Data Sharing and Online Political Education Based on Edge Computing Network Optimization

e rapid development of Internet of ings services and the rapid growth of new broadband services have promoted the everincreasing computing demands of mobile devices. As an emerging mobile computing technology, mobile edge computing is an important key technology to improve computing services for mobile devices. Mobile edge computing technology provides an important way for users to provide computing services with low latency and high computing performance. At the same time, it also provides technical means to develop online education. Online education called E-learning is an education model that uses the Internet as a medium.rough the Internet, students can conduct educational activities thousands of miles away from the teacher. In addition, students can learn at any time by referring to and downloading network code resources, thereby breaking the space and time constraints. e development of informatization of university education is an important part of the development of informatization, and it is the adaptation and combination of the application of information technology in the education eld. At present, the informatization of universities at home and abroad has ushered in the era of digital campus construction, and most of its focus is on the reorganization of functional departments and the integration of independent systems. By analyzing the needs of data sharing and exchange, this article plans to use existing mature technologies, such as data warehouse, data synchronization update, and data security, based on DataX to design the data sharing and exchange plan of the public data platform, including data standards, coding standards are designed to achieve uniform rules, formats, and codes to build an online political education platform.


Introduction
With the rapid development of Internet of ings services and the rapid growth of new broadband services, the intelligent Internet of ings that integrates communication, caching, and mobile computing technologies are an inevitable trend for the next generation of Internet of ings [1]. In recent years, the high user experience business has gradually risen, and it has continued to develop rapidly at a speed beyond expectations [2]. e remote computing task loading method based on cloud computing technology will face severe challenges due to long communication delays and high operating costs [3]. At the same time, the rapid growth of mobile terminals and the rapid development of sensor-based smart cities, smart homes, smart grids, intelligent transportation, health care, and other areas of the Internet of things urgently need to solve the problems of limited computing power and long-term sustainable enjoyment, and the contradiction between delay and high user experience service requirements [4]. As an emerging mobile computing technology, the mobile edge computing (MEC) network places edge computing servers close to users who need to perform computing tasks, shortening the computing task loading distance, reducing communication delays, and improving computing, the important key technology of e ciency has received extensive attention from academia and industry since its introduction [5,6]. e continuous construction of digital campuses and "smart campuses", as well as the continuous increase of management platforms and all-in-one card service platforms for universities, and the accumulation of data in the information environment of universities are gradually increasing, forming a more comprehensive big data environment [7]. How to effectively share and exchange management of big data in colleges and universities, improve the management model of teachers and students on campus through big data mining and analysis ideas and methods, and use the results of big data analysis to provide clearer and more detailed services for campus life, which is now a college service issue that cannot be ignored in system construction [8]. In order to adapt to the requirements of the development of the times and follow in the footsteps of the times, more and more universities have begun to pay more attention to the construction of information [9]. With the development of today's society, in the modern university education management, the level of informatization has maintained a trend of increasing year by year, the widespread use of the campus card and the accumulation of data from the office system of various business departments over the years have formed campus online political education [10]. e large amount of university data are mainly reflected in a variety of types and large-scale teacher and student data [11]. e rational and effective unified management of teacher and student data and the intercommunication with business departments are the key to the data management of universities. If a data sharing and exchange platform can be established within the university, various departments can share data safely and quickly, and this will not only improve the utilization rate of data but also provide the most effective assistance for the integration of campus online political education. e literature points out that mobile edge computing can provide mobile devices with low-latency and high-performance computing services. Mobile edge computing has two working modes, namely partial computing loading mode and binary computing loading mode [12]. In part of the computing loading mode, computing tasks can be split, some are performed locally, and the other part is loaded to the mobile edge computing server to perform calculations; in the binary computing loading mode, computing tasks cannot be split, and mobile devices can only choose to execute local calculations or all load to the mobile edge computing server to perform calculations [13]. e literature shows that a multi-user MEC system considering wireless charging is proposed, and a wireless energy transmission MEC design is proposed, in which a multi-antenna access point (integrated with the MEC server) broadcasts wireless power to charge multiple users, and each user node depends on the collection energy to perform computational tasks [14]. e literature shows that the report "Promoting Teaching and Learning rough Educational Data Mining and Learning Analysis: Problem Introduction" issued by the Office of Educational Technology of the U.S. Department of Education clearly deploys the development path of educational big data, focusing on the prediction of data mining and learning analysis technologies [15]. It uses students' learning behavior to optimize teaching strategies and evaluate teaching effects. e literature shows that online education platforms can support teachers, students, and policy analysts to make better decisions, use data facts as the basis for their own decisions, and be more convincing and able to propose education in a more targeted manner [16]. e literature pointed out that the time delay optimization problem in the single-user MEC system was studied in the study of minimizing task delay optimization [17]. All unloading modes include the task unloading decision, that is, whether all tasks are executed locally or unloaded to the MEC server execution target [18,19].

