首页 > 最新文献

IEEE Transactions on Sustainable Computing最新文献

英文 中文
bSlight: Battery-Less Energy Autonomous Street Light Management System for Smart City bSlight:用于智慧城市的无电池能源自主路灯管理系统
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-08-31 DOI: 10.1109/TSUSC.2023.3310884
Prajnyajit Mohanty;Umesh C. Pati;Kamalakanta Mahapatra;Saraju P. Mohanty
Public lighting is a ubiquitous utility in cities to ensure the safety of people. In addition to playing a significant role in amending the comfort and safety of cities, street lighting causes substantial financial burden on governments to maintain its operation. Smart Light Emitting Diode (LED) street light system has become a prominent alternative to conventional street lighting systems with the involvement of Internet of Things (IoT). In this manuscript, a supercapacitor based smart street management system with energy autonomous capability has been proposed. It works in real-time and as an energy-saving alternative to prevent unnecessary electricity consumption of the street light. The average current consumption and power consumption of the system are 619.14 $mu$A and 2.022 mW, respectively. Three charging schemes have been investigated to find the optimized topology to harvest energy. The proposed device harvests energy from ambient sunlight and artificial light using a solar cell of 64 mm x 37 mm x 0.22 mm with maximum output power of 66 mW. LoRaWAN has been incorporated for communication, with a communication range of 761 m in real-world testbed. The operation characteristics and performance evaluation has been done based on implementing the system in field to ensure seamless operation.
公共照明是城市中无处不在的公用设施,以确保人们的安全。除了在改善城市舒适度和安全性方面发挥重要作用外,道路照明还为政府带来了巨大的财政负担,需要维持其运行。随着物联网(IoT)的发展,智能发光二极管(LED)路灯系统已成为传统路灯系统的重要替代品。本手稿提出了一种基于超级电容器、具有能源自主能力的智能街道管理系统。该系统可实时工作,并作为一种节能替代方案,防止路灯不必要的电力消耗。该系统的平均电流消耗和功率消耗分别为 619.14 美元/mu$A 和 2.022 mW。为了找到最佳的拓扑结构来收集能量,我们研究了三种充电方案。所提出的设备使用一个 64 mm x 37 mm x 0.22 mm 的太阳能电池从环境阳光和人造光中采集能量,最大输出功率为 66 mW。该装置采用 LoRaWAN 进行通信,在实际测试平台上的通信距离为 761 米。系统的运行特点和性能评估是在实地实施的基础上进行的,以确保无缝运行。
{"title":"bSlight: Battery-Less Energy Autonomous Street Light Management System for Smart City","authors":"Prajnyajit Mohanty;Umesh C. Pati;Kamalakanta Mahapatra;Saraju P. Mohanty","doi":"10.1109/TSUSC.2023.3310884","DOIUrl":"10.1109/TSUSC.2023.3310884","url":null,"abstract":"Public lighting is a ubiquitous utility in cities to ensure the safety of people. In addition to playing a significant role in amending the comfort and safety of cities, street lighting causes substantial financial burden on governments to maintain its operation. Smart Light Emitting Diode (LED) street light system has become a prominent alternative to conventional street lighting systems with the involvement of Internet of Things (IoT). In this manuscript, a supercapacitor based smart street management system with energy autonomous capability has been proposed. It works in real-time and as an energy-saving alternative to prevent unnecessary electricity consumption of the street light. The average current consumption and power consumption of the system are 619.14 \u0000<inline-formula><tex-math>$mu$</tex-math></inline-formula>\u0000A and 2.022 mW, respectively. Three charging schemes have been investigated to find the optimized topology to harvest energy. The proposed device harvests energy from ambient sunlight and artificial light using a solar cell of 64 mm x 37 mm x 0.22 mm with maximum output power of 66 mW. LoRaWAN has been incorporated for communication, with a communication range of 761 m in real-world testbed. The operation characteristics and performance evaluation has been done based on implementing the system in field to ensure seamless operation.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 1","pages":"100-114"},"PeriodicalIF":3.9,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72516185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supervised Representation Learning for Network Traffic With Cluster Compression 利用集群压缩对网络流量进行有监督的表征学习
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-08-28 DOI: 10.1109/TSUSC.2023.3292404
Xiaojuan Wang;Yu Zhang;Mingshu He;Shize Guo;Liu Yang
In the face of increasing network traffic, network security issues have gained significant attention. Existing network intrusion detection models often improve the ability to distinguish network behaviors by optimizing the model structure, while ignoring the expressiveness of network traffic at the data level. Visual analysis of network behavior through representation learning can provide a new perspective for network intrusion detection. Unfortunately, representation learning based on machine learning and deep learning often suffer from scalability and interpretability limitations. In this article, we establish an interpretable multi-layer mapping model to enhance the expressiveness of network traffic data. Moreover, the unsupervised method is used to extract the internal distribution characteristics of the data before the model to enhance the data. What’s more, we analyze the feasibility of the proposed flow spectrum theory on the UNSW-NB15 dataset. Experimental results demonstrate that the flow spectrum exhibits significant advantages in characterizing network behavior compared to the original network traffic features, underscoring its practical application value. Finally, we conduct an application analysis using multiple datasets (CICIDS2017 and CICIDS2018), revealing the model’s strong universality and adaptability across different datasets.
面对日益增长的网络流量,网络安全问题备受关注。现有的网络入侵检测模型往往通过优化模型结构来提高分辨网络行为的能力,却忽视了网络流量在数据层面的表现力。通过表征学习对网络行为进行可视化分析,可以为网络入侵检测提供新的视角。遗憾的是,基于机器学习和深度学习的表示学习往往受到可扩展性和可解释性的限制。本文建立了一种可解释的多层映射模型,以增强网络流量数据的表现力。此外,在建立模型之前,我们采用无监督方法提取数据的内部分布特征,以增强数据的表达能力。此外,我们还在 UNSW-NB15 数据集上分析了所提出的流谱理论的可行性。实验结果表明,与原始网络流量特征相比,流谱在表征网络行为方面具有显著优势,凸显了其实际应用价值。最后,我们利用多个数据集(CICIDS2017 和 CICIDS2018)进行了应用分析,揭示了该模型在不同数据集中的强大通用性和适应性。
{"title":"Supervised Representation Learning for Network Traffic With Cluster Compression","authors":"Xiaojuan Wang;Yu Zhang;Mingshu He;Shize Guo;Liu Yang","doi":"10.1109/TSUSC.2023.3292404","DOIUrl":"10.1109/TSUSC.2023.3292404","url":null,"abstract":"In the face of increasing network traffic, network security issues have gained significant attention. Existing network intrusion detection models often improve the ability to distinguish network behaviors by optimizing the model structure, while ignoring the expressiveness of network traffic at the data level. Visual analysis of network behavior through representation learning can provide a new perspective for network intrusion detection. Unfortunately, representation learning based on machine learning and deep learning often suffer from scalability and interpretability limitations. In this article, we establish an interpretable multi-layer mapping model to enhance the expressiveness of network traffic data. Moreover, the unsupervised method is used to extract the internal distribution characteristics of the data before the model to enhance the data. What’s more, we analyze the feasibility of the proposed flow spectrum theory on the UNSW-NB15 dataset. Experimental results demonstrate that the flow spectrum exhibits significant advantages in characterizing network behavior compared to the original network traffic features, underscoring its practical application value. Finally, we conduct an application analysis using multiple datasets (CICIDS2017 and CICIDS2018), revealing the model’s strong universality and adaptability across different datasets.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 1","pages":"1-13"},"PeriodicalIF":3.9,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76492870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Sustainable Trust: A Practical SGX Aided Anonymous Reputation System 实现可持续信任:实用的 SGX 匿名声誉辅助系统
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-08-24 DOI: 10.1109/TSUSC.2023.3308081
Xu Yang;Xuechao Yang;Junwei Luo;Xun Yi;Ibrahim Khalil;Shangqi Lai;Wei Wu;Albert Y. Zomaya
Reputation systems are widely used to provide a trustworthy environment and improve the sustainability of online discussions. They help users understand and evaluate the quality of information by collecting and counting feedback from different users. However, a common issue in most reputation systems is how to maintain users’ reputation and protect their anonymity simultaneously. In this paper, we introduce a new practical anonymous reputation system based on SGX. The establishment of an anonymous reputation system has a positive effect on sustainable trust in reputation-based online applications. Our system achieves the combination of reputation and anonymity by utilizing Intel SGX and the Bloom filter. The Path ORAM algorithm is also implemented to resist side-channel attacks. The experiments demonstrate that our system achieves high performance in terms of computation and storage costs. When compared to two state-of-the-art anonymous reputation systems, our system has better computation performance with at least three orders of magnitude.
声誉系统被广泛用于提供一个值得信赖的环境,并提高在线讨论的可持续性。它们通过收集和统计不同用户的反馈,帮助用户了解和评价信息的质量。然而,在大多数声誉系统中,一个共同的问题是如何同时维护用户的声誉和保护他们的匿名性。本文介绍了一种基于 SGX 的新型实用匿名信誉系统。匿名信誉系统的建立对基于信誉的在线应用中的可持续信任有积极作用。我们的系统利用英特尔 SGX 和 Bloom 过滤器实现了信誉和匿名的结合。此外,还采用了 Path ORAM 算法来抵御侧信道攻击。实验证明,我们的系统在计算和存储成本方面实现了高性能。与两款最先进的匿名信誉系统相比,我们的系统具有更好的计算性能,至少提高了三个数量级。
{"title":"Towards Sustainable Trust: A Practical SGX Aided Anonymous Reputation System","authors":"Xu Yang;Xuechao Yang;Junwei Luo;Xun Yi;Ibrahim Khalil;Shangqi Lai;Wei Wu;Albert Y. Zomaya","doi":"10.1109/TSUSC.2023.3308081","DOIUrl":"10.1109/TSUSC.2023.3308081","url":null,"abstract":"Reputation systems are widely used to provide a trustworthy environment and improve the sustainability of online discussions. They help users understand and evaluate the quality of information by collecting and counting feedback from different users. However, a common issue in most reputation systems is how to maintain users’ reputation and protect their anonymity simultaneously. In this paper, we introduce a new practical anonymous reputation system based on SGX. The establishment of an anonymous reputation system has a positive effect on sustainable trust in reputation-based online applications. Our system achieves the combination of reputation and anonymity by utilizing Intel SGX and the Bloom filter. The Path ORAM algorithm is also implemented to resist side-channel attacks. The experiments demonstrate that our system achieves high performance in terms of computation and storage costs. When compared to two state-of-the-art anonymous reputation systems, our system has better computation performance with at least three orders of magnitude.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 1","pages":"88-99"},"PeriodicalIF":3.9,"publicationDate":"2023-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91098155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Renewable Energy in Data Centers: The Dilemma of Electrical Grid Dependency and Autonomy Costs 数据中心的可再生能源:电网依赖与自主成本的两难选择
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-08-23 DOI: 10.1109/TSUSC.2023.3307790
Wedan Emmanuel Gnibga;Anne Blavette;Anne-Cécile Orgerie
Integrating larger shares of renewables in data centers’ electrical mix is mandatory to reduce their carbon footprint. However, as they are intermittent and fluctuating, renewable energies alone cannot provide a 24/7 supply and should be combined with a secondary source. Finding the optimal infrastructure configuration for both renewable production and financial costs remains difficult. In this article, we examine three scenarios with on-site renewable energy sources combined respectively with the electrical grid, batteries alone and batteries with hydrogen storage systems. The objectives are first, to size optimally the electric infrastructure using combinations of standard microgrids approaches, second to quantify the level of grid utilization when data centers consume/ export electricity from/to the grid, to determine the level of effort required from the grid operator, and finally to analyze the cost of 100% autonomy provided by the battery-based configurations and to discuss their economical viability. Our results show that in the grid-dependent mode, 63.1% of the generated electricity has to be injected into the grid and retrieved later. In the autonomous configurations, the cheapest one including hydrogen storage leads to a unit cost significantly more expensive than the electricity supplied from a national power system in many countries.
为了减少碳足迹,必须在数据中心的电力组合中增加可再生能源的比例。然而,由于可再生能源具有间歇性和波动性,因此无法单独提供全天候供电,而应与辅助能源相结合。找到既能满足可再生能源生产又能降低财务成本的最佳基础设施配置仍然很困难。在本文中,我们研究了现场可再生能源分别与电网、单独电池和带储氢系统的电池相结合的三种方案。我们的目标首先是利用标准微电网组合方法优化电力基础设施的规模,其次是量化数据中心从电网消耗/向电网输出电力时的电网利用水平,确定电网运营商需要付出的努力,最后是分析基于电池的配置所提供的 100% 自主性的成本,并讨论其经济可行性。我们的研究结果表明,在依赖电网的模式下,63.1% 的发电量需要注入电网,然后再收回。在自主配置中,包括氢储存在内的最便宜配置的单位成本要比许多国家的国家电力系统提供的电力贵得多。
{"title":"Renewable Energy in Data Centers: The Dilemma of Electrical Grid Dependency and Autonomy Costs","authors":"Wedan Emmanuel Gnibga;Anne Blavette;Anne-Cécile Orgerie","doi":"10.1109/TSUSC.2023.3307790","DOIUrl":"10.1109/TSUSC.2023.3307790","url":null,"abstract":"Integrating larger shares of renewables in data centers’ electrical mix is mandatory to reduce their carbon footprint. However, as they are intermittent and fluctuating, renewable energies alone cannot provide a 24/7 supply and should be combined with a secondary source. Finding the optimal infrastructure configuration for both renewable production and financial costs remains difficult. In this article, we examine three scenarios with on-site renewable energy sources combined respectively with the electrical grid, batteries alone and batteries with hydrogen storage systems. The objectives are first, to size optimally the electric infrastructure using combinations of standard microgrids approaches, second to quantify the level of grid utilization when data centers consume/ export electricity from/to the grid, to determine the level of effort required from the grid operator, and finally to analyze the cost of 100% autonomy provided by the battery-based configurations and to discuss their economical viability. Our results show that in the grid-dependent mode, 63.1% of the generated electricity has to be injected into the grid and retrieved later. In the autonomous configurations, the cheapest one including hydrogen storage leads to a unit cost significantly more expensive than the electricity supplied from a national power system in many countries.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 3","pages":"315-328"},"PeriodicalIF":3.9,"publicationDate":"2023-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87444789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Allocation for Vehicle-to-Grid Settings: A Low-Cost Proposal Combining DRL and VNE 车辆到电网设置的能源分配:结合 DRL 和 VNE 的低成本建议
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-08-22 DOI: 10.1109/TSUSC.2023.3307551
Peiying Zhang;Ning Chen;Neeraj Kumar;Laith Abualigah;Mohsen Guizani;Youxiang Duan;Jian Wang;Sheng Wu
As electric vehicle (EV) ownership becomes more commonplace, partly due to government incentives, there is a need also to design solutions such as energy allocation strategies to more effectively support sustainable vehicle-to-grid (V2G) applications. Therefore, this work proposes an energy allocation strategy, designed to minimize the electricity cost while improving the operating revenue. Specifically, V2G is abstracted as a three-domain network architecture to facilitate flexible, intelligent, and scalable energy allocation decision-making. Furthermore, this work combines virtual network embedding (VNE) and deep reinforcement learning (DRL) algorithms, where a DRL-based agent model is proposed, to adaptively perceives environmental features and extracts the feature matrix as input. In particular, the agent consists of a four-layer architecture for node and link embedding, and jointly optimizes the decision-making through a reward mechanism and gradient back-propagation. Finally, the effectiveness of the proposed strategy is demonstrated through simulation case studies. Specifically, compared to the used benchmarks, it improves the VNR acceptance ratio, Long-term average revenue, and Long-term average revenue-cost ratio indicators by an average of 3.17%, 191.36, and 2.04%, respectively. To the best of our knowledge, this is one of the first attempts combining VNE and DRL to provide an energy allocation strategy for V2G.
随着电动汽车(EV)的普及(部分原因是政府的激励措施),我们也需要设计一些解决方案,如能源分配策略,以更有效地支持可持续的车对网(V2G)应用。因此,本研究提出了一种能源分配策略,旨在最大限度地降低电力成本,同时提高运营收益。具体来说,V2G 被抽象为一个三域网络架构,以促进灵活、智能和可扩展的能源分配决策。此外,这项工作还结合了虚拟网络嵌入(VNE)和深度强化学习(DRL)算法,提出了一种基于 DRL 的代理模型,用于自适应地感知环境特征并提取特征矩阵作为输入。其中,代理由四层结构组成,用于节点和链接嵌入,并通过奖励机制和梯度反向传播共同优化决策。最后,通过模拟案例研究证明了所提策略的有效性。具体来说,与所使用的基准相比,它在 VNR 接收率、长期平均收入和长期平均收入成本比指标上分别平均提高了 3.17%、191.36 和 2.04%。据我们所知,这是结合 VNE 和 DRL 为 V2G 提供能源分配策略的首次尝试之一。
{"title":"Energy Allocation for Vehicle-to-Grid Settings: A Low-Cost Proposal Combining DRL and VNE","authors":"Peiying Zhang;Ning Chen;Neeraj Kumar;Laith Abualigah;Mohsen Guizani;Youxiang Duan;Jian Wang;Sheng Wu","doi":"10.1109/TSUSC.2023.3307551","DOIUrl":"10.1109/TSUSC.2023.3307551","url":null,"abstract":"As electric vehicle (EV) ownership becomes more commonplace, partly due to government incentives, there is a need also to design solutions such as energy allocation strategies to more effectively support sustainable vehicle-to-grid (V2G) applications. Therefore, this work proposes an energy allocation strategy, designed to minimize the electricity cost while improving the operating revenue. Specifically, V2G is abstracted as a three-domain network architecture to facilitate flexible, intelligent, and scalable energy allocation decision-making. Furthermore, this work combines virtual network embedding (VNE) and deep reinforcement learning (DRL) algorithms, where a DRL-based agent model is proposed, to adaptively perceives environmental features and extracts the feature matrix as input. In particular, the agent consists of a four-layer architecture for node and link embedding, and jointly optimizes the decision-making through a reward mechanism and gradient back-propagation. Finally, the effectiveness of the proposed strategy is demonstrated through simulation case studies. Specifically, compared to the used benchmarks, it improves the VNR acceptance ratio, Long-term average revenue, and Long-term average revenue-cost ratio indicators by an average of 3.17%, 191.36, and 2.04%, respectively. To the best of our knowledge, this is one of the first attempts combining VNE and DRL to provide an energy allocation strategy for V2G.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 1","pages":"75-87"},"PeriodicalIF":3.9,"publicationDate":"2023-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77214489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Reinforcement Learning-Based Preemptive Approach for Cost-Aware Cloud Job Scheduling 基于深度强化学习的成本感知云作业调度抢占式方法
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-08-10 DOI: 10.1109/TSUSC.2023.3303898
Long Cheng;Yue Wang;Feng Cheng;Cheng Liu;Zhiming Zhao;Ying Wang
With some specific characteristics such as elastics and scalability, cloud computing has become the most promising technology for online business nowadays. However, how to efficiently perform real-time job scheduling in cloud still poses significant challenges. The reason is that those jobs are highly dynamic and complex, and it is always hard to allocate them to computing resources in an optimal way, such as to meet the requirements from both service providers and users. In recent years, various works demonstrate that deep reinforcement learning (DRL) can handle real-time cloud jobs well in scheduling. However, to our knowledge, none of them has ever considered extra optimization opportunities for the allocated jobs in their scheduling frameworks. Given this fact, in this work, we introduce a novel DRL-based preemptive method for further improve the performance of the current studies. Specifically, we try to improve the training of scheduling policy with effective job preemptive mechanisms, and on that basis to optimize job execution cost while meeting users’ expected response time. We introduce the detailed design of our method, and our evaluations demonstrate that our approach can achieve better performance than other scheduling algorithms under different real-time workloads, including the DRL approach.
云计算具有灵活性和可扩展性等特点,已成为当今最有前途的在线业务技术。然而,如何在云计算中高效地执行实时作业调度仍是一个重大挑战。究其原因,这些作业具有高度的动态性和复杂性,很难以最优方式将其分配给计算资源,从而满足服务提供商和用户的要求。近年来,各种研究表明,深度强化学习(DRL)可以很好地处理实时云作业的调度。然而,据我们所知,没有一项研究在其调度框架中考虑了分配作业的额外优化机会。鉴于这一事实,我们在本研究中引入了一种基于 DRL 的新型抢占式方法,以进一步提高现有研究的性能。具体来说,我们试图通过有效的作业抢占机制来改进调度策略的训练,并在此基础上优化作业执行成本,同时满足用户的预期响应时间。我们介绍了我们方法的详细设计,评估结果表明,在不同的实时工作负载下,我们的方法比其他调度算法(包括 DRL 方法)能取得更好的性能。
{"title":"A Deep Reinforcement Learning-Based Preemptive Approach for Cost-Aware Cloud Job Scheduling","authors":"Long Cheng;Yue Wang;Feng Cheng;Cheng Liu;Zhiming Zhao;Ying Wang","doi":"10.1109/TSUSC.2023.3303898","DOIUrl":"10.1109/TSUSC.2023.3303898","url":null,"abstract":"With some specific characteristics such as elastics and scalability, cloud computing has become the most promising technology for online business nowadays. However, how to efficiently perform real-time job scheduling in cloud still poses significant challenges. The reason is that those jobs are highly dynamic and complex, and it is always hard to allocate them to computing resources in an optimal way, such as to meet the requirements from both service providers and users. In recent years, various works demonstrate that deep reinforcement learning (DRL) can handle real-time cloud jobs well in scheduling. However, to our knowledge, none of them has ever considered extra optimization opportunities for the allocated jobs in their scheduling frameworks. Given this fact, in this work, we introduce a novel DRL-based preemptive method for further improve the performance of the current studies. Specifically, we try to improve the training of scheduling policy with effective job preemptive mechanisms, and on that basis to optimize job execution cost while meeting users’ expected response time. We introduce the detailed design of our method, and our evaluations demonstrate that our approach can achieve better performance than other scheduling algorithms under different real-time workloads, including the DRL approach.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 3","pages":"422-432"},"PeriodicalIF":3.9,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91223232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intrusion Detection and Identification System for Internet of Things Networks Using a Hybrid Ensemble Deep Learning Framework 使用混合集合深度学习框架的物联网网络入侵检测和识别系统
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-08-09 DOI: 10.1109/TSUSC.2023.3303422
Yanika Kongsorot;Pakarat Musikawan;Phet Aimtongkham;Ilsun You;Abderrahim Benslimane;Chakchai So-In
Owing to the exponential proliferation of internet services and the sophistication of intrusions, traditional intrusion detection algorithms are unable to handle complex invasions due to their limited representation capabilities and the unbalanced nature of Internet of Things (IoT)-related data in terms of both telemetry and network traffic. Drawing inspiration from deep learning achievements in feature extraction and representation learning, in this study, we propose an accurate hybrid ensemble deep learning framework (HEDLF) to protect against obfuscated cyber-attacks on IoT networks. To address complex features and alleviate the imbalance problem, the proposed HEDLF includes three key components: 1) a hierarchical feature representation technique based on deep learning, which aims to extract specific information by supervising the loss of gradient information; 2) a balanced rotated feature extractor that simultaneously encourages the individual accuracy and diversity of the ensemble classifier; and 3) a meta-classifier acting as an aggregation method, which leverages a semisparse group regularizer to analyze the base classifiers’ outputs. Additionally, these improvements take class imbalance into account. The experimental results show that when compared against state-of-the-art techniques in terms of accuracy, precision, recall, and F1-score, the proposed HEDLF can achieve promising results on both telemetry and network traffic data.
由于互联网服务的指数级激增和入侵的复杂性,传统的入侵检测算法由于其有限的表示能力和物联网(IoT)相关数据在遥测和网络流量方面的不均衡性而无法处理复杂的入侵。在本研究中,我们从深度学习在特征提取和表示学习方面的成就中汲取灵感,提出了一种精确的混合集合深度学习框架(HEDLF),以防范对物联网网络的模糊网络攻击。为解决复杂特征并缓解不平衡问题,所提出的 HEDLF 包括三个关键组件:1)基于深度学习的分层特征表示技术,旨在通过监督梯度信息的损失来提取特定信息;2)平衡旋转特征提取器,同时鼓励集合分类器的个体准确性和多样性;3)作为聚合方法的元分类器,利用半解析组正则化器来分析基础分类器的输出。此外,这些改进还考虑到了类的不平衡性。实验结果表明,在准确度、精确度、召回率和 F1 分数方面,与最先进的技术相比,所提出的 HEDLF 可以在遥测数据和网络流量数据上取得令人满意的结果。
{"title":"An Intrusion Detection and Identification System for Internet of Things Networks Using a Hybrid Ensemble Deep Learning Framework","authors":"Yanika Kongsorot;Pakarat Musikawan;Phet Aimtongkham;Ilsun You;Abderrahim Benslimane;Chakchai So-In","doi":"10.1109/TSUSC.2023.3303422","DOIUrl":"10.1109/TSUSC.2023.3303422","url":null,"abstract":"Owing to the exponential proliferation of internet services and the sophistication of intrusions, traditional intrusion detection algorithms are unable to handle complex invasions due to their limited representation capabilities and the unbalanced nature of Internet of Things (IoT)-related data in terms of both telemetry and network traffic. Drawing inspiration from deep learning achievements in feature extraction and representation learning, in this study, we propose an accurate hybrid ensemble deep learning framework (HEDLF) to protect against obfuscated cyber-attacks on IoT networks. To address complex features and alleviate the imbalance problem, the proposed HEDLF includes three key components: 1) a hierarchical feature representation technique based on deep learning, which aims to extract specific information by supervising the loss of gradient information; 2) a balanced rotated feature extractor that simultaneously encourages the individual accuracy and diversity of the ensemble classifier; and 3) a meta-classifier acting as an aggregation method, which leverages a semisparse group regularizer to analyze the base classifiers’ outputs. Additionally, these improvements take class imbalance into account. The experimental results show that when compared against state-of-the-art techniques in terms of accuracy, precision, recall, and F1-score, the proposed HEDLF can achieve promising results on both telemetry and network traffic data.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"8 4","pages":"596-613"},"PeriodicalIF":3.9,"publicationDate":"2023-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77175733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Evaluation of Blockchain Based Privacy Cryptocurrencies: A Comparative Analysis of Dash, Monero, Verge, Zcash, and Grin 基于区块链的隐私加密货币的隐私评估:Dash、Monero、Verge、Zcash 和 Grin 的比较分析
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-08-08 DOI: 10.1109/TSUSC.2023.3303180
Tao Zhang
Privacy is important to financial industry, so as to blockchain based cryptocurrencies. Bitcoin can provide only weak identity privacy. To overcome privacy challenges of Bitcoin, some privacy focused cryptocurrencies are proposed, such as Dash, Monero, Zcash, Grin and Verge. Private address, confidential transaction, and network anonymization service are adopted to improve privacy in these privacy focused cryptocurrencies. We propose four privacy metrics for blockchain based cryptocurrencies as identity anonymity, transaction confidentiality, transaction unlinkability, and network anonymity. Then make a comparative analysis on privacy of Bitcoin, Dash, Monero, Verge, Zcash, and Grin from these privacy metrics. Finally, open challenges and future directions on blockchain based privacy cryptocurrencies are discussed. In the future, multi-level privacy enhancement schemes can be combined in privacy cryptocurrencies to improve privacy, performance and scalability.
