首页 > 最新文献

IET Communications最新文献

英文 中文
Research on weighted energy consumption and delay optimization algorithm based on dual-queue model 基于双队列模型的加权能耗和延迟优化算法研究
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-12-25 DOI: 10.1049/cmu2.12710
Ling Tan, Lei Sun, Boyuan Cao, Jingming Xia, Hai Xu

This article investigates a mobile edge computing (MEC) network assisted by multiple unmanned aerial vehicles (UAVs) to address the computational and offloading requirements for mobile intelligent terminals (MITs) within crowded venues. The objective is to tackle intricate task processing and diminish MITs' waiting times. Considering the randomness of task arrival at the MITs and the imbalance between the amount of data and computation for complex tasks, a dual-queue model with data cache queue and computation queue is proposed, with minimizing the weighted system total energy consumption and average delay as the optimization objectives. Lyapunov optimization theory is employed to convert the stochastic optimization problem into a deterministic one, and the initial deployment quantity and hovering position of the UAVs are determined by the density-based spatial clustering of applications with noise (DBSCAN) method with noise. Then PPO algorithm for MIT task, resource allocation, and UAV trajectory optimization. Numerical results display the proposed scheme can efficaciously diminish energy consumption and delay by 10% and 33% respectively, compared with the baseline scheme. This paper proposes a practical and feasible solution for stochastic computing offloading in UAV-assisted MEC, which fills the gap in existing research on regarding the consideration of complex task imbalances.

本文研究了由多架无人飞行器(UAV)辅助的移动边缘计算(MEC)网络,以满足拥挤场所内移动智能终端(MIT)的计算和卸载需求。其目标是处理复杂的任务并缩短移动智能终端的等待时间。考虑到任务到达 MIT 的随机性以及复杂任务的数据量和计算量之间的不平衡,提出了一个包含数据缓存队列和计算队列的双队列模型,并以最小化加权系统总能耗和平均延迟为优化目标。利用李亚普诺夫优化理论将随机优化问题转化为确定优化问题,并通过带噪声的基于密度的应用空间聚类(DBSCAN)方法确定无人机的初始部署数量和悬停位置。然后采用 PPO 算法进行 MIT 任务、资源分配和无人机轨迹优化。数值结果表明,与基线方案相比,所提出的方案能有效减少 10%的能耗和 33%的延迟。本文为无人机辅助飞行任务控制(MEC)中的随机计算卸载提出了一种切实可行的解决方案,填补了现有研究在考虑复杂任务不平衡方面的空白。
{"title":"Research on weighted energy consumption and delay optimization algorithm based on dual-queue model","authors":"Ling Tan,&nbsp;Lei Sun,&nbsp;Boyuan Cao,&nbsp;Jingming Xia,&nbsp;Hai Xu","doi":"10.1049/cmu2.12710","DOIUrl":"10.1049/cmu2.12710","url":null,"abstract":"<p>This article investigates a mobile edge computing (MEC) network assisted by multiple unmanned aerial vehicles (UAVs) to address the computational and offloading requirements for mobile intelligent terminals (MITs) within crowded venues. The objective is to tackle intricate task processing and diminish MITs' waiting times. Considering the randomness of task arrival at the MITs and the imbalance between the amount of data and computation for complex tasks, a dual-queue model with data cache queue and computation queue is proposed, with minimizing the weighted system total energy consumption and average delay as the optimization objectives. Lyapunov optimization theory is employed to convert the stochastic optimization problem into a deterministic one, and the initial deployment quantity and hovering position of the UAVs are determined by the density-based spatial clustering of applications with noise (DBSCAN) method with noise. Then PPO algorithm for MIT task, resource allocation, and UAV trajectory optimization. Numerical results display the proposed scheme can efficaciously diminish energy consumption and delay by 10% and 33% respectively, compared with the baseline scheme. This paper proposes a practical and feasible solution for stochastic computing offloading in UAV-assisted MEC, which fills the gap in existing research on regarding the consideration of complex task imbalances.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 1","pages":"81-95"},"PeriodicalIF":1.6,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12710","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139159701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical adversarial attack in artificial intelligence of things 人工智能中的物理对抗攻击
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-12-22 DOI: 10.1049/cmu2.12714
Xin Ma, Kai Yang, Chuanzhen Zhang, Hualing Li, Xin Zheng

With the continuous development of wireless communication and artificial intelligence technology, Internet of Things (IoT) technology has made great progress. Deep learning methods are currently used in IoT technology, but deep neural networks (DNNs) are notoriously susceptible to adversarial examples, and subtle pixel changes to images can result in incorrect recognition results from DNNs. In the real-world application, the patches generated by the recent physical attack methods are larger or less realistic and easily detectable. To address this problem, a Generative Adversarial Network based on Visual attention model and Style transfer network (GAN-VS) is proposed, which reduces the patch area and makes the patch more natural and less noticeable. A visual attention model combined with generative adversarial network is introduced to detect the critical regions of image recognition, and only generate patches within the critical regions to reduce patch area and improve attack efficiency. For any type of seed patch, an adversarial patch can be generated with a high degree of stylistic and content similarity to the attacked image by generative adversarial network and style transfer network. Experimental evaluation shows that the proposed GAN-VS has good camouflage and outperforms state-of-the-art adversarial patch attack methods.

