References of "Melakessou, Foued 50002373"
     in
Bookmark and Share    
Full Text
See detailAnalysis of Call Detail Records Based on Scilab
Melakessou, Foued UL

Scientific Conference (2015, May 22)

Collecting, analyzing and modeling the distribution of the mobility flows is an important factor that enables the optimization of the current transportation infrastructure (vehicle routes, bus and train ... [more ▼]

Collecting, analyzing and modeling the distribution of the mobility flows is an important factor that enables the optimization of the current transportation infrastructure (vehicle routes, bus and train schedules, etc.) in order to efficiently support the user demand. The analysis of Call Detail Records has captured the attention of traffic and transportation researchers to optimize people's mobility. We have used Call Detail Record (CDR) datasets, provided by Orange Senegal, combined with demographic data and maps (base stations geolocalization), in order to compute, characterize and identify the mobility flows of Senegalese population. Studies and researches were performed using mobile communication data made available by SONATEL and Orange within the D4D Challenge. Scilab has been the central component of our model analysis platform. Thus we have extracted realistic human mobility models adapted to the Senegal use case. Daily traffic demand profile of each mobile phone base station has been modeled, by considering voice and also messaging activities. The evaluation of mobility models will help to better design and develop future infrastructures in order to better support the actual demand. This facilitates the impact evaluation of efficiency of the transportation services and infrastructure modifications, such as the addition of new roads. We have built mobility maps from CDRs' statistical analysis, based on the Scilab NARVAL toolbox. Mobility patterns have been highlighted, in respect with specific vizualization tools. A classification of each base station has been performed into urban, suburban and rural modes. An algorithm has also been developed in order to detect traffic anomalies, based on the computed daily profiles. The second contribution corresponds to the generation of inter-antenna and inter-district mobility graphs for each month of 2013. This work was supported by the research project named MAMBA that intends to propose and validate a multimodal mobility platform that relies on new Internet technologies to interconnect different mobile services to provide relevant travel advice based on the context of the users, so as to optimize overall system performance. [less ▲]

Detailed reference viewed: 260 (1 UL)
Full Text
Peer Reviewed
See detailDetection of Population Mobility Anomalies in Senegal from Base Station Profiles
Melakessou, Foued UL; Derrmann, Thierry UL; Frank, Raphaël UL et al

Scientific Conference (2015, April 08)

The analysis of Call Detail Records has captured the attention of traffic and transportation researchers to optimize people's mobility. In our work, we would like to analyze Call Detail Records in order ... [more ▼]

The analysis of Call Detail Records has captured the attention of traffic and transportation researchers to optimize people's mobility. In our work, we would like to analyze Call Detail Records in order to extract realistic human mobility models adapted to the Senegal use case. In this paper, we describe our analysis of the available D4D datasets. The first contribution is the modeling of the daily traffic demand profile of each antenna, by considering voice and short message services. The evaluation of mobility models will help to better design and develop future infrastructures in order to better support the actual demand. A classification has been performed into urban, suburban and rural modes. An algorithm has been developed to detect traffic anomalies in 2013, based on the daily profiles. The second contribution corresponds to the generation of inter-antennas and inter-arrondissements mobility graphs for each month of 2013. [less ▲]

Detailed reference viewed: 166 (5 UL)
Peer Reviewed
See detailA Cell Dwell Time Model for Synthetic Population Generation from Call Detail Records
Derrmann, Thierry UL; Frank, Raphaël UL; Melakessou, Foued UL et al

Scientific Conference (2015, April 08)

In this work we propose a novel Cell Dwell Time Model that can be used to generate a synthetic population. We introduce two new metrics to define the attractivity of cell sites based on global and ... [more ▼]

In this work we propose a novel Cell Dwell Time Model that can be used to generate a synthetic population. We introduce two new metrics to define the attractivity of cell sites based on global and individual parameters obtained via the analysis of the Data For Development (D4D) Call Detail Records (CDR). We rely on the shortest path road network to interconnect two distant cell sites. The resulting dwell time model can be used to compute accurate user trajectories even with partial information. This work represents a first step towards the generation of a synthetic population that can be used to perform a wide range of simulative studies to evaluate and optimize transportation networks. [less ▲]

Detailed reference viewed: 257 (33 UL)
Full Text
See detailScilab Modelling and Simulation of Communication Networks: Car Traffic Analysis in Luxembourg
Melakessou, Foued UL; Engel, Thomas UL

in Abstract book of 30th International CAE Conference, CAE'14 (2014)

Network Analysis and Routing eVALuation, referenced as NARVAL has been designed on top of the Scilab environment. It has been created at the University of Luxembourg within the Interdisciplinary Centre ... [more ▼]

Network Analysis and Routing eVALuation, referenced as NARVAL has been designed on top of the Scilab environment. It has been created at the University of Luxembourg within the Interdisciplinary Centre for Security, Reliability and Trust (SnT). The Centre carries out interdisciplinary research and graduate education in secure, reliable, and trustworthy ICT systems and services. This Scilab External Module is focusing on the analysis of network protocols and algorithms. Each network of communicating devices such as computers, phones or sensors, needs to follows specific rules in order to organize and control the data exchange between source and destination nodes. Communication protocols enable to discover the network topology, and to propagate the data traffic between network entities. The main goal of our toolbox is to provide a complete software environment enabling the understanding of available communication algorithms, but also the design of new schemes in order to evaluate and improve the traffic behavior and distribution on network topologies defined by the user. NARVAL permits to generate random topologies according to various algorithms such as Locality, Waxman, Barabasi-Albert and hierarchical models. The user can also design his own topology by providing nodes' coordinates, visualization parameters, and also links' information that are necessary for path calculation. The combination of these functions enables to build a large range of topologies with distinct routing properties. The NARVAL module permits to study the impact of routing algorithms on the effectiveness of transmission protocols used by data communications on a defined network topology. We provide a set of basic functions in order to create network graphs, compute routing algorithms (AODV, BFS, DFS, Bellman-Ford, Dijkstra, Flood, Floyd-Warshall, Multiple Paths, RPL, ARC, etc.) on them and finally make statistical analysis on the efficiency of data communications. The mobility of nodes (Mobile/Vehicular Ad hoc NETwork MANET/ VANET) is also supported according to models such as Random Direction, Random Walk, Random Way Point, etc. The target audience of this external module includes academics, students, engineers and scientists. We put some efforts to build detailed help files. The description of each function has been carefully done in order to facilitate the end users' comprehension. It is often accompanied with explicit diagrams. Our simulations and results obtained with NARVAL have been published in several IEEE international conferences and journals. This research contribution was partially supported by the following European FP7 projects: U2010 (http://www.u2010.eu), EFIPSANS (http://www.efipsans.org), IoT6 (http://www.iot6.eu) and BUTLER (http://www.iot-butler.eu). [less ▲]

Detailed reference viewed: 447 (4 UL)
Full Text
Peer Reviewed
See detailTowards a New Way of Reliable Routing: Multiple Paths over ARCs
Melakessou, Foued UL; Palattella, Maria Rita UL; Engel, Thomas UL

in Towards a New Way of Reliable Routing: Multiple Paths over ARCs (2014, September 24)

The Available Routing Construct (ARC), recently proposed at IETF, provides a promising model for achieving highly reliable routing in large-scale networks. Among its features, ARC offers multi-path ... [more ▼]

The Available Routing Construct (ARC), recently proposed at IETF, provides a promising model for achieving highly reliable routing in large-scale networks. Among its features, ARC offers multi-path routing by design. In the present work, we introduced ARC for the first time to the research community. Then, we showed, by means of simulation results, how ARC over-performs classical multi-path routing algorithms, by building disjoint multiple paths without extra-cost due to new route computation. [less ▲]

Detailed reference viewed: 185 (0 UL)
Full Text
See detailNetwork Analysis and Routing eVALuation V3.0
Melakessou, Foued UL; Engel, Thomas UL

Scientific Conference (2014, May 15)

Detailed reference viewed: 123 (0 UL)
Full Text
See detailPath Extension Analysis of Peer-to-Peer Communications in 6LoWPAN/RPL Sensor Networks
Melakessou, Foued UL; Engel, Thomas UL

in Abstract book of 21st International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS’13 (2013)

Researchers and manufacturers are currently putting a lot of efforts to design, improve and deploy the Internet of Things, involving a significant number of constrained and low cost embedded devices ... [more ▼]

Researchers and manufacturers are currently putting a lot of efforts to design, improve and deploy the Internet of Things, involving a significant number of constrained and low cost embedded devices deployed in large scales with low power consumption, low bandwidth and limited communication range. For instance we can easily build a network composed by multiple sensors distributed in a building in order to monitor temperature in different offices. This kind of architecture is generally centralized as all sensors are mainly programmed to periodically transmit their data to the sink. The specific IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) had been designed in order to enable such communications. Support for point-to-point traffic is also available. In fact new applications may also consider peer-to-peer communications between any nodes of the network. In that case, RPL is not optimal as data packets are forwarded in respect with longer paths with larger metrics. In this paper we propose to study the effectiveness of RPL compared to a shortest path algorithm such like the Dijkstra's algorithm. We suggest to analyze peer-to-peer communications inside random wireless sensor network topologies with size limited to 250 nodes, corresponding to a reasonable cluster size. We have built a particular simulation environment named Network Analysis and Routing eVALuation (NARVAL). This toolbox permits to generate random topologies in order to study the impact of routing algorithms on the effectiveness of communication protocols. In our work, we first generated many random network topologies where we selected a sink node. We built the Destination Oriented Directed Acyclic Graph (DODAG) from the chosen sink in respect with the RPL algorithm. We finally performed all paths between each couple of two distinct sensor nodes and compared them to the corresponding shortest paths obtained by the Dijkstra's algorithm. This approach permits to retrieve some statistics on the path extension between RPL and the Dijkstra's algorithm. We also analyzed the impact of the sink position and the network size on this path extension. [less ▲]

Detailed reference viewed: 139 (6 UL)
Full Text
Peer Reviewed
See detailEnergy-Efficient Rate-Adaptive Passive Traffic Sensing using Smartphones
Frank, Raphaël UL; Melakessou, Foued UL; Castignani, German UL

in Proceedings of the 12th Annual Mediterranean Ad Hoc Networking Workshop (MedHocNet 2013) (2013)

Detailed reference viewed: 178 (4 UL)
Full Text
See detailIERC Activity Chain 05 – IoT Privacy, Security and Governance
Baldini, Gianmarco; Peirce, Trevor; Handte, Marcus et al

in IERC Activity Chain 05 – IoT Privacy, Security and Governance (2013)

Internet of Things (IoT) is a broad term which indicates the concept of increasingly pervasive connected devices (embedded within, attached to or related to “Things”) supporting various applications to ... [more ▼]

Internet of Things (IoT) is a broad term which indicates the concept of increasingly pervasive connected devices (embedded within, attached to or related to “Things”) supporting various applications to enhance the awareness and the capabilities of users. The adoption of IoT essentially depends upon trust. Moreover this trust must be established and maintained with respect to a broad group of stakeholders otherwise IoT will face, to some degree or other, challenges which may restrict adoption scope or delay its timing. Without sufficient IoT security it is highly likely that some applications will more resemble the Intranet of Things rather than the Internet of Things as users seek to place their own proprietary protection barriers and thus frustrating broad interoperability. Many of the device connections to the Internet today more closely resemble the Intranet of Things which differs dramatically from the vision for the Internet of Things, the latter being a much more open and interoperable environment allowing in theory the connection with many more objects and, with their multiple IoT compatible devices. One specific challenge within IoT is the control exercised over information collected by increasingly small and pervasive mobile devices, like RFID or future micro-nano sensors which can be ingested, implanted, worn or distributed elsewhere within the environment. In most cases, such devices have the capability of being wireless connected and accessible at all times and by anyone. In this context, the challenge is to ensure that the information collected and stored by the devices should be visible and distributed only by those legally permitted and authorized, acknowledging that permissions and authorizations may change throughout a devices or objects life or lives. This element of IoT represents one of a number of perceived and real concerns which are grouped under the title of IoT privacy. One aspect which often gets overlooked particularly frequently by those of us who entered adulthood before the year 1990 is the importance of the virtual-world. The Internet is a virtual environment. IoT is capable of establishing an important new bridge between the real and virtual-worlds. This bridge is likely to grow and become more relevant to the lives of citizens in the future allowing real-world augmentation of virtual-worlds and conversely allow the virtual-world to be enhanced by real-world information. Noteworthy is that IoT devices may be real or, virtual or, include aspects of both, either instantaneously or one or the other over a device’s or thing’s lifetime. IoT not only supports the exchange of information it nourishes the creation of greater automation. When IoT delivers this automation often reference is made to “smart” e.g. smart-city, smart-healthcare, etc. Trusted IoT therefore extends to confident and appropriate outcomes and not only the aggregation of clear dependable and timely information. Similar such “smart” automation has been widely used for investment banking transactions which has shown how a small change can cause an almost instantaneous and unstoppable global avalanche of stock values which was neither intended nor justified and resulting in severe penalties for a large number of stakeholders. IoT and “smart” applications effects need careful consideration and possibly some form of permanent monitoring to identity potential risks and oversee the development and introduction of suitably appropriate measures. A future IoT governance model has a role in overseeing such measures are put in place to protect IoT users and reinforce trust and confidence in “smart” applications. This chapter provides an overview of how the FP7 projects iCore, BUTLER, GAMBAS and IoT@Work within IERC Activity Chain 05 have approached IoT – security, privacy and governance. [less ▲]

Detailed reference viewed: 647 (4 UL)
See detailNARVAL SCILAB TOOLBOX: Network Analysis and Routing eVALuation
Melakessou, Foued UL; Engel, Thomas UL

in Abstract book of 2012 International Workshop on Scilab & OW2 (IWSO) (2012)

Network Analysis and Routing eVALuation 2.0 referenced as NARVAL has been designed on top of the Scilab environment. It has been created at the University of Luxembourg within the Interdisciplinary Centre ... [more ▼]

Network Analysis and Routing eVALuation 2.0 referenced as NARVAL has been designed on top of the Scilab environment. It has been created at the University of Luxembourg within the Interdisciplinary Centre for Security, Reliability and Trust (SnT). The Centre carries out interdisciplinary research and graduate education in secure, reliable, and trustworthy ICT systems and services. This module is focusing on the analysis of network protocols. The main goal of this toolbox is to provide a complete software environment enabling the understanding of available communication algorithms, but also the design of new schemes. NARVAL permits to generate random topologies in order to study the impact of routing algorithms on the effectiveness of transmission protocols used by data communications. The target audience includes academics, students, engineers and scientists. We put some efforts to build detailed help files. The description of each function has been carefully done in order to facilitate the end users' comprehension. The module is self-sufficient as it does not depend on other internal/external Scilab toolboxes. NARVAL is running on the current release Scilab 5.3.3. We decided to create a specific classification according to the goal of each function: NARVAL_D_* (topology Discovery), NARVAL_F_* (general Functions), NARVAL_G_* (Graph), NARVAL_IP_* (Image Processing), NARVAL_I_* ( Internet traffic), NARVAL_M_* (Mobility), NARVAL_P_* (Peer-to-Peer), NARVAL_R_* (Routing), NARVAL_S_* (Security), NARVAL_T_* (Topology generation) and NARVAL_W_* (Wireless Sensor Network). This work was carried out as part of the EU FP7 BUTLER project (http://www.iot-butler.eu). [less ▲]

Detailed reference viewed: 502 (8 UL)
Full Text
Peer Reviewed
See detailA Multiplicative Law of Network Traffic and Its Consequences.
Melakessou, Foued UL; Sorger, Ulrich UL; Suchanecki, Zdzislaw UL

in Acta Physica Polonica B (2009), 40(5), 1507-1525

Detailed reference viewed: 97 (0 UL)
Full Text
Peer Reviewed
See detailHow Can Route Diversity Improve the Internet Traffic?
Melakessou, Foued UL; Sorger, Ulrich UL; Suchanecki, Zdzislaw UL

in ECTI Transactions on Electrical Engineering, Electronics, and Communications (2008), 6(2), 93105

Detailed reference viewed: 102 (0 UL)
Peer Reviewed
See detailHow Can Path Diversity Help Transmission Protocols in the Achievement of a Better Connection Qos?
Melakessou, Foued UL; Sorger, Ulrich UL; Suchanecki, Zdzislaw UL

in Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications AICCSA'08 (2008)

Detailed reference viewed: 138 (0 UL)
Full Text
Peer Reviewed
See detailRoute Diversity: A Future For Transmission Protocols
Sorger, Ulrich UL; Melakessou, Foued UL; Suchanecki, Zdzislaw UL et al

in Proceedings of the 2007 Fourth International Conference on Broadband Communications, Networks and Systems BROADNETS 2007 (2007)

Detailed reference viewed: 148 (0 UL)
Full Text
Peer Reviewed
See detailOn The Road Towards The Comprehension Of The Internet Traffic Behavior: Simulation And Analysis Of An End-To-End Connection With NS-2
Sorger, Ulrich UL; Melakessou, Foued UL; Suchanecki, Zdzislaw UL

in Abstract book of 10th Communications and Networking Simulation Symposium CNS'07 (2007), (Proceedings of the 10th Communications and Networking Simulation Symposium CNS'07 Norfolk Marriott Waterside, Norfolk, VA, USA, March 25 - 29, 2007),

Detailed reference viewed: 105 (1 UL)
Full Text
Peer Reviewed
See detailMPTCP: Concept of a Flow Control Protocol Based on Multiple Paths for the Next Generation Internet 2007
Sorger, Ulrich UL; Melakessou, Foued UL; Suchanecki, Zdzislaw UL

in Proceedings of the 7th International Symposium on Communications and Information Technologies ISCIT'07 (2007)

Detailed reference viewed: 126 (2 UL)