首页 > 最新文献

Science China Information Sciences最新文献

英文 中文
Stability analysis and stabilization of semi-Markov jump linear systems with unavailable sojourn-time information 具有不可用停留时间信息的半马尔可夫跃迁线性系统的稳定性分析和稳定化
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-27 DOI: 10.1007/s11432-023-4065-2
Xiaotai Wu, Yang Tang, Shuai Mao, Ying Zhao

This study addresses the stability and stabilization problems of discrete-time semi-Markov jump linear systems (S-MJLSs) with unavailable sojourn-time information. The sojourn-time probability mass functions (S-TPMFs) of discrete-time semi-Markov chains are no longer confined to the geometric distribution, and it is difficult to obtain accurate and comprehensive information for S-TPMFs in practice. This is because S-TPMFs are usually deduced from the statistical characteristics according to the sampled-data, while adequate samples are often costly and time consuming. In this study, when the S-TPMFs for semi-Markov chains are assumed to be unavailable, the σ-error mean square stability is investigated for discrete-time S-MJLSs with some widely used assumptions; for semi-Markov chains, only the transition probability matrix of the embedded chain is used. In addition, the existence conditions of the effective controller are provided for closed-loop systems without using the information of S-TPMFs. Numerical examples are presented to illustrate the validity of the obtained theoretical results.

本研究解决的是不可用在途时间信息的离散时间半马尔可夫跃迁线性系统(S-MJLS)的稳定性和稳定问题。离散时间半马尔可夫链的瞬时概率质量函数(S-TPMFs)不再局限于几何分布,在实际应用中很难获得准确而全面的 S-TPMFs 信息。这是因为 S-TPMF 通常是根据采样数据的统计特征推导出来的,而充分的采样往往成本高、耗时长。在本研究中,当半马尔可夫链的 S-TPMF 假设不可用时,研究了离散时间 S-MJLS 的 σ 误差均方稳定性,并给出了一些广泛使用的假设;对于半马尔可夫链,只使用嵌入链的过渡概率矩阵。此外,在不使用 S-TPMF 信息的情况下,为闭环系统提供了有效控制器的存在条件。为说明所获理论结果的正确性,还给出了数值示例。
{"title":"Stability analysis and stabilization of semi-Markov jump linear systems with unavailable sojourn-time information","authors":"Xiaotai Wu, Yang Tang, Shuai Mao, Ying Zhao","doi":"10.1007/s11432-023-4065-2","DOIUrl":"https://doi.org/10.1007/s11432-023-4065-2","url":null,"abstract":"<p>This study addresses the stability and stabilization problems of discrete-time semi-Markov jump linear systems (S-MJLSs) with unavailable sojourn-time information. The sojourn-time probability mass functions (S-TPMFs) of discrete-time semi-Markov chains are no longer confined to the geometric distribution, and it is difficult to obtain accurate and comprehensive information for S-TPMFs in practice. This is because S-TPMFs are usually deduced from the statistical characteristics according to the sampled-data, while adequate samples are often costly and time consuming. In this study, when the S-TPMFs for semi-Markov chains are assumed to be unavailable, the <i>σ</i>-error mean square stability is investigated for discrete-time S-MJLSs with some widely used assumptions; for semi-Markov chains, only the transition probability matrix of the embedded chain is used. In addition, the existence conditions of the effective controller are provided for closed-loop systems without using the information of S-TPMFs. Numerical examples are presented to illustrate the validity of the obtained theoretical results.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"353 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141515963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prescribed time control based on the periodic delayed sliding mode surface without singularities 基于无奇异点周期性延迟滑模面的规定时间控制
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-27 DOI: 10.1007/s11432-023-4052-4
Bin Zhou, Yi Ding, Kang-Kang Zhang, Guang-Ren Duan

In this paper, nonsingular prescribed-time control is studied based on periodic delayed sliding mode surfaces. Different from the existing sliding mode control, where either singularity problems may appear or the convergence time depends on the initial state, the proposed sliding mode control approaches can achieve prescribed-time convergence without singularity. The proposed nonsingular sliding mode control approaches can be applied to both second-order and high-order nonlinear systems with prescribed-time convergence. As applications of the proposed sliding mode control approaches, the control of hypersonic vehicle systems is revisited. Numerical simulations on the nonlinear model of the hypersonic vehicle system show the effectiveness of the proposed methods.

