Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805035
C. Baidada, A. Jakimi
To fully understand the behavior of a program, it is important to have automatic techniques that generate UML (Unified Modeling Language) models representing the behavior of the system. Reverse engineering techniques, either through dynamic analysis of the running application or static analysis of the source code, are used to help gain this understanding. Each type of technique has its limitations. The major limitation of dynamic analysis is the need of a system expert user who knows the different behaviors of the system. Static analysis has also limits especially with dynamic links and polymorphism states. In this paper, we propose an approach to automatically extract UML sequence diagrams from object-oriented programming languages. Our approach combines dynamic and static analyses to get the best of both approaches. Our method uses static analysis to identify all different system entries values that can be used to guide the dynamic analysis.
{"title":"Towards new hybrid approach of the reverse engineering of UML sequence diagram","authors":"C. Baidada, A. Jakimi","doi":"10.1109/CIST.2016.7805035","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805035","url":null,"abstract":"To fully understand the behavior of a program, it is important to have automatic techniques that generate UML (Unified Modeling Language) models representing the behavior of the system. Reverse engineering techniques, either through dynamic analysis of the running application or static analysis of the source code, are used to help gain this understanding. Each type of technique has its limitations. The major limitation of dynamic analysis is the need of a system expert user who knows the different behaviors of the system. Static analysis has also limits especially with dynamic links and polymorphism states. In this paper, we propose an approach to automatically extract UML sequence diagrams from object-oriented programming languages. Our approach combines dynamic and static analyses to get the best of both approaches. Our method uses static analysis to identify all different system entries values that can be used to guide the dynamic analysis.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115549729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7804960
M. Sekkal, N. Berrached, K. Medjaher, C. Varnier
Predictive maintenance of physical systems can only be achieved by monitoring their most critical elements to track their health assessment during operation. The acquired data is processed to extract relevant features, which are used to estimate the state of the system at any time and detect any loss of performance that may occur due to the critical element. We propose in this work an architecture of generic method to supervise this critical element and generate a Health Indicator (HI) for the physical system. The generated HI takes into account the evolution in time of the healthy status of the physical systems. The proposed method is based on sensors data that allow us to extract in real time the values of features constituting themselves the HI construction bloc input, through several HI obtaining test. Block diagram of the approach is made, then checked using benchmark data taken from “NASA data repository prognosis” associated to an element used in different operating conditions are checked. This approach is classified as data driven method which use sensors data that inform us about the real-time values of features.
{"title":"Skeleton of a generic approach for the generation of health indicators of physical systems","authors":"M. Sekkal, N. Berrached, K. Medjaher, C. Varnier","doi":"10.1109/CIST.2016.7804960","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804960","url":null,"abstract":"Predictive maintenance of physical systems can only be achieved by monitoring their most critical elements to track their health assessment during operation. The acquired data is processed to extract relevant features, which are used to estimate the state of the system at any time and detect any loss of performance that may occur due to the critical element. We propose in this work an architecture of generic method to supervise this critical element and generate a Health Indicator (HI) for the physical system. The generated HI takes into account the evolution in time of the healthy status of the physical systems. The proposed method is based on sensors data that allow us to extract in real time the values of features constituting themselves the HI construction bloc input, through several HI obtaining test. Block diagram of the approach is made, then checked using benchmark data taken from “NASA data repository prognosis” associated to an element used in different operating conditions are checked. This approach is classified as data driven method which use sensors data that inform us about the real-time values of features.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116039875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7804971
Tarik Hajji, Sidi Yasser El Jasouli, J. Mbarki, E. Jaâra
This paper discusses the use of analytical software solutions in microfinance institutions and how it can improve the operations of the organization. The study has been conducted through a survey from MFIs located in various countries of Africa, Europe and Asia. The survey questions have been based on the kind of software solutions MFIs use and if they are able to benefit from it. Moreover, with this survey we have tried to find out if the MFIs are willing to adopt the new technologies in their system by using software solutions. The survey has been conducted with MFIs in located in different countries. Besides MFIs, the respondents included banks as well.
{"title":"Microfinance risk analysis using the business intelligence","authors":"Tarik Hajji, Sidi Yasser El Jasouli, J. Mbarki, E. Jaâra","doi":"10.1109/CIST.2016.7804971","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804971","url":null,"abstract":"This paper discusses the use of analytical software solutions in microfinance institutions and how it can improve the operations of the organization. The study has been conducted through a survey from MFIs located in various countries of Africa, Europe and Asia. The survey questions have been based on the kind of software solutions MFIs use and if they are able to benefit from it. Moreover, with this survey we have tried to find out if the MFIs are willing to adopt the new technologies in their system by using software solutions. The survey has been conducted with MFIs in located in different countries. Besides MFIs, the respondents included banks as well.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116185814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805009
Raja Ettiane, R. Elkouch, A. Chaoub
3G mobile networks have gained high user popularity due to the tremendous growth of the smart phone market. However, their complex signaling procedures and limited soft capacity made them vulnerable to new denial-of-service (DoS) attacks involving the control plane. More importantly, this type of frauds can also affect the successors of the 3G and their related paradigms such as smart cities. In this paper, we deeply examine the considerable signaling load of the IDLE-DCH state transitions that can be exploited by malicious entities to launch signaling DoS attacks. Besides, we investigate some state-of-art techniques proposed to combat the signaling attacks. A comparative analysis between these solutions has been conducted with regard to three pertinent criteria: cost, efficiency and overhead. The summary of results indicates that even though the randomization experiences some flaws related to the radio channel consumption, it presents the most optimal cost and overhead compared to the remaining solutions. This study opens up a new horizon for more secure 3G systems based on the randomization defense mechanisms.
{"title":"Protection mechanisms for signaling DoS attacks on 3G mobile networks: Comparative study and future perspectives","authors":"Raja Ettiane, R. Elkouch, A. Chaoub","doi":"10.1109/CIST.2016.7805009","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805009","url":null,"abstract":"3G mobile networks have gained high user popularity due to the tremendous growth of the smart phone market. However, their complex signaling procedures and limited soft capacity made them vulnerable to new denial-of-service (DoS) attacks involving the control plane. More importantly, this type of frauds can also affect the successors of the 3G and their related paradigms such as smart cities. In this paper, we deeply examine the considerable signaling load of the IDLE-DCH state transitions that can be exploited by malicious entities to launch signaling DoS attacks. Besides, we investigate some state-of-art techniques proposed to combat the signaling attacks. A comparative analysis between these solutions has been conducted with regard to three pertinent criteria: cost, efficiency and overhead. The summary of results indicates that even though the randomization experiences some flaws related to the radio channel consumption, it presents the most optimal cost and overhead compared to the remaining solutions. This study opens up a new horizon for more secure 3G systems based on the randomization defense mechanisms.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124792918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805108
Hamid Slimani, N. E. Faddouli, Rachid Benslimane, S. Bennani
The profusion of digital resources, mainly educational ones, inside the Moroccan universities makes it difficult to satisfy students' information needs. Hence, this raises the issue of personalized search and recommendation of Digital Educational Resources (DER) within a repository. In this paper, we propose enriching the repository model ORI-OAI by the following functionalities: the filtering of results based on students' interests, the recommendation of digital educational resources based on their competences and adding of the Arabic language.
{"title":"Personalized search and recommendation in a digital educational resources repository: The case of ORI-OAI","authors":"Hamid Slimani, N. E. Faddouli, Rachid Benslimane, S. Bennani","doi":"10.1109/CIST.2016.7805108","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805108","url":null,"abstract":"The profusion of digital resources, mainly educational ones, inside the Moroccan universities makes it difficult to satisfy students' information needs. Hence, this raises the issue of personalized search and recommendation of Digital Educational Resources (DER) within a repository. In this paper, we propose enriching the repository model ORI-OAI by the following functionalities: the filtering of results based on students' interests, the recommendation of digital educational resources based on their competences and adding of the Arabic language.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124899727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805023
Hajar Sahbani, M. E. Marraki
The mathematical framework of networks is well suited to describe several systems consisting of a large number of entities interacting with each others. Every entity is represented by a network node and each interaction by a link between two nodes. It is therefore possible to model these networks as graphs. In this paper, we present a reliability study for chain topologies based on spanning tree in a social network considered as graph. Our approach consist on finding a general formulae that compute complexities in some special closed networks, which represent an important measure of robustness and reliability, then we compare which topology can be adopted for a more reliable routing.
{"title":"Robustness study in closed social networks using spanning tree approach","authors":"Hajar Sahbani, M. E. Marraki","doi":"10.1109/CIST.2016.7805023","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805023","url":null,"abstract":"The mathematical framework of networks is well suited to describe several systems consisting of a large number of entities interacting with each others. Every entity is represented by a network node and each interaction by a link between two nodes. It is therefore possible to model these networks as graphs. In this paper, we present a reliability study for chain topologies based on spanning tree in a social network considered as graph. Our approach consist on finding a general formulae that compute complexities in some special closed networks, which represent an important measure of robustness and reliability, then we compare which topology can be adopted for a more reliable routing.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128943757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7804980
Kawtar Akoudad, F. Jawab
The objective of this article is to model the processes of an International Road Freight Transport chain (IRFT, henceforth) for an eventual monitoring and optimization of their deadlines. In order to achieve this goal, we have designed an integrated model, that we have named `TSI', by combining three methods; namely, the Top-down approach, the tool `Supplier, Input, Process, Output, Customer' (SIPOC) and method `Integration Definition Language 0' (IDF0). Then we have deployed the model obtained at the level of IRFT chain between Morocco and Spain. This implementation allowed us to decline the chain into three levels (from the chain to macro processes, from macro processes to processes and from processes to activities).
{"title":"Design and deployment of the model ‘TSI’ for modeling the processes of the IRFT chain between Morocco and Spain","authors":"Kawtar Akoudad, F. Jawab","doi":"10.1109/CIST.2016.7804980","DOIUrl":"https://doi.org/10.1109/CIST.2016.7804980","url":null,"abstract":"The objective of this article is to model the processes of an International Road Freight Transport chain (IRFT, henceforth) for an eventual monitoring and optimization of their deadlines. In order to achieve this goal, we have designed an integrated model, that we have named `TSI', by combining three methods; namely, the Top-down approach, the tool `Supplier, Input, Process, Output, Customer' (SIPOC) and method `Integration Definition Language 0' (IDF0). Then we have deployed the model obtained at the level of IRFT chain between Morocco and Spain. This implementation allowed us to decline the chain into three levels (from the chain to macro processes, from macro processes to processes and from processes to activities).","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117059130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805029
Mohamed Naoum, Outman El Hichami, Mohammed Al Achhab, Badr Eddine El Mohajir
In this paper we deal with business process verification for reachability, liveness and deadlock-freeness properties. Actual business process verification techniques use formal methods such as model checking that checks exhaustively temporal logics properties, however, in this case, the business process model must be mapped to an abstract mathematical model (like Petri nets, timed automata or process algebra) on which the verification process could be done. The fact that the verification is done on this second representation can fake the results if the transformation is either erroneous or over-constrained as well as if the proprieties are misspecified. In this article we illustrate that probability calculation can be used in business process verification by evaluating a disjunctive normal form of its conditions, moreover, the verification process could be done directly on the business process model and can handle all its functional elements. We have developed an application that numerically shows the performance of our proposed technique by verifying several workflows with various “known” flaws.
{"title":"A probabilistic method for business process verification: Reachability, Liveness and deadlock detection","authors":"Mohamed Naoum, Outman El Hichami, Mohammed Al Achhab, Badr Eddine El Mohajir","doi":"10.1109/CIST.2016.7805029","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805029","url":null,"abstract":"In this paper we deal with business process verification for reachability, liveness and deadlock-freeness properties. Actual business process verification techniques use formal methods such as model checking that checks exhaustively temporal logics properties, however, in this case, the business process model must be mapped to an abstract mathematical model (like Petri nets, timed automata or process algebra) on which the verification process could be done. The fact that the verification is done on this second representation can fake the results if the transformation is either erroneous or over-constrained as well as if the proprieties are misspecified. In this article we illustrate that probability calculation can be used in business process verification by evaluating a disjunctive normal form of its conditions, moreover, the verification process could be done directly on the business process model and can handle all its functional elements. We have developed an application that numerically shows the performance of our proposed technique by verifying several workflows with various “known” flaws.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126089227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805015
Soufiane Oukili, S. Bri, A. V. S. Kumar
Smart City is becoming a commonly-used term to describe the concept of utilizing information and communication technologies (ICT) to enhance urban services and improve the quality of life for citizens. All communications should be fast and properly protected against unauthorized eavesdropping, interception, and modification. Therefore high speed and strong cryptography is required. Advanced Encryption Standard (AES) is the most widely and secure symmetric key encryption algorithms today. S-box substitution is the only non-linear step in this algorithm. It is one of the most complicated and costly part of the system. In this article, we present high speed efficient S-box AES architecture using combinational logic. We have used 5-stage pipeline design in order to increase the speed and the maximum operation frequency. Therefore registers are inserted in optimal placements. The implementation has been successfully done by virtex-6 (xc6vlx240t) FPGA device using Xilinx ISE 14.7. Our proposed design achieves a frequency of 842.744 MHz and occupied 20 slices, whereas the highest operation frequency reported in the literature is 696.37 MHz using 32 slices.
智慧城市正在成为一个常用术语,用来描述利用信息和通信技术(ICT)增强城市服务和提高市民生活质量的概念。所有的通信都应该快速和适当地防止未经授权的窃听、拦截和修改。因此,需要高速和强密码。高级加密标准(AES)是目前应用最广泛、最安全的对称密钥加密算法。s盒替换是该算法中唯一的非线性步骤。它是系统中最复杂和最昂贵的部分之一。在本文中,我们采用组合逻辑提出了高速高效的S-box AES架构。为了提高速度和最大运行频率,我们采用了5级管道设计。因此,寄存器被插入到最佳位置。采用Xilinx ISE 14.7,采用virtex-6 (xc6vlx240t) FPGA器件成功实现。我们提出的设计实现了842.744 MHz的频率,占用了20个片,而文献中报道的最高工作频率是696.37 MHz,占用了32个片。
{"title":"High speed efficient FPGA implementation of pipelined AES S-Box","authors":"Soufiane Oukili, S. Bri, A. V. S. Kumar","doi":"10.1109/CIST.2016.7805015","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805015","url":null,"abstract":"Smart City is becoming a commonly-used term to describe the concept of utilizing information and communication technologies (ICT) to enhance urban services and improve the quality of life for citizens. All communications should be fast and properly protected against unauthorized eavesdropping, interception, and modification. Therefore high speed and strong cryptography is required. Advanced Encryption Standard (AES) is the most widely and secure symmetric key encryption algorithms today. S-box substitution is the only non-linear step in this algorithm. It is one of the most complicated and costly part of the system. In this article, we present high speed efficient S-box AES architecture using combinational logic. We have used 5-stage pipeline design in order to increase the speed and the maximum operation frequency. Therefore registers are inserted in optimal placements. The implementation has been successfully done by virtex-6 (xc6vlx240t) FPGA device using Xilinx ISE 14.7. Our proposed design achieves a frequency of 842.744 MHz and occupied 20 slices, whereas the highest operation frequency reported in the literature is 696.37 MHz using 32 slices.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114293834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/CIST.2016.7805012
M. Laanaoui, S. Raghay
Numerous efforts are currently under progress to enhance the safety and efficiency of vehicular traffic through intelligent transportation systems. In addition, the growing demand for access to data and information from human users on the go has created the need for advanced vehicle-to-vehicle and vehicle to roadside communication systems capable of high data rates and amenable to high degrees of node mobility. The importance of inter-vehicle communication is increasing due to its role in organizing road. In this paper we present our proposition witch consisting of a new routing protocol VANET (vehicle AdHoc Network). This protocol is based on the localization of the node, and also the score assigned to each vehicle and the cost for each junction. We evaluate the performance of our protocol IRUV by comparing it with the VANET protocols: LAR and GyTAR in terms of: End to End Delay, and Delivery Ratio.
{"title":"New routing process in VANET","authors":"M. Laanaoui, S. Raghay","doi":"10.1109/CIST.2016.7805012","DOIUrl":"https://doi.org/10.1109/CIST.2016.7805012","url":null,"abstract":"Numerous efforts are currently under progress to enhance the safety and efficiency of vehicular traffic through intelligent transportation systems. In addition, the growing demand for access to data and information from human users on the go has created the need for advanced vehicle-to-vehicle and vehicle to roadside communication systems capable of high data rates and amenable to high degrees of node mobility. The importance of inter-vehicle communication is increasing due to its role in organizing road. In this paper we present our proposition witch consisting of a new routing protocol VANET (vehicle AdHoc Network). This protocol is based on the localization of the node, and also the score assigned to each vehicle and the cost for each junction. We evaluate the performance of our protocol IRUV by comparing it with the VANET protocols: LAR and GyTAR in terms of: End to End Delay, and Delivery Ratio.","PeriodicalId":196827,"journal":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122356864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}