International Journal of Networked and Distributed Computing
206 articles
Research Article
Multi-Objective Optimization for Milling Operations using Genetic Algorithms under Various Constraints
Libao An, Peiqing Yang, Hong Zhang, Mingyuan Chen
Pages: 108 - 114
In this paper, the parameter optimization problem for face-milling operations is studied. A multi-objective mathematical model is developed with the purpose to minimize the unit production cost and total machining time while maximize the profit rate. The unwanted material is removed by one finishing...
Research Article
Internet of Things in the 5G Mobile Communication System: The Optimal Number of Channels in Channel Hopping*
Gayoung Kim, Minjoong Rim
Pages: 108 - 117
One of the typical goals of the 5G mobile communication system1 is to establish an Internet of Things (IoT)2 environment in which all objects are connected to the network to generate and share information through not only mobile terminals but also mobile communication infrastructure. 5G must support...
Research Article
“Never fry carrots without chopping” Generating Cooking Recipes from Cooking Videos Using Deep Learning Considering Previous Process
Tatsuki Fujii, Yuichi Sei, Yasuyuki Tahara, Ryohei Orihara, Akihiko Ohsuga
Pages: 107 - 112
Research on deep-training captioning models that modify the natural-language contents of images and moving images has produced considerable results and attracted attention in recent years. In this research, we aim to generate recipe sentences from cooking videos acquired from YouTube. We treat this as...
Research Article
Integrated Usage of Heterogeneous Databases for Novice Users
Ayano Terakawa, Teruhisa Hochin, Hiroki Nomiya
Pages: 109 - 118
This paper proposes the system enabling users to use heterogeneous databases in an integrated manner without any conversion and servers. In order to treat a variety of sources in a unified manner, this system is realized by using Java Database Connectivity (JDBC) in accessing databases on the user’s...
Research Article
MLP and CNN-based Classification of Points of Interest in Side-channel Attacks
Hanwen Feng, Weiguo Lin, Wenqian Shang, Jianxiang Cao, Wei Huang
Pages: 108 - 117
A trace contains sample points, some of which contain useful information that can be used to obtain a key in side-channel attacks. We used public datasets from the ANSSI SCA Database (ASCAD) as well as SM4 traces to learn whether a trace consisting of Points of Interest (POIs) have a positive effect...
Research Article
Measuring the Distance of Moving Objects from Big Trajectory Data
Khaing Phyo Wai, Nwe Nwe
Pages: 113 - 122
Location-based services have become important in social networking, mobile applications, advertising, traffic monitoring, and many other domains. The growth of location sensing devices has led to the vast generation of dynamic spatial-temporal data in the form of moving object trajectories which can...
Research Article
Do You Like Sclera? Sclera-region Detection and Colorization for Anime Character Line Drawings
Masashi Aizawa, Yuichi Sei, Yasuyuki Tahara, Ryohei Orihara, Akihiko Ohsuga
Pages: 113 - 120
Colorizing line drawings requires special skill, experience, and knowledge. Artists also spend a great deal of time and effort creating art. Given this background, research on automated line drawing colorization was recently conducted. However, the existing approaches present multiple problems, one of...
Research Article
System Architecture & Feature Design for Engineering a Web-based Travel Advisor System
Amir Maddah, Manolya Kavakli
Pages: 115 - 121
Many Advisor Systems have been designed and developed to assist us in decision-making, each with their strengths and weaknesses. A popular type of Advisor systems is Travel Advisor systems that assist travelers in their travel arrangements. We have designed and implemented a Travel Advisor system to...
Research Article
IntegrityMR: Exploring Result Integrity Assurance Solutions for Big Data Computing Applications
Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa, Yucong Duan, Wencai Du
Pages: 116 - 126
Large-scale adoption of MapReduce applications on public clouds is hindered by the lack of trust on the participating virtual machines deployed on the public cloud. In this paper, we propose IntegrityMR, a multi-public clouds architecture-based solution, which performs the MapReduce-based result integrity...
Research Article
Incremental Data Migration for Multi-Database Systems Based on MySQL with SPIDER Storage Engines
Naoyuki Miyamoto, Ken Higuchi, Tatsuo Tsuji
Pages: 119 - 127
In this paper, an incremental data migration technique is evaluated in the multi-database system based on MySQL with SPIDER storage engine and the improvement of the turn-around times of other operations is proved in this systems. In this method, a large data migration is divided into small data migrations...
Research Article
An Entropy-Based Metric of Developer Contribution in Open Source Development and Its Application to Fault-Prone Program Analysis*
Kazuki Yamauchi, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara
Pages: 118 - 132
To support successful quality managements of open source software (OSS) projects, this paper proposes to measure the balance of developers’ contributions to a source file as an entropy. Through an analysis of data collected from 10 popular OSS projects, the following trends are reported: a source file...
Research Article
High Performance Hadoop Distributed File System
Mohamed Elkawkagy, Heba Elbeh
Pages: 119 - 123
Although by the end of 2020, most of companies will be running 1000 node Hadoop in the system, the Hadoop implementation is still accompanied by many challenges like security, fault tolerance, flexibility. Hadoop is a software paradigm that handles big data, and it has a distributed file systems so-called...
