Beruflich Dokumente
Kultur Dokumente
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 1, January February 2013 ISSN 2278-6856
Highlighting commonalities and variabilities between cellular communication technologies via ontology mapping
Neji HASNI1, Ridha BOUALLEGUE2
1, 2
InnovCOM Lab, Higher School of Communications of Tunis, SupCom University of Carthage, Tunis, Tunisia.
1. INTRODUCTION
Architectures of cellular communication network technologies are becoming more diversified then before. They are structured in such a way that the introduction of new elements and services dramatically increase their complexity [4]. Several network technologies exist in mobile communication environment. Each technology brings along with it new features, which further contribute to the complexity of the network architectures. Besides, the management of the network elements is becoming fairly difficult and the network planning and maintenance expenses are also increasing exponentially. Essential problems to overcome and work around, are to some extent those problems manifested as challenges for architectures. Our research hypothesis is as follows: is it theoretically feasible to integrate a selected set of network technology architectures into a modular federation ontology in order to figure out their similarities and variabilities?
1. An investigation and identification of the essential characteristics (features) accounted for in the establishment of ontology for some samples of cellular communication network technologies (GSM, UMTS R 99, and LTE-Advanced). 2. The development of a feature model for each component forming the selected domain [5]. Then, the reasoning and the brainstorming about observations and information generated by feature models in order to select the commonalities and highlight the variabilities between the three cellular networks. 3. Building a detailed ontology (using essential characteristics at a finer level of granularity) for each cellular network technology [6]. 4. The design of a federation ontology integrating all the components already mentioned and classifying them by pattern of belongings [7]. The chosen components for this experience represent a succession of generations owned as property of the same family known as 3GPP (3rd Generation Partnership Project). GSM (Global System for Mobile) and UMTS R 99 (Universal Mobile Telecommunications System Release 99) are chosen as two of the most representative 2G (second generation) and 3G (third generation) technologies that are being deployed on a worldwide basis. Lte-advanced (Long term evolution Advanced) is the latest version of them and it is one of the top of the notch mobile technologies [8]. The federation ontology (O1), subject of figure 1, is a pilot one; it should be generic and non-proprietary. It will allow any cellular network technology to be integrated. The framework (ontology) will neither be established solely for use with a specific group of technologies, nor be implemented simply to support research work [7].
2. METHODOLOGY
Throughout this portion of investigation, the research work is going through the following steps: Volume 2, Issue 1 January - February 2013 Figure 1-- General structure of the federation ontology Page 18
Page 19
MSC
IMSI
IMEI
NAS GSM
Page 20
4. CELLULAR ANALYSIS
NETWORK
TECHNOLOGIES
4.2 Analysis of UMTS R 99 network architecture UMTS R 99 is the successor of GSM. It is a third generation (3G) mobile communication system. It has been standardized in several releases. The first version is - Release 99-. UMTS network can be divided into two parts. One part is responsible for the circuit switched services (CS-domain) and the other one manages the packet switched services (PS-domain). The CS-domain manages voice calls meanwhile the PS-domain is responsible for data connection like the connection from a mobile device to the internet [13]. UMTS introduces a new wireless access technology, namely the WCDMA. The major headlines for Release 99 are: Definition of the UMTS Universal Terrestrial Radio Access Network (UTRAN), The Radio Network Subsystem (RNS) is added to the existing GSM network, The general UMTS network architecture is modeled, at a high level, from both physical and functional viewpoints. The physical aspects are modeled using the domain concept and the functional aspects are modeled using the strata concept. A stratum: is a grouping of protocols related to one aspect of the services provided by one or several domains [14]. Figure 4 elucidates the global architecture of UMTS R 99.
The approach to developing a federation ontology starts by analyzing the architectures of the subset of technologies (GSM, UMTS R 99, and Lte-advanced), performing a domain analysis of them before building feature models one for each cellular network technology. 4.1 Analysis of GSM network architecture GSM is an abbreviation of Global System for Mobile Communication, originally known as Group Special Mobile. It is a second generation digital cellular system. It uses digital transmission rather than analog transmission. GSM networks use a combination of FDMA (Frequency Division Multiple Access) and TDMA (Time Division Multiple Access) [12]. The GSM network technology is composed of three functional entities operating with each other. These entities are called: the Network and Switching Subsystem (NSS), the Radio Subsystem (RSS), and the Operation Support Subsystem (OSS). Figure 2 shows the global architecture of the GSM network. However, for analysis and modularity purposes, the GSM network architecture is further divided into domains.
