期刊文献+
共找到195篇文章
< 1 2 10 >
每页显示 20 50 100
A New Mobility Management and Routing Scheme for Mobile Computing Environments
1
作者 科玛拉 孙学军 何丕廉 《Transactions of Tianjin University》 EI CAS 2002年第4期255-260,共4页
Mobility management is an essential component in enabling mobile hosts to move seamlessly from one location to another while maintaining the packet routing efficiency between the corresponding hosts. One of the concer... Mobility management is an essential component in enabling mobile hosts to move seamlessly from one location to another while maintaining the packet routing efficiency between the corresponding hosts. One of the concerns raised with the internet engineering task force(IETF)mobile IP standard is the excessive signaling generated for highly mobile computers. This paper introduces a scheme to address that issue by manipulating the inherent client-server interaction which exists in most applications to provide the correspondent host with the current mobile host binding. To evaluate the performance of the scheme, typical internet application sessions involving a mobile host is simulated and the signaling and routing costs are examined. Results show a substantial reduction in the mobility management overhead as well as the total cost of delivering packets to the mobile host. 展开更多
关键词 mobile computing mobility management SIGNALING mobile IP
下载PDF
Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node
2
作者 Neha Malhotra Manju Bala 《Computers, Materials & Continua》 SCIE EI 2022年第3期5269-5284,共16页
Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility.In such attacks,an adversary accesses a few network nodes,generates replication,then inserts this replication into the network,p... Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility.In such attacks,an adversary accesses a few network nodes,generates replication,then inserts this replication into the network,potentially resulting in numerous internal network attacks.Most existing techniques use a central base station,which introduces several difficulties into the system due to the network’s reliance on a single point,while other ways generate more overhead while jeopardising network lifetime.In this research,an intelligent double hashing-based clone node identification scheme was used,which reduces communication and memory costs while performing the clone detection procedure.The approach works in two stages:in the first,the network is deployed using an intelligent double hashing procedure to avoid any network collisions and then in the second,the clone node identification procedure searches for any clone node in the network.This first phase verifies the node prior to network deployment,and then,whenever a node wants to interact,it executes the second level of authentication.End-to-end delay,which is bound to increase owing to the injection of clone nodes,and packet loss,which is reduced by the double hashing technique,were used to evaluate the performance of the aforementioned approach. 展开更多
关键词 Node authentication clone node mobile computing double hashing fault tolerance
下载PDF
Database Recovery Technique for Mobile Computing:A Game Theory Approach
3
作者 Magda M.Madbouly Yasser F.Mokhtar Saad M.Darwish 《Computers, Materials & Continua》 SCIE EI 2022年第2期3205-3219,共15页
Contact between mobile hosts and database servers presents many problems in theMobile Database System(MDS).It is harmed by a variety of causes,including handoff,inadequate capacity,frequent transaction updates,and rep... Contact between mobile hosts and database servers presents many problems in theMobile Database System(MDS).It is harmed by a variety of causes,including handoff,inadequate capacity,frequent transaction updates,and repeated failures,both of which contribute to serious issues with the information system’s consistency.However,error tolerance technicality allows devices to continue performing their functions in the event of a failure.The aim of this paper is to identify the optimal recovery approach from among the available state-of-the-art techniques in MDS by employing game theory.Several of the presented recovery protocols are chosen and evaluated in order to determine the most critical factors affecting the recovery mechanism,such as the number of processes,the time required to deliver messages,and the number of messages logged-in time.Then,using the suggested payout matrix,the game theory strategy is adapted to choose the optimum recovery technique for the specified environmental variables.The NS2 simulatorwas used to carry out the tests and apply the chosen recovery protocols.The experiments validate the proposed model’s usefulness in comparison to other methods. 展开更多
