International Journal of Networked and Distributed Computing

+ Advanced search
206 articles
Research Article

Multi-Objective Optimization for Milling Operations using Genetic Algorithms under Various Constraints

Libao An, Peiqing Yang, Hong Zhang, Mingyuan Chen
Pages: 108 - 114
In this paper, the parameter optimization problem for face-milling operations is studied. A multi-objective mathematical model is developed with the purpose to minimize the unit production cost and total machining time while maximize the profit rate. The unwanted material is removed by one finishing...
Research Article

Internet of Things in the 5G Mobile Communication System: The Optimal Number of Channels in Channel Hopping*

Gayoung Kim, Minjoong Rim
Pages: 108 - 117
One of the typical goals of the 5G mobile communication system1 is to establish an Internet of Things (IoT)2 environment in which all objects are connected to the network to generate and share information through not only mobile terminals but also mobile communication infrastructure. 5G must support...
Research Article

“Never fry carrots without chopping” Generating Cooking Recipes from Cooking Videos Using Deep Learning Considering Previous Process

Tatsuki Fujii, Yuichi Sei, Yasuyuki Tahara, Ryohei Orihara, Akihiko Ohsuga
Pages: 107 - 112
Research on deep-training captioning models that modify the natural-language contents of images and moving images has produced considerable results and attracted attention in recent years. In this research, we aim to generate recipe sentences from cooking videos acquired from YouTube. We treat this as...
Research Article

Integrated Usage of Heterogeneous Databases for Novice Users

Ayano Terakawa, Teruhisa Hochin, Hiroki Nomiya
Pages: 109 - 118
This paper proposes the system enabling users to use heterogeneous databases in an integrated manner without any conversion and servers. In order to treat a variety of sources in a unified manner, this system is realized by using Java Database Connectivity (JDBC) in accessing databases on the user’s...
Research Article

MLP and CNN-based Classification of Points of Interest in Side-channel Attacks

Hanwen Feng, Weiguo Lin, Wenqian Shang, Jianxiang Cao, Wei Huang
Pages: 108 - 117
A trace contains sample points, some of which contain useful information that can be used to obtain a key in side-channel attacks. We used public datasets from the ANSSI SCA Database (ASCAD) as well as SM4 traces to learn whether a trace consisting of Points of Interest (POIs) have a positive effect...
Research Article

Measuring the Distance of Moving Objects from Big Trajectory Data

Khaing Phyo Wai, Nwe Nwe
Pages: 113 - 122
Location-based services have become important in social networking, mobile applications, advertising, traffic monitoring, and many other domains. The growth of location sensing devices has led to the vast generation of dynamic spatial-temporal data in the form of moving object trajectories which can...
Research Article

Do You Like Sclera? Sclera-region Detection and Colorization for Anime Character Line Drawings

Masashi Aizawa, Yuichi Sei, Yasuyuki Tahara, Ryohei Orihara, Akihiko Ohsuga
Pages: 113 - 120
Colorizing line drawings requires special skill, experience, and knowledge. Artists also spend a great deal of time and effort creating art. Given this background, research on automated line drawing colorization was recently conducted. However, the existing approaches present multiple problems, one of...
Research Article

System Architecture & Feature Design for Engineering a Web-based Travel Advisor System

Amir Maddah, Manolya Kavakli
Pages: 115 - 121
Many Advisor Systems have been designed and developed to assist us in decision-making, each with their strengths and weaknesses. A popular type of Advisor systems is Travel Advisor systems that assist travelers in their travel arrangements. We have designed and implemented a Travel Advisor system to...
Research Article

IntegrityMR: Exploring Result Integrity Assurance Solutions for Big Data Computing Applications

Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa, Yucong Duan, Wencai Du
Pages: 116 - 126
Large-scale adoption of MapReduce applications on public clouds is hindered by the lack of trust on the participating virtual machines deployed on the public cloud. In this paper, we propose IntegrityMR, a multi-public clouds architecture-based solution, which performs the MapReduce-based result integrity...
Research Article

Incremental Data Migration for Multi-Database Systems Based on MySQL with SPIDER Storage Engines

Naoyuki Miyamoto, Ken Higuchi, Tatsuo Tsuji
Pages: 119 - 127
In this paper, an incremental data migration technique is evaluated in the multi-database system based on MySQL with SPIDER storage engine and the improvement of the turn-around times of other operations is proved in this systems. In this method, a large data migration is divided into small data migrations...
Research Article

An Entropy-Based Metric of Developer Contribution in Open Source Development and Its Application to Fault-Prone Program Analysis*

Kazuki Yamauchi, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara
Pages: 118 - 132
To support successful quality managements of open source software (OSS) projects, this paper proposes to measure the balance of developers’ contributions to a source file as an entropy. Through an analysis of data collected from 10 popular OSS projects, the following trends are reported: a source file...
Research Article

High Performance Hadoop Distributed File System

Mohamed Elkawkagy, Heba Elbeh
Pages: 119 - 123
Although by the end of 2020, most of companies will be running 1000 node Hadoop in the system, the Hadoop implementation is still accompanied by many challenges like security, fault tolerance, flexibility. Hadoop is a software paradigm that handles big data, and it has a distributed file systems so-called...
Research Article

Defects and Vulnerabilities in Smart Contracts, a Classification using the NIST Bugs Framework

Wesley Dingman, Aviel Cohen, Nick Ferrara, Adam Lynch, Patrick Jasinski, Paul E. Black, Lin Deng
Pages: 121 - 132
Rising to popularity in the last decade, blockchain technology has become the preferred platform for the transfer of digital currency. Unfortunately, many of these environments are rife with vulnerabilities exploited by financially motivated attackers. Worse yet, is that a structured analysis and classification...
Research Article

CSEP: Circular Shifting Encryption Protocols for Location Privacy Protection

Chen Di, Zhao Binglin, Li Hao, Zhou Shilei
Pages: 123 - 132
Location Based Service (LBS) is gaining popularity. As one fundamental LBS service, range search returns all Point of Interests (POIs) within a user-specified range. However, people leave their location privacy at risks when using range search. How to provide a high-quality range search service while...
Research Article

Parallel Implementation of Exact Matrix Computation Using Multiple P-adic Arithmetic

Xinkai Li, Chao Lu, Jon A. Sjogren
Pages: 124 - 133
A P-adic Exact Scientific Computational Library (ESCL) for rational matrix operations has been developed over the past few years. The effort has been focusing on converting all rational number operations to integer calculation, and fully taking advantage of the fast integer multiplication of modern computer...
Research Article

Padding Free Bank Conflict Resolution for CUDA-Based Matrix Transpose Algorithm

Ayaz ul Hassan Khan Khan, Mayez Al-Mouhamed, Allam Fatayer, Anas Almousa, Abdulrahman Baqais, Mohammed Assayony
Pages: 124 - 134
The advances of Graphic Processing Units (GPU) technology and the introduction of CUDA programming model facilitates developing new solutions for sparse and dense linear algebra solvers. Matrix Transpose is an important linear algebra procedure that has deep impact in various computational science and...
Research Article

On Learning Associative Relationship Memory among Knowledge Concepts

Zhenping Xie, Kun Wang, Yuan Liu
Pages: 124 - 130
A high-level associative memory modelling method was developed to explore the realization of associative memory. In the proposed method, two stage procedures are progressively performed to construct a unified associative knowledge network. In the first stage, some direct weighted associative links are...
Research Article

Hierarchical Latent Semantic Mapping for Automated Topic Generation

Guorui Zhou, Guang Chen
Pages: 127 - 136
Much of information sits in an unprecedented amount of text data. Managing allocation of these large scale text data is an important problem for many areas. Topic modeling performs well in this problem. The traditional generative models (PLSA,LDA) are the state-of-the-art approaches in topic modeling...
Research Article

Scenarios for An RFID Tag Ownership Transfer Protocol for A Closed Loop System

Gaith K.D. Al., Biplob Rakshit Ray, Morshed Chowdhury
Pages: 128 - 136
In RFID system a tag is attached to an object which might own by a number of owners during its life time. This requires the RFID system to transfer ownership of the tag to its new owner. The ownership transfer has to protect privacy of current and new owner. Many ownership tag ownership transfer exists...
Research Article

Towards a Task and Resource Aware Task Scheduling in Cloud Computing: An Experimental Comparative Evaluation

Muhammad Ibrahim, Said Nabi, Abdullah Baz, Nasir Naveed, Hosam Alhakami
Pages: 131 - 138
Cloud computing has been considered as one of the large-scale platforms that support various type of services including compute, storage, compute, and analytic to the users and organizations with high agility, scalability, and resiliency intact. The users of the Cloud are increasing at an enormous rate...
Research Article

Target Oriented Tweets Monitoring System during Natural Disasters

Si Si Mar Win, Than Nwe Aung
Pages: 133 - 142
Twitter, Social Networking Site, becomes most popular microblogging service and people have started publishing data on the use of it in natural disasters. Twitter has also created the opportunities for first responders to know the critical information and work effective reactions for impacted communities....
Research Article

Utilizing Type-2 Fuzzy Sets as an Alternative Approach for Valuing Military Information

Timothy P Hanratty, Robert J Hammell
Pages: 133 - 139
Knowledge elicitation from a group versus a single source typically yields outcomes that range in agreement and promote a level of uncertainty. Recently, the use of Type-2 fuzzy sets has been proffered as an alternative approach for capturing the difference of opinions expressed by a group of experts...
Research Article

BSP-Based Support Vector Regression Machine Parallel Framework

Hong Zhang, Yongmei Lei
Pages: 134 - 143
In this paper, we investigate the distributed parallel Support Vector Machine training strategy, and then propose a BSP-Based Support Vector Regression Machine Parallel Framework which can implement the most of distributed Support Vector Regression Machine algorithms. The major difference in these algorithms...
Research Article

Customer Prediction using Parking Logs with Recurrent Neural Networks

Liaq Mudassar, Yung-Cheol Byun
Pages: 133 - 142
Neural Networks have been performing state of the art for almost a decade now; when it comes to classification and prediction domains. Within last few years, neural networks have been improved tremendously and their performance is even better than humans in some domains, e.g. AlphaGo vs Lee Sedol and...
Research Article

