IEEE Systems Journal最新文献

筛选
英文 中文
Complementarity and Compatibility of Systems Integration and Building Information Management 系统集成和楼宇信息管理的互补性和兼容性
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-04-23 DOI: 10.1109/JSYST.2024.3387064
Mikela Chatzimichailidou;Tim Whitcher;Nikola Suzic
{"title":"Complementarity and Compatibility of Systems Integration and Building Information Management","authors":"Mikela Chatzimichailidou;Tim Whitcher;Nikola Suzic","doi":"10.1109/JSYST.2024.3387064","DOIUrl":"10.1109/JSYST.2024.3387064","url":null,"abstract":"The introduction of building information management (BIM) to enable the management and delivery of megaprojects has illuminated the importance of system integration (SI) to coordinate and bring together complex interdependent technical and organizational systems. SI can inform and address the emerging interdependencies with BIM processes and technologies in megaprojects. Thus, in this article, we extend the theorizing of SI and BIM for the management of megaprojects in the infrastructure sector. This process involves 1) conceptualizing the complementarity and compatibility of SI and BIM in the management of megaprojects, and 2) offering an integrative framework and model of SI and BIM. Finally, we discuss and highlight this twofold contribution and offer insights into future research.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1198-1207"},"PeriodicalIF":4.0,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140806732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reference Tracking MPC for Cyber-Physical Systems Under Denial-of-Service Attacks: An Omnidirectional Robot Application 拒绝服务攻击下网络物理系统的参考跟踪 MPC:全方位机器人应用
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-04-17 DOI: 10.1109/JSYST.2024.3384372
Daotong Zhang;Peng Shi;Ramesh K. Agarwal;Levente Kovács
{"title":"Reference Tracking MPC for Cyber-Physical Systems Under Denial-of-Service Attacks: An Omnidirectional Robot Application","authors":"Daotong Zhang;Peng Shi;Ramesh K. Agarwal;Levente Kovács","doi":"10.1109/JSYST.2024.3384372","DOIUrl":"10.1109/JSYST.2024.3384372","url":null,"abstract":"This article presents a novel model predictive control (MPC) framework with an integrated disturbance observer for cyber-physical systems (CPSs) under denial-of-service (DoS) attacks. Uniquely incorporating a memory module, our MPC approach is tailored to maintain stability and security in CPS during DoS attacks, which typically disrupt communication and degrade performance. Our method stands out by addressing time-varying system uncertainties through the disturbance observer, enhancing robustness under these attack conditions. The effectiveness of our approach is validated through numerical simulations, hardware-in-the-loop experiments, and comparative analyses using an omnidirectional robot, highlighting its practical applicability and advancement over existing methods.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1248-1256"},"PeriodicalIF":4.0,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140804840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal DDoS Attack Strategy for Cyber–Physical Systems: A Multiattacker–Defender Game 网络物理系统的最佳 DDoS 攻击策略:多攻击者-防御者博弈
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-04-16 DOI: 10.1109/JSYST.2024.3381304
Hao Zhang;Jie Yao;Zhuping Wang;Sheng Gao;Huaicheng Yan
{"title":"Optimal DDoS Attack Strategy for Cyber–Physical Systems: A Multiattacker–Defender Game","authors":"Hao Zhang;Jie Yao;Zhuping Wang;Sheng Gao;Huaicheng Yan","doi":"10.1109/JSYST.2024.3381304","DOIUrl":"10.1109/JSYST.2024.3381304","url":null,"abstract":"This article studies the optimal distributed denial-of-service attack strategy for cyber–physical systems with multiple attackers and multiple defenders. An advanced attack strategy is proposed to cause the great damage to system in a multiattacker–defender form. First, a novel model of signal-to-interference-to-noise ratio for the multiattacker and multidefender is built. Taking the energy constraints into consideration, the objective of defenders is to minimize the system performance, while the attackers tend to deteriorate it by emitting interference energy. Thus, the optimal channel selection and optimal energy allocation strategies are proposed to answer which channel both of them should choose and how much power both of them should allocate to each channel in a finite time horizon. Second, a two-player zero-sum matrix game is formulated to solve the optimal problem by linear programming and obtain the Nash equilibrium. When the channel parameters are time-varying, a dynamic optimal channel selection problem is considered and a multistage game algorithm is proposed to find the Nash equilibrium. In addition, the designed optimal strategies of both players are demonstrated and analyzed. Finally, a numerical simulation is provided to illustrate the effectiveness of the proposed approach.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"929-940"},"PeriodicalIF":4.0,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140615033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security-Reliability Analysis for Adaptive Semi-Grant-Free Transmissions 自适应半无权传输的安全可靠性分析