随着无线通信和人工智能技术的不断发展,物联网(IoT)技术取得了长足的进步。目前,深度学习方法被应用于物联网技术中,但深度神经网络(DNN)很容易受到对抗性实例的影响,图像细微的像素变化会导致 DNN 的识别结果不正确。在实际应用中,最近的物理攻击方法生成的补丁较大或不太真实,容易被检测到。为解决这一问题,我们提出了一种基于视觉注意力模型和风格转移网络(GAN-VS)的生成对抗网络(Generative Adversarial Network),它可以减少补丁面积,使补丁更自然、更不容易被察觉。它引入了视觉注意力模型和生成式对抗网络,以检测图像识别的关键区域,并只在关键区域内生成补丁,从而减少补丁面积,提高攻击效率。对于任何类型的种子补丁,生成式对抗网络和风格转移网络都能生成与被攻击图像在风格和内容上高度相似的对抗补丁。实验评估表明,所提出的 GAN-VS 具有良好的伪装性,优于最先进的对抗补丁攻击方法。
{"title":"Physical adversarial attack in artificial intelligence of things","authors":"Xin Ma,&nbsp;Kai Yang,&nbsp;Chuanzhen Zhang,&nbsp;Hualing Li,&nbsp;Xin Zheng","doi":"10.1049/cmu2.12714","DOIUrl":"10.1049/cmu2.12714","url":null,"abstract":"<p>With the continuous development of wireless communication and artificial intelligence technology, Internet of Things (IoT) technology has made great progress. Deep learning methods are currently used in IoT technology, but deep neural networks (DNNs) are notoriously susceptible to adversarial examples, and subtle pixel changes to images can result in incorrect recognition results from DNNs. In the real-world application, the patches generated by the recent physical attack methods are larger or less realistic and easily detectable. To address this problem, a Generative Adversarial Network based on Visual attention model and Style transfer network (GAN-VS) is proposed, which reduces the patch area and makes the patch more natural and less noticeable. A visual attention model combined with generative adversarial network is introduced to detect the critical regions of image recognition, and only generate patches within the critical regions to reduce patch area and improve attack efficiency. For any type of seed patch, an adversarial patch can be generated with a high degree of stylistic and content similarity to the attacked image by generative adversarial network and style transfer network. Experimental evaluation shows that the proposed GAN-VS has good camouflage and outperforms state-of-the-art adversarial patch attack methods.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 6","pages":"375-385"},"PeriodicalIF":1.6,"publicationDate":"2023-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12714","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139166048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid traffic scheduling in time-sensitive networking for the support of automotive applications 支持汽车应用的时敏网络混合流量调度
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-12-21 DOI: 10.1049/cmu2.12713
Hongrui Nie, Yue Su, Weibo Zhao, Junsheng Mu

Time-sensitive networking (TSN) is considered one of the most promising solutions to address real-time scheduling in in-vehicle network due to its capabilities for providing deterministic service. The TSN working group proposed various traffic shaping mechanisms, while deterministic scheduling of hybrid traffic is still not effectively solved since the traffic requirements are difficult to satisfy by standalone or combined mechanisms with fixed time slot divisions. This article presents a time-aware multi-cyclicqueuing and forwarding scheduling model, that integrates the no-wait enabled time-aware shaper and multi-cyclic queuing and forwarding shaping models. Then, a scheduling solution, dubbed “TSN scheduling optimizer” (TSO) is proposed that combines optimization methods and incremental techniques. TSO aims to balance the load to maximize flow schedulability while guaranteeing the service requirements of hybrid traffic. Simulation evaluations through OMNeT++ provide a performance assessment of this proposed scheduling model, which can satisfy multiple types of traffic transmission requirements. Furthermore, TSO is compared with other baseline scheduling solutions, and TSO shows efficacy regarding execution time and schedulability.

