Wireless Communications and Mobile Computing最新文献

筛选
英文 中文
Improvement of Apriori Algorithm Using Parallelization Technique on Multi-CPU and GPU Topology 在多 CPU 和 GPU 拓扑上使用并行化技术改进 Apriori 算法
Wireless Communications and Mobile Computing Pub Date : 2024-05-31 DOI: 10.1155/2024/7716976
Hooman Bavarsad Salehpour, Hamid Haj Seyyed Javadi, Parvaneh Asghari, Mohammad Ebrahim Shiri Ahmad Abadi
{"title":"Improvement of Apriori Algorithm Using Parallelization Technique on Multi-CPU and GPU Topology","authors":"Hooman Bavarsad Salehpour, Hamid Haj Seyyed Javadi, Parvaneh Asghari, Mohammad Ebrahim Shiri Ahmad Abadi","doi":"10.1155/2024/7716976","DOIUrl":"https://doi.org/10.1155/2024/7716976","url":null,"abstract":"In the domain of data mining, the extraction of frequent patterns from expansive datasets remains a daunting task, compounded by the intricacies of temporal and spatial dimensions. While the Apriori algorithm is seminal in this area, its constraints are accentuated when navigating larger datasets. In response, we introduce an avant-garde solution that leverages parallel network topologies and GPUs. At the heart of our method are two salient features: (1) the use of parallel processing to expedite the realization of optimal results and (2) the integration of the cat and mouse-based optimizer (CMBO) algorithm, an astute algorithm mirroring the instinctual dynamics between predatory cats and evasive mice. This optimizer is structured around a biphasic model: an initial aggressive pursuit by the cats and a subsequent calculated evasion by the mice. This structure is enriched by classifying agents using their objective function scores. Complementing this, our architectural blueprint seamlessly amalgamates dual Nvidia graphics cards in a parallel configuration, establishing a marked ascendancy over conventional CPUs. In amalgamation, our approach not only rectifies the inherent shortfalls of the Apriori algorithm but also accentuates the extraction of association rules, pinpointing frequent patterns with enhanced precision. A comprehensive evaluation across a spectrum of network topologies explains their respective merits and demerits. Set against the benchmark of the Apriori algorithm, our method conspicuously outperforms in terms of speed and effectiveness, heralding a significant stride forward in data mining research.","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"137 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141189265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Agent-Based Load-Balancing Approach Used in an IaaS Platform IaaS 平台中使用的基于代理的混合负载均衡方法
Wireless Communications and Mobile Computing Pub Date : 2024-04-26 DOI: 10.1155/2024/2357142
Shoney Sebastian, Iyyappan. MIn, Sultan Ahmad, Mohammad Maqbool Waris, Hikmat A. M. Abdeljaber, Jabeen Nazeer
{"title":"Hybrid Agent-Based Load-Balancing Approach Used in an IaaS Platform","authors":"Shoney Sebastian, Iyyappan. MIn, Sultan Ahmad, Mohammad Maqbool Waris, Hikmat A. M. Abdeljaber, Jabeen Nazeer","doi":"10.1155/2024/2357142","DOIUrl":"https://doi.org/10.1155/2024/2357142","url":null,"abstract":"Cloud computing has received a resounding welcome. It was created following methodical and thorough study in web services, distributed computing, utility computing, and virtualization, and it offers several benefits, including lower costs, less space required, and easier management. These advantages bring in a significant number of new users to the cloud platform every day. In addition, because cloud computing is an Internet-based computing paradigm, it must deal with the issue of overwhelming demands through effective load-balancing. A very small number of studies only focus on load-balancing problems in cloud computing platforms, while the majority of load-balancing research is accessible in many domains, including parallel, distributed, and grid computing. Infrastructure as a Service (IaaS), Software as a Service, and Platform as a Service are the three basic categories under which cloud computing falls. For these models, there are notable differences in the load-balancing techniques used. This work compared the outcome with the current method and presented a hybrid agent-based load-balancing approach for the IaaS platform.","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140804785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical Cross Traffic Scheduling Based on Time-Aware Shapers for Mobile Time-Sensitive Fronthaul Network 基于时间感知整形器的分层交叉流量调度,适用于移动时敏前端网络
