Y. Elhadj, Ahmed Abdelali, Rachid Bouziane, Adel Ammar
{"title":"Revisiting Arabic Part of Speech Tagsets","authors":"Y. Elhadj, Ahmed Abdelali, Rachid Bouziane, Adel Ammar","doi":"10.1109/AICCSA.2014.7073282","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073282","url":null,"abstract":"Assigning the appropriate grammatical category to a word given a context is very important step in major areas of natural language processing. A limited numbers of Part of Speech Taggers currently exist for Arabic. These taggers mainly adopt tagsets that were developed for languages such as English. In this paper we present an effort of proposing a revised categories for Arabic POS tags that would take into consideration the richness of the language as well as its compatibility for automatic processing.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116805895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative study of best spectral bands selection systems for face recognition","authors":"Hamdi Jamel Bouchech, S. Foufou","doi":"10.1109/AICCSA.2014.7073255","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073255","url":null,"abstract":"Multispectral images (MI) have shown promising capabilities to solve problems resulting from high illumination variation in face recognition. However, the use of MI, with the huge number of captured spectral bands for each subject, is impractical unless a system for best spectral bands selection (BSBS) is used. In this work, first we give an up to date overview of the existing BSBS techniques proposed for face recognition. We aim to highlight the imporatnce of this component of MI based systems. The reviewed techniques are then experimented using the multispectral face database IRIS - M3 to compare their performances. To the best of our knowledge this is the first study that reviews and compares existing techniques for BSBS. The Obtained results emphasized the importance of setting up techniques for BSBS with MI based systems as well as the need for new techniques that investigate better the increasing speed of image processing tools.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123157398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic Web Service ontology construction: A reverse engineering approach","authors":"H. E. Bouhissi, M. Malki","doi":"10.1109/AICCSA.2014.7073194","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073194","url":null,"abstract":"The Semantic Web Services (SWS) technology is used to describe the Web services' capabilities and content in a computer-interpretable language and improve the quality of existing tasks, such as Web Services discovery, invocation, composition and monitoring. This paper addresses the topic of defining a knowledge based system for representing Semantic Web Service ontologies according to the WSMO-Lite conceptual model and proposes a software engineering approach to this problem using an existing Web Service (WS). The proposal uses a reverse engineering technique supported by a tool and a similarity measure starting from a Web Service Description Language (WSDL) File of an existing Web Service till modeling WSMO-Lite Ontology specified in the WSML language.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125262274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for IaaS-to-SaaS monitoring of BPEL processes in the Cloud: Design and evaluation","authors":"Rima Grati, Khouloud Boukadi, H. Ben-Abdallah","doi":"10.1109/AICCSA.2014.7073248","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073248","url":null,"abstract":"Cloud computing is increasingly being used to deliver infrastructure, platform and/or software as services over the Internet. The resulting Cloud-based services with various types create complex management situations at the Cloud provider side. In particular, face to a large and dynamic number of service loads, a Cloud provider needs a means to maintain QoS (Quality of Service) levels it has agreed-upon with its customers. To properly operate and manage such complex situations, an effective and efficient monitoring is necessary. Most of the monitoring propositions are for the infrastructure and platform layers. This paper presents a multi tenant framework for QoS Monitoring and Detection of SLA Violations (QMoDeSV) for composite services implemented as BPEL (Business Process Execution Language) processes and deployed in a Cloud environment. It presents the complete design of QMoDeSV and a preliminary experimental evaluation of its performance.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129528145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lucas Venezian Povoa, W. L. Souza, L. F. Pires, A. F. Prado
{"title":"An approach to the decomposition of business processes for execution in the Cloud","authors":"Lucas Venezian Povoa, W. L. Souza, L. F. Pires, A. F. Prado","doi":"10.1109/AICCSA.2014.7073236","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073236","url":null,"abstract":"Although Business Process Management has emerged as a means to manage and improve business processes, it may require high costs due to the need for software, hardware and technical support. Cloud Computing can help achieve efficient business processes with lower costs, since it provides a fast and cheap way to acquire computing resources in a pay-peruse manner. However, due to safety requirements, certain data or activities of a business process should be kept within the user premises, while others can be allocated to a cloud. This paper presents an approach to decomposition of business processes, which preserves the data constraints, and demonstrates its use through a case study in the healthcare domain.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131320450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wirelessly controlled mimicing humanoid robot","authors":"U. Qidwai, M. Shakir, Wa'ed Hakouz, N. Musa","doi":"10.1109/AICCSA.2014.7073193","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073193","url":null,"abstract":"Educational humanoid robots have started to find there place in institutions for children with special needs and Autism Spectrum Disorder (ASD) children therapy centers. Most of the humanoid robots are expensive, or come with specific software or method for controlling the robot. This gives limits to what can be done with the robot and the software or method used may not allow expansion of the robot functionalities or possible applications. This paper presents an of system integration example with custom-built graphical toolkit used in controlling a simple toy like robot, the robot (RoboSapien), for a variety of customizable functions and applications. The main focus is on the activities and games that can be used with this platform in order to customize enhance the functionalities of the robot to suit the therapy process for the child under consideration. The mimicking mode of the robot, where the robot mimics the behavior of the user, has been found to be very promising for catching attention, making children involve in an activity, and retain their interest for longer period of time. Several activities have been developed and tested with children having ASD and have shown remarkable improvement in concentration spans, focus, and willingness to follow instructions.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"19 3-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127058056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. A. Benselama, M. Bencherif, N. Khorissi, M. Bencherchali