时敏网络(TSN)因其提供确定性服务的能力,被认为是解决车载网络实时调度问题的最有前途的解决方案之一。TSN 工作组提出了各种流量整形机制,但混合流量的确定性调度问题仍未得到有效解决,因为流量需求很难通过独立机制或固定时隙划分的组合机制来满足。本文提出了一种时间感知多循环队列和转发调度模型,该模型集成了无等待功能的时间感知整形器和多循环队列和转发整形模型。然后,提出了一种调度解决方案,称为 "TSN 调度优化器"(TSO),它结合了优化方法和增量技术。TSO 的目标是平衡负载,最大限度地提高流量调度能力,同时保证混合流量的服务要求。通过 OMNeT++ 进行的仿真评估对所提出的调度模型进行了性能评估,该模型可满足多种类型的流量传输要求。此外,还将 TSO 与其他基准调度解决方案进行了比较,结果表明 TSO 在执行时间和可调度性方面都很有效。
{"title":"Hybrid traffic scheduling in time-sensitive networking for the support of automotive applications","authors":"Hongrui Nie,&nbsp;Yue Su,&nbsp;Weibo Zhao,&nbsp;Junsheng Mu","doi":"10.1049/cmu2.12713","DOIUrl":"10.1049/cmu2.12713","url":null,"abstract":"<p>Time-sensitive networking (TSN) is considered one of the most promising solutions to address real-time scheduling in in-vehicle network due to its capabilities for providing deterministic service. The TSN working group proposed various traffic shaping mechanisms, while deterministic scheduling of hybrid traffic is still not effectively solved since the traffic requirements are difficult to satisfy by standalone or combined mechanisms with fixed time slot divisions. This article presents a time-aware multi-cyclicqueuing and forwarding scheduling model, that integrates the no-wait enabled time-aware shaper and multi-cyclic queuing and forwarding shaping models. Then, a scheduling solution, dubbed “TSN scheduling optimizer” (TSO) is proposed that combines optimization methods and incremental techniques. TSO aims to balance the load to maximize flow schedulability while guaranteeing the service requirements of hybrid traffic. Simulation evaluations through OMNeT++ provide a performance assessment of this proposed scheduling model, which can satisfy multiple types of traffic transmission requirements. Furthermore, TSO is compared with other baseline scheduling solutions, and TSO shows efficacy regarding execution time and schedulability.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 2","pages":"111-128"},"PeriodicalIF":1.6,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12713","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138950620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning assisted adaptive LDPC coded system design and analysis 机器学习辅助自适应 LDPC 编码系统设计与分析
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-12-19 DOI: 10.1049/cmu2.12707
Cong Xie, Mohammed El-Hajjar, Soon Xin Ng

This paper proposes a novel machine learning (ML) assisted low-latency low density parity check (LDPC) coded adaptive modulation (AM) system, where short block-length LDPC codes are used. Conventional adaptive modulation and coding (AMC) system includes fixed look-up table method, which is also called inner loop link adaptation (ILLA) and outer loop link adaptation (OLLA). For ILLA, the adaptive capability is achieved by switching the modulation and coding modes based on a look-up table using signal-to-noise ratio (SNR) thresholds at the target bit error rate (BER), while OLLA builds upon the ILLA method by dynamically adjusting the SNR thresholds to further optimize the system performance. Although both improve the system overall throughput by switching between different transmission modes, there is still a gap to optimal performance as the BER is comparatively far away from the target BER. Machine learning (ML) is a promising solution in solving various classification problems. In this work, the supervised learning based k-nearest neighbours (KNN) algorithm is invoked for choosing the optimum transmission mode based on the training data and the instantaneous SNR. This work focuses on the low-latency communications scenarios, where short block-length LDPC codes are utilized. On the other hand, given the short block-length constraint, we propose to artificially generate the training data to train our ML assisted AMC scheme. The simulation results show that the proposed ML-LDPC-AMC scheme can achieve a higher throughput than the ILLA system while maintaining the target BER. Compared with OLLA, the proposed scheme can maintain the target BER while the OLLA fails to maintain the target BER when the block length is short. In addition, when considering the channel estimation errors, the performance of the proposed ML-LDPC-AMC maintains the target BER, while the ILLA system's BER performance can be higher than the target BER.

