DewSim: A trace‐driven toolkit for simulating mobile device clusters in Dew computing environments

2020 ◽  
Vol 50 (5) ◽  
pp. 688-718 ◽  
Author(s):  
Matías Hirsch ◽  
Cristian Mateos ◽  
Juan Manuel Rodriguez ◽  
Alejandro Zunino
2021 ◽  
Author(s):  
A.A. Pashinin ◽  
V.G. Bogdanova

In recent years, research in Dew computing as a new layer in the vertical hierarchy of scalable computing has been developing. Directions for the development of this technology include research into the possibilities of Dew computing and its applications. Our research belongs to the second direction. We use this technology in a package of applied microservices for solving complex problems of the qualitative study of binary dynamic systems based on the Boolean constraint method in a hybrid cloud environment. This environment includes on-premises, high-performance, and cloud resources. In this paper, the usage of Dew computing technology in a hybrid cloud environment is discussed. A user dew agent installed on an on-premises resource is proposed to provide the possibility of the applied microservices package collaboration with cloud services in a hybrid cloud environment. The advantages of using a user dew agent are considered. The architecture, functionality, operation modes, and the installation of the dew agent are presented.


Information ◽  
2019 ◽  
Vol 10 (3) ◽  
pp. 86 ◽  
Author(s):  
Mathias Longo ◽  
Matías Hirsch ◽  
Cristian Mateos ◽  
Alejandro Zunino

With self-provisioning of resources as premise, dew computing aims at providing computing services by minimizing the dependency over existing internetwork back-haul. Mobile devices have a huge potential to contribute to this emerging paradigm, not only due to their proximity to the end user, ever growing computing/storage features and pervasiveness, but also due to their capability to render services for several hours, even days, without being plugged to the electricity grid. Nonetheless, misusing the energy of their batteries can discourage owners to offer devices as resource providers in dew computing environments. Arguably, having accurate estimations of remaining battery would help to take better advantage of a device’s computing capabilities. In this paper, we propose a model to estimate mobile devices battery availability by inspecting traces of real mobile device owner’s activity and relevant device state variables. The model includes a feature extraction approach to obtain representative features/variables, and a prediction approach, based on regression models and machine learning classifiers. On average, the accuracy of our approach, measured with the mean squared error metric, overpasses the one obtained by a related work. Prediction experiments at five hours ahead are performed over activity logs of 23 mobile users across several months.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Pablo Sanabria ◽  
Tomás Felipe Tapia ◽  
Andres Neyem ◽  
Jose Ignacio Benedetto ◽  
Matías Hirsch ◽  
...  

Mobile grid computing has been a popular topic for researchers due to mobile and IoT devices’ ubiquity and their evergrowing processing potential. While many scheduling algorithms for harnessing these resources exist in the literature for standard grid computing scenarios, surprisingly, there is little insight into this matter in the context of hybrid-powered computing resources, typically found in Dew and Edge computing environments. This paper proposes new algorithms aware of devices’ power source for scheduling tasks in hybrid environments, i.e., where the battery- and non-battery-powered devices cooperate. We simulated hybrid Dew/Edge environments by extending DewSim, a simulator that models battery-driven devices’ battery behavior using battery traces profiled from real mobile devices. We compared the throughput and job completion achieved by algorithms proposed in this paper using as a baseline a previously developed algorithm that considers computing resources but only from battery-dependent devices called Enhanced Simple Energy-Aware Schedule (E-SEAS). The obtained results in the simulation reveal that our proposed algorithms can obtain up to a 90% increment in overall throughput and around 95% of completed jobs in hybrid environments compared to E-SEAS. Finally, we show that incorporating these characteristics gives more awareness of the type of resources present and can enable the algorithms to manage resources more efficiently in more hybrid environments than other algorithms found in the literature.


2012 ◽  
Author(s):  
Judith E. Gold ◽  
Feroze B. Mohamed ◽  
Sayed Ali ◽  
Mary F. Barbe
Keyword(s):  

2020 ◽  
Vol 5 (1) ◽  
pp. 89
Author(s):  
Nasirudin Nasirudin ◽  
Sunardi Sunardi ◽  
Imam Riadi

Technological advances are growing rapidly, including mobile device technology, one of which is an Android smartphone that is experiencing rapid progress with a variety of features so that it can spoil its users, with the rapid development of smartphone technology, many users benefit, but many are disadvantaged by the growing smartphone. technology, so that many perpetrators or persons who commit crimes and seek profits with smartphone facilities. Case simulation by securing Samsung Galaxy A8 brand android smartphone evidence using the MOBILedit forensic express forensic tool with the National Institute of Standards and Technology (NIST) method which consists of four stages of collection, examination, analysis and reporting. The results of testing the Samsung Galaxy A8 android smartphone are carried out with the NIST method and the MOBILedit Forensic Express tool obtained by data backup, extraction and analysis so that there are findings sought for investigation and evidence of crimes committed by persons using android smartphone facilities.


Author(s):  
Kiran Kumar S V N Madupu

Big Data has terrific influence on scientific discoveries and also value development. This paper presents approaches in data mining and modern technologies in Big Data. Difficulties of data mining as well as data mining with big data are discussed. Some technology development of data mining as well as data mining with big data are additionally presented.


Sign in / Sign up

Export Citation Format

Share Document