本文研究了基于周期性延迟滑模曲面的非奇异规定时间控制。与现有的滑模控制可能出现奇异性问题或收敛时间取决于初始状态不同,本文提出的滑模控制方法可以实现无奇异性的规定时间收敛。所提出的非奇异滑模控制方法既可用于二阶非线性系统,也可用于高阶非线性系统,并具有规定时间收敛性。作为所提滑模控制方法的应用,我们重新探讨了高超音速飞行器系统的控制问题。对高超音速飞行器系统非线性模型的数值模拟显示了所提方法的有效性。
{"title":"Prescribed time control based on the periodic delayed sliding mode surface without singularities","authors":"Bin Zhou, Yi Ding, Kang-Kang Zhang, Guang-Ren Duan","doi":"10.1007/s11432-023-4052-4","DOIUrl":"https://doi.org/10.1007/s11432-023-4052-4","url":null,"abstract":"<p>In this paper, nonsingular prescribed-time control is studied based on periodic delayed sliding mode surfaces. Different from the existing sliding mode control, where either singularity problems may appear or the convergence time depends on the initial state, the proposed sliding mode control approaches can achieve prescribed-time convergence without singularity. The proposed nonsingular sliding mode control approaches can be applied to both second-order and high-order nonlinear systems with prescribed-time convergence. As applications of the proposed sliding mode control approaches, the control of hypersonic vehicle systems is revisited. Numerical simulations on the nonlinear model of the hypersonic vehicle system show the effectiveness of the proposed methods.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"12 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141515957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel modeling for MI-based wireless underground sensor networks with conductive objects 基于 MI 的导电物体地下无线传感器网络的信道建模
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-27 DOI: 10.1007/s11432-023-4024-2
Shuhan Deng, Guanghua Liu, Ziwei Chen, Huaijin Zhang, Tao Jiang

We develop a comprehensive and accurate channel model forMI-WUSNs by taking into account the impact of multiple conductive objects located in different positions. The mathematical expressions for mutual inductance and received power are rigorously derived for each case. Extensive experimental results have verified our theory. Hence, this paper provides a solid foundation for subsequent system design for MI-WUSNs.

考虑到位于不同位置的多个导电物体的影响,我们为MI-WUSN 建立了一个全面而精确的信道模型。针对每种情况,我们都严格推导出了互感和接收功率的数学表达式。大量实验结果验证了我们的理论。因此,本文为后续的 MI-WUSN 系统设计奠定了坚实的基础。
{"title":"Channel modeling for MI-based wireless underground sensor networks with conductive objects","authors":"Shuhan Deng, Guanghua Liu, Ziwei Chen, Huaijin Zhang, Tao Jiang","doi":"10.1007/s11432-023-4024-2","DOIUrl":"https://doi.org/10.1007/s11432-023-4024-2","url":null,"abstract":"<p>We develop a comprehensive and accurate channel model forMI-WUSNs by taking into account the impact of multiple conductive objects located in different positions. The mathematical expressions for mutual inductance and received power are rigorously derived for each case. Extensive experimental results have verified our theory. Hence, this paper provides a solid foundation for subsequent system design for MI-WUSNs.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"1 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141515959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scenarios analysis and performance assessment of blockchain integrated in 6G scenarios 区块链融入 6G 场景的场景分析和性能评估
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-27 DOI: 10.1007/s11432-023-4054-5
Bo Li, Guanjie Cheng, Honghao Gao, Xueqiang Yan, Shuiguang Deng

Emerging applications such as smart city infrastructures and virtual reality landscapes are setting rigorous benchmarks for 6G mobile networks, requiring elevated levels of confidentiality, integrity, non-repudiation, authentication, and stringent access controls. Blockchain technology is heralded as a transformative enabler for meeting 6G standards, owing to its intrinsic attributes. However, a gap exists in the holistic investigation of blockchain’s applicability in 6G realms, particularly addressing the “whether”, “when”, and “how” of its deployment. Present research trails in developing robust methodologies to gauge blockchain’s efficacy within 6G use cases. Addressing this, our study introduces a novel confluence of blockchain with 6G networks, where data resides in distributed Hash tables (DHTs) while their hashes are secured in distributed ledger technology (DLT), harnessing blockchain’s core strengths-immutability, traceability, and fortified security. We delineate seven specific 6G use cases poised for enhancement through blockchain integration, and scrutinize the rationale, nature, and timing of this convergence. Furthermore, we devise a comprehensive methodology for assessing blockchain’s performance metrics and scalability in 6G environments. Our extensive experimental analyses evaluate the synergistic performance of this integration, revealing that the Quorum blockchain satisfactorily supports 80% of 6G scenarios. The findings suggest that, with appropriate configurations, consortium blockchains are well-equipped to fulfill the demanding performance and scalability requisites of 6G networks.

智能城市基础设施和虚拟现实景观等新兴应用为 6G 移动网络设定了严格的基准,要求提高保密性、完整性、不可抵赖性、身份验证和严格的访问控制水平。区块链技术因其固有属性,被誉为满足 6G 标准的变革推动者。然而,在全面研究区块链在 6G 领域的适用性方面存在差距,特别是在解决 "是否"、"何时 "和 "如何 "部署区块链方面。目前的研究正在开发稳健的方法来衡量区块链在 6G 使用案例中的功效。为了解决这个问题,我们的研究引入了区块链与 6G 网络的新融合,数据驻留在分布式哈希表(DHT)中,而其哈希值则在分布式账本技术(DLT)中得到保护,从而利用了区块链的核心优势--不变性、可追溯性和强化安全性。我们划分了七个具体的 6G 用例,这些用例有望通过区块链整合得到增强,我们还仔细研究了这种融合的原理、性质和时机。此外,我们还设计了一种全面的方法来评估区块链在 6G 环境中的性能指标和可扩展性。我们进行了大量实验分析,评估了这种融合的协同性能,结果表明 Quorum 区块链能够令人满意地支持 80% 的 6G 场景。研究结果表明,通过适当的配置,联盟区块链完全有能力满足 6G 网络对性能和可扩展性的苛刻要求。
{"title":"Scenarios analysis and performance assessment of blockchain integrated in 6G scenarios","authors":"Bo Li, Guanjie Cheng, Honghao Gao, Xueqiang Yan, Shuiguang Deng","doi":"10.1007/s11432-023-4054-5","DOIUrl":"https://doi.org/10.1007/s11432-023-4054-5","url":null,"abstract":"<p>Emerging applications such as smart city infrastructures and virtual reality landscapes are setting rigorous benchmarks for 6G mobile networks, requiring elevated levels of confidentiality, integrity, non-repudiation, authentication, and stringent access controls. Blockchain technology is heralded as a transformative enabler for meeting 6G standards, owing to its intrinsic attributes. However, a gap exists in the holistic investigation of blockchain’s applicability in 6G realms, particularly addressing the “whether”, “when”, and “how” of its deployment. Present research trails in developing robust methodologies to gauge blockchain’s efficacy within 6G use cases. Addressing this, our study introduces a novel confluence of blockchain with 6G networks, where data resides in distributed Hash tables (DHTs) while their hashes are secured in distributed ledger technology (DLT), harnessing blockchain’s core strengths-immutability, traceability, and fortified security. We delineate seven specific 6G use cases poised for enhancement through blockchain integration, and scrutinize the rationale, nature, and timing of this convergence. Furthermore, we devise a comprehensive methodology for assessing blockchain’s performance metrics and scalability in 6G environments. Our extensive experimental analyses evaluate the synergistic performance of this integration, revealing that the Quorum blockchain satisfactorily supports 80% of 6G scenarios. The findings suggest that, with appropriate configurations, consortium blockchains are well-equipped to fulfill the demanding performance and scalability requisites of 6G networks.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"14 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141515961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of double protograph LDPC codes based JSCC systems via the ACE-PEG algorithm 通过 ACE-PEG 算法设计基于双原图 LDPC 码的 JSCC 系统
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-27 DOI: 10.1007/s11432-024-4074-y
Yijie Lv, Jiguang He, Shaohua Hong

In this work, a novel design method of DP-LDPC codes for the JSCC system via the ACE-PEG algorithm has been proposed. The designed base matrix contains more higher-degree VNs than the conventional ones, and thus increases the amount of message between the cycles and/or stopping sets and the remaining part of the Tanner graph via the ACE-PEG algorithm. Simulation results have demonstrated that the proposed design approach of DP-LDPC codes obtains significant performance enhancement in both waterfall and error-floor regions compared to the selected benchmark schemes from the latest literature.

