PRESENTATION OF AN EFFICIENT AND SECURE ARCHITECTURE FOR GUILAN HEALTH INFORMATION NETWORK WITH SMART CARDS |
Author : Mohamad Nejadeh, Shahriar Mohamadi |
Abstract | Full Text |
Abstract : Nowadays a great number of activities are performed via internet. With increment in such activities, two groups of services are required for providing a secure platform: 1- Access control services, 2- communication security services. In this article we propose a secure and efficient system for establishment of secure communication in ehealth. This architecture focuses on five security indicators of authorization, authentication, integrity, non-repudiation and confidentiality. In this paper, we propose an authentication architecture that uses a strong, two factor authentication mechanism for the identification of Healthcare Users in the access to GHIN Portals. This architecture uses an efficient encryption scheme, which is a combination of the public key and the symmetric key encryption systems, all of which are combined with a log strategy. In this paper we have used a new role-based control model to provide the security requirement of authorization for user’s access to data. Data sensitivity is measured based on the labels given to the roles; and then these data are encrypted with proper cryptography algorithms. In a comparison of these architectures, you will see that this architecture enjoys an efficient mechanism, which is very suitable and practical for communication and interchange of data. |
|
DYNAMIC CHANNEL ESTIMATION FOR MIMO-CONSTANT ENVELOPE MODULATION |
Author : Ehab Mahmoud Mohamed, Osamu Muta, Hiroshi Furukawa |
Abstract | Full Text |
Abstract : The Multi-Input Multi-Output (MIMO)- Constant Envelope Modulation MIMOCEM is introduced as power and complexity efficient alternative to MIMO-OFDM for wireless backhaul networks. Due to a low resolution ADC (1-bit in the default operation) employed in the MIMO-CEM receiver, MIMO-CEM channel estimation is considered as one of the major challenges toward its real application. A block based adaptive channel estimator was proposed by the authors to estimate MIMO-CEM channel in static and quasi-static channel conditions. In this scheme, channel parameters are iteratively estimated by replicating the received preamble signals. In addition, to accurately estimate MIMO-CEM channel in presence of severe quantization errors caused by a low resolution ADC on the receiver side, the authors proved that Code Division Multiplexing (CDM) preambles transmission is effective in estimating MIMO channel state information. Although wireless backhaul channel is generally assumed to be static and quasi-static, it suffers from channel fluctuations in actual situation. Therefore, the objective of this paper is to present a decision directed channel estimation (DDCE) to track MIMOCEM channel fluctuation in high Doppler frequency conditions, and clarify the effectiveness of MIMO-CEM adaptive estimator in time varying channel conditions. The performance of proposed DDCE is compared with that of Pilot Assisted (PAS) linear interpolation dynamic channel estimation. For performance evaluations, different Doppler frequencies are assumed to prove the effectiveness of the scheme even in high channel variations. Simulation results prove that MIMO-CEM is applicable to dynamic channel conditions with various Doppler frequencies. |
|
AUTOMATIC REGISTRATION OF CEREBRAL VASCULAR STRUCTURES |
Author : Marwa Hermassi, Hejer Jelassi, Kamel Hamrouni |
Abstract | Full Text |
Abstract : In this paper we present a registration method for cerebral vascular structures in the 2D MRA images. The method is based on bifurcation structures. The usual registration methods, based on point matching, largely depend on the branching angels of each bifurcation point. This may cause multiple feature correspondence due to similar branching angels. Hence, bifurcation structures offer better registration. Each bifurcation structure is composed of a master bifurcation point and its three connected neighbors. The characteristic vector of each bifurcation structure consists of the normalized branching angle and length, and it is invariant against translation, rotation, scaling, and even modest distortion. The validation of the registration accuracy is particularly important. Virtual and physical images may provide the gold standard for validation. Also, image databases may in the future provide a source for the objective comparison of different vascular registration methods. |
|
A CONCEPTUALIZATION OF ORGANIZATIONS INVOLVED IN PRODUCT DESIGN: A FIRST STEP TOWARDS REASONING AND KNOWLEDGE MANAGEMENT |