关键词 mobile computing game theory decision making mobile database recovery
下载PDF
A distributed deadlock detection algorithm for mobile computing system
4
作者 程欣 刘宏伟 +2 位作者 左德承 金峰 杨孝宗 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第5期521-527,共7页
The mode of mobile computing originated from distributed computing and it has the un-idempotent operation property, therefore the deadlock detection algorithm designed for mobile computing systems will face challenges... The mode of mobile computing originated from distributed computing and it has the un-idempotent operation property, therefore the deadlock detection algorithm designed for mobile computing systems will face challenges with regard to correctness and high efficiency. This paper attempts a fundamental study of deadlock detection for the AND model of mobile computing systems. First, the existing deadlock detection algorithms for distributed systems are classified into the resource node dependent (RD) and the resource node independent (RI) categories, and their corresponding weaknesses are discussed. Afterwards a new RI algorithm based on the AND model of mobile computing system is presented. The novelties of our algorithm are that: 1) the blocked nodes inform their predecessors and successors simultaneously; 2) the detection messages (agents) hold the predecessors information of their originator; 3) no agent is stored midway. Additionally, the quit-inform scheme is introduced to treat the excessive victim quitting problem raised by the overlapped cycles. By these methods the proposed algorithm can detect a cycle of size n within n-2 steps and with (n^2-n-2)/2 agents. The performance of our algorithm is compared with the most competitive RD and RI algorithms for distributed systems on a mobile agent simulation platform. Experiment results point out that our algorithm outperforms the two algorithms under the vast majority of resource configurations and concurrent workloads. The correctness of the proposed algorithm is formally proven by the invariant verification technique. 展开更多
关键词 mobile computing system deadlock detection AND model cycle overlap
下载PDF
An Extended Application form of Mobile Computing ── Augmented Reality
5
作者 杨孝宗 《High Technology Letters》 EI CAS 2001年第2期39-41,共3页
With the rapid developments of wireless communication and microelectronic technology, the bandwidth of wireless communication is becoming wider than ever, up to 100Gbps and the computer can be designed as small as a m... With the rapid developments of wireless communication and microelectronic technology, the bandwidth of wireless communication is becoming wider than ever, up to 100Gbps and the computer can be designed as small as a match with powerful computing and controlling capability. These rapid developments have extended the mobile computing. There are many application forms of mobile computing, such as mobile databases, mobile data management, wearable computing etc. A great branch of mobile computing, Augmented Reality (AR), which is the combination of mobile computing and wearable computers was discussed. 展开更多
关键词 mobile computing Wireless communication Wearable computer Augmented reality Contextual awareness BLUETOOTH HOMERF
下载PDF
An adaptive handoff management for fault tolerant mobile computing
6
作者 徐振朋 《High Technology Letters》 EI CAS 2010年第4期407-412,共6页
Due to the mobility of mobile hosts,checkpoints and message logs of the computing process may disperseover different mobile support stations in the checkpointing and rollback recovery protocol for mobilecomputing.Thre... Due to the mobility of mobile hosts,checkpoints and message logs of the computing process may disperseover different mobile support stations in the checkpointing and rollback recovery protocol for mobilecomputing.Three existing checkpoint handoff schemes do not give well consideration to the efficiency offailure-free process execution and the recovery speed of the failure process at the same time.A dynamicadaptive handoff management of the checkpointing and rollback recovery protocol for mobile computing isproposed in this paper.According to the individual feature and current state of each mobile host,differentimplementations are selected dynamically to complete the handoff process upon the handoff event.Performance analyses show that the proposed handoff management incurs a low loss of performance duringfailure-free and achieves a quick recovery upon the process fault. 展开更多
关键词 mobile computing fault tolerant rollback recovery HANDOFF
下载PDF
Air-Ground Collaborative Mobile Edge Computing:Architecture,Challenges,and Opportunities 被引量:1
7
