首页 > 最新文献

2022 IEEE 4th PhD Colloquium on Emerging Domain Innovation and Technology for Society (PhD EDITS)最新文献

英文 中文
Low-Complex & Low-Cost Hardware Modelling of DCVNS Scheme for IoT Applications 面向物联网应用的DCVNS方案低复杂低成本硬件建模
P. Majumder, Punyasha Chatterjee, A. Ghosh
In this paper, a low-complexity and low-cost hard-ware model of a novel source encoding scheme termed Dualmessage Compression with Variable Null Symbol (DCVNS) is presented. Our recommended DCVNS approach addresses the process of interleaving of message bits originating from different sources, or from different sensing times of the same source. This interleaved message’s two successive bits are encoded and rendered by one of four symbol values, leading in a twofold reduction in the overall message length. Because Silent Communication is being used, the transmitter is maintained in deep-sleep state throughout the interim time of the high frequent dominant symbol appearing in the source-coded message during transmission. Our proposed design shows the hardware detail about the selection of the most dominating symbol which is dynamic in nature. Furthermore, the transmitter employs lowcost hybrid modulation/demodulation features integrating noncoherent FSK and ASK, designed to work in low-power and cost-effective transmission mode. Our proposed model is extremely suitable for circumstances in which a receiver node collects temporal or spatial data from two sources and transfers it to a sink node in most of the smart IoT applications.
本文提出了一种低复杂度、低成本的新型源编码方案——可变空符号双消息压缩(DCVNS)的硬件模型。我们推荐的DCVNS方法解决了来自不同来源或来自同一来源的不同感知时间的消息位的交错过程。这个交错的消息的两个连续的比特被编码并由四个符号值中的一个呈现,导致整个消息长度减少了两倍。由于使用了静默通信,在传输过程中,在信源中出现高频优势符号的过渡时间内,发射机一直处于深度睡眠状态。我们提出的设计展示了硬件细节,即选择最主要的动态符号。此外,发射机采用低成本混合调制/解调特性,集成了非相干FSK和ASK,设计用于低功耗和经济高效的传输模式。我们提出的模型非常适用于接收节点从两个来源收集时间或空间数据并将其传输到大多数智能物联网应用中的接收节点的情况。
{"title":"Low-Complex & Low-Cost Hardware Modelling of DCVNS Scheme for IoT Applications","authors":"P. Majumder, Punyasha Chatterjee, A. Ghosh","doi":"10.1109/PhDEDITS56681.2022.9955293","DOIUrl":"https://doi.org/10.1109/PhDEDITS56681.2022.9955293","url":null,"abstract":"In this paper, a low-complexity and low-cost hard-ware model of a novel source encoding scheme termed Dualmessage Compression with Variable Null Symbol (DCVNS) is presented. Our recommended DCVNS approach addresses the process of interleaving of message bits originating from different sources, or from different sensing times of the same source. This interleaved message’s two successive bits are encoded and rendered by one of four symbol values, leading in a twofold reduction in the overall message length. Because Silent Communication is being used, the transmitter is maintained in deep-sleep state throughout the interim time of the high frequent dominant symbol appearing in the source-coded message during transmission. Our proposed design shows the hardware detail about the selection of the most dominating symbol which is dynamic in nature. Furthermore, the transmitter employs lowcost hybrid modulation/demodulation features integrating noncoherent FSK and ASK, designed to work in low-power and cost-effective transmission mode. Our proposed model is extremely suitable for circumstances in which a receiver node collects temporal or spatial data from two sources and transfers it to a sink node in most of the smart IoT applications.","PeriodicalId":373652,"journal":{"name":"2022 IEEE 4th PhD Colloquium on Emerging Domain Innovation and Technology for Society (PhD EDITS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133733547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key generation in Cryptography using graph labeling techniques 使用图标记技术的密码学密钥生成
Dhanyashree, Shivapriya. P, K. Meera
Key generation for Cryptographic algorithms is a challenging task. The Triple DES algorithm is one such important algorithm and this extended abstract deals with the concept of key generation for this algorithm using the path coloring of a star graph.
