{"title":"Arabic spotted words recognition system based on HMM approach to control a didactic manipulator","authors":"M. Fezari, H. Attoui, M. Bedda","doi":"10.1109/AICCSA.2008.4493648","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493648","url":null,"abstract":"A voice command system for a robot arm is designed as a part of a research project. The methodology adopted is based on a spotted words recognition system based on a robust HMM (Hidden Markove Model) technique with cepstral coefficients as parameters used in automatic speech recognition system. To implement the approach on a real-time application, a Personal Computer parallel port interface was designed to control the movement of a set of stepper motors. The user can control the movements of five degree of freedom (DOF) for a robot arm using a vocal phrase containing spotted words. Other applications are proposed.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124614416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supervised texture classification using several features extraction techniques based on ANN and SVM","authors":"M. Ashour, M. F. Hussin, K. Mahar","doi":"10.1109/AICCSA.2008.4493588","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493588","url":null,"abstract":"Texture classification is one of the most important clues of visual processing applications .In this paper, we present a comparison between the most two popular supervised texture classification methods based on the feed forward Artificial Neural Network (ANN) and the multi-class Support Vector Machine (SVM). Five of the most common used features extraction approaches were chosen in order to extract input vectors of different sizes for both classifiers. These approaches are namely gray level histogram, edge detection, and co-occurrence matrices, besides Gabor and Biorthogonal wavelet transformations. Experiments are conducted on two different datasets the first one is engineering surface textures produced by different machining processes, and the second was taken from Brodatz (1966) textures album. The classification accuracy rate is calculated for ANN and SVM in order to measure the efficiency of each technique based on the several features extraction methods. The results show that SVM with its linear and polynomial kernels is higher in classification accuracy and faster in training time.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116425216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fair scheduling algorithm for video transmission over wireless packet networks","authors":"Mohamed S. Hassan, T. Landolsi, M. El-Tarhuni","doi":"10.1109/AICCSA.2008.4493655","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493655","url":null,"abstract":"In this paper we propose a fair-scheduling algorithm for the transmission of video frames over wireless links. The scheme is based on the occupancy of the video decoder buffer. When the occupancy of the decoder buffer of a given video client becomes increasingly small and approaches a starvation threshold, it gets treated with a higher priority and gets serviced more frequently than other clients who may not be approaching the starvation point. When compared to other commonly-used scheduling algorithms, ours shows a better performance in terms of the end-to-end delay experienced by the video frames.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121695382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extracting Kerberos passwords through RC4-HMAC encryption type analysis","authors":"Ahmed Alazzawe, A. Nawaz, D. Wijesekera","doi":"10.1109/AICCSA.2008.4493602","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493602","url":null,"abstract":"In this paper, we propose a system and method for obtaining Kerberos passwords by capturing a single packet, encrypted using the RC4-HMAC encryption type. We present two methods that when combined together, can reduce the time needed to crack a password by 60.2% over brute force. The first method uses known text in the preauthentication phase to skip the verification section of the decryption process. The second method precomputes some of the steps of the RC4-HMAC decryption process. We also present a novel method of eliminating the amount of space needed to store passwords in memory by using a counter to map hashes to their password.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116313579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SLA-based dynamic resource management in wireless environments","authors":"Badis Tebbani, I. Aib, G. Pujolle","doi":"10.1504/IJIPT.2008.019292","DOIUrl":"https://doi.org/10.1504/IJIPT.2008.019292","url":null,"abstract":"In this article, we focus on the service-driven management of quality of service and user access in wireless corporate networks. We propose a service-level agreement (SLA) oriented nomadism management architecture with a top-down vision starting by the specification of company objectives and going down to device-level configurations. We define an algorithm for the automatic translation of application-level quality assurance parameters into network-level configuration parameters. The description of the prototype implementation of our solution to the SLA-driven enterprise nomadism management is given and preliminary results on the self-adaptive capabilities of our mapping algorithm are given.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126783037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical inter-stock dependency indicators using time series and derivatives","authors":"A. Dattasharma, P. Tripathi","doi":"10.1109/AICCSA.2008.4493533","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493533","url":null,"abstract":"Prediction of stock prices is a difficult but extremely important problem that demands the development of algorithms for predicting trading opportunities by detecting patterns from past data. A related problem is the task of identifying inter-dependencies between different stocks, so that investment in one stock can be done when a related stock is performing well. The work till date on this problem seems mostly focused on theory or database techniques. We define three very simple indicators derived from stock data for this purpose, and show how they can be used in practice to successfully identify investor thumb rules in a quantitative manner.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126112313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wadha K. Lebda, Noura Fetais, S. A. Hussaini, Sahar smail, Q. Malluhi
{"title":"Intelligent virtual archiving for accessing news article repositories","authors":"Wadha K. Lebda, Noura Fetais, S. A. Hussaini, Sahar smail, Q. Malluhi","doi":"10.1109/AICCSA.2008.4493640","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493640","url":null,"abstract":"This paper proposes a news article archiving solution that addresses many of today's systems limitations for effective storage and management of unstructured data items. The proposed system employs formal concept analysis as a means to generate concept lattices. The system is based on a new breed of file systems called content-based file systems. This system provides a flexible way of managing data by employing a mechanism for creating, storing, organizing, searching, and browsing huge libraries of news articles.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125490424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Med Amine Haddar, A. Kacem, Y. Métivier, M. Mosbah, M. Jmaiel
{"title":"Electing a leader in the local computation model using mobile agents","authors":"Med Amine Haddar, A. Kacem, Y. Métivier, M. Mosbah, M. Jmaiel","doi":"10.1109/AICCSA.2008.4493575","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493575","url":null,"abstract":"Needless to say, distributed algorithms are usually hard to design mush harder to prove and to use in real distributed systems. In these systems, local computations theory has proved its power to formalize and prove in an intuitive way distributed algorithms. This paper uses this formalism to present solutions to the election problem in several network topologies using mobile agents at the design and the implementation levels. We formalized the proposed solutions in the local computations model using transition systems [11]. This facilitates the proof of the proposed solutions using the mathematical tool-box provided by the local computation theory. Using mobile agents, the proposed solutions get rid of synchronization and do not need continuous use of all machines computational resources. Proposed solutions are also simulated within the VISIDIA [3] platform.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127294670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A modular state exploration and compatibility checking of UML dynamic diagrams","authors":"Y. Hammal","doi":"10.1109/AICCSA.2008.4493617","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493617","url":null,"abstract":"Although UML is a suited language for modeling complex systems, the consistency and compatibility checking of designed UML artifacts remains a difficult task because of both the imprecise semantics of UML diagrams and the expressiveness gaps between them. In this setting, this paper uses a modular approach of state exploration to achieve the compatibility checking of the various components depicted by StateCharts and to check that their behavioral models fulfill the scenario-based specifications depicted by interaction diagrams. The main advantages of this approach is to avoid the state explosion problem by achieving the consistency checking in a modular and parallelizable way and by alleviating the handling of component substitutivity without a complete exploration of the whole system.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131420984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposing an efficient method to estimate and reduce crosstalk after placement in VLSI circuits","authors":"Arash Mehdizadeh, M. S. Zamani","doi":"10.1109/AICCSA.2008.4493517","DOIUrl":"https://doi.org/10.1109/AICCSA.2008.4493517","url":null,"abstract":"Due to the increasing number of elements on a single chip area and the growing complexity of routing, existing methods to reduce crosstalk at the routing or post-routing stage do not seem efficient anymore. So crosstalk estimation should be considered in earlier design stages such as placement. To estimate crosstalk after placement information about the topology of a net and adjacency of its wire-segments should be available. Yet it is not because of the lack of routing information. In this paper, we propose a probabilistic method to estimate intra-grid wirelength of nets after placement and global routing. Results of incorporating this method with the previous crosstalk estimation schemes and our proposed crosstalk reduction method show its efficiency in detecting failing noisy nets before having detailed information of wire adjacency. Our general method improved the number of correctly detected failing noisy nets by 15% on average. In a second improvement, the directed version of this method increased the number of correct detections by 19%. It also decreased the number of false detections considerably.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134378776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}