作者 Qin Zhen He Shoushuai +5 位作者 Wang Hai Qu Yuben Dai Haipeng Xiong Fei Wei Zhenhua Li Hailong 《China Communications》 SCIE CSCD 2024年第5期1-16,共16页
By pushing computation,cache,and network control to the edge,mobile edge computing(MEC)is expected to play a leading role in fifth generation(5G)and future sixth generation(6G).Nevertheless,facing ubiquitous fast-grow... By pushing computation,cache,and network control to the edge,mobile edge computing(MEC)is expected to play a leading role in fifth generation(5G)and future sixth generation(6G).Nevertheless,facing ubiquitous fast-growing computational demands,it is impossible for a single MEC paradigm to effectively support high-quality intelligent services at end user equipments(UEs).To address this issue,we propose an air-ground collaborative MEC(AGCMEC)architecture in this article.The proposed AGCMEC integrates all potentially available MEC servers within air and ground in the envisioned 6G,by a variety of collaborative ways to provide computation services at their best for UEs.Firstly,we introduce the AGC-MEC architecture and elaborate three typical use cases.Then,we discuss four main challenges in the AGC-MEC as well as their potential solutions.Next,we conduct a case study of collaborative service placement for AGC-MEC to validate the effectiveness of the proposed collaborative service placement strategy.Finally,we highlight several potential research directions of the AGC-MEC. 展开更多
关键词 air-ground architecture COLLABORATIVE mobile edge computing
下载PDF
IRS Assisted UAV Communications against Proactive Eavesdropping in Mobile Edge Computing Networks 被引量:1
8
作者 Ying Zhang Weiming Niu Leibing Yan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期885-902,共18页
In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of ... In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of UAV,the transmitting beamforming of users,and the phase shift matrix of IRS.The original problem is strong non-convex and difficult to solve.We first propose two basic modes of the proactive eavesdropper,and obtain the closed-form solution for the boundary conditions of the two modes.Then we transform the original problem into an equivalent one and propose an alternating optimization(AO)based method to obtain a local optimal solution.The convergence of the algorithm is illustrated by numerical results.Further,we propose a zero forcing(ZF)based method as sub-optimal solution,and the simulation section shows that the proposed two schemes could obtain better performance compared with traditional schemes. 展开更多
关键词 mobile edge computing(MEC) unmanned aerial vehicle(UAV) intelligent reflecting surface(IRS) zero forcing(ZF)
下载PDF
Secure Computation Efficiency Resource Allocation for Massive MIMO-Enabled Mobile Edge Computing Networks
9
作者 Sun Gangcan Sun Jiwei +3 位作者 HaoWanming Zhu Zhengyu Ji Xiang Zhou Yiqing 《China Communications》 SCIE CSCD 2024年第11期150-162,共13页
In this article,the secure computation efficiency(SCE)problem is studied in a massive multipleinput multiple-output(mMIMO)-assisted mobile edge computing(MEC)network.We first derive the secure transmission rate based ... In this article,the secure computation efficiency(SCE)problem is studied in a massive multipleinput multiple-output(mMIMO)-assisted mobile edge computing(MEC)network.We first derive the secure transmission rate based on the mMIMO under imperfect channel state information.Based on this,the SCE maximization problem is formulated by jointly optimizing the local computation frequency,the offloading time,the downloading time,the users and the base station transmit power.Due to its difficulty to directly solve the formulated problem,we first transform the fractional objective function into the subtractive form one via the dinkelbach method.Next,the original problem is transformed into a convex one by applying the successive convex approximation technique,and an iteration algorithm is proposed to obtain the solutions.Finally,the stimulations are conducted to show that the performance of the proposed schemes is superior to that of the other schemes. 展开更多
关键词 EAVESDROPPING massive multiple input multiple output mobile edge computing partial offloading secure computation efficiency
下载PDF
Deep Reinforcement Learning-Based Task Offloading and Service Migrating Policies in Service Caching-Assisted Mobile Edge Computing
10
作者 Ke Hongchang Wang Hui +1 位作者 Sun Hongbin Halvin Yang 《China Communications》 SCIE CSCD 2024年第4期88-103,共16页
Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy.... Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy.Due to the homogeneity of request tasks from one MWE during a longterm time period,it is vital to predeploy the particular service cachings required by the request tasks at the MEC server.In this paper,we model a service caching-assisted MEC framework that takes into account the constraint on the number of service cachings hosted by each edge server and the migration of request tasks from the current edge server to another edge server with service caching required by tasks.Furthermore,we propose a multiagent deep reinforcement learning-based computation offloading and task migrating decision-making scheme(MBOMS)to minimize the long-term average weighted cost.The proposed MBOMS can learn the near-optimal offloading and migrating decision-making policy by centralized training and decentralized execution.Systematic and comprehensive simulation results reveal that our proposed MBOMS can converge well after training and outperforms the other five baseline algorithms. 展开更多
关键词 deep reinforcement learning mobile edge computing service caching service migrating
下载PDF
Online Learning-Based Offloading Decision and Resource Allocation in Mobile Edge Computing-Enabled Satellite-Terrestrial Networks
11
作者 Tong Minglei Li Song +1 位作者 Han Wanjiang Wang Xiaoxiang 《China Communications》 SCIE CSCD 2024年第3期230-246,共17页
Mobile edge computing(MEC)-enabled satellite-terrestrial networks(STNs)can provide Internet of Things(IoT)devices with global computing services.Sometimes,the network state information is uncertain or unknown.To deal ... Mobile edge computing(MEC)-enabled satellite-terrestrial networks(STNs)can provide Internet of Things(IoT)devices with global computing services.Sometimes,the network state information is uncertain or unknown.To deal with this situation,we investigate online learning-based offloading decision and resource allocation in MEC-enabled STNs in this paper.The problem of minimizing the average sum task completion delay of all IoT devices over all time periods is formulated.We decompose this optimization problem into a task offloading decision problem and a computing resource allocation problem.A joint optimization scheme of offloading decision and resource allocation is then proposed,which consists of a task offloading decision algorithm based on the devices cooperation aided upper confidence bound(UCB)algorithm and a computing resource allocation algorithm based on the Lagrange multiplier method.Simulation results validate that the proposed scheme performs better than other baseline schemes. 展开更多
关键词 computing resource allocation mobile edge computing satellite-terrestrial networks task offloading decision
下载PDF
Computing Resource Allocation for Blockchain-Based Mobile Edge Computing
12
作者 Wanbo Zhang Yuqi Fan +2 位作者 Jun Zhang Xu Ding Jung Yoon Kim 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期863-885,共23页
Users and edge servers are not fullymutually trusted inmobile edge computing(MEC),and hence blockchain can be introduced to provide trustableMEC.In blockchain-basedMEC,each edge server functions as a node in bothMEC a... Users and edge servers are not fullymutually trusted inmobile edge computing(MEC),and hence blockchain can be introduced to provide trustableMEC.In blockchain-basedMEC,each edge server functions as a node in bothMEC and blockchain,processing users’tasks and then uploading the task related information to the blockchain.That is,each edge server runs both users’offloaded tasks and blockchain tasks simultaneously.Note that there is a trade-off between the resource allocation for MEC and blockchain tasks.Therefore,the allocation of the resources of edge servers to the blockchain and theMEC is crucial for the processing delay of blockchain-based MEC.Most of the existing research tackles the problem of resource allocation in either blockchain or MEC,which leads to unfavorable performance of the blockchain-based MEC system.In this paper,we study how to allocate the computing resources of edge servers to the MEC and blockchain tasks with the aimtominimize the total systemprocessing delay.For the problem,we propose a computing resource Allocation algorithmfor Blockchain-based MEC(ABM)which utilizes the Slater’s condition,Karush-Kuhn-Tucker(KKT)conditions,partial derivatives of the Lagrangian function and subgradient projection method to obtain the solution.Simulation results show that ABM converges and effectively reduces the processing delay of blockchain-based MEC. 展开更多
关键词 mobile edge computing blockchain resource allocation
下载PDF
UAV-assisted cooperative offloading energy efficiency system for mobile edge computing
13
作者 Xue-Yong Yu Wen-Jin Niu +1 位作者 Ye Zhu Hong-Bo Zhu 《Digital Communications and Networks》 SCIE CSCD 2024年第1期16-24,共9页
