CN113626107A - Mobile computing unloading method, system and storage medium - Google Patents

Mobile computing unloading method, system and storage medium Download PDF

Info

Publication number
CN113626107A
CN113626107A CN202110960298.0A CN202110960298A CN113626107A CN 113626107 A CN113626107 A CN 113626107A CN 202110960298 A CN202110960298 A CN 202110960298A CN 113626107 A CN113626107 A CN 113626107A
Authority
CN
China
Prior art keywords
model
computing
iot device
edge server
energy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110960298.0A
Other languages
Chinese (zh)
Other versions
CN113626107B (en
Inventor
邓晓衡
李宇威
唐浩文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University
Original Assignee
Central South University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University filed Critical Central South University
Priority to CN202110960298.0A priority Critical patent/CN113626107B/en
Publication of CN113626107A publication Critical patent/CN113626107A/en
Application granted granted Critical
Publication of CN113626107B publication Critical patent/CN113626107B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44594Unloading
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the disclosure provides a mobile computing unloading method, a system and a storage medium, which belong to the technical field of data processing, and specifically comprise the following steps: when a target time slice starts, collecting real-time information of an edge server and each piece of health-care Internet of things equipment; constructing a local calculation model, an edge calculation model, an energy collection model and a privacy entropy model according to the real-time information of the edge server and the real-time information of each piece of Internet of things equipment; constructing a target function according to the local calculation model, the edge calculation model, the energy collection model and the privacy entropy model; and maximizing an objective function and solving a task unloading strategy in an objective time slice. According to the scheme, the real-time information of the Internet of things equipment and the edge server is collected, the calculation model, the energy collection model and the privacy entropy model are established, the target optimization function is obtained, the unloading decision vector can be finally obtained through solving, and the adaptability of wireless energy supply and the privacy protection strength are improved.

Description

移动计算卸载方法、系统及存储介质Mobile computing offloading method, system and storage medium

技术领域technical field

本公开实施例涉及数据处理技术领域,尤其涉及一种移动计算卸载方法、系统及存储介质。The embodiments of the present disclosure relate to the technical field of data processing, and in particular, to a mobile computing offloading method, system, and storage medium.

背景技术Background technique

目前,随着信息化进程的加快,在某些特定场景中需要对人员的状态信息进行实时监测和跟踪,为了更好地满足移动计算的需求,移动边缘计算成为了移动云计算支持的移动体系的有效补充和完善。然而,传统的移动云计算方式依赖于硬件的电力供给,且物联网设备的卸载策略与无线信道功率增益高度相关,只要物联网设备和边缘服务器之间的无线信道条件良好,设备就会将尽可能多的计算任务卸载给服务器,从而导致用户的隐私容易泄露。At present, with the acceleration of the informatization process, it is necessary to monitor and track the status information of personnel in real time in some specific scenarios. In order to better meet the needs of mobile computing, mobile edge computing has become a mobile system supported by mobile cloud computing. effective supplement and improvement. However, the traditional mobile cloud computing method relies on the power supply of hardware, and the offloading strategy of IoT devices is highly related to the wireless channel power gain. As long as the wireless channel conditions between IoT devices and edge servers are good, the devices will be exhausted It is possible that many computing tasks are offloaded to the server, resulting in easy leakage of user privacy.

可见,亟需一种适应性和安全性强的移动计算卸载方法。It can be seen that there is an urgent need for a mobile computing offloading method with strong adaptability and security.

发明内容SUMMARY OF THE INVENTION

有鉴于此,本公开实施例提供一种移动计算卸载方法、系统及存储介质,至少部分解决现有技术中存在适应性和安全性较差的问题。In view of this, embodiments of the present disclosure provide a mobile computing offloading method, system, and storage medium, which at least partially solve the problems of poor adaptability and security in the prior art.

第一方面,本公开实施例提供了一种移动计算卸载方法,包括:In a first aspect, an embodiment of the present disclosure provides a method for uninstalling mobile computing, including:

在目标时间片开始时,收集边缘服务器和每个保健物联网设备的实时信息,其中,所述边缘服务器的实时信息包括每个所述物联网设备与所述边缘服务器之间的无线信道功率增益,所述物联网设备的实时信息包括所述物联网设备产生的计算任务大小和所述物联网设备从射频能量源接收到的无线能量;At the beginning of the target time slice, real-time information of the edge server and each healthcare IoT device is collected, wherein the real-time information of the edge server includes the wireless channel power gain between each of the IoT devices and the edge server , the real-time information of the IoT device includes the size of the computing task generated by the IoT device and the wireless energy received by the IoT device from the radio frequency energy source;

根据所述边缘服务器的实时信息和每个所述物联网设备的实时信息构建本地计算模型、边缘计算模型、能量收集模型和隐私熵模型;Build a local computing model, an edge computing model, an energy harvesting model and a privacy entropy model according to the real-time information of the edge server and the real-time information of each of the IoT devices;

根据所述本地计算模型、所述边缘计算模型、所述能量收集模型和所述隐私熵模型,构建目标函数;constructing an objective function according to the local computing model, the edge computing model, the energy harvesting model and the privacy entropy model;

最大化所述目标函数,求解所述目标时间片内的任务卸载策略。Maximize the objective function, and solve the task offloading policy in the target time slice.

根据本公开实施例的一种具体实现方式,所述无线信道功率增益遵循具有状态集和转移概率的马尔可夫模型。According to a specific implementation of the embodiment of the present disclosure, the wireless channel power gain follows a Markov model with a state set and transition probability.

根据本公开实施例的一种具体实现方式,所述本地计算模型为

Figure BDA0003222041500000021
其中,
Figure BDA0003222041500000022
表示物联网设备i的本地计算能力,k为取决于芯片架构的有效开关电容,Di(t)为所述物联网设备从射频能量源接收到的无线能量,ai(t)表示所述物联网设备i在所述目标时间片t的任务卸载策略,ci表示计算1bit任务所需要的计算资源。According to a specific implementation of the embodiment of the present disclosure, the local computing model is
Figure BDA0003222041500000021
in,
Figure BDA0003222041500000022
represents the local computing capability of the IoT device i, k is the effective switched capacitor depending on the chip architecture, D i (t) is the wireless energy received by the IoT device from the RF energy source, and a i (t) represents the The task offloading strategy of the IoT device i in the target time slice t, and c i represents the computing resources required for computing a 1-bit task.

根据本公开实施例的一种具体实现方式,所述边缘计算模型为

Figure BDA0003222041500000023
其中,
Figure BDA0003222041500000024
表示物联网设备i在t时间片生成的任务在本地处理的时间延迟,
Figure BDA0003222041500000025
表示传输时延,
Figure BDA0003222041500000026
表示边缘服务器计算时延,
Figure BDA0003222041500000027
表示物联网设备相应的传输能耗,
Figure BDA0003222041500000028
表示物联网设备i相应的空闲能耗。According to a specific implementation manner of the embodiment of the present disclosure, the edge computing model is
Figure BDA0003222041500000023
in,
Figure BDA0003222041500000024
represents the time delay of local processing of tasks generated by IoT device i in time slice t,
Figure BDA0003222041500000025
represents the transmission delay,
Figure BDA0003222041500000026
represents the computing delay of the edge server,
Figure BDA0003222041500000027
Represents the corresponding transmission energy consumption of IoT devices,
Figure BDA0003222041500000028
Indicates the corresponding idle energy consumption of IoT device i.

根据本公开实施例的一种具体实现方式,所述能量收集模型为

Figure BDA0003222041500000029
其中,v为能量转换效率,
Figure BDA00032220415000000210
为传输的能量强度,
Figure BDA00032220415000000211
路劲损坏指数,G表示射频能量发射器天线和物联网设备天线的组合增益,di(t)为物联网设备i与射频能量发射器的距离。According to a specific implementation of the embodiment of the present disclosure, the energy collection model is
Figure BDA0003222041500000029
where v is the energy conversion efficiency,
Figure BDA00032220415000000210
is the transmitted energy intensity,
Figure BDA00032220415000000211
Road strength damage index, G represents the combined gain of the RF energy transmitter antenna and the IoT device antenna, and d i (t) is the distance between the IoT device i and the RF energy transmitter.

