2014 International Conference on Next Generation Networks and Services (NGNS)最新文献

筛选
英文 中文
A multi-agent system architecture modeling for smart grid context 面向智能电网环境的多智能体系统体系结构建模
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990249
E. Et-Tolba, M. Maaroufi, M. Ouassaid
{"title":"A multi-agent system architecture modeling for smart grid context","authors":"E. Et-Tolba, M. Maaroufi, M. Ouassaid","doi":"10.1109/NGNS.2014.6990249","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990249","url":null,"abstract":"This paper presents architecture for smart grid elements and concepts modeling. We choose the Multi-Agent Systems (MAS) technology, because it meets this new generation network's requirements and objectives. There is a need of potential redesign and jeopardize of the traditional electrical networks. As several huge blackouts happened this last decade, they are being gradually left in favor of smart grid for more flexibility and network stability. The proposed architecture goes in this context to solve some of these new problematic issues. The adopted modeling strategy is bottom-up approach; we first give a smart appliance model, and then construct the smallest local independent entity model. We afterward use paradigms of agent and object oriented programming which features allow the architecture to be flexible, extensible and scalable. Different models and their scalability are discussed in this paper. The proposed solution will be useful for academic research on smart grid, once it allows its modeling and simulation, performance study and optimization, and therefore can contributes in energy efficiency.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126862677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Role of social networks and paperless citizens' claims processing in strengthening democracy in the Arab world: The case of Morocco: Towards a CIRM ∗ across the state 社会网络和无纸化公民索赔处理在加强阿拉伯世界民主中的作用:以摩洛哥为例:走向全国的CIRM *
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990248
Mohamed Amine Elmahfoudi, A. Hayar, Serge Miranda, Vincent Meyer
{"title":"Role of social networks and paperless citizens' claims processing in strengthening democracy in the Arab world: The case of Morocco: Towards a CIRM ∗ across the state","authors":"Mohamed Amine Elmahfoudi, A. Hayar, Serge Miranda, Vincent Meyer","doi":"10.1109/NGNS.2014.6990248","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990248","url":null,"abstract":"This article attempts to demonstrate how technology can play a fundamental role in the best use of social networking and paperless citizens' claims processing (e-Gov, e-services, e-Administration, etc.) in strengthening democracy and stabilization of social peace in the Arab world in general and Morocco in particular, after the recent political and social changes. The goal of this research is to clarify through a number of process analysis, how through technology and dematerialization mechanisms (ECM, BPM, Web 2.0* ... etc..), Arab states may contain, channel, streamline, quantify, qualify, analyze, monitor and meet the expectations of citizens and make it a means of controlling and monitoring implementation of government programs across the community, county and state. This article also proposes to examine the use of Web 2.0 by youth in Morocco in order to explore the possibilities of governance. The specific purpose of watching a particular population of Morocco seems also a good choice, because even among the Arab countries, the way young people try to adopt new technologies and exploit social networks will be different. The article also lists a number of questions that can help to better understand governance. However, if some questions seem too large, they could be refined and be subject of future research to become mechanically linked to governance.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133592501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Locality sensitive hashing for content based image retrieval: A comparative experimental study 基于内容的图像检索的局部敏感哈希:一个比较实验研究
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990224
Sanaa Chafik, I. Daoudi, Hamid El Ouardi, M. el yacoubi, B. Dorizzi
{"title":"Locality sensitive hashing for content based image retrieval: A comparative experimental study","authors":"Sanaa Chafik, I. Daoudi, Hamid El Ouardi, M. el yacoubi, B. Dorizzi","doi":"10.1109/NGNS.2014.6990224","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990224","url":null,"abstract":"This paper presents a comparative experimental study of the multidimensional indexing methods based on the approximation approach. We are particularly interested in the LSH family, which provides efficient index structures and solves the dimensionality curse problem. The goal is to understand the performance gain and the behavior of this family of methods on large-scale databases. E2LSH is compared to the KRA+-Blocks and the sequential scan methods. Two criteria are used in evaluating the E2LSH performances, namely average precision and CPU time using a database of one million image descriptors.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133922077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Pricing composite cloud services: The cooperative perspective 组合云服务定价:合作视角
