首页 > 最新文献

2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)最新文献

英文 中文
Securing High-Velocity Data: Authentication and Key Management Model for Smart City Communication 保护高速数据:智慧城市通信的认证和密钥管理模型
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795312
M. Rathore, Y. Jararweh, M. Raheel, Anand Paul
The smart city is established through continuous analytics of the city data that is harvested from various smart systems and IoT sensors deployed in the city such as, smart homes, buildings, and parking, smart pollution monitoring, transportation sensors, etc., which generates continuous streams of high-speed data. Lack of security and privacy in the smart city system while communicating with the central analysis building gives the control of the city to the cyber criminals. However, offering privacy and security for such a continuous high-speed communication requires an efficient security model without introducing any delay in the real-time communication of the smart city. Thus, to cater with these challenges, in this paper, we proposed an efficient authentication and key management model among the smart city entities such as, remote smart systems (RSS) (i.e., smart homes, smart parkings, smart health systems, environment control system, etc.), remote users (U), and central city analysis building. First, every remote system and citizen have to be registered with the system through secure registration phase. Later, the session keys are generated and shared among the smart city entities that are used in secure routine communication. Moreover, the protocol is enabled with an efficient secure communication mechanism with the ability of parallel processing that makes it possible to work in a real-time environment. Finally, the security of the proposed model is verified informally through mathematical analysis and formally by implementing it using AVISPA tool (Automated Validation of Internet Security Protocols and Applications). Also, the proposed protocol is evaluated in terms of its efficiency and capability to work in a real-time environment. The results show that the protocol is secure against known cyber-attacks, is efficient, and faster than the existing schemes.
智慧城市是通过对城市中部署的各种智能系统和物联网传感器(如智能家居、建筑和停车场、智能污染监测、交通传感器等)收集的城市数据进行持续分析而建立的,这些数据产生连续的高速数据流。智慧城市系统在与中央分析大楼通信时缺乏安全性和隐私性,使网络犯罪分子控制了城市。然而,为这种持续的高速通信提供隐私和安全,需要一种高效的安全模型,而不会在智慧城市的实时通信中引入任何延迟。因此,为了应对这些挑战,本文提出了一种高效的智能城市实体(如远程智能系统(RSS),即智能家居,智能停车,智能健康系统,环境控制系统等),远程用户(U)和中心城市分析大楼)之间的认证和密钥管理模型。首先,每个远程系统和公民都必须通过安全注册阶段在系统中注册。随后,生成会话密钥并在智能城市实体之间共享,用于安全的日常通信。此外,该协议具有有效的安全通信机制,具有并行处理的能力,使其能够在实时环境中工作。最后,通过数学分析非正式地验证了所提出模型的安全性,并通过使用AVISPA工具(互联网安全协议和应用程序的自动验证)实现了模型的正式安全性。此外,本文还对该协议的效率和在实时环境下工作的能力进行了评估。实验结果表明,该协议对已知的网络攻击是安全的,并且比现有的方案效率高,速度快。
{"title":"Securing High-Velocity Data: Authentication and Key Management Model for Smart City Communication","authors":"M. Rathore, Y. Jararweh, M. Raheel, Anand Paul","doi":"10.1109/FMEC.2019.8795312","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795312","url":null,"abstract":"The smart city is established through continuous analytics of the city data that is harvested from various smart systems and IoT sensors deployed in the city such as, smart homes, buildings, and parking, smart pollution monitoring, transportation sensors, etc., which generates continuous streams of high-speed data. Lack of security and privacy in the smart city system while communicating with the central analysis building gives the control of the city to the cyber criminals. However, offering privacy and security for such a continuous high-speed communication requires an efficient security model without introducing any delay in the real-time communication of the smart city. Thus, to cater with these challenges, in this paper, we proposed an efficient authentication and key management model among the smart city entities such as, remote smart systems (RSS) (i.e., smart homes, smart parkings, smart health systems, environment control system, etc.), remote users (U), and central city analysis building. First, every remote system and citizen have to be registered with the system through secure registration phase. Later, the session keys are generated and shared among the smart city entities that are used in secure routine communication. Moreover, the protocol is enabled with an efficient secure communication mechanism with the ability of parallel processing that makes it possible to work in a real-time environment. Finally, the security of the proposed model is verified informally through mathematical analysis and formally by implementing it using AVISPA tool (Automated Validation of Internet Security Protocols and Applications). Also, the proposed protocol is evaluated in terms of its efficiency and capability to work in a real-time environment. The results show that the protocol is secure against known cyber-attacks, is efficient, and faster than the existing schemes.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124335643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed Fair Randomized (DFR): a Resource Sharing Protocol for Fog Providers 分布式公平随机(DFR):雾提供者的资源共享协议
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795339
R. Beraldi, H. Alnuweiri
Fog computing promises to support many emerging classes of applications that can’t be rely on a cloud-only backend. Fog-to-Fog (F2F) cooperation is suggested in the openFog’s Fog computing Reference Architecture, now adopted as an IEEE standard, as a way to improve the computation service provided by this computing delivery model.In this paper, we propose DFR - Distributed Fair Randomized, a distributed F2F cooperation algorithm that allows for sharing computation resources among fog providers that agree on a (reasonable) measure of fairness. We adopt an analytical approach to study the cooperation problem of providers subject to different load conditions. We initially put the cooperation problem in the light of a simple game-theory framework to capture the selfish behavior of providers without any fairness criteria and its consequence in limiting cooperation. Then, we cast the problem as an optimization problem that incorporates fairness. Preliminary simulations results show how DFR converges to the predicted optimal value.
雾计算承诺支持许多新兴的应用程序,这些应用程序不能只依赖云计算后端。openFog的雾计算参考架构(Fog-to-Fog, F2F)提出了雾对雾(Fog-to-Fog, F2F)协作,该架构现已被采纳为IEEE标准,作为改进该计算交付模型提供的计算服务的一种方式。在本文中,我们提出了DFR -分布式公平随机化,这是一种分布式F2F合作算法,允许在同意(合理)公平度量的雾提供者之间共享计算资源。采用分析的方法研究了不同负荷条件下供应商的合作问题。我们首先将合作问题置于一个简单的博弈论框架中,以捕捉提供者在没有任何公平标准的情况下的自私行为及其限制合作的后果。然后,我们将该问题转换为包含公平性的优化问题。初步的仿真结果表明,DFR收敛于预测的最优值。
{"title":"Distributed Fair Randomized (DFR): a Resource Sharing Protocol for Fog Providers","authors":"R. Beraldi, H. Alnuweiri","doi":"10.1109/FMEC.2019.8795339","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795339","url":null,"abstract":"Fog computing promises to support many emerging classes of applications that can’t be rely on a cloud-only backend. Fog-to-Fog (F2F) cooperation is suggested in the openFog’s Fog computing Reference Architecture, now adopted as an IEEE standard, as a way to improve the computation service provided by this computing delivery model.In this paper, we propose DFR - Distributed Fair Randomized, a distributed F2F cooperation algorithm that allows for sharing computation resources among fog providers that agree on a (reasonable) measure of fairness. We adopt an analytical approach to study the cooperation problem of providers subject to different load conditions. We initially put the cooperation problem in the light of a simple game-theory framework to capture the selfish behavior of providers without any fairness criteria and its consequence in limiting cooperation. Then, we cast the problem as an optimization problem that incorporates fairness. Preliminary simulations results show how DFR converges to the predicted optimal value.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121183502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Qualitative Comparison Model for Application Layer IoT Protocols 应用层物联网协议的定性比较模型
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795324
S. Kakakhel, Tomi Westerlund, M. Daneshtalab, Zhuo Zou, J. Plosila, H. Tenhunen
Protocols enable things to connect and communicate, thus making the Internet of Things possible. The performance aspect of the Internet of Things protocols, vital to its widespread utilization, have received much attention. However, one aspect of IoT protocols, essential to its adoption in the real world, is a protocols’ feature set. Comparative analysis based on competing features and properties are rarely if ever, discussed in the literature. In this paper, we define 19 attributes in 5 categories that are essential for IoT stakeholders to consider. These attributes are then used to contrast four IoT protocols, MQTT, HTTP, CoAP and XMPP. Furthermore, we discuss scenarios where an assessment based on comparative strengths and weaknesses would be beneficial. The provided comparison model can be easily extended to include protocols like MQTT-SN, AMQP and DDS.
协议使事物能够连接和通信,从而使物联网成为可能。物联网协议的性能方面对其广泛应用至关重要,受到了广泛的关注。然而,物联网协议的一个方面,对其在现实世界中的采用至关重要,是协议的功能集。基于竞争特征和属性的比较分析很少在文献中讨论。在本文中,我们定义了物联网利益相关者必须考虑的5类19个属性。然后使用这些属性来对比四种物联网协议,MQTT, HTTP, CoAP和XMPP。此外,我们还讨论了基于比较优势和劣势的评估将是有益的情况。所提供的比较模型可以很容易地扩展到包括MQTT-SN、AMQP和DDS等协议。
{"title":"A Qualitative Comparison Model for Application Layer IoT Protocols","authors":"S. Kakakhel, Tomi Westerlund, M. Daneshtalab, Zhuo Zou, J. Plosila, H. Tenhunen","doi":"10.1109/FMEC.2019.8795324","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795324","url":null,"abstract":"Protocols enable things to connect and communicate, thus making the Internet of Things possible. The performance aspect of the Internet of Things protocols, vital to its widespread utilization, have received much attention. However, one aspect of IoT protocols, essential to its adoption in the real world, is a protocols’ feature set. Comparative analysis based on competing features and properties are rarely if ever, discussed in the literature. In this paper, we define 19 attributes in 5 categories that are essential for IoT stakeholders to consider. These attributes are then used to contrast four IoT protocols, MQTT, HTTP, CoAP and XMPP. Furthermore, we discuss scenarios where an assessment based on comparative strengths and weaknesses would be beneficial. The provided comparison model can be easily extended to include protocols like MQTT-SN, AMQP and DDS.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116405602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Studying the Impact of CPU and Memory Controller Frequencies on Power Consumption of the Jetson TX1 Jetson TX1 CPU和内存控制器频率对功耗的影响研究
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795334
Hazem A. Abdelhafez, M. Ripeanu
Nowadays, heterogeneous unified memory architecture platforms are becoming increasingly common. These platforms incorporate several co-processors on a single chip with a shared physical memory. The use cases for such platforms can vary dramatically. On the one hand, they can be used in the context of Edge computing, which cannot tolerate high latency and has strict energy/power constraints. On the other hand, motivated by their growing computing capabilities, and their energy-efficiency, many have considered replacing traditional bulky servers with these platforms to deliver the same computing power but with lower energy budget. This study is an exploratory step to understand the trade-off between power consumption, processing time, and throughput on a low-power heterogeneous platform. We focus on data stream processing workloads by characterizing several common computing kernels found in computer vision algorithms. Our preliminary experiments on NVIDIA Jetson TX1 show that it is possible reduce power consumption by up to 12%.
如今,异构统一内存架构平台越来越普遍。这些平台在一个带有共享物理内存的芯片上集成了多个协处理器。这些平台的用例可能会有很大的不同。一方面,它们可以在边缘计算的环境中使用,边缘计算不能容忍高延迟,并且有严格的能量/功率限制。另一方面,由于它们不断增长的计算能力和能源效率,许多人已经考虑用这些平台取代传统的笨重服务器,以提供相同的计算能力,但能源预算更低。本研究是了解低功耗异构平台上功耗、处理时间和吞吐量之间权衡的探索性步骤。我们通过描述在计算机视觉算法中发现的几个常见计算内核来关注数据流处理工作负载。我们在NVIDIA Jetson TX1上的初步实验表明,它可以减少高达12%的功耗。
{"title":"Studying the Impact of CPU and Memory Controller Frequencies on Power Consumption of the Jetson TX1","authors":"Hazem A. Abdelhafez, M. Ripeanu","doi":"10.1109/FMEC.2019.8795334","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795334","url":null,"abstract":"Nowadays, heterogeneous unified memory architecture platforms are becoming increasingly common. These platforms incorporate several co-processors on a single chip with a shared physical memory. The use cases for such platforms can vary dramatically. On the one hand, they can be used in the context of Edge computing, which cannot tolerate high latency and has strict energy/power constraints. On the other hand, motivated by their growing computing capabilities, and their energy-efficiency, many have considered replacing traditional bulky servers with these platforms to deliver the same computing power but with lower energy budget. This study is an exploratory step to understand the trade-off between power consumption, processing time, and throughput on a low-power heterogeneous platform. We focus on data stream processing workloads by characterizing several common computing kernels found in computer vision algorithms. Our preliminary experiments on NVIDIA Jetson TX1 show that it is possible reduce power consumption by up to 12%.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114375452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
[Copyright notice] (版权)
Pub Date : 2019-06-01 DOI: 10.1109/fmec.2019.8795330
{"title":"[Copyright notice]","authors":"","doi":"10.1109/fmec.2019.8795330","DOIUrl":"https://doi.org/10.1109/fmec.2019.8795330","url":null,"abstract":"","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"12 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125988471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge Cloud Computing in Telecommunications: Case Studies on Performance Improvement and TCO Saving 电信中的边缘云计算:性能改进和TCO节约的案例研究
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795351
G. Ciccarella, R. Giuliano, F. Mazzenga, F. Vatalaro, Alessandro Vizzarri
The Edge Cloud Computing (ECC) paradigm is rapidly imposing itself in telecommunications networks since when services such as 4K/8K video streaming, 360 degrees augmented/virtual reality, and autonomous driving started appearing on the horizon. This paper provides some case studies on performance improvement and Total Cost of Ownership (TCO) saving which can be achieved with ECC. It discusses the basic rationale for the ECC being the solution to improve KPIs in ultra-broad-band networks, and then it provides examples of performance and cost evaluation based on simulations.
自从4K/8K视频流、360度增强/虚拟现实和自动驾驶等服务开始出现以来,边缘云计算(ECC)范式正在电信网络中迅速发挥作用。本文提供了一些案例研究,以提高性能和节省总拥有成本(TCO)可以实现ECC。讨论了ECC作为改进超宽带网络kpi的解决方案的基本原理,然后提供了基于仿真的性能和成本评估示例。
{"title":"Edge Cloud Computing in Telecommunications: Case Studies on Performance Improvement and TCO Saving","authors":"G. Ciccarella, R. Giuliano, F. Mazzenga, F. Vatalaro, Alessandro Vizzarri","doi":"10.1109/FMEC.2019.8795351","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795351","url":null,"abstract":"The Edge Cloud Computing (ECC) paradigm is rapidly imposing itself in telecommunications networks since when services such as 4K/8K video streaming, 360 degrees augmented/virtual reality, and autonomous driving started appearing on the horizon. This paper provides some case studies on performance improvement and Total Cost of Ownership (TCO) saving which can be achieved with ECC. It discusses the basic rationale for the ECC being the solution to improve KPIs in ultra-broad-band networks, and then it provides examples of performance and cost evaluation based on simulations.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124827081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Recognizing Video Resolution by Monitoring Memory Metrics in Mobile Clients 通过监控移动客户端的内存度量来识别视频分辨率
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795348
A. Randazzo, I. Tinnirello
Content delivery is one of the most successful applications in mobile networks. Mobile edge servers are significantly contributing to the improvement of this type of applications, by also performing resolution adaptations as a function of the radio link quality observed by the users. In this paper, we face the problem of dynamically tracking the perceived video resolution by mobile clients in a mobile edge environment to guarantee an agreed Service Level Agreement (SLA). To this purpose, we propose a protocol-agnostic approach, based on monitoring some memory metrics of a running video streaming process at the mobile client, for identifying the time-varying resolution of the video content.
内容交付是移动网络中最成功的应用之一。移动边缘服务器还根据用户观察到的无线电链路质量执行分辨率调整,从而对这类应用的改进做出了重大贡献。在本文中,我们面临的问题是在移动边缘环境中动态跟踪移动客户端感知到的视频分辨率,以保证一致的服务水平协议(SLA)。为此,我们提出了一种协议无关的方法,该方法基于监控移动客户端上运行的视频流进程的一些内存指标,用于识别视频内容的时变分辨率。
{"title":"Recognizing Video Resolution by Monitoring Memory Metrics in Mobile Clients","authors":"A. Randazzo, I. Tinnirello","doi":"10.1109/FMEC.2019.8795348","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795348","url":null,"abstract":"Content delivery is one of the most successful applications in mobile networks. Mobile edge servers are significantly contributing to the improvement of this type of applications, by also performing resolution adaptations as a function of the radio link quality observed by the users. In this paper, we face the problem of dynamically tracking the perceived video resolution by mobile clients in a mobile edge environment to guarantee an agreed Service Level Agreement (SLA). To this purpose, we propose a protocol-agnostic approach, based on monitoring some memory metrics of a running video streaming process at the mobile client, for identifying the time-varying resolution of the video content.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130980845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcing Edge Computing with Multipath TCP Enabled Mobile Device Clouds 支持多路径TCP的移动设备云增强边缘计算
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795340
V. Balasubramanian, Kees Kroep, K. Joshi, R. V. Prasad
In recent years, enormous growth has been witnessed in the computational and storage capabilities of mobile devices. However, much of this computational and storage capabilities are not always fully used. On the other hand, popularity of mobile edge computing which aims to replace the traditional centralized powerful cloud with multiple edge servers is rapidly growing. In particular, applications having strict latency requirements can be best served by the mobile edge clouds due to a reduced round-trip delay. In this paper we propose a Multi-Path TCP (MPTCP) enabled mobile device cloud (MDC) as a replacement to the existing TCP based or D2D device cloud techniques, as it effectively makes use of the available bandwidth by providing much higher throughput as well as ensures robust wireless connectivity. We investigate the congestion in mobile-device cloud formation resulting mainly due to the message passing for service providing nodes at the time of discovery, service continuity and formation of cloud composition. We propose a user space agent called congestion handler that enable offloading of packets from one sub-flow to the other under link quality constraints. Further, we discuss the benefits of this design and perform preliminary analysis of the system.
近年来,移动设备的计算和存储能力有了巨大的增长。然而,这种计算和存储能力的大部分并不总是得到充分利用。另一方面,旨在用多个边缘服务器取代传统的集中式强大云的移动边缘计算的普及正在迅速增长。特别是,由于减少了往返延迟,具有严格延迟要求的应用程序可以最好地由移动边缘云提供服务。在本文中,我们提出了一种支持多路径TCP (MPTCP)的移动设备云(MDC),作为现有基于TCP或D2D设备云技术的替代品,因为它通过提供更高的吞吐量有效地利用了可用带宽,并确保了强大的无线连接。我们研究了移动设备云形成中的拥塞问题,这主要是由于发现时服务提供节点的消息传递、服务的连续性和云组成的形成造成的。我们提出了一个称为拥塞处理程序的用户空间代理,它允许在链路质量约束下将数据包从一个子流卸载到另一个子流。此外,我们讨论了这种设计的好处,并对系统进行了初步分析。
{"title":"Reinforcing Edge Computing with Multipath TCP Enabled Mobile Device Clouds","authors":"V. Balasubramanian, Kees Kroep, K. Joshi, R. V. Prasad","doi":"10.1109/FMEC.2019.8795340","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795340","url":null,"abstract":"In recent years, enormous growth has been witnessed in the computational and storage capabilities of mobile devices. However, much of this computational and storage capabilities are not always fully used. On the other hand, popularity of mobile edge computing which aims to replace the traditional centralized powerful cloud with multiple edge servers is rapidly growing. In particular, applications having strict latency requirements can be best served by the mobile edge clouds due to a reduced round-trip delay. In this paper we propose a Multi-Path TCP (MPTCP) enabled mobile device cloud (MDC) as a replacement to the existing TCP based or D2D device cloud techniques, as it effectively makes use of the available bandwidth by providing much higher throughput as well as ensures robust wireless connectivity. We investigate the congestion in mobile-device cloud formation resulting mainly due to the message passing for service providing nodes at the time of discovery, service continuity and formation of cloud composition. We propose a user space agent called congestion handler that enable offloading of packets from one sub-flow to the other under link quality constraints. Further, we discuss the benefits of this design and perform preliminary analysis of the system.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133513107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment Analysis of Arabic Tweets in Smart Cities: A Review of Saudi Dialect 智慧城市中阿拉伯语推文的情感分析:对沙特方言的回顾
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795331
Shoayee Alotaibi, Rashid Mehmood, Iyad A. Katib
Social media including Twitter have transformed our societies and has become an important pulse of smart societies by sensing the information about the people and their experiences across space and time around the living spaces. This has allowed connecting with people, sensing their feelings and behaviors, and measuring the performance of various city systems such as healthcare and transport. The sentiment analysis of social media is a key step in this process. As of January 2019, Saudi Arabia had the fourth highest number of Twitter users in the world, after the US, Japan, and the UK. However, the works done on sentiment analysis in the Arabic language are limited in their scope and depth. Moreover, little is available in the literature on sentiment analysis in the Arabic and Saudi dialects. This paper aims to provide a resource on the sentiment analysis in the Arabic and Saudi dialects. It reviews the relevant tools and techniques considering their accuracy. We hope that this paper will be a useful guide for the researchers who are interested in the sentiment analysis of the Arabic and the Saudi dialects.
包括Twitter在内的社交媒体通过感知人们的信息和他们在生活空间周围的空间和时间的经历,改变了我们的社会,成为智能社会的重要脉搏。这使得人们能够与人联系,感知他们的感受和行为,并衡量各种城市系统(如医疗保健和交通)的性能。社交媒体的情感分析是这一过程中的关键一步。截至2019年1月,沙特阿拉伯的推特用户数量位居世界第四,仅次于美国、日本和英国。然而,在阿拉伯语情感分析方面所做的工作在广度和深度上都是有限的。此外,关于阿拉伯语和沙特语方言的情感分析文献很少。本文旨在为阿拉伯语和沙特语方言的情感分析提供参考。它回顾了相关的工具和技术,考虑到它们的准确性。希望本文能对研究阿拉伯语和沙特语方言情感分析的学者有所帮助。
{"title":"Sentiment Analysis of Arabic Tweets in Smart Cities: A Review of Saudi Dialect","authors":"Shoayee Alotaibi, Rashid Mehmood, Iyad A. Katib","doi":"10.1109/FMEC.2019.8795331","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795331","url":null,"abstract":"Social media including Twitter have transformed our societies and has become an important pulse of smart societies by sensing the information about the people and their experiences across space and time around the living spaces. This has allowed connecting with people, sensing their feelings and behaviors, and measuring the performance of various city systems such as healthcare and transport. The sentiment analysis of social media is a key step in this process. As of January 2019, Saudi Arabia had the fourth highest number of Twitter users in the world, after the US, Japan, and the UK. However, the works done on sentiment analysis in the Arabic language are limited in their scope and depth. Moreover, little is available in the literature on sentiment analysis in the Arabic and Saudi dialects. This paper aims to provide a resource on the sentiment analysis in the Arabic and Saudi dialects. It reviews the relevant tools and techniques considering their accuracy. We hope that this paper will be a useful guide for the researchers who are interested in the sentiment analysis of the Arabic and the Saudi dialects.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132040737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Detecting and Predicting Anomalies for Edge Cluster Environments using Hidden Markov Models 基于隐马尔可夫模型的边缘聚类环境异常检测与预测
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795337
Areeg Samir, C. Pahl
Edge cloud environments are often build as virtualized coordinated clusters of possibly heterogeneous devices. Their problem is that infrastructure metrics are only partially available and observable performance needs to be linked to underlying infrastructure problems in case of observed anomalies in order to remedy problems effectively. This paper presents an anomaly detection and prediction model based on Hidden Markov Model (HMM) that addresses the problem of mapping observations to underlying infrastructure problems. The model aims at detecting anomalies but also predicting them at runtime in order to optimize system availability and performance. The model detects changes in response time based on their resource utilization. We target a cluster architecture for edge computing where applications are deployed in the form of lightweight containers. To evaluate the proposed model, experiments were conducted considering CPU utilization, response time, and throughput as metrics. The results show that our HMM detection and prediction performs well and achieves accurate fault prediction.
边缘云环境通常构建为可能异构设备的虚拟化协调集群。他们的问题是基础设施度量只是部分可用的,并且为了有效地补救问题,在观察到异常的情况下,需要将可观察的性能与底层基础设施问题联系起来。本文提出了一种基于隐马尔可夫模型(HMM)的异常检测和预测模型,该模型解决了将观测结果映射到底层基础设施问题的问题。该模型旨在检测异常,并在运行时预测异常,以优化系统可用性和性能。该模型根据资源利用率检测响应时间的变化。我们的目标是边缘计算的集群架构,其中应用程序以轻量级容器的形式部署。为了评估所提出的模型,将CPU利用率、响应时间和吞吐量作为度量进行了实验。结果表明,该方法具有较好的检测和预测效果,能够实现较准确的故障预测。
{"title":"Detecting and Predicting Anomalies for Edge Cluster Environments using Hidden Markov Models","authors":"Areeg Samir, C. Pahl","doi":"10.1109/FMEC.2019.8795337","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795337","url":null,"abstract":"Edge cloud environments are often build as virtualized coordinated clusters of possibly heterogeneous devices. Their problem is that infrastructure metrics are only partially available and observable performance needs to be linked to underlying infrastructure problems in case of observed anomalies in order to remedy problems effectively. This paper presents an anomaly detection and prediction model based on Hidden Markov Model (HMM) that addresses the problem of mapping observations to underlying infrastructure problems. The model aims at detecting anomalies but also predicting them at runtime in order to optimize system availability and performance. The model detects changes in response time based on their resource utilization. We target a cluster architecture for edge computing where applications are deployed in the form of lightweight containers. To evaluate the proposed model, experiments were conducted considering CPU utilization, response time, and throughput as metrics. The results show that our HMM detection and prediction performs well and achieves accurate fault prediction.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132292397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1