本文提出了一种新型机器学习(ML)辅助低延迟低密度奇偶校验(LDPC)编码自适应调制(AMC)系统,其中使用了短块长 LDPC 编码。传统的自适应调制和编码(AMC)系统包括固定查找表方法,也称为内环链路自适应(ILLA)和外环链路自适应(OLLA)。对于 ILLA,自适应能力是通过在目标误码率(BER)下使用信噪比(SNR)阈值,根据查找表切换调制和编码模式来实现的;而 OLLA 则是在 ILLA 方法的基础上,通过动态调整信噪比阈值来进一步优化系统性能。虽然这两种方法都能通过在不同传输模式之间切换来提高系统的总体吞吐量,但由于误码率与目标误码率相差较远,因此离最佳性能仍有差距。在解决各种分类问题时,机器学习(ML)是一种很有前途的解决方案。本研究采用基于监督学习的 k-nearest neighbours (KNN) 算法,根据训练数据和瞬时信噪比选择最佳传输模式。这项工作的重点是低延迟通信场景,即使用短块长 LDPC 代码。另一方面,鉴于短块长度的限制,我们建议人为生成训练数据来训练我们的 ML 辅助 AMC 方案。仿真结果表明,所提出的 ML-LDPC-AMC 方案能在保持目标误码率的情况下实现比 ILLA 系统更高的吞吐量。与 OLLA 相比,所提出的方案可以保持目标误码率,而当块长度较短时,OLLA 则无法保持目标误码率。此外,当考虑到信道估计误差时,所提出的 ML-LDPC-AMC 性能能保持目标误码率,而 ILLA 系统的误码率性能会高于目标误码率。
{"title":"Machine learning assisted adaptive LDPC coded system design and analysis","authors":"Cong Xie,&nbsp;Mohammed El-Hajjar,&nbsp;Soon Xin Ng","doi":"10.1049/cmu2.12707","DOIUrl":"10.1049/cmu2.12707","url":null,"abstract":"<p>This paper proposes a novel machine learning (ML) assisted low-latency low density parity check (LDPC) coded adaptive modulation (AM) system, where short block-length LDPC codes are used. Conventional adaptive modulation and coding (AMC) system includes fixed look-up table method, which is also called inner loop link adaptation (ILLA) and outer loop link adaptation (OLLA). For ILLA, the adaptive capability is achieved by switching the modulation and coding modes based on a look-up table using signal-to-noise ratio (SNR) thresholds at the target bit error rate (BER), while OLLA builds upon the ILLA method by dynamically adjusting the SNR thresholds to further optimize the system performance. Although both improve the system overall throughput by switching between different transmission modes, there is still a gap to optimal performance as the BER is comparatively far away from the target BER. Machine learning (ML) is a promising solution in solving various classification problems. In this work, the supervised learning based k-nearest neighbours (KNN) algorithm is invoked for choosing the optimum transmission mode based on the training data and the instantaneous SNR. This work focuses on the low-latency communications scenarios, where short block-length LDPC codes are utilized. On the other hand, given the short block-length constraint, we propose to artificially generate the training data to train our ML assisted AMC scheme. The simulation results show that the proposed ML-LDPC-AMC scheme can achieve a higher throughput than the ILLA system while maintaining the target BER. Compared with OLLA, the proposed scheme can maintain the target BER while the OLLA fails to maintain the target BER when the block length is short. In addition, when considering the channel estimation errors, the performance of the proposed ML-LDPC-AMC maintains the target BER, while the ILLA system's BER performance can be higher than the target BER.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 1","pages":"1-10"},"PeriodicalIF":1.6,"publicationDate":"2023-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12707","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138959001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
iScene: An interpretable framework with hierarchical edge services for scene risk identification in 6G internet of vehicles iScene:用于 6G 车联网场景风险识别的分层边缘服务可解释框架
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-12-19 DOI: 10.1049/cmu2.12704
Wuchang Zhong, Siming Wang, Rong Yu
Scene risk identification is essential for the traffic safety of Internet of Vehicles. However, the performance of existing risk identification approaches is heavily limited by the imbalanced historical data and the poor model interpretability. Meanwhile, the large processing delay and the potential privacy leakage threat also restrict their application. In this paper, a novel risk identification model is proposed that leverages the synthetic minority over‐sampling technique nearest neighbor (SMOTEENN) method to balance between high‐risk and low‐risk data. The risk identification model has fine interpretability by using recursive feature elimination cross validation (RFECV) with the Shapley additive explanation (SHAP) to analyze the importance of different features, and further elaborately design the Focal Loss function to tackle the disparity between the difficult and easy sample learning. The proposed interpretability scene risk identification framework, named iScene, is built on the infrastructure of 6G space‐air‐ground integrated networks (SAGINs) with blockchain assistance. The model updata efficiency and privacy preservation are effectively enhanced. An elastic computing offloading algorithm is applied to minimize the system overhead under the hierarchical edge service architecture. The experimental evaluation is carried out to verify the effectiveness of the proposed risk identification framework. The results indicate that the G‐Mean value is increased by 23.4%, while the task average response delay is reduced by 21.2%, compared to that in the traditional risk identification approaches with local computing services.
场景风险识别对车联网的交通安全至关重要。然而,由于历史数据不平衡、模型可解释性差等原因,现有风险识别方法的性能严重受限。同时,较大的处理延迟和潜在的隐私泄露威胁也限制了它们的应用。本文提出了一种新型风险识别模型,该模型利用合成少数超采样技术最近邻(SMOTEENN)方法来平衡高风险数据和低风险数据。通过使用递归特征消除交叉验证(RFECV)和夏普利加法解释(SHAP)来分析不同特征的重要性,并进一步精心设计焦点损失函数来解决样本学习的难易差异,该风险识别模型具有良好的可解释性。所提出的可解释性场景风险识别框架被命名为iScene,它建立在区块链辅助的6G空天地一体化网络(SAGINs)基础设施之上。模型更新数据的效率和隐私保护得到有效提升。在分层边缘服务架构下,采用弹性计算卸载算法将系统开销降到最低。实验评估验证了所提出的风险识别框架的有效性。结果表明,与使用本地计算服务的传统风险识别方法相比,G-Mean 值提高了 23.4%,任务平均响应延迟降低了 21.2%。
