submit CrossRef Open Access Subscribe New Journal Ideal

Click on image to enlarge

Indexed in Scopus

Journal of Mobile Multimedia

Editor-in-Chief: Pavlos Lazaridis, University of Huddersfield, UK


ISSN: 1550-4646 (Print Version),

ISSN: 1550-4654 (Online Version)
Vol: 9   Issue: Combined Issue 3 & 4

Published In:   March 2014

Publication Frequency: Quarterly


Search Available Volume and Issue for Journal of Mobile Multimedia


Journal Description        Read Full Articles        Editorial Board        Subscription        Indexed

Use of TDM Pseudo-Wires for an Efficient NGN Emulation of ISDN Multi-Channel Circuit-Mode Bearer Services


Javier Muñoz-Calle, Antonio J. Sierra, and Juan M. Vozmediano

Departamento de Ingeniería Telemática, Universidad de Sevilla

Abstract: [+]    |    Download File [ 362KB ]

Abstract: The specifications of the Next Generation Networks (NGN) agree on the need for migration mechanisms that enable the replacement of traditional networks, highlighting the ISDN networks. This requirement has a notable impact on NGN in terms of network design. Recent solutions proposed by ITU-T and ETSI for ISDN migration only include support for a subset of current ISDN services, not covering in detail the multi-channel circuit-mode bearer services. This paper examines the use of TDM pseudowires for NGN emulation of ISDN multi-channel calls between ISDN terminals, proposing new payload types.

Keywords: Multi-channel service, ISDN bearer, NGN, Pseudo-wire

Improvement Quality of the Recommendation System Using the Intrinsic Context


Latifa Baba-Hamed and Reda Soltani

RIIR Laboratory, University of Oran, Algeria

Abstract: [+]    |    Download File [ 766KB ]

Abstract: The traditional recommendation systems provide a solution to the problem of information overload. They provide users with the information and content which are the most relevant for them. These systems ignore the fact that users interact with systems in a particular context. Context plays an important role in determining users' behavior by providing additional information that can be exploited in building predictive models. Context-aware recommendation systems take this information into account to make predictions in order to improve the performance of the filtering process. Most existing Context-aware systems use the extrinsic context. In this paper, we propose an intrinsic contextual recommendation system that we can apply to the recommendation of contents in general (i.e. book, Url, item, product, movie, song, restaurant, etc.). The context in our approach is extracted from the set of attributes for the object itself. Our system use a contextual pre-filtering technique based on implicit user feedback. To show the performance of the recommendation process, we consider the movie domain as a case study.

Keywords: Recommendation, context, user profile, preference, matching operator, precision.

Goal Driven Approach to Model Interaction between Viewpoints of a Multi-view KDD Process


El Moukhtar Zemmouri1, Hicham Behja1,2, Brahim Ouhbi1, Brigitte Trousse2, Abdelaziz Marzak3 and Youssef Benghabrit1

Ecole Nationale Supérieure d’Arts et Métiers – Meknes, Morocco
Equipe-projet AxIS, INRIA Sophia Antipolis - Méditerranée, France
Faculté des Sciences Ben Msik, Casablanca, Morocco

Abstract: [+]    |    Download File [ 953KB ]

Abstract: Knowledge Discovery in Databases (KDD) is a highly complex, iterative and interactive process, with a goal-driven and domain dependent nature. The complexity of KDD is mainly due to the nature of the analyzed data (which are massive, distributed, incomplete, and heterogeneous) and the nature of the process itself (since the process is by definition interactive and iterative). Given this complexity, a KDD user faces two major challenges: on the one hand, he must manipulate prior domain knowledge to better understand data and business objectives. On the other hand, he must be able to choose, configure, compose and execute tools and methods from various fields (e.g., machine learning, statistics, artificial intelligence, databases) to achieve goals. Furthermore, in the business real world, a data mining project is usually held by several actors (domain experts, data analysts, KDD experts …), each with a different viewpoint. In this paper we propose to tackle the complexity of KDD process, and to enhance coordination and knowledge sharing between actors of a multi-view KDD analysis through a goal driven modeling of interactions between viewpoints. After a brief review of our approach of viewpoint in KDD, we will first develop a semantic Model of Goals that allows identification and representation of business objectives during the business understanding step of KDD process. Then, based on this Goal Model, we define a set of semantic relations between viewpoints of a multi-view analysis; namely equivalence, inclusion, conflict and requirement.