Research Article
Defects and Vulnerabilities in Smart Contracts, a Classification using the NIST Bugs Framework
Wesley Dingman, Aviel Cohen, Nick Ferrara, Adam Lynch, Patrick Jasinski, Paul E. Black, Lin Deng
Pages: 121 - 132
Rising to popularity in the last decade, blockchain technology has become the preferred platform for the transfer of digital currency. Unfortunately, many of these environments are rife with vulnerabilities exploited by financially motivated attackers. Worse yet, is that a structured analysis and classification...
Research Article
CSEP: Circular Shifting Encryption Protocols for Location Privacy Protection
Chen Di, Zhao Binglin, Li Hao, Zhou Shilei
Pages: 123 - 132
Location Based Service (LBS) is gaining popularity. As one fundamental LBS service, range search returns all Point of Interests (POIs) within a user-specified range. However, people leave their location privacy at risks when using range search. How to provide a high-quality range search service while...
Research Article
Parallel Implementation of Exact Matrix Computation Using Multiple P-adic Arithmetic
Xinkai Li, Chao Lu, Jon A. Sjogren
Pages: 124 - 133
A P-adic Exact Scientific Computational Library (ESCL) for rational matrix operations has been developed over the past few years. The effort has been focusing on converting all rational number operations to integer calculation, and fully taking advantage of the fast integer multiplication of modern computer...
Research Article
Padding Free Bank Conflict Resolution for CUDA-Based Matrix Transpose Algorithm
Ayaz ul Hassan Khan Khan, Mayez Al-Mouhamed, Allam Fatayer, Anas Almousa, Abdulrahman Baqais, Mohammed Assayony
Pages: 124 - 134
The advances of Graphic Processing Units (GPU) technology and the introduction of CUDA programming model facilitates developing new solutions for sparse and dense linear algebra solvers. Matrix Transpose is an important linear algebra procedure that has deep impact in various computational science and...
Research Article
On Learning Associative Relationship Memory among Knowledge Concepts
Zhenping Xie, Kun Wang, Yuan Liu
Pages: 124 - 130
A high-level associative memory modelling method was developed to explore the realization of associative memory. In the proposed method, two stage procedures are progressively performed to construct a unified associative knowledge network. In the first stage, some direct weighted associative links are...
Research Article
Hierarchical Latent Semantic Mapping for Automated Topic Generation
Guorui Zhou, Guang Chen
Pages: 127 - 136
Much of information sits in an unprecedented amount of text data. Managing allocation of these large scale text data is an important problem for many areas. Topic modeling performs well in this problem. The traditional generative models (PLSA,LDA) are the state-of-the-art approaches in topic modeling...
Research Article
Scenarios for An RFID Tag Ownership Transfer Protocol for A Closed Loop System
Gaith K.D. Al., Biplob Rakshit Ray, Morshed Chowdhury
Pages: 128 - 136
In RFID system a tag is attached to an object which might own by a number of owners during its life time. This requires the RFID system to transfer ownership of the tag to its new owner. The ownership transfer has to protect privacy of current and new owner. Many ownership tag ownership transfer exists...
Research Article
Towards a Task and Resource Aware Task Scheduling in Cloud Computing: An Experimental Comparative Evaluation
Muhammad Ibrahim, Said Nabi, Abdullah Baz, Nasir Naveed, Hosam Alhakami
Pages: 131 - 138
Cloud computing has been considered as one of the large-scale platforms that support various type of services including compute, storage, compute, and analytic to the users and organizations with high agility, scalability, and resiliency intact. The users of the Cloud are increasing at an enormous rate...
Research Article
Target Oriented Tweets Monitoring System during Natural Disasters
Si Si Mar Win, Than Nwe Aung
Pages: 133 - 142
Twitter, Social Networking Site, becomes most popular microblogging service and people have started publishing data on the use of it in natural disasters. Twitter has also created the opportunities for first responders to know the critical information and work effective reactions for impacted communities....
Research Article
Utilizing Type-2 Fuzzy Sets as an Alternative Approach for Valuing Military Information
Timothy P Hanratty, Robert J Hammell
Pages: 133 - 139
Knowledge elicitation from a group versus a single source typically yields outcomes that range in agreement and promote a level of uncertainty. Recently, the use of Type-2 fuzzy sets has been proffered as an alternative approach for capturing the difference of opinions expressed by a group of experts...
Research Article
BSP-Based Support Vector Regression Machine Parallel Framework
Hong Zhang, Yongmei Lei
Pages: 134 - 143
In this paper, we investigate the distributed parallel Support Vector Machine training strategy, and then propose a BSP-Based Support Vector Regression Machine Parallel Framework which can implement the most of distributed Support Vector Regression Machine algorithms. The major difference in these algorithms...
Research Article
Customer Prediction using Parking Logs with Recurrent Neural Networks
Liaq Mudassar, Yung-Cheol Byun
Pages: 133 - 142
Neural Networks have been performing state of the art for almost a decade now; when it comes to classification and prediction domains. Within last few years, neural networks have been improved tremendously and their performance is even better than humans in some domains, e.g. AlphaGo vs Lee Sedol and...
