{"title":"An Asymmetric, Energy Efficient One-to-Many Traffic-Aware Wireless Network-in-Package Interconnection Architecture for Multichip Systems","authors":"M. Ahmed, N. Mansoor, A. Ganguly","doi":"10.1109/IGCC.2018.8752153","DOIUrl":"https://doi.org/10.1109/IGCC.2018.8752153","url":null,"abstract":"High Performance Computing (HPC) platforms like blade servers consist of multiple processor chips which may be multicore CPUs, GPUs, memory modules and other subsystems. These high performance and memory intensive multichip systems require efficient support for one-to-many traffic patterns which originates from cache coherency, system-level synchronization mechanisms and other control signals. Small portions of such traffic can introduce congestion which significantly reduce overall performance and cause energy bottleneck unless low latency transmission is ensured by a one-to-many traffic aware interconnection architecture. Traditional metal based Network-on-Chip (NoC) interconnection architecture is not suitable for such traffic as it provides high-latency, power hungry multi-hop paths. To address this issue, we propose the design of a one-to-many traffic-aware Wireless Network-in-Package (WiNiP) architecture by introducing a novel asymmetric wireless interconnection topology and flow control. The proposed asymmetric topology provides low latency communication for one-to-many traffic and increase system bandwidth with lower energy consumption. Through cycle accurate simulator we show that the proposed topology reduce energy by 55.92% and outperforms other interconnection architecture for synthetic as well as application specific traffics.","PeriodicalId":388554,"journal":{"name":"2018 Ninth International Green and Sustainable Computing Conference (IGSC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129307166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Innocent Mpawenimana, A. Pegatoquet, Win Thandar Soe, C. Belleudy
{"title":"Appliances Identification for Different Electrical Signatures using Moving Average as Data Preparation","authors":"Innocent Mpawenimana, A. Pegatoquet, Win Thandar Soe, C. Belleudy","doi":"10.1109/IGCC.2018.8752131","DOIUrl":"https://doi.org/10.1109/IGCC.2018.8752131","url":null,"abstract":"Intelligent electronic equipment and automation network are the brain of high-technology energy management systems in the critical role of smart homes dominance. The smart home is a technology integration for greater comfort, autonomy, reduced cost as well as energy saving. In this paper, a system which can automatically recognize home appliances and based on a dataset of electric consumption profiles is proposed. The dataset ACS-F1 (Appliance Consumption Signature Fribourg 1) available online and containing 100 appliances signatures in XML (Extensible Markup Language) format is used for that purpose. A new format for this dataset is created as it makes easier to implement directly machine learning algorithm such as K-NN (K-Nearest Neighbors), Random Forest and Multilayer Perceptron in the feature space between the test object and the training examples. In order to optimize the classification algorithm accuracy, we propose to use a moving average function for reducing the random variations in the observations. Using this technique indeed allows the structure of the underlying causal processes to be better exposed. Moving average is widely used in trading algorithm to predict the future price movements based on identifying patterns in prices, volume and other market statistics. Recognition results using K-NN based machine learning are provided to show the impact of the number and the type of electrical signatures. In the best case an accuracy rate of 89.1% and 99.1% is obtained using K-NN, without and with moving average respectively. Our approach is compared with another data preparation technique based on dynamical coefficient and used to optimize the K-NN classifier as well. Finally, our approach based on moving average is also evaluated with Random Forest (99%) and Multilayer Perceptron (98.8%) classification algorithms for the best electrical signature obtained with K-NN.","PeriodicalId":388554,"journal":{"name":"2018 Ninth International Green and Sustainable Computing Conference (IGSC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127168832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Representation, Measurement, and Recovery of Large-scale Networks","authors":"G. Mahindre, A. Jayasumana","doi":"10.1109/IGCC.2018.8752162","DOIUrl":"https://doi.org/10.1109/IGCC.2018.8752162","url":null,"abstract":"Real-world networks have millions of users and are complex in structure. Efficient techniques are required to capture the network characteristics as compact data. The overall purpose of this research is to mine information from partially or completely available graph data and obtain optimum data representation for networks. The first phase involves studying network data to draw meaningful relations and properties about the network. We extend this work to introduce a novel way of sampling graphs in lossless manner. The second phase involves observing and processing the partial data available to complete the graph data by estimation methods. We also leverage our knowledge about graphs to design an optimal network sampling technique. Subsequently, these techniques will be applied to both static as well as dynamic graphs.","PeriodicalId":388554,"journal":{"name":"2018 Ninth International Green and Sustainable Computing Conference (IGSC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Swapnoneel Roy, S. Sankaran, Preetika Singh, R. Sridhar, A. Asaithambi
{"title":"Context-sec: Balancing Energy Consumption and Security of Mobile Devices","authors":"Swapnoneel Roy, S. Sankaran, Preetika Singh, R. Sridhar, A. Asaithambi","doi":"10.1109/IGCC.2018.8752165","DOIUrl":"https://doi.org/10.1109/IGCC.2018.8752165","url":null,"abstract":"Energy Management is of primary importance in mobile devices due to increasing functionality coupled with rapid battery drain. Research analysis reveals that users differ in context and resource usage patterns, which can be leveraged for power savings. A key challenge lies in providing context-adaptive security in an energy aware manner due to increasing sensitivity of user data and analyzing energy-security trade-offs. Towards this challenge, we model the problem of context-adaptive energy-aware security as a combinatorial optimization problem (Context-Sec). We then prove the decision version of this problem to be NP-Complete via a reduction from a variant of the well known Knapsack problem. We then design three different algorithms to solve a relaxed offline version of Context-Sec. The first algorithm is a pseudo-polynomial dynamic programming (DP) algorithm that computes an allocation with optimal user benefit using recurrence relations. The second algorithm is a greedy heuristic for allocation of security levels based on user benefit per unit of power consumption for each level. Finally, the third algorithm is a Fully Polynomial Time Approximation Scheme (FPTAS) for the problem which is has a polynomial time execution complexity as opposed to the pseudo-polynomial DP based approach. We subsequently implement and test the three algorithms on a real-world smartphone usage and wireless networks data-set to compare their performances. To the best of our knowledge, this is the first work that is focused on modeling, design, implementation and experimental performance analysis of any algorithm for context-adaptive energy-aware security. We believe our results will be useful for researchers and practitioners working in this area.","PeriodicalId":388554,"journal":{"name":"2018 Ninth International Green and Sustainable Computing Conference (IGSC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-aware Fault-tolerant Scheduling Scheme based on Intelligent Prediction Model for Cloud Data Center","authors":"Avinab Marahatta, Ce Chi, Fa Zhang, Zhiyong Liu","doi":"10.1109/IGCC.2018.8752123","DOIUrl":"https://doi.org/10.1109/IGCC.2018.8752123","url":null,"abstract":"As cloud computing becomes increasingly popular, more and more applications are migrated to clouds. Due to multi-step computation of data streams and heterogeneous task dependencies, task failure occurs frequently, resulting in poor user experience and additional energy consumption. To reduce task execution failure as well as energy consumption, we propose a novel energy-aware proactive fault-tolerant scheduling scheme for cloud data centers(CDCs) in this paper. Firstly, a prediction model based on machine learning approach is trained to classify the arriving tasks into “failure-prone tasks” and “non-failure-prone tasks” according to the predicted failure rate. Then, two efficient scheduling mechanisms are proposed to allocate two types of tasks to the most appropriate hosts in a CDC. Vector reconstruction method is developed to construct super tasks from failure-prone tasks and schedule these super tasks and non-failure-prone tasks to most suitable physical host, separately. All the tasks are scheduled in an earliest-deadline-first manner. Our evaluation results show that the proposed scheme can intelligently predict task failure and achieves better fault tolerance and reduces total energy consumption than existing schemes.","PeriodicalId":388554,"journal":{"name":"2018 Ninth International Green and Sustainable Computing Conference (IGSC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125574124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Self-Sustaining Micro-Watt Programmable Smart Audio Sensor for Always-On Sensing","authors":"M. Magno, Philipp Mayer, L. Benini","doi":"10.1109/IGCC.2018.8752147","DOIUrl":"https://doi.org/10.1109/IGCC.2018.8752147","url":null,"abstract":"Self-sustainable always-on sensors are crucial for the Internet of Things and its emerging applications. However, achieving perpetual work with active sensors poses many challenges, especially in ultra-low power design and micro-power energy harvesting that can supply the sensors. This paper presents a self-sustaining programmable smart microphone, combining energy harvesting and a micro-power event-driven sensor. The proposed solution can achieve programmable pattern recognition with up to 128 simultaneous time-frequency features exploiting mixed-signal low power design. Experimental results show that the designed event-driven circuit consumes only 26.89 μW in always-on mode, during the time-frequency feature-extraction, while the whole system consumes only 63 μW during pattern recognition including the power for a commercial MEMS microphone and the energy harvesting subsystem. We demonstrate that the sensor can operate perpetually powered with a small form factor flexible photovoltaic panel in indoor lighting conditions. Finally, the smart sensors achieved an accuracy of 100% in the detection of two different audio streams.","PeriodicalId":388554,"journal":{"name":"2018 Ninth International Green and Sustainable Computing Conference (IGSC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131586298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Charles Suslowicz, Archanaa S. Krishnan, Daniel Dinu, P. Schaumont
{"title":"Secure Application Continuity in Intermittent Systems","authors":"Charles Suslowicz, Archanaa S. Krishnan, Daniel Dinu, P. Schaumont","doi":"10.1109/IGCC.2018.8752145","DOIUrl":"https://doi.org/10.1109/IGCC.2018.8752145","url":null,"abstract":"Intermittent systems operate embedded devices without a source of constant reliable power, relying instead on an unreliable source such as an energy harvester. They overcome the limitation of intermittent power by retaining and restoring system state as checkpoints across periods of power loss. Previous works have addressed a multitude of problems created by the intermittent paradigm, but do not consider securing intermittent systems. In this paper, we address the security concerns created through the introduction of checkpoints to an embedded device. When the non-volatile memory that holds checkpoints can be tampered, the checkpoints can be replayed or duplicated. We propose secure application continuity as a defense against these attacks. Secure application continuity provides assurance that an application continues where it left off upon power loss. In our secure continuity solution, we define a protocol that adds integrity, authenticity, and freshness to checkpoints. We develop two solutions for our secure checkpointing design. The first solution uses a hardware accelerated implementation of AES, while the second one is based on a software implementation of a lightweight cryptographic algorithm, Chaskey. We analyze the feasibility and overhead of these designs in terms of energy consumption, execution time, and code size across several application configurations. Then, we compare this overhead to a non-secure checkpointing system. We conclude that securing application continuity does not come cheap and that it increases the overhead of checkpoint restoration from 3.79 μJ to 42.96 μJ with the hardware accelerated solution and 57.02 μJ with the software based solution. To our knowledge, no one has yet considered the cost to provide security guarantees for intermittent operations. Our work provides future developers with an empirical evaluation of this cost, and with a problem statement for future research in this area.","PeriodicalId":388554,"journal":{"name":"2018 Ninth International Green and Sustainable Computing Conference (IGSC)","volume":"358 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133104351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proactive Thermal Management using Memory-based Computing in Multicore Architectures","authors":"Subodha Charles, Hadi Hajimiri, P. Mishra","doi":"10.1109/IGCC.2018.8752127","DOIUrl":"https://doi.org/10.1109/IGCC.2018.8752127","url":null,"abstract":"Reliability is a major concern in modern electronic systems due to high defect rates and large parametric variations. A major contributor to reliability concerns is the potential thermal violations due to increasing transistor count coupled with the high clock rate in multicore System-on-Chip (SoC) designs. Dynamic thermal management is widely used to reduce the SoC temperature. Early work on using memory-based computing has shown promising results in improving SoC reliability when few functional units are defective or unreliable under process-induced or thermal variations. However, there are no prior efforts to explore the effectiveness of MBC for thermal management in multicore architectures. In this paper, we present a novel dynamic thermal management technique using proactive memory-based computing to reduce the peak temperature of applications in multicore architectures. The basic idea is to proactively transfer the profitable instructions with frequent operand pairs to memory. Experimental results demonstrate that the proposed computing in memory can significantly decrease the peak temperature to improve the SoC reliability with minor impact on performance.","PeriodicalId":388554,"journal":{"name":"2018 Ninth International Green and Sustainable Computing Conference (IGSC)","volume":"22 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123728835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luca Perilli, E. Franchi, R. L. Rosa, R. Canegallo
{"title":"Wake-Up Radio Impact in Self-Sustainability of Sensor and Actuator Wireless Nodes in Smart Home Applications","authors":"Luca Perilli, E. Franchi, R. L. Rosa, R. Canegallo","doi":"10.1109/IGCC.2018.8752164","DOIUrl":"https://doi.org/10.1109/IGCC.2018.8752164","url":null,"abstract":"This work discusses the impact of Wake-Up Radio (WuR) technology to extend the battery life on sensor and actuator nodes in a smart home scenario. The focus is on nodes that harvest energy from light or a temperature gradient and implement DASH7, an open-source low-power protocol supporting both query-response and beaconing communication models. A prototype WuR is used, with a quiescent current less than 1 μA and a sensitivity of -38 dBm compatible with indoor applications. Experimental data show that integrating WuR is not convenient in nodes that need to send a message to the network coordinator periodically, e.g. sensor nodes implementing beaconing communication models. On the contrary, in request-response mode, integrating the WuR, the average actuator current consumption reduces from 35 μA down to 6 μA during a reference period where no data or commands are exchanged between the network coordinator and the node. Thanks to the WuR, we find that an average light intensity of 150 lux throughout daytime and less than 14 min of a temperature gradient of 10°C between the hot and cold side of a thermoelectric generator are sufficient to turn the actuator nodes for water flooding and smart heating control into an energetically autonomous mode.","PeriodicalId":388554,"journal":{"name":"2018 Ninth International Green and Sustainable Computing Conference (IGSC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123776146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Energy Efficiency Techniques for Secure Computing Systems","authors":"Zhiming Zhang, Qiaoyan Yu","doi":"10.1109/IGCC.2018.8752109","DOIUrl":"https://doi.org/10.1109/IGCC.2018.8752109","url":null,"abstract":"Countermeasures against diverse security threats typically incur noticeable hardware cost and power overhead, which may become the obstacle for those countermeasures to be applicable in energy-efficient computing systems. This work presents a summary of energy-efficiency techniques that have been applied in security primitives or mechanisms to ensure computing systems’ resilience against various security threats on hardware. This work also uses examples to discuss practical methods for securing the hardware for computing systems to achieve energy efficiency.","PeriodicalId":388554,"journal":{"name":"2018 Ninth International Green and Sustainable Computing Conference (IGSC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129821429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}