首页 > 最新文献

IEEE Systems Journal最新文献

英文 中文
Toward a Human-Cyber-Physical System for Real-Time Anomaly Detection 开发用于实时异常检测的人类-网络-物理系统
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-12 DOI: 10.1109/JSYST.2024.3402978
Bojana Bajic;Aleksandar Rikalovic;Nikola Suzic;Vincenzo Piuri
In recent years, researchers and practitioners have focused on Industry 4.0, emphasizing the role of cyber-physical systems (CPSs) in manufacturing. However, the operationalization of Industry 4.0 has presented many implementation challenges caused by the inability of available technologies to meet industry needs effectively. Furthermore, Industry 4.0 has been criticized for the absence of focus on the human component in CPSs impacting the concept of sustainability in the long run. Responding to this critique and building on the foundation of the Industry 5.0 concept, this article proposes a holistic methodology empowered by human expert knowledge for human-cyber-physical system (HCPS) implementation. The proposed novel HCPS methodology represents a more sustainable solution for companies that consists of five phases to promote the integration of human expert knowledge and cyber and physical parts empowered by big data analytics for real-time anomaly detection. Specifically, real-time anomaly detection is enabled by industrial edge computing for big data optimization, data processing, and the industrial Internet of Things (IIoTs) real-time product quality control. Finally, we implement the developed HCPS solution in a case study from the process industry, where automated system decision-making is achieved. The results obtained indicate that an HCPS, as a strategy for companies, must augment human capabilities and require human involvement in final decision-making, foster meaningful human impact, and create new employment opportunities.
近年来,研究人员和从业人员都在关注工业 4.0,强调网络物理系统(CPS)在制造业中的作用。然而,由于现有技术无法有效满足工业需求,工业 4.0 的实施面临诸多挑战。此外,"工业 4.0 "还因在 CPS 中缺乏对人的关注而受到批评,这从长远来看影响了可持续发展的概念。针对这一批评,本文在工业 5.0 概念的基础上,提出了一种由人类专家知识赋能的整体方法论,用于人-网络-物理系统(HCPS)的实施。所提出的新颖 HCPS 方法为企业提供了一种更可持续的解决方案,它由五个阶段组成,旨在通过大数据分析促进人类专家知识与网络和物理部件的整合,以实现实时异常检测。具体而言,通过工业边缘计算实现实时异常检测,以进行大数据优化、数据处理和工业物联网(IIoTs)实时产品质量控制。最后,我们在流程工业的一个案例研究中实施了所开发的 HCPS 解决方案,实现了自动化系统决策。研究结果表明,作为企业的一项战略,HCPS 必须增强人的能力,要求人参与最终决策,促进有意义的人文影响,并创造新的就业机会。
{"title":"Toward a Human-Cyber-Physical System for Real-Time Anomaly Detection","authors":"Bojana Bajic;Aleksandar Rikalovic;Nikola Suzic;Vincenzo Piuri","doi":"10.1109/JSYST.2024.3402978","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3402978","url":null,"abstract":"In recent years, researchers and practitioners have focused on Industry 4.0, emphasizing the role of cyber-physical systems (CPSs) in manufacturing. However, the operationalization of Industry 4.0 has presented many implementation challenges caused by the inability of available technologies to meet industry needs effectively. Furthermore, Industry 4.0 has been criticized for the absence of focus on the human component in CPSs impacting the concept of sustainability in the long run. Responding to this critique and building on the foundation of the Industry 5.0 concept, this article proposes a holistic methodology empowered by human expert knowledge for human-cyber-physical system (HCPS) implementation. The proposed novel HCPS methodology represents a more sustainable solution for companies that consists of five phases to promote the integration of human expert knowledge and cyber and physical parts empowered by big data analytics for real-time anomaly detection. Specifically, real-time anomaly detection is enabled by industrial edge computing for big data optimization, data processing, and the industrial Internet of Things (IIoTs) real-time product quality control. Finally, we implement the developed HCPS solution in a case study from the process industry, where automated system decision-making is achieved. The results obtained indicate that an HCPS, as a strategy for companies, must augment human capabilities and require human involvement in final decision-making, foster meaningful human impact, and create new employment opportunities.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1308-1319"},"PeriodicalIF":4.0,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10555342","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An IoT Architecture Leveraging Digital Twins: Compromised Node Detection Scenario 利用数字孪生的物联网架构:受损节点检测场景
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-12 DOI: 10.1109/JSYST.2024.3403500
Khaled Alanezi;Shivakant Mishra
Modern Internet of Things (IoT) environments with thousands of low-end and diverse IoT nodes with complex interactions among them and often deployed in remote and/or wild locations present some unique challenges that make traditional node compromise detection services less effective. This article presents the design, implementation, and evaluation of a fog-based architecture that utilizes the concept of a digital twin to detect compromised IoT nodes exhibiting malicious behaviors by either producing erroneous data and/or being used to launch network intrusion attacks to hijack other nodes eventually causing service disruption. By defining a digital twin of an IoT infrastructure at a fog server, the architecture is focused on monitoring relevant information to save energy and storage space. This article presents a prototype implementation for the architecture utilizing malicious behavior datasets to perform misbehaving node classification. An extensive accuracy and system performance evaluation was conducted based on this prototype. Results show good accuracy and negligible overhead especially when employing deep learning techniques, such as multilayer perceptron.
现代物联网(IoT)环境中存在成千上万个低端、多样化的物联网节点,这些节点之间存在复杂的交互关系,而且通常部署在偏远和/或野外,这些独特的挑战使得传统的节点受损检测服务变得不那么有效。本文介绍了一种基于雾的架构的设计、实施和评估,该架构利用数字孪生的概念来检测受损的物联网节点,这些节点通过产生错误数据和/或用于发起网络入侵攻击来劫持其他节点,最终导致服务中断,从而表现出恶意行为。通过在雾服务器上定义物联网基础设施的数字孪生,该架构专注于监控相关信息,以节省能源和存储空间。本文介绍了该架构的原型实现,它利用恶意行为数据集对行为不端节点进行分类。基于该原型进行了广泛的准确性和系统性能评估。结果表明,尤其是在采用多层感知器等深度学习技术时,准确率很高,开销可忽略不计。
{"title":"An IoT Architecture Leveraging Digital Twins: Compromised Node Detection Scenario","authors":"Khaled Alanezi;Shivakant Mishra","doi":"10.1109/JSYST.2024.3403500","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3403500","url":null,"abstract":"Modern Internet of Things (IoT) environments with thousands of low-end and diverse IoT nodes with complex interactions among them and often deployed in remote and/or wild locations present some unique challenges that make traditional node compromise detection services less effective. This article presents the design, implementation, and evaluation of a fog-based architecture that utilizes the concept of a digital twin to detect compromised IoT nodes exhibiting malicious behaviors by either producing erroneous data and/or being used to launch network intrusion attacks to hijack other nodes eventually causing service disruption. By defining a digital twin of an IoT infrastructure at a fog server, the architecture is focused on monitoring relevant information to save energy and storage space. This article presents a prototype implementation for the architecture utilizing malicious behavior datasets to perform misbehaving node classification. An extensive accuracy and system performance evaluation was conducted based on this prototype. Results show good accuracy and negligible overhead especially when employing deep learning techniques, such as multilayer perceptron.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1224-1235"},"PeriodicalIF":4.0,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
$H_infty$ Performance Analysis of Large-Scale Networked Systems $H_infty$ 大规模网络系统的性能分析
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-07 DOI: 10.1109/JSYST.2024.3406800
Rongxing Guan;Huabo Liu;Keke Huang;Haisheng Yu
This article is concerned with the $H_infty$ performance problems for large-scale networked systems comprising many subsystems. The connections among these subsystems with different dynamics are arbitrary and linear time-invariant. Necessary and sufficient conditions have been derived for $H_infty$ performance, in which the system structure is sufficiently utilized and higher computational efficiency is obtained. Furthermore, several analysis conditions that rely solely on individual subsystem parameters are obtained. The effectiveness and ascendancy of the derived conditions are verified by some numerical simulations.
