Skip to main content
Top
Published in: Journal of Medical Systems 10/2015

01-10-2015 | Mobile Systems

A Machine Learning Method for Power Prediction on the Mobile Devices

Authors: Da-Ren Chen, You-Shyang Chen, Lin-Chih Chen, Ming-Yang Hsu, Kai-Feng Chiang

Published in: Journal of Medical Systems | Issue 10/2015

Login to get access

Abstract

Energy profiling and estimation have been popular areas of research in multicore mobile architectures. While short sequences of system calls have been recognized by machine learning as pattern descriptions for anomalous detection, power consumption of running processes with respect to system-call patterns are not well studied. In this paper, we propose a fuzzy neural network (FNN) for training and analyzing process execution behaviour with respect to series of system calls, parameters and their power consumptions. On the basis of the patterns of a series of system calls, we develop a power estimation daemon (PED) to analyze and predict the energy consumption of the running process. In the initial stage, PED categorizes sequences of system calls as functional groups and predicts their energy consumptions by FNN. In the operational stage, PED is applied to identify the predefined sequences of system calls invoked by running processes and estimates their energy consumption.
Literature
1.
go back to reference Dong, W., et al., Enabling efficient reprogramming through reduction of executable modules in networked embedded systems. Ad Hoc Networks 11(1):473–489, 2013.CrossRef Dong, W., et al., Enabling efficient reprogramming through reduction of executable modules in networked embedded systems. Ad Hoc Networks 11(1):473–489, 2013.CrossRef
2.
go back to reference Alonso, R. S., et al., Implementing a hardware-embedded reactive agents platform based on a service-oriented architecture over heterogeneous wireless sensor networks. Ad Hoc Networks 11.1:151–166, 2013.CrossRef Alonso, R. S., et al., Implementing a hardware-embedded reactive agents platform based on a service-oriented architecture over heterogeneous wireless sensor networks. Ad Hoc Networks 11.1:151–166, 2013.CrossRef
3.
go back to reference Severini, M., et al., Energy-Aware task scheduler for self-powered sensor nodes: From model to firmware. Ad Hoc Networks 24:73–91, 2015.CrossRef Severini, M., et al., Energy-Aware task scheduler for self-powered sensor nodes: From model to firmware. Ad Hoc Networks 24:73–91, 2015.CrossRef
4.
go back to reference Huang, K. L., Kanhere, S. S., and Wen, H., On the need for a reputation system in mobile phone based sensing. Ad Hoc Networks 12:130–149, 2014.CrossRef Huang, K. L., Kanhere, S. S., and Wen, H., On the need for a reputation system in mobile phone based sensing. Ad Hoc Networks 12:130–149, 2014.CrossRef
5.
go back to reference Spanos, S., Meliones, A., and Stassinopoulos, G., The internals of advanced interrupt handling techniques: Performance optimization of an embedded Linux network interface. Computer Communications 31.14:3460–3468, 2008.CrossRef Spanos, S., Meliones, A., and Stassinopoulos, G., The internals of advanced interrupt handling techniques: Performance optimization of an embedded Linux network interface. Computer Communications 31.14:3460–3468, 2008.CrossRef
6.
go back to reference Trifunovic, S., et al., WLAN-Opp: Ad-hoc-less opportunistic networking on smartphones. Ad Hoc Networks 25:346–358, 2015.CrossRef Trifunovic, S., et al., WLAN-Opp: Ad-hoc-less opportunistic networking on smartphones. Ad Hoc Networks 25:346–358, 2015.CrossRef
7.
go back to reference Flinn, J., Satyanarayanan, M., Powerscope: a tool for profiling the energy usage of mobile applications. In Proceedings of Mobile Computing Systems and Applications, 1999. Second IEEE Workshop on 2–10. IEEE, 1999. doi: 10.1109/MCSA.1999.749272. Flinn, J., Satyanarayanan, M., Powerscope: a tool for profiling the energy usage of mobile applications. In Proceedings of Mobile Computing Systems and Applications, 1999. Second IEEE Workshop on 2–10. IEEE, 1999. doi: 10.​1109/​MCSA.​1999.​749272.
9.
go back to reference Han, S.-J., and Cho, S.-B., Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 36(3):559–570, 2005. doi:10.1109/TSMCB.2005.860136.CrossRef Han, S.-J., and Cho, S.-B., Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 36(3):559–570, 2005. doi:10.​1109/​TSMCB.​2005.​860136.CrossRef
