2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)最新文献

筛选
英文 中文
A taxonomy of service discovery approaches in IoT 物联网中服务发现方法的分类
2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2020-10-28 DOI: 10.1109/WINCOM50532.2020.9272512
Meriem Achir, A. Abdelli, L. Mokdad
{"title":"A taxonomy of service discovery approaches in IoT","authors":"Meriem Achir, A. Abdelli, L. Mokdad","doi":"10.1109/WINCOM50532.2020.9272512","DOIUrl":"https://doi.org/10.1109/WINCOM50532.2020.9272512","url":null,"abstract":"Nowadays, Internet of things (IoT) is becoming the trademark technology for connecting real-world physical entities to provide specific services and enable the creation of a smart world. Due to the growing number of connected objects and the lack of standardization that meet IoT requirements, discovering and selecting the desirable service is becoming a challenging issue. In the literature, many works have been put forward to address service discovery in IoT. In this paper, we propose a complete classification of these works to provide a more elaborated taxonomy that includes several aspects and criteria. Then, we compare some of the most recent approaches according to several performance criteria, followed with a discussion to set up the future research directions.","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124270431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Users' Power Multiplexing Limitations in NOMA System over Gaussian Channel 高斯信道下NOMA系统中用户功率复用的限制
2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2020-10-28 DOI: 10.1109/WINCOM50532.2020.9272469
Ahlem Haddad, D. Slimani, A. Nafkha, F. Bader
{"title":"Users' Power Multiplexing Limitations in NOMA System over Gaussian Channel","authors":"Ahlem Haddad, D. Slimani, A. Nafkha, F. Bader","doi":"10.1109/WINCOM50532.2020.9272469","DOIUrl":"https://doi.org/10.1109/WINCOM50532.2020.9272469","url":null,"abstract":"Non-Orthogonal Multiple Access (NOMA) is one of the promising techniques to ensure very high spectral efficiency in 5G mobile communications and beyond. In contrast to the orthogonal multiple access (OMA) technique, the NOMA shows outstanding performances in terms of throughput, user fairness, low latency and compatibility with the current and future communication systems. In this paper, we analyze the capacity region in NOMA system and the limited number of multiplexed users under a given power allocation vector (i.e. symmetric/asymmetric channel). In addition, we compare the downlink capacity of the OMA/NOMA systems. Moreover, we have investigated the effect of large constellation order on the power allocation and bit error rate (BER). Comparisons between the coded and uncoded schemes are also presented.","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124388354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Comparison Between Different Types of Sensor Architecture Using a Uniform Relay Protocol 使用统一中继协议的不同类型传感器结构的比较
2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2020-10-28 DOI: 10.1109/WINCOM50532.2020.9272428
O. Flauzac, J. Hérard, F. Nolot, Florian Desrumaux
{"title":"Comparison Between Different Types of Sensor Architecture Using a Uniform Relay Protocol","authors":"O. Flauzac, J. Hérard, F. Nolot, Florian Desrumaux","doi":"10.1109/WINCOM50532.2020.9272428","DOIUrl":"https://doi.org/10.1109/WINCOM50532.2020.9272428","url":null,"abstract":"Organizations want to collect data remotely to predict incidents or simply to store and analyze them. To do that, a sensor network is often deployed to collect these data. However, the dynamic nature of these networks and possible sensors out of range must be taken into account to ensure that information retrieval is carried out correctly. The main solution used by the operator is a star topology. An architecture that is simple to deploy but which does not always make it possible to reach all the sensors, such as those located in cellars or tunnels. In this paper, we propose a study of a relay protocol including a local synchronization solution on different platforms to evaluate the power consumption of many types of sensor architecture and communication technology. The platforms considered using the following microcontroller: STMicroelectronics STM32, LoPy, and Arm® Cortex®-M3 with Texas Instrument CC1350 with the 3 following modulation wireless communications: LoRa, WIFI, and raw 868MHz.","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124420816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Grid Networks enabled Electricity-Theft Detection and Fault Tolerance 智能电网网络实现了窃电检测和容错
2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2020-10-28 DOI: 10.1109/WINCOM50532.2020.9272446
Chérifa Boucetta, O. Flauzac, Bachar Salim Haggar, Abdelkader Nassour, F. Nolot
{"title":"Smart Grid Networks enabled Electricity-Theft Detection and Fault Tolerance","authors":"Chérifa Boucetta, O. Flauzac, Bachar Salim Haggar, Abdelkader Nassour, F. Nolot","doi":"10.1109/WINCOM50532.2020.9272446","DOIUrl":"https://doi.org/10.1109/WINCOM50532.2020.9272446","url":null,"abstract":"The Chadian electricity company (SNE) wants to deploy a good and a robust infrastructure in order to satisfy the increased demand needs, to have an effective management of the electricity grid and to detect the electricity theft. In fact, Fraudulent electricity consumption has many dangerous effects such as decreasing the supply quality, increasing generation load, affecting the overall economy, etc… The adaptation of smart grid and the use of the internet of things can significantly reduce this loss by analyzing the electricity consumption patterns of customers and identifying illegal consumers based on irregularities in consumption. In this paper, we present a sensor deployment infrastructure in N'Djamena city based on a self-stabilizing hierarchical algorithm. Then, we study the fault tolerance of the proposed algorithm and finally we detail the electricity theft detection approach. The objective of the SNE is not to completely replace the traditional electricity grid in one step, but to gradually evolve it into a smart grid by incorporating smart meters and sensors, taking into account the architectural aspects of the network and communication. The proposed method can effectively identify fraudulent users of the system. Extensive simulations using the OMNeT++ simulator reveal that the algorithm is convergent regardless of the parameter choice of the function choose.","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126541069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PEARL: A Novel Priority and Guaranteed-based Resource Allocation Approach for V2V Communications in LTE-V Mode 3 一种新的基于优先级和保证的LTE-V模式下V2V通信资源分配方法
2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2020-10-28 DOI: 10.1109/WINCOM50532.2020.9272489
Mariem Allouch, Sondés Khemiri-Kallel, Ahmed Soua, S. Tohmé
{"title":"PEARL: A Novel Priority and Guaranteed-based Resource Allocation Approach for V2V Communications in LTE-V Mode 3","authors":"Mariem Allouch, Sondés Khemiri-Kallel, Ahmed Soua, S. Tohmé","doi":"10.1109/WINCOM50532.2020.9272489","DOIUrl":"https://doi.org/10.1109/WINCOM50532.2020.9272489","url":null,"abstract":"Enabling direct Vehicle-to-Vehicle (V2V) communications within LTE-V technology is considered as a key technological breakthrough to further deploy vehicle-to-Everything (V2X) applications. As the main goal of these latter is to improve the traffic safety and save lives, any design of a resource allocation scheme under LTE-V has to take into account the stringent requirements of these applications in terms of reliability and latency. In this context, this paper proposes a novel Priority and guarantEed-bAsed Resource aLlocation approach (PEARL) for cellular V2V communications under a mode 3 configuration. Extensive simulations and comparison to other approaches corroborate the out-performance of our proposal to deliver emergency packets with lower delays and higher packet reception rate without impacting the transmission of non-safety V2X packets.","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129670978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of the Over-Connectivity in Autistic Brains Using the Maximum Spanning Tree: Application on the Multi-Site and Heterogeneous ABIDE Dataset 使用最大生成树分析自闭症大脑的过度连接:在多站点异构数据集上的应用
2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2020-10-28 DOI: 10.1109/WINCOM50532.2020.9272441
F. Z. Benabdallah, Ahmed Drissi El Maliani, D. Lotfi, M. Hassouni
{"title":"Analysis of the Over-Connectivity in Autistic Brains Using the Maximum Spanning Tree: Application on the Multi-Site and Heterogeneous ABIDE Dataset","authors":"F. Z. Benabdallah, Ahmed Drissi El Maliani, D. Lotfi, M. Hassouni","doi":"10.1109/WINCOM50532.2020.9272441","DOIUrl":"https://doi.org/10.1109/WINCOM50532.2020.9272441","url":null,"abstract":"Autism spectrum disorder (ASD) is a neurodevelopmental disorder that touches children in an early age and alters the function of the brain. Previous studies put forward theories of under and over-connectivity between regions of the autistic brain. Hence, to understand the disorder and find an early diagnosis corroborating the existing theories is of central importance. In this paper, we propose a framework that takes into account the properties of over-connectivity in the autistic brain using the maximum spanning tree (MaxST), since this latter is known to describe high connectivity values. The novelty of the proposed approach is to adopt elimination of the information related to the overconnectivity theory, i.e elimination of the MaxST. This permits to measure the impact of the suppression and thus to well emerge the aforementioned connectivity alterations. With an overall objective of facilitating the early diagnosis of this disorder. The tested dataset is the large multi-site Autism Brain Imaging Data Exchange (ABIDE). The results show that this approach provides accurate prediction up to 70%. They also highlight the importance of every parameter used in all the steps that lead to the final result.","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125607023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of a serious game to strengthen the immune system against Covid-19 设计一个严肃的游戏,以加强免疫系统对抗Covid-19
2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2020-10-28 DOI: 10.1109/WINCOM50532.2020.9272448
Farida Bouroumane, A. Saaidi, M. Abarkan
{"title":"Design of a serious game to strengthen the immune system against Covid-19","authors":"Farida Bouroumane, A. Saaidi, M. Abarkan","doi":"10.1109/WINCOM50532.2020.9272448","DOIUrl":"https://doi.org/10.1109/WINCOM50532.2020.9272448","url":null,"abstract":"Since the onset of the COVID-19 coronavirus, several sectors have been working to understand the virus, the symptoms, and the evolution of the disease. The issues of immunity are currently the subject of various research and studies. A promising approach is to use playful video culture to raise awareness and train players to adopt good eating habits to strengthen the immune system. In this article, we describe a prototype of a serious game about how to strengthen immune defenses in order to fight a coronavirus infection and build an antivirus barrier. This game aims at providing information on the link between food, immunity and the spread of the virus within the human body so it illustrates risky behaviours so as to raise awareness of the modifications to be adopted to improve the immune system.","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124076142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