隐私对金融业非常重要,对基于区块链的加密货币也是如此。比特币只能提供微弱的身份隐私。为了克服比特币在隐私方面的挑战,人们提出了一些注重隐私的加密货币,如 Dash、Monero、Zcash、Grin 和 Verge。在这些注重隐私的加密货币中,采用了私人地址、保密交易和网络匿名服务来改善隐私。我们为基于区块链的加密货币提出了四个隐私指标,即身份匿名性、交易保密性、交易不可链接性和网络匿名性。然后从这些隐私指标出发,对比特币、Dash、Monero、Verge、Zcash 和 Grin 的隐私进行比较分析。最后,讨论了基于区块链的隐私加密货币面临的挑战和未来发展方向。未来,隐私加密货币中可以结合多层次的隐私增强方案,以提高隐私、性能和可扩展性。
{"title":"Privacy Evaluation of Blockchain Based Privacy Cryptocurrencies: A Comparative Analysis of Dash, Monero, Verge, Zcash, and Grin","authors":"Tao Zhang","doi":"10.1109/TSUSC.2023.3303180","DOIUrl":"10.1109/TSUSC.2023.3303180","url":null,"abstract":"Privacy is important to financial industry, so as to blockchain based cryptocurrencies. Bitcoin can provide only weak identity privacy. To overcome privacy challenges of Bitcoin, some privacy focused cryptocurrencies are proposed, such as Dash, Monero, Zcash, Grin and Verge. Private address, confidential transaction, and network anonymization service are adopted to improve privacy in these privacy focused cryptocurrencies. We propose four privacy metrics for blockchain based cryptocurrencies as identity anonymity, transaction confidentiality, transaction unlinkability, and network anonymity. Then make a comparative analysis on privacy of Bitcoin, Dash, Monero, Verge, Zcash, and Grin from these privacy metrics. Finally, open challenges and future directions on blockchain based privacy cryptocurrencies are discussed. In the future, multi-level privacy enhancement schemes can be combined in privacy cryptocurrencies to improve privacy, performance and scalability.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"8 4","pages":"574-582"},"PeriodicalIF":3.9,"publicationDate":"2023-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81786582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on the Energy Sustainability of Early Exit Networks for Human Activity Recognition 人类活动识别早期退出网络的能源可持续性研究
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-08-08 DOI: 10.1109/TSUSC.2023.3303270
Emanuele Lattanzi;Chiara Contoli;Valerio Freschi
The design of IoT systems supporting deep learning capabilities is mainly based today on data transmission to the cloud back-end. Recently, edge computing solutions, which keep most computing and communication as close as possible to user devices have emerged as possible alternatives to reduce energy consumption, limit latency, and safeguard privacy. Early-exit models have been proposed as a way to combine models with different depths into a single architecture. The aim of this article is to investigate the energy expenditure of a distributed IoT system based on early exit architectures, by taking human activity recognition as a case study. We propose a simulation study based on an analytical model and hardware characterization to estimate the trade-off between the accuracy and energy of early exit-based configurations. Experimental results highlight nontrivial relationships between architectures, computing platforms, and communication link. For instance, we found that early-exit strategies do not ensure energy reductions with respect to a cloud-based solution if the same accuracy levels are kept; nonetheless, by tolerating a 1.5% decrease in accuracy, it is possible to achieve a reduction of around 40% of the total energy consumption.
目前,支持深度学习功能的物联网系统设计主要基于向云后端传输数据。最近,为了降低能耗、限制延迟和保护隐私,边缘计算解决方案应运而生,这种方案能让大部分计算和通信尽可能靠近用户设备。有人提出了早期退出模型,以此将不同深度的模型结合到单一架构中。本文旨在以人类活动识别为例,研究基于早期退出架构的分布式物联网系统的能耗。我们提出了一项基于分析模型和硬件特征的仿真研究,以估算基于早期退出配置的准确性和能耗之间的权衡。实验结果凸显了架构、计算平台和通信链路之间的非对称关系。例如,我们发现,与基于云的解决方案相比,如果保持相同的精度水平,提前退出策略并不能确保降低能耗;然而,通过容忍精度下降 1.5%,可以实现总能耗降低约 40%。
{"title":"A Study on the Energy Sustainability of Early Exit Networks for Human Activity Recognition","authors":"Emanuele Lattanzi;Chiara Contoli;Valerio Freschi","doi":"10.1109/TSUSC.2023.3303270","DOIUrl":"10.1109/TSUSC.2023.3303270","url":null,"abstract":"The design of IoT systems supporting deep learning capabilities is mainly based today on data transmission to the cloud back-end. Recently, edge computing solutions, which keep most computing and communication as close as possible to user devices have emerged as possible alternatives to reduce energy consumption, limit latency, and safeguard privacy. Early-exit models have been proposed as a way to combine models with different depths into a single architecture. The aim of this article is to investigate the energy expenditure of a distributed IoT system based on early exit architectures, by taking human activity recognition as a case study. We propose a simulation study based on an analytical model and hardware characterization to estimate the trade-off between the accuracy and energy of early exit-based configurations. Experimental results highlight nontrivial relationships between architectures, computing platforms, and communication link. For instance, we found that early-exit strategies do not ensure energy reductions with respect to a cloud-based solution if the same accuracy levels are kept; nonetheless, by tolerating a 1.5% decrease in accuracy, it is possible to achieve a reduction of around 40% of the total energy consumption.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 1","pages":"61-74"},"PeriodicalIF":3.9,"publicationDate":"2023-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89794687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computation Energy Efficiency Maximization for Intelligent Reflective Surface-Aided Wireless Powered Mobile Edge Computing 智能反射面辅助无线供电移动边缘计算的计算能效最大化
