Next Article in Journal
The Development and Application of Two-Color Pressure-Sensitive Paint in Jet Impingement Experiments
Next Article in Special Issue
Multi-Domain Network Slicing in Satellite–Terrestrial Integrated Networks: A Multi-Sided Ascending-Price Auction Approach
Previous Article in Journal
Preliminary Analysis of the Performance of an Electric Supersonic Propeller
Previous Article in Special Issue
LoRa-Based Low-Cost Nanosatellite for Emerging Communication Networks in Complex Scenarios
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Task Offloading with Data-Dependent Constraints in Satellite Edge Computing Networks: A Multi-Objective Approach

1
Systems Engineering Institute, School of Automation Science and Engineering, Faculty of Electronic and Information Engineering, Xi’an Jiaotong University (XJTU), Xi’an 710049, China
2
School of Electronic and Control Engineering, Chang’an University (CHD), Xi’an 710049, China
*
Author to whom correspondence should be addressed.
Aerospace 2023, 10(9), 804; https://doi.org/10.3390/aerospace10090804
Submission received: 1 August 2023 / Revised: 4 September 2023 / Accepted: 11 September 2023 / Published: 14 September 2023

Abstract

:
By enabling a satellite network with edge computing capabilities, satellite edge computing(SEC) provides users with a full range of computing service. In this paper, we construct a multi-objective optimization model for task offloading with data-dependent constraints in an SEC network and aim to achieve optimal tradeoffs among energy consumption, cost, and makespan. However, dependency constraints between tasks may lead to unexpected computational delays and even task failures in an SEC network. To solve this, we proposed a Petri-net-based constraint amending method with polynomial complexity and generated offloading results satisfying our constraints. For the multiple optimization objectives, a strengthened dominance relation sort was established to balance the convergence and diversity of nondominated solutions. Based on these, we designed a multi-objective wolf pack search (MOWPS) algorithm. A series of adaptive mechanisms was employed for avoiding additional computational overhead, and a Lamarckian-learning-based multi-neighborhood search prevents MOWPS from becoming trapped in the local optimum. Extensive computational experiments demonstrate the outperformance of MOWPS for solving task offloading with data-dependent constraints in an SEC network.

1. Introduction

Satellite networks has recently received increasing attention and been regarded as an important component for future sixth-generation (6G) network architectures [1]. They have global coverage capability and high robustness, providing communication access for IoT devices widely distributed on the ground [2]. These characteristics mean that satellite networks remedy the defects of terrestrial networks in many scenarios [3,4,5]. Due to limited computing resources, IoT devices usually rely on cloud servers to process generated data beyond local capabilities [6]. Unfortunately, a long distance exists between cloud platforms and devices, leading to high communication latency, making it hard to deal with latency-sensitive applications. Meanwhile, with the rapid growth of IoT devices and data, transferring excessive data poses a challenge to network affordability [7], which also causes troubles in handling massive computation-intensive applications.
Mobile edge computing (MEC) makes up for the above shortcomings, providing a new computing paradigm by deploying computing resources close to the terminal device [8]. In MEC, all undesired transmissions involving long distance and excessive data between the cloud and terminals are avoided [9], which significantly alleviates network congestion and improves response time for latency-sensitive applications. The widespread IoT devices motivate the convergence of satellite networks and terrestrial networks. Furthermore, since embedding MEC servers in satellites can provide a computing service for IoT devices, even in remote and depopulated areas, SEC has received extensive attention [10,11,12,13,14].
Many computation-intensive requirements, such as scientific applications [15], large-scale image mosaicking for reconnaissance [16], and object detection in images [17], represented as applications, can be further decomposed into several tasks with data dependence. Figure 1 illustrates a task offloading scenario with data-dependent constraints in SEC. Processing these tasks can be extremely challenging because tasks are interdependent rather than isolated from each other. Subsequent tasks must wait until the results of all predecessor tasks are available. Thus, the offloading strategy plays a critical role in SEC systems. It determines the assignment of edge servers to specific tasks, improving resource utilization, enhancing coordination, and reducing energy consumption. The dynamic topology of satellite networks [18], combined with the constant changes in routing and intersatellite link (ISL) lengths, amplifies the challenge of this problem. Essentially, task offloading with data-dependent constraints in SEC is an NP-hard combinatorial optimization problem [19]. The complexity of the solution process is affected by the size of the problem, such as the number of satellites, applications, and tasks. Hence, the main challenges of this problem are creating an appropriate mathematical model and discovering an efficient algorithm.
Numerous researchers have contributed significant progress to SEC. Zhang et al. [10] pioneered the SEC concept and designed a cooperative computation offloading model. Hu et al. [11] proposed a task offloading strategy based on Lyapunov optimization. Qin et al. [12] designed a search matching-based algorithm to solve the dynamic satellite selection problem that improves the load balance of satellite resources. Yu et al. [13] proposed a deep-imitation-learning-driven offloading and caching algorithm to achieve real-time decision making. Zhang et al. [14] presented a greedy-strategy-based task allocation algorithm for LEO satellite networks. Some scholars considered satellite–terrestrial links: Tang et al. [7] proposed a LEO satellite network that combined hybrid cloud and edge computing, taking into account satellite coverage time and computation capabilities. Song et al. [20] designed a framework for terrestrial–satellite IoT and divided computational offloading into ground and space segments. Additionally, some articles have focused on the software-defined networking and network function virtualization in satellite networks, such as [21,22,23]. To address high dynamics in LEO satellite networks, Wang et al. [24] proposed a time-expanded graph-based model, while Kim et al. [25] developed a model for satellite network topology that considered routing and satellite mobility. Zhang et al. [2] defined a task queue and adopted a multi-hop model to represent the transmission process of ISLs. To achieve a more accurate analysis of SEC characteristics, we developed a mixed-integer linear programming (MILP) model based on [1,2,25] that also considers satellite orbit elements and data dependencies between tasks.
The existing approaches for solving task offloading in SEC can be categorized into two categories: centralized and distributed. Centralized algorithms include heuristics [26], meta-heuristics [15,27,28], game algorithms [29], optimization methods [30], and reinforcement learning [3,31], all of which have demonstrated their effectiveness in various application scenarios. In contrast, distributed approaches, such as dynamic group learning distributed particle swarm optimization [32] and the multi-agent actor-critic reinforcement learning algorithm [33], cannot guarantee optimal results. As metaheuristic approaches can efficiently handle large-scale problems within polynomial time [34], we propose an MOWPS algorithm to address this issue.
To avoid unexpected computation delays and unsuccessful application execution, it is essential to consider the dependency constraints of tasks in SEC [26]. Ahmed et al. [28] proposed two offloading schemes (parallel and sequential) to address task dependencies, while Ma et al. [27] introduced a queue-based method for task offloading based on their allowable execution times. Chai et al. [3] modeled tasks with dependencies as directed acyclic graphs, then proposed an attention mechanism and proximal policy optimization collaborative algorithm to obtain the best offloading strategy. Hu et al. [35] proposed a hybrid genetic binary particle swarm optimization algorithm in which the task sequence is determined by the depth-first algorithm. Liu et al. [26] and Li et al. [15] both used heuristic algorithms to generate task sequences, and Liu et al. [36] proposed a ready queue approach for dynamic applications. However, obtaining the execution status of each satellite at any time in satellite networks can be costly. As a graphical and mathematical modeling tool [37,38], a Petri net [39] can effectively describe the coupling between applications, tasks, and edge servers. However, no studies have used Petri nets to model task offloading in SEC. In this paper, we first present a Petri-net-based constraint amending method to handle dependency constraints.
Additionally, task offloading in SEC involves multiple optimization objectives. When there are three or more objectives, the existing algorithms face challenges. First and foremost, as the number of objectives increases, almost all solutions in population become nondominated [40], making Pareto rank-based methods like NSGA-II invalid [41]. Secondly, solutions in high-dimensional space are typically sparsely distributed in the objective space [42], which makes it harder to maintain diversity. Finally, some metrics such as hypervolume may incur significant computational overhead. Prior work has been performed by a few scholars. For example, Ma et al. [27] used Pareto-optimal relations to obtain an archive set and introduced a grid method to maintain diversity. Li et al. [15] proposed a multi-swarm co-evolutionary mechanism in which each population focuses on different objectives and subsequently performs collaborative optimization. Aravanis et al. [43] devised a two-stage multi-objective optimization approach aimed at striking a balance between transmission rate and power consumption. Dai et al. [44] designed an improved discrete binary particle swarm optimization via jointly considering achievable rate and load balance. Gao et al. [45] used a competition-mechanism-based multi-objective PSO algorithm for satellite systems.
In this paper, we present a comprehensive algorithm for task offloading with data-dependent constraints in SEC. Firstly, we formulated a MILP model and proposed a Petri-net-based amending method to fulfill dependency constraints. Secondly, we introduced a multi-objective wolf pack search algorithm, which balances convergence and diversity, minimizes computational overhead with adaptive mechanisms, and uses a Lamarckian-learning-based multi-neighborhood search to break local optima. Finally, we conducted extensive numerical experiments to evaluate the algorithm’s performance. The main contributions of this paper are summarized as follows:
  • A MILP model is proposed for task offloading with data-dependent constraints in an SEC network. In addition, we consider a time-varying satellite network associated with orbit elements.
  • We construct a Petri-net-based amender from a given candidate solution. This amender effectively describes the coupling between tasks with data dependencies and edge servers. Furthermore, we introduce a Petri-net-based constraint amending method with polynomial time complexity, ensuring that offloading results conform to the constraints.
  • A strengthened dominance relation sort is established to balance the convergence and diversity of nondominated solutions. It does not require a significant increase in computational cost, ensuring that the obtained non-dominated solution set is both close to the actual Pareto front and not overly concentrated.
  • An MOWPS algorithm is presented that incorporates adaptive mechanisms to reduce computational overhead and uses Lamarckian-learning-based multi-neighborhood search to avoid local optima. Our experiments demonstrate that MOWPS outperforms existing algorithms in all testing instances.
  • The remainder of this paper is organized as follows. Section 2 outlines the MILP model, while Section 3 presents the proposed MOWPS algorithm, including the Petri-net-based amending method, the strengthened dominance relation sort, the adaptive evolution mechanism, and the Lamarckian-learning-based multi-neighborhood search. Section 4 presents the numerical experiments and their results. Section 5 offers a discussion of the findings, and finally, Section 6 concludes this paper.

