Jianhua Che, Wei-Min Yao, Shougang Ren, Haoyun Wang
The network I/O operations of a guest domain spend Domain0's processor resource as well as its own processor resource. If no control is placed on the network I/O operations of guest domains, Xen system will likely overload when executing network I/O-intensive workload. To resolve this problem, the allowable network I/O request number of Xen system should be firstly figured out. This paper illuminated the characteristic of Xen system in handling the network I/O operations of guest domains with two experimental results, and established several performance analyzing and predicting models by studying the network I/O procedure and the processor resource consumption distribution of Xen system. These models can compute the allowable number of guest domains with fixed network I/O request number or the allowable network I/O request number of each guest domain based on all idle processor resource of Xen system, and prevent Xen system from overloading. Finally, the applicability of these models is preliminarily analyzed.
{"title":"Performance Analyzing and Predicting of Network I/O in Xen System","authors":"Jianhua Che, Wei-Min Yao, Shougang Ren, Haoyun Wang","doi":"10.1109/DASC.2013.139","DOIUrl":"https://doi.org/10.1109/DASC.2013.139","url":null,"abstract":"The network I/O operations of a guest domain spend Domain0's processor resource as well as its own processor resource. If no control is placed on the network I/O operations of guest domains, Xen system will likely overload when executing network I/O-intensive workload. To resolve this problem, the allowable network I/O request number of Xen system should be firstly figured out. This paper illuminated the characteristic of Xen system in handling the network I/O operations of guest domains with two experimental results, and established several performance analyzing and predicting models by studying the network I/O procedure and the processor resource consumption distribution of Xen system. These models can compute the allowable number of guest domains with fixed network I/O request number or the allowable network I/O request number of each guest domain based on all idle processor resource of Xen system, and prevent Xen system from overloading. Finally, the applicability of these models is preliminarily analyzed.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125347039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As present, Differential Power Analysis (DPA) attack sample the power consumption information of chips using an oscilloscope which sample frequency is much larger than system global clock speed. Through the simulation of the S-box circuit in Advanced Encryption Standard (AES) and differential analysis of power consumption data, we find that, when reached an amount, the sample frequency's increasing has slight influence on the DPA. Yet when the sample frequency decreases, the cost data collected by the collection points tends to be random, which results in the correlation between the measurements of the power and the data being processed is not well revealed. Under the precondition of not impacting the effect of DPA, proper reduction in the sample frequency will not only compress the data but also increase the number of power trace. Thus the effect of the DPA is strengthened. Meanwhile, the cost of design the sampling system is reduced, which leaves more space for the improvement of the accuracy of the sampling system.
{"title":"Research on the Relationship between the Effect of DPA and Differential Sample Frequency","authors":"Ruicong Ma, Daheng Yue, Shaoqing Li, Jihua Chen","doi":"10.1109/DASC.2013.43","DOIUrl":"https://doi.org/10.1109/DASC.2013.43","url":null,"abstract":"As present, Differential Power Analysis (DPA) attack sample the power consumption information of chips using an oscilloscope which sample frequency is much larger than system global clock speed. Through the simulation of the S-box circuit in Advanced Encryption Standard (AES) and differential analysis of power consumption data, we find that, when reached an amount, the sample frequency's increasing has slight influence on the DPA. Yet when the sample frequency decreases, the cost data collected by the collection points tends to be random, which results in the correlation between the measurements of the power and the data being processed is not well revealed. Under the precondition of not impacting the effect of DPA, proper reduction in the sample frequency will not only compress the data but also increase the number of power trace. Thus the effect of the DPA is strengthened. Meanwhile, the cost of design the sampling system is reduced, which leaves more space for the improvement of the accuracy of the sampling system.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128343357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a new system for license plate characters recognition is proposed, on the basis of a novel characters recognition algorithm called sliding window search. This system includes license plate location, license plate characters pre-segmentation and characters recognition based on sliding window search. The Gaussian mixture model is used for background modeling and a Bayesian classifier based on the target tracking technology is used to monitor all vehicles within the scene. The brightness difference between the license plate characters and background is considered. Based on the priori information about the characters width, the license plate characters pre-segmentation is easily acquired. Finally, sliding window search is conducted on the license plate characters. Compared with other license plate characters recognition systems, this system has a high recognition accuracy and has good robustness even in a complex environment.
{"title":"A New Method for License Plate Characters Recognition Based on Sliding Window Search","authors":"Ying-Jia Bu, M. Xie","doi":"10.1109/DASC.2013.79","DOIUrl":"https://doi.org/10.1109/DASC.2013.79","url":null,"abstract":"In this paper, a new system for license plate characters recognition is proposed, on the basis of a novel characters recognition algorithm called sliding window search. This system includes license plate location, license plate characters pre-segmentation and characters recognition based on sliding window search. The Gaussian mixture model is used for background modeling and a Bayesian classifier based on the target tracking technology is used to monitor all vehicles within the scene. The brightness difference between the license plate characters and background is considered. Based on the priori information about the characters width, the license plate characters pre-segmentation is easily acquired. Finally, sliding window search is conducted on the license plate characters. Compared with other license plate characters recognition systems, this system has a high recognition accuracy and has good robustness even in a complex environment.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122440799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Video caching has gained significant attention due to its cost efficiency. In this paper, we propose an optimized cache replacement scheme based on the user request arrival pattern. The users are grouped among all possible request intervals, and the user density is calculated in each interval. The groups with highest user density are cached. Whenever a group with high user density arrives, the groups with lower density will be replaced. The simulation results show that the proposed schemes can double the hit ratio compared with the Least recently Used (LRU) scheme.
{"title":"Optimized Cache Replacement Scheme for Video on Demand Service","authors":"Xiaocui Sun, Zhijun Wang","doi":"10.1109/DASC.2013.61","DOIUrl":"https://doi.org/10.1109/DASC.2013.61","url":null,"abstract":"Video caching has gained significant attention due to its cost efficiency. In this paper, we propose an optimized cache replacement scheme based on the user request arrival pattern. The users are grouped among all possible request intervals, and the user density is calculated in each interval. The groups with highest user density are cached. Whenever a group with high user density arrives, the groups with lower density will be replaced. The simulation results show that the proposed schemes can double the hit ratio compared with the Least recently Used (LRU) scheme.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114825123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mingjun Du, Xiaoxiang Wang, Dongyu Wang, Yulong Wang
Device-to-Device (D2D) communications make high-speed multicast services possible since the multicast receivers with poor downlink channel conditions can be retransmitted by devices nearby via D2D links. In this paper, we consider how to efficiently use D2D communications to help enhance the quality of wireless multicast services in cellular networks. To achieve this, a dynamic D2D retransmission scheme with maximized utility is proposed, which can adaptively select the retransmission algorithm according to the state of the network load. Through both analysis and simulations, we show that our algorithms achieve a significant gain in terms of utility, and reduce the burden of the base station (BS).
{"title":"Device-to-Device Dynamic Clustering Algorithm in Multicast Communication","authors":"Mingjun Du, Xiaoxiang Wang, Dongyu Wang, Yulong Wang","doi":"10.1109/DASC.2013.129","DOIUrl":"https://doi.org/10.1109/DASC.2013.129","url":null,"abstract":"Device-to-Device (D2D) communications make high-speed multicast services possible since the multicast receivers with poor downlink channel conditions can be retransmitted by devices nearby via D2D links. In this paper, we consider how to efficiently use D2D communications to help enhance the quality of wireless multicast services in cellular networks. To achieve this, a dynamic D2D retransmission scheme with maximized utility is proposed, which can adaptively select the retransmission algorithm according to the state of the network load. Through both analysis and simulations, we show that our algorithms achieve a significant gain in terms of utility, and reduce the burden of the base station (BS).","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123646063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fast Fourier Transform (FFT) algorithm has an important role in the image processing and scientific computing, and it's a highly parallel divide-and-conquer algorithm. In this paper, we exploited the Compute Unified Device Architecture CUDA technology and contemporary graphics processing units (GPUs) to achieve higher performance. We focused on two aspects to optimize the ordinary FFT algorithm, multi-threaded parallelism and memory hierarchy. We also proposed parallelism optimization strategies when the data volume occurs and predicted the possible situation when the amount of data increased further.it can be seen from the results that Parallel FFT algorithm is more efficient than the ordinary FFT algorithm.
{"title":"Design and Implementation of Parallel FFT on CUDA","authors":"Xueqin Zhang, K. Shen, Cheng-Hai Xu, K. Wang","doi":"10.1109/DASC.2013.130","DOIUrl":"https://doi.org/10.1109/DASC.2013.130","url":null,"abstract":"Fast Fourier Transform (FFT) algorithm has an important role in the image processing and scientific computing, and it's a highly parallel divide-and-conquer algorithm. In this paper, we exploited the Compute Unified Device Architecture CUDA technology and contemporary graphics processing units (GPUs) to achieve higher performance. We focused on two aspects to optimize the ordinary FFT algorithm, multi-threaded parallelism and memory hierarchy. We also proposed parallelism optimization strategies when the data volume occurs and predicted the possible situation when the amount of data increased further.it can be seen from the results that Parallel FFT algorithm is more efficient than the ordinary FFT algorithm.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131911614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The serial concatenated convolutional code (SCCC) structure of Turbo code shows excellent decoding performance in the region of moderate-to-high signal-noise-ratio (SNR), which has been widely applied to many fields, such as deep space communication and so on. So, the recognition of SCCC turbo code is very important in the cognitive radio and information interception. We firstly estimated the parameters of outer encoder by Gaussian elimination and Euclidean algorithm. Then, the proposed method exploits the invariance property between the original data and interleaved data. Parameters of interleaver can be estimated easily by calculating the correlation between the check bits and the data. The computer simulations show that the proposed method has good performance when errors exist in the interception data.
{"title":"A Method of Parameters Estimation of SCCC Turbo Code","authors":"Dan Li, L. Gan","doi":"10.1109/DASC.2013.29","DOIUrl":"https://doi.org/10.1109/DASC.2013.29","url":null,"abstract":"The serial concatenated convolutional code (SCCC) structure of Turbo code shows excellent decoding performance in the region of moderate-to-high signal-noise-ratio (SNR), which has been widely applied to many fields, such as deep space communication and so on. So, the recognition of SCCC turbo code is very important in the cognitive radio and information interception. We firstly estimated the parameters of outer encoder by Gaussian elimination and Euclidean algorithm. Then, the proposed method exploits the invariance property between the original data and interleaved data. Parameters of interleaver can be estimated easily by calculating the correlation between the check bits and the data. The computer simulations show that the proposed method has good performance when errors exist in the interception data.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133409713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yunong Zhang, Dechao Chen, Long Jin, Y. Wang, Feiheng Luo
This paper proposes a novel multi-input Bernoulli-polynomial neuronet (MIBPN) on the basis of function approximation theory. The MIBPN is trained by a weights-and-structure-determination (WASD) algorithm with twice pruning (TP). The WASD algorithm can obtain the optimal weights and structure for the MIBPN, and overcome the weaknesses of conventional BP (back-propagation) neuronets such as slow training speed and local minima. With the TP technique, the neurons of less importance in the MIBPN are pruned for less computational complexity. Furthermore, this MIBPN can be extended to a multiple input multiple output Bernoulli-polynomial neuronet (MIMOBPN), which can be applied as an important tool for classification. Numerical experiment results show that the MIBPN has outstanding performance in data approximation and generalization. Besides, experiment results based on the real-world classification data-sets substantiate the high accuracy and strong robustness of the MIMOBPN equipped with the proposed WASD algorithm for classification. Finally, the twice-pruning aided WASD neuronet of Bernoulli-polynomial type in the forms of MIBPN and MIMOBPN is established, together with the effective extension to robust classification.
{"title":"Twice-Pruning Aided WASD Neuronet of Bernoulli-Polynomial Type with Extension to Robust Classification","authors":"Yunong Zhang, Dechao Chen, Long Jin, Y. Wang, Feiheng Luo","doi":"10.1109/DASC.2013.85","DOIUrl":"https://doi.org/10.1109/DASC.2013.85","url":null,"abstract":"This paper proposes a novel multi-input Bernoulli-polynomial neuronet (MIBPN) on the basis of function approximation theory. The MIBPN is trained by a weights-and-structure-determination (WASD) algorithm with twice pruning (TP). The WASD algorithm can obtain the optimal weights and structure for the MIBPN, and overcome the weaknesses of conventional BP (back-propagation) neuronets such as slow training speed and local minima. With the TP technique, the neurons of less importance in the MIBPN are pruned for less computational complexity. Furthermore, this MIBPN can be extended to a multiple input multiple output Bernoulli-polynomial neuronet (MIMOBPN), which can be applied as an important tool for classification. Numerical experiment results show that the MIBPN has outstanding performance in data approximation and generalization. Besides, experiment results based on the real-world classification data-sets substantiate the high accuracy and strong robustness of the MIMOBPN equipped with the proposed WASD algorithm for classification. Finally, the twice-pruning aided WASD neuronet of Bernoulli-polynomial type in the forms of MIBPN and MIMOBPN is established, together with the effective extension to robust classification.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130274143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Probability density function (PDF) plays a vital role in many applications involving stochastic process. A good approximation for real-time PDF conditioned on certain performance criterion could help to acquire unknown information about the system. With the help of this kind of information, which was not available earlier, many features of various models that describe the real system can be estimated effectively, especially for non-linear non-Gaussian stochastic system. In this paper, we elucidate some PDFs with only one parameter that have a definite physical meaning based on Tsallis entropy. The PDFs that we calculated here are all Gaussian-like, and Gaussian distribution is attained when the parameter of Tsallis entropy approaches zero. Based on these explicit form of Gaussian-like PDFs we calculated here, an extension of Gaussian particle filter (GPF) called Gaussian-like particle filter (GLPF) is proposed and the simulation results show that the GLPF is a more effective way to estimate the state of non-linear stochastic system compared with the GPF.
{"title":"A New Gaussian-Like Density Model and Its Application to Object-Tracking","authors":"Xifeng Li, Yongle Xie","doi":"10.1109/DASC.2013.124","DOIUrl":"https://doi.org/10.1109/DASC.2013.124","url":null,"abstract":"Probability density function (PDF) plays a vital role in many applications involving stochastic process. A good approximation for real-time PDF conditioned on certain performance criterion could help to acquire unknown information about the system. With the help of this kind of information, which was not available earlier, many features of various models that describe the real system can be estimated effectively, especially for non-linear non-Gaussian stochastic system. In this paper, we elucidate some PDFs with only one parameter that have a definite physical meaning based on Tsallis entropy. The PDFs that we calculated here are all Gaussian-like, and Gaussian distribution is attained when the parameter of Tsallis entropy approaches zero. Based on these explicit form of Gaussian-like PDFs we calculated here, an extension of Gaussian particle filter (GPF) called Gaussian-like particle filter (GLPF) is proposed and the simulation results show that the GLPF is a more effective way to estimate the state of non-linear stochastic system compared with the GPF.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128236454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, the fairness problem of opportunistic multicast scheduling (OMS) is investigated and a parity-based OMS is proposed. In conventional multicast system, the system throughput is limited by the users with poor channel state information (CSI). In the proposed OMS, to improve the system throughput performance, the data reception of each user is taken into consideration by the base station (BS). Each user is assigned two aspects of priority, one of them is based on the system throughput, and the other is based on the data reception of users. For the users with poor channel condition, fewer packets would be received than the users with fine channel conditions. Thus, by raising the priority level of the user with worse channel condition, the performance of fairness among users can be improvement. Simulation results show that the proposed OMS can improve the system throughput performance while ensuring the fairness performance among users.
{"title":"A Parity-Based Opportunistic Multicast Scheduling Scheme over Cellular Networks","authors":"Yulong Wang, Xiaoxiang Wang, Mingming Li, Jing Qu","doi":"10.1109/DASC.2013.126","DOIUrl":"https://doi.org/10.1109/DASC.2013.126","url":null,"abstract":"In this paper, the fairness problem of opportunistic multicast scheduling (OMS) is investigated and a parity-based OMS is proposed. In conventional multicast system, the system throughput is limited by the users with poor channel state information (CSI). In the proposed OMS, to improve the system throughput performance, the data reception of each user is taken into consideration by the base station (BS). Each user is assigned two aspects of priority, one of them is based on the system throughput, and the other is based on the data reception of users. For the users with poor channel condition, fewer packets would be received than the users with fine channel conditions. Thus, by raising the priority level of the user with worse channel condition, the performance of fairness among users can be improvement. Simulation results show that the proposed OMS can improve the system throughput performance while ensuring the fairness performance among users.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133960762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}