Professional Documents
Culture Documents
I. I NTRODUCTION
Mobile technology has been enabling embedded systems
to become a ubiquitous existence changing peoples life in
multiple dimensions, from smart phones to mobile vehicular
systems [1], [2]. As an emerging technology, Mobile Heterogeneous Embedded Systems (MHES) is considered one
of the growing trends in the mainstream of mobile devices
that balance the high performance and cost [3], [4]. This
trend has been empowered by the rapid development of
cloud computing in recent years [5], [6]. Heavy workloads
on mobile devices are ofoaded to the cloud servers, by
which the energy consumptions are reduced [7], [8]. However, current solutions cannot solve the conicts between
the consumption of the wireless communications and the
target of saving energy when the local energy uses are
198
Node 3
Node 4
T
1
2
3
4
5
6
7
8
9
10
11
C1
8.95
7.86
7.88
6.96
7.05
7.57
7.58
8.54
8.98
8.62
7.06
C2
4.56
6.62
6.31
6.06
4.55
5.16
5.42
4.92
5.05
5.59
4.23
C3
3.2
4.77
2.61
3.75
3.7
3.93
2.57
2.08
4.53
4.64
2.21
MC
9.75
10.45
8.24
4.04
4.96
3.49
11.98
11.86
4.91
6.62
11.48
Second, we use greedy algorithm to produce a suboptimal solution. At each node, we alternative the available
core requiring the lowest power task by task, which also
includes the cloud-side processors. Finishing this step can
generate a G Table, which uses greedy algorithm to gain a
sub-optimal solution. Table II represents an example of G
Table in which the selected cores are bolded.
Finally, we use our proposed algorithm to generate a D
Table that is an optimal solution based on the G Table.
For reaching this goal, we make a few adjustments on G
Table by operating OHTA algorithm. Table IV represents
an adjusted G Table that shows an optimal alternative. The
adjusted core assignments are marked by *.
199
Final CD
C2
0
1.67
5.42
2.84
Mapping
C3
MC
-0.85
0.41
0.44
0
2.57
11.98
0
9.78
Ctotal =
w
vi (cj )
(1)
i=1
T
C1
C2
C3
MC
1
8.95
4.56
3.2
9.75
2
7.86
6.62*
4.77
10.45
Node 2
3
7.88
6.31
2.61*
8.24
4
6.96
6.06
3.75
4.04
5
7.05
4.55*
3.7
4.96
6
7.57
5.16
3.93
3.49
Node 3
7
7.58*
5.42
2.57
11.98
8
8.54
4.92
2.08*
11.86
9
8.98
5.05
4.53
4.91*
Node 4
10
8.62
5.59
4.64
6.62
11
7.06
4.23
2.21*
11.48
The task assignment plan is: Task 1 Core 3, Task 2 Core 2, Task
3 Core 3, Task 4 MC, Task 5 Core 2, Task 6 MC, Task
7 Core 1, Task 8 Core 3, Task 9 MC, Task 10 Core 2,
and Task 11 Core 3,
Nodes
Node 1
Fig. 3: Manipulative process of the Energy-Aware Heterogeneous Resource Management Model (EA-HRM2)
Fig. 3 illustrates the manipulative process of EA-HRM2
model. According to the gure, nodes will be generated
200
when the tasks are inputted, which can simplify the process
structure. Next, a C Table will be created for mapping
energy consumptions. An example of C Table is given by
Table I. Moreover, we use greedy algorithm to generate a
sub-optimal assignment solution, which is represented by a
G Table. Based on this table, we use our proposed algorithm
to accomplish a series of adjustments to eventually create an
optimal assignment solution that is a D Table. Assign this
D Table to the output Data Allocation Plan. The crucial
process of this mechanism is the adjustment operation from
the sub-optimal to the optimal solution. The detailed method
of the adjustments is given in our algorithm descriptions in
Section IV.
IV. A LGORITHMS
This section introduces our main algorithm used in EAHRM2 model. The algorithm is entitled as the Optimal
Heterogeneous Task Assignment (OHTA) algorithm, which
is designed to obtain the optimal solution by adjusting the
sub-optimal solution. The solution is an adoptable approach
for solving EMPHC problem.
