International Journal of Interactive Mobile Technologies (iJIM) – eISSN: 1865-7923 – Vol 17 No 04 (2023) Paper—Clustering Technique for Mobile Edge Computing to Detect Clumps in Transportation-Related… Clustering Technique for Mobile Edge Computing To Detect Clumps in Transportation-Related Problems https://doi.org/10.3991/ijim.v17i04.37801 J. Albert Mayan1(), S.V. Manikanthan2, Azham Hussain3, S. Nithyaselvakumari4, A. Vinnarasi5 1 Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology, Chennai, India 2 Melange Academic Research Associates, Puducherry, India 3 School of Computing, Universiti Utara Malaysia, Sintok, Malaysia 4 Department of Medical Instrumentation, Saveetha school of Engineering, Thandalam, India 5 Department of ECE, SRMIST, Kattankulathur, Chennai, India albert.cse@sathyabama.ac.in Abstract—The daily functioning of civilization depends heavily on transportation. In most cities, a sizable section of the working class consistently attends both employment and education. There are many different things you can do when commuting, such as unwinding, eating out, and other things. The most popular means of transportation in North Cyprus, particularly in developing cities, is island transportation, which includes the usage of both private cars and commercial vehicles. The advent of edge computing, which offers the opportunity to connect potent processing servers next to the mobile device, is a significant step toward improving user experience and reducing resource use. Mobile Edge Computing is the next trustworthy approach for how mobile devices consume communications and computing. Offloading computation is a key component developing mobile edge computing, which enables devices to get around clustering techniques' limitations and get around computing, storage, and energy constraints. However, computation offloading is not always the best strategy to use; making choosing unloading is a critical step that requires consideration of numerous factors. For instance, shifting the high-resource node to an edge server and granting similar capabilities to the low-resource nodes would delegate heavy duties to the external unit inside the network. The evaluations' results were noteworthy and substantial. Problems involving the vehicles of institutions and organizations can be resolved using the suggested solution to the school bus routing issue. We also test the impact of network latency on the delivery of a particular result using an Edge Computing simulator. Keywords—mobile edge computing (MEC), transportation problems, save time, clustering technique, energy efficiency, resource optimization iJIM ‒ Vol. 17, No. 04, 2023 47 https://doi.org/10.3991/ijim.v17i04.37801 Paper—Clustering Technique for Mobile Edge Computing to Detect Clumps in Transportation-Related… 1 Introduction Any city's growth is largely dependent on the state of its transportation infrastructure and the services it provides to its populace. With access to real-time information, an intelligent transportation system offers citizens quick and simple options for safe transport. These facilities influence how quickly people move through their daily lives and benefit society in many other ways, such as by reducing pollution, boosting the economy, hastening development, improving health, and much more. Numerous researchers have suggested various methods and schemes to hold the large data produced by smart metropolises to provide more clever, smart, and sustainable outcomes. However, these solutions don't just concentrate on the big data aspect of real-time smart freight forwarding. By 2050, 75% of the world's population, or more than 7 billion people, were expected to live in cities and nearby suburbs. As a result, the amount of the city's traffic will considerably grow. Elevated big data will be produced by the significant increase in city traffic intensity that will result from the overabundance of vehicular communication and road sensors in the CPS ecosystem. A proportionate spike in on-road traffic accidents may also result from this massive increase in traffic intensity. As a result, residents will have issues with traffic congestion and delayed travel times. Due to the rapid advancement of technologies, consumers may desire to obtain any on-road city traffic information at any time and from any location. In order to prevent traffic congestion, the authorities may also need to distribute city traffic by skilfully rerouting it to fewer congested transportations in actual time. Additionally, this dispersion lessens air contamination, improving community health. In a nutshell, traffic authorities are required to manage the traffic system wisely with the least amount of human intervention and resources. This clever transport infrastructure makes it easier for residents to access real-time transportation facts and has a big impact on how people live [1]. Fig. 1. Mobile Edge Computing Edge computing often referred to as