Computational Science and Its Applications - ICCSA 2016, part 2
- Publisher
- Springer
- Year
- 2016
- Tongue
- English
- Leaves
- 658
- Series
- Springer Lecture notes in computer science 9787
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Preface......Page 6
Organization......Page 7
Contents โ Part II......Page 23
High Performance Computing and Networks......Page 28
1 Introduction......Page 29
2.1 Parallel SpMV......Page 30
4 Implementation of SpMV......Page 32
5 Evaluation of Parallel SpMV......Page 34
5.1 Experimental Results......Page 35
5.3 Performance of Each SpMV Implementation (64 MPI Processes)......Page 36
6.1 Existing Kernels and Their Problems......Page 37
6.2 Applying Segmented Scan to SpMV......Page 39
References......Page 43
1.1 System Model......Page 45
1.3 Minimum Total Energy Topology Problems: Nondeterministic Polynomial-Time Completeness......Page 46
2.2 Graph-Theoretic Model......Page 47
2.3 Connectivity Problems of Clustered Wireless Sensor Networks......Page 48
3 Clustered-Graph Connectivity Problems: Nondeterministic Polynomial-Time Completeness......Page 49
4 Minimization of Clustered-Graph Connectivity: Nondeterministic Polynomial-Time Hardness, and Approximation Algorithm......Page 55
References......Page 58
1 Introduction......Page 60
2 Problem Formulation......Page 61
3.2 The Overall Procedure of the Proposed PBIL......Page 63
4.2 Overall Performance Evaluation......Page 65
References......Page 69
1 Introduction......Page 71
2 Background......Page 72
2.3 Hash......Page 73
3 Related Work......Page 74
4.2 Protocol Operating Principle......Page 75
4.3 Protocol Architecture......Page 76
4.3.2 Verification Process......Page 77
4.3.3 Trust Level Classification Process......Page 78
5 Protocol Analysis......Page 79
6 Simulations......Page 82
References......Page 84
1 Introduction......Page 86
2 Multiple-Precision Floating-Point Number Representation......Page 87
3 Vectorization and Parallelization of Multiple-Precision Floating-Point Addition, Subtraction and Multiplication......Page 88
4.1 Newton Iteration......Page 90
5 Performance Results......Page 91
References......Page 95
1 Introduction......Page 97
3 Background......Page 99
3.1 Sustainability and the Karlskrona Manifesto......Page 100
3.2 Architecture Driven Design - ADD......Page 101
3.3 Sustainable Health Services on Cloud......Page 102
4 Proposal Solution......Page 103
5 Architectural Sustainability Analysis of the HCR......Page 106
5.1 Environmental Sustainability......Page 108
5.3 Technical Sustainability......Page 109
6 Conclusions......Page 110
References......Page 111
1 Introduction......Page 113
2.2 Security Reinforcement Measure......Page 114
3.2 DEX Shell Technology......Page 115
3.3 Class Loading Mechanism of Dalvik......Page 116
3.4 Design of Static Defense Solution......Page 117
4.1 Dynamic Attack Mechanism......Page 119
4.2 Dynamic Defense Mechanism......Page 120
5.2 Architecture of System......Page 121
6.1 Static Defense Solution......Page 124
7.1 Static Security Analysis......Page 125
7.2 Dynamic Security Analysis......Page 127
8 Conclusions......Page 130
References......Page 131
1 Introduction......Page 132
2 Experimental Setup......Page 133
3.1 Video Quality Affected by Coding......Page 135
3.2 Video Quality Affected by Packet Loss......Page 137
4 Conclusion......Page 141
References......Page 142
1 Introduction......Page 143
2 Factoring Method for Network Reliability Calculation......Page 144
3 One of Pivot Nodes is Inside a Chain......Page 145
4 Both Pivot Nodes are Inside Different Chains......Page 146
5 Obtaining Bounds for (G) and C(G) Through Known Part of Rij......Page 150
6 Example......Page 151
References......Page 153
1 Introduction......Page 155
2 Related Work......Page 156
3.3 Problem Formulation......Page 157
4.2 Switching Criteria......Page 158
4.3 Switching Decision......Page 159
4.4 Sending Schedule Priority......Page 160
4.5 Collision-Free Scheduling......Page 161
5.2 Simulation Results......Page 163
6 Conclusion......Page 164
References......Page 165
1 Introduction......Page 166
2 Related Work......Page 167
3.1 System Models......Page 168
3.2 Problem Formulation......Page 169
4 Theoretical Foundation......Page 170
