Lamine Amour, Mohamed-Ikbel Boulabiar, Sami Souihi, A. Mellouk
{"title":"An improved QoE estimation method based on QoS and affective computing","authors":"Lamine Amour, Mohamed-Ikbel Boulabiar, Sami Souihi, A. Mellouk","doi":"10.1109/ISPS.2018.8379009","DOIUrl":"https://doi.org/10.1109/ISPS.2018.8379009","url":null,"abstract":"With the massive uses of the video over the world in the last decade, the user perception, commonly called Quality of Experience (QoE) metric; has become the one of the most important topics for the Network services Providers (NsP) and Content service Providers (CsP). In this paper, we present a new QoE estimation method on the client side using Machine Learning methods (ML) based on subjective assessment in a controlled-laboratory environment. The major novel contribution of this study is the combination of Quality of Service (QoS) parameters and Affective Computing (facial expression) to estimate the Mean Opinion Score (MOS) for HTTP YouTube content. An evaluation using a collected subjective dataset indicates that combining QoS and Affective computing provides better prediction performance.","PeriodicalId":294761,"journal":{"name":"2018 International Symposium on Programming and Systems (ISPS)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115738365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defending against common cyber attacks: Phishing and cross-site scripting","authors":"A. Pathan","doi":"10.1109/ISPS.2018.8378960","DOIUrl":"https://doi.org/10.1109/ISPS.2018.8378960","url":null,"abstract":"Social engineering is a very common method of deceiving people in the Cyberspace. Phishing is one of the most common attacks that the social engineers use to trick the users to reveal their confidential information. While various types of security schemes and Intrusion Detection Systems (IDSs) may be employed to mitigate other types of cyber-attacks, phishing cannot be thwarted only by using those, even if the techniques are sophisticated. This is because, often the human mistakes are involved in the process of leakage of confidential data and information. Hence, awareness of the issue and controlled cyber behavior would be key to defending against phishing type attack. Another cyber-attack, Cross-Site Scripting (XSS) could also be tackled efficiently by using some Content Security Policy (CSP) which would work alongside the traditionally used security and defense mechanisms. The purpose of this talk is to share some research findings in these and relevant areas. Also, some information would be shared for the general readers of the topic. We would like to explore how the major portion of these types of attacks could be thwarted or mitigated just by observing some precautions while interacting in the Cyberspace.","PeriodicalId":294761,"journal":{"name":"2018 International Symposium on Programming and Systems (ISPS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126871780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Alliance based approach for reducing saturation and congestion in VANETs","authors":"Kahina Ouazine, Hachem Slimani, Hassina Nacer, Jugurta Oudia, Nadira Maouche","doi":"10.1109/ISPS.2018.8379003","DOIUrl":"https://doi.org/10.1109/ISPS.2018.8379003","url":null,"abstract":"Vehicular Ad hoc Networks (VANETs) have received special attention from scientists because of their importance in daily life. In VANETs, we mainly find fixed entities (Road Side Units “RSUs”) and mobile entities (vehicles). In order to exchange information and data relating to the safety and comfort of road users, these different entities must establish communications between them. In these communications, one of the main problems is related to congestion and saturation of RSUs. To solve this problem, we propose in this paper a new approach of cooperation between the RSUs of a VANET in order to reduce its congestion and thus to avoid as much as possible the saturation of these RSUs. This approach, called “D2A2RS” (Defensive Alliance based Approach for Reducing RSUs Saturation), is based on the concept of defensive alliances in graphs that ensures efficient collaboration between the RSUs. Furthermore, we propose two analytical models based on Markov chains to compare our D2A2RS protocol with a concurrent protocol (IAGR). The obtained comparaison results have shown the efficiency and the performance of our approach in terms of packet loss.","PeriodicalId":294761,"journal":{"name":"2018 International Symposium on Programming and Systems (ISPS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126165002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity theft on e-government/e-governance & digital forensics","authors":"Ameer Al-Nemrat","doi":"10.1109/ISPS.2018.8378961","DOIUrl":"https://doi.org/10.1109/ISPS.2018.8378961","url":null,"abstract":"In the context of the rapid technological progress, the cyber-threats become a serious challenge that requires immediate and continuous action. As cybercrime poses