{"title":"Enhancing young children's mathematics skills using serious game approach","authors":"Y. Tazouti, S. Boulaknadel, Y. Fakhri","doi":"10.1109/ICTA.2015.7426918","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426918","url":null,"abstract":"So far the integration of ICT in the Moroccan education system is unsatisfying to develop students' capacity. Furthermore the Arabic serious games dealing with mathematics are completely absent in the digital resources produced during the GENIE1 program. We propose an Arab mathematics serious game model, which aims to produce a tool to enhance mathematics skills for 5th and 6th year learners of primary school.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128719997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maximization the lifetime of wireless sensor networks","authors":"Nouredine Seddiki, Amel Douli","doi":"10.1109/ICTA.2015.7426901","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426901","url":null,"abstract":"The technological developments in microelectronics have enabled the integration of capacity for realization of several important tasks for monitoring the environment in very small sensor named components with low cost and low power consumption. A sensor node detects environmental phenomenon to obtain data and transmits them to the sink via a single hop or multi-hop path in wireless sensor network applications. For monitoring applications, a topology of tree or forest is often used to collect data of global detection. The tree or forest is built after the initial deploying of nodes and rebuilt on important topology changes. As the sensor node has limited energy, how to build a good tree to prolong the lifetime of the network is an important problem. In this paper we propose an approach for optimizing the lifetime of sensors network. First, we divide our network into disjoints sets, where each one represents a tree (tree's construction), than we optimize the lifetime of network by using an efficient algorithm for balancing weight between trees in the network.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116743570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdessamad Elboushaki, Rachida Hannane, K. Afdel, L. Koutti
{"title":"Efficient object matching using partial dominant orientation descriptor","authors":"Abdessamad Elboushaki, Rachida Hannane, K. Afdel, L. Koutti","doi":"10.1109/ICTA.2015.7426907","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426907","url":null,"abstract":"This paper presents a method for extracting a new feature descriptor, named Partial Dominant Orientation Descriptor (PDOD), which can be used to perform reliable matching between objects with similar as well as different textures. The object is represented by a set of key locations of stable points using Difference of Gaussian, so that the matching can proceed successfully despite changes in viewpoint, scale, illumination, and distortions. The proposed descriptor at feature point takes into account the position and partially computes the dominant orientations of other key locations relative to this point, thus, offering a global discriminative characterization. The correspondence between two objects is performed by matching each key location in the first object independently to the set of key locations extracted from the second object using Euclidian distance. The one with the smallest distance is picked as the best candidate match. The descriptor is highly distinctive, and provides robust matching across a substantial range of rotation variance, change in textures, and object deformation. Our experiments on KONKLAB public dataset indicate that our method outperforms other benchmarks such as SIFT, PCA-SIFT and SURF matching algorithms.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131590986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Arab gloss annotation system for Arabic Sign Language","authors":"Nadia Aouiti, M. Jemni","doi":"10.1007/978-3-319-41267-2_56","DOIUrl":"https://doi.org/10.1007/978-3-319-41267-2_56","url":null,"abstract":"","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122957226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach to assist learners to identify their learning objectives in personal learning environment (PLE)","authors":"Belhassen Guettat, Ramzi Farhat","doi":"10.1109/ICTA.2015.7426934","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426934","url":null,"abstract":"This paper deals with the problematic of the structured personal learning environment design. We describe our approach which has the particularity to put some order within personal learning environment. Moreover, we propose in our approach to assist the learner in the more complex phases of his learning. In fact, an effective learning experience must be based on a clear learning objective and a detailed curriculum describing the specific learning objectives. In traditional learning systems, online or offline, those tasks are made by experts. However in personal learning environment, the learner himself must build the personal learning environment. Thanks to our approach throw the use of ontologies, Bloom taxonomy, and learner profile, is able to assist the learner to accomplish the mentioned tasks without a direct need for experts.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131112150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hanane Aznaoui, S. Raghay, Layla Aziz, Addi Ait-Mlouk
