International Journal of Networked and Distributed Computing

+ Advanced search
179 articles

Scenarios for An RFID Tag Ownership Transfer Protocol for A Closed Loop System

Gaith K.D. Al., Biplob Rakshit Ray, Morshed Chowdhury
Pages: 128 - 136
In RFID system a tag is attached to an object which might own by a number of owners during its life time. This requires the RFID system to transfer ownership of the tag to its new owner. The ownership transfer has to protect privacy of current and new owner. Many ownership tag ownership transfer exists...

Utilizing Type-2 Fuzzy Sets as an Alternative Approach for Valuing Military Information

Timothy P Hanratty, Robert J Hammell
Pages: 133 - 139
Knowledge elicitation from a group versus a single source typically yields outcomes that range in agreement and promote a level of uncertainty. Recently, the use of Type-2 fuzzy sets has been proffered as an alternative approach for capturing the difference of opinions expressed by a group of experts...

Target Oriented Tweets Monitoring System during Natural Disasters

Si Si Mar Win, Than Nwe Aung
Pages: 133 - 142
Twitter, Social Networking Site, becomes most popular microblogging service and people have started publishing data on the use of it in natural disasters. Twitter has also created the opportunities for first responders to know the critical information and work effective reactions for impacted communities....

Customer Prediction using Parking Logs with Recurrent Neural Networks

Liaq Mudassar, Yung-Cheol Byun
Pages: 133 - 142
Neural Networks have been performing state of the art for almost a decade now; when it comes to classification and prediction domains. Within last few years, neural networks have been improved tremendously and their performance is even better than humans in some domains, e.g. AlphaGo vs Lee Sedol and...

BSP-Based Support Vector Regression Machine Parallel Framework

Hong Zhang, Yongmei Lei
Pages: 134 - 143
In this paper, we investigate the distributed parallel Support Vector Machine training strategy, and then propose a BSP-Based Support Vector Regression Machine Parallel Framework which can implement the most of distributed Support Vector Regression Machine algorithms. The major difference in these algorithms...

Test Image Generation using Segmental Symbolic Evaluation

Tahir Jameel, Mengxiang Lin
Pages: 135 - 147
Image processing applications have played a vital role in modern life and they are required to be well tested due to their significance and human dependence on them. Testing of image processing application is difficult due to complex nature of images in terms of their generation and evaluation. The presented...

MLSA: a static bugs analysis tool based on LLVM IR

Hongliang Liang, Lei Wang, Dongyang Wu, Jiuyun Xu
Pages: 137 - 144
Program bugs may result in unexpected software error, crash or serious security attack. Static program analysis is one of the most common methods to find program bugs. In this paper we present MLSA -- a static analysis tool based on LLVM Intermediate Representation (IR), which can analyze programs written...

Towards a Monitoring Framework for the Automatic Integration of the Access Control Policies for Web Services

Mohammed Alodib
Pages: 137 - 149
Cloud computing is an emerging model of business computing that can be used to maintain configurable resources such as processors, networks, storage, operating systems, databases, and servers. Service oriented Architecture (SoA) is one of most successful paradigms deployed over the Cloud; is a layered...

Transitional Method for Identifying Improvements in Video Distribution Services

Motoi Iwashita
Pages: 141 - 148
Customer satisfaction is an indicator that is generally utilized to improve goods/services for customer retention. Therefore, companies should understand the changes in customers’ perception of their goods/services and decide improvements. Therefore, a transitional evaluation approach is needed for goods/services...

A Formal Model of Peer-to-Peer Digital Product Marketplace

Sylvanus A. Ehikioya
Pages: 143 - 154
Peer-to-peer (P2P) electronic commerce has become increasingly popular over the last few years. This popularity of P2P is due mainly to the many advantages it offers, such as the ease of sharing of computer resources and reducing cost. This paper uses both semi-formal and formal specification methods...

A Pair-wise Bare Bones Particle Swarm Optimization Algorithm for Nonlinear Functions

Jia Guo, Yuji Sato
Pages: 143 - 151
Bare bones particle swarm optimization is a parameter-free swarm intelligence algorithm which is famous for easy applying. It has aroused wide concern of academic circle on its principles and applications in recent years. However, losing the diversity quickly still causes the premature convergence in...

On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback

Wei Yu, Xinwen Fu, Erik Blasch, Khanh Pham, Dan Shen, Genshe Chen, Chao Lu
Pages: 144 - 158
Network-based crime has been increasing in both extent and severity and network-based forensics encapsulates an essential part of legal surveillance. A key network forensics tool is traceback that can be used to identify true sources of suspects. Both accuracy and secrecy are essential attributes of...

Adaptive Omni-directional Walking Method with Fuzzy Interpolation for Biped Robots

Haobin Shi, Xuesi Li, Huahui Chen, Shixiong Wang
Pages: 145 - 158
Omni-directional walking is an important part for biped robots. Whereas, the problems of complex model, low stability, low flexibility, etc., existing in walking planning of biped robots, attract interests of many researchers. This paper proposes an adaptive omni-directional walking method with fuzzy...

Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree)

Lifford McLauchlan, Soumya Saha, Rajab Challoo
Pages: 148 - 155
Wireless Sensors Networks (WSNs) are utilized in many diverse applications ranging from security, environmental monitoring, landslide detection, patient monitoring, reconnaissance operations, structural health monitoring and smart buildings. Since in many applications the WSN nodes are randomly deployed,...

Efficient Searching for Essential API Member Sets based on Inclusion Relation Extraction

Yushi Kondoh, Masashi Nishimoto, Keiji Nishiyama, Hideyuki Kawabata, Tetsuo Hironaka
Pages: 149 - 157
Search tools for Application Programming Interface (API) usage patterns extracted from open source repositories could provide useful information for application developers. Unlike ordinary document retrieval, API member sets obtained by mining are often similar to each other and are mixtures of several...

Jade: Reducing Energy Consumption of Android App

Hao Qian, Daniel Andresen
Pages: 150 - 158
The need for increased performance of mobile device directly conflicts with the desire for longer battery life. Offloading computation to multiple devices is an effective method to reduce energy consumption and enhance performance for mobile applications. Android provides mechanisms for creating mobile...

Research on Service Recommendation Reliability in mobile computing

Weng Wen, Huaikou Miao
Pages: 152 - 163
Web services bring more conveniences for users and developers. However, it makes user face the problem of service information explosion. The personalized service recommendation solves the problem. This paper proposes a mechanism to evaluate Web service composition’s reliability which bases on user context...

One to One Identification of Cryptosystem Using Fisher’s Discriminant Analysis

Xinyi Hu, Yaqun Zhao
Pages: 155 - 173
Distiguishing analysis is an important part of cryptanalysis. It is an important content of discriminating analysis that how to identify ciphertext is encrypted by which cryptosystems when it knows only ciphertext. In this paper, Fisher’s discriminant analysis (FDA), which is based on statistical method...

Efficient Security and Privacy Protection for Emerging Smart RFID Communications

Mohammad Fal Sadikin, Marcel Kyas
Pages: 156 - 165
Due to its constrained nature, the use of smart RFID technology introduces tremendous security and privacy issues. This paper presents IMAKA-Tate: Identity protection, Mutual Authentication and Key Agreement using Tate pairing of Identity-based Encryption method. It is designed to tackle various challenges...

A Secure and Scalable Data Source for Emergency Medical Care using Blockchain Technology

Shirin Hasavari, Yeong-Tae Song
Pages: 158 - 166
A relationship exists between the emergency patient death rate and factors such as the failure to access a patient’s critical data and the time it takes to arrive at hospitals. The ability for Paramedics to access a patient’s complete picture of emergency-relevant medical data is critical and can significantly...

Device driver development of an external human interaction device for the Android

Naoto Ogawa, Shuichi Oikawa
Pages: 159 - 166
Recently, many people have used Smartphones. The feature of Smartphones is that they are equipped with a mobile operating system (OS) for the control of sensors and modules. In this situation, we can connect external human interaction devices with the Smartphone. Our objective is to know how the external...

Distributed and High Performance Big-File Cloud Storage Based On Key-Value Store

Thanh Trung Nguyen, Minh Hieu Nguyen
Pages: 159 - 172
This research proposes a new Big File Cloud (BFC) with its architecture and algorithms to solve difficult problems of cloud-based storage using the advantages of key-value stores. There are many problems when designing an efficient storage engine for cloud-based storage systems with strict requirements...

Secure in-vehicle Systems using Authentication

Masaya Yoshikawa, Kyota Sugioka, Yusuke Nozaki, Kensaku Asahi
Pages: 159 - 166
Recently, driving support technologies have been practically used. However, a problem has been pointed out that when a vehicle is connected with an external network, the safety of the vehicle is threatened. Ensuring the security of in-vehicle systems becomes an important priority. The present study proposes...

Design of Joint Cooperative Routing, MAC and Physical Layer with QoS-aware Traffic-based Scheduling for Wireless Sensor Networks

Jawad Ahmad Haqbeen, Takayuki Ito, Mohammad Arifuzzaman, Takanobu Otsuka
Pages: 164 - 175
Compare the WSN with other conventional network system, the changing or charging the existing battery of sensor node within WSN is a tough job. Therefore, since last decade the effort has been made to design and introduce a large number of communication protocol for WSN with given concern on the performance...

One-D-R-A-G-SOM and its Application to a Hand Shape Instruction Learning System

Takashi Kuremoto, Takuhiro Otani, Shingo Mabu, Masanao Obayashi, Kunikazu Kobayashi
Pages: 166 - 174
In this paper, a novel self-organizing map (SOM) named “One-D-R-A-G-SOM” is proposed. It is a kind of one dimensional ring type growing SOM using asymmetric neighborhood function. As the topology of one dimensional ring type feature map is more suitable to increase or decrease the number of units, and...

Effective Management of ReRAM-based Hybrid SSD for Multiple Node HDFS

Nayoung Park, Byungjun Lee, Kyung Tae Kim, Hee Yong Youn
Pages: 167 - 176
Recently, the research of Hybrid ReRAM/MLC NAND SSD is rapidly expanding into the storage areas. Most existing researches of Hybrid SSD are based on a single storage, while the management of multiple nodes like HDFS is still immature. In this paper a new efficient cold data eviction scheme is proposed...

Efficient Keyword-Related Data Collection in a Social Network with Weighted Seed Selection

Changhyun Byun, Hyeoncheol Lee, Jongsung You, Yanggon Kim
Pages: 167 - 173
Data mining in a social network can yield interesting perspectives to understanding human behavior or detecting topics or communities. However, it is difficult to gather the data related to a specific topic due to the main characteristics of social media data: large, noisy, and dynamic. To collect the...

SAIFU: Supporting Program Understanding by Automatic Indexing of Functionalities in Source Code

Masashi Nishimoto, Keiji Nishiyama, Hideyuki Kawabata, Tetsuo Hironaka
Pages: 167 - 174
Programs in the event-driven style that are typical of mobile and/or Web applications are becoming complex and hard to maintain. For the purpose of reducing the burden put on software developers while reading source code to understand its details, we propose a tool for supporting program understanding,...

Paralleled Fast Search and Find of Density Peaks Clustering Algorithm on GPUs with CUDA

Mi Li, Jie Huang, Jingpeng Wang
Pages: 173 - 181
Fast Search and Find of Density Peaks (FSFDP) is a newly proposed clustering algorithm that has already been successfully applied in many applications. However, this algorithm shows a dissatisfactory performance on large dataset due to the time-consuming calculation of the distance matrix and potentials....

Flexible WSNs Aims Easy Installation With Noise Reduce Method For Elderly People Care

Takanobu Otsuka, Takayuki Ito
Pages: 174 - 186
Much research has been conducted on anomaly detection by wireless sensor networks (WSNs). The existing WSNs require specialized knowledge and skills to install the sensors in environments such as houses and buildings. Therefore, we have developed a flexible WSN based on small sensor devices that can...