5 Memory-Processor Priority Co-assignment for Mixed-Criticality Task Set......Page 175
6.1 Experimental Setting......Page 178
6.2 Experiment Results and Discussions......Page 179
References......Page 181
1 Introduction......Page 183
2.1 Basic Idea of ACO......Page 184
2.2 Design Challenge of Routing Protocols in MP2P......Page 185
3.1 Discussion of Representative Ant Routing Protocols......Page 186
3.2 General Ant Routing Principles......Page 187
4 Generalized Ant Routing Mechanism Framework......Page 190
5.1 A Generalized Solution from the Framework......Page 191
5.2 Simulation Study......Page 192
6 Conclusions and Future Work......Page 193
References......Page 194
1 Introduction......Page 196
2 Motivation and Considerations......Page 197
3.1 Framework Design......Page 198
3.2 Gesture Patterns......Page 199
3.3 Control Protocol Design......Page 201
3.4 Service Scenarios......Page 202
4 Experiment Result and Evaluation......Page 203
References......Page 204
1 Introduction......Page 206
2 Related Work......Page 207
3.1 System Outline......Page 209
3.2 Media Sharing System......Page 210
3.3 Screen Sharing System......Page 211
3.4 Input Sharing System......Page 214
3.5 Context Sharing System......Page 215
4 System Analysis......Page 218
Acknowledgement......Page 219
1 Introduction......Page 221
2 Platform Architecture......Page 222
2.1 I/O Manager......Page 223
2.3 Data Publication Manager......Page 224
2.7 Things Manager......Page 225
3 Evaluation......Page 226
4 Related Work......Page 229
References......Page 231
1 Introduction......Page 233
2 0-1 Multidimensional Knapsack Problem......Page 235
3 Augmented Neural Networks......Page 236
4 GRASP......Page 238
5 Proposed Solution......Page 240
6 Comparative Results......Page 242
7 Conclusions and Future Work......Page 246
References......Page 247
A Appendix (Program that Does Not Generate Looping Packets)......Page 249
B Appendix (Program that Generates Looping Packets)......Page 251
3 Methodology of Verification......Page 252
4 Verification......Page 254
4.1 Overview of Verification......Page 255
5 Discussion......Page 257
6 Conclusion......Page 258
References......Page 263
1 Introduction......Page 265
2.1 The Basic Idea......Page 266
2.2 Generation of New Solutions......Page 267
2.3 To Solve TSP Using Simulated Annealing Algorithm......Page 268
2.4 To Improve Simulated Annealing Algorithm for TSP......Page 269
3.1 MIC Architecture......Page 270
3.2 A Parallel Simulated Annealing Algorithm......Page 271
4 Experimental Results......Page 272
4.1 Parallel SAA in CPU Architecture......Page 274
References......Page 275
1 Introduction......Page 277
2 Related Work......Page 278
3 Proposed Scheme......Page 279
4 Performance Evaluation......Page 283
4.2 Numerical Results and Discussion......Page 284
References......Page 287
1 Introduction......Page 289
2 Related Work......Page 291
3 Deploying and Running Applications in DCIs: Containers vs Virtual Machines......Page 292
4 Simulating Container-Based Distributed Computing Infrastructure......Page 293
5 Building and Evaluating Container-Based Distributed Computing Environment......Page 295
7 Conclusions and Future Work......Page 300
References......Page 301
1 Introduction......Page 302
2 GPU Delivery to the Virtual Environment......Page 303
3 Hardware Configuration and Infrastructure Organization......Page 305
4 Preparation of Computing Environment......Page 306
5 Applications and Development Tools......Page 310
6 Evaluating Results......Page 313
References......Page 315
1 Introduction......Page 318
2 Grid Scheduling......Page 320
4 Extended Great Deluge......Page 321
5 Implementation......Page 322
6 Evaluation......Page 324
7 Results......Page 325
References......Page 327
1 Introduction......Page 329
2 Use Case Requirements......Page 330
3.1 Sample Use Case......Page 331
3.3 Docker......Page 334
3.4 Related Work......Page 335
4.1 Application Management Service......Page 337
4.2 Container Images......Page 338
4.4 Environment......Page 339
5.1 Performance......Page 340
5.3 Infrastructure Networking Issues......Page 342
References......Page 343
1 Introduction......Page 345
2.1 User Attribution in Collaborative Editing......Page 347
3.1 Differential Synchronisation......Page 348
3.2 Overview of Our Technique (Attributed Diffsync)......Page 349
4.1 Tools......Page 350
4.2 User Attribution Features......Page 351
5.2 Scalability......Page 352
5.4 Benefits for Collaborative Report Writing in Emergency Management......Page 353
7 Conclusion......Page 354
References......Page 355
1 Introduction......Page 357
2.1 Architecture and Rerouting Schemes......Page 358
3 The Proposed Algorithms......Page 360
3.1 Motivations......Page 361
3.2 Constructing Local Optimal Column Using A-Star Algorithm......Page 362
4 Experimental Results......Page 365
5 Conclusions......Page 366
References......Page 368
1 Introduction......Page 370
2 Preliminaries......Page 371
3.1 Assumptions and Designations......Page 372
3.2 Transmission Availability......Page 373
3.3 Advanced Model......Page 374
4 Performance Analysis......Page 376
5 Conclusion......Page 377
References......Page 378
1 Introduction......Page 379
2.1 Industrial and Vehicular Automation (Latency-Sensitive and Reliable)......Page 380
2.3 Better Agriculture System (Data Analysis and Large Number of Nodes)......Page 381
2.4 Why We Need Fog Networking for IoT?......Page 382
3.1 Characteristics of Fog Networking Paradigm......Page 383
4 Architecture of Fog Networking......Page 384
5.1 Different SDN Controllers Available......Page 385
5.1.1 OpenDaylight ODL [11]......Page 386
5.1.3 Ryu [10]......Page 387
5.1.4 Open Network Operating System (ONOS) [9]......Page 388
6.1 Literature Survey......Page 389
References......Page 390
1 Introduction......Page 392
2 Query Parallelization in Client-Server Databases......Page 395
3 Query Decomposition and Visualization with Graphs......Page 398
4 Conclusion......Page 403
References......Page 404
1 Introduction......Page 405
2 Related Work......Page 406
3.1 Model of Computation......Page 408
3.3 Programming Model......Page 409
4 Results......Page 410
References......Page 413
1 Introduction......Page 416
2 Related Work......Page 417
3 The Interaction Model for Components of Distributed Application Architecture in a Cloud Environment......Page 418
3.1 The Model of the Architecture Component The Choice of a Message Receiver'......Page 419<br> 3.2 Models of the Architecture ComponentControlling Message Passing When Nodes are Tuned Off or Overloaded'......Page 420
3.3 The Model of External Controller in Message Passing......Page 421
3.4 The Load Balancing Model for Data Streaming......Page 423
3.6 Publish-Subscribe......Page 424
3.7 Remarks......Page 425
References......Page 426
Geometric Modeling, Graphics and Visualization......Page 429
1 Introduction......Page 430
2 Lowess......Page 431
2.1 LOWESS with Linear Regression......Page 432
3 Radial Basis Functions......Page 433
3.2 Simplified RBF Without a Polynomial......Page 435
4.1 LOWESS......Page 436
5 Comparison of Measured Errors......Page 437
6 Global RBF Approximation......Page 440
7.1 LOWESS......Page 442
8 Conclusion......Page 443
References......Page 444
1 Introduction......Page 445
2 Data and Method......Page 446
2.1 Pre-processing of LANDSAT-TM Data......Page 447
2.2 Output Classes......Page 449
2.3 Neural Net Classification......Page 451
References......Page 454
1 Introduction......Page 458
2 Related Work......Page 459
3 Database......Page 461
4.2 Segmentation......Page 463
4.3 Merge Step......Page 464
5.1 Clustering of Primitives......Page 465
6 Results......Page 466
6.2 Segmentation......Page 467
6.3 Clustering......Page 469
8 Conclusion and Future Work......Page 472
References......Page 473
1 Introduction......Page 475
2.1 Active Shape Model......Page 476
2.2 Active Contour - Snake......Page 477
2.3 Space Color Based......Page 478
2.5 Template Acquisition......Page 480
3 Lips Movements Reading......Page 481
4 Classification of Visemes......Page 482
5 Algorithm for Words Prediction......Page 484
6 Results......Page 486
7 Conclusions......Page 488
References......Page 489
1 Introduction and Related Works......Page 490
2 System Configuration and Proposed System......Page 492
3 Representative Results......Page 495
4 Conclusions and Future Works......Page 496
References......Page 497
1 Introduction......Page 499
2.1 Gaussian Filter......Page 500
2.3 Zero-Crossing Processing......Page 501
3.1 Non-local Means Filter Based on Structural Similarity Measure (SSIM)......Page 502
3.2 Implementation Steps of Improved LoG Edge Detection......Page 503
4 Experimental Results and Comparisons......Page 504
4.1 Improved LoG Method Based on Bilateral Filter......Page 505
4.2 Improved LoG Method Based on L0 Gradient Minimization Filter......Page 506
5 Conclusions......Page 507
References......Page 508
1 Introduction......Page 509
2.1 Geoinformation Society......Page 510
2.2 Spatial Planning and Social Participation......Page 511
2.3 Gamification and Playable City......Page 512
3.1 Geoinformation Technologies......Page 513
3.2 Virtual Reality and Augmented Reality......Page 514
4 Possible Usage of the Gamification......Page 516
5 Conclusion and Future Work......Page 519
References......Page 520
1 Virtual Reality Headsets......Page 522
2 Virtual Reality Content Creation......Page 525
3 Virtual Reality's User Experience Problems......Page 527
4 Virtual Reality Headset with Physiological Extension......Page 528
References......Page 531
1 Background......Page 534
2 The Proposed Integrated System Between Vision and Touch......Page 539
Acknowledgments......Page 541
References......Page 542
1 Introduction......Page 544
2 The Human Activity Dataset......Page 545
3.1 The Overall Process of the Method......Page 546
3.4 Feature Reduction Using SFFS Algorithm......Page 547
3.5 Classification by the Multi-classifier Combination Model......Page 548
4.1 Experimental Setup......Page 549
4.2 Comparison on Different Classifier Models......Page 551
4.3 Comparison on Different Feature Reduction Technologies......Page 552
References......Page 553
1 Introduction......Page 555
2 Related Works......Page 556
4 Hardware Platform......Page 557
5 Implementation Methodology......Page 559
6 Results......Page 560
References......Page 563
1 Introduction......Page 565
3 Volume Rendering of High Dimensional Feature Space......Page 568
4 Experimental Results......Page 572
5 Conclusion......Page 574
References......Page 575
1 Introduction......Page 576
2 Online Video Classification and Clustering......Page 578
3 Implementation and Experiments......Page 581
4 Conclusion and Discussion......Page 585
References......Page 586
1 Introduction......Page 587
2 Fast Collaborative Representation Based Classification......Page 589
3 Expression Insensitive Two-Stage Voting......Page 590
4.2 AR Database......Page 592
4.4 Efficiency......Page 593
References......Page 594
1 Introduction......Page 596
2 Related Works......Page 597
3.1 Computing Sparse Trajectories......Page 598
3.2 Generating Histograms Using Cross Product Vectors......Page 599
3.4 Generating the Frame Descriptor......Page 600
3.6 Variations of the Method......Page 601
4.1 Results for the First Variation......Page 602
4.2 Results for the Second Variation......Page 605
4.3 Comparison with State-of-the-art......Page 606
5 Conclusion......Page 607
References......Page 608
1 Introduction......Page 609
2 System Description......Page 610
3 Experimental Results......Page 613
References......Page 619
1 Introduction......Page 622
2.1 Overview......Page 624
2.3 Lidar System......Page 626
3.1 Passive Data......Page 627
3.2 Active Data......Page 628
4 Ground Digital Archaeology......Page 629
4.1 Magnetometry......Page 630
4.3 Ground Penetrating Radar......Page 631
5 Data Integration......Page 632
6 Final Remarks......Page 633
References......Page 634
1 Introduction......Page 636
2 Methodology......Page 638
2.1 Data Characteristics......Page 640
3 Results......Page 642
References......Page 645
1 Introduction......Page 647
2 Methods......Page 649
3.2 Data Set......Page 650
4 Results......Page 652
References......Page 655
Author Index......Page 657
๐ SIMILAR VOLUMES
<p>This ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ICCSA 2006, held in Glasgow, UK, during May 8โ11, 2006. It represents the outstanding collection of almost 664 refereed papers selected from over 2,450 submissions to ICCSA
<p>This ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ICCSA 2006, held in Glasgow, UK, during May 8โ11, 2006. It represents the outstanding collection of almost 664 refereed papers selected from over 2,450 submissions to ICCSA