{"title":"Thread-Level Speculation Execution Model Based on LLVM Compiler","authors":"Deshuo Zhao, B. Liu","doi":"10.1145/3468691.3468707","DOIUrl":"https://doi.org/10.1145/3468691.3468707","url":null,"abstract":"With the trend of growing number of processing cores on Chip Multiprocessors, researchers have made a lot of efforts to make full use of core resources through extracting programs’ parallelism. Thread-Level Speculation (TLS) can speculatively parallelized sequential dependences-carried programs in an aggressive manner by predicting dependent values in advance. However, the existing TLS execution model is error-prone and extra overhead will be introduced. To solve above problems, in this paper, a pure software-TLS execution model based on LLVM compiler is proposed with low-misspeculation and low-overhead. Firstly, an adaptive forking model is presented. This adaptive forking model can not only exploit higher degree of parallelism, but also reduce rollback rate. Secondly, an efficient memory management strategy is designed. With this strategy, the speculative status is separated from the non-speculative status, accelerating both communications among speculative threads and non-speculative threads, and its validation process with less time-consuming overhead. Experiments show that the presented speculative execution model can effectively extract sequential programs’ parallelism, and it can achieve a maximum speedup of 3.76, average 2.59 times speedup on 8-cores processor. Compared with the traditional TLS execution model, the improved model delivers a 9% performance improvement on average.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115111773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Class-level Aware Network for Human Parsing","authors":"Jiayi Yin, Weibin Liu, Weiwei Xing, Yuan Xiao","doi":"10.1145/3468691.3468733","DOIUrl":"https://doi.org/10.1145/3468691.3468733","url":null,"abstract":"Having shown great performance in human parsing, convolutional neural networks(CNNs) come with much computation budget. In this paper, a novel class-level aware network(CANet), which employs an asymmetric encoder-decoder architecture, is presented to achieve reliable human parsing results in a memory friendly way. To achieve the trade-off between speed and accuracy in human parsing, we design group-split-bottleneck(GS-bt) block, where group convolution and channel split are utilized in the residual block. In decoder network, the attention pyramid pooling module(APPM) is proposed to recovering the details of human parsing. Moreover, a multi-class classification branch is developed to extract class-level information and revise human parsing results. Compared to current models, our model has less parameters and experiments demonstrate that the proposed CANet can reach state-of-the-art results on PASCAL-Person-Part dataset.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125760842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Peizhe Li, Linjin Xie, Yefan Wu, Haotian Liu, Yong Wang, Jianhan Zhou, Xiaoping Wu, Lilin Qiao, Quanbiao An, Siyu Yang
{"title":"Critical nodes identification based on comprehensive topological importance in complex networks","authors":"Peizhe Li, Linjin Xie, Yefan Wu, Haotian Liu, Yong Wang, Jianhan Zhou, Xiaoping Wu, Lilin Qiao, Quanbiao An, Siyu Yang","doi":"10.1145/3468691.3468722","DOIUrl":"https://doi.org/10.1145/3468691.3468722","url":null,"abstract":"The identification of critical nodes in the network is of great significance for the research of the invulnerability and structural stability of complex networks. Most of the existing studies evaluate the importance of nodes in networks from a single structural perspective. Considering the local and global characteristics of the network, an identification algorithm of critical nodes in complex networks based on comprehensive topological importance (CTI) is proposed. The algorithm uses the theory of multiple attribute decision making (MADM) to quantitatively analyze the influence of different attributes on nodes and determine the comprehensive topology importance of nodes, which represents their structural importance in complex networks. Based on two simulation networks and five classical real networks, the proposed algorithm is proved to be superior to DC, LLS, P and WL indexes based on local information and BC indexes based on global information through the change of network efficiency under critical nodes attacking.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125549970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhaoxiang Peng, Yang Yang, Yunxia Liu, Shaoqin Wang, Xuesong Gao
{"title":"Design of Projector Correction system based on RK3399","authors":"Zhaoxiang Peng, Yang Yang, Yunxia Liu, Shaoqin Wang, Xuesong Gao","doi":"10.1145/3468691.3468735","DOIUrl":"https://doi.org/10.1145/3468691.3468735","url":null,"abstract":"In real life, the projector projection picture is not flat, there is a certain deformation. Traditional method is to adjust the position of the projector manually, but it is not convenient in real scenes, and the two projectors are simply corrected by the traditional method, so the projection effect in the overlapping area is not ideal. In recent years, there is also a lot of research on how to do the work of the projector correction, and put forward a lot of solutions, but most of them are very tedious. This paper presents a correction method using embedded device RK3399 combined with OpenCV software, which can manually and automatically correct the projection picture of one or two projectors by software control, and deal with the projection overlap area, which makes the visual effect of projection better and the operation convenient. It can be widely used in the projector system of prisons and command centers.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126626288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiyue Wang, Xinsheng Wang, Zhiquan Zhou, Junjie Li
{"title":"Research on UAV Obstacle Detection based on Data Fusion of Millimeter Wave Radar and Monocular Camera","authors":"Xiyue Wang, Xinsheng Wang, Zhiquan Zhou, Junjie Li","doi":"10.1145/3468691.3468708","DOIUrl":"https://doi.org/10.1145/3468691.3468708","url":null,"abstract":"Abstract—Obstacle avoidance detection of small UAVs has been a challenging problem because of size and weight constraints. In this paper, a fusion of MMW and monocular camera data is proposed for small UAVs obstacle detection systems. A MMW sensor is used to detect distance and angle and the image of obtacles capturing by the camera. Next, the target point information detected by MMW is calibrated into the image to complete the data fusion. Then, the optimized edge detection algorithm and image grayscale frequency saliency map are used to segment the obstacle area in images. The proposed method was evaluated by experiments in a real flying environment which consist of obstacles with textures and shadows. In the experiments, we successfully detect the shape of obstacles for complex situations. Obstacles with complex textures and shadows can be effectively detected, which shows that the method has good robustness.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128232751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Infrared Small Target Detection Method Based on Visual Mechanism and Clutter Suppression Model","authors":"Shiqian Guo, Baohua Zhang, Jinhui Zhu","doi":"10.1145/3468691.3468715","DOIUrl":"https://doi.org/10.1145/3468691.3468715","url":null,"abstract":"Aiming at the problem of high false alarm rate in the detection of dim infrared targets in complex backgrounds, an infrared dim target detection method based on visual mechanism and clutter suppression model is proposed. Firstly, a weighted template is used to roam the image to enhance dim targets and suppress the background, then the image is divided into sub-regions, the local characteristics are used to suppress strong edge clutter. Finally the dim targets are selected according to the classification criteria. Experimental results show that the proposed algorithm can effectively reduce the false alarm rate in complex scenes, and signal-to-clutter ratio and background suppression factor are better than comparison algorithms.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121798701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and simulation of EB-RPL protocol in 5G intelligent power plant application scenario","authors":"Guanjin Huang, Meng Ye, Huaxu Zhou, Jianhui Li, Miaogeng Wang, Xuhui Zhang","doi":"10.1145/3468691.3468728","DOIUrl":"https://doi.org/10.1145/3468691.3468728","url":null,"abstract":"5G can better meet the security, reliability and flexibility requirements of power grid business, and realize differentiated service guarantee. This paper focuses on the application scenarios of 5g smart power plant, and studies the applicable routing protocol and optimization scheme. The existing RPL uses a single link quality expected transmission times as the routing metric to calculate and compare the optimal paths. However, when some nodes in the network consume too much energy due to uneven load, the topology cannot be dynamically adjusted according to the routing metrics. In this paper, energy consumption is introduced to calculate the energy consumption of nodes. Combined with the expected number of transmissions, an improved RPL routing algorithm nb-npl based on energy balance is proposed. The algorithm not only takes into account the reliability of the link, but also considers the energy consumption information of the node, so that the node can avoid selecting those nodes with more energy consumption in the default routing selection process, which solves the problem that individual nodes are always in heavy use, and effectively performs the network life.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115860752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The influence of base station distribution on millimeter wave propagation in vacuum pipeline","authors":"Tingjun Li, Wang Yan, Haining Yang, Kai Yu, N. Li","doi":"10.1145/3468691.3468739","DOIUrl":"https://doi.org/10.1145/3468691.3468739","url":null,"abstract":"The low air resistance and low noise of the low vacuum pipeline make it a new high-speed train operation scene. Due to the closed nature of the low vacuum pipeline, the electromagnetic wave propagation of the train in the pipeline is very complicated. In this paper, by establishing the electromagnetic wave propagation model in the pipeline, the electric field distribution received by the train is projected, and a reference scheme is proposed to solve the multipath effect in signal transmission.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114919312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Survey of Recent Simulation platforms for Underwater Acoustic Sensor Networks","authors":"Xuanxuan Xu, Shaozhong Cao, Yanhong Yang","doi":"10.1145/3468691.3468696","DOIUrl":"https://doi.org/10.1145/3468691.3468696","url":null,"abstract":"With the development of integrated land-sea-air network planning and underwater communication technology in the 6G network, there are more and more researches on underwater communication. The underwater wireless communication simulation platform provides a simulation environment for expensive ocean and underwater experiments, and helps researchers test and validate underwater communication equipment and network protocols. So far, no suitable underwater simulation platform has been developed to conduct efficient, low-cost and accurate simulations to verify the accuracy of the research. In this article, we first introduce an idealized complete structure and introduce the key modules. Secondly, we investigate and analyze the recent simulation software platforms and give suggestions for use. Finally, we discuss the technical direction in which the platform can be improved in the future, in the hope that a more user-friendly platform will emerge.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132798535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Naemi, Marjan Mansourvar, Mostafa Naemi, Bahman Damirchilu, A. Ebrahimi, U. Wiil
{"title":"Informal-to-Formal Word Conversion for Persian Language Using Natural Language Processing Techniques","authors":"A. Naemi, Marjan Mansourvar, Mostafa Naemi, Bahman Damirchilu, A. Ebrahimi, U. Wiil","doi":"10.1145/3468691.3468710","DOIUrl":"https://doi.org/10.1145/3468691.3468710","url":null,"abstract":"A vast amount of text data is available today on the Internet due to the extensive use of social media. Valuable information can be extracted from this data through natural language processing. However, the process of information extraction can be difficult due to the informal forms of these texts. This paper aims to address this challenge by focusing on the conversion of Persian informal words to formal words by using the spell-checking approach. For this purpose, two datasets for formal and informal words were extracted from the four most visited news websites in Persian. Then Persian informal words were divided into multiple categories based on the level of changes required to build the formal equivalents. These were then converted to the formal forms according to their features. Statistical analyses combined with correction rules were used to produce a “candidate list” to find the best formal candidate equivalents. The performance of our conversion system was evaluated through people's comments extracted from the four most visited Persian (Farsi) news agencies. Results show that our proposed system can detect approximately 94% of the Persian informal words, with the ability to detect 85% of the best equivalent formal words. In addition, the comparison between the proposed system and two well-known Persian spell-checkers, Virastyar and Vafa, shows that in terms of detection and correction, the proposed system outperforms significantly. Further analysis shows that the time complexity of the proposed system is linear.","PeriodicalId":112143,"journal":{"name":"Proceedings of the 2021 2nd International Conference on Computing, Networks and Internet of Things","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133220915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}