Current IssuePrevious Issue   Next Issue

Volume 23 No. 1
05 February 2018

Yihao Jia, Ying Liu, Gang Ren, Lin He

2018, 23(1): 1-12.   doi:10.26599/TST.2018.9010025
Abstract ( 231 HTML ( 4   PDF(1445KB) ( 181 )   Save

IP source address spoofing is regarded as one of the most prevalent components when launching an anonymous invasion, especially a Distributed Denial-of-Service (DDoS) attack. Although Source Address Validations (SAVs) at the access network level are standardized by the Internet Engineering Task Force (IETF), SAV at the inter-Autonomous System (AS) level still remains an important issue. To prevent routing hijacking, the IETF is constructing a Resource Public Key Infrastructure (RPKI) as a uni...

Lishan Li, Gang Ren, Ying Liu, Jianping Wu

2018, 23(1): 13-21.   doi:10.26599/TST.2018.9010020
Abstract ( 163 HTML ( 0   PDF(1439KB) ( 297 )   Save

With the rapid developmen of the Internet, the exhaustion of IPv4 address limited the development of the Internet for years. IPv6, as the core technology of the next generation Internet, has since been rapidly deployed around the world. As the widely deployed address configuration protocol, DHCPv6 is responsible for allocating globally unique IPv6 addresses to clients, which is the basis for all the network services. However, the initial design of the DHCPv6 protocol gave little consideration...

Shenglin Zhang, Ying Liu, Dan Pei, Baojun Liu

2018, 23(1): 22-34.   doi:10.26599/TST.2018.9010008
Abstract ( 154 HTML ( 0   PDF(3436KB) ( 169 )   Save

As a path vector protocol, Border Gateway Protocol (BGP) messages contain an entire Autonomous System (AS) path to each destination for breaking arbitrary long AS path loops. However, after observing the global routing data from RouteViews, we find that BGP AS Path Looping (BAPL) behavior does occur and in fact can lead to multi-AS forwarding loops in both IPv4 and IPv6. The number and ratio of BAPLs in IPv4 and IPv6 on a daily basis from August 1, 2011 to August 31, 2015 are analyzed. Moreov...

Wei Zhang, Feng Kong, Liming Yang, Yunfang Chen, Mengyuan Zhang

2018, 23(1): 35-46.   doi:10.26599/TST.2018.9010053
Abstract ( 158 HTML ( 1   PDF(1893KB) ( 127 )   Save

Random walks are a standard tool for modeling the spreading process in social and biological systems. But in the face of large-scale networks, to achieve convergence, iterative calculation of the transition matrix in random walk methods consumes a lot of time. In this paper, we propose a three-stage hierarchical community detection algorithm based on Partial Matrix Approximation Convergence (PMAC) using random walks. First, this algorithm identifies the initial core nodes in a network by clas...

Lei Jiang, Kang Zhang

2018, 23(1): 47-64.   doi:10.26599/TST.2018.9010054
Abstract ( 250 HTML ( 0   PDF(10562KB) ( 42 )   Save

Competition in the apparel market has developed from preliminary price competition, quality competition, and scale competition to the current state of brand competition. The phenomenon of brand overlap cannot be avoided by apparel enterprises during the process of building and manufacturing their brands. This paper has selected nine identification elements of three dimensions, which we used to construct an apparel brand overlap identification model. This model is based on the theories of cust...

Muhammad Waqas, Guftaar Ahmad Sardar Sidhu, Tayyaba Jabeen, Muhammad Afaq Ahmad, Muhammad Awais Javed

2018, 23(1): 65-74.   doi:10.26599/TST.2018.9010055
Abstract ( 154 HTML ( 0   PDF(1111KB) ( 113 )   Save

In this paper, we consider the power optimization problem in Orthogonal Frequency Division Multiplexing (OFDM)-based relay-enhanced device-to-device (D2D) communication. In a single cell transmission scenario, dual-hop communication is assumed in which each D2D user re-uses the spectrum of just one Cellular User (CU). In this work, we formulate a joint optimization scheme under a Decode-and-Forward (DF) relaying protocol to maximize the sum throughput of D2D and cellular networks via power al...

Chao Gong, Chunhui Xu, Masakazu Ando, Xiangming Xi

2018, 23(1): 75-86.   doi:10.26599/TST.2018.9010057
Abstract ( 162 HTML ( 1   PDF(5833KB) ( 128 )   Save

In this paper, the portfolio selection problem under Cumulative Prospect Theory (CPT) is investigated and a model of portfolio optimization is presented. This model is solved by coupling scenario generation techniques with a genetic algorithm. Moreover, an Adaptive Real-Coded Genetic Algorithm (ARCGA) is developed to find the optimal solution for the proposed model. Computational results show that the proposed method solves the portfolio selection model and that ARCGA is an effective and stab...

Zongguang Yu, Xiaobo Su, Zhenhai Chen, Jiaxuan Zou, Jinghe Wei, Hong Zhang, Yan Xue

2018, 23(1): 87-94.   doi:10.26599/TST.2018.9010030
Abstract ( 201 HTML ( 0   PDF(4469KB) ( 126 )   Save

A feed-forward Common-Mode (CM) charge control circuit for a high-speed Charge-Domain (CD) pipelined Analog-to-Digital Converter (ADC) is presented herein. This study aims at solving the problem whereby the precision of CD pipelined ADCs is restricted by the variation in input CM charge, which can compensate for CM charge errors caused by a variation in CM charge input in real time. Based on the feed-forward CM charge control circuit, a 12-bit 250-MS/s CD pipelined ADC is designed and realize...

Qiuxia Chen, Dongdong Ding, Yue Zheng

2018, 23(1): 95-103.   doi:10.26599/TST.2018.9010026
Abstract ( 207 HTML ( 1   PDF(2132KB) ( 180 )   Save

Indoor pedestrian localization is of great importance for diverse mobile applications. Many indoor localization approaches have been proposed; among them, Radio Signal Strength (RSS)-based approaches have the advantage of existing infrastructures and avoid the cost of infrastructure deployment. However, the RSS-based localization approaches suffer from poor localization accuracy when the RSS fingerprints are sparse, as illustrated by actual experiments in this study. Here, we propose a novel ...