2014 International Conference on Next Generation Networks and Services (NGNS)最新文献

筛选
英文 中文
Building ontologies: A state of the art, and an application to Finance domain 构建本体:当前的技术状态,以及金融领域的应用程序
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-12-18 DOI: 10.1109/NGNS.2014.6990256
Omar El Idrissi Esserhrouchni, B. Frikh, B. Ouhbi
{"title":"Building ontologies: A state of the art, and an application to Finance domain","authors":"Omar El Idrissi Esserhrouchni, B. Frikh, B. Ouhbi","doi":"10.1109/NGNS.2014.6990256","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990256","url":null,"abstract":"In this paper, we develop a framework for comparing ontology leaning systems and place a number of the more prominent ones into it. We have selected 11 specific projects for this study, including automatic and semi-automatic domain ontology building from unstructured or semi-structured text document. The comparison framework includes general characteristics, such as the purpose of ontology, its coverage (general or domain specific), and the formalism used. It also includes the design process used in creating ontology and the methods used to evaluate it. We synthesize the characteristics of the studied algorithms as a comparison matrix based on predefined criteria. Finally, we selected three methodologies for ontology construction: HCHIRSIM [1], Sanchez et al. 2004 [2] and Text2onto [3] and apply them in Finance domain ontology constructed from the web. We compare the obtained concepts with those on the “Financial glossary” provided by Yahoo.com.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115394331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Delay-constrained efficient multicast routing in wireless ad-hoc networks 无线自组织网络中时延约束的高效组播路由
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-12-18 DOI: 10.1109/NGNS.2014.6990266
Fadoua Yakine, A. Idrissi
{"title":"Delay-constrained efficient multicast routing in wireless ad-hoc networks","authors":"Fadoua Yakine, A. Idrissi","doi":"10.1109/NGNS.2014.6990266","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990266","url":null,"abstract":"The limited capacity of batteries of nodes imposes a constraint on ad hoc networks. Thus, energy efficiency is critical to prolong the network lifetime. Network traffic should be routed such that the energy consumption is minimized. In this paper, we discuss the energy-efficient multicast problem in ad hoc networks with the respect of delay. Multicast routing deals with finding a multicast tree, which is rooted from the source and addresses all destination nodes. The energy cost of all the nodes that transmit multicast messages in Ad hoc network should be minimized. Our objective is to construct a network topology that minimizes the total energy cost of the multicast tree and meets delay requirements. We formulate the problem as a Constraint Optimization Model for the Mobile Ad-Hoc Network (COMANET) problem along with delay constraint.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123972388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Markov model to evaluate system performances under slotted Aloha protocol 开槽Aloha协议下系统性能评价的马尔可夫模型
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990227
Abdellah Zaaloul, Mohamed Ben El Aattar, Mohamed Hanini, A. Haqiq, M. Boulmalf
{"title":"A Markov model to evaluate system performances under slotted Aloha protocol","authors":"Abdellah Zaaloul, Mohamed Ben El Aattar, Mohamed Hanini, A. Haqiq, M. Boulmalf","doi":"10.1109/NGNS.2014.6990227","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990227","url":null,"abstract":"The Multiple access system deals with a situation where multiple nodes are required to access a commonly shared channel. These multiple accesses can be viewed as uncoordinated nodes which compete for bandwidth. Various random access mechanisms, such as ALOHA protocol and its corresponding variations, have been widely studied as efficient methods to coordinate the medium access among competing users. In such situations, one of the most important objectives is to evaluate the system performances under such protocol. In this paper we enhanced a model already studied in a previous work by expanding the number of states in a Markov model for a system implementing slotted Aloha protocol; and we use a three state Markov process in order to represent and evaluate the performances of the system under different scenarios. In this model we are interested in representing the time occupancy of the system, evaluating the throughput system under different fairness conditions, and evaluating the probability that the system is in a backlogged state or in an idle state.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117140474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating a modified PCA approach on network anomaly detection 评价一种改进的PCA方法在网络异常检测中的应用
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990240
Athanasios Delimargas, Emmanouil Skevakis, H. Halabian, I. Lambadaris, N. Seddigh, B. Nandy, R. Makkar
