{"title":"Fine tuning facial harmony assesment model to individual countries","authors":"T. Ozkul, M. Ozkul","doi":"10.1109/ICITES.2012.6216616","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216616","url":null,"abstract":"Research indicated that many facial parameters contribute to generation of a “harmonious face” which is makes it more appealing to observers. There are different theories developed on which and how these parameters blend in to make a harmonious face. Determination of these parameters and the method of determining “facial harmony” is important since achieving a harmonious face is the primary goal in dental and aesthetic surgical procedures. A model developed for computer-aided assessment of facial harmony provides computerized assessment of facial harmony by using patient's images before and after the surgical procedures. The model utilizes “theory of averages” as a mechanism for measurement of facial harmony which is widely used by most aesthetic surgeons and orthodontists for assessment of facial proportions of the patient. The output of the developed model is an index which reflects the degree of harmony of facial features and how well they blend into each other. The constructed model so far has assumed same parameters would be valid for all Caucasian males as long as they are Caucasian in origin. Same assumption was valid for females. In this study we question the claim of fixed parameters and try to fine tune the model by determining how some parameters change from one country to another.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122179042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital signature forming and keys protection based on person's characteristics","authors":"A. Elmadani","doi":"10.1109/ICITES.2012.6216593","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216593","url":null,"abstract":"In today's commercial environment, establishing a framework for the authentication came with different challenges, need of secure document exchange, secure bank transactions, and other e-commerce needs. Challenges are in term of confidentiality. Digital signature (DS) is the only means of achieving it. This paper shows a method in signing and verifying a document digitally online. A document is first signed, using a Secure Hash Algorithm - 160 (SHA-1), then protected by sender's keys. The receiver verifies the signature using keys stored in the smart card (SMC) that is derived from his fingerprint. This paper investigates DSs techniques that is based on use of SMCs. It shows how true user identity can be verified when used keys are derived from human characteristics. The obtained results were translated in term of speed and security enhancement which is highly in demand of e-commerce society.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130661057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The mutual impact of e-course coordination system on students' performance","authors":"H. Elayyan","doi":"10.1109/ICITES.2012.6216685","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216685","url":null,"abstract":"Arab Open University is a pioneer educational institution in middle east and North Africa that adopted the open learning concept and has been dedicated to form this concept and present it with various layers of perfect e-course coordination and e-monitoring and e-measurement systems that fits with the Virtual learning Environment (VLE) for quality of assurance applications. This paper argues the mutual impact of e-coordination system on students of multi sections as it presents a comparative analysis depending on AOU experience e-coordination system through the VLE and other running courses in regular education without any standardization level.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116793354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent systems based on reinforcement learning and fuzzy logic approaches, \"Application to mobile robotic\"","authors":"L. Cherroun, M. Boumehraz","doi":"10.1109/ICITES.2012.6216661","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216661","url":null,"abstract":"One of the standing challenging aspects in mobile robotics is the ability to navigate autonomously. It is a difficult task, which requiring a complete modeling of the environment and intelligent controllers. This paper presents an intelligent navigation method for an autonomous mobile robot which requires only a scalar signal likes a feedback indicating the quality of the applied action. Instead of programming a robot, we will let it only learn its own strategy. The Q-learning algorithm of reinforcement learning is used for the mobile robot navigation by discretizing states and actions spaces. In order to improve the mobile robot performances, an optimization of fuzzy controllers will be discussed for the robot navigation; based on prior knowledge introduced by a fuzzy inference system so that the initial behavior is acceptable. The effectiveness of this optimization method is verified by simulation.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New cooperative approach for dynamic classification of multimodal and evolutionary data","authors":"A. Moussaoui, M. A. Abbas","doi":"10.1109/ICITES.2012.6216672","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216672","url":null,"abstract":"In this paper we present a new approach for dynamic classification of multimodal and evolutionary data, based on a multi-agent architecture. This approach is adaptive with the evolutions of classes and data in order to optimize the allocation of entities from disparate sources into clusters, and to strengthen the mechanism of incremental classification so that determinate a cases of creating new cluster. This approach will allow the classifiers agents to collaborate in making final decisions. It was implemented on the platform JADE, where every step is handled by specialized agents working together and communicating between them.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132114183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SVM based Arabic speaker verification system for mobile devices","authors":"A. Alarifi, Issa Alkurtass, A. Al-Salman","doi":"10.1109/ICITES.2012.6216673","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216673","url":null,"abstract":"User authentication is very critical to ensure only allowed users are able to access restricted resources. Voiceprint can be used as a unique password of the user to prove his/her identity. In this paper, we propose a text-dependent speaker verification system for Arabic language. The paper advocates the use of discrete representation of speech signals in terms of Mel-frequency cepstral coefficients (MFCCs), linear predictive coding (LPC) and perceptual linear prediction (PLP) as input features for the system and proposes the use of support vector machine (SVM) to recognize authorized user and unlock devices for him/her. Furthermore, the paper introduces the use of Relative Spectral Transformation filter (Rasta) to support Perceptual Linear Prediction (PLP) preprocessing. The paper describes system components and demonstrates how it works. It presents the performance of our system using different kernel functions and analyzes the system's results.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122392263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ali Cherif Moussa Ali Cherif Moussa, Feraoun M. Kamel, Doumi Noureddine Doumi Noureddine, Khater Maamar
{"title":"Integration of dynamic current bandwidth capacity calculation for existing AODV","authors":"Ali Cherif Moussa Ali Cherif Moussa, Feraoun M. Kamel, Doumi Noureddine Doumi Noureddine, Khater Maamar","doi":"10.1109/ICITES.2012.6216657","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216657","url":null,"abstract":"The use of mobile ad hoc networks has increased in popularity recently, with this their need to support real time and multimedia applications is growing as well. The growing use of multimedia applications and the small degree of tolerance these applications demand in terms of session bandwidth, end-to-end delay, jitter and information loss has sparked increased interest towards the design and development of ad hoc reactive routing protocols with quality-of-service, QoS support. Current ad hoc protocols are reactive in nature, designed for a dynamic network topology, setting up routes with little consideration for traffic flow quality-of-service constraints. In this article a model is proposed that extends the existing AODV routing protocol to accommodate additional QoS constraints for minimum session bandwidth required for an application. Extensions are added to the current AODV messages during route discovery which specify the QoS requirements. Nodes taking part in the ad hoc network accept or reject QoS traffic flows according to their Current Bandwidth Capacity (CBC). The implementation of the QoS_AODV routing protocol is done in the Network Simulator 2 which is also used to carry out simulations to investigate and examine the effectives of the proposed model.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116996018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hadjila Fethallah, M. A. Chikh, Merzoug Mohammed, Kameche Zineb
{"title":"QoS-aware service selection based on swarm particle optimization","authors":"Hadjila Fethallah, M. A. Chikh, Merzoug Mohammed, Kameche Zineb","doi":"10.1109/ICITES.2012.6216594","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216594","url":null,"abstract":"The growing number of web service over the internet urges us to conceive an efficient selection approach, especially for composite requests. In general, we can find a set of services that provide the same functionality (inputs/outputs), but differ in QOS criteria, in this situation we must select the best ones, by applying some optimization algorithm. In this paper, we propose a reactive multi-agent solution, based on swarm particle optimization. The proposed system adopts a set of particle's groups, which explore the space search in order to maximize a single objective function. The obtained results show a high rate of optimality and merit to be continued.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114366639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collisions avoidance multi-channel scheme for the protocol IEEE802.15.4","authors":"M. Sahraoui","doi":"10.1109/ICITES.2012.6216664","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216664","url":null,"abstract":"Advances in micro-electromecanic (MEMS), microprocessor, and wireless technologies, have accelerated deployment of network-capable computing devices attached to various objects over the world. These devices should be small in size and have a characteristic of extremely low power consumption. Therefore, in 2004, IEEE802.15.4 has been established as a global standard satisfying low power and low cost. After that, the phenomenal popularity of this standard has also led to the indiscreet deployment of WPANs. Therefore, LR-WPANs sometimes suffer from several types of collisions. In spite of being able to avoid data packets colliding with each other by using CSMA/CA, the risk of beacon collisions still remains specially in a cluster-tree network topology that exist more then one coordinator. In order to solve this problem, we propose a novel fixed channel management scheme using MCSP (Multi-Canal Scheduling Protocol). The key objective in this work is to minimize energy consumption within the network by reducing the effects of collisions that may occur if the clusters operate on the same frequency. By using a newly proposed method, MCSP use two beacon avoidance mechanisms: it starts by the fact of dividing of the hole network into a number of sub networks according to the number of the channels exists in order to avoid the inter sub networks beacon frame collisions inside, and in other side, it use the mechanism of beacon frame scheduling for each sub network in order to avoid the intra sub networks beacon frame collisions. We also evaluate the performance of the proposed scheme through simulation. The simulation results demonstrate that the proposed scheme can minimize the possibility of beacon collisions by efficiently managing the multiple available channels while the dissipated power consumption of PAN coordinator that uses MCSP is more than the PAN that use the classical IEEE 802.15.4.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114612855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach based on Fractal components for developing an SOA-based system","authors":"S. Bendekkoum, M. Boufaida","doi":"10.1109/ICITES.2012.6216637","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216637","url":null,"abstract":"Organizations always look for sovereign solutions not only for developing the internal structure of their information systems, but also for integrating and cooperating dynamically their applications. In this context, companies have been aware about the importance of the service orientation in their solutions, in terms of standardization and facility of communication and composition of services from different platforms. However, this technology has limitations, notably, towards methods and approaches used for developing and implementing a Service-Oriented Architecture (SOA) within enterprises. We talk basically about the lack of efficient and complete approaches used to develop SOA-based systems. Thus, there are many approaches which do not consider the use of a strategic method for identifying services. This leads the developers to a major difficulty of defining the concept service, especially the aspect of functional (service) granularity, and that influences the performance of the system. The objective of this paper is to propose an approach for developing an SOA, based on hierarchical models for specifying Fractal components, in which we highlight the advantages of using the important features of the Fractal components; its distributed and autonomous behavior. In addition to these objectives, we aim to facilitate the implementation and deployment of Service-Oriented Architecture model which is considered necessary for companies. We use to validate our approach, a case study of a commercial company that produces machine tools.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123466395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}