Next Article in Journal
Transfer Learning for Multi-Premise Entailment with Relationship Processing Module
Previous Article in Journal
Effects of Transport Network Slicing on 5G Applications
Previous Article in Special Issue
Jointly Optimize the Residual Energy of Multiple Mobile Devices in the MEC–WPT System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Joint Offloading and Energy Harvesting Design in Multiple Time Blocks for FDMA Based Wireless Powered MEC

1
Department of Computer Science and Technology, Jilin University, Changchun 130012, China
2
Department of Computer Science and Technology, North China University of Technology, Beijing 100144, China
3
Department of Information and Computer Engineering, Northeast Forestry University, Harbin 150040, China
*
Authors to whom correspondence should be addressed.
Future Internet 2021, 13(3), 70; https://doi.org/10.3390/fi13030070
Submission received: 22 February 2021 / Revised: 5 March 2021 / Accepted: 9 March 2021 / Published: 12 March 2021
(This article belongs to the Special Issue Fog and Mobile Edge Computing)

Abstract

:
The combination of mobile edge computing (MEC) and wireless power transfer (WPT) is recognized as a promising technology to solve the problem of limited battery capacities and insufficient computation capabilities of mobile devices. This technology can transfer energy to users by radio frequency (RF) in wireless powered mobile edge computing. The user converts the harvested energy, stores it in the battery, and utilizes the harvested energy to execute corresponding local computing and offloading tasks. This paper adopts the Frequency Division Multiple Access (FDMA) technique to achieve task offloading from multiple mobile devices to the MEC server simultaneously. Our objective is to study multiuser dynamic joint optimization of computation and wireless resource allocation under multiple time blocks to solve the problem of maximizing residual energy. To this end, we formalize it as a nonconvex problem that jointly optimizes the number of offloaded bits, energy harvesting time, and transmission bandwidth. We adopt convex optimization technology, combine with Karush–Kuhn–Tucker (KKT) conditions, and finally transform the problem into a univariate constrained convex optimization problem. Furthermore, to solve the problem, we propose a combined method of Bisection method and sequential unconstrained minimization based on Reformulation-Linearization Technique (RLT). Numerical results demonstrate that the performance of our joint optimization method outperforms other benchmark schemes for the residual energy maximization problem. Besides, the algorithm can maximize the residual energy, reduce the computation complexity, and improve computation efficiency.

1. Introduction

With the rapid advancement of 5G network and Internet of Things (IoT), countless emerging mobile application scenarios have appeared in our lives, such as artificial intelligence, internet of vehicles, augmented reality, and virtual reality. This has led to the explosive growth of IoT devices such as smartphones, intelligent wireless sensors and wearable devices [1], and the amount of data processed by IoT devices has increased dramatically. All of these have put forward higher requirements for the real-time communication and computation capabilities of mobile devices. Some researchers have combined cloud computing with mobile computing to solve the problem of limited mobile device resources. Mobile cloud computing reduces the task burden of devices by migrating some or all of the computation tasks from resource-limited mobile devices to remote clouds [2,3]. However, the disadvantages of this architecture are high overhead and long backhaul delay [4], and it is limited by network bandwidth. To solve this problem, a computing model called mobile edge computing (MEC) has received widespread attention from both industry and academia. The MEC server provides computation and storage resources for mobile devices at the edge of the network, and computation tasks can be offloaded to the edge of the network for execution, which can significantly reduce latency and reduce battery energy consumption [5].
Although MEC provides powerful computation resources for mobile devices, it still faces the challenge of limited battery energy supply. Obviously, frequent battery replacement and charging of wireless devices have brought huge costs. The emergence of wireless power transfer (WPT) technology has effectively solved the problem of insufficient energy supply of equipment. This technology broadcasts energy through radio frequency (RF) signals provided by energy transmitters to provide sustainable and permanent energy supply for mobile devices [6]. Recently, Wireless Powered Communication Network (WPCN) and Simultaneous Wireless Information and Power Transfer (SWIPT) have been proposed as important paradigms for providing real sustainability for mobile communications [7,8].
The benefits of combining WPT and MEC have been fully demonstrated in recent years. This new technology is called wireless powered MEC (WP-MEC) [9]. This paper studies the residual energy maximization problem in an environment of MEC system integrating MEC server, Access Point (AP) and multiuser. AP can deliver energy to users through radio frequency (RF). The user converts the harvested energy, stores it in the battery, and uses the harvested energy to execute corresponding computation-intensive tasks. We achieve data and energy transmission in the same frequency band through Time Division Duplex (TDD) protocol. In addition, mobile devices transmit data in FDMA manner. In this paper, we focus on jointly optimizing the wireless and computation resources for the partial computation offloading system. The main contributions of this paper are detailed as follows:
(1)
To effectively reduce the energy consumption of mobile devices, we study the multi-user dynamic joint optimization under multiple time blocks in the residual energy maximization problem. We jointly optimize the number of offloaded bits, energy harvesting time, and transmission bandwidth. To the best of our knowledge, in multiuser systems, most of the literature only studies the problem of active multiple users offloading and wireless energy transmission during one time block, and there are few works on dynamic joint optimization problems under multiple time blocks.
(2)
To solve the residual energy maximization problem of joint optimization, we propose a combined method of Bisection method and sequential unconstrained minimization based on reformulation linearization technique (RLT). We firstly derive the dual problem of the primary problem in a semi-closed form. Next, we seek for the relationship among variables by combining with the Lagrange method and KKT conditions and finally transform the problem into a univariate constrained convex optimization problem. The proposed method converts the primary problem from a nonconvex problem to a convex problem, reduces optimization variables from 3*K*N to K*N, obtains a lower computation complexity, and improves computation efficiency.
(3)
The simulation results verify the theoretical performance analysis of the proposed scheme. The results show that our scheme not only outperforms other baseline schemes but also demonstrates that our algorithm significantly improves the performance, reduces computation complexity, obtains a better solution, and can get the optimal solution.
The reminder of this paper is organized as follows. The second part discusses related work. The third part introduces the system model and problem formalization. The fourth part proposes an effective algorithm to solve the problem. The fifth part provides simulation results. The sixth part gives the conclusion.