本文关注的是由许多子系统组成的大规模网络系统的 $H_infty$ 性能问题。这些具有不同动力学特性的子系统之间的连接是任意的、线性时变的。我们推导出了 $H_infty$ 性能的必要条件和充分条件,在这些条件下,系统结构得到了充分的利用,并获得了更高的计算效率。此外,还获得了一些仅依赖于单个子系统参数的分析条件。一些数值模拟验证了推导条件的有效性和优越性。
{"title":"$H_infty$ Performance Analysis of Large-Scale Networked Systems","authors":"Rongxing Guan;Huabo Liu;Keke Huang;Haisheng Yu","doi":"10.1109/JSYST.2024.3406800","DOIUrl":"10.1109/JSYST.2024.3406800","url":null,"abstract":"This article is concerned with the \u0000<inline-formula><tex-math>$H_infty$</tex-math></inline-formula>\u0000 performance problems for large-scale networked systems comprising many subsystems. The connections among these subsystems with different dynamics are arbitrary and linear time-invariant. Necessary and sufficient conditions have been derived for \u0000<inline-formula><tex-math>$H_infty$</tex-math></inline-formula>\u0000 performance, in which the system structure is sufficiently utilized and higher computational efficiency is obtained. Furthermore, several analysis conditions that rely solely on individual subsystem parameters are obtained. The effectiveness and ascendancy of the derived conditions are verified by some numerical simulations.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 3","pages":"1528-1537"},"PeriodicalIF":4.0,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141932828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RL-Assisted Power Allocation for Covert Communication in Distributed NOMA Networks 分布式 NOMA 网络中隐蔽通信的 RL 辅助功率分配
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-05 DOI: 10.1109/JSYST.2024.3406035
Jiaqing Bai;Ji He;Yanping Chen;Yulong Shen;Xiaohong Jiang
This article focuses on covert communication in a distributed network with multiple nonorthogonal multiple access (NOMA) systems, where each NOMA system is consisted of a transmitter, a legitimate public user, a covert user, and a warden. Power allocation for multiple transmitters in such network is a highly tricky problem, since it needs to addresses the issues of complex inter-NOMA system interference, constraints from both public users and covert users, and the optimization of overall network performance. We first conduct a theoretical analysis to depict the inherent relationship between the inter-NOMA system interference and transmit power of transmitters. With the help of the interference analysis, we then develop a theoretical framework for the modeling of detection error probability, covert rate, and public rate in each NOMA system. Based on these results and the constraints from both public users and covert users, we formulate the concerned power allocation problem as a Markov decision process, and further develop multiagent reinforcement learning (RL) algorithms to identify the optimal power allocation among transmitters to maximize the sum-rate of the overall network. Finally, numerical results are provided to illustrate the efficiency of our RL algorithms for power allocation in multi-NOMA networks.
本文的重点是在具有多个非正交多址(NOMA)系统的分布式网络中进行隐蔽通信,其中每个 NOMA 系统都由一个发射机、一个合法的公共用户、一个隐蔽用户和一个管理员组成。在这种网络中,多个发射机的功率分配是一个非常棘手的问题,因为它需要解决复杂的非正交多址系统间干扰、来自公共用户和隐蔽用户的约束以及整体网络性能的优化等问题。我们首先从理论上分析了 NOMA 系统间干扰与发射机发射功率之间的内在关系。在干扰分析的帮助下,我们建立了一个理论框架,用于对每个 NOMA 系统中的检测错误概率、隐蔽率和公开率进行建模。基于这些结果以及来自公开用户和隐蔽用户的约束条件,我们将相关的功率分配问题表述为马尔可夫决策过程,并进一步开发了多代理强化学习(RL)算法,以确定发射机之间的最优功率分配,从而最大化整个网络的总速率。最后,我们提供了数值结果,以说明我们的 RL 算法在多 NOMA 网络中的功率分配效率。
{"title":"RL-Assisted Power Allocation for Covert Communication in Distributed NOMA Networks","authors":"Jiaqing Bai;Ji He;Yanping Chen;Yulong Shen;Xiaohong Jiang","doi":"10.1109/JSYST.2024.3406035","DOIUrl":"10.1109/JSYST.2024.3406035","url":null,"abstract":"This article focuses on covert communication in a distributed network with multiple nonorthogonal multiple access (NOMA) systems, where each NOMA system is consisted of a transmitter, a legitimate public user, a covert user, and a warden. Power allocation for multiple transmitters in such network is a highly tricky problem, since it needs to addresses the issues of complex inter-NOMA system interference, constraints from both public users and covert users, and the optimization of overall network performance. We first conduct a theoretical analysis to depict the inherent relationship between the inter-NOMA system interference and transmit power of transmitters. With the help of the interference analysis, we then develop a theoretical framework for the modeling of detection error probability, covert rate, and public rate in each NOMA system. Based on these results and the constraints from both public users and covert users, we formulate the concerned power allocation problem as a Markov decision process, and further develop multiagent reinforcement learning (RL) algorithms to identify the optimal power allocation among transmitters to maximize the sum-rate of the overall network. Finally, numerical results are provided to illustrate the efficiency of our RL algorithms for power allocation in multi-NOMA networks.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 3","pages":"1504-1515"},"PeriodicalIF":4.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141932720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LBATSM: Load Balancing Aware Task Selection and Migration Approach in Fog Computing Environment LBATSM:雾计算环境中的负载平衡感知任务选择和迁移方法
