
The development of the global model is an important part of research involving the quality prediction of agricultural commodities using visible/near-infrared (Vis/NIR) spectroscopy due to its efficiency and effectiveness. The Vis/NIR was used in this study to develop a global model and to evaluate the sugar content and pulp color, which are the main determinants of ripeness and quality of melons. Furthermore, it also provides a comparison between linear and nonlinear regression using partial least squares regression (PLSR) and support vector machine regression (SVMR), respectively. The model accuracy was determined by ratio of performance to deviation (RPD). The results showed that there were good model accuracy values in some parameters, such as SSC (2.14), glucose (1.59), sucrose (2.31), a* (2.97), and b* (2.49), while the fructose (1.35) and L* (1.06) modeling showed poor prediction accuracy. The best model for SSC was developed using PLSR, while that of fructose, glucose, sucrose, L*, a*, and b* were obtained from SVMR. Therefore, Vis/NIR spectroscopy can be used as an alternative method to monitor sugar content and pulp color of a melon, but with some limitations, such as the low accuracy in predicting certain variables, such as the L* and fructose.
Citation: Kusumiyati Kusumiyati, Yuda Hadiwijaya, Wawan Sutari, Agus Arip Munawar. Global model for in-field monitoring of sugar content and color of melon pulp with comparative regression approach[J]. AIMS Agriculture and Food, 2022, 7(2): 312-325. doi: 10.3934/agrfood.2022020
[1] | Mingchang Ni, Guo Zhang, Qi Yang, Liqiong Yin . Research on MEC computing offload strategy for joint optimization of delay and energy consumption. Mathematical Biosciences and Engineering, 2024, 21(6): 6336-6358. doi: 10.3934/mbe.2024276 |
[2] | Hong Zhang, Penghai Wang, Shouhua Zhang, Zihan Wu . An adaptive offloading framework for license plate detection in collaborative edge and cloud computing. Mathematical Biosciences and Engineering, 2023, 20(2): 2793-2814. doi: 10.3934/mbe.2023131 |
[3] | Dawei Li, Enzhun Zhang, Ming Lei, Chunxiao Song . Zero trust in edge computing environment: a blockchain based practical scheme. Mathematical Biosciences and Engineering, 2022, 19(4): 4196-4216. doi: 10.3934/mbe.2022194 |
[4] | Xiong Wang, Zhijun Yang, Hongwei Ding, Zheng Guan . Analysis and prediction of UAV-assisted mobile edge computing systems. Mathematical Biosciences and Engineering, 2023, 20(12): 21267-21291. doi: 10.3934/mbe.2023941 |
[5] | Claudia Totzeck, Marie-Therese Wolfram . Consensus-based global optimization with personal best. Mathematical Biosciences and Engineering, 2020, 17(5): 6026-6044. doi: 10.3934/mbe.2020320 |
[6] | Yanpei Liu, Yunjing Zhu, Yanru Bin, Ningning Chen . Resources allocation optimization algorithm based on the comprehensive utility in edge computing applications. Mathematical Biosciences and Engineering, 2022, 19(9): 9147-9167. doi: 10.3934/mbe.2022425 |
[7] | Shufen Niu, Wei Liu, Sen Yan, Qi Liu . Message sharing scheme based on edge computing in IoV. Mathematical Biosciences and Engineering, 2023, 20(12): 20809-20827. doi: 10.3934/mbe.2023921 |
[8] | Liang Yu, Zhengkuan Zhang, Yangbing Lai, Yang Zhao, Fu Mo . Edge computing-based intelligent monitoring system for manhole cover. Mathematical Biosciences and Engineering, 2023, 20(10): 18792-18819. doi: 10.3934/mbe.2023833 |
[9] | Hongyan Xu . Digital media zero watermark copyright protection algorithm based on embedded intelligent edge computing detection. Mathematical Biosciences and Engineering, 2021, 18(5): 6771-6789. doi: 10.3934/mbe.2021336 |
[10] | Miaoshan Lu, Junjie Tong, Weidong Fang, Jinyin Wang, Shaowei An, Ruimin Wang, Hengxuan Jiang, Changbin Yu . Column storage enables edge computation of biological big data on 5G networks. Mathematical Biosciences and Engineering, 2023, 20(9): 17197-17219. doi: 10.3934/mbe.2023766 |
The development of the global model is an important part of research involving the quality prediction of agricultural commodities using visible/near-infrared (Vis/NIR) spectroscopy due to its efficiency and effectiveness. The Vis/NIR was used in this study to develop a global model and to evaluate the sugar content and pulp color, which are the main determinants of ripeness and quality of melons. Furthermore, it also provides a comparison between linear and nonlinear regression using partial least squares regression (PLSR) and support vector machine regression (SVMR), respectively. The model accuracy was determined by ratio of performance to deviation (RPD). The results showed that there were good model accuracy values in some parameters, such as SSC (2.14), glucose (1.59), sucrose (2.31), a* (2.97), and b* (2.49), while the fructose (1.35) and L* (1.06) modeling showed poor prediction accuracy. The best model for SSC was developed using PLSR, while that of fructose, glucose, sucrose, L*, a*, and b* were obtained from SVMR. Therefore, Vis/NIR spectroscopy can be used as an alternative method to monitor sugar content and pulp color of a melon, but with some limitations, such as the low accuracy in predicting certain variables, such as the L* and fructose.
According to the latest global data report of Hootsuite [1], there are currently 5.11 billion independent mobile users in the world. In 2019, the number of global Internet users increased by 9% as compared to 2018, and by 2023, the number of devices connected to IP networks will be more than three times that of the global population, and the global Wi-Fi hotspots will reach 628 million, an increase of four times over 2018. Additionally, with the development of technology, the number of mobile devices accessing the cloud environment is increasing; this leads to the increase of the network load in the traditional mobile cloud computing environment, and the phenomena of network congestion and response timeout occur from time to time. Therefore, in 2014, the European Telecommunications Standards Association took the lead in proposing a new technology called mobile edge computing, also known as multi-access edge computing [2], and its application scenario is shown in Figure 1.
Compared with traditional mobile cloud computing, multi-access edge computing is characterized by distribution, real-time, and mobility [3]. Mobile cloud computing provides centralized server computing capability, while multi-access edge computing provides distributed computing capability. In multi-access edge computing, task processing and applications are concentrated in edge devices; mobile users do not need to connect to the data center to access services like mobile cloud computing, and its task processing is more dependent on the edge server and has better real-time performance. By combining its service environment and cloud computing technology on the network edge, multi-access edge computing can not only provide centralized and large amounts of storage and computing resources in the similar mobile cloud computing environment, but can also reduce the network load resulting from the large mobile terminal equipment, reduce the network delay, and ensure the real-time demand of business applications [4].
Although the computing task of multi-access edge computing is focused on the edge devices for processing, it can ensure a real-time advantage; however, because of its portability, the battery capacity and computing capacity of edge devices are low. If all tasks are placed in edge devices for processing, the energy consumption problem of mobile terminals will occur [5]. Therefore, some computing tasks need to be offloaded from the edge devices to the edge servers via a computation offloading algorithm to ensure that the energy consumption of the mobile devices can be optimized to satisfy the user response time constraints. However, some problems of multi-access edge computing remain to be solved, including determining how to select appropriate edge computing resources for computing tasks based on the information of mobile devices, task characteristics, and network conditions collected by the surrounding edge servers for network connection and computing offloading, and when and which computing tasks can be offloaded to extend the endurance time of mobile devices and improve the performance of applications.
