A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (2024)

1. Introduction

The power system is a complex industrial network carrying complex grid transmission, distribution, and massive information. Its infrastructure is distributed widely and challenging to operate and maintain [1]. Power inspection is essential to the safety of the power system and aims to understand its operation status. With the gradual expansion of the power grid’s scale, power inspection faces a series of technical challenges. Take transmission line inspection as an example. Since the power transmission infrastructure is often laid in the field, overhead transmission lines, including high-voltage towers, ancillary components, and transmission lines, must be regularly inspected as they are prone to failure or defects [2,3,4]. Affected by the harsh natural environment and complex terrain, the traditional manual inspection is characterized by high danger, low efficiency, and high investment costs [3,5,6]. Therefore, smart devices (SDs), such as unmanned aerial vehicles (UAVs) and robots, have been widely used in power grid equipment inspection [4,5,7]. With the development and progress of power Internet of Things (PIoT), more and more intellectual technologies, such as edge computing, mobile crowd sensing, advanced communication technologies, and unmanned aerial systems, are applied in inspection [8,9,10,11]. However, the intelligent inspection SDs adopted in the industry, such as UAVs and robots, face varying degrees of low range and limited computation and energy storage capacity [12]. As a direct result of the above issues, the massive inspection data of intelligent inspection still relies mainly on manual processing and is mostly offline and centralized, with poor real-time data analysis [13].

Cloud computing, an essential on-demand access pattern not limited by region or time [14], has become an essential support for power system data analysis. Power intelligent inspection can adopt a centralized cloud computing model. The inspection data from the SD are returned to the cloud computing center. Then, the rich computing resources of the cloud computing center are used to process the image data. However, the cloud computing model increases the load of the cloud computing center, which needs to occupy a large number of backhaul network bandwidth resources, and the long backhaul link makes it difficult to ensure the timeliness of data processing [13,15]. With the development of power IoT, much data are generated at the edge. Edge computing becomes an effective solution to the problems of limited-SD computing and energy storage capacity, limited return link bandwidth resources, and computational timeliness [16,17]. Edge computing and edge-end collaboration techniques can improve data processing efficiency. Some research aims to solve the computation offloading problem between SDs and edge nodes.

Deng et al. [18] offered a user-centric computational offloading model to minimize delay cost, energy consumption, and price in multiuser edge computing network setups. They formulated the problem as a mixed-integer nonlinear programming problem. To tackle this problem, the researchers proposed a branch-and-bound algorithm incorporating linear relaxation enhancements. Furthermore, a particle swarm optimization algorithm was devised, integrating 0–1 and weight improvements. Wei et al. [19] introduced an algorithm for task offloading that balances energy efficiency and delay considerations. They reframed the task offloading challenge as a two-sided matching issue, establishing a stable match between devices and servers through iterative means.

Wang et al. [7] investigated intelligent computation offloading in 5G mobile edge computing power robot inspections to address dynamic environments and different resources. They proposed an AI-assisted multidimensional collaborative optimization algorithm for route planning and task offloading to minimize inspection latency while considering queue backlog constraints. Shen et al. [16] presented a UAV edge computing offloading strategy based on deep reinforcement learning (DRL). They established a collaborative offloading architecture termed “device-edge-cloud” for the UAV edge scenario. This architecture addressed the task offloading problem as an optimization challenge for minimum delay subject to constraints on edge server communication and computing resources. Mao et al. [20] investigated a multi-antenna UAV-assisted task transmission and computation scheme with dual functions of aerial MEC and aerial relay. This study formulated an energy consumption minimization problem for UAV-assisted MEC networks, considering the channel’s uncertainty, and solved it using various convex reformulation methods and successive convex approximation (SCA) algorithms. Focusing on regions with limited or no communication infrastructure in low-latency IoT, Bai et al. [21] proposed a trust-based active notice task offloading (TANTO) scheme assisted by drones. The authors considered the task broadcasting mechanism, network trust, and priority of urgent tasks to optimize the UAV’s flight distance, task completion delay, and task completion rate. Zhang et al. [22] explore a system that employs UAVs to assist in multiaccess edge computing, with the intended outcome being the minimization of the combined expenses related to latency and energy consumption. This is achieved by adhering to certain restrictions on decision-making related to offloading and resource competition.

Shi et al. [23] investigated edge computing solutions for large-scale industrial Internet of Things (IIoT) devices in an integrated network of power line communications (PLC) and wireless communications. The researchers formulated the offloading optimization problem to maximize the total throughput and proposed a price matching-based offloading algorithm for quota tasks. Zhou et al. [24] studied a strategy to enhance computation offloading and service caching in smart grids based on edge computing. The primary objective was to reduce the overall cost of tasks within the system. The authors developed a mixed-integer nonlinear programming (MINLP) problem, which was decomposed into a master problem and a sub-problem. They utilized the gradient descent allocation algorithm and game theory to obtain the resource allocation scheme. Jiang et al. [25] studied the computational offloading problem for dense wireless sensor networks in smart grids. Considering the device-to-device (D2D) communication scenario, they established access selection and resource allocation optimization problems to minimize energy consumption under bandwidth and delay constraints and proposed a quantum-behaved particle swarm optimization (QPSO) algorithm to solve the problem. Wei et al. [19] established a delay and energy efficiency optimization problem for differentiated quality of service (QoS) demands and proposed a low-complexity task offloading algorithm with many-to-one two-sided matching.

In summary, some studies focus on UAV-assisted edge computing, such as [7,16,20,21,26,27], in which UAVs are usually required to act as edge servers or relays for collecting and processing task data. These schemes have the advantage of meeting the problem of data processing in the case of insufficient communication infrastructure and emergencies. However, the energy of UAVs is usually limited, and in the daily inspection of transmission lines, we prefer to ensure a longer inspection distance of UAVs with lower energy consumption. Additionally, some existing studies on end-to-edge computational offloading problems in power IoT, such as [19,23,24,25,28,29,30], cover a variety of PIoT application scenarios. However, PIoT involves scenarios such as power generation, transmission, and distribution, and the types of PIoT SDs, deployment methods, and network structures are different for each scenario. Therefore, the co-computing schemes for various scenarios are not generic. While some research has been dedicated to addressing power IoT edge-end collaborative computing, specialized research on transmission line inspection scenarios is still needed.

