Proceedings of the 6th International Conference on High Performance Compilation, Computing and Communications最新文献

筛选
英文 中文
MVideoIndex: Querying and Indexing of Geo-referenced Videos MVideoIndex:地理参考视频的查询和索引
Mengru Ma, Yingjie Chen, Qingbin Yu, Zhongxin Du, Wei Ding
{"title":"MVideoIndex: Querying and Indexing of Geo-referenced Videos","authors":"Mengru Ma, Yingjie Chen, Qingbin Yu, Zhongxin Du, Wei Ding","doi":"10.1145/3546000.3546017","DOIUrl":"https://doi.org/10.1145/3546000.3546017","url":null,"abstract":"The geo-referenced video consists of space-temporal information such as time, spatial location, camera shooting direction, camera viewing angle, viewable distance, etc. This type of video is widely applicable with sensors loaded on video capture devices. The application of geo-referenced video queries is increasingly popular recently (e.g., travel recommendation, intelligent transportation, road anomaly detection). And each of them needs to realize the query process of geo-referenced video at a specific time or spatial location. However, existing mobile video indexing methods still have room for improvement. There still exist problems with efficiency and accuracy. In this paper, we proposed a novel indexing method named MVideoIndex. MVideoIndex can process point or range queries quickly by utilizing Minimum Bounding Tilted Rectangle (MBTR) in leaf nodes based on the linear change of movement direction in geo-referenced videos. For representing the viewable regions of geo-referenced videos along the trajectory better, we constructed the index with a memory buffer limit to avoid the situation, where the query target falls into a large index and is inconvenient to query. We experimentally analyzed the performance of MVideoIndex and the state-of-art video index method GeoVideoIndex to verify our theory. The performance shows that MVideoIndex is capable of reducing the index construction time and query time, presenting a better performance than other methods. We further compared the impact of the memory buffer threshold size on query efficiency and found that the optimal memory buffer threshold size is about 8-kilometer Byte. We also conducted experiments to explore the effect of MVideoIndex and GeoVideoIndex on different datasets and found a more suitable application scenario for MVideoIndex.","PeriodicalId":196955,"journal":{"name":"Proceedings of the 6th International Conference on High Performance Compilation, Computing and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123576837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Large-scale parallel exact diagonalization algorithm of the Hubbard model on Tianhe-2 supercomputer 天河二号超级计算机上Hubbard模型的大规模并行精确对角化算法
Biao Li, Jie Liu
{"title":"Large-scale parallel exact diagonalization algorithm of the Hubbard model on Tianhe-2 supercomputer","authors":"Biao Li, Jie Liu","doi":"10.1145/3546000.3546001","DOIUrl":"https://doi.org/10.1145/3546000.3546001","url":null,"abstract":"We propose a parallel exact diagonalization method for solving the large-scale Hubbard model. The core of this algorithm is the parallelization of the Lanczos algorithm, for which we propose a hierarchical communication model and a fast strategy for finding nonzero elements of large-scale matrix, starting only from the symmetry of Hamiltonian matrix. The effect of our parallel algorithm was tested on the Tianhe-2 supercomputer, where the strong scaling efficiency could reach 53% for 30,000 cores in a 140-billion dimensional matrix, and the weak scaling efficiency remained above 40% for 60,000 cores in a 730-billion dimensional matrix.","PeriodicalId":196955,"journal":{"name":"Proceedings of the 6th International Conference on High Performance Compilation, Computing and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129088621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Mechanism of Intelligent Urban Railway Cloud Platform Based on Zero-trust Security Architecture 基于零信任安全架构的智慧城市轨道云平台安全机制
Y. Qlu
{"title":"Secure Mechanism of Intelligent Urban Railway Cloud Platform Based on Zero-trust Security Architecture","authors":"Y. Qlu","doi":"10.1145/3546000.3546015","DOIUrl":"https://doi.org/10.1145/3546000.3546015","url":null,"abstract":"Aiming to strengthen the stability of operation and maintenance of the urban rail transit network cloud platform at this stage, it is emerging to solve the security mechanism of the intelligent urban railway cloud platform. In this paper, we proposed a zero-trust network security solution for the rail transit system network construction. First, we built a zero-trust network construction for smart city rail transit at the architecture level, it can break the phenomenon of information security silo of rail transit line platform and minimize the system security risk based on a zero-trust network. Next, we focus on building a cloud security brain for urban rail transit networks and proposed the self-learning trust algorithm for a zero-trust network. Specifically, we illustrated the modified network model and constructed a dynamic updating user trust profile as the trustworthy access list. The parameters of the self-learning trust algorithm consist of the state, available chain road bandwidth, waiting for queue state of network traffic, linkage actions, and so on. We adopted a dynamic self-learning strategy for adjusting mitigation policy, the learning step predicted the state of the predetermined congestion and selected the rich links for execution. Finally, experiments show the efficiency of our secure mechanism of railway cloud platform based on zero-trust security architecture.","PeriodicalId":196955,"journal":{"name":"Proceedings of the 6th International Conference on High Performance Compilation, Computing and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133552593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement Learning Enabled Throughput Optimization for Interconnection Networks of Interposer-based system 基于interposer系统互连网络的强化学习吞吐量优化
Shuhao Ling, Huaien Gao, Jiasong Chen, Dawei Liu
{"title":"Reinforcement Learning Enabled Throughput Optimization for Interconnection Networks of Interposer-based system","authors":"Shuhao Ling, Huaien Gao, Jiasong Chen, Dawei Liu","doi":"10.1145/3546000.3546002","DOIUrl":"https://doi.org/10.1145/3546000.3546002","url":null,"abstract":"Silicon interposer enables 2.5D stacking of memory chips and processor chips to pursue advanced memory access performance. In interposer-based system, different traffic transfers through network-on-interposer (NoI) lays on the silicon interposer which makes NoI throughput important to transmit the mass of data. However, the performance of the existing topology varies under different traffic patterns. In this paper, we use reinforcement learning (RL) is adapted to further optimize the throughput of NoI in various traffic. We design a dedicated RL framework for NoI enviroment to enable performance improvement. Three algorithms are used to maximize the throughput as well as reward in the RL Model. Simulation results demonstrate that the proposed RL approach provide higher throughput both in memory traffic and coherence traffic.","PeriodicalId":196955,"journal":{"name":"Proceedings of the 6th International Conference on High Performance Compilation, Computing and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125667510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Node Selection Scheme for Data Repair Using Erasure Code in Distributed Storage System 分布式存储系统中Erasure Code数据修复的节点选择方案
Yuejin Huang, Miao Ye, Yue Cai
{"title":"A Node Selection Scheme for Data Repair Using Erasure Code in Distributed Storage System","authors":"Yuejin Huang, Miao Ye, Yue Cai","doi":"10.1145/3546000.3546003","DOIUrl":"https://doi.org/10.1145/3546000.3546003","url":null,"abstract":"The explosion of massive data poses a severe challenge to the storage cost and data storage reliability of traditional storage systems. As the number of storage nodes increases in a distributed storage system, the node failure probability increases. Erasure code technology as a redundancy strategy can greatly save the cost of storage space while providing security for data compared with multi-copy technology. In real large-scale data centers, the repair costs vary due to differences in storage node attributes and link status changes between nodes. In the repair process based on the erasure code mechanism, it is required to select a certain number of provider nodes from the surviving nodes to transmit data to the newcomer nodes, which leads to the problem of selecting nodes to participate in the repair process. In this paper, a tree-type repair scheme considering node selection (TR-NS) is designed, including an algorithm for selecting two types of nodes according to nodes performance and an algorithm for establishing the optimal repair tree to complete the reconstruction of the failure data. The experimental results show that the repair time of the TR-RS scheme proposed in this paper is significantly reduced.","PeriodicalId":196955,"journal":{"name":"Proceedings of the 6th International Conference on High Performance Compilation, Computing and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127687722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimize DGL Operations on x86-64 Multi-Core Processors 在x86-64多核处理器上优化DGL操作
