IEEE Systems Journal最新文献

筛选
英文 中文
LBATSM: Load Balancing Aware Task Selection and Migration Approach in Fog Computing Environment LBATSM:雾计算环境中的负载平衡感知任务选择和迁移方法
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-06-05 DOI: 10.1109/JSYST.2024.3403673
Raj Mohan Singh;Geeta Sikka;Lalit Kumar Awasthi
{"title":"LBATSM: Load Balancing Aware Task Selection and Migration Approach in Fog Computing Environment","authors":"Raj Mohan Singh;Geeta Sikka;Lalit Kumar Awasthi","doi":"10.1109/JSYST.2024.3403673","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3403673","url":null,"abstract":"With the rapid advancement of Internet of Things technology, the field of fog computing has garnered significant attention and hence become a workable processing platform for upcoming applications. However, compared with vast computing capability of the cloud, the fog nodes have resource constraints, are heterogeneous in nature, and highly distributed. Due to the growing demand as well as diversity of applications, the nodes in a fog network become overloaded, which makes load balancing a prime concern. In this work, a load balancing aware task selection and migration approach is proposed comprising two algorithms to select and place tasks from multiple overloaded nodes to suitable destination nodes. The Selection algorithm determines the tasks that should be migrated from overloaded nodes. Placement algorithm focuses on finding a near optimal solution by applying modified binary particle swarm optimization. Specifically, the objective is to minimize execution time and transfer time of tasks. Simulation studies conducted on iFogSim prove that the suggested approach outperforms the existing approaches in terms of task execution time, task transfer time, and makespan.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"796-804"},"PeriodicalIF":4.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Connectivity Preserving Consensus for Second-Order Heterogeneous MASs With Input Constraints 有输入约束条件的二阶异构 MAS 的连接性保护共识
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-06-05 DOI: 10.1109/JSYST.2024.3403103
Lili Wang;Shiming Chen
{"title":"Connectivity Preserving Consensus for Second-Order Heterogeneous MASs With Input Constraints","authors":"Lili Wang;Shiming Chen","doi":"10.1109/JSYST.2024.3403103","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3403103","url":null,"abstract":"This article gives an investigation to the connectivity preserving consensus (CPC) issue for the second-order heterogeneous multiagent systems (MASs), which are constituted by linear and nonlinear subsystem. First, a consensus algorithm for the system without input constraints is proposed and some sufficient conditions for consensus are obtained. Due to the limited communication distance of each agent, the algorithm maintains network connectivity based on potential function techniques. Then, considering the linear and nonlinear subsystem with input constraints, respectively, the results indicate that as long as certain conditions are met, all agents can be guaranteed to achieve CPC. Furthermore, the proposed algorithm is extended to the entire system with input constraints. Five examples are provided to demonstrate efficiency of theoretical results.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1471-1480"},"PeriodicalIF":4.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized and Fault-Tolerant Task Offloading for Enabling Network Edge Intelligence 实现网络边缘智能的分散式容错任务卸载
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-06-05 DOI: 10.1109/JSYST.2024.3403696
Huixiang Zhang;Kaihua Liao;Yu Tai;Wenqiang Ma;Guoyan Cao;Wen Sun;Lexi Xu
{"title":"Decentralized and Fault-Tolerant Task Offloading for Enabling Network Edge Intelligence","authors":"Huixiang Zhang;Kaihua Liao;Yu Tai;Wenqiang Ma;Guoyan Cao;Wen Sun;Lexi Xu","doi":"10.1109/JSYST.2024.3403696","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3403696","url":null,"abstract":"Edge intelligence has recently attracted great interest from industry and academia, and it greatly improves the processing speed at the edge by moving data and artificial intelligence to the edge of the network. However, edge devices have bottlenecks in battery capacity and computing power, making it challenging to perform computing tasks in dynamic and harsh network environments. Especially in disaster scenarios, edge (rescue) devices are more likely to fail due to unreliable wireless communications and scattered rescue requests, which makes it urgent to explore how to provide low-latency, reliable services through edge collaboration. In this article, we investigate the task offloading mechanism in mobile edge