Joint optimisation for time consumption and energy consumption of multi-application and load balancing of cloudlets in mobile edge computing

被引:9
作者
Peng, Kai [1 ]
Huang, Hualong [1 ]
Pan, Wenjie [1 ]
Wang, Jiabin [1 ]
机构
[1] Huaqiao Univ, Coll Engn, Quanzhou, Fujian, Peoples R China
基金
美国国家科学基金会;
关键词
cloud computing; genetic algorithms; mobile computing; resource allocation; power aware computing; MEC; effective assistant technology; mobile devices; MD; power consumption; user-oriented use case; finite computation capabilities; energy consumption; multiuser multiapplication computation offloading method; multicloudlet environment; joint optimisation; mobile edge computing; COMPUTATION OFFLOADING METHOD; SERVICE RECOMMENDATION; BIG-DATA; SELECTION; SYSTEMS;
D O I
10.1049/iet-cps.2019.0085
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile edge computing (MEC) is an effective assistant technology that can overcome some defects of cloud computing. For the sake of alleviating the clashes between the capability constraint of cloudlets and the needs of mobile devices (MDs) for reducing executing latency as well as decreasing the power consumption of MDs, a user-oriented use case in the MEC named computation offloading is taken into consideration. Computation offloading is capable of effectively making the MEC adapt to the resources of cloudlets and MDs in different environments, and it is very beneficial to the development of the internet of things. Owing to the finite computation capabilities of the MDs and the resources of cloudlets are heterogeneous and limited; a three-objective model is established to optimise the time consumption, and the energy consumption of MDs as well as the load balancing of cloudlets jointly. Technically, the authors propose an effective multi-user multi-application computation offloading method in the multi-cloudlet environment on the basis of improved non-dominated sorting genetic algorithm III. Finally, comprehensive experiments and analysis were conducted to validate the effectiveness and efficiency of the proposed method.
引用
收藏
页码:196 / 206
页数:11
相关论文
共 49 条
[1]  
Afshari Alireza, 2010, Int. J. Innov. Technol. Manag, V1, P511, DOI DOI 10.7763/IJIMT.2010.V1.89
[2]   Joint Cloudlet Selection and Latency Minimization in Fog Networks [J].
Ali, Mudassar ;
Riaz, Nida ;
Ashraf, Muhammad Ikram ;
Qaisar, Saad ;
Naeem, Muhammad .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (09) :4055-4063
[3]  
[Anonymous], The Internet of Things - How the Next Evolution of the Internet is Changing Everything
[4]  
Aruldoss M., 2013, American Journal of Information Systems, DOI [10.12691/ajis-1-1-5, DOI 10.12691/AJIS-1-1-5]
[5]   Enabling cyber-physical communication in 5G cellular networks: Challenges, spatial spectrum sensing, and cyber-security [J].
Liu, Lingjia (lingjialiu@gmail.com), 1600, Institution of Engineering and Technology, United States (02)
[6]   Big Data Driven Vehicular Networks [J].
Cheng, Nan ;
Lyu, Feng ;
Chen, Jiayin ;
Xu, Wenchao ;
Zhou, Haibo ;
Zhang, Shan ;
Shen, Xuemin .
IEEE NETWORK, 2018, 32 (06) :160-167
[7]   An Evolutionary Many-Objective Optimization Algorithm Using Reference-Point-Based Nondominated Sorting Approach, Part I: Solving Problems With Box Constraints [J].
Deb, Kalyanmoy ;
Jain, Himanshu .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2014, 18 (04) :577-601
[8]   Fault data injection attack on car-following model and mitigation based on interval type-2 fuzzy logic controller [J].
Gunasekaran, Prabhakar ;
Sundaramoorthy, Selvaperumal ;
Pulikesi, Nedumal Pugazhenthi .
IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2019, 4 (02) :128-138
[9]   Cyber-physical attacks and defences in the smart grid: a surveyInspec keywordsOther keywords [J].
He, Haibo ;
Yan, Jun .
IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2016, 1 (01) :13-27
[10]   Neck Muscles Fatigue Evaluation of Subway Phubber Based on sEMG Signals [J].
Jia, Miao ;
Yang, Zhongliang ;
Chen, Yumiao ;
Wen, Yangliang .
2018 11TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2018, :141-144