10.
go back to reference Zhang, G., Sun, J., Applying fuzzy neural network to intrusion detection based on sequences of system calls. In Proceedings of first international conference Advanced Data Mining and Applications 3584: 483–490. Springer Berlin Heidelberg, 2005. doi: 10.1007/11527503_58. Zhang, G., Sun, J., Applying fuzzy neural network to intrusion detection based on sequences of system calls. In Proceedings of first international conference Advanced Data Mining and Applications 3584: 483–490. Springer Berlin Heidelberg, 2005. doi: 10.​1007/​11527503_​58.
11.
go back to reference Fullér, R., Neural fuzzy systems. 1995: 13, 1995. Fullér, R., Neural fuzzy systems. 1995: 13, 1995.
13.
go back to reference Freund, Y., Schapire, R. E., and Abe, N., A short introduction to boosting. Journal-Japanese Society for Artificial Intelligence 14:771–780, 1999. Freund, Y., Schapire, R. E., and Abe, N., A short introduction to boosting. Journal-Japanese Society for Artificial Intelligence 14:771–780, 1999.
14.
go back to reference Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A., A sense of self for unix processes. In Proceedings of Security and Privacy, 1996 I.E. Symposium on 120–128. IEEE, 1996. doi: 10.1109/SECPRI.1996.502675. Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A., A sense of self for unix processes. In Proceedings of Security and Privacy, 1996 I.E. Symposium on 120–128. IEEE, 1996. doi: 10.​1109/​SECPRI.​1996.​502675.
15.
go back to reference Liu, Z., Florez, G., Bridges, S.M., A comparison of input representations in neural networks: a case study in intrusion detection. In Proceedings of the 2002 International Joint Conference on Neural Networks IJCNN’02 2: 1708–1703. IEEE, 2002. doi: 10.1109/IJCNN.2002.1007775. Liu, Z., Florez, G., Bridges, S.M., A comparison of input representations in neural networks: a case study in intrusion detection. In Proceedings of the 2002 International Joint Conference on Neural Networks IJCNN’02 2: 1708–1703. IEEE, 2002. doi: 10.​1109/​IJCNN.​2002.​1007775.
16.
go back to reference Kai-Feng Chiang (2014) On the Study of Energy Profiling and Scheduling on Multi-core Systems. Master’s thesis, National Taichung University of Science and Technology. Kai-Feng Chiang (2014) On the Study of Energy Profiling and Scheduling on Multi-core Systems. Master’s thesis, National Taichung University of Science and Technology.
17.
go back to reference Yaohua Sun, Ting Zhu, Ziguo Zhong, Tian He (2009, November) Energy profiling for mPlatform. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems 407–408. ACM. doi: 10.1145/1644038.1644125 Yaohua Sun, Ting Zhu, Ziguo Zhong, Tian He (2009, November) Energy profiling for mPlatform. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems 407–408. ACM. doi: 10.​1145/​1644038.​1644125
18.
go back to reference Brooks, D., Tiwari, V., Martonosi, M., Wattch: a framework for architectural-level power analysis and optimizations. In Proceedings of the 27th annual international symposium on Computer architecture 28:(2) 83–94. ACM, 2000. doi: 10.1145/342001.339657. Brooks, D., Tiwari, V., Martonosi, M., Wattch: a framework for architectural-level power analysis and optimizations. In Proceedings of the 27th annual international symposium on Computer architecture 28:(2) 83–94. ACM, 2000. doi: 10.​1145/​342001.​339657.
19.
20.
go back to reference Jung, W., Kang, C., Yoon, C., Kim, D., Cha, H. DevScope: a nonintrusive and online power analysis tool for smartphone hardware components. In Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis 353–362. ACM, 2012. doi: 10.1145/2380445.2380502. Jung, W., Kang, C., Yoon, C., Kim, D., Cha, H. DevScope: a nonintrusive and online power analysis tool for smartphone hardware components. In Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis 353–362. ACM, 2012. doi: 10.​1145/​2380445.​2380502.
21.
go back to reference Qu, G., Kawabe, N., Usami, K., Potkonjak, M., Function-level power estimation methodology for microprocessors. In Proceedings of the 37th Annual Design Automation Conference 810–813. ACM, 2000. doi: 10.1145/337292.337786. Qu, G., Kawabe, N., Usami, K., Potkonjak, M., Function-level power estimation methodology for microprocessors. In Proceedings of the 37th Annual Design Automation Conference 810–813. ACM, 2000. doi: 10.​1145/​337292.​337786.
22.
go back to reference Shin, I., Easwaran, A., Lee, I., Hierarchical scheduling framework for virtual clustering of multiprocessors. In Real-Time Systems, 2008. ECRTS’08. Euromicro Conference on 181–190. IEEE, 2008. doi: 10.1109/ECRTS.2008.28. Shin, I., Easwaran, A., Lee, I., Hierarchical scheduling framework for virtual clustering of multiprocessors. In Real-Time Systems, 2008. ECRTS’08. Euromicro Conference on 181–190. IEEE, 2008. doi: 10.​1109/​ECRTS.​2008.​28.
23.
go back to reference Tiwari, V., Malik, S., and Wolfe, A., Power analysis of embedded software: a first step towards software power minimization. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2(4):437–445, 1994. doi:10.1109/92.335012.CrossRef Tiwari, V., Malik, S., and Wolfe, A., Power analysis of embedded software: a first step towards software power minimization. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2(4):437–445, 1994. doi:10.​1109/​92.​335012.CrossRef
24.
25.
go back to reference Tongaonkar, A., et al., Towards self adaptive network traffic classification. Computer Communications 56:35–46, 2015.CrossRef Tongaonkar, A., et al., Towards self adaptive network traffic classification. Computer Communications 56:35–46, 2015.CrossRef
26.
go back to reference Salah, K., et al., On Linux starvation of CPU-bound processes in the presence of network I/O. Computers & Electrical Engineering 37(6):1090–1105, 2011.CrossRef Salah, K., et al., On Linux starvation of CPU-bound processes in the presence of network I/O. Computers & Electrical Engineering 37(6):1090–1105, 2011.CrossRef
27.
go back to reference Montoya, F. G., et al., Comparative analysis of power variables in high performance embedded and x86 architectures using GNU/Linux. Computers & Electrical Engineering 37(4):541–549, 2011.CrossRef Montoya, F. G., et al., Comparative analysis of power variables in high performance embedded and x86 architectures using GNU/Linux. Computers & Electrical Engineering 37(4):541–549, 2011.CrossRef
28.
go back to reference Krenick, T., and Fabian, S., Data acquisition system for diagnostics of manufacturing system operational states. Annals of Faculty of Engineering Hunedoara Journal of Engineering 7(1):211–214, 2009. Krenick, T., and Fabian, S., Data acquisition system for diagnostics of manufacturing system operational states. Annals of Faculty of Engineering Hunedoara Journal of Engineering 7(1):211–214, 2009.
29.
go back to reference Bishop, R.H., Learning with labview. Prentice Hall, 2014. ISBN: 9780134022123. Bishop, R.H., Learning with labview. Prentice Hall, 2014. ISBN: 9780134022123.
30.
go back to reference Love, R., Linux kernel development. Pearson Education, 2010. Love, R., Linux kernel development. Pearson Education, 2010.
32.
go back to reference Yuan, F., Huanrui, W., Ge Y., Web users’ classification using fuzzy neural network. Knowledge-Based Intelligent Information and Engineering Systems 2313: 1030–1036. Springer Berlin Heidelberg,2004. doi: 10.1007/978-3-540-30132-5_139. Yuan, F., Huanrui, W., Ge Y., Web users’ classification using fuzzy neural network. Knowledge-Based Intelligent Information and Engineering Systems 2313: 10301036. Springer Berlin Heidelberg,2004. doi: 10.​1007/​978-3-540-30132-5_​139.
34.
go back to reference Carroll, A., Heiser, G., The systems hacker’s guide to the galaxy energy usage in a modern smartphone. Proceedings of the 4th Asia-Pacific Workshop on Systems. ACM, 2013. Carroll, A., Heiser, G., The systems hacker’s guide to the galaxy energy usage in a modern smartphone. Proceedings of the 4th Asia-Pacific Workshop on Systems. ACM, 2013.
35.
go back to reference Krenick, T., and Fabian, S., Data acquisition system for diagnostics of manufacturing system operational states. Annals of Faculty of Engineering Hunedoara 7(1):211–214, 2009. Krenick, T., and Fabian, S., Data acquisition system for diagnostics of manufacturing system operational states. Annals of Faculty of Engineering Hunedoara 7(1):211–214, 2009.
Metadata
Title
A Machine Learning Method for Power Prediction on the Mobile Devices
Authors
Da-Ren Chen
You-Shyang Chen
Lin-Chih Chen
Ming-Yang Hsu
Kai-Feng Chiang
Publication date
01-10-2015
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 10/2015
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-015-0320-5

Other articles of this Issue 10/2015

Journal of Medical Systems 10/2015 Go to the issue