Meanwhile, the inputs of our algorithm include a C Table
and a TaskAssignment. C Table refers to a table that maps
all energy consumptions for each task at each available
core. TaskAssignment is a sub-optimal task assignment plan
that can be gained by using Greedy algorithm [19]. This
algorithms output is new TaskAssignment, which is made by
adjusting the sub-optimal solution. Pseudo codes of OHTA
is given by Algorithm IV.1.
The main phases of our algorithm include:
1) Input CT able and T askAssignment that is a suboptimal assignment plan.
2) We generate a table, Temp, for adjustment operations
deriving from the T askAssignment. We use the assigned cores cost subtract from all task costs for the
same task and map the results into Temp.
3) For each task at each task group, we search the lowest
energy cost value. If there is a value A is less than 0, a
comparison will be given between A and another value.
Assume A is a cost of task T1 and T1 s assignment is
B. Task T2 is assigned to the core with the value C
that is as same as As corresponding core. D is the
value that is corresponding to B. We will switch the
alternative B and C if A+D<0.
4) Repeat the adjustment operations until there is no
A+D<0 situations.
5) Output the assignment plan according the nal table.
V. E XPERIMENT AND THE R ESULTS
We describe our experiment congurations in Section
V-A and illustrate a few experimental results, analyses, and
ndings in Section V-B.
A. Experimental Conguration
The experimental environment was established in our lab.
We developed a simulator that was specically designed and
operated for this experiment to simulate the cloud computing applications. The hardware setting in this experiment
201
B. Experimental Results
Fig. 4 represents comparisons for the task assignment
plan generation time consumptions under four settings. We
found that our proposed model required longer execution
time for generating the task assignments than Greedy and
FIFO algorithms. It was reasonable and logical that FIFO
algorithm had the shortest execution time since it needed the
least computation volumes. Greedy algorithm also requires
less computations than EA-HRM2. However, as a solution to
a NP-hard problem, our proposed schemes execution time
is in an acceptable time scope.
Fig. 5 represents comparison results of the energy-saving
among EA-HRM2, Greedy, and FIFO under Setting 1. We
selected 10 experimental results out of 100 simulations and
illustrated the results in the gure. According to the gure,
our proposed scheme had better performances in most cases
under this setting.
Fig. 6 illustrates 10 experimental results under Setting 2,
which were selected from 100 simulations. The advantage in
saving energy of our proposed scheme was still obvious. The
energy consumptions of EA-HRM2 were much lower than
FIFO in all cases. However, more energy consumptions by
using Greedy algorithm were close to our proposed scheme.
Furthermore, Fig. 7 shows a few experimental results
under Setting 4. Our scheme is still greatly superior to
FIFO. However, EA-HRM2s energy costs were slightly
lower than Greedy. The reasons of causing this situation
might be twofold. First, the optimal solutions could be
202
R EFERENCES
[1] Y. Li, W. Dai, Z. Ming, and M. Qiu. Privacy protection for preventing
data over-collection in smart city. IEEE Transactions on Computers,
PP:1, 2015.
[2] K. Gai, M. Qiu, H. Zhao, L. Tao, and Z. Zong. Dynamic energy-aware
cloudlet-based mobile cloud computing model for green computing.
Journal of Network and Computer Applications, 59:4654, 2015.
[3] M. Qiu, J. Niu, L. Yang, X. Qin, S. Zhang, and B. Wang. Energyaware loop parallelism maximization for multi-core DSP architectures. In Proceedings of the 2010 IEEE/ACM Intl Conf. on Green
Computing and Communications & Intl Conf. on Cyber, Physical and
Social Computing, pages 205212. IEEE Computer Society, 2010.
[4] M. Qiu, L. Yang, Z. Shao, and E. Sha. Dynamic and leakage
energy minimization with soft real-time loop scheduling and voltage
assignment. IEEE Trans. on Very Large Scale Integration Syst.,
18(3):501504, 2010.
[5] M. Qiu, M. Zhong, J. Li, K. Gai, and Z. Zong. Phase-change
memory optimization for green cloud with genetic algorithm. IEEE
Transactions on Computers, 64(12):3528 3540, 2015.
[6] M. Qiu, Z. Ming, J. Li, J. Liu, G. Quan, and Y. Zhu. Informer homed
routing fault tolerance mechanism for wireless sensor networks.
Journal of Systems Architecture, 59(4):260270, 2013.
[7] M. Qiu, W. Gao, M. Chen, J. Niu, and L. Zhang. Energy efcient
security algorithm for power grid wide area monitoring system. IEEE
Transactions on Smart Grid, 2(4):715723, 2011.
[8] M. Qiu, Z. Chen, Z. Ming, X. Qin, and J. Niu. Energy-aware data
allocation with hybrid memory for mobile cloud systems. IEEE
Systems Journal, PP:110, 2014.
[9] M. Qiu, Z. Chen, J. Niu, G. Quan, X. Qin, and L. Yang. Data allocation for hybrid memory with genetic algorithm. IEEE Transactions
on Emerging Topics in Computing, pp:111, 2015.
[10] J. Li, Z. Ming, M. Qiu, G. Quan, X. Qin, and T. Chen. Resource
allocation robustness in multi-core embedded systems with inaccurate
information. Journal of Systems Architecture, 57(9):840849, 2011.
[11] G. Wu, H. Zhang, M. Qiu, Z. Ming, J. Li, and X. Qin. A
decentralized approach for mining event correlations in distributed
system monitoring. Journal of parallel and Distributed Computing,
73(3):330340, 2013.
[12] M. Qiu, Z. Ming, J. Li, , S. Liu, B. Wang, and Z. Lu. Three-phase
time-aware energy minimization with DVFS and unrolling for chip
multiprocessors. J. of Syst. Architecture, 58(10):439445, 2012.
[13] J. Niu, Y. Gao, M. Qiu, and Z. Ming. Selecting proper wireless
network interfaces for user experience enhancement with guaranteed probability. Journal of Parallel and Distributed Computing,
72(12):15651575, 2012.
[14] K. Gai, Z. Du, M. Qiu, and H. Zhao. Efciency-aware workload
optimizations of heterogenous cloud computing for capacity planning
in nancial industry. In The 2nd IEEE International Conference on
Cyber Security and Cloud Computing, pages 16, New York, USA,
2015. IEEE.
[15] K. Gai and S. Li. Towards cloud computing: a literature review on
cloud computing and its development trends. In 2012 Fourth Intl
Conf. on Multimedia Information Networking and Security, pages
142146, Nanjing, China, 2012.
[16] K. Gai, M. Qiu, L. Tao, and Y. Zhu. Intrusion detection techniques
for mobile cloud computing in heterogeneous 5G. Security and
Communication Networks, pages 110, 2015.
[17] K. Gai and A. Steenkamp. A feasibility study of Platform-as-aService using cloud computing for a global service organization.
Journal of Information System Applied Research, 7:2842, 2014.
[18] K. Gai, M. Qiu, S. Jayaraman, and L. Tao. Ontology-based knowledge
representation for secure self-diagnosis in patient-centered telehealth
with cloud systems. In The 2nd IEEE International Conference on
Cyber Security and Cloud Computing, pages 98103, New York,
USA, 2015. IEEE.
[19] J. Li, M. Qiu, Z. Ming, G. Quan, X. Qin, and Z. Gu. Online
optimization for scheduling preemptable tasks on IaaS cloud systems.
Journal of Parallel and Distributed Computing, 72(5):666677, 2012.
In addition, Fig. 8 displays some experimental results under Setting 4. The similar situations to Setting 3 took place.
A higher-level core availability could increase the chance of
using Greedy algorithm to make optimal assignments.
In summary, our experimental evaluations had proved that
our proposed scheme had a great advantage in saving energy
due to the optimal task assignments. The plan generations
required a longer time, but the execution time was within
an acceptable range.
VI. C ONCLUSIONS
This paper focused on the issue of task mitigations by
using MHES in cloud computing and aimed to reduce
the total energy consumption by producing optimal task
assignment plans. The proposed model, EA-HRM2, was
designed to solve the energy minimization problem on heterogeneous computing that is a NP-hard problem. The main
algorithm used in this model was OHTA that was proposed
for producing optimal task assignments. Our experimental
evaluations had proved our proposed model was superior in
saving energy.
203