Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Adaptive partitioning and scheduling method of convolutional neural network inference model on heterogeneous platforms
Shaofa SHANG, Lin JIANG, Yuancheng LI, Yun ZHU
Journal of Computer Applications    2023, 43 (9): 2828-2835.   DOI: 10.11772/j.issn.1001-9081.2022081177
Abstract292)   HTML9)    PDF (3025KB)(125)       Save

Aiming at the problems of low hardware resource utilization and high latency of Convolutional Neural Network (CNN) when performing inference on heterogeneous platforms, a self-adaptive partitioning and scheduling method of CNN inference model was proposed. Firstly, the key operators of CNN were extracted by traversing the computational graph to complete the adaptive partition of the model, so as to enhance the flexibility of the scheduling strategy. Then, based on the performance measurement and the critical path-greedy search algorithm, according to the sub-model running characteristics on the CPU-GPU heterogeneous platform, the optimal running load was selected to improve the sub-model inference speed. Finally, the cross-device scheduling mechanism in TVM (Tensor Virtual Machine) was used to configure the dependencies and running loads of sub-models in order to achieve adaptive scheduling of model inference, and reduce the communication delay between devices. Experimental results show that on GPU and CPU, compared to the method optimized by TVM operator, the proposed method improves the inference speed by 5.88% to 19.05% and 45.45% to 311.46% with no loss of model inference accuracy.

Table and Figures | Reference | Related Articles | Metrics
Multi-neural network malicious code detection model based on depthwise separable convolution
Ruilin JIANG, Renchao QIN
Journal of Computer Applications    2023, 43 (5): 1527-1533.   DOI: 10.11772/j.issn.1001-9081.2022050716
Abstract298)   HTML14)    PDF (2771KB)(132)       Save

Concerning of the problems of high cost and unstable detection results of the traditional malicious code detection methods, a multi-neural network malicious code detection model based on depthwise separable convolution was proposed. By using the Depthwise Separable Convolution (DSC), SENet (Squeeze-and-Excitation Network) channel attention mechanism and Grey Level Co-occurrence Matrix (GLCM), three lightweight neural networks were connected with GLCM in parallel to detect malicious code families and their variants, then the detection results of multiple strong classifiers were fused via Naive Bayes classifier to improve the detection accuracy while reducing the computational cost. Experimental results on the hybrid dataset of MalVis + benign data show that the proposed model achieved the accuracy of 97.43% in the detection of malicious code families and their variants, which was 6.19 and 2.29 percentage points higher than those of ResNet50 and VGGNet models respectively, while its parameter quantity is only 68% of that of ResNet50 model and 13% of that of VGGNet model. On malimg dataset, the detection accuracy of this model achieved 99.31%. In conclusion, the proposed model has good detection effect with reduced parameters.

Table and Figures | Reference | Related Articles | Metrics
Parallel design and implementation of minimum mean square error detection algorithm based on array processor
Shuai LIU, Lin JIANG, Yuancheng LI, Rui SHAN, Yulin ZHU, Xin WANG
Journal of Computer Applications    2022, 42 (5): 1524-1530.   DOI: 10.11772/j.issn.1001-9081.2021030460
Abstract179)   HTML5)    PDF (1972KB)(59)       Save

In massive Multiple-Input Multiple-Output (MIMO) systems, Minimum Mean Square Error (MMSE) detection algorithm has the problems of poor adaptability, high computational complexity and low efficiency on the reconfigurable array structure. Based on the reconfigurable array processor developed by the project team, a parallel mapping method based on MMSE algorithm was proposed. Firstly, a pipeline acceleration scheme which could be highly parallel in time and space was designed based on the relatively simple data dependency of Gram matrix calculation. Secondly, according to the relatively independent characteristic of Gram matrix calculation and matched filter calculation module in MMSE algorithm, a modular parallel mapping scheme was designed. Finally, the mapping scheme was implemented based on Xilinx Virtex-6 development board, and the statistics of its performance were performed. Experimental results show that, the proposed method achieves the acceleration ratio of 2.80, 4.04 and 5.57 in Quadrature Phase Shift Keying (QPSK) uplink with the MIMO scale of 128 × 4 128 × 8 and 128 × 16 , respectively, and the reconfigurable array processor reduces the resource consumption by 42.6% compared with the dedicated hardware in the 128 × 16 massive MIMO system.

Table and Figures | Reference | Related Articles | Metrics
Nonlinear scrambling diffusion synchronization image encryption based on dynamic network
Yuan GUO, Xuewen WANG, Chong WANG, Jinlin JIANG
Journal of Computer Applications    2022, 42 (1): 162-170.   DOI: 10.11772/j.issn.1001-9081.2021071220
Abstract326)   HTML13)    PDF (3822KB)(73)       Save

The traditional image encryption with scrambling-diffusion structure is usually divided into two independent steps of scrambling and diffusion, which are easy to be cracked separately, and the encryption process has weak nonlinearity, resulting in poor security of the algorithm. Therefore, a scrambling diffusion synchronous image encryption algorithm with strong nonlinearity was proposed. Firstly, a new sine-cos chaotic mapping was constructed to broaden the range of control parameters and improve the randomness of sequence distribution. Then, the exclusive-OR sum of plaintext pixels and chaotic sequence was used as the initial chaotic value to generate chaotic sequence, and this chaotic sequence was used to construct the network structures of different pixels of different plaintexts. At the same time, the diffusion value was used to dynamically update the network value to make the network dynamic. Finally, the single pixel serial scrambling-diffusion was used to generate cross-effect between scrambling and diffusion,and the overall synchronization of scrambling and diffusion, so as to effectively resist separation attacks. In addition, the pixel operations were transferred according to the network structure, which made the serial path nonlinear and unpredictable, thereby ensuring the nonlinearity and security of the algorithm. And the adjacent node pixels sum was used to perform dynamic diffusion in order to improve the correlation of the plaintext. Experimental results show that the proposed algorithm has high encryption security, strong plaintext sensitivity, and is particularly effective in anti-statistical attack, anti-differential attack and anti-plaintext attack.

Table and Figures | Reference | Related Articles | Metrics
Distributed massive molecule retrieval model based on consistent Hash
SUN Xia, YU Long, TIAN Shengwei, YAN Yilin, LIN Jiangli
Journal of Computer Applications    2015, 35 (4): 956-959.   DOI: 10.11772/j.issn.1001-9081.2015.04.0956
Abstract536)      PDF (581KB)(530)       Save

In view of the problems that the traditional general graph matching search is inefficient, and refractive index data cannot be positioned fast in large data environment, a distributed massive molecular retrieval model based on consistent Hash function was established. Combined with the characteristics of molecular storage structures, to improve retrieval efficiency of molecules, the continuous refractive index was discretized by fixed width algorithm to establish high-speed Hash index, and the distributed massive retrieval system was realized. The size of dataset was effectively reduced, and Hash collision was handled according to the visiting frequency. The experimental results show that, in the chemical data containing 200 thousand structures of molecules, the average time of this method is about five percent of the traditional general graph matching search. Besides, the model has the steady performance with high scalability. It is applicable to retrieve high-frequency molecules in accordance with refractive index under the environment of massive data.

Reference | Related Articles | Metrics
Analysis of public emotion evolution based on probabilistic latent semantic analysis
LIN Jianghao, ZHOU Yongmei, YANG Aimin, CHEN Yuhong, CHEN Xiaofan
Journal of Computer Applications    2015, 35 (10): 2747-2751.   DOI: 10.11772/j.issn.1001-9081.2015.10.2747
Abstract345)      PDF (900KB)(488)       Save
Concerning the problem of topics mining and its corresponding public emotion analysis, an analytical method for public emotion evolution was proposed based on Probabilistic Latent Semantic Analysis (PLSA) model. In order to find out the evolutional patterns of the topics, the method started with extracting the subtopics on time series by making use of PLSA model. Then, emotion feature vectors represented by emotion units and their weights which matched with the topic context were established via parsing and ontology lexicon. Next, the strength of public emotion was computed via a fine-grained dimension and the holistic public emotion of the issue. In this case, the method has a deep mining into the evolutional patterns of public emotion which were finally quantified and visualized. The advantage of the method is highlighted by introducing grammatical rules and ontology lexicon in the process of extracting emotion units, which was conducted in a fine-grained dimension to improve the accuracy of extraction. The experimental results show that this method can gain good performance on the evolutional analysis of topics and public emotion on time series and thus proves the positive effect of the method.
Reference | Related Articles | Metrics
Accelerated molecular dynamics simulation using multi-core CPU and GPU
LIN Jiang-hong LIN Jin-xian LV Tun
Journal of Computer Applications    2011, 31 (03): 843-847.   DOI: 10.3724/SP.J.1087.2011.00843
Abstract1311)      PDF (810KB)(979)       Save
On the heterogeneous architecture of multi-core Central Processing Unit (CPU) and Graphic Processing Unit (GPU), the Open Multi-Processing (OpenMP) and the programming interfaces of Compute Unified Device Architecture (CUDA) were used to implement a molecular dynamics simulation program based on AMBER force field. In order to efficiently use computer processing power, the program was divided into different parts which were processed by CPU single-thread, CPU multi-thread and GPU multi-thread respectively. The experimental results show that compared with the optimized CPU-based implementations, the heterogeneous parallel computing model based on multi-core CPU-GPU gets powerful performance advantage. Especially, the calculations of forces, which account for more than 90% of processing time, get at most 12 times faster than CPU-based implementations while being implemented on GPU.
Related Articles | Metrics
Soft-sensor modeling of quality control based on support vector machine
Xian-Lin JIANG
Journal of Computer Applications   
Abstract2039)      PDF (769KB)(1515)       Save
On the basis of studying Support Vector Machine (SVM) theory, a soft-sensor controlling method based on Support Vector Machine wass presented. In order to solve the problem of getting the important parameter that is hard to be measured online and has long time-delay, a soft-sensor controlling method based on support vector machine was presented. In the control process, modeling techniques have been studied intensively, and then RBF kernel function was chosen to establish an exact support vector machine model. On the background of quality control in a company, the online estimate of output value was realized. Under the circumstance of changing and choosing different parameters and through a lot of research and simulation, a relatively better generalization result model was established.
Related Articles | Metrics