Joint_Task_Offloading_and_Resource_Allocation_in_UAV-Enabled_Mobile_Edge_Computing
Joint_Task_Offloading_and_Resource_Allocation_in_UAV-Enabled_Mobile_Edge_Computing
Abstract—Mobile edge computing (MEC) is an emerging of data are collected from these devices at an exponential
technology to support resource-intensive yet delay-sensitive appli- rate [1] and need to be transported from place to place for
cations using small cloud-computing platforms deployed at the intelligent decision making, which has generated tremendous
mobile network edges. However, the existing MEC techniques
are not applicable to the situation where the number of mobile burden on our wireless communication infrastructure with the
users increases explosively or the network facilities are spar- limited radio spectrum. It is estimated that 25 billion Internet
ely distributed. In view of this insufficiency, unmanned aerial of Things (IoT) devices will be in use by 2025 [2], and such
vehicles (UAVs) have been employed to improve the connectiv- multitudes of wireless connected devices are enabling many
ity of ground Internet of Things (IoT) devices due to their high compelling new applications, such as real-time video analyt-
altitude. This article proposes an innovative UAV-enabled MEC
system involving the interactions among IoT devices, UAV, and ics [3], [4], augmented/virtual reality [5], and smart cities [6],
edge clouds (ECs). The system deploys and operates a UAV prop- which are computation intensive and delay sensitive and rely
erly to facilitate the MEC service provisioning to a set of IoT on our ability to quickly process the data and extract use-
devices in regions where the existing ECs cannot be accessible ful information, precluding the traditional cloud-based data
to IoT devices due to terrestrial signal blockage or shadowing. processing paradigm [7].
The UAV and ECs in the system collaboratively provide MEC
services to the IoT devices. For optimal service provisioning in Mobile edge computing (MEC), in which computing and
this system, we formulate an optimization problem aiming at min- storage resources are placed at the mobile network edges
imizing the weighted sum of the service delay of all IoT devices (e.g., cellular base stations or WiFi access points) [8]–[10],
and UAV energy consumption by jointly optimizing UAV posi- has emerged as a prospective solution to resolve the network
tion, communication and computing resource allocation, and task latency issue by pushing the frontier of data and services away
splitting decisions. However, the resulting optimization problem is
highly nonconvex and thus, difficult to solve optimally. To tackle from centralized cloud to the edge of the network, thereby
this problem, we develop an efficient algorithm based on the enabling data analytics and functional operation in the prox-
successive convex approximation to obtain suboptimal solutions. imity to the data sources. By moving resources to the network
Numerical experiments demonstrate that our proposed collabo- edge, close to where the data are being generated and acted
rative UAV-EC offloading scheme largely outperforms baseline upon, MEC can bring many benefits to users, such as lower
schemes that solely rely on UAV or ECs for MEC in IoT.
service latency, reduced network congestion, and better ser-
Index Terms—Mobile edge computing (MEC), resource man- vice quality. Meanwhile, resource management becomes a key
agement, successive convex approximation, unmanned aerial problem in MEC due to the much limited resources compared
vehicles (UAVs).
to remote clouds and the tight coupling of communication
and computing. There has been substantial research on MEC
I. I NTRODUCTION resource management with the goal of optimizing system
latency [11]–[14], energy consumption [15]–[17], and overall
S THE number of wireless connected devices contin-
A ues to grow vastly and rapidly, an enormous amounts
cost of system latency and/or energy consumption [18]–[21].
However, all of these studies assume wired or dedicated wire-
Manuscript received September 11, 2019; revised December 18, 2019; less connections with sufficient bandwidth among distributed
accepted December 28, 2019. Date of publication January 10, 2020; date edge resources deployed in a fixed fashion. Particularly, the
of current version April 14, 2020. The work of Yanmin Gong was supported existing MEC techniques are not applicable to the situation
in part by the U.S. National Science Foundation under Grant CNS-1850523.
(Corresponding author: Yuanxiong Guo.) where the number of mobile users (MUs) increases explo-
Zhe Yu is with the School of Electrical and Computer Engineering, sively or the network facilities are sparely distributed [22].
Oklahoma State University, Stillwater, OK 74078 USA (e-mail: In view of this insufficiency, wireless networks enabled by
[email protected]).
Yanmin Gong is with the Department of Electrical and Computer unmanned aerial vehicles (UAVs) have recently been proposed
Engineering, University of Texas at San Antonio, San Antonio, TX 78249 as a promising solution to improve the connectivity of ground
USA (e-mail: [email protected]). IoT devices.
Shimin Gong is with the School of Intelligent Systems Engineering,
Sun Yat-sen University, Guangzhou 510275, China (e-mail: UAVs, especially, low-cost quadcopters, are undergoing an
[email protected]). explosive growth and a major regulation relaxation nowadays
Yuanxiong Guo is with the Department of Information Systems and Cyber and have been widely used in civilian domains, such as traffic
Security, University of Texas at San Antonio, San Antonio, TX 78249 USA
(e-mail: [email protected]). monitoring [23], public safety [24], search and rescue [25], and
Digital Object Identifier 10.1109/JIOT.2020.2965898 reconnaissance over disaster rescue and recovery [26]. UAVs
2327-4662
c 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: National Chung Cheng University. Downloaded on September 11,2024 at 06:22:36 UTC from IEEE Xplore. Restrictions apply.
3148 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 4, APRIL 2020
not only provide extended coverage over wide geographical and computation energy consumption, by jointly optimizing
areas but also possess unique characteristics like fast deploy- the task splitting decisions, UAV placement, communication
ment, easy programmability, and high scalability. Various bandwidth allocation, and computation resource allocation at
payloads, such as IoT sensors (including cameras), miniatur- the UAV and ECs.
