JMM Abstracts 

Vol.9 No.3&4 March 1, 2014

Next Generation Networks and Services

Editorial (171-172)
       
Abdelkrim Haqiq, Driss Bouzidi, and Amine Berqia

Research Articles:

Use of TDM Pseudo-Wires for an Efficient NGN Emulation of ISDN Multi-Channel Circuit-Mode Bearer Services (173-188)
       
Javier Muņoz-Calle, Antonio J. Sierra, and Juan M. Vozmediano
The specifications of the Next Generation Networks (NGN) agree on the need for migration mechanisms that enable the replacement of traditional networks, highlighting the ISDN networks. This requirement has a notable impact on NGN in terms of network design. Recent solutions proposed by ITU-T and ETSI for ISDN migration only include support for a subset of current ISDN services, not covering in detail the multi-channel circuit-mode bearer services. This paper examines the use of TDM pseudowires for NGN emulation of ISDN multi-channel calls between ISDN terminals, proposing new payload types.

Improvement Quality of the Recommendation System Using the Intrinsic Context (189-213)
       
Latifa Baba-Hamed and Reda Soltani
The traditional recommendation systems provide a solution to the problem of information overload. They provide users with the information and content which are the most relevant for them. These systems ignore the fact that users interact with systems in a particular context. Context plays an important role in determining users' behavior by providing additional information that can be exploited in building predictive models. Context-aware recommendation systems take this information into account to make predictions in order to improve the performance of the filtering process. Most existing Context-aware systems use the extrinsic context. In this paper, we propose an intrinsic contextual recommendation system that we can apply to the recommendation of contents in general (i.e. book, Url, item, product, movie, song, restaurant, etc.). The context in our approach is extracted from the set of attributes for the object itself. Our system use a contextual pre-filtering technique based on implicit user feedback. To show the performance of the recommendation process, we consider the movie domain as a case study.

Goal Driven Approach to Model Interaction between Viewpoints of a Multi-view KDD Process (214-229)
       
El Moukhtar Zemmouri, Hicham Behja, Brahim Ouhbi, Brigitte Trousse,
        Abdelaziz Marzak, and Youssef Benghabrit
Knowledge Discovery in Databases (KDD) is a highly complex, iterative and interactive process, with a goal-driven and domain dependent nature. The complexity of KDD is mainly due to the nature of the analyzed data (which are massive, distributed, incomplete, and heterogeneous) and the nature of the process itself (since the process is by definition interactive and iterative). Given this complexity, a KDD user faces two major challenges: on the one hand, he must manipulate prior domain knowledge to better understand data and business objectives. On the other hand, he must be able to choose, configure, compose and execute tools and methods from various fields (e.g., machine learning, statistics, artificial intelligence, databases) to achieve goals. Furthermore, in the business real world, a data mining project is usually held by several actors (domain experts, data analysts, KDD experts …), each with a different viewpoint. In this paper we propose to tackle the complexity of KDD process, and to enhance coordination and knowledge sharing between actors of a multi-view KDD analysis through a goal driven modeling of interactions between viewpoints. After a brief review of our approach of viewpoint in KDD, we will first develop a semantic Model of Goals that allows identification and representation of business objectives during the business understanding step of KDD process. Then, based on this Goal Model, we define a set of semantic relations between viewpoints of a multi-view analysis; namely equivalence, inclusion, conflict and requirement.

Analysis of VoIP and Video Traffic over WiMAX Using Different Service Classes (230-241)
       
Tarik Anouari and Abdelkrim Haqiq
WiMAX, the acronym for Worldwide Interoperability for Microwave Access is a set of technical standards based on IEEE 802.16 standard. It provides wireless connection of companies or individuals over long distances at high speed, it’s an adequate response to some rural or inaccessible areas. Unlike DSL (Digital Subscriber Line) or other wired technology, WiMAX uses radio waves and can provide point-to-multipoint (PMP) and Mesh modes. In parallel, Voice over IP (VoIP) technology is the biggest revolution in communication technology. It replaces the traditional telephone service and offers free long distance calls. Video stream traffic is characterized by the ability to transmit real-time and interactively visual and auditory information. VoIP and Video traffic are highly delay intolerant and need a high priority transmission. In this paper, we analyze the performances of the most common VoIP codec, namely G.711, and video streaming H.263 format using BE, rtPS, UGS, ertPS and nrtPS service classes and NOAH routing protocol. NS-2 simulator is used to analyze the QoS parameters. Our objective is to analyze different WiMAX service classes with respect to the QoS parameters such as, average jitter, throughput and average delay while increasing mobile nodes.

The S2P Learning Model: For the Combination of the Formal and the Personal Dimensions of Learning (242-252)
       
Salah Eddine Bahji, Youssef Lefdaoui, and Jamila El Alami
The S2P Learning Model was originally designed to try to understand the Game-based Learning. It was subsequently developed in order to translate a conceptual framework for understanding any initiative of formal learning. Therefore, this model is essentially based on three complementary layers namely: the Formal Learning Strategy, the Learning Platform, and the Learning Process. Currently big changes occur constantly in our society at all levels. A society in which the individual is becoming more and more independent through ease of access to knowledge, due to the wide facilities offered by information technologies. Thus, knowing that the S2P Learning Model has focused previously on the formal dimension of learning, and knowing also that the process of appropriation of knowledge includes a dominant individual dimension, it would be crucial to integrate it (the personal dimension of learning) in this model of understanding, in order to consider both formal and personal dimensions in any educational initiative. Especially since the individual dimension is strongly present in academia, where students are becoming more independent, autonomous and demanding, this paper focuses mainly on the incorporation of the individual dimension into the S2P Learning Model, aiming to exploit optimally the two dimensions, formal and personal, in a way to catalyse and foster optimally the learning process.

PIM-SM Protocol with GRASP-RP Selection Algorithm Based Architecture to Transparent Mobile Sources in Multicast Mobile IPv6 Diffusion (253-272)
       
Youssef Baddi and Mohamed Dafir Ech-Chrif El Kettani
Due to the progress of network multimedia technology, Internet research community has proposed many Different multicast routing protocols to support efficient real-time multimedia application such as, IPTV, videoconferencing, group games. These applications require a multicast routing protocol in which packets arrive to multicast receptors within a minimum delay and delay variation. Nevertheless, these protocols does not take into account that group members may be mobile and have not been designed for mobile members and roaming sources, and has not been tested in wireless and mobile environment since they were developed for multicast parties whose members and sources are topologically stationary. Recently, as the performance of mobile hosts rapidly improves and the bandwidth of wireless access networks grows up, the expectation for mobile multimedia communication services including many-to-many communications begins a big necessary. Studying and solving multicast issues in the stationary multicast infrastructure has been largely studied in the literature. However, fewer efforts have been spent in the specific problems of mobile members and sources caused by the frequent change of membership and point of attachment. The main problematic of the multicast IP protocols in a Mobile IP environment is the frequent change of membership and members location, this can rapidly affect quality of both routing protocol scheme and multicast tree used, especially, the scenario of handover where a mobile source moves from attachment point in one sub-network to another one in another sub-network is challenging. A multicast source is identified by its Home Address HA. Since IP mobility implies acquisition of a new topologically Care-of-Address CoA at each handoff resulting in a change of identity of the multicast source, however, the established multicast routing states are always based on the home address of the mobile source. This paper addresses the issue of mobile Multicast routing by presenting a PIM-SM based architecture with a GRASP-RP selection algorithm. The key idea of this work is to make the handover of multicast sources transparent and avoid the reconstruction of the entire multicast-based tree, by using an architecture based in PIM-SM multicast distribution trees to hide the mobility of a mobile multicast source from the main multicast delivery tree. To estimate and evaluate our scheme, we implement simulation based in many metrics, simulation results show that good performance is achieved in terms of handoff latency, end-to-end delay, tree construction delay and others metrics.

Object Serialization White Framework in J2ME and its Refactoring in Black Framework (273-285)
       
Mohammed Mahieddine, Mehdia Ajana El-Khaddar, and Salyha Oukid
J2ME mobile agents developers are very soon confronted with the problem of objects transfer over the communication flows (streams) provided by J2ME which, by themselves, take into account only the primitive types or simple String objects of JAVA. Serialization is the process of saving the state of an object on a flow of communication, transferring it in the net, and restoring its equivalent from this flow. Unfortunately J2ME software development cannot be used as standard JAVA because it has many strong restrictions, which cannot be easily used as the standard JAVA. For example, in the case of mobile agent software development, J2ME does not provide tools for the serialization of objects. This research addresses the lack of a standard development environment for mobile agents under J2ME. In this work we propose a pattern-based white-box application framework, in order to achieve the serialization of complex JAVA Objects and its re-factoring into a black-box application framework.

A Novel Coverage and Connectivity Preserving Routing Protocol for Mission-Critical Wireless Sensor Networks (286-302)
       
Said Ben Alla and Abdellah Ezzati
Mission-critical wireless sensor networks (WSNs) have been found to be very useful for many military and civil applications such as disaster management, surveillance of battle fields and e-healthcare. Coverage preservation and connectivity are the most essential functions to guarantee quality of service (QoS) in mission-critical WSNs. By optimizing coverage, the deployment strategy would guarantee that optimum area in the sensing field is covered by sensors, as required by various types of mission-critical applications. Whereas by ensuring that the network is connected, it is ensured that the sensed information is transmitted to other nodes and possibly to a centralized base station which makes valuable decisions for the applications. However, a trade-off exists between sensing coverage and network lifetime due to the limited energy supplies of sensor nodes. In this paper, we propose a Coverage and Connectivity Preserving Routing Protocol for mission-critical WSNs (CCPRP) to accommodate connectivity, energy-balance and coverage-preservation for sensor nodes in WSNs that are hierarchically clustered. The energy consumption for radio transmissions and the residual energy over the network are taken into account when the proposed protocol determines an energy-efficient route for a data from elected cluster head to the base station through elected gateway. We define a cost metric to favour nodes with high energy-redundantly covered as better candidates for cluster heads in a way to improve the performance of sensing coverage, reduce communications energy and prolonging the effective network lifetime with optimal data delivery. Furthermore, we propose a novel area coverage protocol called CCPRP-AC for scheduling the sensing activity of sensor nodes that are deployed to sense point-targets in WSN using information coverage. The simulation results demonstrate that the proposed protocol CCPRP is able to increase the duration of the on-duty network and provide up to 124.76% of extra service time with 100% sensing coverage ratio comparing with other existing protocols, and the protocol CCPRP-AC achieves k-coverage of a field, where every point is covered by at least k sensors with a minimum number of sensors.

Modelling and Dimensioning of LTE Network  (303-318)
       
Mohammed Jaloun and Zouhair Guenoun
The objective of this paper is to define a mathematic model for the dimensioning of LTE Rel-8 network, after describing the mechanisms influencing the dimensioning such us the Scheduling, QOS and LTE capacity, we define the strategy of the planning and the objective function which aim to minimize the number of the base stations and the capacities of the wired links to deploy. The mathematical formulation of the model leads to a linear and mixed problem. PLEX method based on "Branch and Cut" algorithm has been used to solve this problem.

Back to JMM Online Front Page