International Journal of Networked and Distributed Computing

+ Advanced search
169 articles

Tracing a Weld Line using Artificial Neural Networks

Srinath Hanumantha Rao, V. Kalaichelvi, R. Karthikeyan
Pages: 216 - 223
Robotic manipulators are becoming increasingly popular nowadays with applications in almost every industry and production line. It is difficult but essential to create a common algorithm for the different types of manipulators present in today’s market so that automation can be achieved at a faster rate....

Improvement of the Dynamic Software Birthmark Process by Reducing the Time of the Extraction

Takanori Yokoi, Haruaki Tamada
Pages: 224 - 231
It is a quite tough task to detect the stolen programs since there is a quite huge number of programs in the world. The dynamic software birthmarks were proposed to detect the suspects of plagiarisms based on the runtime behavior of the programs. The detection process with the dynamic birthmarks is composed...

Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods

Yosuke Isobe, Haruaki Tamada
Pages: 232 - 238
The Identifier Renaming Method (IRM) is a well-used obfuscation method since almost obfuscation tools use the algorithm, and easy to implement. The IRM transforms the identifier names in the programs to meaningless names in order to hard to understand. However, the evaluations against attacks such as...

Satellite Image Based Characterization for Monitoring Urbanization and Land Cover Change

Farhan Rahman Wasee, Rahman Mohammad Asif Amin, Zareen Tasnim Raisa, Sadia Chowdhury, Tanisha Nourin Alam, Rashedur Mohammad Rahman
Pages: 1 - 10
Land surface processes have become a great concern in the context of global change and increased natural hazards all over the world. In this paper, dynamic characteristics of land cover changes have been investigated over a period of about three and half decades (1972–2016). This study focuses on the...

Discrete Differential Evolution Algorithm with the Fuzzy Machine Selection for Solving the Flexible Job Shop Scheduling Problem

Ajchara Phu-ang
Pages: 11 - 19
The objective of the research is to solve the flexible job shop scheduling problem (FJSP). In this paper, the new algorithm is proposed mainly based on discrete concepts of the differential evolution (DE) algorithm with the new idea called the fuzzy machine selection approach. In the first step, the...

Kernel and Range Approach to Analytic Network Learning

Kar-Ann Toh
Pages: 20 - 28
A novel learning approach for a composite function that can be written in the form of a matrix system of linear equations is introduced in this paper. This learning approach, which is gradient-free, is grounded upon the observation that solving the system of linear equations by manipulating the kernel...

Modified Ant Colony Optimization Algorithm for Multiple-vehicle Traveling Salesman Problems

Yindee Oonsrikaw, Arit Thammano
Pages: 29 - 36
In this work, we extended the original Traveling Salesman Problem (TSP) to cover not only the case of multiple vehicles but also to constrain the minimum and maximum numbers of cities each vehicle can visit. Our algorithm is a modified Ant Colony Optimization (ACO) algorithm which has the ability to...

Floor Heating Customer Prediction Model Based on Random Forest

Zhihuan Yao, Xian Xu, Huiqun Yu
Pages: 37 - 42
Nowadays floor heating service is increasingly attracting both residents in cold areas and gas companies for market profits. With the aggravation of market-oriented competition, the gas companies are actively seeking service transformation. It is of great significance to gas companies to be able to forecast...

Blacklist Creation for Detecting Fake Accounts on Twitter

Myo Myo Swe, Nyein Nyein Myo
Pages: 43 - 50
Social networking sites such as Twitter, Facebook, Weibo, etc. are extremely mainstream today. Also, the greater part of the malicious users utilize these sites to persuade legitimate users for different purposes, for example, to promote their products item, to enter their spam links, to stigmatize other...

An Improved Semantic Role Labeling for Myanmar Text

Zin Mar Kyu, Naw Lay Wah
Pages: 51 - 58
The semantic role labeling plays a key role to extract semantic information from language text for the purpose of information retrieval, text summarization, plagiarism test, etc. This paper presents two main parts: MynNet and semantic role labeling. MynNet, which is a FrameNet for Myanmar language is...

Character Segmentation and Recognition for Myanmar Warning Signboard Images

Kyi Pyar Zaw, Zin Mar Kyu
Pages: 59 - 67
This paper publicizes the character segmentation and recognition of the Myanmar warning text signboard images taken by a mobile phone camera in natural scene. In this system, two templates are created. The first template that contains both connected pixel words and characters are used for character segmentation...

A Formal Model of Distributed Security for Electronic Commerce Transactions Systems

Sylvanus A. Ehikioya, Adepele A. Olukunle
Pages: 68 - 84
Every distributed system requires a secure environment for its users. Security becomes even more important if users exchange sensitive information and value, across the network. An e-commerce environment is an example of a distributed system in which security is of a high priority. It is important that...

Design and Implementation of an IoT-Based Smart Home Security System

Mohammad Asadul Hoque, Chad Davidson
Pages: 85 - 92
Recent advances in smartphones and affordable open-source hardware platforms have enabled the development of low-cost architectures for Internet-of-Things (IoT)-enabled home automation and security systems. These systems usually consist of sensing and actuating layer that is made up of sensors such as...

Polar Code Appropriateness for Ultra-Reliable and Low-Latency Use Cases of 5G Systems

Arti Sharma, Mohammad Salim
Pages: 93 - 99
Polar code is considered as a major breakthrough of past decade in channel coding area. The unprecedented performance of polar codes compelled third generation partnership project (3GPP) to adopt the polar codes for control channels functions in one of the fifth generation (5G) scenario enhanced mobile...

Semantic Schema Matching for String Attribute with Word Vectors and its Evaluation

Kenji Nozaki, Teruhisa Hochin, Hiroki Nomiya
Pages: 100 - 106
Instance-based schema matching is to determine the correspondences between heterogeneous databases by comparing instances. Heterogeneous databases consist of an enormous number of tables containing various attributes, causing the data heterogeneity. In such cases, it is effective to consider semantic...

Utilizing Type-2 Fuzzy Sets as an Alternative Approach for Valuing Military Information

Timothy P Hanratty, Robert J Hammell
Pages: 133 - 139
Knowledge elicitation from a group versus a single source typically yields outcomes that range in agreement and promote a level of uncertainty. Recently, the use of Type-2 fuzzy sets has been proffered as an alternative approach for capturing the difference of opinions expressed by a group of experts...

“Never fry carrots without chopping” Generating Cooking Recipes from Cooking Videos Using Deep Learning Considering Previous Process

Tatsuki Fujii, Yuichi Sei, Yasuyuki Tahara, Ryohei Orihara, Akihiko Ohsuga
Pages: 107 - 112
Research on deep-training captioning models that modify the natural-language contents of images and moving images has produced considerable results and attracted attention in recent years. In this research, we aim to generate recipe sentences from cooking videos acquired from YouTube. We treat this as...

Do You Like Sclera? Sclera-region Detection and Colorization for Anime Character Line Drawings

Masashi Aizawa, Yuichi Sei, Yasuyuki Tahara, Ryohei Orihara, Akihiko Ohsuga
Pages: 113 - 120
Colorizing line drawings requires special skill, experience, and knowledge. Artists also spend a great deal of time and effort creating art. Given this background, research on automated line drawing colorization was recently conducted. However, the existing approaches present multiple problems, one of...

Defects and Vulnerabilities in Smart Contracts, a Classification using the NIST Bugs Framework

Wesley Dingman, Aviel Cohen, Nick Ferrara, Adam Lynch, Patrick Jasinski, Paul E. Black, Lin Deng
Pages: 121 - 132
Rising to popularity in the last decade, blockchain technology has become the preferred platform for the transfer of digital currency. Unfortunately, many of these environments are rife with vulnerabilities exploited by financially motivated attackers. Worse yet, is that a structured analysis and classification...