{"title":"Low cost reconfigurable Elliptic Crypto-hardware","authors":"Z. A. Benselama, M. Bencherif, N. Khorissi, M. Bencherchali","doi":"10.1109/AICCSA.2014.7073281","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073281","url":null,"abstract":"In this paper, we present the design and implementation of an Elliptic Crypto-hardware over the Galois Field GF(2163) using Field Programmable Gate Arrays (FPGA), aiming to realize a comparative study in terms of space and speed through the different Xilinx technology families, such as the Spartan, the Virtex and the Kintex family. The proposed design is based on an optimized Karatsuba-Offman multiplier and a fixed set of squaring modules in the chain addition of the Itoh-Tsjuii algorithm. The obtained place and route (PAR) frequencies vary from 39 MHz within the Spartan 3, to 74MHz for the Virtex 4 and 133MHz for the Kintex 7. The designs have been compared to many stateof- the-art designs and showed good index performances.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126326059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CCS: A Correct Cooperation Strategy based on game theory for MANETS","authors":"Hicham Amraoui, A. Habbani, A. Hajami","doi":"10.1109/AICCSA.2014.7073216","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073216","url":null,"abstract":"Mobile ad hoc networks (MANETs) is a multihop wireless communication network supporting mobile users (nodes) without any existing infrastructure and depend of the individual behavior of the nodes. This nature of MANETs imposes the cooperation among nodes to improve quality of service and security especially that mobility and energy are the most important criteria in MANETs. In such networks, devices can have different configurations, and should cooperate to ensure the existence of such networks. Cooperation enforcement mechanism do not provide strong authentication of entities. However, cooperation may be more difficult to apply in MANETs than infrastructure based networks due to many reasons already mentioned. In this paper we'll present a correct strategy based on cooperation rate (CR) to enforce cooperation and communication between nodes in MANET using OLSR routing protocol. The concept of this strategy based on game theory is focused on track keeps by each nodes and calculate the CR of other nodes. The CR is calculated based on various types of OLSR messages (HELLO, TC, MID and HNA) sent among nodes, and also based on different network processing (forwarding and routing).","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121445984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chamsi Abu Quba Rana, S. Hassas, U. Fayyad, Milad Alshomary, C. Gertosio
{"title":"iSoNTRE: The Social Network Transformer into Recommendation Engine","authors":"Chamsi Abu Quba Rana, S. Hassas, U. Fayyad, Milad Alshomary, C. Gertosio","doi":"10.1109/AICCSA.2014.7073195","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073195","url":null,"abstract":"Human is surrounded by a tremendous amount of information on the web. That highlights the continuous need of recommendation systems in the different domains. Unfortunately cold start problem is still an important issue in these systems on new users and new items. The problem becomes more critical in systems that contain resources that lives too shortly like offers on products which stays only for few days (short life resources - SLiR), or news in a news site. From the other side social networks are very rich with users' information, unfortunately most of the proposed social recommender are applied on domain specific social networks like flickers and epinions which are much less used in the day to day life, because dealing with General Purpose Social Network (GPSN) like Facebook and Twitter needs to transform these GPSN into a useful source of recommendation dealing with them as row, implicit or unary data. In this work we highlight how iSoNTRE (the intelligent Social Network Transformer into Recommendation Engine) addresses this challenge by transforming the GPSN into useful information for recommendation based on middle layer of domain concepts. iSoNTRE overcomes the cold start problem on new users and items. It has been evaluated over Twitter, on new users, recommending offers as a kind of SLiR, results showed that iSoNTRE succeeded in recommending good offers with 14% of click on recommended offers, which is high compared to general open rate in social media, especially when we have nothing about users and we are recommending SLiR resources.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127962738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Question focus extraction and answer passage retrieval","authors":"Amine Bayoudhi, Lamia Hadrich Belguith, Hatem Ghorbel","doi":"10.1109/AICCSA.2014.7073262","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073262","url":null,"abstract":"Question Analysis is an important task in Question Answering Systems (QAS). It consists generally in identifying the semantic type of the question and extracting the main focus of the question. The goal is to better specify the required information by the question. In this context and as part of a framework aiming to implement an Arabic opinion QAS for political debates, this paper addresses the problem of defining the focus of opinion questions and proposes particularly an approach for extracting the focus of attitude questions. The proposed approach is based on semi-automatically constructed lexico-syntactic patterns. Furthermore, the paper presents an adapted Vector Space Model (VSM) based method to retrieve candidate answer passages from a transcribed TV political show. Several experiments were carried out and showed that the focus extraction approach has achieved over 72% as F1 score for holder and target extraction, and has improved the baseline passage retrieval task by over than 25%.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128789288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}