A. Meraoumia, Maarouf Korichi, S. Chitroub, A. Bouridane
{"title":"Hidden Markov models & principal component analysis for multispectral palmprint identification","authors":"A. Meraoumia, Maarouf Korichi, S. Chitroub, A. Bouridane","doi":"10.1109/ICTA.2015.7426898","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426898","url":null,"abstract":"Automatic personal identification from their physical and behavioral traits, called biometrics technologies, is now needed in many fields such as: surveillance systems, access control systems, physical buildings and many more applications. In this paper, we propose an efficient online personal identification system based on Multi-Spectral Palmprint images (MSP) using Hidden Markov Model (HMM) and Principal Components Analysis (PCA). In this study, the band image {RED, BLUE, GREEN and Nearest-InfraRed (NIR)} is rotated with different orientations then applying the PCA technique to each oriented image, to decorrelate the image columns, and concentrate the information content on the first components of the transformed vectors. Thus, the observation vector is formed by concatenate some components of the transformed vectors for all orientations. Subsequently, we use the HMM for modeling the observation vector of each MSP. Finally, log-likelihood scores are used for MSP matching. Our experimental results show the effectiveness and reliability of the proposed approach, which brings both high identification and accuracy rate.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128111853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Imane Lmati, Fatima Zahra Guerss, Mohammed Aitdaoud, K. Douzi, H. Benlahmar, M. Talbi, N. Achtaich, A. Namir
{"title":"Alignment between two domain ontologies (Case of educational orientation in mathematics education)","authors":"Imane Lmati, Fatima Zahra Guerss, Mohammed Aitdaoud, K. Douzi, H. Benlahmar, M. Talbi, N. Achtaich, A. Namir","doi":"10.1109/ICTA.2015.7426911","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426911","url":null,"abstract":"Aligning ontologies is of particular importance in applications requiring the inclusion of semantic interoperability, it represents a great interest in the field of heterogeneous management knowledge. We present here the construction of an alignment between two domain ontologies (E-orientation[1], Extented Math Bridge [2]), whose interest is to guide the moroccan student in his learning curriculum. Thus, during the achievement of these activities, the student is automatically redirected to the appropriate exercises suitable to his profile (skills, preferences and motivation) [3]. Our goal is to find the possibility of alignment between the two models, and to determine their corresponding levels. For alignment methodes, we used: morphosyntactic matching technique [4], the resource WordNet [5] and the measuring structural similarity [6]. We also present a discussion of the results realized.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115316263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Imad Mohamed Ouloul, K. Afdel, A. Amghar, Zakaria Moutakki
{"title":"Automatic face recognition with aging using the invariant features","authors":"Imad Mohamed Ouloul, K. Afdel, A. Amghar, Zakaria Moutakki","doi":"10.1109/ICTA.2015.7426876","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426876","url":null,"abstract":"In the field of automatic face recognition, transformations of facial features due to aging cause a problem. Due to small amounts of extracted features, the identity verification can be difficult. The feature-based methods that are present in the literature are still being developed, with unsatisfactory results caused by high rates of false matching. In this paper we present a new method of matching verification of SIFT extracted feature points, which uses both the positions and scales of feature points. By using this method and the SIFT descriptor, we develop an identity verification system robust to aged based facial features transformations. The application of our verification system in the FG-net database demonstrates our approach's performance. The experimental results show that if 16.66% false acceptance rate is admitted, 81.81% true matching rate is obtained.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123260481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed Aitdaoud, Fatima Zahra Guerss, Imane Lmati, A. Namir, M. Talbi, H. Benlahmar, N. Achtaich, K. Douzi
{"title":"Standardized modeling learners ontology «SLMonto» to support interactive learning environment","authors":"Mohammed Aitdaoud, Fatima Zahra Guerss, Imane Lmati, A. Namir, M. Talbi, H. Benlahmar, N. Achtaich, K. Douzi","doi":"10.1109/ICTA.2015.7426899","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426899","url":null,"abstract":"One of the most important element for adapting and personalizing Technology-Enhanced Learning (TEL) is the learner model because it contains a lot of useful information about an individual such as learning preferences, academic performance and learning styles. These latter, which are increasingly being incorporated into TEL, and seems to be a promising concept for making learning easier for students. The application of these concepts in traditional learning is almost impossible as we only have one teacher with thirty or even hundreds of students in a class, so he can not apply an adaptive learning for each of them. However, the emergence of adaptive learning management system (LMS) offers a great advantage for students, as it allows them to have a personalized learning process that can be suited with their needs and characteristics. Now days, many researchers has been working in this area. The purpose of this article is to propose a learner model ontology SLMonto based on popular student modeling standards. As well as the representation of the prior knowledge of the student's performance, motivation, and the learning style which is adapted from Felder-Silverman Learning Style Model.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121893167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing cost and response time for data intensive services' composition based on ABC algorithm","authors":"A. Bousrih, Zaki Brahmi","doi":"10.1109/ICTA.2015.7426888","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426888","url":null,"abstract":"Various experts, large institutions (like the US MIT 1) administrations and specialists in the field of technology consider data-intensive services as one of the major IT challenges of the 2010-2020 decade and made it one of their new priorities for researches and development. This type of application is observed in several scientific fields such as biology, astronomy, cosmology, social sciences and climate. Considering data-intensive Web services and the cloud together, where data play the dominant role in the execution of the data-intensive service composition, the cost and response time of data sets and services influence the quality of the whole composition. Thus, we propose a novel approach towards minimizing cost response time and energy consumption for composite data-intensive services. It uses the artificial bee colony algorithm in order to select and find the optimal cost and response time of a data-intensive service. The newly composed data-intensive service will be an outstanding contribution to composite data-intense services research.