ized base stations, and embedded computing modules can be The above-formulated optimization problem is challeng-
mounted on UAVs to enable different sensing, communica- ing to solve due to the nonconvex objective function and
tion, and computing tasks [27], [28]. In particular, reliable and constraints. To tackle that challenge, we implement an effi-
cost-effective wireless communication solutions for multitudes cient algorithm by means of successive convex approximation
of real-world scenarios can be offered by UAVs if properly [37], [38]. The basic idea of the proposed algorithm is to com-
deployed and operated [28]. UAVs can act as wireless relays or pute a suboptimal solution of the original nonconvex problem
aerial base stations for improving connectivity and extending by solving a sequence of convex subproblems where the non-
coverage of ground wireless devices since the high altitude of convex objective function and constraints are replaced by
UAV enables wireless devices to effectively establish line-of- suitable convex approximants. We first convert the nonconvex
sight (LoS) communication links thus mitigating the potential objective function and constraints into suitable convex approx-
signal blockage and shadowing. imants by introducing the initial feasible solutions, while the
However, most prior works in the area of the UAV-enabled local first-order behavior of the original nonconvex problem is
wireless networks (e.g., [29]–[32]) ignore the computing preserved. Then, we iteratively compute the local optimum of
capability provided by UAVs and mainly focus on their the resulting convex problem by updating the initial feasible
communication aspect, and only a very few recent stud- solutions until a stationary solution of the original nonconvex
ies [22], [33]–[36] start to consider computing with UAVs’ problem is found. The convergence of the proposed algorithm
onboard resources. Hu et al. [22], Jeong et al. [33], and is guaranteed if the step-size rule and termination criterion are
Zhou et al. [34] only considered communication and compu- properly chosen.
tation interactions between two types of entities where ground The main contributions of this article are summarized as
MUs offload the tasks to UAV for computation. Asheralieva follows.
and Niyato [35] proposed a game-theoretic and reinforce- 1) We propose a novel UAV-enabled MEC system where a
ment learning approach in investigating the cooperation among UAV is deployed to facilitate the provisioning of MEC
UAVs and ground base stations. Hu et al. [36] studied a new services to IoT devices that cannot directly access ECs
UAV-enabled MEC system with interactions among a UAV, a on the ground due to terrestrial signal blockage and
set of ground user equipments, and an access point. To the best shadowing.
of our knowledge, UAV-enabled MEC systems involving MUs, 2) Considering the stringent quality-of-service requirement
UAVs, and edge clouds (ECs) with UAV-EC collaboration have of MEC services and the limited battery size of UAV,
not been studied. we formulate the joint IoT task offloading and UAV
In this article, we envision an innovative UAV-enabled MEC placement under the proposed system as an optimization
system where IoT devices offload computing tasks to ECs out- problem with the goal of minimizing the service delay
side their communication range with the assistance of UAV, of IoT devices and maximizing the energy efficiency of
which are endowed with computing capability, to take the ben- UAV.
efits of collaboration among UAV and ECs. Specifically, we 3) Given the nonconvexity of the formulated optimization
consider the regions where the terrestrial wireless communi- problem, we reformulate it into tractable one using
cation between IoT devices and ground cellular base stations successive convex approximation, and then develop an
or WiFi access points cannot be effectively established due to efficient algorithm to find the suboptimal approximate
signal blockage and shadowing. Therefore, a UAV is deployed solutions to the problem.
and operated to facilitate MEC service provisioning to a set 4) We conduct extensive simulations to evaluate the
of stationary IoT devices in such regions. The IoT devices performance of our proposed collaborative UAV-EC
perform some sensing tasks and need to process the gener- scheme. Numerical experiments demonstrate that our
ated data quickly. We assume that the sensing data analysis proposed collaborative UAV-EC offloading scheme
is not performed locally due to limited onboard communi- largely outperforms baseline schemes that solely rely on
cation, computing, and storage (CCS) resources but we seek UAV or ECs for MEC in IoT.
to utilize those from the UAV and existing ground ECs. The The remainder of this article is organized as follows.
UAV, equipped with miniaturized base stations and embedded Related work is reviewed in Section II. In Section III,
computing modules, is placed properly to collect the gen- we describe the system model and then formulate the
erated sensing data from IoT devices and then, can further optimal IoT task offloading processes as a nonconvex
forward the computation tasks to more resourceful ground optimization problem. In Section IV, we reformulate the origi-
ECs nearby. We formulate the IoT task offloading process as nal problem as an approximated convex optimization problem
a nonconvex optimization problem aiming at minimizing the and then solve it by means of successive convex approxima-
weighted sum of the service delay of all IoT devices con- tion. The simulation results based on real-world traces are
sisting of task offloading delay and computation delay, and presented in Section V. Finally, the conclusion is given in
UAV energy consumption consisting of transmission energy Section VI.
Authorized licensed use limited to: National Chung Cheng University. Downloaded on September 11,2024 at 06:22:36 UTC from IEEE Xplore. Restrictions apply.
YU et al.: JOINT TASK OFFLOADING AND RESOURCE ALLOCATION IN UAV-ENABLED MEC 3149
Authorized licensed use limited to: National Chung Cheng University. Downloaded on September 11,2024 at 06:22:36 UTC from IEEE Xplore. Restrictions apply.
3150 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 4, APRIL 2020
TABLE I
L IST OF N OTATIONS
A. System Model
In this article, we consider the UAV-enabled MEC system
as depicted in Fig. 1, which consists of a set of ground MUs1
i ∈ N = {1, 2, . . . , N}, a UAV, and a set of ground ECs j ∈
J = {1, 2, . . . , J}. The UAV is deployed to facilitate the MEC
service provisioning for ground MUs who cannot establish
wireless communication with nearby cellular base stations or
WiFi access points due to signal blockage and shadowing. In
this scenario, ground-to-air (G2A) uplink communication is
from MUs to the UAV while air-to-ground (A2G) downlink
communication is from the UAV to ECs, which form a 3-D
wireless communication network. For ease of reference, we
list important notations in Table I.
We assume that the UAV is equipped with certain CCS
resources but subject to the size, weight, and power (SWAP)
limitations. The ECs are composed of ground MEC servers co-
located with cellular base stations or WiFi access points that
have more CCS resources compared to the UAV and MUs.
Each MU i has periodical computation-intensive tasks to per-
form, which are modeled as a triplet Wi = Li , Ci , λi , where
Li (in bits) denotes the input data size for processing the task,
Ci (in CPU cycles/bit) denotes the number of CPU cycles
required to process 1-bit of task data, and λi (in unit of #task
per second) denotes the arrival rate of tasks.
In this article, we use the 3-D Cartesian coordinate system
to represent the locations of MUs, UAV, and ECs. The posi-
tion of the UAV is denoted by QUAV = (xUAV , yUAV , H),
where the height H is assumed to be fixed while the hor-
izontal coordinates xUAV and yUAV affect the channel gain
during data communication processes and need to be opti-
mized in our problem. Besides, we assume the positions of
MU i and EC j are fixed in our model, which are denoted as gain from MU i to the UAV can be described by the free-space
QMU
i = (xiMU , yMU
i , 0) and Qj = (xj , yj , 0), respectively.
