首页 > 最新文献

The Journal of Supercomputing最新文献

英文 中文
Arbitrary shape text detection fusing InceptionNeXt and multi-scale attention mechanism 融合 InceptionNeXt 和多尺度关注机制的任意形状文本检测
Pub Date : 2024-08-12 DOI: 10.1007/s11227-024-06418-w
Xianguo Li, Yu Zhang, Yi Liu, Xingchen Yao, Xinyi Zhou

Existing segmentation-based text detection methods generally face the problems of insufficient receptive fields, insufficient text information filtering, and difficulty in balancing detection accuracy and speed, limiting their ability to detect arbitrary-shaped text in complex backgrounds. To address these problems, we propose a new text detection method fusing the pure ConvNet model InceptionNeXt and the multi-scale attention mechanism. Firstly, we propose a text information reinforcement module to fully extract effective text information from features of different scales while preserving spatial position information. Secondly, we construct the InceptionNeXt Block module to compensate for insufficient receptive fields without significantly reducing speed. Finally, the INA-DBNet network structure is designed to fuse local and global features and achieve the balance of accuracy and speed. Experimental results demonstrate the efficacy of our method. Particularly, on the MSRA-TD500 and Total-text datasets, INA-DBNet achieves 91.3% and 86.7% F-measure while maintaining real-time inference speed. Code is available at: https://github.com/yuyu678/INANET.

现有的基于分割的文本检测方法普遍面临感受野不足、文本信息过滤不充分、检测精度和速度难以兼顾等问题,限制了其在复杂背景中检测任意形状文本的能力。针对这些问题,我们提出了一种融合纯 ConvNet 模型 InceptionNeXt 和多尺度注意力机制的新文本检测方法。首先,我们提出了文本信息强化模块,在保留空间位置信息的同时,从不同尺度的特征中充分提取有效的文本信息。其次,我们构建了 InceptionNeXt Block 模块,以在不显著降低速度的情况下补偿不足的感受野。最后,我们设计了 INA-DBNet 网络结构,以融合局部和全局特征,实现准确性和速度的平衡。实验结果证明了我们方法的有效性。特别是在 MSRA-TD500 和 Total-text 数据集上,INA-DBNet 在保持实时推理速度的同时,F-measure 分别达到了 91.3% 和 86.7%。代码见:https://github.com/yuyu678/INANET。
{"title":"Arbitrary shape text detection fusing InceptionNeXt and multi-scale attention mechanism","authors":"Xianguo Li, Yu Zhang, Yi Liu, Xingchen Yao, Xinyi Zhou","doi":"10.1007/s11227-024-06418-w","DOIUrl":"https://doi.org/10.1007/s11227-024-06418-w","url":null,"abstract":"<p>Existing segmentation-based text detection methods generally face the problems of insufficient receptive fields, insufficient text information filtering, and difficulty in balancing detection accuracy and speed, limiting their ability to detect arbitrary-shaped text in complex backgrounds. To address these problems, we propose a new text detection method fusing the pure ConvNet model InceptionNeXt and the multi-scale attention mechanism. Firstly, we propose a text information reinforcement module to fully extract effective text information from features of different scales while preserving spatial position information. Secondly, we construct the InceptionNeXt Block module to compensate for insufficient receptive fields without significantly reducing speed. Finally, the INA-DBNet network structure is designed to fuse local and global features and achieve the balance of accuracy and speed. Experimental results demonstrate the efficacy of our method. Particularly, on the MSRA-TD500 and Total-text datasets, INA-DBNet achieves 91.3% and 86.7% <i>F</i>-measure while maintaining real-time inference speed. Code is available at: https://github.com/yuyu678/INANET.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"79 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141941722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual-Q network deep reinforcement learning-based computation offloading method for industrial internet of things 基于双 Q 网络深度强化学习的工业物联网计算卸载方法
Pub Date : 2024-08-12 DOI: 10.1007/s11227-024-06425-x
Ruizhong Du, Jinru Wu, Yan Gao

In the development of industrial internet of things (IIoT), the application of mobile edge computing (MEC) has significantly enhanced the efficiency of task computation offloading. However, the risk of data privacy leakage persists during the computation offloading process. Considering the diversity of task data sensitivity and the variability in server security protection capabilities, this paper proposes a method for assessing privacy satisfaction. To ensure offloading efficiency while effectively enhancing privacy security, we have proposed an IIoT cloud-edge-device computation offloading algorithm based on dual-Q network deep reinforcement learning, named D2PCO, to optimize the computation offloading process in IIoT tasks. The incorporation of the dual-Q network notably enhances the algorithm’s learning ability and efficiency in dealing with complex decision-making problems. Experimental results show that the proposed D2PCO algorithm significantly improves user privacy satisfaction while ensuring low delay. Compared with MA3MCO, DDPG, shortest distance priority, and random scheduling algorithms, it reduces the average offloading delay by 4.15%, 9.98%, 13.2%, and 26.47% and increases privacy satisfaction by 0.8%, 4.26%, 10.15%, and 30.30%, respectively.

在工业物联网(IIoT)的发展过程中,移动边缘计算(MEC)的应用大大提高了任务计算卸载的效率。然而,在计算卸载过程中,数据隐私泄露的风险依然存在。考虑到任务数据敏感性的多样性和服务器安全保护能力的差异性,本文提出了一种隐私满意度评估方法。为了在保证卸载效率的同时有效提升隐私安全,我们提出了一种基于双Q网络深度强化学习的IIoT云端-边缘-设备计算卸载算法,命名为D2PCO,用于优化IIoT任务中的计算卸载过程。双Q网络的加入显著增强了算法的学习能力和处理复杂决策问题的效率。实验结果表明,所提出的D2PCO算法在确保低延迟的同时,显著提高了用户隐私满意度。与MA3MCO、DDPG、最短距离优先和随机调度算法相比,它分别降低了4.15%、9.98%、13.2%和26.47%的平均卸载延迟,提高了0.8%、4.26%、10.15%和30.30%的隐私满意度。
{"title":"Dual-Q network deep reinforcement learning-based computation offloading method for industrial internet of things","authors":"Ruizhong Du, Jinru Wu, Yan Gao","doi":"10.1007/s11227-024-06425-x","DOIUrl":"https://doi.org/10.1007/s11227-024-06425-x","url":null,"abstract":"<p>In the development of industrial internet of things (IIoT), the application of mobile edge computing (MEC) has significantly enhanced the efficiency of task computation offloading. However, the risk of data privacy leakage persists during the computation offloading process. Considering the diversity of task data sensitivity and the variability in server security protection capabilities, this paper proposes a method for assessing privacy satisfaction. To ensure offloading efficiency while effectively enhancing privacy security, we have proposed an IIoT cloud-edge-device computation offloading algorithm based on dual-Q network deep reinforcement learning, named D2PCO, to optimize the computation offloading process in IIoT tasks. The incorporation of the dual-Q network notably enhances the algorithm’s learning ability and efficiency in dealing with complex decision-making problems. Experimental results show that the proposed D2PCO algorithm significantly improves user privacy satisfaction while ensuring low delay. Compared with MA3MCO, DDPG, shortest distance priority, and random scheduling algorithms, it reduces the average offloading delay by 4.15%, 9.98%, 13.2%, and 26.47% and increases privacy satisfaction by 0.8%, 4.26%, 10.15%, and 30.30%, respectively.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141941721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TEMM: text-enhanced multi-interactive attention and multitask learning network for multimodal sentiment analysis TEMM:用于多模态情感分析的文本增强型多交互关注和多任务学习网络
Pub Date : 2024-08-12 DOI: 10.1007/s11227-024-06422-0
Bengong Yu, Zhongyu Shi

Multimodal sentiment analysis is an important and active research field. Most methods construct fusion modules based on unimodal representations generated by pretrained models, which lack the deep interaction of multimodal information, especially the rich semantic-emotional information embedded in text. In addition, previous studies have focused on capturing modal coherence information and ignored differentiated information. We propose a text-enhanced multi-interactive attention and multitask learning network (TEMM). First, syntactic dependency graphs and sentiment graphs of the text are constructed, and additional graph embedding representations of the text are obtained using graph convolutional networks and graph attention networks. Then, self-attention and cross-modal attention are applied to explore intramodal and intermodal dynamic interactions, using text as the main cue. Finally, a multitask learning framework is constructed to exert control over the information flow by monitoring the mutual information between the unimodal and multimodal representations and exploiting the classification properties of the unimodal modality to achieve a more comprehensive focus on modal information. The experimental results on the CMU-MOSI, CMU-MOSEI, and CH-SIMS datasets show that the proposed model outperforms state-of-the-art models.

多模态情感分析是一个重要而活跃的研究领域。大多数方法都是基于预训练模型生成的单模态表征构建融合模块,缺乏多模态信息的深度交互,尤其是文本中蕴含的丰富语义情感信息。此外,以往的研究侧重于捕捉模态一致性信息,忽略了差异化信息。我们提出了一种文本增强型多交互注意和多任务学习网络(TEMM)。首先,我们构建了文本的句法依赖图和情感图,并利用图卷积网络和图注意力网络获得了文本的附加图嵌入表示。然后,以文本为主要线索,应用自我注意和跨模态注意来探索模态内和模态间的动态交互。最后,我们构建了一个多任务学习框架,通过监测单模态和多模态表征之间的互信息来控制信息流,并利用单模态的分类特性来实现对模态信息更全面的关注。在 CMU-MOSI、CMU-MOSEI 和 CH-SIMS 数据集上的实验结果表明,所提出的模型优于最先进的模型。
{"title":"TEMM: text-enhanced multi-interactive attention and multitask learning network for multimodal sentiment analysis","authors":"Bengong Yu, Zhongyu Shi","doi":"10.1007/s11227-024-06422-0","DOIUrl":"https://doi.org/10.1007/s11227-024-06422-0","url":null,"abstract":"<p>Multimodal sentiment analysis is an important and active research field. Most methods construct fusion modules based on unimodal representations generated by pretrained models, which lack the deep interaction of multimodal information, especially the rich semantic-emotional information embedded in text. In addition, previous studies have focused on capturing modal coherence information and ignored differentiated information. We propose a text-enhanced multi-interactive attention and multitask learning network (TEMM). First, syntactic dependency graphs and sentiment graphs of the text are constructed, and additional graph embedding representations of the text are obtained using graph convolutional networks and graph attention networks. Then, self-attention and cross-modal attention are applied to explore intramodal and intermodal dynamic interactions, using text as the main cue. Finally, a multitask learning framework is constructed to exert control over the information flow by monitoring the mutual information between the unimodal and multimodal representations and exploiting the classification properties of the unimodal modality to achieve a more comprehensive focus on modal information. The experimental results on the CMU-MOSI, CMU-MOSEI, and CH-SIMS datasets show that the proposed model outperforms state-of-the-art models.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"122 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Matching with contract-based resource trading in UAV-assisted MEC system 无人机辅助 MEC 系统中基于合同的资源交易匹配
Pub Date : 2024-08-12 DOI: 10.1007/s11227-024-06397-y
Yuanfa Lu, Ziqiong Lin, Wenjie Zhang, Yifeng Zheng, Jingmin Yang

Multi-access edge computing (MEC), as a computing model that provides services on the user side, can effectively solve the problems of high delay and resource shortage in traditional cloud computing when processing massive data. However, existing edge computing resources are still limited, and difficult to provide services to users in inaccessible remote areas. Considering that unmanned aerial vehicle (UAV) has the advantages of easy deployment, high flexibility and low cost, a UAV-assisted MEC hierarchical computation offloading framework is proposed. Firstly, contract theory is used to solve the information asymmetry problem between the platform and the UAV, and the UAV is encouraged to provide computing services. By analyzing the attributes and conditions of feasible contracts, the optimal contract is designed using the Lagrange multiplier method. Secondly, by constructing the preference set between UAV and mobile user (MU), a mobile user and unmanned aerial vehicle bilateral matching (MUBM) algorithm is proposed to establish the connection between user tasks and UAV computing resources. Finally, the feasibility and effectiveness of the contract were verified through experiments. The experimental results also prove the stability of the MUBM.

多接入边缘计算(MEC)作为一种在用户侧提供服务的计算模式,可以有效解决传统云计算在处理海量数据时存在的高延迟和资源短缺问题。然而,现有的边缘计算资源仍然有限,难以为交通不便的偏远地区用户提供服务。考虑到无人机(UAV)具有部署方便、灵活性高、成本低等优点,本文提出了无人机辅助 MEC 分层计算卸载框架。首先,利用契约理论解决平台与无人机之间的信息不对称问题,鼓励无人机提供计算服务。通过分析可行合约的属性和条件,利用拉格朗日乘法设计出最优合约。其次,通过构建无人机与移动用户(MU)之间的偏好集,提出移动用户与无人机双边匹配(MUBM)算法,建立用户任务与无人机计算资源之间的联系。最后,通过实验验证了合同的可行性和有效性。实验结果也证明了 MUBM 的稳定性。
{"title":"Matching with contract-based resource trading in UAV-assisted MEC system","authors":"Yuanfa Lu, Ziqiong Lin, Wenjie Zhang, Yifeng Zheng, Jingmin Yang","doi":"10.1007/s11227-024-06397-y","DOIUrl":"https://doi.org/10.1007/s11227-024-06397-y","url":null,"abstract":"<p>Multi-access edge computing (MEC), as a computing model that provides services on the user side, can effectively solve the problems of high delay and resource shortage in traditional cloud computing when processing massive data. However, existing edge computing resources are still limited, and difficult to provide services to users in inaccessible remote areas. Considering that unmanned aerial vehicle (UAV) has the advantages of easy deployment, high flexibility and low cost, a UAV-assisted MEC hierarchical computation offloading framework is proposed. Firstly, contract theory is used to solve the information asymmetry problem between the platform and the UAV, and the UAV is encouraged to provide computing services. By analyzing the attributes and conditions of feasible contracts, the optimal contract is designed using the Lagrange multiplier method. Secondly, by constructing the preference set between UAV and mobile user (MU), a mobile user and unmanned aerial vehicle bilateral matching (MUBM) algorithm is proposed to establish the connection between user tasks and UAV computing resources. Finally, the feasibility and effectiveness of the contract were verified through experiments. The experimental results also prove the stability of the MUBM.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141941720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The K1,2-structure-connectivity of graphs 图的 K1,2 结构连通性
Pub Date : 2024-08-11 DOI: 10.1007/s11227-024-06390-5
Xiao Zhao, Haojie Zheng, Hengzhe Li

In this paper, we focus on examining the (K_{1,2})-structure-connectivity of any connected graph. Let G be a connected graph with n vertices, we show that (kappa (G; K_{1,2})) is well defined if (hbox {diam}(G)ge 4), or (nequiv 1pmod 3), or (Gnotin {C_{5},K_{n}}) when (nequiv 2pmod 3), or there exist three vertices uvw such that (N_{G}(u)cap (N_{G}({v,w})cup {v,w})=emptyset) when (nequiv 0pmod 3). Furthermore, if G has (K_{1,2})-structure-cut, we prove (kappa (G)/3le kappa (G; K_{1,2})le kappa (G)).

在本文中,我们将重点研究任意连通图的(K_{1,2})-结构-连通性。让 G 是一个有 n 个顶点的连通图,我们证明,如果 kappa (G. K_{1,2}) 定义良好,那么 kappa (G. K_{1,2}) 就是连通图;如果(hbox {diam}(G)ge 4), 或者(nequiv 1pmod 3), 或者(Gnotin {C_{5},K_{n}}) 当(nequiv 2pmod 3)、或者存在三个顶点u, v, w,当(n/equiv 0pmod 3) 时,(N_{G}(u)cap (N_{G}({v,w})cup {v,w})=emptyset).此外,如果G有(K_{1,2})-结构切分,我们证明(kappa (G)/3le kappa (G; K_{1,2})le kappa (G)).
{"title":"The K1,2-structure-connectivity of graphs","authors":"Xiao Zhao, Haojie Zheng, Hengzhe Li","doi":"10.1007/s11227-024-06390-5","DOIUrl":"https://doi.org/10.1007/s11227-024-06390-5","url":null,"abstract":"<p>In this paper, we focus on examining the <span>(K_{1,2})</span>-structure-connectivity of any connected graph. Let <i>G</i> be a connected graph with <i>n</i> vertices, we show that <span>(kappa (G; K_{1,2}))</span> is well defined if <span>(hbox {diam}(G)ge 4)</span>, or <span>(nequiv 1pmod 3)</span>, or <span>(Gnotin {C_{5},K_{n}})</span> when <span>(nequiv 2pmod 3)</span>, or there exist three vertices <i>u</i>, <i>v</i>, <i>w</i> such that <span>(N_{G}(u)cap (N_{G}({v,w})cup {v,w})=emptyset)</span> when <span>(nequiv 0pmod 3)</span>. Furthermore, if <i>G</i> has <span>(K_{1,2})</span>-structure-cut, we prove <span>(kappa (G)/3le kappa (G; K_{1,2})le kappa (G))</span>.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"103 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141941724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deformable attention mechanism-based YOLOv7 structure for lung nodule detection 基于可变形注意力机制的 YOLOv7 结构用于肺结节检测
Pub Date : 2024-08-11 DOI: 10.1007/s11227-024-06381-6
Yu Liu, Yongcai Ao

