PDF New Trends in Computer Technologies and Applications 23Rd International Computer Symposium Ics 2018 Yunlin Taiwan December 20 22 2018 Revised Selected Papers Chuan Yu Chang Ebook Full Chapter

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 54

New Trends in Computer Technologies

and Applications 23rd International


Computer Symposium ICS 2018 Yunlin
Taiwan December 20 22 2018 Revised
Selected Papers Chuan-Yu Chang
Visit to download the full and correct content document:
https://textbookfull.com/product/new-trends-in-computer-technologies-and-application
s-23rd-international-computer-symposium-ics-2018-yunlin-taiwan-december-20-22-20
18-revised-selected-papers-chuan-yu-chang/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Computer Vision Applications Third Workshop WCVA 2018


Held in Conjunction with ICVGIP 2018 Hyderabad India
December 18 2018 Revised Selected Papers Chetan Arora

https://textbookfull.com/product/computer-vision-applications-
third-workshop-wcva-2018-held-in-conjunction-with-
icvgip-2018-hyderabad-india-december-18-2018-revised-selected-
papers-chetan-arora/

Parallel and Distributed Computing Applications and


Technologies 19th International Conference PDCAT 2018
Jeju Island South Korea August 20 22 2018 Revised
Selected Papers Jong Hyuk Park
https://textbookfull.com/product/parallel-and-distributed-
computing-applications-and-technologies-19th-international-
conference-pdcat-2018-jeju-island-south-korea-
august-20-22-2018-revised-selected-papers-jong-hyuk-park/

Computer Vision ACCV 2018 14th Asian Conference on


Computer Vision Perth Australia December 2 6 2018
Revised Selected Papers Part IV C.V. Jawahar

https://textbookfull.com/product/computer-vision-accv-2018-14th-
asian-conference-on-computer-vision-perth-australia-
december-2-6-2018-revised-selected-papers-part-iv-c-v-jawahar/

Computer Vision ACCV 2018 14th Asian Conference on


Computer Vision Perth Australia December 2 6 2018
Revised Selected Papers Part V C.V. Jawahar

https://textbookfull.com/product/computer-vision-accv-2018-14th-
asian-conference-on-computer-vision-perth-australia-
december-2-6-2018-revised-selected-papers-part-v-c-v-jawahar/
Computer Vision ACCV 2018 14th Asian Conference on
Computer Vision Perth Australia December 2 6 2018
Revised Selected Papers Part VI C.V. Jawahar

https://textbookfull.com/product/computer-vision-accv-2018-14th-
asian-conference-on-computer-vision-perth-australia-
december-2-6-2018-revised-selected-papers-part-vi-c-v-jawahar/

Computer Vision ACCV 2018 14th Asian Conference on


Computer Vision Perth Australia December 2 6 2018
Revised Selected Papers Part I C. V. Jawahar

https://textbookfull.com/product/computer-vision-accv-2018-14th-
asian-conference-on-computer-vision-perth-australia-
december-2-6-2018-revised-selected-papers-part-i-c-v-jawahar/

Computer Vision ACCV 2018 14th Asian Conference on


Computer Vision Perth Australia December 2 6 2018
Revised Selected Papers Part II C. V. Jawahar

https://textbookfull.com/product/computer-vision-accv-2018-14th-
asian-conference-on-computer-vision-perth-australia-
december-2-6-2018-revised-selected-papers-part-ii-c-v-jawahar/

Computer Vision ACCV 2018 14th Asian Conference on


Computer Vision Perth Australia December 2 6 2018
Revised Selected Papers Part III C. V. Jawahar

https://textbookfull.com/product/computer-vision-accv-2018-14th-
asian-conference-on-computer-vision-perth-australia-
december-2-6-2018-revised-selected-papers-part-iii-c-v-jawahar/

Computer Security 23rd European Symposium on Research


in Computer Security ESORICS 2018 Barcelona Spain
September 3 7 2018 Proceedings Part I Javier Lopez

https://textbookfull.com/product/computer-security-23rd-european-
symposium-on-research-in-computer-security-
esorics-2018-barcelona-spain-september-3-7-2018-proceedings-part-
Chuan-Yu Chang
Chien-Chou Lin
Horng-Horng Lin (Eds.)

Communications in Computer and Information Science 1013

New Trends in
Computer Technologies
and Applications
23rd International Computer Symposium, ICS 2018
Yunlin, Taiwan, December 20–22, 2018
Revised Selected Papers
Communications
in Computer and Information Science 1013
Commenced Publication in 2007
Founding and Former Series Editors:
Phoebe Chen, Alfredo Cuzzocrea, Xiaoyong Du, Orhun Kara, Ting Liu,
Krishna M. Sivalingam, Dominik Ślęzak, Takashi Washio, and Xiaokang Yang

Editorial Board Members


Simone Diniz Junqueira Barbosa
Pontifical Catholic University of Rio de Janeiro (PUC-Rio),
Rio de Janeiro, Brazil
Joaquim Filipe
Polytechnic Institute of Setúbal, Setúbal, Portugal
Ashish Ghosh
Indian Statistical Institute, Kolkata, India
Igor Kotenko
St. Petersburg Institute for Informatics and Automation of the Russian
Academy of Sciences, St. Petersburg, Russia
Junsong Yuan
University at Buffalo, The State University of New York, Buffalo, NY, USA
Lizhu Zhou
Tsinghua University, Beijing, China
More information about this series at http://www.springer.com/series/7899
Chuan-Yu Chang Chien-Chou Lin
• •

Horng-Horng Lin (Eds.)

New Trends in
Computer Technologies
and Applications
23rd International Computer Symposium, ICS 2018
Yunlin, Taiwan, December 20–22, 2018
Revised Selected Papers

123
Editors
Chuan-Yu Chang Chien-Chou Lin
National Yunlin University National Yunlin University
of Science and Technology of Science and Technology
Douliu, Taiwan Douliu, Taiwan
Horng-Horng Lin
Southern Taiwan University
of Science and Technology
Tainan, Taiwan

ISSN 1865-0929 ISSN 1865-0937 (electronic)


Communications in Computer and Information Science
ISBN 978-981-13-9189-7 ISBN 978-981-13-9190-3 (eBook)
https://doi.org/10.1007/978-981-13-9190-3
© Springer Nature Singapore Pte Ltd. 2019
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, expressed or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface

The present book includes extended and revised versions of papers presented at the
2018 International Computer Symposium (ICS 2018), held in Yunlin, Republic of
China (Taiwan), during December 20–22, 2018.
The ICS 2018 was hosted by National Yunlin University of Science and Technology
and technically co-sponsored by Ministry of Education (MOE), Taiwan, and the
Ministry of Science and Technology (MOST), Taiwan. ICS 2018 was an excellent
forum offering a great opportunity to share research experiences and to discuss
potential new trends in the ICT industry. The conference aims mainly at promoting the
development of computer technology and application, strengthening international
academic cooperation and communication, and exchanging research ideas.
The conference program included invited talks delivered by four world renowned
speakers, Professor Yi-Bing Lin from National Chiao Tung University, Taiwan,
Dr. Raul Catena from IBM Research Zurich, Switzerland, Professor Reinhard Klette
from Auckland University of Technology, New Zealand, and Professor Hitoshi Kiya
from Tokyo Metropolitan University, Japan, as well as 20 oral sessions of 99 papers
selected from 263 submissions from 11 countries. The topics of these papers range
from machine learning, sensor devices and platforms, sensor networks, robotics,
embedded systems, networks, operating systems, software system structures, database
design and models, multimedia and multimodal retrieval, object detection, image
processing, image compression, mobile and wireless security. This book contains 86
papers selected from the submissions to ICS 2018. We would like to thank the authors
for contributing their novel ideas and visions that are recorded in this book.

