Android applications are becoming increasingly powerful in recent years. While their functionality is still of paramount importance to users, the energy efficiency of these applications is also gaining more and more a...
详细信息
Android applications are becoming increasingly powerful in recent years. While their functionality is still of paramount importance to users, the energy efficiency of these applications is also gaining more and more attention. Researchers have discovered various types of energy defects in Android applications, which could quickly drain the battery power of mobile devices. Such defects not only cause inconvenience to users, but also frustrate Android developers as diagnosing the energy inefficiency of a software product is a non-trivial task. In this work, we perform a literature review to understand the state of the art of energy inefficiency diagnosis for Android applications. We identified 55 research papers published in recent years and classified existing studies from four different perspectives, including power estimation method, hardware component, types of energy defects, and program analysis approach. We also did a cross-perspective analysis to summarize and compare our studied techniques. We hope that our review can help structure and unify the literature and shed light on future research, as well as drawing developers' attention to build energy-efficient Android applications.
The foundation of the applicant selection process is the candidate eligibility criteria. All applications must go through some evaluation process to get selected for a job. Without the use of a machine learning algori...
详细信息
The rapid expansion of Internet of Things (IoT) devices and applications necessitates the need for more efficient computational and data management strategies. The Fog-enabled UAV-as-a-Service (FU-Serve) platform addr...
详细信息
The demand for cloud computing has increased manifold in the recent *** specifically,on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing ***...
详细信息
The demand for cloud computing has increased manifold in the recent *** specifically,on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing *** cloud service provider fulfills different user requirements using virtualization-where a single physical machine can host multiple *** virtualmachine potentially represents a different user environment such as operating system,programming environment,and ***,these cloud services use a large amount of electrical energy and produce greenhouse *** reduce the electricity cost and greenhouse gases,energy efficient algorithms must be *** specific area where energy efficient algorithms are required is virtual machine *** virtualmachine consolidation,the objective is to utilize the minimumpossible number of hosts to accommodate the required virtual machines,keeping in mind the service level agreement *** research work formulates the virtual machine migration as an online problem and develops optimal offline and online algorithms for the single host virtual machine migration problem under a service level agreement constraint for an over-utilized *** online algorithm is analyzed using a competitive analysis *** addition,an experimental analysis of the proposed algorithm on real-world data is conducted to showcase the improved performance of the proposed algorithm against the benchmark *** proposed online algorithm consumed 25%less energy and performed 43%fewer migrations than the benchmark algorithms.
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Rec...
详细信息
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Recognition(HAR)***,the significant computational demands and memory requirements hinder the practical deployment of deep networks in resource-constrained *** paper introduces a novel network pruning method based on the energy spectral density of data in the frequency domain,which reduces the model’s depth and accelerates activity *** traditional pruning methods that focus on the spatial domain and the importance of filters,this method converts sensor data,such as HAR data,to the frequency domain for *** emphasizes the low-frequency components by calculating their energy spectral density ***,filters that meet the predefined thresholds are retained,and redundant filters are removed,leading to a significant reduction in model size without compromising performance or incurring additional computational ***,the proposed algorithm’s effectiveness is empirically validated on a standard five-layer CNNs backbone *** computational feasibility and data sensitivity of the proposed scheme are thoroughly ***,the classification accuracy on three benchmark HAR datasets UCI-HAR,WISDM,and PAMAP2 reaches 96.20%,98.40%,and 92.38%,***,our strategy achieves a reduction in Floating Point Operations(FLOPs)by 90.73%,93.70%,and 90.74%,respectively,along with a corresponding decrease in memory consumption by 90.53%,93.43%,and 90.05%.
Reports show that the number of phishing web sites is exponentially increasing and it is estimated that between 80% to 93 % of the data breaches are involving phishing attacks. With both probability of occurrence as w...
详细信息
Leaf diseases may harm plants in different ways, often causing reduced productivity and, at times, lethal consequences. Detecting such diseases in a timely manner can help plant owners take effective remedial measures...
详细信息
In the traditional form of instruction, the teacher and pupil converse face to face. The discussion is started by the instructor, who generally discusses the material from the required textbooks. Many students might n...
详细信息
Encryption algorithms are one of the methods to protect dataduring its transmission through an unsafe transmission medium. But encryptionmethods need a lot of time during encryption and decryption, so itis necessary t...
详细信息
Encryption algorithms are one of the methods to protect dataduring its transmission through an unsafe transmission medium. But encryptionmethods need a lot of time during encryption and decryption, so itis necessary to find encryption algorithms that consume little time whilepreserving the security of the data. In this paper, more than one algorithmwas combined to obtain high security with a short implementation time. Achaotic system, DNA computing, and Salsa20 were combined. A proposed5D chaos system was used to generate more robust keys in a Salsa algorithmand DNA computing. Also, the confusion is performed using a new *** proposed chaos system achieves three positive Lyapunov *** results demonstrate of the proposed scheme has a sufficient peak signalto-noise ratio, a low correlation, and a large key space. These factors makeit more efficient than its classical counterpart and can resist statistical anddifferential attacks. The number of changing pixel rates (NPCR) and theunified averaged changed intensity (UACI) values were 0.99710 and UACI33.68. The entropy oscillates from 7.9965 to 7.9982 for the tested encryptedimages. The suggested approach is resistant to heavy attacks and takes lesstime to execute than previously discussed methods, making it an efficient,lightweight image encryption scheme. The method provides lower correlationcoefficients than other methods, another indicator of an efficient imageencryption system. Even though the proposed scheme has useful applicationsin image transmission, it still requires profound improvement in implementingthe high-intelligence scheme and verifying its feasibility on devices with theInternet of Things (IoT) enabled.
Augmented reality (AR)-based rehabilitation is an excellent teaching tool (ICT tool) for simulating daily activities for autistic children. Children with autism may become more mentally capable with this type of AR-ba...
详细信息
Augmented reality (AR)-based rehabilitation is an excellent teaching tool (ICT tool) for simulating daily activities for autistic children. Children with autism may become more mentally capable with this type of AR-based rehabilitation. It is intended to observe the children's performance in terms of concentration, attention, and identification. The observation has been done through placards as a target image to display the 3D objects on a mobile phone or tablet. In this project, observations are made for 21 autism children in the age group of 7–14, out of whom 17 are boys and 5 are girls. Those 21 children are given practice identifying 15 different objects in an augmented reality environment. Their performance was initially evaluated using conventional instructional techniques. The majority of the kids were having more difficulty identifying things during that observation. Then, with an Augmented Reality environment, the identical observation has been made once more. Using a mobile device or tablet, the 3D objects from the provided placard photos are produced in an augmented reality environment with animation and voice in the languages of English and Tamil. Children with autism are able to recognize and also grasp the behaviors of those objects while viewing them in 3D. Their efforts are measured using a two-point scale (0, 1, 2). The pre-assessment and post-assessment reports for the above observations are tabulated. All the observations are made in the presence of the special education teacher (therapist). However, the children observed in this project fall into three different categories: mild, moderate, and severe. In the Mild category, statistical significance is evident with p values of 0.002 in pre-assessment and 0.014 in post-assessment. Likewise, in the Moderate category, where p values are 0.023 in pre-assessment and 0.033 in post-assessment, significance is observed, as all p values fall below the chosen significance level of 0.05. This leads to rejecti
暂无评论