Submitted:
19 May 2023
Posted:
22 May 2023
You are already at the latest version
Abstract
Keywords:
1. Introduction
- (1)
- Develop an AI-based framework to deploy these strategies designed in this paper for IoV during service offloading process.
- (2)
- Adopt AIGD(Algorithm of Improved Gradient Descent) to improve the speed of iteration. So, the convergence of CNN based on AIGD is able to be improved significantly.
- (3)
- Design ACLBTP(Algorithm of CN_LSTM Based Traffic Prediction) to gain the predicted number of mobile nodes.
- (4)
- Conduct ASOBCL(Algorithm of Service Offloading Based on CN_LSTM) to offload the services. Sorting technique is adopted in this algorithm. So, the work of offloading is more efficient.
2. The Framework of System

3. The Model of System
4. Strategy Design
5. Simulation Analysis
5.1. Prediction Accuracy
5.2. Load Balance
5.3. Offloading Time
6. Conclusion and Future Work
Author Contributions
Funding
Acknowledgment
References
- G. Gui et al., “6G: Opening New Horizons for Integration of Comfort, Security and Intelligence,” IEEE Wireless Commun.,vol. 27, no. 5, Oct. 2020, pp. 126–32. [CrossRef]
- GE Digital Report, “Everything You Need to Know about the Industrial Internet of Things,” 2017; https://www.ge.com/ digital/blog/everything-you-needknow-about-industrial-internet-things.
- Liang T , Chen M , Yin Y , et al. Recurrent Neural Network Based Collaborative Filtering for QoS Prediction in IoV[J]. IEEE Transactions on Intelligent Transportation Systems, 2021, PP(99):1-11. [CrossRef]
- Xu X , Huang Q , Zhu H , et al. Secure Service Offloading for Internet of Vehicles in SDN-Enabled Mobile Edge Computing[J]. IEEE Transactions on Intelligent Transportation Systems, 2020, 22(6):3720-3730. [CrossRef]
- L. Zhou, W. Min, D. Lin, Q. Han, and R. Liu, “Detecting motion blurred vehicle logo in IoV using filter-DeblurGAN and VL-YOLO,” IEEE Trans. Veh. Technol., vol. 69, no. 4, pp. 3604–3614, Apr. 2020. [CrossRef]
- Wang Y , Tian Y , Hei X , et al. A Novel IoV Block-Streaming Service Awareness and Trusted Verification Scheme in 6G[J]. IEEE Transactions on Vehicular Technology, 2021, 70(6):5197-5210. [CrossRef]
- J. Qiu, L. Du, D. Zhang, S. Su, and Z. Tian, “Nei-TTE: Intelligent traffic time estimation based on fine-grained time derivation of road segments for smart city,” IEEE Trans. Ind. Informat., vol. 16, no. 4,pp. 2659–2666, Apr. 2020. [CrossRef]
- Mondal and S. Mitra, “Security issues in vehicular ad hoc networks for evolution towards Internet of vehicles,” in Connected Vehicles in the Internet of Things. Cham, Switzerland: Springer, 2020, pp. 253–307.
- Mlika Z , Cherkaoui S . Network Slicing with MEC and Deep Reinforcement Learning for the Internet of Vehicles[J]. IEEE Network, 2021, PP(99):1-7. [CrossRef]
- Qi W, Li Q , Song Q , et al. Extensive Edge Intelligence for Future Vehicular Networks in 6G[J]. IEEE Wireless Communications, 2021, 10(99):1-8. [CrossRef]
- S. Wang et al., “When Edge Meets Learning: Adaptive Control for Resource constrained Distributed Machine Learning,” Proc. IEEE INFOCOM, 2018. [CrossRef]
- G. Zhang et al., “Energy-Delay Tradeoff for Dynamic Offloading in Mobile-Edge Computing System with Energy Harvesting Devices,” IEEE Trans. Industrial Informatics, vol. 14, no.10, 2018, pp. 4642–55. [CrossRef]
- H. Liu et al., “Parking-Area-Assisted Spider-Web Routing Protocol for Emergency Data in Urban VANET,” IEEE Trans. Veh.Technol., vol. 69, no. 1, Jan. 2020, pp. 971–82. [CrossRef]
- X. Huang, P. Li, and R. Yu, “Social Welfare Maximization in Container-Based Task Scheduling for Parked Vehicle Edge Computing,” IEEE Commun. Lett., vol. 23, no. 8, June 2019,pp. 47–51. [CrossRef]
- Z. Su et al., “A Game Theoretic Approach to Parked Vehicle Assisted Content Delivery in Vehicular Ad Hoc Networks,” IEEE Trans. Veh. Technol., vol. 66, no. 7, Nov. 2016,pp. 64–74. [CrossRef]
- Sun W , Liu J , Yue Y . AI-Enhanced Offloading in Edge Computing: When Machine Learning Meets Industrial IoT[J]. IEEE Network, 2019, 33(5):68-74. [CrossRef]
- Y. N. Dauphin et al., “Equilibrated Adaptive Learning Rates for Non-Convex Optimization,” Proc. NIPS, Dec. 2015, pp.1504–1512. [CrossRef]
- E. El Haber, T. M. Nguyen, and C. Assi, “Joint optimization of computational cost and devices energy for task offloading in multi-tier edge-clouds,” IEEE Trans. Commun., vol. 67, no. 5, pp. 3407–3421,May 2019. [CrossRef]
- M. Piorkowski et al., “CRAWDAD Trace Set Epfl/Mobility/Cab (V. 2009-02-24),” http://crawdad. cs.dartmouth.edu/epfl/mobility/cab, 2009.
- X. Xu et al., “An edge computing-enabled computation offloading method with privacy preservation for Internet of connected vehicles,” Future Gener. Comput. Syst., vol. 96, pp. 89–100, Jul. 2019. [CrossRef]






| Notations | Descriptions |
|---|---|
| D1/2 | the non-singular matrix |
| R | the Raleigh quotient |
| v | the given direction |
| H | the function of Hessian |
| α | the gradient descent |
| γ | the eigenvalues of H |
| η | the eigenvectors of H |
| Se | the set of edge nodes |
| Ss | the set of services |
| Rj | the resource utilization of j-th EN |
| Rave | the average resource utilizations of ENs |
| lb | the load balance |
| θ | the parameters of function |
| β | the learning rate |
| μ | the damping factor |
| Algorithm Realization |
|---|
| 1: Initialization , 2: Initialization H to 0 matrix 3: Gain the min value of 4: foreach i in (k,K) 5: get v randomly from N(0,1) 6: 7: 8: endfor |
| Algorithm Realization |
|---|
| 1: Initialization Mobile Edge Nodes Data Matrix: M, Layers: 3, Number of iteration: 2000, time slot:16, Number of data for each slot:32 Number of network errors: R 2: Establish Training Set: Input Data Set, Output result Set 3: Set Iteration Number n, Set Confidence Interval: MinValue 4: While(R< MinValue) 5: { 6: for i=1 to n 7: { 8: Extract Spatial Feature of Time Series Traffic Data via two Convolution Layers Based on AIGD. 9: The Output Data from two Convolution Layers are put into LSTM Layer for extracting time feature. 10: The Output Data from LSTM are put into a full connection layer and the output is the number of Users in each area in each time slot. 11: i++ 12: } 13: R=MSE(Output Data from LSTM, Input Data Set) 14: } 15: Output Predicted Number of Users 16: End of Strategy |
| Algorithm Realization |
|---|
| 1: Initialization Output Predicted Number of Mobile Edge Nodes: n, Service Set: Ss 2: Sort n Mobil Edge Nodes via load calculated with (15) desc. 3: While(Ss !=null) 4: { 5: Offload the service the Mobile Edge Node with min load. 6: Remove the service from the Ss. 7: Sort n Mobil Edge Nodes via load calculated with (15) desc again 8: } 9: End of Strategy |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).