Considering the long laying distance, sparse distribution, and remote location of transmission lines, a single edge service node cannot cover the entire line area, and many densely deployed edge service nodes are unfavorable to the economy. Additionally, transmission line inspection is essential to ensure the safe operation of the power grid and the urgent need for data processing. Therefore, we design an edge computing model with multiple relay points using D2D communication and propose a multi-hop-based end-edge cooperative computing (MHCC) scheme based on the distribution characteristics of the transmission line infrastructure. The main contributions of this paper are as follows.

  • To propose a multi-hop-based end-side cooperative computing (MHCC) model for transmission line inspection considering the long laying distance, sparse distribution, and remote location of transmission lines. This model has three kinds of computation methods: local computing, D2D computing, and ESC computing. ESC computing relies on multi-hop paths. In the MHCC model, the nearby resources are fully utilized to reduce transmission line inspection delays.

  • To formulate a multi-hop task offloading optimization problem aiming to minimize the energy consumption of SDs while satisfying the task’s maximum delay constraint. The purpose is to improve task processing timeliness and reduce SD energy consumption. To the best of our knowledge, current research focuses on the study of UAV-assisted edge computing, which involves utilizing multiple UAVs as edge computing devices. However, this approach requires high-cost investment, particularly in scenarios such as transmission line inspections in remote areas.

  • To design a joint Dijkstra and particle swarm optimization (JDPSO) algorithm to solve the proposed MHCC problem. Specifically, we utilize the Dijkstra algorithm to obtain the multi-hop path from SD to ESC and solve the D2D decision problem. The PSO algorithm obtains the computing offloading, power control, and resource allocation decisions. Finally, the performance of the proposed algorithm is evaluated through simulation experiments.

The rest of this paper is organized as follows. Section 2 presents the system model and formulates the problem. Section 3 develops the JDPSO algorithm. Simulations are carried out in Section 4, followed by the conclusion in Section 5.

2. System Model and Problem Formulation

2.1. Network Model

As shown in Figure 1, we consider an end-edge cooperative computing scenario for transmission line inspection. This scenario consists of multiple smart devices (SDs) and an edge server center (ESC) deployed in substations, new energy stations, or energy storage stations. Some inspection SDs, such as video monitoring terminals, are installed on power transmission towers. Some mobile SDs, such as UAVs, regularly patrol transmission lines. Suppose the system allows D2D communication, and the SDs can transmit data through wireless channels. When the SDs are distant from the ESC, neighboring SDs can act as relays, establishing a connection to the ESC through a multi-hop path. It is crucial to note that the inspection SDs in the system are primarily designed to complete inspections timely, efficiently, and accurately. Any self-interest among inspection SDs is negligible, underscoring the system’s cooperative nature. Whenever inspection SDs have available resources and energy and meet communication requirements, they are willing to share resources with other SDs.

Let the set of SDs be M = { 1 , , m , , M } . Let N m be the set of one-hop neighbor nodes of SD m. The SD m randomly generates task T a s k m = { s m , c m , d m max } , m M during the inspection, where s m denotes the size of T a s k m (in bits), and c m denotes the amount of computation required to one bit of data (in cycles/bit). The total amount of computation required to complete T a s k m is s m c m (in cycles). d m max is the maximum allowable delay of T a s k m . In this model, T a s k m can be executed locally or offloaded. Let α m { 0 , 1 , 2 } , m M denote the decision variable of T a s k m for SD m. α m = 0 denotes that SD m computes its own task T a s k m . If α m = 1 , T a s k m will be executed by the neighboring nodes of SD m by one-hop D2D link. Due to the limited resources and battery capacity of SDs, this paper assumes that any neighboring node can only serve for only one SD. α m = 2 represents the ESC computing where SD m offloads the task to the ESC via a multi-hop path. The mathematical notations are shown in Table 1.

2.2. Computingl Model

As mentioned earlier, there are three computation modes for tasks: local computing, D2D computing, and ESC computing. D2D computation means that the SDs can offload the task to the neighboring nodes through one-hop D2D communication, and ESC computation means that the SDs can offload the task to the ESCs through one-hop or multi-hop communication.

2.2.1. Local Computing

When an SD chooses local computing, α m = 0 . Let the computing capacity of SD m M be f m . Then, the local computing delay of T a s k m is

D T a s k m l o c a l = s m c m f m .

The energy consumption corresponding to T a s k m is

E T a s k m l o c a l = ε f m 2 s m c m + E m 0 D T a s k m l o c a l ,

where ε is the energy coefficient, which is related to the chip structure [31]. E m 0 indicates the operating energy consumption of SD m per unit of time, which may vary among SDs. The video monitoring terminals on transmission towers usually have a relatively fixed working mode, and their energy consumption per unit of time is approximated as a constant. According to [32], the energy consumption of mobile SDs, such as UAVs, is related to parameters such as moving speed and mass, assuming that the SD m moves at a constant speed with rate and the SD’s mass remains unchanged during the inspection process, so the energy consumption of the mobile SD per unit of time can also be approximated as a constant.

2.2.2. D2D Computing

When SD m selects D2D computing, α m = 1 . As mentioned above, SD m offloads T a s k m to its neighbor node m N m by a one-hop D2D link. Let γ m , m { 0 , 1 } be the decision variable for direct device-to-device (D2D) communication. If γ m , m = 1 , an SD establishes a D2D connection with SD m . If γ m , m = 0 , no D2D connection is established. When an SD acts as a D2D computing node, it can only provide computing services to one of its neighbor nodes. It needs to satisfy m N m γ m , m = 1 . Regarding D2D computing, the delay of T a s k m includes the transmission delay between SD m and SD m (i.e., D m , m t r ) and the computation delay of m (i.e., D m , m c ).

D T a s k m d 2 d = γ m , m ( D m , m t r + D m , m c ) = γ m , m s m r m , m + γ m , m s m c m f m

where r m , m is the wireless communication rate between SD m and SD m , and f m is the computing capacity of SD m .

r m , m = B log 2 ( 1 + p m t r h m , m σ 2 )

where B is the channel bandwidth, p m t r p m , max t r denotes the transmission power of SD m, p m , max t r is the maximum transmission power, h m , m represents the channel gain between SD m and SD m , and σ 2 is the noise power.

The energy consumption associated with T a s k m includes SD m’s D2D transmission energy consumption, SD m’s operation energy consumption during transmission, the computation energy consumption of SD m , and the operation energy consumption of SD m during executing T a s k m . Since the receiver can operate in a small-signal state and the reception energy consumption is usually smaller than the transmission and computation energy consumption, this paper does not consider the reception energy consumption of SD m .

