首页 > 最新文献

2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC)最新文献

英文 中文
Integrating Quantum Computing into Workflow Modeling and Execution 将量子计算集成到工作流建模和执行中
Pub Date : 2020-12-01 DOI: 10.1109/UCC48980.2020.00046
Benjamin Weder, Uwe Breitenbücher, F. Leymann, Karoline Wild
Quantum computing has the potential to significantly impact many application domains, as several quantum algorithms are promising to solve problems more efficiently than possible on classical computers. However, various complex pre- and post-processing tasks have to be performed when executing a quantum circuit, which require immense mathematical and technical knowledge. For example, calculations on today’s quantum computers are noisy and require an error mitigation task after the execution. Hence, integrating classical applications with quantum circuits is a difficult challenge. In this paper, we introduce a modeling extension for imperative workflow languages to enable the integration of quantum computations and ease the orchestration of classical applications and quantum circuits. Further, we show how the extension can be mapped to native modeling constructs of extended workflow languages to retain the portability of the workflows. We validate the practical feasibility of our approach by applying our proposed extension to BPMN and introduce Quantum4BPMN.
量子计算有可能对许多应用领域产生重大影响,因为一些量子算法有望比传统计算机更有效地解决问题。然而,在执行量子电路时,必须执行各种复杂的预处理和后处理任务,这需要大量的数学和技术知识。例如,今天的量子计算机上的计算是嘈杂的,并且在执行后需要一个错误缓解任务。因此,将经典应用与量子电路集成是一项艰巨的挑战。在本文中,我们引入了一种命令式工作流语言的建模扩展,以实现量子计算的集成,并简化经典应用和量子电路的编排。此外,我们还展示了如何将扩展映射到扩展工作流语言的本地建模构造,以保持工作流的可移植性。我们通过将我们提出的扩展应用于BPMN并引入Quantum4BPMN来验证我们方法的实际可行性。
{"title":"Integrating Quantum Computing into Workflow Modeling and Execution","authors":"Benjamin Weder, Uwe Breitenbücher, F. Leymann, Karoline Wild","doi":"10.1109/UCC48980.2020.00046","DOIUrl":"https://doi.org/10.1109/UCC48980.2020.00046","url":null,"abstract":"Quantum computing has the potential to significantly impact many application domains, as several quantum algorithms are promising to solve problems more efficiently than possible on classical computers. However, various complex pre- and post-processing tasks have to be performed when executing a quantum circuit, which require immense mathematical and technical knowledge. For example, calculations on today’s quantum computers are noisy and require an error mitigation task after the execution. Hence, integrating classical applications with quantum circuits is a difficult challenge. In this paper, we introduce a modeling extension for imperative workflow languages to enable the integration of quantum computations and ease the orchestration of classical applications and quantum circuits. Further, we show how the extension can be mapped to native modeling constructs of extended workflow languages to retain the portability of the workflows. We validate the practical feasibility of our approach by applying our proposed extension to BPMN and introduce Quantum4BPMN.","PeriodicalId":125849,"journal":{"name":"2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130953306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
HoloScale: horizontal and vertical scaling of cloud resources HoloScale:云资源的水平和垂直缩放
Pub Date : 2020-12-01 DOI: 10.1109/UCC48980.2020.00038
Victor Millnert, Johan Eker
Elastic and scalable compute resources are a fundamental part of cloud computing. Efficient management of cloud resources is crucial in order to provide high quality services and applications. In this work we present a novel method for scaling cloud resources and provide stability guarantees. We do this by leveraging ideas and concepts from classic control theory, namely mid-range control and combine horizontal scaling and vertical scaling in a novel way. Horizontal scaling is typically when one adds/removes whole unites of resources (e.g., virtual machines or containers), while vertical scaling is when one grows/shrinks already allocated resources (e.g., making a deployed virtual machine larger/smaller). Each methods has their own trade-offs: i) horizontal scaling is often slow and coarse-grained, but can scale over a large range, and ii) vertical scaling is often quick and smooth, but has limited range.The proposed algorithm is called HoloScale, which leverages the strengths of both scaling mechanisms, without the drawbacks. The method is capable of scaling smoothly, quickly, and over a large range. By using core concepts from control theory, we show that systems managed by the HoloScale algorithm are stable in the presence of time-varying scaling delays.
