首页 > 最新文献

Computing最新文献

英文 中文
Multi-label learning for identifying co-occurring class code smells 识别共现类代码气味的多标签学习
IF 3.7 3区 计算机科学 Q1 Mathematics Pub Date : 2024-05-27 DOI: 10.1007/s00607-024-01294-x
Mouna Hadj-Kacem, Nadia Bouassida

Code smell identification is crucial in software maintenance. The existing literature mostly focuses on single code smell identification. However, in practice, a software artefact typically exhibits multiple code smells simultaneously where their diffuseness has been assessed, suggesting that 59% of smelly classes are affected by more than one smell. So to meet this complexity found in real-world projects, we propose a multi-label learning-based approach to identify eight code smells at the class-level, i.e. the most sever software artefacts that need to be prioritized in the refactoring process. In our experiments, we have used 12 algorithms from different multi-label learning methods across 30 open-source Java projects, where significant findings have been presented. We have explored co-occurrences between class code smells and examined the impact of correlations on prediction results. Additionally, we assess multi-label learning methods to compare data adaptation versus algorithm adaptation. Our findings highlight the effectiveness of the Ensemble of Classifier Chains and Binary Relevance in achieving high-performance results.

代码气味识别对软件维护至关重要。现有文献大多侧重于单一代码气味的识别。然而,在实践中,软件工件通常会同时表现出多种代码气味,其扩散性已得到评估,表明 59% 的气味类受到不止一种气味的影响。因此,为了应对现实世界项目中的这种复杂性,我们提出了一种基于多标签学习的方法,用于识别类级的八种代码气味,即在重构过程中需要优先处理的最严重的软件构件。在实验中,我们在 30 个开源 Java 项目中使用了来自不同多标签学习方法的 12 种算法,并取得了重大发现。我们探索了类代码气味之间的共现关系,并研究了相关性对预测结果的影响。此外,我们还评估了多标签学习方法,以比较数据适应性与算法适应性。我们的研究结果凸显了分类器链组合和二元相关性在实现高性能结果方面的有效性。
{"title":"Multi-label learning for identifying co-occurring class code smells","authors":"Mouna Hadj-Kacem, Nadia Bouassida","doi":"10.1007/s00607-024-01294-x","DOIUrl":"https://doi.org/10.1007/s00607-024-01294-x","url":null,"abstract":"<p>Code smell identification is crucial in software maintenance. The existing literature mostly focuses on single code smell identification. However, in practice, a software artefact typically exhibits multiple code smells simultaneously where their diffuseness has been assessed, suggesting that 59% of smelly classes are affected by more than one smell. So to meet this complexity found in real-world projects, we propose a multi-label learning-based approach to identify eight code smells at the class-level, i.e. the most sever software artefacts that need to be prioritized in the refactoring process. In our experiments, we have used 12 algorithms from different multi-label learning methods across 30 open-source Java projects, where significant findings have been presented. We have explored co-occurrences between class code smells and examined the impact of correlations on prediction results. Additionally, we assess multi-label learning methods to compare data adaptation versus algorithm adaptation. Our findings highlight the effectiveness of the Ensemble of Classifier Chains and Binary Relevance in achieving high-performance results.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141171585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel bidirectional LSTM model for network intrusion detection in SDN-IoT network 用于 SDN-IoT 网络入侵检测的新型双向 LSTM 模型
IF 3.7 3区 计算机科学 Q1 Mathematics Pub Date : 2024-05-27 DOI: 10.1007/s00607-024-01295-w
G. Sri vidhya, R. Nagarajan