A Triggered Delay-based Approach against Cache Privacy Attack in NDN

Naveen Kumar, Ashutosh Kumar Singh, Shashank Srivastava
Pages: 174 - 184
Content caching is one of the most significant features of Named Data Networking (NDN) that improves the performance. However, this feature makes the cache vulnerable to attacks that determine the recent cache access pattern. In cache privacy attack, an attacker can probe request and determine if the...

On Design-time Modelling and Verification of Safety-critical Component-based Systems

Nermin Kajtazovic, Christopher Preschern, Andrea Höller, Christian Kreiner
Pages: 175 - 188
Component-based Software Engineering (CBSE) is currently a key paradigm used for developing safetycritical systems. It provides a fundamental means to master systems complexity, by allowing to design systems parts (i.e., components) for reuse and by allowing to develop those parts independently. One...

Improve Example-Based Machine Translation Quality for Low-Resource Language Using Ontology

Khan Md Anwarus Salam, Setsuo Yamada, Nishino Tetsuro
Pages: 176 - 191
In this research we propose to use ontology to improve the performance of an EBMT system for low-resource language pair. The EBMT architecture use chunk-string templates (CSTs) and unknown word translation mechanism. CSTs consist of a chunk in source-language, a string in target-language, and word alignment...

Load Balancing of Peer-to-Peer MMORPG Systems with Hierarchical Area-of-Interest Management

Satoshi Fujita
Pages: 177 - 184
This paper studies the load balancing problem in distributed systems designed for massively multiplayer online role-playing games (MMORPGs). More concretely, we consider a distributed system of master- worker type in which each worker is associated with a particular region in the game field, and propose...

A Scoring Rule-based Truthful Demand Response Mechanism

Keisuke Hara, Takayuki Ito
Pages: 182 - 192
Demand Response (DR) has been extensively studied as one of the important features of smart grid. The DR strategies can be grouped into two categories, one is incentive-based DR and the other is pricing-based DR. Our work focuses on DR involving both pricing factor and incentive factor using scoring...

Contour Completion of Partly Occluded Objects Based on Figural Goodness

Takahiro Hayashi, Tatsuya Ooi, Motoki Sasaki
Pages: 185 - 192
Object extraction has a crucial role in various visual semantic scenarios. In this paper, we propose a system for object extraction which can deal with an object partly occluded by other objects. In order to estimate the hidden part of the occluded object, the system combines different types of contour...

Estimating Procedure for Function Point and Development Cost in South Korea

Byeongdo Kang, Jongseok Lee
Pages: 185 - 194
This paper introduces the practical guidelines for function point analysis in the Republic of Korea. Korean government recommends that Function Point Analysis should be adopted as a standard method for measuring the functional size of software. Function Point was proposed by an international organization....

Utilizing Human-Computer Interaction Data to Extract User Interests from Web-based Learning Systems

Yücel Ugurlu
Pages: 187 - 195
We propose a novel approach by utilizing human-computer interaction data to extract user interests from web-based learning systems. The proposed approach is based on user access and a wearable context recognition system. Under our approach, a series of screen images are captured by an imaging device...

Comparative Study of Various Wireless Sensor Network (WSN) Topology Construction Protocols

Lifford McLauchlan, Soumya Saha, Claudio Montiel, Rajab Challoo
Pages: 189 - 197
As the cost for wireless sensors and wireless sensor networks (WSNs) have decreased, they have become more ubiquitous; they are increasingly being used in many applications such as security, structural monitoring and environmental monitoring. Many WSN applications employ a random sensor deployment to...

Burst Transmission and Frame Aggregation for VANET Communications

Wei Kuang Lai, Mei-Tso Lin, Ting-Huan Kuo
Pages: 192 - 202
In vehicular ad hoc networks (VANETs), due to highly mobile and frequently changing topology, available resources and transmission opportunities are restricted. To address this, we propose a burst transmission and frame aggregation (FAB) scheme to enhance transmission opportunity (TXOP) efficiency of...

Development of an Effective Gaze Writing System with an Interface for Text Copy and Paste

Reo Kishi, Takahiro Hayashi
Pages: 193 - 201
While many interfaces for gaze writing (text entry by eye gaze) are available today, these interfaces are just a replacement of a keyboard. For more efficient gaze writing, this paper proposes a novel gaze writing system which has two kinds of gaze writing interfaces: (1) an interface for text entry...

Using SPIN to Check Simulink Stateflow Models

Chikatoshi Yamada, D. Michael Miller
Pages: 193 - 202
Verification is critical to the design of large and complex systems. SPIN is a well-known and extensively used verification tool. In this paper, we consider two tool chains, one existing, WSAT, and one introduced here, that support using SPIN to model check systems specified as Simulink Stateflow models....

Optimized Common Parameter Set Extraction Framework by Multiple Benchmarking Applications on a Big Data Platform

Jongyeop Kim, Abhilash Kancharla, Jongho Seol, Indy Park, Nohpill Park
Pages: 195 - 203
This research proposes the methodology to extract common configuration parameter set by applying multiple benchmarking applications include TeraSort, TestDFSIO, and MrBench on the Hadoop distributed file system. The parameter search space conceptually conducted named Ω(x) to hold status of all parameter...

A Checkpoint/Restart Scheme for CUDA Programs with Complex Computation States

Hai Jiang, Yulu Zhang, Jeff Jennes, Kuan-Ching Li
Pages: 196 - 212
Checkpoint/restart has been an effective mechanism to achieve fault tolerance for many long-running scientific applications. The common approach is to save computation states in memory and secondary storage for execution resumption. However, as the GPU plays a much bigger role in high performance computing,...

Fast Parallel Network Packet Filter System based on CUDA

Che-Lun Hung, Shih-Wei Guo
Pages: 198 - 210
In recent years, with the rapid development of the network hardware and software, the network speed is enhanced to multi-gigabit. Network packet filtering is an important strategy of network security to avoid malicious attacks, and it is a computation-consuming application. Therefore, we develop two...

A Routing Algorithm Solving the Container Problem in a Hypercube with Bit Constraint

Antoine Bossard, Keiichi Kaneko
Pages: 202 - 213
As reflected by the TOP500 list, hypercubes are popular interconnection networks for massively parallel systems, the main reason being the simplicity and ease of implementation of this network topology. In order to retain performance high and avoid bottleneck situation, routing algorithms are critical...

Load Experiment of the vDACS Scheme in case of the 300 Clients

Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii
Pages: 203 - 210
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data,...

Recognition and Intensity Estimation of Facial Expression Using Ensemble Classifiers

Hiroki Nomiya, Shota Sakaue, Teruhisa Hochin
Pages: 203 - 211
Facial expression recognition (FER) has been widely studied since it can be used for various applications. However, most of FER techniques focus on discriminating typical facial expressions such as six basic facial expressions. Spontaneous facial expressions are not limited to such typical ones because...

Social Media Comment Management using SMOTE and Random Forest Algorithms

Nuanwan Soonthornphisaj, Taratep Sira-Aksorn, Pornchanok Suksankawanich
Pages: 204 - 209
Comment posting is one of the main features found in social media. Comment responses enrich the social network function especially for how-to content. In this work, we focus on cooking video clips which are popular among users. Various questions found in comments need to be clustered in order to facilitate...

The Dependability of Crypto Linked Off-chain File Systems in Backend Blockchain Analytics Engine

Jongho Seol, Abhilash Kancharla, Nicole Park, Nohpill Park, Indy Park
Pages: 210 - 215
This paper presents ways to assure the efficacy of managing crypto links and crypto speed with respect to the dependability of blockchain. The dependability in this work is defined with reference to crypto links in a proportional manner and crypto speed in an inversely proportional manner, respectively....