volunteer computing
Recently Published Documents


TOTAL DOCUMENTS

315
(FIVE YEARS 63)

H-INDEX

21
(FIVE YEARS 4)

2022 ◽  
Vol 22 (1) ◽  
pp. 1-21
Author(s):  
Iram Bibi ◽  
Adnan Akhunzada ◽  
Jahanzaib Malik ◽  
Muhammad Khurram Khan ◽  
Muhammad Dawood

Volunteer Computing provision of seamless connectivity that enables convenient and rapid deployment of greener and cheaper computing infrastructure is extremely promising to complement next-generation distributed computing systems. Undoubtedly, without tactile Internet and secure VC ecosystems, harnessing its full potentials and making it an alternative viable and reliable computing infrastructure is next to impossible. Android-enabled smart devices, applications, and services are inevitable for Volunteer computing. Contrarily, the progressive developments of sophisticated Android malware may reduce its exponential growth. Besides, Android malwares are considered the most potential and persistent cyber threat to mobile VC systems. To secure Android-based mobile volunteer computing, the authors proposed MulDroid, an efficient and self-learning autonomous hybrid (Long-Short-Term Memory, Convolutional Neural Network, Deep Neural Network) multi-vector Android malware threat detection framework. The proposed mechanism is highly scalable with well-coordinated infrastructure and self-optimizing capabilities to proficiently tackle fast-growing dynamic variants of sophisticated malware threats and attacks with 99.01% detection accuracy. For a comprehensive evaluation, the authors employed current state-of-the-art malware datasets (Android Malware Dataset, Androzoo) with standard performance evaluation metrics. Moreover, MulDroid is compared with our constructed contemporary hybrid DL-driven architectures and benchmark algorithms. Our proposed mechanism outperforms in terms of detection accuracy with a trivial tradeoff speed efficiency. Additionally, a 10-fold cross-validation is performed to explicitly show unbiased results.


2022 ◽  
Vol 32 (3) ◽  
pp. 1493-1507
Author(s):  
Sourav Kumar Bhoi ◽  
Sanjaya Kumar Panda ◽  
Kalyan Kumar Jena ◽  
Kshira Sagar Sahoo ◽  
N. Z. Jhanjhi ◽  
...  

2021 ◽  
Vol 27 (6) ◽  
pp. 57-65
Author(s):  
Albertas Jurgelevicius ◽  
Leonidas Sakalauskas ◽  
Virginijus Marcinkevicius

The purpose of the research is to create a hybrid cloud platform that performs distributed computing tasks using high-performance servers and volunteer computing resources. The proposed platform uses a new task scheduling method, which is also presented in this paper. It uses a task stalling buffer to manage workload among the two grids without any additional information about the tasks. Since efficient task scheduling in these distributed systems is the actual problem, the system reliability issue is solved using a hybrid cloud architecture when both high-performance servers and volunteer computing resources are combined. The results of the experiment showed that the proposed solution solves the problem of balancing workload between two grids better than the standard scheduling algorithm. Computer study and experiments also showed that the proposed hybrid cloud tasks scheduling method with a task stalling buffer reduces up to 47.3 % of total task execution time. The outcome of this paper provides a background for future research on a task stalling buffer in hybrid cloud computing.


2021 ◽  
Vol 13 (9) ◽  
pp. 229
Author(s):  
David P. Anderson

Volunteer computing uses millions of consumer computing devices (desktop and laptop computers, tablets, phones, appliances, and cars) to do high-throughput scientific computing. It can provide Exa-scale capacity, and it is a scalable and sustainable alternative to data-center computing. Currently, about 30 science projects use volunteer computing in areas ranging from biomedicine to cosmology. Each project has application programs with particular hardware and software requirements (memory, GPUs, VM support, and so on). Each volunteered device has specific hardware and software capabilities, and each device owner has preferences for which science areas they want to support. This leads to a scheduling problem: how to dynamically assign devices to projects in a way that satisfies various constraints and that balances various goals. We describe the scheduling policy used in Science United, a global manager for volunteer computing.


2021 ◽  
Vol 21 (4) ◽  
pp. 1-22
Author(s):  
Ismaeel Al Ridhawi ◽  
Moayad Aloqaily ◽  
Yaser Jararweh

The rise of fast communication media both at the core and at the edge has resulted in unprecedented numbers of sophisticated and intelligent wireless IoT devices. Tactile Internet has enabled the interaction between humans and machines within their environment to achieve revolutionized solutions both on the move and in real-time. Many applications such as intelligent autonomous self-driving, smart agriculture and industrial solutions, and self-learning multimedia content filtering and sharing have become attainable through cooperative, distributed, and decentralized systems, namely, volunteer computing. This article introduces a blockchain-enabled resource sharing and service composition solution through volunteer computing. Device resource, computing, and intelligence capabilities are advertised in the environment to be made discoverable and available for sharing with the aid of blockchain technology. Incentives in the form of on-demand service availability are given to resource and service providers to ensure fair and balanced cooperative resource usage. Blockchains are formed whenever a service request is initiated with the aid of fog and mobile edge computing (MEC) devices to ensure secure communication and service delivery for the participants. Using both volunteer computing techniques and tactile internet architectures, we devise a fast and reliable service provisioning framework that relies on a reinforcement learning technique. Simulation results show that the proposed solution can achieve high reward distribution, increased number of blockchain formations, reduced delays, and balanced resource usage among participants, under the premise of high IoT device availability.


2021 ◽  
Vol 21 (4) ◽  
pp. 1-16
Author(s):  
Mojtaba Alizadeh ◽  
Mohammad Hesam Tadayon ◽  
Kouichi Sakurai ◽  
Hiroaki Anada ◽  
Alireza Jolfaei

Technology advances—such as improving processing power, battery life, and communication functionalities—contribute to making mobile devices an attractive research area. In 2008, in order to manage mobility, the Internet Engineering Task Force (IETF) developed Proxy Mobile IPv6, which is a network-based mobility management protocol to support seamless connectivity of mobile devices. This protocol can play a key role in volunteer computing paradigms as a user can seamlessly access computing resources. The procedure of user authentication is not defined in this standard; thus, many studies have been carried out to propose suitable authentication schemes. However, in the current authentication methods, with reduced latency and packet loss, some security and privacy considerations are neglected. In this study, we propose a secure and anonymous ticket-based authentication (SATA) method to protect mobile nodes against existing security and privacy issues. The proposed method reduces the overhead of handover authentication procedures using the ticket-based concept. We evaluated security and privacy strengths of the proposed method using security theorems and BAN logic.


2021 ◽  
Vol 21 (4) ◽  
pp. 1-20
Author(s):  
Jimmy Ming-Tai Wu ◽  
Qian Teng ◽  
Gautam Srivastava ◽  
Matin Pirouz ◽  
Jerry Chun-Wei Lin

In the ever-growing world, the concepts of High-utility Itemset Mining (HUIM) as well as Frequent Itemset Mining (FIM) are fundamental works in knowledge discovery. Several algorithms have been designed successfully. However, these algorithms only used one factor to estimate an itemset. In the past, skyline pattern mining by considering both aspects of frequency and utility has been extensively discussed. In most cases, however, people tend to focus on purchase quantities of itemsets rather than frequencies. In this article, we propose a new knowledge called skyline quantity-utility pattern (SQUP) to provide better estimations in the decision-making process by considering quantity and utility together. Two algorithms, respectively, called SQU-Miner and SKYQUP are presented to efficiently mine the set of SQUPs. Moreover, the usage of volunteer computing is proposed to show the potential in real supermarket applications. Two new efficient utility-max structures are also mentioned for the reduction of the candidate itemsets, respectively, utilized in SQU-Miner and SKYQUP. These two new utility-max structures are used to store the upper-bound of utility for itemsets under the quantity constraint instead of frequency constraint, and the second proposed utility-max structure moreover applies a recursive updated process to further obtain strict upper-bound of utility. Our in-depth experimental results prove that SKYQUP has stronger performance when a comparison is made to SQU-Miner in terms of memory usage, runtime, and the number of candidates.


2021 ◽  
Vol 21 (4) ◽  
pp. 1-17
Author(s):  
Mehedi Masud ◽  
M. Shamim Hossain ◽  
Hesham Alhumyani ◽  
Sultan S. Alshamrani ◽  
Omar Cheikhrouhou ◽  
...  

Volunteer computing based data processing is a new trend in healthcare applications. Researchers are now leveraging volunteer computing power to train deep learning networks consisting of billions of parameters. Breast cancer is the second most common cause of death in women among cancers. The early detection of cancer may diminish the death risk of patients. Since the diagnosis of breast cancer manually takes lengthy time and there is a scarcity of detection systems, development of an automatic diagnosis system is needed for early detection of cancer. Machine learning models are now widely used for cancer detection and prediction research for improving the successive therapy of patients. Considering this need, this study implements pre-trained convolutional neural network based models for detecting breast cancer using ultrasound images. In particular, we tuned the pre-trained models for extracting key features from ultrasound images and included a classifier on the top layer. We measured accuracy of seven popular state-of-the-art pre-trained models using different optimizers and hyper-parameters through fivefold cross validation. Moreover, we consider Grad-CAM and occlusion mapping techniques to examine how well the models extract key features from the ultrasound images to detect cancers. We observe that after fine tuning, DenseNet201 and ResNet50 show 100% accuracy with Adam and RMSprop optimizers. VGG16 shows 100% accuracy using the Stochastic Gradient Descent optimizer. We also develop a custom convolutional neural network model with a smaller number of layers compared to large layers in the pre-trained models. The model also shows 100% accuracy using the Adam optimizer in classifying healthy and breast cancer patients. It is our belief that the model will assist healthcare experts with improved and faster patient screening and pave a way to further breast cancer research.


2021 ◽  
Vol 21 (4) ◽  
pp. 1-21
Author(s):  
Farooq Hoseiny ◽  
Sadoon Azizi ◽  
Mohammad Shojafar ◽  
Rahim Tafazolli

Volunteer computing is an Internet-based distributed computing in which volunteers share their extra available resources to manage large-scale tasks. However, computing devices in a Volunteer Computing System (VCS) are highly dynamic and heterogeneous in terms of their processing power, monetary cost, and data transferring latency. To ensure both of the high Quality of Service (QoS) and low cost for different requests, all of the available computing resources must be used efficiently. Task scheduling is an NP-hard problem that is considered as one of the main critical challenges in a heterogeneous VCS. Due to this, in this article, we design two task scheduling algorithms for VCSs, named Min-CCV and Min-V . The main goal of the proposed algorithms is jointly minimizing the computation, communication, and delay violation cost for the Internet of Things (IoT) requests. Our extensive simulation results show that proposed algorithms are able to allocate tasks to volunteer fog/cloud resources more efficiently than the state-of-the-art. Specifically, our algorithms improve the deadline satisfaction task rates around 99.5% and decrease the total cost between 15 to 53% in comparison with the genetic-based algorithm.


Author(s):  
Abdul Waheed ◽  
Munam Ali Shah ◽  
Abid Khan ◽  
Gwanggil Jeon

AbstractVehicular networks as the key enablers in Intelligent Transportation Systems (ITS) and the Internet of Things (IoT) are key components of smart sustainable cities. Vehicles as a significant component of smart cities have emerging in-vehicle applications that can assist in good governance for sustainable smart cities. Most of these applications are delay sensitive and demand high computational capabilities that are provided by emerging technologies. Utilizing the distributed computational resources of vehicles with the help of volunteer computing is an efficient method to fulfill the high computational requirements of vehicles itself and the other components of smart cities. Vehicle as a resource is an emerging concept that must be considered to address the future challenges of sustainable smart cities. In this paper, an infrastructure-assisted job scheduling and task coordination mechanism in volunteer computing-based VANET called RSU-based VCBV is proposed, which enhances the architecture of VANET to utilize the surplus resources of vehicles for task execution. We propose job scheduling and task coordination algorithms for different volunteer models. Further, we design and implement an adaptive task replication method to seek fault tolerance by avoiding task failures due to locations of vehicles. We propose a task replication algorithm called location-based task replication algorithm. Extensive simulations validate the performance of our proposed volunteer models while comparing average task execution time and weight ratios with existing work.


Sign in / Sign up

Export Citation Format

Share Document