根据本公开实施例的一种具体实现方式,所述隐私熵模型中熵值公式为According to a specific implementation manner of the embodiment of the present disclosure, the entropy value formula in the privacy entropy model is:

Figure BDA0003222041500000031
Figure BDA0003222041500000031

其中,

Figure BDA0003222041500000032
in,
Figure BDA0003222041500000032

根据本公开实施例的一种具体实现方式,所述目标函数为According to a specific implementation manner of the embodiment of the present disclosure, the objective function is

Figure BDA0003222041500000033
Figure BDA0003222041500000033

Figure BDA0003222041500000034
Figure BDA0003222041500000034

Figure BDA0003222041500000035
Figure BDA0003222041500000035

其中,

Figure BDA0003222041500000036
Figure BDA0003222041500000037
表示每个所述物联网设备在每个时刻的电池容量都不超过它们的最大值
Figure BDA0003222041500000038
表示边缘服务器分配给所述物联网设备的计算资源的总和不超过所述边缘服务器的计算资源Fedg
Figure BDA0003222041500000039
表示所述物联网设备的卸载策略。in,
Figure BDA0003222041500000036
Figure BDA0003222041500000037
Indicates that the battery capacity of each of said IoT devices does not exceed their maximum value at any time
Figure BDA0003222041500000038
indicates that the sum of the computing resources allocated by the edge server to the IoT device does not exceed the computing resource F edg of the edge server,
Figure BDA0003222041500000039
Represents an uninstall policy for the IoT device.

根据本公开实施例的一种具体实现方式,所述最大化所述目标函数,求解所述目标时间片内的任务卸载策略的步骤,包括:According to a specific implementation manner of the embodiment of the present disclosure, the step of maximizing the objective function to solve the task offloading strategy in the target time slice includes:

利用深度强化学习方法对所述目标函数进行求解,获得所述目标时间片内的卸载决策向量;Use the deep reinforcement learning method to solve the objective function, and obtain the unloading decision vector in the target time slice;

根据所述卸载决策向量生成所述任务卸载策略。The task offloading policy is generated according to the offloading decision vector.

第二方面,本公开实施例还提供了一种移动计算卸载系统,应用于如上述公开实施例所述的移动计算卸载方法,所述移动计算卸载系统包括:In a second aspect, an embodiment of the present disclosure further provides a mobile computing uninstallation system, which is applied to the mobile computing uninstallation method according to the above disclosed embodiments. The mobile computing uninstallation system includes:

边缘服务器;edge server;

多个所述物联网设备,全部所述物联网设备均与所述边缘服务器通讯连接。A plurality of the IoT devices, all of which are connected in communication with the edge server.

第三方面,本公开实施例还提供了一种非暂态计算机可读存储介质,该非暂态计算机可读存储介质存储计算机指令,该计算机指令用于使该计算机执行前述第一方面或第一方面的任一实现方式中的移动计算卸载方法。In a third aspect, embodiments of the present disclosure further provide a non-transitory computer-readable storage medium, where the non-transitory computer-readable storage medium stores computer instructions, and the computer instructions are used to cause the computer to execute the foregoing first aspect or the first The mobile computing offloading method of any one of the implementations of an aspect.

第四方面,本公开实施例还提供了一种计算机程序产品,该计算机程序产品包括存储在非暂态计算机可读存储介质上的计算程序,该计算机程序包括程序指令,当该程序指令被计算机执行时,使该计算机执行前述第一方面或第一方面的任一实现方式中的移动计算卸载方法。In a fourth aspect, an embodiment of the present disclosure further provides a computer program product, the computer program product includes a computer program stored on a non-transitory computer-readable storage medium, the computer program includes program instructions, and when the program instructions are executed by a computer When executed, the computer is caused to execute the mobile computing offloading method in the foregoing first aspect or any implementation manner of the first aspect.

本公开实施例中的移动计算卸载方案,包括:在目标时间片开始时,收集边缘服务器和每个保健物联网设备的实时信息,其中,所述边缘服务器的实时信息包括每个所述物联网设备与所述边缘服务器之间的无线信道功率增益,所述物联网设备的实时信息包括所述物联网设备产生的计算任务大小和所述物联网设备从射频能量源接收到的无线能量;根据所述边缘服务器的实时信息和每个所述物联网设备的实时信息构建本地计算模型、边缘计算模型、能量收集模型和隐私熵模型;根据所述本地计算模型、所述边缘计算模型、所述能量收集模型和所述隐私熵模型,构建目标函数;最大化所述目标函数,求解所述目标时间片内的任务卸载策略。The mobile computing offloading solution in the embodiment of the present disclosure includes: at the beginning of a target time slice, collecting real-time information of an edge server and each healthcare IoT device, wherein the real-time information of the edge server includes each IoT device The wireless channel power gain between the device and the edge server, the real-time information of the IoT device includes the computing task size generated by the IoT device and the wireless energy received by the IoT device from the radio frequency energy source; according to The real-time information of the edge server and the real-time information of each of the IoT devices construct a local computing model, an edge computing model, an energy harvesting model and a privacy entropy model; according to the local computing model, the edge computing model, the The energy harvesting model and the privacy entropy model are used to construct an objective function; the objective function is maximized to solve the task offloading policy in the target time slice.

本公开实施例的有益效果为:通过本公开的方案,收集物联网设备以及边缘服务器的实时信息,建立计算模型、能量收集模型和隐私熵模型,得到目标优化函数,最终可以求解得到卸载决策向量,提高了无线能量供应的适应性和对隐私的保护强度。The beneficial effects of the embodiments of the present disclosure are: through the solution of the present disclosure, real-time information of IoT devices and edge servers is collected, a calculation model, an energy collection model and a privacy entropy model are established, an objective optimization function is obtained, and finally an unloading decision vector can be obtained by solving , which improves the adaptability of wireless energy supply and the strength of privacy protection.

附图说明Description of drawings

为了更清楚地说明本公开实施例的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本公开的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。In order to explain the technical solutions of the embodiments of the present disclosure more clearly, the following briefly introduces the accompanying drawings that need to be used in the embodiments. Obviously, the accompanying drawings in the following description are only some embodiments of the present disclosure. For those of ordinary skill in the art, other drawings can also be obtained from these drawings without any creative effort.

图1为本公开实施例提供的一种移动计算卸载方法的流程示意图;FIG. 1 is a schematic flowchart of a method for uninstalling mobile computing according to an embodiment of the present disclosure;

图2为本公开实施例提供的一种移动计算卸载方法的部分流程示意图;FIG. 2 is a schematic partial flowchart of a method for offloading mobile computing according to an embodiment of the present disclosure;

图3为本公开实施例提供的一种移动计算卸载系统的结构示意图。FIG. 3 is a schematic structural diagram of a mobile computing offloading system according to an embodiment of the present disclosure.

具体实施方式Detailed ways

下面结合附图对本公开实施例进行详细描述。The embodiments of the present disclosure will be described in detail below with reference to the accompanying drawings.

以下通过特定的具体实例说明本公开的实施方式,本领域技术人员可由本说明书所揭露的内容轻易地了解本公开的其他优点与功效。显然,所描述的实施例仅仅是本公开一部分实施例,而不是全部的实施例。本公开还可以通过另外不同的具体实施方式加以实施或应用,本说明书中的各项细节也可以基于不同观点与应用,在没有背离本公开的精神下进行各种修饰或改变。需说明的是,在不冲突的情况下,以下实施例及实施例中的特征可以相互组合。基于本公开中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。The embodiments of the present disclosure are described below through specific specific examples, and those skilled in the art can easily understand other advantages and effects of the present disclosure from the contents disclosed in this specification. Obviously, the described embodiments are only some, but not all, embodiments of the present disclosure. The present disclosure can also be implemented or applied through other different specific embodiments, and various details in this specification can also be modified or changed based on different viewpoints and applications without departing from the spirit of the present disclosure. It should be noted that the following embodiments and features in the embodiments may be combined with each other under the condition of no conflict. Based on the embodiments in the present disclosure, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present disclosure.

