Current IssuePrevious Issue   Next Issue

Volume 22 No. 6
21 December 2017

Feng Tian,Xukun Shen,Xianmei Liu,Maojun Cao

2017, 22(6): 551-563.   doi:10.23919/TST.2017.8195340
Abstract ( 424 HTML ( 75   PDF(39622KB) ( 434 )   Save

The explosive increase in the number of images on the Internet has brought with it the great challenge of how to effectively index, retrieve, and organize these resources. Assigning proper tags to the visual content is key to the success of many applications such as image retrieval and content mining. Although recent years have witnessed many advances in image tagging, these methods have limitations when applied to high-quality and large-scale training data that are expensive to obtain. In th...

Lei Chen,Jing Zhang,Lijun Cai,Ziyun Deng

2017, 22(6): 564-585.   doi:10.23919/TST.2017.8195341
Abstract ( 349 HTML ( 32   PDF(28441KB) ( 247 )   Save

The distance dynamics model is excellent tool for uncovering the community structure of a complex network. However, one issue that must be addressed by this model is its very long computation time in large-scale networks. To identify the community structure of a large-scale network with high speed and high quality, in this paper, we propose a fast community detection algorithm, the F-Attractor, which is based on the distance dynamics model. The main contributions of the F-Attractor are as fol...

Tonglee Chung,Bin Xu,Yongbin Liu,Juanzi Li,Chunping Ouyang

2017, 22(6): 586-594.   doi:10.23919/TST.2017.8195342
Abstract ( 248 HTML ( 12   PDF(731KB) ( 247 )   Save

Word embedding has drawn a lot of attention due to its usefulness in many NLP tasks. So far a handful of neural-network based word embedding algorithms have been proposed without considering the effects of pronouns in the training corpus. In this paper, we propose using co-reference resolution to improve the word embedding by extracting better context. We evaluate four word embeddings with considerations of co-reference resolution and compare the quality of word embedding on the task of word ...

Fulan Qian,Yang Gao,Shu Zhao,Jie Tang,Yanping Zhang

2017, 22(6): 595-608.   doi:10.23919/TST.2017.8195343
Abstract ( 283 HTML ( 14   PDF(2494KB) ( 231 )   Save

Link prediction is an important task that estimates the probability of there being a link between two disconnected nodes. The similarity-based algorithm is a very popular method that employs the node similarities to find links. Most of these types of algorithms focus only on the contribution of common neighborhoods between two nodes. In sociological theory relationships within three degrees are the strong ties that can trigger social behaviors. Thus, strong ties can provide more connection op...

Luyang Li,Bing Qin,Wenjing Ren,Ting Liu

2017, 22(6): 609-618.   doi:10.23919/TST.2017.8195344
Abstract ( 197 HTML ( 9   PDF(587KB) ( 245 )   Save

Truth discovery aims to resolve conflicts among multiple sources and find the truth. Conventional methods for truth discovery mainly investigate the mutual effect between the reliability of sources and the credibility of statements. These methods use real numbers, which have a lower representation capability than vectors to represent the reliability. In addition, neural networks have not been used for truth discovery. In this work, we propose memory-network-based models to address truth disco...

Ming Liu,Bo Lang,Zepeng Gu,Ahmed Zeeshan

2017, 22(6): 619-632.   doi:10.23919/TST.2017.8195345
Abstract ( 359 HTML ( 18   PDF(6323KB) ( 299 )   Save

Long-document semantic measurement has great significance in many applications such as semantic searchs, plagiarism detection, and automatic technical surveys. However, research efforts have mainly focused on the semantic similarity of short texts. Document-level semantic measurement remains an open issue due to problems such as the omission of background knowledge and topic transition. In this paper, we propose a novel semantic matching method for long documents in the academic domain. To ac...

Xiaocheng Feng,Lifu Huang,Bing Qin,Ying Lin,Heng Ji,Ting Liu

2017, 22(6): 633-645.   doi:10.23919/TST.2017.8195346
Abstract ( 262 HTML ( 6   PDF(2229KB) ( 195 )   Save

Neural networks have been widely used for English name tagging and have delivered state-of-the-art results. However, for low resource languages, due to the limited resources and lack of training data, taggers tend to have lower performance, in comparison to the English language. In this paper, we tackle this challenging issue by incorporating multi-level cross-lingual knowledge as attention into a neural architecture, which guides low resource name tagging to achieve a better performance. Spe...

Ruifeng Xu,Jiannan Hu,Qin Lu,Dongyin Wu,Lin Gui

2017, 22(6): 646-659.   doi:10.23919/TST.2017.8195347
Abstract ( 304 HTML ( 10   PDF(1213KB) ( 217 )   Save

In this paper, we present a new challenging task for emotion analysis, namely emotion cause extraction. In this task, we focus on the detection of emotion cause a.k.a the reason or the stimulant of an emotion, rather than the regular emotion classification or emotion component extraction. Since there is no open dataset for this task available, we first designed and annotated an emotion cause dataset which follows the scheme of W3C Emotion Markup Language. We then present an emotion cause dete...

Xian Wu,Kun Xu,Peter Hall

2017, 22(6): 660-674.   doi:10.23919/TST.2017.8195348
Abstract ( 615 HTML ( 43   PDF(3748KB) ( 516 )   Save

This paper presents a survey of image synthesis and editing with Generative Adversarial Networks (GANs). GANs consist of two deep networks, a generator and a discriminator, which are trained in a competitive way. Due to the power of deep networks and the competitive training manner, GANs are capable of producing reasonable and realistic images, and have shown great capability in many image synthesis and editing applications. This paper surveys recent GAN papers regarding topics including, but...

Wusheng Zhang,Jiao Lin,Weiping Xu,Haohuan Fu,Guangwen Yang

2017, 22(6): 675-681.   doi:10.23919/TST.2017.8195349
Abstract ( 296 HTML ( 5   PDF(2103KB) ( 187 )   Save

Managing software packages in a scientific computing environment is a challenging task, especially in the case of heterogeneous systems. It is error prone when installing and updating software packages in a sophisticated computing environment. Testing and performance evaluation in an on-the-fly manner is also a troublesome task for a production system. In this paper, we discuss a package management scheme based on containers. The newly developed method can ease the maintenance complexity and ...

Hongxin Chen,Shuo Feng,Xin Pei,Zuo Zhang,Danya Yao

2017, 22(6): 682-690.   doi:10.23919/TST.2017.8195350
Abstract ( 270 HTML ( 7   PDF(4994KB) ( 254 )   Save

Time headway is an important index used in characterizing dangerous driving behaviors. This research focuses on the decreasing tendency of time headway and investigates its association with crash occurrence. An autoregressive (AR) time-series model is improved and adopted to describe the dynamic variations of average daily time headway. Based on the model, a simple approach for dangerous driving behavior recognition is proposed with the aim of significantly decreasing headway. The effectivity...

Adnan O. M. Abuassba,Yao Zhang,Xiong Luo,Dezheng Zhang,Wulamu Aziguli

2017, 22(6): 691-701.   doi:10.23919/TST.2017.8195351
Abstract ( 349 HTML ( 14   PDF(1456KB) ( 213 )   Save

The Extreme Learning Machine (ELM) is an effective learning algorithm for a Single-Layer Feedforward Network (SLFN). It performs well in managing some problems due to its fast learning speed. However, in practical applications, its performance might be affected by the noise in the training data. To tackle the noise issue, we propose a novel heterogeneous ensemble of ELMs in this article. Specifically, the correntropy is used to achieve insensitive performance to outliers, while implementing N...

Ming Yang,Xiaodan Gu,Zhen Ling,Changxin Yin,Junzhou Luo

2017, 22(6): 702-713.   doi:10.23919/TST.2017.8195352
Abstract ( 257 HTML ( 4   PDF(1791KB) ( 265 )   Save

Tor is pervasively used to conceal target websites that users are visiting. A de-anonymization technique against Tor, referred to as website fingerprinting attack, aims to infer the websites accessed by Tor clients by passively analyzing the patterns of encrypted traffic at the Tor client side. However, HTTP pipeline and Tor circuit multiplexing techniques can affect the accuracy of the attack by mixing the traffic that carries web objects in a single TCP connection. In this paper, we propose...

Yuezhi Zhou,Di Zhang,Naixue Xiong

2017, 22(6): 714-732.   doi:10.23919/TST.2017.8195353
Abstract ( 303 HTML ( 19   PDF(3655KB) ( 278 )   Save

With the rapid development of pervasive intelligent devices and ubiquitous network technologies, new network applications are emerging, such as the Internet of Things, smart cities, smart grids, virtual/augmented reality, and unmanned vehicles. Cloud computing, which is characterized by centralized computation and storage, is having difficulty meeting the needs of these developing technologies and applications. In recent years, a variety of network computing paradigms, such as fog computing, ...

Muge Li,Liangyue Li,Feiping Nie

2017, 22(6): 733-738.   doi:10.23919/TST.2017.8195354
Abstract ( 345 HTML ( 2   PDF(1557KB) ( 262 )   Save

Retrieving the most similar objects in a large-scale database for a given query is a fundamental building block in many application domains, ranging from web searches, visual, cross media, to document retrievals. State-of-the-art approaches have mainly focused on capturing the underlying geometry of the data manifolds. Graph-based approaches, in particular, define various diffusion processes on weighted data graphs. Despite success, these approaches rely on fixed-weight graphs, making ranking...