111 results on '"Chunming Hu"'
Search Results
2. A review on fast-frequency pulse TIG welding technology
- Author
-
Zhenmin Wang, Ge Lu, Chunming Hu, Sanbao Lin, Xianghui Ren, Jianwen Wu, and Jiyu Tian
- Subjects
Mechanics of Materials ,Mechanical Engineering ,Metals and Alloys - Published
- 2022
3. A Collective Approach to Scholar Name Disambiguation
- Author
-
Chunming Hu, Xiang Zhang, Jinpeng Huai, Shuai Ma, Dongsheng Luo, and Yaowei Yan
- Subjects
Computational Theory and Mathematics ,business.industry ,Computer science ,Name disambiguation ,Artificial intelligence ,business ,computer.software_genre ,computer ,Natural language processing ,Computer Science Applications ,Information Systems - Published
- 2022
4. NuSC: An Effective Local Search Algorithm for Solving the Set Covering Problem
- Author
-
Chuan Luo, Wenqian Xing, Shaowei Cai, and Chunming Hu
- Subjects
Human-Computer Interaction ,Control and Systems Engineering ,Electrical and Electronic Engineering ,Software ,Computer Science Applications ,Information Systems - Abstract
The set covering problem (SCP) is a fundamental NP-hard problem in computer science and has a broad range of important real-world applications. In practice, SCP instances transformed from real-world applications would be of large scale, so it is of significant importance to design effective heuristic algorithms, especially local search ones. However, there exist only few research works on developing local search algorithms for solving SCP. In this article, we propose a new local search algorithm for solving SCP, dubbed NuSC. In particular, NuSC introduces a new combined scoring function for subset selection, which combines different subset properties in an effective way and helps NuSC find more optimized solutions. Besides, NuSC incorporates a dynamic weighting scheme for elements, a tabu search strategy, and a novelty selection mechanism to further enhance its practical performance. In order to study the effectiveness and robustness of our proposed NuSC algorithm, we conduct extensive experiments to compare NuSC against many state-of-the-art competitors on various types of SCP instances. Our experimental results demonstrate that NuSC significantly outperforms its competitors on the majority of instances, indicating the superiority of NuSC. Also, our empirical evaluations confirm the effectiveness of each algorithmic technique underlying NuSC.
- Published
- 2022
5. A Neural Expectation-Maximization Framework for Noisy Multi-Label Text Classification
- Author
-
Junfan Chen, Richong Zhang, Jie Xu, Chunming Hu, and Yongyi Mao
- Subjects
Computational Theory and Mathematics ,Computer Science Applications ,Information Systems - Published
- 2022
6. Physical Study of Temperature Measurement by Neutron Resonance Absorption of Tungsten
- Author
-
Longwei Mei, Wei Luo, Jing Shang, ChunMing Hu, JianFei Tong, Bin Zhou, HaiTao Hu, WenTing Du, and ChaoJu Yu
- Published
- 2023
7. Classification-oriented dawid skene model for transferring intelligence from crowds to machines
- Author
-
Jiaran Li, Richong Zhang, Samuel Mensah, Wenyi Qin, and Chunming Hu
- Subjects
General Computer Science ,Theoretical Computer Science - Published
- 2022
8. SamplingCA: effective and efficient sampling-based pairwise testing for highly configurable software systems
- Author
-
Chuan Luo, Qiyuan Zhao, Shaowei Cai, Hongyu Zhang, and Chunming Hu
- Published
- 2022
9. Towards Robust False Information Detection on Social Networks with Contrastive Learning
- Author
-
Guanghui Ma, Chunming Hu, Ling Ge, Junfan Chen, Hong Zhang, and Richong Zhang
- Published
- 2022
10. AIQoSer: Building the efficient Inference-QoS for AI Services
- Author
-
Jianxin Li, Tianchen Zhu, Haoyi Zhou, Qingyun Sun, Chunyang Jiang, Shuai Zhang, and Chunming Hu
- Published
- 2022
11. An ultra-high temperature furnace for temperature determination by neutron resonance spectroscopy
- Author
-
Hui Cheng, Haitao Hu, Chunming Hu, Bao Yuan, Bo Bai, Bin Zhou, Longwei Mei, Wenting Du, Yufeng Duan, Fan Ye, Wanju Luo, Zhiqiang Huang, Quan Lin, Chunchun Zhang, and Xin Tong
- Subjects
Nuclear and High Energy Physics ,Instrumentation - Published
- 2023
12. NDVI Characteristics and Influencing Factors of Typical Ecosystems in the Semi-Arid Region of Northern China: A Case Study of the Hulunbuir Grassland
- Author
-
Yating Zhao, Chunming Hu, Xi Dong, and Jun Li
- Subjects
Global and Planetary Change ,Ecology ,NDVI ,redundancy analysis ,floodplain wetland ,meadow ,sand ribbon ,Nature and Landscape Conservation - Abstract
The semi-arid region of northern China is highly sensitive to environmental changes, especially the Hulunbuir Grassland, which has an essential ecological status and a fragile environment. This study focused on the NDVI characteristics of three different ecosystems and their dominant influencing factors. It proposed a method to show the immediate effects of factors influencing NDVI on a statistical level. The results showed that: (1) NDVI of floodplain wetland > NDVI of meadow > NDVI of sand ribbon. There were obvious differences among the three ecosystems, and the spatial distribution of NDVI was consistent with altitude. (2) The main explanatory factors were the phenological period, humidity, temperature, accumulated precipitation, runoff, and evaporation, which accounted for 68.8% of the total explanation. (3) Phenological period, humidity, and precipitation were positively correlated with NDVI. Temperature and evaporation had a positive effect on NDVI within a certain range. This study revealed the differences in environmental factors in different ecosystems, enriched the theory of NDVI influencing factors, and provided a scientific basis for future NDVI research and regional ecological conservation.
- Published
- 2023
13. Long time series of remote sensing to monitor the transformation research of Kubuqi Desert in China
- Author
-
Zhibo Chen, Mingquan Wu, Chunming Hu, and Xi Dong
- Subjects
geography ,geography.geographical_feature_category ,010504 meteorology & atmospheric sciences ,Land use ,media_common.quotation_subject ,Wetland ,010502 geochemistry & geophysics ,01 natural sciences ,Desertification ,Remote sensing (archaeology) ,Agricultural land ,General Earth and Planetary Sciences ,Afforestation ,Environmental science ,China ,Restoration ecology ,0105 earth and related environmental sciences ,Remote sensing ,media_common - Abstract
Desertification is one of the major challenges facing humanity. However, there is no effective way to effectively control desertification. China is experiencing serious desertification, and to alleviate this trend, China has implemented a series of major ecological projects since 1978 and has achieved good results. Remote sensing can record changes in surface processes over a long period of time and can play an active role in desertification monitoring and governance. However, there is no systematic remote sensing monitoring method for desertification. In response to this problem, this paper takes a demonstration and reconstruction project of the United Nations desertification in the Kubuqi Desert in China as an example. By using the 30-year time series Landsat data, we propose a new remote sensing monitoring method for the impact of ecological restoration engineering of desert to monitor the spatial and temporal evolution pattern of the Kubuqi Desert in the past 30 years and the impact of the human ecological reconstruction project on the location of land use types in the Kubuqi Desert. In addition, the method analyzes the impact of the Kubuqi Desert Reconstruction Project on the local ecological environment changes from time and space perspectives. The results show the following: (1) During 1991–2017, the Kubuqi Desert Reconstruction Project improved the cultivated land, afforestation, and the Yellow River Drainage to control the sand and in conjunction with other renovation projects improved the ecological environment. The area of the sandy land decreased from 45.76% to 28.66%, while the areas of the waters wetland and artificial forest (shrub), urban construction land, and agricultural land increased; (2) There are obvious time and space differences in the transformation, and the vegetation cover increases as a whole. The obvious change areas are mainly distributed in the riverbank irrigation area of the Yellow River section of the Kubuqi Desert and the torrents such as the Maobula Kong, Buer Taigou and Heilaigou and other mountain gully areas. The relevant experience of the Kubuqi Desert Reconstruction Project in China has important reference significance for world desertification transformation.
- Published
- 2020
14. An Unsupervised Multiple-Task and Multiple-Teacher Model for Cross-lingual Named Entity Recognition
- Author
-
Zhuoran Li, Chunming Hu, Xiaohui Guo, Junfan Chen, Wenyi Qin, and Richong Zhang
- Published
- 2022
15. Thermal neutron beam splitting of the No. 8 beamline at the China Spallation Neutron Source
- Author
-
Liang Zhou, Chunming Hu, Wenting Du, Chao Ding, and Jie Qiu
- Subjects
Nuclear and High Energy Physics ,Instrumentation - Published
- 2023
16. A facile pyrolysis synthesis of Ni doped Ce2O3@CeO2/CN composites for adsorption removal of Congo red: Activation of carbon nitride structure
- Author
-
Richuan Rao, Yaohua Huang, Qiang Ling, Chunming Hu, Xiongzi Dong, Ji Xiang, Qihua Zhou, Song Fang, Yuhuan Hu, Yingnan Zhang, and Qun Tang
- Subjects
Filtration and Separation ,Analytical Chemistry - Published
- 2023
17. Research on the Impact of Water Conservancy Projects on Downstream Floodplain Wetlands—Taking Yimin River as an Example
- Author
-
Chunming Hu and Xi Dong
- Subjects
floodplain wetland ,water inundation guarantee rate ,reservoir ,Yimin River ,remote sensing ,Geography, Planning and Development ,Aquatic Science ,Biochemistry ,Water Science and Technology - Abstract
Continued construction of reservoirs around the world promotes socio-economic development and severely affects the ecological and hydrological processes of rivers and floodplain wetlands. In this study, the Yimin River in Inner Mongolia, China, was taken as the research area. The water inundation guarantee rate (WIGR) was used as the model basis to characterize the inundation probability of the floodplain area. The comparative study of the remote sensing data of the 38 periods before the construction of the reservoir, and the 14 periods after the construction of the reservoir, shows that: due to the impact of the reservoir construction, the submerged area of the water body (WIGR greater than zero) decreased from 49.03 km2 to 39.32 km2, a total reduction of 9.71 km2; the very low water inundation guarantee rate area (WIGR value of 0–20%) was the most affected, with a decrease of 12.14 km2, while the area of other areas with a WIGR value greater than 20% increased by 3.43 km2. In addition, the affected floodplain wetlands have significant spatial distribution characteristics: first, they are mainly distributed in the high-curvature river reach areas, and in this study 77.96% of the three high-curvature river reach areas accounted for 26.04% of the area, with area loss in very low WIGR areas; the second is that it is distributed far from the outside of the river channel, while the WIGR value in some areas near the river channel is increased. This study provides a technical reference for downstream wetland protection based on the WIGR model.
- Published
- 2022
18. ScaleReactor: A graceful performance isolation agent with interference detection and investigation for container‐based scale‐out workloads
- Author
-
Xiaoqiang Yu, Tianyu Wo, Chunming Hu, and Jianyong Zhu
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Temporal isolation among virtual machines ,Computer Science Applications ,Theoretical Computer Science ,Computational Theory and Mathematics ,Interference (communication) ,Scalability ,Container (abstract data type) ,Correlation analysis ,business ,Software ,Computer hardware - Published
- 2021
19. One-pass trajectory simplification using the synchronous Euclidean distance
- Author
-
Yimeng Zuo, Xuelian Lin, Jiahao Jiang, Shuai Ma, and Chunming Hu
- Subjects
FOS: Computer and information sciences ,Computer science ,Databases (cs.DB) ,02 engineering and technology ,Combinatorics ,Euclidean distance ,Line segment ,Computer Science - Databases ,Cone (topology) ,Hardware and Architecture ,020204 information systems ,Bounded function ,Computer Science - Data Structures and Algorithms ,Line (geometry) ,0202 electrical engineering, electronic engineering, information engineering ,Data Structures and Algorithms (cs.DS) ,020201 artificial intelligence & image processing ,One pass ,Trajectory (fluid mechanics) ,Information Systems - Abstract
Various mobile devices have been used to collect, store and transmit tremendous trajectory data, and it is known that raw trajectory data seriously wastes the storage, network bandwidth and computing resource. To attack this issue, one-pass line simplification ($$\textsf {LS} $$) algorithms have been developed, by compressing data points in a trajectory to a set of continuous line segments. However, these algorithms adopt the perpendicular Euclidean distance, and none of them uses the synchronous Euclidean distance ($$\textsf {SED} $$), and cannot support spatiotemporal queries. To do this, we develop two one-pass error bounded trajectory simplification algorithms ($$\textsf {CISED} $$-$$\textsf {S} $$ and $$\textsf {CISED} $$-$$\textsf {W} $$) using $$\textsf {SED} $$, based on a novel spatiotemporal cone intersection technique. Using four real-life trajectory datasets, we experimentally show that our approaches are both efficient and effective. In terms of running time, algorithms $$\textsf {CISED} $$-$$\textsf {S} $$ and $$\textsf {CISED} $$-$$\textsf {W} $$ are on average 3 times faster than $$\textsf {SQUISH} $$-$$\textsf {E} $$ (the fastest existing $$\textsf {LS} $$ algorithm using $$\textsf {SED} $$). In terms of compression ratios, $$\textsf {CISED} $$-$$\textsf {S} $$ is close to and $$\textsf {CISED} $$-$$\textsf {W} $$ is on average $$19.6\%$$ better than $$\textsf {DPSED} $$ (the existing sub-optimal $$\textsf {LS} $$ algorithm using $$\textsf {SED} $$ and having the best compression ratios), and they are $$21.1\%$$ and $$42.4\%$$ better than $$\textsf {SQUISH} $$-$$\textsf {E} $$ on average, respectively.