E T a s k m d 2 d = γ m , m ( D m , m t r p m t r + E m 0 D m , m t r ) + γ m , m ( ε f m 2 s m c m + E m 0 D m , m c )

where p m t r is the transmission power of SD m and E m 0 indicates the operating energy consumption of SD m per unit of time.

2.2.3. ESC Computing

α m = 2 when the SD m uses ESC computing. SD m offloads T a s k m to the ESC via the multi-hop path L m . The multi-hop transmission path diagram is shown in Figure 2. The delay of T a s k m in ESC computing includes multi-hop transmission delay D T a s k m e t r and the ESC’s computation delay D T a s k m e c .

D T a s k m e s c = D T a s k m e t r + D T a s k m e c = ( k , k ) L m γ k , k D k , k t r + s m c m f e = ( k , k ) L m γ k , k s m r k , k + s m c m f e

where ( k , k ) denotes a segment between two neighboring nodes in the multi-hop path L m . f e is the ESC’s computing capacity. The ESC can serve multiple SDs at the same time and its computing capacity is sufficient; i.e., each SD obtains resources for f e f m .

For the ESC computing, each relay node k in multi-hop path L m consumes energy due to its participation in the transmission of T a s k m , including D2D transmission energy consumption and operation energy consumption during transmission. Similarly, we do not consider the relay nodes’ reception energy consumption. As we are more concerned with the energy consumption of SD, this model does not account for the energy consumption of the ESC.

E T a s k m e s c = ( k , k ) L m γ k , k D k , k t r p k t r + ( k , k ) L m γ k , k D k , k t r E k 0

where γ k , k is the decision variable, p k t r is the transmission power of SD k, and E k 0 indicates the operating energy consumption of SD k per unit of time.

To summarize, the delay and energy consumption corresponding to T a s k m can be expressed by the following equations:

D T a s k m = φ ( α m , 0 ) D T a s k m l o c a l + φ ( α m , 1 ) D T a s k m d 2 d + φ ( α m , 2 ) D T a s k m e s c ,

E T a s k m = φ ( α m , 0 ) E T a s k m l o c a l + φ ( α m , 1 ) E T a s k m d 2 d + φ ( α m , 2 ) E T a s k m e s c .

2.3. The Impact of Assumptions in the Model

Allowing D2D communication is essential for establishing the multi-hop model in this paper. In scenarios such as transmission line inspection, some SDs may be situated in areas with no or weak base station coverage and may require relay nodes to facilitate communication. D2D links can facilitate information exchange and data transmission between SDs.

The concept of self-interest in a device is one of the critical points in cooperative computing. Considering user preferences, connection security, and payment, the user equipment may not be willing to share its resources with others in mobile networks and the internet of vehicles. However, in transmission line inspection, both the video monitoring terminal on the transmission tower and the UAVs share the common goal of completing the line inspection effectively. The SDs in the PIoT must undergo strict licensing and certification processes before being installed and used. As a result, we can ignore the self-interest of these devices.

For D2D computing, if an SD acts as a service node, it can only provide computational services to one neighbor node. This assumption aims to avoid multiple neighbor nodes selecting the same SD simultaneously, which may overload that SD. If this assumption is not considered, m N m γ m , m = 1 is not necessary.

We suppose that the UAVs move at a constant speed, which aims to simplify the model. This assumption allows us to focus our goal on the offloading decision process rather than mobility analysis for mobile devices, since the UAVs usually fly at low speeds.

2.4. Problem Formulation

Inspection SDs are commonly used in the field and usually operate using solar energy and batteries. The amount of energy consumed directly affects the working hours of SDs. SDs prioritize energy consumption over delay to ensure the device can work continuously and stably. Thus, we formulate a multi-hop cooperative computing (MHCC) problem, P 1 , to optimize energy consumption while ensuring processing delays of inspection tasks. P 1 aims to minimize the system’s energy consumption while meeting the delay constraints.

P 1 : min α m , γ m , m , f m , p m t r m M E T a s k m s . t . C 1 : D T a s k m d m max , m M C 2 : α m { 0 , 1 , 2 } , m M C 3 : γ m , m { 0 , 1 } , m M , m N m C 4 : m N m γ m , m = 1 , m M C 5 : p m t r p m , max t r , m M

where C 1 shows the delay of T a s k m cannot exceed the maximum delay. C 2 , C 3 , and C 5 are the variable range constraints, and C 4 indicates the SDs can serve one and only one of its neighbor nodes when SDs act as a computing node. The constrained optimization problem P 1 is a mixed-integer nonlinear programming (MINLP) problem that is NP-hard. To solve P 1 , we utilize the penalty function method to formulate the fitness function similar to the literature [33]:

F i t n e s s = m M E T a s k m + P e n n a l t y

P e n a l t y = m M λ m [ max ( 0 , D T a s k m d m max ) ]

λ m is the penalty factor. The constraints C 2 to C 5 involve the range of values of the variables, which can be guaranteed during the programming process and do not need to be added to the penalty function. Therefore, the constrained optimization problem P 1 can be transformed into P 2 .

P 2 : min α m , γ m , m , f m , p m t r F i t n e s s s . t . C 2 : α m { 0 , 1 , 2 } , m M C 3 : γ m , m { 0 , 1 } , m M , m N m C 4 : m N m γ m , m = 1 , m M C 5 : p m t r p m , max t r , m M

3. Algorithm Design

It has been shown that P 2 is a mixed-integer nonlinear programming problem. This type of problem is generally challenging to solve. However, a swarm intelligence algorithm is a common approach that can provide an approximate solution within a limited number of iterations. Particle swarm optimization is an intelligent optimization algorithm that mimics the feeding behavior of bird flocks. The primary goal is to find the best possible solution by promoting collaboration and sharing of information among individuals in the group. Each particle has speed and position characteristics in PSO [33,34]. PSO is a stable and low-complexity algorithm widely used in various application areas, such as combinatorial optimization, function optimization, neural network training, fuzzy system control, and nonlinear integer programming problems. Thus, we propose a joint Dijkstra and particle swarm optimization (JDPSO) algorithm to solve P 2 .

Solving P 2 requires solving computing offloading decisions, D2D decisions, power control, and computational resource allocation simultaneously. We decompose the problem into two sub-problems: the D2D decision sub-problem and the offloading decision sub-problem.

