We propose a new energy efficient communication scheme for multi-hop wireless sensor networks (WSNs). Our run-zero encoding (RZE) communication scheme utilizes the concepts of the RBNSiZeComm protocol introduced in [1...
详细信息
ISBN:
(纸本)9783540897361
We propose a new energy efficient communication scheme for multi-hop wireless sensor networks (WSNs). Our run-zero encoding (RZE) communication scheme utilizes the concepts of the RBNSiZeComm protocol introduced in [1, 3, 2]. However, unlike RBNSiZeConun, RZE simultaneously saves energy at boththe transmitter and receiver. Also, maintaining synchronization between transmitter and receiver is easier in RZE. Implementation of RZE is based on the transceiver design proposed in [1] that uses a hybrid modulation scheme involving FSK and ASK to keep the cost/complexity of the radio device low. Withthis non-coherent detection based receiver and assuming equal likelihood of all possible binary strings of a given length, we show that there is a 35.2% savings in energy on an average at the transmitter compared to binary FSK, for additive white gaussian noise (AWGN) channels. Simultaneously, the receiver experiences a savings of 12.5% on an average. these results establish the utility of RZE as a suitable candidate for communication in wireless sensor networks in order to enable distributedcomputing applications.
Cloud computing is the use of computing resources that are delivered as a service over a network. Most of the mobile phones currently in use have less processing capability. A trivial solution to this resource poverty...
详细信息
ISBN:
(纸本)9783319044835;9783319044828
Cloud computing is the use of computing resources that are delivered as a service over a network. Most of the mobile phones currently in use have less processing capability. A trivial solution to this resource poverty problem is compute offloading. Mobile clouds are not efficient with conventional internet cloud models and mobile computing approaches. the advancement in technology has made vehicles becoming more sophisticated through powerful on-board computing capabilities, tons of on-board storage, significant communication capabilities and virtually no power limitations. this paper proposes a communication mechanism for providing value added services on an opportunistically formed Stationary Vehicular Cloud by exploiting the idle vehicular resources that, now has become a thing of commonality in cities.
Given a set of n sensor nodes distributed randomly over a 2 D plane, this paper addresses the problem of computingthe area covered by the sensors assuming that each sensor covers a circular area of radius r. To make ...
详细信息
ISBN:
(纸本)9783319044835;9783319044828
Given a set of n sensor nodes distributed randomly over a 2 D plane, this paper addresses the problem of computingthe area covered by the sensors assuming that each sensor covers a circular area of radius r. To make the computation simple, instead of considering real circles, a digital geometry based approach is followed here. A detailed study on intersection of digital circles reveals many interesting properties that lead to the development of a novel O(n log n) centralized algorithm using simple arithmetic operations for computingthe area covered by n uniform digital circles. Next, a distributed version of the same is proposed to select a subset of nodes to cover a given area. Comparison with earlier works by simulation shows that the proposed distributed algorithm improves the estimated area coverage significantly.
Many companies have thought about using external hosting solutions. Cloud computing as such a solution attracts prospective users who want to avoid initial costs and standing expenses withthe underlying pay-as-you-us...
详细信息
ISBN:
(纸本)9783319044835;9783319044828
Many companies have thought about using external hosting solutions. Cloud computing as such a solution attracts prospective users who want to avoid initial costs and standing expenses withthe underlying pay-as-you-use model. the outsourcing of sensitive information implies security risks, like eavesdropping and sabotage, for them as soon as they pass any unconfident area. If an outhouse hosting solution serves as data storage only, then an end-to-end cryptosystem without the necessity of having homomorphic properties comes up withthe answer. Moreover, secure computations on the encrypted data need the use of more complex cryptosystems. SecureString 1.0 [3] and SecureString 2.0 [4] were proposed as such complex cryptosystems that focus on computing on encrypted character strings in untrustworthy environments (like clouds). While SecureString 1.0 offered a too inflexible approach, SecureString 2.0 as its improvement was introduced textually at a high level only so far. this paper contributes to foster the understanding of SecureString 2.0 by providing performance analysis for its supported operations plus formal definitions, theorems and proofs.
Heterogeneous computing systems require efficient task-to-processor mapping for attaining high performance. Scheduling workflows on heterogeneous environments is shown to be NP-Complete. Several heuristics were develo...
详细信息
ISBN:
(纸本)9783319280349;9783319280332
Heterogeneous computing systems require efficient task-to-processor mapping for attaining high performance. Scheduling workflows on heterogeneous environments is shown to be NP-Complete. Several heuristics were developed to attain minimum schedule lengths. However, these algorithms employ level-wise approach of scheduling tasks. this indirectly assigns higher priority to the tasks at lower levels than those at higher levels. Further, the start time of tasks at higher levels is constrained by the completion times of tasks at lower levels. the present work proposes a novel heuristic based global scheduling algorithm namely Minimal Start Time (MST) algorithm for workflows. the proposed approach focuses on minimizing the start times of tasks which are dependent on the tasks at lower levels to generate shorter span schedules. the primary merit of this scheme is due to the elimination of level constraints whenever there are no dependency constraints. the performance of MST algorithm is evaluated in terms of normalized makespan, speedup, efficiency and improvement of 5-20 % in 80 % of the cases is achieved in comparison to the earlier work.
distributed joins have gained importance in the past decade, mainly due to the increased number of available data sources on the internet. In this work we extend Bloomjoin, the state of the art algorithm for distribut...