System Model and Problem
Description. e goal is to design a joint coordination mechanism for online scheduling and allocation. e main idea is shown in Figure 1. Different colors represent different types of services or tasks, and the numbers on the squares represent the corresponding deadlines of users.
e user arrives at the system at any moment, and submits a heterogeneous housing request through the associated access point; considering the difference in load and resource costs of different edge clouds, MEC provider determines whether to admit the newly arrived task, if it is admitted, then charge it for services and offload tasks to the appropriate edge cloud; due to limited storage capacity, each edge cloud must wisely decide which services to configure. e task urgency is modeled as a dynamic priority weight, and perform priority-based edge cloud processing and discard control. Here, "discard" only means that tasks are not processed at the edge of the network, and the lost tasks will be offloaded to resource-rich ones. Remote cloud processing will incur more painful costs.
In order to balance the system load, it is necessary to design effective resource allocation and pricing strategies. On the one hand, network resources have a greater impact on the quality of uninstallation. If more network resources (such as spectrum resources) are allocated, the offloading quality provided by the edge cloud will increase. erefore, a reasonable configuration of network resources is essential to improve resource utilization and offloading efficiency. On the other hand, pricing can effectively increase users' willingness to participate. Generally, lower service prices can attract more users to access, while excessive prices will push users to other edge clouds.
(1) Offload quality: it is assumed that each edge cloud provides offload services for users with constant transmission power as Based on the current network conditions, MEC providers first need to configure resources. Obviously, an inefficient configuration strategy will further aggravate network congestion and reduce offloading efficiency. e uninstall quality obtained by user i from edge cloud n is 2 Mobile Information Systems (2) Offloading and congestion constraints: due to user mobility, the edge cloud can only provide intermittent network connections. At any moment, each tasks can only be offloaded to one edge cloud or remote cloud at most, then the offloading constraint is Based on the task uninstall strategy, the uninstall quality obtained by the user is In the congestion-aware edge computing system, each resource-constrained edge cloud has a limited offload capacity. Edge cloud congestion constraints can be characterized as X n ≤ a n , (3) User satisfaction function: A satisfaction function is introduced to describe the degree of user satisfaction with uninstalled services.
Queue dynamics plays a key role in characterizing the time-varying network environment and controlling decision-making. Use Q[t] to represent the queue backlog, that is, the amount of unprocessed tasks waiting to be unloaded at the beginning of t. Assume that the task queue is initially empty, that is, Q[0] � 0. erefore, the queue dynamics can be characterized as A queue is strongly stable if and only if its time average queue backlog is bounded, that is For the obtained uninstallation quality r i [t], user i needs to pay the service fee π i [t] to the MEC provider. e value of uninstall service perceived by user i is defined as a user satisfaction function. erefore, the utility function of i can be modeled as

