Computational resource configuration analysis and optimization methods for unmanned system considering intended functionality safety

Zhiwei CHEN , Luogeng ZHANG , Jiayun CHU , Xiaotong FANG , Hongyan DUI

Front. Eng ›› 2025, Vol. 12 ›› Issue (4) : 1196 -1219.

PDF (5038KB)
Front. Eng ›› 2025, Vol. 12 ›› Issue (4) : 1196 -1219. DOI: 10.1007/s42524-025-4173-4
Systems Engineering Theory and Application
RESEARCH ARTICLE

Computational resource configuration analysis and optimization methods for unmanned system considering intended functionality safety

Author information +
History +
PDF (5038KB)

Abstract

With the rapid expansion of unmanned system capabilities, integrating and sharing computing resources has become essential. In addition to enhancing resource utilization efficiency, this architecture may also introduce conflicts related to resource competition. Therefore, effective resource-sharing configurations are crucial to ensure the Safety of the Intended Functionality (SOTIF). This paper proposes a computing resource configuration analysis and optimization methods for SOTIF. First, four SOTIF requirements are explored using the computing resource-sharing architecture for unmanned systems, encompassing computing time, computing power, energy consumption restrictions, and mutual exclusion and correlation. Secondly, the computing resource configuration model and its SOTIF constraints are formalized based on the graph and set theories. Subsequently, this study divides the design process of computing resource configuration schemes into resource selection and allocation. It introduces a resource selection optimization method based on Forward Checking and a resource allocation optimization method based on NSGA-II. Finally, a typical unmanned driving scenario is considered as an example, and the optimal resource selection and allocation schemes are sequentially determined using the proposed method on the computing platform.

Graphical abstract

Keywords

safety analysis / unmanned system / safety of the intended functionality / computational resource allocation / optimization.

Cite this article

Download citation ▾
Zhiwei CHEN, Luogeng ZHANG, Jiayun CHU, Xiaotong FANG, Hongyan DUI. Computational resource configuration analysis and optimization methods for unmanned system considering intended functionality safety. Front. Eng, 2025, 12(4): 1196-1219 DOI:10.1007/s42524-025-4173-4

登录浏览全文

4963

注册一个新账户 忘记密码

1 Introduction

Automation has rapidly increased across multiple industries worldwide (Guo et al., 2021; Khastgir et al., 2021). Unmanned systems, including aerial and underwater variants (Zhao et al., 2023; Chen et al., 2024), not only enhance performance in various fields but also provide significant economic and environmental benefits. However, with these advancements comes increased complexity, leading to a rise in accidents and safety concerns (Chen et al., 2025; de Koning et al., 2024). Ensuring the safety of the intended functionality (SOTIF) has become crucial as functional inadequacies and performance

limitations of unmanned systems become more apparent. Although the ISO/PAS 21448 standard for “Road Vehicles Safety of the Intended Functionality” was introduced in 2019, it lacks specific technical guidance, underscoring the need for further research (Schnellbach and Griessnig, 2019).

The SOTIF process is a hot topic for unmanned systems which mainly deals with the unreasonable risk due to those hazards caused by performance limitations. Some recent fatalaccidents involving autonomous vehicles have revealed that unmanned systems are highly sensitive to safety hazards due to performance limitations rather than traditional hardware or software faults or errors (Board, 2019; Pimentel, 2019). In these accidents, the performance boundary is exceeded at a certain point, namely the unmanned system is no longer competent for itscurrent job. However, users are often much overconfident in these smart unmanned systems and thus neglect the signs of danger.With the large-scale use of intelligent technology, similar risks are increasingly troubling designers. Therefore, it is vital to answer the question of whether the intended function of an unmanned system could be declared safe, which is exactly the ultimate goal of SOTIF design. More and more researchers are starting to delve into the SOTIF field. Kinalzyk (2021) detailed the differences between SOTIF and traditional functional safety work and proposed an integrated analysis approach. Skoglund et al. (2021) comprehensively analyzed the work process and focusedon three types of problems: SOTIF, functional safety, and information security, and provided a safety work arrangement for the entire development cycle of the system. Chelouati et al. (2023) explored the case of automatic train safety and security and proposed a GSN-based high-level framework. Grabbe et al. (2020) recommended using FRAM for risk assessment in developing highly automated vehicles, aiming to provide system design suggestions and insights for validation work. Overall, this study aims to extend the existing safety work process to cover the research scope of SOTIF. Similar work generally emphasizes the non-fault features of SOTIF-related hazards, which has reference significance for a deeper understanding of the SOTIF mechanism.

In addition, many researchers are currently committed to analyzing the SOTIF of an unmanned system through case testing. For example, Neurohr et al. (2020) proposed 16 factors to consider in scenario-based unmanned driving testing, including scenario generation, requirement generation, testing bias, testing execution, and testing confirmation. Zhou et al. (2022a) proposed a unified scenario description language and evaluation standard, which can support the expansion of test scenarios and improve data utilization efficiency. In analyzing SOTIF based on case testing, most studies use statistical indicators such as accident rates and takeover request frequencies (corresponding to situations where the system’s intended functionality is insufficient) as the basis for the final judgment. Birch et al. (2020) proposed a state machine to structure an argument concerning SOTIF. Cai et al. (2023) predicted the motion behavior of the preceding vehicle based on historical data and improved Markov model. Collin et al. (2020) linked the Rulebooks framework and the SOTIF process. Hu et al. (2022) proposed a novel and implementation-independent SOTIF validation strategy through real-world examples. Jiménez et al. (2023) demonstrated how the integration of the SOTIF process within an existing validation tool suite can be achieved. However, Kalra and Paddock (2016) have proven that at least 100 unmanned systems must be driven continuously for 12.5 years to demonstrate that unmanned systems have the same safety level as existing vehicles. Although many efforts have been made to improve case testingefficiency, the cost of analyzing SOTIF through pure experimental means is prohibitively high. There is a strong demand for considering SOTIF requirements in forward design of the unmanned systems.

Meanwhile, many research scholars have focused on SOTIF and its association with human-machine interactions. For example, Yan et al. (2021) proposed a SOTIF evaluation strategy for safety supervision to support the evaluation of driver errors and lane deviation risks caused by driver errors. Zhang et al. (2021) discussed the effectiveness of system theoretical process analysis and cognitive task analysis methods in addressing SOTIF issues in human factors engineering. Abdulazim et al. (2021) proposed a contextual-based predictive ML model to monitor the intervention between the driver and lane keep assist system. Rau et al. (2019) reviewed the SOTIF process, which described the development of a framework for deriving scenarios. It should be noted that SOTIF issues related to human-machine interaction usually only exist in low-level unmanned systems, which do not apply to high-level unmanned driving (SAE L4 and L5) because the necessary takeover actions by human drivers are no longer required when the unmanned driving function is activated.

SOTIF refers to the state description of whether the unmanned capability meets the actual operating needs under non-fault conditions.Thus, research on operating capabilities in specific operating tasks can also be classified into the scope of consideration for SOTIF. For example, Esterle et al. (2019) used linear logic to judge driving decisions during the operational phase to monitor whether they comply with preset traffic rules.Wang et al. (2022) proposed a robust non-fragile fault-tolerant control strategy as a quantitative risk method for the adaptive cruise control function for ensuring SOTIF. Chu et al. (2023) proposed a method to evaluate SOTIF-oriented perception effectiveness for forward obstacle detection of unmanned systems. Zhang et al. (2019) proposed intended safety systems for intelligent driving, incorporating SOTIF concepts to analyze and evaluate the driving scene and system safety. Luo et al. (2022) proposed a fuzzy reasoningevaluation method based on an analysis of scenarios and elements. Zhou et al. (2022b) investigated the safety of autonomous emergency braking (AEB) perception systems, providing crucial insights for optimizing AEB perception system parameters.

Briefly, the SOTIF concept is a challenging field that is directly related to the type of function being considered in unmanned systems. Although there are many conceptual discussions about SOTIF, there are relatively few forward design methods for specific functions.This paper presents an SOTIF analysis and optimization for unmanned systembased on computational resource allocation, the main contributions of this study are summarized as follows:

1) Computational resource allocation scheme modeling with multidimensional SOTIF constraints based on graph and set theory: This study constructs a comprehensive model for computational resource allocation in unmanned systems using graph and set theory. It considers task relationships, communication requirements, and SOTIF constraints, enabling a systematic analysis to ensure safety.

2) Optimization method for computational resource selection based on Forward Checking: This study introduces an optimization method for computational resource selection using Forward Checking. It boosts efficiency by narrowing the search space and swiftly identifying optimal allocation schemes that meet SOTIF constraints.

3) Optimization method for computational resource allocation based on NSGA-II: This study uses NSGA-II to optimize computational resource allocation, considering various objectives, such as load distribution and communication cost, while meeting SOTIF constraints. The NSGA-II generates Pareto-optimal solutions, enabling efficient resource use and safety.

This study introduces an innovative framework for analyzing and optimizing computational resource allocation in unmanned systems, enhancing both their efficiency and safety. The paper is organized as follows: Section 2 outlines the objectives and problem definition. Section 3 discusses the SOTIF analysis method based on computational power requirements. Section 4 details the comprehensive optimization methods for resource selection considering SOTIF and computational power costs. Section 5 details the comprehensive optimization method for resource allocation considering SOTIF and rational computational power allocation. Section 6 presents a case study, and Section 7 concludes the study with key findings.

2 Object description and problem description

Unmanned systems are intelligent systems that perceive their environment and make driving decisions autonomously. For specific unmanned driving tasks, the resource entities involved can be categorized into four types: sensors, communication units, processors, and actuators, as shown in Fig. 1. During task execution, sensors capture and preprocess environmental data. This data is transmitted through communication units to processors, where specific applications perform further computations. After multiple processing stages, driving commands are sent via communication units to actuators, which adjust the vehicle’s behavior in real-time.

The design process for the computational resource allocation scheme in unmanned systems is illustrated in Fig. 2. It begins with a functional logic model derived from breaking down the driving tasks, which defines the target functions and their interactions. Various applications and messages within this model act as virtual resources deployed on computational platforms, serving as key inputs for the allocation scheme. Additionally, information about available hardware resources is a critical input for this design process. Based on these foundations, the computational resource allocation design can be divided into two key challenges:

1) Hardware Resource Selection Problem: This involves selecting an appropriate combination of hardware entities from the available resource pool to form a computational platform system. This system must support at least one configuration that satisfies SOTIF requirements.

2) Functional Logic Architecture and Computational Platform Mapping Problem: This focuses on balancing multiple design objectives to find the optimal allocation among all configurations that meet SOTIF requirements.

To address these challenges, this study proposes a computational resource allocation method based on graph and set theory. The method leverages functional logic and resource entity models to evaluate resource sharing and constraints related to SOTIF. The optimization process is divided into two stages: resource selection and allocation scheme optimization. Forward Checking and NSGA-II algorithms are employed for optimization. Comprehensive case studies validated the method’s effectiveness, demonstrating significant improvements in resource allocation efficiency.

3 SOTIF analysis based on computational power requirements

This section performs formal modeling for the computational resource allocation scheme and its related SOTIF requirements to support the subsequent analysis and optimization work for SOTIF requirements.

3.1 The functional logic model

After decomposing and integrating into reusable functions, autonomous driving tasks are represented as a series of executable applications. Communication between these applications ensures task progress. As shown in Fig. 3, a typical functional logic model depicts these relationships. In this study, a quintuple F,M,E,FM,MF represents the functional logic relationship for autonomous driving tasks, as follows:

F={Fi|1i|F|},M={Mj|1j|M|},E=(0e1,|F|e|F|,10),FM=(fm1,1fm1,|M|fm|F|,1fm|F|,|M|),MF=(mf1,1mf1,|F|mf|M|,1mf|M|,|F|),

where F represents the set of functions Fi to be executed; M represents the set of communications Mj to be transmitted; E is the communication cost matrix between functions, where ep,q denotes the bandwidth required to send a message from function Fp to Fq, with main diagonal elements always 0; FM and MF are communication-sending and receiving matrices, respectively. In FM, fmp,q=1 if function Fp sends communication requirement Mq, else fmp,q=0; in MF, mfp,q=1 if function Fq receives communication requirement Mp, else mfp,q=0.

Furthermore, each functionFican be decomposed into a series of real-time application requirements, defined as follows:

Fi=RRi,Γi,Γi={τi,r|1r|Γi|},τi,r=Ci,r,Di,r,Ti,r,

where RRi represents the memory requirements for executing function Fi; Γi represents the set of application programs within Fi, assumed to be numbered by priority. Each application program τi,r is characterized by its worst-case execution time Ci,r, deadline Di,r, and arrival period Ti,r. The worst-case execution time Ci,r depends on the processing resource capability used. Similarly, each communication requirement Mj is decomposed into a series of messages, defined as follows:

Mj={mj,s|1s|Mj|},mj,s=BWmj,s,Cmj,s,Dmj,s,Tmj,s,Premj,s,Submj,s,

where mj,s represents the information within the communication requirement Mj, numbered by priority. Each information mj,s is described by six parameters: communication cost BWmj,s, worst-case transmission time Cmj,s, transmission deadline Dmj,s, message period Tmj,s, source application program Premj,s, and target application program Submj,s. The worst-case transmission time Cmj,s is dependent on the communication resource capability.

3.2 Resource entity model

As shown in Fig. 4, the types of resource entities included in the computing platform system can be divided into processor and communication resources. The resource entity model is represented by a triple N,Bus,A, whichis defined as follows:

N={Ni|1i|N|},Bus={Busj|1j|Bus|},A=(a1,1a1,|Bus|a|N|,1a|N|,|Bus|),

where N represents the set of processor resources, and its element Ni is used to refer to the processor entity included in the platform; Bus represents the set of communication resources, and its element Busj is used to refer to the communication bus included in the platform; A is the connection matrix, and its element ap,q represents the connection relationship between processor Np and communication bus Busq. When processor Np is connected to communication bus Busq, ap,q=1, indicating that data transmission can take place.

The basic performance of any processing resource node is characterized by the memory constraint RAMi, input/output communication bandwidth constraint BWi, and computing power Cali. Additionally, for a running processor, its energy consumption per unit time includes both static and dynamic energy components (Collin et al., 2019):

Power=Poweridle+Powerruntime,

where thestatic power consumption, denoted as Poweridle, encompasses power consumed by the clock circuit during processor core execution, multi-threaded dynamic scheduling control, on-chip bus communication, and other overheads provided by the processor manufacturer. Dynamic power consumption, denoted as Powerruntime, primarily arises from computing and storage units, varying with the executed program. To approximate dynamic power consumption, two parameters, Pimemory for storage space operations and Picompute for time computing operations, are agreed upon. The calculation method for the dynamic power consumption is as follows:

Powerruntime=MemoryPimemory+TimeRatePicompute,

where memory represents the size of memory occupied by the program during execution; TimeRate represents the occupancy rate of the effective time of program execution, determined by the ratio of actual execution time to arrival time interval.

Based on this, any processor resource Ni can be represented by the following six-tuple:

Ni=RAMi,BWi,Cali,Piidle,Pimemory,Picompute.

Similarly, communication resources can be characterized using basic performance parameters such as communication bandwidth BWBus, and communication capability ComBus. Unlike processor resources, the energy consumption related to access operations can be ignored when considering communication resource consumption, and instead, static power consumption PBusidle and power consumption per unit time for transmission operation PBustransmit are used to characterize communication resource performance. Therefore, any communication resource Busj can be represented using the following four-tuple:

Busj=BWBusj,ComBusj,PBusjidle,PBusjtransmit.

Considering the computing power of different processor resources directly impacts the estimation of worst-case execution time for application programs. This paper simplifies this consideration by using relative capacity values. A reference processor is chosen in the computing platform system, with its processing capacity set to 1. The processing capacity parameter of other processors is the ratio of their processing capacity to that of the reference processor. Similarly, relative communication capabilities were used to describe the performance of the communication buses in this study.

3.3 Configuration model and SOTIF constraints

Based on the definitions of the functional logical and resource entity models mentioned above, the following two allocation matrices can be used to characterize the mapping relationship between the application program and messages with their corresponding entity resources:

X=(x1,1x1,|N|x|F|,1x|F|,|N|),Y=(y1,1y1,|Bus|y|M|,1y|M|,|Bus|),

where X represents the function allocation matrixand Y represents the communication allocation matrix, where the corresponding elements satisfy:

xi,j={1whenFiisdeployedonNj0elsei=1,2,,|F|,j=1,2,,|N|,yp,q={1whenMpistransmittedviaBusq0elsep=1,2,,|M|,q=1,2,,|Bus|.

Note that the functionality allocation matrix X, communication allocation matrix Y and the resource connectivity matrix A described in section 3.2 are inherently correlated. Equations (11) and (12) provide the mathematical relationship between the three matrices from the sending and receiving communication perspective, respectively:

p=1|M|i=1|F|xi,sfmi,pyp,q1as,q=1,

p=1|M|j=1|F|xj,tmfp,jyp,q1at,q=1,

where s,t=1,2,,|N|, q=1,2,,|Bus|. Combining Eqs. (11)and (12), the following identity can be derived.

A=max(min(XTFMY,1),min(XTMFTY,1)),

where max() and min() representing taking the maximum/minimum value bitwise.

On this basis, this study considers a configuration scheme X,Y to be compliant with SOTIF requirements if and only if it satisfies the following conditions simultaneously:

1) Uniqueness requirement for function and communication allocation

All functions Fi are assigned to one and only one corresponding processor resource entity:

j=1|N|xi,j=1i=1,2,,|F|.

When the sending and receiving functions are located on different processor resources, the communication requirement Mi is sent and received by one and only one corresponding communication resource. When the sending and receiving functions are located on the same processor resource, the communication requirement Mi can be directly fulfilled by accessing the memory of the processor:

q=1|Bus|yp,q1,p=1,2,,|M|,

i=1|F|j=1|F|s=1|N|fmi,pxi,smfp,jxj,s=1q|Bus|yp,q,p=1,2,,|M|.

2) The configuration scheme satisfies the real-time constraints of all application executions

In an effective configuration scheme, each application τi,r needs to complete execution before its corresponding deadline Di,r. Considering the computational characteristics of processor resource Nj when application τi,r is deployed on processor resource Nj its corresponding equivalent worst-case execution time is Ci,r/Calj. We use the worst-case task response time Ri,r to represent the upper limit of the time required to complete application τi,r. The scheduling mode of programs on processor resources will directly affect their corresponding worst-case task response time. In this article, we consider the most common fixed-priority scheduling mode. Based on this, it can be determined that:

Ri,r=Ci,rCalj+τkhp(τi,r)Ri,rTτkCτkCalj,

where denotes rounding up; hp(τi,r) represents the set of applications with higher priorities than τi,r running on the same processor. Equation (17) reflects the worst-case response time of a task, which consists of the worst-case execution time and the time preempted by higher-priority tasks running on the same processor.

In computing resource sharing, partition scheduling is a widely used mechanism where the rotation period for running partitions on a processing resource module is denoted as RL. The proportion of the total period that an application τi,r corresponding to functionality Fi occupies in its partition is denoted as αi (referred to as the partition coefficient). Considering the inherent mechanism of mutually exclusive partition scheduling, other partitions can be regarded as a cyclic task with higher priority, having a period of RL and execution time of (1αi)RL when computing the worst-case response time Ri,r of the application τi,r. Based on this, Eq. (18) can be reformulated:

Ri,r=Ci,rCalj+k=1r1Ri,rTi,kCi,kCalj+Ri,rRL(1αi)RL.

It is known that the partition rotation period RL is a predetermined positive actual number. If RL0, it follows that:

Ri,rRL=Ri,rRL.

According to Eq. (18):

Ri,r=Ci,rCalj+k=1r1Ri,rTi,kCi,kCalj+(1αi)Ri,r.

And thus satisfy:

αi1Calj(Ci,rRi,r+k=1r1(Ri,rTi,k+1)Ci,kRi,r)=1Calj(k=1rCi,kRi,r+k=1r1Ci,kTi,k).

For application τi,r, It satisfies the real-time requirement if and only if the response time Ri,r is not greater than the deadline Di,r (i.e. Ri,rDi,r) which is equivalent to Eq. (22):

1Calj(k=1rCi,kDi,r+k=1r1Ci,kTi,k)αi.

Therefore, it can be considered that the real-time requirements of all applications in the partition where function Fi is located can be met as long as they satisfy:

1Caljαilbαi,αilb=max1r|Γi|(k=1rCi,kDi,r+k=1r1Ci,kTi,k),

where αilb is defined to constrain the lower bound of the partition coefficient αi, which is only related to the function Fi.

Thus, the real-time requirements related to the application can be expressed in the scheduling scheme as follows: “For any processor resource, there exists a feasible combination of partition coefficients, such that each application within each partition is schedulable and the sum of all partition coefficients does not exceed 1.” In other words, it satisfies:

i=1|F|1Caljxi,jαilb1,j=1,2,,|N|.

3) The configuration scheme meets the real-time constraints of all message transmissions

When the communication requirement Mj is assigned to the communication resource Busq, the worst-case transmission time of message Mj in mj,s on the bus can be represented as follows:

Rmj,s=Cmj,sComBusq+Bmj,s+mkhp(mj,s)Rmj,sTmkCmkComBusq,

where hp(mj,s) represents the set of messages with higher priority than mj,s on the same data bus; since there is actually no direct priority relationship between different communication requirements Mj, whenever considering the communication requirement Mj in this paper, it is assumed conservatively that other communication requirements Mk (kj) have higher priority than Mj; Bmj,s represents the maximum blocking time, which is equivalent to the blocking caused by the longest transmission time of the low-priority message:

Bmj,s=maxs<l|Mj|Cmj,lComBusq.

Similarly, according to Eq. (25), it can be inferred that:

Rmj,s1ComBusq(Cmj,s+maxs<l|Mj|Cmj,l+mkhp(mj,s)(Rmj,sTmk+1)Cmk).

After simplification:

Rmj,sCmj,s+maxs<l|Mj|Cmj,l+mkhp(mj,s)Cmk(ComBusqmkhp(mj,s)CmkTmk).

In summary, to strictly ensure that the worst-case transmission time Rmj,s is not greater than the deadline Dmj,s, a feasible approach is to make sure that:

Cmj,s+maxs<l|Mj|Cmj,l+mkhp(mj,s)Cmk(ComBusqmkhp(mj,s)CmkTmk)Dmj,s.

For simplicity, concerning any communication requirement Mk(k=1,2,,|M|), two related variables are defined in this paper, the values of which are solely dependent on the communication requirement Mk:

CMk=1l|Mk|Cmk,l,CMkTMk=1l|Mk|Cmk,lTmk,l.

Therefore, Eq. (29) is equivalent to:

1ComBusq(βmj,s+k=1|M|yk,q(CMkDmj,s+CMkTMk))1,

where βmj,s is defined by Eq. (32), and its value is only related to the message mj,s.

βmj,s=1Dmj,s(Cmj,s+maxs<l|Mj|Cmj,ll=s+1|Mj|Cmj,l)l=s+1|Mj|Cmj,lTmj,l.

It should be noted that although Eq. (31) can provide the most accurate real-time guarantee for transmission delay, it needs to be calculated separately for each message, which poses a huge challenge for practical analysis. To simplify the calculation, the communication requirement Mj, is defined as:

βjub=max1<s|Mj|βmj,s,

Djlb=min1<s|Mj|Dmj,s.

On this basis, the requirement that “the scheduling scheme can meet the real-time constraints of all message transmissions” can be expressed as:

q=1|Bus|yj,q1ComBusq(βjub+k=1|M|yk,q(CMkDjlb+CMkTMk))1,j=1,2,,|M|,

where Eq. (35) is a sufficient condition for Eq. (31) to hold, i.e., Eq. (35) can provide a stronger feasibility guarantee.

4) The processing capacity requiredunder the maximum processing resources that a processor can provide

For any processor resource module, the application resource requirements deployed on it do not exceed its inherent memory, output bandwidth, and input bandwidth capabilities. It satisfies:

i=1|F|xi,jRRiRAMj,j=1,2,,|N|,

i=1|F|xi,jk=1|F|(1xi,k)ek,iBWi,j=1,2,,|N|,

i=1|F|xi,jk=1|F|(1xi,k)ei,kBWi,j=1,2,,|N|.

5) The communication capacity requiredunder the maximum communication resources that can be provided

For any communication resource module, the sum of the required communication bandwidths corresponding to all messages transmitted through the communication resource by the processors connected does not exceed its inherent communication bandwidth capacity limit. This includes both input bandwidth requirements and output bandwidth requirements, where:

i=1|F|xi,sp=1|M|mfi,pyp,qj=1|F|k=1|F|fmj,pej,imfp,iBWBusq,s=1,2,,|N|,q=1,2,,|Bus|,

i=1|F|xi,sp=1|M|fmi,pyp,qj=1|F|k=1|F|fmj,pej,imfp,iBWBusq,s=1,2,,|N|,q=1,2,,|Bus|.

6) All processor resource power consumption under the threshold

High-performance processor resources enhance the performance of unmanned driving tasks but often result in increased energy consumption and heat dissipation. Processor power consumption comprises static and dynamic components, with the dynamic component further divided into computational and storage operations. A reasonable and safe configuration scheme should ensure that the total power consumption of all processor resources remains within a predefined threshold, as follows:

Pjidle+PjmemoryRAMji=1|F|xi,jRRi+Pjcomputei=1|F|xi,jk=1|Γi|Ci,kTi,kPjub,j=1,2,,|N|.

7) Power consumption of all communication resources under the thresholds

Similarly, the working power consumption of all communication resources must not exceed a specified threshold. This paper primarily addresses the static power consumption and data transmission power consumption of communication resources, with the following requirements:

PBusqidle+PBusqtransmitp=1|M|yp,ql=1|Mi|Cmp,lTmp,lPBusqub,q=1,2,,|Bus|.

8) Preset feature allocation mutual exclusion requirements

In designing a shared configuration scheme, it is essential to consider preset allocation constraints and correlations between different functions and between functions and processor resources, as required by unmanned driving tasks.

Mutual exclusion in allocation means that “two target functions cannot be deployed on the same processor resource.” This requirement is satisfied by:

j=1|N|xi,jxk,j=0,

when Fi and Fk are preset as mutually exclusive functions.

Allocated correlation means that “two target functions must be deployed on the same processing resource.” This requirement is satisfied by:

j=1|N|xi,jxk,j=1,

when Fi and Fk are preset as correlated functions.

In summary, Eqs. (14)–(16), (24), (35)–(44) collectively constitute the constraint criteria for the feasibility of the configuration X,Y. To facilitate batch operation analysis, this paper introduces auxiliary matrices listed in Table 1, which enable a vectorized representation of each constraint.

On this basis, SOTIF constraints of the configuration scheme can be reorganized into the following matrix expression:

Con01:XSN=SF,Con02:YSBusSM,Con03:rdiag(MFXXTFM)=1YSBus,Con04:diag(SCal)XTSAlphaSN,Con05:diag(SBeta)YSCOMB+diag((SDLb)1)Ydiag(SCOMB)YTSCM+Ydiag(SCOMB)YTSCTMSM,Con06:XTSRRSRAM,Con07:rdiag((1XT)EX)SBW,Con08:rdiag((1XT)ETX)SBW,Con09:XTMFTdiag(rdiag(MFETFM))YBWNB,Con10:XTFMdiag(rdiag(MFETFM))YBWNB,Con11:SPI+diag(SPM)XTSRR+diag(SPC)XTSCTSPUb,Con12:SPIB+diag(SPTB)YTSCTMSPUbB,Con13:max(XXT,ME)=ME,Con14:min(XXT,MC)=MC,

where diag() denotes the operation of transforming a column vector into a diagonal matrix, while rdiag() denotes the operation of extracting the diagonal elements of a square matrix to form a column vector. Equation (46) provides examples of the operations of these two operators; Constraints Con01, Con02 and Con03 correspond to uniqueness requirements; constraints Con04 and Con05 correspond to temporal requirements; constraints Con06, Con07, Con08, Con09, Con10 correspond to capability requirements; constraints Con11 and Con12 correspond to energy consumption limit requirements; and constraints Con13 and Con14 correspond to mutual exclusion and correlation requirements.

diag((12))=(1002),rdiag((1342))=(12).

4 Comprehensive optimization for resource selection considering SOTIF and computational power costs

This section presents a method for optimizing SOTIF and computational power costs for unmanned systems under varying computational power conditions. It introduces Constraint Satisfaction Problems (CSP) and a forward-checking algorithm, illustrating how hardware resource selection can be addressed through CSP construction.

4.1 Constraint satisfaction problems and Forward Checking algorithm

CSP has been applied to many practical problems since Mackworth (1977) first developed it. Classic examples include map coloring, job scheduling, and the n-queens problem. A formally defined CSP consists of a set of variables, each assigned values from a specific domain, and a set of constraints that must be simultaneously satisfied. This can be represented as the following triple:

X,D,C,

where X={x1,,xn} represents a set of variables; D={D1,,Dn} represents the corresponding domain of variables, and each element Di (i=1,,n) reflects all possible values for each variable x1X; C={c1,,cn} represents a finite set of constraints that limit feasible values for each group of variables.

A feasible solution for a CSP is a set of specific assignments {x1=a1,,xn=an}, from the variable domains, which guarantees that all constraints are not violated. Solving a CSP involves assigning values to variables to find feasible solutions. If at least one solution exists, the CSP is considered satisfiable; otherwise, it is unsatisfiable. There are two main approaches to solving a CSP: backtracking search and constraint propagation. Backtracking systematically explores all possible value combinations, often using depth-first search, to identify feasible solutions. In contrast, constraint propagation narrows the range of valid variable values by enforcing “local compatibility” through continuous reasoning. Haralick and Elliott combined these methods into the Forward Checking algorithm Kondrak and Van Beek (1997), which prunes the search tree early to reduce the number of nodes visited, minimizing the search effort.

Table 2 presents the pseudocode for the main program using Forward Checking. It integrates two heuristic techniques: ‘Select-Unassigned-Variable’ and ‘Order-Domain-Values.’ These heuristics allow for efficient variable and value ordering based on the problem’s requirements, improving search performance. Common heuristic methods include minimum remaining values, minimum degree, and minimum constraint values, among others.

4.2 Computational resource selection optimization method

Figure 5 illustrates the process of optimizing compute resource selection. This involves constructing a CSP in a limited search space and ensuring it meets SOTIF requirements using the forward-checking algorithm. The ‘compute resource selection’ challenge is divided into two stages: ‘processor resource selection’ and ‘communication resource selection’. The goal is to create a cost-effective plan that fulfills all SOTIF requirements.

4.2.1 Processor resource selection

In addressing the “processor resource selection” problem, communication resource constraints are temporarily ignored, assuming sufficient communication resources for message transmission. In Eq. (45), the constraints directly related to processor resources include eight items: Con01, Con04, Con06, Con07, Con08, Con11, Con13, Con14. These are used as criteria to assess the feasibility of processor resource combinations. For all processing resource sets AR={ARi|1i|AR|} in the resource library, a processing resource combination can be defined by the following variables:

NumAR=(numAR1numAR2numAR|AR|),

where numARi represents the number of resources selected for the ith candidate processing resource type ARi.

This study defines the relationship between the processor resource combination scheme, NumAR, and the processor resource set N={Ni|1i|N|} in the resource entity model, as illustrated in Fig. 6. The elements in both sets satisfy the following criteria:

NiARjwhenk=1jnumARki>k=1j1numARk.

Designers can set an acceptable upper limit on the number of processor resources, numARub, in advance, due to the constraints of onboard space. Additionally, a conservative constraint is that the number of processor resources will not exceed the number of target functions, since the worst-case scenario would involve assigning each task to a different processing resource. Thus, numARub|F|. Inspired by the memory resource capacity constraint in Eq. (36), it can be determined for the final resource entity scheme N,Bus,A that:

Con15:j=1|N|i=1|F|xi,jRRi=i=1|F|RRij=1|N|RAMj.

The constraint Con15 is a necessary condition for constraint Con06, which is independent of the allocation of functions and can support rapid prunin search space pruning. According to Eq. (50), it can be determined that:

i=1|NumAR|numARii=1|F|RRimax1i|NumAR|RAMANi=numARlb.

Based on this, the “processor resource selection” problem can be formulated as the following optimization problem:

minNumARi=1|NumAR|numARicostARi,s.t.numARubi=1|NumAR|numARinumARlb,isapositiveinteger.X,Con01Con04Con06Con07Con08Con11Con13Con14,

where X represents the mapping relationship between functions and processing resources, defined by Eq. (9).

In fact, due to the constraint that numARub i=1|NumAR|numARinumARlb(numARi is a positive integer), Eq. (52) can be understood as a finite-state search problem. By considering only the feasible domain and constraint Con15, we can easily obtain all potential solutions and calculate the corresponding design costs. We use RegionAR={RegionARi|1i|RegionAR|} to represent the set of all potential solutions, where the solutions are numbered in ascending order of cost, i.e., Cost(RegionARi)Cost(RegionARj) (when ij). After determining RegionAR, Eq. (52) can be solved by sequentially checking whether a feasible allocation scheme X.

The symbol NumAR=(numAR1numAR2 numAR|AR|) is used to represent any processor resource combination corresponding to a traversal process. To reduce the search space when judging the feasibility of the function allocation scheme X, this paper defines the following auxiliary column vector for the function allocation scheme by borrowing the requirement of allocation uniqueness:

XZ=(XZ1XZ|F|),

where XZi represents the processor resource number on which function Fi is deployed, the element in the allocation scheme X satisfies:

xi,j={1j=XZi0jXZii=1,2,,|F|.

On this basis, the problem of determining whether SOTIF requirements can be satisfied for a given processor resource combination NumAR can be formulated as a CSP problem with the following structure.

variableZXZdomainD{1,2,,|N|}constraintC{Con04,Con06,Con07,Con08,Con11,Con13,Con14},

where |N|=i=1|NumAR|numARi.

This paper introduces two heuristic methods for selecting unassigned variables:

1) Minimum Remaining Values (MRV): This method selects the variable with the fewest remaining values in its domain among the unassigned variables.

2) Maximum Memory Requirement (MMR): This method chooses the variable with the highest memory requirement among the unassigned variables.

Although the auxiliary column vector XZ offers a better representation for reducing the search space, the original matrix X is more practical for checking constraint violations. Therefore, during consistency checks in the Forward Checking algorithm, it is essential to convert between the auxiliary column vector XZ and the original matrix X. The conversion rules refer to Eqs. (53) and (54).

4.2.2 Communication resource selection

For all communication resource sets ABus={ABusi|1i|ABus|} in the resource library, a communication resource combination can be defined using the following variables:

NumABus=(numABus1numABus2numABus|ABus|).

where numABusi represents the number of resources selected for the ith candidate communication resource type ABusi .

The communication resource combination NumABus is defined similarly as in Fig. 6, and its correspondence with the communication resource set Bus={Busj|1j|Bus|} in the resource entity model satisfies the following condition:

BusiABusjwhenk=1jnumABuski>k=1j1numABusk.

Similarly, designers can preset an acceptable upper limit of communication resource quantity numABusub, while the lower limit of communication resource quantity numABuslb can be determined according to Eq. (58):

numABuslb={1i=1|NumAR|numARi20i=1|NumAR|numARi=1.

Note that when evaluating the communication resource combination NumABus, the satisfiability of the resource connection matrix A must be checked simultaneously. According to Eq. (13), the resource connection matrix A can be directly determined from matrix X and matrix Y. Therefore, it is unnecessary to assign values separately to the resource connection matrix A.

In summary, this paper represents the “communication resource selection” problem as the following optimization problem:

minNumABusi=1|NumABus|numABus1costABus1s.t.numABusubi=1|numABus|numABusinumABuslbnumABusiisapositiveinteger.X,YCon01Con14

Similarly, the “communication resource selection” problem is also regarded as a search problem in a finite state space. It is assumed that RegionABus= {RegionABusi|1i|RegionABus|} represents the set of all potential solutions for the “communication resource selection” optimization problem, and the solutions are numbered in ascending or concerning Cost(RegionABusi)Cost(RegionABusj) (ij). Therefore, Eq. (59) can be solved by sequentially checking the feasibility of the communication resource combination corresponding to each potential solution RegionABusi concerning the functionality allocation matrix X and the communication allocation matrix Y.

The symbol NumABus=(numABus1numABus2 numABus|ABus|) is used to represent the combination of communication resources during any traversal process. Similar to constructing the auxiliary column vector XZ for the functionality allocation matrix X in Eq. (53), this paper defines the auxiliary column vector YZ corresponding to the communication allocation matrix Y as follows:

YZ=(YZ1YZ|M|),

where YZi represents the communication resource number connected to the communication requirement Mi. In addition, it is agreed that when the communication demand Mi does not need to be transmitted through any communication resource, its corresponding element YZi=1, that is YZi=1 when j=1|Bus|yi,j=0. Correspondingly, the elements in the communication allocation matrix Y satisfy:

yi,j={1j=YZi0jYZii=1,2,,|M|.

Subsequently, the problem of determining the feasibility of SOTIF requirements for a given communication resource combination scheme NumABus is constructed in the followingCSP form:

variableZ1XZvariableZ2YZcorrespondingdomainD1{1,2,,|N|}correspondingdomainD2{1,1,2,,|Bus|}constraintCCon01Con14,

where |N|=i=1|NumAR|numARi, |Bus|=i=1|NumABus|numABusi.

When a feasible solution is found for the CSP in Eq. (62), the current communication resource combination scheme is optimal and meets all requirements. If no feasible solution exists, the scheme must be revised, and the next option in the set RegionABus should be evaluated. The final optimal computing resource combination scheme, denoted as NumAR,NumABus, is determined by combining the best solutions from both the “processor resource selection” and “communication resource selection” problems. To maintain consistency with the symbols used in Section 3.2, we define NNumAR and BusNumABus. Therefore, the optimal computing resource combination scheme is represented as N,Bus.

5 Comprehensive optimization for resource allocation considering SOTIF and rational computational power allocation

This subsection discusses trade-offs among design objectives and optimal solution selection in computational resource allocation schemes for functional safety. It introduces constrained optimization problems and NSGA-II, detailing optimization based on safety constraints.

5.1 Constraint optimization problems and the NSGA-II algorithm

In this study, the Non-Dominated Sorting Genetic Algorithm (NSGA-II) (Deb et al. 2002) is used to design the computing resource allocation scheme. Table 3 provides the pseudocode for NSGA-II. This algorithm enhances traditional genetic algorithms by integrating Pareto sorting to obtain Pareto-optimal solutions for multiple objectives. NSGA-II generally comprises the following six steps: 1) population initialization; 2) non-dominated sorting; 3) crowding distance assignment; 4) optimization selection; 5) genetic population generation (crossover and mutation); 6) population recombination and generation.

5.2 Optimization methods for computing resource allocation schemes

For a given combination of computing resources N,Bus, there may be multiple feasible allocation schemes for computing resources, with differences in load distribution and communication costs. According to Eq. (13), the resource connection matrix A can be derived from the functional allocation matrix X and the communication allocation matrix Y. Therefore, the independent variables that need to be determined in the process of designing the computing resource allocation scheme include the functional allocation matrix X and the communication allocation matrix Y We represent the computing resource allocation scheme as X,Y (or X,Y,A), and consider the following three optimization objectives in this paper:

1) Achieving as uniform a load distribution as possible, balancing the task utilization of processor resources in the system

Task utilization is a key metric for evaluating processor resource performance. It represents the proportion of time that processor resources are actively executing tasks during system operation. The utilization of processor resources depends on the functions assigned and running on them. For a function Fi, its task utilization is defined as follows:

U(Fi)=r=1|Fi|U(τi,r)=r=1|Fi|Ci,rTi,r.

Therefore, for a given configuration scheme X,Y, considering the task utilization factor, this article uses the second-order central moment to represent the optimization objective as follows:

U(X,Y)=XTU(F)minUXY=(U(X,Y)U(X,Y)¯)T(U(X,Y)U(X,Y)¯)|N|

where U(F) represents a |F|×1 column vector composed of U(Fi); U(X,Y) represents a |N|×1 column vector composed of the task utilization factor of each processor resource under the configuration scheme X,Y; and U(X,Y)¯ represents the average task utilization factor of each processor resource.

2) Allocate the load as evenly as possible and balance the memory utilization of processor resources in the system

Similarly, considering the memory utilization of processor resources, this paper uses the second-order central moment to represent the optimization objective as follows:

R(X,Y)=(diag(SRAM))1XTSRRminRXY=(R(X,Y)R(X,Y)¯)T(R(X,Y)R(X,Y)¯)|N|,

where R(X,Y) represents an |N|×1 column vector composed of the memory utilization of each processor resource under the configuration X,Y, and U(X,Y)¯ represents the average memory utilization of each processor resource.

3) Minimize the communication cost required by the system as much as possible

Considering the total communication cost required by the system, this paper represents the optimization objective using the first-order moment as follows:

minTXY=SNTrdiag((1XT)EX).

Considering the three factors mentioned above, the optimization problem for allocating computing resources X,Y can be defined as the following multi-objective constrained optimization problem:

minX,Y[UXY,RXY,TXY]s.t.Con01Con14.

This paper uses NSGA-II to solve the multi-objective constrained optimization problem described in Eq. (67). When using NSGA-II, a chromosome encoding format, as shown in Fig. 7 is adopted. The chromosome consists of a total of |F|+|M| bits, where the first |F| bits correspond to the allocation of one objective function each, and the last |M| bits correspond to a specific connection of processor resources. It is easy to convert the chromosome encoding into a computing resource allocation scheme X,Y using Eqs. (53) and (60).

Considering the nonlinear nature of SOTIF constraints, this paper uses the penalty function method to transform the multi-objective optimization problem into an unconstrained optimization problem. The encoding method illustrated in Fig. 1 automatically satisfies the constraints Con01 and Con02 for the resource allocation scheme X,Y. Therefore, penalties are designed for constraints Con03Con14, as follows:

PE1=max(rdiag(MFXXTFM)(1Y)SBus1,0)PE2=SNTmax(diag(SCal)XTSAlphaSN,0)PE3=SMTmax(diag(SBeta)YSCOMB+(diag(SDLb))1Ydiag(SCOMB)YTSCM+Ydiag(SCOMB)YTSCTMSM,0)PE4=SNTmax(XTSRRSRAM,0)PE5=SNTmax(rdiag((1XT)EX)SBW,0)PE6=SNTmax(rdiag((1XT)ETX)SBW,0)PE7=SNTmax(XTMFTdiag(rdiag(MFETFM))YBWNB,0)SBusPE8=SNTmax(XTFMdiag(rdiag(MFETFM))YBWNB,0)SBusPE9=SNTmax(SPI+diag(SPM)XTSRR+diag(SPC)XTSCTSPUb,0)PE10=SBusTmax(SPIB+diag(SPTB)YTSCTMSPUbB,0)PE11=max(max(XXT,ME)ME1,0)PE12=max(min(XXT,MC)MC1,0),

where 1 represents the column sum norm of a matrix, which is the maximum value of the absolute sum of all column vectors of the matrix; max() represents the maximum value taken element-wise. In this article, we further integrate all penalty functions and express them in the form of Eq. (69):

PEXY=i=112θiPEi=ΘTPE,

where θi represents the weight value of each normalized penalty function indicator; Θ and PE represent the weight values and row vector composed of each penalty function indicator, respectively.

By combining the objective function and penalty function, the fitness function used in NSGA-II for problem-solving can be expressed as:

Fitness1=ω1UXY+PEXY,Fitness2=ω2RXY+PEXY,Fitness3=ω3TXY+PEXY,

where ωi is also a weight value used for normalization.

At this point, based on the chromosome encoding defined in Fig. 7. and the fitness function defined in Eq. (70), the NSGA-II algorithm provided in Table 3 can be smoothly executed.In practice, the following tricks are recommended in order to obtain the optimal computed resource allocation X,Y:

1) All the weight values should be trailed before the NSGA-II algorithm is executed.On the one hand, throughestimating the magnitudes of UXY, RXY and TXY, we canpreset the value of ωi to ensure that ω1UXY, ω2RXY, and ω3TXY are of the same magnitude. On the other hand, because lower fitness values indicate better solutions, it is believedthat an unsatisfiedscheme X,Y will reach a rather high fitness value by setting the condition θiωi. Therefore, throughestimating the magnitudes of thepenalty functions, we can preset the value of Θ to ensure the PEXY will be significantly higher than ω1UXY, ω2RXY, and ω3TXY.

2) The control parameters of the NSGA-II should be scientifically designed.Control parameters, such as population size Numpop, crossover rate pc and mutation rate pm, have a direct impact on the performance and stability of the algorithm. According to practical experience,the preferredranges of initialvalues for Numpop, pc and pm are [20, 200], [0.6, 1], and [0.01, 0.1], respectively. There are several options to better determine these control parameters. For example, we can carry out the control parameter tuning experiments and observe the specific impact on the performance of the algorithm.Besides, adaptive probabilities of crossover and mutation have also been a favored choice (Srinivas and Patnaik, 1994).

3) The correctness of the final solutions should be verified after the optimal process. Because ofdefining the penalty functions, it is impossible to completely rule out the possibility that the final solution does not satisfy the SOTIF constraints. Therefore, it is necessary to verify the correctness of the Pareto optimal solution through automated solution tools. In practice, the feasibility verification code of the solution is similar to the penalty function code, and thus partial code can be reused.

Finally, by combining the computed resource combination N,Bus obtained in Section 3 and the computed resource allocation X,Y, determined in this section, a computed resource configuration scheme that satisfies all SOTIF requirements is generated.

6 Case study

In this section, we analyze and optimize computing resource allocation schemes for unmanned driving functions in relation to SOTIF requirements. Tables 4 and 5 provide detailed parameters for the expected functions/applications and communication/messages. Based on Table 5, the communication cost matrix E, communication sending matrix FM and communication receiving matrix MF defined in Eq. (71) can be determined as follows:

E=(00210100512512120011034000000024000000000000000015000017220220000021002202200016000150000120160300000001600000150012016000300),

FM=(111111000000000000000000000000000111000000000000000000000000000100000000000000000000000000000000000000000000000000000011110000000000000000000000000001110000000000000000000000000001100000000000000000000000000011100000000000000000000000000011000000000000000000000000000111),

MF=(000000100000000000000000000000000000000000000000000000100000000000000000010000100000000010100000001000010000010000000000001000001000010000000001001000000000000000001000000000100000000100000000100000000000100100000000000010000000010000000000001000001000000000010000001000)T.

6.1 Computing resource selection

The selection and optimization of computing resources according to SOTIF requirements is divided into two phases: “Processor resource selection” and “Communication resource selection.” In general terms, the power consumption threshold is set to 150 W for processor resources and 70 W for communication resources.

By analyzing the Processor Resource Selection problem, the lower and upper limits for the number of processor resources selected in the repository AR shown in Table 6 are first defined as follows:

numARlb=730512=1.43numARub=4.

Furthermore, a total of 2793(72+73+74) potential solution sets were constructed, and a preliminary screening was performed based on constraint Con15 defined in Eq. (50), resulting in the set RegionAR, composed of 2587 potential solutions, sorted in ascending order of cost. Based on the Forward Checking algorithm, the corresponding constraint satisfaction problem was solved, and the 431st processor resource combination NumAR=(0011200) was ultimately determined as the optimal solution that satisfies SOTIF constraints (Con01, Con04, Con06Con08, Con11, Con13, Con14) which selects one AR3, one AR4, and two AR2. For this processor resource solution, the assignment order and feasible solutions obtained using the “least remaining value” and “maximum memory requirement” heuristics with the Forward Checking algorithm are as follows:

F4:1F5:2F6:2F1:1F2:2F7:3F9:4F8:3F10:4F3:1,

XZ=(1211223344)T.

This paper compares the actual number of assignment operations with the expected upper limit of operations when applying the Forward Checking algorithm to solve the CSP for each candidate solution RegionARi, as shown in Fig. 8. The results indicate a significant reduction in the number of assignment operations due to the use of the “minimum remaining value” and “maximum memory requirement” heuristics, which effectively minimize unnecessary operations.For example, for RegionAR200=(0020020), the total number of hardware resources used is 4. If a full search traversal is performed, the overall expected upper limit of assignment operations is 47=16384, However, after only 40 assignment operations using the Forward Checking algorithm, it is determined that the current processor resource combination cannot satisfy all SOTIF requirements.

On the basis of the optimal processor resource combination NumAR=(0011200) obtained in this paper, further optimization design is carried out for the communication resource selection problem. Similarly, the lower and upper limits of the number of communication resources selected in the resource library ABus described in Table 7 are defined as:

numABuslb=1numABusub=4.

Furthermore, a set of 120(·) potential solutionsare constructed in RegionABus, where the solution numbers are arranged in ascending order of cost. Based on the Forward Checking algorithm, the corresponding constraint satisfaction problem is solved, and the 9th communication resource combination solution NumABus=(020) is determined as the optimal solution that can satisfy SOTIF constraints (Con01Con14), i.e., two ABus2. are selected. The assignment sequence and feasible solutions for this communication resource solution are shown below:

F4:1F5:2F6:2M12:1M15:1F7:3M13:1M18:2F9:4M14:1M23:1F2:1F1:2F8:3F10:4F3:1M1:1M2:1M3:1M4:2M5:1M6:2M7:1M8:1M9:1M10:1M11:1M16:2M17:2M19:1M20:1M21:1M22:1M24:1M25:1M26:1M27:1

XZ=(2111223344)TYZ=(111212111111111222111111111)T.

In summary, the optimal result for the selection of computing resources that meets SOTIF requirements is:

NumAR=(0011200)NumABus=(020).

6.2 Computingresource allocation

Based on the optimal compute resource selection scheme determined by Eq. (80), this section will further use the NSGA-II algorithm to determine the optimal compute resource allocation scheme that satisfies SOTIF requirements. To set the penalty coefficient more reasonably, this paper first makes a preliminary estimate of the order of magnitude of the objective functions defined in Eqs. (64)–(66) and the penalty function defined in Eq. (69), where the magnitudes of UXY, RXY and TXY are approximately 0.01, 0.01, and 100, respectively, while the penalty function is generally not less than 10. Therefore, based on experience, the weighting coefficients related to the objective functions in Eqs. (69) and (70) are specified as follows:

ω1=100ω2=100ω3=0.001θi=1000(i=1,2,,12).

In this case, in order to ensure the search strength for the solution space,the population size and the maximum genetic generation are set as 200 and 500, respectively. Meanwhile, the adaptive crossover rate pc and mutation rate pm is used to enhancethe performance and stability of the algorithm. Drawing on Srinivas’ widely recognized research (Srinivas and Patnaik, 1994), detailed definitions of crossover rate pc and mutation rate pm for each generation are specified as follows:

pc={i=13min(FitnessiFitnessminFitnessi¯Fitnessmin,1)FitnessiFitnessi¯1Fitnessi>Fitnessi¯,

pm={0.5i=13min(FitnessiFitnessminFitnessi¯Fitnessmin,1)FitnessiFitnessi¯0.5Fitnessi>Fitnessi¯,

where Fitnessi is the larger of thefitness values Fitnessi of the solutions to be crossed in each generation; Fitnessmin is the minimum of fitness values Fitnessi; Fitnessi¯ is the average of fitness values Fitnessi. Both Eqs. (82) and (83) reflect that the closerto the Fitnessmin, the smaller rate should be set.

Figure 9 illustrates the NSGA-II optimization process. Figure 9(a) Shows the average fitness values of 200 individuals over generations, with initial sharp drops indicating elimination of infeasible solutions. As shown in Fig. 9(b), after about 8 generations, the curve of the Pareto optimal total number of individuals has remained at 200. However, the curve for the Pareto optimal total types of individual types only began to converge after about 139 generations, and finally stabilized at 10. This convergence indicates solution stability despite maintaining solution diversity.

For the Pareto optimal solution generated after 500 iterations, 70 duplicate individuals were further removed in the last generation. And the remaining 10 different solutions are presented in Table 8. Obviously, the fitness values of all Pareto optimal solutions will already have their corresponding penalty functions at 0 after 500 iterations. Therefore, the original objective functions UXY, RXY and TXY can be directly obtained based on the fitness values, as shown in Fig. 10. Since these resource allocation schemes are Pareto optimal and thus often require further analysis in practical engineering applications. In this case, there is a cluster of points near the origin of the UXYRXY view, there is a cluster of points near the origin. Solutions within this cluster are recommended if the focus is on average resource usage, with total communication cost as a secondary consideration. Consequently, the 3 rdsolution is identified as the most suitable allocation scheme in this case.

Based on the analysis in Sections 6.1 and 6.2 the optimal computing resource allocation scheme can be determined as follows:

NumAR=(0011200),NumABus=(020)XZ=(4343212211)T,YZ=(1211211112111221121121111)T,A=(11111111),

where the resource connection matrix A is determined according to Eq. (13).

7 Conclusions

This paper proposes an innovative computational resource allocation method for unmanned systems considering SOTIF, aiming at enhancing system performance and safety. First, a comprehensive computational resource allocation model is established by considering multidimensional SOTIF constraints, which can ensure SOTIF across various driving scenarios. Secondly, a forward-checking-based optimization method is proposed for computational resource selection, which can reduce search space and improve efficiency. This method can rapidly identify and exclude infeasible resource combinations, and expedite the discovery of optimal allocation schemes meeting all SOTIF constraints. Furthermore, NSGA-II is employed for multi-objective optimization of computational resource allocation schemes by considering SOTIF constraints and balancing various design objectives, such as task load distribution, memory utilization, and communication cost. NSGA-II can effectively deal with multi-objective optimization problems under complex constraints, offering an efficient and practical optimization strategy for computational resource allocation in unmanned systems. Based on the analytical optimization methods proposed in this paper, the optimal result of computing resource selection and the optimal allocation scheme is supplied, which can give some reference for unmanned system SOTIF design.

