Next Article in Journal
Practical Methodology for a Three-Dimensional-Printed Hybrid Desalination System
Previous Article in Journal
Effect of Pseudomonas Fluorescens on Isofetamid Dissipation and Soil Microbial Activity
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Objective Edge Node Deployment Method Based on Improved Heuristic Algorithms for Smart Mines

1
Shenyang Institute of Computing Technology, Chinese Academy of Sciences, Shenyang 110168, China
2
University of Chinese Academy of Sciences, Beijing 100049, China
3
Liaoning Key Laboratory of Domestic Industrial Control Platform Technology on Basic Hardware and Software, Shenyang 110168, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Appl. Sci. 2024, 14(23), 10903; https://doi.org/10.3390/app142310903
Submission received: 21 October 2024 / Revised: 16 November 2024 / Accepted: 21 November 2024 / Published: 25 November 2024

Abstract

:
As the number of intelligent devices in mining environments increases, the transmission time for large datasets, including equipment status and environmental parameters, also rises. This increase leads to longer response times for service requests, making it difficult to meet the equipment’s real-time requirements. Edge computing effectively addresses the demands for low latency and high performance. However, the deployment of edge nodes can negatively affect overall service performance due to resource limitations and node heterogeneity. In this paper, we propose two node deployment strategies: an improved genetic algorithm (IBGA) for fixed device scenarios and an improved sand cat swarm optimization algorithm (ISCSO) for mobile device scenarios, both accounting for the mobility characteristics of the devices. Additionally, we developed a simulation platform based on a production line system and an intelligent patrol vehicle to evaluate the proposed method’s effectiveness. The experimental results show that the IBGA and ISCSO algorithms effectively reduce task delay and deployment cost. Both deployment methods outperform the benchmark algorithms and offer better service quality assurance.

1. Introduction

The mining environment is inherently complex, marked by high temperatures, humidity, distinct geological conditions, confined spaces, and numerous obstacles. These conditions significantly heighten the risks of hazards such as collapses, fires, and explosions, posing considerable challenges to the safety of both workers and equipment [1]. Given these factors, implementing a comprehensive monitoring system for the mining environment is essential. However, the uneven terrain in mining areas induces significant vibrations in the sensing equipment, which compromises the accuracy of the collected data. The accumulation of sand and dust also increases the risk of equipment failure. In addition, the high-temperature and humid conditions necessitate careful consideration of the temperature resistance of the devices. The mountainous topography may further weaken signal strength. Consequently, the application of multi-sensor fusion technology becomes critical, requiring the deployment of multiple sensors to achieve comprehensive, multi-attribute detection of mechanical equipment within mining environments. Mining operations inherently produce time-sensitive data that require immediate processing to ensure the safety of personnel and assets. However, the need for real-time processing demands significant computational power and storage capacity, which often surpass the capabilities of traditional computing systems [2].
To address these challenges, we utilize the vast computing and storage resources provided by cloud computing to handle large datasets. However, this approach faces challenges due to the substantial distance between the sensors and the cloud server, along with constraints in network bandwidth. The large volume of data transmitted to the cloud leads to network congestion and significant transmission delays, making it insufficient for fulfilling the real-time requirements of latency-sensitive tasks. In response to these challenges, edge computing has emerged as a complementary paradigm to cloud computing, enabling data processing closer to the source. In mining operations, edge nodes, equipped with essential computing, storage, and network communication capabilities, are strategically deployed near the equipment to ensure timely responsiveness to real-time tasks [3,4]. Despite the clear advantages of edge computing in managing large datasets, the deployment of critical edge nodes presents persistent challenges. Several factors contribute to this complexity. First, there is a significant divergence in the hardware architectures and software configurations across different sensing devices. Second, the network interactions are highly heterogeneous, involving not only device-to-device communication but also interactions between devices, edge nodes, and sensors [5,6]. Third, edge nodes from different manufacturers exhibit disparities in computing power, storage capacities, and communication capabilities [7]. Therefore, the efficient deployment of edge nodes at the network edge is essential for implementing edge computing in mining operations. This approach is also critical for ensuring service quality via the edge computing platform [8].
The mechanical equipment in the mine environment is divided into fixed equipment and mobile equipment [9]. Fixed equipment primarily includes large, immovable devices such as conveyors, stationary crushers, and vibrating screens. The operational states of these devices are complex and variable, requiring the deployment of various sensors to collect multi-faceted data. This imposes periodic computational loads on the processing nodes. Additionally, structural and layout differences among devices necessitate different sensor types to meet specific requirements. The available locations for edge node deployment also vary, and the flexibility of deployment schemes remains limited. Mobile equipment primarily comprises devices that necessitate mobility during mining operations. This category includes unmanned excavators for material extraction and transport vehicles involved in logistics. These machines typically follow fixed trajectories between material sites and handling equipment, with tasks often adhering to cyclical patterns. Prompt processing of task requests from mobile devices is crucial to maintaining the safety and efficiency of the overall operation.
In the deployment of edge nodes within mining environments, the number of nodes is closely linked to the number of operational devices and sensors. Edge computing facilitates timely real-time task responsiveness, significantly reducing task execution latency. However, it is crucial to account for the cost implications of node deployment throughout the execution process. Current research predominantly focuses on the conceptual placement of edge nodes at the network periphery or near data sources, without offering concrete, context-specific placement strategies. Additionally, the distinct characteristics of mining environments introduce unique challenges, making certain deployment solutions impractical for these applications. Variations in deployment strategies can lead to disparities in deployment costs, server resource utilization, network reliability, and access delays, highlighting the necessity of precise, context-sensitive deployment plans [10]. In the mining context, the strategic deployment of edge nodes to enhance real-time processing capabilities while simultaneously reducing latency and costs remains a critical research area. The primary contributions of this paper are outlined as follows:
  • This study introduces a comprehensive system model for the deployment of edge nodes. The mining machinery is categorized into fixed and mobile equipment, and detailed edge node deployment models are provided for each scenario based on their specific operational requirements.
  • In this paper, we propose two node deployment strategies: an improved genetic algorithm (IBGA) for fixed device scenarios and an improved sand cat swarm optimization algorithm (ISCSO) for mobile device scenarios, both accounting for the mobility characteristics of the devices.
  • Simulation platforms were established in two distinct scenarios, utilizing a production line system and an inspection trolley. These platforms were employed to validate the proposed edge node deployment method. The results clearly demonstrate the superior effectiveness of the proposed strategy over conventional approaches.
The subsequent sections of this article are organized as follows. Section 2 reviews the related work. Section 3 introduces the system model and outlines the edge node deployment problem. In Section 4, two enhanced heuristic algorithms are presented. Section 5 provides the experimental validation of the proposed method, followed by a detailed analysis of the results. Finally, the article concludes with a comprehensive summary in Section 6.

