{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T21:49:40Z","timestamp":1776289780268,"version":"3.50.1"},"reference-count":43,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2023,1,26]],"date-time":"2023-01-26T00:00:00Z","timestamp":1674691200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Over the past few years, with the rapid increase in the number of natural disasters, the need to provide smart emergency wireless communication services has become crucial. Unmanned aerial Vehicles (UAVs) have gained much attention as promising candidates due to their unprecedented capabilities and broad flexibility. In this paper, we investigate a UAV-based emergency wireless communication network for a post-disaster area. Our optimization problem aims to optimize the UAV\u2019s flight trajectory to maximize the number of visited ground users during the flight period. Then, a dual cost-aware multi-armed bandit algorithm is adopted to tackle this problem under the limited available energy for both the UAV and ground users. Simulation results show that the proposed algorithm could solve the optimization problem and maximize the achievable throughput under these energy constraints.<\/jats:p>","DOI":"10.3390\/s23031402","type":"journal-article","created":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T01:27:58Z","timestamp":1674782878000},"page":"1402","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["UAV Trajectory Optimization in a Post-Disaster Area Using Dual Energy-Aware Bandits"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1606-567X","authenticated-orcid":false,"given":"Amr","family":"Amrallah","sequence":"first","affiliation":[{"name":"Department of Electrical and Electronic Engineering, School of Engineering, Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8550, Japan"},{"name":"Academy for Super Smart Society, Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8550, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5443-9711","authenticated-orcid":false,"given":"Ehab Mahmoud","family":"Mohamed","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, College of Engineering in Wadi Addawasir, Prince Sattam Bin Abdulaziz University, Wadi Addawasir 11991, Saudi Arabia"},{"name":"Department of Electrical Engineering, Faculty of Engineering, Aswan University, Aswan 81542, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5190-1085","authenticated-orcid":false,"given":"Gia Khanh","family":"Tran","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, School of Engineering, Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8550, Japan"},{"name":"Academy for Super Smart Society, Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8550, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9334-2477","authenticated-orcid":false,"given":"Kei","family":"Sakaguchi","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, School of Engineering, Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8550, Japan"},{"name":"Academy for Super Smart Society, Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8550, Japan"}]}],"member":"1968","published-online":{"date-parts":[[2023,1,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.wace.2015.10.002","article-title":"Trends in weather related disasters\u2013Consequences for insurers and society","volume":"11","author":"Hoeppe","year":"2016","journal-title":"Weather Clim. Extrem."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1109\/MWC.2019.1800467","article-title":"An overview of post-disaster emergency communication systems in the future networks","volume":"26","author":"Deepak","year":"2019","journal-title":"IEEE Wirel. Commun."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"479","DOI":"10.3390\/network2040029","article-title":"NFV\/SDN as an Enabler for Dynamic Placement Method of mmWave Embedded UAV Access Base Stations","volume":"2","author":"Tran","year":"2022","journal-title":"Network"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Saad, W., Bennis, M., Mozaffari, M., and Lin, X. (2020). Wireless Communications and Networking for Unmanned Aerial Vehicles, Cambridge University Press.","DOI":"10.1017\/9781108691017"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MPRV.2017.11","article-title":"Help from the sky: Leveraging UAVs for disaster management","volume":"16","author":"Erdelj","year":"2017","journal-title":"IEEE Pervasive Comput."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1109\/JSYST.2009.2026783","article-title":"Telecommunications power plant damage assessment for hurricane katrina\u2013site survey and follow-up results","volume":"3","author":"Kwasinski","year":"2009","journal-title":"IEEE Syst. J."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"3417","DOI":"10.1109\/COMST.2019.2906228","article-title":"Survey on UAV cellular communications: Practical aspects, standardization advancements, regulation, and security challenges","volume":"21","author":"Fotouhi","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_8","unstructured":"Sutton, R.S., and Barto, A.G. (2018). Reinforcement Learning: An Introduction, MIT Press."