RAWSN 2014 The 2nd International Workshop on RFID and Adaptive Wireless Sensor Networks: Mobility, Security, Localization and Applications

To be held in conjunction with the International Conference on NETworked sYStems May 15-17, 2014, Marrakech, Morocco. (NETYS’2014 http://www.netys.net) Adaptive mobile distributed applications require more and more tiny mobile components linked through wireless connections. In this vision we found two categories of applications using either Wireless Sensor Networks (WSN) equipment’s or RFID technology. This workshop aim to address hot topics related to these two technologies namely WSN and RFID. WSNs allow the development of numerous applications in various domains, such as security and surveillance, environment protection, e-health, precision agriculture, intelligent transportation, homecare of elderly and disabled people, etc. Communication in such WSNs has to cope with limited capacity resources, energy depletion of sensor nodes, important fluctuations of traffic in the network, changes in the network topology (radio link breakage, interferences ...) or new application requirements. The workshop promotes the applications of new methodologies in this field with the aim of providing the participants with advanced and innovative tools able to catch the fundamental dynamics of the underlying complex interactions. It fosters the presentation of new cooperative protocols and new schemes for resources allocation and new adaptive applications to sensors networks. Radio Frequency Identification (RFID) technology enables the non-contact, automatic and unique identification of objects and people using radio waves. RFID technology has gained greater prominence and a higher level of adoption due to its recent advancements and decreasing costs across the years. The applications of RFID have vast potential in improving effectiveness and efficiency in solving industrial problems. RFID tags are placed on objects so that they can be uniquely identified. These objects in motion are traced throughout the supply chain from manufacturer’s shop floor, to warehouses, to retail stores. Such a visibility of accurate data brings opportunities for improvement and transformation in various processes, and allows a wide range of organizations to realize significant productivity gains and efficiencies. As the need for auto identification (auto-ID) systems becomes increasingly commonplace in many economic sectors, potential RFID applications include security (RFID enabled passports), e-business (RFID enabled credit cards), e-cash (RFID enabled bank notes) and automated supply chain management. However, there are significant research challenges that still need to be addressed before the widespread adoption of RFID systems. The main purpose of this workshop is to serve as a forum that brings together RFID and Wireless Sensor Networks’ researchers and practitioners from academia and industry to discuss recent developments in RFID and WSN technologies. This workshop will provide a forum to exchange ideas, discuss solutions, and share experiences among researchers and professionals from industry and academia. Papers describing original research on both theoretical and practical aspects of Wireless Sensor Networks and RFID technologies for pervasive computing are solicited.

Topics of Interest Original contributions in RFID and Adaptive Wireless Sensor Networks are solicited in, but not limited to, the following directions:  Energy management in wireless Sensor networks  Adaptive sensor networks  Sensor network deployment  Sensor networks with mobile elements  Cross-layer architectures  Intelligent sensor nodes  RFID and sensors: Middleware and software tools  Sensor-based systems and applications  QoS and dynamic bandwidth allocation in sensor networks,  Component generation and dynamic adaptation of the application.  Performance Evaluation and Modeling in Wireless Sensors Network and RFID  RFID and sensors channel measurements and modeling  RFID Localization techniques and algorithms in RFID tag and reader localization  Security Standards, Frameworks and Protocols for RFID  Security in mobile sensor and RFID systems



Specific application contexts with a scientific focus (e.g., healthcare, hospital, military, supply chains)

Paper Submission Papers should contain original material and not be previously published or currently submitted for consideration elsewhere. Manuscript (not to exceed 5 double-column IEEE formatted pages, including figures, tables, and references (http://www.ieee.org/conferences_events/conferences/publishing/templates.html )). At least one author of each accepted paper must register at full registration rate. An oral presentation at the workshop is strictly required. Failure to present the paper at the workshop will result in the withdrawal of the paper from the Proceedings. If you have any questions about paper submissions or the program, please contact any of the listed Program Chairs

