首页 > 最新文献

2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)最新文献

英文 中文
Wandering Path Visualization System Prototype for Finding Wandering Elderly People Using BLE Beacon 利用BLE信标寻找流浪老人的漫游路径可视化系统原型
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00095
Tomoya Arakawa, Shun Shiramatsu, Akira Iwata
In this study, we focused on wandering behavior, which is one of symptoms of dementia patients, and developed a system for watching over such patients. In our proposed method, Bluetooth Low Energy (BLE) beacons were carried by elderly people with dementia. We installed fixed receivers in the town where we conducted this study. We visualized the wandering route by using the reception history of the BLE beacon that can be acquired from the fixed receiver. In this paper, we aimed to develop an interface that enables us to check the history of actions to narrow down the search range when an elderly person with dementia is missing. Also, by using this interface, his/her family and caregivers can check that an elderly person with dementia is in a safe place. Particularly, (1) because the signal range of the BLE beacon has been improved, it became possible for some fixed receivers to receive signal, and this solved the problem of detecting an elderly person with dementia in the vicinity. Furthermore, (2) merely displaying the shortest route is insufficient for the purpose of searching for a wandering route, and it was necessary to be able to display detour routes. To deal with these two problems, we developed a method to acquire only the reception history of the BLE beacon that is considered necessary for route visualization.
在这项研究中,我们专注于流浪行为,这是痴呆症患者的症状之一,并开发了一个系统来监视这类患者。在我们提出的方法中,蓝牙低功耗(BLE)信标由老年痴呆症患者携带。我们在进行这项研究的城镇安装了固定接收器。我们利用从固定接收机获取的BLE信标接收历史来可视化漫游路线。在本文中,我们的目标是开发一个界面,使我们能够检查行动的历史,以缩小搜索范围,当一个老年痴呆症患者失踪。此外,通过使用这个界面,他/她的家人和照顾者可以检查患有痴呆症的老人是否在安全的地方。特别是,(1)由于BLE信标的信号范围得到了提高,使得一些固定接收器可以接收到信号,从而解决了检测附近老年痴呆症患者的问题。此外,(2)仅显示最短路线不足以满足寻找流浪路线的目的,需要能够显示绕行路线。为了解决这两个问题,我们开发了一种只获取BLE信标的接收历史的方法,这种方法被认为是路由可视化所必需的。
{"title":"Wandering Path Visualization System Prototype for Finding Wandering Elderly People Using BLE Beacon","authors":"Tomoya Arakawa, Shun Shiramatsu, Akira Iwata","doi":"10.1109/CANDARW.2018.00095","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00095","url":null,"abstract":"In this study, we focused on wandering behavior, which is one of symptoms of dementia patients, and developed a system for watching over such patients. In our proposed method, Bluetooth Low Energy (BLE) beacons were carried by elderly people with dementia. We installed fixed receivers in the town where we conducted this study. We visualized the wandering route by using the reception history of the BLE beacon that can be acquired from the fixed receiver. In this paper, we aimed to develop an interface that enables us to check the history of actions to narrow down the search range when an elderly person with dementia is missing. Also, by using this interface, his/her family and caregivers can check that an elderly person with dementia is in a safe place. Particularly, (1) because the signal range of the BLE beacon has been improved, it became possible for some fixed receivers to receive signal, and this solved the problem of detecting an elderly person with dementia in the vicinity. Furthermore, (2) merely displaying the shortest route is insufficient for the purpose of searching for a wandering route, and it was necessary to be able to display detour routes. To deal with these two problems, we developed a method to acquire only the reception history of the BLE beacon that is considered necessary for route visualization.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134266500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding 基于自动阈值的SDN分布式网络攻击检测
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00083
Ryousuke Komiya, Yaokai Feng, K. Sakurai
Distributed Cyber Attack launched from many hosts simultaneously has become one of the most sophisticated and the most dangerous attacks in the cyber world including the traditional Internet and the SDN (Software Defined Networking) environments. As a kind of centralized network environment, the SDN has been greatly developed and popularized in recent years, especially in cloud systems. Thus, how to efficiently detect distributed attacks in SDN environments has attracted great attentions in academia and industry and various researches have been done to counter such attacks. The latest related researches made attempts to exploit the information of the PacketIn packets collected in the SDN controller and those methods proved efficient for detecting distributed cyber attacks in SDN environments. However, such methods adopted a threshold for distinguishing between attacks and normal situations. The threshold must be properly determined manually in advance, which is not easy in many applications even for experts. In this study, we try to automatically extract a proper threshold from the historical data of the monitored SDN environment so that the difficult parameter-tuning (determination of the threshold) process can be removed. In addition, because the extracted threshold can well reflect the actual situations of the monitored environment, a better detection performance than the existing approaches can be expected. The detection performance of our proposal is also tested using real traffic data.
