Refine your search
Collections
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Ranjan, Rajeev
- Specifying CPU Requirements for HPC Applications via ML Techniques
Abstract Views :218 |
PDF Views:0
Authors
Affiliations
1 School of C&IT, REVA University, Bengaluru, IN
2 School of CSA, REVA University, Bengaluru, IN
1 School of C&IT, REVA University, Bengaluru, IN
2 School of CSA, REVA University, Bengaluru, IN
Source
International Journal of Advanced Networking and Applications, Vol 10, No SP 5 (2019), Pagination: 1-3Abstract
Resource distribution in data centers is difficult for service providers because of the structures of usage and condition setup decisions. Customers encounter issues to anticipate the amount of CPU and memory required for job execution, and henceforth are not ready to assess when work yield shall be accessible to plan for next analyses. Systems that utilize cluster scheduler structures to gauge job execution time exists in the literature. Notwithstanding, we have seen that such methods are not appropriate for anticipating CPU utilization. In this paper, we assist customers to figure out their applications CPU usage utilizing machine learning (ML) techniques. We analyze how scheduler can be utilized to predict CPU utilization through ML techniques, and its evaluation on two frameworks containing an enormous number of user jobs.Keywords
HPC, CPU Prediction, Machine Learning.References
- C. B. Lee, A. Snavely, "On the user–scheduler dialogue: studies of user-provided runtime estimates and utility functions", Journal of High Performance Computing Applications, 20 (4), 495-506, 2017.
- C. B. Lee, Y. Schwartzman, J. Hardy, A. Snavely, "Are user runtime estimates inherently inaccurate?", Proceedings of the International Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP), Springer, 253-263, 2014.
- D. Tsafrir, Y. Etsion, D. G. Feitelson, "Backfilling using system-generated predictions rather than user runtime estimates", IEEE Transactions on Parallel and Distributed Systems 18 (6), 789-803, 2017.
- S.-H. Chiang, A. Arpaci-Dusseau, M. K. Vernon, "The impact of more accurate requested runtimes on production job scheduling performance", Proceedings of the International Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP), Springer, 103-127, 2012.
- D. Tsafrir, D. G. Feitelson, "The dynamics of backfilling: solving the mystery of why increased inaccuracy may help", Proceedings of IEEE International Symposium on the Workload Characterization, IEEE, 131141, 2016.
- D. Zotkin, P. J. Keleher, "Job-length estimation and performance in backfilling schedulers", Proceedings of the International Symposium on High Performance Distributed Computing (HPDC), IEEE, 236-243, 2017.
- M. Hovestadt, O. Kao, A. Keller, A. Streit, "Scheduling in HPC resource management systems: Queuing vs. planning", Proceedings of the International Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP), Springer, 1-20, 2013.
- R. L. Cunha, E. R. Rodrigues, L. P. Tizzei, M. A. Netto, "Job placement advisor based on turnaround predictions for HPC hybrid clouds", Future Generation Computer Systems 67, 35-46, 2017.
- A. Coates, A. Y. Ng, "The importance of encoding versus training with sparse coding and vector quantization", Proceedings of the 28th International Conference on Machine Learning (ICML-11), 921-928, 2017.
- C. Cortes, V. Vapnik, "Support-vector networks", Journal of Machine Learning, 20 (3), 273-297, 2005.