EC EC EC path loss model
1) Communication Model: In the UAV-enabled network, UL −2 α0
i α0 di
hUL = (1)
the LoS links are much more dominant than other channel QMU − QUAV 2
i
impairments, such as shadowing or small-scale fading due to
the high altitude of the UAV. Therefore, the uplink channel where α0 represents the received power at the reference dis-
tance of 1 m for a transmission power of 1 W, diUL denotes the
1 Note that we use mobile users and IoT devices interchangeably in this uplink distance from MU i to the UAV, and · denotes the
article. Euclidean norm of a vector. Similarly, the downlink channel
Authorized licensed use limited to: National Chung Cheng University. Downloaded on September 11,2024 at 06:22:36 UTC from IEEE Xplore. Restrictions apply.
YU et al.: JOINT TASK OFFLOADING AND RESOURCE ALLOCATION IN UAV-ENABLED MEC 3151
gain from the UAV to EC j can be described as the UAV or further offloaded to the ground ECs for processing.
−2 α0 Denote {βij ∈ [0, 1], i ∈ N , j ∈ J } and {βi0 ∈ [0, 1], i ∈ N }
j α0 dj
hDL =
DL
2 (2) as the portion of received tasks from MU i to be processed at
UAV
Q − QEC
j EC j and the UAV, respectively. Then, the computation delay
at the UAV side to process the offloaded tasks from MU i can
where djDL denotes the downlink distance from the UAV to be calculated as
the EC j.
βi0 Li Ci
We assume the FDMA protocol for bandwidth sharing tiUAV = UAV (6)
among MUs during the task offloading process. According to fi
Shannon’s capacity, the achievable uplink transmission data
where fiUAV (in CPU cycles/s) is the computation resource that
rate (in bps) from MU i to the UAV can be expressed as
the UAV allocates to MU i. Note that when βi0 equals 0, it
hUL
i Pi
MU means that no computation will be executed at the UAV side
Ri = Bi log2 1 +
UL UL
(3) while when βi0 equals 1, it indicates that no further offloading
σ2
will occur from the UAV to ECs.
where BULi , Pi , and σ represent the assigned bandwidth to
MU 2 A2G Downlink Transmission Delay From the UAV to ECs:
MU i, transmit power of MU i, and the noise power at the The UAV may further offload the tasks to more powerful ECs
UAV, respectively. For simplicity, we assume the noise power on the ground to reduce the computation latency. Then, the
is the same at UAV and ECs [29]. However, it can be easily A2G transmission delay from the MU i to EC j via UAV is
extended to the case when they are different. Similarly, the described as the ratio of offloaded task input data size and the
downlink transmission data rate (in bps) from the UAV to EC associated downlink transmission data rate
j can be computed as βij Li
UAV
tijA2G = DL . (7)
hDL
j PTX Rj
Rj = Bj log2 1 +
DL DL
(4)
σ2 Computation Delay at ECs: After receiving the offloaded
UAV task data from the UAV, ECs can start the computation process.
where BDL j and PTX represent the per-device bandwidth pre-
2
Therefore, the computation delay at the EC side to process the
assigned to EC j and transmit power of the UAV, respectively.
offloaded task from the MU i to EC j via UAV is
2) Delay Analysis: In our model, we assume that MUs do
not perform local computing due to their limited computation βij Li Ci
tijEC = (8)
capacities. In contrast, tasks will be first offloaded to the UAV, fijEC
and then, the UAV will determine the portion of tasks that are
processed locally or further offloaded to ECs on the ground. where fijEC (in CPU cycles/s) is the computation resource that
Note that the decision time to split a task is very short com- EC j allocates to MU i.
pared to the entire communication and computation latency, 3) UAV Energy Consumption Analysis: To ensure service
and therefore, can be neglected. Besides, the output data size availability, it is important to manage the energy consumption
of the computation results is often very small compared to the of the UAV due to its limited battery size. In this article, we
input data size in many computation-intensive applications, focus on computation and transmission energy consumption of
such as face recognition and video analysis. Thus, the time UAV, and ignore the hovering power since it is independent
needed to send the computation results back to MUs can be of our decisions.
ignored as well. Computation Energy Consumption: Similar to [40], we
In what follows, we will describe the four key components model the power consumption of the CPU in UAV as
of the total delay for the offloading process: 1) G2A uplink κ(fiUAV )3 , where κ denotes the effective switched capacitance
transmission delay from MUs to the UAV; 2) computation depending on the CPU architecture. It follows that the corre-
delay at the UAV; 3) A2G downlink transmission delay from sponding energy consumption of UAV when processing tasks
the UAV to the ECs; and 4) computation delay at the ECs. offloaded from MU i is given by the product of the power
G2A Uplink Transmission Delay From MUs to the UAV: As level and computation time
mentioned before, all the tasks will be offloaded to the UAV 3 2
first via G2A links without any local computation. Therefore, EiCP = κ fiUAV tiUAV = κβi0 Li Ci fiUAV . (9)
the G2A transmission delay from MU i to the UAV is com-
puted as the ratio of task input data size and the associated Transmission Energy Consumption: The transmission
uplink transmission data rate energy consumption of the UAV when receiving the task input
data via the G2A uplink transmission channels from MU i is
Li
tiG2A = . (5) given by
RUL
i
Li PUAV
Computation Delay at the UAV: The UAV will decide the EiRX = PUAV G2A
RX ti = RX
(10)
portion of the received tasks that will be processed locally at RUL
i
Authorized licensed use limited to: National Chung Cheng University. Downloaded on September 11,2024 at 06:22:36 UTC from IEEE Xplore. Restrictions apply.
3152 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 4, APRIL 2020
task input data of MU i via the A2G downlink transmission that the allocated resources for uplink bandwidth, UAV and EC
channels to EC j is given by CPU frequencies are nonnegative and no more than their limits
while (14c), (14f), and (14g) constrain that the offloading tasks
βij Li PUAV
EijTX = PUAV A2G
TX tij = TX
. (11) of MUs are completely processed by UAV and ECs, and the
RDL
j values of partition variables are between 0 and 1.
Therefore, the total energy consumption of the UAV when
serving the task offloading and computation of MU i is IV. S OLUTION M ETHODOLOGY
given by Problem (14) is hard to solve due to the nonconvexity of
⎛ ⎞ the objective function and constraints. In what follows, we
EiUAV = λi ⎝EiCP + EiRX + EijTX ⎠. (12) will first linearize the maximum term in (13) by leveraging
auxiliary variables and reformulate the original optimization
j∈J
problem into a tractable one. Then, we develop an SCA-based
B. Problem Formulation algorithm to transform the nonconvex objective function and
constraints into suitable convex approximants to iteratively
In this article, we are interested in minimizing the total solve the resulting optimization problem.
energy consumption of the UAV when serving the computa-
tion and communication needs of the MUs and the total service
A. Problem Reformulation
delay of all MUs. To define the service delay of each MU, we
make the following assumptions: 1) the UAV cannot partition We first define an auxiliary variable for each MU i as zi
a task until receiving its entire input data to ensure the accu- maxj∈J {tiUAV , tijA2G +tijEC }. Then, we linearize the service delay
racy of task splitting; 2) the UAV and ECs cannot start the term in (14a) using zi and reformulate the original optimization
processing of tasks until the end of the transmission between problem into the following:
MUs and the UAV or the UAV and ECs to ensure the reliabil-
min EiUAV + ρ (tiG2A + zi ) (15a)
ity of the computation results; and 3) the computation at the zi ,QUAV ,BUL i , i∈N i∈N
UAV can proceed simultaneously with the transmission of the βi0 ,βij ,fiUAV ,fijEC
tasks to each EC since the communication and computation
s.t. zi ≥ tiUAV ∀i (15b)
modules are often separated at the UAV. Based on the above
assumptions, the service delay of MU i can be represented as zi ≥ tijA2G + tijEC ∀i, j (15c)
(14b)−(14i). (15d)
Ti = tiG2A + max tiUAV , tijA2G + tijEC . (13)
j∈J However, the reformulated optimization problem is still dif-
Our problem becomes jointly optimizing the UAV position ficult to solve due to the nonconvex objective function (15a)
QUAV , G2A uplink communication resource allocation BUL and nonconvex constraints (15b) and (15c). Note that both
i ,
task partition variables βi0 and βij , and computation resource the uplink and downlink transmission data rate functions (3)
allocation of the UAV fiUAV and ECs fijEC with the goal of and (4) are nonconvex with respect to the UAV position QUAV .
minimizing the weighted sum of total energy consumption of
UAV and total service delay of all MUs. It can be formulated B. Successive Convex Approximation
as the following optimization problem: In this section, we will show how to build the convex
approximation for the nonconvex objective function and non-
min EiUAV +ρ Ti (14a)
QUAV ,BUL i ,βi0 , i∈N
convex constraints in the reformulated problem (15) while
i∈N
βij ,fiUAV ,fijEC preserving the local first-order behavior of the original non-
convex problem and solve the resulting problem iteratively
i ≤B
BUL UL
s.t. (14b)
to obtain suboptimal solutions by means of SCA. Before
i∈N
we develop the SCA-based algorithm, we first present the
βi0 + βij = 1 ∀i (14c) background of SCA.
j∈J 1) Background of SCA: Consider the following
fiUAV ≤ F UAV (14d) optimization problem:
i∈N P: min U(x) (16a)
x
fijEC ≤ FjEC ∀j (14e)
s.t. gl (x) ≤ 0 ∀l = 1, . . . , m (16b)
i∈N
0 ≤ βij ≤ 1 ∀i, j (14f) x∈K (16c)
0 ≤ βi0 ≤ 1 ∀i (14g) where the objective function U : K → R is smooth (possibly
BULi , fi
UAV
≥0 ∀i (14h) nonconvex) and gl : K → R is smooth (possibly nonconvex),
fij ≥ 0 ∀i, j
EC
(14i) for all l = 1, . . . , m; the feasible set is denoted as X . A widely
used method for solving this specific problem is SCA (also
where ρ > 0 is a parameter defining the relative weight of known as majorization minimization) where at each iteration,
energy and delay, (14b), (14d), (14e), (14h), and (14i) ensure a convex approximation of the original problem is solved via
Authorized licensed use limited to: National Chung Cheng University. Downloaded on September 11,2024 at 06:22:36 UTC from IEEE Xplore. Restrictions apply.
YU et al.: JOINT TASK OFFLOADING AND RESOURCE ALLOCATION IN UAV-ENABLED MEC 3153
Algorithm 1 SCA Algorithm for Problem P respect to the argument x evaluated at (u; v). Note that
Find a feasible solution x ∈ X in P, choose a step size θ ∈ A1) and B1) make the problem Pxk strongly convex
(0, 1] and set k = 0. while A2) and A3) guarantee the iterate feasibility that
Repeat xk ∈ X (xk ) ⊆ X .
1) Compute x̂(xk ), the solution of Pxk ; Example 1 (Approximation of gl (x) [38, Example 3]):
2) Set xk+1 = xk + θ (x̂(xk ) − xk ); Suppose that gl has a difference of convex (DC) structure,
3) Set k ← k + 1. i.e., gl (x) = g+ − + −
j (x) − gj (x) with both gl and gl being con-
Until some convergence criterion is met. vex and continuously differentiable. By linearizing the concave
part g− l , we obtain the convex upper approximation of gl as
follows: for all x ∈ K and y ∈ X ,
replacing the nonconvex objective function and constraints by
suitable convex approximants. The convex approximation of g̃l (x; y) g+ − −
l (x) − gl (y) − ∇x gl (y) (x − y) ≥ gj (x). (18)
the original problem can be stated as follows: given xk ∈ X Example 2 (Approximation of gl (x) [38, Example 4]):
Pxk : min Ũ x; xk (17a) Suppose that gl (x) has a product of functions (PF) structure,
x i.e., gl (x) = f1 (x)f2 (x) with both f1 and f2 being convex and
s.t. g̃l (x; xk ) ≤ 0 ∀l = 1, . . . , m (17b) nonnegative. Observe that gl (x) can be rewritten as a function
x∈K (17c) with the DC structure
1 1 2
where Ũ(x; xk ) and g̃l (x; xk ) represent the approximants of gl (x) = (f1 (x) + f2 (x))2 − f1 (x) + f22 (x) . (19)
2 2
U(x) and gl (x) at current iterate xk , respectively; the feasi-
ble set is denoted as X (xk ). More specifically, we consider Then, the convex upper approximation of gl can be obtained
the SCA method presented in Algorithm 1. It is assumed that by linearizing the concave part in (19): for any y ∈ X
at each iteration, some original functions U(x) and gl (x) are 1 1 2
approximated by their upper bounds where the same first-order g̃l (x; y) (f1 (x) + f2 (x))2 − f1 (y) + f22 (y)
2 2
behavior is preserved [41]. − f1 (y)f1 (y)(x − y) − f2 (y)f2 (y)(x − y) ≥ gl (x).