a permanent and increasing threat, governments, corporate and individual users of the cyber-space are constantly struggling to ensure an acceptable level of security over their assets. Maliciousness on the cyber-space spans identity theft, fraud, and system intrusions. This is due to the benefits of cyberspace-low entry barriers, user anonymity, and spatial and temporal separation between users, make it a fertile field for deception and fraud. Numerous, supervised and unsupervised, techniques have been proposed and used to identify fraudulent transactions and activities that deviate from regular patterns of behaviour. For instance, neural networks and genetic algorithms were used to detect credit card fraud in a dataset covering 13 months and 50 million credit card transactions. Unsupervised methods, such as clustering analysis, have been used to identify financial fraud or to filter fake online product reviews and ratings on e-commerce websites. Blockchain technology has demonstrated its feasibility and relevance in e-commerce. Its use is now being extended to new areas, related to electronic government. The technology appears to be the most appropriate in areas that require storage and processing of large amounts of protected data. The question is what can blockchain technology do and not do to fight malicious online activity?","PeriodicalId":294761,"journal":{"name":"2018 International Symposium on Programming and Systems (ISPS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114967703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Naoual El-Djouher Mebtouche, Abdelkrim Boumahdi, N. Baha
{"title":"Depth estimation from a single 2D image","authors":"Naoual El-Djouher Mebtouche, Abdelkrim Boumahdi, N. Baha","doi":"10.1109/ISPS.2018.8379021","DOIUrl":"https://doi.org/10.1109/ISPS.2018.8379021","url":null,"abstract":"With the growth of the 3D market, the demand for providing 3D content from already existing 2D content has increased. However, the availability of 3D content is very limited, since estimating 3D structure from a monocular image is a challenging task. In this paper, we propose a new nonparametric learning-based method for 2D-to-3D conversion from a monocular image. Our method follows three stages. First, we select K similar images to the input image from an RGBD database. Then, we infer the depth map using the K selected images and their corresponding depths maps. Finally, we refine the estimated depth map. Experiments on dataset were conducted and comparative evaluations with the state of the art are presented.","PeriodicalId":294761,"journal":{"name":"2018 International Symposium on Programming and Systems (ISPS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130617534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maximizing profit in cloud computing using M/G/c/k queuing model","authors":"Assia Outamazirt, Kamel Barkaoui, D. Aïssani","doi":"10.1109/ISPS.2018.8379008","DOIUrl":"https://doi.org/10.1109/ISPS.2018.8379008","url":null,"abstract":"The economics of cloud computing is more and more a crucial issue. To maximize the profit, a service provider should understand both service charges and business costs, and how they are determined by the characteristics of the applications and the configuration of a multiserver system. In this work, we treat a multiserver system as an M/G/c/k queuing model with impatient customers, such that our optimization problem can be formulated and solved. There are no analytical formulas to calculate performance measures of M/G/c/k queue. Therefore, we provide new analytical formulas to compute the mean waiting time of new service request arrival to the system and the delay probability, i.e., the probability that a newly submitted service request must wait because all servers are busy. We focus on the calculation of these latter, because our performance metric in this work is the task waiting time. Then, expected revenue of a service provider is calculated. Numerical calculations of the optimal server size and the optimal server speed are demonstrated. Finally, the expected profit in one unit of time for a cloud provider is obtained.","PeriodicalId":294761,"journal":{"name":"2018 International Symposium on Programming and Systems (ISPS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114118504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verifiable outsourced computation integrity in cloud-assisted big data processing","authors":"Bouleghlimat Imene, Hacini Salima","doi":"10.1109/ISPS.2018.8379019","DOIUrl":"https://doi.org/10.1109/ISPS.2018.8379019","url":null,"abstract":"Becoming data-driven company in today's fast-paced digital-world requires seeking a big data driven-business. Because managing these data to enable insight's generation is difficult using traditional management systems, various enterprises prefer outsourcing their data to a Cloud service provider that maintain suitable infrastructures. However, these companies need to ensure that their data are securely stored and computations are correctly performed. In this paper, we propose a model that leads big data owners to verify the integrity of their big data computations returned by the Cloud servers.","PeriodicalId":294761,"journal":{"name":"2018 International Symposium on Programming and Systems (ISPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127897735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OL-BaS: Efficient data load-balancing for skewed data with approximate load statistics","authors":"Djahida Belayadi, Khaled-Walid Hidouci, Khadidja Midoun","doi":"10.1109/ISPS.2018.8379005","DOIUrl":"https://doi.org/10.1109/ISPS.2018.8379005","url":null,"abstract":"Data skew can significantly deteriorate query performance in distributed systems. More concretely, when the data is range partitioned, usually it may be unequally distributed across the partitions. When tuples are inserted and deleted continuously, some of these data shall be moved from the hot nodes to the least loaded ones in order to satisfy the storage balance requirement. These movements have an important impact in terms of maintaining the load statistics related to each node, such as the partition boundaries and the load size. Efficient solutions from the state-of-art that address the data skew problem require global load statistics with a cost of O(log n) messages. In this paper, we propose an efficient online load-balancing algorithm for the range-partitioned data. Our solution is based on the fuzzy image (FZIM) concept. The basic idea about the FZIM is that both clients and nodes have an approximate knowledge about the effective partition statistics. They can nevertheless locate any data with almost the same efficiency as using exact partition statistics. Furthermore, maintaining load distribution statistics do not require exchanging additional messages as opposed to the cost of efficient solutions from the state-of-art (which requires at least O(log n) messages).","PeriodicalId":294761,"journal":{"name":"2018 International Symposium on Programming and Systems (ISPS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131119667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ouarda Zedadra, Meysa Idiri, Nicolas Jouandeau, Hamid Seridi, G. Fortino
{"title":"Lévy walk-based search strategy: Application to destructive foraging","authors":"Ouarda Zedadra, Meysa Idiri, Nicolas Jouandeau, Hamid Seridi, G. Fortino","doi":"10.1109/ISPS.2018.8379010","DOIUrl":"https://doi.org/10.1109/ISPS.2018.8379010","url":null,"abstract":"In this paper a Search strategy based on Lévy Walk is proposed. Lévy Walk increases the diversity of solutions, and constitutes good strategies to move away from local to global search. The amount of exploration and exploitation and the fine balance between them determine the efficiency of search algorithm. The highly diffusive behavior of the original Lévy Walk algorithm results in more global search. Thus, in the proposed algorithm, the time spent in local search is increased according to the fluctuation of the searched region. Moreover, a case study on destructive foraging is presented in this paper, with the aim to apply it to several swarm robotics problems. In order to present simulations in a finite two dimensional landscape with a limited number of clustered and scattered targets, the ArGOS simulator has been used.","PeriodicalId":294761,"journal":{"name":"2018 International Symposium on Programming and Systems (ISPS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132278515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive content based image retrieval based on RICE algorithm selection model","authors":"Safa Hamreras, Bachir Boucheham","doi":"10.1109/ISPS.2018.8379022","DOIUrl":"https://doi.org/10.1109/ISPS.2018.8379022","url":null,"abstract":"In this paper, we propose a framework for “Algorithm Selection” for image retrieval by content (CBIR). The framework is based on the model of RICE and is adapted to satisfy a given query depending on its characteristics by choosing the best classical CBIR-Algorithm from an Algorithm-Portfolio. As many as six algorithms for content based image retrieval have been included in the framework as alternatives for the different queries, including the training step. These algorithms range from RGB color moments, RGB color histogram to local binary pattern (LBP), etc. Therefore, there has been put an effort in the framework to cover the basic characteristics of images: Color and texture. Also, the framework integrates two color models to better enhance the Algorithm-Query adaptation process. Experimentations on the Wang (Corel 1k) database show the effectiveness of the proposed framework. Indeed, enhancements of more than 4% in precision have been obtained.","PeriodicalId":294761,"journal":{"name":"2018 International Symposium on Programming and Systems (ISPS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128432128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}