Creat membership Creat membership
Sign in

Forgot password?

Confirm
  • Forgot password?
    Sign Up
  • Confirm
    Sign In
home > search

Now showing items 1 - 10 of 10

  • A novel power control based on a relaxed constraint in cognitive system

    Ridouani, Mohammed   Hayar, Aawatif   Haqiq, Abdelkrim  

    The next-generation 5G networks will integrate two technologies, cognitive radio and cooperative communication, which use radio spectrum opportunistically and efficiently. In addition, they enhance the reliability and the capacity of the system. In this paper, we present a novel power control scheme based on a relaxed constraint in cognitive network under both the outage probability limit (OPL) of the primary system and the interference constraint limit (ICL). We show how to transform the optimization problem of the condition on the OPL and the ICL into a condition on the channel so that the cognitive user observes the channel from cognitive source to primary receiver and control its transmit power based on the channel condition. Moreover, we extend the studies to the cognitive relay network. We derive the closed-form expressions of the outage probabilities over independent but not necessarily identically distributed Nakagami-m fading channels. By using the theoretical analysis and from the numerical results, firstly, we show that the proposed power control scheme, which is based on both the OPL and the ICL, achieves better performance in underlay spectrum rather than the traditional one, which is based only on the interference constraints. Secondly, we show that the proposed scheme allows lower power consumption at cognitive side while the performance of cognitive relay network is improved, and the QoS of primary system is guaranteed in parallel. Copyright (c) 2016 John Wiley & Sons, Ltd.
    Download Collect
  • Hierarchical Slotted Wireless Random Channel Access with Power Control

    Karouit, Abdelillah   Orozco Barbosa, Luis   Ramírez-Mireles, Fernando   Haqiq, Abdelkrim  

    Download Collect
  • Hierarchical Slotted Wireless Random Channel Access with Power Control

    Karouit, Abdelillah   Orozco Barbosa, Luis   Ramirez-Mireles, Fernando   Haqiq, Abdelkrim  

    This paper introduces a hierarchical Wireless Random Access scheme based on power control where intelligence is split among the mobile users in order to drive the outcome of the system towards an efficient point. The hierarchical game is obtained by introducing a special user who plays the role of altruistic leader whereas the other users assume the role of followers. We define the power control scheme in such a way that the leader first chooses the lowest power to transmit its packets among.. available levels whereas the followers re-transmit by randomly choosing a power level picked from N - 1 higher distinct power levels. Using a 3D Markovian model, we compute the steady state of the system and derive the average system throughput and expected packet transmission delay. Our numerical results show that the proposed scheme considerably improves the global performance of the system avoiding the well known throughput collapse at high loads commonly characterizing most random channel access mechanisms.
    Download Collect
  • An Autonomic SLA Monitoring Framework Managed by Trusted Third Party in the Cloud Computing

    Maarouf, Adil   Mifrah, Youssef   Marzouk, Abderrahim   Haqiq, Abdelkrim  

    This article describes how currently, service level agreements (SLAs) assurance forms one of the major challenges for cloud computing (CC) in order to guarantee quality of service (QoS) in real-time and control SLA violations. However, due to the highly dynamic nature of this open environment, it is important to have a binding agreement between all the service parties for ensuring trust while fulfilling the expected QoS. To properly operate and manage such complex situations, an effective and efficient monitoring is crucial. The participation of a trusted third party (TTP) is necessary in order to resolve conflicts between involved parties. This article proposes an autonomic SLA monitoring framework managed by TTP composed of two modules: the first one SLA establishment module, which aims at providing support for automated SLA generation and management. The second one, a service monitoring module to dynamically monitor QoS metrics by detecting SLA violations at runtime to verify compliances for the respective SLAs, and to propose a mechanism for an adaptive remedy rectification, as a contribution at the third maturity level of the autonomic computing paradigm as defined by IBM. The framework is validated with scenarios on response time and availability, the results obtained are promising. They confirm that this framework manages SLAs in an efficient way as it detects all violations to be communicated to concerned parties, and identifies particular penalty clauses that can be used to modify the reputation of a provider over time. The TTP framework equipped with such reputation module can provide real-time assessment for consumers informed decision making to continue using a service or to migrate to another service provider in the case of service degradation. This creates a fair competitiveness between providers and hence improves service performance and the reliability in the cloud.
    Download Collect
  • An Autonomic SLA Monitoring Framework Managed by Trusted Third Party in the Cloud Computing