computing networks, aiming to ensure fault tolerance and rapid response of computing services in dynamic and harsh scenarios. Specifically, we design a fault-tolerant distributed task offloading scheme, which minimizes task execution time and system energy consumption through the multi-agent proximal policy optimization algorithm. Furthermore, we introduce logarithmic ratio reward functions and action masking to reduce the impact of different task queue lengths while accelerating model convergence. Numerical results show that the proposed algorithm is suitable for service failure scenarios, effectively meeting the reliability requirements of tasks while simultaneously reducing system energy consumption and processing latency.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1459-1470"},"PeriodicalIF":4.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asynchronous Observer-Based Fault-Tolerant Optimal Control of Multiagent Systems 基于异步观测器的多代理系统容错优化控制
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-04-30 DOI: 10.1109/JSYST.2024.3391766
Haoyue Yang;Hao Zhang;Zhuping Wang;Chao Huang;Huaicheng Yan
{"title":"Asynchronous Observer-Based Fault-Tolerant Optimal Control of Multiagent Systems","authors":"Haoyue Yang;Hao Zhang;Zhuping Wang;Chao Huang;Huaicheng Yan","doi":"10.1109/JSYST.2024.3391766","DOIUrl":"10.1109/JSYST.2024.3391766","url":null,"abstract":"In this article, the optimal consensus problem for a class of nonlinear multiagent systems in discrete-time case is investigated under jump faults and false data injection (FDI) attacks. First, a general fault model with coefficients obeying a semi-Markov process is introduced into system dynamics. A joint state and fault observer based on the hidden semi-Markov model is designed to estimate both the agent's state and the fault signals. Sufficient conditions for the existence of observer gains are established by constructing the stochastic Lyapunov function with hidden mode, observed mode, and elapsed time dependencies. Based on the observed states, we reconstruct the local performance metric functions of agents and design a policy-value iteration algorithm to address the multiplayer game problem. Then, an neural network policy-value iteration approximation algorithm is proposed, which obtains an approximate Nash equilibrium solution of the multiplayer games. Further, a secure fault-tolerant optimal consensus controller with fault compensation and attack attenuation terms is designed to achieve optimal tracking control, and the stability of the neighbor tracking error system is rigorously demonstrated. Finally, illustrative example and comparison simulations are provided to verify the validity and applicability of the proposed results.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1402-1413"},"PeriodicalIF":4.0,"publicationDate":"2024-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140832010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficiency Maximization for UAV-Assisted Full-Duplex Communication in the Presence of Multiple Malicious Jammers 存在多个恶意干扰器时无人机辅助全双工通信的能效最大化
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-04-30 DOI: 10.1109/JSYST.2024.3390554
Zhiyu Huang;Zhichao Sheng;Ali A. Nasir;Hongwen Yu
{"title":"Energy Efficiency Maximization for UAV-Assisted Full-Duplex Communication in the Presence of Multiple Malicious Jammers","authors":"Zhiyu Huang;Zhichao Sheng;Ali A. Nasir;Hongwen Yu","doi":"10.1109/JSYST.2024.3390554","DOIUrl":"10.1109/JSYST.2024.3390554","url":null,"abstract":"A full-duplex unmanned aerial vehicle (UAV)-based communication network is investigated, where the UAV is dispatched to transmit information to multiple downlink users (DLUs) and receive signal from uplink users (ULUs) simultaneously in the existence of malicious jammers. Considering the limited battery power of the UAV and the quality of service required, 3-D trajectory, DLUs scheduling, ULUs scheduling, and uplink/downlink transmit power allocation are jointly optimized to maximize the energy efficiency of the network. However, the formulated optimization problem with high coupling variables and fractional objective function is nonconvex and therefore mathematically intractable. To address the problem, the BCD method is implemented to decompose the optimization problem into four independent subproblems. An iterative algorithm based on Dinkelbach's algorithm and successive convex approximation technique is developed to solve the problem efficiently. Numerical simulation results are presented to evaluate the performance of different schemes and demonstrate the advantages of the proposed algorithm.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1257-1268"},"PeriodicalIF":4.0,"publicationDate":"2024-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140831984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Computation Offloading and Resource Optimization for Minimizing Network-Wide Energy Consumption in Ultradense MEC Networks 联合计算卸载和资源优化,最大限度降低超密集 MEC 网络的全网能耗
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-04-29 DOI: 10.1109/JSYST.2024.3391811
Tianqing Zhou;Dong Qin;Xuefang Nie;Xuan Li;Nan Jiang;Chunguo Li
{"title":"Joint Computation Offloading and Resource Optimization for Minimizing Network-Wide Energy Consumption in Ultradense MEC Networks","authors":"Tianqing Zhou;Dong Qin;Xuefang Nie;Xuan Li;Nan Jiang;Chunguo Li","doi":"10.1109/JSYST.2024.3391811","DOIUrl":"10.1109/JSYST.2024.3391811","url":null,"abstract":"In this article, the orthogonal frequency-division multiple access (OFDMA) integrated with frequency spectrum (band) partitioning and equal bandwidth allocation is first introduced to mitigate the complicated, severe, and average network interferences in ultradense mobile edge computing (MEC) networks. Then, under such OFDMA, the system energy consumed by all users [mobile devices (MDs)] and base stations (BSs) is minimized to reduce the huge energy consumed by ultradense small BSs (SBSs) and prolong the standby time of MDs, jointly optimizing the spectrum partitioning factor, local and remote computation capacities, local power, and binary offloading decision. According to the coupling form of optimization parameters in the formulated problem, this problem is first cut into a joint power control and resource (frequency spectrum) partitioning (PCRP) subproblem, a joint user association, and a computation capacity optimization (UACCO) subproblem. Then, we try to design an effective iteration algorithm to attain the solutions to these problems using convex optimization methods. As for this algorithm, we give some detailed convergence, computation complexity, and simulation analyses. The simulation results show that it may achieve a guaranteed offloading performance and lower energy consumption than other existing algorithms.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1115-1126"},"PeriodicalIF":4.0,"publicationDate":"2024-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140831847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Complementarity and Compatibility of Systems Integration and Building Information Management 系统集成和楼宇信息管理的互补性和兼容性
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-04-23 DOI: 10.1109/JSYST.2024.3387064
Mikela Chatzimichailidou;Tim Whitcher;Nikola Suzic
{"title":"Complementarity and Compatibility of Systems Integration and Building Information Management","authors":"Mikela Chatzimichailidou;Tim Whitcher;Nikola Suzic","doi":"10.1109/JSYST.2024.3387064","DOIUrl":"10.1109/JSYST.2024.3387064","url":null,"abstract":"The introduction of building information management (BIM) to enable the management and delivery of megaprojects has illuminated the importance of system integration (SI) to coordinate and bring together complex interdependent technical and organizational systems. SI can inform and address the emerging interdependencies with BIM processes and technologies in megaprojects. Thus, in this article, we extend the theorizing of SI and BIM for the management of megaprojects in the infrastructure sector. This process involves 1) conceptualizing the complementarity and compatibility of SI and BIM in the management of megaprojects, and 2) offering an integrative framework and model of SI and BIM. Finally, we discuss and highlight this twofold contribution and offer insights into future research.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1198-1207"},"PeriodicalIF":4.0,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140806732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reference Tracking MPC for Cyber-Physical Systems Under Denial-of-Service Attacks: An Omnidirectional Robot Application 拒绝服务攻击下网络物理系统的参考跟踪 MPC:全方位机器人应用
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-04-17 DOI: 10.1109/JSYST.2024.3384372
Daotong Zhang;Peng Shi;Ramesh K. Agarwal;Levente Kovács