2. Related Work

The rational and efficient deployment of edge nodes is essential for establishing a low-latency edge computing platform in mining environments. The extensive geographical distribution of end devices and the limited resources of edge nodes significantly influence the decisions regarding the number and location of node placements. In recent years, numerous scholars have explored various strategies for edge node placement.
Numerous scholars have explored methodologies for deploying edge nodes in fixed equipment scenarios. Alejandro et al. [11] proposed a static node placement framework that incorporates various node placement and optimization strategies based on network sensing capabilities. However, this study primarily focused on general suggestions for edge node deployment without providing specific solutions tailored to different application scenarios.Abdenacer et al. [12] proposed a marine predator algorithm to improve network connectivity and device coverage. Zhao et al. [13] investigated the deployment challenges of edge nodes in smart cities, focusing on scenario-specific constraints related to load balancing and delay minimization. They proposed an enhanced nondominated sorting genetic algorithm (NSGA-II) that integrates an elitist strategy to optimize the selection process in subsequent iterations. Experimental results demonstrated a significant reduction of 40.6% in system overhead, highlighting the algorithm’s effectiveness in optimizing edge node placement. However, it is important to note that while the aforementioned studies consider service type as a significant factor in node deployment, they do not account for the physical characteristics of the devices being serviced in their deployment models.
Carlos et al. [14] proposed a deployment strategy utilizing a distributed genetic algorithm to optimize system performance and network costs, addressing the challenges posed by resource constraints and the wide geographical distribution of devices. Huang et al. [15] focused on the task offloading aspect in edge server deployment, using a simulated annealing algorithm to determine optimal node locations. Their approach aimed to balance the load among edge nodes and improve user experience. However, it is important to note that previous studies did not fully consider the comprehensive cost implications related to the number of deployed edge nodes.
Jiang et al. [16] introduced an enhanced clustering algorithm that accounts for variations in device functionality and layout, as well as disparities in computational and storage capacities across different edge nodes. The optimization of edge node deployment aims to balance network latency with the costs associated with computational resource deployment. The results demonstrate the algorithm’s superiority over traditional methods. Wang et al. [17] examined the issue of fault-tolerant node deployment, considering real-world scenarios with node failures. They framed the problem as a multi-objective challenge focused on achieving load balance and minimizing deployment costs. To solve this, they employed a genetic algorithm with heuristic enhancements. The results demonstrate the method’s effectiveness in reducing both latency and deployment costs compared to other algorithms. Nevertheless, prior research has not thoroughly explored the specific requirements of edge node deployment within mining environments, making the proposed techniques less suitable for smart mining applications.
In edge computing, certain devices are in constant motion, resulting in frequent changes to their location. This mobility increases service latency and creates challenges for efficient task execution. Therefore, it is crucial to consider the effects of device mobility when determining the optimal placement of edge nodes. Yuan et al. [18] developed virtual nodes within a pay-per-use framework and utilized deep learning techniques to predict service requests and placement cost parameters. They proposed a dynamic virtual edge node placement scheme based on the predicted parameters, with the primary aim of simultaneously minimizing placement costs and network delays. Empirical results confirm the algorithm’s superiority compared to traditional clustering-based node placement schemes. Kasi et al. [19] formulated the edge node deployment problem as a multi-objective optimization problem aimed at minimizing workload imbalance and access delay. They employed a genetic algorithm framework, further enhanced by the integration of a local search algorithm to facilitate node assignment. Mazloomi et al. [20] proposed a reinforcement learning framework to solve the edge node placement problem, which models real-world scenarios by constructing state and action spaces. Shen et al. [21] proposed a dynamic node placement scheme, beginning with system initialization using a clustering algorithm. Following this, a graph-matching algorithm is employed to calculate the fitness function, and a nondominated sorting genetic algorithm is used to identify the optimal placement of nodes. Empirical results demonstrate that this approach significantly reduces task latency compared to conventional clustering-based methods.
As previously noted, the study standardized the computational capabilities of edge nodes. However, in real-world scenarios, it is crucial to deploy nodes with varying computational capacities to meet the specific requirements of different tasks. Zhang et al. [22] explored the edge node deployment problem, addressing both node placement and service layout. They proposed a two-stage approach, incorporating clustering and nonlinear programming. This method accounts for multiple factors, such as the number of nodes, interactions between edge nodes and base stations, and the impact of the nodes’ computational and storage capacities on the deployment process. Empirical results confirm that the algorithm significantly outperforms the baseline approach. It is noteworthy that this research primarily focuses on smart city environments, without addressing the unique characteristics of mining applications. This limitation hinders its capacity to meet the stringent real-time requirements and to manage the spatial constraints inherent in mining operations. As a result, a significant research gap remains in the development of effective edge node placement strategies specifically tailored to mining environments.
Therefore, this study is framed within the context of the complex mining environment. Recognizing the distinctive characteristics of this setting, the research introduces two specific edge node deployment algorithms designed for fixed and mobile device scenarios. These algorithms focus on optimizing latency and cost efficiency, aiming to ensure rapid task responses during mining and transportation operations. The study also offers a valuable framework for the strategic deployment of edge computing nodes across various production environments in mining operations.

3. System Model and Problem Description

3.1. System Model

Mining operations encompass the critical production stages of “drilling, blasting, extraction, loading, transportation, and dumping”. Drilling and blasting predominantly occur at the surface, requiring substantial computational resources for training sophisticated mining algorithms. Conversely, extraction, loading, and transportation activities are typically conducted in underground mining areas. The spatial limitations and power supply constraints inherent in such underground environments necessitate the use of smaller, low-power devices. Consequently, deploying complex computational models on these resource-constrained devices is often impractical, posing significant challenges to efficient task execution in these scenarios. Moreover, large volumes of data are typically transmitted to surface-level facilities for processing before being returned to the underground operations, resulting in significant latency and reduced overall system reliability. Thus, the strategic deployment of edge nodes directly at the mining site emerges as a crucial approach, enabling task offloading to local edge processing. This approach not only mitigates latency but also enhances the system’s robustness. This section focuses on addressing the complex problem of identifying optimal deployment locations for edge nodes, specifically tailored to both fixed and mobile devices. For clarity, Table 1 defines the symbols and notations used throughout this section.

3.1.1. Fixed Device Model

We use the loading device as a case study and simulate the loading task on the production line platform in the subsequent experimental section. The loading task requires that, when the bucket is transported around the loading device via the hoist, the loading device must receive information about the bucket (e.g., position, load status, etc.) and transmit its own position and orientation to the bucket to ensure coordinated operation between the two. In the event that the bucket becomes stuck, an immediate warning signal must be sent to surrounding equipment to prevent hazardous operations. This task is subject to strict time constraints to minimize the risk of disaster. Ideally, edge nodes for fixed devices should be deployed during the construction phase of smart mines. However, the current shift towards intelligent mining is predominantly realized by upgrading traditional mining operations to facilitate intelligent control systems. A significant portion of the mining and transportation equipment has already been installed, and both power lines and network cables have been fully deployed. This pre-existing infrastructure limits the flexibility of potential edge node placement locations, thereby introducing challenges in the deployment process. To reduce the complexity of this problem, the following assumptions are proposed:
  • Large-scale fixed equipment and intelligent terminals have already been deployed.
  • Communication delays between edge nodes and intelligent terminals are consistent.
  • Task requests from intelligent terminals vary periodically.
Considering the aforementioned constraints, the system model for edge node placement in the mining production line is illustrated in Figure 1.
In an already constructed mining line, this paper selects several potential locations for deploying edge nodes, based on the traditional expertise of scholars. In this paper, we denote the set of edge nodes as S E , S E = { s e 1 , s e 2 , , s e S M } , where S M represents the number of edge nodes. The CPU frequency of each node is denoted by S F R = { s f r e 1 , s f r e 2 , , s f r e S M } . The set of potential candidate locations is represented by S P = { s p 1 , s p 2 , , s p S X } , where S X is the number of potential candidate locations and satisfies S X < S N . Each candidate location s p i is characterized by its coordinates s p i = ( x i , y i ) . The communication between the edge nodes and the fixed devices is carried out by wired or wireless means [23]. Fixed devices send real-time task requests to the edge nodes during operation, with the requests changing periodically. In this paper, S D = { s d 1 , s d 2 , , s d S N } represents the set of fixed devices, where S N corresponds to the total number of devices, and  ( x i , y i ) encapsulates the location status information for each fixed device, s d i . The task requests of the devices are represented by the set S T = { s t 1 , s t 2 , , s t S N } , where each request is described as s t i = { s d i n i , s y i , s d o u t i } . In this context, s d i n i represents the input data volume for the task, s y i quantifies the task load, and  s d o u t i specifies the output data volume.
Referencing Figure 1 and the preceding description, it becomes clear that various potential candidate locations within the mining production line have been selected based on expert insights. These edge nodes are strategically deployed according to a scenario-specific node deployment plan. The selected locations must satisfy the dual objectives of minimizing the task response time for the equipment and optimizing the deployment costs associated with the nodes.