需要说明的是,下文描述在所附权利要求书的范围内的实施例的各种方面。应显而易见,本文中所描述的方面可体现于广泛多种形式中,且本文中所描述的任何特定结构及/或功能仅为说明性的。基于本公开,所属领域的技术人员应了解,本文中所描述的一个方面可与任何其它方面独立地实施,且可以各种方式组合这些方面中的两者或两者以上。举例来说,可使用本文中所阐述的任何数目个方面来实施设备及/或实践方法。另外,可使用除了本文中所阐述的方面中的一或多者之外的其它结构及/或功能性实施此设备及/或实践此方法。It is noted that various aspects of embodiments within the scope of the appended claims are described below. It should be apparent that the aspects described herein may be embodied in a wide variety of forms and that any specific structure and/or function described herein is illustrative only. Based on this disclosure, those skilled in the art should appreciate that an aspect described herein may be implemented independently of any other aspects and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented and/or a method may be practiced using any number of the aspects set forth herein. Additionally, such an apparatus may be implemented and/or such a method may be practiced using other structure and/or functionality in addition to one or more of the aspects set forth herein.

还需要说明的是,以下实施例中所提供的图示仅以示意方式说明本公开的基本构想,图式中仅显示与本公开中有关的组件而非按照实际实施时的组件数目、形状及尺寸绘制,其实际实施时各组件的型态、数量及比例可为一种随意的改变,且其组件布局型态也可能更为复杂。It should also be noted that the drawings provided in the following embodiments are only illustrative of the basic concept of the present disclosure, and the drawings only show the components related to the present disclosure rather than the number, shape and the number of components in actual implementation. For dimension drawing, the type, quantity and proportion of each component can be changed at will in actual implementation, and the component layout may also be more complicated.

另外,在以下描述中,提供具体细节是为了便于透彻理解实例。然而,所属领域的技术人员将理解,可在没有这些特定细节的情况下实践所述方面。Additionally, in the following description, specific details are provided to facilitate a thorough understanding of the examples. However, one skilled in the art will understand that the described aspects may be practiced without these specific details.

目前,随着信息化进程的加快,在某些特定场景中需要对人员的状态信息进行实时监测和跟踪,为了更好地满足移动计算的需求,移动边缘计算成为了移动云计算支持的移动体系的有效补充和完善。然而,传统的移动云计算方式依赖于硬件的电力供给,这些物联网设备将被植入用户体内或佩戴在用户的身体表面,这使得通过有线充电的方式给它们充电变得不切实际。因此,绿色能量收集技术被认为是一种有前途的技术,它可以延长物联网设备的电池寿命,并为用户提供更高的服务质量体验。但是,从自然环境中获取的绿色能量在很大程度上取决于相应能源的稳定性。绿色能量收集技术很难保证能源供应的质量和可靠性,这对需要实时监测和分析数据的数据管理系统有很大影响。At present, with the acceleration of the informatization process, it is necessary to monitor and track the status information of personnel in real time in some specific scenarios. In order to better meet the needs of mobile computing, mobile edge computing has become a mobile system supported by mobile cloud computing. effective supplement and improvement. However, traditional mobile cloud computing methods rely on the power supply of hardware, and these IoT devices will be implanted in the user's body or worn on the user's body surface, which makes it impractical to charge them through wired charging. Therefore, green energy harvesting technology is considered as a promising technology that can extend the battery life of IoT devices and provide users with a higher quality of service experience. However, the green energy obtained from the natural environment largely depends on the stability of the corresponding energy source. It is difficult for green energy harvesting technologies to guarantee the quality and reliability of energy supply, which has a great impact on data management systems that require real-time monitoring and analysis of data.

且物联网设备的卸载策略与无线信道功率增益高度相关,只要物联网设备和边缘服务器之间的无线信道条件良好,设备就会将尽可能多的计算任务卸载给服务器,无线信道功率增益与物联网设备和边缘服务器之间的距离高度相关。因此,攻击者可以通过监视诚实但好奇的边缘服务器接收的卸载任务的大小来推断无线信道信息,以揭示用户的位置隐私,从而导致用户的隐私容易泄露。And the offloading strategy of IoT devices is highly related to the wireless channel power gain. As long as the wireless channel conditions between the IoT device and the edge server are good, the device will offload as many computing tasks as possible to the server, and the wireless channel power gain is related to the IoT device. The distance between networked devices and edge servers is highly correlated. Therefore, attackers can infer wireless channel information by monitoring the size of offloading tasks received by honest but curious edge servers to reveal users' location privacy, which leads to easy leakage of users' privacy.

本公开实施例提供一种移动计算卸载方法,所述方法可以应用于医疗系统场景的用户健康状态监测过程中。Embodiments of the present disclosure provide a mobile computing offloading method, which can be applied to a process of monitoring a user's health state in a medical system scenario.

参见图1,为本公开实施例提供的一种移动计算卸载方法的流程示意图。如图1所示,所述方法主要包括以下步骤:Referring to FIG. 1 , it is a schematic flowchart of a method for offloading mobile computing according to an embodiment of the present disclosure. As shown in Figure 1, the method mainly includes the following steps:

S101,在目标时间片开始时,收集边缘服务器和每个保健物联网设备的实时信息,其中,所述边缘服务器的实时信息包括每个所述物联网设备与所述边缘服务器之间的无线信道功率增益,所述物联网设备的实时信息包括所述物联网设备产生的计算任务大小和所述物联网设备从射频能量源接收到的无线能量;S101, at the beginning of a target time slice, collect real-time information of an edge server and each healthcare IoT device, wherein the real-time information of the edge server includes a wireless channel between each IoT device and the edge server Power gain, the real-time information of the IoT device includes the size of the computing task generated by the IoT device and the wireless energy received by the IoT device from the radio frequency energy source;

具体实施时,当每个程序运行时,会为该程序分配对应的运行时段,将运行时段作为所述目标时间片,然后在所述目标时间片开始的时刻,收集所述边缘服务器和每个所述保健物联网设备的运行状态,例如,分析每个所述物联网设备与所述边缘服务器之间的无线信道功率增益,以形成所述边缘服务器的实时信息,分析所述物联网设备产生的计算任务大小和所述物联网设备从射频能量源接收到的无线能量,以形成所述物联网设备的实时信息。In specific implementation, when each program runs, a corresponding running period will be allocated to the program, and the running period will be used as the target time slice, and then at the beginning of the target time slice, the edge server and each The operating status of the health care IoT devices, for example, analyzing the wireless channel power gain between each of the IoT devices and the edge server to form real-time information of the edge server, analyzing the The size of the computing task and the wireless energy received by the IoT device from the radio frequency energy source to form the real-time information of the IoT device.

可选的,所述无线信道功率增益遵循具有状态集和转移概率的马尔可夫模型。Optionally, the wireless channel power gain follows a Markov model with state sets and transition probabilities.