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990274
Johanne Cohen, L. Echabbi
{"title":"Pricing composite cloud services: The cooperative perspective","authors":"Johanne Cohen, L. Echabbi","doi":"10.1109/NGNS.2014.6990274","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990274","url":null,"abstract":"We are interested in analyzing situations of competition among the providers in emerging service oriented networks where added value services may be obtained by composing services offered by cloud providers. Those activities are not regulated and may give rise to coalition formation. The comparison between different potential coalitions and their characterization in terms of stability and dominance can be considered using cooperative game concepts. Indeed, a fair revenue sharing mechanism such as the Shapley value can ensure the stability of the formed coalition. However, when the core is empty the grand coalition is no more stable, though other concepts from the bargaining theory may apply. We will investigate potential revenue sharing mechanisms that make alliances sustainable.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133343655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Methodology to reverse engineer a scrambled Java card virtual machine using electromagnetic analysis 利用电磁分析方法对一个混乱的Java卡虚拟机进行逆向工程
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990264
M. Kasmi, Azizi Mostafa, Jean-Louis Lanet
{"title":"Methodology to reverse engineer a scrambled Java card virtual machine using electromagnetic analysis","authors":"M. Kasmi, Azizi Mostafa, Jean-Louis Lanet","doi":"10.1109/NGNS.2014.6990264","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990264","url":null,"abstract":"ElectroMagnetic Analysis (EMA) of smart cards is a powerful technique that allows extracting information about the executed code as well as about the processed data. It's why EMA could be exploited in a side channel attack to retrieve the encryption key. In our current work, we study the possibility to apply reverse engineering upon a java card application in which the virtual machine is scrambled. Even if this process of scrambling is an effective way to prevent execution of an arbitrary code written in any data structure, we believe that it can be systematically bypassed regardless the level of the platform encryption under the reverse engineering trails. In this paper, we present a methodology that could be used to find out the encryption key of the scrambling process.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122424956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-view passive 3D reconstruction: Comparison and evaluation of three techniques and a new method for 3D object reconstruction 多视点被动三维重建:三种技术的比较与评价及一种三维物体重建新方法
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990252
Soulaiman El hazzat, A. Saaidi, K. Satori
{"title":"Multi-view passive 3D reconstruction: Comparison and evaluation of three techniques and a new method for 3D object reconstruction","authors":"Soulaiman El hazzat, A. Saaidi, K. Satori","doi":"10.1109/NGNS.2014.6990252","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990252","url":null,"abstract":"In this article, we focus on the comparison of the passive techniques of multi-view 3D reconstruction, namely the following techniques : Passive Stereo vision, Shape from Silhouette and Space Carving. Available data in the Passive techniques are no more than one or many images taken from different point of views (using one or several cameras). These images will be used in order to render the three-dimensional scene. Our study is based on the quality of the solution (3D Model obtained) and the calculation time. In passive stereo vision, the quality of the results is evaluated in terms of the value of the re-projection error. Also we will evaluate each technique separately. In the end, to enjoy the benefits of the techniques studied we proposed a method based on the extraction of silhouette images and the matching between images to make full 3D object reconstruction. The results of our own implementation of the different techniques studied and the proposed method enable to compare and evaluate these techniques, and to show the quality of the results obtained by the proposed method.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124948131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
QoE-based scheduling algorithm in WiMAX network 基于qos的WiMAX网络调度算法
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990226
Tarik Anouari, A. Haqiq
{"title":"QoE-based scheduling algorithm in WiMAX network","authors":"Tarik Anouari, A. Haqiq","doi":"10.1109/NGNS.2014.6990226","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990226","url":null,"abstract":"WiMAX, the acronym for Worldwide Interoperability for Microwave Access is a set of technical standards based on IEEE 802.16 standard. It provides an internet connection to broadband coverage area of several kilometers in radius, it's an adequate response to some rural or inaccessible areas. Unlike DSL (Digital Subscriber Line) or other wired technology, WiMAX uses radio waves and can provide point-to-multipoint (PMP) and point-to-point (P2P) modes. In parallel, it was observed that in the contrast of the traditional quality evaluation approaches, nowadays, current researches focus on the user perceived quality, the existing scheduling approaches take into account the quality of service (QoS), mobility and many other parameters, but do not consider the quality of experience (QoE). In this paper, we develop a scheduling algorithm to provide QoE to the WiMAX network. A novel approach is proposed, especially for the Best Effort (BE) WiMAX service class, in this approach if there has been a packet loss on a connection, the system reduces the transmission rate of this connection, until achieving its minimum allowable transmission rate. Simulation results on NS-2 simulator show that by applying various levels of mean opinion score (MOS) the QoE provided to the users is enhanced in term of throughput, jitter, packet loss rate and delay.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131234753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hybrid Wireless Sensor-based system for chaotic traffic 基于混合无线传感器的混沌交通控制系统
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990271
Abdelghafour Ait Baaddi, Moulay Driss El Ouadghiri
{"title":"Hybrid Wireless Sensor-based system for chaotic traffic","authors":"Abdelghafour Ait Baaddi, Moulay Driss El Ouadghiri","doi":"10.1109/NGNS.2014.6990271","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990271","url":null,"abstract":"This paper introduces a system for chaotic traffic control; the proposed system is a simple, sophisticated and robust version of the Intelligent Traffic Light Flow Control System Using Wireless Sensors Networks proposed by Khalil M. et al. The proposed system adopts a simple approach by adding more Traffic Sensing Nodes [TSN] and distributing them in a matrix layout covering the road bed. In addition to controlling the traffic signaling lights, this system also feeds an online map web portal that shows a regularly updated status of the traffic within the concerned intersections. The Traffic Sensing Nodes operate according to the M/M/1/L queue while sensing the traffic.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123496678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Semantic mapping at the schema level of XML documents to ontologies XML文档到本体的模式级语义映射
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990247
Jamal Bakkas, Widad Jakjoud, M. Bahaj
{"title":"Semantic mapping at the schema level of XML documents to ontologies","authors":"Jamal Bakkas, Widad Jakjoud, M. Bahaj","doi":"10.1109/NGNS.2014.6990247","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990247","url":null,"abstract":"XML is considered as the most widely used standard to represent, structure and share data via the Web. XML Schema and DTD ensure the content structuring of XML documents; these languages are used to determine the grammar to use in XML instances in order to describe a given domain. However, the requirements of the semantic Web are beyond what is syntactic and structural, and focus increasingly to the semantics, something that cannot be represented by XML and its derivatives and which is perfectly achievable by the ontology languages such as RDF and OWL. In this paper, we propose an automatic method for generating domain ontology from XML grammars by performing a mapping at the schema level.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125736789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modeling securized cooperation of inter-organizational workflows in a multi-level virtual architecture 在多级虚拟体系结构中对组织间工作流的安全合作进行建模
2014 International Conference on Next Generation Networks and Services (NGNS) Pub Date : 2014-05-28 DOI: 10.1109/NGNS.2014.6990260
Samiha El Messari, Khalid Bouragba, M. Ouzzif, M. Rifi
{"title":"Modeling securized cooperation of inter-organizational workflows in a multi-level virtual architecture","authors":"Samiha El Messari, Khalid Bouragba, M. Ouzzif, M. Rifi","doi":"10.1109/NGNS.2014.6990260","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990260","url":null,"abstract":"Managing security is one of the main stakes in the cooperation of an inter-organizational workflow. Several approaches were adopted on this sense. Within the framework of the cooperation we proposed a multi-layered distributed architecture to specify, verify, and connect partners to cooperate. This management architecture WF consists of four levels: modeling level, specification level, cooperation level and execution level. We also proposed an algorithm of cooperation, in which the coverage of the security is realized by the introduction of a control access component based on the ORBAC model. In this article, we will present some approaches of security in workflows cooperation, then we shall propose a formalization of our cooperation algorithm to validate modeling level of our architecture with a final aim of an implementation.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125746500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信