Next Article in Journal
Decentralized UAV Swarm Scheduling with Constrained Task Exploration Balance
Previous Article in Journal
GCP and PPK Utilization Plan to Deal with RTK Signal Interruption in RTK-UAV Photogrammetry
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Self-Adaptive Trajectory Optimization Algorithm Using Fuzzy Logic for Mobile Edge Computing System Assisted by Unmanned Aerial Vehicle

by
Brindha Subburaj
1,*,
Uma Maheswari Jayachandran
1,
Vinothini Arumugham
1 and
Miruna Joe Amali Suthanthira Amalraj
2
1
School of Computer Science and Engineering, Vellore Institute of Technology, Chennai 600127, India
2
Department of Computer Science and Engineering, K.L.N College of Engineering, Sivagangai 630612, India
*
Author to whom correspondence should be addressed.
Drones 2023, 7(4), 266; https://doi.org/10.3390/drones7040266
Submission received: 11 February 2023 / Revised: 14 March 2023 / Accepted: 27 March 2023 / Published: 13 April 2023
(This article belongs to the Section Drone Communications)

Abstract

:
The advancement of the Internet of Things (IoT) and the availability of wide cloud services have led to the horizon of edge computing paradigm which demands for processing the data at the edge of the network. The development of 5G technology has led to the increased usage of IoT-based devices and the generation of a large volume of data followed by increased data traffic, which is difficult to process by the mobile edge computing (MEC) platform. The latest inventions related to unmanned aerial vehicles (UAVs) helps to assist and replace the edge servers used for MEC. In the present work, the objective is to develop self-adaptive trajectory optimization algorithm (STO) which is a multi-objective optimization algorithm used to solve the vital objectives associated with the above scenario of a UAV-assisted MEC system. The objectives identified are minimizing the energy consumed by the MEC and minimizing the process emergency indicator, where the process emergency indicator implies the urgency level of a particular process. Finding the optimal values for these conflicting objectives will help to further efficiently apply UAV for MEC systems. A self-adaptive multi-objective differential evolution-based trajectory optimization algorithm (STO) is proposed, where a pool of trial vector generation strategies is extended. The strategies and the crossover rate associated with a differential evolution (DE) algorithm are self-adapted using fuzzy systems to improve the population diversity. The experimentation is planned to be conducted on hundreds of IoT device instances considered to be fixed on the ground level and to evaluate the performance of the proposed algorithm for a single unmanned aerial vehicle-assisted mobile edge computing system.

1. Introduction

The recent trend in computing is edge computing, where the computations are performed closer to the source than computing in the cloud [1]. Edge computing thus leverages the cloud computing services to the various devices at the proximity of the network. The advent of 5G communication results in much more utilization of IoT devices leading to the generation of huge volumes of data to be processed leading to data traffic. The edge servers at the mobile edge computing systems are grounded at specific locations, making it infeasible to handle such increasing loads [2]. Moreover, in remote areas where the coverage of wireless network is poor, IoT devices with energy limitation in general fail to transfer data to computation environment [3].
Unmanned aerial vehicles (UAVs) are widely applied in various domains and more advancements are made in this field over the last decade. Recent advances in components, modern sensors, and 5G communication has further contributed to the seamless application of UAV. Two major classifications of UAVs are rotary-wing and fixed-wing UAVs [4]. UAVs are applied in agriculture, smart transportation, rescue system, path planning, etc. Thus, they are used to replace the conventional fixed edge server system which serves the mobile edge computing system. The UAV-assisted mobile edge computing system can overcome the difficulties related to the mobile edge computing system [5]. UAVs thus can be an alternative data collection environment for the Internet of Things devices. Deploying UAVs for MEC system requires several factors to be improved and optimized.
Optimization techniques attempt to find solutions that are feasible for the optimization problem considered. Several application domains do require the associated parameters to be optimized and they are defined as objective function. There can be one or more objectives in an application that needs to be optimized. Several classes of search and optimization techniques are available in the literature and numerous research reports in the field are carried and various algorithms are proposed. Evolutionary algorithms (EAs) are one such widely used search and optimization technique. Genetic algorithm (GA) [6], differential evolution (DE), [7] and particle swarm optimization (PSO) [8] are popular EA-based optimization algorithms.
Recently, the UAV-based MEC system is subject to several research studies to improve the applicability of UAV for MEC systems. The previous vital research contributions in this field are presented here categorizing based on the number of objectives, whether single or multi-objective problems considered. Next, we present related work based on whether the stop position (SP) count of UAV considered as fixed or not. SP is the locations where UAV is hovered at a point for processing the data generated by IoT devices at the location. Finally, we present earlier research contributions related to process emergency indicator.
The common research conducted is related to minimize the energy consumed by the mobile edge computing systems, maximizing the coverage area and few are highlighted. The differential evolution algorithm is extended to minimize the energy factor using a varying population size [9]. In [10], the authors have extended a two-layer optimization method to reduce the energy consumption of the system. In [11], optimization techniques are applied to improve the coverage factor by reducing the transmission power. The techniques to improve the energy efficiency in UAV-based MEC systems are discussed in [12,13]. In these research works, the authors have attempted to solve a single-objective optimization problem associated with MEC systems such as the energy consumption or coverage. The real world optimization problems in MEC systems assisted by UAVs have several conflicting objectives that need to be optimized. A deep Q-network-based strategy is used to solve the multi-objective optimization problem with the objectives: to decrease the latency and energy consumption [14]. A heuristic algorithm is extended by the authors to optimize the objectives, minimizing energy consumption and reducing the task execution delay [15].
Most of the existing research studies attempted to prefix the number of stop positions (SPs) associated along the optimization problem in MEC systems assisted by UAVs, few are listed here. UAV-based data collection systems through deployment optimization [16]. In [17], the authors deployed UAV-based systems for a downlink-based communication application to improve the coverage factor. The above way of attempting UAV deployment for MEC by presetting the stop position with respect to the application may not beneficial. Especially if the number of SPs is not optimal, then the efficiency of UAV-based systems will be reduced. In the present work, the SP is considered as unknown and we try to optimize the stop positions and locations in the proposed algorithm. The applications where UAV-based MEC systems used also includes mission critical tasks, where the time taken by the system to service or process the task is vital. Thus, the important and emergency tasks needed to be prioritized and served as soon as possible [18].
The above research contributions related to the mobile edge computing system assisted by UAVs has motivated to further leverage the efficient applicability of the UAV-based system. The major research contributions are listed below:
  • Multi-objective optimization problem for the MEC system assisted with single UAV is represented. The multiple conflicting objectives to be optimized are minimizing the energy consumed by the MEC and minimizing the process emergency indicator.
  • To develop a self-adaptive multi-objective differential evolution-based trajectory optimization algorithm (STO) to optimize the multi-objective problem identified in the MEC system assisted by UAVs. STO algorithm is developed based on DE algorithm. The trial vector generation strategies and control parameters associated in DE algorithm are self-adapted using the success index in self-adaptive differential evolution (SaDE) algorithm [19]. Fuzzy Inference system is used to further improve the adaptation characteristics of control parameters in the FAMDE-DC algorithm [20]. The proposed STO algorithm is developed using the above adaptation techniques, along with appropriate encoding strategies [21] suitable to handle the implementation issues associated in the trajectory optimization problem.
  • The experimentation is performed by simulating environment with up to hundreds of IoT devices. Results are compared with related research findings and the inferences are discussed.
The paper is structured as follows: The multi-objective optimization problem formulation is detailed in Section 2. The proposed STO algorithm is given in Section 3. The experimental setup and the performance metrics used in the present research study are discussed in Section 4. The results and its analysis, comparison of the results with other related work are given in Section 5. The conclusion of the present work is discussed in Section 6.