3.1. D2D Decision

The purpose of the D2D decision problem is to obtain the transmission paths for the ESC computing. We use the Dijkstra algorithm to obtain the shortest path from SD to ESC, i.e., a table of potential multi-hop paths.

The Dijkstra algorithm can determine the shortest path between a source node and a target node in a single-source mapping environment by constructing a shortest path tree step by step. It is assumed that the weight between two nodes represents the distance between them. The Dijkstra algorithm begins by marking the source node as visited and then selects the node closest to the source as the current node. Then, the current node is marked as visited, and the distances of its neighboring nodes are updated. This process continues until all nodes have been visited. The pseudo-code of the Dijkstra algorithm is shown in Algorithm 1. The Dijkstra algorithm generates the potential multi-hop paths table, allowing SD to find the next hop D2D node quickly.

Algorithm 1. Dijkstra algorithm
1:Input: The distribution of SDs.
2:Output: The shortest path from SD to ESC.
3:Initialize system parameters: adjacent matrix with weights W, numbering of the source node and numbering of the target nodes.
4:Set the label of the source node q 0 to zero, i.e., L D ( q 0 ) = 0 , and the labels of all other nodes are set to infinity L D ( q 0 ) = , where q 0 denotes the nodes except q 0 .
5:Store the visited nodes in the array Q, which only contains q 0 initially.
6:Find an unvisited node x such that L D ( x ) is minimum.
7:Add x to Q, i.e., x has now been visited.
8:Update L D ( y ) = min { L D ( y ) , L D ( x ) + W ( x , y ) } for all y adjacent to x such that y is not visited, where W ( x , y ) is the weights between x and y.
9:Repeat lines 5 to 8 until all the nodes are visited.
10:Retrieve the array Q, having shortest path from q 0 to all other nodes.
11:Store the shortest path from each SD to the ESC, i.e., the potential multi-hop paths table, until the next update.

3.2. Offloading Decision

For the offloading decision problem, we use the PSO algorithm to obtain the computational offloading decision, the power control, and the computational resource allocation decision, i.e., solve for the variables α m , γ m , m , f m , and p m t r .

The potential decision for SD m is represented as X m = [ α m , γ m , m , f m , p m t r ] , which denotes the position of particle m in PSO. Each particle moves through the search space with a specific direction and velocity, adjusting its position and velocity based on individual and global experience. The equations for updating the particle velocity and position are as follows.

V m t + 1 = ϖ V m t + μ 1 ζ 1 ( p b e s t m X m t ) + μ 2 ζ 2 ( g b e s t X m t )

X m t + 1 = X m t + V m t + 1

where V m t and X m t are the velocity and the position of particle m at the t-th iteration. V m t + 1 and X m t + 1 denote the velocity and the position of particle m at the ( t + 1 ) -th iteration. ϖ represents the inertia factor. μ 1 and μ 2 are random values in the interval [0,1]. ζ 1 and ζ 2 are the acceleration constants. p b e s t m is the best position of the previous iteration of particle m. g b e s t is the global best position.

During the initialization of particle positions, it is essential to initialize the offloading decision, denoted as α m , and then proceed to initialize γ m , m , f m , and p m t r based on the offloading decision. When SD m selects ESC computing, it is necessary to load the potential multi-hop paths table obtained from Algorithm 1 to determine γ m , m .

The pseudo-code of JDPSO is shown in Algorithm 2.

Algorithm 2. JDPSO
1:Input: System parameters: the number and location of SDs, the transmission parameters, and the task parameters (size, the amount of computation, and maximum delay of tasks),
2:Output: α m , γ m , m , f m , and p m t r
3:Initialize the iteration parameters, particle parameters, α m , γ m , m , f m , p m t r
4: if α m = 2
5: Load the potential multi-hop paths table obtained by Algorithm 1 to determine γ m , m .
6: end if
7:Calculate the fitness value of each particle, and record the optimal particle.
8:for iteration < maximum number of iterations
9: for each search particle
10: Update the position of the current particle.
11: if α m = 2
12: Load the potential multi-hop paths table obtained by Algorithm 1 to determine γ m , m .
13: end if
14: Check if any particle goes beyond the search space and amend it. Ensure that conditions C2C5 in P 2 are met.
15: Calculate the fitness of each particle.
16: Update the optimal particle if there is a better solution.
17: end
18:end
19:Return the optimal particle and MHCC scheme (i.e., α m , γ m , m , f m , and p m t r ).

4. Numerical Results and Analysis

4.1. Simulation Setup

With a substation in Jilin Province as the center, the area within a radius of 2 km selects four transmission lines in four different directions. Each line contains fifteen transmission towers, each with an intelligent inspection device. Each transmission line is meticulously inspected by a UAV. The simulation scene diagram is shown in Figure 3. The numbers in the figure indicate the serial number of the SDs. ( s i t e x , s i t e y ) represents the coordinates of SDs and ESC. Since the ESC is located at the origin, s i t e x and s i t e y imply the horizontal and vertical distances (in meters) between the SD and the ESC. The path loss model is 140.7 + 36.7 l o g 10 ( d ) dB , where d is the distance between SDs. We run the simulations on a laptop equipped with an Intel Core i5-8250U 1.8GHz processor and 16GB of RAM. The simulation software we use is Matlab R2023b. Table 2 summarizes the main simulation parameters.

4.2. System Performance Analysis

To evaluate the performance of the proposed JDPSO algorithm, we compared it with five other baseline methods, including genetic algorithms (GAs), random search algorithm (RSA), the salp swarm algorithm (SSA) [35], the moth–flame optimization algorithm (MFO) [36], the dingo optimization algorithm (DOA) [37], and all local computing (ALC). GA is a widely used swarm intelligence optimization algorithm and serves as a common baseline algorithm. GA is applied in computational offloading optimization, as mentioned in [38,39]. SSA, MFO, and DOA have gained popularity as swarm intelligence optimization algorithms in recent years. Some literature has introduced novel computational offloading schemes based on these algorithms [40,41,42,43]. Random search algorithm (RSA) is a simple stochastic selection algorithm known for its fast optimization search speed. In the RSA algorithm, the decision-making process of the SDs is random, and the optimal solution is saved based on the fitness value. Afterward, all the SDs update their decisions randomly. The algorithm iterates several times until a stable optimal solution is found by comparing the current and historical optimal solutions. On the other hand, in the ALC algorithm, all SDs complete their task by the local computing unit.

Figure 4 depicts the JDPSO algorithm’s convergence performance. The convergence curves of various algorithms are compared under identical initial population, population size, and number of iterations. Figure 4 illustrates that JDPSO achieves faster convergence and has a better optimum than GA, RSA, SSA, MFO, and DOA. JDPSO weighs individual optimality and global optimality in the position updating process. Notably, the fitness value of the optimal solution of JDPSO declines by 61.24%, 53.55%, 59.32%, 53.89%, and 28.26% compared to GA, RSA, SSA, MFO, and DOA, respectively. GA converges prematurely at about the 300th iteration, which indicates that the similarity of individuals increases with the number of iterations, and the diversity of the population decreases. RSA randomly updates the SD’s decision at each iteration and does not rely on the best solution obtained, which limits RSA’s local search capability. For P 2 , SSA lacks effective strategies to escape local optima, which leads to less stable results in its optimization search. The MFO’s utilization of spiral search enhances its local search capabilities. However, this limits the MFO’s ability to perform effective global searches, especially in complex problems. DOA converges slower after the 100th iteration and gradually falls into local optimality. Figure 5 compares the energy consumption of the optimal solution obtained by each algorithm. The results show that the JDPSO’s optimal solution has 54.49%, 47.83%, 54.47%, 49.10%, and 25.85% less energy consumption than the GA, RSA, SSA, MFO, and DOA, respectively. Therefore, the JDPSO provides a more energy-efficient solution. Figure 4 and Figure 5 demonstrate the strong convergence of JDPSO and the ability to obtain superior solutions through the iterative process.

Figure 6 compares various algorithms based on the number of SDs that choose local computing, D2D computing, and ESC computing. According to the results, in the JDPSO, 7 SDs chose local computing, 8 SDs (12.50%) chose D2D computing, and 49 SDs (76.56%) chose ESC computing. In JDPSO and DOA, there are significantly more SDs for ESC computing compared to D2D computing and local computing. The number of ESC computing SDs is similar in GA, RSA, SSA, and MFO. The number of local computing and ESC computing SDs are similar in GA, RSA, and SSA. In contrast, the number of local computing and D2D computing SDs are similar in MFO. In addition, Figure 4 and Figure 5 show that the energy consumption of JDPSO and DOA are significantly lower than that of other algorithms. This suggests that energy savings can be achieved by offloading more tasks to the ESC when the ESC has ample computational capacity (in this paper, ESC’s computational capacity is 25 GHz, much higher than that of SDs). A detailed comparison of the data is provided in Table 3. The JDPSO algorithm has the highest percentage of cooperative computation, around 90%. In contrast, the GA, RSA, SSA, MFO, and DOA have offloading percentages of 64.06%, 62.50%, 65.63%, 70.31%, and 79.69%, respectively.

In Figure 7, we compared the average fitness and average energy consumption of the JDPSO with varying computation capacities of the ESC. The results indicate that as the computation capacity of the ESC increases, the fitness value and energy consumption decrease. When the computational capacity of the ESC is 5 GHz, the energy consumption of SDs is higher than that of others. This is because ESC computing leads to additional latency, and as a result, SDs prefer local computing or D2D computing when the computational power of ESC is low. In local computing and D2D computing, SDs consume a lot of computational energy. However, when the computation capacity of the ESC exceeds 20 GHz, the fitness value and energy consumption tend to stabilize, which implies that continuously increasing the computational capacity of the ESC has a limited effect on the system’s performance.

To evaluate the algorithm’s long-term performance, we experimented 100 times. The fitness and average fitness values of each algorithm are depicted in Figure 8. The average fitness values of 100 repeated experiments for the JDPSO, GA, RSA, SSA, MFO, and DOA are as follows: 107.6173, 283.3368, 230.905, 275.6819, 247.4765, and 155.6651, respectively. The JDPSO’s performance is superior to that of the GA, RSA, SSA, MFO, and DOA, with fitness reductions of 62.02%, 53.39%, 60.96%, 56.51%, and 30.87%, respectively. The results show that JDPSO can achieve a long-term stable optimization performance. We now compare the system’s energy consumption and delay among different algorithms, as illustrated in Figure 9 and Figure 10. JDPSO decreases the system’s energy consumption by 68.31% and delay by 62.88% compared to the all-local computing scheme. In practice, some inspection SDs currently use all-local computing. The comparison results show that the JDPSO scheme outperforms the all-local computing scheme regarding energy consumption and delay. For the GA, RSA, SSA, MFO, and DOA, the system’s energy consumption in the JDPSO decreases by 56.30%, 48.56%, 78.87%, 50.89%, 30.85%, and the delay decreases by 50.69%, 42.78%, 58.67%, 44.84%, and 10.22%. This suggests that JDPSO is capable of significantly reducing the system’s energy consumption and delay. Inspection SDs for transmission lines are generally powered by solar energy and batteries, which often fail to obtain stable functions due to sunlight, weather changes, etc. Low power consumption has become a necessary attribute of inspection SDs. The proposed MHCC scheme and JDPSO algorithm can further reduce the system’s energy consumption, which is crucial for transmission line inspection. Figure 11 shows the shortest path topology for each SD to the ESC. The node numbered 1 in the figure is the ESC, and the other nodes are numbered corresponding to Figure 3. The numbers in the Figure 11 indicate the serial number of the SDs.

5. Conclusions

In this paper, we investigate multi-hop end-edge cooperative computation in transmission line inspection scenarios with the aim of solving the current problem of inefficient manual processing of inspection data and disadvantages of cloud computing. We formulate an MHCC problem to minimize the energy consumption of system SDs with delay constraints. We decompose the MHCC problem into the D2D decision sub-problem and the offloading decision sub-problem, and develop a joint Dijkstra and particle swarm optimization algorithm. Simulation results show that the proposed scheme can significantly reduce the system’s energy consumption and delay. Lower energy consumption leads to longer inspection distances, thereby improving the efficiency of intelligent daily inspections of transmission lines. Additionally, for future work, it is worth studying the offloading of tasks from a smart device to multiple auxiliary computing devices simultaneously. This may require a decomposition and prioritization of tasks.

Author Contributions

Conceptualization, X.L., X.C., G.L., X.Z., and H.Y.; Investigation, X.L.; Methodology, X.L.; Resources, G.L., X.Z., and H.Y.; Software, X.L.; Supervision, X.C.; Writing—original draft, X.L.; Writing—review and editing, X.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Jilin Provincial Department of Science and Technology (number 20210203044SF) and the Jilin Province Development and Reform Commission (numbers 2022C045-8).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available from the corresponding author upon request. The data are not publicly available due to potential commercial values.