3.1.2. Mobile Device Model

In the case of the mine cart, the inspection trolley was used to simulate the transport task in the subsequent experimental section. The transport task involves the unmanned movement of mine vehicles along designated routes on mine roads, using sensory information collected from the environment. Throughout the process, these trucks interact with the platform, other vehicles, and surrounding equipment to perform tasks such as fault detection and warnings. However, the mobility of these vehicles introduces several challenges, including potential task transmission failures, disruption of service continuity, increased response delays, and compromised operational safety. To address these issues, edge nodes are strategically deployed in proximity to the equipment for task processing, ensuring both the safety and efficiency of transportation operations. As illustrated in Figure 2, the mining transportation scenario presents the critical challenge of rapidly responding to uncrewed transport vehicles, making it a focal point of research. This section, thus, examines the placement of mobile vehicle edge nodes within the context of edge computing systems specific to this scenario.
To streamline the complexity of this problem, we make the following assumptions. (1) Each edge node can establish communication with the cloud center regardless of its location. (2) Edge nodes maintain a consistent communication latency when interacting with mobile devices. (3) Mobile devices operate in periodic cycles. (4) Mobile devices do not need to be co-located. The edge node placement model for mobile equipment within the mining production line shares several fundamental components with the model designed for fixed equipment. These common elements include mobile equipment, potential candidate locations for node placement, edge nodes, tasks, and other relevant factors critical to optimizing node deployment and ensuring efficient operation.
When addressing the placement of edge nodes on mobile devices, this section no longer takes position constraints into account, as these devices are in motion with a broad range of movement. Consequently, any position along the trajectory can be deemed a potential candidate for node placement. In this scenario, the exact quantity of edge nodes remains uncertain, necessitating the selection of suitable algorithms to optimize the number of node deployments. The rest of the characteristics are similar to those in the fixed scene. This paper focuses on mobile devices with trajectories that remain nearly constant or exhibit minimal changes. In this paper, the group of mobile devices is represented as M D = { m d 1 , m d 2 , . . . , m d M N } , where MN signifies the total number of mobile devices in the set. Furthermore, for each mobile device m d i , its positional coordinates at time t are denoted as m d i t = { x i t , y i t } . We use ME to denote the set of edge nodes, where M E = { m e 1 , m e 2 , . . . , m e M M } , with MM representing the number of edge nodes. M F R E = { m f r e 1 , m f r e 2 , . . . , m f r e M M } signifies the CPU frequency of each edge node. The set of tasks is denoted as M T = { m t 1 , m t 2 , . . . , m t M N } . Each individual task request is specified as m t i = { m d i n i , m y i , m d o u t i } , where m d i n i signifies the quantity of input data required by the task, m y i represents the task’s load, and  m d o u t i denotes the amount of output data.
In contrast to edge node deployments for fixed devices, the dynamic nature of mobile devices introduces additional challenges related to maintaining stable communication connectivity between multiple nodes and devices. Therefore, selecting the optimal location for edge node placement in such scenarios requires careful consideration, as any potential location within the environment may influence performance. This focus on appropriate placement enhances service responsiveness to task requests from mobile devices but also increases the complexity of identifying the optimal solution. The model proposed in this paper demonstrates versatility, making it suitable for a variety of mobile scenarios.

3.2. Problem Description

In this study, the edge node deployment problem is formulated as an optimization task, where the objective is to identify the optimal locations from a set of candidate sites, subject to specific constraints. [24]. Given that node deployment is a well-known NP-hard problem, heuristic algorithms are commonly employed to address it. In practical scenarios, edge nodes generally have access to a stable power supply network, ensuring sufficient energy availability [25]. Furthermore, the distinctive nature of the mining environment magnifies its vulnerability to latency. Consequently, this study omits the consideration of energy consumption by edge nodes and focuses on the aspects of cost and delay.
In this section, uniform mathematical notation is employed to enhance the clarity of problem formulations in various scenarios. The set of edge nodes is represented by E, while the set of tasks is denoted as T. To distinguish between fixed and mobile equipment, the prefixes ‘S’ and ‘M’ are used, respectively. For example, in the context of the fixed equipment scenario, E corresponds to SE, whereas in the mobile equipment scenario, E corresponds to ME.

3.2.1. Task Delay

The service time in an edge computing system comprises multiple components, including the task transmission time from the terminal device to the edge node, the task processing time at the edge node, and the waiting time for task execution. A critical factor influencing this service time is the data transmission rate within the communication channel, which significantly impacts overall system performance:
R i = W l o g 2 ( 1 + P i H / σ 2 ) , i T
In the presented model, we utilize several parameters for the communication channel and task allocation. Specifically, W represents the communication bandwidth, σ 2 denotes the channel noise power, P i indicates the transmit power of the node, and H represents the channel gain. To indicate whether task i is executed on edge node j, we adopt the notation α i , j :
α i , j = 1 , I f t a s k i c a n b e e x e c u t e d i n e d g e n o d e j 0 , o t h e r s
All the tasks are carried out by at least one node, and each node caters to at least a solitary device:
j E α i , j 1 , i T a n d i T α i , j 1 , j E
The transmission time of a service is denoted as T i , j t r a n s . The size of this transmission time is influenced by the number of inputs and outputs of a task and can be expressed as follows:
T i , j t r a n s = α i , j ( d i n ( j ) + d o u t ( j ) / R i ) , i T , j E
The task processing time of the edge node is contingent on the processing capability of the node itself and the load of the task, which can be expressed as follows:
T i , j e x e = α i , j ( y ( j ) / f ( i ) ) , i T , j E
Upon reaching the edge node, the task is queued, awaiting processing by the node. The queuing time can be calculated using the following formula:
T i , j q u e u e = α i , j ( l e a v j a r r i j ) , i T , j E
where l e a v i represents the departure time of the i t h task, while a r r i i signifies the arrival time of the i t h task. Consequently, the service time of each task can be expressed as:
T i , j = T i , j t r a n s + T i , j e x e + T i , j q u e u e
The maximum task latency T m a x is used to describe the computational performance of edge nodes in this study:
T m a x = a r g m a x i T , j E ( T i , j )

3.2.2. Deployment Cost

The objective of deploying edge nodes in a mining environment is to uphold service quality while concurrently minimizing costs. The cost can be expressed by Equation (9):
C a l l = i = 1 M n i p r i i
p r i i = a x i + A , x i > 0 , i = 1 , 2 , . . . , M
where n i signifies the quantity of edge nodes i, a and A are constants, and the variable x i corresponds to the computational capacity of the node, where the cost of the node is directly proportional to its computational capacity.

3.2.3. Problem Formulation

This paper addresses the challenge of deploying edge nodes with the objective of optimizing response time and cost. In the scenario involving fixed devices, the aim is to minimize both response time and cost. In the mobile scenario, the goal is to optimize and minimize response time. The objective function can be expressed as follows:
m i n T m a x
m i n C a l l
  • s.t. (c1): j E α i , j 1 , i T
  • (c2): i T α i , j 1 , j E
  • (c3): T m a x M A X T
  • (c4): 0 < C a l l M A X C
c1: All tasks are handled by at least one edge node. c2: Each edge node serves at least one device; otherwise, the placement of the node is meaningless. c3: The maximum response time in edge computing cannot exceed the maximum service time defined by the edge node. c4: The cost of placing edge nodes should be a nonnegative number and not exceed the expected cost.

4. Edge Node Deployment Algorithm Design

Building on the proposed edge node deployment models for the two distinct scenarios, we have developed specific placement algorithms aimed at achieving optimal deployment objectives [26]. For stationary equipment, we propose an enhanced dual-population genetic algorithm, while for mobile equipment scenarios, we introduce an improved sand cat swarm optimization algorithm. These algorithms are designed to address the unique challenges posed by each scenario, ensuring efficient and effective edge node placement.

4.1. Improved Dual Population Genetic Algorithm

Deploying edge nodes in a fixed scenario constitutes a complex discrete multi-objective optimization problem. Notably, the solution space expands exponentially as the number of terminal devices increases [27]. To address the challenges outlined, this study utilizes a Improved Bi-population Genetic Algorithm (IBGA), which simulates biological inheritance and evolution through a stochastic search optimization method, as described in previous research [28]. This method provides robust global search capabilities, coupled with fast optimization, high accuracy, and flexibility, making it a highly effective tool for addressing multi-objective optimization problems [29]. To address the problem of concentrated distribution and limited diversity within the algorithm, cubic mapping chaos is utilized for population initialization. Additionally, the concept of concurrent evolution across multiple swarms is integrated to further enhance algorithmic performance. This approach is intended to improve the algorithm’s performance and effectiveness. To mitigate the issue of chromosome disruption caused by crossover and mutation operations, a roulette selection mechanism with an elite retention strategy is applied. Algorithm 1 presents the detailed implementation process of the Improved Bi-population Genetic Algorithm (IBGA). Figure 3 shows the flowchart of the IBGA algorithm.
Algorithm 1 Improved Bi-population Genetic Algorithm (IBGA)
Input:  S M , P b , M P , M A X G E N , P m u t , P c r o
Output: Optimal edge node deployment solution.
  1:
Initialization: Number of binary digits of the variable P b , Population number M P , Number of iterations M A X G E N , S M , P m u t , P c r o
  2:
Chromosomal coding.
  3:
Generated The chaotic sequence according to Equation (13).
  4:
Population initialization.
  5:
Calculated the crossover probability according to the Equation (18).
  6:
Calculate the adaptive function value according to Equation (17).
  7:
Sort based on adaptive value.
  8:
for all  g e n = 1 to M A X G E N do
  9:
for all  i = 1 to M P do
10:
  Select action.
11:
  Crossover operation.
12:
  Mutations operation.
13:
  Calculate the offspring adaptive function value.
14:
  Update population.
15:
end for
16:
 Immigration operations.
17:
 Select elite individuals to form a new elite population.
18:
end for

4.1.1. Gray Coding Chromosome Structure

Given that genetic algorithms cannot directly handle the parameters of the problem space, it is essential to encode these problem space parameters as chromosomes in the genetic space. In this scenario, each chromosome represents a node deployment location. Due to the substantial Hamming distance that can arise from binary encoding of neighboring integers, potentially reducing the search efficiency of genetic operators, this study adopts Gray encoding for the chromosome structure. As shown in Figure 4, each chromosome uses Gray coding to represent a solution. The candidate position is represented by a continuous four-digit code, with the edge node number corresponding to the decimal value of this four-digit Gray code.

