 Research
 Open access
 Published:
Wireless edge device intelligent task offloading in mobile edge computing using hyperheuristics
EURASIP Journal on Advances in Signal Processing volumeÂ 2022, ArticleÂ number:Â 126 (2022)
Abstract
To overcome with the computation limitation of resourceconstrained wireless IoT edge devices, providing an efficient task computation offloading and resource allocation in distributed mobile edge computing environment is consider as a challenging and promising solution. Hyperheuristic in recent times is gaining popularity due to its general applicability of same solution to solve different types of problems. Hyperheuristic is generally a heuristic method or framework which iteratively evaluates and chooses the best lowlevel heuristic, to solve different types of problems. In this paper, we try to solve wireless device task offloading in mobile edge computing, which is a nonconvex and NPHard problem by using a proposed novel HyperHeuristic Framework using Stochastic Heuristic Selection (HHFSHS) using Contextual MultiArmed Bandit (CMAB) with EpsilonDecreasing strategy, considering two key Quality of Service (QoS) objectives computation time and energy consumption. These multiobjective criteria are modeled as singleobjective optimization problem with the goal to minimize latency and energy consumption of wireless devices without losing the pareto optimality. Finally, evaluate its performance by comparing with other individual metaheuristic algorithms.
1 Introduction
In the past decades, we have witnessed many revolutionary wireless mobile devices, wearables, IOT sensors, all these small resource constraint devices need an innovative way of doing effective computation outside its hardware resource and get the results back faster for decision making, with the introduction of 5G, this can be achieved by utilizing mobile edge computing infrastructure. With the adoption of 5G network, the expectation for faster network is inevitable to achieve fast speed, low endtoend latency, and high reliability. Largescale applications like highdefinition video, virtual reality (VR), augmented reality (AR), IOT wireless sensorbased industrial application, UAV and autonomous vehicles will all eventually generate a large amount of data. This not only puts a strain on the system, but also backhaul. In order to provide better service to the end users for latencysensitive computational operations, the core network 'Users' devices are placed closer to the network's edge. This will lessen the burden on the server while lowering the delay in the network and processing as computations are done at the mobile edge server placed at proximity to the edge devices.
To address the issues of lowprocessing capacity and restricted resources in wireless edge devices, the concept of Mobile edge computing (MEC) computation offloading has been presented by the industry. Computation offloading is the process of allocating computationally heavy jobs to a nearby Mobile Edge Server (MES) which has appropriate processing and computing resources. MES is then queried for the derived results. Figure 1 shows a typical Mobile edge computing environment where Wireless Devices (WD) {WD_{1}, WD_{2},â€¦,WD_{n}} connect to the nearest MES {MES_{1}, MES_{2},â€¦,MES_{n}}, all these MES are interconnected through fiber optics or high bandwidth wireless channels. Further all MES have fiber optics connection with Centralized Cloud Data Center (CCDC). WDs take stochastic intelligent decision to connect to least utilized nearby MES for task offloading and getting the results back either through the same MES or through the CCDC, it depends on the mobility of the WD. For example, if WD_{1} which initially in range of MES_{1} starts the offloading to MES1 and being in mobility, it comes to the range of MES3 and retrieves the results from MES3 due to MES collaboration with CCDC.
More research are carried out to intelligently offload the task to mobile edge servers using metaheuristics, but that does not bring in some generality to the solution space and applicability of algorithm to wide variety of problems, this motivates to bring in hyperheuristics [1] to achieve the generality for solving wide variety of problems from different domains. However, the major challenge is in generating heuristics or selecting heuristics automatically.
A hyperheuristic is an interesting methodology of selecting or generating heuristics to solve different hard computational search problems in an automated way using the same solution in hand. According to the author Burke [2] in his book, he categorized hyperheuristics into two broad categories as heuristic selection and heuristic generation (refer Fig. 2 â€“ adapted from [2]), this is the first level in our first dimension (the nature of the search space). The second level in this dimension corresponds to the distinction between constructive and local search hyperheuristics. This categorization deals with the nature of the lowlevel heuristics used in the hyperheuristic framework. Construction and perturbation are the terms used to refer these lowlevel heuristics classes.
