TThis paper presents a hybrid method that combines the genetic algorithm (GA) and the ant colony system algorithm (ACS), namely GACS, to solve the traffic routing problem. In the proposed framework, we use the genetic algorithm to optimize the ACS parameters in order to attain the best trips and travelling time through several novel functions to help ants to update the global and local pheromones. The GACS framework is implemented using the VANETsim package and the real city maps from the open street map project. The experimental results show that our framework achieves a considerably higher performance than A-Star and the classical ACS algorithms in terms of the length of the global best path and the time for trips. Moreover, the GACS framework is also efficient in solving the congestion problem by online monitoring the conditions of traffic light systems. KeywordsTraffic routing; Ant colony system; Genetic algorithm; VANET simulator. References [1] M. Dorigo, Ant colony optimization, Scholarpedia 2(3) (2007) 1461. https://doi.org/10/4249/scholarpedia.1461.[2] M.V. Dorigo, Maniezzo, A. Colorni, Ant system: Optimization by a colony of cooperating agents, IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics) 26(1) (1996) 29-41.[3] M. Dorigo, L.M. Gambardella, Ant colony system: A cooperative learning approach to the traveling salesman problem, IEEE Transactions on evolutionary computation 1(1) (1997) 53-66.[4] M. Dorigo, T. St¨utzle, Ant Colony Optimization. MIT Press, Cambridge, MA, 2004.[5] D. Favaretto, E. Moretti, P. Pellegrini, On the explorative behavior of MAX-MIN Ant. System, In: St¨utzle T, Birattari M, Hoos HH (eds) Engineering Stochastic Local Search Algorithms, Designing, Implementing and Analyzing Effective Heuristics. SLS 2009, LNCS, Springer, Heidelberg, Germany 5752 (2009) 115-119.[6] F. Lobo, C.F. Lima, Z. Michalewicz (eds), Parameter Setting in Evolutionary Algorithms, Springer, Berlin, Germany, 2007.[7] T. Stützle, Manuel López-Ibáñez, Paola Pellegrini, Michael Maur, Marco Montes de Oca, Mauro Birattari, Marco Dorigo, Parameter adaptation in ant colony optimization in Autonomous search, Springer, 2011, pp. 191-215.[8] Z. Cai, H. Huang, Ant colony optimization algorithm based on adaptive weight and volatility parameters in Intelligent Information Technology Application, 2008. IITA'08, Second International Symposium IEEE, 2008.[9] J. Liu, Shenghua Xu, Fuhao Zhang, Liang Wang, A hybrid genetic-ant colony optimization algorithm for the optimal path selection, Intelligent Automation & Soft Computing, 2016, pp. 1-8.[10] D.Gaertner K.L. Clark, On Optimal Parameters for Ant Colony Optimization Algorithms, In IC-AI, 2005.[11] X.Wei, Parameters Analysis for Basic Ant Colony Optimization Algorithm in TSP, Reason 7(4) (2014) 159-170.[12] J.H. Holland, Adaptation in natural and artificial systems: An introductory analysis with applications to biology, control and artificial intelligence, U Michigan Press, 1975.[13] K.D.E
本文提出了一种结合遗传算法(GA)和蚁群系统算法(ACS)的混合方法来解决交通路由问题。在该框架中,我们使用遗传算法优化ACS参数,通过几个新颖的函数来帮助蚂蚁更新全局和局部信息素,以获得最佳行程和旅行时间。GACS框架使用VANETsim包和来自开放街道地图项目的真实城市地图来实现。实验结果表明,在全局最优路径长度和行程时间方面,我们的框架比a - star和经典的ACS算法取得了相当高的性能。此外,GACS框架还可以通过在线监测交通灯系统的状态来有效地解决拥堵问题。KeywordsTraffic路由;蚁群系统;遗传算法;VANET模拟器。[1] M. Dorigo,蚁群优化算法,中文信息学报2(3)(2007):1461。https://doi.org/10/4249/scholarpedia.1461.[2]马尼卓,马尼卓。蚁群系统的优化研究,计算机工程学报,26(1)(1996):29-41.[3]张志刚,吴志刚,基于蚁群学习的旅行商问题求解方法,计算机科学与技术,第1期(1997):53-66.[4]M. Dorigo, T. St¨utzle,蚁群优化。麻省理工学院出版社,剑桥,马萨诸塞州,2004.[5]D. Favaretto, E. Moretti, P. Pellegrini,最大最小蚂蚁的探索行为。系统工程,[j],李建平,李建平,等。随机局部搜索算法的设计、实现与分析。SLS 2009, LNCS, Springer,海德堡,德国5752 (2009)115-119.[6]李志强,李志强,李志强,李志强(主编),进化算法中的参数设置,计算机工程学报,2007.[7]T. st tzle, Manuel López-Ibáñez, Paola Pellegrini, Michael Maur, Marco Montes de Oca, Mauro Birattari, Marco Dorigo,自主搜索中蚁群优化的参数自适应,Springer, 2011, pp 191-215.[8]蔡志强,黄辉,基于自适应权重和波动率参数的蚁群优化算法在智能信息技术应用中的应用,2008。[9]中华人民大学学报(自然科学版),2008.[9]刘军,徐盛华,张福豪,王亮,一种混合遗传-蚁群优化算法,智能自动化与软计算,2016,pp. 1-8.[10]李建军,李建军,李建军,等。蚁群优化算法的研究进展,计算机工程,2005.[11]魏新,TSP中基本蚁群优化算法的参数分析,原因7(4)(2014)159-170.[12]J.H. Holland,自然和人工系统的适应:应用于生物学、控制和人工智能的介绍性分析,密歇根大学出版社,1975.[13]郭海燕,郭海燕,郭海燕,遗传算法,In Search methodologies, Springer, 2014, pp 93-117.[14]吴晓明。基于遗传算法的智能交通灯系统管理,中国图象图形学报(2)(2013):90-93.[15]上午李勇,王国强,王刚,王刚(编)基于粗糙集和知识技术的交通信号灯控制系统,中国公路学报,2009,vol . 32 (6): 557 - 557 .[16]杨建军,杨建军,杨建军,杨建军,网络技术与网络仿真,2006.[17]A. Ben Mussa, M. Manaf, K.Z. Ghafoor, Z. Doukha,“车辆自组织网络的仿真工具:比较研究和未来展望”,2015年国际无线网络与移动通信会议(WINCOM), Marrakech, 2015, pp. 1-8.[18]李建军,李建军,李建军,车用自动驾驶汽车仿真系统,汽车信息与通信系统,2009.[19]梁磊,叶建军,魏德东,基于蚁群算法的异形零件嵌套优化,计算机工程,2008,[20]闫欣,基于遗传算法的混合蚁群算法研究。国际信号处理,图像处理与模式识别学报9(3)(2016)155-166。
