Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921946
Miftah Nina, Ataa Allah Fadoua, Taghbalout Imane
Current research, in Natural Language Processing, shows more interest in the under-resourced languages, during last years. Amazigh language is the autochthon language of North Africa. However, until 2011 that it became a constitutionally official language in Morocco, after years of persecution. Amazigh language is still considered as one of the under resourced languages. The question is: “how can the Amazigh language reach advanced languages?” Motivated by these considerations, we describe our effort in the development of an Amazigh-English parallel corpus aimed to be used in linguistic research, teaching, and natural language processing application, primarily machine translation. To the best of our knowledge, this corpus is the first Amazigh-English parallel corpus. The built corpus is sentence aligned, including 20726 sentences. The alignment was done automatically, while the evaluation was done manually. The experimentation results are satisfactory, achieving more than 90%.
{"title":"Sentence-aligned parallel corpus Amazigh-English","authors":"Miftah Nina, Ataa Allah Fadoua, Taghbalout Imane","doi":"10.1109/IACS.2017.7921946","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921946","url":null,"abstract":"Current research, in Natural Language Processing, shows more interest in the under-resourced languages, during last years. Amazigh language is the autochthon language of North Africa. However, until 2011 that it became a constitutionally official language in Morocco, after years of persecution. Amazigh language is still considered as one of the under resourced languages. The question is: “how can the Amazigh language reach advanced languages?” Motivated by these considerations, we describe our effort in the development of an Amazigh-English parallel corpus aimed to be used in linguistic research, teaching, and natural language processing application, primarily machine translation. To the best of our knowledge, this corpus is the first Amazigh-English parallel corpus. The built corpus is sentence aligned, including 20726 sentences. The alignment was done automatically, while the evaluation was done manually. The experimentation results are satisfactory, achieving more than 90%.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115753640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921955
O. Halabi, Sara Fawal, Eman Almughani, Lina Al-Homsi
In this research, we present the design of a driving seat with driver activities recognition based on a passive method for measuring body-postures by using two force sensor arrays to inspect the pressure patterns exhibited in driver's seat and backrest. The seat is designed by testing the sensors distribution to find the most suitable distribution to make the recognition more accurate. A Virtual Reality (VR) driving simulation is developed to test the accuracy of recognition in immersive environment. Experiments carried out to test the posture recognition accuracy in both realistic setting and VR setting. The result showed that the system was able to recognize ten different postures with various accuracy ratio. The VR immersive driving environment enhanced the accuracy recognition in some postures.
{"title":"Driver activity recognition in virtual reality driving simulation","authors":"O. Halabi, Sara Fawal, Eman Almughani, Lina Al-Homsi","doi":"10.1109/IACS.2017.7921955","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921955","url":null,"abstract":"In this research, we present the design of a driving seat with driver activities recognition based on a passive method for measuring body-postures by using two force sensor arrays to inspect the pressure patterns exhibited in driver's seat and backrest. The seat is designed by testing the sensors distribution to find the most suitable distribution to make the recognition more accurate. A Virtual Reality (VR) driving simulation is developed to test the accuracy of recognition in immersive environment. Experiments carried out to test the posture recognition accuracy in both realistic setting and VR setting. The result showed that the system was able to recognize ten different postures with various accuracy ratio. The VR immersive driving environment enhanced the accuracy recognition in some postures.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122679730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921942
I. Al-Naimi, C. Wong
Automatic indoor human tracking has attracted noticeable research concern recently due to the increasing demands for enhancing the majority of the offered services within smart home environment. Many human tracking approaches have been suggested and discussed. However, the problem of reliable human tracking remains untackled. The aim of this paper is to develop and implement an advanced tracking approach using smart floor that is capable of detecting and tracking people accurately and reliably. The proposed approach can be used as infrastructure for various smart home services. A proof-of-concept testbed has been designed, implemented, and validated via several case studies.
{"title":"Indoor human detection and tracking using advanced smart floor","authors":"I. Al-Naimi, C. Wong","doi":"10.1109/IACS.2017.7921942","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921942","url":null,"abstract":"Automatic indoor human tracking has attracted noticeable research concern recently due to the increasing demands for enhancing the majority of the offered services within smart home environment. Many human tracking approaches have been suggested and discussed. However, the problem of reliable human tracking remains untackled. The aim of this paper is to develop and implement an advanced tracking approach using smart floor that is capable of detecting and tracking people accurately and reliably. The proposed approach can be used as infrastructure for various smart home services. A proof-of-concept testbed has been designed, implemented, and validated via several case studies.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131951737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921973
Anass Sedrati, Abdellatif Mezrioui
Internet of things (IoT) is a new technology subject to all kind of imagination and science fiction. Dreams and speculations are still possible about it. A technology combining real life objects and virtual life (Internet) is indeed a fertile pitch of fantasy and original ideas. However, IoT in practice does have to face a number of challenges to ensure its well working and operability in a near future. This document defines some of the main technical security issues of IoT today, and presents future work towards them.
物联网(Internet of things, IoT)是一项新技术,是各种想象和科幻小说的主题。关于它的梦想和推测仍然是可能的。一项将现实生活对象和虚拟生活(互联网)结合起来的技术确实是幻想和原创思想的沃土。然而,物联网在实践中确实面临着许多挑战,以确保其在不久的将来良好的工作和可操作性。本文档定义了当今物联网的一些主要技术安全问题,并介绍了未来的工作。
{"title":"Internet of Things challenges: A focus on security aspects","authors":"Anass Sedrati, Abdellatif Mezrioui","doi":"10.1109/IACS.2017.7921973","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921973","url":null,"abstract":"Internet of things (IoT) is a new technology subject to all kind of imagination and science fiction. Dreams and speculations are still possible about it. A technology combining real life objects and virtual life (Internet) is indeed a fertile pitch of fantasy and original ideas. However, IoT in practice does have to face a number of challenges to ensure its well working and operability in a near future. This document defines some of the main technical security issues of IoT today, and presents future work towards them.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132104380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-01DOI: 10.1109/IACS.2017.7921978
N. Ayyad, Nour Alqaramseh, M. Qazzaz, S. Althunibat, W. Shehab
This paper investigates setup optimization of Spatial Modulation (SM) systems. Specifically, the optimal pair of the number of the transmit antennas and the modulation order, for a given spectral efficiency, that minimizes the error rate at the receiver has been discussed. Interesting results regarding the behavior of bit error rate and symbol error rate versus different transmitter setups under different signal-to-noise regimes have been shown. Moreover, closed-loop and open-loop scenarios have been considered. The obtained results contrast with the results available at literature, and lead to interesting conclusions about the optimal setup for SM systems.
{"title":"Setup optimization in spatial modulation systems: A simulation study","authors":"N. Ayyad, Nour Alqaramseh, M. Qazzaz, S. Althunibat, W. Shehab","doi":"10.1109/IACS.2017.7921978","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921978","url":null,"abstract":"This paper investigates setup optimization of Spatial Modulation (SM) systems. Specifically, the optimal pair of the number of the transmit antennas and the modulation order, for a given spectral efficiency, that minimizes the error rate at the receiver has been discussed. Interesting results regarding the behavior of bit error rate and symbol error rate versus different transmitter setups under different signal-to-noise regimes have been shown. Moreover, closed-loop and open-loop scenarios have been considered. The obtained results contrast with the results available at literature, and lead to interesting conclusions about the optimal setup for SM systems.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127583514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-03DOI: 10.1109/IACS.2017.7921990
Tobias Glocker, Timo Mantere, M. Elmusrati
In our modern society, comfort became a standard. This comfort, especially in cars can only be achieved by equipping the car with more electronic devices. Some of the electronic devices must cooperate with each other and thus they require a communication channel, which can be wired or wireless. In these days, it would be hard to sell a new car operating with traditional keys. Almost all modern cars can be locked or unlocked with a Remote Keyless System. A Remote Keyless System consists of a key fob that communicates wirelessly with the car transceiver that is responsible for locking and unlocking the car. However there are several threats for wireless communication channels. This paper describes the possible attacks against a Remote Keyless System and introduces a secure protocol as well as a lightweight Symmetric Encryption Algorithm for a Remote Keyless Entry System applicable in vehicles.
{"title":"A protocol for a secure remote keyless entry system applicable in vehicles using symmetric-key cryptography","authors":"Tobias Glocker, Timo Mantere, M. Elmusrati","doi":"10.1109/IACS.2017.7921990","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921990","url":null,"abstract":"In our modern society, comfort became a standard. This comfort, especially in cars can only be achieved by equipping the car with more electronic devices. Some of the electronic devices must cooperate with each other and thus they require a communication channel, which can be wired or wireless. In these days, it would be hard to sell a new car operating with traditional keys. Almost all modern cars can be locked or unlocked with a Remote Keyless System. A Remote Keyless System consists of a key fob that communicates wirelessly with the car transceiver that is responsible for locking and unlocking the car. However there are several threats for wireless communication channels. This paper describes the possible attacks against a Remote Keyless System and introduces a secure protocol as well as a lightweight Symmetric Encryption Algorithm for a Remote Keyless Entry System applicable in vehicles.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116788316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}