Author : Yishuai Lin, Vincent Hilaire, Nicolas Gaud, Abderrafiaa Koukam |
Abstract | Full Text |
Abstract : The aim of this paper is to build an ontology of organizations. This ontology will be used to analyze, reason and understandorganizations. The targeted organizations are those composed of individualsinvolved in the design of a product and, to do so, following a design process. This ontology will be used to support knowledge managementwithin the described organizations. More specifically, the ontology willprovide means for reasoning, annotating resources, monitoring design processes, enabling searches and proactively proposing tips and proper content. The presented approach is based upon the use of an existing organizational metamodel, namely CRIO, already used for the description of Multi-Agent Systems (MAS) organizations. In our case, the concepts of this metamodel are used to model human activities. |
|
INTELLIGENT BUBBLE RECOGNITION ON CARDIAC VIDEOS USING GABOR WAVELET |
Author : Ismail Burak Parlak, Salih Murat Egi, Ahmet Ademoglu, Costantino Balestra, Peter Germonpre, Alessandro Marroni |
Abstract | Full Text |
Abstract : In cardiology, automatic recognition and image analysis still conserve computational challenges in terms of medical guidance and diagnosis. Bubbles or microemboli that circulate into cardiopulmonary system are considered suspicious for several medical problems such as decompression sickness, stroke and migraine. The aim of our work is to develop and assess an automatic approach to detect these bubbles that are analyzed manually by clinicians. In this paper, five different divers were examined in post decompression phase and their cardiac videos were recorded. Existent bubbles on the frames were also marked by two specialists in order to compare with our results. We developed our neural network architecture by integrating Gabor-Wavelet kernel which is commonly used in face and pedestrian recognition. The training phase of the network was performed using real bubble morphologies. Our recognition phase was achieved on four cardiac chambers through echocardiographic frames. Our correct detection ratio was between 77.6- 94.3%. We consider that our approach would be useful in longitudinal researches in hypobaric and hyperbaric environments and risky subjects with congenital defects. |
|
PRESERVING IDENTITY OF USERS IN SOCIAL NETWORK SITES BY INTEGRATING ANONYMIZATION AND DIVERSIFICATION ALGORITHMS |
Author : Sanaz Kavianpour, Zuraini Ismail, and Amirhossein Mohtasebi |
Abstract | Full Text |
Abstract : Currently, Social Networking Sites (SNSs) expand internet users’ relationships and their businesses. Despite the huge benefits gained by SNS users, the huge amount of information exchanged by different users makes SNSs an easy target for privacy threats. The goal of this paper is to explain how information disclosure to adversaries will be minimized by using integrated algorithm. This study takes the advantages of Kanonymity algorithm and ldiversity algorithm then evaluated the effectiveness of the combined strengths. The result shows that the proposed algorithm increases the level of privacy for SNSs users by anonymizing and diversifying disclosed information. |
|
HAPTICTRANSIT: TACTILE FEEDBACK TO NOTIFY PUBLIC TRANSPORT USERS |
Author : Ricky Jacob, Peter Mooney, Bashir Shalaik, Adam Winstanley |
Abstract | Full Text |
Abstract : To attract people to use public transport, efficient transit information systems providing accurate, real-time, easy-tounderstand information must be provided to users. In this paper we introduce HapticTransit, a tactile feedback based alert/notification model of a system, which provides spatial information to the public transport user. The model uses real-time bus location with other spatial information to provide feedback about the user as their journey is in progress. The system allows users make better use of „in-bus‟ time. It allows the user be involved with other activities and not be anxious about the arrival at their destination bus stop. Our survey shows a majority of users have missed a bus stop/station whilst undertaking a transit journey in an unfamiliar location. The information provided by our system can be of great advantage to certain user groups. The vibration alarm is used to provide tactile feedback. Visual feedback, in the form of colour coded buttons and textual description, is also provided. This model forms the basis for further research for developing information systems for public transport users with special needs – deaf, visually impaired and those with poor spatial abilities. |
|
