2020
DOI: 10.11591/ijece.v10i4.pp3757-3766
|View full text |Cite
|
Sign up to set email alerts
|

Time and resource constrained offloading with multi-task in a mobile edge computing node

Abstract: In recent years, the importance of the mobile edge computing (MEC) paradigm along with the 5G, the Internet of Things (IoT) and virtualization of network functions is well noticed. Besides, the implementation of computation-intensive applications at the mobile device level is limited by battery capacity, processing capabalities and execution time. To increase the batteries life and improve the quality of experience for computationally intensive and latency-sensitive applications, offloading some parts of these… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…Before transmission, data must be filtered and compressed to an ideal size. 3) Edge IT data processing [67], [94], [100], [109], [122], [133], [140], [168]- [170], [216], [220]- [223] Before reaching the cloud center, the digitized and aggregated IoT data is processed further. Edge devices do sophisticated analytics and preprocessing, which may include machine learning and visual representation.…”
Section: Architecture Stagesmentioning
confidence: 99%
See 1 more Smart Citation
“…Before transmission, data must be filtered and compressed to an ideal size. 3) Edge IT data processing [67], [94], [100], [109], [122], [133], [140], [168]- [170], [216], [220]- [223] Before reaching the cloud center, the digitized and aggregated IoT data is processed further. Edge devices do sophisticated analytics and preprocessing, which may include machine learning and visual representation.…”
Section: Architecture Stagesmentioning
confidence: 99%
“…One way that IoT edge computing may be used to protect humans is to automatically shut down machines when someone enters a prohibited area at a factory. Autonomous cars require data in order to make critical real-time decisions that might mean the difference between life and death on the road [24], [26], [67], [100], [109], [133], [145], [184], [186], [216], [220], [221], [267], [268], [293], [297], [335].…”
Section: Edge Computing: Low Latency and Securitymentioning
confidence: 99%
“…The researchers [10] looked at three different types of offloading decisions including partial offloading, complete offloading, as well as local execution. The goal of this study is to optimize computational resources and decrease the amount of time needed to complete an independent task within the MEC system.…”
Section: Related Workmentioning
confidence: 99%
“…The edge servers manage several edge devices and gateway by handling the context data. It is a generic term that captures associated computing paradigms such as fog computing, cloudlet, or mobile access edge computing [2].…”
Section: Introductionmentioning
confidence: 99%