首页 > 最新文献

Int. J. Networked Distributed Comput.最新文献

英文 中文
Jade: Reducing Energy Consumption of Android App Jade:降低Android应用的能耗
Pub Date : 2015-08-01 DOI: 10.2991/ijndc.2015.3.3.2
Hao Qian, Daniel Andresen
The need for increased performance of mobile device directly conflicts with the desire for longer battery life. Offloading computation to multiple devices is an effective method to reduce energy consumption and enhance performance for mobile applications. Android provides mechanisms for creating mobile applications but lacks a native scheduling system for determining where code should be executed. This paper presents Jade, a system that adds sophisticated energy-aware computation offloading capabilities to Android apps. Jade monitors device and application status and automatically decides where code should be executed. Jade dynamically adjusts offloading strategy by adapting to workload variation, communication costs, and energy status in a distributed network of Android and non-Android devices. Jade minimizes the burden on developers to build applications with computation offloading ability by providing easy-to-use Jade API. Evaluation shows that Jade can effectively reduce up to 39% of average power consumption for mobile application while improving application performance.
提高移动设备性能的需求与延长电池寿命的愿望直接冲突。对于移动应用来说,将计算任务分散到多个设备上是降低能耗和提高性能的有效方法。Android提供了创建移动应用程序的机制,但缺乏一个本地调度系统来决定代码应该在哪里执行。本文介绍了Jade,一个为Android应用程序增加复杂的能量感知计算卸载功能的系统。Jade监视设备和应用程序状态,并自动决定应该在哪里执行代码。Jade通过适应Android和非Android设备分布式网络中的工作负载变化、通信成本和能源状态来动态调整卸载策略。通过提供易于使用的Jade API, Jade将开发人员构建具有计算卸载能力的应用程序的负担降至最低。评估表明,Jade可以有效降低移动应用程序的平均功耗高达39%,同时提高应用程序的性能。
{"title":"Jade: Reducing Energy Consumption of Android App","authors":"Hao Qian, Daniel Andresen","doi":"10.2991/ijndc.2015.3.3.2","DOIUrl":"https://doi.org/10.2991/ijndc.2015.3.3.2","url":null,"abstract":"The need for increased performance of mobile device directly conflicts with the desire for longer battery life. Offloading computation to multiple devices is an effective method to reduce energy consumption and enhance performance for mobile applications. Android provides mechanisms for creating mobile applications but lacks a native scheduling system for determining where code should be executed. This paper presents Jade, a system that adds sophisticated energy-aware computation offloading capabilities to Android apps. Jade monitors device and application status and automatically decides where code should be executed. Jade dynamically adjusts offloading strategy by adapting to workload variation, communication costs, and energy status in a distributed network of Android and non-Android devices. Jade minimizes the burden on developers to build applications with computation offloading ability by providing easy-to-use Jade API. Evaluation shows that Jade can effectively reduce up to 39% of average power consumption for mobile application while improving application performance.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114016351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Secure in-vehicle Systems using Authentication 使用身份验证保护车载系统
Pub Date : 2015-08-01 DOI: 10.2991/ijndc.2015.3.3.3
M. Yoshikawa, K. Sugioka, Y. Nozaki, K. Asahi
Recently, driving support technologies have been practically used. However, a problem has been pointed out that when a vehicle is connected with an external network, the safety of the vehicle is threatened. Ensuring the security of in-vehicle systems becomes an important priority. The present study proposes a CAN communications method that uses a lightweight block cipher to realize secure in-vehicle systems. Experiments using both FPGA and a radiocontrolled car verify the proposed method.
近年来,驱动支撑技术已被实际应用。然而,一个问题被指出,当车辆与外部网络连接时,车辆的安全受到威胁。确保车载系统的安全成为当务之急。本研究提出了一种使用轻量级分组密码实现安全车载系统的CAN通信方法。通过FPGA和无线遥控小车的实验验证了该方法的有效性。
{"title":"Secure in-vehicle Systems using Authentication","authors":"M. Yoshikawa, K. Sugioka, Y. Nozaki, K. Asahi","doi":"10.2991/ijndc.2015.3.3.3","DOIUrl":"https://doi.org/10.2991/ijndc.2015.3.3.3","url":null,"abstract":"Recently, driving support technologies have been practically used. However, a problem has been pointed out that when a vehicle is connected with an external network, the safety of the vehicle is threatened. Ensuring the security of in-vehicle systems becomes an important priority. The present study proposes a CAN communications method that uses a lightweight block cipher to realize secure in-vehicle systems. Experiments using both FPGA and a radiocontrolled car verify the proposed method.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134111904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Load Balancing of Peer-to-Peer MMORPG Systems with Hierarchical Area-of-Interest Management 基于分层兴趣区域管理的点对点MMORPG系统负载均衡
Pub Date : 2015-08-01 DOI: 10.2991/ijndc.2015.3.3.5
S. Fujita
This paper studies the load balancing problem in distributed systems designed for massively multiplayer online role-playing games (MMORPGs). More concretely, we consider a distributed system of masterworker type in which each worker is associated with a particular region in the game field, and propose a scheme to balance the load of workers as much as possible. The basic idea of the proposed scheme is to dynamically adjust the number of workers associated with each region according to the number of players in the region. The performance of the scheme is evaluated by simulation. The simulation results indicate that it reduces the response time of a previous scheme proposed by Yu et al. by about 50%, which varies depending on the mobility pattern of the players.
本文研究了大型多人在线角色扮演游戏(mmorpg)分布式系统中的负载平衡问题。更具体地说,我们考虑了一个主工类型的分布式系统,其中每个工人与游戏场中的特定区域相关联,并提出了一个尽可能平衡工人负载的方案。该方案的基本思想是根据区域内玩家的数量动态调整与每个区域相关联的工人数量。通过仿真验证了该方案的性能。仿真结果表明,与Yu等人先前提出的方案相比,该方案的响应时间缩短了约50%,响应时间随参与者的移动模式而变化。
{"title":"Load Balancing of Peer-to-Peer MMORPG Systems with Hierarchical Area-of-Interest Management","authors":"S. Fujita","doi":"10.2991/ijndc.2015.3.3.5","DOIUrl":"https://doi.org/10.2991/ijndc.2015.3.3.5","url":null,"abstract":"This paper studies the load balancing problem in distributed systems designed for massively multiplayer online role-playing games (MMORPGs). More concretely, we consider a distributed system of masterworker type in which each worker is associated with a particular region in the game field, and propose a scheme to balance the load of workers as much as possible. The basic idea of the proposed scheme is to dynamically adjust the number of workers associated with each region according to the number of players in the region. The performance of the scheme is evaluated by simulation. The simulation results indicate that it reduces the response time of a previous scheme proposed by Yu et al. by about 50%, which varies depending on the mobility pattern of the players.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114192983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Effective Management of ReRAM-based Hybrid SSD for Multiple Node HDFS 基于reram的多节点HDFS混合SSD的有效管理
Pub Date : 2015-08-01 DOI: 10.2991/ijndc.2015.3.3.4
N. Park, B. Lee, K. Kim, H. Youn
Recently, the research of Hybrid ReRAM/MLC NAND SSD is rapidly expanding into the storage areas. Most existing researches of Hybrid SSD are based on a single storage, while the management of multiple nodes like HDFS is still immature. In this paper a new efficient cold data eviction scheme is proposed which is based on node congestion probability. Computer simulation reveals that the proposed scheme significantly reduces replication and recovery time in comparison to the existing replication schemes.
近年来,ReRAM/MLC混合NAND固态硬盘的研究正迅速扩展到存储领域。现有的Hybrid SSD研究大多是基于单个存储,而像HDFS这样的多节点管理还不成熟。本文提出了一种基于节点拥塞概率的高效冷数据剔除方案。计算机仿真表明,与现有的复制方案相比,该方案显著缩短了复制和恢复时间。
{"title":"Effective Management of ReRAM-based Hybrid SSD for Multiple Node HDFS","authors":"N. Park, B. Lee, K. Kim, H. Youn","doi":"10.2991/ijndc.2015.3.3.4","DOIUrl":"https://doi.org/10.2991/ijndc.2015.3.3.4","url":null,"abstract":"Recently, the research of Hybrid ReRAM/MLC NAND SSD is rapidly expanding into the storage areas. Most existing researches of Hybrid SSD are based on a single storage, while the management of multiple nodes like HDFS is still immature. In this paper a new efficient cold data eviction scheme is proposed which is based on node congestion probability. Computer simulation reveals that the proposed scheme significantly reduces replication and recovery time in comparison to the existing replication schemes.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130377647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contour Completion of Partly Occluded Objects Based on Figural Goodness 基于图形良度的部分遮挡物体轮廓补全
Pub Date : 2015-08-01 DOI: 10.2991/ijndc.2015.3.3.6
Takahiro Hayashi, Tatsuya Ooi, Motoki Sasaki
Object extraction has a crucial role in various visual semantic scenarios. In this paper, we propose a system for object extraction which can deal with an object partly occluded by other objects. In order to estimate the hidden part of the occluded object, the system combines different types of contour completion methods such as curve completion and symmetry completion. The system is composed of two modules: contour discrimination and contour completion. The contour discrimination module separates the contour of the occluded object from the contours of the occluding objects. To the contour of the occluded object, the contour completion module applies different types of contour completion algorithms to generate various completion patterns. Based on the perceptual model of figural goodness, the system computes the figural goodness scores of the generated patterns, where the simplicity and symmetricity are evaluated. Finally, the system outputs the pattern having the highest score as a result of the object extraction. From the experimental results, we have confirmed that the figural goodness model works effectively for extracting partly occluded objects.