本研究提出了一种通过 ACE-PEG 算法为 JSCC 系统设计 DP-LDPC 码的新方法。与传统的基矩阵相比,设计的基矩阵包含更多的高阶 VN,从而通过 ACE-PEG 算法增加了循环集和/或停止集与 Tanner 图剩余部分之间的信息量。仿真结果表明,与最新文献中选定的基准方案相比,所提出的 DP-LDPC 代码设计方法在瀑布区和误差底限区都获得了显著的性能提升。
{"title":"Design of double protograph LDPC codes based JSCC systems via the ACE-PEG algorithm","authors":"Yijie Lv, Jiguang He, Shaohua Hong","doi":"10.1007/s11432-024-4074-y","DOIUrl":"https://doi.org/10.1007/s11432-024-4074-y","url":null,"abstract":"<p>In this work, a novel design method of DP-LDPC codes for the JSCC system via the ACE-PEG algorithm has been proposed. The designed base matrix contains more higher-degree VNs than the conventional ones, and thus increases the amount of message between the cycles and/or stopping sets and the remaining part of the Tanner graph via the ACE-PEG algorithm. Simulation results have demonstrated that the proposed design approach of DP-LDPC codes obtains significant performance enhancement in both waterfall and error-floor regions compared to the selected benchmark schemes from the latest literature.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"30 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141515960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive 5G-and-beyond network-enabled interpretable federated learning enhanced by neuroevolution 通过神经进化增强自适应 5G 及以上网络支持的可解释联合学习
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-27 DOI: 10.1007/s11432-023-4011-4
Bin Cao, Jianwei Zhao, Xin Liu, Yun Li

Mobile telemedicine systems based on the next-generation communication will significantly enhance deep fusion of network automation and federated learning (FL), but data privacy is a paramount issue in sectors like healthcare. This work hence considers FL augments 5G-and-beyond networks by training deep learning (DL) models without the need to exchange raw data. The substantial communication loads imposed on by extensive parameters involved in DL models are managed through adaptive scheduling mechanisms effectively. To address the opaque nature of DL models and to improve the interpretability of FL models, we introduce a convolutional fuzzy rough neural network specifically designed for medical image processing. We also develop a multiobjective memetic evolutionary algorithm to streamline and optimize the neural network architectures. Our comprehensive FL framework integrates smart scheduling, interpretable fuzzy rough logic, and neuroevolution. This framework is shown to improve communication efficiency, increase interpretability of diagnosis with protected privacy, and generate low-complexity neural architectures.

基于下一代通信的移动远程医疗系统将大大增强网络自动化和联合学习(FL)的深度融合,但数据隐私是医疗保健等行业的首要问题。因此,这项工作考虑通过训练深度学习(DL)模型来增强 5G 及以后的网络,而无需交换原始数据。通过自适应调度机制有效管理 DL 模型中涉及的大量参数所带来的大量通信负载。为了解决 DL 模型的不透明性并提高 FL 模型的可解释性,我们引入了一种专为医学图像处理设计的卷积模糊粗糙神经网络。我们还开发了一种多目标记忆进化算法来简化和优化神经网络架构。我们的综合 FL 框架集成了智能调度、可解释模糊粗糙逻辑和神经进化。结果表明,该框架能提高通信效率,在保护隐私的前提下提高诊断的可解释性,并生成低复杂度的神经架构。
{"title":"Adaptive 5G-and-beyond network-enabled interpretable federated learning enhanced by neuroevolution","authors":"Bin Cao, Jianwei Zhao, Xin Liu, Yun Li","doi":"10.1007/s11432-023-4011-4","DOIUrl":"https://doi.org/10.1007/s11432-023-4011-4","url":null,"abstract":"<p>Mobile telemedicine systems based on the next-generation communication will significantly enhance deep fusion of network automation and federated learning (FL), but data privacy is a paramount issue in sectors like healthcare. This work hence considers FL augments 5G-and-beyond networks by training deep learning (DL) models without the need to exchange raw data. The substantial communication loads imposed on by extensive parameters involved in DL models are managed through adaptive scheduling mechanisms effectively. To address the opaque nature of DL models and to improve the interpretability of FL models, we introduce a convolutional fuzzy rough neural network specifically designed for medical image processing. We also develop a multiobjective memetic evolutionary algorithm to streamline and optimize the neural network architectures. Our comprehensive FL framework integrates smart scheduling, interpretable fuzzy rough logic, and neuroevolution. This framework is shown to improve communication efficiency, increase interpretability of diagnosis with protected privacy, and generate low-complexity neural architectures.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"3 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141515962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XRL-SHAP-Cache: an explainable reinforcement learning approach for intelligent edge service caching in content delivery networks XRL-SHAP-Cache:用于内容交付网络中智能边缘服务缓存的可解释强化学习方法
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-27 DOI: 10.1007/s11432-023-3987-y
Xiaolong Xu, Fan Wu, Muhammad Bilal, Xiaoyu Xia, Wanchun Dou, Lina Yao, Weiyi Zhong

