{"title":"Balancing heuristic for independent task scheduling in cloud computing","authors":"Kadda Beghdad Bey, F. Benhammadi, R. Benaissa","doi":"10.1109/ISPS.2015.7244959","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244959","url":null,"abstract":"Distributed computing environment has become a new technology to execute large-scale applications and Cloud computing is one of these technologies. Resource allocation is one of the most important challenges in the Cloud Computing. The optimally assigning of the available resources to the needed cloud applications is known to be a NP complete problem. In this paper, we propose a new task scheduling strategy based on the total order for resource allocation to improve the Min-Min algorithm. We focus on minimizing the total executing time (makespan) of task scheduling and maximizing the use of resources. Experimental results demonstrate that the proposed approach permits more adaptive resources allocation for independent jobs scheduling in the cloud computing environment.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"2 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116790230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human activity recognition in pervasive single resident smart homes: State of art","authors":"Asma Benmansour, A. Bouchachia, M. Feham","doi":"10.1109/ISPS.2015.7244997","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244997","url":null,"abstract":"The increasing number of elderly persons, in addition to the lack of infrastructures designed to manage them brings an awareness of the importance of maintaining them at home by developing assistive technologies. Recent research on the latter focused on Human Activity Recognition (HAR). HAR aims to recognize the sequence of actions by a specific resident at home using sensor readings. In eldercare applications, HAR allows for a continuous evaluation of older people physical and cognitive capabilities by monitoring the completion of their Activities of Daily Living (ADLs). After the recognition step, assistive technologies may intervene to provide them with the necessary support to live independently at home. Most of the work in single resident HAR has been done in computer vision. Because, HAR is generally performed in a private setting (i.e. smart homes), the camera based solution would not be suitable due to human privacy concerns. Recently, many researchers are interested in the use of pervasive sensors to recognize single resident ADLs. This paper reviews recent approaches applied for HAR in pervasive single resident smart homes. It presents the latest developments and highlights the open issues in this field.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133723684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CAD system for classification of mammographic abnormalities using transductive semi supervised learning algorithm and heterogeneous features","authors":"Nawel Zemmal, Nabiha Azizi, M. Sellami","doi":"10.1109/ISPS.2015.7244993","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244993","url":null,"abstract":"Breast cancer is the most frequently diagnosed cancer in women worldwide and the leading cause of cancer death among females. Currently the most effective method for early detection and screening of breast abnormalities is mammography. In particular, the breast mass diagnosis and classification arouse nowadays a great interest. Various researches have proven that the computer-aided diagnosis (CAD) of breast abnormalities is becoming increasingly a necessity given the exponential growth of performed. Hence, it can reduce the cost for double screening process A generic CAD system includes segmentation, feature extraction, and classification stages in order to have a final decision. However, such a system is usually characterized by the large volume of the acquired data. This data must be labeled in a specific way that leads to a major problem which is the necessity of an expert to make the labeling operation. To overcome this constraint, statistical learning propose semi-supervised learning (SSL) algorithm as alternative in order to beneficiate to the all dataset images. In this paper, a CAD system for the breast abnormalities classification is proposed basing on Transductive semi-supervised learning technique using TSVM with these different kernel functions and heterogeneous features families. Experimental results based on DDSM dataset are very encouraging.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134480976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using performance modelling and analysis for self-adaptive resources allocation systems: A case study","authors":"Mehdi Sliem, Nabila Salmi, M. Ioualalen","doi":"10.1109/ISPS.2015.7245006","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7245006","url":null,"abstract":"Data centers need to have more and more flexible execution environments, allowing resources sharing between their different applications in order to meet performances requirements. In a cloud computing application for instance, the main objective is to maximize profits by an efficient resources use, to meet the clients Service Level Agreements (SLA) and reduce the energy cost of the data center. The main challenge of resource allocation is then to find the minimum amount of resources that an application needs to meet the desired Quality of Service. To answer these concerns, self-management capabilities have been proposed to efficiently automate the resource allocation process. Autonomic managers allow to adjust the scale of the targeted systems, based on a simple monitoring process and predefined scaling strategies. In this context, it becomes important to forecast the efficiency of such self-adaptive systems, so that to find the most appropriate resource configuration to be applied. To reach this objective, we present, in this paper, a modelling approach, allowing to predict the efficiency of self-adaptive systems relating resource allocation. We use, for this purpose, a Stochastic Petri Nets modelling. A set of experiments illustrates our approach starting from modelling to performance evaluation of the studied system.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131943938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A reliable trust management scheme in wireless sensor networks","authors":"Nabila Labraoui","doi":"10.1109/ISPS.2015.7244958","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244958","url":null,"abstract":"Physical security of wireless sensor nodes cannot be provided because making sensor nodes tamperproof is prohibitively expensive. Due to this lack of physical security, intruders can easily compromise one or more sensor nodes to subvert network operations bypassing encryption and password security systems. Trust and reputation systems have been recently suggested as an effective security mechanism to overcome the shortcomings of cryptography-based schemes in securing wireless sensor networks (WSNs). Although researchers have been studying the problem of trust modeling and management in WSNs for over a decade, their focus was on trust based only on reputation which is by itself not sensitive enough to perceive suddenly spoiled nodes that may launch intelligent attacks against a trust-establishment mechanism. In this paper, we present a Trust Model based on Risk evaluation (TMR) to effectively deal with conflicting behaviors of malicious nodes. Unfortunately, risk factor evaluation can make the trust model more reliable because it becomes more sensitive to on-off attack.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"4 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133016932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A strong-dominance-based approach for refining the skyline","authors":"Hamiche Mahmoud, D. Habiba, A. Hadjali","doi":"10.1109/ISPS.2015.7244970","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244970","url":null,"abstract":"This paper addresses the problem of refining large skylines by introducing a new dominance relationship. Skyline queries are powerful tool to capture user preferences. However in some contexts, the skyline is too large to give any useful insight to the user. In order to solve this problem, we introduce a strong dominance relationship that relies on the relation called “much preferred”. This leads to a new extension called MPS (Must Preferred Skyline) to find the most interesting skyline tuples. Furthermore, we propose a new algorithm to compute MPS efficiently. Extensive experiments demonstrate the effectiveness of our extension and the performance of the proposed algorithm.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"27 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132609829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy efficient routing for Mobile underwater wireless sensor networks","authors":"Sihem Souiki, M. Hadjila, M. Feham","doi":"10.1109/ISPS.2015.7244965","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244965","url":null,"abstract":"Similar to the terrestrial sensor networks, the design of underwater wireless sensor networks (UWSN) has several challenges such as limited bandwidth, defective underwater channels and high propagation delay. Another primordial problem in UWSN is energy resource depletion of sensor node, which cannot be recharged; also solar energy cannot be exploited. In the coming years the number of sensor used in UWSN will be increased, thus our motivation of this study was to propose a routing algorithm for energy-constrained underwater system environments. In this paper two new clustering algorithms are proposed for Mobile underwater wireless sensor networks KEER and its enhanced version EKEER that aim to extend the network's lifetime. In both the algorithms, k-means clustering is used in the clustering phase. In the CH-selection step, the cluster head is elected initially based on the closeness to the center of the cluster, then the node having the higher residual energy elects itself as a cluster head in the next rounds. The extended version of KEER algorithm use a multihop transmission between the CHs and underwater sink and this brought significant improvement in terms of energy consumption. These algorithms are extensively simulated using random mobility model, with different speeds to evaluate their performance. Simulation results show that both KEER and EKEER are successful in achieving their goals.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117036942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of locality-awareness solutions in mobile DHT systems","authors":"Sarra Cherbal, Abdellah Boukerram, Abdelhak Boubetra","doi":"10.1109/ISPS.2015.7244963","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244963","url":null,"abstract":"Structured peer-to-peer (P2P) systems showed over time a high performance to P2P users since their appearance. They are no longer restricted to wired networks but they are also applied on mobile devices in some recent researches in which the characteristics of mobility and wireless networks must be taken into account. The existing P2P protocols are experienced by the nonconsideration of the physical topology in the construction of the overlay, i.e. the overlay is not aware of its underlying physical networks which results a redundant traffic and high end-to-end latency. The solution of this problem called locality-awareness. In this paper, we discuss and compare available works on locality-awareness in DHT-Based mobile systems, mentioning its methods and advantages provided to both MANET (Mobile Ad-hoc Network) and cellular networks.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126930500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crowd-voting-based group recommender systems","authors":"Samia Boulkrinat, A. Hadjali, A. Mokhtari","doi":"10.1109/ISPS.2015.7244973","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244973","url":null,"abstract":"In this paper, we deal with group recommendations where the task is to choose a sequence of natural attractions that better matches the expectation of a group of tourists. We show in this setting, that the crowd support in selecting potential alternatives, may help members to preserve the harmony of their group and not deviating too much from each other as well. Taking into consideration each member preferences, we tackle the consensus joint decision as a voting process that builds a majority opinion about a sequence of the most interesting natural attractions to visit by the group. Beyond consensus joint decision, it's possible afterwards to perform better group satisfaction by improving the collective gain based on a likewise genetic mutation operation. Preliminary experimental results show that the proposed approach may outperform better when there is a higher heterogeneity between group members voting.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131175776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hamida Bouaziz, Samir Chouali, A. Hammad, H. Mountassir
{"title":"Compatibility verification of SysML blocks using hierarchical interface automata","authors":"Hamida Bouaziz, Samir Chouali, A. Hammad, H. Mountassir","doi":"10.1109/ISPS.2015.7245002","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7245002","url":null,"abstract":"The objective of this paper is to propose an approach to formalize and verify the compatibility between SysML blocks, and to help in making decision about the possibility of assembling these blocks. We specify the architecture of the system using SysML internal block diagrams. To model the interaction between blocks with a convivial manner, we propose HPSM (Hierarchical Protocol State Machine) diagram. In order to permit the verification of such interactions, we perform a translation of HPSMs into HIA-ILTs (Hierarchical Interface Automata with Inter-Level Transitions), a variant of interface automata (IA) which we propose for this purpose. Our major objective is to benefit from the hierarchy which is present in HIA-ILTs. Thus, we have adapted the existing approaches of compatibility verification based on IAs to be applicable on the HIA-ILTs. However, in order to avoid the flattening of the entire HIA-ILT, we propose a preliminary phase that allows selecting the composite states to flatten. The aim behind this is to alleviate the verification phase. Our approach is illustrated by a case study, where we demonstrate the expressiveness of the HPSM and the HIA-ILT, and we show how the hierarchy and the abstraction help to reduce the complexity of verification.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129494295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}