2020
DOI: 10.3390/s20082434
|View full text |Cite
|
Sign up to set email alerts
|

Data Offloading in UAV-Assisted Multi-Access Edge Computing Systems: A Resource-Based Pricing and User Risk-Awareness Approach

Abstract: Unmanned Aerial Vehicle (UAV)-assisted Multi-access Edge Computing (MEC) systems have emerged recently as a flexible and dynamic computing environment, providing task offloading service to the users. In order for such a paradigm to be viable, the operator of a UAV-mounted MEC server should enjoy some form of profit by offering its computing capabilities to the end users. To deal with this issue in this paper, we apply a usage-based pricing policy for allowing the exploitation of the servers’ computing resource… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(33 citation statements)
references
References 33 publications
0
33
0
Order By: Relevance
“…In order to enable real-time execution, there is a need for faster solutions for both the channel estimation and the SLAM filter. The solutions could be either in the form of new algorithms, or by offloading the computation to more powerful edge computing systems, where edge servers can provide high-performance computing capability closer to end users [68][69][70].…”
Section: Discussionmentioning
confidence: 99%
“…In order to enable real-time execution, there is a need for faster solutions for both the channel estimation and the SLAM filter. The solutions could be either in the form of new algorithms, or by offloading the computation to more powerful edge computing systems, where edge servers can provide high-performance computing capability closer to end users [68][69][70].…”
Section: Discussionmentioning
confidence: 99%
“…We model the phase one (UAV type allocation) and phase two (task allocation) to complete applications defined by an application owner, e.g., road traffic monitoring [11] while considering various uncertainties. Since each edge server has limited computation capability, by deploy many edge servers at the BS, we can use constraints (53) and (54) from Appendix A to ensure that there will be enough computation resources to support the computation required by each UAV. The following sets are used to denote time slots, UAV types, mobile charging stations, and BSs.…”
Section: System Modelmentioning
confidence: 99%
“…However, the latter do not necessarily always have the capacity to offload data to an edge server. In such a case, mobile edge servers can go to them thanks to the deployment of UAV-assisted Multi-access Edge Computing systems, which raises new challenging optimization and networking issues as addressed in [ 9 , 10 ].…”
Section: Uav Enabled Mobile Edge Computingmentioning
confidence: 99%
“…Reference [ 9 ] proposes to provide an Unmanned Aerial Vehicle (UAV)-assisted Multi-access Edge Computing (MEC) system based on a usage-based pricing policy for allowing the exploitation of the servers’ computing resources while the authors of [ 10 ] introduce the DRUID-NET perspective, aiming to adapt to a rapidly varying demand by applying different tools from Automata and Graph theory, Machine Learning, Modern Control Theory, and Network Theory combined.…”
Section: Uav Enabled Mobile Edge Computingmentioning
confidence: 99%