The advancement of technology allows for easy adaptability with IoT devices. Internet of Things (IoT) devices can interact without human intervention, which leads to the creation of smart cities. Nevertheless, security concerns persist within IoT networks. To address this, Software Defined Networking (SDN) has been introduced as a centrally controlled network that can solve security issues in IoT devices. Although there is a security concern with integrating SDN and IoT, it specifically targets Distributed Denial of Service (DDoS) attacks. These attacks focus on the network controller since it is centrally controlled. Real-time, high-performance, and precise solutions are necessary to tackle this issue effectively. In recent years, there has been a growing interest in using intelligent deep learning techniques in Network Intrusion Detection Systems (NIDS) through a Software-Defined IoT network (SDN-IoT). The concept of a Wireless Network Intrusion Detection System (WNIDS) aims to create an SDN controller that efficiently monitors and manages smart IoT devices. The proposed WNIDS method analyzes the CSE-CIC-IDS2018 and SDN-IoT datasets to detect and categorize intrusions or attacks in the SDN-IoT network. Implementing a deep learning method called Bidirectional LSTM (BiLSTM)--based WNIDS model effectively detects intrusions in the SDN-IoT network. This model has achieved impressive accuracy rates of 99.97% and 99.96% for binary and multi-class classification using the CSE-CIC-IDS2018 dataset. Similarly, with the SDN-IoT dataset, the model has achieved 95.13% accuracy for binary classification and 92.90% accuracy for multi-class classification, showing superior performance in both datasets.

技术的进步使物联网设备的适应性变得非常容易。物联网(IoT)设备可以在没有人工干预的情况下进行交互,从而创建智能城市。然而,物联网网络的安全问题依然存在。为了解决这个问题,人们引入了软件定义网络(SDN),作为一种集中控制的网络,它可以解决物联网设备的安全问题。虽然集成 SDN 和物联网存在安全问题,但它特别针对分布式拒绝服务(DDoS)攻击。这些攻击主要针对网络控制器,因为它是集中控制的。要有效解决这一问题,就需要实时、高性能和精确的解决方案。近年来,人们越来越关注通过软件定义物联网网络(SDN-IoT)在网络入侵检测系统(NIDS)中使用智能深度学习技术。无线网络入侵检测系统(WNIDS)的概念旨在创建一个能有效监控和管理智能物联网设备的 SDN 控制器。所提出的 WNIDS 方法分析了 CSE-CIC-IDS2018 和 SDN-IoT 数据集,以检测和分类 SDN-IoT 网络中的入侵或攻击。基于双向 LSTM(BiLSTM)的 WNIDS 模型采用深度学习方法,能有效检测 SDN-IoT 网络中的入侵。利用 CSE-CIC-IDS2018 数据集,该模型的二元分类和多类分类准确率分别达到 99.97% 和 99.96%,令人印象深刻。同样,在 SDN-IoT 数据集上,该模型的二元分类准确率达到 95.13%,多类分类准确率达到 92.90%,在这两个数据集上都表现出卓越的性能。
{"title":"A novel bidirectional LSTM model for network intrusion detection in SDN-IoT network","authors":"G. Sri vidhya, R. Nagarajan","doi":"10.1007/s00607-024-01295-w","DOIUrl":"https://doi.org/10.1007/s00607-024-01295-w","url":null,"abstract":"<p>The advancement of technology allows for easy adaptability with IoT devices. Internet of Things (IoT) devices can interact without human intervention, which leads to the creation of smart cities. Nevertheless, security concerns persist within IoT networks. To address this, Software Defined Networking (SDN) has been introduced as a centrally controlled network that can solve security issues in IoT devices. Although there is a security concern with integrating SDN and IoT, it specifically targets Distributed Denial of Service (DDoS) attacks. These attacks focus on the network controller since it is centrally controlled. Real-time, high-performance, and precise solutions are necessary to tackle this issue effectively. In recent years, there has been a growing interest in using intelligent deep learning techniques in Network Intrusion Detection Systems (NIDS) through a Software-Defined IoT network (SDN-IoT). The concept of a Wireless Network Intrusion Detection System (WNIDS) aims to create an SDN controller that efficiently monitors and manages smart IoT devices. The proposed WNIDS method analyzes the CSE-CIC-IDS2018 and SDN-IoT datasets to detect and categorize intrusions or attacks in the SDN-IoT network. Implementing a deep learning method called Bidirectional LSTM (BiLSTM)--based WNIDS model effectively detects intrusions in the SDN-IoT network. This model has achieved impressive accuracy rates of 99.97% and 99.96% for binary and multi-class classification using the CSE-CIC-IDS2018 dataset. Similarly, with the SDN-IoT dataset, the model has achieved 95.13% accuracy for binary classification and 92.90% accuracy for multi-class classification, showing superior performance in both datasets.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141171512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data management and selectivity in collaborative pervasive edge computing 协作式普适边缘计算中的数据管理和选择性
IF 3.7 3区 计算机科学 Q1 Mathematics Pub Date : 2024-05-27 DOI: 10.1007/s00607-024-01297-8
Dimitrios Papathanasiou, Kostas Kolomvatsos