Content delivery networks (CDNs) play a pivotal role in the modern internet infrastructure by enabling efficient content delivery across diverse geographical regions. As an essential component of CDNs, the edge caching scheme directly influences the user experience by determining the caching and eviction of content on edge servers. With the emergence of 5G technology, traditional caching schemes have faced challenges in adapting to increasingly complex and dynamic network environments. Consequently, deep reinforcement learning (DRL) offers a promising solution for intelligent zero-touch network governance. However, the black-box nature of DRL models poses challenges in understanding and making trusting decisions. In this paper, we propose an explainable reinforcement learning (XRL)-based intelligent edge service caching approach, namely XRL-SHAP-Cache, which combines DRL with an explainable artificial intelligence (XAI) technique for cache management in CDNs. Instead of focusing solely on achieving performance gains, this study introduces a novel paradigm for providing interpretable caching strategies, thereby establishing a foundation for future transparent and trustworthy edge caching solutions. Specifically, a multi-level cache scheduling framework for CDNs was formulated theoretically, with the D3QN-based caching scheme serving as the targeted interpretable model. Subsequently, by integrating Deep-SHAP into our framework, the contribution of each state input feature to the agent’s Q-value output was calculated, thereby providing valuable insights into the decision-making process. The proposed XRL-SHAP-Cache approach was evaluated through extensive experiments to demonstrate the behavior of the scheduling agent in the face of different environmental inputs. The results demonstrate its strong explainability under various real-life scenarios while maintaining superior performance compared to traditional caching schemes in terms of cache hit ratio, quality of service (QoS), and space utilization.