To solve this problem, many researchers have carried out work from different perspectives. The author's team also proposed the computing offloading and resource optimization of adaptive data block size in edge environments in the early stage. The goal of the algorithm proposed in the early stage is different from that of this algorithm. The algorithm proposed in the early stage focuses on the adaptive data block size. However, most of the existing computation offloading algorithms ignore the selection of offloading opportunities in a mobile cloud environment, and fewer consider the probability that the user's offload success rate leads to offloading too frequently, which causes problems including resource waste and energy efficiency reduction. Also, the computation offloading strategy in the mobile cloud environment cannot be directly applied to a multi-access edge computing environment. Therefore, this paper considers a mobile application as the task model of the linear topology and makes full use of the edge computing and computing resources of the mobile terminal in a dynamically changing wireless environment. Additionally, a dynamic computation offloading algorithm based on particle swarm optimization with a mutation operator in the multi-access edge computing environment is proposed. The main contributions and innovations of this paper are as follows:
1) The overload timing is dynamically obtained by a strong, locally weighted regression method based on the CPU utilization of the mobile terminal and the memory utilization rate;
2) The probability of successful offloading is predicted by the mobile user's residence time in the multi-access edge computing communication range and determines whether to immediately offload or delay offloading. The computation offloading model is established via the use of the response time and energy consumption of mobile terminals, and the dynamic computing offloading algorithm based on particle swarm optimization with a mutation operator is proposed in a multi-access edge computing environment;
3) After establishing an experimental edge computing environment and comparing the new approach to similar algorithms, the proposed DCO-PSOMO algorithm is found to reduce the cost of offloading and the terminal energy consumption, and improves the success probability of offloading and the user's QoS.
The remainder of this paper is organized as follows. Section 2 reviews some related work. Section 3 describes the dynamic computing offloading algorithm model based on particle swarm optimization with a mutation operator in an edge computing environment. Section 4 describes the implementation process of the proposed algorithm. Section 5 analyzes the performance of the proposed algorithm via the construction of an experimental environment with mobile edge computational properties. Section 6 presents the conclusions of this study.
Computation offloading strategies in mobile cloud computing have become a popular research topic in recent years [6,7,8]. This section introduces the development status of these strategies both domestically and abroad, and points out the problems in the existing studies.
If a task is executed locally, the time consumed is the time required to execute the task. If the task is offloaded to the edge device, the time consumed will involve three components: the time to transmit the data to be offloaded to the edge device, the time to process the task on the edge device, and the time to receive the data returned from the edge device. In the work by Li et al. [9], the communication time of task transfer was reduced by using computational replication, which allows terminal devices to offload computing tasks to multiple edge computing nodes to repeatedly perform offloading tasks so that multiple edge computing nodes can return the collaborative computing results to terminal devices in the downlink. The proposed transmission cooperation mode can eliminate the channel interference among multiple users and significantly reduce the communication delay of multiple users and servers. Yi et al. [10] proposed a new MOTM mechanism by considering the trade-off between local computing and edge computing, wireless characteristics, and the non-cooperative game behavior of mobile users, and jointly determined the computation offloading scheme, transmission scheduling rules, and pricing rules. Khoda et al. [11] utilized the idea of load balancing between mobile devices and servers, and designed a heuristic task partition algorithm to minimize the completion time of the task. Deng et al. [12] proposed a computation offloading method for the robust design of mobile service offloading decisions that considers the dependency between component services, introduces the mobile mode and fault tolerance mechanism, and designs an offloading method based on a genetic algorithm. Mao et al. [13] proposed dynamic voltage frequency regulation and power control to optimize the calculation process and data transmission of computation offloading. Based on this model, a new algorithm of low-complexity Lyapunov optimization-based dynamic computation offloading was proposed.
The energy consumption of offloading tasks to the edge server mainly consists of two parts, namely the energy consumed by transmitting the offloading data to the edge server, and the energy consumed by receiving the data returned by the edge server. Liu et al. [14] proposed a fast heuristic algorithm that finds the solution that meets the constraint conditions, decomposes the overall reliability and delay constraints into multiple constraints of each subtask, and then finds the minimum solution in the offloading decision of each subtask to minimize the energy consumption of user equipment under the reliability and delay constraints. Li et al. [15] proposed an online batch scheduling heuristic algorithm for the dynamic offloading of independent tasks on a mobile node. The heuristic algorithm centers on the user and the system to optimize the performance of task offloading. Deng et al. [16] modeled mobile applications, such as DAG, with multiple subtasks, and aimed to minimize the terminal energy consumption under the constraint of the completion time of tasks. Their approach transforms the task offloading problem into a nonlinear 0–1 programming problem. Chen et al. [17] studied the RCS (remote cloud service) and CCS (connected ad-hoc cloudlet service) used in ad-hoc, small-cloud computing offloading and presented a new model for computation offloading. The main advantage of this model is that it does not restrict the movement of users; it also uses opportunity connections to realize the interaction between the computing nodes and multiple service nodes, and achieves energy-saving via efficient computation offloading. Kchaou et al. [18] analyzed the relationship between mobile cloud computing and big data, and proposed a mobile cloud computing offload framework for big data.
Energy consumption and time delay are important factors to consider when performing the offloading task. Chen et al. [19] put forward an effective heuristic algorithm and random mapping method that can effectively reduce the total cost of users in both delay and energy consumption. Munoz et al. [20] proposed a trade-off analysis between the energy consumption and execution delay of a partial offloading decision. Several parameters, including the total amount of data to be processed, the computing power of the mobile terminal and edge device, the channel state between the mobile terminal and base station, and the energy consumption of the mobile terminal, are considered in the process of offloading. On this basis, a dynamic scheduling mechanism that allows users to make offloading decisions according to the computing queue and wireless channel status of tasks was proposed. Pandey et al. [21] proposed a time- and energy-aware mobile application offloading algorithm based on the depth-first search that can dynamically analyze the network bandwidth and energy consumption, thereby effectively reducing the energy consumption and running time. Li et al. [22] investigated the problem of the computation offloading of mobile blockchain applications, and proposed an algorithm based on the depth-first search that can dynamically analyze the network bandwidth and energy consumption, thereby effectively reducing the energy consumption and running time. You et al. [23] reused edge cloud computing server resources through a time-division mode; a jointly optimized computing and offloading model was built according to the user's offloaded data size and transmission time, and is solved through convex optimization. Khalili et al. [24] introduced physical layer parameters into the program partitioning mechanism and proposed a joint optimization algorithm for computation offloading. Mitsis [25] proposed a resource-based pricing and user risk-aware data offloading framework for UAV-assisted multi-access edge computing systems. Apostolopoulos [26] proposed a device-centric risk-based distributed approach to determine the users' IoT devices' computation offloading volume in a wireless MEC environment.
The aforementioned optimization strategies for computation offloading have been widely used; however, most of the algorithms in the mobile cloud environment ignore the selection of the offloading time, and seldom consider the problem that the probability of a user's successful offloading leads to over-frequent offloading, ultimately resulting in resource waste and energy efficiency reduction. Therefore, this paper proposes a dynamic computation offloading algorithm based on particle swarm optimization with a mutation operator in a multi-access edge computing environment. The algorithm not only considers the offloading time, but also decides whether to offload immediately or delay according to the probability of the successful offload of mobile users, thereby reducing the cost and energy consumption of offloading and ensuring the probability of successful offloading and the QoS of mobile users.
There are two decisions to be made in the dynamic algorithm based on particle swarm optimization with a mutation operator, namely the choice of offloading time and the offloading optimization strategy. According to the CPU utilization and memory utilization of the mobile terminal, the dynamic adaptive hotspot detection mechanism (the dynamic detection mechanism of CPU and memory utilization) based on strong local reinforcement regression is adopted to determine the overload opportunity. After the overload opportunity is detected, the probability of successful offloading is predicted by retention time of mobile users in the range of edge computing communication. The offloading model is then established by using the response time and mobile terminal energy consumption, and the optimal offloading algorithm is finally designed by using particle swarm optimization with a mutation operator. The dynamic computation offloading algorithm based on particle swarm optimization with a mutation operator is shown in Figure 2.
To achieve better overload timing, a dynamic adaptive hotspot detection strategy based on strong, locally weighted regression is designed, and the utilization rate of CPU resources is taken as an example to determine the overload timing.