2. Problem Description and Modeling

In this section, we introduce a system model for task offloading in SEC. The detailed description of the SEC network, task, communication, and computation models is presented as follows. Table 1 provides explanations for the notations used in this paper.

2.1. SEC Network

The SEC network is depicted in Figure 2a; n satellites are represented as S = {si, i ∈ ℕn}, which consists of Zo adjacent orbital planes with Zs satellites in each orbital plane, and we have n = Zo × Zs. Each satellite is equipped with an edge server for executing tasks, and edge servers are represented by U = {uk, k ∈ ℕn}.
Furthermore, satellites are continuously connected to their four adjacent satellites via ISLs [46], which comprise the two intra-plane satellites and the two inter-plane satellites. As illustrated in Figure 2b, satellite s5 is connected to satellites s2 and s8 through intra-plane ISLs (represented in orange), while inter-plane ISLs (represented in green) connect satellites s4 and s6 to s5.
The length of the ISLs are continuously changing as satellites move along their orbits. To model the SEC network accurately, we derived an approximate formula detailed in the supplementary file [47], by which the ISL distance l i , j a between satellites si and sj at time a can be obtained based on the satellite orbit elements. Specially, if no ISL exists between si and sj, we set l I , j a = ∞. Then, the communicate topology of satellites at time a is represented by a n × n matrix La, where La[i, j] = l i , j a .

2.2. Communication Model

In an SEC network, data transmission between satellites si and sj at time a is accomplished through a route G i , j a = <sis1′ → s2′ → … sk′ → sj>, where intermediate satellites si′ and si+1′, i ∈ ℕk−1, are adjacent. To minimize routing delay, the shortest route G S i , j a is adopted, whose length is denoted as | G S i , j a |, determined by the sum of ISL distances. Obviously, G S i , j a can be obtained from matrix La using the Dijkstra algorithm [48]. To simplify, we assume that route in an SEC network remains fixed during the transmission of one task but may change across different tasks.
Then, the communication delay 𝜕 i , j a ( d ) can be obtained, which consists of two components, propagation delay and transmission delay:
i , j a ( d ) = | G S i , j a | c + d r
where c represents the speed of light with a value of 3 × 105 km/s, d is the amount of transmitted data from si to sj, and r is the communication capability of the ISL. Note that the communication delay is negligible when data are transmitted locally, i.e., 𝜕 i , j a ( d ) = 0 for i = j.

2.3. Task Model

A total of v Applications is submitted by IoT devices, denoted as W. Each application w ∈ W can be decomposed into several tasks with data dependencies, represented by a directed acyclic graph (DAG) G   =   ( V ,   E ) , where node set V represents tasks, and | V | is the number of tasks in application w. The set of directed arcs E denotes data dependencies between tasks. Each arc (mp, mj) in E , mp, mj V , is weighted by dp,j, denoting that task mj needs an intermediate result with amount dp,j from mp. For task mp V , let prep and succp be its predecessor and successor tasks, respectively. Task mp can be executed only if all results of tasks in prep have been received. For completeness, we let dp be the input data for entry task who has no predecessors, and each node mp V is labeled with its workload ep (Kcycles/Byte). Furthermore, we assume that tasks can be executed with any satellites in an SEC network.
Figure 3 shows the DAGs for two applications. Task m1, labeled as 1, has a workload 1 Kcycles/Byte. Moreover, since d1 = 13, it implies that 13 Gcycles (13 Mbyte × 1 Kcycles/Byte = 13 Gcycles) are needed to compute task m1. The weight of arc (m1, m2) is 7, indicating that m2 can only be executed after receiving a 7 Mbyte result from m1.

2.4. Computation Model

According to Section 2.3, task can be executed only after receiving all predecessors’ results, and each satellite can process only one task at a time. For task mp, let uΠ(p) be the assigned edge server; then the computation time T p c o m can be calculated as follows:
T p c o m = m i p r e p d i , p × e p f ( p )
where the computing capacity of edge server ukU is fixed at fk Gcycles/s. Specifically, for entry task mp, we have T p c o m = dp × ep/fΠ(p).
Then for any task mp, there are critical time parameters:
  • T p a v i : the time that the assigned edge server is available for executing mp;
  • T p r e a d y : the time that the assigned edge server has received all predecessors’ results of mp;
  • T p s t a r t : the time when the edge server starts processing mp; and
  • T p f i n i s h : the finish time of mp.
  • Since two situations exist when performing task mp: (i) having received the required results before the assigned server is available, or (ii) waiting for predecessors’ results although the edge server is already available, the above parameters are detailed as follows:
First, let mχ(p) be the preceding task of mp in the pending queue of assigned server. The edge server is available only after completing task mχ(p), and we have
T p a v i = T χ ( p ) f i n i s h
For completeness, we set T p a v i = 0 if mχ(p) is the first task of edge server.
According to DAG, let mγ(p) be a predecessor task of mp, i.e., mγ(p)prep. After completing task mγ(p), the result of mγ(p) can be transmitted. Then the time of transferring mγ(p)’s result for processing task mp is
T γ ( p ) , p t r a n s = Π ( γ ( p ) ) , Π ( p ) T γ ( p ) f i n i s h ( d γ ( p ) , p )
Given that task mp can be executed only after receiving all results of prep, then the ready time T p r e a d y can be calculated by (5).
T p r e a d y = max { T i f i n i s h + T i , p t r a n s | m i p r e p }
When mp is an entry task, let sI(p) be mp’s access satellite, and we have T p r e a d y = 𝜕 I ( p ) , Π ( p ) 0 (dp).
Afterward, Equation (6) is used to calculate the start time T p s t a r t .
T p s t a r t = max { T p a v i , T p r e a d y }
Finally, the finish time T p f i n i s h is:
T p f i n s i h = T p s t a r t + T p c o m

2.5. Optimization Objectives

There are three objectives considered in this paper.

2.5.1. Makespan

The makespan represents the maximum completion time of all tasks in W. A smaller makespan means more tasks can be processed in less time, resulting in a higher throughput.
M a k e s p a n = max { T p f i n i s h | m p W }

2.5.2. User Cost

We assumed the SEC network uses AWS pricing [49], which is billed every second. The user cost has three components: (1) cost of using edge servers, (2) cost of transmitting data, and (3) cost of network occupancy. Then, we have
C o s t = m p W T p c o m h e Π ( p ) + h d m p W m i p r e p d i , p + h o m p W m i p r e p T i , p t r a n s
where h e k is the price per unit time ($/s) for server uk; hd is the price per unit of data ($/MB) for transmission; and ho is the network occupancy fee per unit time ($/s).

2.5.3. Energy Consumption

The energy consumption of an SEC network includes three parts: communication, task processing, and standby energy consumption.
Firstly, the communication energy consumption can be expressed as:
E n e r g y 1 = m p W m i p r e p g c T i , p t r a n s
where gc is the transmission power (W/s) of the ISLs.
Let gw represent the energy consumption coefficient of the edge service’s chip architecture, and recall that the computing capacity of server uk is fk Gcycles/s. Then the task processing energy consumption is
E n e r g y 2 = m p W g w f Π ( p ) 2 m i p r e p d i , p e p
Since edge servers in standby mode still consume energy, and gs is the standby power (W/s) for an edge server, we have
E n e r g y 3 = g s ( n M a k e s p a n m p W T p c o m )
Finally, the total energy consumption can be expressed as
E n e r g y = E n e r g y 1 + E n e r g y 2 + E n e r g y 3

2.6. Mathematical Formulation

Let x and y be the decision vectors representing task assignment and task order on edge servers, respectively. The variable x p k in x is a decision variable such that x p k = 1 if task mp is assigned to server uk and x p k = 0 otherwise. Another variable y p , j k in y, equal to 1 if mp is assigned to sever uk before mj, and y p , j k = 0 otherwise.
The mathematical model for task offloading with data-dependent constraints in SEC is presented below:
m i n i m i z e   F = ( M a k e s p a n , C o s t , E n e r g y )
s . t . u k U x p k = 1 , m p W
m p W x p k 0 , u k U
m p W , x p k = 1 T p a v i = 0 , u k U
u k U ( T j a v i T p s t a r t T p c o m ) y p , j k = 0 , m p , m j W
y p , j k [ T j s t a r t T p s t a r t T p c o m ] 0 , m p , m j W , m p p r e j , u k U
z p z j + N m u k U y p , j k + ( N m 2 ) u k U y j , p k N m 1 , m p , m j W , m p m j
x p k { 0 , 1 } , y p , j k { 0 , 1 } , m p , m j W , u k U
x p k x j k = y p , j k , m p , m j W , u k U
where Equation (14) is the objective function, and Makespan, Cost, and Energy can be calculated by Equations (8), (9), and (13), respectively. Equation (15) indicates that each task is executed by a specific edge server. Equation (16) indicates that some edge servers may have no assigned tasks. Equations (17) state that all edge servers are available simultaneously at time 0, and Equations (18) dictate that an edge server will be ready for the next task immediately upon completing the current one. The task precedence constraints are specified in Equation (19). Let zp be the number of tasks that an edge server has performed before task mp. Equation (20) is the traditional subtour elimination constraints. Equations (21) and (22) specify the domains of the involved variables.

3. Algorithm Description

In this section, we propose the MOWPS algorithm, which simulates the hunting process of wolves in nature and retains the mechanisms of “winner is king” and “survival of the strong” in wolf packs.

