메뉴 건너뛰기




Volumn 39, Issue 10, 2015, Pages

A Machine Learning Method for Power Prediction on the Mobile Devices

Author keywords

Energy profiling; Fuzzy neural networks; Linux; Power estimation

Indexed keywords

ARTICLE; ARTIFICIAL NEURAL NETWORK; COMPUTER PREDICTION; DATA ANALYSIS SOFTWARE; ENERGY CONSUMPTION; FUZZY NEURAL NETWORK; FUZZY SYSTEM; MACHINE LEARNING; MICROCOMPUTER; MOBILE APPLICATION; FUZZY LOGIC; HUMAN; MOBILE PHONE; POWER SUPPLY; STATISTICAL MODEL;

EID: 84940107821     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-015-0320-5     Document Type: Article
Times cited : (7)

References (35)
  • 1
    • 84870055573 scopus 로고    scopus 로고
    • Enabling efficient reprogramming through reduction of executable modules in networked embedded systems
    • Dong, W., et al., Enabling efficient reprogramming through reduction of executable modules in networked embedded systems. Ad Hoc Networks 11(1):473–489, 2013.
    • (2013) Ad Hoc Networks , vol.11 , Issue.1 , pp. 473-489
    • Dong, W.1
  • 2
    • 84870056241 scopus 로고    scopus 로고
    • Implementing a hardware-embedded reactive agents platform based on a service-oriented architecture over heterogeneous wireless sensor networks
    • Alonso, R. S., et al., Implementing a hardware-embedded reactive agents platform based on a service-oriented architecture over heterogeneous wireless sensor networks. Ad Hoc Networks 11.1:151–166, 2013.
    • (2013) Ad Hoc Networks , pp. 151-166
    • Alonso, R.S.1
  • 3
    • 85027933416 scopus 로고    scopus 로고
    • Energy-Aware task scheduler for self-powered sensor nodes: From model to firmware
    • Severini, M., et al., Energy-Aware task scheduler for self-powered sensor nodes: From model to firmware. Ad Hoc Networks 24:73–91, 2015.
    • (2015) Ad Hoc Networks , vol.24 , pp. 73-91
    • Severini, M.1
  • 4
    • 84888641124 scopus 로고    scopus 로고
    • On the need for a reputation system in mobile phone based sensing
    • Huang, K. L., Kanhere, S. S., and Wen, H., On the need for a reputation system in mobile phone based sensing. Ad Hoc Networks 12:130–149, 2014.
    • (2014) Ad Hoc Networks , vol.12 , pp. 130-149
    • Huang, K.L.1    Kanhere, S.S.2    Wen, H.3
  • 5
    • 50949125760 scopus 로고    scopus 로고
    • The internals of advanced interrupt handling techniques: Performance optimization of an embedded Linux network interface
    • Spanos, S., Meliones, A., and Stassinopoulos, G., The internals of advanced interrupt handling techniques: Performance optimization of an embedded Linux network interface. Computer Communications 31.14:3460–3468, 2008.
    • (2008) Computer Communications , pp. 3460-3468
    • Spanos, S.1    Meliones, A.2    Stassinopoulos, G.3
  • 6
    • 84916199888 scopus 로고    scopus 로고
    • WLAN-Opp: Ad-hoc-less opportunistic networking on smartphones
    • Trifunovic, S., et al., WLAN-Opp: Ad-hoc-less opportunistic networking on smartphones. Ad Hoc Networks 25:346–358, 2015.
    • (2015) Ad Hoc Networks , vol.25 , pp. 346-358
    • Trifunovic, S.1
  • 7
    • 79953725427 scopus 로고    scopus 로고
    • Powerscope: a tool for profiling the energy usage of mobile applications
    • Second IEEE Workshop on 2–10. IEEE, 1999
    • Flinn, J., Satyanarayanan, M., Powerscope: a tool for profiling the energy usage of mobile applications. In Proceedings of Mobile Computing Systems and Applications, 1999. Second IEEE Workshop on 2–10. IEEE, 1999. doi: 10.1109/MCSA.1999.749272.
    • (1999) In Proceedings of Mobile Computing Systems and Applications
    • Flinn, J.1    Satyanarayanan, M.2
  • 8
    • 84941079784 scopus 로고    scopus 로고
    • A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering
    • Wang, G., Hao, J., Ma, J., and Huang, L., A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Systems with Applications 37(9):6225–6232, 2010. doi:10.1016/j.eswa.2010.02.102.
    • (2010) Expert Systems with Applications , vol.37 , Issue.9 , pp. 6225-6232
    • Wang, G.1    Hao, J.2    Ma, J.3    Huang, L.4
  • 9
    • 33744529638 scopus 로고    scopus 로고
    • Evolutionary neural networks for anomaly detection based on the behavior of a program
    • Han, S.-J., and Cho, S.-B., Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 36(3):559–570, 2005. doi:10.1109/TSMCB.2005.860136.
    • (2005) IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics , vol.36 , Issue.3 , pp. 559-570
    • Han, S.-J.1    Cho, S.-B.2
  • 10
    • 26944501570 scopus 로고    scopus 로고
    • Applying fuzzy neural network to intrusion detection based on sequences of system calls
    • In Proceedings of first international conference Advanced Data Mining and Applications 3584
    • Zhang, G., Sun, J., Applying fuzzy neural network to intrusion detection based on sequences of system calls. In Proceedings of first international conference Advanced Data Mining and Applications 3584: 483–490. Springer Berlin Heidelberg, 2005. doi: 10.1007/11527503_58.
    • (2005) Springer Berlin Heidelberg , pp. 483-490
    • Zhang, G.1    Sun, J.2
  • 18
    • 0033719421 scopus 로고    scopus 로고
    • Wattch: a framework for architectural-level power analysis and optimizations. In Proceedings of the 27th annual international symposium on Computer architecture
    • Brooks, D., Tiwari, V., Martonosi, M., Wattch: a framework for architectural-level power analysis and optimizations. In Proceedings of the 27th annual international symposium on Computer architecture 28:(2) 83–94. ACM, 2000. doi: 10.1145/342001.339657.
    • (2000) ACM , vol.28 , Issue.2 , pp. 83-94
    • Brooks, D.1    Tiwari, V.2    Martonosi, M.3
  • 19
    • 0002986475 scopus 로고    scopus 로고
    • The SimpleScalar tool set, version 2.0. ACM SIGARCH Computer Architecture News
    • Burger, D., Austin, T.M., The SimpleScalar tool set, version 2.0. ACM SIGARCH Computer Architecture News 25:(3) 13–25. ACM, 1997. doi: 10.1145/268806.268810.
    • (1997) ACM , vol.25 , Issue.3 , pp. 13-25
    • Burger, D.1    Austin, T.M.2
  • 22
    • 52049119850 scopus 로고    scopus 로고
    • ECRTS’08. Euromicro Conference on 181–190
    • Shin, I., Easwaran, A., Lee, I., Hierarchical scheduling framework for virtual clustering of multiprocessors. In Real-Time Systems, 2008. ECRTS’08. Euromicro Conference on 181–190. IEEE, 2008. doi: 10.1109/ECRTS.2008.28.
    • (2008) IEEE , pp. 2008
    • Shin, I.1    Easwaran, A.2    Lee, I.3
  • 23
    • 0028722375 scopus 로고
    • Power analysis of embedded software: a first step towards software power minimization
    • Tiwari, V., Malik, S., and Wolfe, A., Power analysis of embedded software: a first step towards software power minimization. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2(4):437–445, 1994. doi:10.1109/92.335012.
    • (1994) IEEE Transactions on Very Large Scale Integration (VLSI) Systems , vol.2 , Issue.4 , pp. 437-445
    • Tiwari, V.1    Malik, S.2    Wolfe, A.3
  • 24
    • 84861345987 scopus 로고    scopus 로고
    • SEProf: A high-level software energy profiling tool for an embedded processor enabling power management functions
    • Tsao, S.-L., and Chen, J. J., SEProf: A high-level software energy profiling tool for an embedded processor enabling power management functions. Journal of Systems and Software 85(8):1757–1769, 2012. doi:10.1016/j.jss.2012.03.027.
    • (2012) Journal of Systems and Software , vol.85 , Issue.8 , pp. 1757-1769
    • Tsao, S.-L.1    Chen, J.J.2
  • 25
    • 84925118432 scopus 로고    scopus 로고
    • Towards self adaptive network traffic classification
    • Tongaonkar, A., et al., Towards self adaptive network traffic classification. Computer Communications 56:35–46, 2015.
    • (2015) Computer Communications , vol.56 , pp. 35-46
    • Tongaonkar, A.1
  • 26
    • 82655173950 scopus 로고    scopus 로고
    • On Linux starvation of CPU-bound processes in the presence of network I/O
    • Salah, K., et al., On Linux starvation of CPU-bound processes in the presence of network I/O. Computers & Electrical Engineering 37(6):1090–1105, 2011.
    • (2011) Computers & Electrical Engineering , vol.37 , Issue.6 , pp. 1090-1105
    • Salah, K.1
  • 27
    • 79959938763 scopus 로고    scopus 로고
    • Comparative analysis of power variables in high performance embedded and x86 architectures using GNU/Linux
    • Montoya, F. G., et al., Comparative analysis of power variables in high performance embedded and x86 architectures using GNU/Linux. Computers & Electrical Engineering 37(4):541–549, 2011.
    • (2011) Computers & Electrical Engineering , vol.37 , Issue.4 , pp. 541-549
    • Montoya, F.G.1
  • 29
    • 84940113868 scopus 로고    scopus 로고
    • Learning with labview
    • Bishop, R.H., Learning with labview. Prentice Hall, 2014. ISBN: 9780134022123.
    • (2014) Prentice Hall
    • Bishop, R.H.1
  • 30
    • 19944412028 scopus 로고    scopus 로고
    • Linux kernel development
    • Love, R., Linux kernel development. Pearson Education, 2010.
    • (2010) Pearson Education
    • Love, R.1
  • 31
    • 84936120160 scopus 로고    scopus 로고
    • Cloud-based power estimation and power-aware scheduling for embedded systems
    • Chen, D.-R., and Chiang, K.-F., Cloud-based power estimation and power-aware scheduling for embedded systems. Accepted, Computers & Electrical Engineering, 2015. doi:10.1016/j.compeleceng.2015.06.004.
    • (2015) Accepted, Computers & Electrical Engineering
    • Chen, D.-R.1    Chiang, K.-F.2
  • 32
    • 35048875256 scopus 로고    scopus 로고
    • Web users’ classification using fuzzy neural network. Knowledge-Based Intelligent Information and Engineering Systems 2313
    • Yuan, F., Huanrui, W., Ge Y., Web users’ classification using fuzzy neural network. Knowledge-Based Intelligent Information and Engineering Systems 2313: 1030–1036. Springer Berlin Heidelberg,2004. doi: 10.1007/978-3-540-30132-5_139.
    • (2004) Springer Berlin Heidelberg , pp. 1030-1036
    • Yuan, F.1    Huanrui, W.2    Ge, Y.3
  • 33
    • 85084163349 scopus 로고    scopus 로고
    • Data mining approaches for intrusion detection
    • Lee, W., Salvatore, S.J., Data mining approaches for intrusion detection. In Proceedings of the 7th USENIX Security Symposium, 1998. https://www.usenix.org/legacy/publications /library/proceedings/sec98/full_papers/full_papers/lee/lee_html/lee.html.
    • (1998) In Proceedings of the 7th USENIX Security Symposium
    • Lee, W.1    Salvatore, S.J.2
  • 34
    • 84883109311 scopus 로고    scopus 로고
    • The systems hacker’s guide to the galaxy energy usage in a modern smartphone. Proceedings of the 4th Asia-Pacific Workshop on Systems
    • Carroll, A., Heiser, G., The systems hacker’s guide to the galaxy energy usage in a modern smartphone. Proceedings of the 4th Asia-Pacific Workshop on Systems. ACM, 2013.
    • (2013) ACM
    • Carroll, A.1    Heiser, G.2
  • 35
    • 84874967784 scopus 로고    scopus 로고
    • Data acquisition system for diagnostics of manufacturing system operational states
    • Krenick, T., and Fabian, S., Data acquisition system for diagnostics of manufacturing system operational states. Annals of Faculty of Engineering Hunedoara 7(1):211–214, 2009.
    • (2009) Annals of Faculty of Engineering Hunedoara , vol.7 , Issue.1 , pp. 211-214
    • Krenick, T.1    Fabian, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.