{"title":"Investigation of Real-Time Task Scheduling on Robot Fleets with Reconfigurable Actuators","authors":"T. Smith, Spencer Ploeger, Benjamin Dyer","doi":"10.1109/SysCon48628.2021.9447134","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447134","url":null,"abstract":"Multi-Fleet Scheduling (MFS) is concerned with the issue of assigning tasks to a swarm of mobile robotic agents. In this paper, MFS of tasks using a novel class of mobile agents with reconfigurable modular actuators is proposed and analyzed. MFS is split into two regimes, static and dynamic, where the static regime does not allow real-time reconfiguration of agent actuators. Most pre-existing robotic agents are compatible with the static multi-fleet scheduling (S-MFS) regime, whereas the novel agents being investigated here are capable of using dynamic multi-fleet scheduling (D-MFS). Solutions to both problems are compared, and it is shown that in the worst case scenario, given some set of agents and tasks available at known start times, D-MFS finds the same optimal schedule as S-MFS, whereas D-MFS can be used to find more optimal solutions in some conditions. It is also shown that D-MFS may not always be optimal depending on the arrival of previously unknown a-periodic tasks, as D-MFS provides the optimal schedule for a specific fleet of robots accomplishing a set of tasks for some scheduling algorithm and cost function. By defining and exploring the D-MFS problem, this work paves the way for future investigations in task-prediction, efficient large-scale scheduling algorithms, and novel robot manufacturing capabilities.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116290356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-aware Trajectory Planning Model for Mission-oriented Drone Networks","authors":"Ying Li, Chunchao Liang","doi":"10.1109/SysCon48628.2021.9447109","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447109","url":null,"abstract":"The high mobility and easy deployment of drone networks encourage people to adopt this type of network for various projects, such as package delivery, systemic assessment, crisis control, border surveillance, etc., after equipped necessary sensors. However, the limited battery capacity largely constrains the operation time of drones. Elaborate and stringent planning is essential to succeed in mission execution energy-efficiently. We propose an energy-aware trajectory planning model for drones to accomplish all tasks in a mission-oriented network energyefficiently. Our focus in this study is on minimizing the energy spent on travel to save more energy for task execution. In our study, task lengths are not binary, which means that each task takes more than one time-unit to complete, and a drone may execute a portion of a task. To the best of our knowledge, our work is the first to introduce the energy spent on task execution to travel-cost minimization models, considering that both travel and task execution consume the battery power of drones. We also evaluate the performance of the proposed model. We found that the total-traveled distance of drones that follow the trajectories generated by the proposed model is significantly less than that of the drones that employ the strategy proposed in recent work regardless of the task length.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132113213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Single Packet AS Traceback against DoS Attacks","authors":"A. Nur, M. E. Tozal","doi":"10.1109/SysCon48628.2021.9447126","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447126","url":null,"abstract":"The Internet is every facet of our daily lives and becomes more pervasive every day. It is designed to forward packets with minimal intervention, including malicious packets. This design enables different attack types including Denial of Service (DoS), which is one of the most harmful cyber-attack types in the Internet. In this work, we propose an Autonomous System (AS) traceback packet marking scheme to infer AS level forward paths from attackers towards a victim site. We utilize the Record Route option of the IP protocol to implement our packet marking scheme. Traceback on the AS level has many advantages, including a significant reduction in the number of required packets to construct forward-paths from attackers toward a victim site, reduction in the number of routers that involves in the packet marking process, and lower packet size overhead to routers, comparing to interface level traceback. Our results show that a victim site can construct the AS level forward path from an attacker site after receiving a single packet. In our marking algorithm, we provide an encoding method to reduce the bandwidth usage. The proposed technique uses 96.91 bits on the average in the Record Route options field, whereas the unencoded version uses 153.96 bits on the average.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134088237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kádna Camboim, João Ferreira, Carlos Melo, J. Araujo, Fernanda M. R. Alencar, P. Maciel
{"title":"Dependability and Sustainability Evaluation of Data Center Electrical Architectures","authors":"Kádna Camboim, João Ferreira, Carlos Melo, J. Araujo, Fernanda M. R. Alencar, P. Maciel","doi":"10.1109/SysCon48628.2021.9447132","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447132","url":null,"abstract":"Faced with the demand to maintain the high availability of data centers (DC), companies are being pressured to seek sustainable alternatives, given that these infrastructures consume a total of 1% of all electricity worldwide [1]. In a time of pandemic (COVID-19), when the digital economy has assumed an even greater share of representativeness, DCs and telecommunications companies need to meet the requisitions of ”everything-as-a-service”. Linked to this are the large amounts of carbon dioxide (CO2) emitted into the atmosphere due to the production and consumption of energy caused by these infrastructures. Given the above, this paper proposes models of energy flow and reliability block diagrams to quantity the environmental impact from different raw materials used to feed the data center loads and computes sustainability and dependability metrics for the entire DC’s power infrastructure. According to the specifications for classifying the tiers, this study’s hybrid modeling is performed to represent four different electrical architectures. From the model evaluations, we compare whether the availability achieved corresponds to the minimum availability suggested for each tier and show the emissions of CO2 in the atmosphere for each tier over a year. Besides, we apply a parametric sensitivity analysis technique to identify the most critical components for the modeled systems’ availability.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132825598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ronierison Maciel, J. Araujo, Carlos Melo, Paulo Pereira, J. Dantas, Júlio Mendonça, P. Maciel
{"title":"Impact Evaluation of DDoS Attacks Using IoT Devices","authors":"Ronierison Maciel, J. Araujo, Carlos Melo, Paulo Pereira, J. Dantas, Júlio Mendonça, P. Maciel","doi":"10.1109/SysCon48628.2021.9447145","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447145","url":null,"abstract":"Distributed Denial-of-Service (DDoS) attacks can occur anytime, everywhere, and most normally occur with little or no warning. Most small and medium businesses (SMBs) usually are not prepared to deal with this type of attack. The companies must have at least a bandwidth higher than the attack, an infrastructure with redundant components, regular backups, and firewalls capable of monitoring the threats. Otherwise, the services provided by the companies’ support can be interrupted, increasing the chances of financial losses. Hierarchical modeling approaches are often used to evaluate the availability of such systems. It can represent different failures and repair events in distinct parts of the system. In this way, this paper proposes hierarchical models that describe the behavior of major IT systems and IoT device components and assess the DDoS effects on system availability. Therefore, we evaluate the impact of the DDoS attacks on computing systems using IoT devices in attack amplification. We assessed equations that estimate the attack feasibility, pain factor, attack propensity, attacker benefits, and technical ability. They enable a direct analytical solution for large systems. The attack tree indices show the impact of simultaneous attacks on a computer system and the several threats that will maximize the system downtime. The attack tree investigation results allow for planning and improving the system’s availability, maintainability, and reliability.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130571789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SocialSDN: Design and Implementation of a Secure Internet Protocol Tunnel Between Social Connections","authors":"Michael Lescisin, Q. Mahmoud","doi":"10.1109/SysCon48628.2021.9447117","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447117","url":null,"abstract":"End-to-end encrypted (E2EE) network services can be classified into 1) network services that provide native endto-end encryption and 2) non-encrypted services transported through secure tunnels. While the first solution of native E2EE applications lacks generality and standardization, the second option of secure tunnels shows itself to be a promising solution, yet the current state-of-the-art still possesses several drawbacks. Primarily, the current state-of-the-art for establishing a secure tunnel for arbitrary IP traffic between two or more users requires significant technical expertise. Secondly, due to side-channel effects, the current state-of-the-art for cryptographically protected network tunnels may leak sensitive information through traffic pattern analysis. Lastly, the current state-of-the-art for this type of networking lacks elegance and convenience and therefore users often settle for less secure non-E2EE services. In this paper, we present SocialSDN which utilizes concepts from social networking and software-defined networking to build a tool which addresses many of the issues holding back mass adoption of E2EE network services.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126058305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joel Muteba Kande, R. Abielmona, M. Harb, J. Berger, R. Falcon, E. Petriu
{"title":"Multi-Objective Heterogeneous Multi-Asset Collection Scheduling Optimization with High-Level Information Fusion","authors":"Joel Muteba Kande, R. Abielmona, M. Harb, J. Berger, R. Falcon, E. Petriu","doi":"10.1109/SysCon48628.2021.9447098","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447098","url":null,"abstract":"Surveillance of areas of interest through images acquisition is becoming increasingly essential for intelligence services. Several types of platforms equipped with sensors are used to collect good quality images of the areas to be monitored. The evolution of this field has different levels: some studies are only based on improving the quality of the images acquired through sensors, others on the efficiency of platforms such as satellites, aircraft and vessels which will navigate the areas of interest and yet others are based on the optimization of the trajectory of these platforms. Apart from these, intelligence organizations demonstrate an interest