Conflicts of Interest

Author Guohua Li was employed by State Grid Jilin Electric Power Co., Ltd. Changchun Power Supply Company. Authors Xuguang Zhang and Hongliu Yang were employed by State Grid Jilin Electric Power Co., Ltd. Tonghua Power Supply Company. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be constructed as a potential conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

References

  1. Yang, L.; Fan, J.; Liu, Y.; Li, E.; Peng, J.; Liang, Z. A Review on State-of-the-Art Power Line Inspection Techniques. IEEE Trans. Instrum. Meas. 2020, 69, 9350–9365. [Google Scholar] [CrossRef]
  2. Luo, Y.; Yu, X.; Yang, D.; Zhou, B. A Survey of Intelligent Transmission Line Inspection Based on Unmanned Aerial Vehicle. Artif. Intell. Rev. 2023, 56, 173–201. [Google Scholar] [CrossRef]
  3. Ni, J.; Zhan, T. Smart Sensor Network Optimization and Line Defect Identification Based on UAV Transmission Inspection under 5G Technology. J. Sens. 2022, 2022, 6801985. [Google Scholar] [CrossRef]
  4. Wang, W.; Qu, R.; Liao, H.; Wang, Z.; Zhou, Z.; Wang, Z.; Mumtaz, S.; Guizani, M. 5G MEC-Based Intelligent Computation Offloading in Power Robotic Inspection. IEEE Wirel. Commun. 2023, 30, 66–74. [Google Scholar] [CrossRef]
  5. Alhassan, A.B.; Zhang, X.; Shen, H.; Xu, H. Power Transmission Line Inspection Robots: A Review, Trends and Challenges for Future Research. Int. J. Electr. Power Energy Syst. 2020, 118, 105862. [Google Scholar] [CrossRef]
  6. Ekren, N.; Karagoz, Z.; Sahin, M. A Review of Line Suspended Inspection Robots for Power Transmission Lines. J. Electr. Eng. Technol. 2024, 19, 2549–2583. [Google Scholar] [CrossRef]
  7. Zhou, N.; Li, J.; Zhang, W.; Zhao, J.; Zhao, J. Research on UAV Safety Distance Warning Technology Based on Electric Field Ring Rate of Change. Electronics 2022, 11, 3439. [Google Scholar] [CrossRef]
  8. Ahmed, F.; Mohanta, J.C.; Keshari, A. Power Transmission Line Inspections: Methods, Challenges, Current Status and Usage of Unmanned Aerial Systems. J. Intell. Robot. Syst. 2024, 110, 54. [Google Scholar] [CrossRef]
  9. Xu, C.; Li, Q.; Zhou, Q.; Zhang, S.; Yu, D.; Ma, Y. Power Line-Guided Automatic Electric Transmission Line Inspection System. IEEE Trans. Instrum. Meas. 2022, 71, 3512118. [Google Scholar] [CrossRef]
  10. Yang, Y.; Wei, X.; Xu, R.; Wang, W.; Peng, L.; Wang, Y. Jointly Beam Stealing Attackers Detection and Localization without Training: An Image Processing Viewpoint. Front. Comput. Sci. 2022, 17, 173704. [Google Scholar] [CrossRef]
  11. Yang, Y.; Zhang, B.; Guo, D.; Xu, R.; Kumar, N.; Wang, W. Mean Field Game and Broadcast Encryption-Based Joint Data Freshness Optimization and Privacy Preservation for Mobile Crowdsensing. IEEE Trans. Veh. Technol. 2023, 72, 14860–14874. [Google Scholar] [CrossRef]
  12. Li, Z.; Zhang, Y.; Wu, H.; Suzuki, S.; Namiki, A.; Wang, W. Design and Application of a UAV Autonomous Inspection System for High-Voltage Power Transmission Lines. Remote Sens. 2023, 15, 865. [Google Scholar] [CrossRef]
  13. Liu, M.; Li, Z.; Li, Y.; Liu, Y. A Fast and Accurate Method of Power Line Intelligent Inspection Based on Edge Computing. IEEE Trans. Instrum. Meas. 2022, 71, 3506512. [Google Scholar] [CrossRef]
  14. Xu, D.; Peng, C.; Wang, W.; Liu, H.; Shaikh, S.A.; Tian, Y. Privacy-Preserving Dynamic Multi-Keyword Ranked Search Scheme in Multi-User Settings. IEEE Trans. Consum. Electron. 2023, 69, 890–901. [Google Scholar] [CrossRef]
  15. Mao, S.; He, S.; Wu, J. Joint UAV Position Optimization and Resource Scheduling in Space-Air-Ground Integrated Networks with Mixed Cloud-Edge Computing. IEEE Syst. J. 2021, 15, 3992–4002. [Google Scholar] [CrossRef]
  16. Shen, H.; Jiang, Y.; Deng, F.; Shan, Y. Task Unloading Strategy of Multi UAV for Transmission Line Inspection Based on Deep Reinforcement Learning. Electronics 2022, 11, 2188. [Google Scholar] [CrossRef]
  17. Li, X.; Chen, X.; Li, G. Fairness-Aware Task Offloading and Load Balancing with Delay Constraints for Power Internet of Things. Ad Hoc Netw. 2024, 153, 103333. [Google Scholar] [CrossRef]
  18. Deng, X.; Sun, Z.; Li, D.; Luo, J.; Wan, S. User-Centric Computation Offloading for Edge Computing. IEEE Internet Things J. 2021, 8, 12559–12568. [Google Scholar] [CrossRef]
  19. Wei, Y.; Yang, H.; Wang, J.; Chen, X.; Li, J.; Zhang, S.; Huang, B. Delay and Energy-Efficiency-Balanced Task Offloading for Electric Internet of Things. Electronics 2022, 11, 839. [Google Scholar] [CrossRef]
  20. Mao, W.; Xiong, K.; Lu, Y.; Fan, P.; Ding, Z. Energy Consumption Minimization in Secure Multi-Antenna UAV-Assisted MEC Networks with Channel Uncertainty. IEEE Trans. Wirel. Commun. 2023, 22, 7185–7200. [Google Scholar] [CrossRef]
  21. Bai, J.; Zeng, Z.; Wang, T.; Zhang, S.; Xiong, N.N.; Liu, A. TANTO: An Effective Trust-Based Unmanned Aerial Vehicle Computing System for the Internet of Things. IEEE Internet Things J. 2023, 10, 5644–5661. [Google Scholar] [CrossRef]
  22. Zhang, K.; Gui, X.; Ren, D.; Li, D. Energy-Latency Tradeoff for Computation Offloading in UAV-Assisted Multiaccess Edge Computing System. IEEE Internet Things J. 2021, 8, 6709–6719. [Google Scholar] [CrossRef]