2. Related Work

Mobile Cloud Computing (MCC) [10] can solve the problem of limited resources when mobile devices execute tasks. The studies include architecture (such as MAUI [11]) and offloading strategies (ThinkAir [12]). However, the disadvantages of this earlier scheme are high overhead and long backhaul delay. Therefore, mobile edge computing (MEC) technology has been widely studied as a network architecture that can overcome the above problems. However, the practical implementation of MEC technology still faces many challenges.
The problem of resource allocation [13,14] has always been the research focus of MEC, and one of the most critical technologies is computation offloading strategy. The mobile devices design task offloading models according to the partitionability of computation tasks, including binary offloading and partial offloading [15]. Furthermore, reference [16] proposed a wireless-powered MEC system in the unmanned aerial vehicle (UAV) scenario, studied the computation rate maximization problem under binary offloading and partial offloading modes respectively, and solved the proposed nonconvex problem by designing two-stage and three-stage algorithms. In [17], the researchers developed a reverse auction framework. They designed an offloading method based on position auction. In [18], they designed a distributed method based on game theory to manage the computation offloading tasks of wireless devices.
Only adopting the computation offloading strategy still faces the problem of insufficient computing resources and high overhead. To solve this challenge, the studies on joint optimization of energy-saving control strategies for computation and communication resources are essential. In [19], the author designed single and multiple cloud server schemes to minimize energy consumption and latency time by jointly optimizing the computing rate, transmission power and offloading rate of smart mobile devices. Literature [20] proposed a scalable approximate dynamic programming algorithm to reduce average energy consumption. In addition, ref. [21] proposed three cases including Time Division Multiple Access (TDMA) scenario, Frequency Division Multiple Access (FDMA) amplify-and-forward (AF) mode, and scenario in decode-and-forward (DF) mode to minimize the total energy consumption in the system. In [22], orthogonal frequency division multiple access (OFDMA) and time division multiple access (TDMA) systems with infinite or limited cloud computing capabilities formulate the optimal resource allocation problem as a convex optimization problem to solve the minimization problem of the weighted sum mobile consumed energy under computation delay constraints. Furthermore, ref. [23] proposed joint resource allocation and user selection algorithm in MEC to maximize the energy efficiency of the mobile device. In addition, ref. [24] proposed an energy-saving routing scheme that combines the mobile sink and the static sink to decrease the corresponding transmission latency and significantly increase network lifetime. In [25], they proposed an algorithm of jointly allocating bandwidth and computational resources to mobile devices to minimize the energy consumption.
As the basic strategy of the MEC system, in recent years, computation offloading methods for Time Division Multiple Access (TDMA) [26], Orthogonal Frequency Division Multiple Access (OFDMA) [27], and Code Division Multiple Access (CDMA) [28] are widely studied. In [29], work is done to minimize the weighted sum energy at the edge server and the users by FDMA technique with the constraints of the limits of computation, communication and caching capacities, as well as the computation latency. In [30], the energy minimization problem of the offloading system based on the OFDMA scheme in 5G heterogeneous networks is studied. This scheme jointly optimizes wireless and offloading resource allocation. In [31], based on the TDMA technique, the total energy consumption of the AP is minimized by jointly optimizing the CPU frequency, the energy transmit beamforming from the AP transmitter, and the number of offloading bits at the users. An offloading algorithm is proposed in [32] to minimize latency by jointly optimizing the computation and radio resources in a multiuser system.
The research mentioned above basically focuses on saving energy. However, it still faces the problem of insufficient battery energy supply. Wireless power supply technology can avoid frequent battery replacement to improve the sustainability of mobile devices effectively. In [33,34,35,36,37], WPT technology can provide mobile users with continuous wireless energy supply through energy transmitters, and the user can execute task computing and offloading by utilizing the acquired energy. Energy harvesting and resource allocation can significantly improve the performance of the overall system. In [38], they jointly optimizing remote task execution, the energy beamforming at the AP, the task offloading and local computing to solve the problem of the system energy consumption minimization. In [39], they proposed a low-complexity online algorithm based on Lyapunov optimization to minimize the execution cost. In [40], the energy transmission variance, transmission power, and transmission time were jointly optimized to maximize the energy efficiency of the multiantenna WPCN system. In [41], two schemes were proposed for WPCN, which integrates the “harvest-then-transmit” (HTT) mode and the backscatter mode. The research improved the throughput of the total system by applying the user’s working mode.
The practical implementation of the WPT-MEC system still faces many challenges, such as channel fluctuations, dynamic task arrivals, caching mechanisms, unmanned aerial vehicle (UAV), and device status changes. To solve the challenges, in the recent literature [42], the energy consumption of dynamic task arrivals over time and channel fluctuations was studied. They developed heuristic online designs for the joint WPT energy and computation resources to minimize energy. In [38], they considered the dynamic changes of channel state information (CSI) and task state information (TSI), the paper significantly improved the energy efficiency of the system by integrating with the sequential optimization method. In [43], the anti-interference UAV powered cooperative MEC scheme was proposed to minimize the transmit energy of the UAV. Considering that there are few studies on the dynamic joint optimization of the device state, this thus motivates our study in this work.
Different from the previous work, this paper mainly studies the maximum residual energy of the multiuser dynamic joint optimization of the number of offloaded bits, the energy harvesting time, and the transmission bandwidth under multiple time blocks. As far as we know, in the work aimed at maximizing the residual energy of mobile devices, most of the work focuses on the joint optimization of active single user under single time block. There are few studies on this challenge of our work. In our research, all device states change randomly (active or silent). In real scenario, mobile devices cannot always be in working state. Therefore, our work not only achieves joint optimization of resource allocation and improves algorithm efficiency but also increases the possibility of practical implementation of the WPT-MEC system.

3. System Model and Problem Formulation

3.1. System Model

As shown in Figure 1, the residual energy maximization problem is studied in an environment of MEC system. The system includes an Access Point (AP) integrated with the MEC server and K mobile devices. The mobile devices are denoted by M D i , i Κ = { 1 , 2 K } . The AP adopts RF signal-based radio to charge K mobile devices, then receives offloaded tasks from users and transmits them to MEC for computing. AP provides energy to mobile devices by transferring RF power. The mobile devices receive and convert RF power into energy in their batteries and utilize the stored energy to execute task computation. Assume that the downlink energy transmission from AP to users and the uplink computation offloading from users to AP are implemented in the same frequency band, a block system based on FDMA is applied. Besides, the channel state remains constant in one time block and varies between different time blocks. t denotes the time block index, and t T = { 0 , 1 , 2 , , N } . T denotes one time block length. Each wireless device includes two states: active or invalid. It is assumed that the device state of each wireless device M D i at each time block t T is denoted by s i ( t ) { 0 , 1 } , (0 means invalid, 1 means active). Define the device status of all mobile devices M D i during the t-th time block as S ( t ) = { s 1 ( t ) , s 2 ( t ) , , s K ( t ) } . Furthermore, we assume that the channel state information (CSI) from/to K mobile devices can be perfectly known by the AP [44]. Denote the uplink channel power gain vector in the t-th time block as H ( t ) = { h 1 , u ( t ) , h 2 , u ( t ) , , h K , u ( t ) } . Similarly, the downlink channel power gain vector is denoted by G ( t ) = { g 1 , d ( t ) , g 2 , d ( t ) , , g K , d ( t ) } . Where h i , u m a x < , g i , d m a x < , i Κ .
Figure 2 shows the harvesting and offloading model. The mobile devices offload data in the FDMA manner. Assume that the time block length is T. In the t-th time block, the first T i , h ( t ) denotes the time for each mobile device to harvest energy from the AP, and the second T i , o ( t ) denotes the time to offload tasks from mobile devices to the AP, the execution of the offloading tasks and the download of the computing results are accomplished within the remaining time of the time block. Assume that downlink RF signals transfer and local computing are executed simultaneously.

3.2. Computing Model

In each time block t, the computation task for each user i Κ is partitioned into two parts. Assume that the total computation task is Z i ( t ) 0 , local and offloading computing are represented by l i ( t ) 0 and q i ( t ) 0 (bit).

3.2.1. Local Computing Model at Active Users

First, consider the local computing for executing l i ( t ) input bits. Assume that it can be known through off-line measurement that it takes C i CPU cycles to process one bit at M D i . The wireless device can adjust the CPU clock rate by the Dynamic Voltage and Frequency Scaling (DVFS) technology. In the t-th time block, let f i , m ( t ) denote the adjustable CPU cycle frequency, m { 1 , 2 , , C i l i ( t ) } . This frequency cannot exceed the limit of the maximum CPU frequency; it is denoted by f i m a x , which depends on the chip architecture. This constraint is as follows:
0 < f i , m ( t ) f i m a x , i K , t T
As local computing should be accomplished within the block, we have the computation latency constraints as follows:
m = 1 C i l i ( t ) 1 f i , m ( t ) T , i K , t T
Thus, the consumed energy for the above discussions at a mobile device can be expressed as:
E i , loc = m = 1 C i l i ( t ) ζ i f i , m 2 ( t ) , i K , t T
where ζ i > 0 represents the effective capacitance coefficient and the microscale relies on the chip architecture at user i [45], we ζ i = 10 28 according to the actual measurement. To minimize the consumed energy as much as possible while satisfying the delay constraints, it is optimal for each mobile device to set the CPU frequency to be identical. By satisfying strict equality of the constraints in (2), we obtain the following equation:
f i , 1 ( t ) = = f i , C i l i ( t ) ( t ) = C i l i ( t ) / T , i K , t T
The maximum CPU cycle frequency is f i m a x for each user, so the number of computation bits by local computing is constrained by:
0 l i ( t ) T f i m a x C i , i K , t T
As the total computation task is composed of local and offloading computing, we have Z i ( t ) = l i ( t ) + q i ( t ) , the following constraints can be obtained:
Z i ( t ) T f i m a x C i q i ( t ) Z i ( t ) , i K , t T
Accordingly, the energy consumption of E i , loc ( t ) can be expressed as follows:
E i , l o c ( t ) = ζ i C i 3 ( Z i ( t ) q i ( t ) ) 3 T 2 , i K , t T

3.2.2. Offloading Model from Active Users to the AP

Consider the offloading computing for executing q i ( t ) offloaded bits in any time slot. The mobile device offloads its task to the AP by the FDMA offloading strategy. Then, the offloading computing will be performed by the edge server integrated with the AP. The data transmission rate for user i in the t-th time block is expressed as:
v i , o ( t ) = β i , o ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) , i K , t T
where p i , o ( t ) is the uplink data transmission power from the user i to the MEC. σ 2 denotes the noise power at the AP receiver, β i , o ( t ) denotes the bandwidth allocation vector for the mobile device i in each time block t. As the shared bandwidth of K users cannot exceed the total bandwidth, the following constraints can be obtained:
i = 1 K β i , o ( t ) B , i K , t T
where B denotes the total bandwidth of the channel. Then, the offloading time from the M D i to the AP can be expressed as:
T i , o ( t ) = q i ( t ) v i , o ( t ) , i K , t T
As harvesting and offloading time cannot exceed the time slot length T, there are the following constraints:
T i , h ( t ) + q i ( t ) v i , o ( t ) T , i K , t T
Computation offloading incurs energy consumption. In addition to the transmission power p i , o ( t ) the constant circuit power p c , i > 0 is consumed. It is obtained that the energy consumption (J) of task offloading for user i can be expressed as:
E i , o f f ( t ) = p i , o ( t ) T i , o ( t ) + p c , i T i , o ( t ) , i K , t T
Consider the limit of the computation capability of the MEC server. Q max denotes the maximum number of computation cycles executed at the edge server during t-th time block. Then, we have:
i = 1 K q i ( t ) C i Q max , i K , t T
This constraint can guarantee that the MEC computation latency is negligible.