{"title":"A Hybrid Method Based on Genetic Algorithm and Ant Colony System for Traffic Routing Optimization","authors":"Thi-Hau Nguyen, Trung-Tuan Do, Duc-Nhan Nguyen, Dang-Nhac Lu, Ha-Nam Nguyen","doi":"10.25073/2588-1086/VNUCSCE.236","DOIUrl":"https://doi.org/10.25073/2588-1086/VNUCSCE.236","url":null,"abstract":"TThis paper presents a hybrid method that combines the genetic algorithm (GA) and the ant colony system algorithm (ACS), namely GACS, to solve the traffic routing problem. In the proposed framework, we use the genetic algorithm to optimize the ACS parameters in order to attain the best trips and travelling time through several novel functions to help ants to update the global and local pheromones. The GACS framework is implemented using the VANETsim package and the real city maps from the open street map project. The experimental results show that our framework achieves a considerably higher performance than A-Star and the classical ACS algorithms in terms of the length of the global best path and the time for trips. Moreover, the GACS framework is also efficient in solving the congestion problem by online monitoring the conditions of traffic light systems. \u0000KeywordsTraffic routing; Ant colony system; Genetic algorithm; VANET simulator. \u0000References \u0000[1] M. Dorigo, Ant colony optimization, Scholarpedia 2(3) (2007) 1461. https://doi.org/10/4249/scholarpedia.1461.[2] M.V. Dorigo, Maniezzo, A. Colorni, Ant system: Optimization by a colony of cooperating agents, IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics) 26(1) (1996) 29-41.[3] M. Dorigo, L.M. Gambardella, Ant colony system: A cooperative learning approach to the traveling salesman problem, IEEE Transactions on evolutionary computation 1(1) (1997) 53-66.[4] M. Dorigo, T. St¨utzle, Ant Colony Optimization. MIT Press, Cambridge, MA, 2004.[5] D. Favaretto, E. Moretti, P. Pellegrini, On the explorative behavior of MAX-MIN Ant. System, In: St¨utzle T, Birattari M, Hoos HH (eds) Engineering Stochastic Local Search Algorithms, Designing, Implementing and Analyzing Effective Heuristics. SLS 2009, LNCS, Springer, Heidelberg, Germany 5752 (2009) 115-119.[6] F. Lobo, C.F. Lima, Z. Michalewicz (eds), Parameter Setting in Evolutionary Algorithms, Springer, Berlin, Germany, 2007.[7] T. Stützle, Manuel López-Ibáñez, Paola Pellegrini, Michael Maur, Marco Montes de Oca, Mauro Birattari, Marco Dorigo, Parameter adaptation in ant colony optimization in Autonomous search, Springer, 2011, pp. 191-215.[8] Z. Cai, H. Huang, Ant colony optimization algorithm based on adaptive weight and volatility parameters in Intelligent Information Technology Application, 2008. IITA'08, Second International Symposium IEEE, 2008.[9] J. Liu, Shenghua Xu, Fuhao Zhang, Liang Wang, A hybrid genetic-ant colony optimization algorithm for the optimal path selection, Intelligent Automation & Soft Computing, 2016, pp. 1-8.[10] D.Gaertner K.L. Clark, On Optimal Parameters for Ant Colony Optimization Algorithms, In IC-AI, 2005.[11] X.Wei, Parameters Analysis for Basic Ant Colony Optimization Algorithm in TSP, Reason 7(4) (2014) 159-170.[12] J.H. Holland, Adaptation in natural and artificial systems: An introductory analysis with applications to biology, control and artificial intelligence, U Michigan Press, 1975.[13] K.D.E","PeriodicalId":416488,"journal":{"name":"VNU Journal of Science: Computer Science and Communication Engineering","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121838472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-24DOI: 10.25073/2588-1086/vnucsce.230
N. Dao, Thanh Trung LE, V. Nguyen, N. Linh-Trung, Ha Vu Le
Epilepsy is one of the most common and severe brain disorders. Electroencephalogram (EEG) is widely used in epilepsy diagnosis and treatment, with it the epileptic spikes can be observed. Tensor decomposition-based feature extraction has been proposed to facilitate automatic detection of EEG epileptic spikes. However, tensor decomposition may still result in a large number of features which are considered negligible in determining expected output performance. We proposed a new feature selection method that combines the Fisher score and p-value feature selection methods to rank the features by using the longest common sequences (LCS) to separate epileptic and non-epileptic spikes. The proposed method significantly outperformed several state-of-the-art feature selection methods.
{"title":"New Feature Selection Method for Multi-channel EEG Epileptic Spike Detection System","authors":"N. Dao, Thanh Trung LE, V. Nguyen, N. Linh-Trung, Ha Vu Le","doi":"10.25073/2588-1086/vnucsce.230","DOIUrl":"https://doi.org/10.25073/2588-1086/vnucsce.230","url":null,"abstract":"Epilepsy is one of the most common and severe brain disorders. Electroencephalogram (EEG) is widely used in epilepsy diagnosis and treatment, with it the epileptic spikes can be observed. Tensor decomposition-based feature extraction has been proposed to facilitate automatic detection of EEG epileptic spikes. However, tensor decomposition may still result in a large number of features which are considered negligible in determining expected output performance. We proposed a new feature selection method that combines the Fisher score and p-value feature selection methods to rank the features by using the longest common sequences (LCS) to separate epileptic and non-epileptic spikes. The proposed method significantly outperformed several state-of-the-art feature selection methods.","PeriodicalId":416488,"journal":{"name":"VNU Journal of Science: Computer Science and Communication Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115440788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-22DOI: 10.25073/2588-1086/vnucsce.233
Dinh-Lam Tran, V. Pham, Hung K. Nguyen, Xuan-Tu Tran
High-Efficiency Video Coding (HEVC), also known as H.265 and MPEG-H Part 2, is the newest video coding standard developed to address the increasing demand for higher resolutions and frame rates. In comparison to its predecessor H.264/AVC, HEVC achieved almost double of compression performance that is capable to process high quality video sequences (UHD 4K, 8K; high frame rates) in a wide range of applications. Context-Adaptive Baniray Arithmetic Coding (CABAC) is the only entropy coding method in HEVC, whose principal algorithm is inherited from its predecessor. However, several aspects of the method that exploits it in HEVC are different, thus HEVC CABAC supports better coding efficiency. Effectively, pipeline and parallelism in CABAC hardware architectures are prospective methods in the implementation of high performance CABAC designs. However, high data dependence and serial nature of bin-to-bin processing in CABAC algorithm pose many challenges for hardware designers. This paper provides an overview of CABAC hardware implementations for HEVC targeting high quality, low power video applications, addresses challenges of exploiting it in different application scenarios and then recommends several predictive research trends in the future.
高效视频编码(HEVC),也称为H.265和MPEG-H Part 2,是为满足对更高分辨率和帧率日益增长的需求而开发的最新视频编码标准。与其前身H.264/AVC相比,HEVC实现了几乎两倍的压缩性能,能够处理高质量的视频序列(UHD 4K, 8K;高帧率)在广泛的应用。上下文自适应Baniray算术编码(CABAC)是HEVC中唯一的熵编码方法,其主要算法继承了其前身。然而,HEVC中利用CABAC的方法在几个方面有所不同,因此HEVC CABAC支持更好的编码效率。实际上,CABAC硬件架构中的流水线和并行是实现高性能CABAC设计的有前途的方法。然而,CABAC算法的高数据依赖性和箱对箱处理的串行性给硬件设计者带来了许多挑战。本文概述了针对高质量、低功耗视频应用的HEVC的CABAC硬件实现,解决了在不同应用场景下利用它所面临的挑战,并提出了未来的几个预测研究趋势。
{"title":"A Survey of High-Efficiency Context-Addaptive Binary Arithmetic Coding Hardware Implementations in High-Efficiency Video Coding Standard","authors":"Dinh-Lam Tran, V. Pham, Hung K. Nguyen, Xuan-Tu Tran","doi":"10.25073/2588-1086/vnucsce.233","DOIUrl":"https://doi.org/10.25073/2588-1086/vnucsce.233","url":null,"abstract":"High-Efficiency Video Coding (HEVC), also known as H.265 and MPEG-H Part 2, is the newest video coding standard developed to address the increasing demand for higher resolutions and frame rates. In comparison to its predecessor H.264/AVC, HEVC achieved almost double of compression performance that is capable to process high quality video sequences (UHD 4K, 8K; high frame rates) in a wide range of applications. Context-Adaptive Baniray Arithmetic Coding (CABAC) is the only entropy coding method in HEVC, whose principal algorithm is inherited from its predecessor. However, several aspects of the method that exploits it in HEVC are different, thus HEVC CABAC supports better coding efficiency. Effectively, pipeline and parallelism in CABAC hardware architectures are prospective methods in the implementation of high performance CABAC designs. However, high data dependence and serial nature of bin-to-bin processing in CABAC algorithm pose many challenges for hardware designers. This paper provides an overview of CABAC hardware implementations for HEVC targeting high quality, low power video applications, addresses challenges of exploiting it in different application scenarios and then recommends several predictive research trends in the future.","PeriodicalId":416488,"journal":{"name":"VNU Journal of Science: Computer Science and Communication Engineering","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132055335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-03DOI: 10.25073/2588-1086/VNUCSCE.228
Vu Thi Ngoc Anh, Nguyen Trong Dong, Nguyen Vũ Hoàng Vuong, Dang Thanh Hai, Do Duc Dong
Aligning protein-protein interaction networks from different species is a useful mechanism for figuring out orthologous proteins, predicting/verifying protein unknown functions or constructing evolutionary relationships. The network alignment problem is proved to be NP-hard, requiring exponential-time algorithms, which is not feasible for the fast growth of biological data. In this paper, we present a novel protein-protein interaction global network alignment algorithm, which is enhanced with an extended large neighborhood search heuristics. Evaluated on benchmark datasets of yeast, fly, human and worm, the proposed algorithm outperforms state-of-the-art. Furthermore, the complexity of ours is polynomial, thus being scalable to large biological networks in practice. Keywords Heuristic, Protein-protein interaction networks, network alignment, neighborhood search References [1] R.L. Finley, R. Brent, Interaction mating reveals binary and ternary connections between drosophila cell cycle regulators. Proc. Natl Acad. Sci. USA. 91 (1994) 12980-12984.[2] R. Aebersold, M. Mann, Mass spectrometry-based proteomics, Nature. 422 (2003) 198-207.[3] C.S. Goh, F.R. Cohen, Co-evolutionary analysis reveals insights into protein-protein interactions, J. Mol. Biol. 324 (2002) 177-192.[4] J.D. Han et al, Evidence for dynamically organized modularity in the yeast proteinprotein interaction network, Nature. 430 (2004) 88-93.[5] G.D. Bader, C.W. Hogue, Analyzing yeast protein-protein interaction data obtained from different sources, Nat. Biotechnol. 20 (2002) 991-997.[6] H.B. Hunter et al, Evolutionary rate in the protein interaction network, Science. 296 (2002) 750-752.[7] J. Dutkowski, J. Tiuryn,J, Identification of functional modules from conserved ancestral protein-protein interactions, Bioinformatics. 23 (2007) i149-i158.[8] B.P. Kelley et al, Conserved pathways within bacteria and yeast as revealed by global protein network alignment, Proc. Natl Acad. Sci. USA. 100 (2003) 11394-11399.[9] O. Kuchaiev, N. Przˇ ulj, Integrative network alignment reveals large regions of global network similarity in yeast and human, Bioinformatics. 27 (2011) 1390-1396.[10] M. Remm et al, Automatic clustering of orthologs and in-paralogs from pairwise species comparisons, J. Mol. Biol. 314 (2001) 1041-1052. [11] L. Chindelevitch et al, Local optimization for global alignment of protein interaction networks, In: Pacific Symposium on Biocomputing, Hawaii, USA, 2010, pp. 123-132.[12] E. hmet, Aladağ, Cesim Erten, SPINAL: scalable protein interaction network alignment, Bioinformatics. Volume 29(7) (2013) 917-924. https://doi.org/10.1093/bioinformatics/btt071.[13] B.P. Kelley et al, Pathblast: a tool for alignment of protein interaction networks, Nucleic Acids Res. 32 (2004) 83-88.[14] R. Sharan et al, Conserved patterns of protein interaction in multiple species, Proc. Natl Acad. Sci. USA. 102 (2005) 1974-1979.[15] M. Koyuturk et al, Pairwise alignment of protein interaction networks
{"title":"Adaptive Large Neighborhood Search Enhances Global Network Alignment","authors":"Vu Thi Ngoc Anh, Nguyen Trong Dong, Nguyen Vũ Hoàng Vuong, Dang Thanh Hai, Do Duc Dong","doi":"10.25073/2588-1086/VNUCSCE.228","DOIUrl":"https://doi.org/10.25073/2588-1086/VNUCSCE.228","url":null,"abstract":"Aligning protein-protein interaction networks from different species is a useful mechanism for figuring out orthologous proteins, predicting/verifying protein unknown functions or constructing evolutionary relationships. The network alignment problem is proved to be NP-hard, requiring exponential-time algorithms, which is not feasible for the fast growth of biological data. In this paper, we present a novel protein-protein interaction global network alignment algorithm, which is enhanced with an extended large neighborhood search heuristics. Evaluated on benchmark datasets of yeast, fly, human and worm, the proposed algorithm outperforms state-of-the-art. Furthermore, the complexity of ours is polynomial, thus being scalable to large biological networks in practice. \u0000Keywords \u0000Heuristic, Protein-protein interaction networks, network alignment, neighborhood search \u0000References \u0000[1] R.L. Finley, R. Brent, Interaction mating reveals binary and ternary connections between drosophila cell cycle regulators. Proc. Natl Acad. Sci. USA. 91 (1994) 12980-12984.[2] R. Aebersold, M. Mann, Mass spectrometry-based proteomics, Nature. 422 (2003) 198-207.[3] C.S. Goh, F.R. Cohen, Co-evolutionary analysis reveals insights into protein-protein interactions, J. Mol. Biol. 324 (2002) 177-192.[4] J.D. Han et al, Evidence for dynamically organized modularity in the yeast proteinprotein interaction network, Nature. 430 (2004) 88-93.[5] G.D. Bader, C.W. Hogue, Analyzing yeast protein-protein interaction data obtained from different sources, Nat. Biotechnol. 20 (2002) 991-997.[6] H.B. Hunter et al, Evolutionary rate in the protein interaction network, Science. 296 (2002) 750-752.[7] J. Dutkowski, J. Tiuryn,J, Identification of functional modules from conserved ancestral protein-protein interactions, Bioinformatics. 23 (2007) i149-i158.[8] B.P. Kelley et al, Conserved pathways within bacteria and yeast as revealed by global protein network alignment, Proc. Natl Acad. Sci. USA. 100 (2003) 11394-11399.[9] O. Kuchaiev, N. Przˇ ulj, Integrative network alignment reveals large regions of global network similarity in yeast and human, Bioinformatics. 27 (2011) 1390-1396.[10] M. Remm et al, Automatic clustering of orthologs and in-paralogs from pairwise species comparisons, J. Mol. Biol. 314 (2001) 1041-1052. [11] L. Chindelevitch et al, Local optimization for global alignment of protein interaction networks, In: Pacific Symposium on Biocomputing, Hawaii, USA, 2010, pp. 123-132.[12] E. hmet, Aladağ, Cesim Erten, SPINAL: scalable protein interaction network alignment, Bioinformatics. Volume 29(7) (2013) 917-924. https://doi.org/10.1093/bioinformatics/btt071.[13] B.P. Kelley et al, Pathblast: a tool for alignment of protein interaction networks, Nucleic Acids Res. 32 (2004) 83-88.[14] R. Sharan et al, Conserved patterns of protein interaction in multiple species, Proc. Natl Acad. Sci. USA. 102 (2005) 1974-1979.[15] M. Koyuturk et al, Pairwise alignment of protein interaction networks","PeriodicalId":416488,"journal":{"name":"VNU Journal of Science: Computer Science and Communication Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125518187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-02DOI: 10.25073/2588-1086/VNUCSCE.218
K. Dang, Xuan-Tu Tran
The soft error rates per single-bit due to alpha particles in sub-micron technology is expectedly reducedas the feature size is shrinking. On the other hand, the complexity and density of integrated systems are accelerating which demand ecient soft error protection mechanisms, especially for on-chip communication. Using soft error protection method has to satisfy tight requirements for the area and energy consumption, therefore a low complexity and low redundancy coding method is necessary. In this work, we propose a method to enhance Parity Product Code (PPC) and provide adaptation methods for this code. First, PPC is improved as forward error correcting using transposable retransmissions. Then, to adapt with dierent error rates, an augmented algorithm for configuring PPC is introduced. The evaluation results show that the proposed mechanism has coding rates similar to Parity check’s and outperforms the original PPC.Keywords Error Correction Code, Fault-Tolerance, Network-on-Chip. References [1] R. Baumann, Radiation-induced soft errors in advanced semiconductor technologies, IEEETransactions on Device and materials reliability. 5-3 (2005) 305–316. https://doi.org/10.1109/tdmr.2005.853449.[2] N. Seifert, B. Gill, K. Foley, P. Relangi, Multi-cell upset probabilities of 45nm high-k + metal gateSRAM devices in terrestrial and space environments, in: IEEE International Reliability Physics Symposium 2008, IEEE, AZ, USA, 2008, pp. 181–186.[3] S. Lee, I. Kim, S. Ha, C.-s. Yu, J. Noh, S. Pae, J. Park, Radiation-induced soft error rate analyses for 14 nmFinFET SRAM devices, in: 2015 IEEE International Reliability Physics Symposium (IRPS), IEEE, CA, USA, 2015, pp. 4B–1.[4] R. Hamming, Error detecting and error correcting codes, Bell Labs Tech. J. 29-2 (1950) 147–160. https://www.doi.org/10.1002/j.1538-7305.1950.tb00463.x.[5] M. Hsiao, A class of optimal minimum odd-weight-column SEC-DED codes, IBMJ. Res. Dev. 14-4 (1970) 395–401. https://www.doi.org/10.1147/rd.144.0395.[6] S. Mittal, M. Inukonda, A survey of techniques for improving error-resilience of dram, Journal ofSystems Architecture. 91-1 (2018) 11–40. https://www.doi.org/10.1016/j.sysarc.2018.09.004.[7] D. Bertozzi, et al., Error control schemes for on-chip communication links: the energy-reliabilitytradeo, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 24-6 (2005) 818–831. https://doi.org/10.1109/tcad.2005. 847907.[8] F. Chiaraluce, R. Garello, Extended Hamming product codes analytical performance evaluation for low errorrate applications, IEEE Transactions on Wireless Communications. 3-6 (2004) 2353–2361. https://doi. org/10.1109/twc.2004.837405.[9] R. Pyndiah, Near-optimum decoding of product codes: Block turbo codes, IEEE Transactions onCommunications. 46-8 (1998) 1003–1010. https://www.doi.org/10.1109/26.705396.[10] N. Magen, A. Kolodny, U. Weiser, N. Shamir, Interconnect-power dissipation in a microprocessor,in: Proceedings of the 2004 international workshop
在亚微米技术中,由于α粒子导致的每比特软错误率有望随着特征尺寸的缩小而降低。另一方面,集成系统的复杂性和密度都在不断增加,这就需要有效的软错误保护机制,特别是在片上通信方面。采用软错误保护方法必须满足对面积和能耗的严格要求,因此需要一种低复杂度和低冗余的编码方法。在这项工作中,我们提出了一种增强奇偶产品码(PPC)的方法,并提供了该代码的自适应方法。首先,利用转座重传将PPC改进为前向纠错。然后,为了适应不同的错误率,引入了一种增强的PPC配置算法。评估结果表明,该机制具有与奇偶校验相似的编码速率,并且优于原始的PPC。关键词纠错码,容错,片上网络。参考文献[10]R. Baumann,先进半导体技术中辐射诱导的软误差,电子工程学报,器件与材料可靠性。5-3(2005) 305-316。https://doi.org/10.1109/tdmr.2005.853449.[2] N. Seifert, B. Gill, K. Foley, P. Relangi,地面和空间环境下45nm高k +金属栅极ram器件的多单元干扰概率,2008,IEEE国际可靠性物理研讨会,IEEE, AZ, USA, pp. 181-186李诗诗,金诗诗,夏诗诗,c -s。俞建军,刘建军,张建军,张建军,张建军,张建军,张建军,张建军,张建军,张建军,张建军,张建军,张建军,张建军,张建军,张建军,张建军R.汉明,错误检测和纠错码,贝尔实验室技术J. 29-2(1950) 147-160。https://www.doi.org/10.1002/j.1538-7305.1950.tb00463.x.[5]肖明,一类最优最小奇重列SEC-DED码,计算机学报。修订14-4(1970)395-401。https://www.doi.org/10.1147/rd.144.0395. b[6] S. Mittal, M. Inukonda,提高dram的错误恢复能力的技术综述,系统架构,91-1(2018)11-40。https://www.doi.org/10.1016/j.sysarc.2018.09.004.[7] D. Bertozzi, et al.,芯片上通信链路的错误控制方案:能源可靠性贸易[j],集成电路与系统计算机辅助设计,24-6(2005)818-831。https://doi.org/10.1109/tcad.2005。847907年。[8]李建军,李建军,李建军,基于扩展汉明产品码的低误码率分析性能评估,通信学报,3-6(2004):2353-2361。https://doi。org/10.1109/twc.2004.837405。[9]李彦宏,产品码的近最优解码:分组turbo码,IEEE通讯学报。46-8(1998) 1003-1010。https://www.doi.org/10.1109/26.705396.[10] N. Magen, a . Kolodny, U. Weiser, N. Shamir,微处理器的互连功耗,载于:2004年系统级互连预测国际研讨会论文集,ACM,法国巴黎,2004,pp. 7-13邓凯,陈新,基于奇偶校验的ECC与片上通信软错误检测与纠错机制,第11届嵌入式多核/多核系统片上国际学术研讨会论文集,2018,pp. 1-6李志强,李志强,基于低冗余三相邻纠错的sram容差,集成电路学报,23(2015):2332-2336。https://www.doi.org/10.1109/tvlsi.2014.2357476. b[13] W. Peterson, D. Brown,循环码的错误检测,电气工程学报49-1(1961)228-235。https://www.doi.org/10.1109/jrproc.1961.287814.[14] S. Wicker, V. Bhargava, Reed-Solomon密码及其应用,第一版,JohnWiley and Sons, NJ,美国,1999陈晓明,李志强,基于数据网络的错误控制编码,第1版,2010 .中文信息学报,2012L. Peterson, B. david,计算机网络:一个系统方法,第5版,爱思唯尔,纽约,2011邓凯等,软误差弹性三维片上网络路由器,2015年IEEE第七届感知科学与技术国际会议(iCAST),中国,2015,pp. 84-90邓凯,等。一种基于多核3D-NoC系统的低负载软硬容错架构设计与管理方案,计算机工程学报,36(3)(2017):2705-2729。https://www.doi.org/10.1007/s11227-016-1951-0.[19] D. Ernst, et ., Razor:基于电路级时序推测的低功耗管道,载于:第36届IEEE/ACM国际微架构研讨会,IEEE, CA, USA, 2003, pp. 10-20 .[20]张晓明,张晓明,张晓明。基于dsp的网络单片路由器故障控制方法研究,计算机应用学报,34(1)(2019)。https://www.doi.org/10.3390/jlpea9010011. b[21] G. Hubert, L. Artola, D。
{"title":"An Adaptive and High Coding Rate Soft Error Correction Method in Network-on-Chips","authors":"K. Dang, Xuan-Tu Tran","doi":"10.25073/2588-1086/VNUCSCE.218","DOIUrl":"https://doi.org/10.25073/2588-1086/VNUCSCE.218","url":null,"abstract":"The soft error rates per single-bit due to alpha particles in sub-micron technology is expectedly reducedas the feature size is shrinking. On the other hand, the complexity and density of integrated systems are accelerating which demand ecient soft error protection mechanisms, especially for on-chip communication. Using soft error protection method has to satisfy tight requirements for the area and energy consumption, therefore a low complexity and low redundancy coding method is necessary. In this work, we propose a method to enhance Parity Product Code (PPC) and provide adaptation methods for this code. First, PPC is improved as forward error correcting using transposable retransmissions. Then, to adapt with dierent error rates, an augmented algorithm for configuring PPC is introduced. The evaluation results show that the proposed mechanism has coding rates similar to Parity check’s and outperforms the original PPC.Keywords \u0000Error Correction Code, Fault-Tolerance, Network-on-Chip. \u0000References \u0000[1] R. Baumann, Radiation-induced soft errors in advanced semiconductor technologies, IEEETransactions on Device and materials reliability. 5-3 (2005) 305–316. https://doi.org/10.1109/tdmr.2005.853449.[2] N. Seifert, B. Gill, K. Foley, P. Relangi, Multi-cell upset probabilities of 45nm high-k + metal gateSRAM devices in terrestrial and space environments, in: IEEE International Reliability Physics Symposium 2008, IEEE, AZ, USA, 2008, pp. 181–186.[3] S. Lee, I. Kim, S. Ha, C.-s. Yu, J. Noh, S. Pae, J. Park, Radiation-induced soft error rate analyses for 14 nmFinFET SRAM devices, in: 2015 IEEE International Reliability Physics Symposium (IRPS), IEEE, CA, USA, 2015, pp. 4B–1.[4] R. Hamming, Error detecting and error correcting codes, Bell Labs Tech. J. 29-2 (1950) 147–160. https://www.doi.org/10.1002/j.1538-7305.1950.tb00463.x.[5] M. Hsiao, A class of optimal minimum odd-weight-column SEC-DED codes, IBMJ. Res. Dev. 14-4 (1970) 395–401. https://www.doi.org/10.1147/rd.144.0395.[6] S. Mittal, M. Inukonda, A survey of techniques for improving error-resilience of dram, Journal ofSystems Architecture. 91-1 (2018) 11–40. https://www.doi.org/10.1016/j.sysarc.2018.09.004.[7] D. Bertozzi, et al., Error control schemes for on-chip communication links: the energy-reliabilitytradeo, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 24-6 (2005) 818–831. https://doi.org/10.1109/tcad.2005. 847907.[8] F. Chiaraluce, R. Garello, Extended Hamming product codes analytical performance evaluation for low errorrate applications, IEEE Transactions on Wireless Communications. 3-6 (2004) 2353–2361. https://doi. org/10.1109/twc.2004.837405.[9] R. Pyndiah, Near-optimum decoding of product codes: Block turbo codes, IEEE Transactions onCommunications. 46-8 (1998) 1003–1010. https://www.doi.org/10.1109/26.705396.[10] N. Magen, A. Kolodny, U. Weiser, N. Shamir, Interconnect-power dissipation in a microprocessor,in: Proceedings of the 2004 international workshop","PeriodicalId":416488,"journal":{"name":"VNU Journal of Science: Computer Science and Communication Engineering","volume":"166 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120912017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-16DOI: 10.25073/2588-1086/VNUCSCE.222
Van Xiem Hoang, T. H. Duong, Anh Vu Trinh, Xuan-Thang Vu
Caching has received much attention as a promising technique to overcome high data rate and stringent latency requirements in the future wireless networks. The premise of caching technique is to prefetch most popular contents closer to end users in local cache of edge nodes, e.g., base station (BS). When a user requests a content that is available in the cache, it can be served directly without being sent from the core network. In this paper, we investigate the performance of hierarchical caching systems, in which both BS and end users are equipped with a storage memory. In particular, we propose a novel cooperative caching scheme that jointly optimizes the content placement at the BS’s and users’ caches. The proposed caching scheme is analytically shown to achieve a larger global caching gain than the reference in both uncoded – and coded caching strategies. Finally, numerical results are presented to demonstrate the effectiveness of our proposed caching algorithm. Keywords Hierarchical caching system, cooperative caching, caching gain, uncoded caching, coded caching References [1] D. Liu, B. Chen, C. Yang, A.F. Molisch, Caching at the Wireless Edge: Design Aspects, Challenges, and Future Directions, IEEE Communications Magazine 54 (2016) 22-28. https://doi.org/10.1109/MCOM.2016.7565183.[2] T.X. Vu, S. Chatzinotas, B. Ottersten, Edge-Caching Wireless Networks: Performance Analysis and Optimization, IEEE Transactions on Wireless Communications 17 (2018) 2827-2839. https://doi.org/10.1109/TWC.2018.2803816.[3] M.A. Maddah-Ali, U. Niesen, Fundamental Limits of Caching, IEEE Transactions on Information Theory 60 (2014) 2856-2867. https://doi.org/10.1109/TIT.2014.2306938.[4] M.A. Maddah-Ali, U. Niesen, Decentralized Coded Caching Attains Order-Optimal Memory-Rate Tradeoff, IEEE/ACM Transactions on Networking 23 (2015) 1029-1040. https://doi.org/10.1109/TNET.2014.2317316.[5] U. Niesen, M.A. Maddah-Ali, Coded Caching with Nonuniform Demands, IEEE Transactions on Information Theory 63 (2017) 1146-1158. https://doi.org/10.1109/TIT.2016.2639522.[6] Q. Yu, M.A. Maddah-Ali, A.S. Avestimehr, The exact rate-memory tradeoff for caching with uncoded prefetching, IEEE Transactions on Information Theory 64 (2018) 1281-1296. https://doi.org/10.1109/TIT.2017.2785237.[7] S.P. Shariatpanahi, H. Shah-Mansouri, B.H. Khalaj, Caching gain in interference-limited wireless networks, IET Communications 9 (2015) 1269-1277. https://doi.org/10.1049/iet-com.2014.0955.[8] N. Naderializadeh, M.A. Maddah-Ali, A.S. Avestimehr, Fundamental limits of cache-aided interference management, IEEE Transactions on Information Theory 63 (2017) 3092-3107. https://doi.org/10.1109/TIT.2017.2669942.[9] J. Hachem, U. Niesen, S. Diggavi, Energy-Efficiency Gains of Caching for Interference Channels, IEEE Communications Letters 22 (2018) 1434-1437. https://doi.org/10.1109/LCOMM.2018.2822694.[10] M.A. Maddah-Ali, U. Niesen, Cache-aided interference channels, IEEE International Symposium on Infor