},{"key":"ref_9","unstructured":"Federal Aviation Administration (2022, December 19). FAA Aerospace Forecast: Fiscal Years 2019\u20132039, Available online: https:\/\/www.faa.gov\/data_research\/aviation\/aerospace_forecasts\/media\/fy2019-39_faa_aerospace_forecast.pdf."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"92048","DOI":"10.1109\/ACCESS.2022.3202956","article-title":"AI-Enabled UAV Communications: Challenges and Future Directions","volume":"10","author":"Hashesh","year":"2022","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1109\/LCSYS.2020.3003190","article-title":"Online Residential Demand Response via Contextual Multi-Armed Bandits","volume":"5","author":"Chen","year":"2021","journal-title":"IEEE Control Syst. Lett."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1287\/moor.12.2.262","article-title":"The multi-armed bandit problem: Decomposition and computation","volume":"12","author":"Katehakis","year":"1987","journal-title":"Math. Oper. Res."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Bubeck, S., and Cesa-Bianchi, N. (2012). Regret analysis of stochastic and nonstochastic multi-armed bandit problems. arXiv.","DOI":"10.1561\/9781601986276"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1013689704352","article-title":"Finite-time analysis of the multiarmed bandit problem","volume":"47","author":"Auer","year":"2002","journal-title":"Mach. Learn."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1876","DOI":"10.1016\/j.tcs.2009.01.016","article-title":"Exploration\u2013exploitation tradeoff using variance estimates in multi-armed bandits","volume":"410","author":"Audibert","year":"2009","journal-title":"Theor. Comput. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1109\/OJCOMS.2021.3075201","article-title":"Artificial intelligence for UAV-enabled wireless networks: A survey","volume":"2","author":"Lahmeri","year":"2021","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"4447","DOI":"10.1109\/ACCESS.2020.3048021","article-title":"Intelligent trajectory design for secure full-duplex MIMO-UAV relaying against active eavesdroppers: A model-free reinforcement learning approach","volume":"9","author":"Mamaghani","year":"2020","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Han, S.I. (2022). Survey on UAV Deployment and Trajectory in Wireless Communication Networks: Applications and Challenges. Information, 13.","DOI":"10.3390\/info13080389"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TWC.2018.2790401","article-title":"Trajectory design for completion time minimization in UAV-enabled multicasting","volume":"17","author":"Zeng","year":"2018","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_20","first-page":"4","article-title":"Speed control and scheduling of data mules in sensor networks","volume":"7","author":"Sugihara","year":"2010","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2427","DOI":"10.1109\/TMC.2020.2980834","article-title":"Multi-area throughput and energy optimization of UAV-aided cellular networks powered by solar panels and grid","volume":"20","author":"Chiaraviglio","year":"2020","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Trotta, A., Andreagiovanni, F.D., di Felice, M., Natalizio, E., and Chowdhury, K.R. (2018, January 16\u201319). When UAVs ride a bus: Towards energy-efficient city-scale video surveillance. Proceedings of the IEEE Infocom 2018-IEEE Conference on Computer Communications, Honolulu, HI, USA.","DOI":"10.1109\/INFOCOM.2018.8485863"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"3039","DOI":"10.1109\/COMST.2019.2926625","article-title":"Artificial neural networks-based machine learning for wireless networks: A tutorial","volume":"21","author":"Chen","year":"2019","journal-title":"IEEE Commun. Surv. Tutors"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1647","DOI":"10.1109\/LCOMM.2016.2578312","article-title":"Efficient deployment of multiple unmanned aerial vehicles for optimal wireless coverage","volume":"20","author":"Mozaffari","year":"2016","journal-title":"IEEE Commun. Lett."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2971","DOI":"10.3390\/rs4102971","article-title":"Model-free trajectory optimisation for unmanned aircraft serving as data ferries for widespread sensors","volume":"4","author":"Pearre","year":"2012","journal-title":"Remote Sens."