Current IssuePrevious Issue   Next Issue

Volume 23 No. 2
05 April 2018

Yajun Liu, Junying Zhang, Aimin Li, Zhaowen Liu, Zhongzhen He, Xiguo Yuan, Shouheng Tuo

2018, 23(2): 115-125.   doi:10.26599/TST.2018.9010056
Abstract ( 236 HTML ( 2   PDF(721KB) ( 178 )   Save

piwi-interacting RNAs (piRNAs) are valuable biomarkers, but functional studies are still very limited. Recent research shows that piRNA-mediated cleavage acts on Transposable Elements (TEs), messenger RNAs (mRNAs), and long non-coding RNAs (lncRNAs). This study aimed to predict cancer-associated piRNA-mRNA and piRNA-lncRNA interactions as well as piRNA regulatory functions. Four cancer types (BRCA, HNSC, KIRC, and LUAD) were investigated. Interactions were identified by integrated analysis of...

Tao Li, Shidong Zhou

2018, 23(2): 126-134.   doi:10.26599/TST.2018.9010058
Abstract ( 155 HTML ( 0   PDF(535KB) ( 121 )   Save

This paper investigates the achievable secrecy rate region of the Gaussian two-way wiretap channel, which describes the simultaneous secure two-way transmission of a confidential message. Through adjusting the time-sharing factor and the rate at which the random secret key is fed back, the allocation and optimization for the secrecy rates of two-way communication are achieved. Under peak and average power constraints, the achievable secrecy rate regions of the two-way communication are derive...

Li Li, Shuofeng Wang, Meng Li, Jiyuan Tan

2018, 23(2): 135-144.   doi:10.26599/TST.2018.9010059
Abstract ( 153 HTML ( 0   PDF(845KB) ( 188 )   Save

In this study, we investigate travel mode choice behavior between taxi and subway with an emphasis on the influence of traveling convenience. In the first stage, we examine the Origin-Destination (OD) points of Beijing taxi trips and compare these locations with the respective nearest subway station. Statistics reveal several interesting conclusions. First, for approximately 24.89% of all trips, no convenient subway connections exist between the OD pairs. As such, a taxi becomes the only viab...

Lu Tian, Shengjin Wang

2018, 23(2): 145-156.   doi:10.26599/TST.2018.9010060
Abstract ( 150 HTML ( 0   PDF(601KB) ( 109 )   Save

Person re-identification (person re-id) aims to match observations on pedestrians from different cameras. It is a challenging task in real word surveillance systems and draws extensive attention from the community. Most existing methods are based on supervised learning which requires a large number of labeled data. In this paper, we develop a robust unsupervised learning approach for person re-id. We propose an improved Bag-of-Words (iBoW) model to describe and match pedestrians under differe...

Weixia Li, Guoyuan Wu, Yi Zhang, Matthew J. Barth

2018, 23(2): 157-171.   doi:10.26599/TST.2018.9010061
Abstract ( 328 HTML ( 13   PDF(2189KB) ( 292 )   Save

Various intelligent transportation systems and strategies for reducing vehicle fuel consumption andemissions have been developed. Energy and emissions could be reduced with the compromise of travel time in some environment-focused Connected Vehicle (CV) applications, which highlighted performance measures in terms of mobility and sustainability. Nevertheless, few studies have focused on safety assessment of such CV applications. In this study, a CV-based eco-driving application, namely, Eco-A...

Hailong Xu, Xiaowei Cui, Mingquan Lu

2018, 23(2): 172-183.   doi:10.26599/TST.2018.9010019
Abstract ( 149 HTML ( 0   PDF(989KB) ( 217 )   Save

The Spatial Only Processing Power Inversion (SOP-PI) algorithm is frequently used in Global Navigation Satellite System (GNSS) adaptive array receivers for interference mitigation because of its simplicity ofimplementation. This study investigates the effects of SOP-PI on receiver measurements for high-precisionapplications. Mathematical deductions show that if an array with a centro-symmetrical geometry is used, ideally, SOP-PI is naturally bias-free; however, this no longer stands when non-...

Xue Li, Hongfu Liu

2018, 23(2): 184-194.   doi:10.26599/TST.2018.9010063
Abstract ( 250 HTML ( 16   PDF(614KB) ( 262 )   Save

Consensus clustering aims to fuse several existing basic partitions into an integrated one; this has been widely recognized as a promising tool for multi-source and heterogeneous data clustering. Owing to robust and high-quality performance over traditional clustering methods, consensus clustering attracts much attention, and much efforts have been devoted to develop this field. In the literature, the K-means-based Consensus Clustering (KCC) transforms the consensus clustering problem into a ...

Fugang Liu, Jiawei Xu, Feng Hu, Chao Wang, Jie Wu

2018, 23(2): 195-202.   doi:10.26599/TST.2018.9010032
Abstract ( 196 HTML ( 0   PDF(631KB) ( 132 )   Save

Public communication infrastructures are susceptible to disasters. Thus, the Emergency Communication Networks (ECNs) of small groups are necessary to maintain real-time communication during disasters. Given that ECNs are self-built by users, the unavailability of infrastructures and the openness of wireless channels render them insecure. ECN security, however, is a rarely studied issue despite of its importance. Here, we propose a security scheme for the ECNs of small groups. Our scheme is ba...

Chao Wang, Siwen Chen, Yanwei Yang, Feng Hu, Fugang Liu, Jie Wu

2018, 23(2): 203-222.   doi:10.26599/TST.2018.9010080
Abstract ( 483 HTML ( 15   PDF(883KB) ( 330 )   Save

With the rapid development and wide deployment of wireless technology, Wi-Fi signals have no longer been confined to the Internet as a communication medium. Wi-Fi signals will be modulated again by human actions when propagating indoors, carrying rich human body state information. Therefore, a novel wireless sensing technology is gradually emerging that can realize gesture recognition, human daily activity detection, identification, indoor localization and human body tracking, vital signs det...