4.1.2. Population Initialization Based on the Cubic Chaos Map

The traditional approach relies on random initialization of the search population, often leading to limited diversity and increasing the chances of the algorithm becoming trapped in a local maximum. Cubic mapping chaos can lead to a more uniform population, expand the search space, and improve the convergence speed and accuracy of the algorithm. The formula for the cubic mapping chaotic sequence is as follows:
z ( i + 1 ) = 4 z ( i ) 3 3 z ( i ) , 1 z ( i ) 1 , i = 0 , 1 , 2 , . . .
u i = l m i n + ( l m a x l m i n ) ( z ( i ) + 1 ) / 2
where z ( i ) represents the chaotic variable, l m a x and l m i n indicate the upper and lower bounds of the mapping interval, respectively, and the mapped variable value is denoted as  u i .

4.1.3. Fitness Function

In this scenario, the objective function aims to minimize both delay and cost, denoted as the combined objective function W:
W = β 1 T m a x + β 2 C a l l
β 1 + β 2 = 1
where the weight coefficients β 1 and β 2 are used to balance the considerations of delay and cost. In order to maximize the fitness function, an adjustment of the objective function is necessary to ensure that the function value becomes more prominent as the total overhead decreases. The fitness function can be expressed as:
f i t n e s s = 1 / ( W + 1 )
To avoid the situation where the denominator is 0, add 1 to the denominator.

4.1.4. Parallel Evolution of Two Populations

Parallel evolution of multiple populations entails evolving distinct populations concurrently, each governed by different parameters. These populations evolve independently and periodically exchange their best individuals. This process helps preserve population diversity, improves solution quality, accelerates convergence, and reduces the risk of the algorithm becoming trapped in local optima.
  • Selection operation
    We use roulette and modified elite strategy for operator selection. First, the top 10% of the best individuals in the population are retained according to their fitness values and passed directly to the next generation as elite individuals. The roulette method is used to select the remaining 90% of the population. This can prevent the optimal individual from being eliminated, ensure the quality of the offspring population, and improve the global convergence ability of the algorithm.
  • Crossover operation
    The population was divided into two sub-populations, one with a fixed crossover probability P c r o and the other with an adaptive crossover probability. The adaptive crossover probability is calculated as follows:
    P = ϑ P 1 + ( 1 ϑ ) P 2
    ϑ = 1 K / K m a x
    where P 1 and P 2 denote the larger and smaller crossover probabilities, K represents the current iteration number, and  K m a x represents the maximum number of iterations. The crossover mechanism employed here is a two-point crossover method, which randomly sets the starting point and end point of the crossover in the chromosome string, exchanges the structure between the parents’ exchange points, and generates two new individuals, as illustrated in Figure 5.
  • Mutation operation
    Mutation in genetic algorithms alters specific gene values on the chromosome string through different techniques to generate new individuals. These mutation operators are essential for maintaining population diversity and avoiding premature convergence. However, traditional mutation operators are prone to local optima issues. To overcome this, enhancements to the standard random mutation method have been introduced, incorporating Gaussian mutation for chromosome alterations. The mutation probability P m u t determines whether a mutation occurs. If a mutation takes place, the original gene value in the chromosome is replaced by a random number generated from a normal distribution with a mean μ and variance σ 2 .
Through multiple iterations, the algorithm identifies the optimal edge node placement that satisfies the criteria of minimum delay and cost.

4.1.5. Algorithm Performance Analysis

The complexity of the IBGA algorithm is influenced by factors such as population size, the number of iterations, and the complexity of genetic operations.This study focuses on the analysis of time complexity related to the computation of fitness functions, the sorting of fitness values, and the selection, crossover, and mutation operations carried out during the algorithm’s execution. The population size is MP, chromosome length is N, the number of iterations is represented by MAXGEN, m is the number of chromosomes outside the elite chromosome, the crossover probability is P c r o , and the mutation probability is P m u t . Therefore, the time complexity of the algorithm is O ( M A X G E N ( O ( M P ) + O ( M P ) l o g M P ) + O ( N m P c r o ) + O ( m P m u t ) ) .
The IBGA algorithm does not rely on a specific mathematical formulation of the problem or gradient information. It allows users to design coding schemes, crossover mechanisms, and mutation operations flexibly based on the problem’s characteristics, providing both robustness and adaptability.

4.2. Improved Sand Cat Swarm Optimization Algorithm

The Sand Cat Swarm Optimization (SCSO) algorithm mimics two primary survival behaviors observed in natural sand cat populations: foraging and hunting prey [30,31]. Compared to other population-based intelligence algorithms, the Sand Cat Swarm Optimization (SCSO) algorithm demonstrates robust optimization capabilities, making it well-suited for addressing complex multi-objective optimization problems. However, its convergence speed and search accuracy are moderate, which increases its susceptibility to becoming trapped in local optima. Thus, this paper introduces three enhancement techniques to strengthen the global search capabilities of the Sand Cat Swarm Optimization algorithm. The Improved Sand Cat Swarm Optimization (ISCSO) algorithm is subsequently applied to solve the edge node deployment problem in mobile device scenarios. The detailed steps of the ISCSO algorithm are presented in Algorithm 2. Figure 6 shows the flowchart of the ISCSO.
Algorithm 2 Improved sand cat group optimization algorithm
Input:  M D , M E , M N , M F
Output:  Optimal edge node deployment solution.
  1:
Initialization: M A X G E N , M E ,R,r, r G
  2:
The chaotic sequence is generated in accordance with the Equation (19).
  3:
for all  m e = 1 to M E do
  4:
 Set an initial value for each sand cat.
  5:
end for
  6:
for all  t = 1 to M A X G E N do
  7:
 Update r, r G ,R
  8:
 Check if any sandcats exceed the search space and modify.
  9:
 Calculate the fitness value of each sand cat according to Equation (15) and find the best sand cat.
10:
for all  m e = 1 to M E do
11:
  Obtain random angles using roulette algorithm.
12:
  if  R 1 then
13:
   Update the position of the sand cat according to Equation (26).
14:
   Execute the strategy to obtain a new position according to Equation (27).
15:
  else
16:
   Update the position of the sand cat according to Equation (22).
17:
   Execute the search strategy according to Equation (23) to obtain the new position.
18:
  end if
19:
end for
20:
end for

4.2.1. Logistic Chaotic Sequence

Chaotic sequences possess the attributes of randomness, nonlinearity, and ergodicity. They are instrumental in sustaining population diversity, subsequently enhancing the algorithm’s convergence speed and accuracy. In this study, logistic chaos mapping is employed to initialize the population, with the improved formula provided as follows:
X i + 1 = γ x i + 1 + ( 1 x i )
Y i + 1 = l m i n + x i d ( l m a x l + m i n )
where γ serves as the control parameter, with γ > 1 , the value range of x i falls within 0 < x i < 1 , x i d signifies the chaotic sequence generated by Equation (19), Y i represents the position of the ith individual, and l m a x and l m i n denote the search range of the population.

4.2.2. Spiral Exploration Strategy

During the exploration phase, the sand cat identifies prey by considering the optimal location, current position, and sensitivity range. This phenomenon is mathematically described by Equation (22):
p o s ( i + 1 ) = r ( p o s b c ( i ) r a n d ( 0 , 1 ) p o s c ( i ) )
where p o s b c ( i ) is the optimal solution, p o s c ( i ) is the current position, and r is the sensitivity range.
Spiral exploration within the algorithm facilitates the discovery of multiple search paths and assists individuals in making more effective adjustments to their positions. Following the integration of spiral exploration, individuals perform search operations within the search space in a spiral pattern. Expanding their exploratory capabilities enhances the algorithm’s potential to escape local optima and improves its overall global search performance. The update formula is represented by Equation (23):
p o s ( i + 1 ) = o r ( p o s b c ( i ) r a n d ( 0 , 1 ) p o s c ( i ) )
Equation (24) signifies the computation of the spiral exploration factor, denoted as o:
o = e x p ( b g ) c o s ( 2 π g )
where b represents the spiral shape constant and g represents the path coefficient, where g [ 1 , 1 ] .

