1. Unmanned systems research institute, Northwestern Polytechnical University, Xi’an 710072, China; National Key Laboratory of Unmanned Aerial Vehicle Technology, Xi’an 710129, China; Integrated Research and Development Platform of Unmanned Aerial Vehicle Technology, Xi’an 710072, China
2. China Academy of Launch Vehicle Technology, Beijing 100076, China
3. China Institute of Marine Technology & Economy, Beijing 100081, China
4. School of Management, Zhengzhou University, Zhengzhou 450001, China
bhcjy@buaa.edu.cn
Show less
History+
Received
Accepted
Published
2024-09-15
2025-02-11
Issue Date
Revised Date
2025-03-31
2025-02-05
PDF
(5038KB)
Abstract
With the rapid expansion of unmanned system capabilities, integrating and sharing computing resources has become essential. In addition to enhancing resource utilization efficiency, this architecture may also introduce conflicts related to resource competition. Therefore, effective resource-sharing configurations are crucial to ensure the Safety of the Intended Functionality (SOTIF). This paper proposes a computing resource configuration analysis and optimization methods for SOTIF. First, four SOTIF requirements are explored using the computing resource-sharing architecture for unmanned systems, encompassing computing time, computing power, energy consumption restrictions, and mutual exclusion and correlation. Secondly, the computing resource configuration model and its SOTIF constraints are formalized based on the graph and set theories. Subsequently, this study divides the design process of computing resource configuration schemes into resource selection and allocation. It introduces a resource selection optimization method based on Forward Checking and a resource allocation optimization method based on NSGA-II. Finally, a typical unmanned driving scenario is considered as an example, and the optimal resource selection and allocation schemes are sequentially determined using the proposed method on the computing platform.
Automation has rapidly increased across multiple industries worldwide (Guo et al., 2021; Khastgir et al., 2021). Unmanned systems, including aerial and underwater variants (Zhao et al., 2023; Chen et al., 2024), not only enhance performance in various fields but also provide significant economic and environmental benefits. However, with these advancements comes increased complexity, leading to a rise in accidents and safety concerns (Chen et al., 2025; de Koning et al., 2024). Ensuring the safety of the intended functionality (SOTIF) has become crucial as functional inadequacies and performance
limitations of unmanned systems become more apparent. Although the ISO/PAS 21448 standard for “Road Vehicles Safety of the Intended Functionality” was introduced in 2019, it lacks specific technical guidance, underscoring the need for further research (Schnellbach and Griessnig, 2019).
The SOTIF process is a hot topic for unmanned systems which mainly deals with the unreasonable risk due to those hazards caused by performance limitations. Some recent fatalaccidents involving autonomous vehicles have revealed that unmanned systems are highly sensitive to safety hazards due to performance limitations rather than traditional hardware or software faults or errors (Board, 2019; Pimentel, 2019). In these accidents, the performance boundary is exceeded at a certain point, namely the unmanned system is no longer competent for itscurrent job. However, users are often much overconfident in these smart unmanned systems and thus neglect the signs of danger.With the large-scale use of intelligent technology, similar risks are increasingly troubling designers. Therefore, it is vital to answer the question of whether the intended function of an unmanned system could be declared safe, which is exactly the ultimate goal of SOTIF design. More and more researchers are starting to delve into the SOTIF field. Kinalzyk (2021) detailed the differences between SOTIF and traditional functional safety work and proposed an integrated analysis approach. Skoglund et al. (2021) comprehensively analyzed the work process and focusedon three types of problems: SOTIF, functional safety, and information security, and provided a safety work arrangement for the entire development cycle of the system. Chelouati et al. (2023) explored the case of automatic train safety and security and proposed a GSN-based high-level framework. Grabbe et al. (2020) recommended using FRAM for risk assessment in developing highly automated vehicles, aiming to provide system design suggestions and insights for validation work. Overall, this study aims to extend the existing safety work process to cover the research scope of SOTIF. Similar work generally emphasizes the non-fault features of SOTIF-related hazards, which has reference significance for a deeper understanding of the SOTIF mechanism.
In addition, many researchers are currently committed to analyzing the SOTIF of an unmanned system through case testing. For example, Neurohr et al. (2020) proposed 16 factors to consider in scenario-based unmanned driving testing, including scenario generation, requirement generation, testing bias, testing execution, and testing confirmation. Zhou et al. (2022a) proposed a unified scenario description language and evaluation standard, which can support the expansion of test scenarios and improve data utilization efficiency. In analyzing SOTIF based on case testing, most studies use statistical indicators such as accident rates and takeover request frequencies (corresponding to situations where the system’s intended functionality is insufficient) as the basis for the final judgment. Birch et al. (2020) proposed a state machine to structure an argument concerning SOTIF. Cai et al. (2023) predicted the motion behavior of the preceding vehicle based on historical data and improved Markov model. Collin et al. (2020) linked the Rulebooks framework and the SOTIF process. Hu et al. (2022) proposed a novel and implementation-independent SOTIF validation strategy through real-world examples. Jiménez et al. (2023) demonstrated how the integration of the SOTIF process within an existing validation tool suite can be achieved. However, Kalra and Paddock (2016) have proven that at least 100 unmanned systems must be driven continuously for 12.5 years to demonstrate that unmanned systems have the same safety level as existing vehicles. Although many efforts have been made to improve case testingefficiency, the cost of analyzing SOTIF through pure experimental means is prohibitively high. There is a strong demand for considering SOTIF requirements in forward design of the unmanned systems.
Meanwhile, many research scholars have focused on SOTIF and its association with human-machine interactions. For example, Yan et al. (2021) proposed a SOTIF evaluation strategy for safety supervision to support the evaluation of driver errors and lane deviation risks caused by driver errors. Zhang et al. (2021) discussed the effectiveness of system theoretical process analysis and cognitive task analysis methods in addressing SOTIF issues in human factors engineering. Abdulazim et al. (2021) proposed a contextual-based predictive ML model to monitor the intervention between the driver and lane keep assist system. Rau et al. (2019) reviewed the SOTIF process, which described the development of a framework for deriving scenarios. It should be noted that SOTIF issues related to human-machine interaction usually only exist in low-level unmanned systems, which do not apply to high-level unmanned driving (SAE L4 and L5) because the necessary takeover actions by human drivers are no longer required when the unmanned driving function is activated.