弹性和可伸缩的计算资源是云计算的基本组成部分。为了提供高质量的服务和应用程序,对云资源的有效管理至关重要。在这项工作中,我们提出了一种新的方法来扩展云资源并提供稳定性保证。我们利用了经典控制理论的思想和概念,即中程控制,并以一种新颖的方式将水平缩放和垂直缩放结合起来。水平扩展通常是指添加/删除整个资源单元(例如,虚拟机或容器),而垂直扩展是指增加/缩小已经分配的资源(例如,使已部署的虚拟机更大/更小)。每种方法都有自己的优缺点:1)水平扩展通常是缓慢和粗粒度的,但可以扩展到很大的范围;2)垂直扩展通常是快速和平滑的,但范围有限。提出的算法被称为HoloScale,它利用了两种缩放机制的优点,而没有缺点。该方法具有平滑、快速、范围大的特点。通过使用控制理论的核心概念,我们证明了HoloScale算法管理的系统在存在时变尺度延迟时是稳定的。
{"title":"HoloScale: horizontal and vertical scaling of cloud resources","authors":"Victor Millnert, Johan Eker","doi":"10.1109/UCC48980.2020.00038","DOIUrl":"https://doi.org/10.1109/UCC48980.2020.00038","url":null,"abstract":"Elastic and scalable compute resources are a fundamental part of cloud computing. Efficient management of cloud resources is crucial in order to provide high quality services and applications. In this work we present a novel method for scaling cloud resources and provide stability guarantees. We do this by leveraging ideas and concepts from classic control theory, namely mid-range control and combine horizontal scaling and vertical scaling in a novel way. Horizontal scaling is typically when one adds/removes whole unites of resources (e.g., virtual machines or containers), while vertical scaling is when one grows/shrinks already allocated resources (e.g., making a deployed virtual machine larger/smaller). Each methods has their own trade-offs: i) horizontal scaling is often slow and coarse-grained, but can scale over a large range, and ii) vertical scaling is often quick and smooth, but has limited range.The proposed algorithm is called HoloScale, which leverages the strengths of both scaling mechanisms, without the drawbacks. The method is capable of scaling smoothly, quickly, and over a large range. By using core concepts from control theory, we show that systems managed by the HoloScale algorithm are stable in the presence of time-varying scaling delays.","PeriodicalId":125849,"journal":{"name":"2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129312626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Gingivitis detection by Fractional Fourier Entropy and Biogeography-based Optimization 基于分数傅里叶熵和生物地理优化的牙龈炎检测
Pub Date : 2020-12-01 DOI: 10.1109/UCC48980.2020.00051
Y. Yan
As people keep a watch eye on the oral health, more people choose to go to professional dental hospitals for the regular dental examinations and diagnosis. It is well known that the dental diagnosis and treatment require excellent nursing skills and extensive experience by the dentists. Nervously, the number of experts is limited. However, the rapid increase in the number of diagnoses and the small number of professional dentists resulted in an increase in the daily diagnostic frequency of dentists, and the overworked working hours seriously affected the energy and diagnostic efficiency of dentists. This study for the sake of reduce the burden of dental diagnosis, proposes a computer-aided diagnosis method. This method classifies gingivitis images by using the image feature extraction method of fractional Fourier entropy (FRFE) and biogeography-based optimization (BBO) algorithm. The FRFE coefficient extracted from the image was used as the input feature vector, and the classification was carried out by the BBO algorithm with the optimal scheme of automatic screening. After 10-fold cross-validation, more effective healthy and pathological gingival image classification results were obtained compared with the latest methods.
随着人们对口腔健康的关注,越来越多的人选择去专业的牙科医院进行定期的牙科检查和诊断。众所周知,牙科诊断和治疗需要牙医出色的护理技巧和丰富的经验。令人不安的是,专家的数量有限。然而,诊断量的快速增长和专业牙医数量的稀少导致牙医的日常诊断频率增加,工作时间过长严重影响了牙医的精力和诊断效率。本研究从减轻牙科诊断负担的角度出发,提出了一种计算机辅助诊断方法。该方法采用分数傅里叶熵(FRFE)图像特征提取方法和基于生物地理的优化(BBO)算法对牙龈炎图像进行分类。从图像中提取的FRFE系数作为输入特征向量,采用BBO算法以自动筛选的最优方案进行分类。经过10倍交叉验证,获得了比最新方法更有效的健康和病理牙龈图像分类结果。
{"title":"Gingivitis detection by Fractional Fourier Entropy and Biogeography-based Optimization","authors":"Y. Yan","doi":"10.1109/UCC48980.2020.00051","DOIUrl":"https://doi.org/10.1109/UCC48980.2020.00051","url":null,"abstract":"As people keep a watch eye on the oral health, more people choose to go to professional dental hospitals for the regular dental examinations and diagnosis. It is well known that the dental diagnosis and treatment require excellent nursing skills and extensive experience by the dentists. Nervously, the number of experts is limited. However, the rapid increase in the number of diagnoses and the small number of professional dentists resulted in an increase in the daily diagnostic frequency of dentists, and the overworked working hours seriously affected the energy and diagnostic efficiency of dentists. This study for the sake of reduce the burden of dental diagnosis, proposes a computer-aided diagnosis method. This method classifies gingivitis images by using the image feature extraction method of fractional Fourier entropy (FRFE) and biogeography-based optimization (BBO) algorithm. The FRFE coefficient extracted from the image was used as the input feature vector, and the classification was carried out by the BBO algorithm with the optimal scheme of automatic screening. After 10-fold cross-validation, more effective healthy and pathological gingival image classification results were obtained compared with the latest methods.","PeriodicalId":125849,"journal":{"name":"2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125139067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
JADE: Tail-Latency-SLO-Aware Job Scheduling for Sensing-as-a-Service 面向传感即服务的尾延迟慢感知作业调度
Pub Date : 2020-12-01 DOI: 10.1109/UCC48980.2020.00058
Stoddard Rosenkrantz, Huiyang Li, Prathyusha Enganti, Zhongwei Li, Lin Sun, Zhijun Wang, Hao Che, Hong Jiang
As the IoT-Edge-Cloud hierarchy is evolving into a mature ecosystem, large-scale Sensing-as-a-Service (SaS) based services with stringent job service level objectives (SLOs) are expected to emerge as dominant cloud services. A viable business model for SaS must be inherently multi-tier by design and work in a confederated environment involving a large number of voluntary stakeholders who may appear at different tiers. It must also honor privacy and autonomous control of stakeholder resources. This calls for a fully distributed, SLO-aware job resource allocation and scheduling platform to be developed. In this paper, we propose a tail-latency-SLO-aware job resource allocation and scheduling platform for SaS, called JADE. It is a four-tier platform, i.e., cloud, edge cluster, edge, and IoT tiers. To honor the privacy and autonomy of control for individual stakeholders at different tiers, the JADE design follows the design principle of separation of concerns among tiers. Central to its design is to develop a decomposition technique that decomposes SaS service requirements, in particular, the job tail-latency SLO, into task performance budgets for individual sensing tasks mapped to each lower tier. This makes it possible to allow each lower tier to manage its own resources autonomously to meet the sensing task budgets and hence the SaS service requirements, while preserving its privacy and autonomy of control. Finally, preliminary testing results based on both simulation and an initial prototype of JADE are presented to demonstrate the promising prospects of the solution.
