{"title":"Improving QoS for BE traffics in WIMAX networks","authors":"L. Mokdad, J. Ben-othman, M. Cheikh","doi":"10.1109/AICCSA.2010.5587004","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587004","url":null,"abstract":"WIMAX networks are aim to provide services with high throughput (up to 70 Mbps) and with a large coverage (up to 50 Km) To ensure QoS architecture has been designed and in the IEEE 802.16.e amendment they introduce the service differentiation by 4 service classes (UGS, rtPS, nrtPS and BE). Add to this an Admission control (AC) has been specified to avoid any degradation of the active connection. This mechanism is not defined in the literature and is let to the operators. Major implemented AC use the strict priority. The drawback of the strict priority is that it penalizes service classes with the lowest priority especially the BE. In this paper we propose to improve the AC of BE in WIMAX networks. To achieve this goal we propose to use the leaky bucket for both rtPS an nrtPS in order to reduce lightly the number of accepted connections and to improve considerably the number of BE accepted connection. We evaluate the performance of the proposed scheme by a markovian model.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124508024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved genetic algorithm for efficient scheduling on distributed memory parallel systems","authors":"Johnatan E. Pecero, P. Bouvry","doi":"10.1109/AICCSA.2010.5587030","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587030","url":null,"abstract":"A key issue related to the distributed memory multiprocessors architecture for achieving high performance computing is the efficient scheduling of heavily communicated parallel applications such that the total execution time is minimized. Therefore, this paper provides a genetic algorithm based on task clustering techniques for scheduling parallel applications with large communication delays on distributed memory parallel systems. The genetic algorithm is improved with the introduction of some extra knowledge about the scheduling problem. This knowledge is represented by a class of clustering heuristic which is based on structural properties of the parallel application. The major feature of the proposed algorithm is that it takes advantage of the effectiveness of task clustering for reducing communication delays combined with the ability of the genetic algorithms for exploring and exploiting information of the search space of the scheduling problem. The algorithm is assessed by simulation run on some families of traced graphs which represents some of the numerical parallel application programs, and a set of randomly generated applications. Simulation results showed that this algorithm significantly improves the performance of related approaches.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123118676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predictive dynamic resource reservation for vertical handoff optimization in 4G mobile wireless networks","authors":"Sihem Trabelsi, N. Boudriga","doi":"10.1109/AICCSA.2010.5587017","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587017","url":null,"abstract":"The fourth generation of mobile wireless networks (4G) is expected to be the most promising architecture for QoS provision due to its scalability, convenience for mobility support and capability of interworking heterogeneous radio access networks which ensure both session continuity and QoS support. One major design issue of the 4G is the support of optimized handoff functionalities. More specifically, total disruption during a handoff should be minimized and its complexity hidden to end users. This article focuses on dynamic predictive resource reservation in 4G in order to maximize handoff success probability. We discuss how to reserve radio resources according to future mobile terminal location expressed in a probabilistic way, to load conditions of target Base Station/Access Point BS/AP, and to the specificity of data structure of each access network. Different resource reservation algorithms are devised in this paper. The objective is to efficiently utilize the wireless radio resources, to enhance the handoff performances and to improve, therefore, the overall system performances. Results based on a detailed performance evaluation study are also presented here to demonstrate the efficacy of the proposed algorithms.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127452174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the impact of irregular radio propagation on coverage control and sleep scheduling in wireless sensor networks","authors":"Ramzi Bellazreg, Mohamed Hamdi, N. Boudriga","doi":"10.1109/AICCSA.2010.5587009","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587009","url":null,"abstract":"Research in the wireless sensor networks field has been plagued by difficulties in realistic simulations. These difficulties are often the result of non-realistic assumptions which need to be removed from the mathematical models. Especially, radio propagation models are often simplified and do not take into consideration irregularities such as fading, shadowing, and temporal non-stationarity. In this paper, we investigate the effect of radio temporal irregularities on sensor deployment and sleep scheduling. We show that existing scheduling algorithms suppose that the sensor coverage range does not vary according to time, which is not true because the available energy decreases. We analyze the impact of this shortcoming on the performance of sleep scheduling algorithms and propose an alternative scheme that guarantees a uniform density distribution despite of the presence of radio temporal irregularities.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131343315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cooperative infrastructure discovery protocol for vehicle to Internet opportunistic communications","authors":"Naourez Mejri, F. Filali, F. Kamoun","doi":"10.1109/AICCSA.2010.5586999","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586999","url":null,"abstract":"Nowadays, wireless 802.11 access points (APs) are increasingly widespread in urban and sub-urban areas. Besides part of them offer free access, hence such infrastructure can provide intermittent Internet access to vehicles for opportunistic applications like software or digital maps updates, vehicle diagnostic reporting, and certificates/pseudonyms renewing.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122885624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A bind RGB color image watermarking based on singular value decomposition","authors":"N. Goléa, Rachid Seghir, R. Benzid","doi":"10.1109/AICCSA.2010.5586967","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586967","url":null,"abstract":"In this paper, we propose a novel SVD-based RGB color image watermarking, in which the watermark is assumed to be an RGB color image whose detection and extraction are performed in a blind manner. The performance of the proposed watermarking method is investigated by measuring its imperceptible and robust capabilities. For the imperceptible capability, a quantitative index, Peek Signal-to-Noise Ratio (PSNR), is employed to evaluate the difference between an original image and its corresponding watermarked image. For the robust capability, the Correlation Coefficient (CC) is also used to evaluate the similarity between the original watermark and the extracted one. Experimental results indicate that our technique is robust and produces high-quality watermarked images.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124586394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software effort estimation by tuning COOCMO model parameters using differential evolution","authors":"S. Aljahdali, A. Sheta","doi":"10.1109/AICCSA.2010.5586985","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586985","url":null,"abstract":"Accurate estimation of software projects costs represents a challenge for many government organizations such as the Department of Defenses (DOD) and NASA. Statistical models considerably used to assist in such a computation. There is still an urgent need on finding a mathematical model which can provide an accurate relationship between the software project effort/cost and the cost drivers. A powerful algorithm which can optimize such a relationship via tuning mathematical model parameters is urgently needed. In [1] two new model structures to estimate the effort required for software projects using Genetic Algorithms (GAs) were proposed as a modification to the famous Constructive Cost Model (COCOMO). In this paper, we follow up on our previous work and present Differential Evolution (DE) as an alternative technique to estimate the COCOMO model parameters. The performance of the developed models were tested on NASA software project dataset provided in [2]. The developed COCOMO-DE model was able to provide good estimation capabilities.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121429931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of Independent Component Analysis in an iris recognition system","authors":"I. Bouraoui, S. Chitroub, A. Bouridane","doi":"10.1109/AICCSA.2010.5586977","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586977","url":null,"abstract":"The overall performance of any iris recognition system relies on the performance of its components, which are preprocessing, feature extraction and matching. Feature extraction is the important step of such recognition system, but it is strongly dependent on the pre-processing step that is consisting of localising and normalising the iris. In this paper, Independent Component Analysis (ICA), which is a recently developed statistical method for data analysis, is applied for extracting the features for iris region of interest that are statistically independent. Based on some mathematical criteria, the performance of ICA is evaluated by using two different subsets of CASIA-V3 iris image database. The obtained results are convincing and some future improved research works are subsequently envisaged.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116423748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"802.15.4, a MAC layer solution for PLC","authors":"C. Chauvenet, B. Tourancheau, D. Genon-Catalot","doi":"10.1109/AICCSA.2010.5586997","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5586997","url":null,"abstract":"Technology evolution have made possible to connect all kind of devices to IP network. This becomes an evident objective for sensors networks research. The IETF 6LoWPAN RFC proposal was developed in that sense to use the benefit of IPV6 over wirelessly connected sensors (WSN). The IEEE 802.15.4 MAC layer stack being popular in the domain of wireless sensors within constrained resources, a few 6LoWPAN adaptations already exist. In this paper, we investigate the possibility of using IPv6 for sensor networks connected through powerline communication (PLC) non-wireless mediums and demonstrate possible interoperability. This document propose the first adaptation of the IEEE 802.15.4 commons standard on PLC medium. Following this standard interface, we demonstrate the possibility to carry out data on PLC with great reliability, and low power energy requirement using our WPC™ physical layer (called Watt Pulse Communication (WPC)). This allows to benefit from the development of WSN research for PLC communication networks. Moreover, such a IEEE 802.15.4/6LoWPAN communication stack provides a generic communication standard for heterogeneous sensors networks. Thus, we finally demonstrate interoperability with tests between powerline and wireless sensor networks running IEEE 802.15.4/6LoWPAN stacks.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115573873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Atiq Ahmed, Rana Rahim-Amoud, L. Merghem, D. Gaïti
{"title":"An agent-based approach for vertical handover in heterogeneous wireless networks","authors":"Atiq Ahmed, Rana Rahim-Amoud, L. Merghem, D. Gaïti","doi":"10.1109/AICCSA.2010.5587034","DOIUrl":"https://doi.org/10.1109/AICCSA.2010.5587034","url":null,"abstract":"One of the vision of next generation networks is an all-IP network supporting heterogeneous access technologies for the purpose of providing the mobile user with roaming capability across different networks. To enable this type of mobility known as vertical handover (VHO), an intelligent technique is needed in order to perform the service continuity. This paper presents a multi-agent based approach for the VHO. We propose to introduce the agents in the mobile nodes (MNs) and Access Points (APs) to collect the necessary information from the environment. Based on this information, agents will anticipate the handover in order to reduce the handover latency. We have defined three behaviors (Network Monitoring, Decision, and Network Selection) for the agents that will assist us in anticipating the handover.","PeriodicalId":352946,"journal":{"name":"ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114280987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}