Abstract
Energy profiling and estimation have been popular areas of research in multicore mobile architectures. While short sequences of system calls have been recognized by machine learning as pattern descriptions for anomalous detection, power consumption of running processes with respect to system-call patterns are not well studied. In this paper, we propose a fuzzy neural network (FNN) for training and analyzing process execution behaviour with respect to series of system calls, parameters and their power consumptions. On the basis of the patterns of a series of system calls, we develop a power estimation daemon (PED) to analyze and predict the energy consumption of the running process. In the initial stage, PED categorizes sequences of system calls as functional groups and predicts their energy consumptions by FNN. In the operational stage, PED is applied to identify the predefined sequences of system calls invoked by running processes and estimates their energy consumption.
Similar content being viewed by others
References
Dong, W., et al., Enabling efficient reprogramming through reduction of executable modules in networked embedded systems. Ad Hoc Networks 11(1):473–489, 2013.
Alonso, R. S., et al., Implementing a hardware-embedded reactive agents platform based on a service-oriented architecture over heterogeneous wireless sensor networks. Ad Hoc Networks 11.1:151–166, 2013.
Severini, M., et al., Energy-Aware task scheduler for self-powered sensor nodes: From model to firmware. Ad Hoc Networks 24:73–91, 2015.
Huang, K. L., Kanhere, S. S., and Wen, H., On the need for a reputation system in mobile phone based sensing. Ad Hoc Networks 12:130–149, 2014.
Spanos, S., Meliones, A., and Stassinopoulos, G., The internals of advanced interrupt handling techniques: Performance optimization of an embedded Linux network interface. Computer Communications 31.14:3460–3468, 2008.
Trifunovic, S., et al., WLAN-Opp: Ad-hoc-less opportunistic networking on smartphones. Ad Hoc Networks 25:346–358, 2015.
Flinn, J., Satyanarayanan, M., Powerscope: a tool for profiling the energy usage of mobile applications. In Proceedings of Mobile Computing Systems and Applications, 1999. Second IEEE Workshop on 2–10. IEEE, 1999. doi: 10.1109/MCSA.1999.749272.
Wang, G., Hao, J., Ma, J., and Huang, L., A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Systems with Applications 37(9):6225–6232, 2010. doi:10.1016/j.eswa.2010.02.102.
Han, S.-J., and Cho, S.-B., Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 36(3):559–570, 2005. doi:10.1109/TSMCB.2005.860136.
Zhang, G., Sun, J., Applying fuzzy neural network to intrusion detection based on sequences of system calls. In Proceedings of first international conference Advanced Data Mining and Applications 3584: 483–490. Springer Berlin Heidelberg, 2005. doi: 10.1007/11527503_58.
Fullér, R., Neural fuzzy systems. 1995: 13, 1995.
Mashable GlobalWebIndex, The 10 most frequently used smartphone apps http://mashable.com/2013/08/05/most-used-smartphone-apps/, Q2, 2003.
Freund, Y., Schapire, R. E., and Abe, N., A short introduction to boosting. Journal-Japanese Society for Artificial Intelligence 14:771–780, 1999.
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A., A sense of self for unix processes. In Proceedings of Security and Privacy, 1996 I.E. Symposium on 120–128. IEEE, 1996. doi: 10.1109/SECPRI.1996.502675.
Liu, Z., Florez, G., Bridges, S.M., A comparison of input representations in neural networks: a case study in intrusion detection. In Proceedings of the 2002 International Joint Conference on Neural Networks IJCNN’02 2: 1708–1703. IEEE, 2002. doi: 10.1109/IJCNN.2002.1007775.
Kai-Feng Chiang (2014) On the Study of Energy Profiling and Scheduling on Multi-core Systems. Master’s thesis, National Taichung University of Science and Technology.
Yaohua Sun, Ting Zhu, Ziguo Zhong, Tian He (2009, November) Energy profiling for mPlatform. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems 407–408. ACM. doi: 10.1145/1644038.1644125
Brooks, D., Tiwari, V., Martonosi, M., Wattch: a framework for architectural-level power analysis and optimizations. In Proceedings of the 27th annual international symposium on Computer architecture 28:(2) 83–94. ACM, 2000. doi: 10.1145/342001.339657.
Burger, D., Austin, T.M., The SimpleScalar tool set, version 2.0. ACM SIGARCH Computer Architecture News 25:(3) 13–25. ACM, 1997. doi: 10.1145/268806.268810.
Jung, W., Kang, C., Yoon, C., Kim, D., Cha, H. DevScope: a nonintrusive and online power analysis tool for smartphone hardware components. In Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis 353–362. ACM, 2012. doi: 10.1145/2380445.2380502.
Qu, G., Kawabe, N., Usami, K., Potkonjak, M., Function-level power estimation methodology for microprocessors. In Proceedings of the 37th Annual Design Automation Conference 810–813. ACM, 2000. doi: 10.1145/337292.337786.
Shin, I., Easwaran, A., Lee, I., Hierarchical scheduling framework for virtual clustering of multiprocessors. In Real-Time Systems, 2008. ECRTS’08. Euromicro Conference on 181–190. IEEE, 2008. doi: 10.1109/ECRTS.2008.28.
Tiwari, V., Malik, S., and Wolfe, A., Power analysis of embedded software: a first step towards software power minimization. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2(4):437–445, 1994. doi:10.1109/92.335012.
Tsao, S.-L., and Chen, J. J., SEProf: A high-level software energy profiling tool for an embedded processor enabling power management functions. Journal of Systems and Software 85(8):1757–1769, 2012. doi:10.1016/j.jss.2012.03.027.
Tongaonkar, A., et al., Towards self adaptive network traffic classification. Computer Communications 56:35–46, 2015.
Salah, K., et al., On Linux starvation of CPU-bound processes in the presence of network I/O. Computers & Electrical Engineering 37(6):1090–1105, 2011.
Montoya, F. G., et al., Comparative analysis of power variables in high performance embedded and x86 architectures using GNU/Linux. Computers & Electrical Engineering 37(4):541–549, 2011.
Krenick, T., and Fabian, S., Data acquisition system for diagnostics of manufacturing system operational states. Annals of Faculty of Engineering Hunedoara Journal of Engineering 7(1):211–214, 2009.
Bishop, R.H., Learning with labview. Prentice Hall, 2014. ISBN: 9780134022123.
Love, R., Linux kernel development. Pearson Education, 2010.
Chen, D.-R., and Chiang, K.-F., Cloud-based power estimation and power-aware scheduling for embedded systems. Accepted, Computers & Electrical Engineering, 2015. doi:10.1016/j.compeleceng.2015.06.004.
Yuan, F., Huanrui, W., Ge Y., Web users’ classification using fuzzy neural network. Knowledge-Based Intelligent Information and Engineering Systems 2313: 1030–1036. Springer Berlin Heidelberg,2004. doi: 10.1007/978-3-540-30132-5_139.
Lee, W., Salvatore, S.J., Data mining approaches for intrusion detection. In Proceedings of the 7th USENIX Security Symposium, 1998. https://www.usenix.org/legacy/publications /library/proceedings/sec98/full_papers/full_papers/lee/lee_html/lee.html.
Carroll, A., Heiser, G., The systems hacker’s guide to the galaxy energy usage in a modern smartphone. Proceedings of the 4th Asia-Pacific Workshop on Systems. ACM, 2013.
Krenick, T., and Fabian, S., Data acquisition system for diagnostics of manufacturing system operational states. Annals of Faculty of Engineering Hunedoara 7(1):211–214, 2009.
Acknowledgments
This work was supported in part by the Ministry of Science and Technology of the Republic of China under grant MOST 102-2221-E-025-003 and MOST 104-2221-E-025-002.
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical Collection on Mobile Systems.
Rights and permissions
About this article
Cite this article
Chen, DR., Chen, YS., Chen, LC. et al. A Machine Learning Method for Power Prediction on the Mobile Devices. J Med Syst 39, 126 (2015). https://doi.org/10.1007/s10916-015-0320-5
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-015-0320-5