Edge computing, which migrates compute-intensive tasks to run on the storage resources of edge devices, efficiently reduces data transmission loss and protects data privacy. However, due to limited computing resources and storage capacity, edge devices fail to support real-time streaming data query and processing. To address this challenge, first, we propose a Long Short-Term Memory (LSTM) network-based adaptive approach in the intelligent end-edge-cloud system. Specifically, we maximize the Quality of Experience (QoE) of users by automatically adapting their resource requirements to the storage capacity of edge devices through an event mechanism. Second, to reduce the uncertainty and non-complete adaption of the edge device towards the user’s requirements, we use the LSTM network to analyze the storage capacity of the edge device in real time. Finally, the storage features of the edge devices are aggregated to the cloud to re-evaluate the comprehensive capability of the edge devices and ensure the fast response of the user devices during the dynamic adaptation matching process. A series of experimental results show that the proposed approach has superior performance compared with traditional centralized and matrix decomposition based approaches.
Z. Zhou, X. Chen, E. Li, L. Zeng, K. Luo, and J. Zhang, Edge intelligence: Paving the last mile of artificial intelligence with edge computing, Proc. IEEE, vol. 107, no. 8, pp. 1738–1762, 2019.
J. Chen and X. Ran, Deep learning with edge computing: A review, Proc. IEEE, vol. 107, no. 8, pp. 1655–1674, 2019.
S. Deng, H. Zhao, W. Fang, J. Yin, S. Dustdar, and A. Y. Zomaya, Edge intelligence: The confluence of edge computing and artificial intelligence, IEEE Internet Things J., vol. 7, no. 8, pp. 7457–7469, 2020.
P. K. Ghosh, A. Chakraborty, M. Hasan, K. Rashid, and A. H. Siddique, Blockchain application in healthcare systems: A review, Systems, vol. 11, no. 1, p. 38, 2023.
J. K. Rajah, W. Chernicoff, C. J. Hutchison, P. Gonçalves, and B. Kopainsky, Enabling mobility: A simulation model of the health care system for major lower-limb amputees to assess the impact of digital prosthetics services, Systems, vol. 11, no. 1, p. 22, 2023.
Y. LeCun, Y. Bengio, and G. Hinton, Deep learning, Nature, vol. 521, no. 7553, pp. 436–444, 2015.
T. Li, X. Wang, Y. Yu, G. Yu, and X. Tong, Exploring the dynamic characteristics of public risk perception and emotional expression during the COVID-19 pandemic on Sina Weibo, Systems, vol. 11, no. 1, p. 45, 2023.
F. Wang, G. Li, Y. Wang, W. Rafique, M. R. Khosravi, G. Liu, Y. Liu, and L. Qi, Privacy-aware traffic flow prediction based on multi-party sensor data with zero trust in smart city, ACM Trans. Internet Technol., vol. 23, no. 3, p. 44, 2023.
J. P. Vaara, T. Vasankari, H. J. Koski, and H. Kyröläinen, Awareness and knowledge of physical activity recommendations in young adult men, Front. Public Health, vol. 7, p. 310, 2019.
Y. Yu, X. Si, C. Hu, and J. Zhang, A review of recurrent neural networks: LSTM cells and network architectures, Neural Comput., vol. 31, no. 7, pp. 1235–1270, 2019.
E. K. Lua, X. Zhou, J. Crowcroft, and P. Van Mieghem, Scalable multicasting with network-aware geometric overlay, Comput. Commun., vol. 31, no. 3, pp. 464–488, 2008.
Y. Han, C. Liu, S. Su, M. Zhu, Z. Zhang, and S. Zhang, A proactive service model facilitating stream data fusion and correlation, Int. J. Web Ser. Res., vol. 14, no. 3, pp. 1–16, 2017.
Y. Xu, Z. Feng, X. Zhou, M. Xing, H. Wu, X. Xue, S. Chen, C. Wang, and L. Qi, Attention-based neural networks for trust evaluation in online social networks, Inf. Sci., vol. 630, pp. 507–522, 2023.
Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, A survey on mobile edge computing: The communication perspective, IEEE Commun. Surv. Tutorials, vol. 19, no. 4, pp. 2322–2358, 2017.
M. D. de Assunção, A. da Silva Veith, and R. Buyya, Distributed data stream processing and edge computing: A survey on resource elasticity and future directions, J. Netw. Comput. Appl., vol. 103, pp. 1–17, 2018.
Q. Zhang, X. Zhang, H. Hu, C. Li, Y. Lin, and R. Ma, Sports match prediction model for training and exercise using attention-based LSTM network, Digital Commun. Netw., vol. 8, no. 4, pp. 508–515, 2022.
D. Deng, X. Li, V. Menon, J. Piran, H. Chen, and M. A. Jan, Learning-based joint UAV trajectory and power allocation optimization for secure IoT networks, Digital Commun. Netw., vol. 8, no. 4, pp. 415–421, 2022.
S. Davy, J. Famaey, J. Serrat, J. L. Gorricho, A. Miron, M. Dramitinos, P. M. Neves, S. Latre, and E. Goshen, Challenges to support edge-as-a-service, IEEE Commun. Mag., vol. 52, no. 1, pp. 132–139, 2014.
M. K. Hussein, M. H. Mousa, and M. A. Alqarni, A placement architecture for a container as a service (CaaS) in a cloud environment, J. Cloud Comput., vol. 8, p. 7, 2019.
X. Wang, L. T. Yang, X. Xie, J. Jin, and M. J. Deen, A cloud-edge computing framework for cyber-physical-social services, IEEE Commun. Mag., vol. 55, no. 11, pp. 80–85, 2017.
X. Wang, L. T. Yang, J. Feng, X. Chen, and M. J. Deen, A tensor-based big service framework for enhanced living environments, IEEE Cloud Comput., vol. 3, no. 6, pp. 36–43, 2016.
Y. Xu, L. Qi, W. Dou, and J. Yu, Privacy-preserving and scalable service recommendation based on SimHash in a distributed cloud environment, Complexity, vol. 2017, p. 3437854, 2017.
H. Cai, V. W. Zheng, and K. C. C. Chang, A comprehensive survey of graph embedding: Problems, techniques, and applications, IEEE Trans. Knowl. Data Eng., vol. 30, no. 9, pp. 1616–1637, 2018.
A. Sherstinsky, Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network, Phys. D: Nonlinear Phenom., vol. 404, p. 132306, 2020.
F. Tacchino, P. Barkoutsos, C. Macchiavello, I. Tavernelli, D. Gerace, and D. Bajoni, Quantum implementation of an artificial feed-forward neural network, Quantum Sci. Technol., vol. 5, no. 4, p. 044010, 2020.
A. O. Almagrabi and A. Bashir, A classification-based privacy-preserving decision-making for secure data sharing in internet of things assisted applications, Digital Commun. Netw., vol. 8, no. 4, pp. 436–445, 2022.
C. Wang, X. Wu, G. Liu, T. Deng, K. Peng, and S. Wan, Safeguarding cross-silo federated learning with local differential privacy, Digital Commun. Netw., vol. 8, no. 4, pp. 446–454, 2022.
Y. Zheng, Z. Li, X. Xu, and Q. Zhao, Dynamic defenses in cyber security: Techniques, methods and challenges, Digital Commun. Netw., vol. 8, no. 4, pp. 422–435, 2022.
X. Luo, W. Qin, A. Dong, K. Sedraoui, and M. Zhou, Efficient and high-quality recommendations via momentum-incorporated parallel stochastic gradient descent-based learning, IEEE/CAA J. Autom. Sin., vol. 8, no. 2, pp. 402–411, 2021.
L. Qi, W. Lin, X. Zhang, W. Dou, X. Xu, and J. Chen, A correlation graph based approach for personalized and compatible web APIs recommendation in mobile APP development, IEEE Trans. Knowl. Data Eng., vol. 35, no. 6, pp. 5444–5457, 2023.
S. Lipošek, J. Planinšec, B. Leskošek, and A. Pajtler, Physical activity of university students and its relation to physical fitness and academic success, Ann. Kinesiologiae, vol. 9, no. 2, pp. 89–104, 2019.
S. Lai, K. Liu, S. He, and J. Zhao, How to generate a good word embedding, IEEE Intell. Syst., vol. 31, no. 6, pp. 5–14, 2016.
F. Wang, H. Zhu, G. Srivastava, S. Li, M. R. Khosravi, and L. Qi, Robust collaborative filtering recommendation with user-item-trust records, IEEE Trans. Comput. Soc. Syst., vol. 9, no. 4, pp. 986–996, 2022.
L. Qi, Y. Yang, X. Zhou, W. Rafique, and J. Ma, Fast anomaly identification based on multiaspect data streams for intelligent intrusion detection toward secure industry 4.0, IEEE Trans. Ind. Inf., vol. 18, no. 9, pp. 6503–6511, 2022.