从多台主机同时发起的分布式网络攻击已经成为包括传统互联网和软件定义网络(SDN)环境在内的网络世界中最复杂、最危险的攻击之一。SDN作为一种集中式网络环境,近年来得到了很大的发展和普及,尤其是在云系统中。因此,如何有效地检测SDN环境下的分布式攻击受到了学术界和业界的高度关注,针对这种攻击进行了各种研究。最新的相关研究尝试利用SDN控制器中收集的PacketIn数据包的信息,这些方法对于检测SDN环境下的分布式网络攻击是有效的。然而,这些方法采用了一个阈值来区分攻击和正常情况。阈值必须提前手动确定,这在许多应用中并不容易,即使对于专家也是如此。在本研究中,我们尝试从监控的SDN环境的历史数据中自动提取适当的阈值,从而消除困难的参数调优(阈值的确定)过程。此外,由于提取的阈值可以很好地反映被监测环境的实际情况,因此可以预期比现有方法具有更好的检测性能。本文还利用实际交通数据测试了该算法的检测性能。
{"title":"Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding","authors":"Ryousuke Komiya, Yaokai Feng, K. Sakurai","doi":"10.1109/CANDARW.2018.00083","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00083","url":null,"abstract":"Distributed Cyber Attack launched from many hosts simultaneously has become one of the most sophisticated and the most dangerous attacks in the cyber world including the traditional Internet and the SDN (Software Defined Networking) environments. As a kind of centralized network environment, the SDN has been greatly developed and popularized in recent years, especially in cloud systems. Thus, how to efficiently detect distributed attacks in SDN environments has attracted great attentions in academia and industry and various researches have been done to counter such attacks. The latest related researches made attempts to exploit the information of the PacketIn packets collected in the SDN controller and those methods proved efficient for detecting distributed cyber attacks in SDN environments. However, such methods adopted a threshold for distinguishing between attacks and normal situations. The threshold must be properly determined manually in advance, which is not easy in many applications even for experts. In this study, we try to automatically extract a proper threshold from the historical data of the monitored SDN environment so that the difficult parameter-tuning (determination of the threshold) process can be removed. In addition, because the extracted threshold can well reflect the actual situations of the monitored environment, a better detection performance than the existing approaches can be expected. The detection performance of our proposal is also tested using real traffic data.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"2019 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131439237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Preconditioner Auto-Tuning Using Deep Learning for Sparse Iterative Algorithms 基于深度学习的稀疏迭代算法预调节器自动调谐
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00055
Kenya Yamada, T. Katagiri, H. Takizawa, K. Minami, M. Yokokawa, Toru Nagai, M. Ogino
In numerical libraries for sparse matrix operations, there are many tuning parameters related to implementation selection. Selection of different tuning parameters could result in totally different performance. Moreover, optimal implementation depends on the sparse matrices to be operated. It is difficult to find optimal implementation without executing each implementation and thereby examining its performance on a given sparse matrix. In this study, we propose an implementation selection method for sparse iterative algorithms and preconditioners in a numerical library using deep learning. The proposed method uses full color images to represent the features of a sparse matrix. We present an image generation method for partitioning a given matrix (to generate its feature image) so that the value of each matrix element is considered in the implementation selection. We then evaluate the effectiveness of the proposed method by conducting a numerical experiment. In this experiment, the accuracy of implementation selection is evaluated. The training data comprise a pair of sparse matrix and its optimal implementation. The optimal implementation of each sparse matrix in the training data is obtained in advance by executing every implementation and getting the best one. The experimental results obtained using the proposed method show that the accuracy of selecting the optimal implementation of each sparse matrix is 79.5%.
在稀疏矩阵运算的数值库中,有许多与实现选择相关的调优参数。选择不同的调优参数可能会导致完全不同的性能。此外,最优实现依赖于要操作的稀疏矩阵。如果不执行每个实现,从而检查其在给定稀疏矩阵上的性能,很难找到最佳实现。在本研究中,我们提出了一种基于深度学习的数值库稀疏迭代算法和预条件的实现选择方法。该方法使用全彩色图像来表示稀疏矩阵的特征。我们提出了一种分割给定矩阵的图像生成方法(以生成其特征图像),以便在实现选择中考虑每个矩阵元素的值。然后,我们通过进行数值实验来评估所提出方法的有效性。在本实验中,评估了实现选择的准确性。训练数据包括一对稀疏矩阵及其最优实现。通过对训练数据中每个稀疏矩阵的每一个实现进行执行,得到最优的实现,从而提前得到训练数据中每个稀疏矩阵的最优实现。实验结果表明,该方法对每个稀疏矩阵选择最优实现的准确率为79.5%。
{"title":"Preconditioner Auto-Tuning Using Deep Learning for Sparse Iterative Algorithms","authors":"Kenya Yamada, T. Katagiri, H. Takizawa, K. Minami, M. Yokokawa, Toru Nagai, M. Ogino","doi":"10.1109/CANDARW.2018.00055","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00055","url":null,"abstract":"In numerical libraries for sparse matrix operations, there are many tuning parameters related to implementation selection. Selection of different tuning parameters could result in totally different performance. Moreover, optimal implementation depends on the sparse matrices to be operated. It is difficult to find optimal implementation without executing each implementation and thereby examining its performance on a given sparse matrix. In this study, we propose an implementation selection method for sparse iterative algorithms and preconditioners in a numerical library using deep learning. The proposed method uses full color images to represent the features of a sparse matrix. We present an image generation method for partitioning a given matrix (to generate its feature image) so that the value of each matrix element is considered in the implementation selection. We then evaluate the effectiveness of the proposed method by conducting a numerical experiment. In this experiment, the accuracy of implementation selection is evaluated. The training data comprise a pair of sparse matrix and its optimal implementation. The optimal implementation of each sparse matrix in the training data is obtained in advance by executing every implementation and getting the best one. The experimental results obtained using the proposed method show that the accuracy of selecting the optimal implementation of each sparse matrix is 79.5%.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132868056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Mitigating Use-after-Free Attack Using Library Considering Size and Number of Freed Memory 考虑释放内存的大小和数量,使用库来缓解释放后使用攻击
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00080
Yuya Ban, Toshihiro Yamauchi
Use-after-free (UAF) vulnerabilities, are abused by exploiting a dangling pointer that refers to a freed memory, location and then executing arbitrary code. Vulnerabilities are caused by bugs in software programs, particularly large scale programs such as browsers. We had previously proposed HeapRevolver, which prohibits freed memory area from being reused for a certain period. HeapRevolver on Windows uses the number of freed memory areas that are prohibited for reuse as a trigger to release the freed memory area. Alternatively, HeapRevolver uses the number of the freed memory areas as a threshold for releasing freed memory. However, when the size of individual freed memory area is large, HeapRevolver on Windows increases the memory overhead. In this paper, we propose an improved HeapRevolver for Windows considering the size and number of the freed memory areas. The improved HeapRevolver prohibits the reuse of a certain number of freed memory areas at a given time by considering the size and number of freed memory areas as thresholds. Evaluation results demonstrate that the improved HeapRevolver can prevent attacks that exploit UAF vulnerabilities. Particularly, when the size of individual freed memory area is small in a program, HeapRevolver is effective in decreasing the attack success rate.
释放后使用(UAF)漏洞,通过利用指向释放内存,位置然后执行任意代码的悬空指针来滥用。漏洞是由软件程序中的错误引起的,特别是浏览器等大型程序。我们以前提出过HeapRevolver,它禁止在一段时间内重用释放的内存区域。Windows上的HeapRevolver使用禁止重用的已释放内存区域的数量作为释放已释放内存区域的触发器。或者,HeapRevolver使用已释放内存区域的数量作为释放已释放内存的阈值。但是,当单个释放内存区域的大小很大时,Windows上的HeapRevolver会增加内存开销。在本文中,我们提出了一个改进的HeapRevolver用于Windows,考虑到释放内存区域的大小和数量。改进的HeapRevolver通过将释放内存区域的大小和数量视为阈值,禁止在给定时间重用一定数量的已释放内存区域。评估结果表明,改进的HeapRevolver可以防止利用UAF漏洞的攻击。特别是,当程序中单个释放内存区域的大小很小时,HeapRevolver可以有效地降低攻击成功率。
{"title":"Mitigating Use-after-Free Attack Using Library Considering Size and Number of Freed Memory","authors":"Yuya Ban, Toshihiro Yamauchi","doi":"10.1109/CANDARW.2018.00080","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00080","url":null,"abstract":"Use-after-free (UAF) vulnerabilities, are abused by exploiting a dangling pointer that refers to a freed memory, location and then executing arbitrary code. Vulnerabilities are caused by bugs in software programs, particularly large scale programs such as browsers. We had previously proposed HeapRevolver, which prohibits freed memory area from being reused for a certain period. HeapRevolver on Windows uses the number of freed memory areas that are prohibited for reuse as a trigger to release the freed memory area. Alternatively, HeapRevolver uses the number of the freed memory areas as a threshold for releasing freed memory. However, when the size of individual freed memory area is large, HeapRevolver on Windows increases the memory overhead. In this paper, we propose an improved HeapRevolver for Windows considering the size and number of the freed memory areas. The improved HeapRevolver prohibits the reuse of a certain number of freed memory areas at a given time by considering the size and number of freed memory areas as thresholds. Evaluation results demonstrate that the improved HeapRevolver can prevent attacks that exploit UAF vulnerabilities. Particularly, when the size of individual freed memory area is small in a program, HeapRevolver is effective in decreasing the attack success rate.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132709883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tile Art Image Generation Using Conditional Generative Adversarial Networks 使用条件生成对抗网络的图像生成
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00047
Naoki Matsumura, Hiroki Tokura, Yuki Kuroda, Yasuaki Ito, K. Nakano
Image-to-image translation is a task of mapping an image in one domain to a corresponding image in another domain. The task includes various types of problems such as super-resolution, colorization, and artistic style transfer. In recent years, with the advent of deep learning, the technology has been rapidly advanced. The main purpose of this paper is to propose a tile art image generation method using machine learning approach based on conditional generative adversarial networks. To make the training data set of tile art images, we adopted a square-pointillism image generation method using the greedy approach. After training, the proposed network can generate tile art images that have the structure of tiles and reproduce the original images well. As regards generating time, the greedy approach takes 1322 seconds to generate tile art image of size 4096x3072, while the proposed machine learning approach takes 0.593 seconds.
图像到图像的转换是将一个域中的图像映射到另一个域中的相应图像的任务。这项任务包括各种类型的问题,如超分辨率、着色和艺术风格转移。近年来,随着深度学习的出现,该技术得到了迅速发展。本文的主要目的是提出一种基于条件生成对抗网络的机器学习方法的瓷砖艺术图像生成方法。为了制作瓷砖艺术图像的训练数据集,我们采用了一种基于贪心方法的正方形点阵图像生成方法。经过训练,该网络可以生成具有瓷砖结构的瓷砖艺术图像,并能很好地再现原始图像。在生成时间方面,贪心方法生成尺寸为4096x3072的瓷砖图像需要1322秒,而提出的机器学习方法需要0.593秒。
{"title":"Tile Art Image Generation Using Conditional Generative Adversarial Networks","authors":"Naoki Matsumura, Hiroki Tokura, Yuki Kuroda, Yasuaki Ito, K. Nakano","doi":"10.1109/CANDARW.2018.00047","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00047","url":null,"abstract":"Image-to-image translation is a task of mapping an image in one domain to a corresponding image in another domain. The task includes various types of problems such as super-resolution, colorization, and artistic style transfer. In recent years, with the advent of deep learning, the technology has been rapidly advanced. The main purpose of this paper is to propose a tile art image generation method using machine learning approach based on conditional generative adversarial networks. To make the training data set of tile art images, we adopted a square-pointillism image generation method using the greedy approach. After training, the proposed network can generate tile art images that have the structure of tiles and reproduce the original images well. As regards generating time, the greedy approach takes 1322 seconds to generate tile art image of size 4096x3072, while the proposed machine learning approach takes 0.593 seconds.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114314317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Application of an Online Questionnaire to Secure the Diversity of Planungszelle Participant Attributes 在线问卷的应用,以确保计划参与者属性的多样性
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00075
Yoshiomi Otsuka, T. Aramaki
Planungszelle (PZ) has attracted attention as a new consensus formation method. One of the core features of PZ is random sampling of participants, aimed at securing the diversity of participant attributes. In this research, a method for selecting participants that ensures the diversity of their attributes was developed through an online questionnaire on PZ implementation to discuss the future of a sustainable water use system. To select PZ participants, we carried out a screening survey with registered monitors and asked candidates about their willingness to participate, as well as collected the demographics and psychographics of monitors. Participation requests were sent by e-mail, controlled by real-time monitoring with the demographics and psychographics information of candidates. This method enables the PZ organizer to easily control participant selection and reduces lead-time by a factor of ten in comparison with the traditional mail method.