Test Image Generation using Segmental Symbolic Evaluation

Tahir Jameel, Mengxiang Lin
Pages: 135 - 147
Image processing applications have played a vital role in modern life and they are required to be well tested due to their significance and human dependence on them. Testing of image processing application is difficult due to complex nature of images in terms of their generation and evaluation. The presented...
Research Article

MLSA: a static bugs analysis tool based on LLVM IR

Hongliang Liang, Lei Wang, Dongyang Wu, Jiuyun Xu
Pages: 137 - 144
Program bugs may result in unexpected software error, crash or serious security attack. Static program analysis is one of the most common methods to find program bugs. In this paper we present MLSA -- a static analysis tool based on LLVM Intermediate Representation (IR), which can analyze programs written...
Research Article

Towards a Monitoring Framework for the Automatic Integration of the Access Control Policies for Web Services

Mohammed Alodib
Pages: 137 - 149
Cloud computing is an emerging model of business computing that can be used to maintain configurable resources such as processors, networks, storage, operating systems, databases, and servers. Service oriented Architecture (SoA) is one of most successful paradigms deployed over the Cloud; is a layered...
Research Article

Performance Analysis of Blockchain-based Access Control Model for Personal Health Record System with Architectural Modelling and Simulation

Thein Than Thwin, Sangsuree Vasupongayya
Pages: 139 - 151
The Personal Health Record (PHR) could be seen as a preventive care solution to the incoming aging society. The blockchain-based PHR system has been proposed recently to enhance the security and privacy for the PHR data. Consequently, the performance becomes a concern for blockchain-PHR integration because...
Research Article

Transitional Method for Identifying Improvements in Video Distribution Services

Motoi Iwashita
Pages: 141 - 148
Customer satisfaction is an indicator that is generally utilized to improve goods/services for customer retention. Therefore, companies should understand the changes in customers’ perception of their goods/services and decide improvements. Therefore, a transitional evaluation approach is needed for goods/services...
Research Article

A Pair-wise Bare Bones Particle Swarm Optimization Algorithm for Nonlinear Functions

Jia Guo, Yuji Sato
Pages: 143 - 151
Bare bones particle swarm optimization is a parameter-free swarm intelligence algorithm which is famous for easy applying. It has aroused wide concern of academic circle on its principles and applications in recent years. However, losing the diversity quickly still causes the premature convergence in...
Research Article

On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback

Wei Yu, Xinwen Fu, Erik Blasch, Khanh Pham, Dan Shen, Genshe Chen, Chao Lu
Pages: 144 - 158
Network-based crime has been increasing in both extent and severity and network-based forensics encapsulates an essential part of legal surveillance. A key network forensics tool is traceback that can be used to identify true sources of suspects. Both accuracy and secrecy are essential attributes of...
Research Article

A Formal Model of Peer-to-Peer Digital Product Marketplace

Sylvanus A. Ehikioya
Pages: 143 - 154
Peer-to-peer (P2P) electronic commerce has become increasingly popular over the last few years. This popularity of P2P is due mainly to the many advantages it offers, such as the ease of sharing of computer resources and reducing cost. This paper uses both semi-formal and formal specification methods...
Research Article

Adaptive Omni-directional Walking Method with Fuzzy Interpolation for Biped Robots

Haobin Shi, Xuesi Li, Huahui Chen, Shixiong Wang
Pages: 145 - 158
Omni-directional walking is an important part for biped robots. Whereas, the problems of complex model, low stability, low flexibility, etc., existing in walking planning of biped robots, attract interests of many researchers. This paper proposes an adaptive omni-directional walking method with fuzzy...
Research Article

Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree)

Lifford McLauchlan, Soumya Saha, Rajab Challoo
Pages: 148 - 155
Wireless Sensors Networks (WSNs) are utilized in many diverse applications ranging from security, environmental monitoring, landslide detection, patient monitoring, reconnaissance operations, structural health monitoring and smart buildings. Since in many applications the WSN nodes are randomly deployed,...
Research Article

Jade: Reducing Energy Consumption of Android App

Hao Qian, Daniel Andresen
Pages: 150 - 158
The need for increased performance of mobile device directly conflicts with the desire for longer battery life. Offloading computation to multiple devices is an effective method to reduce energy consumption and enhance performance for mobile applications. Android provides mechanisms for creating mobile...
Research Article

Efficient Searching for Essential API Member Sets based on Inclusion Relation Extraction

Yushi Kondoh, Masashi Nishimoto, Keiji Nishiyama, Hideyuki Kawabata, Tetsuo Hironaka
Pages: 149 - 157
Search tools for Application Programming Interface (API) usage patterns extracted from open source repositories could provide useful information for application developers. Unlike ordinary document retrieval, API member sets obtained by mining are often similar to each other and are mixtures of several...
Research Article

Research on Service Recommendation Reliability in mobile computing

Weng Wen, Huaikou Miao
Pages: 152 - 163
Web services bring more conveniences for users and developers. However, it makes user face the problem of service information explosion. The personalized service recommendation solves the problem. This paper proposes a mechanism to evaluate Web service composition’s reliability which bases on user context...
Research Article

Enhancing Case-based Reasoning Approach using Incremental Learning Model for Automatic Adaptation of Classifiers in Mobile Phishing Detection

San Kyaw Zaw, Sangsuree Vasupongayya
Pages: 152 - 161
This article presents the threshold-based incremental learning model for a case-base updating approach that can support adaptive detection and incremental learning of Case-based Reasoning (CBR)-based automatic adaptable phishing detection. The CBR-based adaptive phishing detection model detects the phishing...
Research Article

Efficient Security and Privacy Protection for Emerging Smart RFID Communications

Mohammad Fal Sadikin, Marcel Kyas
Pages: 156 - 165
Due to its constrained nature, the use of smart RFID technology introduces tremendous security and privacy issues. This paper presents IMAKA-Tate: Identity protection, Mutual Authentication and Key Agreement using Tate pairing of Identity-based Encryption method. It is designed to tackle various challenges...
Research Article

One to One Identification of Cryptosystem Using Fisher’s Discriminant Analysis

Xinyi Hu, Yaqun Zhao
Pages: 155 - 173
Distiguishing analysis is an important part of cryptanalysis. It is an important content of discriminating analysis that how to identify ciphertext is encrypted by which cryptosystems when it knows only ciphertext. In this paper, Fisher’s discriminant analysis (FDA), which is based on statistical method...
Research Article

Distributed and High Performance Big-File Cloud Storage Based On Key-Value Store

Thanh Trung Nguyen, Minh Hieu Nguyen
Pages: 159 - 172
This research proposes a new Big File Cloud (BFC) with its architecture and algorithms to solve difficult problems of cloud-based storage using the advantages of key-value stores. There are many problems when designing an efficient storage engine for cloud-based storage systems with strict requirements...
Research Article

Device driver development of an external human interaction device for the Android

Naoto Ogawa, Shuichi Oikawa
Pages: 159 - 166
Recently, many people have used Smartphones. The feature of Smartphones is that they are equipped with a mobile operating system (OS) for the control of sensors and modules. In this situation, we can connect external human interaction devices with the Smartphone. Our objective is to know how the external...
Research Article

Secure in-vehicle Systems using Authentication

Masaya Yoshikawa, Kyota Sugioka, Yusuke Nozaki, Kensaku Asahi
Pages: 159 - 166
Recently, driving support technologies have been practically used. However, a problem has been pointed out that when a vehicle is connected with an external network, the safety of the vehicle is threatened. Ensuring the security of in-vehicle systems becomes an important priority. The present study proposes...
Research Article

A Secure and Scalable Data Source for Emergency Medical Care using Blockchain Technology

Shirin Hasavari, Yeong-Tae Song
Pages: 158 - 166
A relationship exists between the emergency patient death rate and factors such as the failure to access a patient’s critical data and the time it takes to arrive at hospitals. The ability for Paramedics to access a patient’s complete picture of emergency-relevant medical data is critical and can significantly...
Research Article

Research on Intelligent Question and Answering Based on a Pet Knowledge Map

Yuan Liu, Wen Zhang, Qi Yuan, Jie Zhang
Pages: 162 - 170
This paper proposes a framework for constructing pet knowledge maps. The schema concept layer is designed and built top-down, and the data layer is constructed from knowledge extracted from semi-structured and unstructured data. In the aspect of entity extraction of unstructured data, a symptom-named...
Research Article

Design of Joint Cooperative Routing, MAC and Physical Layer with QoS-aware Traffic-based Scheduling for Wireless Sensor Networks

Jawad Ahmad Haqbeen, Takayuki Ito, Mohammad Arifuzzaman, Takanobu Otsuka
Pages: 164 - 175
Compare the WSN with other conventional network system, the changing or charging the existing battery of sensor node within WSN is a tough job. Therefore, since last decade the effort has been made to design and introduce a large number of communication protocol for WSN with given concern on the performance...
Research Article

One-D-R-A-G-SOM and its Application to a Hand Shape Instruction Learning System

Takashi Kuremoto, Takuhiro Otani, Shingo Mabu, Masanao Obayashi, Kunikazu Kobayashi
Pages: 166 - 174
In this paper, a novel self-organizing map (SOM) named “One-D-R-A-G-SOM” is proposed. It is a kind of one dimensional ring type growing SOM using asymmetric neighborhood function. As the topology of one dimensional ring type feature map is more suitable to increase or decrease the number of units, and...
Research Article

Efficient Keyword-Related Data Collection in a Social Network with Weighted Seed Selection

Changhyun Byun, Hyeoncheol Lee, Jongsung You, Yanggon Kim
Pages: 167 - 173
Data mining in a social network can yield interesting perspectives to understanding human behavior or detecting topics or communities. However, it is difficult to gather the data related to a specific topic due to the main characteristics of social media data: large, noisy, and dynamic. To collect the...
Research Article

Effective Management of ReRAM-based Hybrid SSD for Multiple Node HDFS

Nayoung Park, Byungjun Lee, Kyung Tae Kim, Hee Yong Youn
Pages: 167 - 176
Recently, the research of Hybrid ReRAM/MLC NAND SSD is rapidly expanding into the storage areas. Most existing researches of Hybrid SSD are based on a single storage, while the management of multiple nodes like HDFS is still immature. In this paper a new efficient cold data eviction scheme is proposed...
Research Article

SAIFU: Supporting Program Understanding by Automatic Indexing of Functionalities in Source Code

Masashi Nishimoto, Keiji Nishiyama, Hideyuki Kawabata, Tetsuo Hironaka
Pages: 167 - 174
Programs in the event-driven style that are typical of mobile and/or Web applications are becoming complex and hard to maintain. For the purpose of reducing the burden put on software developers while reading source code to understand its details, we propose a tool for supporting program understanding,...
Research Article

A Traffic Tracking Analysis Model for the Effective Management of E-commerce Transactions

Sylvanus A. Ehikioya, Shenghong Lu
Pages: 171 - 193
The increasing popularity of the Internet and e-commerce makes online merchants to constantly seek tools that would permit them to attract new and retain old customers. Traffic tracking and analysis tools can help businesses know more about their customers. These tools track visitors’ behaviors on Web...
Research Article

Paralleled Fast Search and Find of Density Peaks Clustering Algorithm on GPUs with CUDA

Mi Li, Jie Huang, Jingpeng Wang
Pages: 173 - 181
Fast Search and Find of Density Peaks (FSFDP) is a newly proposed clustering algorithm that has already been successfully applied in many applications. However, this algorithm shows a dissatisfactory performance on large dataset due to the time-consuming calculation of the distance matrix and potentials....
Research Article

Flexible WSNs Aims Easy Installation With Noise Reduce Method For Elderly People Care

Takanobu Otsuka, Takayuki Ito
Pages: 174 - 186
Much research has been conducted on anomaly detection by wireless sensor networks (WSNs). The existing WSNs require specialized knowledge and skills to install the sensors in environments such as houses and buildings. Therefore, we have developed a flexible WSN based on small sensor devices that can...
Research Article

On Design-time Modelling and Verification of Safety-critical Component-based Systems

Nermin Kajtazovic, Christopher Preschern, Andrea Höller, Christian Kreiner
Pages: 175 - 188
Component-based Software Engineering (CBSE) is currently a key paradigm used for developing safetycritical systems. It provides a fundamental means to master systems complexity, by allowing to design systems parts (i.e., components) for reuse and by allowing to develop those parts independently. One...
Research Article

A Triggered Delay-based Approach against Cache Privacy Attack in NDN

Naveen Kumar, Ashutosh Kumar Singh, Shashank Srivastava
Pages: 174 - 184
Content caching is one of the most significant features of Named Data Networking (NDN) that improves the performance. However, this feature makes the cache vulnerable to attacks that determine the recent cache access pattern. In cache privacy attack, an attacker can probe request and determine if the...
Research Article

Improve Example-Based Machine Translation Quality for Low-Resource Language Using Ontology

Khan Md Anwarus Salam, Setsuo Yamada, Nishino Tetsuro
Pages: 176 - 191
In this research we propose to use ontology to improve the performance of an EBMT system for low-resource language pair. The EBMT architecture use chunk-string templates (CSTs) and unknown word translation mechanism. CSTs consist of a chunk in source-language, a string in target-language, and word alignment...
Research Article

Load Balancing of Peer-to-Peer MMORPG Systems with Hierarchical Area-of-Interest Management

Satoshi Fujita
Pages: 177 - 184
This paper studies the load balancing problem in distributed systems designed for massively multiplayer online role-playing games (MMORPGs). More concretely, we consider a distributed system of master- worker type in which each worker is associated with a particular region in the game field, and propose...
Research Article

A Scoring Rule-based Truthful Demand Response Mechanism

Keisuke Hara, Takayuki Ito
Pages: 182 - 192
Demand Response (DR) has been extensively studied as one of the important features of smart grid. The DR strategies can be grouped into two categories, one is incentive-based DR and the other is pricing-based DR. Our work focuses on DR involving both pricing factor and incentive factor using scoring...
Research Article

Contour Completion of Partly Occluded Objects Based on Figural Goodness

Takahiro Hayashi, Tatsuya Ooi, Motoki Sasaki
Pages: 185 - 192
Object extraction has a crucial role in various visual semantic scenarios. In this paper, we propose a system for object extraction which can deal with an object partly occluded by other objects. In order to estimate the hidden part of the occluded object, the system combines different types of contour...
Research Article

Estimating Procedure for Function Point and Development Cost in South Korea

Byeongdo Kang, Jongseok Lee
Pages: 185 - 194
This paper introduces the practical guidelines for function point analysis in the Republic of Korea. Korean government recommends that Function Point Analysis should be adopted as a standard method for measuring the functional size of software. Function Point was proposed by an international organization....
Research Article

Utilizing Human-Computer Interaction Data to Extract User Interests from Web-based Learning Systems

Yücel Ugurlu
Pages: 187 - 195
We propose a novel approach by utilizing human-computer interaction data to extract user interests from web-based learning systems. The proposed approach is based on user access and a wearable context recognition system. Under our approach, a series of screen images are captured by an imaging device...
Research Article

Comparative Study of Various Wireless Sensor Network (WSN) Topology Construction Protocols

Lifford McLauchlan, Soumya Saha, Claudio Montiel, Rajab Challoo
Pages: 189 - 197
As the cost for wireless sensors and wireless sensor networks (WSNs) have decreased, they have become more ubiquitous; they are increasingly being used in many applications such as security, structural monitoring and environmental monitoring. Many WSN applications employ a random sensor deployment to...
Research Article

Burst Transmission and Frame Aggregation for VANET Communications

Wei Kuang Lai, Mei-Tso Lin, Ting-Huan Kuo
Pages: 192 - 202
In vehicular ad hoc networks (VANETs), due to highly mobile and frequently changing topology, available resources and transmission opportunities are restricted. To address this, we propose a burst transmission and frame aggregation (FAB) scheme to enhance transmission opportunity (TXOP) efficiency of...
Research Article

Using SPIN to Check Simulink Stateflow Models

Chikatoshi Yamada, D. Michael Miller
Pages: 193 - 202
Verification is critical to the design of large and complex systems. SPIN is a well-known and extensively used verification tool. In this paper, we consider two tool chains, one existing, WSAT, and one introduced here, that support using SPIN to model check systems specified as Simulink Stateflow models....
Research Article

Development of an Effective Gaze Writing System with an Interface for Text Copy and Paste

Reo Kishi, Takahiro Hayashi
Pages: 193 - 201
While many interfaces for gaze writing (text entry by eye gaze) are available today, these interfaces are just a replacement of a keyboard. For more efficient gaze writing, this paper proposes a novel gaze writing system which has two kinds of gaze writing interfaces: (1) an interface for text entry...
Research Article

A Checkpoint/Restart Scheme for CUDA Programs with Complex Computation States

Hai Jiang, Yulu Zhang, Jeff Jennes, Kuan-Ching Li
Pages: 196 - 212
Checkpoint/restart has been an effective mechanism to achieve fault tolerance for many long-running scientific applications. The common approach is to save computation states in memory and secondary storage for execution resumption. However, as the GPU plays a much bigger role in high performance computing,...
Research Article

Optimized Common Parameter Set Extraction Framework by Multiple Benchmarking Applications on a Big Data Platform

Jongyeop Kim, Abhilash Kancharla, Jongho Seol, Indy N. Park, Nohpill Park
Pages: 195 - 203
This research proposes the methodology to extract common configuration parameter set by applying multiple benchmarking applications include TeraSort, TestDFSIO, and MrBench on the Hadoop distributed file system. The parameter search space conceptually conducted named Ω(x) to hold status of all parameter...
Research Article

Improved Version of Round Robin Scheduling Algorithm Based on Analytic Model

Alaa Fiad, Zoulikha Mekkakia Maaza, Hayat Bendoukha
Pages: 195 - 202
Scheduling is one of the most important issues in the operating system, such as the tasks must be affected to the appropriate virtual machines, considering different factors at the same time to ensure better use of resources. A lot of research has been carried out to propose more efficient task scheduling...
Research Article

Fast Parallel Network Packet Filter System based on CUDA

Che-Lun Hung, Shih-Wei Guo
Pages: 198 - 210
In recent years, with the rapid development of the network hardware and software, the network speed is enhanced to multi-gigabit. Network packet filtering is an important strategy of network security to avoid malicious attacks, and it is a computation-consuming application. Therefore, we develop two...
Research Article

A Routing Algorithm Solving the Container Problem in a Hypercube with Bit Constraint

Antoine Bossard, Keiichi Kaneko
Pages: 202 - 213
As reflected by the TOP500 list, hypercubes are popular interconnection networks for massively parallel systems, the main reason being the simplicity and ease of implementation of this network topology. In order to retain performance high and avoid bottleneck situation, routing algorithms are critical...
Research Article

Recognition and Intensity Estimation of Facial Expression Using Ensemble Classifiers

Hiroki Nomiya, Shota Sakaue, Teruhisa Hochin
Pages: 203 - 211
Facial expression recognition (FER) has been widely studied since it can be used for various applications. However, most of FER techniques focus on discriminating typical facial expressions such as six basic facial expressions. Spontaneous facial expressions are not limited to such typical ones because...
Research Article

Load Experiment of the vDACS Scheme in case of the 300 Clients

Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii
Pages: 203 - 210
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data,...
Research Article

Vehicle Platooning Systems: Review, Classification and Validation Strategies

Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah
Pages: 203 - 213
This paper presents a systematic literature review of platooning systems with a special focus on the strategies which have been adopted to validate platooning algorithms. We collect the existing studies in the platooning field. The proposed algorithms are compared based on some criteria including platooning...
Research Article

Social Media Comment Management using SMOTE and Random Forest Algorithms

Nuanwan Soonthornphisaj, Taratep Sira-Aksorn, Pornchanok Suksankawanich
Pages: 204 - 209
Comment posting is one of the main features found in social media. Comment responses enrich the social network function especially for how-to content. In this work, we focus on cooking video clips which are popular among users. Various questions found in comments need to be clustered in order to facilitate...
Research Article

An Evaluation of Coding Violation Focusing on Change History and Authorship of Source File

Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara
Pages: 211 - 220
This paper focuses on an evaluation of coding violation warned by a static code analysis tool while considering the change history of violation and the authorship of source file. Through an empirical study with data collected from seven open source software projects, the following findings are reported:...
Research Article

Embedding GPU Computations in Hadoop

Jie Zhu, Hai Jiang, Juanjuan Li, Erikson Hardesty, Kuan-Ching Li, Zhongwen Li
Pages: 211 - 220
As the size of high performance applications increases, four major challenges including heterogeneity, programmability, fault resilience, and energy efficiency have arisen in the underlying distributed systems. To tackle with all of them without sacrificing performance, traditional approaches in resource...
Research Article

Extracting Children?s Behavioral Characteristics for Acquiring Language from Texts of Picture Book Reviews

Hiroshi Uehara, Mizuho Baba, Takehito Utsuro
Pages: 212 - 220
Pointing behavior in childhood is typical developmental sign having strong correlation to his or her language development. This paper focuses on the pointing behavior accompanied by utterance during picture book reading. With this respect, we make use of picture books’ review data amounting to approximately...
Research Article

The Dependability of Crypto Linked Off-chain File Systems in Backend Blockchain Analytics Engine

Jongho Seol, Abhilash Kancharla, Nicole Park, Nohpill Park, Indy Nohjin Park
Pages: 210 - 215
This paper presents ways to assure the efficacy of managing crypto links and crypto speed with respect to the dependability of blockchain. The dependability in this work is defined with reference to crypto links in a proportional manner and crypto speed in an inversely proportional manner, respectively....
Research Article

Performance Characteristics of Hybrid MPI/OpenMP Scientific Applications on a Largescale Multithreaded BlueGene/Q Supercomputer

Xingfu Wu, Valerie Taylor
Pages: 213 - 225
Many/multi-core supercomputers provide a natural programming paradigm for hybrid MPI/OpenMP scientific applications. In this paper, we investigate the performance characteristics of five hybrid MPI/OpenMP scientific applications (two NAS Parallel benchmarks Multi-Zone SP-MZ and BT-MZ, an earthquake simulation...
Research Article

An Energy Efficient Clustering Algorithm for Maximizing the Lifetime of Wireless Sensor Network

Kyung Tae Kim, Man Youn Kim, Ji Hyeon Choi, Hee Yong Youn
Pages: 214 - 223
In this paper we propose an energy efficient clustering algorithm for maximizing the lifetime of WSNs. The proposed scheme decides the cluster head based on the energy level of the nodes, while tree topology is adopted to connect the nodes inside each cluster. A new model for deciding an optimal number...
Research Article

Secure Communications by Tit-for-Tat Strategy in Vehicular Networks

Fatima Zohra Mostefa, Zoulikha Mekkakia Maaza, Claude Duvallet
Pages: 214 - 221
Secure communication is one of the main challenges of ad hoc Vehicle Networks (VANET). Intrusion detection of malicious nodes is one of the solutions to secure communication in VANETs using hybrid architecture (V2V and V2I). This article proposes an approach based on game theory, in particular the “Tit-for-Tat”...
Research Article

Tracing a Weld Line using Artificial Neural Networks

Srinath Hanumantha Rao, V. Kalaichelvi, R. Karthikeyan
Pages: 216 - 223
Robotic manipulators are becoming increasingly popular nowadays with applications in almost every industry and production line. It is difficult but essential to create a common algorithm for the different types of manipulators present in today’s market so that automation can be achieved at a faster rate....
Research Article

Frequency-specific Alterations of Functional Hub in Generalized Tonic-clonic Seizure

Zhe Zhang, Huiyan Cheng, Xuhui Chen, Chaolin Ma
Pages: 221 - 230
Resting-state functional magnetic resonance imaging (rs-fMRI) has shown aberrant brain functional networks at a conventional low-frequency range (0.01-0.08 Hz) in individuals with generalized tonic-clonic seizure (GTCS). However, it is unclear how functional networks hubs change across different frequency...
Research Article

Enabling GSD Task Allocation via Cloud-based Software Processes

Sami Alajrami, Barbara Gallina, Alexander Romanovsky
Pages: 221 - 232
Allocating tasks to distributed sites in Global Software Development (GSD) projects is often done unsystematically and based on the personal experience of project managers. Wrong allocation decisions increase the project’s risks as tasks have dependencies that are inherited by the distributed sites....
Research Article

Human Activity Recognition in WSN: A Comparative Study

Muhammad Arshad Awan, Zheng Guangbin, Cheong-Ghil Kim, Shin-Dug Kim
Pages: 221 - 230
Human activity recognition is an emerging field of ubiquitous and pervasive computing. Although recent smartphones have powerful resources, the execution of machine learning algorithms on a large amount of data is still a burden on smartphones. Three major factors including; classification algorithm,...
Research Article

Enhanced Hypervisor-based SSD Cache with Dynamic Cache Scanning and Allocation for Virtualized Cloud System

Hee Jung Park, Kyung Tae Kim, Man Yun Kim, Hee Yong Youn
Pages: 224 - 233
Recently, SSD caching is widely studied for VM-based systems. In this paper we propose a novel hypervisor-based SSD caching scheme, employing a new metric to accurately determine the demand on SSD cache space of each VM. Computer simulation confirms that it substantially improves the accuracy of cache...
Research Article

Fault Tolerant Distributed Stream Processing based on Backtracking

Qiming Chen, Meichun Hsu, Castellanos Malu
Pages: 226 - 238
Since distributed stream analytics is treated as a kind of cloud service, there exists a pressing need for its reliability and fault-tolerance, to guarantee the streaming data tuples to be processed in the order of their generation in every dataflow path, with each tuple processed once and only once....
Research Article

Improvement of the Dynamic Software Birthmark Process by Reducing the Time of the Extraction

Takanori Yokoi, Haruaki Tamada
Pages: 224 - 231
It is a quite tough task to detect the stolen programs since there is a quite huge number of programs in the world. The dynamic software birthmarks were proposed to detect the suspects of plagiarisms based on the runtime behavior of the programs. The detection process with the dynamic birthmarks is composed...
Research Article

Refinement on Data, Information and Knowledge Lifecycles towards Service Economics Planning to Services Implementation

Yucong Duan, Gongzhu Hu, Xiaobing Sun, Zhaoxin Lin, Qiang Duan
Pages: 231 - 242
Service Economics has been successfully proposed and implemented for promoting the macro service market especially in Global value chains which however don’t provide guidance to and integrate directly with the IT side implementation to achieve coherent information coordination and robust adaptability...
Research Article

An Improved Autonomous Cross-Layer Optimization Framework for Wireless Multimedia Communication in Heterogeneous Networks

Yuping Dong, C. Hwa Chang, Zengxu Yang
Pages: 231 - 240
Various cross-layer optimization schemes have been proposed for the purpose of enhancing wireless network performances. In this paper, we present an improved autonomous cross-layer optimization to fit modern heterogeneous communication networks. In our design, different Quality of Service (QoS) requirements...
Research Article

Improvement and Evaluation of Estimation of Time Series Data of Daily Life

Teruhisa Hochin, Hiroki Nomiya
Pages: 233 - 242
This paper improves the estimation of the amounts of sewage flow, which is one of daily life data, in order to manage them efficiently. The amounts of flow of a typical day are tried to be adjusted to those of a non-regular day. A typical (non-regular, respectively) day is a non-rainy day having good...
Research Article

Hybrid Approach of Ontology and Image Clustering for Automatic Generation of Hierarchic Image Database

Ryosuke Yamanishi, Ryoya Fujimoto, Yuji Iwahori, Robert J. Woodham
Pages: 234 - 242
This paper proposes a hybrid approach of ontology and image clustering to automatically generate hierarchic image database. In the field of computer vision, ”generic object recognition” is one of the most important topics. Generic object recognition needs three types of research: feature extraction,...
Research Article

Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods

Yosuke Isobe, Haruaki Tamada
Pages: 232 - 238
The Identifier Renaming Method (IRM) is a well-used obfuscation method since almost obfuscation tools use the algorithm, and easy to implement. The IRM transforms the identifier names in the programs to meaningless names in order to hard to understand. However, the evaluations against attacks such as...
Research Article

On Dynamic Multicast Traffic Provisioning with Grooming Capabilities Support in Light-Trail Networks

Ching-Fang Hsu, Tzu-Huan Tang
Pages: 239 - 250
In recent years, because of the popularity of Internet and the rapid growth of multimedia applications, the requirements of bandwidth from users increase violently in optical networks. Various multicast multimedia services also bring challenges to next generation optical networks. As the rapid advance...
Research Article

Query Integrity Verification based-on MAC Chain in Cloud Storage

Jun Hong, Tao Wen, Quan Guo, Gang Sheng
Pages: 241 - 249
In order to reduce data maintenance overhead, more and more enterprises outsource their data to the cloud storage, which provides flexible and on-demand storage service for companies. Data outsourcing also brings a lot of security problems, of which query integrity is a critical issue to be resolved....
Research Article

Minority Costume Image Retrieval by Fusion of Color Histogram and Edge Orientation Histogram

Xu-mei Shen, Ju-xiang Zhou, Tian-wei Xu
Pages: 243 - 251
It has very important practical significance to analyze and research minority costume from the perspective of computer vision for minority culture protection and inheritance. As first exploration in minority costume image retrieval, this paper proposed a novel image feature representation method to describe...
Research Article

A GPU-based Pencil Beam Algorithm for Dose Calculations in Proton Radiation Therapy

Georgios Kalantzis, Theodora Leventouri, Hidenobu Tachibana, Charles Shang
Pages: 243 - 249
Recent developments in radiation therapy have been focused on applications of charged particles, especially protons. Proton therapy can allow higher dose conformality compared to conventional radiation therapy. Over the years several dose calculation methods have been proposed in proton therapy. A common...
Research Article

Estimating and Visualizing the Time-varying Effects of a Binary Covariate on Longitudinal Big Text Data

Shizue Izumi, Tetsuji Tonda, Noriyuki Kawano, Kenichi Satoh
Pages: 243 - 253
We propose a method to estimate and visualize effects of a binary covariate on the longitudinally observed text data. Our method consists of series of analytical methods: extracting keywords through a morphological analysis, estimating the time-varying regression coefficient of a binary covariate for...
Research Article

Handover Management based on Asymmetric Nature of LTE-A HetNet using MCDM Algorithm

Xianda Chen, Young Ho Suh, Seung Wan Kim, Hee Yong Youn
Pages: 250 - 260
This paper proposes an efficient handover scheme considering the asymmetric characteristics of macro and pico cells in LTE-A HetNet. The proposed scheme detects a suitable target eNB for handover using a multi-criteria decision making algorithm and the mobility information of user equipment (UE). A prompt...