{"title":"Investigating, modeling and evaluating the interface complexity of Web Services","authors":"Litao Deng, Ailin Zhou, Hongchen Guo, Peng Han","doi":"10.1109/CCCA.2011.6031227","DOIUrl":"https://doi.org/10.1109/CCCA.2011.6031227","url":null,"abstract":"this paper emphasizes on the interface complexity — one of the most influential factors affecting Web Services invocation performance. Our ultimate goal is to propose a novel and versatile model to measure the interface complexity. First we introduce the term WSDL2Java Cost to measure the overall cost for converting a WSDL file into server-side Java source code. Then we conduct myriads of experiments to respectively figure out the correlations between parameters, operations, their synthetic effects and the WSDL2Java Cost with various SOAP toolkits. We analyze the experimental results, finding an interesting feature called PODU (Parameter-to-Operation Distribution Unrelated), and introduce a model named WSDL Contour to measure the interface complexity. In order to test our model, we ad hoc refer to more than 9,000 WSDL files on the World Wide Web. In the end, based on our experimental results and the WSDL Contour model, we give some advice on Web Services Interface Design Principle, especially on the Web Services Granularity in the aspect of interface complexity.","PeriodicalId":259067,"journal":{"name":"2011 International Conference on Communications, Computing and Control Applications (CCCA)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127764344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Byzantine-tolerant circle formation by oblivious mobile robots","authors":"S. Souissi, Taisuke Izumi, K. Wada","doi":"10.1109/CCCA.2011.6031485","DOIUrl":"https://doi.org/10.1109/CCCA.2011.6031485","url":null,"abstract":"Consider a system that consists of a group of mobile robots roaming in the two-dimensional plane. Each robot occupies a point in the plane, and is equipped with sensors to observe the positions of the other robots. Each robot proceeds by repeatedly (1) observing the environment, (2) computing a destination based on the observed positions of robots, and (3) moving toward the computed destination. Robots are unable to communicate directly, and can only interact by observing each others' positions. In addition, all robots execute the same deterministic algorithm, however some of them can be Byzantine, and exhibit arbitrary behaviors that are not in accordance with their local algorithms. Finally, robots are oblivious (i.e., stateless), meaning that they can not remember their previous observations and actions. In this model, we address the problem of coordination between these robots from a computational viewpoint, and we focus on a basic coordination problem, namely the Byzantine-tolerant circle formation problem. In other words, we study the feasibility of positioning a group of mobile robots into forming a circle in Byzantine fault model. The contribution of this paper is as follows: Let N be the number of robots in the system, and let ƒ be the number of Byzantine robots. We first show that there exists no algorithm that solves the Byzantine-tolerant circle formation when N ≤ 2ƒ + 2 in a fully synchronous system. On the other hand, when N > 2ƒ + 2, we provide an algorithm in the fully synchronous model. Then, we show that when N ≤ 3ƒ + 2, the problem of Byzantine circle formation has no solution in the semi-synchronous model when robots' activations follow a k-bounded scheduler for k ≥ 2, that is while the slowest robot is activated once, the fastest robot is activated at most k times (k-bounded). Finally, we conjecture that the problem is impossible in general for any N when k ≥ 2 in the semi-synchronous model even for ƒ = 1.","PeriodicalId":259067,"journal":{"name":"2011 International Conference on Communications, Computing and Control Applications (CCCA)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129097919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wafa Ben Hassen, Mériem Afif, Fakhreddine Khelifa, A. Samet
{"title":"A sliding window method for subchannels gain computation in OFDMA wireless systems: Context IEEE 802.16m","authors":"Wafa Ben Hassen, Mériem Afif, Fakhreddine Khelifa, A. Samet","doi":"10.1109/CCCA.2011.6031434","DOIUrl":"https://doi.org/10.1109/CCCA.2011.6031434","url":null,"abstract":"In the IEEE 802.16 recommendations family, the adjacent method for construction of the subchannel is adopted. In order to reduce the system complexity, the available subcarriers are grouped into equal groups of contiguous subcarriers, where each group is called a subchannel. The adaptive modulation and coding schema, AMC, is used in order to maximize the number of bit per symbol. In this case, subcarriers of subchannel present different SNR and the fundamental question is how to choose the best AMC for each subchannel. In this paper, an enhancement algorithm is proposed to response at this question in the context of Orthogonal Frequency Division Multiple Access, OFDMA, wireless systems in the downlink sense. The scheduler located at the base station computes subchannel gain based on the responses frequency dispersion, then the quality of the channel. This gain has a great importance in resource management. Numerical results show that the proposed algorithm outperforms an allocation scheme in terms of a lower BLOC Error Rate (BLER) and a higher system Capacity, compared to others methods.","PeriodicalId":259067,"journal":{"name":"2011 International Conference on Communications, Computing and Control Applications (CCCA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127004490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Mhalla, S. Collart Dutilleul, N. Jerbi, M. Benrejeb, E. Craye
{"title":"Computation algorithm of the exact value of passive robustness in milk manufacturing workshop","authors":"A. Mhalla, S. Collart Dutilleul, N. Jerbi, M. Benrejeb, E. Craye","doi":"10.1109/CCCA.2011.6031535","DOIUrl":"https://doi.org/10.1109/CCCA.2011.6031535","url":null,"abstract":"Developments presented in this paper are devoted to the robustness of manufacturing job-shops with time constraints and assembling tasks. A computing algorithm, of an exact bound of the maximal time disturbances allowed in a given point, is provided. To demonstrate the effectiveness and accuracy of this new algorithm, an industrial example is depicted. The example shows how the proposed algorithm results allow avoiding false alarms and mutually compensate a disturbance which is propagated on two parallel paths.","PeriodicalId":259067,"journal":{"name":"2011 International Conference on Communications, Computing and Control Applications (CCCA)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130731939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomous data gathering mechanism with transmission reduction for wireless sensor networks","authors":"Y. Taniguchi, A. Kanzaki, N. Wakamiya, T. Hara","doi":"10.1109/CCCA.2011.6031443","DOIUrl":"https://doi.org/10.1109/CCCA.2011.6031443","url":null,"abstract":"In this paper, we propose an autonomous and energy-efficient data gathering mechanism with transmission reduction for wireless sensor networks (WSNs). In our proposed mechanism, sensor nodes schedule their message transmission timing in a self-organizing manner such that they can gather sensor data over a whole WSN and transmit that data to a sink node while switching between a sleep state and an active state. In addition, each sensor node determines the redundancy of its sensor data according to overheard messages so that only necessary sensor data are gathered and transmitted to the sink node. Our proposed mechanism does not require additional control messages and enables both data traffic and control traffic to be drastically reduced. Through simulation experiments, we confirmed that the number of message transmissions can be reduced by up to 77% with our proposed mechanism compared to a conventional mechanism.","PeriodicalId":259067,"journal":{"name":"2011 International Conference on Communications, Computing and Control Applications (CCCA)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132197952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new objective function for fuzzy c-regression model and its application to T-S fuzzy model identification","authors":"M. Soltani, A. Chaari, F. Benhmida, M. Gossa","doi":"10.1109/CCCA.2011.6031427","DOIUrl":"https://doi.org/10.1109/CCCA.2011.6031427","url":null,"abstract":"This paper proposes a new objective function for fuzzy c-regression model (FCRM) clustering algorithm. The main motivation for this work is to develop an identification procedure for nonlinear systems affected by measurement noise. The proposed methodology is based to adding a second regularization term in the objective function of FCRM clustering algorithm in order to take in account the data are noisy. the orthogonal least square is used to identify the consequent parameters. A comparative study is presented. Validation results involving simulation of the identification of nonlinear benchmark problems have demonstrated the effectiveness and practicality of the proposed algorithm.","PeriodicalId":259067,"journal":{"name":"2011 International Conference on Communications, Computing and Control Applications (CCCA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133100976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Direct torque fuzzy controlled induction machine drive using an optimized extended Kalman filter","authors":"M. Douiri, M. Cherkaoui, T. Nasser, A. Essadki","doi":"10.1109/CCCA.2011.6031399","DOIUrl":"https://doi.org/10.1109/CCCA.2011.6031399","url":null,"abstract":"In this paper, we propose an approach for improving direct torque control (DTC) of induction machines based on the theory of fuzzy logic that replaces the conventional comparators and the selection table, to reduce the torque ripples electromagnetic flux and the stator current. Then we present a speed estimator, based on the algorithm of the extended Kalman filter (EKF). The function of filtering consists to estimate the useful information which is polluted by a noise. The extended Kalman filter (EKF) aims to estimate optimally the state of linear system: this state corresponds to useful information. Before defining the optimality factors that will calculate the Kalman filter, which is in fact a stochastic criterion.. The validity of the proposed methods is confirmed by the simulation results.","PeriodicalId":259067,"journal":{"name":"2011 International Conference on Communications, Computing and Control Applications (CCCA)","volume":"51 13","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113937069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chaos based spread spectrum watermarking algorithm","authors":"Kais Feltekh, Z. Jemaa","doi":"10.1109/CCCA.2011.6031458","DOIUrl":"https://doi.org/10.1109/CCCA.2011.6031458","url":null,"abstract":"This paper presents a blind spread spectrum watermarking algorithm in discret cosine transform (DCT) domain based on chaotic sequence features for still image. We used logistic map with two secret keys; one to generate a spread spectrum sequence and other to determinate the secret insertion positions of the mark; the insertion of the mark was done in the middle frequency of DCT of the image to be watermarked. This allowed to have a compromise between invisibility and robustness against scaling, rotation and cropping attacks.","PeriodicalId":259067,"journal":{"name":"2011 International Conference on Communications, Computing and Control Applications (CCCA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122373884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compact dual-band microstrip antenna for universal 2.4 /5.2GHz WLAN applications","authors":"Mehdi Ali, A. Kachouri, M. Samet","doi":"10.1109/CCCA.2011.6031481","DOIUrl":"https://doi.org/10.1109/CCCA.2011.6031481","url":null,"abstract":"In this paper, a compact rectangular microstrip dual frequency antenna is presented for wireless local area networks (WLAN) application in IEEE802.11a standard operating in the 2.4/5.2. The proposed design is achieved by loading two pairs of slits in the non-radiating edges. By increasing the length of the slits, the higher resonant frequencies are tuned. TM10 mode is exited for the 2.4 Band while the 5.2 Band is obtained by three resonant frequencies positioned side by side using the simultaneous excitation TM20 and two resonant frequencies issued of the operated slits. Good pattern radiation was obtained and the efficiency was optimal.","PeriodicalId":259067,"journal":{"name":"2011 International Conference on Communications, Computing and Control Applications (CCCA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129115392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sliding-mode cascade controller of induction motor","authors":"M. Khalfa, A. Sellami, R. Andouisi","doi":"10.1109/CCCA.2011.6031456","DOIUrl":"https://doi.org/10.1109/CCCA.2011.6031456","url":null,"abstract":"The aims of this work are the design and application of the indirect rotor flux-oriented control (IRFOC) with a sliding-mode controller to pilot the working of the induction motor coupled the centrifugal pump. The stability analysis based on Lyapunov theory is also presented, to guarantee the closed loop stability. Some reliable simulation results are provided in this paper in order to demonstrate the efficiency of the proposed approach.","PeriodicalId":259067,"journal":{"name":"2011 International Conference on Communications, Computing and Control Applications (CCCA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117069142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}