International Journal of Networked and Distributed Computing
206 articles
Research Article
Generation and Mapping of Multi-Reducts Based on Nearest Neighbor Relation
Naohiro Ishii, Ippei Torii, Toyoshiro Nakashima, Hidekazu Tanaka
Pages: 1 - 10
Dimension reduction of data is an important theme in the data processing to represent and manipulate higher dimensional data. Rough set is fundamental and useful to process higher dimensional data. Reduct in the rough set is a minimal subset of features, which has almost the same discernible power as...
Research Article
Context-Aware Multimedia Content Adaptation for Mobile Web
Dongsong Zhang, Anil Jangam, Lina Zhou, Isil Yakut
Pages: 1 - 10
Multimedia content in web pages poses a variety of problems to mobile web users, such as incompatibility with mobile devices or failing to meet accessibility needs of users with vision disabilities. To address those problems, this study proposes and evaluates a context-aware approach to multimedia content...
Research Article
A Theoretical Exploration of the Impact of Packet Loss on Network Intrusion Detection
Sidney C. Smith, Robert J. Hammell II, Travis W. Parker, Lisa M. Marvel
Pages: 1 - 10
In this paper we review the problem of packet loss as it pertains to Network Intrusion Detection, seeking to answer two fundamental research questions which are stepping stones towards building a model that can be used to predict the rate of alert loss based upon the rate of packet loss. The first question...
Research Article
Fine-Grained Emotion Analysis Based on Mixed Model for Product Review
Xiao Sun, Chongyuan Sun, Changqin Quan, Fuji Ren, Fang Tian, Kunxia Wang
Pages: 1 - 11
Nowadays, with the rapid development of B2C e-commerce and the popularity of online shopping, the Web storages huge number of product reviews comment by customers. A large number of reviews made it difficult for manufacturers or potential customers to track the comments and suggestions that customers...
Research Article
Satellite Image Based Characterization for Monitoring Urbanization and Land Cover Change
Farhan Rahman Wasee, Rahman Mohammad Asif Amin, Zareen Tasnim Raisa, Sadia Chowdhury, Tanisha Nourin Alam, Rashedur Mohammad Rahman
Pages: 1 - 10
Land surface processes have become a great concern in the context of global change and increased natural hazards all over the world. In this paper, dynamic characteristics of land cover changes have been investigated over a period of about three and half decades (1972–2016). This study focuses on the...
Research Article
Performance Evaluation of Data Migration Policies for a Distributed Storage System with Dynamic Tiering
Atsushi Nunome, Hiroaki Hirata
Pages: 1 - 8
We have proposed a distributed storage system which autonomously migrates data blocks into a suitable storage node by considering their access frequency and read/write ratio. In this paper, we show that revised data migration policies can rapidly distribute input/output (I/O) hot spot over the storage...
Research Article
Assessing Risk of Security Non-compliance of Banking Security Requirements Based on Attack Patterns
Krissada Rongrat, Twittie Senivongse
Pages: 1 - 10
Information systems such as those in the Banking sector need to comply with security regulations to assure that necessary security controls are in place. This paper presents an initial risk assessment method to assist a banking information system project in validating security requirements of the system....
Research Article
The Firm Life Cycle Forecasting Model Using Machine Learning Based on News Articles
Si Young Lee, Sae Yong Oh, Sangwook Lee, Gwang Yong Gim
Pages: 1 - 9
The determination of the firm life cycle has been carried out in relation to the establishment of corporate strategy in the field of accounting or management. The life cycle prediction based on financial information is long because it is determined based on the financial performance of the entity over...
Review Article
A View Of Cloud Computing
Juhnyoung Lee
Pages: 2 - 8
Today’s IT infrastructure is under tremendous pressure and is finding it difficult to keep up. In distributed computing environments, up to 85 percent of computing capacity sits idle. 66 percent of every dollar on IT is spent on maintaining current IT infrastructures versus adding new capabilities. In...
Research Article
OSERENA: a Coloring Algorithm Optimized for Dense Wireless Networks
Ichrak Amdouni, Pascale Minet, Cedric Adjih
Pages: 9 - 24
The goal of this paper is to present OSERENA, a distributed coloring algorithm optimized for dense wireless sensor networks (WSNs). Network density has an extremely reduced impact on the size of the messages exchanged to color the WSN. Furthermore, the number of colors used to color the network is not...
Research Article
Enhancement of Copper Wire Lengthening Automatic System using Contactless Heater
Hsiung-Cheng Lin, Jhih-Yao Hu, Chung-Hao Cheng
Pages: 9 - 15
Copper wire can be elongated to a very thin size like 0.01 mm from an original 0.6 mm via wire drawing dies. Although automatic machines are available for wire elongating process, the wire threading through dies still requires a human operation before entering an automation process. This procedure may...
Research Article
The Performance Evaluation of Continuous Speech Recognition Based on Korean Phonological Rules of Cloud-Based Speech Recognition Open API
Hyun Jae Yoo, Sungwoong Seo, Sun Woo Im, Gwang Yong Gim
Pages: 10 - 18
This study compared and analyzed the speech recognition performance of Korean phonological rules for cloud-based Open APIs, and analyzed the speech recognition characteristics of Korean phonological rules. As a result of the experiment, Kakao and MS showed good performance in speech recognition. By phonological...