内容分发网络(CDN)可在不同地理区域高效分发内容,在现代互联网基础设施中发挥着举足轻重的作用。作为 CDN 的重要组成部分,边缘缓存方案通过决定边缘服务器上内容的缓存和驱逐,直接影响用户体验。随着 5G 技术的出现,传统缓存方案在适应日益复杂多变的网络环境方面面临挑战。因此,深度强化学习(DRL)为智能零接触网络治理提供了一种前景广阔的解决方案。然而,DRL 模型的黑箱性质给理解和做出信任决策带来了挑战。在本文中,我们提出了一种基于可解释强化学习(XRL)的智能边缘服务缓存方法,即 XRL-SHAP-Cache,它将 DRL 与可解释人工智能(XAI)技术相结合,用于 CDN 中的缓存管理。本研究不仅关注性能提升,还引入了一种提供可解释缓存策略的新模式,从而为未来透明、可信的边缘缓存解决方案奠定了基础。具体来说,本研究从理论上提出了一个 CDN 多级缓存调度框架,并将基于 D3QN 的缓存方案作为目标可解释模型。随后,通过将 Deep-SHAP 集成到我们的框架中,计算了每个状态输入特征对代理 Q 值输出的贡献,从而为决策过程提供了有价值的见解。我们通过大量实验对所提出的 XRL-SHAP-Cache 方法进行了评估,以展示调度代理在面对不同环境输入时的行为。结果表明,与传统缓存方案相比,XRL-SHAP-Cache 在缓存命中率、服务质量(QoS)和空间利用率方面都保持了卓越的性能,同时在各种现实生活场景下都具有很强的可解释性。
{"title":"XRL-SHAP-Cache: an explainable reinforcement learning approach for intelligent edge service caching in content delivery networks","authors":"Xiaolong Xu, Fan Wu, Muhammad Bilal, Xiaoyu Xia, Wanchun Dou, Lina Yao, Weiyi Zhong","doi":"10.1007/s11432-023-3987-y","DOIUrl":"https://doi.org/10.1007/s11432-023-3987-y","url":null,"abstract":"<p>Content delivery networks (CDNs) play a pivotal role in the modern internet infrastructure by enabling efficient content delivery across diverse geographical regions. As an essential component of CDNs, the edge caching scheme directly influences the user experience by determining the caching and eviction of content on edge servers. With the emergence of 5G technology, traditional caching schemes have faced challenges in adapting to increasingly complex and dynamic network environments. Consequently, deep reinforcement learning (DRL) offers a promising solution for intelligent zero-touch network governance. However, the black-box nature of DRL models poses challenges in understanding and making trusting decisions. In this paper, we propose an explainable reinforcement learning (XRL)-based intelligent edge service caching approach, namely XRL-SHAP-Cache, which combines DRL with an explainable artificial intelligence (XAI) technique for cache management in CDNs. Instead of focusing solely on achieving performance gains, this study introduces a novel paradigm for providing interpretable caching strategies, thereby establishing a foundation for future transparent and trustworthy edge caching solutions. Specifically, a multi-level cache scheduling framework for CDNs was formulated theoretically, with the D3QN-based caching scheme serving as the targeted interpretable model. Subsequently, by integrating Deep-SHAP into our framework, the contribution of each state input feature to the agent’s Q-value output was calculated, thereby providing valuable insights into the decision-making process. The proposed XRL-SHAP-Cache approach was evaluated through extensive experiments to demonstrate the behavior of the scheduling agent in the face of different environmental inputs. The results demonstrate its strong explainability under various real-life scenarios while maintaining superior performance compared to traditional caching schemes in terms of cache hit ratio, quality of service (QoS), and space utilization.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"25 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141502709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ControlService: a containerized solution for control-algorithm-as-a-service in cloud control systems ControlService:云控制系统中控制算法即服务的容器化解决方案
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-27 DOI: 10.1007/s11432-023-4017-0
Chenggang Shan, Runze Gao, Zhen Yang, Wei Zhang, Yuanqing Xia

As an extension of networked control systems, cloud control systems (CCSs) have emerged as a new control paradigm to improve the service quality of emerging control missions, such as data-driven modeling and automated vehicles. Existing studies have used the workflow-based restructured method to optimize the computation-intensive algorithms in the CCSs. However, the challenges here are how to define and submit these algorithms’ workflows as cloud services and execute these algorithms’ workflows in a containerized manner. Based on these challenges, we propose a containerized solution for the control-algorithm-as-a-service (C3aS) in the CCSs, namely ControlService. It offers the control algorithm as a cloud workflow service and uses a customized workflow engine to realize the containerized execution. First, we employ a cloud workflow representation method to define a control algorithm into an abstract cloud workflow form. Afterward, we provide a cloud service representation of the abstract cloud workflow. Next, we design a workflow engine and submit the cloud service to this workflow engine to implement containerized execution of this cloud service in the CCSs. In the experiment, we discuss the cloud service form and containerized implementation of the subspace identification method. Experimental results show that the proposed ControlService has significant performance advantages in computational time, reduction percentage, and speedup ratio compared with the baseline method.

