首页 > 最新文献

IEEE Transactions on Sustainable Computing最新文献

英文 中文
Energy-Efficient Shop Scheduling Using Space-Cooperation Multi-Objective Optimization 基于空间协同多目标优化的节能车间调度
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-12-11 DOI: 10.1109/TSUSC.2024.3506822
Jiepin Ding;Jun Xia;Yaning Yang;Junlong Zhou;Mingsong Chen;Keqin Li
Since Industry 5.0 emphasizes that manufacturing enterprises should raise awareness of social contribution to achieve sustainable development, more and more meta-heuristic algorithms are investigated to save energy in manufacturing systems. Although non-dominated sorting-based meta-heuristics have been recognized as promising multi-objective optimization methods for solving the energy-efficient flexible job shop scheduling problem (EFJSP), it is hard to guarantee the quality of the Pareto front (e.g., total energy consumption, makespan) due to the lack of population diversity. This is mainly because an improper individual comparison inevitably reduces population diversity, thus limiting exploration and exploitation abilities during population updates. To achieve efficient population evolution, this paper introduces a novel space-cooperation multi-objective optimization (SCMO) method that can effectively solve EFJSP to obtain scheduling schemes with better trade-offs. By cooperatively evaluating the similarity among individuals in both the decision space and objective space, we propose a space-cooperation population update method based on a three-vector representation that can accurately eliminate repetitive individuals to derive higher-quality Pareto solutions. To further improve search efficiency, we propose a difference-driven local search, which selectively changes the positions of operations with higher differences to search for neighbors effectively. Based on the Taguchi method, we conduct experiments to obtain a suitable parameter combination of SCMO. Comprehensive experimental results show that, compared to state-of-the-art methods, our SCMO method achieves the highest HV and NR and the lowest IGD, with an average of 0.990, 0.952, and 0.001, respectively. Meanwhile, compared to traditional local search approaches, our difference-driven local search obtains twice the HV on instance Mk12 and reduces the solving time from 1521 s to 475 s.
由于工业5.0强调制造企业应提高社会贡献意识以实现可持续发展,因此越来越多的元启发式算法被研究用于制造系统的节能。基于非支配排序的元启发式算法是求解节能柔性作业车间调度问题(EFJSP)的一种有前途的多目标优化方法,但由于群体多样性不足,难以保证Pareto前沿(如总能耗、完工时间)的质量。这主要是因为不恰当的个体比较不可避免地降低了种群多样性,从而限制了种群更新过程中的探索和开发能力。为了实现高效的种群进化,本文提出了一种新的空间合作多目标优化(SCMO)方法,该方法可以有效地求解EFJSP,以获得具有更好权衡的调度方案。通过对决策空间和目标空间中个体之间的相似性进行协同评价,提出了一种基于三向量表示的空间合作种群更新方法,该方法可以准确地消除重复个体,从而得到更高质量的Pareto解。为了进一步提高搜索效率,我们提出了一种差异驱动的局部搜索,该搜索有选择地改变差异较大的操作位置,从而有效地搜索到邻居。基于田口法,我们进行了实验,得到了合适的SCMO参数组合。综合实验结果表明,与现有方法相比,SCMO方法的HV和NR最高,IGD最低,平均值分别为0.990、0.952和0.001。同时,与传统局部搜索方法相比,差分驱动局部搜索在实例Mk12上获得的HV是传统搜索方法的两倍,求解时间从1521 s缩短到475 s。
{"title":"Energy-Efficient Shop Scheduling Using Space-Cooperation Multi-Objective Optimization","authors":"Jiepin Ding;Jun Xia;Yaning Yang;Junlong Zhou;Mingsong Chen;Keqin Li","doi":"10.1109/TSUSC.2024.3506822","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3506822","url":null,"abstract":"Since Industry 5.0 emphasizes that manufacturing enterprises should raise awareness of social contribution to achieve sustainable development, more and more meta-heuristic algorithms are investigated to save energy in manufacturing systems. Although non-dominated sorting-based meta-heuristics have been recognized as promising multi-objective optimization methods for solving the energy-efficient flexible job shop scheduling problem (EFJSP), it is hard to guarantee the quality of the Pareto front (e.g., total energy consumption, makespan) due to the lack of population diversity. This is mainly because an improper individual comparison inevitably reduces population diversity, thus limiting exploration and exploitation abilities during population updates. To achieve efficient population evolution, this paper introduces a novel space-cooperation multi-objective optimization (SCMO) method that can effectively solve EFJSP to obtain scheduling schemes with better trade-offs. By cooperatively evaluating the similarity among individuals in both the decision space and objective space, we propose a space-cooperation population update method based on a three-vector representation that can accurately eliminate repetitive individuals to derive higher-quality Pareto solutions. To further improve search efficiency, we propose a difference-driven local search, which selectively changes the positions of operations with higher differences to search for neighbors effectively. Based on the Taguchi method, we conduct experiments to obtain a suitable parameter combination of SCMO. Comprehensive experimental results show that, compared to state-of-the-art methods, our SCMO method achieves the highest HV and NR and the lowest IGD, with an average of 0.990, 0.952, and 0.001, respectively. Meanwhile, compared to traditional local search approaches, our difference-driven local search obtains twice the HV on instance Mk12 and reduces the solving time from 1521 s to 475 s.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 3","pages":"601-615"},"PeriodicalIF":3.0,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144219630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tensor and Minimum Connected Dominating Set Based Confident Information Coverage Reliability Evaluation for IoT 基于张量和最小连通支配集的物联网可信信息覆盖可靠性评估
