2014 International Conference on Next Generation Networks and Services (NGNS)最新文献

筛选
英文 中文
Monte Carlo simulation based algorithm design for automatic learning machine performance analysis 基于蒙特卡罗仿真的自动学习机性能分析算法设计
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990221
Smail Tigani, M. Ouzzif, A. Hasbi
{"title":"Monte Carlo simulation based algorithm design for automatic learning machine performance analysis","authors":"Smail Tigani, M. Ouzzif, A. Hasbi","doi":"10.1109/NGNS.2014.6990221","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990221","url":null,"abstract":"This paper proposes advanced key performance indicators dedicated to learning machines and auto-adaptive systems performance analysis. This work introduces an algorithm implementing designed key performance indicators for automatic learning capacity checking. The algorithm simulates the supervised environment to stimulate the tested auto-adaptive machine and then study its adaption capacity based on indicators statistically designed.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123847342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An information-jamming-based incentive mechanism for channel selection 基于信息干扰的信道选择激励机制
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990223
Essaid Sabir, Mohamed Nabil Saidi, M. Boutabia, Mohammed Sadik
{"title":"An information-jamming-based incentive mechanism for channel selection","authors":"Essaid Sabir, Mohamed Nabil Saidi, M. Boutabia, Mohammed Sadik","doi":"10.1109/NGNS.2014.6990223","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990223","url":null,"abstract":"We consider a radio cell composed of one single Base Station (BS) and possibly several users. We are particularly interested in analyzing the behavior of two special users. On one hand, the first user (called the sender) has access to multiple channels and has to choose a channel to transmit its data. Obviously, the sender seeks to transmit using the best channel among the L available channels in the system. Indeed, he/she “senses” each channel by sending probes to the BS. Then, the base station sends back the global interference (interference plus noise) on each channel. On the other hand, the second user (called the jammer) blocks the information sent by the BS to the user for some channels. We formulate this interaction as a zero-sum non-cooperative game. Then, we discuss the optimal strategy for each user and analyze the equilibrium point of the game for pure and mixed strategies. Many results are drawn such as characterization of pure strategies and derivation of saddle point policies for both players. Next, we provide a discussion on how our proposal could be implemented for cooperative sensing in cognitive radio networks. Our solution has the benefit of being completely distributed and near optimal channel assignment is met without coordination/signaling. We finally show, by solving the derived dynamic programs, that setting a transmission cost sustains fairness and incites for better channel assignment.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127138691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing privacy on Mobile Health: An integrated privacy module 加强移动医疗的隐私:一个集成的隐私模块
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990259
Souad Sadki, Hanan El Bakkali
{"title":"Enhancing privacy on Mobile Health: An integrated privacy module","authors":"Souad Sadki, Hanan El Bakkali","doi":"10.1109/NGNS.2014.6990259","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990259","url":null,"abstract":"The evolution of mobile communication in the health sector has improved patients' quality of care. Nowadays, doctors can make diagnosis even though the patient is miles away using mobile technologies such as smart phones or tablet PCs. Nevertheless, the exchange of medical information through mobile devices brings on serious threats to patients' privacy. We believe that privacy must be considered during the development of any mobile healthcare system. In this paper we discuss the efficiency of current privacy and security protection mechanisms used in current mobile systems. The nature and the diversity of medical information shared between different entities (physicians, hospitals, laboratories, pharmacies...) increases privacy and security risks. Thus, we introduce a new conceptual module to preserve privacy in mobile healthcare. By integrating this module into current mobile healthcare systems architecture, we obtain a privacy-preserving system enabling patients to monitor and manage the disclosure of their sensitive health information during a mobile transaction.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126615744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Telecommunications market share game with ambiguous pricing strategies 基于模糊定价策略的电信市场份额博弈
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990253
Toufik Mouhyiddine, Essaid Sabir, Mohammed Sadik
{"title":"Telecommunications market share game with ambiguous pricing strategies","authors":"Toufik Mouhyiddine, Essaid Sabir, Mohammed Sadik","doi":"10.1109/NGNS.2014.6990253","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990253","url":null,"abstract":"The purpose of this article is to bring interesting findings about consumer confusion. Obviously one of the major economic challenge is to define the most realistic consumer model on the purchasing decision making. This decision is highly limited by the information they have, the cognitive limitations of their minds, and the finite amount of time they have to make a choice. The notion of consumer confusion has recently gained considerable popularity in the economics such as behavioral sciences leading researchers to propose appropriate models to understand their impact on the competition. We propose on this paper a new approach concerning the consumer confusion using game-theoretical analysis which describe the interactions between two concurrent service providers and the effect of this confusion on the competition. In this paper we consider a duopoly model of rational Service providers competing to maximize profit in a market of confused and non confused population. We prove using non cooperative game theory inside a confused environment, contrary to what seems intuitively right, that there is a Nash equilibrium to this pricing game. We also show that the stability of this competition is verified under some conditions on price sensitivity and the ISPs use advertising to increase their benefit among the confused subscribers.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123420790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Effect of a node's death on behavior of the LEACH protocol and its descendants 节点死亡对LEACH协议及其后代行为的影响
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990219
Abedelhalim Hnini, Abdellah Ezzati, A. Hajami
{"title":"Effect of a node's death on behavior of the LEACH protocol and its descendants","authors":"Abedelhalim Hnini, Abdellah Ezzati, A. Hajami","doi":"10.1109/NGNS.2014.6990219","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990219","url":null,"abstract":"Wireless sensor networks have gained major attention from most of the recent research community. One of the important issues in this type of networks is the inherent limited power of the network sensor nodes. Hierarchical routing protocols are incorporate of efficiently balancing the load on the sensor nodes. But, dice the death of some nodes to the network begins to deteriorate more and more. This paper describes the comparative analyses of LEACH protocol with its various descendants in the level on the influence of network after the event of the death of a node regardless the node (C-H node or member node). In addition, we have given some relief proposals to strengthen the network in particular cases and its implementation in Network Simulator (NS2).","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126282153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A new MANETs clustering algorithm based on nodes performances 一种新的基于节点性能的manet聚类算法
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990222
M. Dyabi, A. Hajami, H. Allali
{"title":"A new MANETs clustering algorithm based on nodes performances","authors":"M. Dyabi, A. Hajami, H. Allali","doi":"10.1109/NGNS.2014.6990222","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990222","url":null,"abstract":"A mobile ad hoc network (MANET) is a dynamic wireless network which can be formed without the need for any pre-existing infrastructure in which each node can act as a router. In comparison with fixed networks, some new security issues have arisen with the introduction of MANETs. Secure routing, in particular, is an important and complicated issue. Organizing mobile nodes into manageable clusters can limit the amount of secure routing information. Under a cluster structure, mobile nodes are managed by nodes called cluster heads. The clusterhead role is resource consuming since its always switched on and is responsible for the long-range transmission. If a node has this role, it would burn its resource quickly, and after it died, all its members would be headless. In this work, we propose a new clustering algorithm for ad hoc networks, where the clusters are formed around the most powerful nodes, i.e, the node that has the best material resources such as residual energy, free memory, processor speed and hard disk space is elected as cluster head. Our algorithm takes into account the node range by including in our calculation the node density. Therefore, we are sure that the cluster head is represented by the most powerful and the less mobile node in the network that can perform its roles in the best conditions. This solution will be used to manage cryptographic keys in an ad hoc network. Our algorithm gives major improvements regarding the number and the performance of elected cluster heads. Analysis and simulation results are used to show the performance of our algorithm, compared with other clustering algorithms in literature.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133445341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Modeling and analyzing precision time protocol — Application to prototyping distributed embedded systems 精确时间协议的建模和分析。分布式嵌入式系统原型设计中的应用
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990220
M. Chkouri, M. Bozga
{"title":"Modeling and analyzing precision time protocol — Application to prototyping distributed embedded systems","authors":"M. Chkouri, M. Bozga","doi":"10.1109/NGNS.2014.6990220","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990220","url":null,"abstract":"Prototyping distributed embedded system can be seen as a collection of many requirements covering many domains. System designers and developers need to describe both functional and non-functional requirements. Building distributed systems is a very tedious task since the application has to be verifiable and analyzable. Architecture Analysis and Design Language (AADL) provides adequate syntax and semantics to express and support distributed embedded systems. This paper studies a general methodology for prototyping distributed applications using the Precision Time Protocol (PTP) for building and translating AADL systems into a distributed application using network communication protocol. This allows simulation of systems specified in AADL to fully assess system viability, to refine and to correct the behavior of the system using the BIP (Behavior Interaction Priority) toolset.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132093818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a decentralized and adaptive software-defined networking architecture 朝着去中心化和自适应的软件定义网络架构发展
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990272
S. Zerrik, Amina El ouadghiri, D. El Ouadghiri, Rachid Atay, M. Bakhouya, J. Gaber
{"title":"Towards a decentralized and adaptive software-defined networking architecture","authors":"S. Zerrik, Amina El ouadghiri, D. El Ouadghiri, Rachid Atay, M. Bakhouya, J. Gaber","doi":"10.1109/NGNS.2014.6990272","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990272","url":null,"abstract":"Software-defined networking (SDN) is the rising technology in near future to build programmable networks as a way to simplify the evolution of networks. It is a new networking paradigm with the main aim is to decouple forwarding hardware from control decisions. However, existing SDN architectures are centralized and then cannot meet the requirements of both scalability and adaptability simultaneously. The way in which they have typically been constructed is often very inflexible due to the risk of bottlenecks. Issues are that SDN architectures must be able to scale to billions of nodes, able to adapt to dynamic conditions, must be highly available, secure and should require minimal human configuration and management. Therefore, new architectures are required and need to be highly flexible with self-organizing capabilities in order to cope with a dynamically changing environment. In this paper, a decentralized architecture is introduced. Design concepts are presented to highlight its operation modes.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133593502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
QMGenerator: Generation of quality models from a metamodel based on The MDA approach QMGenerator:基于MDA方法从元模型生成质量模型
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990275
Youness Boukouchi, Adil Khamal, A. Marzak, Hicham Moutachaouik
{"title":"QMGenerator: Generation of quality models from a metamodel based on The MDA approach","authors":"Youness Boukouchi, Adil Khamal, A. Marzak, Hicham Moutachaouik","doi":"10.1109/NGNS.2014.6990275","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990275","url":null,"abstract":"Today, technology and IT platforms are in continuous exponential growth, however, this growth has created several problems related to portability, reusability, interoperability but most important of all is the fact that it is related to the software quality. From these facts, the OMG proposed the Model Driven Architecture (MDA), which is based on the models as independent primary objects of any platform, and which are transformed thereafter into other objects specific to each platform (code, dB count, XMLFile,...). Therefore, to assess and ensure the quality of software, stakeholders (designer, developers, users, &) in this domain, need a quality model, the most difficult thing to do is to choose it from a diversity of models taking into account the rarity of the meta-models. Based on the MDA approach, this article will introduce a software quality and quality models, a comparison of model structures, our meta-model of software quality and finally, the proposal of a process of generating models by our QMGenerator Framework of software quality.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114744094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Compressed and distributed host identity protocol for end-to-end security in the IoT 压缩和分布式主机身份协议,用于物联网的端到端安全
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990267
Somia Sahraoui, A. Bilami
{"title":"Compressed and distributed host identity protocol for end-to-end security in the IoT","authors":"Somia Sahraoui, A. Bilami","doi":"10.1109/NGNS.2014.6990267","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990267","url":null,"abstract":"Wireless Sensor Networks (WSNs), as a key part of the Internet of Things (IoT), allow the representation of the dynamic characteristics of the physical world in the Internet's virtual world. Thus, sensor nodes are henceforth considered as Internet hosts and may act freely as web clients or servers. Undoubtedly, security and end-users privacy issues rise and become more severe in the IoT, due to the asymmetric nature of the communications between sensor nodes and the ordinary Internet hosts. Many solutions propose to use the classical IP-based security protocols for IoT, after adapting them to WSN's constraints by either messages compression or computational-load distribution techniques. In this paper we propose a 6LoWPAN (IPv6 over Low power Wireless Personal Area Networks) compression model for HIP (Host Identity Protocol) header, as well as, an adapted distribution scheme of the computational load in HIP's key agreement process. For an extreme lightweight end-to-end security, we propose to combine both compression and distribution models for HIP in WSNs side, in the IoT. The partial evaluation results show that the proposed protocol, named compressed and distributed HIP (CD-HIP), is more adapted than the standard HIP, while introducing minor header communication overhead.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115214314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信