随着物联网边缘云层次结构发展成为一个成熟的生态系统,具有严格的作业服务水平目标(slo)的大规模基于感知即服务(SaS)的服务预计将成为主导云服务。一个可行的sa业务模型在设计上必须本质上是多层的,并且在涉及大量可能出现在不同层的自愿涉众的联合环境中工作。它还必须尊重隐私和利益相关者资源的自主控制。这就需要开发一个完全分布式的、慢速感知的作业资源分配和调度平台。在本文中,我们提出了一个尾延迟-慢速感知的sa作业资源分配和调度平台,称为JADE。它是一个四层平台,即云、边缘集群、边缘和物联网层。为了尊重不同层的个体利益相关者的隐私和控制自主权,JADE设计遵循层间关注点分离的设计原则。其设计的核心是开发一种分解技术,将sa服务需求(特别是作业尾部延迟SLO)分解为映射到每个较低层的单个感知任务的任务性能预算。这使得允许每个较低的层自主管理自己的资源,以满足感知任务预算,从而满足sa服务需求,同时保留其隐私和控制自主权成为可能。最后,给出了基于仿真和JADE初始原型的初步测试结果,证明了该解决方案的良好前景。
{"title":"JADE: Tail-Latency-SLO-Aware Job Scheduling for Sensing-as-a-Service","authors":"Stoddard Rosenkrantz, Huiyang Li, Prathyusha Enganti, Zhongwei Li, Lin Sun, Zhijun Wang, Hao Che, Hong Jiang","doi":"10.1109/UCC48980.2020.00058","DOIUrl":"https://doi.org/10.1109/UCC48980.2020.00058","url":null,"abstract":"As the IoT-Edge-Cloud hierarchy is evolving into a mature ecosystem, large-scale Sensing-as-a-Service (SaS) based services with stringent job service level objectives (SLOs) are expected to emerge as dominant cloud services. A viable business model for SaS must be inherently multi-tier by design and work in a confederated environment involving a large number of voluntary stakeholders who may appear at different tiers. It must also honor privacy and autonomous control of stakeholder resources. This calls for a fully distributed, SLO-aware job resource allocation and scheduling platform to be developed. In this paper, we propose a tail-latency-SLO-aware job resource allocation and scheduling platform for SaS, called JADE. It is a four-tier platform, i.e., cloud, edge cluster, edge, and IoT tiers. To honor the privacy and autonomy of control for individual stakeholders at different tiers, the JADE design follows the design principle of separation of concerns among tiers. Central to its design is to develop a decomposition technique that decomposes SaS service requirements, in particular, the job tail-latency SLO, into task performance budgets for individual sensing tasks mapped to each lower tier. This makes it possible to allow each lower tier to manage its own resources autonomously to meet the sensing task budgets and hence the SaS service requirements, while preserving its privacy and autonomy of control. Finally, preliminary testing results based on both simulation and an initial prototype of JADE are presented to demonstrate the promising prospects of the solution.","PeriodicalId":125849,"journal":{"name":"2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127183024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Accuracy Analysis on 360° Virtual Reality Video Quality Assessment Methods 360°虚拟现实视频质量评估方法的准确性分析
Pub Date : 2020-12-01 DOI: 10.1109/UCC48980.2020.00065
Yi Han, Chenxi Yu, Dongdong Li, Jie Zhang, Yunqiao Lai
Due to the rapid development of telecommunication technology, the application of 360° video is increasingly gaining attention. For the design of the 360° video transmission mechanism, quality of experience (QoE) from the customer’s perspective is very important. This study can help the readers to understand advantages/limitations of different 360° video quality assessment methods and be able to make suitable choices for various systems. To make it clearer, this paper performs experiments with two steps. Experiment I compares different assessment methods for evaluating 360° video quality selected from online and offline methods, respectively. Experiment II studies the performance of these assessment methods on different video quality levels. The results show that both offline and online test results have a relatively good correlation with the subjective test results. This paper statistically evaluates and compares the accuracy of different 360° video QoE assessment methods and the conclusion drawn from this paper can be used as a guideline when designing adaptive 360° video streaming systems and can also be applied to cloud computing in the future work.
随着通信技术的飞速发展,360°视频的应用越来越受到重视。对于360°视频传输机制的设计,从客户角度出发的体验质量(QoE)是非常重要的。本研究可以帮助读者了解不同360°视频质量评估方法的优点/局限性,并能够针对不同的系统做出合适的选择。为了更清晰,本文分两步进行实验。实验一比较了360°视频质量的不同评价方法,分别从线上和线下两种方法中选择。实验二研究了这些评估方法在不同视频质量水平下的性能。结果表明,无论是线上还是线下测试结果,都与主观测试结果有较好的相关性。本文对不同360°视频QoE评估方法的准确性进行了统计评估和比较,得出的结论可以作为自适应360°视频流系统设计的指导,也可以在未来的工作中应用于云计算。
{"title":"Accuracy Analysis on 360° Virtual Reality Video Quality Assessment Methods","authors":"Yi Han, Chenxi Yu, Dongdong Li, Jie Zhang, Yunqiao Lai","doi":"10.1109/UCC48980.2020.00065","DOIUrl":"https://doi.org/10.1109/UCC48980.2020.00065","url":null,"abstract":"Due to the rapid development of telecommunication technology, the application of 360° video is increasingly gaining attention. For the design of the 360° video transmission mechanism, quality of experience (QoE) from the customer’s perspective is very important. This study can help the readers to understand advantages/limitations of different 360° video quality assessment methods and be able to make suitable choices for various systems. To make it clearer, this paper performs experiments with two steps. Experiment I compares different assessment methods for evaluating 360° video quality selected from online and offline methods, respectively. Experiment II studies the performance of these assessment methods on different video quality levels. The results show that both offline and online test results have a relatively good correlation with the subjective test results. This paper statistically evaluates and compares the accuracy of different 360° video QoE assessment methods and the conclusion drawn from this paper can be used as a guideline when designing adaptive 360° video streaming systems and can also be applied to cloud computing in the future work.","PeriodicalId":125849,"journal":{"name":"2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129780562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
[Copyright notice] (版权)
Pub Date : 2020-12-01 DOI: 10.1109/ucc48980.2020.00003
{"title":"[Copyright notice]","authors":"","doi":"10.1109/ucc48980.2020.00003","DOIUrl":"https://doi.org/10.1109/ucc48980.2020.00003","url":null,"abstract":"","PeriodicalId":125849,"journal":{"name":"2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC)","volume":"4 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124332815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Feasibility Study of Cache in Smart Edge Router for Web-Access Accelerator 基于web访问加速器的智能边缘路由器缓存可行性研究
Pub Date : 2020-12-01 DOI: 10.1109/UCC48980.2020.00057
Krittin Intharawijitr, P. Harvey, Pierre Imai
Regardless of the setting, edge computing has drawn much attention from both the academic and industrial communities. For edge computing, content delivery networks are both a concrete and production deployable use case. While viable at the WAN or telco edge scale, it is unclear if this extends to others, such as in home WiFi routers, as has been assumed by some.In this work-in-progress, we present an initial study on the viability of using smart edge WiFi routers as a caching location. We describe the simulator we created to test this, as well as the analysis of the results obtained. We use 1 day of e-commerce web log traffic from a public data set, as well as a sampled subset of our own site - part of an ecosystem of over 111 million users. We show that in the best case scenario, smart edge routers are inappropriate for e-commerce web caching.
无论背景如何,边缘计算都引起了学术界和工业界的广泛关注。对于边缘计算,内容交付网络既是具体的,也是可部署的用例。虽然在广域网或电信边缘规模上是可行的,但目前尚不清楚这是否会扩展到其他领域,比如一些人认为的家用WiFi路由器。在这项正在进行的工作中,我们对使用智能边缘WiFi路由器作为缓存位置的可行性进行了初步研究。我们描述了为测试这一点而创建的模拟器,以及对所获得结果的分析。我们使用来自公共数据集的1天电子商务网站日志流量,以及我们自己网站的样本子集-超过1.11亿用户的生态系统的一部分。我们表明,在最好的情况下,智能边缘路由器不适合用于电子商务web缓存。
{"title":"A Feasibility Study of Cache in Smart Edge Router for Web-Access Accelerator","authors":"Krittin Intharawijitr, P. Harvey, Pierre Imai","doi":"10.1109/UCC48980.2020.00057","DOIUrl":"https://doi.org/10.1109/UCC48980.2020.00057","url":null,"abstract":"Regardless of the setting, edge computing has drawn much attention from both the academic and industrial communities. For edge computing, content delivery networks are both a concrete and production deployable use case. While viable at the WAN or telco edge scale, it is unclear if this extends to others, such as in home WiFi routers, as has been assumed by some.In this work-in-progress, we present an initial study on the viability of using smart edge WiFi routers as a caching location. We describe the simulator we created to test this, as well as the analysis of the results obtained. We use 1 day of e-commerce web log traffic from a public data set, as well as a sampled subset of our own site - part of an ecosystem of over 111 million users. We show that in the best case scenario, smart edge routers are inappropriate for e-commerce web caching.","PeriodicalId":125849,"journal":{"name":"2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122851416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Resampling for Fraud Detection During Anonymised Credit Card Transactions with Unbalanced Datasets 基于非平衡数据集的信用卡匿名交易欺诈检测的高效重采样
Pub Date : 2020-12-01 DOI: 10.1109/UCC48980.2020.00067
Petr Mrozek, John Panneerselvam, O. Bagdasar
The rapid growth of e-commerce and online shopping have resulted in an unprecedented increase in the amount of money that is annually lost to credit card fraudsters. In an attempt to address credit card fraud, researchers are leveraging the application of various machine learning techniques for efficiently detecting and preventing fraudulent credit card transactions. One of the prevalent common issues around the analytics of credit card transactions is the highly unbalanced nature of the datasets, which is frequently associated with the binary classification problems. This paper intends to review, analyse and implement a selection of notable machine learning algorithms such as Logistic Regression, Random Forest, K-Nearest Neighbours and Stochastic Gradient Descent, with the motivation of empirically evaluating their efficiencies in handling unbalanced datasets whilst detecting credit card fraud transactions. A publicly available dataset comprising 284807 transactions of European cardholders is analysed and trained with the studied machine learning techniques to detect fraudulent transactions. Furthermore, this paper also evaluates the incorporation of two notable resampling methods, namely Random Under-sampling and Synthetic Majority Oversampling Techniques (SMOTE) in the aforementioned algorithms, in order to analyse their efficiency in handling unbalanced datasets. The proposed resampling methods significantly increased the detection ability, the most successful technique of combination of Random Forest with Random Under-sampling achieved the recall score of 100% in contrast to the recall score 77% of model without resampling technique. The key contribution of this paper is the postulation of efficient machine learning algorithms together with suitable resampling methods, suitable for credit card fraud detection with unbalanced dataset.
电子商务和网上购物的快速发展导致信用卡诈骗者每年损失的金额空前增加。为了解决信用卡欺诈问题,研究人员正在利用各种机器学习技术的应用来有效地检测和防止欺诈性信用卡交易。信用卡交易分析的一个普遍问题是数据集的高度不平衡,这通常与二元分类问题有关。本文旨在回顾、分析和实现一系列著名的机器学习算法,如逻辑回归、随机森林、k近邻和随机梯度下降,其动机是在检测信用卡欺诈交易的同时,通过经验评估它们在处理不平衡数据集方面的效率。一个公开可用的数据集包括284807笔欧洲持卡人的交易,并使用研究的机器学习技术进行分析和训练,以检测欺诈交易。此外,本文还评估了上述算法中两种著名的重采样方法,即随机欠采样和合成多数过采样技术(SMOTE),以分析它们在处理不平衡数据集方面的效率。提出的重采样方法显著提高了检测能力,其中随机森林与随机欠采样相结合的方法最成功,召回率达到100%,而没有重采样的模型召回率为77%。本文的关键贡献是假设了有效的机器学习算法以及合适的重采样方法,适用于不平衡数据集的信用卡欺诈检测。
{"title":"Efficient Resampling for Fraud Detection During Anonymised Credit Card Transactions with Unbalanced Datasets","authors":"Petr Mrozek, John Panneerselvam, O. Bagdasar","doi":"10.1109/UCC48980.2020.00067","DOIUrl":"https://doi.org/10.1109/UCC48980.2020.00067","url":null,"abstract":"The rapid growth of e-commerce and online shopping have resulted in an unprecedented increase in the amount of money that is annually lost to credit card fraudsters. In an attempt to address credit card fraud, researchers are leveraging the application of various machine learning techniques for efficiently detecting and preventing fraudulent credit card transactions. One of the prevalent common issues around the analytics of credit card transactions is the highly unbalanced nature of the datasets, which is frequently associated with the binary classification problems. This paper intends to review, analyse and implement a selection of notable machine learning algorithms such as Logistic Regression, Random Forest, K-Nearest Neighbours and Stochastic Gradient Descent, with the motivation of empirically evaluating their efficiencies in handling unbalanced datasets whilst detecting credit card fraud transactions. A publicly available dataset comprising 284807 transactions of European cardholders is analysed and trained with the studied machine learning techniques to detect fraudulent transactions. Furthermore, this paper also evaluates the incorporation of two notable resampling methods, namely Random Under-sampling and Synthetic Majority Oversampling Techniques (SMOTE) in the aforementioned algorithms, in order to analyse their efficiency in handling unbalanced datasets. The proposed resampling methods significantly increased the detection ability, the most successful technique of combination of Random Forest with Random Under-sampling achieved the recall score of 100% in contrast to the recall score 77% of model without resampling technique. The key contribution of this paper is the postulation of efficient machine learning algorithms together with suitable resampling methods, suitable for credit card fraud detection with unbalanced dataset.","PeriodicalId":125849,"journal":{"name":"2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117085813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Neural network pruning and hardware acceleration 神经网络修剪和硬件加速
Pub Date : 2020-12-01 DOI: 10.1109/UCC48980.2020.00069
Taehee Jeong, Ehsam Ghasemi, Jorn Tuyls, Elliott Delaye, Ashish Sirasao
Neural network pruning is a critical technique to efficiently deploy neural network models on edge devices with limited computing resources. Although many neural network pruning methods have been published, it is difficult to implement such algorithms due to their inherent complexity. In this work, we propose a functional pruning tool for neural network models. Our pruning procedure is simple and easy to be implemented, and efficient for deployment. Our pruning tool automatically detects redundancy inside neural network models and prunes the redundant channels. Doing so reduces the total number of model parameters and hence, compresses the size of the model. This approach significantly reduces the number of FLOPs needed for executing the neural network model and improves the inference runtime. To further improve the inference runtime of the pruned model, we leveraged Apache TVM to deploy the pruned model on the DPU FPGA-based hardware accelerator. To demonstrate our approach, we pruned the VGG-16 model on Flower dataset and reached 53-fold reduction in model size with only 7% drop in validation accuracy. The inference latency is reduced 4-fold on CPU and 16-fold on FPGA for the pruned models, compared with the latency of the base model on CPU.
神经网络剪枝是在计算资源有限的边缘设备上高效部署神经网络模型的关键技术。虽然已经发表了许多神经网络修剪方法,但由于其固有的复杂性,这些算法难以实现。在这项工作中,我们提出了一个神经网络模型的功能修剪工具。我们的修剪程序简单易行,部署效率高。我们的修剪工具自动检测神经网络模型中的冗余,并修剪冗余通道。这样做可以减少模型参数的总数,从而压缩模型的大小。这种方法大大减少了执行神经网络模型所需的flop数量,并改善了推理运行时。为了进一步改进修剪模型的推理运行时,我们利用Apache TVM在基于DPU fpga的硬件加速器上部署修剪模型。为了证明我们的方法,我们在Flower数据集上修剪了VGG-16模型,模型大小减少了53倍,验证精度仅下降了7%。与基本模型在CPU上的延迟相比,经过修剪的模型在CPU上的延迟减少了4倍,在FPGA上的延迟减少了16倍。
{"title":"Neural network pruning and hardware acceleration","authors":"Taehee Jeong, Ehsam Ghasemi, Jorn Tuyls, Elliott Delaye, Ashish Sirasao","doi":"10.1109/UCC48980.2020.00069","DOIUrl":"https://doi.org/10.1109/UCC48980.2020.00069","url":null,"abstract":"Neural network pruning is a critical technique to efficiently deploy neural network models on edge devices with limited computing resources. Although many neural network pruning methods have been published, it is difficult to implement such algorithms due to their inherent complexity. In this work, we propose a functional pruning tool for neural network models. Our pruning procedure is simple and easy to be implemented, and efficient for deployment. Our pruning tool automatically detects redundancy inside neural network models and prunes the redundant channels. Doing so reduces the total number of model parameters and hence, compresses the size of the model. This approach significantly reduces the number of FLOPs needed for executing the neural network model and improves the inference runtime. To further improve the inference runtime of the pruned model, we leveraged Apache TVM to deploy the pruned model on the DPU FPGA-based hardware accelerator. To demonstrate our approach, we pruned the VGG-16 model on Flower dataset and reached 53-fold reduction in model size with only 7% drop in validation accuracy. The inference latency is reduced 4-fold on CPU and 16-fold on FPGA for the pruned models, compared with the latency of the base model on CPU.","PeriodicalId":125849,"journal":{"name":"2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123964139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Approach for Preventing and Detecting Attacks in the Cloud 一种预防和检测云攻击的方法
Pub Date : 2020-12-01 DOI: 10.1109/UCC48980.2020.00035
Louis-Henri Merino, M. Cukier
Preventing and detecting attacks in the cloud are difficult tasks involving technical, financial, and legal challenges. Baseline security solutions from cloud providers are often inadequate to secure cloud instances properly. In addition, entry-level cloud instances offer few resources, as little as 512MB of RAM, and particular actions are either costly or limited by cloud providers, hindering the operation of commercial security solutions, such as antivirus software, and intrusion detection and prevention (IDP) systems. State-of-the-art research IDP systems have made great progress using machine and deep learning but they encounter certain limitations when operating in the cloud. We introduce Xshield, a lightweight IDP framework designed for the cloud, that consists of a limited number of Producers constantly gathering malicious information, analyzing it through one or more arbitrary intrusion detection and/or prevention strategies and passing the processed information along to Consumers, an IDP agent on cloud customers’ instances. We implement and evaluate a Producer prototype by deploying 138 Producers on a cloud provider across 15 regions for seven days and use the collected information to demonstrate how a limited number but strategically placed Producers are capable of protecting cloud customers’ instances as well as present insights on attacker behavior in the cloud. We then discuss, based on attacker behavior insights, what kind of existing IDP strategies can be adapted to operate on Producers.
预防和检测云中的攻击是一项涉及技术、财务和法律挑战的艰巨任务。云提供商提供的基线安全解决方案通常不足以正确保护云实例。此外,入门级云实例提供的资源很少,只有512MB的RAM,而且特定操作要么成本高昂,要么受到云提供商的限制,这阻碍了商业安全解决方案(如防病毒软件和入侵检测和防御(IDP)系统)的运行。最先进的研究IDP系统在使用机器和深度学习方面取得了很大进展,但在云中运行时遇到了一定的限制。我们介绍了Xshield,一个为云设计的轻量级IDP框架,它由有限数量的生产者不断收集恶意信息,通过一个或多个任意入侵检测和/或预防策略进行分析,并将处理后的信息传递给消费者,即云客户实例上的IDP代理。我们通过在15个地区的云提供商上部署138个生产者来实施和评估生产者原型,并使用收集到的信息来展示数量有限但具有战略意义的生产者如何能够保护云客户的实例,并提供对云中的攻击者行为的见解。然后,根据攻击者行为的见解,我们讨论了可以在生产者上操作的现有IDP策略类型。
{"title":"An Approach for Preventing and Detecting Attacks in the Cloud","authors":"Louis-Henri Merino, M. Cukier","doi":"10.1109/UCC48980.2020.00035","DOIUrl":"https://doi.org/10.1109/UCC48980.2020.00035","url":null,"abstract":"Preventing and detecting attacks in the cloud are difficult tasks involving technical, financial, and legal challenges. Baseline security solutions from cloud providers are often inadequate to secure cloud instances properly. In addition, entry-level cloud instances offer few resources, as little as 512MB of RAM, and particular actions are either costly or limited by cloud providers, hindering the operation of commercial security solutions, such as antivirus software, and intrusion detection and prevention (IDP) systems. State-of-the-art research IDP systems have made great progress using machine and deep learning but they encounter certain limitations when operating in the cloud. We introduce Xshield, a lightweight IDP framework designed for the cloud, that consists of a limited number of Producers constantly gathering malicious information, analyzing it through one or more arbitrary intrusion detection and/or prevention strategies and passing the processed information along to Consumers, an IDP agent on cloud customers’ instances. We implement and evaluate a Producer prototype by deploying 138 Producers on a cloud provider across 15 regions for seven days and use the collected information to demonstrate how a limited number but strategically placed Producers are capable of protecting cloud customers’ instances as well as present insights on attacker behavior in the cloud. We then discuss, based on attacker behavior insights, what kind of existing IDP strategies can be adapted to operate on Producers.","PeriodicalId":125849,"journal":{"name":"2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129637887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1