International Journal of Networked and Distributed Computing
Volume 8, Issue 2, March 2020
Research Article
1. Comparative Study of Basic Time Domain Time-Delay Estimators for Locating Leaks in Pipelines
Vladimir A. Faerman, Valeriy S. Avramchuk
Pages: 49 - 57
The article is devoted to a survey of the known basic Time-Delay Estimation (TDE) methods in the application for detecting fluid leaks in pipeline transport and distribution systems. In the paper, both active and passive estimation methods are considered with respect to the presented generalized classification....
Research Article
2. Multimedia Analysis and Fusion via Wasserstein Barycenter
Cong Jin, Junhao Wang, Jin Wei, Lifeng Tan, Shouxun Liu, Wei Zhao, Shan Liu, Xin Lv
Pages: 58 - 66
Optimal transport distance, otherwise known as Wasserstein distance, recently has attracted attention in music signal processing and machine learning as powerful discrepancy measures for probability distributions. In this paper, we propose an ensemble approach with Wasserstein distance to integrate various...
Research Article
3. Solving MTU Mismatch and Broadcast Overhead of NDN over Link-layer Networks
Thongchai Chuachan, Karim Djemame, Somnuk Puangpronpitag
Pages: 67 - 75
Named Data Networking (NDN) has been considered as a promising Internet architecture for the future data-centric communication. In particular, NDN over link-layer networks would cut off the overheads of Transmission Control Protocol/Internet Protocol (TCP/IP), and enhance the efficiency of data distribution....
Research Article
4. Empirical Research on the Growth Path of China’s Industrial Economy under the Background of Supply-side Reform
Xianhong Xu
Pages: 76 - 85
Supply-side reform has provided opportunities for China’s industrial economic growth, but also experienced unprecedented challenges. Based on the background of supply-side reform, this paper applies the supply-side theory. First, it explores the mechanism between industrial overcapacity and economic...
Research Article
5. Analysis of Features Dataset for DDoS Detection by using ASVM Method on Software Defined Networking
Myo Myint Oo, Sinchai Kamolphiwong, Thossaporn Kamolphiwong, Sangsuree Vasupongayya
Pages: 86 - 93
The impact of Distributed Denial of Service (DDoS) attack is one of the major concerns for Software Defined Networking (SDN) environments. Support Vector Machine (SVM) has been used in a DDoS attack detection mechanism on SDN. The advantages of SVM algorithms in DDoS attack detections are high accuracy...
Research Article
6. Compositional Stochastic Model Checking Probabilistic Automata via Assume-guarantee Reasoning
Yang Liu, Rui Li
Pages: 94 - 107
Stochastic model checking is the extension and generalization of the classical model checking. Compared with classical model checking, stochastic model checking faces more severe state explosion problem, because it combines classical model checking algorithms and numerical methods for calculating probabilities....
Research Article
7. MLP and CNN-based Classification of Points of Interest in Side-channel Attacks
Hanwen Feng, Weiguo Lin, Wenqian Shang, Jianxiang Cao, Wei Huang
Pages: 108 - 117
A trace contains sample points, some of which contain useful information that can be used to obtain a key in side-channel attacks. We used public datasets from the ANSSI SCA Database (ASCAD) as well as SM4 traces to learn whether a trace consisting of Points of Interest (POIs) have a positive effect...