    Maarouf, Adil   Mifrah, Youssef   Marzouk, Abderrahim   Haqiq, Abdelkrim  

    Download Collect
  • A Team Study of a Multiple-Power Wireless Random Channel Access Mechanism with Capture Effect

    Karouit, Abdelillah   Sabir, Essaid   Ramirez-Mireles, Fernando   Orozco Barbosa, Luis   Haqiq, Abdelkrim  

    We present a team analysis of a slotted random wireless channel access mechanism. Under the proposed scheme, denoted wireless random access mechanism with multiple power levels (MPL-WRA), each mobile station contends for a transmission opportunity following the principles of a slotted access mechanism incorporating a random transmitting power value selected among various available power levels. In this way, a capture effect may be produced allowing the packet to be decoded whenever the signal-to-interference-plus-noise ratio is higher than a given threshold. In order to analyze the performance and optimization of the proposed setup, we build aMarkovian model integrating the wireless access mechanism supplemented by the use of multiple power levels in an attractive and simple cross-layer fashion. We follow a team problem approach allowing us to fine tune the design parameters of the overall system configuration. Throughout an extensive numerical analysis, our main results set the basis for the social optimal system configuration of the proposed mechanism taking into account the physical constraints of using multiple power levels and the actual practical implementation of a slotted access mechanism. We end the paper with concluding remarks and future research directions including guidelines for the actual implementation of our proposal.
    Download Collect
  • A Stable Route and the Remaining Time Prediction to Send a Data Packet in Highway Environment

    Nabil, Mohamed   Hajami, Abdelmajid   Haqiq, Abdelkrim  

    There are numerous research challenges to develop safety or non-safety applications in vehicular ad hoc networks (VANETs). One of the critical issues consists in designing a scheme that solves the local maximum problem, reduces contention phase, increases the route lifetime and reduces the frequent path disruptions caused by high mobility of vehicles. Existing schemes do not take into consideration all these issues. For this reason, this paper addresses these issues for non-safety applications in a highway environment. We propose a scheme that strives to find a stable route, minimize contention phase and predict the route lifetime and the average transmission time of the data packets. Our scheme increases the percentage of packets delivery, reduces the control overhead and decreases number of error messages generated during transmission of data packets as function of vehicles density.
    Download Collect
  • Performance of Data Mining Techniques to Predict in Healthcare Case Study : Chronic Kidney Failure Disease

    Boukenze, Basma   Mousannif, Hajar   Haqiq, Abdelkrim  

    Download Collect
  • Performance Analysis and Security Based on Intrusion Detection and Prevention Systems in Cloud Data Centers

    El Mir, Iman   Haqiq, Abdelkrim   Kim, Dong Seong  

    Intrusion Detection Systems allow detection of unwanted attempts accessing which can violate security policy, manipulation or disabling of computer systems through the Internet. IDS plays a vital role in securing cloud data centers. This paper introduces an analytical model based on embedded Markov chain to analyze the packet processing using Bro IDPS (Intrusion Detection Prevention System). In this paper, we combine the preventive and detective rules to find a trade-off between network performance and security. We focus on how to enhance the detection engine and to predict the attack signatures taking into account of average service time, packet loss and blocking probability.
    Download Collect
  • Predicting the Route of the Longest Lifetime and the Data Packet Delivery Time between Two Vehicles in VANET

    Nabil, Mohamed   Hajami, Abdelmajid   Haqiq, Abdelkrim  

    Download Collect
1

Contact

If you have any feedback, Please follow the official account to submit feedback.

Turn on your phone and scan

Submit Feedback