例如,在所述目标时间片t开始时,获得所述边缘服务器和所述物联网设备i之间的无线信道增益hi(t),我们假设物联网设备和边缘服务之间的无线信道增益h遵循具有状态集

Figure BDA0003222041500000071
和转移概率
Figure BDA0003222041500000072
的马尔可夫模型,其中,
Figure BDA0003222041500000073
同时,在所述目标时间片t开始时,获得物联网设备i产生的计算任务Zi(t)=(Di(t),ci),其中,Di(t)表示在所述目标时间片t到达物联网设备i的计算任务数据量大小,ci表示计算1bit任务所需要的计算资源。以及,在所述目标时间片t开始时,获得物联网设备i从射频能量源中接收到的无线能量bi(t)。For example, at the beginning of the target time slice t, obtain the wireless channel gain h i (t) between the edge server and the IoT device i, we assume that the wireless channel gain between the IoT device and the edge service h follows a state set with
Figure BDA0003222041500000071
and transition probability
Figure BDA0003222041500000072
The Markov model of , where,
Figure BDA0003222041500000073
At the same time, at the beginning of the target time slice t, the computing task Z i (t)=(D i (t), c i ) generated by the IoT device i is obtained, where D i (t) represents the Time slice t is the size of the computing task data that reaches the IoT device i , and ci represents the computing resources required to calculate a 1-bit task. And, at the beginning of the target time slice t, the wireless energy b i (t) received by the IoT device i from the radio frequency energy source is obtained.

S102,根据所述边缘服务器的实时信息和每个所述物联网设备的实时信息构建本地计算模型、边缘计算模型、能量收集模型和隐私熵模型;S102, constructing a local computing model, an edge computing model, an energy harvesting model and a privacy entropy model according to the real-time information of the edge server and the real-time information of each of the IoT devices;

具体的,在获取到所述边缘服务器的实时信息和每个所述物联网设备的实时信息后,可以根据所述边缘服务器的实时信息和每个所述物联网设备的实时信息构建本地计算模型、边缘计算模型、能量收集模型和隐私熵模型,其中,所述本地计算模型可以用于计算所述物联网设备在本地计算任务的相应能耗,所述边缘计算模型可以计算所述边缘服务器和全部所述物联网设备的总执行延迟和总能量消耗,所述能量收集模型可以用于计算每个所述物联网设备在时隙中获取的无线能量,从而可以得到转化供所述物联网设备使用的电能能量的多少,以及,所述隐私熵模型可以用于计算每个所述物联网设备上的计算任务的混乱程度,从而可以对所述隐私熵模型进行定义和调整以达到对用户信息的加密。Specifically, after acquiring the real-time information of the edge server and the real-time information of each IoT device, a local computing model can be constructed according to the real-time information of the edge server and the real-time information of each IoT device , edge computing model, energy harvesting model and privacy entropy model, wherein, the local computing model can be used to calculate the corresponding energy consumption of the local computing task of the IoT device, and the edge computing model can calculate the edge server and The total execution delay and total energy consumption of all the IoT devices, the energy harvesting model can be used to calculate the wireless energy acquired by each IoT device in the time slot, so that it can be converted for the IoT device The amount of electrical energy used, and the privacy entropy model can be used to calculate the degree of confusion of computing tasks on each of the Internet of Things devices, so that the privacy entropy model can be defined and adjusted to achieve user information. encryption.

S103,根据所述本地计算模型、所述边缘计算模型、所述能量收集模型和所述隐私熵模型,构建目标函数;S103, constructing an objective function according to the local computing model, the edge computing model, the energy harvesting model and the privacy entropy model;

具体实施时,所述本地计算模型、所述边缘计算模型、所述能量收集模型和所述隐私熵模型存在对于的表达式,可以将所述本地计算模型、所述边缘计算模型、所述能量收集模型和所述隐私熵模型的表达式进行联立,构建所述目标函数。During specific implementation, the local computing model, the edge computing model, the energy collection model and the privacy entropy model have expressions corresponding to each other, and the local computing model, the edge computing model, the energy The expression of the collection model and the privacy entropy model is combined to construct the objective function.

具体的,所述目标函数为Specifically, the objective function is

Figure BDA0003222041500000081
Figure BDA0003222041500000081

Figure BDA0003222041500000082
Figure BDA0003222041500000082

Figure BDA0003222041500000083
Figure BDA0003222041500000083

其中,

Figure BDA0003222041500000084
Figure BDA0003222041500000085
表示每个所述物联网设备在每个时刻的电池容量都不超过它们的最大值
Figure BDA0003222041500000086
表示边缘服务器分配给所述物联网设备的计算资源的总和不超过所述边缘服务器的计算资源Fedg
Figure BDA0003222041500000087
表示所述物联网设备的卸载策略。in,
Figure BDA0003222041500000084
Figure BDA0003222041500000085
Indicates that the battery capacity of each of said IoT devices does not exceed their maximum value at any time
Figure BDA0003222041500000086
indicates that the sum of the computing resources allocated by the edge server to the IoT device does not exceed the computing resource F edg of the edge server,
Figure BDA0003222041500000087
Represents an uninstall policy for the IoT device.

S104,最大化所述目标函数,求解所述目标时间片内的任务卸载策略。S104: Maximize the objective function, and solve the task unloading strategy in the target time slice.

具体实施时,在得到所述目标函数时,可以将所述目标函数最大化求解,从而得到所述目标时间片内的任务卸载策略,根据所述任务卸载策略对每个所述物联网设备进行计算卸载,以提高设备的使用寿命和客户信息的加密保护。During specific implementation, when the objective function is obtained, the objective function can be maximized and solved, so as to obtain a task offloading strategy in the target time slice, and each IoT device is subjected to the task offloading strategy according to the task offloading strategy. Computational offload to improve device lifespan and encryption protection of customer information.

本实施例提供的移动计算卸载方法,通过物联网设备以及边缘服务器的实时信息,建立计算模型、能量收集模型和隐私熵模型,得到目标优化函数,最终可以求解得到卸载决策向量。In the mobile computing offloading method provided in this embodiment, a computing model, an energy harvesting model and a privacy entropy model are established by using the real-time information of the Internet of Things devices and edge servers to obtain an objective optimization function, and finally an offloading decision vector can be obtained by solving.

在上述实施例的基础上,所述本地计算模型为On the basis of the above embodiment, the local computing model is

Figure BDA0003222041500000088
其中,
Figure BDA0003222041500000089
表示物联网设备i的本地计算能力,k为取决于芯片架构的有效开关电容,Di(t)为所述物联网设备从射频能量源接收到的无线能量,ai(t)表示所述物联网设备i在所述目标时间片t的任务卸载策略,ci表示计算1bit任务所需要的计算资源。
Figure BDA0003222041500000088
in,
Figure BDA0003222041500000089
represents the local computing capability of the IoT device i, k is the effective switched capacitor depending on the chip architecture, D i (t) is the wireless energy received by the IoT device from the RF energy source, and a i (t) represents the The task offloading strategy of the IoT device i in the target time slice t, and c i represents the computing resources required for computing a 1-bit task.

具体实施时,所述物联网设备自身具有一定的计算能力,计算任务可以在所述物联网设备本地进行处理。任务在本地计算过程的处理时间只考虑计算时间,不考虑传输时间。因此所述物联网设备i在所述目标时间片t生成的任务在本地处理的时间延迟为:

Figure BDA0003222041500000091
During specific implementation, the IoT device itself has a certain computing capability, and computing tasks can be processed locally on the IoT device. The processing time of the task in the local calculation process only considers the calculation time, not the transmission time. Therefore, the local processing time delay of the task generated by the IoT device i in the target time slice t is:
Figure BDA0003222041500000091

其中,

Figure BDA0003222041500000092
表示物联网设备i的本地计算能力,ai(t)表示设备i在所述目标时间片t的任务卸载策略。in,
Figure BDA0003222041500000092
represents the local computing capability of the IoT device i, and a i (t) represents the task offloading strategy of the device i in the target time slice t.

那么,物联网设备i在本地计算任务的相应能耗即所述本地计算模型可以计算为:Then, the corresponding energy consumption of the local computing task of the IoT device i, that is, the local computing model can be calculated as:

Figure BDA0003222041500000093
Figure BDA0003222041500000093

其中,每个计算周期的能耗定义为ε=kf2,k是取决于芯片架构的有效开关电容。where the energy consumption per computing cycle is defined as ε=kf 2 , where k is the effective switched capacitance depending on the chip architecture.