4.2.3. Levy Flight Strategy

In the prey attack phase, a random position, denoted as p o s r a n d ( i ) , is generated using the best and current positions. Subsequently, a random angle α is selected through the roulette algorithm, and the attack operation is executed using the Equation (26):
p o s r a n d ( i ) = | r a n d ( 0 , 1 ) p o s b c ( i ) p o s c ( i ) |
p o s ( i + 1 ) = p o s b c ( i ) p o s r a n d ( i ) r c o s ( α )
The prey attack in the standard algorithm is executed through random angles, which may lead to the algorithm overlooking some optimal solutions. We introduce the levy flight strategy to mitigate the influence of locally optimal solutions, as described in Equation (27):
p o s ( i + 1 ) = p o s b c ( i ) + ( p o s b c ( i ) p o s c ( i ) ) C l e v y
l e v y = u | v s . | β
where variables u and v follow a normal distribution, u N ( 0 , σ u 2 ) , v N ( 0 , σ v 2 ) , and C is a constant representing the step adjustment coefficient.

5. Experimental Setup

5.1. Fixed Equipment Scene Experimental Setup

As depicted in Figure 1, the mine’s grab crane unloads ore from the cargo hold into the loading basket and subsequently transfers it to the storage yard or loading platform via the conveyor belt. This operation is analogous to manipulating a robotic arm to grasp materials and deposit them into the material box on the production line. In the loading task, failure of the robotic arm to securely grasp the material and accurately place it into the material box can result in scattered materials, disrupting the production line and hindering its regular operation. In such instances, immediate intervention is crucial to prevent more severe risks. To ensure the smooth operation of the production line, it is imperative to deploy equipment with sufficient computing and storage resources to process real-time data. This reflects the edge node deployment challenges encountered in mining scenarios. Hence, this study focuses on validating the algorithm’s efficacy in tasks related to material grabbing and loading within a laboratory production line platform.
The small production line test bench is shown in Figure 7. The comprehensive system consists of modules such as conveyor belts, loading, unloading, packaging, robotic arms, and other components. Upon receiving a remote order, the production line system undergoes the process of order confirmation, independent execution of product customization and assembly, and visual display of operational status to facilitate intelligent production. Simulation parameters for the experiments are specified in Table 2.

5.2. Mobile Device Scene Parameter Settings

In the experiments related to mobile device edge node placement, we employed a laboratory-developed inspection car as a mobile device to simulate the movement trajectory and task requests encountered by mobile devices within the mining environment. The structure of the trolley is depicted in Figure 8. The car consists of several key components, including a server, motor vision module, navigation module, power supply, and controller power supply module, among other parts.
A laboratory site measuring 60 by 60 m was designated for the experiments. Multiple inspection vehicles were deployed, with task data being recorded and subsequently used for experimental evaluations. The maximum coverage range of the edge node was set at 20 m, and the movement speed of the inspection vehicles was maintained at 5 m per second. Additional details and parameters are provided in Table 3.
We conducted simulations on a computer equipped with a 3.60 GHz AMD CPU and 16 GB RAM (Advanced Micro Devices, Inc., Santa Clara, CA, USA), utilizing the parameters outlined in Table 4 for the algorithms.

6. Results and Discussion

6.1. Analysis of the Results of the Fixed Equipment Edge Node Placement Algorithm

We have selected the randomized algorithm [32] and the k-means algorithm [33,34] as benchmark algorithms for comparison. A comparison of IBGA with benchmark algorithms and GA [35,36] is performed based on completion time and deployment cost. On the production line platform, a sequence of operations is executed. This includes monitoring the position of the materials box, tracking the status of materials, assembling the cylinder to move the materials box to the processing position upon detection, performing the loading operation, updating the product status, and activating the cylinder to push the materials box along the conveyor belt in a series of five tasks. Based on expert input, a minimum of five strategically placed nodes were required to ensure the smooth execution of each task. Each node was assumed to have sufficient resources to handle any task assigned to it successfully. Multiple experiments were conducted on the production line platform with different edge node placements in each scenario. Device coverage and objective function values were obtained through the algorithm, and the results are presented in Table 5. To reduce the impact of random errors, the results of 50 experiments were averaged.
The optimal number of nodes to be deployed in this scenario can be obtained by analyzing the experimental results in Table 5. As the number of edge nodes increases, the system’s device coverage expands accordingly. In each time slot, the number of tasks processed by the system rises, leading to a reduction in task response time. This reduction outweighs the increase in cost, resulting in a gradual decrease in the objective function value. However, when the number of nodes exceeds 9, the reduction in task response time becomes less significant compared to the increase in cost, leading to a subsequent rise in the value of the objective function. Figure 10 illustrates the detailed delay and cost outcomes. Hence, with nine nodes, the achieved solution attains the optimal objective, boasting a high coverage rate and representing the optimal deployment solution at that juncture, as illustrated in Figure 9. Figure 9a depicts the initial node positions generated by the IBGA algorithm and Figure 9b shows the optimal node deployment scheme generated by IBGA after a certain number of iterations. Figure 9c further illustrates the algorithm’s stability, achieved after 200 iterations.
Figure 10 illustrates the impact of the four deployment strategies on the service time as the number of edge nodes increases while keeping the number of endpoints constant. As shown in Figure 10a, the service time of all four methods steadily decreases with the increasing number of S E s . The underlying reason is that, as the number of edge nodes increases, the available resources per node also increase, leading to a reduction in the average number of device requests allocated to each node, which in turn results in a decrease in latency.Among these strategies, the IBGA achieves a reduction in service time of 20.5–31.2% compared to the other algorithms, demonstrating a significantly lower service time. The results show that the IBGA algorithm performs best as the number of edge nodes increases.
In Figure 10b, it is evident that the deployment cost increases for all four methods as the number of SEs increases. This is primarily due to the fact that deploying additional nodes incurs higher overall costs. The figure illustrates that the IBGA method consistently demonstrates a lower deployment cost compared to other algorithms, making it particularly well-suited for this scenario. The reason is that as the number of SEs increases, more nodes are deployed, leading to an increase in cost. However, the IBGA algorithm manages this growth more efficiently than the other approaches.
Figure 10c shows the objective function value obtained for different deployment strategies. Our objective is to minimize this function value, and as the figure illustrates, the IBGA method achieves the lowest overall objective value compared to the other algorithms, with IBGA performing the best and GA ranking second. This is due to the ability of the GA algorithm to search multiple regions of the solution space and to search faster for the optimal deployment location. The improved IBGA algorithm demonstrates superior convergence due to its approach of replacing random searches with targeted searches for candidate positions, thus avoiding redundant searches for the same node pairs. Additionally, by employing two populations that evolve simultaneously, the algorithm reduces the time required to find the optimal solution.
To simulate real-world conditions more accurately, we increased the number of devices to better reflect the complexity of a natural mining area. This increase allowed us to replicate the actual workload encountered in such environments. We then evaluated the algorithm’s performance under different task density conditions, assessing how it adapts to the increased workload and varying demands.
Figure 11 illustrates the impact of four node deployment solutions as the number of terminal devices increases, with a fixed count of nine edge nodes. As shown in Figure 11a, the response time for each strategy increases parallel with the increase in terminal devices. Notably, it is evident that IBGA exhibits the shortest service time, while the randomized algorithm yields the longest service time across varying numbers of end devices. When compared with the randomized and k-means algorithms, the IBGA algorithm demonstrates notable reductions in service delays, with savings of 1012.5 ms and 539.8 ms, respectively. This improvement is due to the increase in task generation as more terminals are introduced, leading to higher computational demands on the edge nodes. Consequently, these nodes must provide enhanced computing services, resulting in a general increase in response times for all strategies.
Figure 11b illustrates the deployment costs of various methods as the number of terminal devices increases. The figure reveals an upward trend in deployment costs for all four methods as the number of devices increases. Among the four algorithms, IBGA consistently demonstrates superior performance and lower costs. The randomized algorithm displays significant cost fluctuations due to its unrestricted nature. This is attributed to the growing number of devices, resulting in increased task volume and higher demand for computing resources. Consequently, more expensive nodes are selected to meet the higher resource requirements, resulting in escalated deployment costs.