in carrying out such missions by sharing their resources. This paper presents a framework whose main objective is to allow intelligence organizations to carry out their observation missions by pooling their platforms with other organizations having similar or geographically close targets. This framework will use multi-objective optimization algorithms based on genetic to optimize such mission planning. Research on sensor fusion will be a key point to this paper, researchers have proven that an image resulting from the fusion of two images from different sensors can provide more information compared to original images. Given that the main goal for observation missions is to collect quality imagery, this work will also use High-Level Information Fusion to optimize mission planning based on image quality and fusion. The results of the experiments not only demonstrate the added value of this framework but also highlight its strengths (through performance metrics) as compared to other similar frameworks.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124731566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method for Self-Healing Course of Action Revision (SCOAR)","authors":"P. Hershey","doi":"10.1109/SysCon48628.2021.9447122","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447122","url":null,"abstract":"This paper describes a method for dynamically generating and modifying a mission plan, sometimes referred to as a Course of Action (COA), in real-time, during mission execution. This process is called the Method for Self-Healing Course of Action (COA) Revision (SCOAR). A key contribution of SCOAR is that of revising a COA without having to generate the COA from scratch.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"20 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129876473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements for a System Model in the Context of Digital Engineering","authors":"R. Giachetti, W. Vaneman","doi":"10.1109/SysCon48628.2021.9447088","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447088","url":null,"abstract":"The vision of achieving digital engineering in the US Department of Defense has instigated work on defining the information content and structure of the system model. However, few seem to have asked what are the requirements for the system model? In this paper, we use a requirements process to elicit and define the requirements for the system model. The system model is a digital artifact containing descriptions of all the essential objects, their properties, and the relationships between them for the system-of-interest (SoI). The paper describes the context of the system model in relationships to the other components of model-based systems engineering (MBSE) consisting of a modeling language, schema, model-based process, presentation framework, MBSE tools, and knowledgeable workforce. The paper describes how these components interact to provide effective MBSE. Requirements are stated for each component. The paper additionally derives information requirements for the system model according to the systems engineering process’s information needs by examining the inputs and outputs of each activity in the systems engineering process. Lastly, the paper derives the quality characteristics for the system model from the literature on ontologies, modeling languages, and semiotics. The result is a set of requirements for the system model to support MBSE and the digital thread.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126295635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of Deep Reinforcement Learning with Hybrid Multi-Task Learning","authors":"Nelson Vithayathil Varghese, Q. Mahmoud","doi":"10.1109/SysCon48628.2021.9447080","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447080","url":null,"abstract":"As an outcome of the technological advancements occurred within artificial intelligence (AI) domain in recent times, deep learning (DL) has been established its position as a prominent representation learning method for all forms of machine learning (ML), including the reinforcement learning (RL). Subsequently, leading to the evolution of deep reinforcement learning (DRL) which combines deep learning’s high representational learning capabilities with current reinforcement learning methods. Undoubtedly, this new direction has caused a pivotal role towards the performance optimization of intelligent RL systems designed by following model-free based methodology. optimization of the performance achieved with this methodology was majorly restricted to intelligent systems having reinforcement learning algorithms designed to learn single task at a time. Simultaneously, single task-based learning method was observed as quite less efficient in terms of data, especially when such intelligent systems required operate under too complex as well as data rich conditions. The prime reason for this was because of the restricted application of existing methods to wide range of scenarios, and associated tasks from those operating environments. One of the possible approaches to mitigate this issue is by adopting the method of multi-task learning. Objective of this research paper is to present a parallel multi-task learning (PMTL) approach for the optimization of deep reinforcement learning agents operating within two different by semantically similar environments with related tasks. The proposed framework will be built with multiple individual actor-critic models functioning within each environment and transferring the knowledge among themselves through a global network to optimize the performance.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127901015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}