Research Article
Test Image Generation using Segmental Symbolic Evaluation
Tahir Jameel, Mengxiang Lin
Pages: 135 - 147
Image processing applications have played a vital role in modern life and they are required to be well tested due to their significance and human dependence on them. Testing of image processing application is difficult due to complex nature of images in terms of their generation and evaluation. The presented...
Research Article
MLSA: a static bugs analysis tool based on LLVM IR
Hongliang Liang, Lei Wang, Dongyang Wu, Jiuyun Xu
Pages: 137 - 144
Program bugs may result in unexpected software error, crash or serious security attack. Static program analysis is one of the most common methods to find program bugs. In this paper we present MLSA -- a static analysis tool based on LLVM Intermediate Representation (IR), which can analyze programs written...
Research Article
Towards a Monitoring Framework for the Automatic Integration of the Access Control Policies for Web Services
Mohammed Alodib
Pages: 137 - 149
Cloud computing is an emerging model of business computing that can be used to maintain configurable resources such as processors, networks, storage, operating systems, databases, and servers. Service oriented Architecture (SoA) is one of most successful paradigms deployed over the Cloud; is a layered...
Research Article
Performance Analysis of Blockchain-based Access Control Model for Personal Health Record System with Architectural Modelling and Simulation
Thein Than Thwin, Sangsuree Vasupongayya
Pages: 139 - 151
The Personal Health Record (PHR) could be seen as a preventive care solution to the incoming aging society. The blockchain-based PHR system has been proposed recently to enhance the security and privacy for the PHR data. Consequently, the performance becomes a concern for blockchain-PHR integration because...
Research Article
Transitional Method for Identifying Improvements in Video Distribution Services
Motoi Iwashita
Pages: 141 - 148
Customer satisfaction is an indicator that is generally utilized to improve goods/services for customer retention. Therefore, companies should understand the changes in customers’ perception of their goods/services and decide improvements. Therefore, a transitional evaluation approach is needed for goods/services...
Research Article
A Pair-wise Bare Bones Particle Swarm Optimization Algorithm for Nonlinear Functions
Jia Guo, Yuji Sato
Pages: 143 - 151
Bare bones particle swarm optimization is a parameter-free swarm intelligence algorithm which is famous for easy applying. It has aroused wide concern of academic circle on its principles and applications in recent years. However, losing the diversity quickly still causes the premature convergence in...
Research Article
On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback
Wei Yu, Xinwen Fu, Erik Blasch, Khanh Pham, Dan Shen, Genshe Chen, Chao Lu
Pages: 144 - 158
Network-based crime has been increasing in both extent and severity and network-based forensics encapsulates an essential part of legal surveillance. A key network forensics tool is traceback that can be used to identify true sources of suspects. Both accuracy and secrecy are essential attributes of...
Research Article
A Formal Model of Peer-to-Peer Digital Product Marketplace
Sylvanus A. Ehikioya
Pages: 143 - 154
Peer-to-peer (P2P) electronic commerce has become increasingly popular over the last few years. This popularity of P2P is due mainly to the many advantages it offers, such as the ease of sharing of computer resources and reducing cost. This paper uses both semi-formal and formal specification methods...
Research Article
Adaptive Omni-directional Walking Method with Fuzzy Interpolation for Biped Robots
Haobin Shi, Xuesi Li, Huahui Chen, Shixiong Wang
Pages: 145 - 158
Omni-directional walking is an important part for biped robots. Whereas, the problems of complex model, low stability, low flexibility, etc., existing in walking planning of biped robots, attract interests of many researchers. This paper proposes an adaptive omni-directional walking method with fuzzy...
Research Article
Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree)
Lifford McLauchlan, Soumya Saha, Rajab Challoo
Pages: 148 - 155
Wireless Sensors Networks (WSNs) are utilized in many diverse applications ranging from security, environmental monitoring, landslide detection, patient monitoring, reconnaissance operations, structural health monitoring and smart buildings. Since in many applications the WSN nodes are randomly deployed,...
Research Article
Jade: Reducing Energy Consumption of Android App
Hao Qian, Daniel Andresen
Pages: 150 - 158
The need for increased performance of mobile device directly conflicts with the desire for longer battery life. Offloading computation to multiple devices is an effective method to reduce energy consumption and enhance performance for mobile applications. Android provides mechanisms for creating mobile...
Research Article
Efficient Searching for Essential API Member Sets based on Inclusion Relation Extraction
Yushi Kondoh, Masashi Nishimoto, Keiji Nishiyama, Hideyuki Kawabata, Tetsuo Hironaka
Pages: 149 - 157
Search tools for Application Programming Interface (API) usage patterns extracted from open source repositories could provide useful information for application developers. Unlike ordinary document retrieval, API member sets obtained by mining are often similar to each other and are mixtures of several...
Research Article
Research on Service Recommendation Reliability in mobile computing
Weng Wen, Huaikou Miao
Pages: 152 - 163
Web services bring more conveniences for users and developers. However, it makes user face the problem of service information explosion. The personalized service recommendation solves the problem. This paper proposes a mechanism to evaluate Web service composition’s reliability which bases on user context...
Research Article
Enhancing Case-based Reasoning Approach using Incremental Learning Model for Automatic Adaptation of Classifiers in Mobile Phishing Detection
San Kyaw Zaw, Sangsuree Vasupongayya
Pages: 152 - 161
This article presents the threshold-based incremental learning model for a case-base updating approach that can support adaptive detection and incremental learning of Case-based Reasoning (CBR)-based automatic adaptable phishing detection. The CBR-based adaptive phishing detection model detects the phishing...
Research Article
Efficient Security and Privacy Protection for Emerging Smart RFID Communications
Mohammad Fal Sadikin, Marcel Kyas
Pages: 156 - 165
Due to its constrained nature, the use of smart RFID technology introduces tremendous security and privacy issues. This paper presents IMAKA-Tate: Identity protection, Mutual Authentication and Key Agreement using Tate pairing of Identity-based Encryption method. It is designed to tackle various challenges...
Research Article
One to One Identification of Cryptosystem Using Fisher’s Discriminant Analysis
Xinyi Hu, Yaqun Zhao
Pages: 155 - 173
Distiguishing analysis is an important part of cryptanalysis. It is an important content of discriminating analysis that how to identify ciphertext is encrypted by which cryptosystems when it knows only ciphertext. In this paper, Fisher’s discriminant analysis (FDA), which is based on statistical method...
Research Article
Distributed and High Performance Big-File Cloud Storage Based On Key-Value Store
Thanh Trung Nguyen, Minh Hieu Nguyen
Pages: 159 - 172
This research proposes a new Big File Cloud (BFC) with its architecture and algorithms to solve difficult problems of cloud-based storage using the advantages of key-value stores. There are many problems when designing an efficient storage engine for cloud-based storage systems with strict requirements...
Research Article
Device driver development of an external human interaction device for the Android
Naoto Ogawa, Shuichi Oikawa
Pages: 159 - 166
Recently, many people have used Smartphones. The feature of Smartphones is that they are equipped with a mobile operating system (OS) for the control of sensors and modules. In this situation, we can connect external human interaction devices with the Smartphone. Our objective is to know how the external...
Research Article
Secure in-vehicle Systems using Authentication
Masaya Yoshikawa, Kyota Sugioka, Yusuke Nozaki, Kensaku Asahi
Pages: 159 - 166
Recently, driving support technologies have been practically used. However, a problem has been pointed out that when a vehicle is connected with an external network, the safety of the vehicle is threatened. Ensuring the security of in-vehicle systems becomes an important priority. The present study proposes...
Research Article
A Secure and Scalable Data Source for Emergency Medical Care using Blockchain Technology
Shirin Hasavari, Yeong-Tae Song
Pages: 158 - 166
A relationship exists between the emergency patient death rate and factors such as the failure to access a patient’s critical data and the time it takes to arrive at hospitals. The ability for Paramedics to access a patient’s complete picture of emergency-relevant medical data is critical and can significantly...
Research Article
Research on Intelligent Question and Answering Based on a Pet Knowledge Map
Yuan Liu, Wen Zhang, Qi Yuan, Jie Zhang
Pages: 162 - 170
This paper proposes a framework for constructing pet knowledge maps. The schema concept layer is designed and built top-down, and the data layer is constructed from knowledge extracted from semi-structured and unstructured data. In the aspect of entity extraction of unstructured data, a symptom-named...
Research Article
Design of Joint Cooperative Routing, MAC and Physical Layer with QoS-aware Traffic-based Scheduling for Wireless Sensor Networks
Jawad Ahmad Haqbeen, Takayuki Ito, Mohammad Arifuzzaman, Takanobu Otsuka
Pages: 164 - 175
Compare the WSN with other conventional network system, the changing or charging the existing battery of sensor node within WSN is a tough job. Therefore, since last decade the effort has been made to design and introduce a large number of communication protocol for WSN with given concern on the performance...
Research Article
One-D-R-A-G-SOM and its Application to a Hand Shape Instruction Learning System
Takashi Kuremoto, Takuhiro Otani, Shingo Mabu, Masanao Obayashi, Kunikazu Kobayashi
Pages: 166 - 174
In this paper, a novel self-organizing map (SOM) named “One-D-R-A-G-SOM” is proposed. It is a kind of one dimensional ring type growing SOM using asymmetric neighborhood function. As the topology of one dimensional ring type feature map is more suitable to increase or decrease the number of units, and...
Research Article
Efficient Keyword-Related Data Collection in a Social Network with Weighted Seed Selection
Changhyun Byun, Hyeoncheol Lee, Jongsung You, Yanggon Kim
Pages: 167 - 173
Data mining in a social network can yield interesting perspectives to understanding human behavior or detecting topics or communities. However, it is difficult to gather the data related to a specific topic due to the main characteristics of social media data: large, noisy, and dynamic. To collect the...
Research Article
Effective Management of ReRAM-based Hybrid SSD for Multiple Node HDFS
Nayoung Park, Byungjun Lee, Kyung Tae Kim, Hee Yong Youn
Pages: 167 - 176
Recently, the research of Hybrid ReRAM/MLC NAND SSD is rapidly expanding into the storage areas. Most existing researches of Hybrid SSD are based on a single storage, while the management of multiple nodes like HDFS is still immature. In this paper a new efficient cold data eviction scheme is proposed...
Research Article
SAIFU: Supporting Program Understanding by Automatic Indexing of Functionalities in Source Code
Masashi Nishimoto, Keiji Nishiyama, Hideyuki Kawabata, Tetsuo Hironaka
Pages: 167 - 174
Programs in the event-driven style that are typical of mobile and/or Web applications are becoming complex and hard to maintain. For the purpose of reducing the burden put on software developers while reading source code to understand its details, we propose a tool for supporting program understanding,...
Research Article
A Traffic Tracking Analysis Model for the Effective Management of E-commerce Transactions
Sylvanus A. Ehikioya, Shenghong Lu
Pages: 171 - 193
The increasing popularity of the Internet and e-commerce makes online merchants to constantly seek tools that would permit them to attract new and retain old customers. Traffic tracking and analysis tools can help businesses know more about their customers. These tools track visitors’ behaviors on Web...
Research Article
Paralleled Fast Search and Find of Density Peaks Clustering Algorithm on GPUs with CUDA
Mi Li, Jie Huang, Jingpeng Wang
Pages: 173 - 181
Fast Search and Find of Density Peaks (FSFDP) is a newly proposed clustering algorithm that has already been successfully applied in many applications. However, this algorithm shows a dissatisfactory performance on large dataset due to the time-consuming calculation of the distance matrix and potentials....
Research Article
Flexible WSNs Aims Easy Installation With Noise Reduce Method For Elderly People Care
Takanobu Otsuka, Takayuki Ito
Pages: 174 - 186
Much research has been conducted on anomaly detection by wireless sensor networks (WSNs). The existing WSNs require specialized knowledge and skills to install the sensors in environments such as houses and buildings. Therefore, we have developed a flexible WSN based on small sensor devices that can...
Research Article
On Design-time Modelling and Verification of Safety-critical Component-based Systems
Nermin Kajtazovic, Christopher Preschern, Andrea Höller, Christian Kreiner
Pages: 175 - 188
Component-based Software Engineering (CBSE) is currently a key paradigm used for developing safetycritical systems. It provides a fundamental means to master systems complexity, by allowing to design systems parts (i.e., components) for reuse and by allowing to develop those parts independently. One...
Research Article
A Triggered Delay-based Approach against Cache Privacy Attack in NDN
Naveen Kumar, Ashutosh Kumar Singh, Shashank Srivastava
Pages: 174 - 184
Content caching is one of the most significant features of Named Data Networking (NDN) that improves the performance. However, this feature makes the cache vulnerable to attacks that determine the recent cache access pattern. In cache privacy attack, an attacker can probe request and determine if the...
Research Article
Improve Example-Based Machine Translation Quality for Low-Resource Language Using Ontology
Khan Md Anwarus Salam, Setsuo Yamada, Nishino Tetsuro
Pages: 176 - 191
In this research we propose to use ontology to improve the performance of an EBMT system for low-resource language pair. The EBMT architecture use chunk-string templates (CSTs) and unknown word translation mechanism. CSTs consist of a chunk in source-language, a string in target-language, and word alignment...
Research Article
Load Balancing of Peer-to-Peer MMORPG Systems with Hierarchical Area-of-Interest Management
Satoshi Fujita
Pages: 177 - 184
This paper studies the load balancing problem in distributed systems designed for massively multiplayer online role-playing games (MMORPGs). More concretely, we consider a distributed system of master- worker type in which each worker is associated with a particular region in the game field, and propose...
Research Article
A Scoring Rule-based Truthful Demand Response Mechanism
Keisuke Hara, Takayuki Ito
Pages: 182 - 192
Demand Response (DR) has been extensively studied as one of the important features of smart grid. The DR strategies can be grouped into two categories, one is incentive-based DR and the other is pricing-based DR. Our work focuses on DR involving both pricing factor and incentive factor using scoring...
Research Article
Contour Completion of Partly Occluded Objects Based on Figural Goodness
Takahiro Hayashi, Tatsuya Ooi, Motoki Sasaki
Pages: 185 - 192
Object extraction has a crucial role in various visual semantic scenarios. In this paper, we propose a system for object extraction which can deal with an object partly occluded by other objects. In order to estimate the hidden part of the occluded object, the system combines different types of contour...
Research Article
Estimating Procedure for Function Point and Development Cost in South Korea
Byeongdo Kang, Jongseok Lee
Pages: 185 - 194
This paper introduces the practical guidelines for function point analysis in the Republic of Korea. Korean government recommends that Function Point Analysis should be adopted as a standard method for measuring the functional size of software. Function Point was proposed by an international organization....
Research Article
Utilizing Human-Computer Interaction Data to Extract User Interests from Web-based Learning Systems
Yücel Ugurlu
Pages: 187 - 195
We propose a novel approach by utilizing human-computer interaction data to extract user interests from web-based learning systems. The proposed approach is based on user access and a wearable context recognition system. Under our approach, a series of screen images are captured by an imaging device...
Research Article
Comparative Study of Various Wireless Sensor Network (WSN) Topology Construction Protocols
Lifford McLauchlan, Soumya Saha, Claudio Montiel, Rajab Challoo
Pages: 189 - 197
As the cost for wireless sensors and wireless sensor networks (WSNs) have decreased, they have become more ubiquitous; they are increasingly being used in many applications such as security, structural monitoring and environmental monitoring. Many WSN applications employ a random sensor deployment to...
Research Article
Burst Transmission and Frame Aggregation for VANET Communications
Wei Kuang Lai, Mei-Tso Lin, Ting-Huan Kuo
Pages: 192 - 202
In vehicular ad hoc networks (VANETs), due to highly mobile and frequently changing topology, available resources and transmission opportunities are restricted. To address this, we propose a burst transmission and frame aggregation (FAB) scheme to enhance transmission opportunity (TXOP) efficiency of...
Research Article
Using SPIN to Check Simulink Stateflow Models
Chikatoshi Yamada, D. Michael Miller
Pages: 193 - 202
Verification is critical to the design of large and complex systems. SPIN is a well-known and extensively used verification tool. In this paper, we consider two tool chains, one existing, WSAT, and one introduced here, that support using SPIN to model check systems specified as Simulink Stateflow models....
Research Article
Development of an Effective Gaze Writing System with an Interface for Text Copy and Paste
Reo Kishi, Takahiro Hayashi
Pages: 193 - 201
While many interfaces for gaze writing (text entry by eye gaze) are available today, these interfaces are just a replacement of a keyboard. For more efficient gaze writing, this paper proposes a novel gaze writing system which has two kinds of gaze writing interfaces: (1) an interface for text entry...
Research Article
A Checkpoint/Restart Scheme for CUDA Programs with Complex Computation States
Hai Jiang, Yulu Zhang, Jeff Jennes, Kuan-Ching Li
Pages: 196 - 212
Checkpoint/restart has been an effective mechanism to achieve fault tolerance for many long-running scientific applications. The common approach is to save computation states in memory and secondary storage for execution resumption. However, as the GPU plays a much bigger role in high performance computing,...
Research Article
Optimized Common Parameter Set Extraction Framework by Multiple Benchmarking Applications on a Big Data Platform
Jongyeop Kim, Abhilash Kancharla, Jongho Seol, Indy N. Park, Nohpill Park
Pages: 195 - 203
This research proposes the methodology to extract common configuration parameter set by applying multiple benchmarking applications include TeraSort, TestDFSIO, and MrBench on the Hadoop distributed file system. The parameter search space conceptually conducted named Ω(x) to hold status of all parameter...
Research Article
Improved Version of Round Robin Scheduling Algorithm Based on Analytic Model
Alaa Fiad, Zoulikha Mekkakia Maaza, Hayat Bendoukha
Pages: 195 - 202
Scheduling is one of the most important issues in the operating system, such as the tasks must be affected to the appropriate virtual machines, considering different factors at the same time to ensure better use of resources. A lot of research has been carried out to propose more efficient task scheduling...
Research Article
Fast Parallel Network Packet Filter System based on CUDA
Che-Lun Hung, Shih-Wei Guo
Pages: 198 - 210
In recent years, with the rapid development of the network hardware and software, the network speed is enhanced to multi-gigabit. Network packet filtering is an important strategy of network security to avoid malicious attacks, and it is a computation-consuming application. Therefore, we develop two...
Research Article
A Routing Algorithm Solving the Container Problem in a Hypercube with Bit Constraint
Antoine Bossard, Keiichi Kaneko
Pages: 202 - 213
As reflected by the TOP500 list, hypercubes are popular interconnection networks for massively parallel systems, the main reason being the simplicity and ease of implementation of this network topology. In order to retain performance high and avoid bottleneck situation, routing algorithms are critical...
Research Article
Recognition and Intensity Estimation of Facial Expression Using Ensemble Classifiers
Hiroki Nomiya, Shota Sakaue, Teruhisa Hochin
Pages: 203 - 211
Facial expression recognition (FER) has been widely studied since it can be used for various applications. However, most of FER techniques focus on discriminating typical facial expressions such as six basic facial expressions. Spontaneous facial expressions are not limited to such typical ones because...
Research Article
Load Experiment of the vDACS Scheme in case of the 300 Clients
Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii
Pages: 203 - 210
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data,...
Research Article
Vehicle Platooning Systems: Review, Classification and Validation Strategies
Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah
Pages: 203 - 213
This paper presents a systematic literature review of platooning systems with a special focus on the strategies which have been adopted to validate platooning algorithms. We collect the existing studies in the platooning field. The proposed algorithms are compared based on some criteria including platooning...
Research Article
Social Media Comment Management using SMOTE and Random Forest Algorithms
Nuanwan Soonthornphisaj, Taratep Sira-Aksorn, Pornchanok Suksankawanich
Pages: 204 - 209
Comment posting is one of the main features found in social media. Comment responses enrich the social network function especially for how-to content. In this work, we focus on cooking video clips which are popular among users. Various questions found in comments need to be clustered in order to facilitate...
Research Article
An Evaluation of Coding Violation Focusing on Change History and Authorship of Source File
Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara
Pages: 211 - 220
This paper focuses on an evaluation of coding violation warned by a static code analysis tool while considering the change history of violation and the authorship of source file. Through an empirical study with data collected from seven open source software projects, the following findings are reported:...
Research Article
Embedding GPU Computations in Hadoop
Jie Zhu, Hai Jiang, Juanjuan Li, Erikson Hardesty, Kuan-Ching Li, Zhongwen Li
Pages: 211 - 220
As the size of high performance applications increases, four major challenges including heterogeneity, programmability, fault resilience, and energy efficiency have arisen in the underlying distributed systems. To tackle with all of them without sacrificing performance, traditional approaches in resource...
Research Article
Extracting Children?s Behavioral Characteristics for Acquiring Language from Texts of Picture Book Reviews
Hiroshi Uehara, Mizuho Baba, Takehito Utsuro
Pages: 212 - 220
Pointing behavior in childhood is typical developmental sign having strong correlation to his or her language development. This paper focuses on the pointing behavior accompanied by utterance during picture book reading. With this respect, we make use of picture books’ review data amounting to approximately...
Research Article
The Dependability of Crypto Linked Off-chain File Systems in Backend Blockchain Analytics Engine
Jongho Seol, Abhilash Kancharla, Nicole Park, Nohpill Park, Indy Nohjin Park
Pages: 210 - 215
This paper presents ways to assure the efficacy of managing crypto links and crypto speed with respect to the dependability of blockchain. The dependability in this work is defined with reference to crypto links in a proportional manner and crypto speed in an inversely proportional manner, respectively....
Research Article
Performance Characteristics of Hybrid MPI/OpenMP Scientific Applications on a Largescale Multithreaded BlueGene/Q Supercomputer
Xingfu Wu, Valerie Taylor
Pages: 213 - 225
Many/multi-core supercomputers provide a natural programming paradigm for hybrid MPI/OpenMP scientific applications. In this paper, we investigate the performance characteristics of five hybrid MPI/OpenMP scientific applications (two NAS Parallel benchmarks Multi-Zone SP-MZ and BT-MZ, an earthquake simulation...
Research Article
An Energy Efficient Clustering Algorithm for Maximizing the Lifetime of Wireless Sensor Network
Kyung Tae Kim, Man Youn Kim, Ji Hyeon Choi, Hee Yong Youn
Pages: 214 - 223
In this paper we propose an energy efficient clustering algorithm for maximizing the lifetime of WSNs. The proposed scheme decides the cluster head based on the energy level of the nodes, while tree topology is adopted to connect the nodes inside each cluster. A new model for deciding an optimal number...
Research Article
Secure Communications by Tit-for-Tat Strategy in Vehicular Networks
Fatima Zohra Mostefa, Zoulikha Mekkakia Maaza, Claude Duvallet
Pages: 214 - 221
Secure communication is one of the main challenges of ad hoc Vehicle Networks (VANET). Intrusion detection of malicious nodes is one of the solutions to secure communication in VANETs using hybrid architecture (V2V and V2I). This article proposes an approach based on game theory, in particular the “Tit-for-Tat”...
Research Article
Tracing a Weld Line using Artificial Neural Networks
Srinath Hanumantha Rao, V. Kalaichelvi, R. Karthikeyan
Pages: 216 - 223
Robotic manipulators are becoming increasingly popular nowadays with applications in almost every industry and production line. It is difficult but essential to create a common algorithm for the different types of manipulators present in today’s market so that automation can be achieved at a faster rate....
Research Article
Frequency-specific Alterations of Functional Hub in Generalized Tonic-clonic Seizure
Zhe Zhang, Huiyan Cheng, Xuhui Chen, Chaolin Ma
Pages: 221 - 230
Resting-state functional magnetic resonance imaging (rs-fMRI) has shown aberrant brain functional networks at a conventional low-frequency range (0.01-0.08 Hz) in individuals with generalized tonic-clonic seizure (GTCS). However, it is unclear how functional networks hubs change across different frequency...
Research Article
Enabling GSD Task Allocation via Cloud-based Software Processes
Sami Alajrami, Barbara Gallina, Alexander Romanovsky
Pages: 221 - 232
Allocating tasks to distributed sites in Global Software Development (GSD) projects is often done unsystematically and based on the personal experience of project managers. Wrong allocation decisions increase the project’s risks as tasks have dependencies that are inherited by the distributed sites....
Research Article
Human Activity Recognition in WSN: A Comparative Study
Muhammad Arshad Awan, Zheng Guangbin, Cheong-Ghil Kim, Shin-Dug Kim
Pages: 221 - 230
Human activity recognition is an emerging field of ubiquitous and pervasive computing. Although recent smartphones have powerful resources, the execution of machine learning algorithms on a large amount of data is still a burden on smartphones. Three major factors including; classification algorithm,...
Research Article
Enhanced Hypervisor-based SSD Cache with Dynamic Cache Scanning and Allocation for Virtualized Cloud System
Hee Jung Park, Kyung Tae Kim, Man Yun Kim, Hee Yong Youn
Pages: 224 - 233
Recently, SSD caching is widely studied for VM-based systems. In this paper we propose a novel hypervisor-based SSD caching scheme, employing a new metric to accurately determine the demand on SSD cache space of each VM. Computer simulation confirms that it substantially improves the accuracy of cache...
Research Article
Fault Tolerant Distributed Stream Processing based on Backtracking
Qiming Chen, Meichun Hsu, Castellanos Malu
Pages: 226 - 238
Since distributed stream analytics is treated as a kind of cloud service, there exists a pressing need for its reliability and fault-tolerance, to guarantee the streaming data tuples to be processed in the order of their generation in every dataflow path, with each tuple processed once and only once....
Research Article
Improvement of the Dynamic Software Birthmark Process by Reducing the Time of the Extraction
Takanori Yokoi, Haruaki Tamada
Pages: 224 - 231
It is a quite tough task to detect the stolen programs since there is a quite huge number of programs in the world. The dynamic software birthmarks were proposed to detect the suspects of plagiarisms based on the runtime behavior of the programs. The detection process with the dynamic birthmarks is composed...
Research Article
Refinement on Data, Information and Knowledge Lifecycles towards Service Economics Planning to Services Implementation
Yucong Duan, Gongzhu Hu, Xiaobing Sun, Zhaoxin Lin, Qiang Duan
Pages: 231 - 242
Service Economics has been successfully proposed and implemented for promoting the macro service market especially in Global value chains which however don’t provide guidance to and integrate directly with the IT side implementation to achieve coherent information coordination and robust adaptability...
Research Article
An Improved Autonomous Cross-Layer Optimization Framework for Wireless Multimedia Communication in Heterogeneous Networks
Yuping Dong, C. Hwa Chang, Zengxu Yang
Pages: 231 - 240
Various cross-layer optimization schemes have been proposed for the purpose of enhancing wireless network performances. In this paper, we present an improved autonomous cross-layer optimization to fit modern heterogeneous communication networks. In our design, different Quality of Service (QoS) requirements...
Research Article
Improvement and Evaluation of Estimation of Time Series Data of Daily Life
Teruhisa Hochin, Hiroki Nomiya
Pages: 233 - 242
This paper improves the estimation of the amounts of sewage flow, which is one of daily life data, in order to manage them efficiently. The amounts of flow of a typical day are tried to be adjusted to those of a non-regular day. A typical (non-regular, respectively) day is a non-rainy day having good...
Research Article
Hybrid Approach of Ontology and Image Clustering for Automatic Generation of Hierarchic Image Database
Ryosuke Yamanishi, Ryoya Fujimoto, Yuji Iwahori, Robert J. Woodham
Pages: 234 - 242
This paper proposes a hybrid approach of ontology and image clustering to automatically generate hierarchic image database. In the field of computer vision, ”generic object recognition” is one of the most important topics. Generic object recognition needs three types of research: feature extraction,...
Research Article
Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods
Yosuke Isobe, Haruaki Tamada
Pages: 232 - 238
The Identifier Renaming Method (IRM) is a well-used obfuscation method since almost obfuscation tools use the algorithm, and easy to implement. The IRM transforms the identifier names in the programs to meaningless names in order to hard to understand. However, the evaluations against attacks such as...
Research Article
On Dynamic Multicast Traffic Provisioning with Grooming Capabilities Support in Light-Trail Networks
Ching-Fang Hsu, Tzu-Huan Tang
Pages: 239 - 250
In recent years, because of the popularity of Internet and the rapid growth of multimedia applications, the requirements of bandwidth from users increase violently in optical networks. Various multicast multimedia services also bring challenges to next generation optical networks. As the rapid advance...
Research Article
Query Integrity Verification based-on MAC Chain in Cloud Storage
Jun Hong, Tao Wen, Quan Guo, Gang Sheng
Pages: 241 - 249
In order to reduce data maintenance overhead, more and more enterprises outsource their data to the cloud storage, which provides flexible and on-demand storage service for companies. Data outsourcing also brings a lot of security problems, of which query integrity is a critical issue to be resolved....
Research Article
Minority Costume Image Retrieval by Fusion of Color Histogram and Edge Orientation Histogram
Xu-mei Shen, Ju-xiang Zhou, Tian-wei Xu
Pages: 243 - 251
It has very important practical significance to analyze and research minority costume from the perspective of computer vision for minority culture protection and inheritance. As first exploration in minority costume image retrieval, this paper proposed a novel image feature representation method to describe...
Research Article
A GPU-based Pencil Beam Algorithm for Dose Calculations in Proton Radiation Therapy
Georgios Kalantzis, Theodora Leventouri, Hidenobu Tachibana, Charles Shang
Pages: 243 - 249
Recent developments in radiation therapy have been focused on applications of charged particles, especially protons. Proton therapy can allow higher dose conformality compared to conventional radiation therapy. Over the years several dose calculation methods have been proposed in proton therapy. A common...
Research Article
Estimating and Visualizing the Time-varying Effects of a Binary Covariate on Longitudinal Big Text Data
Shizue Izumi, Tetsuji Tonda, Noriyuki Kawano, Kenichi Satoh
Pages: 243 - 253
We propose a method to estimate and visualize effects of a binary covariate on the longitudinally observed text data. Our method consists of series of analytical methods: extracting keywords through a morphological analysis, estimating the time-varying regression coefficient of a binary covariate for...
Research Article
Handover Management based on Asymmetric Nature of LTE-A HetNet using MCDM Algorithm
Xianda Chen, Young Ho Suh, Seung Wan Kim, Hee Yong Youn
Pages: 250 - 260
This paper proposes an efficient handover scheme considering the asymmetric characteristics of macro and pico cells in LTE-A HetNet. The proposed scheme detects a suitable target eNB for handover using a multi-criteria decision making algorithm and the mobility information of user equipment (UE). A prompt...