CN113626107A - Mobile computing unloading method, system and storage medium - Google Patents
Mobile computing unloading method, system and storage medium Download PDFInfo
- Publication number
- CN113626107A CN113626107A CN202110960298.0A CN202110960298A CN113626107A CN 113626107 A CN113626107 A CN 113626107A CN 202110960298 A CN202110960298 A CN 202110960298A CN 113626107 A CN113626107 A CN 113626107A
- Authority
- CN
- China
- Prior art keywords
- internet
- model
- things
- edge server
- real
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000003860 storage Methods 0.000 title claims abstract description 17
- 238000004364 calculation method Methods 0.000 claims abstract description 38
- 238000012545 processing Methods 0.000 claims abstract description 10
- 230000006870 function Effects 0.000 claims description 29
- 238000005265 energy consumption Methods 0.000 claims description 13
- 230000005540 biological transmission Effects 0.000 claims description 12
- 230000002787 reinforcement Effects 0.000 claims description 4
- 230000007704 transition Effects 0.000 claims description 4
- 239000003990 capacitor Substances 0.000 claims description 3
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 238000004891 communication Methods 0.000 claims description 3
- 230000001419 dependent effect Effects 0.000 claims description 3
- 238000003306 harvesting Methods 0.000 claims description 3
- 238000005094 computer simulation Methods 0.000 claims 1
- 238000005457 optimization Methods 0.000 abstract description 3
- 238000004590 computer program Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000014509 gene expression Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000013135 deep learning Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000002035 prolonged effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44594—Unloading
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Medical Informatics (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the disclosure provides a mobile computing unloading method, a system and a storage medium, which belong to the technical field of data processing, and specifically comprise the following steps: when a target time slice starts, collecting real-time information of an edge server and each piece of health-care Internet of things equipment; constructing a local calculation model, an edge calculation model, an energy collection model and a privacy entropy model according to the real-time information of the edge server and the real-time information of each piece of Internet of things equipment; constructing a target function according to the local calculation model, the edge calculation model, the energy collection model and the privacy entropy model; and maximizing an objective function and solving a task unloading strategy in an objective time slice. According to the scheme, the real-time information of the Internet of things equipment and the edge server is collected, the calculation model, the energy collection model and the privacy entropy model are established, the target optimization function is obtained, the unloading decision vector can be finally obtained through solving, and the adaptability of wireless energy supply and the privacy protection strength are improved.
Description
Technical Field
The embodiment of the disclosure relates to the technical field of data processing, in particular to a mobile computing unloading method, a mobile computing unloading system and a storage medium.
Background
At present, with the acceleration of an information process, the state information of personnel needs to be monitored and tracked in real time in certain specific scenes, and in order to better meet the requirements of mobile computing, mobile edge computing is effectively supplemented and perfected for a mobile system supported by mobile cloud computing. However, the conventional mobile cloud computing method depends on power supply of hardware, and the offloading policy of the internet of things device is highly related to the wireless channel power gain, so long as the wireless channel condition between the internet of things device and the edge server is good, the device offloads as many computing tasks as possible to the server, thereby causing easy disclosure of privacy of the user.
Therefore, a mobile computing offloading method with high adaptability and security is needed.
Disclosure of Invention
In view of the above, embodiments of the present disclosure provide a mobile computing offloading method, system and storage medium, which at least partially solve the problem in the prior art that the adaptability and security are poor.
In a first aspect, an embodiment of the present disclosure provides a mobile computing offloading method, including:
the method comprises the steps that when a target time slice begins, real-time information of an edge server and each health-care Internet of things device is collected, wherein the real-time information of the edge server comprises wireless channel power gain between each Internet of things device and the edge server, and the real-time information of the Internet of things devices comprises calculation task size generated by the Internet of things devices and wireless energy received by the Internet of things devices from a radio frequency energy source;
constructing a local calculation model, an edge calculation model, an energy collection model and a privacy entropy model according to the real-time information of the edge server and the real-time information of each piece of Internet of things equipment;
constructing an objective function according to the local computation model, the edge computation model, the energy collection model and the privacy entropy model;
and maximizing the objective function and solving a task unloading strategy in the objective time slice.
According to a particular implementation of the embodiments of the present disclosure, the wireless channel power gain follows a markov model with a set of states and transition probabilities.
In accordance with the present disclosureIn one embodiment, the local computation model isWherein,representing the local computing power of the Internet of things device i, k is an effective switched capacitor dependent on a chip architecture, Di(t) is wireless energy received by the Internet of things device from a radio frequency energy source, ai(t) represents the task offloading policy of the internet of things device i at the target time slice t, ciRepresenting the computational resources required to compute the 1-bit task.
According to a specific implementation manner of the embodiment of the present disclosure, the edge calculation model isWherein,represents the time delay of local processing of the task generated by the internet of things device i in the time slice t,which is indicative of the time delay of the transmission,indicating that the edge server is computing the time delay,the corresponding transmission energy consumption of the equipment of the Internet of things is represented,and representing the corresponding idle energy consumption of the equipment i of the Internet of things.
According to a specific implementation manner of the embodiment of the disclosure, the energy collection model isWherein v is the energy conversion efficiency,in order to be able to transmit the intensity of the energy,road stiffness damage index, G represents the combined gain of the radio frequency energy transmitter antenna and the Internet of things equipment antenna, diAnd (t) is the distance between the Internet of things equipment i and the radio frequency energy emitter.
According to a specific implementation manner of the embodiment of the disclosure, the formula of the entropy value in the privacy entropy model is
according to a specific implementation manner of the embodiment of the present disclosure, the objective function is
Wherein, representing each of the Internet of things devicesThe battery capacity at each moment does not exceed their maximum valueIndicating that the sum of the computing resources allocated to the IOT equipment by the edge server does not exceed the computing resource F of the edge serveredg,And representing the unloading strategy of the equipment of the Internet of things.
According to a specific implementation manner of the embodiment of the present disclosure, the step of maximizing the objective function and solving the task offloading policy in the objective time slice includes:
solving the target function by using a deep reinforcement learning method to obtain an unloading decision vector in the target time slice;
and generating the task unloading strategy according to the unloading decision vector.
In a second aspect, an embodiment of the present disclosure further provides a mobile computing offloading system, which is applied to the mobile computing offloading method according to the foregoing disclosed embodiment, and the mobile computing offloading system includes:
an edge server;
a plurality of the internet of things equipment, all the internet of things equipment is in communication connection with the edge server.
In a third aspect, the disclosed embodiments also provide a non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform the mobile computing offloading method of the first aspect or any implementation manner of the first aspect.
In a fourth aspect, the present disclosure also provides a computer program product including a computer program stored on a non-transitory computer readable storage medium, the computer program including program instructions that, when executed by a computer, cause the computer to perform the mobile computing offloading method of the first aspect or any implementation manner of the first aspect.
The mobile computing offloading scheme in an embodiment of the present disclosure includes: the method comprises the steps that when a target time slice begins, real-time information of an edge server and each health-care Internet of things device is collected, wherein the real-time information of the edge server comprises wireless channel power gain between each Internet of things device and the edge server, and the real-time information of the Internet of things devices comprises calculation task size generated by the Internet of things devices and wireless energy received by the Internet of things devices from a radio frequency energy source; constructing a local calculation model, an edge calculation model, an energy collection model and a privacy entropy model according to the real-time information of the edge server and the real-time information of each piece of Internet of things equipment; constructing an objective function according to the local computation model, the edge computation model, the energy collection model and the privacy entropy model; and maximizing the objective function and solving a task unloading strategy in the objective time slice.
The beneficial effects of the embodiment of the disclosure are: according to the scheme, the real-time information of the Internet of things equipment and the edge server is collected, the calculation model, the energy collection model and the privacy entropy model are established, the target optimization function is obtained, the unloading decision vector can be finally obtained through solving, and the adaptability of wireless energy supply and the privacy protection strength are improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings needed to be used in the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present disclosure, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a mobile computing offloading method according to an embodiment of the present disclosure;
fig. 2 is a partial flowchart of a mobile computing offloading method according to an embodiment of the disclosure;
fig. 3 is a schematic structural diagram of a mobile computing offload system according to an embodiment of the present disclosure.
Detailed Description
The embodiments of the present disclosure are described in detail below with reference to the accompanying drawings.
