Z. El-Bazzal, M. Kadoch, B. Agba, F. Gagnon, M. Bennani
{"title":"A Flexible Weight Based Clustering Algorithm in Mobile Ad hoc Networks","authors":"Z. El-Bazzal, M. Kadoch, B. Agba, F. Gagnon, M. Bennani","doi":"10.1109/ICSNC.2006.2","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.2","url":null,"abstract":"Clustering has been proven to be a promising approach for mimicking the operation of the fixed infrastructure and managing the resources in multi-hop networks. In order to achieve good performance, the formation and maintenance procedure of clusters should operate with minimum overhead, allowing mobile nodes to join and leave without perturbing the membership of the cluster and preserving current cluster structure as much as possible. In this paper, we propose a Flexible Weight Based Clustering Algorithm (FWCA) in Mobile Ad hoc Networks. The goals are yielding low number of clusters, maintaining stable clusters, minimizing the number of invocations for the algorithm and maximizing lifetime of mobile nodes in the system. Through simulations we have compared the performance of our algorithm with that of WCA in terms of the number of clusters formed, number of re-affiliations, number of states transitions on each clusterhead and number of clusterheads changes. The results demonstrate the superior performance of the proposed algorithm.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122739051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile agent communication scheme","authors":"M. Bernich, F. Mourlin","doi":"10.1109/ICSNC.2006.55","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.55","url":null,"abstract":"This paper presents a communication scheme for flexible and adaptive mobile agent system (or community of agent). The scheme associates each mobile agent with a set of roles, each of them belong to a communication layer. This allows the decoupling between the roles and physical locations or responsibilities of the mobile agents. Thus, the messages are typed by the layer that supports them. By separating the concerns of locating the mobile agent and delivering the message to the agent, we create a flexible protocol of data exchange.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117194299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forecasting Unstable Policy Enforcement","authors":"J. Baliosian, A. Devitt","doi":"10.1109/ICSNC.2006.40","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.40","url":null,"abstract":"Policy-based network management (PBNM) is a promising but not yet delivering discipline aimed at automating network management decisions based on expert knowledge and strategic business objectives. One of the issues scarcely addressed in PBNM is the stability of the managed system as the result of the dynamic interaction between the ¿natural¿ network behaviour and the autonomous management decision making. Yet this issue is central to the design of a self-management networking system comprised of autonomous entities making decisions driven by policies with often unknown consequences. Decisions made by one entity may change the context and configuration of other autonomous entities which may in turn react changing the context and configuration of the first entity triggering an unbounded chain of re-configuration actions. It is possible to model obligation policies and their constraints with finite state transducers (FST). It is also possible to learn patterns of recurrent behaviour using Bayesian networks (BN), a structurally similar kind of graph. The method presented in this paper analytically composes both finite state machines to derive predictions of the consequences of enforcing a given policy improving system stability.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127955311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TCP Based Resource Allocation Method for Base Station Diversity System","authors":"K. Naito, K. Mori, Hideo Kobayashi","doi":"10.1109/ICSNC.2006.68","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.68","url":null,"abstract":"This paper proposes an adaptive wireless link allocation technique based on the characteristic of TCP (Transmission Control Protocol) and system traffic. While previous studies of allocation methods considered a single wireless link communication, the goal of this study is to examine the use of multiple wireless links and to get them access the Internet from wireless terminals. By employing multiple wireless links, TCP performance is improved significantly. But the improvement depends on the wireless environment. Although Internet applications apply some network protocols such as TCP, UDP, etc., the allocation method should take into account some other protocols. The proposed system allocates several wireless links to wireless terminal. This allocation is based on the estimated TCP throughput and current traffic of each base station. The current traffic of each base station, which includes many network protocol¿s flows, is considered by the system. Our allocation method not only considers the effect of TCP, but it also considers the effect on other protocols. In addition, wireless links are preferentially assigned to the wireless terminal that has the largest performance improvement per wireless link. Therefore, the improvement in the whole system performance compared with the previous technique can be easily achieved. This achievement is fulfilled in spite of the allocation with a fixed threshold value in the conventional scheme.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131235608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Jazz Sebastian Bach: A GA System for Music Style Modification","authors":"D. Tzimeas, E. Mangina","doi":"10.1109/ICSNC.2006.49","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.49","url":null,"abstract":"Genetic algorithms (GAs) have successfully been employed in a wide range of artificial intelligence problems. This paper reviews the use of GAs in the area of art creativity and focuses on the connection between the human creativity procedure and the operators of selection-mutation-crossover in a simple GA trying to outline a new algorithmic analogue. It presents \"Jazz Sebastian Bach\", a novel GA-based computational music system that performs a style modification of a J. S. Bach theme to a Jazz melody. The system's sources of innovation are addressed and exemplified, as is an evaluation of its outputs. The paper concludes with a summary of the main findings and discusses the potential application of the system in the areas of computer-assisted composition and music education.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122213105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of a Time-Threshold Based Bandwidth Allocation Scheme for Data Calls in Cellular Networks","authors":"I. Candan, M. Salamah","doi":"10.1109/ICSNC.2006.59","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.59","url":null,"abstract":"In this paper, we developed an analytical model of a time-threshold based bandwidth allocation scheme for data calls in cellular networks. The scheme is based on monitoring the elapsed real time of handoff calls and according to a time threshold parameter, handoff calls are either prioritized or treated as new calls. The scheme is modeled using a onedimensional markov chain and numerical analysis is presented to estimate blocking probabilities of new calls, dropping probabilities of handoff calls and system utilization. The scheme is simulated under different network conditions. It is observed that analytical results closely match the simulation results. The results show that the proposed scheme yields a considerable enhancement in terms of performance/cost ratio when compared with the conventional schemes.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123446660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Localization with Power Control in Wireless Sensor Networks","authors":"Wen-Hwa Liao, Yu-Chee Lee","doi":"10.1109/ICSNC.2006.51","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.51","url":null,"abstract":"Localization is an important topic in wireless sensor networks because sensor nodes are randomly scattered over a region and they get connected into network on their own. Adjusting transmission power levels has an important impact on energy efficiency and network lifetime in wireless sensor networks. In this work, we proposed a localization scheme with power control in a wireless sensor network. Each node can transmit beacon packet in different power levels. Whenever a node receives beacon packets transferred in different power levels, it will adaptively select beacon packet to estimate distance to the landmark. When a sensor node has estimated the distances to three landmarks, it can compute its location by triangulation. Simulation results show that the proposed scheme can improve the error rate of localization.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124348113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Requirement and Modeling Driven Security Evaluation","authors":"R. Savola","doi":"10.1109/ICSNC.2006.72","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.72","url":null,"abstract":"Development of the information security requirements of practical telecommunications and software-intensive systems is typically at an inadequate level and relies heavily on the experience of the security professionals. Security requirements are in the focus in all phases of security engineering. Obviously, automated approaches are needed in this field. We here introduce a framework for security evaluation based on security requirement definition, behavior modeling and evidence collection.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132642176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"System capacity in OFDMA-based WiMAX","authors":"C. Tarhini, T. Chahed","doi":"10.1109/ICSNC.2006.67","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.67","url":null,"abstract":"In this paper, we study the capacity of broadband wireless OFDMA-based WiMAX systems, in the presence of both constant-bit-rate streaming traffic as well as elastic one, under a dynamic configuration wherein users come to the system and leave it after a finite duration. This duration is function of the resources they obtain for the case of elastic flows; it is not for voice ones. Using Markovian analysis, we calculate several performance measures, such as the blocking probability and mean transfer time, using exact and approximate, quasi-stationary-based, solutions. We eventually show numerically the performance of such a system under different admission figures.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"4 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132940155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Cell Coverage Control for Power Saving in IEEE802.16 Mobile MultihopRelay Systems","authors":"Changhoi Koo, Y. Chung","doi":"10.1109/ICSNC.2006.33","DOIUrl":"https://doi.org/10.1109/ICSNC.2006.33","url":null,"abstract":"There have been worked IEEE802.16 TGj(Task Group j) to build-up the Mobile Multihop Relay(MMR) network based on the existing IEEE802.16d/e system which can support the fixed and mobile network both. In this paper, we introduce the standard work of IEEE802.16TGj MMR group and propose two dynamic coverage control schemes of Relay Systems(RS) for effective power saving scheme, which can provide flexible cell coverage variation with minimal usage of power consumption based on the IEEE802.16TGj standardization.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133761241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}