Chao Liu, Huayou Su, Y. Dou, Qinglin Wang
{"title":"Optimize DGL Operations on x86-64 Multi-Core Processors","authors":"Chao Liu, Huayou Su, Y. Dou, Qinglin Wang","doi":"10.1145/3546000.3546018","DOIUrl":"https://doi.org/10.1145/3546000.3546018","url":null,"abstract":"Modern x86-64 processors have strong performance due to long vector units. Therefore long vector units are widely used in CNN-like neural network model inference on modern x86-64 processors. However the performance of GNN inference on modern x86-64 processors is poor. Unfortunately, with the development of GNNs and the increase of graph datasets, GNN inference performance meets the serious challenge on x86-64 processors. In this paper, we study the problem of poorly optimized DGL-based GAT models on the x86-64 platform, and analyze the main performance bottlenecks in this case. In order to optimize the performance of DGL on the two main x86-64 platform CPUs of Intel and AMD, we implement a simple and effective task allocator to balance the task load among multiple cores and use vector instructions to optimize the core operators in DGL. In addition, we also propose corresponding optimization ideas for the NUMA architecture. The experimental results show that our optimization method improves the performance of the basic DGL version by up to 3.12x and 2.6x on Intel and AMD platforms.","PeriodicalId":196955,"journal":{"name":"Proceedings of the 6th International Conference on High Performance Compilation, Computing and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132824271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hypernetwork Representation Learning With the Transformation Strategy 基于转换策略的超网络表示学习
Y. Zhu, Haixing Zhao, Jianqiang Huang, Xiaoying Wang
{"title":"Hypernetwork Representation Learning With the Transformation Strategy","authors":"Y. Zhu, Haixing Zhao, Jianqiang Huang, Xiaoying Wang","doi":"10.1145/3546000.3546020","DOIUrl":"https://doi.org/10.1145/3546000.3546020","url":null,"abstract":"In real life, there are many cases that cannot be described by the network abstracted as the graph, but can be described perfectly by the hypernetwork abstracted as the hypergraph. Different from the network, the hypernetwork structure is more complex and poses a great challenge to the existing network representation learning methods. Therefore, in order to overcome the challenge of the hypernetwork structure, a hypernetwork representation learning method with the transformation strategy is proposed. Firstly, as three types of transformation strategies from the hypergraph to the graph, line graph, incidence graph and 2-section graph are combined into three types of integral graphs with the hyperedge information, namely incidence graph + 2-section graph, line graph + incidence graph and line graph + incidence graph + 2-section graph. Secondly, a shallow neural network algorithm is trained respectively on five types of networks abstracted as incidence graph, 2-section graph, incidence graph + 2-section graph, line graph + incidence graph and line graph +incidence graph + 2-section graph to obtain node representation vectors. Finally, the evaluation experiment is conducted on four different types of hypernetwork datasets. The experimental results demonstrate that the node classification performance of 2-section graph is better than that of other graphs, and the link prediction performance of incidence graph + 2-section graph is better than that of other graphs.","PeriodicalId":196955,"journal":{"name":"Proceedings of the 6th International Conference on High Performance Compilation, Computing and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128388957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of thermal-mechanical characteristics and metallographic detection of broken connection of transmission line 输电线路断线热力学特性分析及金相检测
Sijin Cheng, Y. Zhou, Hao Sun, Junjian Tian, He Zhu, Jinfu Zhu, Hanliang Liao
{"title":"Analysis of thermal-mechanical characteristics and metallographic detection of broken connection of transmission line","authors":"Sijin Cheng, Y. Zhou, Hao Sun, Junjian Tian, He Zhu, Jinfu Zhu, Hanliang Liao","doi":"10.1145/3546000.3546030","DOIUrl":"https://doi.org/10.1145/3546000.3546030","url":null,"abstract":"In order to study the thermal mechanical characteristics of the broken line of the connecting pipe and pipeline joint of the transmission line, the tensile test of the steel cored aluminum strand steel wire, the thermodynamic analysis of the broken line joint of the connecting pipe and the metallographic test of the steel core of the broken line joint were carried out successively. The tensile strength of the steel core of the steel cored aluminum strand, the temperature load curve at different times and the metallographic test results of the steel core of the broken line joint were obtained, Finally, the exposed section of steel core is tested by metallography. The results show that the tensile strength of steel cored aluminum strand meets the standard, the heating of connecting pipe caused by conductor current will affect the calculated breaking force of steel core, and the exposed section of steel core has been running at high temperature for a period of time before being pulled off.","PeriodicalId":196955,"journal":{"name":"Proceedings of the 6th International Conference on High Performance Compilation, Computing and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130152392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Control strategy of multi-energy collaborative low carbon energy management system 多能源协同低碳能源管理系统控制策略
L. Zhong, Xi Hu, Jun Lei, Gaopeng Guo, Haojun Yan
{"title":"Control strategy of multi-energy collaborative low carbon energy management system","authors":"L. Zhong, Xi Hu, Jun Lei, Gaopeng Guo, Haojun Yan","doi":"10.1145/3546000.3546034","DOIUrl":"https://doi.org/10.1145/3546000.3546034","url":null,"abstract":"The proposal and development of a multi-energy collaborative low-carbon energy management system put forward new solutions for gradually increasing the proportion of new energy power generation, optimizing energy utilization efficiency, and reducing greenhouse gas emissions. Because this paper fully considers the differences in dynamic characteristics among various energy sources, and the optimal scheduling is also different according to the load under different time scales and the prediction accuracy results of new energy. In the multi-energy coordinated comprehensive energy park system of cold, heat, electricity, and gas, the multi time scale scheduling strategy reasonably coordinates a variety of equipment to optimize its operation, which is of great significance to the economic and reliable operation of the system, Based on the detailed modelling of the equipment, combined with the time-sharing price and time-sharing natural gas price, and considering the multi-energy complementary operation, this paper dynamically adjusts the equipment operation state to deal with the small-scale uncertain fluctuation of load and new energy output, so as to meet the economic and reliable operation of the system.","PeriodicalId":196955,"journal":{"name":"Proceedings of the 6th International Conference on High Performance Compilation, Computing and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122444104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault Early Warning of Wind Turbine Generator based on Residual Autoencoder Network 基于残差自编码器网络的风力发电机组故障预警
Zhaoyang Wang
{"title":"Fault Early Warning of Wind Turbine Generator based on Residual Autoencoder Network","authors":"Zhaoyang Wang","doi":"10.1145/3546000.3546029","DOIUrl":"https://doi.org/10.1145/3546000.3546029","url":null,"abstract":"The condition monitoring and fault Early Warning of wind turbine can find its faults early and reduce its failure rate and maintenance cost. This paper presents a fault diagnosis method of wind turbine generator based on residual autoencoder network (RAE). The proposed RAE has an autoencoder network structure. The encoding network is responsible for extracting the feature vector reflecting the distribution law of supervisory control and data acquisition (SCADA) data, the decoding network is responsible for reconstructing SCADA data according to the feature vector, and training the RAE network according to the reconstruction error of input data and reconstructed data. There are several shortcut connections between the corresponding layers of the encoder and decoder of the RAE. Shortcut connections introduce the shallow features in the encoder into the decoder and combines them with the deep semantic features in the decoder. Moreover, the shortcut connections allow the network to get additional supervision during back propagation process, avoiding the problem of gradient disappearance. Through the simulation analysis of the recorded data before and after generator fault, the effectiveness of the proposed RAE network for wind turbine generator fault diagnosis is verified.","PeriodicalId":196955,"journal":{"name":"Proceedings of the 6th International Conference on High Performance Compilation, Computing and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127563083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信