2014 Global Summit on Computer & Information Technology (GSCIT)最新文献

筛选
英文 中文
Implementation of faster miller over Barreto-Naehrig curves in Jacobian cordinates 在雅可比坐标下快速miller在Barreto-Naehrig曲线上的实现
2014 Global Summit on Computer & Information Technology (GSCIT) Pub Date : 2014-06-14 DOI: 10.1109/GSCIT.2014.6970111
Amine Mrabet, B. Bouallegue, N. El Mrabet, Mohsen Machhout, Sihem Mesnager
{"title":"Implementation of faster miller over Barreto-Naehrig curves in Jacobian cordinates","authors":"Amine Mrabet, B. Bouallegue, N. El Mrabet, Mohsen Machhout, Sihem Mesnager","doi":"10.1109/GSCIT.2014.6970111","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970111","url":null,"abstract":"Few years ago, cryptography based on elliptic curves was increasingly used in the field of security. It has also gained a lot of importance in the academic community and industry. This is particularly due to the high level of security that it offers with relatively small size of the keys, in addition to its ability to the construction of original protocols which are characterized by high efficiency. Moreover, it is a technique of great interest for hardware and software implementation. Pairing-friendly curves are important for speeding up the arithmetic calculation of pairing on elliptic curves such as the Barreto-Naehrig (BN) curves that arguably constitute one of the most versatile families. In this paper, the proposed architecture is designed for field programmable gate array (FPGA) platforms. We present implementation results of the Miller's algorithm of the optimal ate pairing targeting the 128-bit security level using such a curve BN defined over a 256-bit prime field. And we present also a fast formulas for BN elliptic-curve addition and doubling. Our architecture is able to compute the Miller's algorithm in just 638337 of clock cycles.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125050723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Contribution to the realization of a video surveillance system by optical flow and stereovision 对利用光流和立体视觉实现视频监控系统的贡献
2014 Global Summit on Computer & Information Technology (GSCIT) Pub Date : 2014-06-14 DOI: 10.1109/GSCIT.2014.6970104
Amel Ben Mahjoub, Hamdi Bou Kamcha, Mohamed Atri
{"title":"Contribution to the realization of a video surveillance system by optical flow and stereovision","authors":"Amel Ben Mahjoub, Hamdi Bou Kamcha, Mohamed Atri","doi":"10.1109/GSCIT.2014.6970104","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970104","url":null,"abstract":"In this paper we combine two techniques in order to detect, track and identify person actions in a stream video. The combination of optical flow and stereovision allows also reconstructing the 3D shape of a scene from its 2D images. We take images from two cameras and match points to determine disparity, and therefore depth. The optical flow method is used to estimate motion field in a video scene. Experimental results with synthetic and real sequences, exhibit the usefulness of our proposed approach.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130730983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of CMT-SCTP in real internet lab setup CMT-SCTP在真实网络实验室中的实现
2014 Global Summit on Computer & Information Technology (GSCIT) Pub Date : 2014-06-14 DOI: 10.1109/GSCIT.2014.6970119
I. A. Halepoto, F. Lau, Zhixiong Niu
{"title":"Implementation of CMT-SCTP in real internet lab setup","authors":"I. A. Halepoto, F. Lau, Zhixiong Niu","doi":"10.1109/GSCIT.2014.6970119","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970119","url":null,"abstract":"In this study we implement CMT-SCTP (Concurrent Multipath Transfer extension of the Stream Control Transmission Protocol) in a real lab Internet setup. SCTP is an innovative transport layer protocol, which is reliable and provides services such as multihoming and multistreaming. CMT extension allows simultaneous utilization of multipaths for reaching the higher data transmission rate between two hosts, which is beneficial for the emerging multi-interface devices. The literature on CMT-SCTP optimization shows that, there are several simulation tools used by the researchers for performance evaluation, to validate propositions and to experiment the further extensions of SCTP/CMT-SCTP. Indeed, such tools are convenient and can quickly verify the proposal results. We establish a real lab Internet setup first and then design a number of test scenarios for CMT-SCTP. To verify our implementation the simulations needs to be performed on the test scenarios to set a reference output prior to the lab setup experiments. The experiment results from the successful implementation of CMT-SCTP on the real lab setup agrees to the reference output reasonably.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116271718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Web-based real-time decision support system active XML-based metadata 基于web的实时决策支持系统活动的基于xml的元数据
2014 Global Summit on Computer & Information Technology (GSCIT) Pub Date : 2014-06-14 DOI: 10.1109/GSCIT.2014.6970096
Abdullah Alrefae, Jinli Cao
{"title":"Web-based real-time decision support system active XML-based metadata","authors":"Abdullah Alrefae, Jinli Cao","doi":"10.1109/GSCIT.2014.6970096","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970096","url":null,"abstract":"The nature of operational data that is frequently updated, and the interest to reflect business environment alterations in the business analysis process to make operational decisions, need more than the typical data warehousing methodology for data integration. In this paper, therefore, we propose a new methodology to dynamically extract real-time data from various internal and external data sources passively, i.e. after receiving the decision making query. We propose a methodology to store and exchange intensional data (in AXML format) to activate and automate the integration of real-time data and updates. AXML database will be proposed as a structural metadata to integrate data from external data sources and manipulate external models for accurate decision making. Our approach should be seen as a complementary, not a replacement, for the data warehousing approach.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127490669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CLEAN-OntoLex: a method of semi-automatic cleaning lexical ontology CLEAN-OntoLex:一种半自动清洗词汇本体的方法
2014 Global Summit on Computer & Information Technology (GSCIT) Pub Date : 2014-06-14 DOI: 10.1109/GSCIT.2014.6970127
Ilyes Athimni, Anis Tissaoui, S. Sassi
{"title":"CLEAN-OntoLex: a method of semi-automatic cleaning lexical ontology","authors":"Ilyes Athimni, Anis Tissaoui, S. Sassi","doi":"10.1109/GSCIT.2014.6970127","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970127","url":null,"abstract":"Lexical ontologies can organize all concepts in a specific domain as well as the relations between concepts. They also define meaning units such as labels, definitions and concepts to describe the semantics of lexical units. The structure of these lexical resources can vary from the simple dictionary to a much more complex organization of ontology modeling the meaning of the words according to several levels of granularity. These resources are often less consistent and have numerous classification conceptual and lexical errors detected following a breach in the constraints that guarantee the consistency of its ontological structure. In this context, we proposed CLEAN-OntoLex, cleaning methodology and conceptual lexical ontology through a succession of steps.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"312 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133014977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cellular automata model to predict the growth trends in Tripoli-Libya 预测利比亚的黎波里增长趋势的元胞自动机模型
2014 Global Summit on Computer & Information Technology (GSCIT) Pub Date : 2014-06-14 DOI: 10.1109/GSCIT.2014.6970092
Adel Zidan, M. Abbod
{"title":"A cellular automata model to predict the growth trends in Tripoli-Libya","authors":"Adel Zidan, M. Abbod","doi":"10.1109/GSCIT.2014.6970092","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970092","url":null,"abstract":"The world population is rapidly increasing due to uncontrolled growth especially in developing countries, however governments still hold the responsibility to provide civilized and modern life which includes infrastructure, housing and healthcare system. Random settlements are the main problem associated with this issue. To solve these problems governments must have advanced spatial plan to deal with this growth and demand on people desires. Achieving sustainable development which will reduce many of the problems in the future predict population and size of area required for this inhabitants and the establishment of appropriate projects within each region. This paper is considering a case study based on a real data of the Libyan capital Tripoli. The study has considered three sceneries increasing, constant and decreasing in population prediction. The study covered a period of 60 years from 1980 to 2040.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133035898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact of radio propagation in buildings on WSN's lifetime 建筑物内无线电传播对无线传感器网络寿命的影响
2014 Global Summit on Computer & Information Technology (GSCIT) Pub Date : 2014-06-14 DOI: 10.1109/GSCIT.2014.6970117
M. Benatia, A. Louis, D. Baudry, B. Mazari, A. Hami
{"title":"Impact of radio propagation in buildings on WSN's lifetime","authors":"M. Benatia, A. Louis, D. Baudry, B. Mazari, A. Hami","doi":"10.1109/GSCIT.2014.6970117","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970117","url":null,"abstract":"Nowadays, Wireless Sensor Networks (WSN) are a commonly used technology in Smart Buildings applications. Generally, WSN suffer from finite energy resources (limited lifetime), and limited network coverage (due to transmission range). The most consistent works on energy consumption and radio transmission modeling for WSN, are not taking into account realistic constraints. However, radio propagation is affected by a lot of kinds of obstacles (walls, windows, doors...) with different effects on the radio propagations. For this, a proper and more realistic radio propagation model is essential to optimize energy consumption and ensure network reliability (best network coverage). In this paper, we investigate the impact of the radio propagation modeling on the network energy consumption with and without obstacles (walls) consideration. This work leads to evaluate a proper radio behavior model with the objective to use it in an optimization process.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134599642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A miniaturezed tag antenna RFID for textil application 一种用于纺织品的微型标签天线RFID
2014 Global Summit on Computer & Information Technology (GSCIT) Pub Date : 2014-06-14 DOI: 10.1109/GSCIT.2014.6970126
S. Beldi, A. Gharsallah, T. Vuong
{"title":"A miniaturezed tag antenna RFID for textil application","authors":"S. Beldi, A. Gharsallah, T. Vuong","doi":"10.1109/GSCIT.2014.6970126","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970126","url":null,"abstract":"This paper presents a new RFID Tag antenna in automotive tire applications. The proposed antenna is designed to resonate at 915 MHz. We applied a miniaturization technique to obtain more than 50% size reduction with an acceptable gain which is about 2.3 dB.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122014451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Pervasive computing in classroom environments and applications 普适计算在课堂环境和应用
2014 Global Summit on Computer & Information Technology (GSCIT) Pub Date : 2014-06-14 DOI: 10.1109/GSCIT.2014.6970123
Folakemi Oluwagbemi, S. Misra, N. Omoregbe
{"title":"Pervasive computing in classroom environments and applications","authors":"Folakemi Oluwagbemi, S. Misra, N. Omoregbe","doi":"10.1109/GSCIT.2014.6970123","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970123","url":null,"abstract":"Pervasive computing is an advanced computing paradigm which makes computing available everywhere and anywhere. It allows users to interact with computers. Such computers can exist in different forms such as laptops, tablets, a pair of glasses (wearable computers) and clothes or wearable fabrics that are sensor-embedded. It is essential to explore the different applications of pervasive computing to learning in classroom environments, in order to foster learning and promote well-being among students. One of the problems currently confronting some developing countries is a lack of adequate facilities to support proper learning in classroom environments. This has had a negative impact on the performance of students at various levels of educational learning. In this paper, a review of current trends, future trends and applications of pervasive computing was explored, particularly with respect to classroom learning environments, and a generic model of pervasive computing technology was proposed for adoption in classroom learning environments of developing countries, particularly the Nigerian tertiary institution's classroom learning environment.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125198425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A localization algorithm using a mobile beacon in wireless sensor networks 无线传感器网络中使用移动信标的定位算法
2014 Global Summit on Computer & Information Technology (GSCIT) Pub Date : 2014-06-14 DOI: 10.1109/GSCIT.2014.6970114
Majdoub Manel, E. Hamdi
{"title":"A localization algorithm using a mobile beacon in wireless sensor networks","authors":"Majdoub Manel, E. Hamdi","doi":"10.1109/GSCIT.2014.6970114","DOIUrl":"https://doi.org/10.1109/GSCIT.2014.6970114","url":null,"abstract":"The determination of the geographical locations of sensors is one of the important problems in wireless sensor networks. Indeed, the need for position estimation of a node is not only necessary for the operation of network but also for the interpretation of data sent. The use of GPS is a hardware solution that provides good accuracy but expensive and is not available in any environment. However, the use algorithm based on mobile beacon location is a very promising approach. In this paper, we study and analyse the impact of using an algorithm based on least square method when we use different curves (Hilbert, spiral, sinusoidal). Although, we present a detailed analysis of this algorithm. In addition, the performance evaluation and comparison results are obtained by using the Contiki Cooja Simulator.","PeriodicalId":270622,"journal":{"name":"2014 Global Summit on Computer & Information Technology (GSCIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132189950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信