for P1 and propose an efficient algorithm to solve it.

    3. Proposed solution

    In this section, we propose an efficient iterative algorithm to solve problem P1. Specially, we first simplify the non-smooth objective function into a tractable form. After that, for the semi-infinite numbers of constraints evoked by jammers’imperfect information, we provide some insights to recast the sophisticated constraints into an equivalent but more enunciable form by applying for S-Procedure algorithm. Moreover,for the resulting non-convex problem, we develop an iterative algorithm for the solution with the assistance of slack variables and SCA method.In the end,we summarize the algorithm and evaluate its computation complexity.

    3.1. Reformulation of objective function in Eq. (8a)

    It is readily seen that, the higher the jammers’ power is, the worser the SINR of the UAV will achieve. Motivated by this,we can conduct a simple mathematical manipulation by setting the pj,mas maximum power (i.e., p~j,m+ξm) to eliminate the variable Δpj,min the objective function Eq. (8a). Furthermore,for problem Eq.(P1),each jammer’s uncertain location parameter(i.e.,Δwj,m)only exists in the expression of each accumulation term in the denominator.By plugging Eq. (4) and Eq. (5)into Eq. (8a), problem Eq. (P1) can be transformed into the following equivalent form:

    Note that, the difficulty remains to be in the sophisticated expression of the objective function Eq.(9a). To address this issue, we apply slack variables to derive an explicit expression of problem Eq. (P2) by using the following lemma.

    Lemma 1. Introducing slack variables I?[I[1],I[2],...,I[N]]and L?[L[1],L[2],...,L[N]], an optimization problem equivalent to Eq.(P2) can be obtained as follows:

    3.2. Reformulation of semi-infinite constraint Eq. (10c)

    By introducing slack matrix s=[sm[n]], ?m,n, constraint Eq.(10c) can be equivalently substituted by

    3.3. Reformulation of non-convex constraints

    Based on the previous two subsections, the problem Eq. (P3)can be lower bounded by the following form:

    However, the problem Eq. (P4) is still not a convex optimization due to the non-convex constraints Eq. (21b),Eq. (21c) and Eq. (21d). To this end, we propose an iterative algorithm to obtain an approximate solution of problem Eq. (P4) by leveraging the slack variables and SCA method.

    By introducing slack variable τ={ τ[n], ?n} , we can rewrite constraints Eq. (21b) and Eq. (21c) as

    3.4. Overall description and computation complexity

    By summarizing the above developments, problem Eq. (P4) is approximately recast as

    It is not difficult to see that the objective function is concave, and all the constrains are convex. Therefore, Eq. (P5)is a convex optimization problem, which can be optimally solved in polynomial time by the Interior-point Method(IPM).33

    In conclusion, since Eq. (P1) is a non-convex semi-infinite optimization problem, it is exceedingly difficult to obtain the global optimal solution. Based on the simplifications and approximations in previous parts, we recast the formulation into a tractable form Eq. (P5), which is more amenable for optimization. It readily follows that the objective value of Eq. (P5) gives a lower bound to that of Eq. (P1), and they are equal only at the given point (xfea,yfea,ufea,Ifea,Lfea). As a result, an efficient optimal technique for problem Eq. (P1) is concluded in (Algorithm 1 ). It is worth pointing out that the objective value of problem Eq. (P5) is finite, and the optimal value obtained by each iterative is non-decreasing, which ensures the convergence of Algorithm 1.

    Next, we are devoted to evaluating the computation complexity of the proposed algorithm. The complexity of Algorithm 1 consists of three parts, namely, the required iterations for SCA method, the complexity of iterative and the computation cost for per-iteration. We assume that the iteration number of the SCA algorithm is Titeand the accuracy of IPM for each iteration is ?.It is not difficult to see that problem Eq. (P5) contains MN Linear Matrix Inequalities(LMIs) of size 3, (M+4)N+1 LMIs of size 1 and 5N Second-order Cone (SOC) constraints of dimension 2. Meanwhile, the numbers of decision variables are on the order of N. Based on the complexity analysis in,34the total computation complexity of Algorithm 1 is given by

