International Journal of Networked and Distributed Computing
Volume 1, Issue 2, April 2013
Research Article
1. A Middleware-Based Implementation for Data Integration of Remote Devices
Xianyong Liu, Yanping Liu, Lizhuang Ma, Qing Gao
Pages: 72 - 78
Different from existing techniques3-5 that often focus on high level data integration, this paper contributes a novel solution at device level, implementing a fully scalable and configurable middleware, aiming at releasing the power of parallel processing with distributed data. It is designed as a soft-gateway...
Research Article
2. Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag
Biplob Rakshit Ray, Morshed Chowdhury, Jemal Abawajy
Pages: 79 - 88
Radio Frequency Identification (RFID) is an emerging wireless object identification technology with many potential applications such as supply chain management, personnel tracking and healthcare. However, security vulnerabilities of the RFID system have been a serious concern for its wide adoption in...
Research Article
3. Parallel Implementation of Apriori Algorithm Based on MapReduce
Ning Li, Li Zeng, Qing He, Zhongzhi Shi
Pages: 89 - 96
Searching frequent patterns in transactional databases is considered as one of the most important data mining problems and Apriori is one of the typical algorithms for this task. Developing fast and efficient algorithms that can handle large volumes of data becomes a challenging task due to the large...
Research Article
4. Modeling Performance of CSMA/CA with Retransmissions in Wireless Personal Area Networks
Zhongwei Zhang
Pages: 97 - 107
Despite the widespread uses in military, smart building, habitat monitoring, Wireless sensor networks (WSNs) just begun showing their superiority in the medical and healthcare domain. Facing same challenges as other applications, deployment of WPANs in medical domain exert many more stringent requirements,...
Research Article
5. Design and Implementation of Dynamic Hybrid Virtual Honeypot Architecture for Attack Analysis
Yonas Kibret, Wang Yong
Pages: 108 - 123
Honeypots are dedicated machines whose aim is to delay and divert attackers away from critical resources in order to study new methods and tools used by attackers. However, when looking most of current honeypot systems are statically configured and managed. They are either low interaction honeypot or...