首页 > 最新文献

2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)最新文献

英文 中文
Optimization of the Radar Ambiguity Function-Application to Chaotic Sequences: Invited Paper 雷达模糊函数的优化——在混沌序列中的应用
Pub Date : 2019-10-01 DOI: 10.1109/wincom47513.2019.8942484
Z. Jemaa, S. Marcos, S. Belghith
In this paper we propose a statistical approach for the optimization of the phased codes used in radar. By considering each code as a realization of a random variable we show that we can build good codes if the distribution of the random variable is suitably chosen. We then consider sequences generated by the skew tent map and we show that for some values of the bifurcation parameter the invariant probability density coincides with the desired one. To confirm this idea we compute the maximal peak of the ambiguity function outside zero relative to the bifurcation parameter of the skew tent map.
本文提出了一种用于雷达相位码优化的统计方法。通过将每个码视为一个随机变量的实现,我们表明,如果选择合适的随机变量分布,我们可以构建良好的码。然后,我们考虑由斜帐篷映射生成的序列,并证明了对于分支参数的某些值,不变概率密度与期望值一致。为了证实这一想法,我们计算了相对于斜帐篷图的分岔参数的零外模糊函数的最大峰值。
{"title":"Optimization of the Radar Ambiguity Function-Application to Chaotic Sequences: Invited Paper","authors":"Z. Jemaa, S. Marcos, S. Belghith","doi":"10.1109/wincom47513.2019.8942484","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942484","url":null,"abstract":"In this paper we propose a statistical approach for the optimization of the phased codes used in radar. By considering each code as a realization of a random variable we show that we can build good codes if the distribution of the random variable is suitably chosen. We then consider sequences generated by the skew tent map and we show that for some values of the bifurcation parameter the invariant probability density coincides with the desired one. To confirm this idea we compute the maximal peak of the ambiguity function outside zero relative to the bifurcation parameter of the skew tent map.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134569561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved security intrusion detection using intelligent techniques 使用智能技术改进安全入侵检测
Pub Date : 2019-10-01 DOI: 10.1109/wincom47513.2019.8942553
C. Leghris, Ouafae Elaeraj, É. Renault
Nowadays, the information systems security is a crucial issue for the survival of any company, so this justifies the use of intrusion detection systems (IDS) or the intrusion prevention systems (IPS). These systems are essentially based on the analysis of the network data content (frames), in search of traces of known attacks. Currently, IDS/IPS become the main element of security networks and hosts, they can both detect and respond to an attack in real time or off-line. Even this, having a completely secure network is practically impossible. In this article, we try to propose an improvement of intrusion detection systems based on Machine Learning techniques. These rapidly expanding techniques have shown that predictions and machine learning could be improved, which could significantly improve the reliability of detection against polymorphic and unknown threats. Simulation results showed that security intrusion detection is improved with the use of Machine Learning techniques.
如今,信息系统的安全是任何公司生存的关键问题,因此这证明了入侵检测系统(IDS)或入侵防御系统(IPS)的使用是正当的。这些系统本质上是基于对网络数据内容(帧)的分析,寻找已知攻击的痕迹。目前,IDS/IPS已成为网络和主机安全的主要组成部分,它们既可以实时检测攻击,也可以离线响应攻击。即便如此,拥有一个完全安全的网络实际上也是不可能的。在本文中,我们尝试提出一种基于机器学习技术的入侵检测系统改进方案。这些快速发展的技术表明,预测和机器学习可以得到改进,这可以显著提高检测多态和未知威胁的可靠性。仿真结果表明,利用机器学习技术改进了安全入侵检测。
{"title":"Improved security intrusion detection using intelligent techniques","authors":"C. Leghris, Ouafae Elaeraj, É. Renault","doi":"10.1109/wincom47513.2019.8942553","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942553","url":null,"abstract":"Nowadays, the information systems security is a crucial issue for the survival of any company, so this justifies the use of intrusion detection systems (IDS) or the intrusion prevention systems (IPS). These systems are essentially based on the analysis of the network data content (frames), in search of traces of known attacks. Currently, IDS/IPS become the main element of security networks and hosts, they can both detect and respond to an attack in real time or off-line. Even this, having a completely secure network is practically impossible. In this article, we try to propose an improvement of intrusion detection systems based on Machine Learning techniques. These rapidly expanding techniques have shown that predictions and machine learning could be improved, which could significantly improve the reliability of detection against polymorphic and unknown threats. Simulation results showed that security intrusion detection is improved with the use of Machine Learning techniques.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132357560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Short term solar irradiance forecasting using artificial neural network for a semi-arid climate in Morocco 利用人工神经网络预测摩洛哥半干旱气候的短期太阳辐照度
Pub Date : 2019-10-01 DOI: 10.1109/wincom47513.2019.8942412
Omaima El Alani, H. Ghennioui, A. Ghennioui
Knowledge of irradiance with high accuracy is of paramount importance for monitoring planning and for better exploitation and distribution of photovoltaic (PV) energy. Different methods have been developed to accurately forecast solar irradiance, in this study, we applied multilayer perception to predict GHI (Global Horizontal Irradiance) for a hot semiarid climate in Benguerir, Morocco. Ground measurements of several meteorological variables and the GHI from the meteorological station installed at the green energy park in Benguerir were used to build the database, different model architectures with various inputs were tested to choose the most efficient model. To evaluate the performance of the models we used the nMBE (normalized Mean Bias Error), nRMSE (normalized Root Mean Square Error), and CC (Correlation Coefficient). The results favored the MLP (Multilayer Perceptron) with 3 inputs and7 neurons in the hidden layer. The final model was experimented to predict GHI for clear and cloudy days, nMBE, nRMSE and CC obtained are respectively (-0.051%, 0.10% and 0.99) for clear days, and (0.14%,0.39% and 0.96%) for cloudy days.
高精度的辐照度知识对于监测规划以及更好地开发和分配光伏(PV)能源至关重要。为了准确预测太阳辐照度,我们已经开发了不同的方法,在本研究中,我们应用多层感知来预测摩洛哥Benguerir炎热半干旱气候的GHI(全球水平辐照度)。利用多个气象变量的地面测量数据和安装在Benguerir绿色能源园区的气象站的GHI来构建数据库,并对不同输入的不同模型架构进行了测试,以选择最有效的模型。为了评估模型的性能,我们使用了nMBE(归一化平均偏差)、nRMSE(归一化均方根误差)和CC(相关系数)。结果表明,MLP (Multilayer Perceptron)具有3个输入,隐藏层有7个神经元。对最终模型进行了晴日和多云天气GHI预测,晴日的nMBE、nRMSE和CC分别为(-0.051%、0.10%和0.99),多云天气的nMBE、nRMSE和CC分别为(0.14%、0.39%和0.96%)。
{"title":"Short term solar irradiance forecasting using artificial neural network for a semi-arid climate in Morocco","authors":"Omaima El Alani, H. Ghennioui, A. Ghennioui","doi":"10.1109/wincom47513.2019.8942412","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942412","url":null,"abstract":"Knowledge of irradiance with high accuracy is of paramount importance for monitoring planning and for better exploitation and distribution of photovoltaic (PV) energy. Different methods have been developed to accurately forecast solar irradiance, in this study, we applied multilayer perception to predict GHI (Global Horizontal Irradiance) for a hot semiarid climate in Benguerir, Morocco. Ground measurements of several meteorological variables and the GHI from the meteorological station installed at the green energy park in Benguerir were used to build the database, different model architectures with various inputs were tested to choose the most efficient model. To evaluate the performance of the models we used the nMBE (normalized Mean Bias Error), nRMSE (normalized Root Mean Square Error), and CC (Correlation Coefficient). The results favored the MLP (Multilayer Perceptron) with 3 inputs and7 neurons in the hidden layer. The final model was experimented to predict GHI for clear and cloudy days, nMBE, nRMSE and CC obtained are respectively (-0.051%, 0.10% and 0.99) for clear days, and (0.14%,0.39% and 0.96%) for cloudy days.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130069845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance Analysis of OLSR Protocol under MPR Attack in Progressive Size Grid MANET 渐进式网格MANET中MPR攻击下的OLSR协议性能分析
Pub Date : 2019-10-01 DOI: 10.1109/wincom47513.2019.8942557
Abderrahim Hajji Soualfi, S. Agoujil, Y. Qaraai
Mobile Ad-hoc NETwork (MANET) is a collection of mobile devices which interchange information without the use of predefined infrastructures or central administration. It is employed in many domains such as military and commercial sectors, data and sensors networks, low level applications, etc. The important constraints in this network are the limitation of bandwidth, processing capabilities and battery life. The choice of an effective routing protocol is primordial. From many routing protocols developed for MANET, OLSR protocol is a widely-used proactive routing protocol which diffuses topological information periodically. Thus, every node has a global vision of the entire network. The protocol assumes, like the other protocols, that the nodes cooperate in a trusted environment. So, all control messages are transmitted (HELLO messages) to all 1-hop neighbor nodes or broadcasted (TC and MID messages) to the entire network in clear. However, a node, which listens to OLSR control messages, can exploit this property to lead an attack. In this paper, we investigate on MultiPoint Relay (MPR) attack considered like one of the efficient OLSR attacks by using a simulation in progressive size gridMANET.
移动自组织网络(MANET)是一组移动设备,在不使用预定义的基础设施或中央管理的情况下交换信息。它被用于许多领域,如军事和商业部门,数据和传感器网络,低级应用等。该网络的重要限制是带宽、处理能力和电池寿命的限制。选择有效的路由协议是最基本的。在面向MANET开发的众多路由协议中,OLSR协议是一种周期性传播拓扑信息的主动路由协议。因此,每个节点都具有整个网络的全局视图。与其他协议一样,该协议假定节点在可信环境中合作。因此,所有的控制消息(HELLO消息)被发送到所有的1跳邻居节点,或者被广播(TC和MID消息)到整个网络。然而,侦听OLSR控制消息的节点可以利用此属性发起攻击。在本文中,我们研究了多点中继(MPR)攻击被认为是一种有效的OLSR攻击,并在渐进式网格manet中进行了仿真。
{"title":"Performance Analysis of OLSR Protocol under MPR Attack in Progressive Size Grid MANET","authors":"Abderrahim Hajji Soualfi, S. Agoujil, Y. Qaraai","doi":"10.1109/wincom47513.2019.8942557","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942557","url":null,"abstract":"Mobile Ad-hoc NETwork (MANET) is a collection of mobile devices which interchange information without the use of predefined infrastructures or central administration. It is employed in many domains such as military and commercial sectors, data and sensors networks, low level applications, etc. The important constraints in this network are the limitation of bandwidth, processing capabilities and battery life. The choice of an effective routing protocol is primordial. From many routing protocols developed for MANET, OLSR protocol is a widely-used proactive routing protocol which diffuses topological information periodically. Thus, every node has a global vision of the entire network. The protocol assumes, like the other protocols, that the nodes cooperate in a trusted environment. So, all control messages are transmitted (HELLO messages) to all 1-hop neighbor nodes or broadcasted (TC and MID messages) to the entire network in clear. However, a node, which listens to OLSR control messages, can exploit this property to lead an attack. In this paper, we investigate on MultiPoint Relay (MPR) attack considered like one of the efficient OLSR attacks by using a simulation in progressive size gridMANET.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130073723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Time Frequency Tensor Framework for DOA Estimation: Application to MIMO Systems DOA估计的时频张量框架:在MIMO系统中的应用
Pub Date : 2019-10-01 DOI: 10.1109/wincom47513.2019.8942512
L. Hachad, F. Mrabti, H. Ghennioui, M. Zouak
In this paper, we show that the DOA estimation problem can be solved through a tensor representation of the non-unitary joint diagonalization of spatial quadratic timefrequency. We use an approach to select time-frequency points to construct the set of matrices forming a third-order tensor. Then, the determination of DOAs is solved by Parallel Factor analysis. The main advantage of this method is that it does not require any whitening stage, and thus, it is intended to work even with a class of correlated signals. Numerical simulations are provided in order to illustrate the effectiveness and behavior of the proposed approach.
