Parallel Architectures, Algorithms and Programming: 10th International Symposium, PAAP 2019, Guangzhou, China, December 12–14, 2019, Revised Selected ... in Computer and Information Science) 9789811527661, 9789811527678, 9811527660

This book constitutes the refereed proceedings of the 10th International Symposium on Parallel Architectures, Algorithms

127 12 30MB

English Pages 572 [563]

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Preface
Organization
Contents
Architectures
On a Coexisting Scheme for Multiple Flows in Multi-radio Multi-channel Wireless Mesh Networks
1 Introduction
2 Related Work
3 Multi-flow Coexistence
3.1 Model for Coexisting Links
3.2 The Link Coexistence Algorithm
4 Performance Evaluation
5 Conclusion
References
Non-linear K-Barrier Coverage in Mobile Sensor Network
1 Introduction
2 Related Work
3 Network Model
4 Forming One Sub-barrier
4.1 Flattening Algorithm
4.2 The Algorithm of Forming One Sub-barrier
5 Forming K-Barrier Algorithm
6 Simulation Results
7 Conclusion
References
Interrupt Responsive Spinlock Mechanism Based on MCS for Multi-core RTOS
1 Introduction
2 Related Work
3 IRS Mechanism
3.1 Real-Time Analysis
3.2 Interrupt Responsive Spinlock
4 Implementation of MCS-IRS
4.1 State Transitions of MCS-IRS
4.2 State Transitions in Interrupt Handling
5 Experiment Analysis
5.1 Design of Experiments
5.2 Worst-Case Interrupt Disable Time
5.3 Worst-Case Interrupt Response Latency
6 Conclusion
References
A Novel Speedup Evaluation for Multicore Architecture Based Topology of On-Chip Memory
1 Introduction and Motivation
2 Related Work
3 Principle of ETOM Evaluation
3.1 The Limitations and Assumptions
3.2 Computing the Speedups
4 An Application Instantiation of ETOM
4.1 Enlightenments from ETOM
4.2 The Preferred Multi-core Architecture, TriBA
4.3 The ETOM Speedup of TriBA
5 Conclusion
References
Improving the Performance of Collective Communication for the On-Chip Network
1 Introduction
2 Related Works
3 Hierarchy Self Similar Cubic Network
3.1 Self Similar Cubic Network
3.2 Hierarchy Self Similar Cubic on-Chip Network
4 HSSC Transmission Mechanisms
4.1 High-Performance Transmission Mechanisms
4.2 Packet Analysis and Decision Mechanism
5 Experiment Results
5.1 Experimental Environment
5.2 The Performance of HSSC On-Chip Network
6 Conclusions
References
A Survey of Multicast Communication in Optical Network-on-Chip (ONoC)
1 Introduction
2 Architecture Design
2.1 All-Optical ONoC
2.2 Hybrid Electrical-Optical ONoC
2.3 3D ONoC
3 Networking Design
3.1 Design for a Single Multicast
3.2 Design for Multiple Multicasts
4 Design Challenges and Future Work
4.1 Design Challenges
4.2 Future Directions
5 Conclusion
References
Virtual Network Embedding Based on Core and Coritivity of Graph
1 Introduction
2 Model and Problem Description
2.1 Substrate Network and Virtual Network Request
2.2 Description of the VNE Problem
3 Core and Coritivity of Graph
4 Algorithm
4.1 The Main Algorithm
4.2 Calculation of the Continuous Branch Number
4.3 Optimization of BCVNE Algorithm
5 Evaluation
5.1 Evaluation Setting
5.2 Compared Algorithms
5.3 Evaluation Results
6 Conclusion
References
Non-time-Sharing Full-Duplex SWIPT Relay System with Energy Access Point
1 Introduction
2 System Model
3 Problem Description
4 Contrast System
4.1 Half-Duplex Relay System with SWIPT (HD-SWIPT)
4.2 Traditional Full-Duplex Relay System Without SWIPT (FD-no-SWIPT)
