The proceedings contain 97 papers. The special focus in this conference is on Multimedia Technology and Enhanced Learning. The topics include: Research on the Method of Eliminating Duplicated Encrypted Data in Cloud S...
ISBN:
(纸本)9783030825614
The proceedings contain 97 papers. The special focus in this conference is on Multimedia Technology and Enhanced Learning. The topics include: Research on the Method of Eliminating Duplicated Encrypted Data in Cloud Storage Based on Generated Countermeasure Network;design of distributed Hybrid Pipeline Multimedia Aided Scheduling System;intelligent Scheduling of distributed Displacement Pipeline Based on Hybrid Discrete Drosophila Optimization Algorithm;research on grid Planning Method of Distribution Network Based on Artificial Intelligence Technology;intelligent Monitoring Method for Backstage Data Security of Tourism Information Promotion Platform Based on Cloud computing;preface;research on Multithreaded Data Scheduling Control Method for Power Communication Based on Wireless Sensor;research on Industrial Product Modeling Design Method Based on Deep Learning;a Frequency Conversion Circuit for Piezoelectric Vibrating Energy Harvesting;an Adaptive Optimization Strict Reverse Navigation Algorithm for Ship Fine Alignment Process;research on Load Feature Extraction Method of Typical Users Based on Deep Learning;enterprise Financial Risk Early Warning System Based on Catastrophe Progression Method;research on Transportation Route Planning Method of Regional Logistics Network Based on Transfer Learning;simultaneous Localization of Multiple Defects in Software Testing Based on Reinforcement Learning;Design of Embedded Network Human Machine Interface Based on VR Technology;Design of Information Security System Based on JSP Technology and Reinforcement Model;sliding Mode Adaptive Control for Sensorless Permanent Magnet Synchronous Motor;recognition Method of Metal Material Pitting Defect Based on Visual Signal Processing;an Improved Detection Method of Safety Helmet Wearing Based on CenterNet;influence Maximization Based on True Threshold in Social Networks;arabic Question-Answering System Using Search Engine Techniques.
Electronic structure calculations based on density-functional theory (DFT) represent a significant part of today's HPC workloads and pose high demands on high-performance computing resources. To perform these quan...
详细信息
ISBN:
(纸本)9781728199986
Electronic structure calculations based on density-functional theory (DFT) represent a significant part of today's HPC workloads and pose high demands on high-performance computing resources. To perform these quantum-mechanical DFT calculations on complex large-scale systems, so-called linear scaling methods instead of conventional cubic scaling methods are required. In this work, we take up the idea of the submatrix method and apply it to the DFT computations in the software package CP2K. For that purpose, we transform the underlying numeric operations on distributed, large, sparse matrices into computations on local, much smaller and nearly dense matrices. This allows us to exploit the full floating-point performance of modern CPUs and to make use of dedicated accelerator hardware, where performance has been limited by memory bandwidth before. We demonstrate both functionality and performance of our implementation and show how it can he accelerated with GPM and FPGAs.
With the rapid development of Internet services and the Internet of Things (IoT), many studies focus on operator allocation to enhance the DSPAs’ (data stream processing applications) performance and resource utiliza...
详细信息
The current distributed energy Internet financial audit has problems in information sharing and lacks an efficient peer-to-peer security transmission strategy. Facing the problems of financial auditing in distributed ...
详细信息
ISBN:
(纸本)9783030169466;9783030169459
The current distributed energy Internet financial audit has problems in information sharing and lacks an efficient peer-to-peer security transmission strategy. Facing the problems of financial auditing in distributed energy internet, we construct an autonomous peer-to-peer information interaction system combining with blockchain and named data network, and research on data acquisition and secure transmission of this system. For data acquisition, a data identification parsing module based on blockchain is designed, and the corresponding data is obtained by parsing the data identifier. For secure transmission, this paper designs a blockchain-based encryption and Decryption module to ensure the secure transmission of data in the system environment and the controllability of data access by encrypting and decrypting data assets. This paper builds an experimental environment based on the campus network, and performs functional testing and verification on the two modules.
In recent years the Smart grids also known as intelligent energy systems have attracted the attention of researchers and became an active area for research. Smart grid (SG) is a new development stage of power systems ...
详细信息
ISBN:
(纸本)9781728131290
In recent years the Smart grids also known as intelligent energy systems have attracted the attention of researchers and became an active area for research. Smart grid (SG) is a new development stage of power systems that aims to increase the efficiency of the energy transmission, to balance the demand and supply in the network and to improve the use of the distributed renewable energy sources. Since the transmitted energy have some losses in transmission path, which is the major issue in energy routing protocols. Where the main question is how to decrease the energy transmission loss in other words, how to find the efficient energy transmission path with the minimum transmission cost. Different methods and protocols have been proposed to solve the energy transmission path problem. These proposed protocols are based on traditional methods such as graph theory, game theory, autonomous systems, consensus... etc. In this paper, we have considered the problem of determining the energy efficient path as an optimization problem. In order to solve this problem, we proposed the use of swarm optimization methods in particularly the Bee Colony Optimization method. We have used the principle of bee foraging behaviour and proposed an energy routing protocol based on BCO algorithm to determine the lowest cost and latency energy path using features of power transmission and peer to peer energy market in smart grids.
The proceedings contain 97 papers. The special focus in this conference is on Multimedia Technology and Enhanced Learning. The topics include: Research on the Method of Eliminating Duplicated Encrypted Data in Cloud S...
ISBN:
(纸本)9783030825645
The proceedings contain 97 papers. The special focus in this conference is on Multimedia Technology and Enhanced Learning. The topics include: Research on the Method of Eliminating Duplicated Encrypted Data in Cloud Storage Based on Generated Countermeasure Network;design of distributed Hybrid Pipeline Multimedia Aided Scheduling System;intelligent Scheduling of distributed Displacement Pipeline Based on Hybrid Discrete Drosophila Optimization Algorithm;research on grid Planning Method of Distribution Network Based on Artificial Intelligence Technology;intelligent Monitoring Method for Backstage Data Security of Tourism Information Promotion Platform Based on Cloud computing;preface;research on Multithreaded Data Scheduling Control Method for Power Communication Based on Wireless Sensor;research on Industrial Product Modeling Design Method Based on Deep Learning;a Frequency Conversion Circuit for Piezoelectric Vibrating Energy Harvesting;an Adaptive Optimization Strict Reverse Navigation Algorithm for Ship Fine Alignment Process;research on Load Feature Extraction Method of Typical Users Based on Deep Learning;enterprise Financial Risk Early Warning System Based on Catastrophe Progression Method;research on Transportation Route Planning Method of Regional Logistics Network Based on Transfer Learning;simultaneous Localization of Multiple Defects in Software Testing Based on Reinforcement Learning;Design of Embedded Network Human Machine Interface Based on VR Technology;Design of Information Security System Based on JSP Technology and Reinforcement Model;sliding Mode Adaptive Control for Sensorless Permanent Magnet Synchronous Motor;recognition Method of Metal Material Pitting Defect Based on Visual Signal Processing;an Improved Detection Method of Safety Helmet Wearing Based on CenterNet;influence Maximization Based on True Threshold in Social Networks;arabic Question-Answering System Using Search Engine Techniques.
The proceedings contain 8 papers. The topics discussed include: applying parallel and distributedcomputing curriculum to cyber security courses;peachy parallel assignments (EduHPC 2020);lightning talks of EduHPC 2020...
ISBN:
(纸本)9781665422963
The proceedings contain 8 papers. The topics discussed include: applying parallel and distributedcomputing curriculum to cyber security courses;peachy parallel assignments (EduHPC 2020);lightning talks of EduHPC 2020;extending *** as an online self-learning platform for compiler development;teaching software sustainability for high performance computing at ATPESC;towards generic parallel programming in computer science education with Kokkos;and trying to do it all in a single course: a surprisingly good idea.
Many parallel applications do not scale as the number of threads increases, which means that executing them with the maximum possible number of threads will not always deliver the best outcome in performance, energy c...
详细信息
ISBN:
(纸本)9781728165820
Many parallel applications do not scale as the number of threads increases, which means that executing them with the maximum possible number of threads will not always deliver the best outcome in performance, energy consumption, or the tradeoff between both (represented by the energy-delay product - EDP). Given that, several strategies, online and offfine, have already been proposed to rightly tune the number of threads according to the application. While the former can capture some behaviors that can only be known at runtime, the latter do not impose any execution overhead and can use more efficient and costly algorithms. However, these learning algorithms in static strategics may take several hours, precluding their use or a smooth migration across different systems. In this scenario, we propose a generic methodology for such offline strategies to significantly decrease the learning time by inferring the execution behavior of parallel applications using smaller input sets than the ones used by the target applications. Through the execution of eighteen well-known benchmarks on two multicore processors, we show that our methodology is capable of converging to results that are very close to those that use the regular input set, but converging 84.7% faster, on average. We also show that such a strategy delivers better results than a dynamic one, presenting an EDP 7.7% lower, on average, when executing the applications with the number of threads found during learning. Finally, we also compare our learning methodology with an exhaustive search. It has an average learning cost (i.e., the time spent by our search algorithm to find the best configuration) of only 3.1% to optimize the EDP of the entire benchmark sett.
This paper presents the definition and the implementation of a decentralized system for the energy trading managed by blockchain technology. The system, called Crypto-Trading, is composed by three interacting subsyste...
详细信息
ISBN:
(纸本)9783030483401;9783030483395
This paper presents the definition and the implementation of a decentralized system for the energy trading managed by blockchain technology. The system, called Crypto-Trading, is composed by three interacting subsystems: the trading platform, the blockchain, and the smart meters system. It is conceived to exploit the IoT technology of smart meters and the decentralization of smart contracts working inside the blockchain technology for managing exchange and trading of energy by means of specific tokens. The paper defines the system as a decentralized application, identifying system actors and describing user stories. Then provides the description of the use case concerning the rechargeable token, one of the main feature of our system, and its interaction with the other components of the system. Finally, the paper compares our implementation choice with other ongoing projects in the field of energy trading.
parallel multigrid method is expected to be a useful algorithm in exascale era because of its scalability. It is widely known that overhead of coarse grid solver in parallel multigrid method is significant, if the num...
详细信息
ISBN:
(纸本)9781450376501
parallel multigrid method is expected to be a useful algorithm in exascale era because of its scalability. It is widely known that overhead of coarse grid solver in parallel multigrid method is significant, if the number of MPI processes is O(10(4)) or larger. The author proposed the hCGA for avoiding such overhead. Recently, the AM-hCGA, further optimized version of the hCGA, was proposed by the author, and its performance was evaluated on the Oakforest-PACS system (OFP) with IHK/McKernel at JCAHPC using up to 2,048 nodes of Intel Xeon Phi (Knights Landing). In the present work, developed method is also implemented to the Oakbridge-CX system (OBCX) at the University of Tokyo using up to 1,024 nodes (2,048 sockets) of Intel Xeon Platinum 8280 (Cascade Lake). Performance in weak and strong scaling are evaluated for application on 3D groundwater flow through heterogeneous porous media (pGW3D-FVM). The hCGA and the AM-hCGA provide excellent performance on both of OFP and OBCX with larger number of nodes. Especially, it achieved excellent performance in strong scaling on OBCX.
暂无评论