本文证明了空间二次次时频的非酉联合对角化的张量表示可以解决DOA估计问题。我们使用一种选择时频点的方法来构造构成三阶张量的矩阵集。然后,采用平行因子分析法求解doa的确定问题。该方法的主要优点是它不需要任何白化阶段,因此,它甚至可以处理一类相关信号。数值模拟说明了该方法的有效性和性能。
{"title":"A Time Frequency Tensor Framework for DOA Estimation: Application to MIMO Systems","authors":"L. Hachad, F. Mrabti, H. Ghennioui, M. Zouak","doi":"10.1109/wincom47513.2019.8942512","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942512","url":null,"abstract":"In this paper, we show that the DOA estimation problem can be solved through a tensor representation of the non-unitary joint diagonalization of spatial quadratic timefrequency. We use an approach to select time-frequency points to construct the set of matrices forming a third-order tensor. Then, the determination of DOAs is solved by Parallel Factor analysis. The main advantage of this method is that it does not require any whitening stage, and thus, it is intended to work even with a class of correlated signals. Numerical simulations are provided in order to illustrate the effectiveness and behavior of the proposed approach.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131411617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Klm-PPSA: Klm-based profiling and preventing security attacks for cloud environments: Invited Paper Klm-PPSA:基于klm的分析和防止云环境的安全攻击:特邀论文
Pub Date : 2019-10-01 DOI: 10.1109/wincom47513.2019.8942509
Nahid Eddermoug, A. Mansour, M. Sadik, Essaid Sabir, Mohamed Azmi
Cloud computing is the newly emerged technology adopted by many organizations due to its different benefits. Unfortunately, despite all the benefits offered by the cloud, there are certain concerns regarding the security issues related to the cloud platform which can threaten its widespread adoption. In this study, we suggest a scalable model to profile and prevent security attacks in the application layer of a cloud environment using an accurate and interpretable machine learning algorithm called regularized class association rules. The proposed model is based, first, on three additional security factors $(k, l$ and $m)$, second, on the traditional authentication methods such as passwords and biometrics including keystroke to grant access to the cloud services/resources for an authorized user. Moreover, a case study of the proposal is given in order to validate the model and its usefulness. Eventually, a simulation was done to test the model performances.
云计算是许多组织采用的新兴技术,因为它具有不同的优点。不幸的是,尽管云提供了所有的好处,但与云平台相关的安全问题仍然存在,这可能会威胁到云的广泛采用。在这项研究中,我们提出了一个可扩展的模型,使用一种称为正则化类关联规则的准确且可解释的机器学习算法来分析和防止云环境应用层中的安全攻击。所提议的模型首先基于三个额外的安全因素$(k, l$和$m)$,其次基于传统的身份验证方法,如密码和生物识别技术,包括为授权用户授予对云服务/资源的访问权限的击键。最后,通过实例分析验证了该模型的有效性。最后通过仿真对模型的性能进行了验证。
{"title":"Klm-PPSA: Klm-based profiling and preventing security attacks for cloud environments: Invited Paper","authors":"Nahid Eddermoug, A. Mansour, M. Sadik, Essaid Sabir, Mohamed Azmi","doi":"10.1109/wincom47513.2019.8942509","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942509","url":null,"abstract":"Cloud computing is the newly emerged technology adopted by many organizations due to its different benefits. Unfortunately, despite all the benefits offered by the cloud, there are certain concerns regarding the security issues related to the cloud platform which can threaten its widespread adoption. In this study, we suggest a scalable model to profile and prevent security attacks in the application layer of a cloud environment using an accurate and interpretable machine learning algorithm called regularized class association rules. The proposed model is based, first, on three additional security factors $(k, l$ and $m)$, second, on the traditional authentication methods such as passwords and biometrics including keystroke to grant access to the cloud services/resources for an authorized user. Moreover, a case study of the proposal is given in order to validate the model and its usefulness. Eventually, a simulation was done to test the model performances.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114810407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fast-OFDM Transmission with Duobinary 3-PSK Modulation: Invited Paper 基于双二进制3-PSK调制的快速ofdm传输:特邀论文
