學術產出-學位論文
文章檢視/開啟
書目匯出
-
題名 Gnafuy : 基於行動裝置下的分散式運算研究
Gnafuy : a framework for ubiquitous mobile computation作者 陳晉杰
Chen, Jin Jie貢獻者 郁方
Fang, Yu
陳晉杰
Chen, Jin Jie關鍵詞 行動運算
雲端運算
分散式運算
群眾外包
Mobile computing
Cloud computing
Distributed computing
Crowdsourcing日期 2016 上傳時間 3-十月-2016 14:27:37 (UTC+8) 摘要 隨著科技日新月異的發展,智慧型手機本身通訊與運算能力也隨著軟體和硬體的改善而不斷地增強,其便利性與高機動性的特色使得越來越多人持有智慧型手機,最後成為人們生活中不可或缺的部份。總觀來說,持有與使用率的上升,不知不覺的形成一種共享經濟與無所不在的行動運算網絡。基於普及性與相對優秀的運算效能,我們設計與實作出Gnafuy,一個基於行動裝置下的分散式運算框架,希望借用世界上所有閒置行動運算裝置的資源來實行無所不在的運算。我們發展出一套應用程式介面(API)供開發者依照自己的需求來撰寫自己的分散式運算程式,藉由遵循Gnafuy所制定的應用程式介面,開發者可只專注在演算法本身的開發,而不需要在意其演算法如何被分配到手機上以及待處理資料的分配情形。本篇文章還討論了Gnafuy所採用的分散式運算的程式模型,以及我們如何藉由一個手機應用程式將任務部署至自願者的智慧型手機中,我們發展出一套伺服器端的機制來增加訊息傳遞的成功率,以及偵測計算後回傳結果是否正確,排除被惡意程式污染的客戶端結果。 參考文獻 [1] gApache Hadoop.h http://hadoop.apache.org/. (Visited on 02/16/2016).[2] M. Zaharia, M. Chowdhury, M. J. Franklin, S. Shenker, and I. Stoica, gSpark: Cluster Computing with Working Sets.,h[3] M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. J. Franklin,S. Shenker, and I. Stoica, gResilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing,h in Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, pp. 22, USENIX Association, 2012.[4] A. Thusoo, J. S. Sarma, N. Jain, Z. Shao, P. Chakka, N. Zhang, S. Antony, H. Liu, and R. Murthy, gHive-a petabyte scale data warehouse using hadoop,h in Data Engineering (ICDE), 2010 IEEE 26th International Conference on, pp. 9961005, IEEE, 2010.[5] Y. Yu, M. Isard, D. Fetterly, M. Budiu, U. Erlingsson, P. K. Gunda, and J. Currey, gDryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language.,h in OSDI, vol. 8, pp. 114, 2008. 25[6] gDashboards.h http://developer.android.com/about/dashboards/index.html, 2015. Online; Accessed 4 January 2015.[7] gCompare iPhone models..h http://www.apple.com/in/iphone/compare. Online; Accessed 4 January 2015.[8] L. Yang, J. Cao, Y. Yuan, T. Li, A. Han, and A. Chan, gA framework for partitioning and execution of data stream applications in mobile cloud computing,h ACM SIGMETRICS Performance Evaluation Review, vol. 40, no. 4, pp. 2332, 2013.[9] G. Huerta-Canepa and D. Lee, gA virtual cloud computing provider for mobile devices,h in Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, p. 6, ACM, 2010.[10] J. H. Christensen, gUsing restful web-services and cloud computing to create next generation mobile applications,h in Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications, pp. 627634, ACM, 2009.[11] E. E. Marinelli, gHyrax: cloud computing on mobile devices using MapReduce,h tech. rep., DTIC Document, 2009.[12] N. Palmer, R. Kemp, T. Kielmann, and H. Bal, gIbis for mobility: solving challenges of mobile computing using grid techniques,h in Proceedings of the 10th workshop on Mobile Computing Systems and Applications, p. 17, ACM, 2009.[13] gSelenium - web browser automation.h http://www.seleniumhq.org/. (Accessed on 02/22/2016).[14] P. J. Boland, gMajority systems and the condorcet jury theorem,h The Statistician, pp. 181189, 1989. 26[15] gOn Distinguishing between Reliable and Unreliable Sensors Without a Knowledge of the Ground Truth (2015), author=Yazidi Anis, Oommen John and Goodwin Morten, year=2015,h[16] J. Dean and S. Ghemawat, gMapReduce: simplified data processing on large clusters,h Communications of the ACM, vol. 51, no. 1, pp. 107113, 2008.[17] gApache phoenix.h https://phoenix.apache.org/. (Visited on 06/13/2016).