skip to main content
10.1145/3010089acmotherconferencesBook PagePublication PagesbdawConference Proceedingsconference-collections
BDAW '16: Proceedings of the International Conference on Big Data and Advanced Wireless Technologies
ACM2016 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
BDAW '16: International Conference on Big Data and Advanced Wireless Technologies Blagoevgrad Bulgaria November 10 - 11, 2016
ISBN:
978-1-4503-4779-2
Published:
10 November 2016
In-Cooperation:
ANR, LABSTICC
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 14 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

The last decades, the fast growth of the information and the communication technology has leaded to overwhelming amount of data pushing our communication network to its limit. The big data volume is produced from an assortment of users and wireless mobile technologies, and are to be processed and stored in powerful datacenters. Indeed, conventional wireless communication networks cannot deal with the massive amount of exchanged data and there is a strong demand to create a fast and scalable inter-connected heterogeneous wireless network for the big data. These advanced big data wireless networks should address all big data lifecycle (access networks, Internet backbone, intra and inter datacenter networks) and satisfy transmission QoS.

research-article
Internet-of-Thing and reasons why it is becoming a reality

It is widely accepted that the Era of IoT can potentially connect billions of sensors, devices, equipment, systems, etc. In turn, the challenge is about driving business outcomes, consumer benefits, and the creation of new value. While benefits of IoT ...

research-article
Scene mining and knowledge discovery, concepts and applications

The enormous volumes of image data being produced on a daily basis in different application domains throughout the world lead to the significant challenge of managing, exploiting and mining this vast amount of steadily increasing data in various ...

research-article
Healthcare Big Data: Challenges and Opportunities

In healthcare sector huge quantities of data about patients and their medical conditions have been gathered through clinical databases and various other healthcare processes. Currently, it records nearly all aspects of care, including patient personal ...

research-article
Mixture Model Approaches to Big Data Clustering and Classification
Article No.: 4, Pages 1–2https://doi.org/10.1145/3010089.3010144

Technological evolution leads to increasingly large and heterogeneous data acquisitions (signals, images, measurement results, texts, etc.), and the growing share of information technology and digital simulation leads to the production of increasingly ...

research-article
Defining Big Data
Article No.: 5, Pages 1–6https://doi.org/10.1145/3010089.3010090

As Big Data becomes better understood, there is a need for a comprehensive definition of Big Data to support work in fields such as data quality for Big Data. Existing definitions of Big Data define Big Data by comparison with existing, usually ...

research-article
MASBioseq: a Multi-Agent System for Sequence Alignment with Dynamic Programming and R
Article No.: 6, Pages 1–4https://doi.org/10.1145/3010089.3010091

This work presents an alternative to program sequence alignment algorithms with dynamic libraries. The work is based on Dynamic Programming techniques developed in C and R languages, alternatives of implementation and a comparison of their execution ...

research-article
Towards a more reliable and robust Cloud Meta-Operating System based on heterogeneous kernels: A novel approach based on containers and microservices
Article No.: 7, Pages 1–13https://doi.org/10.1145/3010089.3010092

The Operating Systems (OS) provide services to applications via APIs that encapsulate the system calls interface. In the context of critical applications, the SLA is closely dependent on the underlying OS. This SLA is a big challenge for the most Cloud ...

research-article
Using Ensemble Learning and Association Rules to Help Car Buyers Make Informed Choices
Article No.: 8, Pages 1–5https://doi.org/10.1145/3010089.3010093

Cars are an essential part of our everyday life. Nowadays we have a wide plethora of cars produced by a number of companies in all segments. The buyer has to consider a lot of factors while buying a car which makes the whole process a lot more ...

research-article
Two-Stage Decision Making Policy Using Bayesian Multi-armed Bandit Algorithm for Opportunistic Spectrum Access
Article No.: 9, Pages 1–6https://doi.org/10.1145/3010089.3010094

Recently, various paradigms, for instance, device-to-device (D2D) communications, LTE-unlicensed and cognitive radio are being envisioned to improve the average spectrum utilization as well as energy efficiency of the decentralized wireless ...

research-article
TAF: Temporal Analysis Framework for Handling Data velocity in Healthcare Analytics
Article No.: 10, Pages 1–11https://doi.org/10.1145/3010089.3010095

We are inundated in a flood of data today. Data is being collected at a rapid scale from variety of sources like healthcare, e-commerce, social networking and so on. Decisions which were earlier made on assumptions can now be made on the data itself. It'...

research-article
Adaptive Encoding/Decoding for Turbo codes
Article No.: 11, Pages 1–7https://doi.org/10.1145/3010089.3010096

Original turbo codes are series or parallel concatenation of component codes. In this paper, we present a new structure of turbo code suitable for parallel Turbo code and serial Turbo code, for very low BER once Eb/N0 reached a certain point in the ...

research-article
Real-time Lighting Poles Monitoring by using Wireless Sensor Networks Applied to the Smart Cities
Article No.: 12, Pages 1–8https://doi.org/10.1145/3010089.3010097

Information and Communications Technology (ICT) will be at the heart of the smart city of the future. ICT development will allow for better urban management through obtaining, analyzing and managing a variety of information. This information helps ...

research-article
Aggregated Search and Interleaving Methods: A survey
Article No.: 13, Pages 1–9https://doi.org/10.1145/3010089.3010098

Aggregated search attempts to satisfy user's need by searching and assembling information from variety verticals and placing them into a single result page. Aggregated search has two research directions namely, cross-vertical Aggregated Search (cvAS) ...

research-article
A New Improved GPSR (GPSR-kP) Routing Protocol for Multimedia Communication over Vehicular Ad hoc Network
Article No.: 14, Pages 1–7https://doi.org/10.1145/3010089.3010099

One of the main constraint in front of Vehicular Ad hoc Networks (VANETs) is delivering the data in efficient time. This paper provides an improved Greedy Perimeter Stateless Routing protocol (GPSR) to enhance the video quality transmission over VANETs. ...

research-article
Opportunities, Threats and Future Directions in Big Data for Medical Wearables
Article No.: 15, Pages 1–5https://doi.org/10.1145/3010089.3010100

Big data term has started to take part in our lives as a result of advanced technologies that produce unprecedented amount of data. Big data management has a critical role on smart decision making, new product developments and optimized offerings. ...

research-article
Retrieval and Clustering of Medicines Within Healthcare Data Records
Article No.: 16, Pages 1–6https://doi.org/10.1145/3010089.3010101

Electronic Health Records (EHRs) are typically designed to electronically document all information that is administratively and clinically relevant in a patient's use of a healthcare facility. This paper intends to improve discoverability of medications ...

research-article
Minimum Cost Fused Feature Representation and Reconstruction with Autoencoder in Bimodal Recognition System
Article No.: 17, Pages 1–6https://doi.org/10.1145/3010089.3010102

In the presentera, human authentication is tightly coupled with biometric advancements. Authentication deals with metrics of both physical and behavioral traits of an individual to ensure strong acknowledgment plans by either accommodating or deciding ...

research-article
Timer based LCA Clustering
Article No.: 18, Pages 1–5https://doi.org/10.1145/3010089.3010103

A mobile ad hoc network (MANET) is a collection of wireless nodes that all of them may be mobiles. In MANETs, there are many challenges that can be reduced by a better clustering algorithm, i.e. by implementing a more robust cluster head selection -- ...

research-article
Collaborative Localization Algorithm based on Constraint Programming
Article No.: 19, Pages 1–6https://doi.org/10.1145/3010089.3010104

The majority of applications in wireless sensor networks use a random deployment; this has made the localization in wireless sensor networks an interesting research problem. Some algorithms use basic techniques, as trilateration or triangulation. Nodes ...

research-article
Secure and Efficient ECC: Radix-16 Scalar Multiplication without Pre-Computation
Article No.: 20, Pages 1–10https://doi.org/10.1145/3010089.3010105

The use of Elliptic curve cryptography (ECC) is widely playing a crucial role and is reporting with a great hope of advancing security and performance related benefits for the high end applications. The scalar multiplication algorithms used in ECC are ...

