期刊文献+
共找到27篇文章
< 1 2 >
每页显示 20 50 100
Directed Acyclic Graph Blockchain for Secure Spectrum Sharing and Energy Trading in Power IoT
1
作者 Zixi Zhang Mingxia Zhang +2 位作者 Yu Li Bo Fan Li Jiang 《China Communications》 SCIE CSCD 2023年第5期182-197,共16页
Peer-to-peer(P2P)spectrum sharing and energy trading are promising solutions to locally satisfy spectrum and energy demands in power Internet of Things(IoT).However,implementation of largescale P2P spectrum sharing an... Peer-to-peer(P2P)spectrum sharing and energy trading are promising solutions to locally satisfy spectrum and energy demands in power Internet of Things(IoT).However,implementation of largescale P2P spectrum sharing and energy trading confronts security and privacy challenges.In this paper,we exploit consortium blockchain and Directed Acyclic Graph(DAG)to propose a new secure and distributed spectrum sharing and energy trading framework in power IoT,named spectrum-energy chain,where a set of local aggregators(LAGs)cooperatively confirm the identity of the power devices by utilizing consortium blockchain,so as to form a main chain.Then,the local power devices verify spectrum and energy micro-transactions simultaneously but asynchronously to form local spectrum tangle and local energy tangle,respectively.Moreover,an iterative double auction based micro transactions scheme is designed to solve the spectrum and energy pricing and the amount of shared spectrum and energy among power devices.Security analysis and numerical results illustrate that the developed spectrum-energy chain and the designed iterative double auction based microtransactions scheme are secure and efficient for spectrum sharing and energy trading in power IoT. 展开更多
关键词 power Internet of Things(IoT) spectrum sharing energy trading security and privacy consortium blockchain directed acyclic graph(DAG) iterative double auction
下载PDF
A Secure Microgrid Data Storage Strategy with Directed Acyclic Graph Consensus Mechanism
2
作者 Jian Shang Runmin Guan Wei Wang 《Intelligent Automation & Soft Computing》 SCIE 2023年第9期2609-2626,共18页
The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to ... The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to withstand malicious cyberattacks.To meet the high hardware resource requirements,address the vulnerability to network attacks and poor reliability in the tradi-tional centralized data storage schemes,this paper proposes a secure storage management method for microgrid data that considers node trust and directed acyclic graph(DAG)consensus mechanism.Firstly,the microgrid data storage model is designed based on the edge computing technology.The blockchain,deployed on the edge computing server and combined with cloud storage,ensures reliable data storage in the microgrid.Secondly,a blockchain consen-sus algorithm based on directed acyclic graph data structure is then proposed to effectively improve the data storage timeliness and avoid disadvantages in traditional blockchain topology such as long chain construction time and low consensus efficiency.Finally,considering the tolerance differences among the candidate chain-building nodes to network attacks,a hash value update mechanism of blockchain header with node trust identification to ensure data storage security is proposed.Experimental results from the microgrid data storage platform show that the proposed method can achieve a private key update time of less than 5 milliseconds.When the number of blockchain nodes is less than 25,the blockchain construction takes no more than 80 mins,and the data throughput is close to 300 kbps.Compared with the traditional chain-topology-based consensus methods that do not consider node trust,the proposed method has higher efficiency in data storage and better resistance to network attacks. 展开更多
关键词 MICROGRID data security storage node trust degree directed acyclic graph data structure consensus mechanism secure multi-party computing blockchain
下载PDF
Multi-Class Support Vector Machine Classifier Based on Jeffries-Matusita Distance and Directed Acyclic Graph 被引量:1
3
作者 Miao Zhang Zhen-Zhou Lai +1 位作者 Dan Li Yi Shen 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2013年第5期113-118,共6页
