• Title/Summary/Keyword: Embedding Energy

Search Result 73, Processing Time 0.022 seconds

Energy-Aware Virtual Data Center Embedding

  • Ma, Xiao;Zhang, Zhongbao;Su, Sen
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.460-477
    • /
    • 2020
  • As one of the most significant challenges in the virtual data center, the virtual data center embedding has attracted extensive attention from researchers. The existing research works mainly focus on how to design algorithms to increase operating revenue. However, they ignore the energy consumption issue of the physical data center in virtual data center embedding. In this paper, we focus on studying the energy-aware virtual data center embedding problem. Specifically, we first propose an energy consumption model. It includes the energy consumption models of the virtual machine node and the virtual switch node, aiming to quantitatively measure the energy consumption in virtual data center embedding. Based on such a model, we propose two algorithms regarding virtual data center embedding: one is heuristic, and the other is based on particle swarm optimization. The second algorithm provides a better solution to virtual data center embedding by leveraging the evolution process of particle swarm optimization. Finally, experiment results show that our proposed algorithms can effectively save energy while guaranteeing the embedding success rate.

Reversible Watermarking with Adaptive Embedding Threshold Matrix

  • Gao, Guangyong;Shi, Yun-Qing;Sun, Xingming;Zhou, Caixue;Cui, Zongmin;Xu, Liya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4603-4624
    • /
    • 2016
  • In this paper, a new reversible watermarking algorithm with adaptive embedding threshold matrix is proposed. Firstly, to avoid the overflow and underflow, two flexible thresholds, TL and TR, are applied to preprocess the image histogram with least histogram shift cost. Secondly, for achieving an optimal or near optimal tradeoff between the embedding capacity and imperceptibility, the embedding threshold matrix, composed of the embedding thresholds of all blocks, is determined adaptively by the combination between the composite chaos and the average energy of Integer Wavelet Transform (IWT) block. As a non-liner system with good randomness, the composite chaos is suitable to search the optimal embedding thresholds. Meanwhile, the average energy of IWT block is calculated to adjust the block embedding capacity, and more data are embedded into those IWT blocks with larger average energy. The experimental results demonstrate that compared with the state-of-the-art reversible watermarking schemes, the proposed scheme has better performance for the tradeoff between the embedding capacity and imperceptibility.

Joint Access Point Selection and Local Discriminant Embedding for Energy Efficient and Accurate Wi-Fi Positioning

  • Deng, Zhi-An;Xu, Yu-Bin;Ma, Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.3
    • /
    • pp.794-814
    • /
    • 2012
  • We propose a novel method for improving Wi-Fi positioning accuracy while reducing the energy consumption of mobile devices. Our method presents three contributions. First, we jointly and intelligently select the optimal subset of access points for positioning via maximum mutual information criterion. Second, we further propose local discriminant embedding algorithm for nonlinear discriminative feature extraction, a process that cannot be effectively handled by existing linear techniques. Third, to reduce complexity and make input signal space more compact, we incorporate clustering analysis to localize the positioning model. Experiments in realistic environments demonstrate that the proposed method can lower energy consumption while achieving higher accuracy compared with previous methods. The improvement can be attributed to the capability of our method to extract the most discriminative features for positioning as well as require smaller computation cost and shorter sensing time.

Modified PSO Based Reactive Routing for Improved Network Lifetime in WBAN

  • Sathya, G.;Evanjaline, D.J.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.139-144
    • /
    • 2022
  • Technological advancements taken the health care industry by a storm by embedding sensors in human body to measure their vitals. These smart solutions provide better and flexible health care to patients, and also easy monitoring for the medical practitioners. However, these innovative solutions provide their own set of challenges. The major challenge faced by embedding sensors in body is the issue of lack of infinite energy source. This work presents a meta-heuristic based routing model using modified PSO, and adopts an energy harvesting scheme to improve the network lifetime. The routing process is governed by modifying the fitness function of PSO to include charge, temperature and other vital factors required for node selection. A reactive routing model is adopted to ensure reliable packet delivery. Experiments have been performed and comparisons indicate that the proposed Energy Harvesting and Modified PSO (EHMP) model demonstrates low overhead, higher network lifetime and better network stability.

Query Extension of Retrieve System Using Hangul Word Embedding and Apriori (한글 워드임베딩과 아프리오리를 이용한 검색 시스템의 질의어 확장)

  • Shin, Dong-Ha;Kim, Chang-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.6
    • /
    • pp.617-624
    • /
    • 2016
  • The hangul word embedding should be performed certainly process for noun extraction. Otherwise, it should be trained words that are not necessary, and it can not be derived efficient embedding results. In this paper, we propose model that can retrieve more efficiently by query language expansion using hangul word embedded, apriori, and text mining. The word embedding and apriori is a step expanding query language by extracting association words according to meaning and context for query language. The hangul text mining is a step of extracting similar answer and responding to the user using noun extraction, TF-IDF, and cosine similarity. The proposed model can improve accuracy of answer by learning the answer of specific domain and expanding high correlation query language. As future research, it needs to extract more correlation query language by analysis of user queries stored in database.

Estimation Model of Energy Expenditure of Working in a Clean Room for Manufacturing Embedded Needles by Ergonomic Programs (인간공학 프로그램에 의한 매선 제작 청정실작업의 에너지소모량 예측 모델)

  • Chung, Tae-Eun
    • Korean Journal of Computational Design and Engineering
    • /
    • v.21 no.1
    • /
    • pp.69-77
    • /
    • 2016
  • The purpose of this study is to estimate the energy expenditure of working in a clean room for manufacturing embedded needles by ergonomic programs. Embedding needle is one of medical devices and it should be manufactured in a clean room. 3D static strength prediction program was used to analyze the slow movements during embedding needle manufacturing in a clean room. Also the energy expenditure prediction program was used to estimate energy expenditure rates for materials handling tasks to help assure worker safety and health in clean room. The energy expenditures of the tasks were calculated using prediction equations derived from empirical data. The energy expenditure rate of 3.09 kcal/min in a clean room didn't exceed the 3.5 kcal/min action limit guideline for an average 8-hour day set by the National Institute for Occupational Safety and Health (NIOSH). Energy consumption was calculated on the same working conditions as EEPP program, using an average body weight of female 20 years old to 59 years who would be the candidates of the real workers.

Robust video watermarking algorithm for H.264/AVC based on JND model

  • Zhang, Weiwei;Li, Xin;Zhang, Yuzhao;Zhang, Ru;Zheng, Lixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2741-2761
    • /
    • 2017
  • With the purpose of copyright protection for digital video, a novel H.264/AVC watermarking algorithm based on JND model is proposed. Firstly, according to the characteristics of human visual system, a new and more accurate JND model is proposed to determine watermark embedding strength by considering the luminance masking, contrast masking and spatial frequency sensitivity function. Secondly, a new embedding strategy for H.264/AVC watermarking is proposed based on an analysis on the drift error of energy distribution. We argue that more robustness can be achieved if watermarks are embedded in middle and high components of $4{\times}4$ integer DCT since these components are more stable than dc and low components when drift error occurs. Finally, according to different characteristics of middle and high components, the watermarks are embedded using different algorithms, respectively. Experimental results demonstrate that the proposed watermarking algorithm not only meets the imperceptibility and robustness requirements, but also has a high embedding capacity.

User Experience Assisted Energy-Efficient Software Design for Mobile Devices on the big.LITTLE Core Architecture (사용자 경험을 기반으로 big.LITTLE 멀티코어 구조의 스마트 모바일 단말의 에너지 소비를 최적화 하는 소프트웨어 구조 설계)

  • Lim, Sung-Hwa
    • Journal of the Semiconductor & Display Technology
    • /
    • v.19 no.1
    • /
    • pp.23-28
    • /
    • 2020
  • In Smart mobile devices embedding big.LITTLE architectures, the conventional multi-core assignment scheme for user applications may incur wasteful energy consumption and long response time. In this paper, we propose a user experience assisted energy-efficient multicore assignment scheme. Our simulation results show that the proposed scheme achieves at 40% less energy consumption and at 20% less response time comparing to the legacy scheme.

Audio Watermarking Technique for Embedding Side Information during Acoustic Transmission through the Air (공기 중 음향 전송 시 부가 정보 삽입을 위한 오디오 워터마킹 기법)

  • Choi, Joon-Hwan;Song, Won-Seok;Choi, Hyuk;Kim, Tae-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.2
    • /
    • pp.150-156
    • /
    • 2010
  • Audio watermarking is the process of embedding inaudible information in an audio signal and has been widely used for copyright protection. In this research, we use the audio watermarking not for copyright protection but for the transmission of side information for user convenience, presenting an algorithm suitable for this purpose. Our new algorithm includes watermark embedding/extraction methods during acoustic transmission through the air that employ energy modulation of the audio signal and an efficient two-step synchronization method. The proposed algorithm is evaluated in experiments of conveying information from audio speakers to a mobile phone. The results show that reliable transmission is possible within a 5m range, which is an improvement achieved by our algorithm as compared to the existing one.

A Data Hiding Scheme for Grayscale Images Using a Square Function

  • Kwon, Hyejin;Kim, Haemun;Kim, Soonja
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.4
    • /
    • pp.466-477
    • /
    • 2014
  • Many image hiding schemes based on least significant bit (LSB) transformation have been proposed. One of the LSB-based image hiding schemes that employs diamond encoding was proposed in 2008. In this scheme, the binary secret data is converted into base n representation, and the converted secret data is concealed in the cover image. Here, we show that this scheme has two vulnerabilities: noticeable spots in the stego-image, i.e., a non-smooth embedding result, and inefficiency caused by rough re-adjustment of falling-off-boundary value and impractical base translation. Moreover, we propose a new scheme that is efficient and produces a smooth and high quality embedding result by restricting n to power of 2 and using a sophisticated re-adjustment procedure. Our experimental results show that our scheme yields high quality stego-images and is secure against RS detection attack.