3.3. Energy Harvesting Model

In each time block t, the AP can transfer the RF signals at an energy transmit power P d ( t ) to charge the mobile device [6]. The mobile device harvests the energy and stores it in the battery after conversion. Therefore, the energy harvested by the i-th mobile device is:
E i , h ( t ) = η i T i , h ( t ) P d ( t ) g i , d ( t ) , i K , t T
where 0 < η i < 1 represents the energy conversion efficiency.
We combine the offloading computing energy and the local computing energy, the overall energy consumption at user i in the t-th time block is given by:
E i , c ( t ) = E i , l o c ( t ) + E i , o f f ( t ) , i K , t T
As each user can utilize the harvested energy for local and offloading computing to achieve self-sustainability, the energy consumed cannot exceed the harvested energy in each time block. Hence we have the following constraints:
E i , c ( t ) E i , h ( t ) , i K , t T

3.4. Silent User Model

When the user is in the nonworking state, such as shutting down or out of system coverage, mobile devices cannot harvest and consume energy. Thus, the equation can be given by: E i , l o c ( t ) = E i , o f f ( t ) = E i , h ( t ) = 0 , i K , t T .
Based on the above discussion, we can set a variable to control the device state, i.e., s i ( t ) { 0 , 1 } . When the user is in the working state, this variable is set to 1; when the user is in the nonworking state, we set this variable to 0. Through the above settings, we can achieve dynamic changes in the state of mobile devices.

3.5. Problem Formulation

Under the above settings, our goal is maximizing the sum of the residual energy of N time blocks and K devices. The residual energy of user i in the t-th time block is obtained by the following function:
H i ( t ) ( q i ( t ) , T i , h ( t ) , β i , o ( t ) ) = ( η i T i , h ( t ) P d ( t ) g i , d ( t ) ζ i C i 3 ( Z i ( t ) q i ( t ) ) 3 T 2 ( p i , o ( t ) + p c , i ) ( q i ( t ) β i , o ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) ) ) s i ( t )
Therefore, the residual energy maximization problem can be expressed as:
P 1 : max q , T , β t = 1 N i = 1 K H i ( t ) ( q i ( t ) , T i , h ( t ) , β i , o ( t ) ) s . t . C 1 : Z i ( t ) T f i m a x C i q i ( t ) Z i ( t ) , i K , t T     C 2 : ζ i C i 3 ( Z i ( t ) q i ( t ) ) 3 T 2 + ( p i , o ( t ) + p c , i ) ( q i ( t ) β i , o ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) ) η i T i , h ( t ) P d ( t ) g i , d ( t ) , i K , t T     C 3 : T i , h ( t ) + q i ( t ) β i , o ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) T , i K , t T     C 4 : i = 1 K q i ( t ) C i Q m a x , t T     C 5 : i = 1 K β i , o ( t ) B , t T     C 6 : 0 T i , h ( t ) T , i K , t T     C 7 : 0 q i ( t ) Z i ( t ) , i K , t T
where q ( t ) [ q 1 ( t ) , q 2 ( t ) , , q 2 ( t ) ] , T ( t ) [ T 1 , h ( t ) , T 2 , h ( t ) , , T K , h ( t ) ] and β ( t ) [ β 1 , o ( t ) , β 2 , o ( t ) , , β K , o ( t ) ] denote the number of offloaded bits, energy harvesting time and offloading bandwidth, respectively.

4. Problem Solution

4.1. Problem Conversion

To avoid divided-by-zero exception, we first introduce a microscale ε and then define an auxiliary variable α i ( t ) = ( β i , o ( t ) + ε ) 1 , Therefore, H i ( t ) ( q i ( t ) , T i , h ( t ) , β i , o ( t ) ) can be converted to H i ( t ) ( q i ( t ) , T i , h ( t ) , α i ( t ) ) as given by:
H i ( t ) ( q i ( t ) , T i , h ( t ) , α i ( t ) ) = ( η i T i , h ( t ) P d ( t ) g i , d ( t ) ζ i C i 3 ( Z i ( t ) q i ( t ) ) 3 T 2 ( p i , o ( t ) + p c , i ) ( q i ( t ) α i ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) ) ) s i ( t )
Besides, by substituting α i ( t ) into the constraints in P1, we get the converted problem P2:
P 2 : max q , T , α t = 1 N i = 1 K H i ( t ) ( q i ( t ) , T i , h ( t ) , α i ( t ) ) s . t . C 8 : ζ i C i 3 ( Z i ( t ) q i ( t ) ) 3 T 2 + ( p i , o ( t ) + p c , i ) ( q i ( t ) α i ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) ) η i T i , h ( t ) P d ( t ) g i , d ( t ) , i K , t T   C 9 : T i , h ( t ) + q i ( t ) α i ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) T , i K , t T   C 10 : i = 1 K ( 1 α i ( t ) ε ) B , t T   C 1 , C 4 , C 6 , C 7
P2 is obviously nonconvex because of the second order term in the form of q i ( t ) α i ( t ) . We can linearize the second order term of the problem by the Reformulation Linearization Technique (RLT). Therefore, we adopt RLT to linearize the second order term contained in the objective function and corresponding constraints. Specifically, to eliminate the second order term q i ( t ) α i ( t ) , we define an auxiliary variable Q i ( t ) = q i ( t ) α i ( t ) , q i ( t ) is bounded as 0 q i ( t ) Z i ( t ) and α i ( t ) is bounded as 1 B + ε α i ( t ) 1 ε . We can obtain the RLT bound-factor product constraints for Q i ( t ) is:
{ { [ q i ( t ) 0 ] · [ α i ( t ) 1 B + ε ] } L S , { [ Z i ( t ) q i ( t ) ] · [ α i ( t ) 1 B + ε ] } L S , { [ q i ( t ) 0 ] · [ 1 ε α i ( t ) ] } L S , { [ Z i ( t ) q i ( t ) ] · [ 1 ε α i ( t ) ] } L S
where {.} LS represents a linearization step under Q i ( t ) = q i ( t ) α i ( t ) . By substituting Q i ( t ) into (21), we can get:
{ Q i ( t ) 1 B + ε q i ( t ) 0 Z i ( t ) α i ( t ) 1 B + ε Z i ( t ) Q i ( t ) + 1 B + ε q i ( t ) 0 1 ε q i ( t ) Q i ( t ) 0 1 ε Z i ( t ) Z i ( t ) α i ( t ) 1 ε q i ( t ) + Q i ( t ) 0
Substituting Q i ( t ) into the H i ( t ) ( q i ( t ) , T i , h ( t ) , α i ( t ) ) , we can get:
H i ( t ) ( q i ( t ) , T i , h ( t ) , a i ( t ) , Q i ( t ) ) = ( η i T i , h ( t ) P d ( t ) g i , d ( t ) ζ i C i 3 ( Z i ( t ) q i ( t ) ) 3 T 2 ( p i , o ( t ) + p c , i ) ( Q i ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) ) ) s i ( t )
Besides, by substituting Q i ( t ) into the constraints in P2, the problem P3 can be obtained as follows:
Ρ 3 : max q , T , a , Q t = 1 N i = 1 K H i ( t ) ( q i ( t ) , T i , h ( t ) , a i ( t ) , Q i ( t ) ) s . t .   C 11 : ζ i C i 3 ( Z i ( t ) q i ( t ) ) 3 T 2 + ( p i , o ( t ) + p c , i ) ( Q i ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) ) η i T i , h ( t ) P d ( t ) g i , d ( t ) , i K , t T   C 12 : T i , h ( t ) + Q i ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) T , i K , t T   C 1 , C 4 , C 6 , C 7 , C 10   C 13 : ( 22 )
In order to maximize the residual energy, we should maximize the harvested energy and simultaneously minimize the energy consumption. From the constraint C12, we can see that to maximize the harvested energy, the energy harvesting time must be maximized. Similarly, we should minimize task offloading time to minimize energy consumption. By satisfying strict equality of the constraints in (24), we obtain the following equation:
T i , h ( t ) = T Q i ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 )
Substituting T i , h ( t ) into the H i ( t ) ( q i ( t ) , T i , h ( t ) , a i ( t ) , Q i ( t ) ) , we can get:
H i ( t ) ( q i ( t ) , a i ( t ) , Q i ( t ) ) = ( η i T P d ( t ) g i , d ( t ) ζ i C i 3 ( Z i ( t ) q i ( t ) ) 3 T 2 ( η i P d ( t ) g i , d ( t ) + p i , o ( t ) + p c , i ) ( Q i ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) ) ) s i ( t )
Thus, the residual energy maximization problem can be transformed into the following minimization problem:
H i r e m ( t ) ( q i ( t ) , a i ( t ) , Q i ( t ) ) = ζ i C i 3 ( Z i ( t ) q i ( t ) ) 3 T 2 + ( η i P d ( t ) g i , d ( t ) + p i , o ( t ) + p c , i ) ( Q i ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) )
Then, the following minimization problem P4 can be obtained:
P 4 : min q , a , Q t = 1 N i = 1 K H i r e m ( t ) ( q i ( t ) , a i ( t ) , Q i ( t ) ) s . t . C 14 : 0 < Q i ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) < T , i K , t T   C 15 : ζ i C i 3 ( Z i ( t ) q i ( t ) ) 3 T 2 + ( p i , o ( t ) + p c , i + η i P d ( t ) g i , d ( t ) ) ( Q i ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) ) η i T P d ( t ) g i , d ( t ) i K , t T   C 4 , C 7 , C 10 , C 13
As the objective function P4 is a convex function and the other six constraints are also convex, problem P4 is convex. Hence, we can solve it by applying standard convex optimization techniques (such as Lagrangian method and interior point method). Nevertheless, in order to reveal more design insights, the optimal solution of the problem P4 can be derived in a semi-closed form according to the Lagrangian duality method.