research-article
Predicting Access Points Workload in Wi-Fi Infrastructures According to Users' Behavior
Article No.: 21, Pages 1–6https://doi.org/10.1145/3010089.3010106

In this work, we present a methodology based on matrix factorization and gradient descent algorithm to predict the access points workload based on the users' behavior in Wi-Fi wireless networks, under academic and university environments. This knowledge ...

research-article
An Improved Scheduling Strategy in Cloud Computing Using Fuzzy Logic
Article No.: 22, Pages 1–9https://doi.org/10.1145/3010089.3010107

Within few years, Cloud computing has emerged as the most promising IT business model. Thanks to its various technical and financial advantages, Cloud computing continues to convince every day new users coming from scientific and industrial sectors. To ...

research-article
Trust-ticket based authentication scheme for WSN multi-domain applications
Article No.: 23, Pages 1–6https://doi.org/10.1145/3010089.3010108

With the increasing popularity of Wireless Sensor Networks (WSNs) in versatile domains demand crucial security concerns. Secure communication mechanisms in WSNs have been widely deployed to ensure confidentiality, authenticity and integrity of ...

research-article
Coverage Quality Analysis for 3D Wireless Sensor Network
Article No.: 24, Pages 1–6https://doi.org/10.1145/3010089.3010109

The sensor node deployment quality is defined as the most fundamental issue in Wireless Sensor Networks (WSNs), which have a great impact on the quality of coverage and the overall performance of WSNs. When the random deployment is required, where ...

research-article
Rate-Distorsion Based Cross-Layer Scheduling for Real Time Video Communication
Article No.: 25, Pages 1–4https://doi.org/10.1145/3010089.3010110

This article proposes a novel idea of downlink scheduling for real time video communication over LTE cellular networks. The technique is based on cross-layer coding where a scheduling algorithm uses rate-distorsion characteristics produced by video ...

research-article
An Enhanced AODV Routing Protocol for Vehicular Adhoc Networks
Article No.: 26, Pages 1–6https://doi.org/10.1145/3010089.3010111

The key difference of Vehicular Ad- hoc Network (VANET) and Mobile Ad-hoc Network (MANET) is the exceptional mobility pattern and quick variability variable of network topology. The existing MANET routing protocols are inadequate for the VANET. One good ...

research-article
EREAT: Efficient Route Estimation based-on Actuator Tracking for WSANs
Article No.: 27, Pages 1–5https://doi.org/10.1145/3010089.3010112

In Wireless Sensor and Actuator Networks (WSANs), one of the major challenges of routing is to ensure the tradeoff between the energy consumption and the end-to-end delay, especially, where the mobility of actuators is highly frequent. The mobility ...

research-article
The Role of Sampling in Big Data Analysis
Article No.: 28, Pages 1–5https://doi.org/10.1145/3010089.3010113

Nowadays, a huge amount of data is being continuously generated in all fields of life by all systems and applications on daily basis. This amount of data is increasing at a rapid pace. The collection of this huge amount of data leads to challenges of ...

research-article
Faulty Data Detection in Wireless Sensor Networks Based on Copula Theory
Article No.: 29, Pages 1–7https://doi.org/10.1145/3010089.3010114

Wireless Sensor Networks (WSNs) are a powerful instrument for monitoring and recording physical phenomena. Very often the quality of the sensed data collected by sensor nodes is affected by noise and errors, events, and malicious attacks. Also, the ...

research-article
User-Driven Handover Scheme in Long-Term Evolution (LTE) Macro/Femto Cells for High Speed Scenarios
Article No.: 30, Pages 1–6https://doi.org/10.1145/3010089.3010115

Ubiquitous communication depends upon an expanded capacity and suitable Quality of Service (QoS). To meet these requirements, LTE mobile network providers deploy small cells in shadow zones and next to base station to increase the network capacity and ...

Contributors
  • University of Batna 2
  • Paris-Saclay University
  • King Fahd University of Petroleum and Minerals

Recommendations