Anis Mezghani, Fouad Slimane, S. Kanoun, V. Märgner
{"title":"Printed/handwritten Arabic script identification using local features and GMMs","authors":"Anis Mezghani, Fouad Slimane, S. Kanoun, V. Märgner","doi":"10.1109/ICTIA.2014.7883758","DOIUrl":"https://doi.org/10.1109/ICTIA.2014.7883758","url":null,"abstract":"Since printed/handwritten Arabic text recognition is a very challenging research field and the recognition methodologies are different, it is important to separate these two types of texts before the recognition phase. In this paper, we introduce a simple and effective method to identify printed and handwritten Arabic words using local features. A Gaussian Mixture Models (GMMs) based approach is used to model the printed and handwritten classes. Experimental results using some parts of the freely available IFN/ENIT, AHTID/MW and APTI databases show that our method is robust and provides very good identification performance.","PeriodicalId":390925,"journal":{"name":"2014 Information and Communication Technologies Innovation and Application (ICTIA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126357666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of the thickness of scale on the inner surface of water pipes by infrared thermography","authors":"A. Saifi, A. Elhassnaoui, A. Elamiri, S. Sahnoun","doi":"10.1109/ICTIA.2014.7883756","DOIUrl":"https://doi.org/10.1109/ICTIA.2014.7883756","url":null,"abstract":"The infrared thermography technique developed in the present study was successfully applied to determine the scale thicknesses of the steel pipe. We aim to estimate the thickness of the scale on the inner surfaces by calculation of the maximum temperature of the infected pipe heated surface. Dimensions of the pipe and those of the layer of scale are taken as geometrical parameter. We have studied the effect of each one on the thermal response of the considered structure. These information are important for determining dangerous state of water distribution network.","PeriodicalId":390925,"journal":{"name":"2014 Information and Communication Technologies Innovation and Application (ICTIA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115139814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Production of origin destination matrix by extracting information from unstructured textual data","authors":"Mohamed Mejri, S. Turki, S. Faiz","doi":"10.1109/ICTIA.2014.7883763","DOIUrl":"https://doi.org/10.1109/ICTIA.2014.7883763","url":null,"abstract":"In this paper, we present an approach for the production of origin destination matrices by extracting information from unstructured textual data of websites. This approach, which we called “Origin Destination Matrix Extractor” is based on three main modules of Information Extraction: an extraction of events module with which we tried to extract any travel events contained in a given text, a named entity recognition module for the recovery and detection of named entities that correspond to the different target information and finally a dependency syntactic analysis module to check the existence of interdependencies between extracted entities and detected travel events. The experiments carried out on a set of real data show that the proposed method gives satisfactory results with a precision of over 90%.","PeriodicalId":390925,"journal":{"name":"2014 Information and Communication Technologies Innovation and Application (ICTIA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124405330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposition to distinguish machine-printed from handwritten Arabic and Latin words","authors":"Asma Saïdani, A. Echi, A. Belaïd","doi":"10.1109/ICTIA.2014.7883770","DOIUrl":"https://doi.org/10.1109/ICTIA.2014.7883770","url":null,"abstract":"In this work, we gathered some contributions to identify script and its nature. We successfully employed many features to distinguish between handwritten and machine-printed Arabic and Latin scripts at word level. Some of them are previously used in the literature, and the others are here proposed. The new proposed structural features are intrinsic to Arabic and Latin scripts. The performance of all extracted features is studied towards this paper. We also compared the performance of three classifiers: Bayes (AODEsr), k-Nearest Neighbor (k-NN) and Decision Tree (J48), used to identify the script at word level. These classifiers have been chosen enough different to test the feature contributions. We carried experiments using standard databases. Obtained results demonstrate used feature capability to capture differences between scripts. Using a set of 58 selected features and a Bayes-based classifier, we achieved an average identification rate equals to 98.72%, which considered a very satisfactory rate compared to some related works.","PeriodicalId":390925,"journal":{"name":"2014 Information and Communication Technologies Innovation and Application (ICTIA)","volume":"56 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120921482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy model for multicriteria decision making","authors":"Rekik Ali, Temani Moncef, Ghedira Khaled","doi":"10.1109/ICTIA.2014.7883753","DOIUrl":"https://doi.org/10.1109/ICTIA.2014.7883753","url":null,"abstract":"Multiple criteria decision making (MCDM) shows signs of becoming a maturing field. There are four quite distinct families of methods: (i) the outranking, (ii) the value and utility theory based, (iii) the multiple objective programming, and (iv) group decision and negotiation theory based methods. Fuzzy MCDM has basically been developed along the same lines, although with the help of fuzzy set theory a number of innovations have been made possible; the most important methods are reviewed and a novel approach — interdependence in MCDM — is introduced. In this paper we propose a model of an expert system for MCDM under uncertainty to improve company competitiveness.","PeriodicalId":390925,"journal":{"name":"2014 Information and Communication Technologies Innovation and Application (ICTIA)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127833939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced hybrid tracking through neural network regression","authors":"M. Frad, H. Maaref, Abdellatif Matibaa, S. Otmane","doi":"10.1109/ICTIA.2014.7883766","DOIUrl":"https://doi.org/10.1109/ICTIA.2014.7883766","url":null,"abstract":"We present an optical-haptic tracking system suitable for augmented and virtual reality applications. The paper addresses tow issues of such system. The first one concerns the calibration method that can be used to calibrate the force feedback device: SPIDAR. The second contribution is about the development of a hybrid tracking system. The proposed hybridization aims to provide both accurate and interrupted position data.","PeriodicalId":390925,"journal":{"name":"2014 Information and Communication Technologies Innovation and Application (ICTIA)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124430665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shape description for Arabic character recognition: A comparative study","authors":"F. Kallel, S. Kanoun","doi":"10.1109/ICTIA.2014.7883762","DOIUrl":"https://doi.org/10.1109/ICTIA.2014.7883762","url":null,"abstract":"In this paper a shape description for Arabic character recognition was presented. In the literature, shape description approaches are classified into either statistical or structural. In our work, we proceeded with a comparative study to compare the different shape descriptions using the same approaches and dataset of the Arabic characters. Our finds proved that the structural approach relying on the Freeman code chain achieved better recognition rates. In addition, the combination of geometrical moments, the Fourier Descriptor and the structural feature allow to improve the rates even when compared to the structural approach.","PeriodicalId":390925,"journal":{"name":"2014 Information and Communication Technologies Innovation and Application (ICTIA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129446997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Progress of the algorithm Q-learning in a field POMDP “application of merger of cubes”","authors":"Saadana Mourad, Boughizane Jalel, A. Ajroud","doi":"10.1109/ICTIA.2014.7883771","DOIUrl":"https://doi.org/10.1109/ICTIA.2014.7883771","url":null,"abstract":"This article is part of the field of artificial intelligence (AI), specifically it deals with reinforcement learning techniques to solve a problem modeled by Markov decision processes partially observed (POMDP). The objective in this article is to design an algorithm (based on the algorithm Q-learning) to be implemented on agents, immersed in an environment with partial perceptions and incomplete knowledge, which through their interactions will move together to converge towards a goal. The experimentation of our algorithm on the problem of merger of cubes gave interesting results.","PeriodicalId":390925,"journal":{"name":"2014 Information and Communication Technologies Innovation and Application (ICTIA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128983212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nearest cluster center decision in hierarchical classification process","authors":"K. Djemal, H. Maaref","doi":"10.1109/ICTIA.2014.7883767","DOIUrl":"https://doi.org/10.1109/ICTIA.2014.7883767","url":null,"abstract":"The hierarchical classification method based on SVM multi learning process has proved its abilities to classify large databases. However, some misclassification can be detected through the hierarchy levels. To minimize these errors and improving the rate of classification, we propose to use Nearest Cluster centers (NCC) in the hierarchy structure to correct the classification ambiguities. Obtained results on IRIS database prove the given improvement of global classification rate.","PeriodicalId":390925,"journal":{"name":"2014 Information and Communication Technologies Innovation and Application (ICTIA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130810710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The k-unobservability: A new privacy protection guarantee for e-service systems","authors":"W. Hammami, Lamjed Ben Said","doi":"10.1109/ICTIA.2014.7883761","DOIUrl":"https://doi.org/10.1109/ICTIA.2014.7883761","url":null,"abstract":"Privacy threats are considered as very serious issues in Internet-based applications such as e-services since there are good opportunities to malicious attacks. Protecting the user from being observed when requesting an e-service is a fundamental right that any user should have. The unobservability is among the basic privacy properties. However, most of the existing privacy preserving techniques has difficulties to achieve this property, and only a few of them use it in the context of mobile communications. In this paper, we propose a new privacy-preserving model, called k-unobservability that enables to achieve the privacy protection of e-service users. The model guarantees that the pseudonyms used to identify sensitive data contained in the user credentials, are related to no less than k actions (credential showings). Inspired from the efficient k-anonymity model, the k-unobservability provides a new guarantee of privacy protection in e-services. The experimentation results discussed in this paper, demonstrate the performance and applicability of our proposed model.","PeriodicalId":390925,"journal":{"name":"2014 Information and Communication Technologies Innovation and Application (ICTIA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124912552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}