SOTIF refers to the state description of whether the unmanned capability meets the actual operating needs under non-fault conditions.Thus, research on operating capabilities in specific operating tasks can also be classified into the scope of consideration for SOTIF. For example, Esterle et al. (2019) used linear logic to judge driving decisions during the operational phase to monitor whether they comply with preset traffic rules.Wang et al. (2022) proposed a robust non-fragile fault-tolerant control strategy as a quantitative risk method for the adaptive cruise control function for ensuring SOTIF. Chu et al. (2023) proposed a method to evaluate SOTIF-oriented perception effectiveness for forward obstacle detection of unmanned systems. Zhang et al. (2019) proposed intended safety systems for intelligent driving, incorporating SOTIF concepts to analyze and evaluate the driving scene and system safety. Luo et al. (2022) proposed a fuzzy reasoningevaluation method based on an analysis of scenarios and elements. Zhou et al. (2022b) investigated the safety of autonomous emergency braking (AEB) perception systems, providing crucial insights for optimizing AEB perception system parameters.
Briefly, the SOTIF concept is a challenging field that is directly related to the type of function being considered in unmanned systems. Although there are many conceptual discussions about SOTIF, there are relatively few forward design methods for specific functions.This paper presents an SOTIF analysis and optimization for unmanned systembased on computational resource allocation, the main contributions of this study are summarized as follows:
1) Computational resource allocation scheme modeling with multidimensional SOTIF constraints based on graph and set theory: This study constructs a comprehensive model for computational resource allocation in unmanned systems using graph and set theory. It considers task relationships, communication requirements, and SOTIF constraints, enabling a systematic analysis to ensure safety.
2) Optimization method for computational resource selection based on Forward Checking: This study introduces an optimization method for computational resource selection using Forward Checking. It boosts efficiency by narrowing the search space and swiftly identifying optimal allocation schemes that meet SOTIF constraints.
3) Optimization method for computational resource allocation based on NSGA-II: This study uses NSGA-II to optimize computational resource allocation, considering various objectives, such as load distribution and communication cost, while meeting SOTIF constraints. The NSGA-II generates Pareto-optimal solutions, enabling efficient resource use and safety.
This study introduces an innovative framework for analyzing and optimizing computational resource allocation in unmanned systems, enhancing both their efficiency and safety. The paper is organized as follows: Section 2 outlines the objectives and problem definition. Section 3 discusses the SOTIF analysis method based on computational power requirements. Section 4 details the comprehensive optimization methods for resource selection considering SOTIF and computational power costs. Section 5 details the comprehensive optimization method for resource allocation considering SOTIF and rational computational power allocation. Section 6 presents a case study, and Section 7 concludes the study with key findings.
2 Object description and problem description
Unmanned systems are intelligent systems that perceive their environment and make driving decisions autonomously. For specific unmanned driving tasks, the resource entities involved can be categorized into four types: sensors, communication units, processors, and actuators, as shown in Fig. 1. During task execution, sensors capture and preprocess environmental data. This data is transmitted through communication units to processors, where specific applications perform further computations. After multiple processing stages, driving commands are sent via communication units to actuators, which adjust the vehicle’s behavior in real-time.
The design process for the computational resource allocation scheme in unmanned systems is illustrated in Fig. 2. It begins with a functional logic model derived from breaking down the driving tasks, which defines the target functions and their interactions. Various applications and messages within this model act as virtual resources deployed on computational platforms, serving as key inputs for the allocation scheme. Additionally, information about available hardware resources is a critical input for this design process. Based on these foundations, the computational resource allocation design can be divided into two key challenges:
1) Hardware Resource Selection Problem: This involves selecting an appropriate combination of hardware entities from the available resource pool to form a computational platform system. This system must support at least one configuration that satisfies SOTIF requirements.
2) Functional Logic Architecture and Computational Platform Mapping Problem: This focuses on balancing multiple design objectives to find the optimal allocation among all configurations that meet SOTIF requirements.
To address these challenges, this study proposes a computational resource allocation method based on graph and set theory. The method leverages functional logic and resource entity models to evaluate resource sharing and constraints related to SOTIF. The optimization process is divided into two stages: resource selection and allocation scheme optimization. Forward Checking and NSGA-II algorithms are employed for optimization. Comprehensive case studies validated the method’s effectiveness, demonstrating significant improvements in resource allocation efficiency.
3 SOTIF analysis based on computational power requirements
This section performs formal modeling for the computational resource allocation scheme and its related SOTIF requirements to support the subsequent analysis and optimization work for SOTIF requirements.
3.1 The functional logic model
After decomposing and integrating into reusable functions, autonomous driving tasks are represented as a series of executable applications. Communication between these applications ensures task progress. As shown in Fig. 3, a typical functional logic model depicts these relationships. In this study, a quintuple represents the functional logic relationship for autonomous driving tasks, as follows:
where represents the set of functions to be executed; represents the set of communications to be transmitted; is the communication cost matrix between functions, where denotes the bandwidth required to send a message from function to , with main diagonal elements always 0; and are communication-sending and receiving matrices, respectively. In , if function sends communication requirement , else ; in , if function receives communication requirement , else .
Furthermore, each functioncan be decomposed into a series of real-time application requirements, defined as follows:
where represents the memory requirements for executing function ; represents the set of application programs within , assumed to be numbered by priority. Each application program is characterized by its worst-case execution time , deadline , and arrival period . The worst-case execution time depends on the processing resource capability used. Similarly, each communication requirement is decomposed into a series of messages, defined as follows:
where represents the information within the communication requirement , numbered by priority. Each information is described by six parameters: communication cost , worst-case transmission time , transmission deadline , message period , source application program , and target application program . The worst-case transmission time is dependent on the communication resource capability.
3.2 Resource entity model
As shown in Fig. 4, the types of resource entities included in the computing platform system can be divided into processor and communication resources. The resource entity model is represented by a triple , whichis defined as follows:
where represents the set of processor resources, and its element is used to refer to the processor entity included in the platform; represents the set of communication resources, and its element is used to refer to the communication bus included in the platform; is the connection matrix, and its element represents the connection relationship between processor and communication bus . When processor is connected to communication bus , , indicating that data transmission can take place.
The basic performance of any processing resource node is characterized by the memory constraint , input/output communication bandwidth constraint , and computing power . Additionally, for a running processor, its energy consumption per unit time includes both static and dynamic energy components (Collin et al., 2019):
where thestatic power consumption, denoted as , encompasses power consumed by the clock circuit during processor core execution, multi-threaded dynamic scheduling control, on-chip bus communication, and other overheads provided by the processor manufacturer. Dynamic power consumption, denoted as , primarily arises from computing and storage units, varying with the executed program. To approximate dynamic power consumption, two parameters, for storage space operations and for time computing operations, are agreed upon. The calculation method for the dynamic power consumption is as follows:
where represents the size of memory occupied by the program during execution; represents the occupancy rate of the effective time of program execution, determined by the ratio of actual execution time to arrival time interval.
Based on this, any processor resource can be represented by the following six-tuple:
Similarly, communication resources can be characterized using basic performance parameters such as communication bandwidth , and communication capability . Unlike processor resources, the energy consumption related to access operations can be ignored when considering communication resource consumption, and instead, static power consumption and power consumption per unit time for transmission operation are used to characterize communication resource performance. Therefore, any communication resource can be represented using the following four-tuple:
Considering the computing power of different processor resources directly impacts the estimation of worst-case execution time for application programs. This paper simplifies this consideration by using relative capacity values. A reference processor is chosen in the computing platform system, with its processing capacity set to 1. The processing capacity parameter of other processors is the ratio of their processing capacity to that of the reference processor. Similarly, relative communication capabilities were used to describe the performance of the communication buses in this study.
3.3 Configuration model and SOTIF constraints
Based on the definitions of the functional logical and resource entity models mentioned above, the following two allocation matrices can be used to characterize the mapping relationship between the application program and messages with their corresponding entity resources:
where represents the function allocation matrixand represents the communication allocation matrix, where the corresponding elements satisfy:
Note that the functionality allocation matrix , communication allocation matrix and the resource connectivity matrix described in section 3.2 are inherently correlated. Equations (11) and (12) provide the mathematical relationship between the three matrices from the sending and receiving communication perspective, respectively:
where , . Combining Eqs. (11)and (12), the following identity can be derived.
where and representing taking the maximum/minimum value bitwise.
On this basis, this study considers a configuration scheme to be compliant with SOTIF requirements if and only if it satisfies the following conditions simultaneously:
1) Uniqueness requirement for function and communication allocation
All functions are assigned to one and only one corresponding processor resource entity:
When the sending and receiving functions are located on different processor resources, the communication requirement is sent and received by one and only one corresponding communication resource. When the sending and receiving functions are located on the same processor resource, the communication requirement can be directly fulfilled by accessing the memory of the processor:
2) The configuration scheme satisfies the real-time constraints of all application executions
In an effective configuration scheme, each application needs to complete execution before its corresponding deadline . Considering the computational characteristics of processor resource when application is deployed on processor resource its corresponding equivalent worst-case execution time is . We use the worst-case task response time to represent the upper limit of the time required to complete application . The scheduling mode of programs on processor resources will directly affect their corresponding worst-case task response time. In this article, we consider the most common fixed-priority scheduling mode. Based on this, it can be determined that:
where denotes rounding up; represents the set of applications with higher priorities than running on the same processor. Equation (17) reflects the worst-case response time of a task, which consists of the worst-case execution time and the time preempted by higher-priority tasks running on the same processor.
In computing resource sharing, partition scheduling is a widely used mechanism where the rotation period for running partitions on a processing resource module is denoted as . The proportion of the total period that an application corresponding to functionality occupies in its partition is denoted as (referred to as the partition coefficient). Considering the inherent mechanism of mutually exclusive partition scheduling, other partitions can be regarded as a cyclic task with higher priority, having a period of and execution time of when computing the worst-case response time of the application . Based on this, Eq. (18) can be reformulated:
It is known that the partition rotation period is a predetermined positive actual number. If , it follows that:
According to Eq. (18):
And thus satisfy:
For application , It satisfies the real-time requirement if and only if the response time is not greater than the deadline (i.e. ) which is equivalent to Eq. (22):
Therefore, it can be considered that the real-time requirements of all applications in the partition where function is located can be met as long as they satisfy:
where is defined to constrain the lower bound of the partition coefficient , which is only related to the function .
Thus, the real-time requirements related to the application can be expressed in the scheduling scheme as follows: “For any processor resource, there exists a feasible combination of partition coefficients, such that each application within each partition is schedulable and the sum of all partition coefficients does not exceed 1.” In other words, it satisfies:
3) The configuration scheme meets the real-time constraints of all message transmissions
When the communication requirement is assigned to the communication resource , the worst-case transmission time of message in on the bus can be represented as follows:
where represents the set of messages with higher priority than on the same data bus; since there is actually no direct priority relationship between different communication requirements , whenever considering the communication requirement in this paper, it is assumed conservatively that other communication requirements () have higher priority than ; represents the maximum blocking time, which is equivalent to the blocking caused by the longest transmission time of the low-priority message:
Similarly, according to Eq. (25), it can be inferred that:
After simplification:
In summary, to strictly ensure that the worst-case transmission time is not greater than the deadline , a feasible approach is to make sure that:
For simplicity, concerning any communication requirement (), two related variables are defined in this paper, the values of which are solely dependent on the communication requirement :
Therefore, Eq. (29) is equivalent to:
where is defined by Eq. (32), and its value is only related to the message .
It should be noted that although Eq. (31) can provide the most accurate real-time guarantee for transmission delay, it needs to be calculated separately for each message, which poses a huge challenge for practical analysis. To simplify the calculation, the communication requirement , is defined as:
On this basis, the requirement that “the scheduling scheme can meet the real-time constraints of all message transmissions” can be expressed as:
where Eq. (35) is a sufficient condition for Eq. (31) to hold, i.e., Eq. (35) can provide a stronger feasibility guarantee.
4) The processing capacity requiredunder the maximum processing resources that a processor can provide
For any processor resource module, the application resource requirements deployed on it do not exceed its inherent memory, output bandwidth, and input bandwidth capabilities. It satisfies:
5) The communication capacity requiredunder the maximum communication resources that can be provided
For any communication resource module, the sum of the required communication bandwidths corresponding to all messages transmitted through the communication resource by the processors connected does not exceed its inherent communication bandwidth capacity limit. This includes both input bandwidth requirements and output bandwidth requirements, where:
6) All processor resource power consumption under the threshold
High-performance processor resources enhance the performance of unmanned driving tasks but often result in increased energy consumption and heat dissipation. Processor power consumption comprises static and dynamic components, with the dynamic component further divided into computational and storage operations. A reasonable and safe configuration scheme should ensure that the total power consumption of all processor resources remains within a predefined threshold, as follows:
7) Power consumption of all communication resources under the thresholds
Similarly, the working power consumption of all communication resources must not exceed a specified threshold. This paper primarily addresses the static power consumption and data transmission power consumption of communication resources, with the following requirements:
In designing a shared configuration scheme, it is essential to consider preset allocation constraints and correlations between different functions and between functions and processor resources, as required by unmanned driving tasks.
Mutual exclusion in allocation means that “two target functions cannot be deployed on the same processor resource.” This requirement is satisfied by:
when Fi and Fk are preset as mutually exclusive functions.
Allocated correlation means that “two target functions must be deployed on the same processing resource.” This requirement is satisfied by:
when Fi and Fk are preset as correlated functions.
In summary, Eqs. (14)–(16), (24), (35)–(44) collectively constitute the constraint criteria for the feasibility of the configuration . To facilitate batch operation analysis, this paper introduces auxiliary matrices listed in Table 1, which enable a vectorized representation of each constraint.
On this basis, SOTIF constraints of the configuration scheme can be reorganized into the following matrix expression:
where denotes the operation of transforming a column vector into a diagonal matrix, while denotes the operation of extracting the diagonal elements of a square matrix to form a column vector. Equation (46) provides examples of the operations of these two operators; Constraints , and correspond to uniqueness requirements; constraints and correspond to temporal requirements; constraints , , , , correspond to capability requirements; constraints and correspond to energy consumption limit requirements; and constraints and correspond to mutual exclusion and correlation requirements.
4 Comprehensive optimization for resource selection considering SOTIF and computational power costs
This section presents a method for optimizing SOTIF and computational power costs for unmanned systems under varying computational power conditions. It introduces Constraint Satisfaction Problems (CSP) and a forward-checking algorithm, illustrating how hardware resource selection can be addressed through CSP construction.
4.1 Constraint satisfaction problems and Forward Checking algorithm
CSP has been applied to many practical problems since Mackworth (1977) first developed it. Classic examples include map coloring, job scheduling, and the n-queens problem. A formally defined CSP consists of a set of variables, each assigned values from a specific domain, and a set of constraints that must be simultaneously satisfied. This can be represented as the following triple:
where represents a set of variables; represents the corresponding domain of variables, and each element () reflects all possible values for each variable ; represents a finite set of constraints that limit feasible values for each group of variables.
A feasible solution for a CSP is a set of specific assignments , from the variable domains, which guarantees that all constraints are not violated. Solving a CSP involves assigning values to variables to find feasible solutions. If at least one solution exists, the CSP is considered satisfiable; otherwise, it is unsatisfiable. There are two main approaches to solving a CSP: backtracking search and constraint propagation. Backtracking systematically explores all possible value combinations, often using depth-first search, to identify feasible solutions. In contrast, constraint propagation narrows the range of valid variable values by enforcing “local compatibility” through continuous reasoning. Haralick and Elliott combined these methods into the Forward Checking algorithm Kondrak and Van Beek (1997), which prunes the search tree early to reduce the number of nodes visited, minimizing the search effort.
Table 2 presents the pseudocode for the main program using Forward Checking. It integrates two heuristic techniques: ‘Select-Unassigned-Variable’ and ‘Order-Domain-Values.’ These heuristics allow for efficient variable and value ordering based on the problem’s requirements, improving search performance. Common heuristic methods include minimum remaining values, minimum degree, and minimum constraint values, among others.
Figure 5 illustrates the process of optimizing compute resource selection. This involves constructing a CSP in a limited search space and ensuring it meets SOTIF requirements using the forward-checking algorithm. The ‘compute resource selection’ challenge is divided into two stages: ‘processor resource selection’ and ‘communication resource selection’. The goal is to create a cost-effective plan that fulfills all SOTIF requirements.
4.2.1 Processor resource selection
In addressing the “processor resource selection” problem, communication resource constraints are temporarily ignored, assuming sufficient communication resources for message transmission. In Eq. (45), the constraints directly related to processor resources include eight items: , , , , , , , . These are used as criteria to assess the feasibility of processor resource combinations. For all processing resource sets in the resource library, a processing resource combination can be defined by the following variables:
where represents the number of resources selected for the ith candidate processing resource type .
This study defines the relationship between the processor resource combination scheme, , and the processor resource set in the resource entity model, as illustrated in Fig. 6. The elements in both sets satisfy the following criteria:
Designers can set an acceptable upper limit on the number of processor resources, , in advance, due to the constraints of onboard space. Additionally, a conservative constraint is that the number of processor resources will not exceed the number of target functions, since the worst-case scenario would involve assigning each task to a different processing resource. Thus, . Inspired by the memory resource capacity constraint in Eq. (36), it can be determined for the final resource entity scheme that:
The constraint is a necessary condition for constraint , which is independent of the allocation of functions and can support rapid prunin search space pruning. According to Eq. (50), it can be determined that:
Based on this, the “processor resource selection” problem can be formulated as the following optimization problem:
where represents the mapping relationship between functions and processing resources, defined by Eq. (9).
In fact, due to the constraint that ( is a positive integer), Eq. (52) can be understood as a finite-state search problem. By considering only the feasible domain and constraint , we can easily obtain all potential solutions and calculate the corresponding design costs. We use to represent the set of all potential solutions, where the solutions are numbered in ascending order of cost, i.e., (when ). After determining , Eq. (52) can be solved by sequentially checking whether a feasible allocation scheme .
The symbol is used to represent any processor resource combination corresponding to a traversal process. To reduce the search space when judging the feasibility of the function allocation scheme , this paper defines the following auxiliary column vector for the function allocation scheme by borrowing the requirement of allocation uniqueness:
where represents the processor resource number on which function is deployed, the element in the allocation scheme satisfies:
On this basis, the problem of determining whether SOTIF requirements can be satisfied for a given processor resource combination can be formulated as a CSP problem with the following structure.
where .
This paper introduces two heuristic methods for selecting unassigned variables:
1) Minimum Remaining Values (MRV): This method selects the variable with the fewest remaining values in its domain among the unassigned variables.
2) Maximum Memory Requirement (MMR): This method chooses the variable with the highest memory requirement among the unassigned variables.
Although the auxiliary column vector offers a better representation for reducing the search space, the original matrix is more practical for checking constraint violations. Therefore, during consistency checks in the Forward Checking algorithm, it is essential to convert between the auxiliary column vector and the original matrix . The conversion rules refer to Eqs. (53) and (54).
4.2.2 Communication resource selection
For all communication resource sets in the resource library, a communication resource combination can be defined using the following variables:
where represents the number of resources selected for the ith candidate communication resource type .
The communication resource combination is defined similarly as in Fig. 6, and its correspondence with the communication resource set in the resource entity model satisfies the following condition:
Similarly, designers can preset an acceptable upper limit of communication resource quantity , while the lower limit of communication resource quantity can be determined according to Eq. (58):
Note that when evaluating the communication resource combination , the satisfiability of the resource connection matrix must be checked simultaneously. According to Eq. (13), the resource connection matrix can be directly determined from matrix and matrix . Therefore, it is unnecessary to assign values separately to the resource connection matrix .
In summary, this paper represents the “communication resource selection” problem as the following optimization problem:
Similarly, the “communication resource selection” problem is also regarded as a search problem in a finite state space. It is assumed that represents the set of all potential solutions for the “communication resource selection” optimization problem, and the solutions are numbered in ascending or concerning (). Therefore, Eq. (59) can be solved by sequentially checking the feasibility of the communication resource combination corresponding to each potential solution concerning the functionality allocation matrix and the communication allocation matrix .
The symbol is used to represent the combination of communication resources during any traversal process. Similar to constructing the auxiliary column vector for the functionality allocation matrix in Eq. (53), this paper defines the auxiliary column vector corresponding to the communication allocation matrix as follows:
where represents the communication resource number connected to the communication requirement . In addition, it is agreed that when the communication demand does not need to be transmitted through any communication resource, its corresponding element , that is when . Correspondingly, the elements in the communication allocation matrix satisfy:
Subsequently, the problem of determining the feasibility of SOTIF requirements for a given communication resource combination scheme is constructed in the followingCSP form:
where , .
When a feasible solution is found for the CSP in Eq. (62), the current communication resource combination scheme is optimal and meets all requirements. If no feasible solution exists, the scheme must be revised, and the next option in the set should be evaluated. The final optimal computing resource combination scheme, denoted as , is determined by combining the best solutions from both the “processor resource selection” and “communication resource selection” problems. To maintain consistency with the symbols used in Section 3.2, we define and . Therefore, the optimal computing resource combination scheme is represented as .
5 Comprehensive optimization for resource allocation considering SOTIF and rational computational power allocation
This subsection discusses trade-offs among design objectives and optimal solution selection in computational resource allocation schemes for functional safety. It introduces constrained optimization problems and NSGA-II, detailing optimization based on safety constraints.
5.1 Constraint optimization problems and the NSGA-II algorithm
In this study, the Non-Dominated Sorting Genetic Algorithm (NSGA-II) (Deb et al. 2002) is used to design the computing resource allocation scheme. Table 3 provides the pseudocode for NSGA-II. This algorithm enhances traditional genetic algorithms by integrating Pareto sorting to obtain Pareto-optimal solutions for multiple objectives. NSGA-II generally comprises the following six steps: 1) population initialization; 2) non-dominated sorting; 3) crowding distance assignment; 4) optimization selection; 5) genetic population generation (crossover and mutation); 6) population recombination and generation.
5.2 Optimization methods for computing resource allocation schemes
For a given combination of computing resources , there may be multiple feasible allocation schemes for computing resources, with differences in load distribution and communication costs. According to Eq. (13), the resource connection matrix can be derived from the functional allocation matrix and the communication allocation matrix . Therefore, the independent variables that need to be determined in the process of designing the computing resource allocation scheme include the functional allocation matrix and the communication allocation matrix We represent the computing resource allocation scheme as (or ), and consider the following three optimization objectives in this paper:
1) Achieving as uniform a load distribution as possible, balancing the task utilization of processor resources in the system
Task utilization is a key metric for evaluating processor resource performance. It represents the proportion of time that processor resources are actively executing tasks during system operation. The utilization of processor resources depends on the functions assigned and running on them. For a function , its task utilization is defined as follows:
Therefore, for a given configuration scheme , considering the task utilization factor, this article uses the second-order central moment to represent the optimization objective as follows:
where represents a column vector composed of ; represents a column vector composed of the task utilization factor of each processor resource under the configuration scheme ; and represents the average task utilization factor of each processor resource.
2) Allocate the load as evenly as possible and balance the memory utilization of processor resources in the system
Similarly, considering the memory utilization of processor resources, this paper uses the second-order central moment to represent the optimization objective as follows:
where represents an column vector composed of the memory utilization of each processor resource under the configuration , and represents the average memory utilization of each processor resource.
3) Minimize the communication cost required by the system as much as possible
Considering the total communication cost required by the system, this paper represents the optimization objective using the first-order moment as follows:
Considering the three factors mentioned above, the optimization problem for allocating computing resources can be defined as the following multi-objective constrained optimization problem:
This paper uses NSGA-II to solve the multi-objective constrained optimization problem described in Eq. (67). When using NSGA-II, a chromosome encoding format, as shown in Fig. 7 is adopted. The chromosome consists of a total of bits, where the first bits correspond to the allocation of one objective function each, and the last bits correspond to a specific connection of processor resources. It is easy to convert the chromosome encoding into a computing resource allocation scheme using Eqs. (53) and (60).
Considering the nonlinear nature of SOTIF constraints, this paper uses the penalty function method to transform the multi-objective optimization problem into an unconstrained optimization problem. The encoding method illustrated in Fig. 1 automatically satisfies the constraints and for the resource allocation scheme . Therefore, penalties are designed for constraints , as follows:
where represents the column sum norm of a matrix, which is the maximum value of the absolute sum of all column vectors of the matrix; represents the maximum value taken element-wise. In this article, we further integrate all penalty functions and express them in the form of Eq. (69):
where represents the weight value of each normalized penalty function indicator; and represent the weight values and row vector composed of each penalty function indicator, respectively.
By combining the objective function and penalty function, the fitness function used in NSGA-II for problem-solving can be expressed as:
where is also a weight value used for normalization.
At this point, based on the chromosome encoding defined in Fig. 7. and the fitness function defined in Eq. (70), the NSGA-II algorithm provided in Table 3 can be smoothly executed.In practice, the following tricks are recommended in order to obtain the optimal computed resource allocation :
1) All the weight values should be trailed before the NSGA-II algorithm is executed.On the one hand, throughestimating the magnitudes of , and , we canpreset the value of to ensure that , , and are of the same magnitude. On the other hand, because lower fitness values indicate better solutions, it is believedthat an unsatisfiedscheme will reach a rather high fitness value by setting the condition . Therefore, throughestimating the magnitudes of thepenalty functions, we can preset the value of to ensure the will be significantly higher than , , and .
2) The control parameters of the NSGA-II should be scientifically designed.Control parameters, such as population size , crossover rate and mutation rate , have a direct impact on the performance and stability of the algorithm. According to practical experience,the preferredranges of initialvalues for , and are [20, 200], [0.6, 1], and [0.01, 0.1], respectively. There are several options to better determine these control parameters. For example, we can carry out the control parameter tuning experiments and observe the specific impact on the performance of the algorithm.Besides, adaptive probabilities of crossover and mutation have also been a favored choice (Srinivas and Patnaik, 1994).
3) The correctness of the final solutions should be verified after the optimal process. Because ofdefining the penalty functions, it is impossible to completely rule out the possibility that the final solution does not satisfy the SOTIF constraints. Therefore, it is necessary to verify the correctness of the Pareto optimal solution through automated solution tools. In practice, the feasibility verification code of the solution is similar to the penalty function code, and thus partial code can be reused.
Finally, by combining the computed resource combination obtained in Section 3 and the computed resource allocation , determined in this section, a computed resource configuration scheme that satisfies all SOTIF requirements is generated.
6 Case study
In this section, we analyze and optimize computing resource allocation schemes for unmanned driving functions in relation to SOTIF requirements. Tables 4 and 5 provide detailed parameters for the expected functions/applications and communication/messages. Based on Table 5, the communication cost matrix , communication sending matrix and communication receiving matrix defined in Eq. (71) can be determined as follows:
6.1 Computing resource selection
The selection and optimization of computing resources according to SOTIF requirements is divided into two phases: “Processor resource selection” and “Communication resource selection.” In general terms, the power consumption threshold is set to 150 W for processor resources and 70 W for communication resources.
By analyzing the Processor Resource Selection problem, the lower and upper limits for the number of processor resources selected in the repository shown in Table 6 are first defined as follows:
Furthermore, a total of 2793() potential solution sets were constructed, and a preliminary screening was performed based on constraint defined in Eq. (50), resulting in the set , composed of 2587 potential solutions, sorted in ascending order of cost. Based on the Forward Checking algorithm, the corresponding constraint satisfaction problem was solved, and the 431st processor resource combination was ultimately determined as the optimal solution that satisfies SOTIF constraints (, , , , , ) which selects one , one , and two . For this processor resource solution, the assignment order and feasible solutions obtained using the “least remaining value” and “maximum memory requirement” heuristics with the Forward Checking algorithm are as follows:
This paper compares the actual number of assignment operations with the expected upper limit of operations when applying the Forward Checking algorithm to solve the CSP for each candidate solution , as shown in Fig. 8. The results indicate a significant reduction in the number of assignment operations due to the use of the “minimum remaining value” and “maximum memory requirement” heuristics, which effectively minimize unnecessary operations.For example, for , the total number of hardware resources used is 4. If a full search traversal is performed, the overall expected upper limit of assignment operations is , However, after only 40 assignment operations using the Forward Checking algorithm, it is determined that the current processor resource combination cannot satisfy all SOTIF requirements.