mobile edge computing has recently emerged to overcome the processing limitations of mobile devices in response to an increase in Local Processing Mobile Cloud Application Cloud Data Center Cloud Data Center Request Processing Task Execution Computation 48 http://www.i-jim.org Paper—Clustering Technique for Mobile Edge Computing to Detect Clumps in Transportation-Related… the number of computationally intensive apps. Edge computing relieves network capacity constraints by distributing the workload to dispersed computing clusters. Connections to servers are nevertheless slow, although cloud technology allows users to access a shared pool of computers and move expensive computations to the cloud. One of the key reasons why edge computing appears to have the ability to support portable virtual reality is because of this. Edge servers keep a local reference image database and use it to identify objects in image pixels. If the edge fails, the request goes to the cloud [2]. The main contribution of this paper is, namely, as follows: • We bring forth a problem for minimising the amount of time a task takes to complete by jointly optimising its computational and networking resources, such as its edge computing capabilities. • In order to handle the original optimisation problem's non-linearity and non- convexity, we separated it into smaller issues and iteratively resolved each one. Additionally, we also provide a closed-form method at MEC for task splitting and computing allocation of resources. • To show the effectiveness of the suggested approach, statistical solutions are contrasted with those from an extensive search and other benchmark schemes. The numerical findings demonstrate that the proposed method outperforms all existing schemes and performs epsilon identically to the extensive search when task computation energy and time consumption are taken into consideration as outstanding development [3]. The essay's remaining sections are organised as follows. Section 2 presents the research on the pertinent prior work. Section 3 describes the features of the proposed system, including the proposed system architecture, implementation model, characteristics of the graph-based technique, and data analysis. The implementation environment is described and the system's effectiveness is rated in Section 4. Section 5 provides the resolution. 2 Related works Liu, L., Zhao et.al [4] additionally, some academics talked about the use of transfer culture in MEC. Reference used distributed knowledge to simultaneously decide which MEC networks should be offloaded. In order to address the trade-off between latency and energy consumption, Reference established a hierarchical computational intelligence task distribution framework. In this framework, the lower layers of the pertained CNN model are embedded in the autonomous aerial vehicles, while the higher layers are handled by the MEC server. In addition to demonstrating the potential of deep learning and edge computing, this study also emphasises the importance of generalisation and resource problems in useful uses. These aforementioned methods frequently require much iteration to arrive at a local optimum, making them inappropriate for real-world applications involving compute iJIM ‒ Vol. 17, No. 04, 2023 49 Paper—Clustering Technique for Mobile Edge Computing to Detect Clumps in Transportation-Related… offloading. Additionally, when the MEC network scale increases, their computational cost tends to increase dramatically. Sarfraz, M., Alshahrani et.al [5] this method of computing is referred to as MEC. Unfortunately, due to the compute offloading link's current shortcomings, the MEC model has not yet realised all of its promise. For example, when unloading computation rather than completing the task locally, devices at the cell's perimeter have a notoriously poor offloading success rate and/or may face increased delay. As a result, these devices are forced to rely on their computing capacity, which is frequently insufficient to execute resource-demanding applications. The efficiency of the MEC systems' communications must be improved because of this. abd Al_kadum Hassan, H., Hasan et.al [6] Vehicle-to-Vehicle system removes the need for a main station to manage the network architecture and provides a connection between vehicles using an ad hoc wireless network. Because of their high speed, vehicular ad hoc networks (VANETs) are distinguished by the self-organization of the vehicles and quick changes in the network topology. As link connections failures frequently occur in VANETs, ensuring the security of information in VANETs is more challenging than in typical MANETs. Creating a cluster with a hierarchical system within the network is an effective and affordable way to reduce the mobility effect and improve VANET network access. Ahn, J., Lee, J., Park et.al [7] For the MEC environment, we suggest a power- efficient clustering method (PECS) it keeps