Current IssuePrevious Issue   Next Issue

Volume 18 No. 1
05 February 2013

Junbo Zhang,Dong Xiang,Tianrui Li,Yi Pan

2013, 18(1): 1-9.   doi:10.1109/TST.2013.6449402
Abstract ( 43 HTML ( 0   PDF(696KB) ( 44 )   Save

MapReduce is a very popular parallel programming model for cloud computing platforms, and has become an effective method for processing massive data by using a cluster of computers. X-to-MapReduce (X is a program language) translator is a possible solution to help traditional programmers easily deploy an application to cloud systems through translating sequential codes to MapReduce codes. Recently, some SQL-to-MapReduce translators emerge to translate SQL-like queries to MapReduce codes and h...

Yaoxue Zhang,Yuezhi Zhou

2013, 18(1): 10-21.   doi:10.1109/TST.2013.6449403
Abstract ( 35 HTML ( 0   PDF(707KB) ( 83 )   Save

The rapid advancements in hardware, software, and computer networks have facilitated the shift of the computing paradigm from mainframe to cloud computing, in which users can get their desired services anytime, anywhere, and by any means. However, cloud computing also presents many challenges, one of which is the difficulty in allowing users to freely obtain desired services, such as heterogeneous OSes and applications, via different light-weight devices. We have proposed a new paradigm by sp...

Liang Hu,Xilong Che,Zhenzhen Xie

2013, 18(1): 22-33.   doi:10.1109/TST.2013.6449404
Abstract ( 29 HTML ( 0   PDF(1904KB) ( 48 )   Save

The Kepler General Purpose GPU (GPGPU) architecture was developed to directly support GPU virtualization and make GPGPU cloud computing more broadly applicable by providing general purpose computing capability in the form of on-demand virtual resources. This paper describes a baseline GPGPU cloud system built on Kepler GPUs, for the purpose of exploring hardware potential while improving task performance. This paper elaborates a general scheme which defines the whole cloud system into ...

Gaochao Xu,Junjie Pang,Xiaodong Fu

2013, 18(1): 34-39.   doi:10.1109/TST.2013.6449405
Abstract ( 17 HTML ( 0   PDF(1709KB) ( 23 )   Save

Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. This article introduces a better load balance model for the public cloud based on the cloud partitioning concept with a switch mechanism to choose different strategies for different situations. The algorithm applies the game theory to the load balancing strategy to improve the efficiency in the public cloud envir...

Zhen Chen,Fuye Han,Junwei Cao,Xin Jiang,Shuo Chen

2013, 18(1): 40-50.   doi:10.1109/TST.2013.6449406
Abstract ( 15 HTML ( 0   PDF(9205KB) ( 6 )   Save

Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. New emerging botnet attacks degrade the status of Internet security further. To address these problems, a practical collaborative network security management system is pro...

Bo Yang,Lipu Zhou,Zhidong Deng

2013, 18(1): 51-56.   doi:10.1109/TST.2013.6449407
Abstract ( 9 HTML ( 0   PDF(470KB) ( 17 )   Save

Artificial cognitive models and computational neuroscience methods have garnered great interest from both neurologist and leading analysts in recent years. Among the cognitive models, HMAX has been widely used in computer vision systems for its robustness shape and texture features inspired by the ventral stream of the human brain. This work presents a Color-HMAX (C-HMAX) model based on the HMAX model which imitates the color vision mechanism of the human brain that the HMAX model does not in...

Chen Qian,Weilong Lei,Zhaocheng Wang

2013, 18(1): 57-61.   doi:10.1109/TST.2013.6449408
Abstract ( 13 HTML ( 0   PDF(410KB) ( 21 )   Save

This paper describes an efficient implementation of the Sum-Product Algorithm (SPA) within a Low Density Parity Check (LDPC) code decoder, where a horizontal process correction term is used to improve the decoding performance of the Min-Sum algorithms. The correction term is implemented as a look-up table. The algorithm uses the correction term redundancy by means of a coordinate transformation to reduce the hardware complexity. Simulations and hardware tests indicate that the decoding perfor...

Jing Wang,Guangda Su,Ying Xiong,Jiansheng Chen,Yan Shang,Jiongxin Liu,Xiaolong Ren

2013, 18(1): 62-67.   doi:10.1109/TST.2013.6449409
Abstract ( 16 HTML ( 0   PDF(416KB) ( 11 )   Save

Sparse Representation based Classification (SRC) has emerged as a new paradigm for solving recognition problems. This paper presents a constraint sampling feature extraction method that improves the SRC recognition rate. The method combines texture and shape features to significantly improve the recognition rate. Tests show that the combined constraint sampling and facial alignment achieves very high recognition accuracy on both the AR face database (99.52%) and the CAS-PEAL face database (99...

Wenhui Shou,Wenhui Fan,Boyuan Liu,Yuyang Lai

2013, 18(1): 68-76.   doi:10.1109/TST.2013.6449410
Abstract ( 14 HTML ( 0   PDF(1204KB) ( 9 )   Save

The Knowledge Map (KM) concept, which was derived from the Fuzzy Cognitive Map (FCM), is used to describe and manage knowledge. KM provides insight into the interdependencies and uncertainties contained in the system. This paper uses a model-free method to mine KMs in historical data to analyze component stock corporations of the Shanghai Stock 50 index. The analyses use static and time-domain analyses. The results indicate that a knowledge map is useful for representing knowledge and for mon...

Hao Wu,Guoliang Li,Lizhu Zhou

2013, 18(1): 77-87.   doi:10.1109/TST.2013.6449411
Abstract ( 3 HTML ( 0   PDF(917KB) ( 13 )   Save

Keyword search has become a ubiquitous method for users to access text data in the face of information explosion. Inverted lists are usually used to index underlying documents to retrieve documents according to a set of keywords efficiently. Since inverted lists are usually large, many compression techniques have been proposed to reduce the storage space and disk I/O time. However, these techniques usually perform decompression operations on the fly, which increases the CPU time. This paper p...

Yiran Wang,Bo Zhang,Dingrong Shao

2013, 18(1): 88-99.   doi:10.1109/TST.2013.6449412
Abstract ( 3 HTML ( 0   PDF(1327KB) ( 16 )   Save

Signals from the Global Navigation Satellite System (GNSS) scatter over the sea surface resulting in relatively low Signal-to-Noise Ratios (SNR). A differential coherent algorithm is given here to improve the SNR and reduce the performance degradation due to the Squaring-Loss and the navigation-bit effect. The algorithm uses fast navigation-bit correction for Delay-Doppler Maps (DDM) in airborne Global Navigation Satellite Signal Reflectometry (GNSS-R) software receivers. The system model is ...

Wei Ren,Linchen Yu,Liangli Ma,Yi Ren

2013, 18(1): 100-117.   doi:10.1109/TST.2013.6449413
Abstract ( 7 HTML ( 0   PDF(509KB) ( 12 )   Save

Wireless Machine to Machine (M2M) communications enable ubiquitous sensing, controlling, and acting via sensors, actuators, and actors. Reliability and security are of foremost importance in wireless M2M systems. A simple, target distinguishing attack can result in M2M’s failure. This paper presents a RelIable and SEcure scheme, RISE, which is a package of policies that guarantee the reliability of data (including sensor reports and actuator instructions) and devices (including sensors, actua...