2) SCA-Based Algorithm: Scutari et al. [38] proposed a
(20)
framework that unifies several existing SCA-based algorithms
to solve the problem P in a parallel and distributed fashion. It Example 3 (Approximation of U(x) [38, Example 8]):
also offers much flexibility in the choice of the convex approx- Suppose that U(x) has a PF structure, i.e., U(x) =
imation functions, and the objective function U need not be an h1 (x)h2 (x) with both h1 and h2 being convex and nonneg-
upper bound of itself at any feasible point. Multiple examples ative. For any y ∈ X , a convex approximation of U(x) is
are summarized to find the candidate approximants g̃l (x) and given by
Ũ(x) while necessary assumptions are satisfied to develop the
SCA-based algorithm. We first present the assumptions and Ũ(x; y) = h1 (x)h2 (y) + h1 (y)h2 (x)
τ
examples that we will utilize to approximate the nonconvex + (x − y) H(y)(x − y) (21)
2
terms in our problem as follows.
Assumption 1: The key assumptions on the choice of the where τ > 0 is a positive constant, and H(y) is a uniformly
approximated function g̃l : K × X → R are given as follows. positive-definite matrix.
A1) g̃l (•; y) is convex on K for all y ∈ X . Then, we transform the nonconvex constraints and noncon-
A2) Upper Bound: gl (x) ≤ g̃l (x; y) ∀x ∈ K, y ∈ X . vex objective function in the reformulated problem (15) into
A3) Function Value Consistency: g̃l (y; y) = gl (y), for all suitable approximants by following the above examples. For
y ∈ X. constraint (15b), we observe that the nonconvex term tiUAV
A4) g̃l (•; •) is continuous on K × X . can be written as the product of convex and nonnegative
A5) ∇x g̃l (•; •) is continuous on K × X . functions3
A6) Gradient Consistency: ∇x g̃l (y; y) = ∇x gl (y), for all tiUAV = Li Ci gl βi0 , fiUAV = Li Ci f1 (βi0 )f2 fiUAV (22)
y ∈ X , where ∇x g̃l (y; y) denotes the partial gradient of
the function g̃l with respect to the argument x evaluated where f1 (βi0 ) = βi0 and f2 (fiUAV ) = 1/fiUAV . Then, given
at (y; y). a feasible solution βi0 (k) and fiUAV (k) for the kth iteration
Assumption 2: The key assumptions on the choice of the of the SCA-based algorithm, we derive a convex upper
approximated function Ũ : K × X → R are given as follows. approximation of tiUAV by using Example 2 as
B1) Ũ(•; y) is uniformly strongly convex on K with con-
stant μ > 0, i.e., for all x, z ∈ K and y ∈ X : tiUAV ≤ t̃iUAV βi0 , fiUAV ; βi0 (k), fiUAV (k)
⎡ ⎛ 2 2 ⎞
(x − z) ∇x Ũ(x; y) − ∇x Ũ(z; y) ≥ μx − z2 . 1 1 1
Li Ci ⎣ ⎝ βi0 + UAV −(βi0 (k))2 − UAV ⎠
B2) Gradient Consistency: ∇x Ũ(y; y) = ∇x U(y), for all 2 fi fi (k)
y ∈ X.
B3) ∇x Ũ(•; •) is continuous on K × X , where ∇x Ũ(u; v) 3 Without loss of generality, we factorize the constants (L , C , etc.) out of
i i
denotes the partial gradient of the function Ũ with the term since they will not affect the convexity.
Authorized licensed use limited to: National Chung Cheng University. Downloaded on September 11,2024 at 06:22:36 UTC from IEEE Xplore. Restrictions apply.
3154 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 4, APRIL 2020
− (βi0 (k)(βi0 − βi0 (k))) where h1 (βi0 ) = βi0 and h2 (fiUAV ) = (fiUAV )2 in (28), and
3 ⎤ h1 (βij ) = βij and h3 (φj ) = 1/φj in (29), while h3 (BUL
1 1 1 i ) =
+ − UAV ⎦. (23) 1/BUL i and h 3 (γ i ) = 1/γ i in (30). Then, given a feasible solu-
fiUAV (k) fiUAV fi (k) tion βi0 (k), βij (k), φj (k), γi (k), BUL (k), and f UAV (k) for the kth
i i
iteration of SCA-based algorithm, we derive convex approx-
For constraint (15c), tijA2G can be written as the product imation of EiCP , EijTX , tiG2A , and EiRX by using Example 3
of Li , βij , and 1/RDLj . However, 1/Rj
DL is a nonconvex func-
as
tion with respect to the UAV location QUAV , and therefore,
Example 2 cannot be directly applied to derive a convex upper ẼiCP βi0 , fiUAV ; βi0 (k), fiUAV (k)
2 2
approximation. To tackle the nonconvexity, we replace it by
nonnegative auxiliary variables {φj }j∈J . Then, the noncon- κLi Ci βi0 fiUAV (k) + βi0 (k) fiUAV
vex term tijA2G can be written as the product of convex and τβi0 τf UAV 2
nonnegative functions + (βi0 − βi0 (k))2 + i fiUAV − fiUAV (k) (32)
2 2
βij βij (k)
tijA2G = Li gl βij , φj = Li f1 βij f2 φj (24) Ẽij βij , φj ; βij (k), φj (k) Li PTX
TX UAV
+
φj (k) φj
where f1 (βij ) = βij and f2 (φj ) = 1/φj in (24). Similarly, the τβij 2 τφj 2
nonconvex term tijEC in (15c) can be written as the product of + βij − βij (k) + φj − φj (k) (33)
2 2
convex and nonnegative functions
1 1
G2A UL
t̃i Bi , γi ; Bi (k), γi (k) Li UL
UL
+
tijEC = Li Ci gl βij , fijEC = Li Ci f1 βij f2 fijEC (25) Bi γi (k) BUL i (k)γi
τBUL 2 τγi
where f1 (βij ) = βij and f2 (fijEC ) = 1/fijEC in (25). Then, + i BUL i − Bi (k) +
UL
(γi − γi (k))2 (34)
2 2
given a feasible solution βij (k), φj (k), and fijEC (k) for the kth and
iteration of the SCA-based algorithm, we derive convex upper
ẼiRX BUL i , γi ; Bi (k), γi (k)
UL
approximation of tijA2G and tijEC by using Example 2 as
PUAV G2A UL
RX t̃i Bi , γi ; BUL
i (k), γi (k) (35)
tijA2G ≤ t̃ijA2G βij , φj ; βij (k), φj (k)
2 where τβi0 , τβij , τφj , τγi , τBUL , τf UAV > 0. Therefore, the convex
1 1 2 1 i i
surrogate objective function of (15a) can be denoted as the
Li βij + − (βij (k)) −
2
2 φj φj (k) nonnegative weighted sum of convex functions
⎛ ⎞
1 3 1 1
− (βij (k)(βij − βij (k)))+ −
φj (k) φj φj (k) λi ⎝ẼiCP + ẼiRX + ẼijTX ⎠ + ρ t̃iG2A + zi (36)
(26) i∈N j∈J i∈N
Authorized licensed use limited to: National Chung Cheng University. Downloaded on September 11,2024 at 06:22:36 UTC from IEEE Xplore. Restrictions apply.