详细信息
ISBN:
(纸本)9783540897361
distributed joins have gained importance in the past decade, mainly due to the increased number of available data sources on the internet. In this work we extend Bloomjoin, the state of the art algorithm for distributed joins, so that it minimizes the network usage for the query execution based on database statistics. We present 4 extensions of the algorithm, and construct a query optimizer for electing the best extension for each query. Our theoretical analysis and experimental evaluation shows significant network cost savings compared to the original Bloomjoin algorithm.
Withthe increasing demand of cloud computing, energy consumption has drawn enormous attention in business and research community. this is also due to the amount of carbon footprints generated from the information and...
详细信息
ISBN:
(纸本)9783319280349;9783319280332
Withthe increasing demand of cloud computing, energy consumption has drawn enormous attention in business and research community. this is also due to the amount of carbon footprints generated from the information and communication technology resources such as server, network and storage. therefore, the first and foremost goal is to minimize the energy consumption without compromising the customer demands or tasks. On the other hand, task consolidation is a process to minimize the total number of resource usage by improving the utilization of the active resources. Recent studies reported that the tasks are assigned to the virtual machines (VMs) based on their utilization value on VMs without any major concern on the processing time of the tasks. However, task processing time is also equal important criteria. In this paper, we propose a multi-criteria based task consolidation algorithm that assigns the tasks to VMs by considering both processing time of the tasks and the utilization of VMs. We perform rigorous simulations on the proposed algorithm using some randomly generated datasets and compare the results with two recent energy-conscious task consolidation algorithms, namely random and MaxUtil. the proposed algorithm improves about 10 % of energy consumption than the random algorithm and about 5 % than the MaxUtil algorithm.
Mobile Cloud computing (MCC) augments resource capability of mobile/portable devices for efficient execution of their applications, which results in undesirable coupling of mobile applications and mobile cloud service...
详细信息
ISBN:
(纸本)9783319044835;9783319044828
Mobile Cloud computing (MCC) augments resource capability of mobile/portable devices for efficient execution of their applications, which results in undesirable coupling of mobile applications and mobile cloud services. the existing approaches of decoupling between them can manage either logical mobility or physical mobility of different constituents of MCC, but not together at the same time. this paper proposes the notion of hierarchical decoupling in MCC, that manages both logical and physical mobility simultaneously. the proposed hierarchical decoupling follows a tiered approach, in which interactions of mobile applications with mobile cloud services are decoupled at two tiers using the tuple space model. At the top tier, decoupling manages logical mobility of mobile applications and mobile cloud services, whereas, decoupling at the bottom tier handles physical mobility of devices in dynamic and unreliable networks. this results in better decoupling between mobile applications and mobile cloud services, which, in turn, improves adaptability and robustness of MCC. A new mobile cloud architecture that realizes the proposed approach has also been presented in this paper.
Developing applications for IoT and Cloud is difficult for a number of reasons;even without considering the inherent complexity of distributedcomputing, there are several competing platforms, programming languages an...
详细信息
Developing applications for IoT and Cloud is difficult for a number of reasons;even without considering the inherent complexity of distributedcomputing, there are several competing platforms, programming languages and communication protocols. It can be argued that this is holding back the industry as a whole: Applications are difficult to write, deploy and manage. In this position paper we present Calvin, a hybrid framework combining ideas from the Actor model and Flow Based computing. We show that by dividing applications into four well-defined aspects - describe, connect, deploy, and manage - we get an intuitive method for application development, and a flexible, distributed platform for deploying and managing applications. Additionally, we keep Calvin language and platform agnostic by only prescribing a lightweight runtime API, with a limited number of specified communication protocols - with no requirements on the carrier - for communicating with runtimes, between runtimes, and passing data between components. (C) 2015the Authors. Published by Elsevier B.V.
In recent years, the cloud computing industry has developed rapidly, and big data processing technologies have also been maturing. At the same time, the scale of the domestic mobile internet market continues to expand...
详细信息
ISBN:
(纸本)9781665426428
In recent years, the cloud computing industry has developed rapidly, and big data processing technologies have also been maturing. At the same time, the scale of the domestic mobile internet market continues to expand, the number of users has exceeded 100 million, and a huge amount of mobile internet traffic data has been brought. Judging from the current situation of the mobile internet, on the one hand, mobile data traffic has soared, which has brought huge operating pressure to operators, requiring them to invest more funds for network construction and upgrades. this paper conducts an in-depth study on the design of a distributed network massive data processing system based on cloud computingtechnology.
暂无评论