2. Multi-Objective Optimization Problem Formulation

Problem formulation is a primary requirement to successfully apply optimization technique to solve any domain specific problem to derive the feasible solution. In the present work, the problem is a multi-objective optimization problem and the objectives are to minimize the energy consumed by the MEC and to minimize the process emergency indicator. The objective functions [11] are presented in this section.
The MEC system considered is assisted with a single UAV and a number of IoT devices given as T = 1 , 2 , . . , t . The MEC system is used to complete the process or work associated with the IoT devices. A process i in an IoT device is characterized by three factors A i ,   B i , C i where A i is the number of input information of process i , B i indicates the computational resources needed to complete one bit involved in process i . C i is the process emergency indicator and it is prioritized as:
C i   1 , 2 , 3 , 4 , 5
It is prioritized such that lesser the C i value, the most emergency process and is to be computed first.
As mentioned earlier, in the present work the number of stop position is considered to be unknown and we try to optimize it. Thus, the stop position (SP) is given as S = 1 , 2 , . . , s . Next vital parameter is the location of the IoT device and the SP. The coordinates representing IoT device’s location is set at l i , m i , 0 . Since the device is considered to be at ground, the value of third component representing height is set at 0. The location coordinates of a random stop position j is set as L j , M j , H , the third component H is the height of the UAV device. The following equation gives the distance between an IoT device and the stop position.
d i j = L j l i 2 M j m j 2 + H 0 2
The variable E i j is used to represent an edge computing link established between an IoT device and UAV’s stop position. The device usually establishes link with the nearest UAV’s stop position. E i j is subject to the two constraints as given in Equation (3). E i j = 1 illustrates a valid link establishment and E i j = 0 gives that no such link is established. Further, each device transmits data only at one stop position as given in constraint 2.
Constraint   1 :   E i j = 1 ,         i f   j = a r g m i n j S   d i j ,   0 ,                                                 o t h e r w i s e ,
and
Constraint   2 :   j = 1 s E i j = 1 , i T .
The MEC system assisted by UAVs do have bandwidth limitations, thus an UAV at any stop position can serve only up to M I IoT devices and is given in below constraint.
Constraint   3 :   i = 1 t E i j M I , j S .
The below constraint is used to confirm that the MEC system assisted by UAVs provides computing services to all the IoT devices.
Constraint   4 :   i = 1 t j = 1 s E i j = t
The data rate to send data of a process from the IoT device to the UAV at a stop position is given below.
q i j = W log 2 1 + u i t v i j σ 2 = W log 2 1 + u i t v 0 σ 2 d i j 2  
where the variable W denotes the system bandwidth. The transmission power is represented through u i t . The channel power gain is given by v i j and the channel power gain at one unit reference distance is represented as v 0 ; the white gaussian noise is given by σ 2 .
The time taken by an IoT device to transmit A i number of input information to the UAV at j t h stop position is given below.
T i j a = A i q i j
Energy consumption of a single i t h IoT device for data transmission is given by
N i j t = u i t T i j t = u i t A i q i j
The total energy consumption of all the IoT devices is represented in below equation.
N I o T = : i = 1 t j = 1 s E i j N i j t
The time taken by UAV for completing the process of a i t h IoT device is given in below equation.
T i c = A i B i C P
where the variable C P in above equation is the UAV’s CPU processing speed.
The UAV will hover at a stop position (SP) j until all the process of the IoT devices at the S P is completed, thus hovering time is represented as T j h .
T j h = m a x i T E i j T i j a + E i j T j c
Next, the energy consumption of UAV while the entire hover time is given in (13). Where p h denotes hovering power.
N h = j = 1 s p h T j h
The next crucial factor is the time taken by the UAV to fly from one stop position j to the other stop position j + 1 after process completion at j . This flight time is given in the below Equation (14) considering that UAV is flying at a constant speed r and at prefixed constant height.
T j f = L j + 1 L j 2 + M j + 1 M j 2 r
Thus, the energy consumption during the above flight time is calculated using Equation (15). Where the UAV’s flight power is given by p f .
N f = j = 1 s 1 p f T j f
The UAV’s overall energy consumption is calculated by,
N U A V = N h + N f
and the energy consumption factor of the MEC system assisted by UAVs is
N M E C = N U A V + λ N I o T
where the weight parameter λ is used to ensure that the energy consumption related to IoT devices N I o T is smaller than the UAV’s energy consumption metric N U A V and is λ 0 .
As discussed earlier, the two objectives taken for optimization are minimizing the energy consumed by the MEC system N M E C and to minimize the process emergency indicator P E T a s k . Considering the various process emergency indicator associated with each process and the order of the stop position, the final process emergency indicator P E T a s k   is estimated as below.
P E T a s k = i = 1 t j C i , j = a r g m i n j S   d i j
In the above equation we estimate sum of products of the process emergency indicator and j . Where j indicates the sequence value of the UAV’s stop position; the sequence value is derived using j = a r g m i n j S   d i j , representing the nearest distance to an i t h device. Lesser the value of P E T a s k , faster the emergency process is handled.
To summarize, the multi-objective optimization problem in the MEC system assisted with single UAV is given below.
m i n L j , M j , H , s N M E C , P E T a s k
Subject   to :   Constraint   1 :   E i j 0 , 1 ,
Constraint   2 :   j = 1 s E i j = 1 ,     i T ,
Constraint   3 :   i = 1 t E i j M I ,     j S ,
Constraint   4 :   i = 1 t j = 1 s E i j = t ,
Constraint   5 :   l m i n L j l m a x ,
Constraint   6 :   m m i n M j m m a x ,
where the UAV’s stop position’s location coordinate set { L j , M j |   j = 1 , 2 , . . , s } and the number of stop positions s , are to be optimized.