4.2. Problem Solution

First, we find the property of optimal solution by Lagrange duality method and KKT condition. Let μ ( t ) 0 , θ ( t ) 0 , δ i ( t ) 0 , λ i ( t ) 0 , γ i ( t ) 0 , κ i ( t ) 0 and ρ i ( t ) 0 denote the corresponding Lagrange multipliers associated with the constraints in C4, C10, C13 and C15 respectively. Part of the Lagrangian of Problem P4 can be given as:
( q , a , Q , μ , θ , λ , γ , κ , δ , ρ ) = t = 1 N i = 1 K ( ( 1 + ρ i ( t ) ) H i r e m ( t ) ( q i ( t ) , a i ( t ) , Q i ( t ) ) η i T P d ( t ) g i , d ( t ) + t = 1 N μ ( t ) ( ( i = 1 K q i ( t ) C i Q m a x ) + θ ( t ) ( i = 1 K ( 1 α i ( t ) ε ) B ) ) + t = 1 N i = 1 K ( ( λ i ( t ) γ i ( t ) ) ( 1 B + ε q i ( t ) ) + ( δ i ( t ) κ i ( t ) ) 1 ε q i ( t ) ) + t = 1 N i = 1 K ( δ i ( t ) γ i ( t ) ) ( Z i ( t ) α i ( t ) ) + t = 1 N i = 1 K ( γ i ( t ) 1 B + ε δ i ( t ) 1 ε ) Z i ( t ) + t = 1 N i = 1 K ( κ i ( t ) λ i ( t ) + γ i ( t ) δ i ( t ) ) Q i ( t )
The dual function of problem P4 is:
ψ ( μ , θ , λ , γ , κ , δ , ρ ) = min   q , a , Q 1 ( q , a , Q , μ , θ , λ , γ , κ , δ , ρ ) s . t . C 7 , C 14
Hence, the dual problem of P4 is given by:
D 1 : max   q , a , Q ψ ( μ , θ , λ , γ , κ , δ , ρ ) s . t . μ ( t ) 0 , θ ( t ) 0 , δ i ( t ) 0 , λ i ( t ) 0 , γ i ( t ) 0 , κ i ( t ) 0 , ρ i ( t ) 0
Since the problem P4 is a strictly convex function and is met with the Slater condition, so there is a strong duality between P4 and D1. Therefore, we solve the minimization problem P4 by equivalently solving the maximization problem D1 which is dual problem of P4. Based on the above discussion, we denote ( q * , a * , Q * ) as the optimal solution to the problem (31) under the given ( μ , θ , λ , γ , κ , δ , ρ ) . As a result, we can obtain N*K subproblems of jointly optimizing q i ( t ) , α i ( t ) and Q i ( t ) as follows:
min q , a , Q ( 1 + ρ i ( t ) ) H i r e m ( t ) ( q i ( t ) , a i ( t ) , Q i ( t ) ) + μ ( t ) q i ( t ) C i + θ ( t ) 1 α i ( t ) + ( λ i ( t ) γ i ( t ) ) 1 B + ε q i ( t ) + ( δ i ( t ) κ i ( t ) ) 1 ε q i ( t ) + ( δ i ( t ) γ i ( t ) ) Z i ( t ) α i ( t ) + ( κ i ( t ) λ i ( t ) + γ i ( t ) δ i ( t ) ) Q i ( t )   s . t . 0 q i ( t ) Z i ( t ) , 0 < Q i ( t ) <   T log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 )
As the i(t)-th (i(t) denotes user i K in each time block t T ) subproblem is convex and satisfies the Slater condition, we can derive the optimal solution according to the lemma as follows.
Lemma 1.
For the optimal Lagrange multiplier θ * ( t ) and the optimal solution ( q i * ( t ) , α i * ( t ) ), it follows that:
α i * ( t ) = log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) θ * ( t ) ( η i P d ( t ) g i , d ( t ) + p i , o ( t ) + p c , i ) Z i ( t )
q i * ( t ) = Z i ( t ) T 2 ( η i P d ( t ) g i , d ( t ) + p i , o ( t ) + p c , i + ε C i μ ( t ) + ε ω i ( t ) ) 3 ζ i C i 3 ε log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 )
Proof of Lemma 1.
See Appendix A. □
We define F ( θ * ( t ) ) = α i * ( t ) , where
F ( θ * ( t ) ) = log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) θ * ( t ) ( η i P d ( t ) g i , d ( t ) + p i , o ( t ) + p c , i ) Z i ( t )
At the optimal primal-dual solution, we get the following equation i = 1 K ( 1 α i ( t ) ε ) B = 0 . Then, we can define h ( θ * ( t ) ) as follows:
h ( θ * ( t ) ) = i = 1 K ( 1 F ( θ * ( t ) ) ε ) B = 0
To obtain the root of the function, we can use some existing numerical computing methods, such as Bisection and Secant techniques, are used. Nevertheless, the secant-method needs to first find an initial solution that is close enough to the unique root of the function. Since our function h ( θ * ( t ) ) is monotonically decreasing, we thus adopt the Bisection technique to obtain the only solution of the equation h ( θ * ( t ) ) = 0 in the open interval (0, R(t)), where h(R(t)) < 0. The number of iterations to implement a fixed accuracy in Bisection technique is log 2 ( R ( t ) ξ ) . The time cost of evaluating h ( θ * ( t ) ) in each iteration is O(K). Therefore, the time complexity of Algorithm 1 is O(K). Then, α i * ( t ) is obtained by (33). The pseudo code of Algorithm 1 is as follows.
Futureinternet 13 00070 i001
According to the obtained optimal value α i * ( t ) , based on α i ( t ) = 1 β i , o ( t ) , Q i ( t ) = q i ( t ) α i ( t ) , T i , h ( t ) + q i ( t ) β i , o ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) = T , the residual energy for user i in each time block can be expressed as:
E i r e m ( t ) ( q i ( t ) ) = η i T P d ( t ) g i , d ( t ) ) ζ i C i 3 ( Z i ( t ) q i ( t ) ) 3 T 2 ( η i P d ( t ) g i , d ( t ) + p i , o ( t ) + p c , i ) ( q i ( t ) β i , o * ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) )
Substituting α i * ( t ) into the primary problem P1, a constrained convex optimization problem P5 with only variable q i ( t ) can be obtained, it follows that
P 5 : max q t = 1 N i = 1 K E i r e m ( t ) ( q i ( t ) ) s i ( t ) s . t . C 16 : ζ i C i 3 ( Z i ( t ) q i ( t ) ) 3 T 2 + ( ( η i P d ( t ) g i , d ( t ) + p i , o ( t ) + p c , i ) ( q i ( t ) β i , o * ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) ) η i T P d ( t ) g i , d ( t ) , i K , t T C 4 , C 7
P5 is convex and can be optimally solved by the existing optimization algorithms such as SQP, Newton method, and gradient descent method. In problem P5, the objective function is polynomial form, C16 is a polynomial constraint, and C4 and C7 are both simple linear forms. Therefore, we can solve P5 with the following algorithm.
Solving the simplified problem by SUMT and BFGS, we adopt sequential unconstrained minimization technology (SUMT) to reformulate the constraint problem into an unconstrained problem. We can solve the unconstrained optimization problem through some previous algorithms. Barrier method, one of the methods based on SUMT, is used to solve P5. To apply this method, we consider the constraints in P5 to define the penalty function as follows:
M ( q ) = 1 t = 1 N i = 1 K E i r e m ( t ) ( q i ( t ) ) + t = 1 N i = 1 K ( q i ( t ) Z i ( t ) ) t = 1 N i = 1 K ( q i ( t ) ) + t = 1 N i = 1 K ( q i ( t ) Q m a x )
In addition, the initial candidate point q ( 0 ) , the termination limit ε 1 , the initial penalty factor μ 0 , the reduction coefficient of penalty factor ω , and the iteration counter k are given. We can get an unconstrained problem as follows:
min q Y ( q ) + μ k M ( q )
where, Y ( q ) is defined as:
Y ( q ) = t = 1 N i = 1 K E i r e m ( t ) ( q i ( t ) ) s i ( t )
In each iteration, we choose the BFGS method to solve the unconstrained problem and the optimal solution is defined as q ( k * ) .
The penalty factor will be updated by iteration until the iteration time k is larger than 50 or the termination condition μ k M ( q ) < ε 1 is satisfied, and the current q ( k * ) is the optimal solution. The details of the method are as follows:
Futureinternet 13 00070 i002
Based on the optimal number of offloaded bits, we can get the optimal harvesting time by (25). As a result, the primary problem P1 is solved.
The proposed method converts the primary problem from a nonconvex problem to a convex problem, reduces optimization variables from 3*K*N to K*N, brings down computation complexity, and improves computation efficiency.