6.2. Analysis of the Results of the Mobile Device Edge Node Placement Algorithm

In mobile device scenarios, it is important to note that the determination of candidate location points for nodes becomes a challenging task. As a result, the range of potential edge node deployments remains uncertain. In our laboratory environment, all inspection vehicles are equipped with identical functions and generate similar task requests. Therefore, a single type of edge node is deployed, and the primary factor influencing overall deployment cost is the number of nodes. In this section, we specifically examine the impact of varying the number of edge nodes on the overall task delay. To evaluate the performance of ISCSO, we use random distribution and mean distribution algorithms [37] as benchmark methods. Additionally, we compare ISCSO with other algorithms, such as SCSO and PSO [38], in terms of task completion time and deployment cost.
Currently, the laboratory has a total of 20 mobile carts. To simulate small-scale, medium-scale, and large-scale mining environments, we conducted three sets of experiments, with 5, 10, and 20 trolleys placed in each set, respectively. Considering the limited coverage of edge nodes, a minimum of three nodes must be deployed to ensure task completion. As the number of mobile devices increases, the number of nodes deployed remains fewer than the number of devices. Consequently, we deployed [3, 5], [3, 9], and [3, 18] nodes across the three experimental sets. Observing Figure 12, Figure 13 and Figure 14, it becomes evident that the total delay of all algorithms increases with the growing number of mobile devices. This is due to the increased task volume generated by the higher number of devices, leading to a corresponding rise in total task completion delay.
Figure 12 illustrates the relationship between task completion delay and the number of nodes, with the number of cars set at 5. As shown in Figure 12a, the overall task delay decreases as the number of nodes increases. As the number of edge nodes increases, additional computational resources are provided, leading to a higher number of tasks being processed. Consequently, the overall delay decreases with the increase in the number of nodes. After analysis and comparison, the ISCSO algorithm demonstrates a delay reduction of up to 45%, outperforming the other four algorithms in minimizing delay. This improvement is attributed to the proposed algorithm’s consideration of device mobility and the correlation between tasks and locations, which leads to a more effective node matching model. Furthermore, the enhanced spiral search and Lévy flight strategies in the ISCSO algorithm expand the exploration space, enhance the algorithm’s global search capability, and facilitate the identification of the optimal solution in a shorter time. Figure 12b represents the deployment positions and coverage ranges of the nodes. Figure 12c shows that as the number of iterations increases, the device coverage stabilizes at 67%, and the algorithm converges after 200 iterations.
Figure 13 depicts the relationship between task completion delay and the number of nodes with a fleet size of 10 cars. As shown in Figure 13a, the total task delay decreases as the number of nodes increases. After analysis and comparison, the ISCSO algorithm demonstrates a reduction in total delay by up to 13%, outperforming the other four algorithms in minimizing delay. In Figure 13b, the deployment location and coverage of the nodes are illustrated. In contrast, Figure 13c demonstrates thatas the number of iterations increases, the device coverage stabilizes at 90%, and the algorithm converges after 300 iterations.
Figure 14 illustrates the relationship between task completion delay and the number of nodes when the number of cars is set to 20. Figure 14a demonstrates that the total task delay decreases as the number of nodes increases. After analysis and comparison, the ISCSO algorithm demonstrates a reduction in total delay by up to 23%, outperforming the other four algorithms in minimizing delay. Figure 14b illustrates the deployment location and coverage of the nodes. In contrast, Figure 14c reveals that as the number of iterations increases, the device coverage stabilizes at 99%, and the algorithm converges after 150 iterations.
The time complexity of the ISCSO algorithm is influenced by factors such as population size, dimensionality, and the computational complexity of the fitness function. In this study, we analyze the time complexity of fitness evaluations and location update operations. Assuming that the number of sand cats is ME and the dimension D, the complexity of the fitness function is f(D). The time complexity of the whole iterative process is O ( M A X G E N M E ( D + f ( D ) ) ) . Even in environments with significant changes or the presence of obstacles, the ISCSO algorithm demonstrates strong robustness and consistently identifies optimized paths.
The proposed scheme demonstrates that the rational deployment of edge nodes can enhance the real-time monitoring capabilities of devices, optimize data processing, and improve decision-making processes. Firstly, by reducing task response times and optimizing data flow, the system can detect equipment failures or abnormal conditions more rapidly, thereby providing early warnings and reducing both downtime and maintenance costs. Secondly, it reduces the dependence on central servers, enhances the speed and accuracy of data processing, enables real-time decision-making at the edge nodes, and minimizes the demand for network bandwidth. Finally, by deploying IBGA and ISCSO algorithms to optimize the deployment location of the edge nodes, it not only improves the efficiency of task processing, but also makes more accurate decisions based on real-time data, and the intelligent decision-making process effectively improves the flexibility and responsiveness of mine management.
The approach presented in this paper has demonstrated promising results. However, the limitations of the experimental simulation conditions, coupled with the variability across different mining environments, may lead to deviations in the algorithm’s performance. For Assumption 1, it is important to note that not all tasks necessarily require service by edge nodes. Mandating that every task be handled by at least one edge node could result in resource over-allocation or inefficiency. For Assumption 2, some edge nodes may serve purposes such as data aggregation or collaboration with other nodes, rather than directly providing computational resources. Requiring each edge node to directly serve devices could lead to unnecessary node deployment, overlooking the potential roles these nodes may play in network orchestration or data processing. For Assumption 3, in real-world scenarios, the response time of an edge node can be influenced by factors such as network latency, device load, and other external conditions. Enforcing a strict requirement that the response time always remains within a predefined maximum value may lead to overly conservative node selection, potentially hindering the optimal allocation of tasks. For Assumption 4, the cost of deploying an edge node encompasses not only the initial hardware purchase but also long-term expenses, such as operation and maintenance, energy consumption, and bandwidth usage. Strictly limiting the deployment cost of edge nodes may result in excessive resource optimization, potentially compromising system performance or scalability. These assumptions may make the model over-idealized and ignore the complexities of practical applications.
Meanwhile, in underground mines or remote areas with limited network connectivity and device availability, the deployment methodology must account for factors such as energy consumption, communication latency, and redundancy design to ensure system stability and efficiency. The types of equipment and tasks in different mining environments vary significantly, necessitating deployment methods that dynamically adjust node placement and load distribution based on the processing capacity of the equipment, the computational intensity of the tasks, and the data transmission requirements. Therefore, future research should focus on relaxing these assumptions, customizing them according to the environmental characteristics, equipment requirements, and economic considerations of different mining operations. This would enable the development of a more realistic edge node deployment model, thereby enhancing the system’s flexibility and adaptability.

7. Conclusions

This paper investigates the challenge of edge node deployment in mining environments, categorizing the problem into two primary scenarios: edge node deployment for fixed devices and for mobile devices. These categorizations are based on the specific characteristics of application scenarios and production environments. For the fixed equipment scenarios, we conducted a thorough analysis that took into account response delays and deployment costs. A weighted multi-objective optimization model was developed for node deployment, and the IBGA method was introduced to achieve near-optimal solutions. A testing platform integrated with the existing production line system was established to comprehensively evaluate the performance of the algorithm. The experimental results enabled a detailed analysis of the relationship between latency, deployment costs, and the number of devices and edge nodes. Ultimately, the findings demonstrate that the proposed method consistently outperforms alternative approaches in both efficiency and cost-effectiveness. In the mobile device scenario, we formulated an edge node deployment model focused on minimizing task completion delay and applied the ISCSO algorithm to derive the optimal solution. This study represents the first application of the SCSO algorithm to address node placement challenges, particularly in a mobile device simulation environment using a laboratory-developed inspection vehicle. The performance of the proposed algorithm was rigorously evaluated within this context. Empirical findings demonstrate that ISCSO consistently outperforms other algorithms in minimizing total delay. Therefore, the method proposed in this paper can ensure the minimal delay and deployment cost in the mining environment. In the future, we will further optimize the node deployment plan based on the service distribution of edge nodes.

