[HTML][HTML] Machine learning-based offloading strategy for lightweight user mobile edge computing tasks

S Zhou, W Jadoon, J Shuja - Complexity, 2021 - hindawi.com
S Zhou, W Jadoon, J Shuja
Complexity, 2021hindawi.com
This paper presents an in-depth study and analysis of offloading strategies for lightweight
user mobile edge computing tasks using a machine learning approach. Firstly, a scheme for
multiuser frequency division multiplexing approach in mobile edge computing offloading is
proposed, and a mixed-integer nonlinear optimization model for energy consumption
minimization is developed. Then, based on the analysis of the concave-convex properties of
this optimization model, this paper uses variable relaxation and nonconvex optimization …
This paper presents an in-depth study and analysis of offloading strategies for lightweight user mobile edge computing tasks using a machine learning approach. Firstly, a scheme for multiuser frequency division multiplexing approach in mobile edge computing offloading is proposed, and a mixed-integer nonlinear optimization model for energy consumption minimization is developed. Then, based on the analysis of the concave-convex properties of this optimization model, this paper uses variable relaxation and nonconvex optimization theory to transform the problem into a convex optimization problem. Subsequently, two optimization algorithms are designed: for the relaxation optimization problem, an iterative optimization algorithm based on the Lagrange dual method is designed; based on the branch-and-bound integer programming method, the iterative optimization algorithm is used as the basic algorithm for each step of the operation, and a global optimization algorithm is designed for transmitting power allocation, computational offloading strategy, dynamic adjustment of local computing power, and receiving energy channel selection strategy. Finally, the simulation results verify that the scheduling strategy of the frequency division technique proposed in this paper has good energy consumption minimization performance in mobile edge computation offloading. Our model is highly efficient and has a high degree of accuracy. The anomaly detection method based on a decision tree combined with deep learning proposed in this paper, unlike traditional IoT attack detection methods, overcomes the drawbacks of rule-based security detection methods and enables them to adapt to both established and unknown hostile environments. Experimental results show that the attack detection system based on the model achieves good detection results in the detection of multiple attacks.
hindawi.com
以上显示的是最相近的搜索结果。 查看全部搜索结果