Planungszelle (PZ)作为一种新的共识形成方法受到了广泛的关注。PZ的核心特征之一是参与者的随机抽样,旨在确保参与者属性的多样性。在本研究中,通过对PZ实施的在线问卷调查,开发了一种选择参与者的方法,以确保其属性的多样性,以讨论可持续用水系统的未来。为了选择PZ参与者,我们对注册监测员进行了筛选调查,询问了候选人的参与意愿,并收集了监测员的人口统计学和心理学数据。参与请求通过电子邮件发送,通过实时监测候选人的人口统计和心理信息来控制。这种方法使PZ组织者能够轻松地控制参与者的选择,并与传统的邮件方法相比,将交货时间缩短了十倍。
{"title":"Application of an Online Questionnaire to Secure the Diversity of Planungszelle Participant Attributes","authors":"Yoshiomi Otsuka, T. Aramaki","doi":"10.1109/CANDARW.2018.00075","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00075","url":null,"abstract":"Planungszelle (PZ) has attracted attention as a new consensus formation method. One of the core features of PZ is random sampling of participants, aimed at securing the diversity of participant attributes. In this research, a method for selecting participants that ensures the diversity of their attributes was developed through an online questionnaire on PZ implementation to discuss the future of a sustainable water use system. To select PZ participants, we carried out a screening survey with registered monitors and asked candidates about their willingness to participate, as well as collected the demographics and psychographics of monitors. Participation requests were sent by e-mail, controlled by real-time monitoring with the demographics and psychographics information of candidates. This method enables the PZ organizer to easily control participant selection and reduces lead-time by a factor of ten in comparison with the traditional mail method.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114712005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Performance of Transposition Algorithm of 3-D Data Array for Parallelization Using Message Passing Interface 利用消息传递接口提高并行化三维数据阵列转置算法的性能
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00094
Masahiro Arai, F. Akagi, Saneyasu Yamaguchi, K. Yoshida
Parallelization with a message passing interface (MPI) is useful for improving the performance of the LLG micromagnetics simulator used for analysis of magnetization behavior. However, it is necessary to transpose elements of 3-D data arrays to be consistent in the data. In this paper, we investigated two methods for improving the performance of the transpose processes. One divides 6-transpose-processes in a triple for loop into 6-triple for loops. The other transposes the elements of the 3-D data arrays in each process before the data is integrated by using MPI_Allgather(). We compared the effects of the two methods on improving performances on two supercomputers: Oakforest-PACS and Reedbush-U. The results show that the former method was only effective on Oakforest-PACS, but the latter method was effective on both computers.
