期刊文献+

移动云计算环境下基于任务依赖的计算迁移研究 被引量:3

COMPUTING MIGRATION BASED ON TASK DEPENDENCIES IN MOBILE CLOUD COMPUTING ENVIRONMENT
下载PDF
导出
摘要 移动终端硬件的资源受限问题可以通过将本地计算任务迁移至云端来缓解。然而,相比远程云端,某些实时要求较高的复杂应用更适合迁移至微云。这类应用中各任务之间的依赖关系也会对迁移方案产生较大影响。结合任务之间的依赖关系及微云的特点,基于遗传算法思想提出一种计算迁移方法。根据不同微云处理不同类型任务时的能力,将微云进行类型划分。根据移动应用中不同任务之间时序与数据的双重依赖关系,结合能耗和响应时间的考量,设计一个计算迁移算法,以获取具有较优效用值的迁移方案。通过仿真验证了该方法的可行性和有效性。 The resource-constrained problem of mobile terminal hardware can be solved by the migration of some computing tasks from the local to the cloud in the mobile cloud computing environment. However, compared with remote clouds, some complex applications with higher real-time requirements are more suitable for migration to micro-cloud. The dependencies between tasks in such applications have a great impact on the migration scheme. Combining the dependencies between tasks and the characteristics of micro-cloud, a computational migration method was proposed based on the idea of genetic algorithm. According to the ability of different micro-cloud to handle different types of tasks, the micro-cloud were classified. According to the dual dependence of timing and data between different tasks in mobile applications, we designed a computational migration algorithm to obtain a migration scheme with better utility values, combining with energy consumption and response time. The feasibility and effectiveness of this method are verified by simulation.
作者 郑利阳 刘茜萍 Zheng Liyang;Liu Xiping(Jiangsu Key Laboratory of Big Data Security and Intelligent Processing,School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023,Jiangsu, China)
出处 《计算机应用与软件》 北大核心 2019年第7期1-7,82,共8页 Computer Applications and Software
基金 国家自然科学基金项目(71401079,61602260)
关键词 移动云计算 计算迁移 微云 数据依赖 时序依赖 Mobile cloud computing Computing migration Micro-cloud Data dependency Timing dependency
  • 相关文献

参考文献3

二级参考文献77

  • 1李敏强.遗传算法的基本理论与应用[M].北京:科学出版社,2003.. 被引量:107
  • 2WANG X, WANG S. An improved particle filter for target tracking in sensor system[J] . Sensors, 2007, 7(1) : 144-156. 被引量:1
  • 3WANG X, MA J J, WANG S. Prediction based dynamic power optimization in wireless sensor networks[J]. Sensors, 2007, 7(3): 251-266. 被引量:1
  • 4WANG L, GUO Y, ZHAN Y. Security topology control method for wireless sensor networks with node-failure tolerance based on self-regeneration[J]. Eurasip Journal of Wireless Communications and Networking, 2010:1-11. 被引量:1
  • 5LI X, DAVID H. Distributed coordinate-free hole recovery[A]. Proc of GLOBECOM[C]. Beijing, China, 2006.189-194. 被引量:1
  • 6KUN Y H, JANG P S. Hole detection and boundary recognition in wireless sensor networks[A]. Proceedings of the Indoor and Mobile Radio Communications[C]. Mannheim, 2009. 72-82. 被引量:1
  • 7LI X, DAVID H. Distributed coordinate-free hole recovery[A]. Proc of GLOBECOM[C]. Beijing, China, 2006.189-194. 被引量:1
  • 8WANG G, CAO G, BERMAN P, et al. Bidding protocols for deploying mobile sensors[J]. IEEE Transactions on Mobile Computing, 2007, 6(5): 563-576. 被引量:1
  • 9RAFAEL F, XU L, AMIYA N, et al. The one-commodity traveling salesman problem with selective pickup and delivery: An ant colony approach[A]. 2010 IEEE Congress on Evolutionary Computation (CEC)[C].2010.1-8. 被引量:1
  • 10nANG J F, HAN G J, ZHU C, et al. Secure localization in wireless sensor networks: a survey[J]. Journal of Communications, 2011, 6(6): 460-470. 被引量:1

共引文献46

同被引文献20

引证文献3

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部