International Journal of Networked and Distributed Computing

Volume 2, Issue 3, August 2014
Research Article

2. Padding Free Bank Conflict Resolution for CUDA-Based Matrix Transpose Algorithm

Ayaz ul Hassan Khan Khan, Mayez Al-Mouhamed, Allam Fatayer, Anas Almousa, Abdulrahman Baqais, Mohammed Assayony
Pages: 124 - 134
The advances of Graphic Processing Units (GPU) technology and the introduction of CUDA programming model facilitates developing new solutions for sparse and dense linear algebra solvers. Matrix Transpose is an important linear algebra procedure that has deep impact in various computational science and...
Research Article

3. Test Image Generation using Segmental Symbolic Evaluation

Tahir Jameel, Mengxiang Lin
Pages: 135 - 147
Image processing applications have played a vital role in modern life and they are required to be well tested due to their significance and human dependence on them. Testing of image processing application is difficult due to complex nature of images in terms of their generation and evaluation. The presented...
Research Article

4. Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree)

Lifford McLauchlan, Soumya Saha, Rajab Challoo
Pages: 148 - 155
Wireless Sensors Networks (WSNs) are utilized in many diverse applications ranging from security, environmental monitoring, landslide detection, patient monitoring, reconnaissance operations, structural health monitoring and smart buildings. Since in many applications the WSN nodes are randomly deployed,...
Research Article

5. Efficient Security and Privacy Protection for Emerging Smart RFID Communications

Mohammad Fal Sadikin, Marcel Kyas
Pages: 156 - 165
Due to its constrained nature, the use of smart RFID technology introduces tremendous security and privacy issues. This paper presents IMAKA-Tate: Identity protection, Mutual Authentication and Key Agreement using Tate pairing of Identity-based Encryption method. It is designed to tackle various challenges...
Research Article

6. One-D-R-A-G-SOM and its Application to a Hand Shape Instruction Learning System

Takashi Kuremoto, Takuhiro Otani, Shingo Mabu, Masanao Obayashi, Kunikazu Kobayashi
Pages: 166 - 174
In this paper, a novel self-organizing map (SOM) named “One-D-R-A-G-SOM” is proposed. It is a kind of one dimensional ring type growing SOM using asymmetric neighborhood function. As the topology of one dimensional ring type feature map is more suitable to increase or decrease the number of units, and...
Research Article

7. On Design-time Modelling and Verification of Safety-critical Component-based Systems

Nermin Kajtazovic, Christopher Preschern, Andrea Höller, Christian Kreiner
Pages: 175 - 188
Component-based Software Engineering (CBSE) is currently a key paradigm used for developing safetycritical systems. It provides a fundamental means to master systems complexity, by allowing to design systems parts (i.e., components) for reuse and by allowing to develop those parts independently. One...
Research Article

8. Comparative Study of Various Wireless Sensor Network (WSN) Topology Construction Protocols

Lifford McLauchlan, Soumya Saha, Claudio Montiel, Rajab Challoo
Pages: 189 - 197
As the cost for wireless sensors and wireless sensor networks (WSNs) have decreased, they have become more ubiquitous; they are increasingly being used in many applications such as security, structural monitoring and environmental monitoring. Many WSN applications employ a random sensor deployment to...