Research article Special Issues

Encapsulating model complexity and landscape-scale analyses of state-and-transition simulation models: an application of ecoinformatics and juniper encroachment in sagebrush steppe ecosystems

  • State-and-transition simulation modeling relies on knowledge of vegetation composition and structure (states) that describe community conditions, mechanistic feedbacks such as fire that can affect vegetation establishment, and ecological processes that drive community conditions as well as the transitions between these states. However, as the need for modeling larger and more complex landscapes increase, a more advanced awareness of computing resources becomes essential. The objectives of this study include identifying challenges of executing state-and-transition simulation models, identifying common bottlenecks of computing resources, developing a workflow and software that enable parallel processing of Monte Carlo simulations, and identifying the advantages and disadvantages of different computing resources. To address these objectives, this study used the ApexRMS® SyncroSim software and embarrassingly parallel tasks of Monte Carlo simulations on a single multicore computer and on distributed computing systems. The results demonstrated that state-and-transition simulation models scale best in distributed computing environments, such as high-throughput and high-performance computing, because these environments disseminate the workloads across many compute nodes, thereby supporting analysis of larger landscapes, higher spatial resolution vegetation products, and more complex models. Using a case study and five different computing environments, the top result (high-throughput computing versus serial computations) indicated an approximate 96.6% decrease of computing time. With a single, multicore compute node (bottom result), the computing time indicated an 81.8% decrease relative to using serial computations. These results provide insight into the tradeoffs of using different computing resources when research necessitates advanced integration of ecoinformatics incorporating large and complicated data inputs and models.

    Citation: Michael S. O'Donnell. Encapsulating model complexity and landscape-scale analyses of state-and-transition simulation models: an application of ecoinformatics and juniper encroachment in sagebrush steppe ecosystems[J]. AIMS Environmental Science, 2015, 2(3): 464-493. doi: 10.3934/environsci.2015.3.464

    Related Papers:

    [1] Hongyan Xu . Digital media zero watermark copyright protection algorithm based on embedded intelligent edge computing detection. Mathematical Biosciences and Engineering, 2021, 18(5): 6771-6789. doi: 10.3934/mbe.2021336
    [2] Qichao Ying, Jingzhi Lin, Zhenxing Qian, Haisheng Xu, Xinpeng Zhang . Robust digital watermarking for color images in combined DFT and DT-CWT domains. Mathematical Biosciences and Engineering, 2019, 16(5): 4788-4801. doi: 10.3934/mbe.2019241
    [3] Chuanda Cai, Changgen Peng, Jin Niu, Weijie Tan, Hanlin Tang . Low distortion reversible database watermarking based on hybrid intelligent algorithm. Mathematical Biosciences and Engineering, 2023, 20(12): 21315-21336. doi: 10.3934/mbe.2023943
    [4] Xinyi Wang, He Wang, Shaozhang Niu, Jiwei Zhang . Detection and localization of image forgeries using improved mask regional convolutional neural network. Mathematical Biosciences and Engineering, 2019, 16(5): 4581-4593. doi: 10.3934/mbe.2019229
    [5] Boyi Zeng, Jun Zhao, Shantian Wen . A textual and visual features-jointly driven hybrid intelligent system for digital physical education teaching quality evaluation. Mathematical Biosciences and Engineering, 2023, 20(8): 13581-13601. doi: 10.3934/mbe.2023606
    [6] Eric Ke Wang, Nie Zhe, Yueping Li, Zuodong Liang, Xun Zhang, Juntao Yu, Yunming Ye . A sparse deep learning model for privacy attack on remote sensing images. Mathematical Biosciences and Engineering, 2019, 16(3): 1300-1312. doi: 10.3934/mbe.2019063
    [7] Guanghua Fu, Qingjuan Wei, Yongsheng Yang . Bearing fault diagnosis with parallel CNN and LSTM. Mathematical Biosciences and Engineering, 2024, 21(2): 2385-2406. doi: 10.3934/mbe.2024105
    [8] Hao Chen, Shengjie Li, Xi Lu, Qiong Zhang, Jixining Zhu, Jiaxin Lu . Research on bearing fault diagnosis based on a multimodal method. Mathematical Biosciences and Engineering, 2024, 21(12): 7688-7706. doi: 10.3934/mbe.2024338
    [9] Xuehu Yan, Xuan Zhou, Yuliang Lu, Jingju Liu, Guozheng Yang . Image inpainting-based behavior image secret sharing. Mathematical Biosciences and Engineering, 2020, 17(4): 2950-2966. doi: 10.3934/mbe.2020166
    [10] Haifeng Song, Weiwei Yang, Songsong Dai, Haiyan Yuan . Multi-source remote sensing image classification based on two-channel densely connected convolutional networks. Mathematical Biosciences and Engineering, 2020, 17(6): 7353-7377. doi: 10.3934/mbe.2020376
  • State-and-transition simulation modeling relies on knowledge of vegetation composition and structure (states) that describe community conditions, mechanistic feedbacks such as fire that can affect vegetation establishment, and ecological processes that drive community conditions as well as the transitions between these states. However, as the need for modeling larger and more complex landscapes increase, a more advanced awareness of computing resources becomes essential. The objectives of this study include identifying challenges of executing state-and-transition simulation models, identifying common bottlenecks of computing resources, developing a workflow and software that enable parallel processing of Monte Carlo simulations, and identifying the advantages and disadvantages of different computing resources. To address these objectives, this study used the ApexRMS® SyncroSim software and embarrassingly parallel tasks of Monte Carlo simulations on a single multicore computer and on distributed computing systems. The results demonstrated that state-and-transition simulation models scale best in distributed computing environments, such as high-throughput and high-performance computing, because these environments disseminate the workloads across many compute nodes, thereby supporting analysis of larger landscapes, higher spatial resolution vegetation products, and more complex models. Using a case study and five different computing environments, the top result (high-throughput computing versus serial computations) indicated an approximate 96.6% decrease of computing time. With a single, multicore compute node (bottom result), the computing time indicated an 81.8% decrease relative to using serial computations. These results provide insight into the tradeoffs of using different computing resources when research necessitates advanced integration of ecoinformatics incorporating large and complicated data inputs and models.


    Copyright protection of multimedia contents have become a great concern over the decades and it also developed a series of techniques, the most notable of which are the cryptographic schemes and digital watermarking methods. The cryptographic schemes, also called digital signature methods, are usually based on a hashing function [1] or image feature extraction [2,3,4,5] followed by a public key encryption system. Unfortunately, the digital signature-based methods are mainly used for integrity authentication rather than ownership protection, because no explicit copyright information can be extracted from digital products. On the other hand, digital watermarking methods embed a watermark into the image without causing significant damage to its usage, and later it can be extracted from the watermarked image for ownership verification. Generally speaking, an effective watermarking scheme should be perceptually invisible and robust to possible attacks including signal processing, geometric distortion, and intentional manipulations.

    In recent years, robust watermarking systems has become an intriguing research topic, among them are the spatial domain methods [6,7,8,9,10,11,12,13,14,15] and the transform domain methods [16,17,18,19,20,21,22]. Either way, though, in order to gain robustness, as Cox's prominent argument in [23], the destination of the watermark should be the perceptually most significant components of the carrier signal, despite the risk of potential fidelity distortions. Obviously, this criterion would lead to a counter-balance paradox between robustness and imperceptibility, since improving the robustness will have a notable impact on the visual quality of the image. To alleviate this problem, many adaptive watermarking embedding algorithms emerged, including watermark embedding strength adaption [24,25,26] and embedding position adaption [27], etc. However, neither of these methods has solved this issue with finality. Additionally, most of the existing robust watermarking methods essentially design or utilize some stable features of the image to embed the watermark. For example, transform domain methods typically embed the watermark in the DCT coefficients or the wavelet subbands of the image because they are relatively stable. The transform process can be regarded as the robustness feature extraction from the original image. Nevertheless, artificially designing and extracting robust features is no easy task, especially when the method is supposed to resist one or several particular attacks.

    Based on these considerations, we propose a new scheme for multiple digital image copyright protection to displace the traditional image watermarking architecture by resorting to the deep neural network technique, which has achieved superior performance on feature extraction and representation [28,29,30]. In order to get around the paradox between robustness and imperceptibility, we no longer modify the image but represent the copyright message by exploring the patterns of image data itself through a neural network. To be specific, a large number of selected image blocks along with the message bits as their corresponding labels will be feed into the network, enabling the network to extract copyright message from images by classifying the image blocks to target labels (bits). Moreover, to enhance the robustness, we provide a preventive strategy to further train the network, namely, feeding image blocks from the post-attacked images to the network. By doing this, the neural network could automatically extract those classification features that are robust to certain attacks. The trained neural network can then be stored in a database (or added to the image header) for future use in ownership verification. Finally, we found the neural network-based scheme is particularly suitable for multiple images copyright protection. Based on experiments, a well-designed neural network is capable of representing the copyright message for a considerable number of images under various intentional attacks. Superior robustness and perfect imperceptibility are achieved in the proposed scheme.

    This paper is organized as follows. Section 2 outlines the proposed system for image copyright protection. Some discussion and analysis for the scheme are described in Section 3. The experiments in Section 4 suggest our scheme is of considerable load capacity and strong robustness to a variety of attacks. Finally, Section 5 concludes the paper and discuss possible enhancements to the proposed scheme.

    This section will elaborate on the proposed scheme in detail. The image copyright protection scheme consists of two parts: copyright image registration where we train a neural network for a number of given images, and copyright verification where the stored neural network extracts copyright message from the images to be verified.

    The neural network in our scheme can be partly analogous to the hashing procedure in general digital signature systems, in the sense that the neural network serves as a mapping from images to discrete numeric values (digests). But we hope that our scheme could not only reduce the data but also name an explicit message bitstream for copyright verification. We then train a neural network to transform the image blocks into copyright message. The procedure for training is showed in Figure 1:

    Figure 1.  Network training procedure.

    In a most common application scenario, our scheme starts with a series of RGB images $ I = (I_1, I_2, \cdots, I_n) $ to be registered to our verification system and binary sequences of copyright message for each image $ W_j = (w_1, w_2, \cdots, w_m), w_i\in \{0, 1\}, j = 1, 2, \cdots, n $. In practice, the choice of $ n $ and $ m $ depends on the capacity of the network. In general, as the number of images and the copyright message length are increased, the optimal network structure to which should be altered. In this paper, we adopted a 5-layer fully connected neural network structured in Figure 2. The choice of network is further elaborated in Section 3.4.

    Figure 2.  Proposed neural network structure.

    Before training the network, expanded training data is yield from an attack set $ A = {A_1, A_2, \cdots, A_r} $ including $ r $ types of attack, the proposed $ A $ is showed in Table 1. For each image $ I_k $, the corresponding attacked image set is denoted by $ A(I_k) = \{A_1(I_k), A_2(I_k), \cdots, A_r(I_k)\} $.

    Table 1.  Attacks included in the training set.
    Notation Type of attack
    $ A_1 $ Superposition Gaussian noise with $ \mu=0, \sigma=0.2 $
    $ A_2 $ Superposition Gaussian noise with $ \mu=0, \sigma=0.2 $
    $ A_3 $ Superposition Gaussian noise with $ \mu=0, \sigma=0.2 $
    $ A_4 $ JPEG Compression with quality factor 50
    $ A_5 $ JPEG Compression with quality factor 30
    $ A_6 $ JPEG Compression with quality factor 10
    $ A_7 $ Mean value filtering with kernel size $ 7\times7 $
    $ A_8 $ Median filtering with kernel size $ 5\times5 $
    $ A_9 $ Gaussian filtering with kernel size $ 7\times7 $
    $ A_{10} $ Resize image to $ 64\times64 $ (bilinear interpolation)

     | Show Table
    DownLoad: CSV

    To determine the location of the candidate training data, $ I $ is processed as follows: Normalize the size of all the images in $ I $ to $ M\times M $, and then divide each image into non-overlapping blocks of size $ b\times b $. For each image, calculate keypoints with diameter $ b $ of these normalized images, and locate $ m $ strongest keypoints at block scale. In other words, for each image, we choose the $ m $ image blocks containing the strongest keypoints and then save the location information of these chosen image blocks. These $ m $ image blocks are supposed to be the input of the network and the corresponding output should be the $ m $ message bits.

    Then we normalize the images in the attacked image set $ A(I_k), k = 1, \cdots, n $ and choose the corresponding image blocks with the saved location information. Taking all $ n $ images in $ I $ into account, we train the neural network to map $ nm(r+1) $ image blocks to the $ n $ copyright message bitstreams for $ n $ images. The trained neural network can then be stored in a database (or added to the image header) for ownership verification.

    During the copyright verification stage, the copyright owner use the trained network to extract copyright messages from the registered images to declare the ownership.

    Continuing from the application scenario above, the image distributor registered an image on a neural network, let's say $ I_c $, which has possibly been through some malicious or non-malicious manipulations. As Figure 3 shows, in order to feed the trained network $ N_{IW} $, we should first normalize the image $ I_c $ to size $ M\times M $ and then divide it into $ b\times b $ non-overlapping blocks as the registration stage does. It is worth noting that during verification stage the distributor has already known the location information of the registered image blocks, and thus making it possible for distributor to locate the image blocks and feed them to the network sequentially. After this, the trained neural network $ N_{IW} $, serving as a copyright message extractor, is able to yield a bit sequence $ W_{c} $ from the possibly distorted registered image $ I_c $, and $ W_{c} $ is supposed to be the copyright message for image $ I_c $ to verify the copyright ownership.

    Figure 3.  Copyright message extraction procedure.