First, the CPU utilization of mobile terminals is monitored periodically, and the time series (xi,yi) of CPU utilization can be obtained, where xi represents the time point for CPU utilization monitoring and yi represents the CPU utilization of mobile terminals at the point xi. The polynomial fitting of yi is then carried out to obtain the smooth point (xi,ˆyi) of the CPU utilization rate of the mobile terminal. The weighted least-squares method is used to estimate the value of fitting points, and the smooth regression curve yi=ˆyi+εi of the CPU utilization rate of the mobile terminal is obtained, where εi is a random variable with a zero mean and fixed variance. Finally, the time of CPU utilization overload can be obtained.
A set data (xi,yi) of the CPU utilization of the mobile terminal. For each xi, try to select the window width as the centers. For each i, hi is the distance of the rth nearest-neighbor point from xj to xi, i.e., for j = 1, 2, ..., n, hi is the rth minimum value in |xj−xi|. For k=1,2,…,n, its weight is [27].
wk(xi)=W(xk−xihi) | (1) |
Using a least-squares method for each (xi,yi) with a weight wk(xi), the estimated value of the d-order polynomial regression coefficient ˆβl(xi) for yi on xi is calculated such that:
(ˆβ0(xi),ˆβ1(xi),…,ˆβl(xi))=argmin[n∑k=1wk(xi)(yk−β0−β1xk−⋯−βlxdk)]2 | (2) |
where l=0,1…,d. Next, d-order polynomial fitting is performed to obtain the locally weighted regression smooth point (xi,ˆyi), and the fitting value of ˆyi at the xi point can be expressed as:
ˆyi=d∑l=1ˆβl(xi)xlii=1,2,…,n | (3) |
All the observed values are fitted, and the smooth regression curve yi=ˆy′i+εi is finally obtained. In the same manner, a smooth regression curve of the memory utilization rate of the mobile terminal is obtained, and the optimal offloading timing is dynamically obtained based on these two parameters.
Because the mobile terminal has the potential to be moved at any time, the connection between the terminal and the edge server is interrupted, which may cause the failure of offloading when the mobile terminal moves out of the transmission range of the edge server. Therefore, the probability ηi that the computing task will be offloaded to the edge server i and successfully receive the calculation result is called the mobile user offloading success probability.
R represents the maximum transmission range of the edge server, and ri denotes the distance between the mobile user and the edge server i, where the probability density function of ri is πr2i/πR2. It is assumed that the user moves out of the edge computing communication range in the fastest manner, and vi expresses the user's moving speed. The time that the mobile terminal stays within the communication range of the edge server i is then calculated as follows:
Ti=∫R0(π(ri+dri)2πR2−πr2iπR2)R−rividri=R3vi | (4) |
Because the edge server can reject user service requests with certain constraints, the requested constraint is represented by χ. Therefore, the probability of success of a mobile user's job offloading to the edge server i can be expressed as:
ηi = χ⋅Ti−τTi = χ⋅(1−3viτR) | (5) |
where τ represents the sum of the processing time of the task at the edge server i and the round-trip transmission time (RTT).
Ⅰ) Communication model
For a terminal u in the set, bu represents the decision to offload it. All terminal decision states in the set are represented by vectors bu=(b1,b2,…,bu). In the t phase, the upload data rate for the terminal u can be expressed as:
Ru(b)=C1og2(+PuHu,sωu+∑m∈U∖{u}:am=1PmHm,s) | (6) |
where C denotes the channel bandwidth, Pu denotes the transmit power allocated by the wireless access point to the user u, and Hu,s is the channel gain between the terminal u and the base station. ωu=ω0u+ω1u denotes the background interference power, where ω0u is the noise power (invalid power) and ω1u is the interference power of other mobile terminals for wireless transmission. It can be seen from the communication model that if too many mobile terminal users choose to offload the computing through wireless access at the same time, it may cause serious interference, resulting in very low data transmission rate, which will have a negative impact on the performance of mobile cloud computing.
Ⅱ) Response time model
For a given offload strategy A={ai,a2,…,an}, ai∈{0,1}, where ai=0 indicates that component i is executing at the edge server and ai=1 indicates that component i is executing on the mobile terminal. For a component i, TKi=(di,j,Di) denotes its computational task, where di,j represents the size (such as code size, parameters, etc.) of the data that component j needs to input to the component i when executing component i, and Di denotes the amount of calculation required to complete this calculation (millions of instructions, CPU cycles). If both components i and j are executed locally or at the edge server, then components i and j have no data exchange, i.e., di,j=0, and the transfer time between them is negligible. The time at which component j transmits data to component i can be expressed as follows:
tj,i=(di,j×|ai−aj|)/Ru(b) | (7) |
Ⅲ) Mobile terminal energy consumption model
In the multi-access edge computing environment, the energy consumption of the computation offloading of the mobile terminal mainly includes the transmission energy consumption and the calculation energy consumption.
(1) Transmission energy model
Pta, Pra, and Pi represent the power (unit: watts) of the mobile terminal in the transmit mode, receive mode, and idle mode, respectively. In a single data execution process, the time the mobile terminal spends in these three modes is respectively divided into tt, tr, and ti, and the transmission energy consumption during the execution of the data unit is:
Et=Pta⋅tt+Pra⋅tr+Pi⋅ti | (8) |
{tt=(∑(i,j)∈E,ai−aj=1di,j)1Btr=(∑(i,j)∈E,ai−aj=−1di,j)1Bti=Tdone−tt−tr | (9) |
where di,j represents the size of the data input by component j to component i when component i is executed, B indicates the size of the network bandwidth between the mobile terminal and the edge server, and Tdone represents the execution time of a data unit.
(2) Computational energy consumption model
Mobile terminals usually use microprocessors made of CMOS integrated circuits and CMOS processes. The terminals' energy consumption includes the static energy consumption and dynamic energy consumption, and the static energy consumption is almost zero and can be ignored. Therefore, only the dynamic energy consumption of the mobile terminal processor is considered in this paper, and can be expressed as:
PC=f×α×C×V2 | (10) |
where f is the clock frequency, α is the capacitor, and V is the voltage. The power of the mobile terminal CPU in a running state can be calculated by Eq (10). It is assumed that, in the application program of the mobile terminal, the time for a data unit to execute an application component is Tdone, for which the execution time is tc, the idle time is tidle, the calculation power of the CPU is Pc, the idle power of the CPU is Pidle, and the energy consumption generated by the CPU switching of the mobile terminal is ignored throughout the process. Therefore, a single data unit performs edge computing applications, and the calculated energy consumption of the mobile terminal EC can be expressed as:
EC=PC⋅tc+Pidle⋅tidle | (11) |
where tc=∑ni=1Di⋅xi/ηp and tidle=Tdone−tc; xi=0 indicates that the component i is offloaded to the edge server, and xi=1 indicates that the component i is on the mobile terminal. Therefore, Eq (11) can be rewritten as:
Ec=Pc⋅∑ni=1Di⋅xiηp+Pidle⋅(Tdone−∑ni=1Di⋅xiηp) | (12) |
Therefore, during computation offloading in an edge computing environment, the total energy consumption required to offload a data unit to a mobile terminal can be expressed as:
E=Ec+Et | (13) |
(3) Computation offload model based on time and energy consumption
The objective function of computation offloading based on the time and energy consumption is:
minx[∑ni=0Ti,∑ni=0Ei]Ts.t.a∈{0,1},i=0,1,…,n−1curi>curthmuri>murthηi>ηth | (14) |
where Ti and Ei represent the time and energy consumption of component i, respectively, curth and murth represent the content utilization rate and memory utilization threshold of the CPU, respectively, and ηth represents the threshold of the probability of successful offloading.
(1) Problem coding of computation offloading in a multi-access edge computing environment
The n components of the application are numbered from 1 to n in sequence, and the position vector of each particle is encoded using a one-dimensional binary encoding: A={a1,a2,…,an}, ai∈{0,1}. When a=0, the component is offloaded to the edge server, and a=1 indicates that the component is executed on the mobile terminal. In other words, the position vector of the particles can represent a kind of computation offloading scheme. For example, A={1,0,0,1,1,0,1,1}? represents 8 components in the current edge computing applications, components 1, 4, 5, 7 and 8 are executed on the mobile terminal, and components 2, 3 and 6 are offloaded to the edge server for execution. In this way, for applications with n components, 2n solution spaces are needed, and the mutation operator particle swarm optimization algorithm searches for the optimal solution in these solution spaces.