[18] gThe Scala Programming Language.h http://www.scala-lang.org/. (Visited on 02/17/2016).[19] M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly, gDryad: distributed dataparallel programs from sequential building blocks,h in ACM SIGOPS Operating Systems Review, vol. 41, pp. 5972, ACM, 2007.[20] N. Fernando, S. W. Loke, and W. Rahayu, gMobile cloud computing: A survey,h Future Generation Computer Systems, vol. 29, no. 1, pp. 84106, 2013.[21] D. P. Anderson, gBoinc: A system for public-resource computing and storage,h in Grid Computing, 2004. Proceedings. Fifth IEEE/ACM International Workshop on, pp. 410, IEEE, 2004.[22] D. P. Anderson, J. Cobb, E. Korpela, M. Lebofsky, and D.Werthimer, gSETI@ home: an experiment in public-resource computing,h Communications of the ACM, vol. 45, no. 11, pp. 5661, 2002.[23] gRosetta@home.h https://boinc.bakerlab.org/. (Visited on 02/18/2016).[24] C. Shi, V. Lakafosis, M. H. Ammar, and E. W. Zegura, gSerendipity: enabling remote computing among intermittently connected mobile devices,h in Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing, pp. 145154, ACM, 2012. 27[25] S. Buchegger and J.-Y. Le Boudec, gA robust reputation system for peer-to-peer and mobile ad-hoc networks,h in P2PEcon 2004, no. LCA-CONF-2004-009, 2004.[26] C. Dellarocas, gImmunizing online reputation reporting systems against unfair ratings and discriminatory behavior,h in Proceedings of the 2nd ACM conference on Electronic commerce, pp. 150157, ACM, 2000.[27] S. Sen and N. Sajja, gRobustness of reputation-based trust: Boolean case,h in Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1, pp. 288293, ACM, 2002.[28] gAkka.h http://akka.io/. (Visited on 02/17/2016).[29] gspray | rest/http for your akka/scala actors.h http://spray.io/. (Visited on 02/17/2016).[30] gRabbitMQ - Messaging that just works.h https://www.rabbitmq.com/. (Accessed on 02/22/2016).[31] gHow to Run Node.js with Express on Mobile Devices.h http://www.sitepoint. com/how-to-run-node-js-with-express-on-mobile-devices/. (Accessed on 02/22/2016).[32] gAndroid Permission.h https://developer.android.com/reference/android/ Manifest.permission.html. Online; Accessed 4 May 2016.[33] gGoogle reCAPTCHA.h https://www.google.com/recaptcha/intro/index.html. (Accessed on 04/22/2016).[34] A. Kirsch and M. Mitzenmacher, gLess hashing, same performance: Building a better bloom filter,h in AlgorithmsESA 2006, pp. 456467, Springer, 2006.[35] L. K. Yan and H. Yin, gDroidscope: seamlessly reconstructing the os and dalviksemantic views for dynamic android malware analysis,h in Presented as part of the21st USENIX Security Symposium (USENIX Security 12), pp. 569584, 2012. 描述 碩士
國立政治大學
資訊管理學系
103356039資料來源 http://thesis.lib.nccu.edu.tw/record/#G0103356039 資料類型 thesis dc.contributor.advisor 郁方 zh_TW dc.contributor.advisor Fang, Yu en_US dc.contributor.author (作者) 陳晉杰 zh_TW dc.contributor.author (作者) Chen, Jin Jie en_US dc.creator (作者) 陳晉杰 zh_TW dc.creator (作者) Chen, Jin Jie en_US dc.date (日期) 2016 en_US dc.date.accessioned 3-十月-2016 14:27:37 (UTC+8) - dc.date.available 3-十月-2016 14:27:37 (UTC+8) - dc.date.issued (上傳時間) 3-十月-2016 14:27:37 (UTC+8) - dc.identifier (其他 識別碼) G0103356039 en_US dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/102498 - dc.description (描述) 碩士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 資訊管理學系 zh_TW dc.description (描述) 103356039 zh_TW dc.description.abstract (摘要) 隨著科技日新月異的發展,智慧型手機本身通訊與運算能力也隨著軟體和硬體的改善而不斷地增強,其便利性與高機動性的特色使得越來越多人持有智慧型手機,最後成為人們生活中不可或缺的部份。總觀來說,持有與使用率的上升,不知不覺的形成一種共享經濟與無所不在的行動運算網絡。基於普及性與相對優秀的運算效能,我們設計與實作出Gnafuy,一個基於行動裝置下的分散式運算框架,希望借用世界上所有閒置行動運算裝置的資源來實行無所不在的運算。我們發展出一套應用程式介面(API)供開發者依照自己的需求來撰寫自己的分散式運算程式,藉由遵循Gnafuy所制定的應用程式介面,開發者可只專注在演算法本身的開發,而不需要在意其演算法如何被分配到手機上以及待處理資料的分配情形。本篇文章還討論了Gnafuy所採用的分散式運算的程式模型,以及我們如何藉由一個手機應用程式將任務部署至自願者的智慧型手機中,我們發展出一套伺服器端的機制來增加訊息傳遞的成功率,以及偵測計算後回傳結果是否正確,排除被惡意程式污染的客戶端結果。 zh_TW dc.description.tableofcontents Abstract iContents ii1 Introduction 12 Related Work 23 Overview 44 Programming Model 75 Control Center 105.1 Facade 105.2 Task Manager 115.3 Fault Correction 126 Computing Node 126.1 Job Loading 156.2 States of Computing Node 166.2.1 Library Required 166.2.2 Task Required 166.2.3 Data Required 176.2.4 Stop 176.3 Permissions 177 Experiment 197.1 Citation network 197.2 IP Location Finder 228 Future work 238.1 Security 238.2 Permission control 249 Conclusion 24References 25 zh_TW dc.format.extent 1691745 bytes - dc.format.mimetype application/pdf - dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0103356039 en_US dc.subject (關鍵詞) 行動運算 zh_TW dc.subject (關鍵詞) 雲端運算 zh_TW dc.subject (關鍵詞) 分散式運算 zh_TW dc.subject (關鍵詞) 群眾外包 zh_TW dc.subject (關鍵詞) Mobile computing en_US dc.subject (關鍵詞) Cloud computing en_US dc.subject (關鍵詞) Distributed computing en_US dc.subject (關鍵詞) Crowdsourcing en_US dc.title (題名) Gnafuy : 基於行動裝置下的分散式運算研究 zh_TW dc.title (題名) Gnafuy : a framework for ubiquitous mobile computation en_US dc.type (資料類型) thesis en_US dc.relation.reference (參考文獻) [1] gApache Hadoop.h http://hadoop.apache.org/. (Visited on 02/16/2016).[2] M. Zaharia, M. Chowdhury, M. J. Franklin, S. Shenker, and I. Stoica, gSpark: Cluster Computing with Working Sets.,h[3] M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. J. Franklin,S. Shenker, and I. Stoica, gResilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing,h in Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, pp. 22, USENIX Association, 2012.[4] A. Thusoo, J. S. Sarma, N. Jain, Z. Shao, P. Chakka, N. Zhang, S. Antony, H. Liu, and R. Murthy, gHive-a petabyte scale data warehouse using hadoop,h in Data Engineering (ICDE), 2010 IEEE 26th International Conference on, pp. 9961005, IEEE, 2010.[5] Y. Yu, M. Isard, D. Fetterly, M. Budiu, U. Erlingsson, P. K. Gunda, and J. Currey, gDryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language.,h in OSDI, vol. 8, pp. 114, 2008. 25[6] gDashboards.h http://developer.android.com/about/dashboards/index.html, 2015. Online; Accessed 4 January 2015.[7] gCompare iPhone models..h http://www.apple.com/in/iphone/compare. Online; Accessed 4 January 2015.[8] L. Yang, J. Cao, Y. Yuan, T. Li, A. Han, and A. Chan, gA framework for partitioning and execution of data stream applications in mobile cloud computing,h ACM SIGMETRICS Performance Evaluation Review, vol. 40, no. 4, pp. 2332, 2013.[9] G. Huerta-Canepa and D. Lee, gA virtual cloud computing provider for mobile devices,h in Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, p. 6, ACM, 2010.[10] J. H. Christensen, gUsing restful web-services and cloud computing to create next generation mobile applications,h in Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications, pp. 627634, ACM, 2009.[11] E. E. Marinelli, gHyrax: cloud computing on mobile devices using MapReduce,h tech. rep., DTIC Document, 2009.[12] N. Palmer, R. Kemp, T. Kielmann, and H. Bal, gIbis for mobility: solving challenges of mobile computing using grid techniques,h in Proceedings of the 10th workshop on Mobile Computing Systems and Applications, p. 17, ACM, 2009.[13] gSelenium - web browser automation.h http://www.seleniumhq.org/. (Accessed on 02/22/2016).[14] P. J. Boland, gMajority systems and the condorcet jury theorem,h The Statistician, pp. 181189, 1989. 26[15] gOn Distinguishing between Reliable and Unreliable Sensors Without a Knowledge of the Ground Truth (2015), author=Yazidi Anis, Oommen John and Goodwin Morten, year=2015,h[16] J. Dean and S. Ghemawat, gMapReduce: simplified data processing on large clusters,h Communications of the ACM, vol. 51, no. 1, pp. 107113, 2008.[17] gApache phoenix.h https://phoenix.apache.org/. (Visited on 06/13/2016).[18] gThe Scala Programming Language.h http://www.scala-lang.org/. (Visited on 02/17/2016).[19] M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly, gDryad: distributed dataparallel programs from sequential building blocks,h in ACM SIGOPS Operating Systems Review, vol. 41, pp. 5972, ACM, 2007.[20] N. Fernando, S. W. Loke, and W. Rahayu, gMobile cloud computing: A survey,h Future Generation Computer Systems, vol. 29, no. 1, pp. 84106, 2013.[21] D. P. Anderson, gBoinc: A system for public-resource computing and storage,h in Grid Computing, 2004. Proceedings. Fifth IEEE/ACM International Workshop on, pp. 410, IEEE, 2004.[22] D. P. Anderson, J. Cobb, E. Korpela, M. Lebofsky, and D.Werthimer, gSETI@ home: an experiment in public-resource computing,h Communications of the ACM, vol. 45, no. 11, pp. 5661, 2002.[23] gRosetta@home.h https://boinc.bakerlab.org/. (Visited on 02/18/2016).[24] C. Shi, V. Lakafosis, M. H. Ammar, and E. W. Zegura, gSerendipity: enabling remote computing among intermittently connected mobile devices,h in Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing, pp. 145154, ACM, 2012. 27[25] S. Buchegger and J.-Y. Le Boudec, gA robust reputation system for peer-to-peer and mobile ad-hoc networks,h in P2PEcon 2004, no. LCA-CONF-2004-009, 2004.[26] C. Dellarocas, gImmunizing online reputation reporting systems against unfair ratings and discriminatory behavior,h in Proceedings of the 2nd ACM conference on Electronic commerce, pp. 150157, ACM, 2000.[27] S. Sen and N. Sajja, gRobustness of reputation-based trust: Boolean case,h in Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1, pp. 288293, ACM, 2002.[28] gAkka.h http://akka.io/. (Visited on 02/17/2016).[29] gspray | rest/http for your akka/scala actors.h http://spray.io/. (Visited on 02/17/2016).[30] gRabbitMQ - Messaging that just works.h https://www.rabbitmq.com/. (Accessed on 02/22/2016).[31] gHow to Run Node.js with Express on Mobile Devices.h http://www.sitepoint. com/how-to-run-node-js-with-express-on-mobile-devices/. (Accessed on 02/22/2016).[32] gAndroid Permission.h https://developer.android.com/reference/android/ Manifest.permission.html. Online; Accessed 4 May 2016.[33] gGoogle reCAPTCHA.h https://www.google.com/recaptcha/intro/index.html. (Accessed on 04/22/2016).[34] A. Kirsch and M. Mitzenmacher, gLess hashing, same performance: Building a better bloom filter,h in AlgorithmsESA 2006, pp. 456467, Springer, 2006.[35] L. K. Yan and H. Yin, gDroidscope: seamlessly reconstructing the os and dalviksemantic views for dynamic android malware analysis,h in Presented as part of the21st USENIX Security Symposium (USENIX Security 12), pp. 569584, 2012. zh_TW