5. Simulation Results

In this section, we present simulations to test the proposed optimization scheme and test the performance of our algorithm in this paper. This scheme jointly optimizes the number of offloaded bits, energy harvesting time, and transmission bandwidth. To test the performance of the scheme from various aspects, we consider the following influencing factors in the experiment: the AP transmission power, the task size, and the time block length. All the following simulation programs are coded with Python programming language and use the PyOpt [46] tool package for simulation.

5.1. System Parameter Setting

Without loss of generality, we use the following parameter settings in the experiments. Assume that the distance between the mobile device and the AP follows the uniform distribution with d i ( t ) 2 m . The number of CPU cycles required for M D i to process one bit is set as C i [ 1000 , 1200 ] cycles/bit, i K . For i K , the maximum CPU cycle frequency of M D i is f i m a x = 1 GHz . The maximum computing capacity of the MEC server is set as Q m a x = 2 × 10 10 cycles. The energy efficiency coefficient at M D i is set as ζ i = 10 28 , i K . The total system bandwidth B = 3 MHz, and the receiver noise power at the AP is set as σ 2 = 10 9 . The uplink and downlink channel power gains are modeled as h i , u ( t ) = g i , d ( t ) = 10 3 d i a ϕ i 2 ( t ) , i K , t T . Where ϕ i 2 ( t ) represents short-term fading which is an exponentially distributed random variable, and a = 2 represents the path-loss exponent. The length T of each time block is set to 3 s, and the maximum transmit power of the AP is set as P d ( t ) = 200 W , t T . The transmission power p i , o ( t ) is the random value in the range of [0.4, 0.6] W, i K , t T . The energy conversion efficiency for M D i is set as η i [ 0.8 , 0.9 ] , i K The constant variable ε is set to 10 8 , and the equipment state is s i ( t ) { 0 , 1 } , i K , t T .
In the simulation, the system parameters are set as follows. The simulation experiment has been repeated 500 times and then the average value of the simulation results is calculated but we change the above settings according to the experimental situation and randomly select other unfixed parameters to guarantee the authenticity of the experiment.

5.2. Joint Optimization Scheme

In this section, numerical results have been provided to validate the advantages of the proposed joint optimization scheme. This scheme jointly optimizes the number of offloaded bits, energy harvesting time, and transmission bandwidth, called RSB. For comparison, we consider the following four benchmark schemes.
Local computing only (LCO): The mobile device accomplishes its computation tasks by only local computing instead of offloading tasks to the MEC server. This scheme solves (18) by setting the offloading bits q i ( t ) = 0 , i K , t T .
Half offloading (HOF): Half of the computing tasks are executed locally, and the other half are executed at the edge server. This scheme solves (18) by setting the offloading bits q i ( t ) = Z i ( t ) 2 , i K , t T .
Joint optimization with equal bandwidth allocation (EBW): The mobile device executes part of the computing tasks locally and offloads the remaining computing tasks to the edge server for execution. All devices divide the total downlink bandwidth equally. This scheme solves (18) in a joint optimization manner by setting the bandwidth B equal division.
Computation offloading only (FOF): The mobile device accomplishes its computation tasks by only offloading tasks to the MEC server instead of local computing. This scheme solves (18) by setting offloading bits q i ( t ) = Z i ( t ) , i K , t T .
Figure 3 shows the residual energy of the WP-MEC system versus AP transmission power. In the figure, T = 3 s, the number of the task input bits follows the uniform in the range of 80 to 100 KB, and the AP transmission power varies from 200 to 290 W. The simulation result shows that compared with the LOC, HOF, EBW, and FOF schemes, the residual energy of our proposed joint optimization scheme is increased by 2%, 6.8%, 1.8%, and 33%, respectively. The proposed joint optimization scheme provides the largest residual energy. This is because the proposed scheme has an optimal combination of the energy harvesting time, the number of offloaded bits, and the transmission bandwidth while the other four benchmark schemes fix the number of offloaded bits or the transmission bandwidth and can only optimize the other two variables. If the fixed value is set unreasonably, it will consume a lot of energy. Besides, the residual energy of all methods increases almost linearly as the increase of the transmission power. This is due to the fact that under the parameter settings, the optimal solution of the scheme is not affected by the change of AP transmission power, and the energy consumption remains almost unchanged, while the AP’s transmission power only affects the harvested energy. Therefore, the higher the AP transmission power is, the higher the residual energy of the WP-MEC system will be. It is also noticed that the residual energy of the FOF scheme is far lower than that of the LOC scheme, which indicates that the energy consumption by the computation offloading is larger than that of local computing. Under unconstrained conditions, we should try to choose local computing to execute tasks. It is also observed that the residual energy of EBW is close to RSB, indicating that the equal bandwidth allocation scheme is closer to the optimal solution.
Figure 4 shows the residual energy of the WP-MEC system versus the number of task-input bits. In the figure, T = 3 s, the AP transmission power is 200 W, and the number of task-input bits varies from 80 KB to 170 KB. The simulation result shows that the proposed joint optimization algorithm provides higher energy efficiency than LOC, HOF, EBW, and FOF benchmark schemes. Furthermore, the residual energy of all schemes decreases as the number of task-input bits increases. This is because the more the system tasks are executed, the higher the energy consumption will be. Accordingly, the residual energy of the system shows a downward trend as the number of task input bits increase. It is worth noting that when the number of task input bits is small, the energy efficiency of our optimization scheme is similar to LOC and EBW. As the number of task-input bits increases, the benefits of the RSB method gradually become apparent, which means our algorithm can adapt to larger computation tasks than other algorithms. It is also noticed that when the number of task-input bits is 80 KB–100 KB, the residual energy of the RSB scheme is close to EBW, indicating that in this case, the bandwidth setting of the joint optimization scheme is close to equal division. It can also be observed that the HOF curve declines slowly, indicating that the half offloading scheme is also more suitable for larger computation tasks.
Figure 5 shows the residual energy of the WP-MEC system versus time block length T. In the figure, the AP transmission power is 200 W, the number of the task input bits follows the uniform in the range of 80 to 100 KB, and the time block length T varies from 1.6 to 3.2 s. The simulation result shows that the proposed joint optimization algorithm provides larger residual energy than the other four schemes. Besides, as the time block length T increases, the residual energy of all schemes increases. This is because the larger the time block length T, the more energy each mobile device harvests, and the energy consumption of task computing decreases. Hence, the residual energy shows an upward trend. It is worth noting that when the length of the time block T is smaller, the difference of maximum residual energy between the RSB scheme and the other four benchmark schemes is larger. As the length of the time block increases, this difference between them gradually decreases. This result indicates that our joint optimization scheme is more suitable for the settings with the smaller time block length. It is also noticed that when the time block T is smaller, the maximum residual energy difference between the proposed joint optimization scheme and the LOC method is larger. As the time block length increases, the energy efficiency difference between RSB and LOC gradually decreases. This is because the local computing CPU frequency is affected by the time block length T. The smaller the CPU frequency of each the mobile device cycle, the lower the local computing energy consumption will be. It can also be observed that when the time block length is larger, the residual energy of EBW is closer to RSB, indicating that the equal bandwidth allocation scheme is closer to the optimal solution.

5.3. Performance of Algorithm

The simulations in this section verify the efficiency of the proposed algorithm in solving the residual energy maximization problem in this paper. We use the PyOpt optimization tool package to solve the primary nonconvex problem. To this end, the following two benchmark schemes are used for comparing the proposed method.
Non Sorting Genetic Algorithm II (NSGA2): This algorithm can solve nonsmooth and nonconvex single and multiobjective optimization problems based on nondominating sorting genetic algorithm. When solving more complex combinatorial optimization problems, compared with some conventional optimization algorithms, this algorithm can usually obtain better optimization results faster. We adopt the NSAG2 method to solve the problem P1 directly.
Feasible Direction Method (CONMIN): The feasible direction method is a representative direct exploration method for solving constrained nonlinear optimization problems through gradients, and it is also one of the main methods for solving large-scale constrained optimization design problems. We adopt the CONMIN method to solve problem P3.
In the simulation, we test the performance of RSB, NSGA2, and CONMIN on solving the residual energy maximization problem in this paper. In order to test the performance of the algorithm from various aspects, we consider the following influencing factors in the experiment: the AP transmission power, the task size, and the time block length.
In Figure 6, the performance comparison of the residual energy maximization problem achieved by three methods in the AP transmit power varies from 200 to 290 W has been evaluated. From Figure 6a, we can see that as the AP transmit power increases, the residual energy of the three methods increases. This is because as the power of the AP increases, the energy harvesting by the mobile device increases, and the energy consumption remains unchanged. The results show that the three strategies have successfully solved the objective function, and the three algorithms are all feasible in solving the objective problem. The energy efficiency of the proposed RSB algorithm outperforms NSGA2 and CONMIN, and the residual energy is increased by 8% and 40%, respectively. This is because we get an approximate optimal solution by adopting NSGA2 to solve the primary nonconvex problem P1, while the proposed algorithm linearizes the problem P1 by RLT technology to obtain the convex problem P3 and adopts convex optimization theory to simplify the primary problem which is closer to the optimal solution of the primary problem. From the figure, the maximum residual energy difference between RSB and CONMIN is large. This is because our algorithm reduces variables, reduces computation complexity, and improves computation efficiency.
In Figure 7, the performance comparison of the residual energy maximization problem achieved by three methods in the task input bits varies from 80 to 170 KB. The simulation result shows the residual energy of the three algorithms decrease as the number of task-input bits increases. This is because the more the number of local and offloading tasks are executed, the higher the energy consumption will be. Therefore, the residual energy of the system shows a downward trend as the number of task-input bits increases. Figure 7a shows that when the number of task input bits is smaller, the maximum residual energy difference among RSB, NSGA, and CONMIN to execute the computation task is smaller. As the number of task-input bits increases, the performance of our algorithm declines slowly, indicating that it is more suitable for larger computation tasks. It can also be observed that the residual energy curve of the NSGA2 algorithm also declines slowly. This is because the NSGA2 algorithm performs global optimization and it is easier to find a suboptimal solution close to the optimal solution.
In Figure 8, the performance comparison of the residual energy maximization problem achieved by three methods varies from 1.6 to 3.2 s. Figure 8a shows that the RSB algorithm provides a larger residual energy than the other two algorithms. As the time block length T increases, the residual energy of three algorithms increases. This is because the larger the time block length T, the more energy each mobile device harvests, and the energy consumption of local computing decreases. Accordingly, the residual energy shows an upward trend. When the time block length T is smaller, the energy efficiency of the proposed RSB algorithm outperforms NSGA2 and CONMIN. As the time block length T increases, the performance difference between the three algorithms tends to become small, indicating that our algorithm is more suitable for shorter time block length T. It can also be observed that the CONMIN algorithm consumes more energy to solve the objective function, indicating that efficiency of the algorithm is lower.
From Figure 6b, Figure 7b and Figure 8b, we can see that the execution time of the RSB algorithm and CONMIN algorithm is significantly lower than the NSGA2 algorithm. This is because the nonconvex problem solved by the NSGA2 algorithm has high computation complexity and long latency. The convex problem solved by our RSB algorithm and CONMIN algorithm has higher execution efficiency. Furthermore, it can also be observed that the residual energy of our algorithm to solve the problem in this paper is much larger than the CONMIN algorithm. The above figures verify that the proposed RSB algorithm can achieve a better solution and can guarantee lower time overhead.

6. Conclusions

In this paper, we study the residual energy maximization problem at a WP-MEC system in FDMA offloading manner. By jointly optimizing the number of offloading bits, energy harvesting time, and the transmission bandwidth of mobile device, we aim to maximize residual energy by studying multiuser dynamic joint optimization of computation and wireless resource allocation under multiple time blocks. To solve this problem, we adopt convex optimization technology, combine with KKT conditions, and finally transform the problem into a univariate constrained convex optimization problem, aiming at obtaining lower time cost and higher accuracy. Furthermore, in order to improve the efficiency of solving the problem, we propose a combined method of Bisection method and sequential unconstrained minimization based on RLT. The simulation results show that our joint optimization scheme outperforms the other benchmark schemes. Moreover, the algorithm can maximize the residual energy, reduce the computation complexity, and improve computation efficiency. It is worth noting that compared with other work to maximize the residual energy, our work increases the possibility of the practical implementation of the WPT-MEC system. In the future, we will experiment in the real environment. We will simulate the wireless charging environment based on existing wireless charging devices, such as Xiaomi, Apple, and Samsung to verify the effectiveness of the proposed scheme in this paper. Besides, we will explore more efficient algorithms to build an energy efficient MEC system.

Author Contributions

Conceptualization, Z.Y. and Y.L.; methodology, Z.Y. and G.X.; software, Z.Y. and Y.L.; validation, Z.Y. and Y.L.; investigation, Z.Y. and P.L.; resources, Z.Y.; data curation, Z.Y. and L.L.; writing—original draft preparation, Z.Y.; writing—review and editing, Z.Y., Y.L. and L.L.; visualization, Z.Y.; supervision, G.X. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by National Key R&D Plan of China under Grant 2017YFA0604500, Jilin Province Science and Technology Development Plan Project under Grants 20190201180JC and 20200401076GX, Jilin Province Education Department 13th Five-Year Science and Technology Project under Grant JJKH20191310KJ, National Key R&D Program of China under Grant 2018YFB1800302, Natural Science Foundation of China under Grant 61702013, Beijing Natural Science Foundation under Grants KZ201810009011, 4202020 and 19L2021.

Data Availability Statement

Not applicable, the study does not report any data.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Lemma 1
The Lagrangian function of (32) is denoted as:
i ( t ) = ( 1 + ρ i ( t ) ) H i r e m ( t ) ( q i ( t ) , a i ( t ) , Q i ( t ) ) + μ ( t ) q i ( t ) C i + θ ( t ) 1 α i ( t ) + ( λ i ( t ) γ i ( t ) ) 1 B + ε q i ( t ) + ( δ i ( t ) κ i ( t ) ) 1 ε q i ( t ) + ( δ i ( t ) γ i ( t ) ) Z i ( t ) α i ( t ) + ( κ i ( t ) λ i ( t ) + γ i ( t ) δ i ( t ) ) Q i ( t ) + ω i ( t ) ( q i ( t ) ) + ω i ( t ) ( q i ( t ) Z i ( t ) ) + v i ( t ) ( Q i ( t ) ) + v i ( t ) ( Q i ( t ) T   log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) )
where ω i ( t ) 0 , ω i ( t ) 0 , v i ( t ) 0 , v i ( t ) 0 are the Lagrangian multipliers associated with 0 q i ( t ) , q i ( t ) Z i ( t ) , 0 < Q i ( t ) and Q i ( t ) < T   log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) Combined with the KKT conditions, the optimal primal-dual solution ( α i * ( t ) , q i * ( t ) , Q i * ( t ) , ω * i ( t ) , ω * i ( t ) , v * i ( t ) , v * i ( t ) ) for user i K in each time block t T satisfies the following equations:
0 q i ( t ) Z i ( t ) , 0 < Q i ( t ) < T   log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 )
ω i ( t ) 0 ,   ω i ( t ) 0 ,   v i ( t ) 0 ,   v i ( t ) 0
ω i ( t ) q i * ( t ) = 0 , ω i ( t ) ( q i * ( t ) Z i ( t ) ) = 0 , v i ( t ) Q i * ( t ) = 0 v i ( t ) ( Q i * ( t ) T   log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) ) = 0
( 3 ζ i C i 3 ( Z i ( t ) q i ( t ) ) 3 T 2 ) ρ i ( t ) + C i μ ( t ) + λ i ( t ) B + ε γ i ( t ) B + ε κ i ( t ) ε + δ i ( t ) ε + ω i ( t ) ω i ( t ) = 0
θ ( t ) α i ( t ) 2 γ i ( t ) Z i ( t ) + δ i ( t ) Z i ( t ) = 0
( η i P d ( t ) g i , d ( t ) + p i , o ( t ) + p c , i ) ρ i ( t ) log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) λ i ( t ) + γ i ( t ) + κ i ( t ) δ i ( t ) + v i ( t ) v i ( t ) = 0
By setting i ( t ) q i ( t ) = 0 , i ( t ) α i ( t ) = 0 , and i ( t ) Q i ( t ) = 0 , we have (A5), (A6), (A7).
Then, based on (A5) and (A7), it holds that
α i * ( t ) = log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 ) θ * ( t ) ( η i P d ( t ) g i , d ( t ) + p i , o ( t ) + p c , i ) Z i ( t )
Additionally, from (A6) and (A7), it can be seen that
q i * ( t ) = Z i ( t ) T 2 ( η i P d ( t ) g i , d ( t ) + p i , o ( t ) + p c , i + ε C i μ ( t ) + ε ω i ( t ) ) 3 ζ i C i 3 ε log 2 ( 1 + p i , o ( t ) h i , u ( t ) σ 2 )

