2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)最新文献

筛选
英文 中文
Enhancing young children's mathematics skills using serious game approach 用严肃的游戏方法提高幼儿的数学技能
Y. Tazouti, S. Boulaknadel, Y. Fakhri
{"title":"Enhancing young children's mathematics skills using serious game approach","authors":"Y. Tazouti, S. Boulaknadel, Y. Fakhri","doi":"10.1109/ICTA.2015.7426918","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426918","url":null,"abstract":"So far the integration of ICT in the Moroccan education system is unsatisfying to develop students' capacity. Furthermore the Arabic serious games dealing with mathematics are completely absent in the digital resources produced during the GENIE1 program. We propose an Arab mathematics serious game model, which aims to produce a tool to enhance mathematics skills for 5th and 6th year learners of primary school.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128719997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Maximization the lifetime of wireless sensor networks 最大化无线传感器网络的寿命
Nouredine Seddiki, Amel Douli
{"title":"Maximization the lifetime of wireless sensor networks","authors":"Nouredine Seddiki, Amel Douli","doi":"10.1109/ICTA.2015.7426901","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426901","url":null,"abstract":"The technological developments in microelectronics have enabled the integration of capacity for realization of several important tasks for monitoring the environment in very small sensor named components with low cost and low power consumption. A sensor node detects environmental phenomenon to obtain data and transmits them to the sink via a single hop or multi-hop path in wireless sensor network applications. For monitoring applications, a topology of tree or forest is often used to collect data of global detection. The tree or forest is built after the initial deploying of nodes and rebuilt on important topology changes. As the sensor node has limited energy, how to build a good tree to prolong the lifetime of the network is an important problem. In this paper we propose an approach for optimizing the lifetime of sensors network. First, we divide our network into disjoints sets, where each one represents a tree (tree's construction), than we optimize the lifetime of network by using an efficient algorithm for balancing weight between trees in the network.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116743570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient object matching using partial dominant orientation descriptor 使用部分主导方向描述符的有效对象匹配
Abdessamad Elboushaki, Rachida Hannane, K. Afdel, L. Koutti
{"title":"Efficient object matching using partial dominant orientation descriptor","authors":"Abdessamad Elboushaki, Rachida Hannane, K. Afdel, L. Koutti","doi":"10.1109/ICTA.2015.7426907","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426907","url":null,"abstract":"This paper presents a method for extracting a new feature descriptor, named Partial Dominant Orientation Descriptor (PDOD), which can be used to perform reliable matching between objects with similar as well as different textures. The object is represented by a set of key locations of stable points using Difference of Gaussian, so that the matching can proceed successfully despite changes in viewpoint, scale, illumination, and distortions. The proposed descriptor at feature point takes into account the position and partially computes the dominant orientations of other key locations relative to this point, thus, offering a global discriminative characterization. The correspondence between two objects is performed by matching each key location in the first object independently to the set of key locations extracted from the second object using Euclidian distance. The one with the smallest distance is picked as the best candidate match. The descriptor is highly distinctive, and provides robust matching across a substantial range of rotation variance, change in textures, and object deformation. Our experiments on KONKLAB public dataset indicate that our method outperforms other benchmarks such as SIFT, PCA-SIFT and SURF matching algorithms.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131590986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Arab gloss annotation system for Arabic Sign Language 阿拉伯语手语注释系统
Nadia Aouiti, M. Jemni
{"title":"Arab gloss annotation system for Arabic Sign Language","authors":"Nadia Aouiti, M. Jemni","doi":"10.1007/978-3-319-41267-2_56","DOIUrl":"https://doi.org/10.1007/978-3-319-41267-2_56","url":null,"abstract":"","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122957226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An approach to assist learners to identify their learning objectives in personal learning environment (PLE) 一种帮助学习者在个人学习环境中确定学习目标的方法
Belhassen Guettat, Ramzi Farhat
{"title":"An approach to assist learners to identify their learning objectives in personal learning environment (PLE)","authors":"Belhassen Guettat, Ramzi Farhat","doi":"10.1109/ICTA.2015.7426934","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426934","url":null,"abstract":"This paper deals with the problematic of the structured personal learning environment design. We describe our approach which has the particularity to put some order within personal learning environment. Moreover, we propose in our approach to assist the learner in the more complex phases of his learning. In fact, an effective learning experience must be based on a clear learning objective and a detailed curriculum describing the specific learning objectives. In traditional learning systems, online or offline, those tasks are made by experts. However in personal learning environment, the learner himself must build the personal learning environment. Thanks to our approach throw the use of ontologies, Bloom taxonomy, and learner profile, is able to assist the learner to accomplish the mentioned tasks without a direct need for experts.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131112150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A comparative study of routing protocols in WSN WSN中路由协议的比较研究
Hanane Aznaoui, S. Raghay, Layla Aziz, Addi Ait-Mlouk
{"title":"A comparative study of routing protocols in WSN","authors":"Hanane Aznaoui, S. Raghay, Layla Aziz, Addi Ait-Mlouk","doi":"10.1109/ICTA.2015.7426884","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426884","url":null,"abstract":"Wireless sensor network (WSN) is a technology that comes in response to the essential need of observing and controlling critical phenomenon. Nevertheless, this advanced technology is still limited due to many problems such as routing protocols, energy consumption, security and data aggregation. Being able to classify routing protocols, we proposed to use a new approach based on multiple criteria analysis in which we use protocols as actions and directed by decision maker's preferences.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129253533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
VANET congestion control approach using empathy 利用移情的VANET拥塞控制方法
A. Idrissi, Abdelquoddouss Laghrissi, Sara Retal, Hajar Rehioui
{"title":"VANET congestion control approach using empathy","authors":"A. Idrissi, Abdelquoddouss Laghrissi, Sara Retal, Hajar Rehioui","doi":"10.1109/ICTA.2015.7426938","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426938","url":null,"abstract":"As researchers got interested in the vehicular ad hoc networks (VANET), several approaches and uses have been given. One of the most interesting is the network congestion control in an ad hoc environment. Our work consists of introducing a new approach in congestion control of Vehicular Ad Hoc Networks (VANET), using a new model. Our model is based on the hop by hop congestion control methods. This approach implements an interesting concept of empathy that will be detailed further. We will model our problem using the Constraint Programming, and then a solver will be given to conclude with the satisfying obtained results, that we compared with a hop-by-hop approach.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134296227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance analysis of the Vehicular Ad hoc Networks (VANET) routing protocols AODV, DSDV and OLSR 车载自组织网络(VANET)路由协议AODV、DSDV和OLSR的性能分析
Barkouk Hamid, En-Naimi El Mokhtar
{"title":"Performance analysis of the Vehicular Ad hoc Networks (VANET) routing protocols AODV, DSDV and OLSR","authors":"Barkouk Hamid, En-Naimi El Mokhtar","doi":"10.1109/ICTA.2015.7426885","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426885","url":null,"abstract":"The VANET (Vehicular Ad hoc Network) is a collection of mobile nodes forming a temporary network on variable topology, operating without a base station and without a centralized administration. The characteristics of VANET network that distinguishes it from other ad hoc networks, such as high mobility and communication with the infrastructure to support security or comfort applications, have prompted researchers to develop models and mobility specific protocols. The main goal of this paper is firstly to compare the performance of three Ad hoc routing protocols: Optimized Link State Routing (OLSR), Ad-hoc On-Demand Distance Vector (AODV) and Destination-Sequenced Distance Vector (DSDV) and secondly, to examine the impact of varying mobility, density and pause time on the functionality of these protocols. The results of this paper demonstrate that AODV have better performance in terms of Throughput and Packets Delivery Rate (PDR), whereas OLSR have best performance in terms of Packet Delivery Time (Delay).","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"90 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129833071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Metadata protection scheme for JPEG privacy & security using hierarchical and group-based models 使用分层和组模型的JPEG隐私和安全元数据保护方案
Jonathan Lepsoy, Suah Kim, Dessalegn Atnafu, Hyoung-Joong Kim
{"title":"Metadata protection scheme for JPEG privacy & security using hierarchical and group-based models","authors":"Jonathan Lepsoy, Suah Kim, Dessalegn Atnafu, Hyoung-Joong Kim","doi":"10.1109/ICTA.2015.7426905","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426905","url":null,"abstract":"Privacy and intellectual rights management is becoming an important topic. The existing social network services (SNS) have many limitations in meeting consumers' expectations of their privacy and intellectual rights management. Metadata management in SNS is heterogeneous and susceptible to personal identification and copyright information misuses. There are cases where consumers are not informed in how their metadata is shared and used, while the copyrights of images are removed without the owner's consent. In this paper, we propose two metadata protection models called hierarchical and group-based model. The models are analyzed and evaluated with respect to the interest of user and services.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"5 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130098271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Gateway selection in Vehicular Ad-hoc Network 车载自组网中的网关选择
A. Idrissi, Sara Retal, Hajar Rehioui, Abdelquoddouss Laghrissi
{"title":"Gateway selection in Vehicular Ad-hoc Network","authors":"A. Idrissi, Sara Retal, Hajar Rehioui, Abdelquoddouss Laghrissi","doi":"10.1109/ICTA.2015.7426937","DOIUrl":"https://doi.org/10.1109/ICTA.2015.7426937","url":null,"abstract":"Mobile gateways are deployed to improve Internet services in Vehicular Ad-hoc Network (V aNet). In this vein, this paper argues the need for selecting an appropriate gateway for vehicles without access to the Internet according to certain criteria and based on a gateway discovery system. The proposed solution introduces a method of multiple-criteria decision analysis helping to find suitable gateways to our problem with two main design goals: i) minimizing the number of overloaded gateways ii) maximizing the number of connected vehicles. The two design goals effectively represent two conflicting objectives that we deal with finding a tradeoff in simulation results.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121796514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信