Author Contributions

Conceptualization, F.Z. and Z.Y.; methodology, Z.B.; software, Z.B.; validation, Z.B.; investigation, F.Z.; resources, Z.Y.; data curation, Z.B.; writing—original draft preparation, Z.B.; writing—review and editing, Z.B., F.Z. and Z.Y.; visualization, Z.B. and F.Z.; supervision, Z.Y. and F.Z.; project administration, Z.Y.; funding acquisition, Z.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Special Project for Industrial Foundation Reconstruction and High Quality Development of Manufacturing Industry under the approval number TC230A076-13.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author. They are restricted to experimental results.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutorials 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
  2. Zhao, X.; Zeng, Y.; Ding, H.; Li, B.; Yang, Z. A novel edge computing architecture for intelligent coal mining system. Wirel. Netw. 2023, 29, 1545–1554. [Google Scholar] [CrossRef]
  3. Sabireen, H.; Neelanarayanan, V.J.I.E. A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and Research Challenges. ICT Express 2021, 7, 162–176. [Google Scholar] [CrossRef]
  4. Laghari, A.A.; Jumani, A.K.; Laghari, R.A. Review and State of Art of Fog Computing. Arch. Comput. Methods Eng. 2021, 28, 3631–3643. [Google Scholar] [CrossRef]
  5. Zhang, K.; Zhu, Y.; Maharjan, S.; Zhang, Y. Edge Intelligence and Blockchain Empowered 5G Beyond for the Industrial Internet of Things. IEEE Netw. 2019, 33, 12–19. [Google Scholar] [CrossRef]
  6. Jia, G.; Han, G.; Rao, H.; Shu, L. Edge Computing-Based Intelligent Manhole Cover Management System for Smart Cities. IEEE Internet Things J. 2018, 5, 1648–1656. [Google Scholar] [CrossRef]
  7. Yin, Z.; Zhang, F.; Xu, G.; Han, G.; Bi, Y. Multi-Scale Rolling Bearing Fault Diagnosis Method Based on Transfer Learning. Appl. Sci. 2024, 14, 1198. [Google Scholar] [CrossRef]
  8. Mahmud, R.; Toosi, A.N.; Ramamohanarao, K.; Buyya, R. Context-Aware Placement of Industry 4.0 Applications in Fog Computing Environments. IEEE Trans. Ind. Inform. 2020, 16, 7004–7013. [Google Scholar] [CrossRef]
  9. Meng, Y.; Li, J. Task Offloading and Resource Allocation Mechanism of Moving Edge Computing in Mining Environment. IEEE Access 2021, 9, 155534–155542. [Google Scholar] [CrossRef]
  10. Xu, F.; Yin, Z.; Han, G.; Li, Y.; Zhang, F.; Bi, Y. Multi-objective fog node placement strategy based on heuristic algorithms for smart factories. Wirel. Netw. 2023, 30, 5407–5424. [Google Scholar] [CrossRef]
  11. Santoyo-González, A.; Cervelló-Pastor, C. Network-Aware Placement Optimization for Edge Computing Infrastructure Under 5G. IEEE Access 2020, 8, 56015–56028. [Google Scholar] [CrossRef]
  12. Naouri, A.; Nouri, N.A.; Khelloufi, A.; Sada, A.B.; Ning, H.; Dhelim, S. Efficient fog node placement using nature-inspired metaheuristic for IoT applications. Clust. Comput 2024, 27, 8225–8241. [Google Scholar] [CrossRef]
  13. Zhao, X.; Zeng, Y.; Ding, H.; Li, B.; Yang, Z. Optimize the placement of edge server between workload balancing and system delay in smart city. Peer-Netw. Appl. 2021, 14, 3778–3792. [Google Scholar] [CrossRef]
  14. Guerrero, C.; Lera, I.; Juiz, C. Distributed genetic algorithm for application placement in the compute continuum leveraging infrastructure nodes for optimization. Future Gener. Comput. Syst. 2024, 160, 154–170. [Google Scholar] [CrossRef]
  15. Huang, P.C.; Chin, T.L.; Chuang, T.Y. Server Placement and Task Allocation for Load Balancing in Edge-Computing Networks. IEEE Access 2021, 9, 138200–138208. [Google Scholar] [CrossRef]
  16. Jiang, C.; Wan, J.; Abbas, H. An Edge Computing Node Deployment Method Based on Improved k-Means Clustering Algorithm for Smart Manufacturing. IEEE Syst. J. 2021, 15, 2230–2240. [Google Scholar] [CrossRef]
  17. Wang, Z.; Zhang, W.; Jin, X.; Huang, Y.; Lu, C. An optimal edge server placement approach for cost reduction and load balancing in intelligent manufacturing. J. Supercomput. 2022, 78, 4032–4056. [Google Scholar] [CrossRef]
  18. Yuan, X.; Sun, M.; Lou, W. A Dynamic Deep-Learning-Based Virtual Edge Node Placement Scheme for Edge Cloud Systems in Mobile Environment. IEEE Trans. Cloud Comput. 2022, 10, 1317–1328. [Google Scholar] [CrossRef]
  19. Kasi, S.K.; Kasi, M.K.; Ali, K.; Raza, M.; Afzal, H.; Lasebae, A.; Naeem, B.; Islam, S.U.; Rodrigues, J.J.P.C. Heuristic Edge Server Placement in Industrial Internet of Things and Cellular Networks. IEEE Internet Things J. 2021, 8, 10308–10317. [Google Scholar] [CrossRef]
  20. Mazloomi, A.; Sami, H.; Bentahar, J.; Otrok, H.; Mourad, A. Reinforcement Learning Framework for Server Placement and Workload Allocation in Multiaccess Edge Computing. IEEE Internet Things J. 2023, 10, 1376–1390. [Google Scholar] [CrossRef]
  21. Shen, B.; Xu, X.; Qi, L.; Zhang, X.; Srivastava, G. Dynamic server placement in edge computing toward Internet of Vehicles. Comput. Commun. 2021, 178, 114–123. [Google Scholar] [CrossRef]
  22. Zhang, X.; Li, Z.; Lai, C.; Zhang, J. Joint Edge Server Placement and Service Placement in Mobile-Edge Computing. IEEE Internet Things J. 2022, 9, 11261–11274. [Google Scholar] [CrossRef]
  23. Li, Q.; Ma, X.; Zhou, A.; Luo, X.; Yang, F.; Wang, S. User-Oriented Edge Node Grouping in Mobile Edge Computing. IEEE Trans. Mob. Comput. 2023, 22, 3691–3705. [Google Scholar] [CrossRef]
  24. Chaudhary, D.; Tailor, A.K.; Sharma, V.P.; Chaturvedi, S. HyGADE: Hybrid of Genetic Algorithm and Differential Evolution Algorithm. In Proceedings of the 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India, 6–8 July 2019; pp. 1–4. [Google Scholar] [CrossRef]
  25. Zhu, A.; Wen, Y. Computing Offloading Strategy Using Improved Genetic Algorithm in Mobile Edge Computing System. J. Grid Comput. 2021, 19, 38. [Google Scholar] [CrossRef]
  26. Zhao, Z.; Zhang, H.; Wang, L.; Huang, H. A Multimodel Edge Computing Offloading Framework for Deep-Learning Application Based on Bayesian Optimization. IEEE Internet Things J. 2023, 10, 18387–18399. [Google Scholar] [CrossRef]
  27. Liu, Y.; Liu, C.; Wang, W.; Liu, S.; Chen, Y. A Novel Wired/Wireless Hybrid Multiport Energy Router for Dynamic EV Energy Internet With Grid-Tied and Islanded Operations. IEEE Trans. Ind. Electron. 2024, 71, 3559–3571. [Google Scholar] [CrossRef]
  28. Wang, J.; Li, D.; Hu, Y. Fog Nodes Deployment Based on Space–Time Characteristics in Smart Factory. IEEE Trans. Ind. Informatics 2021, 17, 3534–3543. [Google Scholar] [CrossRef]
  29. Zhang, L.; Yang, W.; Hao, B.; Yang, Z.; Zhao, Q. Edge Computing Resource Allocation Method for Mining 5G Communication System. IEEE Access 2023, 11, 49730–49737. [Google Scholar] [CrossRef]
  30. Seyyedabbasi, A.; Kiani, F. Sand Cat swarm optimization: A nature-inspired algorithm to solve global optimization problems. Eng. Comput. 2023, 39, 2627–2651. [Google Scholar] [CrossRef]
  31. Wu, D.; Rao, H.; Wen, C.; Jia, H.; Liu, Q.; Abualigah, L. Modified Sand Cat Swarm Optimization Algorithm for Solving Constrained Engineering Optimization Problems. Mathematics 2022, 10, 4350. [Google Scholar] [CrossRef]
  32. Wang, S.; Zhao, Y.; Xu, J.; Yuan, J.; Hsu, C.H. Edge server placement in mobile edge computing. J. Parallel Distrib. Comput. 2019, 127, 160–168. [Google Scholar] [CrossRef]
  33. Zhang, X.; Cao, X.; Zhang, H.; Shen, Y.; Yuan, X.; Cui, Z.; Lu, Z. An Intelligent Obstacle Detection for Autonomous Mining Transportation With Electric Locomotive via Cellular Vehicle-to-Everything and Vehicular Edge Computing. IEEE Trans. Intell. Transp. Syst. 2023, 25, 3177–3190. [Google Scholar] [CrossRef]
  34. Yang, M.; Huang, L.; Tang, C. K-Means Clustering with Local Distance Privacy. Big Data Min. Anal. 2023, 6, 433–442. [Google Scholar] [CrossRef]
  35. Deb, K.; Pratap, A.; Agarwal, S.; Meyarivan, T. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 2002, 6, 182–197. [Google Scholar] [CrossRef]