- Published
- 2019
20. Defect-mediated hydroxylation of multi-walled carbon nanotubes as metal-free catalysts to enhance catalytic performance for oxidative dehydrogenation of ethylbenzene using CO2
- Author
-
Huaze Dong, Richuan Rao, Xiongzi Dong, Chunming Hu, Ni Shiwei, Yongqiang Tang, and Kangxi Wu
- Subjects
Process Chemistry and Technology ,02 engineering and technology ,Oxidative phosphorylation ,Carbon nanotube ,010402 general chemistry ,021001 nanoscience & nanotechnology ,01 natural sciences ,Ethylbenzene ,Hydrothermal circulation ,0104 chemical sciences ,Catalysis ,law.invention ,Hydroxylation ,chemistry.chemical_compound ,chemistry ,Chemical engineering ,law ,Chemical Engineering (miscellaneous) ,Dehydrogenation ,Graphite ,0210 nano-technology ,Waste Management and Disposal - Abstract
The fabrication and hydroxylation of surface defects on multi-walled carbon nanotubes (MWCNTs) are performed through a single or combined method involving hydrothermal, ultrasonic and ball-milling treatments. These treatments cannot change the tubular morphology of the graphite structure in MWCNTs but they can alter the surface defect structure on MWCNTs. Surface defects on MWCNTs can promote the hydroxylation of the MWCNTs to produce hydroxyl groups. However, these defects are difficult to hydroxylate when occupied by other functional groups, such as carboxyl groups, even though the hydroxylation processes are the same. After hydroxylation, the MWCNTs with surface defects can be employed as metal-free catalysts for the oxidative dehydrogenation of ethylbenzene using CO2 as soft oxidants. The inherent disorder or artificial skeleton defects on MWCNTs cannot directly act as catalytic active sites, but they can be hydroxylated to enhance the catalytic activity of the MWCNTs. For the same type of MWCNT defects formed after hydroxylation, the catalytic activity is closely related to the defect density. If the disorder or skeleton defects cause a higher defect density on the hydroxylated MWCNTs, the MWCNTs will exhibit a higher catalytic activity. Due to the different structures and positions of the MWCNT defect carbons, the artificial skeleton defects on MWCNTs more efficiently promote the hydroxylation of MWCNTs compared to the disorder defects, decreasing their defect density and enhancing their catalytic activity. Therefore, MWCNTs-BOH36 with skeleton defects has a catalytic activity that is twice as high as that of MWCNTs-CS-120 with disorder defects.
- Published
- 2019
21. Dynamic scaling for parallel graph computations
- Author
-
Chunming Hu, Jingren Zhou, Wenfei Fan, Muyang Liu, Ping Lu, and Qiang Yin
- Subjects
Optimization problem ,Computer science ,Computation ,General Engineering ,Approximation algorithm ,02 engineering and technology ,Load balancing (computing) ,Topology ,Upper and lower bounds ,020204 information systems ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Consistent hashing - Abstract
This paper studies scaling out/in to cope with load surges. Given a graph G that is vertex-partitioned and distributed across n processors, it is to add (resp. remove) k processors and re-distribute G across n + k (resp. n - k ) processors such that the load among the processors is balanced, and its replication factor and migration cost are minimized. We show that this tri-criteria optimization problem is intractable, even when k is a constant and when either load balancing or minimum migration is not required. Nonetheless, we propose two parallel solutions to dynamic scaling. One consists of approximation algorithms by extending consistent hashing. Given a load balancing factor above a lower bound, the algorithms guarantee provable bounds on both replication factor and migration cost. The other is a generic scaling scheme. Given any existing vertex-partitioner VP of users' choice, it adaptively scales VP in and out such that it incurs minimum migration cost, and ensures balance and replication factors within a bound relative to that of VP. Using real-life and synthetic graphs, we experimentally verify the efficiency, effectiveness and scalability of the solutions.
- Published
- 2019
22. Novel engineering materials diffractometer fabricated at the China Spallation Neutron Source
- Author
-
Jianbo Gao, Shu Yan Zhang, Liang Zhou, Yanling Ma, Chunming Hu, Xia Zhan, Wenting Du, Chen Wang, Zhifeng Gong, Wenli Song, Chao Ding, and Jie Qiu
- Subjects
Nuclear and High Energy Physics ,Instrumentation - Published
- 2022
23. A surface control strategy of CeO2 nanocrystals for enhancing adsorption removal of Congo red
- Author
-
Richuan Rao, Peng Jin, Yaohua Huang, Chunming Hu, Xiongzi Dong, Yongqiang Tang, Fangkuo Wang, Fabao Luo, and Song Fang
- Subjects
Colloid and Surface Chemistry ,Materials Chemistry ,Physical and Theoretical Chemistry ,Surfaces, Coatings and Films ,Biotechnology - Published
- 2022
24. Neutron radial collimator using Zr–Gd alloy foil as collimating blade for engineering material diffractometer
- Author
-
Jie Qiu, Chunming Hu, Ying Liu, Liang Zhou, Fei Shen, Dapeng Jin, Wenting Du, Chao Ding, Wenli Song, YongZhang Huang, and Gang Wu
- Subjects
Nuclear and High Energy Physics ,Instrumentation - Published
- 2022
25. Enhancing catalytic performance of Ag-CeO2 catalysts for catalytic CO combustion: Ag-CeO2 interface interaction and Na-promoting action
- Author
-
Richuan Rao, Hanwen Liang, Chunming Hu, Huaze Dong, Xiongzi Dong, Yongqiang Tang, Song Fang, and Qiang Ling
- Subjects
Fuel Technology ,General Chemical Engineering ,Organic Chemistry ,Energy Engineering and Power Technology - Published
- 2022
26. Perph: A Workload Co-location Agent with Online Performance Prediction and Resource Inference
- Author
-
Tianyu Wo, Jie Xu, Chunming Hu, Ouyang Jin, Shiqing Xue, Jianyong Zhu, and Renyu Yang
- Subjects
Resource (project management) ,Computer science ,Quality of service ,visual_art ,Distributed computing ,Node (networking) ,visual_art.visual_art_medium ,Resource allocation ,Workload ,Resource management ,Yarn ,Throughput (business) - Abstract
Striking a balance between improved cluster utilization and guaranteed application QoS is a long-standing research problem in cluster resource management. The majority of current solutions require a large number of sandboxed experimentation for different workload combinations and leverage them to predict possible interference for incoming workloads. This results in non-negligible time complexity that severely restricts its applicability to complex workload co-locations. The nature of pure offline profiling may also lead to model aging problem that drastically degrades the model precision. In this paper, we present Perph, a runtime agent on a per node basis, which decouples ML-based performance prediction and resource inference from centralized scheduler. We exploit the sensitivity of long-running applications to multi-resources for establishing a relationship between resource allocation and consequential performance. We use Online Gradient Boost Regression Tree (OGBRT) to enable the continuous model evolution. Once performance degradation is detected, resource inference is conducted to work out a proper slice of resources that will be reallocated to recover the target performance. The integration with Node Manager (NM) of Apache YARN shows that the throughput of Kafka data-streaming application is 2.0x and 1.82x times that of isolation execution schemes in native YARN and pure cgroup cpu subsystem. In TPC-C benchmarking, the throughput can also be improved by 35% and 23% respectively against YARN native and cgroup cpu subsystem.
- Published
- 2021
27. Brief Industry Paper: optimizing Memory Efficiency of Graph Neural Networks on Edge Computing Platforms
- Author
-
Yunli Chen, Weisheng Zhao, Pengcheng Dai, Yingjie Qi, Jianlei Yang, Xiaoyi Wang, Ao Zhou, Yeqi Gao, Tong Qiao, and Chunming Hu
- Subjects
Graph neural networks ,business.industry ,Computer science ,Inference ,Machine learning ,computer.software_genre ,Range (mathematics) ,Memory management ,Feature (machine learning) ,Decomposition (computer science) ,Limit (mathematics) ,Artificial intelligence ,business ,computer ,Edge computing - Abstract
Graph neural networks (GNN) have achieved state-of-the-art performance on various industrial tasks. However, the poor efficiency of GNN inference and frequent Out-of-Memory (OOM) problem limit the successful application of GNN on edge computing platforms. To tackle these problems, a feature decomposition approach is proposed for memory efficiency optimization of GNN inference. The proposed approach could achieve outstanding optimization on various GNN models, covering a wide range of datasets, which speeds up the inference by up to 3×. Furthermore, the proposed feature decomposition could significantly reduce the peak memory usage (up to 5× in memory efficiency improvement) and mitigate OOM problems during GNN inference.
- Published
- 2021
28. Keyphrase Extraction with Incomplete Annotated Training Data
- Author
-
Yanfei Lei, Chunming Hu, Guanghui Ma, and Richong Zhang
- Published
- 2021
29. Hybrid Resource Orchestration and Scheduling for Cyber-Physical-Human Systems
- Author
-
Tianyu Wo, Wang Xu, Jianyong Zhu, and Chunming Hu
- Subjects
Computer science ,business.industry ,Distributed computing ,020208 electrical & electronic engineering ,Cyber-physical system ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Networking hardware ,Scheduling (computing) ,Resource (project management) ,Server ,0202 electrical engineering, electronic engineering, information engineering ,Orchestration (computing) ,business ,Edge computing - Abstract
Recently Cyber-Physical-Human Systems (CPHS) have been attracted much attention. Unlike existing computing paradigms such as Cloud Computing and Edge Computing, CPHS usually comprise many types of hybrid resources such as software and hardware in the cloud layer, network devices and edge servers in the network layer, as well as the physical devices and human participation. Such hybrid resource makes it challenging to efficient resource scheduling for CPHS. Previous studies on CPHS often focus on improving scheduling efficiency for specific application scenarios and thus are limited for other CPHS. In this work, we present a unified hybrid resource scheduling framework for CPHS, including a hybrid resource model for multiple types of resource providers and participants in CPHS, a hybrid resource orchestration tool that can describe our hybrid resource model as the resource requirements, and a scheduling mechanism to satisfy the resource requirements especially by considering the resource constraints and crosslayer scheduling in CPHS. We perform the case study of typical CPHS scenarios and show that our hybrid resource model and scheduling framework is effective, and provide a new view for improving the resource provision efficiency in CPHS.
- Published
- 2020
30. Research on application of asymmetrical Pre-chamber in Air-Assisted direct injection kerosene engine
- Author
-
Chunming Hu, Zhendong Zhang, Mengyuan Tian, Na Liu, and Shifeng Wei
- Subjects
Energy Engineering and Power Technology ,Industrial and Manufacturing Engineering - Published
- 2022
31. TOPOSCH: Latency-Aware Scheduling Based on Critical Path Analysis on Shared YARN Clusters
- Author
-
Tianyu Wo, Shiqing Xue, Xiaoqiang Yu, Jianyong Zhu, Jie Xu, Chunming Hu, Rajiv Ranjan, Hao Peng, and Renyu Yang
- Subjects
020203 distributed computing ,Computer science ,business.industry ,Quality of service ,Distributed computing ,Big data ,Resource Management System ,020206 networking & telecommunications ,02 engineering and technology ,Yarn ,Microservices ,computer.software_genre ,Scheduling (computing) ,visual_art ,0202 electrical engineering, electronic engineering, information engineering ,visual_art.visual_art_medium ,Batch processing ,Resource allocation ,Resource management ,Latency (engineering) ,Web service ,business ,computer ,Critical path method - Abstract
Balancing resource utilization and application QoS is a long-standing research topic in cluster resource management. Big data YARN clusters need to co-schedule diverse workloads on shared resources including batch processing jobs, streaming jobs, and other long-running applications such as web services, database services, etc. Current resource managers are only responsible for resource allocation among applications/jobs but completely unaware of runtime QoS requirements of interactive and latency-sensitive applications. Prior works to maximize the QoS of monolithic applications ignore inherent dependencies and temporal-spatio performance variability of components, characteristics of distributed applications primarily driven by microservices. In this paper, we present Toposch, a new resource management system to adaptively co-locate batch tasks and microservices by harvesting runtime latency. In particular, Toposch tracks full footprints of every request across microservices over time. A latency graph is periodically generated for identifying victim microservices through an end-to-end latency critical path analysis. We then exploit per-microservice and per-node risk assessment to gauge the visible resources to the capacity scheduler in YARN. Execution of batch tasks are adaptively throttled or delayed, thereby avoiding latency increase due to node over-saturation. TOPOSCH is integrated with YARN and experiments show that the latency of DLRAs can be reduced by up to 39.8% against the default capacity scheduling in YARN.
- Published
- 2020
32. Athena
- Author
-
Chunming Hu, Renjun Hu, Jinpeng Huai, Shuai Ma, and Junfeng Liu
- Subjects
Information retrieval ,Computer science ,media_common.quotation_subject ,02 engineering and technology ,Visualization ,Ranking (information retrieval) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Feature (machine learning) ,Graph (abstract data type) ,Profiling (information science) ,Leverage (statistics) ,020201 artificial intelligence & image processing ,Quality (business) ,media_common - Abstract
Scholarly search systems greatly aid the deep understanding of scholarly data and facilitate the research activities of scholars for scientific studies. Though a number of such systems have been developed, most of them either support rankings of limited search of entities or provide only basic ranking metrics. These existing systems also mainly adopt RDBMSs as their storage such that the linked feature of scholarly data is not fully exploited. In this study, we design and develop a novel scholarly search system Athena. (1) It supports four types of scholarly entity searches: articles, authors, venues and affiliations, and is equipped with five ranking metrics, including three traditional metrics and two comprehensive importance ranking metrics. (2) It also provides profiling of scholarly entities. (3) It further utilizes a graph storage to directly leverage the linked feature for speeding up the processing of complex queries. We demonstrate the advantages of Athena at scholarly search, profiling, graph storage and ranking quality.
- Published
- 2020
33. A melamine-assisted pyrolytic synthesis of Ag-CeO2 nanoassemblys for CO oxidation: Activation of Ag-CeO2 interfacial lattice oxygen
- Author
-
Qiang Ling, Song Fang, Richuan Rao, Chunming Hu, Hanwen Liang, Xiongzi Dong, Yongqiang Tang, and Huaze Dong
- Subjects
Materials science ,General Physics and Astronomy ,chemistry.chemical_element ,Surfaces and Interfaces ,General Chemistry ,Condensed Matter Physics ,Oxygen ,Surfaces, Coatings and Films ,Catalysis ,law.invention ,chemistry.chemical_compound ,Catalytic oxidation ,chemistry ,Chemical engineering ,law ,Lattice oxygen ,Calcination ,Pyrolytic carbon ,Melamine ,Pyrolysis - Abstract
Ag-CeO2 nanoassemblys are prepared with a simple melamine-induced thermal decomposition method. Ag-CeO2 nanoassemblys have a structure composed of Ag nanoparticles and CeO2 nanoparticles. For Ag-CeO2 nanoassemblys, Ag introduction can partially or completely activate lattice oxygen species of CeO2 nanoparticles and however, the ease of Ag-CeO2 interface oxygen activation is strongly influenced by their pyrolysis temperature. Ag-CeO2 nanoassemblys prepared at 350 °C have only partial activation of CeO2 surface oxygen. If the calcination temperature increases to 400 °C, Ag-CeO2 nanoassemblys are fully activated to form more reducible interfacial lattice oxygen and to promote their low-temperature reductivity. Although excessive calcination temperature (500 °C) induces full activation of Ag-CeO2 interface lattice oxygen, Ag-CeO2 nanoassemblys will construct a new Ag-CeO2 interface that is relative difficult to reduce, causing a less amount of reducible interface lattice oxygen provided at higher temperature. Ag-CeO2 nanoassemblys are investigated to reveal the relationship of Ag-CeO2 interfacial oxygen activation and CO catalytic oxidation performance. Ag-CeO2 nanoassemblys with more interfacial lattice oxygen provided at lower temperature are found to have higher catalytic activity than that catalyst with the partially or excessively activated interfacial oxygen.
- Published
- 2022
34. Eagle+: A fast incremental approach to automaton and table online updates for cloud services
- Author
-
Shenghai Zhong, Erica Yang, Hao Peng, Chunming Hu, Lihong Wang, and Jianxin Li
- Subjects
Eagle ,Theoretical computer science ,biology ,Computer Networks and Communications ,Computer science ,business.industry ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Oracle ,Automaton ,Hardware and Architecture ,biology.animal ,Computation complexity ,Atomic operations ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Algorithm ,Software - Abstract
Automaton or table-based multi-pattern matching methods have been widely used in cloud services, i.e., virtual Firewall service, virtual IDS service, etc. In cloud, a large scale of patterns in such services are frequently updated causing by users’ joining or quitting and adjustment of security and management policies. Therefore, how to quickly and accurately update the Automaton and Table becomes an important issue. In this paper, we propose Eagle+, an incremental approach for updating the matching Automaton and Table whilst avoiding recalculating the whole patterns after each change. In Eagle+, we attain efficiency by computing only the latest update set of patterns when updating the Automaton and Table. Moreover, Eagle+ achieves accurately local updating based on three atomic operations, adding, updating and deleting, each of which modifies values on classical Aho–Corasick (AC) automaton, Set Backward Oracle Matching (SBOM) automaton and Wu–Manber (WM) table. Compared with existing pattern updating methods, Eagle+ reduces the computation complexity from O ( n 2 ) to O ( n ) . The experimental results show that Eagle+ can save nearly 72%–92% of the time consumption in updating automatons and perform 100X faster in WM table.
- Published
- 2018
35. Evolution of Cloud Operating System: From Technology to Ecosystem
- Author
-
Yongwei Wu, Zuo-Ning Chen, Lu-Fei Zhang, Ao-Bing Sun, Chunming Hu, Hong Tang, Song Wu, Yuzhong Sun, Zheng-Wei Qi, Kang Chen, Jinlei Jiang, and Zi-Lu Kang
- Subjects
Application programming interface ,Computer science ,business.industry ,020207 software engineering ,Cloud computing ,02 engineering and technology ,Virtualization ,computer.software_genre ,Computer Science Applications ,Theoretical Computer Science ,Scheduling (computing) ,Computational Theory and Mathematics ,Hardware and Architecture ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Operating system ,Resource management ,business ,computer ,Software - Abstract
The cloud operating system (cloud OS) is used for managing the cloud resources such that they can be used effectively and efficiently. And also it is the duty of cloud OS to provide convenient interface for users and applications. However, these two goals are often conflicting because convenient abstraction usually needs more computing resources. Thus, the cloud OS has its own characteristics of resource management and task scheduling for supporting various kinds of cloud applications. The evolution of cloud OS is in fact driven by these two often conflicting goals and finding the right tradeoff between them makes each phase of the evolution happen. In this paper, we have investigated the ways of cloud OS evolution from three different aspects: enabling technology evolution, OS architecture evolution and cloud ecosystem evolution. We show that finding the appropriate APIs (application programming interfaces) is critical for the next phase of cloud OS evolution. Convenient interfaces need to be provided without scarifying efficiency when APIs are chosen. We present an API-driven cloud OS practice, showing the great capability of APIs for developing a better cloud OS and helping build and run the cloud ecosystem healthily.
- Published
- 2017
36. Perphon
- Author
-
Tianyu Wo, Jie Xu, Jianyong Zhu, Renyu Yang, Ouyang Jin, Chunming Hu, and Shiqing Xue
- Subjects
Computer science ,business.industry ,Quality of service ,Distributed computing ,Offline learning ,Temporal isolation among virtual machines ,Performance prediction ,Workload ,Access control ,Memory bandwidth ,Cache ,business - Abstract
Cluster administrators are facing great pressures to improve cluster utilization through workload co-location. Guaranteeing performance of long-running applications (LRAs), however, is far from settled as unpredictable interference across applications is catastrophic to QoS [2]. Current solutions such as [1] usually employ sandboxed and offline profiling for different workload combinations and leverage them to predict incoming interference. However, the time complexity restricts the applicability to complex co-locations. Hence, this issue entails a new framework to harness runtime performance and mitigate the time cost with machine intelligence: i) It is desirable to explore a quantitative relationship between allocated resource and consequent workload performance, not relying on analyzing interference derived from different workload combinations. The majority of works, however, depend on offline profiling and training which may lead to model aging problem. Moreover, multi-resource dimensions (e.g., LLC contention) that are not completely included by existing works but have impact on performance interference need to be considered [3]. ii) Workload co-location also necessitates fine-grained isolation and access control mechanism. Once performance degradation is detected, dynamic resource adjustment will be enforced and application will be assigned an access to specific slices of each resources. Inferring a "just enough" amount of resource adjustment ensures the application performance can be secured whilst improving cluster utilization. We present Perphon, a runtime agent on a per node basis, that decouples ML-based performance prediction and resource inference from centralized scheduler. Figure 1 outlines the proposed architecture. We initially exploit sensitivity of applications to multi-resources to establish performance prediction. To achieve this, Metric Monitor aggregates application fingerprint and system-level performance metrics including CPU, memory, Last Level Cache (LLC), memory bandwidth (MBW) and number of running threads, etc. They are enabled by Intel-RDT and precisely obtained from resource group manager. Perphon employs an Online Gradient Boost Regression Tree (OGBRT) approach to resolve model aging problem. Res-Perf Model warms up via offline learning that merely relies on a small volume of profiling in the early stage, but evolves with arrival of workloads. Consequently, parameters will be automatically updated and synchronized among agents. Anomaly Detector can timely pinpoint a performance degradation via LSTM time-series analysis and determine when and which application need to be re-allocated resources. Once abnormal performance counter or load is detected, Resource Inferer conducts a gradient ascend based inference to work out a proper slice of resources, towards dynamically recovering targeted performance. Upon receiving an updated re-allocation, Access Controller re-assigns a specific portion of the node resources to the affected application. Eventually, Isolation Executor enforces resource manipulation and ensures performance isolation across applications. Specifically, we use cgroup cpuset and memory subsystem to control usage of CPU and memory while leveraging Intel-RDT technology to underpin the manipulation of LLC and MBW. For fine-granularity management, we create different groups for LRA and batch jobs when the agent starts. Our prototype integration with Node Manager of Apache YARN shows that throughput of Kafka data-streaming application in Perphon is 2.0x and 1.82x times that of isolation execution schemes in native YARN and pure cgroup cpu subsystem.
- Published
- 2019
37. Shaready: A Resource-IsolatedWorkload Co-Location System
- Author
-
Renyu Yang, Jianyong Zhu, Chunming Hu, and Shiqing Xue
- Subjects
Computer science ,business.industry ,Quality of service ,Distributed computing ,020206 networking & telecommunications ,Provisioning ,Cloud computing ,02 engineering and technology ,Virtualization ,computer.software_genre ,Shared resource ,Resource (project management) ,Virtual machine ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Resource management ,business ,computer - Abstract
Over a decade, cloud and subsequent joint cloud computing has been evolving into one of biggest disruptive technologies in modern digital age. The rapidly maturing cloud service and system management still heavily relies on virtualization which underpins Infrastructure as a Service (IaaS) to offer on-demand and low-cost computing services. Nevertheless datacenters still suffer from low utilization and resource imbalance. IaaS systems and their workloads, as legacy estates, are intricate to be migrated or re-planned, thereby increasing the complexity of utilization improvement. Arguably workload co-location of long-running applications encapsulated in virtual machines and latency-insensitive batch jobs is an alternative to improve overall resource utilization. However, guaranteeing the quality of long-running services is still challenging. In this context, we proposed an isolation-based cluster resource sharing system Shaready to enable workload co-residences. By means of global resource quota configuration and multi-resource isolation, long-running services in virtual machines can be prioritized with maximized resource provisioning. We implemented and validated it based on Openstack and Yarn clusters, and experiments demonstrate that system CPU and memory utilization can be improved by roughly 50% and 16.67% respectively on average with at most 7% performance degradation.
- Published
- 2019
38. Procrastination-Aware Scheduling: A Bipartite Graph Perspective
- Author
-
Lei Chen, Yongxin Tong, Yiming Li, Chunming Hu, and Libin Wang
- Subjects
Schedule ,Theoretical computer science ,Job shop scheduling ,Computer science ,media_common.quotation_subject ,Procrastination ,Approximation algorithm ,02 engineering and technology ,Dynamic priority scheduling ,Scheduling (computing) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Bipartite graph ,media_common - Abstract
Procrastination is a prevalent form of self-control failure. As it often concerns with the individual's ability to meet the deadline, an efficient time management is crucial for overcoming it. Though a considerable amount of work in behavioral economics provides useful insights, there is not a computational way to guide us how to obtain an appropriate schedule for all the things to be done, especially when the relationship of the deadlines is intrinsic. In this paper, we first propose the Procrastination-aware Scheduling Problem (PSP) to model an appropriate schedule. A bipartite graph formulation is then developed to further illustrate the concepts. We find the PSP is NP-hard in the strong sense and design an approximation algorithm. In addition, we note the significance of the PSP under the online scenario (called OnlinePSP). Finally, we verify the effectiveness and efficiency of the proposed algorithms through extensive experiments on real datasets.
- Published
- 2019
39. Email Importance Evaluation in Mailing List Discussions
- Author
-
Xiaohan Jiang, Kun Jiang, Chunming Hu, Qi Shen, and Jie Sun
- Subjects
World Wide Web ,Teamwork ,Computer science ,InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS ,media_common.quotation_subject ,Evaluation methods ,Opinion leadership ,Learning methods ,Conversation ,Mailing list ,Feature evaluation ,GeneralLiterature_REFERENCE(e.g.,dictionaries,encyclopedias,glossaries) ,media_common - Abstract
Nowadays, mailing lists are widely used in team work for discussion and consultation. Identifying important emails in mailing list discussions could significantly benefit content summary and opinion leader recognition. However, previous studies only focus on the importance evaluation methods regarding personal emails, and there is no consensus on the definition of important emails. Therefore, in this paper we consider the characteristics of mailing lists and study how to evaluate email importance in mailing list discussions. Our contribution mainly includes the following aspects. First, we propose ER-Match, an email conversation thread reconstruction algorithm that takes nested quotation relationships into consideration while constructing the email relationship network. Based on the email relationship network, we formulate the importance of emails in mailing list discussions. Second, we propose a feature-rich learning method to predict the importance of new emails. Furthermore, we characterize various factors affecting email importance in mailing list discussions. Experiments with publicly available mailing lists show that our prediction model outperforms baselines with large gains.
- Published
- 2019
40. Fluorescent components and spatial patterns of chromophoric dissolved organic matters in Lake Taihu, a large shallow eutrophic lake in China
- Author
-
Chunming Hu, Bo Yao, and Qingquan Liu
- Subjects
China ,010504 meteorology & atmospheric sciences ,Health, Toxicology and Mutagenesis ,010501 environmental sciences ,01 natural sciences ,Fluorescence ,Water Quality ,TRACER ,Water Movements ,Environmental Chemistry ,Organic Chemicals ,0105 earth and related environmental sciences ,Hydrology ,Pigments, Biological ,General Medicine ,Pollution ,Humus ,Spatial heterogeneity ,Lakes ,Colored dissolved organic matter ,Spectrometry, Fluorescence ,Models, Chemical ,Environmental chemistry ,Spatial ecology ,Environmental science ,Eutrophication ,Bay ,Environmental Monitoring - Abstract
Water samples at both surface and bottom layers were taken from 102 sites in Lake Taihu to study the fluorescent components and spatial patterns of chromophoric dissolved organic matters (CDOM). Three-dimensional excitation-emission matrix data obtained from the samples were analyzed by parallel factor approach in which four humic-like and two protein-like fluorescent components (named C1–C6) were identified. The results showed that fluorescence intensities were higher in the northern and western lake regions, and notable declines of fluorescence maxima (F max) were observed from the northwest to the center and then to the southeast of the lake. Calculated biological index (BIX) values ranged from 0.88 to 1.44 and humification index (HIX) values from 0.64 to 3.37 for all the samples. The spatial variations of BIX and HIX values suggested stronger allochthonous CDOM characteristics in Zhushan Bay and the western area and autochthonous characteristics in the southern and eastern areas. Vertically, the average F max value of the surface samples was about 6 % less than that of the bottom samples, but noticeable variations existed among different sampling sites and components. These distribution characteristics of CDOM were mainly attributed to the spatial heterogeneity of sources and wind-induced transportation process. Interestingly, the C6 component (Exmax/Emmax = 250/455 nm) seemed to be unique in samples from Zhushan Bay and probably resulted from the discharge of the Taige River. Therefore, it could be used as an indicator of point-source discharge and a tracer to study the fate of CDOM in the lake.
- Published
- 2016
41. A probabilistic framework of preference discovery from folksonomy corpus
- Author
-
Chunming Hu, Richong Zhang, Xiaohui Guo, and Jinpeng Huai
- Subjects
Information retrieval ,General Computer Science ,Computer science ,Inference ,02 engineering and technology ,Conditional probability distribution ,Theoretical Computer Science ,symbols.namesake ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Profiling (information science) ,020201 artificial intelligence & image processing ,Probabilistic framework ,Folksonomy ,Gibbs sampling - Abstract
The increasing availability of folksonomy data makes them vital for user profiling approaches to precisely detect user preferences and better understand user interests, so as to render some personalized recommendation or retrieval results. This paper presents a rigorous probabilistic framework to discover user preference from folksonomy data. Furthermore, we incorporate three models into the framework with the corresponding inference methods, expectation-maximization or Gibbs sampling algorithms. The user preference is expressed through topical conditional distributions. Moreover, to demonstrate the versatility of our framework, a recommendation method is introduced to show the possible usage of our framework and evaluate the applicability of the engaged models. The experimental results show that, with the help of the proposed framework, the user preference can be effectively discovered.
- Published
- 2016
42. MultiLanes
- Author
-
Junbin Kang, Ye Zhai, Benlong Zhang, Jinpeng Huai, Chunming Hu, and Tianyu Wo
- Subjects
business.industry ,Computer science ,Temporal isolation among virtual machines ,020206 networking & telecommunications ,02 engineering and technology ,Storage virtualization ,Virtualization ,computer.software_genre ,Hardware and Architecture ,020204 information systems ,Embedded system ,Scalability ,Container (abstract data type) ,0202 electrical engineering, electronic engineering, information engineering ,Operating system ,Overhead (computing) ,Namespace ,business ,computer ,Host (network) - Abstract
OS-level virtualization is often used for server consolidation in data centers because of its high efficiency. However, the sharing of storage stack services among the colocated containers incurs contention on shared kernel data structures and locks within I/O stack, leading to severe performance degradation on manycore platforms incorporating fast storage technologies (e.g., SSDs based on nonvolatile memories). This article presents MultiLanes, a virtualized storage system for OS-level virtualization on manycores. MultiLanes builds an isolated I/O stack on top of a virtualized storage device for each container to eliminate contention on kernel data structures and locks between them, thus scaling them to manycores. Meanwhile, we propose a set of techniques to tune the overhead induced by storage-device virtualization to be negligible, and to scale the virtualized devices to manycores on the host, which itself scales poorly. To reduce the contention within each single container, we further propose SFS, which runs multiple file-system instances through the proposed virtualized storage devices, distributes all files under each directory among the underlying file-system instances, then stacks a unified namespace on top of them. The evaluation of our prototype system built for Linux container (LXC) on a 32-core machine with both a RAM disk and a modern flash-based SSD demonstrates that MultiLanes scales much better than Linux in micro- and macro-benchmarks, bringing significant performance improvements, and that MultiLanes with SFS can further reduce the contention within each single container.
- Published
- 2016
43. A facile and large-scale synthesis of Co3O4/N-doped graphene for CO oxidation: Low-temperature catalytic activity and the role of nitrogen states
- Author
-
Song Fang, Hai Sun, Yongqiang Tang, Huaze Dong, Xiongzi Dong, Chunming Hu, Richuan Rao, and Weiguang Fang
- Subjects
Chemistry ,Graphene ,Chemical structure ,Thermal decomposition ,Inorganic chemistry ,General Physics and Astronomy ,chemistry.chemical_element ,Nanoparticle ,02 engineering and technology ,Surfaces and Interfaces ,General Chemistry ,010402 general chemistry ,021001 nanoscience & nanotechnology ,Condensed Matter Physics ,01 natural sciences ,Nitrogen ,0104 chemical sciences ,Surfaces, Coatings and Films ,Ion ,Catalysis ,law.invention ,law ,Doped graphene ,0210 nano-technology - Abstract
Co3O4/N-doped graphene is synthesized with a one-pot and low-cost thermal decomposition in air. N-doped graphene improves their reductivity and their low-temperature catalytic performance of CO oxidation. After the treatment with dry reaction gases, the treated composites show the changed chemical structure of nitrogen species from N (C)3 structure to C N C structure. After the treatment with wet reaction gases, nitrogen species on N-doped graphene are decomposed and the anchored sites of Co3O4 nanoparticles are converted into oxygenated groups. The nitrogen sites of N (C)3 structure are beneficial to promote the reversible conversion between the reduced Co2+ ions and active Co3+ ions on Co3O4 nanoparticles at low temperature, but Co3+ ions can irreversibly be converted into the reduced Co2+ ions on Co3O4 nanoparticles anchored at the nitrogen sites of C N C structure and it is more difficult to reduce Co3O4 nanoparticles anchored at oxygenated groups from the converted nitrogen species. Since CO oxidation is promoted by the reversible conversion between Co2+ ions and Co3+ ions on Co3O4 nanoparticles, Co3O4/N-doped graphene has low-temperature catalytic activity, but the composites treated with dry reaction gases require higher temperature to show catalytic activity and the composites treated with wet reaction gases show lower catalytic performance.
- Published
- 2020
44. Cationic ion-driven surface control of one-dimensional CeO2 nanocrystals to enhance catalytic performance of CO oxidation
- Author
-
Song Fang, Na Li, Qianjin Hu, Yanxin Wei, Huaze Dong, Richuan Rao, Tong Wang, Xiongzi Dong, Hai Sun, Chunming Hu, and Lin Wang
- Subjects
Nanotube ,Chemistry ,Mechanical Engineering ,Metals and Alloys ,Cationic polymerization ,chemistry.chemical_element ,02 engineering and technology ,010402 general chemistry ,021001 nanoscience & nanotechnology ,01 natural sciences ,Oxygen ,0104 chemical sciences ,Catalysis ,Metal ,Cerium ,chemistry.chemical_compound ,Chemical engineering ,Mechanics of Materials ,visual_art ,Materials Chemistry ,visual_art.visual_art_medium ,Nanorod ,Formate ,0210 nano-technology - Abstract
Surface structures of one-dimensional CeO2 nanocrystals are tuned with different cationic ions in a facile and mild hydrothermal system with formate and carbonate. The synthetic key is to control the formation of anisotropic CeO2 precursors with the anion structure of formate and carbonate. The diluted concentration of Na+ ions with NH4+ ions can induce the formation of the CeO2 nanotube (NT) precursors, and yet Na+ ions can promote the production of the CeO2 nanorod (NR) precursors. CeO2 nanocrystals are applied in CO oxidation and show a very important effect of their surface structure on their catalytic performance. CeO2 NTs have rich cerium surface with the higher concentration of Ce3+ ions and can accelerate the mobility of more surface oxygen species than CeO2 NRs with difficultly reduced rich oxygen surface. However, after silver loading, CeO2 NRs can show the higher stability of CeO2 particles, more easily activated surface of CeO2 NRs with more Ce3+ ions, the promoted production of metallic Ag nanoparticles and higher mobility of more surface oxygen species on CeO2 surface. Therefore, CeO2 NTs have a higher catalytic activity of CO oxidation and conversely, after loading Ag, Ag/CeO2 NRs show the higher catalytic performance.
- Published
- 2020
45. ROSE: Cluster Resource Scheduling via Speculative Over-Subscription
- Author
-
Tianyu Wo, Chunming Hu, Chao Li, Peter Garraghan, Jianyong Zhu, Jie Xu, Xiaoyang Sun, and Renyu Yang
- Subjects
Resource scheduling ,Job shop scheduling ,Request queue ,Computer science ,business.industry ,Processor scheduling ,CPU time ,020206 networking & telecommunications ,Workload ,02 engineering and technology ,Scheduling (computing) ,Idle ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Task analysis ,Resource allocation ,Resource management ,business ,Computer network - Abstract
A long-standing challenge in cluster scheduling is to achieve a high degree of utilization of heterogeneous resources in a cluster. In practice there exists a substantial disparity between perceived and actual resource utilization. A scheduler might regard a cluster as fully utilized if a large resource request queue is present, but the actual resource utilization of the cluster can be in fact very low. This disparity results in the formation of idle resources, leading to inefficient resource usage and incurring high operational costs and an inability to provision services. In this paper we present a new cluster scheduling system, ROSE, that is based on a multi-layered scheduling architecture with an ability to over-subscribe idle resources to accommodate unfulfilled resource requests. ROSE books idle resources in a speculative manner: instead of waiting for resource allocation to be confirmed by the centralized scheduler, it requests intelligently to launch tasks within machines according to their suitability to oversubscribe resources. A threshold control with timely task rescheduling ensures fully-utilized cluster resources without generating potential task stragglers. Experimental results show that ROSE can almost double the average CPU utilization, from 36.37% to 65.10%, compared with a centralized scheduling scheme, and reduce the workload makespan by 30.11%, with an 8.23% disk utilization improvement over other scheduling strategies.
- Published
- 2018
46. Query Independent Scholarly Article Ranking
- Author
-
Chen Gong, Chunming Hu, Renjun Hu, Dongsheng Luo, Jinpeng Huai, and Shuai Ma
- Subjects
Information retrieval ,Computer science ,02 engineering and technology ,Popularity ,Task (project management) ,law.invention ,Ranking (information retrieval) ,PageRank ,Ranking ,law ,020204 information systems ,Factor (programming language) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Citation ,computer ,computer.programming_language - Abstract
Ranking query independent scholarly articles is a practical and difficult task, due to the heterogeneous, evolving and dynamic nature of entities involved in scholarly articles. To do this, we first propose a scholarly article ranking model by assembling the importance of involved entities (i.e., articles, venues and authors) such that the importance is a combination of prestige and popularity to capture the evolving nature of entities. To compute the prestige of articles and venues, we propose a novel Time-Weighted PageRank that extends traditional PageRank with a time decaying factor. We then develop a batch algorithm for scholarly article ranking, in which we propose a block-wise method for Time-Weighted PageRank in terms of an analysis of the citation characteristics of scholarly articles. We further develop an incremental algorithm for dynamic scholarly article ranking, which partitions graphs into affected and unaffected areas, and employs different updating strategies for nodes in different areas. Using real-life data, we finally conduct an extensive experimental study, and show that our approach is both effective and efficient for ranking scholarly articles.
- Published
- 2018
47. Discovering Graph Functional Dependencies
- Author
-
Wenfei Fan, Ping Lu, Chunming Hu, and Xueli Liu
- Subjects
Theoretical computer science ,Computer science ,Support ,02 engineering and technology ,Synthetic data ,Graph ,Satisfiability ,Running time ,GFD discovery ,parallel scalable ,020204 information systems ,fixed-parameter tractability ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Scalable algorithms ,020201 artificial intelligence & image processing ,Functional dependency ,Information Systems - Abstract
This article studies discovery of Graph Functional Dependencies (GFDs), a class of functional dependencies defined on graphs. We investigate the fixed-parameter tractability of three fundamental problems related to GFD discovery. We show that the implication and satisfiability problems are fixed-parameter tractable, but the validation problem is co-W[1]-hard in general. We introduce notions of reduced GFDs and their topological support, and formalize the discovery problem for GFDs. We develop algorithms for discovering GFDs and computing their covers. Moreover, we show that GFD discovery is feasible over large-scale graphs, by providing parallel scalable algorithms that guarantee to reduce running time when more processors are used. Using real-life and synthetic data, we experimentally verify the effectiveness and scalability of the algorithms.
- Published
- 2018
- Full Text
- View/download PDF
48. Incorporating User Grouping into Retweeting Behavior Modeling
- Author
-
Hui Zhang, Chunming Hu, Xiong Li, Jinhai Zhu, and Shuai Ma
- Subjects
Single model ,Cover (telecommunications) ,Human–computer interaction ,Computer science ,020204 information systems ,User group ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,02 engineering and technology ,Cluster analysis ,Variety (cybernetics) - Abstract
The variety among massive users makes it difficult to model their retweeting activities. Obviously, it is not suitable to cover the overall users by a single model. Meanwhile, building one model per user is not practical. To this end, this paper presents a novel solution, of which the principle is to model the retweeting behavior over user groups. Our system, GruBa, consists of three key components for extracting user based features, clustering users into groups, and modeling upon each group. Particularly, we look into the user interest from different perspectives including long-term/short-term interests and explicit/implicit interests. We have evaluated the performance of GruBa using datasets of real-world social networking applications, showcasing its benefits.
- Published
- 2018
49. Hybrid RRT/DE Algorithm for High Performance UCAV Path Planning
- Author
-
Fathy Elkazzaz, Chunming Hu, and Mohammed A. H. Abozied
- Subjects
0209 industrial biotechnology ,Optimization problem ,Computer science ,02 engineering and technology ,Rapidly exploring random tree ,Collision ,020901 industrial engineering & automation ,Robustness (computer science) ,Differential evolution ,0202 electrical engineering, electronic engineering, information engineering ,Robot ,020201 artificial intelligence & image processing ,Motion planning ,Algorithm ,Bat algorithm - Abstract
Path planning is an optimization problem that is crucial for robot or UCAV. Among the optimization approaches, we focus in this paper on a new hybrid modified Rapidly Exploring Random Tree algorithm (RRTs) and Differential Evolution (DE), for solving the optimization path planning problem to generate a fast and optimal 3D collision-free path under complex environment. We demonstrate the proposed algorithm performance through comparative analysis with Improved Bat algorithm (IBA). The results demonstrated the robustness and effectiveness of the proposed algorithm for generating an optimal free collision path in a short time, which is suitable for the UCAV applications.
- Published
- 2017
50. Cider: a Rapid Docker Container Deployment System through Sharing Network Storage
- Author
-
Renyu Yang, Chunming Hu, Du Lian, and Tianyu Wo
- Subjects
020203 distributed computing ,business.industry ,Computer science ,Distributed computing ,Process (computing) ,Cloud computing ,02 engineering and technology ,Concurrency control ,Resource (project management) ,Software deployment ,Scalability ,Container (abstract data type) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business - Abstract
Container technology has been prevalent and widely-adopted in production environment considering the huge benefits to application packing, deploying and management. However, the deployment process is relatively slow by using conventional approaches. In large-scale concurrent deployments, resource contentions on the central image repository would aggravate such situation. In fact, it is observable that the image pulling operation is mainly responsible for the degraded performance. To this end, we propose Cider — a novel deployment system to enable rapid container deployment in a high concurrent and scalable manner at scale. Firstly, on-demand image data loading is proposed by altering the local Docker storage of worker nodes into all-nodes-sharing network storage. Also, the local copy-on-write layer for containers can ensure Cider to achieve the scalability whilst improving the cost-effectiveness during the holistic deployment. Experimental results reveal that Cider can shorten the overall deployment time by 85% and 62% on average when deploying one container and 100 concurrent containers respectively.
- Published
- 2017
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.