3. Proposed STO Algorithm

The multi-objective optimization problem as given in Equation (19) for the MEC system assisted by UAVs is a challenging environment, since the number of S P and their locations are considered to be unknown. The traditional gradient descent and other related optimization methods are not suitable in handling such problems. Evolution-based optimization algorithms are derivative-free methods and do not require gradient information. Thus, one such evolution-based multi-objective optimization algorithm is extended to solve the discussed problem. The proposed algorithm is named as, self-adaptive trajectory optimization (STO) algorithm. STO is a DE [7]-based algorithm improved by including techniques such as, using a pool of trial vector generation strategies [9] and its adaptation, fuzzy-based control parameter adaptation [10] and an improved encoding scheme [11] to maintain uniformity in length of population individuals. The above inclusions make the proposed STO algorithm robust and suitable to solve the complex multi-objective optimization problem in the MEC system assisted by UAVs.

3.1. Work Flow Model of STO

The process involved in optimization using STO algorithm is illustrated using a flowchart as given in Figure 1. The subsequent section details the steps involved in the process, and the proposed STO algorithm is given in Algorithm 1.
Algorithm 1: STO Algorithm.
1: Initialization of the dimension of the problem, here it is the stop position count ( s ) , the control parameters NP ,   CR ,   F associated with DE algorithm and the other metrics associated in the system. Generation count G is set at 1.
 2: Population initialization of NP individuals represented as P P O P and its fitness evaluation.
 3: While the termination criteria is not met,
 Do
 4: Perform non-dominated sorting on P P O P and select a random non-dominated solution from the first front denoted as P B e s t .
 5: Apply cutting/padding encoding scheme on P P O P and obtain N P O P (To ensure all individuals in the population are of same length).
 6: Find the population diversity and input the diversity error value to the fuzzy system.
 7: Trial vector generation through mutation, crossover techniques and the resultant population is called as Q P O P .
 8: Selection strategy using a population updating technique to optimize the number of SP and to identify the fittest N P solutions.
 9: Increase the generation count.
 10: End while.

3.2. Population Initialization

A population of N P individuals are initialized randomly subject to variable bounds covering the complete search space. EA-based techniques start its search using this random population set and tries to optimize the same within a prespecified limit. Each individual in the population actually represents the number of stop positions (SPs). Since in the present work we consider that the number of SP is unknown, the IoT device count t is taken as SP count s and each individual in initial population will be of size 2 s , which holds the location coordinates L , M of the SP. The height at which UAV hovers while communication with IoT device is fixed and it is used while fitness evaluation.

3.3. Trial Vector Generation Using Strategy Adaptation and Cutting/Padding Encoding Scheme

In DE-based algorithm, there are numerous strategies available in literature for trial vector generation. Each strategy is effective in solving one or more optimization problem belonging to different domain effectively. A suitable strategy is identified to solve a particular problem using a trial and error method and, it may even be unsuitable in solving related problem. Thus, in the present work a pool of strategies are included for trial vector generation.

