• Journal of Terahertz Science and Electronic Information Technology
  • Vol. 22, Issue 11, 1199 (2024)
XU Jianxi1, WEI Siyu2, and LI Zongping3
Author Affiliations
  • 1China Energy Railway Equipment Co., Ltd, Beijing 100011, China
  • 2School of Electronic Information Engineering, Beijing Jiaotong University, Beijing 100044, China
  • 3Traffic Control Technology Co., Ltd., Beijing 100070, China
  • show less
    DOI: 10.11805/tkyda2023049 Cite this Article
    XU Jianxi, WEI Siyu, LI Zongping. 5G-based design and optimization of cloud-edge-train collaborative computing[J]. Journal of Terahertz Science and Electronic Information Technology , 2024, 22(11): 1199 Copy Citation Text show less
    References

    [5] YANG Songpo, LIAO Feixiong, WU Jianjun, et al. A bi-objective timetable optimization model incorporating energy allocation and passenger assignment in an energy-regenerative metro system[J]. Transportation Research Part B: Methodological, 2020(133): 85-113. doi: 10.1016/j.trb.2020.01.001.

    [9] ABBAS N, ZHANG Y, TAHERKORDI A, et al. Mobile edge computing: a survey[J]. IEEE Internet of Things Journal, 2018, 5(1): 450-465. doi: 10.1109/JIOT.2017.2750180.

    [11] ALMEIDA C, GONCALVES R, VENSKE S, et al. Multi-armed bandit based hyper-heuristics for the permutation flow shop problem[C]//The 7th Brazilian Conference on Intelligent Systems. Sao Paulo, Brazil: IEEE, 2018: 139-144.

    [12] KAWATA R, FUJITA K. Meta-strategy based on multi-armed bandit approach for multi-time negotiation[J]. IEICE Transactions on Information and Systems, 2020, 103(12): 2540-2548. doi: 10.1587/transinf.2020SAP0003.

    [13] ALMEIDA C P, GONALVES R A, VENSKE S, et al. Hyper-heuristics using multi-armed bandit models for multi-objective optimization[J]. Applied Soft Computing, 2020(95): 106520. doi: 10.1016/j.asoc.2020.106520.

    [14] SINGH S, TRIVEDI A. Anti-jamming in cognitive radio networks using reinforcement learning algorithms[C]//2012 the Ninth International Conference on Wireless and Optical Communications Networks (WOCN). Indore, India: IEEE, 2012: 1-5. doi: 10.1109/WOCN.2012.6331885.

    [15] AUER P. Using upper confidence bounds for online learning[C]//The 41st Annual Symposium on Foundations of Computer Science. Redondo Beach, CA, USA: IEEE, 2000: 270-279. doi: 10.1109/SFCS.2000.892116.

    [16] ASADI K, LITTMAN M. A new Softmax operator for reinforcement learning[DB/OL]. (2016-12-16)[2023-02-28]. https://arxiv.org/abs/1612.05628v3.

    [19] DENG Shuiguang, ZHAO Hailiang, FANG Weijia, et al. Edge intelligence: the confluence of edge computing and artificial intelligence[J]. IEEE Internet of Things Journal, 2020, 7(8): 7457-7469. doi: 10.1109/JIOT.2020.2984887.

    [22] PATIL V, GHALME G, NAIR V, et al. Achieving fairness in the stochastic multi-armed bandit problem[J]. The Journal of Machine Learning Research, 2021, 22(1): 174. doi: 10.5555/3546258.3546432.

    [23] COMPARE M, BARALDI P, MARELLI P, et al. Partially observable Markov decision processes for optimal operations of gas transmission networks[J]. Reliability Engineering & System Safety, 2020(199): 106893. doi: 10.1016/j.ress.2020.106893.

    XU Jianxi, WEI Siyu, LI Zongping. 5G-based design and optimization of cloud-edge-train collaborative computing[J]. Journal of Terahertz Science and Electronic Information Technology , 2024, 22(11): 1199
    Download Citation