Context-aware data management becomes the focus of several research efforts, which can be placed at the intersection between the Internet of Things (IoT) and Edge Computing (EC). Huge volumes of data captured by IoT devices are processed in EC environments. Even if edge nodes undertake the responsibility of data management tasks, they are characterized by limited storage and computational resources compared to Cloud. Apparently, this mobilises the introduction of intelligent data selection methods capable of deciding which of the collected data should be kept locally based on end users/applications requests. In this paper, we devise a mechanism where edge nodes learn their own data selection filters, and decide the distributed allocation of newly collected data to their peers and/or Cloud once these data are not conformed with the local data filters. Our mechanism intents to postpone final decisions on data transfer to Cloud (e.g., data centers) to pervasively keep relevant data as close and as long to end users/applications as possible. The proposed mechanism derives a data-selection map across edge nodes by learning specific data sub-spaces, which facilitate the placement of processing tasks (e.g., analytics queries). This is very critical when we target to support near real time decision making and would like to minimize all parts of the tasks allocation procedure. We evaluate and compare our approach against baselines and schemes found in the literature showcasing its applicability in pervasive edge computing environments.

情境感知数据管理已成为多项研究工作的重点,可将其置于物联网(IoT)和边缘计算(EC)之间的交叉点。物联网设备捕获的大量数据会在 EC 环境中进行处理。即使边缘节点承担了数据管理任务,但与云计算相比,它们的存储和计算资源有限。显然,这就需要引入智能数据选择方法,能够根据终端用户/应用程序的要求决定哪些收集到的数据应保存在本地。在本文中,我们设计了一种机制,让边缘节点学习自己的数据选择过滤器,并在新收集的数据不符合本地数据过滤器时,决定将这些数据分布式地分配给对等节点和/或云。我们的机制旨在推迟将数据传输到云(如数据中心)的最终决定,从而使相关数据尽可能接近终端用户/应用,并尽可能长时间地保存在终端用户/应用中。所提出的机制通过学习特定的数据子空间,在边缘节点上生成数据选择图,从而促进处理任务(如分析查询)的放置。当我们以支持近乎实时的决策为目标,并希望尽量减少任务分配过程中的所有环节时,这一点非常关键。我们评估并比较了我们的方法与文献中的基线和方案,展示了它在普适边缘计算环境中的适用性。
{"title":"Data management and selectivity in collaborative pervasive edge computing","authors":"Dimitrios Papathanasiou, Kostas Kolomvatsos","doi":"10.1007/s00607-024-01297-8","DOIUrl":"https://doi.org/10.1007/s00607-024-01297-8","url":null,"abstract":"<p>Context-aware data management becomes the focus of several research efforts, which can be placed at the intersection between the Internet of Things (IoT) and Edge Computing (EC). Huge volumes of data captured by IoT devices are processed in EC environments. Even if edge nodes undertake the responsibility of data management tasks, they are characterized by limited storage and computational resources compared to Cloud. Apparently, this mobilises the introduction of intelligent data selection methods capable of deciding which of the collected data should be kept locally based on end users/applications requests. In this paper, we devise a mechanism where edge nodes learn their own data selection filters, and decide the distributed allocation of newly collected data to their peers and/or Cloud once these data are not conformed with the local data filters. Our mechanism intents to postpone final decisions on data transfer to Cloud (e.g., data centers) to pervasively keep relevant data as close and as long to end users/applications as possible. The proposed mechanism derives a data-selection map across edge nodes by learning specific data sub-spaces, which facilitate the placement of processing tasks (e.g., analytics queries). This is very critical when we target to support near real time decision making and would like to minimize all parts of the tasks allocation procedure. We evaluate and compare our approach against baselines and schemes found in the literature showcasing its applicability in pervasive edge computing environments.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141171578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An ant colony path planning optimization based on opposition-based learning for AUV in irregular regions 基于对立学习的蚁群路径规划优化,适用于不规则区域的自动潜航器
IF 3.7 3区 计算机科学 Q1 Mathematics Pub Date : 2024-05-16 DOI: 10.1007/s00607-024-01293-y
Jiaxing Chen, Xiaoqian Liu, Chao Wu, Jiahui Ma, Zhiyuan Cui, Zhihua Liu
{"title":"An ant colony path planning optimization based on opposition-based learning for AUV in irregular regions","authors":"Jiaxing Chen, Xiaoqian Liu, Chao Wu, Jiahui Ma, Zhiyuan Cui, Zhihua Liu","doi":"10.1007/s00607-024-01293-y","DOIUrl":"https://doi.org/10.1007/s00607-024-01293-y","url":null,"abstract":"","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140967521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differentially private federated learning with non-IID data 非 IID 数据的差异化私有联合学习
IF 3.7 3区 计算机科学 Q1 Mathematics Pub Date : 2024-05-08 DOI: 10.1007/s00607-024-01257-2
Shuyan Cheng, Peng Li, Ruchuan Wang, He Xu