The embodiments of the present disclosure are described below with specific examples, and other advantages and effects of the present disclosure will be readily apparent to those skilled in the art from the disclosure in the specification. It is to be understood that the described embodiments are merely illustrative of some, and not restrictive, of the embodiments of the disclosure. The disclosure may be embodied or carried out in various other specific embodiments, and various modifications and changes may be made in the details within the description without departing from the spirit of the disclosure. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
It is noted that various aspects of the embodiments are described below within the scope of the appended claims. It should be apparent that the aspects described herein may be embodied in a wide variety of forms and that any specific structure and/or function described herein is merely illustrative. Based on the disclosure, one skilled in the art should appreciate that one aspect described herein may be implemented independently of any other aspects and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented and/or a method practiced using any number of the aspects set forth herein. Additionally, such an apparatus may be implemented and/or such a method may be practiced using other structure and/or functionality in addition to one or more of the aspects set forth herein.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present disclosure, and the drawings only show the components related to the present disclosure rather than the number, shape and size of the components in actual implementation, and the type, amount and ratio of the components in actual implementation may be changed arbitrarily, and the layout of the components may be more complicated.
In addition, in the following description, specific details are provided to facilitate a thorough understanding of the examples. However, it will be understood by those skilled in the art that the aspects may be practiced without these specific details.
At present, with the acceleration of an information process, the state information of personnel needs to be monitored and tracked in real time in certain specific scenes, and in order to better meet the requirements of mobile computing, mobile edge computing is effectively supplemented and perfected for a mobile system supported by mobile cloud computing. However, traditional mobile cloud computing approaches rely on the power supply of hardware, and these internet of things devices will be implanted within or worn on the body surface of the user, making it impractical to charge them by wired charging. Therefore, green energy harvesting technology is considered as a promising technology, which can extend the battery life of the internet of things device and provide a higher quality of service experience for the user. However, the green energy extracted from the natural environment depends to a large extent on the stability of the respective energy source. The quality and reliability of energy supply are difficult to guarantee by green energy collection technology, which has a great influence on a data management system which needs to monitor and analyze data in real time.
And the unloading strategy of the equipment of the Internet of things is highly related to the power gain of the wireless channel, as long as the condition of the wireless channel between the equipment of the Internet of things and the edge server is good, the equipment can unload as many calculation tasks as possible to the server, and the power gain of the wireless channel is highly related to the distance between the equipment of the Internet of things and the edge server. Thus, an attacker can infer wireless channel information by monitoring the size of offload tasks received by an honest but curious edge server to reveal the user's location privacy, resulting in easy disclosure of the user's privacy.
The embodiment of the disclosure provides a mobile computing unloading method, which can be applied to a user health state monitoring process in a medical system scene.
Referring to fig. 1, a flow chart of a mobile computing offloading method according to an embodiment of the present disclosure is schematically shown. As shown in fig. 1, the method mainly comprises the following steps:
s101, collecting real-time information of an edge server and each health-care Internet of things device when a target time slice starts, wherein the real-time information of the edge server comprises wireless channel power gain between each Internet of things device and the edge server, and the real-time information of the Internet of things devices comprises calculation task size generated by the Internet of things devices and wireless energy received by the Internet of things devices from a radio frequency energy source;
in specific implementation, when each program runs, a corresponding running time period is allocated to the program, the running time period is used as the target time slice, then at the beginning of the target time slice, the running states of the edge server and each health-care internet-of-things device are collected, for example, the power gain of a wireless channel between each internet-of-things device and the edge server is analyzed to form real-time information of the edge server, and the size of a calculation task generated by the internet-of-things device and the wireless energy received by the internet-of-things device from a radio frequency energy source are analyzed to form the real-time information of the internet-of-things device.
Optionally, the radio channel power gain follows a markov model with a set of states and transition probabilities.
For example, at the beginning of the target time slice t, obtaining a wireless channel gain h between the edge server and the internet of things device ii(t), we assume that the wireless channel gain h between the internet of things device and the edge service follows a set of statesAnd transition probabilityThe markov model of (1), wherein,at the same time, starting at said target time slice tThen, a calculation task Z generated by the Internet of things equipment i is obtainedi(t)=(Di(t),ci) Wherein D isi(t) represents the size of the data volume of the calculation task reaching the Internet of things device i in the target time slice t, ciRepresenting the computational resources required to compute the 1-bit task. And when the target time slice t begins, acquiring wireless energy b received by the Internet of things equipment i from a radio frequency energy sourcei(t)。
S102, constructing a local calculation model, an edge calculation model, an energy collection model and a privacy entropy model according to the real-time information of the edge server and the real-time information of each piece of Internet of things equipment;
specifically, after the real-time information of the edge server and the real-time information of each piece of internet-of-things equipment are acquired, a local computation model, an edge computation model, an energy collection model and a privacy entropy model can be constructed according to the real-time information of the edge server and the real-time information of each piece of internet-of-things equipment, wherein the local computation model can be used for computing the corresponding energy consumption of the piece of internet-of-things equipment in the local computation task, the edge computation model can be used for computing the total execution delay and the total energy consumption of the edge server and all pieces of internet-of-things equipment, the energy collection model can be used for computing the wireless energy acquired by each piece of internet-of-things equipment in the time slot, so that the amount of energy converted into the electric energy used by the piece of internet-of-things equipment can be obtained, and the privacy entropy model can be used for computing the chaos of the computation task on each piece of internet-of-things equipment, the privacy entropy model can thus be defined and adapted to achieve encryption of user information.
S103, constructing an objective function according to the local calculation model, the edge calculation model, the energy collection model and the privacy entropy model;
in specific implementation, there are expressions for the local computation model, the edge computation model, the energy collection model, and the privacy entropy model, and the expressions of the local computation model, the edge computation model, the energy collection model, and the privacy entropy model may be combined to construct the objective function.
Specifically, the objective function is
Wherein, the battery capacity of each Internet of things device at each moment is not more than the maximum valueIndicating that the sum of the computing resources allocated to the IOT equipment by the edge server does not exceed the computing resource F of the edge serveredg,And representing the unloading strategy of the equipment of the Internet of things.
And S104, maximizing the objective function and solving a task unloading strategy in the objective time slice.
In specific implementation, when the objective function is obtained, the objective function can be solved in a maximized manner, so that a task unloading strategy in the objective time slice is obtained, and each piece of internet of things equipment is calculated and unloaded according to the task unloading strategy, so that the service life of the equipment is prolonged, and the encryption protection of customer information is improved.
According to the mobile computing unloading method provided by the embodiment, a computing model, an energy collection model and a privacy entropy model are established through real-time information of the Internet of things equipment and the edge server, a target optimization function is obtained, and finally an unloading decision vector can be obtained through solving.
On the basis of the above embodiment, the local computation model is
Wherein,representing the local computing power of the Internet of things device i, k is an effective switched capacitor dependent on a chip architecture, Di(t) is wireless energy received by the Internet of things device from a radio frequency energy source, ai(t) represents the task offloading policy of the internet of things device i at the target time slice t, ciRepresenting the computational resources required to compute the 1-bit task.
During specific implementation, the internet of things equipment has certain computing capacity, and computing tasks can be processed locally on the internet of things equipment. The processing time of the task in the local calculation process only considers the calculation time and does not consider the transmission time. Therefore, the time delay of local processing of the task generated by the internet of things device i at the target time slice t is:
wherein,representing the local computing power of an Internet of things device i, ai(t) represents the task offload policy for device i at the target time slice t.
Then, the corresponding energy consumption of the internet of things device i in the local computing task, that is, the local computing model, may be calculated as:
wherein the energy consumption per calculation cycle is defined as ∈ ═ kf2And k is the effective switched capacitance depending on the chip architecture.
Optionally, the edge calculation model is
Wherein,represents the time delay of local processing of the task generated by the internet of things device i in the time slice t,which is indicative of the time delay of the transmission,indicating that the edge server is computing the time delay,the corresponding transmission energy consumption of the equipment of the Internet of things is represented,and representing the corresponding idle energy consumption of the equipment i of the Internet of things.
In specific implementation, in consideration of the shortage of computing resources of the internet of things equipment, all computing tasks cannot be processed on the local computing model, and some tasks need to be unloaded to the edge computing model for processing. The processing time of the task unloaded to the edge server comprises the uploading transmission time of the local task and the calculation time of the edge server, and the downloading transmission time of the task result is not considered because the data volume of the task return result is small. The time delay for the task generated by the internet of things device i in the time slice t to be offloaded to the edge server for processing is defined as:wherein, the transmission delay can be calculated as:the corresponding transmission energy consumption of the internet of things equipment can be calculated as follows:wherein p isiThe transmission power of the internet of things device i.
Meanwhile, the edge server may calculate the time delay as:wherein,computing resources allocated to the Internet of things device i for the edge server within the target time slice t, andFedgis the total computing resources of the edge server.
The corresponding idle energy consumption of the internet of things device i can be calculated as follows:wherein,and the idle power of the Internet of things equipment i.
Then, combining the local computation and the offload computation, the total execution delay and the total energy consumption of the system, i.e. the edge computation model, can be expressed by the following formula:
further, the energy collection model isWhere v is the energy conversion efficiency, ρ is the transmitted energy intensity,road stiffness damage index, G represents the combined gain of the radio frequency energy transmitter antenna and the Internet of things equipment antenna, diAnd (t) is the distance between the Internet of things equipment i and the radio frequency energy emitter.
During specific implementation, the internet of things equipment can collect radio frequency signals from a special radio frequency energy source and convert the radio frequency signals into electric energy to be stored in the battery by being provided with the radio frequency energy collector, and the charging and discharging processes of each energy collecting module can be carried out simultaneously. The rf energy harvesting process is modeled as a continuous energy packet arrival, and the energy arrivals at different time slices obey independent equal distributions. The electrical energy that can be collected within the target time slice may be calculated by the energy collection model.
Optionally, the formula of entropy value in the privacy entropy model is
in specific implementation, considering that the possibility that the privacy of the consumer location is revealed by the task offloading decision of the internet of things device needs to be fully considered, a privacy metric, namely privacy entropy, related to the offloading policy scheduling of the internet of things device needs to be defined first. The magnitude of the chaos degree of an event is generally described by using the information entropy, and it is not difficult to find that in the privacy entropy model, the larger the value of the privacy entropy is, the larger the chaos degree of a calculation task is, the safer a user is, and the better the position privacy of the user is protected.
In particular, the method comprises the following steps of,the set channel quality judgment threshold value between the Internet of things equipment and the edge server is shown whenThe channel conditions between them are considered good, at which time the internet of things devices tend to offload all tasks to the edge server.The judgment threshold value of the energy collected from the radio frequency energy emitter by the equipment of the Internet of things is shown whenIn time, the energy obtained by the internet of things equipment is considered to be sufficient, and the channel condition between the internet of things equipment and the radio frequency energy emitter is good. In order to protect location privacy, the internet of things device needs to deliberately reduce the offloading rate under good channel conditions and increase the offloading rate under poor channel conditions. The greater the deviation of the unloading frequency from the initial unloading frequency, the greater the privacy entropy and the lower the risk of the target user location privacy being locked.
On the basis of the foregoing embodiment, as shown in fig. 2, step S104 maximizes the objective function, and solves the task offloading policy in the objective time slice, including:
s201, solving the objective function by using a deep reinforcement learning method to obtain an unloading decision vector in the objective time slice;
in specific implementation, after the objective function is obtained, the deep reinforcement learning method can be used to perform deep learning on the data in the target time slice and then solve the objective function, so as to obtain the unloading decision vector in the target time sliceThe robustness of the decision making process is improved.
And S202, generating the task unloading strategy according to the unloading decision vector.
After the unloading decision vector is obtained, the task unloading strategy can be generated according to the unloading decision vector, and meanwhile, after the task unloading strategy is generated, the equipment or the system can automatically execute the task unloading strategy, or the task unloading strategy is sent to an operator and is selected to be executed by the operator.
Corresponding to the above method embodiment, referring to fig. 3, the embodiment of the present disclosure further provides a mobile computing offload system 30 corresponding to the above embodiment, the system includes:
an edge server 301;
all the internet of things devices 302 are in communication connection with the edge server 301.
During specific implementation, the internet of things equipment is used for monitoring state information of a user, the edge server is used for unloading a calculation task of the internet of things equipment, real-time information of the edge server and real-time information of each piece of internet of things equipment can be collected according to connection relations between all pieces of internet of things equipment 302 and the edge server 301 in a target time slice, a local calculation model, an edge calculation model, an energy collection model and a privacy entropy model are built according to the real-time information, and then an objective function is built and a task unloading strategy is obtained through solving according to the local calculation model, the edge calculation model, the energy collection model and the privacy entropy model.
The disclosed embodiments also provide a non-transitory computer-readable storage medium storing computer instructions for causing the computer to perform the mobile computing offloading method in the aforementioned method embodiments.
The disclosed embodiments also provide a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions that, when executed by a computer, cause the computer to perform the mobile computing offloading method of the aforementioned method embodiments.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to perform the steps associated with the method embodiments.
Alternatively, the computer readable medium carries one or more programs which, when executed by the electronic device, enable the electronic device to perform the steps associated with the method embodiments.
Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware.
It should be understood that portions of the present disclosure may be implemented in hardware, software, firmware, or a combination thereof.
The above description is only for the specific embodiments of the present disclosure, but the scope of the present disclosure is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present disclosure should be covered within the scope of the present disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.
Claims (10)
1. A mobile computing offload method, comprising:
the method comprises the steps that when a target time slice begins, real-time information of an edge server and each health-care Internet of things device is collected, wherein the real-time information of the edge server comprises wireless channel power gain between each Internet of things device and the edge server, and the real-time information of the Internet of things devices comprises calculation task size generated by the Internet of things devices and wireless energy received by the Internet of things devices from a radio frequency energy source;
constructing a local calculation model, an edge calculation model, an energy collection model and a privacy entropy model according to the real-time information of the edge server and the real-time information of each piece of Internet of things equipment;
constructing an objective function according to the local computation model, the edge computation model, the energy collection model and the privacy entropy model;
and maximizing the objective function and solving a task unloading strategy in the objective time slice.
2. The method of claim 1, wherein the wireless channel power gain follows a markov model with a set of states and transition probabilities.
3. The method of claim 1, wherein the local computational model isWherein,representing the local computing power of the Internet of things device i, k is an effective switched capacitor dependent on a chip architecture, Di(t) is wireless energy received by the Internet of things device from a radio frequency energy source, ai(t) represents the task offloading policy of the internet of things device i at the target time slice t, ciRepresenting the computational resources required to compute the 1-bit task.
4. The method of claim 3, wherein the edge calculation model isWherein, Ti loc(T) represents the time delay of local processing of the task generated by the Internet of things device i in the time slice T, Ti tra(T) denotes the transmission delay, Ti edg(t) represents the edge server computation latency,the corresponding transmission energy consumption of the equipment of the Internet of things is represented,and representing the corresponding idle energy consumption of the equipment i of the Internet of things.
5. The method of claim 4, wherein the energy harvesting model isWhere v is the energy conversion efficiency, ρ is the transmitted energy intensity,road stiffness damage index, G represents the combined gain of the radio frequency energy transmitter antenna and the Internet of things equipment antenna, diAnd (t) is the distance between the Internet of things equipment i and the radio frequency energy emitter.
7. the method of claim 1, wherein the objective function is
Wherein, representing each of the Internet of thingsThe battery capacity of the device at each moment does not exceed their maximum value Indicating that the sum of the computing resources allocated to the IOT equipment by the edge server does not exceed the computing resource F of the edge serveredg,And representing the unloading strategy of the equipment of the Internet of things.
8. The method of claim 1, wherein the step of maximizing the objective function and solving a task offload policy within the target timeslice comprises:
solving the target function by using a deep reinforcement learning method to obtain an unloading decision vector in the target time slice;
and generating the task unloading strategy according to the unloading decision vector.
9. A mobile computing offloading system, applied to the mobile computing offloading method of any one of claims 1 to 8, comprising:
an edge server;
a plurality of the internet of things equipment, all the internet of things equipment is in communication connection with the edge server.
10. A non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform the mobile computing offload method of any of preceding claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110960298.0A CN113626107B (en) | 2021-08-20 | 2021-08-20 | Mobile computing unloading method, system and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110960298.0A CN113626107B (en) | 2021-08-20 | 2021-08-20 | Mobile computing unloading method, system and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113626107A true CN113626107A (en) | 2021-11-09 |
CN113626107B CN113626107B (en) | 2024-03-26 |
Family
ID=78386915
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110960298.0A Active CN113626107B (en) | 2021-08-20 | 2021-08-20 | Mobile computing unloading method, system and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113626107B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114528081A (en) * | 2022-02-10 | 2022-05-24 | 绍兴文理学院 | Task unloading optimization method for privacy protection of mobile edge computing user |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108415763A (en) * | 2018-02-11 | 2018-08-17 | 中南大学 | A kind of distribution method of edge calculations system |
CN109460295A (en) * | 2018-10-19 | 2019-03-12 | 中南大学 | A kind of edge calculations performance optimization method based on multi-user's competitive behavior model |
CN109710336A (en) * | 2019-01-11 | 2019-05-03 | 中南林业科技大学 | The mobile edge calculations method for scheduling task of joint energy and delay optimization |
CN109767117A (en) * | 2019-01-11 | 2019-05-17 | 中南林业科技大学 | The power distribution method of Joint Task scheduling in mobile edge calculations |
CN109829332A (en) * | 2019-01-03 | 2019-05-31 | 武汉理工大学 | A kind of combined calculation discharging method and device based on energy collection technology |
CN109947551A (en) * | 2019-03-19 | 2019-06-28 | 中南大学 | A kind of more round method for allocating tasks, edge calculations system and its storage medium |
CN110856259A (en) * | 2019-11-12 | 2020-02-28 | 郑州轻工业学院 | Resource allocation and offloading method for adaptive data block size in mobile edge computing environment |
CN111399933A (en) * | 2020-02-11 | 2020-07-10 | 福建师范大学 | DNN task unloading method and terminal in edge-cloud hybrid computing environment |
CN111552564A (en) * | 2020-04-23 | 2020-08-18 | 中南大学 | Task unloading and resource optimization method based on edge cache |
CN111641681A (en) * | 2020-05-11 | 2020-09-08 | 国家电网有限公司 | Internet of things service unloading decision method based on edge calculation and deep reinforcement learning |
CN111787509A (en) * | 2020-07-14 | 2020-10-16 | 中南大学 | Unmanned aerial vehicle task unloading method and system based on reinforcement learning in edge calculation |
CN112104494A (en) * | 2020-09-09 | 2020-12-18 | 南京信息工程大学 | Task security unloading strategy determination method based on air-ground cooperative edge computing network |
CN112512018A (en) * | 2020-07-24 | 2021-03-16 | 北京航空航天大学 | Method for dynamically unloading tasks among cooperative vehicles based on mobile edge calculation |
CN112749010A (en) * | 2020-12-31 | 2021-05-04 | 中南大学 | Edge calculation task allocation method for fusion recommendation system |
CN112911587A (en) * | 2021-01-26 | 2021-06-04 | 南京邮电大学 | Method for unloading security anti-eavesdropping task by using physical layer under MEC-D2D environment |
-
2021
- 2021-08-20 CN CN202110960298.0A patent/CN113626107B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108415763A (en) * | 2018-02-11 | 2018-08-17 | 中南大学 | A kind of distribution method of edge calculations system |
CN109460295A (en) * | 2018-10-19 | 2019-03-12 | 中南大学 | A kind of edge calculations performance optimization method based on multi-user's competitive behavior model |
CN109829332A (en) * | 2019-01-03 | 2019-05-31 | 武汉理工大学 | A kind of combined calculation discharging method and device based on energy collection technology |
CN109710336A (en) * | 2019-01-11 | 2019-05-03 | 中南林业科技大学 | The mobile edge calculations method for scheduling task of joint energy and delay optimization |
CN109767117A (en) * | 2019-01-11 | 2019-05-17 | 中南林业科技大学 | The power distribution method of Joint Task scheduling in mobile edge calculations |
CN109947551A (en) * | 2019-03-19 | 2019-06-28 | 中南大学 | A kind of more round method for allocating tasks, edge calculations system and its storage medium |
CN110856259A (en) * | 2019-11-12 | 2020-02-28 | 郑州轻工业学院 | Resource allocation and offloading method for adaptive data block size in mobile edge computing environment |
CN111399933A (en) * | 2020-02-11 | 2020-07-10 | 福建师范大学 | DNN task unloading method and terminal in edge-cloud hybrid computing environment |
CN111552564A (en) * | 2020-04-23 | 2020-08-18 | 中南大学 | Task unloading and resource optimization method based on edge cache |
CN111641681A (en) * | 2020-05-11 | 2020-09-08 | 国家电网有限公司 | Internet of things service unloading decision method based on edge calculation and deep reinforcement learning |
CN111787509A (en) * | 2020-07-14 | 2020-10-16 | 中南大学 | Unmanned aerial vehicle task unloading method and system based on reinforcement learning in edge calculation |
CN112512018A (en) * | 2020-07-24 | 2021-03-16 | 北京航空航天大学 | Method for dynamically unloading tasks among cooperative vehicles based on mobile edge calculation |
CN112104494A (en) * | 2020-09-09 | 2020-12-18 | 南京信息工程大学 | Task security unloading strategy determination method based on air-ground cooperative edge computing network |
CN112749010A (en) * | 2020-12-31 | 2021-05-04 | 中南大学 | Edge calculation task allocation method for fusion recommendation system |
CN112911587A (en) * | 2021-01-26 | 2021-06-04 | 南京邮电大学 | Method for unloading security anti-eavesdropping task by using physical layer under MEC-D2D environment |
Non-Patent Citations (1)
Title |
---|
HASNAIN ALI ALMASHHADANI 等: "An Edge-Computing Based Task-Unloading Technique with Privacy Protection for Internet of Connected Vehicles", 《 WIRELESS PERSONAL COMMUNICATIONS 》, vol. 127, 3 July 2021 (2021-07-03), pages 1787 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114528081A (en) * | 2022-02-10 | 2022-05-24 | 绍兴文理学院 | Task unloading optimization method for privacy protection of mobile edge computing user |
CN114528081B (en) * | 2022-02-10 | 2024-08-09 | 绍兴文理学院 | Task unloading optimization method for mobile edge computing user privacy protection |
Also Published As
Publication number | Publication date |
---|---|
CN113626107B (en) | 2024-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhao et al. | A mobility-aware cross-edge computation offloading framework for partitionable applications | |
CN109829332B (en) | Joint calculation unloading method and device based on energy collection technology | |
CN112512063B (en) | Resource allocation method for unmanned aerial vehicle assisted edge computing based on radio frequency energy collection | |
CN110839075A (en) | Service migration method based on particle swarm in edge computing environment | |
JP2017530570A (en) | RF energy harvesting by network nodes | |
CN113286329B (en) | Communication and computing resource joint optimization method based on mobile edge computing | |
CN113156992B (en) | Three-layer architecture collaborative optimization method for unmanned aerial vehicle in edge environment | |
CN110650487B (en) | Internet of things edge computing configuration method based on data privacy protection | |
CN109618399A (en) | Distributed energy management solutions optimization method in the mobile edge calculations system of multi-user | |
CN113727362B (en) | Unloading strategy method of wireless power supply system based on deep reinforcement learning | |
Wu et al. | Residual energy maximization for wireless powered mobile edge computing systems with mixed-offloading | |
CN112383931A (en) | Method for optimizing cost and time delay in multi-user mobile edge computing system | |
CN113626107A (en) | Mobile computing unloading method, system and storage medium | |
CN115802389B (en) | Federal learning method trained by digital twin auxiliary model | |
Zheng et al. | Age-based utility maximization for wireless powered networks: A stackelberg game approach | |
Luo et al. | A nonlinear recursive model based optimal transmission scheduling in RF energy harvesting wireless communications | |
CN116385857A (en) | Calculation power distribution method based on AI intelligent scheduling | |
Wang et al. | Power-minimization computing resource allocation in mobile cloud-radio access network | |
CN115473896A (en) | Electric power internet of things unloading strategy and resource configuration optimization method based on DQN algorithm | |
CN117114113B (en) | Collaborative reasoning acceleration method based on queuing theory | |
Tang et al. | Minimal throughput maximization of UAV-enabled wireless powered communication network in cuboid building perimeter scenario | |
CN114096006A (en) | Resource allocation and data compression joint optimization method in mobile edge computing system | |
Sun et al. | Semantic-driven computation offloading and resource allocation for uav-assisted monitoring system in vehicular networks | |
CN116419325A (en) | Task unloading, resource allocation and track planning method and system for collaborative calculation of multiple unmanned aerial vehicles | |
CN113423115B (en) | Energy collaboration and task unloading optimization method based on edge calculation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |