Preprint
Article

This version is not peer-reviewed.

Reliable Layered Transmission and Task Offloading in UAV- Assisted MEC Networks for Disaster Relief

Submitted:

13 January 2026

Posted:

14 January 2026

You are already at the latest version

Abstract
In disaster scenarios where communication infrastructure is damaged, Unmanned Aerial Vehicle (UAV)-assisted wireless networks can provide temporary connectivity and hence the indispensable mobile edge computing functionality. However, limited resources on UAVs require prioritization of critical data in such scenarios. This research addresses re-liable transmission and task offloading by modeling user tasks as layered compositions, where the base layer is essential and enhancement layers are optional. TDMA-based prioritization is employed to ensure reliable decoding of high-priority layers of the computational tasks (i.e., intra-user priority) along with inter-user priority needed for urgent users like rescue teams. Under these reliability constraints, the work formulates a joint communication-computation optimization problem to allocate transmission power and UAV CPU cycles efficiently in order to minimize total weighted offloading latency. The original problem is non-convex and thus we leverage epigraph and perspective functions to recast the problem into convex. We also derive analytically, using KKT conditions, the optimal water-filling-like solutions for the reformulated problem. The numerical results show that, at a signal-to-noise ratio of 5 dB, the proposed algorithm achieves relative latency reductions vs the baseline algorithms (39.99% reduction vs Equal Allocation, 49.99% reduction vs Enhancement First, and 69.99% reduction vs No Priority) which reflect considerable latency reduction with priority-aware offloading.
Keywords: 
;  ;  ;  ;  

1. Introduction

Unmanned Aerial Vehicle (UAV)-assisted radio transmission is an effective solution for emergency situations in post-disaster scenarios such as collapse of communications and computing infrastructure due to military operations or natural disasters (e.g., wildfires, floods, and earthquakes) [1]. Such life-saving technique is vital in establishing the required urgent basic Uplink (UL)/ Downlink (DL) wireless connections, and more importantly in the provisioning of multi-access edge computing (MEC) capability. UAV typically hover above disturbed and affected zone to provide the required radio communications and MEC services [2,3]. Upon establishing the radio connection, each ground user offloads a computational task to the nearby UAV using time division multiple access (TDMA). The result of execution is then sent to the user after the UAV has processed the task (see Figure 1).
Unlike standard MEC servers, UAV has limited on-board power and processing resources [4], make it challenging to support all user tasks simultaneously and reliably. Additionally, all users will compete for the shared wireless communication resources (e.g., power or spectrum), but, not all of them face an exact level of emergency situations [5]. For example, a rescue team needs image analysis and processing to quickly locate victims (high priority), while another, e.g., second respondent may need less critical processing (low priority), i.e., inter-user priority. In addition to that, per-user (or intra-user) priority is also required since mobile application typically comprises both base layer (BL) representing critical data and enhancement layers (EL) which are optional as depicted graphically in Figure 1. This two-layers paradigm is the core of the proposed layered offloading scheme as discussed in the upcoming sections.
Several existing systems treat tasks as indivisible units, neglecting the importance of prioritizing essential task components under resource constraints in a post-disaster scenario [1]. Therefore, this research addresses the problem of reliably offloading layered tasks—comprising critical and optional parts—over UAV-assisted wireless networks while prioritizing user scheduling over shared wireless network. The proposed scheme, entitled “Reliable Layered Transmission (RLT)”, has two novel features: (i) divide task’s data into multiple layers with different priorities, where base layer is the most critical (e.g., location or low-resolution image of a survivor) while the other enhancement layers are optional; (ii) assign different weights for various user (inter-user priority) e.g., for rescue teams or emergency users. It also optimizes the total offloading latency by performing joint communication and computation resource allocation to ensure reliable transmission and processing of the most critical task layers of prioritized users.
The structure of this paper is as follows. Related works are highlighted in Section 2. Channel model and UL/DL communications and computation models are all presented in Section 3, while the optimization problem formulation is discussed in Section 4. In Section 5, the solution analysis is introduced through three lemmas. After that, Section 6 discusses the obtained results to show the effectiveness of the proposed algorithm compared to several baseline algorithms, and finally the conclusion for this paper is given in Section 7.