Research Article
Code generation for accurate array redistribution on automatic distributed-memory parallelization
Bo Zhao, Rui Ding, Lin Han, Jinlong Xu
Pages: 11 - 25
Code generation belongs to the backend of parallelizing compiler, and is for generating efficient computation and communication code for the target parallel computing system. Traditional research resolve array redistribution mainly by generating communication code that each processor sends all data defined...
Research Article
The Influence of Alias and References Escape on Java Program Analysis
Shengbo Chen, Dashen Sun, Huaikou Miao
Pages: 11 - 20
The alias and references escape are often used in Java programs. They bring much convenience to the developers, but, at the same time, they also give adverse affects on the data flow and control flow of program during program analysis. Therefore, when analyzing Java programs, we must take the alias and...
Research Article
Extraction of Text Regions from Complex Background in Document Images by Multilevel Clustering
Hoai Nam Vu, Tuan Anh Tran, Na In Seop, Soo Hyung Kim
Pages: 11 - 21
Textual data plays an important role in a number of applications such as image database indexing, document understanding, and image-based web searching. The target of automatic real-life text extracting in document images without character recognition module is to identify image regions that contain...
Research Article
Discrete Differential Evolution Algorithm with the Fuzzy Machine Selection for Solving the Flexible Job Shop Scheduling Problem
Ajchara Phu-ang
Pages: 11 - 19
The objective of the research is to solve the flexible job shop scheduling problem (FJSP). In this paper, the new algorithm is proposed mainly based on discrete concepts of the differential evolution (DE) algorithm with the new idea called the fuzzy machine selection approach. In the first step, the...
Research Article
Visualization of Online Datasets
Christopher Johnston Downie, Taoxin Peng
Pages: 11 - 23
As computing technology advances, computers are being used to orchestrate and advance wide spectrums of commercial and personal life, information visualization becomes even more significant as we immerse ourselves into the era of big data, leading to an economy heavily reliant on data mining and precise,...
Research Article
Wireless Extension Mechanism and Logic Design for FPGA-based Ethernet Powerlink Node
Kailong Zhang, Panfei Zuo, Liang Hu, Xiao Wu, Kejian Miao
Pages: 12 - 21
Real-time networks, such as industrial network, field bus and so on, have been becoming one vital component to develop large-scale and cooperative embedded systems. As one important branch, the wireless mode of realtime networks also raises more and more attentions in recent years since its conveniences...
Research Article
Toward Affordable and Practical Home Context Recognition: –Framework and Implementation with Image-based Cognitive API–
Sinan Chen, Sachio Saiki, Masahide Nakamura
Pages: 16 - 24
To provide affordable context recognition for general households, this paper presents a novel technique that integrate image-based cognitive Application Program Interface (API) and light-weight machine learning. Our key idea is to regard every image as a document by exploiting “tags” derived by the API....
Research Article
The Prediction of COVID-19 Using LSTM Algorithms
Myung Hwa Kim, Ju Hyung Kim, Kyoungjin Lee, Gwang-Yong Gim
Pages: 19 - 24
As COVID-19 enters the pandemic stage, the resulting infections, deaths and economic shocks are emerging. To minimize anxiety and uncertainty about socio-economic damage caused by the COVID-19 pandemic, it is necessary to reasonably predict the economic impact of future disease trends by scientific means....
Research Article
Kernel and Range Approach to Analytic Network Learning
Kar-Ann Toh
Pages: 20 - 28
A novel learning approach for a composite function that can be written in the form of a matrix system of linear equations is introduced in this paper. This learning approach, which is gradient-free, is grounded upon the observation that solving the system of linear equations by manipulating the kernel...
Research Article
An Efficient Structure for LKH Key Tree on Secure Multicast Communications
Naoshi Sakamoto
Pages: 21 - 30
In order to communicate in cipher over IP multicast, each of joining and leaving participants causes renewing keys. Moreover, the number of renewed keys depends on the key management system. LKH, one of the key management systems, uses a tree structure to manage keys to share with participants. Every...
Research Article
On the Empirical Evaluation of Multicasting with Minimum Delay Variation
Nicklaus Rhodes, Shankar Banik
Pages: 22 - 31
In certain types of Internet applications, multicasting with Quality of Service (QoS) optimizations are required on both the end-to-end delay from the source to the destinations, as well as the difference in the end-to-end delay between the destinations. Examples of these applications include video-conferencing,...
Research Article
Multi-Threaded Message Dispatcher - a Design Pattern with Innate Support for Mission Critical Applications
Marcel-Titus Marginean, Chao Lu
Pages: 22 - 36
The usage of well-tried software design patterns and application frameworks is often encountered in Mission and Safety Critical Applications development due to the high stakes involved in the case of failures. To increase reliability, some frameworks attempt to separate the implementation of business...
Research Article
UWB, miniaturized and directive metamaterial loaded antenna for satellite applications
Parul Dawar, N.S. Raghava, Asok De
Pages: 24 - 34
Antenna parameter optimization using S-shaped metamaterial embedded in antenna substrate at high frequency (THz) is elucidated in this paper. Upon incorporation of proposed metamaterials’ array inside the antenna substrate, bandwidth of antenna increases by 770 GHz and directivity by about 11%. Results...
Research Article
Improvement of Software Reliability Estimation Accuracy with Consideration of Failure Removal Effort
Myungmuk Kang, Okjoo Choi, Juhwan Shin, Jongmoon Baik
Pages: 25 - 36
In order to develop highly reliable software in a cost-effective manner, it is necessary to manage software reliability at the early test phases. Most of developers at those phases perform a test and debug activities together. In this paper, we propose a new reliability estimation model to manage the...
Research Article
Multi-Dimensional Indexing System Considering Distributions of Sub-indexes and Data
Kazuto Nakanishi, Teruhisa Hochin, Hiroki Nomiya, Hiroaki Hirata
Pages: 25 - 33
This paper experimentally evaluates the parallel multi-dimensional indexing system indexing data by using several multi-dimensional indexes and retrieving required data from them in parallel. A constant number of data are indexed into a sub-index. The sub-index is inserted into an index in a computational...
Research Article
Featured Hybrid Recommendation System Using Stochastic Gradient Descent
Si Thin Nguyen, Hyun Young Kwak, Si Young Lee, Gwang Yong Gim
Pages: 25 - 32
Beside cold-start and sparsity, developing incremental algorithms emerge as interesting research to recommendation system in real-data environment. While hybrid system research is insufficient due to the complexity in combining various source of each single such as content-based or collaboration filtering,...
Research Article
Total System Cost Analysis and Comparison of DX-Tree and Star Ring Architectures in conjunction with Master-Slave Multi-Super-Hypercube topology
Hamid Abachi, Roger Lee
Pages: 26 - 34
In todays advanced technology environment, we come across a number of research areas that require extensive data processing. These areas include but not limited to, modeling and simulation of accuracy, safety and reliability of nuclear weapons, global warming, weather forecasting, DNA computing, nanotechnology,...
Research Article
Modified Ant Colony Optimization Algorithm for Multiple-vehicle Traveling Salesman Problems
Yindee Oonsrikaw, Arit Thammano
Pages: 29 - 36
In this work, we extended the original Traveling Salesman Problem (TSP) to cover not only the case of multiple vehicles but also to constrain the minimum and maximum numbers of cities each vehicle can visit. Our algorithm is a modified Ant Colony Optimization (ACO) algorithm which has the ability to...
Research Article
Parallel dynamic programming based on stage reconstruction and its application in reservoir operation
Huitao Zheng, Yadong Mei, Kai Duan, Yuru Lin
Pages: 31 - 41
We improved the serial recursion calculation process of dynamic programming and introduced parallel dynamic programming based on stage reconstruction. Through the proposed algorithm a multistage decision problem can be repeatedly reconstructed and gradually transferred to a single stage issue. This algorithm...
Research Article
Sorting Terms of “aaS” of Everything as a Service
Yucong Duan, Xiaobing Sun, Antonella Longo, Zhaoxin Lin, Shixiang Wan
Pages: 32 - 44
Numerous service models have been proposed in the form of ”as a Service” or ”aaS” in the past. This is especially eminent in the era of the Cloud under the term of anything as a service or everything as a service(XaaS). A unified view of XaaS can aid efficient classification of services for service registration,...
Research Article
CHEAP: An Efficient Localized Area Coverage Maintenance Protocol for Wireless Sensor Networks
Gokou Hervé Fabrice Diédié, Boko Aka, Michel Babri
Pages: 33 - 51
Over the course of operation, a wireless sensor network can experience failures that are detrimental to the underlying application’s objectives. In this paper, we address the problem of restoring coverage ratio of a damaged area (hole) using only the neighboring nodes. Most existing solutions fail to...
Research Article
Proposal and Prototype of DNS Server Firewall with Flexible Response Control Mechanism
Hideo Masuda, Shun Segawa, Masayuki Mori
Pages: 34 - 40
Domain Name System (DNS) is an important system for the Internet communication. DNS is a system for distributed management and operation of domain names, and it is possible to associate with the resources such as IP address, instruct the destination host of the e-mail, and so on. On the one hand, it...
Research Article
Empirical Study for Semantic Annotation of Web Services
Djelloul Bouchiha, Mimoun Malki, Djihad Djaa, Abdullah Alghamdi, Khalid Alnafjan
Pages: 35 - 44
Web services have become the main paradigm for the development of distributed software systems using a common set of technologies, including SOAP, WSDL and UDDI. This allows accessing to software components residing on different platforms and written in different programming languages. However, several...
Research Article
Providing a load balancing method based on dragonfly optimization algorithm for resource allocation in cloud computing
Zahra Amini, Mehrdad Maeen, Mohammad Reza Jahangir
Pages: 35 - 42
Nowadays cloud computing is being highly considered by many of researchers, organizations, governments and so on. According to processing happening inside of cloud computing, some of the most important problems and challenges in cloud computing are load balancing, managing resource allocations, scheduling...
Research Article
A New Chaos-based Image Cipher Using a Hash Function
Chong Fu, Ou Bian, Hui-yan Jiang, Li-hui Ge, Hong-feng Ma
Pages: 37 - 44
This paper presents a new chaos-based image cipher using a plaintext-related permutation. The cat map and Lorenz system are employed to shuffle the positions of image pixels and generate the diffusion keystream, respectively. The control parameters of the cat map, i.e. the permutation key, are determined...
Research Article
Explicit Rate Control for MANET
Nazia Zaman, Morshed Chowdhury
Pages: 37 - 45
Streaming applications over Mobile Ad-hoc Networks (MANET) require a smooth transmission rate. The Internet is unable to provide this service during traffic congestion in the network. Designing congestion control for these applications is challenging, because the standard TCP congestion control mechanism...
Research Article
Floor Heating Customer Prediction Model Based on Random Forest
Zhihuan Yao, Xian Xu, Huiqun Yu
Pages: 37 - 42
Nowadays floor heating service is increasingly attracting both residents in cold areas and gas companies for market profits. With the aggravation of market-oriented competition, the gas companies are actively seeking service transformation. It is of great significance to gas companies to be able to forecast...
Research Article
Machine Learning in Failure Regions Detection and Parameters Analysis
Saeed Abdel Wahab, Reem El Adawi, Ahmed Khater
Pages: 41 - 48
Testing automation is one of the challenges facing the software development industry, especially for large complex products. This paper proposes a mechanism called Multi Stage Failure Detector (MSFD) for automating black box testing using different machine learning algorithms. The input to MSFD is the...
Research Article
A Distributed Storage System with Dynamic Tiering for iSCSI Environment
Atsushi Nunome, Hiroaki Hirata, Kiyoshi Shibayama
Pages: 42 - 50
We propose a distributed storage system which relocates data blocks autonomously among the storage nodes. In order to optimize I/O performance with slight administrative workload, our system is aimed at the realization of the following two functions; (i) Run-time construction of the storage tiers from...
Research Article
Blacklist Creation for Detecting Fake Accounts on Twitter
Myo Myo Swe, Nyein Nyein Myo
Pages: 43 - 50
Social networking sites such as Twitter, Facebook, Weibo, etc. are extremely mainstream today. Also, the greater part of the malicious users utilize these sites to persuade legitimate users for different purposes, for example, to promote their products item, to enter their spam links, to stigmatize other...
Research Article
Dynamically Adjusting the Mining Capacity in Cryptocurrency with Binary Blockchain
Yoohwan Kim, Ju-Yeon Jo
Pages: 43 - 52
Many cryptocurrencies rely on Blockchain for its operation. Blockchain serves as a public ledger where all the completed transactions can be looked up. To place transactions in the Blockchain, a mining operation must be performed. However, due to a limited mining capacity, the transaction confirmation...
Research Article
An IDS Visualization System for Anomalous Warning Events
Satoshi Kimura, Hiroyuki Inaba
Pages: 45 - 53
Intrusion Detection System(IDS) has received attention to deal with the illegal access to the network. However, IDS has a critical problem which outputs a tremendous number of logs. Analyzing these logs apply a large amount of load to a network manager. In this paper, we propose a novel visualization...
Research Article
Automate Scientific Workflow Execution between Local Cluster and Cloud
Hao Qian, Daniel Andresen
Pages: 45 - 54
Scientific computational experiments often span multiple computational and analytical steps, and during execution, researchers need to store, access, transfer, and query information. Scientific workflow is a powerful tool to stream-line and organize scientific application. Numbers of tools have been...
Research Article
A Nearest Neighbor Search Algorithm for LR-LD on High SNR
Thae Thae Yu Khine, Daisuke Mitsunaga, Koji Araki, Hua-An Zhao
Pages: 45 - 51
This paper presents a new chaos-based image cipher using a plaintext-related permutation. The cat map and Lorenz system are employed to shuffle the positions of image pixels and generate the diffusion keystream, respectively. The control parameters of the cat map, i.e. the permutation key, are determined...
Research Article
A Fault-Tolerant Schema for Clock Synchronization and data aggregation in WSN
Na Wang, Haihui He, DongQian Liu
Pages: 46 - 52
Event monitoring and determination is a popular application in WSN. Considering the special circumstance that some nodes of the wireless sensor network are faulty, a fault tolerant schema for data aggregation based on event clustering was proposed. Also, an improved HRTS algorithm named T-HRTS which...
Research Article
Comparative Study of Basic Time Domain Time-Delay Estimators for Locating Leaks in Pipelines
Vladimir A. Faerman, Valeriy S. Avramchuk
Pages: 49 - 57
The article is devoted to a survey of the known basic Time-Delay Estimation (TDE) methods in the application for detecting fluid leaks in pipeline transport and distribution systems. In the paper, both active and passive estimation methods are considered with respect to the presented generalized classification....
Research Article
An Introduction of Multiple P-adic Data Type and Its Parallel Implementation
Chao Lu, Xinkai Li
Pages: 51 - 59
Our research group has been working on the P-adic theory and its implementation. Based on the Chinese Remainder theorem and the Hensel code a new data type, called Multiple P-adic Data Type, has been established to realize rational calculation. With this data type all rational number operations are converted...
Research Article
An Improved Semantic Role Labeling for Myanmar Text
Zin Mar Kyu, Naw Lay Wah
Pages: 51 - 58
The semantic role labeling plays a key role to extract semantic information from language text for the purpose of information retrieval, text summarization, plagiarism test, etc. This paper presents two main parts: MynNet and semantic role labeling. MynNet, which is a FrameNet for Myanmar language is...
Research Article
An FPGA Accelerator for Molecular Dynamics Simulation Using OpenCL
Hasitha Muthumala Waidyasooriya, Masanori Hariyama, Kota Kasahara
Pages: 52 - 61
This paper presents a new chaos-based image cipher using a plaintext-related permutation. The cat map and Lorenz system are employed to shuffle the positions of image pixels and generate the diffusion keystream, respectively. The control parameters of the cat map, i.e. the permutation key, are determined...
Research Article
An Empirical Study on Darknet Visualization Based on Topological Data Analysis
Masaki Narita
Pages: 52 - 58
We are experiencing the true dawn of an Internet of Things society, in which all things are connected to the Internet. While this enables us to receive a wide variety of useful services via the Internet, we cannot ignore the fact that this means the number of devices targeted for Internet attacks has...
Research Article
The Smart Energy Management of Multithreaded Java Applications on Multi-Core Processors
Kuo-Yi Chen, Fuh-Gwo Chen
Pages: 53 - 60
Multi-core processors are becoming widely deployed. However, more cores consume more power. A power saving technique for multi-core systems based on the observation of critical sections is proposed. Since only one thread works in a critical section, other threads on other cores that access the same resource...
Research Article
Developer Experience Considering Work Difficulty in Software Development*
Taketo Tsunoda, Hironori Washizaki, Yosiaki Fukazawa, Sakae Inoue, Yoshiiku Hanai, Masanobu Kanazawa
Pages: 53 - 62
Previous studies have researched how developer experience affects code quality, but difficulty was ignored although experienced developers are more likely to work on more complex parts of a project. We examine work difficulty by focusing on revised files. Using product metrics, we evaluate file complexity...
Research Article
Service Value Broker Patterns: An Empirical Collection and Analysis
Yucong Duan, Keman Huang, Dan Chen, Yongzhi Wang, Ajay Kattepur, Wencai Du
Pages: 54 - 69
The service value broker(SVB) pattern integrates business modeling, knowledge management and economic anal- ysis with relieved complexity, enhanced reusability and effi- ciency,etc. The study of SVB is an emerging interdisciplinary subject which will help to promote the reuse of knowledge, strategy and...
Research Article
Topic Model based Approach for Improved Indexing in Content based Document Retrieval
Moon Soo Cha, So Yeon Kim, Jae Hee Ha, Min-June Lee, Young-June Choi, Kyung-Ah Sohn
Pages: 55 - 64
Information Retrieval system plays an essential role in web services. However, the web services in which users can upload files as attachments typically do not support enough search conditions and often rely only on the title or the description that the users provide during upload. We present a topic-model...
Research Article
Multimedia Analysis and Fusion via Wasserstein Barycenter
Cong Jin, Junhao Wang, Jin Wei, Lifeng Tan, Shouxun Liu, Wei Zhao, Shan Liu, Xin Lv
Pages: 58 - 66
Optimal transport distance, otherwise known as Wasserstein distance, recently has attracted attention in music signal processing and machine learning as powerful discrepancy measures for probability distributions. In this paper, we propose an ensemble approach with Wasserstein distance to integrate various...
Research Article
Character Segmentation and Recognition for Myanmar Warning Signboard Images
Kyi Pyar Zaw, Zin Mar Kyu
Pages: 59 - 67
This paper publicizes the character segmentation and recognition of the Myanmar warning text signboard images taken by a mobile phone camera in natural scene. In this system, two templates are created. The first template that contains both connected pixel words and characters are used for character segmentation...
Research Article
Scheduling Algorithms in Fog Computing: A Survey
Khaled Matrouk, Kholoud Alatoun
Pages: 59 - 74
Over the last recent years, applications related to the internet of things have become the most important techniques in the world that facilitate interactions among humans and things to enhance the quality of life. So, the number of devices used in these applications will increase, leading to the creation...
Research Article
Comparison of Hash Table Performance with Open Addressing and Closed Addressing: An Empirical Study
Dapeng Liu, Shaochun Xu
Pages: 60 - 68
In this paper, we conducted empirical experiments to study the performance of hashing with a large set of data and compared the results of different collision approaches. The experiment results leaned more to closed addressing than to open addressing and deemed linear probing impractical due to its low...
Research Article
Realize Node Localization Based on OLSR Protocol in Ad Hoc Networks
Anbao Wang, Bin Zhu
Pages: 61 - 71
In wireless Ad Hoc network's many applications, learning accurately the position of the node is one of its important conditions. Node walks randomly in wireless Ad Hoc network, thus it causes the position of the nodes are stochastic; Therefore, the node localization technology is one of the difficult...
Research Article
Functional Evaluation of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations
Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii
Pages: 62 - 70
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data,...
Research Article
Improvement of CSF, WM and GM Tissue Segmentation by Hybrid Fuzzy – Possibilistic Clustering Model based on Genetic Optimization Case Study on Brain Tissues of Patients with Alzheimer’s Disease
Lilia Lazli, Mounir Boukadoum
Pages: 63 - 77
Brain tissue segmentation is one of the most important parts of clinical diagnostic tools. Fuzzy C-mean (FCM) is one of the most popular clustering based segmentation methods. However FCM does not robust against noise and artifacts such as partial volume effect (PVE) and inhomogeneity. In this paper,...
Research Article
Using SPIN to Check Simulink Stateflow Models
Chikatoshi Yamada, D. Michael Miller
Pages: 65 - 74
Verification is critical to the design of large and complex systems. SPIN is a well-known and extensively used verification tool. In this paper, we consider two tool chains, one existing, WSAT, and one introduced here, that support using SPIN to model check systems specified as Simulink Stateflow models....
Research Article
Solving MTU Mismatch and Broadcast Overhead of NDN over Link-layer Networks
Thongchai Chuachan, Karim Djemame, Somnuk Puangpronpitag
Pages: 67 - 75
Named Data Networking (NDN) has been considered as a promising Internet architecture for the future data-centric communication. In particular, NDN over link-layer networks would cut off the overheads of Transmission Control Protocol/Internet Protocol (TCP/IP), and enhance the efficiency of data distribution....
Research Article
A Formal Model of Distributed Security for Electronic Commerce Transactions Systems
Sylvanus A. Ehikioya, Adepele A. Olukunle
Pages: 68 - 84
Every distributed system requires a secure environment for its users. Security becomes even more important if users exchange sensitive information and value, across the network. An e-commerce environment is an example of a distributed system in which security is of a high priority. It is important that...
Research Article
A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks
Dongxu Jin, JooSeok Song
Pages: 69 - 78
In Vehicular Ad-hoc Networks, security is a important issue. In the past years, several approaches have been proposed for solving Sybil attack. In this paper a novel scheme to detect the Sybil nodes is presented. The proposed scheme utilizes unmodifiable physical measurements of beacon messages. To increase...
Research Article
Fully distributed certificate authority based on polynomial over elliptic curve for MANET
Ahmad Alomari
Pages: 70 - 77
A mobile ad hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or a pre-existing infrastructure. Various certificate authorities (CAs) distributed over the network, each with a periodically updated share of the secrete key, is usually adopted. Elliptic...
Research Article
Evaluating the Performance of Recoverable End-of-life Products in the Reverse Supply Chain
Santoso Wibowo, Srimannarayana Grandhi
Pages: 71 - 79
Evaluating the performance of recoverable end-of-life products with respect to a set of specific criteria is challenging. This is due to multi-dimensional nature of the decision making process, multiple evaluation criteria, and subjective and imprecise assessments. To effectively deal with this issue,...
Research Article
A Middleware-Based Implementation for Data Integration of Remote Devices
Xianyong Liu, Yanping Liu, Lizhuang Ma, Qing Gao
Pages: 72 - 78
Different from existing techniques3-5 that often focus on high level data integration, this paper contributes a novel solution at device level, implementing a fully scalable and configurable middleware, aiming at releasing the power of parallel processing with distributed data. It is designed as a soft-gateway...
Research Article
Percolation Thresholds on Tree-Based Communities of Wireless Sensor Networks
Qiao Li, Zhendong Niu, Baihai Zhang, Lingguo Cui, Bin Wu
Pages: 75 - 84
Many efficient deployments of large-scale wireless sensor networks based on the tree-based community rise into view recently. Sensor nodes are severely resource constrained, and lack sophisticated defense mechanisms to fight virus attacks. Cyber viruses spread through node populations over the networks,...
Review Article
A Survey on Securing IoT Ecosystems and Adaptive Network Vision
Tejaswini Goli, Yoohwan Kim
Pages: 75 - 85
The rapid growth of Internet-of-Things (IoT) devices and the large network of interconnected devices pose new security challenges and privacy threats that would put those devices at high risk and cause harm to the affiliated users. This paper emphasizes such potential security challenges and proposes...
Research Article
Empirical Research on the Growth Path of China’s Industrial Economy under the Background of Supply-side Reform
Xianhong Xu
Pages: 76 - 85
Supply-side reform has provided opportunities for China’s industrial economic growth, but also experienced unprecedented challenges. Based on the background of supply-side reform, this paper applies the supply-side theory. First, it explores the mechanism between industrial overcapacity and economic...
Research Article
An Ensemble Approach for Cyber Attack Detection System: A Generic Framework
Shailendra Singh, Sanjay Silakari
Pages: 78 - 90
Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources. The fact is that no single classifier is able to give maximum accuracy...
Research Article
Implementation of Emotional Features on Satire Detection
Pyae Phyo Thu, Than Nwe Aung
Pages: 78 - 87
Recognition of satirical language in social multimedia outlets turns out to be a trending research area in computational linguistics. Many researchers have analyzed satirical language from the various point of views: lexically, syntactically, and semantically. However, due to the ironic dimension of...
Research Article
Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag
Biplob Rakshit Ray, Morshed Chowdhury, Jemal Abawajy
Pages: 79 - 88
Radio Frequency Identification (RFID) is an emerging wireless object identification technology with many potential applications such as supply chain management, personnel tracking and healthcare. However, security vulnerabilities of the RFID system have been a serious concern for its wide adoption in...
Research Article
Optimal Number of Clusters for Fast Similarity Search Considering Transformations of Time Varying Data
Toshiichiro Iwashita, Teruhisa Hochin, Hiroki Nomiya
Pages: 79 - 88
This paper proposes a method of determining the optimal number of clusters dividing the multiple transformations for the purpose of the efficient processing of query against the results of applying the transformations to time series. In this paper, the moving average is used as a transformation for simplicity....
Research Article
An Intelligent Cross-Layer QoS-Aware Protocol with Traffic-Differentiation-Based for Energy Efficient Communication in WSNs
Jawad Ahmad Haqbeen, Takayuki Ito, Mohammad Arifuzzaman, Takanobu Otsuka
Pages: 80 - 92
Despite an increase in energy efficiency of WSNs research in couple of last years, still the key challenge in the design of WSNs remains to maximize the quality of service (QoS) and energy efficiency of network system. The layered strength and functionality collaboration is commonly considered as one...
Research Article
Archaeological Distribution Map System Using Aggregate Information from Heterogeneous Information Sources
Ayako Hayashi, Teruhisa Hochin, Hiroki Nomiya
Pages: 85 - 95
This paper proposes archaeological distribution map system sharing archaeological information. Many archaeologists want to analyze the distribution of relics and/or remains. Excavation information, however, cannot be opened until verification and research are completed. Archaeological information sources...
Research Article
Design and Implementation of an IoT-Based Smart Home Security System
Mohammad Asadul Hoque, Chad Davidson
Pages: 85 - 92
Recent advances in smartphones and affordable open-source hardware platforms have enabled the development of low-cost architectures for Internet-of-Things (IoT)-enabled home automation and security systems. These systems usually consist of sensing and actuating layer that is made up of sensors such as...
Research Article
Analysis of Features Dataset for DDoS Detection by using ASVM Method on Software Defined Networking
Myo Myint Oo, Sinchai Kamolphiwong, Thossaporn Kamolphiwong, Sangsuree Vasupongayya
Pages: 86 - 93
The impact of Distributed Denial of Service (DDoS) attack is one of the major concerns for Software Defined Networking (SDN) environments. Support Vector Machine (SVM) has been used in a DDoS attack detection mechanism on SDN. The advantages of SVM algorithms in DDoS attack detections are high accuracy...
Research Article
Bountychain: Toward Decentralizing a Bug Bounty Program with Blockchain and IPFS
Alex Hoffman, Phillipe Austria, Chol Hyun Park, Yoohwan Kim
Pages: 86 - 93
Bug Bounty Programs (BBPs) play an important role in providing and maintaining security in software applications. These programs allow testers to discover and resolve bugs before the general public is aware of them, preventing incidents of widespread abuse. However, they have shown problems such as organizations...
Research Article
Real-time Multi-Agents Architecture for E-commerce Servers
Sylvanus A. Ehikioya, Cong Zhang
Pages: 88 - 98
Electronic commerce applications have strict timing constraints on the interactions between e-commerce servers and customers. Customers prefer real-time services, which mean immediate response from the server shortly after submission of a request. This trend of demand gives e-commerce servers high pressure,...
Research Article
Parallel Implementation of Apriori Algorithm Based on MapReduce
Ning Li, Li Zeng, Qing He, Zhongzhi Shi
Pages: 89 - 96
Searching frequent patterns in transactional databases is considered as one of the most important data mining problems and Apriori is one of the typical algorithms for this task. Developing fast and efficient algorithms that can handle large volumes of data becomes a challenging task due to the large...
Research Article
Parallel Indexing Scheme for Data Intensive Applications
Kenta Funaki, Teruhisa Hochin, Hiroki Nomiya, Hideya Nakanishi
Pages: 89 - 98
This paper proposes a parallel indexing scheme of a large amount of data in order to resolve the issues about time limitation. Three kinds of computing-nodes are introduced. These are reception-nodes, representative-nodes, and normal-nodes. A reception-node receives data for insertion. A representative-node...
Research Article
On a Drawing-Frequency based Layered Canvas Mechanism for Collaborative Paper Editing Support Systems
Shinya Katayama, Takushi Goda, Shun Shiramatsu, Tadachika Ozono, Toramatsu Shintani
Pages: 91 - 99
We propose a Drawing-Frequency based Layered (DFL) Canvas approach to reduce a synchronization delay in collaborative web applications. The synchronization delay consists of a network delay and a drawing delay. The network delay is well-argued topic by various researches. We focus on the drawing delay,...
Research Article
UWB signal detection based on wavelet packet and FHN model
Bowen Chen, Lei Jiang, Qun Zhang
Pages: 93 - 100
In UWB-IR signal detection, the threshold of signal to noise ratio(SNR) limit the performance of FHN model detection method, from this point, wavelet packet is introduced into FHN model, a novel UWB-IR signal detection method based on wavelet packet and FHN model is proposed, in addition, the disadvantages...
Research Article
Polar Code Appropriateness for Ultra-Reliable and Low-Latency Use Cases of 5G Systems
Arti Sharma, Mohammad Salim
Pages: 93 - 99
Polar code is considered as a major breakthrough of past decade in channel coding area. The unprecedented performance of polar codes compelled third generation partnership project (3GPP) to adopt the polar codes for control channels functions in one of the fifth generation (5G) scenario enhanced mobile...
Research Article
Compositional Stochastic Model Checking Probabilistic Automata via Assume-guarantee Reasoning
Yang Liu, Rui Li
Pages: 94 - 107
Stochastic model checking is the extension and generalization of the classical model checking. Compared with classical model checking, stochastic model checking faces more severe state explosion problem, because it combines classical model checking algorithms and numerical methods for calculating probabilities....
Research Article
Link Failure Tolerant GPSR Protocol
Ikram Cherifi, Zoulikha Mekkakia Maaza
Pages: 94 - 104
Link failure cause packet loss, increased delays, disconnection from the network or even the shutdown of the inter-vehicle communication system vehicle-to-vehicle. Routing protocols suffer from this situation due to the lack of fault tolerance mechanisms that are intended to make the vehicular ad hoc...
Research Article
Accelerated Diffusion-Based Recommendation Algorithm on Tripartite Graphs with GPU Clusters
Jingpeng Wang, Jie Huang, Mi Li
Pages: 96 - 105
Exorbitant computation cost hinders the practical application of recommendation algorithm, especially in time-critical application scenario. Although experiments show that recommendation algorithm based on an integrated diffusion on user-item-tag tripartite graphs can significantly improve accuracy,...
Research Article
Modeling Performance of CSMA/CA with Retransmissions in Wireless Personal Area Networks
Zhongwei Zhang
Pages: 97 - 107
Despite the widespread uses in military, smart building, habitat monitoring, Wireless sensor networks (WSNs) just begun showing their superiority in the medical and healthcare domain. Facing same challenges as other applications, deployment of WPANs in medical domain exert many more stringent requirements,...
Research Article
Evaluation of A Secure Live Migration of Virtual Machines Using IPsec Implementation
Norshazrul Azman bin Sulaiman, Hideo Masuda
Pages: 99 - 108
Live migration enables administrators to perform online maintenance on host and virtual machines without interrupted service during fault occurrences. While migrating VMs between physical servers of different data centers over the network is considered, security is essential for securing the migration...
Research Article
Handoff Delay Optimization Using Hybrid Prediction Model
M R Regitha, Varghese Paul, Shailesh Sivan, Nijo Antony
Pages: 99 - 107
Research Article
Using Cryptographic Technique for Securing Route Discovery and Data Transmission from BlackHole Attack on AODV-based MANET
Seryvuth Tan, Phearin Sok, Keecheon Kim
Pages: 100 - 107
MANET is a dynamic wireless network without any infrastructures. The network is weak and vulnerable to many types of attacks including BlackHole attack. BlackHole node advertises itself as having freshest or shortest path to a specific node to absorb packets. The effect of BlackHole attack on AODV will...
Research Article
Semantic Schema Matching for String Attribute with Word Vectors and its Evaluation
Kenji Nozaki, Teruhisa Hochin, Hiroki Nomiya
Pages: 100 - 106
Instance-based schema matching is to determine the correspondences between heterogeneous databases by comparing instances. Heterogeneous databases consist of an enormous number of tables containing various attributes, causing the data heterogeneity. In such cases, it is effective to consider semantic...
Research Article
An Innovative Positioning System with Unsynchronized Interferometric Modulated Signals in Wireless Sensor Networks
Ruiling Gao, Alva Couch, Chorng Hwa Chang
Pages: 101 - 112
In this paper, we investigate the sensor localization problem and present Stochastic Radio Interferometric Positioning System with Unsynchronized Modulated Signals (SRIPS_UMS). Previous radio interferometric positioning methods have limitations include (1) strict hardware requirements for Received Signal...
Research Article
An Extended Web Displaying System based on Multiple Tablet Devices
Shota Imai, Shun Shiramatsu, Tadachika Ozono, Toramatsu Shintani
Pages: 106 - 115
We propose an extended Web displaying system based on multiple tablet devices to help users to conduct collaborative works anywhere without a large display. Users can use multiple tablet devices as a pseudo mobile large display on demand by using our system. For example, users can make discussions by...
Research Article
Design and Implementation of Dynamic Hybrid Virtual Honeypot Architecture for Attack Analysis
Yonas Kibret, Wang Yong
Pages: 108 - 123
Honeypots are dedicated machines whose aim is to delay and divert attackers away from critical resources in order to study new methods and tools used by attackers. However, when looking most of current honeypot systems are statically configured and managed. They are either low interaction honeypot or...