Konstantin Klein, Marco Franke, K. Hribernik, E. Coscia, Silke Balzert, Jan Sutter, K. Thoben
{"title":"Potentials of Future Internet technologies for Digital Factories","authors":"Konstantin Klein, Marco Franke, K. Hribernik, E. Coscia, Silke Balzert, Jan Sutter, K. Thoben","doi":"10.1109/AICCSA.2014.7073273","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073273","url":null,"abstract":"The current market situation demands manufacturers increase the flexibility, adaptability and efficiency of their production processes, from product design to manufacturing, and taking the entire product lifecycle into consideration. Digital Factories present a vision of future manufacturing in which digital continuity through production processes facilitates these requirements. This paper investigates how Future Internet technology may be applied and extended in order to fulfil the requirements of Digital Factories and contribute in a significant way to this paradigm shift in manufacturing. The authors present two Digital Factories use cases from which they derive requirements towards a proposed Future Internet Digital Factories architecture. A discussion of the results and an outlook to future work conclude the paper.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134100463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile malware exposed","authors":"Alaa Salman, I. Elhajj, A. Chehab, A. Kayssi","doi":"10.1109/AICCSA.2014.7073206","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073206","url":null,"abstract":"In this paper, we propose a new method to detect malicious activities on mobile devices by examining an application's runtime behavior. To this end, we use the Xposed framework to build a monitoring module that generates behavior profiles for applications. The module integrates with our intrusion detection system which then analyzes and reports on the profiles. We use this tool to detect malicious behavior patterns using both a custom-written malware and a real one. We also detect behavior patterns for some popular applications from the Google Play Store to expose their functionality. The results show that standard techniques that are used to evade static analysis are not effective against our monitoring approach. This approach can also be generalized to detect unknown malware or expose exact application behavior to the user.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129248421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Asif, Saqib Majeed, I. A. Taj, M. Ahmad, S. M. Ziauddin
{"title":"Exploiting MB level parallelism in H.264/AVC encoder for multi-core platform","authors":"M. Asif, Saqib Majeed, I. A. Taj, M. Ahmad, S. M. Ziauddin","doi":"10.1109/AICCSA.2014.7073188","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073188","url":null,"abstract":"H.264/AVC video coding standard has achieved a significant improvement in coding efficiency over previous standards, such as, H.261, H.263 and MPEG-4, at the cost of computational complexity. This paper takes advantage of the macroblock (MB) level parallelism in H.264/AVC encoder and based upon this represents a scheme to implement the encoder for multi-core platform. According to this technique an encoding process of an MB is divided into several independent phases and each phase is executed on a separate processing core. Moreover to efficiently utilize the multi-core processors and to improve the encoder performance, the encoder is pipelined at MB level. The experimental results show that encoding rate of pipelined encoder as compare to sequential encoder is improved from 6 fps to 72 fps and from 2 fps to 32 fps for FD1 (720 × 480) and HD 720p (1280 × 720) resolutions, respectively. The implemented encoder can be used for multimedia applications like video conferencing, smart phones, high quality mobile digital video recorders, tablet computers, mobile digital TVs etc.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131592402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power-aware Virtual Machines consolidation architecture based on CPU load scheduling","authors":"N. Madani, A. Lebbat, S. Tallal, H. Medromi","doi":"10.1109/AICCSA.2014.7073221","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073221","url":null,"abstract":"One of the concepts most currently emerging, in the world of information technology is Cloud Computing. While it provides many advanced features, there are still some shortcomings, such as the exorbitant operational cost. It is indeed at the center of several fields of research. One of them is the energy, under its different forms. The management of energy consumption in the world of Cloud is the one on which we concentrated through this paper, that is part of a work around the energetic aspect of Cloud Computing. The field of Green Computing is becoming more and more important in a world of limited energy resources and a growing demand for greater computing power, it therefore represents one of the major concerns, that we are dealing with in this paper, in order to optimize the consumption of electrical energy in a virtualized Cloud Platform, while respecting the requirements of SLAs. We propose a framework which offers effective improvements in a scalable Cloud architecture. A solution is to dynamically consolidate the Virtual Machines (VMs in the paper) of the platform in a lower number of nodes (hosts), during the time of low load situations, in order to shutdown unsolicited nodes, in the condition of providing an acceptable level of availability and response time and storage capacity so as not to penalize the user and respect the constraints of the service contracts.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122964209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Amazighe Named Entity Recognition using a A rule based approach","authors":"S. Boulaknadel, Meryem Talha, D. Aboutajdine","doi":"10.1109/AICCSA.2014.7073237","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073237","url":null,"abstract":"The Named Entity Recognition (NER) is very important task revolving around many natural language processing applications. However, many studies have achieved the maturity stage in a variety of languages such as English and French, but a few limited research efforts have attacked the named entity recognition problem in Amazighe script. This is due to the resources scarcity for Amazighe named entities and the limited work made in Amazighe natural language processing in general. In this paper, we describe our attempt at the development and implementation of a named entity recognition system for the Amazighe Language using a rule based approach. Our system has been effectively evaluated using our own corpus; it reached acceptable results in terms of precision, recall, and F-measure.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124287801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature model for modeling compound SOA design patterns","authors":"Akram Kamoun, M. Kacem, A. Kacem","doi":"10.1109/AICCSA.2014.7073224","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073224","url":null,"abstract":"In this paper, we propose a new approach for modeling compound SOA design patterns. The goal is to easily building and allowing the mass customization of compound design patterns. In this regard, we have used the paradigm of Software Product Line (SPL). The SPL development is realized through several tasks. In this work, the elaboration of the variability model, in particular the cardinality-based feature model, has been considered. We propose to compose this model with three related layers. Thus, it will be easy to interpret and to understand. The first layer expresses the existing dependencies and constraints between design patterns. Thus, only valid compound design patterns can be obtained. The second one illustrates the functional requirements. The third one shows the non-functional constraints.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117304135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differential evolution based deployment of wireless sensor networks","authors":"B. Ayinde, A. Barnawi","doi":"10.1109/AICCSA.2014.7073189","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073189","url":null,"abstract":"Random deployment of sensor nodes most times generates an initial communication gap in the sensing field even in a highly dense network. These communication gaps still exist even when these sensor nodes are deployed in a structured manner. In either case, the resulting inter-node distances may cause lack of communication and subsequently degrades the network performance. Previous work showed that relay nodes have the capability of enhancing the communication among nodes in the network. In order to achieve better communication and extend the network lifetime, sensor nodes are deployed in a careful manner with the help of such relay nodes. This paper proposes an enhanced deployment algorithm based on Differential Evolution (DE). The algorithm aims at extending network lifetime by using a minimum number of relays. Results show that the proposed approach improves the network lifetime considerably compared to previous solution such as SP3D algorithm.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127128946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. A. Hindi, M. Alsulaiman, Muhammad Ghulam, Saad Alkahtani
{"title":"Automatic pronunciation error detection of nonnative Arabic Speech","authors":"A. A. Hindi, M. Alsulaiman, Muhammad Ghulam, Saad Alkahtani","doi":"10.1109/AICCSA.2014.7073198","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073198","url":null,"abstract":"Computer assisted language learning (CALL) and, more specifically, computer assisted pronunciation training (CAPT) have received considerable attention in recent years. CAPT allows continuous feedback to the learner without requiring the sole attention of the teacher; it facilitates self study and encourages interactive use of the language in preference to rote learning. One of the important processes in CAPT system is error detection, which locates the errors in the utterance. Although Arabic is currently one of the most widely spoken languages in the world, there has been relatively little research about detection of the pronunciation error by nonnative speakers compared to the other languages. This research is concerned with detecting pronunciation errors of nonnative Arabic speakers from Pakistan and India. All the sounds in this study were taken from King Saud University (KSU) Arabic Speech Database. By analyzing the speech of the Pakistani and Indian speakers in KSU database we found that five phonemes were often mispronounced by nonnative speakers, hence this research will concentrate on pronunciation errors in these five phonemes. The system was built with native and nonnative speakers, and tested with nonnative only. For each phoneme, the Goodness of Pronunciation (GOP) was calculated and compared with a threshold to decide if the phoneme was pronounced correctly or not. The result showed that GOP gave high accuracy, where the scoring accuracy was very good to excellent from 87% to 100%, and the false rejection was zero to less than 10%. This machine judgment is compared with human judgment and the comparison shows excellent agreement between them.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126276729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel spreading framework using incremental clustering for viral marketing","authors":"Lulwah Alsuwaidan, M. Ykhlef, M. Alnuem","doi":"10.1109/AICCSA.2014.7073182","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073182","url":null,"abstract":"Mining online social network has been a target for many recent studies in the literature. However, a limited have been aimed for the purpose of viral marketing. In this paper, a proposing of a novel spreading framework for viral marketing by using incremental clustering and activity network is presented. This framework ensures optimization in terms of cost and time by concentrating only on the most active users in online social network. Incremental clustering typically works at certifying that the viral marketing process is applied in the most updated network since many changes would occur in the networks especially in the node's connections. Generally, the framework divides the overall community into clusters each of which has its interest. In addition, it ensures the overlapping between clusters when users having more than one interest. Activity network, on the other hand, excludes the least active nodes or the ones with limited connections. This way will consume less cost and time comparing to cover all nodes (active and inactive).","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122751792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of IEEE 802.15.6 MAC for Wearable Body Sensor Networks using a Space-Time dependent radio link model","authors":"M. Alam, Elyes Ben Hamida","doi":"10.1109/AICCSA.2014.7073232","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073232","url":null,"abstract":"In this paper a realistic performance evaluation of the IEEE 802.15.6 Medium Access Control (MAC) protocol for wireless body sensor networks (WBSNs) is presented. The accuracy of the evaluation rely on the enhanced mobility and radio link models, which are based on real-time motion capture mobility traces. Bio-mechanical modeling is used to capture 'walking', 'stand-sit' and 'running' patterns for comprehensive mobility modeling. There are multiple contributions in this paper. First, dynamic (i.e., space and time-varying) mobility models are presented which provides dynamic distances and hence more accurate pathloss models in comparison to IEEE 802.15.6 channel models. Second, accurate radio-link modeling is presented which computes on-line Signal-to-Noise-Ratio (SNR), Bit-Error- Rate (BER) and Packet-Error-Rate (PER). Third, a comprehensive analysis of the IEEE 802.15.6 PHY and MAC layers parameters are explored. The rescue and critical applications based specific constraints are used to analyze the IEEE 802.15.6 standard. Finally, few configurations among huge set of possibilities are selected for performance evaluation. Three metrics i.e., Packet Delivery Radio (PDR), energy consumption and latency are considered. At higher transmission power (i.e., 0 dBm), most of the medical applications data rates constraints are satisfied, whereas, at lower transmit power with high data rates and higher frequency, the results does not meet the non-medical applications requirements. However, further optimization by dynamically adjusting the number of slots and its duration at the MAC layer can improve the throughput which can help significantly to meet the application requirements.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125897715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}