Energy and task completion time minimization algorithm for UAVs-empowered MEC SYSTEM

被引:17
作者
Asim, Muhammad [1 ]
Mashwani, Wali Khan [2 ]
Abd El-Latif, Ahmed A. [3 ,4 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
[2] Kohat Univ Sci & Technol, Inst Numer Sci, Kohat, Pakistan
[3] Prince Sultan Univ, Coll Comp & Informat Sci, EIAS Data Sci Lab, Riyadh 11586, Saudi Arabia
[4] Menoufia Univ, Fac Sci, Dept Math & Comp Sci, Al Minufiyah 32511, Egypt
关键词
Mobile edge computing; Unmanned aerial vehicle; Differential evolution; Clustering algorithm; Tabu search algorithm; TABU SEARCH; EDGE; OPTIMIZATION; FRAMEWORK; SECURE; LINKS; IOT;
D O I
10.1016/j.suscom.2022.100698
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents an energy and task completion time minimization scheme for the unmanned aerial vehicles (UAVs)-empowered mobile edge computing (MEC) system, where several UAVs are deployed to serve large-scale users' equipment (UEs). The aim is to minimize the weighted sum of energy consumption and task completion time of the system by planning the trajectories of UAVs. The problem is NP-hard, non-convex, non-linear, and mixed-decision variables. Therefore, it is very challenging to be solved by conventional optimization techniques. To handle this problem, this paper proposes an energy and task completion time minimization algorithm (ETCTMA) that solves the above problem in three steps. In the first step, the deployment updation of stop points (SPs) is handled by adopting a differential evolution algorithm with a variable population size. Then, in the second step, the association between SPs and UAVs is determined. Specifically, a clustering algorithm is proposed to associate SPs with UAVs. Finally, in the third step, a low-complexity tabu search algorithm is adopted to construct the trajectories of all UAVs. The performance of the proposed ETCTMA is tested on seven instances with up to 700 UEs. The results reveal that our proposed algorithm ETCTMA outperforms other variants in terms of minimizing the weighted sum of energy consumption and task completion time of the system.
引用
收藏
页数:9
相关论文
共 59 条
  • [1] Cartesian path generation of robot manipulators using continuous genetic algorithms
    Abo-Hammour, ZS
    Mirza, NM
    Mirza, SM
    Arif, M
    [J]. ROBOTICS AND AUTONOMOUS SYSTEMS, 2002, 41 (04) : 179 - 223
  • [2] DITrust Chain: Towards Blockchain-Based Trust Models for Sustainable Healthcare IoT Systems
    Abou-Nassar, Eman M.
    Iliyasu, Abdullah M.
    El-Kafrawy, Passent M.
    Song, Oh-Young
    Bashir, Ali Kashif
    Abd El-Latif, Ahmed A.
    [J]. IEEE ACCESS, 2020, 8 : 111223 - 111238
  • [3] Intelligent computational methods for multi-unmanned aerial vehicle-enabled autonomous mobile edge computing systems
    Asim, Muhammad
    Abd El-Latif, Ahmed A.
    [J]. ISA TRANSACTIONS, 2023, 132 : 5 - 15
  • [4] An evolutionary trajectory planning algorithm for multi-UAV-assisted MEC system
    Asim, Muhammad
    Mashwani, Wali Khan
    Shah, Habib
    Belhaouari, Samir Brahim
    [J]. SOFT COMPUTING, 2022, 26 (16) : 7479 - 7492
  • [5] A Novel Genetic Trajectory Planning Algorithm With Variable Population Size for Multi-UAV-Assisted Mobile Edge Computing System
    Asim, Muhammad
    Mashwani, Wali Khan
    Belhaouari, Samir Brahim
    Hassan, Saima
    [J]. IEEE ACCESS, 2021, 9 (09): : 125569 - 125579
  • [6] A Review on Computational Intelligence Techniques in Cloud and Edge Computing
    Asim, Muhammad
    Wang, Yong
    Wang, Kezhi
    Huang, Pei-Qiu
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2020, 4 (06): : 742 - 763
  • [7] Computational intelligence and IoT-Enabled COVID-19 response: Technology landscape
    Banyal S.
    Banyal S.
    Sharma D.K.
    [J]. IEEE Internet of Things Magazine, 2021, 4 (03): : 42 - 47
  • [8] Basu Sumantha., 2012, AM J OPERATIONS RES, V2, P163, DOI DOI 10.4236/AJOR.2012.22019
  • [9] Security and privacy of UAV data using blockchain technology
    Ch, Rupa
    Srivastava, Gautam
    Gadekallu, Thippa Reddy
    Maddikunta, Praveen Kumar Reddy
    Bhattacharya, Sweta
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55 (55)
  • [10] Energy-Efficient Relay-Based Void Hole Prevention and Repair in Clustered Multi-AUV Underwater Wireless Sensor Network
    Chaaf, Amir
    Muthanna, Mohammed Saleh Ali
    Muthanna, Ammar
    Alhelaly, Soha
    Elgendy, Ibrahim A.
    Iliyasu, Abdullah M.
    Abd El-Latif, Ahmed A.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021