2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)最新文献

筛选
英文 中文
Optimization of the Radar Ambiguity Function-Application to Chaotic Sequences: Invited Paper 雷达模糊函数的优化——在混沌序列中的应用
2019 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2019-10-01 DOI: 10.1109/wincom47513.2019.8942484
Z. Jemaa, S. Marcos, S. Belghith
{"title":"Optimization of the Radar Ambiguity Function-Application to Chaotic Sequences: Invited Paper","authors":"Z. Jemaa, S. Marcos, S. Belghith","doi":"10.1109/wincom47513.2019.8942484","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942484","url":null,"abstract":"In this paper we propose a statistical approach for the optimization of the phased codes used in radar. By considering each code as a realization of a random variable we show that we can build good codes if the distribution of the random variable is suitably chosen. We then consider sequences generated by the skew tent map and we show that for some values of the bifurcation parameter the invariant probability density coincides with the desired one. To confirm this idea we compute the maximal peak of the ambiguity function outside zero relative to the bifurcation parameter of the skew tent map.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134569561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved security intrusion detection using intelligent techniques 使用智能技术改进安全入侵检测
2019 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2019-10-01 DOI: 10.1109/wincom47513.2019.8942553
C. Leghris, Ouafae Elaeraj, É. Renault
{"title":"Improved security intrusion detection using intelligent techniques","authors":"C. Leghris, Ouafae Elaeraj, É. Renault","doi":"10.1109/wincom47513.2019.8942553","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942553","url":null,"abstract":"Nowadays, the information systems security is a crucial issue for the survival of any company, so this justifies the use of intrusion detection systems (IDS) or the intrusion prevention systems (IPS). These systems are essentially based on the analysis of the network data content (frames), in search of traces of known attacks. Currently, IDS/IPS become the main element of security networks and hosts, they can both detect and respond to an attack in real time or off-line. Even this, having a completely secure network is practically impossible. In this article, we try to propose an improvement of intrusion detection systems based on Machine Learning techniques. These rapidly expanding techniques have shown that predictions and machine learning could be improved, which could significantly improve the reliability of detection against polymorphic and unknown threats. Simulation results showed that security intrusion detection is improved with the use of Machine Learning techniques.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132357560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Short term solar irradiance forecasting using artificial neural network for a semi-arid climate in Morocco 利用人工神经网络预测摩洛哥半干旱气候的短期太阳辐照度
2019 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2019-10-01 DOI: 10.1109/wincom47513.2019.8942412
Omaima El Alani, H. Ghennioui, A. Ghennioui
{"title":"Short term solar irradiance forecasting using artificial neural network for a semi-arid climate in Morocco","authors":"Omaima El Alani, H. Ghennioui, A. Ghennioui","doi":"10.1109/wincom47513.2019.8942412","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942412","url":null,"abstract":"Knowledge of irradiance with high accuracy is of paramount importance for monitoring planning and for better exploitation and distribution of photovoltaic (PV) energy. Different methods have been developed to accurately forecast solar irradiance, in this study, we applied multilayer perception to predict GHI (Global Horizontal Irradiance) for a hot semiarid climate in Benguerir, Morocco. Ground measurements of several meteorological variables and the GHI from the meteorological station installed at the green energy park in Benguerir were used to build the database, different model architectures with various inputs were tested to choose the most efficient model. To evaluate the performance of the models we used the nMBE (normalized Mean Bias Error), nRMSE (normalized Root Mean Square Error), and CC (Correlation Coefficient). The results favored the MLP (Multilayer Perceptron) with 3 inputs and7 neurons in the hidden layer. The final model was experimented to predict GHI for clear and cloudy days, nMBE, nRMSE and CC obtained are respectively (-0.051%, 0.10% and 0.99) for clear days, and (0.14%,0.39% and 0.96%) for cloudy days.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130069845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance Analysis of OLSR Protocol under MPR Attack in Progressive Size Grid MANET 渐进式网格MANET中MPR攻击下的OLSR协议性能分析
2019 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2019-10-01 DOI: 10.1109/wincom47513.2019.8942557
Abderrahim Hajji Soualfi, S. Agoujil, Y. Qaraai
{"title":"Performance Analysis of OLSR Protocol under MPR Attack in Progressive Size Grid MANET","authors":"Abderrahim Hajji Soualfi, S. Agoujil, Y. Qaraai","doi":"10.1109/wincom47513.2019.8942557","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942557","url":null,"abstract":"Mobile Ad-hoc NETwork (MANET) is a collection of mobile devices which interchange information without the use of predefined infrastructures or central administration. It is employed in many domains such as military and commercial sectors, data and sensors networks, low level applications, etc. The important constraints in this network are the limitation of bandwidth, processing capabilities and battery life. The choice of an effective routing protocol is primordial. From many routing protocols developed for MANET, OLSR protocol is a widely-used proactive routing protocol which diffuses topological information periodically. Thus, every node has a global vision of the entire network. The protocol assumes, like the other protocols, that the nodes cooperate in a trusted environment. So, all control messages are transmitted (HELLO messages) to all 1-hop neighbor nodes or broadcasted (TC and MID messages) to the entire network in clear. However, a node, which listens to OLSR control messages, can exploit this property to lead an attack. In this paper, we investigate on MultiPoint Relay (MPR) attack considered like one of the efficient OLSR attacks by using a simulation in progressive size gridMANET.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130073723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Time Frequency Tensor Framework for DOA Estimation: Application to MIMO Systems DOA估计的时频张量框架:在MIMO系统中的应用
2019 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2019-10-01 DOI: 10.1109/wincom47513.2019.8942512
L. Hachad, F. Mrabti, H. Ghennioui, M. Zouak
{"title":"A Time Frequency Tensor Framework for DOA Estimation: Application to MIMO Systems","authors":"L. Hachad, F. Mrabti, H. Ghennioui, M. Zouak","doi":"10.1109/wincom47513.2019.8942512","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942512","url":null,"abstract":"In this paper, we show that the DOA estimation problem can be solved through a tensor representation of the non-unitary joint diagonalization of spatial quadratic timefrequency. We use an approach to select time-frequency points to construct the set of matrices forming a third-order tensor. Then, the determination of DOAs is solved by Parallel Factor analysis. The main advantage of this method is that it does not require any whitening stage, and thus, it is intended to work even with a class of correlated signals. Numerical simulations are provided in order to illustrate the effectiveness and behavior of the proposed approach.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131411617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Klm-PPSA: Klm-based profiling and preventing security attacks for cloud environments: Invited Paper Klm-PPSA:基于klm的分析和防止云环境的安全攻击:特邀论文
2019 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2019-10-01 DOI: 10.1109/wincom47513.2019.8942509
Nahid Eddermoug, A. Mansour, M. Sadik, Essaid Sabir, Mohamed Azmi
{"title":"Klm-PPSA: Klm-based profiling and preventing security attacks for cloud environments: Invited Paper","authors":"Nahid Eddermoug, A. Mansour, M. Sadik, Essaid Sabir, Mohamed Azmi","doi":"10.1109/wincom47513.2019.8942509","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942509","url":null,"abstract":"Cloud computing is the newly emerged technology adopted by many organizations due to its different benefits. Unfortunately, despite all the benefits offered by the cloud, there are certain concerns regarding the security issues related to the cloud platform which can threaten its widespread adoption. In this study, we suggest a scalable model to profile and prevent security attacks in the application layer of a cloud environment using an accurate and interpretable machine learning algorithm called regularized class association rules. The proposed model is based, first, on three additional security factors $(k, l$ and $m)$, second, on the traditional authentication methods such as passwords and biometrics including keystroke to grant access to the cloud services/resources for an authorized user. Moreover, a case study of the proposal is given in order to validate the model and its usefulness. Eventually, a simulation was done to test the model performances.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114810407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fast-OFDM Transmission with Duobinary 3-PSK Modulation: Invited Paper 基于双二进制3-PSK调制的快速ofdm传输:特邀论文
2019 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2019-10-01 DOI: 10.1109/wincom47513.2019.8942502
Liyan Zhu, T. Xu, I. Darwazeh
{"title":"Fast-OFDM Transmission with Duobinary 3-PSK Modulation: Invited Paper","authors":"Liyan Zhu, T. Xu, I. Darwazeh","doi":"10.1109/wincom47513.2019.8942502","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942502","url":null,"abstract":"This paper investigates duobinary signals and their applications in non-orthogonal multi-carrier systems to enhance spectral efficiency. In duobinary transmission schemes, the signal spectrum is reshaped by introducing controlled correlation, which can be eliminated at the duobinary decoder. For the first time, we propose the idea of combining duobinary transmission technique and the fast orthogonal frequency division multiplexing (Fast-OFDM) system with three subcarriers, with experimental results presented. The proposed system is capable of achieving three times the data rate of single-carrier ASK scheme with the same bandwidth. Results show that bit error rate (BER) performance of the proposed duobinary-based Fast-OFDM system is slightly worse than the ASK system. In addition, we also tested various 3-PSK constellation patterns designed for the duobinary signal to achieve performance improvement.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121248792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposed Solutions for Smart Traffic Lights using Machine Learninig and Internet of Thing 利用机器学习和物联网为智能交通灯提出解决方案
2019 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2019-10-01 DOI: 10.1109/wincom47513.2019.8942430
Imad El Hassak, A. Addaim
{"title":"Proposed Solutions for Smart Traffic Lights using Machine Learninig and Internet of Thing","authors":"Imad El Hassak, A. Addaim","doi":"10.1109/wincom47513.2019.8942430","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942430","url":null,"abstract":"The Moroccan cities today have a great development at the population level and meanwhile cars are one of the most used and preferable vehicles for users to travel inside the Moroccan cities. These two elements have led the cities roads to be overloaded by vehicles and, consequently, have increased both the expected travel time and the number of accidents in intersections. To come out with solutions to these problems, several traffic management systems have been installed in many cities all over the world such as TRANSYT, SCCOT, SCATS. In general, to optimize the waiting time, the proposed solutions have aimed to optimize the following three elements; time cycle, green light time, and phase. In this article, we will propose some solutions integrating new techniques such as Internet of Things (IoT), Machine Learning and CCTV (Closed Circuit TeleVision) System in order to optimize these elements.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"55 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131830606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Proposed Architecture of e-health IOT 电子医疗物联网架构建议
2019 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2019-10-01 DOI: 10.1109/wincom47513.2019.8942524
Imam Alihamidi, A. Madi, A. Addaim
{"title":"Proposed Architecture of e-health IOT","authors":"Imam Alihamidi, A. Madi, A. Addaim","doi":"10.1109/wincom47513.2019.8942524","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942524","url":null,"abstract":"According to the ABI Research Company, a significant increase in the number of connected objects and this will lead to the emergence of new services or challenges in all areas of the IoT (Internet of Things). In order to meet the new needs or challenges, we have found that it's necessary to review the previously proposed architectures in the literature, in order to make technological improvements. Indeed, in this paper, we propose a secure architecture based on Blockchain technology, scalable with the use of Fog computing technology and allowing the processing and storage of data using a cloud. In addition, the proposed architecture is easy to deploy due to its three-layers: perception layer, network layer and application layer. We also describe the main challenges for the prototyping of the proposed architecture.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132486487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信