- A Survey on Fuzzy Based Sensor Network and Its Applications
Abstract Views :203 |
PDF Views:0
Authors
Affiliations
1 School of CSA, REVA University, Rukmini Knowledge Park Yelahanka, Kattigenahalli, Bengaluru, Karnataka 560064, IN
1 School of CSA, REVA University, Rukmini Knowledge Park Yelahanka, Kattigenahalli, Bengaluru, Karnataka 560064, IN
Source
International Journal of Advanced Networking and Applications, Vol 10, No SP 5 (2019), Pagination: 69-73Abstract
Wireless Sensor Networks (WSNs) have been broadly applied in many fields such as industry, agriculture, event detection & monitoring, time critical applications and research to facilitate the gathering and distribution of information. The WSNs consist of many low cost sensor nodes. Each sensor node consists of a microprocessors and radio transceivers and can only be equipped with limited resources like power, bandwidth etc. Fuzzy logic is a recent approach to tackle few of the important decision making aspects of WSNs. Fuzzy sets provides a robust mathematical solutions for dealing with real-world problems and non-statistical uncertainty. The paper reviews few fuzzy set based solutions for WSNs applications.Keywords
Wireless Sensor Networks (WSNs), Fuzzy Sets, Fuzzy Types, WSN Applications.References
- Rashid, B., & Rehmani, M. H. (2016). Applications of wireless sensor networks for urban areas: A survey. Journal of network and computer applications, 60, 192-219.
- Iyengar, S. S., & Brooks, R. R. (Eds.). (2016). Distributed Sensor Networks: Sensor Networking and Applications (Volume Two). CRC press.
- Yetgin, H., Cheung, K. T. K., El-Hajjar, M., & Hanzo, L. H. (2017). A survey of network lifetime maximization techniques in wireless sensor networks. IEEE Communications Surveys & Tutorials, 19(2), 828-854.
- Khari, M. (2018). Wireless Sensor Networks: A Technical Survey. In Handbook of Research on Network Forensics and Analysis Techniques (pp. 1-18). IGI Global.
- Tripathi, A., Gupta, H. P., Dutta, T., Mishra, R., Shukla, K. K., & Jit, S. (2018). Coverage and Connectivity in WSNs: A Survey, Research Issues and Challenges. IEEE Access, 6, 26971-26992.
- Yang, X., Wang, L., Xie, J., & Zhang, Z. (2018). Energy Efficiency TDMA/CSMA Hybrid Protocol with Power Control for WSN. Wireless Communications and Mobile Computing, 2018.
- Mostafaei, H., Montieri, A., Persico, V., & Pescapé, A. (2017). A sleep scheduling approach based on learning automata for WSN partialcoverage. Journal of Network and Computer Applications, 80, 67-78.
- Selvi, M., Logambigai, R., Ganapathy, S., Ramesh, L. S., Nehemiah, H. K., & Arputharaj, K. (2016, August). Fuzzy temporal approach for energy efficient routing in WSN. In Proceedings of the international conference on informatics and analytics (p. 117). ACM.
- Abdelgawad, A., & Bayoumi, M. (2012). Data fusion in WSN. In Resource-aware data fusion algorithms for wireless sensor networks (pp. 17-35). Springer, Boston, MA.
- Pham, H. N., Pediaditakis, D., & Boulis, A. (2007, June). From simulation to real deployments in WSN and back. In 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (pp. 1-6). IEEE.
- Quer, G., Masiero, R., Pillonetto, G., Rossi, M., & Zorzi, M. (2012). Sensing, compression, and recovery for WSNs: Sparse signal modeling and monitoring framework. IEEE Transactions on Wireless Communications, 11(10), 3447-3461.
- Tavakoli, R., Nabi, M., Basten, T., & Goossens, K. (2019). Topology management and tsch scheduling for low-latency convergecast in in-vehicle wsns. IEEE Transactions on Industrial Informatics, 15(2), 1082-1093.
- Farhan, L., Alzubaidi, L., Abdulsalam, M., Abboud, A. J., Hammoudeh, M., & Kharel, R. (2018, January). An efficient data packet scheduling scheme for Internet of Things networks. In 2018 1st International Scientific Conference of Engineering Sciences-3rd Scientific Conference of Engineering Science (ISCES) (pp. 1-6). IEEE.
- Priya, I. L., Lalitha, S., & Paul, P. V. (2018). Energy Efficient Routing Models In Wireless Sensor Networks-A Recent Trend Survey. International Journal of Pure and Applied Mathematics, 118(16), 443-458.
- Hamdani, M., Qamar, U., Butt, W. H., Khalique, F., & Rehman, S. (2018, November). A Comparison of Modern Localization Techniques in Wireless Sensor Networks (WSNs). In Proceedings of the Future Technologies Conference (pp. 535-548). Springer, Cham.
- AlHajri, M., Goian, A., Darweesh, M., AlMemari, R., Shubair, R., Weruaga, L., & AlTunaiji, A. (2018). Accurate and robust localization techniques for wireless sensor networks. arXiv preprint arXiv:1806.05765.
- Chen, Q., Gao, H., Cai, Z., Cheng, L., & Li, J. (2018, April). Energy-collision aware data aggregation scheduling for energy harvesting sensor networks. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications (pp. 117-125). IEEE.
- Pathan, A. S. K. (Ed.). (2016). Security of selforganizing networks: MANET, WSN, WMN, VANET. CRC press.
- Ranjan, R., & Varma, S. (2016). Challenges and implementation on cross layer design for wireless sensor networks. Wireless personal communications, 86(2), 1037-1060.
- EkbataniFard, G. H., Monsefi, R., Akbarzadeh-T, M. R., & Yaghmaee, M. H. (2010, May). A multiobjective genetic algorithm based approach for energy efficient QoS-routing in two-tiered wireless sensor networks. In IEEE 5th International Symposium on Wireless Pervasive Computing 2010 (pp. 80-85). IEEE.
- Singh, S., Chand, S., & Kumar, B. (2016). Energy efficient clustering protocol using fuzzy logic for heterogeneous WSNs. Wireless Personal Communications, 86(2), 451-475.
- Collotta, M., Bello, L. L., & Pau, G. (2015). A novel approach for dynamic traffic lights management based on Wireless Sensor Networks and multiple fuzzy logic controllers. Expert Systems with Applications, 42(13), 5403-5415.
- Viani, F., Robol, F., Bertolli, M., Polo, A., Massa, A., Ahmadi, H., & Boualleague, R. (2016, June). A wireless monitoring system for phytosanitary treatment in smart farming applications. In 2016 IEEE International Symposium on Antennas and Propagation (APSURSI) (pp. 2001-2002). IEEE.
- Ghosh, S., Mondal, S., & Biswas, U. (2016, August). Efficient data gathering in WSN using fuzzy C means and ant colony optimization. In 2016 International Conference on Information Science (ICIS) (pp. 258-265). IEEE.
- Jacob, R. M., & Sravan, M. S. (2017, July). A novel method based on fuzzy logic to set the arbitration threshold in WirArb for time critical applications in wireless sensor network. In 2017 International Conference on Networks & Advances in Computational Technologies (NetACT) (pp. 196-202). IEEE.
- Selvi, M., Logambigai, R., Ganapathy, S., Ramesh, L. S., Nehemiah, H. K., & Arputharaj, K. (2016, August). Fuzzy temporal approach for energy efficient routing in WSN. In Proceedings of the international conference on informatics and analytics (p. 117). ACM.
- Maksimovic, M., Vujovic, V., Perisic, B., & Milosevic, V. (2015). Developing a fuzzy logic based system for monitoring and early detection of residential fire based on thermistor sensors. Comput. Sci. Inf. Syst., 12(1), 63-89.
- Zhang, Z., Hao, Z., Zeadally, S., Zhang, J., Han, B., & Chao, H. C. (2017). Multiple attributes decision fusion for wireless sensor networks based on intuitionistic fuzzy set. IEEE Access, 5, 12798-12809.
- Kapitanova, K., Son, S. H., & Kang, K. D. (2010, August). Event Detection in Wireless Sensor Networks–Can Fuzzy Values Be Accurate?. In International Conference on Ad Hoc Networks (pp.168-184). Springer, Berlin, Heidelberg.
- Ko, J., & Chang, M. (2015). Momoro: Providing mobility support for low-power wireless applications. IEEE Systems Journal, 9(2), 585-594.
- Saleh, A. E., Moustafa, M. S., Abo-Al-Ez, K. M., & Abdullah, A. A. (2016). A hybrid neuro-fuzzy power prediction system for wind energy generation. International Journal of Electrical Power & Energy Systems, 74, 384-395.
- Shah, B., Iqbal, F., Abbas, A., & Kim, K. I. (2015). Fuzzy logic-based guaranteed lifetime protocol for real-time wireless sensor networks. Sensors, 15(8), 20373-20391.
- Chiang, S. Y., Kan, Y. C., Chen, Y. S., Tu, Y. C., & Lin, H. C. (2016). Fuzzy computing model of activity recognition on WSN movement data for ubiquitous healthcare measurement. Sensors, 16(12), 2053.
- Sharma, G., & Kumar, A. (2018). Fuzzy logic based 3D localization in wireless sensor networks using invasive weed and bacterial foraging optimization. Telecommunication Systems, 67(2), 149-162.
- Patil, P., Kulkarni, U., Desai, B. L., Benagi, V. I., & Naragund, V. B. (2012). Fuzzy logic based irrigation control system using wireless sensor network for precision agriculture. Agro-Informatics and Precision Agriculture (AIPA).
- Secure and Supportable Burden Adjusting of Edge Server Centers in Fog Computing
Abstract Views :212 |
PDF Views:0
Authors
Affiliations
1 School of CSA, REVA University, Bangalore, IN
1 School of CSA, REVA University, Bangalore, IN
Source
International Journal of Advanced Networking and Applications, Vol 10, No SP 5 (2019), Pagination: 74-77Abstract
Haze figuring is an ongoing examination pattern to convey distributed computing administrations to organize edges. ESCs are sent to lessen the torpidity and framework blockage by taking care of data streams and customer requests in close progressing.ESC organization is appropriated in nature and situated among cloud information jogs and information sources. Burden adjusting is the way toward redistributing the remaining task at hand betweenESCs to recover both asset usage & employment reaction time. Burden adjusting additionally keeps away from a circumstance somewhere ESCs are intensely stacked while others are out of gear state or doing little information preparing. In such situations, load adjusting between the ESCs assumes an imperative job for client reaction and constant occasion discovery. As the ESCs are sent in an unattended space, secure approval of ESCs is a fundamental problem to address before execution load adjusting. This article proposes a novel weight adjusting procedure to approve the ESCs and invention less stacked ESCs for errand apportioning. The future weight altering system is more capable than extra existing techniques in result less stacked ESCs for task assignment. The future system not simply improves viability of weight altering; it moreover braces the safety by affirming the objective ESCs.References
- O. Osanaiye et al., “From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework,” IEEE Access
- L. Tong, Y. Li, and W. Gao, “A Hierarchical Edge Cloud Architecture for Mobile Computing,” Proc. IEEE INFOCOM.
- M. S. Obaidat and P. Nicopolitidis, Smart Cities and Homes: Key Enabling Technologies, Morgan Kaufmann, 2016.
- M. S. Obaidat and S. Misra, Principles of Wireless Sensor Networks, Cambridge Univ. Press, 2014.
- A. Alakeel, “A Guide to Dynamic Load Balancing in Distributed Computer Systems,” Int’l. J. Computer Science Info. Security.
- K-K R. Choo et al., “A Foggy Research Future: Advances and Future Opportunities in Fog Computing Research,” Future Generation Computer Systems,
- M. Jia et al., “Cloudlet Load Balancing in Wireless Metropolitan Area Networks,” Proc. IEEE INFOCOM 2016.
- M. Willebeek-LeMair and A. Reeves, “Strategies for Dynamic Load Balancing on highly Parallel Computers,” IEEE Trans. Parallel Distrib. Systems.
- The Discovery for Privacy & Security in Various Big Data Application:A Study
Abstract Views :213 |
PDF Views:0
Authors
Affiliations
1 School of CSA, REVA University, Rukmini Knowledge Park Yelahanka, Kattigenahalli, Bengaluru, Karnataka 560064, IN
1 School of CSA, REVA University, Rukmini Knowledge Park Yelahanka, Kattigenahalli, Bengaluru, Karnataka 560064, IN
Source
International Journal of Advanced Networking and Applications, Vol 10, No SP 5 (2019), Pagination: 78-82Abstract
This paper is aiming to provide a literature re-examine on the need of data safety and privacy issues of various big data applications. In this, the first section gives a brief description of big data. The second section reviews the application of big data and, hence, explains the importance of privacy and security of Big Data in the third section.Keywords
Big Data, Application, Security, Privacy.References
- Feng Xia, Senior Member, IEEE, Wei Wang, Teshome Mergers Bekele, and Huan Liu, Fellow, IEEE, “Big Scholarly Data: A Survey”, IEEE Transaction son Big Data, Vol. 3, No. 1, January-March 2017.
- Deepankar Bharadwaj, Research Scholar, Dr. ArvindShukla, IFTM University. HOD, Department of Computer Applications, IFTM University, Moradabad(UP), “Text Mining Technique on Big Data Using Genetic Algorithm (A Review)” , International Journal of Computer Engineering and Applications, Volume X, Issue IX, Sep. 16, Issn 2321-3469.
- Wei Tan, M. Brian Blake and I. Saleh, Schahram Dustdar, “Social-Network Sourced Big Data Analytics”, IEEE INTERNET COMPUTING, 10897801/13/$31.00 © 2013 IEEE
- Matthew Smith, Benjamin Henne, , “Big Data Privacy Issues in Public Social Media”, 978-1-4673-1703-0/12/$31.00 ©2013 IEEE
- Monreale et al., “Privacy-by-design in big data analytics and social mining”, Data Science 2014, 2014:10
- Shen Yin, Okay Kaynak, “Big Data for present-day Industry: Challenges and Trends”, Proceedings of the IEEE, Vol. 103, No. 2, February 2015.
- Alfred O. Hero and R. Jamison and Betty Williams Professor of Engineering, University of Michigan; Co Director, Michigan Institute for Data Science (MIDAS) , Data Privacy and Security, Big Data on Finance, Center on Finance, Law and Policy, University of Michigan Law School, October 27, 2016
- Akinul Islam Jony, Department of Computer Science, American International University – Bangladesh, Applications of Real-Time Big Data Analytics, International Journal of Computer Applications (0975 - 8887), Volume 144 - No.5, June 2016.
- Khantil Choksi,Niriksha Dalal, Mr.Kshitij Gupte and Dr.Anjali Jivani, “Security And Privacy Challenges In Big Data”, International Journal of Latest Trends in Engineering and Technology Vol.(7) Issue(3), pp. 313-318.
- Doug Olenick, Online Editor, SC Media US, Cybercrime, Financial services sector most attacked in 2016: IBM, https:// financial-services-sector-most-attacked-in-2016-ibm/article/ 653706/, April 28, 2017
- Fran Howarth, Sabotage: The Latest Threat to the Financial/Banking Industry, “https://securityintelligence.com/sabotagethe-latest-threat-to-the-financialbankingindustry/”, August 30, 2016
- Krishna Kumar Singh, Research Scholar, Priti Dimri, PhD, Associate Professor and Head, Krishna Nand Rastogi Research Scholar, Dept. of CS G.B.P.E.C, Pauri Garhwal Uttarakhand, “The Implications of Big Data in Indian Stock Market” in 2014.
- Neil Couch and Bill Robins, “Big Data for Defence and Security”, Royal United Services Institute, Occasional Paper, September 2013
- Lech Janczewski, Khairulliza Ahmad Salleh ‘Technological, organizational and environmental security and the privacy issues of the big data:- The publicity review’, Science Direct, Procedia Computer Science 100 (2016) 19 to 80.
- Jason Parms, https: // www. Business. com / articles /privacy – and – security -issues – in – the – age – of – big - data, February 22, 2017
- Jung woo Ryoo, Big data security problems threaten consumers’ privacy, March 23, 2016 9.08pm AEDT