2. Related Works

The last few years have witnessed the development of MEC-enabled UAV network as a new technology to enhances computational processes, reduces delay, and supports the application of real-time services in volatile and highly mobile wireless networks. Studies [6,7] have improved task offloading, computed task efficiency and energy consumption in UAV networks. However, their work did not focus on task priorities.
While studies [2,8] have focused on resource allocation and task offloading in UAV using joint optimization although, their work does not support real-time and is not scalable. Although the study [9] have developed a user-density-based framework for real-time offloading model using UAV networks but Dedicated to the sporting event only, not for general use.
[10] introduced an architecture designed using deep reinforcement learning (DRL) for joint computation offloading and resource allocation in multi-user MEC systems in an attempt to reduce a weighted sum of delay and energy cost. While their algorithm is appropriate for dynamic workload adaptation, their assumption involves ground MEC end points as static systems and does not facilitate adaptation in dynamic systems that could be applicable in UAV communication systems. In similar vein, [11] examined optimal power and time allocation schemes in orthogonal and NOMA/NOMA-assisted multiple access communication in MEC systems. The theoretical derivation in this study presumes major reductions in energy cost, which is, only applicable in small systems whose communication channel is static.
Some research surveys have also provided a comprehensive overview of the communication systems of MEC and UAVs separately in the past. [12] the study discussed multi-access computing (MEC) architectures, and offloading methods, emphasizing the importance of reducing access time and conserving energy, although it is still a conceptual study and lacks UAV integration. In contrast, the review conducted [13] included an analysis of FANET networks that addressed the networking difficulties specific to FANET networks, including those related to multi-drone communication, routing protocols, and mobility management, although it lacked any form of edge computing or computation offloading.
According to [14,15] the combined studies have shifted the focus of MCC design from single-user and uplink-only resource usage to comprehensive allocation and scheduling but not support UAV. While previous study [16] developed framework to improve energy and security of offloading for UAV systems suffer from weak performance in disaster covering and [17] developed framework to enhance reliability in MCC over fading channel using superposition coding but not compatible with the UAVs.
[18] addressed an offloading model for various IoT tasks using logic-based Benders decomposition for task offloading in dynamic scenarios. Although this method nearly achieves optimal task latencies in offloading strategies, centralized processing complexity makes this work less suitable in highly dynamic or mobile networks like UAV communication networks. In contrast to research related to MECs, a comprehensive review of UAVs for photogrammetry and 3D mapping tasks was conducted by [19], focusing on fixed-wing UAVs in civil missions and fails to consider real-time processing.
Moreover, the study [20] improve reliability using federated learning in multi-UAVs enable-wireless network at the same time, suffer from convergence is delayed, requiring high computational capabilities. While [21] used deep RL to optimize UAV’s path based on user location to reduce delay ignoring the importance of prioritizing tasks.
This paper fills the gap of prioritization of critical data and also optimal allocation of radio and processing resources due to limited resources on UAVs by answering the following two questions:
(a)
How to reliably prioritize tasks offloading in post disaster-scenario via UAV-based MEC networks?
(b)
How to efficiently allocate both radio and processing resources in such network to achieve optimal utility, namely minimizing the sum of total end-to-end offloading latency?

3. System Model

Suppose a single UAV is flying over a disaster zone at location ( X U A V , Y U A V , Z U A V ) and acting as an aerial MEC server. The UAV establishes both uplink and downlink wireless links via TDMA. There are a total of I ground users deployed in the area, where the i t h user is located at location ( X i , Y i , Z i ) . For clearer presentation, channel model is presented in Section 3.1 while Section 3.2 and Section 3.3 are dedicated to the UL/DL communication and MEC computation models, respectively.

3.1. Channel Model

Consider a general model for composite UAV channel with power gain g i defined by:
g i = P L d i × S × h r i c i a n 2   1
where P L d i is the path loss – based distance (linear scale), S refer to shadowing (linear scale), and h r i c i a n refer to channel coefficient under a small-scale rician fading model. The PL itself is given by
P L d i = d 0 d i α   2
where α refer to the path loss exponent (2 for LoS, >2 for NLoS) [22], d i is the distance between UAV and user i (meter), and d 0 refer to a reference distance (1 meter). The shadowing components reads
S = 10 x σ / 10 , x σ ~ N ( 0 , σ d B 2 )   ( 3 )
σ 2 is the standard deviation of shadowing (dB), and x σ points to zero-mean gaussian random variable (dB). Finally, small-scale fading has the mathematical formulation as
h r i c i a n = L L O S + A r e a l + j A i m g   M u l t i p a t h   ( 4 )
L is the LOS part, j is the imaginary unit 1 , A r e a l points to real part of multipath, and A i m g indicates imaginary part of multi-path with
L = K l i n e a r K l i n e a r + 1   5
K d B = P o w e r L o S P o w e r N o n L o S , where K d B is the rician factor
The rician factor in linear scale is given by: K l i n e a r = 10 K d B / 10 The real and imaginary parts of multipath are modelled as Gaussian random variable with normal distribution as indicated in (6)
A r e a l ~ N 0 , 1 2 ( K l i n e a r + 1 ) , A i m g ~ N 0 , 1 2 ( K l i n e a r + 1 )   ( 6 )

3.2. Communications/Computation Model

Considering the task offloading of i t h   ground user in a UAV-assisted mobile edge computing system. Each user i has an input task size S i U L (bits) sent to UAV via UL connection and similarly S i D L bits of data encoding the result of execution sent in DL. Each offloaded bit utilizes computational load of S i U L C i (CPU cycles) where C i denotes the computational complexity measured in CPU cycles/bit.

3.2.1. UL Communication Model

Moreover, also consider a practical scenario where the mobile applications can be partitioned into base layer (BL) and enhancement layer (EL). In this method, the BL gives the minimum quality of service that is guaranteed to all critical users to receive an essential quality of service (e.g., a certain minimal data rate, reliability, emergency messages or low-resolution video). The EL, on the other side, provides superfluous service quality, which can be opportunistically granted to the users based on residual resource availability above and beyond the base layer utilization. A hierarchical prioritization is obtained as the base layer serves the critical users and by dividing rest of resources among them and the enhancement layer, guarantees basic service while providing best possible overall user experience.
The total number of offloaded bit S i U L sent in UL consist of sum of both BL and EL input task size as:
S i U L =   S i , b U L +   S i , e U L   ( 7 )
where the S i , b U L represent the number of transmitted bits during the BL offloading and S i , e U L represent the number of offloading bits during the EL.
The achievable uplink rate R i , b U L (in bps) for sending S i , b U L to UAV is given by:
R i , b U L P i , b U L = τ i , b U L B b U L   l o g 2 1 + P i , b U L   g i   U L B b U L   N 0   ( 8 )
where B b U L   ( H Z ) is the UL transmission bandwidth allocated for BL task, τ i , b U L represent fraction of UL TDMA frame allocated to prioritize BL task transmission (unitless) as depicted in Figure 2, N 0 refer to the nosie power density (Watt / HZ), g i   U L points to UL channel gain, and P i , b U L is the BL transmit power of the user device (Watt).
Similarly, the rate R i , e U L (in bps) needed for sending S i , e U L   in the UL direction reads:
R i , e U L P i , e U L = τ i , e U L B e U L   l o g 2 1 + P i , e U L   g i   U L B e U L   N 0   ( 9 )
where τ i , e U L represent fraction of UL TDMA frame allocated to prioritize EL task transmission (unitless), B e U L   ( H Z ) is the UL transmission bandwidth allocated for EL, and P i , e U L   is the transmit power of the user device during EL offloading (Watt).
The UL time i U L (Seconds) for task uploading reads:
i U L P i U L =   S i U L R i U L P i U L   ( 10 )
which depends on total input task size S i U L (in Bits), transmit power P i U L (watt) and total UL transmission rate.

3.2.2. UAV Computation Model

The computation time i M E C (Seconds) required to execute the offloaded task of user i at UAV MEC server is given by:
  i M E C f i M E C =   S i U L   C i f i M E C F m a x     ( 11 )
which is depend on input task size S i U L , computation complexity C i (CPU cycles / bit), Fmax is the CPU frequency of UAV processor (cycles / sec.), while f i M E C is a fraction of CPU frequency allocated to the i t h users with constraints (unitless), f i M E C   0 , i = 1 I f i M E C   F m a x .

3.2.3. DL Communication Model

Similar to UL, the downlink rate R i D L (in bps) needed to send the output bits, encoding the results of execution from UAV to user i is mathematically stated as:
R i D L P U A V D L = τ D L B D L   l o g 2 1 + P U A V D L   g i   D L B D L   N 0   ( 12 )
where P U A V D L   W a t t   U A V p o w e r , transmission bandwidth of UAV B D L   ( H Z ) is the DL bandwidth, τ D L refer to the fraction of DL TDMA frame allocated to task downloading (unitless), N 0 nosie power density (Watt / HZ) and g i   D L DL channel gain.
Hence, the DL transmission time i D L (Seconds) is:
i D L P U A V D L =   S i D L R i D L P U A V D L   ( 13 )
which is function of output task size S i D L (number of downloading bits) and DL transmission rate R i D L P U A V D L in bps, given in (12).
Finally, the total offloading time i T o t a l P i U L , f i M E C , P U A V D L for each task is given as:
  i   T o t a l P i U L ,   f i M E C ,   P U A V D L = i U L P i U L + i M E C f i M E C + i D L P U A V D L   ( 14 )

4. Problem Formulation

The goal of this section is to formulate a priority-aware joint communication and computation resource allocation under UAV-enabled offloading. The objective is to reduce the total weighted sum offloading delay for critical users under power and resource constraints. Mathematically stated as in P.1:
min τ i , b UL , τ i , e UL , P i UL , f i MEC , τ DL , P UAV DL i = 1 I w i i T o t a l ( P . 1 )
S.t:
(C.1) R i , b U L R i , b m i n , i ( L 1 ) (C.2) τ i , b U L + τ i , e U L = T s , i τ i , b U L + τ i , e U L T s ( L 2 ) (C.3) i , b U L + i , b M E C i , e U L (C.4) P i , b U L , P i , e U L 0 , i (C.5) P i , b U L + P i , e U L P m a x U L , i (C.6) i = 1 I f i M E C F m a x , f i M E C 0 , i (C.7) i = 1 I P U A V D L P m a x D L , i
( P . 1 ) reveals two types of priorities: the first is priority between users based on user weights, while the second is the intra-user priority based on layered transmission (BL and EL).
Constraints (C.1) ensures that BL rate is greater than or equal to the given minimum rate for priority assurance; (C.2) gives per user layered transmission; (C.3) to ensures the BL task is fully uploaded and executed before EL for i user in post-disaster scenario as it clear in Figure 1 (b); (C.4) indicates the power of the both BL / EL are greater than or equal to zero ; (C.5) ensures the power of the BL and EL are smaller than or equal to total uplink power; (C.6) refers to a fraction of CPU frequency allocated to the i t h users with constraints is smaller than or equal to the CPU frequency of UAV processor; and (C.7) indicates that the UAV power for i t h users is smaller than or equal to the maximum download power.
Note that intra-user priority is enforced via (C.1)-(C.3) while inter-user priority is embedded in the objective function.

5. Solution Analysis

The presence of the time allocation variables τ together with the logarithmic rate functions (8), (9) and (12) renders the optimization problem (P.1) as non-convex due to the coupling of variables in the objective function. Such problems are known to be NP-hard in general and hence obtaining its global optimal solution is computationally infeasible [23]. Accordingly, in this section, we will recast the problem into convex one using the following series of transformations in Lemma 1 to Lemma 4. In what follows, we drop additional subscripts and make the dependence on variables implicit for mathematical simplicity.
Lemma 1.  
Perspective and Epigraph Reformulation
Let  R P = l o g 2 1 + P h i / N 0 B .  The function:
ϕ P , τ = τ log 2 1 + P / τ h i N 0 B   ( 15 ) is jointly concave in  P , τ  for  τ   > 0 .
Proof. Since R P is concave and non-decreasing in p , its perspective τ R P / τ is concave by the perspective transformation property of concave functions [23]. Hence, ϕ P , τ is concave.
With Epigraph reformulation, the uplink latency constraint (10) can be equivalently written as:
S i B x i ϕ P i , τ i   ( 16 )
where x i is an auxiliary variable such that i U L x i . This is non-convex because it multiplies the variable x i with a concave function ϕ . To resolve this, we define a reciprocal variable z i = 1 / x i and rewrite the constraint (16) as:
S i z i B ϕ P i , τ i   ( 17 )
Lemma 2  
.The constraint in (17) is convex in z i , p i , τ i .
Since ϕ is concave, the right-hand side is concave. The left-hand side S i z i   is affine. The set z , P , τ |   S i z i B ϕ P i , τ i   is convex because the sublevel set of a concave function is convex [23].
Using the above transformations, (P.1) can be equivalently written as:
min P , f , τ , z , P UAV DL   i w i z i , b 1 + z i , e 1 + i M E C f i M E C + i D L P U A V D L (P.2)
s . t .   S i z i B ϕ P i , τ i ,
C . 1 C . 7   f r o m   ( P . 1 ) . Note that Problem (P.2) is convex because all constraints are affine or convex and the objective is a sum of convex functions. Accordingly, the optimal solution is of (P.2) can be obtained using Karush-Kuhn-Tucker (KKT) principles as detailed in the following.
The Lagrangian of (P.2) is:
L = i w i z i , b 1 + z i , e 1 + i w i i M E C f i M E C + i D L P U A V D L i , j λ i , b B ϕ P i , b , τ i , b S i , b , z i , b i , j λ i , e B ϕ P i , e , τ i , e S i , e z i , e + μ 1 f i F m a x + μ 2 ( τ i , e + τ i , b ) 1 + μ 3 ( P i , b + P i , e )   P m a x   ( 18 ) The stationarity conditions are obtained by taking the derivative of Lagrangian w.r.t to variables as:
L z i = w i z i 2 + λ i S i = 0 z i * = w i λ i B i ( 19 )
Similarly, we obtain for the remaining variables (technical details are omitted due to space limitation)
L f i = w i C i S i f i 2 + μ 1 = 0   f i * = w i C i S i   μ 1   ( 20 )
Substituting back into computational constraint i f i , b * + f i , e * = F m a x yields:
μ 1 = i w i ( C i , b S i , b   + C i , e S i , e   ) F m a x 2 From the power stationarity condition, the optimal power allocation follows a water-filling structure:
P i * = τ i λ i B h i μ 3 ln 2 N 0 B h i +   ( 21 )
These KKT conditions ensure that the resource constraints are active when optimal. The complementary slackness reads
μ 1 f i F m a x = 0
μ 2 ( τ i , e + τ i , b ) 1 = 0
μ 3 ( p i , b + p i , e ) P m a x = 0 The convexified problem (P.2) ensures the existence of a globally optimal solution due to convexity of objective and constraints as well as satisfaction of the KKT conditions. Accordingly, the problem admits analytical solutions for the transmit power (in both uplink and downlink despite the fact that downlink calculations are omitted due to space limitation) and CPU frequency allocations as formulated in (20) and (21), respectively. The time allocation, on the other side, is obtained by solving convex subproblem as detailed in . This does not have closed-form expression due to coupling of time variable across users. Nevertheless, global optimality is also guaranteed by the convexity of the subproblem which is solvable in polynomial time via typical convex optimization techniques (like interior-point method). As a closing remark, it is worth to mention that analytical solutions for power and CPU allocations along with the convexity of time allocation subproblem enable computationally-efficient and practical on-board implementation of the proposed algorithm for real-time UAV-assisted MEC scenarios.
Algorithm 1 Layered Priority-Aware Offloading and Optimal Resource Allocation for UAV-enabled MEC Network
1: Input: Channel gains { h i } , parameters { S i , C i ,   w i } ,   F m a x ,   P m a x .
2: Initialize dual variables μ 1 ,   μ 2 ,   μ 3 > 0 .
3: repeat
4: CPU update: f i ( k + 1 ) ( 20 ) .
5: Power update: p i ( k + 1 ) ( 21 ) .
6: Time allocation: Solve convex subproblem for τ with constraint i ( τ i , b + τ i , e ) 1 .
7: Dual update:
μ 1 ( k + 1 ) μ 1 ( k ) +   ρ i ( f i , b + f i , e ) F m a x +       , and similarly for   μ 2 ,   μ 3 .
8: until Convergence of objective function.9: Output: Optimal { p i ,   f i ,   τ i } .

