Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285782
Hela Lajmi, A. Alimi
Due to the swift growth of network communication, Network monitoring is necessary for evaluating performance issues, recognizing and locating problems. There is increasing interest in passive monitoring obeying to high-bandwidth requirements. In order to decipher how to place monitors under cost-effective and real-time constraints within the network, a new approach is presented in this paper, which solves the problem of monitoring high bitrates and convenes three often-conflicting requirements. The first is supporting high bitrates (over 400 megabytes per second), and hence huge system throughputs. The second is opening a gigabyte file (over 100 Gigabytes) while insuring the real-time analysis of its data, and the third is running only one off-the-shelf and cost-effective computer. The monitoring and analysis chore in our system allows online and offline analysis. Its challenging task is collecting and analyzing such huge data on real-time using a centralized processing architecture.
{"title":"PEMONAS: Passive Ethernet traffic MONitoring and AnalySis system","authors":"Hela Lajmi, A. Alimi","doi":"10.1109/ICCITECHNOL.2012.6285782","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285782","url":null,"abstract":"Due to the swift growth of network communication, Network monitoring is necessary for evaluating performance issues, recognizing and locating problems. There is increasing interest in passive monitoring obeying to high-bandwidth requirements. In order to decipher how to place monitors under cost-effective and real-time constraints within the network, a new approach is presented in this paper, which solves the problem of monitoring high bitrates and convenes three often-conflicting requirements. The first is supporting high bitrates (over 400 megabytes per second), and hence huge system throughputs. The second is opening a gigabyte file (over 100 Gigabytes) while insuring the real-time analysis of its data, and the third is running only one off-the-shelf and cost-effective computer. The monitoring and analysis chore in our system allows online and offline analysis. Its challenging task is collecting and analyzing such huge data on real-time using a centralized processing architecture.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125389021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285779
S. Primak
This paper presents a dynamic model of a Primary User and joint Primary-Secondary Users dynamic models. Analytical solutions and markov approximations are derived based on the traffic and channel parameters. The suggested models will be used in energy efficient design of spectrum sensing in cognitive networks.
{"title":"On a dynamic model of cognitive radio systems","authors":"S. Primak","doi":"10.1109/ICCITECHNOL.2012.6285779","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285779","url":null,"abstract":"This paper presents a dynamic model of a Primary User and joint Primary-Secondary Users dynamic models. Analytical solutions and markov approximations are derived based on the traffic and channel parameters. The suggested models will be used in energy efficient design of spectrum sensing in cognitive networks.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125483816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285776
Wassim Drira, É. Renault, D. Zeghlache
Applications in Wireless Sensor Networks are numerous and in different areas. However, these applications are mostly application-specific which makes communication between different sensors and the interaction with those sensors difficult. This paper aims at providing a generic back end middleware used to receive, store, index, manage and transform sensors measurements. Sensors from different networks and devices are supposed to send them data to a specific composite in the middleware. This composite should be set up by instantiating some default or personalized sub-components. The middleware is fully flexible and it is based on OSGi, XML and no-SQL databases.
{"title":"iSensors: A middleware for dynamic sensor networks","authors":"Wassim Drira, É. Renault, D. Zeghlache","doi":"10.1109/ICCITECHNOL.2012.6285776","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285776","url":null,"abstract":"Applications in Wireless Sensor Networks are numerous and in different areas. However, these applications are mostly application-specific which makes communication between different sensors and the interaction with those sensors difficult. This paper aims at providing a generic back end middleware used to receive, store, index, manage and transform sensors measurements. Sensors from different networks and devices are supposed to send them data to a specific composite in the middleware. This composite should be set up by instantiating some default or personalized sub-components. The middleware is fully flexible and it is based on OSGi, XML and no-SQL databases.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128022867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285769
N. Hammami, M. Bedda, N. Farah
Mel Frequency Cepstral Coefficients (MFCCs) are the most popularly used speech features in many speech and speaker recognition applications. In this paper, we study the effect of the second-order derivatives of MFCC on the recognition of the Spoken Arabic digits. The system was developed using the Hidden Markov Models (HMMs) and Tree distribution approximation model. Experimentally it has been shown that, the second-order derivatives of MFCC parameters compared to the MFCC yield improved rates of 4.60% for CHMM. We were able to reach an overall recognition accuracy of 98.41%, which is satisfactory compared to previous work on spoken Arabic digits speech recognition.