{"title":"A comparative study of routing protocols in WSN","authors":"Hanane Aznaoui, S. Raghay, Layla Aziz, Addi Ait-Mlouk","doi":"10.1109/ICTA.2015.7426884","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426884","url":null,"abstract":"Wireless sensor network (WSN) is a technology that comes in response to the essential need of observing and controlling critical phenomenon. Nevertheless, this advanced technology is still limited due to many problems such as routing protocols, energy consumption, security and data aggregation. Being able to classify routing protocols, we proposed to use a new approach based on multiple criteria analysis in which we use protocols as actions and directed by decision maker's preferences.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129253533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Idrissi, Abdelquoddouss Laghrissi, Sara Retal, Hajar Rehioui
{"title":"VANET congestion control approach using empathy","authors":"A. Idrissi, Abdelquoddouss Laghrissi, Sara Retal, Hajar Rehioui","doi":"10.1109/ICTA.2015.7426938","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426938","url":null,"abstract":"As researchers got interested in the vehicular ad hoc networks (VANET), several approaches and uses have been given. One of the most interesting is the network congestion control in an ad hoc environment. Our work consists of introducing a new approach in congestion control of Vehicular Ad Hoc Networks (VANET), using a new model. Our model is based on the hop by hop congestion control methods. This approach implements an interesting concept of empathy that will be detailed further. We will model our problem using the Constraint Programming, and then a solver will be given to conclude with the satisfying obtained results, that we compared with a hop-by-hop approach.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134296227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of the Vehicular Ad hoc Networks (VANET) routing protocols AODV, DSDV and OLSR","authors":"Barkouk Hamid, En-Naimi El Mokhtar","doi":"10.1109/ICTA.2015.7426885","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426885","url":null,"abstract":"The VANET (Vehicular Ad hoc Network) is a collection of mobile nodes forming a temporary network on variable topology, operating without a base station and without a centralized administration. The characteristics of VANET network that distinguishes it from other ad hoc networks, such as high mobility and communication with the infrastructure to support security or comfort applications, have prompted researchers to develop models and mobility specific protocols. The main goal of this paper is firstly to compare the performance of three Ad hoc routing protocols: Optimized Link State Routing (OLSR), Ad-hoc On-Demand Distance Vector (AODV) and Destination-Sequenced Distance Vector (DSDV) and secondly, to examine the impact of varying mobility, density and pause time on the functionality of these protocols. The results of this paper demonstrate that AODV have better performance in terms of Throughput and Packets Delivery Rate (PDR), whereas OLSR have best performance in terms of Packet Delivery Time (Delay).","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"90 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129833071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jonathan Lepsoy, Suah Kim, Dessalegn Atnafu, Hyoung-Joong Kim
{"title":"Metadata protection scheme for JPEG privacy & security using hierarchical and group-based models","authors":"Jonathan Lepsoy, Suah Kim, Dessalegn Atnafu, Hyoung-Joong Kim","doi":"10.1109/ICTA.2015.7426905","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426905","url":null,"abstract":"Privacy and intellectual rights management is becoming an important topic. The existing social network services (SNS) have many limitations in meeting consumers' expectations of their privacy and intellectual rights management. Metadata management in SNS is heterogeneous and susceptible to personal identification and copyright information misuses. There are cases where consumers are not informed in how their metadata is shared and used, while the copyrights of images are removed without the owner's consent. In this paper, we propose two metadata protection models called hierarchical and group-based model. The models are analyzed and evaluated with respect to the interest of user and services.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"5 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130098271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Idrissi, Sara Retal, Hajar Rehioui, Abdelquoddouss Laghrissi
{"title":"Gateway selection in Vehicular Ad-hoc Network","authors":"A. Idrissi, Sara Retal, Hajar Rehioui, Abdelquoddouss Laghrissi","doi":"10.1109/ICTA.2015.7426937","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426937","url":null,"abstract":"Mobile gateways are deployed to improve Internet services in Vehicular Ad-hoc Network (V aNet). In this vein, this paper argues the need for selecting an appropriate gateway for vehicles without access to the Internet according to certain criteria and based on a gateway discovery system. The proposed solution introduces a method of multiple-criteria decision analysis helping to find suitable gateways to our problem with two main design goals: i) minimizing the number of overloaded gateways ii) maximizing the number of connected vehicles. The two design goals effectively represent two conflicting objectives that we deal with finding a tradeoff in simulation results.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121796514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}