首页 > 最新文献

2012 Fourth International Conference on Computational and Information Sciences最新文献

英文 中文
Steady-State Model and Its Application in Natural Gas during Transportation in Pipeline 天然气管道输送过程稳态模型及其应用
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.291
Yan Hongdong, You Yun
This paper built the forecasting model that can predict the temperature, pressure and flow along natural gas pipeline according to pipe flow equations. Improved Euler method is used to solve these equations. The changes of gas velocity and temperature along pipeline are included to improve the accuracy and precision of the simulation. A MATLAB program has been developed to implement the algorithm. Comparisons between this program and the professional gas pipeline simulation software show that the proposed algorithm in this paper has higher accuracy.
根据管道流动方程,建立了能够预测天然气管道温度、压力和流量的预测模型。采用改进的欧拉法求解这些方程。为了提高仿真的准确性和精度,还考虑了气体速度和温度沿管道的变化。并开发了MATLAB程序来实现该算法。通过与专业燃气管道仿真软件的比较,表明本文算法具有较高的精度。
{"title":"Steady-State Model and Its Application in Natural Gas during Transportation in Pipeline","authors":"Yan Hongdong, You Yun","doi":"10.1109/ICCIS.2012.291","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.291","url":null,"abstract":"This paper built the forecasting model that can predict the temperature, pressure and flow along natural gas pipeline according to pipe flow equations. Improved Euler method is used to solve these equations. The changes of gas velocity and temperature along pipeline are included to improve the accuracy and precision of the simulation. A MATLAB program has been developed to implement the algorithm. Comparisons between this program and the professional gas pipeline simulation software show that the proposed algorithm in this paper has higher accuracy.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132409637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computational Rationality of Formal Analysis on Cryptographic Protocols 密码协议形式分析的计算合理性
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.111
S. Liu, J. Ye
This paper describes and discusses the computational rationality of formal analysis on cryptographic protocols, which is based on the computational rationality theorem of formal encrypt on Abadi-Rowgaway. Analysis of group key distribution protocol shows that the theorem has strong analytical ability to the protocols alternative attacks. The paper presents formal methods on group key distribution protocols, and the formal definition of security in the computational method. Finally, it proves its rationality.
本文以Abadi-Rowgaway上形式加密的计算合理性定理为基础,描述和讨论了密码协议形式分析的计算合理性。对组密钥分发协议的分析表明,该定理对协议替代攻击具有较强的分析能力。本文给出了组密钥分发协议的形式化方法,并在计算方法中给出了安全性的形式化定义。最后,证明了其合理性。
{"title":"Computational Rationality of Formal Analysis on Cryptographic Protocols","authors":"S. Liu, J. Ye","doi":"10.1109/ICCIS.2012.111","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.111","url":null,"abstract":"This paper describes and discusses the computational rationality of formal analysis on cryptographic protocols, which is based on the computational rationality theorem of formal encrypt on Abadi-Rowgaway. Analysis of group key distribution protocol shows that the theorem has strong analytical ability to the protocols alternative attacks. The paper presents formal methods on group key distribution protocols, and the formal definition of security in the computational method. Finally, it proves its rationality.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133693019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study of the Impact of Limitation of the Amount of Vehicles in Beijing Based on Mathematic Modeling 基于数学模型的北京市机动车限行影响研究
Hao-min Zhang, Bo-ying Shi
In order to study the limitation of the amount of vehicles in Beijing and especially the impact of "Lottery" policy for controlling the car growth in Beijing, a mathematic model was built to simulate the current car growth in Beijing and compare the growth model with the Logistic growth model to see if it is effective to control the rapid growth of vehicles in Beijing by using these limitations and the new car policy. As a result, the model shows that the limitation of cars in Beijing as well as the "Lottery" policy in Beijing is effective ways to help slow down the fast growth of cars in Beijing. Moreover, based on the model in this paper, five suggestions to improve transport problems were given.
为了研究北京市机动车保有量的有限性,特别是“摇号”政策对北京市机动车保有量增长的影响,本文建立了一个数学模型,对北京市目前的机动车保有量增长进行模拟,并将增长模型与Logistic增长模型进行比较,看看利用机动车保有量的有限性和机动车新政对北京市机动车保有量的快速增长是否有效。因此,该模型表明,北京的汽车限制以及北京的“摇号”政策是帮助减缓北京汽车快速增长的有效途径。在此基础上,提出了改善交通问题的五点建议。
{"title":"A Study of the Impact of Limitation of the Amount of Vehicles in Beijing Based on Mathematic Modeling","authors":"Hao-min Zhang, Bo-ying Shi","doi":"10.1109/ICCIS.2012.49","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.49","url":null,"abstract":"In order to study the limitation of the amount of vehicles in Beijing and especially the impact of \"Lottery\" policy for controlling the car growth in Beijing, a mathematic model was built to simulate the current car growth in Beijing and compare the growth model with the Logistic growth model to see if it is effective to control the rapid growth of vehicles in Beijing by using these limitations and the new car policy. As a result, the model shows that the limitation of cars in Beijing as well as the \"Lottery\" policy in Beijing is effective ways to help slow down the fast growth of cars in Beijing. Moreover, based on the model in this paper, five suggestions to improve transport problems were given.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130405984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rapdos: A RFID Authentication Protocol for Defending against DoS Rapdos:一种防御DoS的RFID认证协议
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.215
Zhao Wang, Xuesong Zhang, Zhong Chen
Radio frequency identification (RFID) technology is a non-contact automatic identification technology. The basic principle of RFID is coupled with radio frequency signal and the spatial transmission characteristics. From object recognition to achieve automatic recognition, RFID has the advantages of being effective, diversity, high capacity, low cost, anti-pollution, penetrating and so on. However, current RFID authentication protocols cannot defend against DoS attack. This paper proposes Rapdos, a novel mutual authentication protocol, which is based on the use of symmetric encryption and dynamic update key to prevent the DoS attack. The experiment has validated that Rapdos has provided good security for RFID system, and can defeat location privacy attack, relay attack, eavesdropping attack, denial-of-service attack, and solve problems of RFID security privacy.
射频识别(RFID)技术是一种非接触式自动识别技术。RFID的基本原理是结合射频信号的空间传输特性。从物体识别到实现自动识别,RFID具有有效、多样、容量大、成本低、抗污染、穿透性强等优点。然而,现有的RFID认证协议无法抵御DoS攻击。本文提出了一种新的互认证协议Rapdos,该协议利用对称加密和动态更新密钥来防止DoS攻击。实验验证了Rapdos为RFID系统提供了良好的安全性,能够挫败位置隐私攻击、中继攻击、窃听攻击、拒绝服务攻击,解决RFID安全隐私问题。
{"title":"Rapdos: A RFID Authentication Protocol for Defending against DoS","authors":"Zhao Wang, Xuesong Zhang, Zhong Chen","doi":"10.1109/ICCIS.2012.215","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.215","url":null,"abstract":"Radio frequency identification (RFID) technology is a non-contact automatic identification technology. The basic principle of RFID is coupled with radio frequency signal and the spatial transmission characteristics. From object recognition to achieve automatic recognition, RFID has the advantages of being effective, diversity, high capacity, low cost, anti-pollution, penetrating and so on. However, current RFID authentication protocols cannot defend against DoS attack. This paper proposes Rapdos, a novel mutual authentication protocol, which is based on the use of symmetric encryption and dynamic update key to prevent the DoS attack. The experiment has validated that Rapdos has provided good security for RFID system, and can defeat location privacy attack, relay attack, eavesdropping attack, denial-of-service attack, and solve problems of RFID security privacy.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116887973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximate Merging of a Pair of DP Curves 一对DP曲线的近似合并
Huahui Cai, Yan Cheng
This paper deals with the approximate merging problem of two adjacent DP curves with different degrees by a single curve. We first transform the DP curves into the Bézier curves. Then, we merge Bézier curves. Finally, we transform the Bézier curve back into the DP curve. In the end of this paper, numerical examples are provided to demonstrate the validity and efficiency of our algorithms.
本文研究了两条相邻的不同度数的DP曲线用一条曲线近似合并的问题。我们首先把DP曲线转换成bsamzier曲线。然后,我们合并bsamizier曲线。最后,我们将bsamizier曲线转换回DP曲线。最后通过数值算例验证了算法的有效性和高效性。
{"title":"Approximate Merging of a Pair of DP Curves","authors":"Huahui Cai, Yan Cheng","doi":"10.1109/ICCIS.2012.88","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.88","url":null,"abstract":"This paper deals with the approximate merging problem of two adjacent DP curves with different degrees by a single curve. We first transform the DP curves into the Bézier curves. Then, we merge Bézier curves. Finally, we transform the Bézier curve back into the DP curve. In the end of this paper, numerical examples are provided to demonstrate the validity and efficiency of our algorithms.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131189984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web Viral Marketing Based Construction Strategy of Customer Trust Network 基于网络病毒式营销的客户信任网络构建策略
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.363
Xiufeng Xia, Ying Li, Lihui Cong
Trust relationship and assessment are two challenges of constructing large scale trust network for web viral marketing applications. Because different customers have different needs and expectations in different aspects of the service and due to the customer's self-property, trading amount, trading time, trading evaluation and trading risk perception factors, etc. The trust assessment among customers is hard to measure and difficult to give accurate quantification. In order to solve the problem, in this paper, a customer trust network model based on the above factors and combined with cognitive theories and methods of e-Business is implemented and three strategies, customer occupation based construction strategy, customer domain based construction strategy and customer occupation and domain based construction strategy, are used for constructing trust network. During the construction process, the method of trust computation in each strategy is introduced. The Experiment results show that the model and these strategies can reduce the complexity of trust relationship and with guaranteed trust value as a premise, improve the coverage rate of trust network.
信任关系与评估是构建大规模网络病毒式营销信任网络所面临的两大挑战。因为不同的客户对服务的不同方面有不同的需求和期望,并且由于客户自身的属性、交易量、交易时间、交易评价和交易风险感知等因素。客户之间的信任评估难以测量,难以准确量化。为了解决这一问题,本文基于上述因素,结合电子商务的认知理论和方法,构建了一个客户信任网络模型,并采用基于客户职业的构建策略、基于客户领域的构建策略和基于客户职业和领域的构建策略来构建信任网络。在构建过程中,介绍了各策略中的信任计算方法。实验结果表明,该模型和这些策略可以降低信任关系的复杂性,并以保证信任值为前提,提高信任网络的覆盖率。
{"title":"Web Viral Marketing Based Construction Strategy of Customer Trust Network","authors":"Xiufeng Xia, Ying Li, Lihui Cong","doi":"10.1109/ICCIS.2012.363","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.363","url":null,"abstract":"Trust relationship and assessment are two challenges of constructing large scale trust network for web viral marketing applications. Because different customers have different needs and expectations in different aspects of the service and due to the customer's self-property, trading amount, trading time, trading evaluation and trading risk perception factors, etc. The trust assessment among customers is hard to measure and difficult to give accurate quantification. In order to solve the problem, in this paper, a customer trust network model based on the above factors and combined with cognitive theories and methods of e-Business is implemented and three strategies, customer occupation based construction strategy, customer domain based construction strategy and customer occupation and domain based construction strategy, are used for constructing trust network. During the construction process, the method of trust computation in each strategy is introduced. The Experiment results show that the model and these strategies can reduce the complexity of trust relationship and with guaranteed trust value as a premise, improve the coverage rate of trust network.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131411806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Study on Mathmatical Model of Fluid Flow through Porous Medium about Multi-layer Fault Block Oil Reservoir Coupling with Benching-Horizontal Well 多层断块油藏与台水平井耦合渗流数学模型研究
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.355
Pang Jin, Lei Guanglun, Zhang Liya, Tang Huijie
The mechanism and rule of fluid flow through porous medium about multi-layer complex fault block oil reservoir's developing through benching-horizontal well is completed. On the basis of mathmatical model in transient period, this paper established a mathmatical model about benching-horizontal well which pass through multi-layer reservoirs unconnected reciprocally coupled with reservoir. We resoluted this model through Laplace transforming, Stehfest inverting and conjugate gradient method. Compared with the computational solution from saphir, this model is of high reliability. Through this model on a given fault block oil reservoir, we can compute the downhole-pressure and deliverability distribution in different producing periods. This model presented some theory basis for the study on reservoir engineer of multi-layer complex fault block oil reservoir's developing through benching-horizontal well.
完成了多层复杂断块油藏水平井开发流体在多孔介质中的渗流机理和规律。在建立暂态数学模型的基础上,建立了不连通的多层储层与储层相互耦合的台阶水平井的数学模型。通过拉普拉斯变换、Stehfest反演和共轭梯度法对该模型进行了求解。与蓝宝石的计算解相比,该模型具有较高的可靠性。通过该模型,可以计算出给定断块油藏在不同开采时期的井下压力和产能分布。该模型为水平井开发多层复杂断块油藏的油藏工程师研究提供了一定的理论依据。
{"title":"The Study on Mathmatical Model of Fluid Flow through Porous Medium about Multi-layer Fault Block Oil Reservoir Coupling with Benching-Horizontal Well","authors":"Pang Jin, Lei Guanglun, Zhang Liya, Tang Huijie","doi":"10.1109/ICCIS.2012.355","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.355","url":null,"abstract":"The mechanism and rule of fluid flow through porous medium about multi-layer complex fault block oil reservoir's developing through benching-horizontal well is completed. On the basis of mathmatical model in transient period, this paper established a mathmatical model about benching-horizontal well which pass through multi-layer reservoirs unconnected reciprocally coupled with reservoir. We resoluted this model through Laplace transforming, Stehfest inverting and conjugate gradient method. Compared with the computational solution from saphir, this model is of high reliability. Through this model on a given fault block oil reservoir, we can compute the downhole-pressure and deliverability distribution in different producing periods. This model presented some theory basis for the study on reservoir engineer of multi-layer complex fault block oil reservoir's developing through benching-horizontal well.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128419460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Realization of the Graphic System of Power System Based on Browser/Server Model 基于浏览器/服务器模式的电力系统图形化系统的设计与实现
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.123
Si-qing Sheng, Junsheng Li, Xin Wu, Lei Hou, L. Fan
As for the graphical modeling software of current domestic power system, it used mostly to be the stand-alone edition or based on C/S (client-server) mode. Compared with the B/S (browser/server) mode, there are some shortcomings in software installation, upgrade and maintenance. This paper aims at developing the graphical modeling software of power system, which is based on the B/S mode, making most use of the latest research result of on computer technology, web technology and Ajax technology. Then the software turns to be very suitable for power system's graphic modeling, meanwhile, it enable to greatly improve the designers' working efficiency, with and has some realistic and utilizing value.
目前国内电力系统的图形化建模软件多为单机版或基于C/S (client-server)模式。与B/S(浏览器/服务器)模式相比,在软件安装、升级和维护方面存在一些不足。本文旨在充分利用计算机技术、web技术和Ajax技术的最新研究成果,开发基于B/S模式的电力系统图形化建模软件。该软件非常适合电力系统的图形化建模,同时大大提高了设计人员的工作效率,具有一定的现实和利用价值。
{"title":"Design and Realization of the Graphic System of Power System Based on Browser/Server Model","authors":"Si-qing Sheng, Junsheng Li, Xin Wu, Lei Hou, L. Fan","doi":"10.1109/ICCIS.2012.123","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.123","url":null,"abstract":"As for the graphical modeling software of current domestic power system, it used mostly to be the stand-alone edition or based on C/S (client-server) mode. Compared with the B/S (browser/server) mode, there are some shortcomings in software installation, upgrade and maintenance. This paper aims at developing the graphical modeling software of power system, which is based on the B/S mode, making most use of the latest research result of on computer technology, web technology and Ajax technology. Then the software turns to be very suitable for power system's graphic modeling, meanwhile, it enable to greatly improve the designers' working efficiency, with and has some realistic and utilizing value.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134379827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dual-Core Architecture for Dynamic Binary Translation System: Tradeoff between Frequency and Bandwidth 动态二进制转换系统的双核架构:频率和带宽之间的权衡
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.133
Xu Fan, Shen Li, W. Zhiying
Traditional DBT system is hard to accelerate by introducing a customized processor core because the startup overhead is hard to eliminate. In this paper, we concentrate on how to choose a suitable layout of the DBT core in a dual-core system. We analyze the tradeoff between the frequency and the memory bandwidth of the DBT core through an analytical model, and simulated 4 different and usual layouts of dual-core DBT in experiments. Finally, the validation of our model is verified through experimental results: the dual-core DBT framework can sharply reduce the startup overhead and speedup the translation-execution process by about 12%. Moreover, we also found the relationship between the code expand rate and the communication overhead: the performance of a program with high code expand rate is not sensitive to the communication speed of the platform.
