Sunday, February 12, 2017


Wednesday, February 8, 2017

Thursday, December 1, 2016

International Journal of Grid and High Performance Computing

We are delighted to inform our authors that the International Journal of Grid and High Performance Computing (IJGHPC) has been selected for coverage in Thomson Reuter’s products and services.  Beginning with all content published in 2016, IJGHPC will be indexed and abstracted in Thomson Reuter’s Emerging Sources Citation Index (ESCI).  This means that articles published in the journal will be indexed in the Web of Science at the time of publication.  We would invite you to submit high quality original/survey papers for publication consideration by IJGHPC.

We would like to invite you to read the below articles of the latest issue of IJGHPC.  
International Journal of Grid and High Performance Computing
Vol. 8, No. 4, 2016
Published: Quarterly in Print and Electronically
ISSN online: 1938-0267; ISSN print: 1938-0259;

http://www.igi-global.com/journal/international-journal-grid-high-performance/1105
-------------------------------------------------------

===========================
IJGHPC Vol. 8 No. 4 (2016)
===========================

http://www.igi-global.com/journal/international-journal-grid-high-performance/1105#contents

Article 1, 
TVGuarder: A Trace-Enable Virtualization Protection Framework against Insider Threats for IaaS Environments (pages 1-20)
Li Lin, Shuang Li, Bo Li, Jing Zhan, Yong Zhao
Abstract: 
Cloud computing has a most vulnerable security concerns as virtualization. This paper presents a Trace-enable Virtualization protection framework named TVGuarder, which protects IaaS user's important data from being illegally accessed or maliciously damaged by insider attacks. A threat model is established to characterize cloud-oriented insider attacks and countermeasures are proposed in TVGuarder. First, LSM hooks in host OS kernel are leveraged to enforce that VM images could only be accessed by host virtualization service. Second, a trusted loading mechanism is proposed to prevent tampered or disguised virtualization process from being executed in Host OS. Third, a log-based back tracing mechanism is designed to record full call trace of VM operations and guarantee that only legitimate VM operations are allowed. TVGuarder has been implemented in Openstack platform and several comprehensive experiments are conducted. Experimental results show that TVGuarder can identify sev
 eral important insider attacks and protect virtual machine images with only a small performance degradation.

Article 2, 
Dynamic Job Scheduling Strategy for Unreliable Nodes in a Volunteer Desktop Grid (pages 21-33)
Shaik Naseera
Abstract: 
Desktop grid aims to harvest a number of idle desktop computers owned by individuals on the edge of internet. Now days, Desktop grids are gaining increasing popularity because of the advances in the technology and availability of high computing power from the desktops. Volunteer nodes in a Desktop Grid encounter two types of failures: volatility failure and interference failure. Volatile failures are due to periodic maintenance, machine breakdown, system crash or shutdown etc that make node inaccessible to the Desktop Grid user. Interference failures are due to volunteer autonomic nature that the node owner can withdraw participation from public execution due to the need to execute the private jobs. This makes the node inaccessible to the Desktop Grid user and may cause partial or entire loss of the public job execution. Volunteer interferences cause slowdown in the execution of the jobs. In this paper the author present a job scheduling algorithm that analyze the nature of v
 olunteer interference failures for effective scheduling of jobs.

Article 3, 
Hilbert Index-based Outlier Detection Algorithm in Metric Space (pages 34-54)
Honglong Xu, Haiwu Rong, Rui Mao, Guoliang Chen, Zhiguang Shan
Abstract: 
Big data is profoundly changing the lifestyles of people around the world in an unprecedented way. Driven by the requirements of applications across many industries, research on big data has been growing. Methods to manage and analyze big data to extract valuable information are the key of big data research. Starting from the variety challenge of big data, this dissertation proposes a universal big data management and analysis framework based on metric space. In this framework, the Hilbert Index-based Outlier Detection (HIOD) algorithm is proposed. HIOD can handle all datatypes that can be abstracted to metric space and achieve higher detection speed. Experimental results indicate that HIOD can effectively overcome the variety challenge of big data and achieves a 2.02 speed up over iORCA on average and, in certain cases, up to 5.57. The distance calculation times are reduced by 47.57% on average and up to 89.10%.