{"title":"iScene: An interpretable framework with hierarchical edge services for scene risk identification in 6G internet of vehicles","authors":"Wuchang Zhong, Siming Wang, Rong Yu","doi":"10.1049/cmu2.12704","DOIUrl":"https://doi.org/10.1049/cmu2.12704","url":null,"abstract":"Scene risk identification is essential for the traffic safety of Internet of Vehicles. However, the performance of existing risk identification approaches is heavily limited by the imbalanced historical data and the poor model interpretability. Meanwhile, the large processing delay and the potential privacy leakage threat also restrict their application. In this paper, a novel risk identification model is proposed that leverages the synthetic minority over‐sampling technique nearest neighbor (SMOTEENN) method to balance between high‐risk and low‐risk data. The risk identification model has fine interpretability by using recursive feature elimination cross validation (RFECV) with the Shapley additive explanation (SHAP) to analyze the importance of different features, and further elaborately design the Focal Loss function to tackle the disparity between the difficult and easy sample learning. The proposed interpretability scene risk identification framework, named iScene, is built on the infrastructure of 6G space‐air‐ground integrated networks (SAGINs) with blockchain assistance. The model updata efficiency and privacy preservation are effectively enhanced. An elastic computing offloading algorithm is applied to minimize the system overhead under the hierarchical edge service architecture. The experimental evaluation is carried out to verify the effectiveness of the proposed risk identification framework. The results indicate that the G‐Mean value is increased by 23.4%, while the task average response delay is reduced by 21.2%, compared to that in the traditional risk identification approaches with local computing services.","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":" 48","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138961719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Task offloading and resource allocation for blockchain‐enabled mobile edge computing 区块链移动边缘计算的任务卸载和资源分配
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-12-19 DOI: 10.1049/cmu2.12703
Renbin Fang, Peng Lin, Yize Liu, Yan Liu
Mobile edge computing (MEC) has risen as an effective approach to support ubiquitous and prosperous mobile applications. Due to the strict delay requirements and the increasingly complex application environments, the computation efficiency and security have become the bottleneck that restricts the MEC system. Here, a blockchain‐enabled task offloading scheme is proposed, where the sensitive computation tasks of user terminals (UTs) can be offloaded to a blockchain‐assisted base station (BS). The MEC‐assisted BS helps UTs compute tasks while the blockchain consensus protocol ensures the security of the task offloading and computing process. To manage the allocation of computing resources between task offloading and blockchain consensus, the task offloading and resource allocation are formulated as a joint optimization problem. The aim of the problem is to minimize the energy consumption of UTs while guaranteeing the delay requirement. By transforming the original problem into a Markov decision process, a collective reinforcement learning algorithm is proposed to solve the problem in an online fashion. In the simulations, the convergence and the performance of the proposed scheme are evaluated. The simulation results show the effectiveness of the scheme.
移动边缘计算(MEC)已成为支持无处不在、日益繁荣的移动应用的有效方法。由于严格的延迟要求和日益复杂的应用环境,计算效率和安全性成为制约移动边缘计算系统的瓶颈。本文提出了一种区块链任务卸载方案,即把用户终端(UT)的敏感计算任务卸载到区块链辅助基站(BS)。MEC 辅助基站帮助 UT 计算任务,而区块链共识协议则确保任务卸载和计算过程的安全性。为了管理任务卸载和区块链共识之间的计算资源分配,任务卸载和资源分配被表述为一个联合优化问题。该问题的目的是在保证延迟要求的前提下最大限度地降低 UT 的能耗。通过将原始问题转化为马尔可夫决策过程,提出了一种集体强化学习算法来在线解决该问题。在仿真中,对所提方案的收敛性和性能进行了评估。仿真结果表明了该方案的有效性。
{"title":"Task offloading and resource allocation for blockchain‐enabled mobile edge computing","authors":"Renbin Fang, Peng Lin, Yize Liu, Yan Liu","doi":"10.1049/cmu2.12703","DOIUrl":"https://doi.org/10.1049/cmu2.12703","url":null,"abstract":"Mobile edge computing (MEC) has risen as an effective approach to support ubiquitous and prosperous mobile applications. Due to the strict delay requirements and the increasingly complex application environments, the computation efficiency and security have become the bottleneck that restricts the MEC system. Here, a blockchain‐enabled task offloading scheme is proposed, where the sensitive computation tasks of user terminals (UTs) can be offloaded to a blockchain‐assisted base station (BS). The MEC‐assisted BS helps UTs compute tasks while the blockchain consensus protocol ensures the security of the task offloading and computing process. To manage the allocation of computing resources between task offloading and blockchain consensus, the task offloading and resource allocation are formulated as a joint optimization problem. The aim of the problem is to minimize the energy consumption of UTs while guaranteeing the delay requirement. By transforming the original problem into a Markov decision process, a collective reinforcement learning algorithm is proposed to solve the problem in an online fashion. In the simulations, the convergence and the performance of the proposed scheme are evaluated. The simulation results show the effectiveness of the scheme.","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":" 22","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138962603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electromagnetic field exposure boundary analysis at the near field for multi-technology cellular base station site 多技术蜂窝基站近场电磁场暴露边界分析
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-12-18 DOI: 10.1049/cmu2.12711
Mohammed S. Elbasheir, Rashid A. Saeed, Salaheldin Edam