作为网络化控制系统的延伸,云控制系统(CCS)已成为一种新的控制范式,可提高数据驱动建模和自动驾驶汽车等新兴控制任务的服务质量。现有研究采用基于工作流的重组方法来优化 CCS 中的计算密集型算法。然而,如何将这些算法的工作流定义为云服务并提交,以及如何以容器化的方式执行这些算法的工作流是我们面临的挑战。基于这些挑战,我们提出了一种用于 CCS 中控制算法即服务(C3aS)的容器化解决方案,即 ControlService。它将控制算法作为云工作流服务提供,并使用定制的工作流引擎实现容器化执行。首先,我们采用云工作流表示方法,将控制算法定义为抽象的云工作流形式。然后,我们提供了抽象云工作流的云服务表示。接着,我们设计了一个工作流引擎,并将云服务提交给该工作流引擎,以实现该云服务在 CCS 中的容器化执行。在实验中,我们讨论了子空间识别方法的云服务形式和容器化执行。实验结果表明,与基线方法相比,所提出的 ControlService 在计算时间、减少百分比和加速比方面都具有显著的性能优势。
{"title":"ControlService: a containerized solution for control-algorithm-as-a-service in cloud control systems","authors":"Chenggang Shan, Runze Gao, Zhen Yang, Wei Zhang, Yuanqing Xia","doi":"10.1007/s11432-023-4017-0","DOIUrl":"https://doi.org/10.1007/s11432-023-4017-0","url":null,"abstract":"<p>As an extension of networked control systems, cloud control systems (CCSs) have emerged as a new control paradigm to improve the service quality of emerging control missions, such as data-driven modeling and automated vehicles. Existing studies have used the workflow-based restructured method to optimize the computation-intensive algorithms in the CCSs. However, the challenges here are how to define and submit these algorithms’ workflows as cloud services and execute these algorithms’ workflows in a containerized manner. Based on these challenges, we propose a containerized solution for the control-algorithm-as-a-service (C3aS) in the CCSs, namely ControlService. It offers the control algorithm as a cloud workflow service and uses a customized workflow engine to realize the containerized execution. First, we employ a cloud workflow representation method to define a control algorithm into an abstract cloud workflow form. Afterward, we provide a cloud service representation of the abstract cloud workflow. Next, we design a workflow engine and submit the cloud service to this workflow engine to implement containerized execution of this cloud service in the CCSs. In the experiment, we discuss the cloud service form and containerized implementation of the subspace identification method. Experimental results show that the proposed ControlService has significant performance advantages in computational time, reduction percentage, and speedup ratio compared with the baseline method.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"1 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141515964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed generalized Nash equilibrium seeking: event-triggered coding-decoding-based secure communication 分布式广义纳什均衡寻求:基于事件触发的编码-解码安全通信
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-27 DOI: 10.1007/s11432-023-4009-4
Shaofu Yang, Wenying Xu, Wangli He, Jinde Cao

In this paper, we consider the distributed generalized Nash equilibrium (GNE) seeking problem in strongly monotone games. The transmission among players is implemented through a digital communication network with limited bandwidth. For improving communication efficiency or/and security, an event-triggered coding-decoding-based communication is first proposed, where the data (decision variable) are first mapped to a series of finite-level codewords and, only when an event condition is satisfied, then sent to the neighboring agents. Moreover, a distributed communication-efficient GNE seeking algorithm is constructed accordingly, and the overrelaxation scheme is further taken into consideration. Through primal-dual analysis, the proposed algorithm is proven to converge to a variational GNE with fixed step-sizes by recasting it as an inexact forward-backward iteration. Finally, numerical simulations illustrate the benefit of the proposed algorithms in terms of saving communication resources.

本文考虑的是强单调博弈中的分布式广义纳什均衡(GNE)寻求问题。博弈者之间的传输是通过带宽有限的数字通信网络实现的。为了提高通信效率或/和安全性,我们首先提出了一种基于事件触发的编码-解码通信,即首先将数据(决策变量)映射到一系列有限级编码词,只有当事件条件满足时,才将数据发送给相邻的代理。此外,还相应地构建了一种分布式通信高效 GNE 寻优算法,并进一步考虑了过度松弛方案。通过基元-二元分析,证明了所提出的算法通过将其重铸为不精确的前向-后向迭代,可以收敛到具有固定步长的变分 GNE。最后,数值模拟说明了所提算法在节省通信资源方面的优势。
{"title":"Distributed generalized Nash equilibrium seeking: event-triggered coding-decoding-based secure communication","authors":"Shaofu Yang, Wenying Xu, Wangli He, Jinde Cao","doi":"10.1007/s11432-023-4009-4","DOIUrl":"https://doi.org/10.1007/s11432-023-4009-4","url":null,"abstract":"<p>In this paper, we consider the distributed generalized Nash equilibrium (GNE) seeking problem in strongly monotone games. The transmission among players is implemented through a digital communication network with limited bandwidth. For improving communication efficiency or/and security, an event-triggered coding-decoding-based communication is first proposed, where the data (decision variable) are first mapped to a series of finite-level codewords and, only when an event condition is satisfied, then sent to the neighboring agents. Moreover, a distributed communication-efficient GNE seeking algorithm is constructed accordingly, and the overrelaxation scheme is further taken into consideration. Through primal-dual analysis, the proposed algorithm is proven to converge to a variational GNE with fixed step-sizes by recasting it as an inexact forward-backward iteration. Finally, numerical simulations illustrate the benefit of the proposed algorithms in terms of saving communication resources.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"36 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141530881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Path signature-based XAI-enabled network time series classification 基于路径特征的 XAI 网络时间序列分类
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-27 DOI: 10.1007/s11432-023-3978-y
Le Sun, Yueyuan Wang, Yongjun Ren, Feng Xia