  36. Zhou, R.; Liu, Y.; Zhang, K.; Yang, O. Genetic Algorithm-Based Challenging Scenarios Generation for Autonomous Vehicle Testing. IEEE J. Radio Freq. Identif. 2022, 6, 928–933. [Google Scholar] [CrossRef]
  37. Al-Omary, M.; Aljarrah, R.; Albatayneh, A.; Jaradat, M. A Composite Moving Average Algorithm for Predicting Energy in Solar Powered Wireless Sensor Nodes. In Proceedings of the 2021 18th International Multi-Conference on Systems, Signals & Devices (SSD), Monastir, Tunisia, 22–25 March 2021; pp. 1047–1052. [Google Scholar] [CrossRef]
  38. Fernandez-Martinez, J.L.; Garcia-Gonzalo, E. Stochastic Stability Analysis of the Linear Continuous and Discrete PSO Models. IEEE Trans. Evol. Comput. 2011, 15, 405–423. [Google Scholar] [CrossRef]
Figure 1. Edge node placement system model for fixed equipment in a mining environment.
Figure 1. Edge node placement system model for fixed equipment in a mining environment.
Applsci 14 10903 g001
Figure 2. Edge node placement system model for mobile devices in mining environment.
Figure 2. Edge node placement system model for mobile devices in mining environment.
Applsci 14 10903 g002
Figure 3. The flowchart of the IBGA.
Figure 3. The flowchart of the IBGA.
Applsci 14 10903 g003
Figure 4. Chromosome structural coding.
Figure 4. Chromosome structural coding.
Applsci 14 10903 g004
Figure 5. Two-point intersection diagram.
Figure 5. Two-point intersection diagram.
Applsci 14 10903 g005
Figure 6. The flowchart of the ISCSO.
Figure 6. The flowchart of the ISCSO.
Applsci 14 10903 g006
Figure 7. Fixed equipment edge node deployment platform.
Figure 7. Fixed equipment edge node deployment platform.
Applsci 14 10903 g007
Figure 8. Mobile device edge node placement data collection trolley.
Figure 8. Mobile device edge node placement data collection trolley.
Applsci 14 10903 g008
Figure 9. Edge node deployment location. (a) Initial deployment location. (b) Final deployment location. (c) Convergence curve.
Figure 9. Edge node deployment location. (a) Initial deployment location. (b) Final deployment location. (c) Convergence curve.
Applsci 14 10903 g009
Figure 10. Performance comparison of fixed device edge node deployment algorithms. (a) Tasks latency. (b) Node deployment costs. (c) Node deployment location.
Figure 10. Performance comparison of fixed device edge node deployment algorithms. (a) Tasks latency. (b) Node deployment costs. (c) Node deployment location.
Applsci 14 10903 g010
Figure 11. Performance comparison of fixed device edge node deployment algorithms. (a) Tasks latency. (b) Node deployment costs.
Figure 11. Performance comparison of fixed device edge node deployment algorithms. (a) Tasks latency. (b) Node deployment costs.
Applsci 14 10903 g011
Figure 12. Performance comparison of mobile device edge node deployment algorithms (number of mobile devices is five). (a) Total task delay. (b) Node deployment location. The red dots represent the node deployment location, and the yellow area represents the node’s coverage. (c) Algorithm convergence curve.
Figure 12. Performance comparison of mobile device edge node deployment algorithms (number of mobile devices is five). (a) Total task delay. (b) Node deployment location. The red dots represent the node deployment location, and the yellow area represents the node’s coverage. (c) Algorithm convergence curve.
Applsci 14 10903 g012
Figure 13. Performance comparison of mobile device edge node deployment algorithms (number of mobile devices is 10). (a) Total task delay. (b) Node deployment location. The red dots represent the node deployment location, and the yellow area represents the node’s coverage. (c) Algorithm convergence curve.
Figure 13. Performance comparison of mobile device edge node deployment algorithms (number of mobile devices is 10). (a) Total task delay. (b) Node deployment location. The red dots represent the node deployment location, and the yellow area represents the node’s coverage. (c) Algorithm convergence curve.
Applsci 14 10903 g013
Figure 14. Performance comparison of mobile device edge node deployment algorithms (number of mobile devices is 20). (a) Total task delay. (b) Node deployment location. The red dots represent the node deployment location, and the yellow area represents the node’s coverage. (c) Algorithm convergence curve.
Figure 14. Performance comparison of mobile device edge node deployment algorithms (number of mobile devices is 20). (a) Total task delay. (b) Node deployment location. The red dots represent the node deployment location, and the yellow area represents the node’s coverage. (c) Algorithm convergence curve.
Applsci 14 10903 g014
Table 1. Notations.
Table 1. Notations.
SymbolDescription
SNNumber of fixed equipment
SDFixed equipment collection
SXNumber of potential candidate locations for fixed equipment
SPA collection of potential candidate locations for fixed equipment
SMNumber of edge nodes for fixed equipment
SEFixed device edge node collection
MNNumber of mobile devices
MDMobile device collection
MMNumber of edge nodes for mobile devices
MECollection of edge nodes for mobile devices
C a l l Edge node deployment cost
β 1 Delay weight coefficient
β 2 Placement cost weight coefficient
T i , j t r a n s The transmission time of a task
T i , j e x e The execution time of a task
T i , j q u e u e The queuing time of a task
T m a x Maximum task delay
Table 2. Notations used in fixed device edge node placement.
Table 2. Notations used in fixed device edge node placement.
SymbolDescriptionValue
SNNumber of fixed equipment[10, 100]
SXNumber of potential candidate locations[5, 15]
s d i n Amount of data input per task[800, 1500] kb
s d o u t Amount of data output per task[1, 50] kb
s y Load per task[10, 50] MHz
s f r e The main frequency of the edge node[1.5, 4.5] GHz
CEdge node cost[800, 3000]
β 1 Delay weight coefficient0.6
β 2 Placement cost weight coefficient0.4
Table 3. Notations used in mobile device edge node placement.
Table 3. Notations used in mobile device edge node placement.
SymbolDescriptionValue
MNNumber of mobile devices[5, 10, 20]
MXNumber of potential candidate locations[5, 10, 20]
m d i n Amount of data input per task[80, 150] Kb
m d o u t Amount of data output per task[1, 50] Kb
m y Load per task[80, 1000] MHz
m f r e The main frequency of the edge node3.6 GHz
Table 4. Parameters set in the algorithms.
Table 4. Parameters set in the algorithms.
SymbolDescriptionValue
TMaximum number of iterations of IBGA500
MNumber of populations of IBGA200
P c r o Crossover rate of IBGA0.6
P a l t Variation rate of IBGA0.05
TMaximum number of iterations of ISCSO500
MFNumber of populations of ISCSO200
bSpiral shape constant1
Table 5. Experimental results.
Table 5. Experimental results.
Number of Edge NodesAverage Device CoverageObjective Function Value
50.58950.6228
60.70740.6220
70.78000.6140
80.85710.6020
90.96140.5916
100.97730.6080
110.98410.6400
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yin, Z.; Bi, Z.; Zhang, F. Multi-Objective Edge Node Deployment Method Based on Improved Heuristic Algorithms for Smart Mines. Appl. Sci. 2024, 14, 10903. https://doi.org/10.3390/app142310903

AMA Style

Yin Z, Bi Z, Zhang F. Multi-Objective Edge Node Deployment Method Based on Improved Heuristic Algorithms for Smart Mines. Applied Sciences. 2024; 14(23):10903. https://doi.org/10.3390/app142310903

Chicago/Turabian Style

Yin, Zhenyu, Zhiying Bi, and Feiqing Zhang. 2024. "Multi-Objective Edge Node Deployment Method Based on Improved Heuristic Algorithms for Smart Mines" Applied Sciences 14, no. 23: 10903. https://doi.org/10.3390/app142310903

APA Style

Yin, Z., Bi, Z., & Zhang, F. (2024). Multi-Objective Edge Node Deployment Method Based on Improved Heuristic Algorithms for Smart Mines. Applied Sciences, 14(23), 10903. https://doi.org/10.3390/app142310903

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop