{"title":"Intelligent audit of information systems by inter-organizational workflow","authors":"M. Chergui, H. Medromi, A. Sayouti","doi":"10.1109/NGNS.2014.7090888","DOIUrl":"https://doi.org/10.1109/NGNS.2014.7090888","url":null,"abstract":"This paper shows how IT-Governance Audit can be computerized by the use of Multi-agent system and Interorganizational Workflow (IOW). An IOW aims at business process orchestration with the particularity that this processes are heterogeneous, autonomous and independent. In fact, Information System (IS) components nowadays should cooperate despite their divergence to ensure a value added services .In addition, their audit requires horizontal communication with all stakeholders as well. In this work we use COBIT as IT Governance framework. We based our approach on its process oriented aspect to evaluate a real business objective with COBIT processes by a \"supply and demand\" way. This article presents first an architecture of the IOW, after that, it identifies mediation problems in the IWO to match an IS business objective with COBIT processes and proposes a solution. Then it presents the simulator of IT Governance IWO and opens new perspectives.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116642072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capsid framework: Towards next-generation network of distributed content","authors":"N. Madrane, S. J. Andaloussi, Abderahim Sekkaki","doi":"10.1109/NGNS.2014.6990230","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990230","url":null,"abstract":"This paper introduces a new paradigm regarding the relationship between content and application. We propose to aggregate content and application in a new abstraction level called Capsid and we show its benefits. In this paradigm, documents are considered as live objects, distributed in a next-generation network. Duplication, tracking and security issues are studied. A name resolution scheme is defined so that remote Capsids can be referenced. This paper also presents technical details on the implementation of a Capsid framework.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121337071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chouairi Asmâa, El Ghorba Mohamed, Benali Abdelkader, Hachim Abdelilah, Boudlal El Mostapha
{"title":"Modeling and evaluation of reliability and availability of industrial systems: Applications to parallel series and series parallel systems","authors":"Chouairi Asmâa, El Ghorba Mohamed, Benali Abdelkader, Hachim Abdelilah, Boudlal El Mostapha","doi":"10.1109/NGNS.2014.6990228","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990228","url":null,"abstract":"With today's highly reliable components, we are often unable to obtain a reasonable amount of test data under normal use condition. For this reason, accelerated tests method is the reasonable procedure to be applied. It is used to determine the reliability of a product in a short period of time by accelerating the use environment. Application of the method of accelerated tests can save cost that we used to pay for overcoming the dilemma of not being able to estimate failure rates by testing directly at use conditions. In the method of accelerated tests, acceleration factor is known or there exists a mathematical model which specifies the relationship between lifetime and reliability or failure. This model proves its value not only as a way of a validation model for classical reliability models existing in the literature, but more, as a quantifier of reliability gain resulting when replacing or modifying parts (cost-benefit analysis).","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128427649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid transmission scheme and relay selection in LTE-Advanced network: Graph-based approach","authors":"A. Zainaldin, H. Halabian, I. Lambadaris","doi":"10.1109/NGNS.2014.6990262","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990262","url":null,"abstract":"This paper proposes a dynamic resource block allocation scheme in relay-assisted bidirectional LTE-Advanced networks which consists of three nodes: User Equipment (UE), Base Station or eNodeB (eNB) and an intermediate Relay Node (RN). In this work, an enhanced three-time-slot per cycle time division duplexing (TDD) transmission protocol is proposed to the LTE-Advanced frame architecture. In such a protocol, UEs and the eNB can choose between different transmission schemes: direct transmission, pure Cooperative relaying (CoR scheme) using an intermediate relay station, or via the combination of Network Coding and Cooperative Relaying (NC/CoR scheme). A graph-based framework is proposed to solve the NP-hard combinatorial optimization problem. Our problem is transformed into a maximum weighted clique problem and used to provide optimal achievable rate regions for the hybrid transmission scheme, resource block assignment and relay selection. The proposed hybrid transmission scheme determines the best transmission strategy among direct transmission, CoR and NC/CoR in each three-time-slot cycle based on the system channel information as well as the queue length information. The simulation results show that our optimization algorithm significantly outperforms conventional schemes for both SISO and MIMO systems.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115187131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdelali Elmoufidi, Khalid El Fahssi, Said Jai-Andaloussi, N. Madrane, A. Sekkaki
{"title":"Detection of regions of interest's in mammograms by using local binary pattern, dynamic k-means algorithm and gray level co-occurrence matrix","authors":"Abdelali Elmoufidi, Khalid El Fahssi, Said Jai-Andaloussi, N. Madrane, A. Sekkaki","doi":"10.1109/NGNS.2014.6990239","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990239","url":null,"abstract":"This paper presents a method for the detection of the regions of interest's (ROIs) in mammograms by using dynamic k-means clustering algorithm. In this approach, a method has been developed to determine the initialization number of clusters in mammograms by using a data mining algorithm based on the Local Binary Pattern (LBP) and co-occurrence matrix technique (GLCM). Our method consists of three phases: firstly preprocessing images by using Thresholding and filtering methods; secondly determining the initialization number of clusters in mammography images; thirdly detecting of regions of interest's (ROIs) in mammography images. The proposed method was tested using data from Mini-MIAS (Mammogram Image Analysis Society, UK) database, consisting of 322 mammograms. The results from the tests confirm the effectiveness of the proposed method the determination number of clusters and detected of Regions of interest's (ROIs) in mammography images.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116209448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Random attack on Asymmetric Cryptosystem based on phase-truncated fourier transforms","authors":"Abdelaaziz El Ansari, Lahcen Kabouri, E. Ahouzi","doi":"10.1109/NGNS.2014.6990229","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990229","url":null,"abstract":"In this work we show the weakness of Asymmetric Cryptosystem based on Phase-Truncated Fourier Transforms (PTFTs). The weakness that we are trying to show is the possibility of retrieving the “plaintext” image without using its corresponding “ciphertext”, the proposed procedure is based on the use of any image (binary image, random image ...) to recover the primary image after decryption. A series of computer simulations have shown the weakness of Asymmetric Cryptosystem based on Phase-Truncated Fourier Transforms.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123818380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technique of communications using a UE Transporter and Wi-Fi link","authors":"A. Laguidi, A. Hayar","doi":"10.1109/NGNS.2014.6990242","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990242","url":null,"abstract":"Femtocells are small base stations designed for use as an ideal solution to ensure good radio coverage in the residential and corporate environments, they are low power, low cost and easy to deploy. In this paper we review LTE femtocell, LTE HeNB standard architecture and we propose a technique of communications using a UE Transporter and a Wi-Fi link. This technique is based, in particular, on the protocol 802.11i and on the transfer of communications through a UE which act as a carrier of the communications coming from another UE located in the area Wi-Fi of UE Transporter. This solution strengthens and improves our green LTE architecture with HeNB Energy Congestion Server (HeNB-ECS), the proposed server in our solution which manages and administers the HeNB network. It allows managing the HeNB network more efficiently and increases the number of network users.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128453572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bootstrapping recommender systems based on a multi-criteria decision making approach","authors":"Ferdaous Hdioud, B. Frikh, B. Ouhbi","doi":"10.1109/NGNS.2014.6990254","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990254","url":null,"abstract":"Recommender Systems (RSs) cope with the problem of information overload, by providing to users content that fit with what they prefer. Generally, RSs work much better for those users on which they have more information about. Satisfying the new users becomes a challenge, as ensuring for them recommendations of quality is vital for the growth of the RS. Coping with this issue can be made by ensuring a certain brief interview with the user-called bootstrapping process-through which we acquire a user's feedback on a set of items, to subsequently enrich the user profile and inferring efficient recommendations. In this paper, we will propose an approach for bootstrapping a RS based on multi-criteria ratings and a method of computing weights of criteria taken from Multi-criteria Decision Making (MCDM).","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126440804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdelali Boushaba, Adil Benabbou, Rachid Benabbou, Azeddine Zahi, M. Oumsis
{"title":"An enhanced MP-OLSR protocol for MANETs","authors":"Abdelali Boushaba, Adil Benabbou, Rachid Benabbou, Azeddine Zahi, M. Oumsis","doi":"10.1109/NGNS.2014.6990231","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990231","url":null,"abstract":"Multipath Optimized Link State Routing Protocol (MP-OLSR) is a multipath extension of OLSR, a well knows proactive routing protocol developed especially for Mobile Ad hoc Networks (MANETs). To find multiple paths, MP-OLSR uses the multipath Dijkstra's algorithm. The algorithm obtains considerable flexibility and scalability by using the cost functions, route recovery and loop detection mechanisms in order to improve MANETs performances. However, MP-OLSR presents some drawbacks. First, data packets are distributed into different paths by using Round-Robin (RR) scheduling algorithm. RR is incapable to balance load among heterogeneous multiple paths. Second, the cost functions return fixed values without adaptability to network conditions. To overcome these drawbacks, we proposed, in this paper, to integrate Weighted Round-Robin (WRR) scheduling algorithm to MP-OLSR for supporting heterogeneous multiple paths with different hop count. And, we proposed also a Fuzzy Logic Controller (FLC) to adapt the cost functions as function of hop count metric. Implementation and simulation experiments with Network Simulator NS2 are presented in order to validate our proposed goals. The results show that our enhanced MP-OLSR outperforms original MP-OLSR in terms of packet delivery ratio, end to end delay, jitter and routing cost.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114854702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Queues management of secondary users in a Cognitive Radio Network","authors":"Said Lakhal, A. Idrissi","doi":"10.1109/NGNS.2014.6990268","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990268","url":null,"abstract":"In the Cognitive Radio Networks (CRNs), the Secondary Users (SUs) wait the release of a channel, to transmit their data packets. During the waiting phase, each SU can receive other packets that are organized on its own queue. Upon the release of a channel, the SUs begin the transmission. To avoid interference problems and conflict between SUs, it is necessary to implement a scheduler able to manage queues and assign the free channels to the SUs. In this work we apply an algorithm called Mono_scheduler and we offer a procedure, to assign the free channel to the SUs, manage the queues and ensure an equity value between transfer rates, by using Jain's Fairness Index (JFI) as a metric.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125648514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}