Maximization of User Collaborative Loading and Optimization of Computing Energy Efficiency and Resources.
e mobile edge computing network based on OFDMA transmission studied in this chapter, the system model is shown in Figure 2.
During the time slot t1, the amount of data loaded by user U1 to the MEC server and user U2 are, respectively, expressed as It represents the relevant time and power variables. During time slot t21, the amount of data that user U2 transmits the decoded loading task of user U1 to the MEC server is expressed as According to the DF protocol, the size of the loaded data of the user U 1 performing remote calculations on the MEC server should be the smaller value between the size of the decoded data at the MEC server and the size of the decoded data at the user U 2 , namely e amount of data loaded by user U 2 is the amount of data transmitted by user U 2 to the MEC server during the time slot t 22 , expressed as In this mode, the energy consumption of user U 1 and user U 2 are, respectively, us, the total loading energy consumption of the system is

Implementation and Application of Data Sharing and
Exchange. Storage capacity constraint: this chapter focuses on the finiteness of edge cloud storage capacity, and assumes that edge cloud n ∈ N provides at most S n types of services at the same time at any time, namely Conservation constraints: the total amount of offload tasks (including local reserved tasks) of each edge cloud must be equal to the amount of tasks allowed to enter the system at the current moment, namely Stability constraint: the number of r-type tasks offloaded to edge cloud n at each moment does not exceed the maximum service rate, Incentive constraint: is constraint is mainly aimed at the resource consumption problem in providing shared offloading services.
Priority constraints: Under the assumption of best-effort, the online joint collaborative control problem can be modeled as Without considering the user deadline tolerance, users are promised that once they are admitted to the system, they can get services at the edge of the network, which means that there is no task discarding. In order to support the promised service, previous related work usually highlights service locality constraints: First, study the collaborative optimization problem of scheduling and configuration (sDO-JCPS) that does not consider the user deadline tolerance in a single slot, and model it as an integer linear programming (ILP).
Under the constraints of stability, the limitation of service capacity makes the offloading decisions of different tasks coupled. min n,m r Suppose the total configuration and the scheduling cost of the optimal solution of problem (26) are C (9) place , and C (9) schedule , we can get When extracting source data, due to years of storage of data, inconsistent standards, and no fixed maintenance personnel in various business systems, the source data may have problems such as incomplete data, data duplication, data errors, or data irregularities. At this time, data correction, duplicate elimination, and standardization need to be completed through data cleaning. e main types of data that need to be cleaned are as follows: input or input incorrect data (missing values, slack metadata definitions, inconsistent allocations, inappropriate definitions or application of consistency constraints, etc.). For example, the student basic information table may contain data that needs to be cleaned, such as the student's contact phone number, hometown, and transfer major, and there are irregular formats that need to be cleaned. e time format field is written as a string, whether in public data management or subsequent. All data mining and analysis needs to clean the data first, that is, complete data, remove duplication, standardize time, and unified format.
Data cleaning includes the following steps: data analysis, actual situation analysis, mastering the basic information, and constraints of metadata, mining data without matching constraints and manually input or input data. Define cleaning rules and mapping relationships, define cleaning rules based on analysis results, map contradictory metadata, deal with missing data based on actual conditions, and try to correct data or input incorrect data. Before and during data conversion, the data that needs to be converted will be cleared according to the defined cleaning rules.
