Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things最新文献

筛选
英文 中文
Thread-Level Speculation Execution Model Based on LLVM Compiler 基于LLVM编译器的线程级推测执行模型
Deshuo Zhao, B. Liu
{"title":"Thread-Level Speculation Execution Model Based on LLVM Compiler","authors":"Deshuo Zhao, B. Liu","doi":"10.1145/3468691.3468707","DOIUrl":"https://doi.org/10.1145/3468691.3468707","url":null,"abstract":"With the trend of growing number of processing cores on Chip Multiprocessors, researchers have made a lot of efforts to make full use of core resources through extracting programs’ parallelism. Thread-Level Speculation (TLS) can speculatively parallelized sequential dependences-carried programs in an aggressive manner by predicting dependent values in advance. However, the existing TLS execution model is error-prone and extra overhead will be introduced. To solve above problems, in this paper, a pure software-TLS execution model based on LLVM compiler is proposed with low-misspeculation and low-overhead. Firstly, an adaptive forking model is presented. This adaptive forking model can not only exploit higher degree of parallelism, but also reduce rollback rate. Secondly, an efficient memory management strategy is designed. With this strategy, the speculative status is separated from the non-speculative status, accelerating both communications among speculative threads and non-speculative threads, and its validation process with less time-consuming overhead. Experiments show that the presented speculative execution model can effectively extract sequential programs’ parallelism, and it can achieve a maximum speedup of 3.76, average 2.59 times speedup on 8-cores processor. Compared with the traditional TLS execution model, the improved model delivers a 9% performance improvement on average.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115111773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Class-level Aware Network for Human Parsing 用于人类解析的类级感知网络
Jiayi Yin, Weibin Liu, Weiwei Xing, Yuan Xiao
{"title":"Class-level Aware Network for Human Parsing","authors":"Jiayi Yin, Weibin Liu, Weiwei Xing, Yuan Xiao","doi":"10.1145/3468691.3468733","DOIUrl":"https://doi.org/10.1145/3468691.3468733","url":null,"abstract":"Having shown great performance in human parsing, convolutional neural networks(CNNs) come with much computation budget. In this paper, a novel class-level aware network(CANet), which employs an asymmetric encoder-decoder architecture, is presented to achieve reliable human parsing results in a memory friendly way. To achieve the trade-off between speed and accuracy in human parsing, we design group-split-bottleneck(GS-bt) block, where group convolution and channel split are utilized in the residual block. In decoder network, the attention pyramid pooling module(APPM) is proposed to recovering the details of human parsing. Moreover, a multi-class classification branch is developed to extract class-level information and revise human parsing results. Compared to current models, our model has less parameters and experiments demonstrate that the proposed CANet can reach state-of-the-art results on PASCAL-Person-Part dataset.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125760842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Critical nodes identification based on comprehensive topological importance in complex networks 复杂网络中基于综合拓扑重要性的关键节点识别
Peizhe Li, Linjin Xie, Yefan Wu, Haotian Liu, Yong Wang, Jianhan Zhou, Xiaoping Wu, Lilin Qiao, Quanbiao An, Siyu Yang
{"title":"Critical nodes identification based on comprehensive topological importance in complex networks","authors":"Peizhe Li, Linjin Xie, Yefan Wu, Haotian Liu, Yong Wang, Jianhan Zhou, Xiaoping Wu, Lilin Qiao, Quanbiao An, Siyu Yang","doi":"10.1145/3468691.3468722","DOIUrl":"https://doi.org/10.1145/3468691.3468722","url":null,"abstract":"The identification of critical nodes in the network is of great significance for the research of the invulnerability and structural stability of complex networks. Most of the existing studies evaluate the importance of nodes in networks from a single structural perspective. Considering the local and global characteristics of the network, an identification algorithm of critical nodes in complex networks based on comprehensive topological importance (CTI) is proposed. The algorithm uses the theory of multiple attribute decision making (MADM) to quantitatively analyze the influence of different attributes on nodes and determine the comprehensive topology importance of nodes, which represents their structural importance in complex networks. Based on two simulation networks and five classical real networks, the proposed algorithm is proved to be superior to DC, LLS, P and WL indexes based on local information and BC indexes based on global information through the change of network efficiency under critical nodes attacking.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125549970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Projector Correction system based on RK3399 基于RK3399的投影仪校正系统设计
Zhaoxiang Peng, Yang Yang, Yunxia Liu, Shaoqin Wang, Xuesong Gao
{"title":"Design of Projector Correction system based on RK3399","authors":"Zhaoxiang Peng, Yang Yang, Yunxia Liu, Shaoqin Wang, Xuesong Gao","doi":"10.1145/3468691.3468735","DOIUrl":"https://doi.org/10.1145/3468691.3468735","url":null,"abstract":"In real life, the projector projection picture is not flat, there is a certain deformation. Traditional method is to adjust the position of the projector manually, but it is not convenient in real scenes, and the two projectors are simply corrected by the traditional method, so the projection effect in the overlapping area is not ideal. In recent years, there is also a lot of research on how to do the work of the projector correction, and put forward a lot of solutions, but most of them are very tedious. This paper presents a correction method using embedded device RK3399 combined with OpenCV software, which can manually and automatically correct the projection picture of one or two projectors by software control, and deal with the projection overlap area, which makes the visual effect of projection better and the operation convenient. It can be widely used in the projector system of prisons and command centers.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126626288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on UAV Obstacle Detection based on Data Fusion of Millimeter Wave Radar and Monocular Camera 基于毫米波雷达与单目摄像机数据融合的无人机障碍物检测研究
Xiyue Wang, Xinsheng Wang, Zhiquan Zhou, Junjie Li
{"title":"Research on UAV Obstacle Detection based on Data Fusion of Millimeter Wave Radar and Monocular Camera","authors":"Xiyue Wang, Xinsheng Wang, Zhiquan Zhou, Junjie Li","doi":"10.1145/3468691.3468708","DOIUrl":"https://doi.org/10.1145/3468691.3468708","url":null,"abstract":"Abstract—Obstacle avoidance detection of small UAVs has been a challenging problem because of size and weight constraints. In this paper, a fusion of MMW and monocular camera data is proposed for small UAVs obstacle detection systems. A MMW sensor is used to detect distance and angle and the image of obtacles capturing by the camera. Next, the target point information detected by MMW is calibrated into the image to complete the data fusion. Then, the optimized edge detection algorithm and image grayscale frequency saliency map are used to segment the obstacle area in images. The proposed method was evaluated by experiments in a real flying environment which consist of obstacles with textures and shadows. In the experiments, we successfully detect the shape of obstacles for complex situations. Obstacles with complex textures and shadows can be effectively detected, which shows that the method has good robustness.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128232751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Infrared Small Target Detection Method Based on Visual Mechanism and Clutter Suppression Model 基于视觉机制和杂波抑制模型的红外小目标检测方法
Shiqian Guo, Baohua Zhang, Jinhui Zhu
{"title":"Infrared Small Target Detection Method Based on Visual Mechanism and Clutter Suppression Model","authors":"Shiqian Guo, Baohua Zhang, Jinhui Zhu","doi":"10.1145/3468691.3468715","DOIUrl":"https://doi.org/10.1145/3468691.3468715","url":null,"abstract":"Aiming at the problem of high false alarm rate in the detection of dim infrared targets in complex backgrounds, an infrared dim target detection method based on visual mechanism and clutter suppression model is proposed. Firstly, a weighted template is used to roam the image to enhance dim targets and suppress the background, then the image is divided into sub-regions, the local characteristics are used to suppress strong edge clutter. Finally the dim targets are selected according to the classification criteria. Experimental results show that the proposed algorithm can effectively reduce the false alarm rate in complex scenes, and signal-to-clutter ratio and background suppression factor are better than comparison algorithms.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121798701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and simulation of EB-RPL protocol in 5G intelligent power plant application scenario 5G智能电厂应用场景下EB-RPL协议设计与仿真
Guanjin Huang, Meng Ye, Huaxu Zhou, Jianhui Li, Miaogeng Wang, Xuhui Zhang
{"title":"Design and simulation of EB-RPL protocol in 5G intelligent power plant application scenario","authors":"Guanjin Huang, Meng Ye, Huaxu Zhou, Jianhui Li, Miaogeng Wang, Xuhui Zhang","doi":"10.1145/3468691.3468728","DOIUrl":"https://doi.org/10.1145/3468691.3468728","url":null,"abstract":"5G can better meet the security, reliability and flexibility requirements of power grid business, and realize differentiated service guarantee. This paper focuses on the application scenarios of 5g smart power plant, and studies the applicable routing protocol and optimization scheme. The existing RPL uses a single link quality expected transmission times as the routing metric to calculate and compare the optimal paths. However, when some nodes in the network consume too much energy due to uneven load, the topology cannot be dynamically adjusted according to the routing metrics. In this paper, energy consumption is introduced to calculate the energy consumption of nodes. Combined with the expected number of transmissions, an improved RPL routing algorithm nb-npl based on energy balance is proposed. The algorithm not only takes into account the reliability of the link, but also considers the energy consumption information of the node, so that the node can avoid selecting those nodes with more energy consumption in the default routing selection process, which solves the problem that individual nodes are always in heavy use, and effectively performs the network life.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115860752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The influence of base station distribution on millimeter wave propagation in vacuum pipeline 基站分布对毫米波在真空管道中传播的影响
Tingjun Li, Wang Yan, Haining Yang, Kai Yu, N. Li
{"title":"The influence of base station distribution on millimeter wave propagation in vacuum pipeline","authors":"Tingjun Li, Wang Yan, Haining Yang, Kai Yu, N. Li","doi":"10.1145/3468691.3468739","DOIUrl":"https://doi.org/10.1145/3468691.3468739","url":null,"abstract":"The low air resistance and low noise of the low vacuum pipeline make it a new high-speed train operation scene. Due to the closed nature of the low vacuum pipeline, the electromagnetic wave propagation of the train in the pipeline is very complicated. In this paper, by establishing the electromagnetic wave propagation model in the pipeline, the electric field distribution received by the train is projected, and a reference scheme is proposed to solve the multipath effect in signal transmission.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114919312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Survey of Recent Simulation platforms for Underwater Acoustic Sensor Networks 水声传感器网络仿真平台综述
Xuanxuan Xu, Shaozhong Cao, Yanhong Yang
{"title":"A Comprehensive Survey of Recent Simulation platforms for Underwater Acoustic Sensor Networks","authors":"Xuanxuan Xu, Shaozhong Cao, Yanhong Yang","doi":"10.1145/3468691.3468696","DOIUrl":"https://doi.org/10.1145/3468691.3468696","url":null,"abstract":"With the development of integrated land-sea-air network planning and underwater communication technology in the 6G network, there are more and more researches on underwater communication. The underwater wireless communication simulation platform provides a simulation environment for expensive ocean and underwater experiments, and helps researchers test and validate underwater communication equipment and network protocols. So far, no suitable underwater simulation platform has been developed to conduct efficient, low-cost and accurate simulations to verify the accuracy of the research. In this article, we first introduce an idealized complete structure and introduce the key modules. Secondly, we investigate and analyze the recent simulation software platforms and give suggestions for use. Finally, we discuss the technical direction in which the platform can be improved in the future, in the hope that a more user-friendly platform will emerge.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132798535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Informal-to-Formal Word Conversion for Persian Language Using Natural Language Processing Techniques 使用自然语言处理技术的波斯语非正式到正式词转换
A. Naemi, Marjan Mansourvar, Mostafa Naemi, Bahman Damirchilu, A. Ebrahimi, U. Wiil
{"title":"Informal-to-Formal Word Conversion for Persian Language Using Natural Language Processing Techniques","authors":"A. Naemi, Marjan Mansourvar, Mostafa Naemi, Bahman Damirchilu, A. Ebrahimi, U. Wiil","doi":"10.1145/3468691.3468710","DOIUrl":"https://doi.org/10.1145/3468691.3468710","url":null,"abstract":"A vast amount of text data is available today on the Internet due to the extensive use of social media. Valuable information can be extracted from this data through natural language processing. However, the process of information extraction can be difficult due to the informal forms of these texts. This paper aims to address this challenge by focusing on the conversion of Persian informal words to formal words by using the spell-checking approach. For this purpose, two datasets for formal and informal words were extracted from the four most visited news websites in Persian. Then Persian informal words were divided into multiple categories based on the level of changes required to build the formal equivalents. These were then converted to the formal forms according to their features. Statistical analyses combined with correction rules were used to produce a “candidate list” to find the best formal candidate equivalents. The performance of our conversion system was evaluated through people's comments extracted from the four most visited Persian (Farsi) news agencies. Results show that our proposed system can detect approximately 94% of the Persian informal words, with the ability to detect 85% of the best equivalent formal words. In addition, the comparison between the proposed system and two well-known Persian spell-checkers, Virastyar and Vafa, shows that in terms of detection and correction, the proposed system outperforms significantly. Further analysis shows that the time complexity of the proposed system is linear.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133220915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信