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-25 DOI: 10.1109/TSUSC.2024.3503712
Ziheng Xiao;Chenlu Zhu;Wei Feng;Shenghao Liu;Xianjun Deng;Hongwei Lu;Laurence T. Yang;Jong Hyuk Park
Internet of Things (IoT) reliability evaluation contributes to the sustainable computing and enhanced stability of the network. Previous algorithms usually evaluate the reliability of IoT by enumenating the states of nodes and networks, which are difficult to handle IoT with hundreds of nodes because the computational cost. In this paper, a novel algorithm, TMCRA, is proposed to evaluate the reliability of IoT in complex network environment, which consider both coverage and connectivity. For coverage, TMCRA employs the Confident Information Coverage (CIC) model to divide the target area into independent grids and calculates the coverage rate. In terms of connectivity, TMCRA forming the Virtual Backbone Network (VBN) based on two proposed methods: TMA and MGIN, and evaluate connectivity by analyzing the VBN rather than the whole network. The TMA and MGIN are two algorithms for constructing Minimum Connected Dominant Sets (MCDS), which are suitable for different scale networks. Finally, based on the data of coverage and connectivity, TMCRA utilizes tensors for the unified modeling and representation of network structure, and calculates IoT reliability based on the tensors. Simulations are carried out for various sizes of IoT to show the advantages and effectiveness of the proposed approach in reliability evaluation.
物联网可靠性评估有助于实现网络的持续计算,增强网络的稳定性。以前的算法通常通过枚举节点和网络的状态来评估物联网的可靠性,由于计算成本的原因,难以处理数百个节点的物联网。本文提出了一种新的TMCRA算法来评估复杂网络环境下物联网的可靠性,同时考虑了覆盖和连通性。在覆盖方面,TMCRA采用CIC (confidence Information coverage)模型将目标区域划分为独立的网格并计算覆盖率。在连通性方面,TMCRA基于TMA和MGIN两种提出的方法组成虚拟骨干网(VBN),并通过分析VBN而不是整个网络来评估连通性。TMA和MGIN是构造最小连通优势集(MCDS)的两种算法,适用于不同规模的网络。最后,TMCRA基于覆盖和连通性数据,利用张量对网络结构进行统一建模和表示,并基于张量计算物联网可靠性。对不同规模的物联网进行了仿真,以证明该方法在可靠性评估中的优势和有效性。
{"title":"Tensor and Minimum Connected Dominating Set Based Confident Information Coverage Reliability Evaluation for IoT","authors":"Ziheng Xiao;Chenlu Zhu;Wei Feng;Shenghao Liu;Xianjun Deng;Hongwei Lu;Laurence T. Yang;Jong Hyuk Park","doi":"10.1109/TSUSC.2024.3503712","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3503712","url":null,"abstract":"Internet of Things (IoT) reliability evaluation contributes to the sustainable computing and enhanced stability of the network. Previous algorithms usually evaluate the reliability of IoT by enumenating the states of nodes and networks, which are difficult to handle IoT with hundreds of nodes because the computational cost. In this paper, a novel algorithm, TMCRA, is proposed to evaluate the reliability of IoT in complex network environment, which consider both coverage and connectivity. For coverage, TMCRA employs the Confident Information Coverage (CIC) model to divide the target area into independent grids and calculates the coverage rate. In terms of connectivity, TMCRA forming the Virtual Backbone Network (VBN) based on two proposed methods: TMA and MGIN, and evaluate connectivity by analyzing the VBN rather than the whole network. The TMA and MGIN are two algorithms for constructing Minimum Connected Dominant Sets (MCDS), which are suitable for different scale networks. Finally, based on the data of coverage and connectivity, TMCRA utilizes tensors for the unified modeling and representation of network structure, and calculates IoT reliability based on the tensors. Simulations are carried out for various sizes of IoT to show the advantages and effectiveness of the proposed approach in reliability evaluation.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 3","pages":"547-561"},"PeriodicalIF":3.0,"publicationDate":"2024-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144219804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding Container-Based Services Under Software Aging: Dependability and Performance Views 在软件老化下理解基于容器的服务:可靠性和性能视图
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-25 DOI: 10.1109/TSUSC.2024.3506213
Jing Bai;Xiaolin Chang;Fumio Machida;Kishor S. Trivedi
Container technology, as the key enabler behind microservice architectures, is widely applied in Cloud and Edge Computing. A long and continuous running of operating system (OS) hosting container-based services can encounter software aging that leads to performance deterioration and even causes system failures. OS rejuvenation techniques can mitigate the impact of software aging but the rejuvenation trigger interval needs to be carefully determined to reduce the downtime cost due to rejuvenation. This paper proposes a comprehensive semi-Markov-based approach to quantitatively evaluate the effect of OS rejuvenation on the dependability and the performance of a container-based service. In contrast to the existing studies, we neither restrict the distributions of time intervals of events to be exponential nor assume that backup resources are always available. Through the numerical study, we show the optimal container-migration trigger intervals that can maximize the dependability or minimize the performance of a container-based service.