Reliable communication and intensive computing power cannot be provided effectively by temporary hot spots in disaster areas and complex terrain ground infrastructure.Mitigating this has greatly developed the applicat... Reliable communication and intensive computing power cannot be provided effectively by temporary hot spots in disaster areas and complex terrain ground infrastructure.Mitigating this has greatly developed the application and integration of UAV and Mobile Edge Computing(MEC)to the Internet of Things(loT).However,problems such as multi-user and huge data flow in large areas,which contradict the reality that a single UAV is constrained by limited computing power,still exist.Due to allowing UAV collaboration to accomplish complex tasks,cooperative task offloading between multiple UAVs must meet the interdependence of tasks and realize parallel processing,which reduces the computing power consumption and endurance pressure of terminals.Considering the computing requirements of the user terminal,delay constraint of a computing task,energy constraint,and safe distance of UAV,we constructed a UAV-Assisted cooperative offloading energy efficiency system for mobile edge computing to minimize user terminal energy consumption.However,the resulting optimization problem is originally nonconvex and thus,difficult to solve optimally.To tackle this problem,we developed an energy efficiency optimization algorithm using Block Coordinate Descent(BCD)that decomposes the problem into three convex subproblems.Furthermore,we jointly optimized the number of local computing tasks,number of computing offloaded tasks,trajectories of UAV,and offloading matching relationship between multi-UAVs and multiuser terminals.Simulation results show that the proposed approach is suitable for different channel conditions and significantly saves the user terminal energy consumption compared with other benchmark schemes. 展开更多
关键词 Computation offloading Internet of things(IoT) mobile edge computing(MEC) Block coordinate descent(BCD)
下载PDF
Age of Information Based User Scheduling and Data Assignment in Multi-User Mobile Edge Computing Networks:An Online Algorithm
14
作者 Ge Yiyang Xiong Ke +3 位作者 Dong Rui Lu Yang Fan Pingyi Qu Gang 《China Communications》 SCIE CSCD 2024年第5期153-165,共13页
This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization pr... This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization problem is formulated by jointly optimizing the user scheduling and data assignment.Due to the non-analytic expression of the WSA w.r.t.the optimization variables and the unknowability of future network information,the problem cannot be solved with known solution methods.Therefore,an online Joint Partial Offloading and User Scheduling Optimization(JPOUSO)algorithm is proposed by transforming the original problem into a single-slot data assignment subproblem and a single-slot user scheduling sub-problem and solving the two sub-problems separately.We analyze the computational complexity of the presented JPO-USO algorithm,which is of O(N),with N being the number of users.Simulation results show that the proposed JPO-USO algorithm is able to achieve better AoI performance compared with various baseline methods.It is shown that both the user’s data assignment and the user’s AoI should be jointly taken into account to decrease the system WSA when scheduling users. 展开更多
关键词 age of information(aoi) mobile edge computing(mec) user scheduling
下载PDF
Energy Efficiency Maximization in Mobile Edge Computing Networks via IRS assisted UAV Communications
15
作者 Ying Zhang Weiming Niu +1 位作者 Supu Xiu Guangchen Mu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1865-1884,共20页
In this paper,we investigate the energy efficiency maximization for mobile edge computing(MEC)in intelligent reflecting surface(IRS)assisted unmanned aerial vehicle(UAV)communications.In particular,UAVcan collect the ... In this paper,we investigate the energy efficiency maximization for mobile edge computing(MEC)in intelligent reflecting surface(IRS)assisted unmanned aerial vehicle(UAV)communications.In particular,UAVcan collect the computing tasks of the terrestrial users and transmit the results back to them after computing.We jointly optimize the users’transmitted beamforming and uploading ratios,the phase shift matrix of IRS,and the UAV trajectory to improve the energy efficiency.The formulated optimization problem is highly non-convex and difficult to be solved directly.Therefore,we decompose the original problem into three sub-problems.We first propose the successive convex approximation(SCA)based method to design the beamforming of the users and the phase shift matrix of IRS,and apply the Lagrange dual method to obtain a closed-form expression of the uploading ratios.For the trajectory optimization,we propose a block coordinate descent(BCD)based method to obtain a local optimal solution.Finally,we propose the alternating optimization(AO)based overall algorithmand analyzed its complexity to be equivalent or lower than existing algorithms.Simulation results show the superiority of the proposedmethod compared with existing schemes in energy efficiency. 展开更多
