[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Next Article in Journal
A Global Coverage Path Planning Method for Multi-UAV Maritime Surveillance in Complex Obstacle Environments
Next Article in Special Issue
A Rule-Based Agent for Unmanned Systems with TDGG and VGD for Online Air Target Intention Recognition
Previous Article in Journal
Morphing Quadrotors: Enhancing Versatility and Adaptability in Drone Applications—A Review
Previous Article in Special Issue
Prescribed-Time Cooperative Guidance Law for Multi-UAV with Intermittent Communication
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Research on Unmanned Aerial Vehicle Emergency Support System and Optimization Method Based on Gaussian Global Seagull Algorithm

by
Songyue Han
1,2,
Mingyu Wang
1,
Junhong Duan
3,
Jialong Zhang
4,* and
Dongdong Li
2,5,*
1
Air Defense and Antimissile School, Air Force Engineering University, Xi’an 710000, China
2
People’s Liberation Army Unit 32705, China
3
School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, China
4
Test Center, National University of Defense Technology, Xi’an 710100, China
5
College of Information and Communication, National University of Defense Technology, Wuhan 430019, China
*
Authors to whom correspondence should be addressed.
Drones 2024, 8(12), 763; https://doi.org/10.3390/drones8120763
Submission received: 21 October 2024 / Revised: 20 November 2024 / Accepted: 13 December 2024 / Published: 17 December 2024
Figure 1
<p>The 5G and mobile edge computing convergence architecture [<a href="#B13-drones-08-00763" class="html-bibr">13</a>,<a href="#B14-drones-08-00763" class="html-bibr">14</a>].</p> ">
Figure 2
<p>Comparison of performance metrics between 5G and 4G networks.</p> ">
Figure 3
<p>Logical network architecture of MEC.</p> ">
Figure 4
<p>Multi-view model.</p> ">
Figure 5
<p>Distributed unmanned intelligence reconnaissance system in emergency rescue scenario.</p> ">
Figure 6
<p>Simplified model of emergency rescue system.</p> ">
Figure 7
<p>Illustration of small-hole imaging reverse learning.</p> ">
Figure 8
<p>Flowchart of the GLSOAG.</p> ">
Figure 9
<p>Algorithm effect diagram. In it, subplots F1 to F12 respectively represent the average curve variation effect diagrams of SOA, GLSOA, PSO, and BSA algorithms on test functions F1 to F12, obtained from 30 consecutive rounds of experiments with 200 iterations per round.</p> ">
Figure 9 Cont.
<p>Algorithm effect diagram. In it, subplots F1 to F12 respectively represent the average curve variation effect diagrams of SOA, GLSOA, PSO, and BSA algorithms on test functions F1 to F12, obtained from 30 consecutive rounds of experiments with 200 iterations per round.</p> ">
Figure 10
<p>Performance comparison of the algorithm on the F6, F8, and F12 test functions.Among them, the bold numbers in the table represent the superior values in each group of experiments.</p> ">
Figure 11
<p>Performance of the number of tasks under different architectures.</p> ">
Figure 12
<p>Effect of the number of iterations of different algorithms on the system overhead.</p> ">
Figure 13
<p>Impact of task volume on system overhead.</p> ">
Figure A1
<p>Algorithm effect diagram (Part 1). Subgraphs F1 to F12 correspond to the convergence effects of the SOA, GLSOAG, PSO, and BSA algorithms when run once on test functions F1 to F12, with a maximum of 500 iterations per run.</p> ">
Figure A1 Cont.
<p>Algorithm effect diagram (Part 1). Subgraphs F1 to F12 correspond to the convergence effects of the SOA, GLSOAG, PSO, and BSA algorithms when run once on test functions F1 to F12, with a maximum of 500 iterations per run.</p> ">
Figure A2
<p>Algorithm effect diagram (Part 2). Subgraphs F13 to F23 correspond to the convergence effects of the SOA, GLSOAG, PSO, and BSA algorithms when run once on test functions F13 to F23, with a maximum of 500 iterations per run.</p> ">
Figure A2 Cont.
<p>Algorithm effect diagram (Part 2). Subgraphs F13 to F23 correspond to the convergence effects of the SOA, GLSOAG, PSO, and BSA algorithms when run once on test functions F13 to F23, with a maximum of 500 iterations per run.</p> ">
Figure A3
<p>Graph of test functions F13–F23 and convergence curves. Subgraphs F13 to F23 represent the experimental results of the SOA, GLSOAG, PSO, and BSA algorithms on test functions F13 to F23, with a population size set to 30 and a maximum of 200 iterations per run, conducted over 30 consecutive trials.</p> ">
Figure A3 Cont.
<p>Graph of test functions F13–F23 and convergence curves. Subgraphs F13 to F23 represent the experimental results of the SOA, GLSOAG, PSO, and BSA algorithms on test functions F13 to F23, with a population size set to 30 and a maximum of 200 iterations per run, conducted over 30 consecutive trials.</p> ">
Versions Notes

Abstract

:
In emergency rescue scenarios, drones can be equipped with different payloads as needed to aid in tasks such as disaster reconnaissance, situational awareness, communication support, and material assistance. However, rescue missions typically face challenges such as limited reconnaissance boundaries, heterogeneous communication networks, complex data fusion, high task latency, and limited equipment endurance. To address these issues, an unmanned emergency support system tailored for emergency rescue scenarios is designed. This system leverages 5G edge computing technology to provide high-speed and flexible network access along with elastic computing power support, reducing the complexity of data fusion across heterogeneous networks. It supports the control and data transmission of drones through the separation of the control plane and the data plane. Furthermore, by applying the Tammer decomposition method to break down the system optimization problem, the Global Learning Seagull Algorithm for Gaussian Mapping (GLSOAG) is proposed to jointly optimize the system’s energy consumption and latency. Through simulation experiments, the GLSOAG demonstrates significant advantages over the Seagull Optimization Algorithm (SOA), Particle Swarm Optimization (PSO), and Beetle Antennae Search Algorithm (BAS) in terms of convergence speed, optimization accuracy, and stability. The system optimization approach effectively reduces the system’s energy consumption and latency costs. Overall, our work alleviates the pain points faced in rescue scenarios to some extent.

1. Introduction

Emergency rescue scenarios primarily target natural disasters such as fires, floods, earthquakes, and landslides, as well as public safety incidents such as urban counter-terrorism, hostage rescues, and explosive disposal. Typically, natural disasters present complex conditions including communication outages, power interruptions, road damage, and extreme weather, while safety incidents face challenges such as intelligence fog, rapidly changing situations, complex public opinion, and crowd gatherings. Therefore, efficient intelligence collection and upload, as well as command decision distribution, become critical to solving these problems. Drones, with their plug-and-play capability and high flexibility, can effectively expand the boundaries of intelligence collection and deploy airborne base stations to achieve the agile deployment of dedicated rescue networks and have thus become a focal point for researchers [1]. However, drones in rescue scenarios often encounter various environmental disturbances and challenges [2]. Not only do they need to serve as relay nodes to establish network links, but they also need to support the overall system in achieving computationally intensive tasks such as disaster data integration, intelligence situation analysis, and intelligent auxiliary decision-making. In addition, the payload carried by the drones during the execution of related tasks also contributes to the total energy consumption of the drones.
To this end, we comprehensively consider the needs of latency-sensitive and compute-intensive tasks in emergency rescue scenarios, addressing issues such as limited reconnaissance boundaries, complex data fusion, and heterogeneous communication networks. We propose a layered network architecture that is structurally simple and elastically powerful. Using 5G networks [3] as the backbone, it provides a dedicated communication network with large bandwidth, low latency, and high reliability. Mobile Edge Computing (MEC) [4] servers are deployed at both fixed and mobile nodes to offer a localized computing platform for intelligence data processing. This significantly improves the efficiency of drone control and data transmission, reduces the difficulty of data fusion processing, and extends the boundaries of drone search and rescue operations, as well as intelligence reconnaissance. Furthermore, to tackle the contradiction between the limited local processing resources for computational tasks and the higher latency associated with remote processing, we use the Seagull Optimization Algorithm (SOA) [5] as a baseline and propose the Global Learning Seagull Algorithm for Gaussian Mapping (GLSOAG). Corresponding task offloading strategies are established to enable the system to effectively utilize computing resources, balance task delivery latency with system energy consumption, and adapt to emergency rescue operations under complex conditions. The main contributions of this paper are as follows:
  • Taking into account current issues in emergency rescue scenarios, such as limited reconnaissance boundaries, heterogeneous communication networks, complex data fusion, high task latency, and limited equipment endurance, a hierarchical network architecture based on 5G MEC is designed. Using the characteristics of 5G, including large bandwidth, low latency, and high reliability, MEC servers with the corresponding computing power are deployed as needed. This makes the system architecture feature flexible plug-and-play, network simplicity, strong applicability, and elastic computing power, effectively alleviating the aforementioned pain points. Not only improves efficiency, it also reduces the safety risks for rescue personnel.
  • The Global Learning Seagull Algorithm for Gaussian Mapping (GLSOAG) is proposed. Firstly, the population is initialized using Gaussian mapping. Secondly, the position update of the original Seagull Optimization Algorithm is changed to a global learning approach, allowing individual seagulls to learn not only from the current optimal individual’s position but also from the historical optimal positions and then update their positions by utilizing a random weight synthesis selection. Finally, a hybrid reverse learning mechanism is designed, which involves lens reverse learning for the optimal seagull and random reverse learning for individuals at the worst positions. Compared to other algorithms, the GLSOAG achieves advantages in convergence speed, optimization accuracy, and stability.
  • For the designed hierarchical network architecture, the Tammer decomposition method is introduced to decompose the multi-objective optimization problems of the system. Meanwhile, a task offloading strategy suitable for the target system is proposed, and based on the GLSOAG, joint optimization of system energy consumption and latency cost is performed. This effectively reduces the task delivery latency in rescue scenarios and optimizes the total system energy consumption.

2. Research Background and Motivation

Currently, in practical emergency rescue scenarios, three methods are predominantly used to establish dedicated networks: mesh self-organizing networks [6], cluster communications, and specialized network devices. First, biological infrared detection devices, acoustic sensors, and other IoT sensing devices are connected via a mesh self-organizing network. Then, a small number of aggregation nodes are deployed within the network, through which each IoT sub-node transmits the detected data to the upper-level network. Second, in scenarios where communication and power supply are interrupted, mobile communication networks usually cannot operate normally; therefore, cluster base stations are often set up on-site to handle single calls, group calls, and cluster communications for all networked walkie-talkies. Third, terminals carried by rescue personnel can effectively monitor the location, vital signs, and behavioral posture of the rescue personnel, connecting through the lightweight MQTT (Message Queuing Telemetry Transport) network.
Although various devices and systems can provide good services, the requirements of rescue missions increase, the quantity and variety of required equipment grow, and the network standards vary, making it difficult for different subsystems to effectively integrate within the same rescue scenario. This poses serious challenges to disaster data fusion, efficient information dissemination, and disaster situation analysis. In response to these challenges, the existing research mainly follows three technical approaches: first, optimizing at the self-organizing network protocol level to improve network compatibility, reliability, and security [7,8]; second, focusing on the algorithmic level for drone payload functions to enrich system capabilities and broaden mission scenarios [9,10]; third, working on the network architecture level to enhance the efficiency of drone mission execution as a whole [11,12]. While these efforts largely meet the needs of emergency rescue missions, the protocol-level work tends to overlook the latency sensitivity of rescue tasks, and the algorithmic-level work is somewhat specialized, catering to specific domains such as visual or radar signals, neglecting the common needs of data fusion. Network architecture-level work has a certain degree of generality but is often based on certain limitations, whereas real-world scenarios are multifaceted. Motivated by this, we design a general system architecture that is network-simple, flexibly modular, and elastically powerful, propose the GLSOAG, and conduct joint optimization of energy consumption and latency, two key factors constraining rescue missions. Simulation experiments show that, under different task loads, the GLSOAG-based method can achieve certain advantages compared to other methods.
Although various types of equipment and systems can better provide the corresponding services, with the rescue mission needs, the number and types of equipment and devices required are greater and greater, and the network system is also different; with the various components of the system in the same rescue scenarios, it is difficult to be effectively compatible with disaster data fusion, disaster situation analysis and prediction, and other challenges. For this reason, based on the full study of the 5G and edge computing system architecture, a system architecture with a simple network, flexible splicing, and elastic arithmetic is designed.
As shown in Figure 1, 5G mobile communication networks and edge computing can be integrated in the User Plane Function (UPF). Based on this theoretical foundation, in the system architecture designed in this paper, MEC is uniformly deployed based on macro base stations, micro base stations, or vehicle-mounted base stations. This avoids transmission latency between servers and network access, enhancing the efficiency of task processing. Additionally, within the dedicated network area, devices either connect directly via 5G or access through a protocol converter deployed on the base station side, from the IoT aggregation nodes. This preliminarily realizes the concept of a unified network for rescue missions.

3. Preliminary

3.1. 5G Mobile Communication Technology

5G refers to the fifth generation of mobile communication technology, characterized by large bandwidth, low latency, and high reliability [13]. Figure 2 illustrates the comparison of performance metrics between 5G and 4G networks. Compared to the previous generation of technology, the network architecture is flatter and more efficient, envisioning the future of interconnected everything right from the design phase, supporting a connection density of over one million devices per square kilometer. At the same time, 5G introduces the concept of network slicing based on virtualization technology, creating multiple logically independent networks on the same physical network resources through logical partitioning, providing differentiated network support for various smart devices. Furthermore, 5G adopts a more open architecture, incorporating Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) technologies, enabling users to efficiently deploy network services according to scenario requirements and perform personalized configurations. Overall, the 5G network can well meet the needs of the target system.

3.2. Mobile Edge Computing

Edge computing (EC) is an ecosystem characterized by capability openness, resource integration, and architectural flexibility. Mobile Edge Computing (MEC) refers to the deployment of cloud computing’s computing and storage resources to the edge of mobile communication networks, providing an IT service environment and cloud computing capabilities [14]. It features bandwidth savings, reduced latency, strong perception, energy efficiency, high isolation, and wide distribution.
As shown in Figure 3, MEC adopts a distributed approach, typically deployed closer to users in terms of geographical space and network location, on the access network side. Service data are offloaded to the network edge for processing and delivery, not only avoiding the detour of data back to the core network and alleviating the pressure on link load, significantly reducing the latency of service delivery but also saving terminal computing energy consumption and extending the CPU lifecycle of the terminal. Secondly, based on the characteristic of MEC network capability openness, it enables interaction and integration with 3GPP networks. The MEC API gateway can invoke user location, network context, cell information, and bearer link capacity from the RAN side. Its network perception capability supports a variety of location-based and network information-based application services. Lastly, MEC can work with the user plane gateways pushed down (5G UPF gateway and 4G GW-U gateway) to offload and process service data locally, thereby achieving secure isolation needs without data leaving the premises. MEC has a wide range of application scenarios. Ref. [15] introduces the application methods of 5G and edge computing technologies in fields such as transportation, healthcare, and smart cities, evaluating MEC resource allocation and 5G and MEC integration deployment methods. Ref. [16] describes the computation offloading framework of 5G MEC in the power robot inspection scenario and proposes a collaborative optimization algorithm for path planning and task offloading based on deep neural networks.

3.3. Heuristic Algorithm

Heuristic algorithms can efficiently solve complex problems such as combinatorial optimization and NP-hard problems, making them widely applicable in areas like industrial manufacturing, communication networking, and resource allocation. The Seagull Optimization Algorithm [5], inspired by the natural foraging behavior of seagulls, is primarily aimed at continuous space optimization problems. It boasts advantages such as fewer parameters, strong global search capabilities, and good adaptability, but it also faces issues like premature convergence and parameter sensitivity. The Particle Swarm Optimization (PSO) [17], inspired by the flocking behavior of birds, treats solutions to a problem as individuals in a swarm, which are optimized through multiple iterations of the objective function to ultimately determine the fitness value, reflecting the quality of the optimization. PSO has the advantages of good parallelism and stable performance, but it suffers from a weak theoretical foundation and is easily influenced by initial conditions, making it a widely used classic algorithm. The Beetle Antennae Search Algorithm (BAS) [18], which mimics the foraging behavior of beetles using their two antennae, changes the optimization path based on the difference in information concentration detected by the two antennae. With fewer parameters and lower computational requirements, BAS shows a clear advantage in low-dimensional problems.

4. Related Work

Currently, empowerment and optimization efforts for emergency rescue scenarios mainly focus on three aspects:

4.1. Optimization Work Based on Self-Organizing Network Protocols

Ref. [7] designs a two-factor key agreement scheme for UAV-based VANET using fuzzy verifier and ciphering techniques, thus allowing UAVs to securely and reliably fuse with vehicular ad hoc networks (VANETs). The work considers the balance of communication resources and computational overhead but neglects the optimization of the task delivery latency in real scenarios after network fusion. Ref. [8] utilizes blockchain technology and the Firework Algorithm to build a federal blockchain emergency response network to solve the problem of material distribution and management. However, the response ability to deal with unexpected situations such as road blockage is insufficient.

4.2. Work on the Algorithmic Layer for UAV Payload Functions

Ref. [9] proposes a UAV-based target detection technique for enhancing the efficiency of rescue missions. The YOLO-v5 algorithm in the field of computer vision is introduced to improve the accuracy of search and rescue. However, the work does not consider the cost overhead, and the stability of the YOLO-v5 algorithm under different lighting conditions deserves further discussion. Ref. [10] proposes a technique for road extraction and road condition detection based on videos captured by UAV multispectral cameras, or pre-downloaded satellite multispectral images to provide optimal route planning to humans. The accuracy of route planning in wilderness scenarios is improved. However, processing a large amount of multispectral data requires high computational resources, and the system latency is difficult to be effectively guaranteed. Ref. [19] describes the organizational use of UAVs as base station nodes to expand network coverage, allowing UAVs to carry the appropriate payloads to enhance 5G networks as lift-off base stations, UAV relay stations, and UAV aggregators, respectively, and points out the deployment methods, citing application scenarios such as civil communications, the Internet of Things (IoT), and sensor networks.

4.3. Enhancing the Efficiency of UAV Mission Execution at the Network Architecture Level

Ref. [11] proposes a multi-unmanned aerial vehicle (UAV) collaborative rescue task allocation model, combining the particle swarm algorithm (PSO) and the gray wolf optimization algorithm (GWO) to propose an improved algorithm for the path planning problem in earthquake rescue. Ref. [12] proposes a UAV assignment model based on a preference matching algorithm, which efficiently performs task assignment and makes full use of idle resources by modeling three entities: the UAV, the controller and the charging station. Ref. [20] introduces networking schemes and deployment methods for emergency communication networks in natural disaster scenarios, focusing on the review of the organizational use of satellite communications, ad hoc networks, mobile communication networks, and unlimited private networks. Ref. [21] addresses the detection obstacles of UAV formations due to the blind spots of visual sensors, and designs a cooperative tracking controller capable of tracking a moving target in a limited time, and introduces neural networks to enhance the control capability.

5. Method

5.1. System Architecture Design

5.1.1. Demand Analysis

To capitalize on the smart devices in UAVs, unmanned vehicles, and other mission circuits to enhance the system’s empowering advantages, taking the emergency rescue mission requirements as a pull, we introduce the multi-view methodology in the field of systems engineering [22] to comprehensively describe the target system from the perspectives of three types of stakeholders, namely, system developers, system planners, and users, to derive a requirements analysis framework on which to design the target system.
Figure 4 shows the multi-view model, where the 3 categories of people are mapped to the system view, capability view, and business view, and from these, the system requirements, capability requirements, and business requirements are derived, respectively, which together form the requirements analysis framework shown in Table 1.

5.1.2. System Architecture

Based on the requirements analysis framework, we initially depict the key elements of the system that meet the mission requirements. As the backbone network, 5G is used to provide a mobile network with large bandwidth, low latency, and high reliability to adapt to high mobility into the network devices such as UAVs. At the same time, based on 5G network slicing, it meets the differentiated network support for different payloads of the same UAV and realizes the logical network exclusivity for multiple services. With MEC as the server entity of each layer node, it is suitable for the edge deployment of most common software and large models, and meets the needs of data fusion and situation analysis. The rest of the network-entry equipment uses protocol converters and other transitional means to access the 5G private network to meet the needs of various types of intelligent terminals in the emergency and disaster relief region for network entry.
As shown in Figure 5, a 5G macro base station, a central cloud server, and various business applications are deployed on the side of the emergency rescue command center. The 5G macro base station provides wireless network coverage for the command center and connects to the micro base station on the edge side of the mission through a fiber optic cable network through multiple hops to achieve the return of data from the edge as well as the distribution of the results of the processing. The central cloud server deploys the drone flight control, AI large model, image rendering, video rectification, preset algorithms, and other general emergency rescue business applications on the center cloud server. On the edge side of the mission, 5G micro base stations and Mobile Edge Computing servers are deployed, and the edge cloud is established by emergency communication vehicles or existing communication nodes to carry drone control signaling in the control plane of the 5G network, carry drone business data streams in the user plane, and allocate network resources for various types of services based on 5G network slicing. Data in the rescue area are offloaded to the edge cloud to complete lightweight data processing services. In the rescue area, a 5G private network is constructed based on the existing network information infrastructure in the field. If the network is interrupted, the communication vehicle carries a vehicle-mounted base station, the drone carries a lift-off base station, and the rescuer carries a backpack base station for network formation, providing high-speed network access for intelligent devices, drones, unmanned vehicles in the rescue area, etc. Because of the difference in network standard, some specialized rescue devices use the strategy of deploying protocol converters on the side of the micro base station to realize network access and ensure that the devices in the mission area are all in the same mission-specific network. The network access is realized by deploying protocol converters on the micro base station side to ensure that the devices in the mission area are in the same mission-dedicated network.

5.1.3. System Function

Rescue areas usually deploy drones, unmanned vehicles, robotic dogs, and other vital-sign detection devices according to mission needs and field environments, with drones and other devices realizing remote control signaling based on the control plane of the 5G network. Meanwhile, the collected intelligence data are transmitted from the user plane, offloading the rescue area’s imagery, audio, acoustic patterns, geographic environment, and other information within the local private network, and shunting to the local area, based on preset rules as needed, the edge, or the rear center. Among them, delay-sensitive tasks or simple solving tasks are solved and distributed locally in the rescue area via the on-board server to provide information support for on-site rescue tasks. Lightweight computing tasks are shunted to the edge side for processing through the private network, and then the results are distributed to the rescue area through the 5G downstream network. Large-scale tasks or data fusion tasks, such as disaster situation analysis, situation prediction, public opinion judgment, risk assessment, etc., are transmitted back to the rear command center and processed based on the pre-trained large language model and sufficient arithmetic resources, and the results are distributed to the edge side or the rescue area via the downstream network.

5.2. Feasibility Analysis

5.2.1. Application Feasibility

Regarding the rescue area side, the UAV carries different mission payloads, such as a lift-off base station, infrared detection device, aerial photography equipment, etc., to perform tasks such as disaster intelligence reconnaissance, emergency communication, and material protection as required. The drones are connected to each other through a self-organized network, and the aggregation node is selected to connect with the 5G base station (gNodeB) according to the local conditions to access the 5G network. At the same time, intelligent devices, VR/AR terminals, IoT terminals, etc., in the mission area access the 5G network through the protocol converter on the base station side to realize application services for various rescue missions. On the edge side of the mission, MEC servers are co-located with the base station to simplify deployment, and on-demand networking is used to build an edge cloud for deploying AI large models and unmanned equipment control servers. The edge cloud is connected to the 5G macro base station in the rear command center through the fiber optic cable network, and the emergency rescue command center all adopts wireless access to the network. Emergency rescue command center. Located in the fixed rear, the computing, storage and power resources are sufficient and can be reliably guaranteed. Therefore, it facilitates the deployment of emergency rescue services such as drone control applications, AI large models, image rendering, and video rectification, and realizes business applications such as intelligence processing based on large models, situation analysis and visualization, the cooperative control of drones, and VR/AR remote support.

5.2.2. Technical Feasibility

The implementation at the technical level mainly faces three difficulties.
Difficulty 1. Edge deployment of AI large models. Current approach: ➀ Deploying lightweight and large models based on server Docker environment but with limited resource utilization. ➁ By using large-scale model compression techniques such as quantization, pruning, or knowledge distillation, the model size can be compressed to achieve lightweight deployment, but the accuracy of the model will inevitably decrease. Our solution utilizes cloud and edge collaborative deployment, offloading lightweight tasks such as latency sensitive ones to edge servers for processing, thus avoiding the latency and security risks associated with multi-hop backhaul. When the task exceeds the load of a single machine, it is diverted to other edge servers for processing based on heuristic algorithms. Complex tasks are transmitted back to the central cloud for processing, and the inference results are distributed to the end of the rescue site through the 5G downstream network.
Difficulty 2. The fine-tuning and alignment of large models under low resource conditions. When computing resources are insufficient, large models often struggle to make effective inferences and cannot serve users properly. This article proposes a resource optimization strategy based on heuristic algorithms for a three-layer computing resource network architecture, which can effectively integrate idle resources in the network and enable large models to effectively utilize parallel training strategies such as data parallelism or model parallelism to achieve fine-tuning and alignment.
Difficulty 3. Heterogeneous data fusion. The transition strategy of using protocol converters for heterogeneous networks is based on 5G slicing to separate different business networks. In the future, with the development of semiconductors, more intelligent terminal chips will support heterogeneous network access and have certain computing power, making the network more concise and efficient. The above-mentioned difficult issues have accumulated relevant research and field testing experience in the early stage of the research group.

5.3. Problem Modeling

This paper designs the system architecture shown in Figure 5, which is designed according to the common characteristics of most emergency response scenarios and disaster relief scenarios, and is highly generalized in terms of geographic environments, meteorological conditions, communication resources, and computational resources. In specific emergency rescue tasks, the system can be disassembled and expanded as needed to meet the actual task needs. To facilitate the modeling of the target system, the system architecture shown in Figure 5 is simplified and abstracted, and the simplified model shown in Figure 6 is established.
The emergency rescue center mainly handles large-scale tasks, such as disaster situation analysis, situation prediction, public opinion judgment, risk assessment, etc., which require data fusion, intelligence correlation, and situation analysis based on pre-trained large language models, and rely on large computing and storage resources. However, the rescue command center has multi-hop fiber-optic cable network transmission from the rescue site, so the up-linking of intelligence data and the downstreaming of processing results require a certain delay overhead. Therefore, when faced with a large intelligence analysis task, or when there are not enough computing and storage resources on the edge side of the task, the intelligence data are transmitted back to the emergency rescue center for processing.
The mission edge side mainly deals with lightweight tasks, such as data aggregation, multi-modal intelligence alignment, content distribution, remote information relay, etc. The mission edge side can usually rely on the existing information and communication infrastructure, or motorized communication security vehicles to build an edge cloud, which is flexible in siting and easy to set up, and is therefore closer to the mission area and avoids a lot of the transmission latency. When the computing and storage resources on the edge side are sufficient and the task requires low latency, the rescue intelligence data will be shunted to the edge side of the task for processing.
The rescue region is mainly oriented to simple tasks, for example, the aggregation and processing of life detection data, IoT sensing node data, and geographic information data, as well as the on-site control of drones, unmanned vehicles, or robot dogs. Therefore, when the task volume is small and the equipment in the rescue task area can autonomously complete simple task processing, it is processed locally. In this model, the specific meaning is shown in Table 2.

5.3.1. Rescue Area Model

The rescue region, as the end of the system’s extension to the emergency rescue mission, typically deploys a large number of drones, unmanned vehicles, robot dogs, and IoT sensing devices, so the arithmetic resources of these devices are expressed in terms of clock cycle frequencies f u s e r , i . The latency of the rescue task to be processed by the devices in the field can be expressed as
T i , e x e = C i f u s e r , i
The energy consumption under the same conditions can be expressed as
E i , l o c a l = k u ( f u s e r , i ) 2 C i
In Equation (2), k u is the energy coefficient determined by the computing chip architecture of the device used in the emergency rescue mission [23], which is proportional to the computing power of the device, considering that most of the devices and equipment in the emergency rescue scenarios are mostly mobile networks or IoT terminals, with limited computational power, so according to the method in the [24], the energy coefficient of the device on the rescue region side is taken as k u = 10 27 .
When facing complex tasks such as rescue intelligence fusion, multi-modal data alignment, UAV obstacle avoidance optimization, etc., the terminal device’s own arithmetic and storage resources are difficult to support, and problems such as high energy consumption, high latency, and short endurance will occur, seriously affecting the efficiency of the rescue mission. Therefore, energy consumption and time delay are taken as the main indicators of actual task performance and user experience. In addition, in order to truly reflect the differentiated needs of rescue site tasks, the optimization weights of delay and energy consumption are flexibly adjusted, the delay weight factor δ is introduced, and the total system overhead in the rescue area is expressed by F i , l o c a l . In actual emergency rescue tasks, flexible adjustment is made according to different types of application services and optimization needs. For delay-sensitive tasks, such as hostage rescue, threat judgment, etc., the delay weight factor δ is further expanded to obtain better optimization of delay indicators, and the energy consumption weight factor is 1 δ . The optimization process can be expressed as
F i , l o c a l = δ T i , l o c a l + ( 1 δ ) E i , l o c a l
When the rescue task exceeds the calculated capacity of the rescue equipment, overloading and other phenomena will occur. At this time, it is necessary to transmit the computation task to the MEC server at the task edge layer for processing via the upstream, while 5G or 4G LTE networks all adopt orthogonal frequency division multiple access technology, and the data can be transmitted in parallel and without interference between subcarriers of the upstream channel. Thus, the transmission rate of the user terminal i in sub-band w i is
R i j = w i log 2 ( 1 + P i h i j 2 σ 2 )
In Equation (4), w i is the sub-band bandwidth of the upstream transmission of the rescue device, P i is the transmit power of the rescue device i, h i j 2 is the channel gain between the rescue device i and the edge node j, and σ 2 denotes the background noise variance, the offloading transmission delay of the device i can be expressed as
T i j , t r a n s = D i R i j

5.3.2. Task Edge Layer Model

In the task edge layer model, the entire process of diverting rescue tasks to the task edge layer is divided into three steps: upstream transmission, task solving, and result distribution. After the rescue mission is completed and analyzed, it is encoded and compressed to a smaller scale before being distributed. Due to the fast transmission rate of the downstream in 5G networks, which has an advantage of orders of magnitude over the upstream, and the smaller scale of data distribution after encoding, the delay of downstream distribution can be ignored. Therefore, the total time delay for rescue tasks to be diverted to the task edge layer is
T i j , m e c = T i j , t r a n s + T j , e x e
where T j , e x e is the time for task i to complete processing at the MEC platform, and the MEC server allocates the corresponding computational resources for task i. f i , m e c , and thus there is
T j , e x e = C i f i . m e c
s . t . i = 1 n f i , m e c f m e c , t o t a l
When the rescue task is diverted from the rescue area to the task edge layer, the energy consumption is mainly generated by the rescue equipment, which can be calculated from the rescue equipment transmit power:
E i , t r a n s = P i T i j , t r a n s = P i D i R i j
Due to the deployment of MEC servers and rear rescue center cloud servers based on mobile communication base stations, there is sufficient power guaranteed. Therefore, the total energy consumption of the task being diverted from the rescue area to the task edge layer needs to include the transmission energy consumption, while if the task edge layer is diverted to the rescue command center layer, the transmission and calculation energy consumption of both do not need to be considered. Therefore, the total cost of task allocation to the MEC servers is
F i j , m e c = δ T i , m e c + ( 1 δ ) E i , t r a n s
Based on the foregoing, the total overhead of the system for processing computational tasks is the weighted sum of the overheads of each layer:
F s y s t e m = i = 1 n ( 1 α i ) F i , l o c a l + α i F i j , m e c

5.4. Problem Posing

In order to further optimize the performance of the unmanned emergency support system and make full use of the existing computational and storage resources in the system, this paper takes the rescue mission requirements as the traction and aims at reducing the delay and energy consumption, based on the Global Learning Seagull Algorithm for Gaussian Mapping (GLSOAG) joint optimization of the rescue task diversion strategy, system communication, and computational resource allocation problems. The weighted sum of delay and energy consumption is expressed in terms of the offloading overhead; therefore, from Equation (10), in order to reduce the total offloading overhead of the target system, problem Q can be obtained:
Q min α , f m e c , w i F s y s t e m
s . t . α i 0 , 1 ,   i n
i = 1 n f i , m e c f m e c , t o t a l
0 f i , m e c f m e c , t o t a l
i = 1 n w i W
0 w i W
In the above model, α i = α 1 , α 2 , α 3 , . . . , α n represents the set of offloading decisions at the task edge layer. The constraints in Equations (13)–(17)are modeling the channel resource planning, representing the channel resources acquired by the UAV when it shunts the collected data to the superior node, which indicates that communication channels are allocated to the terminal devices at the time of offloading and that the sum of the sub-bandwidths does not exceed the total bandwidth; (14) and (15) are modeling the computational power planning process in the target system, which indicates that the tasks diverted to the edge node are allocated to the reasonable computational resources; and (13) corresponds to the task diversion policy, indicating that there is a total of 2 n implementation per layer when offloading is performed at the terminal and edge layers.
The implementation of a data triage is a nonlinearly constrained 0–1 planning problem, whereas in the two subproblems of communication and arithmetic decomposed above, the vast majority of the variables are linearly related to the emergency rescue mission and the data triage; communication and arithmetic resource planning problems are MINP problems [25]. However, the emergency rescue task, as well as the distributed deployment of the large model in the system, is a systematic problem that should not be separated for optimization and analysis, and thus the original modeling problem needs to be decoupled and split.

5.5. Problem Breakdown

In stochastic optimization or multi-objective optimization problems, the commonly used methods are Lyapunov’s method [26], MOEA/D (Multi-Objective Evolutionary Algorithm based on Decomposition) [27], and Tammer decomposition method [28] to combine complex problems that are decomposed into multiple equivalent problems, decoupled from the relevant variables, and then solved by the GLSOAG. Thus, Equation (12) is decomposed as
min f m e c , w i min α F s y s t e m
s . t . ( 13 ) ( 17 )
Let F s y s t e m correspond to the task diversion problem in parentheses, then there is
F s y s t e m = min α , β F s y s t e m
s . t . ( 13 )
Meanwhile, question Q can be formulated as
min f m e c , w i F s y s t e m
s . t . ( 14 ) ( 17 )
In this way, problem Q is decomposed into a computational power allocation and a triage execution problem, and the constraints of the two subproblems are decoupled. In addition, it can be further simplified by substituting the decision variables F s y s t e m , the offloading decision variables in the rescue task region α i = 0 , and the task triage variables in the task edge layer α i = 0 . Finally, the problem is transformed into a convex optimization problem and solved using the GLSOAG.

6. Algorithmic Improvements

6.1. Ideas for Improvement

The original seagull algorithm has the advantages of strong inspiration, few parameters, and adaptability. However, the convergence speed will be greatly affected when the high-dimensional space or the optimization space is large. Moreover, the seagull algorithm will be premature under some specific conditions. In addition, the performance of the algorithm is more sensitive to the parameters, and the setting of the parameters requires certain engineering attempts. The relevant influencing factors are shown in Table 3.
In addition, multiple parameter combinations can be traversed by grid search, random search, or Bayesian optimization to determine the final parameter settings according to the actual problem. To this end, we first use Gaussian chaotic mapping to initialize the seagull algorithm population and improve population diversity. Secondly, we optimize and adjust the population position update method to global learning. By letting seagulls learn from both the current generation’s best seagull and the historical best seagull, and introducing random learning weights, the seagull position is updated by considering the advantages of both. Finally, after each iteration update is completed, the optimal seagull individual is subjected to lens reverse learning, and the worst performing seagull individual is subjected to random reverse learning to enhance their ability to jump out of the local optima and avoid algorithm premature convergence.

6.2. Gaussian Map

Chaotic mapping is a method observed in nonlinear dynamical systems. It is deterministic and exhibits stochastic characteristics but is not periodic nor converges to a fixed point. It is often used for randomization in mathematics to improve the efficiency of algorithms with the help of chaotic properties. The core idea is to use the uncertainty of chaotic behavior to convert the parameters into the value domain of the chaotic space, and then map the results back to the variable space of the optimization problem through linear transformation. A variety of chaotic mapping methods are currently developed in optimization techniques, such as logistic mapping [29], sinusoidal mapping [30] and Gauss mapping [31]. The Gauss mapping used in this paper is defined as follows:
x n + 1 = 0 ,   x n = 0 1 x n mod ( 1 ) = 1 x n 1 x n ,   x n 0
Since the original seagull algorithm has concise parameters and an intuitive model and is easy to apply, combined with the traversal and stochastic properties of Gauss mapping, it can significantly expand the exploration range of the algorithm. Therefore, the use of Gauss mapping instead of the traditional stochastic initialization method not only increases the diversity of the population but also helps the algorithm to avoid falling into the local optimum, which in turn improves the overall optimization ability.

6.3. Seagull Algorithm

6.3.1. Global Search

Global search simulates the phenomenon of seagull migration. Seagull migration is actually a process of exploring a new area; when the seagull group finds the area of food and resources, they will stay. SOA, by simulating this process, can balance the algorithm’s ability to explore and develop.There are three prerequisites for this process:
  • Avoiding collisions:
    Natural groups of gulls are able to skillfully avoid collisions, and to model this process, the algorithm determines the new location of the gulls by introducing an additional variable A:
    C s t = A × P s t
    where C s ( t ) denotes the new position with no overlap with other gulls, P s ( t ) denotes the existing spatial position, t is the current number of iterations, and A denotes the displacement process of gulls in the search space:
    A = f c t × f c / M a x i t e r a t i o n
    where f c is a key parameter, and the value of A is decremented from 2 to 0 in a linear fashion by adjusting its frequency.
  • Direction of optimal position:
    Under satisfying obstacle avoidance conditions, gulls fly in the optimal resource-rich direction during exploration:
    M s ( t ) = B × ( P b s ( t ) P s ( t ) )
    where M s ( t ) denotes the optimal direction, and B is a stochastic factor acting on the global and local search.
    B = 2 × A 2 × r d
    where r d is a random number in the range [0, 1].
  • Close to the best location: During migration, seagulls will move towards the best resource-rich locations through obstacle avoidance mechanisms and thus obtain new spatial locations D s ( t ) :
    D s ( t ) = C s ( t ) + M s ( t )

6.3.2. Local Search

Localized search simulates seagull predation behavior. When a gull finds a food resource, it continuously adjusts its attack azimuth and flight speed to ensure the success rate of prey capture. During this period, the gulls round up prey through spiral maneuvers, represented in the x, y, and z dimensions as follows:
x = r × cos ( θ ) y = r × sin ( θ ) z = r × θ r = u × e θ v
where r is the radius of the spiral, θ is the angle at which the gulls attacked, in the interval [ 0 , 2 π ] , and u and v are the spiral coefficients. Then, the gull attack position is
P s ( t ) = D s ( t ) × x × y × z + P b s ( t )

6.4. Attack Strategy Improvement

The update of the seagull positions introduces a global learning approach, where seagulls learn both the current generation’s best seagull and the best seagull so far, using random learning weights to comprehensively consider updating seagull positions as shown in the following equation:
P s ( t ) = r 1 × D s ( t ) × x × y × z + P b s ( t ) + r 2 × D s ( t ) × r a n d ( 1 , dim ) + G b s ( t )
where r 1 is a random number between [0, 1], r 2 = 1 r 1 , r a n d ( 1 , dim ) is a set of random numbers between [0, 1] of the same dimensions as the seagulls. P b s ( t ) is the historical optimum, and G b s ( t ) is the optimum for the current generation.

6.5. Hybrid Reverse Learning

6.5.1. Mixed Reverse Learning Strategies

The hybrid backward learning strategy is a common technique in optimization algorithms that can enhance the algorithm’s global search as well as its ability to jump out of the local optima by generating the opposite of the current solution and evaluating its quality to select a better one. In this paper, we introduce a small-hole imaging reverse learning mechanism to enhance the algorithm’s optimization search efficiency and convergence accuracy by inverting the feasible solutions in the iteration, and provide a dynamic adjustment mechanism for the algorithm to adaptively equalize its exploratory and exploitative capabilities.

6.5.2. Imaging Small Holes Reverse Learning Strategies

The small-hole imaging reverse learning strategy is a learning method inspired by the small-hole imaging principle in the field of optics, and is commonly used in optimization algorithms to improve their search efficiency and ability to jump out of the local optima. The basic idea of this strategy is to guide the algorithm to explore under-searched regions in the solution space by constructing a “reverse solution” relative to the current feasible solution. This approach helps to increase the diversity of solutions, facilitate global search, and thus improve the algorithm’s optimization efficiency.
As shown in Figure 7, in the small-hole imaging reverse learning model, the height of the flame is h. Assuming that its projection location is the global optimal location, the effective interval of the horizontal axis in the space represents the boundary of the solution space, and the small hole is located at the midpoint o. The flame maps the flame reflection, whose location is also the optimal location, under the physical action of small-hole imaging. The process can be expressed as follows:
a j + b j / 2 X b e s t X b e s t a j + b j / 2 = h h
Let h / h = n , which is obtained by transforming X b e s t , have the expression
X b e s t = a j + b j 2 + a j + b j 2 n X b e s t n
When n = 1, one obtains
X b e s t = a j + b j X b e s t
From the above equation, it can be seen that when n = 1, the small-hole imaging reverse learning degrades to conventional reverse learning, so the obtained fixed reverse points are obtained by conventional reverse learning mapping, which is still far from the global optimum. For this reason, the receiver screen is adapted to find the location of the global optimum solution. The concept of the optimal and worst individuals in evolutionary algorithms is introduced into SOA, and when the worst seagull individual is caught in the local optimal solution, the small aperture imaging reverse learning mechanism is used to help it jump out of the local optimum.

6.5.3. Optimal–Worst Reverse Learning Policy

The worst positioned seagulls tend to affect the convergence accuracy and speed of the algorithm, so the rich representation of their spatial position is enhanced by a stochastic reverse learning strategy to obtain a stronger global search performance, which can be expressed as follows:
X w o r s t t + 1 = a j + r a n d × b j X w o r s t t
In the above equation, X w o r s t denotes the spatial location of the global worst seagull, and r a n d is a random number in the interval [0, 1]. In the algorithm optimization process, the position selection needs to be carried out through Equations (34) and (36) one by one, and the global optimal solution is updated after comparing the changes in the adaptation values before and after the reverse learning. Compared with other reverse learning mechanisms, e.g., the use of m number of individuals for reverse learning in elite reverse learning, it can effectively improve the efficiency of the algorithm’s pre-search, but it will constrain the ability of local development and affect the convergence speed of the algorithm. In this paper, the two extreme values of the individual states of the seagull population are processed in parallel, the solution space boundary [ a j , b j ] in the model is dynamically adjusted with the focus of the search, and the algorithm’s convergence speed and accuracy are effectively improved.

6.6. Algorithmic Process

The computational flow of the Global Learning Seagull Algorithm for Gaussian Mapping (GLSOAG) proposed in this paper is shown in Figure 8.

7. Experimentation and Analysis

7.1. Algorithm Performance Validation

In this section, the performance of the GLSOAG is verified and comparatively analyzed. The experiments are conducted to compare the GLSOAG proposed in this paper with the classical SOA, classical PSO and BSA. Simulation experiments are conducted for the four algorithms based on the classical test function set IEEE CEC2005 [32] shown in Table 4 and the algorithm iteration results are recorded in Table 5. In addition, the comparison of test function images and algorithm convergence curves are shown in Figure 9 to visualize the advantages of the algorithms in convergence speed and convergence accuracy. Due to space constraints, this section only conducts simulation experiments on test functions F1 to F12 from IEEE CEC2005, with the results for test functions F13 to F23 presented in Appendix B. Furthermore, we demonstrate the simulation results of running the 4 algorithms once on all test functions with a maximum of 500 iterations in Appendix A, to reflect a more aggressive performance comparison of the algorithms.

7.1.1. Algorithm Convergence Accuracy Comparison

Figure 10 shows the experimental results of the algorithm on F6, F8, and F12. From the experimental results, the GLSOAG shows a weak accuracy degradation at the late stage when it is approaching more than 190 iterations on F6. In addition, the GLSOAG is far ahead of the other algorithms on F6, but the accuracy is overtaken by SOA at the end of convergence. From the experimental results, although SOA achieves a slight advantage in the optimal fitness value, the difference between its optimal fitness value and the average fitness value corresponding to the optimal solution is larger than that of the GLSOAG by 0.6158, proving that in a comprehensive view, the GLSOAG is still superior to SOA. The GLSOAG is far ahead of BSA on F8, but its performance is close to that of SOA and PSO, with the front and end of the iteration in the fore, and its convergence performance is in the sub-optimal ranking from the experimental values. In addition, the GLSOAG achieves a clear lead in the test functions F1 to F5, F7, and F9 to F12 because the convergence accuracy of the algorithm needs to be combined with the optimal fitness value (best) and the average fitness value corresponding to the optimal solution (mean). The former determines the best performance the algorithm can achieve, and the latter determines the consistency of the optimal solution in multiple iterations. The closer the two are, the better the convergence performance and the higher the accuracy of the algorithm. It is worth noting that the optimal fitness value of the GLSOAG on F12 is slightly higher than that of SOA by 1.84021 × 10−1, but the difference between the optimal fitness value and the mean fitness value of the GLSOAG is smaller than that of SOA by 2.433841. Overall, except for the sub-optimal result on F8 with a slight difference, the GLSOAG has a certain advantage in all other test functions. The maximum accuracy difference amounts to 1 × 10300.

7.1.2. Algorithm Convergence Speed Comparison

Figure 9 illustrates the optimization graphs for the 12 test functions, and based on the average curve change over 30 consecutive rounds of experiments with 200 iterations per round, the GLSOAG converges ahead of the BSA on test function F8 but at a comparable rate of convergence to the PSO and SOA, gaining an advantage in the early part of the iteration but then iterating at a sub-optimal rate of convergence. In additsion, the convergence speeds on the remaining test functions all take the lead by a large margin early in the iteration.

7.1.3. Computation Complexity Comparison

Although the algorithm execution time is affected by factors such as the hardware, compiler, operating system, compilation language, and input data set, the algorithm execution time can reflect the complexity of the algorithm to a certain extent under specific hardware and software environments.
Table 6 demonstrates the execution time of the four algorithms on the test functions from F1 to F12. It can be seen that the GLSOAG proposed in this paper, despite the fact that it did not achieve an advantage in the longitudinal comparison with PSO and BSA because of the smaller number of parameters and simple iteration mechanism of the PSO and BSA algorithms, the overall difference is controlled to be less than 1 s. The average difference between the GLSOAG and SOA in the horizontal comparison is even smaller, indicating that its improvement on SOA does not bring an excessive time overhead.

7.1.4. Algorithm Stability Comparison

The standard deviation of the experimental results shows that the GLSOAG achieved the smallest standard deviation values on the rest of the tested functions with an exponential advantage except for the sub-optimal standard deviation on function F8. The GLSOAG differed from the maximum standard deviation on F1 to F12 by 1.7564 × 10 4 , 5.3748 × 10 11 , 1.1463 × 10 6 , 6.4512, 1.3135 × 10 8 , 1.5900 × 10 4 , 1.3463 × 10 , 3.1465 × 10 2 , 5.5820 × 10 , 1.1818, 1.0938 × 10 2 , and 3.5318 × 10 8 , respectively, with an average dominance of 5.3797 × 10 11 across the 12 test functions. This reflects that the GLSOAG has strong stability.

7.1.5. Results and Discussion

In summary, in most cases, the GLSOAG has significant advantages in convergence accuracy, convergence speed, and algorithmic stability, and the algorithmic complexity is within tolerance. Through the improvement strategy proposed in this paper, the global exploration ability of the algorithm in the early stage is effectively improved, the phenomenon of the premature maturity of the algorithm is improved, and the stability of the algorithm is maintained while meeting the needs of the algorithm to deal with high-dimensional complex problems.

7.2. Validation of Resource Optimization Methods

7.2.1. Environment Setup and Parameterization

In this section, the system optimization model developed based on the GLSOAG is simulated and validated in order to demonstrate the usability of the designed unmanned emergency support system and the effectiveness of the system resource optimization method. The simulation parameters are set as shown in Table 7.

7.2.2. System Architecture Performance Validation

Firstly, a validation experiment is conducted on the architecture of the “Unmanned Emergency Support System”. Different task volumes are set to run in three network modes, namely, “terminal side”, “terminal–edge side” and “center–edge–terminal side”, based on the random traffic diversion policy. In the Figure 11, the total overhead of the above architectures is roughly the same at the beginning stage of the task volume increase; as the task volume continues to increase, the terminal low-computing power equipment cannot meet the overhead of the large model inference task, and the system faces overload, which makes the latency and energy consumption increase rapidly; the “edge–terminal” collaborative architecture is able to handle the medium-sized inference task better, and the “edge–terminal” collaborative architecture can handle the medium-sized inference task better than the MEC server computing power and the MEC server computing power. The “cloud–edge–terminal” architecture has no obvious advantage in a small number of tasks, and the performance is jittery and slightly better than that of the edge-end architecture because the experiment is based on a random offloading strategy, while the “cloud–edge–terminal” architecture has no obvious advantage in a small number of tasks, and the performance is slightly better than that of the edge–terminal architecture because the experiment is based on a random offloading strategy. In the case of the “cloud–edge–terminal” architecture, the performance of the edge-end architecture is slightly better than that of the edge-end architecture. The “cloud-edge- terminal” architecture does not have significant advantages for a small number of tasks, and there is performance jitter, which is slightly greater than that of the edge-end architecture, because the experiment is based on a random offloading strategy, and this system has significant advantages for large-scale tasks.

7.2.3. The Effect of the Number of Iterations on System Overhead

Figure 12 shows the convergence effect of the SOA, GLSOAG, PSO, and BSA strategies. At the beginning of the iteration, the convergence trend of SOA, PSO, and BSA is overall gentle, while the GLSOAG converges faster, and the optimal solution can be approached around the 180th iteration because the GLSOAG adopts Gaussian mapping processing for the initialization of the population, which makes its pre-exploration global exploration more efficient. In addition, the four algorithms show slight oscillations at 10–60 iterations before resuming the converged state, indicating that the algorithms all have good global search capabilities. Overall, the resource optimization method based on the GLSOAG has a significant advantage over the methods based on SOA, PSO, and BSA in terms of convergence speed and accuracy.

7.2.4. Impact of Number of Tasks on System Overhead

Figure 13 compares the changes in total system overhead of the four algorithms when the task volume increases. When the task volume is small, the difference between the four algorithms is not significant because the terminal side where the task area is located can meet the task processing demand, and when the task volume increases, the terminal devices in the task area are close to full capacity, so the GLSOAG advantage is not obvious. As the task volume continues to increase, when the large volume tasks such as intelligence analysis exceed the processing capacity of the server on the edge side, the task data need to be shunted to the center cloud. The GLSOAG can still maintain its advantage in convergence speed and accuracy in the face of complex multi-dimensional problems, and the advantage gradually expands when the task volume is greater than 40.

7.3. Analysis and Discussion

On the one hand, from the simulation experiment results of the above four offloading strategies, the resource optimization strategy based on the GLSOAG achieves a certain advantage among similar algorithms, which can effectively reduce the system energy consumption and delay overhead, and then improve the execution efficiency of emergency rescue tasks. On the other hand, in different task scenarios, facing the actual demand of different task volumes, although our approach does not have obvious advantages when the task volume is small, it is because the lightweight tasks do not need to be offloaded to the edge side, and can be processed locally in the device, and the tasks do not use most of the components of the system that we designed, so the system cannot be fully functional. However, when the task volume is increased, the emergency rescue system based on the GLSOAG is able to show superiority, which proves that the system we designed and the optimization method have a certain degree of generality.
In addition, with the increase in emergency rescue equipment, the demand for data fusion processing is further increased, and by adding MEC nodes with different arithmetic power to the system, the system can be flexibly expanded, and our optimization method is also applicable. As a whole, the emergency rescue system we designed has good generality and scalability, and our proposed resource optimization strategy based on the GLSOAG has good performance.

8. Conclusions

Emergency rescue scenarios are in complex climatic and terrain environments, characterized by the complexity of the rescue equipment network system, the diversity of intelligence data modalities, the limited system survey boundaries, and the lack of algorithmic support for situational analysis, and UAVs face a variety of complex uncertainties in rescue scenarios, for example, communication link failure and malicious attacks [33]. For this reason, this paper designs a system architecture with elastic arithmetic for the mission requirements, introduces 5G network and MEC technology to provide UAVs with network support for the separation of the control and user plane, expands the system survey boundary, and improves the intelligence detection capability. Second, the Global Learning Seagull Algorithm for Gaussian Mapping (GLSOAG) is proposed, which has a substantial improvement over SOA, PSO, and DSA in terms of convergence accuracy, speed and stability. Finally, based on the GLSOAG-driven system resource optimization, the effectiveness and reliability of the resource optimization method is verified through simulation experiments, which proves that the system designed in this paper has a certain degree of feasibility, and that the proposed resource optimization method can effectively support various scales of computational tasks in emergency rescue scenarios and enhance the effectiveness of emergency rescue tasks.

Author Contributions

Conceptualization, S.H. and M.W.; methodology, S.H. and J.Z.; software, J.D. and J.Z.; validation, D.L., J.Z. and S.H.; formal analysis, S.H.; investigation, S.H. and J.Z.; resources, M.W.; data curation, S.H.; writing—original draft preparation, S.H. and J.Z.; writing—review and editing, S.H.; visualization, J.Z. and D.L.; supervision, J.Z. and J.D.; project administration, J.D.; funding acquisition, J.D. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Natural Science Foundation of China (grant number: 62173340).

Data Availability Statement

Data are contained within the article.

Acknowledgments

The authors sincerely thank the editor, the associate editor, and two reviewers for their constructive comments that led to a substantial improvement in this paper.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
MDPIMultidisciplinary Digital Publishing Institute
DOAJDirectory of open access journals
TLAThree letter acronym
5GFifth Generation Mobile Communication Technology
MECMobile Edge Computing
LLMLarge Language Model
NSSFNetwork Slicing Selection Function
UDMUnified Data Management
NRFNetwork Repository Function
NEFNetwork Exposure Function
AUSFAuthentication Server Function
AMFAccess and Mobility Management Function
SMFSession Management Function
PCFPolicy Control Function
UEUser Equipment
RAN(Radio) Access Network
UPFUser Plane Function
CFSCustomer Facing Services
LCMLifecycle Management
OSSOperations Support System
MEOMulti-Access Edge Computing Orchestrator
APPApplication

Appendix A

Appendix A shows the results of the four algorithms run on the benchmark function for 1 run with a maximum iteration of 500 rounds. Figure A1 and Figure A2 show the corresponding convergence curves as a visualization of the performance of the algorithms.
Figure A1. Algorithm effect diagram (Part 1). Subgraphs F1 to F12 correspond to the convergence effects of the SOA, GLSOAG, PSO, and BSA algorithms when run once on test functions F1 to F12, with a maximum of 500 iterations per run.
Figure A1. Algorithm effect diagram (Part 1). Subgraphs F1 to F12 correspond to the convergence effects of the SOA, GLSOAG, PSO, and BSA algorithms when run once on test functions F1 to F12, with a maximum of 500 iterations per run.
Drones 08 00763 g0a1aDrones 08 00763 g0a1b
Figure A2. Algorithm effect diagram (Part 2). Subgraphs F13 to F23 correspond to the convergence effects of the SOA, GLSOAG, PSO, and BSA algorithms when run once on test functions F13 to F23, with a maximum of 500 iterations per run.
Figure A2. Algorithm effect diagram (Part 2). Subgraphs F13 to F23 correspond to the convergence effects of the SOA, GLSOAG, PSO, and BSA algorithms when run once on test functions F13 to F23, with a maximum of 500 iterations per run.
Drones 08 00763 g0a2aDrones 08 00763 g0a2b

Appendix B

Appendix B shows the experimental results of the algorithm for the remaining 11 test functions on the CEC2005 function test set, with population size 30, maximum 200 iterations per iteration, and 30 consecutive experiments. The test function images and algorithm convergence curves are shown in Figure A3, and the optimization search results are shown in Table A1.
Figure A3. Graph of test functions F13–F23 and convergence curves. Subgraphs F13 to F23 represent the experimental results of the SOA, GLSOAG, PSO, and BSA algorithms on test functions F13 to F23, with a population size set to 30 and a maximum of 200 iterations per run, conducted over 30 consecutive trials.
Figure A3. Graph of test functions F13–F23 and convergence curves. Subgraphs F13 to F23 represent the experimental results of the SOA, GLSOAG, PSO, and BSA algorithms on test functions F13 to F23, with a population size set to 30 and a maximum of 200 iterations per run, conducted over 30 consecutive trials.
Drones 08 00763 g0a3aDrones 08 00763 g0a3b
Table A1. Experimental results of F13–F23 test functions.
Table A1. Experimental results of F13–F23 test functions.
FunctionAlgorithmOptimal Fitness Value (Best)Optimal Average Fitness Value (Mean)Worst Fitness Value (Worst)Standard Deviation (std)
F13SOA4.979851.6276590.287108.3764
GLSOAG1.99282.28892.54670.13587
PSO18.189653,761.7386474,553.739199,723.3998
BSA949,836,950.65841,896,355,671.25482,857,432,666.067516,219,373.3826
F14SOA0.998172.34957.87571.6055
GLSOAG0.9984.133812.67053.9855
PSO0.9980.9980.9981.9729 × 10−7
BSA0.99803289.6592499.9984236.757
F15SOA0.0003120.000501410.00076430.00012827
GLSOAG0.00032440.000573320.00146770.00022071
PSO0.000829660.00748620.029790.0096691
BSA0.00295450.183293.19690.58528
F16SOA−1.0316−1.0316−1.03161.9184 × 10−6
GLSOAG−1.0316−1.0316−1.03152.2611 × 10−5
PSO−1.0316−1.0315−1.03080.00017922
BSA−1.0316−1.0316−1.03161.8047 × 10−8
F17SOA0.397890.397970.398270.00010292
GLSOAG0.397890.399150.404090.0013292
PSO0.397890.397920.3983.2008 × 10−5
BSA0.397890.579612.35960.52479
F18SOA33.00013.00120.00024521
GLSOAG33.00033.00130.0003614
PSO33.00273.0220.0048401
BSA36.657584.249315.5486
F19SOA−3.8628−3.8613−3.85880.0011141
GLSOAG−3.8626−3.8594−3.8420.0043059
PSO−3.8628−3.8606−3.85490.0033719
BSA−3.8628−3.8205−3.53960.075609
F20SOA−3.3204−3.2647−3.12210.062981
GLSOAG−3.3185−3.2366−3.14880.065412
PSO−3.3217−3.0713−1.70530.29896
BSA−3.322−3.1994−2.19640.28526
F21SOA−9.8569−5.4287−2.60351.505
GLSOAG−8.8325−5.2406−4.97380.84682
PSO−10.1532−7.9739−2.61592.8463
BSA−10.1532−4.573−0.559983.3014
F22SOA−10.3465−5.7904−5.06341.7437
GLSOAG−10.1537−5.4932−4.94981.3779
PSO−10.4029−9.0311−1.83642.6623
BSA−10.4029−4.6252−0.652673.2957
F23SOA−10.3116−6.1161−3.41632.1673
GLSOAG−10.4128−5.5917−5.05631.4929
PSO−10.5363−8.9911−2.43542.4669
BSA−10.5364−3.9117−0.540043.1085

References

  1. Zhang, J.; Ye, L.; Hou, Z.; Yu, L.; Cai, J. Adaptive Distributed Cooperative Tracking Control and Application for Multiagent Formation Under Communication Constraints. IEEE Trans. Aerosp. Electron. Syst. 2024, 60, 4492–4506. [Google Scholar] [CrossRef]
  2. Zhang, J.; Han, K.; Zhang, P.; Hou, Z.; Ye, L. A Survey on Joint-Operation Application for Unmanned Swarm Formations Under a Complex Confrontation Environment. J. Syst. Eng. Electron. 2023, 34, 1432–1446. [Google Scholar] [CrossRef]
  3. Sufyan, A.; Khan, K.B.; Khashan, O.A.; Mir, T.; Mir, U. From 5G to beyond 5G: A Comprehensive Survey of Wireless Network Evolution, Challenges, and Promising Technologies. Electronics 2023, 12, 2200. [Google Scholar] [CrossRef]
  4. Ernest, T.Z.H.; Madhukumar, A.S. Computation Offloading in MEC-Enabled IoV Networks: Average Energy Efficiency Analysis and Learning-Based Maximization. IEEE Trans. Mob. Comput. 2024, 23, 6074–6087. [Google Scholar] [CrossRef]
  5. Che, Y.; He, D. An enhanced seagull optimization algorithm for solving engineering optimization problems. Appl. Intell. 2022, 52, 13043–13081. [Google Scholar] [CrossRef]
  6. Liu, B.; Qin, Y.; Zhou, X.; Li, T.; Yang, W.; Li, Z.; Ren, Y. An Advanced Cache Retransmission Mechanism for Wireless Mesh Network. In Wireless Algorithms, Systems, and Applications, Proceedings of the 16th International Conference, WASA 2021, Nanjing, China, 25–27 June 2021; Proceedings, Part III; Liu, Z., Wu, F., Das, S.K., Eds.; Springer: Cham, Switzerland, 2021; Volume 12939, pp. 274–281. [Google Scholar] [CrossRef]
  7. Cui, J.; Liu, X.; Zhong, H.; Zhang, J.; Wei, L.; Bolodurina, I.; He, D. A practical and provably secure authentication and key agreement scheme for uav-assisted vanets for emergency rescue. IEEE Trans. Netw. Sci. Eng. 2023, 11, 1454–1468. [Google Scholar] [CrossRef]
  8. Chen, B.; Zhang, W.; Shi, Y.; Lv, D.; Yang, Z. Reliable and efficient emergency rescue networks: A blockchain and fireworks algorithm-based approach. Comput. Commun. 2023, 206, 172–177. [Google Scholar] [CrossRef]
  9. Xing, L.; Fan, X.; Dong, Y.; Xiong, Z.; Xing, L.; Yang, Y.; Bai, H.; Zhou, C. Multi-UAV cooperative system for search and rescue based on YOLOv5. Int. J. Disaster Risk Reduct. 2022, 76, 102972. [Google Scholar] [CrossRef]
  10. Liu, C.; Szirányi, T. Road condition detection and emergency rescue recognition using on-board UAV in the wildness. Remote Sens. 2022, 14, 4355. [Google Scholar] [CrossRef]
  11. Han, D.; Jiang, H.; Wang, L.; Zhu, X.; Chen, Y.; Yu, Q. Collaborative Task Allocation and Optimization Solution for Unmanned Aerial Vehicles in Search and Rescue. Drones 2024, 8, 138. [Google Scholar] [CrossRef]
  12. Nath, D.; Bandyopadhyay, A.; Rana, A.; Gaber, T.; Hassanien, A.E. A novel drone-station matching model in smart cities based on strict preferences. Unmanned Syst. 2023, 11, 261–271. [Google Scholar] [CrossRef]
  13. Chen, W.; Lin, X.; Lee, J.; Toskala, A.; Sun, S.; Chiasserini, C.F.; Liu, L. 5G-advanced toward 6G: Past, present, and future. IEEE J. Sel. Areas Commun. 2023, 41, 1592–1619. [Google Scholar] [CrossRef]
  14. Mach, P.; Becvar, Z. Mobile edge computing: A survey on architecture and computation offloading. IEEE Commun. Surv. Tutor. 2017, 19, 1628–1656. [Google Scholar] [CrossRef]
  15. Spinelli, F.; Mancuso, V. Toward enabled industrial verticals in 5G: A survey on MEC-based approaches to provisioning and flexibility. IEEE Commun. Surv. Tutor. 2020, 23, 596–630. [Google Scholar] [CrossRef]
  16. Wang, W.; Qu, R.; Liao, H.; Wang, Z.; Zhou, Z.; Wang, Z.; Mumtaz, S.; Guizani, M. 5G MEC-based intelligent computation offloading in power robotic inspection. IEEE Wirel. Commun. 2023, 30, 66–74. [Google Scholar] [CrossRef]
  17. Deng, W.; Xu, J.; Zhao, H.; Song, Y. A novel gate resource allocation method using improved PSO-based QEA. IEEE Trans. Intell. Transp. Syst. 2020, 23, 1737–1745. [Google Scholar] [CrossRef]
  18. Khan, A.T.; Li, S.; Cao, X. Human guided cooperative robotic agents in smart home using beetle antennae search. Sci. China Inf. Sci. 2022, 65, 122204. [Google Scholar] [CrossRef]
  19. Han, S.I. Survey on UAV Deployment and Trajectory in Wireless Communication Networks: Applications and Challenges. Information 2022, 13, 389. [Google Scholar] [CrossRef]
  20. Wang, Q.; Li, W.; Yu, Z.; Abbasi, Q.; Imran, M.; Ansari, S.; Sambo, Y.; Wu, L.; Li, Q.; Zhu, T. An Overview of Emergency Communication Networks. Remote Sens. 2023, 15, 1595. [Google Scholar] [CrossRef]
  21. Zhang, J.; Zhang, P.; Hou, Z.; Han, K.; Han, X.; Chen, Z. Distributed Adaptive Cooperative Tracking Control for UAV Swarm Formation with Dead-Zone Input. IEEE Trans. Transp. Electrific. 2024, 10, 5318–5333. [Google Scholar] [CrossRef]
  22. Xu, Y.; Kohtz, S.; Boakye, J.; Gardoni, P.; Wang, P. Physics-informed machine learning for reliability and systems safety applications: State of the art and challenges. Reliab. Eng. Syst. Saf. 2023, 230, 108900. [Google Scholar] [CrossRef]
  23. Katal, A.; Dahiya, S.; Choudhury, T. Energy efficiency in cloud computing data centers: A survey on software technologies. Clust. Comput. 2023, 26, 1845–1875. [Google Scholar] [CrossRef]
  24. Akhlaqi, M.Y.; Hanapi, Z.B.M. Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions. J. Netw. Comput. Appl. 2023, 212, 103568. [Google Scholar] [CrossRef]
  25. Comert, S.E.; Yazgan, H.R. A new approach based on hybrid ant colony optimization-artificial bee colony algorithm for multi-objective electric vehicle routing problems. Eng. Appl. Artif. Intell. 2023, 123, 106375. [Google Scholar] [CrossRef]
  26. Liu, S.; Lin, Z.; Wang, Y.; Huang, W.; Yan, B.; Li, Y. Three-body cooperative active defense guidance law with overload constraints: A small speed ratio perspective. Chin. J. Aeronaut. 2024. [Google Scholar] [CrossRef]
  27. Gonçalves, R.A.; Kuk, J.N.; Almeida, C.P.; Venske, S.M. MOEA/D-HH: A hyper-heuristic for multi-objective problems. In Evolutionary Multi-Criterion Optimization, Proceedings of the 8th International Conference, EMO 2015, Guimarães, Portugal, 29 March–1 April 2015; Proceedings, Part I; Springer: Cham, Switzerland, 2015; pp. 94–108. [Google Scholar]
  28. Xu, W.; Wang, W.; Li, Z.; Wu, Q.; Wang, X. Joint task allocation and resource optimization for blockchain enabled collaborative edge computing. China Commun. 2024, 21, 218–229. [Google Scholar]
  29. Buscarino, A.; Fortuna, L. A Shifted Logistic Map. Int. J. Bifurc. Chaos 2023, 33, 2330002. [Google Scholar] [CrossRef]
  30. Shao, S.; Li, J.; Shao, P.; Xu, G. Chaotic Image Encryption Using Piecewise-Logistic-Sine Map. IEEE Access 2023, 11, 27477–27488. [Google Scholar] [CrossRef]
  31. Ahuja, B.; Doriya, R.; Salunke, S.; Hashmi, M.F.; Gupta, A.; Bokde, N.D. HDIEA: High dimensional color image encryption architecture using five-dimensional Gauss-logistic and Lorenz system. Connect. Sci. 2023, 35, 2175792. [Google Scholar] [CrossRef]
  32. Yao, X.; Liu, Y.; Lin, G.M. Evolutionary programming made faster. IEEE Trans. Evol. Comput. 1999, 3, 82–102. [Google Scholar] [CrossRef]
  33. Zhang, P.; Zhang, J.; Yang, J.; Gao, S. Resilient Event-Triggered Adaptive Cooperative Fault-Tolerant Tracking Control for Multiagent Systems Under Hybrid Actuator Faults and Communication Constraints. IEEE Trans. Aerosp. Electron. Syst. 2023, 59, 3021–3037. [Google Scholar] [CrossRef]
Figure 1. The 5G and mobile edge computing convergence architecture [13,14].
Figure 1. The 5G and mobile edge computing convergence architecture [13,14].
Drones 08 00763 g001
Figure 2. Comparison of performance metrics between 5G and 4G networks.
Figure 2. Comparison of performance metrics between 5G and 4G networks.
Drones 08 00763 g002
Figure 3. Logical network architecture of MEC.
Figure 3. Logical network architecture of MEC.
Drones 08 00763 g003
Figure 4. Multi-view model.
Figure 4. Multi-view model.
Drones 08 00763 g004
Figure 5. Distributed unmanned intelligence reconnaissance system in emergency rescue scenario.
Figure 5. Distributed unmanned intelligence reconnaissance system in emergency rescue scenario.
Drones 08 00763 g005
Figure 6. Simplified model of emergency rescue system.
Figure 6. Simplified model of emergency rescue system.
Drones 08 00763 g006
Figure 7. Illustration of small-hole imaging reverse learning.
Figure 7. Illustration of small-hole imaging reverse learning.
Drones 08 00763 g007
Figure 8. Flowchart of the GLSOAG.
Figure 8. Flowchart of the GLSOAG.
Drones 08 00763 g008
Figure 9. Algorithm effect diagram. In it, subplots F1 to F12 respectively represent the average curve variation effect diagrams of SOA, GLSOA, PSO, and BSA algorithms on test functions F1 to F12, obtained from 30 consecutive rounds of experiments with 200 iterations per round.
Figure 9. Algorithm effect diagram. In it, subplots F1 to F12 respectively represent the average curve variation effect diagrams of SOA, GLSOA, PSO, and BSA algorithms on test functions F1 to F12, obtained from 30 consecutive rounds of experiments with 200 iterations per round.
Drones 08 00763 g009aDrones 08 00763 g009b
Figure 10. Performance comparison of the algorithm on the F6, F8, and F12 test functions.Among them, the bold numbers in the table represent the superior values in each group of experiments.
Figure 10. Performance comparison of the algorithm on the F6, F8, and F12 test functions.Among them, the bold numbers in the table represent the superior values in each group of experiments.
Drones 08 00763 g010
Figure 11. Performance of the number of tasks under different architectures.
Figure 11. Performance of the number of tasks under different architectures.
Drones 08 00763 g011
Figure 12. Effect of the number of iterations of different algorithms on the system overhead.
Figure 12. Effect of the number of iterations of different algorithms on the system overhead.
Drones 08 00763 g012
Figure 13. Impact of task volume on system overhead.
Figure 13. Impact of task volume on system overhead.
Drones 08 00763 g013
Table 1. Needs analysis framework.
Table 1. Needs analysis framework.
Requirements FrameworkDescription of Requirements
Business needIntelligence data collectionHigh-bandwidth information transmission pathwayDrone cluster control operationsIntelligence data analysisSecurity posture analysis and prediction
Capacity needsMulti-source information detection and acquisition capabilitiesOffloading of unmanned equipment data in transitAutomated UAV Obstacle Avoidance and CollaborationKnowledge-enhanced implicit association of dataMulti-modal data alignment and prediction
System RequirementsDrones or unmanned vehicles with various types of payloads5G mobile communication networks and MEC systemsSeparation of data plane and control planeLarge Model Attached Knowledge Graphlarge model inference
Table 2. Table of meanings of model symbols.
Table 2. Table of meanings of model symbols.
ParametersImplications
D i Input data volume
h i j 2 Channel gain between terminal device i and edge node j
C i Workload, i.e., CPU cycles required to complete the first task
σ 2 background noise variance
T i , l o c a l Processing latency of tasks at local terminal devices
R i j Transmission speed from terminal device i to edge node j
f u s e r , i Terminal device CPU clock cycle frequency
T i j , t r a n s Upstream transmission delay of the device
E i , l o c a l Calculating Energy Consumption for Local Devices
T j , e x e Processing latency at the MEC side
k u Terminal equipment energy factor
T i j , m e c Task i Total delay from offload to MEC processing
δ Latency Optimization Weighting Factors
f i , m e c Arithmetic resources allocated by the MEC server for task i
F i , l o c a l Total task local processing overhead
f m e c , t o t a l MEC total computing power resources
WUpstream bandwidth
E i , t r a n s Tasks i Offloading Transmission Energy Consumption to the MEC
w i Task i Upstream transmission link sub-band widths
F i j , m e c Task i Offload to edge layer Total processing overhead
P i Transmit power of the ith terminal device
Table 3. Effect of seagull algorithm parameter settings on performance.
Table 3. Effect of seagull algorithm parameter settings on performance.
Parameter IndicatorsFactorsAdjustment Strategy
Population sizeExpanding the population size can increase the search range but incurs additional computational costs.Adjust the population size according to the complexity of the problem.
Learning factorControlling the speed and direction of individual search affects search efficiency and convergence speed.Balancing algorithm exploration and development capabilities by experimentally determining optimal learning factors, for example, the grid search method.
Inertial weightingControls the tendency of an individual to move from the current position to the target position.The inertia weights can be adaptively weighted or randomly initialized and are the focus of algorithm improvement.
Exploration and exploitation factorControlling the balance of algorithmic exploration and development capabilities.Adjusting algorithmic exploration and development capabilities at different stages enhances their ability to leapfrog local optima.
Maximum number of iterationsAffects the quality of the algorithmic solution.This is usually taken to set a redundant number of iterations.
Table 4. Set of test functions [32].
Table 4. Set of test functions [32].
NumberFunctionDimInterval f min
F1 F 1 ( x ) = i = 1 n x i 2 30[−100,100]n0
F2 F 2 ( x ) = i = 1 x i + i = 1 n x i 30[−10,10]n0
F3 F 3 ( x ) = i = 1 j = 1 i x j 2 30[−100,100]n0
F4 F 4 ( x ) = max i x i , 1 i n 30[−100,100]n0
F5 F 5 ( x ) = i = 1 n 1 100 x i + 1 x i 2 2 + x i 1 2 30[−30,30]n0
F6 F 6 ( x ) = i = 1 n x i + 0.5 2 30[−100,100]n0
F7 F 7 ( x ) = i = 1 n i x i 4 + random [ 0 , 1 ) 30[−1.28,1.28]0
F8 F 8 ( x ) = i = 1 n x i sin x i 30[−500,500]n 12,569.5
F9 F 9 ( x ) = i = 1 n x i 2 10 cos 2 π x i + 10 30[−5.12,5.12]n0
F10 F 10 ( x ) = 20 exp 0.2 1 n i = 1 n x i 2 exp 1 n i = 1 n cos 2 π x i + 20 + e 30[−32,32]0
F11 F 11 ( x ) = 1 4000 i = 1 n x i 2 i = 1 n cos x i i + 1 30[−600,600]0
F12 F 12 ( x ) = x n 10 sin 2 π y i + i = 1 n 1 y i 1 2 1 + 10 sin 2 π y i + 1 + y n 1 2 + i = 1 n u x i , 10 , 100 , 4 ; y i = 1 + 1 4 x i + 1 ; u x i , a , k , m = k x i a m , x i > a , 0 , a x i a , k x i a m , x i < a 30[−50,50]n0
Table 5. Population size 30 per maximum iteration 200 consecutive 30 experiments.
Table 5. Population size 30 per maximum iteration 200 consecutive 30 experiments.
FunctionAlgorithmOptimal Fitness Value (Best)Optimal Average Fitness Value (Mean)Worst Fitness Value (Worst)Standard Deviation (std)Execution Time (time/s)
F1SOA0.101895.217222.54196.46430.39195
GLSOAG00000.498
PSO848.5171869.64043998.9756815.70320.12593
BSA73,522.0487101,333.1552143,129.985117,564.22670.071708
F2SOA0.00677450.0688680.195230.0497410.39925
GLSOAG00000.50927
PSO15.945433.106575.061214.72720.13522
BSA103.5301104,582,873,947.47472,948,489,857,917.849537,482,491,234.53940.080811
F3SOA289.20174283.25549472.39592415.41141.1094
GLSOAG00001.2398
PSO4152.582513,304.357833,716.73537671.90320.82269
BSA117,226.88081,361,575.57434,584,154.82111,146,319.75120.14069
F4SOA3.246312.325835.96796.45120.40825
GLSOAG00000.49713
PSO8.56219.259927.17294.08780.12995
BSA85.52994.516897.77312.40460.067545
F5SOA37.24161153.448813,218.36892559.38050.48161
GLSOAG26.418128.033528.87470.728610.58244
PSO36,179.5563192,030.5926611,470.837127,599.82670.20624
BSA182,778,829.9194414,347,488.6429782,024,183.872131,350,299.06030.081211
F6SOA1.33642.66045.17011.12640.40324
GLSOAG2.84213.55034.36020.381730.51008
PSO741.77641555.52963973.8031655.18950.12772
BSA65,881.892399,757.7783126,563.816315,900.17030.069297
F7SOA0.0274110.118340.241670.0563010.94493
GLSOAG1.9783 × 10−50.000417970.00244920.000466951.0664
PSO0.246472.354716.65213.60250.65944
BSA16.382937.619866.753513.4630.12505
F8SOA−4411.3306−3702.2739−3305.0695300.82110.53173
GLSOAG−7542.1057−5914.4544−4738.9624597.91980.66205
PSO−8281.9138−6690.496−5039.6653956.78850.2263
BSA−2291.5917−234.80741424.281912.56830.078753
F9SOA0.04164720.671666.699717.4950.4826
GLSOAG00000.51352
PSO175.2434228.9793289.469429.09050.227
BSA200.7324332.7867434.468755.82020.080009
F10SOA0.0610610.587762.35590.598060.50405
GLSOAG4.4409 × 10−164.4409 × 10−164.4409 × 10−1600.52581
PSO6.23569.188311.62681.18180.24945
BSA19.619320.10920.61440.197720.080905
F11SOA0.221780.886211.24420.216080.56276
GLSOAG00000.59092
PSO9.298415.856423.95523.92120.31196
BSA648.5074925.7351115.7598109.38250.084555
F12SOA0.0503992.57947.5532.83991.8174
GLSOAG0.234420.329580.502860.0657091.9678
PSO6.742770.4202663.4862135.91941.5425
BSA593,474,501.33521,129,032,378.012,086,760,320.8523353,184,502.91450.21039
Table 6. Execution time of the algorithm on the test function.
Table 6. Execution time of the algorithm on the test function.
FunctionF1F2F3F4F5F6
SOA0.391950.399251.10940.408250.481610.40324
GLSOAG0.4980.509271.23980.497130.582440.51008
PSO0.125930.135220.822690.129950.206240.12772
BSA0.0717080.0808110.140690.0675450.0812110.069297
FunctionF7F8F9F10F11F12
SOA0.944930.531730.48260.504050.562761.8174
GLSOAG1.06640.662050.513520.525810.590921.9678
PSO0.659440.22630.2270.249450.311961.5425
BSA0.125050.0787530.0800090.0809050.0845550.21039
Table 7. Main parameter settings.
Table 7. Main parameter settings.
ParametersImplications
D i Input data volume
C i Workload, i.e., CPU cycles required to complete the ist task
T i , l o c a l Processing latency of tasks at local terminal devices
f u s e r , i Terminal device CPU clock cycle frequency
E i , l o c a l Calculating Energy Consumption for Local Devices
k u Terminal equipment energy factor
δ Latency Optimization Weighting Factors
F i , l o c a l Total task local processing overhead
WUpstream bandwidth
w i Task i Upstream Transmission Link Sub-band Widths
P i Transmit power of the ith terminal device
H i j Channel gain between terminal device i and edge node j
σ 2 Background noise variance
R i j Transmission speed from terminal device i to edge node j
T i j , t r a n s Upstream transmission delay of the device i
T j , e x e Processing latency at the MEC side
T i j , m e c Task i Total delay from offloading to MEC processing
f i , m e c Arithmetic resources allocated by the MEC server for task i
f m e c , t o t a l MEC total computing power resources
E i , t r a n s Task i Offloading Transmission Energy Consumption to the MEC
F i j , m e c Task i Offload to Edge Layer Processing Total Overhead
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Han, S.; Wang, M.; Duan, J.; Zhang, J.; Li, D. Research on Unmanned Aerial Vehicle Emergency Support System and Optimization Method Based on Gaussian Global Seagull Algorithm. Drones 2024, 8, 763. https://doi.org/10.3390/drones8120763

AMA Style

Han S, Wang M, Duan J, Zhang J, Li D. Research on Unmanned Aerial Vehicle Emergency Support System and Optimization Method Based on Gaussian Global Seagull Algorithm. Drones. 2024; 8(12):763. https://doi.org/10.3390/drones8120763

Chicago/Turabian Style

Han, Songyue, Mingyu Wang, Junhong Duan, Jialong Zhang, and Dongdong Li. 2024. "Research on Unmanned Aerial Vehicle Emergency Support System and Optimization Method Based on Gaussian Global Seagull Algorithm" Drones 8, no. 12: 763. https://doi.org/10.3390/drones8120763

APA Style

Han, S., Wang, M., Duan, J., Zhang, J., & Li, D. (2024). Research on Unmanned Aerial Vehicle Emergency Support System and Optimization Method Based on Gaussian Global Seagull Algorithm. Drones, 8(12), 763. https://doi.org/10.3390/drones8120763

Article Metrics

Back to TopTop