the MEC servers' processing of incoming delays within acceptable bounds. By analysing the impact of the size of clusters on the CPU workloads, the optimization problem for choosing the clustering to lower the energy consumption of MEC servers is established and addressed. A thorough examination of the suggested model shows that it effectively determines the ideal number of clusters under the predetermined circumstances that satisfy the convexity of the energy consumption model. Zhang, X., Shen et.al [8] Applications like virtual reality, vr technology, and language processing are among the many new ones that have emerged with the growth of the mobile web and the popularity of smart terminals. These applications typically have asset resources and demand a lot of computing and storage resources to operate, which has an impact on the quality of the service. Although the performance of smart terminal processors is constantly improving, they are unable to quickly process high-performance programs, which have a significant negative influence on the user's service encounter. Rathore, M. M., Attique Shah et.al [9] transportation guarantees to provide the correct evidence at the proper period, location, and device to assist the public in making any transportation-related decisions. The vehicular network and the system of allow are two examples of these two components. To collect data and determine traffic information, a small computer and road sensors are installed at each intersection of the road, such as the volume of cars, average vehicle speed, and traffic conditions intensity. In contrast, the vehicular network infrastructure is utilised to obtain details about each individual vehicle, including its location and speed. Relay nodes, coordinator, gates, integrators, and classifiers are all utilised by the suggested system to connect the two subsystems. 50 http://www.i-jim.org Paper—Clustering Technique for Mobile Edge Computing to Detect Clumps in Transportation-Related… Potts, C. M. et.al [11] the second challenge, data prioritising, requires a researcher or user to effectively comb through a big dataset in search of crucial data. We assume that the dataset is too big to look through manually, necessitating the use of a computer engine. It has to do with how we order and prioritize analysis and search terms. The second objective is about deciding what data to offer a user, whereas the first task is about generating knowledge from data. This interactive component is crucial since experts may become quickly dissatisfied, possibly give up on the system, or make a vital error with potentially serious repercussions if important information is hidden or overshared. 3 Methods and materials Many other approaches can be used to explain cluster stability; our method computes stability from arguments of distance travelled, velocity variability, and possibility. We carefully consider value stability when choosing a cluster head. In order to communicate with other vehicles, we assume that all vehicles have IEEE 803.12p radio transceivers and GPS systems, which individually allow for the acquisition of position-related data. Each car can use the clustering process in the suggested algorithm. A car notifies its neighbours when it needs help locating a cluster head. If there is no response, the process of creating groups is initiated. One cluster contains all the vehicles that are travelling in the same direction. Each car sends a message to the other members of the group, which includes the relocation, Identification, and velocity. After that, it calculations by arranging the inputs in a neighbourhood array: • The separation between the actual vehicle Q and its Neighbour P is: 𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝑄𝑄,𝑌𝑌 = ���𝑀𝑀𝑞𝑞 − 𝑀𝑀𝑝𝑝� + �𝑍𝑍𝑞𝑞 − 𝑁𝑁𝑝𝑝�� (1) Where the location of the car is (m, n) • The difference in speed between vehicle Q and its neighbour U. ∆𝑈𝑈𝑞𝑞,𝑝𝑝 = 𝑈𝑈𝑞𝑞 − 𝑈𝑈𝑝𝑝 (2) • The likelihood that the car is the cluster head: 𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝐷𝐷𝑝𝑝𝑝𝑝𝐷𝐷𝐷𝐷𝑝𝑝 = (𝐹𝐹 + 3 ∗ 𝑑𝑑𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝑝𝑝 𝑝𝑝𝑜𝑜 𝐷𝐷ℎ𝐷𝐷 𝐷𝐷𝑝𝑝𝑑𝑑𝐷𝐷 + 𝑈𝑈)/𝑄𝑄𝑚𝑚𝑚𝑚𝑚𝑚 (3) Where F is the node's power consumption when transmitting or getting a package (here, energy is the electricity a node uses throughout the data communication), and U is the vehicle's speed. Likelihood will be in the range of 1 and 3. The transport density, speed, and range of F have all been normalised (1–3). The greatest value of the calculated probability will be applied to all collected information. The likelihood that a car will act as the cluster head will therefore be calculated each time by dividing the result by the number 3 (𝑄𝑄𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏); the resulting ranging value of likelihood iJIM ‒ Vol. 17, No. 04, 2023 51 Paper—Clustering Technique for Mobile Edge Computing to Detect Clumps in Transportation-Related… will have a scale of 1-3. Remember that the value approaches 2 to suggest a poor choice, while the value approaches 1 to indicate the ideal candidate because it would be a problem of reduction; the best is the minimal. Clusters are built after the cluster heads are chosen, and then communication between the cluster heads begins. It would be more likely for one cluster head to replace another if it used the least amount of energy throughout transmission. Energy in this context refers to the electrical power used by a node during transfer. 