Second International Conference on the Innovative Computing Technology (INTECH 2012)最新文献

筛选
英文 中文
Detection evaluation and testing region incoming people's in a simple camera view 检测评价和测试区域传入的人在一个简单的相机视图
Second International Conference on the Innovative Computing Technology (INTECH 2012) Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457804
Abderrahmane Ezzahout, Y. Hadi, R. Thami
{"title":"Detection evaluation and testing region incoming people's in a simple camera view","authors":"Abderrahmane Ezzahout, Y. Hadi, R. Thami","doi":"10.1109/INTECH.2012.6457804","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457804","url":null,"abstract":"Moving object detection is considered as a crucial phase of automatic video surveillance systems, particularly, people detection is the first important step in any technique of video analysis processes which can be divided in many stations as motion estimation, tracking people etc. Several methods have been developed for this problem of separating the foreground and background pixels in video surveillance. This paper focuses on computable evaluation of some people detection algorithms for four different video sequences. Our study is based on quantitative and qualitative results respectively by calculating the loss of foreground pixels. Particularly, Three methods have been evaluated by using two metrics: False Negative Error (FNE) and False Positive Error (FPE). In the result we choose the algorithm witch minimize the Error (%). Practically the good technique which dominates on the video surveillance applications is the statistical representation of pixels in foreground which named Gaussian Mixture Model (GMM). In the second part of this paper we control the people entering in a supervised region and we trigger an alarm system in order to find out person presence.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"34 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123144295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Min-Sum Algorithm based efficient high level methodology for design, simulation and hardware implementation of LDPC decoders 基于最小和算法的LDPC解码器设计、仿真和硬件实现的高效高级方法
Second International Conference on the Innovative Computing Technology (INTECH 2012) Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457751
A. Madi, A. Ahaitouf, A. Mansouri
{"title":"Min-Sum Algorithm based efficient high level methodology for design, simulation and hardware implementation of LDPC decoders","authors":"A. Madi, A. Ahaitouf, A. Mansouri","doi":"10.1109/INTECH.2012.6457751","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457751","url":null,"abstract":"A Variable Node Processing Unit (VNPU) and a Check Node Processing Unit (CNPU) are designed in order to be used in Low Density Parity Check (LDPC) decoding by the Min-Sum Algorithm (MSA). The designed blocks are fully parallel and flexible to be used for different block length when a regular (3, 6) LDPC codes are required. The proposed VNPU and CNPU have been first designed and implemented in software using Simulink tool following a modular design approach. In a second step, these blocks were described and simulated using Very High Speed integrated circuits Hardware Description Language (VHDL). Comparison between these two implementations shows that the proposed high level methodology is efficient to test and validate digital circuits before being implemented on desired Field Programmable Gate Array (FPGA) device.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131610885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LMSGENERATOR: The contribution of XML technology and model transformations LMSGENERATOR: XML技术和模型转换的贡献
Second International Conference on the Innovative Computing Technology (INTECH 2012) Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457811
R. Dehbi, Mohamed Talea, A. Tragha
{"title":"LMSGENERATOR: The contribution of XML technology and model transformations","authors":"R. Dehbi, Mohamed Talea, A. Tragha","doi":"10.1109/INTECH.2012.6457811","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457811","url":null,"abstract":"The generative engineering is revolutionizing software development just as automation and componentization revolutionized manufacturing. Key technologies for the development of this approach are the model transformations and XML technologies. In this paper we show the contribution of these two techniques in the implementation of a learning management system generator which is multi-target and adaptable to different runtime environment, that we named LMSGENERATEUR. Our innovation introduces the basics of a new programming approach of virtual learning environments. This approach is based on generative programming that integrates the user specifications (abstract models) and technologies desired in order to produce bricks software, then put them together to produce a solution adapted to area and users' needs. In this paper, we present our approach, the implementation of our approach: LMSGENERATOR and these two phases of generation based on transformation model and abstract XML descriptions and we promote the idea that using this approach based on open business models, adaptable, and scalable to obtain open learning environments, adaptable, and scalable. Specifically, thanks to the generative programming, new technologies or new needs can be easily integrated at any time simply by changing the generators and their transformation rule.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"75 2-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126985870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Road-signs detection by using of colour image segmentation method based on the 3D content correlation 基于三维内容相关的彩色图像分割方法在道路标志检测中的应用
Second International Conference on the Innovative Computing Technology (INTECH 2012) Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457820
H. Bendahri, A. Ezzine
{"title":"Road-signs detection by using of colour image segmentation method based on the 3D content correlation","authors":"H. Bendahri, A. Ezzine","doi":"10.1109/INTECH.2012.6457820","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457820","url":null,"abstract":"This paper presents a method for segmentation of color images based on the statistical nature of the image. This method is designed to address the problem of detecting road signs in an image taken with a sensor embarked on a vehicle under natural conditions.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"27 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114035653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building semantic richness among natural language content 在自然语言内容中构建语义丰富性
Second International Conference on the Innovative Computing Technology (INTECH 2012) Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457821
S. Al-reyaee, P. Vijayakumar
{"title":"Building semantic richness among natural language content","authors":"S. Al-reyaee, P. Vijayakumar","doi":"10.1109/INTECH.2012.6457821","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457821","url":null,"abstract":"In this work we propose Inclusive vector to keep the key words available in natural language database. The inclusive vectors are generated by the process of extraction of words given in the source and the cited items of records published in the ISI Thompson Citation Indexes. The proposed inclusive vector exhibits related words and the degree of their relationships. In this work we present the results of the implications of using vectors on the automatic classification of natural language text. In this system, preprocessed documents, extra words as well as word stems are at first found. We have used an enhanced algorithm to bring further semantic relations between the cited and source items in citation databases.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123957823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information security, new approach 信息安全,新途径
