• Title/Summary/Keyword: M-algorithm

Search Result 3,951, Processing Time 0.029 seconds

A Survey of Computational Offloading in Cloud/Edge-based Architectures: Strategies, Optimization Models and Challenges

  • Alqarni, Manal M.;Cherif, Asma;Alkayal, Entisar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.952-973
    • /
    • 2021
  • In recent years, mobile devices have become an essential part of daily life. More and more applications are being supported by mobile devices thanks to edge computing, which represents an emergent architecture that provides computing, storage, and networking capabilities for mobile devices. In edge computing, heavy tasks are offloaded to edge nodes to alleviate the computations on the mobile side. However, offloading computational tasks may incur extra energy consumption and delays due to network congestion and server queues. Therefore, it is necessary to optimize offloading decisions to minimize time, energy, and payment costs. In this article, different offloading models are examined to identify the offloading parameters that need to be optimized. The paper investigates and compares several optimization techniques used to optimize offloading decisions, specifically Swarm Intelligence (SI) models, since they are best suited to the distributed aspect of edge computing. Furthermore, based on the literature review, this study concludes that a Cuckoo Search Algorithm (CSA) in an edge-based architecture is a good solution for balancing energy consumption, time, and cost.

Supervisory Control for Energy Management of Islanded Hybrid AC/DC Microgrid

  • Mansour, Henda Ben;Chaarabi, Lotfi;Jelassi, Khaled;Guerrero, Josep M.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.355-363
    • /
    • 2022
  • This paper presents the modeling for islanded hybrid AC/DC microgrid and the verification of the proposed supervisory controller for energy management for this microgrid. The supervisory controller allows the microgrid system to operate in different power flows through the proposed control algorithm, it has several roles in the management of the energy flow between the different components of the microgrid for reliable operation. The proposed microgrid has both essential objectives such as the maximum use of renewable energies resources and the reduction of multiple conversion processes in an individual AC or DC microgrids. The microgrid system considered for this study has a solar photovoltaic (PV), a wind turbine (WT), a battery (BT), and a AC/DC loads. A small islanded hybrid AC/DC microgrid has been modeled and simulated using the MATLAB-Simulink. The simulation results show that the system can maintain stable operation under the proposed supervisory controller when the microgrid is switched from one operating mode of energy flow to another.

Post-earthquake fast building safety assessment using smartphone-based interstory drifts measurement

  • Hsu, Ting Y.;Liu, Cheng Y.;Hsieh, Yo M.;Weng, Chi T.
    • Smart Structures and Systems
    • /
    • v.29 no.2
    • /
    • pp.287-299
    • /
    • 2022
  • Rather than using smartphones as seismometers with designated locations and orientations, this study proposes to employ crowds' smartphones in buildings to perform fast safety assessment of buildings. The principal advantage of using crowds' smartphones is the potential to monitor the safety of millions of buildings without hardware costs, installation labor, and long-term maintenance. This study's goal is to measure the maximum interstory drift ratios during earthquake excitation using crowds' smartphones. Beacons inside the building are required to provide the location and relevant building information for the smartphones via Bluetooth. Wi-Fi Direct is employed between nearby smartphones to conduct peer-to-peer time synchronization and exchange the acceleration data measured. An algorithm to align the orientation between nearby smartphones is proposed, and the performance of the orientation alignment, interstory drift measurement, and damage level estimation are studied numerically. Finally, the proposed approach's performance is verified using large-scale shaking table tests of a scaled steel building. The results presented in this study illustrate the potential to use crowds' smartphones with the proposed approach to record building motions during earthquakes and use those data to estimate buildings' safety based on the interstory drift ratios measured.

R2NET: Storage and Analysis of Attack Behavior Patterns

  • M.R., Amal;P., Venkadesh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.295-311
    • /
    • 2023
  • Cloud computing has evolved significantly, intending to provide users with fast, dependable, and low-cost services. With its development, malicious users have become increasingly capable of attacking both its internal and external security. To ensure the security of cloud services, encryption, authorization, firewalls, and intrusion detection systems have been employed. However, these single monitoring agents, are complex, time-consuming, and they do not detect ransomware and zero-day vulnerabilities on their own. An innovative Record and Replay-based hybrid Honeynet (R2NET) system has been developed to address this issue. Combining honeynet with Record and Replay (RR) technology, the system allows fine-grained analysis by delaying time-consuming analysis to the replay step. In addition, a machine learning algorithm is utilized to cluster the logs of attackers and store them in a database. So, the accessing time for analyzing the attack may be reduced which in turn increases the efficiency of the proposed framework. The R2NET framework is compared with existing methods such as EEHH net, HoneyDoc, Honeynet system, and AHDS. The proposed system achieves 7.60%, 9.78%%, 18.47%, and 31.52% more accuracy than EEHH net, HoneyDoc, Honeynet system, and AHDS methods.

Implementing Firewall to Mitigate YOYO Attack on Multi Master Cluster Nodes Using Fail2Ban

  • Muhammad Faraz Hyder;Muhammad Umer Farooq;Mustafa Latif;Faizan Razi Khan;Abdul Hameed;Noor Qayyum Khan;M. Ahsan Siddiqui
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.126-132
    • /
    • 2023
  • Web technology is evolving with the passage of time, from a single node server to high availability and then in the form of Kubernetes. In recent years, the research community have been trying to provide high availability in the form of multi master cluster with a solid election algorithm. This is helpful in increasing the resources in the form of pods inside the worker node. There are new impact of known DDoS attack, which is utilizing the resources at its peak, known as Yoyo attack. It is kind of burst attack that can utilize CPU and memory to its limit and provide legit visitors with a bad experience. In this research, we tried to mitigate the Yoyo attack by introducing a firewall at load-balancer level to prevent the attack from going to the cluster network.

YOLOv5 based Anomaly Detection for Subway Safety Management Using Dilated Convolution

  • Nusrat Jahan Tahira;Ju-Ryong Park;Seung-Jin Lim;Jang-Sik Park
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.26 no.2_1
    • /
    • pp.217-223
    • /
    • 2023
  • With the rapid advancement of technologies, need for different research fields where this technology can be used is also increasing. One of the most researched topic in computer vision is object detection, which has widely been implemented in various fields which include healthcare, video surveillance and education. The main goal of object detection is to identify and categorize all the objects in a target environment. Specifically, methods of object detection consist of a variety of significant techniq ues, such as image processing and patterns recognition. Anomaly detection is a part of object detection, anomalies can be found various scenarios for example crowded places such as subway stations. An abnormal event can be assumed as a variation from the conventional scene. Since the abnormal event does not occur frequently, the distribution of normal and abnormal events is thoroughly imbalanced. In terms of public safety, abnormal events should be avoided and therefore immediate action need to be taken. When abnormal events occur in certain places, real time detection is required to prevent and protect the safety of the people. To solve the above problems, we propose a modified YOLOv5 object detection algorithm by implementing dilated convolutional layers which achieved 97% mAP50 compared to other five different models of YOLOv5. In addition to this, we also created a simple mobile application to avail the abnormal event detection on mobile phones.

A Laser Pointer Detection Algorithm Based on Conditional Test in Color Model and Differential Image (색상 조건 검사와 차영상을 이용한 레이저 포인터의 좌표 검출)

  • Lee, Doo-Hee;Kim, Yoon;Choi, Chang-Yeol
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.617-620
    • /
    • 2010
  • 최근 고성능 모바일 단말기와 다양한 컨텐츠가 등장하면서 유비쿼터스 환경에서의 사용자 인터페이스에 대한 관심이 높아지고 있다. 특히 모바일 프로젝터는 장소의 제한을 받지 않고 큰 화면을 다른 사람과 공유할 수 있는 장점이 있는 반면에 단말기를 직접 제어해야 하는 불편함이 있다. 본 논문에서는 모바일 환경에서 카메라를 통해 입력된 영상 정보만으로 사용자가 스크린에 비추는 레이저 포인터를 실시간으로 검출하는 알고리즘을 제안한다. 제안하는 알고리즘은 색상 감지와 움직임 감지로 나뉜다. 단일 프레임에서 영상 성분의 평균을 이용한 조건을 검사하여 레이저 포인터 색상 영역을 검출하고, 인접한 프레임과 현재 프레임과의 차를 구하며 그 차이가 임계값보다 큰 영역을 움직임 영역으로 검출한다. 마지막으로 색상 검출 영역과 움직임 검출 영역을 동시에 만족하는 영역을 최종적으로 레이저 포인터 영역으로 인식한다. 본 기법은 영상 정보만 사용하기 때문에 센서나 불필요한 장비를 착용할 필요가 없고 영상 성분 평균을 이용하므로 프로젝터 성능에 따른 조도의 변화에 강건하여 효과적인 레이저 포인터 검출이 가능하다. 실험결과는 주변 조명의 밝기에 따라 차이가 있지만 대부분 80% 이상의 검출률과 16% 미만의 오검출률의 성능으로 나타났고, 이 같은 결과는 사용자의 주관적인 만족을 보장하였다.

Unsupervised Multispectral Image Segmentation Based on 1D Combined Neighborhood Differences (1D 통합된 근접차이에 기반한 자율적인 다중분광 영상 분할)

  • Saipullah, Khairul Muzzammil;Yun, Byung-Choon;Kim, Deok-Hwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.625-628
    • /
    • 2010
  • This paper proposes a novel feature extraction method for unsupervised multispectral image segmentation based in one dimensional combined neighborhood differences (1D CND). In contrast with the original CND, which is applied with traditional image, 1D CND is computed on a single pixel with various bands. The proposed algorithm utilizes the sign of differences between bands of the pixel. The difference values are thresholded to form a binary codeword. A binomial factor is assigned to these codeword to form another unique value. These values are then grouped to construct the 1D CND feature image where is used in the unsupervised image segmentation. Various experiments using two LANDSAT multispectral images have been performed to evaluate the segmentation and classification accuracy of the proposed method. The result shows that 1D CND feature outperforms the spectral feature, with average classification accuracy of 87.55% whereas that of spectral feature is 55.81%.

A Multi-objective Genetic Algorithm for Tree-based Routing in WSN Having High Mobile Base Node (베이스 노드의 이동성이 큰 센서 네트워크에서 트리기반 라우팅을 위한 다목적 유전자 알고리즘)

  • Kang, Seung-Ho;Kim, Ki-Young;Pyo, Se-Jun;Kang, Il-Woo;Lee, Seong-Ro;Jung, Min-A
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.627-630
    • /
    • 2010
  • 무선 센서 & 액터 네트워크(WSAN)와 같이 다수의 베이스 노드가 존재하거나 베이스 노드의 이동성이 큰 센서 네트워크에서 최소 Wiener수 신장 트리(MWST)기반 라우팅 방법은 최소 신장 트리(MST)기반 라우팅 방법에 비해 패킷 전송 거리가 짧고 전력 소모가 적다. 하지만 주어진 그래프로부터 최소 Wiener 수 신장 트리를 찾는 문제는 NP-hard 문제이고 최소 신장 트리에 비해 네트워크 수명이 짧은 단점이 있다. 본 논문은 이러한 문제를 해결하고자 Wiener 수 적응도, 네트워크 수명 적응도, 차수 적응도 등을 동시에 고려한 다목적 유전자 알고리즘을 설계하고 네트워크 전체 전력 소모를 크게 증가시키지 않으면서도 네트워크의 수명을 Wiener 수 적응도만을 사용했을 때 보다 연장시킴을 실험을 통해 보인다.

An Effective ERS Algorithm for Low-Retransmission in Wireless Sensor Networks (무선센서네트워크에서 저-재전송율을 위한 효율적인 ERS 알고리즘)

  • Jang, Young-Sub;Son, Nam-Rye;Jang, Bong-Seok;Jung, Min-A;Kwon, Jang-Woo;Shin, Jun-Woo;Yang, Hae-Bong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.668-671
    • /
    • 2010
  • 최근 AODV 라우팅 프로토콜은 무선센서네트워크에서 노드 간에 데이터 전송방식을 추구하므로 테이블구동방식 중 가장 널리 사용되고 있다. AODV 라우팅 프로토콜은 목적지노드가 멀리 있거나 없는 경우엔 목적지노드를 찾기 위한 라우팅 패킷이 급격하게 증가하고 이로 인해 네트워크의 성능이 크게 저하된다. 이러한 문제점을 해결하기 위해 불필요한 RREQ 메시지를 제어하는 ERS(expanding ring search)방법을 사용한다. 그러나 ERS 방법은 유선 멀티캐스팅을 기본으로 하기 때문에 무선네트워크환경의 NTT(node traversal time)를 고려하지 않았다는 단점을 가지고 있다. 따라서 본 논문에서는 이동 무선 센서 노드들이 불규칙적으로 이동하는 무선센서네트워크에서 목적지 노드로부터 소스노드까지 전송되는 RREP의 소요시간, 노드간의 거리, 에너지량을 고려하여 효율적인 NTT 알고리즘을 제안한다.