Pub Date : 2016-09-01DOI: 10.1109/ICMCS.2016.7905594
Nouha Samet, Asma BEN LETAIFA, Mohamed Hamdi, S. Tabbane
Video streaming services over the Internet is being widely used in mobile networks. From providers' point of view, the success of such service is highly correlated with the end-user degree of satisfaction which is measured in terms of Quality of Experience QoE. In fact, most of video streaming providers are adopting adaptive streaming solution that offers a better experience to the end user since it is better to have a lower video quality instead of no video at all. Currently, service providers start to secure data transfers using encrypted stream, most importantly HTTPS, as it is one pillar of the whole experience of video stream services. In this paper, we are addressing the efficiency of video encryption schemes when facing mobile cloud system requirement without compromising the end user global experience of video services.
{"title":"On video stream encryption efficiency for mobile cloud system","authors":"Nouha Samet, Asma BEN LETAIFA, Mohamed Hamdi, S. Tabbane","doi":"10.1109/ICMCS.2016.7905594","DOIUrl":"https://doi.org/10.1109/ICMCS.2016.7905594","url":null,"abstract":"Video streaming services over the Internet is being widely used in mobile networks. From providers' point of view, the success of such service is highly correlated with the end-user degree of satisfaction which is measured in terms of Quality of Experience QoE. In fact, most of video streaming providers are adopting adaptive streaming solution that offers a better experience to the end user since it is better to have a lower video quality instead of no video at all. Currently, service providers start to secure data transfers using encrypted stream, most importantly HTTPS, as it is one pillar of the whole experience of video stream services. In this paper, we are addressing the efficiency of video encryption schemes when facing mobile cloud system requirement without compromising the end user global experience of video services.","PeriodicalId":345854,"journal":{"name":"2016 5th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132724916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICMCS.2016.7905638
Nagi Ould Taleb, A. Chergui, M. L. B. Maati, Mohamedade Farouk Nanne
Automatic detection of human in a video sequence is a canonical instance of object detection. It's considered as a nonrigid object; it has many appearances at different perspectives. Different approaches are used by several methods to combine what is specific to the pedestrian detection, and what is common to the object recognition. A robust solution to this problem would have numerous applications to design smart systems, including video surveillance, power management, vehicle driver assistance systems, and evaluation of advertising policies. In this article we will discuss the main techniques of human (pedestian) detection on video sequence. Especially those how are learning-based methods. Then we describe in general terms the type of information that can be extracted once the detection is performed.
{"title":"Overview on automatic detection of human body","authors":"Nagi Ould Taleb, A. Chergui, M. L. B. Maati, Mohamedade Farouk Nanne","doi":"10.1109/ICMCS.2016.7905638","DOIUrl":"https://doi.org/10.1109/ICMCS.2016.7905638","url":null,"abstract":"Automatic detection of human in a video sequence is a canonical instance of object detection. It's considered as a nonrigid object; it has many appearances at different perspectives. Different approaches are used by several methods to combine what is specific to the pedestrian detection, and what is common to the object recognition. A robust solution to this problem would have numerous applications to design smart systems, including video surveillance, power management, vehicle driver assistance systems, and evaluation of advertising policies. In this article we will discuss the main techniques of human (pedestian) detection on video sequence. Especially those how are learning-based methods. Then we describe in general terms the type of information that can be extracted once the detection is performed.","PeriodicalId":345854,"journal":{"name":"2016 5th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133955014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICMCS.2016.7905665
A. Alami, M. Bahaj
NoSQL databases are designed to solve data processing problems in volume. Growth data today pushes us to think about new concepts and approaches for converting data from a source database to a NoSQL database. This paper describes some approaches, methods of migration, database reverse engineering, and offers a migration approach from a relational database to a Document-oriented database NoSQL (MongoDB). The approach based on the achievement of a data model, from which we proceed to the migration of schema and data mapping, while ensuring the integrity constraints between collections.
