首页 > 最新文献

2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)最新文献

英文 中文
Deep Learning and Data Mining Classification through the Intelligent Agent Reasoning 基于智能代理推理的深度学习和数据挖掘分类
A. Chemchem, F. Alin, M. Krajecki
Over the last few years, machine learning and data mining methods (MLDM) are constantly evolving, in order to accelerate the process of knowledge discovery from data (KDD). Today's challenge is to select only the most relevant knowledge from those extracted. The present paper is directed to these purposes, by developing a new concept of knowledge mining for meta-knowledge extraction, and extending the most popular machine learning methods to extract meta-models. This new concept of knowledge classification is integrated on the cognitive agent architecture, so as to speed-up its inference process. With this new architecture, the agent will be able to select only the actionable rule class, instead of trying to infer its whole rule base exhaustively.
在过去的几年里,机器学习和数据挖掘方法(MLDM)不断发展,以加速从数据中发现知识(KDD)的过程。今天的挑战是从这些提取出来的知识中选择最相关的知识。本文针对这些目的,开发了一种新的元知识提取的知识挖掘概念,并扩展了最流行的机器学习方法来提取元模型。将这种新的知识分类概念集成到认知代理体系结构中,从而加快了其推理过程。有了这个新的体系结构,代理将能够只选择可操作的规则类,而不是试图详尽地推断其整个规则库。
{"title":"Deep Learning and Data Mining Classification through the Intelligent Agent Reasoning","authors":"A. Chemchem, F. Alin, M. Krajecki","doi":"10.1109/W-FICLOUD.2018.00009","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00009","url":null,"abstract":"Over the last few years, machine learning and data mining methods (MLDM) are constantly evolving, in order to accelerate the process of knowledge discovery from data (KDD). Today's challenge is to select only the most relevant knowledge from those extracted. The present paper is directed to these purposes, by developing a new concept of knowledge mining for meta-knowledge extraction, and extending the most popular machine learning methods to extract meta-models. This new concept of knowledge classification is integrated on the cognitive agent architecture, so as to speed-up its inference process. With this new architecture, the agent will be able to select only the actionable rule class, instead of trying to infer its whole rule base exhaustively.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114716952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Mobile Data Transfer in Energy-Efficient Intelligent Systems for Wastewater Treatment of Thermal Power Plants 热电厂污水处理节能智能系统中的移动数据传输
S. Abdreshova, T. Golubeva, S. Konshin, Shabden Bahtaev, B. Aliyarov, V. Tailakov
In this article the results of experiments of mobile data transfer in energy-efficient intelligent systems for wastewater purification of thermal power plants are shown. A work, based on experiments of the various types of ozonators development, conducted by the authors, is being considered. The analysis of experiments conducted by authors shows better efficiency of the ozonator with spiral external electrode, compared to cylindrical capacitor, including increase in efficiency because of corona current being directly pro-portional to ozone concentration. Taking into account the electric characteristics of corona discharge on mi-crowires, the ozonators can be constructed with given parameters and could be used on the distances >1.5 meters from control computer with Wi-Fi access point of mobile intelligent system for wastewater treatment of thermal power plants.
本文给出了热电厂污水净化节能智能系统中移动数据传输的实验结果。目前正在考虑一项由作者进行的以各种类型臭氧生成物发展实验为基础的工作。实验分析表明,与圆柱形电容器相比,采用螺旋外电极的臭氧发生器效率更高,其中电晕电流与臭氧浓度成正比而提高了效率。考虑到微导线电晕放电的电学特性,臭氧发生器可按给定参数构建,并可用于火电厂污水处理移动智能系统中具有Wi-Fi接入点的控制计算机距离>1.5 m的范围内。
{"title":"A Mobile Data Transfer in Energy-Efficient Intelligent Systems for Wastewater Treatment of Thermal Power Plants","authors":"S. Abdreshova, T. Golubeva, S. Konshin, Shabden Bahtaev, B. Aliyarov, V. Tailakov","doi":"10.1109/W-FiCloud.2018.00032","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00032","url":null,"abstract":"In this article the results of experiments of mobile data transfer in energy-efficient intelligent systems for wastewater purification of thermal power plants are shown. A work, based on experiments of the various types of ozonators development, conducted by the authors, is being considered. The analysis of experiments conducted by authors shows better efficiency of the ozonator with spiral external electrode, compared to cylindrical capacitor, including increase in efficiency because of corona current being directly pro-portional to ozone concentration. Taking into account the electric characteristics of corona discharge on mi-crowires, the ozonators can be constructed with given parameters and could be used on the distances >1.5 meters from control computer with Wi-Fi access point of mobile intelligent system for wastewater treatment of thermal power plants.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123825676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Message from the FiCloud 2018 Workshops Coordinators 2018年FiCloud研讨会协调员致辞
Welcome to the FiCloud Workshops 2018 (W-FiCloud 2018) edition. This year ten workshops and symposia were organized in conjunction with the IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud 2018), the 15th International Conference on Mobile Web and Intelligent Information Systems (MobiWis 2018) and the 4th International Conference on Big Data Innovations and Applications (Innovate-Data 2018). These were held in Barcelona, Spain, during 6–8 August 2018. These include:
欢迎来到2018年FiCloud研讨会(W-FiCloud 2018)版。今年,与IEEE第六届未来物联网和云国际会议(FiCloud 2018)、第15届移动网络和智能信息系统国际会议(MobiWis 2018)和第四届大数据创新与应用国际会议(Innovate-Data 2018)一起举办了十场研讨会和专题讨论会。会议于2018年8月6日至8日在西班牙巴塞罗那举行。这些包括:
{"title":"Message from the FiCloud 2018 Workshops Coordinators","authors":"","doi":"10.1109/w-ficloud.2018.00005","DOIUrl":"https://doi.org/10.1109/w-ficloud.2018.00005","url":null,"abstract":"Welcome to the FiCloud Workshops 2018 (W-FiCloud 2018) edition. This year ten workshops and symposia were organized in conjunction with the IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud 2018), the 15th International Conference on Mobile Web and Intelligent Information Systems (MobiWis 2018) and the 4th International Conference on Big Data Innovations and Applications (Innovate-Data 2018). These were held in Barcelona, Spain, during 6–8 August 2018. These include:","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124271512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric of Intent: A New Approach Identifying Potential Threat in Highly Secured Facilities 意图生物识别:一种在高度安全设施中识别潜在威胁的新方法
Joelle Chamieh, Jassim Al Hamar, Hamad Al-Mohannadi, Mariam Al Hamar, Ahmad Al-Mutlaq, A. Musa
Biometric of Intent (BoI) is a Computer Vision (CV) automation, using Artificial Intelligence (AI) techniques, which presents a new approach that extends the reach of the classic biometric identification process. It provides an efficient mechanism which deters the threats raised by unknown individuals who have deceitful intentions and who aim to deploy unlawful operations such as terrorist attacks. In this context, our proposed BoI model is based on a framework constructed upon an automated machine learning facial expression analysis system which can assist law enforcement agencies who intend to deploy a systematic preventive security approach that aims to reduce the risk of potential unlawful attacks by rogue individuals through the evaluation of their emotional state in relation to their malicious intent.
生物识别意图(BoI)是一种使用人工智能(AI)技术的计算机视觉(CV)自动化,它提出了一种扩展经典生物识别过程范围的新方法。它提供了一种有效的机制,以阻止具有欺骗意图和意图进行诸如恐怖主义袭击等非法行动的未知个人所提出的威胁。在此背景下,我们提出的BoI模型基于基于自动机器学习面部表情分析系统构建的框架,该框架可以帮助打算部署系统预防性安全方法的执法机构,旨在通过评估流氓个人与其恶意意图相关的情绪状态来降低潜在非法攻击的风险。
{"title":"Biometric of Intent: A New Approach Identifying Potential Threat in Highly Secured Facilities","authors":"Joelle Chamieh, Jassim Al Hamar, Hamad Al-Mohannadi, Mariam Al Hamar, Ahmad Al-Mutlaq, A. Musa","doi":"10.1109/W-FICLOUD.2018.00037","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00037","url":null,"abstract":"Biometric of Intent (BoI) is a Computer Vision (CV) automation, using Artificial Intelligence (AI) techniques, which presents a new approach that extends the reach of the classic biometric identification process. It provides an efficient mechanism which deters the threats raised by unknown individuals who have deceitful intentions and who aim to deploy unlawful operations such as terrorist attacks. In this context, our proposed BoI model is based on a framework constructed upon an automated machine learning facial expression analysis system which can assist law enforcement agencies who intend to deploy a systematic preventive security approach that aims to reduce the risk of potential unlawful attacks by rogue individuals through the evaluation of their emotional state in relation to their malicious intent.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127734317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cybersecurity In Microgrids 微电网中的网络安全
Sebastian Cruz-Duarte, P. Gaona-García, E. Gaona-García
The following paper proposes a security scheme applied to microgrids, using symmetric and asymmetric encryption algorithms, digital signatures, hash functions, and SSL certificates to comply with confidentiality, authentication, and integrity aspects in a grid implemented with Raspberry Pi 3 nodes. The study presents the evaluation of different encryption modes to establish the final parameters in the construction of a security scheme. The results showed that the OFB encryption mode in AES is the most suitable for the length of common data in the transfer of information within such networks. In addition, the comparison between the symmetric encryption algorithm AES and the asymmetric encryption algorithm RSA showed that AES has significantly more efficient performance over RSA. Finally, the conclusions and future work are presented.
下面的论文提出了一种应用于微电网的安全方案,使用对称和非对称加密算法、数字签名、哈希函数和SSL证书来满足由树莓派3节点实现的网格中的机密性、身份验证和完整性方面的要求。该研究提出了不同加密模式的评估,以建立安全方案构建的最终参数。结果表明,AES中的OFB加密模式最适合此类网络中信息传输中公共数据的长度。此外,将对称加密算法AES与非对称加密算法RSA进行比较,发现AES的性能明显优于RSA。最后,对本文的研究结论和今后的工作进行了展望。
{"title":"Cybersecurity In Microgrids","authors":"Sebastian Cruz-Duarte, P. Gaona-García, E. Gaona-García","doi":"10.1109/W-FICLOUD.2018.00008","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00008","url":null,"abstract":"The following paper proposes a security scheme applied to microgrids, using symmetric and asymmetric encryption algorithms, digital signatures, hash functions, and SSL certificates to comply with confidentiality, authentication, and integrity aspects in a grid implemented with Raspberry Pi 3 nodes. The study presents the evaluation of different encryption modes to establish the final parameters in the construction of a security scheme. The results showed that the OFB encryption mode in AES is the most suitable for the length of common data in the transfer of information within such networks. In addition, the comparison between the symmetric encryption algorithm AES and the asymmetric encryption algorithm RSA showed that AES has significantly more efficient performance over RSA. Finally, the conclusions and future work are presented.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122238715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Embedded Fatigue Detection Using Convolutional Neural Networks with Mobile Integration 基于移动集成的卷积神经网络嵌入式疲劳检测
M. Ghazal, Yasmine Abu Haeyeh, Abdelrahman Abed, S. Ghazal
Fatigued or drowsy drivers pose a significant risk of causing life-threatening accidents. Yet, many sleep-deprived drivers are behind the wheels exposing lives to danger. In this paper, we propose a low-cost and real-time embedded system for fatigue detection using convolutional neural networks (CNN). Our system starts by spatially processing the video signal using a real-time face detection algorithm to establish a region of interest and reduce computations. The video signal comes from a camera module mounted on the car dashboard connected to an embedded Linux board set to monitor the driver's eyes. Detected faces are then passed to an optimized fatigue recognition CNN binary classifier to detect the event of fatigued or normal driving. When temporally persistent fatigue is detected, alerts are sent to the driver's smart phone, and to possibly others, for prevention measures to be taken before accidents happen. Our testing shows that the system can robustly detect fatigue and can effectively be deployed to address the problem.
疲劳或困倦的司机极有可能造成危及生命的事故。然而,许多睡眠不足的司机仍在开车,将生命置于危险之中。本文提出了一种基于卷积神经网络(CNN)的低成本、实时的嵌入式疲劳检测系统。我们的系统首先使用实时人脸检测算法对视频信号进行空间处理,以建立感兴趣的区域并减少计算量。视频信号来自安装在汽车仪表盘上的摄像头模块,该摄像头模块连接到一个嵌入式Linux板,用于监控驾驶员的眼睛。然后将检测到的人脸传递给优化的疲劳识别CNN二值分类器,以检测疲劳或正常驾驶的事件。当检测到暂时持续的疲劳时,警报会发送到驾驶员的智能手机,也可能会发送到其他人,以便在事故发生前采取预防措施。我们的测试表明,该系统可以稳健地检测疲劳,并可以有效地部署来解决问题。
{"title":"Embedded Fatigue Detection Using Convolutional Neural Networks with Mobile Integration","authors":"M. Ghazal, Yasmine Abu Haeyeh, Abdelrahman Abed, S. Ghazal","doi":"10.1109/W-FICLOUD.2018.00026","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00026","url":null,"abstract":"Fatigued or drowsy drivers pose a significant risk of causing life-threatening accidents. Yet, many sleep-deprived drivers are behind the wheels exposing lives to danger. In this paper, we propose a low-cost and real-time embedded system for fatigue detection using convolutional neural networks (CNN). Our system starts by spatially processing the video signal using a real-time face detection algorithm to establish a region of interest and reduce computations. The video signal comes from a camera module mounted on the car dashboard connected to an embedded Linux board set to monitor the driver's eyes. Detected faces are then passed to an optimized fatigue recognition CNN binary classifier to detect the event of fatigued or normal driving. When temporally persistent fatigue is detected, alerts are sent to the driver's smart phone, and to possibly others, for prevention measures to be taken before accidents happen. Our testing shows that the system can robustly detect fatigue and can effectively be deployed to address the problem.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"690 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132652489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Understanding Awareness of Cyber Security Threat among IT Employees 了解资讯科技员工对网络安全威胁的认知
Hamad Al-Mohannadi, I. Awan, Jassim Al Hamar, Y. Hamar, Mohammad Shah, A. Musa
Cyber-attacks have been an increasing threat on people and organisations, which led to massive unpleasant impact. Therefore, there were many solutions to handle cyber-attacks, including Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS). These solutions will provide a huge number of alarms that produce more are false positives. Therefore, the IDS tool result should be operated by a human intelligent be filtered effectively the huge amount of alerts to identify true positive attacks and perform accordingly to the incident response rule. This requires the IT employees to have enough knowledge and competency on operating IDS, IPS and incident handling. This paper aims to examine the awareness of cyber security threat among all IT employees, focusing on three domains: Knowledge, Monitoring and Prevention.
网络攻击对个人和组织的威胁越来越大,导致了巨大的不愉快影响。因此,应对网络攻击的解决方案有很多,包括入侵检测系统(IDS)、入侵防御系统(IPS)。这些解决方案将提供大量的警报,产生更多的误报。因此,IDS工具结果应由人工智能操作,有效过滤大量警报,识别真正的正攻击,并根据事件响应规则执行。这就要求IT员工在操作IDS、IPS和事件处理方面具备足够的知识和能力。本文旨在研究所有IT员工对网络安全威胁的意识,重点关注三个领域:知识、监控和预防。
{"title":"Understanding Awareness of Cyber Security Threat among IT Employees","authors":"Hamad Al-Mohannadi, I. Awan, Jassim Al Hamar, Y. Hamar, Mohammad Shah, A. Musa","doi":"10.1109/W-FiCloud.2018.00036","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00036","url":null,"abstract":"Cyber-attacks have been an increasing threat on people and organisations, which led to massive unpleasant impact. Therefore, there were many solutions to handle cyber-attacks, including Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS). These solutions will provide a huge number of alarms that produce more are false positives. Therefore, the IDS tool result should be operated by a human intelligent be filtered effectively the huge amount of alerts to identify true positive attacks and perform accordingly to the incident response rule. This requires the IT employees to have enough knowledge and competency on operating IDS, IPS and incident handling. This paper aims to examine the awareness of cyber security threat among all IT employees, focusing on three domains: Knowledge, Monitoring and Prevention.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115020303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Malware Propagation Modelling in Peer-to-Peer Networks: A Review 恶意软件在点对点网络中的传播建模:综述
A. Musa, Hamad Al-Mohannadi, Jassim Alhamar
Peer-to-Peer (P2P) network is increasingly becoming the most important means of trading content throughout the last years due to the constant evolvement of the cyber world. This popularity made the P2P network susceptible to the spread of malware. The detection of the cause of malware propagation is now critical to the survival of P2P networks. This paper offers a review of the current relevant mathematical propagation models that have been proposed to date to predict the propagation behavior of a malware in a P2P network. We analyzed the models proposed by researchers and experts in the field by evaluating their limitations and a possible alternative for improving the analysis of the expected behavior of a malware spread.
近年来,由于网络世界的不断发展,点对点(P2P)网络日益成为最重要的内容交易手段。这种普及使得P2P网络容易受到恶意软件传播的影响。检测恶意软件传播的原因现在对P2P网络的生存至关重要。本文对目前提出的用于预测P2P网络中恶意软件传播行为的相关数学传播模型进行了回顾。我们分析了由该领域的研究人员和专家提出的模型,评估了它们的局限性和一种可能的替代方案,以改进对恶意软件传播预期行为的分析。
{"title":"Malware Propagation Modelling in Peer-to-Peer Networks: A Review","authors":"A. Musa, Hamad Al-Mohannadi, Jassim Alhamar","doi":"10.1109/W-FICLOUD.2018.00038","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00038","url":null,"abstract":"Peer-to-Peer (P2P) network is increasingly becoming the most important means of trading content throughout the last years due to the constant evolvement of the cyber world. This popularity made the P2P network susceptible to the spread of malware. The detection of the cause of malware propagation is now critical to the survival of P2P networks. This paper offers a review of the current relevant mathematical propagation models that have been proposed to date to predict the propagation behavior of a malware in a P2P network. We analyzed the models proposed by researchers and experts in the field by evaluating their limitations and a possible alternative for improving the analysis of the expected behavior of a malware spread.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115987667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Proxy-Based Query Aggregation Method for Distributed Key-Value Stores 基于代理的分布式键值存储查询聚合方法
Daichi Kawanami, Masanari Kamoshita, Ryota Kawashima, H. Matsuo
Distributed key-value stores (D-KVS) are critical backbone for SNS and cloud services. Some D-KVS are based on a ring architecture with multiple database nodes to handle large amount of data. Any of them can receive queries from clients, and the node forwards queries to an adequate node if necessary. Therefore, this architecture causes heavy overhead of packet processing for each node.Some D-KVS have adopted fast packet processing frameworks like DPDK, but this is not enough to handle huge amount of requests. We introduce a query aggregation method to D-KVS to reduce the network traffic. In our approach, client queries are aggregated into a few large-sized query packets by a centralized proxy. The proxy receives every query from the clients, and it routes aggregated queries to the destination nodes. The proxy is built on top of DPDK-based network stack and can deal with the growing of the clients by increasing the number of CPU cores for packet handling. We evaluated with the environment of three Cassandra nodes linked with 10 Gbps network. Our approach improved throughput by 19% compared with the non-proxy Cassandra.
分布式键值存储(D-KVS)是SNS和云服务的关键支柱。一些D-KVS基于具有多个数据库节点的环形架构来处理大量数据。它们中的任何一个都可以接收来自客户机的查询,如果需要,节点将查询转发给适当的节点。因此,这种体系结构导致每个节点的数据包处理开销很大。一些D-KVS采用了像DPDK这样的快速数据包处理框架,但这不足以处理大量的请求。为了减少网络流量,我们在D-KVS中引入了一种查询聚合方法。在我们的方法中,客户端查询通过集中式代理聚合为几个大型查询数据包。代理接收来自客户机的每个查询,并将聚合查询路由到目标节点。该代理建立在基于dpdk的网络堆栈之上,可以通过增加用于数据包处理的CPU内核数量来应对客户机的增长。我们用3个Cassandra节点与10 Gbps网络连接的环境进行了评估。与非代理Cassandra相比,我们的方法提高了19%的吞吐量。
{"title":"A Proxy-Based Query Aggregation Method for Distributed Key-Value Stores","authors":"Daichi Kawanami, Masanari Kamoshita, Ryota Kawashima, H. Matsuo","doi":"10.1109/W-FICLOUD.2018.00018","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00018","url":null,"abstract":"Distributed key-value stores (D-KVS) are critical backbone for SNS and cloud services. Some D-KVS are based on a ring architecture with multiple database nodes to handle large amount of data. Any of them can receive queries from clients, and the node forwards queries to an adequate node if necessary. Therefore, this architecture causes heavy overhead of packet processing for each node.Some D-KVS have adopted fast packet processing frameworks like DPDK, but this is not enough to handle huge amount of requests. We introduce a query aggregation method to D-KVS to reduce the network traffic. In our approach, client queries are aggregated into a few large-sized query packets by a centralized proxy. The proxy receives every query from the clients, and it routes aggregated queries to the destination nodes. The proxy is built on top of DPDK-based network stack and can deal with the growing of the clients by increasing the number of CPU cores for packet handling. We evaluated with the environment of three Cassandra nodes linked with 10 Gbps network. Our approach improved throughput by 19% compared with the non-proxy Cassandra.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114462257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Copyright notice] (版权)
{"title":"[Copyright notice]","authors":"","doi":"10.1109/w-ficloud.2018.00003","DOIUrl":"https://doi.org/10.1109/w-ficloud.2018.00003","url":null,"abstract":"","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115466030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1