In this paper, the particle velocity V in the computation offloading algorithm is also a one-dimensional vector encoding V={v1,v2,…,vn}, where vi∈{0,1,2}, 1≤i≤n. If vi=2, it means that the particle position is unchanged and the offloading scheme of component i does not change; if vi≠2, the position vector of the particle is updated to vi
(2) Computation offloading fitness function construction
The objective of the computation offloading algorithm proposed in this paper is to minimize the execution time and energy consumption. Two objective functions f1(x) and f2(x) are set, of which f1(x) represents the execution time of the edge computing application and f2(x) represents the terminal energy consumption. Using the power coefficient method, Eq (14) can be converted to:
ω=√(f1(max)−f1(x)f1(max)−f1(min))⋅(f2(max)−f2(x)f2(max)−f2(min))s.t.a∈{0,1},i=0,1,…,n−1curi>curthmuri>murthηi>ηth | (15) |
ω=1 indicates that the ideal design scheme is obtained, and ω=0 indicates that this scheme is not feasible; therefore, it is necessary to solve the set of solutions with a value of ω that is closest to 1.f1(max) and f1(min) respectively represent the maximum and minimum values of f1(x), and f2(max) and f2(min) respectively represent the maximum and minimum values of f2(x). Therefore, the fitness function can be defined as:
f(X)=√(f1(max)−f1(x)f1(max)−f1(min))⋅(f2(max)−f2(x)f2(max)−f2(min)) | (16) |
The goal of offloading in a multi-access edge computing environment is to reduce the application execution time while minimizing the terminal energy consumption. Therefore, the computation offloading can be transformed to solve the solution of f(x) that is closest to 1.
(3) Design of offloading particle operator in multi-access edge computing
In multi-access edge computing environment, in order to use particle swarm optimization algorithm to solve the optimal computing offloading strategy, the particle operator needs to be redesigned.
1) Addition operator (+)
In particle swarm optimization algorithm, different positions of particles represent different offloading schemes. The driving force for particles to find the optimal offloading scheme is the update of particle velocity. The new offloading scheme A′i is jointly determined by the original offloading scheme Ai and the particle velocity V, which can be expressed as:
A′i=Ai+V | (17) |
a′ij={aij,ifvj=2vj,otherwise | (18) |
where a′ij and aij represent the two offloading results of component j under the new scheme A′i and the original scheme Ai. vj represents the j dimensional component of speed V, which is the most direct cause of offloading strategy change.
2) Subtraction operator (−)
The flight speed of particles can be obtained by subtracting the particle position, which can be expressed as:
V=A′i−Ai | (19) |
The value vj of each dimension in the velocity V can be calculated as:
v={2,ifa′ij=aija′ij,otherwise | (20) |
3) Speed multiplication (×)
Let Vi be the velocity of particle i, and the value of particle velocity is updated by multiplying the velocity, which can be expressed as:
V′i=c1×Vi×c2 | (21) |
c1 and c2 represent randomly generated natural number, 1⩽c1⩽c2⩽n, n is the number of components divided by the application, the value v′ij of velocity Vi′ in each dimension can be expressed as:
v′ij={vij,ifj∈[c1,c2)2,otherwise | (22) |
4) Particle renewal equation
The new offloading scheme is determined by the original calculated offloading scheme, the historical optimal scheme and the optimal scheme of the population. The particle renewal equation can be expressed as:
{A=A+c1×(Pb−A)×c2,1⩽c1⩽c2⩽nA=A+c×(Pg−A)×c4,1⩽c3⩽c4⩽n | (23) |
where Pb represents the optimal offloading scheme of particles, Pg is the optimal offloading scheme of the population, n indicates the number of components divided by the application, c1,c2,c3,c4 represents a positive integer randomly generated from 1∼n.
The dynamic computation offloading algorithm based on particle swarm optimization with a mutation operator in a multi-access edge computing environment is described as follows.
(1) Determination of offloading time: The dynamic adaptive hotspot detection strategy based on strong, locally weighted regression is used to solve the overload time with high CPU resource utilization or memory utilization to obtain the offloading time (lines 1–2 of algorithm 1);
(2) Prediction of the offloading success probability: The probability of successful mobile terminal computation offloading is calculated according to the service scope of edge computing and the residence time of users (line 4 of algorithm 1);
(3) Optimization of computation offloading: Particle swarm optimization with a mutation operator is used to determine the optimal offloading strategy of mobile users (lines 5–35 of algorithm 1). Lines 8-13 of algorithm 1 are the initial position and initial historical optimal position of each randomly generated particle, lines 16–22 are the particle fitness function for offloading, lines 23–27 are the updated particle position, and lines 29–31 are the execution mutation.
The pseudo-code of the algorithm is presented in algorithm 1.
Algorithm 1: Offloading algorithm DCO-PSOMO |
Input: User's application request Ai={s1,s2,…,sn} |
Output: Optimal computation offloading strategy V={s′1,s′2,…,s′k} |
1: ci←CpuUtilizationRatio(); |
2: mi←MemoryUtilizationRatio(); |
3: if (ci>cthreshold||mi>mthreshold) |
4: ηi←getOffloadSuccessProbability(); |
5: if (ηi>ηthreshold) |
6: Initializing PopNum、MaxIter、Particles |
7: i←1 |
8: while(i<=PopNum) |
9: Randomly generated particle i position s; |
10: Add i to the particle swarm; |
11: pbest[i]←s |
12: i←i+1; |
13: end while |
14: j←1; |
15: while(j<=MaxIter) |
16: for(each particle k in particles) |
17: Calculate the fitness of k fitness[k]; |
18: if(fitness[k]<pbest[k]) |
19: pbest[k]←k; |
20: if(fitness[k]<pbest) |
21: gbest←k; |
22: end for |
23: for(each particle k in particles) |
24: Update k's position; |
25: if(Ck<β) |
26: Mutate k; |
27: end for |
28: if(D<γ) |
29: for(each particle k in particles) |
30: Mutate k; |
31: end for |
32: j←j+1; |
33: end while |
34: Stragegy←gbest; |
35: return V={s′1,s′2,…,s′k} |
Time complexity analysis of the DCO-PSOMO algorithm: In the preceding description of the algorithm, lines 8–13 describe the random initial position of each particle, and, based on this position and the optimal value of the population history, the complexity is O(M∗N), where M represents the size of the particle swarm and N is the number of components applied to the cloud. Lines 16–22 describe the calculation of the particle fitness function, and the time complexity is O(M∗N). Lines 23–27 describe an update of the particle position, and the complexity is O(M∗N). Lines 23–27 perform a mutation operation that allows particles to enter a new area for searching, and the time complexity is O(M∗N). Therefore, the time complexity of the entire algorithm is O(M∗N).
Theorem 1: Assuming any mobile terminal P and edge cloud user application request B, a reasonable calculation offloading strategy V={s′1,s′2,…,s′k} and Epoff<EpNoff are obtained through algorithm 1.
Proof: The correctness proof of the algorithm can be divided into the following three steps:
1) Acquisition of offload opportunity: Using the strong local weighted regression method, the overload opportunity of mobile terminal (Eq (3)) can be correctly obtained, that is, the offloading opportunity can be calculated
2) Calculation of offloading success probability: The calculation formula of the residence time of the mobile terminal in a cloud is equivalent to:
![]() |
If f(x)=x2, then f(ri+dri)−f(ri)=(ri+dri)2−(ri)2
![]() |
The specific meaning of the symbol is in Section 3.2.2, and the offloading success probability is calculated according to Eq (5).
3) Optimal offloading policy: According to the calculation offloading model of time and energy consumption, the optimal calculation offloading strategy V is obtained, and condition Epoff<EpNoff is satisfied.
