International Journal of Networked and Distributed Computing
Volume 6, Issue 4, September 2018
Research Article
1. Optimized Common Parameter Set Extraction Framework by Multiple Benchmarking Applications on a Big Data Platform
Jongyeop Kim, Abhilash Kancharla, Jongho Seol, Indy N. Park, Nohpill Park
Pages: 195 - 203
This research proposes the methodology to extract common configuration parameter set by applying multiple benchmarking applications include TeraSort, TestDFSIO, and MrBench on the Hadoop distributed file system. The parameter search space conceptually conducted named Ω(x) to hold status of all parameter...
Research Article
2. Social Media Comment Management using SMOTE and Random Forest Algorithms
Nuanwan Soonthornphisaj, Taratep Sira-Aksorn, Pornchanok Suksankawanich
Pages: 204 - 209
Comment posting is one of the main features found in social media. Comment responses enrich the social network function especially for how-to content. In this work, we focus on cooking video clips which are popular among users. Various questions found in comments need to be clustered in order to facilitate...
Research Article
3. The Dependability of Crypto Linked Off-chain File Systems in Backend Blockchain Analytics Engine
Jongho Seol, Abhilash Kancharla, Nicole Park, Nohpill Park, Indy Nohjin Park
Pages: 210 - 215
This paper presents ways to assure the efficacy of managing crypto links and crypto speed with respect to the dependability of blockchain. The dependability in this work is defined with reference to crypto links in a proportional manner and crypto speed in an inversely proportional manner, respectively....
Research Article
4. Tracing a Weld Line using Artificial Neural Networks
Srinath Hanumantha Rao, V. Kalaichelvi, R. Karthikeyan
Pages: 216 - 223
Robotic manipulators are becoming increasingly popular nowadays with applications in almost every industry and production line. It is difficult but essential to create a common algorithm for the different types of manipulators present in today’s market so that automation can be achieved at a faster rate....
Research Article
5. Improvement of the Dynamic Software Birthmark Process by Reducing the Time of the Extraction
Takanori Yokoi, Haruaki Tamada
Pages: 224 - 231
It is a quite tough task to detect the stolen programs since there is a quite huge number of programs in the world. The dynamic software birthmarks were proposed to detect the suspects of plagiarisms based on the runtime behavior of the programs. The detection process with the dynamic birthmarks is composed...
Research Article
6. Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods
Yosuke Isobe, Haruaki Tamada
Pages: 232 - 238
The Identifier Renaming Method (IRM) is a well-used obfuscation method since almost obfuscation tools use the algorithm, and easy to implement. The IRM transforms the identifier names in the programs to meaningless names in order to hard to understand. However, the evaluations against attacks such as...