容器技术作为微服务架构背后的关键推动者,在云和边缘计算中得到了广泛的应用。基于操作系统托管容器的服务长时间持续运行可能会遇到软件老化问题,从而导致性能下降,甚至导致系统故障。操作系统更新技术可以减轻软件老化的影响,但需要仔细确定更新触发间隔,以减少由于更新而导致的停机成本。本文提出了一种全面的半马尔可夫方法来定量评估操作系统再生对基于容器的服务的可靠性和性能的影响。与已有研究相反,我们既没有将事件时间间隔的分布限制为指数分布,也没有假设备份资源总是可用的。通过数值研究,我们给出了能够使基于容器的服务的可靠性最大化或性能最小化的最佳容器迁移触发间隔。
{"title":"Understanding Container-Based Services Under Software Aging: Dependability and Performance Views","authors":"Jing Bai;Xiaolin Chang;Fumio Machida;Kishor S. Trivedi","doi":"10.1109/TSUSC.2024.3506213","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3506213","url":null,"abstract":"Container technology, as the key enabler behind microservice architectures, is widely applied in Cloud and Edge Computing. A long and continuous running of operating system (OS) hosting container-based services can encounter software aging that leads to performance deterioration and even causes system failures. OS rejuvenation techniques can mitigate the impact of software aging but the rejuvenation trigger interval needs to be carefully determined to reduce the downtime cost due to rejuvenation. This paper proposes a comprehensive semi-Markov-based approach to quantitatively evaluate the effect of OS rejuvenation on the dependability and the performance of a container-based service. In contrast to the existing studies, we neither restrict the distributions of time intervals of events to be exponential nor assume that backup resources are always available. Through the numerical study, we show the optimal container-migration trigger intervals that can maximize the dependability or minimize the performance of a container-based service.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 3","pages":"562-575"},"PeriodicalIF":3.0,"publicationDate":"2024-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144219806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Approach of Vehicular Cooperative Communication Based on Strategy of Interval Type-2 Fuzzy Logic and Cooperative Game 基于区间2型模糊逻辑和合作博弈策略的车辆协同通信新方法
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-21 DOI: 10.1109/TSUSC.2024.3503580
Jie Zhang;Zhihao Zhang;Degan Zhang;Chenhao Ni;Ting Zhang;Xingru Jiang
As an important branch of the Internet of Things (IoT), vehicular networks play a crucial role in the construction of intelligent transportation systems. However, due to the rapid movement of vehicles and signal obstruction, achieving high- quality and low-latency communication in vehicular networks remains a significant challenge. To address this issue, this paper proposes a novel data communication method based on interval type-2 fuzzy logic and cooperative game theory. Firstly, interval type-2 fuzzy logic is utilized to infer vehicle stability, thereby selecting high-quality backbone nodes. Concurrently, the memory and forgetfulness functions of the Gated Recurrent Unit are employed to retain critical data packets. Subsequently, a greedy algorithm and cooperative game theory model are used to describe the behavior of vehicles in Roadside-to-Vehicle (R2V) communication and Vehicle-to- Vehicle (V2V) communication, respectively. This approach encourages backbone nodes to cooperate and serve other vehicles based on a benefit function. Experimental results demonstrate that the proposed method excels in terms of transmission delay, coverage range, and data packet delivery success rate.
车联网作为物联网的一个重要分支,在智能交通系统建设中起着至关重要的作用。然而,由于车辆的快速运动和信号障碍,在车载网络中实现高质量和低延迟的通信仍然是一个重大挑战。针对这一问题,本文提出了一种基于区间2型模糊逻辑和合作博弈论的数据通信方法。首先,利用区间2型模糊逻辑对车辆稳定性进行推断,从而选择优质骨干节点;同时,门控循环单元的记忆和遗忘功能被用来保留关键数据包。随后,利用贪婪算法和合作博弈论模型分别描述了车辆在R2V通信和V2V通信中的行为。这种方法鼓励骨干节点基于利益函数进行合作并为其他车辆服务。实验结果表明,该方法在传输延迟、覆盖范围和数据包发送成功率方面都有较好的效果。
{"title":"Novel Approach of Vehicular Cooperative Communication Based on Strategy of Interval Type-2 Fuzzy Logic and Cooperative Game","authors":"Jie Zhang;Zhihao Zhang;Degan Zhang;Chenhao Ni;Ting Zhang;Xingru Jiang","doi":"10.1109/TSUSC.2024.3503580","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3503580","url":null,"abstract":"As an important branch of the Internet of Things (IoT), vehicular networks play a crucial role in the construction of intelligent transportation systems. However, due to the rapid movement of vehicles and signal obstruction, achieving high- quality and low-latency communication in vehicular networks remains a significant challenge. To address this issue, this paper proposes a novel data communication method based on interval type-2 fuzzy logic and cooperative game theory. Firstly, interval type-2 fuzzy logic is utilized to infer vehicle stability, thereby selecting high-quality backbone nodes. Concurrently, the memory and forgetfulness functions of the Gated Recurrent Unit are employed to retain critical data packets. Subsequently, a greedy algorithm and cooperative game theory model are used to describe the behavior of vehicles in Roadside-to-Vehicle (R2V) communication and Vehicle-to- Vehicle (V2V) communication, respectively. This approach encourages backbone nodes to cooperate and serve other vehicles based on a benefit function. Experimental results demonstrate that the proposed method excels in terms of transmission delay, coverage range, and data packet delivery success rate.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 3","pages":"588-600"},"PeriodicalIF":3.0,"publicationDate":"2024-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144219581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Learning in Mobile Networks: A Comprehensive Case Study on Traffic Forecasting 移动网络中的联邦学习:流量预测的综合案例研究
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-21 DOI: 10.1109/TSUSC.2024.3504242
Nikolaos Pavlidis;Vasileios Perifanis;Selim F. Yilmaz;Francesc Wilhelmi;Marco Miozzo;Pavlos S. Efraimidis;Remous-Aris Koutsiamanis;Pavol Mulinka;Paolo Dini
The increasing demand for efficient resource allocation in mobile networks has catalyzed the exploration of innovative solutions that could enhance the task of real-time cellular traffic prediction. Under these circumstances, federated learning (FL) stands out as a distributed and privacy-preserving solution to foster collaboration among different sites, thus enabling responsive near-the-edge solutions. In this paper, we comprehensively study the potential benefits of FL in telecommunications through a case study on federated traffic forecasting using real-world data from base stations (BSs) in Barcelona (Spain). Our study encompasses relevant aspects within the federated experience, including model aggregation techniques, outlier management, the impact of individual clients, personalized learning, and the integration of exogenous sources of data. The performed evaluation is based on both prediction accuracy and sustainability, thus showcasing the environmental impact of employed FL algorithms in various settings. The findings from our study highlight FL as a promising and robust solution for mobile traffic prediction, emphasizing its twin merits as a privacy-conscious and environmentally sustainable approach, while also demonstrating its capability to overcome data heterogeneity and ensure high-quality predictions, marking a significant stride towards its integration in mobile traffic management systems.
