{"title":"An enhanced cross-scale adaptive cost aggregation for stereo matching","authors":"Oussama Zeglazi, M. Rziza, A. Amine","doi":"10.1109/WINCOM.2017.8238214","DOIUrl":"https://doi.org/10.1109/WINCOM.2017.8238214","url":null,"abstract":"Stereo matching is a fundamental task in vision applications. we propose an adaptive cross-scale aggregation method for stereo matching, which is introduced by solving an optimization problem. Unlike the original approach which introduces the same regularization term based on the inter-scale regularizer parameter to control the cost consistency among the multi-scales for all regions of the input images. We propose an adaptive regularization term in order to take into account the local structure of the image. For this purpose, we use the popular three-component image model to parse the reference image, then obtain the edge, texture and flat regions. Then, for each region, a regularizer parameter is defined. Experiments were conducted on the KITTI benchmark and obtained results have demonstrated the efficiency of the presented algorithm since significant erroneous disparities are effectively reduced.","PeriodicalId":113688,"journal":{"name":"2017 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125569105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A rule-based method for Arabic question classification","authors":"Imane Lahbari, S. A. Ouatik, Khalid Alaoui Zidani","doi":"10.1109/WINCOM.2017.8238208","DOIUrl":"https://doi.org/10.1109/WINCOM.2017.8238208","url":null,"abstract":"Question Classification is a very important component in question answering system. In this paper, we present a rule-based method to classify Arabic questions. We have used two taxonomies: Arabic taxonomy and Li & Roth taxonomy. We have conducted several experiments using TREC and CLEF questions. The obtained results show the importance of our method.","PeriodicalId":113688,"journal":{"name":"2017 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"885 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123035542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed El Moutaouakkil, Ahmed Drissi El Maliani, M. Hassouni
{"title":"A graph based approach for color texture classification in HSV color space","authors":"Mohammed El Moutaouakkil, Ahmed Drissi El Maliani, M. Hassouni","doi":"10.1109/WINCOM.2017.8238209","DOIUrl":"https://doi.org/10.1109/WINCOM.2017.8238209","url":null,"abstract":"Color and texture have been proven to be very discriminant attributes in image analysis across many works. This paper proposes a color texture analysis method based on the graph theory, in which we convert the texture in question into an undirected weighted graph and explore the shortest paths between four pairs of pixels according to different scales and orientations of the image. Basically, we extend two previously introduced approaches that consider the RGB color space, to textures in the HSV color space taking into account the nature of correlations between its color channels. In order to evaluate its performance, we applied this procedure to USPTex textures dataset. The best classification results using the standard parameters of the method are 92.25%, 91.75% and 85.72% of Accuracy (percentage of samples correctly classified). Which proves the efficiency of the proposed method compared to the results achieved by traditional methods found in literature.","PeriodicalId":113688,"journal":{"name":"2017 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"1776 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129552885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Management of intrusion detection systems based-KDD99: Analysis with LDA and PCA","authors":"Khalil Ibrahimi, Mostafa Ouaddane","doi":"10.1109/WINCOM.2017.8238171","DOIUrl":"https://doi.org/10.1109/WINCOM.2017.8238171","url":null,"abstract":"Recently, the problem of the intrusion detection has been largely studied by the computer and networks security communities. Then, the Intrusion Detection System (IDS) becomes a interest topic in research and in particular in machine learning and data mining. In order to improve the classification accuracy and to reduce high false alarm rate from the classical data base like KDD99 or others. In this work, we present a state of the art about this topic and we use classification algorithms such as Linear discriminant analysis (LDA) and Principal Component Analysis (PCA) to identify the intrusion and classification anomaly. The experiments of the IDS are performed with NSL-KDD data set and we try to improve the existing classification methods.","PeriodicalId":113688,"journal":{"name":"2017 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123348102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance study of 5G multicarrier waveforms","authors":"Hayat Jebbar, S. E. Hassani, A. Abbassi","doi":"10.1109/WINCOM.2017.8238183","DOIUrl":"https://doi.org/10.1109/WINCOM.2017.8238183","url":null,"abstract":"In the near future some of mobile communication prime objectives need to be improved, including increased capacity, higher data rate, low latency, and better quality of service. To respond to these growing demands, a modification should be done at the physical layer in terms of waveforms adopted. Flexible waveforms have been proposed to meet the challenges faced in current generation systems such as: Filter Bank Multi Carrier (FBMC), Universal Filtered Multi Carrier (UFMC) and Generalized Frequency Division Multiplexing (GFDM). This paper studies 5G waveforms, their advantages for the new generation, analyses their performance and makes a comparison between these waveforms and OFDM.","PeriodicalId":113688,"journal":{"name":"2017 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125700256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Youssef El Gholb, M. Bakkali, Ahmed Mounsef, Najiba El Amrani El Idrissi, I. Tabakh
{"title":"A G-shaped Antenna with parasitic element for 5G applications","authors":"Youssef El Gholb, M. Bakkali, Ahmed Mounsef, Najiba El Amrani El Idrissi, I. Tabakh","doi":"10.1109/WINCOM.2017.8238151","DOIUrl":"https://doi.org/10.1109/WINCOM.2017.8238151","url":null,"abstract":"In this paper, a parasitic G-shaped microstrip patch antenna has been designed and simulated with both HFSS (High Frequency Structure Simulator) and CST Microwave Studio Softwares. Parametric analysis has been carried out to find optimized distances of the parasitic elements to achieve desired results. The proposed antenna is simple in design and compact in size and provides two separate impedance bandwidths. It also exhibits appropriate gain characteristics in multiple frequency regions. The performance of the designed antenna was analyzed in term of bandwidth, gain, return loss, VSWR, and radiation pattern.","PeriodicalId":113688,"journal":{"name":"2017 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115753997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Youssef Seraoui, B. Raouyane, M. Belmekki, M. Bellafkih
{"title":"Opening into a virtualized IMS based telecom architectural framework: Telecom cloud manager","authors":"Youssef Seraoui, B. Raouyane, M. Belmekki, M. Bellafkih","doi":"10.1109/WINCOM.2017.8238143","DOIUrl":"https://doi.org/10.1109/WINCOM.2017.8238143","url":null,"abstract":"One of the considerable use cases for network functions virtualization (NFV) is the IP multimedia subsystem (IMS). With the emergence of software defined network (SDN) and NFV, the mobile network operators (MNOs) that are deploying the IMS look to make a gain from these leading technologies to mitigate hardware costs and reduce time to market. With the use especially of the NFV approach, the MNO looks for scaling services up and down fast and also reduce costs to align with network usage. In this paper, we give an introduction to a virtualized IMS based telecommunications platform called Telecom Cloud Manager as a virtualized and extended architecture of the 4G/LTE system, being defined by the 3GPP, toward a proposed five generation (5G) paradigm. We intend to migrate all IP switching layers to virtualized entities, including servers and network elements, by using one of the leading virtualization technologies and concepts involving a cloud manager, and an NFV framework. On that account, we set up a testbed system with the goal of evaluating the behavior of a virtualized IMS core network, as part of telecom operators' networks, within a static service provisioning context. Experiment results show that resource performance could be enhanced quickly in the case of unforeseen degradation by supporting a new VNF based service chain.","PeriodicalId":113688,"journal":{"name":"2017 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124553911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performances comparison of spreading sequences for very high efficiency DCSK system","authors":"Fadia Taleb, D. Roviras, F. Bendimerad","doi":"10.1109/WINCOM.2017.8238181","DOIUrl":"https://doi.org/10.1109/WINCOM.2017.8238181","url":null,"abstract":"In this paper, we propose three different approaches in order to multiplex N bits of data using very high efficiency differential chaos shift keying (VHE-DCSK) system. This system allows higher spectral efficiency than differential chaos shift keying (DCSK) and high efficiency differential chaos shift keying (HE-DCSK) systems. Using Gaussian approximation method and under a white Gaussian noise channel (AWGN), theoretical bit error rate (BER) are calculated. Simulations in this environment show good agreement with analytical expressions and allow us to conclude that the first approach gives better BER performances when the number of transmitted bit (N) is large or if the spreading factor (M) is small.","PeriodicalId":113688,"journal":{"name":"2017 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124469361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ayoub Bahnasse, Fatima Ezzahraa Louhab, M. Talea, H. A. Oulahyane, Adel Harbi, Azeddine Khiat
{"title":"Towards a new approach for adaptive security management in new generation virtual private networks","authors":"Ayoub Bahnasse, Fatima Ezzahraa Louhab, M. Talea, H. A. Oulahyane, Adel Harbi, Azeddine Khiat","doi":"10.1109/WINCOM.2017.8238194","DOIUrl":"https://doi.org/10.1109/WINCOM.2017.8238194","url":null,"abstract":"Once a company is located on several sites, the communication between these sites would be critical for its activity, regardless of its size. VPN technology allows the connection between these different sites, while giving the user the benefit of the security. New Generation VPN technologies allow to create multiple virtual tunnels between various devices in a fast, automatic and dynamic manner. However, existing technologies represent limitations of reliability, which means, the security policy deployed in a domain or a cloud, will be applied on all sorts of traffic whatever its type. This paper proposes a new model of adaptive security that we have called Smart Security Management for New Generation VPN. This model allows to generate security policies in an automatic, intelligent and adapted way to the performances of the transported applications and the network status. That is, if the network is overloaded and the flow to be transported is of real-time type, then generate a policy of medium, low security level or even not secure if the organization allows it in the contract.","PeriodicalId":113688,"journal":{"name":"2017 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129219959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed El-Yahyaoui, Mohamed Dâfir Ech-Cherif El Kettani
{"title":"A verifiable fully homomorphic encryption scheme to secure big data in cloud computing","authors":"Ahmed El-Yahyaoui, Mohamed Dâfir Ech-Cherif El Kettani","doi":"10.1109/WINCOM.2017.8238186","DOIUrl":"https://doi.org/10.1109/WINCOM.2017.8238186","url":null,"abstract":"Performing smart computations in a context of cloud computing and big data is highly appreciated today. Fully homomorphic encryption (FHE) is a smart category of encryption schemes that allows working with the data in its encrypted form. It permits us to preserve confidentiality of our sensible data and to benefit from cloud computing powers. Currently, it has been demonstrated by many existing schemes that the theory is feasible but the efficiency needs to be dramatically improved in order to make it usable for real applications. One subtle difficulty is how to efficiently handle the noise. This paper aims to introduce an efficient and verifiable FHE based on a new mathematic structure that is noise free.","PeriodicalId":113688,"journal":{"name":"2017 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123815593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}