Figure 2--GSM network architecture [8]. GSMs protocol architecture is characterized by the presence of planes [12]: The user plane: contain the protocols for data transmission, and the control plane offers signalling for transmission supervision and establishment. Then, the management plane which allows the coordination between the two previous planes. The GSM protocol stacks are illustrated in the following figure 3: Figure 4--UMTS R 99 network architecture. UMTS R99 strata: A Stratum is a way of grouping protocols related to one aspect of services provided by one or several domains. Different UMTS strata are illustrated by figure 5 jointly with detailed description [15]:
Figure 3--GSM Protocol Stack [8]. Volume 2, Issue 1 January - February 2013
b) Lte-advanced control plane protocol architecture. Figure 7--Lte-advanced protocols achitecture. 4.4 Feature modeling Feature modeling is one of the most crucial and popular outcomes of the domain analysis techniques, which constructs variability and commonality in a domain. The output of feature modeling will be some reusable assets (components, patterns, etc.) represented as a feature diagram. However, feature modeling can be difficult and time-consuming without a precise understanding of its goals and the aid of practical guidelines [20]. Different domain analysis methods use the term feature with slightly different meanings. Feature-Oriented Domain Analysis (FODA) defines a feature as a prominent and distinctive user visible characteristic of a system. According to [21], common features among different products are modeled as mandatory features, while Page 22
Figure 8-- Feature model of GSM network technology. 4.3.2 UMTS R 99 feature modeling Defining a feature model for the UMTS R 99 network provides means to explore, identify, and define the key architectural aspects of this cellular network so that it would make it (the web) more explicit, comprehensible, and comparable with other networks. As shown in figure 9, the feature model is defined around concepts. The Volume 2, Issue 1 January - February 2013
Figure 10--Feature model of Lte-advanced network technology. 4.4 Federation ontology After performing a domain analysis using an in-depth investigation of three cellular network technologies (GSM, UMTS R 99, and Lte-advanced), we constructed an ontology for each component, and mapped between them, then we merged the three cellular network architecture ontologies together into one ontology O1 (federation ontology). The list of the essential features with their descriptions is presented in following table. Page 23
Feature NTA
Description Network Technologies Architecture (NTA) : for the purpose of this study, we choose: Global System for Mobile Communications (GSM) -a Second generation cellular technology based on both protocols: Frequency Division Multiple Access Analog technology (FDMA), and Time Division Multiple Access Digital technology (TDMA)-, UMTS (Universal Mobile Telecommunications System) -a third generation cellular technology based on Code Division Multiple Access technology (CDMA), and Lte-advanced (Long-term evolution-advanced) - a fourth generation cellular technology, based on Orthogonal Frequency Division Multiplexing technology (OFDM)-. However, this is a pilot study which may extended by integrating other network technologies architectures. The functional architecture of a system can be broadly divided into interfaces and their specified protocols. The main role of network interfaces or reference points interfaces is the connection between different domains. The interfaces interconnecting the functional elements of the core network. The Rx is the Diameter-based interface between an Application Function (AF), usually in a Proxy Call Session Control Function (PCSCF). The S1 interface connects the eNodeB to the EPC. It is split into two interfaces, one for the control plane and the other for the user plane. The reference point for the control plane protocol between the E-UTRAN and the MME. Reference point between MMEs for MME relocation and MME to MME information transfer. Reference point between MME and SGW. The S3 reference point is based on the legacy Gn interface. It lies between the SGSN and the MME where it enables user and bearer information exchanges for inter-3GPP access system mobility. The S4 reference point lies between the SGSN in the GPRS core network and the SGW. The reference point between the SGW and the PGW. It provides user plane tunneling and tunnel management between SGW and PDNGW. It is used for SGW relocation due to UE mobility and if the SGW needs to connect to a non-collocated PDNGW for the required PDN connectivity. The diameter-based reference point between the MME and the HSS. It enables transfer of subscription and authentication data. The SGi is Lte-advanceds version of the UMTSs Gi interface between the PGW and the Packet Data Network (PDN). The PDN may be an external public or private packet data network or an intra-operator packet data network. Interfaces Gc, Gr, Gf and Gs, which originate from the GPRS system. Interface between an SGSN and a BSS. Interface between the GGSN and the HLR. The Gf interface is defined between the SGSN and EIR. It is used by the SGSN to contact the EIR database during the identity check procedure. The Gi interface is a reference point in a GPRS Core Network. The Gi interface is IP based and serves as a reference point between the GGSN and the Public Data Network or PDN. Interface between the SGSN and the GGSN. It is an IP-based interface used to carry signalling and user data. Interface between the SGSN and the GGSN, in different PLMNs. Interface between the SGSN and the HLR. The interface between the SGSN and the MSC/VLR. The A interface is used to provide communication between the BSS and the MSC. The interface carries information to enable the channels, timeslots to be allocated to the mobile equipments being serviced by the BSSs. The messaging required within the network to enable handover is carried over the interface. Its primary functions: message transfer between different BSCs to the MSC. This is a BSS internal interface linking the BSC and a BTS, and it has not been totally
S4 S5
S4 S5
S6a SGi
S6a SGi
GPRS_I Gb Gc Gf Gi Gn Gp Gr Gs A
GPRS Interfaces Gb interface Gc interface Gf interface Gi interface Gn interface Gp interface Gr interface Gs interface A interface
Abis
Abis interface
Page 24
Air interface CCH Speech traffic channel Specific_UMTS _Interfaces Cu Iu IuCs-interface IuPs-interface Iur Yu Zu B interface C interface D interface E interface F interface G interface H interface Interfaces eUTRAN S1-U air interface
X2
X2
Protocols Access_Stratum
PHY
Physical layer
Non_Acc ess_Strat
Non_Access_Str atum
Page 25
C_P GMM
GMSC
Gateway Mobile Service Switching Centre Session Management. MM CC SMS SS Call forwarding unconditional
SM MM CC SMS SS CFU
CLIP
U_P GMM
Responsible for location management and Security. Involves the procedures and signalling for location updating. This protocol is a variant of the GPRS GMM protocol. UMTS and GPRS use the GSM MM (Mobility Management) protocol. Here, it is known as the GPRS MM protocol (GMM). The main function of the MM sub-layer is to support the mobility of user terminals, such as informing the network of its present location and providing user identity confidentiality. A further function of the GMM sub-layer is to provide connection management services to the different entities of the upper Connection Management (CM) sub-layer. Its services are similar to the GGSN as the gateway towards external circuit switched networks like other public land mobile networks (PLMNs) and integrated service digital networks (ISDNs)etc. The GMSC is responsible for collecting the location information and routing the call to the MSC through which the subscriber can obtain service at that instant. This protocol is a variant of the GPRS SM protocol. SM handles mobility issues such as roaming, authentication, selection of encryption algorithms and maintains PDP context. The protocols in the MM layer involve the USIM, MSC, VLR, and the HLR, as well as the AuC. It is a protocol that controls the establishment and release of circuit switched calls in the CN domain. Controls the delivery of short text messages to and from UEs. Protocol that controls the activation and deactivation of various call-related and non callrelated supplementary services. Permits a called subscriber to send incoming calls addressed to the called subscribers Directory Number to another Directory Number. If this feature is active, calls are forwarded regardless of the condition of the termination. CFU does not impact a subscribers ability to originate calls. Is a supplementary GSM service used to show the number of a caller.
GSMS
GSMS
SM
Session Management. Mobility Management Call Control Short Message Service Supplementary Service CFU
The functions that deal with issues of user-to-user information transfer and associated controls such as flow control and error control mechanisms. This protocol is a variant of the GPRS GMM protocol. UMTS and GPRS use the GSM MM (Mobility Management) protocol. Here it is known as the GPRS MM protocol (GMM). The main function of the MM sub-layer is to support the mobility of user terminals, such as informing the network of its present location and providing user identity confidentiality. A further function of the GMM sub-layer is to provide connection management services to the different entities of the upper Connection Management (CM) sub-layer. Its services are similar to the GGSN as the gateway towards external circuit switched networks like other public land mobile networks (PLMNs) and integrated service digital networks (ISDNs)etc. The GMSC is responsible for collecting the location information and routing the call to the MSC through which the subscriber can obtain service at that instant. This protocol is a variant of the GPRS SM protocol. SM handles mobility issues such as roaming, authentication, selection of encryption algorithms and maintains PDP context. The protocols in the MM layer involve the USIM, MSC, VLR, and the HLR, as well as the AuC. It is a protocol that controls the establishment and release of circuit switched calls in the CN domain. Controls the delivery of short text messages to and from UEs. Protocol that controls the activation and deactivation of various call-related and non callrelated supplementary services. Permits a called subscriber to send incoming calls addressed to the called subscribers Directory Number to another Directory Number. If this feature is active, calls are forwarded regardless of the condition of the termination. CFU does not impact a subscribers ability to originate calls. Is a supplementary GSM service used to show the number of a caller. Physical nodes which perform various functions to support communication services.
MM CC SMS SS CFU
Set of all the network entities, composed of: the access network domain, the entities closely
Page 26
BSS
BSS
BTS RN UTRAN
BTS RN UTRAN
EPC
HSS
HSS
HeNBG W
HeNBGW
PDNGW SGW
PDNGW The Serving Gateway Home_Network _Domain Eir Operational and Maintenance Center Domain IP Multimedia Subsystem
IMS
MGCF
Page 27
Consists of: MSC/VLR and GMSC. In general there are five databases: Home Location Register (HLR), Visitor's Location Register (VLR), Authentication Centre (AUC), Equipment Identify Register (EIR), Home Subscriber Server (HSS). The Home Location Register (HLR) is the main subscriber profile register, and contains all data related to a mobile subscriber. This data includes but is not limited to the following: the mobile subscribers identity, represented as the International Mobile Subscriber Identity (IMSI) (also stored in the SIM card), administrational information, service subscription and service specific data and location information. The Authentication Center (AuC) is a register that is logically part of the HLR. Authentication specific data for a given subscriber is stored in the AuC. It is responsible for storing the secret key of a subscriber. Other tasks of the AuC include the generation of authentication parameters needed for authentication and encryption, proving the identity of a subscriber and providing protection mechanisms for a subscribers SIM card. Logical entity storing the international mobile equipment identities (IMEIs). The Visitor Location Register (VLR) is a subscriber profile containing temporary information, and is distributed in the network according to geographical locations. The VLR along with the MSC are responsible for handling mobile subscribers visiting an area outside their home network. Certain administrational data is replicated in the VLR from the HLR in order to provide service provisioning and call control. Information about the visiting subscriber is retrieved from the HLR and stored in the VLR as a temporary record. Its services are similar to the GGSN as the gateway towards external circuit switched networks like other public land mobile networks (PLMNs) and integrated service digital networks (ISDNs)etc. The GMSC is responsible for collecting the location information and routing the call to the MSC through which the subscriber can obtain service at that instant. The Mobile Switching Center (MSC) is the switching node in the Network and Switching Subsystem that controls all MS connections. It provides telephony switching services to fixed and mobile networks. MSC controls mobile originated and mobile terminated CS call functions. The TRAU is a gateway between the RNC and the MSC that is responsible for the conversion of the format of speech data. This is necessary because UTRAN and CN use different formats. Consists of a serving general packet radio services (GPRS) support node (SGSN) and a gateway GPRS support node (GGSN). Gateway towards external packet switched networks like the internet, local area networks (LANs), wide area networks (WANs)etc. This entity was first developed with GPRS and its use has been carried over into UMTS network architecture. The SGSN provides a number of functions within the UMTS network architecture: mobility management, session management, interaction with other areas of the network The Transit Network (TN) domain which is the CN part between the SN and the remote party. Carry signal between eNodeB and PDN gateway. Is a set of communications standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network. Is the network of the world's public circuit-switched telephone networks. It consists of telephone lines, fiber optic cables, microwave transmission links, cellular networks, communications satellites, etc Elements the end user carries with him (the phone, the application, and the SIM or USIM embedded in an IC card.)
HLR
AuC
AuC
Eir VLR
Eir VLR
GMSC
GMSC
MSC
MSC
TRAU
TRAU
PSTN
PSTN
User_Equ ipment_D
User_Equipmen t_Domain
Page 28
Mobile_Equipm ent_Domain
TE SIM_Do main
The Mobile Equipment Domain (ME) is the actual mobile device a user uses to establish calls and other telephony services. The ME communicates with the radio channel and provides various services to the user of the mobile device. It is the terminal, excluding the User Subscriber Services Identity Module (USIM) and the Subscriber Identity Module (SIM). Mobile termination in the network of "B" is referred to when calls are routed to operator "B" via the network of operator "A", in order to be delivered to the end customer in the mobile network of "B". Contains the end-to-end application such as laptop. The Subscriber Identity Module (SIM) is located inside the ME and contains subscriber specific data. This data is used for identifying a subscriber to the network via the International Mobile Subscriber Identity (IMSI). Authentication specific data is also stored inside the SIM (e.g. algorithms, secret key), which are later used for key generation. Two security services are implemented for the SIM card. The first security mechanism for the SIM is access control, which controls a user from accessing the card and the information and services provided upon card access. This is provided via a secret Personal Identification Number (PIN), which the user has to enter before gaining access to the SIM. The second security mechanism provided is the network challenge and response mechanism described in section. A secret numeric password shared between a user and a system that can be used to authenticate the user to the system. A PUK code is required to unlock SIM cards that have become locked following three successive incorrect PIN entries. Storage area that allows messages to stay with the user even when the phone is changed.
The graphical representation of the ontology shown in the figure 11 is generated by the protg 4.1 tool with an active reasoner. It illustrates the SHFCC (Secure Holistic Framework for Cellular Communication). However, we are only interested in the branch of NTA (Ntework Technology Architecture) hierarchy.
protg 4.1 tool. The reader may notice that the metrics are part of the Secure Holistic Framework for Cellular Communication (SHFCC). Indeed, the federation ontology for cellular network technologies is a potential part of the SHFCC. Its metrics count for around 90 percent of the whole number of metrics. The second potential part of the SHFCC is an ontology for mobile phone operating systems.
4.4.1 Ontology metrics The federated ontology of the SHFCC is composed of classes (concepts), class axioms, object properties, object property axioms, datatype properties, datatype axioms, individuals, individual axioms, and annotations and their axioms. Figure 12 illustrates the federated ontology metrics generated by RacerPro reasoner added into Volume 2, Issue 1 January - February 2013
4.4.1.1
Classes
A class represents a concept. This latter is characterized by a name and a set of rules. Classes can be sub-classed or have sub-classes, together classes and sub-classes form a hierarchy. Thus, the following figure 13 illustrates general overview of the SHFCC ontologys class hierarchy (asserted and inferred hierarchy). Among these classes, figure the NTA (Network Technology Architecture) classes. The subclass inherits its characteristics from the super or parent class, and it may have one or more parent class. Multiple inheritances are supported. Ontology classes are very similar to classes in an object oriented program. An asserted hierarchy is a manually defined view of the ontology. When classifying an ontology with a resoner, this latter performs automatic computation of the defined ontology and creates an inferred hierarchy of the ontology model after reasoning has been performed. New information is deducted according to logic in the inferred model, and also classification checking is performed. The results of information deduction and classification, is the information that is displayed in the inferred condition/hierarchy/model. Asserted models have not undergone any kind of logical classification or reasoning.
Figure 14 feature model of high level network technology concepts. Consider the feature model of high level network technology concepts (figure 14), lets compute the following: All possible sets: Let N be the number of different sets represented by the Network Technology Architecture (NTA) feature model, all possible combinations of features presented in Figure 14 are detailed below: Set1 (S1) = {NTA, GSM, UMTS, Lte-adv} Set2 (S2) = {NTA, GSM, UMTS, Lte-adv, Newfeatures1} Set2 (S2) = {NTA, GSM, UMTS, Lte-adv, Newfeatures2} Set3 (S3) = {NTA, GSM, UMTS, Lte-adv, Newfeatures1, New-features2} The number (N) of sets for the feature model presented in figure 14 is N = 4. Homogeneity: Homogeneity indicates the degree to which a feature model is homogeneous [24]. According to [24] it is calculated as follows:
Figure 13--OWL Viz asserted and inferred SHFCC ontology hierarchy generated by RacerPro. 5. EVALUATION OF THE RESULTS The work results are evaluated from two different angles: We tested the degree to which the feature model of the network technology architecture is homogeneous, the commonalities between the different sets made from all possible combination of features, the flexibility of the NTA feature model, and the degree of orthogonality between NTA feature tree and any of its subtrees (represented by its root feature) [23]. Volume 2, Issue 1 January - February 2013
n is the number of unique features in one set and N is the number of sets represented by the NTA feature model. The range of this indicator is [0, 1]. If all the sets have unique features, the indicator is 0 (lowest degree of homogeneity). If there are no unique features, the indicator is 1 (highest degree of homogeneity).
Commonality: Commonality is the percentage of features or set of features that exist in the holistic feature model whatever combination is made. As an example, consider the partial configurations described below and the feature model in figure 14: The commonalities of possible configurations are calculated as follows: Page 30
The range of this indicator is [0, 1]. Configuration C1, C2, and C3 appear in 100% of the functional sets whereas C4 and C5are included only in 25% of them. Variability factor: This operation takes a feature model as input and returns the ratio between the number of sets and 2n where n is the number of features considered. In particular, 2n is the potential number of products represented by a feature model assuming that any combination of features is allowed. The root and non-leaf features are often not considered. The variability of the feature model (figure 14) is taking into account only leaf features: 0, 03 Degree of orthogonality: Czarnecki et al. [25] defines the degree of orthogonality as the ratio between the total number of sets of the feature model and the number of sets of the subtree. Only local constraints in the subtree are considered for counting the sets. For instance, the formula below shows the degree of orthogonality for the subtrees GSM, UMTS, and LteAdvanced presented in figure 14.
Where sim means similarity, C3 is the LCS of C1 and C2. A is the number of nodes on the path from C1 to C3. B is the number of nodes on the path from C2 to C3. X is the number of nodes on the path from C3 to root.
Figure 15. Wu and Palmer similarity measure Another similarity measurement method is ProxiGna. It is the short form of the French words (Proximit Gnalogique). It means close Pedigree. This method is inspired from the family tree principal. The similarity between two concepts is treated as proximity between two family members. To show how to use it, Figure 16 illustrates a sample ontology tailored to this purpose. The similarity of two elements depends on the organization of concepts in the hierarchy. It is evident that the choices made during the construction of the hierarchy of concepts influence the value of similarity.
The range of this indicator is (0, ). A high degree of orthogonality indicates that decisions can be taken locally without worrying about the influence in the configuration of other parts of the tree [25]. After mapping between the three ontologies: GSM ontology, UMTS R 99 ontology, and Lte-Advanced ontology, we proceed by the use of Wu & Palmer measure and ProxiGna technics [26] and [27] to evaluate the results of similarities between concepts. Both methods were originated from the field of semantic research. They are largely based on the similarity measures between concepts in ontologies. Note that our similarity Volume 2, Issue 1 January - February 2013 Figure 16 Sample ontology for demonstration purposes (after [27]). Gen (M) is the set of concepts that enter in the concept genealogy of M, from the root node until M Gen (M) = {A, B, D, H, M Ancestors (L, M) are the set of common ancestors of L and M concepts.
Page 31
Figure 28. Similarity measurement of the ontology concepts with ProxiGna method.
6. VALIDATION
Recall that the research hypothesis (presented in the introduction) call for determining the theoretical feasibility of using federation ontology to integrate the cellular communication network technologies. The overall approach to providing evidence confirming this hypothesis was to apply the ontology to three network technologies and then observe how the domain will be clear in unambiguous way. Throughout this tentative, just theoretical feasibility evidence is established. There are two main purposes behind that: First, the effort advocated to substantiate technical feasibility of the federated ontology by actually integrating all existing cellular network technologies is a massive burden, require huge effort. Second, the ontology is still in research phase or is considered as an area for future research.
7. CONCLUSION
The organization mode of the unstructured and nonformal cellular communication networks knowledge is hampering its sharing. How to make this knowledge reused and be shared in order to achieve tangible understandability is still a challenging problem that the telecommunication and knowledge engineers have been facing. The way to address this problem (the lack of shared understanding, poor communication, and disparate modeling methods) is by reducing or eliminating conceptual and terminological confusion and coming to a shared understanding. Such shared understanding can function as a unifying framework for different viewpoints and serve as the basis for communication between people involved in the domain.
Figure 17. Similarity measurement of the ontology concepts with Wu and Palmer method.
Page 32
Ridha Bouallegue (M98) received the Ph.D degrees in electronic engineering from the National Engineering School of Tunis. In 2003, he received the Hd.R degrees in multiuser detection in wireless communications. Since 1990 he has been a graduate Professor at the higher school of communications of Tunis (SUPCOM), From 2005 to 2008, he was the Director of the National engineering school of Sousse. In 2006, he was a member of the national committee of science technology. Up to now, he is the director of the InnovCOM research lab (telecommunication). From 2005 to this date, he is a member of the scientific committee for thesis validation and Hd.R at the Tunisian national school of engineering. His research interests include wireless and mobile communications, OFDM, space-time processing for wireless systems, multiuser detection, wireless multimedia communications, and CDMA systems...
Page 34