ERADICATION OF POVERTY WITH THE USE OF ICT IN THE THIRD WORLD: BOTSWANA AS AN EXAMPLE IN SADC |
Author : Tiroyamodimo M. Mogotlhwane, Mohammad Talib, Malebogo Mokwena |
Abstract | Full Text |
Abstract : Penetration of information and communication technologies (ICTs) have managed to cover even some of the least developed nations. Mobile phones in particular have experienced phenomenal growth never witnessed before with earlier technological inventions. The internet, information and communication technology (ICT) services and increase in digitized content have led to interest in their role in improving economic livelihoods of people. Previous research or roles of ICTs on various aspects of human life was mainly carried out in developed countries. There is limited research on ICT services and content that focuses on the poor, particularly those that encourage entrepreneurship as a means to achieve poverty reduction in developing countries. This paper is using secondary data and document analysis from Botswana, a member country to Southern African Development Community (SADC), to find out how ICTs can be used in poverty reduction in developing countries. |
|
A METADATA EXTRACTION APPROACH FOR SELECTING MIGRATION SOLUTIONS |
Author : Feng Luan, Mads Nygard |
Abstract | Full Text |
Abstract : Preservation becomes an important infrastructural service for information systems. Many research works have done in past decades. The most popular preservation approach is migration, which transfers and/or transforms digital objects between two computers or two generations of computer technology. However, it is difficult for custodians to decide which migration solution should be chosen. This is because the migration selection depends on the old situation (e.g., digital objects, technical infrastructure and restriction rules) and the current situation (e.g., system requirements and organization requirements). Therefore, in order to obtain the old situation of an information system, we in this paper design a new solution to retrieve information about the old situation from stored metadata. The viability and efficiency of our approach are evaluated in an experiment, under which there are several sets of image files to be migrated. |
|
NEW PRACTICE IN ENGLISH READING COMPREHENSION IN ALGERIA |
Author : Samir Zidat, Mahieddine Djoudi |
Abstract | Full Text |
Abstract : The present article is divided into two interrelated sections. The first section starts with the presentation of language skills and reading comprehension. The second section is destined to the description and analysis of an experimental study that we conducted in our Computer Science Department with student of fifth year preparing the engineering degree. Reading comprehension was measured by performance on a set of comprehension abilities. The findings of the experiment reveal by the ANOVA's (ANalyse Of VAriance) method that from practical side, a true integration of computer/web in English language pedagogy can foster the learners' affective aspect of learning and incite the teacher to be an active of educational change. The paper concludes with some suggestions and recommendations necessary for the implementation of web/computer-based language learning in Algerian universities. |
|
AN EFFICIENT HIERARCHICAL DUAL CACHE SYSTEM FOR NAND FLASH MEMORIES |
Author : Jalil Boukhobza, Pierre Olivier |
Abstract | Full Text |
Abstract : NAND flash memories are the most important storage media in mobile computing and tend to be less confined to this area. Nevertheless, it is not mature enough to allow a widespread use. This is due to poor write operations' performance caused by its internal intricacies. The major constraint of such a technology is the reduced number of erases operations which limits its lifetime. To cope with this issue, state-of-the-art solutions try to level the wear out of the memory to increase its lifetime. These policies, integrated into the Flash Translation Layer (FTL), contribute in decreasing write operation performance. In this paper, we propose to improve the performance and reduce the number of erasures by absorbing them throughout a dual cache system which replaces traditional FTL wear leveling and garbage collection services. C-lash enhances the state-of-the-art FTL performance by more than an order of magnitude for some real and synthetic workloads. |
|
AN EVALUATIONOF LICENSE PLATE RECOGNITION ALGORITHMS |
Author : Hadi Sharifi Kolour, Asadollah Shahbahrami |
Abstract | Full Text |