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-05 DOI: 10.1109/JSYST.2024.3403673
Raj Mohan Singh;Geeta Sikka;Lalit Kumar Awasthi
With the rapid advancement of Internet of Things technology, the field of fog computing has garnered significant attention and hence become a workable processing platform for upcoming applications. However, compared with vast computing capability of the cloud, the fog nodes have resource constraints, are heterogeneous in nature, and highly distributed. Due to the growing demand as well as diversity of applications, the nodes in a fog network become overloaded, which makes load balancing a prime concern. In this work, a load balancing aware task selection and migration approach is proposed comprising two algorithms to select and place tasks from multiple overloaded nodes to suitable destination nodes. The Selection algorithm determines the tasks that should be migrated from overloaded nodes. Placement algorithm focuses on finding a near optimal solution by applying modified binary particle swarm optimization. Specifically, the objective is to minimize execution time and transfer time of tasks. Simulation studies conducted on iFogSim prove that the suggested approach outperforms the existing approaches in terms of task execution time, task transfer time, and makespan.
随着物联网技术的飞速发展,雾计算领域受到了极大关注,并因此成为即将到来的应用的可行处理平台。然而,与云计算的巨大计算能力相比,雾节点具有资源限制、异构性和高度分布性等特点。由于需求的增长和应用的多样性,雾网络中的节点会变得超负荷,这使得负载平衡成为首要问题。在这项工作中,提出了一种负载平衡感知任务选择和迁移方法,包括两种算法,用于从多个过载节点选择任务并将其放置到合适的目标节点。选择算法确定应从过载节点迁移的任务。放置算法侧重于通过应用修改后的二进制粒子群优化找到接近最优的解决方案。具体来说,其目标是尽量减少任务的执行时间和转移时间。在 iFogSim 上进行的仿真研究证明,建议的方法在任务执行时间、任务转移时间和时间跨度方面都优于现有方法。
{"title":"LBATSM: Load Balancing Aware Task Selection and Migration Approach in Fog Computing Environment","authors":"Raj Mohan Singh;Geeta Sikka;Lalit Kumar Awasthi","doi":"10.1109/JSYST.2024.3403673","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3403673","url":null,"abstract":"With the rapid advancement of Internet of Things technology, the field of fog computing has garnered significant attention and hence become a workable processing platform for upcoming applications. However, compared with vast computing capability of the cloud, the fog nodes have resource constraints, are heterogeneous in nature, and highly distributed. Due to the growing demand as well as diversity of applications, the nodes in a fog network become overloaded, which makes load balancing a prime concern. In this work, a load balancing aware task selection and migration approach is proposed comprising two algorithms to select and place tasks from multiple overloaded nodes to suitable destination nodes. The Selection algorithm determines the tasks that should be migrated from overloaded nodes. Placement algorithm focuses on finding a near optimal solution by applying modified binary particle swarm optimization. Specifically, the objective is to minimize execution time and transfer time of tasks. Simulation studies conducted on iFogSim prove that the suggested approach outperforms the existing approaches in terms of task execution time, task transfer time, and makespan.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"796-804"},"PeriodicalIF":4.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Connectivity Preserving Consensus for Second-Order Heterogeneous MASs With Input Constraints 有输入约束条件的二阶异构 MAS 的连接性保护共识
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-05 DOI: 10.1109/JSYST.2024.3403103
Lili Wang;Shiming Chen
This article gives an investigation to the connectivity preserving consensus (CPC) issue for the second-order heterogeneous multiagent systems (MASs), which are constituted by linear and nonlinear subsystem. First, a consensus algorithm for the system without input constraints is proposed and some sufficient conditions for consensus are obtained. Due to the limited communication distance of each agent, the algorithm maintains network connectivity based on potential function techniques. Then, considering the linear and nonlinear subsystem with input constraints, respectively, the results indicate that as long as certain conditions are met, all agents can be guaranteed to achieve CPC. Furthermore, the proposed algorithm is extended to the entire system with input constraints. Five examples are provided to demonstrate efficiency of theoretical results.