{"title":"Cooperative Caching in Two-Layer Hierarchical Cache-aided Systems","authors":"Van Xiem Hoang, T. H. Duong, Anh Vu Trinh, Xuan-Thang Vu","doi":"10.25073/2588-1086/VNUCSCE.222","DOIUrl":"https://doi.org/10.25073/2588-1086/VNUCSCE.222","url":null,"abstract":"Caching has received much attention as a promising technique to overcome high data rate and stringent latency requirements in the future wireless networks. The premise of caching technique is to prefetch most popular contents closer to end users in local cache of edge nodes, e.g., base station (BS). When a user requests a content that is available in the cache, it can be served directly without being sent from the core network. In this paper, we investigate the performance of hierarchical caching systems, in which both BS and end users are equipped with a storage memory. In particular, we propose a novel cooperative caching scheme that jointly optimizes the content placement at the BS’s and users’ caches. The proposed caching scheme is analytically shown to achieve a larger global caching gain than the reference in both uncoded – and coded caching strategies. Finally, numerical results are presented to demonstrate the effectiveness of our proposed caching algorithm. \u0000Keywords \u0000Hierarchical caching system, cooperative caching, caching gain, uncoded caching, coded caching \u0000 References \u0000[1] D. Liu, B. Chen, C. Yang, A.F. Molisch, Caching at the Wireless Edge: Design Aspects, Challenges, and Future Directions, IEEE Communications Magazine 54 (2016) 22-28. https://doi.org/10.1109/MCOM.2016.7565183.[2] T.X. Vu, S. Chatzinotas, B. Ottersten, Edge-Caching Wireless Networks: Performance Analysis and Optimization, IEEE Transactions on Wireless Communications 17 (2018) 2827-2839. https://doi.org/10.1109/TWC.2018.2803816.[3] M.A. Maddah-Ali, U. Niesen, Fundamental Limits of Caching, IEEE Transactions on Information Theory 60 (2014) 2856-2867. https://doi.org/10.1109/TIT.2014.2306938.[4] M.A. Maddah-Ali, U. Niesen, Decentralized Coded Caching Attains Order-Optimal Memory-Rate Tradeoff, IEEE/ACM Transactions on Networking 23 (2015) 1029-1040. https://doi.org/10.1109/TNET.2014.2317316.[5] U. Niesen, M.A. Maddah-Ali, Coded Caching with Nonuniform Demands, IEEE Transactions on Information Theory 63 (2017) 1146-1158. https://doi.org/10.1109/TIT.2016.2639522.[6] Q. Yu, M.A. Maddah-Ali, A.S. Avestimehr, The exact rate-memory tradeoff for caching with uncoded prefetching, IEEE Transactions on Information Theory 64 (2018) 1281-1296. https://doi.org/10.1109/TIT.2017.2785237.[7] S.P. Shariatpanahi, H. Shah-Mansouri, B.H. Khalaj, Caching gain in interference-limited wireless networks, IET Communications 9 (2015) 1269-1277. https://doi.org/10.1049/iet-com.2014.0955.[8] N. Naderializadeh, M.A. Maddah-Ali, A.S. Avestimehr, Fundamental limits of cache-aided interference management, IEEE Transactions on Information Theory 63 (2017) 3092-3107. https://doi.org/10.1109/TIT.2017.2669942.[9] J. Hachem, U. Niesen, S. Diggavi, Energy-Efficiency Gains of Caching for Interference Channels, IEEE Communications Letters 22 (2018) 1434-1437. https://doi.org/10.1109/LCOMM.2018.2822694.[10] M.A. Maddah-Ali, U. Niesen, Cache-aided interference channels, IEEE International Symposium on Infor","PeriodicalId":416488,"journal":{"name":"VNU Journal of Science: Computer Science and Communication Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116733999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-09DOI: 10.25073/2588-1086/vnucsce.206
K. Do, Nguyen Xuan Thanh, Hongchuan Yu
Motion style transfer is a primary problem in computer animation, allowing us to convert the motion of an actor to that of another one. Myriads approaches have been developed to perform this task, however, the majority of them are data-driven, which require a large dataset and a time-consuming period for training a model in order to achieve good results. In contrast, we propose a novel method applied successfully for this task in a small dataset. This exploits Sparse PCA to decompose original motions into smaller components which are learned with particular constraints. The synthesized results are highly precise and smooth motions with its emotion as shown in our experiments.
{"title":"Learning and transferring motion style using Sparse PCA","authors":"K. Do, Nguyen Xuan Thanh, Hongchuan Yu","doi":"10.25073/2588-1086/vnucsce.206","DOIUrl":"https://doi.org/10.25073/2588-1086/vnucsce.206","url":null,"abstract":"Motion style transfer is a primary problem in computer animation, allowing us to convert the motion of an actor to that of another one. Myriads approaches have been developed to perform this task, however, the majority of them are data-driven, which require a large dataset and a time-consuming period for training a model in order to achieve good results. In contrast, we propose a novel method applied successfully for this task in a small dataset. This exploits Sparse PCA to decompose original motions into smaller components which are learned with particular constraints. The synthesized results are highly precise and smooth motions with its emotion as shown in our experiments.","PeriodicalId":416488,"journal":{"name":"VNU Journal of Science: Computer Science and Communication Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114652941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-09DOI: 10.25073/2588-1086/vnucsce.220
H. Nguyen, Yasuo Tan
In this paper, we propose a simple model predictive control (MPC) scheme for Heating, ventilation, and air conditioning (HVAC) systems in residential houses. Our control scheme utilizes fitted thermal simulation to achieve precise prediction of room temperature and energy consumption in each prediction period. The set points of HVAC systems are selected to minimize the amount of energy consumption while maintaining room temperature within a desirable range to satisfy user comfort. Our control system is simple enough to implement in residential houses and is more efficient comparing with rule-based control methods.
{"title":"Simulation-based Short-term Model Predictive Control for HVAC Systems of Residential Houses","authors":"H. Nguyen, Yasuo Tan","doi":"10.25073/2588-1086/vnucsce.220","DOIUrl":"https://doi.org/10.25073/2588-1086/vnucsce.220","url":null,"abstract":"In this paper, we propose a simple model predictive control (MPC) scheme for Heating, ventilation, and air conditioning (HVAC) systems in residential houses. Our control scheme utilizes fitted thermal simulation to achieve precise prediction of room temperature and energy consumption in each prediction period. The set points of HVAC systems are selected to minimize the amount of energy consumption while maintaining room temperature within a desirable range to satisfy user comfort. Our control system is simple enough to implement in residential houses and is more efficient comparing with rule-based control methods.","PeriodicalId":416488,"journal":{"name":"VNU Journal of Science: Computer Science and Communication Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130525845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-25DOI: 10.25073/2588-1086/vnucsce.209
Hoang-Viet Tran, Pham Ngoc Hung
Assume-guarantee reasoning, a well-known approach in component-based software (CBS) verification, is infact a language containment problem whose computational cost depends on the sizes of languages of the softwarecomponents under checking and the assumption to be generated. Therefore, the smaller language assumptions,the more computational cost we can reduce in software verification. Moreover, strong assumptions are moreimportant in CBS verification in the context of software evolution because they can be reused many times in theverification process. For this reason, this paper presents a method for generating locally strongest assumptions withlocally smallest languages during CBS verification. The key idea of this method is to create a variant techniquefor answering membership queries of the Teacher when responding to the Learner in the L–based assumptionlearning process. This variant technique is then integrated into an algorithm in order to generate locally strongestassumptions. These assumptions will effectively reduce the computational cost when verifying CBS, especiallyfor large–scale and evolving ones. The correctness proof, experimental results, and some discussions about theproposed method are also presented.Keywords: Assume-guarantee reasoning, Model checking, Component-based software verification, Locallystrongest assumptions, Locally smallest language assumptions.
{"title":"On Locally Strongest Assumption Generation Method for Component-Based Software Verification","authors":"Hoang-Viet Tran, Pham Ngoc Hung","doi":"10.25073/2588-1086/vnucsce.209","DOIUrl":"https://doi.org/10.25073/2588-1086/vnucsce.209","url":null,"abstract":"Assume-guarantee reasoning, a well-known approach in component-based software (CBS) verification, is infact a language containment problem whose computational cost depends on the sizes of languages of the softwarecomponents under checking and the assumption to be generated. Therefore, the smaller language assumptions,the more computational cost we can reduce in software verification. Moreover, strong assumptions are moreimportant in CBS verification in the context of software evolution because they can be reused many times in theverification process. For this reason, this paper presents a method for generating locally strongest assumptions withlocally smallest languages during CBS verification. The key idea of this method is to create a variant techniquefor answering membership queries of the Teacher when responding to the Learner in the L–based assumptionlearning process. This variant technique is then integrated into an algorithm in order to generate locally strongestassumptions. These assumptions will effectively reduce the computational cost when verifying CBS, especiallyfor large–scale and evolving ones. The correctness proof, experimental results, and some discussions about theproposed method are also presented.Keywords: Assume-guarantee reasoning, Model checking, Component-based software verification, Locallystrongest assumptions, Locally smallest language assumptions.","PeriodicalId":416488,"journal":{"name":"VNU Journal of Science: Computer Science and Communication Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131385524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-25DOI: 10.25073/2588-1086/VNUCSCE.210
Hung Nguyen, T. Cao
Electronic medical records (EMR) have emerged as an important source of data for research in medicine andinformation technology, as they contain much of valuable human medical knowledge in healthcare and patienttreatment. This paper tackles the problem of coreference resolution in Vietnamese EMRs. Unlike in English ones,in Vietnamese clinical texts, verbs are often used to describe disease symptoms. So we first define rules to annotateverbs as mentions and consider coreference between verbs and other noun or adjective mentions possible. Thenwe propose a support vector machine classifier on bag-of-words vector representation of mentions that takes intoaccount the special characteristics of Vietnamese language to resolve their coreference. The achieved F1 scoreon our dataset of real Vietnamese EMRs provided by a hospital in Ho Chi Minh city is 91.4%. To the best of ourknowledge, this is the first research work in coreference resolution on Vietnamese clinical texts.Keywords: Clinical text, support vector machine, bag-of-words vector, lexical similarity, unrestricted coreference
{"title":"Coreference Resolution in Vietnamese Electronic Medical Records","authors":"Hung Nguyen, T. Cao","doi":"10.25073/2588-1086/VNUCSCE.210","DOIUrl":"https://doi.org/10.25073/2588-1086/VNUCSCE.210","url":null,"abstract":"Electronic medical records (EMR) have emerged as an important source of data for research in medicine andinformation technology, as they contain much of valuable human medical knowledge in healthcare and patienttreatment. This paper tackles the problem of coreference resolution in Vietnamese EMRs. Unlike in English ones,in Vietnamese clinical texts, verbs are often used to describe disease symptoms. So we first define rules to annotateverbs as mentions and consider coreference between verbs and other noun or adjective mentions possible. Thenwe propose a support vector machine classifier on bag-of-words vector representation of mentions that takes intoaccount the special characteristics of Vietnamese language to resolve their coreference. The achieved F1 scoreon our dataset of real Vietnamese EMRs provided by a hospital in Ho Chi Minh city is 91.4%. To the best of ourknowledge, this is the first research work in coreference resolution on Vietnamese clinical texts.Keywords: Clinical text, support vector machine, bag-of-words vector, lexical similarity, unrestricted coreference","PeriodicalId":416488,"journal":{"name":"VNU Journal of Science: Computer Science and Communication Engineering","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123369649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}