Based on the framework of support vector machines (SVM) using one-against-one (OAO) strategy, a new multi-class kernel method based on directed aeyclie graph (DAG) and probabilistic distance is proposed to raise... Based on the framework of support vector machines (SVM) using one-against-one (OAO) strategy, a new multi-class kernel method based on directed aeyclie graph (DAG) and probabilistic distance is proposed to raise the multi-class classification accuracies. The topology structure of DAG is constructed by rearranging the nodes' sequence in the graph. DAG is equivalent to guided operating SVM on a list, and the classification performance depends on the nodes' sequence in the graph. Jeffries-Matusita distance (JMD) is introduced to estimate the separability of each class, and the implementation list is initialized with all classes organized according to certain sequence in the list. To testify the effectiveness of the proposed method, numerical analysis is conducted on UCI data and hyperspectral data. Meanwhile, comparative studies using standard OAO and DAG classification methods are also conducted and the results illustrate better performance and higher accuracy of the orooosed JMD-DAG method. 展开更多
关键词 multi-class classification support vector machine directed acyclic graph Jeffries-Matusitadistance hyperspcctral data
下载PDF
An Improved Directed Acyclic Graph Support Vector Machine
4
作者 Adel RHUMA Syed Mohsen NAQVI Jonathon CHAMBERS 《Journal of Measurement Science and Instrumentation》 CAS 2011年第4期367-370,共4页
In this paper, we propose an improved Directed Acyclic Graph Support Vector Machine (DAGSVM) for multi-class classification. Compared with the traditional DAGSVM, the improved version has advantages that the structu... In this paper, we propose an improved Directed Acyclic Graph Support Vector Machine (DAGSVM) for multi-class classification. Compared with the traditional DAGSVM, the improved version has advantages that the structure of the directed acyclic graph is not chosen random and fixed, and it can be adaptive to be optimal according to the incoming testing samples, thus it has a good generalization performance. From experiments on six datasets, we can see that the proposed improved version of DAGSVM is better than the traditional one with respect to the accuracy rate. 展开更多
关键词 class classification directed acyclic graph support vector machine
下载PDF
Electromagnetic side-channel attack based on PSO directed acyclic graph SVM 被引量:3
5
作者 Li Duan Zhang Hongxin +2 位作者 Li Qiang Zhao Xinjie He Pengfei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2015年第5期10-15,共6页
Machine learning has a powerful potential for performing the template attack(TA) of cryptographic device. To improve the accuracy and time consuming of electromagnetic template attack(ETA), a multi-class directed acyc... Machine learning has a powerful potential for performing the template attack(TA) of cryptographic device. To improve the accuracy and time consuming of electromagnetic template attack(ETA), a multi-class directed acyclic graph support vector machine(DAGSVM) method is proposed to predict the Hamming weight of the key. The method needs to generate K(K ? 1)/2 binary support vector machine(SVM) classifiers and realizes the K-class prediction using a rooted binary directed acyclic graph(DAG) testing model. Further, particle swarm optimization(PSO) is used for optimal selection of DAGSVM model parameters to improve the performance of DAGSVM. By exploiting the electromagnetic emanations captured while a chip was implementing the RC4 algorithm in software, the computation complexity and performance of several multi-class machine learning methods, such as DAGSVM, one-versus-one(OVO)SVM, one-versus-all(OVA)SVM, Probabilistic neural networks(PNN), K-means clustering and fuzzy neural network(FNN) are investigated. In the same scenario, the highest classification accuracy of Hamming weight for the key reached 100%, 95.33%, 85%, 74%, 49.67% and 38% for DAGSVM, OVOSVM, OVASVM, PNN, K-means and FNN, respectively. The experiment results demonstrate the proposed model performs higher predictive accuracy and faster convergence speed. 展开更多
关键词 directed acyclic graph support vector machine(DAGS
原文传递
Advanced DAG-Based Ranking(ADR)Protocol for Blockchain Scalability
6
作者 Tayyaba Noreen Qiufen Xia Muhammad Zeeshan Haider 《Computers, Materials & Continua》 SCIE EI 2023年第5期2593-2613,共21页
In the past decade,blockchain has evolved as a promising solution to develop secure distributed ledgers and has gained massive attention.However,current blockchain systems face the problems of limited throughput,poor ... In the past decade,blockchain has evolved as a promising solution to develop secure distributed ledgers and has gained massive attention.However,current blockchain systems face the problems of limited throughput,poor scalability,and high latency.Due to the failure of consensus algorithms in managing nodes’identities,blockchain technology is considered inappropriate for many applications,e.g.,in IoT environments,because of poor scalability.This paper proposes a blockchain consensus mechanism called the Advanced DAG-based Ranking(ADR)protocol to improve blockchain scalability and throughput.The ADR protocol uses the directed acyclic graph ledger,where nodes are placed according to their ranking positions in the graph.It allows honest nodes to use theDirect Acyclic Graph(DAG)topology to write blocks and verify transactions instead of a chain of blocks.By using a three-step strategy,this protocol ensures that the system is secured against doublespending attacks and allows for higher throughput and scalability.The first step involves the safe entry of nodes into the system by verifying their private and public keys.The next step involves developing an advanced DAG ledger so nodes can start block production and verify transactions.In the third step,a ranking algorithm is developed to separate the nodes created by attackers.After eliminating attacker nodes,the nodes are ranked according to their performance in the system,and true nodes are arranged in blocks in topological order.As a result,the ADR protocol is suitable for applications in the Internet of Things(IoT).We evaluated ADR on EC2 clusters with more than 100 nodes and achieved better transaction throughput and liveness of the network while adding malicious nodes.Based on the simulation results,this research determined that the transaction’s performance was significantly improved over blockchains like Internet of Things Applications(IOTA)and ByteBall. 展开更多
关键词 Blockchain SCALABILITY directed acyclic graph advanced DAG-based ranking protocol
下载PDF
Dependent task assignment algorithm based on particle swarm optimization and simulated annealing in ad-hoc mobile cloud 被引量:3
7
作者 Huang Bonan Xia Weiwei +4 位作者 Zhang Yueyue Zhang Jing Zou Qian Yan Feng Shen Lianfeng 《Journal of Southeast University(English Edition)》 EI CAS 2018年第4期430-438,共9页
In order to solve the problem of efficiently assigning tasks in an ad-hoc mobile cloud( AMC),a task assignment algorithm based on the heuristic algorithm is proposed. The proposed task assignment algorithm based on pa... In order to solve the problem of efficiently assigning tasks in an ad-hoc mobile cloud( AMC),a task assignment algorithm based on the heuristic algorithm is proposed. The proposed task assignment algorithm based on particle swarm optimization and simulated annealing( PSO-SA) transforms the dependencies between tasks into a directed acyclic graph( DAG) model. The number in each node represents the computation workload of each task and the number on each edge represents the workload produced by the transmission. In order to simulate the environment of task assignment in AMC,mathematical models are developed to describe the dependencies between tasks and the costs of each task are defined. PSO-SA is used to make the decision for task assignment and for minimizing the cost of all devices,which includes the energy consumption and time delay of all devices.PSO-SA also takes the advantage of both particle swarm optimization and simulated annealing by selecting an optimal solution with a certain probability to avoid falling into local optimal solution and to guarantee the convergence speed. The simulation results show that compared with other existing algorithms,the PSO-SA has a smaller cost and the result of PSO-SA can be very close to the optimal solution. 展开更多
关键词 ad-hoc mobile cloud task assignment algorithm directed acyclic graph particle swarm optimization simulated annealing
下载PDF
A version management model of PDM system and its realization 被引量:2
8
作者 钟诗胜 李涛 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第4期459-464,共6页
Based on the key function of version management in PDM system, this paper discusses the function and the realization of version management and the transitions of version states with a workflow. A directed aeyclic grap... Based on the key function of version management in PDM system, this paper discusses the function and the realization of version management and the transitions of version states with a workflow. A directed aeyclic graph is used to describe a version model. Three storage modes of the directed acyelic graph version model in the database, the bumping block and the PDM working memory are presented and the conversion principle of these three modes is given. The study indicates that building a dynamic product structure configuration model based on versions is the key to resolve the problem. Thus a version model of single product object is built. Then the version management model in product structure configuration is built and the application of version management of PDM syster is presented as a case. 展开更多
关键词 product data management (PDM) version management directed acyclic graph version model product structure configuration management
下载PDF
Clustering and Scheduling Method Based on Task Duplication
9
作者 HE Kun ZHAO Yong 《Wuhan University Journal of Natural Sciences》 CAS 2007年第2期260-266,共7页
A new heuristic approach that resembles the evolution of interpersonal relationships in human society is put forward for the problem of scheduling multitasks represented by a directed acyclic graph. The algorithm incl... A new heuristic approach that resembles the evolution of interpersonal relationships in human society is put forward for the problem of scheduling multitasks represented by a directed acyclic graph. The algorithm includes dynamic-group, detachgraph and front-sink components. The priority rules used are new. Relationship number, potentiality, weight and merge degree are defined for cluster's priority, and task potentiality for tasks' priority. Experiments show the algorithm could get good result in short time. The algorithm produces another optimal solution for the classic MJD benchmark. Its average performance is better than five latter-day representative algorithms, especially six benchmarks of the nines. 展开更多
关键词 CLUSTERING directed acyclic graph task duplication task scheduling
下载PDF
Time optimization for workflow scheduling based on the combination of task attributes
10
作者 Lu Ruiqi Zhu Chenyan +2 位作者 Cai Hailin Zhou Jiawei Jiang Junqiang 《Journal of Southeast University(English Edition)》 EI CAS 2020年第4期399-406,共8页
In order to reduce the scheduling makespan of a workflow,three list scheduling algorithms,namely,level and out-degree earliest-finish-time(LOEFT),level heterogeneous selection value(LHSV),and heterogeneous priority ea... In order to reduce the scheduling makespan of a workflow,three list scheduling algorithms,namely,level and out-degree earliest-finish-time(LOEFT),level heterogeneous selection value(LHSV),and heterogeneous priority earliest-finish-time(HPEFT)are proposed.The main idea hidden behind these algorithms is to adopt task depth,combined with task out-degree for the accurate analysis of task prioritization and precise processor allocation to achieve time optimization.Each algorithm is divided into three stages:task levelization,task prioritization,and processor allocation.In task levelization,the workflow is divided into several independent task sets on the basis of task depth.In task prioritization,the heterogeneous priority ranking value(HPRV)of the task is calculated using task out-degree,and a non-increasing ranking queue is generated on the basis of HPRV.In processor allocation,the sorted tasks are assigned one by one to the processor to minimize makespan and complete the task-processor mapping.Simulation experiments through practical applications and stochastic workflows confirm that the three algorithms can effectively shorten the workflow makespan,and the LOEFT algorithm performs the best,and it can be concluded that task depth combined with out-degree is an effective means of reducing completion time. 展开更多
关键词 directed acyclic graph workflow scheduling task depth task out-degree list heuristic
下载PDF
Performance analysis and comparison of PoW,PoS and DAG based blockchains 被引量:20
11
作者 Bin Cao Zhenghui Zhang +4 位作者 Daquan Feng Shengli Zhang Lei Zhang Mugen Peng Yun Li 《Digital Communications and Networks》 SCIE 2020年第4期480-485,共6页
In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no... In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no technical analysis and comparison as a guideline to determine which type of consensus mechanism should be adopted in a specific scenario/application.To this end,this work investigates three mainstream consensus mechanisms in the blockchain,namely,Proof of Work(PoW),Proof of Stake(PoS),and Direct Acyclic Graph(DAG),and identifies their performances in terms of the average time to generate a new block,the confirmation delay,the Transaction Per Second(TPS)and the confirmation failure probability.The results show that the consensus process is affected by both network resource(computation power/coin age,buffer size)and network load conditions.In addition,it shows that PoW and PoS are more sensitive to the change of network resource while DAG is more sensitive to network load conditions. 展开更多
关键词 Blockchain Proof of work Proof of stake Direct acyclic graph Performance comparison
下载PDF
Multi-satellite observation integrated scheduling method oriented to emergency tasks and common tasks 被引量:22
12
作者 Guohua Wu Manhao Ma +1 位作者 Jianghan Zhu Dishan Qiu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2012年第5期723-733,共11页
Satellite observation scheduling plays a significant role in improving the efficiency of satellite observation systems.Although many scheduling algorithms have been proposed,emergency tasks,characterized as importance... Satellite observation scheduling plays a significant role in improving the efficiency of satellite observation systems.Although many scheduling algorithms have been proposed,emergency tasks,characterized as importance and urgency(e.g.,observation tasks orienting to the earthquake area and military conflict area),have not been taken into account yet.Therefore,it is crucial to investigate the satellite integrated scheduling methods,which focus on meeting the requirements of emergency tasks while maximizing the profit of common tasks.Firstly,a pretreatment approach is proposed,which eliminates conflicts among emergency tasks and allocates all tasks with a potential time-window to related orbits of satellites.Secondly,a mathematical model and an acyclic directed graph model are constructed.Thirdly,a hybrid ant colony optimization method mixed with iteration local search(ACO-ILS) is established to solve the problem.Moreover,to guarantee all solutions satisfying the emergency task requirement constraints,a constraint repair method is presented.Extensive experimental simulations show that the proposed integrated scheduling method is superior to two-phased scheduling methods,the performance of ACO-ILS is greatly improved in both evolution speed and solution quality by iteration local search,and ACO-ILS outperforms both genetic algorithm and simulated annealing algorithm. 展开更多
关键词 satellite scheduling emergency task ant colony optimization(ACO) iteration local search(ILS) acyclic directed graph model
下载PDF
NEW BOUNDS ON TIME AND NUMBER OF PROCESSORS FOR MULTIPROCESSOR OPTIMAL SCHEDULES
13
作者 HAO SUN PU LIU +1 位作者 JIKAI LI DECHUNG PENG(National Key Laboratory Of Software Engineering,Wuban Unfuersity mahan, 430072, P.R China. Institute of software, Chinese Academy of Sciences, Beijing, 10080, P.R China.) 《Wuhan University Journal of Natural Sciences》 CAS 1996年第Z1期350-355,共6页
Two problems for task schedules in a multiprocessor parallel system are discussed in Ans paper (1) given a partially ordered set of tasks represented by the venices of an acyclic directed graph with their correspondin... Two problems for task schedules in a multiprocessor parallel system are discussed in Ans paper (1) given a partially ordered set of tasks represented by the venices of an acyclic directed graph with their corresponding processing bines, derive the lower bound on the Annimum time(LBMT) needed to process the task graph for a given number of processors. (2) Determine the lower bound on minimum number of processors(LBMP) needed to complete those tasks in minimum bine. It is shown that the proposed LBMT is sharper than previously Known values and the comPUtational aspeCts of these bounds are also discussed. 展开更多
关键词 parallel processing bound on time optimal scheduling partition directed acyclic task graphs.
下载PDF
Dynamic Routing Algorithm for Increasing Robustness in Satellite Networks
14
作者 李冬妮 张大坤 《Journal of Beijing Institute of Technology》 EI CAS 2008年第3期305-310,共6页
In low earth orbit(LEO) and medium earth orbit(MEO) satellite networks, the network topology changes rapidly because of the high relative speed movement of satellites. When some inter-satellite links (ISLs) fail... In low earth orbit(LEO) and medium earth orbit(MEO) satellite networks, the network topology changes rapidly because of the high relative speed movement of satellites. When some inter-satellite links (ISLs) fail, they can not be repaired in a short time. In order to increase the robustness for LEO/MEO satel- lite networks, an effective dynamic routing algorithm is proposed. All the routes to a certain node are found by constructing a destination oriented acyclic directed graph(DOADG) with the node as the destination. In this algorithm, multiple routes are provided, loop-free is guaranteed, and as long as the DOADG maintains, it is not necessary to reroute even if some ISLs fail. Simulation results show that comparing to the conventional routing algorithms, it is more efficient and reliable, costs less transmission overhead and converges faster. 展开更多
关键词 satellite networks ROUTING inter-sateUite link acyclic directed graph
下载PDF
Crowd sensing data delivery based on tangle DAG network
15
作者 Chen Hui Jiang Xiaoling +1 位作者 Wu Tianting Mou Xingyu 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2023年第3期88-98,共11页
In view of the fact that current data delivery methods are not enough to meet the security requirements of today’s distributed crowd sensing,and the data delivery methods are not flexible enough,this paper proposes a... In view of the fact that current data delivery methods are not enough to meet the security requirements of today’s distributed crowd sensing,and the data delivery methods are not flexible enough,this paper proposes a crowd sensing data interaction method based on tangle directed acyclic graph(DAG)network.In this method,users and platforms are regarded as nodes of the network in the process of performing crowd sensing tasks.First,the heaviest chain is generated through the main chain strategy to ensure the stability of the network.Then,the hidden Markov model(HMM)prediction model is used to improve the correlation of the perceived data to improve the performance.Then,the confidential transaction and commitment algorithm is used to ensure the reliability of the transaction,overcome the security risks faced by the trusted third party,and simplify the group intelligence aware transaction mode.Finally,through simulation experiments,the security and feasibility of the group intelligence aware data delivery method based on tangle DAG network are verified. 展开更多
关键词 data delivery crowd sensing tangle directed acyclic graph(DAG) confidential transactions
原文传递
Global Systemic Financial Risk Spillovers and Their External Shocks 被引量:4
16
作者 Yang Zihui Zhou Yinggang 《Social Sciences in China》 2020年第2期26-49,共24页
The shock of the global financial crisis sparked widespread concern across the world about systemic financial risk and led to the reexamination of regulatory mechanisms.The traditional principle of“too big to fail”u... The shock of the global financial crisis sparked widespread concern across the world about systemic financial risk and led to the reexamination of regulatory mechanisms.The traditional principle of“too big to fail”underwent a transformation into the new idea of“too interconnected to fail.”We used Directed Acyclic Graph(DAG)technology and network topology analysis to examine the dynamic evolution of global systemic financial risk and the risk trends in global financial markets from the perspective of network connectivity.Our findings show that financial markets in the Chinese Mainland are net receivers of risk spillovers and that systemic financial risk has a clear cross-market contagion effect due to a global volatility spillover scale of 64 percent.To maintain the stability and security of China’s financial markets,consideration should be given to the regulatory precept of“too interconnected to fail”in establishing macro-prudential risk prevention mechanisms. 展开更多
关键词 systemic financial risk directed acyclic graph network topology approach
原文传递
A novel combination belief rule base model for mechanical equipment fault diagnosis 被引量:2
17
作者 Manlin CHEN Zhijie ZHOU +2 位作者 Bangcheng ZHANG Guanyu HU You CAO 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2022年第5期158-178,共21页
Due to the excellent performance in complex systems modeling under small samples and uncertainty,Belief Rule Base(BRB)expert system has been widely applied in fault diagnosis.However,the fault diagnosis process for co... Due to the excellent performance in complex systems modeling under small samples and uncertainty,Belief Rule Base(BRB)expert system has been widely applied in fault diagnosis.However,the fault diagnosis process for complex mechanical equipment normally needs multiple attributes,which can lead to the rule number explosion problem in BRB,and limit the efficiency and accuracy.To solve this problem,a novel Combination Belief Rule Base(C-BRB)model based on Directed Acyclic Graph(DAG)structure is proposed in this paper.By dispersing numerous attributes into the parallel structure composed of different sub-BRBs,C-BRB can effectively reduce the amount of calculation with acceptable result.At the same time,a path selection strategy considering the accuracy of child nodes is designed in C-BRB to obtain the most suitable submodels.Finally,a fusion method based on Evidential Reasoning(ER)rule is used to combine the belief rules of C-BRB and generate the final results.To illustrate the effectiveness and reliability of the proposed method,a case study of fault diagnosis of rolling bearing is conducted,and the result is compared with other methods. 展开更多
关键词 Fault diagnosis Belief rule base directed acyclic graph Evidential reasoning Mechanical equipment
原文传递
A mobile edge computing-based applications execution framework for Internet of Vehicles 被引量:1
18
作者 Libing WU Rui ZHANG +2 位作者 Qingan LI Chao MA Xiaochuan SHI 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第5期131-141,共11页
Mobile edge computing(MEC)is a promising technology for the Internet of Vehicles,especially in terms of application offloading and resource allocation.Most existing offloading schemes are sub-optimal,since these offlo... Mobile edge computing(MEC)is a promising technology for the Internet of Vehicles,especially in terms of application offloading and resource allocation.Most existing offloading schemes are sub-optimal,since these offloading strategies consider an application as a whole.In comparison,in this paper we propose an application-centric framework and build a finer-grained offloading scheme based on application partitioning.In our framework,each application is modelled as a directed acyclic graph,where each node represents a subtask and each edge represents the data flow dependency between a pair of subtasks.Both vehicles and MEC server within the communication range can be used as candidate offloading nodes.Then,the offloading involves assigning these computing nodes to subtasks.In addition,the proposed offloading scheme deal with the delay constraint of each subtask.The experimental evaluation show that,compared to existing non-partitioning offloading schemes,this proposed one effectively improves the performance of the application in terms of execution time and throughput. 展开更多
关键词 mobile edge computing application partition directed acyclic graph OFFLOADING Internet of Vehicles
原文传递
A Scheduling Optimization Technique Based on Reuse in Spark to Defend Against APT Attack 被引量:1
19
作者 Jianchao Tang Ming Xu +1 位作者 Shaojing Fu Kai Huang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第5期550-560,共11页
Advanced Persistent Threat (APT) attack, an attack option in recent years, poses serious threats to the security of governments and enterprises data due to its advanced and persistent attacking characteristics. To a... Advanced Persistent Threat (APT) attack, an attack option in recent years, poses serious threats to the security of governments and enterprises data due to its advanced and persistent attacking characteristics. To address this issue, a security policy of big data analysis has been proposed based on the analysis of log data of servers and terminals in Spark. However, in practical applications, Spark cannot suitably analyze very huge amounts of log data. To address this problem, we propose a scheduling optimization technique based on the reuse of datasets to improve Spark performance. In this technique, we define and formulate the reuse degree of Directed Acyclic Graphs (DAGs) in Spark based on Resilient Distributed Datasets (RDDs). Then, we define a global optimization function to obtain the optimal DAG sequence, that is, the sequence with the least execution time. To implement the global optimization function, we further propose a novel cost optimization algorithm based on the traditional Genetic Algorithm (GA). Our experiments demonstrate that this scheduling optimization technique in Spark can greatly decrease the time overhead of analyzing log data for detecting APT attacks. 展开更多
关键词 SPARK Advanced Persistent Threat (APT) schedule REUSE Resilient Distributed Dataset (RDD) directed acyclic graph (DAG) Genetic Algorithm (GA)
原文传递
Energy-aware scheduling with reconstruction and frequency equalization on heterogeneous systems
20
作者 Yong-xing LIU Ken-li LI +1 位作者 Zhuo TANG Ke-qin LI 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2015年第7期519-531,共13页
With the increasing energy consumption of computing systems and the growing advocacy for green computing, energy efficiency has become one of the critical challenges in high-performance heterogeneous computing systems... With the increasing energy consumption of computing systems and the growing advocacy for green computing, energy efficiency has become one of the critical challenges in high-performance heterogeneous computing systems. Energy consumption can be reduced by not only hardware design but also software design. In this paper, we propose an energy-aware scheduling algorithm with equalized frequency, called EASEF, for parallel applications on heterogeneous computing systems. The EASEF approach aims to minimize the finish time and overall energy consumption. First, EASEF extracts the set of paths from an application. Then, it reconstructs the application based on the extracted set of paths to achieve a reasonable schedule. Finally, it adopts a progressive way to equalize the frequency of tasks to reduce the total energy consumption of systems. Randomly generated applications and two real-world applications are examined in our experiments. Experimental results show that the EASEF algorithm outperforms two existing algorithms in terms of makespan and energy consumption. 展开更多
关键词 directed acyclic graph Dynamic voltage scaling Energy aware Heterogeneous systems Taskscheduling
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部