𝐹𝐹 = 𝐿𝐿 ∗ 𝐹𝐹𝑐𝑐𝑐𝑐𝑚𝑚 (4) Where 𝐹𝐹𝑐𝑐𝑐𝑐𝑚𝑚 describes the wireless send's energy consumption. • The transmitting chain's RQ,P stability factor calculated for each neighbouring car P is: 𝑅𝑅𝑞𝑞,𝑝𝑝 =∝ 1, ∝ 2 ∗ 𝑑𝑑𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷+∝ 3∇𝑈𝑈𝑈𝑈, 𝑝𝑝 ∗ 𝑄𝑄+∝ 4 (5) Where the numbers are ∝ 1, ∝ 2, ∝ 3, 𝐷𝐷𝐷𝐷𝑑𝑑 ∝ 4 referred to as the real constituents of the model. |∝ 1. . ∝ 4| = (𝑚𝑚𝑗𝑗 ∗ 𝑚𝑚𝑙𝑙) ∗ (𝑅𝑅 ∗ 𝑌𝑌) (6) Where the effects of the matrix are R, output, and Y are representing a cluster's stability. Cluster stability is a significant objective that clustering techniques work to achieve and is a valid metric for assessing the effectiveness of a clustering method. There are several ways to explain cluster durability, and our method computes it based on arguments about distance, velocity variation, and chance. Cluster head is chosen carefully, keeping value consistency in mind. The experiment's findings were utilized to modify each of the three variables (vehicle speed differential, distance U t, and likelihood) within the following ranges: Table 1. Variable findings • Stability R component: All cars in a cluster exchange stability measurement with their nearby counterparts. The vehicle with the greater value of steadiness is the cluster head. 𝑅𝑅 = ∑𝑅𝑅𝑝𝑝,𝑞𝑞 (7) Procedure: The suggested methodology's first algorithm follows the following steps: The storage space, transmission range, and energy requirements will be used to compile a list of backup mobile edge nodes that could be used. A backup mobile edge-node Small Grade: +2 Tall Degree: -2 Expanses Close distant Speediness Short great Probability Short great 52 http://www.i-jim.org Paper—Clustering Technique for Mobile Edge Computing to Detect Clumps in Transportation-Related… notifies the cluster through email before moving head alerting it to start a fresh selection process for a new backup node if it left its clusters (took another intersection). Another backup node with a high score will be chosen by the cluster leader from the list of candidates. After a minute, if the handoff is still not working, the backup mobile edge-node welcomes the user. The area has been improved, and the BSI list is handled and kept current. Algorithm 1: Input: Vehicle group Yd1 = "Y11, Y12, Y13,..., Y1n" Output: The groups of vehicles to be chosen from set Yd1 as cluster midpoints are Hd1 = "g11, g12, g13,..., g1l" 1. The vehicles travelling in a fixed direction (e1) while inside the range of a certain 2. GAM is a member of the set Yd1 3. The cluster midpoints are chosen at random from set Yd1 by 'M' cars, and 4. set ld1 sort order 5. Recap 6. Do for each k from 2 to M 7. The cluster's midway is one of the cars ck from set Ld1 8. The separation, distance(di, yj), between each yj vehicle in set yd1 and di is 9. Calculated 10. In the event when |dj| = 40 && max (distance(di, yj)) = d do 11. The vehicles dj with the closest separation from xi are connected to 12. Set xi has dj and arranged in it. 13. Complete 14. Complete 15. Till 16. The created clusters' new cluster midpoints are determined using to find b) 17. better answer, saved as xi (unique) 18. To create new membership of xi(unique), which substitutes for dj, repeat steps 3-7 19. dj adopting the new median, xi 20. Repeat steps 4 through 9 until two novel cluster averages, dj (unique), are discovered. Due to the complicated nature of a road network and the frequent entry and exit of vehicles, the connection link is unstable due to the difficulties of mobile nodes that exist with vehicular traffic, and there is a substantial danger that the link will fail [4]. iJIM ‒ Vol. 17, No. 04, 2023 53 Paper—Clustering Technique for Mobile Edge Computing to Detect Clumps in Transportation-Related… Due to the dynamic nature of our suggested DEBCK, which automatically forms the backup cluster node and assumes control whenever a topology breakdown occurs as a result of vehicle redirections, it was developed to address this issue. 