B. Chaima, Farouvan Kamel Mohame, Bouki Hacene Sofiane
{"title":"Cluster based key management in VANET networks","authors":"B. Chaima, Farouvan Kamel Mohame, Bouki Hacene Sofiane","doi":"10.1109/ISPS.2015.7244961","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244961","url":null,"abstract":"Vehicular networks VANET announce as the communication networks of the future, where the mobility is the main idea. These networks should be able to interconnect vehicles. The optimal goal is that these networks will contribute to safer roads and more effective in the future by providing timely information to drivers and concerned authorities. They are therefore vulnerable to many types of attacks. Their success will undoubtedly confidence they bring to their users. The Traditional model does not meet with the new requirements of such networks where the characteristics resemble more of social models. In this paper, we present the various solutions proposed by different research teams working on the distribution of certificates and our proposal to adopt a new method of distributing certificates in VANET.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124918611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Masmoudi, L. K. El Boudadi, A. Loukil, Amine Dahane, M. Khelf
{"title":"The teleoperation of a mobile robot in a network without a quality of service guaranteed","authors":"M. Masmoudi, L. K. El Boudadi, A. Loukil, Amine Dahane, M. Khelf","doi":"10.1109/ISPS.2015.7244962","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244962","url":null,"abstract":"The fluctuation of the time delay in a communication network is one of the obstacles for many real-time applications such as teleoperation of mobile robots. To solve this problem, we propose in this paper an architecture that allows to predict in real-time the Round Trip Time (RTT) and an improved speed limit module (ISLM), in order to control the mobile robot speed and reach the desired destination successfully and safely. To overcome the long delays of video feedback from the slave site, we also used the virtual reality (VR) to simulate and monitor the current state of the teleoperated site in real-time and get a better control. We validate our work by implementing the proposed architecture in order to teleoperate our mobile robot, the pioneer 3AT, over various geographically distant locations. The obtained results confirm the robustness and effectiveness of the proposed architecture.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122024203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dishonest recommendation attacks in wireless sensor networks: A survey","authors":"Farah Khedim, Nabila Labraoui, M. Lehsaini","doi":"10.1109/ISPS.2015.7244964","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244964","url":null,"abstract":"Trust and reputation models in wireless sensor networks (WSN) have been recently proposed by many researches as an innovative solution for guaranteeing an effective security mechanism. They play an important role in defending WSNs such as securing routing and data forwarding protocols, against insider attacks. However, despite of the advantages, reputation models face with several security issues, especially in the case of dishonest recommendation attacks, i.e. slandering, self-promoting and collusion where participants might give recommendations deviated from their real experience. In this paper we survey the current research related to dishonest recommendation attacks in WSNs. We have classified the schemes studied in two main categories: avoiding dishonest recommendations and dealing with dishonest recommendations. We provide an overview and a comparative study of these schemes and highlight the future research directions to address the drawbacks of existing protocols.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122241577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved splat-based ray tracing for point-based objects","authors":"A. Beddiaf, M. C. Babahenini","doi":"10.1109/ISPS.2015.7244984","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244984","url":null,"abstract":"This paper aims to improve the process of photo-realistic images production in matter of quality of the point-based scenes rendered by splats using the ray tracing technique, where we exploit the intrinsic overlap of the splats to get per-pixel shading that is very close to Phong shading (in the case of polygonal meshes), without an additional preprocessing phase (no normal field computation for each splat). Moreover, this work is mainly introduced to have more accurate rendering on the edges and sharp regions. Note that our model does not require point cloud with high density, but they have to be hole-free and closed. The quality of the resulted images proves the efficiency of the proposed approach.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127619931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social big data mining: A survey focused on opinion mining and sentiments analysis","authors":"Imene Guellil, K. Boukhalfa","doi":"10.1109/ISPS.2015.7244976","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244976","url":null,"abstract":"The emergence of social media and the huge amount of data generated by them, has lead researchers to study the possibility of their exploitation in order to identify hidden knowledge. Thus, two areas are attracting more and more interest in the research community, the opinion mining and sentiment analysis. The research papers in this field are increasing rapidly. However, few survey papers have been published in this area. The rare survey papers that have been published focusing on a particular aspect (for example, the sentiment classification techniques, the challenges and application of opinion mining and sentiment analysis, etc.) and don't concern the research work proposed this last two years. We propose, in this paper, a study of 60 recent papers (60 % published between 2013 and 2015) treating the social media mining. We compare this work regarding to several criteria. Finally, we present a table summarizing all studied work. Due to the richness of social media opinions, emotions and sentiments. We focus in this paper on opinion mining and sentiment analysis and show the position of this field in social media mining issues. Then, we describe them in detail by studying the research work on each task in these issues. We will finish by identifying a set of open issues that we will try to propose contributions in our future work.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127492455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accessing linked open data","authors":"Steffen Staab","doi":"10.1109/ISPS.2015.7244956","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244956","url":null,"abstract":"A core objective for linked data is the seamless mash-up of information from different data sources that serve data in an easy-to-deliver, resilient manner. The focus on the ease of serving data, however, puts significant burden on the consumer of linked open data. In particular, the consumer service must manage (i) data source discovery, (ii) data access, (iii) data source availability and (iv) data model and schema. In theory, querying, i.e. either federated querying of SPARQL 1.1 endpoints or link-traversal-based querying, is supposed to provide a layer of abstraction to facilitate data consumption. In practice, we will analyze and find that such querying is very useful, but using standards such as SPARQL 1.1 is far away from solving use case needs of data integration from linked data. We provide an analysis of the issues encountered when accessing linked open data and present our approach to tackle this problem. The approach includes effective and efficient capabilities for querying and programming against linked data sources indexing data in various ways, querying for objects represented in linked data and allowing for programming with them.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134436919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parametric elliptic fourier descriptors for automated extraction of gait features for people identification","authors":"Imed Bouchrika","doi":"10.1109/ISPS.2015.7244988","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244988","url":null,"abstract":"The interest in gait as a biometric is strongly motivated by the urgent necessity for automated recognition systems for surveillance applications and forensic analysis. Many studies have now shown that it is possible to recognize people by the way they walk i.e. Gait. As yet there has been little formal study of people recognition using the kinematic-related gait features. In this research study, we have investigated the use of Elliptic Fourier Descriptor for the temporal markerless extraction of human joints. We describe a model-based method whereby spatial model templates for the human motion are described in a parameterized form using the Elliptic Fourier Descriptors accounting for the different variations of scale and rotation. Gait features include the angular measurements of the legs as well as the spatial displacement of the body trunk. To further refine gait features based on their discriminability, a feature selection algorithm which is applied using a proposed validation-criterion based on the proximity of neighbors. Initial experiments have revealed that gait angular measurements derived from the joint motions mainly the ankle, knee and hip angles embed most of the discriminatory potency for gait identification.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125287035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ouarda Zedadra, Hamid Seridi, Nicolas Jouandeau, G. Fortino
{"title":"A distributed foraging algorithm based on artificial potential field","authors":"Ouarda Zedadra, Hamid Seridi, Nicolas Jouandeau, G. Fortino","doi":"10.1109/ISPS.2015.7244986","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244986","url":null,"abstract":"Simple collections of agents that perform collectively and use distributed control algorithms constitute the interests of swarm robotics. A key issue to improve system performances is to effectively coordinate the team of agents. We present in this paper a multi-agent foraging algorithm called Cooperative-Color Marking Foraging Agents (C-CMFA). It uses the coordination rules of the S-MASA (Stigmergic Multi-Ant Search Area) algorithm to (i) speed up the search process and (ii) allow agents to build an optimal Artificial Potential Field (APF) simultaneously while exploring. To benefit from multiple robots, we add one cooperation rule in the algorithm to attract a large number of agents to the found food. This algorithm constitutes a distributed and synchronous version of the c-marking algorithm. Simulation results in comparison with the c-marking one show the superiority of C-CMFA in different environment configurations.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131418158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}