Pub Date : 2019-10-01 DOI: 10.1109/wincom47513.2019.8942502
Liyan Zhu, T. Xu, I. Darwazeh
This paper investigates duobinary signals and their applications in non-orthogonal multi-carrier systems to enhance spectral efficiency. In duobinary transmission schemes, the signal spectrum is reshaped by introducing controlled correlation, which can be eliminated at the duobinary decoder. For the first time, we propose the idea of combining duobinary transmission technique and the fast orthogonal frequency division multiplexing (Fast-OFDM) system with three subcarriers, with experimental results presented. The proposed system is capable of achieving three times the data rate of single-carrier ASK scheme with the same bandwidth. Results show that bit error rate (BER) performance of the proposed duobinary-based Fast-OFDM system is slightly worse than the ASK system. In addition, we also tested various 3-PSK constellation patterns designed for the duobinary signal to achieve performance improvement.
本文研究了二元信号及其在非正交多载波系统中的应用,以提高频谱效率。在二进制传输方案中,通过引入可在二进制解码器处消除的可控相关来重塑信号频谱。首次提出了双二进制传输技术与三子载波快速正交频分复用(fast - ofdm)系统相结合的思想,并给出了实验结果。在相同带宽下,该系统的数据速率是单载波ASK的三倍。结果表明,基于二二进制的Fast-OFDM系统的误码率性能略低于ASK系统。此外,我们还测试了针对二进制信号设计的各种3-PSK星座模式,以实现性能改进。
{"title":"Fast-OFDM Transmission with Duobinary 3-PSK Modulation: Invited Paper","authors":"Liyan Zhu, T. Xu, I. Darwazeh","doi":"10.1109/wincom47513.2019.8942502","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942502","url":null,"abstract":"This paper investigates duobinary signals and their applications in non-orthogonal multi-carrier systems to enhance spectral efficiency. In duobinary transmission schemes, the signal spectrum is reshaped by introducing controlled correlation, which can be eliminated at the duobinary decoder. For the first time, we propose the idea of combining duobinary transmission technique and the fast orthogonal frequency division multiplexing (Fast-OFDM) system with three subcarriers, with experimental results presented. The proposed system is capable of achieving three times the data rate of single-carrier ASK scheme with the same bandwidth. Results show that bit error rate (BER) performance of the proposed duobinary-based Fast-OFDM system is slightly worse than the ASK system. In addition, we also tested various 3-PSK constellation patterns designed for the duobinary signal to achieve performance improvement.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121248792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposed Solutions for Smart Traffic Lights using Machine Learninig and Internet of Thing 利用机器学习和物联网为智能交通灯提出解决方案
Pub Date : 2019-10-01 DOI: 10.1109/wincom47513.2019.8942430
Imad El Hassak, A. Addaim
The Moroccan cities today have a great development at the population level and meanwhile cars are one of the most used and preferable vehicles for users to travel inside the Moroccan cities. These two elements have led the cities roads to be overloaded by vehicles and, consequently, have increased both the expected travel time and the number of accidents in intersections. To come out with solutions to these problems, several traffic management systems have been installed in many cities all over the world such as TRANSYT, SCCOT, SCATS. In general, to optimize the waiting time, the proposed solutions have aimed to optimize the following three elements; time cycle, green light time, and phase. In this article, we will propose some solutions integrating new techniques such as Internet of Things (IoT), Machine Learning and CCTV (Closed Circuit TeleVision) System in order to optimize these elements.
今天的摩洛哥城市在人口层面上有了很大的发展,同时汽车是摩洛哥城市中最常用和最受欢迎的交通工具之一。这两个因素导致城市道路车辆超载,从而增加了预期的旅行时间和十字路口的事故数量。为了解决这些问题,世界上许多城市都安装了交通管理系统,如TRANSYT, SCCOT, SCATS。总的来说,为了优化等待时间,提出的解决方案旨在优化以下三个要素;时间周期,绿灯时间和相位。在本文中,我们将提出一些整合物联网(IoT),机器学习和CCTV(闭路电视)系统等新技术的解决方案,以优化这些元素。
{"title":"Proposed Solutions for Smart Traffic Lights using Machine Learninig and Internet of Thing","authors":"Imad El Hassak, A. Addaim","doi":"10.1109/wincom47513.2019.8942430","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942430","url":null,"abstract":"The Moroccan cities today have a great development at the population level and meanwhile cars are one of the most used and preferable vehicles for users to travel inside the Moroccan cities. These two elements have led the cities roads to be overloaded by vehicles and, consequently, have increased both the expected travel time and the number of accidents in intersections. To come out with solutions to these problems, several traffic management systems have been installed in many cities all over the world such as TRANSYT, SCCOT, SCATS. In general, to optimize the waiting time, the proposed solutions have aimed to optimize the following three elements; time cycle, green light time, and phase. In this article, we will propose some solutions integrating new techniques such as Internet of Things (IoT), Machine Learning and CCTV (Closed Circuit TeleVision) System in order to optimize these elements.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"55 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131830606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Proposed Architecture of e-health IOT 电子医疗物联网架构建议
Pub Date : 2019-10-01 DOI: 10.1109/wincom47513.2019.8942524
Imam Alihamidi, A. Madi, A. Addaim
According to the ABI Research Company, a significant increase in the number of connected objects and this will lead to the emergence of new services or challenges in all areas of the IoT (Internet of Things). In order to meet the new needs or challenges, we have found that it's necessary to review the previously proposed architectures in the literature, in order to make technological improvements. Indeed, in this paper, we propose a secure architecture based on Blockchain technology, scalable with the use of Fog computing technology and allowing the processing and storage of data using a cloud. In addition, the proposed architecture is easy to deploy due to its three-layers: perception layer, network layer and application layer. We also describe the main challenges for the prototyping of the proposed architecture.
根据ABI研究公司的数据,连接对象的数量显著增加,这将导致IoT(物联网)所有领域出现新的服务或挑战。为了满足新的需求或挑战,我们发现有必要回顾以前在文献中提出的架构,以便进行技术改进。事实上,在本文中,我们提出了一种基于区块链技术的安全架构,可以使用雾计算技术进行扩展,并允许使用云处理和存储数据。此外,该架构采用感知层、网络层和应用层三层结构,易于部署。我们还描述了所建议的体系结构原型的主要挑战。
{"title":"Proposed Architecture of e-health IOT","authors":"Imam Alihamidi, A. Madi, A. Addaim","doi":"10.1109/wincom47513.2019.8942524","DOIUrl":"https://doi.org/10.1109/wincom47513.2019.8942524","url":null,"abstract":"According to the ABI Research Company, a significant increase in the number of connected objects and this will lead to the emergence of new services or challenges in all areas of the IoT (Internet of Things). In order to meet the new needs or challenges, we have found that it's necessary to review the previously proposed architectures in the literature, in order to make technological improvements. Indeed, in this paper, we propose a secure architecture based on Blockchain technology, scalable with the use of Fog computing technology and allowing the processing and storage of data using a cloud. In addition, the proposed architecture is easy to deploy due to its three-layers: perception layer, network layer and application layer. We also describe the main challenges for the prototyping of the proposed architecture.","PeriodicalId":222207,"journal":{"name":"2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132486487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2019 International Conference on Wireless Networks and Mobile Communications (WINCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1