2018 9th International Symposium on Parallel Architectures, Algorithms and Programming

(PAAP 2018)

Taipei, Taiwan

26-28 December 2018

IEEE Catalog Number: CFP1844M-POD ISBN: 978-1-5386-9404-6

Copyright © 2018 by the Institute of Electrical and Electronics Engineers, Inc. All Rights Reserved

Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.

For other copying, reprint or republication permission, write to IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights reserved.

*** This is a print representation of what appears in the IEEE Digital Library. Some format issues inherent in the e-media version may also appear in this print version.

IEEE Catalog Number: CFP1844M-POD ISBN (Print-On-Demand): 978-1-5386-9404-6 ISBN (Online): 978-1-5386-9403-9

Additional Copies of This Publication Are Available From:

Curran Associates, Inc 57 Morehouse Lane Red Hook, NY 12571 USA Phone: (845) 758-0400 Fax: (845) 758-2633 E-mail: [email protected] Web: www.proceedings.com

2018 9th International Symposium on Parallel Architectures, Algorithms and Programming (PAAP) PAAP 2018

Table of Contents

Message from the PAAP 2018 General Chair x PAAP 2018 Organizing Committee xii PAAP 2018 Program Committee xiv

Section 1A: Architectures

State Space Model Predictive Control Based on Nuclear Norm System Identification 1 Lianming Ge ( of Posts and Telecommunications), Jie Ding (Nanjing University of Posts and Telecommunications), and Hui Deng (Nanjing University of Posts and Telecommunications) RFID-Based System on Emergency Medical Care 6 Ruey-Shun Chen (Dongguan Polytechnic), Yeh-Cheng Chen (University of California, Davis), Xiaopeng Fan (Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences), Naixue Xiong ( University), Yu-Xi Hu (Northwestern Polytechnical University), Shi-Jinn Horng (Dongguan Polytechnic), and S.P. Chen (National Chiao Tung University) Exercise and Diet Architecture Design Based on Blockchain Network 12 Meng-Hsuan Fu (Shih Hsin University) A Stochastic Model for Analyzing Tail Latency of Multi-Tier Online Cloud Services 16 Rongqi Zhang ( & Tianjin Key Laboratory of Advanced Networking), Yanan Yang (Tianjin University & Tianjin Key Laboratory of Advanced Networking), Laiping Zhao (Tianjin University & Tianjin Key Laboratory of Advanced Networking), Xiaobo Zhou (Tianjin University & Tianjin Key Laboratory of Advanced Networking), Binlei Cai (Tianjin University & Tianjin Key Laboratory of Advanced Networking), and Keqiu Li (Tianjin University & Tianjin Key Laboratory of Advanced Networking) Modified Parameter Estimation for Linear Systems with Output Quantization 24 Hui Deng (Nanjing University of Posts and Telecommunications), Jie Ding (Nanjing University of Posts and Telecommunications), and Lianming Ge (Nanjing University of Posts and Telecommunications)

v Delay-Tolerant On-Demand Mobile Charging Scheduling Scheme for Wireless Rechargeable Sensor Networks 29 Zhansheng Chen ( Jiaotong University& Beijing Union University), Hong Shen (Sun Yat-sen University Guangzhou & University of Adelaide Adelaide), and Xiaofan Zhao (People’s Public Security University of ) A Hierarchical Clustering Based Relation Extraction Method for Domain Ontology 36 Askar Hamdulla ( University of China), Hankiz Yilahun ( of China), Kudret Abdurahman (Xinjiang University of China), and Seyyare Imam (Xinjiang University of China)

Section 2A: Algorithms

Optimal DASH Video Scheduling over Variable-Bit-Rate Networks 41 Shin-Hung Chang (Fu Jen Catholic University), Kuan-Jen Wang (Fu Jen Catholic University), and Jan-Ming Ho (Institute of Information Science, Academia Sinica) A Scheduler Considering Characteristics of VM for Mitigation of Unstable Performance 49 Bongwoo Bak (Korea University), Jihun Kang (Korea University), Heeseok Choi (Korea University), Jaehak Lee (Korea University), Heonchang Yu (Korea University), and Kwangsik Chung (Korea National Open University)

Section 3A: Parallel Programming

Mapping Exceptions to High-Level Source Code on a Heterogeneous Architecture 54 Ralph Duncan (LookingGlass Cyber Solutions), Nima Gougol (LookingGlass Cyber Solutions), and Jim Frandeen (LookingGlass Cyber Solutions) Research and Implementation of High Performance Traffic Processing Based on Intel DPDK 62 Wenjun Zhu (Nanjing University of Posts and Telecommunications), Peng Li (Nanjing University of Posts and Telecommunications), Baozhou Luo (Nanjing University of Posts and Telecommunications), He Xu (Nanjing University of Posts and Telecommunications), and Yujie Zhang (Nanjing University of Posts and Telecommunications) Memory Hierarchy Aware I/O Scheduling under Contention for Hybrid Storage Based HPC 69 Benbo Zha (Sun Yat-sen University) and Hong Shen (University of Adelaide) Roofline Model Based Performance-Aware Energy Management for Scientific Computing 74 Yunlan Wang (Northwestern Polytechnical University, Xi’an), Tianhai Zhao (Northwestern Polytechnical University, Xi’an), Lu Li (Northwestern Polytechnical University, Xi’an), Zhengxiong Hou (Northwestern Polytechnical University, Xi’an), and Jianhua Gu (Northwestern Polytechnical University, Xi’an) Uniform Opposition-Based Particle Swarm 81 Lanlan Kang ( University of Science and Technology) and Ying Cui (Jiangxi University of Science and Technology)

vi Enhancing Data Availability through Automatic Replication in the Hadoop Cloud System 86 Tsozen Yeh (Fu Jen Catholic University) and Yiming Tu (Fu Jen Catholic University) Using Naïve Bayes Method to Classify Text-Based Email 94 Lanlan Kang (Jiangxi University of Science and Technology), Ruey-Shun Chen (Dongguan Polytechnic), Yeh-Cheng Chen (University of California, Davis), and Wenliang Cao (Dongguan Polytechnic) Using Cloud Computing Integrated Architecture to Improve Delivery Committed Rate in Shoemaking Industry 99 Gang Ke (Dongguan Polytechnic), Ruey-Shun Chen (Dongguan Polytechnic), Yeh-Cheng Chen (University of California, Davis), Naixue Xiong (Tianjin University), Xuanzi Hu (Dongguan Polytechnic), and W.S Hwang (National Chiao Tung University) The Application of Clustering Mining Technology in E-Commerce Website 104 Bin Li (Dongguan Polytechnic) and Yeh-Cheng Chen (University of California, Davis)

Section 4A: Privacy and Security

FakeBuster: A Robust Fake Account Detection by Activity Analysis 108 Yeh-Cheng Chen (University of California, Davis) and Shyhtsun Felix Wu (University of Califonia, Davis) A Dynamic Passcode System for Mobile Purchasing without Bank Card 111 Yong-Zhang Luo (Neusoft Institute of ), Cheng Zheng (Neusoft Institute of Guangdong), Chenglian Liu (Neusoft Institute of Guangdong), and Biying Zhao (Neusoft Institute of Guangdong) Dynamic Multi-Server Searchable Encryption Scheme Based on Concept Hierarchy 114 Haiping Huang (Nanjing University of Posts and Telecommunications), Pai Yu (Nanjing University of Posts and Telecommunications), and Min Wu (Nanjing University of Posts and Telecommunications) Cache Optimization Method to Reduce Network Traffic in Communication Systems 122 Ruey-Shun Chen (Dongguan Polytechnic), Yu-Xi Hu (Northwestern Polytechnical University), Xiaopeng Fan (Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences), Yeh-Cheng Chen (University of California, Davis), Shi-Jinn Horng (Dongguan Polytechnic), T.-C. Wang (National Chiao Tung University), and Naixue Xiong (Tianjin University) Analysis and Research Based on Differential Privacy Protection Related Algorithms 126 Xuanxuan Wang (Nanjing University of Posts and Telecommunications), Peng Li (Nanjing University of Posts and Telecommunications), He Xu (Nanjing University of Posts and Telecommunications), Zhuang Xu (Nanjing University of Posts and Telecommunications), and Yujie Zhang (Nanjing University of Posts and Telecommunications) Research on Container Load Strategy Based on Microservices 134 Yang Zhou (Nanjing University of Posts and Telecommunicationsv), Peng Li (Nanjing University of Posts and Telecommunications), and He Xu (Nanjing University of Posts and Telecommunications)