1) Experimental environment
As shown in Figure 3, a multi-access edge computing experimental environment was set up, in which the feasibility and effectiveness of the proposed dynamic computation offloading algorithm based on particle swarm optimization with a mutation operator were verified. The experimental environment included three components, namely the mobile terminal, edge computation, and remote cloud. In the experiment, mobile terminals used Samsung phones and Lenovo laptops to interact with the edge server through Wi-Fi hotspots. To simulate a real scenario, three edge servers were set up in the experiment, each of which was built with 1 Inspur server and 6 different Lenovo desktop institutions such that the three edge servers could interact with each other in their coverage areas. The remote cloud used 11 AliCloud instances to build the environment. The server used a CentOS operating system, and OpenStack was installed to virtualize its resources. Based on these conditions, the Apache Hadoop distributed platform was built to implement the computation offloading in a multi-access edge computing environment.
2) Experimental data source
In this experiment, the power consumption of the mobile terminal in different states was determined via the powerprofile.xml provided by the Android operating system application framework, and the unit of power consumption was milliwatts. The power consumption parameters of the Samsung I9500, Samsung I9308, Samsung p3108, Lenovo Xiaoxin V4000, and Lenovo deliverer 15-ISK i5 devices are listed in Tables 1 and 2.
Mobile terminal equipment | CPU state | |
Idle | Function | |
Samsung p3108 | 25.9 | 1106.3 |
Samsung I9308 | 14.8 | 921.3 |
Samsung I9500 | 16.7 | 914.9 |
Lenovo Xiaoxin V4000 | 197.4 | 7892.3 |
Lenovo deliverer I5-ISK i5 | 228.6 | 8012.5 |
Mobile terminal equipment | WIFI | |||
Closed | Idle | Sending | Receive | |
Samsung p3108 | 0 | 3.7 | 555.0 | 549.7 |
Samsung I9308 | 0 | 1.1 | 355.2 | 340.7 |
Samsung I9500 | 0 | 0.9 | 360.1 | 358.2 |
Lenovo Xiaoxin V4000 | 0 | 12.3 | 1984.2 | 1970.4 |
Lenovo deliverer I5-ISK i5 | 0 | 12.5 | 2012.8 | 2020.6 |
3) Experimental parameter settings
In the algorithm verification experiment, the number of mobile users was 10, and included two Samsung i9500 mobile phones, two Samsung i9308 mobile phones, two Samsung p3108 mobile phones, two small, new Lenovo V4000 laptops, and two Lenovo Savior 15-isk i5 laptops. All users identified the same QR code, the uplink bandwidth and downlink bandwidth were the same, and the bandwidth size was [120 KB/s, 480 kb/S]. The experimental configuration parameters are listed in Table 3.
Parameter name | Value |
Inspur NF5270M3 rack server | 3 |
Number of mobile users | 14 |
Sam sung I9500 | 2 |
Sam sung I9308 | 2 |
Sam sung P3108 | 2 |
Lenovo Xiaoxin V4000 | 2 |
Lenovo deliverer 15-ISK i5 | 2 |
4) Performance index
The following three indicators were used to evaluate the performance of the dynamic computation algorithm based on particle swarm optimization with a mutation operator:
a) Energy consumption: the energy consumption required for the mobile terminal to perform the offloading task;
b) Response time: the time required for task offloading to edge devices and the calculation of the feedback results to mobile terminals;
c) Offloading success rate: the ratio of the number of tasks successfully uninstalled to the total number of tasks uninstalled.
To verify the feasibility and effectiveness of the DCO-PSOMO algorithm proposed in this paper, it was compared with the ECOMC [11], ESRLR [14], and JOCAP [19] algorithms.
1) Influence of wireless network bandwidth on the performance of the algorithm
This experiment mainly investigated the effects of different wireless network bandwidths on the performances of the proposed DCO-PSOMO offloading algorithm and other similar algorithms, namely the JOCAP, ECOMC, and ESRLR algorithms. In the experiment, the mobile terminal adopted a Samsung I9500, the wireless network used a Wi-Fi connection, and the terminal moved at a constant speed of 10 km/h. The experiment involved adjusting the network bandwidth from 120 kbps to 480 kbps with a step size of 60, and the experimental results are presented in Figures 4–6.
Figure 4 presents the response time of each algorithm under different network bandwidths, from which it can be seen that as the bandwidth of the wireless network increased from 120 kb/s to 480 kb/s, the response time of each computation offloading algorithm decreased. In addition, the response times for both the JOCAP and DCO-PSOMO algorithms were similar, because both algorithms consider the terminal energy consumption and response time. The response time of the DCO-PSOMO algorithm was slightly higher than that of the JOCAP algorithm, but still within the acceptable range, when the bandwidth was 240 kb/s and 420 kb/s; this was because the DCO-PSOMO algorithm predicts the success probability of offloading before offloading.
Figure 5 presents the mobile terminal energy consumption of each algorithm under different network bandwidths. The ESRLR offloading strategy had the lowest energy consumption of the mobile terminals under different network bandwidths because it is a high-efficiency offloading strategy that is aimed at minimizing the energy consumption of the mobile terminal without considering the cost of offloading. The terminal energy consumption of the ECOMC offloading strategy was found to be the highest in most cases, as the ECOMC algorithm minimizes the response time and does not optimize the energy consumption of the mobile terminal. The energy consumptions of the JOCAP and DCO-PSOMO algorithms were in the middle because these two strategies take into account the energy consumption and response time of mobile terminals. When the bandwidth was 420 kb/s, the energy consumption of the DCO-PSOMO algorithm was higher than that of the JOCAP algorithm because the DCO-PSOMO algorithm predicted the timing and success rate of offloading, thereby leading to a slightly higher energy consumption.
Figure 6 presents the offloading success probability of each algorithm under different network bandwidths. The DCO-PSOMO offloading success rate was higher than those of the other three offloading strategies because DCO-PSOMO predicts the probability of offloading success according to the mobile terminal's stay time in the cloud cover to decide whether to offload immediately or delay the offloading.
2) Influence of mobile terminal type on algorithm performance
Considering the differences of the mobile terminal itself, the impacts of different mobile terminal types on the proposed DCO-PSOMO offloading algorithm and the other similar algorithms were determined through a set of experiments. The mobile terminals in the experiments included a Samsung P3108, Samsung I9308, Samsung I9500, Lenovo Xiaoxin V4000, and Lenovo saver ISK. The wireless network type adopted Wi-Fi, the network bandwidth was 240 kb/s, and the user moved at a speed of 10 km/h. The experimental results are presented in Figures 7–9.
Figure 7 presents the response times of mobile terminals running different offloading algorithms under different terminal types. The response time of the ESRLR algorithm was the highest for most cases, and that of the ECOMC algorithm was the lowest. The response time of the DCO-PSOMO algorithm was close to that of the JOCAP algorithm, as the JOCAP and DCO-PSOMO algorithms both take into account the energy consumption and response time of the mobile terminal. Additionally, when the DCO-PSOMO algorithm was run on the mobile terminal for the Samsung I9308 and the Samsung I9500 devices, its response time was higher than that of the JOCAP algorithm. This occurred because the DCO-PSOMO algorithm predicts the probability of successful offloading before offloading, but the response time was still within the acceptable range.
Figure 8 presents the energy consumption of different types of mobile terminals running different offloading algorithms, from which it is evident that the ESRLR algorithm had the lowest mobile terminal energy consumption. This occurred because the ESRLR algorithm is an energy-efficient offloading strategy, the goal of which is to minimize the energy consumption of mobile terminals without considering the cost of offloading. The ECOMC offloading strategy was found to have the highest terminal energy consumption in different types of terminals, as ECOMC minimizes the response time and does not over-optimize the energy consumption of mobile terminals. The mobile terminal energy consumptions of the JOCAP and DCO-PSOMO algorithms were in the middle because these two strategies take into account the energy consumption and response time of mobile terminals. When the DCO-PSOMO and JOCAP were operated on a Lenovo V4000, the energy consumption of the DCO-PSOMO terminals was higher than that of the JOCAP terminals because the DCO-PSOMO algorithm predicts the offload timing and offload success rate; however, the energy response time was still within the acceptable range.