3.1. Encoding and Initialization

We use θ = {θ1, θ2, …, θn} to denote a solution for task assignment, where θkθ contains all tasks need to be performed by edge server uk. To obtain θ, we first give the definition of individual Δ = {ℵ; ϒ}.
We define ℵ = <ℵ[1], ℵ[2], …, ℵ[v]> as a permutation of all tasks, which represents their execution sequence. We also define ϒ = <ϒ[1], ϒ[2], …, ϒ[v]> as a sequence of edge servers, indicating which edge server is assigned to each task. For example, an individual Δ can be represented in Figure 4, where ℵ[1] = 1 and ϒ[1] = 3 indicate that task m1 is assigned to edge server u3. We can also see that tasks m8 and m4 are both assigned to u2, and m8 should be executed before m4. We can similarly derive the mapping relationships for other tasks.
To obtain better guidance in the start-up phase, a heuristic-based initialization mechanism is used, which inserts four predefined individuals into the initial population. Specifically, individual Δ1 is obtained by performing Horae [26]. Then, individuals Δ2 − Δ4 are obtained by a random mutation of Δ1. Other individuals in the initial population are randomly generated. The resulting population, denoted as Ψall, consists of Np individuals, and all non-dominated solutions in Ψall comprise the set Ψnd, which is updated after each iteration.

3.2. Amending

For any individual Δ = {ℵ; ϒ} in Ψall, Algorithm BD can be used to obtain a solution θ. However, it is possible that the solution does not comply with the precedence constraints.
Algorithm BD (Basic decoding method)
Input: an individual Δ = {ℵ; ϒ};
Output: a solution θ = {θk | k ∈ ℕn};
1:     Let each θk = ∅, k ∈ ℕn;
2:     for i ∈ ℕv
3:           Insert task mℵ[i] to the end of task sequence θϒ[i].
4:     end
5:     Output solution θ
Example 1.
Consider the individual in Figure 4; the solution θ = {θ1, …, θ7} is obtained by Algorithm BD, where θ1 = {m3}, θ2 = {m8, m4}, θ3 = {m1}, θ4 = {m2}, θ5 = {m5, m7}, θ6 = ∅, and θ7 = {m6}. Then, we use the Wait-For Graph (WFG) [50]  W   =   ( T ,   A )  in Figure 5 to represent θ, where  T  contains all task nodes, the dotted arcs represent data-dependent constraints in Figure 3, and the task sequence of edge servers is indicated by colored solid arcs. According to the assigned results, task m8 should be performed before m4, task m7 is before m8, and m5 is before m7; thus, task m5 must be executed before m4, which contradicts the precedence constraint between tasks m4 and m5. It can be characterized by a loop composed of nodes {m4, m5, m7, m8}, which can be detected by the DFS algorithm [51].
To address this undesired phenomenon, we propose a Petri-net-based amending method to ensure that the precedence constraints are satisfied between any two consecutive tasks. Readers are expected to be familiar with the properties and definition of Petri nets, which can be found in the supplemental file [47,52].
For any individual Δ, we obtain solution θ using Algorithm BD; then, the Petri-net-based amender (N, M0, θ) can be established as follows:
Step 1: For each application wqW, let Petri net (αq, Mq) = (Pq, Tq, Fq, Mq), where Pq = {pq,e} ∪ {pq,h | mhwq}, Tq = {tq,h | mhwq}, Fq = {(pq,h, tq,h),(tq,i, pq,h) | mhwq, mipre(mh)} ∪ {(tq,h, pq,e) | mhwq ˄ succ(mh) = ∅}, Mq(pq,h) = 1 if pre(mh) = ∅, and Mq(p) = 0 otherwise.
Step 2: For each satellite skS, we define Petri net (βk, Mk) = (Pk, Tk, Fk, Mk), where Pk = {pj | ∀sat(uj)=sk} denotes the resource place of sk, Tk = {tq,h | mhwq, ∀mh ∈ θj, pjPk}, Fk = {(t, p), (p, t)| tTk, pPk}, Mk(p) = 1, ∀pPk.
Step 3: The amender (N, M0, θ) can be constructed by combining all (αq, Mq) and (βk, Mk):
( N , M 0 , θ ) = w q W ( α q , M q ) s k S ( β k , M k )
where operator ⊕ indicates the combination of two Petri nets via their common places and transitions.
The subnet (αq, Mq) generated by Step 1 represents the data dependencies of tasks in wq. Each transition tq,hTq corresponds to a specific task mh in wq. The sink place is represented by pq,e, while the intermediate states are represented by other places in Pq. Initially, source place pq,s (where ms is the entry task of wq) is marked by a unique token. When a token flows into the sink place pq,e, it signifies the complication of each task in wq.
Step 2 constructs the subnet (βk, Mk), which represents the task assignments of edge servers in sk. Each transition tq,hTk is associated with a resource place pjPk through a pair of directed arcs (tq,h, pj) and (pj, tq,h). This connection indicates that task mh is assigned to edge server uj. Each resource places pj in Pk always contains one token.
Example 2.
Given the individual in Figure 4 with solution θ = {θ1, …, θ7}, where θ1 = {m3}, θ2 = {m8, m4}, θ3 = {m1}, θ4 = {m2}, θ5 = {m5, m7}, θ6 =∅, and θ7 = {m6}. Figure 6a shows the Petri net (αq, Mq) for each wqW. Then we have T1 = {t1,3}, T2 = {t2,8, t1,4}, T3 = {t1,1}, T4 = {t1,2}, T5 = {t1,5, t2,7}, and T7 = {t1,6} according to θ, and the Petri net (βk, Mk) for each satellite skS is shown in Figure 6b. After composing all above (αq, Mq) and (βk, Mk), the Petri-net-based amender (N, M0, θ) is shown in Figure 6c.
In (N, M0, θ), each transition can be fired exactly once under initial marking M0 or the state M reached from M0. The eventually marking, where all tokens are collected in pq,e for all ∀wqW, is denoted as ME. From M0 to ME, each transition in (N, M0, θ) is fired once, resulting in the completion of all tasks.
For an individual Δ = {ℵ; ϒ} and its amender (N, M0, θ), transition tq,h corresponds to task mh, where mhwq. The transition sequence πΔ can be obtained by replacing each task in ℵ with the corresponding transition. For instance, the transition sequence for individual in Figure 4 is πΔ = t1,1t2,8t1,4t1,5t1,2t1,3t2,7t1,6. The sequence πΔ is feasible if ME can be reached from M0 through πΔ, which is represented as M0Δ > ME). Then, firing transitions in the sequence πΔ sequentially can accomplish all tasks in W, and the solution is feasible. Thus, a feasible individual can be obtained by finding a transition sequence πΔ that satisfies M0Δ > ME).
After the aforementioned analysis, we can propose an algorithm to amend individuals that violate precedence constraints using amender (N, M0, θ).
Algorithm AM (Amending method)
Input: a candidate individual Δ = {ℵ; ϒ};
Output: a feasible individual Δ* = {ℵ*; ϒ*};
1:      Obtain solution θ from Δ by algorithm BD;
2:      Construct Petri-net-based amender (N, M0, θ);
3:      Generate the transition sequence πΔ from Δ;
4:      for n = 1 to v
5:            whileΔ[n] is disabled under Mn−1)
6:                  Move πΔ[n] to the end of πΔ;
7:                  Move ϒ[n] to the end of ϒ;
8:            end
9:            Let Mn−1Δ[n] > Mn;
10:     end
11:     Let πΔ* = πΔ and ϒ* = ϒ;
12:     Obtain a permutation of tasks ℵ* from πΔ*;
13:     Output Δ* = {ℵ*; ϒ*};
First, we create amender (N, M0, θ) and transition sequence πΔ for candidate individual Δ = {ℵ; ϒ} and its corresponding solution θ. Next, we check whether πΔ[n] is disabled under Mn−1 in sequential order. If πΔ[n] is disabled, we move πΔ[n] and ϒ[n] to the end of πΔ and ϒ, respectively. We repeat this process until we find an enabled transition. Then, we fire the enabled transition, generate a new marking Mn (i.e., Mn−1Δ[n] > Mn), and move on to the next detection. After performing the iteration in Lines 4−10, we obtain a feasible πΔ* and a new ϒ*, and we have M0Δ* >ME. After converting πΔ* to a task permutation ℵ*, we obtain a feasible individual Δ* = {ℵ*; ϒ*} corresponding to a solution satisfying the precedence constraints. The effectiveness and computational complexity of Algorithm AM are established by the following proposition.
Proposition 1.
Algorithm AM is effective and has polynomial time complexity.
Proof of Proposition 1.
In (N, M0, θ), each transition tq,h can be fired exactly once under some state M before reaching the final marking ME. This means that there is at least one enabled transition under M. Algorithm AM can always find an enabled transition through its iteration. Finally, ME is reached, and a feasible transition sequence πΔ* is obtained (i.e., M0Δ* > ME). Thus, the solution Δ* generated from πΔ* is feasible.
The entire algorithm repeats v times. In the n-th iteration, at most (vn) transitions are checked. Thus, the complexity of Algorithm AM is O(v2), i.e., Algorithm AM is polynomial. □
Example 3.
Figure 7 depicts the amending process of individual Δ = {ℵ; ϒ} in Figure 4. The amender (N, M0, θ) and transition sequence πΔ = t1,1t2,8t1,4t1,5t1,2t1,3t2,7t1,6 are shown in Figure 7a. Starting with M0, we fire the enabled transition t1,1 and obtain a new marking M1 (i.e., M0[t1,1 > M1), as shown in Figure 7b. The fired transitions are marked in green. However, as the process continues, the second transition t2,8 becomes disabled under M1, shown in Figure 7c. Therefore, we move t2,8 and its corresponding task 2 to the end of πΔ and ϒ, respectively, resulting in a new transition sequence πΔ′ = t1,1t1,4t1,5t1,2t1,3t2,7t1,6t2,8 and ϒ′ = <3, 2, 5, 4, 1, 5, 7, 2>. We then fire the next enabled transition t1,4 in πΔ′ and obtain marking M2 (i.e., M1[t1,4 >M2), as shown in Figure 7d. After sequentially firing all remaining transitions, we reach the final marking ME, as shown in Figure 7e. Therefore, πΔ′ is a feasible transition sequence from M0 to ME. Based on πΔ′ and ϒ′, we can obtain a feasible individual Δ* = {ℵ*; ϒ*}, where ℵ* = <1, 4, 5, 2, 3, 7, 6, 8> and ϒ* = <3, 2, 5, 4, 1, 5, 7, 2>.

3.3. Strengthened Dominance Relation Sort

Considering the multiple objectives in SEC, the traditional Pareto optimality treats all nondominated solutions equally, making it challenging to evaluate each nondominated individual [53]. Additionally, striking a balance for nondominated solutions between convergence and diversity also poses a challenge [54]. To address these issues, a new measure called strengthened dominance relation [55] is introduced. We improved it by proposing a strengthened dominance relation sort (SDRS) and embedded it in our MOWPS. The fundamental principles of this approach are described below.
Assume a problem with K objective functions f(x), denoted as fc(•) for c = ℕK. We define the solution space as Φ ⊂ Rb, which contains all solution vectors x, with dimensionality b.
Convergence degree: We can obtain a metric for the convergence degree of a solution vector x ∈ Φ using (24):
C o n ( x ) = c = 1 K e ( ϕ 1 ) f c ( x )
where ϕ is a convergence degree factor. As ϕ increases, the convergent pressure is strengthened, while weakening diversity.
Niche size: Given a set of solutions Q, we can calculate the angle between any pair of solutions x and y in Q as θxy = arccos(f(x), f(y)). Then, the niche size θ ¯ is defined as the [γ|Q|]-th smallest element of
{ min y Q | { x } θ x y | x Q }
where γ is the niche size factor, γ ∈ (0, 1), and [•] is the rounding down operation. As γ increases, the dominated area expands, and the convergent pressure intensifies.
To calculate Con(x) and θ ¯ , we need to first normalize each xQ with respect to the ideal point and nadir point of Q. The ideal point is a vector containing the optimal value of each objective function, while the nadir point is a vector consisting of the worst value.
Strengthened dominance value: The strengthened dominance value D(x, y) represents how much solution x dominates y, as calculated by (26). Suppose that it is a multi-objective minimization problem.
D ( x , y ) = { max { 0 , C o n ( y ) C o n ( x ) } , θ x y θ ¯ x   Pareto   dominates   y max { 0 , C o n ( y ) θ x y θ ¯ C o n ( x ) } , θ x y > θ ¯
where D(x, y) is nonnegative (i.e., D(x, y) is necessarily zero if x is inferior to y).
Example 4.
For a normalized solution vector of x = [0.5, 0.5], the dominated regions are depicted in green in Figure 8 under different values of ϕ and γ. The results in Figure 8a,b indicate that as the value of ϕ increases, the convergent pressure becomes stronger. Conversely, Figure 8b,c show that a smaller value of γ results in better diversity. It is worth noting that the upper right corner is always dominated due to the incorporation of Pareto dominance in Equation (26).
SDRS value: Each solution x is assigned an SDRS value ϑ(x), which reflects its degree of domination over others in the entire solution set Q. Thus, we have:
ϑ ( x ) = y Q | { x } D ( x , y ) | Q | 1
A higher value of ϑ(x) indicates better solution quality, which helps to generate diverse solutions near the Pareto frontier. To ensure a successful search process, we use an adaptive mechanism with the following formulas:
  • For the parameter ϕ: ϕ = 1.8 – 1.3 × Kcur/Kmax
  • For the parameter γ: γ = 0.6 – 0.3 × Kcur/Kmax
where Kcur is the number of iterations completed and Kmax is the maximum number of iterations.
Next, we sort individuals based on their ϑ(x) value and select the top [ξ × Np] individuals in each iteration to form the elite set Ψe. The parameter ξ represents the elite proportion.

3.4. Population Evolution

In a wolf pack, elite wolves roam to hunt for prey. Let us first explain the roaming process. Each elite wolf is represented by an individual denoted as Δe = {ℵe; ϒe} ∈ Ψe. We randomly select Nc distinct individuals from Ψe, where Nc is determined as Nc = [ε × |Ψe|]. For each selected individual Δs = {ℵs; ϒs}, we generate two individuals using the following method:
Step 1: Initialize an empty individual Δs1 = {ℵs1; ϒs1}.
Step 2: For i ∈ ℕv, set ℵs1[i] = ℵs[i] if rand < Preserve, where Preserve is the given probability. Repeat this step for ϒs1.
Step 3: Place all unassigned tasks in W into empty slots in ℵs1 following the order they appear in ℵs. Then, fill each empty slot in ϒs1 with the corresponding position element in ϒs.
Step 4: Check each element in ϒs1 and replace any edge servers with random edge servers.
Step 5: Reverse the role of Δe and Δs and repeat steps 1−4 to create another individual ϒs2.
For each elite individual Δe in Ψe, we generate 2Nc individuals. From these individuals, the optimal one is chosen to replace Δe, and the whole elite set Ψe is updated accordingly.
Once the elite wolves have finished roaming, all the wolves respond to the call of a wolf that has found prey. To prevent the population from converging on a single individual and to increase the diversity of non-dominant solutions, we designed the following multiway attacking mechanism.
For each individual Δ = {ℵ; ϒ} in Ψall, we select a non-dominated solution Δd = {ℵd; ϒd} from Ψnd as the target. We then randomly generate an interval [i, j] ⊆ [1, v], and remove a consecutive block of tasks <ℵ[i], …, ℵ[j]> from ℵ and reinsert them according to their order in ℵd. The elements in <ϒ[i], …, ϒ[j]> are divided into three groups by comparing them with elements in the same position in ϒd. The elements in the smaller, bigger, and equal groups are then subjected to plus 1, minus 1, and no operations, respectively. The result is expressed as Δ′ = {ℵ′; ϒ′}. Figure 9 illustrates the above process.
To overcome the local optima drawback of greedy selection, a biased selection method is employed after obtaining the offspring individuals, denoted as Δs. Then, we have
Δ s = { Δ ,   if   ϑ ( x ) > ϑ ( x ) r a n d < P b i a s ( 1 + ϑ ( x ) - ϑ ( x ) ) Δ , o t h e r w i s e
where Pbias is the biased selection probability; x and x′ are solution vectors corresponding to individuals Δ and Δ′, respectively, which gives the opportunity to retain some slightly inferior individuals.

3.5. Avoiding Local Convergence and Population Replacement

We propose a Lamarckian-learning-based multi-neighborhood search (LMS) to prevent MOWPS from becoming stuck in local optima and introduce an adaptive restart strategy to enhance population diversity.
The LMS acts on each elite individual Δe = {ℵe; ϒe} ∈ Ψe and employs four neighborhood structures as follows:
  • Ne1: Swap. Randomly select two elements in ℵe and swap them;
  • Ne2: Insert. Randomly remove an element in ℵe and reinsert it into a different position;
  • Ne3: Inverse. Randomly select two positions in ℵe and invert the elements between them;
  • Ne4: compound. Randomly choose two neighborhoods from Ne1, Ne2, and Ne3 and execute them in turn.
The Lamarckian learning method [56] is improved to select the neighborhood for LMS. Initially, a utility value φi of 1/4 is assigned to each neighborhood Nei. Then, we use the roulette wheel method to choose neighborhood based on its utility value. After selected Nei is performed on Δe, φi is updated as follows.
φ i = φ i + max { ϑ ( x a ) ϑ ( x b ) ϑ ( x b ) , 0 }
where the solution vectors before and after a neighborhood operation are xb and xa, respectively. If a neighborhood produces a better result, it is more likely to be chosen. All individuals obtained through LMS are called Ψlms.
To address the issue of population homogeneity, an adaptive restart strategy is implemented. In each iteration, Nre individuals are restarted, and we have
N r e = f l o o r ( 1 + | Ψ e | × K c u r / K m a x )
Recall Kcur (current number of iterations) and Kmax (maximum number of iterations). All restarted individuals are referred to as Ψre.
During each MOWPS iteration, the worst |Ψlms ∪ Ψre| individuals in population Ψall are replaced by generated Ψlms ∪ Ψre.

3.6. Overall MOWPS Algorithm

By incorporating the aforementioned designs, the complete process of the proposed MOWPS can be summarized as follows:
Algorithm MOWPS
Input: Parameters Np, ξ, ε, Preserve, Pbias;
Output: the nondominated solutions set Ψnd;
1:      Generate initial population Ψall contains Np individuals, set Kcur = 0;
2:      While Kcur < Kmax
3:            Evaluate individuals in Ψall using SDRS;
4:            Obtain the elite set Ψe;
5:            For each individual Δe ∈ Ψe
6:                  Perform roaming process on Δe;
7:                  Update Δe;
8:            end
9:            Perform multiway attacking on each individual in Ψall;
10:           Perform LMS on each individual Δe ∈ Ψe and generate Ψlms;
11:           Perform adaptive restart strategy and generate Ψre;
12:           Replace the worst individuals in Ψall with Ψlms ∪ Ψre;
13:           Obtain the nondominated solutions in Ψall, and subsequently update Ψnd;
14:           Kcur = Kcur + 1;
15:     end
16:     Output the nondominated solutions set Ψnd;
Complexity Analysis
: Recall that Np, ξ, and ε represent the number of individuals in Ψall, the elite proportion, and the selection proportion during the roaming process, respectively. The loop of MOWPS repeats Kmax times. In each loop, the SDRS with complexity O(|Ψall|2) is first adopted to evaluate individuals in Ψall. Then the roaming process generates 2εe| individuals for each elite individual in Ψe, and the total complexity is O(2εe|2). After that, multiway attacking with complexity O(|Ψall|) is performed. Finally, LMS is applied to individuals in Ψe, with a complexity of O(|Ψe|). Thus, the complexity of MOWPS is O(Kmax × (|Ψall|2 + 2εe|2 + |Ψall| + |Ψe|)) = O(Kmax × (Np2 + 2εξ2Np2 + Np + ξNp)).

4. Results

A series of experiments were conducted in this section to evaluate the performance of the proposed MOWPS algorithm.

4.1. Experimental Setup

We created a SEC network simulation environment to carry out experiments. Six Walker Delta constellations were developed, each with different elements in Table 2, including Orbcomm [57], Globalstar [58], and Starlink [59]. The simulation started on [1 June 2022 00:00:00.000 UTCG], and the required orbit elements were obtained using the software STK [60]. We conducted extensive experiments using three groups of testing instances: small, medium, and large. Table 3 shows the constellations (κ) and the number of applications (v) for each instance type. In total, there are 3 × 2 × 3 = 18 combinations and we generated 10 testing instances for each combination.
In each texting instance, the edge server’s properties such as computing capacity fk, processing energy consumption coefficient gw, standby power gs, and unit rental cost h e k for edge server ukU are generated randomly from the ranges [5, 10], [1 × 10−28, 2 × 10−28], [0.1, 0.2], and [1, 2], respectively. The assumed values for transmission power gc, unit data transmission cost hd, and unit network rental cost ho are 30, 0.02, and 0.1, respectively. The evaluation of the algorithm was performed using five real-world applications [61], and their task structures are shown in Figure 10. A testing instance is composed of a random selection of these applications. For any task mp, the amount of data di,p and workload ep are randomly generated from [5, 10] and [1, 2], respectively. Table 4 provides a summary of the main parameter settings used in the simulation.
We conducted a comparative analysis between our proposed algorithm and three existing algorithms, namely IMOPSOQ [27], MCHO [15], and NSGA-II [41] (using Algorithm AM to meet the precedence constraints). The performance evaluation of these algorithms was based on three indicators:
  • Number of non-dominated solutions (NS) indicates the average quantity of nondominated solutions in each experiment.
  • Hypervolume (HV) [62] represents the hypercube’s size enclosed by individuals and a reference point in the target space. The reference point r is normalized to a unit vector, and the enclosed volume of solution x is calculated as follows:
V ( x ) = { y O | x y y r }
where O is the objective space; then, the hypervolume of Ψnd can be obtained by (32).
H V ( Ψ n d ) = x Ψ n d V ( x )
3.
Dominance rate (DR) in this paper is defined as the ratio of non-dominated solutions obtained by an algorithm that dominate other algorithms’ solutions. Therefore, we can express it as:
D R ( Ψ n d ) = x Ψ n d D ( x ) | Ψ n d |
where D(x) is the ratio at which solution x dominates the solutions of other algorithms Ψ n d o t h e r , obtained by:
D ( x ) = { x y | y Ψ n d o t h e r / Ψ n d } | Ψ n d o t h e r / Ψ n d |
To eliminate the impact of randomness, each algorithm was independently executed 10 times for each testing instance, and the average of three metrics (aNS, aHV, and aDR) was used to evaluate each algorithm. The maximum number of iterations was set to Kmax = 100 × v. All simulations were conducted using MATLAB 2021a and run on a computer with an Intel Core i9-9900K CPU @3.60 GHz and 64 GB of RAM.

4.2. Constraint Amending Verification

To confirm the efficacy of Algorithm AM in addressing precedence constraints, we used eight combinations, A × 1, B × 2, C × 4, D × 4, D × 8, E × 15, E × 30, and F × 30. We randomly generated 2000 solutions for each combination and recorded the success rate and running time after applying Algorithm AM.
Table 5 summarizes the statistical results. In general, increasing the number of satellites for a certain number of applications results in fewer solutions violating the precedence constraint due to the availability of more edge servers to perform tasks. However, most of the randomly generated solutions in all combinations do not satisfy the task dependencies, highlighting the importance of constraint amending. Algorithm AM achieved a 100% success rate in obtaining feasible solutions, and the running time increased slightly with problem size. Even for the largest problem size of F × 30 (approximately 1600 satellites and 900 tasks), Algorithm AM was able to obtain a feasible solution within 0.12 s. These results demonstrate the effectiveness and polynomial complexity of the Petri-net-based amending method.

4.3. Parameter Calibration

In this section, we calibrated all five parameters (Np, ξ, ε, Preserve, Pbias) of the MOWPS using the Design of the Experiment (DOE) [63]. We started by setting candidate factor levels for the parameters, as shown in Table 6.
We utilized the L16(45) orthogonal array in our DOE based on the number and factor levels of each parameter. We conducted the experiment thrice, as we had three instance types (small, medium, and large) with combinations A × 3, C × 5, and E × 10. Table 7 shows the L16(45) with 16 combinations of parameter factor levels. Each combination underwent ten independent runs of the MOWPS, and the aHV among these runs was considered as the response variable.
In Table 8, the statistical analysis for the response variables is presented. The optimal parameter values for each instance type are highlighted in bold black. For medium and large-type instances, the influence priority of parameters is the same. The most significant parameter is ξ, followed by ε, Np, Preserve, and Pbias. For small-type instances, ξ also has the highest rank, followed by ε, Np, Pbias, and Preserve. Based on these findings, we determined the parameter values of MOWPS as follows: {Np, ξ, ε, Preserve, Pbias} = {50, 0.4, 0.4, 0.4, 0.2}, {50, 0.4, 0.3, 0.4, 0.3}, and {50, 0.4, 0.3, 0.4, 0.2} for small, medium, and large-type instances, respectively.

4.4. Comparison with Existing Algorithms

After conducting the calibration, we compared MOWPS with three existing algorithms, using the instances from Section 4.1 for the comparison. In Figure 11, the trade-offs produced by various algorithms for different instance sizes are depicted in 2D and 3D plots, with each point on the plot representing a potential task assignment. The results indicate that MOWPS generates superior trade-off fronts compared to other algorithms, with a more evenly distributed set of solutions. This is attributed to the proposed Petri-net-based constraint amending method, which does not constrain the solution space, and the SDRS, which effectively evaluates solutions. Therefore, the task assignments produced by MOWPS offer a better trade-off between energy, cost, and makespan.
Table 9 displays the statistics of the comparison results for all algorithms. The performance of each algorithm varies significantly, with the optimal value for each instance highlighted in bold black. MOWPS outperforms all other algorithms in terms of aNS, aHV, and aDR in almost all cases, except for a few instances where NSGA-II has the highest aNS.
Figure 12 illustrates the performance of each algorithm on different instances. In Figure 12a, MOWPS and NSGA-II produce a significantly higher number of non-dominated solutions than MCHO and IMPOSQ for all instances, as MCHO and IMPOSQ’s constraint processing method restricts the solution space to produce a specific task sequence. In contrast, our Petri-net-based method efficiently amends any randomly generated task sequence to satisfy the constraints, as demonstrated in Section 4.2. Figure 12b indicates that MOWPS outperforms other algorithms in terms of aHV, considering the balance between convergence and diversity of the non-dominated solutions, while others only consider diversity as a submetric (e.g., IMPOSQ and NSGA-II), which enables MOWPS to obtain more diverse and high-quality solutions. Figure 12c demonstrates that MOWPS consistently generates solutions with high aDR values, validating the effectiveness of the algorithmic search mechanism. These numerical experiments confirm the exceptional performance of MOWPS for offloading tasks with dependencies in SEC.

5. Discussion

Based on the simulation and analysis results, we can provide a concise analysis and discussion, as follows:
(1)
As the number of tasks assigned to edge servers increases, the likelihood of violating precedence constraints also increases, resulting in unpredictable wait times due to the existence of tasks with dependencies. However, our proposed Petri-net-based constraint amending method can efficiently obtain feasible solutions even for large-scale scenarios with 1600 satellites and approximately 900 tasks within a short time frame of 0.12 s. This highlights the effectiveness and efficiency of our proposed method.
(2)
Compared to IMPSOQ and MCHO, our algorithm is more effective in generating solutions closer to the Pareto front for all 18 instances, as indicated by the dominance rate indicator. This is because our proposed constraint amending method does not restrict the solution space and can efficiently repair precedence constraints in any randomly generated solution. In contrast, IMPSOQ and MCHO use a queue-based method and the UpwardRank method, respectively, to calculate feasible task sequences under the current task parameters, which not only increases computational cost but also affects the quality of the assignment solutions.
(3)
Our proposed algorithm is superior to others in achieving a balance between the convergence and diversity of non-dominated solutions. This is demonstrated by the hypervolume indicator, which evaluates the strength of non-dominated solutions. We achieved this balance by implementing our SDRS method, which evaluates both the convergence and diversity of non-dominated solutions, resulting in better solutions overall. In contrast, other algorithms such as NSGA-II and IMPSOQ rely on crowding distance measures and grid-based methods, respectively, to filter solutions after obtaining a non-dominated solution set. This approach can eliminate some dominated solutions that may have good diversity. Additionally, MCHO optimizes multiple populations for different objectives, but the population used for diversity evaluation only employs normalized linear aggregation, which can compromise the effectiveness of balancing diversity.

6. Conclusions

This paper models the task offloading with data-dependent constraints in an SEC networks as a multi-objective optimization problem. We address the challenges of dependency constraints by proposing a Petri-net-based constraint amending method. Our theoretical and experimental analyses illustrate its effectiveness and polynomial complexity. For the multiple optimization objectives, a strengthened dominance relation sort is established to balances the convergence and diversity of nondominated solutions. Based on these, we propose the MOWPS algorithm. MOWPS incorporates adaptive mechanisms to reduce computational overhead and uses Lamarckian-learning-based multi-neighborhood search to avoid local optima. Extensive experiments demonstrate that MOWPS outperforms existing algorithms in terms of energy, cost, and makespan tradeoffs when solving task offloading with data-dependent constraints in an SEC networks. In the future, we plan to expand our algorithms to address problems such as satellite failures and uncertain computation times.

Author Contributions

R.Z. and Y.F. conceived the conceptualization and algorithm. R.Z. completed the implementation of the algorithm and the writing of the paper and supported the writing review and editing. Y.F. completed some preliminary simulations and performed the preliminary research and summary. Y.Y. and X.L. provided theoretical guidance and suggestions for revision of the paper. Y.Y. provided funding support and necessary assistance for thesis writing. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Science and Technology Innovation 2030-Key Project of “New Generation Artificial Intelligence” under Grant 2020AAA0108203 and the National Natural Science Foundation of P.R. China under Grants 62003258 and 62103062.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Boero, L.; Bruschi, R.; Davoli, F.; Marchese, M.; Patrone, F. Satellite networking integration in the 5G ecosystem: Research trends and open challenges. IEEE Netw. 2018, 32, 9–15. [Google Scholar] [CrossRef]
  2. Zhang, H.; Liu, R.; Kaushik, A.; Gao, X. Satellite Edge Computing with Collaborative Computation Offloading: An Intelligent Deep Deterministic Policy Gradient Approach. IEEE Internet Things J. 2023, 10, 9092–9107. [Google Scholar] [CrossRef]
  3. Chai, F.; Zhang, Q.; Yao, H.; Xin, X.; Gao, R.; Guizani, M. Joint Multi-task Offloading and Resource Allocation for Mobile Edge Computing Systems in Satellite IoT. IEEE Trans. Veh. Technol. 2023, 72, 7783–7795. [Google Scholar] [CrossRef]
  4. Xie, R.; Tang, Q.; Wang, Q.; Liu, X.; Yu, F.R.; Huang, T. Satellite-terrestrial integrated edge computing networks: Architecture, challenges, and open issues. IEEE Netw. 2020, 34, 224–231. [Google Scholar] [CrossRef]
  5. Liu, J.; Du, X.; Cui, J.; Pan, M.; Wei, D. Task-oriented intelligent networking architecture for the space–air–ground–aqua integrated network. IEEE Internet Things J. 2020, 7, 5345–5358. [Google Scholar] [CrossRef]
  6. Qiu, C.; Yao, H.; Jiang, C.; Guo, S.; Xu, F. Cloud computing assisted blockchain-enabled Internet of Things. IEEE Trans. Cloud Comput. 2019, 10, 247–257. [Google Scholar] [CrossRef]
  7. Tang, Q.; Fei, Z.; Li, B.; Han, Z. Computation offloading in LEO satellite networks with hybrid cloud and edge computing. IEEE Internet Things J. 2021, 8, 9164–9176. [Google Scholar] [CrossRef]
  8. Islam, A.; Debnath, A.; Ghose, M.; Chakraborty, S. A survey on task offloading in multi-access edge computing. J. Syst. Archit. 2021, 118, 102225. [Google Scholar] [CrossRef]
  9. Mao, B.; Tang, F.; Kawamoto, Y.; Kato, N. Optimizing computation offloading in satellite-UAV-served 6G IoT: A deep learning approach. IEEE Netw. 2021, 35, 102–108. [Google Scholar] [CrossRef]
  10. Zhang, Z.; Zhang, W.; Tseng, F.H. Satellite mobile edge computing: Improving QoS of high-speed satellite-terrestrial networks using edge computing techniques. IEEE Netw. 2019, 33, 70–76. [Google Scholar] [CrossRef]
  11. Hu, Y.; Gong, W.; Zhou, F. A Lyapunov-Optimized Dynamic Task Offloading Strategy for Satellite Edge Computing. Appl. Sci. 2023, 13, 4281. [Google Scholar] [CrossRef]
  12. Qin, J.; Guo, X.; Ma, X.; Li, X.; Yang, J. Application and Performance Evaluation of Resource Pool Architecture in Satellite Edge Computing. Aerospace 2022, 9, 451. [Google Scholar] [CrossRef]
  13. Yu, S.; Gong, X.; Shi, Q.; Wang, X.; Chen, X. EC-SAGINs: Edge-computing-enhanced space–air–ground-integrated networks for internet of vehicles. IEEE Internet Things J. 2021, 9, 5742–5754. [Google Scholar] [CrossRef]
  14. Zhang, Y.; Chen, C.; Liu, L.; Lan, D.; Jiang, H.; Wan, S. Aerial edge computing on orbit: A task offloading and allocation scheme. IEEE Trans. Netw. Sci. Eng. 2022, 10, 275–285. [Google Scholar] [CrossRef]
  15. Li, H.; Wang, D.; Zhou, M.; Fan, Y.; Xia, Y. Multi-Swarm Co-Evolution Based Hybrid Intelligent Optimization for Bi-Objective Multi-Workflow Scheduling in the Cloud. IEEE Trans. Parallel Distrib. Syst. 2021, 33, 2183–2197. [Google Scholar] [CrossRef]
  16. Ma, Y.; Wang, L.; Zomaya, A.Y.; Chen, D.; Ranjan, R. Task-tree based large-scale mosaicking for massive remote sensed imageries with dynamic dag scheduling. IEEE Trans. Parallel Distrib. Syst. 2013, 25, 2126–2137. [Google Scholar] [CrossRef]
  17. Zhou, H.; Ma, A.; Niu, Y.; Ma, Z. Small-Object Detection for UAV-Based Images Using a Distance Metric Method. Drones 2022, 6, 308. [Google Scholar] [CrossRef]
  18. Li, J.; Lu, H.; Xue, K.; Zhang, Y. Temporal netgrid model-based dynamic routing in large-scale small satellite networks. IEEE Trans. Veh. Technol. 2019, 68, 6009–6021. [Google Scholar] [CrossRef]
  19. Verma, A.; Kaushal, S. A hybrid multi-objective particle swarm optimization for scientific workflow scheduling. Parallel Comput. 2017, 62, 1–19. [Google Scholar] [CrossRef]
  20. Song, Z.; Hao, Y.; Liu, Y.; Sun, X. Energy-efficient multiaccess edge computing for terrestrial-satellite Internet of Things. IEEE Internet Things J. 2021, 8, 14202–14218. [Google Scholar] [CrossRef]
  21. Kaur, K.; Mangat, V.; Kumar, K. A review on Virtualized Infrastructure Managers with management and orchestration features in NFV architecture. Comput. Netw. 2022, 217, 109281. [Google Scholar] [CrossRef]
  22. Tirmizi, S.B.R.; Chen, Y.; Lakshminarayana, S.; Feng, W.; Khuwaja, A.A. Hybrid satellite–terrestrial networks toward 6G: Key technologies and open issues. Sensors 2022, 22, 8544. [Google Scholar] [CrossRef] [PubMed]
  23. Jiang, W. Software defined satellite networks: A survey. Digit. Commun. Netw. 2023, in press. [Google Scholar] [CrossRef]
  24. Wang, C.; Ren, Z.; Cheng, W.; Zheng, S.; Zhang, H. Time-expanded graph-based dispersed computing policy for LEO space satellite computing. In Proceedings of the 2021 IEEE Wireless Communications and Networking Conference (WCNC), Nanjing, China, 29 March–1 April 2021; pp. 1–6. [Google Scholar]
  25. Kim, T.; Kwak, J.; Choi, J.P. Satellite edge computing architecture and network slice scheduling for IoT support. IEEE Internet Things J. 2021, 9, 14938–14951. [Google Scholar] [CrossRef]
  26. Liu, B.; Xu, X.; Qi, L.; Ni, Q.; Dou, W. Task scheduling with precedence and placement constraints for resource utilization improvement in multi-user MEC environment. J. Syst. Archit. 2021, 114, 101970. [Google Scholar] [CrossRef]
  27. Ma, S.; Song, S.; Yang, L.; Zhao, J.; Yang, F.; Zhai, L. Dependent tasks offloading based on particle swarm optimization algorithm in multi-access edge computing. Appl. Soft Comput. 2021, 112, 107790. [Google Scholar] [CrossRef]
  28. Al-Habob, A.A.; Dobre, O.A.; Armada, A.G.; Muhaidat, S. Task scheduling for mobile edge computing using genetic algorithm and conflict graphs. IEEE Trans. Veh. Technol. 2020, 69, 8805–8819. [Google Scholar] [CrossRef]
  29. Luan, Q.; Cui, H.; Zhang, L.; Lv, Z. A Hierarchical Hybrid Subtask Scheduling Algorithm in UAV-Assisted MEC Emergency Network. IEEE Internet Things J. 2021, 9, 12737–12753. [Google Scholar] [CrossRef]
  30. An, X.; Fan, R.; Hu, H.; Zhang, N.; Atapattu, S.; Tsiftsis, T.A. Joint task offloading and resource allocation for IoT edge computing with sequential task dependency. IEEE Internet Things J. 2022, 9, 16546–16561. [Google Scholar] [CrossRef]
  31. Song, F.; Xing, H.; Wang, X.; Luo, S.; Dai, P.; Li, K. Offloading dependent tasks in multi-access edge computing: A multi-objective reinforcement learning approach. Future Gener. Comput. Syst. 2022, 128, 333–348. [Google Scholar] [CrossRef]
  32. Wang, Z.J.; Zhan, Z.H.; Yu, W.J.; Lin, Y.; Zhang, J.; Gu, T.L.; Zhang, J. Dynamic group learning distributed particle swarm optimization for large-scale optimization and its application in cloud workflow scheduling. IEEE Trans. Cybern. 2019, 50, 2715–2729. [Google Scholar] [CrossRef] [PubMed]
  33. Qin, Z.; Yao, H.; Mai, T.; Wu, D.; Zhang, N.; Guo, S. Multi-Agent Reinforcement Learning Aided Computation Offloading in Aerial Computing for the Internet-of-Things. IEEE Trans. Serv. Comput. 2022, 16, 1976–1986. [Google Scholar] [CrossRef]
  34. Abd Elaziz, M.; Xiong, S.; Jayasena, K.P.N.; Li, L. Task scheduling in cloud computing based on hybrid moth search algorithm and differential evolution. Knowl.-Based Syst. 2019, 169, 39–52. [Google Scholar] [CrossRef]