  23. Shi, Z.; Wei, H.; Zhu, J. Edge Computing-Empowered Task Offloading in PLC-Wireless Integrated Network Based on Matching with Quota. Comput. Commun. 2022, 182, 110–116. [Google Scholar] [CrossRef]
  24. Zhou, H.; Zhang, Z.; Li, D.; Su, Z. Joint Optimization of Computing Offloading and Service Caching in Edge Computing-Based Smart Grid. IEEE Trans. Cloud Comput. 2023, 11, 1122–1132. [Google Scholar] [CrossRef]
  25. Jiang, J.; Xu, J.; Xie, Y.; Zhu, Y.; Li, Z.; Yang, C. A Cooperative Computation Offloading Scheme for Dense Wireless Sensor-Assisted Smart Grid Networks. In Proceedings of the 2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS), Chengdu, China, 23–26 April 2021; pp. 887–892. [Google Scholar]
  26. Zeng, Y.; Tang, J. MEC-Assisted Real-Time Data Acquisition and Processing for UAV with General Missions. IEEE Trans. Veh. Technol. 2023, 72, 1058–1072. [Google Scholar] [CrossRef]
  27. Guo, H.; Liu, J. UAV-Enhanced Intelligent Offloading for Internet of Things at the Edge. IEEE Trans. Ind. Inform. 2020, 16, 2737–2746. [Google Scholar] [CrossRef]
  28. Wei, Z.; Li, B.; Zhang, R.; Cheng, X. Contract-Based Charging Protocol for Electric Vehicles with Vehicular Fog Computing: An Integrated Charging and Computing Perspective. IEEE Internet Things J. 2023, 10, 7667–7680. [Google Scholar] [CrossRef]
  29. Shao, S.; Li, Y.; Guo, S.; Wang, C.; Chen, X.; Qiu, X. Delay and Energy Consumption Oriented UAV Inspection Business Collaboration Computing Mechanism in Edge Computing Based Electric Power IoT. Chin. J. Electron. 2023, 32, 13–25. [Google Scholar] [CrossRef]
  30. Zou, J.; Yuan, Z.; Xin, P.; Xiao, Z.; Sun, J.; Zhuang, S.; Guo, Z.; Fu, J.; Liu, Y. Privacy-Friendly Task Offloading for Smart Grid in 6G Satellite–Terrestrial Edge Computing Networks. Electronics 2023, 12, 3484. [Google Scholar] [CrossRef]
  31. Wu, Q.; Chen, J.; Xu, Y.; Qi, N.; Fang, T.; Sun, Y.; Jia, L. Joint Computation Offloading, Role, and Location Selection in Hierarchical Multi-coalition UAV MEC Networks: A Stackelberg Game Learning Approach. IEEE Internet Things J. 2022, 9, 18293–18304. [Google Scholar] [CrossRef]
  32. Luo, Y.; Ding, W.; Zhang, B. Optimization of Task Scheduling and Dynamic Service Strategy for Multi-UAV-Enabled Mobile-Edge Computing System. IEEE Trans. Cogn. Commun. Netw. 2021, 7, 970–984. [Google Scholar] [CrossRef]
  33. Guo, F.; Zhang, H.; Ji, H.; Li, X.; Leung, V.C.M. An Efficient Computation Offloading Management Scheme in the Densely Deployed Small Cell Networks with Mobile Edge Computing. IEEE-ACM Trans. Netw. 2018, 26, 2651–2664. [Google Scholar] [CrossRef]
  34. Kennedy, J.; Eberhart, R. Particle Swarm Optimization. In Proceedings of the ICNN’95—International Conference on Neural Networks, Perth, WA, Australia, 27 November–1 December 1995; IEEE: Perth, WA, Australia, 1995; Volume 4, pp. 1942–1948. [Google Scholar]
  35. Mirjalili, S. Moth-Flame Optimization Algorithm: A Novel Nature-Inspired Heuristic Paradigm. Knowl.-Based Syst. 2015, 89, 228–249. [Google Scholar] [CrossRef]
  36. Mirjalili, S.; Gandomi, A.H.; Mirjalili, S.Z.; Saremi, S.; Faris, H.; Mirjalili, S.M. Salp Swarm Algorithm: A Bio-Inspired Optimizer for Engineering Design Problems. Adv. Eng. Softw. 2017, 114, 163–191. [Google Scholar] [CrossRef]
  37. Peraza-Vázquez, H.; Peña-Delgado, A.F.; Echavarría-Castillo, G.; Morales-Cepeda, A.B.; Velasco-Álvarez, J.; Ruiz-Perez, F. A Bio-Inspired Method for Engineering Design Optimization Inspired by Dingoes Hunting Strategies. Math. Probl. Eng. 2021, 2021, 9107547. [Google Scholar] [CrossRef]
  38. Materwala, H.; Ismail, L.; Hassanein, H.S. QoS-SLA-Aware Adaptive Genetic Algorithm for Multi-Request Offloading in Integrated Edge-Cloud Computing in Internet of Vehicles. Veh. Commun. 2023, 43, 100654. [Google Scholar] [CrossRef]
  39. Fang, J.; Shi, J.; Lu, S.; Zhang, M.; Ye, Z. An Efficient Computation Offloading Strategy with Mobile Edge Computing for IoT. Micromachines 2021, 12, 204. [Google Scholar] [CrossRef] [PubMed]
  40. El Menbawy, N.; Ali, H.A.; Saraya, M.S.; Ali-Eldin, A.M.T.; Abdelsalam, M.M. Energy-Efficient Computation Offloading Using Hybrid GA with PSO in Internet of Robotic Things Environment. J. Supercomput. 2023, 79, 20076–20115. [Google Scholar] [CrossRef]
  41. Aghapour, Z.; Sharifian, S.; Taheri, H. Task Offloading and Resource Allocation Algorithm Based on Deep Reinforcement Learning for Distributed AI Execution Tasks in IoT Edge Computing Environments. Comput. Netw. 2023, 223, 109577. [Google Scholar] [CrossRef]
  42. Singh, P.; Singh, R. Energy-Efficient Delay-Aware Task Offloading in Fog-Cloud Computing System for IoT Sensor Applications. J. Netw. Syst. Manag. 2021, 30, 14. [Google Scholar] [CrossRef]
  43. Song, X.; Wang, Y.; Xie, Z.; Zhang, R.; Xu, S. Dingo-Optimization-Based Task-Offloading Algorithm in Multihop V2V/V2I-Enabled Networks. Trans. Emerg. Telecommun. Technol. 2023, 34, e4823. [Google Scholar] [CrossRef]

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (1)

Figure 1. System model.