In Differentially Private Federated Learning (DPFL), gradient clipping and random noise addition disproportionately affect statistically heterogeneous data. As a consequence, DPFL has a disparate impact: the accuracy of models trained with DPFL tends to decrease more on these data. If the accuracy of the original model decreases on heterogeneous data, DPFL may degrade the accuracy performance more. In this work, we study the utility loss inequality due to differential privacy and compare the convergence of the private and non-private models. Specifically, we analyze the gradient differences caused by statistically heterogeneous data and explain how statistical heterogeneity relates to the effect of privacy on model convergence. In addition, we propose an improved DPFL algorithm, called R-DPFL, to achieve differential privacy at the same cost but with good utility. R-DPFL adjusts the gradient clipping value and the number of selected users at beginning according to the degree of statistical heterogeneity of the data, and weakens the direct proportional relationship between the differential privacy and the gradient difference, thereby reducing the impact of differential privacy on the model trained on heterogeneous data. Our experimental evaluation shows the effectiveness of our elimination algorithm in achieving the same cost of differential privacy with satisfactory utility. Our code is publicly available at https://github.com/chengshuyan/R-DPFL.

在差分私有联合学习(DPFL)中,梯度剪切和随机噪声添加会对统计异质数据产生不成比例的影响。因此,DPFL 会产生不同的影响:在这些数据上,使用 DPFL 训练的模型的准确性往往会下降更多。如果原始模型的准确度在异构数据上下降,DPFL 可能会使准确度性能下降更多。在这项工作中,我们研究了差异隐私导致的效用损失不等式,并比较了隐私模型和非隐私模型的收敛性。具体来说,我们分析了统计异质性数据造成的梯度差异,并解释了统计异质性与隐私对模型收敛性的影响之间的关系。此外,我们还提出了一种改进的 DPFL 算法,称为 R-DPFL,以相同的成本实现不同的隐私性,但具有良好的效用。R-DPFL 根据数据的统计异质性程度调整梯度剪切值和开始时选择的用户数量,弱化了差分隐私与梯度差之间的正比关系,从而降低了差分隐私对在异质性数据上训练的模型的影响。我们的实验评估表明,我们的消除算法在实现相同的差分隐私成本时非常有效,而且效果令人满意。我们的代码可在 https://github.com/chengshuyan/R-DPFL 公开获取。
{"title":"Differentially private federated learning with non-IID data","authors":"Shuyan Cheng, Peng Li, Ruchuan Wang, He Xu","doi":"10.1007/s00607-024-01257-2","DOIUrl":"https://doi.org/10.1007/s00607-024-01257-2","url":null,"abstract":"<p>In Differentially Private Federated Learning (DPFL), gradient clipping and random noise addition disproportionately affect statistically heterogeneous data. As a consequence, DPFL has a disparate impact: the accuracy of models trained with DPFL tends to decrease more on these data. If the accuracy of the original model decreases on heterogeneous data, DPFL may degrade the accuracy performance more. In this work, we study the utility loss inequality due to differential privacy and compare the convergence of the private and non-private models. Specifically, we analyze the gradient differences caused by statistically heterogeneous data and explain how statistical heterogeneity relates to the effect of privacy on model convergence. In addition, we propose an improved DPFL algorithm, called R-DPFL, to achieve differential privacy at the same cost but with good utility. R-DPFL adjusts the gradient clipping value and the number of selected users at beginning according to the degree of statistical heterogeneity of the data, and weakens the direct proportional relationship between the differential privacy and the gradient difference, thereby reducing the impact of differential privacy on the model trained on heterogeneous data. Our experimental evaluation shows the effectiveness of our elimination algorithm in achieving the same cost of differential privacy with satisfactory utility. Our code is publicly available at https://github.com/chengshuyan/R-DPFL.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140942541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems 为支持物联网技术的智能医疗系统提供安全的隐私增强型快速身份验证和密钥管理
IF 3.7 3区 计算机科学 Q1 Mathematics Pub Date : 2024-05-07 DOI: 10.1007/s00607-024-01291-0
Sriramulu Bojjagani, Denslin Brabin, Kalai Kumar, Neeraj Kumar Sharma, Umamaheswararao Batta

The smart healthcare system advancements have introduced the Internet of Things, enabling technologies to improve the quality of medical services. The main idea of these healthcare systems is to provide data security, interaction between entities, efficient data transfer, and sustainability. However, privacy concerning patient information is a fundamental problem in smart healthcare systems. Many authentications and critical management protocols exist in the literature for healthcare systems, but ensuring security still needs to be improved. Even if security is achieved, it still requires fast communication and computations. In this paper, we have introduced a new secure privacy-enhanced fast authentication key management scheme that effectively applies to lightweight resource-constrained devices in healthcare systems to overcome the issue. The proposed framework is applicable for quick authentication, efficient key management between the entities, and minimising computation and communication overheads. We verified our proposed framework with formal and informal verification using BAN logic, Scyther simulation, and the Drozer tool. The simulation and tool verification shows that the proposed system is free from well-known attacks, reducing communication and computation costs compared to the existing healthcare systems.

