The number of computing devices, mostly smartphones is tremendous. The potential for distributed computing on them is no less huge. But developing applications for such networks is challenging especially as most middl...
详细信息
ISBN:
(纸本)9783031265068;9783031265075
The number of computing devices, mostly smartphones is tremendous. The potential for distributed computing on them is no less huge. But developing applications for such networks is challenging especially as most middleware solutions for distributed computing are tailored to managed grids and clusters, so they lacks the elasticity needed to deal with the difficult conditions brought by multi-hops, mobility, heterogeneity, untrustability, etc. To solve this, several middleware were released, but none of them feature workable deployment solutions. This paper presents the deployment service of the Idawi middleware, which implements a fully decentralized and automatised deployment strategy into a Open Source middleware tailored to enabling distributed computing in difficult networking conditions like in the IoT/fog/edge.
The usage of Kubernetes for running microservices applications is increasing nowadays. In a particular application, all microservices do not have the same priority. Hence it is costly to allocate the same resources to...
详细信息
ISBN:
(纸本)9798350339826
The usage of Kubernetes for running microservices applications is increasing nowadays. In a particular application, all microservices do not have the same priority. Hence it is costly to allocate the same resources to both high and low-priority services. This research aims to utilize spot instances to run low-priority services with the intention of reducing the cloud cost and providing overall high availability to the application. A service called KubeEconomy has been proposed to monitor and manage Kubernetes worker nodes. Three functionalities of the KubeEconomy service have been explained and it is shown that it is possible to reduce the cloud cost while maintaining high availability for the microservices.
Facial recognition technique is used extensively in areas like online payments, education, and social media. Traditionally, these applications relied on powerful cloud-based systems, but advancements in edge computing...
详细信息
ISBN:
(纸本)9798350368567;9798350368550
Facial recognition technique is used extensively in areas like online payments, education, and social media. Traditionally, these applications relied on powerful cloud-based systems, but advancements in edge computing have changed this, enabling fast and reliable local processing in complex and extreme environment. However, new challenges arise in availability and durability insurance to make the system running 24/7 with acceptable performance. This paper proposes a novel solution to these challenging settings. First, we use edge device for local data processing, reducing the need for cloud communication and enhancing user privacy. Second, we implement an adaptive control strategy to improve energy management in these devices. Lastly, we establish a solar-powered energy system to facilitate long-term device operation. Our approach strikes a balance between performance, quality, and durability, enabling facial recognition systems to work consistently and efficiently in complex environments.
NL2SQL (Natural Language to Structured Query Language) transformation has seen wide adoption in Business Intelligence (BI) applications in recent years. However, existing NL2SQL benchmarks are not suitable for product...
详细信息
ISBN:
(纸本)9789819608072;9789819608089
NL2SQL (Natural Language to Structured Query Language) transformation has seen wide adoption in Business Intelligence (BI) applications in recent years. However, existing NL2SQL benchmarks are not suitable for production BI scenarios, as they are not designed for common business intelligence questions. To address this gap, we have developed a new benchmark focused on typical NL questions in industrial BI scenarios. We discuss the challenges of constructing a BI -focused benchmark and the shortcomings of existing benchmarks. Additionally, we introduce question categories in our benchmark that reflect common BI inquiries. Lastly, we propose two novel semantic similarity evaluation metrics for assessing NL2SQL capabilities in BI applications and services.
The growth in the number of IoT devices and applications, as well as their heterogeneity and hardware limitations, make it difficult to apply traditional security mechanisms. In this way, the IoT layer has become a hi...
详细信息
ISBN:
(纸本)9798400702341
The growth in the number of IoT devices and applications, as well as their heterogeneity and hardware limitations, make it difficult to apply traditional security mechanisms. In this way, the IoT layer has become a highly vulnerable part of the network. In this context, an intrusion detection system with low computational complexity is proposed for online recognition of denial-of-service attacks. A common feature of denial-of-service attacks is the sudden increase of a particular type of packet or request. To track this sudden increase, network traffic is first filtered by protocol, and then reduced to the number of packets over time. On these data, the techniques of sliding window and the comparison of moving averages, both adjustable by variables, are applied to identify the anomalies. Tests carried out on data extracted from pcap files, containing attacks carried out on real devices, demonstrate the accuracy in recognizing attacks. Furthermore, the tools and techniques for implementing the proposed model in a realistic environment are described.
Cloud services and applications become ever more important for enterprises, which profit from the advantages of scalability, flexibility and the pay-as-you-go model which are offered by Cloud service vendors. One of t...
详细信息
ISBN:
(纸本)9798400702341
Cloud services and applications become ever more important for enterprises, which profit from the advantages of scalability, flexibility and the pay-as-you-go model which are offered by Cloud service vendors. One of the most well-known standards in the domain, which have been developed about ten years ago, is the TOSCA cloud application specification. TOSCA allows the definition of the structure and operation of cloud applications. Although considerable work has been done before in the specification of monitoring and elasticity - of which a thorough analysis is provided - its quality and its integration in TOSCA can be significantly improved. In this work we suggest specific extensions covering the monitoring of processing components and the elasticity policies which are associated with them. Indicative TOSCA examples are provided to aid comprehension.
Deep Neural Networks (DNNs) have emerged as the preferred solution for Internet of Things (IoT) applications, owing to their remarkable performance capabilities. However, the inherent complexity of DNNs presents signi...
详细信息
ISBN:
(纸本)9789819608041;9789819608058
Deep Neural Networks (DNNs) have emerged as the preferred solution for Internet of Things (IoT) applications, owing to their remarkable performance capabilities. However, the inherent complexity of DNNs presents significant challenges for IoT devices that are constrained by limited computational power and battery life. To adeptly navigate the demands of intricate inference tasks, edge computing is leveraged, enabling collaborative inference of DNNs between IoT devices and edge servers. However, existing research rarely focus simultaneously on the power consumption of IoT devices, the latency of collaborative inference and the cost of edge servers. Moreover, current research seldom takes into account the deployment of multiple DNN applications on IoT devices, a critical factor for adapting to increasingly complex edge-end collaborative environments. This research focuses on optimizing the inference power consumption of multiple DNN applications deployed on IoT devices in larger-scale edge-end collaboration environments, under the constraints of maximum End-to-End latency and the cost of edge servers. To address this issue, we propose the Greedy Genetic Algorithm, which leverages a combination of greedy strategy and Genetic Algorithm. The performance of our proposed method is extensively evaluated through experiments, demonstrating its superiority in achieving lower inference power consumption with fewer iterations compared to existing solutions.
The proliferation of connected devices has catalyzed a shift towards intelligent systems reliant on real-time analytics for decision-making. While Cloud computing offers a mature service infrastructure, the transfer o...
详细信息
ISBN:
(纸本)9798350373981;9798350373974
The proliferation of connected devices has catalyzed a shift towards intelligent systems reliant on real-time analytics for decision-making. While Cloud computing offers a mature service infrastructure, the transfer of vast data volumes for processing introduces challenges such as network congestion and latency, hampering real-time requirements. Edge/Fog computing emerges as a solution, enabling data processing and hosting lightweight learning models closer to users at the network edge. However, unlike the Cloud, which exhibits high resource elasticity with a limited number of resource nodes, Edge/Fog resources are widely distributed with high density, characterized by their heterogeneity and limited capacities. To optimize the deployment of applications with diverse resource and latency requirements, a strategic approach to application placement across Edge/Fog and Cloud computing environments is essential. This strategy must carefully balance application-specific needs, latency sensitivity, and operational cost minimization. To this end, we begin by formulating the placement problem as a linear program, focusing on microserviceapplications. We then propose a hybrid approach that combines k-means clustering for grouping Edge/Fog nodes (based on physical location) with the formulated linear model to enhance computational efficiency. The linear model is developed using the CPLEX solver and validated using real-world datasets of Edge/Fog node and user distributions. The findings unequivocally demonstrate that the clustering step leads to significantly decreased decision placement times, all while maintaining a high standard of solution quality. These results provide a promising avenue for deploying optimal models directly at the network's edge, enabling optimal application placement decisions while adhering to problem constraints.
MapReduce and Hadoop distributed data processing technologies are used for systematic research. The system is interactive in distributed computing, data mining, service response and cloud environment. At the level of ...
详细信息
The increasing popularity of applications like the Metaverse has led to the exploration of new, more effective ways of communication. Semantic communication, which focuses on the meaning behind transmitted information...
详细信息
ISBN:
(纸本)9798350339864
The increasing popularity of applications like the Metaverse has led to the exploration of new, more effective ways of communication. Semantic communication, which focuses on the meaning behind transmitted information, represents a departure from traditional communication paradigms. As mobile devices become increasingly prevalent, it is important to explore the potential of edge computing to aid the semantic encoding/decoding process, which requires significant computing power and storage capabilities. However, establishing knowledge bases (KBs) for domain-oriented communication can be time-consuming. To address this challenge, this paper proposes a semantic caching model in edge computing system that caches domain-specialized general models and user-specific individual models. This approach has the potential to reduce the time and resources required to establish individual KBs while accurately capturing the semantics behind users' messages, ultimately leading to more efficient and accessible semantic communication.
暂无评论