 Research
 Open access
 Published:
Computation bits maximization in backscatterassisted wirelesspowered NOMAMEC networks
EURASIP Journal on Wireless Communications and Networking volume 2022, Article number: 23 (2022)
Abstract
In the field of InternetofThings (IoT), how to enhance the computation capacity and prolong the life span of massive smart IoT nodes is becoming a more practically important but challenging problem. In this paper, we propose a backscatterassisted wirelesspowered nonorthogonal multiple access (NOMA)mobile edge computing (MEC) network, where IoT nodes harvest energy from signals transmitted by a dedicated energy source and then offload data to the MEC server via backscattering and uplink NOMA. To exploit its potential performance, we formulate a nonconvex problem to maximize the total computation bits of all the IoT nodes by jointly optimizing the communication resource of each IoT node and the computation resource of both the IoT nodes and the MEC server. By introducing a slack variable and a series of auxiliary variables as well as using the contradiction and inequality transformation approaches, we transform the original nonconvex problem into a convex one and devise an iterative algorithm to optimally solve it. Simulation results are provided to demonstrate the quick convergence of the proposed iterative algorithm and to confirm the superiority of the proposed scheme over the existing benchmark schemes.
1 Introduction
With the development of Internet of Things (IoT), an increasing number of IoT nodes will be deployed to monitor, sense, collect, and analyze enormous data timely for intelligent services [1]. Due to the limitations of both the production cost and size, most of IoT nodes are typically energy and computationconstraint, which imposes high requirements on energy and computation resources [2, 3]. In order to address the above challenges, wirelesspowered mobile edge computing (MEC) has been proposed by leveraging the ability of wireless power transfer [4] and MEC [5]. To be specific, in wirelesspowered MEC, IoT nodes harvest energy from a dedicated energy source (ES) on demand and then use the harvested energy to support their local computation and data offloading. Accordingly, how to schedule communication and computational resources for energy harvesting (EH), data offloading and computation is vital to the achievable performance of wirelesspowered MEC.
Until now, there are many investigations regarding binary or partial offloadingbased resource allocation in wirelesspowered MEC networks. In the binary offloading, the task bits of an IoT node are either locally computed or offloaded to the MEC server, while in the partial offloading, the task bits of an IoT node are split into two parts: one for local computation and the remaining for data offloading [3]. The authors of [6] studied the successful computation probability maximization problem in a wirelesspowered MEC network with a single IoT node by jointly optimizing the binary offloading decision and the IoT node’s computation frequency and local computation time. The single IoT user scenario [6] was extended into multiuser wirelesspowered MEC, where the authors maximized the weighted sum computation bits under the timeblock [7] and timevarying [8] channels, respectively. Considering the partial offloading, the authors in [9] maximized the weighted sum computation bits of all the IoT nodes by jointly optimizing the beamforming of the ES, the IoT nodes’ computation frequencies and offloading time and the task bits for data offloading and local computation. By optimizing the same variables as [9], the authors in [10] studied the energy minimization problem while satisfying the data computation requirement of all IoT nodes.
The above works [6,7,8,9,10] assumed that all IoT nodes offload data bits to the MEC server via orthogonal multiple access (OMA). Recall that nonorthogonal multiple access (NOMA) achieves a better transmission performance than OMA in terms of spectrum and energy efficiencies. Recent works have integrated NOMA for data offloading into wirelesspowered multiuser MEC and validated its superior performance compared to wirelesspowered OMAMEC. The author in [11] maximized the sum computation bits in a wirelesspowered multiuser NOMAMEC by jointly optimizing the binary offloading decision, local computation frequency, transmit power, EH and data offloading time of each IoT node. Considering the partial offloading in wirelesspowered NOMAMEC, the energy efficiency was maximized from the system centric [12] perspective. The authors in [13] considered a user cooperation enabled wirelesspowered NOMAMEC network and minimized the energy consumed by all the IoT nodes via jointly optimizing the IoT node’s EH time and computation frequency, the IoT node’s transmit power, and the tasks bits for local computation and offloading.
In the above works [6,7,8,9,10,11,12,13], the data offloading was achieved following the harvestthentransmit protocol via active radios (ARs) that require powerhungry components such as oscillators [14, 15]. Due to the energycausality constraint for each IoT node, it has to allocate more resources for EH in each transmission block, leaving a short time for AR based data offloading and limiting task offloading performance of each IoT node. In contrary to AR, backscatter communication (BackCom) is receiving much attention due to its extralow power consumption and thus, has been considered for data offloading in wirelesspowered MEC [16]. The key idea of BackCom is to allow an IoT node modulating and backscattering its information on the incident signal, resulting in an extralow power consumption but with a lower transmission rate than AR [15]. To exploit the different tradeoffs between power consumption and transmission rate for AR and BackCom, hybrid ARBackCom has been used for data offloading in wirelesspowered MEC networks [17, 18]. The authors in [18] considered a hybrid ARBackCombased wirelesspowered MEC and minimized the energy consumption of the ES by jointly optimizing the EH time, AR, and BackCom under the complete offloading where all the IoT nodes’ task bits are offloaded to the MEC server. Under the same scenario, the computation energy efficiency of all the IoT nodes was maximized [19]. Considering the partial offloading, the authors in [20] jointly optimized the time for AR, BackCom and EH, the IoTs’ transmit power for ARbased offloading, and the portions of task bits for local computation and offloading to maximize the weighted sum computation bits of all IoT nodes. Considering the same network and optimization variables as [20], the maxmin computation energy efficiency among IoT nodes and the total delay for data offloading and computing of all IoT nodes were studied in [21] and [22], respectively.
These works [17,18,19,20,21,22] have validated that leveraging hybrid ARBackCom for offloading is capable of improving the computational performance of wirelesspowered MEC networks. We note that the previous works [6,7,8,9,10] have confirmed that employing NOMA for offloading achieves a better performance than OMA. However, such a advantage has not been exploited in hybrid ARBackCom wirelesspowered MEC since [17, 18, 20,21,22] only considered OMA for ARbased data offloading, and this motivates this work. Besides, this work also considers the limited computation capacity of the MEC server, which removes the ideal assumption that the MEC server’s computation capacity is unlimited in existing works and makes this work more practical.
In this paper, we propose a backscatteredassisted wirelesspowered NOMAMEC network that consists of one ES, multiple IoT nodes and one MEC server, and aim to develop a resource allocation scheme to maximize the total computation bits of all IoT nodes while considering the computation resource allocation at the MEC server. The main contributions are as listed below.

We formulate an optimization problem to maximize the total computation bits of all IoT nodes by jointly optimizing the EH time, BackCom time, and uplink NOMA time of the IoT node, the power reflection coefficient and the transmit power of each IoT node, the computing frequencies and time at both the MEC server and the IoT nodes. The formulated problem is nonconvex and challenging to solve due to the following reasons. First, the optimization of the MEC server’s computation time and frequency introduces a min function in the objective function and more coupled optimization variables in both the objective function and constraints. Second, the optimization of the IoT node’s transmit power during uplink NOMA results in a difference of convex (DC) structure.

We first transform the original problem into an equivalent convex one and then propose an iterative algorithm to obtain the optimal solution. To be specific, a slack variable and the contradiction approach are introduced to remove the min function from the objective function and determine partial optimal solutions, respectively. Then, we employ an inequality transformation approach to address the DC structure and obtain a subproblem with given parameters that are from the used inequality transformation approach. By doing so, the optimal solution can be obtained by solving the subproblem and update the given parameters iteratively. Further, the subproblem is transformed into a convex one by constructing a series of auxiliary variables to decouple the coupled variables. On this basis, an efficient iterative algorithm is developed for obtaining the optimal solution.
The remainder of the whole paper is organized as follows. The system model is clarified in Sect. 2. In Sect. 3, a system computation bits maximization problem for the backscatteredassisted wirelesspowered NOMAMEC network is formulated by jointly optimizing the computing frequencies and time of the MEC server and the IoT nodes, the EH time, the BackCom time, the uplink NOMA time, etc., and then, based on the contradiction approach, the inequality transformation approach and variable replacement, an efficient iterative algorithm is proposed to obtain the optimal solutions. Simulation results are presented in Sect. 4. The conclusion of this work can be found in Sect. 5.
2 Method
2.1 System model
In this work, we consider a backscatterassisted wirelesspowered NOMAMEC network as shown in Fig. 1, where K IoT nodes harvest energy from energy signals transmitted by a nearly deployed ES and upload their tasks to the MEC server for computation as well as perform local computation. Each IoT node has separate EH, offloading and computing circuits so that the IoT node can compute tasks locally when offloading tasks or harvesting energy. Following [4,5,6], we assume that the consumed energy at each IoT node for task offloading and local computing is less than or equal to its harvested energy so as to avoid drawing energy from its battery. Following [7], we assume that each IoT node can adjust its computing frequency using the dynamic voltage scaling (DVS) technology. We assume that the data bits of each task are bitwise independent so that the partial offloading scheme is employed at each IoT node to determine how many tasks should be processed locally/offloaded to the MEC server. Assume that the channels from the IoT nodes to the ES or the MEC server are quasistatic fading and remain static within one transmission block but vary among different blocks. Perfect channel state information (CSI) is assumed and available at the MEC server. On this basis, the MEC server can determine the optimal resource allocation scheme and feed it back to all the IoT nodes and the ES at the beginning of each transmission block. Following [6,7,8], all the devices in the considered network are assumed to be time synchronized.
Let T denote the time duration of the whole transmission block. According to the behaviors of the IoT nodes, the transmission block can be divided into five phases. The first phase is the EH phase, where the ES broadcasts energy signals and all the IoT nodes operate in the EH mode. The second phase is called as the BackCom phase, in which all the IoT nodes take turn to offload their tasks via BackCom and the MEC server can receive the offloading tasks accordingly. The third phase is the uplink NOMA phase, where the ES keeps silent and all the IoT nodes offload tasks to the MEC server simultaneously via uplink NOMA. The fourth phase is the task execution phase. In this phase, all the IoT nodes stop offloading tasks, and the MEC server executes all the received computation tasks to obtain the computation results. These results will be broadcasted to all the IoT nodes in the fifth phase, namely the downloading phase. Following [17, 18, 20,21,22], we assume that the downloading time of the MEC server is negligible compared with the offloading time and the computing time since the computation results of the MEC server are usually just a few bits in some scenarios, and the transmit power of the MEC server is much larger than IoT nodes. Therefore, the downloading phase of each transmission block will be ignored hereafter.
2.2 EH phase
Let \(\tau _{\mathrm{e}}\) (\(0\le \tau _{\mathrm{e}} \le T\)) and \(P_{\mathrm{s}}\) denote the duration of the EH phase and the ES’s transmit power, respectively. This work considers a linear EH model by following the existing works, i.e., [7], where \(\eta\) (\(0<\eta <1\)) is the energy conversion efficiency and fixed as a constant. Then, the kth IoT node’s harvested energy in this phase can be calculated as \(E^{\mathrm{h}}_k=\tau _{\mathrm{e}}\eta P_{\mathrm{s}}g_k\), where \(g_k\) is the channel power gain between the ES and the kth IoT node, and \(k\in {{\mathcal {K}}}=\{1,2,...,K\}\).
2.3 BackCom phase
In order to avoid the mutual interference among different IoT nodes, the BackCom phase will be divided into K subphases. In each subphase, a specific IoT node performs task offloading via BackCom while the other IoT nodes perform EH. Let \(\rho _k\) (\(0\le \rho _k\le 1\)) be the power reflection coefficient of the kth IoT node based on which the received signals at the kth IoT node can be divided into two parts. In particular, a \(\rho _k\) portion of the received signals at the kth IoT node will be used as the vehicle that carries the kth IoT node’s information via advanced modulation schemes and then be backscattered to the MEC server for task offloading, while the others are flowed into the EH circuit for EH.
For backscattering, let \(t_{k}^{\mathrm{b}}\) denote the BackCom time of the kth IoT node. Then, the offloading task bits at the kth IoT node can be computed as
where W denotes the channel bandwidth, \(\xi\) represents the performance gap reflecting the real modulation [23, 24], \(h_k\) is the channel power gain between the MEC server and the kth IoT node, and \(\sigma ^2\) denotes the noise power spectral density. In this work, the ES serves only as a RF power source, and the RF signal from the ES can be predetermined and known to the MEC server. By using the existing channel estimation methods, the MEC server can obtain the CSI of the EStothe MEC server link. Accordingly, the MEC server can remove the interference from the ES by performing successive interference cancellation (SIC).
For EH, both the backscatter IoT node and nonbackscatter IoT nodes can perform EH during each subphase. Specifically, in the subphase \(t_{k}^{\mathrm{b}}\), the harvested energy of the kth IoT node and the ith (\(i\in {{\mathcal {K}}} \backslash k\)) IoT node are given by \(E_k^{\mathrm{b}}=t_{k}^{\mathrm{b}}\eta \left( 1\rho _k\right) P_{\mathrm{s}}g_k\) and \(E_{k,i}^{\mathrm{b}}=t_{k}^{\mathrm{b}}\eta P_{\mathrm{s}}g_i\), respectively, where \(\eta\) is the energy harvesting efficiency [4]. On this basis, we can calculate the total harvested energy of the kth IoT node at the end of the BackCom phase as
As for the energy consumption in this phase, we assume a constant circuit power consumption for BackCom by following [20] and [21], where the energy consumption of BackCom is the product of the power consumption rate and the BackCom time. In particularly, let \(P_{{\mathrm{c}},k}\) denote the circuit power consumption for BackCom. Then, the energy consumption of the kth IoT node in this phase is determined by \(P_{{\mathrm{c}},k}t_{k}^{\mathrm{b}}\).
2.4 Uplink NOMA phase
Let \(t_{\mathrm{a}}\) denote the duration of the uplink NOMA phase. Following [12], we assume that the channel gains between the IoT nodes and the MEC server are ranked in an descending order, i.e., \(h_{1} \ge h_{2} \ge \cdots \ge h_{K}\) and the MEC server adopts a fixed decoding order to decode the offloading tasks of each IoT node in this phase by means of SIC technology. Specifically, the MEC server decodes the information of the ith IoT node first, subtracts it from the received composite signal and then, continues to decode the information from the \((i+1)\)th IoT node, until the information from all the IoT nodes is decoded. Note that such a decoding order allows decoding the weakest IoT node’s information without interference, thus, maximizing the sum uplink offloading task bits. Including the decoding order in the joint optimization may further improve the system computation bits, while it is outside the scope of this work and will be studied in our future work. Denote \(p_k\) as the transmit power of the kth IoT node in the uplink NOMA phase. Then, the achievable computation bits of the kth IoT node in this phase is given by
Accordingly, at the end of the uplink NOMA phase, the total achievable task bits offloaded by all the IoT nodes can be computed as
2.5 Task execution phase
In this phase, the MEC server will execute all the received computation tasks. Here, we consider a limited computation capacity at the MEC server. That is to say, all the received tasks may not be computed within the task execution phase and the effective computation bits at the MEC server depends on both its computation capacity and received computation tasks. Let \(f_{\mathrm{m}}\) and \(t_{\mathrm{c}}\) denote the computing frequency of the MEC server and the duration of the task execution phase, respectively. Then, we can compute the MEC server’s computation capacity as \(C_{\mathrm{cc}}=\frac{{t_{\mathrm{c}}{f_{\mathrm{m}}}}}{{{C_{{\mathrm{cpu}}}}}}\), where \(C_{{\mathrm{cpu}}}\) is the number of CPU cycles required for computing one bit at the MEC server. On this basis, the effective computation bits at the MEC server, which are decided by the minimum between the received tasks and the computation capacity, are given by
2.6 Local computation
For local computing, let \(\tau _k\) and \(f_k\) denote the computing frequency and time of the kth IoT node, respectively. Then, the effective computation bits at the kth IoT node can be computed as
where \(C_{{\mathrm{cpu}},k}\) denotes the number of CPU cycles required for computing one bit at the kth IoT node. For each IoT node, its harvested energy is used to support the local computation. Let \(\varepsilon _{k}\) denote the effective capacitance coefficient of the processor’s chip of the kth IoT node. Then, the energy consumption for local computing at the kth IoT node is given by [7]
3 Computation bits maximization
In this section, we aim to design an optimal resource allocation scheme to maximize the total computation bits for the backscatterassisted wirelesspowered NOMAMEC network with the MEC server’s limited computation capacity considered. In particular, we first formulate a computation bits maximization problem by jointly optimizing the time allocation among EH, BackCom, uplink NOMA and task execution, the power reflection coefficient and the transmit power of each IoT node, the computing frequencies and time at both the MEC server and the IoT nodes, subject to multiple constraints, i.e., qualityofservice (QoS), energy causality, latency, etc. Then, we transform the formulated nonconvex problem into a convex one by means of many convex tools and develop an efficient iterative algorithm to solve it.
3.1 Problem formulation
In order to formulate the optimization problem, we should create the optimization objective and several constraints (such as QoS and energy causality constraints) first. The optimization objective is to maximize the total computation bits of the considered network and thus, includes the computation bits of both the MEC server and IoT nodes. Accordingly, the optimization objective can be written as
where \(\mathbf{t ^{\mathrm{b}}}=\left[ {t_1^{\mathrm{b}}, \ldots ,t_K^{\mathrm{b}}} \right]\), \({\varvec{\rho }}=\left[ {{\rho _1}, \ldots ,{\rho _K}} \right]\), \(\mathbf{p }=\left[ {{p_1}, \ldots ,{p_K}} \right]\), \(\mathbf{f }=\left[ {{f_1}, \ldots ,{f_K}} \right]\) and \({\varvec{\tau }}=\left[ {{\tau _1}, \ldots ,{\tau _K}} \right]\).
3.1.1 QoS constraint
This constraint is used to guarantee the minimum required computation task bits of each IoT node, which can be expressed as the computation bits of the kth IoT node are not less than its minimum required computation task bits, denoted by \(L_{\min ,k}\). Due to the limitation of the computation capacity at the MEC sever, it is hard to characterize how many offloading tasks of each IoT node are executed by the MEC server. To solve this problem, we introduce an auxiliary variable \(\alpha _k\) (\(0\le \alpha _k\le 1\)) and use \(\alpha _kL_{\min ,k}\) to denote how many required computation bits should be offloaded and executed at the MEC server. On this basis, we can denote the QoS constraint of the kth IoT node as the following three inequalities, i.e.,
where (9) and (10) jointly ensure that the required computation bits offloaded by the kth IoT node, \({\alpha _k}{L_{\min ,k}}\), can be computed successfully at the MEC server, while (11) is used to ensure that \(\left( {1  {\alpha _k}} \right) {L_{\min ,k}}\) can be computed locally. Combining (9), (10) and (11), the QoS constraint of the kth IoT can be guaranteed.
3.1.2 Energycausality constraint
In order to avoid using the battery power of each IoT node and prolong their operation time, we consider the energycausality constraint, which ensures that the energy consumption of each IoT node for offloading and computing is no more than its harvested energy within each transmission block. Accordingly, the energycausality constraint of the kth IoT node is given by
where \({p_{{\mathrm{c}},k}}\) denotes the circuit energy consumption of the kth IoT node during the uplink NOMA phase.
3.1.3 Computation bits maximization problem formulation
Based on (8), (9), (10), (11) and (12), we can formulate the computation bits maximization problem as
where \({\varvec{\alpha }}=[\alpha _1,\ldots ,\alpha _K]\), and \(f_k^{\mathrm{max}}\) and \(f_{\mathrm{max}}\) are the maximum computing frequencies at the kth IoT node and the MEC server, respectively.
In \({\mathbf{P }_\mathbf{1 }}\), \(\mathrm {C}1\) and \(\mathrm {C}2\) are the QoS constraint and the energycausality constraint for each IoT node. \(\mathrm {C}3\) and \(\mathrm {C}4\) are the latency constraints which guarantee that all the computation tasks should be executed within the transmission block. \(\mathrm {C}5\) demonstrates the limitation of the computation capacity at both the MEC server and the IoT nodes. From \({\mathbf{P }_\mathbf{1 }}\), we can observe that \({\mathbf{P }_\mathbf{1 }}\) is a highly nonconvex problem due to the following three reasons. Firstly, the objective function is very complicated due to the min function brought by the MEC server’s limited computation capacity and coupled variables. Secondly, \(\mathrm {C}1\) is highly nonconvex since the mutual interference among different IoT nodes in the uplink NOMA phase exists, leading to coupled relationships among several variables. Note that these coupled relationships cannot be tackled by using existing convex tools, i.e., variable substitution, etc., resulting in a new challenge to solve \({\mathbf{P }_\mathbf{1 }}\). Thirdly, \(\mathrm {C}2\) is a nonconvex constraint due to the existence of coupled variables, i.e., \(f_k\) and \(\tau _k\), \(\rho _k\) and \(t_k^{\mathrm{b}}\), etc.
In order to solve \({\mathbf{P }_\mathbf{1 }}\), we will explore the closedform expressions for parts of the optimal solutions first to simplify the original nonconvex problem. Then, we transform the simplified but still nonconvex problem into a more traceable problem and propose an efficient iterative algorithm to obtain the solutions.
3.2 Problem transformation and solution
To simplify the objective function in \({\mathbf{P }_\mathbf{1 }}\), we introduce a slack variable \(\lambda\) to remove the min function by letting \(\lambda = \min \left\{ {{C_{{\mathrm{off}}}},{C_{{\mathrm{cc}}}}} \right\}\). Then, \({\mathbf{P }_\mathbf{1 }}\) can be transformed as
In order further simplify \({\mathbf{P }_\mathbf{2 }}\), the following proposition is provided to determine the optimal computing frequency of the MEC server \(f^*_{\mathrm{m}}\) and the optimal computing time of the kth IoT node \(\tau ^*_{k}\).
Proposition 1
In order to achieve the maximum computation bits of the considered network, the MEC server should use its maximum allowed computing frequency to execute the received tasks and each IoT node will perform local computing during the whole transmission block, namely \(f^*_{\mathrm{m}}=f_{\max }\) and \(\tau ^*_{k}=T\).
Proof
Please see “Appendix A”. \(\square\)
Based on Proposition 1, we substitute \(f_{\mathrm{m}}=f_{\max }\) and \(\tau _{k}=T\) into \({\mathbf{P }_\mathbf{2 }}\) and \({\mathbf{P }_\mathbf{2 }}\) can be rewritten as
Although \({\mathbf{P }_\mathbf{3 }}\) is simplified, it is still nonconvex due to the nonconvex constraints caused by the coupled variables. To tackle this problem, we introduce the following auxiliary variables, i.e., \(\phi _k=\rho _kt_k^{\mathrm{b}}\) and \(P_k=t_{\mathrm{a}}p_k\), into \({\mathbf{P }_3}\) and then, we have \({\mathbf{P }_4}\), given as
where \({\varvec{\phi }}=[\phi _1,\ldots ,\phi _K]\), \(\mathbf{P }=[P_1,\ldots ,P_K]\), \({F_k}\left( {t_k^{\mathrm{b}},{\phi _k}} \right) = t_k^{\mathrm{b}}W{\log _2}\left( {1 + \frac{{\xi {\phi _k}{P_{\mathrm{s}}}{g_k}{h_k}}}{{t_k^{\mathrm{b}}W{\sigma ^2}}}} \right)\) with \(k\le K\), \(F_k^{\mathrm{N}}\left( {\mathbf{P },{t_{\mathrm{a}}}} \right) = W{t_{\mathrm{a}}}{\log _2}\left( {1 + \frac{{{P_k}{h_k}}}{{\sum \limits _{i = k + 1}^K {{P_i}{h_i}} + {t_{\mathrm{a}}}W{\sigma ^2}}}} \right)\) with \(k\le K1\) and \(F_K^{\mathrm{N}}\left( {{P_K},{t_{\mathrm{a}}}} \right) = W{t_{\mathrm{a}}}{\log _2}\left( {1 + \frac{{{P_K}{h_K}}}{{{t_{\mathrm{a}}}W{\sigma ^2}}}} \right)\).
Proposition 2
In \({\mathbf{P }_4}\), both the objective function and constraints except \({\mathrm{C1}}^{\prime\prime}\) are convex.
Proof
Please see “Appendix B”. \(\square\)
According to Proposition 2, it can be observed that \({\mathbf{P }_4}\) is not convex due to the fact that \({\mathrm{C1}}^{\prime\prime}\) is nonconvex. By observing \({\mathrm{C1}}^{\prime\prime}\), we find that the cochannel interference caused by the uplink NOMA makes \(F_k^{\mathrm{N}}\left( {\mathbf{P },{t_{\mathrm{a}}}} \right)\) jointly nonconcave with respect to \(\left\{ {{P_k}} \right\} _{k = 1}^{K  1}\) and \({t_{\mathrm{a}}}\), leading to a nonconvex \({\mathrm{C1}}^{\prime\prime}\).
In the following part, we aim to deal with the nonconvexity of \({\mathrm{C1}}^{\prime\prime}\). From \(F_k^{\mathrm{N}}\left( {\mathbf{P },{t_{\mathrm{a}}}} \right)\), we can see that the main difficulty comes from the DC structure. To address this problem, we introduce a specific inequality to relax \(F_k^{\mathrm{N}}\left( {\mathbf{P },{t_{\mathrm{a}}}} \right)\). Specifically, we first replace \(F_k^{\mathrm{N}}\left( {\mathbf{P },{t_{\mathrm{a}}}} \right)\) with its low bound based on the above inequality and then, obtain a subproblem with given parameters which are from the used inequality. Compared to the problem \({\mathbf{P }_4}\), the subproblem is more traceable and can be solved by means of the existing convex tools. On this basis, we can develop an efficient iterative algorithm to solve \({\mathbf{P }_4}\), where in each iteration, we just need to solve the subproblem with given parameters instead of \({\mathbf{P }_4}\). When we achieve the optimal solution to the subproblem with given parameters, we can update the parameters of the inequality based on the achieved solution and repeat the above steps until the lower bound is tight.
The following theorem [25] provides an inequality to relax the function with the DC structure.
Theorem 1
For \(\theta , {{\tilde{\theta }} }>0\), we have the following inequality: \(\log _2 \left( {1 + \theta } \right) \ge \varpi \log _2 \left( \theta \right) + \mu\) with the constant parameters \(\varpi = \frac{{{\tilde{\theta }} }}{{1 + {\tilde{\theta }} }}\) and \(\mu = \log _2 \left( {1 + {\tilde{\theta }} } \right)  \varpi \log _2 \left( {{\tilde{\theta }} } \right)\), where the lower bound is tight at \({\tilde{\theta }}=\theta\).
According to Theorem 1, we have the following inequality
where \(\varpi _k\) and \(\mu _k\) (\(k\le K\)) are given parameters in one iteration and decided by the solution obtained in the previous iteration. For example, let \(\bigg \{ \tau _{\mathrm{e}}^{(i)},\left\{ {t_k^{{\mathrm{b}}(i)}} \right\} _{k = 1}^K,t_{\mathrm{a}}^{(i)},\left\{ {\phi _k^{(i)}} \right\} _{k = 1}^K,\left\{ {P_k^{(i)}} \right\} _{k = 1}^K,\left\{ {f_k^{(i)}} \right\} _{k = 1}^K,\) \(t_{\mathrm{c}}^{(i)},\left\{ {\alpha _k^{(i)}} \right\} _{k = 1}^K,{\lambda ^{(i)}} \bigg \}\) denote the obtained solution in the ith iteration. Then, in the \(i+1\)th iteration, the parameters at the kth IoT node, \(\varpi ^{(i+1)}_k\) and \(\mu ^{(i+1)}_k\), can be updated as
Based on (13), (18) and (19), \({\mathbf{P }_4}\) can be relaxed as the subproblem in the \(i+1\)th iteration, given by
where \({\mathrm{C2}}^{\prime\prime\prime},{\mathrm{C3}}^{\prime},{\mathrm{C5}}^{\prime\prime},{\mathrm{C6}}^{\prime\prime},{\mathrm{C7}}^{\prime},{\mathrm{C8}}^{\prime\prime},{\mathrm{C9}}^{\prime\prime}\) and \({\mathrm{C10}}^{\prime\prime}\) are transformed from \({\mathrm{C2}}^{\prime\prime},{\mathrm{C3}},\) \({\mathrm{C5}}^{\prime},{\mathrm{C6}}^{\prime},{\mathrm{C7}},{\mathrm{C8}}^{\prime},{\mathrm{C9}}^{\prime}\) and \({\mathrm{C10}}^{\prime}\) by replacing \(\left\{ {\tau _{\mathrm{e}}},{\mathbf{t }^{\mathrm{b}}},{{{t}}_{\mathrm{a}}},{\varvec{\phi }} ,\mathbf{P },\mathbf{f },{t_{\mathrm{c}}},\alpha ,\lambda \right\}\) with the following term, given by
As for \({\mathbf{P }_5}\), it is still nonconvex due to the following nonconcave function, given as
Thus, we further introduce the following auxiliary variables \({x^{(i+1)}_k} = {t^{(i+1)}_{\mathrm{a}}}{\log _2}\left( {\frac{{{P^{(i+1)}_k}}}{{{t^{(i+1)}_{\mathrm{a}}}}}} \right)\), \(k \le K\) into \({\mathbf{P }_5}\), and we have \({P^{(i+1)}_k} = {t^{(i+1)}_{\mathrm{a}}}{2^{\frac{{{x^{(i+1)}_k}}}{{{t^{(i+1)}_{\mathrm{a}}}}}}},k \le K\). Substituting \({P^{(i+1)}_k} = {t^{(i+1)}_{\mathrm{a}}}{2^{\frac{{{x^{(i+1)}_k}}}{{{t^{(i+1)}_{\mathrm{a}}}}}}},k \le K\) into \({\mathbf{P }_5}\), \({\mathbf{P }_5}\) can be transformed into
where
with \(k\le K1\) and
with \(k=K\).
Proposition 3
\({\mathbf{P }_6}\) is a convex problem, which can be solved by the existing convex tools.
Proof
Please see “Appendix C”. \(\square\)
3.3 Design of the iterative algorithm
In this subsection, we provide an efficient iterative algorithm to solve \({\mathbf{P }_4}\), which is shown in Algorithm 1 at the top of the next page. Specifically, in the \(i+1\)th iteration, we should solve \(\mathbf{P} _6\) with given \(\varpi _k^{(i+1)}\) and \(\mu _k^{(i+1)}\), \(\forall k\) and obtain its optimal solution, denoted by \(\bigg \{ \tau _{\mathrm{e}}^{(i+1)},\left\{ {t_k^{{\mathrm{b}}(i+1)}} \right\} _{k = 1}^K,t_{\mathrm{a}}^{(i+1)},\) \(\left\{ {\phi _k^{(i+1)}} \right\} _{k = 1}^K,\left\{ {x_k^{(i+1)}} \right\} _{k = 1}^{K},\) \(\left\{ {f_k^{(i+1)}} \right\} _{k = 1}^K,t_{\mathrm{c}}^{(i+1)},\left\{ {\alpha _k^{(i+1)}} \right\} _{k = 1}^K,{\lambda ^{(i+1)}} \bigg \}\). On this basis, the IoT nodes’s optimal transmit powers \(\{p^*_k\}_{k=1}^K\), reflection coefficients \(\{\rho ^*_k\}_{k=1}^K\) and computing frequencies \(\left\{ {f_k^*} \right\} _{k = 1}^K\) as well as the optimal time allocation at both IoT nodes and the MEC server \(\tau _{\mathrm{e}}^*,\left\{ {t_k^{{\mathrm{b*}}}} \right\} _{k = 1}^K,t_{\mathrm{a}}^*,t_{\mathrm{c}}^*\) are obtained. Then, we can compute the maximum computation bits of the system \(C^*_{\mathrm{tot}}={{\lambda ^{\left( {i + 1} \right) }} + \sum \nolimits _{k = 1}^K {\frac{{f_k^{(i + 1)}T}}{{{C_{{\mathrm{cpu}},k}}}}} }\). If the stop condition is satisfied, then the obtained solution \(\{ \tau _{\mathrm{e}}^*,\left\{ {t_k^{{\mathrm{b*}}}} \right\} _{k = 1}^K,t_{\mathrm{a}}^*,t_{\mathrm{c}}^*,\left\{ {f_k^*} \right\} _{k = 1}^K,\{ p_k^*\} _{k = 1}^K,\{ \rho _k^*\} _{k = 1}^K\}\) is the solution to \({\mathbf{P }_4}\) and the maximum computation bits of the system are given by \(C^*_{\mathrm{tot}}\). Otherwise, we should update \(\varpi _k^{(i+1)}\) and \(\mu _k^{(i+1)}\), \(\forall k\) based on the obtained solution by following (18) and (19) and repeat the above steps. Please note that the proposed iterative algorithm can always converge since the iteration to update \(\varpi _k\) and \(\mu _k\) always converges and the detailed proof can be refer to [25].
4 Experiments and results discussion
4.1 Experiments
This section is provided to verify the effectiveness and the superiority of the proposed scheme by means of MATLAB. Unless otherwise specified, we set the basic simulation parameters as follows. Specifically, we set \(T=1\) s, \(W=100\) kHz, \(P_{\mathrm{s}}=30\) dBm, \(K=4\), \(\sigma ^2=120\) dBm/Hz, \(f_{\mathrm{max}}=10\) GHz, \(\xi =15\) dB, \(\eta =0.7\), \(C_{{\mathrm{cpu}}}=1000\) Cycles/bit, \(P_{{\mathrm{c}},1}=P_{{\mathrm{c}},2}=P_{{\mathrm{c}},3}=P_{{\mathrm{c}},4}=10\) \(\mu\)W, \(\varepsilon _1=\varepsilon _2=\varepsilon _3=\varepsilon _4=10^{26}\), \(f_1^{\mathrm{max}}=f_2^{\mathrm{max}}=f_3^{\mathrm{max}}=f_4^{\mathrm{max}}=500\) MHz, \(C_{{\mathrm{cpu}},1}=C_{{\mathrm{cpu}},2}=C_{{\mathrm{cpu}},3}=C_{{\mathrm{cpu}},4}=1000\) Cycles/bit and \(L_{{\min },1}=L_{{\min },2}=L_{{\min },3}=L_{{\min },4}=L_{{\min }}=100\) kbits. Here, we consider the standard channel fading model, where the channel gain of each channel is modeled by the product of the smallscale fading and the largescale fading. Let \(g_k^{\prime}\) and \(h_k^{\prime}\), \(\forall k\), denote the smallscale fadings from the kth IoT node to the ES and the MEC server, respectively. Likewise, denote \(D_{{\mathrm{s}},k}\) and \(D_{{\mathrm{e}},k}\) as the distance from the kth IoT node to the ES and the MEC server. The channel gains of the ESthe kth IoT node link and the MEC serverthe kth IoT node link are given by \(g_k=g'_kD_{{\mathrm{s}},k}^{\beta }\) and \(h_k=h'_kD_{{\mathrm{e}},k}^{\beta }\), where \(\beta\) denotes the path loss exponent. In this work, we set \(\beta =2.7\), \(D_{{\mathrm{s}},1}=13\) m, \(D_{{\mathrm{s}},2}=10\) m, \(D_{{\mathrm{s}},3}=11\) m, \(D_{{\mathrm{s}},4}=10\) m, \(D_{{\mathrm{e}},1}=50\) m, \(D_{{\mathrm{e}},2}=55\) m, \(D_{{\mathrm{e}},3}=50\) m and \(D_{{\mathrm{e}},4}=51\) m.
4.2 Results discussion
Figure 2 illustrates the convergence of Algorithm 1 under different settings of \(P_{\mathrm{s}}\) and \(L_{\min }\). Specifically, we set \(P_{\mathrm{s}}\) as 25 dBm or 30 dBm. \(L_{\min }\) is set as 30 kbits, 50 kbits, 70 kbits, 90 kbits or 110 kbits. From this figure, it can be observed that the proposed iterative algorithm can always converge to a certain value within a few iterations, e.g., 4 iterations. That is, the proposed iterative algorithm is convergent and computationally efficient. By comparing the achievable computation bits under different settings of \(P_{\mathrm{s}}\) and \(L_{\min }\), we also see that with \(P_{\mathrm{s}}\) (or \(L_{\min }\)) fixed, a larger \(L_{\min }\) (or \(P_{\mathrm{s}}\)) may decrease (or increase) the achievable computation bits.
Figure 3 shows the system computation bits versus the transmit power of the ES \(P_{\mathrm{s}}\), where \(P_{\mathrm{s}}\) varies from 0.5 W to 2.5 W. In order to demonstrate the superiority of the proposed scheme, we compare the performance under the proposed scheme with that under the four other benchmark schemes, which are the complete offloading scheme, the fully local computing scheme, the backscatterassisted MEC and the wirelesspowered NOMAMEC, respectively. In the complete offloading scheme, each IoT node only performs task offloading and both BackCom and AT can be used to offload tasks. In the fully local computing scheme, all the IoT nodes can only compute their tasks locally. For the backscatterassisted MEC, each IoT node can not only perform local computing but also offload its tasks to the MEC server and only BackCom can be adopted for task offloading. For the wirelesspowered NOMAMEC, each IoT node can only choose the NOMA technology to offload parts of tasks and the rest tasks can be computed locally. Please note that the above four schemes are obtained by means of some methods used in this work. Specifically, the complete offloading scheme is obtained by using the proposed iterative algorithm after a few changes, e.g., solving \({\mathbf{P }_6}\) with \(f_k=0, \forall k\). The fully local computing scheme is optimized by solving \({\mathbf{P }_6}\) with \(t_{\mathrm{a}}=0, t_{\mathrm{c}}=0\) and \(t_k^{\mathrm{b}}=0, \forall k\). The results under the backscatterassisted MEC can be obtained by solving \({\mathbf{P }_4}\) with \(t_{\mathrm{a}}=0\) and \(P_k=0, \forall k\). The results of the wirelesspowered NOMAMEC are achieved by means of Algorithm 1 by solving \({\mathbf{P }_6}\) with \(t_k^{\mathrm{b}}=0, \rho _k=0, \forall k\). It is not hard to prove that the above problems, \({\mathbf{P }_6}\) with \(f_k=0, \forall k\), \({\mathbf{P }_6}\) with \(t_{\mathrm{a}}=0, t_{\mathrm{c}}=0\) and \(t_k^{\mathrm{b}}=0, \forall k\), \({\mathbf{P }_4}\) with \(t_{\mathrm{a}}=0\) and \(P_k=0, \forall k\) and \({\mathbf{P }_6}\) with \(t_k^{\mathrm{b}}=0, \rho _k=0, \forall k\), are convex, which can be solved by using the existing convex tools.
As shown in this figure, it can be observed that all the schemes except the fully local computing scheme show an upward trend while the results under the fully local computing scheme are always 0. The reasons are as follows. With the increasing of \(P_{\mathrm{s}}\), both the total harvested energy and the achievable BackCom rate at each IoT node increase, resulting in an improvement to the system computation bits, while the fully local computing scheme may not satisfy the QoS constraint, etc., which also demonstrates the advantage of MEC. By comparisons, we can also see that the proposed scheme can achieve the highest computation bits among the five schemes. This is because the proposed scheme combines the advantages of BackCom and AT as well as the partial offloading scheme, providing more flexibilities to utilize resources efficiently.
Figure 4 plots the system computation bits versus the minimum required computation bits at each IoT node, where \(L_{\min }\) is ranged from 50 to 150 kbits. Similarly, we compare the performance under the proposed scheme with that under the complete offloading scheme, the fully local computing scheme, the backscatterassisted MEC and the wirelesspowered NOMAMEC in order to demonstrate the superiority of the proposed scheme. It can be observed that the system computation bits under all the schemes except the fully local computing scheme decrease when \(L_{\min }\) increases since a larger \(L_{\min }\) means a higher QoS requirement for each IoT node and more resources will be allocated to the IoT nodes with worse channels, which reduces the system computation bits. Besides, we can also see that the proposed scheme outperforms the other schemes in terms of system computation bits, which further illustrates the advantage of the proposed scheme.
Figure 5 depicts the effect of the computation capacity of the MEC server on the system computation bits, where \(f_{\max }\) varies from 5 GHz to 25 GHz. It can be observed that the system computation bits under the proposed scheme, the backscatterassisted MEC, the wirelesspowered NOMAMEC and the complete offloading scheme increase with the increasing of \(f_{\max }\). This is because the improvement of the MEC server’s computation capacity allows more task bits to be offloaded and executed, resulting in the increasing system computation bits. Note that the fully local computing scheme is not included in this figure since its performance is not influenced by \(f_{\max }\). By comparisons, we still can see that the proposed scheme is superior to the other schemes in terms of system computation bits.
5 Conclusions
In this paper, we have studied the computation bits maximization for the backscatterassisted wirelesspowered NOMAMEC network while considering the limited computation capacity and the computation resource allocation at the MEC server. In particular, we have formulated a computation bits maximization problem by jointly optimizing the EH time, the BackCom time and reflection coefficients of the IoT nodes, the IoT nodes’ transmit power and time in the uplink NOMA phase, as well as the computing frequencies and time of both the IoT nodes and the MEC server. In order to solve the formulated nonconvex problem, we first introduced a slack variable and the contradiction approach to remove the min function from the objective function and determine partial optimal solutions, respectively. Then, based on the inequality transformation approach, an efficient iterative algorithm has been proposed to obtain the optimal solutions. Simulations results have verified the quick convergence of the proposed iterative algorithm and demonstrated the superiority of the proposed scheme in terms of the computation bits over the existing benchmark schemes.
Availability of data and materials
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
Abbreviations
 IoT:

Internet of Things
 MEC:

Mobile edge computing
 OMA:

Orthogonal multiple access
 NOMA:

Nonorthogonal multiple access
 AR:

Active radios
 BackCom:

Backscatter communication
 DC:

Difference of convex
 CSI:

Channel state information
 QoS:

Qualityofservice
 EH:

Energy harvesting
References
D.C. Nguyen, M. Ding, P.N. Pathirana, A. Seneviratne, J. Li, D. Niyato, O. Dobre, H.V. Poor, 6G internet of things: a comprehensive survey. IEEE Internet Things J. (2021). https://doi.org/10.1109/JIOT.2021.3103320
J. Li, M. Dai, Z. Su, Energyaware task offloading in the internet of things. IEEE Wirel. Commun. 27(5), 112–117 (2020). https://doi.org/10.1109/MWC.001.1900495
Y. Ye, L. Shi, H. Sun, R.Q. Hu, G. Lu, Systemcentric computation energy efficiency for distributed NOMAbased MEC networks. IEEE Trans. Veh. Technol. 69(8), 8938–8948 (2020). https://doi.org/10.1109/TVT.2020.2997673
Y. Xu, H. Sun, Y. Ye, Distributed resource allocation for SWIPTbased cognitive adhoc networks. IEEE Trans. Cognit. Commun. Netw. (2021). https://doi.org/10.1109/TCCN.2021.3068396
H. Wu, H. Tian, G. Nie, P. Zhao, Wireless powered mobile edge computing for industrial internet of things systems. IEEE Access 8, 101539–101549 (2020). https://doi.org/10.1109/ACCESS.2020.2995649
C. You, K. Huang, H. Chae, Energy efficient mobile cloud computing powered by wireless energy transfer. IEEE J. Sel. Areas Commun. 34(5), 1757–1771 (2016)
S. Bi, Y.J. Zhang, Computation rate maximization for wireless powered mobileedge computing with binary computation offloading. IEEE Trans. Wirel. Commun. 17(6), 4177–4190 (2018)
L. Huang, S. Bi, Y.J. Zhang, Deep reinforcement learning for online computation offloading in wireless powered mobileedge computing networks. IEEE Trans. Mobile Comput. 19(11), 2581–2593 (2019)
F. Wang, Computation rate maximization for wireless powered mobile edge computing, in 2017 23rd AsiaPacific Conference on Communications (APCC), pp. 1–6 (2017). https://doi.org/10.23919/APCC.2017.8304010
F. Wang, J. Xu, X. Wang, S. Cui, Joint offloading and computing optimization in wireless powered mobileedge computing systems. IEEE Trans. Wirel. Commun. 17(3), 1784–1797 (2018)
M. Zeng, R. Du, V. Fodor, C. Fischione, Computation rate maximization for wireless powered mobile edge computing with NOMA, in Proceedings on IEEE WoWMoM, pp. 1–9 (2019)
L. Shi, Y. Ye, X. Chu, G. Lu, Computation energy efficiency maximization for a NOMAbased WPTMEC network. IEEE Internet Things J. 8(13), 10731–10744 (2021). https://doi.org/10.1109/JIOT.2020.3048937
B. Li, F. Si, W. Zhao, H. Zhang, Wireless powered mobile edge computing with NOMA and user cooperation. IEEE Trans. Veh. Technol. 70(2), 1957–1961 (2021). https://doi.org/10.1109/TVT.2021.3051651
F. Rezaei, C. Tellambura, S. Herath, Largescale wirelesspowered networks with backscatter communications—a comprehensive survey. IEEE Open J. Commun. Soc. 1, 1100–1130 (2020). https://doi.org/10.1109/OJCOMS.2020.3012466
H. Yang, Y. Ye, X. Chu, S. Sun, Energy efficiency maximization for UAVenabled hybrid backscatterharvestthentransmit communications. IEEE Trans. Wirel. Commun. (2021). https://doi.org/10.1109/TWC.2021.3116509
Y. Xu, B. Gu, R.Q. Hu, D. Li, H. Zhang, Joint computation offloading and radio resource allocation in MECbased wirelesspowered backscatter communication networks. IEEE Trans. Veh. Technol. 70(6), 6200–6205 (2021). https://doi.org/10.1109/TVT.2021.3077094
S. Gong, Y. Xie, J. Xu, D. Niyato, Y.C. Liang, Deep reinforcement learning for backscatteraided data offloading in mobile edge computing. IEEE Netw. 34(5), 106–113 (2020). https://doi.org/10.1109/MNET.001.1900561
Y. Zou, J. Xu, S. Gong, Y. Guo, D. Niyato, W. Cheng, Backscatteraided hybrid data offloading for wireless powered edge sensor networks, in Proceedings on IEEE GLOBECOM, pp. 1–6 (2019). https://doi.org/10.1109/GLOBECOM38437.2019.9014101
L. Shi, R.Q. Hu, J. Gunther, Y. Ye, H. Zhang, Energy efficiency for RFpowered backscatter networks using HTT protocol. IEEE Trans. Veh. Technol. 69(11), 13932–13936 (2020). https://doi.org/10.1109/TVT.2020.3014500
L. Shi, Y. Ye, X. Chu, G. Lu, Computation bits maximization in a backscatter assisted wirelessly powered MEC network. IEEE Commun. Lett. 25(2), 528–532 (2021). https://doi.org/10.1109/LCOMM.2020.3027294
L. Shi, Y. Ye, G. Zheng, G. Lu, Computational EE fairness in backscatterassisted wireless powered MEC networks. IEEE Wirel. Commun. Lett. 10(5), 1088–1092 (2021). https://doi.org/10.1109/LWC.2021.3058295
Y. Ye, L. Shi, X. Chu, D. Li, G. Lu, Delay minimization in wireless powered mobile edge computing with hybrid BackCom and AT. IEEE Wirel. Commun. Lett. 10(7), 1532–1536 (2021). https://doi.org/10.1109/LWC.2021.3073406
Y. Ye, L. Shi, X. Chu, G. Lu, Throughput fairness guarantee in wireless powered backscatter communications with HTT. IEEE Wirel. Commun. Lett. 10(3), 449–453 (2021). https://doi.org/10.1109/LWC.2020.3014740
S.H. Kim, D.I. Kim, Hybrid backscatter communication for wirelesspowered heterogeneous networks. IEEE Trans. Wirel. Commun. 16(10), 6557–6570 (2017). https://doi.org/10.1109/TWC.2017.2725829
J. Papandriopoulos, J.S. Evans, SCALE: a lowcomplexity distributed protocol for spectrum balancing in multiuser DSL networks. IEEE Trans. Inf. Theory 55(8), 3711–3724 (2009). https://doi.org/10.1109/TIT.2009.2023751
Acknowledgements
No applicable.
Funding
This work was supported in part by the Key Scientific and Technological Research Projects in Henan Province under Grant 212102210572, in part by Key Scientific Research Projects of Colleges and Universities in Henan Province under Grant 22A510011.
Author information
Authors and Affiliations
Contributions
ZCM conceived of the study, designed and modeled, carried out experiments, participated in the performance analysis and drafted the manuscript. ZWG participated in the design and helped to draft the manuscript. All authors read and approved the final manuscript.
Authors’ Information
Chuangming Zheng received B.S. and M.S. degrees from South China University of Technology, Guangzhou, China, in 1997 and 2003, respectively. During 2005–2012, he was a Researcher in wireless communications in Huawei Technologies Co., Ltd. He has drafted over 20 patents, with over 10 of them being granted in China, the USA, and Europe. He was with Zhoukou Normal University from 2013 to 2016. He received the Ph.D. degree from the State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an, China. He is working in Zhoukou Normal University. His current research interests include wireless energy harvesting, mobileedge computing and radio resource management of LTE wireless networks.
Wengang Zhou received the B.Eng. degree in computational mathematics from Henan Normal University, in 1997, and the M.Eng. degree in computer application technology from the North China University of Technology, in 2007. He is currently pursuing the Ph.D. degree with the City University of Macau. He is currently a Full Professor with the School of Computer Science and Technology, Zhoukou Normal University. His research interests include RF energy harvestingenabled wireless communications and intelligent algorithm design for wireless communications.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix A
Here, we prove Proposition 1 by means of contradiction.
1.1 Proof for \(f^*_{\mathrm{m}}=f_{\max }\)
Suppose that \(\big \{ \tau _{\mathrm{e}}^*,\left\{ {t_k^{{\mathrm{b}}*}} \right\} _{k = 1}^K,t_{\mathrm{a}}^*,\left\{ {\rho _k^*} \right\} _{k = 1}^K,\left\{ {p_k^*} \right\} _{k = 1}^K,\left\{ {f_k^*} \right\} _{k = 1}^K,\) \(\left\{ {\tau _k^*} \right\} _{k = 1}^K,t_{\mathrm{c}}^*,f_{\mathrm{m}}^*,\left\{ {\alpha _k^*} \right\} _{k = 1}^K,{\lambda ^*} \big \}\) is the optimal solution to \({\mathbf{P }_\mathbf{2 }}\), where \(f_{\mathrm{m}}^* < {f_{\max }}\) and \({\lambda ^*} = \min \bigg \{ \sum \nolimits _{k = 1}^K {t_k^{{\mathrm{b}}*}W{{\log }_2}\left( {1 + \frac{{\xi \rho _k^*{P_{\mathrm{s}}}{g_k}{h_k}}}{{W{\sigma ^2}}}} \right) }\) \(+Wt_{\mathrm{a}}^*{{\log }_2}\left( {1 + \frac{{\sum \nolimits _{k = 1}^K {p_k^*{h_k}} }}{{W{\sigma ^2}}}} \right) {\mathrm{}} , \frac{{t_{\mathrm{c}}^*f_{\mathrm{m}}^*}}{{{C_{{\mathrm{cpu}}}}}} \bigg \}\). Then, the maximum computation bits of the system can be computed as \({{C^*_{{\mathrm{tot}}}}}={\lambda ^*} + \sum \nolimits _{k = 1}^K {\frac{{f_k^*\tau _k^*}}{{{C_{{\mathrm{cpu}},k}}}}}\). Further, we can also construct another solution satisfying \(f_{\mathrm{m}}^ + = {f_{\max }} > f_{\mathrm{m}}^*,\tau _{\mathrm{e}}^ + = \tau _{\mathrm{e}}^*,t_k^{{\mathrm{b + }}} = t_k^{{\mathrm{b}}*},t_{\mathrm{a}}^ + = t_{\mathrm{a}}^*,\rho _k^ + = \rho _k^*,f_k^ + = f_k^*,\tau _k^ + = \tau _k^*,t_{\mathrm{c}}^ + = t_{\mathrm{c}}^*\) and \({\lambda ^ + } = \min \bigg \{ \sum \nolimits _{k = 1}^K {t_k^{{\mathrm{b + }}}W{{\log }_2}\left( {1 + \frac{{\xi \rho _k^ + {P_{\mathrm{s}}}{g_k}{h_k}}}{{W{\sigma ^2}}}} \right) } + Wt_{\mathrm{a}}^ + {{\log }_2}\left( {1 + \frac{{\sum \nolimits _{k = 1}^K {p_k^ + {h_k}} }}{{W{\sigma ^2}}}} \right) ,\frac{{t_{\mathrm{c}}^ + f_{\mathrm{m}}^ + }}{{{C_{{\mathrm{cpu}}}}}} \bigg \}\). Obviously, the constructed solution is a feasible solution to \({\mathbf{P }_\mathbf{2 }}\) which satisfies all the constraints of \({\mathbf{P }_\mathbf{2 }}\). Accordingly, we can calculate the computation bits of the system under this constructed solution as \({{C^+_{{\mathrm{tot}}}}}={\lambda ^+} + \sum \nolimits _{k = 1}^K {\frac{{f_k^+\tau _k^+}}{{{C_{{\mathrm{cpu}},k}}}}}\). Since \(f_{\mathrm{m}}^ + = {f_{\max }} > f_{\mathrm{m}}^*\) holds, we have \(\frac{{t_{\mathrm{c}}^ + f_{\mathrm{m}}^ + }}{{{C_{{\mathrm{cpu}}}}}} > \frac{{t_{\mathrm{c}}^*f_{\mathrm{m}}^*}}{{{C_{{\mathrm{cpu}}}}}}\), resulting in \(\lambda ^+\ge \lambda ^*\). Based on the expression of \({{C_{{\mathrm{tot}}}}}\), we have \({{C^+_{{\mathrm{tot}}}}}\ge {{C^*_{{\mathrm{tot}}}}}\) due to the fact that \(\lambda ^+\ge \lambda ^*\), \(f_k^ + = f_k^*\) and \(\tau _k^ + = \tau _k^*\). However, the fact that \({{C^+_{{\mathrm{tot}}}}}\ge {{C^*_{{\mathrm{tot}}}}}\) contradicts the above assumption that the solution \(\big \{ \tau _{\mathrm{e}}^*,\left\{ {t_k^{{\mathrm{b}}*}} \right\} _{k = 1}^K,t_{\mathrm{a}}^*,\left\{ {\rho _k^*} \right\} _{k = 1}^K,\left\{ {p_k^*} \right\} _{k = 1}^K,\left\{ {f_k^*} \right\} _{k = 1}^K,\) \(\left\{ {\tau _k^*} \right\} _{k = 1}^K,t_{\mathrm{c}}^*,f_{\mathrm{m}}^*,\left\{ {\alpha _k^*} \right\} _{k = 1}^K,{\lambda ^*} \big \}\) is optimal. Therefore, in order to maximize the computation bits of the system, the MEC server should compute its received tasks with its maximum allowed computing frequency, namely \(f_{\mathrm{m}}^*=f_{\max }\).
1.2 Proof for \(\tau ^*_k=T\)
When \({\tau _{\mathrm{e}}},{\mathbf{t }^{\mathrm{b}}},{t_{\mathrm{a}}},{\varvec{\rho }} ,\mathbf{p },{t_{\mathrm{c}}},{f_{\mathrm{m}}}, {\varvec{\alpha }}, \lambda\) and \(\{f_i,\tau _i\}_{i=\{1,2,\ldots ,K\}\setminus k}\) are fixed, we should jointly optimize \(f_k\) and \(\tau _k\) to achieve the maximum computation bits of the system. Assume that the kth IoT node’s optimal computing frequency \(f^*_k\) and time \(\tau ^*_k<T\) satisfy all the constraints of of \({\mathbf{P }_\mathbf{2 }}\) with other parameters fixed. Then, the maximum computation bits of the considered system \(C^*_{\mathrm{tot}}\) are computed as \({\lambda } + \sum \nolimits _{i = 1,i\ne k}^K {\frac{{\tau _if_i}}{{{C_{{\mathrm{cpu}},k}}}}}+{\frac{{\tau ^* _kf^*_k}}{{{C_{{\mathrm{cpu}},k}}}}}\). On this basis, we construct another solution as \(\{f^+_k,\tau ^+_k\}\) with \(\tau ^+_k=T\) and \(\tau _k^+f_k^+(f_k^+)^2=\tau _k^*f_k^*(f_k^*)^2\). Note that the constructed solution is feasible. Correspondingly, we can calculate the maximum computation bits of the system under the constructed solution as \(C^+_{\mathrm{tot}}={\lambda } + \sum \nolimits _{i = 1,i\ne k}^K {\frac{{\tau _if_i}}{{{C_{{\mathrm{cpu}},k}}}}}+{\frac{{\tau ^+ _kf^+_k}}{{{C_{{\mathrm{cpu}},k}}}}}\). Since both \(\tau _k^+f_k^+(f_k^+)^2=\tau _k^*f_k^*(f_k^*)^2\) and \(\tau ^+_k=T>\tau ^*_k\) hold, we have \(f_k^+<f_k^*\) and \(\tau _k^+f_k^+>\tau _k^*f_k^*\). Combining the expression of \(C_{\mathrm{tot}}\), we can obtain \(C^+_{\mathrm{tot}}>C^*_{\mathrm{tot}}\), which contradicts the above assumption. Thus, \(\tau ^*_k=T\) holds when the maximum computation bits of the system are achieved.
Based on the above analysis, Proposition 1 is obtained.
Appendix B
From \({\mathbf{P }_4}\), we can observe that both the objective function and the constraints \({\mathrm{C3}}\), \({\mathrm{C5}}^{\prime}\), \({\mathrm{C6}}^{\prime}\), \({\mathrm{C7}}\), \({\mathrm{C8}}^{\prime}\) and \({\mathrm{C10}}^{\prime}\) are linear, making both the objective function and these constraints convex. For the rest constraints \({\mathrm{C1}}^{\prime\prime}\), \({\mathrm{C2}}^{\prime\prime}\) and \({\mathrm{C9}}^{\prime}\), we can prove that both \({\mathrm{C2}}^{\prime\prime}\) and \({\mathrm{C9}}^{\prime}\) are convex constraints as follows. For constraint \({\mathrm{C2}}^{\prime\prime}\), its convexity depends on the function \(f_k^3\). Since the second derivative of the function \(f_k^3\) is \(6f_k\), which is larger than or equal to 0, the function \(f_k^3\) is convex and \({\mathrm{C2}}^{\prime\prime}\) is a convex constraint. For constraint \({\mathrm{C9}}^{\prime}\), we need to prove both \({{F_k}\left( {t_k^{\mathrm{b}},{\phi _k}} \right) }=t_k^{\mathrm{b}}W{\log _2}\left( {1 + \frac{{\xi {\phi _k}{P_{\mathrm{s}}}{g_k}{h_k}}}{{t_k^{\mathrm{b}}W{\sigma ^2}}}} \right)\) and \(F_{\sum }\left( {\left\{ {{P_k}} \right\} _{k = 1}^K,{t_{\mathrm{a}}}} \right) =W{t_{\mathrm{a}}}{\log _2}\left( {1 + \frac{{\sum \nolimits _{k = 1}^K {{P_k}{h_k}} }}{{{t_{\mathrm{a}}}W{\sigma ^2}}}} \right)\) are concave when it is convex. Since the perspective function can preserve convexity, we find that the convexities of \({{F_k}\left( {t_k^{\mathrm{b}},{\phi _k}} \right) }\) and \(F_{\sum }\left( {\left\{ {{P_k}} \right\} _{k = 1}^K,{t_{\mathrm{a}}}} \right)\) are same as those of \(W{\log _2}\left( {1 + \frac{{\xi {\phi _k}{P_{\mathrm{s}}}{g_k}{h_k}}}{{W{\sigma ^2}}}} \right)\) and \(W{\log _2}\left( {1 + \frac{{\sum \nolimits _{k = 1}^K {{P_k}{h_k}} }}{{W{\sigma ^2}}}} \right)\), which are concave. Thus, the constraint \({\mathrm{C9}}^{\prime}\) is also convex. The proof is complete.
Appendix C
After carefully analyzing \({\mathbf{P }_6}\), it is not hard to conclude that the objective function and all constraints except \({\mathrm{C1}}^{\prime\prime\prime\prime}\), \({\mathrm{C2}}^{\prime\prime\prime\prime}\) and \({\mathrm{C9}}^{\prime\prime\prime}\) are linear. Thus, \({\mathbf{P }_3}\) is convex if and only if constraints \({\mathrm{C1}}^{\prime\prime\prime\prime}\), \({\mathrm{C2}}^{\prime\prime\prime\prime}\) and \({\mathrm{C9}}^{\prime\prime\prime}\) are convex.
On the convexity of \({\mathrm{C1}}^{\prime\prime\prime\prime}\): We only need to prove that \({  t_{\mathrm{a}}^{(i + 1)}{{\log }_2}\left( {\sum \nolimits _{j = k + 1}^K {{2^{\frac{{x_j^{(i + 1)}}}{{t_{\mathrm{a}}^{(i + 1)}}}}}{h_j}} + W{\sigma ^2}} \right) }\) is convex. Using the perspective function, we know that the convexity of \({{{\log }_2}\left( {\sum \nolimits _{j = k + 1}^K {{2^{x_j^{(i + 1)}}}{h_j}} + W{\sigma ^2}} \right) }\) is the same as that of \(t_{\mathrm{a}}^{(i + 1)}{{\log }_2}\left( {\sum \nolimits _{j = k + 1}^K {{2^{\frac{{x_j^{(i + 1)}}}{{t_{\mathrm{a}}^{(i + 1)}}}}}{h_j}} + W{\sigma ^2}} \right)\) . Since \({{{\log }_2}\left( {\sum \nolimits _{j = k + 1}^K {{2^{x_j^{(i + 1)}}}{h_j}} + W{\sigma ^2}} \right) }\) is a logsumexp function which is proved to be convex, \({{{\log }_2}\left( {\sum \nolimits _{j = k + 1}^K {{2^{x_j^{(i + 1)}}}{h_j}} + W{\sigma ^2}} \right) }\) is convex and \({\mathrm{C1}}^{\prime\prime}\) is also a convex constraint.
On the convexity of \({\mathrm{C2}}^{\prime\prime\prime\prime}\): The convexity of \({\mathrm{C2}}^{\prime\prime}\) is decided by the function \(t_{\mathrm{a}}^{(i + 1)}{2^{\frac{{x_k^{(i + 1)}}}{{t_{\mathrm{a}}^{(i + 1)}}}}}\). If \(t_{\mathrm{a}}^{(i + 1)}{2^{\frac{{x_k^{(i + 1)}}}{{t_{\mathrm{a}}^{(i + 1)}}}}}\) is convex, then the constraint \({\mathrm{C2}}^{\prime\prime}\) is convex. Since \(t_{\mathrm{a}}^{(i + 1)}{2^{\frac{{x_k^{(i + 1)}}}{{t_{\mathrm{a}}^{(i + 1)}}}}}\) is the perspective function of \({2^{x_k^{(i + 1)}}}\) that is convex, \(t_{\mathrm{a}}^{(i + 1)}{2^{\frac{{x_k^{(i + 1)}}}{{t_{\mathrm{a}}^{(i + 1)}}}}}\) is convex and the constraint \({\mathrm{C2}}^{\prime\prime}\) is convex.
On the convexity of \({\mathrm{C9}}^{\prime\prime\prime}\): Since \({{{\log }_2}\left( {\sum \nolimits _{j = k + 1}^K {{2^{x_j^{(i + 1)}}}{h_j}} + W{\sigma ^2}} \right) }\) is convex, we have \(F_k^{\mathrm{T}}\left( {t_{\mathrm{a}}^{(i + 1)},x_k^{(i + 1)}} \right)\) is concave. Combining the results in Appendix B, we can conclude that \({\mathrm{C9}}^{\prime\prime\prime}\) is also convex. The proof is complete.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Zheng, C., Zhou, W. Computation bits maximization in backscatterassisted wirelesspowered NOMAMEC networks. J Wireless Com Network 2022, 23 (2022). https://doi.org/10.1186/s13638022020974
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13638022020974