{"title":"Optimization of the Radar Ambiguity Function-Application to Chaotic Sequences: Invited Paper","authors":"Z. Jemaa, S. Marcos, S. Belghith","doi":"10.1109/wincom47513.2019.8942484","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942484","url":null,"abstract":"In this paper we propose a statistical approach for the optimization of the phased codes used in radar. By considering each code as a realization of a random variable we show that we can build good codes if the distribution of the random variable is suitably chosen. We then consider sequences generated by the skew tent map and we show that for some values of the bifurcation parameter the invariant probability density coincides with the desired one. To confirm this idea we compute the maximal peak of the ambiguity function outside zero relative to the bifurcation parameter of the skew tent map.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134569561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved security intrusion detection using intelligent techniques","authors":"C. Leghris, Ouafae Elaeraj, É. Renault","doi":"10.1109/wincom47513.2019.8942553","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942553","url":null,"abstract":"Nowadays, the information systems security is a crucial issue for the survival of any company, so this justifies the use of intrusion detection systems (IDS) or the intrusion prevention systems (IPS). These systems are essentially based on the analysis of the network data content (frames), in search of traces of known attacks. Currently, IDS/IPS become the main element of security networks and hosts, they can both detect and respond to an attack in real time or off-line. Even this, having a completely secure network is practically impossible. In this article, we try to propose an improvement of intrusion detection systems based on Machine Learning techniques. These rapidly expanding techniques have shown that predictions and machine learning could be improved, which could significantly improve the reliability of detection against polymorphic and unknown threats. Simulation results showed that security intrusion detection is improved with the use of Machine Learning techniques.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132357560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Short term solar irradiance forecasting using artificial neural network for a semi-arid climate in Morocco","authors":"Omaima El Alani, H. Ghennioui, A. Ghennioui","doi":"10.1109/wincom47513.2019.8942412","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942412","url":null,"abstract":"Knowledge of irradiance with high accuracy is of paramount importance for monitoring planning and for better exploitation and distribution of photovoltaic (PV) energy. Different methods have been developed to accurately forecast solar irradiance, in this study, we applied multilayer perception to predict GHI (Global Horizontal Irradiance) for a hot semiarid climate in Benguerir, Morocco. Ground measurements of several meteorological variables and the GHI from the meteorological station installed at the green energy park in Benguerir were used to build the database, different model architectures with various inputs were tested to choose the most efficient model. To evaluate the performance of the models we used the nMBE (normalized Mean Bias Error), nRMSE (normalized Root Mean Square Error), and CC (Correlation Coefficient). The results favored the MLP (Multilayer Perceptron) with 3 inputs and7 neurons in the hidden layer. The final model was experimented to predict GHI for clear and cloudy days, nMBE, nRMSE and CC obtained are respectively (-0.051%, 0.10% and 0.99) for clear days, and (0.14%,0.39% and 0.96%) for cloudy days.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130069845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of OLSR Protocol under MPR Attack in Progressive Size Grid MANET","authors":"Abderrahim Hajji Soualfi, S. Agoujil, Y. Qaraai","doi":"10.1109/wincom47513.2019.8942557","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942557","url":null,"abstract":"Mobile Ad-hoc NETwork (MANET) is a collection of mobile devices which interchange information without the use of predefined infrastructures or central administration. It is employed in many domains such as military and commercial sectors, data and sensors networks, low level applications, etc. The important constraints in this network are the limitation of bandwidth, processing capabilities and battery life. The choice of an effective routing protocol is primordial. From many routing protocols developed for MANET, OLSR protocol is a widely-used proactive routing protocol which diffuses topological information periodically. Thus, every node has a global vision of the entire network. The protocol assumes, like the other protocols, that the nodes cooperate in a trusted environment. So, all control messages are transmitted (HELLO messages) to all 1-hop neighbor nodes or broadcasted (TC and MID messages) to the entire network in clear. However, a node, which listens to OLSR control messages, can exploit this property to lead an attack. In this paper, we investigate on MultiPoint Relay (MPR) attack considered like one of the efficient OLSR attacks by using a simulation in progressive size gridMANET.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130073723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Time Frequency Tensor Framework for DOA Estimation: Application to MIMO Systems","authors":"L. Hachad, F. Mrabti, H. Ghennioui, M. Zouak","doi":"10.1109/wincom47513.2019.8942512","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942512","url":null,"abstract":"In this paper, we show that the DOA estimation problem can be solved through a tensor representation of the non-unitary joint diagonalization of spatial quadratic timefrequency. We use an approach to select time-frequency points to construct the set of matrices forming a third-order tensor. Then, the determination of DOAs is solved by Parallel Factor analysis. The main advantage of this method is that it does not require any whitening stage, and thus, it is intended to work even with a class of correlated signals. Numerical simulations are provided in order to illustrate the effectiveness and behavior of the proposed approach.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131411617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nahid Eddermoug, A. Mansour, M. Sadik, Essaid Sabir, Mohamed Azmi