Figure 1. System model.

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (2)

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (3)

Figure 2. Multi-hop transmission path diagram.

Figure 2. Multi-hop transmission path diagram.

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (4)

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (5)

Figure 3. The simulation scene diagram.

Figure 3. The simulation scene diagram.

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (6)

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (7)

Figure 4. The convergence curves of fitness values for different algorithms.

Figure 4. The convergence curves of fitness values for different algorithms.

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (8)

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (9)

Figure 5. The convergence curves of energy consumption for different algorithms.

Figure 5. The convergence curves of energy consumption for different algorithms.

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (10)

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (11)

Figure 6. Number of SDs obtained by different algorithms for local computation, D2D computation and ESC computation.

Figure 6. Number of SDs obtained by different algorithms for local computation, D2D computation and ESC computation.

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (12)

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (13)

Figure 7. The average fitness and average energy consumption vary with the computation capacity of ESC in the JDPSO.

Figure 7. The average fitness and average energy consumption vary with the computation capacity of ESC in the JDPSO.

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (14)

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (15)

Figure 8. The repetitive experiments of different algorithms.

Figure 8. The repetitive experiments of different algorithms.

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (16)

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (17)

Figure 9. Comparison of average energy consumption for repeated experiments.

Figure 9. Comparison of average energy consumption for repeated experiments.

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (18)

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (19)

Figure 10. Comparison of average delay for repeated experiments.

Figure 10. Comparison of average delay for repeated experiments.

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (20)

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (21)

Figure 11. The shortest path topology for SD to ESC.

Figure 11. The shortest path topology for SD to ESC.

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (22)

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (23)

Table 1. Mathematical notation.

Table 1. Mathematical notation.

NotationDescription
M Number of SDs
M Set of SDs
m Index of SDs
N m Set of one-hop neighbor nodes of SD m
k, i, lThe SDs in M
m , k , i , l The one-hop neighbor node of SD m, SD k, SD i, and SD l
T a s k m Task to be processed generated by SD m
s m The size of T a s k m
c m The amount of computation required to one bit of data for T a s k m
d m max The maximum allowable delay of T a s k m
α m The decision variable of T a s k m
f m , f m , f e The computing capacity of SD m, SD m , and the ESC
ε The energy coefficient
E m 0 , E m 0 The operating energy consumption of SD m and SD m per unit of time.
D T a s k m l o c a l , E T a s k m l o c a l The delay and energy consumption of T a s k m for local computing
γ m , m , γ k , k The decision variable for direct device-to-device communication
D m , m t r , D k , k t r The transmission delay between two adjacent SDs
D m , m c The computation delay of m to process T a s k m
D T a s k m d 2 d , E T a s k m d 2 d The delay and energy consumption of T a s k m for D2D computing
r m , m The wireless communication rate between SD m and SD m
B The channel bandwidth
p m t r , p m , max t r The transmission power and maximum transmission power of SD m
h m , m The channel gain between SD m and SD m
σ 2 The noise power
L m , L i The multi-hop path of SD m and SD i
D T a s k m e t r The multi-hop transmission delay of T a s k m in ESC computing
D T a s k m e c The computation delay of the ESC to process T a s k m
D T a s k m e s c , E T a s k m e s c The delay and energy consumption of T a s k m for ESC computing
( k , k ) A segment between two neighboring nodes in the multi-hop path L m
φ ( α m , α ) An auxiliary function
D T a s k m , E T a s k m The delay and energy consumption corresponding to T a s k m
λ m The penalty factor
F i t n e s s , P e n a l t y The fitness and penalty function of system
P 1 , P 2 The denotes of the multi-hop cooperative computing problem

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (24)

Table 2. Simulation parameters.

Table 2. Simulation parameters.

ParametersValue
Number of SDs64, (4 UAVs and 60 video monitors)
Number of ESCs1
The computing capacity of SDs f m { 1 , 1.2 , 1.5 } GHz
The computing capacity of ESC f e 25 GHz
The maximum transmission power of SDs p m , max t r 23 dBm
The wireless channel bandwidth180 kHz
The number of channels occupied by each SD[3,12]
The noise power σ 2 3.98 × 10 21
The energy coefficient ε 10 26
The operating energy consumption of SDs E m 0 10 4 J
The transmission rate between SD and ESC50 Mbps
The size of task data s m { 0.2 , 0.5 , 0.8 , 1 } Mb
The computation amount required to one bit of data c m 1000 cycles
The inertia factor ϖ1
The acceleration constants ζ 1 , ζ 2 2
The particle population size200
The maximum number of iterations1000

A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (25)

Table 3. Number of SDs obtained by different algorithms for local computation, D2D computation and ESC computation.

Table 3. Number of SDs obtained by different algorithms for local computation, D2D computation and ESC computation.

JDPSOGARSASSAMFODOA
Local Computing72324221913
D2D Computing81316211916
ESC Computing492824212635

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.


© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
A Multi-Hop End-Edge Cooperative Computing Scheme for Power IoT (2024)

References

Top Articles
Latest Posts
Article information

Author: Fr. Dewey Fisher

Last Updated:

Views: 5588

Rating: 4.1 / 5 (62 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Fr. Dewey Fisher

Birthday: 1993-03-26

Address: 917 Hyun Views, Rogahnmouth, KY 91013-8827

Phone: +5938540192553

Job: Administration Developer

Hobby: Embroidery, Horseback riding, Juggling, Urban exploration, Skiing, Cycling, Handball

Introduction: My name is Fr. Dewey Fisher, I am a powerful, open, faithful, combative, spotless, faithful, fair person who loves writing and wants to share my knowledge and understanding with you.