Vol.9 No.3&4 March
1,
2014
Next Generation Networks and
Services
Editorial
(171-172)
Abdelkrim Haqiq, Driss Bouzidi, and Amine Berqia
Research Articles:
Use of TDM Pseudo-Wires for an Efficient NGN
Emulation of ISDN Multi-Channel Circuit-Mode Bearer Services (173-188)
Javier Muņoz-Calle, Antonio J. Sierra, and Juan M. Vozmediano
The specifications of the Next
Generation Networks (NGN) agree on the need for migration mechanisms
that enable the replacement of traditional networks, highlighting the
ISDN networks. This requirement has a notable impact on NGN in terms of
network design. Recent solutions proposed by ITU-T and ETSI for ISDN
migration only include support for a subset of current ISDN services,
not covering in detail the multi-channel circuit-mode bearer services.
This paper examines the use of TDM pseudowires for NGN emulation of ISDN
multi-channel calls between ISDN terminals, proposing new payload types.
Improvement Quality of
the Recommendation System Using the Intrinsic Context (189-213)
Latifa Baba-Hamed and Reda Soltani
The traditional recommendation systems provide
a solution to the problem of information overload. They provide users
with the information and content which are the most relevant for them.
These systems ignore the fact that users interact with systems in a
particular context. Context plays an important role in determining
users' behavior by providing additional information that can be
exploited in building predictive models. Context-aware recommendation
systems take this information into account to make predictions in order
to improve the performance of the filtering process. Most existing
Context-aware systems use the extrinsic context. In this paper, we
propose an intrinsic contextual recommendation system that we can apply
to the recommendation of contents in general (i.e. book, Url, item,
product, movie, song, restaurant, etc.). The context in our approach is
extracted from the set of attributes for the object itself. Our system
use a contextual pre-filtering technique based on implicit user
feedback. To show the performance of the recommendation process, we
consider the movie domain as a case study.
Goal Driven Approach to Model
Interaction between Viewpoints of a Multi-view KDD Process (214-229)
El Moukhtar Zemmouri, Hicham Behja, Brahim Ouhbi, Brigitte
Trousse,
Abdelaziz Marzak, and Youssef
Benghabrit
Knowledge Discovery in Databases (KDD) is a highly complex, iterative
and interactive process, with a goal-driven and domain dependent nature.
The complexity of KDD is mainly due to the nature of the analyzed data
(which are massive, distributed, incomplete, and heterogeneous) and the
nature of the process itself (since the process is by definition
interactive and iterative). Given this complexity, a KDD user faces two
major challenges: on the one hand, he must manipulate prior domain
knowledge to better understand data and business objectives. On the
other hand, he must be able to choose, configure, compose and execute
tools and methods from various fields (e.g., machine learning,
statistics, artificial intelligence, databases) to achieve goals.
Furthermore, in the business real world, a data mining project is
usually held by several actors (domain experts, data analysts, KDD
experts …), each with a different viewpoint. In this paper we propose to
tackle the complexity of KDD process, and to enhance coordination and
knowledge sharing between actors of a multi-view KDD analysis through a
goal driven modeling of interactions between viewpoints. After a brief
review of our approach of viewpoint in KDD, we will first develop a
semantic Model of Goals that allows identification and representation of
business objectives during the business understanding step of KDD
process. Then, based on this Goal Model, we define a set of semantic
relations between viewpoints of a multi-view analysis; namely
equivalence, inclusion, conflict and requirement.