Figure 9 presents the probability of successful offloading of each algorithm running on different types of terminals, from which it is evident that the DCO-PSOMO offloading success probability was much higher than those of the other three offloading strategies. This outcome arose because the DCO-PSOMO algorithm is calculated the residence time before offloading. The residence time predicts the probability of successful offloading and determines whether to immediately offload or delay offload, which greatly increases the probability of offloading success.
3) Influence of network type on algorithm performance
A performance comparison was made between the proposed DCO-PSOMO algorithm and the JOCAP, ECOMC, and ESRLR algorithms in different network environments. In the experiment, a Samsung i9500 was used as the mobile terminal, and 2G, 3G, 4G and Wi-Fi were used as the types of wireless networks. The user moved at a speed of 10 km/h. The effects of different network bandwidths on the response time, terminal energy consumption, and probability of successful offloading of the algorithms were tested, and the results are respectively presented in Figures 10–12.
Figure 10 presents the response time of each algorithm in different wireless networks environments, from which it is evident that the response time of the mobile terminal in the 2G wireless network environment was the longest, and that of mobile terminal in the Wi-Fi wireless network environment was the shortest. This is because the wireless network bandwidth of the 2G network was the smallest, while that of Wi-Fi was the largest. With the increases of the wireless network bandwidth and the data transmission per unit time, the offloading time and the return time of the calculation results were reduced, so the response time during computation offloading was also reduced. It can also be seen that the response time of the high-energy and efficient computation offloading ESRLR algorithm was the highest in most cases, and that of the ECOMC algorithm was the lowest. The response time of the JOCAP algorithm based on energy consumption and time was close to that of the DCO-PSOMO algorithm.
Figure 11 presents the energy consumption of each algorithm in different wireless network environments, from which it is clear that the mobile terminal with the 2G wireless network type calculated the maximum terminal energy consumption for offloading, and the mobile terminal with the Wi-Fi network type calculated the minimum terminal energy consumption for offloading. This is because the 2G network had the smallest network bandwidth, while the Wi-Fi network had the largest bandwidth. The energy consumption of data transmission during computation offloading gradually increased with the decrease of the wireless network bandwidth. In addition, the mobile terminal energy consumption of the ESRLR offloading strategy was the lowest for different network bandwidths, that of the ECOMC offloading strategy was the highest in most cases, and those of the JOCAP and DCO-PSOMO algorithms were in the middle.
Figure 12 presents the success probability of each algorithm in different types of wireless network environments. The mobile terminal with the 2G wireless network type had the lowest probability of successful computation offloading, and the mobile terminal with the Wi-Fi network type had the highest probability of successful computation offloading. This is because the 2G network had the smallest network bandwidth while Wi-Fi had the largest network bandwidth. The increase of the wireless network bandwidth will reduce the response time, and the terminal will move at a constant speed, thereby increasing the possibility that the mobile terminal will receive the feedback calculation result from the edge device, ultimately leading to the increase of the offloading success rate. It is also clear that the DCO-PSOMO algorithm had a much higher probability of successful uninstallation than did the uninstallation strategies of the other algorithms.
4) Influence of terminal moving speed on the performance of the algorithm
A performance comparison between the proposed DCO-PSOMO algorithm and the JOCAP, ECOMC, and ESRLR algorithms at different terminal moving speeds was subsequently made. In the experiment, the mobile terminal adopted a Samsung I9500, the wireless network used a Wi-Fi connection, and the network bandwidth was 240 kb/s. The moving speed of the terminal was adjusted from 5 km/h to 40 km/h in increments of 5 km/h. The experimental results are presented in Figures 13–15.
It is evident from Figures 13 and 14 that the moving speed of the terminal had no effect on the response time and terminal energy consumption, as the network bandwidth was not affected by the terminal movement speed, and the data transmission time and component calculation did not change. Figure 15 reveals that the offloading success rates of the JOCAP, ESRLR, and ECOMC offloading strategies decreased very quickly as the terminal moving speed increased, and the probability of the successful offloading of DCO-PSOMO was much higher than those of the other three strategies. This result occurred because the DCO-PSOMO algorithm predicts the offloading success probability of a mobile terminal based on its dwell time in the edge of the computing coverage area to determine whether to immediately offload or delay offloading, which reduces the influence of the movement speed of the terminal on the probability of offloading success and increases the probability of successful offloading.
The following conclusions can be drawn from the analysis of the four groups of experiments:
1) The network bandwidth and network type have impacts on the offloading algorithm; the larger the wireless network bandwidth, the shorter the response time, and the higher the probability of successful offloading;
2) The mobile speed of the terminal has a certain influence on the success probability of offloading. The faster the mobile speed of the terminal, the lower the success probability of offloading, and vice versa;
3) The DCO-PSOMO offloading algorithm proposed in this paper considers both the time of offloading and the probability of successful offloading, which makes the algorithm superior to other similar offloading algorithms in terms of the response time and probability of successful offloading.
The decision of whether to offload immediately or delay is determined according to the success probability of the offloading of mobile users. On this basis, a dynamic algorithm based on particle swarm optimization with a mutation operator in a multi-access edge computing environment was proposed in this work. The algorithm can dynamically determine the overload time via a strong, locally weighted regression method, the computation offloading model is established by using the response time and the energy consumption of the mobile terminal, and the optimal algorithm is designed based on particle swarm optimization with a mutation operator. The DCO-PSOMO algorithm was compared with the JOCAP, ECOMC, and ESRLR algorithms, and the experimental results demonstrated that the DCO-PSOMO offloading method can effectively reduce the offloading cost and terminal energy consumption, as well as improve the offloading success probability and the user's QoS.
In future research, more attention will be paid to the dynamic offloading scheme of multi-access edge computing in a 5G environment, and a more advanced offloading decision algorithm will be proposed. For example, by using various prediction techniques of user mobility and channel quality during the process of offloading, the cost of offloading in different conditions can be better estimated.
The authors thank the editor and the anonymous reviewers for their helpful comments and suggestions. The work was supported by the National Natural Science Foundation (NSF) under grants (No. 61802353), Natural Science Foundation of Henan Province (No. 202300410505), The project of Science and Technology of Henan Province (NO. 192102210270) and Henan Provincial Department of Science and Technology (NO. 192102210270), and Dr Fund of Zhengzhou University of Light Industry.
The authors declared that they have no conflicts of interest to this work. We declare that we do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.
