International Journal of Networked and Distributed Computing

+ Advanced search
169 articles

Introducing IJNDC

Bertil Folliot, Juhnyoung Lee
Pages: 1 - 1

A View Of Cloud Computing

Juhnyoung Lee
Pages: 2 - 8
Today’s IT infrastructure is under tremendous pressure and is finding it difficult to keep up. In distributed computing environments, up to 85 percent of computing capacity sits idle. 66 percent of every dollar on IT is spent on maintaining current IT infrastructures versus adding new capabilities. In...

OSERENA: a Coloring Algorithm Optimized for Dense Wireless Networks

Ichrak Amdouni, Pascale Minet, Cedric Adjih
Pages: 9 - 24
The goal of this paper is to present OSERENA, a distributed coloring algorithm optimized for dense wireless sensor networks (WSNs). Network density has an extremely reduced impact on the size of the messages exchanged to color the WSN. Furthermore, the number of colors used to color the network is not...

Improvement of Software Reliability Estimation Accuracy with Consideration of Failure Removal Effort

Myungmuk Kang, Okjoo Choi, Juhwan Shin, Jongmoon Baik
Pages: 25 - 36
In order to develop highly reliable software in a cost-effective manner, it is necessary to manage software reliability at the early test phases. Most of developers at those phases perform a test and debug activities together. In this paper, we propose a new reliability estimation model to manage the...

Explicit Rate Control for MANET

Nazia Zaman, Morshed Chowdhury
Pages: 37 - 45
Streaming applications over Mobile Ad-hoc Networks (MANET) require a smooth transmission rate. The Internet is unable to provide this service during traffic congestion in the network. Designing congestion control for these applications is challenging, because the standard TCP congestion control mechanism...

A Fault-Tolerant Schema for Clock Synchronization and data aggregation in WSN

Na Wang, Haihui He, DongQian Liu
Pages: 46 - 52
Event monitoring and determination is a popular application in WSN. Considering the special circumstance that some nodes of the wireless sensor network are faulty, a fault tolerant schema for data aggregation based on event clustering was proposed. Also, an improved HRTS algorithm named T-HRTS which...

The Smart Energy Management of Multithreaded Java Applications on Multi-Core Processors

Kuo-Yi Chen, Fuh-Gwo Chen
Pages: 53 - 60
Multi-core processors are becoming widely deployed. However, more cores consume more power. A power saving technique for multi-core systems based on the observation of critical sections is proposed. Since only one thread works in a critical section, other threads on other cores that access the same resource...

Realize Node Localization Based on OLSR Protocol in Ad Hoc Networks

Anbao Wang, Bin Zhu
Pages: 61 - 71
In wireless Ad Hoc network's many applications, learning accurately the position of the node is one of its important conditions. Node walks randomly in wireless Ad Hoc network, thus it causes the position of the nodes are stochastic; Therefore, the node localization technology is one of the difficult...

A Middleware-Based Implementation for Data Integration of Remote Devices

Xianyong Liu, Yanping Liu, Lizhuang Ma, Qing Gao
Pages: 72 - 78
Different from existing techniques3-5 that often focus on high level data integration, this paper contributes a novel solution at device level, implementing a fully scalable and configurable middleware, aiming at releasing the power of parallel processing with distributed data. It is designed as a soft-gateway...

Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag

Biplob Rakshit Ray, Morshed Chowdhury, Jemal Abawajy
Pages: 79 - 88
Radio Frequency Identification (RFID) is an emerging wireless object identification technology with many potential applications such as supply chain management, personnel tracking and healthcare. However, security vulnerabilities of the RFID system have been a serious concern for its wide adoption in...

Parallel Implementation of Apriori Algorithm Based on MapReduce

Ning Li, Li Zeng, Qing He, Zhongzhi Shi
Pages: 89 - 96
Searching frequent patterns in transactional databases is considered as one of the most important data mining problems and Apriori is one of the typical algorithms for this task. Developing fast and efficient algorithms that can handle large volumes of data becomes a challenging task due to the large...

Modeling Performance of CSMA/CA with Retransmissions in Wireless Personal Area Networks

Zhongwei Zhang
Pages: 97 - 107
Despite the widespread uses in military, smart building, habitat monitoring, Wireless sensor networks (WSNs) just begun showing their superiority in the medical and healthcare domain. Facing same challenges as other applications, deployment of WPANs in medical domain exert many more stringent requirements,...

Design and Implementation of Dynamic Hybrid Virtual Honeypot Architecture for Attack Analysis

Yonas Kibret, Wang Yong
Pages: 108 - 123
Honeypots are dedicated machines whose aim is to delay and divert attackers away from critical resources in order to study new methods and tools used by attackers. However, when looking most of current honeypot systems are statically configured and managed. They are either low interaction honeypot or...

Parallel Implementation of Exact Matrix Computation Using Multiple P-adic Arithmetic

Xinkai Li, Chao Lu, Jon A. Sjogren
Pages: 124 - 133
A P-adic Exact Scientific Computational Library (ESCL) for rational matrix operations has been developed over the past few years. The effort has been focusing on converting all rational number operations to integer calculation, and fully taking advantage of the fast integer multiplication of modern computer...

BSP-Based Support Vector Regression Machine Parallel Framework

Hong Zhang, Yongmei Lei
Pages: 134 - 143
In this paper, we investigate the distributed parallel Support Vector Machine training strategy, and then propose a BSP-Based Support Vector Regression Machine Parallel Framework which can implement the most of distributed Support Vector Regression Machine algorithms. The major difference in these algorithms...

On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback

Wei Yu, Xinwen Fu, Erik Blasch, Khanh Pham, Dan Shen, Genshe Chen, Chao Lu
Pages: 144 - 158
Network-based crime has been increasing in both extent and severity and network-based forensics encapsulates an essential part of legal surveillance. A key network forensics tool is traceback that can be used to identify true sources of suspects. Both accuracy and secrecy are essential attributes of...

Device driver development of an external human interaction device for the Android

Naoto Ogawa, Shuichi Oikawa
Pages: 159 - 166
Recently, many people have used Smartphones. The feature of Smartphones is that they are equipped with a mobile operating system (OS) for the control of sensors and modules. In this situation, we can connect external human interaction devices with the Smartphone. Our objective is to know how the external...

Efficient Keyword-Related Data Collection in a Social Network with Weighted Seed Selection

Changhyun Byun, Hyeoncheol Lee, Jongsung You, Yanggon Kim
Pages: 167 - 173
Data mining in a social network can yield interesting perspectives to understanding human behavior or detecting topics or communities. However, it is difficult to gather the data related to a specific topic due to the main characteristics of social media data: large, noisy, and dynamic. To collect the...

Flexible WSNs Aims Easy Installation With Noise Reduce Method For Elderly People Care

Takanobu Otsuka, Takayuki Ito
Pages: 174 - 186
Much research has been conducted on anomaly detection by wireless sensor networks (WSNs). The existing WSNs require specialized knowledge and skills to install the sensors in environments such as houses and buildings. Therefore, we have developed a flexible WSN based on small sensor devices that can...

Utilizing Human-Computer Interaction Data to Extract User Interests from Web-based Learning Systems

Yücel Ugurlu
Pages: 187 - 195
We propose a novel approach by utilizing human-computer interaction data to extract user interests from web-based learning systems. The proposed approach is based on user access and a wearable context recognition system. Under our approach, a series of screen images are captured by an imaging device...

A Checkpoint/Restart Scheme for CUDA Programs with Complex Computation States

Hai Jiang, Yulu Zhang, Jeff Jennes, Kuan-Ching Li
Pages: 196 - 212
Checkpoint/restart has been an effective mechanism to achieve fault tolerance for many long-running scientific applications. The common approach is to save computation states in memory and secondary storage for execution resumption. However, as the GPU plays a much bigger role in high performance computing,...

Performance Characteristics of Hybrid MPI/OpenMP Scientific Applications on a Largescale Multithreaded BlueGene/Q Supercomputer

Xingfu Wu, Valerie Taylor
Pages: 213 - 225
Many/multi-core supercomputers provide a natural programming paradigm for hybrid MPI/OpenMP scientific applications. In this paper, we investigate the performance characteristics of five hybrid MPI/OpenMP scientific applications (two NAS Parallel benchmarks Multi-Zone SP-MZ and BT-MZ, an earthquake simulation...

Fault Tolerant Distributed Stream Processing based on Backtracking

Qiming Chen, Meichun Hsu, Castellanos Malu
Pages: 226 - 238
Since distributed stream analytics is treated as a kind of cloud service, there exists a pressing need for its reliability and fault-tolerance, to guarantee the streaming data tuples to be processed in the order of their generation in every dataflow path, with each tuple processed once and only once....

On Dynamic Multicast Traffic Provisioning with Grooming Capabilities Support in Light-Trail Networks

Ching-Fang Hsu, Tzu-Huan Tang
Pages: 239 - 250
In recent years, because of the popularity of Internet and the rapid growth of multimedia applications, the requirements of bandwidth from users increase violently in optical networks. Various multicast multimedia services also bring challenges to next generation optical networks. As the rapid advance...

P2P Traffic Localization by Forcing Packet Loss

Hiep Hoang-Van, Koki Mizutani, Takumi Miyoshi, Olivier Fourmaux
Pages: 251 - 259
Recently, peer-to-peer (P2P) traffic is increasing rapidly in volume day by day. One of the main causes is that most of P2P applications including file sharing and streaming applications often form overlay networks for exchanging data that are oblivious to the underlay network topology. As a result,...

Theoretical Suggestion of Policy-Based Wide Area Network Management System (wDACS system part-I)

Kazuya Odagiri, Shogo Shimizu, Makoto Takizawa, Naohiro Ishii
Pages: 260 - 269
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leak and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data,...

Generation and Mapping of Multi-Reducts Based on Nearest Neighbor Relation

Naohiro Ishii, Ippei Torii, Toyoshiro Nakashima, Hidekazu Tanaka
Pages: 1 - 10
Dimension reduction of data is an important theme in the data processing to represent and manipulate higher dimensional data. Rough set is fundamental and useful to process higher dimensional data. Reduct in the rough set is a minimal subset of features, which has almost the same discernible power as...

Code generation for accurate array redistribution on automatic distributed-memory parallelization

Bo Zhao, Rui Ding, Lin Han, Jinlong Xu
Pages: 11 - 25
Code generation belongs to the backend of parallelizing compiler, and is for generating efficient computation and communication code for the target parallel computing system. Traditional research resolve array redistribution mainly by generating communication code that each processor sends all data defined...

Total System Cost Analysis and Comparison of DX-Tree and Star Ring Architectures in conjunction with Master-Slave Multi-Super-Hypercube topology

Hamid Abachi, Roger Lee
Pages: 26 - 34
In todays advanced technology environment, we come across a number of research areas that require extensive data processing. These areas include but not limited to, modeling and simulation of accuracy, safety and reliability of nuclear weapons, global warming, weather forecasting, DNA computing, nanotechnology,...

Empirical Study for Semantic Annotation of Web Services

Djelloul Bouchiha, Mimoun Malki, Djihad Djaa, Abdullah Alghamdi, Khalid Alnafjan
Pages: 35 - 44
Web services have become the main paradigm for the development of distributed software systems using a common set of technologies, including SOAP, WSDL and UDDI. This allows accessing to software components residing on different platforms and written in different programming languages. However, several...

An IDS Visualization System for Anomalous Warning Events

Satoshi Kimura, Hiroyuki Inaba
Pages: 45 - 53
Intrusion Detection System(IDS) has received attention to deal with the illegal access to the network. However, IDS has a critical problem which outputs a tremendous number of logs. Analyzing these logs apply a large amount of load to a network manager. In this paper, we propose a novel visualization...

Service Value Broker Patterns: An Empirical Collection and Analysis

Yucong Duan, Keman Huang, Dan Chen, Yongzhi Wang, Ajay Kattepur, Wencai Du
Pages: 54 - 69
The service value broker(SVB) pattern integrates business modeling, knowledge management and economic anal- ysis with relieved complexity, enhanced reusability and effi- ciency,etc. The study of SVB is an emerging interdisciplinary subject which will help to promote the reuse of knowledge, strategy and...

Fully distributed certificate authority based on polynomial over elliptic curve for MANET

Ahmad Alomari
Pages: 70 - 77
A mobile ad hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or a pre-existing infrastructure. Various certificate authorities (CAs) distributed over the network, each with a periodically updated share of the secrete key, is usually adopted. Elliptic...

An Ensemble Approach for Cyber Attack Detection System: A Generic Framework

Shailendra Singh, Sanjay Silakari
Pages: 78 - 90
Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources. The fact is that no single classifier is able to give maximum accuracy...

On a Drawing-Frequency based Layered Canvas Mechanism for Collaborative Paper Editing Support Systems

Shinya Katayama, Takushi Goda, Shun Shiramatsu, Tadachika Ozono, Toramatsu Shintani
Pages: 91 - 99
We propose a Drawing-Frequency based Layered (DFL) Canvas approach to reduce a synchronization delay in collaborative web applications. The synchronization delay consists of a network delay and a drawing delay. The network delay is well-argued topic by various researches. We focus on the drawing delay,...

Using Cryptographic Technique for Securing Route Discovery and Data Transmission from BlackHole Attack on AODV-based MANET

Seryvuth Tan, Phearin Sok, Keecheon Kim
Pages: 100 - 107
MANET is a dynamic wireless network without any infrastructures. The network is weak and vulnerable to many types of attacks including BlackHole attack. BlackHole node advertises itself as having freshest or shortest path to a specific node to absorb packets. The effect of BlackHole attack on AODV will...

Multi-Objective Optimization for Milling Operations using Genetic Algorithms under Various Constraints

Libao An, Peiqing Yang, Hong Zhang, Mingyuan Chen
Pages: 108 - 114
In this paper, the parameter optimization problem for face-milling operations is studied. A multi-objective mathematical model is developed with the purpose to minimize the unit production cost and total machining time while maximize the profit rate. The unwanted material is removed by one finishing...

System Architecture & Feature Design for Engineering a Web-based Travel Advisor System

Amir Maddah, Manolya Kavakli
Pages: 115 - 121
Many Advisor Systems have been designed and developed to assist us in decision-making, each with their strengths and weaknesses. A popular type of Advisor systems is Travel Advisor systems that assist travelers in their travel arrangements. We have designed and implemented a Travel Advisor system to...

Padding Free Bank Conflict Resolution for CUDA-Based Matrix Transpose Algorithm

Ayaz ul Hassan Khan Khan, Mayez Al-Mouhamed, Allam Fatayer, Anas Almousa, Abdulrahman Baqais, Mohammed Assayony
Pages: 124 - 134
The advances of Graphic Processing Units (GPU) technology and the introduction of CUDA programming model facilitates developing new solutions for sparse and dense linear algebra solvers. Matrix Transpose is an important linear algebra procedure that has deep impact in various computational science and...

Test Image Generation using Segmental Symbolic Evaluation

Tahir Jameel, Mengxiang Lin
Pages: 135 - 147
Image processing applications have played a vital role in modern life and they are required to be well tested due to their significance and human dependence on them. Testing of image processing application is difficult due to complex nature of images in terms of their generation and evaluation. The presented...

Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree)

Lifford McLauchlan, Soumya Saha, Rajab Challoo
Pages: 148 - 155
Wireless Sensors Networks (WSNs) are utilized in many diverse applications ranging from security, environmental monitoring, landslide detection, patient monitoring, reconnaissance operations, structural health monitoring and smart buildings. Since in many applications the WSN nodes are randomly deployed,...

Efficient Security and Privacy Protection for Emerging Smart RFID Communications

Mohammad Fal Sadikin, Marcel Kyas
Pages: 156 - 165
Due to its constrained nature, the use of smart RFID technology introduces tremendous security and privacy issues. This paper presents IMAKA-Tate: Identity protection, Mutual Authentication and Key Agreement using Tate pairing of Identity-based Encryption method. It is designed to tackle various challenges...

One-D-R-A-G-SOM and its Application to a Hand Shape Instruction Learning System

Takashi Kuremoto, Takuhiro Otani, Shingo Mabu, Masanao Obayashi, Kunikazu Kobayashi
Pages: 166 - 174
In this paper, a novel self-organizing map (SOM) named “One-D-R-A-G-SOM” is proposed. It is a kind of one dimensional ring type growing SOM using asymmetric neighborhood function. As the topology of one dimensional ring type feature map is more suitable to increase or decrease the number of units, and...

On Design-time Modelling and Verification of Safety-critical Component-based Systems

Nermin Kajtazovic, Christopher Preschern, Andrea Höller, Christian Kreiner
Pages: 175 - 188
Component-based Software Engineering (CBSE) is currently a key paradigm used for developing safetycritical systems. It provides a fundamental means to master systems complexity, by allowing to design systems parts (i.e., components) for reuse and by allowing to develop those parts independently. One...

Comparative Study of Various Wireless Sensor Network (WSN) Topology Construction Protocols

Lifford McLauchlan, Soumya Saha, Claudio Montiel, Rajab Challoo
Pages: 189 - 197
As the cost for wireless sensors and wireless sensor networks (WSNs) have decreased, they have become more ubiquitous; they are increasingly being used in many applications such as security, structural monitoring and environmental monitoring. Many WSN applications employ a random sensor deployment to...

Fast Parallel Network Packet Filter System based on CUDA

Che-Lun Hung, Shih-Wei Guo
Pages: 198 - 210
In recent years, with the rapid development of the network hardware and software, the network speed is enhanced to multi-gigabit. Network packet filtering is an important strategy of network security to avoid malicious attacks, and it is a computation-consuming application. Therefore, we develop two...

Embedding GPU Computations in Hadoop

Jie Zhu, Hai Jiang, Juanjuan Li, Erikson Hardesty, Kuan-Ching Li, Zhongwen Li
Pages: 211 - 220
As the size of high performance applications increases, four major challenges including heterogeneity, programmability, fault resilience, and energy efficiency have arisen in the underlying distributed systems. To tackle with all of them without sacrificing performance, traditional approaches in resource...

Human Activity Recognition in WSN: A Comparative Study

Muhammad Arshad Awan, Zheng Guangbin, Cheong-Ghil Kim, Shin-Dug Kim
Pages: 221 - 230
Human activity recognition is an emerging field of ubiquitous and pervasive computing. Although recent smartphones have powerful resources, the execution of machine learning algorithms on a large amount of data is still a burden on smartphones. Three major factors including; classification algorithm,...

An Improved Autonomous Cross-Layer Optimization Framework for Wireless Multimedia Communication in Heterogeneous Networks

Yuping Dong, C. Hwa Chang, Zengxu Yang
Pages: 231 - 240
Various cross-layer optimization schemes have been proposed for the purpose of enhancing wireless network performances. In this paper, we present an improved autonomous cross-layer optimization to fit modern heterogeneous communication networks. In our design, different Quality of Service (QoS) requirements...