References

  1. Sun, X.; Ansari, N. EdgeIoT: Mobile Edge Computing for the Internet of Things. IEEE Commun. Mag. 2016, 54, 22–29. [Google Scholar] [CrossRef]
  2. Raj, K.; Sakshi, K.; Naveen, C. Energy conscious multi-site computation offloading for mobile cloud computing. Soft Comput. 2018, 22, 6751–6764. [Google Scholar]
  3. Zheng, J.; Cai, Y.; Wu, Y.; Shen, X. Dynamic Computation Offloading for Mobile Cloud Computing: A Stochastic Game-Theoretic Approach. IEEE Trans. Mob. Comput. 2019, 18, 771–786. [Google Scholar] [CrossRef]
  4. De, D.; Mukherjee, A.; Roy, D.G. Power and Delay Efficient Multilevel Offloading Strategies for Mobile Cloud Computing. Wirel. Pers. Commun. 2020, 112, 2159–2186. [Google Scholar] [CrossRef]
  5. Baktir, A.C.; Ozgovde, A.; Ersoy, C. How Can Edge Computing Benefit from Software-Defined Networking: A Survey, Use Cases & Future Directions. IEEE Commun. Surv. Tutor. 2017, 19, 2359–2391. [Google Scholar]
  6. Wu, H.; Tian, H.; Nie, G.; Zhao, P. Wireless Powered Mobile Edge Computing for Industrial Internet of Things Systems. IEEE Access 2020, 8, 101539–101549. [Google Scholar] [CrossRef]
  7. Janatian, N.; Stupia, I.; Vandendorpe, L. Optimal Offloading Strategy and Resource Allocation in SWIPT-based Mobile-Edge Computing Networks. In Proceedings of the 2018 15th International Symposium on Wireless Communication Systems (ISWCS), Lisbon, Portugal, 28–31 August 2018. [Google Scholar]
  8. Asiedu, D.K.P.; Mahama, S.; Song, C.; Kim, D.; Lee, K.J. Beamforming and Resource Allocation for Multi-User Full-Duplex Wireless Powered Communications in IoT Networks. IEEE Internet Things J. 2020, 7, 11355–11370. [Google Scholar] [CrossRef]
  9. Hu, X.; Wong, K.K.; Yang, K. Wireless Powered Cooperation-Assisted Mobile Edge Computing. IEEE Trans. Wirel. Commun. 2018, 17, 2375–2388. [Google Scholar] [CrossRef] [Green Version]
  10. Kumar, K.; Lu, Y.H. Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? Computer 2010, 43, 51–56. [Google Scholar] [CrossRef]
  11. Cuervo, E.; Balasubramanian, A.; Cho, D.K.; Wolman, A.; Bahl, P. MAUI: Making smartphones last longer with code offload. In Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, San Francisco, CA, USA, 14–18 June 2010. [Google Scholar]
  12. Kosta, S.; Aucinas, A.; Hui, P.; Mortier, R.; Zhang, X. ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, 25–30 March 2012; pp. 945–953. [Google Scholar]
  13. Yang, L.; Xu, G.; Ge, J.; Liu, P.; Fu, X. Energy-Efficient Resource Allocation for Application Including Dependent Tasks in Mobile Edge Computing. KSII Trans. Internet Inf. Syst. 2020, 14, 2422–2443. [Google Scholar]
  14. Li, Y.; Xu, G.; Yang, K.; Ge, J.; Jin, Z. Energy Efficient Relay Selection and Resource Allocation in D2D-Enabled Mobile Edge Computing. IEEE Trans. Veh. Technol. 2020, 69, 15800–15814. [Google Scholar] [CrossRef]
  15. Mao, Y.; You, C.; Zhang, J.; Huang, K.; Letaief, K.B. A Survey on Mobile Edge Computing: The Communication Perspective. IEEE Commun. Surv. Tutor. 2017, 19, 2322–2358. [Google Scholar] [CrossRef] [Green Version]
  16. Zhou, F.; Wu, Y.; Hu, R.Q.; Qian, Y. Computation Rate Maximization in UAV-Enabled Wireless-Powered Mobile-Edge Computing Systems. IEEE J. Sel. Areas Commun. 2018, 36, 1927–1941. [Google Scholar] [CrossRef] [Green Version]
  17. Habiba, U.; Maghsudi, S.; Hossain, E. A Reverse Auction Model for Efficient Resource Allocation in Mobile Edge Computation Offloading. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019. [Google Scholar]
  18. Liu, M.; Liu, Y. Price-Based Distributed Offloading for Mobile-Edge Computing With Computation Capacity Constraints. IEEE Wirel. Commun. Lett. 2017, 7, 420–423. [Google Scholar] [CrossRef] [Green Version]
  19. Wang, Y.; Sheng, M.; Wang, X.; Wang, L.; Li, J. Mobile-Edge Computing: Partial Computation Offloading Using Dynamic Voltage Scaling. IEEE Trans. Commun. 2016, 64, 4268–4282. [Google Scholar] [CrossRef]
  20. Mao, Y.; Zhang, J.; Letaief, K.B. Dynamic Computation Offloading for Mobile-Edge Computing with Energy Harvesting Devices. IEEE J. Sel. Areas Commun. 2016, 34, 3590–3605. [Google Scholar] [CrossRef] [Green Version]
  21. Li, X.; Fan, R.; Hu, H.; Zhang, N.; Chen, X. Energy-efficient Resource Allocation for Mobile Edge Computing Aided by Multiple Relays. 2020. Available online: https://arxiv.org/pdf/2004.03821.pdf (accessed on 11 March 2021).
  22. You, C.; Huang, K.; Chae, H.; Kim, B.H. Energy-Efficient Resource Allocation for Mobile-Edge Computation Offloading. IEEE Trans. Wirel. Commun. 2017, 16, 1397–1411. [Google Scholar] [CrossRef]
  23. Feng, H.; Guo, S.; Zhu, A.; Wang, Q.; Liu, D. Energy-efficient User Selection and Resource Allocation in Mobile Edge Computing. Ad Hoc Netw. 2020, 107, 102202. [Google Scholar] [CrossRef]
  24. Li, X.; Guo, S.; Li, P. Energy-Efficient Data Collection Scheme Based on Mobile Edge Computing in WSNs. In Proceedings of the 2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), Shenzhen, China, 11–13 December 2019. [Google Scholar]
  25. Zhao, T.; Zhou, S.; Song, L.; Jiang, Z.; Guo, X.; Niu, Z. Energy-optimal and delay-bounded computation offloading in mobile edge computing with heterogeneous clouds. China Commun. 2020, 17, 191–210. [Google Scholar] [CrossRef]
  26. Wang, X.; Giannakis, G.B. Power-Efficient Resource Allocation for Time-Division Multiple Access Over Fading Channels. IEEE Trans. Inf. Theory 2008, 54, 1225–1240. [Google Scholar] [CrossRef]
  27. Wong, C.Y.; Cheng, R.S.; Lataief, K.B.; Murch, R.D. Multiuser OFDM with adaptive subcarrier, bit, and power allocation. IEEE J. Sel. Areas Commun 1999, 17, 1747–1758. [Google Scholar] [CrossRef] [Green Version]
  28. Oh, S.J.; Zhang, D.; Wasserman, K.M. Optimal resource allocation in multiservice CDMA networks. IEEE Trans. Wirel. Commun. 2003, 2, 811–821. [Google Scholar]
  29. Chen, J.; Xing, H.; Lin, X.; Bi, S. Joint Cache Placement and Bandwidth Allocation for FDMA-based Mobile Edge Computing Systems. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020. [Google Scholar]
  30. Zhang, K.; Mao, Y.; Leng, S.; Zhao, Q.; Li, L.; Peng, X.; Pan, L.; Maharjan, S.; Zhang, Y. Energy-Efficient Offloading for Mobile Edge Computing in 5G Heterogeneous Networks. IEEE Access 2016, 4, 5896–5907. [Google Scholar] [CrossRef]
  31. Wang, F.; Xu, J.; Wang, X.; Cui, S. Joint Offloading and Computing Optimization in Wireless Powered Mobile-Edge Computing Systems. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017. [Google Scholar]
  32. Le, H.Q.; Al-Shatri, H.; Klein, A. Efficient resource allocation in mobile-edge computation offloading: Completion time minimization. In Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017. [Google Scholar]
  33. Liu, B.; Wang, J.; Ma, S.; Zhou, F.; Ma, Y.; Lu, G. Energy-Efficient Cooperation in Mobile Edge Computing-Enabled Cognitive Radio Networks. IEEE Access 2019, 7, 45382–45394. [Google Scholar] [CrossRef]
  34. Mahmood, A.; Ahmed, A.; Naeem, M.; Hong, Y. Partial Offloading in Energy Harvested Mobile Edge Computing: A Direct Search Approach. IEEE Access 2020, 8, 36757–36763. [Google Scholar] [CrossRef]
  35. Zhao, P.; Tao, J.; Rauf, A.; Jia, F.; Longting, X.U. Load Balancing for Energy-Harvesting Mobile Edge Computing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2020, E104.A, 336–342. [Google Scholar] [CrossRef]
  36. Liu, P.; Xu, G.; Yang, K.; Wang, K.; Li, Y. Joint Optimization for Residual Energy Maximization in Wireless Powered Mobile-Edge Computing Systems. KSII Trans. Internet Inf. Syst. 2018, 12, 5614–5633. [Google Scholar]
  37. Li, L.; Xu, G.; Liu, P.; Li, Y.; Ge, J. Jointly Optimize the Residual Energy of Multiple Mobile Devices in the MEC–WPT System. Future Internet 2020, 12, 233. [Google Scholar] [CrossRef]
  38. Wang, F.; Xing, H.; Xu, J. Real-Time Resource Allocation for Wireless Powered Multiuser Mobile Edge Computing With Energy and Task Causality. IEEE Trans. Commun. 2020, 68, 7140–7155. [Google Scholar] [CrossRef]
  39. Ding, J.; Jiang, L.; He, C. User-centric Energy-efficient Resource Management for Time Switching Wireless Powered Communications. IEEE Commun. Lett. 2017, 22, 165–168. [Google Scholar] [CrossRef]
  40. Kim, B.; Kang, J.M.; Kim, H.M.; Lee, J. Energy efficiency optimization in multi-antenna wireless powered communication network. In Proceedings of the 2016 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, 19–21 October 2016. [Google Scholar]
  41. Lyu, B.; Yang, Z.; Gui, G.; Sari, H. Optimal Time Allocation in Backscatter Assisted Wireless Powered Communication Networks. Sensors 2017, 17, 1258. [Google Scholar]
  42. Wang, F.; Xu, J.; Cui, S. Optimal Energy Allocation and Task Offloading Policy for Wireless Powered Mobile Edge Computing Systems. IEEE Trans. Wirel. Commun. 2020, 19, 2443–2459. [Google Scholar] [CrossRef] [Green Version]
  43. Lu, W.; Xu, X.; Lu, F.; Peng, H.; Gong, Y. Resource optimization in anti-interference UAV powered cooperative mobile edge computing network. Phys. Commun. 2020, 42, 101128. [Google Scholar] [CrossRef]
  44. Wu, Q.; Tao, M.; Ng, D.W.K.; Chen, W.; Schober, R. Energy-Efficient Resource Allocation for Wireless Powered Communication Networks. IEEE Trans. Wirel. Commun. 2015, 15, 2312–2327. [Google Scholar] [CrossRef] [Green Version]
  45. Zhang, W.; Wen, Y.; Guan, K.; Kilper, D. Energy-Optimal Mobile Cloud Computing under Stochastic Wireless Channel. IEEE Trans. Wirel. Commun. 2013, 12, 4569–4581. [Google Scholar] [CrossRef]
  46. Perez, R.E.; Jansen, P.W.; Martins, J.R.R.A. pyOpt: A Python-based object-oriented framework for nonlinear constrained optimization. Struct. Multidiscip. Optim. 2012, 45, 101–118. [Google Scholar] [CrossRef]
Figure 1. System architecture.
Figure 1. System architecture.
Futureinternet 13 00070 g001
Figure 2. The time allocation.
Figure 2. The time allocation.
Futureinternet 13 00070 g002
Figure 3. Residual Energy vs. Access Point (AP) Transmission Power.
Figure 3. Residual Energy vs. Access Point (AP) Transmission Power.
Futureinternet 13 00070 g003
Figure 4. Residual Energy vs. Task Size.
Figure 4. Residual Energy vs. Task Size.
Futureinternet 13 00070 g004
Figure 5. Residual Energy vs. Time Block.
Figure 5. Residual Energy vs. Time Block.
Futureinternet 13 00070 g005
Figure 6. Performance vs. AP Transmission Power. (a) Residual Energy; (b) Time Cost.
Figure 6. Performance vs. AP Transmission Power. (a) Residual Energy; (b) Time Cost.
Futureinternet 13 00070 g006
Figure 7. Performance vs. Task Size. (a) Residual Energy; (b) Time Cost.
Figure 7. Performance vs. Task Size. (a) Residual Energy; (b) Time Cost.
Futureinternet 13 00070 g007
Figure 8. Performance vs. AP Time Block. (a) Residual Energy; (b) Time Cost.
Figure 8. Performance vs. AP Time Block. (a) Residual Energy; (b) Time Cost.
Futureinternet 13 00070 g008
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Yu, Z.; Xu, G.; Li, Y.; Liu, P.; Li, L. Joint Offloading and Energy Harvesting Design in Multiple Time Blocks for FDMA Based Wireless Powered MEC. Future Internet 2021, 13, 70. https://doi.org/10.3390/fi13030070

AMA Style

Yu Z, Xu G, Li Y, Liu P, Li L. Joint Offloading and Energy Harvesting Design in Multiple Time Blocks for FDMA Based Wireless Powered MEC. Future Internet. 2021; 13(3):70. https://doi.org/10.3390/fi13030070

Chicago/Turabian Style

Yu, Zhiyan, Gaochao Xu, Yang Li, Peng Liu, and Long Li. 2021. "Joint Offloading and Energy Harvesting Design in Multiple Time Blocks for FDMA Based Wireless Powered MEC" Future Internet 13, no. 3: 70. https://doi.org/10.3390/fi13030070

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop