2021
DOI: 10.1007/s11276-021-02632-z
|View full text |Cite
|
Sign up to set email alerts
|

Computation offloading optimization for UAV-assisted mobile edge computing: a deep deterministic policy gradient approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 101 publications
(37 citation statements)
references
References 22 publications
0
37
0
Order By: Relevance
“…Since UAV-MEC provides computing services to all vehicles in a TDMA mode [26], we discretize the finite flying time T into N equal time slots, that is, T N t = , where δt is the time interval that allows UAV-MEC to be in a certain place at a certain time slot. In the 3D Cartesian coordinate system, the UAV continues to fly at a fixed altitude H, where the UAV has a start coordinate [26] [27]:…”
Section: A Communication Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Since UAV-MEC provides computing services to all vehicles in a TDMA mode [26], we discretize the finite flying time T into N equal time slots, that is, T N t = , where δt is the time interval that allows UAV-MEC to be in a certain place at a certain time slot. In the 3D Cartesian coordinate system, the UAV continues to fly at a fixed altitude H, where the UAV has a start coordinate [26] [27]:…”
Section: A Communication Modelmentioning
confidence: 99%
“…where B denotes the communication bandwidth, vp p denotes the transmit power of the vehicle in the upload link, 2  denotes the noise power, NLOS p denotes the transmission loss, and () m pi signifies the indicator of whether there is any block between UAV and vehicle m in time slot i (that is, 0 means no blockage and 1 means there is a blocking object) [26].…”
Section: A Communication Modelmentioning
confidence: 99%
“…P f ollow ij is defined as the transition probability of node i to j under following behavior. An individual who performs following behavior selects the next node according to Equation (3).…”
Section: Following Behaviormentioning
confidence: 99%
“…Recently, the impact of various emergencies on public safety is increasing, which poses a serious threat to the environment required for citizens to engage in various activities. The simulation of pedestrian emergency evacuation involves multiple disciplines, and its research findings can be applied to various fields, such as building, science engineering, safety science, disaster prevention, highway and railway transportation, robot control, and urban planning [1][2][3]. Evacuation dynamics simulaed through computers is one of key research directions in evacuation study, which has important theoretical and practical value.…”
Section: Introductionmentioning
confidence: 99%
“…UAV edge computing platform supplies fast and flexible information support for mobile services. Researchers pay more attention that Multi-UAVs could cover a wider testing scale in recent years [15]- [17].…”
Section: Related Workmentioning
confidence: 99%