具有消息传递接口(MPI)的并行化有助于提高用于磁化行为分析的LLG微磁模拟器的性能。然而,需要对三维数据数组中的元素进行转置,使其在数据中保持一致。在本文中,我们研究了两种改进转置过程性能的方法。我们把一个三重for循环中的6个转置过程分成6个三重for循环。另一个是在使用MPI_Allgather()对数据进行集成之前,在每个进程中对3-D数据数组的元素进行转置。我们在两台超级计算机Oakforest-PACS和Reedbush-U上比较了两种方法在提高性能方面的效果。结果表明,前一种方法仅对Oakforest-PACS有效,后一种方法在两台计算机上都有效。
{"title":"Improving Performance of Transposition Algorithm of 3-D Data Array for Parallelization Using Message Passing Interface","authors":"Masahiro Arai, F. Akagi, Saneyasu Yamaguchi, K. Yoshida","doi":"10.1109/CANDARW.2018.00094","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00094","url":null,"abstract":"Parallelization with a message passing interface (MPI) is useful for improving the performance of the LLG micromagnetics simulator used for analysis of magnetization behavior. However, it is necessary to transpose elements of 3-D data arrays to be consistent in the data. In this paper, we investigated two methods for improving the performance of the transpose processes. One divides 6-transpose-processes in a triple for loop into 6-triple for loops. The other transposes the elements of the 3-D data arrays in each process before the data is integrated by using MPI_Allgather(). We compared the effects of the two methods on improving performances on two supercomputers: Oakforest-PACS and Reedbush-U. The results show that the former method was only effective on Oakforest-PACS, but the latter method was effective on both computers.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115546866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DHT Clustering for Load Balancing Considering Blockchain Data Size 考虑区块链数据大小的负载均衡DHT聚类
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00022
Yudai Kaneko, T. Asaka
Blockchain technology which is the fundamental system of Bitcoin running on a peer-to-peer (P2P) network, has attracted a lot of attention. This enables a practical P2P electronic money system with Byzantine fault tolerance and stability with all participating nodes having the same transaction ledger and using a distributed consensus algorithm called Proof of Work (PoW) that performs calculation work called mining. Many studies have proposed methods of enhancing scalability in terms of transaction processing of blockchain, however few studies have proposed them in term of network load in a P2P network architecture. To solve these problems, we propose a method in which all nodes are separated into mining nodes in a pure P2P network and blockchain data having nodes in a distributed hash table (DHT) network. Kademlia is incorporated as DHT network for processing responsible blocks' data for each node cluster and broadcasting efficiently. The results of a broadcast simulation show that our method improved the redundancy rate and average number of messages in the networks.
区块链技术是比特币在点对点(P2P)网络上运行的基础系统,引起了人们的广泛关注。这使得实际的P2P电子货币系统具有拜占庭式容错性和稳定性,所有参与节点都具有相同的交易分类账,并使用称为工作量证明(PoW)的分布式共识算法来执行称为挖掘的计算工作。许多研究从区块链的事务处理方面提出了增强可扩展性的方法,但很少有研究从P2P网络架构的网络负载方面提出。为了解决这些问题,我们提出了一种方法,将所有节点分离为纯P2P网络中的挖掘节点和分布式哈希表(DHT)网络中具有节点的区块链数据。Kademlia被合并为DHT网络,用于处理每个节点集群的责任区块数据并有效地广播。广播仿真结果表明,该方法提高了网络的冗余率和平均消息数。
{"title":"DHT Clustering for Load Balancing Considering Blockchain Data Size","authors":"Yudai Kaneko, T. Asaka","doi":"10.1109/CANDARW.2018.00022","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00022","url":null,"abstract":"Blockchain technology which is the fundamental system of Bitcoin running on a peer-to-peer (P2P) network, has attracted a lot of attention. This enables a practical P2P electronic money system with Byzantine fault tolerance and stability with all participating nodes having the same transaction ledger and using a distributed consensus algorithm called Proof of Work (PoW) that performs calculation work called mining. Many studies have proposed methods of enhancing scalability in terms of transaction processing of blockchain, however few studies have proposed them in term of network load in a P2P network architecture. To solve these problems, we propose a method in which all nodes are separated into mining nodes in a pure P2P network and blockchain data having nodes in a distributed hash table (DHT) network. Kademlia is incorporated as DHT network for processing responsible blocks' data for each node cluster and broadcasting efficiently. The results of a broadcast simulation show that our method improved the redundancy rate and average number of messages in the networks.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design of an Incentive Decision Method for an Agriculture Information Sharing System 农业信息共享系统的激励决策方法设计
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00103
Joji Toshima, Akiko Takahashi
In Japan, agriculture is facing a crisis due to the aging of farmers and the shortage of successors. In addition, there is much work in agriculture based on know-how that new farmers cannot get easily; therefore, some new farmers give up farming after a few years. Consequently, it is necessary to share the know-how with new farmers. However, it is difficult to positively share the know-how due to the difficulty of verbalizing the know-how. Therefore, it is necessary to provide the know-how providers with an incentive. In this paper, we propose an incentive decision method using auto-negotiation while considering the intentions of the know-how providers. This method consists of agents that have utility functions, which express the intentions of farmers and a service. The performances of our method are investigated by simulation experiments. Specifically, we verify that the method collects more high-quality know-how while giving a lower incentive. Our results indicate that the proposed method better performs compared to the other simple methods we assume in the experiments.
在日本,由于农民老龄化和缺乏接班人,农业正面临危机。此外,在农业领域,有很多工作是建立在新农民不易掌握的技术基础上的;因此,一些新农民几年后就放弃了种地。因此,有必要与新农民分享技术诀窍。但是,由于技术难以用语言表达,因此很难积极地分享技术。因此,有必要向技术提供者提供激励。本文提出了一种考虑技术提供者意图的自协商激励决策方法。该方法由具有效用函数的代理组成,这些代理表示农民和服务的意图。通过仿真实验验证了该方法的性能。具体而言,我们验证了该方法在给予较低激励的同时收集了更多高质量的专有技术。实验结果表明,该方法比我们在实验中假设的其他简单方法具有更好的性能。
{"title":"Design of an Incentive Decision Method for an Agriculture Information Sharing System","authors":"Joji Toshima, Akiko Takahashi","doi":"10.1109/CANDARW.2018.00103","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00103","url":null,"abstract":"In Japan, agriculture is facing a crisis due to the aging of farmers and the shortage of successors. In addition, there is much work in agriculture based on know-how that new farmers cannot get easily; therefore, some new farmers give up farming after a few years. Consequently, it is necessary to share the know-how with new farmers. However, it is difficult to positively share the know-how due to the difficulty of verbalizing the know-how. Therefore, it is necessary to provide the know-how providers with an incentive. In this paper, we propose an incentive decision method using auto-negotiation while considering the intentions of the know-how providers. This method consists of agents that have utility functions, which express the intentions of farmers and a service. The performances of our method are investigated by simulation experiments. Specifically, we verify that the method collects more high-quality know-how while giving a lower incentive. Our results indicate that the proposed method better performs compared to the other simple methods we assume in the experiments.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121348233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incentive Driving Multipath Inter-Domain Routing 激励驱动多路径域间路由
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00067
Donghong Qin, Lina Ge, Ting Lv
To deploy multipath inter-domain routing, this paper tries to integrate our designed incentive mechanism into multipath inter-domain routing and propose an Incentive Driving Multi-path Inter-domain Routing scheme (IDMIR). Under the incentive mechanism, it can collect the path-let information from the selected nodes from the feasible BGP paths and build a scale-limited topology to compute the special routes. Meanwhile, it can adjust the protocol performance by configuring the path-let visibility degree (R) and topological nodes size (N). The simulation results demonstrate that IDMIR has strong path discovery capability with reasonable overhead.
为了部署多路径域间路由,本文尝试将设计的激励机制整合到多路径域间路由中,提出了一种激励驱动的多路径域间路由方案(IDMIR)。在激励机制下,从可行的BGP路径中选取节点收集路径let信息,并构建限尺度拓扑来计算特殊路由。同时,通过配置路径让可见度R和拓扑节点大小N来调整协议性能。仿真结果表明,IDMIR具有较强的路径发现能力和合理的开销。
{"title":"Incentive Driving Multipath Inter-Domain Routing","authors":"Donghong Qin, Lina Ge, Ting Lv","doi":"10.1109/CANDARW.2018.00067","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00067","url":null,"abstract":"To deploy multipath inter-domain routing, this paper tries to integrate our designed incentive mechanism into multipath inter-domain routing and propose an Incentive Driving Multi-path Inter-domain Routing scheme (IDMIR). Under the incentive mechanism, it can collect the path-let information from the selected nodes from the feasible BGP paths and build a scale-limited topology to compute the special routes. Meanwhile, it can adjust the protocol performance by configuring the path-let visibility degree (R) and topological nodes size (N). The simulation results demonstrate that IDMIR has strong path discovery capability with reasonable overhead.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124321740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1