可选的,所述边缘计算模型为Optionally, the edge computing model is

Figure BDA0003222041500000094
其中,
Figure BDA0003222041500000095
表示物联网设备i在t时间片生成的任务在本地处理的时间延迟,
Figure BDA0003222041500000096
表示传输时延,
Figure BDA0003222041500000097
表示边缘服务器计算时延,
Figure BDA0003222041500000098
表示物联网设备相应的传输能耗,
Figure BDA0003222041500000099
表示物联网设备i相应的空闲能耗。
Figure BDA0003222041500000094
in,
Figure BDA0003222041500000095
represents the time delay of local processing of tasks generated by IoT device i in time slice t,
Figure BDA0003222041500000096
represents the transmission delay,
Figure BDA0003222041500000097
represents the computing delay of the edge server,
Figure BDA0003222041500000098
Represents the corresponding transmission energy consumption of IoT devices,
Figure BDA0003222041500000099
Indicates the corresponding idle energy consumption of IoT device i.

具体实施时,考虑到物联网设备计算资源的不足,计算任务无法全部在所述本地计算模型上进行处理,有部分任务需要卸载到边缘计算模型上进行处理。任务卸载到边缘服务器上的处理时间包括本地任务的上传传输时间和边缘服务器的计算时间,由于任务返回结果的数据量很小,因此任务结果的下载传输时间不进行考虑。所述物联网设备i在时间片t产生的任务卸载到所述边缘服务器上处理的时间延迟定义为:

Figure BDA0003222041500000101
其中,传输时延可计算为:
Figure BDA0003222041500000102
物联网设备相应的传输能耗可计算为:
Figure BDA0003222041500000103
其中,pi为物联网设备i的传输功率。During specific implementation, considering the lack of computing resources of IoT devices, all computing tasks cannot be processed on the local computing model, and some tasks need to be offloaded to the edge computing model for processing. The processing time of the task offloading to the edge server includes the upload and transmission time of the local task and the computing time of the edge server. Since the amount of data returned by the task is small, the download and transmission time of the task result is not considered. The time delay of offloading the tasks generated by the IoT device i in the time slice t to the edge server for processing is defined as:
Figure BDA0003222041500000101
Among them, the transmission delay can be calculated as:
Figure BDA0003222041500000102
The corresponding transmission energy consumption of IoT devices can be calculated as:
Figure BDA0003222041500000103
Among them, pi is the transmission power of the IoT device i .

同时,所述边缘服务器计算时延可计算为:

Figure BDA0003222041500000104
其中,
Figure BDA0003222041500000105
为所述目标时间片t内所述边缘服务器分配给所述物联网设备i的计算资源,并且
Figure BDA0003222041500000106
Fedg为所述边缘服务器总的计算资源。Meanwhile, the computing delay of the edge server can be calculated as:
Figure BDA0003222041500000104
in,
Figure BDA0003222041500000105
the computing resources allocated to the IoT device i by the edge server within the target time slice t, and
Figure BDA0003222041500000106
F edg is the total computing resources of the edge server.

所述物联网设备i相应的空闲能耗可计算为:

Figure BDA0003222041500000107
其中,
Figure BDA0003222041500000108
为所述物联网设备i的空闲功率。The corresponding idle energy consumption of the IoT device i can be calculated as:
Figure BDA0003222041500000107
in,
Figure BDA0003222041500000108
is the idle power of the IoT device i.

然后综合本地计算和卸载计算,可以把系统的总执行延迟和总能量消耗即所述边缘计算模型用以下公式表示:Then, by combining local computing and offloading computing, the total execution delay and total energy consumption of the system, that is, the edge computing model, can be expressed by the following formula:

Figure BDA0003222041500000109
Figure BDA0003222041500000109

进一步的,所述能量收集模型为

Figure BDA00032220415000001010
其中,v为能量转换效率,ρ为传输的能量强度,
Figure BDA00032220415000001011
路劲损坏指数,G表示射频能量发射器天线和物联网设备天线的组合增益,di(t)为物联网设备i与射频能量发射器的距离。Further, the energy harvesting model is
Figure BDA00032220415000001010
where v is the energy conversion efficiency, ρ is the transmitted energy intensity,
Figure BDA00032220415000001011
Road strength damage index, G represents the combined gain of the RF energy transmitter antenna and the IoT device antenna, and d i (t) is the distance between the IoT device i and the RF energy transmitter.

具体实施时,通过配备射频能量采集器,所述物联网设备可以从专用的射频能量源中收集射频信号,并将其转换为电能存储到电池中,每一个能量采集模块的充电和放电过程都是可以同时进行的。射频能量收集过程被建模为连续的能量包到达,而且不同时间片的能量到达服从独立同分布。可以通过所述能量收集模型计算所述目标时间片内能收集的电能。In specific implementation, by being equipped with a radio frequency energy harvester, the IoT device can collect radio frequency signals from a dedicated radio frequency energy source, convert it into electrical energy, and store it in the battery. The charging and discharging process of each energy harvesting module is can be done simultaneously. The RF energy harvesting process is modeled as successive energy packet arrivals, and the energy arrivals in different time slices obey the IID. The electric energy that can be harvested in the target time slice can be calculated by the energy harvesting model.

可选的,所述隐私熵模型中熵值公式为Optionally, the entropy value formula in the privacy entropy model is:

Figure BDA0003222041500000111
Figure BDA0003222041500000111

其中,

Figure BDA0003222041500000112
in,
Figure BDA0003222041500000112

具体实施时,考虑到需要充分考虑所述物联网设备的任务卸载决策对消费者位置隐私泄露的可能,需要先定义关于所述物联网设备卸载策略调度的隐私度量即隐私熵。通常用信息熵来描述一个事件混乱程度的大小,不难发现,在隐私熵模型中,隐私熵的值越大,计算任务的混乱程度就越大,用户将越安全,用户的位置隐私将被保护得更好。During specific implementation, considering the need to fully consider the possibility of consumer location privacy leakage due to the task offloading decision of the IoT device, it is necessary to first define a privacy metric for scheduling the IoT device offloading strategy, that is, privacy entropy. Information entropy is usually used to describe the degree of chaos of an event. It is not difficult to find that in the privacy entropy model, the larger the value of privacy entropy is, the more chaotic the computing task will be, the safer the user will be, and the user's location privacy will be affected. better protected.

具体的,

Figure BDA0003222041500000113
表示设定的所述物联网设备和所述边缘服务器间信道好坏判断阈值,当
Figure BDA0003222041500000114
时,便认为它们之间的信道条件良好,此时,所述物联网设备倾向于将所有的任务卸载到所述边缘服务器。
Figure BDA0003222041500000115
表示设定的所述物联网设备从射频能量发射器中收集到的能量大小判断阈值,当
Figure BDA0003222041500000116
时,便认为所述物联网设备获得的能量充足,所述物联网设备和射频能量发射器间的信道条件良好。为了保护位置隐私,所述物联网设备需要在良好的信道条件下故意降低卸载速率,在不良的信道条件下提高卸载速率。卸载频率偏离初始卸载频率越大,隐私熵就越大,目标用户位置隐私被锁定的风险就越低。specific,
Figure BDA0003222041500000113
Indicates the set threshold for judging the quality of the channel between the IoT device and the edge server. When
Figure BDA0003222041500000114
When the channel conditions between them are considered to be good, the IoT device tends to offload all tasks to the edge server.
Figure BDA0003222041500000115
Indicates the set judgment threshold of the amount of energy collected by the IoT device from the radio frequency energy transmitter.
Figure BDA0003222041500000116
is considered that the energy obtained by the IoT device is sufficient, and the channel condition between the IoT device and the RF energy transmitter is good. To protect location privacy, the IoT device needs to deliberately reduce the offload rate under good channel conditions and increase the offload rate under poor channel conditions. The larger the offloading frequency deviates from the initial offloading frequency, the greater the privacy entropy, and the lower the risk of target user location privacy being locked.