Early detection of lung nodules is essential for lung cancer screening and improving patient survival rates. Traditional object detection networks such as YOLO and Faster R-CNN have shown promising results in detecting lung nodules but often lack sufficient integration of extracted features to enhance accuracy and efficiency. Moreover, these methods typically do not retain the spatial information of lung nodules from the original CT images. To overcome these limitations, a novel lung nodule detection algorithm based on YOLOv7 is introduced. Firstly, to better preserve essential features and minimize interference from irrelevant background noise, a deformable attention module for feature fusion has been designed. Additionally, maximum intensity projection is employed to create projection images at various intensities, thereby enriching the spatial background information that is often missing in single CT slices. Thirdly, the WIoU loss function is utilized to replace the original YOLOv7 loss function, aiming to reduce the influence of low-quality samples on the gradient within the dataset. The proposed model was validated using the publicly available LUNA16 dataset and achieved a recall rate of 94.40% and an AP value of 95.39%. These results demonstrate the enhanced precision and efficiency of lung nodule detection.

早期检测肺结节对于肺癌筛查和提高患者生存率至关重要。传统的物体检测网络(如 YOLO 和 Faster R-CNN)在检测肺结节方面取得了可喜的成果,但往往缺乏对提取特征的充分整合来提高准确性和效率。此外,这些方法通常无法从原始 CT 图像中保留肺结节的空间信息。为了克服这些局限性,本文介绍了一种基于 YOLOv7 的新型肺结节检测算法。首先,为了更好地保留基本特征并减少无关背景噪声的干扰,设计了一个用于特征融合的可变形注意力模块。此外,还采用了最大强度投影技术来创建不同强度的投影图像,从而丰富了单张 CT 切片中经常缺失的空间背景信息。第三,利用 WIoU 损失函数取代原来的 YOLOv7 损失函数,旨在减少低质量样本对数据集梯度的影响。利用公开的 LUNA16 数据集对所提出的模型进行了验证,结果显示召回率为 94.40%,AP 值为 95.39%。这些结果表明,肺结节检测的精度和效率得到了提高。
{"title":"Deformable attention mechanism-based YOLOv7 structure for lung nodule detection","authors":"Yu Liu, Yongcai Ao","doi":"10.1007/s11227-024-06381-6","DOIUrl":"https://doi.org/10.1007/s11227-024-06381-6","url":null,"abstract":"<p>Early detection of lung nodules is essential for lung cancer screening and improving patient survival rates. Traditional object detection networks such as YOLO and Faster R-CNN have shown promising results in detecting lung nodules but often lack sufficient integration of extracted features to enhance accuracy and efficiency. Moreover, these methods typically do not retain the spatial information of lung nodules from the original CT images. To overcome these limitations, a novel lung nodule detection algorithm based on YOLOv7 is introduced. Firstly, to better preserve essential features and minimize interference from irrelevant background noise, a deformable attention module for feature fusion has been designed. Additionally, maximum intensity projection is employed to create projection images at various intensities, thereby enriching the spatial background information that is often missing in single CT slices. Thirdly, the WIoU loss function is utilized to replace the original YOLOv7 loss function, aiming to reduce the influence of low-quality samples on the gradient within the dataset. The proposed model was validated using the publicly available LUNA16 dataset and achieved a recall rate of 94.40% and an AP value of 95.39%. These results demonstrate the enhanced precision and efficiency of lung nodule detection.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"60 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141941723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A high-performance dynamic scheduling for sparse matrix-based applications on heterogeneous CPU–GPU environment 异构 CPU-GPU 环境中基于稀疏矩阵的高性能动态调度应用
Pub Date : 2024-08-07 DOI: 10.1007/s11227-024-06394-1
Ahmad Shokrani Baigi, Abdorreza Savadi, Mahmoud Naghibzadeh

Efficient utilization of processors in heterogeneous CPU–GPU systems is crucial for improving overall application performance by reducing workload completion time. This article introduces a framework designed to achieve maximum performance in scheduling the processing of sparse matrix-based applications within a heterogeneous CPU–GPU system. The framework suggests splitting the matrix into chunks, employing machine learning to find the optimal chunk size for scheduling efficiency, with the number of GPU streams regarded as a critical factor. The scheduling algorithm introduced is inspired by the concept of quartiles in statistics and is designed to operate in real-time, thereby striving to impose minimal overhead on the system. The evaluation of the proposed framework focused on the SpMV (Sparse Matrix–Vector Multiplication) kernel, essential for various applications such as matrix-based graph processing. This evaluation was conducted using a system equipped with an NVIDIA GTX 1070 GPU. Testing on real-world sparse matrices showed that the proposed scheduling algorithm significantly outperforms scenarios with no offloading, full offloading, and the Alternate Assignment method.

高效利用异构 CPU-GPU 系统中的处理器对于通过缩短工作负载完成时间来提高整体应用性能至关重要。本文介绍了一个框架,旨在实现异构 CPU-GPU 系统中基于稀疏矩阵的应用处理调度的最高性能。该框架建议将矩阵分割成块,利用机器学习来找到提高调度效率的最佳块大小,GPU 流的数量被视为一个关键因素。引入的调度算法受统计学中四分位数概念的启发,旨在实时运行,从而努力将系统开销降至最低。对拟议框架的评估主要集中在 SpMV(稀疏矩阵-矢量乘法)内核上,该内核对基于矩阵的图形处理等各种应用至关重要。该评估使用配备英伟达™(NVIDIA®)GTX 1070 GPU的系统进行。对真实世界稀疏矩阵的测试表明,所提出的调度算法明显优于无卸载、完全卸载和交替分配法。
{"title":"A high-performance dynamic scheduling for sparse matrix-based applications on heterogeneous CPU–GPU environment","authors":"Ahmad Shokrani Baigi, Abdorreza Savadi, Mahmoud Naghibzadeh","doi":"10.1007/s11227-024-06394-1","DOIUrl":"https://doi.org/10.1007/s11227-024-06394-1","url":null,"abstract":"<p>Efficient utilization of processors in heterogeneous CPU–GPU systems is crucial for improving overall application performance by reducing workload completion time. This article introduces a framework designed to achieve maximum performance in scheduling the processing of sparse matrix-based applications within a heterogeneous CPU–GPU system. The framework suggests splitting the matrix into chunks, employing machine learning to find the optimal chunk size for scheduling efficiency, with the number of GPU streams regarded as a critical factor. The scheduling algorithm introduced is inspired by the concept of quartiles in statistics and is designed to operate in real-time, thereby striving to impose minimal overhead on the system. The evaluation of the proposed framework focused on the SpMV (Sparse Matrix–Vector Multiplication) kernel, essential for various applications such as matrix-based graph processing. This evaluation was conducted using a system equipped with an NVIDIA GTX 1070 GPU. Testing on real-world sparse matrices showed that the proposed scheduling algorithm significantly outperforms scenarios with no offloading, full offloading, and the Alternate Assignment method.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141941577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A machine learning approach for trading in financial markets using dynamic threshold breakout labeling 使用动态阈值突破标记的金融市场交易机器学习方法
Pub Date : 2024-08-07 DOI: 10.1007/s11227-024-06403-3
Erfan Saberi, Jamshid Pirgazi, Ali Ghanbari sorkhi

Researchers often use machine learning and deep learning to predict price trends in the financial markets, aiming to achieve high returns. However, accurately predicting market prices is challenging due to their nonlinear and seemingly random nature. Improving the accuracy of the prediction model is the common focus of researchers, yet it is crucial to also consider the data used in training. Traditional labeling methods used in most price trend prediction studies are not robust as they are sensitive to small price changes, leading to inefficient model training. To address this issue, this study introduces a Dynamic Threshold Breakout (DTB) labeling system that labels data based on the price percentage change during a specific period. This proposed labeling system was then integrated into an automated trading system using LightGBM and evaluated using three different markets. The results showed that the DTB labeling method is effective for trading in financial markets in terms of winning ratio, payoff ratio, profit factor, accuracy and ROI in trading performance.

研究人员经常使用机器学习和深度学习来预测金融市场的价格趋势,以期获得高回报。然而,由于市场价格的非线性和看似随机的性质,准确预测市场价格具有挑战性。提高预测模型的准确性是研究人员共同关注的焦点,但同时考虑训练中使用的数据也至关重要。大多数价格趋势预测研究中使用的传统标注方法并不稳健,因为它们对微小的价格变化很敏感,导致模型训练效率低下。为解决这一问题,本研究引入了动态阈值突破(DTB)标注系统,该系统根据特定时期的价格百分比变化对数据进行标注。然后,将所提出的标签系统集成到使用 LightGBM 的自动交易系统中,并使用三个不同的市场进行评估。结果表明,DTB 标签法在金融市场交易中的胜率、回报率、利润系数、准确性和投资回报率等方面都很有效。
{"title":"A machine learning approach for trading in financial markets using dynamic threshold breakout labeling","authors":"Erfan Saberi, Jamshid Pirgazi, Ali Ghanbari sorkhi","doi":"10.1007/s11227-024-06403-3","DOIUrl":"https://doi.org/10.1007/s11227-024-06403-3","url":null,"abstract":"<p>Researchers often use machine learning and deep learning to predict price trends in the financial markets, aiming to achieve high returns. However, accurately predicting market prices is challenging due to their nonlinear and seemingly random nature. Improving the accuracy of the prediction model is the common focus of researchers, yet it is crucial to also consider the data used in training. Traditional labeling methods used in most price trend prediction studies are not robust as they are sensitive to small price changes, leading to inefficient model training. To address this issue, this study introduces a Dynamic Threshold Breakout (DTB) labeling system that labels data based on the price percentage change during a specific period. This proposed labeling system was then integrated into an automated trading system using LightGBM and evaluated using three different markets. The results showed that the DTB labeling method is effective for trading in financial markets in terms of winning ratio, payoff ratio, profit factor, accuracy and ROI in trading performance.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141941576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple heterogeneous cluster-head-based secure data collection in mobile crowdsensing environment 移动人群感应环境中基于多个异构簇头的安全数据采集
Pub Date : 2024-08-07 DOI: 10.1007/s11227-024-06395-0
Ramesh K. Sahoo, Sateesh Kumar Pradhan, Srinivas Sethi, Siba K. Udgata

The security and privacy of data are major concerns in the mobile crowdsensing (MCS) environment due to the huge amount of heterogeneous data received from various users and devices automatically or manually regarding their surrounding environment. User participation in the MCS approach is highly essential to have a vast dataset for analysis that will provide the required information or beneficial solution for society. However, it is difficult to achieve due to huge energy consumption, the need for internet connectivity for data transmission, and the security and privacy of data. Therefore, it is essential to have a network coverage model in which data transmission can be done with minimal energy consumption and the need for internet connectivity can be removed from the user’s side. The user’s sensitive data needs to be protected from internal and external attackers to improve the efficiency of the solution provided by the MCS environment with genuine data. This work is based on data collection from users based on their experience for a certain location using the hybrid network coverage model based on clustering, in which each location may have just one or multiple heterogeneous cluster heads. Discrete event-based CrowdSenSim Simulator has been used to design a simulation environment in urban spaces in which 2000 users will move to any location randomly among considered 40 locations and provide feedback data for the location. In this paper, a novel security mechanism based on multiple heterogeneous cluster heads per location has been presented, and it provides better security against attackers than the security model with one cluster head per location. The proposed multiple-cluster heads per location (MCHL)-based mechanism has been compared with the vulnerable one-cluster head per location (OCHL)-based mechanism on the basis of the average number of rounds attackers attacked, average number of locations attackers attacked, average coverage and average efficiency of attackers, and average efficiency of system security.

由于从不同用户和设备自动或手动接收到有关其周围环境的大量异构数据,数据的安全性和隐私性成为移动群感(MCS)环境中的主要问题。要想获得大量用于分析的数据集,为社会提供所需的信息或有益的解决方案,用户参与 MCS 方法至关重要。然而,由于能源消耗巨大、数据传输需要互联网连接以及数据的安全性和隐私性,要实现这一点非常困难。因此,必须建立一种网络覆盖模式,在这种模式下,数据传输的能耗最小,用户无需连接互联网。用户的敏感数据需要得到保护,以免受到内部和外部攻击者的攻击,从而提高移动通信系统环境提供真实数据解决方案的效率。这项工作基于用户对某一地点的体验收集数据,使用基于聚类的混合网络覆盖模型,其中每个地点可能只有一个或多个异构簇头。基于离散事件的 CrowdSenSim 模拟器被用于设计城市空间的模拟环境,在该环境中,2000 名用户将在考虑的 40 个地点中随机移动到任意地点,并提供该地点的反馈数据。本文提出了一种基于每个位置多个异构簇头的新型安全机制,与每个位置一个簇头的安全模型相比,它能提供更好的安全防护。根据攻击者攻击的平均轮数、攻击者攻击的平均地点数、攻击者的平均覆盖率和平均效率以及系统安全的平均效率,对提出的基于每个地点多个簇头(MCHL)的机制和脆弱的基于每个地点一个簇头(OCHL)的机制进行了比较。
{"title":"Multiple heterogeneous cluster-head-based secure data collection in mobile crowdsensing environment","authors":"Ramesh K. Sahoo, Sateesh Kumar Pradhan, Srinivas Sethi, Siba K. Udgata","doi":"10.1007/s11227-024-06395-0","DOIUrl":"https://doi.org/10.1007/s11227-024-06395-0","url":null,"abstract":"<p>The security and privacy of data are major concerns in the mobile crowdsensing (MCS) environment due to the huge amount of heterogeneous data received from various users and devices automatically or manually regarding their surrounding environment. User participation in the MCS approach is highly essential to have a vast dataset for analysis that will provide the required information or beneficial solution for society. However, it is difficult to achieve due to huge energy consumption, the need for internet connectivity for data transmission, and the security and privacy of data. Therefore, it is essential to have a network coverage model in which data transmission can be done with minimal energy consumption and the need for internet connectivity can be removed from the user’s side. The user’s sensitive data needs to be protected from internal and external attackers to improve the efficiency of the solution provided by the MCS environment with genuine data. This work is based on data collection from users based on their experience for a certain location using the hybrid network coverage model based on clustering, in which each location may have just one or multiple heterogeneous cluster heads. Discrete event-based CrowdSenSim Simulator has been used to design a simulation environment in urban spaces in which 2000 users will move to any location randomly among considered 40 locations and provide feedback data for the location. In this paper, a novel security mechanism based on multiple heterogeneous cluster heads per location has been presented, and it provides better security against attackers than the security model with one cluster head per location. The proposed multiple-cluster heads per location (MCHL)-based mechanism has been compared with the vulnerable one-cluster head per location (OCHL)-based mechanism on the basis of the average number of rounds attackers attacked, average number of locations attackers attacked, average coverage and average efficiency of attackers, and average efficiency of system security.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141941725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On connection number-based topological indices and entropy measures for triangular $$gamma$$ -graphyne network 论三角形 $$gamma$$ -graphyne 网络基于连接数的拓扑指数和熵量
Pub Date : 2024-08-07 DOI: 10.1007/s11227-024-06398-x
Rongbing Huang, Muhammad Farhan Hanif, Muhammad Kamran Siddiqui, Mazhar Hussain, Muhammad Faisal Hanif

Triangular (gamma)-graphyne has a special carbon–carbon bonding arrangement, which results in outstanding electrical characteristics. It is a potential material for semiconductors and conductors in nanoelectronic devices. The number of vertices at a distance of 2 from a vertex is known as the connection number (CN) of that vertex. In this paper, we computed Zagreb-type indices based on connection numbers. In order to give us a better knowledge of the structural properties of molecules or networks, these indices are calculated. Following the computation of these indices, we investigated their use in computing entropy, providing important new information about the thermodynamic characteristics and complexity of the understudied systems. We used Python language to find the Pearson correlation coefficient between indices and entropy and show its heat map.

三角形石墨烯具有特殊的碳-碳键排列,因而具有出色的电气特性。它是纳米电子器件中一种潜在的半导体和导体材料。与顶点距离为 2 的顶点数称为该顶点的连接数(CN)。在本文中,我们计算了基于连接数的萨格勒布型指数。为了让我们更好地了解分子或网络的结构特性,我们计算了这些指数。在计算出这些指数后,我们研究了它们在计算熵中的应用,从而提供了有关未被充分研究的系统的热力学特性和复杂性的重要新信息。我们使用 Python 语言找到了指数与熵之间的皮尔逊相关系数,并展示了其热图。
{"title":"On connection number-based topological indices and entropy measures for triangular $$gamma$$ -graphyne network","authors":"Rongbing Huang, Muhammad Farhan Hanif, Muhammad Kamran Siddiqui, Mazhar Hussain, Muhammad Faisal Hanif","doi":"10.1007/s11227-024-06398-x","DOIUrl":"https://doi.org/10.1007/s11227-024-06398-x","url":null,"abstract":"<p>Triangular <span>(gamma)</span>-graphyne has a special carbon–carbon bonding arrangement, which results in outstanding electrical characteristics. It is a potential material for semiconductors and conductors in nanoelectronic devices. The number of vertices at a distance of 2 from a vertex is known as the connection number (CN) of that vertex. In this paper, we computed Zagreb-type indices based on connection numbers. In order to give us a better knowledge of the structural properties of molecules or networks, these indices are calculated. Following the computation of these indices, we investigated their use in computing entropy, providing important new information about the thermodynamic characteristics and complexity of the understudied systems. We used Python language to find the Pearson correlation coefficient between indices and entropy and show its heat map.\u0000</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141941574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
The Journal of Supercomputing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1