{"title":"Reference Tracking MPC for Cyber-Physical Systems Under Denial-of-Service Attacks: An Omnidirectional Robot Application","authors":"Daotong Zhang;Peng Shi;Ramesh K. Agarwal;Levente Kovács","doi":"10.1109/JSYST.2024.3384372","DOIUrl":"10.1109/JSYST.2024.3384372","url":null,"abstract":"This article presents a novel model predictive control (MPC) framework with an integrated disturbance observer for cyber-physical systems (CPSs) under denial-of-service (DoS) attacks. Uniquely incorporating a memory module, our MPC approach is tailored to maintain stability and security in CPS during DoS attacks, which typically disrupt communication and degrade performance. Our method stands out by addressing time-varying system uncertainties through the disturbance observer, enhancing robustness under these attack conditions. The effectiveness of our approach is validated through numerical simulations, hardware-in-the-loop experiments, and comparative analyses using an omnidirectional robot, highlighting its practical applicability and advancement over existing methods.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1248-1256"},"PeriodicalIF":4.0,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140804840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal DDoS Attack Strategy for Cyber–Physical Systems: A Multiattacker–Defender Game 网络物理系统的最佳 DDoS 攻击策略:多攻击者-防御者博弈
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-04-16 DOI: 10.1109/JSYST.2024.3381304
Hao Zhang;Jie Yao;Zhuping Wang;Sheng Gao;Huaicheng Yan
{"title":"Optimal DDoS Attack Strategy for Cyber–Physical Systems: A Multiattacker–Defender Game","authors":"Hao Zhang;Jie Yao;Zhuping Wang;Sheng Gao;Huaicheng Yan","doi":"10.1109/JSYST.2024.3381304","DOIUrl":"10.1109/JSYST.2024.3381304","url":null,"abstract":"This article studies the optimal distributed denial-of-service attack strategy for cyber–physical systems with multiple attackers and multiple defenders. An advanced attack strategy is proposed to cause the great damage to system in a multiattacker–defender form. First, a novel model of signal-to-interference-to-noise ratio for the multiattacker and multidefender is built. Taking the energy constraints into consideration, the objective of defenders is to minimize the system performance, while the attackers tend to deteriorate it by emitting interference energy. Thus, the optimal channel selection and optimal energy allocation strategies are proposed to answer which channel both of them should choose and how much power both of them should allocate to each channel in a finite time horizon. Second, a two-player zero-sum matrix game is formulated to solve the optimal problem by linear programming and obtain the Nash equilibrium. When the channel parameters are time-varying, a dynamic optimal channel selection problem is considered and a multistage game algorithm is proposed to find the Nash equilibrium. In addition, the designed optimal strategies of both players are demonstrated and analyzed. Finally, a numerical simulation is provided to illustrate the effectiveness of the proposed approach.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"929-940"},"PeriodicalIF":4.0,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140615033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security-Reliability Analysis for Adaptive Semi-Grant-Free Transmissions 自适应半无权传输的安全可靠性分析
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-04-15 DOI: 10.1109/JSYST.2024.3378699
Long Ma;Yuan Zhang
{"title":"Security-Reliability Analysis for Adaptive Semi-Grant-Free Transmissions","authors":"Long Ma;Yuan Zhang","doi":"10.1109/JSYST.2024.3378699","DOIUrl":"10.1109/JSYST.2024.3378699","url":null,"abstract":"Internet of Things (IoT) devices frequently encounter various challenges, including limited power, spectrum, and memory resources, as well as harsh environments conditions. Therefore, the development of an efficient transmission scheme is crucial for ensuring reliable and secure communication in IoT networks. In this article, an adaptive semi-grant-free (SGF) transmission scheme is proposed for reliable uplink nonorthogonal multiple access systems with enhanced security, in which a ratio-based user scheduling criterion and a hybrid successive interference cancellation technique are employed to suppress the activity of untrusted nodes while ensuring reliable transmission. To evaluate the superiority of the adaptive scheme, a conventional static transmission scheme and a worst-case eavesdropping scenario are used as benchmarks. Simulation results show that the adaptive scheme outperforms the conventional schemes in terms of outage and intercept probability. In addition, the closed-form results of grant-based user's and grant-free user's outage probability and untrusted node's intercept probability are derived. Compared to existing literature, this work provides a comprehensive view of security-reliability tradeoff analysis of SGF transmissions.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1080-1091"},"PeriodicalIF":4.0,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140582673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信