智能医疗系统的进步引入了物联网,使技术能够提高医疗服务的质量。这些医疗系统的主要理念是提供数据安全、实体间互动、高效数据传输和可持续性。然而,患者信息隐私是智能医疗系统的一个基本问题。文献中有许多关于医疗保健系统的认证和关键管理协议,但确保安全性仍有待改进。即使实现了安全性,仍需要快速通信和计算。在本文中,我们介绍了一种新的安全隐私增强型快速认证密钥管理方案,它能有效地应用于医疗保健系统中的轻量级资源受限设备,以克服这一问题。所提出的框架适用于快速身份验证、实体间的高效密钥管理以及计算和通信开销最小化。我们使用 BAN 逻辑、Scyther 仿真和 Drozer 工具,通过正式和非正式验证来验证我们提出的框架。仿真和工具验证结果表明,与现有的医疗保健系统相比,所提出的系统不会受到众所周知的攻击,还能降低通信和计算成本。
{"title":"Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems","authors":"Sriramulu Bojjagani, Denslin Brabin, Kalai Kumar, Neeraj Kumar Sharma, Umamaheswararao Batta","doi":"10.1007/s00607-024-01291-0","DOIUrl":"https://doi.org/10.1007/s00607-024-01291-0","url":null,"abstract":"<p>The smart healthcare system advancements have introduced the Internet of Things, enabling technologies to improve the quality of medical services. The main idea of these healthcare systems is to provide data security, interaction between entities, efficient data transfer, and sustainability. However, privacy concerning patient information is a fundamental problem in smart healthcare systems. Many authentications and critical management protocols exist in the literature for healthcare systems, but ensuring security still needs to be improved. Even if security is achieved, it still requires fast communication and computations. In this paper, we have introduced a new secure privacy-enhanced fast authentication key management scheme that effectively applies to lightweight resource-constrained devices in healthcare systems to overcome the issue. The proposed framework is applicable for quick authentication, efficient key management between the entities, and minimising computation and communication overheads. We verified our proposed framework with formal and informal verification using BAN logic, Scyther simulation, and the Drozer tool. The simulation and tool verification shows that the proposed system is free from well-known attacks, reducing communication and computation costs compared to the existing healthcare systems.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140941987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the impact of chaos engineering with various user loads on cloud native applications: an exploratory empirical study 探索各种用户负载的混沌工程对云原生应用程序的影响:一项探索性实证研究
IF 3.7 3区 计算机科学 Q1 Mathematics Pub Date : 2024-05-05 DOI: 10.1007/s00607-024-01292-z
Amro Al-Said Ahmad, Lamis F. Al-Qora’n, Ahmad Zayed

One of the most popular models that provide computer resources today is cloud computing. Today’s dynamic and successful platforms are created to take advantage of various resources available from service providers. Ensuring the performance and availability of such resources and services is a crucial problem. Any software system may be subject to faults that might propagate to cause failures. Such faults with the potential of contributing to failures are critical because they impair performance and result in a delayed reaction, which is regarded as a dependability problem. To ensure that critical faults can be discovered as soon as possible, the impact of such faults on the system must be tested. The performance and dependability of cloud-native systems are examined in this empirical study using fault injection, one of the chaos engineering techniques. The study explores the impacts and results of injecting various delay times into two cloud-native applications with diverse user numbers. The performance of the applications with various numbers of users is measured in relation to these delays, which accordingly reflects measuring the dependability of those systems. Firstly, the systems’ architecture were identified, and serverless with two Lambda functions and containerised microservices applications were chosen, which depend on utilising and incorporating cloud-native services. Secondly, faults are injected in order to quantify performance attributes such as throughput and latency. The results of several controlled experiments carried out in real-world cloud environments provide exploratory empirical data, which promoted comparisons and statistical analysis that we utilised to identify the behaviour of the application while experiencing stress. Typical results from this investigation include an overall reduction in performance that is embodied in an increase in latency with injecting delays. However, a remarkable result is noticed at a particular delay in which defects and availability problems appear out of nowhere. These findings assist in highlighting the value of using chaos engineering in general and fault injection in particular to assess the dependability of cloud-native applications and to find unpredicted failures that could arise quickly from defects that aren’t supposed to spread and result in dependability issues.

云计算是当今最流行的计算机资源提供模式之一。当今充满活力的成功平台就是为了利用服务提供商提供的各种资源而创建的。确保此类资源和服务的性能和可用性是一个关键问题。任何软件系统都可能会出现故障,这些故障可能会传播并导致故障。这些可能导致故障的故障非常关键,因为它们会损害性能并导致延迟反应,这被视为可靠性问题。为确保尽快发现关键故障,必须测试此类故障对系统的影响。本实证研究使用故障注入(混沌工程技术之一)对云原生系统的性能和可靠性进行了检验。研究探讨了向两个用户数量各异的云原生应用注入不同延迟时间的影响和结果。根据这些延迟来衡量不同用户数量的应用程序的性能,从而反映出这些系统的可靠性。首先,确定了系统的架构,并选择了带有两个 Lambda 函数的无服务器和容器化微服务应用程序,这取决于对云原生服务的利用和整合。其次,注入故障以量化吞吐量和延迟等性能属性。在现实世界云环境中进行的几项受控实验的结果提供了探索性的经验数据,促进了比较和统计分析,我们利用这些数据来确定应用程序在承受压力时的行为。这项调查的典型结果包括整体性能下降,这体现在注入延迟导致的延迟增加上。然而,在某一特定延迟时,缺陷和可用性问题突然出现,结果令人瞩目。这些发现有助于突出使用混沌工程(尤其是故障注入)评估云原生应用程序的可靠性以及发现未预见到的故障的价值。
{"title":"Exploring the impact of chaos engineering with various user loads on cloud native applications: an exploratory empirical study","authors":"Amro Al-Said Ahmad, Lamis F. Al-Qora’n, Ahmad Zayed","doi":"10.1007/s00607-024-01292-z","DOIUrl":"https://doi.org/10.1007/s00607-024-01292-z","url":null,"abstract":"<p>One of the most popular models that provide computer resources today is cloud computing. Today’s dynamic and successful platforms are created to take advantage of various resources available from service providers. Ensuring the performance and availability of such resources and services is a crucial problem. Any software system may be subject to faults that might propagate to cause failures. Such faults with the potential of contributing to failures are critical because they impair performance and result in a delayed reaction, which is regarded as a dependability problem. To ensure that critical faults can be discovered as soon as possible, the impact of such faults on the system must be tested. The performance and dependability of cloud-native systems are examined in this empirical study using fault injection, one of the chaos engineering techniques. The study explores the impacts and results of injecting various delay times into two cloud-native applications with diverse user numbers. The performance of the applications with various numbers of users is measured in relation to these delays, which accordingly reflects measuring the dependability of those systems. Firstly, the systems’ architecture were identified, and serverless with two Lambda functions and containerised microservices applications were chosen, which depend on utilising and incorporating cloud-native services. Secondly, faults are injected in order to quantify performance attributes such as throughput and latency. The results of several