2014 Third IEEE International Colloquium in Information Science and Technology (CIST)最新文献

筛选
英文 中文
Towards formal verification of business process using a graphical specification 使用图形化规范对业务流程进行正式验证
Outman El Hichami, Badr Eddine El Mohajir, Mohammed Al Achhab, Ismail Berrada, Rachid Oucheikh
{"title":"Towards formal verification of business process using a graphical specification","authors":"Outman El Hichami, Badr Eddine El Mohajir, Mohammed Al Achhab, Ismail Berrada, Rachid Oucheikh","doi":"10.1109/CIST.2014.7016587","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016587","url":null,"abstract":"Bringing a high confidence to the validity of business processes is one of the prevailing themes in business process management. This paper deals with the integration of the formal verification techniques of business process (BP) in the design phase. The main objective of this paper is to propose a user-friendly graphical interface that business experts can use to specify the right dynamic behaviors of BP. In order to achieve this purpose, we use the graphical notation of BPMN (Business process modeling notation) for modeling BP. The graphical interface proposed uses the same notations as those used in BPMN. In this way, the designer can automatically and intuitively validate constraint specifications on designed processes at this early stage. Several formal semantics for these properties are given and a verification approach is then proposed.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116653995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A new hybrid approach for constructing the concept map based on fuzzy prerequisite relationships 一种基于模糊前提关系的概念图混合构造方法
Ali Aajli, K. Afdel
{"title":"A new hybrid approach for constructing the concept map based on fuzzy prerequisite relationships","authors":"Ali Aajli, K. Afdel","doi":"10.1109/CIST.2014.7016604","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016604","url":null,"abstract":"In recent years, adaptive learning systems rely increasingly on concept maps to customize the educational logic developed in their courses. Most approaches do not take into account the possibility of combining the concept maps predefined by experts of field and those developed automatically using the Fuzzy Sets Theory. In this article, we present a hybrid approach using on the one hand the feedback from experts of domain to select, prioritize relevant concepts and create prerequisite relationships to get the initial concept map, on the other hand we use the fuzzy logic to measure relevance degree of all relationships existing in this concept map, these links are considered as fuzzy relationships. With this approach we got two types of prerequisite relationships between concepts, the first type can be classified as relationships correctly established by the expert. These relationships must be kept in the final concept map. The second type can be considered as relationships incorrectly established by the expert, because the concepts involved in these relationships are independent, in this case these relations must be deleted or substituted with the inverse of the original relations, or because the items used in evaluations of these concepts are inappropriate and must be reviewed.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116117343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Interactive simulation as a virtual tool in electromagnetics for online education 交互式仿真作为电磁学在线教学中的虚拟工具
Khalid Salmi, H. Magrez, A. Ziyyat
{"title":"Interactive simulation as a virtual tool in electromagnetics for online education","authors":"Khalid Salmi, H. Magrez, A. Ziyyat","doi":"10.1109/CIST.2014.7016617","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016617","url":null,"abstract":"Vision plays an important role in improving comprehension and perception of electromagnetic fields. One reason electromagnetic fields is considered by students to be a difficult course is because electromagnetic fields, being vector functions of space and time, unlike mechanics, which deals with concrete objects, are conceptually abstract and hard to visualize. Invisibility is a considerable obstacle on the way to understanding physical phenomena. To overcome this obstacle, we present in this paper some interactive simulations mainly developed for educational purposes in electromagnetics in order to facilitate the understanding of field theory and vector analysis. This interactive simulations can be used as a virtual laboratory where students can explore the solutions on their own efforts and in every detail, hence, deepening their understanding of the subject matter.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114768397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Image stitching based on the geometric solution 基于几何解的图像拼接
A. Laraqui, A. Saaidi, A. Jarrar, K. Satori
{"title":"Image stitching based on the geometric solution","authors":"A. Laraqui, A. Saaidi, A. Jarrar, K. Satori","doi":"10.1109/CIST.2014.7016643","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016643","url":null,"abstract":"Image stitching is used to combine multiple photographic images from camera network with overlapping field of view to produce panoramic view. With image stitching, the view is enlarged and the amount of information increases with the number of images that are stitched. In the existing methods, the whole images from the adjacent views are considered thus leads to increase in both time and computational complexity. In this paper, a new approach to stitch image using the geometric solution based on the regions to reduce time and computational complexity.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132529374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Internet of Things for healthcare monitoring: Security review and proposed solution 用于医疗监控的物联网:安全审查和建议的解决方案
A. Rghioui, Aziza L'aarje, F. Elouaai, M. Bouhorma
{"title":"The Internet of Things for healthcare monitoring: Security review and proposed solution","authors":"A. Rghioui, Aziza L'aarje, F. Elouaai, M. Bouhorma","doi":"10.1109/CIST.2014.7016651","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016651","url":null,"abstract":"The development of the Internet of Things will greatly facilitate the process of patient's diagnosis and monitoring, with small IP-based wireless sensors implemented on the patient's body, his physiological parameters, such as blood pressure and heart rate, can be monitored remotely and continuously. This scenario must absolutely respect the confidentiality and privacy of patient's medical information, only caregivers and authorized persons should possess the right to access these information. The security must be ensured throughout the healthcare application scenario. This paper presents a study of the potential security problems in this application, and proposes a security model as a solution. Our model is based on symmetric cryptography with a proposed key management system and network nodes authentication mechanism.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129978951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Collision detection for three dimension objects in a fixed time 三维物体在固定时间内的碰撞检测
M. Khouil, N. Saber, M. Mestari
{"title":"Collision detection for three dimension objects in a fixed time","authors":"M. Khouil, N. Saber, M. Mestari","doi":"10.1109/CIST.2014.7016625","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016625","url":null,"abstract":"This study aimed to propose, a different architecture of a collision detection neural network (DCNN). The ability to detect and avoid collision is very important for mobile intelligent machines. However many artificial vision systems are not yet able to quickly and cheaply extract the wealth information. This network, which has been particularly reviewed, has enabled us to solve with a new approach the problem of collision detection between two convex polyhedra in a fixed time (O (1) time). We used two types of neurons linear and threshold logic, which simplified the actual implementation of all the networks proposed. This article represents a comprehensive algorithm that determine through the AMAXNET network a measure (a mini-maximum point) in a fixed time, which allows us to detect the presence of a potential collision.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130008942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Neural network-based decision support system for pre-diagnosis of psychiatric disorders 基于神经网络的精神疾病预诊断决策支持系统
Yousra Bouaiachi, M. Khaldi, A. Azmani
{"title":"Neural network-based decision support system for pre-diagnosis of psychiatric disorders","authors":"Yousra Bouaiachi, M. Khaldi, A. Azmani","doi":"10.1109/CIST.2014.7016602","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016602","url":null,"abstract":"Psychiatric disorders are mental conditions affecting emotional, cognitive, affective and behavioral states and causing impairment and suffering. The early and accurate diagnosis of such disorders is crucial for recovery and improvement. Artificial Intelligence is extremely implicated in medical and clinical fields bringing efficient results and solutions. This paper introduces a psychiatric pre-diagnosis approach to simplify the modeling of a decision support system using neural networks. The choice of neural network as a decisional tool is made after a comparative study with Case-Based Reasoning. The efficiency of the pre-diagnosis neural network in our experiment reaches the accuracy of 90% in identifying some categories like psychotic disorders category.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130206407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multiple object detection using OpenCV on an embedded platform 在嵌入式平台上使用OpenCV进行多目标检测
Souhail Guennouni, A. Ahaitouf, A. Mansouri
{"title":"Multiple object detection using OpenCV on an embedded platform","authors":"Souhail Guennouni, A. Ahaitouf, A. Mansouri","doi":"10.1109/CIST.2014.7016649","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016649","url":null,"abstract":"Object detection has been attracting much interest due to the wide spectrum of applications that use it. Object detection technology has been driven by an increasing processing power available in software and hardware. In this work we present a developed application for multiple objects detection based on OpenCV libraries. The complexity-related aspects that were considered in the object detection using cascade classifier are described. Furthermore, we discuss the profiling and porting of the application into an embedded platform and comparing the results with the regular platform. The proposed application deals with real time systems implementation and the results give an indication of where the cases of object detection applications may be more complex and where it may be simpler.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134451234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Atlas and snake based segmentation of organs at risk in radiotherapy in head MRIs 头部mri放射治疗中危险器官的图谱和蛇形分割
Boudahla Mohammed Karim
{"title":"Atlas and snake based segmentation of organs at risk in radiotherapy in head MRIs","authors":"Boudahla Mohammed Karim","doi":"10.1109/CIST.2014.7016646","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016646","url":null,"abstract":"Automatic segmentation of organs at risk in head Magnetic Resonance Images (MRI) is a challenging task it necessitates accurate definition of organs at risk (OAR). This crucial step is time consuming and prone to inter and intra-observer variations. Automatic segmentation by atlas deformable registration may help to reduce time and variations. the atlas based segmentation of brain OAR may suffer from normal individual variations in human brain structures in the other hand deformable models (Snakes) are much more accurate to locate object or structures boundaries but they are very sensitive to initialization and the computational cost of calculating the force field that will deform the snake to these boundaries. in this paper we present a method that combine the robustness of atlas based segmentation methods and the accuracy of Snakes and we use filters to improve the quality of final segmentation. we use an unbiased age appropriate MRI atlas template the ICBM 152 and Multigrid GVF to avoid high computational costs of GVF Snakes filters like Canny filter aim to reduce irrelevant data from MRI images and improve convergence and the final structure segmentation.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133713461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The design of an IDS architecture for MANET based on multi-agent 基于多智能体的MANET入侵检测系统体系结构设计
S. Chadli, M. Emharraf, M. Saber, A. Ziyyat
{"title":"The design of an IDS architecture for MANET based on multi-agent","authors":"S. Chadli, M. Emharraf, M. Saber, A. Ziyyat","doi":"10.1109/CIST.2014.7016605","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016605","url":null,"abstract":"Mobile Ad Hoc Networks (MANETs) are susceptible to a variety of attacks that threaten their operation and the provided services. Intrusion Detection Systems (IDSs) may act as defensive mechanisms, since they monitor network activities in order to detect malicious actions performed by intruders, and then initiate the appropriate countermeasures. IDS for MANETs have attracted much attention recently and thus, there are many publications that propose new IDS solutions or improvements to the existing. In this paper, we study the different existing IDS architectures for MANETs. We briefly present for each architecture, after an analysis, the strengths and weaknesses, the methods/techniques that have been proposed to improve the performances and the provided security services. Then, we propose a new IDS architecture for MANETs, this architecture is a combination model hierarchical based on clusters and cooperation model based on a multi-agent system (SMA). In this architecture, agents use a knowledge related to a global security ontology, it can be used to infer new detection rules.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132739399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信