    4. Numerical results

    In this section, numerical simulations are provided to validate the effectiveness of our proposed trajectory optimization algorithm(denoted as the robust scheme) and draw some essential insights. For verifying the enhancement of the robust scheme,we consider following two benchmark methods. (A) nonrobust scheme34(B) fixed trajectory scheme.23Specifically,the non-robust scheme can be obtained from Section III,where we treat the estimated information of each jammer as perfect information, i.e., Δw=0, Δpj,m=0, ?m, and then calculate the worst-case average SINR obtained in the bounded error model. The fixed trajectory scheme makes the UAV fly straightly from the initial point to final point with the constant velocity. To demonstrate the efficacy of the proposed algorithm, we deliberately set the energy consumption constraint to be sufficient to ensure the UAV can complete the mission under each scheme.

    In the simulation, we consider a UAV mission execution scenario where the UAV flies from the horizontal startingpointqI=[100, 100] m to the endpoint qF=[800, 800] m at a specific altitude H=100 m and maintains communication with the GCU.Furthermore,it is assumed that the whole flight duration for completing the task is T=30 s and each time slot is δ=1 s. Besides, we assume the location of GCU is[0, 0, 0] m and the transmit power is set to p0=10 W. There are M=3 jammers distributed across the ground and the estimated horizontal coordinates are w~j,1=[700, 800] m,w~j,2=[500, 600] m and w~j,3=[300, 200] m, respectively.Meanwhile, the estimated transmit power of jammers are all set to p~j,1=p~j,2=p~j,3=0.1 W. For simplicity, all jammers’estimation power error is set to ξm=0.02 W. If not otherwise specified,other corresponding simulation parameters are summarized in Table 1.

    We first demonstrate the convergence performance of the proposed robust trajectory scheme, as well as the non-robust scheme, by setting all jammers’ estimation location error with the bound of εm=10 m.As we can see in Fig.2,the objective function value obtained by two algorithms increases rapidly with the number of iterations, and then converges within around 4 iterations for non-robust scheme and 5 iterations for robust scheme. This is due to the fact that the proposed robust trajectory scheme requires more computational costs to solve the semi-infinite constraint evoked by the uncertainty of jammer information, which makes it more difficult to converge.

    Fig. 3 depicts the optimized UAV trajectory obtained by different schemes,under different setups of Γ with all jammers’estimation location error set as εm=40 m.It is observed that for the robust scheme and non-robust scheme, the UAV triesto fly away as far as possible from the jammers. The reason is that when the distance from the jammers increases, the intensity of jamming signals accordingly weakens. Thus, moving further away from the jammers is conducive to enhancing the quality of communication. Furthermore, when the flight energy consumption budget becomes larger (e.g.,Γ=1.0×104J (Joule)), it is interesting to note that the UAV notably adjusts the trajectory further to the jammers relative to the case with Γ=0.5×104J. This observation suggests that more energy consumption allows the UAV to find better trajectory to combat interference and improve the communication performance.Besides,we notice that the proposed robust scheme obtains the better flight trajectory,as compared to that of non-robust scheme. The reason for this outcome is that the proposed robust trajectory scheme fully exploits the uncertainty of the jammers to effectively support reliable communication,while the other schemes do not take these features into consideration.

    Table 1 Simulation parameters.

    Algorithm 1. SCA-based trajectory planning algorithm for problem (P1)1. Construct the initial feasible solution (x(0),y(0),u(0),I(0),L(0)). Let k =0.2. Repeat 3. Set k ←k+1.4. Set the feasible points xfea =x(k-1), yfea =y(k-1), ufea =u(k-1), Ifea =I(k-1), Lfea =L(k-1),then solve the problem(P5)and denote the optimal solution as (x*,y*,u*,I*,L*).5. Update the variable x(k) =x*, y(k) =y*, u(k) = u*, I(k) = I*, L(k) =L*.6. Until the fractional increase of the objective value is below a given threshold ?.

    Fig.4 compares the UAV trajectories by applying different schemes with respect to estimation location error ε2when the energy consumption budget Γ=1.0×104J. As expected,the proposed robust scheme always outperforms all the other benchmark methods in the entire flight duration, which shows the advantage of the robust trajectory optimization in system performance gain. Moreover, we note that the trajectory of non-robust scheme remains unchanged regardless of the estimation location error. It is also observed that the distance to jammer 2 of the robust scheme notably increases with ε2. As a result, it appears that for UAV network with a large uncertainty in location estimation, our proposed robust scheme is particular appealing from a trajectory optimization perspective.

    To further demonstrate the UAV’s behavior, Figs. 5 and 6 show the corresponding time-varying speed of the trajectory in Figs. 3 and 4, respectively. One can see that as the available energy consumption or the uncertainty of location estimation increases, the gap between different schemes become larger,which validates the effectiveness of the proposed robust scheme in manipulating highly uncertain scenarios.Moreover,for the proposed robust scheme and non-robust scheme, it is observed that UAV starts at a relatively low speed for the sake of maintaining high-quality communication with close GCU.Furthermore, UAV gradually moves away from the GCU and approaches the jammers, thereby resulting in a less favorable propagation condition. At this time, the intensity of jamming plays a dominant role in the communication performance. Intuitively, it is found that when the UAV approaches the jammers, it adjusts its flight direction to avoid the jamming(shown in Figs.3 and 4),while increases the speed to fly away from the jammers, which is consistent with the practical flight scenarios of UAV.

    In what follows, we are devoted to comparing the performance between the proposed robust scheme and non-robust scheme. Fig. 7 shows the UAV’s average worst-case SINR achieved by two algorithms versus the energy consumption threshold. One can see that the robust algorithm always achieves higher average worst-case SINR, by up to about 115%, compared to the non-robust algorithm. This performance gain is due to the fact that the robust scheme makes the flight trajectory more reasonable, which can reduce the impact of external jamming and enhance the average worstcase SINR. What’s more, we notice that the average worstcase SINR of two methods first increase with Γ when Γ is small and then remain invariant when Γ exceeds a certain level. The reasons are twofold.For one thing,when the energy consumption budget is small, the increase in Γ allows the UAV to explore more appropriate trajectories, leading to an increase in the SINR.For another,when Γ is large enough,the optimal flight trajectory could be obtained at a certain energy consumption below the threshold, thus further increasing of Γ could not enlarge the communication quality any more.

    Finally, we consider the effect of the jammers’ location uncertainties on the communication performance.Fig.8 shows the UAV’s average worst-case SINR of the robust scheme and non-robust scheme versus the radius of the uncertain region of jammer 2 ε2under different energy consumption budget.It is observed that the SINR of the two algorithms decrease as ε2increases. As can be seen in Fig. 4, although the trajectory of non-robust scheme remains unchanged under any radius of uncertain region, the average worst-case SINR will decrease with the increase of the location error. Since the non-robust scheme ignores the uncertainty of the error, the robust algorithm offers superior performance over the non-robust algorithm. There results validate the efficiency of the proposed robust scheme in handling different scenarios for uncertainty,thereby endowing added flexibility to the design of the UAV system.

    5. Conclusions

    In this paper,we have studied the reliable communication in a GCU-to-UAV communication network,where a UAV is operated by a GCU to perform certain tasks in the presence of multiple jammers with imperfect power and location information.We aim at maximizing the UAV’s average worst-case SINR by optimizing the trajectory over a finite flight duration, subject to the mobility and energy consumption constraints.To tackle the formulated non-convex semi-infinite problem, we develop an iterative algorithm to obtain the solution with the aid of slack variables, S-procedure and SCA method. Simulation results show that the proposed robust trajectory scheme can significantly enhance the communication performance as compared to other benchmark schemes. This paper aimed to shed more light on the trajectory design of the UAV communication system,which can be extended in several interesting directions for the future work, including on-line trajectory optimization,intelligent resource coordination,as well as advanced priorityaware design,through the application of Artificial Intelligence(AI), e.g., reinforcement learning, ‘‘learning to optimize”.

    Declaration of Competing Interest

    The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

    日本欧美国产在线视频| 嫩草影院入口| 国内揄拍国产精品人妻在线| 永久网站在线| 啦啦啦观看免费观看视频高清| 国产成人av教育| 床上黄色一级片| 午夜影院日韩av| 精品一区二区三区人妻视频| 国产激情偷乱视频一区二区| 亚洲人与动物交配视频| 男女边吃奶边做爰视频| 亚洲真实伦在线观看| 两性午夜刺激爽爽歪歪视频在线观看| 婷婷丁香在线五月| 一边摸一边抽搐一进一小说| 亚洲国产精品sss在线观看| 色综合婷婷激情| 女的被弄到高潮叫床怎么办 | 很黄的视频免费| 18禁在线播放成人免费| 婷婷六月久久综合丁香| 国产午夜福利久久久久久| 国产探花在线观看一区二区| 很黄的视频免费| 色精品久久人妻99蜜桃| 亚洲国产色片| 免费av毛片视频| 精品一区二区三区视频在线观看免费| 欧美最黄视频在线播放免费| 免费看av在线观看网站| 成人特级av手机在线观看| avwww免费| 亚洲中文字幕日韩| 免费av观看视频| 亚洲av电影不卡..在线观看| 毛片女人毛片| 麻豆国产97在线/欧美| 久久精品国产清高在天天线| 日本黄色视频三级网站网址| 午夜日韩欧美国产| 如何舔出高潮| 国产成人影院久久av| 国产精品三级大全| 草草在线视频免费看| 三级国产精品欧美在线观看| 中文字幕高清在线视频| 国内久久婷婷六月综合欲色啪| 欧美xxxx性猛交bbbb| 美女cb高潮喷水在线观看| or卡值多少钱| 色吧在线观看| 精品人妻1区二区| 国产老妇女一区| 国产亚洲精品综合一区在线观看| 欧美日韩亚洲国产一区二区在线观看| 男人和女人高潮做爰伦理| 女生性感内裤真人,穿戴方法视频| 亚洲精品在线观看二区| 国产乱人伦免费视频| 不卡视频在线观看欧美| 国产aⅴ精品一区二区三区波| 在线免费十八禁| 国产成人影院久久av| 九九热线精品视视频播放| 欧美黑人欧美精品刺激| 97人妻精品一区二区三区麻豆| 亚洲一区二区三区色噜噜| 在线国产一区二区在线| 直男gayav资源| 亚洲avbb在线观看| 午夜精品久久久久久毛片777| 97热精品久久久久久| 一级毛片久久久久久久久女| 日韩欧美三级三区| 日韩欧美精品v在线| 国产女主播在线喷水免费视频网站 | 很黄的视频免费| 久9热在线精品视频| 久久久久久久精品吃奶| a级毛片免费高清观看在线播放| 男女下面进入的视频免费午夜| ponron亚洲| 成人毛片a级毛片在线播放| 亚洲性久久影院| 亚洲av成人精品一区久久| 最近最新中文字幕大全电影3| 如何舔出高潮| 好男人在线观看高清免费视频| 久久久久九九精品影院| 丝袜美腿在线中文| 国国产精品蜜臀av免费| 深夜精品福利| 美女高潮喷水抽搐中文字幕| 国产精品国产三级国产av玫瑰| 91麻豆精品激情在线观看国产| 欧美日韩精品成人综合77777| 亚洲成人精品中文字幕电影| 在线观看av片永久免费下载| 在线天堂最新版资源| 亚洲一区二区三区色噜噜| 动漫黄色视频在线观看| .