Skip to main content
Erschienen in: Journal of Medical Systems 10/2015

01.10.2015 | Mobile Systems

A Machine Learning Method for Power Prediction on the Mobile Devices

verfasst von: Da-Ren Chen, You-Shyang Chen, Lin-Chih Chen, Ming-Yang Hsu, Kai-Feng Chiang

Erschienen in: Journal of Medical Systems | Ausgabe 10/2015

Einloggen, um Zugang zu erhalten

Abstract

Energy profiling and estimation have been popular areas of research in multicore mobile architectures. While short sequences of system calls have been recognized by machine learning as pattern descriptions for anomalous detection, power consumption of running processes with respect to system-call patterns are not well studied. In this paper, we propose a fuzzy neural network (FNN) for training and analyzing process execution behaviour with respect to series of system calls, parameters and their power consumptions. On the basis of the patterns of a series of system calls, we develop a power estimation daemon (PED) to analyze and predict the energy consumption of the running process. In the initial stage, PED categorizes sequences of system calls as functional groups and predicts their energy consumptions by FNN. In the operational stage, PED is applied to identify the predefined sequences of system calls invoked by running processes and estimates their energy consumption.
Literatur
1.
Zurück zum Zitat Dong, W., et al., Enabling efficient reprogramming through reduction of executable modules in networked embedded systems. Ad Hoc Networks 11(1):473–489, 2013.CrossRef Dong, W., et al., Enabling efficient reprogramming through reduction of executable modules in networked embedded systems. Ad Hoc Networks 11(1):473–489, 2013.CrossRef
2.
Zurück zum Zitat Alonso, R. S., et al., Implementing a hardware-embedded reactive agents platform based on a service-oriented architecture over heterogeneous wireless sensor networks. Ad Hoc Networks 11.1:151–166, 2013.CrossRef Alonso, R. S., et al., Implementing a hardware-embedded reactive agents platform based on a service-oriented architecture over heterogeneous wireless sensor networks. Ad Hoc Networks 11.1:151–166, 2013.CrossRef
3.
Zurück zum Zitat Severini, M., et al., Energy-Aware task scheduler for self-powered sensor nodes: From model to firmware. Ad Hoc Networks 24:73–91, 2015.CrossRef Severini, M., et al., Energy-Aware task scheduler for self-powered sensor nodes: From model to firmware. Ad Hoc Networks 24:73–91, 2015.CrossRef
4.
Zurück zum Zitat Huang, K. L., Kanhere, S. S., and Wen, H., On the need for a reputation system in mobile phone based sensing. Ad Hoc Networks 12:130–149, 2014.CrossRef Huang, K. L., Kanhere, S. S., and Wen, H., On the need for a reputation system in mobile phone based sensing. Ad Hoc Networks 12:130–149, 2014.CrossRef
5.
Zurück zum Zitat Spanos, S., Meliones, A., and Stassinopoulos, G., The internals of advanced interrupt handling techniques: Performance optimization of an embedded Linux network interface. Computer Communications 31.14:3460–3468, 2008.CrossRef Spanos, S., Meliones, A., and Stassinopoulos, G., The internals of advanced interrupt handling techniques: Performance optimization of an embedded Linux network interface. Computer Communications 31.14:3460–3468, 2008.CrossRef
6.
Zurück zum Zitat Trifunovic, S., et al., WLAN-Opp: Ad-hoc-less opportunistic networking on smartphones. Ad Hoc Networks 25:346–358, 2015.CrossRef Trifunovic, S., et al., WLAN-Opp: Ad-hoc-less opportunistic networking on smartphones. Ad Hoc Networks 25:346–358, 2015.CrossRef
7.
Zurück zum Zitat Flinn, J., Satyanarayanan, M., Powerscope: a tool for profiling the energy usage of mobile applications. In Proceedings of Mobile Computing Systems and Applications, 1999. Second IEEE Workshop on 2–10. IEEE, 1999. doi: 10.1109/MCSA.1999.749272. Flinn, J., Satyanarayanan, M., Powerscope: a tool for profiling the energy usage of mobile applications. In Proceedings of Mobile Computing Systems and Applications, 1999. Second IEEE Workshop on 2–10. IEEE, 1999. doi: 10.​1109/​MCSA.​1999.​749272.
9.
Zurück zum Zitat Han, S.-J., and Cho, S.-B., Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 36(3):559–570, 2005. doi:10.1109/TSMCB.2005.860136.CrossRef Han, S.-J., and Cho, S.-B., Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 36(3):559–570, 2005. doi:10.​1109/​TSMCB.​2005.​860136.CrossRef
10.
Zurück zum Zitat Zhang, G., Sun, J., Applying fuzzy neural network to intrusion detection based on sequences of system calls. In Proceedings of first international conference Advanced Data Mining and Applications 3584: 483–490. Springer Berlin Heidelberg, 2005. doi: 10.1007/11527503_58. Zhang, G., Sun, J., Applying fuzzy neural network to intrusion detection based on sequences of system calls. In Proceedings of first international conference Advanced Data Mining and Applications 3584: 483–490. Springer Berlin Heidelberg, 2005. doi: 10.​1007/​11527503_​58.
11.
Zurück zum Zitat Fullér, R., Neural fuzzy systems. 1995: 13, 1995. Fullér, R., Neural fuzzy systems. 1995: 13, 1995.
13.
Zurück zum Zitat Freund, Y., Schapire, R. E., and Abe, N., A short introduction to boosting. Journal-Japanese Society for Artificial Intelligence 14:771–780, 1999. Freund, Y., Schapire, R. E., and Abe, N., A short introduction to boosting. Journal-Japanese Society for Artificial Intelligence 14:771–780, 1999.
14.
Zurück zum Zitat Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A., A sense of self for unix processes. In Proceedings of Security and Privacy, 1996 I.E. Symposium on 120–128. IEEE, 1996. doi: 10.1109/SECPRI.1996.502675. Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A., A sense of self for unix processes. In Proceedings of Security and Privacy, 1996 I.E. Symposium on 120–128. IEEE, 1996. doi: 10.​1109/​SECPRI.​1996.​502675.
15.
Zurück zum Zitat Liu, Z., Florez, G., Bridges, S.M., A comparison of input representations in neural networks: a case study in intrusion detection. In Proceedings of the 2002 International Joint Conference on Neural Networks IJCNN’02 2: 1708–1703. IEEE, 2002. doi: 10.1109/IJCNN.2002.1007775. Liu, Z., Florez, G., Bridges, S.M., A comparison of input representations in neural networks: a case study in intrusion detection. In Proceedings of the 2002 International Joint Conference on Neural Networks IJCNN’02 2: 1708–1703. IEEE, 2002. doi: 10.​1109/​IJCNN.​2002.​1007775.
16.
Zurück zum Zitat Kai-Feng Chiang (2014) On the Study of Energy Profiling and Scheduling on Multi-core Systems. Master’s thesis, National Taichung University of Science and Technology. Kai-Feng Chiang (2014) On the Study of Energy Profiling and Scheduling on Multi-core Systems. Master’s thesis, National Taichung University of Science and Technology.
17.
Zurück zum Zitat Yaohua Sun, Ting Zhu, Ziguo Zhong, Tian He (2009, November) Energy profiling for mPlatform. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems 407–408. ACM. doi: 10.1145/1644038.1644125 Yaohua Sun, Ting Zhu, Ziguo Zhong, Tian He (2009, November) Energy profiling for mPlatform. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems 407–408. ACM. doi: 10.​1145/​1644038.​1644125
18.
Zurück zum Zitat Brooks, D., Tiwari, V., Martonosi, M., Wattch: a framework for architectural-level power analysis and optimizations. In Proceedings of the 27th annual international symposium on Computer architecture 28:(2) 83–94. ACM, 2000. doi: 10.1145/342001.339657. Brooks, D., Tiwari, V., Martonosi, M., Wattch: a framework for architectural-level power analysis and optimizations. In Proceedings of the 27th annual international symposium on Computer architecture 28:(2) 83–94. ACM, 2000. doi: 10.​1145/​342001.​339657.
19.
20.
Zurück zum Zitat Jung, W., Kang, C., Yoon, C., Kim, D., Cha, H. DevScope: a nonintrusive and online power analysis tool for smartphone hardware components. In Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis 353–362. ACM, 2012. doi: 10.1145/2380445.2380502. Jung, W., Kang, C., Yoon, C., Kim, D., Cha, H. DevScope: a nonintrusive and online power analysis tool for smartphone hardware components. In Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis 353–362. ACM, 2012. doi: 10.​1145/​2380445.​2380502.
21.
Zurück zum Zitat Qu, G., Kawabe, N., Usami, K., Potkonjak, M., Function-level power estimation methodology for microprocessors. In Proceedings of the 37th Annual Design Automation Conference 810–813. ACM, 2000. doi: 10.1145/337292.337786. Qu, G., Kawabe, N., Usami, K., Potkonjak, M., Function-level power estimation methodology for microprocessors. In Proceedings of the 37th Annual Design Automation Conference 810–813. ACM, 2000. doi: 10.​1145/​337292.​337786.
22.
Zurück zum Zitat Shin, I., Easwaran, A., Lee, I., Hierarchical scheduling framework for virtual clustering of multiprocessors. In Real-Time Systems, 2008. ECRTS’08. Euromicro Conference on 181–190. IEEE, 2008. doi: 10.1109/ECRTS.2008.28. Shin, I., Easwaran, A., Lee, I., Hierarchical scheduling framework for virtual clustering of multiprocessors. In Real-Time Systems, 2008. ECRTS’08. Euromicro Conference on 181–190. IEEE, 2008. doi: 10.​1109/​ECRTS.​2008.​28.
23.
Zurück zum Zitat Tiwari, V., Malik, S., and Wolfe, A., Power analysis of embedded software: a first step towards software power minimization. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2(4):437–445, 1994. doi:10.1109/92.335012.CrossRef Tiwari, V., Malik, S., and Wolfe, A., Power analysis of embedded software: a first step towards software power minimization. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2(4):437–445, 1994. doi:10.​1109/​92.​335012.CrossRef
24.
Zurück zum Zitat Tsao, S.-L., and Chen, J. J., SEProf: A high-level software energy profiling tool for an embedded processor enabling power management functions. Journal of Systems and Software 85(8):1757–1769, 2012. doi:10.1016/j.jss.2012.03.027.CrossRef Tsao, S.-L., and Chen, J. J., SEProf: A high-level software energy profiling tool for an embedded processor enabling power management functions. Journal of Systems and Software 85(8):1757–1769, 2012. doi:10.​1016/​j.​jss.​2012.​03.​027.CrossRef
25.
Zurück zum Zitat Tongaonkar, A., et al., Towards self adaptive network traffic classification. Computer Communications 56:35–46, 2015.CrossRef Tongaonkar, A., et al., Towards self adaptive network traffic classification. Computer Communications 56:35–46, 2015.CrossRef
26.
Zurück zum Zitat Salah, K., et al., On Linux starvation of CPU-bound processes in the presence of network I/O. Computers & Electrical Engineering 37(6):1090–1105, 2011.CrossRef Salah, K., et al., On Linux starvation of CPU-bound processes in the presence of network I/O. Computers & Electrical Engineering 37(6):1090–1105, 2011.CrossRef
27.
Zurück zum Zitat Montoya, F. G., et al., Comparative analysis of power variables in high performance embedded and x86 architectures using GNU/Linux. Computers & Electrical Engineering 37(4):541–549, 2011.CrossRef Montoya, F. G., et al., Comparative analysis of power variables in high performance embedded and x86 architectures using GNU/Linux. Computers & Electrical Engineering 37(4):541–549, 2011.CrossRef
28.
Zurück zum Zitat Krenick, T., and Fabian, S., Data acquisition system for diagnostics of manufacturing system operational states. Annals of Faculty of Engineering Hunedoara Journal of Engineering 7(1):211–214, 2009. Krenick, T., and Fabian, S., Data acquisition system for diagnostics of manufacturing system operational states. Annals of Faculty of Engineering Hunedoara Journal of Engineering 7(1):211–214, 2009.
29.
Zurück zum Zitat Bishop, R.H., Learning with labview. Prentice Hall, 2014. ISBN: 9780134022123. Bishop, R.H., Learning with labview. Prentice Hall, 2014. ISBN: 9780134022123.
30.
Zurück zum Zitat Love, R., Linux kernel development. Pearson Education, 2010. Love, R., Linux kernel development. Pearson Education, 2010.
32.
Zurück zum Zitat Yuan, F., Huanrui, W., Ge Y., Web users’ classification using fuzzy neural network. Knowledge-Based Intelligent Information and Engineering Systems 2313: 1030–1036. Springer Berlin Heidelberg,2004. doi: 10.1007/978-3-540-30132-5_139. Yuan, F., Huanrui, W., Ge Y., Web users’ classification using fuzzy neural network. Knowledge-Based Intelligent Information and Engineering Systems 2313: 10301036. Springer Berlin Heidelberg,2004. doi: 10.​1007/​978-3-540-30132-5_​139.
34.
Zurück zum Zitat Carroll, A., Heiser, G., The systems hacker’s guide to the galaxy energy usage in a modern smartphone. Proceedings of the 4th Asia-Pacific Workshop on Systems. ACM, 2013. Carroll, A., Heiser, G., The systems hacker’s guide to the galaxy energy usage in a modern smartphone. Proceedings of the 4th Asia-Pacific Workshop on Systems. ACM, 2013.
35.
Zurück zum Zitat Krenick, T., and Fabian, S., Data acquisition system for diagnostics of manufacturing system operational states. Annals of Faculty of Engineering Hunedoara 7(1):211–214, 2009. Krenick, T., and Fabian, S., Data acquisition system for diagnostics of manufacturing system operational states. Annals of Faculty of Engineering Hunedoara 7(1):211–214, 2009.
Metadaten
Titel
A Machine Learning Method for Power Prediction on the Mobile Devices
verfasst von
Da-Ren Chen
You-Shyang Chen
Lin-Chih Chen
Ming-Yang Hsu
Kai-Feng Chiang
Publikationsdatum
01.10.2015
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 10/2015
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-015-0320-5

Weitere Artikel der Ausgabe 10/2015

Journal of Medical Systems 10/2015 Zur Ausgabe