Saleh Ahmed, Annisa, Asif Zaman, Zhan Zhang, K. R. Alam, Y. Morimoto
{"title":"Semi-Order Preserving Encryption Technique for Numeric Database","authors":"Saleh Ahmed, Annisa, Asif Zaman, Zhan Zhang, K. R. Alam, Y. Morimoto","doi":"10.15803/IJNC.9.1_111","DOIUrl":"https://doi.org/10.15803/IJNC.9.1_111","url":null,"abstract":"Order preserving encryption techniques are treated as some of the most efficient encryption schemes for securing numeric data in a database. Such schemes are popular because they resolve performance degradation issues, which are significant problems in database encryption. However, in some applications, the order itself is sensitive information, and should be hidden. Conventional order preserving encryption techniques published so far, did not consider this issue. Therefore, in this study, we consider three techniques that protect the order information and also show good performance. The three methods hide the data order such that comparison operators can be handled efficiently and performance degradation can be prevented. Our methods work on the top of an order preserving encryption scheme and enhance the security of data. Experimental results demonstrate the efficiency and effectiveness of the proposed three methods.","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"427 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126721579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Chen, Liang Hong, Sudeep Bhattarai, Tony Sanchez, Ebholo Ijieh, Stacie Severyn, Leonard E. Lightfoot
{"title":"Joint design of cooperative protocols and distributed beamforming for multi-hop cognitive radio networks","authors":"Wei Chen, Liang Hong, Sudeep Bhattarai, Tony Sanchez, Ebholo Ijieh, Stacie Severyn, Leonard E. Lightfoot","doi":"10.15803/IJNC.9.1_53","DOIUrl":"https://doi.org/10.15803/IJNC.9.1_53","url":null,"abstract":"The increasingly crowded wireless spectrum has led to the need of new paradigms in wireless communications and the cognitive radio techniques that can offer promising solutions to the spectrum scarcity. In cognitive radio networks licensed primary users and unlicensed secondary users are allowed to coexist in the same frequency spectrum. Beamforming and MIMO technology can be used to minimize the interference from the secondary users to the primary users while improving the quality of communications when each node is equipped with multiple antennas to form an antenna array. However, equipping multiple antennas at each radio node is not feasible in many applications. In this paper, we consider the radio network with single antenna at each node. We first propose a cooperative network architecture in the network layer. The architecture consists of cooperative clusters used for distributed beamforming, and a routing backbone of the clusters that can avoid the interference to the primary users in the relay route. Distributed algorithms are designed for self-formation of the cooperative clusters and routing backbone. Then we propose a computationally efficient secondary users selection scheme in the link layer for the communications between two cooperative clusters while minimizing the interference to the primary users. The simulation results show that the proposed protocols and algorithms are effective and efficient in terms of time and energy.","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126635271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Shared Memory Parallel Block Streaming Model for Irregular Applications","authors":"A. Zope, E. Luke","doi":"10.15803/IJNC.9.1_70","DOIUrl":"https://doi.org/10.15803/IJNC.9.1_70","url":null,"abstract":"Due to worsening machine balance, a lightweight irregular application can utilize only a small fraction of the peak computational capacity on modern processors. Performance of such an application is also unpredictable due to the scattered data accesses. Even though architectural features such as a cache system, hardware prefetchers etc., that reduce the cost of irregular access, are commonly found in most of the modern processors, their design parameters differ widely from one processor to another. Therefore, a performance improving programming technique still needs extensive tuning to gain maximum benefit on a target processor. In this scenario, achieving portable performance becomes difficult. This work proposes a block streaming machine model and hypothesizes that an algorithm based on the model has predictable execution time. To enable adaptation of this model for irregular applications, we also provide algorithmic transformations that can be used to replace the scattered accesses with streaming accesses in a cost predictable way. Further, we experimentally demonstrate usefulness of the model and the transformations for static lightweight irregular computations such as those performed by a numerical partial differential equation solver on modern multicore processors.","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125915929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An asynchronous P system with branch and bound for solving the satisfiability problem","authors":"Yuki Jimen, A. Fujiwara","doi":"10.15803/IJNC.8.2_141","DOIUrl":"https://doi.org/10.15803/IJNC.8.2_141","url":null,"abstract":"Membrane computing, which is a computational model based on cell activity, has considerable attention as one of new paradigms of computations. In the general membrane computing, computationally hard problems have been solved in a polynomial number of steps using an exponential number of membranes. However, reduction of the number of membranes must be considered to make P system more realistic model. In the paper, we propose an asynchronous P system with branch and bound, which is a well known optimization technique, to reduce the number of membranes. The proposed P system solves the satisfiability problem (SAT) with n variables and m clauses, and works in O ( m 2^ n )$ sequential steps or O ( mn ) parallel steps. In addition, the number of membranes used in the proposed P system is evaluated using a computational simulation. The experimental result shows validity and efficiency of the proposed P system.","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122694309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fire Simulation in 3D Computer Animation with Turbulence Dynamics including Fire Separation and Profile Modeling","authors":"Jozef Hladky, R. Durikovic","doi":"10.15803/IJNC.8.2_186","DOIUrl":"https://doi.org/10.15803/IJNC.8.2_186","url":null,"abstract":"In this paper, we propose a system for modeling fire dynamics with emphasis on realistic behavior as well as the extensive behavioral control system. We propose a wide range of parametric and procedural controls. Simulation of flame spread, and motion is governed using differential equations which takes into account wind forces, buoyancy forces, diffusion and velocity of the burning surface. We propose to enhance the realistic behavior by using stochastic simulation of flickering and buoyant diffusion. The proposed wind fields serve as added fire motion control by a user. Flame behavior covers moving sources, flickering, fire separation and fire merging.","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116247970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Suppression of performance degradation in traveling direction estimation by using IMU and PCA for PDR","authors":"M. Fujii, Yuya Sakuma","doi":"10.15803/IJNC.8.2_328","DOIUrl":"https://doi.org/10.15803/IJNC.8.2_328","url":null,"abstract":"In this paper, we propose a new method to estimate a traveling direction for a pedestrian with a smart phone by using the Inertial Measurement Unit (IMU) and principal component analysis (PCA). Our estimator does not restrict a holding status of the smart phone. It is possible to estimate an attitude of the smart phone based on the IMU filter which makes use of values from sensors embedded in itself. We estimate a traveling direction of the pedestrian based on the PCA by using the output of the filter. However, this method essentially includes an indeterminacy problem which allows a direction reversal because the component of the PCA is non-directed graph. In this paper, we investigate a modified traveling direction estimation method in order to suppress a performance degradation caused by this problem. From experimental results, we show that the proposed estimator outperforms the conventional one.","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130248793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Representation for Right-to-Left Parallel Scalar and Multi-Scalar Point Multiplication","authors":"Kittiphon Phalakarn, Kittiphop Phalakarn, Vorapong Suppakitpaisarn","doi":"10.15803/IJNC.8.2_166","DOIUrl":"https://doi.org/10.15803/IJNC.8.2_166","url":null,"abstract":"This paper introduces an optimal representation for a right-to-left parallel elliptic curve scalar point multiplication. The right-to-left approach is easier to parallelize than the conventional left-to-right approach. However, unlike the left-to-right approach, there is still no work considering number representations for the right-to-left parallel calculation. By simplifying the implementation by Robert, we devise a mathematical model to capture the computation time of the calculation. Then, for any arbitrary amount of doubling time and addition time, we propose algorithms to generate representations which minimize the time in that model. As a result, we can show a negative result that a conventional representation like NAF is almost optimal. The parallel computation time obtained from any representation cannot be better than NAF by more than 1%. In addition to that, we devise a time model and propose an algorithm to generate optimal representations for multi-scalar point multiplication (under a condition). Similar to the result of scalar point multiplication, NAF is almost optimal also for multi-scalar point multiplication as the difference of parallel computation time obtained from optimal representation and NAF is less than 1% in all experimental settings.","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131015137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HDR Image Processing from Embedded Cell Phone Camera","authors":"A. Mihalik, Pavol Kunovsky, R. Durikovic","doi":"10.15803/IJNC.8.2_205","DOIUrl":"https://doi.org/10.15803/IJNC.8.2_205","url":null,"abstract":"In photo-realistic image synthesis the incoming light from the environment is particularly important. In this work we focus on capturing the incoming light in the form of the radiance map using a common mobile device. This involves the reconstruction of the spherical panorama sky-dome in high dynamic range (HDR) quality and save it to a usable data format. Our setup requires a common smartphone devices with an additional fish-eye lens attached to the camera. In this paper we discuss the calibration of our setup and the implementation of selected tone mapping operator (TMO) allowing satisfactory display of HDR images on the mobile device screen. Built-in cameras on mobile devices do not generally capture the HDR image. In this work, we describe an algorithm for capturing an HDR image on the Android platform. Using an optimization method we are able to acquire the camera response curve needed in the reconstruction of the HDR image from multiple snapshots. Subsequent HDR panoramas represent radiance sphere-maps of the incoming light from an environment. These radiance sphere-maps are useful in realistic image synthesis to illuminate the objects in the 3D scenes.","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"762 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122996945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuta Hashimoto, Md. Al-Amin Khandaker, Yuta Kodera, Taehwan Park, Takuya Kusaka, Howon Kim, Y. Nogami
{"title":"An Implementation of ECC with Twisted Montgomery Curve over 32nd Degree Tower Field on Arduino Uno","authors":"Yuta Hashimoto, Md. Al-Amin Khandaker, Yuta Kodera, Taehwan Park, Takuya Kusaka, Howon Kim, Y. Nogami","doi":"10.15803/IJNC.8.2_341","DOIUrl":"https://doi.org/10.15803/IJNC.8.2_341","url":null,"abstract":"The security of Internet of Things (IoT) devices is one of the most important problems to be addressed by the cryptographers and security engineers. The processing ability of IoT devices is limited, therefore light-weight and secure cryptographic tools are necessary for security of them. This paper shows the implementation of 256-bit Elliptic Curve Cryptography (ECC) on an 8-bit microcontroller. The proposed implementation applies towering technique for extension field of degree 32 with a certain 8-bit prime characteristic instead of the 256-bit prime characteristic. It enables to execute 256-bit ECC operations without complicated multiple-precision arithmetic on small computers like 8-bit microcontrollers. This approach efficiently realizes the scalability of the ECC encryption strength. In addition, the authors use a twisted Montgomery curve with a Montgomery ladder technique which enables fast calculations without inversions referring to Curve25519. It is considered resistant to the Side Channel Attack (SCA) since it applies the Montgomery ladder technique for scalar multiplication (SCM). This ECC implementation on Arduino UNO, an 8-bit microcontroller board, can be utilized for a key agreement protocol among IoT devices.","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121784576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ryan J. Marshall, S. Ghafoor, Mike Rogers, A. Kalyanapu, T. Dullo
{"title":"Performance Evaluation and Enhancements of a Flood Simulator Application for Heterogeneous HPC Environments","authors":"Ryan J. Marshall, S. Ghafoor, Mike Rogers, A. Kalyanapu, T. Dullo","doi":"10.15803/IJNC.8.2_387","DOIUrl":"https://doi.org/10.15803/IJNC.8.2_387","url":null,"abstract":"This paper presents a practical implementation of a 2D flood simulation model using hybrid distributed-parallel technologies including MPI, OpenMP, CUDA, and evaluations of its performance under various configurations that utilize these technologies. The main objective of this research work was to improve the computational performance of the flood simulation in a hybrid architecture. Modern desktops and small cluster systems owned by domain researchers are able to perform these simulations efficiently due to multicore and GPU computing devices, but lack the expertise needed to fully utilize software libraries designed to take advantage of the latest hardware. By leveraging knowledge of our experimentation environment, we were able to incorporate MPI and multiple GPU devices to improve performance over a single-process OpenMP version up to 18x, depending on the size of the input data. We discuss some observations that have significant effects on overall performance, including process-to-device mapping, communication strategies and data partitioning, and present some experimental results. The limitations of this work are discussed, and we propose some ideas to relieve or overcome such limitations in future work.","PeriodicalId":270166,"journal":{"name":"Int. J. Netw. Comput.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131803804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}