Almost all existing hyperheuristics search contains two stages: heuristics selection and its move acceptance. Figure 3 (adapted from [2]) depicts the highlevel element blocks and its interaction of hyperheuristic using perturbative heuristic selection and Acceptance Criteria move acceptance.
2 Related works
Task computation offloading and resource allocation strategies are interesting problems to be solved in mobile edge computing and vehicular edge network. Several interesting research has been done in this field using MetaHeuristic, Neural Networks and Fuzzy Logics. Task offloading can be thought as completely offload to MES, or partially offload only memoryintensive processing to the MES and remaining processing is done locally, or entire task is locally computed without offloading to the MES. Most of the task which depends on external data or needs aggregated data from different sources are offloaded to the MES, because of its nature to download lot of data from external sources and do data aggregation which is memoryintensive processing. It is reasonable to offload such tasks to MES completely.
Mareli et al. [3] used bioinspired metaheuristic algorithm cuckoo search to optimize task offloading by tweaking the switching parameter. Miao et al. [4] proposed a new intelligent computation offloadingbased MEC architecture in combination with artificial intelligence (AI) technology. Their methodology effectively reduces the total task delay with the increasing data and subtasks. Li and Wang et al. [5] solved multiobjective optimization problem by using particle swarm optimization (PSO) with energy constraint MES placement algorithm to arrive at the optimal solution. Huang et al. [6] used whale optimization algorithm (WOA) metaheuristic to solve the multitarget problem targeting two criteria like task energy consumption and task processing time. Coronel et al. [7] used MetaHeuristic algorithms with multiple objectives for placement optimization of wireless switches in Electrical Power distribution system. Zakaryia et al. [8] used Queuing network and evolutionary Genetic Algorithm to offload task effectively focusing on minimizing the task response time. Feng et al. [9] used hybrid algorithm GWOWOA for solving task offloading problem of IOT devices in mobile edge computing environment while considering three optimization criteria. Khan et al. [10] in their paper proposed a task scheduling method based on a hybrid optimization algorithm is presented, which effectively schedules jobs with the least amount of waiting time. Anisetti et al. [11] in their paper proposed an energyefficient task offloading and transmission power allocation scheme that reduces completion time and energy consumption. You et al. [12] in their paper proposed a PSO algorithm for task offloading from a resourceconstrained wireless edge devices to MES considering energy and low latency multiobjective criteria. Pham et al. [13] in their paper tried to solve resource allocation in wireless network using WOA. Li et al. [14] in their paper tried to fill the gap of task deadline constraints which other existing offloading algorithm failed to do so.
Zhuang et al. [15] in their paper proposed hyperheuristic algorithm for fog computing to achieve QoS requirements. Alshareef et al. [16] in their paper used multiobjective hyperheuristic approach to solve multiobjective software module clustering optimization problem by combining and controling three genetic and evolutionary algorithms namely multiobjective genetic algorithm (MOGA), nondominated sorting genetic algorithm (NSGAII) and strength pareto evolutionary algorithm (SPEA2). Huang et all [17] in their paper explored metaheuristics energyefficient computation offloading (EECO) approach to minimize energy consumption focusing on delay and security constraints.
3 System method
In this paper, we will discuss about the case of Wireless Devices (WDs) offloading their tasks to nearby MES based on their computation data size. The collection of WDs is represented as Nâ€‰=â€‰{1, 2,â€¦, n}. Task computation time needed to finish the task is represented as TCâ€‰=â€‰{tc_{1}, tc_{2}, â€¥, tc_{n}}, and task data size is represented as TSâ€‰=â€‰{ts_{1}, ts_{2}, â€¥, ts_{n}}, where â€˜iâ€™ is a particular wireless device in the collection N. Each wireless deviceâ€™s task is considered as the combination of TC and TS, which can be represented as \(task_{i} = \left\{ {tc_{i} ,ts_{i} } \right\}\). Network Access points or Wifi Routers is used for communication and data transfer between wireless devices and MES. For task computation, wireless device can completely do it locally or completely offload to MES or partially do locally and partially at edge server. This can be represented as a offloading decision set Yâ€‰=â€‰{y_{1}, y_{2}, â€¥, y_{n}}, where y_{i} ranges between [1, 0], both inclusive. If y_{i}â€‰=â€‰1, then WD_{i} completely offload its task to MES and if y_{i}â€‰=â€‰0, then WD_{i} does the full task computation within itself. If y_{i}â€‰>â€‰0 and y_{i}â€‰<â€‰1, then WD_{i} offloads y_{i}â€‰Ã—â€‰100% of tasks to the MES and remaining (1â€‰âˆ’â€‰y_{i})â€‰Ã—â€‰100% of tasks done locally. For offloading decision on edge server, edge serverâ€™s available processing capacity is considered, and the system method is a combined minimization of overall task processing time / completion time and amount of energy consumed for completing that task. We assert that by employing the hyperheuristics approach to identify the optimal task offloading decision to do local computing or mobile edge computing or combination of both and thereby latency and energy can be greatly reduced.
3.1 Local computation model
Here we will formulate the model for task execution locally at wireless device. Let us consider \({td}_{i}^{loc}\) as the local processing time or time delay and \({ec}_{i}^{loc}\) as the energy consumed for processing that task locally. \({F}_{i}^{loc}\) is denoted as the maximum available CPU cycles of WD_{i}.
Let \(f_{i}^{loc}\) represent the current available CPU cycles for the computation task at that moment of the WD_{i} and \({tc}_{i}\) represent the taskrequired computation time, then the local task processing time or time delay \({td}_{i}^{loc}\) to process the task locally by the WD_{i} is represented as:
The energy consumption for local task processing is represented as:
where C is the effective switched capacitance of the device based on its chip architecture.
3.2 Edge computation model
Here we will formulate the model for task execution remotely at MES in this section. Communication rate is considered based on the assumption that mobile devices are connected through the wireless channel. Let B represent the bandwidth of the wireless channel, and letâ€™s assume that the bandwidths for WDs are equally allocated for task offloading. Let Î¸_{i} is the bandwidth allocated to wireless channel for WD_{i}. Based on Shannon formula (r_{i}channel capacity in bits per sec), the WD_{i} communication rate (R_{i}) is represented as [18]:
where tp_{i} is transmission power of WD_{i} and \({cg}_{i}\) is channel gain of WD_{i}, and \({N}_{0}\) denotes the background channel noise. Now, the total task processing time delay has two parts, one is task transmission time and other is task processing time. \(transT_{i}^{o}\) is the task transmission time, and it is calculated as:
Let F denote the entire available edge server computing resources and \({f}_{i}^{edge}\) is the CPU cycles allocated to the WD_{i} to complete its task at the MES and \({procT}_{i}^{edge}\) represent the WD_{i} task computation time needed at the MES and it is calculated as:
The time required for sending back the result or response from MES can be neglected because the size of the output of the computed data is less. The total time for the WD_{i} to process the offloaded task completely using the MES is calculated as:
The overall energy consumption \({ec}_{i}^{p}\) is calculated as:
where \({transP}_{i}^{o}\) is transmission power required to upload the data from WD_{i} to the MES through the wireless channel, and \({transP}_{i}^{e}\) is the power required for the WD_{i} to wait for the result from MES.
3.3 Problem formulation
While formulating this problem, we considered N wireless devices with varying task computation workloads and tasks dependencies. The decision Y is made based on TC and TS. Here we consider both task processing time delay and task energy consumption. There are several ways to solve multiobjective problems, one way is to optimize the first objective function and try to optimize the second objective function while maintaining the first objective function value intact. The second way is to optimize both objective functions simultaneously. Since these two target constraints are a measure of different metrics, they must be normalized for calculation to avoid biasing.
So, the equation for calculating total time delay becomes:
where T_{min} is the minimum task processing time delay in the set N, and T_{max} is the maximum task processing time delay in the set N.
And the equation for calculating total energy consumption becomes:
where E_{min} is the minimum task energy consumption in the set N, and E_{max} is the maximum task energy consumption in the set N.
Combining both objectives, an improved mathematical formula is arrived to minimize the impact of dimensions and makes the formula controllable using different decision variables. Finally, the target minimization objective function is formulated as:
The coefficient Î· is used as weight to adjust the optimization objective function results. Here we consider the total time latency target as baseline with coefficient value as 1. The coefficient Î· of the total energy consumption which ranges from 0.001 to 1 is adjusted based on careful pareto optimality study to get the required weighted normalization for the two targets.
Finally, this optimization problem can be solved using a single target minimization equation given as:
The aim of the problem is to minimize the objective function Z, considering the two target constraints namely low energy consumption and lowprocessing time without losing the pareto optimality.
4 Problem solutions
In this research, three metaheuristics Grey Wolf Optimizer (GWO), Tabu Search (TS) and Cuckoo Search (CS) are modified and used in lowlevel hyperheuristic selection in the proposed technique and tested, let discuss those metaheuristics overview and their modifications for using it in the proposed algorithm.
4.1 Grey wolf optimizer
Grey wolf optimizer (GWO) is one of nature inspired metaheuristic swarm intelligence algorithm. This algorithm is unique from other algorithms due to its methodology of adopting social hierarchy and hunting behavior of grey wolves. Seyedali Mirjali proposed GWO [19] in 2014 and proposed multiobjective (MOGWO) [20] in 2016. In recent times, GWO is used in many optimization research aspects. In fact, Xu et al. [21] proposed a fusioned Cuckoo Search with the Improved GWO algorithm to achieve better result. Grey wolves usually dwell in packs with some dominant social hierarchy as shown in Fig. 4 (adapted from [19]). These wolves are represented as 4 main groups namely alpha wolves (Î±), beta wolves (Î²), delta wolves (Î´), and omega wolves (Ï‰). Wolves which usually lead in prey hunting are called alpha wolves; wolves which supports helping alpha wolves are called beta wolves; wolves which helps in guarding the territory boundaries and does the whistle blowing job are called delta wolves; and wolves which are lazy and does not actively take part in hunting but only interested in eating the leftover food are called omega wolves, which is usually dominated by other top category wolves.
In GWO algorithm, the final optimized fit solution is represented as alpha, then the second less optimized fit solution is represented as beta and the third least optimized fit solution is represented as delta. All the leftover trivial solutions are represented as omega. GWO has 3 stages in the algorithm: encircling, hunting, or attacking, and searching. The positions of the wolves during the encircling stage, is updated by [19]:
where â€˜iâ€™ is the iteration index, \({\overrightarrow{X}}_{p}\) represent the position vector of prey, and \(\overrightarrow{X}\) represent the position vector of wolves. \(\overrightarrow{A}\) and \(\overrightarrow{C}\) are coefficient vectors, calculated by the below equations:
Here the variable \(\overrightarrow{a}\) is nonlinearly decreased for Â¾ of the iteration and linearly decreased from 2 to 0 for remaining iterations. This is done to support better exploration and exploitation, respectively, and variables \({\overrightarrow{r}}_{1}\) and \(\overrightarrow{{r}_{2}}\) are random absolute vectors in range [ 0, 1].
During the hunting stage, additional weight coefficient 0.01 is considered for alpha position as alpha wolfs are closer to the prey, this value can be tweaked based on the convergence behavior and final positions of the wolves are updated by equation [17]:
GWO has good exploitation and exploration ability, which helps in avoiding local minimum trap.
4.2 Tabu search
Tabu Search (TS) is one of metaheuristic local search algorithm specialized in optimizing the heuristics model parameters. Some of the local search heuristic methods have the pitfall to stuck in local minima. TS helps to overcome this problem by enhancing the local search exploration phase by prohibiting already visited solutions also known as Tabu. TS does sometimes deterministically accept trivial solutions to avoid local minima convergence. The steps involved in TS algorithm are given below,
Algorithm:
Step 1: Start with any random best acceptable solution, say bSâ€‰=â€‰S_{0}.
Step 2: Generate neighboring random solutions N(bS) based on the current best solution bS. From N(bS), the solutions that are in the Tabu List are removed except for the solutions that fit the Aspiration Criteria. This solution will become the new N(bS).
Step 3: Choose the best solution out of \(N(bS)\) and label this new solution \({bS}^{\mathrm{^{\prime}}}\). If the solution \({bS}^{\mathrm{^{\prime}}}\) is better than the current best solution, update the current best solution. After, regardless of if \({bS}^{\mathrm{^{\prime}}}\) is better than \(bS\), we update \(bS\) to be \({bS}^{\mathrm{^{\prime}}}\).
Step 4: Update the Tabu List \(T(bS)\) by removing all moves that are expired past the Tabu Tenure and add the new move sâ€™ to the Tabu List. Additionally, update the set of solutions that fit the Aspiration Criteria \(A(bS)\).
Step 5: Search stops if the termination criteria is met or else it will move onto the next iteration. Termination Criteria is used here is max number of iterations.
4.3 Cuckoo search
Cuckoo Search (CS) algorithm is one of bioinspired metaheuristic algorithm developed based on reproduction behavior of cuckoo birds [14]. Potential solutions are associated with cuckoo eggs in CS. Cuckoos birds usually lay their eggs in otherâ€™s nests with the hope of their off springs being raised by other. On a random probability say 25%, when the host cuckoos discover those foreign eggs in their nests, some of the foreign eggs are thrown out of the nest or cuckoos will completely discard that entire nest. The CS algorithm consist of three basic rules as follows:

Eggs are laid in random nests by cuckoo bird.

Best nests which contain best quality eggs are selected and carried forward to next generation.

Host cuckoo will identify a foreign egg with a probability pa Ñ” [0,1] from a set of random nests. If foreign egg is found, the host cuckoo can either throw the foreign egg away or completely abandon the whole nest and build a new nest elsewhere.
During the iteration, based on the above three rules, the new position of cuckoo nests is updated by.
Here the productâ€‰âŠ•â€‰representative entrywise multiplication. \({\mathrm{x}}_{j}(t+1)\) denotes new solutions for cuckoo â€˜iâ€™, \({x}_{j}(t)\) denotes the current solutions. The step size is controlled by Î±â€‰>â€‰0, Letâ€™s assume its value as 1. The levyflight is provided by following Mantegnaâ€™s algorithm.
In Mantegnaâ€™s algorithm, the step length s is calculated by
where u and v values are arrived based on normal distributions. That is
were,
This distribution obeys the expected Levyâ€™s distribution for s>â€‰=s_{0} where s_{0} is the smallest step. Its value can be carefully chosen between 0.01 and 1.
4.4 Proposed hyperheuristic framework using stochastic heuristic selection (HHFSHS)
Based on the Heuristic framework depicted in Fig. 3, a novel stochastic heuristic selection based on online learning acceptance criteria feedback is proposed which uses couple of wellknown metaheuristics like GWO, CS, TS as part of the lowlevel heuristic search with certain careful parameter tweaks to improve exploration and exploitation behaviors. The reason behind choosing these three metaheuristics is based on the performance and behavior to tackle local minima trap and achieve optimum convergence in most of the problem space. Letâ€™s discuss about those modification on metaheuristics below.
The GWO algorithm updates the wolve position just by averaging out the alpha, beta and delta positions during each iteration using Eq. (17), this may lead to local minimum trap or slow convergence as alpha position progress slows down due average calculation. This is clearly seen in the convergence comparison in Fig. 5. To mitigate this, the equation is modified to add a fixed weight to alpha wolve position to emphasis the importance of alpha wolves leading the group. The encircling and attacking phases of iteration is called as exploration and exploitation phases, respectively, instead of having the linearly decreasing value, this algorithm is modified to use nonlinear function for Â¾ of the max iteration and linear function for Â¼ of the max iteration to support exploration and exploitation stochastically.
The TS algorithm is used to store all previous search best positions and avoids the search agents to search again in previously searched position, thereby improving the performance.
The CS algorithm uses cuckoo random walk and levyflights to update its nest position using a fixed probability index say 0.25. Random walk is usually walking straight for a while and take 90 degrees turn and continue walking, this will bring high randomness which will support in local minima avoidance and boost better exploration capability.
Using these modified metaheuristic algorithms in lowlevel heuristic search as part of the hyperheuristic framework, a novel hyperheuristic based on perturbation lowlevel heuristic selection using Contextual MultiArmed Bandit (CMAB) EpsilonDecreasing strategy is formulated with move acceptance criteria formulated as depicted in Eq. (23), where 0 represent criteria not satisfied or loss and 1 represent criteria satisfied or high profit. EpsilonDecreasing strategy is used to favor exploration initially and gradually favor exploitation later by starting with higher âˆˆ value and decrease over time. Consideration is given such that the rate of decrease shouldnâ€™t be too quick.
During the algorithm iteration, last best convergence is compared with n last convergences, if there is improvement in the best convergence value, then the chosen lowlevel heuristic from heuristic Bag is continued for further iterations, in case there is no improvement in the best convergence value, then a stochastic heuristic selection is picked using CMAB with EpsilonDecreasing strategy with an additional penalization on iteration count for which there is no improvement and continued for further iteration. This process is repeated till the end of the iteration.
where \({C}_{l}\) is last best convergence, \({C}_{ln}\) is last â€˜nâ€™ convergences, \({C}_{t}\) is convergence tolerance (1e^{âˆ’5}).
Based on the above hyperheuristic framework and formulation (refer Fig. 3), a novel HyperHeuristic Framework using Stochastic Heuristic Selection (HHFSHS) is proposed as below algorithm.
5 Experimental analysis and results
5.1 Simulation setup
Bio Inspired Heuristic algorithms like PSOGWO, EGWO, Augmented GWOCS (AGWOCS), GWO, BAT, Improved GWO (IGWO), WOA, PSO, GWOWOA were compared with HHFSHS and investigated in MATLAB version R2021b. The test environment was Dell laptop with the following specifications: RAM of 10 GB, CPU is IntelÂ® Coreâ„¢ i52540 M CPU @ 2.60 GHz and 64bit windows 10 Pro operating system.
5.2 Test functions
The unimodal and multimodel benchmark test functions used to validate the performance of each Optimization algorithm are tabulated in Tables 1 and 2.
These optimization test functions complexity quality is defined by the number of peaks encountered in the function landscape. These peaks can negatively impact the optimization process when the optimization algorithm gets stuck in between the peaks. Couple of test function results are shown below for discussion on performance of the proposed algorithm.
5.3 Results and discussion
Performance evaluation scenarios is setup considering couple of MES in the wireless access area and couple of WDs (Nâ€‰=â€‰30) are distributed around the MES coverage region. Each WD, with its own computation task, taskâ€™s data size and taskâ€™s required CPU cycles are randomly generated, specifically ts_{i} âˆ¼ N (0,20) MB and tc_{i} âˆ¼ N (500, 100) cycles/bit. The total available CPU cycles of the mobile edge servers is Fâ€‰=â€‰30 GHz, and the allocated CPU cycles of the WD_{i} is set to {0.5,0.6, â€¦1.0} GHz randomly. The transmission power \({transP}_{i}^{o}\) is set as 100 mW, and the power required to wait for the result \(trans{P}_{i}^{e}\) is set as 10 mW. With these setting, simulation experiment is done to evaluate the proposed algorithm. The aim of the proposed algorithm is to get faster and better convergence and thereby reducing the overall processing time and energy consumption in offloading tasks. As the multiobjective problem (MOP) is normalized and devised as a single objective minimization problem, we will consider the performance from the perspectives of convergence and stability. Also, couple of standard metaheuristic methods also included as comparisons. In our experiment, nine other metaheuristics are evaluated and compared with HHFSHH technique with 3 lowlevel heuristics GWO, CS, TS tweaked and used in heuristic bag of our proposed heuristic framework. There is no restriction on choice of lowlevel heuristics for using in this framework. Some of the key parameters chosen for evaluation are.

Optimization target function Z. Algorithm is effective if it can arrive at the lowest minimum value of Z function.

Overall task processing time. Computation task offloading in mobile edge environment is delay sensitive and offloading decisions should be taken quickly, otherwise it will fail in its purpose.

Overall task energy consumption, as wireless devices typically IoT devices have less power resource, so it must be effectively used.

Stability of results in multiple iterations with the same inputs. Metaheuristic algorithms have uncertainty due to the facts of its techniques to arrive at the global minimum, which sometimes stuck at the local optima. The results so obtained is also affected by this kind of uncertainty. However, these uncertainty in the results should be minimized as low as possible. The algorithm result may vary for each iteration with same input, as the stochastic selection of lowlevel heuristic is based on the CMAB EpsilonDecreasing strategy and move acceptance using acceptance criteria evaluation

Finally, the convergence curves of different heuristics methodology are investigated. The values of the Z function obtained considering four different characteristics of applications like Argument Reality, HealthCare, Compute Intensive and Infotainment, with 3 different workload distributions.
From the result (refer Fig. 5), specifically in Fig. 5ad, it is evident that none of the heuristic converged properly to global minima, but the proposed HHFSHS heuristic has managed to avoid local minima and converged faster to global minima with lesser processing time. It also seen in most of the multimodel test functions the proposed algorithm HHFSHS has converged well compared to other heuristics due to the fact the hyperheuristic scholastically selects the lowerlevel search heuristic according to the CMAB EpsilonDecreasing strategy and move acceptance using acceptance criteria evaluation. HHFSHS is performed well in terms of convergence in uncertain problem space due to its adaptable lowlevel heuristic selection dynamically based on the CMAB EpsilonDecreasing strategy. AGWOCS a hybrid metaheuristic algorithm relatively performed well close to the proposed algorithm HHFSHS and performed well than IGWO and WOA as it overcomes the disadvantage of GWO local minima trap behavior with the advantage of CS to improve global search and avoid local minima. It also can be derived from result that the lowest function values of the different heuristics are in the order HHFSHSâ€‰<â€‰AGWOCSâ€‰<â€‰IGWOâ€‰<â€‰WOA.
Based on the simulation result (refer Fig. 6), it is evidence that the completion time of offloading task increases with the size of the data increases and energy consumption increases with the size of the data increases, as more data need to be transferred from wireless device to edge server and get the processed data back which obviously increase the waiting time thereby consuming more energy in the wireless device. Our method HHFSHS is the suboptimal completion time and is suboptimal in energy consumption when the wireless device count is 30. Other algorithms like AGWOCS and IGWO and WOA relatively performed well when compared to HHFSHS, while other heuristics like PSO and BAT algorithms has not performed well so not considered for comparison here. From the result, it is evident that the task processing completion time and energy consumption is less for HHFSHS, due to its faster convergence to find the optimal solution in problem space compared to other Heuristics.
Experiment is done considering four different characteristics of applications like Argument Reality, HealthCare, Compute Intensive and Infotainment, with 3 different workload distribution (i) 80% task offloaded to edge and 20% task in local computation; (ii) 50% task offloaded to edge and 50% in local computation; and finally, (iii) 20% task offloaded to edge and 80% task in local computation. Results based on this setup is shown in Fig. 7. It is very clear that as more percentage of tasks are computed locally, it takes less processing time as there is no involvement of data transfer in the network to MES and no wait time. It also very clear that as more percentage of tasks are computed locally, it takes more energy, and it takes less energy when it offloads major percentage of task to edge server and get the job done.
Based on Statistical Analysis (ref Table 3), it is evidence that proposed HHFSHS has low latency and energy consumption compared other metaheuristics. Standard Error of Mean (SEM) is less for HHFSHS compared to other methods, which means it has smoother and consistent behavior in task offloading for different population samples. All these experimental result analyses provide evidence that hyperheuristicbased technique has overcome the disadvantage of individual heuristic by adaptively switching to better lowerlevel heuristic and adapting generically for different problem domains. By having a better convergence, the proposed HHFSHS algorithm able to performance better with reduced energy consumption and faster processing compared to other individual metaheuristics algorithms.
6 Conclusion and future work
In this work, we analyzed a HyperHeuristic Framework using Stochastic Heuristic Selection (HHFSHS) for computation task offloading model with the goal to minimize the latency and energy consumption optimization in MEC. Then, the formulated model is normalized to aid in improving the model even for multidimensions. The goal of the formulated model is to arrive at the minimum value. The proposed HHFSHS algorithm has been applied to solve the optimization problem. The experiment shows better results of HHFSHS approach compared to other heuristics algorithms. However, the algorithm proposed still can have better feedback for selection of lowlevel heuristics. Since different lowerlevel heuristic are selected stochastically using CMAB EpsilonDecreasing strategy, the results may vary based on the Epsilon value selection, Epsilon decreasing rate and acceptance criteria resulting in slightly varying result for each run.
Future work will be based on the proposed algorithm going to experiment with other Heuristic local search algorithms with online feedback mechanism using Deep Reinforcement Learning (DRL) and evaluate in Vehicular Edge Computing consider mobility as an additional parameter, since mobility is one of the key features affecting the task offloading and resource allocation in Vehicular Edge Network.
Availability of data and materials
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
Abbreviations
 MEC:

Mobile edge computing
 MES:

Mobile edge server
 WD:

Wireless device
 DRL:

Deep reinforcement learning
 QoS:

Quality of service
 AR:

Augment reality
 VR:

Virtual reality
 GWO:

Grey wolf optimizer
 CS:

Cuckoo search
 TS:

Tabu search
 WOA:

Whale optimization algorithm
 AGWOCS:

Augmented whale optimization cuckoo search
 IGWO:

Improved grey wolf optimizer
 AC:

Acceptance criteria
 HHFSHS:

Hyperheuristic framework using stochastic heuristic selection
 CMAB:

Contextual multiarmed bandit
References
E. Burke, G. Kendall, J. Newall, E. Hart, P. Ross, S. Schulenburg, Hyperheuristics: an emerging direction in modern search technology, in Handbook of metaheuristics. ed. by F. Glover, G.A. Kochenberger (Springer, Boston, 2003), pp.457â€“474
E. Burke, M.R. Hyde, G. Kendall, G. Ochoa, E. Ã–zcan, A classification of hyperheuristic approaches, pp. 449â€“468 (2010)
M. Mareli, B. Twala, An adaptive Cuckoo search algorithm for optimisation. Appl. Comput. Inform. 14, 107â€“115 (2018)
Y. Miao, G. Wu, M. Li, A. Ghoneim, M. AlRakhami, M.S. Hossain, Intelligent task prediction and computation offloading based on mobileedge cloud computing. Futur. Gener. Comput. Syst. 102, 925â€“931 (2020)
Y. Li and S. Wang, An energyaware edge server placement algorithm in mobile edge computing, San Francisco, CA, USA, (2018)
M. Huang, Q. Zhai, Y. Chen, S. Feng, F. Shu, Multiobjective whale optimization algorithm for computation offloading optimization in mobile edge computing. Sensors 21 (2021)
E. Coronel, B. Baran, P. Gardel, Optimal placement of remote controlled switches in electric power distribution systems with a metaheuristic approach. IEEE Latin Am. Trans. 20(4), 590â€“598 (2022)
S.A. Zakaryia, S.A. Ahmed, M.K. Hussein, Evolutionary offloading in an edge environment. Egypt. Inf. J. 22, 257â€“267 (2021)
S. Feng, Y. Chen, Q. Zhai, M. Huang, F. Shu, Optimizing computation offloading strategy in mobile edge computing based on swarm intelligence algorithms. EURASIP J. Adv. Signal Process. 2021, 36 (2021)
M.S.A. Khan, R. Santhosh, Task scheduling in cloud computing using hybrid optimization algorithm. Soft Comput. (2021)
M. Anisetti, X. Gu, L. Jin, N. Zhao, G. Zhang, Energyefficient computation offloading and transmit power allocation scheme for mobile edge computing. Mob. Inf. Syst. 2019, 3613250 (2019)
Q. You, B. Tang, Efficient task offloading using particle swarm optimization algorithm in edge computing for industrial internet of things. J. Cloud Comput. 10, 41 (2021)
Q.V. Pham, S. Mirjalili, N. Kumar, M. Alazab, W.J. Hwang, Whale optimization algorithm with applications to resource allocation in wireless networks. IEEE Trans. Veh. Technol. 69, 4285â€“4297 (2020)
Z. Li, V. Chang, J. Ge, L. Pan, H. Hu, B. Huang, Energyaware task offloading with deadline constraint in mobile edge computing. EURASIP J. Wirel. Commun. Netw. 2021, 56 (2021)
Y. Zhuang, H. Zhou, A HyperHeuristic resource allocation algorithm for fog computing. In Proceedings of the 2020 the 4th International Conference on Innovation in Artificial Intelligence, (2020)
H. Alshareef and M. Maashi, Application of MultiObjective HyperHeuristics to Solve The MultiObjective Software Module Clustering Problem. Appl. Sci. 12 (2022).
X. Huang, Y. Yang and X. Wu, A MetaHeuristic Computation Offloading Strategy for IoT Applications in an EdgeCloud Framework, in Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control, New York (2019).
X. Deng, Z. Sun, D. Li, J. Luo, S. Wan, Usercentric computation offloading for edge computing. IEEE Int. Things J. 8, 12559â€“12568 (2021)
S.M. Mirjalili, S.M. Mirjalili, A. Lewis, Grey wolf optimizer. Adv. Eng. Softw. 69, 46â€“61 (2014)
S. Mirjalili, S. Saremi, S.M. Mirjalili, L.S. Coelho, Multiobjective grey wolf optimizer. Exp. Syst. Appl. 47, 106â€“119 (2016)
H. Xu, X. Liu, J. Su, An improved grey wolf optimizer algorithm integrated with Cuckoo Search, in 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) (2017)
Acknowledgements
The authors appreciate the support from guide and professors at Kalasalingam Academy of Research and Education, Kalasalingam University, Krishnan Koil, TN, India.
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
Conceptualization: B. Vijayaram; Formal Analysis: B. Vijayaram; Methodology: B. Vijayaram; Investigation: V. Vasudevan; Supervision: V. Vasudevan. All authors read and approved the final manuscript.
Authors' Information
Mr. B. Vijayaramâ€”Correspondence Author (Primary Author) is a Research Scholar in Kalasalingam Academy of Research and Education, Krishnan koil, Tamilnadu, India. Has more than 15Â years of productbased industry experience in security, industrial automation and medical radiology domain.
Sr. Prof Dr V. Vasudevanâ€”Secondary Author is working as Registrar in Kalasalingam Academy of Research and Education, Krishnan koil, Tamilnadu, India. Has a Maths PhD, headed MCA dept of Kalasalingam University from 1997 to 2003. Then headed the IT dept for over ten years. During the same period, was the chief superintend of university exams for 6 years, Dean hostels for four years, Dean admissions & dean placements for three years from 2011 to 2014. Then currently working as a Registrar from 2013. So for 25 students completed PhD under my guidance and has the credit 67 international publications. I have 25 years of experience in teaching and research experience.
Corresponding author
Ethics declarations
Consent for Publication
No individual human details, images or videos are used during the current study.
Competing Interests
The authors declare that they have no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Vijayaram, B., Vasudevan, V. Wireless edge device intelligent task offloading in mobile edge computing using hyperheuristics. EURASIP J. Adv. Signal Process. 2022, 126 (2022). https://doi.org/10.1186/s13634022009651
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13634022009651