国产精品久久| 夜夜看夜夜爽夜夜摸| 又紧又爽又黄一区二区| 欧美一区二区亚洲| 久久久久久国产a免费观看| a级毛片免费高清观看在线播放| 亚洲av日韩精品久久久久久密| 国产成人福利小说| 精品久久久久久久久av| 国产一区二区亚洲精品在线观看| 精品久久久久久久久av| a级毛片免费高清观看在线播放| 久久久久久国产a免费观看| 国产精品国产三级国产av玫瑰| 99热只有精品国产| 欧美bdsm另类| 在线观看一区二区三区| 欧美bdsm另类| 在线观看一区二区三区| 亚洲av.av天堂| 国产精品一及| 日日撸夜夜添| 亚洲一级一片aⅴ在线观看| 免费高清视频大片| 国内少妇人妻偷人精品xxx网站| 亚洲欧美日韩东京热| 亚洲精品456在线播放app | 天天一区二区日本电影三级| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲中文日韩欧美视频| 成人欧美大片| 中文字幕av在线有码专区| 赤兔流量卡办理| 国产欧美日韩精品一区二区| 国产亚洲精品综合一区在线观看| 欧美激情国产日韩精品一区| 国产精品亚洲美女久久久| 中国美白少妇内射xxxbb| netflix在线观看网站| 中国美白少妇内射xxxbb| 波多野结衣巨乳人妻| 美女被艹到高潮喷水动态| 国产色爽女视频免费观看| 又爽又黄a免费视频| 国产精品久久电影中文字幕| 国产aⅴ精品一区二区三区波| 黄色欧美视频在线观看| 赤兔流量卡办理| 99久久精品一区二区三区| 久久人妻av系列| 精品人妻一区二区三区麻豆 | 五月玫瑰六月丁香| 国产欧美日韩精品亚洲av| 免费高清视频大片| 丰满乱子伦码专区| 床上黄色一级片| 琪琪午夜伦伦电影理论片6080| 舔av片在线| 性插视频无遮挡在线免费观看| 免费观看的影片在线观看| 欧美成人a在线观看| 亚洲五月天丁香| 露出奶头的视频| 国产精品人妻久久久影院| 高清日韩中文字幕在线| 男女边吃奶边做爰视频| 狂野欧美激情性xxxx在线观看| 啪啪无遮挡十八禁网站| 性色avwww在线观看| 亚洲欧美激情综合另类| 女的被弄到高潮叫床怎么办 | 此物有八面人人有两片| 亚洲欧美日韩无卡精品| 日韩欧美 国产精品| 99视频精品全部免费 在线| 夜夜看夜夜爽夜夜摸| 999久久久精品免费观看国产| 91午夜精品亚洲一区二区三区 | 日韩亚洲欧美综合| 97热精品久久久久久| 三级毛片av免费| 成人二区视频| 校园春色视频在线观看| 九色国产91popny在线| 精品久久久久久久人妻蜜臀av| 日韩在线高清观看一区二区三区 | 国产视频一区二区在线看| 老熟妇仑乱视频hdxx| 村上凉子中文字幕在线| 搡女人真爽免费视频火全软件 | 午夜福利在线观看免费完整高清在 | 大型黄色视频在线免费观看| 无遮挡黄片免费观看| 99热只有精品国产| 黄色视频,在线免费观看| www.www免费av| 日韩亚洲欧美综合| 在线观看美女被高潮喷水网站| 欧美在线一区亚洲| 亚洲欧美清纯卡通| 麻豆av噜噜一区二区三区| 亚洲欧美激情综合另类| 黄色丝袜av网址大全| 欧美一级a爱片免费观看看| 中国美白少妇内射xxxbb| av.在线天堂| 亚洲自拍偷在线| 亚洲精品色激情综合| 亚洲av一区综合| 禁无遮挡网站| 老司机福利观看| 99久久成人亚洲精品观看| 亚洲天堂国产精品一区在线| 真人做人爱边吃奶动态| 亚洲va日本ⅴa欧美va伊人久久| 波野结衣二区三区在线| 波多野结衣高清无吗| 久久精品国产清高在天天线| 99九九线精品视频在线观看视频| 春色校园在线视频观看| 成人鲁丝片一二三区免费| 亚洲在线自拍视频| 久久精品国产亚洲av涩爱 | 亚洲av成人av| 性插视频无遮挡在线免费观看| 国产视频内射| 免费观看精品视频网站| 色综合色国产| 日本与韩国留学比较| 亚洲综合色惰| 亚洲熟妇熟女久久| 亚洲精华国产精华精| 免费看av在线观看网站| 女的被弄到高潮叫床怎么办 | 五月伊人婷婷丁香| 国产亚洲91精品色在线| 久久久久久久精品吃奶| 午夜激情福利司机影院| 国产色婷婷99| 