By Topic

Next Generation Networks and Services (NGNS), 2011 3rd International Conference on

Date 18-20 Dec. 2011

Filter Results

Displaying Results 1 - 25 of 27
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (137 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (41 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (32 KB)  
    Freely Available from IEEE
  • Preface

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (53 KB)  
    Freely Available from IEEE
  • Welcome message from the conference co-chairs

    Page(s): ii
    Save to Project icon | Request Permissions | PDF file iconPDF (58 KB)  
    Freely Available from IEEE
  • Organizing committee

    Page(s): iii - v
    Save to Project icon | Request Permissions | PDF file iconPDF (512 KB)  
    Freely Available from IEEE
  • TPC members

    Page(s): vi - vii
    Save to Project icon | Request Permissions | PDF file iconPDF (61 KB)  
    Freely Available from IEEE
  • Plenary talks

    Page(s): viii - xii
    Save to Project icon | Request Permissions | PDF file iconPDF (177 KB)  
    Freely Available from IEEE
  • Program

    Page(s): xiii - xv
    Save to Project icon | Request Permissions | PDF file iconPDF (109 KB)  
    Freely Available from IEEE
  • Authors index

    Page(s): xvi - xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (56 KB)  
    Freely Available from IEEE
  • Building blocks of a sensitivity-based search engine

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2130 KB) |  | HTML iconHTML  

    Despite their importance and success, popular Search Engines do not take into account all user sensitivities when filtering results. Their filtering capabilities are mainly limited to adult content prevention. However, this filtering may not be enough for users that are sensitive to other kinds of content. By not taking into account all user sensitivities, Search Engines are limiting how users may search the Web and filter the results. In this paper, we present building blocks of a Search Engine that integrates sensitivity data. It is focused on providing search results based on different user sensitivities as defined in their sensitivity profiles. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MPIC and space-time rake detectors on MIMO HSDPA system using generalized Alamouti codes

    Page(s): 34 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (890 KB) |  | HTML iconHTML  

    It is well known that HARQ technique generates delays du to the retransmissions. Thus, the high speed real time services quality, in High Speed Downlink Packet Access (HSDPA), depends on the number of the retransmissions. Motivated by the important diversity that multiple transmitting antennas and multiple receiving antennas (MIMO) can provide, we study the possibility to avoid HARQ retransmissions by using evolved detector as Multipath Parallel Interference Canceller (MPIC) associated to MIMO. Based on generalized Alamouti codes, then, we demonstrate that MIMO 4×4 + MPIC detector could give better performance than MIMO 2×2 Space-time Rake taking into account the HARQ context. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FPGA-based image compression for low-power Wireless Camera Sensor Networks

    Page(s): 68 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1277 KB) |  | HTML iconHTML  

    In this paper, a low-complexity image compression scheme for energy-constrained Wireless Camera Sensor Networks (WCSN) is presented and its hardware implementation cost for FPGA solution is evaluated. The main purpose of this FPGA circuit is to relieve the main microcontroller in the camera sensor node of the image compression tasks and to achieve highspeed and low-power image processing. The interest of our hardware solution is twofold. First, a fast zonal DCT algorithm is used to reduce the number of DCT coefficients in each block of the image to be computed, quantized and encoded. Second, compression settings can be changed at runtime in order to allow a dynamic adjustment of the trade-off between energy consumption and image distortion. The efficiency of the image compression scheme is validated through experimental results using FPGA platform. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recommendation plugin to facilitate student learning of the platform e-learning

    Page(s): 6 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1774 KB) |  | HTML iconHTML  

    The objective of this work is the conception and the realization of a recommendatory system, using concepts of the web usage mining and being inspired by approaches to information filtering. This system will propose to the Webmaster (or admin) from a platform for distance learning the best documents available on the web basis on the historical research done by learners. It is, actually a meta-search engine on the web, integrated into the e-learning platform to keep surfing traces of the learner during his searching. This will permit to have a usage basis that will be used by the system to help webmaster (admin) to make decisions about the documents to be added to the platform. The elaborated system will make it passible to propose help and assistance to learners of the platform. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Balanced and Centralized Distributed Energy Efficient Clustering for heterogeneous wireless sensor networks

    Page(s): 39 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1250 KB) |  | HTML iconHTML  