  35. Hu, Y.; Gong, W. An On-Orbit Task-Offloading Strategy Based on Satellite Edge Computing. Sensors 2023, 23, 4271. [Google Scholar] [CrossRef]
  36. Liu, J.; Ren, J.; Zhang, Y.; Peng, X.; Zhang, Y.; Yang, Y. Efficient dependent task offloading for multiple applications in MEC-cloud system. IEEE Trans. Mob. Comput. 2021, 20, 105–118. [Google Scholar] [CrossRef]
  37. Zhang, R.; Feng, Y.; Yang, Y.; Li, X. A Deadlock-free Hybrid Estimation of Distribution Algorithm for Cooperative Multi-UAV Task Assignment with Temporally Coupled Constraints. EEE Trans. Aerosp. Electron. Syst. 2023, 59, 3329–3344. [Google Scholar] [CrossRef]
  38. Feng, Y.; Xing, K.; Liu, H.; Wu, Y. Two-stage design method of robust deadlock control for automated manufacturing systems with a type of unreliable resources. Inf. Sci. 2019, 484, 286–301. [Google Scholar] [CrossRef]
  39. Murata, T. Petri nets: Properties, analysis and applications. Proc. IEEE 1989, 77, 541–580. [Google Scholar] [CrossRef]
  40. Ishibuchi, H.; Tsukamoto, N.; Nojima, Y. Evolutionary many-objective optimization: A short review. In Proceedings of the 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence), Hong Kong, China, 1–6 June 2008; pp. 2419–2426. [Google Scholar]
  41. Deb, K.; Pratap, A.; Agarwal, S.; Meyarivan, T.A.M.T. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 2002, 6, 182–197. [Google Scholar] [CrossRef]
  42. Cheng, R.; Jin, Y.; Olhofer, M.; Sendhoff, B. A reference vector guided evolutionary algorithm for many-objective optimization. IEEE Trans. Evol. Comput. 2016, 20, 773–791. [Google Scholar] [CrossRef]
  43. Aravanis, A.I.; MR, B.S.; Arapoglou, P.D.; Danoy, G.; Cottis, P.G.; Ottersten, B. Power allocation in multibeam satellite systems: A two-stage multi-objective optimization. IEEE Trans. Wirel. Commun. 2015, 14, 3171–3182. [Google Scholar] [CrossRef]
  44. Dai, C.Q.; Xu, J.; Wu, J.; Chen, Q. Multi-objective intelligent handover in satellite-terrestrial integrated networks. In Proceedings of the 2022 IEEE International Conference on Communications Workshops (ICC Workshops), Seoul, Republic of Korea, 16–20 May 2022; pp. 367–372. [Google Scholar]
  45. Gao, W.; Qu, L.; Wang, L. Multi-Objective Optimization of Joint Resource Allocation Problem in Multi-Beam Satellite. In Proceedings of the 2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), Chongqing, China, 17–19 June 2022; Volume 10, pp. 2331–2338. [Google Scholar]
  46. Qi, X.; Zhang, B.; Qiu, Z.; Zheng, L. Using Inter-Mesh Links to Reduce End-to-End Delay in Walker Delta Constellations. IEEE Commun. Lett. 2021, 25, 3070–3074. [Google Scholar] [CrossRef]
  47. Available online: https://github.com/ZhangRuiPeng94/Aerospace-2023-Task_Offloading (accessed on 1 August 2023.).
  48. Jia, M.; Zhu, S.; Wang, L.; Guo, Q.; Wang, H.; Liu, Z. Routing algorithm with virtual topology toward to huge numbers of LEO mobile satellite network based on SDN. Mob. Netw. Appl. 2018, 23, 285–300. [Google Scholar] [CrossRef]
  49. Mathew, A.; Andrikopoulos, V.; Blaauw, F.J. Exploring the cost and performance benefits of AWS step functions using a data processing pipeline. In Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing, Leicester, UK, 6–9 December 2021; pp. 1–10. [Google Scholar]
  50. Chen, S.; Deng, Y.; Attie, P.; Sun, W. Optimal deadlock detection in distributed systems based on locally constructed wait-for graphs. In Proceedings of the 16th International Conference on Distributed Computing Systems, Hong Kong, China, 27–30 May 1996; pp. 613–619. [Google Scholar]
  51. Cormen, T.H.; Leiserson, C.E.; Rivest, R.L.; Stein, C. Introduction to Algorithms; MIT Press: Cambridge, MA, USA, 2022. [Google Scholar]
  52. Coffman, E.G.; Elphick, M.; Shoshani, A. System deadlocks. ACM Comput. Surv. 1971, 3, 67–78. [Google Scholar] [CrossRef]
  53. Zhou, X.; Zhang, G.; Sun, J.; Zhou, J.; Wei, T.; Hu, S. Minimizing cost and makespan for workflow scheduling in cloud using fuzzy dominance sort based HEFT. Future Gener. Comput. Syst. 2019, 93, 278–289. [Google Scholar] [CrossRef]
  54. Bao, C.; Xu, L.; Goodman, E.D. A new dominance-relation metric balancing convergence and diversity in multi-and many-objective optimization. Expert Syst. Appl. 2019, 134, 14–27. [Google Scholar] [CrossRef]
  55. Shen, J.; Wang, P.; Wang, X. A controlled strengthened dominance relation for evolutionary many-objective optimization. IEEE Trans. Cybern. 2020, 52, 3645–3657. [Google Scholar] [CrossRef]
  56. Ong, Y.S.; Keane, A.J. Meta-Lamarckian learning in memetic algorithms. IEEE Trans. Evol. Comput. 2004, 8, 99–110. [Google Scholar] [CrossRef]
  57. Orabi, M.; Khalife, J.; Kassas, Z.M. Opportunistic navigation with Doppler measurements from Iridium Next and Orbcomm LEO satellites. In Proceedings of the 2021 IEEE Aerospace Conference, Big Sky, MT, USA, 6–13 March 2021; pp. 1–9. [Google Scholar]
  58. Dietrich, F.J.; Metzen, P.; Monte, P. The Globalstar cellular satellite system. IEEE Trans. Antennas Propag. 1998, 6, 935–942. [Google Scholar] [CrossRef]
  59. McDowell, J.C. The low earth orbit satellite population and impacts of the SpaceX Starlink constellation. Astrophys. J. Lett. 2020, 892, L36. [Google Scholar] [CrossRef]
  60. McCamish, S.; Romano, M. Simulation of relative multiple spacecraft dynamics and control with MATLAB-SIMULINK and Satellite Tool Kit. In Proceedings of the AIAA Modeling and Simulation Technologies Conference and Exhibit, Hilton Head, SC, USA, 20–23 August 2007; p. 6805. [Google Scholar]
  61. Masdari, M.; ValiKardan, S.; Shahi, Z.; Azar, S.I. Towards workflow scheduling in cloud computing: A comprehensive analysis. J. Netw. Comput. Appl. 2016, 66, 64–82. [Google Scholar] [CrossRef]
  62. Zitzler, E.; Deb, K.; Thiele, L. Comparison of multiobjective evolutionary algorithms: Empirical results. Evol. Comput. 2000, 8, 173–195. [Google Scholar] [CrossRef] [PubMed]
  63. Antony, J. Design of Experiments for Engineers and Scientists; Elsevier: Amsterdam, The Netherlands, 2014. [Google Scholar]
Figure 1. Task offloading in an SEC network with data-dependent constraints.
Figure 1. Task offloading in an SEC network with data-dependent constraints.
Aerospace 10 00804 g001
Figure 2. (a) An SEC network with 36 satellites; (b) example of ISL connections.
Figure 2. (a) An SEC network with 36 satellites; (b) example of ISL connections.
Aerospace 10 00804 g002
Figure 3. DAGs for applications.
Figure 3. DAGs for applications.
Aerospace 10 00804 g003
Figure 4. An individual for MOWPS with v = 8 and n = 7.
Figure 4. An individual for MOWPS with v = 8 and n = 7.
Aerospace 10 00804 g004
Figure 5. WFG of a constraint-violating solution.
Figure 5. WFG of a constraint-violating solution.
Aerospace 10 00804 g005
Figure 6. Amender construction process. (a) Petri nets (α1, M1) and (α2, M2); (b) Petri net (βk, Mk) for each satellite skS; (c) Petri-net-based amender (N, M0, θ).
Figure 6. Amender construction process. (a) Petri nets (α1, M1) and (α2, M2); (b) Petri net (βk, Mk) for each satellite skS; (c) Petri-net-based amender (N, M0, θ).
Aerospace 10 00804 g006
Figure 7. Amending process. (a) Initial marking M0. (b) t1,1 is fired, M0[t1,1 > M1. (c) t2,8 is disabled under M1. (d) t1,4 is fired, and M1[t1,4 > M2. (e) All transitions are fired, and we reach final marking ME.
Figure 7. Amending process. (a) Initial marking M0. (b) t1,1 is fired, M0[t1,1 > M1. (c) t2,8 is disabled under M1. (d) t1,4 is fired, and M1[t1,4 > M2. (e) All transitions are fired, and we reach final marking ME.
Aerospace 10 00804 g007
Figure 8. Proportion of the area dominated by [0.5, 0.5]. (a) ϕ = 1, γ = 0.5; (b) ϕ = 1.8, γ = 0.5; (c) ϕ = 1, γ = 0.3.
Figure 8. Proportion of the area dominated by [0.5, 0.5]. (a) ϕ = 1, γ = 0.5; (b) ϕ = 1.8, γ = 0.5; (c) ϕ = 1, γ = 0.3.
Aerospace 10 00804 g008
Figure 9. Multiway attacking process. (a) Processing of ℵ. (b) Processing of ϒ.
Figure 9. Multiway attacking process. (a) Processing of ℵ. (b) Processing of ϒ.
Aerospace 10 00804 g009