Abstract : In the last decades vehicle license plate recognition systems are as central part in many traffic management and security systems such as automatic speed control, tracking stolen cars, automatic toll management, and access control to limited areas. There are many techniques for license plate detection. The goal of this paper is study and evaluate some most important LPD algorithms and compared them in terms of accuracy, performance, complexity, and their usefulness in different environmental condition. This evaluation gives views to the developers or end-users to choose the most appropriate technique for their applications. Our study and investigation show that the dynamic programming algorithm is the fastest and the Gabor transform is the most accuracy algorithm compared to other algorithms. |
|
VERIFYING SEMANTIC GRAPHS WITH THE MODEL CHECKER SPIN |
Author : Mahdi Gueffaz, Sylvain Rampacek, Christophe Nicolle |
Abstract | Full Text |
Abstract : The most frequently used language to represent the semantic graphs is the RDF (W3C standard for meta-modeling). The construction of semantic graphs is a source of numerous errors of interpretation. The processing of large semantic graphs is a limit to the use of semantics in current information systems. The work presented in this paper is part of a new research at the border between two areas: the semantic web and the model checking. For this, we developed a tool, RDF2SPIN, which converts RDF graphs into SPIN language. This conversion aims checking the semantic graphs with the model checker SPIN in order to verify the consistency of the data. To illustrate our proposal we used RDF graphs derived from IFC files. These files represent digital 3D building model. Our final goal is to check the consistency of the IFC files that are made from a cooperation of heterogeneous information sources. |
|
IMPLEMENTING TEST MANAGEMENT TRACEABILITY MODEL TO SUPPORT TEST DOCUMENTS |
Author : Azri Azmi, Suhaimi Ibrahim |
Abstract | Full Text |
Abstract : Documentation is one of the key quality factors in software development. However, many developers are still putting less effort and less priority on documentation. To them writing documentation during project development is very tedious and time consuming. As a result, the documentation tends to be significantly out-dated, poor quality and difficult to access that will certainly lead to poor software maintenance. Current studies have proved that the key point to this problem is software traceability. Traceability relates to an ability to trace all related software components within a software system that includes requirements, test cases, test results and other artefacts. This research reveals some issues related to current software traceability and attempts to suggest a new software traceability model that focuses on software test documentation for test management. This effort leads to a new software test documentation generation process model based on software engineering standards. |
|
CONCEPTION OF SERVICE OVER HETEROGENEOUS NETWORK, EXPERIMENTATION |
Author : Jawad Oubaha, Adel Echchaachoui, Ali Ouacha, Mohammed Elkoutbi |
Abstract | Full Text |
Abstract : Mapping between two heterogeneous networks, Multi Protocol Label Switching (MPLS) and IEEE 802.11e is choice of future technology as it has ability to perform traffic engineering and create the corresponds between LSP (Label Switch Path) and AC (Access Category). This paper discusses the mapping between IEEE 802.11 MPLS integration to achieve quality of service on MPLS networks. MPLS and 802.11e is very useful approach for today's internet to ensure the Quality of service the end to end. It talks about different approaches to map 802.11e Access Categories (AC) to Label Switched Path (LSP) and their advantages. It then introduces the concept of encapsulated LSPs to achieve future QoS, which requires further study to examine its practicability. |
|
STRUCTURED WIKI WITH ANNOTATION FOR KNOWLEDGE MANAGEMENT: AN APPLICATION TO CULTURAL HERITAGE |
Author : Eric Leclercq, Marinette Savonnet |
Abstract | Full Text |
Abstract : In this paper, we highlight how semantic wikis can be relevant solutions for building cooperative data driven applications in domains characterized by a rapid evolution of knowledge. We will point out the semantic capabilities of annotated databases and structured wikis to provide better quality of content, to support complex queries and finally to carry on different type of users. Then we compare database application development with wiki for domains that encompass evolving knowledge. We detail the architecture of WikiBridge, a semantic wiki, which integrates templates forms and allows complex annotations as well as consistency checking. We describe the archaeological CARE project, and explain the conceptual modeling approach. A specific section is dedicated to ontology design, which is the compulsory foundational knowledge for the application. We finally report related works of the semantic wiki use for archaeological projects. |
