34 research outputs found

    Joint Resources and Workflow Scheduling in UAV-Enabled Wirelessly-Powered MEC for IoT Systems

    Get PDF
    This paper considers a UAV-enabled mobile edge computing (MEC) system, where a UAV first powers the Internet of things device (IoTD) by utilizing Wireless Power Transfer (WPT) technology. Then each IoTD sends the collected data to the UAV for processing by using the energy harvested from the UAV. In order to improve the energy efficiency of the UAV, we propose a new time division multiple access (TDMA) based workflow model, which allows parallel transmissions and executions in the UAV-assisted system. We aim to minimize the total energy consumption of the UAV by jointly optimizing the IoTDs association, computing resources allocation, UAV hovering time, wireless powering duration and the services sequence of the IoTDs. The formulated problem is a mixed-integer non-convex problem, which is very difficult to solve in general. We transform and relax it into a convex problem and apply flow-shop scheduling techniques to address it. Furthermore, an alternative algorithm is developed to set the initial point closer to the optimal solution. Simulation results show that the total energy consumption of the UAV can be effectively reduced by the proposed scheme compared with the conventional systems

    Mobile edge computing in wireless communication networks: design and optimization

    Get PDF
    This dissertation studies the design and optimization of applying mobile edge computing (MEC) in three kinds of advanced wireless networks, which is motivated by three non-trivial but not thoroughly studied topics in the existing MEC-related literature. First, we study the application of MEC in wireless powered cooperation-assisted systems. The technology of wireless power transfer (WPT) used at the access point (AP) is capable of providing sustainable energy supply for resource-limited user equipment (UEs) to support computation offloading, but also introduces the double-near-far effect into wireless powered communication networks (WPCNs). By leveraging cooperation among near-far users, the system performance can be highly improved through effectively suppressing the double-near-far effect in WPCNs. Then, we consider the application of MEC in the unmanned aerial vehicle (UAV)-assisted relaying systems to make better use of the flexible features of UAV as well as its computing resources. The adopted UAV not only acts as an MEC server to help compute UEs' offloaded tasks but also a relay to forward UEs' offloaded tasks to the AP, thus such kind of cooperation between the UAV and the AP can take the advantages of both sides so as to improve the system performance. Last, heterogeneous cellular networks (HetNets) with the coexistence of MEC and central cloud computing (CCC) are studied to show the complementary and promotional effects between MEC and CCC. The small base stations (SBSs) empowered by edge clouds offer limited edge computing services for UEs, whereas the macro base station (MBS) provides high-performance CCC services for UEs via restricted multiple-input multiple-output (MIMO) backhauls to their associated SBSs. With further considering the case with massive MIMO backhauls, the system performance can be further improved while significantly reducing the computational complexity. In the aforementioned three advanced MEC systems, we mainly focus on minimizing the energy consumption of the systems subject to proper latency constraints, due to the fact that energy consumption and latency are regarded as two important metrics for measuring the performance of MEC-related works. Effective optimization algorithms are proposed to solve the corresponding energy minimization problems, which are further validated by numerical results

    A survey on intelligent computation offloading and pricing strategy in UAV-Enabled MEC network: Challenges and research directions

    Get PDF
    The lack of resource constraints for edge servers makes it difficult to simultaneously perform a large number of Mobile Devices’ (MDs) requests. The Mobile Network Operator (MNO) must then select how to delegate MD queries to its Mobile Edge Computing (MEC) server in order to maximize the overall benefit of admitted requests with varying latency needs. Unmanned Aerial Vehicles (UAVs) and Artificial Intelligent (AI) can increase MNO performance because of their flexibility in deployment, high mobility of UAV, and efficiency of AI algorithms. There is a trade-off between the cost incurred by the MD and the profit received by the MNO. Intelligent computing offloading to UAV-enabled MEC, on the other hand, is a promising way to bridge the gap between MDs' limited processing resources, as well as the intelligent algorithms that are utilized for computation offloading in the UAV-MEC network and the high computing demands of upcoming applications. This study looks at some of the research on the benefits of computation offloading process in the UAV-MEC network, as well as the intelligent models that are utilized for computation offloading in the UAV-MEC network. In addition, this article examines several intelligent pricing techniques in different structures in the UAV-MEC network. Finally, this work highlights some important open research issues and future research directions of Artificial Intelligent (AI) in computation offloading and applying intelligent pricing strategies in the UAV-MEC network