[1] | Kusumiyati, Hadiwijaya Y, Putri IE, et al. (2021) Multi-product calibration model for soluble solids and water content quantification in Cucurbitaceae family, using visible/near-infrared spectroscopy. Heliyon 7: e07677. https://doi.org/10.1016/j.heliyon.2021.e07677 |
[2] |
Kusumiyati K, Hadiwijaya Y, Putri IE, et al. (2021) Enhanced visible/near-infrared spectroscopic data for prediction of quality attributes in Cucurbitaceae commodities. Data Brief 39: 107458. https://doi.org/10.1016/j.dib.2021.107458 doi: 10.1016/j.dib.2021.107458
![]() |
[3] |
Hadiwijaya Y, Kusumiyati K, Munawar AA (2020) Penerapan teknologi visible-near infrared spectroscopy untuk prediksi cepat dan simultan kadar air buah melon (Cucumis melo L.) golden. Agroteknika 3: 67-74. https://doi.org/10.32530/agroteknika.v3i2.83 doi: 10.32530/agroteknika.v3i2.83
![]() |
[4] | Hadiwijaya Y, Kusumiyati K, Munawar AA (2020) Prediksi total padatan terlarut buah melon golden menggunakan vis-swnirs dan analisis multivariat. J Penelit Saintek 25: 103-114. |
[5] |
Mancini M, Mazzoni L, Gagliardi F, et al. (2020) Application of the non-destructive NIR technique for the evaluation of strawberry fruits quality parameters. Foods 9: 441. https://doi.org/10.3390/foods9040441 doi: 10.3390/foods9040441
![]() |
[6] |
Gao Q, Wang ML, Guo YY, et al. (2019) Comparative analysis of non-destructive prediction model of soluble solids content for malus micromalus makino based on near-infrared spectroscopy. IEEE Access 7: 128064-128075. https://doi.org/10.1109/ACCESS.2019.2939579. doi: 10.1109/ACCESS.2019.2939579
![]() |
[7] |
Alhamdan AM, Atia A (2017) Non-destructive method to predict Barhi dates quality at different stages of maturity utilising near-infrared (NIR) spectroscopy. Int J Food Prop 20: 2950-2959. https://doi.org/10.1080/10942912.2017.1387794 doi: 10.1080/10942912.2017.1387794
![]() |
[8] |
Kusumiyati K, Hadiwijaya Y, Putri IE (2019) Non-destructive classification of fruits based on vis-nir spectroscopy and principal component analysis. J Biodjati 4: 89-95. https://doi.org/10.15575/biodjati.v4i1.4389 doi: 10.15575/biodjati.v4i1.4389
![]() |
[9] |
Kusumiyati K, Hadiwijaya Y, Suhandy D, et al. (2021) Prediction of water content and soluble solids content of 'manalagi' apples using near infrared spectroscopy. IOP Conf Ser Earth Environ Sci 922: 012062. https://doi.org/10.1088/1755-1315/922/1/012062 doi: 10.1088/1755-1315/922/1/012062
![]() |
[10] |
Sánchez MT, Torres I, De La Haba MJ, et al. (2014) First steps to predicting pulp colour in whole melons using near-infrared reflectance spectroscopy. Biosyst Eng 123: 12-18. https://doi.org/10.1016/j.biosystemseng.2014.04.010 doi: 10.1016/j.biosystemseng.2014.04.010
![]() |
[11] |
Li M, Han DH, Liu W (2019) Non-destructive measurement of soluble solids content of three melon cultivars using portable visible/near infrared spectroscopy. Biosyst Eng 188: 31-39. https://doi.org/10.1016/j.biosystemseng.2019.10.003 doi: 10.1016/j.biosystemseng.2019.10.003
![]() |
[12] |
Wang JH, Wang J, Chen Z, et al. (2017) Development of multi-cultivar models for predicting the soluble solid content and firmness of European pear (Pyrus communis L.) using portable vis-NIR spectroscopy. Postharvest Biol Tec 129: 143-151. https://doi.org/10.1016/j.postharvbio.2017.03.012 doi: 10.1016/j.postharvbio.2017.03.012
![]() |
[13] |
Kusumiyati, Hadiwijaya Y, Putri IE, et al. (2019) Water content prediction of 'crystal' guava using visible-near infrared spectroscopy and chemometrics approach. IOP Conf Ser Earth Environ Sci 393: 012099. https://doi.org/10.1088/1755-1315/393/1/012099 doi: 10.1088/1755-1315/393/1/012099
![]() |
[14] | Damayanti S, Permana B, Weng CC (2012) Determination of sugar content in fruit juices using high performance liquid chromatography. Acta Pharm Indones 37: 139-145. |
[15] | Saad WMM, Salin NSM, Ramzi AS, et al. (2020) Identification and quantification of fructose, glucose and sucrose in watermelon peel juice. Malaysian J Anal Sci 24: 382-389. |
[16] |
Kawamura K, Tsujimoto Y, Rabenarivo M, et al. (2017) Vis-NIR spectroscopy and PLS regression with waveband selection for estimating the total C and N of paddy soils in Madagascar. Remote Sens-Basel 9: 1081. https://doi.org/10.3390/rs9101081 doi: 10.3390/rs9101081
![]() |
[17] |
Nicolaï BM, Beullens K, Bobelyn E, et al. (2007) Nondestructive measurement of fruit and vegetable quality by means of NIR spectroscopy: A review. Postharvest Biol Tec 46: 99-118. https://doi.org/10.1016/j.postharvbio.2007.06.024 doi: 10.1016/j.postharvbio.2007.06.024
![]() |
[18] |
Rambo MKD, Ferreira MMC, Amorim EP (2016) Multi-product calibration models using NIR spectroscopy. Chemometr Intell Lab 151: 108-114. https://doi.org/10.1016/j.chemolab.2015.12.013 doi: 10.1016/j.chemolab.2015.12.013
![]() |
[19] |
Clavaud M, Roggo Y, Dégardin K, et al. (2017) Global regression model for moisture content determination using near-infrared spectroscopy. Eur J Pharm Biopharm 119: 343-352. https://doi.org/10.1016/j.ejpb.2017.07.007 doi: 10.1016/j.ejpb.2017.07.007
![]() |
[20] |
Kusumiyati K, Putri IE, Munawar AA (2021) Model prediksi kadar air buah cabai rawit domba (Capsicum frutescens L.) menggunakan spektroskopi ultraviolet visible near infrared. Agro Bali Agric J 4: 15-22. https://doi.org/10.37637/ab.v4i1.615 doi: 10.37637/ab.v4i1.615
![]() |
[21] |
Putri IE, Kusumiyati K, Munawar AA (2021) Penerapan algoritma diskriminasi menggunakan metode principal component analysis (PCA) dan Vis-SWNIR spectroscopy pada buah cabai rawit domba berbagai tingkat kematangan. SINTECH J 4: 40-46. https://doi.org/10.31598/sintechjournal.v4i1.680 doi: 10.31598/sintechjournal.v4i1.680
![]() |
[22] |
Kusumiyati, Hadiwijaya Y, Putri IE (2018) Determination of water content of intact sapodilla using near infrared spectroscopy. IOP Conf Ser Earth Environ Sci 207: 012047. https://doi.org/10.1088/1755-1315/207/1/012047 doi: 10.1088/1755-1315/207/1/012047
![]() |
[23] |
Kusumiyati, Hadiwijaya Y, Putri IE, et al. (2020) Rapid and non-destructive prediction of total soluble solids of guava fruits at various storage periods using handheld near-infrared instrument, IOP Conf Ser Earth Environ Sci 458: 012022. https://doi.org/10.1088/1755-1315/458/1/012022 doi: 10.1088/1755-1315/458/1/012022
![]() |
[24] |
Kusumiyati K, Putri IE, Munawar AA, et al. (2022) A data fusion model to merge the spectra data of intact and powdered cayenne pepper for the fast inspection of antioxidant properties. Sustainability 14: 201. https://doi.org/10.3390/su14010201 doi: 10.3390/su14010201
![]() |
[25] |
Rinnan Å, Berg FVD, Engelsen SB (2009) Review of the most common pre-processing techniques for near-infrared spectra. TrAC-Trend Anal Chem 28: 1201-1222. https://doi.org/10.1016/j.trac.2009.07.007 doi: 10.1016/j.trac.2009.07.007
![]() |