controlled experiments carried out in real-world cloud environments provide exploratory empirical data, which promoted comparisons and statistical analysis that we utilised to identify the behaviour of the application while experiencing stress. Typical results from this investigation include an overall reduction in performance that is embodied in an increase in latency with injecting delays. However, a remarkable result is noticed at a particular delay in which defects and availability problems appear out of nowhere. These findings assist in highlighting the value of using chaos engineering in general and fault injection in particular to assess the dependability of cloud-native applications and to find unpredicted failures that could arise quickly from defects that aren’t supposed to spread and result in dependability issues.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140886119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantically realizing discovery and composition for RESTful web services 从语义上实现 RESTful 网络服务的发现和组合
IF 3.7 3区 计算机科学 Q1 Mathematics Pub Date : 2024-04-23 DOI: 10.1007/s00607-024-01289-8
Haijun Gu, Yingyu Ma, Siqi Wang, Xincheng Chen, Weihua Su
{"title":"Semantically realizing discovery and composition for RESTful web services","authors":"Haijun Gu, Yingyu Ma, Siqi Wang, Xincheng Chen, Weihua Su","doi":"10.1007/s00607-024-01289-8","DOIUrl":"https://doi.org/10.1007/s00607-024-01289-8","url":null,"abstract":"","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140667300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalizing truth discovery by incorporating multi-truth features 通过纳入多真相特征来推广真相发现
IF 3.7 3区 计算机科学 Q1 Mathematics Pub Date : 2024-04-22 DOI: 10.1007/s00607-024-01288-9
Xiu Susie Fang, Xianzhi Wang, Quan Z. Sheng, Lina Yao
{"title":"Generalizing truth discovery by incorporating multi-truth features","authors":"Xiu Susie Fang, Xianzhi Wang, Quan Z. Sheng, Lina Yao","doi":"10.1007/s00607-024-01288-9","DOIUrl":"https://doi.org/10.1007/s00607-024-01288-9","url":null,"abstract":"","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140677879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Four vector intelligent metaheuristic for data optimization 用于数据优化的四向量智能元启发式
IF 3.7 3区 计算机科学 Q1 Mathematics Pub Date : 2024-04-18 DOI: 10.1007/s00607-024-01287-w
Hussam N. Fakhouri, Feras M. Awaysheh, Sadi Alawadi, Mohannad Alkhalaileh, Faten Hamad