    Secure NOMA-Based UAV-MEC Network Towards a Flying Eavesdropper

    Get PDF
    Non-orthogonal multiple access (NOMA) allows multiple users to share link resource for higher spectrum efficiency. It can be applied to unmanned aerial vehicle (UAV) and mobile edge computing (MEC) networks to provide convenient offloading computing service for ground users (GUs) with large-scale access. However, due to the line-of-sight (LoS) of UAV transmission, the information can be easily eavesdropped in NOMA-based UAV-MEC networks. In this paper, we propose a secure communication scheme for the NOMA-based UAV-MEC system towards a flying eavesdropper. In the proposed scheme, the average security computation capacity of the system is maximized while guaranteeing a minimum security computation requirement for each GU. Due to the uncertainty of the eavesdropper’s position, the coupling of multi-variables and the non-convexity of the problem, we first study the worst security situation through mathematical derivation. Then, the problem is solved by utilizing successive convex approximation (SCA) and block coordinate descent (BCD) methods with respect to channel coefficient, transmit power, central processing unit (CPU) computation frequency, local computation and UAV trajectory. Simulation results show that the proposed scheme is superior to the benchmarks in terms of the system security computation performance

    A survey of multi-access edge computing in 5G and beyond : fundamentals, technology integration, and state-of-the-art

    Get PDF
    Driven by the emergence of new compute-intensive applications and the vision of the Internet of Things (IoT), it is foreseen that the emerging 5G network will face an unprecedented increase in traffic volume and computation demands. However, end users mostly have limited storage capacities and finite processing capabilities, thus how to run compute-intensive applications on resource-constrained users has recently become a natural concern. Mobile edge computing (MEC), a key technology in the emerging fifth generation (5G) network, can optimize mobile resources by hosting compute-intensive applications, process large data before sending to the cloud, provide the cloud-computing capabilities within the radio access network (RAN) in close proximity to mobile users, and offer context-aware services with the help of RAN information. Therefore, MEC enables a wide variety of applications, where the real-time response is strictly required, e.g., driverless vehicles, augmented reality, robotics, and immerse media. Indeed, the paradigm shift from 4G to 5G could become a reality with the advent of new technological concepts. The successful realization of MEC in the 5G network is still in its infancy and demands for constant efforts from both academic and industry communities. In this survey, we first provide a holistic overview of MEC technology and its potential use cases and applications. Then, we outline up-to-date researches on the integration of MEC with the new technologies that will be deployed in 5G and beyond. We also summarize testbeds and experimental evaluations, and open source activities, for edge computing. We further summarize lessons learned from state-of-the-art research works as well as discuss challenges and potential future directions for MEC research

    Minimal Throughput Maximization of UAV-enabled Wireless Powered Communication Network in Cuboid Building Perimeter Scenario

    Get PDF
    As the number of Internet of Things Devices (IoTDs) increases, the building Structural Health Monitoring (SHM) system is subject to the enormous amount of data collected from sensors. To tackle this challenge, we investigate an Unmanned Aerial Vehicle (UAV)-enabled Wireless Powered Communication Network (WPCN) in a building SHM scenario where a UAV is dispatched to provide wireless charging and data relaying services for IoTDs on the building. For preventing the channel blockage caused by the building, we place the UAV and Access Points (APs) in specific trajectory and locations, respectively. To improve the system’s throughput, we maximize the minimum data volume among devices in a given period by formulating an optimization problem in which we jointly optimize the link schedule, the power and time allocation and the hovering positions of the UAV. However, the formulated problem is a mixed-integer nonlinear programming and is hard to solve. Therefore, we adopt a bottleneck-aware idea to reduce the dimensionality of the optimization variables in order to obtain a simplified problem that can be solved in a low-complexity way. Also, the Block Coordinate Descent (BCD) method is applied to reduce the complexity of the problem. Meanwhile, we further propose a method to deal with the heterogeneous problem for improving the generalizability of our algorithm. To estimate the performance of our proposed algorithm, we compare it with the Monte Carlo (MC) method, Game Theory (GT) and Particle Swarm Optimization (PSO). The simulation results indicate that our algorithm can obtain better performance

    Joint communication and computation resource scheduling of a UAV-assisted mobile edge computing system for platooning vehicles

    Get PDF
    Connected and autonomous vehicles (CAVs) are recently envisioned to provide a tremendous social impact, while they put forward a much higher requirement for both vehicular communication and computation capacities to process resource-intensive applications. In this paper, we study unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) for a platoon of wireless power transmission (WPT)-enabled vehicles. Our objective is to maximize the system-wide computation capacity under both communication and computation resource constraints. We incorporate the coupled effects of the platooning vehicles and the flying UAV, air-to-ground (A2G) and ground-to-air (G2A) communications, onboard computing and energy harvesting into a joint scheduling optimization model of communication and computation resources. To tackle the resulting optimization problem, we propose a successive convex programming method based on a second-order convex approximation, in which feasible search directions are obtained by solving a sequence of quadratic programming subproblems and used to generate feasible points that can approach a local optimum. We also theoretically prove the feasibility and convergence of the proposed method. Moreover, simulation results are provided to validate the effectiveness of our proposed method and demonstrate its superior performance over other conventional schemes
    corecore