Mobile networks are expanding quickly as a result of significant advancements in wireless technologies and solutions, especially with the recent introduction of the Fifth Generation New Radio. The growth in mobile networks requires the installation of massive numbers of base stations that bring concerns about increasing overall electromagnetic field (EMF) radiation exposure levels. The International Commission on Non-Ionizing Radiation Protection (ICNIRP) has published guidelines that have been adopted by many regulators in many countries to control the overall radiation emitted from EMF transmitters. This paper studies the compliance boundary for a single site operating with multiple technologies including from the second generation (2G) to 5G colocated in the same site. The analysis is performed using a typical site configuration setup for the boundary calculations in the form of the Compliance Distance (CD). The calculation uses the power reduction factor and system load for more realistic results, and in situ measurements are conducted to validate the calculation's formula. The study also investigated the CD for four types of sites, macro, micro, small cell, and indoor sites. Additionally, the study analyzed the power densities (PDs) and total exposure ratio (TER) for the general public and occupational workers at each site. The results show that CD has shorter distances when the power factor is considered, and 5G makes the highest contribution to the TER at the CD in the main directions of the antenna.

由于无线技术和解决方案的显著进步,特别是最近第五代新无线电的推出,移动网络正在迅速扩展。移动网络的发展需要安装大量的基站,而这些基站会增加整体电磁场(EMF)辐射水平。国际非电离辐射防护委员会(ICNIRP)发布了指导方针,被许多国家的监管机构采用,以控制电磁场发射器的总体辐射量。本文研究了在同一地点运行多种技术(包括从第二代(2G)到 5G 的多种技术)的单一站点的合规边界。分析采用典型的站点配置设置,以合规距离(CD)的形式进行边界计算。计算中使用了功率降低系数和系统负载,以获得更真实的结果,并进行了现场测量以验证计算公式。研究还调查了宏基站、微基站、小基站和室内基站四种类型基站的 CD。此外,研究还分析了每个地点的普通公众和职业工人的功率密度 (PD) 和总暴露比 (TER)。结果表明,考虑到功率因数,CD 的距离更短,而 5G 对天线主要方向上 CD 的 TER 贡献最大。
{"title":"Electromagnetic field exposure boundary analysis at the near field for multi-technology cellular base station site","authors":"Mohammed S. Elbasheir,&nbsp;Rashid A. Saeed,&nbsp;Salaheldin Edam","doi":"10.1049/cmu2.12711","DOIUrl":"10.1049/cmu2.12711","url":null,"abstract":"<p>Mobile networks are expanding quickly as a result of significant advancements in wireless technologies and solutions, especially with the recent introduction of the Fifth Generation New Radio. The growth in mobile networks requires the installation of massive numbers of base stations that bring concerns about increasing overall electromagnetic field (EMF) radiation exposure levels. The International Commission on Non-Ionizing Radiation Protection (ICNIRP) has published guidelines that have been adopted by many regulators in many countries to control the overall radiation emitted from EMF transmitters. This paper studies the compliance boundary for a single site operating with multiple technologies including from the second generation (2G) to 5G colocated in the same site. The analysis is performed using a typical site configuration setup for the boundary calculations in the form of the Compliance Distance (CD). The calculation uses the power reduction factor and system load for more realistic results, and in situ measurements are conducted to validate the calculation's formula. The study also investigated the CD for four types of sites, macro, micro, small cell, and indoor sites. Additionally, the study analyzed the power densities (PDs) and total exposure ratio (TER) for the general public and occupational workers at each site. The results show that CD has shorter distances when the power factor is considered, and 5G makes the highest contribution to the TER at the CD in the main directions of the antenna.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 1","pages":"11-27"},"PeriodicalIF":1.6,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12711","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138965015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CSVRF: A CAM-based popularity-aware egress group-caching scheme for SVRF-based packet forward engines CSVRF:为基于 SVRF 的数据包转发引擎设计的基于 CAM 的流行度感知出口组缓存方案
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-12-17 DOI: 10.1049/cmu2.12701
Ruisi Wu, Wen-Kang Jia

