Toward low CPU usage and efficient DPDK communication in a cluster

Author(s):  
Mingjie Wu ◽  
Qingkui Chen ◽  
Jingjuan Wang
Keyword(s):  
2017 ◽  
Vol 4 (1) ◽  
pp. 15-22
Author(s):  
Arinta Fadlil Fajar Wicaksono

Building VoIP technology requires a server called Elastix. Singleboard circuit device can be an alternative to cover the shortcomings of a PC as a VoIP server, to support practicum activities. The specifications for the quad-core processor and 1GB LPDDR2 memory are expected to be able to provide access to the latest version of the operating system to be able to produce better communication quality as I PPBX. This study designed a VoIP IP PBX server communication system at the Polinema Telecommunication Laboratory using the Elastix Linux operating system, to determine the quality of VoIP communication services and the performance of a single board circuit as an IPPBX server. The results of the research are 64 kbps bandwidth capacity capable of serving a customer capacity of 181 subscribers through 8 number of channels. QoS measurement obtained a delay value of 4.87091 ms; jitter of 18,265ms; packet loss of 0.71%; throughput of 0.2747 Mbit / sec. The singleboard circuit server is capable of serving VoIP communications for as many as 20 users and 10 calls simultaneously on the same server with a cpu usage percentage of 17.7% and 17.2% cpu usage, when communicating with other servers.


Author(s):  
Sebastian Panman de Wit ◽  
Doina Bucur ◽  
Jeroen van der Ham

Mobile malware are malicious programs that target mobile devices. They are an increasing problem, as seen in the rise of detected mobile malware samples per year. The number of active smartphone users is expected to grow, stressing the importance of research on the detection of mobile malware. Detection methods for mobile malware exist but are still limited. In this paper, we propose dynamic malware-detection methods that use device information such as the CPU usage, battery usage, and memory usage for the detection of 10 subtypes of Mobile Trojans on the Android Operating System (OS). We use a real-life sensor dataset containing device and malware data from 47 users for a year (2016) to create multiple mobile malware detection methods. We examine which features, i.e. aspects, of a device, are most important to monitor to detect (subtypes of) Mobile Trojans. The focus of this paper is on dynamic hardware features. Using these dynamic features we apply the following machine learning classifiers: Random Forest, K-Nearest Neighbour, and AdaBoost.


2021 ◽  
Vol 251 ◽  
pp. 03024
Author(s):  
Swagato Banerjee ◽  
Dennis H. Wright ◽  
Makoto Asai ◽  
Doris Y. Kim

During the next decade, the SuperKEKB/Belle II experiment expects to collect almost two orders of magnitude more collision data than the previous generation B-Factory experiments. Study of this data requires monumental computing resources to process and to generate the required simulation events necessary for physics analysis. At the core of the Belle II simulation library is the Geant4 toolkit. To use the available computing resources more efficiently, the physics list for Geant4 has been optimized for the Belle II environment, and various other strategies were applied to improve the performance of the Geant4 toolkit in the Belle II software library. Following the inclusion of this newly optimized physics list in an updated version of Geant4 toolkit, we obtain much better CPU usage during event simulation and reduce the computing resource usage by ~ 44%.


Security plays a critical position in preserving information privacy and secrecy. Many encryption strategies are available to protect data during transmission or storage. These encryption methods vary in terms of strength, speed, and resource consumption (CPU usage, memory, and power). This study aims to present the most popular and interesting algorithms currently in use


Sensors ◽  
2019 ◽  
Vol 19 (24) ◽  
pp. 5397 ◽  
Author(s):  
Maik Basso ◽  
Diego Stocchero ◽  
Renato Ventura Bayan Henriques ◽  
André Luis Vian ◽  
Christian Bredemeier ◽  
...  

An important area in precision agriculture is related to the efficient use of chemicals applied onto fields. Efforts have been made to diminish their use, aiming at cost reduction and fewer chemical residues in the final agricultural products. The use of unmanned aerial vehicles (UAVs) presents itself as an attractive and cheap alternative for spraying pesticides and fertilizers compared to conventional mass spraying performed by ordinary manned aircraft. Besides being cheaper than manned aircraft, small UAVs are capable of performing fine-grained instead of the mass spraying. Observing this improved method, this paper reports the design of an embedded real-time UAV spraying control system supported by onboard image processing. The proposal uses a normalized difference vegetation index (NDVI) algorithm to detect the exact locations in which the chemicals are needed. Using this information, the automated spraying control system performs punctual applications while the UAV navigates over the crops. The system architecture is designed to run on low-cost hardware, which demands an efficient NDVI algorithm. The experiments were conducted using Raspberry Pi 3 as the embedded hardware. First, experiments in a laboratory were conducted in which the algorithm was proved to be correct and efficient. Then, field tests in real conditions were conducted for validation purposes. These validation tests were performed in an agronomic research station with the Raspberry hardware integrated into a UAV flying over a field of crops. The average CPU usage was about 20% while memory consumption was about 70 MB for high definition images, with 4% CPU usage and 20.3 MB RAM being observed for low-resolution images. The average current measured to execute the proposed algorithm was 0.11 A. The obtained results prove that the proposed solution is efficient in terms of processing and energy consumption when used in embedded hardware and provides measurements which are coherent with the commercial GreenSeeker equipment.


Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 2081 ◽  
Author(s):  
Andreas Biørn-Hansen ◽  
Tor-Morten Grønli ◽  
Gheorghita Ghinea

Along with the proliferation of high-end and performant mobile devices, we find that the inclusion of visually animated user interfaces are commonplace, but that research on their performance is scarce. Thus, for this study, eight mobile apps have been developed for scrutiny and assessment to report on the device hardware impact and penalties caused by transitions and animations, with an emphasis on apps generated using cross-platform development frameworks. The tasks we employ for animation performance measuring, are those of (i) a complex animation consisting of multiple elements, (ii) the opening sequence of a side menu navigation pattern, and (iii) a transition animation during in-app page navigation. We employ multiple performance profiling tools, and scrutinize metrics including frames per second (FPS), CPU usage, device memory usage and GPU memory usage, all to uncover the impact caused by executing transitions and animations. We uncover important differences in device hardware utilization during animations across the different cross-platform technologies employed. Additionally, Android and iOS are found to differ greatly in terms of memory consumption, CPU usage and rendered FPS, a discrepancy that is true for both the native and cross-platform apps. The findings we report are indeed factors contributing to the complexity of app development.


2021 ◽  
Vol 19 ◽  
pp. 100-106
Author(s):  
Alla Shtokal ◽  
Jakub Smołka

The article presents a comparative analysis of frameworks supporting the development of automated tests for defined test scenarios. The comparative study concerned the TestNG and WebDriverIO frameworks. The overview of the tool has been analyzed both in terms of the test development process as well as the speed and efficiency of their execution. The website github.com was used for the purposes of the work. This application was used to run test scripts written in both frameworks. The results were compared by five defined criteria: the time of running the test files in different browser operation modes, the average value of memory and CPU usage during the test execution. The summary includes the evaluation of the compared frameworks.


2020 ◽  
Vol 12 (1) ◽  
pp. 74
Author(s):  
Iqbal Busthomi ◽  
Imam Riadi ◽  
Rusydi Umar

Abstract CV. Nyebar is an IT-based start-up that deals with event data management using a web-based application. The Event system provides account registration services as a Member and Organizer. Members of the Event System must first have an account and log-in to be able to register for the event. The process of registering events so far has not been properly secured. The event registration process will send registrant information, but the information sent has not been secured and validated first, so the Event System is still vulnerable to cyber-attacks including the registration data sniffing attack and Distributed Denial of Service (DDoS) attacks. DDoS attacks are carried out by sending messages and packet requests continuously to the business sector, hosting, social sites originating from bot at one time, resulting in overloaded network servers because of the resources (bandwidth, memory, and CPU usage) they have. the network server is used up. Blockchain which has three techniques/mechanisms including the use of hashes and proof-of-work mechanisms which can be an alternative security for event registration information because it can maintain information security, data consistency, and DDoS attacks.Keyword: Web Application, Distributed Denial of Service (DDoS), BlockchainAbstrak CV. Nyebar merupakan start-up berbasis IT yang bergelut dibidang pengelolaan data event menggunakan sebuah aplikasi berbasis web. Sistem Event menyediakan layanan pendaftaran akun sebagai Member dan Organizer. Member dari Sistem Event harus memiliki akun dan log-in terlebih dahulu untuk mendaftar sebuah event. Proses pendaftaran event sejauh ini belum diamankan dengan baik. Proses pendaftaran event akan mengirimkan informasi pendaftar, namun informasi yang dikirimkan belum diamanakan dan divalidasi terlebih dahulu, sehingga Sistem Event masih rentan akan serangan siber diantaranya adalah serangan sniffing data pendaftaran dan serangan Distributed Denial of Service (DDoS). Serangan DDoS dilakukan dengan mengirimkan pesan dan permintaan paket secara terus menerus kepada sektor bisnis, hosting, situs sosial yang berasal dari bot dalam satu waktu, sehingga mengakibatkan server jaringan menjadi overload karena sumber daya (bandwith, memory, dan CPU usage) yang dimiliki server jaringan habis terpakai. Blockchain yang memiliki dua teknik/mekanisme antara lain adalah penggunaan hash dan mekanisme proof-of-work, yang dapat menjadi alternatif pengamanan informasi pemdaftaran event karena dapat menjaga keamanan informasi, kekonsistenan data, dan serangan dari DDoS.Keyword: Aplikasi Web, Distributed Denial of Service (DDoS), Teknologi Blockchain


Author(s):  
Saeid Akbarifard ◽  
Mohammad Reza Sharifi ◽  
Kourosh Qaderi ◽  
Mohamad Reza Madadi

Abstract In this study, the capability of recently introduced Moth Swarm Algorithm (MSA) was compared with two robust meta-heuristics of harmony search (HS) algorithm and imperialist competitive algorithm (ICA). First, the performance of these algorithms was assessed by seven benchmark functions having 2–30 dimensions. Next, they were compared in optimization of complex problem of 4-reservoir and 10-reservoir systems operation. Furthermore, the results of these algorithms were compared with nine other metaheuristic algorithms developed by several researchers. Sensitivity analysis was performed to determine the appropriate values of the algorithms parameters. The statistical indices of R2, RMSE, MAE, MSE, NMSE, MAPE, and Willmott's index of agreement were used to compare the algorithms performance. The results showed that the MSA was the superior algorithm in solving all benchmark functions in terms of obtaining the optimal value and saving the CPU usage. ICA and HS were placed in the next orders, respectively. It was found that by increasing the dimensions of the problem, the performance of ICA and HS dropped but the MSA has still performed extraordinary. In addition, the minimum CPU usage and the best solutions for optimal operation of four-reservoir system were obtained by MSA algorithm with values of (269.7s and 308.83) which are very close to the global optimum solution. Corresponding values for ICA and HS were (486.73, 306.47) and (638.61s, 264.61) respectively, which put them in the next ranks. Similar results were observed for ten-reservoir system; the CPU time and optimal value obtained by MSA were (722.5s, 1,195.58) while for ICA and HS were (1,421.62s, 1,136.22) and (1,963.41s, 1,060.76), respectively. The values of R2 and RMSE achieved by MSA were (0.951, 0.528) and (0.985, 0.521) for 4-reservoir and 10-reservoir systems which demonstrated the outstanding performance of this algorithm in optimal operation of multi-reservoir systems. In a general comparison, it was concluded that among the twelve investigated algorithms, MSA was the best, and it is recommended as a robust promising tool in optimal operation of multi-reservoir systems.


Sign in / Sign up

Export Citation Format

Share Document