{"title":"Belief Connection Reliability Algorithm for Networks With Epistemic Uncertainty","authors":"Ji Ma;Yu Wang;Ruiying Li;Rui Kang","doi":"10.1109/TR.2024.3465548","DOIUrl":"https://doi.org/10.1109/TR.2024.3465548","url":null,"abstract":"Connection reliability, which describes the capability that paths exist between specified nodes in a network, has been widely studied. However, the states of both the network and its nodes/edges have epistemic uncertainty owing to the lack of data and information, which makes existing connection reliability assessment methods unacceptable. To solve this problem, this article proposes a new connection reliability based on uncertainty theory: Belief connection reliability. Considering different node connection requirements, we define two belief connection reliability metrics as single-node-pair belief connection reliability (SBCR) and multi-node-pair belief connection reliability (MBCR). Based on the uncertain graph, an extended uncertain graph is built to model networks whose nodes and edges' existence has epistemic uncertainty, and two algorithms are proposed to compute SBCR and MBCR based on finding the most reliable connection path. Finally, a comparison study on a small network is used to illustrate the correctness of the proposed method, and the Belgian telephone interzonal network is used as a case to indicate the effectiveness of our network model and algorithms.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 2","pages":"2955-2967"},"PeriodicalIF":5.0,"publicationDate":"2024-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144205939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UAV-Enabled Energy-Efficient Aerial Computing: A Federated Deep Reinforcement Learning Approach","authors":"Qianqian Wu;Qiang Liu;Ying He;Zefan Wu","doi":"10.1109/TR.2024.3480117","DOIUrl":"https://doi.org/10.1109/TR.2024.3480117","url":null,"abstract":"Aerial computing paradigms, particularly those involving UAVs as access points and radio towers, show significant promise for local data analysis and real-time service provision in aerial access networks. However, the limited battery life of UAVs, compounded by the high-energy demands of communication tasks and prolonged computation delays, presents a significant challenge. Deep reinforcement learning (DRL) enables UAVs to autonomously optimize their operations, reducing both energy consumption and latency. Nevertheless, the prolonged learning process of DRL can lead to inefficiencies, especially in dynamic environments where the equitable participation of UAVs is crucial. To address these issues, we introduce a fairness-oriented federated learning (FL) scheme that employs importance sampling to select UAVs for training, ensuring equitable utilization of each UAV's data. Furthermore, we integrate this FL fairness scheme into the design of DRL algorithms, termed FedDRL. This algorithm jointly optimizes the computation capabilities and bandwidth allocation of UAVs to minimize system costs. Numerical results demonstrate the fairness of FedDRL in fFL networks. Specifically, compared to other state-of-the-art DRL algorithms (e.g., TD3 and DDPG), FedDRL reduces system costs by 43.82% and 49.45%, respectively.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3559-3572"},"PeriodicalIF":5.7,"publicationDate":"2024-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Designs of Multiple Step-Stress Accelerated Life Tests for One-Shot Devices With Weibull Lifetime Distributions","authors":"Man Ho Ling","doi":"10.1109/TR.2024.3480969","DOIUrl":"https://doi.org/10.1109/TR.2024.3480969","url":null,"abstract":"Step-stress accelerated life tests have gained increased attention in industry and academia as a method to induce rapid product failures and gather more failure data for reliability analysis. This article presents the optimal step-stress accelerated life testing design with multiple stress levels for one-shot devices, which are designed for single-use and subsequent disposal. The proposed approach determines the optimal inspection times and allocation of test items at different stress levels to minimize the asymptotic variance of the maximum likelihood estimator of the reliability at a specific mission time under normal operating conditions, assuming Weibull lifetime distributions. One of the key contributions of this article is that the constrained optimization problem is reformulated as unconstrained, enabling the use of standard optimization techniques. A real case study of grease-based magnetorheological fluids is used to demonstrate the practicality of the proposed optimal design approach. The results indicate that a step-stress accelerated life test with three stress levels and gradually decreasing temperature levels is recommended for the reliability assessment. This article challenges the conventional assumption that step-stress accelerated life testing designs with increasing stress levels are always the most efficient approach. The proposed framework provides a useful tool for designing efficient step-stress accelerated life tests to evaluate the reliability of one-shot devices.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3017-3027"},"PeriodicalIF":5.7,"publicationDate":"2024-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10737405","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144996099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electronic Reliability and Error Performance Analysis of RIS-Aided Communication Networks","authors":"Atiquzzaman Mondal;Keshav Singh;Sudip Biswas","doi":"10.1109/TR.2024.3481231","DOIUrl":"https://doi.org/10.1109/TR.2024.3481231","url":null,"abstract":"This article explores the critical aspect of electronic hardware reliability analysis in reconfigurable intelligent surface (RIS)-aided networks within the context of sixth-generation (6G) communications. Recognizing the potential vulnerabilities of metasurfaces to environmental factors, we highlight the continuous hardware impairments that can significantly impact the electromagnetic properties of RISs, reducing their lifetime. Extending the life cycle of RISs is strategically important, especially in mission-critical ultra-reliable wireless applications where system failures can result in significant costs and, in extreme cases, necessitate structural replacements. Accordingly, we investigate the nonresidual continuous hardware degradation of RISs through a stochastic process and optimize maintenance strategies using statistical information to extend the RIS system's lifespan. The optimal life expectancy of the RIS system with systematic maintenance concerning the observed impairment level is demonstrated through analytical results. The findings indicate that the information-based framework can significantly extend the expected life of a RIS system by postponing maintenance. Furthermore, a comprehensive mathematical framework for reliable communication is introduced, whereby the distribution of the received SINR is determined in the presence of hardware impairment due to imperfect maintenance. Through extensive numerical simulations, the efficacy and robustness of the proposed framework under hardware impairments are illustrated.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3708-3717"},"PeriodicalIF":5.7,"publicationDate":"2024-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CoExpMiner: An AHIN-Based Vulnerability Co-Exploitation Mining Framework","authors":"Shuyi Jiang;Cheng Huang;Jiaxuan Han","doi":"10.1109/TR.2024.3470132","DOIUrl":"https://doi.org/10.1109/TR.2024.3470132","url":null,"abstract":"Vulnerability is a significant security threat to information systems, drawing widespread concern from researchers. In recent years, owing to continuous advancements in defense technologies, the success rate of exploiting a single N-day vulnerability for attacking has gradually decreased. Attackers are now attempting to exploit multiple vulnerabilities simultaneously to achieve their objectives. This phenomenon is referred to as the vulnerability co-exploitation. Limited by strict vulnerability triggering conditions, successful attacks via vulnerability co-exploitation are infrequent. Due to the low proportion of co-exploitation cases among all vulnerabilities, few studies have focused on co-exploitation relationships or investigated co-exploitation under the condition of extreme data imbalance. In additon, existing work lacks sufficient multidimensional features, which are crucial for accurately identifying and understanding co-exploitation scenarios. However, the prediction of vulnerability co-exploitation remains valuable as it aids practitioners in identifying potential critical risk points within the system. In this article, we propose a framework named CoExpMiner, based on the attributed heterogeneous information network, for mining potential vulnerability co-exploitation under the extreme data imbalance condition. CoExpMiner utilizes structure and attribute features of the attributed heterogeneous graph to predict vulnerability co-exploitation, with employing a prefilter structure to accelerate the process and reduce the computational cost. Experimental results demonstrate that CoExpMiner can effectively predict co-exploitation despite the challenges posed by extreme data imbalance.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 2","pages":"2613-2625"},"PeriodicalIF":5.0,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144206119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Synthesis-Component-Based GO-FLOW Modeling Paradigm for Automated Time-Dependent and Phased-Mission Reliability Model Generation and Analysis","authors":"Zhanyu He;Jun Yang;Yongyue Chu","doi":"10.1109/TR.2024.3462451","DOIUrl":"https://doi.org/10.1109/TR.2024.3462451","url":null,"abstract":"Automatic modeling is an efficient way to ensure the consistency and validity of system reliability and risk models. In this article, an innovative synthesis-component-based modeling paradigm is proposed for automated GO-FLOW model generation from piping and instrumentation diagrams. Within the automata modeling paradigm, a collection of componentized GO-FLOW models for general types and common failure modes of components is first developed to facilitate model transformation mapping. Then, an algorithmic procedure for automated GO-FLOW model generation is elaborated and extended for configuration risk management. Finally, the algorithmic paradigm is demonstrated and verified through comparisons among three different modeling strategies applying to a case study of a simplified safety injection system in pressurized water reactor designs. The comparison results show that the component-based GO-FLOW modeling paradigm is capable of efficient reliability modeling and analysis of time-dependent and phased-mission systems. The consistency, accuracy, and credibility of system reliability and risk models can be effectively guaranteed for configuration risk management with the unified and standardized component-based GO-FLOW modeling paradigm. The automated GO-FLOW model builder is also supportive for reliability-based system design optimization.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3681-3694"},"PeriodicalIF":5.7,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BFKD: Blockchain-Based Federated Knowledge Distillation for Aviation Internet of Things","authors":"Wu Deng;Xinyan Li;Junjie Xu;Weihan Li;Guangtian Zhu;Huimin Zhao","doi":"10.1109/TR.2024.3474710","DOIUrl":"https://doi.org/10.1109/TR.2024.3474710","url":null,"abstract":"Aviation Internet of Things (AIoT) data sharing can create tremendous value for participants. With the development of AIoT and intelligent civil aviation, data security and privacy protection have become more prominent. To improve the data security and privacy of AIoT, and allow heterogeneous devices to participate in federated training, in this article, a blockchain-based federated knowledge distillation (BFKD) is proposed. First, federated knowledge distillation is used for knowledge transferring between clients to protect client data privacy. Second, a clustering algorithm is used to select aggregated soft labels to enhance Byzantine resistance. Finally, the consortium blockchain validates the data exchange process of federated knowledge distillation. In addition, a federated score grouping practical Byzantine fault-tolerant algorithm is proposed for improving consensus efficiency and to encourage participants to contribute more public data and honestly participate in federated training. Theoretical analysis and experimental results show that BFKD boasts high data mining performance and communication efficiency while safeguarding data privacy and security.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 2","pages":"2626-2639"},"PeriodicalIF":5.0,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144206012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inference of Historical Abusive Operations on Li-Ion Batteries Using Series Voltage Synchronicity","authors":"Jiale Xie;Yuankai Li;Zongshang Hou;Kailong Liu;Fei Feng","doi":"10.1109/TR.2024.3479418","DOIUrl":"https://doi.org/10.1109/TR.2024.3479418","url":null,"abstract":"To guarantee the safety of electric vehicles (EVs), abusive operations should be strictly prohibited for EV-mounted li-ion batteries (LiBs). This article proposes an intelligent strategy to infer the historical abusive operations (HAOs) on LiBs by retrospectively analyzing the relationship between HAO-induced damages and electrical behaviors. First, the electrical synchronicity among the peer LiB cells in a series module is perceived using an improved correlation coefficient formula; then the synchronicity sequences are translated into recurrence plot images (RCPIs) and Gramian angular field images (GAFIs) that can provide a wealth of textures regarding cross-time autocorrelations. Second, based on the hierarchical clustering algorithm, a pilot test is performed to preliminarily examine the separability of these images corresponding to different HAOs. Finally, the GoogLeNet model is employed to model the causality between image features and HAO specifics, whereby the type and intensity of potential HAO can be inferred. A realistic dataset is obtained by inflicting abuses such as overvoltage, overheat, and vibration on LiB cells. Experimental verifications show that the proposed strategy performs well in backtracking the HAOs on LiBs by providing effective and reliable inferences on HAO specifics. The accuracy rates of HAO type assessment and severity evaluation can achieve about 77% and 76% using RCPIs, and about 79% and 76% using GAFIs, respectively.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3977-3989"},"PeriodicalIF":5.7,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Priscila Silva;Gaspard Baye;Mindy Hotchkiss;Gokhan Kul;Nathaniel D. Bastian;Lance Fiondella
{"title":"Regression and Time Series Mixture Approaches to Predict System Performance and Assess Resilience","authors":"Priscila Silva;Gaspard Baye;Mindy Hotchkiss;Gokhan Kul;Nathaniel D. Bastian;Lance Fiondella","doi":"10.1109/TR.2024.3471409","DOIUrl":"https://doi.org/10.1109/TR.2024.3471409","url":null,"abstract":"Resilience engineering is the ability to design, build, and sustain systems that can deal effectively with disruptive events. Previous research focused on resilience models that were not designed to predict multiple disruptions and recoveries, and resilience metrics, which are typically calculated after disruptions. Therefore, this article introduces a new approach combining regression and time series methods to track and predict system performance under multiple shocks, offering a framework for planning resilience tests and guiding data collection applicable to various systems and processes. To illustrate, subsets ranging from 50% to 80% of a historical job loss dataset from the 1980 U.S. recession were used for model fitting to assess generalization and stability. Goodness-of-fit measures, confidence intervals, and resilience metrics validated this approach against established statistical methods and a neural network model. The results indicate that traditional statistical models fail to capture minor changes when fitted with small datasets, and neural networks are overly sensitive to the size of the training data. In contrast, the novel mixture approach considering immediate and delayed disruptions exhibits superior long-term predictive performance and greater accuracy in forecasting resilience metrics, even when only 50% of the data is used for model fitting.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3002-3016"},"PeriodicalIF":5.7,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Travis M. Grile;Christine M. Schubert Kabban;Robert A. Bettinger
{"title":"Improved Methods for Distribution Identification and Regression Parameter Estimation in a Satellite Reliability Application","authors":"Travis M. Grile;Christine M. Schubert Kabban;Robert A. Bettinger","doi":"10.1109/TR.2024.3428934","DOIUrl":"https://doi.org/10.1109/TR.2024.3428934","url":null,"abstract":"This article expands the methods for analyzing satellite reliability by presenting a framework of measures to determine the best statistical distribution to use in data parameterization, and applying robust regression to improve the fit of the Weibull distribution in the regression parameterization method when data outliers are present. The distribution identification framework is defined by four statistical goodness-of-fit measures, while the robust regression methodology is developed through comparing how least-squares and iteratively reweighted least squares robust linear regression can parameterize satellite reliability data. Both of these methodologies are then applied to deep space satellite reliability data to evaluate their performance. All four measures comprising the distributional assessment framework show agreement by selecting the Weibull distribution. These results serve as a proof of concept for the framework and warrant its inclusion in future satellite reliability studies. Robust regression's use in the regression parameterization method in the presence of outliers yielded positive results. Specifically, improvement is indicated through visual inspection of the resulting Weibull distribution, and by closer agreement of the robust regression Weibull parameters to the MLE parameters than the least-squares regression parameters. Ultimately, the improved fit produced by the use of robust regression in the regression parameterization method justifies its increased computational complexity as compared to traditional least-squares regression. Incorporation of these methods and framework provides quantitative enhancements to distribution fitting and parameter estimation in satellite reliability studies.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 2","pages":"2792-2804"},"PeriodicalIF":5.0,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144205966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}