{"title":"Admission Control Algorithm for Network Slicing Management in SDN-NFV Environment","authors":"Amal Kammoun, N. Tabbane, G. Diaz, N. Achir","doi":"10.1109/ICMCS.2018.8525945","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525945","url":null,"abstract":"Future networks have to be flexible to satisfy requirements of 5G use cases. Software Defined Networking (SDN), Network Function virtualization (NFV) and Network Slicing technologies have proved to be promising paradigms for new services provisioning. In our work, we propose a new mechanism for the admission control of new users’ requests. To this aim, we propose a network orchestrator module which receives new users’ requests and then determines if their demands can be served by an existing slice on not. The major aim of our algorithm is the selection of the best target slice for the user request based on several network criteria such as the network resources latency, availability and reliability as well as their computational performances. Thus, according to the proposed algorithm, users’ requests will be mapped into the slice that corresponds perfectly to the request. A mathematical formulation of our proposed algorithm and a performance evaluation are presented. We demonstrate that by providing the ideal slice for users’ requests, the quality of service afforded to the users will be enhanced.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126267148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overview of Visual Cryptographic Systems Based on XOR Function","authors":"Asmaa Hilmi, Soufiane Mezroui, A. Oualkadi","doi":"10.1109/ICMCS.2018.8525879","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525879","url":null,"abstract":"Visual cryptography based on XOR is a science that gives solutions of several problems in relation with the security. From now on it is often used in the daily applications in relation with the computer field. Among the application cited in this article; print and scan, which used the WALSH transformation, there is also the color image application, which used the HALFTONE technique to print the image according to the model CMY. To succeed in removing the secret correctly from the recovered image; two criteria are taken into account: minimization of the pixel expansion and maximization of the contrast.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"360 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134114432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Soukaina Cherif Bourki Semlali, M. E. Riffi, Faycal Chebihi
{"title":"Hybrid chicken swarm optimization with a GRASP constructive procedure using multi-threads to solve the quadratic assignment problem","authors":"Soukaina Cherif Bourki Semlali, M. E. Riffi, Faycal Chebihi","doi":"10.1109/ICMCS.2018.8525992","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525992","url":null,"abstract":"The aim of this paper is to present a Hybrid Chicken Swarm Optimization algorithm (HCSO) with the parallel computing technique to solve quadratic assignment problem by integrating the GRASP constructive procedure and by carrying out 2-opt local search neighborhood mechanism on a modified version of the original Chicken Swarm Optimization. The HCSO is a new method inspired from the behavior of chicken while searching for food, where the initial population is generated by the multithreads. In order to test the performance of our approach, the experiments are tested on a set of 30 instances of QAPLIB, we program the constructive procedure of GRASP in parallel by assigning the processing to threads. Furthermore, comparative analysis is done with other metaheuristics in literature. The results with parallel computing show the effectiveness of the proposed adaptation to solve the Quadratic assignment problem, thereby the effectiveness of the HCSO is proved while comparing to other metaheuristics in literature.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"11 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133073043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Routing Mechanisms in ICNs","authors":"Ouassim Karrakchou, N. Samaan, A. Karmouch","doi":"10.1109/ICMCS.2018.8525877","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525877","url":null,"abstract":"The success of the current Internet architecture over the past decades has been attributed to its simple layered host-centric communication model. Unfortunately, this same design is now posing a significant challenge to newly developed applications such as media streaming, social networking and location-based services that are content- rather than host-centric. Information Centric Networks (ICNs) were introduced to address this challenge by allowing applications to retrieve contents using their names while being agnostic to their physical location. The key enabler to achieving this task is the development of efficient, robust and scalable name-based routing mechanisms. This paper discusses the main requirements of these mechanisms, analyzes existing key name-based routing approaches and highlights future research directions in that area.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116151877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ilham Maskani, J. Boutahar, Souhaïl El Ghazi El Houssaïni
{"title":"Modeling telemedicine security requirements using a SysML security extension","authors":"Ilham Maskani, J. Boutahar, Souhaïl El Ghazi El Houssaïni","doi":"10.1109/ICMCS.2018.8525939","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525939","url":null,"abstract":"This paper follows previous work that presents a model for security requirements based on a SysML extension. Following its use, some shortcomings have been observed. In this paper, we present a revision of this extension based on those observations. Then, we apply the revised extension to model the security requirements for a telemedicine system.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"78 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130601101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of UHF RFID Z Shaped Slot Patch Tag for Human Monitoring Applications","authors":"I. Bouhassoune, Rachid Saadane, K. Minaoui","doi":"10.1109/ICMCS.2018.8525904","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525904","url":null,"abstract":"This paper addresses the design of passive new Z shaped slot patch antennas in UHF band (860MHz-960MHz) for radiofrequency identification and sensing applications, insulated from the human body by thin silicone layer, in this case the human skin presents the object to be tagged or bio-tracked, thus providing a poor communications because of the high dielectric properties of human tissues. A new tag structure combining rectangular patch, tow tuning slots and inclined internal slot, which have been optimized for an IC with R=380ohm and C=2.8pF, is here discussed through numerical simulations, using the finite element method via HFSS solver. Finally the achieved antennas designs having different sizes are evaluated utilizing a layered anatomical model of the human body. The simulated performance indicates a possible application of these tags to any part of the body.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126887612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Simulation of two elements rectangular Microstrip Patch Antenna at 5.8 GHz for RFID Reader Applications with high Directivity and Gain","authors":"O. Ouazzani, S. Bennani, M. Jorio","doi":"10.1109/ICMCS.2018.8525883","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525883","url":null,"abstract":"In this paper, detailed design of a 5.8 GHz two elements rectangular Microstrip Patch Antenna for use in the RFID Reader applications is presented.The patch antenna was designed using RT/duroid-5880 material, with a loss tangent tanδ = 9.10−4, dielectric constant of 2.2 and thickness of 1.56mm, fed by a 50- microstrip line.In the beginning, we defined our antenna as a single patch of a rectangular shape but after evaluating the antenna characteristics results such as gain, directivity and radiation patterns, we transformed it to a 2*1 linear array antennas.The main aim is to improve directivity, gain and radiation patterns.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128456604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward a Constraint Based Test Case Generation of Parallel BPEL Process","authors":"S. Serbout, M. Benattou","doi":"10.1109/ICMCS.2018.8525942","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525942","url":null,"abstract":"Business Process Execution Language (BPEL) offers the possibility to implement customized business processes in a record time. Testing is crucial to ensure the quality of BPEL process. The aim of this paper is to propose a constraint based approach to test parallel BPEL process. In our work, we propose an algorithm to transform a parallel BPEL process into a Parallel Control Flow Graph (PCFG), we augment PCFG with pre and post conditions, and we drive then a suite of feasible test cases.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129627566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capacity-Aware Hybrid beamforming for Multi-User Massive MIMO","authors":"M. Hefnawi, Esmael Yahya","doi":"10.1109/ICMCS.2018.8525955","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525955","url":null,"abstract":"We propose a capacity-aware hybrid beamforming (CA HBF) to enhance the uplink channel capacity of multi-user massive MIMO (MU-MIMO) system. We assume that the base station (BS) and the mobile users are equipped with hybrid beamforming massive arrays. The analog beamformers of the BS and the mobile users are based on multi-beam selection. Each user perform capacity-aware digital beamforming and the BS performs digital MRC. The capacity-aware scheme is implemented using the free-derivative population-based particle swarm optimization (PSO) algorithms that is well known by its simple/fast hardware implementation. The performance evaluation in term of the ergodic system capacity shows that the proposed CA HBF achieves the same performance as the fully-digital capacity-aware beamforming scheme.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126128528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}