Proceedings of the International Conference on Research in Adaptive and Convergent Systems最新文献

筛选
英文 中文
Migration Selection Method using two Factors based LSTM in Micro DataCenter 基于双因素LSTM的微数据中心迁移选择方法
Su June Lee, J. An, Younghwan Kim
{"title":"Migration Selection Method using two Factors based LSTM in Micro DataCenter","authors":"Su June Lee, J. An, Younghwan Kim","doi":"10.1145/3400286.3418280","DOIUrl":"https://doi.org/10.1145/3400286.3418280","url":null,"abstract":"In recent years, cloud service has been used in many field. In particular, a micro datacenter based on edge computing has been used to overcome the limitations of latency and bandwidth of cloud network architecture. Micro datacentre is small-scaled to reduce environmental constraints and minimize the complexity of fieldwork. Since there are not enough computing resources when compared with existing datacentre, efficient operation methods of services are being researched. Migration is used as a way to duplicate services and load balance services. However, migration is executed when the workload was overloading, delay may occur. This paper propose novel method MSFL(Migration Selection Method using two Factors based LSTM) that provides service availability by predicting power values based on past resource utilization rates and Long Short-Term Memory(LSTM) and pre-selecting migration target based on the relationship between servers and workloads, and values predicted. This method calculates the power consumption of servers and workloads by collecting the utilization of workload resource(CPU, Memory, Network, Disk I/O). The collected power consumption is an input value of LSTM to predict future workload is defined by analyzing the resource utilization of the workload and the server, the weight of the LSTM result is calculated using the two factors. Finally, the target of migration is selected.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132239547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Automated Machine Learning Platform for Non-experts 面向非专家的自动化机器学习平台
Jin Han, Ki Sun Park, K. Lee
{"title":"An Automated Machine Learning Platform for Non-experts","authors":"Jin Han, Ki Sun Park, K. Lee","doi":"10.1145/3400286.3418276","DOIUrl":"https://doi.org/10.1145/3400286.3418276","url":null,"abstract":"With successful applications of machine learning to various domains, there have been large demands on developing machine learning-based applications. Automated machine learning is crucial to meet the demand because there are not sufficiently many expert machine learning developers to support such various demands. This paper presents an automated machine learning platform which gets some basic information about a task from nonexpert developer and examines several candidate models to develop an effective machine learning model. To choose some candidate machine learning pipeline for the given task, the platform makes use of the HTN-based plans to describe the machine learning plans along with its application conditions. The prototype system has been developed to mainly support machine learning models for tabular data including time-series data.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131649578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On Matching Log Analysis to Source Code: A Systematic Mapping Study 匹配日志分析对源代码的系统映射研究
Vincent Bushong, Russell Sanders, Jacob Curtis, Mark Du, T. Cerný, Karel Frajták, Miroslav Bures, Pavel Tisnovsky, Dongwan Shin
{"title":"On Matching Log Analysis to Source Code: A Systematic Mapping Study","authors":"Vincent Bushong, Russell Sanders, Jacob Curtis, Mark Du, T. Cerný, Karel Frajták, Miroslav Bures, Pavel Tisnovsky, Dongwan Shin","doi":"10.1145/3400286.3418262","DOIUrl":"https://doi.org/10.1145/3400286.3418262","url":null,"abstract":"Logging is a vital part of the software development process. Developers use program logging to monitor program execution and identify errors and anomalies. These errors may also cause uncaught exceptions and generate stack traces that help identify the point of error. Both of these sources contain information that can be matched to points in the source code, but manual log analysis is challenging for large systems that create large volumes of logs and have large codebases. In this paper, we contribute a systematic mapping study to determine the state-of-the-art tools and methods used to perform automatic log analysis and stack trace analysis and match the extracted information back to the program's source code. We analyzed 16 publications that address this issue, summarizing their strategies and goals, and we identified open research directions from this body of work.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131835517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Machine-Learning-based Data Classifier to Reduce the Write Amplification in SSDs 一种基于机器学习的数据分类器以减少ssd中的写放大
Yi-Ying Lu, Chin-Hsien Wu, Ya-Shu Chen
{"title":"A Machine-Learning-based Data Classifier to Reduce the Write Amplification in SSDs","authors":"Yi-Ying Lu, Chin-Hsien Wu, Ya-Shu Chen","doi":"10.1145/3400286.3418239","DOIUrl":"https://doi.org/10.1145/3400286.3418239","url":null,"abstract":"Solid-state drives (SSDs) that consist of flash memory have the advantages of non-volatility, fast speed, shock resistance, low-power consumption, and small size. Two critical characteristics of flash memory are that it does not support in-place updates, and it must write data in units of a page and erase data in units of a block. Due to the two characteristics, when a block is selected as a victim block to erase, we need to copy the remaining valid pages from the victim block to another free block and the additional copy overhead is called write amplification (WA). Therefore, how to reduce the write amplification (WA) is a crucial issue for SSDs. By performing data classification, it is effective to concentrate the invalid pages in specific blocks and decrease the distribution of invalid pages in the flash memory. The advantage is that we can reduce the write amplification due to the valid pages copied. In the paper, we will propose a machine-learning-based data classifier to classify the written data. Data with similar characteristics will be eventually written in the same group of data blocks in flash memory. Through such a design, it can improve the performance of SSDs by concentrating the invalid pages in the same block and reduce the write amplification.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128869117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Motion Mode Recognition for Traffic Safety in Campus Guiding Application 运动模式识别在校园交通安全引导中的应用
Rukang Yan, Zhan Gao, Lianbing Xu, Lei Cai, Zhengtao Xiang, Yufeng Chen
{"title":"Motion Mode Recognition for Traffic Safety in Campus Guiding Application","authors":"Rukang Yan, Zhan Gao, Lianbing Xu, Lei Cai, Zhengtao Xiang, Yufeng Chen","doi":"10.1145/3400286.3418246","DOIUrl":"https://doi.org/10.1145/3400286.3418246","url":null,"abstract":"Providing an intelligent campus guiding application is a good example of smart campus. Our smartphone APP focused on monitor the drivers' illegal behaviors, such as illegal parking for safety and management issues. For illegal parking detection, the motion mode recognition algorithm is focused on to detect the walking mode after drivers park their cars. When distinguishing low-speed driving mode and walking mode, the accuracy rate of Decision Tree algorithm is 67.03%, and that of our algorithm is 89.91%. When the walking mode is detected, the car location will be computed and if the location is not within the parking lot, the illegal parking occurs and the illegal parking alert will be sent to the APP. The application will play an important role in smart campus to improve the traffic safety and traffic management in campus.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114586435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Developing IoT Applications Using Spiking Neural Networks Framework 使用峰值神经网络框架开发物联网应用
Seoyeon Kim, Jaehyeok Jeong, Jaehee Kim, Young-Sun Yun, Bongjae Kim, Jinmang Jung
{"title":"Developing IoT Applications Using Spiking Neural Networks Framework","authors":"Seoyeon Kim, Jaehyeok Jeong, Jaehee Kim, Young-Sun Yun, Bongjae Kim, Jinmang Jung","doi":"10.1145/3400286.3418271","DOIUrl":"https://doi.org/10.1145/3400286.3418271","url":null,"abstract":"With the recent progress in SNN(Spiking Neural Networks), IoT applications require more intelligent data processing that can operate on neuromorphic hardware. However, as there is no development environment where SNN frameworks can be applied to existing IoT applications, it is difficult for IoT developers to utilize neuromorphic hardware. In this paper, we present a new development framework of IoT applications using SNN as a machine learning solution, called NA-Designer. It has GUI based neural network editor to quickly generate SNN components that can be run on various neuromorphic hardware. In particular, this component is designed to interwork with other IoT framework such as Node-RED. We implement NA-Designer and core neural networks libraries and measure its performance. Our framework can be used to develop Edge computing applications that utilize neuromorphic hardware to reduce energy consumption and latency.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128256983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EDAroid
Heejin Kim, Kyuho Kim, Jiman Hong, Jun-Young Heo, Joongjin Kook
{"title":"EDAroid","authors":"Heejin Kim, Kyuho Kim, Jiman Hong, Jun-Young Heo, Joongjin Kook","doi":"10.1145/3400286.3418266","DOIUrl":"https://doi.org/10.1145/3400286.3418266","url":null,"abstract":"A dynamic Android application(app) analysis tool is as known as useful for detecting errors or vulnerabilities in the Android apps at runtime by observing the internal behavior changes like specific method calls which can make malicious behaviors. However, existing Android app analysis tools not only cannot extract all methods used in the Android app but also cannot extract code blocks that can check the branch condition of the program. In this paper, we propose EDAroid, an efficient dynamic analysis tool for Android apps. The proposed EDAroid can dynamically extract not only the core system's methods but also the user-defined methods in Android apps. The proposed EDAroid can also represent the extracted methods and code blocks in Android apps in a graph. We also evaluate the functionality and performance of the proposed EDAroid and the evaluation results show that the proposed EDAroid is more efficient than the existing Android app analysis tool.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131690202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evading a Machine Learning-based Intrusion Detection System through Adversarial Perturbations 基于机器学习的入侵检测系统对抗性扰动的规避
T. Fladby, H. Haugerud, S. Nichele, Kyrre M. Begnum, A. Yazidi
{"title":"Evading a Machine Learning-based Intrusion Detection System through Adversarial Perturbations","authors":"T. Fladby, H. Haugerud, S. Nichele, Kyrre M. Begnum, A. Yazidi","doi":"10.1145/3400286.3418252","DOIUrl":"https://doi.org/10.1145/3400286.3418252","url":null,"abstract":"Machine-learning based Intrusion Detection and Prevention Systems provide significant value to organizations because they can efficiently detect previously unseen variations of known threats, new threats related to known malware or even zero-day malware, unrelated to any other known threats. However, while such systems prove invaluable to security personnel, researchers have observed that data subject to inspection by behavioral analysis can be perturbed in order to evade detection. We investigated the use of adversarial techniques for adapting the communication patterns between botnet malware and control unit in order to evaluate the robustness of an existing Network Behavioral Analysis solution. We implemented a packet parser that let us extract and edit certain properties of network flows and automated an approach for conducting a grey-box testing scheme of Stratosphere Linux IPS. As part of our implementation, we provided several techniques for providing perturbation to network flow parameters, including a Simultaneous Perturbation Stochastic Approximation method, which was able to produce sufficiently perturbed network flow patterns while adhering to an underlying objective function. Our results showed that network flow parameters could indeed be perturbed to ultimately enable evasion of intrusion detection based on the detection models that were used with the Intrusion Detection System. Additionally, we demonstrated that it was possible to combine evading detection with techniques for optimization problems that aimed to minimize the magnitude of perturbation to network flows, effectively enabling adaptive network flow behavior.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124682926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Implementation of Analytical Load Balancing between Distributed Collaborative Container Platforms 分布式协同容器平台分析式负载均衡的设计与实现
Jae-Seung Han, J. An, Younghwan Kim
{"title":"Design and Implementation of Analytical Load Balancing between Distributed Collaborative Container Platforms","authors":"Jae-Seung Han, J. An, Younghwan Kim","doi":"10.1145/3400286.3418277","DOIUrl":"https://doi.org/10.1145/3400286.3418277","url":null,"abstract":"Container-based Micro Service technology has problems with the limitations of resource expansion and the inability to move services between container platforms to respond to growing user traffic. For this reason, distributed collaborative container plat-form(DCCP) technology has emerged that provides the expansion and availability of services and enables collaboration among locally distributed container platforms. DCCP is an essential technology to overcome the limitations of existing stand-alone container platforms by maximizing flexible expansion of resources and service mobility through collaboration between distributed platforms. In this paper, the inter-platform traffic load balancing technology is proposed to construct DDCP. The proposed technology analyzes the user's traffic, identifies the user's geographic location information, and calculates scores for each distributed platform. The scoring method calculates the geographical score based on the platform's geographical location information and the user's geographical location, and calculates the resource score by analyzing the platform's resource status. Transport traffic through the calculated geographical scores and resource scores to the platform that holds the highest scores. The proposed technology provides analytical load balancing technology that addresses the non-efficient problem of randomly dispersing loads on existing independent platforms by load balancing according to the location and resource status of the platform.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129129179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Extrinsic Depth Camera Calibration Method for Narrow Field of View Color Camera 窄视场彩色相机的外部深度相机标定方法
C. Shih, Hao-Yu Chen
{"title":"An Extrinsic Depth Camera Calibration Method for Narrow Field of View Color Camera","authors":"C. Shih, Hao-Yu Chen","doi":"10.1145/3400286.3418251","DOIUrl":"https://doi.org/10.1145/3400286.3418251","url":null,"abstract":"This work designs and implements a calibration method between a narrow field of view camera and a depth camera in an endoscope-like scenario. An endoscopy-like scenario has a limited specular reflective surface, a camera with a narrow field of view. Instead of pushing the accuracy of the target marker with low-resolution data, we design a new loss function, which utilizes all of the three dimensions points of the checkerboard measured with the depth camera, and calculates the distance between projected 3D positions onto 2D image surface and the color image. The final re-projected error is improved to be less than 1 millimeters on average.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114178292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信