YU et al.: JOINT TASK OFFLOADING AND RESOURCE ALLOCATION IN UAV-ENABLED MEC 3155
i i Until ψ(k) is a stationary solution of (14).
− 2 MU 2 ∀i
QUAV , BUL i , βi0 , βij , fi
UAV and f EC .
ln 2 Qi − Q
MU UAV (k)
εi + Qi − Q UAV (k) Output: ij
(40)
Authorized licensed use limited to: National Chung Cheng University. Downloaded on September 11,2024 at 06:22:36 UTC from IEEE Xplore. Restrictions apply.
3156 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 4, APRIL 2020
TABLE III
As mentioned in Section I, our system settings involving the S YSTEM C OST C OMPARISON FOR O PTIMIZED UAV LOCATION AND
interactions among IoT devices, UAV, and ECs are different R ANDOM UAV L OCATION S CHEMES
from prior works. The approaches proposed in their studies are
not directly applicable to our settings. Therefore, we consider
the following intuitive methods as baselines.
1) Random UAV Location Scheme: The task splitting and
resource allocation decisions are optimized while the
UAV location is randomly selected without optimization.
2) UAV-Only Scheme: All tasks are offloaded and processed
at the UAV without further offloading to any ECs.
3) EC-Only Scheme: All tasks are first offloaded to the
UAV without any computations and further offloaded to
ECs for processing.
4) Fixed UAV-EC Scheme: Half of the tasks is processed at
the UAV while the other half is processed at ECs.
Note that the UAV is deployed at the optimal position for
the last three baselines similar to our proposed method. To
investigate the importance of UAV location optimization, we
name our proposed method as optimized UAV location scheme
and compare it with the random UAV location scheme. To
study the benefits of utilizing computing capacity at both UAV
and ECs, we rename our proposed method as collaborative
UAV-EC scheme and compare it with the UAV-only, EC-only, Fig. 3. Optimal task splitting ratios of the UAV βi0 (i = 1, 2, . . . , 10) and
and fixed UAV-EC schemes. ECs βij (j = 1, 2, 3, 4) for MUs.
B. Experimental Results average are first processed at the UAV (i.e., βi0 ) to reduce the
In this section, we first simulate and analyze how UAV data size, and then the remaining tasks are distributed to ECs
position and per-device bandwidth in the downlink communi- for further processing.
cation will affect the system cost of the studied UAV-enabled 2) Impact of the Per-Device Bandwidth: In this part, we
MEC system. Then, we compare the performances of our first study how the per-device bandwidth will affect the optimal
proposed collaborative UAV-EC scheme with UAV-only, EC- task splitting ratios at ECs. As mentioned before, per-device
only, and fixed UAV-EC schemes to verify the effectiveness bandwidth is assigned to each MU beforehand, and it plays an
of our method in reducing the overall system cost as well important role in affecting the optimal task splitting ratios at
as the benefits of UAV-EC collaboration. We set the simula- ECs and system cost. To proceed, we increase the per-device
tion parameters FjEC (j = 1, 2, 3, 4) and Li (i = 1, 2, . . . , 10) bandwidth BDL 1 assigned to EC1 from 0.5 to 5 MHz while the
to be [8, 9, 6, 7] GHz and [3, 5, 2, 3, 5, 1, 1, 5, 4, 5] Mbits, other three BDL DL DL
2 , B3 , and B4 remain unchanged. In Fig. 4,
respectively. we observe that the optimal task splitting ratio β11 for MU1
1) Importance of Optimizing the UAV Position: In this part, at EC1 is increasing while the other three β12 , β13 , and β14
we compare the performances of our proposed optimized UAV are decreasing. The reason is that as BDL1 increases, the A2G
downlink transmission delay t11 A2G from the UAV to the EC1
location scheme with the random UAV location scheme where
the location of UAV is randomly assigned without optimization can be reduced, and then, more tasks will be offloaded to EC1
in terms of reducing the system cost. The results are summa- for further processing and therefore, the corresponding optimal
rized in Table III. It is shown that under the optimized UAV task splitting ratio grows.
location scheme, the optimal 3-D position (x∗UAV , yUAV ∗ , H) Next, we investigate how the per-device bandwidth will
found for the UAV is at (558.11, 724.52, 100) m. The system affect the system cost. To proceed, we increase the per-device
cost of the optimized UAV location scheme is 20.83, which bandwidth BDL j assigned to the jth EC (j = 1, 2, 3, 4) from
is the best compared with randomly selected UAV locations 0.5 to 5 MHz while the other three remain at 0.5 MHz. In
(at the center or near each EC), and our proposed scheme can Fig. 5, we observe that the system cost reduces as the per-
achieve high-cost saving as 13.39%. The rationale behind the device bandwidth assigned to the jth EC increases. The reason
system cost difference is that for our proposed approach, the is that as more bandwidth assigned to each MU when tasks
UAV location is optimized to obtain better channel condition are offloaded from the UAV to the jth EC, higher downlink
when providing the offloading opportunities for ground MUs transmission data rates can be achieved, and thus, the down-
while for the random UAV location scheme, the UAV loca- link transmission delay and downlink transmission energy
tion is randomly assigned beforehand without optimization. consumption of the UAV can be reduced accordingly.
Besides, the optimal task splitting ratios of MUs for UAV and 3) Benefits of UAV-EC Collaboration: In this part, we com-
ECs are shown in Fig. 3. We observe that for MUs 2, 5, 8, 9, pare the performances of our proposed collaborative UAV-EC
and 10 with large amount of input data size, 32.12% tasks in schemes with UAV-only, EC-only and fixed UAV-EC schemes
Authorized licensed use limited to: National Chung Cheng University. Downloaded on September 11,2024 at 06:22:36 UTC from IEEE Xplore. Restrictions apply.
YU et al.: JOINT TASK OFFLOADING AND RESOURCE ALLOCATION IN UAV-ENABLED MEC 3157
Fig. 4. Optimal task splitting ratios at each EC for MU1 as a function of Fig. 7. System cost as a function of the UAV transmission power PUAV
TX
per-device bandwidth BDL
1 assigned to EC1. under four different offloading schemes.
