{"title":"Recognizing characters in Saudi License Plates using character boundaries","authors":"K. Almustafa, R. Zantout, H. R. Obeid, F. Sibai","doi":"10.1109/INNOVATIONS.2011.5893860","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893860","url":null,"abstract":"In this paper character recognition in Saudi Automobile License Plates is described. Due to special properties of Saudi license plates, simpler procedures as compared to the ones used for Lebanese plates have been developed. A limited character set for recognition enables the development of smaller recognition trees. The developed procedure was applied to different characters taken from real license plates and the recognition rate was 100% for characters supported by the algorithm. Uniformly distributed pseudo-random noise was added to simulate error in the image. The algorithm was proven to work even in cases in which the characters were extremely degraded by noise.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127519979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A pilot study for evaluating Arabic websites using automated WCAG 2.0 evaluation tools","authors":"Hend Suliman Al-Khalifa, M. Al-Kanhal, Hailah Al-Nafisah, Noura Al-soukaih, Elaf Al-hussain, Moneerah Al-onzi","doi":"10.1109/INNOVATIONS.2011.5893835","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893835","url":null,"abstract":"Nowadays, automatic WCAG 2.0 evaluation tools are increasing in numbers, however, there is little evidence of whether these tools are able to evaluate Arabic websites and provide reflective recommendations to improve their accessibility. To gain insight into this issue, we conducted a pilot study to evaluate a set of WCAG 2.0 tools and report on their results. We believe that our study is the first study to consider evaluating WCAG 2.0 automated evaluation tools for Arabic websites.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125110679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Successive iterative decoding of Reed Solomon codes using cryptographic hash codes as parity","authors":"O. Rehman, N. Zivic","doi":"10.1109/INNOVATIONS.2011.5893817","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893817","url":null,"abstract":"Coding theory and Cryptography have common roots. Both the fields were introduced by Claude Shannon in his legendary work. The applications of both the fields are however quite different and therefore not significant research work has previously been done to investigate the connection between the both. In this work, those applications that require security in the form of cryptographic hash codes are considered and this cryptographic hash code is used as a means to improve the decoding results of concatenated Convolutional/Reed Solomon codes. Using the message digest, the results of concatenated decoding are enhanced and vice versa i.e. using the concatenated codes, the errors in the message digest are minimized. It is also demonstrated that a coding gain is achieved in both the cases.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125908212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation in health technology projects","authors":"F. Arshad","doi":"10.1109/INNOVATIONS.2011.5893805","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893805","url":null,"abstract":"The author outlines experience of work within e-health. Particularly important is the need to test the efficacy of technology, both with patients and clinical practitioners prior to roll-out within the British National Health Service (NHS) is emphasised. Two projects are discussed focusing on user-centered engagement, within mobile technology evaluation involving clinicians (as users) and a Patient centered system for receiving feedback. Both these projects have been undertaken with NHS partners in North West of England.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123790884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cooperative agent-based architecture for self-healing distributed power systems","authors":"A. Zidan, E. El-Saadany, L. El Chaar","doi":"10.1109/INNOVATIONS.2011.5893796","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893796","url":null,"abstract":"This paper proposes a two-stage distributed method for the restoration problem using multi-agent system. The first stage gets a quick solution and implements it to restore as much loads as possible based on their priorities. The second stage will be applied to faults which expected to take longer time in order to maximize the restored loads (if there are loads still not energized from the first stage), minimize the power losses, and relieve the overloaded lines for more efficient and economical operation. Distribution system is represented as a multi-agent system with hierarchical architecture. Four types of agents are included, which are Bus Agents (BAGs) for monitoring and implementing the switching actions, DG Agents (DGAs) to represent DGs as supporting sources of power, Zone Agents (ZAGs) for negotiation and decision in the first-stage of restoration, and Global Agent (GAG) for decision in the second-stage of restoration. The proposed method is implemented in JADE and simulation results of 16-Bus system are included.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122310306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samir Ouchani, Yosr Jarraya, O. Mohamed, M. Debbabi
{"title":"Security estimation in Streaming Protocols","authors":"Samir Ouchani, Yosr Jarraya, O. Mohamed, M. Debbabi","doi":"10.1109/INNOVATIONS.2011.5893863","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893863","url":null,"abstract":"Streaming media protocol-based applications share communication resources with regular Network/Internet traffic. So, they are exposed to any existing security attacks. In the present paper, we measure this relationship between attacks and applications by introducing a probabilistic verification evaluation. Our approach is novel in that, it is based on the concurrency between models. In addition, the performance of these new models are qualitatively and quantitatively evaluated by using the PRISM model checker. The results are promising and characterized by a fairly short evaluation delay and automatic security measurement.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122173253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using E-learning for helping children with diabetes","authors":"Mona Al-Mansoori, K. Shaalan, H. Tawfik","doi":"10.1109/INNOVATIONS.2011.5893806","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893806","url":null,"abstract":"Diabetes is a common and costly condition disease that is associated with significant morbidity and mortality. Recent studies have shown remarkable increases in diabetes during the last decade. This has attracted many researchers and doctors to investigate e-learning technologies as a way of assisting people with diabetes. However very little work exist that focus on educating children to adopt healthy lifestyle. As a result, this research work aims to create awareness of diabetes among children, and thereby, ultimately contribute to reducing the growing rate of diabetes. This paper presents an investigation into E-Learning systems and how it can help people with diabetes, especially when it comes to children who are largely unaware and poorly informed about the menace of the disease. This research addresses children' needs expectations, and proposes a design of an E-Learning prototype that can raise their awareness and knowledge in order to help reduce the effects of this disease on children.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117321116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of web service interfaces via decision trees","authors":"J. Stárka, I. Mlýnková, Jakub Klímek, M. Nečaský","doi":"10.1109/INNOVATIONS.2011.5893866","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893866","url":null,"abstract":"Web services as a basic instrument for inter-system communication are expanding rapidly. This causes an increased interest in effective integration into the respective complex systems. However, manual integration and management of evolution of the XML formats may be very hard. In this paper we study the possibilities of reverse engineering of XML schemas. A new method based on analysis of our previously proposed platform-specific conceptual model XSEM and the subsequent creation of a decision tree is introduced. The method allows to find a mapping from XML formats to conceptual diagram efficiently and more precisely.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"24 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128423825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The impact of modeling the overshooting effect in subthreshold region for Nanoscale CMOS inverter","authors":"Abedalsalam Bani-Ahmed","doi":"10.1109/INNOVATIONS.2011.5893845","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893845","url":null,"abstract":"Some aspects should be considered in Nanoscale MOSFETS models, such as power dissipation, channel length modulation, and the overshooting effect. In this paper we study the impact of considering the overshooting effect in a previous nanoscale model, by including the subthreshold region where the overshooting effect appears. Results show a positive impact of modeling the overshooting effect on the output transient response accuracy compared to HSPICE.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128266792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring web search behavior of Arab internet users","authors":"Wissam Tawileh","doi":"10.1109/INNOVATIONS.2011.5893840","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2011.5893840","url":null,"abstract":"An important factor in performance evaluation of web search engines is the search behavior of users working with these special information retrieval applications. To explore this behavior of Arab internet users, the top searches executed on Google from seventeen Arab countries in the year 2010 were collected and analyzed. Less than the half of search queries were in Arabic letters and 78% of them consisted of one simple term. Other characteristics like search term uniqueness, language distribution and search goals are discussed in this paper.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"804 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120883556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}