{"title":"Application of Cross-Wavelet and Singular Value Decomposition on Covid-19 and Bio-Physical Data","authors":"Iftikhar U. Sikder, James J. Ribero","doi":"10.5121/csit.2022.120612","DOIUrl":"https://doi.org/10.5121/csit.2022.120612","url":null,"abstract":"The paper examines the bivariate relationship between COVID-19 and temperature time series using Singular Value Decomposition (SVD) and continuous cross-wavelet analysis. The COVID-19 incidence data and the temperature data of the corresponding period were transformed using SVD into significant eigen-state vectors for each spatial unit. Wavelet transformation was performed to analyze and compare the frequency structure of the single and the bivariate time series. The result provides coherency measures in the ranges of time period for the corresponding spatial units. Additionally, wavelet power spectrum and paired wavelet coherence statistics and phase difference were estimated. The result suggests statistically significant coherency at various frequencies. It also indicates complex conjugate dynamic relationships in terms phases and phase differences.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131697397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dodo Khan, L. T. Jung, M. Hashmani, Moke Kwai Cheong
{"title":"Blockchain Enabled Diabetic Patients’ Data Sharing and Real Time Monitoring","authors":"Dodo Khan, L. T. Jung, M. Hashmani, Moke Kwai Cheong","doi":"10.5121/csit.2022.120620","DOIUrl":"https://doi.org/10.5121/csit.2022.120620","url":null,"abstract":"According to the World Health Organization worldwide diabetes report, the number of diabetic patients has surged from 108 million in the 1980s to 422 million in 2014. According to researchers, the numbers will continue to climb in the next decades. Diabetes is a sickness that requires long-term self-care and close monitoring to be appropriately put under control. As a result, continuous monitoring of blood sugar levels has the potential to save millions of lives. This paper proposes a Blockchain-based platform that connects the patients, healthcare practitioners (HP), and caregivers for a continuous monitoring and care ofdiabetic patients. It lets the patients to securely connected to HP for the purpose of remote patient monitoring (telemedicine), whilst preserving patient data privacy using the blockchain technology. IoT sensors are used to read sugar levels and store these data in a tamper-proof immutable ledger (Hyperledger). This platform provides an End-to-End movement of the patient's data. That is, from the point where it is formed (sensors) to the point it ends up in the HP side. It gives patient a control-and-track function to maintain/track data movement. It provides a unique feature in allowing the patient to keep track of the private data and to pick who they want to share the data with and for how long (and for what reason). The platform is developed in two stages. Initially, the concept is implemented using the Hyperledger Fabric. Then, a Blockchain based on a novel Proof-of-Review (PoR) consensus model is included on to provide efficient performance and scalability in the Hyperledger fabric. Essentially, this proposed platform is to alleviate the pain points in traditional healthcare systems in the scopes of information exchange, data security, and privacy maintenance for real-time diabetic patient monitoring.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134139861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Forgetting, Drafting and Comprehensive Guiding: Text-to-Image Synthesis with Hierarchical Generative Adversarial Networks","authors":"Yuting Xue, Heng Zhou, Yuxuan Ding, Xiao Shan","doi":"10.5121/csit.2022.120623","DOIUrl":"https://doi.org/10.5121/csit.2022.120623","url":null,"abstract":"The generation task from text to image generates cross modal data with consistent content by mining the semantic consistency contained in two different modal information of text and image. Due to the differences between the two modes, the task of text to image generation faces many difficulties and challenges. In this paper, we propose to boost the text-to-image synthesis through an adaptive learning and generating generative adversarial networks (ALG-GANs). First, we propose an adaptive forgetting mechanism in the generator to reduce the error accumulation and learn knowledge flexibly in the cascade structure. Besides, to evade the mode collapse caused by a strong biased surveillance, we propose a multi-task discriminator using weaksupervision information to guide the generator more comprehensively and maintain the semantic consistency in the cascade generation process. To avoid the refine difficulty aroused by the bad initialization, we judge the quality of initialization before further processing. The generator will re-sample the noise and re-initialize the bad initializations to obtain good ones. All the above contributions have been integrated in a unified framework, which is an adaptive forgetting, drafting and comprehensive guiding based text-to-image synthesis method with hierarchical generative adversarial networks. The model is evaluated on the Caltech-UCSD Birds 200 (CUB) dataset and the Oxford 102 Category Flowers (Oxford) dataset with standard metrics. The results on Inception Score (IS) and Fréchet Inception Distance (FID) show that our model outperforms the previous methods.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124874903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning Framework Mindspore and Pytorch Comparison","authors":"Xiangyu Xia, Shaoxiang Zhou","doi":"10.5121/csit.2022.120617","DOIUrl":"https://doi.org/10.5121/csit.2022.120617","url":null,"abstract":"Deep learning has been well used in many fields. However, there is a large amount of data when training neural networks, which makes many deep learning frameworks appear to serve deep learning practitioners, providing services that are more convenient to use and perform better. MindSpore and PyTorch are both deep learning frameworks. MindSpore is owned by HUAWEI, while PyTorch is owned by Facebook. Some people think that HUAWEI's MindSpore has better performance than FaceBook's PyTorch, which makes deep learning practitioners confused about the choice between the two. In this paper, we perform analytical and experimental analysis to reveal the comparison of training speed of MIndSpore and PyTorch on a single GPU. To ensure that our survey is as comprehensive as possible, we carefully selected neural networks in 2 main domains, which cover computer vision and natural language processing (NLP). The contribution of this work is twofold. First, we conduct detailed benchmarking experiments on MindSpore and PyTorch to analyze the reasons for their performance differences. This work provides guidance for end users to choose between these two frameworks.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"54 79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114325563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An IR-based QA System for Impact of Social Determinants of Health on Covid-19","authors":"Priyanka Addagudi, W. MacCaull","doi":"10.5121/csit.2022.120615","DOIUrl":"https://doi.org/10.5121/csit.2022.120615","url":null,"abstract":"Question Answering (QA), a branch of Natural Language Processing (NLP), automates information retrieval of answers to natural language questions from databases or documents without human intervention. Motivated by the COVID-19 pandemic and the increasing awareness of Social Determinants of Health (SDoH), we built a prototype QA system that combines NLP, semantics, and IR systems with the focus on SDoH and COVID-19. Our goal was to demonstrate how such technologies could be leveraged to allow decision-makers to retrieve answers to queries from very large databases of documents. We used documents from CORD-19 and PubMed datasets, merged the COVID-19 (CODO) ontology with published ontologies for homelessness and gender, and used the mean average precision metric to evaluate the system. Given the interdisciplinary nature of this research, we provide details of the methodologies used. We anticipate that QA systems can play a significant role in providing information leading to improved health outcomes.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117143317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mutual Inlining: An Inlining Algorithm to Reduce the Executable Size","authors":"Y. Ben-Asher, Nidal Faour, Ofer Shinaar","doi":"10.5121/csit.2022.120601","DOIUrl":"https://doi.org/10.5121/csit.2022.120601","url":null,"abstract":"We consider the problem of selecting an optimized subset of inlinings (replacing a call to a function by its body) that minimize the resulting code size. Frequently, in embedded systems, the program’s executable file size must fit into a small size memory. In such cases, the compiler should generate as small as possible executables. In particular, we seek to improve the code size obtained by the LLVM inliner executed with the -Oz option. One important aspect is whether or not this problem requires a global solution that considers the full span of the call graph or a local solution (as is the case with the LLVM inliner) that decides whether to apply inlining to each call separately based on the expected code-size improvement. We have implemented a global type of inlining algorithm called Mutual Inlining that selects the next call-site (f()callsg() to be inline based on its global properties. The first property is the number of calls to g(). Next property is determining if inlining g() to f() may prevent inlining other more beneficial neighboring callsites. Finaly repeated inlining iterations over the call graph are performed until there are no more beneficial inlinings to perform. Hence, considering the effect of previously made inlinings on the next call-site to be inline. Our results show small but consistant improvement compare to LLVM’s Oz.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122602443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning Frameworks Evaluation for Image Classification on Resource Constrained Device","authors":"Mathieu Febvay, Ahmed Bounekkar","doi":"10.5121/csit.2022.120603","DOIUrl":"https://doi.org/10.5121/csit.2022.120603","url":null,"abstract":"Each new generation of smartphone gains capabilities that increase performance and power efficiency allowing us to use them for increasingly complex calculations such as Deep Learning. This paper implemented four Android deep learning inference frameworks (TFLite, MNN, NCNN and PyTorch) to evaluate the most recent generation of System On a Chip (SoC) Samsung Exynos 2100, Qualcomm Snapdragon 865+ and 865. Our work focused on image classification task using five state-of-the-art models. The 50 000 images of the ImageNet 2012 validation subset were inferred. Latency and accuracy with various scenarios like CPU, OpenCL, Vulkan with and without multi-threading were measured. Power efficiency and realworld use-case were evaluated from these results as we run the same experiment on the device's camera stream until they consumed 3% of their battery. Our results show that low-level software optimizations, image pre-processing algorithms, conversion process and cooling design have an impact on latency, accuracy and energy efficiency.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128365282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unsupervised Blind Image Quality Assessment based on Multi-Feature Fusion","authors":"Qinglin He, Chao Yang, P. An","doi":"10.5121/csit.2022.120627","DOIUrl":"https://doi.org/10.5121/csit.2022.120627","url":null,"abstract":"Image quality affects the visual experience of observers. How to accurately evaluate image quality has been widely studied by researchers. Unsupervised blind image quality assessment (BIQA) requires less prior knowledge than supervised ones. Besides, there is a trade-off between accuracy and complexity in most existing BIQA methods. In this paper, we propose an unsupervised BIQA framework that aims for both high accuracy and low complexity. To represent the image structure information, we employ Phase Congruency (PC) and gradient. After that, we calculate the mean subtracted and contrast normalized (MSCN) coefficient and the Karhunen-Loéve transform (KLT) coefficient to represent the naturalness of the images. Finally, features extracted from both the pristine and the distorted images are adopted to calculate the image quality with Multivariate Gaussian (MVG) model. Experiments conducted on six IQA databases demonstrate that the proposed method achieves better performance than the state-of-the-art BIQA methods.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115066745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"(In-)Approximability Results for Interval, Resource Restricted, and Low Rank Scheduling","authors":"M. Maack, Simon Pukrop, A. R. Rasmussen","doi":"10.48550/arXiv.2203.06171","DOIUrl":"https://doi.org/10.48550/arXiv.2203.06171","url":null,"abstract":"We consider variants of the restricted assignment problem where a set of jobs has to be assigned to a set of machines, for each job a size and a set of eligible machines is given, and the jobs may only be assigned to eligible machines with the goal of makespan minimization. For the variant with interval restrictions, where the machines can be arranged on a path such that each job is eligible on a subpath, we present the first better than $2$-approximation and an improved inapproximability result. In particular, we give a $(2-frac{1}{24})$-approximation and show that no better than $9/8$-approximation is possible, unless P=NP. Furthermore, we consider restricted assignment with $R$ resource restrictions and rank $D$ unrelated scheduling. In the former problem, a machine may process a job if it can meet its resource requirements regarding $R$ (renewable) resources. In the latter, the size of a job is dependent on the machine it is assigned to and the corresponding processing time matrix has rank at most $D$. The problem with interval restrictions includes the 1 resource variant, is encompassed by the 2 resource variant, and regarding approximation the $R$ resource variant is essentially a special case of the rank $R+1$ problem. We show that no better than $3/2$, $8/7$, and $3/2$-approximation is possible (unless P=NP) for the 3 resource, 2 resource, and rank 3 variant, respectively. Both the approximation result for the interval case and the inapproximability result for the rank 3 variant are solutions to open challenges stated in previous works. Lastly, we also consider the reverse objective, that is, maximizing the minimal load any machine receives, and achieve similar results.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115862763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Turbocharging Heuristics for Weak Coloring Numbers","authors":"Alexander Dobler, Manuel Sorge, Anaïs Villedieu","doi":"10.48550/arXiv.2203.03358","DOIUrl":"https://doi.org/10.48550/arXiv.2203.03358","url":null,"abstract":"Bounded expansion and nowhere-dense classes of graphs capture the theoretical tractability for several important algorithmic problems. These classes of graphs can be characterized by the so-called weak coloring numbers of graphs, which generalize the well-known graph invariant degeneracy (also called k-core number). Being NP-hard, weak-coloring numbers were previously computed on real-world graphs mainly via incremental heuristics. We study whether it is feasible to augment such heuristics with exponential-time subprocedures that kick in when a desired upper bound on the weak coloring number is breached. We provide hardness and tractability results on the corresponding computational subproblems. We implemented several of the resulting algorithms and show them to be competitive with previous approaches on a previously studied set of benchmark instances containing 86 graphs with up to 183831 edges. We obtain improved weak coloring numbers for over half of the instances.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"532 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128565230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}