欧美精品啪啪一区二区三区| 成人特级黄色片久久久久久久| 国内少妇人妻偷人精品xxx网站| 九九久久精品国产亚洲av麻豆| 美女xxoo啪啪120秒动态图| 亚洲aⅴ乱码一区二区在线播放| 久久国内精品自在自线图片| 欧美日韩亚洲国产一区二区在线观看| 看片在线看免费视频| av天堂中文字幕网| 此物有八面人人有两片| 亚洲av成人av| a在线观看视频网站| 免费看日本二区| 国产亚洲精品av在线| 精品人妻偷拍中文字幕| 免费av毛片视频| 色综合站精品国产| 午夜精品在线福利| 久久精品国产99精品国产亚洲性色| 欧美最黄视频在线播放免费| 精品福利观看| 搡老岳熟女国产| 欧美一区二区国产精品久久精品| 欧美成人a在线观看| 国产精品伦人一区二区| 麻豆一二三区av精品| 成人特级黄色片久久久久久久| 婷婷色综合大香蕉| 最近视频中文字幕2019在线8| 春色校园在线视频观看| 亚洲欧美激情综合另类| 99精品在免费线老司机午夜| 亚洲av二区三区四区| 少妇人妻一区二区三区视频| 国产成人福利小说| 日韩亚洲欧美综合| 亚洲在线观看片| h日本视频在线播放| 91av网一区二区| 天美传媒精品一区二区| 两人在一起打扑克的视频| 国产精品电影一区二区三区| 一区二区三区激情视频| 久久亚洲精品不卡| 一夜夜www| av女优亚洲男人天堂| 亚洲人成网站在线播| 91在线观看av| 国产高清不卡午夜福利| 久久久成人免费电影| 最近中文字幕高清免费大全6 | 国产欧美日韩精品一区二区| 亚洲国产高清在线一区二区三| 日本色播在线视频| 九九热线精品视视频播放| 人妻少妇偷人精品九色| 午夜久久久久精精品| 婷婷亚洲欧美| 日本与韩国留学比较| 综合色av麻豆| 欧美xxxx性猛交bbbb| 可以在线观看毛片的网站| 久久久午夜欧美精品| 国产一区二区激情短视频| 亚洲va在线va天堂va国产| 免费黄网站久久成人精品| 老熟妇乱子伦视频在线观看| 亚洲成人中文字幕在线播放| 黄色视频,在线免费观看| 51国产日韩欧美| 精品国内亚洲2022精品成人| 国产91精品成人一区二区三区| 狂野欧美激情性xxxx在线观看| 国产v大片淫在线免费观看| 国产一级毛片七仙女欲春2| 免费大片18禁| 国产aⅴ精品一区二区三区波| 1000部很黄的大片| 国产亚洲91精品色在线| 男人和女人高潮做爰伦理| 成人亚洲精品av一区二区| 国产精品一区二区三区四区免费观看 | 男人和女人高潮做爰伦理| 久久精品国产鲁丝片午夜精品 | 免费观看人在逋| 99热这里只有精品一区| 亚洲经典国产精华液单| 免费电影在线观看免费观看| 亚洲欧美清纯卡通| 亚洲人成网站高清观看| 欧美一区二区精品小视频在线| 亚洲国产欧美人成| 狂野欧美白嫩少妇大欣赏| 欧美高清成人免费视频www| 欧美日本亚洲视频在线播放| 国产一区二区三区在线臀色熟女| aaaaa片日本免费| 亚洲,欧美,日韩| 男女下面进入的视频免费午夜| 免费搜索国产男女视频| 黄色丝袜av网址大全| 成年女人看的毛片在线观看| 日本精品一区二区三区蜜桃| 99久久精品国产国产毛片| 窝窝影院91人妻| 免费看a级黄色片| av视频在线观看入口| 色尼玛亚洲综合影院| 日本成人三级电影网站| 91麻豆精品激情在线观看国产| 嫩草影院入口| 国产又黄又爽又无遮挡在线| 永久网站在线| 国产一区二区激情短视频| 亚洲成a人片在线一区二区| 亚洲va日本ⅴa欧美va伊人久久| 午夜a级毛片| 99久久精品国产国产毛片| 成人欧美大片| 亚洲精品一区av在线观看| av视频在线观看入口| 色尼玛亚洲综合影院| 三级国产精品欧美在线观看| 精品久久国产蜜桃| 