{"title":"Migration of a relational databases to NoSQL: The way forward","authors":"A. Alami, M. Bahaj","doi":"10.1109/ICMCS.2016.7905665","DOIUrl":"https://doi.org/10.1109/ICMCS.2016.7905665","url":null,"abstract":"NoSQL databases are designed to solve data processing problems in volume. Growth data today pushes us to think about new concepts and approaches for converting data from a source database to a NoSQL database. This paper describes some approaches, methods of migration, database reverse engineering, and offers a migration approach from a relational database to a Document-oriented database NoSQL (MongoDB). The approach based on the achievement of a data model, from which we proceed to the migration of schema and data mapping, while ensuring the integrity constraints between collections.","PeriodicalId":345854,"journal":{"name":"2016 5th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"396 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122792540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICMCS.2016.7905576
I. Aznabet, M. A. Ennasar, O. Mrabet, S. Tedjini, M. Khalladi
In this paper, a new meander line UHF RFID tag antenna loaded with split ring resonator is presented. The antenna has a simple structure and low profile with only one layer of FR4 dielectric substrate and metallization. To achieve a good and impedance matching, the antenna has been loaded with a metamaterial structure (SRR). The obtained impedance bandwidth covers the American band (900–928 MHz). The proposed design provided quasi omnidirectional radiation pattern and radiation efficiency near to 90% in the operating band. The calculated reading range was 4.36 m at center frequency band.
{"title":"Meander-line UHF RFID tag antenna loaded with split ring rersonator","authors":"I. Aznabet, M. A. Ennasar, O. Mrabet, S. Tedjini, M. Khalladi","doi":"10.1109/ICMCS.2016.7905576","DOIUrl":"https://doi.org/10.1109/ICMCS.2016.7905576","url":null,"abstract":"In this paper, a new meander line UHF RFID tag antenna loaded with split ring resonator is presented. The antenna has a simple structure and low profile with only one layer of FR4 dielectric substrate and metallization. To achieve a good and impedance matching, the antenna has been loaded with a metamaterial structure (SRR). The obtained impedance bandwidth covers the American band (900–928 MHz). The proposed design provided quasi omnidirectional radiation pattern and radiation efficiency near to 90% in the operating band. The calculated reading range was 4.36 m at center frequency band.","PeriodicalId":345854,"journal":{"name":"2016 5th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114241611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICMCS.2016.7905592
Marouane El Azzaoui, H. Mahmoudi, Chafik Ed-dahmani
This paper presents how to generate the VHDL code of the backstepping control of a doubly fed induction generator required for programming an FPGA without knowledge of VHDL programming. This control strategy will be developed by the Xilinx System Generator (XSG) tool integrated in matlab/simulink environment. The importance of this technique is to enjoy the benefits of Simulink and XSG. The first simulates the proposed control algorithm and the second generates the VHDL code of discrete algorithm that can subsequently be implemented on FPGA.
本文介绍了如何在不懂VHDL编程的情况下,生成FPGA编程所需的双馈感应发生器反步控制的VHDL代码。该控制策略将由集成在matlab/simulink环境中的Xilinx System Generator (XSG)工具开发。这种技术的重要性在于可以享受到Simulink和XSG的好处。首先对所提出的控制算法进行仿真,然后生成离散算法的VHDL代码,该代码随后可以在FPGA上实现。
{"title":"Backstepping control of the doubly fed induction generator using Xilinx System Generator for implementation on FPGA","authors":"Marouane El Azzaoui, H. Mahmoudi, Chafik Ed-dahmani","doi":"10.1109/ICMCS.2016.7905592","DOIUrl":"https://doi.org/10.1109/ICMCS.2016.7905592","url":null,"abstract":"This paper presents how to generate the VHDL code of the backstepping control of a doubly fed induction generator required for programming an FPGA without knowledge of VHDL programming. This control strategy will be developed by the Xilinx System Generator (XSG) tool integrated in matlab/simulink environment. The importance of this technique is to enjoy the benefits of Simulink and XSG. The first simulates the proposed control algorithm and the second generates the VHDL code of discrete algorithm that can subsequently be implemented on FPGA.","PeriodicalId":345854,"journal":{"name":"2016 5th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116433800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICMCS.2016.7905662
Aafaf Ouaddah, H. Mousannif, A. A. E. Kalam, A. A. Ouahman
the goal of this paper is to survey access control models, protocols and frameworks in IoT. We provide a literature overview and discuss in a qualitative way the most relevant IoT related-projects over recent years.
{"title":"Access control in IoT: Survey & state of the art","authors":"Aafaf Ouaddah, H. Mousannif, A. A. E. Kalam, A. A. Ouahman","doi":"10.1109/ICMCS.2016.7905662","DOIUrl":"https://doi.org/10.1109/ICMCS.2016.7905662","url":null,"abstract":"the goal of this paper is to survey access control models, protocols and frameworks in IoT. We provide a literature overview and discuss in a qualitative way the most relevant IoT related-projects over recent years.","PeriodicalId":345854,"journal":{"name":"2016 5th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114661098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICMCS.2016.7905610
Mohamed Taib Mohtadi, Adel Deraoui, H. Allali, A. Hajami
This article presents a “trace-based system” (TBS) integrated in a hypermedia learning environment (HLE). This HLE also includes metacognitive incentives with the aim of increasing the self-regulated learning behavior among learners. Digital traces of the activities recorded by the system enabled us to evaluate how learners performed metacognitive activities (orientation by objectives, planning, specification of goals, research & judgment, evaluation and monitoring). Using our TBS has allowed us to examine patterns of individual navigations through the HLE that reflect quality of self-regulation, the nature of the privileged pathways of learners, resources visited and time spent on each type of cognitive regulatory activity. This article describes the structure of the TBS and the results of his experiment.
{"title":"Trace-based system for metacognitive behavior in online learning activity","authors":"Mohamed Taib Mohtadi, Adel Deraoui, H. Allali, A. Hajami","doi":"10.1109/ICMCS.2016.7905610","DOIUrl":"https://doi.org/10.1109/ICMCS.2016.7905610","url":null,"abstract":"This article presents a “trace-based system” (TBS) integrated in a hypermedia learning environment (HLE). This HLE also includes metacognitive incentives with the aim of increasing the self-regulated learning behavior among learners. Digital traces of the activities recorded by the system enabled us to evaluate how learners performed metacognitive activities (orientation by objectives, planning, specification of goals, research & judgment, evaluation and monitoring). Using our TBS has allowed us to examine patterns of individual navigations through the HLE that reflect quality of self-regulation, the nature of the privileged pathways of learners, resources visited and time spent on each type of cognitive regulatory activity. This article describes the structure of the TBS and the results of his experiment.","PeriodicalId":345854,"journal":{"name":"2016 5th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125443453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICMCS.2016.7905556
Amine Labriji, Salma Charkaoui, I. Abdelbaki, A. Namir
The fundamental objective of an information search system based on interest center and the user profile is to return, from a collection of documents, the elements that are relevant to specific user needs. The selection of only documents interesting a user is done on the basis of interest center, calculated from the information about the user named user profile. The information retrieval systems converge towards a semantic representation of the user profiles. In contrast, it does not take into account the semantic links in defining the center of interest. So, we used a graphical representation of the user profile based on a domain ontology. So we have been able to use the mathematical power graphs to infer the user's center of interest.
