International Journal of Networked and Distributed Computing

+ Advanced search
179 articles

Character Segmentation and Recognition for Myanmar Warning Signboard Images

Kyi Pyar Zaw, Zin Mar Kyu
Pages: 59 - 67
This paper publicizes the character segmentation and recognition of the Myanmar warning text signboard images taken by a mobile phone camera in natural scene. In this system, two templates are created. The first template that contains both connected pixel words and characters are used for character segmentation...

Comparison of Hash Table Performance with Open Addressing and Closed Addressing: An Empirical Study

Dapeng Liu, Shaochun Xu
Pages: 60 - 68
In this paper, we conducted empirical experiments to study the performance of hashing with a large set of data and compared the results of different collision approaches. The experiment results leaned more to closed addressing than to open addressing and deemed linear probing impractical due to its low...

Realize Node Localization Based on OLSR Protocol in Ad Hoc Networks

Anbao Wang, Bin Zhu
Pages: 61 - 71
In wireless Ad Hoc network's many applications, learning accurately the position of the node is one of its important conditions. Node walks randomly in wireless Ad Hoc network, thus it causes the position of the nodes are stochastic; Therefore, the node localization technology is one of the difficult...

Functional Evaluation of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations

Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii
Pages: 62 - 70
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data,...

Improvement of CSF, WM and GM Tissue Segmentation by Hybrid Fuzzy – Possibilistic Clustering Model based on Genetic Optimization Case Study on Brain Tissues of Patients with Alzheimer’s Disease

Lilia Lazli, Mounir Boukadoum
Pages: 63 - 77
Brain tissue segmentation is one of the most important parts of clinical diagnostic tools. Fuzzy C-mean (FCM) is one of the most popular clustering based segmentation methods. However FCM does not robust against noise and artifacts such as partial volume effect (PVE) and inhomogeneity. In this paper,...

Using SPIN to Check Simulink Stateflow Models

Chikatoshi Yamada, D. Michael Miller
Pages: 65 - 74
Verification is critical to the design of large and complex systems. SPIN is a well-known and extensively used verification tool. In this paper, we consider two tool chains, one existing, WSAT, and one introduced here, that support using SPIN to model check systems specified as Simulink Stateflow models....

A Formal Model of Distributed Security for Electronic Commerce Transactions Systems

Sylvanus A. Ehikioya, Adepele A. Olukunle
Pages: 68 - 84
Every distributed system requires a secure environment for its users. Security becomes even more important if users exchange sensitive information and value, across the network. An e-commerce environment is an example of a distributed system in which security is of a high priority. It is important that...

A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks

Dongxu Jin, JooSeok Song
Pages: 69 - 78
In Vehicular Ad-hoc Networks, security is a important issue. In the past years, several approaches have been proposed for solving Sybil attack. In this paper a novel scheme to detect the Sybil nodes is presented. The proposed scheme utilizes unmodifiable physical measurements of beacon messages. To increase...

Fully distributed certificate authority based on polynomial over elliptic curve for MANET

Ahmad Alomari
Pages: 70 - 77
A mobile ad hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or a pre-existing infrastructure. Various certificate authorities (CAs) distributed over the network, each with a periodically updated share of the secrete key, is usually adopted. Elliptic...

Evaluating the Performance of Recoverable End-of-life Products in the Reverse Supply Chain

Santoso Wibowo, Srimannarayana Grandhi
Pages: 71 - 79
Evaluating the performance of recoverable end-of-life products with respect to a set of specific criteria is challenging. This is due to multi-dimensional nature of the decision making process, multiple evaluation criteria, and subjective and imprecise assessments. To effectively deal with this issue,...

A Middleware-Based Implementation for Data Integration of Remote Devices

Xianyong Liu, Yanping Liu, Lizhuang Ma, Qing Gao
Pages: 72 - 78
Different from existing techniques3-5 that often focus on high level data integration, this paper contributes a novel solution at device level, implementing a fully scalable and configurable middleware, aiming at releasing the power of parallel processing with distributed data. It is designed as a soft-gateway...

Percolation Thresholds on Tree-Based Communities of Wireless Sensor Networks

Qiao Li, Zhendong Niu, Baihai Zhang, Lingguo Cui, Bin Wu
Pages: 75 - 84
Many efficient deployments of large-scale wireless sensor networks based on the tree-based community rise into view recently. Sensor nodes are severely resource constrained, and lack sophisticated defense mechanisms to fight virus attacks. Cyber viruses spread through node populations over the networks,...

Implementation of Emotional Features on Satire Detection

Pyae Phyo Thu, Than Nwe Aung
Pages: 78 - 87
Recognition of satirical language in social multimedia outlets turns out to be a trending research area in computational linguistics. Many researchers have analyzed satirical language from the various point of views: lexically, syntactically, and semantically. However, due to the ironic dimension of...

An Ensemble Approach for Cyber Attack Detection System: A Generic Framework

Shailendra Singh, Sanjay Silakari
Pages: 78 - 90
Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources. The fact is that no single classifier is able to give maximum accuracy...

Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag

Biplob Rakshit Ray, Morshed Chowdhury, Jemal Abawajy
Pages: 79 - 88
Radio Frequency Identification (RFID) is an emerging wireless object identification technology with many potential applications such as supply chain management, personnel tracking and healthcare. However, security vulnerabilities of the RFID system have been a serious concern for its wide adoption in...

Optimal Number of Clusters for Fast Similarity Search Considering Transformations of Time Varying Data

Toshiichiro Iwashita, Teruhisa Hochin, Hiroki Nomiya
Pages: 79 - 88
This paper proposes a method of determining the optimal number of clusters dividing the multiple transformations for the purpose of the efficient processing of query against the results of applying the transformations to time series. In this paper, the moving average is used as a transformation for simplicity....

An Intelligent Cross-Layer QoS-Aware Protocol with Traffic-Differentiation-Based for Energy Efficient Communication in WSNs

Jawad Ahmad Haqbeen, Takayuki Ito, Mohammad Arifuzzaman, Takanobu Otsuka
Pages: 80 - 92
Despite an increase in energy efficiency of WSNs research in couple of last years, still the key challenge in the design of WSNs remains to maximize the quality of service (QoS) and energy efficiency of network system. The layered strength and functionality collaboration is commonly considered as one...

Archaeological Distribution Map System Using Aggregate Information from Heterogeneous Information Sources

Ayako Hayashi, Teruhisa Hochin, Hiroki Nomiya
Pages: 85 - 95
This paper proposes archaeological distribution map system sharing archaeological information. Many archaeologists want to analyze the distribution of relics and/or remains. Excavation information, however, cannot be opened until verification and research are completed. Archaeological information sources...

Design and Implementation of an IoT-Based Smart Home Security System

Mohammad Asadul Hoque, Chad Davidson
Pages: 85 - 92
Recent advances in smartphones and affordable open-source hardware platforms have enabled the development of low-cost architectures for Internet-of-Things (IoT)-enabled home automation and security systems. These systems usually consist of sensing and actuating layer that is made up of sensors such as...

Real-time Multi-Agents Architecture for E-commerce Servers

Sylvanus A. Ehikioya, Cong Zhang
Pages: 88 - 98
Electronic commerce applications have strict timing constraints on the interactions between e-commerce servers and customers. Customers prefer real-time services, which mean immediate response from the server shortly after submission of a request. This trend of demand gives e-commerce servers high pressure,...

Parallel Implementation of Apriori Algorithm Based on MapReduce

Ning Li, Li Zeng, Qing He, Zhongzhi Shi
Pages: 89 - 96
Searching frequent patterns in transactional databases is considered as one of the most important data mining problems and Apriori is one of the typical algorithms for this task. Developing fast and efficient algorithms that can handle large volumes of data becomes a challenging task due to the large...

Parallel Indexing Scheme for Data Intensive Applications

Kenta Funaki, Teruhisa Hochin, Hiroki Nomiya, Hideya Nakanishi
Pages: 89 - 98
This paper proposes a parallel indexing scheme of a large amount of data in order to resolve the issues about time limitation. Three kinds of computing-nodes are introduced. These are reception-nodes, representative-nodes, and normal-nodes. A reception-node receives data for insertion. A representative-node...

On a Drawing-Frequency based Layered Canvas Mechanism for Collaborative Paper Editing Support Systems

Shinya Katayama, Takushi Goda, Shun Shiramatsu, Tadachika Ozono, Toramatsu Shintani
Pages: 91 - 99
We propose a Drawing-Frequency based Layered (DFL) Canvas approach to reduce a synchronization delay in collaborative web applications. The synchronization delay consists of a network delay and a drawing delay. The network delay is well-argued topic by various researches. We focus on the drawing delay,...

Polar Code Appropriateness for Ultra-Reliable and Low-Latency Use Cases of 5G Systems

Arti Sharma, Mohammad Salim
Pages: 93 - 99
Polar code is considered as a major breakthrough of past decade in channel coding area. The unprecedented performance of polar codes compelled third generation partnership project (3GPP) to adopt the polar codes for control channels functions in one of the fifth generation (5G) scenario enhanced mobile...

UWB signal detection based on wavelet packet and FHN model

Bowen Chen, Lei Jiang, Qun Zhang
Pages: 93 - 100
In UWB-IR signal detection, the threshold of signal to noise ratio(SNR) limit the performance of FHN model detection method, from this point, wavelet packet is introduced into FHN model, a novel UWB-IR signal detection method based on wavelet packet and FHN model is proposed, in addition, the disadvantages...

Accelerated Diffusion-Based Recommendation Algorithm on Tripartite Graphs with GPU Clusters

Jingpeng Wang, Jie Huang, Mi Li
Pages: 96 - 105
Exorbitant computation cost hinders the practical application of recommendation algorithm, especially in time-critical application scenario. Although experiments show that recommendation algorithm based on an integrated diffusion on user-item-tag tripartite graphs can significantly improve accuracy,...

Modeling Performance of CSMA/CA with Retransmissions in Wireless Personal Area Networks

Zhongwei Zhang
Pages: 97 - 107
Despite the widespread uses in military, smart building, habitat monitoring, Wireless sensor networks (WSNs) just begun showing their superiority in the medical and healthcare domain. Facing same challenges as other applications, deployment of WPANs in medical domain exert many more stringent requirements,...

Evaluation of A Secure Live Migration of Virtual Machines Using IPsec Implementation

Norshazrul Azman bin Sulaiman, Hideo Masuda
Pages: 99 - 108
Live migration enables administrators to perform online maintenance on host and virtual machines without interrupted service during fault occurrences. While migrating VMs between physical servers of different data centers over the network is considered, security is essential for securing the migration...

Using Cryptographic Technique for Securing Route Discovery and Data Transmission from BlackHole Attack on AODV-based MANET

Seryvuth Tan, Phearin Sok, Keecheon Kim
Pages: 100 - 107
MANET is a dynamic wireless network without any infrastructures. The network is weak and vulnerable to many types of attacks including BlackHole attack. BlackHole node advertises itself as having freshest or shortest path to a specific node to absorb packets. The effect of BlackHole attack on AODV will...

Semantic Schema Matching for String Attribute with Word Vectors and its Evaluation

Kenji Nozaki, Teruhisa Hochin, Hiroki Nomiya
Pages: 100 - 106
Instance-based schema matching is to determine the correspondences between heterogeneous databases by comparing instances. Heterogeneous databases consist of an enormous number of tables containing various attributes, causing the data heterogeneity. In such cases, it is effective to consider semantic...

An Innovative Positioning System with Unsynchronized Interferometric Modulated Signals in Wireless Sensor Networks

Ruiling Gao, Alva Couch, Chorng Hwa Chang
Pages: 101 - 112
In this paper, we investigate the sensor localization problem and present Stochastic Radio Interferometric Positioning System with Unsynchronized Modulated Signals (SRIPS_UMS). Previous radio interferometric positioning methods have limitations include (1) strict hardware requirements for Received Signal...

An Extended Web Displaying System based on Multiple Tablet Devices

Shota Imai, Shun Shiramatsu, Tadachika Ozono, Toramatsu Shintani
Pages: 106 - 115
We propose an extended Web displaying system based on multiple tablet devices to help users to conduct collaborative works anywhere without a large display. Users can use multiple tablet devices as a pseudo mobile large display on demand by using our system. For example, users can make discussions by...

“Never fry carrots without chopping” Generating Cooking Recipes from Cooking Videos Using Deep Learning Considering Previous Process

Tatsuki Fujii, Yuichi Sei, Yasuyuki Tahara, Ryohei Orihara, Akihiko Ohsuga
Pages: 107 - 112
Research on deep-training captioning models that modify the natural-language contents of images and moving images has produced considerable results and attracted attention in recent years. In this research, we aim to generate recipe sentences from cooking videos acquired from YouTube. We treat this as...

Multi-Objective Optimization for Milling Operations using Genetic Algorithms under Various Constraints

Libao An, Peiqing Yang, Hong Zhang, Mingyuan Chen
Pages: 108 - 114
In this paper, the parameter optimization problem for face-milling operations is studied. A multi-objective mathematical model is developed with the purpose to minimize the unit production cost and total machining time while maximize the profit rate. The unwanted material is removed by one finishing...

Design and Implementation of Dynamic Hybrid Virtual Honeypot Architecture for Attack Analysis

Yonas Kibret, Wang Yong
Pages: 108 - 123
Honeypots are dedicated machines whose aim is to delay and divert attackers away from critical resources in order to study new methods and tools used by attackers. However, when looking most of current honeypot systems are statically configured and managed. They are either low interaction honeypot or...

Internet of Things in the 5G Mobile Communication System: The Optimal Number of Channels in Channel Hopping*

Gayoung Kim, Minjoong Rim
Pages: 108 - 117
One of the typical goals of the 5G mobile communication system1 is to establish an Internet of Things (IoT)2 environment in which all objects are connected to the network to generate and share information through not only mobile terminals but also mobile communication infrastructure. 5G must support...

Integrated Usage of Heterogeneous Databases for Novice Users

Ayano Terakawa, Teruhisa Hochin, Hiroki Nomiya
Pages: 109 - 118
This paper proposes the system enabling users to use heterogeneous databases in an integrated manner without any conversion and servers. In order to treat a variety of sources in a unified manner, this system is realized by using Java Database Connectivity (JDBC) in accessing databases on the user’s...

Measuring the Distance of Moving Objects from Big Trajectory Data

Khaing Phyo Wai, Nwe Nwe
Pages: 113 - 122
Location-based services have become important in social networking, mobile applications, advertising, traffic monitoring, and many other domains. The growth of location sensing devices has led to the vast generation of dynamic spatial-temporal data in the form of moving object trajectories which can...

Do You Like Sclera? Sclera-region Detection and Colorization for Anime Character Line Drawings

Masashi Aizawa, Yuichi Sei, Yasuyuki Tahara, Ryohei Orihara, Akihiko Ohsuga
Pages: 113 - 120
Colorizing line drawings requires special skill, experience, and knowledge. Artists also spend a great deal of time and effort creating art. Given this background, research on automated line drawing colorization was recently conducted. However, the existing approaches present multiple problems, one of...

System Architecture & Feature Design for Engineering a Web-based Travel Advisor System

Amir Maddah, Manolya Kavakli
Pages: 115 - 121
Many Advisor Systems have been designed and developed to assist us in decision-making, each with their strengths and weaknesses. A popular type of Advisor systems is Travel Advisor systems that assist travelers in their travel arrangements. We have designed and implemented a Travel Advisor system to...

IntegrityMR: Exploring Result Integrity Assurance Solutions for Big Data Computing Applications

Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa, Yucong Duan, Wencai Du
Pages: 116 - 126
Large-scale adoption of MapReduce applications on public clouds is hindered by the lack of trust on the participating virtual machines deployed on the public cloud. In this paper, we propose IntegrityMR, a multi-public clouds architecture-based solution, which performs the MapReduce-based result integrity...

An Entropy-Based Metric of Developer Contribution in Open Source Development and Its Application to Fault-Prone Program Analysis*

Kazuki Yamauchi, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara
Pages: 118 - 132
To support successful quality managements of open source software (OSS) projects, this paper proposes to measure the balance of developers’ contributions to a source file as an entropy. Through an analysis of data collected from 10 popular OSS projects, the following trends are reported: a source file...

Incremental Data Migration for Multi-Database Systems Based on MySQL with SPIDER Storage Engines

Naoyuki Miyamoto, Ken Higuchi, Tatsuo Tsuji
Pages: 119 - 127
In this paper, an incremental data migration technique is evaluated in the multi-database system based on MySQL with SPIDER storage engine and the improvement of the turn-around times of other operations is proved in this systems. In this method, a large data migration is divided into small data migrations...

Defects and Vulnerabilities in Smart Contracts, a Classification using the NIST Bugs Framework

Wesley Dingman, Aviel Cohen, Nick Ferrara, Adam Lynch, Patrick Jasinski, Paul E. Black, Lin Deng
Pages: 121 - 132
Rising to popularity in the last decade, blockchain technology has become the preferred platform for the transfer of digital currency. Unfortunately, many of these environments are rife with vulnerabilities exploited by financially motivated attackers. Worse yet, is that a structured analysis and classification...

CSEP: Circular Shifting Encryption Protocols for Location Privacy Protection

Chen Di, Zhao Binglin, Li Hao, Zhou Shilei
Pages: 123 - 132
Location Based Service (LBS) is gaining popularity. As one fundamental LBS service, range search returns all Point of Interests (POIs) within a user-specified range. However, people leave their location privacy at risks when using range search. How to provide a high-quality range search service while...

Padding Free Bank Conflict Resolution for CUDA-Based Matrix Transpose Algorithm

Ayaz ul Hassan Khan Khan, Mayez Al-Mouhamed, Allam Fatayer, Anas Almousa, Abdulrahman Baqais, Mohammed Assayony
Pages: 124 - 134
The advances of Graphic Processing Units (GPU) technology and the introduction of CUDA programming model facilitates developing new solutions for sparse and dense linear algebra solvers. Matrix Transpose is an important linear algebra procedure that has deep impact in various computational science and...

Parallel Implementation of Exact Matrix Computation Using Multiple P-adic Arithmetic

Xinkai Li, Chao Lu, Jon A. Sjogren
Pages: 124 - 133
A P-adic Exact Scientific Computational Library (ESCL) for rational matrix operations has been developed over the past few years. The effort has been focusing on converting all rational number operations to integer calculation, and fully taking advantage of the fast integer multiplication of modern computer...

Hierarchical Latent Semantic Mapping for Automated Topic Generation

Guorui Zhou, Guang Chen
Pages: 127 - 136
Much of information sits in an unprecedented amount of text data. Managing allocation of these large scale text data is an important problem for many areas. Topic modeling performs well in this problem. The traditional generative models (PLSA,LDA) are the state-of-the-art approaches in topic modeling...