vii Plaintext Checkable Encryption with Check Delegation: New Models and Simple Constructions 140 Yu-Chi Chen (Yuan Ze University) Gesture Recognition Based on Tri-Axis Accelerometer Using 1D Gabor Filters 146 Zhenyu He () Personal Identification via Heartbeat Signal 152 Shi-Jinn Horng ( National Taiwan University of Science and Technology & Dongguan Polytechnic), Xuan-Zi Hu (Dongguan Polytechnic), Bin Li (Dongguan Polytechnic), and Naixue Xiong (Tianjin University) Gesture Recognition Applications Developed in Embedded Systems 157 Shi-Jinn Horng (National Taiwan University of Science and Technology & Dongguan Polytechnic), Xuan-Zi Hu (Dongguan Polytechnic), Wen-Lian Cao (Dongguan Polytechnic), and Naixue Xiong (Tianjin University)

Section 5A: Big Data Processing and Deep Learning

Accelerating Backward Convolution of Convolutional Neural Networks on BWDSP 163 Jiangping Yang (University of Science and Technology of China), Qilong Zheng (University of Science and Technology of China), Gai Wang (University of Science and Technology of China), and Maohui Lu (University of Science and Technology of China) Time Series Forecasting Using Sequence-to-Sequence Deep Learning Framework 171 Shengdong Du (Southwest Jiaotong University), Tianrui Li (Southwest Jiaotong University), and Shi-Jinn Horng (National Taiwan University of Science and Technology) Virtual Sample Generation Approach for Imbalanced Classification 177 Cao Lu (Sun Yat-sen University & ) and Hong Shen (Sun Yat-sen University & University of Adelaide) Vision-Based Lane Detection and Lane-Marking Model Inference: A Three-Step Deep Learning Approach 183 Yueen Ma (University of Toronto), Vincent Havyarimana (Ecole Normale Superieure), Jing Bai (Key Laboratory of Intelligent Perception and Image Understanding of Ministry of Education), and Zhu Xiao ( University) A Post-Processing Approach in Moving Objects Detection via Feature Pyramid Networks 191 Li Lin ( University), Bin Wang (), and Yinjuan Gu (Shanghai University) Softmax Regression by Using Unsupervised Ensemble Learning 196 Ping Deng (Southwest Jiaotong University), Hongjun Wang (Southwest Jiaotong University), Shi-Jinn Horng (National Taiwan University of Science and Technology), Dexian Wang (China West Normal University), Ji Zhang (Southwest Jiaotong University), and Hengxue Zhou (Southwest Jiaotong University) ECNet: An Efficient and Context-Aware Network for Street Scene Parsing 202 Bin Jiang (), Wenxuan Tu (Hunan University), Chao Yang (Hunan University), and Yi Xiao (Hunan University)

viii Face Inpainting with Dilated Skip Architecture and Multi-Scale Adversarial Networks 211 Bin Jiang (Hunan University), Hongyu Liu (Hunan University), Chao Yang (Hunan University), Shangrong Huang (Hunan University), and Yi Xiao (Hunan University) Deep Candlestick Predictor: A Framework toward Forecasting the Price Movement from Candlestick Charts 219 Siou-Jhih Guo (Tamkang University), Fu-Chun Hsu (Fong-Fu Intelligence Inc.), and Chih-Chieh Hung (Tamkang University) Distributed Representation Learning of Knowledge Graph with Diverse Information 227 Wenzhong Guo ( University), Yuanfei Dai (Fuzhou University), Yiyan Chen (Fuzhou University), Xing Chen (Fuzhou University), and Neal Xiong (Northeastern State University) Object Proposal Generation for Unsupervised Object Localization 235 Wenzhong Guo (Fuzhou University), Renjie Lin (Fuzhou University), Shiping Wang (Fuzhou University), and Neal Xiong (Northeastern State University)

Author Index 243

ix