{"title":"User interest center based on a semantic user profile","authors":"Amine Labriji, Salma Charkaoui, I. Abdelbaki, A. Namir","doi":"10.1109/ICMCS.2016.7905556","DOIUrl":"https://doi.org/10.1109/ICMCS.2016.7905556","url":null,"abstract":"The fundamental objective of an information search system based on interest center and the user profile is to return, from a collection of documents, the elements that are relevant to specific user needs. The selection of only documents interesting a user is done on the basis of interest center, calculated from the information about the user named user profile. The information retrieval systems converge towards a semantic representation of the user profiles. In contrast, it does not take into account the semantic links in defining the center of interest. So, we used a graphical representation of the user profile based on a domain ontology. So we have been able to use the mathematical power graphs to infer the user's center of interest.","PeriodicalId":345854,"journal":{"name":"2016 5th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121639905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICMCS.2016.7905656
I. Elmagrouni, M. Lethrech, A. Kenzi, A. Kriouile
the idea of Service-Oriented Computing (SOC) is to understand users' requirements for Service-Based Applications (SBAs). We propose an adaptation-centric approach which allows: (i) modeling users' requirements for Service-Oriented System with the MAP formalism using an Intentional Service Model (ISM); (ii) ontology and the aspect according to the contextual changes in order to inject it in the process BPEL; and (iii) provides architecture for a support tool. We validate our approach by performing experiments on an e-tourism application. The result is an adaptation framework that can guide software engineers in developing adaptable service-based applications.
{"title":"Approach for building Services-Oriented systems adaptable","authors":"I. Elmagrouni, M. Lethrech, A. Kenzi, A. Kriouile","doi":"10.1109/ICMCS.2016.7905656","DOIUrl":"https://doi.org/10.1109/ICMCS.2016.7905656","url":null,"abstract":"the idea of Service-Oriented Computing (SOC) is to understand users' requirements for Service-Based Applications (SBAs). We propose an adaptation-centric approach which allows: (i) modeling users' requirements for Service-Oriented System with the MAP formalism using an Intentional Service Model (ISM); (ii) ontology and the aspect according to the contextual changes in order to inject it in the process BPEL; and (iii) provides architecture for a support tool. We validate our approach by performing experiments on an e-tourism application. The result is an adaptation framework that can guide software engineers in developing adaptable service-based applications.","PeriodicalId":345854,"journal":{"name":"2016 5th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130567856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/ICMCS.2016.7905581
R. Batit, M. Chraygane, M. Ferfra
The purpose of this paper is to develop a new high voltage power supply for N=2 magnetrons, 800 Watts at 2450 MHz each; using a high voltage transformer with magnetic shunts. We present a new equivalent electrical circuit of this transformer which allowed, through its integration into the global electrical diagram of the new power supply, to model the entire high voltage power supply using numerical computation software EMTP dedicated to the transitional regimes. Then, a study of the influence of each geometrical parameter of the special HV transformer with magnétic shunts will guide us studying the optimization's strategy of this high voltage power supply for industrial microwave generators. This study allows achieving an important volume gains, congestion and weight, then consequently reducing the different costs of this high voltage power supply.
{"title":"New electrical model, simulation and optimization of a high voltage power supply for industrial microwave generators with two magnetrons, 1600 watts at 2.45GHz","authors":"R. Batit, M. Chraygane, M. Ferfra","doi":"10.1109/ICMCS.2016.7905581","DOIUrl":"https://doi.org/10.1109/ICMCS.2016.7905581","url":null,"abstract":"The purpose of this paper is to develop a new high voltage power supply for N=2 magnetrons, 800 Watts at 2450 MHz each; using a high voltage transformer with magnetic shunts. We present a new equivalent electrical circuit of this transformer which allowed, through its integration into the global electrical diagram of the new power supply, to model the entire high voltage power supply using numerical computation software EMTP dedicated to the transitional regimes. Then, a study of the influence of each geometrical parameter of the special HV transformer with magnétic shunts will guide us studying the optimization's strategy of this high voltage power supply for industrial microwave generators. This study allows achieving an important volume gains, congestion and weight, then consequently reducing the different costs of this high voltage power supply.","PeriodicalId":345854,"journal":{"name":"2016 5th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130671177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}