International Journal of Networked and Distributed Computing

+ Advanced search
195 articles
Research Article

Developer Experience Considering Work Difficulty in Software Development*

Taketo Tsunoda, Hironori Washizaki, Yosiaki Fukazawa, Sakae Inoue, Yoshiiku Hanai, Masanobu Kanazawa
Pages: 53 - 62
Previous studies have researched how developer experience affects code quality, but difficulty was ignored although experienced developers are more likely to work on more complex parts of a project. We examine work difficulty by focusing on revised files. Using product metrics, we evaluate file complexity...
Research Article

Service Value Broker Patterns: An Empirical Collection and Analysis

Yucong Duan, Keman Huang, Dan Chen, Yongzhi Wang, Ajay Kattepur, Wencai Du
Pages: 54 - 69
The service value broker(SVB) pattern integrates business modeling, knowledge management and economic anal- ysis with relieved complexity, enhanced reusability and effi- ciency,etc. The study of SVB is an emerging interdisciplinary subject which will help to promote the reuse of knowledge, strategy and...
Research Article

Topic Model based Approach for Improved Indexing in Content based Document Retrieval

Moon Soo Cha, So Yeon Kim, Jae Hee Ha, Min-June Lee, Young-June Choi, Kyung-Ah Sohn
Pages: 55 - 64
Information Retrieval system plays an essential role in web services. However, the web services in which users can upload files as attachments typically do not support enough search conditions and often rely only on the title or the description that the users provide during upload. We present a topic-model...
Research Article

Multimedia Analysis and Fusion via Wasserstein Barycenter

Cong Jin, Junhao Wang, Jin Wei, Lifeng Tan, Shouxun Liu, Wei Zhao, Shan Liu, Xin Lv
Pages: 58 - 66
Optimal transport distance, otherwise known as Wasserstein distance, recently has attracted attention in music signal processing and machine learning as powerful discrepancy measures for probability distributions. In this paper, we propose an ensemble approach with Wasserstein distance to integrate various...
Research Article

Character Segmentation and Recognition for Myanmar Warning Signboard Images

Kyi Pyar Zaw, Zin Mar Kyu
Pages: 59 - 67
This paper publicizes the character segmentation and recognition of the Myanmar warning text signboard images taken by a mobile phone camera in natural scene. In this system, two templates are created. The first template that contains both connected pixel words and characters are used for character segmentation...
Research Article

Comparison of Hash Table Performance with Open Addressing and Closed Addressing: An Empirical Study

Dapeng Liu, Shaochun Xu
Pages: 60 - 68
In this paper, we conducted empirical experiments to study the performance of hashing with a large set of data and compared the results of different collision approaches. The experiment results leaned more to closed addressing than to open addressing and deemed linear probing impractical due to its low...
Research Article

Realize Node Localization Based on OLSR Protocol in Ad Hoc Networks

Anbao Wang, Bin Zhu
Pages: 61 - 71
In wireless Ad Hoc network's many applications, learning accurately the position of the node is one of its important conditions. Node walks randomly in wireless Ad Hoc network, thus it causes the position of the nodes are stochastic; Therefore, the node localization technology is one of the difficult...
Research Article

Functional Evaluation of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations

Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii
Pages: 62 - 70
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data,...
Research Article

Improvement of CSF, WM and GM Tissue Segmentation by Hybrid Fuzzy – Possibilistic Clustering Model based on Genetic Optimization Case Study on Brain Tissues of Patients with Alzheimer’s Disease

Lilia Lazli, Mounir Boukadoum
Pages: 63 - 77
Brain tissue segmentation is one of the most important parts of clinical diagnostic tools. Fuzzy C-mean (FCM) is one of the most popular clustering based segmentation methods. However FCM does not robust against noise and artifacts such as partial volume effect (PVE) and inhomogeneity. In this paper,...
Research Article

Using SPIN to Check Simulink Stateflow Models

Chikatoshi Yamada, D. Michael Miller
Pages: 65 - 74
Verification is critical to the design of large and complex systems. SPIN is a well-known and extensively used verification tool. In this paper, we consider two tool chains, one existing, WSAT, and one introduced here, that support using SPIN to model check systems specified as Simulink Stateflow models....
Research Article

Solving MTU Mismatch and Broadcast Overhead of NDN over Link-layer Networks

Thongchai Chuachan, Karim Djemame, Somnuk Puangpronpitag
Pages: 67 - 75
Named Data Networking (NDN) has been considered as a promising Internet architecture for the future data-centric communication. In particular, NDN over link-layer networks would cut off the overheads of Transmission Control Protocol/Internet Protocol (TCP/IP), and enhance the efficiency of data distribution....
Research Article

A Formal Model of Distributed Security for Electronic Commerce Transactions Systems

Sylvanus A. Ehikioya, Adepele A. Olukunle
Pages: 68 - 84
Every distributed system requires a secure environment for its users. Security becomes even more important if users exchange sensitive information and value, across the network. An e-commerce environment is an example of a distributed system in which security is of a high priority. It is important that...
Research Article

A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks

Dongxu Jin, JooSeok Song
Pages: 69 - 78
In Vehicular Ad-hoc Networks, security is a important issue. In the past years, several approaches have been proposed for solving Sybil attack. In this paper a novel scheme to detect the Sybil nodes is presented. The proposed scheme utilizes unmodifiable physical measurements of beacon messages. To increase...
Research Article

Fully distributed certificate authority based on polynomial over elliptic curve for MANET

Ahmad Alomari
Pages: 70 - 77
A mobile ad hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or a pre-existing infrastructure. Various certificate authorities (CAs) distributed over the network, each with a periodically updated share of the secrete key, is usually adopted. Elliptic...
Research Article

Evaluating the Performance of Recoverable End-of-life Products in the Reverse Supply Chain

Santoso Wibowo, Srimannarayana Grandhi
Pages: 71 - 79
Evaluating the performance of recoverable end-of-life products with respect to a set of specific criteria is challenging. This is due to multi-dimensional nature of the decision making process, multiple evaluation criteria, and subjective and imprecise assessments. To effectively deal with this issue,...
Research Article

A Middleware-Based Implementation for Data Integration of Remote Devices

Xianyong Liu, Yanping Liu, Lizhuang Ma, Qing Gao
Pages: 72 - 78
Different from existing techniques3-5 that often focus on high level data integration, this paper contributes a novel solution at device level, implementing a fully scalable and configurable middleware, aiming at releasing the power of parallel processing with distributed data. It is designed as a soft-gateway...
Research Article

Percolation Thresholds on Tree-Based Communities of Wireless Sensor Networks

Qiao Li, Zhendong Niu, Baihai Zhang, Lingguo Cui, Bin Wu
Pages: 75 - 84
Many efficient deployments of large-scale wireless sensor networks based on the tree-based community rise into view recently. Sensor nodes are severely resource constrained, and lack sophisticated defense mechanisms to fight virus attacks. Cyber viruses spread through node populations over the networks,...
Research Article

Empirical Research on the Growth Path of China’s Industrial Economy under the Background of Supply-side Reform

Xianhong Xu
Pages: 76 - 85
Supply-side reform has provided opportunities for China’s industrial economic growth, but also experienced unprecedented challenges. Based on the background of supply-side reform, this paper applies the supply-side theory. First, it explores the mechanism between industrial overcapacity and economic...
Research Article

An Ensemble Approach for Cyber Attack Detection System: A Generic Framework

Shailendra Singh, Sanjay Silakari
Pages: 78 - 90
Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources. The fact is that no single classifier is able to give maximum accuracy...
Research Article

Implementation of Emotional Features on Satire Detection

Pyae Phyo Thu, Than Nwe Aung
Pages: 78 - 87
Recognition of satirical language in social multimedia outlets turns out to be a trending research area in computational linguistics. Many researchers have analyzed satirical language from the various point of views: lexically, syntactically, and semantically. However, due to the ironic dimension of...
Research Article

Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag

Biplob Rakshit Ray, Morshed Chowdhury, Jemal Abawajy
Pages: 79 - 88
Radio Frequency Identification (RFID) is an emerging wireless object identification technology with many potential applications such as supply chain management, personnel tracking and healthcare. However, security vulnerabilities of the RFID system have been a serious concern for its wide adoption in...
Research Article

Optimal Number of Clusters for Fast Similarity Search Considering Transformations of Time Varying Data

Toshiichiro Iwashita, Teruhisa Hochin, Hiroki Nomiya
Pages: 79 - 88
This paper proposes a method of determining the optimal number of clusters dividing the multiple transformations for the purpose of the efficient processing of query against the results of applying the transformations to time series. In this paper, the moving average is used as a transformation for simplicity....
Research Article

An Intelligent Cross-Layer QoS-Aware Protocol with Traffic-Differentiation-Based for Energy Efficient Communication in WSNs

Jawad Ahmad Haqbeen, Takayuki Ito, Mohammad Arifuzzaman, Takanobu Otsuka
Pages: 80 - 92
Despite an increase in energy efficiency of WSNs research in couple of last years, still the key challenge in the design of WSNs remains to maximize the quality of service (QoS) and energy efficiency of network system. The layered strength and functionality collaboration is commonly considered as one...
Research Article

Archaeological Distribution Map System Using Aggregate Information from Heterogeneous Information Sources

Ayako Hayashi, Teruhisa Hochin, Hiroki Nomiya
Pages: 85 - 95
This paper proposes archaeological distribution map system sharing archaeological information. Many archaeologists want to analyze the distribution of relics and/or remains. Excavation information, however, cannot be opened until verification and research are completed. Archaeological information sources...
Research Article

Design and Implementation of an IoT-Based Smart Home Security System

Mohammad Asadul Hoque, Chad Davidson
Pages: 85 - 92
Recent advances in smartphones and affordable open-source hardware platforms have enabled the development of low-cost architectures for Internet-of-Things (IoT)-enabled home automation and security systems. These systems usually consist of sensing and actuating layer that is made up of sensors such as...
Research Article

Analysis of Features Dataset for DDoS Detection by using ASVM Method on Software Defined Networking

Myo Myint Oo, Sinchai Kamolphiwong, Thossaporn Kamolphiwong, Sangsuree Vasupongayya
Pages: 86 - 93
The impact of Distributed Denial of Service (DDoS) attack is one of the major concerns for Software Defined Networking (SDN) environments. Support Vector Machine (SVM) has been used in a DDoS attack detection mechanism on SDN. The advantages of SVM algorithms in DDoS attack detections are high accuracy...
Research Article

Real-time Multi-Agents Architecture for E-commerce Servers

Sylvanus A. Ehikioya, Cong Zhang
Pages: 88 - 98
Electronic commerce applications have strict timing constraints on the interactions between e-commerce servers and customers. Customers prefer real-time services, which mean immediate response from the server shortly after submission of a request. This trend of demand gives e-commerce servers high pressure,...
Research Article

Parallel Implementation of Apriori Algorithm Based on MapReduce

Ning Li, Li Zeng, Qing He, Zhongzhi Shi
Pages: 89 - 96
Searching frequent patterns in transactional databases is considered as one of the most important data mining problems and Apriori is one of the typical algorithms for this task. Developing fast and efficient algorithms that can handle large volumes of data becomes a challenging task due to the large...
Research Article

Parallel Indexing Scheme for Data Intensive Applications

Kenta Funaki, Teruhisa Hochin, Hiroki Nomiya, Hideya Nakanishi
Pages: 89 - 98
This paper proposes a parallel indexing scheme of a large amount of data in order to resolve the issues about time limitation. Three kinds of computing-nodes are introduced. These are reception-nodes, representative-nodes, and normal-nodes. A reception-node receives data for insertion. A representative-node...
Research Article

On a Drawing-Frequency based Layered Canvas Mechanism for Collaborative Paper Editing Support Systems

Shinya Katayama, Takushi Goda, Shun Shiramatsu, Tadachika Ozono, Toramatsu Shintani
Pages: 91 - 99
We propose a Drawing-Frequency based Layered (DFL) Canvas approach to reduce a synchronization delay in collaborative web applications. The synchronization delay consists of a network delay and a drawing delay. The network delay is well-argued topic by various researches. We focus on the drawing delay,...
Research Article

UWB signal detection based on wavelet packet and FHN model

Bowen Chen, Lei Jiang, Qun Zhang
Pages: 93 - 100
In UWB-IR signal detection, the threshold of signal to noise ratio(SNR) limit the performance of FHN model detection method, from this point, wavelet packet is introduced into FHN model, a novel UWB-IR signal detection method based on wavelet packet and FHN model is proposed, in addition, the disadvantages...
Research Article

Polar Code Appropriateness for Ultra-Reliable and Low-Latency Use Cases of 5G Systems

Arti Sharma, Mohammad Salim
Pages: 93 - 99
Polar code is considered as a major breakthrough of past decade in channel coding area. The unprecedented performance of polar codes compelled third generation partnership project (3GPP) to adopt the polar codes for control channels functions in one of the fifth generation (5G) scenario enhanced mobile...
Research Article

Compositional Stochastic Model Checking Probabilistic Automata via Assume-guarantee Reasoning

Yang Liu, Rui Li
Pages: 94 - 107
Stochastic model checking is the extension and generalization of the classical model checking. Compared with classical model checking, stochastic model checking faces more severe state explosion problem, because it combines classical model checking algorithms and numerical methods for calculating probabilities....
Research Article

Accelerated Diffusion-Based Recommendation Algorithm on Tripartite Graphs with GPU Clusters

Jingpeng Wang, Jie Huang, Mi Li
Pages: 96 - 105
Exorbitant computation cost hinders the practical application of recommendation algorithm, especially in time-critical application scenario. Although experiments show that recommendation algorithm based on an integrated diffusion on user-item-tag tripartite graphs can significantly improve accuracy,...
Research Article

Modeling Performance of CSMA/CA with Retransmissions in Wireless Personal Area Networks

Zhongwei Zhang
Pages: 97 - 107
Despite the widespread uses in military, smart building, habitat monitoring, Wireless sensor networks (WSNs) just begun showing their superiority in the medical and healthcare domain. Facing same challenges as other applications, deployment of WPANs in medical domain exert many more stringent requirements,...
Research Article

Evaluation of A Secure Live Migration of Virtual Machines Using IPsec Implementation

Norshazrul Azman bin Sulaiman, Hideo Masuda
Pages: 99 - 108
Live migration enables administrators to perform online maintenance on host and virtual machines without interrupted service during fault occurrences. While migrating VMs between physical servers of different data centers over the network is considered, security is essential for securing the migration...
Research Article

Handoff Delay Optimization Using Hybrid Prediction Model

M R Regitha, Varghese Paul, Shailesh Sivan, Nijo Antony
Pages: 99 - 107
Research Article

Using Cryptographic Technique for Securing Route Discovery and Data Transmission from BlackHole Attack on AODV-based MANET

Seryvuth Tan, Phearin Sok, Keecheon Kim
Pages: 100 - 107
MANET is a dynamic wireless network without any infrastructures. The network is weak and vulnerable to many types of attacks including BlackHole attack. BlackHole node advertises itself as having freshest or shortest path to a specific node to absorb packets. The effect of BlackHole attack on AODV will...
Research Article

An Innovative Positioning System with Unsynchronized Interferometric Modulated Signals in Wireless Sensor Networks

Ruiling Gao, Alva Couch, Chorng Hwa Chang
Pages: 101 - 112
In this paper, we investigate the sensor localization problem and present Stochastic Radio Interferometric Positioning System with Unsynchronized Modulated Signals (SRIPS_UMS). Previous radio interferometric positioning methods have limitations include (1) strict hardware requirements for Received Signal...
Research Article

Semantic Schema Matching for String Attribute with Word Vectors and its Evaluation

Kenji Nozaki, Teruhisa Hochin, Hiroki Nomiya
Pages: 100 - 106
Instance-based schema matching is to determine the correspondences between heterogeneous databases by comparing instances. Heterogeneous databases consist of an enormous number of tables containing various attributes, causing the data heterogeneity. In such cases, it is effective to consider semantic...
Research Article

An Extended Web Displaying System based on Multiple Tablet Devices

Shota Imai, Shun Shiramatsu, Tadachika Ozono, Toramatsu Shintani
Pages: 106 - 115
We propose an extended Web displaying system based on multiple tablet devices to help users to conduct collaborative works anywhere without a large display. Users can use multiple tablet devices as a pseudo mobile large display on demand by using our system. For example, users can make discussions by...
Research Article

Multi-Objective Optimization for Milling Operations using Genetic Algorithms under Various Constraints

Libao An, Peiqing Yang, Hong Zhang, Mingyuan Chen
Pages: 108 - 114
In this paper, the parameter optimization problem for face-milling operations is studied. A multi-objective mathematical model is developed with the purpose to minimize the unit production cost and total machining time while maximize the profit rate. The unwanted material is removed by one finishing...
Research Article

Design and Implementation of Dynamic Hybrid Virtual Honeypot Architecture for Attack Analysis

Yonas Kibret, Wang Yong
Pages: 108 - 123
Honeypots are dedicated machines whose aim is to delay and divert attackers away from critical resources in order to study new methods and tools used by attackers. However, when looking most of current honeypot systems are statically configured and managed. They are either low interaction honeypot or...
Research Article

“Never fry carrots without chopping” Generating Cooking Recipes from Cooking Videos Using Deep Learning Considering Previous Process

Tatsuki Fujii, Yuichi Sei, Yasuyuki Tahara, Ryohei Orihara, Akihiko Ohsuga
Pages: 107 - 112
Research on deep-training captioning models that modify the natural-language contents of images and moving images has produced considerable results and attracted attention in recent years. In this research, we aim to generate recipe sentences from cooking videos acquired from YouTube. We treat this as...
Research Article

Integrated Usage of Heterogeneous Databases for Novice Users

Ayano Terakawa, Teruhisa Hochin, Hiroki Nomiya
Pages: 109 - 118
This paper proposes the system enabling users to use heterogeneous databases in an integrated manner without any conversion and servers. In order to treat a variety of sources in a unified manner, this system is realized by using Java Database Connectivity (JDBC) in accessing databases on the user’s...
Research Article

Internet of Things in the 5G Mobile Communication System: The Optimal Number of Channels in Channel Hopping*

Gayoung Kim, Minjoong Rim
Pages: 108 - 117
One of the typical goals of the 5G mobile communication system1 is to establish an Internet of Things (IoT)2 environment in which all objects are connected to the network to generate and share information through not only mobile terminals but also mobile communication infrastructure. 5G must support...
Research Article

MLP and CNN-based Classification of Points of Interest in Side-channel Attacks

Hanwen Feng, Weiguo Lin, Wenqian Shang, Jianxiang Cao, Wei Huang
Pages: 108 - 117
A trace contains sample points, some of which contain useful information that can be used to obtain a key in side-channel attacks. We used public datasets from the ANSSI SCA Database (ASCAD) as well as SM4 traces to learn whether a trace consisting of Points of Interest (POIs) have a positive effect...
Research Article

Measuring the Distance of Moving Objects from Big Trajectory Data

Khaing Phyo Wai, Nwe Nwe
Pages: 113 - 122
Location-based services have become important in social networking, mobile applications, advertising, traffic monitoring, and many other domains. The growth of location sensing devices has led to the vast generation of dynamic spatial-temporal data in the form of moving object trajectories which can...
Research Article

Do You Like Sclera? Sclera-region Detection and Colorization for Anime Character Line Drawings

Masashi Aizawa, Yuichi Sei, Yasuyuki Tahara, Ryohei Orihara, Akihiko Ohsuga
Pages: 113 - 120
Colorizing line drawings requires special skill, experience, and knowledge. Artists also spend a great deal of time and effort creating art. Given this background, research on automated line drawing colorization was recently conducted. However, the existing approaches present multiple problems, one of...
Research Article

System Architecture & Feature Design for Engineering a Web-based Travel Advisor System

Amir Maddah, Manolya Kavakli
Pages: 115 - 121
Many Advisor Systems have been designed and developed to assist us in decision-making, each with their strengths and weaknesses. A popular type of Advisor systems is Travel Advisor systems that assist travelers in their travel arrangements. We have designed and implemented a Travel Advisor system to...