本文研究了由线性和非线性子系统构成的二阶异构多代理系统(MAS)的连通性保持共识(CPC)问题。首先,提出了一种无输入约束系统的共识算法,并得到了一些共识的充分条件。由于每个代理的通信距离有限,该算法基于势函数技术保持网络连接。然后,分别考虑有输入约束的线性子系统和非线性子系统,结果表明,只要满足某些条件,就能保证所有代理都能实现 CPC。此外,所提出的算法还扩展到了有输入约束的整个系统。本文提供了五个实例来证明理论结果的有效性。
{"title":"Connectivity Preserving Consensus for Second-Order Heterogeneous MASs With Input Constraints","authors":"Lili Wang;Shiming Chen","doi":"10.1109/JSYST.2024.3403103","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3403103","url":null,"abstract":"This article gives an investigation to the connectivity preserving consensus (CPC) issue for the second-order heterogeneous multiagent systems (MASs), which are constituted by linear and nonlinear subsystem. First, a consensus algorithm for the system without input constraints is proposed and some sufficient conditions for consensus are obtained. Due to the limited communication distance of each agent, the algorithm maintains network connectivity based on potential function techniques. Then, considering the linear and nonlinear subsystem with input constraints, respectively, the results indicate that as long as certain conditions are met, all agents can be guaranteed to achieve CPC. Furthermore, the proposed algorithm is extended to the entire system with input constraints. Five examples are provided to demonstrate efficiency of theoretical results.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1471-1480"},"PeriodicalIF":4.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized and Fault-Tolerant Task Offloading for Enabling Network Edge Intelligence 实现网络边缘智能的分散式容错任务卸载
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-05 DOI: 10.1109/JSYST.2024.3403696
Huixiang Zhang;Kaihua Liao;Yu Tai;Wenqiang Ma;Guoyan Cao;Wen Sun;Lexi Xu
Edge intelligence has recently attracted great interest from industry and academia, and it greatly improves the processing speed at the edge by moving data and artificial intelligence to the edge of the network. However, edge devices have bottlenecks in battery capacity and computing power, making it challenging to perform computing tasks in dynamic and harsh network environments. Especially in disaster scenarios, edge (rescue) devices are more likely to fail due to unreliable wireless communications and scattered rescue requests, which makes it urgent to explore how to provide low-latency, reliable services through edge collaboration. In this article, we investigate the task offloading mechanism in mobile edge computing networks, aiming to ensure fault tolerance and rapid response of computing services in dynamic and harsh scenarios. Specifically, we design a fault-tolerant distributed task offloading scheme, which minimizes task execution time and system energy consumption through the multi-agent proximal policy optimization algorithm. Furthermore, we introduce logarithmic ratio reward functions and action masking to reduce the impact of different task queue lengths while accelerating model convergence. Numerical results show that the proposed algorithm is suitable for service failure scenarios, effectively meeting the reliability requirements of tasks while simultaneously reducing system energy consumption and processing latency.
