Edge computing is a recent paradigm where the processing takes place close to the data sources. It therefore reduces latency and saves bandwidth compared to traditional cloud computing. The latter can continue to play...
详细信息
ISBN:
(纸本)9781728190549
Edge computing is a recent paradigm where the processing takes place close to the data sources. It therefore reduces latency and saves bandwidth compared to traditional cloud computing. The latter can continue to play a supportive role. Edge-cloud computing provides benefits in many use cases including distributed computation algorithms, where the processing is divided into a number of tasks that are executed in parallel on different equipment. An important relevant challenge is to allocate the appropriate resources to process the data that are continuously generated from user devices. The issue becomes more complicated when we take into account the variations in the volume of the generated data as a function of time. In this paper we present a resource allocation algorithm for distributed computation with emphasis on machine learning algorithms. We consider that the resource requirements vary with time in a semi-static way that exhibits some daily pattern. We distinguish between periodic (expected) variations that occur during the day, and sporadic variations due to unexpected events. We propose an Integer Linear Programming algorithm to allocate the periodic resource requirements. To handle the non-periodic requirements, we consider a suitable prediction algorithm coupled with a reconfiguration algorithm that allocates the predicted required resources. Our results indicate that our proposal outperforms traditional allocation algorithms in terms of resource utilization, monetary cost and achieved accuracy.
In recent years, there has been significant growth in mobile wireless sensor networks (WSNs), yet prevailing research has primarily focused on 2D planar deployments, overlooking the importance of three-dimensional (3D...
详细信息
In recent years, there has been significant growth in mobile wireless sensor networks (WSNs), yet prevailing research has primarily focused on 2D planar deployments, overlooking the importance of three-dimensional (3D) coverage in various applications. This oversight leads to ineffective data gathering due to incomplete area coverage and network connectivity. In previous researches (Boufares et al. in: 2018 31 ieee/ACS 15th internationalconference on computer systems and applications (AICCSA), Aqaba, Jordan, pp 1-8, 2018, in: 13th international wireless communications and mobile computingconference (IWCMC), Valencia, pp 1628-1633, 2017, in: ieee wireless communications and mobile computingconference (IWCMC), Dubrovnik, Croatia, pp 563-568, 2015a, in: the 4th internationalconference on performance evaluation and modeling in wired and wireless networks (PEMWN), Hammamet, Tunisia, pp 103-108, 2015b), we proposed 3D mobile autonomous redeployment strategies based on the Virtual Forces Algorithm, tailored for diverse configurations: 3D volume applications such as smart homes or agriculture, 3D flat surfaces like snow monitoring, and 3D terrain surfaces like volcano monitoring. Our approach ensured complete coverage and connectivity in these scenarios. Moreover, energy efficiency emerges as a critical concern, given the autonomous and mobile nature of sensor nodes operating on finite battery power. Hence, in this paper, we provide an overview of our previous results, highlighting the efficacy of our 3D mobile autonomous redeployment strategies across various configurations. Subsequently, we delve into an in-depth analysis of the energy consumption associated with the different proposed contributions. Building upon these insights, we propose an energy harvesting approach aimed at extending the operational lifespan of mobile 3D WSNs, thus ensuring sustained functionality in diverse real-world *** these contributions, we address critical challenges and p
Support for connected and autonomous vehicles (CAVs) is a major use case of 5G networks. Due to their large from factors, CAVs can be equipped with multiple radio antennas, cameras, LiDAR and other sensors. In other w...
详细信息
ISBN:
(纸本)9798350328127
Support for connected and autonomous vehicles (CAVs) is a major use case of 5G networks. Due to their large from factors, CAVs can be equipped with multiple radio antennas, cameras, LiDAR and other sensors. In other words, they are "giant" mobile integrated communications and sensing devices. The data collected can not only facilitate edge-assisted autonomous driving, but also enable intelligent radio resource allocation by cellular networks. In this paper we conduct an initial study to assess the feasibility of delivering multi-modal sensory data collected by vehicles over emerging commercial 5G networks. We carried out an "in-the-wild" drive test and data collection campaign between Minneapolis and Chicago using a vehicle equipped with a 360 degrees camera, a LiDAR device, multiple smart phones and a professional 5G network measurement tool. Using the collected multi-modal data, we conduct trace-driven experiments in a local streaming testbed to analyze the requirements and performance of streaming multi-modal sensor data over existing 4G/5G networks. We reveal several notable findings and point out future research directions.
Many applications, e.g., digital twins, rely on sensing data from Internet of Things (IoT) networks, which is used to infer event(s) and initiate actions to affect an environment. This gives rise to concerns relating ...
详细信息
ISBN:
(纸本)9798350339864
Many applications, e.g., digital twins, rely on sensing data from Internet of Things (IoT) networks, which is used to infer event(s) and initiate actions to affect an environment. This gives rise to concerns relating to data integrity and provenance. One possible solution to address these concerns is to employ blockchain. However, blockchain has high resource requirements, thereby making it unsuitable for use on resource-constrained IoT devices. To this end, this paper proposes a novel approach, called two-layer directed acyclic graph (2LDAG), whereby IoT devices only store a digital fingerprint of data generated by their neighbors. Further, it proposes a novel proof-of-path (PoP) protocol that allows an operator or digital twin to verify data in an on-demand manner. The simulation results show 2LDAG has storage and communication cost that is respectively two and three orders of magnitude lower than traditional blockchain and also blockchains that use a DAG structure. Moreover, 2LDAG achieves consensus even when 49% of nodes are malicious.
With the increasing use of mobile Cloud computingsystems (MCC) in various domains, including offices, homes, hospitals, and transportation, distributed Denial of Service (DDoS) attacks have become more frequent and c...
详细信息
ISBN:
(纸本)9798331515935;9783903176690
With the increasing use of mobile Cloud computingsystems (MCC) in various domains, including offices, homes, hospitals, and transportation, distributed Denial of Service (DDoS) attacks have become more frequent and complex, posing new challenges and risks. Therefore, enhancing the three defense mechanisms (prevention, detection, and mitigation) is crucial. In this paper, we propose a machine-learning model that utilizes neural network techniques, such as an Evolutionary recurrent self-organizing map (ERSOM), in combination with a K-means classifier to detect botnet attacks and ensure the establishment of all defense mechanisms in mobile cloud computing system. Our performance results demonstrate the effectiveness of the proposed adaptive ERSOM model compared with the literature.
In distributedcomputingsystems, to mitigate the adverse effect of stragglers on the computation time, computation redundancy is used. The redundancy can be added proactively at the beginning, or reactively after som...
详细信息
ISBN:
(纸本)9781538674628
In distributedcomputingsystems, to mitigate the adverse effect of stragglers on the computation time, computation redundancy is used. The redundancy can be added proactively at the beginning, or reactively after some time based on the delay pattern of the workers. While most of the existing work with reactive mitigation strategy only considered task replication, we propose a coded reactive straggler mitigation with an uncoded and a coded phase for distributed matrix-matrix multiplication. Specifically, in the uncoded phase of the proposed reactive strategy, the master distributes the computational job without redundancy among workers and waits for some time. After the waiting time, the master cancels the remaining tasks. It then encodes the remaining tasks and distributes them among the workers that have already completed their computations. The expected execution time of the proposed method is analytically obtained. Furthermore, the optimal waiting time for the uncoded phase and the optimal code rate for the coded phase are investigated. Our simulation results demonstrate that the proposed coded reactive mitigation strategy significantly decreases the execution time in comparison with the proactive mitigation strategy or repetition-based reactive mitigation strategy.
Generally, the single GPU computing method is utilized for the conventional radix sort algorithm based on GPU parallel computing. Nevertheless, as the data scale grows, the single GPU sorting algorithm is gradually de...
详细信息
ISBN:
(数字)9798350391954
ISBN:
(纸本)9798350391961;9798350391954
Generally, the single GPU computing method is utilized for the conventional radix sort algorithm based on GPU parallel computing. Nevertheless, as the data scale grows, the single GPU sorting algorithm is gradually demonstrating its performance bottlenecks. In the paper, an efficient radix sort algorithm based on multi-GPU parallel computing is proposed, which implements a strategy of using different bucket classifications on multiple GPUs to improve the sorting performance and efficiency of large-scale datasets. With the multi-GPU parallel computing, more buckets may be used for data classification in one traversal, effectively reducing data sorting times, lowering time complexity, and improving sorting speed and throughput. The experiment shows that the algorithm has significantly improved the operational efficiency, demonstrating good application prospects. Meanwhile, the algorithm herein also presents good scalability, which can adapt to the constantly growing data scale in the future.
distributedcomputing can parallelize large-scale computing tasks. However, due to the straggler effect, the performance of distributedsystems may be diminished. Coded distributedcomputing mitigates the straggler ef...
详细信息
Orbital edge computing (OEC) is gaining interest in multiple application domains due to its potential to mitigate the limitations of traditional bent pipe architecture through in-orbit processing. In one study it was ...
详细信息
ISBN:
(纸本)9798350304367;9798350304374
Orbital edge computing (OEC) is gaining interest in multiple application domains due to its potential to mitigate the limitations of traditional bent pipe architecture through in-orbit processing. In one study it was observed that on-board computing facility is idle for about 80% of its mission period. Although processing capability of a single satellite is constrained, but the collective computing power of a constellation is substantial and potentially be exploited for effective distributed in-orbit data processing. In this paper, we propose a distributed scheduling algorithm, DALEOS, for small satellite clusters targeted to meet real-time constraints of data analysis tasks. Our approach efficiently utilizes the constrained resources through workflow partitioning and task distribution. We validated our proposed algorithm for a set of randomly generated task workflow and also on a practical cloud detection use case, in simulation system using satellite tracks generated from datasets downloaded from Celestrak and PlanetLab. The results depict that through efficient utilization of the resources available, the overall latency in task execution can be significantly improved.
The construction of information system stability assurance capabilities has a long history of development. However, with the gradually increasing load pressure of the information system, the distributed architecture h...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
The construction of information system stability assurance capabilities has a long history of development. However, with the gradually increasing load pressure of the information system, the distributed architecture has gradually become the mainstream architecture of information system. Furthermore, the stability guarantee of the information system has entered a new stage, which requires extensive optimization in both theoretical and practical aspects. This paper researches on the relevant background, basic principles, key elements, core competencies, and evaluation system of information system stability assurance capacity construction in the new stage. In addition, this paper explores the future development trend of stability assurance work
暂无评论