Professional Documents
Culture Documents
PDF New Trends in Computer Technologies and Applications 23Rd International Computer Symposium Ics 2018 Yunlin Taiwan December 20 22 2018 Revised Selected Papers Chuan Yu Chang Ebook Full Chapter
PDF New Trends in Computer Technologies and Applications 23Rd International Computer Symposium Ics 2018 Yunlin Taiwan December 20 22 2018 Revised Selected Papers Chuan Yu Chang Ebook Full Chapter
PDF New Trends in Computer Technologies and Applications 23Rd International Computer Symposium Ics 2018 Yunlin Taiwan December 20 22 2018 Revised Selected Papers Chuan Yu Chang Ebook Full Chapter
https://textbookfull.com/product/computer-vision-applications-
third-workshop-wcva-2018-held-in-conjunction-with-
icvgip-2018-hyderabad-india-december-18-2018-revised-selected-
papers-chetan-arora/
https://textbookfull.com/product/computer-vision-accv-2018-14th-
asian-conference-on-computer-vision-perth-australia-
december-2-6-2018-revised-selected-papers-part-iv-c-v-jawahar/
https://textbookfull.com/product/computer-vision-accv-2018-14th-
asian-conference-on-computer-vision-perth-australia-
december-2-6-2018-revised-selected-papers-part-v-c-v-jawahar/
Computer Vision ACCV 2018 14th Asian Conference on
Computer Vision Perth Australia December 2 6 2018
Revised Selected Papers Part VI C.V. Jawahar
https://textbookfull.com/product/computer-vision-accv-2018-14th-
asian-conference-on-computer-vision-perth-australia-
december-2-6-2018-revised-selected-papers-part-vi-c-v-jawahar/
https://textbookfull.com/product/computer-vision-accv-2018-14th-
asian-conference-on-computer-vision-perth-australia-
december-2-6-2018-revised-selected-papers-part-i-c-v-jawahar/
https://textbookfull.com/product/computer-vision-accv-2018-14th-
asian-conference-on-computer-vision-perth-australia-
december-2-6-2018-revised-selected-papers-part-ii-c-v-jawahar/
https://textbookfull.com/product/computer-vision-accv-2018-14th-
asian-conference-on-computer-vision-perth-australia-
december-2-6-2018-revised-selected-papers-part-iii-c-v-jawahar/
https://textbookfull.com/product/computer-security-23rd-european-
symposium-on-research-in-computer-security-
esorics-2018-barcelona-spain-september-3-7-2018-proceedings-part-
Chuan-Yu Chang
Chien-Chou Lin
Horng-Horng Lin (Eds.)
New Trends in
Computer Technologies
and Applications
23rd International Computer Symposium, ICS 2018
Yunlin, Taiwan, December 20–22, 2018
Revised Selected Papers
Communications
in Computer and Information Science 1013
Commenced Publication in 2007
Founding and Former Series Editors:
Phoebe Chen, Alfredo Cuzzocrea, Xiaoyong Du, Orhun Kara, Ting Liu,
Krishna M. Sivalingam, Dominik Ślęzak, Takashi Washio, and Xiaokang Yang
New Trends in
Computer Technologies
and Applications
23rd International Computer Symposium, ICS 2018
Yunlin, Taiwan, December 20–22, 2018
Revised Selected Papers
123
Editors
Chuan-Yu Chang Chien-Chou Lin
National Yunlin University National Yunlin University
of Science and Technology of Science and Technology
Douliu, Taiwan Douliu, Taiwan
Horng-Horng Lin
Southern Taiwan University
of Science and Technology
Tainan, Taiwan
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface
The present book includes extended and revised versions of papers presented at the
2018 International Computer Symposium (ICS 2018), held in Yunlin, Republic of
China (Taiwan), during December 20–22, 2018.
The ICS 2018 was hosted by National Yunlin University of Science and Technology
and technically co-sponsored by Ministry of Education (MOE), Taiwan, and the
Ministry of Science and Technology (MOST), Taiwan. ICS 2018 was an excellent
forum offering a great opportunity to share research experiences and to discuss
potential new trends in the ICT industry. The conference aims mainly at promoting the
development of computer technology and application, strengthening international
academic cooperation and communication, and exchanging research ideas.
The conference program included invited talks delivered by four world renowned
speakers, Professor Yi-Bing Lin from National Chiao Tung University, Taiwan,
Dr. Raul Catena from IBM Research Zurich, Switzerland, Professor Reinhard Klette
from Auckland University of Technology, New Zealand, and Professor Hitoshi Kiya
from Tokyo Metropolitan University, Japan, as well as 20 oral sessions of 99 papers
selected from 263 submissions from 11 countries. The topics of these papers range
from machine learning, sensor devices and platforms, sensor networks, robotics,
embedded systems, networks, operating systems, software system structures, database
design and models, multimedia and multimodal retrieval, object detection, image
processing, image compression, mobile and wireless security. This book contains 86
papers selected from the submissions to ICS 2018. We would like to thank the authors
for contributing their novel ideas and visions that are recorded in this book.
General Chairs
Pau-Choo Chung National Cheng Kung University, Taiwan
Wen-Hui Liu Ministry of Education, Taiwan
Chuan-Yu Chang National Yunlin University of Science and Technology,
Taiwan
Program Chairs
Ching-Lung Chang National Yunlin University of Science and Technology,
Taiwan
Sheng-Lung Peng National Dong Hwa University, Taiwan
Sun-Yuan Hsieh National Cheng Kung University, Taiwan
Publication Chairs
Chien-Chou Lin National Yunlin University of Science and Technology,
Taiwan
Horng-Horng Lin Southern Taiwan University of Science and
Technology
Finance Chair
Chian-Cheng Ho National Yunlin University of Science and Technology,
Taiwan
Publicity Chairs
Chia-Hung Yeh National Taiwan Normal University, Taiwan
Ching-Tsorng TsaiTunghai University, Taiwan
Chung-Wen Hung National Yunlin University of Science and Technology,
Taiwan
Organizing Committee
Hsien-Huang P. Wu National Yunlin University of Science and Technology,
Taiwan
Dong-Her Shih National Yunlin University of Science and Technology,
Taiwan
Li-Wei Kang National Yunlin University of Science and Technology,
Taiwan
Shih-Yu Chen National Yunlin University of Science and Technology,
Taiwan
Wen-Chung Kuo National Yunlin University of Science and Technology,
Taiwan
Chung-Chian Hsu National Yunlin University of Science and Technology,
Taiwan
Der-Tsai Lee National Taiwan University, Taiwan
Chang-Biau Yang National Sun Yat-sen University, Taiwan
Hung-Lung Wang National Taiwan Normal University, Taiwan
Hui-Huang Hsu Tamkang University, Taiwan
Chin-Tsung Cheng National Formosa University, Taiwan
Jen-Wei Huang National Cheng Kung University, Taiwan
Chung-Ho Chen National Cheng Kung University, Taiwan
Ming-Hwa Sheu National Yunlin University of Science and Technology,
Taiwan
Kun-Chih Chen National Sun Yat-sen University, Taiwan
Rong-Guey Chang National Chung Cheng University, Taiwan
Tsang-Ling Sheu National Sun Yat-sen University, Taiwan
Jenq Muh Hsu National Chiayi University, Taiwan
Chun-I Fan National Sun Yat-sen University, Taiwan
Chih-Hung Wang National Chiayi University, Taiwan
Hung-Min Sun National Tsing Hua University
Yung-Jen Hsu National Taiwan University, Taiwan
Yue-Shan Chang National Taipei University, Taiwan
Jing-Doo Wang Asia University
Pei-Yin Chen National Cheng Kung University, Taiwan
Mong-Fong Horng National Kaohsiung University of Applied Sciences,
Taiwan
Mike Y. Chen National Taiwan University, Taiwan
Kuo-Chin Fan National Central University
Wen-Huang Cheng Academia Sinica, Taiwan
Organization ix
Visual Analysis for Online Communities Exploration Based on Social Data. . . . 291
Lirui Wei, Qinghua Hu, Mei Han, Yuwei Zhang, Chao Fan, Yunbo Rao,
and Jiansu Pu
Order Analysis for Translating NESL Programs into Efficient GPU Code . . . 330
Ming-Yi Yan, Ming-Hsiang Huang, and Wuu Yang
1 Introduction
Loop structures are the main portion of program [1]. The characteristics of the loop
structure are as follows: (1) Instruction will be fetched from cache and be decoded
again and again. (2) The repeat dependence of instructions in the loop body. (3) The
dependence relations between iterations. These factors will cause poor ILP in the
implementation of the loop for the super-scalar architecture. To improve the computing
efficiency of super-scalar architecture, and combine the characteristic of it. In this
paper, we propose an approach, called semantic analyzer for loop unrolling, which can
increase ILP of loops by parsing the semantics of instructions for collecting the
required information of loop unrolling. Loop structure has a specific ordering pattern in
machine codes, which produced by compiling it, by formulating the semantic of the
loop with the observations of this pattern, we can find the section of loop.
In this paper, we build a semantic-based dynamic loop unrolling mechanism on the
instruction analyzer in hyper-scalar architecture, we exploit the ILP for loop structures
by unrolling and eliminating iteration of the loop. The characteristics of the semantic-
based dynamic loop unrolling mechanism are as follows: (1) Parsing the semantic of
instructions to find the closed interval of the loop body instructions. (2) Promote the
ILP of loop instructions by eliminating its iteration dependence with an immediate
operation. (3) Analyzing the situation during loop unrolling and the relationship
between loops to achieve unrolling of a nested loop. (4) Update the data dependence
tag of instructions when the branch instruction is taken. (5) Flush the instructions which
should not be executed when the branch instruction taken happened. The concepts of
proposed architecture are shown in Fig. 1.
2 Related Work
In Hyper-scalar architecture [2–6], it allows the multi-core system to allocate the cores
in the system into a single processor system to accelerate of one program. The char-
acteristics of Hyper-scalar architecture are as follows: 1. It can group cores in processor
dynamically. 2. its architecture is high flexibility and scalability, 3. It can accelerate
single-threaded performance with several cores.
The instructions in Hyper-scalar architecture can be divided into two types as
follows by the dependence between them: 1. Intra-Dependence. 2. Inter-Dependence.
Hyper-scalar architecture solves Inter-Dependence by analyzing the dependence
between instructions dynamically and establishing a distributed system to exchange
information between cores.
Design of Instruction Analyzer with Semantic-Based Loop Unrolling Mechanism 5
This paper proposed the dynamic loop unrolling mechanism based on semantic anal-
ysis of nested loop can analyze the semantic information of instructions and find the
interval of a loop. It can also unroll loop and dispatch to each core to improve the ILP
as Fig. 3 shows.
To represent the instruction flow of loop structure, we define six types of nodes:
Jump node, Normal node, Counting times node, Flag set node, Branch node, Initial
time node, shown as Fig. 4.
Observe instruction flow of loop, will find the law of compiler, shows as Fig. 5.
With the law, we can collect the information in each layer of loop.
the address is in the interval, it will record the instruction and its operand frame from
Pre-Decoder into Loop Instruction Table and Parsing Table.
When Loop Address Information was collected completely, loop-detect-unit will
compare the information with other loop’s address information to find nested loop
8 Y.-X. Lu et al.
structure in the instruction flow. Loop detect unit also record the relationship between
loops. After all information in the loop interval in the instruction flow is collected
completely, it will send a signal to unrolling control unit (UCU) and dispatch the
instruction and its operand frame to UCU according to its request.
Step 3: If the information satisfies following conditions: JA < BTA < JTA < BA
and BTA = JA + 1. The interval between JTA and BTA is defined as a loop body,
shown as Fig. 10.
Each Loop Buffer contains two tables to store the instruction and its parsed operand
frame in the interval of the loop. (1). Loop Instruction Table:Record the machine code
of the instructions in the interval of loop. (2). Loop Parsing Table:Record the parsed
operand frame of the instructions in the interval of loop, shows as Fig. 11.