Submission link: https://www.easychair.org/conferences/?conf=rawsn2014 Important dates: Paper submissions April 6, 2014 (hard deadline) Acceptance Notification: April 30, 2014 Camera-Ready: May 07, 2014 Workshop Chair Abdelatif Kobbane, ENSIAS, Mohammed V-Souissi University, Morocco Workshop Co-Chairs Khalil Ibrahimi, Faculty of Sciences, Ibn Tofail University, Morocco Amal Tmiri, Faculty of Sciences, Chouaib Doukkali University, Eljadida, Morocco Technical Program Committee Cedric Adjih, INRIA, France Giuliana Alserisi, University of Catania, Italy Mouna Ayari, CRISTAL, Tunisia Leila Azouz Saidane, ENSI, Tunisia Mostafa Belkasmi, ENSIAS, Mohammed V – Souissi University, Morocco Jalel Ben-Othmane, Paris 13, France Imade Belallam, INSIA, Rabat, Morocco Abdelhamid Belmekki, INPT Mohammed Boutabia, UIC, Casablanca, Morocco Halima Elbiaze, University of Quebec, Montreal Abdelaziz Elhibaoui, Faculty of Sciences, Tetouan, Morocco Mohamed El Kamili, Sidi Mohammed Ben Abdellah University, Morocco Mohammed Elkoutbi, ENSIAS, Morocco Mohammed Erradi, ENSIAS, Morocco Mohammed Essaaidi, ENSIAS, Mohammed V – Souissi University, Morocco Mohammed Ettolba, INPT Redouane Ezzahir, ENSA, Agadir Ayoub Fouad, CRMEF, Kenitra, Morocco Hicham Ghennioui, FST, Fez My Lahcen Hasnaoui, FSDM, Fez Hanen Idoudi, ENSI, Tunisia Ismail Khriss, Quebec University at Rimouski, Canada Moahammed-Amine Koulali, ENSAO, Mohammed Premier University, Morocco Sujit Koumar Samanta, Indian Institute of Technology, India Ines Korbi, CRISTAL Lab, Tunisia Lucia Lo Bello, University of Catania, Italy Pascale Minet, INRIA, France Orazio Mirabella, University of Catania, Italy Lynda Mokdad, University of Paris-Est, Creteil,France Zouheir Rezki, KAUST University Soudi Arabia Rachid Saadane, EHTP, Casablanca, Morocco Essaid Sabir, ENSEM, Morocco Aziz Salah, Quebec University at Montreal, Canada Mohammed Senhadji, ENSIAS, Mohammed V – Souissi University, Morocco Gaetano Patti, University of Catania, Italy Tarik Taleb, NEC Germany Hamidou Tembine, SupElec, Paris, France

RAWSN 2014

of new methodologies in this field with the aim of providing the participants with ... Energy management in wireless Sensor networks ... Program Chairs.

338KB Sizes 4 Downloads 305 Views

Recommend Documents

RAWSN 2014
International Workshop on RFID and Adaptive Wireless Sensor Networks: Mobility ... Radio Frequency Identification (RFID) technology enables the non-contact, ...

[ March 13, 2014 ] [No. 30 s. 2014] CONSTITUTING THE 2014 ...
[ March 13, 2014 ] [No. 30 s. 2014] CONSTITUT ... HOOL REPAIR-REHAB UNDER SCHOOL MOOE FUND .pdf. [ March 13, 2014 ] [No. 30 s. 2014] CONSTITUT .

JUNE 2014
THE PEORIA CATHOLIC HIGH SCHOOL PARENT NEWSLETTER .... “Geniverse is free, web-based software for high school Biology that engages students in ...

Jun 2014
The Board selects Comerica Bank as its financial institution. b. The Board ... regulations as published in the MHSAA's BULLETIN and current. HANDBOOK and shall .... of a term note (the “Note”) which will be financed in compliance with the ...

December 2014
conversion of one isomer into another. (vii) The separation of liquid ... (vii) MAP of minimally processed foods. 5. (a) Discuss the functional properties and food.

2014. 02. March 2014.pdf
office would be able to build capacities at the. grassroots level. ... EDITORIAL STAFF. Sarah Bautista □ Maria Celina Bernardo .... March 2014.pdf. 2014. 02.

2014 - AnnualReports.com
The Galileo project and the social media platform have been embraced by employees, and project ... social media platform were implemented in fiscal 2014 and will continue to be ...... Operating leases. Finance leases. Total. 2015. 57.6. 0.6. 58.2. 20

SYRCoSE 2014
software engineering. The topics of interest include but are not restricted to: • Software Development Processes. • Object-Oriented Analysis and Design.

June 2014
Term-End Examination. June, 2014. MVP -002 : PG ... (iii) Warehousing. (iv) Tariff Value. ... under this Act. (b) Discuss 3 categories of licences which were 3+2=5.

June 2014
BACHELOR OF COMPUTER APPLICATIONS. Cr). (PRE - REVISED) cr). Term-End Examination. June, 2014. CS- 74 : INTRODUCTION TO INTERNET.

2014 - AnnualReports.com
!ndigo Enrich Your Life, Chapters, !ndigo, Coles and indigo.ca are trade marks ... strong performing titles, this year was one in which we had no single breakout book. .... to high-needs elementary schools across the country through donations.

Jun 2014
Motion: BE IT RESOLVED that the Public School Academies of Detroit approves the agenda as presented and approves the Minutes from the April 17, 2014 ...

June 2014
1863. AFW-1(E)/BHDA-101/AFW-1(H). Total No. of Questions : 5+5]. [Total No. of Printed Nes 4. BACHELOR'S DEGREE PROGRAMME. Term-End Examination.

June 2014
some school level activities, which can be infused with this model. ... (741-.A-1-.74.fl t di-19114-14' c11. 3111.Tffi-dT (effectiveness). cRc;tiul f\R! MESE-062. 4 ...

June 2014
4. (b) Find the components of 0 under the usual metric. 2. (c) State Monotone Convergence Theorem. Verify the theorem for {fn) where fn : R —> R is defined by.

June 2014
CS-75 : INTRANET ADMINISTRATION. Time : 2 hours ... (a) What is WAP (Wireless Application 5 protocol) ? ... (c) What is Virtual Private Network ? Explain. 5.

December 2014
13-11 (Chow) IT N1111 "WE. 31-T471 fa-lk 3117 pit 41IIM #9417T. 7L- F. 4R.nr,fra af-d-rfff 71--k. -FT. 8. ralcil -14. HMO yi=f3xi+cit. 12. MW111 Gre2 t I 1:Tri rilr\IR.

SYRCoSE 2014
Software Development and Analysis Tools. • Software Engineering Education. Paper Submission. We accept papers authored by students, PhD students or ...

June 2014
annual turnover of the company is around. Rs. 150 crores and its capacity ... the accident occurred during and in the course of employment, the Management ...

June 2014
CS-612 : PC SOFTWARE APPLICATION SKILLS. Time : 2 hours. Maximum Marks : 60 ... features of any one search engine. 4. (a) What is a Chart Wizard ?

June 2014
Jun 1, 2014 - (f) Tools for educational monitoring and evaluation. 4. Answer the following question in about. 600 words. Autonomy and accountability are like ...

June 2014
Jun 1, 2014 - (f) Tools for educational monitoring and evaluation. 4. Answer the following question in about. 600 words. Autonomy and accountability are like ...

June 2014
1863. AFW-1(E)/BHDA-101/AFW-1(H). Total No. of Questions : 5+5]. [Total No. of Printed Nes 4. BACHELOR'S DEGREE PROGRAMME. Term-End Examination.

June 2014
4. (b) Find the components of 0 under the usual metric. 2. (c) State Monotone Convergence Theorem. Verify the theorem for {fn) where fn : R —> R is defined by.