边缘智能最近引起了工业界和学术界的极大兴趣,它通过将数据和人工智能转移到网络边缘,大大提高了边缘处理速度。然而,边缘设备在电池容量和计算能力方面存在瓶颈,因此在动态和恶劣的网络环境中执行计算任务具有挑战性。特别是在灾难场景中,边缘(救援)设备更容易因不可靠的无线通信和分散的救援请求而出现故障,这就迫切需要探索如何通过边缘协作提供低延迟、可靠的服务。本文研究了移动边缘计算网络中的任务卸载机制,旨在确保计算服务在动态和恶劣场景下的容错和快速响应。具体来说,我们设计了一种容错分布式任务卸载方案,通过多代理近端策略优化算法最大限度地减少了任务执行时间和系统能耗。此外,我们还引入了对数比率奖励函数和行动屏蔽,以减少不同任务队列长度的影响,同时加速模型收敛。数值结果表明,所提出的算法适用于服务故障场景,能有效满足任务的可靠性要求,同时降低系统能耗和处理延迟。
{"title":"Decentralized and Fault-Tolerant Task Offloading for Enabling Network Edge Intelligence","authors":"Huixiang Zhang;Kaihua Liao;Yu Tai;Wenqiang Ma;Guoyan Cao;Wen Sun;Lexi Xu","doi":"10.1109/JSYST.2024.3403696","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3403696","url":null,"abstract":"Edge intelligence has recently attracted great interest from industry and academia, and it greatly improves the processing speed at the edge by moving data and artificial intelligence to the edge of the network. However, edge devices have bottlenecks in battery capacity and computing power, making it challenging to perform computing tasks in dynamic and harsh network environments. Especially in disaster scenarios, edge (rescue) devices are more likely to fail due to unreliable wireless communications and scattered rescue requests, which makes it urgent to explore how to provide low-latency, reliable services through edge collaboration. In this article, we investigate the task offloading mechanism in mobile edge computing networks, aiming to ensure fault tolerance and rapid response of computing services in dynamic and harsh scenarios. Specifically, we design a fault-tolerant distributed task offloading scheme, which minimizes task execution time and system energy consumption through the multi-agent proximal policy optimization algorithm. Furthermore, we introduce logarithmic ratio reward functions and action masking to reduce the impact of different task queue lengths while accelerating model convergence. Numerical results show that the proposed algorithm is suitable for service failure scenarios, effectively meeting the reliability requirements of tasks while simultaneously reducing system energy consumption and processing latency.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1459-1470"},"PeriodicalIF":4.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asynchronous Observer-Based Fault-Tolerant Optimal Control of Multiagent Systems 基于异步观测器的多代理系统容错优化控制
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-30 DOI: 10.1109/JSYST.2024.3391766
Haoyue Yang;Hao Zhang;Zhuping Wang;Chao Huang;Huaicheng Yan
In this article, the optimal consensus problem for a class of nonlinear multiagent systems in discrete-time case is investigated under jump faults and false data injection (FDI) attacks. First, a general fault model with coefficients obeying a semi-Markov process is introduced into system dynamics. A joint state and fault observer based on the hidden semi-Markov model is designed to estimate both the agent's state and the fault signals. Sufficient conditions for the existence of observer gains are established by constructing the stochastic Lyapunov function with hidden mode, observed mode, and elapsed time dependencies. Based on the observed states, we reconstruct the local performance metric functions of agents and design a policy-value iteration algorithm to address the multiplayer game problem. Then, an neural network policy-value iteration approximation algorithm is proposed, which obtains an approximate Nash equilibrium solution of the multiplayer games. Further, a secure fault-tolerant optimal consensus controller with fault compensation and attack attenuation terms is designed to achieve optimal tracking control, and the stability of the neighbor tracking error system is rigorously demonstrated. Finally, illustrative example and comparison simulations are provided to verify the validity and applicability of the proposed results.
本文研究了离散时间情况下一类非线性多代理系统在跳跃故障和虚假数据注入(FDI)攻击下的最优共识问题。首先,在系统动力学中引入了系数服从半马尔可夫过程的一般故障模型。设计了一个基于隐藏半马尔可夫模型的状态和故障联合观测器,以估计代理的状态和故障信号。通过构建具有隐藏模式、观测模式和经过时间相关性的随机 Lyapunov 函数,建立了观测器增益存在的充分条件。根据观察到的状态,我们重构了代理的局部性能指标函数,并设计了一种策略值迭代算法来解决多人博弈问题。然后,提出了一种神经网络策略值迭代近似算法,该算法可获得多人博弈的近似纳什均衡解。此外,还设计了一种带有故障补偿和攻击衰减项的安全容错最优共识控制器,以实现最优跟踪控制,并严格证明了邻域跟踪误差系统的稳定性。最后,还提供了示例和对比模拟,以验证所提结果的有效性和适用性。
