IEEE Systems Journal最新文献

筛选
英文 中文
AP Working Mode Selection and Blocklength Optimization for Industrial URLLC in Network-Assisted Full-Duplex Cell-Free Massive MIMO Systems
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-12-11 DOI: 10.1109/JSYST.2024.3507049
Zheng Sheng;Pengcheng Zhu;Peng Hao;Feng Shu;Fu-Chun Zheng
{"title":"AP Working Mode Selection and Blocklength Optimization for Industrial URLLC in Network-Assisted Full-Duplex Cell-Free Massive MIMO Systems","authors":"Zheng Sheng;Pengcheng Zhu;Peng Hao;Feng Shu;Fu-Chun Zheng","doi":"10.1109/JSYST.2024.3507049","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3507049","url":null,"abstract":"Network-assisted full-duplex (NAFD) cell-free massive multiple-input–multiple-output (MIMO) systems, which virtually achieve FD transmission by employing half-duplex access points (APs) to simultaneously serve uplink (UL) and downlink (DL) users on the same frequency bands, can decrease latency and enhance reliability since self-interference cancellation is unnecessary and macrodiversity is provided, thus helping industrial ultrareliable low-latency communication applications. In this article, we consider a monitoring scenario of industrial automation in NAFD cell-free systems using finite blocklength codewords and analyze UL and DL signals, end-to-end (E2E) delay, and E2E decoding error probability (DEP). Then, an optimization problem is formulated to minimize the maximum E2E DEP among all actuators by jointly designing AP working mode, UL and DL blocklengths under the E2E delay constraint. We propose the estimation of distribution algorithm-differential evolution (EDA-DE) method with low complexity to obtain a near-optimal solution, where the block coordinate descent is used to divide this problem into two parts. The first AP working mode selection is solved by EDA, and the second UL and DL blocklengths are designed by DE. Simulation results indicate that the performance of our proposed EDA-DE method is close to that of exhaustive search with lower computational complexity.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"188-199"},"PeriodicalIF":4.0,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prescribed-Time Target Enclosing and Tracking With Motion and Visibility Constraints
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-12-09 DOI: 10.1109/JSYST.2024.3506560
Jiayi Zheng;Shulong Zhao;Xiangke Wang
{"title":"Prescribed-Time Target Enclosing and Tracking With Motion and Visibility Constraints","authors":"Jiayi Zheng;Shulong Zhao;Xiangke Wang","doi":"10.1109/JSYST.2024.3506560","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3506560","url":null,"abstract":"This article investigates a prescribed-time method for multiple fixed-wing autonomous aerial vehicles (AAVs) to enclose and track a moving target based on relative measurements. Utilizing onboard sensors brings two main challenges, i.e., maintaining the target within the field-of-view and tracking a noncooperative target with limited information. To this end, a prescribed-time enclosing and tracking controller is proposed first, guaranteeing that multiple fixed-wing AAVs converge to the desired trajectories within a prescribed time subject to motion and visibility constraints. Then, considering the dilemma of the input saturation and prescribed-time convergence, a basis for selecting the proper prescribed time is analyzed by mathematical formulations. It is determined by different initial states and constraints rather than arbitrarily. Finally, comparison and simulation results verify the effectiveness of the proposed method within a prescribed time.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"224-233"},"PeriodicalIF":4.0,"publicationDate":"2024-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Systems Council Information IEEE系统委员会信息
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-12-04 DOI: 10.1109/JSYST.2024.3486435
{"title":"IEEE Systems Council Information","authors":"","doi":"10.1109/JSYST.2024.3486435","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3486435","url":null,"abstract":"","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 4","pages":"C3-C3"},"PeriodicalIF":4.0,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10778091","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142777550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Systems Journal Publication Information IEEE系统期刊出版信息
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-12-04 DOI: 10.1109/JSYST.2024.3486431
{"title":"IEEE Systems Journal Publication Information","authors":"","doi":"10.1109/JSYST.2024.3486431","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3486431","url":null,"abstract":"","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 4","pages":"C2-C2"},"PeriodicalIF":4.0,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10778090","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142777788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Systems Journal Information for Authors IEEE系统期刊信息作者
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-12-04 DOI: 10.1109/JSYST.2024.3486437
{"title":"IEEE Systems Journal Information for Authors","authors":"","doi":"10.1109/JSYST.2024.3486437","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3486437","url":null,"abstract":"","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 4","pages":"C4-C4"},"PeriodicalIF":4.0,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10778092","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142777897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model Predictive Control for Nonlinear Discrete Cyber–Physical Systems With Joint Deception Attacks
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-12-03 DOI: 10.1109/JSYST.2024.3482449
Hongchao Song;Zhenlei Wang
{"title":"Model Predictive Control for Nonlinear Discrete Cyber–Physical Systems With Joint Deception Attacks","authors":"Hongchao Song;Zhenlei Wang","doi":"10.1109/JSYST.2024.3482449","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3482449","url":null,"abstract":"Based on model predictive control and an attack detection mechanism, the stabilization problem of a class of nonlinear discrete-time cyber–physical systems with deception attacks at the sensor-to-controller and controller-to-actuator communication channels is studied. In this article, the deception attacks on both ends of the controller are considered using a more generic probability model. Attack detection models and mechanisms are established to detect the integrity of transmitted information in order to mitigate the impact of deception attacks. To ensure the input-to-state practical stability of the closed-loop system, a model predictive controller is designed based on the detected state. Finally, a simulation case is presented to demonstrate the stability and effectiveness of the proposed method.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"20-31"},"PeriodicalIF":4.0,"publicationDate":"2024-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast Resilience Assessment for Power Systems Under Typhoons Based on Spatial Temporal Graphs
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-12-03 DOI: 10.1109/JSYST.2024.3496754
Yuhong Zhu;Yongzhi Zhou;Yong Sun;Wei Li
{"title":"Fast Resilience Assessment for Power Systems Under Typhoons Based on Spatial Temporal Graphs","authors":"Yuhong Zhu;Yongzhi Zhou;Yong Sun;Wei Li","doi":"10.1109/JSYST.2024.3496754","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3496754","url":null,"abstract":"Despite great progress in modeling the resilience response of power systems under extreme events, it remains difficult to assess the evolutionary trend of system performance at a specific observation moment during such events. Conventional simulation-based assessment methods are typically time-consuming because a series of scenario-specific optimization problems must be solved as a prerequisite. Thus, a spatial-temporal graph-based approach is proposed for fast resilience assessment to provide timely warning information. The key factors, including observable meteorological information, component vulnerabilities, emergency dispatch, and repair strategies, are modeled in the form of matrices that depict the spatial and temporal relationships. Based on these matrices, a spatiotemporal graph neural network is developed to fit the mapping relationship between observable states and resilience indicators, which is trained offline and enables fast assessment via forward inference. Regarding the uncertainties of various extreme scenarios, the evaluation procedure combines the whole-process simulation and single-state replay technologies, which can respectively consider the uncertainties and provide deterministic data labeling for assessment. Finally, the effectiveness of the proposed method is verified on the benchmarks, including the IEEE 118-bus system and a realistic 2868-bus system.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"8-19"},"PeriodicalIF":4.0,"publicationDate":"2024-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Multiscale Formation Optimization for Multiagent Systems
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-11-28 DOI: 10.1109/JSYST.2024.3502074
Zhaoxia Peng;Bofan Wu;Guoguang Wen;Tingwen Huang;Ahmed Rahmani
{"title":"Distributed Multiscale Formation Optimization for Multiagent Systems","authors":"Zhaoxia Peng;Bofan Wu;Guoguang Wen;Tingwen Huang;Ahmed Rahmani","doi":"10.1109/JSYST.2024.3502074","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3502074","url":null,"abstract":"In this article, we study a distributed multiscale formation optimization problem for the multiagent system. The global cost function is subjected to a constraint with an aggregative item, which reveals the degree of aggregation for the multiagent system. A distributed strategy is proposed to optimize the formation configuration at multiple scales, including the position, angle, and size of the formation configuration. The strategy first employs observation and parameter projection technologies to search for the optimal size. Then, it utilizes the gradient and moment to optimize the position and angle of the formation configuration synchronously. Finally, some simulation results are provided to verify the proposed strategy.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"339-342"},"PeriodicalIF":4.0,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance-Based Cascading Failure Analysis of Cross-Domain Unmanned Combat System Considering Logistic Support 考虑后勤保障的跨域无人作战系统性能级联失效分析
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-11-19 DOI: 10.1109/JSYST.2024.3476167
Tianwen Zhang;Guanghan Bai;Yunxiao Lv;Shuai Zhang;Junyong Tao
{"title":"Performance-Based Cascading Failure Analysis of Cross-Domain Unmanned Combat System Considering Logistic Support","authors":"Tianwen Zhang;Guanghan Bai;Yunxiao Lv;Shuai Zhang;Junyong Tao","doi":"10.1109/JSYST.2024.3476167","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3476167","url":null,"abstract":"Failure modeling and analysis are essential to the reliable and safe operation of unmanned combat system, which ultimately influence the success of a mission. Previous studies mainly focus on failure modeling and analysis of unmanned systems in a single domain, where synergy of cross-domain unmanned combat has rarely been considered. In this study, a multilayered heterogeneous network model for cross-domain unmanned combat system has been developed. In addition, the logistic support, which is another key aspect of any combat is incorporated. Given the interdependencies among the layers considering logistic support and cross-domain synergy, importance measure-based malicious attack model is proposed to reflect the intensive dynamics and high uncertainties under modern combat environment. Then, cascading failure analysis based on load-capacity model is conducted, which provides a load redistribution method considering cross-domain synergy. Finally, a case study is given for demonstration and verification, where the number of kill chains and load entropy are adopted as performance indicators.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 4","pages":"2109-2120"},"PeriodicalIF":4.0,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142777893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Note on “An Anonymous and Certificateless Identity Authentication Protocol for Mobile Edge Computing” 关于“移动边缘计算的匿名和无证书身份认证协议”的说明
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-11-19 DOI: 10.1109/JSYST.2024.3490536
Lihua Liu
{"title":"A Note on “An Anonymous and Certificateless Identity Authentication Protocol for Mobile Edge Computing”","authors":"Lihua Liu","doi":"10.1109/JSYST.2024.3490536","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3490536","url":null,"abstract":"We show that the authentication protocol (Ma and Cheng [10]) fails to keep user anonymity, not as claimed. We suggest a method to fix it. Besides, we find there is a flawed equality, in which some terms are inaccessible to the user. This flaw results in the failure for the user to finish his computations. We also suggest a method to fix this mistake.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 4","pages":"2169-2172"},"PeriodicalIF":4.0,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142777517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信