{"title":"The second-order derivatives of MFCC for improving spoken Arabic digits recognition using Tree distributions approximation model and HMMs","authors":"N. Hammami, M. Bedda, N. Farah","doi":"10.1109/ICCITECHNOL.2012.6285769","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285769","url":null,"abstract":"Mel Frequency Cepstral Coefficients (MFCCs) are the most popularly used speech features in many speech and speaker recognition applications. In this paper, we study the effect of the second-order derivatives of MFCC on the recognition of the Spoken Arabic digits. The system was developed using the Hidden Markov Models (HMMs) and Tree distribution approximation model. Experimentally it has been shown that, the second-order derivatives of MFCC parameters compared to the MFCC yield improved rates of 4.60% for CHMM. We were able to reach an overall recognition accuracy of 98.41%, which is satisfactory compared to previous work on spoken Arabic digits speech recognition.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128744585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285798
Sassi Maaloul, Mériem Afif, S. Tabbane
The international deployment of heterogeneous wireless networks is progressing steadily. It can offer unlimited services to mobile users, in order to provide ubiquitous broadband access. At the same time, with the broadband technologies (3/4G) and the releases mobility criterion interconnection problems and interoperability between networks raise a major matter. The handover procedure is a critical challenge to assure such a situation. The most of the previous handover mechanisms show inadequacy when making handover decision by considering a few metrics related to different radio access technologies. Also, with the diversification of the context metrics, it is difficult to find a reliable criterion that ensures the selection of the best candidate network. In this paper, an intelligent handover decision mechanism is proposed based on the context-aware strategy and Media Independent Handover in order to improve not only the continuity of the connection but to reduce the latency, to maximize performance level, to enable seamless handover and roaming from any access network to any other one guaranteeing always best connected.
{"title":"A new vertical handover decision based context awareness for ubiquitous access","authors":"Sassi Maaloul, Mériem Afif, S. Tabbane","doi":"10.1109/ICCITECHNOL.2012.6285798","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285798","url":null,"abstract":"The international deployment of heterogeneous wireless networks is progressing steadily. It can offer unlimited services to mobile users, in order to provide ubiquitous broadband access. At the same time, with the broadband technologies (3/4G) and the releases mobility criterion interconnection problems and interoperability between networks raise a major matter. The handover procedure is a critical challenge to assure such a situation. The most of the previous handover mechanisms show inadequacy when making handover decision by considering a few metrics related to different radio access technologies. Also, with the diversification of the context metrics, it is difficult to find a reliable criterion that ensures the selection of the best candidate network. In this paper, an intelligent handover decision mechanism is proposed based on the context-aware strategy and Media Independent Handover in order to improve not only the continuity of the connection but to reduce the latency, to maximize performance level, to enable seamless handover and roaming from any access network to any other one guaranteeing always best connected.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126459941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285773
Nassima Aleb, Samir Kechid
The aim of this paper is to present a new method for automated software testing as a cloud computing service. Unlike actual testing services, our goal is to provide a fully automated testing without human involvement from the service user's or provider's side. We use a program modeling allowing an easy symbolic execution and a scalable parallelization of the testing. Programs are divided into several parts assigned to different nodes (Workers) of the cloud. A particular node (Coordinator) allocates tasks to Workers and collects the final results.
{"title":"Path coverage testing in the cloud","authors":"Nassima Aleb, Samir Kechid","doi":"10.1109/ICCITECHNOL.2012.6285773","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285773","url":null,"abstract":"The aim of this paper is to present a new method for automated software testing as a cloud computing service. Unlike actual testing services, our goal is to provide a fully automated testing without human involvement from the service user's or provider's side. We use a program modeling allowing an easy symbolic execution and a scalable parallelization of the testing. Programs are divided into several parts assigned to different nodes (Workers) of the cloud. A particular node (Coordinator) allocates tasks to Workers and collects the final results.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121137869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285780
H. Elbiaze
A key goal of designing memoryless OBS networks is the minimization of burst loss. Loss is due mainly to restraints that can occur at core nodes, such as contention. Such events occurring at OBS layer are misinterpreted by TCP congestion control mechanisms that reacts on (i) burst drops, (ii) end-to-end delay variation and (iii) throughput changes. This paper proposes a destination-ordering mechanism over a load balanced OBS network, that minimizes TCP misinterpretation and maximizes TCP throughput.
{"title":"Maximizing TCP throughput in OBS networks","authors":"H. Elbiaze","doi":"10.1109/ICCITECHNOL.2012.6285780","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285780","url":null,"abstract":"A key goal of designing memoryless OBS networks is the minimization of burst loss. Loss is due mainly to restraints that can occur at core nodes, such as contention. Such events occurring at OBS layer are misinterpreted by TCP congestion control mechanisms that reacts on (i) burst drops, (ii) end-to-end delay variation and (iii) throughput changes. This paper proposes a destination-ordering mechanism over a load balanced OBS network, that minimizes TCP misinterpretation and maximizes TCP throughput.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126291739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285816
I. Amdouni, P. Minet
In data gathering applications which is a typical application paradigm in wireless sensor networks, sensor nodes may have different traffic demands. Assigning equal channel access to each node may lead to congestion, inefficient use of the bandwidth and decrease of the application performance. In this paper, we prove that the time slot assignment problem is NP-complete when p-hop nodes are not assigned the same slot, with 1 ≤ p ≤ h for any strictly positive integer h. We propose TRASA, a TRaffic Aware time Slot Assignment algorithm able to allocate slots to sensors proportionally to their demand. We evaluate the performance of TRASA for different heuristics and prove that it provides an optimized spatial reuse and a minimized cycle length.
{"title":"TRASA: Traffic aware slot assignment algorithm in wireless sensor networks","authors":"I. Amdouni, P. Minet","doi":"10.1109/ICCITECHNOL.2012.6285816","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285816","url":null,"abstract":"In data gathering applications which is a typical application paradigm in wireless sensor networks, sensor nodes may have different traffic demands. Assigning equal channel access to each node may lead to congestion, inefficient use of the bandwidth and decrease of the application performance. In this paper, we prove that the time slot assignment problem is NP-complete when p-hop nodes are not assigned the same slot, with 1 ≤ p ≤ h for any strictly positive integer h. We propose TRASA, a TRaffic Aware time Slot Assignment algorithm able to allocate slots to sensors proportionally to their demand. We evaluate the performance of TRASA for different heuristics and prove that it provides an optimized spatial reuse and a minimized cycle length.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128603525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285828
Jamal Abu Rrub, Jamil Al-Jabi, K. El-Khatib
Radio frequency identification (RFID) found its way very quickly in different industries. Supply chain was the pioneer adopter of the technology, and as a result, inventory and goods tracking cost decreased while the tracking speed and accuracy increased. Although the healthcare sector could highly benefit from the RFID technology specifically in increasing patients' safety, it is still having difficulties due to different concerns in security, privacy, radio frequency interference with medical equipments and trust to list a few. This paper looks at enabling security framework for RFID technology in contactless payment module used in credit cards, and how this infrastructure can be partially used to design a secure, practical and cost effective solution for the healthcare sector.
{"title":"Security model for real time tracking system (RTLS) in the healthcare sector","authors":"Jamal Abu Rrub, Jamil Al-Jabi, K. El-Khatib","doi":"10.1109/ICCITECHNOL.2012.6285828","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285828","url":null,"abstract":"Radio frequency identification (RFID) found its way very quickly in different industries. Supply chain was the pioneer adopter of the technology, and as a result, inventory and goods tracking cost decreased while the tracking speed and accuracy increased. Although the healthcare sector could highly benefit from the RFID technology specifically in increasing patients' safety, it is still having difficulties due to different concerns in security, privacy, radio frequency interference with medical equipments and trust to list a few. This paper looks at enabling security framework for RFID technology in contactless payment module used in credit cards, and how this infrastructure can be partially used to design a secure, practical and cost effective solution for the healthcare sector.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117053528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-26DOI: 10.1109/ICCITECHNOL.2012.6285783
H. Fathallah, A. Helmy
Long-Reach passive optical networks (LR-PONs) suffer from extremely long propagation delays that degrade the performance of centralized algorithms proposed for upstream bandwidth-allocation in traditional PONs. In this paper, we analyze the performance of two centralized dynamic bandwidth allocation algorithms; so called online interleaved polling and offline multi-thread polling, recently proposed in the literature for LR-PON. We investigate their performances in terms of packet pre-transmission delay. Simulation results show that although multi-thread polling succeeds in decreasing reporting and queuing delays, interleaved polling keeps a lower grant delay and therefore has better overall delay performance.
{"title":"Analyzing the performance of centralized polling for long-reach passive optical networks","authors":"H. Fathallah, A. Helmy","doi":"10.1109/ICCITECHNOL.2012.6285783","DOIUrl":"https://doi.org/10.1109/ICCITECHNOL.2012.6285783","url":null,"abstract":"Long-Reach passive optical networks (LR-PONs) suffer from extremely long propagation delays that degrade the performance of centralized algorithms proposed for upstream bandwidth-allocation in traditional PONs. In this paper, we analyze the performance of two centralized dynamic bandwidth allocation algorithms; so called online interleaved polling and offline multi-thread polling, recently proposed in the literature for LR-PON. We investigate their performances in terms of packet pre-transmission delay. Simulation results show that although multi-thread polling succeeds in decreasing reporting and queuing delays, interleaved polling keeps a lower grant delay and therefore has better overall delay performance.","PeriodicalId":435718,"journal":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123382291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}