{"title":"Asynchronous Observer-Based Fault-Tolerant Optimal Control of Multiagent Systems","authors":"Haoyue Yang;Hao Zhang;Zhuping Wang;Chao Huang;Huaicheng Yan","doi":"10.1109/JSYST.2024.3391766","DOIUrl":"10.1109/JSYST.2024.3391766","url":null,"abstract":"In this article, the optimal consensus problem for a class of nonlinear multiagent systems in discrete-time case is investigated under jump faults and false data injection (FDI) attacks. First, a general fault model with coefficients obeying a semi-Markov process is introduced into system dynamics. A joint state and fault observer based on the hidden semi-Markov model is designed to estimate both the agent's state and the fault signals. Sufficient conditions for the existence of observer gains are established by constructing the stochastic Lyapunov function with hidden mode, observed mode, and elapsed time dependencies. Based on the observed states, we reconstruct the local performance metric functions of agents and design a policy-value iteration algorithm to address the multiplayer game problem. Then, an neural network policy-value iteration approximation algorithm is proposed, which obtains an approximate Nash equilibrium solution of the multiplayer games. Further, a secure fault-tolerant optimal consensus controller with fault compensation and attack attenuation terms is designed to achieve optimal tracking control, and the stability of the neighbor tracking error system is rigorously demonstrated. Finally, illustrative example and comparison simulations are provided to verify the validity and applicability of the proposed results.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1402-1413"},"PeriodicalIF":4.0,"publicationDate":"2024-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140832010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficiency Maximization for UAV-Assisted Full-Duplex Communication in the Presence of Multiple Malicious Jammers 存在多个恶意干扰器时无人机辅助全双工通信的能效最大化
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-30 DOI: 10.1109/JSYST.2024.3390554
Zhiyu Huang;Zhichao Sheng;Ali A. Nasir;Hongwen Yu
A full-duplex unmanned aerial vehicle (UAV)-based communication network is investigated, where the UAV is dispatched to transmit information to multiple downlink users (DLUs) and receive signal from uplink users (ULUs) simultaneously in the existence of malicious jammers. Considering the limited battery power of the UAV and the quality of service required, 3-D trajectory, DLUs scheduling, ULUs scheduling, and uplink/downlink transmit power allocation are jointly optimized to maximize the energy efficiency of the network. However, the formulated optimization problem with high coupling variables and fractional objective function is nonconvex and therefore mathematically intractable. To address the problem, the BCD method is implemented to decompose the optimization problem into four independent subproblems. An iterative algorithm based on Dinkelbach's algorithm and successive convex approximation technique is developed to solve the problem efficiently. Numerical simulation results are presented to evaluate the performance of different schemes and demonstrate the advantages of the proposed algorithm.
研究了一种基于无人飞行器(UAV)的全双工通信网络,在该网络中,无人飞行器被派遣同时向多个下行链路用户(DLUs)发送信息,并接收来自上行链路用户(ULUs)的信号,以应对恶意干扰。考虑到无人机有限的电池电量和对服务质量的要求,对三维轨迹、下行用户调度、上行用户调度和上行/下行发射功率分配进行了联合优化,以最大限度地提高网络的能效。然而,所制定的优化问题具有高耦合变量和分数目标函数,是非凸的,因此在数学上难以解决。为解决这一问题,采用 BCD 方法将优化问题分解为四个独立的子问题。基于 Dinkelbach 算法和连续凸近似技术开发了一种迭代算法,以高效解决该问题。文中给出了数值模拟结果,以评估不同方案的性能,并证明所提算法的优势。
{"title":"Energy Efficiency Maximization for UAV-Assisted Full-Duplex Communication in the Presence of Multiple Malicious Jammers","authors":"Zhiyu Huang;Zhichao Sheng;Ali A. Nasir;Hongwen Yu","doi":"10.1109/JSYST.2024.3390554","DOIUrl":"10.1109/JSYST.2024.3390554","url":null,"abstract":"A full-duplex unmanned aerial vehicle (UAV)-based communication network is investigated, where the UAV is dispatched to transmit information to multiple downlink users (DLUs) and receive signal from uplink users (ULUs) simultaneously in the existence of malicious jammers. Considering the limited battery power of the UAV and the quality of service required, 3-D trajectory, DLUs scheduling, ULUs scheduling, and uplink/downlink transmit power allocation are jointly optimized to maximize the energy efficiency of the network. However, the formulated optimization problem with high coupling variables and fractional objective function is nonconvex and therefore mathematically intractable. To address the problem, the BCD method is implemented to decompose the optimization problem into four independent subproblems. An iterative algorithm based on Dinkelbach's algorithm and successive convex approximation technique is developed to solve the problem efficiently. Numerical simulation results are presented to evaluate the performance of different schemes and demonstrate the advantages of the proposed algorithm.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1257-1268"},"PeriodicalIF":4.0,"publicationDate":"2024-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140831984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Computation Offloading and Resource Optimization for Minimizing Network-Wide Energy Consumption in Ultradense MEC Networks 联合计算卸载和资源优化,最大限度降低超密集 MEC 网络的全网能耗
