Current IssuePrevious Issue   Next Issue

Volume 20 No. 6
15 December 2015

Dan Tao,Zhaowen Lin,Cheng Lu

2015, 20(6): 537-544.   doi:10.1109/TST.2015.7349926
Abstract ( 250 HTML ( 5   PDF(1091KB) ( 503 )   Save

With respect to security, the use of various terminals in the mobile Internet environment is problematic. Traditional terminal testing methods cannot simulate actual testing environments; thus, the test results do not accurately reflect the security of terminals. To address this problem, we designed and developed a cloud platform based automated testing system for the mobile Internet. In this system, virtualization and automation technology are utilized to integrate mobile terminals into the ...

Goutham Kamath,Lei Shi,Edmond Chow,Wenzhan Song,Junjie Yang

2015, 20(6): 545-559.   doi:10.1109/TST.2015.7349927
Abstract ( 256 HTML ( 1   PDF(2837KB) ( 735 )   Save

Modern seismic sensors are capable of recording high precision vibration data continuously for several months. Seismic raw data consists of information regarding earthquake's origin time, location, wave velocity, etc. Currently, these high volume data are gathered manually from each station for analysis. This process restricts us from obtaining high-resolution images in real-time. A new in-network distributed method is required that can obtain a high-resolution seismic tomography in real time...

Chengjian Liu,Kai Ouyang,Xiaowen Chu,Hai Liu,Yui-Wing Leung

2015, 20(6): 560-573.   doi:10.1109/TST.2015.7349928
Abstract ( 300 HTML ( 3   PDF(1973KB) ( 678 )   Save

Large-scale key-value stores are widely used in many Web-based systems to store huge amount of data as (key, value) pairs. In order to reduce the latency of accessing such (key, value) pairs, an in-memory cache system is usually deployed between the front-end Web system and the back-end database system. In practice, a cache system may consist of a number of server nodes, and fault tolerance is a critical feature to maintain the latency Service-Level Agreements (SLAs). In this paper, we presen...

Dong Wang,Bo Bai,Wei Chen

2015, 20(6): 574-582.   doi:10.1109/TST.2015.7349929
Abstract ( 276 HTML ( 0   PDF(983KB) ( 568 )   Save

In a coordinated multipoint transmission system with centralized architecture for saving power consumption, total power metric is minimized while completely using the backhaul capacity and maintaining the minimum target data rate. The problem is formulated as a mixed integer optimization problem, which is difficult to solve. To overcome this problem, a joint user selection and rate adaptation scheme is developed based on the water-filling rate adaptation with the given user set and the power ...

Talluri Lakshmi Siva Rama Krishna,Thirumalaisamy Ragunathan,Sudheer Kumar Battula

2015, 20(6): 583-593.   doi:10.1109/TST.2015.7349930
Abstract ( 237 HTML ( 0   PDF(739KB) ( 582 )   Save

File-sharing semantics is used by the file systems for sharing data among concurrent client processes in a consistent manner. Session semantics is a widely used file-sharing semantics in Distributed File Systems (DFSs). The main disadvantage of session semantics is that writes to an open file are visible to the concurrent client processes only during their next session. Recently, “linearizability semantics” was introduced in BlobSeer DFS, in which a Read Client Process (RCP) can...

Yichen Zheng,Xiangyu Xi,Yifan Zhuang,Yi Zhang

2015, 20(6): 594-601.   doi:10.1109/TST.2015.7349931
Abstract ( 212 HTML ( 1   PDF(4727KB) ( 1185 )   Save

To simulate the passenger behavior in subway system, a Dynamic Parameters Cellular Automaton (DPCA) model is put forward in this paper. Pedestrian traffic flows during waiting, getting on or off, and traveling can be simulated. The typical scenario in Beijing Subway Line 13 is modeled to analyze the passenger behavior in subway system. By comparing simulation results with statistical ones, the correctness and practicality of the DPCA model are verified. At last, the additional results made by...

Yanping Zhang,Zihui Jing,Yiwen Zhang

2015, 20(6): 602-612.   doi:10.1109/TST.2015.7349932
Abstract ( 191 HTML ( 1   PDF(748KB) ( 313 )   Save

In the era of big data, data intensive applications have posed new challenges to the field of service composition. How to select the optimal composited service from thousands of functionally equivalent services but different Quality of Service (QoS ) attributes has become a hot research in service computing. As a consequence, in this paper, we propose a novel algorithm MR-IDPSO (MapReduce based on Improved Discrete Particle Swarm Optimization), which makes use of the improved discrete Particl...

Jing Qin,Xinyue Liu,Hongfei Lin

2015, 20(6): 613-619.   doi:10.1109/TST.2015.7350013
Abstract ( 329 HTML ( 1   PDF(1194KB) ( 947 )   Save

An audio information retrieval model based on Manifold Ranking (MR) is proposed, and ranking results are improved using a Relevance Feedback (RF) algorithm. Timbre components are employed as the model's main feature. To compute timbre similarity, extracting the spectrum features for each frame is necessary; the large set of frames is clustered using a Gaussian Mixture Model (GMM) and expectation maximization. The typical spectra frame from GMM is drawn as data points, and MR assigns each data...

Shu Zhao,Wang Ke,Jie Chen,Feng Liu,Menghan Huang,Yanping Zhang,Jie Tang

2015, 20(6): 620-626.   doi:10.1109/TST.2015.7350014
Abstract ( 225 HTML ( 1   PDF(896KB) ( 783 )   Save

Community structure is one of the most important features in real networks and reveals the internal organization of the vertices. Uncovering accurate community structure is effective for understanding and exploiting networks. Tolerance Granulation based Community Detection Algorithm (TGCDA) is proposed in this paper, which uses tolerance relation (namely tolerance granulation) to granulate a network hierarchically. Firstly, TGCDA relies on the tolerance relation among vertices to form an init...

Jiawei Xu,Keda Wang,Chao Wang,Feng Hu,Zhenhua Zhang,Shiyi Xu,Jie Wu

2015, 20(6): 627-633.   doi:10.1109/TST.2015.7350015
Abstract ( 246 HTML ( 1   PDF(1283KB) ( 504 )   Save

Wireless sensor networks are a favorite target of Byzantine malicious attackers because of their limited energy, low calculation capability, and dynamic topology, and other important characteristics. The Byzantine Generals Problem is one of the classical problems in the area of fault tolerance, and has wide application, especially in distributed databases and systems. There is a lot of research in agreement and replication techniques that tolerate Byzantine faults. However, most of this work ...

Mingming Jiang,Dandan Song,Lejian Liao,Feida Zhu

2015, 20(6): 634-643.   doi:10.1109/TST.2015.7350016
Abstract ( 250 HTML ( 1   PDF(1080KB) ( 838 )   Save

Intuitively, not only do ratings include abundant information for learning user preferences, but also reviews ccompanied by ratings. However, most existing recommender systems take rating scores for granted and discard the wealth of information in accompanying reviews. In this paper, in order to exploit user profiles' information embedded in both ratings and reviews exhaustively, we propose a Bayesian model that links a traditional Collaborative Filtering (CF) technique with a topic model sea...

Daming Zhang,Yongpan Liu,Shuangchen Li,Tongda Wu,Huazhong Yang

2015, 20(6): 644-660.   doi:10.1109/TST.2015.7350017
Abstract ( 283 HTML ( 0   PDF(2972KB) ( 313 )   Save

As performance requirements for bus-based embedded System-on-Chips (SoCs) increase, more and more on-chip application-specific hardware accelerators (e.g., filters, FFTs, JPEG encoders, GSMs, and AES encoders) are being integrated into their designs. These accelerators require system-level tradeoffs among performance, area, and scalability. Accelerator parallelization and Point-to-Point (P2P) interconnect insertion are two effective system-level adjustments. The former helps to boost the comp...

Hongli Zhang,Cong Wang,Wenhui Fan

2015, 20(6): 661-671.   doi:10.1109/TST.2015.7350018
Abstract ( 211 HTML ( 2   PDF(3347KB) ( 828 )   Save

A Projection Pursuit Dynamic Cluster (PPDC) model optimized by Memetic Algorithm (MA) was proposed to solve the practical problems of nonlinearity and high dimensions of sample data, which appear in the context of evaluation or prediction in complex systems. Projection pursuit theory was used to determine the optimal projection direction; then dynamic clusters and minimal total distance within clusters (min TDc) were used to build a PPDC model. 17 agronomic traits of 19 tomato varieties were ...