Analysis of VoIP and Video Traffic
over WiMAX Using Different Service Classes (230-241)
Tarik Anouari and Abdelkrim Haqiq
WiMAX, the acronym for Worldwide
Interoperability for Microwave Access is a set of technical standards
based on IEEE 802.16 standard. It provides wireless connection of
companies or individuals over long distances at high speed, it’s an
adequate response to some rural or inaccessible areas. Unlike DSL
(Digital Subscriber Line) or other
wired technology, WiMAX uses radio waves and can provide
point-to-multipoint (PMP) and Mesh modes. In parallel,
Voice over IP (VoIP) technology is the biggest
revolution in communication technology. It replaces the traditional
telephone service and offers free long distance calls. Video stream
traffic is characterized by the ability to transmit real-time and
interactively visual and auditory information. VoIP and Video traffic
are highly delay intolerant and need a high priority transmission. In
this paper, we analyze the performances of the most common VoIP codec,
namely G.711, and video streaming H.263 format using BE, rtPS, UGS,
ertPS and nrtPS service classes and NOAH routing protocol. NS-2
simulator is used to analyze the QoS parameters. Our objective is to
analyze different WiMAX service classes with respect to the QoS
parameters such as, average jitter, throughput and average delay while
increasing mobile nodes.
The S2P Learning Model: For the
Combination of the Formal and the Personal Dimensions of Learning (242-252)
Salah Eddine Bahji, Youssef Lefdaoui, and Jamila El Alami
The S2P Learning Model was originally
designed to try to understand the Game-based Learning. It was
subsequently developed in order to translate a conceptual framework for
understanding any initiative of formal learning. Therefore, this model
is essentially based on three complementary layers namely: the Formal
Learning Strategy, the Learning Platform, and the Learning Process.
Currently big changes occur constantly in our society at all levels. A
society in which the individual is becoming more and more independent
through ease of access to knowledge, due to the wide facilities offered
by information technologies. Thus, knowing that the S2P Learning Model
has focused previously on the formal dimension of learning, and knowing
also that the process of appropriation of knowledge includes a dominant
individual dimension, it would be crucial to integrate it (the personal
dimension of learning) in this model of understanding, in order to
consider both formal and personal dimensions in any educational
initiative. Especially since the individual dimension is strongly
present in academia, where students are becoming more independent,
autonomous and demanding, this paper focuses mainly on the incorporation
of the individual dimension into the S2P Learning Model, aiming to
exploit optimally the two dimensions, formal and personal, in a way to
catalyse and foster optimally the learning process.
PIM-SM Protocol with GRASP-RP
Selection Algorithm Based Architecture to Transparent Mobile Sources in
Multicast Mobile IPv6 Diffusion (253-272)
Youssef Baddi and Mohamed Dafir Ech-Chrif El Kettani
Due to the progress of network
multimedia technology, Internet research community has proposed many
Different multicast routing protocols to support efficient real-time
multimedia application such as, IPTV, videoconferencing, group games.
These applications require a multicast routing protocol in which packets
arrive to multicast receptors within a minimum delay and delay
variation. Nevertheless, these protocols does not take into account that
group members may be mobile and have not been designed for mobile
members and roaming sources, and has not been tested in wireless and
mobile environment since they were developed for multicast parties whose
members and sources are topologically stationary. Recently, as the
performance of mobile hosts rapidly improves and the bandwidth of
wireless access networks grows up, the expectation for mobile multimedia
communication services including many-to-many communications begins a
big necessary. Studying and solving multicast issues in the stationary
multicast infrastructure has been largely studied in the literature.
However, fewer efforts have been spent in the specific problems of
mobile members and sources caused by the frequent change of membership
and point of attachment. The main problematic of the multicast IP
protocols in a Mobile IP environment is the frequent change of
membership and members location, this can rapidly affect quality of both
routing protocol scheme and multicast tree used, especially, the
scenario of handover where a mobile source moves from attachment point
in one sub-network to another one in another sub-network is challenging.
A multicast source is identified by its Home Address HA. Since IP
mobility implies acquisition of a new topologically Care-of-Address CoA
at each handoff resulting in a change of identity of the multicast
source, however, the established multicast routing states are always
based on the home address of the mobile source. This paper addresses the
issue of mobile Multicast routing by presenting a PIM-SM based
architecture with a GRASP-RP selection algorithm. The key idea of this
work is to make the handover of multicast sources transparent and avoid
the reconstruction of the entire multicast-based tree, by using an
architecture based in PIM-SM multicast distribution trees to hide the
mobility of a mobile multicast source from the main multicast delivery
tree. To estimate and evaluate our scheme, we implement simulation based
in many metrics, simulation results show that good performance is
achieved in terms of handoff latency, end-to-end delay, tree
construction delay and others metrics.
Object Serialization White
Framework in J2ME and its Refactoring in Black Framework
(273-285)
Mohammed Mahieddine, Mehdia Ajana El-Khaddar, and Salyha
Oukid
J2ME mobile agents developers are very
soon confronted with the problem of objects transfer over the
communication flows (streams) provided by J2ME which, by themselves,
take into account only the primitive types or simple String objects of
JAVA. Serialization is the process of saving the state of an object on a
flow of communication, transferring it in the net, and restoring its
equivalent from this flow. Unfortunately J2ME software development
cannot be used as standard JAVA because it has many strong restrictions,
which cannot be easily used as the standard JAVA. For example, in the
case of mobile agent software development, J2ME does not provide tools
for the serialization of objects. This research addresses the lack of a
standard development environment for mobile agents under J2ME. In this
work we propose a pattern-based white-box application framework, in
order to achieve the serialization of complex JAVA Objects and its
re-factoring into a black-box application framework.
A Novel Coverage
and Connectivity Preserving Routing Protocol for Mission-Critical
Wireless Sensor Networks (286-302)
Said Ben Alla and Abdellah Ezzati
Mission-critical wireless sensor
networks (WSNs) have been found to be very useful for many
military and civil applications such as disaster management,
surveillance of battle fields and e-healthcare. Coverage preservation
and connectivity are the most essential functions to guarantee quality
of service (QoS) in mission-critical WSNs. By optimizing coverage, the
deployment strategy would guarantee that optimum area in the sensing
field is covered by sensors, as required by various types of
mission-critical applications. Whereas by ensuring that the network is
connected, it is ensured that the sensed information is transmitted to
other nodes and possibly to a centralized base station which makes
valuable decisions for the applications. However, a trade-off exists
between sensing coverage and network lifetime due to the limited energy
supplies of sensor nodes. In this paper, we propose a Coverage and
Connectivity Preserving Routing Protocol for mission-critical WSNs (CCPRP)
to accommodate connectivity, energy-balance and coverage-preservation
for sensor nodes in WSNs that are hierarchically clustered. The energy
consumption for radio transmissions and the residual energy over the
network are taken into account when the proposed protocol determines an
energy-efficient route for a data from elected cluster head to the base
station through elected gateway. We define a cost metric to favour nodes
with high energy-redundantly covered as better candidates for cluster
heads in a way to improve the performance of sensing coverage, reduce
communications energy and prolonging the effective network lifetime with
optimal data delivery. Furthermore, we propose a novel area coverage
protocol called CCPRP-AC for scheduling the sensing activity of sensor
nodes that are deployed to sense point-targets in WSN using information
coverage. The simulation results demonstrate that the proposed protocol
CCPRP is able to increase the duration of the on-duty network and
provide up to 124.76% of extra service time with 100% sensing coverage
ratio comparing with other existing protocols, and the protocol CCPRP-AC
achieves k-coverage of a field, where every point is covered by at
least k sensors with a minimum number of sensors.
Modelling and
Dimensioning of LTE Network (303-318)
Mohammed Jaloun and Zouhair Guenoun
The objective of this paper is to
define a mathematic model for the dimensioning of LTE Rel-8 network,
after describing the mechanisms influencing the dimensioning such us the
Scheduling, QOS and LTE capacity, we define the strategy of the planning
and the objective function which aim to minimize the number of the base
stations and the capacities of the wired links to deploy. The
mathematical formulation of the model leads to a linear and mixed
problem. PLEX method based on "Branch and Cut" algorithm has been used
to solve this problem.
Back
to JMM Online Front Page |