Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423319
M. Tayel, A. Gamal, H. Shawky
Steganography is the art of science dealing with hiding secret data inside image, audio, video or text files. In audio steganography; secret message is embedded in the digital sound by slightly altering the binary sequence of the sound file. Existing audio steganography software deal with WAV, AU, and even MP3 sound files. Embedding secret messages in the digital sound is usually a more difficult process than embedding messages in other forms, such as digital images. Audio steganography uses different algorithms, but (LSB) least significant bit is applied in this paper. The quality of sound is depended on the size of the audio which the user selects and length of the message.
{"title":"A proposed implementation method of an audio steganography technique","authors":"M. Tayel, A. Gamal, H. Shawky","doi":"10.1109/ICACT.2016.7423319","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423319","url":null,"abstract":"Steganography is the art of science dealing with hiding secret data inside image, audio, video or text files. In audio steganography; secret message is embedded in the digital sound by slightly altering the binary sequence of the sound file. Existing audio steganography software deal with WAV, AU, and even MP3 sound files. Embedding secret messages in the digital sound is usually a more difficult process than embedding messages in other forms, such as digital images. Audio steganography uses different algorithms, but (LSB) least significant bit is applied in this paper. The quality of sound is depended on the size of the audio which the user selects and length of the message.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129899733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423406
S. Kao, Yung-Sheng Lee, Yung-Chiao Chen, Jiann-Liang Chen, Kai Yang
With the rapid development of wireless communication technology and mobile devices, network traffic on smart mobile devices has increased gradually. VoIP is a well-known and mature technology and communication anywhere is emerging as an important application that requires an entirely different way of thinking about communications. In practice VoIP system one kind of issue that vitally impacts the communication is known as service unavailable when loss of Internet connection. In this study we propose a VoIP system architecture that involves the implementation of SIP server and client on a smart mobile device. Every user can play the roles of both SIP server and client, and users can form a self-organized group in Wireless Mesh Networks (WMN) to solve the problem of the unavailability of VoIP in specific area with limited Internet connection. Moreover, this study also proposes a Server Selection Mechanism (SSM) that evaluates the capacity of each smart mobile device to select the most appropriate one to act as the SIP server. The Server Selection Mechanism enhanced the period of whole group connectivity and provided better service for group users. A comparison reveals that the Server Selection Mechanism increase the period of group connectivity to 63% and 28% over those achieved using the non-regular select and random select mechanisms respectively.
{"title":"Server selection mechanism for VoIP system in wireless mesh networks","authors":"S. Kao, Yung-Sheng Lee, Yung-Chiao Chen, Jiann-Liang Chen, Kai Yang","doi":"10.1109/ICACT.2016.7423406","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423406","url":null,"abstract":"With the rapid development of wireless communication technology and mobile devices, network traffic on smart mobile devices has increased gradually. VoIP is a well-known and mature technology and communication anywhere is emerging as an important application that requires an entirely different way of thinking about communications. In practice VoIP system one kind of issue that vitally impacts the communication is known as service unavailable when loss of Internet connection. In this study we propose a VoIP system architecture that involves the implementation of SIP server and client on a smart mobile device. Every user can play the roles of both SIP server and client, and users can form a self-organized group in Wireless Mesh Networks (WMN) to solve the problem of the unavailability of VoIP in specific area with limited Internet connection. Moreover, this study also proposes a Server Selection Mechanism (SSM) that evaluates the capacity of each smart mobile device to select the most appropriate one to act as the SIP server. The Server Selection Mechanism enhanced the period of whole group connectivity and provided better service for group users. A comparison reveals that the Server Selection Mechanism increase the period of group connectivity to 63% and 28% over those achieved using the non-regular select and random select mechanisms respectively.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133999009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423463
M. F. F. Khan, K. Sakamura
Protecting electronic health records (EHR) from unauthorized access and data breaches has been a great challenge for healthcare organizations in recent times. Controlling access to EHR demands a delicate balance between security and flexibility: There are emergency cases where the default access control policy must be circumvented in order to save patients' life - and cases where management of access control rights needs to be delegated to some trusted parties. Therefore, e-Health access control systems must be robust and flexible at the same time. Conventional general-purpose access control schemes like role-based access control (RBAC) and its derivatives emphasize mainly on the robustness of the access control mechanism, and treat flexibility issues like emergency access overrides and delegation management as addenda. However, in order to comply with the care first principle of the healthcare domain, an ideal e-Health access control system should consider such flexibility issues from the ground up. Recognizing these special requirements mandated by the very nature of the healthcare profession, in this paper, we propose a secure and flexible access control system for e-Health. The user-role and object-operation mappings in our proposed system lend themselves to the RBAC model, and we implemented context verification atop this layer in order for the system to make access decision responsive to emergency incidents. For managing delegation of access control rights, we developed a secure mechanism for creation, transfer and verification of a delegation token, presentation of which to the access control system enables a delegatee to access a delegator's EHR. Every access request in our system is preceded by mandatory user authentication which we implemented using eTRON tamper-resistant cards. Security and performance analysis of the proposed system showed promising results for achieving the desired level of balance between security and flexibility required for an e-Health access control system.
{"title":"A secure and flexible e-Health access control system with provisions for emergency access overrides and delegation of access privileges","authors":"M. F. F. Khan, K. Sakamura","doi":"10.1109/ICACT.2016.7423463","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423463","url":null,"abstract":"Protecting electronic health records (EHR) from unauthorized access and data breaches has been a great challenge for healthcare organizations in recent times. Controlling access to EHR demands a delicate balance between security and flexibility: There are emergency cases where the default access control policy must be circumvented in order to save patients' life - and cases where management of access control rights needs to be delegated to some trusted parties. Therefore, e-Health access control systems must be robust and flexible at the same time. Conventional general-purpose access control schemes like role-based access control (RBAC) and its derivatives emphasize mainly on the robustness of the access control mechanism, and treat flexibility issues like emergency access overrides and delegation management as addenda. However, in order to comply with the care first principle of the healthcare domain, an ideal e-Health access control system should consider such flexibility issues from the ground up. Recognizing these special requirements mandated by the very nature of the healthcare profession, in this paper, we propose a secure and flexible access control system for e-Health. The user-role and object-operation mappings in our proposed system lend themselves to the RBAC model, and we implemented context verification atop this layer in order for the system to make access decision responsive to emergency incidents. For managing delegation of access control rights, we developed a secure mechanism for creation, transfer and verification of a delegation token, presentation of which to the access control system enables a delegatee to access a delegator's EHR. Every access request in our system is preceded by mandatory user authentication which we implemented using eTRON tamper-resistant cards. Security and performance analysis of the proposed system showed promising results for achieving the desired level of balance between security and flexibility required for an e-Health access control system.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"17 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120916111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423303
Jinhyung Oh, Heonjin Hong
For overcoming the scarcity of frequency resources, spectrum efficiency should be always enhanced by adopting the novel transmission methods. Nowadays, there are a few brilliant transmission technique in academic investigation area such as interference alignment, multi-cell beamforming and cooperative communication. Interference alignment has received the spotlight to enormously enhance the spectral efficiency among above cited transmission schemes. Because the interferences occurred from multiple interfering nodes are aligned into predefined portion of radio resource domain such as space, time and frequency we think spectral efficiency can be increased even though multiple interferences are also happened. To implement the interference alignment into current mobile communication systems, however, channel state information should be well-transferred from receiving nodes to transmitting node to obtain the transmit precoder. And the channel state information is transport to not only desired link from its transmitter and receiver but also adjacent link from neighbor cell's transmitter to desired link's receiver. If the precoder and decoder is created with errored channel state information, the capacity of an IA network is decreased. In this paper, we have analyzed the channel estimation error effects on interference alignment. And we compare and simulate the channel estimation effects on interference alignment with different interference alignment algorithms.
{"title":"Channel estimation error effects on interference alignment","authors":"Jinhyung Oh, Heonjin Hong","doi":"10.1109/ICACT.2016.7423303","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423303","url":null,"abstract":"For overcoming the scarcity of frequency resources, spectrum efficiency should be always enhanced by adopting the novel transmission methods. Nowadays, there are a few brilliant transmission technique in academic investigation area such as interference alignment, multi-cell beamforming and cooperative communication. Interference alignment has received the spotlight to enormously enhance the spectral efficiency among above cited transmission schemes. Because the interferences occurred from multiple interfering nodes are aligned into predefined portion of radio resource domain such as space, time and frequency we think spectral efficiency can be increased even though multiple interferences are also happened. To implement the interference alignment into current mobile communication systems, however, channel state information should be well-transferred from receiving nodes to transmitting node to obtain the transmit precoder. And the channel state information is transport to not only desired link from its transmitter and receiver but also adjacent link from neighbor cell's transmitter to desired link's receiver. If the precoder and decoder is created with errored channel state information, the capacity of an IA network is decreased. In this paper, we have analyzed the channel estimation error effects on interference alignment. And we compare and simulate the channel estimation effects on interference alignment with different interference alignment algorithms.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126765869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423363
V. Mochalov, A. Mochalova, B. Chowkwale, S. U. Homutov
Design process of the architecture of environment monitoring systems (EMS) gives rise to problems of selection and location of system components: monitoring stations, transit nodes, sensors, information collection centers, antennas, power supply systems, telecommunication and other equipment. Several examples of EMS are: wireless sensor networks, flying sensor networks, lightning discharges location systems, high-resolution GLONASS/GPS receivers networks, geomagnetic field measurement networks, hybrid systems of forecast and search of strong earthquake precursors, ionosphere monitoring systems etc. The main problem of architecture synthesis of the EMS is formation of a set of solutions on locating system components and multicriterial evaluation of each of the solutions. The functional module of the EMS architecture synthesis is an important component of special-purpose support systems of EMS design. In the present work we consider some problems of environment monitoring systems synthesis and propose a simplified functional scheme of the EMS synthesis.
{"title":"Functional scheme of the environment monitoring systems architecture design","authors":"V. Mochalov, A. Mochalova, B. Chowkwale, S. U. Homutov","doi":"10.1109/ICACT.2016.7423363","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423363","url":null,"abstract":"Design process of the architecture of environment monitoring systems (EMS) gives rise to problems of selection and location of system components: monitoring stations, transit nodes, sensors, information collection centers, antennas, power supply systems, telecommunication and other equipment. Several examples of EMS are: wireless sensor networks, flying sensor networks, lightning discharges location systems, high-resolution GLONASS/GPS receivers networks, geomagnetic field measurement networks, hybrid systems of forecast and search of strong earthquake precursors, ionosphere monitoring systems etc. The main problem of architecture synthesis of the EMS is formation of a set of solutions on locating system components and multicriterial evaluation of each of the solutions. The functional module of the EMS architecture synthesis is an important component of special-purpose support systems of EMS design. In the present work we consider some problems of environment monitoring systems synthesis and propose a simplified functional scheme of the EMS synthesis.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115462499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423382
L. Yi
To make the rotation of the rotor blade more accurate, the elastic deformation in the system is considered in this paper. Firstly, the number and direction of the generalized coordinates are determined by the freedom degree of the blade and the finite element method and Lagrange equation are used to build the dynamical equation of the rotor blade system. Then, the mass matrix and other coefficient matrix are obtained according to the principle of flexible multibody dynamics. Finally, the violation correction method is used to get the numerical solution of the dynamical equation in the simulation. Additionally, the angular displacement and the deformation of the blade end with in the y-direction and z-direction is analyzed to prove the correctness of the model.
{"title":"The dynamical model of rotor blade system","authors":"L. Yi","doi":"10.1109/ICACT.2016.7423382","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423382","url":null,"abstract":"To make the rotation of the rotor blade more accurate, the elastic deformation in the system is considered in this paper. Firstly, the number and direction of the generalized coordinates are determined by the freedom degree of the blade and the finite element method and Lagrange equation are used to build the dynamical equation of the rotor blade system. Then, the mass matrix and other coefficient matrix are obtained according to the principle of flexible multibody dynamics. Finally, the violation correction method is used to get the numerical solution of the dynamical equation in the simulation. Additionally, the angular displacement and the deformation of the blade end with in the y-direction and z-direction is analyzed to prove the correctness of the model.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133244585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-01-01DOI: 10.1109/ICACT.2016.7423576
Seng-Kyoun Jo, Young-Min Kim, Namkyung Lee, J. Kangasharju, M. Mühlhäuser
This paper proposes an energy-aware packet delivery operation through network node clustering for green communications. Energy consumption has become a key factor for the evaluation of performance index in telecommunication industry. In order to prevent a waste of energy in wired network, the proposed algorithm configures energy-aware cluster consisting of one header node and multiple member nodes. Then only the header node performs packet routing and its member nodes forward packet using tag. Simulation results show that the proposed algorithm introduces more energy efficient performance than previous works.
{"title":"Minimization of power consumption in IP networks","authors":"Seng-Kyoun Jo, Young-Min Kim, Namkyung Lee, J. Kangasharju, M. Mühlhäuser","doi":"10.1109/ICACT.2016.7423576","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423576","url":null,"abstract":"This paper proposes an energy-aware packet delivery operation through network node clustering for green communications. Energy consumption has become a key factor for the evaluation of performance index in telecommunication industry. In order to prevent a waste of energy in wired network, the proposed algorithm configures energy-aware cluster consisting of one header node and multiple member nodes. Then only the header node performs packet routing and its member nodes forward packet using tag. Simulation results show that the proposed algorithm introduces more energy efficient performance than previous works.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126262172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-28DOI: 10.1109/ICACT.2015.7224889
S. Sooriyaarachchi, C. Gamage
The modern computing paradigm is moving towards personal devices that incorporate wireless networking, mobility, and collaborative applications. The networking paradigm that best matches this scenario is the mobile ad-hoc network (MANET). A common instance of a MANET is the dense MANET that can be expected in any setting where large number of people congregate such as movie theatres, sports stadiums, shopping malls, transportation hubs, lobby of public offices, lecture rooms, etc. The existing packet transmission protocols for MANETs are inefficient for dense MANETs due to packet broadcast storms for stateless protocols and non-availability of anchor nodes for stateful protocols. This paper presents a new packet broadcast model developed based on cell biology and provides simulation results on protocol efficiency. As smart phone devices and collaborative applications proliferate among users, the proposed dense MANET protocol could provide real benefits to Internet enabled users and devices.
{"title":"A cell biology inspired model for managing packet broadcasts in mobile ad-hoc networks","authors":"S. Sooriyaarachchi, C. Gamage","doi":"10.1109/ICACT.2015.7224889","DOIUrl":"https://doi.org/10.1109/ICACT.2015.7224889","url":null,"abstract":"The modern computing paradigm is moving towards personal devices that incorporate wireless networking, mobility, and collaborative applications. The networking paradigm that best matches this scenario is the mobile ad-hoc network (MANET). A common instance of a MANET is the dense MANET that can be expected in any setting where large number of people congregate such as movie theatres, sports stadiums, shopping malls, transportation hubs, lobby of public offices, lecture rooms, etc. The existing packet transmission protocols for MANETs are inefficient for dense MANETs due to packet broadcast storms for stateless protocols and non-availability of anchor nodes for stateful protocols. This paper presents a new packet broadcast model developed based on cell biology and provides simulation results on protocol efficiency. As smart phone devices and collaborative applications proliferate among users, the proposed dense MANET protocol could provide real benefits to Internet enabled users and devices.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128096941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICACT.2016.7423442
Yao Zhao, Fei Hu, Hao-peng Chen
We present an adaptive tuning method to improve Spark performance, especially for its in-memory computation. This manner serves one purpose: making a better use of memory reasonably through adaptively adopting suitable category based on Spark application runtime statistics on different working sets. This solution works in two steps. Firstly, it collects run-time statistics dynamically and stores them in round-robin structures to save memory. Secondly, it can change system storage category based on these statistics. Additionally we focus on serialization strategy optimization. For this purpose we test Spark integrated serialization algorithms: Java and Kryo serialization algorithms, and make a comparison of their performance. In order to gain flexibility we change Spark serialization mechanism by setting the default serialization unit from one RDD to one block. In this way, for the case which RDD has huge amount of blocks our solution can use different serialization algorithms to serialize different blocks in one RDD. We show that our solution is expressive enough to obtain 2x speedup than original Spark when there is inadequate memory resource.
{"title":"An adaptive tuning strategy on spark based on in-memory computation characteristics","authors":"Yao Zhao, Fei Hu, Hao-peng Chen","doi":"10.1109/ICACT.2016.7423442","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423442","url":null,"abstract":"We present an adaptive tuning method to improve Spark performance, especially for its in-memory computation. This manner serves one purpose: making a better use of memory reasonably through adaptively adopting suitable category based on Spark application runtime statistics on different working sets. This solution works in two steps. Firstly, it collects run-time statistics dynamically and stores them in round-robin structures to save memory. Secondly, it can change system storage category based on these statistics. Additionally we focus on serialization strategy optimization. For this purpose we test Spark integrated serialization algorithms: Java and Kryo serialization algorithms, and make a comparison of their performance. In order to gain flexibility we change Spark serialization mechanism by setting the default serialization unit from one RDD to one block. In this way, for the case which RDD has huge amount of blocks our solution can use different serialization algorithms to serialize different blocks in one RDD. We show that our solution is expressive enough to obtain 2x speedup than original Spark when there is inadequate memory resource.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"34 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115678443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With supercomputer system scaling up, the performance gap between compute and storage system increases dramatically. The traditional speedup only measures the performance of compute system. In this paper, we firstly propose the speedup metric taking into account the I/O constraint. The new metric unifies the computing and I/O performance, and evaluates practical speedup of parallel application under the limitation of I/O system. Furthermore, this paper classifies and analyzes existing parallel systems according to the proposed speedup metric, and makes suggestions on system design and application optimization. Finally, we provide the analysis of this new speedup metric by case studies. The storage speedup reflects the degree of parallel application scalability affected by performance of storage system. The results indicate that the proposed speedup for parallel applications is an effective metric.
{"title":"Storage speedup: An effective metric for I/O-intensive parallel application","authors":"Wei Hu, Guangming Liu, Qiong Li, Xiaofeng Wang, Wenrui Dong","doi":"10.1109/ICACT.2016.7423396","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423396","url":null,"abstract":"With supercomputer system scaling up, the performance gap between compute and storage system increases dramatically. The traditional speedup only measures the performance of compute system. In this paper, we firstly propose the speedup metric taking into account the I/O constraint. The new metric unifies the computing and I/O performance, and evaluates practical speedup of parallel application under the limitation of I/O system. Furthermore, this paper classifies and analyzes existing parallel systems according to the proposed speedup metric, and makes suggestions on system design and application optimization. Finally, we provide the analysis of this new speedup metric by case studies. The storage speedup reflects the degree of parallel application scalability affected by performance of storage system. The results indicate that the proposed speedup for parallel applications is an effective metric.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117227372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}