Compared with the state-of-the-art techniques associated with the SOTIF issues of unmanned systems, this paper proposes a computational resource allocation scheme modeling with multidimensional SOTIF constraints based on graph and set theory as well as a two-step optimization method for computational resource selection and computational resource allocation. Not only is it an important effort to guide the design of computational resource of unmanned system, but also it is asignificant attempt to combine SOTIF analysis with product forward design. Besides, it is noted that our work also has some disadvantages. This paper sets two general search heuristics, namely minimum residual value and maximum memory requirement, for optimizing SOTIF computing resource selection based on forward checking. Future heuristics can supplement these to enhance the optimization efficiency further.

References

[1]

AbdulazimAElbahaeyMMohamedA (2021). Putting safety of intended functionality SOTIF into practice. SAE Technical Paper, 2021-01-0196

[2]

Birch J, Blackburn D, Botham J, Habli I, Higham D, Monkhouse H, Price G, Ratiu N, Rivett R, (2020). A structured argument for assuring Safety of the Intended Functionality (SOTIF). In: Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops. Lecture Notes in Computer Science, 12235: 408–414

[3]

BoardT (2019). Highway accident report: Collision between vehicle controlled by developmental automated driving system and pedestrian. Available at trb.org/view/1751168

[4]

Cai B, Zhao L, Wang Q, Yan M, Fang T, (2023). A strategy of vehicle following on slope road at night considering the safety of the intended functionality. Physica A, 624: 128951

[5]

Chelouati M, Boussif A, Beugin J, El Koursi E M, (2023). Graphical safety assurance case using Goal Structuring Notation (GSN) — challenges, opportunities and a framework for autonomous trains. Reliability Engineering & System Safety, 230: 108933

[6]

ChenZ WYinS YLiL FCuiW WHongD P (2024). Resilience metric and dynamic assessment of unmanned system-of-systems considering cooperative reconfiguration strategies. IEEE Transactions on Reliability, early access: 1–13

[7]

ChenWZRZhangYSDuiH (2025. Importance-based risk evaluation methodology in transportation cyber-physical systems. Frontiers of Engineering Management,early access: 1–14

[8]

Chu J Y, Zhao T D, Jiao J, Yuan Y, Jing Y F, (2023). SOTIF-oriented perception evaluation method for forward obstacle detection of autonomous vehicles. IEEE Systems Journal, 17( 2): 2319–2330

[9]

Collin A, Bilka A, Pendleton S, Tebbens R D, (2020). Safety of the intended driving behavior using rulebooks. In: IEEE Intelligent Vehicles Symposium (IV). IEEE, 2020: 136–143

[10]

CollinA A C (2019). A systems architecture framework towards hardware selection for autonomous navigation. Dissertation for the Doctoral Degree. Massachusetts Institute of Technology

[11]

de Koning M, Machado T, Ahonen A, Strokina N, Dianatfar M, De Rosa F, Minav T, Ghabcheloo R, (2024). A comprehensive approach to safety for highly automated off-road machinery under Regulation 2023/1230. Safety Science, 175: 106517

[12]

Deb K, Pratap A, Agarwal S, Meyarivan T, (2002). A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation, 6( 2): 182–197

[13]

Esterle K, Aravantinos V, Knoll A, (2019). From specifications to behavior: maneuver verification in a semantic state space. In: IEEE Intelligent Vehicles Symposium (IV). 2140–2147

[14]

Grabbe N, Kellnberger A, Aydin B, Bengler K, (2020). Safety of automated driving: The need for a systems approach and application of the Functional Resonance Analysis Method. Safety Science, 126: 104665

[15]

Guo K, Ye Z S, Liu D T, Peng X Y, (2021). UAV flight control sensing enhancement with a data-driven adaptive fusion model. Reliability Engineering & System Safety, 213: 107654

[16]

Hu J, Xu T, Yan X R, Zhang R C, (2022). Validation on Safety of the Intended Functionality of automated vehicles: concept development. SAE International Journal of Connected and Automated Vehicles, 6( 12-06-01-0006): 83–97

[17]

Expósito Jiménez V J, Winkler B, Castella Triginer J M, Scharke H, Schneider H, Brenner E, Macher G, (2024). Safety of the Intended Functionality concept integration into a validation tool suite. ACM SIGAda Ada Letters, 43( 2): 69–72

[18]

Kalra N, Paddock S M, (2016). Driving to safety: How many miles of driving would it take to demonstrate autonomous vehicle reliability. Transportation Research Part A, Policy and Practice, 94: 182–193

[19]

Khastgir S, Brewerton S, Thomas J, Jennings P, (2021). Systems approach to creating test scenarios for automated driving systems. Reliability Engineering & System Safety, 215: 107610

[20]

Kinalzyk D, (2021). SOTIF process and methods in combination with functional safety. In: European Conference on Software Process Improvement. Cham: Springer International Publishing, 612–623

[21]

Kondrak G, Van Beek P, (1997). A theoretical evaluation of selected backtracking algorithms. Artificial Intelligence, 89( 1–2): 365–387

[22]

Luo Q, Zhang D, Zhou H, Pang S, Li X, Wang C, (2022). Evaluation on driving scenarios for safety of intended functionality of intelligent vehicles. China Safety Science Journal, 32: 140–145

[23]

Mackworth A K, (1977). Consistency in networks of relations. Artificial Intelligence, 8( 1): 99–118

[24]

Neurohr C, Westhofen L, Henning T, De Graaff T, Mohlmann E, Bode E, (2020). Fundamental considerations around scenario-based testing for automated driving. In: 2020 IEEE intelligent vehicles symposium (IV). 121–127

[25]

PimentelJ (2019). Safety of the Intended Functionality. SAE International. Warrendale, PA, USA

[26]

Rau P, Becker C, Brewer J, (2019). Approach for deriving scenarios for Safety of the Intended Functionality. 1–15

[27]

Schnellbach A, Griessnig G, (2019). Development of the ISO 21448. In:European Conference on Software Process Improvement. Cham: Springer International Publishing, 585–593

[28]

Skoglund M, Warg F, Hansson H, Punnekkat S, (2021). Synchronisation of an automotive multi-concern development process. International Conference on Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 63–75

[29]

Srinivas M, Patnaik L M, (1994). Adaptive probabilities of crossover and mutation in genetic algorithms. IEEE Transactions on Systems, Man, and Cybernetics, 24( 4): 656–667

[30]

Wang B, Luo Y, Zhong Z, Li K, (2022). Robust non-fragile fault tolerant control for ensuring the Safety of the Intended Functionality of cooperative adaptive cruise control. IEEE Transactions on Intelligent Transportation Systems, 23( 10): 18746–18760

[31]

Yan M Y, Chen W W, Wang Q D, Zhao L F, Liang X T, Cai B X, (2021). Human–machine cooperative control of intelligent vehicles for lane keeping—Considering Safety of the Intended Functionality. In: Actuators. MDPI, 10( 9): 210

[32]

Zhang X Y, Zhou M, Shao W B, Luo T, Li J, (2019). The architecture of the intended safety system for intelligent driving. In: 2019 IEEE International Symposium on Circuits and Systems (ISCAS). 1–4

[33]

ZhangYLinternGGaoLZhangZ (2021). A study on functional safety, SOTIF and RSS from the perspective of human-automation interaction. SAE Technical Paper, 2021–01–0858

[34]

Zhao X, Lv Z H, Qiu Q A, Wu Y G, (2023). Designing two-level rescue depot location and dynamic rescue policies for unmanned vehicles. Reliability Engineering & System Safety, 233: 109119

[35]

ZhouBChenCZhaiYZhaoS (2022a). A study on scenario generalization and optimization for ADS. SAE Technical Paper, 2022-01-7007

[36]

Zhou H, Li X Y, He X, Li P F, Xiao L Y, Zhang D W, (2022b). Research on safety of the intended functionality of automobile AEB perception system in typical dangerous scenarios of two-wheelers. Accident Analysis and Prevention, 173: 106709

RIGHTS & PERMISSIONS

Higher Education Press

AI Summary AI Mindmap
PDF (5038KB)

495

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/