Article 4, 
High Performance CGM-based Parallel Algorithms for the Optimal Binary Search Tree Problem (pages 55-77)
Vianney Kengne Tchendji, Jean Frederic Myoupo, Gilles Dequen
Abstract: 
In this paper, the authors highlight the existence of close relations between the execution time, efficiency and number of communication rounds in a family of CGM-based parallel algorithms for the optimal binary search tree problem (OBST). In this case, these three parameters cannot be simultaneously improved. The family of CGM (Coarse Grained Multicomputer) algorithms they derive is based on Knuth's sequential solution running in time and space, where n is the size of the problem. These CGM algorithms use p processors, each with local memory. In general, the authors show that each algorithms runs in with communications rounds. is the granularity of their model, and is a parameter that depends on and . The special case of yields a load-balanced CGM-based parallel algorithm with communication rounds and execution steps. Alternately, if , they obtain another algorithm with better execution time, say , the absence of any load-balancing and communication rounds, i.e., not better 
 than the first algorithm. The authors show that the granularity has a crucial role in the different techniques they use to partition the problem to solve and study the impact of each scheduling algorithm. To the best of their knowledge, this is the first unified method to derive a set of parameter-dependent CGM-based parallel algorithms for the OBST problem.

Article 5, 
A Two-Level Fuzzy Value-Based Replica Replacement Algorithm in Data Grids (pages 78-99)
Nazanin Saadat, Amir Masoud Rahmani
Abstract: 
One of the challenges of data grid is to access widely distributed data fast and efficiently and providing maximum data availability with minimum latency. Data replication is an efficient way used to address this challenge by replicating and storing replicas, making it possible to access similar data in different locations of the data grid and can shorten the time of getting the files. However, as the number and storage size of grid sites is limited and restricted, an optimized and effective replacement algorithm is needed to improve the efficiency of replication. In this paper, the authors propose a novel two-level replacement algorithm which uses Fuzzy Replica Preserving Value Evaluator System (FRPVES) for evaluating the value of each replica. The algorithm was tested using a grid simulator, OptorSim developed by European Data Grid projects. Results from simulation procedure show that the authors' proposed algorithm has better performance in comparison with other algorithms
  in terms of job execution time, total number of replications and effective network usage.

Article 6, 
MR-LDA: An Efficient Topic Model for Classification of Short Text in Big Social Data (pages 100-113)
Xiongwen Pang, Benshuai Wan, Huifang Li, Weiwei Lin
Abstract:
Latent Dirichlet Allocation(LDA) is an efficient method of text mining,but applying LDA directly to Chinese micro-blog texts will not work well because micro-blogs are more social, brief, and closely related with each other. Based on LDA, this paper proposes a Micro-blog Relation LDA model (MR-LDA), which takes the relations between Chinese micro-blog documents and other Chinese micro-blog documents into consideration to help topic mining in micro-blog. The authors extend LDA in the following two points. First, they aggregate several Chinese micro-blogs as a single micro-blog document to solve the problem of short texts. Second, they model the generation process of Chinese micro-blogs more accurately by taking relationship between micro-blog documents into consideration. MR-LDA is more suitable to model Chinese micro-blog data. Gibbs sampling method is borrowed to inference the model. Experimental results on actual datasets show that MR-LDA model can offer an effective soluti
 on to text mining for Chinese micro-blog.

=== About IJGHPC ===

The International Journal of Grid and High Performance Computing (IJGHPC) examines current, state-of-the art research on all aspects of grid and cloud evolution, middleware, standards, API, economy, education, services, algorithms, collaboration, impact, instrumentation, security, portals, trends, challenges, models, work flow management, wireless systems, and high performance computing. This journal will be instrumental in the improvement and development of theory and practice in grid and cloud computing.

=== Indices ===

Thomson Reuter’s Emerging Sources Citation Index, SCOPUS, Compendex EI, DBLP, INSPEC, ACM Digital Library, etc.

=== CALL FOR PAPERS ===

The IJGHPC invites renowned researchers from various branches of the field to submit manuscripts for publication in the journal.
Accepted papers of IJGHPC will undergo language copyediting, typesetting, and reference validation in order to provide the highest publication quality. 

Note: There are no submission or publication fees for manuscripts submitted to the International Journal of Grid and High Performance Computing (IJGHPC). 

=== IJGHPC Coverage ===

Topics of interest include:

-Advanced collaboration techniques and scaling issues
-Algorithms and techniques for HPC
-Big Data
-Bio-inspired grid resource management
-Cloud architectures
-Cloud business process integration
-Cloud client and applications
-Cloud engineering and management
-Cloud foundation concepts
-Cloud platforms and infrastructures
-Cloud reliability and security
-Cloud Services
-Cloud standards
-Cloud types
-Combating global terrorism with the world wide grid
-Emerging standards for organizations and international projects
-Future of grid, trends, and challenges
-Green data centers
-Grid and software engineering aspects
-Grid architecture, resources, and data management
-Grid economy, market dynamics, and simulations
-Grid education and applications - science, engineering, and business
-Grid evolution, characterization, and concepts
-Grid fundamentals, algorithms, and performance analysis
-Grid impact, scientific, and industrial and social implications
-Grid instrumentation, measurement, and visualization
-Grid middleware, scheduling, brokering, and monitoring
-Grid portals and security
-Grid programming, models, tools, and API
-Grid services, concepts, specifications, and frameworks
-Grid uses and emerging technology
-New initiatives, SOA, autonomic computing, and semantic grid
-Simple API for Grid Applications (SAGA)
-Software and hardware support for HPC
-Test, evaluation, and certificate presentation
-Wireless and optical grid, characteristics, and applications
-Work flow management

=== Special Issue ===

Experienced researchers and practitioners are welcome to propose, organize, and guest edit special section (3-4 papers) / issue (6-8 papers) around topics of their interest and expertise.  
Once you propose a Special Issue (SI), you will be the Lead Guest Editor of the Special Issue. We look forward to your stimulating proposals and working with you in ensuring the SI bright.
We will be pleased to assist with all questions on the organization of a Special Issue to its publication.  Enquiries and special issue proposals should be directed to the editor Prof. Robert Hsu at chh@chu.edu.tw

=== Latest Published Articles ===

Vol. 8, No. 4 (2016)
***************
Article 1 TVGuarder: A Trace-Enable Virtualization Protection Framework against Insider Threats for IaaS Environments (pages 1-20)
Article 2 Dynamic Job Scheduling Strategy for Unreliable Nodes in a Volunteer Desktop Grid (pages 21-33)
Article 3 Hilbert Index-based Outlier Detection Algorithm in Metric Space (pages 34-54)
Article 4 High Performance CGM-based Parallel Algorithms for the Optimal Binary Search Tree Problem (pages 55-77)
Article 5 A Two-Level Fuzzy Value-Based Replica Replacement Algorithm in Data Grids (pages 78-99)
Article 6 MR-LDA: An Efficient Topic Model for Classification of Short Text in Big Social Data (pages 100-113)

Vol. 8, No. 3 (2016)
***************
Article 1 Fragment Re-Allocation Strategy Based on Hypergraph for NoSQL Database Systems (pages 1-23)
Article 2 Publish/Subscribe and JXTA based Cloud Service Management with QoS (pages 24-37)
Article 3 A Credible Cloud Service Model based on Behavior Graphs and Tripartite Decision-Making Mechanism (pages 38-56)
Article 4 An Intelligent Approval System for City Construction based on Cloud Computing and Big Data (pages 57-69)
Article 5 Efficient Querying Distributed Big-XML Data using MapReduce (pages 70-79)

Vol. 8, No. 2 (2016)
***************
Article 1 Software-Defined Networking for Scalable Cloud-based Services to Improve System Performance of Hadoop-based Big Data Applications (pages 1-22)
Article 2 Discovering Gathering Pattern Using a Taxicab Service Rate Analysis Method based on Neural Network (pages 23-42)
Article 3 An Energy-Efficient Resource Scheduling Algorithm for Cloud Computing based on Resource Equivalence Optimization (pages 43-57)
Article 4 Towards High Performance Text Mining: A TextRank-based Method for Automatic Text Summarization (pages 58-75)
Article 5 Extending Dynamic Scheduling Policies in WorkflowSim by Using Variance based Approach (pages 76-93)
Article 6 Game Theoretic Cloud-Assisted Opportunistic Spectrum Access in Cognitive Radio Networks (pages 94-110)

Vol. 8, No. 1 (2016)
***************
Article 1 Architectural Pattern for Scheduling Multi-Component Applications in Distributed Systems (pages 1-22)
Article 2 Interflow Network Coding Approaches for Data Heterogeneous Unicast Sessions in Wireless Networks (pages 23-37)
Article 3 Novel Software Containers for Engineering and Scientific Simulations in the Cloud (pages 38-49)
Article 4 Using the Balanced Scorecard Approach to Appraise the Performance of Cloud Computing (pages 50-57)
Article 5 Adapting Reproducible Research Capabilities to Resilient Distributed Calculations (pages 58-69)
Article 6 Migrating to the Cloud: The Sullivan University Experience (pages 70-75)
Article 7 An Intelligent Power Load Control/Switching System Using an Energy Meter and Relay Circuit (pages 76-84)
Article 8 Web Services Gateway: Taking Advantage of the Cloud (pages 85-92)

Vol. 7, No. 4 (2015)
***************
Article 1 MDE Approach for the Establishment of a Service Level Agreements Monitoring by Trusted Third Party in the Cloud Computing (pages 1-20)
Article 2 Review of Big Data on Student Information for Finding the Uncertainty in Higher Education Enrollment (pages 21-32)
Article 3 An Enhanced TCP for Optimizing Channel Utilization in Dynamic Spectrum Access Networks (pages 33-46)
Article 4 Performance Comparison of Classification Methods for Surface EMG-Based Human-Machine Interface (pages 47-56)
Article 5 Constructing a Bioinformatics Platform with Web and Mobile Services Based on NVIDIA Jetson TK1 (pages 57-73)
Article 6 Efficient Resource Allocation Mechanism for Federated Clouds (pages 74-87)

Vol. 7, No. 3 (2015)
***************
Article 1 Automatic Dynamic Data Structures Recognition to Support the Migration of Applications to the Cloud (pages 1-22)
Article 2 Maintaining Replicated Recovery Log for RESTful Services (pages 23-35)
Article 3 A Mobile Cloud Computing System for Mathematical Computation (pages 36-53)
Article 4 High Performance Temperature Detection System for Industrial Automation (pages 54-64)
Article 5 Self-Adaptive QoS-Aware Web Service Discovery using Ontology Approach (pages 65-84)
Article 6 High Performance Datafly based Anonymity Algorithm and Its L-Diversity (pages 85-100)

Vol. 7, No. 2 (2015)
***************
Article 1 Independent Tasks Scheduling using Parallel PSO in Multiprocessor Systems (pages 1-17)
Article 2 Exploring Vectorization and Prefetching Techniques on Scientific Kernels and Inferring the Cache Performance Metrics (pages 18-36)
Article 3 An Anonymous Email Identification Solution based on Writing Structural Patterns (pages 37-49)
Article 4 A Novel Multi-Dimension Resource Recycling Mechanism for Cloud Data Centers (pages 50-64)
Article 5 A Self-Adaptive Prediction Algorithm for Cloud Workloads (pages 65-76)
Article 6 Apriori-based High Efficiency Load Balancing Parallel Data Mining Algorithms on Multi-core Architectures (pages 77-99)

Vol. 7, No. 1 (2015)
***************
Article 1: Tag-Based Classification for Software-Defined Networking
Article 2: Software Defined Cognitive Radio Network Framework: Design and Evaluation
Article 3: Toward a Proof of Concept Implementation of a Cloud Infrastructure on the Blue Gene/Q
Article 4: Black Hole Traffic Anomaly Detections in Wireless Sensor Network
Article 5: Contention-Free Station Communication Matching Algorithm in Multi-Hop Power Management for Wireless Ad-Hoc Networks

Vol. 6, No. 4 (2014)
***************
Article 1: Energy Efficiency Oriented Scheduling for Heterogeneous Cloud Systems
Article 2: Analyzing the Cooling Efficiency of the Thermal Environment in Data Centers
Article 3: QoS Oriented Enhancement based on the Analysis of Dynamic Job Scheduling in HPC
Article 4: Methodology for Information Management and Data Assessment in Cloud Environments
Article 5: Ambulance Dispatching System with Integrated Information and Communication Technologies on Cloud Environment

Vol. 6, No. 3 (2014)
***************
Article 1: EcoGrid: A Toolkit for Modelling and Simulation of Grid Computing Environment for Evaluation of Resource Management Algorithms
Article 2: Accelerating a Cloud-Based Software GNSS Receiver
Article 3: Workload Prediction on Google Cluster Trace
Article 4: A Generic Privacy Breach Preventing Methodology for Cloud Based Web Service

Vol. 6, No. 2 (2014)
***************
Article 1: Semantic-Based Access Control for Data Resources in Open Grid Services Architecture: Data Access and Integration (OGSA-DAI)
Article 2: A Migration Approach for Fault Tolerance in Cloud Computing
Article 3: Cryptographic Cloud Computing Environment as a More Trusted Communication Environment
Article 4: Green Energy Model for Grid Resource Allocation: A Graph Theoretic Approach
Article 5: An Efficient CGM-Based Parallel Algorithm Solving the Matrix Chain Ordering Problem

Vol. 6, No. 1 (2014)
***************
Article 1: Adjusting Thread Parallelism Dynamically to Accelerate Dynamic Programming with Irregular Workload Distribution on GPGPUs
Article 2: Computing Traffic Information in the Cloud
Article 3: On Construction of a Multi-Grid Resource Selection Strategy on Grids
Article 4: Novel Resource Allocation Algorithm for Energy-Efficient Cloud Computing in Heterogeneous Environment 
Article 5: Architecting Software as a Service for Data Centric Cloud Applications

=== Complete Journal Contents Listing:===

http://www.igi-global.com/journal-contents/international-journal-grid-high-performance/1105

=== IJGHPC Editorial Board ===

Co-EiC
Robert Hsu, Chung Hua University, Taiwan
Emmanuel Udoh, Sullivan University, USA

EB Members
Amy Apon, Clemson University, USA 
Nik Bessis, University of Bedfordshire, UK 
Wolfgang Gentzsch, HPC, Grid, and Cloud Computing Consultant, Germany 
Daniel Katz, University of Chicago, USA 
Stan Kurkovsky, Central Connecticut State University, USA 
Antanas Zilinskas, Institute of Mathematics and Informatics, Lithuania 
Vishal Anand, The College at Brockport, State University of New York, USA 
Nick Antonopoulos, University of Derby, UK 
Giovanni Aloisio, University of Salento, Italy 
Jose Manuel Garcia Carrasco, Universidad de Murcia, Spain 
Christophe Cerin, University of Paris 13, France 
I-hsin Chung, IBM Research, USA 
Yeh-Ching Chung, National Tsinghua University, Taiwan 
Yuhui Deng, Jinan University, China 
Shanmugasundaram Hariharan, TRP Engineering College (SRM Group), India 
Shih-Hao Hung, National Taiwan University, Taiwan 
Minglu Li, Shanghai Jiao Tong University, China 
Berniamino Martino, Seconda Universita 'di Napoli, Italy 
Kashif Nisar, Universiti Utara Malaysia, Malaysia 
Shawulu Nggada, Polytechnic of Namibia, Namibia 
Pethuru Raj, IBM India Private Limited, Bangalore, India 
Manpreet Singh, Maharishi Markandeshwar University, India 
Chen Tian, Huawei Technologies, USA 
Giuseppe Trunfio, University of Sassari, Italy 
Athina Vakali, Aristotle University of Thessaloniki, Greece 
Chao Wang, Oak Ridge National Laboratory, USA 
Fatos Xhafa, Universitat Politecnica de Cataluyna, Spain 
Chao-Tung Yang, Tunghai University, Taichung, Taiwan 
Laurence Yang, St. Francis Xavier University, Canada 
Zhifeng Yun, Louisiana State University, USA 
Weizhe Zhang, Harbin Institute and Technology, China 
Yao Zhang, Argonne National Laboratory, USA 
Horvath Zoltan, Eovos Lorand Tudomanyegyetem, Hungary