First, establish a data type mapping table (Table 1), find out various data types and possible correspondences that are missing in the central database of different databases, and put the correspondences in the mapping table in advance. en, in order to eliminate the inhomogeneity of the data type, the extracted data is compared with the preset standard of the data type mapping table for conversion and repair. en use the data naming rules (structure such as Table 2) to place the source data name and the converted execution data name, database name, table name, and other attributes. If the extracted data exists in the table, then change the source data name to a standard data name, and then compare the database name and table name given in the table to get the standard data value, if it does not exist, add a new record. e data name is established according to the standard. e structure of the source operation table is shown in Table 3. Figure 3 shows the relationship between the user's safe computing energy efficiency and the user's maximum transmission power under the three scenarios. ree different schemes are proposed in this chapter, the partial loading scheme based on OMA and the global loading scheme only. Observing it, we can see that the scheme proposed in this chapter can achieve better energy efficiency of safe computing than the other two schemes. e reason is that compared with OMA technology, the user's loading efficiency is higher when using NOMA technology. In addition, in the safe calculation energy efficiency of all schemes, the safe calculation energy efficiency first increases as the user's maximum transmission power increases. When the user's maximum transmission power is large enough, the safe calculation energy efficiency will remain unchanged. And it can be clearly seen that under the same network mechanism, the partial loading scheme based on OMA achieves higher energy efficiency for safe computing than the OMA-based global loading scheme. rough analysis, it can be seen that the reason is that in the case of using partial computing loading mode, users can flexibly allocate resources to computing loading, local   computing, and achieving good resource allocation. Figure 4 shows the comparison between the user's safe computing energy efficiency and the user's minimum computing rate under the four scenarios. e three schemes are the schemes proposed in this chapter, the partial loading scheme based on OMA, the global loading scheme only, and the local calculation scheme only. Observing it, we can see that the safe computing energy efficiency maximization scheme proposed in this chapter is better than other schemes. Moreover, it can be seen that the safe computing energy efficiency obtained by the scheme proposed in this chapter or the other three schemes decreases as the minimum calculation rate required by the user increases. is shows that the growth rate of the required computational energy is faster than the growth of the corresponding calculation rate; that is, the growth rate of the calculation rate is less than the growth rate of the energy consumption to achieve the calculation rate. Figure 5 shows the relationship between the safe calculation energy efficiency and the user's maximum transmission power using the calculation energy efficiency maximization scheme and the calculation bit maximization scheme proposed in this chapter. As shown in Figure 5, when users have the same maximum transmission power, the traditional calculation of bit maximization to obtain safe calculation energy efficiency is lower than the safe calculation energy efficiency obtained in the scheme proposed in this chapter. Figure 6 illustrates the convergence of computing edge, computing network security, and computing energy efficiency based on the iterative algorithm of SCA proposed in this chapter and compares it under different user maximum transmission powers. As shown in Figure 6, the safety calculation efficiency obtained by our proposed SCA-based iterative algorithm first increases rapidly as the number of iterations increases, and then reaches convergence after several iterations. Moreover, the safe calculated energy efficiency achieved by the maximum transmission power of three different users matches the trend of energy efficiency values in the figure.

Technical Architecture of the Online Political Education
Platform. e design of the educational resource sharing platform is also designed in accordance with a three-tier architecture. e interface of each functional module of the platform is responsible for the interaction with users and is the presentation layer. Some tasks and stored procedures that perform data preprocessing in the database of the business logic layer of the platform also belong to the scope of business logic. In the data layer, SQL Server 2008 is used for data storage and persistence. SQL Server can store various types of data such as XML files, text files, and binary files and provide efficient query and processing capabilities.

Database Logical Structure Design.
rough the overall ER diagram of the system and the relationship between each entity, the database tables of the system can be designed mainly including student table, teacher information table,  course information table, department information table,  professional information table, course selection information  table, grade information table, and credit information table.  e teacher information table is shown in Table 4. e student information table is shown in Table 5. e teaching videos of teachers and the learning materials of students are stored in the material information table. e table structure of the data information table is  shown in Table 6.  design. Teaching goals are scientifically formulated. Teaching design is based on the further development of teaching objectives. e teaching objectives of ideological and political theory courses have not changed from a large level. However, with the development of time, we have many different needs for many detailed content. How to scientifically and accurately determine the teaching target of each knowledge point after refining the teaching target is a key step to improve the teaching quality of ideological and political theory courses. e teaching goals determined through personal subjective consciousness, experience, and lessons are not supported by data, and to a certain extent are unconvincing. Analyze the complex big data information and use the results reflected by the data to formulate teaching goals based on the data, so that teaching is more scientific and accurate. Apply the principle of big data accuracy to the teaching of ideological and political theory courses. By tracking the teaching trajectory of the teacher, the learning trajectory of the student and the interactive data between the two, the teaching characteristics of the teacher, the learning characteristics of the students, and the psychology of the students are obtained. Features accurately present the characteristics of different objects, and then implement teaching decisions, scientifically determine the teaching goals of ideological and political theory courses, promote the formulation of teaching goals more scientifically, and better meet the needs of current student development, and better realize the ideological and political theory courses. Accurate teaching: e second science chooses teaching content. Big data technology is a product of the development trend of informatization. Its wide application promotes the transformation of the teaching thinking of ideological and political theory courses in colleges and universities from perceptual qualitative analysis to rational quantitative analysis. In traditional ideological and political theory courses, teachers often teach courses based on longterm teaching experience. Now the application of big data technology in ideological and political theory courses has greatly improved this situation. Using big data to transform teaching thinking, change the qualitative analysis teaching thinking based on teachers' perceptual cognition and form a rational quantitative analysis teaching thinking based on student needs, which is conducive to enhancing the effectiveness of ideological and political theory courses.

Strategies for the Development of Online
Secondly, in traditional ideological and political theory teaching, teachers' teaching judgments are basically based on their own years of teaching experience. However, students of different ages and different age groups are different in their mental thinking and knowledge reserves. Using previous teaching method to carry out teaching, the teaching effect achieved is not particularly significant. e wide application of big data in ideological and political theory courses in colleges and universities have changed the way teachers perceive students. It is no longer judged by experience but judged by accurate data analysis results, thus changing the way teachers choose teaching methods. Using big data to analyze students' dynamics in real time, grasp first-hand information, and promote the transformation of teachers' teaching situation; using big data to promote teachers' cognitive style from their own empiricism to rational data judgment that will be a new era of ideological and political lessons. Teachers better choose teaching methods to provide a basis for judgment. ere are unified teaching standards and requirements for the teaching of ideological and political theory courses, and the teaching materials are used uniformly throughout the country, but the teaching resources and teaching methods of each school are full of flowers. e balanced development of big data technology in the ideological and political theory courses of Chinese universities will promote the transformation of the current scattered teaching status to the direction of teaching resource sharing.
rough the establishment of university alliances or led by national government departments and   Mobile Information Systems local education management departments, the integration of regional big data technology application resources, so that big data technology can be exchanged and shared, and jointly promote the transformation of the scattered state of ideological and political theory teaching to agglomeration and sharing, which is truly realized in order to promote the teaching reform and innovation of ideological and political theory courses in colleges and universities in the new era. rough online education, the best teachers can also be directly displayed in front of students. Excellent public teachers can often summarize the learning rules and application rules of the teaching objects, and can grasp the key points of subject learning and integrate with the classroom, and effectively help students acquire knowledge in order to achieve good teaching results. At the same time, the unique personality charm of outstanding public sports teachers can also be spread to more people through online education, attract more students to pay attention to ideological and political theories, and increase their interest in learning.

Conclusion
e advent of the Internet age has brought great convenience to online education. Now, many schools have begun to adopt the method of online education, and the learning of online education has also been accepted in various schools and has become an important part of the evaluation of students' university studies. Although there are already some universities that gradually carry out online education, they are basically fighting alone without forming a system. Nowadays, college students have a wide range of interests and hobbies, and different teaching methods may bring great differences in learning knowledge. erefore, breaking the threshold of online education among universities, increasing the sharing of educational resources, and promoting information exchange and resource sharing between schools and students have become a development trend. is paper studies the weighted computing bit and maximized resource allocation strategy of the edge computing network of the online political education platform to improve computing performance and energy collection efficiency; and in the mobile edge computing network based on non-orthogonal multiple access, the resource optimization strategy is proposed to maximize the energy efficiency of safe computing improves the energy efficiency and security of computing.

Data Availability
e data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest
e authors declare that they have no conflicts of interest.