首页 > 最新文献

2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)最新文献

英文 中文
A Prior Preference-Based Decision-Making Algorithm in Pareto Optimization 基于先验偏好的Pareto优化决策算法
Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8964943
M. Jafari, Lida Daryani, M. Feizi-Derakhshi
In the applications of real-life, the importance of having a flexible optimization algorithm is obvious. Commonly in these issues, Evolutionary Multi-Objective Optimization (EMO) algorithms and particularly Pareto optimization method as one of the most significant and useful classes have been used extensively. Often optimization algorithms that have used the EMO algorithm in their own as posteriori Decision-making (DM) algorithms, in weighted objectives problems, have suffered from the uniform prioritization of objectives. In this paper, we propose a lightweight angle-based updating Pareto front (PF) algorithm which considers the preferences of desired objectives expressed using the Favorite Region (FR). Actually, the FR has been created in the objective space according to the prior-fixed angle of priority objectives. Thus, the solutions in PF will be able to tend towards FR during the evolutionary process. Consequently, other solutions that are not in the favorite region will not go away, but the Fronts levels of solutions via an update process will change rearwardly. The updating process in Pareto method, during the evolution process, causes that the solutions in the first and second fronts lead to the exploration and exploitation of appropriate solutions in the favorite regions with uniform distribution for first Pareto Front, while the solutions’ density in the undesirable region become impaired. The experimental results on benchmark multi-objective problems show that the proposed algorithm in addition to providing preference decision-making, by providing a tradeoff between convergence performance and computational complexity, can give the best convergence performance.
在实际应用中,灵活的优化算法的重要性是显而易见的。在这些问题中,进化多目标优化算法,尤其是帕累托优化算法作为最重要和最有用的一类算法得到了广泛的应用。在加权目标问题中,通常使用EMO算法作为后验决策(DM)算法的优化算法会受到目标统一优先级的影响。在本文中,我们提出了一种轻量级的基于角度的更新Pareto front (PF)算法,该算法考虑了用最喜欢区域(FR)表示的期望目标的偏好。实际上,FR是根据优先目标的预先确定的角度在目标空间中产生的。因此,在进化过程中,PF中的解将能够趋向于FR。因此,其他不在最喜欢区域的解决方案不会消失,但通过更新过程的解决方案的前线级别将向后改变。帕累托方法的更新过程,在演化过程中,导致第一和第二战线上的解导致在第一帕累托战线均匀分布的有利区域中寻找和利用合适的解,而在不利区域中解的密度降低。在基准多目标问题上的实验结果表明,该算法在提供偏好决策的同时,通过在收敛性能和计算复杂度之间进行权衡,可以获得最佳的收敛性能。
{"title":"A Prior Preference-Based Decision-Making Algorithm in Pareto Optimization","authors":"M. Jafari, Lida Daryani, M. Feizi-Derakhshi","doi":"10.1109/ICCKE48569.2019.8964943","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8964943","url":null,"abstract":"In the applications of real-life, the importance of having a flexible optimization algorithm is obvious. Commonly in these issues, Evolutionary Multi-Objective Optimization (EMO) algorithms and particularly Pareto optimization method as one of the most significant and useful classes have been used extensively. Often optimization algorithms that have used the EMO algorithm in their own as posteriori Decision-making (DM) algorithms, in weighted objectives problems, have suffered from the uniform prioritization of objectives. In this paper, we propose a lightweight angle-based updating Pareto front (PF) algorithm which considers the preferences of desired objectives expressed using the Favorite Region (FR). Actually, the FR has been created in the objective space according to the prior-fixed angle of priority objectives. Thus, the solutions in PF will be able to tend towards FR during the evolutionary process. Consequently, other solutions that are not in the favorite region will not go away, but the Fronts levels of solutions via an update process will change rearwardly. The updating process in Pareto method, during the evolution process, causes that the solutions in the first and second fronts lead to the exploration and exploitation of appropriate solutions in the favorite regions with uniform distribution for first Pareto Front, while the solutions’ density in the undesirable region become impaired. The experimental results on benchmark multi-objective problems show that the proposed algorithm in addition to providing preference decision-making, by providing a tradeoff between convergence performance and computational complexity, can give the best convergence performance.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"24 1","pages":"98-103"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81921070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attention-Guided Version of 2D UNet for Automatic Brain Tumor Segmentation 二维UNet的注意引导版自动脑肿瘤分割
Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8964956
Mehrdad Noori, Ali Bahri, K. Mohammadi
Gliomas are the most common and aggressive among brain tumors, which cause a short life expectancy in their highest grade. Therefore, treatment assessment is a key stage to enhance the quality of the patients’ lives. Recently, deep convolutional neural networks (DCNNs) have achieved a remarkable performance in brain tumor segmentation, but this task is still difficult owing to high varying intensity and appearance of gliomas. Most of the existing methods, especially UNet-based networks, integrate low-level and high-level features in a naive way, which may result in confusion for the model. Moreover, most approaches employ 3D architectures to benefit from 3D contextual information of input images. These architectures contain more parameters and computational complexity than 2D architectures. On the other hand, using 2D models causes not to benefit from 3D contextual information of input images. In order to address the mentioned issues, we design a low-parameter network based on 2D UNet in which we employ two techniques. The first technique is an attention mechanism, which is adopted after concatenation of low-level and high-level features. This technique prevents confusion for the model by weighting each of the channels adaptively. The second technique is the Multi-View Fusion. By adopting this technique, we can benefit from 3D contextual information of input images despite using a 2D model. Experimental results demonstrate that our method performs favorably against 2017 and 2018 state-of-the-art methods.
胶质瘤是脑肿瘤中最常见和最具侵袭性的,其最高级别的预期寿命较短。因此,治疗评估是提高患者生活质量的关键环节。近年来,深度卷积神经网络(deep convolutional neural networks, DCNNs)在脑肿瘤分割方面取得了显著的成绩,但由于胶质瘤的高变化强度和外观特征,这项任务仍然很困难。现有的大多数方法,特别是基于unet的网络,以一种幼稚的方式集成了低级和高级特征,这可能会导致模型的混乱。此外,大多数方法采用3D架构来受益于输入图像的3D上下文信息。这些体系结构比二维体系结构包含更多的参数和计算复杂度。另一方面,使用2D模型导致不能从输入图像的3D上下文信息中获益。为了解决上述问题,我们设计了一个基于2D UNet的低参数网络,其中我们采用了两种技术。第一种技术是注意机制,它是在低级和高级特征连接之后采用的。这种技术通过自适应地加权每个通道来防止模型混淆。第二种技术是多视图融合。通过采用这种技术,我们可以从输入图像的3D上下文信息中获益,尽管使用的是2D模型。实验结果表明,与2017年和2018年最先进的方法相比,我们的方法表现良好。
{"title":"Attention-Guided Version of 2D UNet for Automatic Brain Tumor Segmentation","authors":"Mehrdad Noori, Ali Bahri, K. Mohammadi","doi":"10.1109/ICCKE48569.2019.8964956","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8964956","url":null,"abstract":"Gliomas are the most common and aggressive among brain tumors, which cause a short life expectancy in their highest grade. Therefore, treatment assessment is a key stage to enhance the quality of the patients’ lives. Recently, deep convolutional neural networks (DCNNs) have achieved a remarkable performance in brain tumor segmentation, but this task is still difficult owing to high varying intensity and appearance of gliomas. Most of the existing methods, especially UNet-based networks, integrate low-level and high-level features in a naive way, which may result in confusion for the model. Moreover, most approaches employ 3D architectures to benefit from 3D contextual information of input images. These architectures contain more parameters and computational complexity than 2D architectures. On the other hand, using 2D models causes not to benefit from 3D contextual information of input images. In order to address the mentioned issues, we design a low-parameter network based on 2D UNet in which we employ two techniques. The first technique is an attention mechanism, which is adopted after concatenation of low-level and high-level features. This technique prevents confusion for the model by weighting each of the channels adaptively. The second technique is the Multi-View Fusion. By adopting this technique, we can benefit from 3D contextual information of input images despite using a 2D model. Experimental results demonstrate that our method performs favorably against 2017 and 2018 state-of-the-art methods.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"18 1","pages":"269-275"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85128299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
DEEM: A Decentralized and Energy Efficient Method for detecting sinkhole attacks on the internet of things DEEM:一种用于检测物联网天坑攻击的分散节能方法
Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8965177
Saeid Rafiei Taghanaki, K. Jamshidi, Ali Bohlooli
The RPL protocol was provided for routing in the Internet of Things (IoT) network. This protocol may be under attack. One of the attacks in the RPL protocol is the sinkhole attack that, an attacker tries to attract nearby nodes and, as a result, it causes that many nodes pass their traffic through the attacker node. In the previous methods for detecting a sinkhole attack in the RPL protocol, the accuracy of the detection parameter has been important. In the present study, by providing a local detection method called DEEM and improving the overhead in terms of energy consumption associated with the detection method, also a proper detection accuracy was obtained. DEEM has two phases in each node called Information Gathering and Detection Phases. We implemented DEEM on Contiki OS and evaluated it using the Cooja simulator. Our assessment shows that, in simulated scenarios, DEEM has a low overhead in term of energy consumption, a high true positive rate, and a good detection speed, and this is a scalable method. The cost of DEEM overhead is small enough to be deployed in resource-constrained nodes.
RPL协议是为物联网(IoT)网络中的路由提供的协议。该协议可能受到攻击。RPL协议中的一种攻击是天坑攻击,攻击者试图吸引附近的节点,结果导致许多节点将其流量通过攻击者节点。在之前的检测RPL协议中天坑攻击的方法中,检测参数的准确性一直是很重要的。在本研究中,通过提供一种称为DEEM的局部检测方法,并提高该检测方法在能耗方面的开销,也获得了适当的检测精度。DEEM在每个节点中有两个阶段,称为信息收集阶段和检测阶段。我们在Contiki OS上实现了DEEM,并使用Cooja模拟器对其进行了评估。我们的评估表明,在模拟场景中,DEEM在能耗方面开销低,真阳性率高,检测速度快,是一种可扩展的方法。DEEM开销的成本足够小,可以部署在资源受限的节点中。
{"title":"DEEM: A Decentralized and Energy Efficient Method for detecting sinkhole attacks on the internet of things","authors":"Saeid Rafiei Taghanaki, K. Jamshidi, Ali Bohlooli","doi":"10.1109/ICCKE48569.2019.8965177","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8965177","url":null,"abstract":"The RPL protocol was provided for routing in the Internet of Things (IoT) network. This protocol may be under attack. One of the attacks in the RPL protocol is the sinkhole attack that, an attacker tries to attract nearby nodes and, as a result, it causes that many nodes pass their traffic through the attacker node. In the previous methods for detecting a sinkhole attack in the RPL protocol, the accuracy of the detection parameter has been important. In the present study, by providing a local detection method called DEEM and improving the overhead in terms of energy consumption associated with the detection method, also a proper detection accuracy was obtained. DEEM has two phases in each node called Information Gathering and Detection Phases. We implemented DEEM on Contiki OS and evaluated it using the Cooja simulator. Our assessment shows that, in simulated scenarios, DEEM has a low overhead in term of energy consumption, a high true positive rate, and a good detection speed, and this is a scalable method. The cost of DEEM overhead is small enough to be deployed in resource-constrained nodes.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"2 1","pages":"325-330"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78520656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Language Modeling Using Part-of-speech and Long Short-Term Memory Networks 使用词性和长短期记忆网络的语言建模
Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8964806
Sanaz Saki Norouzi, A. Akbari, B. Nasersharif
In recent years, neural networks have been widely used for language modeling in different tasks of natural language processing. Results show that long short-term memory (LSTM) neural networks are appropriate for language modeling due to their ability to process long sequences. Furthermore, many studies are shown that extra information improve language models (LMs) performance. In this research, we propose parallel structures for incorporating part-of-speech tags into language modeling task using both the unidirectional and bidirectional type of LSTMs. Words and part-of-speech tags are given to the network as parallel inputs. In this way, to concatenate these two paths, two different structures are proposed according to the type of network used in the parallel part. We analyze the efficiency on Penn Treebank (PTB) dataset using perplexity measure. These two proposed structures show improvements in comparison to the baseline models. Not only does the bidirectional LSTM method gain the lowest perplexity, but it also has the lowest training parameters among our proposed methods. The perplexity of proposed structures has reduced 1.5% and %13 for unidirectional and bidirectional LSTMs, respectively.
近年来,神经网络在自然语言处理的不同任务中被广泛应用于语言建模。结果表明,长短期记忆(LSTM)神经网络具有处理长序列的能力,适合于语言建模。此外,许多研究表明,额外的信息可以提高语言模型的性能。在这项研究中,我们提出了使用单向和双向lstm类型将词性标签纳入语言建模任务的并行结构。单词和词性标签作为并行输入输入给网络。这样,为了连接这两条路径,根据并行部分使用的网络类型,提出了两种不同的结构。利用困惑度测度分析了Penn Treebank (PTB)数据集的效率。与基线模型相比,这两种拟议的结构有所改进。在我们提出的方法中,双向LSTM方法不仅获得了最低的困惑,而且具有最低的训练参数。对于单向和双向lstm,所提出的结构的困惑度分别降低了1.5%和% 13%。
{"title":"Language Modeling Using Part-of-speech and Long Short-Term Memory Networks","authors":"Sanaz Saki Norouzi, A. Akbari, B. Nasersharif","doi":"10.1109/ICCKE48569.2019.8964806","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8964806","url":null,"abstract":"In recent years, neural networks have been widely used for language modeling in different tasks of natural language processing. Results show that long short-term memory (LSTM) neural networks are appropriate for language modeling due to their ability to process long sequences. Furthermore, many studies are shown that extra information improve language models (LMs) performance. In this research, we propose parallel structures for incorporating part-of-speech tags into language modeling task using both the unidirectional and bidirectional type of LSTMs. Words and part-of-speech tags are given to the network as parallel inputs. In this way, to concatenate these two paths, two different structures are proposed according to the type of network used in the parallel part. We analyze the efficiency on Penn Treebank (PTB) dataset using perplexity measure. These two proposed structures show improvements in comparison to the baseline models. Not only does the bidirectional LSTM method gain the lowest perplexity, but it also has the lowest training parameters among our proposed methods. The perplexity of proposed structures has reduced 1.5% and %13 for unidirectional and bidirectional LSTMs, respectively.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"12 1","pages":"182-187"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77969315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ICCKE 2019 Program Committee ICCKE 2019项目委员会
Pub Date : 2019-10-01 DOI: 10.1109/iccke48569.2019.8965068
{"title":"ICCKE 2019 Program Committee","authors":"","doi":"10.1109/iccke48569.2019.8965068","DOIUrl":"https://doi.org/10.1109/iccke48569.2019.8965068","url":null,"abstract":"","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78899552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Energy-aware Scheduling and Load-balancing Technique based on Fog Computing 一种新的基于雾计算的能量感知调度和负载均衡技术
Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8964946
Ahmad Alzeyadi, N. Farzaneh
Considering the development of modern information technology, the emergence of fog computing has gained equipment computing power and supplied new solutions for modern traditional industrial applications. Generally, providing communication among devices in smart factories structure is one of the most controversial issues. Since reciprocating lots of messages among existent various tools and intelligent agents is required in the smart factories, and the connections are naturally wireless, they will not have much to offer. If the intelligent agents tend to use broadcasting in sending their messages, the process will be costly with little outcome. Hence, in this paper, an effective solution is presented to gain optimum connections among these elements, while considering the complex issues on energy consumption, network efficiency, traffic, and latency in the exchange of messages. The proposed method is a scheduling awareness of the communicative fog while focusing on complicated energy consumption problems of manufacturing clusters. In the proposed algorithm, four criteria are considered: energy, dynamic threshold, waiting time of tasks, and communication delay among smart factors. These criteria are divided into two categories. The criteria according to which two scheduling and load adjusting procedures are performed depend on the user's opinion. The results of the experiments show that the workload in the proposed method is more balanced than the base method in the robot. This load balancing has reduced the amount of workload in each robot, which reduces the waiting time for each product to be packaged. Also, the amount of communication in the network in the proposed method has decreased about 63% compared to ELBS.
考虑到现代信息技术的发展,雾计算的出现获得了设备计算能力,为现代传统工业应用提供了新的解决方案。一般来说,智能工厂结构中设备之间的通信是最具争议的问题之一。由于智能工厂需要在现有的各种工具和智能代理之间来回传递大量的消息,并且连接自然是无线的,因此它们不会提供太多的信息。如果智能代理倾向于使用广播来发送消息,那么这个过程将是昂贵的,几乎没有结果。因此,本文提出了一种有效的解决方案,在考虑到能量消耗、网络效率、流量和消息交换延迟等复杂问题的同时,实现这些元素之间的最佳连接。该方法在关注制造业集群复杂的能耗问题的同时,具有对通信雾的调度意识。该算法考虑了能量、动态阈值、任务等待时间和智能因素之间的通信延迟四个标准。这些标准分为两类。执行两个调度和负荷调整程序的标准取决于用户的意见。实验结果表明,该方法比基本方法在机器人中更加均衡。这种负载平衡减少了每个机器人的工作量,从而减少了每个产品打包的等待时间。此外,与ELBS相比,该方法在网络中的通信量减少了约63%。
{"title":"A Novel Energy-aware Scheduling and Load-balancing Technique based on Fog Computing","authors":"Ahmad Alzeyadi, N. Farzaneh","doi":"10.1109/ICCKE48569.2019.8964946","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8964946","url":null,"abstract":"Considering the development of modern information technology, the emergence of fog computing has gained equipment computing power and supplied new solutions for modern traditional industrial applications. Generally, providing communication among devices in smart factories structure is one of the most controversial issues. Since reciprocating lots of messages among existent various tools and intelligent agents is required in the smart factories, and the connections are naturally wireless, they will not have much to offer. If the intelligent agents tend to use broadcasting in sending their messages, the process will be costly with little outcome. Hence, in this paper, an effective solution is presented to gain optimum connections among these elements, while considering the complex issues on energy consumption, network efficiency, traffic, and latency in the exchange of messages. The proposed method is a scheduling awareness of the communicative fog while focusing on complicated energy consumption problems of manufacturing clusters. In the proposed algorithm, four criteria are considered: energy, dynamic threshold, waiting time of tasks, and communication delay among smart factors. These criteria are divided into two categories. The criteria according to which two scheduling and load adjusting procedures are performed depend on the user's opinion. The results of the experiments show that the workload in the proposed method is more balanced than the base method in the robot. This load balancing has reduced the amount of workload in each robot, which reduces the waiting time for each product to be packaged. Also, the amount of communication in the network in the proposed method has decreased about 63% compared to ELBS.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"46 1","pages":"104-109"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87561288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
LDSFI: a Lightweight Dynamic Software-based Fault Injection LDSFI:基于软件的轻量级动态故障注入
Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8964875
Hussien Al-haj Ahmad, Yasser Sedaghat, M. Moradiyan
Recently, numerous safety-critical systems have employed a variety of fault tolerance techniques, which are considered an essential requirement to keep the system fault-tolerant. While the current trend in processors technology has increased their effectiveness and performance, the sensitivity of processors to soft errors has increased significantly, making their fault tolerance ability questionable. In this context, fault injection is considered as one of the most popular, rapid, and cost-effective techniques which enables the designers to assess the fault tolerance of systems under faults before their deployment. In this paper, a pure software fault injection technique called LDSFI (a Lightweight Dynamic Software-based Fault Injection) is presented and evaluated. Due to the dynamic aspect of LDSFI, faults are automatically injected into binary code at runtime. Thereby, the proposed technique does not impose any program runtime overhead since the intended source code is not required. The effectiveness of LDSFI was validated through performing exhaustive fault injection experiments using well-known benchmarks. The experiments were carried out using a Core 2 Duo processor, as an Intel x86 Dual-Core PC with 4GB RAM running Ubuntu Linux 14.04 with the GNU Compiler Collection (GCC) version 4.9. Since LDSFI relies on the GNU, it is highly portable and can be adapted for different platforms.
最近,许多安全关键型系统采用了各种容错技术,这被认为是保持系统容错的基本要求。当前处理器技术的发展趋势是提高了处理器的效率和性能,但处理器对软错误的敏感性显著提高,使其容错能力受到质疑。在这种情况下,故障注入被认为是最流行、最快速、最经济的技术之一,它使设计人员能够在部署系统之前评估故障下的容错能力。本文提出并评价了一种纯软件故障注入技术LDSFI (Lightweight Dynamic software -based fault injection,基于软件的轻量级动态故障注入)。由于LDSFI的动态性,故障在运行时自动注入到二进制代码中。因此,所建议的技术不会增加任何程序运行时开销,因为不需要预期的源代码。LDSFI的有效性通过使用知名基准执行穷举故障注入实验来验证。实验使用酷睿2双核处理器,作为Intel x86双核PC, 4GB RAM,运行Ubuntu Linux 14.04和GNU Compiler Collection (GCC) 4.9版本。由于LDSFI依赖于GNU,它具有很高的可移植性,可以适应不同的平台。
{"title":"LDSFI: a Lightweight Dynamic Software-based Fault Injection","authors":"Hussien Al-haj Ahmad, Yasser Sedaghat, M. Moradiyan","doi":"10.1109/ICCKE48569.2019.8964875","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8964875","url":null,"abstract":"Recently, numerous safety-critical systems have employed a variety of fault tolerance techniques, which are considered an essential requirement to keep the system fault-tolerant. While the current trend in processors technology has increased their effectiveness and performance, the sensitivity of processors to soft errors has increased significantly, making their fault tolerance ability questionable. In this context, fault injection is considered as one of the most popular, rapid, and cost-effective techniques which enables the designers to assess the fault tolerance of systems under faults before their deployment. In this paper, a pure software fault injection technique called LDSFI (a Lightweight Dynamic Software-based Fault Injection) is presented and evaluated. Due to the dynamic aspect of LDSFI, faults are automatically injected into binary code at runtime. Thereby, the proposed technique does not impose any program runtime overhead since the intended source code is not required. The effectiveness of LDSFI was validated through performing exhaustive fault injection experiments using well-known benchmarks. The experiments were carried out using a Core 2 Duo processor, as an Intel x86 Dual-Core PC with 4GB RAM running Ubuntu Linux 14.04 with the GNU Compiler Collection (GCC) version 4.9. Since LDSFI relies on the GNU, it is highly portable and can be adapted for different platforms.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"63 1","pages":"207-213"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86588662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Event-based Approach on Automatic Synchronous-to-Asynchronous Transformation of Web Service Invocations 基于事件的Web服务调用自动同步到异步转换方法
Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8965130
Alireza Khalilipour, Moharram Challenger
One of the approaches to increase the performance of Distributed Systems, such as Service Oriented Systems, is the asynchronous invocation of the services. This is applicable because in many cases the clients do not need the result immediately and need not be blocked after the invocation. Without this mechanism, a developer should use a set of complex techniques to gain the mentioned performance. However, this procedure is both error-prone and cumbersome for the developers. Also, the state-of-the-art tools and languages which provide asynchronous mechanisms, involve the developers with the details of these invocations, as the mechanism is not transparent in these languages. In this paper, a new approach is proposed which generates an event-based middleware based on the candidate invocations available in the source/initial code. The approach also modifies the initial code to adapt with the middleware. This middleware plays the role of an interface between clients and web services. Using this approach, the invocations are transparent for the developers. This means that the synchronous and asynchronous invocations of web services are done in the same manner from the developer perspective. This is realized by automatic transformation of synchronous invocations to asynchronous ones via the generated middleware. The experimental evaluations show that the approach transforms the invocations successfully. Also, the results show that the performance of the asynchronous invocations are by far better than the synchronous ones.
提高分布式系统(如面向服务的系统)性能的方法之一是异步调用服务。这是适用的,因为在许多情况下,客户机不需要立即得到结果,也不需要在调用之后被阻塞。如果没有这种机制,开发人员应该使用一组复杂的技术来获得上述性能。然而,这个过程对开发人员来说既容易出错又麻烦。此外,提供异步机制的最先进的工具和语言会让开发人员了解这些调用的细节,因为在这些语言中机制是不透明的。本文提出了一种基于源/初始代码中可用的候选调用生成基于事件的中间件的方法。该方法还修改初始代码以适应中间件。此中间件扮演客户机和web服务之间的接口角色。使用这种方法,调用对开发人员来说是透明的。这意味着从开发人员的角度来看,web服务的同步和异步调用以相同的方式完成。这是通过生成的中间件将同步调用自动转换为异步调用来实现的。实验结果表明,该方法成功地实现了调用的转换。结果还表明,异步调用的性能远远优于同步调用。
{"title":"An Event-based Approach on Automatic Synchronous-to-Asynchronous Transformation of Web Service Invocations","authors":"Alireza Khalilipour, Moharram Challenger","doi":"10.1109/ICCKE48569.2019.8965130","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8965130","url":null,"abstract":"One of the approaches to increase the performance of Distributed Systems, such as Service Oriented Systems, is the asynchronous invocation of the services. This is applicable because in many cases the clients do not need the result immediately and need not be blocked after the invocation. Without this mechanism, a developer should use a set of complex techniques to gain the mentioned performance. However, this procedure is both error-prone and cumbersome for the developers. Also, the state-of-the-art tools and languages which provide asynchronous mechanisms, involve the developers with the details of these invocations, as the mechanism is not transparent in these languages. In this paper, a new approach is proposed which generates an event-based middleware based on the candidate invocations available in the source/initial code. The approach also modifies the initial code to adapt with the middleware. This middleware plays the role of an interface between clients and web services. Using this approach, the invocations are transparent for the developers. This means that the synchronous and asynchronous invocations of web services are done in the same manner from the developer perspective. This is realized by automatic transformation of synchronous invocations to asynchronous ones via the generated middleware. The experimental evaluations show that the approach transforms the invocations successfully. Also, the results show that the performance of the asynchronous invocations are by far better than the synchronous ones.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"118 1","pages":"162-169"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73637215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
InduM: An Accurate probablity Inductance-based Model to Predict Delay in Chips 基于概率电感的精确芯片延迟预测模型
Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8965048
Z. Shirmohammadi, Masoumeh Taali, H. Sabzi
The reliability in many-core and multicore systems is dependent on the correct functionality of communication structure between cores. However, data transfer between cores in these on chip communications can seriously face with crosstalk faults. Timing delay is the most effect of crosstalk faults and so providing a model to predict the delay can reduce the time for designers to provide more efficient mechanisms to decrease crosstalk faults. Accordingly, this paper proposes a probability inductance-based model named InduM to reduce the timing delay in the communication of chips. The main advantages of InduM are: 1) it considers the inductance effects in the model;2) it is based on 5-wire that is more accurate 3) it can be applied to a communication channel with any arbitrary width. To validate the proposed model, SPICE simulations are performed in a various working conditions and delays obtained from simulations compared with those resulting from InduM model. Comparisons show that InduM can efficiently estimate the delay of communication channels with 4-5 % error rate.
多核和多核系统的可靠性取决于核间通信结构的正确功能。然而,在这些片上通信中,核心之间的数据传输会严重面临串扰故障。时间延迟是串扰故障的最大影响因素,因此提供一个预测延迟的模型可以减少设计人员提供更有效的机制来减少串扰故障的时间。为此,本文提出了一种基于概率电感的InduM模型来降低芯片间通信的时序延迟。InduM的主要优点是:1)在模型中考虑了电感效应;2)基于5线制,精度更高;3)可适用于任意宽度的通信信道。为了验证所提出的模型,在不同的工作条件下进行了SPICE仿真,并将仿真得到的延迟与InduM模型的结果进行了比较。比较表明,该算法可以有效地估计通信信道的时延,误差率为4 ~ 5%。
{"title":"InduM: An Accurate probablity Inductance-based Model to Predict Delay in Chips","authors":"Z. Shirmohammadi, Masoumeh Taali, H. Sabzi","doi":"10.1109/ICCKE48569.2019.8965048","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8965048","url":null,"abstract":"The reliability in many-core and multicore systems is dependent on the correct functionality of communication structure between cores. However, data transfer between cores in these on chip communications can seriously face with crosstalk faults. Timing delay is the most effect of crosstalk faults and so providing a model to predict the delay can reduce the time for designers to provide more efficient mechanisms to decrease crosstalk faults. Accordingly, this paper proposes a probability inductance-based model named InduM to reduce the timing delay in the communication of chips. The main advantages of InduM are: 1) it considers the inductance effects in the model;2) it is based on 5-wire that is more accurate 3) it can be applied to a communication channel with any arbitrary width. To validate the proposed model, SPICE simulations are performed in a various working conditions and delays obtained from simulations compared with those resulting from InduM model. Comparisons show that InduM can efficiently estimate the delay of communication channels with 4-5 % error rate.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"8 1","pages":"414-419"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83807500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Ensembles of Deep Neural Networks for Action Recognition in Still Images 静止图像动作识别的深度神经网络集成
Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8965014
S. Mohammadi, Sina Ghofrani Majelan, S. B. Shokouhi
Despite the fact that notable improvements have been made recently in the field of feature extraction and classification, human action recognition is still challenging, especially in images, in which, unlike videos, there is no motion. Thus, the methods proposed for recognizing human actions in videos cannot be applied to still images. A big challenge in action recognition in still images is the lack of large enough datasets, which is problematic for training deep Convolutional Neural Networks (CNNs) due to the overfitting issue. In this paper, by taking advantage of pre-trained CNNs, we employ the transfer learning technique to tackle the lack of massive labeled action recognition datasets. Furthermore, since the last layer of the CNN has class-specific information, we apply an attention mechanism on the output feature maps of the CNN to extract more discriminative and powerful features for classification of human actions. Moreover, we use eight different pre-trained CNNs in our framework and investigate their performance on Stanford 40 dataset. Finally, we propose using the Ensemble Learning technique to enhance the overall accuracy of action classification by combining the predictions of multiple models. The best setting of our method is able to achieve 93.17% accuracy on the Stanford 40 dataset.
尽管最近在特征提取和分类领域取得了显著的进步,但人类动作识别仍然具有挑战性,特别是在图像中,与视频不同,图像中没有运动。因此,所提出的识别视频中人类行为的方法不能应用于静止图像。静止图像动作识别的一大挑战是缺乏足够大的数据集,这对于训练深度卷积神经网络(cnn)来说是一个问题,因为过度拟合问题。在本文中,我们利用预训练的cnn,采用迁移学习技术来解决缺乏大量标记动作识别数据集的问题。此外,由于CNN的最后一层具有特定类别的信息,我们在CNN的输出特征映射上应用了注意机制,以提取更具判别性和强大的特征,用于对人类行为进行分类。此外,我们在我们的框架中使用了8种不同的预训练cnn,并研究了它们在Stanford 40数据集上的表现。最后,我们提出使用集成学习技术,通过组合多个模型的预测来提高动作分类的整体准确性。在Stanford 40数据集上,我们的方法的最佳设置能够达到93.17%的准确率。
{"title":"Ensembles of Deep Neural Networks for Action Recognition in Still Images","authors":"S. Mohammadi, Sina Ghofrani Majelan, S. B. Shokouhi","doi":"10.1109/ICCKE48569.2019.8965014","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8965014","url":null,"abstract":"Despite the fact that notable improvements have been made recently in the field of feature extraction and classification, human action recognition is still challenging, especially in images, in which, unlike videos, there is no motion. Thus, the methods proposed for recognizing human actions in videos cannot be applied to still images. A big challenge in action recognition in still images is the lack of large enough datasets, which is problematic for training deep Convolutional Neural Networks (CNNs) due to the overfitting issue. In this paper, by taking advantage of pre-trained CNNs, we employ the transfer learning technique to tackle the lack of massive labeled action recognition datasets. Furthermore, since the last layer of the CNN has class-specific information, we apply an attention mechanism on the output feature maps of the CNN to extract more discriminative and powerful features for classification of human actions. Moreover, we use eight different pre-trained CNNs in our framework and investigate their performance on Stanford 40 dataset. Finally, we propose using the Ensemble Learning technique to enhance the overall accuracy of action classification by combining the predictions of multiple models. The best setting of our method is able to achieve 93.17% accuracy on the Stanford 40 dataset.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"27 1","pages":"315-318"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80642828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1