{"title":"Klm-PPSA: Klm-based profiling and preventing security attacks for cloud environments: Invited Paper","authors":"Nahid Eddermoug, A. Mansour, M. Sadik, Essaid Sabir, Mohamed Azmi","doi":"10.1109/wincom47513.2019.8942509","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942509","url":null,"abstract":"Cloud computing is the newly emerged technology adopted by many organizations due to its different benefits. Unfortunately, despite all the benefits offered by the cloud, there are certain concerns regarding the security issues related to the cloud platform which can threaten its widespread adoption. In this study, we suggest a scalable model to profile and prevent security attacks in the application layer of a cloud environment using an accurate and interpretable machine learning algorithm called regularized class association rules. The proposed model is based, first, on three additional security factors $(k, l$ and $m)$, second, on the traditional authentication methods such as passwords and biometrics including keystroke to grant access to the cloud services/resources for an authorized user. Moreover, a case study of the proposal is given in order to validate the model and its usefulness. Eventually, a simulation was done to test the model performances.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114810407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast-OFDM Transmission with Duobinary 3-PSK Modulation: Invited Paper","authors":"Liyan Zhu, T. Xu, I. Darwazeh","doi":"10.1109/wincom47513.2019.8942502","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942502","url":null,"abstract":"This paper investigates duobinary signals and their applications in non-orthogonal multi-carrier systems to enhance spectral efficiency. In duobinary transmission schemes, the signal spectrum is reshaped by introducing controlled correlation, which can be eliminated at the duobinary decoder. For the first time, we propose the idea of combining duobinary transmission technique and the fast orthogonal frequency division multiplexing (Fast-OFDM) system with three subcarriers, with experimental results presented. The proposed system is capable of achieving three times the data rate of single-carrier ASK scheme with the same bandwidth. Results show that bit error rate (BER) performance of the proposed duobinary-based Fast-OFDM system is slightly worse than the ASK system. In addition, we also tested various 3-PSK constellation patterns designed for the duobinary signal to achieve performance improvement.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121248792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposed Solutions for Smart Traffic Lights using Machine Learninig and Internet of Thing","authors":"Imad El Hassak, A. Addaim","doi":"10.1109/wincom47513.2019.8942430","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942430","url":null,"abstract":"The Moroccan cities today have a great development at the population level and meanwhile cars are one of the most used and preferable vehicles for users to travel inside the Moroccan cities. These two elements have led the cities roads to be overloaded by vehicles and, consequently, have increased both the expected travel time and the number of accidents in intersections. To come out with solutions to these problems, several traffic management systems have been installed in many cities all over the world such as TRANSYT, SCCOT, SCATS. In general, to optimize the waiting time, the proposed solutions have aimed to optimize the following three elements; time cycle, green light time, and phase. In this article, we will propose some solutions integrating new techniques such as Internet of Things (IoT), Machine Learning and CCTV (Closed Circuit TeleVision) System in order to optimize these elements.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"55 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131830606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposed Architecture of e-health IOT","authors":"Imam Alihamidi, A. Madi, A. Addaim","doi":"10.1109/wincom47513.2019.8942524","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942524","url":null,"abstract":"According to the ABI Research Company, a significant increase in the number of connected objects and this will lead to the emergence of new services or challenges in all areas of the IoT (Internet of Things). In order to meet the new needs or challenges, we have found that it's necessary to review the previously proposed architectures in the literature, in order to make technological improvements. Indeed, in this paper, we propose a secure architecture based on Blockchain technology, scalable with the use of Fog computing technology and allowing the processing and storage of data using a cloud. In addition, the proposed architecture is easy to deploy due to its three-layers: perception layer, network layer and application layer. We also describe the main challenges for the prototyping of the proposed architecture.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132486487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}