As a key component of high-performance switches and routers, the packet forwarding engine (PFE) is mainly responsible for selecting the appropriate output port for tens of thousands of packets within an extremely short time frame. However, the performance of PFE is determined by the selected group membership algorithm. This paper puts forth a hybrid strategy–caching scalar-pair and vectors routing and forwarding (CSVRF), consisting of virtual output port bitmap caching (VOPBC) and fractional-N SVRF to address major multicast forwarding issues such as scalability by using content addressable memory. In CSVRF, a virtual output port bitmap cache is introduced, which includes the most popular combinations of output port bitmap and divides the big scalar-pair into N sub-groups to achieve parallel compute and the reusability of less bit-length prime. The results demonstrate that the memory space and the forwarding latency are effectively reduced compared with previous work. In space efficiency, it only required 10% memory space compared with the original SVRF/fractional-N SVRF, decreased 10% memory usage compared with pure VOPBC and nearly improved 1 to 4 orders of magnitude of packet processing time compared with the original SVRF and the fractional-N SVRF respectively.

作为高性能交换机和路由器的关键组件,数据包转发引擎(PFE)主要负责在极短的时间内为数以万计的数据包选择合适的输出端口。然而,PFE 的性能取决于所选的组成员算法。本文提出了一种混合策略--缓存标量对和矢量路由与转发(CSVRF),由虚拟输出端口位图缓存(VOPBC)和分数-N SVRF 组成,通过使用内容可寻址内存来解决可扩展性等主要组播转发问题。在 CSVRF 中,引入了虚拟输出端口位图缓存,其中包括最常用的输出端口位图组合,并将大标量对分为 N 个子组,以实现并行计算和较少位长素数的重用性。结果表明,与之前的工作相比,内存空间和转发延迟都得到了有效减少。在空间效率方面,与原始 SVRF/fractional-N SVRF 相比,它只需要 10%的内存空间;与纯 VOPBC 相比,内存使用量减少了 10%;与原始 SVRF 和 fractional-N SVRF 相比,数据包处理时间分别缩短了 1 到 4 个数量级。
{"title":"CSVRF: A CAM-based popularity-aware egress group-caching scheme for SVRF-based packet forward engines","authors":"Ruisi Wu,&nbsp;Wen-Kang Jia","doi":"10.1049/cmu2.12701","DOIUrl":"10.1049/cmu2.12701","url":null,"abstract":"<p>As a key component of high-performance switches and routers, the packet forwarding engine (PFE) is mainly responsible for selecting the appropriate output port for tens of thousands of packets within an extremely short time frame. However, the performance of PFE is determined by the selected group membership algorithm. This paper puts forth a hybrid strategy–caching scalar-pair and vectors routing and forwarding (CSVRF), consisting of virtual output port bitmap caching (VOPBC) and fractional-<i>N</i> SVRF to address major multicast forwarding issues such as scalability by using content addressable memory. In CSVRF, a virtual output port bitmap cache is introduced, which includes the most popular combinations of output port bitmap and divides the big scalar-pair into <i>N</i> sub-groups to achieve parallel compute and the reusability of less bit-length prime. The results demonstrate that the memory space and the forwarding latency are effectively reduced compared with previous work. In space efficiency, it only required 10% memory space compared with the original SVRF/fractional-<i>N</i> SVRF, decreased 10% memory usage compared with pure VOPBC and nearly improved 1 to 4 orders of magnitude of packet processing time compared with the original SVRF and the fractional-<i>N</i> SVRF respectively.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 1","pages":"40-54"},"PeriodicalIF":1.6,"publicationDate":"2023-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12701","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138966292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monte Carlo-based service migration under multiple constraints in mobile edge computing 移动边缘计算中多重约束条件下基于蒙特卡洛的服务迁移
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-12-17 DOI: 10.1049/cmu2.12705
Qiang Zhang, Hao Yu

Mobile edge computing as an emerging technique can provide services for mobile terminals, and meanwhile the mobility of users brings new challenges. When a user moves across different areas, the system needs to determine whether to migrate service so as to guarantee quality of experience for the user. However, it is difficult to obtain the optimal migration policy in real time due to the huge state space. Considering delay-sensitive data-intensive applications run by mobile terminals with limited battery power, an efficient service migration policy should be able to make a good tradeoff among service cost, service delay and terminal energy consumption. Here, an online Monte Carlo-based service migration (MCSM) policy is proposed to minimize service cost under constraints of deadline and terminal energy consumption. A penalty mechanism is designed to update reward when partial or all constraints are not meet. State-action value estimation and policy improvement are triggered only on the completion of each episode. Each episode is traversed reversely to calculate the average cumulative reward so as to improve policy. Experimental results show that the proposed approach can improve service success ratio and reduce average service cost compared to the existing service migration policies.

