delay constraint
Recently Published Documents


TOTAL DOCUMENTS

259
(FIVE YEARS 42)

H-INDEX

15
(FIVE YEARS 4)

2021 ◽  
Vol 12 (1) ◽  
pp. 384
Author(s):  
Seolwon Koo ◽  
Yujin Lim

In the Industrial Internet of Things (IIoT), various tasks are created dynamically because of the small quantity batch production. Hence, it is difficult to execute tasks only with devices that have limited battery lives and computation capabilities. To solve this problem, we adopted the mobile edge computing (MEC) paradigm. However, if there are numerous tasks to be processed on the MEC server (MECS), it may not be suitable to deal with all tasks in the server within a delay constraint owing to the limited computational capability and high network overhead. Therefore, among cooperative computing techniques, we focus on task offloading to nearby devices using device-to-device (D2D) communication. Consequently, we propose a method that determines the optimal offloading strategy in an MEC environment with D2D communication. We aim to minimize the energy consumption of the devices and task execution delay under certain delay constraints. To solve this problem, we adopt a Q-learning algorithm that is part of reinforcement learning (RL). However, if one learning agent determines whether to offload tasks from all devices, the computing complexity of that agent increases tremendously. Thus, we cluster the nearby devices that comprise the job shop, where each cluster’s head determines the optimal offloading strategy for the tasks that occur within its cluster. Simulation results show that the proposed algorithm outperforms the compared methods in terms of device energy consumption, task completion rate, task blocking rate, and throughput.


2021 ◽  
Author(s):  
Binod Prasad ◽  
Gopal Chandra Das ◽  
Srinivas Nallagonda ◽  
Seemanti Saha ◽  
Abhijit Bhowmick

Abstract The performance of a relay based Half-Duplex (HD) and Full-Duplex (FD) cooperative cognitive radio (CR) network with a RF energy harvesting (EH) is studied in this paper. Co-operative environment includes a network with multiple primary users (PUs), and CRs. The relay node is considered as an EH node which harvests energy (HE) from RF signal (RFS) of source and loop-back interference. The network performance is studied for instantaneous transmission and delay constraint transmission for decode and forward (DF) relaying protocol. The performance is investigated under a relay energy outage constraint and the expression of throughput is redesigned. Expressions of energy outage, data outage and throughput for HD and FD are developed. The impact of several parameters such as transmitting SNR, fractional harvesting time parameter, fractional transmission time parameter, and loop-back interference on the system throughput has been investigated.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Xinyue Hu ◽  
Xiaoke Tang ◽  
Yantao Yu ◽  
Sihai Qiu ◽  
Shiyong Chen

The introduction of mobile edge computing (MEC) in vehicular network has been a promising paradigm to improve vehicular services by offloading computation-intensive tasks to the MEC server. To avoid the overload phenomenon in MEC server, the vast idle resources of parked vehicles can be utilized to effectively relieve the computational burden on the server. Furthermore, unbalanced load allocation may cause larger latency and energy consumption. To solve the problem, the reported works preferred to allocate workload between MEC server and single parked vehicle. In this paper, a multiple parked vehicle-assisted edge computing (MPVEC) paradigm is first introduced. A joint load balancing and offloading optimization problem is formulated to minimize the system cost under delay constraint. In order to accomplish the offloading tasks, a multiple offloading node selection algorithm is proposed to select several appropriate PVs to collaborate with the MEC server in computing tasks. Furthermore, a workload allocation strategy based on dynamic game is presented to optimize the system performance with jointly considering the workload balance among computing nodes. Numerical results indicate that the offloading strategy in MPVEC scheme can significantly reduce the system cost and load balancing of the system can be achieved.


2021 ◽  
Vol 13 (11) ◽  
pp. 287
Author(s):  
Lopamudra Hota ◽  
Biraja Prasad Nayak ◽  
Arun Kumar ◽  
G. G. Md. Nawaz Ali ◽  
Peter Han Joo Chong

Traffic density around the globe is increasing on a day-to-day basis, resulting in more accidents, congestion, and pollution. The dynamic vehicular environment induces challenges in designing an efficient and reliable protocol for communication. Timely delivery of safety and non-safety messages is necessary for traffic congestion control and for avoiding road mishaps. For efficient resource sharing and optimized channel utilization, the media access control (MAC) protocol plays a vital role. An efficient MAC protocol design can provide fair channel access and can delay constraint safety message dissemination, improving road safety. This paper reviews the applications, characteristics, and challenges faced in the design of MAC protocols. A classification of the MAC protocol is presented based on contention mechanisms and channel access. The classification based on contention is oriented as contention-based, contention-free, and hybrid, whereas the classification based on channel access is categorized as distributed, centralized, cluster-based, cooperative, token-based, and random access. These are further sub-classified as single-channel and multi-channel, based on the type of channel resources they utilize. This paper gives an analysis of the objectives, mechanisms, advantages/disadvantages, and simulators used in specified protocols. Finally, the paper concludes with a discussion on the future scope and open challenges for improving the MAC protocol design.


2021 ◽  
pp. 102756
Author(s):  
Haiqing Yao ◽  
Chaoqun Zheng ◽  
Xiuwen Fu ◽  
Yongsheng Yang ◽  
Ioan Ungurean

Sensors ◽  
2021 ◽  
Vol 21 (20) ◽  
pp. 6807
Author(s):  
Yong Xie ◽  
Yili Guo ◽  
Sheng Yang ◽  
Jian Zhou ◽  
Xiaobai Chen

The introduction of various networks into automotive cyber-physical systems (ACPS) brings great challenges on security protection of ACPS functions, the auto industry recommends to adopt the hardware security module (HSM)-based multicore ECU to secure in-vehicle networks while meeting the delay constraint. However, this approach incurs significant hardware cost. Consequently, this paper aims to reduce security enhancing-related hardware cost by proposing two efficient design space exploration (DSE) algorithms, namely, stepwise decreasing-based heuristic algorithm (SDH) and interference balancing-based heuristic algorithm (IBH), which explore the task assignment, task scheduling, and message scheduling to minimize the number of required HSMs. Experiments on both synthetical and real data sets show that the proposed SDH and IBH are superior than state-of-the-art algorithm, and the advantage of SDH and IBH becomes more obvious as the increase about the percentage of security-critical tasks. For synthetic data sets, the hardware cost can be reduced by 61.4% and 45.6% averagely for IBH and SDH, respectively; for real data sets, the hardware cost can be reduced by 64.3% and 54.4% on average for IBH and SDH, respectively. Furthermore, IBH is better than SDH in most cases, and the runtime of IBH is two or three orders of magnitude smaller than SDH and state-of-the-art algorithm.


Author(s):  
Yuda Lin ◽  
Liang Jin ◽  
Kaizhi Huang ◽  
Feihu Wang ◽  
Jinmei Yang

Sign in / Sign up

Export Citation Format

Share Document