Current IssuePrevious Issue   Next Issue

Volume 22 No. 2
21 September 2017

Yu-E Sun,He Huang,Xiang-Yang Li,Yang Du,Miaomiao Tian,Hongli Xu,Mingjun Xiao

2017, 22(2): 119-134.   doi:10.23919/TST.2017.7889635
Abstract ( 221 HTML ( 5   PDF(575KB) ( 226 )   Save

In recent years, auction theory has been extensively studied and many state-of-the-art solutions have been proposed aiming at allocating scarce resources. However, most of these studies assume that the auctioneer is always trustworthy in the sealed-bid auctions, which is not always true in a more realistic scenario. Besides the privacy-preserving issue, the performance guarantee of social efficiency maximization is also crucial for auction mechanism design. In this paper, we study the auction...

Zhibin Zhao,Jiahong Sun,Lan Yao,Xun Wang,Jiahong Chu,Huan Liu,Ge Yu

2017, 22(2): 135-148.   doi:10.23919/TST.2017.7889636
Abstract ( 208 HTML ( 2   PDF(958KB) ( 176 )   Save

Hashtags are important metadata in microblogs and are used to mark topics or index messages. However, statistics show that hashtags are absent from most microblogs. This poses great challenges for the retrieval and analysis of these tagless microblogs. In this paper, we summarize the similarity between microblogs and short-message-style news, and then propose an algorithm, named 5WTAG, for detecting microblog topics based on a model of five Ws (When, Where, Who, What, hoW). As five-W attribut...

Dan Tao,Zhaowen Lin,Bingxu Wang

2017, 22(2): 149-159.   doi:10.23919/TST.2017.7889637
Abstract ( 280 HTML ( 1   PDF(1134KB) ( 169 )   Save

With cloud computing technology becoming more mature, it is essential to combine the big data processing tool Hadoop with the Infrastructure as a Service (IaaS) cloud platform. In this study, we first propose a new Dynamic Hadoop Cluster on IaaS (DHCI) architecture, which includes four key modules: monitoring, scheduling, Virtual Machine (VM) management, and VM migration modules. The load of both physical hosts and VMs is collected by the monitoring module and can be used to design resource s...

Zhiqiong Wang,Junchang Xin,Hongxu Yang,Shuo Tian,Ge Yu,Chenren Xu,Yudong Yao

2017, 22(2): 160-173.   doi:10.23919/TST.2017.7889638
Abstract ( 242 HTML ( 1   PDF(914KB) ( 218 )   Save

The Extreme Learning Machine (ELM) and its variants are effective in many machine learning applications such as Imbalanced Learning (IL) or Big Data (BD) learning. However, they are unable to solve both imbalanced and large-volume data learning problems. This study addresses the IL problem in BD applications. The Distributed and Weighted ELM (DW-ELM) algorithm is proposed, which is based on the MapReduce framework. To confirm the feasibility of parallel computation, first, the fact that matri...

Peng Li,Hong Luo,Yan Sun

2017, 22(2): 174-184.   doi:10.23919/TST.2017.7889639
Abstract ( 208 HTML ( 1   PDF(522KB) ( 138 )   Save

In this paper, we target a similarity search among data supply chains, which plays an essential role in optimizing the supply chain and extending its value. This problem is very challenging for application-oriented data supply chains because the high complexity of the data supply chain makes the computation of similarity extremely complex and inefficient. In this paper, we propose a feature space representation model based on key points, which can extract the key features from the subsequence...

Chunhong Zhang,Miao Zhou,Xiao Han,Zheng Hu,Yang Ji

2017, 22(2): 185-197.   doi:10.23919/TST.2017.7889640
Abstract ( 255 HTML ( 1   PDF(2738KB) ( 223 )   Save

Knowledge graph representation has been a long standing goal of artificial intelligence. In this paper, we consider a method for knowledge graph embedding of hyper-relational data, which are commonly found in knowledge graphs. Previous models such as Trans (E, H, R) and CTransR are either insufficient for embedding hyper-relational data or focus on projecting an entity into multiple embeddings, which might not be effective for generalization nor accurately reflect real knowledge. To overcome ...

Yingnan Zhang,Minqing Zhang,Xiaoyuan Yang,Duntao Guo,Longfei Liu

2017, 22(2): 198-209.   doi:10.23919/TST.2017.7889641
Abstract ( 201 HTML ( 2   PDF(775KB) ( 165 )   Save

In this paper, we analyze the video steganography technique, which is used to ensure national security and the confidentiality of the information of governmental agencies and enterprises. Videos may be used to transmit secrets and conduct covert communication. As such, we present an algorithm based on a secret sharing scheme and an Error-Correcting Code (ECC), which combines Grey Relational Analysis (GRA) with a partition mode in video compression standard H.264/AVC. First, we process secret ...

Kai Chen,Yong Dou,Qi Lv,Zhengfa Liang

2017, 22(2): 210-217.   doi:10.23919/TST.2017.7889642
Abstract ( 276 HTML ( 1   PDF(1308KB) ( 151 )   Save

Instance-specific algorithm selection technologies have been successfully used in many research fields, such as constraint satisfaction and planning. Researchers have been increasingly trying to model the potential relations between different candidate algorithms for the algorithm selection. In this study, we propose an instance-specific algorithm selection method based on multi-output learning, which can manage these relations more directly. Three kinds of multi-output learning methods are u...

Bo Zhao,Yu Xiao,Yuqing Huang,Xiaoyu Cui

2017, 22(2): 218-225.   doi:10.23919/TST.2017.7889643
Abstract ( 239 HTML ( 2   PDF(1034KB) ( 470 )   Save

In TrustZone architecture, the Trusted Application (TA) in the secure world does not certify the identity of Client Applications (CA) in the normal world that request data access, which represents a user data leakage risk. This paper proposes a private user data protection mechanism in TrustZone to avoid such risks. We add corresponding modules to both the secure world and the normal world and authenticate the identity of CA to prevent illegal access to private user data. Then we analyze the ...