3.3.1. Encoding Scheme Using Cutting/Padding

In the MEC system assisted by UAVs, we have attempted to solve multi-objective optimization problem where the number of stop positions (SPs) is considered to be unknown. The length of each individual in the population represents the location coordinates of SP which is the number of decision variables. Since the number of SP, its location coordinates and the order of SP is unknown, the length of each population individual will differ and thus performing mutation and crossover is difficult as they require uniformity in length of all individuals. Thus, the cutting/padding encoding scheme [11] is used to maintain the uniformity.
Figure 2a represents individuals in the population with varying lengths using the regular encoding scheme and Figure 2b exhibits the working of cutting/padding encoding scheme. Where S 1 , S 2 , . . S T represents the number of S P of the population individuals, respectively. To perform cutting/padding, non-dominated sorting [22] is performed over the P P O P population, and the population best solution P B e s t is selected randomly from the first front. In the example shown in Figure 2b assume the first solution is P B e s t and the number of S P in it is S 1 . With this S 1 as the reference, the other remaining solutions are subject to either cutting or padding. If the length of solution exceeds the length of P B e s t , then the excess part is removed and if the length is less than length of P B e s t , then to maintain uniformity in length, the last SP in the solution is repeated and added until the length is equal to length of P B e s t and this is the padding scheme. The result population set N P O P has N P solutions all are of equal length.

3.3.2. Trial Vector Generation and Its Adaptation

The trial vector/offspring generation in DE-based algorithms are performed using mutation, crossover operations and there are several trial vector generation strategies available in literature. Each of them performs well in optimizing a one or more domain specific problems. Their performance may vary even during various evolution stages. Thus, trying to identify and chose a particular trial vector generation strategy is purely a trial and error mechanism which is time consuming. The chosen strategy and values set for associated control parameters of DE algorithm like the size of population N P , the crossover rate C R , and the scaling factor F may perform well for that particular problem and may be inefficient in solving other problems.
Thus, strategy pool [9] with various trial vector generation strategies each with varied characteristics are included and are self-adapted based on success index. In present work four different strategies ‘DE/rand/1/bin’, ‘DE/rand/2/bin’, ‘DE/current-to-rand/1’, and ‘DE/rand-to-best/2/bin’ are all included in the strategy pool, where the solution P B e s t is the best solution used in strategy ‘DE/rand-to-best/2/bin’.
After the initial learning phase L P E generations the performance of each of the strategy is assessed and most promising strategies in efficiently solving a particular problem are chosen with higher probability for trial vector generation in upcoming generations. Here, the success index of a strategy is estimated such as, a solution generated by using a strategy entering the next generation after the update technique is a promising solution and the strategy is successful. If a strategy generates much of such promising solutions, its success index will be high and the probability of using such strategy will be more. The probability of choosing a strategy s t in generation g e shown below.
P s t , g e = S u s t , g e s t = 1 S T S u s t , g e
where
S u s t , g e = g e = g e L P E g e 1 n s u s t , g e g e = g e L P E g e 1 n s u s t , g e + g e = g e L P E g e 1 n f a s t , g e + ;
where s t = 1 , 2 , . . S T ; g e > L P E .
The number of promising solutions produced by strategy s t chosen for next generation after the updating method is given by n s u s t , g e and the count n f a s t , g e is the number of solutions generated by strategy s t that are not selected in the population selected for subsequent generation; and a constant is set at value 0.01 to make sure that none of the strategy has zero success rate. Thus, through the above method, trial vectors are generated.

3.3.3. Fuzzy System-based Control Parameter Adaptation

The three vital control parameters in DE algorithm are size of population N P , the crossover rate C R , and the scaling factor F . N P depends on the problem. C R value decides in each solution the component count that are to be mutated relies on the complexity of the problem and the convergence is based on the values of F .   F value in the present work is generated using a normal distribution N 0.5 , 0.3 representing the mean and standard deviation, respectively, and it is ensured that F value is between range [0.4, 1]. The crossover rate C R is adapted based on the population diversity using a Fuzzy Inference System (FIS) [10].
DE algorithm can perform well only if the population are diverse enough, else the evolution will end up in stagnation of the population or premature convergence. In the present work, the population diversity is found using the ‘distance-to-average point’ metric [23] as:
p o p d i v g e P O P = 1 S L D * N P * n = 1 N P g = 1 P D n z n g z ¯ g 2
where S L D is the search space length measured diagonally using z m a x z m i n 2 and each search variable z are bound to z m i n < z < z m a x . P O P is the current population of N P solutions. P D n is the dimensionality of the problem. z n g is the g t h value of the n t h solution and z ¯ g is the g t h value of the variable’s value z ¯ .
Fuzzy system is used to adapt the cross over rate mean C R m n . C R values are generated using the normal distribution N C R m n s t , s t d , the standard deviation is set at value 0.1, C R m n s t is the crossover rate mean for strategy s t and is set at value 0.5 for all the strategies during the initial learning phase L P E . After L P E , the value for C R m n s t is calculated as,
C R m n s t = C R m n s , s t + C R m n d , s t
The variable C R m n s , s t is the median of the C R values of strategy s t that generated promising solution during the previous L P E generations. The second component C R m n d , s t is the mean value obtained using fuzzy system considering P O P diversity. Through the above adaptations the crossover rate mean values are adapted and crossover rate value C R are generated within the range [0, 1].
The input to the fuzzy system is the diversity difference ( Δ e r r g e ) calculated as,
Δ e r r g e = r e f d i v p o p d i v g e
where p o p d i v g e is the population diversity of the current generation population and r e f d i v is the referral diversity value which is the actual expected diversity value set by the user.
This diversity difference is passed as fuzzy input and the FS maps and gives the changes to be made in the crossover rate mean ( Δ C R m n s t g e ) to improve the population diversity to match with the referral value. Thus, using the fuzzy output the crossover rate mean for generation g e is found as,
C R m n d , s t g e = C R m n s t g e 1 + Δ C R m n s t g e
The above C R m n d , s t g e value is the second variable used in Equation (23). The crossover rate values adapted using the fuzzy system as above helps to improve the population diversity to enhance the exploration. The fuzzy variables used to define the input and output metrics are zero deviation (ZD), negative deviation (ND), large negative deviation (LND), positive deviation (PD), and the large positive deviation (LPD). The variables are defined as triangular function to establish membership. Centroid technique is utilized for defuzzification. The ruleset is given in Table 1 and the fuzzy input and output variables are given in Figure 3.
The fuzzy rules are framed such as, if the diversity difference value is within range of zero deviation, it implies that the current population diversity is in the range of reference diversity. Thus, the output value for the variable changes to be performed to crossover rate mean is also set at zero deviation, no change will be conducted. If the diversity difference value is positive or negative then the crossover rate mean value will also be improved accordingly to meet the required reference diversity level. The trial vector Q P O P is generated through the above strategy adaptation, fuzzy-based crossover rate adaptation and cutting/padding encoding scheme.

3.4. Selection Strategy

After generating the trial vector, the population for the next iteration is selected by further optimizing the count of stop positions (SPs), which directly influences the energy consumption value of the system. An updating technique [11] is used to optimize the count of SP. The target vector P P O P and the trial vector Q P O P both are considered for updating and optimizing SP count. For every Q P O P i individual in Q P O P , three tasks are performed such as:
  • Random deletion of a SP and this individual is referred as Q P O P i 1 .
  • The second task is formed by taking the individual Q P O P i as such and referred as Q P O P i 2 .
  • The third task is, for the respective i t h position in Q P O P , the individual P P O P i is taken and a SP is randomly added to that individual solution and is referred as Q P O P i 3 .
  • Thus, for every Q P O P i we have obtained three variants of the individuals Q P O P i 1 , Q P O P i 2 , Q P O P i 3 . Next, the feasibility of the variants are evaluated.
  • If more than one variant is feasible, then the individual variant which is non-dominated and having less SP is taken as Q S u c c e s s .
  • If only one variant is feasible, it is taken as Q S u c c e s s .
  • If none of the three variants are feasible then P P O P i is not changed.
Next, if the Q S u c c e s s is not being dominated by P P O P i then we replace P P O P i by Q S u c c e s s . Else, P P O P i is not changed. Through above updating scheme, we select population of N P solutions P P O P .

4. Experiments

In this section, the experimental setup, the test problems and the performance metrics used are detailed. The experimentation is conducted in MATLAB. Each algorithm is executed up to 20 runs for all the test problems conducted independently. An example of MEC system assisted by UAVs is given in Figure 4.

4.1. Experimental Setup

The initialization of parameter values involved in the MEC system assisted by UAVs and the parameters related to DE algorithm are all listed in Table 2. The above parameter setting is based on the existing literature listed in Introduction section [11,12,16]. For the other optimization algorithms taken for performance evaluation, the associated parameters are initialized with default values as recommended in related literature.
The UAV’S battery energy B _ E N is computed as:
B _ E N = B _ C A P 1000 × 3600 × B _ V O
where B _ C A P is UAV’S battery capacity, B _ V O is UAV’S battery voltage and B _ E N value through the above equation is computed as 5,221,440 J.

4.2. Test Problem

The multi-objective optimization problem for the MEC system assisted by UAVs is detailed in Section 2, based on which ten test problems are generated by varying the number IoT devices t , considered in the MEC system. The number of IoT devices in each problem are initialized at [60, 80, 100, 120, 140, 160, 180, 200, 300, 400].

4.3. Performance Measure I—Quality Indicator (Hypervolume)

The efficiency of the proposed STO algorithm in solving the optimization problem related to MEC system is tested using the hypervolume (HV) metric [24,25]. Since it is a real world problem and the true front for the problem is not known, HV is used as quality indicator. HV metric can assess both the convergence and diversity metrics of the attained solutions. Moreover, the problem is a minimization problem where both the objective values are to be minimized. An algorithm is claimed to perform well in solving a particular problem if the value of HV is high. The hypervolume metric is calculated as:
HV = L e X Q N f 1 X , r e 1 * f m X , r e m
where Q N is the nondominated solution set, L e is the Lebesgue measure. R e = r e 1 ,   r e 2 , . . , r e m are reference points and m is the number of objectives in the problem.

4.4. Performance Measure II—Statistical Test

To further prove the potential of the proposed STO algorithm, the results are analyzed statistically. Friedman test [26] is a non-parametric statistical test which jointly analyzes the results obtained through different algorithms taken for comparison. SPSS—statistical software package is used to perform the Friedman test and the significance level α is set at value 0.05. If the obtained p v a l u e through above test is less than α then the null hypothesis can be rejected and its shows significance of STO algorithm than other algorithms. Else, if p > α then there is no stronger evidence to prove that the proposed algorithm is better than remaining algorithms taken for comparative study.

5. Results and Analysis

In this section, the performance of the proposed STO algorithm is compared with other competitive algorithms and the results are discussed using the hypervolume performance metric and through statistical tests. The algorithms taken for comparison are NSGA-II [22], MTO-CPE [11], and NSGA-II-CPE. Where, NSGA-II is a classic and representative multi-objective evolutionary algorithm. MTO-CPE is a DE-based algorithm developed using the cutting-padding encoding scheme and the updating mechanism to solve the optimization problem in the MEC system assisted by UAVs. NSGA-II-CPE is a variant of NSGA-II by including the cutting-padding encoding scheme and the updating mechanism to optimize the number of stop positions. All the algorithms are executed 20 independent runs and the mean standard deviation of HV values are given in Table 3. Higher the HV value, better the performance of the algorithm.
From the HV results it is evident that the STO algorithm is efficient in solving all the test problems than the other algorithms taken for comparison. Another observation from the above results, as the count of IoT device increases the HV value decreases for all the algorithms. The fuzzy system-based self-adaptation of control parameters by considering the population diversity makes the STO algorithm robust in handling such complex real world optimization problem. The strategy pool of trial vector generation strategies and its adaptation, crossover rate adaptation using fuzzy system makes the DE algorithm suitable to solve the real world complex optimization problem without extensive fine tuning. Moreover, the other related problems can also be solved using the algorithm with less modifications related to the problem.
Figure 5 illustrates the Pareto fronts obtained using the STO and the other algorithms using the cutting/padding encoding scheme. It is evident that the solutions obtained using the STO dominate the solutions attained using other algorithms.
Figure 6 gives the trial vector generation strategy adaptation for the test problem with number of IoT device t value as 300, over the various stages of evolution, where the strategies are self-adapted according to the success index. The strategies that are successful in generating promising solutions entering the next generation are chosen with higher probability in upcoming generation for trial vector generation. All the strategies except DE/current-to-rand/1 are chosen with higher probability. The reason is DE/current-to-rand/1 strategy doesn’t involve any crossover operator. This shows the effectiveness of the proposed algorithm where the strategies and the crossover rate are self-adapted according to the population diversity through fuzzy system and attain promising solutions. Thus, the success index of the other strategies are higher.
Figure 7 represents the adaptation of the C R values over the generations for the test problem with number of IoT device t value as 300. The crossover rate values for the strategies are gradually adapted according to the environment which helps to escape from the population stagnation and premature convergence. This self-adaptation of C R values by improving the population diversity is one among the vital reasons for better optimization results.
To further strengthen the discussion on the present algorithm, the Friedman statistical test is conducted. The significance level α value is set at 0.050. The test results are shown in Figure 8. STO algorithm is ranked first among other algorithms in the test. The obtained ρ value is 0.001, which is less than 0.05. Thus, the null hypothesis can be rejected which statistically proves the significance of the present work.

6. Conclusions

In the present research work, the optimization problem related to mobile edge computing system assisted with a single unmanned aerial vehicle is considered. The multi-objective optimization problem is detailed where the objectives are minimizing the energy consumed by the MEC and minimizing the process emergency indicator. To solve the above complex real world problem, a novel algorithm based on DE algorithm is proposed and is named as the self-adaptive trajectory optimization (STO) algorithm. The number of stop positions is considered as unknown, which makes the problem environment challenging. STO algorithm is developed by including a pool of trial vector generation strategies and their self-adaptation using success index. Further, fuzzy system is used to self-adapt the crossover rate associated in DE algorithm by improving the population diversity. STO also uses the cutting/padding encoding scheme to ensure all the individuals in the population are of uniform length. The updating method further aids in optimizing the stop position count. STO algorithm developed using above techniques make it robust in handling the complex optimization problem presented.
The test problems are taken by varying the number of IoT devices. The efficiency of the proposed STO algorithm is proved by comparing the results with other representative evolutionary algorithms. The hypervolume metric value computed through 20 independent runs is presented and the STO algorithm outperforms the results attained by the other algorithms considered. To further strengthen the proposed research work, a statistical test was conducted and the STO algorithm is ranked first in the test. The above results are promising to further leverage the research in this domain by considering multiple UAVs and a larger number of IoT devices resembling the challenging MEC environment.

Author Contributions

Conceptualization, B.S.; methodology, B.S., U.M.J. and V.A.; software, B.S. and M.J.A.S.A.; validation, B.S. and U.M.J.; formal analysis, B.S. and V.A.; writing—original draft preparation, B.S.; writing—review and editing, B.S.; supervision, B.S. and M.J.A.S.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No publicly available data were used or generated.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Mao, Y.; You, C.; Zhang, J.; Huang, K.; Letaief, K.B. A survey on mobile edge computing: The communication perspective. IEEE Commun. Surv. Tutor. 2017, 19, 2322–2358. [Google Scholar] [CrossRef] [Green Version]
  2. Abbas, N.; Zhang, Y.; Taherkordi, A.; Skeie, T. Mobile edge computing: A survey. IEEE Internet Things J. 2017, 5, 450–465. [Google Scholar] [CrossRef] [Green Version]
  3. Kawamoto, Y.; Nishiyama, H.; Fadlullah, Z.M.; Kato, N. Effective data collection via satellite-routed sensor system (SRSS) to realize global-scaled Internet of Things. IEEE Sens. J. 2013, 13, 3645–3654. [Google Scholar] [CrossRef]
  4. Ahmed, F.; Mohanta, J.C.; Keshari, A.; Yadav, P.S. Recent Advances in Unmanned Aerial Vehicles: A Review. Arab. J. Sci. Eng. 2022, 47, 7963–7984. [Google Scholar] [CrossRef]
  5. Zeng, Y.; Zhang, R.; Lim, T.J. Wireless communications with unmanned aerial vehicles: Opportunities and challenges. IEEE Commun. Mag. 2016, 54, 36–42. [Google Scholar] [CrossRef] [Green Version]
  6. Michalewicz, Z. Genetic Algorithms + Data Structures = Evolutionary Programs; Springer: Berlin, Germany, 1996. [Google Scholar]
  7. Storn, R.; Price, K. Differential evolution—A simple and efficient heuristic for global optimization over continuous spaces. J. Glob. Optim. 1997, 11, 341–359. [Google Scholar] [CrossRef]
  8. Kennedy, J.; Eberhart, R. Particle swarm optimization. In Proceedings of the International Conference on Neural Networks, Perth, Australia, 27 November–1 December 1995; pp. 1942–1948. [Google Scholar]
  9. Huang, P.; Wang, Y.; Wang, K.; Yang, K. Differential evolution with a variable population size for deployment optimization in a UAV-assisted IoT data collection system. IEEE Trans. Emerg. Top. Comput. Intell. 2019, 4, 324–335. [Google Scholar] [CrossRef]
  10. Wang, Y.; Ru, Z.; Wang, K.; Huang, P. Joint deployment and task scheduling optimization for large-scale mobile users in multi-UAV-enabled mobile edge computing. IEEE Trans. Cybern. 2019, 50, 3984–3997. [Google Scholar] [CrossRef] [Green Version]
  11. Alzenad, M.; El-Keyi, A.; Lagum, F.; Yanikomeroglu, H. 3D placement of an unmanned aerial vehicle base station (UAV-BS) for energy efficient maximal coverage. IEEE Wirel. Commun. Lett. 2017, 6, 434–437. [Google Scholar] [CrossRef] [Green Version]
  12. Li, L.; Wen, X.; Lu, Z.; Pan, Q.; Jing, W.; Hu, Z. Energy-efficient UAV-enabled MEC system: Bits allocation optimization and trajectory design. Sensors 2019, 19, 4521. [Google Scholar] [CrossRef] [Green Version]
  13. Huang, P.; Wang, Y.; Wang, K. Energy-efficient trajectory planning for a multi-UAV-assisted mobile edge computing system. Front. Inf. Technol. Electron. Eng. 2020, 21, 1713–1725. [Google Scholar] [CrossRef]
  14. Lai, S.; Zhao, R.; Tang, S.; Xia, J.; Zhou, F.; Fan, L. Intelligent secure mobile edge computing for beyond 5G wireless networks. Phys. Commun. 2021, 45, 101283. [Google Scholar] [CrossRef]
  15. Cheng, Y.; Liao, Y.; Zhai, X. Energy-efficient resource allocation for UAV empowered mobile edge computing system. In Proceedings of the 2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing, UCC, Leicester, UK, 7–10 December 2022; pp. 408–413. [Google Scholar]
  16. Mozaffari, M.; Saad, W.; Bennis, M.; Debbah, M. Mobile Unmanned Aerial Vehicles (UAVs) for Energy-Efficient Internet of Things Communications. IEEE Trans. Wirel. Commun. 2017, 16, 7574–7589. [Google Scholar] [CrossRef]
  17. Du, W.; Ying, W.; Yang, P.; Cao, X.; Yan, G.; Tang, K.; Wu, D. Network-based heterogeneous particle swarm optimization and its application in UAV communication coverage. IEEE Trans. Emerg. Top. Comput. Intell. 2019, 4, 312–323. [Google Scholar] [CrossRef]
  18. Dai, H.; Zeng, X.; Yu, Z.; Wang, T. A scheduling algorithm for autonomous driving tasks on mobile edge computing servers. J. Syst. Archit. 2019, 94, 14–23. [Google Scholar] [CrossRef]
  19. Qin, A.K.; Huang, V.L.; Suganthan, P.N. Differential evolution algorithm with strategy adaptation for global numerical optimization. IEEE Trans. Evol. Comput. 2009, 13, 398–417. [Google Scholar] [CrossRef]
  20. Brindha, S.; Amali, S.M.J. A robust and adaptive fuzzy logic based differential evolution algorithm using population diversity tuning for multi-objective optimization. Eng. Appl. Artif. Intell. 2021, 102, 104240. [Google Scholar]
  21. Jianqing, L.; Linqiang, P. Multiobjective trajectory optimization with a cutting and padding encoding strategy for single-UAV-assisted mobile edge computing system. Swarm Evol. Comput. 2022, 75, 101163. [Google Scholar]
  22. Deb, K.; Pratap, A.; Agarwal, S.; Meyarivan, T. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 2002, 6, 182–197. [Google Scholar] [CrossRef] [Green Version]
  23. Ursem, R.K. Diversity-guided evolutionary algorithms. In Proceedings of the Seventh International Conference on Parallel Problem Solving from Nature VII (PPSN-2002), Granada, Spain, 7–11 September 2022. [Google Scholar]
  24. Zitzler, E.; Thiele, L. Multiobjective optimization using evolutionary algorithms—A comparative case study. In Proceedings of the International Conference on Parallel Problem Solving from Nature, Amsterdam, The Netherlands, 27–30 September 1998; Springer: Berlin/Heidelberg, Germany, 1998. [Google Scholar]
  25. Ishibuchi, K.; Imada, R.; Setoguchi, Y.; Nojima, Y. How to Specify a Reference Point in Hypervolume Calculation for Fair Performance Comparison. Evol. Comput. 2018, 26, 411–440. [Google Scholar] [CrossRef]
  26. Derrac, J.; García, S.; Molina, D.; Herrera, F. A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms. Swarm Evol. Comput. 2011, 1, 3–18. [Google Scholar] [CrossRef]
Figure 1. Flowchart of STO algorithm.
Figure 1. Flowchart of STO algorithm.
Drones 07 00266 g001
Figure 2. (a) Regular encoding scheme; (b) Cutting/Padding encoding scheme.
Figure 2. (a) Regular encoding scheme; (b) Cutting/Padding encoding scheme.
Drones 07 00266 g002aDrones 07 00266 g002b
Figure 3. (a) Fuzzy input variables and membership range; (b) Fuzzy output variables and membership range.
Figure 3. (a) Fuzzy input variables and membership range; (b) Fuzzy output variables and membership range.
Drones 07 00266 g003
Figure 4. An example of MEC System assisted by UAVs.
Figure 4. An example of MEC System assisted by UAVs.
Drones 07 00266 g004
Figure 5. Pareto Fronts obtained using STO and other algorithms for varying IoT device count (a) t = 60; (b) t = 80; (c) t = 100; (d) t = 120; (e) t = 140; (f) t = 160; (g) t = 180; (h) t = 200; (i) t = 300; (j) t = 400.
Figure 5. Pareto Fronts obtained using STO and other algorithms for varying IoT device count (a) t = 60; (b) t = 80; (c) t = 100; (d) t = 120; (e) t = 140; (f) t = 160; (g) t = 180; (h) t = 200; (i) t = 300; (j) t = 400.
Drones 07 00266 g005aDrones 07 00266 g005b
Figure 6. Trial vector generation strategies and its adaptation.
Figure 6. Trial vector generation strategies and its adaptation.
Drones 07 00266 g006
Figure 7. Crossover rate adaptation for the strategies.
Figure 7. Crossover rate adaptation for the strategies.
Drones 07 00266 g007
Figure 8. Friedman test results.
Figure 8. Friedman test results.
Drones 07 00266 g008
Table 1. Ruleset for fuzzy system.
Table 1. Ruleset for fuzzy system.
Input—Diversity DifferenceZDNDLNDPDLPD
Output—Changes in crossover rate meanZDNDLNDPDLPD
Table 2. Initial Parameter setup.
Table 2. Initial Parameter setup.
Device/MEC System/AlgorithmParameterVariableInitial Value
STO Algorithm
(Parameters related to DE)
Crossover rate mean, standard deviation C R m n , s t d (0.5, 0.1)
Scaling Factor mean, standard deviation F m n , s t d (0.5, 0.3)
Learning Period L P E 50 Generations
Maximum Number of Function Evaluations N F E 1000   ×   t
( t = number of IoT devices)
IoT DeviceIoT device location coordinates
(Devices distributed over a square with 1000 m side length)
l i , m i l i 0 ,   1000 m
m i 0 ,   1000 m
Number of input information A i [1, 1000] MB
Computational resources needed to process one bit B i 100 cycles per bit
Data transmission power u i t 0.1 Watts
Process emergency indicator C i C i 1 ,   2 ,   3 ,   4 ,   5
MEC SystemSystem bandwidth W 1 MHZ
Unit channel power gain v o −30 dB
White Gaussian noise σ 2 −100 dBm
Weight parameter λ 10,000
UAVThe maximum count of IoT devices handled simultaneously M I 5
Height-UAV’s flying altitude H 200 m
UAV’s location coordinates L j , M j L j 0 ,   1000 m
M j 0 ,   1000 m
Constant flying speed of UAV r 20 m/s
UAV’s CPU processing speed C P 10 GHZ
UAV’s Battery capacity B _ C A P 28,000 mAh
UAV’s Battery voltage B _ V O 51.8 volts
UAV’s hovering power p h 1400 watts
UAV’s flight power p f 1600 watts
Table 3. Results of HV performance metric (mean and standard deviation) attained by STO, NSGA-II, NSGA-II-CPE, and MTO-CPE. The best HV results are in bold.
Table 3. Results of HV performance metric (mean and standard deviation) attained by STO, NSGA-II, NSGA-II-CPE, and MTO-CPE. The best HV results are in bold.
Test Problem with   t   ValueSTONSGA-IINSGA-II-CPEMTO-CPE
600.5118 ± 0.005420.165 ± 0.004410.473 ± 0.008800.510 ± 0.00515
800.478 ± 0.007850.122 ± 0.003860.399 ± 0.01090.433 ± 0.00845
1000.465 ± 0.004100.0876 ± 0.005690.372 ± 0.01180.412 ± 0.00348
1200.412 ± 0.007840.0840 ± 0.009190.331 ± 0.01830.378 ± 0.00850
1400.0345 ± 0.02100.0557 ± 0.004280.269 ± 0.007020.0300 ± 0.0101
1600.328 ± 0.02110.0486 ± 0.007320.256 ± 0.01140.293 ± 0.0100
1800.487 ± 0.009140.0657 ± 0.001720.264 ± 0.005090.327 ± 0.00825
2000.289 ± 0.008410.0431 ± 0.004540.245 ± 0.008520.283 ± 0.00970
3000.278 ± 0.02460.0337 ± 0.003150.176 ± 0.005470.243 ± 0.0148
4000.187 ± 0.004670.0239 ± 0.003180.149 ± 0.001910.166 ± 0.00501
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Subburaj, B.; Jayachandran, U.M.; Arumugham, V.; Suthanthira Amalraj, M.J.A. A Self-Adaptive Trajectory Optimization Algorithm Using Fuzzy Logic for Mobile Edge Computing System Assisted by Unmanned Aerial Vehicle. Drones 2023, 7, 266. https://doi.org/10.3390/drones7040266

AMA Style

Subburaj B, Jayachandran UM, Arumugham V, Suthanthira Amalraj MJA. A Self-Adaptive Trajectory Optimization Algorithm Using Fuzzy Logic for Mobile Edge Computing System Assisted by Unmanned Aerial Vehicle. Drones. 2023; 7(4):266. https://doi.org/10.3390/drones7040266

Chicago/Turabian Style

Subburaj, Brindha, Uma Maheswari Jayachandran, Vinothini Arumugham, and Miruna Joe Amali Suthanthira Amalraj. 2023. "A Self-Adaptive Trajectory Optimization Algorithm Using Fuzzy Logic for Mobile Edge Computing System Assisted by Unmanned Aerial Vehicle" Drones 7, no. 4: 266. https://doi.org/10.3390/drones7040266

Article Metrics

Back to TopTop