{"title":"CIMAX-Compiler: An End-to-End ANN Compiler for Heterogeneous Computing-in-Memory Platform","authors":"Chen Yang, Yawei Wang, Lei Wu, Xiang Qiu","doi":"10.1109/WCCCT56755.2023.10052488","DOIUrl":"https://doi.org/10.1109/WCCCT56755.2023.10052488","url":null,"abstract":"As artificial neural network (ANN) being widely adopted in edge applications, such as voice recognition, and face detection, etc. Computing-In-Memory (CIM) accelerators have received much attention because they are faster and more energy efficient. However, existing compilers are mainly applicable for traditional backend devices rather than emerging hardware architectures like CIM accelerator. In this paper, we propose an end-to-end neural network compiler, named CIMAX-Compiler. It can convert an ANN model in Open Neural Network Exchange (ONNX) format to executable codes, which runs on a heterogeneous embedded system composed of an MCU and a CIM accelerator. CIMAX-Compiler greatly reduces model deployment effort from tens of engineer-hours to less than a second. In addition, we applied several optimization techniques such as operator fusion and convolution compression to further improve compiled code performance. Experimental results show that the optimized code can speed up ANN model inference performance by more than 2× compared with the base-line layer to layer implementation.","PeriodicalId":112978,"journal":{"name":"2023 6th World Conference on Computing and Communication Technologies (WCCCT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114351212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Baohong Lin, Linze Wu, Zhilan Huang, Yi Liu, Yangchun Li, Yongbing Fan
{"title":"A Framework for Decoupling Overlay SDN and Computing Virtualization","authors":"Baohong Lin, Linze Wu, Zhilan Huang, Yi Liu, Yangchun Li, Yongbing Fan","doi":"10.1109/WCCCT56755.2023.10052205","DOIUrl":"https://doi.org/10.1109/WCCCT56755.2023.10052205","url":null,"abstract":"When enterprise introduces different vendor overlay SDN (Software defined Networking) and computing virtualization in cloud data center, they will face the problem of interoperability. To solve this problem, this paper proposes a framework for decoupling heterogeneous overlay SDN and computing virtualization. The framework has two key elements, that is, the VM (Virtual Machine) lifecycle event mechanism and drainage mechanism based on VM-Type NVE (Network virtualization Edge). VM life cycle event mechanism realizes the synchronization of VM life cycle events among cloud management platform, SDN and computing virtualization. The drainage mechanism realizes the accurate traffic forwarding between business VMs. Test results show that the framework is suitable for enterprise to build a heterogeneous and compatible cloud infrastructure.","PeriodicalId":112978,"journal":{"name":"2023 6th World Conference on Computing and Communication Technologies (WCCCT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124798469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High Angle Stability Frequency Selective Surface Design and Simulation","authors":"Lin Feng, Yang Zhen, Pang Xiaoyu","doi":"10.1109/WCCCT56755.2023.10052549","DOIUrl":"https://doi.org/10.1109/WCCCT56755.2023.10052549","url":null,"abstract":"Frequency Selection Surface has been successfully used in radar radome design with low radar cross section. In this paper, a double-layer frequency selective surface structure with Ku band insensitive to large angle and polarization is designed. Based on the physical structure of FSS, the equivalent circuit model is established, and the upper and lower layers of the model can be regarded as two gristable square loops. The electromagnetic simulation software HFSS is used to analyze the designed model. Finally, a waveguide slot antenna is designed to verify the designed FSS.","PeriodicalId":112978,"journal":{"name":"2023 6th World Conference on Computing and Communication Technologies (WCCCT)","volume":"71 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131745598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Distribution Method of Application Key Based on AKMA","authors":"Jinhui Li, Jinhua Wang, Chengbing Huang","doi":"10.1109/WCCCT56755.2023.10052464","DOIUrl":"https://doi.org/10.1109/WCCCT56755.2023.10052464","url":null,"abstract":"With the development of information technology, security issues such as 5G + Industrial Internet and Internet of Things have attracted more and more attention. This article first introduces that the Third Generation Partnership Project (3GPP) has defined a series of 5G network security technology systems, such as primary authentication, secondary authentication, GBA, AKMA etc. Secondly, this paper analyzes the security problems such as initial key leakage existing in popular security technologies in the