2011 International Conference on Innovations in Information Technology最新文献

筛选
英文 中文
Recognizing characters in Saudi License Plates using character boundaries 使用字符边界识别沙特车牌中的字符
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893860
K. Almustafa, R. Zantout, H. R. Obeid, F. Sibai
{"title":"Recognizing characters in Saudi License Plates using character boundaries","authors":"K. Almustafa, R. Zantout, H. R. Obeid, F. Sibai","doi":"10.1109/INNOVATIONS.2011.5893860","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893860","url":null,"abstract":"In this paper character recognition in Saudi Automobile License Plates is described. Due to special properties of Saudi license plates, simpler procedures as compared to the ones used for Lebanese plates have been developed. A limited character set for recognition enables the development of smaller recognition trees. The developed procedure was applied to different characters taken from real license plates and the recognition rate was 100% for characters supported by the algorithm. Uniformly distributed pseudo-random noise was added to simulate error in the image. The algorithm was proven to work even in cases in which the characters were extremely degraded by noise.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127519979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A pilot study for evaluating Arabic websites using automated WCAG 2.0 evaluation tools 使用自动WCAG 2.0评估工具评估阿拉伯语网站的试点研究
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893835
Hend Suliman Al-Khalifa, M. Al-Kanhal, Hailah Al-Nafisah, Noura Al-soukaih, Elaf Al-hussain, Moneerah Al-onzi
{"title":"A pilot study for evaluating Arabic websites using automated WCAG 2.0 evaluation tools","authors":"Hend Suliman Al-Khalifa, M. Al-Kanhal, Hailah Al-Nafisah, Noura Al-soukaih, Elaf Al-hussain, Moneerah Al-onzi","doi":"10.1109/INNOVATIONS.2011.5893835","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893835","url":null,"abstract":"Nowadays, automatic WCAG 2.0 evaluation tools are increasing in numbers, however, there is little evidence of whether these tools are able to evaluate Arabic websites and provide reflective recommendations to improve their accessibility. To gain insight into this issue, we conducted a pilot study to evaluate a set of WCAG 2.0 tools and report on their results. We believe that our study is the first study to consider evaluating WCAG 2.0 automated evaluation tools for Arabic websites.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125110679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Successive iterative decoding of Reed Solomon codes using cryptographic hash codes as parity 使用加密哈希码作为奇偶校验的里德所罗门码的连续迭代解码
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893817
O. Rehman, N. Zivic
{"title":"Successive iterative decoding of Reed Solomon codes using cryptographic hash codes as parity","authors":"O. Rehman, N. Zivic","doi":"10.1109/INNOVATIONS.2011.5893817","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893817","url":null,"abstract":"Coding theory and Cryptography have common roots. Both the fields were introduced by Claude Shannon in his legendary work. The applications of both the fields are however quite different and therefore not significant research work has previously been done to investigate the connection between the both. In this work, those applications that require security in the form of cryptographic hash codes are considered and this cryptographic hash code is used as a means to improve the decoding results of concatenated Convolutional/Reed Solomon codes. Using the message digest, the results of concatenated decoding are enhanced and vice versa i.e. using the concatenated codes, the errors in the message digest are minimized. It is also demonstrated that a coding gain is achieved in both the cases.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125908212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation in health technology projects 卫生技术项目评价
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893805
F. Arshad
{"title":"Evaluation in health technology projects","authors":"F. Arshad","doi":"10.1109/INNOVATIONS.2011.5893805","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893805","url":null,"abstract":"The author outlines experience of work within e-health. Particularly important is the need to test the efficacy of technology, both with patients and clinical practitioners prior to roll-out within the British National Health Service (NHS) is emphasised. Two projects are discussed focusing on user-centered engagement, within mobile technology evaluation involving clinicians (as users) and a Patient centered system for receiving feedback. Both these projects have been undertaken with NHS partners in North West of England.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123790884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cooperative agent-based architecture for self-healing distributed power systems 一种基于协作代理的自修复分布式电力系统体系结构
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893796
A. Zidan, E. El-Saadany, L. El Chaar
{"title":"A cooperative agent-based architecture for self-healing distributed power systems","authors":"A. Zidan, E. El-Saadany, L. El Chaar","doi":"10.1109/INNOVATIONS.2011.5893796","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893796","url":null,"abstract":"This paper proposes a two-stage distributed method for the restoration problem using multi-agent system. The first stage gets a quick solution and implements it to restore as much loads as possible based on their priorities. The second stage will be applied to faults which expected to take longer time in order to maximize the restored loads (if there are loads still not energized from the first stage), minimize the power losses, and relieve the overloaded lines for more efficient and economical operation. Distribution system is represented as a multi-agent system with hierarchical architecture. Four types of agents are included, which are Bus Agents (BAGs) for monitoring and implementing the switching actions, DG Agents (DGAs) to represent DGs as supporting sources of power, Zone Agents (ZAGs) for negotiation and decision in the first-stage of restoration, and Global Agent (GAG) for decision in the second-stage of restoration. The proposed method is implemented in JADE and simulation results of 16-Bus system are included.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122310306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Security estimation in Streaming Protocols 流协议中的安全估计
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893863
Samir Ouchani, Yosr Jarraya, O. Mohamed, M. Debbabi
{"title":"Security estimation in Streaming Protocols","authors":"Samir Ouchani, Yosr Jarraya, O. Mohamed, M. Debbabi","doi":"10.1109/INNOVATIONS.2011.5893863","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893863","url":null,"abstract":"Streaming media protocol-based applications share communication resources with regular Network/Internet traffic. So, they are exposed to any existing security attacks. In the present paper, we measure this relationship between attacks and applications by introducing a probabilistic verification evaluation. Our approach is novel in that, it is based on the concurrency between models. In addition, the performance of these new models are qualitatively and quantitatively evaluated by using the PRISM model checker. The results are promising and characterized by a fairly short evaluation delay and automatic security measurement.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122173253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using E-learning for helping children with diabetes 利用电子学习帮助糖尿病儿童
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893806
Mona Al-Mansoori, K. Shaalan, H. Tawfik
{"title":"Using E-learning for helping children with diabetes","authors":"Mona Al-Mansoori, K. Shaalan, H. Tawfik","doi":"10.1109/INNOVATIONS.2011.5893806","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893806","url":null,"abstract":"Diabetes is a common and costly condition disease that is associated with significant morbidity and mortality. Recent studies have shown remarkable increases in diabetes during the last decade. This has attracted many researchers and doctors to investigate e-learning technologies as a way of assisting people with diabetes. However very little work exist that focus on educating children to adopt healthy lifestyle. As a result, this research work aims to create awareness of diabetes among children, and thereby, ultimately contribute to reducing the growing rate of diabetes. This paper presents an investigation into E-Learning systems and how it can help people with diabetes, especially when it comes to children who are largely unaware and poorly informed about the menace of the disease. This research addresses children' needs expectations, and proposes a design of an E-Learning prototype that can raise their awareness and knowledge in order to help reduce the effects of this disease on children.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117321116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Integration of web service interfaces via decision trees 通过决策树集成web服务接口
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893866
J. Stárka, I. Mlýnková, Jakub Klímek, M. Nečaský
{"title":"Integration of web service interfaces via decision trees","authors":"J. Stárka, I. Mlýnková, Jakub Klímek, M. Nečaský","doi":"10.1109/INNOVATIONS.2011.5893866","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893866","url":null,"abstract":"Web services as a basic instrument for inter-system communication are expanding rapidly. This causes an increased interest in effective integration into the respective complex systems. However, manual integration and management of evolution of the XML formats may be very hard. In this paper we study the possibilities of reverse engineering of XML schemas. A new method based on analysis of our previously proposed platform-specific conceptual model XSEM and the subsequent creation of a decision tree is introduced. The method allows to find a mapping from XML formats to conceptual diagram efficiently and more precisely.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"24 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128423825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The impact of modeling the overshooting effect in subthreshold region for Nanoscale CMOS inverter 亚阈值区域过调效应建模对纳米级CMOS逆变器的影响
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893845
Abedalsalam Bani-Ahmed
{"title":"The impact of modeling the overshooting effect in subthreshold region for Nanoscale CMOS inverter","authors":"Abedalsalam Bani-Ahmed","doi":"10.1109/INNOVATIONS.2011.5893845","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893845","url":null,"abstract":"Some aspects should be considered in Nanoscale MOSFETS models, such as power dissipation, channel length modulation, and the overshooting effect. In this paper we study the impact of considering the overshooting effect in a previous nanoscale model, by including the subthreshold region where the overshooting effect appears. Results show a positive impact of modeling the overshooting effect on the output transient response accuracy compared to HSPICE.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128266792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Exploring web search behavior of Arab internet users 探索阿拉伯互联网用户的网络搜索行为
2011 International Conference on Innovations in Information Technology Pub Date : 2011-04-25 DOI: 10.1109/INNOVATIONS.2011.5893840
Wissam Tawileh
{"title":"Exploring web search behavior of Arab internet users","authors":"Wissam Tawileh","doi":"10.1109/INNOVATIONS.2011.5893840","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893840","url":null,"abstract":"An important factor in performance evaluation of web search engines is the search behavior of users working with these special information retrieval applications. To explore this behavior of Arab internet users, the top searches executed on Google from seventeen Arab countries in the year 2010 were collected and analyzed. Less than the half of search queries were in Arabic letters and 78% of them consisted of one simple term. Other characteristics like search term uniqueness, language distribution and search goals are discussed in this paper.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"804 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120883556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信