[26] | Igne B, Drennen JK, Anderson CA (2014) Improving near-infrared prediction model robustness with support vector machine regression: A pharmaceutical tablet assay example. Appl Spectrosc 68: 1348-1356. https://doi.org/10.1366%2F14-07486 |
[27] |
Wu X, Li GL, He FY (2021) Nondestructive analysis of internal quality in pears with a self-made near-infrared spectrum detector combined with multivariate data processing. Foods 10: 1315. https://doi.org/10.3390/foods10061315 doi: 10.3390/foods10061315
![]() |
[28] |
Xie LJ, Ye XQ, Liu DH, et al. (2009) Quantification of glucose, fructose and sucrose in bayberry juice by NIR and PLS. Food Chem 114: 1135-1140. https://doi.org/10.1016/j.foodchem.2008.10.076 doi: 10.1016/j.foodchem.2008.10.076
![]() |
[29] | Cui CH, Fearn T (2017) Comparison of partial least squares regression, least squares support vector machines, and Gaussian process regression for a near infrared calibration. J Near Infrared Spec 25: 5-14. https://doi.org/10.1177%2F0967033516678515 |
[30] |
Sarkar S, Basak JK, Moon BE, et al. (2020) A comparative study of PLSR and SVM-R with various preprocessing techniques for the quantitative determination of soluble solids content of hardy kiwi fruit by a portable Vis/NIR spectrometer. Foods 9: 1078. https://doi.org/10.3390/foods9081078 doi: 10.3390/foods9081078
![]() |
[31] |
Skolik P, Morais CLM, Martin FL, et al. (2019) Determination of developmental and ripening stages of whole tomato fruit using portable infrared spectroscopy and Chemometrics. BMC Plant Biol 19: 1-15. https://doi.org/10.1186/s12870-019-1852-5 doi: 10.1186/s12870-019-1852-5
![]() |
[32] |
Cen HY, He Y (2007) Theory and application of near infrared reflectance spectroscopy in determination of food quality. Trends Food Sci Tech 18: 72-83. https://doi.org/10.1016/j.tifs.2006.09.003 doi: 10.1016/j.tifs.2006.09.003
![]() |
[33] |
Xie LJ, Ying YB (2009) Use of near-infrared spectroscopy and least-squares support vector machine to determine quality change of tomato juice. J Zhejiang Univ-Sci B 10: 465-471. https://doi.org/10.1631/jzus.B0820299 doi: 10.1631/jzus.B0820299
![]() |
[34] |
Khurnpoon L, Sirisomboon P (2018) Rapid evaluation of the texture properties of melon (Cucumis melo L. Var. reticulata cv. Green net) using near infrared spectroscopy. J Texture Stud 49: 387-394. https://doi.org/10.1111/jtxs.12329 doi: 10.1111/jtxs.12329
![]() |
[35] |
Zhang YY, Nock JF, Al Shoffe Y, et al. (2019) Non-destructive prediction of soluble solids and dry matter contents in eight apple cultivars using near-infrared spectroscopy. Postharvest Biol Tec 151: 111-118. https://doi.org/10.1016/j.postharvbio.2019.01.009 doi: 10.1016/j.postharvbio.2019.01.009
![]() |
[36] |
Schoot M, Kapper C, van Kollenburg GH, et al. (2020) Investigating the need for preprocessing of near-infrared spectroscopic data as a function of sample size. Chemometr Intell Lab 204: 104105. https://doi.org/10.1016/j.chemolab.2020.104105 doi: 10.1016/j.chemolab.2020.104105
![]() |
[37] |
Fernández-Novales J, Garde-Cerdán T, Tardáguila J, et al. (2019) Assessment of amino acids and total soluble solids in intact grape berries using contactless Vis and NIR spectroscopy during ripening. Talanta 199: 244-253. https://doi.org/10.1016/j.talanta.2019.02.037 doi: 10.1016/j.talanta.2019.02.037
![]() |
Algorithm 1: Offloading algorithm DCO-PSOMO |
Input: User's application request Ai={s1,s2,…,sn} |
Output: Optimal computation offloading strategy V={s′1,s′2,…,s′k} |
1: ci←CpuUtilizationRatio(); |
2: mi←MemoryUtilizationRatio(); |
3: if (ci>cthreshold||mi>mthreshold) |
4: ηi←getOffloadSuccessProbability(); |
5: if (ηi>ηthreshold) |
6: Initializing PopNum、MaxIter、Particles |
7: i←1 |
8: while(i<=PopNum) |
9: Randomly generated particle i position s; |
10: Add i to the particle swarm; |
11: pbest[i]←s |
12: i←i+1; |
13: end while |
14: j←1; |
15: while(j<=MaxIter) |
16: for(each particle k in particles) |
17: Calculate the fitness of k fitness[k]; |
18: if(fitness[k]<pbest[k]) |
19: pbest[k]←k; |
20: if(fitness[k]<pbest) |
21: gbest←k; |
22: end for |
23: for(each particle k in particles) |
24: Update k's position; |
25: if(Ck<β) |
26: Mutate k; |
27: end for |
28: if(D<γ) |
29: for(each particle k in particles) |
30: Mutate k; |
31: end for |
32: j←j+1; |
33: end while |
34: Stragegy←gbest; |
35: return V={s′1,s′2,…,s′k} |
Mobile terminal equipment | CPU state | |
Idle | Function | |
Samsung p3108 | 25.9 | 1106.3 |
Samsung I9308 | 14.8 | 921.3 |
Samsung I9500 | 16.7 | 914.9 |
Lenovo Xiaoxin V4000 | 197.4 | 7892.3 |
Lenovo deliverer I5-ISK i5 | 228.6 | 8012.5 |
Mobile terminal equipment | WIFI | |||
Closed | Idle | Sending | Receive | |
Samsung p3108 | 0 | 3.7 | 555.0 | 549.7 |
Samsung I9308 | 0 | 1.1 | 355.2 | 340.7 |
Samsung I9500 | 0 | 0.9 | 360.1 | 358.2 |
Lenovo Xiaoxin V4000 | 0 | 12.3 | 1984.2 | 1970.4 |
Lenovo deliverer I5-ISK i5 | 0 | 12.5 | 2012.8 | 2020.6 |
Parameter name | Value |
Inspur NF5270M3 rack server | 3 |
Number of mobile users | 14 |
Sam sung I9500 | 2 |
Sam sung I9308 | 2 |
Sam sung P3108 | 2 |
Lenovo Xiaoxin V4000 | 2 |
Lenovo deliverer 15-ISK i5 | 2 |
Algorithm 1: Offloading algorithm DCO-PSOMO |
Input: User's application request Ai={s1,s2,…,sn} |
Output: Optimal computation offloading strategy V={s′1,s′2,…,s′k} |
1: ci←CpuUtilizationRatio(); |
2: mi←MemoryUtilizationRatio(); |
3: if (ci>cthreshold||mi>mthreshold) |
4: ηi←getOffloadSuccessProbability(); |
5: if (ηi>ηthreshold) |
6: Initializing PopNum、MaxIter、Particles |
7: i←1 |
8: while(i<=PopNum) |
9: Randomly generated particle i position s; |
10: Add i to the particle swarm; |
11: pbest[i]←s |
12: i←i+1; |
13: end while |
14: j←1; |
15: while(j<=MaxIter) |
16: for(each particle k in particles) |
17: Calculate the fitness of k fitness[k]; |
18: if(fitness[k]<pbest[k]) |
19: pbest[k]←k; |
20: if(fitness[k]<pbest) |
21: gbest←k; |
22: end for |
23: for(each particle k in particles) |
24: Update k's position; |
25: if(Ck<β) |
26: Mutate k; |
27: end for |
28: if(D<γ) |
29: for(each particle k in particles) |
30: Mutate k; |
31: end for |
32: j←j+1; |
33: end while |
34: Stragegy←gbest; |
35: return V={s′1,s′2,…,s′k} |
Mobile terminal equipment | CPU state | |
Idle | Function | |
Samsung p3108 | 25.9 | 1106.3 |
Samsung I9308 | 14.8 | 921.3 |
Samsung I9500 | 16.7 | 914.9 |
Lenovo Xiaoxin V4000 | 197.4 | 7892.3 |
Lenovo deliverer I5-ISK i5 | 228.6 | 8012.5 |
Mobile terminal equipment | WIFI | |||
Closed | Idle | Sending | Receive | |
Samsung p3108 | 0 | 3.7 | 555.0 | 549.7 |
Samsung I9308 | 0 | 1.1 | 355.2 | 340.7 |
Samsung I9500 | 0 | 0.9 | 360.1 | 358.2 |
Lenovo Xiaoxin V4000 | 0 | 12.3 | 1984.2 | 1970.4 |
Lenovo deliverer I5-ISK i5 | 0 | 12.5 | 2012.8 | 2020.6 |
Parameter name | Value |
Inspur NF5270M3 rack server | 3 |
Number of mobile users | 14 |
Sam sung I9500 | 2 |
Sam sung I9308 | 2 |
Sam sung P3108 | 2 |
Lenovo Xiaoxin V4000 | 2 |
Lenovo deliverer 15-ISK i5 | 2 |