current 5G + Industrial Internet, Internet of Things and other scenarios. Finally, in view of the security problems existing in 5G+Industrial Internet, an online password distribution method based on AKMA is designed. The method realizes the generation and online distribution of the application key, and at the same time realizes the functions of regular update and safe storage of the application key, and solves the above-mentioned security problems.","PeriodicalId":112978,"journal":{"name":"2023 6th World Conference on Computing and Communication Technologies (WCCCT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131978668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Game Routing for UAV Adhoc Networks in Smart City","authors":"Saifullah, Zhi Ren, K. Mohammadani, Waqar Riaz","doi":"10.1109/WCCCT56755.2023.10052140","DOIUrl":"https://doi.org/10.1109/WCCCT56755.2023.10052140","url":null,"abstract":"Unmanned Aerial Vehicular networks play a vital role in future wireless networks due to their flexible network architecture. UAVs are deployed in the military operation, live streaming of events, agriculture farming and the internet of things in smart cities. The UAV adhoc networks are at their initial stages due to unique challenges such as high mobility and, 3D mobility leads to the unstable topology. To tackle this issue position-based routing schemes were introduced to offer high throughput and reduce packet overhead. Though offering many benefits, positionbased routing schemes offers higher delay due to the absence of routing table information. To counter this problem, we have proposed Optimal Game Routing Protocol in which each UAV gets position information of next hope UAV node as well as its neighbouring position. Moreover, we have formulated a game theory function which takes eigenvector centrality, total energy and delay as key measures to select the next hop. To evaluate the efficiency of the proposed scheme, we have compared our scheme with benchmark schemes. Results show OGR outer performs on different load scenarios.","PeriodicalId":112978,"journal":{"name":"2023 6th World Conference on Computing and Communication Technologies (WCCCT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125968110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method of Counteracting Main Lobe Deception Jamming with Frequency Diverse Array","authors":"Jihong Yan, Yuhuan Ju, Shunxiang Wang, Xu Feng, Jinghua Xiao, Juelin Luo","doi":"10.1109/WCCCT56755.2023.10052279","DOIUrl":"https://doi.org/10.1109/WCCCT56755.2023.10052279","url":null,"abstract":"In this paper, a jamming nulling method to counteract the deception jamming of the main lobe is studied. The radar adopts the frequency diverse array transmitting mode and the phased-array receiving mode. In this way, when the main lobe of the transmit beam pattern of the frequency diverse array is aligned at the desired target, the null is formed at other target positions. The problem that when using a frequency diverse array to identify a desired target, other targets can still jam the radar if they are on the high side lobe of the frequency diverse array beam pattern is solved. Computer simulation results show that the jamming nulling method adopted in this paper is feasible and effective.","PeriodicalId":112978,"journal":{"name":"2023 6th World Conference on Computing and Communication Technologies (WCCCT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116797260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Routing Architecture Design for the Space-Ground Integrated Information Network","authors":"Xin Xu, Chaoying Dong, Jun Cai","doi":"10.1109/WCCCT56755.2023.10052483","DOIUrl":"https://doi.org/10.1109/WCCCT56755.2023.10052483","url":null,"abstract":"Space-Ground Integrated Information Network is the core infrastructure for information acquisition, distribution, transmission, and application in the future. Routing architecture is the critical part of this network. This paper presents two types of routing architecture, Independent AS routing architecture and Tunnel-encapsulated routing architecture, based on the Border Gateway Protocol for the Space-Ground Integrated Information Network. The path choosing, fault recovery, management and control, and routing scheme of these two architectures are discussed in detail. The analysis shows that the Independent AS routing architecture has an advantage in management and scalability, while the Tunnel-encapsulated routing architecture is more suitable for the early deployment phase of the Space-Ground Integrated Information Network.","PeriodicalId":112978,"journal":{"name":"2023 6th World Conference on Computing and Communication Technologies (WCCCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114911060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}