移动网络中对有效资源分配的需求日益增长,这促使人们探索创新的解决方案,以增强实时蜂窝流量预测的任务。在这种情况下,联邦学习(FL)作为一种分布式和保护隐私的解决方案脱颖而出,以促进不同站点之间的协作,从而实现响应性的近边缘解决方案。在本文中,我们通过使用来自巴塞罗那(西班牙)基站(BSs)的真实世界数据进行联邦流量预测的案例研究,全面研究了FL在电信领域的潜在优势。我们的研究涵盖了联邦经验中的相关方面,包括模型聚合技术、离群值管理、个人客户的影响、个性化学习和外生数据源的集成。所进行的评估基于预测准确性和可持续性,从而展示了在各种设置中使用的FL算法对环境的影响。我们的研究结果强调了FL作为移动交通预测的一种有前途和强大的解决方案,强调了其作为隐私意识和环境可持续方法的双重优点,同时也展示了其克服数据异质性和确保高质量预测的能力,标志着其在移动交通管理系统集成方面迈出了重要的一步。
{"title":"Federated Learning in Mobile Networks: A Comprehensive Case Study on Traffic Forecasting","authors":"Nikolaos Pavlidis;Vasileios Perifanis;Selim F. Yilmaz;Francesc Wilhelmi;Marco Miozzo;Pavlos S. Efraimidis;Remous-Aris Koutsiamanis;Pavol Mulinka;Paolo Dini","doi":"10.1109/TSUSC.2024.3504242","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3504242","url":null,"abstract":"The increasing demand for efficient resource allocation in mobile networks has catalyzed the exploration of innovative solutions that could enhance the task of real-time cellular traffic prediction. Under these circumstances, federated learning (FL) stands out as a distributed and privacy-preserving solution to foster collaboration among different sites, thus enabling responsive near-the-edge solutions. In this paper, we comprehensively study the potential benefits of FL in telecommunications through a case study on federated traffic forecasting using real-world data from base stations (BSs) in Barcelona (Spain). Our study encompasses relevant aspects within the federated experience, including model aggregation techniques, outlier management, the impact of individual clients, personalized learning, and the integration of exogenous sources of data. The performed evaluation is based on both prediction accuracy and sustainability, thus showcasing the environmental impact of employed FL algorithms in various settings. The findings from our study highlight FL as a promising and robust solution for mobile traffic prediction, emphasizing its twin merits as a privacy-conscious and environmentally sustainable approach, while also demonstrating its capability to overcome data heterogeneity and ensure high-quality predictions, marking a significant stride towards its integration in mobile traffic management systems.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 3","pages":"576-587"},"PeriodicalIF":3.0,"publicationDate":"2024-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144219807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ChestBox: Enabling Fast State Sharing for Stateful Serverless Computing With State Functions ChestBox:使用状态函数为有状态无服务器计算启用快速状态共享
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-13 DOI: 10.1109/TSUSC.2024.3497326
Xinmin Zhang;Song Wu;Lin Gu;Qiang He;Hai Jin
This paper presents ChestBox, a novel approach that utilizes state functions to facilitate low-latency state sharing for stateful serverless computing. When an application function needs to share a state, the state function creates a memory space with Linux's shared memory object to store the state. Other application functions can then read the state directly from the shared memory. ChestBox enables fast state sharing that avoids excessive memory overhead without compromising on-demand resource allocation compared to existing solutions. This effectively reduces the energy consumption of serverless computing and promotes sustainable computing. The implementation of ChestBox on Apache OpenWhisk unearths two major implementation challenges, which we address with respective optimization techniques, i.e., state function channel and state swapping. The evaluation of ChestBox with four real-world applications shows that compared with the state-of-the-art approach, it can reduce state-sharing latency by up to 99.71%, while reducing execution costs by 24.59% and storage costs by 99.76%.
本文提出了一种利用状态函数促进无状态服务器计算的低延迟状态共享的新方法——ChestBox。当应用程序函数需要共享状态时,状态函数用Linux的共享内存对象创建一个内存空间来存储状态。其他应用程序函数可以直接从共享内存中读取状态。与现有解决方案相比,ChestBox支持快速状态共享,避免了过多的内存开销,同时又不影响按需资源分配。这有效地降低了无服务器计算的能耗,促进了可持续计算。在Apache OpenWhisk上实现ChestBox发现了两个主要的实现挑战,我们通过各自的优化技术来解决,即状态函数通道和状态交换。对四个实际应用的评估表明,与最先进的方法相比,它可以将状态共享延迟降低高达99.71%,同时将执行成本降低24.59%,存储成本降低99.76%。
{"title":"ChestBox: Enabling Fast State Sharing for Stateful Serverless Computing With State Functions","authors":"Xinmin Zhang;Song Wu;Lin Gu;Qiang He;Hai Jin","doi":"10.1109/TSUSC.2024.3497326","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3497326","url":null,"abstract":"This paper presents ChestBox, a novel approach that utilizes <italic>state functions</i> to facilitate low-latency state sharing for stateful serverless computing. When an <italic>application function</i> needs to share a state, the state function creates a memory space with Linux's shared memory object to store the state. Other application functions can then read the state directly from the shared memory. ChestBox enables fast state sharing that avoids excessive memory overhead without compromising on-demand resource allocation compared to existing solutions. This effectively reduces the energy consumption of serverless computing and promotes sustainable computing. The implementation of ChestBox on Apache OpenWhisk unearths two major implementation challenges, which we address with respective optimization techniques, i.e., state function channel and state swapping. The evaluation of ChestBox with four real-world applications shows that compared with the state-of-the-art approach, it can reduce state-sharing latency by up to 99.71%, while reducing execution costs by 24.59% and storage costs by 99.76%.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 3","pages":"491-502"},"PeriodicalIF":3.0,"publicationDate":"2024-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10752406","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144219803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EVADE: Targeted Adversarial False Data Injection Attacks for State Estimation in Smart Grid 面向智能电网状态估计的针对性对抗性假数据注入攻击
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-06 DOI: 10.1109/TSUSC.2024.3492290
Jiwei Tian;Chao Shen;Buhong Wang;Chao Ren;Xiaofang Xia;Runze Dong;Tianhao Cheng
Although conventional false data injection attacks can circumvent the detection of bad data detection (BDD) in sustainable power grid cyber physical systems, they are easily detected by well-trained deep learning-based detectors. Still, state estimation models with deep leaning-based detectors are not secure due to the vulnerabilities and fragility of deep learning models. Using the related laws of conventional false data injection attacks and adversarial sample attacks, this paper proposes the targEted adVersarial fAlse Data injEction (EVADE) strategy to explore targeted adversarial false data injection attacks for state estimation in Smart Grid. The proposed EVADE attack strategy selects key state variables based on adversarial saliency maps to improve the attack efficiency and perturbs as few state variables as possible to reduce the attack cost. In this way, the EVADE attack strategy can bypass the detection of BDD and neural attack detection (NAD) methods (that is, maintaining deep stealthy) with a high success rate and achieve the attack target simultaneously. Experimental results demonstrate the effectiveness of the proposed strategy, posing serious and pressing concerns for sustainable cyber physical power system security.
尽管传统的假数据注入攻击可以绕过可持续电网网络物理系统中坏数据检测(BDD)的检测,但它们很容易被训练有素的基于深度学习的检测器检测到。然而,由于深度学习模型的漏洞和脆弱性,基于深度学习的检测器的状态估计模型并不安全。利用传统假数据注入攻击和对抗性样本攻击的相关规律,提出了目标对抗性假数据注入(targEted adversarial false data injection, EVADE)策略,探索智能电网状态估计的目标对抗性假数据注入攻击。提出的规避攻击策略基于对抗显著性映射选择关键状态变量以提高攻击效率,并尽可能少地干扰状态变量以降低攻击代价。这样,规避攻击策略可以绕过BDD和NAD (neural attack detection)方法的检测(即保持深度隐身),成功率高,同时达到攻击目标。实验结果证明了所提出策略的有效性,对可持续的网络物理电力系统安全提出了严重而紧迫的关注。
{"title":"EVADE: Targeted Adversarial False Data Injection Attacks for State Estimation in Smart Grid","authors":"Jiwei Tian;Chao Shen;Buhong Wang;Chao Ren;Xiaofang Xia;Runze Dong;Tianhao Cheng","doi":"10.1109/TSUSC.2024.3492290","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3492290","url":null,"abstract":"Although conventional false data injection attacks can circumvent the detection of bad data detection (BDD) in sustainable power grid cyber physical systems, they are easily detected by well-trained deep learning-based detectors. Still, state estimation models with deep leaning-based detectors are not secure due to the vulnerabilities and fragility of deep learning models. Using the related laws of conventional false data injection attacks and adversarial sample attacks, this paper proposes the targEted adVersarial fAlse Data injEction (EVADE) strategy to explore targeted adversarial false data injection attacks for state estimation in Smart Grid. The proposed EVADE attack strategy selects key state variables based on adversarial saliency maps to improve the attack efficiency and perturbs as few state variables as possible to reduce the attack cost. In this way, the EVADE attack strategy can bypass the detection of BDD and neural attack detection (NAD) methods (that is, maintaining deep stealthy) with a high success rate and achieve the attack target simultaneously. Experimental results demonstrate the effectiveness of the proposed strategy, posing serious and pressing concerns for sustainable cyber physical power system security.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 3","pages":"534-546"},"PeriodicalIF":3.0,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144219582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Authentication Protocols: Classification, Trend and Opportunities 物联网认证协议:分类、趋势和机遇
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-06 DOI: 10.1109/TSUSC.2024.3492152
Amar N. Alsheavi;Ammar Hawbani;Xingfu Wang;Wajdy Othman;Liang Zhao;Zhi Liu;Saeed Hamood Alsamhi;Mohammed A. A. Al-Qaness
This paper reviews three main aspects of authentication protocols of Internet of Things (IoT): classifications and limitations, current trends, and opportunities. First, we explore the significance of IoT authentication protocols in ensuring secure communication and the protection of transmitted and received data, focusing on the classifications and associated limitations. Second, we discuss the latest developments and trends, such as using blockchain technology and machine learning to enhance authentication protocols. Third, we highlight the future opportunities, including the development of human-centric authentication designs and improved platform interoperability. At the end of this paper, we provided some insights gained for the new researcher, offering analyses of the trends and challenges in this field, giving recommendations for improving IoT authentication protocols, and emphasizing the need for further research and cooperation to develop advanced security solutions.
本文综述了物联网认证协议的三个主要方面:分类和限制、当前趋势和机遇。首先,我们探讨了物联网认证协议在确保安全通信和保护传输和接收数据方面的意义,重点是分类和相关限制。其次,我们讨论了最新的发展和趋势,例如使用区块链技术和机器学习来增强认证协议。第三,我们强调了未来的机遇,包括开发以人为中心的身份验证设计和改进平台互操作性。在本文的最后,我们为新研究员提供了一些见解,分析了该领域的趋势和挑战,提出了改进物联网认证协议的建议,并强调需要进一步研究和合作以开发先进的安全解决方案。
{"title":"IoT Authentication Protocols: Classification, Trend and Opportunities","authors":"Amar N. Alsheavi;Ammar Hawbani;Xingfu Wang;Wajdy Othman;Liang Zhao;Zhi Liu;Saeed Hamood Alsamhi;Mohammed A. A. Al-Qaness","doi":"10.1109/TSUSC.2024.3492152","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3492152","url":null,"abstract":"This paper reviews three main aspects of authentication protocols of Internet of Things (IoT): classifications and limitations, current trends, and opportunities. First, we explore the significance of IoT authentication protocols in ensuring secure communication and the protection of transmitted and received data, focusing on the classifications and associated limitations. Second, we discuss the latest developments and trends, such as using blockchain technology and machine learning to enhance authentication protocols. Third, we highlight the future opportunities, including the development of human-centric authentication designs and improved platform interoperability. At the end of this paper, we provided some insights gained for the new researcher, offering analyses of the trends and challenges in this field, giving recommendations for improving IoT authentication protocols, and emphasizing the need for further research and cooperation to develop advanced security solutions.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 3","pages":"515-533"},"PeriodicalIF":3.0,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144219756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Energy Bank Optimization Towards Outage Aware Sustainable Cellular Networks 面向停电感知可持续蜂窝网络的分布式能源银行优化
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-28 DOI: 10.1109/TSUSC.2024.3486976
Ashutosh Balakrishnan;Swades De;Li-Chun Wang
Grid connected and solar powered base stations (BSs) acting as distributed energy sources are increasingly becoming a popular solution to mobile operators. These networks experience double stochasticity due to the space-time variations in energy harvest and BS traffic. Hence, accurate and efficient green energy outage estimation in such networks is a challenging task. In this work, we propose a complutationally efficient cooperative energy transfer based distributed energy bank strategy to alleviate green energy outage and design energy sustainable networks. We first develop low-complexity Markovian frameworks to estimate green energy outage in a standalone BS without energy cooperation (WEC) and a multi-BS energy-cooperative (EC) setting, respectively. For the WEC system, we present a computationally efficient three-state discrete time Markovian statistical model, while the multi-BS EC framework is characterized by a two-state Markov model. The energy outage is studied as a function of capital expenditure (CAPEX), manifesting engineering insights from a service provider's perspective. Subsequently for the EC framework, we formulate a CAPEX optimization problem by jointly optimizing the BS cluster size and solar provisioning on individual BSs. Our results demonstrate that the proposed EC framework alleviates the green energy outage significantly, providing computational efficiency gains and CAPEX savings over the state-of-art approaches.
电网连接和太阳能基站(BSs)作为分布式能源正日益成为移动运营商的流行解决方案。由于能量收获和BS流量的时空变化,这些网络具有双重随机性。因此,准确、高效地估计绿色能源网络中的停电情况是一项具有挑战性的任务。本文提出了一种基于协同能量转移的分布式能源银行策略,以缓解绿色能源中断和设计能源可持续网络。首先,我们开发了低复杂度的马尔可夫框架,分别估算了独立BS无能源合作(WEC)和多BS能源合作(EC)环境下的绿色能源中断。对于WEC系统,我们提出了一个计算效率高的三状态离散时间马尔可夫统计模型,而多bs EC框架则是一个两状态马尔可夫模型。能源中断作为资本支出(CAPEX)的函数进行了研究,从服务提供商的角度体现了工程洞察力。随后,对于EC框架,我们通过联合优化BS集群规模和单个BS上的太阳能供应来制定CAPEX优化问题。我们的研究结果表明,拟议的EC框架显著缓解了绿色能源中断,提供了计算效率的提高和资本支出的节省,超过了最先进的方法。
{"title":"Distributed Energy Bank Optimization Towards Outage Aware Sustainable Cellular Networks","authors":"Ashutosh Balakrishnan;Swades De;Li-Chun Wang","doi":"10.1109/TSUSC.2024.3486976","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3486976","url":null,"abstract":"Grid connected and solar powered base stations (BSs) acting as distributed energy sources are increasingly becoming a popular solution to mobile operators. These networks experience double stochasticity due to the space-time variations in energy harvest and BS traffic. Hence, accurate and efficient green energy outage estimation in such networks is a challenging task. In this work, we propose a complutationally efficient cooperative energy transfer based distributed energy bank strategy to alleviate green energy outage and design energy sustainable networks. We first develop low-complexity Markovian frameworks to estimate green energy outage in a standalone BS without energy cooperation (WEC) and a multi-BS energy-cooperative (EC) setting, respectively. For the WEC system, we present a computationally efficient three-state discrete time Markovian statistical model, while the multi-BS EC framework is characterized by a two-state Markov model. The energy outage is studied as a function of capital expenditure (CAPEX), manifesting engineering insights from a service provider's perspective. Subsequently for the EC framework, we formulate a CAPEX optimization problem by jointly optimizing the BS cluster size and solar provisioning on individual BSs. Our results demonstrate that the proposed EC framework alleviates the green energy outage significantly, providing computational efficiency gains and CAPEX savings over the state-of-art approaches.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 3","pages":"503-514"},"PeriodicalIF":3.0,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144219757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Transceiver RF Impairments on Artificial Noise Suppression in Frequency-Hopping Systems 跳频系统中人工噪声抑制对收发器射频损伤的影响分析
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-07 DOI: 10.1109/TSUSC.2024.3475576
Changqing Song;Hongzhi Zhao;Yong Yu;Zhuo Li;Shihai Shao
The artificial noise shielded frequency-hopping (AN-FH) architecture can secure wireless communications against interference and eavesdropping. However, the AN suppression performance is highly sensitive to the radio frequency (RF) impairments, and the transceiver in-phase and quadrature (IQ) imbalances and phase noise in FH systems are more severe for the wide FH bandwidth. In this study, the AN-FH transceivers under RF impairments are mathematically modeled. Subsequently, distortions for transceiver phase noise are represented by the common phase error, distortions for transceiver IQ imbalances are represented by the mirror image component, and closed-form expressions for their respective power are derived and compared with the thermal noise power. Finally, the AN suppression capability is evaluated via the AN suppression ratio (ANSR), defined as the ratio of the AN-plus-noise power before and after suppression. It is found that when only phase noise exists, shortening the channel compensation cycle can enhance ANSR and reduce ANSR degradation; when the distortions’ power is smaller than the thermal noise power, it is also recommended to enhance the transmitting power and the power ratio of AN to information signals. When only IQ imbalances exist, increasing the power ratio of AN to information signals is suggested; when the distortions’ power is smaller than the thermal noise power, enhancing the transmitting power is also suggested.
人工噪声屏蔽跳频(AN-FH)结构可以保证无线通信不受干扰和窃听。然而,跳频系统的AN抑制性能对射频(RF)损伤非常敏感,跳频带宽越宽,收发器的同相和正交(IQ)不平衡和相位噪声越严重。在本研究中,对射频损伤下的AN-FH收发器进行了数学建模。随后,用共相位误差表示收发器相位噪声的畸变,用镜像分量表示收发器IQ不平衡的畸变,推导出各自功率的封闭表达式,并与热噪声功率进行比较。最后,通过AN抑制比(ANSR)来评估AN抑制能力,ANSR定义为抑制前后AN加噪声功率的比值。研究发现,当仅存在相位噪声时,缩短信道补偿周期可以提高ANSR,减少ANSR退化;当失真功率小于热噪声功率时,建议提高发射功率和AN /信息信号的功率比。当仅存在IQ不平衡时,建议增加AN与信息信号的功率比;当畸变功率小于热噪声功率时,建议提高发射功率。
{"title":"Analysis of Transceiver RF Impairments on Artificial Noise Suppression in Frequency-Hopping Systems","authors":"Changqing Song;Hongzhi Zhao;Yong Yu;Zhuo Li;Shihai Shao","doi":"10.1109/TSUSC.2024.3475576","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3475576","url":null,"abstract":"The artificial noise shielded frequency-hopping (AN-FH) architecture can secure wireless communications against interference and eavesdropping. However, the AN suppression performance is highly sensitive to the radio frequency (RF) impairments, and the transceiver in-phase and quadrature (IQ) imbalances and phase noise in FH systems are more severe for the wide FH bandwidth. In this study, the AN-FH transceivers under RF impairments are mathematically modeled. Subsequently, distortions for transceiver phase noise are represented by the common phase error, distortions for transceiver IQ imbalances are represented by the mirror image component, and closed-form expressions for their respective power are derived and compared with the thermal noise power. Finally, the AN suppression capability is evaluated via the AN suppression ratio (ANSR), defined as the ratio of the AN-plus-noise power before and after suppression. It is found that when only phase noise exists, shortening the channel compensation cycle can enhance ANSR and reduce ANSR degradation; when the distortions’ power is smaller than the thermal noise power, it is also recommended to enhance the transmitting power and the power ratio of AN to information signals. When only IQ imbalances exist, increasing the power ratio of AN to information signals is suggested; when the distortions’ power is smaller than the thermal noise power, enhancing the transmitting power is also suggested.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 3","pages":"475-490"},"PeriodicalIF":3.0,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144219808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Sustainable Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1