3.1 Mobile edge computing MEC is a workable solution since it provides on-demand access to high-volume compute. As a result, users at the MEC split the server's processing power. The computational resources allotted to ℎ𝑞𝑞 𝑓𝑓 by MEC are represented by E n. Similarly, max denotes the maximum allowable computation on the MEC server. Two other factors affect how long it took MEC to complete the work in total: (1) The duration of data transfer from the UEs to the MEC server, as described in (2); (2) MEC http computation. As a result, the following is how long it took to complete the assignment on the MEC server [5]: ℎ𝑞𝑞 𝑓𝑓 = ∝𝑛𝑛𝑑𝑑𝑛𝑛 𝑙𝑙𝑚𝑚 𝑓𝑓 + ∝𝑛𝑛𝑟𝑟𝑛𝑛 𝑏𝑏𝑛𝑛 (8) The continual power from the grid also leads us to believe that the MEC's battery life is limitless. As a result, the power consumption of the Edge servers while it is handling queries is disregarded in this case. Similar to this, the authors of state that we overlook the findings' transmission rate from the Edge servers to UE because of their short size. The fundamental concept behind edge devices is to move the cloud platform from the mobile core network's inside to the mobile communication network's edge in order to achieve flexibility resource consumption. In order to enable high computational and delay programs on edge devices that have limited resources, portable edge computing brings portable computing [12], network management, and storage systems to the edges of the network. 3.2 Formulation of a problem In this study, we sought to reduce the task's computational time by jointly maximising communications and computing capabilities between the user, MEC, and task division variable. Additionally, for the sake of simplicity, we define {q = q1, q2, qn} {k, = k 1, k 2, k n, and = 1, 2, n}. The computing time minimization problem can therefore be represented formally as follows: 𝑄𝑄1: min 𝑚𝑚𝐷𝐷𝑚𝑚∝,𝑞𝑞 = � 2−∝𝑚𝑚 ℎ𝑚𝑚 𝑓𝑓 , ∝𝑛𝑛𝑑𝑑𝑛𝑛 𝑙𝑙𝑚𝑚 𝑓𝑓 + ∝𝑛𝑛𝑟𝑟𝑛𝑛 𝑏𝑏𝑛𝑛 � (9) 𝐷𝐷1: 𝑞𝑞𝑚𝑚∝𝑚𝑚𝑟𝑟𝑚𝑚 𝑏𝑏𝑛𝑛 + ∁𝑛𝑛(2 −∝𝑛𝑛)𝐷𝐷𝑛𝑛 ≤ 𝑜𝑜𝑚𝑚 𝑚𝑚𝑚𝑚𝑚𝑚,∇𝑛𝑛 (10) 𝐷𝐷2: ∑ ℎ𝑞𝑞 𝑓𝑓 ≤𝑀𝑀𝑚𝑚=2 𝑜𝑜𝑚𝑚 𝑚𝑚𝑚𝑚𝑚𝑚, (11) 𝐷𝐷3: 𝑈𝑈𝑚𝑚 ≤ 𝑄𝑄𝑚𝑚𝑚𝑚𝑚𝑚, ∝𝑛𝑛∈ (1,2), ∀𝑚𝑚, (12) 54 http://www.i-jim.org Paper—Clustering Technique for Mobile Edge Computing to Detect Clumps in Transportation-Related… 𝐷𝐷4: |∄𝑙𝑙| = 2, ∇𝑙𝑙 (13) While constraint (8d) specifies that the computational resources allocated to UEs at the MEC server should be less than the highest computational resources, constraint (7b) ensures that the overall amount of energy used to calculate the task will be less than the highest amount of energy the battery can The optimization problem that is covered in sections (7a) through (7e) is also mixed-integer, non-convex, and non- linear in nature. This is due to the logarithmic function present in the rate equation. We divided the main problem into a number of smaller difficulties in order to handle this challenge. Additionally, the sub-optimization problems are then resolved repeatedly in order to identify the best possible solution. Hold E max n. The transmission power limitations of the UEs are represented by restriction (5h), in a similar manner. Then, pitch shift control of IRS components is provided by (6h). 3.3 The system model In the Mobile nodes, clustering is the technique of assembling nearby moving cars on a street into stable groups to speed up information sharing between vehicles. A roadway model with a lot of automobiles moving in one direction is taken into consideration. The network is made up of several vehicles that are located on the street and are regarded to be members of various groups, with one of the members of each group acting as the head of the group. Presuming that vehicles can connect with one another to exchange information, such as safeguard texts, the network is made up of vehicles that assume this assumption (CH). A number of characteristics, including position, velocity, and steadiness, define the CH. Regardless of the speed and density of the cars, all groups evolve over time because a new group leader is always selected. The message was sent over the network via the cluster head from one cluster head vehicle to another cluster head vehicle in the neighbouring cluster until it reached the destination vehicle. Clustering model illustration is shown in Figure 2 [6]. Fig. 2. Clustering model illustrations C1 C2 C3 Direction Cluster 1 Cluster 2 Cluster 3 iJIM ‒ Vol. 17, No. 04, 2023 55 Paper—Clustering Technique for Mobile Edge Computing to Detect Clumps in Transportation-Related… 3.4 Cluster head selection and cluster composition The network starts out as a collection of automobiles on a route, split up into several vehicle groups within its communication range. The cluster head (CH), which serves as the group's leader, is symbolized by the number of vehicles that make up each cluster (CM). The first CH is selected at random, and the second cluster head is decided upon as the vehicle that is placed furthest away from the target vehicle inside the first head's range. All vehicles that are in the head's field of vision are regarded as belonging to the group. The steps in cluster composition are shown in Figure 3. Fig. 3. Steps in cluster composition 3.5 Method for selecting cluster heads The proposed LEC-steps SEP's are shown in below Method. The CHs broadcast themselves to the network after being chosen by the system in Figure 4. The non- cluster head nodes decide to join the closest cluster after receiving the message and joining the cluster. The following formula describes how to cluster data [10]. CH number is the optimal cluster set as determined by the calculations, CH member is a cluster member node, and CH count is the total number of clusters in the current round. Algorithm: Cluster head selection and cluster composition: 1. All vehicles must be on the roadway 2. idly set each node's track 3. determine each vehicle's speed 4. choosing the first CH 5. Identify the sending vehicle 6. The first cluster should contain all vehicles within the FCH's range. 7. as long as (nodes!=unfilled) 8. find the following CH 9. All nodes + node clustering 10. Clusters are updated by changing the CH during the designated time. 11. Finish while 12. finish Designated The CH Control The Group Member Designated The Next CH 56 http://www.i-jim.org Paper—Clustering Technique for Mobile Edge Computing to Detect Clumps in Transportation-Related… Fig. 4. Design of the suggested system's deployment for intelligent transportation 4 Implementation and experimental results A MATLAB simulator is used to examine the energy usage according to the number of clusters in order to evaluate the effectiveness of the proposed Pectorals. The effectiveness is assessed using a random system made up of 150 servers that are distributed randomly around a normalized circular area with mg flows [7]. User job characteristics, channel capacity disparities across base stations, and accessible computing resources from mobile edge computing servers are carefully taken into account while keeping in mind user fairness for mobile systems that allow dense connectivity [8]. Transportation Data Doorway WEB Assemblage Part Organization Apprising Chart Storing Uploading Chart Dispensation Outcome Combination Elucidation Experts Residents Demand Demand Reply Grade iJIM ‒ Vol. 17, No. 04, 2023 57 Paper—Clustering Technique for Mobile Edge Computing to Detect Clumps in Transportation-Related… Table 2. Determining the Multi-Stage Asset Allocation Server's Simulation Parameters Limitations Assessment capacity for base stations 550 D2D link speed 100 The processing power of an MEC server 40/SEC The quantity of computing resources needed to finish the task [0.8-0.9]cycles The capability of Server J mg factor in heaviness 1.5 The ability to compute(mg) [0.11-0.13]cycles The suggested method first analyses the traffic dataset that was obtained from Aarhus, Denmark's second-largest city by people. An investigation of how traffic density affects vehicle speed is shown in Figure 5. When the transportation intensity is higher, that is, when there are more between two locations on the road, the average vehicle speed is seen to be meaningfully lower between any two road sections with a resolution of 500 m. Similar to this, the contrary is also seen, namely that the average speed increases as fewer cars are on the road. The graph's unfilled circle line illustrates how the average speed drops dramatically during different times of the day when there are a substantial number of cars (550–650). However, at times when there aren't many cars (1 000–4 000), yet the observed average speed of vehicles is considerable, as indicated by the full circle line on the graph. These situations do not always occur, and some abnormalities, like a relative low seed despite a low automobile intensity, can also be seen. These circumstances are primarily attributed to causes like construction on the roads, incidents, or weather conditions like rainfall, foggy, etc [9]. Fig. 5. When mg = 1000, power consumption of MEC is dependent on the cluster centres 0 1 2 3 4 5 6 1000 2000 3000 4000 E N E R G Y C O N SU M P E T IO N AMOUNT OF CLUSTERS mg=1000 mg=2000 mg=3000 58 http://www.i-jim.org Paper—Clustering Technique for Mobile Edge Computing to Detect Clumps in Transportation-Related… This is due to the fact that handling focused requests by a small number of servers while leaving a large number of others idle uses more energy than handling fairly spread queries by all servers using PECS. If m is small, a small number of mg servers handle all requests for m servers, and many member servers evenly split requests between them. Since, in our system model, queries to mg servers and to member server are constant. Thus, as shown in Figure 5, the load demand increases when k is small and reduces as mg increases as a result of the distribution of load among MEC servers. Beyond a certain threshold, however, the concentration of demands on a limited number of members causes the energy usage to tend to increase. For instance, the MEC's computational capabilities may not be available, or the offload may not be carried out if it is not profitable [13]. When mg = 550 in Figure 6, the dynamic positioning of MVEs causes an increase in power usage. The start of the graph is eliminated because l ought to be a part of mg. Because more requests result in increased CPU demand, PECS similarly grows as the amount of flows does. Fig. 6. Comparison of energy use when mg = 550 In Figure 7 and 8, researchers contrast the PECS program's average latency and power usage with that of two instances of PECS providing 5G service with Treq of 550 and 1000 mg, correspondingly. Pecs(l) rises in tandem with the number of flows. When the k value that minimises the average delay deviates from K, we identify a replacement mg value for l that is somewhat close to the original k value. The task execution overhead of the system continues to decline as the MEC server's processing capacity rises [8]. This is the cause of the saw-tooth pattern on the PECS graph. The best performance for PECS occurs when Treq is 600ms. A 13.34% reduction in power usage is attained with PECS when mg is 4000. 0 1 2 3 4 5 6 1000 2000 3000 4000 E N E R G Y C O N SU M P T IO N S TOTAL NUMBER OF FLOWS PECS=550mg PECS=650mg PECS=750mg iJIM ‒ Vol. 17, No. 04, 2023 59 Paper—Clustering Technique for Mobile Edge Computing to Detect Clumps in Transportation-Related… Fig. 7. When mg = 2000, the power usage of PECS is determined by the number of clusters The overall latency of inputs processed by PECS servers, mg, is sustained by PECS at the acceptable level, T(request), independent of the mg value, as shown in Figure 8. Because PECS searches for the average delay is smaller than L (request) when there are few flows in the MEC environment, the optimal mg to minimise energy usage in these circumstances has a longer average delay than the PECS technique. Fig. 8. When mg = 650, compare the average delay 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 1000 2000 3000 4000 E N E R G Y C O N SU M P T IO N S AMOUNT OF CLUSTERS mg(nf)=3000 mg(nf)=2000 mg(nf)=100 Additional Increase Due To Pecs Replacement 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 1.5 2.5 3.5 4.5 T IM E (S E C ) TOTAL NUMBER OF FLOWS CNSC PECS,T(req)=650mg PECS,T(req)=550mg 60 http://www.i-jim.org Paper—Clustering Technique for Mobile Edge Computing to Detect Clumps in Transportation-Related… 5 Conclusion The country's economy and commuters' social lives are both strongly impacted by transportation systems. This study concentrated on the tasks of traffic analysis and prediction, and it provides a current collection of accessible datasets and tools as a resource for people looking for open-source materials. In order to more accurately estimate and predict traffic states, it is also advised to collect and use external data, such as weather forecasts, calendar details, air reduced pollution, and sound. The simulation findings demonstrate that, when the suggested algorithm is less impacted by fluctuations in the number of cluster heads, it can more efficiently extend the stability period and transfer more data. 6 References [1] Rathore, M. M., Attique Shah, S., Awad, A., Shukla, D., Vimal, S., & Paul, A. (2021). A cyber-physical system and graph-based approach for transportation management in smart cities. Sustainability, 13(14), 7606. https://doi.org/10.3390/su13147606 [2] Uma, D., Udhayakumar, S., Tamilselvan, L., & Silviya, J. (2020). Client aware scalable cloudlet to augment edge computing with mobile cloud migration service. [3] Sarfraz, M., Alshahrani, H. M., Tarmissi, K., Alshahrani, H., Elfaki, M. A., Hamza, M. A., & Khurshaid, T. (2022). Intelligent Reflecting Surfaces Enhanced Mobile Edge Computing: Minimizing the Maximum Computational Time. Sensors, 22(22), 8719. https://doi.org/10.3390/s22228719 [4] Liu, L., Zhao, Y., Qi, F., Zhou, F., Xie, W., He, H., & Zheng, H. (2022). Federated Deep Reinforcement Learning for Joint AeBSs Deployment and Computation Offloading in Aerial Edge Computing Network. Electronics, 11(21), 3641. https://doi.org/10.3390/ electronics11213641 [5] Sarfraz, M., Alshahrani, H. M., Tarmissi, K., Alshahrani, H., Elfaki, M. A., Hamza, M. A., & Khurshaid, T. (2022). Intelligent Reflecting Surfaces Enhanced Mobile Edge Computing: Minimizing the Maximum Computational Time. Sensors, 22(22), 8719. https://doi.org/10.3390/s22228719 [6] abd Al_kadum Hassan, H., Hasan, Z. Y., & Al Taie, R. H. (2022). A simulation approach to improve the VANETs communication. iJIM, 16(12), 137. https://doi.org/10.3991/ijim. v16i12.31423 [7] Ahn, J., Lee, J., Park, S., & Park, H. S. (2019). Power efficient clustering scheme for 5G mobile edge computing environment. Mobile Networks and Applications, 24(2), 643-652. https://doi.org/10.1007/s11036-018-1164-2 [8] Zhang, X., Shen, H., & Lv, Z. (2021). Deployment optimization of multi-stage investment portfolio service and hybrid intelligent algorithm under edge computing. PLoS One, 16(6), e0252244. https://doi.org/10.1371/journal.pone.0252244 [9] Rathore, M. M., Attique Shah, S., Awad, A., Shukla, D., Vimal, S., & Paul, A. (2021). A cyber-physical system and graph-based approach for transportation management in smart cities. Sustainability, 13(14), 7606. https://doi.org/10.3390/su13147606 [10] Du, R., Liu, Y., Liu, L., & Du, W. (2020). A lightweight heterogeneous network clustering algorithm based on edge computing for 5G. Wireless Networks, 26(3), 1631-1641. https://doi.org/10.1007/s11276-019-02144-x iJIM ‒ Vol. 17, No. 04, 2023 61 https://doi.org/10.3390/su13147606 https://doi.org/10.3390/s22228719 https://doi.org/10.3390/electronics11213641 https://doi.org/10.3390/electronics11213641 https://doi.org/10.3390/s22228719 https://doi.org/10.3991/ijim.v16i12.31423 https://doi.org/10.3991/ijim.v16i12.31423 https://doi.org/10.1007/s11036-018-1164-2 https://doi.org/10.1371/journal.pone.0252244 https://doi.org/10.3390/su13147606 https://doi.org/10.1007/s11276-019-02144-x Paper—Clustering Technique for Mobile Edge Computing to Detect Clumps in Transportation-Related… [11] Potts, C. M. (2022). Interactive Data Analysis for Experts: Tools, Techniques, and Assessments. [12] Wang, T., Lu, Y., Cao, Z., Shu, L., Zheng, X., Liu, A., & Xie, M. (2019). When sensor- cloud meets mobile edge computing. Sensors, 19(23), 5324. https://doi.org/10.3390/ s19235324 [13] Mach, P., & Becvar, Z. (2017). Mobile edge computing: A survey on architecture and computation offloading. IEEE communications surveys & tutorials, 19(3), 1628-1656. https://doi.org/10.1109/COMST.2017.2682318 [14] Julian Menezes R, Albert Mayan J, Breezely George M. (2015). Development of a Functionality Testing Tool for Windows Phones. Indian Journal of Science and Technology, 8(22), 1-7. https://doi.org/10.17485/ijst/2015/v8i22/79101 7 Authors Dr. J. Albert Mayan is an Associate Professor in the School of Computing, Sathyabama Institute of Science and Technology, India. With 21 Years of experience in teaching and R&D, Dr. Albert had published a number of papers in Indexed Journals. Dr Albert had presented various research-based papers at several national and international conferences. Dr Albert had obtained his Ph.D in the Field of Software Testing and his areas of interest include Machine Learning, Image processing and Data Mining. Dr Albert is an active member of ACM Student Chapter and OWASP Student Chapter at Sathyabama Campus (email: albert.cse@ sathyabama.ac.in). Dr. S. V. Manikanthan is a Director of Melange Academic Research Associates, Puducherry, India. His area of Research Interest is Wireless Sensor Networks. He has 21 years of experience in Anna University Affiliated Colleges and in Industrial Research Projects (email: prof.manikanthan@gmail.com). Azham Hussain is the Associate Professor of Software Engineering at UUM School of Computing. He is the founder and head of Human-Centered Computing Research Group which is affiliated with the Software Technology Research Platform Center at School of Computing, Universiti Utara Malaysia. Assoc. Prof. Azham Hussain is a member of the US-based Institute of Electrical and Electronic Engineers (IEEE), and actively involved in both IEEE Communications and IEEE Computer societies. Azham is published in the areas of software evaluation and testing, user behaviours, group collaboration, and ubiquitous and mobile technology design. He has authored and co-authored more than 100-refereed technical publications, served as reviewer and referee for refereed journals and conferences on computing as well as the examiner for more than twenty doctoral and postgraduate scholars in his research areas (email: azham.h@uum.edu.my). Dr. S. Nithyaselvakumari presently working at Saveetha school of Engineering as Assistant professor SG in the Department of Medical Instrumentation and experienced around 11 years in teaching and 5 year in Industry. She has completed Bachelor of Engineering in Electronics and communication Engineering at Mahendra Engineering college Salem under madras university and done Master of Engineering in Sathyabama university in the department of Applied Electronics. In 2021, she has 62 http://www.i-jim.org https://doi.org/10.3390/s19235324 https://doi.org/10.3390/s19235324 https://doi.org/10.1109/COMST.2017.2682318 https://doi.org/10.17485/ijst/2015/v8i22/79101 Paper—Clustering Technique for Mobile Edge Computing to Detect Clumps in Transportation-Related… completed Ph.D under Anna University. Her area of research is in Bio Medical, wireless communication, Embedded system and Internet of Things (email: nithyaselvakumari.s@gmail.com). A. Vinnarasi is an Assistant professor at the Department of ECE, SRMIST, Chennai. Doing PhD.in SRMIST with total working experience of more than 17 yrs. M. Tech in Embedded Systems and Technology, in SRM 2005. Completed BE in ECE 2002. Pursuing PhD in STMIST. Worked in Saveetha Engineering College as Lecturer for 1yr 6 months. Worked in Sri Muthukumaran Institute of Technology as Assistant professor for 4yrs 5 month. Currently working in SRMIST as Assistant professor till date with 12yrs experience (email: vinnaraa@srmist.edu.in). Article submitted 2022-11-05. Resubmitted 2022-12-16. Final acceptance 2022-12-28. Final version published as submitted by the authors. iJIM ‒ Vol. 17, No. 04, 2023 63