Swarm intelligence (SI) algorithms represent a class of Artificial Intelligence (AI) optimization metaheuristics used for solving complex optimization problems. However, a key challenge in solving complex problems is maintaining the balance between exploration and exploitation to find the optimal global solution and avoid local minima. This paper proposes an innovative Swarm Intelligence (SI) algorithm called the Four Vector Intelligent Metaheuristic (FVIM) to address the aforementioned problem. FVIM’s search strategy is guided by four top-performing leaders within a swarm, ensuring a balanced exploration-exploitation trade-off in the search space, avoiding local minima, and mitigating low convergence issues. The efficacy of FVIM is evaluated through extensive experiments conducted over two datasets, incorporating both qualitative and quantitative statistical measurements. One dataset contains twenty-three well-known single-objective optimization functions, such as fixed-dimensional and multi-modal functions, while the other dataset comprises the CEC2017 functions. Additionally, the Wilcoxon test was computed to validate the result’s significance. The results illustrate FVIM’s effectiveness in addressing diverse optimization challenges. Moreover, FVIM has been successfully applied to tackle engineering design problems, such as weld beam and truss engineering design.

蜂群智能(SI)算法是一类人工智能(AI)优化元启发式算法,用于解决复杂的优化问题。然而,解决复杂问题的一个关键挑战是保持探索与利用之间的平衡,以找到最优全局解决方案并避免局部最小值。本文提出了一种名为四向量智能元启发式(FVIM)的创新型蜂群智能(SI)算法来解决上述问题。FVIM 的搜索策略由蜂群中四个表现最出色的领导者引导,确保了搜索空间中探索与开发的平衡权衡,避免了局部最小值,并缓解了收敛性低的问题。通过在两个数据集上进行的大量实验,结合定性和定量统计测量,对 FVIM 的功效进行了评估。一个数据集包含 23 个著名的单目标优化函数,如定维函数和多模式函数,另一个数据集包含 CEC2017 函数。此外,还计算了 Wilcoxon 检验,以验证结果的显著性。结果表明,FVIM 能有效解决各种优化难题。此外,FVIM 已成功应用于解决工程设计问题,如焊接梁和桁架工程设计。
{"title":"Four vector intelligent metaheuristic for data optimization","authors":"Hussam N. Fakhouri, Feras M. Awaysheh, Sadi Alawadi, Mohannad Alkhalaileh, Faten Hamad","doi":"10.1007/s00607-024-01287-w","DOIUrl":"https://doi.org/10.1007/s00607-024-01287-w","url":null,"abstract":"<p>Swarm intelligence (SI) algorithms represent a class of Artificial Intelligence (AI) optimization metaheuristics used for solving complex optimization problems. However, a key challenge in solving complex problems is maintaining the balance between exploration and exploitation to find the optimal global solution and avoid local minima. This paper proposes an innovative Swarm Intelligence (SI) algorithm called the Four Vector Intelligent Metaheuristic (FVIM) to address the aforementioned problem. FVIM’s search strategy is guided by four top-performing leaders within a swarm, ensuring a balanced exploration-exploitation trade-off in the search space, avoiding local minima, and mitigating low convergence issues. The efficacy of FVIM is evaluated through extensive experiments conducted over two datasets, incorporating both qualitative and quantitative statistical measurements. One dataset contains twenty-three well-known single-objective optimization functions, such as fixed-dimensional and multi-modal functions, while the other dataset comprises the CEC2017 functions. Additionally, the Wilcoxon test was computed to validate the result’s significance. The results illustrate FVIM’s effectiveness in addressing diverse optimization challenges. Moreover, FVIM has been successfully applied to tackle engineering design problems, such as weld beam and truss engineering design.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140626804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1