Wireless Communications and Mobile Computing Pub Date : 2024-04-15 DOI: 10.1155/2024/8882006
Chang Liu, Yue Hong, Jin Wang, Chang Liu Sr., Li Tian, Jiangpei Xu
{"title":"Hierarchical Cross Traffic Scheduling Based on Time-Aware Shapers for Mobile Time-Sensitive Fronthaul Network","authors":"Chang Liu, Yue Hong, Jin Wang, Chang Liu Sr., Li Tian, Jiangpei Xu","doi":"10.1155/2024/8882006","DOIUrl":"https://doi.org/10.1155/2024/8882006","url":null,"abstract":"To solve the problem of jitter and low network throughput caused by the impact of background flows on IQ traffic in mobile fronthaul network, this paper proposed a new scheduling model for background flows, named hierarchical crossover traffic scheduling mechanism based on time-aware shaper (HC-TAS) by improving the traditional counterpart. Then, in this new model, we designed an inbound scheduling algorithm based on frame length matching and an outbound scheduling algorithm based on queue status, making sure that smaller data frames will not be blocked by large data frames. This greatly improves the utilization of timeslots in the scheduling process and reduces the jitter impact of background flows. To verify its performance, we conducted experiments in a simulated fronthaul network conforming to IEEE 802.1CM. The experimental results show that, under the condition that the jitter is guaranteed to be zero, compared with two mainstream scheduling schemes, Comb-FITting and TAS + Preemption, our proposed scheme can achieve lower maximum end-to-end delay and higher link utilization. The proposed HC-TAS meets the requirements of low jitter and high bandwidth utilization in 5G fronthaul network, and the research results provide a technical basis for the application and development of general time-sensitive networks as well.","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"56 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140588630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Performance of MMSE Channel Estimation in Massive MIMO Systems over Spatially Correlated Rician Fading Channels 论大规模多输入多输出(Massive MIMO)系统在空间相关的里杉衰减信道上的 MMSE 信道估计性能
Wireless Communications and Mobile Computing Pub Date : 2024-04-12 DOI: 10.1155/2024/5445725
Jorge F. Arellano, Carlos Daniel Altamirano, Henry Ramiro Carvajal Mora, Nathaly Verónica Orozco Garzón, Fernando Darío Almeida García
{"title":"On the Performance of MMSE Channel Estimation in Massive MIMO Systems over Spatially Correlated Rician Fading Channels","authors":"Jorge F. Arellano, Carlos Daniel Altamirano, Henry Ramiro Carvajal Mora, Nathaly Verónica Orozco Garzón, Fernando Darío Almeida García","doi":"10.1155/2024/5445725","DOIUrl":"https://doi.org/10.1155/2024/5445725","url":null,"abstract":"Massive multiple-input-multiple-output (M-MIMO) offers remarkable advantages in terms of spectral, energy, and hardware efficiency for future wireless systems. However, its performance relies on the accuracy of channel state information (CSI) available at the transceivers. This makes channel estimation pivotal in the context of M-MIMO systems. Prior research has focused on evaluating channel estimation methods under the assumption of spatially uncorrelated fading channel models. In this study, we evaluate the performance of the minimum-mean-square-error (MMSE) estimator in terms of the normalized mean square error (NMSE) in the uplink of M-MIMO systems over spatially correlated Rician fading. The NMSE allows for easy comparison of different M-MIMO configurations, serving as a relative performance indicator. Besides, it is an advantageous metric due to its normalization, scale invariance, and consistent performance indication across diverse scenarios. In the system model, we assume imperfections in channel estimation and that the random angles in the correlation model follow a Gaussian distribution. For this scenario, we derive an accurate closed-form expression for calculating the NMSE, which is validated via Monte-Carlo simulations. Our numerical results reveal that as the