|
MOBILE AND WIRELESS ACCESS IN VIDEO SURVEILLANCE SYSTEM |
Author : Aleksandra Karimaa |
Abstract | Full Text |
Abstract : Wireless communication and mobile technologies are already well established in modern surveillance systems. Mobile-based client applications are commonly used to provide the basic access to camera video streams and other system resources. Camera site devices might connect to the system core by wireless links to address/overcome the environmental conditions. Finally, the surveillance systems themselves can be installed in portable environments such as busses or trains, which require wireless access for infrastructure and internet services, etc. However, we observe the growing popularity of mobile and wireless access solutions. The technology itself is evolving rapidly providing efficient transmission technology, feature-rich and powerful mobile and wireless devices. The users expect to have seamless access and tools where the functionality does not depend on access technologies or access devices. The same functionality is demanded from local client application and remote mobile browser. The aim of this paper is to explore access scenario where mobile and wireless access methods are used to provide enhanced client functionality. We analyze these scenarios, discuss the performance factors. |
|
Connectionist Propability Estimators in HMM Using Genetic Clustering Application for Speech Recognition and Medical Diagnosis |
Author : Lilia Lazli, Boukadoum Mounir, Abdennasser Chebira, Kurosh Madani, Mohamed Tayeb Laskri |
Abstract | Full Text |
Abstract : The main goal of this paper is to compare the performance which can be achieved by five different approaches analyzing their applications’ potentiality on real world paradigms. We compare the performance obtained with (1) Multi-network RBF/LVQ structure (2) Discrete Hidden Markov Models (HMM) (3) Hybrid HMM/MLP system using a Multi Layer- Perceptron (MLP) to estimate the HMM emission probabilities and using the Kmeans algorithm for pattern clustering (4) Hybrid HMM-MLP system using the Fuzzy C-Means (FCM) algorithm for fuzzy pattern clustering and (5) Hybrid HMM-MLP system using the Genetic Algorithm (AG) for genetic clustering. Experimental results on Arabic speech vocabulary and biomedical signals show significant decreases in error rates of hybrid HMM/MLP/AG pattern recognition in comparison to those of other research experiments by integrating three types of features (PLP, log-RASTA PLP, JRASTA PLP) were used to test the robustness of our hybrid recognizer in the presence of convolution and additive noise. |
|
TOWARDS THE USE OF A COMPUTING ONTOLOGY: A CURRICULA MANAGEMENT SYSTEM PROPOSAL |
Author : Adelina Tang |
Abstract | Full Text |
Abstract : Semantic Web components are proposed to develop a Computing Curricula Management System. Such a system is envisaged to alleviate the labour-intensive and time-consuming activities that are involved in curricula development, maintenance and management. Emphasis is placed on the outcomes-based approach to curricula development. An ontology is used as a knowledge source that can be used to interact with a curricula wiki facility through ontological agents. The ontology is created with the Protégé Ontology Editor, whereas the major features of the agents are designed according to the MAS-CommonKADS Agent Oriented Methodology. However, manipulation of the completed Computing Ontology is found to be limited. As the ontology could be viewed as a Resource Description Framework document that is editable using OWL-DL, access and manipulation of the ontological objects and relationships could then be conducted through an Application Programming Interface that is yet to be developed. This article examines the potential of doing so and concludes with a discussion of the resulting contribution, limitation and future work. |
|
DOCFLOW: AN INTEGRATED DOCUMENT WORKFLOW FOR BUSINESS PROCESS MANAGEMENT |
Author : Boonsit Yimwadsana, Chalalai Chaihirunkarn, Apichaya Jaichoom, Apichaya Thawornchak |
Abstract | Full Text |