传统的DBT系统很难通过引入定制的处理器内核来加速,因为启动开销很难消除。本文主要讨论如何在双核系统中选择合适的DBT核心布局。通过分析模型分析了DBT核心的频率和存储带宽之间的权衡,并在实验中模拟了4种不同和常见的双核DBT布局。最后,通过实验结果验证了我们的模型的有效性:双核DBT框架可以大幅降低启动开销,并将翻译执行过程加快约12%。此外,我们还发现了代码扩展率与通信开销之间的关系:高代码扩展率的程序的性能对平台的通信速度不敏感。
{"title":"Dual-Core Architecture for Dynamic Binary Translation System: Tradeoff between Frequency and Bandwidth","authors":"Xu Fan, Shen Li, W. Zhiying","doi":"10.1109/ICCIS.2012.133","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.133","url":null,"abstract":"Traditional DBT system is hard to accelerate by introducing a customized processor core because the startup overhead is hard to eliminate. In this paper, we concentrate on how to choose a suitable layout of the DBT core in a dual-core system. We analyze the tradeoff between the frequency and the memory bandwidth of the DBT core through an analytical model, and simulated 4 different and usual layouts of dual-core DBT in experiments. Finally, the validation of our model is verified through experimental results: the dual-core DBT framework can sharply reduce the startup overhead and speedup the translation-execution process by about 12%. Moreover, we also found the relationship between the code expand rate and the communication overhead: the performance of a program with high code expand rate is not sensitive to the communication speed of the platform.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134500156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Storage and Solving of Large Sparse Matrix Linear Equations 大型稀疏矩阵线性方程的存储与求解
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.293
Chao Liu, Junmin Ye, Yining Ma
Solving of large sparse matrix linear equations is always the research focus of scientific and engineering calculation field. With the sparsity and symmetry characteristics of coefficient matrix, Compressed Sparse Row (CSR) is adopted in the storage of large sparse matrix linear equations. Under the condition of CSR, Symmetrica Successive Over Relaxations-Preconditioned Conjugate Gradient method (SSOR-PCG) is employed in the solution of large sparse matrix linear equations.
求解大型稀疏矩阵线性方程组一直是科学计算和工程计算领域的研究热点。利用系数矩阵的稀疏性和对称性特点,采用压缩稀疏行(Compressed Sparse Row, CSR)存储大型稀疏矩阵线性方程。在CSR条件下,采用对称连续过松弛-预条件共轭梯度法(SSOR-PCG)求解大型稀疏矩阵线性方程组。
{"title":"Storage and Solving of Large Sparse Matrix Linear Equations","authors":"Chao Liu, Junmin Ye, Yining Ma","doi":"10.1109/ICCIS.2012.293","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.293","url":null,"abstract":"Solving of large sparse matrix linear equations is always the research focus of scientific and engineering calculation field. With the sparsity and symmetry characteristics of coefficient matrix, Compressed Sparse Row (CSR) is adopted in the storage of large sparse matrix linear equations. Under the condition of CSR, Symmetrica Successive Over Relaxations-Preconditioned Conjugate Gradient method (SSOR-PCG) is employed in the solution of large sparse matrix linear equations.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133056207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2012 Fourth International Conference on Computational and Information Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1