Keywords: KDD process, Viewpoint, Goal analysis, Ontologies, SWRL

Analysis of VoIP and Video Traffic over WiMAX Using Different Service Classes


Tarik Anouari1 and Abdelkrim Haqiq 1,2

1Computer, Networks, Mobility and Modeling laboratory Department of Mathematics and Computer FST, Hassan 1st University, Settat, Morocco
2e-NGN Research group, Africa and Middle East

Abstract: [+]    |    Download File [ 289KB ]

Abstract: WiMAX, the acronym for Worldwide Interoperability for Microwave Access is a set of technical standards based on IEEE 802.16 standard. It provides wireless connection of companies or individuals over long distances at high speed, it’s an adequate response to some rural or inaccessible areas. Unlike DSL (Digital Subscriber Line) or other wired technology, WiMAX uses radio waves and can provide point-to-multipoint (PMP) and Mesh modes. In parallel, Voice over IP (VoIP) technology is the biggest revolution in communication technology. It replaces the traditional telephone service and offers free long distance calls. Video stream traffic is characterized by the ability to transmit real-time and interactively visual and auditory information. VoIP and Video traffic are highly delay intolerant and need a high priority transmission. In this paper, we analyze the performances of the most common VoIP codec, namely G.711, and video streaming H.263 format using BE, rtPS, UGS, ertPS and nrtPS service classes and NOAH routing protocol. NS-2 simulator is used to analyze the QoS parameters. Our objective is to analyze different WiMAX service classes with respect to the QoS parameters such as, average jitter, throughput and average delay while increasing mobile nodes.

Keywords: WiMAX, VoIP, Video Stream, BE, rtPS, UGS, ertPS, nrtPS, NS2.

The S2P Learning Model: For the Combination of the Formal and the Personal Dimensions of Learning


Salah Eddine Bahji, Youssef Lefdaoui, and Jamila El Alami

Mohammed V-Agdal University, Rabat, High School of Technology, Sale

Abstract: [+]    |    Download File [ 107KB ]

Abstract: The S2P Learning Model was originally designed to try to understand the Game-based Learning. It was subsequently developed in order to translate a conceptual framework for understanding any initiative of formal learning. Therefore, this model is essentially based on three complementary layers namely: the Formal Learning Strategy, the Learning Platform, and the Learning Process.

Currently big changes occur constantly in our society at all levels. A society in which the individual is becoming more and more independent through ease of access to knowledge, due to the wide facilities offered by information technologies. Thus, knowing that the S2P Learning Model has focused previously on the formal dimension of learning, and knowing also that the process of appropriation of knowledge includes a dominant individual dimension, it would be crucial to integrate it (the personal dimension of learning) in this model of understanding, in order to consider both formal and personal dimensions in any educational initiative.

Especially since the individual dimension is strongly present in academia, where students are becoming more independent, autonomous and demanding, this paper focuses mainly on the incorporation of the individual dimension into the S2P Learning Model, aiming to exploit optimally the two dimensions, formal and personal, in a way to catalyse and foster optimally the learning process.

Keywords: Learning model, S2P learning model, Dimensions of learning, Personal dimension of learning, Formal dimension of learning.

PIM-SM Protocol with GRASP-RP Selection Algorithm Based Architecture to Transparent Mobile Sources in Multicast Mobile IPv6 Diffusion


Youssef Baddi and Mohamed Dafir Ech-Chrif El Kettani

ISeRT, ENSIAS, Mohammed V-Souissi University, Morocco

Abstract: [+]    |    Download File [ 1015KB ]

Abstract: Due to the progress of network multimedia technology, Internet research community has proposed many Different multicast routing protocols to support efficient real-time multimedia application such as, IPTV, videoconferencing, group games. These applications require a multicast routing protocol in which packets arrive to multicast receptors within a minimum delay and delay variation. Nevertheless, these protocols does not take into account that group members may be mobile and have not been designed for mobile members and roaming sources, and has not been tested in wireless and mobile environment since they were developed for multicast parties whose members and sources are topologically stationary. Recently, as the performance of mobile hosts rapidly improves and the bandwidth of wireless access networks grows up, the expectation for mobile multimedia communication services including many-to-many communications begins a big necessary. Studying and solving multicast issues in the stationary multicast infrastructure has been largely studied in the literature. However, fewer efforts have been spent in the specific problems of mobile members and sources caused by the frequent change of membership and point of attachment. The main problematic of the multicast IP protocols in a Mobile IP environment is the frequent change of membership and members location, this can rapidly affect quality of both routing protocol scheme and multicast tree used, especially, the scenario of handover where a mobile source moves from attachment point in one sub-network to another one in another sub-network is challenging. A multicast source is identified by its Home Address HA. Since IP mobility implies acquisition of a new topologically Care-of-Address CoA at each handoff resulting in a change of identity of the multicast source, however, the established multicast routing states are always based on the home address of the mobile source. This paper addresses the issue of mobile Multicast routing by presenting a PIM-SM based architecture with a GRASP-RP selection algorithm. The key idea of this work is to make the handover of multicast sources transparent and avoid the reconstruction of the entire multicast-based tree, by using an architecture based in PIM-SM multicast distribution trees to hide the mobility of a mobile multicast source from the main multicast delivery tree. To estimate and evaluate our scheme, we implement simulation based in many metrics, simulation results show that good performance is achieved in terms of handoff latency, end-to-end delay, tree construction delay and others metrics.

Keywords: GRASP-RP, PIM-SM, Mobile IPv6, Multicast Routing, RP.

Object Serialization White Framework in J2ME and its Refactoring in Black Framework


Mohammed Mahieddine1, Mehdia Ajana El-Khaddar2 and Salyha Oukid1

1LRDSI Laboratory, University of Blida, Algeria
2SIM Laboratory, ENSIAS Rabat, Morocco

Abstract: [+]    |    Download File [ 800KB ]

Abstract: J2ME mobile agents developers are very soon confronted with the problem of objects transfer over the communication flows (streams) provided by J2ME which, by themselves, take into account only the primitive types or simple String objects of JAVA. Serialization is the process of saving the state of an object on a flow of communication, transferring it in the net, and restoring its equivalent from this flow. Unfortunately J2ME software development cannot be used as standard JAVA because it has many strong restrictions, which greatly restricts its use relatively to JAVA. For example, in the case of mobile agent software development, J2ME does not provide tools for the serialization of objects. This research addresses the lack of a standard development environment for mobile agents under J2ME. In this work we propose a pattern-based white-box application framework, in order to achieve the serialization of complex JAVA Objects and its re-factoring into a black-box application framework.

Keywords: Design Pattern, White-Box Framework, Black-Box Framework, Re- Factoring, Re-Engineering, Serialization, J2ME, Ubiquitous, Mobile Agent.

A Novel Coverage and Connectivity Preserving Routing Protocol for Mission-Critical Wireless Sensor Networks


Said Ben Alla and Abdellah Ezzati

LAVETE laboratory, Faculty of Science and Techniques, Hassan 1st University, Settat, Morocco

Abstract: [+]    |    Download File [ 390KB ]

Abstract: Mission-critical wireless sensor networks (WSNs) have been found to be very useful for many military and civil applications such as disaster management, surveillance of battle fields and e-healthcare. Coverage preservation and connectivity are the most essential functions to guarantee quality of service (QoS) in mission-critical WSNs. By optimizing coverage, the deployment strategy would guarantee that optimum area in the sensing field is covered by sensors, as required by various types of mission-critical applications. Whereas by ensuring that the network is connected, it is ensured that the sensed information is transmitted to other nodes and possibly to a centralized base station which makes valuable decisions for the applications. However, a trade-off exists between sensing coverage and network lifetime due to the limited energy supplies of sensor nodes. In this paper, we propose a Coverage and Connectivity Preserving Routing Protocol for mission-critical WSNs (CCPRP) to accommodate connectivity, energy-balance and coverage-preservation for sensor nodes in WSNs that are hierarchically clustered. The energy consumption for radio transmissions and the residual energy over the network are taken into account when the proposed protocol determines an energy-efficient route for a data from elected cluster head to the base station through elected gateway. We define a cost metric to favour nodes with high energy-redundantly covered as better candidates for cluster heads in a way to improve the performance of sensing coverage, reduce communications energy and prolonging the effective network lifetime with optimal data delivery. Furthermore, we propose a novel area coverage protocol called CCPRP-AC for scheduling the sensing activity of sensor nodes that are deployed to sense point-targets in WSN using information coverage. The simulation results demonstrate that the proposed protocol CCPRP is able to increase the duration of the onduty network and provide up to 124.76% of extra service time with 100% sensing coverage ratio comparing with other existing protocols, and the protocol CCPRP-AC achieves k-coverage of a field, where every point is covered by at least k sensors with a minimum number of sensors.

Keywords: Quality of Service (QoS), Coverage Preservation, Mission-Critical WSNs, Cluster Head, Gateway, Energy Efficiency.

Modelling and Dimensioning of LTE Network


Mohammed Jaloun and Zouhair Guenoun

Laboratoire d’électronique et de Communication-LEC, Ecole Mohammedia d’ingénieurs-EMI, Université Mohammed V-Agdal- Rabat, Morocco

Abstract: [+]    |    Download File [ 341KB ]

Abstract: The objective of this paper is to define a mathematic model for the dimensioning of LTE Rel-8 network, after describing the mechanisms influencing the dimensioning such us the Scheduling, QOS and LTE capacity, we define the strategy of the planning and the objective function which aim to minimize the number of the base stations and the capacities of the wired links to deploy. The mathematical formulation of the model leads to a linear and mixed problem. PLEX method based on “Branch and Cut” algorithm has been used to solve this problem.

Keywords: LTE-Rel8; Capacity; Mobile Network; Dimensioning; Optimization

River Publishers: Journal of Mobile Multimedia