关键词 mobile edge computing(MEC) unmanned aerial vehicle(UAV) intelligent reflecting surface(IRS) energy efficiency
下载PDF
Energy Minimization for Heterogenous Traffic Coexistence with Puncturing in Mobile Edge Computing-Based Industrial Internet of Things
16
作者 Wang Xue Wang Ying +1 位作者 Fei Zixuan Zhao Junwei 《China Communications》 SCIE CSCD 2024年第10期167-180,共14页
Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady perform... Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady performance of eMBB traffic while meeting the requirements of URLLC traffic with puncturing is a major challenge in some realistic scenarios. In this paper, we pay attention to the timely and energy-efficient processing for eMBB traffic in the industrial Internet of Things(IIoT), where mobile edge computing(MEC) is employed for data processing. Specifically, the performance of eMBB traffic and URLLC traffic in a MEC-based IIoT system is ensured by setting the threshold of tolerable delay and outage probability, respectively. Furthermore,considering the limited energy supply, an energy minimization problem of eMBB device is formulated under the above constraints, by jointly optimizing the resource blocks(RBs) punctured by URLLC traffic, data offloading and transmit power of eMBB device. With Markov's inequality, the problem is reformulated by transforming the probabilistic outage constraint into a deterministic constraint. Meanwhile, an iterative energy minimization algorithm(IEMA) is proposed.Simulation results demonstrate that our algorithm has a significant reduction in the energy consumption for eMBB device and achieves a better overall effect compared to several benchmarks. 展开更多
关键词 energy minimization enhanced mobile broadband(eMBB)and ultra-reliable low latency communications(URLLC)coexistence industrial Internet of Things(IIoT) mobile edge computing(MEC) PUNCTURING
下载PDF
Task offloading mechanism based on federated reinforcement learning in mobile edge computing 被引量:2
17
作者 Jie Li Zhiping Yang +2 位作者 Xingwei Wang Yichao Xia Shijian Ni 《Digital Communications and Networks》 SCIE CSCD 2023年第2期492-504,共13页
With the arrival of 5G,latency-sensitive applications are becoming increasingly diverse.Mobile Edge Computing(MEC)technology has the characteristics of high bandwidth,low latency and low energy consumption,and has att... With the arrival of 5G,latency-sensitive applications are becoming increasingly diverse.Mobile Edge Computing(MEC)technology has the characteristics of high bandwidth,low latency and low energy consumption,and has attracted much attention among researchers.To improve the Quality of Service(QoS),this study focuses on computation offloading in MEC.We consider the QoS from the perspective of computational cost,dimensional disaster,user privacy and catastrophic forgetting of new users.The QoS model is established based on the delay and energy consumption and is based on DDQN and a Federated Learning(FL)adaptive task offloading algorithm in MEC.The proposed algorithm combines the QoS model and deep reinforcement learning algorithm to obtain an optimal offloading policy according to the local link and node state information in the channel coherence time to address the problem of time-varying transmission channels and reduce the computing energy consumption and task processing delay.To solve the problems of privacy and catastrophic forgetting,we use FL to make distributed use of multiple users’data to obtain the decision model,protect data privacy and improve the model universality.In the process of FL iteration,the communication delay of individual devices is too large,which affects the overall delay cost.Therefore,we adopt a communication delay optimization algorithm based on the unary outlier detection mechanism to reduce the communication delay of FL.The simulation results indicate that compared with existing schemes,the proposed method significantly reduces the computation cost on a device and improves the QoS when handling complex tasks. 展开更多
关键词 mobile edge computing Task offloading QoS Deep reinforcement learning Federated learning
下载PDF
Dynamic Task Offloading for Digital Twin-Empowered Mobile Edge Computing via Deep Reinforcement Learning 被引量:2
