73 results on '"Zhigao Zheng"'
Search Results
2. Benchtemp: A General Benchmark for Evaluating Temporal Graph Neural Networks.
- Author
-
Qiang Huang 0009, Xin Wang 0128, Susie Xi Rao, Zhichao Han 0001, Zitao Zhang, Yongjun He, Quanqing Xu, Yang Zhao, Zhigao Zheng 0001, and Jiawei Jiang 0001
- Published
- 2024
- Full Text
- View/download PDF
3. PICO: Accelerating All k-Core Paradigms on GPU.
- Author
-
Chen Zhao, Ting Yu 0004, Zhigao Zheng 0001, Yuanyuan Zhu, Song Jin, Bo Du 0001, and Dacheng Tao
- Published
- 2024
- Full Text
- View/download PDF
4. Galliot: Path Merging Based Betweenness Centrality Algorithm on GPU.
- Author
-
Zhigao Zheng 0001, Chen Zhao, Peichen Xie, and Bo Du 0001
- Published
- 2023
- Full Text
- View/download PDF
5. MLR: An Efficient Denoising Model for Highly Corrupted Images.
- Author
-
Shihong Yao, Yi Liu, Tao Wang 0037, Zhigao Zheng 0001, and Kim-Fung Tsang
- Published
- 2022
- Full Text
- View/download PDF
6. Parallel Overlapping Community Detection Algorithm on GPU
- Author
-
Zhigao Zheng, Xuanhua Shi, and Hai Jin
- Subjects
Information Systems and Management ,Information Systems - Published
- 2023
7. A Patch-Based Composite Denoising Algorithm for Wireless Transmission
- Author
-
Shihong Yao, Zhigao Zheng, and Tao Wang
- Subjects
Aerospace Engineering ,Electrical and Electronic Engineering - Published
- 2022
8. A Decentralized Mechanism Based on Differential Privacy for Privacy-Preserving Computation in Smart Grid
- Author
-
Tao Wang, Zhigao Zheng, Mamoun Alazab, Ali Kashif Bashir, Shahid Mumtaz, and Xiaoyan Wang
- Subjects
Focus (computing) ,Computer science ,Computation ,Random permutation ,Computer security ,computer.software_genre ,Theoretical Computer Science ,Domain (software engineering) ,Smart grid ,Computational Theory and Mathematics ,Hardware and Architecture ,Differential privacy ,Time domain ,Noise (video) ,computer ,Software - Abstract
As one of most successful industrial realizations of Internet of Things, a smart grid is a smart IoT system that deploys widespread smart meters to capture fine-grained data on residential power usage. It suffers diverse privacy attacks, which seriously increases the risk of violating the privacy of customers. Although some solutions have been proposed to address this privacy issue, most of them mainly rely on a trusted party and focus on the sanitization of metering masurements. However, these solutions are vulnerable to advanced attacks. In this paper, we propose a decentralized mechanism for privacy-preserving computation in smart grid called DDP, which leaverages the differential privacy and extends the data sanitization from the value domain to the time domain. Specifically, we inject Laplace noise to the measurements at the end of each customer in a distributed manner, and then use a random permutation algorithm to shuffle the power measurement sequence, thereby enforcing differential privacy after aggregation and preventing the sensitive power usage mode informaton of the customers from being inferred by other parties. Extensive experiments demonstrate that DDP shows an outstanding performance in terms of privacy from the non-intrusive load monitoring (NILM) attacks and utility by using two different error analysis.
- Published
- 2022
9. Graph-Enabled Intelligent Vehicular Network Data Processing
- Author
-
Zhigao Zheng and Ali Kashif Bashir
- Subjects
Mechanical Engineering ,Automotive Engineering ,Computer Science Applications - Published
- 2022
10. Linked Data Processing for Human-in-the-Loop in Cyber–Physical Systems
- Author
-
Zhigao Zheng, Shahid Mumtaz, Varun G. Menon, and Mohammad Reza Khosravi
- Subjects
Computer science ,Distributed computing ,Smart device ,Graph partition ,Cyber-physical system ,Linked data ,Semantic data model ,law.invention ,Data modeling ,Human-Computer Interaction ,law ,Modeling and Simulation ,Programming paradigm ,Human-in-the-loop ,Social Sciences (miscellaneous) - Abstract
There are several kinds of smart devices, such as smartphones, sensors, and smart wearable devices, included in the Human-in-the-Loop (HITL) system, but different devices have their own data processing and programming paradigm. Programmers usually need to design the same data processing logic for different devices by using a different programming model. How to mapping the same code to different devices without any change is an emerging topic in the HITL system. Furthermore, the intelligent data processing for the smart CPS sector is experiencing significant growth in data volume, driven by a large number of smart devices that are anticipated in the near further. All these smart devices are expected to improve the overall HITL system performance marvelously. A large number of devices can also outstandingly increase the data volume, which needs to be processed in real time. How to process large-scale data on a smart device in real time is another challenge. Focused on these challenges, this article proposed a computing device-aware HITL CPS data processing framework, named Barge, aiming to map the regular code to the different hardware without any change. In Barge, a semantic model, an architecture-driven programming model, and a graph partition scheme are included. The semantic model is used to express the user-defined graph algorithms by using the domain-specific language. The architecture-driven programming model will execute the graph algorithms on a different device in parallel. Furthermore, the graph partition scheme will partition the large-scale graphs into suitable partitions by aware of the topology to make the partitioned data suitable for kinds of smart devices. We believe that our work would open a wide range of opportunities to improve the performance of large-scale graph processing for HITL systems.
- Published
- 2021
11. FinPrivacy: A Privacy-preserving Mechanism for Fingerprint Identification
- Author
-
Tao Wang, Zhigao Zheng, Ali Kashif Bashir, Yanyan Xu, and Alireza Jolfaei
- Subjects
Computer Networks and Communications ,Mechanism (biology) ,Computer science ,Data_MISCELLANEOUS ,Universality (philosophy) ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,Privacy preserving ,Identification (information) ,Fingerprint ,0202 electrical engineering, electronic engineering, information engineering ,Differential privacy ,020201 artificial intelligence & image processing ,Uniqueness ,Data mining ,computer - Abstract
Fingerprint provides an extremely convenient way of identification for a wide range of real-life applications owing to its universality, uniqueness, collectability, and invariance. However, digitized fingerprints may reveal the privacy of individuals. Differential privacy is a promising privacy-preserving solution that is enforced by injecting random noise into preserved objects, such that an adversary with arbitrary background knowledge cannot infer private input from the noisy results. This study proposes FinPrivacy, a privacy-preserving mechanism for fingerprint identification. This mechanism utilizes the low-rank matrix approximation to reduce the dimensionality of fingerprint and the exponential mechanism to carefully determine the value of the optimal rank. Thereafter, FinPrivacy injects Laplace noise to the singular values of the approximated singular matrix, thereby trading off between privacy and utility. Analytic proofs and results of the comparative experiments demonstrate that FinPrivacy can simultaneously enforce ɛ-differential privacy and maintain an efficient fingerprint recognition.
- Published
- 2021
12. An Image Privacy Protection Algorithm Based on Adversarial Perturbation Generative Networks
- Author
-
Chao Tong, Zhigao Zheng, Chao Lang, and Mengze Zhang
- Subjects
021110 strategic, defence & security studies ,Speedup ,Artificial neural network ,Computer Networks and Communications ,Computer science ,Detector ,0211 other engineering and technologies ,Perturbation (astronomy) ,02 engineering and technology ,Upload ,Adversarial system ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Private information retrieval ,Algorithm ,Generative grammar - Abstract
Today, users of social platforms upload a large number of photos. These photos contain personal private information, including user identity information, which is easily gleaned by intelligent detection algorithms. To thwart this, in this work, we propose an intelligent algorithm to prevent deep neural network (DNN) detectors from detecting private information, especially human faces, while minimizing the impact on the visual quality of the image. More specifically, we design an image privacy protection algorithm by training and generating a corresponding adversarial sample for each image to defend DNN detectors. In addition, we propose an improved model based on the previous model by training an adversarial perturbation generative network to generate perturbation instead of training for each image. We evaluate and compare our proposed algorithm with other methods on wider face dataset and others by three indicators: Mean average precision, Averaged distortion, and Time spent. The results show that our method significantly interferes with DNN detectors while causing weak impact to the visual quality of images, and our improved model does speed up the generation of adversarial perturbations.
- Published
- 2021
13. Recognizing Influential Nodes in Social Networks With Controllability and Observability
- Author
-
Yang Yang, Guohua Wu, Feiran Huang, Zhigao Zheng, and Shahid Mumtaz
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,020208 electrical & electronic engineering ,Information processing ,02 engineering and technology ,Machine learning ,computer.software_genre ,Electronic mail ,Computer Science Applications ,Spamming ,Controllability ,Hardware and Architecture ,Control theory ,Content analysis ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Observability ,Artificial intelligence ,business ,Baseline (configuration management) ,computer ,Information Systems - Abstract
The analysis for social networks, such as the sensor-networks in socially networked industries, has shown a deep influence of intelligent information processing technology on industrial systems. The large amounts of data on these networks raise the urgent demands of analyzing the topological content effectively and efficiently in Industrial Internet of Things. One of the ways to locate important information amongst such large troves of data is to recognize influential nodes. In this article, we examine an intelligent way to recognize the influence of such nodes automatically. Motivated by the concepts of system controllability and observability from control theory, we introduce a novel method to evaluate nodes from two different aspects, namely, the ability of “observe” information on the network (i.e., observability), and the ability to propagate information to other nodes (i.e., controllability). We propose a unified data mining framework that incorporates content analysis with nodes behavioral tendencies, and show that it is able to outperform competitive baselines in recognizing influential nodes in networks. We also show that it is important to detect the presence of spammer nodes within networks, which might otherwise be wrongly recognized as influential nodes. The experimental results demonstrate the superiority of the proposed approach in comparison with baseline methods.
- Published
- 2021
14. Feluca: A Two-Stage Graph Coloring Algorithm With Color-Centric Paradigm on GPU
- Author
-
Hulin Dai, Xuan Peng, Shuo Wei, Zhigao Zheng, Hai Jin, Xuanhua Shi, and Ligang He
- Subjects
020203 distributed computing ,Speedup ,T1 ,Computer science ,Degree of parallelism ,Recursion (computer science) ,02 engineering and technology ,Parallel computing ,Graph ,QA76 ,Vertex (geometry) ,Computational Theory and Mathematics ,Hardware and Architecture ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Graph (abstract data type) ,Graph coloring ,QA - Abstract
There are great challenges in performing graph coloring on GPU in general. First, the long-tail problem exists in the recursion algorithm because the conflict (i.e., different threads assign the adjacent nodes to the same color) becomes more likely to occur as the number of iterations increases. Second, it is hard to parallelize the sequential spread algorithm because the color allocation depends on the adjoining iteration. Third, the atomic operation is widely used on GPU to maintain the color list, which can greatly reduce the efficiency of GPU threads. In this article, we propose a two-stage high-performance graph coloring algorithm, called Feluca , aiming to address the above challenges. Feluca combines the recursion-based method with the sequential spread-based method. In the first stage, Feluca uses a recursive routine to color a majority of vertices in the graph. Then, it switches to the sequential spread method to color the remaining vertices in order to avoid the conflicts of the recursive algorithm. Moreover, the following techniques are proposed to further improve the graph coloring performance. i) A new method is proposed to eliminate the cycles in the graph; ii) a top-down scheme is developed to avoid the atomic operation originally required for color selection; and iii) a novel color-centric coloring paradigm is designed to improve the degree of parallelism for the sequential spread part. All these newly developed techniques, together with further GPU-specific optimizations such as coalesced memory access, comprise an efficient parallel graph coloring solution in Feluca. We have conducted extensive experiments on NVIDIA GPU. The results show that Feluca can achieve 1.19 – 8.39× speedup over the state-of-the-art algorithms.
- Published
- 2021
15. Differentially Private High-Dimensional Data Publication in Internet of Things
- Author
-
Tao Wang, Jinming Wen, Ali Kashif Bashir, Sajjad Hussain Chauhdary, Zhigao Zheng, and Shahid Mumtaz
- Subjects
Clustering high-dimensional data ,021110 strategic, defence & security studies ,Computer Networks and Communications ,business.industry ,Computer science ,Data domain ,0211 other engineering and technologies ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,computer.software_genre ,Computer Science Applications ,Hardware and Architecture ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Differential privacy ,Noise (video) ,Data mining ,business ,computer ,Computer Science::Cryptography and Security ,Information Systems - Abstract
Internet of Things and the related computing paradigms, such as cloud computing and fog computing, provide solutions for various applications and services with massive and high-dimensional data, while producing threats to the personal privacy. Differential privacy is a promising privacy-preserving definition for various applications and is enforced by injecting random noise into each query result such that the adversary with arbitrary background knowledge cannot infer sensitive input from the noisy results. Nevertheless, existing differentially private mechanisms have poor utility and high-computation complexity on high-dimensional data because the necessary noise in queries is proportional to the size of the data domain, which is exponential to the dimensionality. To address these issues, we develop a compressed sensing mechanism (CSM) that enforces differential privacy on the basis of the compressed sensing (CS) framework while providing accurate results to linear queries. We derive the utility guarantee of CSM theoretically. An extensive experimental evaluation on real-world data sets over multiple fields demonstrates that our proposed mechanism consistently outperforms several state-of-the-art mechanisms under differential privacy.
- Published
- 2020
16. Pulmonary Nodule Detection Based on ISODATA-Improved Faster RCNN and 3D-CNN with Focal Loss
- Author
-
Tao Wan, Baoyu Liang, Chao Tong, Arun Kumar Sangaiah, Mengze Zhang, Zhigao Zheng, Rongshan Chen, Xinyi Yang, and Chenyang Yue
- Subjects
medicine.diagnostic_test ,Artificial neural network ,Computer Networks and Communications ,Computer science ,business.industry ,Computed tomography ,Pattern recognition ,02 engineering and technology ,Convolutional neural network ,030218 nuclear medicine & medical imaging ,Multispectral pattern recognition ,Reduction (complexity) ,03 medical and health sciences ,Class imbalance ,0302 clinical medicine ,Hardware and Architecture ,Pulmonary cancer ,Pulmonary nodule ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,020201 artificial intelligence & image processing ,Artificial intelligence ,business - Abstract
The early diagnosis of pulmonary cancer can significantly improve the survival rate of patients, where pulmonary nodules detection in computed tomography images plays an important role. In this article, we propose a novel pulmonary nodule detection system based on convolutional neural networks (CNN). Our system consists of two stages, pulmonary nodule candidate detection and false positive reduction. For candidate detection, we introduce Iterative Self-Organizing Data Analysis Techniques Algorithm (ISODATA) to Faster Region-based Convolutional Neural Network (Faster R-CNN) model. For false positive reduction, a three-dimensional convolutional neural network (3D-CNN) is employed to completely utilize the three-dimensional nature of CT images. In this network, Focal Loss is used to solve the class imbalance problem in this task. Experiments were conducted on LUNA16 dataset. The results show the preferable performance of the proposed system and the effectiveness of using ISODATA and Focal loss in pulmonary nodule detection is proved.