移动边缘计算作为一种新兴技术,可以为移动终端提供服务,与此同时,用户的移动性也带来了新的挑战。当用户在不同区域移动时,系统需要决定是否迁移服务,以保证用户的体验质量。然而,由于状态空间巨大,很难实时获得最佳迁移策略。考虑到由电池电量有限的移动终端运行的延迟敏感型数据密集型应用,高效的服务迁移策略应能在服务成本、服务延迟和终端能耗之间做出良好的权衡。本文提出了一种基于蒙特卡洛的在线服务迁移(MCSM)策略,以在截止时间和终端能耗的约束下最大限度地降低服务成本。设计了一种惩罚机制,用于在部分或全部约束条件未满足时更新奖励。状态行动值估算和策略改进仅在每集完成时触发。每一集都会反向遍历,以计算平均累积奖励,从而改进策略。实验结果表明,与现有的服务迁移策略相比,建议的方法可以提高服务成功率,降低平均服务成本。
{"title":"Monte Carlo-based service migration under multiple constraints in mobile edge computing","authors":"Qiang Zhang,&nbsp;Hao Yu","doi":"10.1049/cmu2.12705","DOIUrl":"10.1049/cmu2.12705","url":null,"abstract":"<p>Mobile edge computing as an emerging technique can provide services for mobile terminals, and meanwhile the mobility of users brings new challenges. When a user moves across different areas, the system needs to determine whether to migrate service so as to guarantee quality of experience for the user. However, it is difficult to obtain the optimal migration policy in real time due to the huge state space. Considering delay-sensitive data-intensive applications run by mobile terminals with limited battery power, an efficient service migration policy should be able to make a good tradeoff among service cost, service delay and terminal energy consumption. Here, an online Monte Carlo-based service migration (MCSM) policy is proposed to minimize service cost under constraints of deadline and terminal energy consumption. A penalty mechanism is designed to update reward when partial or all constraints are not meet. State-action value estimation and policy improvement are triggered only on the completion of each episode. Each episode is traversed reversely to calculate the average cumulative reward so as to improve policy. Experimental results show that the proposed approach can improve service success ratio and reduce average service cost compared to the existing service migration policies.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 1","pages":"28-39"},"PeriodicalIF":1.6,"publicationDate":"2023-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12705","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138966577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless sensor network security defense strategy based on Bayesian reputation evaluation model 基于贝叶斯声誉评估模型的无线传感器网络安全防御策略
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-12-14 DOI: 10.1049/cmu2.12700
Zhijun Teng, Sian Zhu, Mingzhe Li, Libo Yu, Jinliang Gu, Liwen Guo

In order to solve the security problems caused by malicious nodes in wireless sensor networks, a TS-BRS reputation model based on time series analysis is proposed in this paper. By using the time series analysis method, the matching analysis of two time series is carried out to reduce the interference of channel conflicts on the reputation evaluation model and improve the accuracy of model recognition. In order to improve the adaptability of the evaluation model, the adaptive maintenance function μ is introduced into the update of credit value, which aggravates the influence of node behaviour on credit value at the present stage. The simulation results show that the new reputation evaluation model can effectively improve the detection rate and detection speed of malicious nodes in the network. After the introduction of maintenance function, the reputation value of the captured malicious nodes in the network has a faster convergence speed.

为了解决无线传感器网络中恶意节点带来的安全问题,本文提出了一种基于时间序列分析的 TS-BRS 信誉模型。利用时间序列分析方法,对两个时间序列进行匹配分析,减少信道冲突对信誉评价模型的干扰,提高模型识别的准确性。为了提高评价模型的适应性,在信用值更新中引入了自适应维护函数μ,加重了现阶段节点行为对信用值的影响。仿真结果表明,新的信誉评价模型能有效提高网络中恶意节点的检测率和检测速度。引入维护功能后,网络中被捕获的恶意节点的信誉值收敛速度更快。
{"title":"Wireless sensor network security defense strategy based on Bayesian reputation evaluation model","authors":"Zhijun Teng,&nbsp;Sian Zhu,&nbsp;Mingzhe Li,&nbsp;Libo Yu,&nbsp;Jinliang Gu,&nbsp;Liwen Guo","doi":"10.1049/cmu2.12700","DOIUrl":"10.1049/cmu2.12700","url":null,"abstract":"<p>In order to solve the security problems caused by malicious nodes in wireless sensor networks, a TS-BRS reputation model based on time series analysis is proposed in this paper. By using the time series analysis method, the matching analysis of two time series is carried out to reduce the interference of channel conflicts on the reputation evaluation model and improve the accuracy of model recognition. In order to improve the adaptability of the evaluation model, the adaptive maintenance function μ is introduced into the update of credit value, which aggravates the influence of node behaviour on credit value at the present stage. The simulation results show that the new reputation evaluation model can effectively improve the detection rate and detection speed of malicious nodes in the network. After the introduction of maintenance function, the reputation value of the captured malicious nodes in the network has a faster convergence speed.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 1","pages":"55-62"},"PeriodicalIF":1.6,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12700","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138972836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1