{"title":"Position-based broadcast algorithm in mobile ad-hoc networks","authors":"A. Touzene, K. Day, B. Arafeh, Nasser Al-Zidi","doi":"10.1109/ISPS.2011.5898882","DOIUrl":"https://doi.org/10.1109/ISPS.2011.5898882","url":null,"abstract":"The paper proposes a new position-based broadcast algorithm for mobile ad-hoc networks (MANETs) called PBB. It shows how communication methods originally designed for wired multiprocessor interconnection networks can be used in MANETs. PBB is based on a logical 2-dimensional grid view of the geographical region of the MANET. PBB makes use of a known construction of spanning trees in the grid multiprocessor interconnection network. To the best of our knowledge, PBB is the first protocol that uses cell-based spanning trees of the grid to perform broadcasting in MANETs. In this study we derived analytical results for the delivery ratio of PBB protocol and the number of rebroadcast messages per broadcast operation.","PeriodicalId":305060,"journal":{"name":"2011 10th International Symposium on Programming and Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115147484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GMAC: Group mobility adaptive clustering scheme for Mobile Wireless Sensor Networks","authors":"T. Benmansour, S. Moussaoui","doi":"10.1109/ISPS.2011.5898886","DOIUrl":"https://doi.org/10.1109/ISPS.2011.5898886","url":null,"abstract":"Recently, with the emergence of MWSNs utilization in different applications, some real-world situations, such as large-scale military networks and search-and-rescue operations, consider that sensor nodes move together in groups. To approximate the simulation of such applications to the reality, group mobility models are required. In this paper, we propose a group mobility adaptive clustering scheme (GMAC) for mobile WSN based on a new group mobility metric Mobility Group, which use network topology information and a position predictor to determine if nodes move together or separately. In GMAC, the area of interest is divided in equal zones, and each sensor calculates its weight based on Mobility Group and residual energy. The sensor node with the greatest weight in its zone will become the cluster-head. Using RPGM mobility model we have performed simulations to illustrate the benefits of our proposal comparing to ACE-L and LEACH. Obtained results show that GMAC outperforms ACE-L and LEACH in terms of energy consumption and the amount of data packets received at the sink.","PeriodicalId":305060,"journal":{"name":"2011 10th International Symposium on Programming and Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124392597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A semi-formal approach for Java programs verification","authors":"T. Benouhiba, Hanene Cheriet","doi":"10.1109/ISPS.2011.5898887","DOIUrl":"https://doi.org/10.1109/ISPS.2011.5898887","url":null,"abstract":"Software testing approaches are the most used techniques for programs verification because they are simple and fast. However, because of their lack of exhaustiveness, they cannot be considered as an alternative to formal verification approaches. On the other hand, these ones ensure total correction but with an important cost. In addition, they cannot operate well if the verified model is not consistent with the implementation. This paper proposes a new verification approach that combines tests and formal verification. The new approach, called SEmi-FORmal verification of Java programs or simply SE4J, uses tests to build a formal probabilistic model. This one will be formally verified in order to detect possible design errors in the program. The proposed approach permits also to compare two programs and validate test cases. The paper presents some obtained results over a case study and explains possible uses of the proposed approach.","PeriodicalId":305060,"journal":{"name":"2011 10th International Symposium on Programming and Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126327526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Thierry, L. George, Jean-Franois Hermant, F. Germain, Dominique Ragot, Jean-Marc Lacroix
{"title":"Toward a predictable and secure data cache algorithm: A cross-layer approach","authors":"P. Thierry, L. George, Jean-Franois Hermant, F. Germain, Dominique Ragot, Jean-Marc Lacroix","doi":"10.1109/ISPS.2011.5898894","DOIUrl":"https://doi.org/10.1109/ISPS.2011.5898894","url":null,"abstract":"Nowadays, the gap between processor and memory speed has grown enough to make the cache usage unavoidable in order to take real advantage of the processor's capabilities. Nevertheless, the data cache usage causes in the same time hard real-time and security concerns. As a consequence, some real-time compliant data cache algorithms have been developed. The goal of such algorithms is to reduce the WCET (Worst-Case Execution Time) of tasks. Unfortunately they have an impact on the system security, generating breaches in the tasks partitioning. This article contributes to the definition of a data cache algorithm meeting at the same time security and real-time requirements using a cross-layering approach between the underlying hardware and the running kernel. In order to contribute to such an algorithm, this article defines properties needed at the same time by hard real-time systems and partitioned secure systems.","PeriodicalId":305060,"journal":{"name":"2011 10th International Symposium on Programming and Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124550563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bipolarity in flexible querying of information systems dedicated to multimodal transport networks","authors":"Nouredine Tamani, L. Lietard, D. Rocacher","doi":"10.1109/ISPS.2011.5898881","DOIUrl":"https://doi.org/10.1109/ISPS.2011.5898881","url":null,"abstract":"Flexible querying of information systems dedicated to multimodal transport networks aims to help user organizing his/her trips by promoting public transport networks (bus, subway, train, boat, plane, etc.). In this context, it is necessary to provide an integrated environment in which it is possible for the user to express queries with complex preferences so as to meet his/her expectations. Complex preferences are modeled by fuzzy bipolar conditions which associate negative and positive conditions. Queries involving such conditions are called bipolar queries. In our case, such queries are addressed to multimodal transport information systems, which are often made of several distributed and heterogeneous databases. Therefore, semantic aspects have to be taken into consideration in the querying process so that only the most relevant data is targeted to evaluate queries. We introduce then in this paper a new approach for flexible querying of information systems that combines a reasoning mechanism (fuzzy bipolar DLR-Lite) with a relational language of a high expressiveness (bipolar SQLf language).","PeriodicalId":305060,"journal":{"name":"2011 10th International Symposium on Programming and Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127036775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combining neural networks for Arabic handwriting recognition","authors":"Chergui Leila, Kef Maâmar, C. Salim","doi":"10.1109/ISPS.2011.5898872","DOIUrl":"https://doi.org/10.1109/ISPS.2011.5898872","url":null,"abstract":"Combining classifiers is an approach that has been shown to be useful on numerous occasions when striving for further improvement over the performance of individual classifiers. In this paper we present an off-line Multiple Classifier System (MCS) for Arabic handwriting recognition. The MCS combine two individual recognition systems based on Fuzzy ART network used for the first time in Arabic OCR, and Radial Basis Functions. We use various feature sets based on Hu and Zernike Invariant moments. For deriving the final decision, different combining schemes are applied. The best combination ensemble has a recognition rate of 90,1 %, which is significantly higher than the 84,31% achieved by the best individual classifier. To demonstrate the high performance of the classification system, the results are compared with three research using IFN/ENIT database.","PeriodicalId":305060,"journal":{"name":"2011 10th International Symposium on Programming and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130748380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enabling self-mangaement in Context-aware Quality Model Driven Approach","authors":"A. Alti, Abdellah Boukerram","doi":"10.1109/ISPS.2011.5898866","DOIUrl":"https://doi.org/10.1109/ISPS.2011.5898866","url":null,"abstract":"This paper provides an extension of MDA called Context-aware Quality Model Driven Architecture (CQ-MDA) which can be used for quality control in pervasive computing environments. The proposed CQ-MDA approach based on Contextual Arch RQMM (Contextual ARC Hitecture Quality Requirement Meta Model), being an extension to the MDA, allows for considering quality and resources-awareness while conducting the design process. The contributions of this paper are a meta-model for architecture quality control of context-aware applications and a model driven approach to separate architecture concerns from context and quality concerns and to configure reconfigurable software architectures of distributed systems. To demonstrate the utility of our approach, we use a videoconference system.","PeriodicalId":305060,"journal":{"name":"2011 10th International Symposium on Programming and Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125710210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image segmentation using continuous cellular automata","authors":"Djemame Safia, Djidel Oussama, B. Chawki","doi":"10.1109/ISPS.2011.5898891","DOIUrl":"https://doi.org/10.1109/ISPS.2011.5898891","url":null,"abstract":"Image segmentation is still one of nowadays problems in image processing, in which there is no ideal or optimal solution due to the large variety of images, their characteristics, and the type of information we try to extract. In this paper, we are proposing a new method of segmentation which is an edge detector based on continuous cellular automaton for both black and white images and grayscale images. This new method presents the advantage of facilitating the evolution of cellular automata until the final configuration, without the tedious process of searching manually the rules set which leads to the desired result.","PeriodicalId":305060,"journal":{"name":"2011 10th International Symposium on Programming and Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123760038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stemming as a feature reduction technique for Arabic Text Categorization","authors":"F. Harrag, Eyas El-Qawasmah, A. Al-Salman","doi":"10.1109/ISPS.2011.5898874","DOIUrl":"https://doi.org/10.1109/ISPS.2011.5898874","url":null,"abstract":"In this paper, a comparative study is conducted for three text preprocessing techniques in the context of the Arabic text categorization problem using an in-house Arabic dataset. We evaluated and compared three Stemming techniques. They are: Light-Stemming, Root-Based-Stemming and Dictionary-Lookup-Stemming. The purpose is to reduce the feature space into an input space of much lower dimension for two different state-of-the art classifiers: Artificial Neural Networks and support vector machines. The results illustrated that using light stemmer enhances the performance of Arabic Text Categorization. The results also showed that the proposed Artificial Neural Networks model was able to achieve high categorization effectiveness as measured by Macro-Average F1 measure.","PeriodicalId":305060,"journal":{"name":"2011 10th International Symposium on Programming and Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124534325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extension of SIP protocol for managing home networks","authors":"Othmane Mahmoudi, Abdelkader Belkhir","doi":"10.1109/ISPS.2011.5898876","DOIUrl":"https://doi.org/10.1109/ISPS.2011.5898876","url":null,"abstract":"The concept of home automation or home network covers a wide range of applications and services for purposes of comfort, security and energy saving within the habitat. The networked devices perform domestic, constantly exchanging information to provide the services required by this type of network. This article discusses communication in home networking. It presents an extension of SIP for the overall management of messages exchanged in a home network.","PeriodicalId":305060,"journal":{"name":"2011 10th International Symposium on Programming and Systems","volume":"14 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133037146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}