首页 > 最新文献

International Conference on Multimedia Computing and Systems最新文献

英文 中文
A mobility aware Modified AODV for heterogeneous mobile ad hoc networks 面向异构移动自组织网络的可移动性改进AODV
Pub Date : 1900-01-01 DOI: 10.1109/ICMCS.2012.6320199
Ahmed Bisengar, O. Zytoune, M. Rziza, M. Ouadou
Heterogeneous Mobile Ad-hoc Networks (MANETs) are composed of nodes with different transmission range. Due to the difference of transmission range and relative velocity for network nodes, the link between two nodes can or will be unidirectional. In the standard AODV protocol, the shortest path is always selected. But this shortest path is the easiest broken one. In this paper, we propose an improvement of AODV protocol called H-MAODV(heterogeneity and Mobility aware AODV). This protocol is based on considering the distance and relative velocity between each node and one hop neighbor. Which permits to avoid losing route. Through the simulation, it is confirmed that this improvement has higher package delivery fraction than basic AODV protocol.
{"title":"A mobility aware Modified AODV for heterogeneous mobile ad hoc networks","authors":"Ahmed Bisengar, O. Zytoune, M. Rziza, M. Ouadou","doi":"10.1109/ICMCS.2012.6320199","DOIUrl":"https://doi.org/10.1109/ICMCS.2012.6320199","url":null,"abstract":"Heterogeneous Mobile Ad-hoc Networks (MANETs) are composed of nodes with different transmission range. Due to the difference of transmission range and relative velocity for network nodes, the link between two nodes can or will be unidirectional. In the standard AODV protocol, the shortest path is always selected. But this shortest path is the easiest broken one. In this paper, we propose an improvement of AODV protocol called H-MAODV(heterogeneity and Mobility aware AODV). This protocol is based on considering the distance and relative velocity between each node and one hop neighbor. Which permits to avoid losing route. Through the simulation, it is confirmed that this improvement has higher package delivery fraction than basic AODV protocol.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116841696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A perturb and observe method using fuzzy logic control for PV pumping system 基于模糊逻辑控制的光伏抽运系统摄动观察方法
Pub Date : 1900-01-01 DOI: 10.1109/ICMCS.2014.6911337
A. Sarah, El Bachtiri Rachid
This paper provides a theoretical study of the P&O maximum power point tracking (MPPT) technique, using fuzzy logic control applied to a standalone PV pumping system. With conventional P&O algorithm using fixed iteration step-size, it is impossible to satisfy both performance of fast dynamic response and good accuracy under irradiance and temperature changing. To overcome these limitations a new adaptive P&O method with fuzzy logic control (FLC) is presented. The influence of the proposed method parameters on system behavior is investigated and compared with the traditional P&O method. The studied system consists of a PV panel, a DC-DC boost converter, and a PMDC motor-pump. To evaluate the proposed method, we use the simulation with Matlab/Simulink and we compare it with the traditional P&O method under different insolation. The obtained results illustrate the effectiveness of the proposed technique.
{"title":"A perturb and observe method using fuzzy logic control for PV pumping system","authors":"A. Sarah, El Bachtiri Rachid","doi":"10.1109/ICMCS.2014.6911337","DOIUrl":"https://doi.org/10.1109/ICMCS.2014.6911337","url":null,"abstract":"This paper provides a theoretical study of the P&O maximum power point tracking (MPPT) technique, using fuzzy logic control applied to a standalone PV pumping system. With conventional P&O algorithm using fixed iteration step-size, it is impossible to satisfy both performance of fast dynamic response and good accuracy under irradiance and temperature changing. To overcome these limitations a new adaptive P&O method with fuzzy logic control (FLC) is presented. The influence of the proposed method parameters on system behavior is investigated and compared with the traditional P&O method. The studied system consists of a PV panel, a DC-DC boost converter, and a PMDC motor-pump. To evaluate the proposed method, we use the simulation with Matlab/Simulink and we compare it with the traditional P&O method under different insolation. The obtained results illustrate the effectiveness of the proposed technique.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121910555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Spatio-temporal context for improving sentiment analysis accuracy 提高情感分析准确性的时空背景
Pub Date : 1900-01-01 DOI: 10.1109/ICMCS.2018.8525959
Maryame Naji, N. Daoudi, R. Ajhoun
With the explosion of web 2.0, we are witnessing a sharp increase in Internet users such as a vertiginous evolution of social media. These Medias constitute a source of rich and varied information for researchers in sentiment analyses. In fact, The area of sentiment analysis has recently enjoyed a huge burst of research activity. This paper describes a tool for sifting through and synthesizing reviews by identifying the main factors that influence sentiment analysis, especially, those most propitious in the medical context.
{"title":"Spatio-temporal context for improving sentiment analysis accuracy","authors":"Maryame Naji, N. Daoudi, R. Ajhoun","doi":"10.1109/ICMCS.2018.8525959","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525959","url":null,"abstract":"With the explosion of web 2.0, we are witnessing a sharp increase in Internet users such as a vertiginous evolution of social media. These Medias constitute a source of rich and varied information for researchers in sentiment analyses. In fact, The area of sentiment analysis has recently enjoyed a huge burst of research activity. This paper describes a tool for sifting through and synthesizing reviews by identifying the main factors that influence sentiment analysis, especially, those most propitious in the medical context.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117165304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evolution approaches towards a Service oriented architecture 面向服务架构的演进方法
Pub Date : 1900-01-01 DOI: 10.1109/ICMCS.2012.6320243
Ali Seridi, A. Seriai
Over a decade, Service-oriented architectures (SOA) have seen an increasing interest of both academia and industry communities. This interest is associated with an enthusiasm of companies in different sectors and sizes for the adoption of this new paradigm due to its economic and technological benefits. SOA is a very effective response to the problems faced by companies in terms of reusability, interoperability and reduce coupling between systems that implement their information systems. To exploit these advantages many organizations have decided to evolve their legacy systems (LS) towards this architecture. Migration to SOA has become one of the most important modernizations technic of LS. It helps organizations, on the one hand, to reuse their existing LS by giving them a new life, and also to enjoy the benefits of service-based systems. In the literature, several approaches exist for evolving LS towards SOA. Through this paper, we present a survey of these approaches. Then we discuss several existing classifications of the modernization approaches to SOA, so that at the end we propose our own classification after having discussed the similar works.
{"title":"Evolution approaches towards a Service oriented architecture","authors":"Ali Seridi, A. Seriai","doi":"10.1109/ICMCS.2012.6320243","DOIUrl":"https://doi.org/10.1109/ICMCS.2012.6320243","url":null,"abstract":"Over a decade, Service-oriented architectures (SOA) have seen an increasing interest of both academia and industry communities. This interest is associated with an enthusiasm of companies in different sectors and sizes for the adoption of this new paradigm due to its economic and technological benefits. SOA is a very effective response to the problems faced by companies in terms of reusability, interoperability and reduce coupling between systems that implement their information systems. To exploit these advantages many organizations have decided to evolve their legacy systems (LS) towards this architecture. Migration to SOA has become one of the most important modernizations technic of LS. It helps organizations, on the one hand, to reuse their existing LS by giving them a new life, and also to enjoy the benefits of service-based systems. In the literature, several approaches exist for evolving LS towards SOA. Through this paper, we present a survey of these approaches. Then we discuss several existing classifications of the modernization approaches to SOA, so that at the end we propose our own classification after having discussed the similar works.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122822247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Estimation of the use of voip server resources by neural networks 基于神经网络的voip服务器资源使用估计
Pub Date : 1900-01-01 DOI: 10.1109/ICMCS.2014.6911130
Ndaohialy Manda-Vy Ravonimanantsoa, Stefana Reziky Zafimarina Zo Jaona, Yvon Andrianaharison
No researches on VoIP servers have highlighted their analytical models to study their behavior depending on the number of users. This is complex because the scheduling algorithms to solve it have limitations. The aim of our paper is to present a VoIP server modeling by neural network, having as input the number of calls and output as the use of hardware resources of the server. A generalization of this model is given at the end of our research.
{"title":"Estimation of the use of voip server resources by neural networks","authors":"Ndaohialy Manda-Vy Ravonimanantsoa, Stefana Reziky Zafimarina Zo Jaona, Yvon Andrianaharison","doi":"10.1109/ICMCS.2014.6911130","DOIUrl":"https://doi.org/10.1109/ICMCS.2014.6911130","url":null,"abstract":"No researches on VoIP servers have highlighted their analytical models to study their behavior depending on the number of users. This is complex because the scheduling algorithms to solve it have limitations. The aim of our paper is to present a VoIP server modeling by neural network, having as input the number of calls and output as the use of hardware resources of the server. A generalization of this model is given at the end of our research.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126167966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VANET protocols for more safety and fluidity in Intelligent Transportation Systems VANET协议在智能交通系统中提高安全性和流动性
Pub Date : 1900-01-01 DOI: 10.1109/ICMCS.2018.8525986
Manal Amraoui, N. Daoudi, Imane Hilal, R. Ajhoun
In recent years, Intelligent Transportation systems (ITS) have attracted many researchers. An ITS ecosystem is mainly composed of three components, the driver, the vehicle and the environment which is divided into static and dynamic. The intelligence in the transportation systems is illustrated by the communication between its components. Three communication scenarios exist, vehicle to vehicle, vehicle to environment and hybrid communication that groups both of the latter scenarios. Safety and fluidity are two major issues to take into consideration in ITS. In this paper the focus is on safety in ITS, because it directly impacts people’s safety. Therefore, the security architecture must be well defined. Thus, Vehicular networks (VANETS), are a special type of ad-hoc network used for communication among the components of the traffic eco-systems. According to the objective of this paper, the most important family of protocols in VANETs, the Wireless Access in the vehicular environment (WAVE), is detailed and discussed.
{"title":"VANET protocols for more safety and fluidity in Intelligent Transportation Systems","authors":"Manal Amraoui, N. Daoudi, Imane Hilal, R. Ajhoun","doi":"10.1109/ICMCS.2018.8525986","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525986","url":null,"abstract":"In recent years, Intelligent Transportation systems (ITS) have attracted many researchers. An ITS ecosystem is mainly composed of three components, the driver, the vehicle and the environment which is divided into static and dynamic. The intelligence in the transportation systems is illustrated by the communication between its components. Three communication scenarios exist, vehicle to vehicle, vehicle to environment and hybrid communication that groups both of the latter scenarios. Safety and fluidity are two major issues to take into consideration in ITS. In this paper the focus is on safety in ITS, because it directly impacts people’s safety. Therefore, the security architecture must be well defined. Thus, Vehicular networks (VANETS), are a special type of ad-hoc network used for communication among the components of the traffic eco-systems. According to the objective of this paper, the most important family of protocols in VANETs, the Wireless Access in the vehicular environment (WAVE), is detailed and discussed.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114277765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The impact of checkpointing interval selection on the scheduling performance of Hadoop framework 检查点间隔选择对Hadoop框架调度性能的影响
Pub Date : 1900-01-01 DOI: 10.1109/ICMCS.2018.8525971
Yassir Samadi, M. Zbakh, Najlae Kasmi
MapReduce is one of the most popular paradigm for processing a huge volume of data (big data) in distributed manner. In addition, Hadoop is considred as one of the most well-known implemention of MapReduce for processing MapReduce programs. The scheduler in Hadoop manages and monitors the scheduling of tasks. In addition, if a failure takes place, Hadoop reschedules the failed tasks. This makes fault tolerance a critical issue for the efficient operation of any application running on Hadoop in order to ensure the quality of service (QoS) and to meet the end-users expectations. Among the well-used techniques for providing fault tolerance in distributed systems, there is the checkpointing technique. The idea behind checkpointing for MapReduce tasks is to use checkpoints to save intermediate results at some points in time. Once a task fails, it can restart from the checkpointed state. However, selecting an appropriate checkpointing interval is not a trivial task. Unnecessary frequent checkpointing may degrade the system performance. Consequently, the checkpointing interval must be selected taking into account the failure probability, as well as the nature of the workload. Towards this direction, we have analyzed the performance of Hadoop with presence of different types of failures (task failure, TaskTracker failure and NameNode failure). We then investigate via simulation the impact of checkpointing interval selection on the performance of Hadoop under various failure probabilities. This paper also discusses our findings and draws attention on how to improve the checkpointing interval selection on Hadoop.
{"title":"The impact of checkpointing interval selection on the scheduling performance of Hadoop framework","authors":"Yassir Samadi, M. Zbakh, Najlae Kasmi","doi":"10.1109/ICMCS.2018.8525971","DOIUrl":"https://doi.org/10.1109/ICMCS.2018.8525971","url":null,"abstract":"MapReduce is one of the most popular paradigm for processing a huge volume of data (big data) in distributed manner. In addition, Hadoop is considred as one of the most well-known implemention of MapReduce for processing MapReduce programs. The scheduler in Hadoop manages and monitors the scheduling of tasks. In addition, if a failure takes place, Hadoop reschedules the failed tasks. This makes fault tolerance a critical issue for the efficient operation of any application running on Hadoop in order to ensure the quality of service (QoS) and to meet the end-users expectations. Among the well-used techniques for providing fault tolerance in distributed systems, there is the checkpointing technique. The idea behind checkpointing for MapReduce tasks is to use checkpoints to save intermediate results at some points in time. Once a task fails, it can restart from the checkpointed state. However, selecting an appropriate checkpointing interval is not a trivial task. Unnecessary frequent checkpointing may degrade the system performance. Consequently, the checkpointing interval must be selected taking into account the failure probability, as well as the nature of the workload. Towards this direction, we have analyzed the performance of Hadoop with presence of different types of failures (task failure, TaskTracker failure and NameNode failure). We then investigate via simulation the impact of checkpointing interval selection on the performance of Hadoop under various failure probabilities. This paper also discusses our findings and draws attention on how to improve the checkpointing interval selection on Hadoop.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129583194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy consumption balancing in wireless sensors networks 无线传感器网络中的能量消耗平衡
Pub Date : 1900-01-01 DOI: 10.1109/ICMCS.2014.6911348
Amine Rais, Khalid Bouragba, E. Ziyati, M. Ouzzif
The management of energy in wireless sensors networks (wsn) is the main factor that can influence the lifespan of the network. To reduce the energy consumption, the transmission of data between sensor nodes must be reduced in order to preserve the remaining energy in every node. The nodes closest to the sink are critical nodes, they perform far more tasks than other nodes in wsn and consume a big amount of energy. Therefore, the resources of these nodes determine the lifetime of the whole network. To reduce the network traffic overhead and prolong the lifespan of the network we propose a new energy balancing architecture based on hexagonal clusters. In addition, the use of a mobile agent for each and every cluster and several sinks for the whole network can solve the problem of uneven energy consumption of both inter- and intra-cluster environments.
{"title":"Energy consumption balancing in wireless sensors networks","authors":"Amine Rais, Khalid Bouragba, E. Ziyati, M. Ouzzif","doi":"10.1109/ICMCS.2014.6911348","DOIUrl":"https://doi.org/10.1109/ICMCS.2014.6911348","url":null,"abstract":"The management of energy in wireless sensors networks (wsn) is the main factor that can influence the lifespan of the network. To reduce the energy consumption, the transmission of data between sensor nodes must be reduced in order to preserve the remaining energy in every node. The nodes closest to the sink are critical nodes, they perform far more tasks than other nodes in wsn and consume a big amount of energy. Therefore, the resources of these nodes determine the lifetime of the whole network. To reduce the network traffic overhead and prolong the lifespan of the network we propose a new energy balancing architecture based on hexagonal clusters. In addition, the use of a mobile agent for each and every cluster and several sinks for the whole network can solve the problem of uneven energy consumption of both inter- and intra-cluster environments.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116247479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fixed sequencer ring topology for grid: A group communication system for complex systems in a wide area network 网格固定定序环拓扑:广域网中复杂系统的群通信系统
Pub Date : 1900-01-01 DOI: 10.1109/ICMCS.2014.6911263
F. Lassoued, R. Bouallègue
Complex Systems are more and more vulnerable to failures on account of their growing complexity and distribution. This problem motivates the need for a fault tolerance mechanism in such systems. Hence, we focus on distributed algorithmic review that make the task of failure detection and repair much easier.
{"title":"Fixed sequencer ring topology for grid: A group communication system for complex systems in a wide area network","authors":"F. Lassoued, R. Bouallègue","doi":"10.1109/ICMCS.2014.6911263","DOIUrl":"https://doi.org/10.1109/ICMCS.2014.6911263","url":null,"abstract":"Complex Systems are more and more vulnerable to failures on account of their growing complexity and distribution. This problem motivates the need for a fault tolerance mechanism in such systems. Hence, we focus on distributed algorithmic review that make the task of failure detection and repair much easier.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128311398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unveiling confidentiality-related vulnerabilities in an IMS-based environment 在基于ims的环境中揭示与机密性相关的漏洞
Pub Date : 1900-01-01 DOI: 10.1109/ICMCS.2016.7905652
Ilyas Ed-daoui, T. Mazri, N. Hmina
Long Term Evolution (LTE) is spreading and becoming the dominant cellular networking technology. This revolution of telecommunication network implementation methodology from its circuit-switched pattern towards a packet-switched network that resembles the ordinary packet-based networks, like Internet. Moreover, cellular network operators have adopted a new mechanism, in order to handle voice calls over the LTE network, called Voice over LTE (VoLTE), which changes how these voice calls are handled, from both user equipment and infrastructure perspectives. As a result, the VoLTE setup is controlled and performed by the Application Server (AS), using Session Initiation Protocol (SIP) and Real-time Transport Protocol (RTP), unlike the traditional call setup in previous cellular network generations. This radical shift opens up a number of new vulnerabilities that could not be previously explored especially regarding confidentiality, which this paper presents a systematic security analysis, results and solution.
{"title":"Unveiling confidentiality-related vulnerabilities in an IMS-based environment","authors":"Ilyas Ed-daoui, T. Mazri, N. Hmina","doi":"10.1109/ICMCS.2016.7905652","DOIUrl":"https://doi.org/10.1109/ICMCS.2016.7905652","url":null,"abstract":"Long Term Evolution (LTE) is spreading and becoming the dominant cellular networking technology. This revolution of telecommunication network implementation methodology from its circuit-switched pattern towards a packet-switched network that resembles the ordinary packet-based networks, like Internet. Moreover, cellular network operators have adopted a new mechanism, in order to handle voice calls over the LTE network, called Voice over LTE (VoLTE), which changes how these voice calls are handled, from both user equipment and infrastructure perspectives. As a result, the VoLTE setup is controlled and performed by the Application Server (AS), using Session Initiation Protocol (SIP) and Real-time Transport Protocol (RTP), unlike the traditional call setup in previous cellular network generations. This radical shift opens up a number of new vulnerabilities that could not be previously explored especially regarding confidentiality, which this paper presents a systematic security analysis, results and solution.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122339618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Conference on Multimedia Computing and Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1