5 Simulation Results
6 Conclusion
References
Recent Developments in Content Delivery Network: A Survey
1 Introduction
2 Cache Strategy
2.1 Centrality-Measures Based Algorithm
2.2 Cooperative Caching
2.3 Mobile Edge Caching
3 The Cost of CDN
3.1 The Energy Consumption Cost of CDN
3.2 The Delivery Cost and Storage Cost of CDN
4 Conclusion
References
High Performance Systems
Weighted Mean Deviation Similarity Index for Objective Omnidirectional Video Quality Assessment
1 Introduction
2 Related Work
2.1 Video Quality Assessment on Omnidirectional Video
2.2 SSIM and MDSI on 2D Image
3 Proposed Method
3.1 Weighted Mean Deviation Similarity Index
3.2 Investigated Temporal Sampling on Objective Omnidirectional VQA
4 Experimental Results
4.1 Omnidirectional Video Quality Assessment Database
4.2 Performance Evaluation
4.3 Influence of Temporal Sampling on Objective Omnidirectional VQA
5 Conclusion
References
Tire X-ray Image Defects Detection Based on Adaptive Thresholding Method
1 Introduction
2 Related Work
2.1 Tire X-ray Image Segmentation
2.2 Adaptive Threshold Binarization
2.3 Morphology Open/Close Operations
2.4 Image Thinning Algorithm
3 Proposed Algorithms and Implementation Details
3.1 Column Based Adaptive Threshold Binarization Algorithm
3.2 Texture Feature Based Segmentation Algorithm
3.3 A Thin Line Detection Algorithm
3.4 Implementation Details
4 Experiments
4.1 Data
4.2 Experimental Details
4.3 Test Results and Analysis
5 Conclusion
References
Halftone Image Reconstruction Based on SLIC Superpixel Algorithm
1 Introduction
2 Inverse Halftonging Algorithm
3 Image Segmentation Based on SLIC
4 Affinity Propagation Algorithm
5 Image Reconstruction
6 Conclusions
References
Study on the Method of Extracting Diabetes History from Unstructured Chinese Electronic Medical Record
1 Background
2 Data Description and Problem Definition
2.1 Data Description
2.2 Problem Definition
3 Methods and Steps
3.1 Establishment of Customized Corpus
3.2 Analysis of Annotation Results and Discovery of Medical History Description Rules
3.3 Medical History Information Extraction Based on Rule Base
3.4 Negation Detection
4 Result Analysis and Verification
References
Deep Residual Optimization for Stereoscopic Image Color Correction
1 Introduction
2 Related Work
3 Proposed Method
3.1 Result Initialization
3.2 Optimization Network
3.3 Loss Function
4 Experiment
5 Conclusion
References
Old Man Fall Detection Based on Surveillance Video Object Tracking
1 Introduction
2 Object Detection and Object Tracking Algorithm
2.1 Object Detection
2.2 Object Tracking
3 Fall Detection Method Design
3.1 Data Set
3.2 Training
3.3 Object Tracking
4 Experiment
4.1 Fall Detection
4.2 Object Tracking
4.3 Fall Video Detection
4.4 Evaluation of Experimental Results
5 Conclusion
References
Electric Bicycle Violation Automatic Detection in Unconstrained Scenarios
1 Introduction
2 Related Technologies
3 Violation Detection Process
4 Experiment and Result Analysis
4.1 Dataset
4.2 Training
4.3 Detection
4.4 Recognition of License Plate Number
5 Conclusion
References
Building a Lightweight Container-Based Experimental Platform for HPC Education
1 Introduction
2 Major Techniques
2.1 Docker
2.2 Guacamole
3 System Design
4 System Implementation
5 System Deployment and Evaluation
6 Conclusion
References
Automatic Generation and Assessment of Student Assignments for Parallel Programming Learning
1 Introduction
2 System Design
2.1 User Manager Module
2.2 Student Module
2.3 Teacher Module
2.4 Automatic Assessment Module
3 System Implementation
3.1 Design of Question Database
3.2 Question Generation and Assessment
4 System Deployment and Evaluation
5 Conclusion
References
HSM2: A Hybrid and Scalable Metadata Management Method in Distributed File Systems
1 Introduction
2 Background and Motivation
2.1 Metadata Management Methods
2.2 Namespace Locality vs. Load Balance
3 HSM2
3.1 Metadata Partitioning
3.2 Metadata Indexing
3.3 Load Balance
3.4 Downsides
4 Evaluation
4.1 Experiment Setup
4.2 Experimental Results
5 Conclusion
References
Algorithms
Heuristic Load Scheduling Algorithm for Stateful Cloud BPM Engine
1 Introduction
2 Related Work
3 Problem Statement
4 Heuristic Cloud BPMS Engine Load Scheduling Algorithm
4.1 Load Scheduler
4.2 Simple Busyness Prediction
4.3 Formal Definition of Target Problem and Constraints
4.4 Best Fit Decreasing Based on Busyness Metrics Heuristic Algorithm
5 Experimental Design and Results
6 Conclusions and Outlook
References
An Improved Heuristic-Dynamic Programming Algorithm for Rectangular Cutting Problem
1 Introduction
2 Problem Description
3 Algorithm Description
3.1 Basic Definition
3.2 Discretization Sets
3.3 Dynamic Programming
3.4 Algorithm Complexity
4 Calculation Results and Analysis
4.1 International Samples
4.2 Randomly Generated Sample
5 Conclusion
References
Constrained Optimization via Quantum Genetic Algorithm for Task Scheduling Problem
1 Introduction
2 Related Work
3 Problem Formulation
3.1 Task Model
3.2 Heterogeneous Multiprocessor System
4 Proposed Method
4.1 Encoding
4.2 Quantization
4.3 Task Sequence
4.4 Fitness
4.5 Adaptive Penalty Method Quantum Genetic Algorithm
5 Experiment and Discussion
5.1 Simulation and Analyse
6 Conclusion
References
A Method of Business Process Bottleneck Detection
1 Introduction
2 Related Work
2.1 Bottleneck Analysis
2.2 Theory of Constrain
3 Definition and Detection of Bottleneck
3.1 Definitions
3.2 Bottleneck Detection in Business Processes
3.3 Bottleneck Relief Methods
4 Experiment and Result Analysis
4.1 Bottleneck Detection
4.2 Application in Multi-process Environment
5 Conclusion
References
Optimized Layout of the Soil Moisture Sensor in Tea Plantations Based on Improved Dijkstra Algorithm
1 Introduction
2 Dijkstra Algorithm and Sensor Optimization Layout
2.1 Basic Dijkstra Algorithm
2.2 Improving the Dijkstra Algorithm
3 Ant Colony Optimization
3.1 Overview of Ant Colony Optimization
3.2 Basic Principles of Ant Colony Optimization
3.3 Ant Colony Algorithm Applied to Tea Plantation
4 Sensor Optimization Layout Tests
4.1 Source of Test Data
4.2 Test Results
4.3 Analysis and Evaluation of Test Results
5 Summary
References
Efficient Algorithms for Constrained Clustering with Side Information
1 Introduction
1.1 Related Work
1.2 Our Results
1.3 Organization
2 Constrained k-means Clustering Algorithm with Incidental Information
3 Evaluation Approaches
4 Experimental Results
4.1 Experimental Dataset and Processing
4.2 Experimental Specific Results
5 Conclusion
References
Multi-objective Scheduling of Logistics UAVs Based on Simulated Annealing
1 Introduction
2 Related Works and Contributions
3 Problem Description and Model
3.1 Problem Description
4 Proposed Algorithm
4.1 Encoding Method
4.2 Initialization of the Solution
4.3 Local Search Algorithm Framework
4.4 Simulated Annealing Algorithm Framework
5 Simulation Experiments
5.1 Parameter Calibration
5.2 Robustness Analysis
6 Conclusions
References
IFME: Influence Function Based Model Explanation for Black Box Decision Systems
1 Introduction
2 Related Work
2.1 Influence Function
2.2 Prediction Explanation
2.3 Model Explanation
3 Problem Formulation and Preliminaries
3.1 Model Explanation Problem
3.2 Influence Function
3.3 LIME
4 Local Interpretable Prediction Explanation
4.1 Finding the Key Training Points
4.2 Influence Function Based Prediction Explanation
5 Model Explanation
6 Experiments and Results
6.1 Experiment Setup
6.2 Faithfulness of Explanations
7 Conclusion and Future Work
References
GPU-Accelerated Parallel Aligning Long Reads with High Error Rate Using Enhanced Sparse Suffix Array
1 Introduction
2 Method
2.1 Index Construction
2.2 CPU-GPU Parallel Alignment Algorithm
3 Experiment
3.1 Experimental Environment and Data
3.2 Experimental Results
4 Conclusion
References
An Improved Algorithm for Building Suffix Array in External Memory
1 Introduction
2 Preliminaries
3 Reduction Phase of DSA-IS
4 Details of DSA-IS+
4.1 Method A
4.2 Method B
5 Experiments
5.1 Performance Evaluation
5.2 Discussion
6 Conclusion
References
In-Place Suffix Sorting on a Multicore Computer with Better Design
1 Introduction
2 Preliminaries
3 LMS-substring Naming
3.1 Prior Art: pSACAK
3.2 New Proposal: pSACAK+
3.3 Step 1 for Z1
3.4 Step 2 for X1
4 Experiments
4.1 Time and Space
4.2 Time Ratio
5 Conclusion
References
Security and Privacy
Any Privacy Risk if Nobody’s Personal Information Being Collected?
1 Introduction
2 Related Work
3 Problem Description
3.1 A Common Scenario of Privacy Risk
3.2 Problem Definition
3.3 Evaluation Metric
4 Learning Scheme
4.1 Basic Idea
4.2 Knowledge Module
4.3 Learning Module
4.4 Availability of UTLS
5 Experiment and Evaluation
5.1 Data Description
5.2 UTLS Process
5.3 Experiment Evaluation
6 Conclusions
References
Blockchain-Based Access Control Schemes for Medical Image Analysis System
1 Introduction
2 System Model
2.1 Deep Learning for Data Cleaning and Classification
3 Proposed Scheme
3.1 Data Cleaning
3.2 Classification
3.3 Security Analysis
4 Experiments and Comparisons
4.1 Running Time Based Comparisons in CL-PKE and CL-PKS
4.2 Experiments of DR Classification
5 Conclusion
References
Research on DDoS Abnormal Traffic Detection Under SDN Network
1 Introduction
1.1 Research Background and Significance
1.2 Research Status
2 Technical Background
2.1 SDN Architecture
2.2 Openflow Protocol
2.3 SVM Algorithm
3 Specific Analysis
3.1 Experimental Environment Description
3.2 Experimental Topology Description
3.3 Topology Construction of Mininet
3.4 Analysis of Ryu Controller Application Implementation
3.5 Network Traffic Simulation Collection
3.6 Traffic Characteristics
3.7 Model Detection
3.8 Analysis of Experimental Results and Comparison of Efficiency
4 Conclusions
References
An Efficient Group Signature Based Digital Currency System
1 Introduction
1.1 Related Works
1.2 Contributions
2 Preliminaries
2.1 Bilinear Map
2.2 q-SDH Problem
2.3 Decision Linear Problem
2.4 Group Signature
3 The System
3.1 System I
3.2 System II
3.3 RingCT Technique Integration
3.4 Revocation
4 Performance
5 Conclusion
References
Detecting Anomalies in Cluster System Using Hybrid Deep Learning Model
1 Introduction
2 Related Work
2.1 Log Processing Approaches
2.2 Anomaly Detection Algorithm
3 The Hybrid Model
3.1 Log Processing
3.2 Overview of the Hybrid Model
3.3 The Structure of the Hybrid Model
4 Experiments
4.1 Baseline Methods
4.2 Dataset and Experiment Setup
4.3 Metrics
4.4 Experiment Results
4.5 Model Analysis
5 Conclusion
References
Customs-Based Blockchain Solution for Exportation Protection
1 Introduction
2 Related Work
3 The Proposed Blockchain-Based System
3.1 Overview
3.2 Architecture and Processes
3.3 Banks and Car Rental Companies
3.4 Police Department and RTA
3.5 Dubai Customs
4 Proof-of-Concept (POC)
4.1 Assets
4.2 Transactions
4.3 Smart Contracts
5 Conclusion and Future Works
References
Customs-Based Distributed Risk Assessment Method
1 Introduction
2 The Proposed Method
2.1 Overview
2.2 Transactions Representation Step
2.3 The Local-Density Outlier Factor (LOF)
2.4 The Classification Step
3 Evaluation
4 Related Work
5 Conclusion
References
Pufferfish Privacy Mechanism Based on Multi-dimensional Markov Chain Model for Correlated Categorical Data Sequences
1 Introduction
2 Related Work
3 Preliminaries
3.1 Pufferfish Privacy Mechanism
3.2 Multi-dimensional Markov Chain Models
3.3 Additional Notion
4 A Mechanism for 2-Dimensional Correlated Data
4.1 Problem Statement
4.2 Our Mechanism
5 Experiments
6 Conclusion
References
Lattice Based Multi-replica Remote Data Integrity Checking for Data Storage on Cloud
1 Introduction
2 Related Work
3 System and Security Models
3.1 System Model
3.2 Security Model
4 Preliminaries
4.1 Some Definition About Lattice
4.2 Discrete Gaussian on Lattices
4.3 Trapdoors for Lattices and Sample Basis Algorithm
4.4 SIS Hard Problem
5 Our Construction
6 Security Analysis
6.1 Correctness
6.2 Soundness
6.3 Privacy Preserving
7 Performance Analysis
7.1 Computation Analysis
7.2 Communication Analysis
8 Conclusion
References
Secure Multi-Party Computation on Blockchain: An Overview
1 Introduction
2 Secure Multi-Party Computation
2.1 Security Model
2.2 Related Work
3 Blockchain Technology
3.1 Blockchain Architecture
4 SMPC on Blockchain
4.1 Overview
4.2 State-of-the-Art Researches
5 Conclusion
References
A Survey of Privacy-Preserving Techniques on Trajectory Data
1 Introduction
2 Key Issues in Trajectory Privacy Protection
2.1 Basic Concept
2.2 Types of Trajectory Privacy Protection
2.3 The Classification and Measurement Standards of Trajectory Privacy Preserving Techniques
2.4 The Architecture of Trajectory Privacy Protection
3 Generalization Method
3.1 km–Anonymity Trajectory Data Privacy Preserving Methods
3.2 Privacy Preserving Method Based on Prefix Tree
3.3 A Method of Trajectory Privacy Protection Based on Semantic Anonymous agent
3.4 Dynamic Trajectory Privacy-Preserving Publishing
3.5 Grid Based l–Diversity Principle
3.6 A Trajectory Privacy Preserving Method Based on Time Obfuscation
4 Suppression Method
4.1 Trajectory Privacy Preserving Method Based on Disturbance
4.2 Trajectory Privacy Preserving Method Based on Trajectory Frequency Suppression
5 Pseudo Data Method
6 Privacy Protection Effectiveness Metric and Comparative Analysis
6.1 Privacy Protection Effectiveness Metric
6.2 Comparative Analysis
7 Future Research Directions
7.1 The Optimization of Privacy Location and the Reasonable Construction of Anonymization Box
7.2 Protect the Trajectory Information in Continuous Location Queries
7.3 Research on Privacy Preserving Technology in Big Data Environment
7.4 Other Issues that Need to Be Addressed
8 Conclusions
References
Big Data Processing and Deep Learning
Minimizing Off-Chip Memory Access for Deep Convolutional Neural Network Training
1 Introduction
2 Data Dependence of BN Layers and Memory Access Characteristics
2.1 Data Dependence of BN Layer
2.2 Memory Access Characteristics
3 BN Reconstruction and Multi-layer Fusion Computing
3.1 Multi-layer Fusion Computing
3.2 Data Volume Model and Operation Volume Model
4 Evaluation
4.1 Quantitative Evaluation on BRC and BRCB
4.2 BRC and BRCB’s Optimization on Memory Access
4.3 BRC and BRCB’s Optimization Effects on Accelerators Efficiency
5 Related Works
5.1 Promoting on-Chip Data Reuse
5.2 Intermediate Results Compression
6 Summary
References
Resultant Gradient Flow Method for Multiple Objective Programming Based on Efficient Computing
1 Introduction
2 Resultant Gradient Flow Method
2.1 Flow-Based Method
2.2 Resultant Gradient Descent Method for Multiple Objective Programming
2.3 Multiple Objective Programming
3 A Case Study and Its Profit Modeling
3.1 Maximum Overall Profit
3.2 Modeling of Maximization Overall Profit
4 Experimental Study
5 Conclusion
References
Barrage Video Recommendation Method Based on Convolutional Recursive Neural Network
1 Introduction
2 Related Works
2.1 Traditional Video Recommendation
2.2 Video Recommendation Based on Convolutional Neural Network
3 Problem Formulation
4 Video Recommendation Structure
4.1 Barrage Data Preprocessing
4.2 RCNN Model
5 Experimental Results
6 Conclusion
References
A Pipelining Strategy for Accelerating Convolutional Networks on ARM Processors
1 Introduction
2 Related Work
3 Convolution and Pipelines on ARM CPUs
3.1 Convolution
3.2 Instruction Pipeline on ARMv7 CPUs
4 Methods
4.1 Pipelining of SIMD Instructions
4.2 Optimizing 33 Convolution
5 Experimental Results
5.1 Experimental Settings
5.2 Latency of 33 Convolution
6 Conclusion
References
Prediction Model of Suspect Number Based on Deep Learning
1 Introduction
2 Related Works
3 Data Preprocessing
3.1 Time Data Processing
3.2 Location Data Processing
3.3 Method Data Processing
3.4 Loss Amount Data Processing
3.5 Weather Data Processing
4 Model Building
4.1 Feature Selection
4.2 Text Data Model Construction
4.3 Model Construction
5 Experimental Results and Analysis
5.1 The Experimental Data
5.2 DNN Parameter Setting
5.3 Experimental Results and Analysis
6 Conclusion
References
A Sequence-to-Sequence Transformer Premised Temporal Convolutional Network for Chinese Word Segmentation
1 Introduction
2 The Transformer Model
2.1 Embedding Layer
2.2 Dilated Convolution
2.3 Convolutional Blocks
2.4 Residual Connection
2.5 The Decoder
2.6 Inference Layer
3 Training
4 Experiments
4.1 Datasets
4.2 Hyper-parameters
4.3 Experiment Environment and Evaluation Criteria
4.4 The Performance Evaluation of the CWS
4.5 The Ability in Processing Long Sentences
5 Conclusion
References
Author Index

Parallel Architectures, Algorithms and Programming: 10th International Symposium, PAAP 2019, Guangzhou, China, December 12–14, 2019, Revised Selected ... in Computer and Information Science)
 9789811527661, 9789811527678, 9811527660

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Recommend Papers