18
作者 Ying Chen Wei Gu +2 位作者 Jiajie Xu Yongchao Zhang Geyong Min 《China Communications》 SCIE CSCD 2023年第11期164-175,共12页
Limited by battery and computing re-sources,the computing-intensive tasks generated by Internet of Things(IoT)devices cannot be processed all by themselves.Mobile edge computing(MEC)is a suitable solution for this pro... Limited by battery and computing re-sources,the computing-intensive tasks generated by Internet of Things(IoT)devices cannot be processed all by themselves.Mobile edge computing(MEC)is a suitable solution for this problem,and the gener-ated tasks can be offloaded from IoT devices to MEC.In this paper,we study the problem of dynamic task offloading for digital twin-empowered MEC.Digital twin techniques are applied to provide information of environment and share the training data of agent de-ployed on IoT devices.We formulate the task offload-ing problem with the goal of maximizing the energy efficiency and the workload balance among the ESs.Then,we reformulate the problem as an MDP problem and design DRL-based energy efficient task offloading(DEETO)algorithm to solve it.Comparative experi-ments are carried out which show the superiority of our DEETO algorithm in improving energy efficiency and balancing the workload. 展开更多
关键词 deep reinforcement learning digital twin Internet of Things mobile edge computing
下载PDF
Adaptive delay-energy balanced partial offloading strategy in Mobile Edge Computing networks 被引量:1
19
作者 Shumei Liu Yao Yu +3 位作者 Lei Guo Phee Lep Yeoh Branka Vucetic Yonghui Li 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1310-1318,共9页
Mobile Edge Computing(MEC)-based computation offloading is a promising application paradigm for serving large numbers of users with various delay and energy requirements.In this paper,we propose a flexible MECbased re... Mobile Edge Computing(MEC)-based computation offloading is a promising application paradigm for serving large numbers of users with various delay and energy requirements.In this paper,we propose a flexible MECbased requirement-adaptive partial offloading model to accommodate each user's specific preference regarding delay and energy consumption.To address the dimensional differences between time and energy,we introduce two normalized parameters and then derive the computational overhead of processing tasks.Different from existing works,this paper considers practical variations in the user request patterns,and exploits a flexible partial offloading mode to minimize computation overheads subject to tolerable delay,task workload and power constraints.Since the resulting problem is non-convex,we decouple it into two convex subproblems and present an iterative algorithm to obtain a feasible offloading solution.Numerical experiments show that our proposed scheme achieves a significant improvement in computation overheads compared with existing schemes. 展开更多
关键词 mobile edge computing(MEC) DELAY Energy consumption Dynamic balance Partial computation offloading
下载PDF
Multi-Objective Optimization for NOMA-Based Mobile Edge Computing Offloading by Maximizing System Utility 被引量:1
20
作者 Hong Qin Haitao Du +2 位作者 Huahua Wang Li Su Yunfeng Peng 《China Communications》 SCIE CSCD 2023年第12期156-165,共10页
Mobile Edge Computing(MEC)is a technology for the fifth-generation(5G)wireless communications to enable User Equipment(UE)to offload tasks to servers deployed at the edge of network.However,taking both delay and energ... Mobile Edge Computing(MEC)is a technology for the fifth-generation(5G)wireless communications to enable User Equipment(UE)to offload tasks to servers deployed at the edge of network.However,taking both delay and energy consumption into consideration in the 5G MEC system is usually complex and contradictory.Non-orthogonal multiple access(NOMA)enable more UEs to offload their computing tasks to MEC servers using the same spectrum resources to enhance the spectrum efficiency for 5G,which makes the problem even more complex in the NOMA-MEC system.In this work,a system utility maximization model is present to NOMA-MEC system,and two optimization algorithms based on Newton method and greedy algorithm respectively are proposed to jointly optimize the computing resource allocation,SIC order,transmission time slot allocation,which can easily achieve a better trade-off between the delay and energy consumption.The simulation results prove that the proposed method is effective for NOMA-MEC systems. 展开更多
关键词 computation offloading mobile edge computing non-orthogonal multiple access resource allocation
下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部