{"title":"High SNR outage analysis for power efficient multi-relay cooperative networks with ARQ assistance","authors":"Ali Kamouch, A. Chaoub, Z. Guennoun","doi":"10.1109/ISDA.2015.7489201","DOIUrl":"https://doi.org/10.1109/ISDA.2015.7489201","url":null,"abstract":"In this paper we consider a multi relay Decode and Forward (DF) relay network assisted by Hybrid automatic repeat request (HARQ) in a Rayleigh block fading environment. The system uses an incremental relaying strategy in which the best relay is selected to cooperate with source. A Space-Time Block coding (STB) is used for cooperation between source and selected relay to transmit the data to the destination. Relays and destination use maximum ratio combining (MRC) technique to decode the sent message using previously received versions. We derive a closed-form expression of asymptotic outage probability at high Signal-to-Noise Ratio (SNR) regime. We also derive the average delay and throughput in a delay constrained application. The derivation method is based on the Laplace transform, which proves to be a very effective analytical tool when combined with the properties of the special functions. In addition, we investigate the optimum power allocation strategy to minimize the outage probability and consequently maximize the average throughput perceived by the end user. The simulation results show that the obtained analytical bound for the outage probability is very tight at high SNR regime. In addition the proposed power allocation scheme clearly outperforms the equal power allocation.","PeriodicalId":196743,"journal":{"name":"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124654126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud discrimination using K Nearest Neighbors classifier: Application to dataset generated by Sétif RADAR (Algeria) and MSG-SEVIRI satellite images","authors":"F. Mokdad, B. Haddad, Z. Bala, Ilhem Tiblali","doi":"10.1109/ISDA.2015.7489272","DOIUrl":"https://doi.org/10.1109/ISDA.2015.7489272","url":null,"abstract":"Efficient classification depends strongly on the quality of the dataset used in experiments. In this paper, we generated a dataset consists of six spectral features extracted from the MSG-SEVIRI satellite images. Each feature represents the brightness temperature of the corresponding pixel. We are based on meteorological radar images acquired in Sétif region (Algeria) to assign a class to each feature vector, where we take account of the spatial and spectral resolution difference between radar and satellite images. We are interested to the identification of raining clouds, non-raining clouds and absence of clouds. The application of K Nearest Neighbors (KNN) classifier to the dataset generated performs very well. Using Euclidean metric for classifications, the overall accuracy is 99.46% and the Kappa coefficient attaint 99.13%. In order to validate the results obtained experimentally we have performed an in situ validation using eight ground measurements over the north Algeria. By computing different evaluation measure parameters, experimental results demonstrate the efficiency of the proposed methodology in discriminating between raining and non-raining clouds.","PeriodicalId":196743,"journal":{"name":"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130143714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maximal frequent sub-graph mining for malware detection","authors":"Aya Hellal, L. Romdhane","doi":"10.1109/ISDA.2015.7489265","DOIUrl":"https://doi.org/10.1109/ISDA.2015.7489265","url":null,"abstract":"Malware detection has been one of the current computer security topics of great interest. Traditional signature-based malware detection fails to detect variants of known malware or previously unseen malware. To deal with this issue, machine learning and data mining methods have been widely used to counter the obfuscation techniques of attackers by examining the underlying behavior of suspected malware. However, these methods still suffer from the large number of extracted features and the lack of precise specifications which affects badly scanning time and the accuracy of the malware detection process. In this paper, we present an automatic detection method based on graph mining techniques. Maximal frequent subgraphs in a set of code graphs, representing common behaviors with precise specifications in execution files, are extracted and used as features to generate semantic signatures. These semantic signatures are represented by a set of learning models and employed to distinguish malware programs from benign. Experimental results indicate that our method extracts a limited number of interesting features and achieves effective malware detection.","PeriodicalId":196743,"journal":{"name":"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130525865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model driven reverse engineering: Graph modeling for mobiles platforms","authors":"Khalid Lamhaddab, K. Elbaamrani","doi":"10.1109/ISDA.2015.7489261","DOIUrl":"https://doi.org/10.1109/ISDA.2015.7489261","url":null,"abstract":"In this paper, we describe a model driven reverse engineering approach [1] that focuses on graph modeling. This method allows to represent different views of a mobile development platform (physical, technological and semantic) as a graph model format. We expose this concise method: its strengths side meta-modeling and transformation between model graphs. Moreover, we explain especially about Semantic Extraction component illustrated with a case study of reverse engineering from iOS platform to Android platform.","PeriodicalId":196743,"journal":{"name":"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123186400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical modeling of the SLA life cycle in Cloud Computing","authors":"A. Maarouf, A. Marzouk, A. Haqiq","doi":"10.1109/ISDA.2015.7489170","DOIUrl":"https://doi.org/10.1109/ISDA.2015.7489170","url":null,"abstract":"Research in Service level agreements has been of growing interest in the Cloud Computing field. This is due to its pivotal role in solving the trade-off between the benefit of the provider and the interest of the customer. Every SLA has a life cycle and a life time to be managed. The life cycle of SLA consists of several stages that vary according to the SLA. In this paper, we present SLA life cycle in light of the cloud computing domain. The presented SLA life