Abstract : Document management and workflow management systems have been widely used in large business enterprises to improve productivity. However, they still do not gain large acceptance in small and mediumsized businesses due to their cost and complexity. In addition, document management and workflow management systems are often used separately because they solve different problems. Only some part of document management systems should be tied together with workflow management systems. However, in most business environment, documents actually flow according to workflow definitions. Our work, thus, combines the two concepts together and simplifies the management of both document and workflow to fit business users. Our application, DocFlow, is designed with simplicity in mind while still maintaining necessary workflow and document management standard features with security. Approval mechanism is naturally included in the workflow, and the approval can be performed by a group of actors such that only one of the team members is sufficient to make the group's decision. A case study of news publishing process is shown to demonstrate how DocFlow can be used to create a workflow that fits the news publishing process. |
|
RECOGNITION OF PLANT LEAVES USING THE DENDRITIC CELL ALGORITHM |
Author : Esma Bendiab, Mohamed Kheirreddine Kholladi |
Abstract | Full Text |
Abstract : In this paper, we propose a new approach of plant classification based on leaves recognition. The approach uses the dendritic cell algorithm, from the danger theory, as a classifier and the wavelet transform as a features space. The dendritic cell algorithm is a new immune inspired paradigm. It has demonstrates a potential proprieties as a classifier. As for the wavelet transform, it provides a powerful tool to capture localized and attractive features for texture classification. The experimental results about the data set leaf images show that the method is feasible and it gives an interesting recognition rate. |
|
AVOIDING QUALITY OSCILLATIONS DURING ADAPTIVE STREAMING OF VIDEO |
Author : Wassim Ramadan, Eugen Dedu, Julien Bourgeois |
Abstract | Full Text |
Abstract : A high number of videos, encoded in several bitrates, are nowadays available on Internet. A high bitrate needs a high and stable bandwidth, so a lower bitrate encoding is usually chosen and transferred, which leads to lower quality too. A solution is to adapt dynamically the current bitrate so that it always matches the network bandwidth, like in a classical congestion control context. When the bitrate is at the upper limit of the bandwidth, the adaptation switches constantly between a lower and a higher bitrate, causing an unpleasant oscillation (zigzag) in quality on the user machine. This paper presents a solution to avoid such oscillations. It uses an EWMA (Exponential Weighted Moving Average) value for each bitrate, which reflects its history. The evaluation of the algorithm shows that loss rate is much smaller, bitrate is more stable, and so received video quality is better. |
|
CONTENTION WINDOW OPTIMIZATION: AN ENHANCEMENT TO IEEE 802.11 DCF TO IMPROVE QUALITY OF SERVICE |
Author : Sedrati Maamar, Maamri Ramdane, Bilami Azeddine, Benmohammed Mohamed |
Abstract | Full Text |
Abstract : Wireless communication technology has gained widespread acceptance in recent years. Wireless Local Area Networks (WLANs) are becoming more and more popular and widely used, since they provide high data rates. The main characteristics of this technology are simplicity, flexibility and cost effectiveness. Recent applications include media streaming, interactive collaboration, videoconferencing and multimedia messaging. However, multimedia applications require a certain quality of service (QoS) support such as guaranteed bandwidth, reduced delay, high throughput and error rate. Guaranteeing those QoS requirements in the existing WLANs characterized by mobile stations with a low bandwidth and high rate error is a challenging task. Distributed Coordination Function (DCF) is the basic Medium Access Control (MAC) method. It is based on the Carrier Sense Multiple Access (CSMA) that works as Listen-before talk scheme. After collisions during competitive access to the channel in DCF scheme, packets must be retransmitted. These retransmissions consume enough bandwidth and increase the end-to-end delay for these packets. To address this, we propose to extend DCF with a new calculation method to increment contention window (CW) that enables each station to access the channel after a small number of attempts. Otherwise, it declares failure case early, if collision still occurs. The purpose of our scheme is to reduce delay and packet loss ratio and increase the efficiency of the transmission channel. To show the performance of the proposed solution, simulations were conducted under Network Simulator (NS2) to measure the traffic control and packet loss ratio under various constraints |
|