Project Title list & Abstract

advertisement
Cloud Computing & Mobile Computing & Networking Related Titles and Abstract:
1. Guest Editorial: Recommendation Techniques for Services Computing and Cloud
Computing
Abstract:As the number of Web services surges rapidly, recommending the right service for
various users on demand has become one of the most challenging research issues in the fields
of services computing and cloud computing. This special issue focuses on the
recommendation techniques for services computing and cloud computing including classic
recommendation algorithms for services computing and cloud computing, emerging
recommendation techniques for service selection and composition, and applications of
recommendation techniques in composition of complex service mashups, ad-hoc social
networks, and green cloud environment.
The papers introduced in this special issue illustrate the efficiency and effectiveness
of services computing and cloud computing, while demonstrating a variety of challenges that
arise. It is expected that this special issue, as a whole, will provide integrated and synthesized
view of the current state of the art, identify key challenges, possible research directions and
opportunities for investigation, and promote community-building efforts among researchers
and practitioners in the related fields.
2. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
Abstract:In recent years, recommendation systems have seen significant evolution in the field
of knowledge engineering. Most of the existing recommendation systems based their models
on collaborative filtering approaches that make them simple to implement. However,
performance of most of the existing collaborative filtering-based recommendation system
suffers due to the challenges, such as: (a) cold start, (b) data sparseness, and (c) scalability.
Moreover, recommendation problem is often characterized by the presence of many
conflicting objectives or decision variables, such as users’ preferences and venue closeness.
In this paper, we proposed MobiContext, a hybrid cloud-based Bi-Objective
Recommendation Framework (BORF) for mobile social networks.
The MobiContext utilizes multi-objective optimization techniques to generate
personalized recommendations. To address the issues pertaining to cold start and data
sparseness, the BORF performs data pre-processing by using the Hub-Average (HA)
inference model. Moreover, the Weighted Sum Approach (WSA) is implemented for scalar
optimization and an evolutionary algorithm (NSGA-II) is applied for vector optimization to
provide optimal suggestions to the users about a venue. The results of comprehensive
Contact: 8681073727, ehivetechnologies@gmail.com
experiments on a large-scale real dataset confirm the accuracy of the proposed
recommendation framework.
3. A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing
Services
Abstract:In modern societies, the number of mobile users has dramatically risen in recent
years. In this paper, an efficient authentication scheme for distributed mobile cloud
computing services is proposed. The proposed scheme provides security and convenience for
mobile users to access multiple mobile cloud computing services from multiple service
providers using only a single private key. The security strength of the proposed scheme is
based on bilinear pairing cryptosystem and dynamic nonce generation. In addition, the
scheme supports mutual authentication, key exchange, user anonymity, and user untraced
ability. From system implementation point of view, verification tables are not required for the
trusted smart card generator (SCG) service and cloud computing service providers when
adopting the proposed scheme.
In consequence, this scheme reduces the usage of memory spaces on these
corresponding service providers. In one mobile user authentication session, only the targeted
cloud service provider needs to interact with the service requestor (user). The trusted SCG
serves as the secure key distributor for distributed cloud service providers and mobile clients.
In the proposed scheme, the trusted SCG service is not involved in individual user
authentication process. With this design, our scheme reduces authentication processing time
required by communication and computation between cloud service providers and traditional
trusted third party service. Formal security proof and performance analyses are conducted to
show that the scheme is both secure and efficient.
4. Collaborative Location-Based Sleep Scheduling for Wireless Sensor Networks
Integrated with Mobile Cloud Computing
Abstract:Recently, much research has proposed to integrate mobile cloud computing (MCC)
with wireless sensor networks (WSNs) so that powerful cloud computing can be exploited to
process the data gathered by ubiquitous WSNs and share the results with mobile users.
However, all current MCC-WSN integration schemes ignore the following two observations:
1) the specific data mobile users request usually depend on the current locations of mobile
users 2) most sensors are usually equipped with non-rechargeable batteries with limited
energy.
In this paper, motivated by these two observations, two novel collaborative locationbased sleep scheduling (CLSS) schemes are proposed for WSNs integrated with MCC. Based
on the locations of mobile users, CLSS dynamically determines the awake or asleep status of
Contact: 8681073727, ehivetechnologies@gmail.com
each sensor node to reduce energy consumption of the integrated WSN. Particularly, CLSS1
focuses on maximizing the energy consumption saving of the integrated WSN while CLSS2
considers also the scalability and robustness of the integrated WSN. Theoretical and
simulation results show that for WSNs integrated with MCC, both CLSS1 and CLSS2 can
prolong the WSN lifetime while still satisfying the data requests of mobile users.