Second International Conference on the Innovative Computing Technology (INTECH 2012) Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457815
H. Elachgar, B. Regragui
{"title":"Information security, new approach","authors":"H. Elachgar, B. Regragui","doi":"10.1109/INTECH.2012.6457815","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457815","url":null,"abstract":"The present paper deals with the 4th wave of the Information Security as a new approach to governance of information security. After introducing the four waves of information security, is focused on the last part which will be part of our thesis. In addition, following the PDCA approach (Plan, Do Check, Act), we will establish an inventory of information system with the SoM (Statement of Maturity), a risk assessment of assets, a business continuity plan to ensure a resumption of IT.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121481909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Cloud computing approach based on mobile agents for Web services discovery 一种基于移动代理的云计算方法,用于Web服务发现
Second International Conference on the Innovative Computing Technology (INTECH 2012) Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457745
Saouli Hamza, Benharkat Aïcha-Nabila, K. Okba, A. Youssef
{"title":"A Cloud computing approach based on mobile agents for Web services discovery","authors":"Saouli Hamza, Benharkat Aïcha-Nabila, K. Okba, A. Youssef","doi":"10.1109/INTECH.2012.6457745","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457745","url":null,"abstract":"The increasing use of Web services as well as the growing interest lent to Cloud computing technology and its capacity of calculation, storage and Cloud services, impose today that the traditional mechanisms of discovery must be re-examined. This specificity of discovery over the cloud led us to propose a new approach based on mobile agents dedicated to Web services discovery. More accurately, we propose a new algorithm of comparison between the request of the client and the description of the Web services. Our system is composed of two areas of Cloud. The first deals with Key words based research and second supports the filtering of the found web services. This discovery is performed by an algorithm based on the calculation of similarities between the request and the description of the web services.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115452613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Towards effective processing of large text collections 朝着有效处理大型文本集合的方向发展
Second International Conference on the Innovative Computing Technology (INTECH 2012) Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457784
J. Szymański, H. Krawczyk
{"title":"Towards effective processing of large text collections","authors":"J. Szymański, H. Krawczyk","doi":"10.1109/INTECH.2012.6457784","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457784","url":null,"abstract":"In the article we describe the approach to parallel implementation of elementary operations for textual data categorization. In the experiments we evaluate parallel computations of similarity matrices and k-means algorithm. The test datasets have been prepared as graphs created from Wikipedia articles related with links. When we create the clustering data packages, we compute pairs of eigenvectors and eigenvalues for visualizations of the datasets. We describe the method used for evaluation of the clustering quality. Finally we discuss achieved results, point some improvements and perspectives for future development.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115672252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation based evaluation of MANET routing protocols for static WSN 基于仿真的静态WSN无线局域网路由协议评估
Second International Conference on the Innovative Computing Technology (INTECH 2012) Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457750
Ali A. S. Ihbeel, H. Sigiuk, Abdelhadi A. Alhnsh
{"title":"Simulation based evaluation of MANET routing protocols for static WSN","authors":"Ali A. S. Ihbeel, H. Sigiuk, Abdelhadi A. Alhnsh","doi":"10.1109/INTECH.2012.6457750","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457750","url":null,"abstract":"Wireless Sensor Networks (WSNs) have been regarded as distinguished Ad Hoc networks that can be used for specific applications. Since a WSN consists of potentially hundreds of low cost, small size and battery powered sensor nodes, it has more potentials than other Ad Hoc networks to be deployed in many emerging applications. The WSNs raised many new challenges such as: the design of embedded sensors and wireless networking technologies, in other word the routing protocols. Many Ad Hoc routing protocols such as Ad Hoc On demand Distance Vector (AODV), Dynamic Source Routing Protocol (DSR), and Destination Sequenced Distance Vector (DSDV), which have been developed particularly for the wireless mobile Ad Hoc networks (MANETs), have been proved to perform well on MANETs. In this paper, a performance study will be extended, using some simulation network models, to investigate how well AODV, DSR, and DSDV routing protocols work on WSNs, in static environments, using NS-2 simulator. The performance study will focus on the impact of the network size, network density (up to 500 nodes), and the number of sources (data connections). The performance metrics to be used in this work are average end-to-end delay, packet delivery fraction, routing overheads, and average energy consumption per received packet.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129995264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Optimization of smart choice of shares portfolio using artificial intelligence 利用人工智能优化股票组合的智能选择
Second International Conference on the Innovative Computing Technology (INTECH 2012) Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457769
M. Elhachloufi, Z. Guennoun, F. Hamza
{"title":"Optimization of smart choice of shares portfolio using artificial intelligence","authors":"M. Elhachloufi, Z. Guennoun, F. Hamza","doi":"10.1109/INTECH.2012.6457769","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457769","url":null,"abstract":"In this paper, we present an approach for optimal portfolio choice. This approach is divided into two parts: The first part is to select from an initial portfolio, the relevants shares that have a positive influence on the return and risk portfolio using regression neural networks, i.e: The shares have a low risks and high returns. These shares will built a sub portfolio. In the second part, we seek the proportions that optimize these sub the portfolio whose risk used is semi-variance using genetic algorithms. This approach allows to achieve a financial gain in terms of cost reduction and tax. In addition, a reduction in computational load during the optimization phase.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124650062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信