International Journal of Networked and Distributed Computing

Latest Articles

Research Article

Vehicle Platooning Systems: Review, Classification and Validation Strategies

Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah
In Press, Uncorrected Proof, Available Online: 4 September 2020
This paper presents a systematic literature review of platooning systems with a special focus on the strategies which have been adopted to validate platooning algorithms. We collect the existing studies in the platooning field. The proposed algorithms are compared based on some criteria including platooning...
Research Article

Improved Version of Round Robin Scheduling Algorithm Based on Analytic Model

Zoulikha Mekkakia Maaza, Zoulikha Mekkakia Maaza, Alaa Fiad, Hayat Bendoukha, Hayat Bendoukha, Zoulikha Mekkakia Maaza, Hayat Bendoukha
In Press, Corrected Proof, Available Online: 12 August 2020
Scheduling is one of the most important issues in the operating system, such as the tasks must be affected to the appropriate virtual machines, considering different factors at the same time to ensure better use of resources. A lot of research has been carried out to propose more efficient task scheduling...
Research Article

On Learning Associative Relationship Memory among Knowledge Concepts

Zhenping Xie, Kun Wang, Yuan Liu
Volume 8, Issue 3, June 2020, Pages 124-130
A high-level associative memory modelling method was developed to explore the realization of associative memory. In the proposed method, two stage procedures are progressively performed to construct a unified associative knowledge network. In the first stage, some direct weighted associative links are...
Research Article

A Traffic Tracking Analysis Model for the Effective Management of E-commerce Transactions

Sylvanus A. Ehikioya, Shenghong Lu
Volume 8, Issue 3, June 2020, Pages 171-193
The increasing popularity of the Internet and e-commerce makes online merchants to constantly seek tools that would permit them to attract new and retain old customers. Traffic tracking and analysis tools can help businesses know more about their customers. These tools track visitors’ behaviors on Web...
Research Article

High Performance Hadoop Distributed File System

Mohamed Elkawkagy, Heba Elbeh
Volume 8, Issue 3, June 2020, Pages 119-123
Although by the end of 2020, most of companies will be running 1000 node Hadoop in the system, the Hadoop implementation is still accompanied by many challenges like security, fault tolerance, flexibility. Hadoop is a software paradigm that handles big data, and it has a distributed file systems so-called...
Research Article

Towards a Task and Resource Aware Task Scheduling in Cloud Computing: An Experimental Comparative Evaluation

Muhammad Ibrahim, Said Nabi, Abdullah Baz, Nasir Naveed, Hosam Alhakami
Volume 8, Issue 3, June 2020, Pages 131-138
Cloud computing has been considered as one of the large-scale platforms that support various type of services including compute, storage, compute, and analytic to the users and organizations with high agility, scalability, and resiliency intact. The users of the Cloud are increasing at an enormous rate...
Research Article

Performance Analysis of Blockchain-based Access Control Model for Personal Health Record System with Architectural Modelling and Simulation

Thein Than Thwin, Sangsuree Vasupongayya
Volume 8, Issue 3, June 2020, Pages 139-151
The Personal Health Record (PHR) could be seen as a preventive care solution to the incoming aging society. The blockchain-based PHR system has been proposed recently to enhance the security and privacy for the PHR data. Consequently, the performance becomes a concern for blockchain-PHR integration because...
Research Article

Enhancing Case-based Reasoning Approach using Incremental Learning Model for Automatic Adaptation of Classifiers in Mobile Phishing Detection

San Kyaw Zaw, Sangsuree Vasupongayya
Volume 8, Issue 3, June 2020, Pages 152-161
This article presents the threshold-based incremental learning model for a case-base updating approach that can support adaptive detection and incremental learning of Case-based Reasoning (CBR)-based automatic adaptable phishing detection. The CBR-based adaptive phishing detection model detects the phishing...
Research Article

Research on Intelligent Question and Answering Based on a Pet Knowledge Map

Yuan Liu, Wen Zhang, Qi Yuan, Jie Zhang
Volume 8, Issue 3, June 2020, Pages 162-170
This paper proposes a framework for constructing pet knowledge maps. The schema concept layer is designed and built top-down, and the data layer is constructed from knowledge extracted from semi-structured and unstructured data. In the aspect of entity extraction of unstructured data, a symptom-named...
Research Article

MLP and CNN-based Classification of Points of Interest in Side-channel Attacks

Hanwen Feng, Weiguo Lin, Wenqian Shang, Jianxiang Cao, Wei Huang
Volume 8, Issue 2, March 2020, Pages 108-117
A trace contains sample points, some of which contain useful information that can be used to obtain a key in side-channel attacks. We used public datasets from the ANSSI SCA Database (ASCAD) as well as SM4 traces to learn whether a trace consisting of Points of Interest (POIs) have a positive effect...
Research Article

Compositional Stochastic Model Checking Probabilistic Automata via Assume-guarantee Reasoning

Yang Liu, Rui Li
Volume 8, Issue 2, March 2020, Pages 94-107
Stochastic model checking is the extension and generalization of the classical model checking. Compared with classical model checking, stochastic model checking faces more severe state explosion problem, because it combines classical model checking algorithms and numerical methods for calculating probabilities....
Research Article

Analysis of Features Dataset for DDoS Detection by using ASVM Method on Software Defined Networking

Myo Myint Oo, Sinchai Kamolphiwong, Thossaporn Kamolphiwong, Sangsuree Vasupongayya
Volume 8, Issue 2, March 2020, Pages 86-93
The impact of Distributed Denial of Service (DDoS) attack is one of the major concerns for Software Defined Networking (SDN) environments. Support Vector Machine (SVM) has been used in a DDoS attack detection mechanism on SDN. The advantages of SVM algorithms in DDoS attack detections are high accuracy...
Research Article

Comparative Study of Basic Time Domain Time-Delay Estimators for Locating Leaks in Pipelines

Vladimir A. Faerman, Valeriy S. Avramchuk
Volume 8, Issue 2, March 2020, Pages 49-57
The article is devoted to a survey of the known basic Time-Delay Estimation (TDE) methods in the application for detecting fluid leaks in pipeline transport and distribution systems. In the paper, both active and passive estimation methods are considered with respect to the presented generalized classification....
Research Article

Solving MTU Mismatch and Broadcast Overhead of NDN over Link-layer Networks

Thongchai Chuachan, Karim Djemame, Somnuk Puangpronpitag
Volume 8, Issue 2, March 2020, Pages 67-75
Named Data Networking (NDN) has been considered as a promising Internet architecture for the future data-centric communication. In particular, NDN over link-layer networks would cut off the overheads of Transmission Control Protocol/Internet Protocol (TCP/IP), and enhance the efficiency of data distribution....
Research Article

Multimedia Analysis and Fusion via Wasserstein Barycenter

Cong Jin, Junhao Wang, Jin Wei, Lifeng Tan, Shouxun Liu, Wei Zhao, Shan Liu, Xin Lv
Volume 8, Issue 2, March 2020, Pages 58-66
Optimal transport distance, otherwise known as Wasserstein distance, recently has attracted attention in music signal processing and machine learning as powerful discrepancy measures for probability distributions. In this paper, we propose an ensemble approach with Wasserstein distance to integrate various...
Research Article

Empirical Research on the Growth Path of China’s Industrial Economy under the Background of Supply-side Reform

Xianhong Xu
Volume 8, Issue 2, March 2020, Pages 76-85
Supply-side reform has provided opportunities for China’s industrial economic growth, but also experienced unprecedented challenges. Based on the background of supply-side reform, this paper applies the supply-side theory. First, it explores the mechanism between industrial overcapacity and economic...
Research Article

Machine Learning in Failure Regions Detection and Parameters Analysis

Saeed Abdel Wahab, Reem El Adawi, Ahmed Khater
Volume 8, Issue 1, December 2019, Pages 41-48
Testing automation is one of the challenges facing the software development industry, especially for large complex products. This paper proposes a mechanism called Multi Stage Failure Detector (MSFD) for automating black box testing using different machine learning algorithms. The input to MSFD is the...
Research Article

Proposal and Prototype of DNS Server Firewall with Flexible Response Control Mechanism

Hideo Masuda, Shun Segawa, Masayuki Mori
Volume 8, Issue 1, December 2019, Pages 34-40
Domain Name System (DNS) is an important system for the Internet communication. DNS is a system for distributed management and operation of domain names, and it is possible to associate with the resources such as IP address, instruct the destination host of the e-mail, and so on. On the one hand, it...
Research Article

Multi-Dimensional Indexing System Considering Distributions of Sub-indexes and Data

Kazuto Nakanishi, Teruhisa Hochin, Hiroki Nomiya, Hiroaki Hirata
Volume 8, Issue 1, December 2019, Pages 25-33
This paper experimentally evaluates the parallel multi-dimensional indexing system indexing data by using several multi-dimensional indexes and retrieving required data from them in parallel. A constant number of data are indexed into a sub-index. The sub-index is inserted into an index in a computational...
Research Article

Enhancement of Copper Wire Lengthening Automatic System using Contactless Heater

Hsiung-Cheng Lin, Jhih-Yao Hu, Chung-Hao Cheng
Volume 8, Issue 1, December 2019, Pages 9-15
Copper wire can be elongated to a very thin size like 0.01 mm from an original 0.6 mm via wire drawing dies. Although automatic machines are available for wire elongating process, the wire threading through dies still requires a human operation before entering an automation process. This procedure may...
Research Article

Toward Affordable and Practical Home Context Recognition: –Framework and Implementation with Image-based Cognitive API–

Sinan Chen, Sachio Saiki, Masahide Nakamura
Volume 8, Issue 1, December 2019, Pages 16-24
To provide affordable context recognition for general households, this paper presents a novel technique that integrate image-based cognitive Application Program Interface (API) and light-weight machine learning. Our key idea is to regard every image as a document by exploiting “tags” derived by the API....
Research Article

Performance Evaluation of Data Migration Policies for a Distributed Storage System with Dynamic Tiering

Atsushi Nunome, Hiroaki Hirata
Volume 8, Issue 1, December 2019, Pages 1-8
We have proposed a distributed storage system which autonomously migrates data blocks into a suitable storage node by considering their access frequency and read/write ratio. In this paper, we show that revised data migration policies can rapidly distribute input/output (I/O) hot spot over the storage...
Research Article

SAIFU: Supporting Program Understanding by Automatic Indexing of Functionalities in Source Code

Masashi Nishimoto, Keiji Nishiyama, Hideyuki Kawabata, Tetsuo Hironaka
Volume 7, Issue 4, September 2019, Pages 167-174
Programs in the event-driven style that are typical of mobile and/or Web applications are becoming complex and hard to maintain. For the purpose of reducing the burden put on software developers while reading source code to understand its details, we propose a tool for supporting program understanding,...
Research Article

Transitional Method for Identifying Improvements in Video Distribution Services

Motoi Iwashita
Volume 7, Issue 4, September 2019, Pages 141-148
Customer satisfaction is an indicator that is generally utilized to improve goods/services for customer retention. Therefore, companies should understand the changes in customers’ perception of their goods/services and decide improvements. Therefore, a transitional evaluation approach is needed for goods/services...
Research Article

A Secure and Scalable Data Source for Emergency Medical Care using Blockchain Technology

Shirin Hasavari, Yeong-Tae Song
Volume 7, Issue 4, September 2019, Pages 158-166
A relationship exists between the emergency patient death rate and factors such as the failure to access a patient’s critical data and the time it takes to arrive at hospitals. The ability for Paramedics to access a patient’s complete picture of emergency-relevant medical data is critical and can significantly...