6. Results and Discussion

To validate and assess the performance of the proposed scheme under a dynamic composite wireless channel of a UAV-assisted MEC system, we consider simulation of 10 mobile users. The proposed priority-aware resource allocation is compared to three baseline schemes: the enhancement first, equal allocation, and no priority under the same network conditions. Where in the “Enhancement first” EL layer is offloaded first, while in “Equal allocation” the power and processing resources are equally allocated among all users; and in “no priority” scheme, as the name suggests, no prioritization is applied and the whole computation task is offloaded at once. The simulation parameters are listed in Table 1.
Figure 3 demonstrate the weighted overall latency across all users versus SNR for each of the three resource allocation schemes compare with proposed algorithm. At a signal-to-noise ratio of 5 dB, the proposed algorithm achieves considerable latency reductions vs the baseline algorithms (39.99% reduction vs Equal Allocation, 49.99% reduction vs Enhancement First, and 69.99% reduction vs No Priority). These reductions in latency are attributed to the jointed optimization of radio and computing resources in the proposed algorithm, reducing the overall latency through dynamic adaptation of resources allocation to the MEC according to user priority and channel quality.
Besides reliability, the efficiency of the proposed priority-aware offloading scheme is confirmed by the fact that it achieves the lowest latency across all SNR values as is clear from the results in Table 2.
As a function of processing capacity of UAV ( F m a x ) ,   we plot again the total weighted offloading latency. It is obvious that for all schemes, the total latency decreased gradually as the UAV’s computing capacity increased from 1 GHz to 10 GHz. With the increasing computing capacity of UAV, transmission time is not the only factor contributing to latency; channel randomness also affects it.
At a low computing capacity of 1 GHz, the proposed algorithm shows a latency reduction compared to the baseline algorithms (40% reduction vs Equal Allocation, 50% reduction vs Enhancement First, and 70% reduction vs No Priority) as is evident from the results in Table 3.
Figure 4. Latency vs UAV Computing Capacity for Priority-Aware MEC Offloading.
Figure 4. Latency vs UAV Computing Capacity for Priority-Aware MEC Offloading.
Preprints 194200 g004
Overall, the results confirm that the proposed priority-based framework offer better performance against resource scarcity with edge computing capability. This underscores its suitability for latency-critical applications in mobile edge computing networks assisted by UAVs as well as guaranteed reliability for BL execution.
Figure 5 illustrates the variation in total latency as a function of the total input data size (measured in Mbits) for different data offloading algorithms. In all algorithms, latency increases almost with data size. For moderate task sizes, such as 2.93 Mb, the proposed algorithm reduces the total latency by approximately 57.14% compared to average baseline algorithms.
As the total bit size increases to 4.80 Mb, the latency becomes even more pronounced, with the proposed method maintaining, on average, a reduction still of approximately 57.14% compared to conventional average baseline algorithms as is clear from the results in Table 4.
Figure 6 shows that the total latency increases with the number of users for all the resource allocation schemes, as they share the UAV’s computing resources and limited bandwidth and channel resources in both uplink and downlink.
With any given number of users (2-20), the proposed system offers significantly latency reduction than other average baseline schemes. For 10 users, the proposed algorithm reduces the total latency by approximately 57.132% compared to average baseline algorithms by prioritizing user resource allocation and minimizing offloading time as is evident from the results in Table 5.
Figure 7 illustrates the latency behavior of the proposed algorithm across different user weighting scenarios in a three-users MEC system as reported in Table 6. This figure shows that the proposed algorithm clearly highlights latency differences between users and weighted states, users with higher weights correspond to higher priority and consistently lower latency, while the latency of less important users increases slightly. This reflects the intelligent optimization behavior of the proposed model.
Figure 8 illustrates the impact of offloading bits size on average weighted latency (ms) and task completion rate (%) in a composite fading channel. It is clear from figure of the proposed approach, as the number of bits allocated for offloading increases, the average weighted latency gradually rises due to the continuous increase in the workload on communications and computing. Simultaneously, the task completion rate gradually decreases. This indicates that the system maintains a smooth balance between weighted latency and task completion rate metrics.

7. Conclusions

In this paper, we study a UAV-assisted mobile edge computing (MEC) system for disaster relief, where a UAV provides computation and communication services to multiple ground users. Each user task is partitioned into a base layer (critical for reliability) and an enhancement layer (optional for improved quality). We formulate a joint optimization problem of communication and computation resources to minimize the weighted sum latency across all users while guaranteeing base-layer priority through minimum rate constraints. The problem is shown to be non-convex in its native form. After appropriate transformations, we recast the problem into convex and then derive the optimal solution using KKT conditions and obtain a water-filling-like closed form for power and processing capacity allocation. The numerical results reflect that priority-aware joint resource allocation scheme outperforms several baseline scheme. At a signal-to-noise ratio of 5 dB, the proposed algorithm achieves relative latency reductions vs the baseline algorithms (39.99% reduction vs Equal Allocation, 49.99% reduction vs Enhancement First, and 69.99% reduction vs No Priority).
For future directions of this endeavor, it can be expanded to achieve cooperation between multiple UAVs and incorporate more advanced prioritization techniques like NOMA-enabled offloading or superposition coding.

Author Contributions

Both authors have contributed equally to the conceptualization, implementation, analysis, and writing of this manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. Abbreviations.
Table A1. Abbreviations.
Symbol Description
S i , b U L ,     S i , e U L The number of offloading bits during the BL, and EL
i U L ,     i D L The time expression for task uploading and downloading
i M E C ,     i t o t a l Computation time, total offloading time
R i , b U L ,     R i , e U L The achievable uplink rate for sending S i , b U L , S i , e U L to UAV
R i D L DL rate from UAV to MU
S i D L The number of downloading bits
f i M E C a fraction of CPU frequency allocated to the i t h users with constraints
MU Mobile user
UAV Unmanned Aerial Vehicle
Fmax The CPU frequency of UAV processor
τ D L Refer to the fraction of DL TDMA frame allocated to task downloading (unitless)
τ i , b U L ,     τ i , e U L Represent fraction of UL TDMA frame allocated to prioritize BL, EL task transmission (unitless)
P i U L ,     P i D L Maximum UL power, Maximum DL power
B b U L ,     B e U L UL transmission bandwidth allocated for BL, EL task
P i , b U L ,     P i , e U L The BL, EL transmit power of the user device (Watt)

References

  1. Kalinagac, O.; Gür, G.; Alagöz, F. Prioritization Based Task Offloading in UAV-Assisted Edge Networks. Sensors 2023, 23, 2375. [Google Scholar] [CrossRef] [PubMed]
  2. Jeong, S.; Simeone, O.; Kang, J. Mobile Edge Computing via a UAV-Mounted Cloudlet: Optimization of Bit Allocation and Path Planning. IEEE Trans. Veh. Technol. 2017, 67, 2049–2063. [Google Scholar] [CrossRef]
  3. Zhang, P.; Su, Y.; Li, B.; Liu, L.; Wang, C.; Zhang, W.; Tan, L. Deep Reinforcement Learning Based Computation Offloading in UAV-Assisted Edge Computing. Drones 2023, 7, 213. [Google Scholar] [CrossRef]
  4. Kumar, K.; Liu, J.; Lu, Y.-H.; Bhargava, B. A Survey of Computation Offloading for Mobile Systems. Mob. Networks Appl. 2012, 18, 129–140. [Google Scholar] [CrossRef]
  5. Li, H.; Jia, Z.; He, S.; Guo, K.; Wu, Q. Hierarchical Task Offloading for UAV-Assisted Vehicular Edge Computing via Deep Reinforcement Learning. 2025 International Conference on Future Communications and Networks (FCN), LOCATION OF CONFERENCE, SerbiaDATE OF CONFERENCE; pp. 1–6.
  6. Dehkordi, M.F.; Jabbari, B. Efficient and Sustainable Task Offloading in UAV-Assisted MEC Systems via Meta Deep Reinforcement Learning. ICC 2025 - IEEE International Conference on Communications, LOCATION OF CONFERENCE, CanadaDATE OF CONFERENCE; pp. 1353–1358.
  7. Xiao, H.; Hu, X.; Zhang, W.; Wang, W.; Wong, K.-K.; Yang, K. Energy-Efficient STAR-RIS Enhanced UAV-Enabled MEC Networks With Bi-Directional Task Offloading. IEEE Trans. Wirel. Commun. 2025, 24, 3258–3272. [Google Scholar] [CrossRef]
  8. Wu, H.; Yang, X.; Bu, Z. Deep Reinforcement Learning for Computation Offloading and Resource Allocation in Satellite-Terrestrial Integrated Networks. 2022 IEEE 95th Vehicular Technology Conference (VTC2022-Spring); LOCATION OF CONFERENCE, FinlandDATE OF CONFERENCE; pp. 1–5.
  9. Peng, C.; Wang, Q.; Zhang, D. Efficient dynamic task offloading and resource allocation in UAV-assisted MEC for large sport event. Sci. Rep. 2025, 15, 1–16. [Google Scholar] [CrossRef] [PubMed]
  10. Li, J.; Gao, H.; Lv, T.; Lu, Y. Deep reinforcement learning based computation offloading and resource allocation for MEC. 2018 IEEE Wireless Communications and Networking Conference (WCNC); LOCATION OF CONFERENCE, COUNTRYDATE OF CONFERENCE; pp. 1–6.
  11. Ding, Z.; Xu, J.; Dobre, O.A.; Poor, H.V. Joint Power and Time Allocation for NOMA–MEC Offloading. IEEE Trans. Veh. Technol. 2019, 68, 6207–6211. [Google Scholar] [CrossRef]
  12. Mach, P.; Becvar, Z.; I. Member; I. Member. “Mobile Edge Computing: A Survey on Architecture and Computation Offloading”.
  13. Gupta, L.; Jain, R.; Vaszkun, G. Survey of Important Issues in UAV Communication Networks. IEEE Commun. Surv. Tutor. 2016, 18, 1123–1152. [Google Scholar] [CrossRef]
  14. Al-Shuwaili, A.N.; Bagheri, A.; Simeone, O. Joint uplink/downlink and offloading optimization for mobile cloud computing with limited backhaul. 2016 Annual Conference on Information Science and Systems (CISS), LOCATION OF CONFERENCE, USADATE OF CONFERENCE; pp. 424–429.
  15. Al-Shuwaili, A.; Simeone, O.; Bagheri, A.; Scutari, G. Joint Uplink/Downlink Optimization for Backhaul-Limited Mobile Cloud Computing With User Scheduling. IEEE Trans. Signal Inf. Process. over Networks 2017, 3, 787–802. [Google Scholar] [CrossRef]
  16. Bai, T.; Wang, J.; Ren, Y.; Hanzo, L. Energy-Efficient Computation Offloading for Secure UAV-Edge-Computing Systems. IEEE Trans. Veh. Technol. 2019, 68, 6074–6087. [Google Scholar] [CrossRef]
  17. Azimi, S.M.; Simeone, O.; Sahin, O.; Popovski, P. Ultra-reliable cloud mobile computing with service composition and superposition coding. 2016 Annual Conference on Information Science and Systems (CISS); LOCATION OF CONFERENCE, USADATE OF CONFERENCE; pp. 442–447.
  18. Alameddine, H.A.; Sharafeddine, S.; Sebbah, S.; Ayoubi, S.; Assi, C. Dynamic Task Offloading and Scheduling for Low-Latency IoT Services in Multi-Access Edge Computing. IEEE J. Sel. Areas Commun. 2019, 37, 668–682. [Google Scholar] [CrossRef]
  19. Nex, F.; Remondino, F. UAV for 3D mapping applications: a review. Appl. Geomat. 2014, 6, 1–15. [Google Scholar] [CrossRef]
  20. Yang, H.; Zhao, J.; Xiong, Z.; Lam, K.-Y.; Sun, S.; Xiao, L. Privacy-Preserving Federated Learning for UAV-Enabled Networks: Learning-Based Joint Scheduling and Resource Management. IEEE J. Sel. Areas Commun. 2021, 39, 3144–3159. [Google Scholar] [CrossRef]
  21. Liu, Q.; Shi, L.; Sun, L.; Li, J.; Ding, M.; Shu, F.S. Path Planning for UAV-Mounted Mobile Edge Computing With Deep Reinforcement Learning. IEEE Trans. Veh. Technol. 2020, 69, 5723–5728. [Google Scholar] [CrossRef]
  22. Rappaport, T. S. Wireless Communications: Principles and Practice Second Edition.
  23. Boyd, S.; Vandenberghe, L. Convex optimization; Cambridge university press, 2004. [Google Scholar]
  24. Mao, Y.; Zhang, J.; Song, S.H.; Letaief, K.B. Power-Delay Tradeoff in Multi-User Mobile-Edge Computing Systems. GLOBECOM 2016 - 2016 IEEE Global Communications Conference, LOCATION OF CONFERENCE, USADATE OF CONFERENCE; pp. 1–6.
Figure 1. Basic Model for the proposed priority-aware UAV-Assisted MEC system. Both inter-user (layer 1) and intra-user (layer 2) priorities are shown with TDMA scheduling.
Figure 1. Basic Model for the proposed priority-aware UAV-Assisted MEC system. Both inter-user (layer 1) and intra-user (layer 2) priorities are shown with TDMA scheduling.
Preprints 194200 g001
Figure 2. TDMA timeframe for proposed priority-aware offloading Scheme. The total offloading delay is the sum of UL, computation and DL times where each occupied a fraction of the TDMA frame. Priority is assured for base layer bits of each ground user.
Figure 2. TDMA timeframe for proposed priority-aware offloading Scheme. The total offloading delay is the sum of UL, computation and DL times where each occupied a fraction of the TDMA frame. Priority is assured for base layer bits of each ground user.
Preprints 194200 g002
Figure 3. Latency vs SNR for Priority-Aware MEC Offloading.
Figure 3. Latency vs SNR for Priority-Aware MEC Offloading.
Preprints 194200 g003
Figure 5. Latency vs Total Offloading Bits.
Figure 5. Latency vs Total Offloading Bits.
Preprints 194200 g005
Figure 6. Latency vs Number of Users.
Figure 6. Latency vs Number of Users.
Preprints 194200 g006
Figure 7. User priority based on user weight for three users using the proposed algorithm.
Figure 7. User priority based on user weight for three users using the proposed algorithm.
Preprints 194200 g007
Figure 8. Average Weighted Latency (ms) and Task Completion Rate (%) Based-on Total Offloading Bits (Mb).
Figure 8. Average Weighted Latency (ms) and Task Completion Rate (%) Based-on Total Offloading Bits (Mb).
Preprints 194200 g008
Table 1. Simulation System’s Parameters.
Table 1. Simulation System’s Parameters.
Parameter Value Unit Description
K 10 - No. of users in the MEC system [9,15]
B 10e6
20e6
HZ Channel bandwidth (10 MHZ typical for LTE UL / 20 MHZ typical for LTE DL)
N0 4e-21 W/HZ Noise Power Spectral Density (PSD) typical ≈ (-174 dBm/HZ) [24]
Fmax 5e9-10e9 Cycles/s Total computation capacity of MEC server [24]
Pmax 0.05 Watt Maximum transmission power available for offloading [24]
S i , b 50e3 bits Number of offloading bits during the BL
S i , e 200e3 bits Number of offloading bits during the EL
weights [0.6, 0.3, 0.1] - Give the user priority (higher = more critical)
P_b - Watt Power allocated for BL (transmission per user)
P_e - Watt Power allocated for EL (transmission per user)
F_b - Cycles/s MEC CPU cycles allocated to BL per user
F_e - Cycles/s MEC CPU cycles allocated to EL per user
τ _ b - - Time fraction assigned BL transmission
τ _ e - - Time fraction assigned EL transmission
Rb, Re - bps BL/EL achievable rate
SNR 5-30 dB Ratio of signal power to noise power
α >2, 3.2 - Path loss exponent outdoor or a complex indoor
d0 1 m Reference distance [24]
Ѕ 6≤ dB Log-normal shadowing
Қ 6 dB Rician k factor [22]
Table 2. Results of SNR Vs Latency for Proposed and Baseline Algorithms.
Table 2. Results of SNR Vs Latency for Proposed and Baseline Algorithms.
SNR
(dB)
Proposed (ms) Equal Allocation (ms) EnhancementFirst (ms) No Priority (ms)
5.0 44.80 74.66 89.59 149.32
10.0 26.07 43.45 52.14 86.89
15.0 18.84 31.40 37.67 62.79
20.0 16.10 26.83 32.19 53.65
25.0 14.46 24.11 28.93 48.21
30.0 13.87 23.12 27.75 46.24
Table 3. Results of UAV Computing Capacity Vs Latency for Proposed and Baseline Algorithms.
Table 3. Results of UAV Computing Capacity Vs Latency for Proposed and Baseline Algorithms.
Fmax
(GHz)
Proposed
(ms)
Equal Allocation (ms) Enhancement -First (ms) No Priority (ms)
1.0 80.12 133.54 160.24 267.07
2.29 38.17 63.62 76.34 127.24
3.57 26.43 44.04 52.85 88.09
4.86 20.90 34.83 41.80 69.66
6.14 17.69 29.48 35.37 58.95
7.43 15.58 25.97 31.17 51.95
8.71 14.10 23.50 28.21 47.01
10.0 13.00 21.67 26.00 43.34
Table 4. Results of Total Offloading Bits Vs Latency for Proposed and Baseline Algorithms.
Table 4. Results of Total Offloading Bits Vs Latency for Proposed and Baseline Algorithms.
Total Bits
(Mb)
Proposed
(ms)
Equal Allocation (ms) Enhancement -First (ms) No Priority (ms)
0.44 6.42 10.71 12.85 21.41
1.06 14.99 24.98 29.97 49.95
1.69 23.55 39.25 47.10 78.50
2.31 32.11 53.52 64.22 107.04
2.93 40.67 67.79 81.35 135.58
3.55 49.24 82.06 98.47 164.12
4.18 57.80 96.33 115.60 192.66
4.80 66.36 110.60 132.72 221.21
Table 5. Results of Number of Users Vs Latency for Proposed and Baseline Algorithms.
Table 5. Results of Number of Users Vs Latency for Proposed and Baseline Algorithms.
Number of Users Proposed
(ms)
Equal Allocation (ms) Enhancement -First (ms) No Priority (ms)
2 15.94 26.57 31.88 53.13
5 16.97 28.29 33.95 56.58
8 16.72 27.87 33.45 55.75
10 16.93 28.21 33.85 56.42
12 16.92 28.20 33.85 56.41
15 16.88 28.14 33.76 56.27
18 17.30 28.83 34.59 57.66
20 17.68 29.46 35.35 58.92
Table 6. Custom Weight Cases for 3-User.
Table 6. Custom Weight Cases for 3-User.
CASE User 1 Weight User 2 Weight User 3 Weight
1 0.2 0.3 0.5
2 0.4 0.5 0.1
3 0.2 0.2 0.6
4 0.8 0.1 0.1
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2026 MDPI (Basel, Switzerland) unless otherwise stated