International Journal of Networked and Distributed Computing

+ Advanced search
179 articles

An Evaluation of Coding Violation Focusing on Change History and Authorship of Source File

Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara
Pages: 211 - 220
This paper focuses on an evaluation of coding violation warned by a static code analysis tool while considering the change history of violation and the authorship of source file. Through an empirical study with data collected from seven open source software projects, the following findings are reported:...

Embedding GPU Computations in Hadoop

Jie Zhu, Hai Jiang, Juanjuan Li, Erikson Hardesty, Kuan-Ching Li, Zhongwen Li
Pages: 211 - 220
As the size of high performance applications increases, four major challenges including heterogeneity, programmability, fault resilience, and energy efficiency have arisen in the underlying distributed systems. To tackle with all of them without sacrificing performance, traditional approaches in resource...

Extracting Children?s Behavioral Characteristics for Acquiring Language from Texts of Picture Book Reviews

Hiroshi Uehara, Mizuho Baba, Takehito Utsuro
Pages: 212 - 220
Pointing behavior in childhood is typical developmental sign having strong correlation to his or her language development. This paper focuses on the pointing behavior accompanied by utterance during picture book reading. With this respect, we make use of picture books’ review data amounting to approximately...

Performance Characteristics of Hybrid MPI/OpenMP Scientific Applications on a Largescale Multithreaded BlueGene/Q Supercomputer

Xingfu Wu, Valerie Taylor
Pages: 213 - 225
Many/multi-core supercomputers provide a natural programming paradigm for hybrid MPI/OpenMP scientific applications. In this paper, we investigate the performance characteristics of five hybrid MPI/OpenMP scientific applications (two NAS Parallel benchmarks Multi-Zone SP-MZ and BT-MZ, an earthquake simulation...

An Energy Efficient Clustering Algorithm for Maximizing the Lifetime of Wireless Sensor Network

Kyung Tae Kim, Man Youn Kim, Ji Hyeon Choi, Hee Yong Youn
Pages: 214 - 223
In this paper we propose an energy efficient clustering algorithm for maximizing the lifetime of WSNs. The proposed scheme decides the cluster head based on the energy level of the nodes, while tree topology is adopted to connect the nodes inside each cluster. A new model for deciding an optimal number...

Tracing a Weld Line using Artificial Neural Networks

Srinath Hanumantha Rao, V. Kalaichelvi, R. Karthikeyan
Pages: 216 - 223
Robotic manipulators are becoming increasingly popular nowadays with applications in almost every industry and production line. It is difficult but essential to create a common algorithm for the different types of manipulators present in today’s market so that automation can be achieved at a faster rate....

Frequency-specific Alterations of Functional Hub in Generalized Tonic-clonic Seizure

Zhe Zhang, Huiyan Cheng, Xuhui Chen, Chaolin Ma
Pages: 221 - 230
Resting-state functional magnetic resonance imaging (rs-fMRI) has shown aberrant brain functional networks at a conventional low-frequency range (0.01-0.08 Hz) in individuals with generalized tonic-clonic seizure (GTCS). However, it is unclear how functional networks hubs change across different frequency...

Human Activity Recognition in WSN: A Comparative Study

Muhammad Arshad Awan, Zheng Guangbin, Cheong-Ghil Kim, Shin-Dug Kim
Pages: 221 - 230
Human activity recognition is an emerging field of ubiquitous and pervasive computing. Although recent smartphones have powerful resources, the execution of machine learning algorithms on a large amount of data is still a burden on smartphones. Three major factors including; classification algorithm,...

Enabling GSD Task Allocation via Cloud-based Software Processes

Sami Alajrami, Barbara Gallina, Alexander Romanovsky
Pages: 221 - 232
Allocating tasks to distributed sites in Global Software Development (GSD) projects is often done unsystematically and based on the personal experience of project managers. Wrong allocation decisions increase the project’s risks as tasks have dependencies that are inherited by the distributed sites....

Enhanced Hypervisor-based SSD Cache with Dynamic Cache Scanning and Allocation for Virtualized Cloud System

Hee Jung Park, Kyung Tae Kim, Man Yun Kim, Hee Yong Youn
Pages: 224 - 233
Recently, SSD caching is widely studied for VM-based systems. In this paper we propose a novel hypervisor-based SSD caching scheme, employing a new metric to accurately determine the demand on SSD cache space of each VM. Computer simulation confirms that it substantially improves the accuracy of cache...

Improvement of the Dynamic Software Birthmark Process by Reducing the Time of the Extraction

Takanori Yokoi, Haruaki Tamada
Pages: 224 - 231
It is a quite tough task to detect the stolen programs since there is a quite huge number of programs in the world. The dynamic software birthmarks were proposed to detect the suspects of plagiarisms based on the runtime behavior of the programs. The detection process with the dynamic birthmarks is composed...

Fault Tolerant Distributed Stream Processing based on Backtracking

Qiming Chen, Meichun Hsu, Castellanos Malu
Pages: 226 - 238
Since distributed stream analytics is treated as a kind of cloud service, there exists a pressing need for its reliability and fault-tolerance, to guarantee the streaming data tuples to be processed in the order of their generation in every dataflow path, with each tuple processed once and only once....

Refinement on Data, Information and Knowledge Lifecycles towards Service Economics Planning to Services Implementation

Yucong Duan, Gongzhu Hu, Xiaobing Sun, Zhaoxin Lin, Qiang Duan
Pages: 231 - 242
Service Economics has been successfully proposed and implemented for promoting the macro service market especially in Global value chains which however don’t provide guidance to and integrate directly with the IT side implementation to achieve coherent information coordination and robust adaptability...

An Improved Autonomous Cross-Layer Optimization Framework for Wireless Multimedia Communication in Heterogeneous Networks

Yuping Dong, C. Hwa Chang, Zengxu Yang
Pages: 231 - 240
Various cross-layer optimization schemes have been proposed for the purpose of enhancing wireless network performances. In this paper, we present an improved autonomous cross-layer optimization to fit modern heterogeneous communication networks. In our design, different Quality of Service (QoS) requirements...

Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods

Yosuke Isobe, Haruaki Tamada
Pages: 232 - 238
The Identifier Renaming Method (IRM) is a well-used obfuscation method since almost obfuscation tools use the algorithm, and easy to implement. The IRM transforms the identifier names in the programs to meaningless names in order to hard to understand. However, the evaluations against attacks such as...

Improvement and Evaluation of Estimation of Time Series Data of Daily Life

Teruhisa Hochin, Hiroki Nomiya
Pages: 233 - 242
This paper improves the estimation of the amounts of sewage flow, which is one of daily life data, in order to manage them efficiently. The amounts of flow of a typical day are tried to be adjusted to those of a non-regular day. A typical (non-regular, respectively) day is a non-rainy day having good...

Hybrid Approach of Ontology and Image Clustering for Automatic Generation of Hierarchic Image Database

Ryosuke Yamanishi, Ryoya Fujimoto, Yuji Iwahori, Robert J. Woodham
Pages: 234 - 242
This paper proposes a hybrid approach of ontology and image clustering to automatically generate hierarchic image database. In the field of computer vision, ”generic object recognition” is one of the most important topics. Generic object recognition needs three types of research: feature extraction,...

On Dynamic Multicast Traffic Provisioning with Grooming Capabilities Support in Light-Trail Networks

Ching-Fang Hsu, Tzu-Huan Tang
Pages: 239 - 250
In recent years, because of the popularity of Internet and the rapid growth of multimedia applications, the requirements of bandwidth from users increase violently in optical networks. Various multicast multimedia services also bring challenges to next generation optical networks. As the rapid advance...

Query Integrity Verification based-on MAC Chain in Cloud Storage

Jun Hong, Tao Wen, Quan Guo, Gang Sheng
Pages: 241 - 249
In order to reduce data maintenance overhead, more and more enterprises outsource their data to the cloud storage, which provides flexible and on-demand storage service for companies. Data outsourcing also brings a lot of security problems, of which query integrity is a critical issue to be resolved....

