Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00076
M. Abderrahim, Hela Hakim, H. Boujemaa, Raed al Hamad
Many researches have shown interest in the development of energy efficient transmission technique to reduce the power consumption and to extend the network lifetime. In this paperweproposeanenergy-efficientmultihoptransmissionstrategy in Wireless Sensor Networks (WSN). We consider a clustered WSN where each cluster is composed of N sensor nodes. These last detect information and try to transmit it to the cluster head which is responsible for transmitting received data to a center of maintenance in order to take the appropriate intervention. We suppose that the transmitting symbol is correctly received only if the Signal-to-Noise Ratio (SNR) at the receiver is above a threshold γth. The main objective of our work is to define a new transmission technique minimizing the power consumption using multihop communication. The selected relays which participate in this transmission are those offering the least transmit power while maintaining SNR equal to the threshold γth. Therefore the proposed transmission technique can reduce enormously the power consumption compared with direct transmission and the transmission with a single relay. Simulations results demonstrate that our proposed strategy significantly reduces the energy consumption, thus confirm significant energy relative to direct transmission.
{"title":"Multihop Transmission Strategy to Improve Energy Efficiency in WSNs","authors":"M. Abderrahim, Hela Hakim, H. Boujemaa, Raed al Hamad","doi":"10.1109/WAINA.2018.00076","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00076","url":null,"abstract":"Many researches have shown interest in the development of energy efficient transmission technique to reduce the power consumption and to extend the network lifetime. In this paperweproposeanenergy-efficientmultihoptransmissionstrategy in Wireless Sensor Networks (WSN). We consider a clustered WSN where each cluster is composed of N sensor nodes. These last detect information and try to transmit it to the cluster head which is responsible for transmitting received data to a center of maintenance in order to take the appropriate intervention. We suppose that the transmitting symbol is correctly received only if the Signal-to-Noise Ratio (SNR) at the receiver is above a threshold γth. The main objective of our work is to define a new transmission technique minimizing the power consumption using multihop communication. The selected relays which participate in this transmission are those offering the least transmit power while maintaining SNR equal to the threshold γth. Therefore the proposed transmission technique can reduce enormously the power consumption compared with direct transmission and the transmission with a single relay. Simulations results demonstrate that our proposed strategy significantly reduces the energy consumption, thus confirm significant energy relative to direct transmission.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127801519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00154
Ying-Nong Chen, Chi-Hung Chuang, Kuo-Chin Fan
Recently, based on the improvements of hardware performance and the popularity of internet, big data analysis and artificial intelligence were successfully applied in a wide range of applications. Similarly, computer vision technology also benefited from the powerful performance of hardware and artificial intelligence, so that the computer vision technology could solve problem more efficiently and accurately and improve the development of automation. In this thesis, we aim at measuring the distance between the finger and camera, and tracking the finger to fulfill a stereo vision-based hand-writing recognition system in three-dimensional (3D) space. Traditionally, the researchers usually applied infrared sensors to recognize human's hands. However, the infrared sensor solution still be challenged in hand tracking algorithm under widely varying lighting, distance limitation, and the outdoor condition. As mentioned above, this thesis attempts to generate the depth information based on stereo vision for improving the finger tracking. Through the depth information, we determine and track the fingers step by step. Also, tracking target would be excluded from other objects and background. In this thesis, the Probability Density Function is applied to get the threshold value, which could find out the region of interest automatically instead of manually. Furthermore, the proposed system uses Particle Swarm Optimization for hand tracking. After getting the hand (palm) position in each frame, the grayscale image would be used to analyze the fingers. Finally, the multilayer perceptron is used to train the MNIST dataset for hand-writing character validation. The experimental results demonstrate that the proposed system could recognize hand-writing digits in 3D space in high accuracy without any constraints and restricted environment.
{"title":"Stereo-Based 3D Space Handwriting Recognition","authors":"Ying-Nong Chen, Chi-Hung Chuang, Kuo-Chin Fan","doi":"10.1109/WAINA.2018.00154","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00154","url":null,"abstract":"Recently, based on the improvements of hardware performance and the popularity of internet, big data analysis and artificial intelligence were successfully applied in a wide range of applications. Similarly, computer vision technology also benefited from the powerful performance of hardware and artificial intelligence, so that the computer vision technology could solve problem more efficiently and accurately and improve the development of automation. In this thesis, we aim at measuring the distance between the finger and camera, and tracking the finger to fulfill a stereo vision-based hand-writing recognition system in three-dimensional (3D) space. Traditionally, the researchers usually applied infrared sensors to recognize human's hands. However, the infrared sensor solution still be challenged in hand tracking algorithm under widely varying lighting, distance limitation, and the outdoor condition. As mentioned above, this thesis attempts to generate the depth information based on stereo vision for improving the finger tracking. Through the depth information, we determine and track the fingers step by step. Also, tracking target would be excluded from other objects and background. In this thesis, the Probability Density Function is applied to get the threshold value, which could find out the region of interest automatically instead of manually. Furthermore, the proposed system uses Particle Swarm Optimization for hand tracking. After getting the hand (palm) position in each frame, the grayscale image would be used to analyze the fingers. Finally, the multilayer perceptron is used to train the MNIST dataset for hand-writing character validation. The experimental results demonstrate that the proposed system could recognize hand-writing digits in 3D space in high accuracy without any constraints and restricted environment.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126847584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00128
T. N. Qureshi, N. Javaid, Aqdas Naz, Waseem Ahmad, Muhammad Imran, Z. Khan
In recent decades numerous Demand Side Management (DSM) techniques have been merged for Smart Grid (SG). These techniques have been very effective in minimizing cost. However, lack in other characteristics like effective control over Peak Average Ratio (PAR) that why they are not equally beneficial for the utility. Due to different characteristic of different operations some techniques are really work well for cost and some for PAR. We have evaluated and extracted different operations from Harmony Search Algorithm (HSA), Enhanced Differential Evolution (EDE) and Wind Driven Optimization (WDO) for controlling cost along with PAR. A hybrid Enhanced Differential Harmony Wind Driven Optimization (EDHWADO) is formed that combines the cost effectiveness of WDO, HSA and PAR controlling operation through integration of EDE. The proposed hybrid engine proved to be most cost effective in comparison to Genetic Algorithm (GA), WDO along effective PAR control and User Comfort (UC) maximization. Real Time Pricing (RTP) signals are used to evaluate real time behavior of appliances. Three categories of appliances are used; fixed, elastic and shiftable. On basis of performances metrics, simulations proved that EDHWDO leads substantial cost saving along with enhancing user comfort and also helps in significant cost reduction.
{"title":"A Novel Meta-Heuristic Hybrid Enhanced Differential Harmony Wind Driven (EDHWDO) Optimization Technique for Demand Side Management in Smart Grid","authors":"T. N. Qureshi, N. Javaid, Aqdas Naz, Waseem Ahmad, Muhammad Imran, Z. Khan","doi":"10.1109/WAINA.2018.00128","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00128","url":null,"abstract":"In recent decades numerous Demand Side Management (DSM) techniques have been merged for Smart Grid (SG). These techniques have been very effective in minimizing cost. However, lack in other characteristics like effective control over Peak Average Ratio (PAR) that why they are not equally beneficial for the utility. Due to different characteristic of different operations some techniques are really work well for cost and some for PAR. We have evaluated and extracted different operations from Harmony Search Algorithm (HSA), Enhanced Differential Evolution (EDE) and Wind Driven Optimization (WDO) for controlling cost along with PAR. A hybrid Enhanced Differential Harmony Wind Driven Optimization (EDHWADO) is formed that combines the cost effectiveness of WDO, HSA and PAR controlling operation through integration of EDE. The proposed hybrid engine proved to be most cost effective in comparison to Genetic Algorithm (GA), WDO along effective PAR control and User Comfort (UC) maximization. Real Time Pricing (RTP) signals are used to evaluate real time behavior of appliances. Three categories of appliances are used; fixed, elastic and shiftable. On basis of performances metrics, simulations proved that EDHWDO leads substantial cost saving along with enhancing user comfort and also helps in significant cost reduction.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124798598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00083
Kole Nunley, Wei Lu
Combining multiple intrusion detection technologies into a hybrid system has been recently proposed to improve the comprehensive intrusion detection capability. However, such a hybrid system is not always stronger than its component detectors. Getting different detection technologies to interoperate effectively and efficiently has become a major challenge when building operational intrusion detection systems (IDS's). In this paper, we propose a novel reward system model in order to increase the accuracy and reliability of hybrid IDS's. In particular, the proposed confidence-based reward system built within a reinforcement learning algorithm includes three components. Namely, a relative discount factor, a confidence extraction technique, and a unique reward computing algorithm. The preliminary case studies show that the proposed reward system has a potential to improve the anomaly detection accuracy, decrease false alarm rate, and improve adaptability to new network traffic.
{"title":"Detecting Network Intrusions Using a Confidence-Based Reward System","authors":"Kole Nunley, Wei Lu","doi":"10.1109/WAINA.2018.00083","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00083","url":null,"abstract":"Combining multiple intrusion detection technologies into a hybrid system has been recently proposed to improve the comprehensive intrusion detection capability. However, such a hybrid system is not always stronger than its component detectors. Getting different detection technologies to interoperate effectively and efficiently has become a major challenge when building operational intrusion detection systems (IDS's). In this paper, we propose a novel reward system model in order to increase the accuracy and reliability of hybrid IDS's. In particular, the proposed confidence-based reward system built within a reinforcement learning algorithm includes three components. Namely, a relative discount factor, a confidence extraction technique, and a unique reward computing algorithm. The preliminary case studies show that the proposed reward system has a potential to improve the anomaly detection accuracy, decrease false alarm rate, and improve adaptability to new network traffic.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125351056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00055
Shadi Esnaashari, L. Gardner, Michael Rehm
Identifying students' learning behavior is very important in giving insights to the lecturer. Tracking data from 102 university students' in class and out of class have been investigated to find a different pattern in their learning process. Our aim was to group the students based on their activities in their class and their performance on the final exam. Data from students' answers to the regular quizzes were used at the end of online modules, internal test, and tournament questions. A clustering algorithm has been applied to the students' data to group them with similar performance and scores. Four different groups of students have been identified. The results revealed that students who were more active and participated more in activities achieved better scores on their final exam.
{"title":"Characterizing Students' Behavior Based on their Participation in Property Course in New Zealand","authors":"Shadi Esnaashari, L. Gardner, Michael Rehm","doi":"10.1109/WAINA.2018.00055","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00055","url":null,"abstract":"Identifying students' learning behavior is very important in giving insights to the lecturer. Tracking data from 102 university students' in class and out of class have been investigated to find a different pattern in their learning process. Our aim was to group the students based on their activities in their class and their performance on the final exam. Data from students' answers to the regular quizzes were used at the end of online modules, internal test, and tournament questions. A clustering algorithm has been applied to the students' data to group them with similar performance and scores. Four different groups of students have been identified. The results revealed that students who were more active and participated more in activities achieved better scores on their final exam.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00137
Jianhua Yang, Yongzhong Zhang, R. King, T. Tolbert
Since stepping-stones were widely used to launch attacks over the targets in the Internet, many approaches have been developed to detect stepping-stone intrusion. We found that most of the approaches need to sniff and analyze computer network traffic to detect stepping-stone intrusion. In this paper, we introduce how to make a code to sniff TCP/IP packet. But some intruders can evade detection using TCP/IP session manipulation, such as chaff-perturbation. In order to help researchers understand how a session is manipulated and develop more advanced approaches not only detecting stepping-stone intrusion, but also resisting intruders' manipulation, we present a tool Fragroute which can be used to inject meaningless packets into a TCP/IP session across the Internet.
{"title":"Sniffing and Chaffing Network Traffic in Stepping-Stone Intrusion Detection","authors":"Jianhua Yang, Yongzhong Zhang, R. King, T. Tolbert","doi":"10.1109/WAINA.2018.00137","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00137","url":null,"abstract":"Since stepping-stones were widely used to launch attacks over the targets in the Internet, many approaches have been developed to detect stepping-stone intrusion. We found that most of the approaches need to sniff and analyze computer network traffic to detect stepping-stone intrusion. In this paper, we introduce how to make a code to sniff TCP/IP packet. But some intruders can evade detection using TCP/IP session manipulation, such as chaff-perturbation. In order to help researchers understand how a session is manipulated and develop more advanced approaches not only detecting stepping-stone intrusion, but also resisting intruders' manipulation, we present a tool Fragroute which can be used to inject meaningless packets into a TCP/IP session across the Internet.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122379694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00112
G. Horn, Pawel Skrzypek
Cross Cloud deployment of applications allows for many additional benefits, like using the best Cloud provider for a given application component, increasing the reliability owing to the diversification of Cloud providers, and providing additional elasticity and capacity. On the other side, in practical applications, it is currently very difficult to properly plan and optimise the architecture of the application for cross Cloud deployment. Different Cloud providers uses different types of infrastructure, making direct comparisons difficult. Additionally, the requirements of the application could change over time and according to the application's execution context, workload, users, and many other aspects. This paper presents the fundamentals of the MELODIC solution based on a high level model of the application and dynamic, Cloud provider agnostic optimised deployment and reconfiguration of the application.
{"title":"MELODIC: Utility Based Cross Cloud Deployment Optimisation","authors":"G. Horn, Pawel Skrzypek","doi":"10.1109/WAINA.2018.00112","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00112","url":null,"abstract":"Cross Cloud deployment of applications allows for many additional benefits, like using the best Cloud provider for a given application component, increasing the reliability owing to the diversification of Cloud providers, and providing additional elasticity and capacity. On the other side, in practical applications, it is currently very difficult to properly plan and optimise the architecture of the application for cross Cloud deployment. Different Cloud providers uses different types of infrastructure, making direct comparisons difficult. Additionally, the requirements of the application could change over time and according to the application's execution context, workload, users, and many other aspects. This paper presents the fundamentals of the MELODIC solution based on a high level model of the application and dynamic, Cloud provider agnostic optimised deployment and reconfiguration of the application.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124509920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00161
Hsing-Chung Chen, Shyi-Shiun Kuo, Hanwen Chen
Due to the popularity of multimedia and constantly growing capacity of network, digital media demanding is increasingly high in last decade. The digital media with copyrighted contents, such as pictures, videos, audios, and 3D-model materials, etc., are more important in today's e-commerce. In recent years, the digital media content service by using OTT (over-the-top) platform is an emerging e-commerce model. The traditional website of the digital media content (DMC) always provides the transaction platform for both content producer and content provider to upload their DMC products. Then, clients (consumers) could browse their interesting products on the website, and download DMCs after payment. However, the transaction of these copyrighted DMCs on the platform is still carried out by means of the traditional payment, e.g. credit cards, debit cards and the ACH (Automated Clearing House). This paper proposes an innovative secure private OTT (p-OTT) platform in which the transaction process could deal with the credible and customizable services by adopting blockchain technology. One of the key features of the blockchain technique is smart contract. Thus, each DMC product could be pre-defined a template of data contract. After negotiation process by using the smart contract, the real data contract (RDC) will be created and outputted by smart contract. According to the predefined template of data contract, the content producer or provider could easily implement his transaction policy. In addition, we design an online authentication key for each member and a shadow key pair for each booked DMC during a transaction period. Therefore, this paper presents a secure OTT model with blockchain technology. Finally, we shows that it is not only a secure OTT platform but also a flexible transaction via preforming smart contract.
{"title":"Secure OTT Service Scheme Based on Blockchain Technology","authors":"Hsing-Chung Chen, Shyi-Shiun Kuo, Hanwen Chen","doi":"10.1109/WAINA.2018.00161","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00161","url":null,"abstract":"Due to the popularity of multimedia and constantly growing capacity of network, digital media demanding is increasingly high in last decade. The digital media with copyrighted contents, such as pictures, videos, audios, and 3D-model materials, etc., are more important in today's e-commerce. In recent years, the digital media content service by using OTT (over-the-top) platform is an emerging e-commerce model. The traditional website of the digital media content (DMC) always provides the transaction platform for both content producer and content provider to upload their DMC products. Then, clients (consumers) could browse their interesting products on the website, and download DMCs after payment. However, the transaction of these copyrighted DMCs on the platform is still carried out by means of the traditional payment, e.g. credit cards, debit cards and the ACH (Automated Clearing House). This paper proposes an innovative secure private OTT (p-OTT) platform in which the transaction process could deal with the credible and customizable services by adopting blockchain technology. One of the key features of the blockchain technique is smart contract. Thus, each DMC product could be pre-defined a template of data contract. After negotiation process by using the smart contract, the real data contract (RDC) will be created and outputted by smart contract. According to the predefined template of data contract, the content producer or provider could easily implement his transaction policy. In addition, we design an online authentication key for each member and a shadow key pair for each booked DMC during a transaction period. Therefore, this paper presents a secure OTT model with blockchain technology. Finally, we shows that it is not only a secure OTT platform but also a flexible transaction via preforming smart contract.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132493007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00122
Lorenzo Carnevale, A. Celesti, A. Galletta, S. Dustdar, M. Villari
The latest technological and conceptual developments have destroyed the centralized Cloud Computing model, moving Cloud services in emerging ICT infrastructures such as Edge, Fog and Internet of Things (IoT) that are closer to end users. Specifically, current Cloud computing programming models and resource orchestration techniques are challenged by the recent evolution of the IoT phenomenon because smart devices are becoming more and more pervasive, powerful and inexpensive. Therefore, services need to be place near such devices. In this regard, the Osmotic Computing aims to provide a new computing paradigm based on the deployment and migration strategies related to the infrastructures and applications requirements across Cloud, Edge, Fog an IoT layers. In this scientific paper, we investigate the Smart Orchestration of a new software abstraction called MicroELement (MEL), that encapsulates resources, services and data necessary to run IoT applications. Several use cases are presented for describing the Artificial Intelligence processes that enables the MELs deployment.
{"title":"From the Cloud to Edge and IoT: a Smart Orchestration Architecture for Enabling Osmotic Computing","authors":"Lorenzo Carnevale, A. Celesti, A. Galletta, S. Dustdar, M. Villari","doi":"10.1109/WAINA.2018.00122","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00122","url":null,"abstract":"The latest technological and conceptual developments have destroyed the centralized Cloud Computing model, moving Cloud services in emerging ICT infrastructures such as Edge, Fog and Internet of Things (IoT) that are closer to end users. Specifically, current Cloud computing programming models and resource orchestration techniques are challenged by the recent evolution of the IoT phenomenon because smart devices are becoming more and more pervasive, powerful and inexpensive. Therefore, services need to be place near such devices. In this regard, the Osmotic Computing aims to provide a new computing paradigm based on the deployment and migration strategies related to the infrastructures and applications requirements across Cloud, Edge, Fog an IoT layers. In this scientific paper, we investigate the Smart Orchestration of a new software abstraction called MicroELement (MEL), that encapsulates resources, services and data necessary to run IoT applications. Several use cases are presented for describing the Artificial Intelligence processes that enables the MELs deployment.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133381412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-16DOI: 10.1109/WAINA.2018.00120
Ivan Martinez, J. Montero, T. Lobo, B. D. Martino, Salvatore D'Angelo, A. Esposito
In order to reduce the initial investments needed by small and medium enterprises (SMEs) to acquire the necessary expertise, hardware and software to run proper Big Data Analytics, TOREADOR proposes a Big Data Analytics framework which supports users in devising their own Big Data solutions by keeping the inherent costs at a minimum. Among the objectives of the TOREADOR framework is supporting developers in parallelizing and deploying their algorithms, in order to develop they own analytics solutions. This paper describes the Code-Based approach, developed by CINI and adopted within the TOREADOR framework to parallelize users' algorithms and deploy them on distributed platforms, with a focus on its integration with the web services and resources offered by ATOS for the actual deployment of the solution.
{"title":"Parallelization and Deployment of Big Data Algorithms: The TOREADOR Approach","authors":"Ivan Martinez, J. Montero, T. Lobo, B. D. Martino, Salvatore D'Angelo, A. Esposito","doi":"10.1109/WAINA.2018.00120","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00120","url":null,"abstract":"In order to reduce the initial investments needed by small and medium enterprises (SMEs) to acquire the necessary expertise, hardware and software to run proper Big Data Analytics, TOREADOR proposes a Big Data Analytics framework which supports users in devising their own Big Data solutions by keeping the inherent costs at a minimum. Among the objectives of the TOREADOR framework is supporting developers in parallelizing and deploying their algorithms, in order to develop they own analytics solutions. This paper describes the Code-Based approach, developed by CINI and adopted within the TOREADOR framework to parallelize users' algorithms and deploy them on distributed platforms, with a focus on its integration with the web services and resources offered by ATOS for the actual deployment of the solution.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131626650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}