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Bayerlein, H., de Kerret, P., and Gesbert, D. (2018, January 25\u201328). Trajectory optimization for autonomous flying base station via reinforcement learning. Proceedings of the 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata, Greece.","DOI":"10.1109\/SPAWC.2018.8445768"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"8227","DOI":"10.1109\/TVT.2019.2923214","article-title":"Intelligent trajectory design in UAV-aided communications with reinforcement learning","volume":"68","author":"Yin","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Amrallah, A., Mohamed, E.M., Tran, G.K., and Sakaguchi, K. (2021). Enhanced dynamic spectrum access in UAV wireless networks for post-disaster area surveillance system: A multi-player multi-armed bandit approach. Sensors, 21.","DOI":"10.3390\/s21237855"},{"key":"ref_29","unstructured":"Amrallah, A., Mohamed, E.M., Tran, G.K., and Sakaguchi, K. (2020, January 2\u20134). Radio Resource Management Aided Multi-Armed Bandits for Disaster Surveillance System. Proceedings of the 2020 International Conference on Emerging Technologies for Communications (ICETC2020), Virtual."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Mohamed, E.M., Hashima, S., Aldosary, A., Hatano, K., and Abdelghany, M.A. (2020). Gateway selection in millimeter wave UAV wireless networks using multi-player multi-armed bandit. Sensors, 20.","DOI":"10.3390\/s20143947"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1293","DOI":"10.1109\/LWC.2022.3164939","article-title":"Energy Aware Multi-Armed Bandit for Millimeter Wave Based UAV Mounted RIS Networks","volume":"11","author":"Mohamed","year":"2022","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1109\/LCOMM.2019.2906194","article-title":"UAV-assisted emergency communications: An extended multi-armed bandit perspective","volume":"23","author":"Lin","year":"2019","journal-title":"IEEE Commun. Lett."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"112253","DOI":"10.1109\/ACCESS.2020.3001752","article-title":"Adaptive UAV-trajectory optimization under quality of service constraints: A model-free solution","volume":"8","author":"Cui","year":"2020","journal-title":"IEEE Access"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1236","DOI":"10.1109\/TGCN.2021.3068333","article-title":"Trajectory optimization for UAV emergency communication with limited user equipment energy: A safe-DQN approach","volume":"5","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Amrallah, A., Mohamed, E.M., Tran, G.K., and Sakaguchi, K. (2022, January 5\u20138). Dual Energy-Aware based Trajectory Optimization for UAV Emergency Wireless Communication Network: A Multi-armed Bandit Approach. Proceedings of the 2022 Thirteenth International Conference on Ubiquitous and Future Networks (ICUFN), Barcelona, Spain.","DOI":"10.1109\/ICUFN55119.2022.9829532"},{"key":"ref_36","unstructured":"3GPP (2017). Study on Enhanced LTE Support for Aerial Vehicles (Release 15), The 3rd Generation Partnership Project (3GPP). Available online: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3231."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez-Ca\u00f1ete, F.J., and Casilari, E. (2020). Consumption analysis of smartphone based fall detection systems with multiple external wireless sensors. Sensors, 20.","DOI":"10.3390\/s20030622"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Vermorel, J., and Mohri, M. (2005, January 3\u20137). Multi-armed bandit algorithms and empirical evaluation. Proceedings of the European Conference on Machine Learning, Porto, Portugal.","DOI":"10.1007\/11564096_42"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1054","DOI":"10.2307\/1427934","article-title":"Sample mean based index policies by o (log n) regret for the multi-armed bandit problem","volume":"27","author":"Agrawal","year":"1995","journal-title":"Adv. Appl. Probab."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1002\/asmb.874","article-title":"A modern Bayesian look at the multi-armed bandit","volume":"26","author":"Scott","year":"2010","journal-title":"Appl. Stoch. Model. Bus. Ind."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1137\/S0097539701398375","article-title":"The nonstochastic multiarmed bandit problem","volume":"32","author":"Auer","year":"2002","journal-title":"SIAM J. Comput."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Ding, W., Qin, T., Zhang, X.D., and Liu, T.Y. (2013, January 14\u201318). Multi-armed bandit with budget constraint and variable costs. Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, Bellevue, WA, USA.","DOI":"10.1609\/aaai.v27i1.8637"},{"key":"ref_43","unstructured":"Sinha, D., Sankararaman, K.A., Kazerouni, A., and Avadhanula, V. (2021, January 13\u201315). Multi-armed bandits with cost subsidy. Proceedings of the International Conference on Artificial Intelligence and Statistics, PMLR, Virtual Event."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1402\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:16:31Z","timestamp":1760120191000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1402"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,26]]},"references-count":43,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,2]]}},"alternative-id":["s23031402"],"URL":"https:\/\/doi.org\/10.3390\/s23031402","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,26]]}}}