密码算法的密钥生成是一项具有挑战性的任务。Triple DES算法就是这样一种重要的算法,本扩展摘要讨论了该算法使用星图的路径着色来生成密钥的概念。
{"title":"Key generation in Cryptography using graph labeling techniques","authors":"Dhanyashree, Shivapriya. P, K. Meera","doi":"10.1109/PhDEDITS56681.2022.9955279","DOIUrl":"https://doi.org/10.1109/PhDEDITS56681.2022.9955279","url":null,"abstract":"Key generation for Cryptographic algorithms is a challenging task. The Triple DES algorithm is one such important algorithm and this extended abstract deals with the concept of key generation for this algorithm using the path coloring of a star graph.","PeriodicalId":373652,"journal":{"name":"2022 IEEE 4th PhD Colloquium on Emerging Domain Innovation and Technology for Society (PhD EDITS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116807637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DAAL: A Deep Aggregated Assemble Learning Model for detecting Epileptic patients from EEG 一种用于脑电图检测癫痫患者的深度聚合集合学习模型
Sricheta Parui, Uttam Ghosh, Puspita Chatterjee, Deborsi Basu
In this study, we developed a Deep Aggregated Assemble Learning(DAAL) model to diagnose Epilepsy that uses two-step learning and generates the final prediction utilizing the output predictions of the level 0 classifier model. In level 0 CNN, RNN and ANN model has been used, and then a prediction algorithm has been used which predicts the final output from each of the probability vector coming from each model.
在这项研究中,我们开发了一个深度聚合组装学习(DAAL)模型来诊断癫痫,该模型使用两步学习,并利用0级分类器模型的输出预测生成最终预测。在0级CNN中,首先使用RNN和ANN模型,然后使用一种预测算法来预测来自每个模型的每个概率向量的最终输出。
{"title":"DAAL: A Deep Aggregated Assemble Learning Model for detecting Epileptic patients from EEG","authors":"Sricheta Parui, Uttam Ghosh, Puspita Chatterjee, Deborsi Basu","doi":"10.1109/PhDEDITS56681.2022.9955308","DOIUrl":"https://doi.org/10.1109/PhDEDITS56681.2022.9955308","url":null,"abstract":"In this study, we developed a Deep Aggregated Assemble Learning(DAAL) model to diagnose Epilepsy that uses two-step learning and generates the final prediction utilizing the output predictions of the level 0 classifier model. In level 0 CNN, RNN and ANN model has been used, and then a prediction algorithm has been used which predicts the final output from each of the probability vector coming from each model.","PeriodicalId":373652,"journal":{"name":"2022 IEEE 4th PhD Colloquium on Emerging Domain Innovation and Technology for Society (PhD EDITS)","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133334645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Radio mean labeled paths in Cryptography 在密码学中,无线电表示标记路径
M. Saraswathi, K. Meera
Graph coloring or labeling is an NP-complete problem. The labeling technique in the scope of this paper is radio mean labeling. We integrate the radio mean labeling of graphs with the encryption/decryption process using matrices. An intruder can easily crack the secret message if the matrix or its inverse is known. The unique radio mean number of a graph is used to construct the key matrix for encryption. The inverse of this matrix is then the matrix for decryption. Out of all graphs of a given order, graphs isomorphic to path graphs have the maximum diameter. Since the mathematical constraint associated with the radio mean labeling of any given graph depends solely on the graph’s order and diameter, deriving the radio mean number of paths is difficult as order increases. Hence, we choose path graphs for constructing the key matrix for encryption.
图的着色或标记是一个np完全问题。本文研究的标记技术是无线电平均标记。我们将图的无线电平均标记与使用矩阵的加密/解密过程相结合。如果矩阵或它的逆矩阵是已知的,入侵者可以很容易地破解秘密信息。利用图的唯一无线电平均数来构造用于加密的密钥矩阵。这个矩阵的逆就是用于解密的矩阵。在给定阶数的所有图中,与路径图同构的图具有最大的直径。由于与任何给定图的无线电平均标记相关的数学约束仅取决于图的阶数和直径,因此随着阶数的增加,推导路径的无线电平均数量是困难的。因此,我们选择路径图来构造用于加密的密钥矩阵。
{"title":"Radio mean labeled paths in Cryptography","authors":"M. Saraswathi, K. Meera","doi":"10.1109/PhDEDITS56681.2022.9955298","DOIUrl":"https://doi.org/10.1109/PhDEDITS56681.2022.9955298","url":null,"abstract":"Graph coloring or labeling is an NP-complete problem. The labeling technique in the scope of this paper is radio mean labeling. We integrate the radio mean labeling of graphs with the encryption/decryption process using matrices. An intruder can easily crack the secret message if the matrix or its inverse is known. The unique radio mean number of a graph is used to construct the key matrix for encryption. The inverse of this matrix is then the matrix for decryption. Out of all graphs of a given order, graphs isomorphic to path graphs have the maximum diameter. Since the mathematical constraint associated with the radio mean labeling of any given graph depends solely on the graph’s order and diameter, deriving the radio mean number of paths is difficult as order increases. Hence, we choose path graphs for constructing the key matrix for encryption.","PeriodicalId":373652,"journal":{"name":"2022 IEEE 4th PhD Colloquium on Emerging Domain Innovation and Technology for Society (PhD EDITS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116441547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Maximum Hops Per Cycle On Network-on-Chip Router using Express Bypass Channels 每周期最大跳数对使用快速旁路通道的片上网络路由器的影响
Monika Katta, T. K. Ramesh, J. Plosila
We investigate the effect of maximum hops per cycle in a Network-on-Chip (NoC) router which uses Express Bypass Channels (EBC). To reduce transmission latency, NoC with EBC sends all bypass requests and flits at the same time. The flits are allowed to traverse both one-and two-dimension paths without getting latched in any of the routers. According to the simulation results, the transmission latency is reduced significantly even when only two nodes are permitted to be skipped using EBC.
我们研究了使用快速旁路通道(EBC)的片上网络(NoC)路由器中每周期最大跳数的影响。为了减少传输延迟,带有EBC的NoC同时发送所有bypass请求和flits。允许flits遍历一维和二维路径,而不会在任何路由器中被锁定。仿真结果表明,即使只允许使用EBC跳过两个节点,传输延迟也显著降低。
{"title":"Impact of Maximum Hops Per Cycle On Network-on-Chip Router using Express Bypass Channels","authors":"Monika Katta, T. K. Ramesh, J. Plosila","doi":"10.1109/PhDEDITS56681.2022.9955262","DOIUrl":"https://doi.org/10.1109/PhDEDITS56681.2022.9955262","url":null,"abstract":"We investigate the effect of maximum hops per cycle in a Network-on-Chip (NoC) router which uses Express Bypass Channels (EBC). To reduce transmission latency, NoC with EBC sends all bypass requests and flits at the same time. The flits are allowed to traverse both one-and two-dimension paths without getting latched in any of the routers. According to the simulation results, the transmission latency is reduced significantly even when only two nodes are permitted to be skipped using EBC.","PeriodicalId":373652,"journal":{"name":"2022 IEEE 4th PhD Colloquium on Emerging Domain Innovation and Technology for Society (PhD EDITS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126024365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An algorithm to find a dominating set that secures any connected graph G 一种求任意连通图G控制集的算法
Nayana P G, R. R. Iyer
A social network or any computer network is vulnerable to an attack on any one of its nodes. For the network to function efficiently and without delays, we need to protect the node under attack and ensure that the node functions even after the attack has occurred. A set of nodes is a secure dominating set if it can monitor every other node of the network and which can take over the functionality of a failing node in an emergency. We propose an algorithm to find the secure dominating set in any connected network or graph. As a case study, we examine a network of CCTV cameras.
社交网络或任何计算机网络的任何一个节点都容易受到攻击。为了使网络高效、无延迟地运行,我们需要保护被攻击的节点,并确保在攻击发生后节点仍能正常运行。如果一组节点能够监视网络中的所有其他节点,并且能够在紧急情况下接管故障节点的功能,则该节点集就是安全支配集。提出了一种求任意连通网络或图中的安全支配集的算法。作为一个案例研究,我们研究了一个闭路电视摄像机网络。
{"title":"An algorithm to find a dominating set that secures any connected graph G","authors":"Nayana P G, R. R. Iyer","doi":"10.1109/PhDEDITS56681.2022.9955299","DOIUrl":"https://doi.org/10.1109/PhDEDITS56681.2022.9955299","url":null,"abstract":"A social network or any computer network is vulnerable to an attack on any one of its nodes. For the network to function efficiently and without delays, we need to protect the node under attack and ensure that the node functions even after the attack has occurred. A set of nodes is a secure dominating set if it can monitor every other node of the network and which can take over the functionality of a failing node in an emergency. We propose an algorithm to find the secure dominating set in any connected network or graph. As a case study, we examine a network of CCTV cameras.","PeriodicalId":373652,"journal":{"name":"2022 IEEE 4th PhD Colloquium on Emerging Domain Innovation and Technology for Society (PhD EDITS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131014796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Application of Radio Geometric Mean labeling in Encoding and Decoding 无线电几何平均标记在编解码中的应用
B. T. Manjunath, K. Meera
Graph theory is an ocean of NP-hard problems, which can be easily adapted to cryptography. Keys for cryptographic algorithms are lengthy number sequences that are generated by random number generators. These generators follow a uniform distribution that is easy to retrieve by hackers, as any number has an equal chance of being generated. Using graph labeling techniques, one can generate these keys in a more efficient and faster way. In this work, technique involves a labeling type called Radio geometric mean labeling and Radio geometric mean labeled graph is used as the cipher graph. The receiver receives the encoded text in the form of vertex or edge sequence of the cipher graph, which is not easy for an intruder to hack, as the labeling technique itself is an NP-hard problem.
图论是np困难问题的海洋,可以很容易地适用于密码学。密码学算法的密钥是由随机数生成器生成的长数字序列。这些生成器遵循均匀分布,很容易被黑客获取,因为任何数字都有相同的生成机会。使用图形标记技术,可以以更有效和更快的方式生成这些键。在这项工作中,技术涉及一种称为无线电几何平均标记的标记类型,并使用无线电几何平均标记图作为密码图。接收方以密文的顶点序列或边序列的形式接收编码后的文本,由于标记技术本身就是一个np困难问题,因此入侵者不容易破解。
{"title":"An Application of Radio Geometric Mean labeling in Encoding and Decoding","authors":"B. T. Manjunath, K. Meera","doi":"10.1109/PhDEDITS56681.2022.9955274","DOIUrl":"https://doi.org/10.1109/PhDEDITS56681.2022.9955274","url":null,"abstract":"Graph theory is an ocean of NP-hard problems, which can be easily adapted to cryptography. Keys for cryptographic algorithms are lengthy number sequences that are generated by random number generators. These generators follow a uniform distribution that is easy to retrieve by hackers, as any number has an equal chance of being generated. Using graph labeling techniques, one can generate these keys in a more efficient and faster way. In this work, technique involves a labeling type called Radio geometric mean labeling and Radio geometric mean labeled graph is used as the cipher graph. The receiver receives the encoded text in the form of vertex or edge sequence of the cipher graph, which is not easy for an intruder to hack, as the labeling technique itself is an NP-hard problem.","PeriodicalId":373652,"journal":{"name":"2022 IEEE 4th PhD Colloquium on Emerging Domain Innovation and Technology for Society (PhD EDITS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115663525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Co-Secure Domination in Sierpinski Networks 共同安全控制在Sierpinski网络中的应用
M. P., R. R. Iyer
Security control is crucial in protecting a network from natural and human-made disasters. The theory of graph domination and its variants play a significant role in identifying the sensitive locations in a network where mobile guards have to be placed to protect the network nodes from the risk of attack. To ensure the network’s security, the physically weak or the attacked mobile guard at the node is to be replaced immediately by another guard so that the consequent set of guards continues to protect the network. The set of such nodes thus formed is a co-secure dominating set of the network, and least cardinality of the co-secure dominating set is the co-secure domination number. This article determines a tight bound for the co-secure domination number on the Generalized Sierpinski cycle graphs and Generalized Sierpinski complete graphs.
安全控制对于保护网络免受自然和人为灾害的影响至关重要。图支配理论及其变体在识别网络中的敏感位置方面发挥着重要作用,移动警卫必须放置在敏感位置以保护网络节点免受攻击风险。为了保证网络的安全,节点上身体虚弱或被攻击的移动警卫要立即被另一个警卫取代,这样后续的警卫就可以继续保护网络。这样形成的节点集就是网络的共同安全统治集,共同安全统治集的最小基数就是共同安全统治数。本文确定了广义Sierpinski循环图和广义Sierpinski完全图上的共安全控制数的紧界。
{"title":"Application of Co-Secure Domination in Sierpinski Networks","authors":"M. P., R. R. Iyer","doi":"10.1109/PhDEDITS56681.2022.9955305","DOIUrl":"https://doi.org/10.1109/PhDEDITS56681.2022.9955305","url":null,"abstract":"Security control is crucial in protecting a network from natural and human-made disasters. The theory of graph domination and its variants play a significant role in identifying the sensitive locations in a network where mobile guards have to be placed to protect the network nodes from the risk of attack. To ensure the network’s security, the physically weak or the attacked mobile guard at the node is to be replaced immediately by another guard so that the consequent set of guards continues to protect the network. The set of such nodes thus formed is a co-secure dominating set of the network, and least cardinality of the co-secure dominating set is the co-secure domination number. This article determines a tight bound for the co-secure domination number on the Generalized Sierpinski cycle graphs and Generalized Sierpinski complete graphs.","PeriodicalId":373652,"journal":{"name":"2022 IEEE 4th PhD Colloquium on Emerging Domain Innovation and Technology for Society (PhD EDITS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126967350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement Learning based Autoscaling for Kafka-centric Microservices in Kubernetes 基于强化学习的Kubernetes中以kafka为中心的微服务的自动伸缩
Josephine Eskaline Joyce, Shoney Sebastian
Microservices and Kafka have become a perfect match for enabling the Event-driven Architecture and this encourages microservices integration with various opensource platforms in the world of Cloud Native applications. Kubernetes is an opensource container orchestration platform, that can enable high availability, and scalability for Kafkacentric microservices. Kubernetes supports diverse autoscaling mechanisms like Horizontal Pod Autoscaler (HPA), Vertical Pod Autoscaler (VPA) and Cluster Autoscaler (CA). Among others, HPA automatically scales the number of pods based on the default Resource Metrics, which includes CPU and memory usage. With Prometheus integration, custom metrics for an application can be monitored. In a Kafkacentric microservices, processing time and speed depends on the number of messages published. There is a need for auto scaling policy which can be based on the number of messages processed. This paper proposes a new autoscaling policy, which scales Kafka-centric microservices deployed in an eventdriven deployment architecture, using a Reinforcement Learning model.
微服务和Kafka已经成为事件驱动架构的完美搭配,这鼓励微服务与云原生应用世界中的各种开源平台集成。Kubernetes是一个开源的容器编排平台,它可以为以kafkacentre为中心的微服务提供高可用性和可扩展性。Kubernetes支持多种自动缩放机制,如水平Pod自动缩放器(HPA),垂直Pod自动缩放器(VPA)和集群自动缩放器(CA)。其中,HPA根据默认的Resource Metrics(包括CPU和内存使用情况)自动缩放pod的数量。使用Prometheus集成,可以监视应用程序的自定义指标。在以kafka为中心的微服务中,处理时间和速度取决于发布的消息数量。需要基于处理的消息数量的自动伸缩策略。本文提出了一种新的自动扩展策略,该策略使用强化学习模型扩展部署在事件驱动部署架构中的以kafka为中心的微服务。
{"title":"Reinforcement Learning based Autoscaling for Kafka-centric Microservices in Kubernetes","authors":"Josephine Eskaline Joyce, Shoney Sebastian","doi":"10.1109/PhDEDITS56681.2022.9955300","DOIUrl":"https://doi.org/10.1109/PhDEDITS56681.2022.9955300","url":null,"abstract":"Microservices and Kafka have become a perfect match for enabling the Event-driven Architecture and this encourages microservices integration with various opensource platforms in the world of Cloud Native applications. Kubernetes is an opensource container orchestration platform, that can enable high availability, and scalability for Kafkacentric microservices. Kubernetes supports diverse autoscaling mechanisms like Horizontal Pod Autoscaler (HPA), Vertical Pod Autoscaler (VPA) and Cluster Autoscaler (CA). Among others, HPA automatically scales the number of pods based on the default Resource Metrics, which includes CPU and memory usage. With Prometheus integration, custom metrics for an application can be monitored. In a Kafkacentric microservices, processing time and speed depends on the number of messages published. There is a need for auto scaling policy which can be based on the number of messages processed. This paper proposes a new autoscaling policy, which scales Kafka-centric microservices deployed in an eventdriven deployment architecture, using a Reinforcement Learning model.","PeriodicalId":373652,"journal":{"name":"2022 IEEE 4th PhD Colloquium on Emerging Domain Innovation and Technology for Society (PhD EDITS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116101844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning Implementation for Refactoring Prediction 重构预测的机器学习实现
Rasmita Panigrahi, S. K. Kuanar, L. Kumar
Refactorings improve the internal organization of object-oriented software project without altering the functionality to address the problem of architectural degradation. The application of refactoring leads to increased software quality and maintainability. However, finding refactoring chances is a complex topic that affects both developers and researchers. In a recent study, machine learning methods demonstrated significant promise for resolving this issue. Model refactoring prevents erosion of the program architecture at an early stage of the model-driven engineering paradigm-compliant software development project. However, difficulties such as variable data set distribution and the availability of duplicate and irrelevant variables hamper the efficacy of refactoring prediction models. We aim to develop a model for refactoring prediction using several machine learning classifiers, data sampling techniques, and feature selection techniques.
重构改进了面向对象软件项目的内部组织,而不改变解决体系结构退化问题的功能。重构的应用可以提高软件质量和可维护性。然而,寻找重构机会是一个复杂的话题,对开发人员和研究人员都有影响。在最近的一项研究中,机器学习方法显示出解决这个问题的重大希望。在模型驱动的工程范式兼容的软件开发项目的早期阶段,模型重构可以防止对程序体系结构的侵蚀。然而,诸如变量数据集分布和重复变量和不相关变量的可用性等困难阻碍了重构预测模型的有效性。我们的目标是使用几种机器学习分类器、数据采样技术和特征选择技术开发一个重构预测模型。
{"title":"Machine Learning Implementation for Refactoring Prediction","authors":"Rasmita Panigrahi, S. K. Kuanar, L. Kumar","doi":"10.1109/PhDEDITS56681.2022.9955297","DOIUrl":"https://doi.org/10.1109/PhDEDITS56681.2022.9955297","url":null,"abstract":"Refactorings improve the internal organization of object-oriented software project without altering the functionality to address the problem of architectural degradation. The application of refactoring leads to increased software quality and maintainability. However, finding refactoring chances is a complex topic that affects both developers and researchers. In a recent study, machine learning methods demonstrated significant promise for resolving this issue. Model refactoring prevents erosion of the program architecture at an early stage of the model-driven engineering paradigm-compliant software development project. However, difficulties such as variable data set distribution and the availability of duplicate and irrelevant variables hamper the efficacy of refactoring prediction models. We aim to develop a model for refactoring prediction using several machine learning classifiers, data sampling techniques, and feature selection techniques.","PeriodicalId":373652,"journal":{"name":"2022 IEEE 4th PhD Colloquium on Emerging Domain Innovation and Technology for Society (PhD EDITS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122484807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 4th PhD Colloquium on Emerging Domain Innovation and Technology for Society (PhD EDITS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1