Rician <span><svg height=\"9.25986pt\" style=\"vertical-align:-0.2455397pt\" version=\"1.1\" viewbox=\"-0.0498162 -9.01432 13.2658 9.25986\" width=\"13.2658pt\" xmlns=\"http://www.w3.org/2000/svg\" xmlns:xlink=\"http://www.w3.org/1999/xlink\"><g transform=\"matrix(.013,0,0,-0.013,0,0)\"></path></g></svg>-</span>factor decreases, approaching Rayleigh fading conditions, the NMSE improves. Additionally, spatial correlation and a reduction in the antenna array interelement spacing lead to a reduction in NMSE, further enhancing the overall system performance.","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"2017 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140588349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Filtered Multicarrier Modulation Techniques Using Different Windows for 5G and Beyond Wireless Systems 使用不同窗口的滤波多载波调制技术在 5G 及以后无线系统中的应用分析
Wireless Communications and Mobile Computing Pub Date : 2024-03-26 DOI: 10.1155/2024/9428292
Sourav Debnath, Samin Ahmed, S. M. Shamsul Alam
{"title":"Analysis of Filtered Multicarrier Modulation Techniques Using Different Windows for 5G and Beyond Wireless Systems","authors":"Sourav Debnath, Samin Ahmed, S. M. Shamsul Alam","doi":"10.1155/2024/9428292","DOIUrl":"https://doi.org/10.1155/2024/9428292","url":null,"abstract":"In contemporary wireless communication systems, multicarrier modulation schemes have become widely adopted over single-carrier techniques due to their improved capacity to address challenges posed by multipath fading channels, leading to enhanced spectral efficiency. Orthogonal frequency division multiplexing (OFDM), a prevalent multicarrier scheme in 4G, is favored for its ease of implementation, interference resilience, and high data rate provision. But it falls short of meeting the requirements for 5G and beyond due to limitations such as out-of-band (OOB) emissions and cyclic prefixes. This paper introduces the filter bank multicarrier (FBMC) and universal filtered multicarrier (UFMC) with quadrature amplitude modulation (QAM) and phase shift keying (PSK) waveforms through Additive White Gaussian Noise channel (AWGN), Rayleigh fading channel and Rician channel. The objective of this paper is to enhance the performance of UFMC with reduced complexity through the new filtering approach for achieving optimal outcomes. The proposed scheme, incorporating Tukey filtering technique, demonstrates superior performance in reducing peak-to-average power ratio (PAPR) and improving bit error ratio (BER) compared to the original UFMC signal without necessitating additional power increments. Specifically, the UFMC system with Tukey filtering achieves a notable net gain of 5 dB. Simulation results demonstrate that utilizing various filter types in FBMC and UFMC systems, combined with QAM modulation, significantly reduces OOB emissions compared to conventional systems. In aspect to BER, Tukey window showed almost 10<sup>−6</sup> at 15 dB SNR in UFMC which is better than FBMC.","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140317062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Elliptic Curve Menezes–Qu–Vanston-Based Authentication and Encryption Protocol for IoT 基于椭圆曲线梅内塞斯-库-万斯顿的物联网身份验证和加密协议
Wireless Communications and Mobile Computing Pub Date : 2024-03-22 DOI: 10.1155/2024/5998163
Susovan Chanda, Ashish Kr. Luhach, J. Sharmila Anand Francis, Indranil Sengupta, Diptendu Sinha Roy
{"title":"An Elliptic Curve Menezes–Qu–Vanston-Based Authentication and Encryption Protocol for IoT","authors":"Susovan Chanda, Ashish Kr. Luhach, J. Sharmila Anand Francis, Indranil Sengupta, Diptendu Sinha Roy","doi":"10.1155/2024/5998163","DOIUrl":"https://doi.org/10.1155/2024/5998163","url":null,"abstract":"The exponential growth of the Internet of Things (IoT) has led to a surge in data generation, critical for business decisions. Ensuring data authenticity and integrity over unsecured channels is vital, especially due to potential catastrophic consequences of tampered data. However, IoT’s resource constraints and heterogeneous ecosystem present unique security challenges. Traditional public key infrastructure offers strong security but is resource intensive, while existing cloud-based solutions lack comprehensive security and rise to latency and unwanted wastage of energy. In this paper, we propose a universal authentication scheme using edge computing, incorporating fully hashed Elliptic Curve Menezes–Qu–Vanstone (ECMQV) and PUF. This approach provides a scalable and reliable solution. It also provides security against active attacks, addressing man-in-the-middle and impersonation threats. Experimental validation on a Zybo board confirms its effectiveness, offering a robust security solution for the IoT landscape.","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140199008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent Energy-Efficient Data Routing Scheme for Wireless Sensor Networks Utilizing Mobile Sink 利用移动 Sink 的无线传感器网络智能节能数据路由方案
Wireless Communications and Mobile Computing Pub Date : 2024-03-18 DOI: 10.1155/2024/7384537
Hassan Al-Mahdi, Mohamed Elshrkawey, Shymaa Saad, Safa Abdelaziz
{"title":"An Intelligent Energy-Efficient Data Routing Scheme for Wireless Sensor Networks Utilizing Mobile Sink","authors":"Hassan Al-Mahdi, Mohamed Elshrkawey, Shymaa Saad, Safa Abdelaziz","doi":"10.1155/2024/7384537","DOIUrl":"https://doi.org/10.1155/2024/7384537","url":null,"abstract":"Data collection and energy consumption are critical concerns in Wireless sensor networks (WSNs). To address these issues, both clustering and routing algorithms are utilized. Therefore, this paper proposes an intelligent energy-efficient data routing scheme for WSNs utilizing a mobile sink (MS) to save energy and prolong network lifetime. The proposed scheme operates in two major modes: configure and operational modes. During the configure mode, a novel clustering mechanism is applied once, and a prescheduling cluster head (CH) selection is introduced to ensure uniform energy expenditure among sensor nodes (SNs). The scheduling technique selects successive CHs for each cluster throughout the WSNs’ lifetime rounds, managed at the base station (BS) to minimize SN energy consumption. In the operational mode, two main objectives are achieved: sensing and gathering data by each CH with minimal message overhead, and establishing an optimal path for the MS using the genetic algorithm. Finally, the MS uploads the gathered data to the BS. Extensive simulations are conducted to verify the efficiency of the proposed scheme in terms of stability period, network lifetime, average energy consumption, data transmission latency, message overhead, and throughput. The results demonstrate that the proposed scheme outperforms the most recent state-of-the-art methods significantly. The results are substantiated through statistical validation via hypothesis testing utilizing ANOVA, as well as post hoc analysis.","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140149156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Hybrid Feature Selection with Cascaded LSTM: Enhancing Security in IoT Networks 使用级联 LSTM 的新型混合特征选择:增强物联网网络的安全性
Wireless Communications and Mobile Computing Pub Date : 2024-03-13 DOI: 10.1155/2024/5522431
Karthic Sundaram, Yuvaraj Natarajan, Anitha Perumalsamy, Ahmed Abdi Yusuf Ali
{"title":"A Novel Hybrid Feature Selection with Cascaded LSTM: Enhancing Security in IoT Networks","authors":"Karthic Sundaram, Yuvaraj Natarajan, Anitha Perumalsamy, Ahmed Abdi Yusuf Ali","doi":"10.1155/2024/5522431","DOIUrl":"https://doi.org/10.1155/2024/5522431","url":null,"abstract":"The rapid growth of the Internet of Things (IoT) has created a situation where a huge amount of sensitive data is constantly being created and sent through many devices, making data security a top priority. In the complex network of IoT, detecting intrusions becomes a key part of strengthening security. Since IoT environments can be easily affected by a wide range of cyber threats, intrusion detection systems (IDS) are crucial for quickly finding and dealing with potential intrusions as they happen. IDS datasets can have a wide range of features, from just a few to several hundreds or even thousands. Managing such large datasets is a big challenge, requiring a lot of computer power and leading to long processing times. To build an efficient IDS, this article introduces a combined feature selection strategy using recursive feature elimination and information gain. Then, a cascaded long–short-term memory is used to improve attack classifications. This method achieved an accuracy of 98.96% and 99.30% on the NSL-KDD and UNSW-NB15 datasets, respectively, for performing binary classification. This research provides a practical strategy for improving the effectiveness and accuracy of intrusion detection in IoT networks.","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140117324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource Scheduling in URLLC and eMBB Coexistence Based on Dynamic Selection Numerology 基于动态选择数值法的 URLLC 和 eMBB 共存中的资源调度
Wireless Communications and Mobile Computing Pub Date : 2024-02-28 DOI: 10.1155/2024/9480388
Lei Wang, Sijie Tao, Lindong Zhao, Dengyou Zhou, Zhe Liu, Yanbing Sun
{"title":"Resource Scheduling in URLLC and eMBB Coexistence Based on Dynamic Selection Numerology","authors":"Lei Wang, Sijie Tao, Lindong Zhao, Dengyou Zhou, Zhe Liu, Yanbing Sun","doi":"10.1155/2024/9480388","DOIUrl":"https://doi.org/10.1155/2024/9480388","url":null,"abstract":"This paper focuses on the resource allocation problem of multiplexing two different service scenarios, enhanced mobile broadband (eMBB) and ultrareliable low latency (URLLC) in 5G New Radio, based on dynamic numerology structure, mini-time slot scheduling, and puncturing to achieve optimal resource allocation. To obtain the optimal channel resource allocation under URLLC user constraints, this paper establishes a relevant channel model divided into two convex optimization problems: (a) eMBB resource allocation and (b) URLLC scheduling. We also determine the numerology values at the beginning of each time slot with the help of deep reinforcement learning to achieve flexible resource scheduling. The proposed algorithm is verified in simulation software, and the simulation results show that the dynamic selection of numerologies proposed in this paper can better improve the data transmission rate of eMBB users and reduce the latency of URLLC services compared with the fixed numerology scheme for the same URLLC packet arrival, while the reasonable resource allocation ensures the reliability of URLLC and eMBB communication.","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140002451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability-Constrained Task Scheduling for DAG Applications in Mobile Edge Computing 移动边缘计算中 DAG 应用的可靠性受限任务调度
Wireless Communications and Mobile Computing Pub Date : 2024-01-29 DOI: 10.1155/2024/6980514
Liangbin Zhu, Ying Shang, Jinglei Li, Yiming Jia, Qinghai Yang
{"title":"Reliability-Constrained Task Scheduling for DAG Applications in Mobile Edge Computing","authors":"Liangbin Zhu, Ying Shang, Jinglei Li, Yiming Jia, Qinghai Yang","doi":"10.1155/2024/6980514","DOIUrl":"https://doi.org/10.1155/2024/6980514","url":null,"abstract":"The development of the internet of things (IoT) and 6G has given rise to numerous computation-intensive and latency-sensitive applications, which can be represented as directed acyclic graphs (DAGs). However, achieving these applications poses a huge challenge for user equipment (UE) that are constrained in computational power and battery capacity. In this paper, considering different requirements in various task scenarios, we aim to optimize the execution latency and energy consumption of the entire mobile edge computing (MEC) system. The system consists of single UE and multiple heterogeneous MEC servers to improve the execution efficiency of a DAG application. In addition, the execution reliability of a DAG application is viewed as a constraint. Based on the strong search capability and Pareto optimality theory of the cuckoo search (CS) algorithm and our previously proposed improved multiobjective cuckoo search (IMOCS) algorithm, we improve the initialization process and the update strategy of the external archive, and propose a reliability-constrained multiobjective cuckoo search (RCMOCS) algorithm. According to the simulation results, our proposed RCMOCS algorithm is able to obtain better Pareto frontiers and achieve satisfactory performance while ensuring execution reliability.","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"55 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139578084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信