10 Y.-X. Lu et al.
Take a two-layer nested loop, for example, its loop body contains a single
loop. Unrolling the interval of loop condition check to get the number of executions of
outer layer loop. To get the correct interval and loop information, when finding the loop
in the loop buffer is nested loop, change the loop body start address of outer layer loop
into the start address of its loop condition check as Fig. 14 shows.
12 Y.-X. Lu et al.
Unrolling table is inside UCU, it records the unrolling process. Unrolling table
records the number of executions of outer layer loop as unrolling bound and records the
times of unrolling complete of inner layer loop as unrolling counter.
When the outer layer loop unrolls completely, UCU records the execution times in
the unrolling table by its LIN in the loop buffer. When inner layer loop unrolls com-
pletely, UCU records the times in the unrolling counter of unrolling table by its own
loop number, as Fig. 15 shows.
LUU deals with the data dependence between iterations by register renaming.
The RAW hazard of instructions in the internal loop might cause to get the incorrect
data dependence in this renaming method, example shows as Fig. 17.
The Mail Box is Lengthened So That It Reaches through the Wall to the
Inside, Where a Door is Placed through Which the Mail can be Removed
A person having a mail box set flush in the outside wall of his
home can, with a little alteration, make it accessible from inside the
house: After removing the back side of the box a tin extension
should be soldered to the box giving it sufficient length to reach
through the wall in which an opening of the proper size has been cut.
The enlarged container is completed by adding a glass door to the
inner end which enables one to ascertain its contents at a glance.—
A. Pertle, Chicago, Ills.
Block Plane Converted for Use on Circular Work
Few amateur craftsmen can afford to own a circular plane, yet this
tool is decidedly necessary for such round work as table tops, half-
round shelves, segments, and the like. Any ordinary block plane will
accomplish such work if equipped as illustrated. A piece of half-
round hard wood is cut the width of the plane and attached with
countersunk machine screws, as indicated. The block elevates the
rear end of the plane, causing it to follow the curve of the work on
which it is used.
Pressure Spray Made of Old Oilcan
A Corn Popper Made from a Coffee Can, or Similar Tin Receptacle, and a
Piece of a Broom Handle
¶Boards exposed to the weather should be laid with the heart side
down, as determined by examining the end grain.
Fig. 2
Fig. 3
Fig. 1
Sharpened Poles, Two Feet Long, are Used with This Pile Driver in
Building Foundations, Wharves, and Other Structures of Piling. The
Details of the Headblock and the Nipper Device are Shown in Figs. 2 and
3
A Small Working Pile Driver
By EDWARD A. KRUEGER
[These directions will enable boys of varying skill with tools to make a pile
driver, as a toy or model. Several simple methods of making the parts in the
home workshop, with materials easily obtainable, are suggested.—Editor.]
Thebridges,
construction of small docks, wharves, piers, and foundations or
buildings, and other structures, by the driving of piling is
interesting out-of-door play, in which boys will find much fun. A pile
driver for this work is shown in the page plate, Fig. 1. The hammer is
raised by means of a winch, and is dropped automatically when it
reaches the cap of the derrick, as indicated in Fig. 3. The drum is
then released, and the weighted double-hook nipper drops down,
picking up the hammer on the next upstroke. A single-hook nipper,
that can be made easily of wire, is also shown in the detail sketch,
Fig. 6. The small boy who cannot make the nippers or the winch,
may tie the rope directly to the hammer, drawing it up by hand, and
dropping it as desired. The hammer need not be fitted to the guides,
but merely arranged to drop between them, and the derrick can be
made of only a few main pieces. The larger parts of the hammer and
nipper weight are best made of lead, babbitt, or white metal, as
these may be cut or melted readily. Iron, brass, or copper, solid or in
plates, may be used, if means for shaping them are at hand.
The making of the derrick may be undertaken first. Make two
pieces for the bed A, ⁷⁄₈ by ⁷⁄₈ by 17 in.; two hammer guides B, ⁷⁄₈ by
⁷⁄₈ by 33¹⁄₈ in.; one bed piece, C, ³⁄₈ by ⁷⁄₈ by 20 in.; two bed pieces,
D, ³⁄₈ by ⁷⁄₈ by 5¹⁄₄ in.; two posts, E, ¹⁄₂ by ¹⁄₂ by 34¹⁄₂ in.; two braces,
F, ³⁄₈ by ³⁄₄ by 26¹⁄₂ in. Cut these pieces slightly over their finished
lengths as given, allowing for trimming and fitting. Make strips, ¹⁄₄ by
¹⁄₂ in., for the bracing on the sides of the derrick and the ladder
bracing on the back.
Notch the lower ends of guides B, ¹⁄₈ by ⁷⁄₈. and the lower ends of
posts E, on an angle, ¹⁄₈ in. deep, to fit pieces A. Join the parts of the
bed, as shown in the page plate, pieces A being set 3¹⁄₂ in. apart,
fastening them with bolts or screws. Make braces G, of sheet metal,
and bolt them in place. Fit the posts E into place, and fasten them at
the bed and the top. Put on several ladder braces temporarily, to
steady the frame. Fit the braces F carefully, and bolt them in place.
Remove the piece C and the braces F, and nail the horizontal
bracing to the sides of the frame. Then fit and nail the diagonal
braces. The bolted construction is convenient in “knocking down” the
derrick for storing it. Reassemble the parts, and make the cap for the
headblock.
The headblock and cap are shown in detail in Figs. 2 and 3. Make
two pieces, H, ¹⁄₄ by 1⁵⁄₁₆ by 1³⁄₄ in.; one piece, J, ¹⁄₄ by 1 by 1³⁄₁₆ in.;
two braces, K, ¹⁄₄ by 1¹³⁄₃₂ by 1³⁄₄ in. Make the two beveled pieces of
the cap ⁷⁄₈ by 1³⁄₄ by 1¹⁄₂ in., and provide a wooden strip or metal
plate for the front and rear edges, as shown. Fasten strips of sheet
metal to the bevel of the notch, to protect it from wear by the striking
of the nipper hooks. Make the sheave 1¹⁄₂ in. in diameter and ³⁄₈ in.
thick, with a groove for the rope. Assemble the parts, as shown.
The details of the winch are shown in Figs. 4 and 5, and the
method of assembling the parts, in Fig. 1. The drum may also be
driven without gears by fixing the crank directly to the shaft. Gears
may be obtained from old machines, or purchased from dealers in
model supplies. Make the supports L and M, Fig. 4, ³⁄₄ by 4 by 6⁵⁄₈
in., cutting patterns of paper, if desired.
Fig. 4
The Supports of the Winch are Made of ³⁄₄-Inch Wood, Bolted to the Bed
The gear, Fig. 5, is 3¹⁄₂ and the pinion ³⁄₄ in. in diameter. The drum
is of wood, 2 in. in diameter and 3⁵⁄₁₆ in. long. Its ends are 3¹⁄₂-in.
metal disks, fastened with screws. The shaft is a ³⁄₈-in. bolt, 5³⁄₈ in.
long, and bears in holes bored in the supports, as shown in the
details of these parts. The crank N, Fig. 5, is made of a ³⁄₁₆-in. rod,
bent as shown, and fitted with a washer to fit next to the pinion. The
gear is set by means of the pawl O, which is bent from a strip of ¹⁄₁₆-
in. sheet metal. The brace P is bent from a ¹⁄₁₆ by ³⁄₄ by 1⁵⁄₈-in. strip
of sheet metal, and riveted to the pawl. Assemble the parts,
fastening the gear to the drum end, and bolt the supports into place.
Put the pinion into mesh with the gear at its proper place, and
carefully mark the hole for the crank. Square the end of the crank
and the hole in the pinion, and fit them to a driving fit. Fix the rope to
the drum, and reeve it through the head block. The derrick is then
ready for the hammer and the weighted nipper.
Fig. 5
Details of the Drum, Its Driving Mechanism, and Fittings