首页 > 最新文献

2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)最新文献

英文 中文
Smartwatches as IoT Edge Devices: A Framework and Survey 智能手表作为物联网边缘设备:框架和调查
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795338
Nour Takiddeen, I. Zualkernan
Smartwatches have finally come of age and represent a unique platform for building IoT applications involving people. Today, smartwatches are used in various IoT scenarios including healthcare and fitness. Since the current smartwatches are equipped with a variety of sensors and heterogenous wireless protocols, they can be used to enact a variety of people-based Social Internet of Things (SIoT). Such applications involve sending sensor data from millions of watches through the IoT cloud. Processors on current watches are powerful enough to run even deep learning algorithms and may support peak download data rates of more than 50 Mbits/second. However, battery life remains a limiting factor. Most smartwatch applications capture and process context. This paper provides a survey and framework based on context computation, edge analytics, and computation off-loading as applied to IoT applications using smartwatches. This framework can be a basis of meaningful discussion of various solutions to address various technical problems like short battery life of smartwatches when used in IoT applications.
智能手表终于成熟了,它代表了一个构建涉及人的物联网应用的独特平台。如今,智能手表被用于各种物联网场景,包括医疗保健和健身。由于目前的智能手表配备了各种传感器和异构无线协议,因此可以用于实现各种以人为本的社会物联网(SIoT)。这些应用包括通过物联网云发送数百万块手表的传感器数据。目前手表上的处理器足够强大,甚至可以运行深度学习算法,并且可能支持超过50兆/秒的峰值下载数据速率。然而,电池寿命仍然是一个限制因素。大多数智能手表应用程序捕获和处理上下文。本文提供了一个基于上下文计算、边缘分析和计算卸载的调查和框架,应用于使用智能手表的物联网应用。这个框架可以作为有意义的讨论各种解决方案的基础,以解决各种技术问题,如在物联网应用中使用时智能手表的电池寿命短。
{"title":"Smartwatches as IoT Edge Devices: A Framework and Survey","authors":"Nour Takiddeen, I. Zualkernan","doi":"10.1109/FMEC.2019.8795338","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795338","url":null,"abstract":"Smartwatches have finally come of age and represent a unique platform for building IoT applications involving people. Today, smartwatches are used in various IoT scenarios including healthcare and fitness. Since the current smartwatches are equipped with a variety of sensors and heterogenous wireless protocols, they can be used to enact a variety of people-based Social Internet of Things (SIoT). Such applications involve sending sensor data from millions of watches through the IoT cloud. Processors on current watches are powerful enough to run even deep learning algorithms and may support peak download data rates of more than 50 Mbits/second. However, battery life remains a limiting factor. Most smartwatch applications capture and process context. This paper provides a survey and framework based on context computation, edge analytics, and computation off-loading as applied to IoT applications using smartwatches. This framework can be a basis of meaningful discussion of various solutions to address various technical problems like short battery life of smartwatches when used in IoT applications.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129385176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Real-time Traffic Management Model using GPUenabled Edge Devices 使用支持gpu的边缘设备的实时流量管理模型
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795336
M. Rathore, Y. Jararweh, Hojae Son, Anand Paul
Auto management and controlling road traffic while identifying abnormal driving behavior is one of the key challenges faced by the traffic authorities. In most of the cities, the traffic violations are detected manually by placing sergeants at various regions on the road. Placing sergeants is not economical and does not cover all the metropolitan area. Only in modern countries, traffic authorities have developed systems that use static road cameras to monitor real-time city traffic for identification of major traffic violations. However, these cameras just cover limited areas of the cities, such as, intersections, signals, roundabouts, and main streets. Therefore, in this paper, we have proposed a real-time traffic violation detection model by using vehicular camera along with the edge device in order to control and manage the road traffic. The edge device is equipped with the graphics processing unit (GPU), deployed inside the vehicle, and directly attached to the vehicle camera. The camera monitors every vehicle ahead, whereas, the edge device identifies the suspected driving violation. As a use case, we have tested our model by considering a wrong U-turn as a traffic violation. We designed a wrong U-turn detection algorithm and deployed it on the GPU-enabled edge device. In order to evaluate the feasibility of the system, we considered the efficiency measurements corresponding to the video generation rate and data size. The results show that the system is able to identify violations far faster than the video generation time.
如何在识别异常驾驶行为的同时对道路交通进行管理和控制,是交通管理部门面临的关键挑战之一。在大多数城市,交通违章行为是通过在道路上的各个区域设置警察来人工检测的。安置警长是不经济的,也不能覆盖所有的大都市地区。只有在现代国家,交通部门才开发了使用静态道路摄像头监控实时城市交通的系统,以识别重大交通违规行为。然而,这些摄像头只能覆盖城市的有限区域,如十字路口、信号、环形交叉路口和主要街道。因此,在本文中,我们提出了一种利用车载摄像头和边缘设备的实时交通违规检测模型,以实现对道路交通的控制和管理。边缘设备配备图形处理单元(GPU),部署在车内,并直接连接到车载摄像头。摄像头监控前方的每一辆车,而边缘设备识别可疑的违规驾驶。作为一个用例,我们通过将错误的u型转弯视为交通违规来测试我们的模型。我们设计了一个错误的u型转弯检测算法,并将其部署在支持gpu的边缘设备上。为了评估系统的可行性,我们考虑了与视频生成速率和数据大小相对应的效率度量。结果表明,该系统识别违规行为的速度远远快于视频生成时间。
{"title":"Real-time Traffic Management Model using GPUenabled Edge Devices","authors":"M. Rathore, Y. Jararweh, Hojae Son, Anand Paul","doi":"10.1109/FMEC.2019.8795336","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795336","url":null,"abstract":"Auto management and controlling road traffic while identifying abnormal driving behavior is one of the key challenges faced by the traffic authorities. In most of the cities, the traffic violations are detected manually by placing sergeants at various regions on the road. Placing sergeants is not economical and does not cover all the metropolitan area. Only in modern countries, traffic authorities have developed systems that use static road cameras to monitor real-time city traffic for identification of major traffic violations. However, these cameras just cover limited areas of the cities, such as, intersections, signals, roundabouts, and main streets. Therefore, in this paper, we have proposed a real-time traffic violation detection model by using vehicular camera along with the edge device in order to control and manage the road traffic. The edge device is equipped with the graphics processing unit (GPU), deployed inside the vehicle, and directly attached to the vehicle camera. The camera monitors every vehicle ahead, whereas, the edge device identifies the suspected driving violation. As a use case, we have tested our model by considering a wrong U-turn as a traffic violation. We designed a wrong U-turn detection algorithm and deployed it on the GPU-enabled edge device. In order to evaluate the feasibility of the system, we considered the efficiency measurements corresponding to the video generation rate and data size. The results show that the system is able to identify violations far faster than the video generation time.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133269729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Co-optimizing Latency and Energy for IoT services using HMP servers in Fog Clusters 在雾集群中使用HMP服务器共同优化物联网服务的延迟和能量
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795353
S. Shukla, D. Ghosal, Kesheng Wu, A. Sim, M. Farrens
Fog computing has the potential to be an energy-efficient alternative to cloud computing for guaranteeing latency requirements of Latency-critical (LC) IoT services. However, even in fog computing low energy-efficiency of homogeneous multi-core server processors can be a major contributor to energy wastage. Recent studies have shown that Heterogeneous Multi-core Processors (HMPs) can improve energy efficiency of servers by adapting to dynamic load changes of LC-services. However, proposed approaches optimize energy only at a single server level. In our work, we demonstrate that optimization at the cluster-level across many HMP-servers can offer much greater energy savings through optimal work distribution across the HMP-servers while still guaranteeing the Service Level Objectives (SLO) of LC-services. In this paper, we present Greeniac, a cluster-level task manager that employs Reinforcement Learning to identify optimal configurations at the server- and cluster-levels for different workloads. We develop a server-level service scheduler and a cluster-level load balancing module to assign services and distribute tasks across HMP servers based on the learned configurations. In addition to meeting the required SLO targets, Greeniac achieves up to 28% energy saving compared to best-case cluster scheduling techniques with local HMP-aware scheduling on a 4-server fog cluster, with potentially larger savings in a larger cluster.
雾计算有可能成为云计算的一种节能替代方案,以保证延迟关键(LC)物联网服务的延迟要求。然而,即使在雾计算中,同构多核服务器处理器的低能效也可能是造成能源浪费的主要原因。近年来的研究表明,异构多核处理器(hmp)能够适应lc服务负载的动态变化,从而提高服务器的能源效率。然而,所提出的方法仅在单个服务器级别上优化能源。在我们的工作中,我们证明了跨许多hmp服务器的集群级优化可以通过跨hmp服务器的最佳工作分配提供更大的能源节约,同时仍然保证lc服务的服务水平目标(SLO)。在本文中,我们介绍了Greeniac,一个集群级任务管理器,它使用强化学习来识别服务器和集群级别针对不同工作负载的最佳配置。我们开发了一个服务器级服务调度器和一个集群级负载平衡模块,以根据学习到的配置在HMP服务器之间分配服务和分发任务。除了满足所需的SLO目标之外,与在4台服务器雾集群上使用本地hmp感知调度的最佳集群调度技术相比,Greeniac实现了高达28%的节能,在更大的集群中可能会节省更多的能源。
{"title":"Co-optimizing Latency and Energy for IoT services using HMP servers in Fog Clusters","authors":"S. Shukla, D. Ghosal, Kesheng Wu, A. Sim, M. Farrens","doi":"10.1109/FMEC.2019.8795353","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795353","url":null,"abstract":"Fog computing has the potential to be an energy-efficient alternative to cloud computing for guaranteeing latency requirements of Latency-critical (LC) IoT services. However, even in fog computing low energy-efficiency of homogeneous multi-core server processors can be a major contributor to energy wastage. Recent studies have shown that Heterogeneous Multi-core Processors (HMPs) can improve energy efficiency of servers by adapting to dynamic load changes of LC-services. However, proposed approaches optimize energy only at a single server level. In our work, we demonstrate that optimization at the cluster-level across many HMP-servers can offer much greater energy savings through optimal work distribution across the HMP-servers while still guaranteeing the Service Level Objectives (SLO) of LC-services. In this paper, we present Greeniac, a cluster-level task manager that employs Reinforcement Learning to identify optimal configurations at the server- and cluster-levels for different workloads. We develop a server-level service scheduler and a cluster-level load balancing module to assign services and distribute tasks across HMP servers based on the learned configurations. In addition to meeting the required SLO targets, Greeniac achieves up to 28% energy saving compared to best-case cluster scheduling techniques with local HMP-aware scheduling on a 4-server fog cluster, with potentially larger savings in a larger cluster.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123860199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
FMEC 2019 Keynote 4
Pub Date : 2019-06-01 DOI: 10.1109/fmec.2019.8795352
{"title":"FMEC 2019 Keynote 4","authors":"","doi":"10.1109/fmec.2019.8795352","DOIUrl":"https://doi.org/10.1109/fmec.2019.8795352","url":null,"abstract":"","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123546632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
vProVal: Introspection based Process Validation for Detecting Malware in KVM-based Cloud Environment vProVal:基于自省的进程验证在基于kvm的云环境中检测恶意软件
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795365
P. Mishra, Ishita Verma, Saurabh Gupta, Varun S. Rana, Kavitha Kadarla
In the modern era of computing, Cloud security is of paramount importance. Most of the research mainly focused on In-Virtual Machine (VM) security techniques for detecting malware affecting virtual domains running in the Cloud. In-VM security techniques are deployed inside the VM and hence they are very much prone to subversion attacks. In this paper, an-VM monitoring approach based on introspection, called vProVal, is proposed. The vProVal is designed to detect the hidden processes and rootkits that disable the security tool, running in the monitored VM in Kernel VM (KVM)-based cloud environment. It performs the malware detection from outside the VM at the KVM-layer and hence more robust to attacks. The introspection technique used is to extract the low-level details of a running VM from hypervisor by viewing its memory, trapping on hardware events, and accessing the vCPU registers. A preliminary analysis has been performed and the approach is found to be promising.
在现代计算时代,云安全至关重要。大多数研究主要集中在检测影响云中运行的虚拟域的恶意软件的虚拟机(VM)安全技术上。虚拟机内安全技术部署在虚拟机内部,因此它们非常容易受到颠覆攻击。本文提出了一种基于内省的虚拟机监控方法,称为vProVal。vProVal用于检测在基于KVM的云环境中,被监控的虚拟机中运行的隐藏进程和禁用安全工具的rootkit。它在kvm层执行来自VM外部的恶意软件检测,因此对攻击更加健壮。所使用的内省技术是通过查看虚拟机管理程序的内存、捕获硬件事件和访问vCPU寄存器,从虚拟机管理程序中提取正在运行的虚拟机的低级细节。初步分析表明,该方法是可行的。
{"title":"vProVal: Introspection based Process Validation for Detecting Malware in KVM-based Cloud Environment","authors":"P. Mishra, Ishita Verma, Saurabh Gupta, Varun S. Rana, Kavitha Kadarla","doi":"10.1109/FMEC.2019.8795365","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795365","url":null,"abstract":"In the modern era of computing, Cloud security is of paramount importance. Most of the research mainly focused on In-Virtual Machine (VM) security techniques for detecting malware affecting virtual domains running in the Cloud. In-VM security techniques are deployed inside the VM and hence they are very much prone to subversion attacks. In this paper, an-VM monitoring approach based on introspection, called vProVal, is proposed. The vProVal is designed to detect the hidden processes and rootkits that disable the security tool, running in the monitored VM in Kernel VM (KVM)-based cloud environment. It performs the malware detection from outside the VM at the KVM-layer and hence more robust to attacks. The introspection technique used is to extract the low-level details of a running VM from hypervisor by viewing its memory, trapping on hardware events, and accessing the vCPU registers. A preliminary analysis has been performed and the approach is found to be promising.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124741216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Making a Business Out of (Predictive Application Management in) the Fog* 从迷雾(预测性应用管理)中创造业务*
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795346
Giuseppe Astuti, Antonio Brogi, Stefano Forti
Managing large, highly distributed IoT applications over heterogeneous Fog infrastructures so to meet all their stringent QoS (as well as hardware and software) requirements is intrinsically difficult. Different simulation and predictive methodologies have been proposed to estimate key performance indicators of eligible application deployments and managements so to identify the best candidates. In this paper, we describe the current business model environment and discuss two possible business models for creating value from a company provisioning predictive Fog application management services.
在异构雾基础设施上管理大型、高度分布式的物联网应用,以满足其所有严格的QoS(以及硬件和软件)要求,从本质上讲是困难的。已经提出了不同的模拟和预测方法来估计符合条件的应用程序部署和管理的关键性能指标,从而确定最佳候选。在本文中,我们描述了当前的业务模型环境,并讨论了从提供预测性Fog应用程序管理服务的公司中创造价值的两种可能的业务模型。
{"title":"Making a Business Out of (Predictive Application Management in) the Fog*","authors":"Giuseppe Astuti, Antonio Brogi, Stefano Forti","doi":"10.1109/FMEC.2019.8795346","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795346","url":null,"abstract":"Managing large, highly distributed IoT applications over heterogeneous Fog infrastructures so to meet all their stringent QoS (as well as hardware and software) requirements is intrinsically difficult. Different simulation and predictive methodologies have been proposed to estimate key performance indicators of eligible application deployments and managements so to identify the best candidates. In this paper, we describe the current business model environment and discuss two possible business models for creating value from a company provisioning predictive Fog application management services.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"38 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130607553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FMEC 2019 Keynote 2
Pub Date : 2019-06-01 DOI: 10.1109/fmec.2019.8795350
{"title":"FMEC 2019 Keynote 2","authors":"","doi":"10.1109/fmec.2019.8795350","DOIUrl":"https://doi.org/10.1109/fmec.2019.8795350","url":null,"abstract":"","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121156591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Water Conductivity Sensor based on Coils to Detect Illegal Dumpings in Smart Cities 基于线圈的水电导率传感器探测智慧城市中的非法倾倒
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795341
Javier Rocher, Daniel A. Basterrechea, Miran Taha, Mar Parra, Jaime Lloret
Illegal dumpings in sewerage can cause problems in wastewater treatment plants, so it may become an environmental problem. In this paper, we propose a system for detecting these illegal dumpings. We use conductivity sensors for detecting a change in the conductivity of water because this change may appear due to a dump. The system is based on two coils. One of the coils is powered by a sinus-wave and the other coil is induced. To prevent damage from water in the copper we encapsulate the coils in a PVC tube. These coils are connected to a Flyport in order to send the values and generate alarms. We tested the prototype with different configurations of coils with encapsulation of 3 and 1 mm. When the encapsulation is of 3 mm, we do not observe differences in the induced voltage. The prototype selected has a difference of 4.10 Volts between the samples 0 and 40 g/l of the table salt. In the verification test this prototype has a relative error of 2.54%.
非法倾倒污水会给污水处理厂带来问题,因此可能成为一个环境问题。在本文中,我们提出了一个检测这些非法倾倒的系统。我们使用电导率传感器来检测水电导率的变化,因为这种变化可能由于倾倒而出现。该系统基于两个线圈。其中一个线圈由正弦波供电,另一个线圈由感应线圈供电。为了防止铜管内的水损坏,我们将线圈封装在PVC管中。这些线圈连接到Flyport,以便发送值并产生警报。我们用封装为3毫米和1毫米的不同线圈配置测试了原型。当封装为3mm时,我们没有观察到感应电压的差异。所选择的样品在0和40 g/l的食盐样品之间有4.10伏的差异。在验证测试中,该样机的相对误差为2.54%。
{"title":"Water Conductivity Sensor based on Coils to Detect Illegal Dumpings in Smart Cities","authors":"Javier Rocher, Daniel A. Basterrechea, Miran Taha, Mar Parra, Jaime Lloret","doi":"10.1109/FMEC.2019.8795341","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795341","url":null,"abstract":"Illegal dumpings in sewerage can cause problems in wastewater treatment plants, so it may become an environmental problem. In this paper, we propose a system for detecting these illegal dumpings. We use conductivity sensors for detecting a change in the conductivity of water because this change may appear due to a dump. The system is based on two coils. One of the coils is powered by a sinus-wave and the other coil is induced. To prevent damage from water in the copper we encapsulate the coils in a PVC tube. These coils are connected to a Flyport in order to send the values and generate alarms. We tested the prototype with different configurations of coils with encapsulation of 3 and 1 mm. When the encapsulation is of 3 mm, we do not observe differences in the induced voltage. The prototype selected has a difference of 4.10 Volts between the samples 0 and 40 g/l of the table salt. In the verification test this prototype has a relative error of 2.54%.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114404526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Run-Time Managed Mobile Application Execution 运行时管理的移动应用程序执行
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795323
M. Zanella, G. Massari, W. Fornaciari
Achieving an optimal management of the energy budget of mobile devices, while matching the applications performance requirements is always a challenging task. In our research, we are exploring the possible benefits of driving run-time management strategies, from an application perspective, by integrating the programming model with the run-time system and exploiting suitable API for explicit application requirements specification.
在满足应用性能要求的同时,实现对移动设备能量预算的优化管理一直是一项具有挑战性的任务。在我们的研究中,我们从应用程序的角度,通过将编程模型与运行时系统集成,并为明确的应用程序需求规范开发合适的API,探索驱动运行时管理策略的可能好处。
{"title":"Run-Time Managed Mobile Application Execution","authors":"M. Zanella, G. Massari, W. Fornaciari","doi":"10.1109/FMEC.2019.8795323","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795323","url":null,"abstract":"Achieving an optimal management of the energy budget of mobile devices, while matching the applications performance requirements is always a challenging task. In our research, we are exploring the possible benefits of driving run-time management strategies, from an application perspective, by integrating the programming model with the run-time system and exploiting suitable API for explicit application requirements specification.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124527495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Advantage of Computation Offloading in Multi-Access Edge Computing 多访问边缘计算中计算卸载的优势
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795335
Raghubir Singh, S. Armour, Aftab Khan, M. Sooriyabandara, G. Oikonomou
Computation offloading plays a critical role in reducing task completion time for mobile devices. The advantages of computation offloading to cloud resources in Mobile Cloud Computing have been widely considered. In this paper, we have investigated different scenarios for offloading to less distant Multi-Access Edge Computing (MEC) servers for multiple users with a range of mobile devices and computational tasks. We present detailed simulation data for how offloading can be beneficial in a MEC network with varying quantitative mobile user demand, heterogeneity in mobile device on-board and MEC processor speeds, computational task complexity, communication speeds, link access delays and mobile device user numbers. Unlike previous work where simulations considered only limited communication speeds for offloading, we have extended the range of link speeds and included two types of communication delay. We find that more computationally complex applications are offloaded preferentially (especially with the higher server:mobile device processor speed ratios) while low link speeds and any delays caused by network delays or excessive user numbers degrade any advantages in reduced task completion times offered by offloading. Additionally, significant savings in energy usage by mobile devices are guaranteed except at very low link speeds.
计算卸载在减少移动设备的任务完成时间方面起着至关重要的作用。在移动云计算中,计算卸载到云资源的优势已经得到了广泛的关注。在本文中,我们研究了为具有一系列移动设备和计算任务的多个用户卸载到距离较近的多访问边缘计算(MEC)服务器的不同场景。我们提供了详细的模拟数据,说明在具有不同数量移动用户需求、移动设备板载和MEC处理器速度的异质性、计算任务复杂性、通信速度、链路访问延迟和移动设备用户数量的MEC网络中,卸载是如何有益的。不像以前的工作,模拟只考虑有限的通信速度卸载,我们扩大了链路速度的范围,并包括两种类型的通信延迟。我们发现,更多计算复杂的应用程序优先被卸载(特别是在服务器:移动设备处理器速度比更高的情况下),而低链路速度和由网络延迟或过多用户数量引起的任何延迟会降低卸载在减少任务完成时间方面提供的任何优势。此外,除了非常低的连接速度外,移动设备的能源使用可以保证显著节省。
{"title":"The Advantage of Computation Offloading in Multi-Access Edge Computing","authors":"Raghubir Singh, S. Armour, Aftab Khan, M. Sooriyabandara, G. Oikonomou","doi":"10.1109/FMEC.2019.8795335","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795335","url":null,"abstract":"Computation offloading plays a critical role in reducing task completion time for mobile devices. The advantages of computation offloading to cloud resources in Mobile Cloud Computing have been widely considered. In this paper, we have investigated different scenarios for offloading to less distant Multi-Access Edge Computing (MEC) servers for multiple users with a range of mobile devices and computational tasks. We present detailed simulation data for how offloading can be beneficial in a MEC network with varying quantitative mobile user demand, heterogeneity in mobile device on-board and MEC processor speeds, computational task complexity, communication speeds, link access delays and mobile device user numbers. Unlike previous work where simulations considered only limited communication speeds for offloading, we have extended the range of link speeds and included two types of communication delay. We find that more computationally complex applications are offloaded preferentially (especially with the higher server:mobile device processor speed ratios) while low link speeds and any delays caused by network delays or excessive user numbers degrade any advantages in reduced task completion times offered by offloading. Additionally, significant savings in energy usage by mobile devices are guaranteed except at very low link speeds.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130239749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1