在上述实施例的基础上,如图2所示,步骤S104所述的,最大化所述目标函数,求解所述目标时间片内的任务卸载策略,包括:On the basis of the above embodiment, as shown in FIG. 2 , as described in step S104, maximizing the objective function to solve the task unloading strategy in the target time slice, including:

S201,利用深度强化学习方法对所述目标函数进行求解,获得所述目标时间片内的卸载决策向量;S201, using a deep reinforcement learning method to solve the objective function to obtain an unloading decision vector in the target time slice;

具体实施时,在得到所述目标函数后,可以利用所述深度强化学习方法对所述目标时间片内的数据进行深度学习后对所述目标函数进行求解,从而得到所述目标时间片内的卸载决策向量

Figure BDA0003222041500000121
提高了决策过程的鲁棒性。During specific implementation, after the objective function is obtained, the deep reinforcement learning method can be used to perform deep learning on the data in the target time slice and then solve the objective function, so as to obtain the target time slice. Unloading Decision Vectors
Figure BDA0003222041500000121
Improves the robustness of the decision-making process.

S202,根据所述卸载决策向量生成所述任务卸载策略。S202. Generate the task offloading policy according to the offloading decision vector.

在得到所述卸载决策向量后,可以根据所述卸载决策向量生成所述任务卸载策略,同时,生成所述任务卸载策略后,设备或系统可以自动执行所述任务卸载策略,或者讲所述任务卸载策略发送至操作人员,由操作人员选择执行。After obtaining the offloading decision vector, the task offloading strategy can be generated according to the offloading decision vector. Meanwhile, after the task offloading strategy is generated, the device or system can automatically execute the task offloading strategy, or describe the task offloading strategy. The uninstall policy is sent to the operator, who chooses to execute it.

与上面的方法实施例相对应,参见图3,本公开实施例还提供了一种对应上述实施例的移动计算卸载系统30,所述系统包括:Corresponding to the above method embodiments, referring to FIG. 3 , an embodiment of the present disclosure further provides a mobile computing offloading system 30 corresponding to the above embodiments, and the system includes:

边缘服务器301;edge server 301;

多个所述物联网设备302,全部所述物联网设备302均与所述边缘服务器301通讯连接。A plurality of the Internet of Things devices 302, all of the Internet of Things devices 302 are connected to the edge server 301 in communication.

具体实施时,所述物联网设备用于监测用户的状态信息,所述边缘服务器用于卸载所述物联网设备的计算任务,在目标时间片内可以根据全部所述物联网设备302与所述边缘服务器301的连接关系采集所述边缘服务器的实时信息和每个所述物联网设备的实时信息,并据此构建本地计算模型、边缘计算模型、能量收集模型和隐私熵模型,然后根据所述本地计算模型、所述边缘计算模型、所述能量收集模型和所述隐私熵模型,构建目标函数并求解得到任务卸载策略。During specific implementation, the IoT device is used to monitor the status information of the user, the edge server is used to offload the computing task of the IoT device, and within the target time slice, all the IoT devices 302 and the The connection relationship of the edge server 301 collects the real-time information of the edge server and the real-time information of each of the Internet of Things devices, and builds a local computing model, an edge computing model, an energy collection model and a privacy entropy model accordingly, and then according to the The local computing model, the edge computing model, the energy harvesting model and the privacy entropy model are used to construct an objective function and solve to obtain a task offloading strategy.

本公开实施例还提供了一种非暂态计算机可读存储介质,该非暂态计算机可读存储介质存储计算机指令,该计算机指令用于使该计算机执行前述方法实施例中的移动计算卸载方法。Embodiments of the present disclosure further provide a non-transitory computer-readable storage medium, where the non-transitory computer-readable storage medium stores computer instructions, and the computer instructions are used to cause the computer to execute the mobile computing offloading method in the foregoing method embodiments .

本公开实施例还提供了一种计算机程序产品,该计算机程序产品包括存储在非暂态计算机可读存储介质上的计算程序,该计算机程序包括程序指令,当该程序指令被计算机执行时,使该计算机执行前述方法实施例中的移动计算卸载方法。Embodiments of the present disclosure also provide a computer program product, the computer program product includes a computer program stored on a non-transitory computer-readable storage medium, the computer program includes program instructions, when the program instructions are executed by a computer, make The computer executes the mobile computing offloading method in the foregoing method embodiments.

需要说明的是,本公开上述的计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质或者是上述两者的任意组合。计算机可读存储介质例如可以是——但不限于——电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子可以包括但不限于:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机访问存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本公开中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。而在本公开中,计算机可读信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读信号介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于:电线、光缆、RF(射频)等等,或者上述的任意合适的组合。It should be noted that the computer-readable medium mentioned above in the present disclosure may be a computer-readable signal medium or a computer-readable storage medium, or any combination of the above two. The computer-readable storage medium can be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus or device, or a combination of any of the above. More specific examples of computer readable storage media may include, but are not limited to, electrical connections with one or more wires, portable computer disks, hard disks, random access memory (RAM), read only memory (ROM), erasable Programmable read only memory (EPROM or flash memory), fiber optics, portable compact disk read only memory (CD-ROM), optical storage devices, magnetic storage devices, or any suitable combination of the foregoing. In this disclosure, a computer-readable storage medium may be any tangible medium that contains or stores a program that can be used by or in conjunction with an instruction execution system, apparatus, or device. In the present disclosure, however, a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave with computer-readable program code embodied thereon. Such propagated data signals may take a variety of forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing. A computer-readable signal medium can also be any computer-readable medium other than a computer-readable storage medium that can transmit, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device . Program code embodied on a computer readable medium may be transmitted using any suitable medium including, but not limited to, electrical wire, optical fiber cable, RF (radio frequency), etc., or any suitable combination of the foregoing.

上述计算机可读介质可以是上述电子设备中所包含的;也可以是单独存在,而未装配入该电子设备中。The above-mentioned computer-readable medium may be included in the above-mentioned electronic device; or may exist alone without being assembled into the electronic device.

上述计算机可读介质承载有一个或者多个程序,当上述一个或者多个程序被该电子设备执行时,使得该电子设备可以执行上述方法实施例的相关步骤。The above-mentioned computer-readable medium carries one or more programs, and when the above-mentioned one or more programs are executed by the electronic device, the electronic device can execute the relevant steps of the above-mentioned method embodiments.

或者,上述计算机可读介质承载有一个或者多个程序,当上述一个或者多个程序被该电子设备执行时,使得该电子设备可以执行上述方法实施例的相关步骤。Alternatively, the above computer-readable medium carries one or more programs, and when the above one or more programs are executed by the electronic device, the electronic device can execute the relevant steps of the above method embodiments.

可以以一种或多种程序设计语言或其组合来编写用于执行本公开的操作的计算机程序代码,上述程序设计语言包括面向对象的程序设计语言—诸如Java、Smalltalk、C++,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络——包括局域网(LAN)或广域网(WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。Computer program code for carrying out operations of the present disclosure may be written in one or more programming languages, including object-oriented programming languages—such as Java, Smalltalk, C++, but also conventional Procedural programming language - such as the "C" language or similar programming language. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computer (eg, using an Internet service provider through Internet connection).

附图中的流程图和框图,图示了按照本公开各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,该模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code that contains one or more logical functions for implementing the specified functions executable instructions. It should also be noted that, in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It is also noted that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented in dedicated hardware-based systems that perform the specified functions or operations , or can be implemented in a combination of dedicated hardware and computer instructions.

描述于本公开实施例中所涉及到的单元可以通过软件的方式实现,也可以通过硬件的方式来实现。The units involved in the embodiments of the present disclosure may be implemented in a software manner, and may also be implemented in a hardware manner.

应当理解,本公开的各部分可以用硬件、软件、固件或它们的组合来实现。It should be understood that portions of the present disclosure may be implemented in hardware, software, firmware, or a combination thereof.