UAV for IoT Communications: Beam Selection Using Matching Game and Network Slicing 物联网通信无人机:使用匹配游戏和网络切片进行波束选择
2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2020-10-28 DOI: 10.1109/WINCOM50532.2020.9272510
Salma Brihi, Anas Ghamizi, Karim Chakri
{"title":"UAV for IoT Communications: Beam Selection Using Matching Game and Network Slicing","authors":"Salma Brihi, Anas Ghamizi, Karim Chakri","doi":"10.1109/WINCOM50532.2020.9272510","DOIUrl":"https://doi.org/10.1109/WINCOM50532.2020.9272510","url":null,"abstract":"In cellular communication networks, researchers are trying to improve network communication and adapt it to meet the requirements of new technologies such as the Internet of Things. The next generation of wireless networks (5G) promises new network features such as low latency, peripheral computing and radio convergence that will pave the way for a world that is ubiquitously connected. In this context and for the provision of the necessary high-quality services and connection, continuously and everywhere, even under poor network conditions, any network failures must be managed quickly and efficiently. Covering the network in remote areas, providing services in overcrowded areas, or safeguarding the network in the event of damage to the cellular infrastructure (for example, a physical disaster) are a number of challenges. In this paper we discuss the architecture and possible applications of flight modes as a part of a 5G network supporting network splitting and lightweight virtualization at the extent of relay Unmanned Aerial Vehicles (UAVs) as being small cells. It also provides 5G aerial measurement results to support the feasibility check of UAV use in two possible scenarios, namely improving the position of UAVs relative to the position and circulation of users (UEs) additionally because the increased network coverage through algorithms supported theory of games.","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129396104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Model Approach for Wireless Sensor Networks Coverage Improvement 无线传感器网络覆盖改进的混合模型方法
2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2020-10-28 DOI: 10.1109/WINCOM50532.2020.9272504
Adda Boualem, Marwane Ayaida, Cyril de Runz
{"title":"Hybrid Model Approach for Wireless Sensor Networks Coverage Improvement","authors":"Adda Boualem, Marwane Ayaida, Cyril de Runz","doi":"10.1109/WINCOM50532.2020.9272504","DOIUrl":"https://doi.org/10.1109/WINCOM50532.2020.9272504","url":null,"abstract":"The area coverage is a non-trivial problem in Wireless Sensors Network (WSN) due to the lack of knowledge in the minimum sensor nodes set that can cover an area of interest and limitation of energy reserve, monitoring and communication ranges. Coverage protocols address two fundamental questions: how can the coverage performance of deployed sensor nodes in a monitoring region be evaluated; and how can the coverage performance be improved when wireless sensor network cannot effectively satisfy quality of service requirements? Constructing sets of minimal nodes to optimize the coverage problem push researchers to use different techniques from different domains, such as Voronoï Diagram, Connected Dominating Set, Clustering, and others. Each technique deals with the problem by its own philosophy. Our approach aims to use a hybrid model combining Diagram of Voronoï, Clustering, and Connected Dominating Set in order to benefit from the advantages of these three models to optimize area coverage, keep connectivity, and minimize energy consumption. The simulation showed the ability of our approach to ensure optimal coverage with minimal power consumption for a longtime.","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131865421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Self-adapting Face Authentication System with Deep Learning 基于深度学习的自适应人脸认证系统
2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2020-10-28 DOI: 10.1109/WINCOM50532.2020.9272474
Hind Baaqeel, S. Olatunji
{"title":"A Self-adapting Face Authentication System with Deep Learning","authors":"Hind Baaqeel, S. Olatunji","doi":"10.1109/WINCOM50532.2020.9272474","DOIUrl":"https://doi.org/10.1109/WINCOM50532.2020.9272474","url":null,"abstract":"Recent years have witnessed lots of development on face recognition systems including the ability to adapt to new genuine user features. Self-adapted Face Recognition systems are powerful tools to overcome the limitation of performance degradation over time. In this paper, a self-adapted face verification system (AFVS) that can efficiently classify genuine user samples for the update process using deep learning techniques has been proposed. The adaptivity feature of the proposed system model ensures performance stability in the long run. The proposed model has been developed using deep learning techniques which showed improved performance on Krassar model with higher F1-score and more tolerance to facial changes than the state-of-the-art face verification models.","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132721402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信