Figure 10. The structure of computation-intensive applications. (a) Montage; (b) CyberShake; (c) Epigenomics; (d) LIGO; (e) SIPHT.
Figure 10. The structure of computation-intensive applications. (a) Montage; (b) CyberShake; (c) Epigenomics; (d) LIGO; (e) SIPHT.
Aerospace 10 00804 g010
Figure 11. Trade-offs for all four algorithms on different instances. (a) A × 1 (b) B × 1 (c) C × 2 (d) D × 2 (e) E × 5 (f) F × 5.
Figure 11. Trade-offs for all four algorithms on different instances. (a) A × 1 (b) B × 1 (c) C × 2 (d) D × 2 (e) E × 5 (f) F × 5.
Aerospace 10 00804 g011aAerospace 10 00804 g011b
Figure 12. Variation trend of aNS, aHV, and aDR for each algorithm in different instances. (a) Average number of nondominated solutions (aNS); (b) average hypervolume (aHV); (c) average dominance rate (aDR).
Figure 12. Variation trend of aNS, aHV, and aDR for each algorithm in different instances. (a) Average number of nondominated solutions (aNS); (b) average hypervolume (aHV); (c) average dominance rate (aDR).
Aerospace 10 00804 g012
Table 1. Notations.
Table 1. Notations.
Problem Descriptions
nTotal number of satellites.
vTotal number of applications.
SSet of satellites.
USet of edge servers.
l i , j a Intersatellite link distance between satellite si and sj at time a.
LaMatrix representing satellite communication topology at time a.
G i , j a Route between satellites si and sj at time a.
G S i , j a Shortest route between si and sj at time a.
𝜕 i , j a ( d ) Communication delay for transmitting data of size d from satellites si to sj at time a.
WApplications, each of which can be decomposed into several tasks with dependencies.
wApplication, wW.
G   =   ( V ,   E ) Directed acyclic graph representing data-dependent constraints.
mTask.
T p c o m Computation time for task mp.
T p a v i The time that assigned edge server is available for executing mp.
T p r e a d y The time that assigned edge server received all predecessors’ results of mp.
T p s t a r t The time when edge server starts processing mp.
T p f i n i s h Finish time of mp.
Solution Components
θ = {θ1, θ2, …, θn}Task assignments for all edge servers.
Δ = {ℵ; ϒ}Individual of MOWPS, where ℵ implies the execution sequence of tasks and ϒ represents assignment results.
ΨallSet of individuals.
ΨndSet of nondominated individuals.
NpNumber of individuals in a population.
(N, M0, θ)Petri net amender based on solution θ.
πΔTransition sequence extracted from Δ.
ΨeSet of elite individuals.
ϑStrengthened dominance relation sort.
ξProportion of elite individuals.
εProportion of extracted individuals.
PreserveProbability of retaining elements.
PbiasProbability of biased selection.
φiUtility value for Lamarckian learning method.
KmaxMaximum number of iterations.
Table 2. Satellite constellations used in simulation.
Table 2. Satellite constellations used in simulation.
Constellation (κ)Altitude (km)Inclination (deg)PlanesSatellites (n)
A [57]82545432
B [58]141452648
C825458160
D111053.812300
E11756018864
F [59]111053.8321600
Table 3. Parameter size for each instance type.
Table 3. Parameter size for each instance type.
Instance Typeκvκ × v
SmallA, B1, 3, 52 × 3 = 6
MediumC, D2, 5, 82 × 3 = 6
LargeE, F5, 10, 152 × 3 = 6
Table 4. Simulation parameters.
Table 4. Simulation parameters.
ParametersValue
Number of edge servers n
The computing capacity fk[5, 10] Gcycles/s
The processing energy consumption coefficient gw[1 × 10−28, 2 × 10−28]
The standby power gs[0.1, 0.2] W/s
The unit rental cost h e k [1, 2] $/s
The transmission power gc30 W
The unit data transmission cost hd0.02 $/MByte
The unit network rental cost ho0.1 $/s
The communication capability of ISL r1 Gbps
The amount of data volume di,p[5, 10] MByte
The workload ep of a task mp[1, 2] Kcycles/Byte
Table 5. Amending results of algorithm AM.
Table 5. Amending results of algorithm AM.
Scale
κ × v
Infeasible Solution AmountSuccess RateTotal Running TimeSingle Solution Amending Time
A × 11315100%1.00497.64 × 10−4
B × 21611100%2.22761.38 × 10−3
C × 41723100%5.90613.42 × 10−3
D × 41016100%6.64866.54 × 10−3
D × 81826100%16.71359.15 × 10−3
E × 151334100%51.67340.0387
E × 301899100%142.83970.0752
F × 301417100%169.04840.1193
Table 6. Candidate factor levels for each parameter.
Table 6. Candidate factor levels for each parameter.
Factor LevelNpξεPreservePbias
1200.10.10.20
2300.20.20.30.1
3400.30.30.40.2
4500.40.40.50.3
Table 7. Orthogonal array L16(45) and response variable.
Table 7. Orthogonal array L16(45) and response variable.
TrialFactor LevelResponse Value (aHV)
NpξΕPreservePbiasSmallMediumLarge
1111110.35720.12330.0227
2122220.57110.32830.1754
3133330.68810.44840.3008
4144440.69100.64750.4984
5211220.49180.04730.0492
6222110.53810.45920.3512
7233440.62900.53250.3719
8244330.76110.70620.6448
9312340.53240.33680.2184
10321430.67360.55580.4160
11334120.76810.57380.5567
12343210.74940.71550.7325
13412430.51830.37240.2932
14421340.71110.69510.5376
15434210.71910.54620.4146
16443120.79490.82820.7636
Table 8. Statistical analyses and suggested parameter values.
Table 8. Statistical analyses and suggested parameter values.
Factor LevelNpΞεPreservePbias
Small10.57690.47490.55840.61460.5910
20.60500.62350.54000.63290.6565
30.68090.70110.71540.67320.6603
40.68590.74910.73480.62800.6409
Delta0.10900.27420.19490.05860.0693
Rank31254
SPV500.40.40.40.2
Medium10.38690.21990.35540.49610.4611
20.43630.50960.37420.40930.4444
30.54550.52520.63120.54660.5207
40.61050.72440.61840.52700.5530
Delta0.22360.50440.27580.13730.1086
Rank31245
SPV500.40.30.40.3
Large10.24930.14590.25640.42360.3803
20.35430.37010.25960.34290.3862
30.48090.41100.54220.42540.4137
40.50230.65980.52860.39490.4066
Delta0.25290.51400.28580.08250.0334
Rank31245
SPV500.40.30.40.2
Table 9. Comparison results of different algorithms.
Table 9. Comparison results of different algorithms.
Instance
Type
Scale
κ × v
IMOPSOQMCHONSGA-II (Using AM)MOWPS
aNSaHVaDRaNSaHVaDRaNSaHVaDRaNSaHVaDR
smallA × 130.0074070.70800.053446.20.45380.0406584.60.98950.9105
B × 11.62.82 × 10−4019.40.16120.2651260.06090.027049.40.78650.6964
A × 33.20.004606.60.56950.224936.60.35310.04451700.99860.9908
B × 32.20017.20.32150.221654.40.14300.0097266.60.91550.9640
A × 54.20.0193013.20.40610.355849.60.24890.085291.20.99991
B × 52.41.80 × 10−4011.60.19300.3005138.20.08600.0556194.40.98910.9994
mediumC × 22.20.0012016.80.72870.51791030.28230.042777.40.95190.7718
D × 21.45.66 × 10−4018.40.34240.103964.80.15840.00647740.80650.9943
C × 51.800130.30370.29332080.18290.01162420.93570.9953
D × 51.82.40 × 10−507.80.33180.1662111.600.26330.0109434.80.91930.9950
C × 82.40.0012060.41190.4786168.20.21750.0466830.94960.9751
D × 81.43.28 × 10−408.80.27100.2494161.40.16740.0116241.80.89940.9878
largeE × 54.40.0291090.18260.011784.60.16960.0247481.40.86570.9929
F × 52.80.011708.20.18280.0585215.20.19770.0426412.20.72560.9783
E × 103.40.049406.80.17560.080399.40.18490.03702810.73060.9919
F × 101.20.0032090.19610.1275158.60.16840.0297234.60.57440.8337
E × 152.40.014804.80.13740.1972271.60.13840.1774930.41880.5080
F × 152.20.019809.60.44170.3541120.60.31030.093711.20.46750.6564
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, R.; Feng, Y.; Yang, Y.; Li, X. Task Offloading with Data-Dependent Constraints in Satellite Edge Computing Networks: A Multi-Objective Approach. Aerospace 2023, 10, 804. https://doi.org/10.3390/aerospace10090804

AMA Style

Zhang R, Feng Y, Yang Y, Li X. Task Offloading with Data-Dependent Constraints in Satellite Edge Computing Networks: A Multi-Objective Approach. Aerospace. 2023; 10(9):804. https://doi.org/10.3390/aerospace10090804

Chicago/Turabian Style

Zhang, Ruipeng, Yanxiang Feng, Yikang Yang, and Xiaoling Li. 2023. "Task Offloading with Data-Dependent Constraints in Satellite Edge Computing Networks: A Multi-Objective Approach" Aerospace 10, no. 9: 804. https://doi.org/10.3390/aerospace10090804

APA Style

Zhang, R., Feng, Y., Yang, Y., & Li, X. (2023). Task Offloading with Data-Dependent Constraints in Satellite Edge Computing Networks: A Multi-Objective Approach. Aerospace, 10(9), 804. https://doi.org/10.3390/aerospace10090804

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop