• Title/Summary/Keyword: Internet application classification

Search Result 142, Processing Time 0.025 seconds

Toward Energy-Efficient Task Offloading Schemes in Fog Computing: A Survey

  • Alasmari, Moteb K.;Alwakeel, Sami S.;Alohali, Yousef
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.163-172
    • /
    • 2022
  • The interconnection of an enormous number of devices into the Internet at a massive scale is a consequence of the Internet of Things (IoT). As a result, tasks offloading from these IoT devices to remote cloud data centers become expensive and inefficient as their number and amount of its emitted data increase exponentially. It is also a challenge to optimize IoT device energy consumption while meeting its application time deadline and data delivery constraints. Consequently, Fog Computing was proposed to support efficient IoT tasks processing as it has a feature of lower service delay, being adjacent to IoT nodes. However, cloud task offloading is still performed frequently as Fog computing has less resources compared to remote cloud. Thus, optimized schemes are required to correctly characterize and distribute IoT devices tasks offloading in a hybrid IoT, Fog, and cloud paradigm. In this paper, we present a detailed survey and classification of of recently published research articles that address the energy efficiency of task offloading schemes in IoT-Fog-Cloud paradigm. Moreover, we also developed a taxonomy for the classification of these schemes and provided a comparative study of different schemes: by identifying achieved advantage and disadvantage of each scheme, as well its related drawbacks and limitations. Moreover, we also state open research issues in the development of energy efficient, scalable, optimized task offloading schemes for Fog computing.

A Remote Sensing Scene Classification Model Based on EfficientNetV2L Deep Neural Networks

  • Aljabri, Atif A.;Alshanqiti, Abdullah;Alkhodre, Ahmad B.;Alzahem, Ayyub;Hagag, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.406-412
    • /
    • 2022
  • Scene classification of very high-resolution (VHR) imagery can attribute semantics to land cover in a variety of domains. Real-world application requirements have not been addressed by conventional techniques for remote sensing image classification. Recent research has demonstrated that deep convolutional neural networks (CNNs) are effective at extracting features due to their strong feature extraction capabilities. In order to improve classification performance, these approaches rely primarily on semantic information. Since the abstract and global semantic information makes it difficult for the network to correctly classify scene images with similar structures and high interclass similarity, it achieves a low classification accuracy. We propose a VHR remote sensing image classification model that uses extracts the global feature from the original VHR image using an EfficientNet-V2L CNN pre-trained to detect similar classes. The image is then classified using a multilayer perceptron (MLP). This method was evaluated using two benchmark remote sensing datasets: the 21-class UC Merced, and the 38-class PatternNet. As compared to other state-of-the-art models, the proposed model significantly improves performance.

Real-time Identification of Skype Application Traffic using Behavior Analysis (동작형태 분석을 통한 Skype 응용 트래픽의 실시간 탐지 방법)

  • Lee, Sang-Woo;Lee, Hyun-Shin;Choi, Mi-Jung;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2B
    • /
    • pp.131-140
    • /
    • 2011
  • As the number of Internet users and applications is increasing, the importance of application traffic classification is growing more and more for efficient network management. While a number of methods for traffic classification have been introduced, such as signature-based and machine learning-based methods, Skype application, which uses encrypted communication on its own P2P network, is known as one of the most difficult traffic to identify. In this paper we propose a novel method to identify Skype application traffic on the fly. The main idea is to setup a list of Skype host information {IP, port} by examining the packets generated in the Skype login process and utilizes the list to identify other Skype traffic. By implementing the identification system and deploying it on our campus network, we proved the performance and feasibility of the proposed method.

Transfer Learning for Caladium bicolor Classification: Proof of Concept to Application Development

  • Porawat Visutsak;Xiabi Liu;Keun Ho Ryu;Naphat Bussabong;Nicha Sirikong;Preeyaphorn Intamong;Warakorn Sonnui;Siriwan Boonkerd;Jirawat Thongpiem;Maythar Poonpanit;Akarasate Homwiseswongsa;Kittipot Hirunwannapong;Chaimongkol Suksomsong;Rittikait Budrit
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.126-146
    • /
    • 2024
  • Caladium bicolor is one of the most popular plants in Thailand. The original species of Caladium bicolor was found a hundred years ago. Until now, there are more than 500 species through multiplication. The classification of Caladium bicolor can be done by using its color and shape. This study aims to develop a model to classify Caladium bicolor using a transfer learning technique. This work also presents a proof of concept, GUI design, and web application deployment using the user-design-center method. We also evaluated the performance of the following pre-trained models in this work, and the results are as follow: 87.29% for AlexNet, 90.68% for GoogleNet, 93.59% for XceptionNet, 93.22% for MobileNetV2, 89.83% for RestNet18, 88.98% for RestNet50, 97.46% for RestNet101, and 94.92% for InceptionResNetV2. This work was implemented using MATLAB R2023a.

A Study on Business Processes and Corresponding Classifications of Digital Contents Industries (디지털 컨텐츠 산업의 업무프로세스 및 분류체계에 관한 연구)

  • 임춘성;최봉균;윤용기
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.3
    • /
    • pp.105-120
    • /
    • 2002
  • The importance of contents industry is growing up in various industries because of internet and digital economy. Recently, contents industry is challenging to new businesses such as total service industry with digital contents. It is important to classify digital contents to use it in contents industries and information and telecommunication service industries. Previous contents classification frameworks is based on contents quality, business model and application methods. They didn't consider business processes, interfaces of business unit and interactions in contents industries. In this paper, we present core business processes in digital contents industries, a corresponding digital contents classification, and analysis method of digital contents industry.

  • PDF

The Application way on Semiotic Structure of Knowledge Classification (지식 분류의 기호학적 체계 응용 방안)

  • Yoon, Jeng-Giy
    • Journal of Korean Library and Information Science Society
    • /
    • v.43 no.2
    • /
    • pp.273-292
    • /
    • 2012
  • This study unpackes semiotic character of knowledge classification and wants to know how sign structure of classification effects on canon and banned book etc, and by this impact stems from the semoitic structure structurally, discusses coidentity between banned book and internet in social and cultural structure aspect. and proposes way for understanding and interpretation text like mass media using structuralism theory.

Classification ofWarm Temperate Vegetations and GIS-based Forest Management System

  • Cho, Sung-Min
    • International journal of advanced smart convergence
    • /
    • v.10 no.1
    • /
    • pp.216-224
    • /
    • 2021
  • Aim of this research was to classify forest types at Wando in Jeonnam Province and develop warm temperate forest management system with application of Remote Sensing and GIS. Another emphasis was given to the analysis of satellite images to compare forest type changes over 10 year periods from 2009 to 2019. We have accomplished this study by using ArcGIS Pro and ENVI. For this research, Landsat satellite images were obtained by means of terrestrial, airborne and satellite imagery. Based on the field survey data, all land uses and forest types were divided into 5 forest classes; Evergreen broad-leaved forest, Evergreen Coniferous forest, Deciduous broad-leaved forest, Mixed fores, and others. Supervised classification was carried out with a random forest classifier based on manually collected training polygons in ROI. Accuracy assessment of the different forest types and land-cover classifications was calculated based on the reference polygons. Comparison of forest changes over 10 year periods resulted in different vegetation biomass volumes, producing the loss of deciduous forests in 2019 probably due to the expansion of residential areas and rapid deforestation.

A study of Service Component Based on Active Model Support Healthcare Application Service in u-Environment (u-환경에서 헬스케어 응용 서비스 지원 액티브 모델 기반의 서비스 컴포넌트에 관한 연구)

  • Jeong, Chang-Won;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.31-40
    • /
    • 2010
  • In this paper, we propose a service component based on active model for supporting a variety of u-healthcare application services. It implemented that component as a classification of function for developing healthcare application services. Especially we focus on the adaptive information service in integrated environment using a distributed object technologies of the various healthcare home service based on distributed object group framework. And we shows the service component applying to Healthcare application services such as healthcare home monitoring, mobile monitoring and web based monitoring. Also, we show the performance evaluation results such as response time, system load and network load.

Tuple Pruning Using Bloom Filter for Packet Classification (패킷 분류를 위한 블룸 필터 이용 튜플 제거 알고리즘)

  • Kim, So-Yeon;Lim, Hye-Sook
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.175-186
    • /
    • 2010
  • Due to the emergence of new application programs and the fast growth of Internet users, Internet routers are required to provide the quality of services according to the class of input packets, which is identified by wire-speed packet classification. For a pre-defined rule set, by performing multi-dimensional search using various header fields of an input packet, packet classification determines the highest priority rule matching to the input packet. Efficient packet classification algorithms have been widely studied. Tuple pruning algorithm provides fast classification performance using hash-based search against the candidate tuples that may include matching rules. Bloom filter is an efficient data structure composed of a bit vector which represents the membership information of each element included in a given set. It is used as a pre-filter determining whether a specific input is a member of a set or not. This paper proposes new tuple pruning algorithms using Bloom filters, which effectively remove unnecessary tuples which do not include matching rules. Using the database known to be similar to actual rule sets used in Internet routers, simulation results show that the proposed tuple pruning algorithm provides faster packet classification as well as consumes smaller memory amount compared with the previous tuple pruning algorithm.

Behavior Based Signature Extraction Method for Internet Application Traffic Identification (인터넷 응용 트래픽 분석을 위한 행위기반 시그니쳐 추출 방법)

  • Yoon, Sung-Ho;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.368-376
    • /
    • 2013
  • The importance of application traffic identification is emphasized for the efficient network management with recent rapid development of internet. In this paper, we present the application traffic identification method using the behavior based signature to improve the previous limitations. The behavior based signature is made by combining the existing various traffic features, and uses the Inter-Flow unit that is combination of the first request packet of each flow. All signatures have 100% precision when measured the accuracy of 5 applications using at home and abroad to prove the feasibility of the proposed signature.