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-04-15 DOI: 10.1109/JSYST.2024.3378699
Long Ma;Yuan Zhang
{"title":"Security-Reliability Analysis for Adaptive Semi-Grant-Free Transmissions","authors":"Long Ma;Yuan Zhang","doi":"10.1109/JSYST.2024.3378699","DOIUrl":"10.1109/JSYST.2024.3378699","url":null,"abstract":"Internet of Things (IoT) devices frequently encounter various challenges, including limited power, spectrum, and memory resources, as well as harsh environments conditions. Therefore, the development of an efficient transmission scheme is crucial for ensuring reliable and secure communication in IoT networks. In this article, an adaptive semi-grant-free (SGF) transmission scheme is proposed for reliable uplink nonorthogonal multiple access systems with enhanced security, in which a ratio-based user scheduling criterion and a hybrid successive interference cancellation technique are employed to suppress the activity of untrusted nodes while ensuring reliable transmission. To evaluate the superiority of the adaptive scheme, a conventional static transmission scheme and a worst-case eavesdropping scenario are used as benchmarks. Simulation results show that the adaptive scheme outperforms the conventional schemes in terms of outage and intercept probability. In addition, the closed-form results of grant-based user's and grant-free user's outage probability and untrusted node's intercept probability are derived. Compared to existing literature, this work provides a comprehensive view of security-reliability tradeoff analysis of SGF transmissions.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1080-1091"},"PeriodicalIF":4.0,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140582673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Completely Distributed Secure Consensus for Multiagent Systems With a General Directed Graph Under Interaction Link Attacks 交互链接攻击下具有一般有向图的多代理系统的完全分布式安全共识
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-04-15 DOI: 10.1109/JSYST.2024.3381914
Miao Zhao;Jianxiang Xi;Le Wang;Kehan Xia;Yuanshi Zheng
{"title":"Completely Distributed Secure Consensus for Multiagent Systems With a General Directed Graph Under Interaction Link Attacks","authors":"Miao Zhao;Jianxiang Xi;Le Wang;Kehan Xia;Yuanshi Zheng","doi":"10.1109/JSYST.2024.3381914","DOIUrl":"10.1109/JSYST.2024.3381914","url":null,"abstract":"This article investigates completely distributed secure consensus control (SCC) of high-order linear and Lipschitz nonlinear multiagent systems (MASs) in the presence of interaction link attacks, respectively, where the design criteria are independent of the interaction topology and the parameters of interaction link attacks. An estimator-based adaptive SCC protocol is proposed to realize SCC, where coupling weights of the virtual distributed reference state estimator (VDRSE) are adaptively adjusted to eliminate the impacts of interaction link attacks. Then, the leader–follower and leaderless structures are unified into a general directed graph framework by decomposing the Laplacian matrix in terms of the root node and nonroot node, and sufficient conditions for VDRSEs achieving reference state consensus and high-order linear MASs achieving SCC are given, respectively. Moreover, main results of high-order linear MASs are extended to Lipschitz nonlinear MASs. Finally, two numerical examples are presented in order to validate the theoretical results.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1380-1391"},"PeriodicalIF":4.0,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140582896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GDOP-Based Low-Complexity LEO Satellite Subset Selection for Positioning 基于 GDOP 的低复杂度低地轨道卫星定位子集选择
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-04-12 DOI: 10.1109/JSYST.2024.3383092
Kyeongjun Ko;M. Humayun Kabir;Jungtai Kim;Wonjae Shin
{"title":"GDOP-Based Low-Complexity LEO Satellite Subset Selection for Positioning","authors":"Kyeongjun Ko;M. Humayun Kabir;Jungtai Kim;Wonjae Shin","doi":"10.1109/JSYST.2024.3383092","DOIUrl":"10.1109/JSYST.2024.3383092","url":null,"abstract":"Low Earth orbit (LEO) satellites have recently received considerable attention because they can provide stronger signal power and better bandwidth availability than medium Earth orbit or geosynchronous orbit satellites. However, due to the limited processing capability of a receiver, it is difficult to utilize all the measurements of the available satellites in view when the number of satellites is large. With this motivation, selecting a subset of satellites that are in a good geometry relative to the receiver for precise positioning among a large number of available LEO constellations represents a challenging yet significant problem. Geometric dilution of precision (GDOP) is a metric that provides useful information about the relative geometry between satellites and a receiver. In this study, we put forth a novel GDOP-based satellite selection algorithm that uses efficient matrix decomposition and update rule. Simulation results show that the proposed algorithm achieves a GDOP performance close to the optimal exhaustive search-based schemes while greatly reducing the computational complexity. In particular, the computational complexity is verified in terms of flop counts as well as numerical evaluations.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"989-996"},"PeriodicalIF":4.0,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140582892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Robust Demand Regulation Strategy for DERs in a Single-Controllable Active Distribution Network 单一可控有源配电网络中 DER 的稳健需求调节策略
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-04-10 DOI: 10.1109/JSYST.2024.3379856
Shah Fahad;Arman Goudarzi;Rui Bo;Muhammad Waseem;Rashid Al-Ammari;Atif Iqbal
{"title":"A Robust Demand Regulation Strategy for DERs in a Single-Controllable Active Distribution Network","authors":"Shah Fahad;Arman Goudarzi;Rui Bo;Muhammad Waseem;Rashid Al-Ammari;Atif Iqbal","doi":"10.1109/JSYST.2024.3379856","DOIUrl":"10.1109/JSYST.2024.3379856","url":null,"abstract":"Over the past decade, PQ regulation schemes for a single-controllable active distribution network (ADN) using coordination among a network of virtual synchronous generators (VSGs) have been proposed. However, considering the variable nature of intermittent renewable energy sources (IRESs), coupling a cluster of IRESs with the point of common coupling (PCC) of ADN could inflict transient issues for the power management of the whole ADN. To counter these challenges, the proposed study has three main objectives: 1) To propose a modified mathematical model that represents the apparent resistance-reactance at the PCC of ADN in relation to the PQ coordination among the network of VSGs; 2) to utilize the proposed model for deriving a \u0000<inline-formula><tex-math>$mu$</tex-math></inline-formula>\u0000 synthesis-based robust controller that overcomes the uncertainty in the moment of inertia response of all the VSGs; 3) and to present the stability and performance analysis of the proposed controller validated under model uncertainty. Validation of the proposed method and its comparison to the state-of-the-art methods in MATLAB/Simulink environment confirms that the proposed method significantly minimizes the impact of disturbances on the power management of the whole ADN.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1162-1173"},"PeriodicalIF":4.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140582983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient and Flexible Component Placement for Serverless Computing 为无服务器计算提供高效灵活的组件布局
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-04-09 DOI: 10.1109/JSYST.2024.3381590
Shouxi Luo;Ke Li;Huanlai Xing;Pingzhi Fan
{"title":"Efficient and Flexible Component Placement for Serverless Computing","authors":"Shouxi Luo;Ke Li;Huanlai Xing;Pingzhi Fan","doi":"10.1109/JSYST.2024.3381590","DOIUrl":"10.1109/JSYST.2024.3381590","url":null,"abstract":"Nowadays, serverless computing has been widely employed and viewed as the new paradigm of cloud computing. Technically, serverless applications are made up of function components, which are packaged as specific layered files named container images. In production, different components are designed to partially share layers, and during the deployment, the hosting servers have to download the missing layers first, which might dominate the application startup delay. In this article, we look into optimizing the deployment of serverless applications under the operational goals of \u0000<italic>energy saving</i>\u0000 and \u0000<italic>load balance</i>\u0000, by exploring the reusability among involved container images to conduct content-aware component placements explicitly. We find that the two involved optimization problems can be formulated as \u0000<italic>multi-objective (mixed-)integer linear programs</i>\u0000, and prove that their common building block of minimizing the weighted sum of deployment cost for a given set of serverless components is non-deterministic polynomial (NP)-hard. To be practical, we develop an efficient yet flexible heuristic solution named best fit greedy placement (BFGP), which involves three variants BFGP-Full, BFGP-ES, and BFGP-LB for the problem. Performance studies show that BFGP is effective, expressive, and efficient. It not only achieves near-optimal placement very efficiently but also supports high-level operational policies, such as \u0000<italic>energy saving</i>\u0000 and \u0000<italic>load balance</i>\u0000.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1104-1114"},"PeriodicalIF":4.0,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140582669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Communication in UAV–RIS-Empowered Multiuser Networks: Joint Beamforming, Phase Shift, and UAV Trajectory Optimization 无人机-RIS-多用户网络中的安全通信:联合波束成形、相移和无人机轨迹优化
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-04-08 DOI: 10.1109/JSYST.2024.3379456
Abuzar B. M. Adam;Mohamed Amine Ouamri;Xiaoyu Wan;Mohammed Saleh Ali Muthanna;Reem Alkanhel;Ammar Muthanna;Xingwang Li
{"title":"Secure Communication in UAV–RIS-Empowered Multiuser Networks: Joint Beamforming, Phase Shift, and UAV Trajectory Optimization","authors":"Abuzar B. M. Adam;Mohamed Amine Ouamri;Xiaoyu Wan;Mohammed Saleh Ali Muthanna;Reem Alkanhel;Ammar Muthanna;Xingwang Li","doi":"10.1109/JSYST.2024.3379456","DOIUrl":"10.1109/JSYST.2024.3379456","url":null,"abstract":"In this article, we study the secure communication in unmanned aerial vehicle (UAV) aided and reconfigurable intelligent surface (RIS) empowered multiuser networks. In the proposed configuration, we consider UAV-mounted RIS to reflect the signal between the base station and the legitimate users in the presence of eavesdroppers. The problem is formulated as secrecy rate maximization with channel uncertainty constraints, which is nonconvex. Therefore, we decouple it into beamforming, phase shift, and UAV trajectory subproblems which are jointly optimized. For the beamforming and phase shift subproblems, we apply S-procedure and general sign-definiteness to transform them into tractable forms. And for the UAV trajectory, we unroll the constraints and apply first-order Taylor transform and the difference of two convex functions (DC) to obtain a relaxed convex problem that can be numerically solved. The proposed solution show effectiveness and improved the secrecy rate of the network.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1009-1019"},"PeriodicalIF":4.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140582990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Feedback-Aided Hybrid Random Access for mURLLC Service Over Cell-Free Networks 无蜂窝网络上用于 mURLLC 服务的自适应反馈辅助混合随机接入
IF 4 3区 计算机科学
IEEE Systems Journal Pub Date : 2024-04-02 DOI: 10.1109/JSYST.2024.3379281
Jie Wang;Jiamin Li;Pengcheng Zhu;Dongming Wang;Bin Sheng;Xiaohu You
{"title":"Adaptive Feedback-Aided Hybrid Random Access for mURLLC Service Over Cell-Free Networks","authors":"Jie Wang;Jiamin Li;Pengcheng Zhu;Dongming Wang;Bin Sheng;Xiaohu You","doi":"10.1109/JSYST.2024.3379281","DOIUrl":"10.1109/JSYST.2024.3379281","url":null,"abstract":"As dominating 6G-standard service, massive ultrareliable low-latency communications (mURLLC) strive to meet the strict requirements of massive users on latency and error rate. Compared with the traditional grant-based random access (GBRA), the grant-free random access (GFRA) allows users to directly transmit data, which avoid heavy signaling overhead and reduce delay. However, pilot collision interference resulting from uncoordinated resource selection in GFRA leads to serious transmission failure, especially in mURLLC scenarios. Therefore, this article proposes an adaptive feedback-aided hybrid random access mechanism based on the advantages of GBRA and GFRA in cell-free networks. In the proposed mechanism, the feedback factors inserted between pilot and data not only make different access policies for massive users in real time, but also achieve an acceptable tradeoff among signaling overhead, access success probability and access delay. The spatial sparsity of cell-free networks is further utilized to solve the pilot collision and improve the successful access probability. The simulation results demonstrate that the proposed hybrid random access mechanism can improve access throughout with lower signaling overhead and better meet the requirements of mURLLC.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1269-1276"},"PeriodicalIF":4.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信