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-29 DOI: 10.1109/JSYST.2024.3391811
Tianqing Zhou;Dong Qin;Xuefang Nie;Xuan Li;Nan Jiang;Chunguo Li
In this article, the orthogonal frequency-division multiple access (OFDMA) integrated with frequency spectrum (band) partitioning and equal bandwidth allocation is first introduced to mitigate the complicated, severe, and average network interferences in ultradense mobile edge computing (MEC) networks. Then, under such OFDMA, the system energy consumed by all users [mobile devices (MDs)] and base stations (BSs) is minimized to reduce the huge energy consumed by ultradense small BSs (SBSs) and prolong the standby time of MDs, jointly optimizing the spectrum partitioning factor, local and remote computation capacities, local power, and binary offloading decision. According to the coupling form of optimization parameters in the formulated problem, this problem is first cut into a joint power control and resource (frequency spectrum) partitioning (PCRP) subproblem, a joint user association, and a computation capacity optimization (UACCO) subproblem. Then, we try to design an effective iteration algorithm to attain the solutions to these problems using convex optimization methods. As for this algorithm, we give some detailed convergence, computation complexity, and simulation analyses. The simulation results show that it may achieve a guaranteed offloading performance and lower energy consumption than other existing algorithms.
本文首先介绍了正交频分多址(OFDMA)与频谱(频段)划分和等带宽分配相结合的方法,以减轻超密集移动边缘计算(MEC)网络中复杂、严重和平均的网络干扰。然后,在这种 OFDMA 下,通过联合优化频谱划分因子、本地和远程计算能力、本地功率和二进制卸载决策,使所有用户(移动设备(MD))和基站(BS)消耗的系统能量最小化,从而减少超密集小型基站(SBS)消耗的巨大能量,延长 MD 的待机时间。根据所提问题中优化参数的耦合形式,首先将该问题切割为联合功率控制和资源(频谱)分配(PCRP)子问题、联合用户关联和计算能力优化(UACCO)子问题。然后,我们尝试设计一种有效的迭代算法,利用凸优化方法获得这些问题的解决方案。对于该算法,我们给出了一些详细的收敛性、计算复杂度和仿真分析。仿真结果表明,与其他现有算法相比,该算法可以实现有保证的卸载性能和更低的能耗。
{"title":"Joint Computation Offloading and Resource Optimization for Minimizing Network-Wide Energy Consumption in Ultradense MEC Networks","authors":"Tianqing Zhou;Dong Qin;Xuefang Nie;Xuan Li;Nan Jiang;Chunguo Li","doi":"10.1109/JSYST.2024.3391811","DOIUrl":"10.1109/JSYST.2024.3391811","url":null,"abstract":"In this article, the orthogonal frequency-division multiple access (OFDMA) integrated with frequency spectrum (band) partitioning and equal bandwidth allocation is first introduced to mitigate the complicated, severe, and average network interferences in ultradense mobile edge computing (MEC) networks. Then, under such OFDMA, the system energy consumed by all users [mobile devices (MDs)] and base stations (BSs) is minimized to reduce the huge energy consumed by ultradense small BSs (SBSs) and prolong the standby time of MDs, jointly optimizing the spectrum partitioning factor, local and remote computation capacities, local power, and binary offloading decision. According to the coupling form of optimization parameters in the formulated problem, this problem is first cut into a joint power control and resource (frequency spectrum) partitioning (PCRP) subproblem, a joint user association, and a computation capacity optimization (UACCO) subproblem. Then, we try to design an effective iteration algorithm to attain the solutions to these problems using convex optimization methods. As for this algorithm, we give some detailed convergence, computation complexity, and simulation analyses. The simulation results show that it may achieve a guaranteed offloading performance and lower energy consumption than other existing algorithms.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1115-1126"},"PeriodicalIF":4.0,"publicationDate":"2024-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140831847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Systems Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1