    In this section, we give some explanation and discussion on the overall and details of the design scheme.

    The universality theorem [31,32] ensures that a neural network can fit any mapping from image blocks to the classification labels, as long as there is no such case where identical image blocks are mapped to different labels. Actually, this unexpected case is possible in our training set, in another word, it is possible that two identical image blocks (or highly similar image blocks) are chosen to participate in the training process and unfortunately they are paired with two different message bits. However, we have taken the following measures to avoid this block collision case as much as possible.

    ● Choosing the keypoint-included blocks reduces the probability of such coincidence. The more complex of an image block is, the less possible it coincides with another image block. What's more, there are much more similar simple areas than the complex areas in the natural image samples, thus, those areas containing complex contents are preferable in our scheme.

    ● Controlling the number of candidate image blocks also lessens the co-occurrence possibility of two similar image blocks. Our choices are based on the complexity of the image blocks, in this manner, as the number of blocks raises, the chance of simple blocks' co-occurrence raises.

    ● Likewise, an appropriate block size also suppresses the possibility of such coincidence. An undersized block may lead to more similarities in content. However, an oversized block may decrease the copyright message capacity of each image. For this reason, we determined an appropriate block size to further optimize the feasibility.

    With the neural network's universality theorem and the collision avoidance rules listed above, we are able to guarantee the feasibility of the proposed scheme (See Section 4 for detailed settings). But still, we hope the trained network would be equipped with robustness for representing copyright message to adapt to lossy channel and resist malicious manipulation.

    The robustness of the scheme comes from three parts, the error tolerance of the neural network, the preventive training set, and the robust feature extraction. Firstly, error tolerance is the inherent nature of the proposed neural network. The neural network essentially works as a soft classifier which gives a probabilistic, rather than a hard yes/no classification result, allowing the disturbed signals to be classified to the expected class.

    Secondly, since the expanded training set has already contained varied attacked images, a well trained neural network guarantees perfect extraction of those image blocks in the training set. So our scheme is capable of resisting certain attacks that contains in the preventive training set. Furthermore, the robustness of the proposed scheme can be enhanced by adding new attacked images to the preventive training set. As such, it enables a dynamic evolution of robustness according to practical demands.

    Finally, our scheme also gets it robustness from the generalization ability of the neural network. Above all, the process that the neural network maps the original image block and the attacked image block to the same label is exactly the process where the neural network extracts the robust features and then classifies them. In this way, even for those attacked images that are not included in the training set, the trained network is still able to perform a correct classification by recognizing the robust features.

    The capacity of our scheme is plainly defined as the number of "image block-message bit pair" that the neural network could effectively enroll. Due to transmission and storage considerations, we expect a single neural network could register as many images as possible. Interestingly, we have experimentally determined such a fact that choosing the same number of blocks from many disparate images instead of a small number of images, will significantly enlarge the network's capacity. This is partly because choosing blocks from various images would provide more diverse pixel distributions, and then the image blocks probabilistically could have more identifiable features for the neural network. In conclusion, to train the network in an economical manner, we prefer a shorter copyright message for each image but a richer image set to be registered by the network.

    Of particular note is that the robustness and capacity of our scheme also depend closely on the network structure and training algorithm, but confined to the length of the paper, we only focus on the network structure proposed above. All experiments in Section 4 that will further explore the robustness and capacity of our scheme are based on this structure.

    Our choice of fully connected neural network rather than the more effective CNN in image feature extraction is out of the resource utilization and classification optimization considerations. Firstly, as the proposed method is based on image blocks, to increase the length of the represented copyright message, the block size should not be too large otherwise there will not be sufficient room to cover copyright message length (expanding normalization size can also increase the number of image blocks, but we expect more 'content' in a block rather than simply more pixels). However, on a smaller scale we can no longer bring CNN's superiority into full play. To be specific, when the block size is $ 8\times 8 $ as Section 4 does, the convolutional kernel size of CNN can either be too small to capture the spatial correlation details among adjacent region or be too large to effectively reduce the number of parameters.

    Moreover, our classification task might become rigorous at times. For example, sometimes we need the network be able to distinguish one image block from another highly similar one (See co-occurrence occasion described in Section 3.1) where leaving out any of the details can bring about classification failure, thus we dropped weight sharing and local connection to avoid any information loss and finally chose fully connected neural network to extract robust features and represent the copyright message.

    In this section, experiments are performed to evaluate the proposed scheme, which should be able to extract a copyright message from each registered image, even though the image could have suffered disturbance or damage. We take a number of RGB images from "Standard" test images and BossBase-1.0 as copyright images (Figure 4 shows some of them), and pseudo-random binary sequences as copyright messages. For each image we take 64 bits as it copyright message. All the experiments were performed on Windows PC with Intel® CoreTM I7-4720 CPU at 2.6GHz, 8GB RAM with Tensorflow version 1.6.0.

    Figure 4.  Some of the RGB images with size of $ 512\times 512 $ in our experiment.

    The network architecture used in this paper is shown in Figure 2. The input image block is first flattened and then sequentially passed through four layers of gradually narrowed fully connected networks. Each layer is activated by the ReLU function, and the final output of the two nodes passes through the Softmax layer to obtain the probability of corresponding classification labels. The mini-batch size used for training is 32, and Adam is adopted to optimize the network for 600 training epochs on the training set.

    Based on the analysis and discussion in Section 3, this part mainly shows the general resistance of the proposed scheme to various attacks, including the superposition Gaussian noise with zero mean and standard deviation ranging from 5% to 30% of the maximum pixel value 255, JPEG compression with quality factor 70, 50, 30 and 10, resizing and various filtering attacks such as Guassian filtering and median filtering (some of the attacked sample images are illustrated in Figure 5). To further explore the capacity of our network, different numbers of images including 10, 20, 30, 40, 90 images are registered to 5 neural networks respectively in the following experiments, and then we evaluate the each network's extraction accuracy under different attacks. It should be noted that each image corresponds to an individual 64-bit copyright message. Therefore, we are actually testing the neural network's capability of 640, 1280, 1920, 2560 and 5760 bits copyright messages. In general, we take the ratio of the number of correctly extracted message bits to the total number of bits as extraction accuracy to evaluate the performance.

    Figure 5.  Some of the attacked images in the test: (a) Original image ($ 512\times 512 $), (b) JPEG compressed with qf = 30, (c) JPEG compressed with qf = 10, (d) Gaussian noise with $ \mu = 76.5 $, (e) Gaussian filtering with kernel size $ 11\times 11 $, (f) Median filtering with kernel size $ 11\times 11 $.

    Table 2 shows the average extraction accuracy rate after superposition Gaussian additive noise attacked the images, for each image, we register 64 bit copyright message for it. The noise is normally distributed with zero mean and standard deviation Std, which ranges from 0 to 76.5 in the experiment. At a larger Std, as the numbers of images participated in the training raises, the robustness performance presents a regular decline trend. Table 3 shows the robustness against JPEG compression. In the case of lower compression quality factors, the extraction accuracy rate reduced slightly. Even for those quality factors that are not involved in training, the trained network can still achieve a reasonably high extraction accuracy rate. Table 4 shows the extraction accuracy rate for three kinds of filtering attacks including mean value filtering, Gaussian filtering, and median filtering. With the same size of the filtering kernel, the extraction accuracy of the Gaussian filtering is relatively higher than the other two methods, since Gaussian filter impacts less to the image than the mean and median filters. Table 5 shows the robustness against rescaling attacks. The extraction is almost unaffected when the rescaling size is larger than the normalization size, which is by no means difficult to foretell. When the rescaling size is smaller than the normalization size, the extraction accuracy reduced considerably at 20% and 12.5% rescaling level. Still, expanding the training set can effectively improve the reduction.

    Table 2.  Extraction accuracy rate after adding Gaussian noise*.
    Number of bits\Std. 0(no attack) 11.25(5%) 22.5(10%) $\underline{51(20\%)}$ 76.5(30%)
    640 for 10 images 1 1 0.984 0.972 0.911
    1280 for 20 images 0.989 0.989 0.984 0.950 0.884
    1920 for 30 images 0.997 0.997 0.992 0.950 0.887
    2560 for 40 images 0.998 0.997 0.991 0.953 0.889
    5760 for 90 images 0.988 0.986 0.976 0.916 0.831

     | Show Table
    DownLoad: CSV

    *The underlined items are included in the attack set during the training process.

    Table 3.  Extraction accuracy rate after JPEG compression.
    Number of bits\JPEG QF 100(no attack) 70 50 $\underline{30}$ $\underline{10}$
    640 for 10 images 1 1 1 1 0.984
    1280 for 20 images 1 1 0.990 0.990 0.978
    1920 for 30 images 0.997 0.997 0.997 0.997 0.990
    2560 for 40 images 0.997 0.997 0.997 0.997 0.987
    5760 for 90 images 0.988 0.976 0.976 0.976 0.951

     | Show Table
    DownLoad: CSV
    Table 4.  Extraction accuracy rate after various filtering attacks.
    Filter Mean value filtering Gaussian filtering Median filtering
    Kernel size $\underline{ 7 \times 7 }$ $ 9\times 9 $ $\underline{ 7\times 7 }$ $ 9\times 9 $ $ 11\times 11 $ $\underline{ 3\times 3 }$ $ 5\times 5 $
    640/10 0.997 0.969 1 0.997 0.964 1 0.986
    1280/20 0.977 0.930 1 0.989 0.962 1 0.982
    1920/30 0.983 0.945 0.997 0.993 0.969 0.997 0.985
    2560/40 0.962 0.933 0.995 0.977 0.932 0.996 0.972
    5760/90 0.956 0.893 0.986 0.972 0.923 0.990 0.968

     | Show Table
    DownLoad: CSV
    Table 5.  Extraction accuracy rate after resizing attacks.
    Rescaling rate 50% 25% 20% 12.5%
    Rescaled size $ 256\times 256 $ $ 128\times 128 $ $ 100\times 100 $ $ 64\times64 $
    640/10 1 1 0.989 0.850
    1280/20 0.989 0.989 0.978 0.741
    1920/30 0.997 0.997 0.984 0.739
    2560/40 0.997 0.997 0.967 0.672
    5760/90 0.988 0.988 0.949 0.672

     | Show Table
    DownLoad: CSV

    This paper proposes a deep neural network based large scale image copyright protection scheme. Instead of modifying the original image to embed the copyright message as the traditional watermarking system, the proposed scheme trains a neural network to register multiple images, and when copyright verification is required, the neural network could represent a copyright message for each image by classifying image blocks to message bits. With the error tolerance of the neural network and a preventive training strategy, the proposed scheme is remarkably robust to many attacks, including additive noise, JPEG compression, filtering and resizing. Moreover, this scheme is especially appropriate for multiple images' copyright verification as experimental results showed. Lastly, the preventive method can be modified for specific attacks in practice, thus a stronger robustness can be obtained by expanding the preventive training set. For now, our scheme is only based on a single network structure which clearly limited its robustness and capacity. To further improve its performance with alternative network structure will be a promising study in the future.

    This work was supported in part by the National Natural Science Foundation of China (No. 61772549, 61872448, U1736214, 61602508, and 61601517), and the National Key R & D Program of China(No. 2016YFB0801303 and 2016QY01W0105).

    The authors declare no conflict of interest.

    [1] Bestelmeyer BT, Moseley K, Shaver PL, et al. (2010) Practical guidance for developing state-and-transition models. Rangelands 32: 23-30.
    [2] Frid L, Hanna D, Korb N, et al. (2013) Evaluating alternative weed management strategies for three Montana landscapes. Invasive Plant Sci Manag 6: 48-59. doi: 10.1614/IPSM-D-11-00054.1
    [3] Costanza JK, Terando AJ, Mckerrow AJ, et al. (2015) Modeling climate change, urbanization, and fire effects on Pinus palustris ecosystems of the southeastern U.S. J Environ Manage 151: 186-199. doi: 10.1016/j.jenvman.2014.12.032
    [4] Halofsky JE, Hemstrom MA., Conklin DR, et al. (2013) Assessing potential climate change effects on vegetation using a linked model approach. Ecol Modell 266: 131-143. doi: 10.1016/j.ecolmodel.2013.07.003
    [5] Wilson T, Sleeter B, Sleeter R, et al. (2014) Land-use threats and protected areas: a scenario-based, landscape level approach. Land 3: 362-389. doi: 10.3390/land3020362
    [6] Daniel CJ, Frid L. Predicting landscape vegetation dynamics using state-and-transition simulation models. Proceedings of the First Landscape State-and-Transition Simulation Modeling Conference, June 14-16, 2011. 2012. p. 5-22.
    [7] Booker K, Huntsinger L, Bartolome JW, et al. (2013) What can ecological science tell us about opportunities for carbon sequestration on arid rangelands in the United States? Glob Environ Chang 23: 240-51. doi: 10.1016/j.gloenvcha.2012.10.001
    [8] Bagchi S, Briske DD, Wu XB, et al. (2012) Empirical assessment of state-and-transition models with a long-term vegetation record from the Sonoran Desert. Ecol Appl 22: 400-411. doi: 10.1890/11-0704.1
    [9] Creutzburg MK, Halofsky JS, Hemstrom MA. Using state-and-transition models to project cheatgrass and juniper invasion in southeastern Oregon sagebrush steppe. Proceedings of the First Landscape State-and-Transition Simulation Modeling Conference, June 14-16, 2011. 2012. p.73-84.
    [10] Strand EK, Vierling LA, Bunting SC (2009) A spatially explicit model to predict future landscape composition of aspen woodlands under various management scenarios. Ecol Modell 220: 175-191. doi: 10.1016/j.ecolmodel.2008.09.010
    [11] Chambers JC, Bradley BA, Brown CS, et al. (2014) Resilience to stress and disturbance, and resistance to Bromus tectorum L. invasion in cold desert shrublands of western North America. Ecosystems 17: 360-375.
    [12] Steele CM, Bestelmeyer BT, Burkett LM, et al. (2012) Spatially explicit representation of state-and-transition models. Rangel Ecol Manag 65: 213-222. doi: 10.2111/REM-D-11-00047.1
    [13] Bestelmeyer BT, Goolsby DP, Archer SR (2011) Spatial perspectives in state-and-transition models: a missing link to land management? J Appl Ecol 48: 746-757. doi: 10.1111/j.1365-2664.2011.01982.x
    [14] ApexRMS. SyncroSim. SyncoSim ST-Sim software. 2014. Available from: http://wiki.syncrosim.com/
    [15] Evers LB, Miller RF, Doescher PS, et al. (2013) Simulating current successional trajectories in sagebrush ecosystems with multiple disturbances using a state-and-transition modeling framework. Rangel Ecol Manag 66: 313-329. doi: 10.2111/REM-D-11-00220.1
    [16] Vajda A. Programming Many-Core Chips. 2011th ed. Springer; 2011.
    [17] Gropp W, Lusk E, Skjellum A. Using MPI: portable parallel programming with the message-passing interface (Scientific and Engineering Computation). 3rd ed. The MIT Press; 2014.
    [18] Hennessy JL, Patterson DA. Computer architecture: a quantitative approach. 5th ed. Elsevier; 2012.
    [19] Schauer B (2008) Multicore processors-a necessity. ProQuest Discovery Guides 1-14.
    [20] Chapman MT (2005) The benefits of dual-core processors in high-performance computing. White Paper 18.
    [21] Microsoft Developer Network. Memory limits for Windows releases. Available from: http://msdn.microsoft.com/en-us/library/aa366778.aspx
    [22] nixCraft. Maximum memory and CPU limitations for Linux server. Available from: http://www.cyberciti.biz/tips/maximum-memory-and-cpu-limitations-for-linux-server.html
    [23] Flynn MJ (1972) Some computer organizations and their effectiveness. IEEE Trans Comput 100: 948-960.
    [24] Rauber T, Runger G. Parallel programming for multicore and cluster systems. Springer-Verlag, Berlin, Heidelberg; 2010.
    [25] Darema F. The SPMD Model: Past, Present and Future. In: Cotronis Y, Dongarra J, editors. In Recent Advances in Parallel Virtual Machine and Message Passing Interface. Springer Berlin Heidelberg; 2001. p. 1.
    [26] Chang C-C, Czajkowski G, Eicken T Von, Kesselman C. Evaluating the Performance Limitations of MPMD Communication. ACM/IEEE SC 1997 Conf. 1997; 1-10.
    [27] El-Rewini H, Abd-El-Barr M. Advanced computer architecture and parallel processing (Wiley Series on Parallel and Distributed Computing). 1st ed. Wiley-Interscience; 2005.
    [28] Patterson DA, Hennessy JL. Computer organization and design. 5th ed. Green T, McFadden N, editors. Morgan Kaufmann; 2013.
    [29] Silva LME, Buyya R. Parallel programming models and paradigms. High Performance Cluster Computing: Programming and Applications, Volume 2. 1st ed. Prentice Hall; 1999. p. 4-27.
    [30] Navarro CA, Hitschfeld-Kahler N, Mateu L (2014) A survey on parallel computing and its applications in data-parallel problems using GPU architectures. Commun Comput Phys 15: 285-329.
    [31] Center for High Throughput Computing U of W-M. HTCondorTM Version 8.0.1 manual. 2013. Available from:http://research.cs.wisc.edu/htcondor/
    [32] ApexRMS. Getting started. Sample data, ST-Sim-SpatialSample-V2-1-0. 2014. Available from: http://wiki.syncrosim.com/index.php?title=Getting_Started
    [33] Karl JW, Laliberte AS, Rango A. Spatial dependence of predictions from image segmentation: a methods to determine appropriate scales for producing land-management information. Int Arch Photogramm Remote Sens Spat Inf Sci 2007; XXXVIII (4/C7).
    [34] Miller RF, Rose JA (1999) Fire history and western juniper encroachment in sagebrush steppe. J Range Manag 52: 550-559. doi: 10.2307/4003623
    [35] Baruch-Mordo S, Evans JS, Severson JP, et al. (2013) Saving sage-grouse from the trees: a proactive solution to reducing a key threat to a candidate species. Biol Conserv 167: 233-241. doi: 10.1016/j.biocon.2013.08.017
    [36] Petersen SL, Stringham TK, Roundy BA. (2009) A process-based application of state-and-transition models: a case study of western juniper (Juniperus occidentalis) encroachment. Rangel Ecol Manag 62: 186-192. doi: 10.2111/06-171.1
    [37] Bates JD, Sharp RN, Davies KW (2014) Sagebrush steppe recovery after fire varies by development phase of Juniperus occidentalis woodland. Int J Wildl Fire 23: 117-130. doi: 10.1071/WF12206
    [38] Rowland MM, Suring LH, Tausch RJ, et al. (2010) Dynamics of western juniper woodland expansion into sagebrush communities in central Oregon. Communities 16: 13.
    [39] Kachergis EJ, Knapp CN, Fernandez-Gimenez ME, et al. (2013) Tools for resilience management: multidisciplinary development of state-and-transition models for northwest Colorado. Ecol Soc 18: 39.
    [40] Xamarin. Mono project. Cross platform, open source.NET framework. 2015. Available from: http://www.mono-project.com/
    [41] SchedMD. Simple Linux resource utility manager workload manager. Software and Online Help. 2014. Available from: http://slurm.schedmd.com/
    [42] Tatham S. PuTTY. PuTTY. 2014. Available from: http://www.putty.org/
    [43] Prikryl M. WinSCP free SFTP, SCP, and FTP client for Windows. WinSCP 5.5.6 released. 2014. Available from: http://winscp.net/eng/index.php
    [44] CycleComputing. Cycle Computing, Better answers. Faster. CycleServer. 2014. Available from: http://www.cyclecomputing.com/
    [45] Massie M, Contributors. Ganglia monitoring system. 2014. Available from: http://ganglia.sourceforge.net/
    [46] Conservancy SF. Samba, Opening Windows to a wider world. 2015. Available from: https://www.samba.org/
    [47] Karp AH, Flatt HP (1990) Measuring parallel processor performance. Commun ACM 33: 539-543. doi: 10.1145/78607.78614
    [48] Moturi CA, Maiyo SK (2012) Use of MapReduce for data mining and data optimization on a web portal. Int J Comput Appl 56: 39-43.
    [49] Zhang X, Yan Y. Modeling and characterizing heterogeneous parallel networks computing of workstations of Texas at San Antonio. Parallel and Distributed Processing, 1995 Proceedings Seventh IEEE Symposium on IEEE. 1995. p. 25-34.
    [50] Oracle. Oracle technology network. Oracle VM VirtualBox. 2014. Available from: http://www.oracle.com/technetwork/server-storage/virtualbox/downloads/index.html
    [51] National Aeronautics and Space Administration. Open Government Initiative. NASA Nebula Cloud Computing Platform. 2015. Available from: http://www.nasa.gov/open/plan/nebula.html
    [52] Amazon. Amazon Web Services. Amazon EC2. 2015. Available from: http://aws.amazon.com/ec2/
    [53] Microsoft. Microsoft Azure. The Cloud for Modern Business. 2015. Available from: http://www.windowsazure.com/en-us/
    [54] Google. Google Cloud Platform. Google App Engine: Platform as a Service. 2015. Available from: https://developers.google.com/appengine/
    [55] Eri T, Mahmood Z, Puttini R. Cloud computing: concepts, technology & architecture. Prentice Hall; 2013.
    [56] Alford T, Morton G. The economics of cloud computing. Booz Allen Hamilton. 2011. Available from: http://broadcast.rackspace.com/hosting_knowledge/whitepapers/Cloudonomics-The_Economics_of_Cloud_Computing.pdf
    [57] Kondo D, Javadi B, Malecot P, Cappello F, et al. Cost-benefit analysis of cloud computing versus desktop grids. 2009 IEEE International Symposium on Parallel & Distributed Processing. 2009. p. 1-12.
    [58] Nanath K, Pillai R (2013) A model for cost-benefit analysis of cloud computing. J Int Technol Inf Manag 22: 93-118.
    [59] GDAL. GDAL-Geospatial data abstraction library. Open Source Geospatial Foundation. 2015. Available from: http://www.gdal.org/
    [60] SQLite. An Asynchronous I/O module for SQLite. 2015. Available from: http://www.sqlite.org/asyncvfs.html
  • This article has been cited by:

    1. Preeti Garg, R. Rama Kishore, Performance comparison of various watermarking techniques, 2020, 79, 1380-7501, 25921, 10.1007/s11042-020-09262-1
  • Reader Comments
  • © 2015 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(6442) PDF downloads(1169) Cited by(1)

Figures and Tables

Figures(8)  /  Tables(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog