# 2012 IEEE International Conference on Complex Systems (ICCS)

## Filter Results

Displaying Results 51 - 75 of 109
• ### Scheduling of real-time embedded systems under reliability and power constraints

Publication Year: 2012, Page(s):1 - 6
| | PDF (282 KB) | HTML

In this paper, we present a new tri-criteria scheduling heuristic for scheduling data-flow graphs of operations onto parallel heterogeneous architectures according to three criteria: first the minimization of the schedule length crucial for real-time systems, second the maximization of the system reliability crucial for dependable systems, and third minimizing energy consumption crucial for autono... View full abstract»

• ### Personalization of a hybrid integration system: Creation of views to materialize based on the distribution of user queries

Publication Year: 2012, Page(s):1 - 7
Cited by:  Papers (2)
| | PDF (194 KB) | HTML

The hybrid mediator is an integration system where one part of data is queried on demand as in the virtual approach, while another part is extracted, filtered and stored in a local database. The selection of data to be stored in the mediator (to materialize) is an essential task. Different selection criteria were proposed to select among a set of candidate views, ones that will be materialized. Ho... View full abstract»

• ### GUI code generation for Android applications using a MDA approach

Publication Year: 2012, Page(s):1 - 6
Cited by:  Papers (7)
| | PDF (246 KB) | HTML

Developing applications for mobile platforms is a compound task, due to variability of mobile OSs and the number of different devices that need to be supported. Model-Driven Architecture (MDA) approach could provide a possible solution to provide an automated way to generate a Graphical User Interface (GUI) for such applications. In this paper, we propose an approach based on MDA, to generate GUI ... View full abstract»

• ### Performance analysis of control access scheme of multimedia traffic in HSDPA channel using stochastic reward nets

Publication Year: 2012, Page(s):1 - 6
| | PDF (279 KB) | HTML

High Speed Downlink Packet Access (HSDPA) is being increasingly deployed to enhance UMTS Radio Access Networks. Scheduling of Node B (base station) buffered user data for transmission over a shared radio channel is a key HSDPA functionality which enables queue management techniques to be utilized to improve Quality of Service (QoS) for mixed multimedia' services. In this paper, we study a control... View full abstract»

• ### Enhance security of cloud computing through fork virtual machine

Publication Year: 2012, Page(s):1 - 4
Cited by:  Papers (1)
| | PDF (226 KB) | HTML

Cloud computing is a new trend based on virtualization. It motivates many academic institutions and non-academic to move towards this approach. Our goal is to enhance the security of the cloud computing through virtualization and more precisely by the principle of the fork of the virtual machine. This article describes the proposed solution to achieve this goal and discusses the choice of tools th... View full abstract»

• ### Performance analysis and comparative study of voice over IP using hybrid codec

Publication Year: 2012, Page(s):1 - 6
| | PDF (350 KB) | HTML

This paper investigates and compares the performance of the popular VoIP codecs G.711, G.723.1 and G.729A over an IP network based on SIP architecture, using RTP as a transport protocol. This is based on different simulations in order to evaluate the performance of each codec and to find the optimal codec. For this objective this paper analyzes Quality of service (QoS) parameters, principally dela... View full abstract»

• ### Very small bridge shaped dielectric resonator antenna for wireless applications

Publication Year: 2012, Page(s):1 - 3
| | PDF (134 KB) | HTML

In this work we present a small and very thin rectangular dielectric resonator antenna (Al2O3, εr = 9.8) by the strip-fed method (coax + conducting strip). At the DRA back face we have placed a strip identical to the strip fed. A new method for improving the bandwidth has been presented. As a result, this paper presents the characteristics of a new ultra-wideband antenna (49.50%)... View full abstract»

• ### A new approach of classification for non-Gaussian distribution upon competitive training

Publication Year: 2012, Page(s):1 - 6
| | PDF (1206 KB) | HTML

In this paper, we present a new neural and statistical classification approach. This procedure uses the neural network with competitive training to detect the local maxima of the probabilities density function's (pdf) which are considered as the prototype of the classes in the data distribution. In order to take account of different forms of distributions; Gaussian and non-Gaussian, we used as cri... View full abstract»

• ### Towards a fuzzy mapping for mediation systems

Publication Year: 2012, Page(s):1 - 4
Cited by:  Papers (3)
| | PDF (161 KB) | HTML

Data integration involves combining data residing at different sources, and providing to the user a unified and global view of this data. The problem of designing data integration systems is important in current applications of real world, especially for mapping between attributes of global schema and those of local schemas of sources. The question is how to link the global schema and the set of l... View full abstract»

• ### Improved fuzzy clustering approach: Application to medical image MRI

Publication Year: 2012, Page(s):1 - 6
| | PDF (201 KB) | HTML

Currently, the MRI brain image processing is a vast area of research, several methods and approaches have been used to segment these images (thresholding, region, contour, clustering). In this work, we propose a novel segmentation approach, which is based on fuzzy clustering and also it allows to combine cooperatively expectation maximization algorithms and possibilist c-means. To validate our app... View full abstract»

• ### Complex media parameter effect: On the input impedance of rectangular microstrip antenna

Publication Year: 2012, Page(s):1 - 3
| | PDF (146 KB) | HTML

The effect of a chiral bi-anisotropic substrate with the complex constitutive parameters on the input impedance of a rectangular microstrip antenna has been studied on the basis of the integral equation formulation. The analysis is based on numerical solution of the integral equation using Galerkin procedure for moment method in the spectral domain. View full abstract»

• ### Biomedical signals analysis using time-frequency

Publication Year: 2012, Page(s):1 - 6
| | PDF (6503 KB) | HTML

Electrocardiogram (ECG) is a very important tool for cardiac health status measurement and detection of various diseases at their early stage. The electrocardiogram (ECG) is one of the major physiological signals generated from heart's rhythmic polarization and depolarization. This work presents the application of the parametric and nonparametric time-frequency techniques of different ECG signals.... View full abstract»

• ### The body-mind problem from a personality relativity theory approach: (Relativity of personality)

Publication Year: 2012, Page(s):1 - 6
| | PDF (540 KB) | HTML

The body-mind problem is here posed from the General Factor of Personality Theory and mathematically presented as a relativity theory: 1. A two-level-invariant model; 2. The transformation equation between both levels. On a hand, the investigation of personality dynamics as a consequence of a stimulant drug provides a system of two coupled differential equations, which adapts to both biological (b... View full abstract»

• ### Secure transmission of medical images by watermarking technique

Publication Year: 2012, Page(s):1 - 5
Cited by:  Papers (1)
| | PDF (293 KB) | HTML

The traffic of digital images is growing rapidly on computer networks. Protection of digital data, especially medical images, becomes important for many reasons such as confidentiality, authentication and integrity. Currently, the most suitable for the transfer of medical images lies in cryptography. However, once decrypted, the image is no longer protected and can be duplicated, copied, falsified... View full abstract»

• ### Synthesis of optimal controller of discrete manufacturing systems by liveness extraction

Publication Year: 2012, Page(s):1 - 8
| | PDF (557 KB) | HTML

This paper deals with a Refined Centralized approach to obtain an optimal controller for manufacturing systems. It bases on a modular modeling of the plant to avoid combinatory explosion found in centralized structure and a synthesis algorithm. From the local Plant Elements, local constraints are defined to build local supervisors. Liveness constraints restrict the system behavior within a desired... View full abstract»

• ### A Multi-Agent, Semantic Web Service-based modeling for cooperation in the supply chain environment

Publication Year: 2012, Page(s):1 - 6
| | PDF (312 KB) | HTML

In the context of a supply chain, the enterprise must not only integrate its local objectives in its decisions, but also consider those of its partners, which may be contradictory. The enterprises are thus converted into cooperating to define a comprehensive strategy. To study the cooperation inter-enterprise, it is necessary to determine the stakes and the interests of each actor of the supply ch... View full abstract»

• ### Hardware implementation for Turbo code-OFDM using Software defined Radio

Publication Year: 2012, Page(s):1 - 5
| | PDF (240 KB) | HTML

In this paper, we present design and implementation of wireless Turbo Code OFDM (TC-OFDM) on the Small Form Factor (SFF) Software defined Radio (SDR) Platform, provided by Lyrtech and Texas Instrument (TI) [1]. TC-OFDM is proposed in different channels communication system in order to decrease the bit error rate (BER). The performance analysis of the TC-OFDM system is evaluated by simulations in d... View full abstract»

• ### Exploring mobility of IR-UWB based WSN

Publication Year: 2012, Page(s):1 - 5
| | PDF (250 KB) | HTML

In this paper we propose an architecture for a real time health-monitoring system based on Impulse Radio Ultra Wide Band Mobile Wireless Sensor Network (IR-UWB MWSN). It specifically targets health-monitoring for racing animals such as horses, dogs, and camels during races. We present the advantages and status of WSN based on IR-UWB technology. A simulation of a case study on a circular racing tra... View full abstract»

• ### Cloud computing architectures based IDS

Publication Year: 2012, Page(s):1 - 6
Cited by:  Papers (3)
| | PDF (286 KB) | HTML

Today, cloud computing is an attractive and cost-saving service for buyers as it provides accessibility and reliability options for users and scalable sales for providers. Before implementing this method of computing, however, it is important to consider the security of the cloud. In this paper, we will present, a classification of specific and traditional attacks to the cloud computing according ... View full abstract»

• ### Performance evaluation of radio channels in wireless sensor network

Publication Year: 2012, Page(s):1 - 6
| | PDF (413 KB) | HTML

Wireless sensor networks (WSN) consist of spatially distributed autonomous small devices, often called "motes", which cooperatively monitor, collect and exchange data from the surrounding environment. In this paper we simulate and evaluate the performance of different radio channels in terms of Energy efficiency, Latency, Throughput, and Number of Drop Packets using a probabilistic wireless sensor... View full abstract»

• ### Result verification mechanism for MapReduce computation integrity in cloud computing

Publication Year: 2012, Page(s):1 - 6
Cited by:  Papers (3)
| | PDF (176 KB) | HTML

MapReduce is becoming a powerful parallel data processing model and is adopted by many cloud services providers to build cloud computing framework. However, in public cloud systems, several service providers may come from different administration domain out of the user control and may be untrustworthy. Hence, security of MapReduce computation is essential in public cloud systems. Additionally, Map... View full abstract»

• ### Vulnerabilities of two recently RFID authentication protocols

Publication Year: 2012, Page(s):1 - 6
| | PDF (1633 KB) | HTML

The communication channel between the tag and the reader in radiofrequency identification technology (RFID) is unsecured, which makes it opened to logical attacks on authentication protocol. In this paper, we analyze the security of two recently proposed RFID authentication protocols for mobile reader. Firstly, a protocol proposed by Wei et al. (2011) and the second proposed by Jialiang et al. (20... View full abstract»

• ### Noised abnormal ECG signal analysis by combining EMD and Choi-Williams techniques

Publication Year: 2012, Page(s):1 - 5
| | PDF (182 KB) | HTML

Due to the wide variety of biomedical signals, such as the electrocardiogram (ECG) signal, and problems encountered in medicine and biology a good diagnostic is very important to detect the real pathology contained in the signal. In one hand the presence of the noise and in the other hand the non-stationary multicomponent nature of the electrocardiogram (ECG) signal present the major problems that... View full abstract»

• ### A framework for design and integration of complex engineered systems: A study of SRITS

Publication Year: 2012, Page(s):1 - 9
| | PDF (1302 KB) | HTML

The first possible step to achieving an understanding the design and management of complex systems is to understand what is meant by complexity engineering'. Multitude of concepts in complexity engineering has been contextually developed in a wide range of disciplines by from scientists who are interested in bio-inspired methods and working in computer science or mobile robots, or they come from ... View full abstract»

• ### Challenges and issues in the system architecting for systemic risk infrastructure system: An industrial case study

Publication Year: 2012, Page(s):1 - 8
| | PDF (123 KB) | HTML

Good architecture is a prerequisite for successful design, is a key determinant of system behaviour and helps to understand and manage the design, operation and behaviours of complex engineering systems. In this paper, we present architecting process challenges and success factors, the results of a case study from a UK based financial institution working on a systemic risk Infrastructure system (h... View full abstract»