2014 International Conference on Next Generation Networks and Services (NGNS)最新文献

筛选
英文 中文
Resolving the access conflict for shared Ethernet communication channel 解决共享以太网通信通道的访问冲突
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990232
Jihane Maslouh, A. Errami, M. Khaldoun
{"title":"Resolving the access conflict for shared Ethernet communication channel","authors":"Jihane Maslouh, A. Errami, M. Khaldoun","doi":"10.1109/NGNS.2014.6990232","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990232","url":null,"abstract":"In this paper, we will show how Medium Access Control (MAC) is responsible for managing access to the communication channel for wired network. To ensure efficient transmission, each system must employ a MAC mechanism to arbitrate access to the shared medium in order to avoid data collisions and the same time efficiently share the transmission bandwidth. The purpose of this article is to provide a clear view and understanding of the solution provided, how it allows a strategy to ensure the uniqueness of channel access with fixed and predefined priority to be set up for each communication devices, and how we can exploit the collisions avoiding retransmissions every time to get the channel. Moreover, demonstrate the efficiency of the solution by calculating the performance metrics. It is also our purpose to discuss further prospects of the solution described in this article in order to indicate the trend toward a wireless networks.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122175570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new prototype development modeling-simulation of sensor networks 一种新型传感器网络原型开发建模-仿真方法
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990218
N. Mitta, Rachid El Gouri, L. Hlou
{"title":"A new prototype development modeling-simulation of sensor networks","authors":"N. Mitta, Rachid El Gouri, L. Hlou","doi":"10.1109/NGNS.2014.6990218","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990218","url":null,"abstract":"This paper presents a simulation prototype design for wireless sensor networks (WSNs). It allows the performance evaluation (e.g., packet delivery rate, transmission latency and energy consumption) at high level, but with elaborate models of the hardware and software of sensor nodes. Many hardware components are modeled and the IEEE 802.15.4 standard is implemented. The prototype uses a clock based synchronization mechanism to support simulations with cycle accurate communication and approximate time computation. The performances have been compared with NS-3 and we find that the similar result (deviation less than 5%) at the same abstraction level, and tow time faster than NS-3. Moreover, with a hardware and software co-simulation feature, we have more detailed modeling of sensor nodes.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"345 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130212387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach to avoid traffic congestion using VANET 一种利用VANET避免交通拥堵的方法
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990245
H. Toulni, B. Nsiri, M. Boulmalf, M. Bakhouya, T. Sadiki
{"title":"An approach to avoid traffic congestion using VANET","authors":"H. Toulni, B. Nsiri, M. Boulmalf, M. Bakhouya, T. Sadiki","doi":"10.1109/NGNS.2014.6990245","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990245","url":null,"abstract":"Roads' overload remains a major challenge although they are constantly expanded in order to increase their capacity and improve their efficiency. This tends to cause many problems: environmentally, economically and socially. The advancement of urban traffic management systems, construction and expansion of roads are solutions to address this problem and improve the performance of the road circulation, but these solutions are very expensive and also require more space for the development and permanent maintenance. An alternative would be to use the new technologies in the field of communication for sending traffic information such as treacherous road conditions and accident sites by communicating, for a more efficient use of existing infrastructure. In this paper, we present a new approach based on VANETs, which can help drivers have a better trip, by finding the optimal path to reduce travel time and fuel consumption. This approach aims to avoid congestion and queues in a more efficient and optimal use of existing road infrastructure by analyzing the useful and reliable traffic information collected in real time.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121572671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Towards a new model of management and securing digital identities 迈向管理和保护数字身份的新模式
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990269
Ismail Bourass, Nadia Afifi, H. Belhadaoui, M. Ouzzif, R. Hilali
{"title":"Towards a new model of management and securing digital identities","authors":"Ismail Bourass, Nadia Afifi, H. Belhadaoui, M. Ouzzif, R. Hilali","doi":"10.1109/NGNS.2014.6990269","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990269","url":null,"abstract":"The exponential growth of the web and the use of social networks in our area, gave birth to a new concept called digital identity, it's all digital traces that can be left in the internet such as photos and various comments. However, these digital identities are exposed to many dangers such as phishing, fraud, cyber-crime and identity theft. However, with an interconnected world, it is important to know with whom we communicate. Hence, the weightiness of digital identities' security becomes obvious. In this paper we propose a secure identification approach using a model of digital identity recognition. To do so, we will develop an architecture that can identify users based on a certain number of parameters, such as: federated digital identity management and certification of digital identity.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123822513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Query's optimization in data warehouse on the cloud using fragmentation 使用碎片对云数据仓库中的查询进行优化
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990243
Abdelaziz Ettaoufik, M. Ouzzif
{"title":"Query's optimization in data warehouse on the cloud using fragmentation","authors":"Abdelaziz Ettaoufik, M. Ouzzif","doi":"10.1109/NGNS.2014.6990243","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990243","url":null,"abstract":"Nowadays Cloud Computing occupies an advanced place in the field of service-oriented technologies. The cloud provides a flexible environment for customers to host and process their information through an outsourced infrastructure. This information was habitually located on local servers. Many applications dealing with massive data is routed to the cloud. Data Warehouse (DW) also benefit from this new paradigm to provide analytical data online and in real time. DW in the Cloud benefited of its advantages such flexibility, availability, adaptability, scalability, virtualization, etc. Improving the DW performance in the cloud requires the optimization of data processing time. The classical optimization techniques (indexing, materialized views and fragmentation) are still essential for DW in the cloud. The DW is partitioned before being distributed across multiple servers (nodes) in the Cloud. When queries containing multiple joins or ask voluminous data stored on multiple nodes, inter-node communication increases and consequently the DW performance degrades. In this paper we propose an approach for improving the performance of DW in the Cloud. Our approach is based on a mapping placed on nodes leased by the client. It consists to memorize: (i) the requests received by the node, (ii) information about DW; (iii) an algorithm of query processing. We use the data stored in the map for fragmenting the DW in order to minimize the inter-node communications.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114367437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ZigZag decoding-enabled multi-hop ad hoc networks: Taking benefit from collisions 支持zigzg解码的多跳自组织网络:从碰撞中获益
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990235
Sara Arabi, Essaid Sabir, Mohammed Sadik
{"title":"ZigZag decoding-enabled multi-hop ad hoc networks: Taking benefit from collisions","authors":"Sara Arabi, Essaid Sabir, Mohammed Sadik","doi":"10.1109/NGNS.2014.6990235","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990235","url":null,"abstract":"This paper presents a mathematical model for slotted Aloha-based multihop wireless ad hoc network with ZigZag decoding. We aim by using ZigZag decoding to exploit collision that occurs due to simultaneous transmissions or hidden nodes, in order to decode involved packets by through an iterative piece-by-piece algorithm. Now, the channel state (which we confound with the transmission issue) either can be : Idle, success, ZigZag or collision. Later, we build queuing model and derive the metrics of interest. Each node handles two queues (one for its ow packets and the second one to buffer packets to be transmitted). Next, we derive the arrival rate, departure rate, the average end to end throughput and the average load of forwarding queues. Furthermore, we provide a deeper analysis for symmetric ad hoc networks, for whom we derive explicit formulas for the expected average throughput and stability. Our findings are illustrated with many numerical examples.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122145678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Wideband 3×4 Butler matrix using Wilkinson divider for MIMO applications 宽带3×4巴特勒矩阵使用威尔金森分频的MIMO应用
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990236
Hamza Nachouane, A. Najid, A. Tribak, F. Riouch
{"title":"Wideband 3×4 Butler matrix using Wilkinson divider for MIMO applications","authors":"Hamza Nachouane, A. Najid, A. Tribak, F. Riouch","doi":"10.1109/NGNS.2014.6990236","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990236","url":null,"abstract":"This paper presents the design and simulation of a broadband 3×4 Butler matrix for the IEEE 802.11 b/g/n and ISM bands. The aim of this study is to develop an antenna array feeding networks for Multiple-Input Multiple-Output (MIMO) applications, based on an asymmetric Butler matrix. The asymmetric structure allows to create a further beam on the array's normal axis, in addition to the same beams which are created by the symmetrical version. The proposed circuit presents a high isolation and wideband features. The circuit can be used for both transmission and reception systems to ensure the Multi-User MIMO (MU-MIMO) service.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130588474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A QoS evaluation of video traffic models for H.264 AVC video H.264 AVC视频流量模型的QoS评价
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990270
S. Tanwir, H. Perros, B. Anjum
{"title":"A QoS evaluation of video traffic models for H.264 AVC video","authors":"S. Tanwir, H. Perros, B. Anjum","doi":"10.1109/NGNS.2014.6990270","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990270","url":null,"abstract":"In this paper, we evaluated and compared the QoS behavior of video traffic models for H.264 AVC video. The H.264 AVC models that we evaluated are: the Markov Modulated Gamma (MMG) model, the Discrete Autoregressive (DAR) model, the second order Autoregressive AR(2) model, and a wavelet-based model. These models were used to generate synthetic packet traces which were used in a simulation model to estimate the 95th percentile of the end-to-end delay, jitter and packet loss. The QoS metrics of the generated traces are compared with those of the original traces available from the Arizona State University video traces library. We observed that none of the model produces accurate results for every type of video but the MMG model produced the results closest to the actual traces.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116457504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A fast dynamic multicast tree adjustment protocol for mobile IPv6 移动IPv6快速动态组播树调整协议
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990237
Youssef Baddi, Mohamed Dafir Ech-Chrif El Kettani
{"title":"A fast dynamic multicast tree adjustment protocol for mobile IPv6","authors":"Youssef Baddi, Mohamed Dafir Ech-Chrif El Kettani","doi":"10.1109/NGNS.2014.6990237","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990237","url":null,"abstract":"Internet research community has proposed many Different multicast routing protocols to support efficient multimedia application such as, IPTV, videoconferencing, group games. Nevertheless, these protocols have not been designed for mobile roaming members and sources, and has not been tested in wireless and mobile environment since they were developed for multicast parties whose members and sources are topologically stationary. Recently, as the performance of mobile hosts rapidly improves and the bandwidth of wireless access networks grows up, the expectation for mobile multimedia communication services including many-to-many communications such as video-conferencing begins a big necessary. Studying and solving multicast issues in the stationary multicast infrastructure has been largely studied in the literature. However, fewer efforts have been spent in the specific problems of mobile members and sources caused by the frequent change of membership and point of attachment. This paper addresses the issue of mobile Multicast routing by presenting a Fast Dynamic Multicast Tree Adjustment Protocol for Mobile IPv6 (FDMTA-MIPv6), an optimized multicast tree protocol is proposed to transform multicast tree into an optimal shared multicast tree routed at a selected RP. To estimate and evaluate our scheme, we implement simulation based in many metrics, simulation results show that good performance is achieved in terms of handoff latency, end-to-end delay, tree construction delay and others metrics.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124034038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhancing primary user detection through radio frequency fingerprint 通过射频指纹增强主用户检测
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990246
Marouane Sebgui, Slimane Bah, A. Berrado, Belhaj El Graini
{"title":"Enhancing primary user detection through radio frequency fingerprint","authors":"Marouane Sebgui, Slimane Bah, A. Berrado, Belhaj El Graini","doi":"10.1109/NGNS.2014.6990246","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990246","url":null,"abstract":"Radio Frequency Fingerprint (RFF) is a technology that allows a unique identification of transmitters. RFF is based on the transient phase of a transmitted signal and allows device identification at the physical level. This paper proposes to use this technology to identify the primary user in the cognitive radio context. Indeed, it presents a novel transceiver architecture based on a dedicated sensing unit. Furthermore, we propose a decision making process based on a supervised learning classifier to decide if a given RFF belongs to a primary user or not. We use wavelets signal decomposition to extract RFF profiles in order to achieve a high level of sensing accuracy.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"54 19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134634736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信