A GPU-based Pencil Beam Algorithm for Dose Calculations in Proton Radiation Therapy

Georgios Kalantzis, Theodora Leventouri, Hidenobu Tachibana, Charles Shang
Pages: 243 - 249
Recent developments in radiation therapy have been focused on applications of charged particles, especially protons. Proton therapy can allow higher dose conformality compared to conventional radiation therapy. Over the years several dose calculation methods have been proposed in proton therapy. A common...

Minority Costume Image Retrieval by Fusion of Color Histogram and Edge Orientation Histogram

Xu-mei Shen, Ju-xiang Zhou, Tian-wei Xu
Pages: 243 - 251
It has very important practical significance to analyze and research minority costume from the perspective of computer vision for minority culture protection and inheritance. As first exploration in minority costume image retrieval, this paper proposed a novel image feature representation method to describe...

Estimating and Visualizing the Time-varying Effects of a Binary Covariate on Longitudinal Big Text Data

Shizue Izumi, Tetsuji Tonda, Noriyuki Kawano, Kenichi Satoh
Pages: 243 - 253
We propose a method to estimate and visualize effects of a binary covariate on the longitudinally observed text data. Our method consists of series of analytical methods: extracting keywords through a morphological analysis, estimating the time-varying regression coefficient of a binary covariate for...

Accelerating NTRU Encryption with Graphics Processing Units

Tianyu Bai, Spencer Davis, Juanjuan Li, Ying Gu, Hai Jiang
Pages: 250 - 258
Lattice based cryptography is attractive for its quantum computing resistance and efficient encryption/ decryption process. However, the Big Data issue has perplexed most lattice based cryptographic systems since the overall processing is slowed down too much. This paper intends to analyze one of the...

Handover Management based on Asymmetric Nature of LTE-A HetNet using MCDM Algorithm

Xianda Chen, Young Ho Suh, Seung Wan Kim, Hee Yong Youn
Pages: 250 - 260
This paper proposes an efficient handover scheme considering the asymmetric characteristics of macro and pico cells in LTE-A HetNet. The proposed scheme detects a suitable target eNB for handover using a multi-criteria decision making algorithm and the mobility information of user equipment (UE). A prompt...

P2P Traffic Localization by Forcing Packet Loss

Hiep Hoang-Van, Koki Mizutani, Takumi Miyoshi, Olivier Fourmaux
Pages: 251 - 259
Recently, peer-to-peer (P2P) traffic is increasing rapidly in volume day by day. One of the main causes is that most of P2P applications including file sharing and streaming applications often form overlay networks for exchanging data that are oblivious to the underlay network topology. As a result,...

Pedestrian Detection by Fusing 3D Points and Color Images

Ben-Zhong Lin, Chien-Chou Lin
Pages: 252 - 257
In this paper, a fusing approach of a 3D sensor and a camera are used to improve the reliability of pedestrian detection. The proposed pedestrian detecting system adopts DBSCAN to cluster 3D points and projects the candidate clusters onto images as region of interest (ROI). Those ROIs are detected by...

Brain Activity Measurement during Program Comprehension with NIRS

Yoshiharu Ikutani, Hidetake Uwano
Pages: 259 - 268
Near infrared spectroscopy (NIRS) has been used as a low cost, noninvasive method to measure brain activity. In this paper, we experiment to measure the effects of variables and controls in a source code to brain activity during program comprehension. The measurement results are evaluated after noise...

Theoretical Suggestion of Policy-Based Wide Area Network Management System (wDACS system part-I)

Kazuya Odagiri, Shogo Shimizu, Makoto Takizawa, Naohiro Ishii
Pages: 260 - 269
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leak and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data,...

A Pruning Algorithm for Reverse Nearest Neighbors in Directed Road Networks

Rizwan Qamar, Muhammad Attique, Tae-Sun Chung
Pages: 261 - 272
In this paper, we studied the problem of continuous reverse k nearest neighbors (RkNN) in directed road network, where a road segment can have a particular orientation. A RNN query returns a set of data objects that take query point as their nearest neighbor. Although, much research has been done for...