以上所述,仅为本公开的具体实施方式,但本公开的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本公开揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本公开的保护范围之内。因此,本公开的保护范围应以权利要求的保护范围为准。The above are only specific embodiments of the present disclosure, but the protection scope of the present disclosure is not limited to this. Any person skilled in the art who is familiar with the technical scope of the present disclosure can easily think of changes or substitutions. All should be included within the protection scope of the present disclosure. Therefore, the protection scope of the present disclosure should be subject to the protection scope of the claims.

Claims (10)

1.一种移动计算卸载方法,其特征在于,包括:1. a mobile computing unloading method, is characterized in that, comprises: 在目标时间片开始时,收集边缘服务器和每个保健物联网设备的实时信息,其中,所述边缘服务器的实时信息包括每个所述物联网设备与所述边缘服务器之间的无线信道功率增益,所述物联网设备的实时信息包括所述物联网设备产生的计算任务大小和所述物联网设备从射频能量源接收到的无线能量;At the beginning of the target time slice, real-time information of the edge server and each healthcare IoT device is collected, wherein the real-time information of the edge server includes the wireless channel power gain between each of the IoT devices and the edge server , the real-time information of the IoT device includes the size of the computing task generated by the IoT device and the wireless energy received by the IoT device from the radio frequency energy source; 根据所述边缘服务器的实时信息和每个所述物联网设备的实时信息构建本地计算模型、边缘计算模型、能量收集模型和隐私熵模型;Build a local computing model, an edge computing model, an energy harvesting model and a privacy entropy model according to the real-time information of the edge server and the real-time information of each of the IoT devices; 根据所述本地计算模型、所述边缘计算模型、所述能量收集模型和所述隐私熵模型,构建目标函数;constructing an objective function according to the local computing model, the edge computing model, the energy harvesting model and the privacy entropy model; 最大化所述目标函数,求解所述目标时间片内的任务卸载策略。Maximize the objective function, and solve the task offloading policy in the target time slice. 2.根据权利要求1所述的方法,其特征在于,所述无线信道功率增益遵循具有状态集和转移概率的马尔可夫模型。2. The method of claim 1, wherein the wireless channel power gain follows a Markov model with state sets and transition probabilities. 3.根据权利要求1所述的方法,其特征在于,所述本地计算模型为
Figure FDA0003222041490000011
其中,
Figure FDA0003222041490000012
表示物联网设备i的本地计算能力,k为取决于芯片架构的有效开关电容,Di(t)为所述物联网设备从射频能量源接收到的无线能量,ai(t)表示所述物联网设备i在所述目标时间片t的任务卸载策略,ci表示计算1bit任务所需要的计算资源。
3. The method according to claim 1, wherein the local computing model is
Figure FDA0003222041490000011
in,
Figure FDA0003222041490000012
represents the local computing capability of the IoT device i, k is the effective switched capacitor depending on the chip architecture, D i (t) is the wireless energy received by the IoT device from the RF energy source, and a i (t) represents the The task offloading strategy of the IoT device i in the target time slice t, and c i represents the computing resources required for computing a 1-bit task.
4.根据权利要求3所述的方法,其特征在于,所述边缘计算模型为
Figure FDA0003222041490000013
其中,Ti loc(t)表示物联网设备i在t时间片生成的任务在本地处理的时间延迟,Ti tra(t)表示传输时延,Ti edg(t)表示边缘服务器计算时延,
Figure FDA0003222041490000015
表示物联网设备相应的传输能耗,
Figure FDA0003222041490000016
表示物联网设备i相应的空闲能耗。
4. The method according to claim 3, wherein the edge computing model is
Figure FDA0003222041490000013
Among them, T i loc (t) represents the time delay of local processing of tasks generated by IoT device i in time slice t, T i tra (t) represents the transmission delay, and T i edg (t) represents the computing delay of the edge server ,
Figure FDA0003222041490000015
Represents the corresponding transmission energy consumption of IoT devices,
Figure FDA0003222041490000016
Indicates the corresponding idle energy consumption of IoT device i.
5.根据权利要求4所述的方法,其特征在于,所述能量收集模型为
Figure FDA0003222041490000017
其中,v为能量转换效率,ρ为传输的能量强度,
Figure FDA0003222041490000018
路劲损坏指数,G表示射频能量发射器天线和物联网设备天线的组合增益,di(t)为物联网设备i与射频能量发射器的距离。
5. The method according to claim 4, wherein the energy harvesting model is
Figure FDA0003222041490000017
where v is the energy conversion efficiency, ρ is the transmitted energy intensity,
Figure FDA0003222041490000018
Road strength damage index, G represents the combined gain of the RF energy transmitter antenna and the IoT device antenna, and d i (t) is the distance between the IoT device i and the RF energy transmitter.
6.根据权利要求5所述的方法,其特征在于,所述隐私熵模型中熵值公式为
Figure FDA0003222041490000021
6. The method according to claim 5, wherein the entropy value formula in the privacy entropy model is:
Figure FDA0003222041490000021
其中,
Figure FDA0003222041490000022
in,
Figure FDA0003222041490000022
7.根据权利要求1所述的方法,其特征在于,所述目标函数为7. method according to claim 1, is characterized in that, described objective function is
Figure FDA0003222041490000023
Figure FDA0003222041490000023
Figure FDA0003222041490000024
Figure FDA0003222041490000024
Figure FDA0003222041490000025
Figure FDA0003222041490000025
其中,
Figure FDA0003222041490000026
Figure FDA0003222041490000027
表示每个所述物联网设备在每个时刻的电池容量都不超过它们的最大值
Figure FDA0003222041490000028
Figure FDA0003222041490000029
表示边缘服务器分配给所述物联网设备的计算资源的总和不超过所述边缘服务器的计算资源Fedg
Figure FDA00032220414900000210
表示所述物联网设备的卸载策略。
in,
Figure FDA0003222041490000026
Figure FDA0003222041490000027
Indicates that the battery capacity of each of said IoT devices does not exceed their maximum value at any time
Figure FDA0003222041490000028
Figure FDA0003222041490000029
indicates that the sum of the computing resources allocated by the edge server to the IoT device does not exceed the computing resource F edg of the edge server,
Figure FDA00032220414900000210
Represents an uninstall policy for the IoT device.
8.根据权利要求1所述的方法,其特征在于,所述最大化所述目标函数,求解所述目标时间片内的任务卸载策略的步骤,包括:8. method according to claim 1, is characterized in that, described maximizing described objective function, the step of solving the task unloading strategy in described target time slice, comprises: 利用深度强化学习方法对所述目标函数进行求解,获得所述目标时间片内的卸载决策向量;Use the deep reinforcement learning method to solve the objective function, and obtain the unloading decision vector in the target time slice; 根据所述卸载决策向量生成所述任务卸载策略。The task offloading policy is generated according to the offloading decision vector. 9.一种移动计算卸载系统,其特征在于,所述系统应用于权利要求1至8中任一项所述的移动计算卸载方法,包括:9. A mobile computing unloading system, wherein the system is applied to the mobile computing unloading method according to any one of claims 1 to 8, comprising: 边缘服务器;edge server; 多个所述物联网设备,全部所述物联网设备均与所述边缘服务器通讯连接。A plurality of the IoT devices, all of which are connected in communication with the edge server. 10.一种非暂态计算机可读存储介质,该非暂态计算机可读存储介质存储计算机指令,该计算机指令用于使该计算机执行前述权利要求1-8中任一项所述的移动计算卸载方法。10. A non-transitory computer-readable storage medium storing computer instructions for causing the computer to perform the mobile computing of any of the preceding claims 1-8 Uninstall method.
CN202110960298.0A 2021-08-20 2021-08-20 Mobile computing unloading method, system and storage medium Active CN113626107B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110960298.0A CN113626107B (en) 2021-08-20 2021-08-20 Mobile computing unloading method, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110960298.0A CN113626107B (en) 2021-08-20 2021-08-20 Mobile computing unloading method, system and storage medium

Publications (2)

Publication Number Publication Date
CN113626107A true CN113626107A (en) 2021-11-09
CN113626107B CN113626107B (en) 2024-03-26

Family

ID=78386915

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110960298.0A Active CN113626107B (en) 2021-08-20 2021-08-20 Mobile computing unloading method, system and storage medium

Country Status (1)

Country Link
CN (1) CN113626107B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114528081A (en) * 2022-02-10 2022-05-24 绍兴文理学院 Task unloading optimization method for privacy protection of mobile edge computing user
CN119155743A (en) * 2024-11-21 2024-12-17 国网天津市电力公司电力科学研究院 Encryption method, device, system and equipment based on carrier communication and wireless communication

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108415763A (en) * 2018-02-11 2018-08-17 中南大学 A kind of distribution method of edge calculations system
CN109460295A (en) * 2018-10-19 2019-03-12 中南大学 A kind of edge calculations performance optimization method based on multi-user's competitive behavior model
CN109710336A (en) * 2019-01-11 2019-05-03 中南林业科技大学 A joint energy and delay optimization task scheduling method for mobile edge computing
CN109767117A (en) * 2019-01-11 2019-05-17 中南林业科技大学 A Power Allocation Method for Joint Task Scheduling in Mobile Edge Computing
CN109829332A (en) * 2019-01-03 2019-05-31 武汉理工大学 A kind of combined calculation discharging method and device based on energy collection technology
CN109947551A (en) * 2019-03-19 2019-06-28 中南大学 A multi-round task allocation method, edge computing system and storage medium thereof
CN110856259A (en) * 2019-11-12 2020-02-28 郑州轻工业学院 Resource allocation and offloading method for adaptive data block size in mobile edge computing environment
CN111399933A (en) * 2020-02-11 2020-07-10 福建师范大学 DNN task unloading method and terminal in edge-cloud hybrid computing environment
CN111552564A (en) * 2020-04-23 2020-08-18 中南大学 A method for task offloading and resource optimization based on edge cache
CN111641681A (en) * 2020-05-11 2020-09-08 国家电网有限公司 Internet of things service unloading decision method based on edge calculation and deep reinforcement learning
CN111787509A (en) * 2020-07-14 2020-10-16 中南大学 Reinforcement learning-based UAV task offloading method and system in edge computing
CN112104494A (en) * 2020-09-09 2020-12-18 南京信息工程大学 Task security unloading strategy determination method based on air-ground cooperative edge computing network
CN112512018A (en) * 2020-07-24 2021-03-16 北京航空航天大学 Method for dynamically unloading tasks among cooperative vehicles based on mobile edge calculation
CN112749010A (en) * 2020-12-31 2021-05-04 中南大学 Edge calculation task allocation method for fusion recommendation system
CN112911587A (en) * 2021-01-26 2021-06-04 南京邮电大学 Method for unloading security anti-eavesdropping task by using physical layer under MEC-D2D environment

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108415763A (en) * 2018-02-11 2018-08-17 中南大学 A kind of distribution method of edge calculations system
CN109460295A (en) * 2018-10-19 2019-03-12 中南大学 A kind of edge calculations performance optimization method based on multi-user's competitive behavior model
CN109829332A (en) * 2019-01-03 2019-05-31 武汉理工大学 A kind of combined calculation discharging method and device based on energy collection technology
CN109710336A (en) * 2019-01-11 2019-05-03 中南林业科技大学 A joint energy and delay optimization task scheduling method for mobile edge computing
CN109767117A (en) * 2019-01-11 2019-05-17 中南林业科技大学 A Power Allocation Method for Joint Task Scheduling in Mobile Edge Computing
CN109947551A (en) * 2019-03-19 2019-06-28 中南大学 A multi-round task allocation method, edge computing system and storage medium thereof
CN110856259A (en) * 2019-11-12 2020-02-28 郑州轻工业学院 Resource allocation and offloading method for adaptive data block size in mobile edge computing environment
CN111399933A (en) * 2020-02-11 2020-07-10 福建师范大学 DNN task unloading method and terminal in edge-cloud hybrid computing environment
CN111552564A (en) * 2020-04-23 2020-08-18 中南大学 A method for task offloading and resource optimization based on edge cache
CN111641681A (en) * 2020-05-11 2020-09-08 国家电网有限公司 Internet of things service unloading decision method based on edge calculation and deep reinforcement learning
CN111787509A (en) * 2020-07-14 2020-10-16 中南大学 Reinforcement learning-based UAV task offloading method and system in edge computing
CN112512018A (en) * 2020-07-24 2021-03-16 北京航空航天大学 Method for dynamically unloading tasks among cooperative vehicles based on mobile edge calculation
CN112104494A (en) * 2020-09-09 2020-12-18 南京信息工程大学 Task security unloading strategy determination method based on air-ground cooperative edge computing network
CN112749010A (en) * 2020-12-31 2021-05-04 中南大学 Edge calculation task allocation method for fusion recommendation system
CN112911587A (en) * 2021-01-26 2021-06-04 南京邮电大学 Method for unloading security anti-eavesdropping task by using physical layer under MEC-D2D environment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HASNAIN ALI ALMASHHADANI 等: "An Edge-Computing Based Task-Unloading Technique with Privacy Protection for Internet of Connected Vehicles", 《 WIRELESS PERSONAL COMMUNICATIONS 》, vol. 127, 3 July 2021 (2021-07-03), pages 1787 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114528081A (en) * 2022-02-10 2022-05-24 绍兴文理学院 Task unloading optimization method for privacy protection of mobile edge computing user
CN114528081B (en) * 2022-02-10 2024-08-09 绍兴文理学院 Task unloading optimization method for mobile edge computing user privacy protection
CN119155743A (en) * 2024-11-21 2024-12-17 国网天津市电力公司电力科学研究院 Encryption method, device, system and equipment based on carrier communication and wireless communication

Also Published As

Publication number Publication date
CN113626107B (en) 2024-03-26

Similar Documents

Publication Publication Date Title
Yu et al. Computation offloading for mobile edge computing: A deep learning approach
Samie et al. Computation offloading and resource allocation for low-power IoT edge devices
CN111124666B (en) Efficient and safe multi-user multi-task unloading method in mobile Internet of things
CN113626107A (en) Mobile computing unloading method, system and storage medium
CN112512063B (en) Resource allocation method for UAV-assisted edge computing based on RF energy harvesting
CN110267249A (en) A post-disaster UAV base station deployment method and system based on artificial bee colony algorithm
CN112769897A (en) Synchronization method and device for edge calculation message, electronic equipment and storage medium
CN110348526A (en) A kind of device type recognition methods and device based on semi-supervised clustering algorithm
CN104782192A (en) Cloud-aware collaborative mobile platform power management using mobile sensors
CN117749635A (en) Digital twin-enabled industrial Internet of things resource allocation system and method
CN110650487A (en) Internet of things edge computing configuration method based on data privacy protection
CN115589616A (en) Calculation force information acquisition method and related equipment
Zheng et al. Age-based utility maximization for wireless powered networks: A stackelberg game approach
Nour et al. A network-based compute reuse architecture for IoT applications
CN115175347A (en) Wireless energy-carrying communication network resource allocation optimization method
US9552227B2 (en) System and method for context-aware adaptive computing
CN106358206A (en) Management method and system for frequency-spectrum information in communication of Internet of things
US9838495B2 (en) Managing data acquisition
JP7517464B2 (en) Neural architecture search system and method
CN118741572A (en) A satellite-ground integrated Internet of Things communication processing method and system based on multi-network integration
Yi et al. Energy-aware data compression and transmission range control for energy-harvesting wireless sensor networks
CN114510868A (en) Operation adjustment method and device for edge Internet of things sensor network
CN114884957A (en) Method and device for unloading computing tasks in air-space-ground network and electronic equipment
Kannan et al. Optimizing Energy Usage and Data Storage in Industrial IoT Settings Through Heuristic-Based Data-Rate Processors
Chen Resource scheduling strategy for uncertain factors in mobile cloud computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant