International Journal of Networked and Distributed Computing

+ Advanced search
195 articles
Research Article

IntegrityMR: Exploring Result Integrity Assurance Solutions for Big Data Computing Applications

Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa, Yucong Duan, Wencai Du
Pages: 116 - 126
Large-scale adoption of MapReduce applications on public clouds is hindered by the lack of trust on the participating virtual machines deployed on the public cloud. In this paper, we propose IntegrityMR, a multi-public clouds architecture-based solution, which performs the MapReduce-based result integrity...
Research Article

Incremental Data Migration for Multi-Database Systems Based on MySQL with SPIDER Storage Engines

Naoyuki Miyamoto, Ken Higuchi, Tatsuo Tsuji
Pages: 119 - 127
In this paper, an incremental data migration technique is evaluated in the multi-database system based on MySQL with SPIDER storage engine and the improvement of the turn-around times of other operations is proved in this systems. In this method, a large data migration is divided into small data migrations...
Research Article

An Entropy-Based Metric of Developer Contribution in Open Source Development and Its Application to Fault-Prone Program Analysis*

Kazuki Yamauchi, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara
Pages: 118 - 132
To support successful quality managements of open source software (OSS) projects, this paper proposes to measure the balance of developers’ contributions to a source file as an entropy. Through an analysis of data collected from 10 popular OSS projects, the following trends are reported: a source file...
Research Article

High Performance Hadoop Distributed File System

Mohamed Elkawkagy, Heba Elbeh
Pages: 119 - 123
Although by the end of 2020, most of companies will be running 1000 node Hadoop in the system, the Hadoop implementation is still accompanied by many challenges like security, fault tolerance, flexibility. Hadoop is a software paradigm that handles big data, and it has a distributed file systems so-called...
Research Article

Defects and Vulnerabilities in Smart Contracts, a Classification using the NIST Bugs Framework

Wesley Dingman, Aviel Cohen, Nick Ferrara, Adam Lynch, Patrick Jasinski, Paul E. Black, Lin Deng
Pages: 121 - 132
Rising to popularity in the last decade, blockchain technology has become the preferred platform for the transfer of digital currency. Unfortunately, many of these environments are rife with vulnerabilities exploited by financially motivated attackers. Worse yet, is that a structured analysis and classification...
Research Article

CSEP: Circular Shifting Encryption Protocols for Location Privacy Protection

Chen Di, Zhao Binglin, Li Hao, Zhou Shilei
Pages: 123 - 132
Location Based Service (LBS) is gaining popularity. As one fundamental LBS service, range search returns all Point of Interests (POIs) within a user-specified range. However, people leave their location privacy at risks when using range search. How to provide a high-quality range search service while...
Research Article

Padding Free Bank Conflict Resolution for CUDA-Based Matrix Transpose Algorithm

Ayaz ul Hassan Khan Khan, Mayez Al-Mouhamed, Allam Fatayer, Anas Almousa, Abdulrahman Baqais, Mohammed Assayony
Pages: 124 - 134
The advances of Graphic Processing Units (GPU) technology and the introduction of CUDA programming model facilitates developing new solutions for sparse and dense linear algebra solvers. Matrix Transpose is an important linear algebra procedure that has deep impact in various computational science and...
Research Article

Parallel Implementation of Exact Matrix Computation Using Multiple P-adic Arithmetic

Xinkai Li, Chao Lu, Jon A. Sjogren
Pages: 124 - 133
A P-adic Exact Scientific Computational Library (ESCL) for rational matrix operations has been developed over the past few years. The effort has been focusing on converting all rational number operations to integer calculation, and fully taking advantage of the fast integer multiplication of modern computer...
Research Article

On Learning Associative Relationship Memory among Knowledge Concepts

Zhenping Xie, Kun Wang, Yuan Liu
Pages: 124 - 130
A high-level associative memory modelling method was developed to explore the realization of associative memory. In the proposed method, two stage procedures are progressively performed to construct a unified associative knowledge network. In the first stage, some direct weighted associative links are...
Research Article

Hierarchical Latent Semantic Mapping for Automated Topic Generation

Guorui Zhou, Guang Chen
Pages: 127 - 136
Much of information sits in an unprecedented amount of text data. Managing allocation of these large scale text data is an important problem for many areas. Topic modeling performs well in this problem. The traditional generative models (PLSA,LDA) are the state-of-the-art approaches in topic modeling...
Research Article

Scenarios for An RFID Tag Ownership Transfer Protocol for A Closed Loop System

Gaith K.D. Al., Biplob Rakshit Ray, Morshed Chowdhury
Pages: 128 - 136
In RFID system a tag is attached to an object which might own by a number of owners during its life time. This requires the RFID system to transfer ownership of the tag to its new owner. The ownership transfer has to protect privacy of current and new owner. Many ownership tag ownership transfer exists...
Research Article

Towards a Task and Resource Aware Task Scheduling in Cloud Computing: An Experimental Comparative Evaluation

Muhammad Ibrahim, Said Nabi, Abdullah Baz, Nasir Naveed, Hosam Alhakami
Pages: 131 - 138
Cloud computing has been considered as one of the large-scale platforms that support various type of services including compute, storage, compute, and analytic to the users and organizations with high agility, scalability, and resiliency intact. The users of the Cloud are increasing at an enormous rate...
Research Article

Target Oriented Tweets Monitoring System during Natural Disasters

Si Si Mar Win, Than Nwe Aung
Pages: 133 - 142
Twitter, Social Networking Site, becomes most popular microblogging service and people have started publishing data on the use of it in natural disasters. Twitter has also created the opportunities for first responders to know the critical information and work effective reactions for impacted communities....
Research Article

BSP-Based Support Vector Regression Machine Parallel Framework

Hong Zhang, Yongmei Lei
Pages: 134 - 143
In this paper, we investigate the distributed parallel Support Vector Machine training strategy, and then propose a BSP-Based Support Vector Regression Machine Parallel Framework which can implement the most of distributed Support Vector Regression Machine algorithms. The major difference in these algorithms...
Research Article

Utilizing Type-2 Fuzzy Sets as an Alternative Approach for Valuing Military Information

Timothy P Hanratty, Robert J Hammell
Pages: 133 - 139
Knowledge elicitation from a group versus a single source typically yields outcomes that range in agreement and promote a level of uncertainty. Recently, the use of Type-2 fuzzy sets has been proffered as an alternative approach for capturing the difference of opinions expressed by a group of experts...
Research Article

Customer Prediction using Parking Logs with Recurrent Neural Networks

Liaq Mudassar, Yung-Cheol Byun
Pages: 133 - 142
Neural Networks have been performing state of the art for almost a decade now; when it comes to classification and prediction domains. Within last few years, neural networks have been improved tremendously and their performance is even better than humans in some domains, e.g. AlphaGo vs Lee Sedol and...
Research Article

Test Image Generation using Segmental Symbolic Evaluation

Tahir Jameel, Mengxiang Lin
Pages: 135 - 147
Image processing applications have played a vital role in modern life and they are required to be well tested due to their significance and human dependence on them. Testing of image processing application is difficult due to complex nature of images in terms of their generation and evaluation. The presented...
Research Article

MLSA: a static bugs analysis tool based on LLVM IR

Hongliang Liang, Lei Wang, Dongyang Wu, Jiuyun Xu
Pages: 137 - 144
Program bugs may result in unexpected software error, crash or serious security attack. Static program analysis is one of the most common methods to find program bugs. In this paper we present MLSA -- a static analysis tool based on LLVM Intermediate Representation (IR), which can analyze programs written...
Research Article

Towards a Monitoring Framework for the Automatic Integration of the Access Control Policies for Web Services

Mohammed Alodib
Pages: 137 - 149
Cloud computing is an emerging model of business computing that can be used to maintain configurable resources such as processors, networks, storage, operating systems, databases, and servers. Service oriented Architecture (SoA) is one of most successful paradigms deployed over the Cloud; is a layered...
Research Article

Performance Analysis of Blockchain-based Access Control Model for Personal Health Record System with Architectural Modelling and Simulation

Thein Than Thwin, Sangsuree Vasupongayya
Pages: 139 - 151
The Personal Health Record (PHR) could be seen as a preventive care solution to the incoming aging society. The blockchain-based PHR system has been proposed recently to enhance the security and privacy for the PHR data. Consequently, the performance becomes a concern for blockchain-PHR integration because...
Research Article

Transitional Method for Identifying Improvements in Video Distribution Services

Motoi Iwashita
Pages: 141 - 148
Customer satisfaction is an indicator that is generally utilized to improve goods/services for customer retention. Therefore, companies should understand the changes in customers’ perception of their goods/services and decide improvements. Therefore, a transitional evaluation approach is needed for goods/services...
Research Article

A Pair-wise Bare Bones Particle Swarm Optimization Algorithm for Nonlinear Functions

Jia Guo, Yuji Sato
Pages: 143 - 151
Bare bones particle swarm optimization is a parameter-free swarm intelligence algorithm which is famous for easy applying. It has aroused wide concern of academic circle on its principles and applications in recent years. However, losing the diversity quickly still causes the premature convergence in...
Research Article

On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback

Wei Yu, Xinwen Fu, Erik Blasch, Khanh Pham, Dan Shen, Genshe Chen, Chao Lu
Pages: 144 - 158
Network-based crime has been increasing in both extent and severity and network-based forensics encapsulates an essential part of legal surveillance. A key network forensics tool is traceback that can be used to identify true sources of suspects. Both accuracy and secrecy are essential attributes of...
Research Article

A Formal Model of Peer-to-Peer Digital Product Marketplace

Sylvanus A. Ehikioya
Pages: 143 - 154
Peer-to-peer (P2P) electronic commerce has become increasingly popular over the last few years. This popularity of P2P is due mainly to the many advantages it offers, such as the ease of sharing of computer resources and reducing cost. This paper uses both semi-formal and formal specification methods...
Research Article

Adaptive Omni-directional Walking Method with Fuzzy Interpolation for Biped Robots

Haobin Shi, Xuesi Li, Huahui Chen, Shixiong Wang
Pages: 145 - 158
Omni-directional walking is an important part for biped robots. Whereas, the problems of complex model, low stability, low flexibility, etc., existing in walking planning of biped robots, attract interests of many researchers. This paper proposes an adaptive omni-directional walking method with fuzzy...
Research Article

Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree)

Lifford McLauchlan, Soumya Saha, Rajab Challoo
Pages: 148 - 155
Wireless Sensors Networks (WSNs) are utilized in many diverse applications ranging from security, environmental monitoring, landslide detection, patient monitoring, reconnaissance operations, structural health monitoring and smart buildings. Since in many applications the WSN nodes are randomly deployed,...
Research Article

Jade: Reducing Energy Consumption of Android App

Hao Qian, Daniel Andresen
Pages: 150 - 158
The need for increased performance of mobile device directly conflicts with the desire for longer battery life. Offloading computation to multiple devices is an effective method to reduce energy consumption and enhance performance for mobile applications. Android provides mechanisms for creating mobile...
Research Article

Efficient Searching for Essential API Member Sets based on Inclusion Relation Extraction

Yushi Kondoh, Masashi Nishimoto, Keiji Nishiyama, Hideyuki Kawabata, Tetsuo Hironaka
Pages: 149 - 157
Search tools for Application Programming Interface (API) usage patterns extracted from open source repositories could provide useful information for application developers. Unlike ordinary document retrieval, API member sets obtained by mining are often similar to each other and are mixtures of several...
Research Article

Research on Service Recommendation Reliability in mobile computing

Weng Wen, Huaikou Miao
Pages: 152 - 163
Web services bring more conveniences for users and developers. However, it makes user face the problem of service information explosion. The personalized service recommendation solves the problem. This paper proposes a mechanism to evaluate Web service composition’s reliability which bases on user context...
Research Article

Enhancing Case-based Reasoning Approach using Incremental Learning Model for Automatic Adaptation of Classifiers in Mobile Phishing Detection

San Kyaw Zaw, Sangsuree Vasupongayya
Pages: 152 - 161
This article presents the threshold-based incremental learning model for a case-base updating approach that can support adaptive detection and incremental learning of Case-based Reasoning (CBR)-based automatic adaptable phishing detection. The CBR-based adaptive phishing detection model detects the phishing...
Research Article

Efficient Security and Privacy Protection for Emerging Smart RFID Communications

Mohammad Fal Sadikin, Marcel Kyas
Pages: 156 - 165
Due to its constrained nature, the use of smart RFID technology introduces tremendous security and privacy issues. This paper presents IMAKA-Tate: Identity protection, Mutual Authentication and Key Agreement using Tate pairing of Identity-based Encryption method. It is designed to tackle various challenges...
Research Article

One to One Identification of Cryptosystem Using Fisher’s Discriminant Analysis

Xinyi Hu, Yaqun Zhao
Pages: 155 - 173
Distiguishing analysis is an important part of cryptanalysis. It is an important content of discriminating analysis that how to identify ciphertext is encrypted by which cryptosystems when it knows only ciphertext. In this paper, Fisher’s discriminant analysis (FDA), which is based on statistical method...
Research Article

Device driver development of an external human interaction device for the Android

Naoto Ogawa, Shuichi Oikawa
Pages: 159 - 166
Recently, many people have used Smartphones. The feature of Smartphones is that they are equipped with a mobile operating system (OS) for the control of sensors and modules. In this situation, we can connect external human interaction devices with the Smartphone. Our objective is to know how the external...
Research Article

Secure in-vehicle Systems using Authentication

Masaya Yoshikawa, Kyota Sugioka, Yusuke Nozaki, Kensaku Asahi
Pages: 159 - 166
Recently, driving support technologies have been practically used. However, a problem has been pointed out that when a vehicle is connected with an external network, the safety of the vehicle is threatened. Ensuring the security of in-vehicle systems becomes an important priority. The present study proposes...
Research Article

Distributed and High Performance Big-File Cloud Storage Based On Key-Value Store

Thanh Trung Nguyen, Minh Hieu Nguyen
Pages: 159 - 172
This research proposes a new Big File Cloud (BFC) with its architecture and algorithms to solve difficult problems of cloud-based storage using the advantages of key-value stores. There are many problems when designing an efficient storage engine for cloud-based storage systems with strict requirements...
Research Article

A Secure and Scalable Data Source for Emergency Medical Care using Blockchain Technology

Shirin Hasavari, Yeong-Tae Song
Pages: 158 - 166
A relationship exists between the emergency patient death rate and factors such as the failure to access a patient’s critical data and the time it takes to arrive at hospitals. The ability for Paramedics to access a patient’s complete picture of emergency-relevant medical data is critical and can significantly...
Research Article

Research on Intelligent Question and Answering Based on a Pet Knowledge Map

Yuan Liu, Wen Zhang, Qi Yuan, Jie Zhang
Pages: 162 - 170
This paper proposes a framework for constructing pet knowledge maps. The schema concept layer is designed and built top-down, and the data layer is constructed from knowledge extracted from semi-structured and unstructured data. In the aspect of entity extraction of unstructured data, a symptom-named...
Research Article

Design of Joint Cooperative Routing, MAC and Physical Layer with QoS-aware Traffic-based Scheduling for Wireless Sensor Networks

Jawad Ahmad Haqbeen, Takayuki Ito, Mohammad Arifuzzaman, Takanobu Otsuka
Pages: 164 - 175
Compare the WSN with other conventional network system, the changing or charging the existing battery of sensor node within WSN is a tough job. Therefore, since last decade the effort has been made to design and introduce a large number of communication protocol for WSN with given concern on the performance...
Research Article

One-D-R-A-G-SOM and its Application to a Hand Shape Instruction Learning System

Takashi Kuremoto, Takuhiro Otani, Shingo Mabu, Masanao Obayashi, Kunikazu Kobayashi
Pages: 166 - 174
In this paper, a novel self-organizing map (SOM) named “One-D-R-A-G-SOM” is proposed. It is a kind of one dimensional ring type growing SOM using asymmetric neighborhood function. As the topology of one dimensional ring type feature map is more suitable to increase or decrease the number of units, and...
Research Article

Effective Management of ReRAM-based Hybrid SSD for Multiple Node HDFS

Nayoung Park, Byungjun Lee, Kyung Tae Kim, Hee Yong Youn
Pages: 167 - 176
Recently, the research of Hybrid ReRAM/MLC NAND SSD is rapidly expanding into the storage areas. Most existing researches of Hybrid SSD are based on a single storage, while the management of multiple nodes like HDFS is still immature. In this paper a new efficient cold data eviction scheme is proposed...
Research Article

Efficient Keyword-Related Data Collection in a Social Network with Weighted Seed Selection

Changhyun Byun, Hyeoncheol Lee, Jongsung You, Yanggon Kim
Pages: 167 - 173
Data mining in a social network can yield interesting perspectives to understanding human behavior or detecting topics or communities. However, it is difficult to gather the data related to a specific topic due to the main characteristics of social media data: large, noisy, and dynamic. To collect the...
Research Article

SAIFU: Supporting Program Understanding by Automatic Indexing of Functionalities in Source Code

Masashi Nishimoto, Keiji Nishiyama, Hideyuki Kawabata, Tetsuo Hironaka
Pages: 167 - 174
Programs in the event-driven style that are typical of mobile and/or Web applications are becoming complex and hard to maintain. For the purpose of reducing the burden put on software developers while reading source code to understand its details, we propose a tool for supporting program understanding,...
Research Article

A Traffic Tracking Analysis Model for the Effective Management of E-commerce Transactions

Sylvanus A. Ehikioya, Shenghong Lu
Pages: 171 - 193
The increasing popularity of the Internet and e-commerce makes online merchants to constantly seek tools that would permit them to attract new and retain old customers. Traffic tracking and analysis tools can help businesses know more about their customers. These tools track visitors’ behaviors on Web...
Research Article

Paralleled Fast Search and Find of Density Peaks Clustering Algorithm on GPUs with CUDA

Mi Li, Jie Huang, Jingpeng Wang
Pages: 173 - 181
Fast Search and Find of Density Peaks (FSFDP) is a newly proposed clustering algorithm that has already been successfully applied in many applications. However, this algorithm shows a dissatisfactory performance on large dataset due to the time-consuming calculation of the distance matrix and potentials....
Research Article

Flexible WSNs Aims Easy Installation With Noise Reduce Method For Elderly People Care

Takanobu Otsuka, Takayuki Ito
Pages: 174 - 186
Much research has been conducted on anomaly detection by wireless sensor networks (WSNs). The existing WSNs require specialized knowledge and skills to install the sensors in environments such as houses and buildings. Therefore, we have developed a flexible WSN based on small sensor devices that can...
Research Article

On Design-time Modelling and Verification of Safety-critical Component-based Systems

Nermin Kajtazovic, Christopher Preschern, Andrea Höller, Christian Kreiner
Pages: 175 - 188
Component-based Software Engineering (CBSE) is currently a key paradigm used for developing safetycritical systems. It provides a fundamental means to master systems complexity, by allowing to design systems parts (i.e., components) for reuse and by allowing to develop those parts independently. One...
Research Article

A Triggered Delay-based Approach against Cache Privacy Attack in NDN

Naveen Kumar, Ashutosh Kumar Singh, Shashank Srivastava
Pages: 174 - 184
Content caching is one of the most significant features of Named Data Networking (NDN) that improves the performance. However, this feature makes the cache vulnerable to attacks that determine the recent cache access pattern. In cache privacy attack, an attacker can probe request and determine if the...
Research Article

Improve Example-Based Machine Translation Quality for Low-Resource Language Using Ontology

Khan Md Anwarus Salam, Setsuo Yamada, Nishino Tetsuro
Pages: 176 - 191
In this research we propose to use ontology to improve the performance of an EBMT system for low-resource language pair. The EBMT architecture use chunk-string templates (CSTs) and unknown word translation mechanism. CSTs consist of a chunk in source-language, a string in target-language, and word alignment...
Research Article

Load Balancing of Peer-to-Peer MMORPG Systems with Hierarchical Area-of-Interest Management

Satoshi Fujita
Pages: 177 - 184
This paper studies the load balancing problem in distributed systems designed for massively multiplayer online role-playing games (MMORPGs). More concretely, we consider a distributed system of master- worker type in which each worker is associated with a particular region in the game field, and propose...