Classifying network time series (NTS) is crucial for automating network administration and ensuring cyberspace security. It enables the detection of anomalies, the identification of network attacks, and the monitoring of performance issues, thereby providing valuable support for network protection and optimization. However, modern communication networks pose challenges for NTS classification methods. These include handling large-scale and complex NTS data, extracting features from intricate datasets, and addressing explainability requirements. These challenges are particularly pronounced for complex 5G networks. Notably, explainability has become crucial for the widespread deployment of network automation for 5G networks and beyond. To tackle these challenges, we propose a path-signature-based NTS classification model called recurrent signature (RecurSig). This innovative model is designed to overcome the time-consuming feature selection problem by utilizing deep-learning (DL) techniques. Additionally, it provides a solution for addressing the black-box issue associated with DL models in network automation systems (NAS) by incorporating an explainable classification approach. Extensive experimentation on various public datasets demonstrates that RecurSig outperforms existing models in accuracy and explainability. The results indicate its potential for application in cyberspace security and automated network management, offering an explainable solution for network protection and optimization.

网络时间序列(NTS)分类对于实现网络管理自动化和确保网络空间安全至关重要。它可以检测异常情况、识别网络攻击和监控性能问题,从而为网络保护和优化提供有价值的支持。然而,现代通信网络对 NTS 分类方法提出了挑战。这些挑战包括处理大规模复杂的 NTS 数据、从错综复杂的数据集中提取特征以及满足可解释性要求。这些挑战在复杂的 5G 网络中尤为突出。值得注意的是,可解释性已成为广泛部署 5G 网络及其他网络自动化的关键。为了应对这些挑战,我们提出了一种基于路径签名的 NTS 分类模型,称为循环签名(RecurSig)。这一创新模型旨在利用深度学习(DL)技术克服耗时的特征选择问题。此外,它还通过采用可解释的分类方法,为解决网络自动化系统(NAS)中与 DL 模型相关的黑箱问题提供了解决方案。在各种公共数据集上进行的广泛实验表明,RecurSig 在准确性和可解释性方面都优于现有模型。实验结果表明,RecurSig 有潜力应用于网络空间安全和自动化网络管理,为网络保护和优化提供可解释的解决方案。
{"title":"Path signature-based XAI-enabled network time series classification","authors":"Le Sun, Yueyuan Wang, Yongjun Ren, Feng Xia","doi":"10.1007/s11432-023-3978-y","DOIUrl":"https://doi.org/10.1007/s11432-023-3978-y","url":null,"abstract":"<p>Classifying network time series (NTS) is crucial for automating network administration and ensuring cyberspace security. It enables the detection of anomalies, the identification of network attacks, and the monitoring of performance issues, thereby providing valuable support for network protection and optimization. However, modern communication networks pose challenges for NTS classification methods. These include handling large-scale and complex NTS data, extracting features from intricate datasets, and addressing explainability requirements. These challenges are particularly pronounced for complex 5G networks. Notably, explainability has become crucial for the widespread deployment of network automation for 5G networks and beyond. To tackle these challenges, we propose a path-signature-based NTS classification model called recurrent signature (RecurSig). This innovative model is designed to overcome the time-consuming feature selection problem by utilizing deep-learning (DL) techniques. Additionally, it provides a solution for addressing the black-box issue associated with DL models in network automation systems (NAS) by incorporating an explainable classification approach. Extensive experimentation on various public datasets demonstrates that RecurSig outperforms existing models in accuracy and explainability. The results indicate its potential for application in cyberspace security and automated network management, offering an explainable solution for network protection and optimization.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"81 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141515956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Science China Information Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1