对象提取在各种视觉语义场景中起着至关重要的作用。本文提出了一种能够处理被其他物体部分遮挡的物体的目标提取系统。为了估计被遮挡物体的隐藏部分,该系统结合了曲线补全和对称补全等不同类型的轮廓补全方法。该系统由轮廓判别和轮廓补全两个模块组成。轮廓识别模块将被遮挡物体的轮廓与被遮挡物体的轮廓分离。对于被遮挡物体的轮廓,轮廓补全模块采用不同类型的轮廓补全算法,生成各种补全模式。基于图形良度的感知模型,系统计算生成图案的图形良度分数,其中评估简单性和对称性。最后,系统输出得分最高的模式作为对象提取的结果。实验结果表明,图像良度模型可以有效地提取部分遮挡目标。
{"title":"Contour Completion of Partly Occluded Objects Based on Figural Goodness","authors":"Takahiro Hayashi, Tatsuya Ooi, Motoki Sasaki","doi":"10.2991/ijndc.2015.3.3.6","DOIUrl":"https://doi.org/10.2991/ijndc.2015.3.3.6","url":null,"abstract":"Object extraction has a crucial role in various visual semantic scenarios. In this paper, we propose a system for object extraction which can deal with an object partly occluded by other objects. In order to estimate the hidden part of the occluded object, the system combines different types of contour completion methods such as curve completion and symmetry completion. The system is composed of two modules: contour discrimination and contour completion. The contour discrimination module separates the contour of the occluded object from the contours of the occluding objects. To the contour of the occluded object, the contour completion module applies different types of contour completion algorithms to generate various completion patterns. Based on the perceptual model of figural goodness, the system computes the figural goodness scores of the generated patterns, where the simplicity and symmetricity are evaluated. Finally, the system outputs the pattern having the highest score as a result of the object extraction. From the experimental results, we have confirmed that the figural goodness model works effectively for extracting partly occluded objects.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130112627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A GPU-Based Pencil Beam Algorithm for Dose Calculations in Proton Radiation Therapy 基于gpu的质子放射治疗剂量计算铅笔束算法
Pub Date : 2015-06-01 DOI: 10.1007/978-3-319-23509-7_2
G. Kalantzis, T. Leventouri, H. Tachibana, C. Shang
{"title":"A GPU-Based Pencil Beam Algorithm for Dose Calculations in Proton Radiation Therapy","authors":"G. Kalantzis, T. Leventouri, H. Tachibana, C. Shang","doi":"10.1007/978-3-319-23509-7_2","DOIUrl":"https://doi.org/10.1007/978-3-319-23509-7_2","url":null,"abstract":"","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125461371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Scenarios for An RFID Tag Ownership Transfer Protocol for A Closed Loop System 闭环系统中RFID标签所有权转移协议的应用场景
Pub Date : 2015-04-01 DOI: 10.2991/ijndc.2015.3.2.7
Ghaith Khalil, B. Ray, M. Chowdhury
In RFID system a tag is attached to an object which might own by a number of owners during its life time. This requires the RFID system to transfer ownership of the tag to its new owner. The ownership transfer has to protect privacy of current and new owner. Many ownership tag ownership transfer exists in the literature, however, most of them are impractical or insecure to implement on current passive RFID tags. We are proposing a timer based ownership transfer protocol for closed loop RFID systems. The proposal in this paper includes two implement scenario to cover diverse tags type. The protocol will ensure security and privacy of involved parties in the idle circumstances. Our comparison shows that the proposed protocol is more secure and practical than existing similar ones.
在RFID系统中,一个标签附着在一个物体上,该物体在其生命周期内可能由多个所有者拥有。这需要RFID系统将标签的所有权转移给新的所有者。所有权转让必须保护现有和新所有者的隐私。文献中存在许多所有权标签所有权转移,然而,它们中的大多数在当前无源RFID标签上实现是不切实际或不安全的。我们提出了一个基于定时器的闭环RFID系统所有权转移协议。本文的提案包括两个实现方案,以涵盖不同的标签类型。该协议将在空闲情况下确保相关方的安全和隐私。比较表明,所提出的协议比现有的同类协议具有更高的安全性和实用性。
{"title":"Scenarios for An RFID Tag Ownership Transfer Protocol for A Closed Loop System","authors":"Ghaith Khalil, B. Ray, M. Chowdhury","doi":"10.2991/ijndc.2015.3.2.7","DOIUrl":"https://doi.org/10.2991/ijndc.2015.3.2.7","url":null,"abstract":"In RFID system a tag is attached to an object which might own by a number of owners during its life time. This requires the RFID system to transfer ownership of the tag to its new owner. The ownership transfer has to protect privacy of current and new owner. Many ownership tag ownership transfer exists in the literature, however, most of them are impractical or insecure to implement on current passive RFID tags. We are proposing a timer based ownership transfer protocol for closed loop RFID systems. The proposal in this paper includes two implement scenario to cover diverse tags type. The protocol will ensure security and privacy of involved parties in the idle circumstances. Our comparison shows that the proposed protocol is more secure and practical than existing similar ones.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122529605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Optimal Number of Clusters for Fast Similarity Search Considering Transformations of Time Varying Data 考虑时变数据变换的快速相似搜索的最优聚类数
Pub Date : 2015-04-01 DOI: 10.2991/ijndc.2015.3.2.2
Toshiichiro Iwashita, T. Hochin, Hiroki Nomiya
This paper proposes a method of determining the optimal number of clusters dividing the multiple transformations for the purpose of the efficient processing of query against the results of applying the transformations to time series. In this paper, the moving average is used as a transformation for simplicity. The model of query time to the number of clusters is constructed for determining the optimal number of clusters. As the query time could be represented with the concave function of the number of clusters, it is shown that the optimal number of clusters for the best query time can be obtained. The verification experiment confirms the validity of the model constructed. It is revealed that the optimal number of clusters could be determined by the times obtained from a single query execution.
本文提出了一种确定划分多个变换的最优簇数的方法,目的是根据时间序列的变换结果高效地处理查询。为了简单起见,本文使用移动平均作为变换。为了确定最优簇数,建立了查询时间与簇数的关系模型。由于查询时间可以用簇数的凹函数表示,因此可以得到最佳查询时间下的最优簇数。验证实验证实了所构建模型的有效性。结果表明,集群的最优数量可以由单个查询执行的次数决定。
{"title":"Optimal Number of Clusters for Fast Similarity Search Considering Transformations of Time Varying Data","authors":"Toshiichiro Iwashita, T. Hochin, Hiroki Nomiya","doi":"10.2991/ijndc.2015.3.2.2","DOIUrl":"https://doi.org/10.2991/ijndc.2015.3.2.2","url":null,"abstract":"This paper proposes a method of determining the optimal number of clusters dividing the multiple transformations for the purpose of the efficient processing of query against the results of applying the transformations to time series. In this paper, the moving average is used as a transformation for simplicity. The model of query time to the number of clusters is constructed for determining the optimal number of clusters. As the query time could be represented with the concave function of the number of clusters, it is shown that the optimal number of clusters for the best query time can be obtained. The verification experiment confirms the validity of the model constructed. It is revealed that the optimal number of clusters could be determined by the times obtained from a single query execution.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128334901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Human Activity Recognition in WSN: A Comparative Study 无线传感器网络中人类活动识别的比较研究
Pub Date : 2014-11-01 DOI: 10.2991/ijndc.2014.2.4.3
M. A. Awan, Guangbin Zheng, Cheong-Ghil Kim, Shin-Dug Kim
Human activity recognition is an emerging field of ubiquitous and pervasive computing. Although recent smartphones have powerful resources, the execution of machine learning algorithms on a large amount of data is still a burden on smartphones. Three major factors including; classification algorithm, data feature, and smartphone position influence the recognition accuracy and time. In this paper, we present a comparative study of six classification algorithms, six data features, and four different positions that are most commonly used in the recognition process using smartphone accelerometer. This analysis can be used to select any specific classification algorithm, data feature, and smartphone position for human activity recognition in terms of accuracy and response time. The methodology we used is composed of two major components; a data collector, and a classifier. A set of eleven activities of daily living, four different positions for data collection and ten volunteers contributed to make it a worth-full comparative study. Results show that K-Nearest Neighbor and J48 algorithms performed well both in terms of time and accuracy irrespective of data features whereas the performance of other algorithms is dependent on the selected data features. Similarly, mean and mode features gave good results in terms of accuracy irrespective of the classification algorithm. A short version of the paper has already been presented at ICIS 2014.
人类活动识别是一个新兴的普适计算领域。尽管最近的智能手机拥有强大的资源,但在大量数据上执行机器学习算法仍然是智能手机的负担。三个主要因素包括;分类算法、数据特征和智能手机位置影响识别的准确性和时间。本文对智能手机加速度计识别过程中最常用的六种分类算法、六种数据特征和四种不同位置进行了比较研究。该分析可用于选择任何特定的分类算法、数据特征和智能手机位置,以便在准确性和响应时间方面进行人类活动识别。我们使用的方法由两个主要部分组成;一个数据收集器和一个分类器。一组11项日常生活活动,4个不同位置的数据收集和10名志愿者的贡献使其成为一个有价值的比较研究。结果表明,无论数据特征如何,k -最近邻算法和J48算法在时间和精度方面都表现良好,而其他算法的性能取决于所选择的数据特征。同样,无论采用何种分类算法,均值和模式特征在准确率方面都给出了很好的结果。该论文的简短版本已经在ICIS 2014上展示。
{"title":"Human Activity Recognition in WSN: A Comparative Study","authors":"M. A. Awan, Guangbin Zheng, Cheong-Ghil Kim, Shin-Dug Kim","doi":"10.2991/ijndc.2014.2.4.3","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.4.3","url":null,"abstract":"Human activity recognition is an emerging field of ubiquitous and pervasive computing. Although recent smartphones have powerful resources, the execution of machine learning algorithms on a large amount of data is still a burden on smartphones. Three major factors including; classification algorithm, data feature, and smartphone position influence the recognition accuracy and time. In this paper, we present a comparative study of six classification algorithms, six data features, and four different positions that are most commonly used in the recognition process using smartphone accelerometer. This analysis can be used to select any specific classification algorithm, data feature, and smartphone position for human activity recognition in terms of accuracy and response time. The methodology we used is composed of two major components; a data collector, and a classifier. A set of eleven activities of daily living, four different positions for data collection and ten volunteers contributed to make it a worth-full comparative study. Results show that K-Nearest Neighbor and J48 algorithms performed well both in terms of time and accuracy irrespective of data features whereas the performance of other algorithms is dependent on the selected data features. Similarly, mean and mode features gave good results in terms of accuracy irrespective of the classification algorithm. A short version of the paper has already been presented at ICIS 2014.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124357941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Fast Parallel Network Packet Filter System based on CUDA 基于CUDA的快速并行网络包过滤系统
Pub Date : 2014-11-01 DOI: 10.2991/ijndc.2014.2.4.1
C. Hung, Shih-Wei Guo
In recent years, with the rapid development of the network hardware and software, the network speed is enhanced to multi-gigabit. Network packet filtering is an important strategy of network security to avoid malicious attacks, and it is a computation-consuming application. Therefore, we develop two efficient GPGPU-based parallel packet classification approaches to filter packets by leveraging thousands of threads. The experiment results demonstrate that the computational efficiency of filtering packet can be significantly enhanced by using GPGPU.
近年来,随着网络硬件和软件的飞速发展,网络速度已提升到千兆级。网络包过滤是网络安全防范恶意攻击的重要策略,也是一种计算量较大的应用。因此,我们开发了两种高效的基于gpgpu的并行数据包分类方法,利用数千个线程来过滤数据包。实验结果表明,使用GPGPU可以显著提高包过滤的计算效率。
{"title":"Fast Parallel Network Packet Filter System based on CUDA","authors":"C. Hung, Shih-Wei Guo","doi":"10.2991/ijndc.2014.2.4.1","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.4.1","url":null,"abstract":"In recent years, with the rapid development of the network hardware and software, the network speed is enhanced to multi-gigabit. Network packet filtering is an important strategy of network security to avoid malicious attacks, and it is a computation-consuming application. Therefore, we develop two efficient GPGPU-based parallel packet classification approaches to filter packets by leveraging thousands of threads. The experiment results demonstrate that the computational efficiency of filtering packet can be significantly enhanced by using GPGPU.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130222611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Int. J. Networked Distributed Comput.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1