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-07-26 DOI: 10.1109/TSUSC.2023.3298822
Junhui Du;Minxian Xu;Sukhpal Singh Gill;Huaming Wu
A wide variety of Mobile Devices (MDs) are adopted in Internet of Things (IoT) environments, resulting in a dramatic increase in the volume of task data and greenhouse gas emissions. However, due to the limited battery power and computing resources of MD, it is critical to process more data with less energy. This article studies the Wireless Power Transfer-based Mobile Edge Computing (WPT-MEC) network system assisted by Intelligent Reflective Surface (IRS) to enhance communication performance while improving the battery life of MD. In order to maximize the Computation Energy Efficiency (CEE) of the system and reduce the carbon footprint of the MEC server, we jointly optimize the CPU frequencies of MDs and MEC server, the transmit power of Power Beacon (PB), the processing time of MEC server, the offloading time and the energy harvesting time of MDs, the local processing time and the offloading power of MD and the phase shift coefficient matrix of Intelligent Reflecting Surface (IRS). Moreover, we transform this joint optimization problem into a fractional programming problem. We then propose the Dinkelbach Iterative Algorithm with Gradient Updates (DIA-GU) to solve this problem effectively. With the help of convex optimization theory, we can obtain closed-form solutions, revealing the correlation between different variables. Compared to other algorithms, the DIA-GU algorithm not only exhibits superior performance in enhancing the system's CEE but also demonstrates significant reductions in carbon emissions.
物联网(IoT)环境中采用了各种各样的移动设备(MD),导致任务数据量和温室气体排放量急剧增加。然而,由于移动设备的电池电量和计算资源有限,如何以更少的能源处理更多的数据至关重要。本文研究了由智能反射表面(IRS)辅助的基于无线功率传输的移动边缘计算(WPT-MEC)网络系统,以提高 MD 的通信性能,同时改善其电池寿命。为了最大限度地提高系统的计算能效(CEE)并减少 MEC 服务器的碳足迹,我们联合优化了 MD 和 MEC 服务器的 CPU 频率、功率信标(PB)的发射功率、MEC 服务器的处理时间、MD 的卸载时间和能量收集时间、MD 的本地处理时间和卸载功率以及智能反射面(IRS)的相移系数矩阵。此外,我们还将这一联合优化问题转化为分数编程问题。然后,我们提出了梯度更新的丁克巴赫迭代算法(DIA-GU)来有效解决这一问题。借助凸优化理论,我们可以得到闭式解,揭示不同变量之间的相关性。与其他算法相比,DIA-GU 算法不仅在提高系统的 CEE 方面表现出色,还能显著减少碳排放。
{"title":"Computation Energy Efficiency Maximization for Intelligent Reflective Surface-Aided Wireless Powered Mobile Edge Computing","authors":"Junhui Du;Minxian Xu;Sukhpal Singh Gill;Huaming Wu","doi":"10.1109/TSUSC.2023.3298822","DOIUrl":"10.1109/TSUSC.2023.3298822","url":null,"abstract":"A wide variety of Mobile Devices (MDs) are adopted in Internet of Things (IoT) environments, resulting in a dramatic increase in the volume of task data and greenhouse gas emissions. However, due to the limited battery power and computing resources of MD, it is critical to process more data with less energy. This article studies the Wireless Power Transfer-based Mobile Edge Computing (WPT-MEC) network system assisted by Intelligent Reflective Surface (IRS) to enhance communication performance while improving the battery life of MD. In order to maximize the Computation Energy Efficiency (CEE) of the system and reduce the carbon footprint of the MEC server, we jointly optimize the CPU frequencies of MDs and MEC server, the transmit power of Power Beacon (PB), the processing time of MEC server, the offloading time and the energy harvesting time of MDs, the local processing time and the offloading power of MD and the phase shift coefficient matrix of Intelligent Reflecting Surface (IRS). Moreover, we transform this joint optimization problem into a fractional programming problem. We then propose the Dinkelbach Iterative Algorithm with Gradient Updates (DIA-GU) to solve this problem effectively. With the help of convex optimization theory, we can obtain closed-form solutions, revealing the correlation between different variables. Compared to other algorithms, the DIA-GU algorithm not only exhibits superior performance in enhancing the system's CEE but also demonstrates significant reductions in carbon emissions.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 3","pages":"371-385"},"PeriodicalIF":3.9,"publicationDate":"2023-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78245071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Sustainable Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1