    The deployment of wireless sensor networks in many application areas requires self organization of the network nodes into clusters. The clustering Algorithm is a kind of key technique used to reduce energy consumption. Efficient way to enhance the lifetime of the system is to partition the network into distinct clusters with a high energy node as cluster head. The different methods of node clustering techniques have appeared in the literature. In this article we propose a new protocol called Balanced and Centralized Distributed Energy Efficient Clustering scheme for heterogeneous wireless sensor networks (BCDEEC), which the Base Station ensure that the high energy nodes becoming a gateways and cluster heads to improve network lifetime and average energy savings. Once the cluster heads and associated clusters are created, cluster-head-to-gateway routing is used to transfer the data to the base station to reduce the energy consumption of cluster head and decrease probability of failure nodes. Finally, the simulation results show that BCDEEC is more energy efficient and is more effective in prolonging the network life time and prolong the time interval before the death of the first node than current important clustering protocols in heterogeneous environments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Opportunities, integration and issues of applying new technologies over e-learning platforms

    Page(s): 12 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1188 KB) |  | HTML iconHTML  

    Recent advancements in the field of social networking, Web 2.0 technologies, grid and cloud computing, and mobile communications have significantly changed many concepts at the basis of e-learning. The latter is also a valuable tool for teaching in developing Countries, especially when jointly used with satellites allowing to overcome the digital divide. In this perspective, this paper investigates several enabling technologies that can be used to improve e learning platforms, reflecting in the so-called e-learning 2.0 and m-learning. Specifically, this work showcases: i) the mobile paradigm applied to e-learning process; ii) the usage of p2p to better exploit the more “social” nature of modern frameworks; iii) the adoption of cloud computing concepts to bring e-learning services to the nextstep and iv) hazards and opportunities when employing satellite communication. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia traffic transmission over Cognitive Radio TDMA networks under secondary collision errors

    Page(s): 72 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1293 KB) |  | HTML iconHTML  

    Cognitive Radio is an enabling technology for communication and channels sharing in multimedia and wireless networks. In this paper, we consider multimedia traffic transmission over shared Cognitive Radio (CR) networks using fountain codes. To share this CR infrastructure, we propose to make use of Time Division Multiple Access method based on the opportunistic spectrum sharing. Each Secondary User (SU) is assigned one time slot where he transmits with a certain probability. The given model allows each SU to transmit in the remaining slots if he has data to transfer and has missed his own slot. Therefore, the reasons for packet loss are twofold: Primary traffic interruptions and collisions between several SUs due to our specific time slot allocation. We use a redundancy-based model for link maintenance to compensate the spectrum resources loss caused by the primary traffic reclaims. Moreover, we setup up many Secondary User Links to minimize the collision effects in order to meet the QoS requirements for multimedia communication services. Numerical simulations, in view of the average Goodput, show that the system still exhibit good secondary traffic robustness despite of the presence of primary interferences and opportunistic transmission collisions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a knowledge model for multi-view KDD process

    Page(s): 18 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (813 KB) |  | HTML iconHTML  

    Knowledge Discovery in Databases (KDD) is a highly complex, iterative and interactive process involving several types of knowledge and expertise. In this paper we propose to support users of a multi-view analysis (a KDD process held by several experts with different viewpoints). Our objective is to enhance both reusability of the process and coordination between experts. To do so, we propose a formalization of viewpoint in KDD based on CRISP-DM standard and taking into account the domain knowledge involved during a KDD process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building corporate memories in collaborative way using ontologies: Case study of a SSII

    Page(s): 23 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (782 KB) |  | HTML iconHTML  

    The task of Knowledge Management (KM) is to capture explicit and tacit knowledge of an organization in order to facilitate the access, sharing, and reuse of that information. Knowledge capital is a strategic asset in the achievement of the objectives, a major element for the survival of the organization. In this article, we present the importance of having a collaborative environment for managing corporate memories. We'll first show the interest to use corporate memories to manage knowledge and/or documents. Secondly, we'll propose a suitable interaction model to represent and manage corporate memories in collaborative way. Finally, we present PCOGEME, a collaborative environment based on brainstorming and consensual decision making mechanism to build corporate memories using ontologies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study the iris segmentation method for biometric pattern recognition

    Page(s): 108 - 111
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2845 KB) |  | HTML iconHTML  

    Several system require authenticating a person's identity before giving access to resources. With new advances in technology, biometrics is one of the most promising techniques in recognition human. Biometrics intends to identify a person by his physical and/or behavioural characteristic. Among biometric technologies, iris recognition has received increasing attention due to its high reliability. Iris recognition is a biometric authentication technology that uses pattern recognition techniques based on iris characteristics. In this paper we propose a new biometric-based Iris segmentation system. The system acquires the biometric data in the data base CASIA version 1.0. The experimental results are compared to release the performances of our algorithms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture based SKOS ontology for scalable, efficient and fault tolerant grid resource discovery

    Page(s): 78 - 83
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1272 KB) |  | HTML iconHTML  

    Grid computing allows coordinated and collaborative resource sharing across several institutions, to solve large scientific problems that could not be easily solved within the boundaries of a single institution. To take advantages of all these resources, which have a heterogeneous and dynamic nature, an efficient resource discovery mechanism is required. As the number of nodes is constantly increasing, scalability and efficiency are highly desirable. Hybrid techniques are considered among the solutions that guarantee the efficiency and the scalability at the same time. This paper introduces a semantic clustering of nodes based on their domains of interest to form groups called federations. It presents a new process for constructing the federations and the three layers overlay network, based on Semantic Web technologies that use a SKOS lightweight ontology for describing domains of applications in the grid, and routing queries to target federations in an efficient way. We present a scalable and fault-tolerant process to leaders' federations, which minimizes the overhead between leaders during the process of updating information about themselves. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Neural Principal Component Analysis for text based documents keywords extraction

    Page(s): 112 - 115
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1376 KB) |  | HTML iconHTML  

    Information retrieval system users, such those operational on the web, usually use text modality to look not only for textual information but also for multimedia content. In order to satisfy the users requirement, information retrieval systems should have prepared a short representation of the content of each document composing the corpus, called index. This index doesn't, so often, reflect the intended meaning of the document they represent. In this paper, we propose an approach based on a Neural Principal Component Analysis that express the maximum variance of data and extract the principal component from it, by calculating the correlation between words of each document, to determine the keywords that give out the fields of intrest of each document content. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and FPGA implementation of a QoS router for Networks-on-Chip

    Page(s): 84 - 89
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1316 KB) |  | HTML iconHTML  

    Network-on-Chip (NoC) is believed to be a solution to the existing and future interconnection problems in highly complex chips. Different alternatives proposed circuit-switched NoCs to guarantee performance and Quality-of-Service (QoS) parameters for Systems-on-Chips (SoC). However, implementing scheduling mechanisms with different service classes and exploring the advantages of wormhole routing and virtual channels is an important way to provide QoS guarantees in terms of transmission delays and bandwidth. This paper presents a packet-switched NoC router with QoS support. It uses a priority-based scheduler to solve conflicts between multiple connections with heterogeneous traffic flows and to minimize network latency. The hardware design of the router has been implemented at the RTL level; its functionality is evaluated and QoS requirements for each service class are derived. We show the trade-off between an optimal scheduling strategies implementation and the performance of the system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic evaluation of binarization approaches — Application on ancient documents

    Page(s): 116 - 121
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2031 KB) |  | HTML iconHTML  

    The document preprocessing output may affect the efficiency of the document analysis and recognition system. In order to ameliorate the efficiency of those systems, an objective evaluation of preprocessing step is essential. In this paper we propose a new framework for automatic evaluation of binarization approaches. The evaluation of binarization approaches is based on the comparison between input images and generated ground-truth. The automatic method of ground-truth generation is an improvement of a semi-automatic method. The tests was applied on two different datasets, training dataset is composed from parts of documents, the test dataset is composed from entire historical documents. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Queueing performance analysis of CAC scheme in OFDMA based WiMAX system

    Page(s): 62 - 67
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1019 KB) |  | HTML iconHTML  

    This paper presents a problem of queueing theoretic performance modeling and analysis of Orthogonal Frequency Division Multiple Access (OFDMA) under broad-band wireless networks. We consider a single-cell WiMAX environment in which the base station allocates subchannels to the subscriber stations in its coverage area. The subchannels allocated to a subscriber station are shared by multiple connections at that subscriber station. To ensure the Quality of Service (QoS) performances, a Connection Admission Control (CAC) scheme is considered at a subscriber station. A queueing analytical framework for these admission control schemes is presented considering OFDMA-based transmission at the physical layer. Then, based on the queueing model, both the connection-level and the packet-level performances are studied and compared with their analogues in the case without CAC. The connection arrival is modeled by a Poisson process and the packet arrival for a connection by a Markov Modulated Poisson Process (MMPP). We determine analytically and numerically different performance parameters. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.