首页 > 最新文献

2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)最新文献

英文 中文
Data Forwarding Algorithm Based on Energy Efficiency in Multi-Hop Device to Device Network 多跳设备到设备网络中基于能效的数据转发算法
Yong Zhang, Ruonan Li, Yanan Zhang, Mei Song
Energy efficiency is an important factor to optimize the multi-hop forwarding strategy. PD (Pairing-inspired Dijkstra) multi-hop data forwarding algorithm is proposed to share cellular spectrum resources with D2D (device-to-device) users. Candidate multiplexing channel model is established in our proposal. Based on this model, PD algorithm solves the issue on channel and path selection. PD algorithm includes two parts, KM dichotomous matching algorithm and multiple iterations for Dijkstra algorithm. Under energy efficiency and QoS (Quality of Service) constraint, PD algorithm selects optimal transmission path among D2D users. Furthermore, the energy efficiency and transmission delay are evaluated in simulation section under PD, Dijkstra and CD (Closest to Destination) algorithm. Simulation results indicate that PD has better performance on energy efficiency and E2E (End to End) delay.
能量效率是优化多跳转发策略的一个重要因素。为了与D2D (device-to-device)用户共享蜂窝频谱资源,提出了PD (pair -inspired Dijkstra)多跳数据转发算法。本文建立了候选复用信道模型。基于该模型,PD算法解决了信道和路径的选择问题。PD算法包括KM二分类匹配算法和多次迭代Dijkstra算法两部分。PD算法在能量效率和QoS (Quality Service)约束下,在D2D用户之间选择最优传输路径。在仿真部分对PD、Dijkstra和CD (nearest to Destination)算法下的能量效率和传输延迟进行了评估。仿真结果表明,PD在能效和端到端延迟方面具有较好的性能。
{"title":"Data Forwarding Algorithm Based on Energy Efficiency in Multi-Hop Device to Device Network","authors":"Yong Zhang, Ruonan Li, Yanan Zhang, Mei Song","doi":"10.1109/PDCAT.2017.00056","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00056","url":null,"abstract":"Energy efficiency is an important factor to optimize the multi-hop forwarding strategy. PD (Pairing-inspired Dijkstra) multi-hop data forwarding algorithm is proposed to share cellular spectrum resources with D2D (device-to-device) users. Candidate multiplexing channel model is established in our proposal. Based on this model, PD algorithm solves the issue on channel and path selection. PD algorithm includes two parts, KM dichotomous matching algorithm and multiple iterations for Dijkstra algorithm. Under energy efficiency and QoS (Quality of Service) constraint, PD algorithm selects optimal transmission path among D2D users. Furthermore, the energy efficiency and transmission delay are evaluated in simulation section under PD, Dijkstra and CD (Closest to Destination) algorithm. Simulation results indicate that PD has better performance on energy efficiency and E2E (End to End) delay.","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122737040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Model-Based Statistical Features for Mobile Phone Image of Tomato Plant Disease Classification 基于模型的番茄植物病害手机图像统计特征分类
C. Hlaing, Sai Maung Maung Zaw
We introduce a set of statistical features and propose the SIFT texture features descriptor model on statistical image processing. The proposed feature is applied to plant disease classification with PlantVillage image dataset. The input is plant leaf image taken by phone camera whereas the output is the plant disease name. The input image is preprocessed to remove background. The SIFT features are extracted from the preprocessed image. As a main contribution, the extracted SIFT features are model by Generalized Extreme Value (GEV) Distribution to represent an image information in a small number of dimensions. We focus on the statistical feature and model-based texture features to minimize the computational time and complexity of phone image processing. The propose features aim to be significantly reduced in computational time for plant disease recognition for mobile phone. The experimental result shows that the proposed features can compare with other previous statistical features and can also distinguish between six tomato diseases, including Leaf Mold, Septoria Leaf Spot, Two Spotted Spider Mite, Late Blight, Bacterial Spot and Target Spot.
在统计图像处理中引入一组统计特征,并提出SIFT纹理特征描述子模型。利用PlantVillage图像数据集将该特征应用于植物病害分类。输入是手机摄像头拍摄的植物叶片图像,输出是植物病害名称。对输入图像进行预处理以去除背景。从预处理图像中提取SIFT特征。作为主要贡献,提取的SIFT特征采用广义极值(GEV)分布模型来表示少量维度的图像信息。我们专注于统计特征和基于模型的纹理特征,以最大限度地减少手机图像处理的计算时间和复杂性。所提出的特征旨在显著减少手机植物病害识别的计算时间。实验结果表明,所提出的特征可以与其他统计特征进行比较,并且可以区分叶霉病、Septoria叶斑病、双斑蜘蛛螨、晚疫病、细菌性斑病和目标斑病等6种番茄病害。
{"title":"Model-Based Statistical Features for Mobile Phone Image of Tomato Plant Disease Classification","authors":"C. Hlaing, Sai Maung Maung Zaw","doi":"10.1109/PDCAT.2017.00044","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00044","url":null,"abstract":"We introduce a set of statistical features and propose the SIFT texture features descriptor model on statistical image processing. The proposed feature is applied to plant disease classification with PlantVillage image dataset. The input is plant leaf image taken by phone camera whereas the output is the plant disease name. The input image is preprocessed to remove background. The SIFT features are extracted from the preprocessed image. As a main contribution, the extracted SIFT features are model by Generalized Extreme Value (GEV) Distribution to represent an image information in a small number of dimensions. We focus on the statistical feature and model-based texture features to minimize the computational time and complexity of phone image processing. The propose features aim to be significantly reduced in computational time for plant disease recognition for mobile phone. The experimental result shows that the proposed features can compare with other previous statistical features and can also distinguish between six tomato diseases, including Leaf Mold, Septoria Leaf Spot, Two Spotted Spider Mite, Late Blight, Bacterial Spot and Target Spot.","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117311661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Tax-Based Mechanisms for Resource Scaling-Out of Stream Big Data Analytics 基于税收的流外大数据分析资源扩展机制
Xiaoyuan Fu, Jingyu Wang, Q. Qi, J. Liao, Tonghong Li
Cloud-based big data platforms provide physical resources for a variety of applications to analyze all forms of data. For the stream big data analytics, a participated task always needs to scale out resources when its input data increases steeply. Typically, the resource scaling out can be achieved by increasing the parallelism degree of the platform based on the experience. However, the resource scaling-out of each task produces additional cost not only from itself but also from other competitive tasks, which brings about great challenges to ensure the efficient utilization of resources. To solve this problem systematically, we consider the resource scaling-out problem as a non-cooperative game and formulate a total cost model including a risk function and a task execution time function. The total cost of resource scaling-out reflects the influence of topology structure for the benefit of a participated task. Hence, two economic classic tax-based incentive policies: Pivotal Mechanism and Externality Mechanism are applied, to stimulate the participation of tasks. We make simulations in different scenarios including node degree and different characteristics of tasks. The simulations results show that our resource scaling-out mechanism can achieve a better performance close to social optimality.
基于云的大数据平台为各种应用提供物理资源,分析各种形式的数据。对于流大数据分析来说,参与任务在输入数据急剧增加的情况下,总是需要向外扩展资源。通常,可以根据经验通过增加平台的并行度来实现资源向外扩展。然而,每个任务的资源扩展不仅会产生来自自身的额外成本,还会产生来自其他竞争任务的额外成本,这给确保资源的有效利用带来了很大的挑战。为了系统地解决这一问题,我们将资源扩展问题视为一个非合作博弈,建立了包含风险函数和任务执行时间函数的总成本模型。资源向外扩展的总成本反映了拓扑结构对参与任务效益的影响。因此,运用两种经典的税收激励政策:枢纽机制和外部性机制来刺激任务参与。我们在不同的场景下进行了仿真,包括节点度和不同的任务特征。仿真结果表明,我们的资源向外扩展机制可以获得接近社会最优的性能。
{"title":"Tax-Based Mechanisms for Resource Scaling-Out of Stream Big Data Analytics","authors":"Xiaoyuan Fu, Jingyu Wang, Q. Qi, J. Liao, Tonghong Li","doi":"10.1109/PDCAT.2017.00018","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00018","url":null,"abstract":"Cloud-based big data platforms provide physical resources for a variety of applications to analyze all forms of data. For the stream big data analytics, a participated task always needs to scale out resources when its input data increases steeply. Typically, the resource scaling out can be achieved by increasing the parallelism degree of the platform based on the experience. However, the resource scaling-out of each task produces additional cost not only from itself but also from other competitive tasks, which brings about great challenges to ensure the efficient utilization of resources. To solve this problem systematically, we consider the resource scaling-out problem as a non-cooperative game and formulate a total cost model including a risk function and a task execution time function. The total cost of resource scaling-out reflects the influence of topology structure for the benefit of a participated task. Hence, two economic classic tax-based incentive policies: Pivotal Mechanism and Externality Mechanism are applied, to stimulate the participation of tasks. We make simulations in different scenarios including node degree and different characteristics of tasks. The simulations results show that our resource scaling-out mechanism can achieve a better performance close to social optimality.","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133607308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ABPP: An Adaptive Beacon Scheme for Geographic Routing in FANET ABPP:一种用于FANET地理路由的自适应信标方案
Xianfeng Li, Junxian Huang
Flying Ad hoc Network (FANET) is a special type of Mobile Ad hoc Network (MANET) consisting of a swarm of Unmanned Aerial Vehicles (UAVs). And FANET is required to allow two or more UAVs to communicate directly or via relay UAV(s). To achieve stable communication in FANET, a routing protocol targeted to fast-moving FANET nodes is necessary. Among the existing MANET routing protocols, geographic routing protocol is a promising candidate, as routing decision is made only according to position information, and there is no need to maintain a routing table. Due to fast topology change in FANET, existing geographic routing protocols need to send beacon packets (or hello packets) frequently to maintain the correctness of routing selection. However, high beacon frequency means high overhead, which will lead to collisions with data packet and transmission delay. To overcome this problem, we propose an adaptive beacon scheme called ABPP. ABPP can adjust beacon frequency dynamically and predict the future positions of UAVs. Experimental results show that the proposed ABPP scheme can effectively decrease the beacon overhead and improve the packet delivery ratio.
飞行自组网(FANET)是一种特殊类型的移动自组网(MANET),由一群无人机(uav)组成。并且需要FANET允许两架或更多无人机直接或通过中继无人机进行通信。为了在FANET中实现稳定的通信,需要一种针对快速移动的FANET节点的路由协议。在现有的MANET路由协议中,地理路由协议是一个很有前途的候选协议,因为它只根据位置信息进行路由决策,并且不需要维护路由表。由于FANET中拓扑结构的快速变化,现有的地理路由协议需要频繁地发送信标报文(或hello报文)来保持路由选择的正确性。但是,信标频率高意味着开销高,会导致数据包的冲突和传输延迟。为了克服这个问题,我们提出了一种自适应信标方案ABPP。ABPP可以动态调整信标频率,预测无人机未来的位置。实验结果表明,所提出的ABPP方案能够有效降低信标开销,提高分组投递率。
{"title":"ABPP: An Adaptive Beacon Scheme for Geographic Routing in FANET","authors":"Xianfeng Li, Junxian Huang","doi":"10.1109/PDCAT.2017.00055","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00055","url":null,"abstract":"Flying Ad hoc Network (FANET) is a special type of Mobile Ad hoc Network (MANET) consisting of a swarm of Unmanned Aerial Vehicles (UAVs). And FANET is required to allow two or more UAVs to communicate directly or via relay UAV(s). To achieve stable communication in FANET, a routing protocol targeted to fast-moving FANET nodes is necessary. Among the existing MANET routing protocols, geographic routing protocol is a promising candidate, as routing decision is made only according to position information, and there is no need to maintain a routing table. Due to fast topology change in FANET, existing geographic routing protocols need to send beacon packets (or hello packets) frequently to maintain the correctness of routing selection. However, high beacon frequency means high overhead, which will lead to collisions with data packet and transmission delay. To overcome this problem, we propose an adaptive beacon scheme called ABPP. ABPP can adjust beacon frequency dynamically and predict the future positions of UAVs. Experimental results show that the proposed ABPP scheme can effectively decrease the beacon overhead and improve the packet delivery ratio.","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125113897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Optimization of LevelDB by Separating Key and Value 通过分离键和值来优化LevelDB
Lei Wang, G. Ding, Yulong Zhao, Dingzeyu Wu, Chengrui He
LevelDB uses the merger mechanism for data integration during the writing process. During this process, the value will move together with the key, causing a lot of unnecessary data rewriting. This paper presents a structure that the key stored separately from the value. And the value is stored in a separate file (we call it Value File), with value offset in the file and length information stored in LevelDB. Test results show that the optimized LevelDBs sequential write performance is reduced by about 40%. But random write and overwrite performances improve more than 200%. And with the increase of the number of tests records, the improvement becomes more and more obvious. The amount of rewriting data and the number of merging files, depending on the length of every different record, reduce about 80% averagely, which significantly improves the performance of the original program.
LevelDB在写入过程中使用合并机制进行数据集成。在这个过程中,值会随着键一起移动,导致大量不必要的数据重写。本文提出了一种键与值分开存储的结构。值存储在一个单独的文件中(我们称之为值文件),文件中的值偏移量和长度信息存储在LevelDB中。测试结果表明,优化后的leveldb顺序写性能降低了约40%。但是随机写入和覆盖性能提高了200%以上。并且随着检测记录数量的增加,这种改善也越来越明显。根据每条不同记录的长度,重写数据的数量和合并文件的数量平均减少了80%左右,这大大提高了原程序的性能。
{"title":"Optimization of LevelDB by Separating Key and Value","authors":"Lei Wang, G. Ding, Yulong Zhao, Dingzeyu Wu, Chengrui He","doi":"10.1109/PDCAT.2017.00074","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00074","url":null,"abstract":"LevelDB uses the merger mechanism for data integration during the writing process. During this process, the value will move together with the key, causing a lot of unnecessary data rewriting. This paper presents a structure that the key stored separately from the value. And the value is stored in a separate file (we call it Value File), with value offset in the file and length information stored in LevelDB. Test results show that the optimized LevelDBs sequential write performance is reduced by about 40%. But random write and overwrite performances improve more than 200%. And with the increase of the number of tests records, the improvement becomes more and more obvious. The amount of rewriting data and the number of merging files, depending on the length of every different record, reduce about 80% averagely, which significantly improves the performance of the original program.","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116790305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Parallel Pairwise Alignment with Pruning for Large Genomic Sequences 大基因组序列的平行配对与修剪
Xiangyuan Zhu, Bing Li, Kenli Li, Ping Shao, Yi Pan
Pairwise sequence alignment is a common and fundamental task in Computational Biology, which constitutes the basis for many Bioinformatics applications. In the post-genomic era, there is an increasing demand to align long DNA sequences to discover their functions. In this paper, we propose a parallel pairwise alignment algorithm for large genomic sequences by recursively dividing the whole genomic sequences into small pieces, with an effective pruning strategy to reduce search and computation space. We implemented rigorous tests on a 4-core computer using real genomic sequences and artificially generated sequences. The results show that our implementation can achieve speedup 10.64 with 99.75% accuracy compared to the sequential algorithm. As far as we know, this is the first time that MBP (mega base-pairs) sequences are globally aligned with an affine gap penalty.
两两序列比对是计算生物学中一项常见而基本的任务,它构成了许多生物信息学应用的基础。在后基因组时代,人们越来越需要对长DNA序列进行比对,以发现它们的功能。本文提出了一种大型基因组序列的并行配对比对算法,该算法将整个基因组序列递归划分为小片段,并采用有效的剪枝策略来减少搜索和计算空间。我们在一台4核计算机上使用真实的基因组序列和人工生成的序列进行了严格的测试。结果表明,与顺序算法相比,我们的实现可以实现10.64的加速提升,准确率达到99.75%。据我们所知,这是第一次MBP(百万碱基对)序列与仿射间隙惩罚全局对齐。
{"title":"A Parallel Pairwise Alignment with Pruning for Large Genomic Sequences","authors":"Xiangyuan Zhu, Bing Li, Kenli Li, Ping Shao, Yi Pan","doi":"10.1109/PDCAT.2017.00047","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00047","url":null,"abstract":"Pairwise sequence alignment is a common and fundamental task in Computational Biology, which constitutes the basis for many Bioinformatics applications. In the post-genomic era, there is an increasing demand to align long DNA sequences to discover their functions. In this paper, we propose a parallel pairwise alignment algorithm for large genomic sequences by recursively dividing the whole genomic sequences into small pieces, with an effective pruning strategy to reduce search and computation space. We implemented rigorous tests on a 4-core computer using real genomic sequences and artificially generated sequences. The results show that our implementation can achieve speedup 10.64 with 99.75% accuracy compared to the sequential algorithm. As far as we know, this is the first time that MBP (mega base-pairs) sequences are globally aligned with an affine gap penalty.","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129279182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical Delaunay Network for Peer-to-Peer Overlay with Address Hashing 基于地址哈希的点对点覆盖分层Delaunay网络
S. Fujita
This paper proposes a method to improve the routing performance of hierarchical Delaunay networks. Delaunay network is a network topology for peer-to-peer systems which is based on the Delaunay triangulation of point set associated with the set of peers. It has a favorable property as a topology for peer-to-peer systems such that a greedy routing scheme always delivers a given message to its destination. The key idea of the proposed method is to apply a hash function to the address of participant peers. More concretely, by applying a hash function to the coordinate point of the peers, we could realize an overlay so that the number of hops to the destination in the original network could be effectively reduced.
提出了一种提高分层Delaunay网络路由性能的方法。Delaunay网络是一种基于点集的Delaunay三角剖分的对等网络拓扑结构。作为对等系统的拓扑结构,它具有一个有利的特性,即贪婪路由方案总是将给定的消息传递到其目的地。该方法的关键思想是对参与者对等体的地址应用哈希函数。更具体地说,通过对对等体的坐标点应用哈希函数,可以实现覆盖,从而有效地减少原始网络中到达目的地的跳数。
{"title":"Hierarchical Delaunay Network for Peer-to-Peer Overlay with Address Hashing","authors":"S. Fujita","doi":"10.1109/PDCAT.2017.00057","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00057","url":null,"abstract":"This paper proposes a method to improve the routing performance of hierarchical Delaunay networks. Delaunay network is a network topology for peer-to-peer systems which is based on the Delaunay triangulation of point set associated with the set of peers. It has a favorable property as a topology for peer-to-peer systems such that a greedy routing scheme always delivers a given message to its destination. The key idea of the proposed method is to apply a hash function to the address of participant peers. More concretely, by applying a hash function to the coordinate point of the peers, we could realize an overlay so that the number of hops to the destination in the original network could be effectively reduced.","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128449544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identification of Abnormal Network Traffic Using Support Vector Machine 基于支持向量机的异常网络流量识别
Lingjing Kong, Guowei Huang, Keke Wu
Network traffic identification has been a hot topic in network security area. The identification of abnormal traffic can detect attack traffic and helps network manager enforce corresponding security policies to prevent attacks. Support Vector Machines (SVMs) are one of the most promising supervised machine learning (ML) algorithms that can be applied to the identification of traffic in IP networks as well as detection of abnormal traffic. SVM shows better performance because it can avoid local optimization problems existed in many supervised learning algorithms. However, as a binary classification approach, SVM needs more research in multiclass classification. In this paper, we proposed an abnormal traffic identification system(ATIS) that can classify and identify multiple attack traffic applications. Each component of ATIS is introduced in detail and experiments are carried out based on ATIS. Through the test of KDD CUP dataset, SVM shows good performance. Furthermore, the comparison of experiments reveals that scaling and parameters has a vital impact on SVM training results.
网络流量识别一直是网络安全领域的研究热点。通过对异常流量的识别,可以发现攻击流量,帮助网络管理员实施相应的安全策略,防止攻击的发生。支持向量机(svm)是最有前途的监督机器学习(ML)算法之一,可应用于IP网络中的流量识别以及异常流量的检测。支持向量机由于避免了许多监督学习算法中存在的局部优化问题而表现出较好的性能。然而,支持向量机作为一种二值分类方法,在多类分类方面还有待进一步研究。本文提出了一种能够对多种攻击流量进行分类识别的异常流量识别系统(ATIS)。详细介绍了ATIS的各个组成部分,并在此基础上进行了实验。通过对KDD CUP数据集的测试,支持向量机显示出良好的性能。实验对比表明,尺度和参数对SVM训练结果有重要影响。
{"title":"Identification of Abnormal Network Traffic Using Support Vector Machine","authors":"Lingjing Kong, Guowei Huang, Keke Wu","doi":"10.1109/PDCAT.2017.00054","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00054","url":null,"abstract":"Network traffic identification has been a hot topic in network security area. The identification of abnormal traffic can detect attack traffic and helps network manager enforce corresponding security policies to prevent attacks. Support Vector Machines (SVMs) are one of the most promising supervised machine learning (ML) algorithms that can be applied to the identification of traffic in IP networks as well as detection of abnormal traffic. SVM shows better performance because it can avoid local optimization problems existed in many supervised learning algorithms. However, as a binary classification approach, SVM needs more research in multiclass classification. In this paper, we proposed an abnormal traffic identification system(ATIS) that can classify and identify multiple attack traffic applications. Each component of ATIS is introduced in detail and experiments are carried out based on ATIS. Through the test of KDD CUP dataset, SVM shows good performance. Furthermore, the comparison of experiments reveals that scaling and parameters has a vital impact on SVM training results.","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133916874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Development of an Intelligent Equipment Lock Management System with RFID Technology 基于RFID技术的智能设备锁具管理系统的开发
Yeh-Cheng Chen, C. Chu, Hung-Min Sun, Jyh-haw Yeh, Ruey-Shun Chen, C. Koong
Abstract-The equipment lock has been an important tool for the power company to protect the electricity metering equipment. However, the conventional equipment lock has two potential problems: vandalism and counterfeiting. To fulfill the control and track the potential illegal behavior, the human labor and paper are required to proceed with related operations, resulting in the consumption of a large amount of human resources and maintenance costs. This study focused on the design of RFID technology applied to the traditional equipment lock, which, through the mobile and electronic technology, strengthens the management/operating convenience of the lock and provides the solutions for anti-counterfeiting and spoilage detection so that the national energy can be properly protected and fairly distributed.
设备锁已成为电力公司保护电能计量设备的重要工具。然而,传统的设备锁有两个潜在的问题:破坏和假冒。为了实现对潜在违法行为的控制和跟踪,需要人力和纸张进行相关操作,导致大量人力资源和维护成本的消耗。本研究重点设计应用于传统设备锁的RFID技术,通过移动和电子技术,加强锁具的管理/操作便利性,为防伪、防损检测提供解决方案,使国家能源得到妥善保护和公平分配。
{"title":"Development of an Intelligent Equipment Lock Management System with RFID Technology","authors":"Yeh-Cheng Chen, C. Chu, Hung-Min Sun, Jyh-haw Yeh, Ruey-Shun Chen, C. Koong","doi":"10.1109/PDCAT.2017.00015","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00015","url":null,"abstract":"Abstract-The equipment lock has been an important tool for the power company to protect the electricity metering equipment. However, the conventional equipment lock has two potential problems: vandalism and counterfeiting. To fulfill the control and track the potential illegal behavior, the human labor and paper are required to proceed with related operations, resulting in the consumption of a large amount of human resources and maintenance costs. This study focused on the design of RFID technology applied to the traditional equipment lock, which, through the mobile and electronic technology, strengthens the management/operating convenience of the lock and provides the solutions for anti-counterfeiting and spoilage detection so that the national energy can be properly protected and fairly distributed.","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124053128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Profit-Aware Workload Management for Geo-Distributed Data Centers 地理分布数据中心的利润感知工作负载管理
Yongqiang Gao, Hengchao Wei
With the rising demand on internet online services, more and more individuals and organizations migrate their data and services from local to geographically distributed internet data centers for reliability, management, and cost benefits. From internet data center operators’ perspective, profit is one of the most significant factors which are to be taken into account and it is mainly determined by the quality of service and the electricity cost. In this work, we jointly take the diversity of time-varying electricity prices, the quality of service and the power usage effectiveness of data centers into consideration and propose a profit optimization framework that includes three important decisions: requests dispatching, the number of active servers and frequency adjustment. An efficient heuristic algorithm is then developed to provide internet data center operators with the advice on these decisions to achieve profit maximization for geographically distributed data centers. Through extensive trace-driven simulations, we demonstrate the effectiveness and superiority of our solution.
随着互联网在线服务需求的不断增长,越来越多的个人和组织将他们的数据和服务从本地迁移到地理分布的互联网数据中心,以提高可靠性、管理和成本效益。从互联网数据中心运营商的角度来看,利润是最需要考虑的因素之一,主要由服务质量和电力成本决定。在这项工作中,我们共同考虑了时变电价的多样性、服务质量和数据中心的电力使用效率,并提出了一个利润优化框架,其中包括三个重要决策:请求调度、活动服务器数量和频率调整。然后开发了一种有效的启发式算法,为互联网数据中心运营商提供有关这些决策的建议,以实现地理分布数据中心的利润最大化。通过大量的跟踪驱动仿真,我们证明了我们的解决方案的有效性和优越性。
{"title":"Profit-Aware Workload Management for Geo-Distributed Data Centers","authors":"Yongqiang Gao, Hengchao Wei","doi":"10.1109/PDCAT.2017.00019","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00019","url":null,"abstract":"With the rising demand on internet online services, more and more individuals and organizations migrate their data and services from local to geographically distributed internet data centers for reliability, management, and cost benefits. From internet data center operators’ perspective, profit is one of the most significant factors which are to be taken into account and it is mainly determined by the quality of service and the electricity cost. In this work, we jointly take the diversity of time-varying electricity prices, the quality of service and the power usage effectiveness of data centers into consideration and propose a profit optimization framework that includes three important decisions: requests dispatching, the number of active servers and frequency adjustment. An efficient heuristic algorithm is then developed to provide internet data center operators with the advice on these decisions to achieve profit maximization for geographically distributed data centers. Through extensive trace-driven simulations, we demonstrate the effectiveness and superiority of our solution.","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122243812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1