On the basis of the optimal processor resource combination obtained in this paper, further optimization design is carried out for the communication resource selection problem. Similarly, the lower and upper limits of the number of communication resources selected in the resource library described in Table 7 are defined as:
Furthermore, a set of 120(·) potential solutionsare constructed in , where the solution numbers are arranged in ascending order of cost. Based on the Forward Checking algorithm, the corresponding constraint satisfaction problem is solved, and the 9th communication resource combination solution is determined as the optimal solution that can satisfy SOTIF constraints (), i.e., two . are selected. The assignment sequence and feasible solutions for this communication resource solution are shown below:
In summary, the optimal result for the selection of computing resources that meets SOTIF requirements is:
6.2 Computingresource allocation
Based on the optimal compute resource selection scheme determined by Eq. (80), this section will further use the NSGA-II algorithm to determine the optimal compute resource allocation scheme that satisfies SOTIF requirements. To set the penalty coefficient more reasonably, this paper first makes a preliminary estimate of the order of magnitude of the objective functions defined in Eqs. (64)–(66) and the penalty function defined in Eq. (69), where the magnitudes of , and are approximately 0.01, 0.01, and 100, respectively, while the penalty function is generally not less than 10. Therefore, based on experience, the weighting coefficients related to the objective functions in Eqs. (69) and (70) are specified as follows:
In this case, in order to ensure the search strength for the solution space,the population size and the maximum genetic generation are set as 200 and 500, respectively. Meanwhile, the adaptive crossover rate and mutation rate is used to enhancethe performance and stability of the algorithm. Drawing on Srinivas’ widely recognized research (Srinivas and Patnaik, 1994), detailed definitions of crossover rate and mutation rate for each generation are specified as follows:
where is the larger of thefitness values of the solutions to be crossed in each generation; is the minimum of fitness values ; is the average of fitness values . Both Eqs. (82) and (83) reflect that the closerto the , the smaller rate should be set.
Figure 9 illustrates the NSGA-II optimization process. Figure 9(a) Shows the average fitness values of 200 individuals over generations, with initial sharp drops indicating elimination of infeasible solutions. As shown in Fig. 9(b), after about 8 generations, the curve of the Pareto optimal total number of individuals has remained at 200. However, the curve for the Pareto optimal total types of individual types only began to converge after about 139 generations, and finally stabilized at 10. This convergence indicates solution stability despite maintaining solution diversity.
For the Pareto optimal solution generated after 500 iterations, 70 duplicate individuals were further removed in the last generation. And the remaining 10 different solutions are presented in Table 8. Obviously, the fitness values of all Pareto optimal solutions will already have their corresponding penalty functions at 0 after 500 iterations. Therefore, the original objective functions , and can be directly obtained based on the fitness values, as shown in Fig. 10. Since these resource allocation schemes are Pareto optimal and thus often require further analysis in practical engineering applications. In this case, there is a cluster of points near the origin of the UXY–RXY view, there is a cluster of points near the origin. Solutions within this cluster are recommended if the focus is on average resource usage, with total communication cost as a secondary consideration. Consequently, the 3 rdsolution is identified as the most suitable allocation scheme in this case.
Based on the analysis in Sections 6.1 and 6.2 the optimal computing resource allocation scheme can be determined as follows:
where the resource connection matrix is determined according to Eq. (13).
7 Conclusions
This paper proposes an innovative computational resource allocation method for unmanned systems considering SOTIF, aiming at enhancing system performance and safety. First, a comprehensive computational resource allocation model is established by considering multidimensional SOTIF constraints, which can ensure SOTIF across various driving scenarios. Secondly, a forward-checking-based optimization method is proposed for computational resource selection, which can reduce search space and improve efficiency. This method can rapidly identify and exclude infeasible resource combinations, and expedite the discovery of optimal allocation schemes meeting all SOTIF constraints. Furthermore, NSGA-II is employed for multi-objective optimization of computational resource allocation schemes by considering SOTIF constraints and balancing various design objectives, such as task load distribution, memory utilization, and communication cost. NSGA-II can effectively deal with multi-objective optimization problems under complex constraints, offering an efficient and practical optimization strategy for computational resource allocation in unmanned systems. Based on the analytical optimization methods proposed in this paper, the optimal result of computing resource selection and the optimal allocation scheme is supplied, which can give some reference for unmanned system SOTIF design.
Compared with the state-of-the-art techniques associated with the SOTIF issues of unmanned systems, this paper proposes a computational resource allocation scheme modeling with multidimensional SOTIF constraints based on graph and set theory as well as a two-step optimization method for computational resource selection and computational resource allocation. Not only is it an important effort to guide the design of computational resource of unmanned system, but also it is asignificant attempt to combine SOTIF analysis with product forward design. Besides, it is noted that our work also has some disadvantages. This paper sets two general search heuristics, namely minimum residual value and maximum memory requirement, for optimizing SOTIF computing resource selection based on forward checking. Future heuristics can supplement these to enhance the optimization efficiency further.
AbdulazimAElbahaeyMMohamedA (2021). Putting safety of intended functionality SOTIF into practice. SAE Technical Paper, 2021-01-0196
[2]
Birch J,Blackburn D,Botham J,Habli I,Higham D,Monkhouse H,Price G,Ratiu N,Rivett R, (2020). A structured argument for assuring Safety of the Intended Functionality (SOTIF). In: Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops. Lecture Notes in Computer Science, 12235: 408–414
[3]
BoardT (2019). Highway accident report: Collision between vehicle controlled by developmental automated driving system and pedestrian. Available at trb.org/view/1751168
[4]
Cai B,Zhao L,Wang Q,Yan M,Fang T, (2023). A strategy of vehicle following on slope road at night considering the safety of the intended functionality. Physica A, 624: 128951
[5]
Chelouati M,Boussif A,Beugin J,El Koursi E M, (2023). Graphical safety assurance case using Goal Structuring Notation (GSN) — challenges, opportunities and a framework for autonomous trains. Reliability Engineering & System Safety, 230: 108933
[6]
ChenZ WYinS YLiL FCuiW WHongD P (2024). Resilience metric and dynamic assessment of unmanned system-of-systems considering cooperative reconfiguration strategies. IEEE Transactions on Reliability, early access: 1–13
[7]
ChenWZRZhangYSDuiH (2025. Importance-based risk evaluation methodology in transportation cyber-physical systems. Frontiers of Engineering Management,early access: 1–14
[8]
Chu J Y,Zhao T D,Jiao J,Yuan Y,Jing Y F, (2023). SOTIF-oriented perception evaluation method for forward obstacle detection of autonomous vehicles. IEEE Systems Journal, 17( 2): 2319–2330
[9]
Collin A,Bilka A,Pendleton S,Tebbens R D, (2020). Safety of the intended driving behavior using rulebooks. In: IEEE Intelligent Vehicles Symposium (IV). IEEE, 2020: 136–143
[10]
CollinA A C (2019). A systems architecture framework towards hardware selection for autonomous navigation. Dissertation for the Doctoral Degree. Massachusetts Institute of Technology
[11]
de Koning M,Machado T,Ahonen A,Strokina N,Dianatfar M,De Rosa F,Minav T,Ghabcheloo R, (2024). A comprehensive approach to safety for highly automated off-road machinery under Regulation 2023/1230. Safety Science, 175: 106517
[12]
Deb K,Pratap A,Agarwal S,Meyarivan T, (2002). A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation, 6( 2): 182–197
[13]
Esterle K,Aravantinos V,Knoll A, (2019). From specifications to behavior: maneuver verification in a semantic state space. In: IEEE Intelligent Vehicles Symposium (IV). 2140–2147
[14]
Grabbe N,Kellnberger A,Aydin B,Bengler K, (2020). Safety of automated driving: The need for a systems approach and application of the Functional Resonance Analysis Method. Safety Science, 126: 104665
[15]
Guo K,Ye Z S,Liu D T,Peng X Y, (2021). UAV flight control sensing enhancement with a data-driven adaptive fusion model. Reliability Engineering & System Safety, 213: 107654
[16]
Hu J,Xu T,Yan X R,Zhang R C, (2022). Validation on Safety of the Intended Functionality of automated vehicles: concept development. SAE International Journal of Connected and Automated Vehicles, 6( 12-06-01-0006): 83–97
[17]
Expósito Jiménez V J,Winkler B,Castella Triginer J M,Scharke H,Schneider H,Brenner E,Macher G, (2024). Safety of the Intended Functionality concept integration into a validation tool suite. ACM SIGAda Ada Letters, 43( 2): 69–72
[18]
Kalra N,Paddock S M, (2016). Driving to safety: How many miles of driving would it take to demonstrate autonomous vehicle reliability. Transportation Research Part A, Policy and Practice, 94: 182–193
[19]
Khastgir S,Brewerton S,Thomas J,Jennings P, (2021). Systems approach to creating test scenarios for automated driving systems. Reliability Engineering & System Safety, 215: 107610
[20]
Kinalzyk D, (2021). SOTIF process and methods in combination with functional safety. In: European Conference on Software Process Improvement. Cham: Springer International Publishing, 612–623
[21]
Kondrak G,Van Beek P, (1997). A theoretical evaluation of selected backtracking algorithms. Artificial Intelligence, 89( 1–2): 365–387
[22]
Luo Q,Zhang D,Zhou H,Pang S,Li X,Wang C, (2022). Evaluation on driving scenarios for safety of intended functionality of intelligent vehicles. China Safety Science Journal, 32: 140–145
[23]
Mackworth A K, (1977). Consistency in networks of relations. Artificial Intelligence, 8( 1): 99–118
[24]
Neurohr C,Westhofen L,Henning T,De Graaff T,Mohlmann E,Bode E, (2020). Fundamental considerations around scenario-based testing for automated driving. In: 2020 IEEE intelligent vehicles symposium (IV). 121–127
[25]
PimentelJ (2019). Safety of the Intended Functionality. SAE International. Warrendale, PA, USA
[26]
Rau P,Becker C,Brewer J, (2019). Approach for deriving scenarios for Safety of the Intended Functionality. 1–15
[27]
Schnellbach A,Griessnig G, (2019). Development of the ISO 21448. In:European Conference on Software Process Improvement. Cham: Springer International Publishing, 585–593
[28]
Skoglund M,Warg F,Hansson H,Punnekkat S, (2021). Synchronisation of an automotive multi-concern development process. International Conference on Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 63–75
[29]
Srinivas M,Patnaik L M, (1994). Adaptive probabilities of crossover and mutation in genetic algorithms. IEEE Transactions on Systems, Man, and Cybernetics, 24( 4): 656–667
[30]
Wang B,Luo Y,Zhong Z,Li K, (2022). Robust non-fragile fault tolerant control for ensuring the Safety of the Intended Functionality of cooperative adaptive cruise control. IEEE Transactions on Intelligent Transportation Systems, 23( 10): 18746–18760
[31]
Yan M Y,Chen W W,Wang Q D,Zhao L F,Liang X T,Cai B X, (2021). Human–machine cooperative control of intelligent vehicles for lane keeping—Considering Safety of the Intended Functionality. In: Actuators. MDPI, 10( 9): 210
[32]
Zhang X Y,Zhou M,Shao W B,Luo T,Li J, (2019). The architecture of the intended safety system for intelligent driving. In: 2019 IEEE International Symposium on Circuits and Systems (ISCAS). 1–4
[33]
ZhangYLinternGGaoLZhangZ (2021). A study on functional safety, SOTIF and RSS from the perspective of human-automation interaction. SAE Technical Paper, 2021–01–0858
[34]
Zhao X,Lv Z H,Qiu Q A,Wu Y G, (2023). Designing two-level rescue depot location and dynamic rescue policies for unmanned vehicles. Reliability Engineering & System Safety, 233: 109119
[35]
ZhouBChenCZhaiYZhaoS (2022a). A study on scenario generalization and optimization for ADS. SAE Technical Paper, 2022-01-7007
[36]
Zhou H,Li X Y,He X,Li P F,Xiao L Y,Zhang D W, (2022b). Research on safety of the intended functionality of automobile AEB perception system in typical dangerous scenarios of two-wheelers. Accident Analysis and Prevention, 173: 106709
RIGHTS & PERMISSIONS
Higher Education Press
AI Summary 中Eng×
Note: Please be aware that the following content is generated by artificial intelligence. This website is not responsible for any consequences arising from the use of this content.