International Journal of Networked and Distributed Computing
Ikram Cherifi, Zoulikha Mekkakia Maaza
Volume 9, Issue 2-3, July 2021, Pages 94-104
Link failure cause packet loss, increased delays, disconnection from the network or even the shutdown of the inter-vehicle communication system vehicle-to-vehicle. Routing protocols suffer from this situation due to the lack of fault tolerance mechanisms that are intended to make the vehicular ad hoc...
Tejaswini Goli, Yoohwan Kim
Volume 9, Issue 2-3, July 2021, Pages 75-85
The rapid growth of Internet-of-Things (IoT) devices and the large network of interconnected devices pose new security challenges and privacy threats that would put those devices at high risk and cause harm to the affiliated users. This paper emphasizes such potential security challenges and proposes...
Alex Hoffman, Phillipe Austria, Chol Hyun Park, Yoohwan Kim
Volume 9, Issue 2-3, July 2021, Pages 86-93
Bug Bounty Programs (BBPs) play an important role in providing and maintaining security in software applications. These programs allow testers to discover and resolve bugs before the general public is aware of them, preventing incidents of widespread abuse. However, they have shown problems such as organizations...
Khaled Matrouk, Kholoud Alatoun
Volume 9, Issue 1, January 2021, Pages 59-74
Over the last recent years, applications related to the internet of things have become the most important techniques in the world that facilitate interactions among humans and things to enhance the quality of life. So, the number of devices used in these applications will increase, leading to the creation...
Gokou Hervé Fabrice Diédié, Boko Aka, Michel Babri
Volume 9, Issue 1, January 2021, Pages 33-51
Over the course of operation, a wireless sensor network can experience failures that are detrimental to the underlying application’s objectives. In this paper, we address the problem of restoring coverage ratio of a damaged area (hole) using only the neighboring nodes. Most existing solutions fail to...
Volume 9, Issue 1, January 2021, Pages 52-58
We are experiencing the true dawn of an Internet of Things society, in which all things are connected to the Internet. While this enables us to receive a wide variety of useful services via the Internet, we cannot ignore the fact that this means the number of devices targeted for Internet attacks has...
The Performance Evaluation of Continuous Speech Recognition Based on Korean Phonological Rules of Cloud-Based Speech Recognition Open API
Hyun Jae Yoo, Sungwoong Seo, Sun Woo Im, Gwang Yong Gim
Volume 9, Issue 1, January 2021, Pages 10-18
This study compared and analyzed the speech recognition performance of Korean phonological rules for cloud-based Open APIs, and analyzed the speech recognition characteristics of Korean phonological rules. As a result of the experiment, Kakao and MS showed good performance in speech recognition. By phonological...
Myung Hwa Kim, Ju Hyung Kim, Kyoungjin Lee, Gwang-Yong Gim
Volume 9, Issue 1, January 2021, Pages 19-24
As COVID-19 enters the pandemic stage, the resulting infections, deaths and economic shocks are emerging. To minimize anxiety and uncertainty about socio-economic damage caused by the COVID-19 pandemic, it is necessary to reasonably predict the economic impact of future disease trends by scientific means....
Si Young Lee, Sae Yong Oh, Sangwook Lee, Gwang Yong Gim
Volume 9, Issue 1, January 2021, Pages 1-9
The determination of the firm life cycle has been carried out in relation to the establishment of corporate strategy in the field of accounting or management. The life cycle prediction based on financial information is long because it is determined based on the financial performance of the entity over...
Si Thin Nguyen, Hyun Young Kwak, Si Young Lee, Gwang Yong Gim
Volume 9, Issue 1, January 2021, Pages 25-32
Beside cold-start and sparsity, developing incremental algorithms emerge as interesting research to recommendation system in real-data environment. While hybrid system research is insufficient due to the complexity in combining various source of each single such as content-based or collaboration filtering,...
Fatima Zohra Mostefa, Zoulikha Mekkakia Maaza, Claude Duvallet
Volume 8, Issue 4, October 2020, Pages 214-221
Secure communication is one of the main challenges of ad hoc Vehicle Networks (VANET). Intrusion detection of malicious nodes is one of the solutions to secure communication in VANETs using hybrid architecture (V2V and V2I). This article proposes an approach based on game theory, in particular the “Tit-for-Tat”...
Faten Fakhfakh, Mohamed Tounsi, Mohamed Mosbah
Volume 8, Issue 4, October 2020, Pages 203-213
This paper presents a systematic literature review of platooning systems with a special focus on the strategies which have been adopted to validate platooning algorithms. We collect the existing studies in the platooning field. The proposed algorithms are compared based on some criteria including platooning...
Alaa Fiad, Zoulikha Mekkakia Maaza, Hayat Bendoukha
Volume 8, Issue 4, October 2020, Pages 195-202
Scheduling is one of the most important issues in the operating system, such as the tasks must be affected to the appropriate virtual machines, considering different factors at the same time to ensure better use of resources. A lot of research has been carried out to propose more efficient task scheduling...
Zhenping Xie, Kun Wang, Yuan Liu
Volume 8, Issue 3, June 2020, Pages 124-130
A high-level associative memory modelling method was developed to explore the realization of associative memory. In the proposed method, two stage procedures are progressively performed to construct a unified associative knowledge network. In the first stage, some direct weighted associative links are...
Sylvanus A. Ehikioya, Shenghong Lu
Volume 8, Issue 3, June 2020, Pages 171-193
The increasing popularity of the Internet and e-commerce makes online merchants to constantly seek tools that would permit them to attract new and retain old customers. Traffic tracking and analysis tools can help businesses know more about their customers. These tools track visitors’ behaviors on Web...
Mohamed Elkawkagy, Heba Elbeh
Volume 8, Issue 3, June 2020, Pages 119-123
Although by the end of 2020, most of companies will be running 1000 node Hadoop in the system, the Hadoop implementation is still accompanied by many challenges like security, fault tolerance, flexibility. Hadoop is a software paradigm that handles big data, and it has a distributed file systems so-called...
Towards a Task and Resource Aware Task Scheduling in Cloud Computing: An Experimental Comparative Evaluation
Muhammad Ibrahim, Said Nabi, Abdullah Baz, Nasir Naveed, Hosam Alhakami
Volume 8, Issue 3, June 2020, Pages 131-138
Cloud computing has been considered as one of the large-scale platforms that support various type of services including compute, storage, compute, and analytic to the users and organizations with high agility, scalability, and resiliency intact. The users of the Cloud are increasing at an enormous rate...
Performance Analysis of Blockchain-based Access Control Model for Personal Health Record System with Architectural Modelling and Simulation
Thein Than Thwin, Sangsuree Vasupongayya
Volume 8, Issue 3, June 2020, Pages 139-151
The Personal Health Record (PHR) could be seen as a preventive care solution to the incoming aging society. The blockchain-based PHR system has been proposed recently to enhance the security and privacy for the PHR data. Consequently, the performance becomes a concern for blockchain-PHR integration because...
Enhancing Case-based Reasoning Approach using Incremental Learning Model for Automatic Adaptation of Classifiers in Mobile Phishing Detection
San Kyaw Zaw, Sangsuree Vasupongayya
Volume 8, Issue 3, June 2020, Pages 152-161
This article presents the threshold-based incremental learning model for a case-base updating approach that can support adaptive detection and incremental learning of Case-based Reasoning (CBR)-based automatic adaptable phishing detection. The CBR-based adaptive phishing detection model detects the phishing...
Yuan Liu, Wen Zhang, Qi Yuan, Jie Zhang
Volume 8, Issue 3, June 2020, Pages 162-170
This paper proposes a framework for constructing pet knowledge maps. The schema concept layer is designed and built top-down, and the data layer is constructed from knowledge extracted from semi-structured and unstructured data. In the aspect of entity extraction of unstructured data, a symptom-named...
Hanwen Feng, Weiguo Lin, Wenqian Shang, Jianxiang Cao, Wei Huang
Volume 8, Issue 2, March 2020, Pages 108-117
A trace contains sample points, some of which contain useful information that can be used to obtain a key in side-channel attacks. We used public datasets from the ANSSI SCA Database (ASCAD) as well as SM4 traces to learn whether a trace consisting of Points of Interest (POIs) have a positive effect...
Yang Liu, Rui Li
Volume 8, Issue 2, March 2020, Pages 94-107
Stochastic model checking is the extension and generalization of the classical model checking. Compared with classical model checking, stochastic model checking faces more severe state explosion problem, because it combines classical model checking algorithms and numerical methods for calculating probabilities....
Myo Myint Oo, Sinchai Kamolphiwong, Thossaporn Kamolphiwong, Sangsuree Vasupongayya
Volume 8, Issue 2, March 2020, Pages 86-93
The impact of Distributed Denial of Service (DDoS) attack is one of the major concerns for Software Defined Networking (SDN) environments. Support Vector Machine (SVM) has been used in a DDoS attack detection mechanism on SDN. The advantages of SVM algorithms in DDoS attack detections are high accuracy...
Vladimir A. Faerman, Valeriy S. Avramchuk
Volume 8, Issue 2, March 2020, Pages 49-57
The article is devoted to a survey of the known basic Time-Delay Estimation (TDE) methods in the application for detecting fluid leaks in pipeline transport and distribution systems. In the paper, both active and passive estimation methods are considered with respect to the presented generalized classification....
Thongchai Chuachan, Karim Djemame, Somnuk Puangpronpitag
Volume 8, Issue 2, March 2020, Pages 67-75
Named Data Networking (NDN) has been considered as a promising Internet architecture for the future data-centric communication. In particular, NDN over link-layer networks would cut off the overheads of Transmission Control Protocol/Internet Protocol (TCP/IP), and enhance the efficiency of data distribution....