国产精品嫩草影院av在线观看 | 99久久九九国产精品国产免费| 一进一出好大好爽视频| 国产亚洲精品久久久com| 午夜精品一区二区三区免费看| 欧美一区二区精品小视频在线| 亚洲最大成人av| 久久久国产成人精品二区| 成人永久免费在线观看视频| 亚洲国产精品sss在线观看| 男女视频在线观看网站免费| 国产aⅴ精品一区二区三区波| 亚洲国产高清在线一区二区三| 精品久久久久久久久av| 亚洲欧美激情综合另类| av在线亚洲专区| 精品久久久久久久久亚洲 | 国产精品99久久久久久久久| 老熟妇仑乱视频hdxx| 国产一区二区三区在线臀色熟女| 免费看日本二区| 欧美日韩综合久久久久久 | av视频在线观看入口| 久久精品国产亚洲av天美| 婷婷精品国产亚洲av| 国产高清激情床上av| 国模一区二区三区四区视频| 亚洲av成人精品一区久久| 日韩一本色道免费dvd| 亚洲av一区综合| 日本三级黄在线观看| 我的老师免费观看完整版| 欧美日韩中文字幕国产精品一区二区三区| 亚洲第一区二区三区不卡| 免费高清视频大片| 亚洲欧美激情综合另类| 成年版毛片免费区| 我的女老师完整版在线观看| 精品无人区乱码1区二区| 成年版毛片免费区| 国产欧美日韩精品亚洲av| 女人被狂操c到高潮| 国产高清不卡午夜福利| 久久精品综合一区二区三区| 91麻豆av在线| 久久精品91蜜桃| 国产精品女同一区二区软件 | 国产精品无大码| 免费人成视频x8x8入口观看| 精品久久久久久久久久久久久| ponron亚洲| 69av精品久久久久久| 日韩在线高清观看一区二区三区 | 男女视频在线观看网站免费| 欧美人与善性xxx| 亚洲内射少妇av| 蜜桃久久精品国产亚洲av| 夜夜看夜夜爽夜夜摸| 亚洲av日韩精品久久久久久密| 亚洲美女搞黄在线观看 | 久久精品91蜜桃| or卡值多少钱| 国产久久久一区二区三区| 国产高清视频在线播放一区| 国产高清有码在线观看视频| 日本一本二区三区精品| 午夜免费成人在线视频| 亚洲精华国产精华精| 国产探花在线观看一区二区| 婷婷色综合大香蕉| 在线免费观看不下载黄p国产 | 最近最新免费中文字幕在线| 久久久久免费精品人妻一区二区| 日韩中字成人| 亚洲内射少妇av| 女的被弄到高潮叫床怎么办 | 香蕉av资源在线| 亚洲人成伊人成综合网2020| 国产视频一区二区在线看| 偷拍熟女少妇极品色| 久久久久精品国产欧美久久久| 日本免费一区二区三区高清不卡| 亚洲av第一区精品v没综合| 中文字幕人妻熟人妻熟丝袜美| 久久热精品热| 男女视频在线观看网站免费| 欧美高清成人免费视频www| 国产精品av视频在线免费观看| 在线免费十八禁| 少妇高潮的动态图| 国产国拍精品亚洲av在线观看| 色av中文字幕| 日韩欧美 国产精品| 欧美xxxx黑人xx丫x性爽| 国产亚洲精品综合一区在线观看| 久久99热这里只有精品18| 在线看三级毛片| 欧美区成人在线视频| 听说在线观看完整版免费高清| 老女人水多毛片| 国产精品福利在线免费观看| 最后的刺客免费高清国语| 伦精品一区二区三区| 久久久久久久久久黄片| 成年免费大片在线观看| 国产亚洲精品久久久久久毛片| 国产精品日韩av在线免费观看| 九九爱精品视频在线观看| 日韩人妻高清精品专区| 性插视频无遮挡在线免费观看| 午夜免费男女啪啪视频观看 | 美女大奶头视频| 国产亚洲精品久久久com| 91狼人影院| 麻豆国产97在线/欧美| 国产精品永久免费网站| 亚洲真实伦在线观看| 俺也久久电影网| 久久久久国产精品人妻aⅴ院| 国产精品日韩av在线免费观看| 在线播放国产精品三级| 