{"title":"Evaluating a modified PCA approach on network anomaly detection","authors":"Athanasios Delimargas, Emmanouil Skevakis, H. Halabian, I. Lambadaris, N. Seddigh, B. Nandy, R. Makkar","doi":"10.1109/NGNS.2014.6990240","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990240","url":null,"abstract":"As the number, complexity and diversity of cyber threats continues to increase, anomaly detection techniques have proven to be a powerful technique to augment existing methods of security threat detection. Research has shown that Principal Component Analysis (PCA) is an anomaly detection method known to be viable for pinpointing the existence of anomalies in network traffic. Despite its recognized utility in detecting cyber threats, previous relevant research work has highlighted certain inconsistencies when the classical PCA method is used to detect anomalies in network traffic, resulting in false positives and false negatives. Specifically, it has been shown that the efficiency of the results are highly dependent on the nature of the input data and the calibration of its parameters. In classical PCA, the parameters have to be carefully selected in order to correctly define the normal and abnormal space. By obtaining real network traffic traces from a small enterprise and artificially injecting anomalies, we experiment with a modified PCA method to address the above shortcomings. The results of our experimentation are encouraging. The results indicate our modified PCA method may possess promising capabilities to efficiently detect network anomalies while addressing some of the limitations of the classic PCA approach.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124709387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
MANET security: An intrusion detection system based on the combination of Negative Selection and danger theory concepts MANET安全:一种基于负选择和危险理论相结合的入侵检测系统
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990233
Anass Khannous, A. Rghioui, F. Elouaai, M. Bouhorma
{"title":"MANET security: An intrusion detection system based on the combination of Negative Selection and danger theory concepts","authors":"Anass Khannous, A. Rghioui, F. Elouaai, M. Bouhorma","doi":"10.1109/NGNS.2014.6990233","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990233","url":null,"abstract":"Too many researches have been done using artificial immune systems AIS to solve intrusion detection problems due to several reasons. The self and non-self model based on the Negative Selection Algorithm NSA is the dominant model since it is adopted by the vast majority of these researches. However, this model has some problems especially in terms of scalability and coverage. This paper tries to exploit some interesting concepts proposed by the new danger theory to overcome the problems associated with the self and non-self model. That by improving NSA in order to achieve better detection rates by integrating the basic danger concepts. In this approach, the intrusion detection is related to the damage that can occur in the system and that can be caused by both external elements such as internal elements. The proposed algorithm integrates and combines the basic concepts of intrusion detection systems IDS based on the role of T cells described by the negative selection algorithm, with those inspired by the role of dendritic cells to process the alarm signals and to judge thereafter whether there is presence of a dangerous element or not.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130384712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A hybrid feature selection algorithm for web document clustering web文档聚类的混合特征选择算法
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990255
Asmaa Benghabrit, B. Ouhbi, E. Zemmouri, B. Frikh, Hicham Behja
{"title":"A hybrid feature selection algorithm for web document clustering","authors":"Asmaa Benghabrit, B. Ouhbi, E. Zemmouri, B. Frikh, Hicham Behja","doi":"10.1109/NGNS.2014.6990255","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990255","url":null,"abstract":"Knowing that not all the features in a dataset are important since some are redundant or irrelevant, the use of feature selection, an effective dimensionality reduction technique, is essential for web document clustering. For the clustering process, it represents the task of selecting important features for the underlying clusters. Therefore in order to pilot the web document clustering process, we propose a hybrid feature selection algorithm that selects simultaneously the most statistical and semantic informative features through a weighting model. The clustering process selects relevant features and performs document clustering iteratively until stability. The experimental results demonstrate the practical aspects of our algorithm and show that it generates more efficient clustering than the one obtained by other existing algorithms.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123895845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CBF evaluation through simulation 通过模拟评价CBF
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990250
Y. Saadi, B. Nassereddine, A. Haqiq
{"title":"CBF evaluation through simulation","authors":"Y. Saadi, B. Nassereddine, A. Haqiq","doi":"10.1109/NGNS.2014.6990250","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990250","url":null,"abstract":"Blind Flooding is the simplest broadcasting operation used in a wireless mesh network (WMN) based IEEE 802.11s. However such mechanism can significantly degrade the network performance due to the considerable amount of broadcast traffic a WMN may face. Actually, routing relies heavily on layer two broadcasting and WMNs may bridge wired networks which deploy many broadcasting based application. In previous work we have designed an adaptive approach to control the forwarding of flooded messages into the mesh. The main focus of our previous simulations was to simulate the flooding process in wireless mesh network routing protocol, namely Hybrid Wireless Mesh Protocol (HWMP), which is using Blind Flooding. Generally, the results have shown a considerable amelioration of the network capacity specially with scaling. In this paper we evaluate our scheme, namely Control of Broadcast Forwarding (CBF), in comparison with Blind Flooding protocol. Our protocol is a self pruning algorithm where each node decides itself if or not to rebroadcast a flooded message based on packet type information element and 2-hop neighborhood knowledge. Simulations results show a significant reduction of broadcast cost while improving slightly the average end to end delay.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123665440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Enhances security for IMS client 增强IMS客户端的安全性
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990257
E. Belmekki, M. Bellafkih, A. Belmekki
{"title":"Enhances security for IMS client","authors":"E. Belmekki, M. Bellafkih, A. Belmekki","doi":"10.1109/NGNS.2014.6990257","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990257","url":null,"abstract":"Migration to next generation networks (NGN) is becoming a necessity for Telco companies to follow the telecommunications industry evolution. However, NGN as proposed by the 3GPP implies significant challenges for the deployment. Indeed IMS architecture, which is considered as one of NGN network, includes significant security weaknesses for users and service providers. In order to increase the degree of confidence to the use of this network it is necessary to enhance the security of its different communication interfaces. To achieve this aim, we propose in this work a highlighting of the vulnerability in IMS access layer, focusing in possible attacks. We also propose a comparative study of existing security solutions in this field. This work will provide a significant improvement of existing solutions to enhance security for IMS user's access.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124147988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An improved DV-Hop localization algorithm for wireless sensor networks 一种改进的无线传感器网络DV-Hop定位算法
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990273
Abdelali Hadir, K. Zine-dine, M. Bakhouya, Jamal El Kafi
{"title":"An improved DV-Hop localization algorithm for wireless sensor networks","authors":"Abdelali Hadir, K. Zine-dine, M. Bakhouya, Jamal El Kafi","doi":"10.1109/NGNS.2014.6990273","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990273","url":null,"abstract":"Wireless sensor networks have attracted great interest in the last decade, and have provided solutions in a growing number of applications. The location of sensors is a major issue in these networks. Many localization algorithms have been proposed and can be categorized into two families: range-based and range-free algorithms. In this paper, the localization algorithm DV-Hop is improved in order to minimize the estimation error and thus obtain better localization accuracy of sensor nodes. Simulations have been conducted and results are reported to show the efficiency of the enhanced version of DV-Hop.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"430 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116000016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The exploitation of traces serving tutors for the reconstruction of groups within a CBLE 利用痕迹服务导师重建CBLE内的群体
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990225
Mohammed Salihoun, F. Guerouate, M. Sbihi
{"title":"The exploitation of traces serving tutors for the reconstruction of groups within a CBLE","authors":"Mohammed Salihoun, F. Guerouate, M. Sbihi","doi":"10.1109/NGNS.2014.6990225","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990225","url":null,"abstract":"For several years, education has undergone numerous problems, which led researchers to focus on this issue, trying to enable the difficulties encountered during the learning process. Research on the Computer-based learning environments (CBLE) aims to meet challenges as school failure, dropout and the learners groups heterogeneity. Within the context of a remote collaborative activity, the tutor is often not able to have a global perception of the virtual class he leads, thus confronting a real problem in terms of identification the groups that face difficulties. The exploitation of interaction traces done by the users in the CBLE and the indicators development are able to help tutor monitor the activities of his/her learners. This article presents the researches made to this regard and raises the research prospects.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122079068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信