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129584194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile app permissions awareness","authors":"S. Negash, H. Shahriar","doi":"10.1109/ICTA.2015.7426873","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426873","url":null,"abstract":"When asked about permissions to download apps most, if not all, of us have been guilty of clicking the \"agree\" button without considering permission risks. To be honest the only way to download the app is by agreeing to \"all\" permissions since there is no option for partial permissions. Many popular Android apps including Facebook Messenger, WhatsApp, Skype, Twitter, and Instagram get user permissions during installation. These permissions include recording with the phone audio and video at any time, calling contacts without additional permissions, and modifying the USB storage contents. Lack of education and awareness about permissions may have significant negative consequences. This research evaluates effectiveness of a demo app with visual ques to increase permissions awareness and avoid negative consequences.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115788210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic generation of fuzzy logic components for enhancing the mechanism of learner's modeling while using educational games","authors":"Mohamed Ali Khenissi, Fathi Essalmi","doi":"10.1109/ICTA.2015.7426879","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426879","url":null,"abstract":"Working memory is the system used by every human for temporarily storing and managing the information required to carry out complex cognitive tasks such as learning, reasoning and comprehension. In particular, working memory capacity plays an important role in learning process, because learner often have to hold information in mind while engaged in a learning activities. Having information about learners' WMC could be helpful to support them during the learning process. Khenissi et al. [1] proposed an approach based on fuzzy logic for learner's modeling while using educational games and/or e-learning system. This paper will detail the description of the mechanism proposed by Khenissi et al. [1]. Furthermore, it will describe how the system architecture will be improved by the automatic generation of the fuzzy logic components. In particular, the machine learning, web services and the model of educational games are adopted for automatically generate the components of the fuzzy logic system. The automatic generation of these components will help the expert in parameterizing them, and thus better estimation of the learner's WMC.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131445448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nihad Elghouch, Yassine Zaoui Seghroucheni, E. En-Naimi, Badr Eddine El Mohajir, Mohammed Al Achhab
{"title":"An application to index the didactic resources in an adaptive learning system (ALS)","authors":"Nihad Elghouch, Yassine Zaoui Seghroucheni, E. En-Naimi, Badr Eddine El Mohajir, Mohammed Al Achhab","doi":"10.1109/ICTA.2015.7426893","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426893","url":null,"abstract":"In this paper we provide an application to index the didactic resources intended to run in an adaptive learning system, which operates using the Learning styles of Felder-Silverman and according to the recommendations of the differentiated pedagogy, by offering multiple versions of the same learning object. The established application relates on the learning objects designed true to the SCORM standard, which are created by exe eLearning software. The main reason behind the implementation of this application, is to offer the possibility to index the didactic resources, available in the adaptive learning system, with so much information about the learning objects, that usually are not available in the common learning objects' softwares, mainly the learning styles and teaching styles, since the adaptive learning system which we take as a basis, relies a lot on this kind of information, to correct the generated learning paths in case it turned out to be not the leading ones.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124007998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-assessment through serious game","authors":"Meriem Rjiba, L. Cheniti-Belcadhi","doi":"10.1109/ICTA.2015.7426920","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426920","url":null,"abstract":"The activity of the traditional learning is defined as an activity of transmission of information following a single direction from a teacher to a student. The student is thus as a passive recipient of information without reacting or participating in resolution of real problems. Given the evolution of learning methods, teachers now have the opportunity to introduce games with an educational purpose to facilitate learning. The Serious Games is a continuous evolution and accelerated. This type of learning is integrated in teaching and in several areas. It is used to combine both serious aspects such as teaching, learning and playfulness through these games. After the learning process, assessment is the most important step in determining the learning' and the level of validation of learning objectives through the use of different valuation technics. It is therefore interesting to involve learners in the assessment process. This paper presents a novel approach regarding self-assessment in serious game. We address the needs of serious games as well as a review of existing research work in this field. To enrich learning aspect of serious games, we propose the integration of self-assessment modules in serious games. This integration is reflected in the design of an ontology representing different concepts.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129218959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Messaoud, K. Ghédira, Youssef Ben Halima, H. Ghézala
{"title":"Survey of web service composition","authors":"W. Messaoud, K. Ghédira, Youssef Ben Halima, H. Ghézala","doi":"10.1109/ICTA.2015.7426900","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426900","url":null,"abstract":"A Web service (WS) is called compound or composite when its execution involves interactions with other WS to use their features. The composition of WS specifies which services need to be invoked, in what order and how to handle exception conditions. This paper gives an overview of research efforts of WS composition. The approaches proposed in the literature are diverse, interesting and have opened important research areas. Based on many studies, we extracted the most important role of WS composition use in order to facilitate its introduction in WS concept.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"348 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115298548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}