Authorized licensed use limited to: National Chung Cheng University. Downloaded on September 11,2024 at 06:22:36 UTC from IEEE Xplore. Restrictions apply.
3158 IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 4, APRIL 2020
[4] J. Wang, B. Amos, A. Das, P. Pillai, N. Sadeh, and M. Satyanarayanan, [28] M. Mozaffari, W. Saad, M. Bennis, Y.-H. Nam, and M. Debbah, “A tuto-
“A scalable and privacy-aware IoT service for live video analytics,” in rial on UAVs for wireless networks: Applications, challenges, and open
Proc. ACM MMSys, 2017, pp. 38–49. problems,” IEEE Commun. Surveys Tuts., vol. 21, no. 3, pp. 2334–2360,
[5] M. Billinghurst et al., “A survey of augmented reality,” Found. TrendsR 3rd Quart., 2019.
Human–Comput. Interact., vol. 8, nos. 2–3, pp. 73–272, 2015. [29] Y. Zeng, R. Zhang, and T. J. Lim, “Throughput maximization for
[6] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, “Internet UAV-enabled mobile relaying systems,” IEEE Trans. Commun., vol. 64,
of Things for smart cities,” IEEE Internet Things J., vol. 1, no. 1, no. 12, pp. 4983–4996, Dec. 2016.
pp. 22–32, Feb. 2014. [30] Q. Wu, Y. Zeng, and R. Zhang, “Joint trajectory and communication
[7] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and design for multi-UAV enabled wireless networks,” IEEE Trans. Wireless
M. Ayyash, “Internet of Things: A survey on enabling technologies, pro- Commun., vol. 17, no. 3, pp. 2109–2121, Mar. 2018.
tocols, and applications,” IEEE Commun. Surveys Tuts., vol. 17, no. 4, [31] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Mobile unmanned
pp. 2347–2376, 4th Quart., 2015. aerial vehicles (UAVs) for energy-efficient Internet of Things com-
[8] Y. C. Hu, M. Patel, D. Sabella, N. Sprecher, and V. Young, “Mobile munications,” IEEE Trans. Wireless Commun., vol. 16, no. 11,
edge computing—A key technology towards 5G,” vol. 11, ETSI, pp. 7574–7589, Nov. 2017.
Sophia Antipolis, France, White Paper, pp. 1–16, 2015. [32] C. Zhan and Y. Zeng, “Completion time minimization for multi-UAV-
[9] Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A sur- enabled data collection,” IEEE Trans. Wireless Commun., vol. 18, no. 10,
vey on mobile edge computing: The communication perspective,” IEEE pp. 4859–4872, Oct. 2019.
Commun. Surveys Tuts., vol. 19, no. 4, pp. 2322–2358, 4th Quart., 2017. [33] S. Jeong, O. Simeone, and J. Kang, “Mobile edge computing via a UAV-
[10] N. Abbas, Y. Zhang, A. Taherkordi, and T. Skeie, “Mobile edge com- mounted cloudlet: Optimization of bit allocation and path planning,”
puting: A survey,” IEEE Internet Things J., vol. 5, no. 1, pp. 450–465, IEEE Trans. Veh. Technol., vol. 67, no. 3, pp. 2049–2063, Mar. 2018.
Feb. 2018. [34] F. Zhou, Y. Wu, R. Q. Hu, and Y. Qian, “Computation rate maximization
[11] Y. Xiao and M. Krunz, “QoE and power efficiency tradeoff for fog com- in UAV-enabled wireless-powered mobile-edge computing systems,”
puting networks with fog node cooperation,” in Proc. IEEE INFOCOM, IEEE J. Sel. Areas Commun., vol. 36, no. 9, pp. 1927–1941, Sep. 2018.
2017, pp. 1–9. [35] A. Asheralieva and D. Niyato, “Hierarchical game-theoretic and
[12] J. Xu, L. Chen, and P. Zhou, “Joint service caching and task offload- reinforcement learning framework for computational offloading in
ing for mobile edge computing in dense networks,” in Proc. IEEE UAV-enabled mobile edge computing networks with multiple service
INFOCOM, 2018, pp. 207–215. providers,” IEEE Internet Things J., vol. 6, no. 5, pp. 8753–8769,
[13] M. Chen and Y. Hao, “Task offloading for mobile edge computing in Oct. 2019.
software defined ultra-dense network,” IEEE J. Sel. Areas Commun., [36] X. Hu, K.-K. Wong, K. Yang, and Z. Zheng, “UAV-assisted relaying and
vol. 36, no. 3, pp. 587–597, Mar. 2018. edge computing: Scheduling and trajectory optimization,” IEEE Trans.
Wireless Commun., vol. 18, no. 10, pp. 4738–4752, Mar. 2019.
[14] J. Ren, G. Yu, Y. He, and G. Y. Li, “Collaborative cloud and edge
[37] G. Scutari, F. Facchinei, L. Lampariello, S. Sardellitti, and
computing for latency minimization,” IEEE Trans. Veh. Technol., vol. 68,
P. Song, “Parallel and distributed methods for constrained nonconvex
no. 5, pp. 5031–5044, May 2019.
optimization—Part II: Applications in communications and machine
[15] S. Sardellitti, G. Scutari, and S. Barbarossa, “Joint optimization of
learning,” IEEE Trans. Signal Process., vol. 65, no. 8, pp. 1945–1960,
radio and computational resources for multicell mobile-edge comput-
Apr. 2017.
ing,” IEEE Trans. Signal Inf. Process. Netw., vol. 1, no. 2, pp. 89–103,
[38] G. Scutari, F. Facchinei, and L. Lampariello, “Parallel and distributed
Jun. 2015.
methods for constrained nonconvex optimization—Part I: Theory,” IEEE
[16] K. Zhang et al., “Energy-efficient offloading for mobile edge computing
Trans. Signal Process., vol. 65, no. 8, pp. 1929–1944, Oct. 2017.
in 5G heterogeneous networks,” IEEE Access, vol. 4, pp. 5896–5907,
[39] Q. Wu, L. Liu, and R. Zhang, “Fundamental trade-offs in communication
2016.
and trajectory design for UAV-enabled wireless network,” IEEE Wireless
[17] C. You, K. Huang, H. Chae, and B.-H. Kim, “Energy-efficient Commun., vol. 26, no. 1, pp. 36–44, Feb. 2019.
resource allocation for mobile-edge computation offloading,” IEEE [40] Y. Wang, M. Sheng, X. Wang, L. Wang, and J. Li, “Mobile-edge com-
Trans. Wireless Commun., vol. 16, no. 3, pp. 1397–1411, Mar. 2017. puting: Partial computation offloading using dynamic voltage scaling,”
[18] X. Chen, L. Jiao, W. Li, and X. Fu, “Efficient multi-user computation IEEE Trans. Commun., vol. 64, no. 10, pp. 4268–4282, Oct. 2016.
offloading for mobile-edge cloud computing,” IEEE/ACM Trans. Netw., [41] M. Razaviyayn, “Successive convex approximation: Analysis and appli-
vol. 24, no. 5, pp. 2795–2808, Oct. 2016. cations,” Ph.D. dissertation, Faculty Grad. School, Univ. Minnesota,
[19] M.-H. Chen, B. Liang, and M. Dong, “Joint offloading and resource Minneapolis, MN, USA, 2014.
allocation for computation and communication in mobile cloud with [42] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.:
computing access point,” in Proc. IEEE INFOCOM, 2017, pp. 1–9. Cambridge Univ. Press, 2004.
[20] M.-H. Chen, M. Dong, and B. Liang, “Resource sharing of a computing [43] W. Yuan and K. Nahrstedt, “Energy-efficient soft real-time CPU schedul-
access point for multi-user mobile cloud offloading with delay con- ing for mobile multimedia systems,” ACM SIGOPS Oper. Syst. Rev.,
straints,” IEEE Trans. Mobile Comput., vol. 17, no. 12, pp. 2868–2881, vol. 37, no. 5, pp. 149–163, 2003.
Dec. 2018. [44] W. Yuan and K. Nahrstedt, “Energy-efficient CPU scheduling for
[21] J. Zhang, W. Xia, F. Yan, and L. Shen, “Joint computation offloading and multimedia applications,” ACM Trans. Comput. Syst., vol. 24, no. 3,
resource allocation optimization in heterogeneous networks with mobile pp. 292–331, 2006.
edge computing,” IEEE Access, vol. 6, pp. 19324–19337, 2018.
[22] Q. Hu, Y. Cai, G. Yu, Z. Qin, M. Zhao, and G. Y. Li, “Joint offloading
and trajectory design for UAV-enabled mobile edge computing systems,”
IEEE Internet Things J., vol. 6, no. 2, pp. 1879–1892, Apr. 2019.
[23] M. J. Neely, “Intelligent packet dropping for optimal energy-delay trade-
offs in wireless downlinks,” IEEE Trans. Autom. Control, vol. 54, no. 3,
pp. 565–579, Mar. 2009.
[24] H. Yu and M. J. Neely, “A new backpressure algorithm for joint rate
control and routing with vanishing utility optimality gaps and finite
queue lengths,” IEEE/ACM Trans. Netw., vol. 26, no. 4, pp. 1605–1618,
Aug. 2018.
[25] G. Sharma, R. Mazumdar, and N. B. Shroff, “Delay and capacity trade- Zhe Yu (Student Member, IEEE) received the
offs in mobile ad hoc networks: A global perspective,” IEEE/ACM Trans. B.Eng. degree in communication engineering from
Netw., vol. 15, no. 5, pp. 981–992, Oct. 2007. the University of Science and Technology Beijing,
[26] Z. Mao, C. E. Koksal, and N. B. Shroff, “Near optimal power and rate Beijing, China, in 2014, and the M.S. degree in
control of multi-hop sensor networks with energy replenishment: Basic electrical engineering from Vanderbilt University,
limitations with finite energy and data storage,” IEEE Trans. Autom. Nashville, TN, USA, in 2016. He is currently pursu-
Control, vol. 57, no. 4, pp. 815–829, Apr. 2012. ing the Ph.D. degree in electrical and computer engi-
[27] X. Cao, P. Yang, M. Alzenad, X. Xi, D. Wu, and H. Yanikomeroglu, neering with Oklahoma State University, Stillwater,
“Airborne communication networks: A survey,” IEEE J. Sel. Areas OK, USA, where his research is on resource man-
Commun., vol. 36, no. 9, pp. 1907–1926, Sep. 2018. agement for energy-efficient cloud and edge systems.
Authorized licensed use limited to: National Chung Cheng University. Downloaded on September 11,2024 at 06:22:36 UTC from IEEE Xplore. Restrictions apply.
YU et al.: JOINT TASK OFFLOADING AND RESOURCE ALLOCATION IN UAV-ENABLED MEC 3159
Yanmin Gong (Member, IEEE) received the B.Eng. Yuanxiong Guo (Senior Member, IEEE) received
degree in electronics and information engineer- the B.Eng. degree in electronics and information
ing from the Huazhong University of Science and engineering from the Huazhong University of
Technology, Wuhan, China, in 2009, the M.S. degree Science and Technology, Wuhan, China, in 2009,
in electrical engineering from Tsinghua University, and the M.S. and Ph.D. degrees in electrical
Beijing, China, in 2012, and the Ph.D. degree and computer engineering from the University of
in electrical and computer engineering from the Florida, Gainesville, FL, USA, in 2012 and 2014,
University of Florida, Gainesville, FL, USA, in respectively.
2016. From 2014 to 2019, he was with the School
She is currently an Assistant Professor with the of Electrical and Computer Engineering, Oklahoma
Department of Electrical and Computer Engineering, State University, Stillwater, OK, USA. He has been
University of Texas at San Antonio, San Antonio, TX, USA. She was an an Assistant Professor with the Department of Information Systems and Cyber
Assistant Professor with the School of Electrical and Computer Engineering, Security, University of Texas at San Antonio, San Antonio, TX, USA, since
Oklahoma State University, Stillwater, OK, USA, from 2016 to 2018. Her August 2019. His current research interests include data analytics, security,
research interests include security and privacy in big data, machine learning, and privacy with applications to Internet of Things, cyber-physical systems,
Internet of Things, cyber-physical systems, mobile computing, and wireless and cloud/edge systems.
networks. Dr. Guo is a recipient of the Best Paper Award in the IEEE Global
Dr. Gong was a recipient of the Best Paper Award of GLOBECOM Communications Conference 2011. He is currently serving as an Editor for
2017. She is serving as an Associate Editor for IEEE W IRELESS the IEEE T RANSACTIONS ON V EHICULAR T ECHNOLOGY.
C OMMUNICATIONS.
Authorized licensed use limited to: National Chung Cheng University. Downloaded on September 11,2024 at 06:22:36 UTC from IEEE Xplore. Restrictions apply.