欧美日本亚洲视频在线播放| 亚洲欧美日韩高清专用| 亚洲经典国产精华液单| 天美传媒精品一区二区| 欧美潮喷喷水| 男女下面进入的视频免费午夜| 一进一出抽搐动态| 不卡一级毛片| 日韩高清综合在线| 欧美激情久久久久久爽电影| 欧美日韩中文字幕国产精品一区二区三区| 国产69精品久久久久777片| 免费观看在线日韩| 两个人视频免费观看高清| 看片在线看免费视频| 国产高清激情床上av| 欧美色欧美亚洲另类二区| 国产精品一区二区三区四区免费观看 | 国产亚洲精品av在线| 哪里可以看免费的av片| 一本精品99久久精品77| 亚洲成人中文字幕在线播放| 18禁黄网站禁片午夜丰满| 小说图片视频综合网站| 亚洲七黄色美女视频| 欧美最黄视频在线播放免费| 亚洲国产精品sss在线观看| 美女 人体艺术 gogo| 免费观看在线日韩| www.www免费av| 国产精品乱码一区二三区的特点| 亚洲av免费在线观看| 别揉我奶头 嗯啊视频| 亚洲自拍偷在线| 精品人妻熟女av久视频| 欧美三级亚洲精品| 中亚洲国语对白在线视频| av在线亚洲专区| a级毛片a级免费在线| 啦啦啦观看免费观看视频高清| 日本 av在线| 中出人妻视频一区二区| 午夜免费成人在线视频| 久9热在线精品视频| 中文亚洲av片在线观看爽| 日日干狠狠操夜夜爽| 亚洲在线自拍视频| 五月伊人婷婷丁香| 国产亚洲av嫩草精品影院| 最近中文字幕高清免费大全6 | 精品福利观看| а√天堂www在线а√下载| 欧美高清成人免费视频www| 99在线人妻在线中文字幕| 午夜久久久久精精品| 99久久精品热视频| 亚洲av不卡在线观看| 色在线成人网| 97超级碰碰碰精品色视频在线观看| 国产高潮美女av| 成人av在线播放网站| 精品一区二区三区人妻视频| 免费观看的影片在线观看| 亚洲电影在线观看av| 男人的好看免费观看在线视频| 看十八女毛片水多多多| 两个人视频免费观看高清| 看免费成人av毛片| 国产一区二区三区在线臀色熟女| 美女被艹到高潮喷水动态| 天堂动漫精品| 久久久精品大字幕| 日韩欧美三级三区| 中文字幕人妻熟人妻熟丝袜美| 亚洲综合色惰| 中文字幕人妻熟人妻熟丝袜美| avwww免费| 欧洲精品卡2卡3卡4卡5卡区| 午夜a级毛片| 成熟少妇高潮喷水视频| eeuss影院久久| 男人狂女人下面高潮的视频| 国产 一区精品| 免费看av在线观看网站| 国产真实伦视频高清在线观看 | 国产免费一级a男人的天堂| 午夜福利视频1000在线观看| 小说图片视频综合网站| 中亚洲国语对白在线视频| av天堂中文字幕网| 久久久久国内视频| 国产精品亚洲一级av第二区| 亚洲精华国产精华精| 麻豆成人av在线观看| 日韩高清综合在线| 全区人妻精品视频| 久久久久九九精品影院| 成年女人看的毛片在线观看| 99久久精品国产国产毛片| 国产一级毛片七仙女欲春2| 久9热在线精品视频| 国产高清视频在线播放一区| 熟女人妻精品中文字幕| 夜夜看夜夜爽夜夜摸| 国内精品宾馆在线| 我的老师免费观看完整版| 日韩 亚洲 欧美在线| 久久欧美精品欧美久久欧美| xxxwww97欧美| 久久国产乱子免费精品| 亚洲人成网站在线播| 99热网站在线观看| 国产成人a区在线观看| 五月玫瑰六月丁香| 成人欧美大片| 极品教师在线免费播放| 日韩国内少妇激情av| 免费搜索国产男女视频| 麻豆成人av在线观看| 国产精华一区二区三区| av在线蜜桃| 亚洲人与动物交配视频| 亚洲av中文av极速乱 | 动漫黄色视频在线观看| 成人av在线播放网站| 亚洲真实伦在线观看| 国产精品久久久久久久久免| 国产一区二区在线观看日韩|