December 2018 Chuan-Yu Chang


Chien-Chou Lin
Horng-Horng Lin
Organization

General Chairs
Pau-Choo Chung National Cheng Kung University, Taiwan
Wen-Hui Liu Ministry of Education, Taiwan
Chuan-Yu Chang National Yunlin University of Science and Technology,
Taiwan

International Board Chairs


Chein-I Chang University of Maryland Baltimore County, USA
Gary Yen Oklahoma State University, USA
You-Shun Wang Nanyang Technological University, Singapore
Chia-Yen Chen University of Auckland, New Zealand
Zhiping Lin Nanyang Technological University, Singapore

Program Chairs
Ching-Lung Chang National Yunlin University of Science and Technology,
Taiwan
Sheng-Lung Peng National Dong Hwa University, Taiwan
Sun-Yuan Hsieh National Cheng Kung University, Taiwan

Publication Chairs
Chien-Chou Lin National Yunlin University of Science and Technology,
Taiwan
Horng-Horng Lin Southern Taiwan University of Science and
Technology

Finance Chair
Chian-Cheng Ho National Yunlin University of Science and Technology,
Taiwan

Local Arrangements Chair


Wen-Fong Wang National Yunlin University of Science and Technology,
Taiwan
viii Organization

Publicity Chairs
Chia-Hung Yeh National Taiwan Normal University, Taiwan
Ching-Tsorng TsaiTunghai University, Taiwan
Chung-Wen Hung National Yunlin University of Science and Technology,
Taiwan

Organizing Committee
Hsien-Huang P. Wu National Yunlin University of Science and Technology,
Taiwan
Dong-Her Shih National Yunlin University of Science and Technology,
Taiwan
Li-Wei Kang National Yunlin University of Science and Technology,
Taiwan
Shih-Yu Chen National Yunlin University of Science and Technology,
Taiwan
Wen-Chung Kuo National Yunlin University of Science and Technology,
Taiwan
Chung-Chian Hsu National Yunlin University of Science and Technology,
Taiwan
Der-Tsai Lee National Taiwan University, Taiwan
Chang-Biau Yang National Sun Yat-sen University, Taiwan
Hung-Lung Wang National Taiwan Normal University, Taiwan
Hui-Huang Hsu Tamkang University, Taiwan
Chin-Tsung Cheng National Formosa University, Taiwan
Jen-Wei Huang National Cheng Kung University, Taiwan
Chung-Ho Chen National Cheng Kung University, Taiwan
Ming-Hwa Sheu National Yunlin University of Science and Technology,
Taiwan
Kun-Chih Chen National Sun Yat-sen University, Taiwan
Rong-Guey Chang National Chung Cheng University, Taiwan
Tsang-Ling Sheu National Sun Yat-sen University, Taiwan
Jenq Muh Hsu National Chiayi University, Taiwan
Chun-I Fan National Sun Yat-sen University, Taiwan
Chih-Hung Wang National Chiayi University, Taiwan
Hung-Min Sun National Tsing Hua University
Yung-Jen Hsu National Taiwan University, Taiwan
Yue-Shan Chang National Taipei University, Taiwan
Jing-Doo Wang Asia University
Pei-Yin Chen National Cheng Kung University, Taiwan
Mong-Fong Horng National Kaohsiung University of Applied Sciences,
Taiwan
Mike Y. Chen National Taiwan University, Taiwan
Kuo-Chin Fan National Central University
Wen-Huang Cheng Academia Sinica, Taiwan
Organization ix

Min-Chun Hu National Cheng Kung University, Taiwan


Yi-Shun Wang National Changhua University of Education, Taiwan
Wu-Yuin Hwang National Central University, Taiwan
Wu Ting-Ting National Yunlin University of Science and Technology,
Taiwan
Yu-Chee Tseng National Chiao Tung University
Chung-Nan Lee National Sun Yat-sen University, Taiwan
Li-Hsing Yen National Chiao Tung University, Taiwan
Jonathan Lee National Taiwan University, Taiwan
Chien-Hung Liu National Taipei University of Technology, Taiwan
Nien-Lin Hsueh Feng Chia University, Taiwan
Jung-Hsien Chiang National Cheng Kung University
Chien-Chuan Ko National Chiayi University, Taiwan
Yung-Nien Sun National Cheng Kung University, Taiwan
Jim-Min Lin Feng Chia University, Taiwan
Ching-Yu Yang National Penghu University of Science
and Technology, Taiwan
Chin-Feng Lai National Cheng Kung University, Taiwan
Contents

Computer Architecture, Embedded Systems, SoC and VLSI/EDA

Design of Instruction Analyzer with Semantic-Based Loop Unrolling


Mechanism in the Hyperscalar Architecture . . . . . . . . . . . . . . . . . . . . . . . . 3
Yi-Xuan Lu, Jih-Ching Chiu, Shu-Jung Chao, and Yong-Bin Ye

Local Dimming Design for LCD Backlight . . . . . . . . . . . . . . . . . . . . . . . . 20


Shih-Chang Hsia, Xin-Yan Jiang, and Shag-Kai Wang

Robot Localization Using Zigbee Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . 28


Shih-Chang Hsia, Xiang-Xuan Li, and Bo-Yung Wang

Speech-Based Interface for Embedded Systems. . . . . . . . . . . . . . . . . . . . . . 35


Yi-Chin Huang and Cheng-Hung Tsai

Computer Networks and Web Service/Technologies

Adaptive Linked-List Mechanism for Wi-Fi Wireless Network . . . . . . . . . . . 49


Tsung-Lin Lee, Jih-Ching Chiu, and Yueh-Lin Li

Design and Implementation of Tree Topology Algorithm for Power


Line Communication Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Guan-Jen Huang, Jih-Ching Chiu, and Yueh-Lin Li

Evolution of Advanced Persistent Threat (APT) Attacks and Actors . . . . . . . 76


Chia-Mei Chen, Gu-Hsin Lai, and Dan-Wei (Marian) Wen

The Impact of the Observation Period for Detecting P2P Botnets


on the Real Traffic Using BotCluster. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Chun-Yu Wang, Jia-Hong Yap, Kuan-Chung Chen, Jyh-Biau Chang,
and Ce-Kuen Shieh

Digital Content, Digital Life, Human Computer


Interaction and Social Media

Deep Residual Neural Network Design for Super-Resolution Imaging . . . . . . 95


Wei-Ting Chen, Pei-Yin Chen, and Bo-Chen Lin

Markerless Indoor Augmented Reality Navigation Device Based


on Optical-Flow-Scene Indoor Positioning and Wall-Floor-Boundary
Image Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Wen-Shan Lin and Chian C. Ho
xii Contents

An Adaptive Tai-Chi-Chuan AR Guiding System Based on Speed


Estimation of Movement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Yi-Ping Hung, Peng-Yuan Kao, Yao-Fu Jan, Chun-Hsien Li,
Chia-Hao Chang, and Ping-Hsuan Han

Multi-view Community Detection in Facebook Public Pages . . . . . . . . . . . . 131


Zhige Xin, Chun-Ming Lai, Jon W. Chapman, George Barnett,
and S. Felix Wu

Image Processing, Computer Graphics and Multimedia Technologies

Supervised Representation Hash Codes Learning. . . . . . . . . . . . . . . . . . . . . 141


Huei-Fang Yang, Cheng-Hao Tu, and Chu-Song Chen

The Bread Recognition System with Logistic Regression . . . . . . . . . . . . . . . 150


Guo-Zhang Jian and Chuin-Mu Wang

Recognition and Counting of Motorcycles by Fusing Support Vector


Machine and Deep Learning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Tzung-Pei Hong, Yu-Chiao Yang, Ja-Hwung Su, and Shyue-Liang Wang

An Efficient Event Detection Through Background Subtraction and Deep


Convolutional Nets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Kahlil Muchtar, Faris Rahman, Muhammad Rizky Munggaran,
Alvin Prayuda Juniarta Dwiyantoro, Richard Dharmadi,
Indra Nugraha, and Chuan-Yu Chang

Light-Weight DCNN for Face Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . 168


Jiali Song, Yunbo Rao, Puzhao Ji, Jiansu Pu, and Keyang Chen

3D Facade Reconstruction Using the Fusion of Images and LiDAR:


A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Haotian Xu and Chia-Yen Chen

An Application of Detecting Cryptomeria Damage by Squirrels Using


Aerial Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Chien Shun Lo and Cheng Ssu Ho

Clothing Classification with Multi-attribute Using Convolutional


Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Chaitawat Chenbunyanon and Ji-Han Jiang

Color Video and Convolutional Neural Networks Deep Learning Based


Real-Time Agtron Baking Level Estimation Method . . . . . . . . . . . . . . . . . . 197
Qi-Hon Wu and Day-Fann Shen

Deep Virtual Try-on with Clothes Transform . . . . . . . . . . . . . . . . . . . . . . . 207


Szu-Ying Chen, Kin-Wa Tsoi, and Yung-Yu Chuang
Contents xiii

Scene Recognition via Bi-enhanced Knowledge Space Learning . . . . . . . . . . 215


Jin Zhang, Bing-Kun Bao, and Changsheng Xu

Database, Data Mining, Big Data and Information Retrieval

A Hybrid Methodology of Effective Text-Similarity Evaluation . . . . . . . . . . 227


Shu-Kai Yang and Chien Chou

Research on Passenger Carrying Capacity of Taichung City Bus with


Big Data of Electronic Ticket Transactions: A Case Study of Route 151 . . . . 238
Cheng-Yuan Ho and I-Hsuan Chiu

The Ridership Analysis on Inter-County/City Service for the Case


Study of Taichung City Bus System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
Cheng-Yuan Ho and I-Hsuan Chiu

An Enhanced Pre-processing and Nonlinear Regression Based Approach


for Failure Detection of PV System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
Chung-Chian Hsu, Jia-Long Li, Arthur Chang, and Yu-Sheng Chen

Evaluation of Performance Improvement by Cleaning on Photovoltaic


Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
Chung-Chian Hsu, Shi-Mai Fang, Arthur Chang, and Yu-Sheng Chen

egoStellar: Visual Analysis of Anomalous Communication Behaviors


from Egocentric Perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Mei Han, Qing Wang, Lirui Wei, Yuwei Zhang, Yunbo Cao,
and Jiansu Pu

Visual Analysis for Online Communities Exploration Based on Social Data. . . . 291
Lirui Wei, Qinghua Hu, Mei Han, Yuwei Zhang, Chao Fan, Yunbo Rao,
and Jiansu Pu

Forecasting Monthly Average of Taiwan Stock Exchange Index . . . . . . . . . . 302


Wei-Ting Sun, Hsin-Ta Chiao, Yue-Shan Chang, and Shyan-Ming Yuan

Incorporating Prior Knowledge by Selective Context Features


to Enhance Topic Coherence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
Chuen-Min Huang

Parallel, Peer-to-Peer, Distributed and Cloud Computing

Accelerated Parallel Based Distance Calculations for Live-Cell


Time-Lapse Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Hui-Jun Cheng, Chun-Yuan Lin, and Chun-Chien Mao
xiv Contents

Order Analysis for Translating NESL Programs into Efficient GPU Code . . . 330
Ming-Yi Yan, Ming-Hsiang Huang, and Wuu Yang

Auto-scaling in Kubernetes-Based Fog Computing Platform . . . . . . . . . . . . . 338


Wei-Sheng Zheng and Li-Hsing Yen

Information Technology Innovation, Industrial Application


and Internet of Things

A General Internet of Thing System with Person Emotion Detection


Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
Wen-Pinn Fang, Wen-Chi Huang, and Yu-Chien Chang

A Biometric Entrance Guard Control System for Improving the Entrance


Security of Intelligent Rental Housing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
Jerry Chao-Lee Lin, Jim-Min Lin, and Vivien Yi-Chun Chen

Inception Network-Based Weather Image Classification with Pre-filtering


Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
Li-Wei Kang, Tian-Zheng Feng, and Ru-Hong Fu

Defect Mapping of Lumber Surface by Image Processing for Automatic


Glue Fitting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Hsien-Huang Wu, Chung-Yuan Hung, Bo-jyun Zeng,
and Ya-Yung Huang

Software Testing Levels in Internet of Things (IoT) Architecture . . . . . . . . . 385


Teik-Boon Tan and Wai-Khuen Cheng

The Modeling of Path Planning for Fire Evacuation . . . . . . . . . . . . . . . . . . 391


Ching-Lung Chang and Yi-Lin Tsai

Smart Automated Rubber Mixer System Implemented by Internet


of Things for Tire Manufacturing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Yu-Chen Jhu and Chien-Chou Lin

Indoor Navigation Based on a Gait Recognition and Counting Scheme . . . . . 406


Tin Chang, Tzu-Hsuan Chung, En-Wei Lin, Jun-Jie Lai, Xin-Hong Lai,
Wen-Fong Wang, Chuan-Yu Chang, and Ching-Yu Yang

Exploration on the Design of Sport Prescription and the Behavior


of College Students . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
Li Yu-Chiang, Jun-Yi Lin, and Wen-Fong Wang
Contents xv

Algorithms and Computation Theory

A Diagonal-Based Algorithm for the Constrained Longest Common


Subsequence Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
Siang-Huai Hung, Chang-Biau Yang, and Kuo-Si Huang

Designing an Algorithm to Improve the Diameters of Completely


Independent Spanning Trees in Crossed Cubes . . . . . . . . . . . . . . . . . . . . . . 433
Kung-Jui Pai

A Measure and Conquer Algorithm for the Minimum User


Spatial-Aware Interest Group Query Problem . . . . . . . . . . . . . . . . . . . . . . . 440
Chih-Yang Huang, Po-Chuan Chien, and Yen Hung Chen

A Minimum-First Algorithm for Dynamic Time Warping on Time Series . . . 449


Bo-Xian Chen, Kuo-Tsung Tseng, and Chang-Biau Yang

A Note on Metric 1-median Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457


Ching-Lueh Chang

Accelerating Secret Sharing on GPU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460


Shyong Jian Shyu and Ying Zhen Tsai

An O(f) Bi-approximation for Weighted Capacitated Covering


with Hard Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468
Hai-Lun Tu, Mong-Jen Kao, and D. T. Lee

A Lyapunov Stability Based Adaptive Learning Rate of Recursive


Sinusoidal Function Neural Network for Identification of Elders
Fall Signal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
Chao-Ting Chu and Chian-Cheng Ho

Multi-recursive Wavelet Neural Network for Proximity Capacitive Gesture


Recognition Analysis and Implementation . . . . . . . . . . . . . . . . . . . . . . . . . 485
Chao-Ting Chu and Chian-Cheng Ho

Paired-Domination Problem on Distance Hereditary Graphs . . . . . . . . . . . . . 495


Ching-Chi Lin, Keng-Chu Ku, Gen-Huey Chen, and Chan-Hung Hsu

Rainbow Coloring of Bubble Sort Graphs . . . . . . . . . . . . . . . . . . . . . . . . . 503


Yung-Ling Lai and Jian-Wen He

The Multi-service Location Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507


Hung-I Yu, Mong-Jen Kao, and D. T. Lee

Total k-Domatic Partition and Weak Elimination Ordering . . . . . . . . . . . . . . 516


Chuan-Min Lee
xvi Contents

An Approximation Algorithm for Star p-Hub Routing Cost Problem . . . . . . . 524


Sun-Yuan Hsieh, Li-Hsuan Chen, and Wei Lu

Tube Inner Circumference State Classification Optimization by Using


Artificial Neural Networks, Random Forest and Support Vector
Machines Algorithms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532
Wei-Ting Li, Chung-Wen Hung, and Ching-Ju Chen

Cryptography and Information Security

A Secure User Authenticated Scheme in Intelligent Manufacturing System. . . 543


Ming-Te Chen, Hao-Yu Liu, Chien-Hung Lai, Wen-Shiang Wang,
and Chao-Yang Huang

On Delegatability of a Certificateless Strong Designated Verifier


Signature Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550
Han-Yu Lin, Chia-Hung Wu, and Yan-Ru Jiang

Dynamic Key Management Scheme in IoT. . . . . . . . . . . . . . . . . . . . . . . . . 559


Po-Wen Chi and Ming-Hung Wang

Secure File Transfer Protocol for Named Data Networks Supporting


Homomorphic Computations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
Hsiang-Shian Fan, Cheng-Hsing Yang, and Chi-Yao Weng

A Weighted Threshold Visual Cryptography. . . . . . . . . . . . . . . . . . . . . . . . 580


Tai-Yuan Tu, Tzung-Her Chen, Ji-min Yang, and Chih-Hung Wang

Enhancement of FTP-NDN Supporting Nondesignated Receivers . . . . . . . . . 590


Arijit Karati, Chun-I Fan, and Ruei-Hau Hsu

Flexible Hierarchical Key Assignment Scheme with Time-Based Assured


Deletion for Cloud Storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599
Ping-Kun Hsu, Mu-Ting Lin, and Iuon-Chang Lin

Malware Detection Method Based on CNN . . . . . . . . . . . . . . . . . . . . . . . . 608


Wen-Chung Kuo and Yu-Pin Lin

Uncovering Internal Threats Based on Open-Source Intelligence . . . . . . . . . . 618


Meng-Han Tsai, Ming-Hung Wang, Wei-Chieh Yang,
and Chin-Laung Lei
Contents xvii

Artificial Intelligence and Fuzzy Systems

A Comparison of Transfer Learning Techniques, Deep Convolutional


Neural Network and Multilayer Neural Network Methods
for the Diagnosis of Glaucomatous Optic Neuropathy . . . . . . . . . . . . . . . . . 627
Mohammad Norouzifard, Ali Nemati, Anmar Abdul-Rahman,
Hamid GholamHosseini, and Reinhard Klette

Analysis of Voice Styles Using i-Vector Features . . . . . . . . . . . . . . . . . . . . 636


Wen-Hung Liao, Wen-Tsung Kao, and Yi-Chieh Wu

Applying Deep Convolutional Neural Network to Cursive Chinese


Calligraphy Recognition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 646
Liang Jung and Wen-Hung Liao

Grassmannian Clustering for Multivariate Time Sequences . . . . . . . . . . . . . . 654


Beom-Seok Oh, Andrew Beng Jin Teoh, Kar-Ann Toh, and Zhiping Lin

Inflammatory Cells Detection in H&E Staining Histology Images Using


Deep Convolutional Neural Network with Distance Transformation. . . . . . . . 665
Chao-Ting Li, Pau-Choo Chung, Hung-Wen Tsai,
Nan-Haw Chow, and Kuo-Sheng Cheng

Machine Learning Techniques for Recognizing IoT Devices. . . . . . . . . . . . . 673


Yu Chien Lin and Farn Wang

Scale Invariant Multi-view Depth Estimation Network with cGAN


Refinement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 681
Chia-Hung Yeh, Yao-Pao Huang, and Mei-Juan Chen

Tracking of Load Handling Forklift Trucks and of Pedestrians


in Warehouses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
Syeda Fouzia, Mark Bell, and Reinhard Klette

UAV Path Planning and Collaborative Searching for Air Pollution


Source Using the Particle Swarm Optimization . . . . . . . . . . . . . . . . . . . . . . 698
Yerra Prathyusha and Chung-Nan Lee

Software Engineering and Programming Languages

A Framework for Design Pattern Testing . . . . . . . . . . . . . . . . . . . . . . . . . . 713


Nien Lin Hsueh

Supporting Java Array Data Type in Constraint-Based Test Case


Generation for Black-Box Method-Level Unit Testing . . . . . . . . . . . . . . . . . 721
Chien-Lung Wang and Nai-Wei Lin
xviii Contents

Cost-Driven Cloud Service Recommendation for Building


E-Commerce Websites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732
Chia-Ying Wang, Shang-Pin Ma, and Shou-Hong Dai

Healthcare and Bioinformatics

A Computer-Aided-Grading System of Breast Carcinoma:


Pleomorphism, and Mitotic Count . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745
Chien-Chaun Ko, Chi-Yang Chen, and Jun-Hong Lin

Cateye: A Hint-Enabled Search Engine Framework for Biomedical


Classification Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758
Chia-Jung Yang and Jung-Hsien Chiang

Wearable Ear Recognition Smartglasses Based on Arc Mask Superposition


Operator Ear Detection and Coherent Point Drift Feature Extraction . . . . . . . 764
Wen-Shan Lin and Chian C. Ho

Automatic Finger Tendon Segmentation from Ultrasound Images


Using Deep Learning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 778
Chan-Pang Kuok, Bo-Siang Tsai, Tai-Hua Yang, Fong-Chin Su,
I-Ming Jou, and Yung-Nien Sun

Two-Dimensional TRUS Image and Three-Dimensional MRI Prostate


Image Fusion System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 785
Chuan-Yu Chang, Chih-An Wang, and Yuh-Shyan Tsai

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 793


Computer Architecture, Embedded
Systems, SoC and VLSI/EDA
Design of Instruction Analyzer
with Semantic-Based Loop Unrolling
Mechanism in the Hyperscalar Architecture

Yi-Xuan Lu, Jih-Ching Chiu(&), Shu-Jung Chao, and Yong-Bin Ye

Department of Electric Engineering, National Sun Yat-Sen University,


Kaohsiung, Taiwan
b013011012@gmail.com,chiujihc@mail.ee.nsysu.edu.tw,
windy55367@gmail.com,zsefbvcx75321@gmail.com,

Abstract. Nowadays ILP processors can’t analyze the semantic information of


instruction thread to change instruction series automatically for increasing ILP
degree. High performance required programs such as image processing or
machine learning contain a lot of loop structure. Loop structure will be bounded
with the instruction number of one basic block. That cause processors are hard
to enhance the computing efficiency. The characteristics of the loop structure in
the program are as follows: (1) Instruction will be fetched from cache and be
decoded repeatedly. (2) The issued instructions are bounded by the loop body.
(3) There is data dependence between iterations. These factors will get worse the
poor ILP in the loop codes. In this paper, we propose an architecture called
semantic-based dynamic loop unrolling mechanism. The proposed architecture
can buffer the instruction series of nested loop, unroll it automatically by ana-
lyzing the instruction flow to find the loop body with the semantic of loop
instructions, store them to the instruction buffer, and dispatch them to target the
processor cores. The proposed architecture consists of three units: loop detect
unit (LDU), unrolling control unit (UCU) and loop unrolling unit (LUU). LDU
will parse the semantic of instructions to find the closed interval of the loop
body instructions. UCU will control LUU in the whole process. LUU will unroll
the loop based on the information collected by LDU. Loop controller will handle
the complementation overhead for branch miss prediction and the loop finish-up
codes. The verifications use ARM instructions generated by Keil lVision5
compiler. The results show that eliminating iteration dependence can improve
ILP by 140% to 180%.

Keywords: ILP of loop  Semantic of loop  Loop unrolling  Hyperscalar 


Nested loop

1 Introduction

Loop structures are the main portion of program [1]. The characteristics of the loop
structure are as follows: (1) Instruction will be fetched from cache and be decoded
again and again. (2) The repeat dependence of instructions in the loop body. (3) The
dependence relations between iterations. These factors will cause poor ILP in the

© Springer Nature Singapore Pte Ltd. 2019


C.-Y. Chang et al. (Eds.): ICS 2018, CCIS 1013, pp. 3–19, 2019.
https://doi.org/10.1007/978-981-13-9190-3_1
4 Y.-X. Lu et al.

implementation of the loop for the super-scalar architecture. To improve the computing
efficiency of super-scalar architecture, and combine the characteristic of it. In this
paper, we propose an approach, called semantic analyzer for loop unrolling, which can
increase ILP of loops by parsing the semantics of instructions for collecting the
required information of loop unrolling. Loop structure has a specific ordering pattern in
machine codes, which produced by compiling it, by formulating the semantic of the
loop with the observations of this pattern, we can find the section of loop.
In this paper, we build a semantic-based dynamic loop unrolling mechanism on the
instruction analyzer in hyper-scalar architecture, we exploit the ILP for loop structures
by unrolling and eliminating iteration of the loop. The characteristics of the semantic-
based dynamic loop unrolling mechanism are as follows: (1) Parsing the semantic of
instructions to find the closed interval of the loop body instructions. (2) Promote the
ILP of loop instructions by eliminating its iteration dependence with an immediate
operation. (3) Analyzing the situation during loop unrolling and the relationship
between loops to achieve unrolling of a nested loop. (4) Update the data dependence
tag of instructions when the branch instruction is taken. (5) Flush the instructions which
should not be executed when the branch instruction taken happened. The concepts of
proposed architecture are shown in Fig. 1.

Fig. 1. Concepts of semantic-based dynamic loop unrolling mechanism

2 Related Work

In Hyper-scalar architecture [2–6], it allows the multi-core system to allocate the cores
in the system into a single processor system to accelerate of one program. The char-
acteristics of Hyper-scalar architecture are as follows: 1. It can group cores in processor
dynamically. 2. its architecture is high flexibility and scalability, 3. It can accelerate
single-threaded performance with several cores.
The instructions in Hyper-scalar architecture can be divided into two types as
follows by the dependence between them: 1. Intra-Dependence. 2. Inter-Dependence.
Hyper-scalar architecture solves Inter-Dependence by analyzing the dependence
between instructions dynamically and establishing a distributed system to exchange
information between cores.
Design of Instruction Analyzer with Semantic-Based Loop Unrolling Mechanism 5

Figure 2 shows the architecture of Hyper-scalar. The Hyper-scalar architecture


dispatch instructions into cores based on the current hardware resources. To exchange
information from cores, Hyper-scalar architecture finds the data dependence of
instructions clearly by analyzing the relationship between instructions. In order to
communicate the information required by the instructions to each core correctly,
Hyper-scalar architecture proposed a distributed exchanging information system. It
adds information processing unit in each core, the unit is built to deal with the data
request from other cores and dispatch the request of the core itself to each core. By
connecting cores in the processor, an information exchanging network is built.

Fig. 2. Hyper-scalar architecture

Hyper-scalar architecture analyzes the dependence of instructions by instruction


analyzer (IA). IA analyzes the relationship between instructions and generates the
dependence tag of instructions. Virtual shared register files (VSRF) deals with the
information exchanging between cores by dependence tag.
Comparing Hyper-scalar architecture and super-scalar architecture, both of them
can analyze the dependence of instructions, and dispatch the instruction which data are
prepared. By building an information exchanging system of cores, Hyper-scalar
architecture has a better performance than super-scalar architecture, but it still has a
poor performance when facing loop structure [7–10].
6 Y.-X. Lu et al.

3 Dynamic Loop Unrolling Mechanism

This paper proposed the dynamic loop unrolling mechanism based on semantic anal-
ysis of nested loop can analyze the semantic information of instructions and find the
interval of a loop. It can also unroll loop and dispatch to each core to improve the ILP
as Fig. 3 shows.

Fig. 3. Loop unrolling

To represent the instruction flow of loop structure, we define six types of nodes:
Jump node, Normal node, Counting times node, Flag set node, Branch node, Initial
time node, shown as Fig. 4.

Fig. 4. Six types of node

Observe instruction flow of loop, will find the law of compiler, shows as Fig. 5.
With the law, we can collect the information in each layer of loop.

3.1 System Architecture


The system architecture proposed by this paper shows as Fig. 6. It can be divided into
three parts:

3.1.1 Loop Detect Unit (LDU)


Loop detect unit located in the IA, it analyzes the information came from Pre-Decoder
to find the instruction interval of loop. When finding the interval of loop, it will record
the Loop Address Information into Loop Buffer inside itself. Loop detect unit compares
the instruction which was caught from Instruction Cache with detected loop interval, if
Design of Instruction Analyzer with Semantic-Based Loop Unrolling Mechanism 7

Fig. 5. The instructions of loop after compiled

Fig. 6. System architecture

the address is in the interval, it will record the instruction and its operand frame from
Pre-Decoder into Loop Instruction Table and Parsing Table.
When Loop Address Information was collected completely, loop-detect-unit will
compare the information with other loop’s address information to find nested loop
8 Y.-X. Lu et al.

structure in the instruction flow. Loop detect unit also record the relationship between
loops. After all information in the loop interval in the instruction flow is collected
completely, it will send a signal to unrolling control unit (UCU) and dispatch the
instruction and its operand frame to UCU according to its request.

3.1.2 Unrolling Control Unit (UCU)


Unrolling control unit is designed to deal with unrolling nested loop. It sends a data
request to loop detect unit to get instructions and its operand frame from Loop
Instruction Table and Parsing Table and dispatches to loop unrolling unit (LUU) before
start unrolling. The dynamic loop unrolling mechanism proposed by this paper divided
nested loop structure into inner layer loop and outer layer loop. Dynamic loop unrolling
mechanism unrolls the outer layer loop first to get the number of executions of outer
layer loop, then unrolls the inner layer loop continuously until the completed times of
unrolling equals to the number of executions of outer layer loop. Unrolling control unit
decides the number of unrolling loop according to the relationship between loops and
the unrolling condition.

3.1.3 Loop Unrolling Unit (LUU)


Loop unrolling unit is designed to deal with loop unrolling, it promotes ILP by
eliminating the iteration dependence. Loop unrolling unit detects and eliminates the
iteration dependence with eliminating iteration dependence unit, when getting the
parsed operand frame from UCU. After eliminating the iteration dependence, loop
unrolling unit will generate dependence tag and loop tag to record the execution times
of loop. The generated tag and instruction will be pushed into the instruction dispatch
queue, and wait to be dispatched to cores.
If unrolling is completed, dynamic loop unrolling mechanism needs to update the
data dependence of VSRF mapping table and memory tag mapping table in IA. It
updates the data dependence with loop VSRF mapping table and loop memory tag
mapping table in the loop unrolling unit.

3.2 Loop Detect Unit


Loop detect unit finds the loop interval in instruction flow by analyzing the semantic
information of instruction flow, and dispatches instructions and parsed operand frames
according to the request from UCU, the architecture shows as Fig. 7.
The semantic of loop structure in the instruction flow is detected as follow:
Step 1: When detect absolutely jump instruction in the instruction flow, then record
the jump address (JA) as loop start address (LS) and its jump target address (JTA) as
loop body end address (LBE), shows as Fig. 8. Get into the next step.
Step 2: When detect branch instruction in the instruction flow, then record the
branch address (BA) as loop end address (LE) and branch target address (BTA) as loop
body start address (LBS), shows as Fig. 9. Get into the next step.
Design of Instruction Analyzer with Semantic-Based Loop Unrolling Mechanism 9

Fig. 7. Architecture of LDU

Fig. 8. Loop detecting-Step 1

Step 3: If the information satisfies following conditions: JA < BTA < JTA < BA
and BTA = JA + 1. The interval between JTA and BTA is defined as a loop body,
shown as Fig. 10.
Each Loop Buffer contains two tables to store the instruction and its parsed operand
frame in the interval of the loop. (1). Loop Instruction Table:Record the machine code
of the instructions in the interval of loop. (2). Loop Parsing Table:Record the parsed
operand frame of the instructions in the interval of loop, shows as Fig. 11.
10 Y.-X. Lu et al.

Fig. 9. Loop detecting-Step 2

Fig. 10. The interval of loop

Fig. 11. The format in loop parsing table

3.3 Unrolling Control Unit


Unrolling control unit decides the number of loop by analyzing the signals from LDU
and the relationship between loops in unrolling table, the architecture shows as Fig. 12.
The dynamic loop unrolling mechanism proposed by this paper divides the nested
loop into outer layer and inner layer when unrolling it as Fig. 13 shows. Dynamic loop
unrolling mechanism unrolls the outer layer loop first to get the number of executions
of outer layer loop, then unrolls the inner layer loop continuously until the completed
times of unrolling equals to the number of executions of outer layer loop. Unrolling the
outer layer loop is for getting the number of executions. Therefore, UCU has to deal
with the information which will be dispatched to LUU.
Design of Instruction Analyzer with Semantic-Based Loop Unrolling Mechanism 11

Fig. 12. Architecture of UCU

Fig. 13. The structure of nested loop

Take a two-layer nested loop, for example, its loop body contains a single
loop. Unrolling the interval of loop condition check to get the number of executions of
outer layer loop. To get the correct interval and loop information, when finding the loop
in the loop buffer is nested loop, change the loop body start address of outer layer loop
into the start address of its loop condition check as Fig. 14 shows.
12 Y.-X. Lu et al.

Fig. 14. The correction of nested loop

Unrolling table is inside UCU, it records the unrolling process. Unrolling table
records the number of executions of outer layer loop as unrolling bound and records the
times of unrolling complete of inner layer loop as unrolling counter.
When the outer layer loop unrolls completely, UCU records the execution times in
the unrolling table by its LIN in the loop buffer. When inner layer loop unrolls com-
pletely, UCU records the times in the unrolling counter of unrolling table by its own
loop number, as Fig. 15 shows.

Fig. 15. Data updating in unrolling table


Design of Instruction Analyzer with Semantic-Based Loop Unrolling Mechanism 13

3.4 Loop Unrolling Unit


Loop unrolling unit (LUU) decides the times of loop unrolling by available core
numbers. LUU generates the dependence tag of instructions and the dependence
eliminated iteration with immediate operation by the information collected after
unrolling finish. It also generates mapping tables to compensate for the dependence of
some instructions been aborted. Rearrange dispatch order of these instructions before
dispatch, the architecture shows as Fig. 16.

Fig. 16. Architecture of LUU

LUU deals with the data dependence between iterations by register renaming.
The RAW hazard of instructions in the internal loop might cause to get the incorrect
data dependence in this renaming method, example shows as Fig. 17.

Fig. 17. Register renaming between iterations


Another random document with
no related content on Scribd:
Cleat and Pulley Fastenings to Adjust Clothesline
The following kink will relieve the housewife of the trouble of
sagging clotheslines, and hubby of constantly being asked to tighten
up the line. The cost should not be over 25 cents, as all that is
needed is a pulley cleat and hook, all of which may be had at any
ten-cent store. When the line gets slack, it is pulled tight through the
pulley and tightened up in the cleat.—S. H. Johnson, Westville,
Conn.
Convenient Type of Mail Box for Home Use

The Mail Box is Lengthened So That It Reaches through the Wall to the
Inside, Where a Door is Placed through Which the Mail can be Removed

A person having a mail box set flush in the outside wall of his
home can, with a little alteration, make it accessible from inside the
house: After removing the back side of the box a tin extension
should be soldered to the box giving it sufficient length to reach
through the wall in which an opening of the proper size has been cut.
The enlarged container is completed by adding a glass door to the
inner end which enables one to ascertain its contents at a glance.—
A. Pertle, Chicago, Ills.
Block Plane Converted for Use on Circular Work

Few amateur craftsmen can afford to own a circular plane, yet this
tool is decidedly necessary for such round work as table tops, half-
round shelves, segments, and the like. Any ordinary block plane will
accomplish such work if equipped as illustrated. A piece of half-
round hard wood is cut the width of the plane and attached with
countersunk machine screws, as indicated. The block elevates the
rear end of the plane, causing it to follow the curve of the work on
which it is used.
Pressure Spray Made of Old Oilcan

Old Material Makes a Spray That Is as Good as the Manufactured Product, at


Less Cost

In making a spraying outfit for garden use, or similar purposes, a 3


or 5-gal. kerosene can and tire pump may be satisfactorily
employed. The latter is attached rigidly at the rear of the container
with iron straps, as shown. A ball check valve is fitted in the top of
the receptacle and connection is made between it and the pump with
the pump hose. A 6-ft. length of ¹⁄₄-in. rubber tubing is wired to the
drain cock. An 8-in. piece of ¹⁄₄-in. brass pipe is filed down and wired
in the spray end of the hose to serve as a nozzle.—P. P. Avery,
Garfield, N. J.
Keeping Tools Bright and Free from Rust
Bright-finished tools can be preserved against rust by coating with
linseed oil, and allowing the oil to dry as a film. If more body is
desired, oxide of iron, very finely powdered, should be mixed with
the oil. Another antirust coating is made by dissolving ¹⁄₂ oz.
camphor in 1 lb. melted lard. The mixture is skimmed, and fine
graphite added to make an iron color. Clean the tools and smear with
this mixture. Let the tools stand 24 hours, and rub clean with soft
cloth.
A good method of removing rust is to cover the metal parts with
sweet oil, rubbing it in well. Let stand 48 hours; then rub with finely
powdered, unslaked lime. Next immerse the article for a few seconds
in a solution of ¹⁄₂ oz. potassium cyanide in a wine glass of water.
Then clean with a paste of potassium cyanide, castile soap, whiting,
and water, using a toothbrush. Potassium cyanide is a strong poison,
and should be used carefully.—E. Standiford, Youngstown, Ohio.
Repairing Leaks in Pipes
Frequently a cast or malleable-iron pipe fitting will leak through its
side, the water oozing, drop by drop, from a pinhole—ordinarily due
to a sand hole in the casting. Sometimes the leak can be stopped by
hammering the affected spot with the ball end of a hammer. If this
fails, it is necessary to replace the fitting. Where the leak is around a
thread, screwing the pipe or fitting tighter constitutes the only, and
usually effective, corrective.—L. A. Merton, St. Louis, Mo.
Corn Popper Made from Coffee Can and Broom
Handle

A Corn Popper Made from a Coffee Can, or Similar Tin Receptacle, and a
Piece of a Broom Handle

With an old coffee can, or similar tin receptacle, and a piece of a


broom handle, 2¹⁄₂ or 3 ft. long, it is easy to make a corn popper that
is preferable in many ways to a wire one. Take a strip of wood a little
shorter than the height of the can to be used, and after boring two
holes in it to prevent its splitting, nail it to the end of the handle. The
latter is then fastened to the side of the can with two wire staples, as
shown. Holes are made in the can top to admit air to the corn while it
is popping.—James Crouse, Dixon, Ky.
An Easily Constructed Ball-Bearing
Anemometer
By THOMAS A. REYNOLDS

An anemometer is an instrument which measures the velocity of the


wind. The anemometers used by the weather bureau consist of
four hemispherical cups mounted on the ends of two horizontal rods
which cross at right angles and are supported on a freely turning
vertical axle. Since the concave sides of the cups offer more
resistance to the wind than do the convex sides the device is caused
to revolve at a speed which is proportional, approximately, to that of
the wind. The axle, to which the rotary motion is transmitted from the
cups, is connected to a dial mounted at the foot of the supporting
column. This dial records automatically the rotations. The
reproduction of such a registering mechanism would be rather
complicated. Hence, in the arrangement to be described none will be
employed. Therefore, one of these improvised anemometers, when
mounted on a high building, will indicate by the changing rapidity of
its revolutions only the comparative, not the real, velocity of the wind.
This Anemometer is Made from Galvanized Sheet Iron, a Bicycle Hub,
and a Few Iron Straps. Practice in Observing Its Motion will Enable One
to Estimate Fairly Closely the Wind’s Velocity

In constructing the instrument, straight, dished vanes will be used


instead of hollow cups. The vanes operate almost as effectively and
may be combined more readily into a sturdy rotating unit. A bicycle
front hub is utilized to constitute a wear- and noise-proof bearing
having minimum friction. Each of the four wings is formed from a
piece of galvanized iron, measuring 4¹⁄₂ by 10 in., which has one end
cut to a curve as shown. To each wing is fastened, with tinners’
rivets, a 4-in. length of ³⁄₄ by ¹⁄₁₆-in. strap iron. Form each of the
strips into a trough-shaped vane, measuring 2¹⁄₄ in. from edge to
edge—this being the distance between the spoke flanges of a
bicycle hub. Some cylindrical object of suitable diameter will serve as
a form for bending. Place the ends of the support strips between the
spoke flanges and rivet them securely. The rivets pass through the
spoke holes. Some trying out may be required to insure a
symmetrical arrangement of the parts. Solder the curved end of each
wing to the inner surface of the adjacent wing. Place a tin cap—a
salve-box lid will do—under the upper locknut on the hub to exclude
rain from the bearing.
The supporting upright may be a heavy wooden rod, or a piece of
iron pipe. A yoke of 1 by ¹⁄₈-in. strap iron, held to the top of the
upright with screws, is provided for the attachment of the hub. The
locknut on the hub clamps it to the yoke. Apply a coat of metal paint
to the iron parts which are exposed. Mount the device sufficiently
high to give the wind free access to it from all directions. The curve
at one end of each wing is an irregular one. Hence, its accurate
construction involves a knowledge of sheet-metal pattern drawing.
However, if it is made of a form similar to that shown it will fit
sufficiently well to permit a good soldered joint.

¶Boards exposed to the weather should be laid with the heart side
down, as determined by examining the end grain.
Fig. 2
Fig. 3
Fig. 1

Sharpened Poles, Two Feet Long, are Used with This Pile Driver in
Building Foundations, Wharves, and Other Structures of Piling. The
Details of the Headblock and the Nipper Device are Shown in Figs. 2 and
3
A Small Working Pile Driver
By EDWARD A. KRUEGER

[These directions will enable boys of varying skill with tools to make a pile
driver, as a toy or model. Several simple methods of making the parts in the
home workshop, with materials easily obtainable, are suggested.—Editor.]

Thebridges,
construction of small docks, wharves, piers, and foundations or
buildings, and other structures, by the driving of piling is
interesting out-of-door play, in which boys will find much fun. A pile
driver for this work is shown in the page plate, Fig. 1. The hammer is
raised by means of a winch, and is dropped automatically when it
reaches the cap of the derrick, as indicated in Fig. 3. The drum is
then released, and the weighted double-hook nipper drops down,
picking up the hammer on the next upstroke. A single-hook nipper,
that can be made easily of wire, is also shown in the detail sketch,
Fig. 6. The small boy who cannot make the nippers or the winch,
may tie the rope directly to the hammer, drawing it up by hand, and
dropping it as desired. The hammer need not be fitted to the guides,
but merely arranged to drop between them, and the derrick can be
made of only a few main pieces. The larger parts of the hammer and
nipper weight are best made of lead, babbitt, or white metal, as
these may be cut or melted readily. Iron, brass, or copper, solid or in
plates, may be used, if means for shaping them are at hand.
The making of the derrick may be undertaken first. Make two
pieces for the bed A, ⁷⁄₈ by ⁷⁄₈ by 17 in.; two hammer guides B, ⁷⁄₈ by
⁷⁄₈ by 33¹⁄₈ in.; one bed piece, C, ³⁄₈ by ⁷⁄₈ by 20 in.; two bed pieces,
D, ³⁄₈ by ⁷⁄₈ by 5¹⁄₄ in.; two posts, E, ¹⁄₂ by ¹⁄₂ by 34¹⁄₂ in.; two braces,
F, ³⁄₈ by ³⁄₄ by 26¹⁄₂ in. Cut these pieces slightly over their finished
lengths as given, allowing for trimming and fitting. Make strips, ¹⁄₄ by
¹⁄₂ in., for the bracing on the sides of the derrick and the ladder
bracing on the back.
Notch the lower ends of guides B, ¹⁄₈ by ⁷⁄₈. and the lower ends of
posts E, on an angle, ¹⁄₈ in. deep, to fit pieces A. Join the parts of the
bed, as shown in the page plate, pieces A being set 3¹⁄₂ in. apart,
fastening them with bolts or screws. Make braces G, of sheet metal,
and bolt them in place. Fit the posts E into place, and fasten them at
the bed and the top. Put on several ladder braces temporarily, to
steady the frame. Fit the braces F carefully, and bolt them in place.
Remove the piece C and the braces F, and nail the horizontal
bracing to the sides of the frame. Then fit and nail the diagonal
braces. The bolted construction is convenient in “knocking down” the
derrick for storing it. Reassemble the parts, and make the cap for the
headblock.
The headblock and cap are shown in detail in Figs. 2 and 3. Make
two pieces, H, ¹⁄₄ by 1⁵⁄₁₆ by 1³⁄₄ in.; one piece, J, ¹⁄₄ by 1 by 1³⁄₁₆ in.;
two braces, K, ¹⁄₄ by 1¹³⁄₃₂ by 1³⁄₄ in. Make the two beveled pieces of
the cap ⁷⁄₈ by 1³⁄₄ by 1¹⁄₂ in., and provide a wooden strip or metal
plate for the front and rear edges, as shown. Fasten strips of sheet
metal to the bevel of the notch, to protect it from wear by the striking
of the nipper hooks. Make the sheave 1¹⁄₂ in. in diameter and ³⁄₈ in.
thick, with a groove for the rope. Assemble the parts, as shown.
The details of the winch are shown in Figs. 4 and 5, and the
method of assembling the parts, in Fig. 1. The drum may also be
driven without gears by fixing the crank directly to the shaft. Gears
may be obtained from old machines, or purchased from dealers in
model supplies. Make the supports L and M, Fig. 4, ³⁄₄ by 4 by 6⁵⁄₈
in., cutting patterns of paper, if desired.

Fig. 4
The Supports of the Winch are Made of ³⁄₄-Inch Wood, Bolted to the Bed

The gear, Fig. 5, is 3¹⁄₂ and the pinion ³⁄₄ in. in diameter. The drum
is of wood, 2 in. in diameter and 3⁵⁄₁₆ in. long. Its ends are 3¹⁄₂-in.
metal disks, fastened with screws. The shaft is a ³⁄₈-in. bolt, 5³⁄₈ in.
long, and bears in holes bored in the supports, as shown in the
details of these parts. The crank N, Fig. 5, is made of a ³⁄₁₆-in. rod,
bent as shown, and fitted with a washer to fit next to the pinion. The
gear is set by means of the pawl O, which is bent from a strip of ¹⁄₁₆-
in. sheet metal. The brace P is bent from a ¹⁄₁₆ by ³⁄₄ by 1⁵⁄₈-in. strip
of sheet metal, and riveted to the pawl. Assemble the parts,
fastening the gear to the drum end, and bolt the supports into place.
Put the pinion into mesh with the gear at its proper place, and
carefully mark the hole for the crank. Square the end of the crank
and the hole in the pinion, and fit them to a driving fit. Fix the rope to
the drum, and reeve it through the head block. The derrick is then
ready for the hammer and the weighted nipper.

Fig. 5
Details of the Drum, Its Driving Mechanism, and Fittings

The hammer, shown in Fig. 6, may be made easily from a solid


block of lead, 1¹⁄₄ by 2⁵⁄₈ by 2⁵⁄₈ in. Cut ³⁄₁₆ by ⁷⁄₈-in. grooves in the
vertical edges to fit the guides. Make the circular ³⁄₁₆ by 1⁵⁄₈-in.
hammer plate Q of iron or brass, and fasten it with screws. Rivet the
wire lifting strap R, as shown.
Fig. 6
A Simple Method of Making the Tripping Device, and Details of the Hammer

The single-hook nipper, shown in Fig. 6, is made as follows:


Flatten a piece of ³⁄₁₆-in. wire at the middle, and drill a ³⁄₃₂-in. hole for
the bolt. Shape the lower end into a pointed hook, and bend the
upper end to form the trip arm. This strikes the notch in the cap of
the derrick, releasing the hammer. The rope is wired to the hook as
shown. The nipper weight is made of a solid piece of lead, 1¹⁄₄ by 2⁵⁄₈
in., by 1 in. high, grooved at the ends to fit the guides. Cut a slot
through it, for the hook, as shown in Fig. 6, and bolt the latter into
place. The double-hook nipper is better mechanically, and may be
made of two pieces of wire, or cut from sheet metal.
Test the action of the nippers, and bend or file the hooks to
operate properly. The pile driver may then be painted, and work on
“jobs” begun. If it is used at the water, fix metal guards at the lower
ends of the guides, to prevent the hammer from falling into the water.
Split Needle Causes Echo on Talking Machine
An amusing stunt is to split the end of a fiber talking-machine
needle carefully about ¹⁄₄ in., so as to make two points, slightly
separated. The needle is then placed on the machine, preferably on
an old record, so that the points play the record successively,
producing an echo. If the work is carefully done, and the points are
separated slightly, both reproductions will be fairly clear.—Frank
Murphy, Faribault, Minn.

You might also like