The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Detecting and segmenting moving objects in video is a challenging and essential task in a number of applications. This paper presents a new algorithm of moving objects detection and segmentation. Firstly, we extract Selective Spatio-Temporal Interest Points (SSTIPs). The next step is to partition the SSTIPs into a set of moving clusters. To reduce the impact of the choice of a clustering method and...
Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
The Internet of Things (IoT) is a rapidly growing technology in recent years. It represents an extension of the Internet into the physical world embracing everyday objects. In consequence, users' privacy and security are becoming a great challenge. To cope with this issue, sophisticated approaches are needed to guarantee these services and hence ensure a large-scale adoption of IoT. In our work we...
E-government presents a new innovative approach to solving traditional problems of government services using the IT technology. This paper presents the views of citizens, businesses and government to advance the transformation enabling e-government by using an Enterprise Architecture paradigm that will be able to attract citizens who are connected online; move people online who are not there; and...
Software Defined Network (SDN) is a new network architecture that decouples the control plane from the data plane by adding a new entity called “controller”. Most concerns about this new networking trend are: how fast can the controller respond to data path requests and how many data path requests can a controller handle per second. To answer those concerns, this paper presents a study and evaluation...
An effective national cybersecurity strategy conforms to international standards serves to preserve organization's information assets. The principle is to support a cybersecurity consistent approach including legal, technological and organizational dimensions. The promise of this research program is to identify the key areas for an effective cybersecurity strategy addressed to organizations (administration...
Pedestrian detection is an important task in intelligent video surveillance systems. In this work, we propose a system aimed to detect pedestrians from images. Our approach begins by extracting feature's object and classify them by a Support Vector Machine in order to detect the presence of a pedestrian. We adopt a new image descriptor called Histograms of Oriented Laplacian (HOL), which extract the...
3D reconstruction from uncalibrated images has many and important applications in computer vision. Different methods exist, but they present various problems. First of all, methods which are full automatic present the problem that they require a difficult and challenging self calibration or calibration step. They need complex calculation operators. And they need more than image to achieve 3D reconstruction...
In this paper, we survey access control models, protocols and frameworks in IoT. We briefly provide a literature overview and discuss in a qualitative way the most relevant IoT related-projects over the recent years (2011–2015). We stress the main challenges that would affect access control in IoT. Finally, based on our evaluation, we give hints of future research directions.
The fall detection system composed in general from three models, the first is a detection moving object, the second is tracking moving object and the third is recognition person's behavior. In this paper, we will deal out the first module which is the main unit in the fall detection system, because it is where we detect the person in the image. There are a lot of approaches in this way, but their...
Data Prefetching is the process of retrieving and caching data before the user has requested it. It is a technique proposed to reduce latency to data and ensure data access in case of disconnection. It can speed up the user's experience with his mobile app.
This work proposes a context-aware middleware for medical workflow organization and efficiency improvement. In hospitals, laboratories and teleradiology companies, each physician or technician is specialized in a specific kind of diagnosis or analysis. Therefore, certain types of medical images are often forwarded to a certain physician or a certain group. This forwarding is time consuming. That is,...
This paper presents an incremental formal modeling of the Simple Text Oriented Messaging Protocol (STOMP) using Event-B method. STOMP is a simple text-oriented protocol, similar to HTTP. It provides an interoperable wire format so that STOMP clients can communicate with any STOMP message broker to provide easy and widespread messaging interoperability among many languages and platforms. In this paper...
Multi-operand addition is found in many real-life applications. In this paper, we propose two approaches for realizing multi-operand addition using two-operand adders on Field Programmed Gate Arrays (FPGAs). The proposed approaches reduce the area of the final implementation while reducing its propagation delay. We focus on the case where the operands are of different sizes.
One of the most important issues in dynamic networks is to prove the correctness of distributed algorithms. This issue has been widely studied in the literature. Nevertheless, we note a lack of consensus about the development and proof of these algorithms. Moreover, the proofs which have been presented are usually done manually. In this paper, we introduce a formal pattern based on evolving graphs...
The rapid growth of Internet and business globalization has lead organizations to collaborate in order to reach common goals through creating inter-organizational workflows. This collaboration poses new security challenges, particularly the cohabitation of different security policies of participating organizations in the workflow. In fact, organizations could have different or even conflicting policies...
In the perspective of achieving an UNL (Universal Networking Language) based machine translation system for Amazigh language, we are undertaking the first steps of dictionaries' development according to the UNL specifications. So far, no attempt has been made to integrate Amazigh language in the UNL project. This latter revolves around the development of an EnConverter (Analyzer) and a DeConverter...
In this paper, we study some feature descriptors and detectors based on invariants type and use the most stable and robust keypoints for an efficient object detection. From many points of view local descriptors are relatively different, the way of their extraction and the type of the invariance, the goal of this paper is to examine existing feature detectors and apply the most appropriate and efficient...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.