cycle define the sequence of changes of the SLA from the perspective of all parties involved in the contract. Some examples for SLA life cycle are illustrated, in order to show the main phases, structures, processes and entities interactions using UML modeling diagrams. The goal of each phase, the participating actors and their role, the potential dependencies as well as the outcomes of each phase are described in this work.","PeriodicalId":196743,"journal":{"name":"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123280535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clustering impact on group-based traitor tracing schemes","authors":"Faten Chaabane, Maha Charfeddine, C. Amar","doi":"10.1109/ISDA.2015.7489270","DOIUrl":"https://doi.org/10.1109/ISDA.2015.7489270","url":null,"abstract":"According to the ever development of multimedia distribution systems, more than one technique was proposed in the literature to address the copyright protection issue. One key technique was to propose a fingerprinting system based on traitor tracing process to retrieve back the traitorous users who can operate in the mid-way. Some previous works agree upon the fact that users belonging to the same group have more probability to collude together. Several researchers in the tracing traitor field agree upon the fact that constructing a group-based fingerprint should enhance the detection rates of the fingerprinting system. In this paper, we propose to generate a fingerprint having the group property by using a clustering algorithm. We propose to construct a group-based fingerprint according to a DCT-based audio watermarking technique which has proven good robustness and inaudibility results. To show the impact of the classifying algorithm, a set of experimental tests are conducted to check two relevant criteria: the capacity and the security of the group-based fingerprint.","PeriodicalId":196743,"journal":{"name":"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120991809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Benkirane, M. Saadi, M. L. Hasnaoui, A. B. Hssane
{"title":"A new comparative study of ad hoc routing protocol AODV and DSR in VANET environment using simulation tools","authors":"S. Benkirane, M. Saadi, M. L. Hasnaoui, A. B. Hssane","doi":"10.1109/ISDA.2015.7489158","DOIUrl":"https://doi.org/10.1109/ISDA.2015.7489158","url":null,"abstract":"Routing in VANET has been studied and investigated widely in the past few years. Since VANETs are a specific class of ad hoc networks, the commonly used ad hoc routing protocols initially implemented for MANETs have been tested and evaluated for use in a VANET environment. In this paper we study and analyze two mobiles ad-hoc routing protocols AODV and DSR in a VANET environment especially in a City scenario, using simulation tools.","PeriodicalId":196743,"journal":{"name":"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124930817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speech emotion recognition based on Arabic features","authors":"Mohamed Meddeb, H. Karray, A. Alimi","doi":"10.1109/ISDA.2015.7489165","DOIUrl":"https://doi.org/10.1109/ISDA.2015.7489165","url":null,"abstract":"This paper presents the principal phase of extraction and recognition of the basic emotions in the Arabic speech applied to five emotional states were taken into effect; neutral, sadness, fear, anger and happiness. Emotional speech database REGIM_TES [1] was created and evaluated to provide all practical experiences of extraction. The selected descriptors in our study are; Pitch of voice, Energy, MFCCs, Formant, LPC and the spectrogram. Descriptors showed the importance of the Arabic language on the physiological events and the influence of culture on emotional behavior. A comparative study between the kernel functions has enabled us to promote the RBF kernel SVMs multiclass classifier [15] performing the classification phase.","PeriodicalId":196743,"journal":{"name":"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125183867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial neural networks for demand forecasting: Application using Moroccan supermarket data","authors":"Ilham Slimani, Ilhame El Farissi, S. Achchab","doi":"10.1109/ISDA.2015.7489236","DOIUrl":"https://doi.org/10.1109/ISDA.2015.7489236","url":null,"abstract":"The accuracy of sales forecasts in a supply chain is certainly an important key to competitiveness. Because, for any member of the supply chain system, having a clear vision of the future demand affects his planning, his performance so his profit. In the first study of this work, various Artificial Neural Network models were presented and utilized to predict demand of a costumer's product. The training and validating data are provided from a known supermarket in Morocco. In a previous study, the results indicated that the best neural network structure for demand forecasting is the Multi Layer Perceptron, which is by the way, the most commonly used model in the literature. This work focuses on finding the optimal Multi Layer Perceptron structure for demand forecasting. We also present a review of selected works done in the application of game theory and neural networks in the context of management science. The main contribution of our work is the use of neural networks in order to predict the consumer's demand and implement this demand forecasting in a two-echelon supply chain with a game theoretic approach.","PeriodicalId":196743,"journal":{"name":"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122811760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RUDA - Robot for search for human beings in debrits and avalanches","authors":"R. Luza, M. Drahanský, F. Zboril","doi":"10.1109/ISDA.2015.7489264","DOIUrl":"https://doi.org/10.1109/ISDA.2015.7489264","url":null,"abstract":"The paper concerns about prototype of robot aimed on detection and rescue of people in debrits and avalanches. As first the robot is introduced as a chasis that can be extended with modules. Currently available modules are described later in the paper. Finally paper decribes possible use cases and missions for the robot a discusses future improvements and further development of the robot.","PeriodicalId":196743,"journal":{"name":"2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)","volume":"406 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122803803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}