5. Collaborative Task Execution in Mobile Cloud Computing Under a Stochastic
Wireless Channel
Abstract:This paper investigates collaborative task execution between a mobile device and a
cloud clone for mobile applications under a stochastic wireless channel. A mobile application
is modeled as a sequence of tasks that can be executed on the mobile device or on the cloud
clone. We aim to minimize the energy consumption on the mobile device while meeting a
time deadline, by strategically offloading tasks to the cloud. We formulate the collaborative
task execution as a constrained shortest path problem. We derive a one-climb policy by
characterizing the optimal solution and then propose an enumeration algorithm for the
collaborative task execution in polynomial time.
Further, we apply the LARAC algorithm to solving the optimization problem
approximately, which has lower complexity than the enumeration algorithm. Simulation
results show that the approximate solution of the LARAC algorithm is close to the optimal
solution of the enumeration algorithm. In addition, we consider a probabilistic time deadline,
which is transformed to hard deadline by Markov inequality. Moreover, compared to the
local execution and the remote execution, the collaborative task execution can significantly
save the energy consumption on the mobile device, prolonging its battery life.
6. Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud
Abstract:Despite the advances in hardware for hand-held mobile devices, resource-intensive
applications (e.g., video and image storage and processing or map-reduce type) still remain
off bounds since they require large computation and storage capabilities. Recent research has
attempted to address these issues by employing remote servers, such as clouds and peer
mobile devices. For mobile devices deployed in dynamic networks (i.e., with frequent
topology changes because of node failure/unavailability and mobility as in a mobile cloud),
however, challenges of reliability and energy efficiency remain largely unaddressed.
To the best of our knowledge, we are the first to address these challenges in an
integrated manner for both data storage and processing in mobile cloud, an approach we call
k-out-of-n computing. In our solution, mobile devices successfully retrieve or process data, in
the most energy-efficient way, as long as k out of n remote servers are accessible. Through a
real system implementation we prove the feasibility of our approach. Extensive simulations
demonstrate the fault tolerance and energy efficiency performance of our framework in larger
scale networks.
Contact: 8681073727, ehivetechnologies@gmail.com
7. Joint Cloud and Wireless Networks Operations in Mobile Cloud Computing
Environments with Telecom Operator Cloud
Abstract:In mobile cloud computing systems, cloud computing has a significant impact on
wireless networks. Cloud computing and wireless networks have traditionally been addressed
separately in the literature. In this paper, we jointly study the operations of cloud computing
and wireless networks in mobile computing environments, where the objective is to improve
the end-to-end performances of cloud mobile media delivered through mobile cloud
computing systems. Unlike most existing studies on wireless networks, where only the
spectrum efficiency is considered, we consider not only the spectrum efficiency in wireless
networks but also the pricing information in the cloud, based on which power allocation and
interference management in the wireless networks are performed.
We formulate the problems encountered in the operations of mobile cloud computing
environments, including determining the price to charge for media services, resource
allocation, and interference management, as a Stackelberg game model. Moreover, we extend
this game model with multiple players through network virtualization technology, and adopt
the replicator dynamics method to solve the evolutionary game between the different groups
of small cells. Furthermore, a backward induction method is used to analyze the proposed
Stackelberg game. Simulation results are presented to show the effectiveness of the proposed
techniques.
8. Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks
with Delay-Constrained Traffics
Abstract:In this paper, we consider lossy mobile ad hoc networks where the data rate of a given
flow becomes lower and lower along its routing path. One of the main challenges in lossy
mobile ad hoc networks is how to achieve the conflicting goal of increased network utility
and reduced power consumption, while without following the instantaneous state of a fading
channel. To address this problem, we propose a cross-layer rate-effective network utility
maximization (RENUM) framework by taking into account the lossy nature of wireless links
and the constraints of rate outage probability and average delay. In the proposed framework,
the utility is associated with the effective rate received at the destination node of each flow
instead of the injection rate at the source of the flow.
We then present a distributed joint transmission rate, link power and average delay
control algorithm, in which explicit broadcast message passing is required for power
allocation algorithm. Motivated by the desire of power control devoid of message passing, we
give a near-optimal power-allocation scheme that makes use of autonomous SINR
measurements at each link and enjoys a fast convergence rate. The proposed algorithm is
shown through numerical simulations to outperform other network utility maximization
algorithms without rate outage probability/average delay constraints, leading to a higher
Contact: 8681073727, ehivetechnologies@gmail.com
effective rate, lower power consumption and delay. Furthermore, we conduct extensive
network-wide simulations in NS-2 simulator to evaluate the performance of the algorithm in
terms of throughput, delay, packet delivery ratio and fairness.
9. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid
Wireless Networks
Abstract:Hybrid wireless networks combining the advantages of both mobile ad-hoc
networks and infrastructure wireless networks have been receiving increased attention
due to their ultra-high performance. An efficient data routing protocol is important in
such networks for high network capacity and scalability. However, most routing
protocols for these networks simply combine the ad-hoc transmission mode with the
cellular transmission mode, which inherits the drawbacks of ad-hoc transmission. This
paper presents a Distributed Three-hop Routing protocol (DTR) for hybrid wireless
networks. To take full advantage of the widespread base stations, DTR divides a
message data stream into segments and transmits the segments in a distributed
manner.
It makes full spatial reuse of a system via its high speed ad-hoc interface and
alleviates mobile gateway congestion via its cellular interface. Furthermore, sending
segments to a number of base stations simultaneously increases throughput and makes
full use of widespread base stations. In addition, DTR significantly reduces overhead
due to short path lengths and the elimination of route discovery and maintenance.
DTR also has a congestion control algorithm to avoid overloading base stations.
Theoretical analysis and simulation results show the superiority of DTR in comparison
with other routing protocols in terms of throughput capacity, scalability and mobility
resilience. The results also show the effectiveness of the congestion control algorithm
in balancing the load between base stations.
10. A Privacy-Preserving Framework for Managing Mobile Ad Requests and Billing
Information
Abstract:Organizations are starting to realize the significant value of advertising on mobile
devices, and a number of systems have been developed to exploit this opportunity. From a
privacy perspective, practically all systems developed so far are based either on a trusted
third-party model or on a generalized architecture. We propose a system for delivering
context, location, time, and preference-aware advertisements to mobiles with a novel
architecture to preserve privacy.
The main adversary in our model is the server distributing the ads, which is trying to
identify users and track them, and to a lesser extent, other peers in the wireless network.
Contact: 8681073727, ehivetechnologies@gmail.com
When a node is interested in an ad, it forms a group of nearby nodes seeking ads and willing
to cooperate to achieve privacy. Peers combine their interests using a shuffling mechanism in
an ad-hoc network and send them through a primary peer to the ad-server. In this way,
preferences are masqueraded to request custom ads, which are then distributed by the primary
peer. Another mechanism is proposed to implement the billing process without disclosing
user identities.
11. Context-Aware QoE Modelling, Measurement, and Prediction in Mobile
Computing Systems
Abstract:Quality of Experience (QoE) as an aggregate of Quality of Service (QoS) and human
user-related metrics will be the key success factor for current and future mobile computing
systems. QoE measurement and prediction are complex tasks as they may involve a large
parameter space such as location, delay, jitter, packet loss, and user satisfaction just to name a
few. These tasks necessitate the development of practical context-aware QoE models that
efficiently determine relationships between user context and QoE parameters. In this paper,
we propose, develop, and validate a novel decision-theoretic approach called CaQoEM for
QoE modelling, measurement, and prediction.
We address the challenge of QoE measurement and prediction where each QoE
parameter can be measured on a different scale and may involve different units of
measurement. CaQoEM is context-aware and uses Bayesian networks and utility theory to
measure and predict users’ QoE under uncertainty. We validate CaQoEM using extensive
experimentation, user studies and simulations. The results soundly demonstrate that CaQoEM
correctly measures range-defined QoE using a bipolar scale. For QoE prediction, an overall
accuracy of 98.93% was achieved using 10-fold cross validation in multiple diverse network
conditions such as vertical handoffs, wireless signal fading and wireless network congestion.
12. Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless
Sensor Networks
Abstract:Applications running on the same Wireless Sensor Network (WSN) platform usually
have different Quality of Service (QoS) requirements. Two basic requirements are low delay
and high data integrity. However, in most situations, these two requirements cannot be
satisfied simultaneously.
In this paper, based on the concept of potential in physics, we propose IDDR, a
multi-path dynamic routing algorithm, to resolve this conflict. By constructing a virtual
hybrid potential field, IDDR separates packets of applications with different QoS
requirements according to the weight assigned to each packet, and routes them towards the
Contact: 8681073727, ehivetechnologies@gmail.com
sink through different paths to improve the data fidelity for integrity-sensitive applications as
well as reduce the end-to-end delay for delay-sensitive ones. Using the Lyapunov drift
technique, we prove that IDDR is stable. Simulation results demonstrate that IDDR provides
data integrity and delay differentiated services.
13. Friendbook: A Semantic-Based Friend Recommendation System for Social
Networks
Abstract:Existing social networking services recommend friends to users based on their social
graphs, which may not be the most appropriate to reflect a user’s preferences on friend
selection in real life. In this paper, we present Friendbook, a novel semantic-based friend
recommendation system for social networks, which recommends friends to users based on
their life styles instead of social graphs. By taking advantage of sensor-rich smartphones,
Friendbook discovers life styles of users from user-centric sensor data, measures the
similarity of life styles between users, and recommends friends to users if their life styles
have high similarity. Inspired by text mining, we model a user’s daily life as life documents,
from which his/her life styles are extracted by using the Latent Dirichlet Allocation
algorithm.
We further propose a similarity metric to measure the similarity of life styles between
users, and calculate users’ impact in terms of life styles with a friend-matching graph. Upon
receiving a request, Friendbook returns a list of people with highest recommendation scores
to the query user. Finally, Friendbook integrates a feedback mechanism to further improve
the recommendation accuracy. We have implemented Friendbook on the Android-based
smartphones, and evaluated its performance on both small-scale experiments and large-scale
simulations. The results show that the recommendations accurately reflect the preferences of
users in choosing friends.
14. Influence Maximization on Large-Scale Mobile Social Network: A Divide-andConquer Method
Abstract:With the proliferation of mobile devices and wireless technologies, mobile social
network systems are increasingly available. A mobile social network plays an essential role
as the spread of information and influence in the form of “word-of-mouth”. It is a
fundamental issue to find a subset of influential individuals in a mobile social network such
that targeting them initially (e.g., to adopt a new product) will maximize the spread of the
influence (further adoptions of the new product). The problem of finding the most influential
nodes is unfortunately NP-hard. It has been shown that a Greedy algorithm with provable
approximation guarantees can give good approximation; However, it is computationally
expensive, if not prohibitive, to run the greedy algorithm on a large mobile social network. In
Contact: 8681073727, ehivetechnologies@gmail.com
this paper, a divide-and-conquer strategy with parallel computing mechanism has been
adopted.
We first propose an algorithm called Community-based Greedy algorithm for mining
top-K influential nodes. It encompasses two components: dividing the large-scale mobile
social network into several communities by taking into account information diffusion and
selecting communities to find influential nodes by a dynamic programming. Then, to further
improve the performance, we parallelize the influence propagation based on communities and
consider the influence propagation crossing communities. Also, we give precision analysis to
show approximation guarantees of our models. Experiments on real large-scale mobile social
networks show that the proposed methods are much faster than previous algorithms,
meanwhile, with high accuracy.
15. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic
Networks
Abstract:In opportunistic networks, direct communication between mobile devices is used to
extend the set of services accessible through cellular or Wi-Fi networks. Mobility patterns
and their impact in such networks have been extensively studied. In contrast, this has not
been the case with communication traffic patterns, where homogeneous traffic between all
nodes is usually assumed. This assumption is generally not true, as node mobility and social
characteristics can significantly affect the end-to-end traffic demand between them. To this
end, in this paper we explore the joint effect of traffic patterns and node mobility on the
performance of popular forwarding mechanisms, both analytically and through simulations.
Among the different insights stemming from our analysis, we identify conditions
under which heterogeneity renders the added value of using extra relays more/less useful.
Furthermore, we confirm the intuition that an increasing amount of heterogeneity closes the
performance gap between different forwarding policies, making end to- end routing more
challenging in some cases, or less necessary in others. To our best knowledge, this is the first
effort to model, analyze, and quantify effects of traffic heterogeneity. We believe this is an
important step towards better protocol design and evaluation of the feasibility of applications
in opportunistic networks.
16.Towards Information Diffusion in Mobile Social Networks
Abstract:The emerging of mobile social networks opens opportunities for viral marketing.
However, before fully utilizing mobile social networks as a platform for viral marketing,
many challenges have to be addressed. In this paper, we address the problem of identifying a
Contact: 8681073727, ehivetechnologies@gmail.com
small number of individuals through whom the information can be diffused to the network as
soon as possible, referred to as the diffusion minimization problem. Diffusion minimization
under the probabilistic diffusion model can be formulated as an asymmetric k- center
problem which is NP-hard, and the best known approximation algorithm for the asymmetric
k-center problem has approximation ratio of log
n and time
complexity O(n5). Clearly, the performance and the time complexity of the approximation
algorithm are not satisfiable in large-scale mobile social networks. To deal with this problem,
we propose a community based algorithm and a distributed set-cover algorithm.
The performance of the proposed algorithms is evaluated by extensive experiments on
both synthetic networks and a real trace. The results show that the community based
algorithm has the best performance in both synthetic networks and the real trace compared to
existing algorithms, and the distributed set-cover algorithm outperforms the approximation
algorithm in the real trace in terms of diffusion time.
17. Energy-Efficient Intrusion Detection and Mitigation for Networked Control Systems
Security
Abstract:This paper proposes an energy-efficient security aware architecture for wireless
control systems to be used in factory automation. We face deception attacks that corrupt
commands and measurements in a smart way and with intermittent behaviour to produce the
highest damage without being discovered. The intrusion is hard to distinguish from normal
disturbance. Furthermore, protection against attacks is energy-consuming and it would be
desirable to activate protection only when needed.
We pose packet-based selective encryption to reduce energy consumption, and to
detect when an attack starts and ends. Since energy consumption depends also on packet
transmission rate, especially during attacks, we also propose to adapt it according to
instantaneous control performance.
Data Mining Related Titles and Abstract:
18. Accelerated Continuous Conditional Random Fields for Load Forecasting
Abstract:Increasingly, aiming to contain their rapidly growing energy expenditures,
commercial buildings are equipped to respond to utility’s demand and price signals. Such
smart energy consumption, however, heavily relies on accurate short-term energy load
forecasting, such as hourly predictions for the next n (n>=2 hours. To attain sufficient
Contact: 8681073727, ehivetechnologies@gmail.com
accuracy for these predictions, it is important to exploit the relationships among the n
estimated outputs. This paper treats such multi-steps ahead regression task as a sequence
labeling (regression) problem, and adopts the continuous conditional random fields (CCRF)
to explicitly model these interconnected outputs. In particular, we improve the CCRF’s
computation complexity and predictive accuracy with two novel strategies. First, we employ
two tridiagonal matrix computation techniques to significantly speed up the CCRF’s training
and inference. These techniques tackle the cubic computational cost required by the matrix
inversion calculations in the training and inference of the CCRF, resulting in linear
complexity for these matrix operations. Second, we address the CCRF’s weak feature
constraint problem with a novel multi-target edge function, thus boosting the CCRF’s
predictive performance.
The proposed multi-target feature is able to convert the relationship of related outputs
with continuous values into a set of “sub-relationships”, each providing more specific feature
constraints for the interplays of the related outputs. We applied the proposed approach to two
real-world energy load prediction systems: one for electricity demand and another for gas
usage. Our experimental results show that the proposed strategy can meaningfully reduce the
predictive error for the two systems, in terms of mean absolute percentage error and root
mean square error, when compared with three benchmarking methods. Promisingly, the
relative error reduction achieved by our CCRF model was up to 50 percent.
19. Anonymizing Collections of Tree-Structured Data
Abstract:Collections of real-world data usually have implicit or explicit structural relations. For
example, databases link records through foreign keys, and XML documents express
associations between different values through syntax. Privacy preservation, until now, has
focused either on data with a very simple structure, e.g. relational tables, or on data with very
complex structure e.g. social network graphs, but has ignored intermediate cases, which are
the most frequent in practice. In this work, we focus on tree structured data. Such data stem
from various applications, even when the structure is not directly reflected in the syntax, e.g.
XML documents. A characteristic case is a database where information about a single person
is scattered amongst different tables that are associated through foreign keys. The paper
defines kðm;nÞ-anonymity, which provides protection against identity disclosure and
proposes a greedy anonymization heuristic that is able to sanitize large datasets. The
algorithm and the quality of the anonymization are evaluated experimentally.
20. APP Relationship Calculation: An Iterative Process
Contact: 8681073727, ehivetechnologies@gmail.com
Abstract:Today, plenty of apps are released to enable users to make the best use of their cell
phones. Facing the large amount of apps, app retrieval and app recommendation become
important, since users can easily use them to acquire their desired apps. To obtain highquality retrieval and recommending results, it needs to obtain the precise app relationship
calculating results. Unfortunately, the recent methods are conducted mostly relying on user’s
log or app’s description, which can only detect whether two apps are downloaded, installed
meanwhile or provide similar functions or not. In fact, apps contain many general
relationships other than similarity, such as one app needs another app as its tool. These
relationships cannot be dug via user’s log or app’s description. Reviews contain user’s
viewpoint and judgment to apps, thus they can be used to calculate relationship between apps.
To use reviews, this paper proposes an iterative process by combining review similarity and
app relationship together. Experimental results demonstrate that via this iterative process,
relationship between apps can be calculated exactly. Furthermore, this process is improved in
two aspects. One is to obtain excellent results even with weak initialization. The other is to
apply matrix product to reduce running time.
21. CrowdOp: Query Optimization for Declarative Crowdsourcing Systems
Abstract:-
We study the query optimization problem in declarative crowdsourcing systems.
Declarative crowdsourcing is designed to hide the complexities and relieve the user of the
burden of dealing with the crowd. The user is only required to submit an SQL-like query and
the system takes the responsibility of compiling the query, generating the execution plan and
evaluating in the crowdsourcing marketplace. A given query can have many alternative
execution plans and the difference in crowdsourcing cost between the best and the worst
plans may be several orders of magnitude.
Therefore, as in relational database systems, query optimization is important to
crowdsourcing systems that provide declarative query interfaces. In this paper, we propose
CROWDOP, a cost-based query optimization approach for declarative crowdsourcing
systems. CROWDOP considers both cost and latency in query optimization objectives and
generates query plans that provide a good balance between the cost and latency. We develop
efficient algorithms in t he CROWDOP for optimizing three types of queries: selection
queries, join queries, and complex selection-join queries. We validate our approach via
extensive experiments by simulation as well as with the real crowd on Amazon Mechanical
Turk.
Contact: 8681073727, ehivetechnologies@gmail.com
22. Efficient Motif Discovery for Large-Scale Time Series in
Healthcare
Abstract:—
Analyzing time series data can reveal the temporal behaviour of the underlying
mechanism producing the data. Time series motifs, which are similar sub-sequences or
frequently occur-ring patterns, have significant meanings for researchers especially in medical
domain. With the fast growth of time series data, traditional methods for motif discovery
are inefficient and not applicable to large-scale data.
This work proposes an efficient Motif Discovery method for Large-scale time
series (MDLats). By computing standard motifs, MDLats eliminates a majority of redundant
computation in the related arts and reuses existing information to the maximum. All the
motif types and sub-sequences are generated for subsequent analysis and classification. Our
system is implemented on a Hadoop platform and deployed in a hospital for clinical
electrocardiography classification. The experiments on real-world healthcare data show
that MDLats outperform the state-of-the-art methods even in large time series.
23. Relational Collaborative Topic Regression for Recommender Systems
Abstract:Due to its successful application in recommender systems, collaborative filtering (CF)
has become a hot research topic in data mining and information retrieval. In traditional CF
methods, only the feedback matrix, which contains either explicit feedback (also called
ratings) or implicit feedback on the items given by users, is used for training and prediction.
Typically, the feedback matrix is sparse, which means that most users interact with few
items. Due to this sparsity problem, traditional CF with only feedback information will suffer
from unsatisfactory performance. Recently, many researchers have proposed to utilize
auxiliary information, such as item content (attributes), to alleviate the data sparsity problem
in CF.
Collaborative topic regression (CTR) is one of these methods which has achieved
promising performance by successfully integrating both feedback information and item
content information. In many real applications, besides the feedback and item content
information, there may exist relations also known as networks) among the items which can be
helpful for recommendation. In this paper, we develop a novel hierarchical Bayesian model
called Relational Collaborative Topic Regression (RCTR), which extends CTR by seamlessly
integrating the user-item feedback information, item content information, and network
structure among items into the same model. Experiments on real-world datasets show that our
model can achieve better prediction accuracy than the state-of-the-art methods with lower
empirical training time. Moreover, RCTR can learn good interpretable latent structures which
are useful for recommendation.
Contact: 8681073727, ehivetechnologies@gmail.com
24. Robust Laser Speckle Authentication System through Data Mining
Techniques
Abstract:—
This paper proposes a speckle image recognition method using data mining
techniques to ensure speckle identification system feasible for authentication. This is an
interdisciplinary method that integrates the researches of optics, data mining, and image
processing. Because objects have unique but imperfect surfaces, their laser speckle is
capable of providing suitable identifiable features for authentication. In our method,
matching points among speckle images acquired from one plastic card are extracted by
scale-invariant feature transform (SIFT).
The spatial relations among the matching points are then transformed to 9
direction lower triangular (9DLT) representations. Then, the Apriori algorithm mines
frequent patterns so a useful association rule is obtained as the feature to identify the
similarity between each of the speckle images for the purpose of authenticity verification.
The proposed method is especially robust in the cases of card displacement and luminance
change resulted from laser attenuation. Experimental results show that the proposed
method has promising results and outperforms existing methods in identification accuracy.
25. Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless
Ad Hoc Networks
Abstract:—
Link error and malicious packet dropping are two sources for packet losses in multihop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the
network, we are interested in determining whether the losses are caused by link errors only,
or by the combined effect of link errors and malicious drop. We are especially interested in
the insider-attack case, whereby malicious nodes that are part of the route exploit their
knowledge of the communication context to selectively drop a small amount of packets
critical to the network performance. Because the packet dropping rate in this case is
comparable to the channel error rate, conventional algorithms that are based on detecting the
packet loss rate cannot achieve satisfactory detection accuracy.
To improve the detection accuracy, we propose to exploit the correlations between
lost packets. Furthermore, to ensure truthful calculation of these correlations, we develop a
homomorphic linear authenticator (HLA) based public auditing architecture that allows the
detector to verify the truthfulness of the packet loss information reported by nodes. This
construction is privacy preserving, collusion proof, and incurs low communication and
storage overheads. To reduce the computation overhead of the baseline scheme, a packetblock-based mechanism is also proposed, which allows one to trade detection accuracy for
lower computation complexity. Through extensive simulations, we verify that the proposed
Contact: 8681073727, ehivetechnologies@gmail.com
mechanisms achieve significantly better detection accuracy than conventional methods such
as a maximum-likelihood based detection.
26. Adaptive Workflow Scheduling on Cloud Computing Platforms with Iterative
Ordinal Optimization
Abstract:—
The scheduling of multitask jobs on clouds is an NP-hard problem. The problem
becomes even worse when complex workflows are executed on elastic clouds, such as
Amazon EC2 or IBM RC2. The main difficulty lies in the large search space and high
overhead of generating optimal schedules, especially for real-time applications with
dynamic workloads. In this work, a new iterative ordinal optimization (IOO) method is
proposed. The ordinal optimization method is applied in each iteration to achieve suboptimal schedules. IOO aims at generating more efficient schedules from a global
perspective over a long period. We prove through overhead analysis the advantages in time
and space efficiency in using the IOO method. The IOO method is designed to adapt to
system dynamism to yield suboptimal performance. In cloud experiments on IBM RC2
cloud, we execute 20,000 tasks in LIGO (Laser Interferometer Gravitational-wave
Observatory) verification workflow on 128 virtual machines.
The IOO schedule is generated in less than 1,000 seconds, while using the Monte
Carlo simulation takes 27.6 hours, 100 times longer to yield an optimal schedule. The
IOO-optimized schedule results in a throughput of 1,100 tasks/sec with 7 GB memory
demand, compared with 60 percent decrease in throughput and 70 percent increase in
memory demand in using the Monte Carlo method. Our LIGO experimental results clearly
demonstrate the advantage of using the IOO-based workflow scheduling over the
traditional blind-pick, ordinal optimization, or Monte Carlo methods. These numerical
results are also validated by the theoretical complexity and overhead analysis provided.
27. A Secure Cloud Computing Based Framework for Big Data Information
management of Smart Grid
Abstract:—
Smart grid is a technological innovation that improves efficiency, reliability,
economics, and sustainability of electricity services. It plays a crucial role in modern energy
infrastructure. The main challenges of smart grids, however, are how to manage different
types of front-end intelligent devices such as power assets and smart meters efficiently; and
how to process a huge amount of data received from these devices. Cloud computing, a
technology that provides computational resources on demands, is a good candidate to address
Contact: 8681073727, ehivetechnologies@gmail.com
these challenges since it has several good properties such as energy saving, cost saving,
agility, scalability, and flexibility. In this paper, we propose a secure cloud computing based
framework for big data information management in smart grids, which we call “SmartFrame.”
The main idea of our framework is to build a hierarchical structure of cloud
computing centers to provide different types of computing services for information
management and big data analysis. In addition to this structural framework, we present a
security solution based on identity-based encryption, signature and proxy re-encryption to
address critical security issues of the proposed framework.
28. An Authenticated Trust and Reputation Calculation and Management System for
Cloud and Sensor Networks Integration
Abstract:—
Induced by incorporating the powerful data storage and data processing abilities of
cloud computing (CC) as well as ubiquitous data gathering capability of wireless sensor
networks (WSNs), CC-WSN integration received a lot of attention from both academia and
industry. However, authentication as well as trust and reputation calculation and management
of cloud service providers (CSPs) and sensor network providers (SNPs) are two very critical
and barely explored issues for this new paradigm. To fill the gap, this paper proposes a novel
authenticated trust and reputation calculation and management (ATRCM) system for CCWSN integration.
Considering the authenticity of CSP and SNP, the attribute requirement of cloud
service user (CSU) and CSP, the cost, trust, and reputation of the service of CSP and SNP,
the proposed ATRCM system achieves the following three functions: 1) authenticating CSP
and SNP to avoid malicious impersonation attacks; 2) calculating and managing trust and
reputation regarding the service of CSP and SNP; and 3) helping CSU choose desirable CSP
and assisting CSP in selecting appropriate SNP. Detailed analysis and design as well as
further functionality evaluation results are presented to demonstrate the effectiveness of
ATRCM, followed with system security analysis.
Contact: 8681073727, ehivetechnologies@gmail.com
29. Multi-User Computation Partitioning for Latency Sensitive Mobile Cloud
Applications
Abstract:—
Elastic partitioning of computations between mobile devices and cloud is an
important and challenging research topic formobile cloud computing. Existing works focus
on the single-user computation partitioning, which aims to optimize the application
completion time for one particular single user. These works assume that the cloud always has
enough resources to execute the computations immediately when they are offloaded to the
cloud. However, this assumption does not hold for large scale mobile cloud applications. In
these applications, due to the competition for cloud resources among a large number of users,
the offloaded computations may be executed with certain scheduling delay on the cloud.
Single user partitioning that does not take into account the scheduling delay on the cloud may
yield significant performance degradation. In this paper, we study, for the first time, multiuser computation partitioning problem (MCPP), which considers the partitioning of multiple
users’ computations together with the scheduling of offloaded computations on the cloud
resources.
Instead of pursuing the minimum application completion time for every single user,
we aim to achieve minimum average completion time for all the users, based on the number
of provisioned resources on the cloud. We show that MCPP is different from and more
difficult than the classical job scheduling problems. We design an offline heuristic algorithm,
namely SearchAdjust, to solve MCPP. We demonstrate through benchmarks that
SearchAdjust outperforms both the single user partitioning approaches and classical job
scheduling approaches by 10 percent on average in terms of application delay. Based on
SearchAdjust, we also design an online algorithm for MCPP that can be easily deployed in
practical systems. We validate the effectiveness of our online algorithm using real world load
traces.
30. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting
Packet Dropping and Transmitter Buffering
Abstract:—
Quality of service (QoS) for a network is characterized in terms of various parameters
specifying packet delay and loss tolerance requirements for the application. The
unpredictable nature of the wireless channel demands for application of certain mechanisms
to meet the QoS requirements. Traditionally, medium access control (MAC) and network
layers perform these tasks. However, these mechanisms do not take (fading) channel
conditions into account.
Contact: 8681073727, ehivetechnologies@gmail.com
In this paper, we investigate the problem using cross layer techniques where
information flow and joint optimization of higher and physical layer is permitted.We propose
a scheduling scheme to optimize the energy consumption of a multiuser multi-access system
such that QoS constraints in terms of packet loss are fulfilled while the system is able to
maximize the advantages emerging from multiuser diversity. Specifically, this work focuses
on modeling and analyzing the effects of packet buffering capabilities of the transmitter on
the system energy for a packet loss tolerant application.
We discuss low complexity schemes which show comparable performance to the
proposed scheme. The numerical evaluation reveals useful insights about the coupling effects
of different QoS parameters on the system energy consumption and validates our analytical
results.
Contact: 8681073727, ehivetechnologies@gmail.com
Download