- Published
- 2020
17. Reliable and Robust Unmanned Aerial Vehicle Wireless Video Transmission
- Author
-
Tao Wang, Xiao Xie, Yun Lin, Zhigao Zheng, and Shihong Yao
- Subjects
021103 operations research ,Pixel ,Computer science ,business.industry ,Frame (networking) ,Real-time computing ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,0211 other engineering and technologies ,Inter frame ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Video quality ,Transmission (telecommunications) ,Wireless ,Electrical and Electronic Engineering ,Safety, Risk, Reliability and Quality ,business ,Wireless sensor network ,Decoding methods - Abstract
The wireless video transmission environment of unmanned aerial vehicles (UAVs) is complex and unstable given the high mobility and changeable working conditions of UAVs, which lead to burst and consecutive errors and high error rates. A compressed video stream is extremely sensitive to transmission errors, such that even a single bit error sharply degrades the video quality. Hence, we propose an intraframe pixel-row-interleaved error concealment algorithm that interleaves pixel rows to generate high similarity in different parts of a frame, thereby achieving intraframe error resilience. Subsequently, we suggest an interframe time-field-interleaved alternative motion-compensated prediction that allows for automatic error elimination and recovers at least four consecutive frames in wireless video communications. The experiments demonstrate that the proposed algorithms recover frames with excellent subjective and objective effects. Moreover, these algorithms can provide reliable and robust video transmission for UAVs.
- Published
- 2019
18. Equivalent mechanism: Releasing location data with errors through differential privacy
- Author
-
Zhigao Zheng, Mohamed Elhoseny, and Tao Wang
- Subjects
Location data ,Computer Networks and Communications ,Mechanism (biology) ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Differential privacy ,020201 artificial intelligence & image processing ,computer ,Software - Abstract
Location-based services are raising remarkable convenience to our daily life while seriously threatening the location privacy of individuals. Differential privacy provides a promising privacy definition for location data. It is enforced by injecting random noise into each location such that the level of privacy and utility provided by this sanitization when querying an LBS is quantified and controlled. However, the primitive differential privacy overlooks data errors, which constantly exist in real-life location data, thereby potentially deviating a specified indistinguishability. Therefore, we determine the impact of data errors on the indistinguishability to address the abovementioned issue. Then, we design an equivalent mechanism to enforce differential privacy and analyze its privacy and utility. Extensive experimental evaluation on real-world datasets demonstrates that our proposed equivalent mechanism consistently outperforms several state-of-the-art mechanisms in data utility at the same privacy level.
- Published
- 2019
19. Experimental research on bubble size distribution and vapor quality at the outlet of vertical narrow channel
- Author
-
Zhigao Zheng, B. Hu, Leren Tao, Lihao Huang, and Wang Gang
- Subjects
Mass flux ,Pressure drop ,Nuclear and High Energy Physics ,Radiation ,Materials science ,Bubble ,Flow (psychology) ,02 engineering and technology ,Mechanics ,01 natural sciences ,010305 fluids & plasmas ,Physics::Fluid Dynamics ,020303 mechanical engineering & transports ,0203 mechanical engineering ,0103 physical sciences ,Heat transfer ,Vapor quality ,Two-phase flow ,Nucleate boiling - Abstract
The presence of bubbles exerts a strong influence on pressure drop, heat transfer, flow pattern, and many other flow characteristics. Due to the complexity of two-phase flow boiling, it is not easy to carry out experimental research. An experimental setup based on ultrasonic detection method is built up in this paper. The present study investigates bubble size distribution and vapor quality in liquid-gas two-phase flow in a vertical narrow channel with the cross section of 3×20 mm. Bubble size distribution is heavily affected by the heat power and mass flux, which means that different flow patterns show different bubble size distributions. Vapor quality is also obtained by the ultrasonic attenuation method, which is compared to the theoretical calculation. The ultrasonic detection model is mainly applied in the bubble-coalesced flow. As the vapor quality is small, the detection value is close to the theoretical value, and this detection model is suitable for nucleate boiling. As the vapor quality is increased, the deviation is larger. By comparison with the theoretical calculations, it is necessary to modify the ultrasonic detection model to fit different flow patterns, which is helpful to study the liquid entrainment mechanism in the micro-channel (especially when the inner diameter is less than 5 mm) in the future.
- Published
- 2019
20. Privacy Preservation in Big Data From the Communication Perspective—A Survey
- Author
-
Zheng Huo, Zhigao Zheng, Shihong Yao, Mubashir Husain Rehmani, and Tao Wang
- Subjects
Information privacy ,Data collection ,Cover (telecommunications) ,Computer science ,business.industry ,Perspective (graphical) ,Big data ,Internet privacy ,020206 networking & telecommunications ,02 engineering and technology ,Field (computer science) ,Information sensitivity ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,ComputingMilieux_COMPUTERSANDSOCIETY ,Differential privacy ,Electrical and Electronic Engineering ,business - Abstract
The advancement of data communication technologies promotes widespread data collection and transmission in various application domains, thereby expanding big data significantly. Sensitive information about individuals, which is typically evident or hidden in data, is prone to various privacy attacks and serious risks of privacy disclosure. Corresponding approaches to data privacy preservation have been proposed to provide mechanisms for preserving data privacy while pubilishing useful information or mining valuable information from sanitized data. In this work, we present a comprehensive survey of privacy preservation in big data from the communication perspective. Specifically, we cover the fundamental privacy-preserving framework and privacy-preserving technologies, particularly differential privacy. We also survey the adaptations and variants of differential privacy for different emerging applications and the challenges to differential privacy. In addition, we provide future research directions about privacy preservation in communication field.
- Published
- 2019
21. Experimental research on refrigerant condensation heat transfer and pressure drop characteristics in the horizontal microfin tubes
- Author
-
Lihao Huang, Cheng Tang, Jingde Jiang, Leren Tao, Jianhong Chen, Xingjiang Li, Zhigao Zheng, and Hong Tao
- Subjects
General Chemical Engineering ,Condensed Matter Physics ,Atomic and Molecular Physics, and Optics - Published
- 2022
22. Pulmonary Nodule Classification Based on Heterogeneous Features Learning
- Author
-
Zhigao Zheng, Ali Kashif Bashir, Mengbo Yu, Qiang Su, Jiexuan Hu, Baoyu Liang, and Chao Tong
- Subjects
Multiple kernel learning ,medicine.diagnostic_test ,Computer Networks and Communications ,business.industry ,Computer science ,Feature extraction ,Cancer ,020206 networking & telecommunications ,Pattern recognition ,Computed tomography ,02 engineering and technology ,medicine.disease ,Convolutional neural network ,Support vector machine ,Kernel (image processing) ,Feature (computer vision) ,Pulmonary cancer ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,Artificial intelligence ,Electrical and Electronic Engineering ,business - Abstract
IEEE Pulmonary cancer is one of the most dangerous cancers with a high incidence and mortality. An early accurate diagnosis and treatment of pulmonary cancer can observably increase the survival rates, where computer-aided diagnosis systems can largely improve the efficiency of radiologists. In this paper, we propose a deep automated lung nodule diagnosis system based on three-dimensional convolutional neural network (3D-CNN) and support vector machine (SVM) with multiple kernel learning (MKL) algorithms. The system not only explores the computed tomography (CT) scans, but also the clinical information of patients like age, smoking history and cancer history. To extract deeper image features, a 34-layers 3D Residual Network (3D-ResNet) is employed. Heterogeneous features including the extracted image features and the clinical data are learned with MKL. The experimental results prove the effectiveness of the proposed image feature extractor and the combination of heterogeneous features in the task of lung nodule diagnosis.
- Published
- 2020
23. Sparsity estimation matching pursuit algorithm based on restricted isometry property for signal reconstruction
- Author
-
Shihong Yao, Arun Kumar Sangaiah, Zhigao Zheng, and Tao Wang
- Subjects
Computer Networks and Communications ,business.industry ,Signal reconstruction ,Computer science ,Stability (learning theory) ,020206 networking & telecommunications ,Pattern recognition ,02 engineering and technology ,Matching pursuit ,Signal ,Restricted isometry property ,Compressed sensing ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,Greedy algorithm ,business ,Software ,Selection (genetic algorithm) - Abstract
Achievement of good reconstruction performance by most of existing greedy algorithms is possible only when signal sparsity has been known well in advance. However, it is difficult in practice to ensure signal sparsity making the reconstruction performance of the greedy algorithms stable. Moreover, some greedy algorithms with previous unknown signal sparsity are time-consuming in the process of adaptive adjustment of signal sparsity, and thereby making the reconstruction time too long. To address these concerns, the greedy algorithm from signal sparsity estimation proposed in this paper. Based on the restricted isometry property criterion, signal sparsity is estimated before atoms selection and the step size of atoms selection adjusted adaptively based on the relations between of the signal residuals in each iteration. The research which solves the problem of sparsity estimation in the greedy algorithm provides the compressed sensing available to the applications where the signal sparsity is un-known. It has important academic and practical values. Experimental results demonstrate the superiority of the performance of proposed algorithm to the greedy algorithms with previous unknown signal sparsity, no matter on the performance stability and reconstruction precision.
- Published
- 2018
24. A novel deep learning method for aircraft landing speed prediction based on cloud-based sensor data
- Author
-
Xiang Yin, Zhigao Zheng, Chao Tong, and Shili Wang
- Subjects
Computer Networks and Communications ,business.industry ,Aviation ,Computer science ,Deep learning ,Real-time computing ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Air traffic control ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Software - Abstract
The combination of artificial intelligence methods and IoT based sensor data will play a critical and crucial role in various environments. Flight landing safety is a research hotspot of aviation field for a long time. Accurately predicting the landing speed is conducive to reducing the landing accidents. In this paper, we proposed an accurate aircraft landing speed prediction model based on the long-short term memory (LSTM) with flight sensor data. Firstly, we analyze and pre-process the dataset with statistical method including randomness tests and stationary tests. Secondly, we design the features by random forest algorithm and reduce the dimensionality of features with principal component analysis. Thirdly, we develop a deep architecture based on long-short term memory to predict the aircraft landing speed. Experiment results prove that it has better performance with higher prediction accuracy compared with the state of the art, indicating that the proposed model is accurate and effective. The findings are expected to be applied into flight operation practice for further preventing of landing accidents and improving the air management for air traffic controllers.
- Published
- 2018
25. Guided dynamic particle swarm optimization for optimizing digital image watermarking in industry applications
- Author
-
Krishn Kumar Mishra, Nitin Saxena, Zhigao Zheng, and Arun Kumar Sangaiah
- Subjects
Digital image watermarking ,Computer Networks and Communications ,Computer science ,Particle swarm optimization ,020206 networking & telecommunications ,Watermark ,02 engineering and technology ,computer.software_genre ,Hardware and Architecture ,Robustness (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Data mining ,computer ,Software ,Premature convergence - Abstract
Particle Swarm Optimization (PSO) algorithms often face premature convergence problem, specially in multimodal problems as it may get stuck in specific point. In this paper, we have enhanced Dynamic-PSO i.e. and an extention of our earlier research work. This newly proposed algorithm Guided Dynamic-PSO (GDPSO) also targets the particles whose personal best get stuck i.e. their personal best does not improve for fixed number of iterations similar to DPSO, however a new approach is proposed for replacing personal bests of such particles. The replacement of this new personal best is done on the basis of sharing fitness so that better diversity can be provided to avoid the problem. The performance of GDPSO has been compared with PSO and its variants including DPSO over 24 benchmark functions provided by Black-Box Optimization Benchmarking (BBOB 2015). Results show that the performance of GDPSO is better in comparison with other peer algorithms. Further effectiveness of GDPSO is demonstrated in digital image watermarking. Digital image watermarking schemes primarily focus on providing good tradeoff between imperceptibility and robustness along with reliability in watermarked images produced for wide variety of applications. To support watermarking scheme in achieving this tradeoff, suitable watermark strength is identified in the form of scaling factor using GDPSO for colored images. Results achieved through GDPSO are compared with PSO and other widely accepted variants of PSO over different combination of host and watermark images. Experiment results demonstrate that performance of underline watermarking scheme when used with GDPSO, in terms of imperceptibility and robustness, is better than other variants of PSO.
- Published
- 2018
26. The optimization for recurring queries in big data analysis system with MapReduce
- Author
-
Bin Zhang, Zhigao Zheng, and Xiaoyang Wang
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Computation ,Big data ,02 engineering and technology ,Reuse ,computer.software_genre ,Scheduling (computing) ,Hardware and Architecture ,020204 information systems ,Computer cluster ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Data mining ,business ,computer ,Software - Abstract
As data-intensive cluster computing systems like MapReduce grow in popularity, there is a strong need to promote the efficiency. Recurring queries, repeatedly being executed for long periods of time on rapidly evolving data-intensive workloads, have become a bedrock component in big data analytic applications. Consequently, this paper presents optimization strategies for recurring queries for big data analysis. Firstly, it analyzes the impact of recurring queries efficiency by MapReduce recurring queries model. Secondly, it proposes the MapReduce consistent window slice algorithm, which can not only create more opportunities for reuse of recurring queries, but also greatly reduce redundant data while loading input data by the fine-grained scheduling. Thirdly, in terms of data scheduling, it designs the MapReduce late scheduling strategy that improve data processing and optimize computation resource scheduling in MapReduce cluster. Finally, it constructs the efficient data reuse execution plans by MapReduce recurring queries reuse strategy. The experimental results on a variety of workloads show that the algorithms outperform the state-of-the-art approaches.
- Published
- 2018
27. An efficient joint compression and sparsity estimation matching pursuit algorithm for artificial intelligence application
- Author
-
Zhigao Zheng, Qingfeng Guan, Tao Wang, and Shihong Yao
- Subjects
Computer Networks and Communications ,Computer science ,Signal reconstruction ,020206 networking & telecommunications ,020207 software engineering ,02 engineering and technology ,Signal ,Matching pursuit ,Matrix (mathematics) ,Variable (computer science) ,Hardware and Architecture ,Compression (functional analysis) ,0202 electrical engineering, electronic engineering, information engineering ,Algorithm ,Software - Abstract
Measurement matrix and signal reconstruction algorithm are the key factors influencing the performance of signal reconstruction. However, the reconstruction performance of the existing matching pursuit algorithms, the most popular reconstruction algorithms, is closely related to the signal sparsity, which is hard to determinate apriori. As well, the researches on the reconstruction algorithms are developed independently with the design of measurement matrix. So, in this paper, we originally conduct a joint study of design of measurement matrix and signal reconstruction algorithm. RIP criterion is used to quantitatively analyze the relationship between the signal sparsity and the measurement matrix, and then an efficient joint compression and sparsity estimation matching pursuit (JCSEMP) algorithm is proposed. JCSEMP algorithm constructs a chaotic measurement matrix, a sparsity estimation algorithm based on the chaotic measurement matrix, and a variable atom selection criterion which use the variation between the residuals to adaptively adjust the number of atoms to select. Experimental results demonstrate that this algorithm can provide a better reconstruction performance and a lower reconstruction period.
- Published
- 2018
28. Towards an improved heuristic genetic algorithm for static content delivery in cloud storage
- Author
-
Zunxin Zheng and Zhigao Zheng
- Subjects
020203 distributed computing ,General Computer Science ,business.industry ,Computer science ,Distributed computing ,020206 networking & telecommunications ,Cloud computing ,Content delivery network ,02 engineering and technology ,Load balancing (computing) ,Network topology ,Control and Systems Engineering ,Server ,CloudSim ,0202 electrical engineering, electronic engineering, information engineering ,Cache ,Electrical and Electronic Engineering ,business ,Cloud storage - Abstract
A key challenge in computer networking is how to organize network topology effectively among a large number of servers in the cloud storage system. In a cloud environment, the topology, which is different from the underlying topology, may be established in any form at any potential edge peers. The cloud content delivery network (CDN) always faces problems of complex distributed path creation, cache update, load balancing, etc. To address the problem as a static content delivery, we propose an Improved Heuristic Genetic Algorithm for Static Content Delivery in Cloud Storage (IHGA-SCDCS) based on a resource management model and cost model. The static content delivery in cloud storage is abstracted into mathematical model for set solving problem, which is then solved by an improved Genetic Algorithm (GA). Finally, the optimal solution is reduced to an optimal content delivery program. The simulation experiment, based on CloudSim, shows that IHGA-SCDCS can effectively obtain optimal solution while reducing delivery cost.
- Published
- 2018
29. Deep detection network for real-life traffic sign in vehicular networks
- Author
-
Zhigao Zheng, Chao Tong, Xiang Long, Tingting Yang, and Arun Kumar Sangaiah
- Subjects
Vehicular ad hoc network ,Computer Networks and Communications ,Computer science ,business.industry ,Deep learning ,020206 networking & telecommunications ,Pattern recognition ,02 engineering and technology ,Object detection ,Softmax function ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Traffic sign ,Classifier (UML) - Abstract
The challenge for real-life traffic sign detection lies in recognizing small targets in a large and complex background, making state-of-the-art general object detection methods not work well in both detection speed and precision. The existing deep learning models for traffic signs detection fail to use the fixed feature of the targets. This paper proposes a novel end-to-end deep network that extracts region proposals by a two-stages adjusting strategy. Firstly, we introduce an AN (Attention Network) to Faster-RCNN for finding all potential RoIs (Regions of Interest) and roughly classifying them into three categories according to colour feature of the traffic signs. Then the FRPN (Fine Region Proposal Network) produces the final region proposals from a set of anchors per feature map location extracted by the AN. We also modify the model by (1) adding a deconvolutional structure to convolutional layers to fit the small size of targets, and (2) replacing the classifier with three softmax corresponding to three coarse categories obtained by the AN. Our method is evaluated on two publicly available traffic sign benchmarks which are collected in real road condition. The experiments show our method generates only 1/14 of the anchors generated by Faster-R-CNN so the detection speed is increased by about 2 fps with ZF-Net and it reaches an average mAP of 80.31% and 94.95% in two benchmarks, 9.69% and 7.88% higher than Faster-R-CNN with VGG16, respectively.
- Published
- 2018
30. Using hardware counter-based performance model to diagnose scaling issues of HPC applications
- Author
-
Baoquan Zhang, Zhenya Song, Shiming Xu, Zhigao Zheng, Jingmei Li, and Nan Ding
- Subjects
Profiling (computer programming) ,0209 industrial biotechnology ,Computer science ,Degree of parallelism ,02 engineering and technology ,020901 industrial engineering & automation ,Computer engineering ,Artificial Intelligence ,0202 electrical engineering, electronic engineering, information engineering ,Computational Science and Engineering ,020201 artificial intelligence & image processing ,Performance model ,Scaling ,Software - Abstract
Performance diagnosing for HPC applications can be extremely difficult due to their complicated performance behaviors. One hand, developers used to identify the potential performance bottlenecks by conducting detailed instrumentation, which may introduce significant performance overheads or even performance deviations. On the other hand, developers can only conduct small numbers of application runs for profiling the performance with the limitations on both computing resources and time duration. Meanwhile, the performance bottlenecks of HPC applications may vary with the degree of parallelism. To address these challenges, our paper proposes a systematic performance diagnosing method focusing on building an accurate and interpretable performance model with performance counters. Our method is able to diagnose the HPC application scaling issues by predicting its runtime and performance behaviors in different functions. After applying this modeling method on three real-world HPC applications, HOMME, CICE and OpenFoam, our evaluations show that our diagnosing method based on the performance model has the ability to diagnose the potential scaling issues, which is typically missed by the traditional performance diagnosing method and achieves about 10% prediction errors in a scale of 4096 MPI ranks on two problem sizes.
- Published
- 2018
31. An experimental case study on the relationship between workload and resource consumption in a commercial web server
- Author
-
Ping Guo, Bin Cheng, Zhigao Zheng, and Yongquan Yan
- Subjects
Web server ,021103 operations research ,General Computer Science ,Artificial neural network ,Computer science ,0211 other engineering and technologies ,Decision tree ,Workload ,02 engineering and technology ,computer.software_genre ,Theoretical Computer Science ,Resource (project management) ,020204 information systems ,Modeling and Simulation ,0202 electrical engineering, electronic engineering, information engineering ,Feature (machine learning) ,Software aging ,Data mining ,Sensitivity (control systems) ,computer ,Simulation - Abstract
Since software aging has been proposed for decades, resource consumption parameters and performance parameters have been used to identify whether running a commercial web server has been in aging state or failure state. However, the relationship between workload parameters and resource consumption parameters has not been analyzed and also sensitivity between resource consumption parameters and workload parameters has not been studied before. In this work, we give an experimental case study about resource consumption parameters and workload parameters in an Internet Information Services. Firstly, we use fitted resource consumption parameter to learn the relationship between workload parameters and resource consumption parameters through visual observation and calculation. Secondly, sensitivity analysis is used to find how resource consumption parameter changes when deleting one workload parameter at a time. Thirdly, the regression tree based on a risk estimate is used to forecast resource consumption. In the experiments, we see that almost all the parameters present nonlinear feature through visual observation. And we find that some workload parameters are redundant for fitting resource parameters by using sensitivity analysis. Our proposed regression tree is better than artificial neural network by using mean absolute error.
- Published
- 2018
32. Gesture Recognition Based on Kinect and sEMG Signal Fusion
- Author
-
Guozhang Jiang, Gongfa Li, Du Jiang, Ying Sun, Zhigao Zheng, Cuiqiao Li, Wanneng Shu, and Honghai Liu
- Subjects
Data processing ,Computer Networks and Communications ,Computer science ,business.industry ,Signal fusion ,020207 software engineering ,Pattern recognition ,02 engineering and technology ,Signal ,Hardware and Architecture ,Gesture recognition ,0202 electrical engineering, electronic engineering, information engineering ,Fuse (electrical) ,Decision fusion ,020201 artificial intelligence & image processing ,Artificial intelligence ,Experimental methods ,business ,Computer communication networks ,Software ,Information Systems - Abstract
A weighted fusion method of D-S evidence theory in decision making is proposed to aim at the problem of lacking in the distribution of trust, data processing and precision in D-S evidential theory. The method of gesture recognition based on Kinect and sEMG signal are established. Weighted D-S evidence theory is used to fuse Kinect and sEMG signals and the simulation experiment is made respectively. The stimulation results show that comparing with other experimental methods, the decision fusion method based on weighted D-S evidence theory has higher utilization efficiency and recognition rate.
- Published
- 2018
33. Graph Processing on GPUs
- Author
-
Yongluan Zhou, Qiang-Sheng Hua, Ligang He, Zhigao Zheng, Hai Jin, Bo Liu, and Xuanhua Shi
- Subjects
parallelism ,Theoretical computer science ,General Computer Science ,BSP model ,business.industry ,Computer science ,Big data ,GPU ,Degree of parallelism ,Graph processing ,020207 software engineering ,Workload ,Graph theory ,02 engineering and technology ,Graph ,graph datasets ,Theoretical Computer Science ,High memory ,CUDA ,GAS model ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,General-purpose computing on graphics processing units ,business - Abstract
In the big data era, much real-world data can be naturally represented as graphs. Consequently, many application domains can be modeled as graph processing. Graph processing, especially the processing of the large-scale graphs with the number of vertices and edges in the order of billions or even hundreds of billions, has attracted much attention in both industry and academia. It still remains a great challenge to process such large-scale graphs. Researchers have been seeking for new possible solutions. Because of the massive degree of parallelism and the high memory access bandwidth in GPU, utilizing GPU to accelerate graph processing proves to be a promising solution. This article surveys the key issues of graph processing on GPUs, including data layout, memory access pattern, workload mapping, and specific GPU programming. In this article, we summarize the state-of-the-art research on GPU-based graph processing, analyze the existing challenges in detail, and explore the research opportunities for the future.
- Published
- 2018
34. Adaptive Communication Protocols in Flying Ad Hoc Network
- Author
-
Tao Wang, Zhigao Zheng, and Arun Kumar Sangaiah
- Subjects
Routing protocol ,Router ,Directional antenna ,Computer Networks and Communications ,business.industry ,Computer science ,Wireless ad hoc network ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,02 engineering and technology ,Computer Science Applications ,0202 electrical engineering, electronic engineering, information engineering ,Reinforcement learning ,Wireless ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,Routing (electronic design automation) ,business ,Communications protocol ,Computer network - Abstract
The flying ad hoc network (FANET) is a new paradigm of wireless communication that governs the autonomous movement of UAVs and supports UAV-to-UAV communication. A FANET can provide an effective real-time communication solution for the multiple UAV systems considering each flying UAV as a router. However, existing mobile ad hoc protocols cannot meet the needs of FANETs due to high-speed mobility and frequent topology change. In addition, the complicated flight environment and varied flight tasks lead to the traditional built-in-rules protocols no longer meeting the demands of autonomy. Hence, we have proposed adaptive hybrid communication protocols including a novel position-prediction-based directional MAC protocol (PPMAC) and a self-learning routing protocol based on reinforcement learning (RLSRP). The performance results show that the proposed PPMAC overcomes the directional deafness problem with directional antennas, and RLSRP provides an automatically evolving and more effective routing scheme. Our proposed hybrid adaptive communication protocols have the potential to provide an intelligent and highly autonomous communication solution for FANETs, and indicate the main research orientation of FANET protocols.
- Published
- 2018
35. The individual identification method of wireless device based on dimensionality reduction and machine learning
- Author
-
Yun Lin, Zhigao Zheng, Zheng Dou, Ruolin Zhou, and Xiaolei Zhu
- Subjects
Authentication ,Artificial neural network ,Computer science ,business.industry ,Dimensionality reduction ,020302 automobile design & engineering ,02 engineering and technology ,Intrusion detection system ,Fingerprint recognition ,Machine learning ,computer.software_genre ,030218 nuclear medicine & medical imaging ,Theoretical Computer Science ,Support vector machine ,03 medical and health sciences ,Identification (information) ,0302 clinical medicine ,0203 mechanical engineering ,Hardware and Architecture ,Wireless ,Artificial intelligence ,business ,computer ,Software ,Information Systems - Abstract
The access security of wireless devices is a serious challenge in present wireless network security. Radio frequency (RF) fingerprint recognition technology as an important non-password authentication technology attracts more and more attention, because of its full use of radio frequency characteristics that cannot be imitated to achieve certification. In this paper, a RF fingerprint identification method based on dimensional reduction and machine learning is proposed as a component of intrusion detection for resolving authentication security issues. We compare three kinds of dimensional reduction methods, which are the traditional PCA, RPCA and KPCA. And we take random forests, support vector machine, artificial neural network and grey correlation analysis into consideration to make decisions on the dimensional reduction data. Finally, we obtain the recognition system with the best performance. Using a combination of RPCA and random forests, we achieve 90% classification accuracy is achieved at SNR $$\ge $$ 10 dB when reduced dimension is 76. The proposed method improves wireless device authentication and improves security protection due to the introduction of RF fingerprinting.
- Published
- 2017
36. Online multi-person tracking assist by high-performance detection
- Author
-
Dejun Mu, Dawei Guo, Weixin Hua, and Zhigao Zheng
- Subjects
020203 distributed computing ,Foreground detection ,Pixel ,business.industry ,Computer science ,Frame (networking) ,02 engineering and technology ,Sparse approximation ,Tracking (particle physics) ,Theoretical Computer Science ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Computer vision ,Segmentation ,Artificial intelligence ,business ,Focus (optics) ,Software ,Information Systems - Abstract
Detection plays an important role in improving the performance of multi-object tracking (MOT), but most recently MOT works mainly focus on association algorithm and usually ignore the detections. To assist in associating object detections and to overcome detection failures, in this paper, we explore the low-rank-based foreground detection method to refine the detections and show it can significantly lead a better tracking result in online multi-object tracking. Firstly, the low-level pixel information from low-rank foreground segmentation and high-level detection responses from object detector are combined to form an overcomplete detections set, which serves as input for the tracking-by-detection-based multi-object tracking. Then, the predicted object location in online tracking as a prior to feedback for the foreground segmentation in sparse approximation for future frames can improve the foreground detection performance. Finally, to effectively solve the data association problem in online MOT, two-step data association relies on tracklet confidence is used to associate the detections and generate long trajectories since the existing trajectories provide a reliable history to support their presence in current frame. The experimental results in public pedestrian tracking datasets show that our detection optimization strategy can help to improve the tracking performance compared with several state-of-the-art multi-object trackers, with improved recall, precision, FP, FN and MOTA, MOTP results.
- Published
- 2017
37. A Survey on software-defined networking in vehicular ad hoc networks: Challenges, applications and use cases
- Author
-
Zhigao Zheng, Sandeep Harit, Manisha Chahal, Arun Kumar Sangaiah, and Krishn Kumar Mishra
- Subjects
OpenFlow ,Engineering ,Renewable Energy, Sustainability and the Environment ,Wireless network ,Wireless ad hoc network ,business.industry ,Geography, Planning and Development ,020206 networking & telecommunications ,Transportation ,Context (language use) ,02 engineering and technology ,Network management ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,020201 artificial intelligence & image processing ,Use case ,Software-defined networking ,business ,Telecommunications ,Civil and Structural Engineering - Abstract
As the concept of smart cities is evolving, the need for automation and effective delivery of services is essential. Over the last few decades, need for safety and security of travelers on the road has been a major concern. Vehicular Ad Hoc Networks (VANETs) can play an influential role in recognizing and implementing such concept, by supporting safety, comfort and infotainment services. However, the complex and inflexible architecture of VANETs faced a set of challenges such as high mobility, intermittent connectivity, heterogeneity of applications. In this context, Software-defined networking (SDN) has emerged as a programmable and flexible network, which has recently gained attention from research communities, businesses, and industries, in both wired network management and heterogeneous wireless communication. This paper aims at examining and classifying a number of related SDN- based research works on wireless networks specially VANETs. Firstly, a brief on the requirements of SDN over traditional networking is provided, followed by an elaboration on basic architecture and its layers. Thereafter, SDN applications in various wireless network areas such as mobile network and VANETs are described along with a focus on analyzing and comparing the current SDN-related research on different parameters. Furthermore, the paper presents a review of current research initiatives to solve challenges of vehicular environment. The impact of SDN paradigm along with implementation issues in vehicular communication and explore likely use cases based on SDN paradigm.
- Published
- 2017
38. Providing security and privacy to huge and vulnerable songs repository using visual cryptography
- Author
-
Zhigao Zheng, Krishn Kumar Mishra, Arun Kumar Sangaiah, Shailendra Tiwari, and Shivendra Shivani
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Internet privacy ,Big data ,Codebook ,Copyright infringement ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,020206 networking & telecommunications ,Access control ,02 engineering and technology ,Computer security ,computer.software_genre ,Visual cryptography ,Upload ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,020201 artificial intelligence & image processing ,Confidentiality ,The Internet ,business ,computer ,Software - Abstract
In the today’s scenario, the number of online song repositories such as iTunes, Hungama.com , etc. is increasing day-by-day. The reason for this can be attributed to the exponential growth in the Internet users in the past few years. These song repositories store huge number of songs (mostly in millions) and charge their users for listening and downloading them. With increased number of users requires more enhanced security measures to protect such vulnerable songs repository. Any breach in security of such song repositories would not only cause huge financial loss but also copyright infringement for the owners. Therefore, in this paper we have presented a novel and efficient approach for providing security and privacy to huge and vulnerable songs repository using visual cryptography. Presented approach not only provides confidentiality to the songs but also provides integrity verification with access control to the songs repository. We have also removed various basic security constraints of (2, 2) visual cryptography existed in most of the state of art approaches like meaningless pattern of the shares, explicit codebook requirement, contrast loss, lossy recovery etc which are eliminated in the proposed approach.
- Published
- 2017
39. Research on tridiagonal matrix solver design based on a combination of processors
- Author
-
Qiao Tian, Guoyin Zhang, Yuanyuan Pan, Fangyuan Zheng, Zhigao Zheng, and Jingmei Li
- Subjects
020203 distributed computing ,General Computer Science ,Tridiagonal matrix ,Computer science ,Graphics processing unit ,020207 software engineering ,02 engineering and technology ,Parallel computing ,Solver ,Computer Science::Numerical Analysis ,Computational science ,Matrix (mathematics) ,Control and Systems Engineering ,SPIKE algorithm ,0202 electrical engineering, electronic engineering, information engineering ,Central processing unit ,Electrical and Electronic Engineering ,Numerical stability ,Diagonally dominant matrix - Abstract
Large-scale tridiagonal matrix solvers based on heterogeneous systems currently cannot balance computational efficiency and numerical stability when solving a non-diagonally dominant matrix. A tridiagonal solver combined central processing unit with graphics processing unit is proposed, based on SPIKE2 as a solver framework, a simplified SPIKE algorithm as a central processing unit component, and a diagonal pivot algorithm as a graphics processing unit component. The solver performance is further improved by using a data-layout-transformation mechanism to obtain continuous addresses, reducing memory communication using constant memory to store unchanged data in the calculation process, and employing a kernel-fusion mechanism to reduce power consumption of graphics processing unit. For a diagonally dominant matrix, extended Thomas algorithms and cycle reduction to replace the graphics processing unit component are proposed in the solver. Experimental results show that the tridiagonal matrix solver in this paper can effectively consider both numerical stability and computational efficiency, and reduce total power consumption while improving memory efficiency.
- Published
- 2017
40. An ultrasensitive aptasensor for Ochratoxin A using hexagonal core/shell upconversion nanoparticles as luminophores
- Author
-
Nuo Duan, Shijia Wu, Jian Chen, Zhigao Zheng, Zhouping Wang, and Dai Shaoliang
- Subjects
Models, Molecular ,Ochratoxin A ,Materials science ,Aptamer ,Biomedical Engineering ,Biophysics ,Stacking ,Nanotechnology ,Biosensing Techniques ,02 engineering and technology ,010402 general chemistry ,01 natural sciences ,law.invention ,Fluorides ,chemistry.chemical_compound ,Limit of Detection ,law ,Electrochemistry ,Yttrium ,Detection limit ,Luminescent Agents ,Quenching (fluorescence) ,Graphene ,Beer ,General Medicine ,Aptamers, Nucleotide ,021001 nanoscience & nanotechnology ,Ochratoxins ,Acceptor ,0104 chemical sciences ,chemistry ,Luminescent Measurements ,Nanoparticles ,0210 nano-technology ,Luminescence ,Erbium ,Biotechnology - Abstract
We developed an ultrasensitive luminescence resonance energy transfer (LRET) aptasensor for Ochratoxin A (OTA) detection, using core/shell upconversion nanoparticles (CS-UCNPs) as luminophores. The OTA aptamer was tagged to CS-UCNPs as energy donor and graphene oxide (GO) acted as energy acceptor. The π-π stacking interaction between the aptamer and GO brought CS-UCNPs and GO in close proximity hence initiated the LRET process resulting in quenching of CS-UCNPs luminescence. A linear calibration was obtained between the luminescence intensity and the logarithm of OTA concentration in the range from 0.001 ng mL −1 to 250 ng mL −1 , with a detection limit of 0.001 ng mL −1 . The aptasensor showed good specificity towards OTA in beer samples. The ultrahigh sensitivity and pronounced robustness in beer sample matrix suggested promising prospect of the aptasensor inpractical applications.
- Published
- 2017
41. Towards a resource migration method in cloud computing based on node failure rule
- Author
-
Zhigao Zheng, Jinming Wen, Shenli Sun, Ping Wang, Hao Zhang, and Tao Huang
- Subjects
Statistics and Probability ,business.industry ,Computer science ,Distributed computing ,Node (networking) ,General Engineering ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Resource (project management) ,Artificial Intelligence ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Computer network - Published
- 2016
42. KDE based outlier detection on distributed data streams in multimedia network
- Author
-
Jiangbo Shu, Zhigao Zheng, Hwa-Young Jeong, and Tao Huang
- Subjects
Data stream ,Computer Networks and Communications ,business.industry ,Computer science ,Data stream mining ,Node (networking) ,Kernel density estimation ,Real-time computing ,020207 software engineering ,Cloud computing ,02 engineering and technology ,computer.software_genre ,Hardware and Architecture ,Sliding window protocol ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,020201 artificial intelligence & image processing ,Anomaly detection ,Data mining ,business ,computer ,Software - Abstract
Multimedia networks hold the promise of facilitating large-scale, real-time data processing in complex environments. Their foreseeable applications will help protect and monitor military, environmental, safety-critical, or domestic infrastructures and resources. Cloud infrastructures promise to provide high performance and cost effective solutions to large scale data processing problems. This paper focused on the outlier detection over distributed data stream in real time, proposed kernel density estimation (KDE) based outlier detection algorithm KDEDisStrOut in Storm, firstly formalized the problem of outlier detection using the kernel density estimation technique and update the transported data incrementally between the child node and the coordinator node which reduces the communication cost. Then the paper adopted the exponential decay policy to keep pace with the transient and evolving natures of stream data and changed the weight of different data in the sliding window adaptively made the data analysis more reasonable. Theoretical analysis and experiments on Storm with synthetic and real data show that the KDEDisStrOut algorithm is efficient and effective compared with existing outlier detection algorithms, and more suitable for data streams.
- Published
- 2016
43. Video segmentation algorithm based on superpixel link weight model
- Author
-
Zhigao Zheng, Shu-xia Pan, and Wang-jie Sun
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Segmentation-based object categorization ,Frame (networking) ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Scale-space segmentation ,020206 networking & telecommunications ,Pattern recognition ,02 engineering and technology ,Link weight ,Motion (physics) ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,020201 artificial intelligence & image processing ,Segmentation ,Relevance (information retrieval) ,Computer vision ,Artificial intelligence ,business ,Algorithm ,Software - Abstract
Based on the traditional segmentation algorithms, this paper proposes unsupervised video segmentation approach. The proposed algorithm applies superpixel to indicate the movement foreground and uses the static features of current frame and the relevant features of adjacent frames to compute the weight. It also brings in the mechanism of superpixel color features match restriction and motion relevance match restriction. The experiment result shows this algorithm can achieve the segmentation of video pictures and effectively solve the problem of over-segmentation.
- Published
- 2016
44. Assessment of lively street network based on geographic information system and space syntax
- Author
-
Xin Li, Shidan Cheng, Chen Zhong, Zhigao Zheng, Zhihan Lv, and Ihab Hijazi
- Subjects
Sustainable development ,Structure (mathematical logic) ,Architectural engineering ,Geographic information system ,Operations research ,Computer Networks and Communications ,Computer science ,business.industry ,020207 software engineering ,Context (language use) ,02 engineering and technology ,Hardware and Architecture ,Visibility graph analysis ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,020201 artificial intelligence & image processing ,business ,Software ,Space syntax ,Street network - Abstract
Axial and visibility graph analysis models are combined with GIS and Space Syntax to study the corresponding relationship between street network and specific city life in Hankou, China, based on three scales - city, district, and community, so as to interpret the hidden structure out of complex urban form through the spatial logic of street network. In this paper, a quantitative analysis is made on selected parameters in Space Syntax, including Integration, Choice, density of road, and Ht index. The result indicates that there is certain correlation among these parameters. Moreover, these parameters also present certain changing patterns along with the increase of analysis radius. The results reveal that the street network of Hankou presents a multi-hierarchical structure and spatial wholeness from all these three scales. This characteristic creates vitality and diversity while maintaining the feature of wholeness for the urban space. Research has turned out that community-scale street network performs a positive role to keep neighborhoods alive. Therefore, it is an important strategy for maintaining the vitality of urban space and realizing coordination and unification between parts and the whole. It is proposed in this paper that a good street network is a key factor for carrying forward urban context of Hankou. Undoubtedly, it is worthy of reflecting on large-scale demolition of existing urban space, especially in historical areas. Afterwards, the paper proposes a hierarchically synergetic planning strategy based on the analysis. More attention should be paid to street network to preserve diversity, continuity, and integrity, and finally archive holistically sustainable development within a city.
- Published
- 2015
45. Introduction to the Special Section on Heterogeneous Computing Era
- Author
-
Jinming Wen, Zhigao Zheng, and Shuai Liu
- Subjects
General Computer Science ,Control and Systems Engineering ,Computer science ,Distributed computing ,0202 electrical engineering, electronic engineering, information engineering ,Special section ,Symmetric multiprocessor system ,02 engineering and technology ,Electrical and Electronic Engineering ,020202 computer hardware & architecture - Published
- 2017
46. Editorial: Multimedia in Technology Enhanced Learning
- Author
-
Jinming Wen, Shuai Liu, and Zhigao Zheng
- Subjects
Multimedia ,Computer Networks and Communications ,Hardware and Architecture ,Computer science ,computer.software_genre ,Computer communication networks ,computer ,Software ,Information Systems - Published
- 2016
47. A Deep Automated Skeletal Bone Age Assessment Model with Heterogeneous Features Learning
- Author
-
Baoyu Liang, Jun Li, Zhigao Zheng, and Chao Tong
- Subjects
Male ,Support Vector Machine ,Adolescent ,Computer science ,Medicine (miscellaneous) ,Health Informatics ,Image processing ,02 engineering and technology ,Convolutional neural network ,030218 nuclear medicine & medical imaging ,03 medical and health sciences ,Sex Factors ,0302 clinical medicine ,Health Information Management ,Age Determination by Skeleton ,Image Processing, Computer-Assisted ,0202 electrical engineering, electronic engineering, information engineering ,Humans ,Child ,Multiple kernel learning ,Contextual image classification ,business.industry ,Deep learning ,Racial Groups ,Age Factors ,Infant, Newborn ,Process (computing) ,Infant ,020207 software engineering ,Bone age ,Pattern recognition ,Wrist ,Hand ,Support vector machine ,Child, Preschool ,Female ,Neural Networks, Computer ,Artificial intelligence ,business ,Algorithms ,Information Systems - Abstract
Skeletal bone age assessment is a widely used standard procedure in both disease detection and growth prediction for children in endocrinology. Conventional manual assessment methods mainly rely on personal experience in observing X-ray images of left hand and wrist to calculate bone age, which show some intrinsic limitations from low efficiency to unstable accuracy. To address these problems, some automated methods based on image processing or machine learning have been proposed, while their performances are not satisfying enough yet in assessment accuracy. Motivated by the remarkable success of deep learning (DL) techniques in the fields of image classification and speech recognition, we develop a deep automated skeletal bone age assessment model based on convolutional neural networks (CNNs) and support vector regression (SVR) using multiple kernel learning (MKL) algorithm to process heterogeneous features in this paper. This deep framework has been constructed, not only exploring the X-ray images of hand and twist but also some other heterogeneous information like race and gender. The experiment results prove its better performance with higher bone age assessment accuracy on two different data sets compared with the state of the art, indicating that the fused heterogeneous features provide a better description of the degree of bones' maturation.
- Published
- 2018
48. Bi-Level Optimization Model for Greener Transportation by Vehicular Networks
- Author
-
Kun Liu, Jianqing Li, Zhigao Zheng, and Wenting Li
- Subjects
050210 logistics & transportation ,Vehicular ad hoc network ,Computer Networks and Communications ,Computer science ,business.industry ,05 social sciences ,020302 automobile design & engineering ,Throughput ,02 engineering and technology ,Automotive engineering ,Reduction (complexity) ,Acceleration ,Traffic signal ,0203 mechanical engineering ,Hardware and Architecture ,0502 economics and business ,Fuel efficiency ,Wireless ,business ,Software ,Energy (signal processing) ,Information Systems - Abstract
In general, dynamic traffic signal control or smooth driving benefits energy saving and CO2 emissions. However, most of studies in the past lack the integrated optimization of traffic signals control and instantaneous vehicle motion states simultaneously on energy saving and CO2 emission reduction. In this paper, a bi-level optimization model is proposed to minimize fuel consumption and CO2 emissions by considering real-time traffic signal control in road side unit (RSU) and instantaneous vehicle motion states optimization in on-board unit (OBU) synthetically. The RSU communicates with OBUs by vehicle wireless communication networks. Then, the traffic signal scheme in RSU is optimized with the received vehicle motion data sent from OBUs, and the system in vehicles optimize their speed and acceleration with the received traffic signal scheme sent from RSU. The simulation results indicate that the proposed model outperforms the existing Maximize Throughput Model (MaxTM) up to 10% in reducing fuel consumption and CO2 emissions especially when the traffic is heavy.
- Published
- 2018
49. Introduction to special issue on sustainable computing for bio-energy: Intelligent computing models and analytics
- Author
-
Young-Sik Jeong, Zhigao Zheng, Christian Esposito, and Arun Kumar Sangaiah
- Subjects
Green computing ,General Computer Science ,Intelligent computing ,Analytics ,business.industry ,Computer science ,Electrical and Electronic Engineering ,business ,Data science - Published
- 2018
50. Experimental research on instability of expansion valve–dry evaporator refrigeration system
- Author
-
Cheng Tang, Leren Tao, Yue Chen, Hong Tao, Lihao Huang, Wang Gang, and Zhigao Zheng
- Subjects
Suction ,Materials science ,020209 energy ,Energy Engineering and Power Technology ,Refrigeration ,02 engineering and technology ,Mechanics ,Industrial and Manufacturing Engineering ,Volumetric flow rate ,Refrigerant ,Superheating ,Thermal expansion valve ,020401 chemical engineering ,0202 electrical engineering, electronic engineering, information engineering ,0204 chemical engineering ,Gas compressor ,Evaporator - Abstract
The instability of the refrigeration cycle makes it difficult to control the system stably and decreases the system efficiency. In this article, the stability of expansion valve-dry evaporator (EVDE) refrigeration cycle has been systematically studied near “0 superheat”. First, a special-designed sensor had been developed to measure “0 superheat”. This method could distinguish the refrigerant flow states. Therefore, the values measured by the thermal sensor could be used as a feedback signal for the EVDE system. Second, there were liquid-vapor and bubble-vapor flows at the inlet of the evaporator, and a transition region occurred between them. When the compressor frequency was 70 Hz and the expansion valve opening was equal to 27%, the two flow patterns alternated, which leaded to the system periodic oscillation (for example: evaporating temperature, suction temperature and discharge temperature). In addition, the increase of refrigerant flow rate would reduce the periodic oscillation. Moreover, when the compressor frequency was 70 Hz and the expansion valve opening was less than 22%, the flow pattern was dominated by superheated vapor flow at the outlet of the evaporator. When the expansion valve opening was more than 23%, the flow pattern was dominated by misty “wet” vapor flow. The two flow patterns alternated, which leaded to suction temperature fluctuation. And a transition region also occurred between them. The results showed that EVDE refrigeration cycle could be controlled stably nearby “0 superheat”, and it could coordinate the efficiency of the dry evaporator and the safety of the compressor to optimize the system.
- Published
- 2019
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.