Pub Date : 2014-03-26DOI: 10.1109/CSIT.2014.6805985
Karim El Batran, Mark D. Dunlop
In this paper a study was done regarding improving form control and navigation on mobile devices. An observational study of census counters for the Egyptian Agricultural Survey was conducted. This country-wide survey is currently conducted by professional counters using large (100×35 cm double sided) complex paper forms that require manual transcription. Computerization would be beneficial in terms of accuracy and duplication of effort. However there are considerable challenges in reducing the size of the forms to fit mobile devices. Furthermore counters typically have low technological experience. Based on our observations we developed two prototypes: one using traditional form tabs, the other pan-and-zooming. Results from initial user tests showed the pan-and-zoom interface was both faster and had a lower perceived effort.
{"title":"Improved form navigation on mobile devices","authors":"Karim El Batran, Mark D. Dunlop","doi":"10.1109/CSIT.2014.6805985","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805985","url":null,"abstract":"In this paper a study was done regarding improving form control and navigation on mobile devices. An observational study of census counters for the Egyptian Agricultural Survey was conducted. This country-wide survey is currently conducted by professional counters using large (100×35 cm double sided) complex paper forms that require manual transcription. Computerization would be beneficial in terms of accuracy and duplication of effort. However there are considerable challenges in reducing the size of the forms to fit mobile devices. Furthermore counters typically have low technological experience. Based on our observations we developed two prototypes: one using traditional form tabs, the other pan-and-zooming. Results from initial user tests showed the pan-and-zoom interface was both faster and had a lower perceived effort.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"380 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123245393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-26DOI: 10.1109/CSIT.2014.6805980
M. Khasawneh, A. Agarwal
Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand. In CR networks, unlicensed users, which are referred to as secondary users (SUs), are allowed to dynamically access the frequency bands when licensed users which are referred to as primary users (PUs) are inactive. One important technical area that has received little attention to date in the cognitive radio system is wireless security. New classes of security threats and challenges have been introduced in the cognitive radio systems, and providing strong security may prove to be the most difficult aspect of making cognitive radio a long-term commercially-viable concept. This paper addresses the main challenges, security attacks and their mitigation techniques in cognitive radio networks. The attacks showed are organized based on the protocol layer that an attack is operating on.
{"title":"A survey on security in Cognitive Radio networks","authors":"M. Khasawneh, A. Agarwal","doi":"10.1109/CSIT.2014.6805980","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805980","url":null,"abstract":"Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand. In CR networks, unlicensed users, which are referred to as secondary users (SUs), are allowed to dynamically access the frequency bands when licensed users which are referred to as primary users (PUs) are inactive. One important technical area that has received little attention to date in the cognitive radio system is wireless security. New classes of security threats and challenges have been introduced in the cognitive radio systems, and providing strong security may prove to be the most difficult aspect of making cognitive radio a long-term commercially-viable concept. This paper addresses the main challenges, security attacks and their mitigation techniques in cognitive radio networks. The attacks showed are organized based on the protocol layer that an attack is operating on.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"313 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115556762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-26DOI: 10.1109/CSIT.2014.6805976
Abdouslam M. Bashir, A. Betteridge
This paper describes the components and highlights some specifications of a device that allows several combinations of immersed or desktop vision feedback devices to be integrated with a three degree-of-freedom force-feedback device previously known as the `Reactabot™' and currently known as the `Visitact'. The Visitact is a haptic display robot that provides and receives kinaesthetic information from the user, who can touch and manipulate a surrogate object, and feel external forces exerted upon it by obstructions, within a virtual environment. In essence, the Visitact allows a combination of various immersed or desktop visual solutions to be integrated with a three degree-of-freedom force-feedback device. The mechanical interface senses the forces applied by the user and the haptic control system generates a reaction force that moves the surrogate object in the direction of the applied force. The surrogate object can be accelerated up to ±2g (approximately 20m/s2) sustain forces up to 20N, with a virtual mass in the range 0.7- 4 kg. The device provides force feedback over a large proportion of the user's workspace and enables virtual objects to take on user-specified physical properties such as mass, gravity, weight and drag, and was implemented with force/velocity control to allow the robot to interact with an operator, and to share the same working volume. Two techniques are used during a Visitact session. The user, who is normally sitting, holds the surrogate object and either sees a virtual or augmented representation of it on a computer screen, or through a head mounted display. Currently the Visitact is upgraded to work as a six degree of freedom force feedback device. An attempt to extend the device to serve 6- degree of freedom is briefly described.
{"title":"Development of a haptic feedback subsystem","authors":"Abdouslam M. Bashir, A. Betteridge","doi":"10.1109/CSIT.2014.6805976","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805976","url":null,"abstract":"This paper describes the components and highlights some specifications of a device that allows several combinations of immersed or desktop vision feedback devices to be integrated with a three degree-of-freedom force-feedback device previously known as the `Reactabot™' and currently known as the `Visitact'. The Visitact is a haptic display robot that provides and receives kinaesthetic information from the user, who can touch and manipulate a surrogate object, and feel external forces exerted upon it by obstructions, within a virtual environment. In essence, the Visitact allows a combination of various immersed or desktop visual solutions to be integrated with a three degree-of-freedom force-feedback device. The mechanical interface senses the forces applied by the user and the haptic control system generates a reaction force that moves the surrogate object in the direction of the applied force. The surrogate object can be accelerated up to ±2g (approximately 20m/s2) sustain forces up to 20N, with a virtual mass in the range 0.7- 4 kg. The device provides force feedback over a large proportion of the user's workspace and enables virtual objects to take on user-specified physical properties such as mass, gravity, weight and drag, and was implemented with force/velocity control to allow the robot to interact with an operator, and to share the same working volume. Two techniques are used during a Visitact session. The user, who is normally sitting, holds the surrogate object and either sees a virtual or augmented representation of it on a computer screen, or through a head mounted display. Currently the Visitact is upgraded to work as a six degree of freedom force feedback device. An attempt to extend the device to serve 6- degree of freedom is briefly described.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116173725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-26DOI: 10.1109/CSIT.2014.6805975
Rami K. Abushehab, Baker K. Abdalhaq, Badie Sartawi
A good controlling for the traffic lights on the network road may solve the traffic congestion in the cities. This paper deals with the optimization of traffic light signals timing. We used four different heuristic optimization techniques, three types of Genetic algorithm and particle of swarm algorithm. Techniques were applied on a case study of network road which contains 13 traffic lights. We used SUMO (Simulation of Urban MObility) to simulate the network. Heuristic optimization techniques themselves need to be calibrated. Calibrating them using the real problem is time consuming because simulation is computation demanding. We tried to calibrate them using a function that is assumed to have similar response surface but lighter computation demand, then use the calibrated technique to optimize the traffic light signals timing. After some comparing processes of optimization results, we discovered that one type of GA and PS at determined parameters are more suitable to produce the minimum total travel time.
良好的网络道路交通灯控制可以解决城市交通拥堵问题。本文主要研究交通信号灯配时的优化问题。我们使用了四种不同的启发式优化技术,三种类型的遗传算法和群体粒子算法。本文以包含13个红绿灯的路网道路为例,对技术进行了应用。我们使用SUMO (Simulation of Urban MObility)来模拟网络。启发式优化技术本身需要校准。使用实际问题校准它们非常耗时,因为模拟需要大量的计算。我们尝试使用一个假设具有相似响应面但计算量较轻的函数来校准它们,然后使用校准技术来优化交通灯信号定时。经过对优化结果的比较,我们发现在确定的参数下,有一种遗传算法和PS算法更适合产生最小的总行程时间。
{"title":"Genetic vs. particle swarm optimization techniques for traffic light signals timing","authors":"Rami K. Abushehab, Baker K. Abdalhaq, Badie Sartawi","doi":"10.1109/CSIT.2014.6805975","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805975","url":null,"abstract":"A good controlling for the traffic lights on the network road may solve the traffic congestion in the cities. This paper deals with the optimization of traffic light signals timing. We used four different heuristic optimization techniques, three types of Genetic algorithm and particle of swarm algorithm. Techniques were applied on a case study of network road which contains 13 traffic lights. We used SUMO (Simulation of Urban MObility) to simulate the network. Heuristic optimization techniques themselves need to be calibrated. Calibrating them using the real problem is time consuming because simulation is computation demanding. We tried to calibrate them using a function that is assumed to have similar response surface but lighter computation demand, then use the calibrated technique to optimize the traffic light signals timing. After some comparing processes of optimization results, we discovered that one type of GA and PS at determined parameters are more suitable to produce the minimum total travel time.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114202708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-26DOI: 10.1109/CSIT.2014.6805991
Y. Gdura
Compiler writers have developed various techniques, such as constant folding, subexpression elimination, loop transformation and vectorization, to help compilers in code optimization for performance improvement. Yet, they have been far less successful in developing techniques or cost models that compilers can rely on to simplify parallel programming and tune the performance of parallel applications automatically. This paper is the first of two-phase study to develop an analytical model that can be used to estimate the cost for sequential and parallel execution of array expressions on multicore architectures. While this paper discuss the possibility of developing a cost model to estimate the sequential execution of array expressions on a single CPU, the second part of the investigation shall focus on developing a model to estimate parallel execution of arrays on multicore platforms. The model presented in this paper is expected to be used by programming language compilers as complement component with the other model to estimate and subsequently decide whether to parallelize individual array expressions or not. The preliminary results which are presented here show that this model can give a satisfactory evaluation and high-precision estimation for the cost of executing a regular array expression on a single core processor.
{"title":"An analytical model for estimating execution cost of 1D array expressions","authors":"Y. Gdura","doi":"10.1109/CSIT.2014.6805991","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805991","url":null,"abstract":"Compiler writers have developed various techniques, such as constant folding, subexpression elimination, loop transformation and vectorization, to help compilers in code optimization for performance improvement. Yet, they have been far less successful in developing techniques or cost models that compilers can rely on to simplify parallel programming and tune the performance of parallel applications automatically. This paper is the first of two-phase study to develop an analytical model that can be used to estimate the cost for sequential and parallel execution of array expressions on multicore architectures. While this paper discuss the possibility of developing a cost model to estimate the sequential execution of array expressions on a single CPU, the second part of the investigation shall focus on developing a model to estimate parallel execution of arrays on multicore platforms. The model presented in this paper is expected to be used by programming language compilers as complement component with the other model to estimate and subsequently decide whether to parallelize individual array expressions or not. The preliminary results which are presented here show that this model can give a satisfactory evaluation and high-precision estimation for the cost of executing a regular array expression on a single core processor.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114425581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-26DOI: 10.1109/CSIT.2014.6805982
Firas S. Al-Sharbaty
The attractive features of wireless sensors based ZigBee and IEEE 802.15.4 standard such low cost, flexibility, scalability, and multiple usages contribute to spread it in many trends. The network of wireless sensors which is to be considered in this research deals with fixed and mobile wireless sensors and treated with mesh and tree topologies. This paper takes up the effect of Acknowledgement technique to search for better throughput and end to end delay of wireless sensors network. The results show that the acknowledgement technique has different effects on the performance of the network depending on the type of topology and state of sensors (fixed or mobile). The usage of Acknowledgement gives better performance in terms of throughput and end to end delay for tree topology with mobile stations, and mesh topology with fixed stations.
{"title":"Wireless sensors network and acknowledgement technique based ZigBee system","authors":"Firas S. Al-Sharbaty","doi":"10.1109/CSIT.2014.6805982","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805982","url":null,"abstract":"The attractive features of wireless sensors based ZigBee and IEEE 802.15.4 standard such low cost, flexibility, scalability, and multiple usages contribute to spread it in many trends. The network of wireless sensors which is to be considered in this research deals with fixed and mobile wireless sensors and treated with mesh and tree topologies. This paper takes up the effect of Acknowledgement technique to search for better throughput and end to end delay of wireless sensors network. The results show that the acknowledgement technique has different effects on the performance of the network depending on the type of topology and state of sensors (fixed or mobile). The usage of Acknowledgement gives better performance in terms of throughput and end to end delay for tree topology with mobile stations, and mesh topology with fixed stations.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128842312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-26DOI: 10.1109/CSIT.2014.6805973
G. N. Mohammed, A. Yasin, A. Zeki
The most important requirements should be available on any watermarking systems which are the robustness against possible attacks and the quality of the watermarked images. In most applications, the watermarking algorithm embeds the watermark have to be robust against possible attacks and keep the quality of the host media as possible. The relationship between the two requirements is completely conflict. In this study, the method focuses on the robustness against chosen attacks for the watermarked image based on Dual Intermediate Significant Bit (DISB) model. This method requires embedding two bits into every pixel of the original image, while and the other six bits are changed so as to directly assimilate the original pixel. In the case, when the two hidden bits are equal or not equal to the original bits, there is a need to use mathematical equations to solve this problem which derived and applied in this study. The results show that the proposed model produces robustness watermarked images as compared to our previous method when focuses on the high quality of the watermarked image which proved that proposed method is better as compared with the Least Significant Bit (LSB) after embedding two bits. The best values investigated when the Peak Signal to Noise Ratio (PSNR) is equal or more than 30db, and finding the best Normalized Cross Correlation (NCC) to evaluate the image resistance against attacks. The best values investigated when the two embedded bits are k1=4 and k2=6.
{"title":"Robust image watermarking based on Dual Intermediate Significant Bit (DISB)","authors":"G. N. Mohammed, A. Yasin, A. Zeki","doi":"10.1109/CSIT.2014.6805973","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805973","url":null,"abstract":"The most important requirements should be available on any watermarking systems which are the robustness against possible attacks and the quality of the watermarked images. In most applications, the watermarking algorithm embeds the watermark have to be robust against possible attacks and keep the quality of the host media as possible. The relationship between the two requirements is completely conflict. In this study, the method focuses on the robustness against chosen attacks for the watermarked image based on Dual Intermediate Significant Bit (DISB) model. This method requires embedding two bits into every pixel of the original image, while and the other six bits are changed so as to directly assimilate the original pixel. In the case, when the two hidden bits are equal or not equal to the original bits, there is a need to use mathematical equations to solve this problem which derived and applied in this study. The results show that the proposed model produces robustness watermarked images as compared to our previous method when focuses on the high quality of the watermarked image which proved that proposed method is better as compared with the Least Significant Bit (LSB) after embedding two bits. The best values investigated when the Peak Signal to Noise Ratio (PSNR) is equal or more than 30db, and finding the best Normalized Cross Correlation (NCC) to evaluate the image resistance against attacks. The best values investigated when the two embedded bits are k1=4 and k2=6.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127067077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-26DOI: 10.1109/CSIT.2014.6805989
Dana AL-Dlaeen, A. Alashqur
Alzheimer's disease is one of the most common forms of dementia affecting millions of senior people worldwide. In this paper, we develop an Alzheimer's disease prediction model that can assist medical professionals in predicting the status of the disease based on medical data about patients. The sample medical data we use has five important attributes, namely, gender, age, genetic causes, brain injury, and vascular disease. The sample also contains values for seventeen different patients that represent seventeen medical cases. We perform decision tree induction to create a decision tree that corresponds to the sample data. We base our selection of nodes in the tree on the Entropy or Information Gain computed for each attribute. At each level of the tree, the right attribute is chosen as a splitting attribute if it gives us the highest Information Gain.
{"title":"Using decision tree classification to assist in the prediction of Alzheimer's disease","authors":"Dana AL-Dlaeen, A. Alashqur","doi":"10.1109/CSIT.2014.6805989","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805989","url":null,"abstract":"Alzheimer's disease is one of the most common forms of dementia affecting millions of senior people worldwide. In this paper, we develop an Alzheimer's disease prediction model that can assist medical professionals in predicting the status of the disease based on medical data about patients. The sample medical data we use has five important attributes, namely, gender, age, genetic causes, brain injury, and vascular disease. The sample also contains values for seventeen different patients that represent seventeen medical cases. We perform decision tree induction to create a decision tree that corresponds to the sample data. We base our selection of nodes in the tree on the Entropy or Information Gain computed for each attribute. At each level of the tree, the right attribute is chosen as a splitting attribute if it gives us the highest Information Gain.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127612615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-26DOI: 10.1109/CSIT.2014.6806002
Nur Nazihah Rahim, Nur Azrin Abd Malek, A. Zeki, Adamu I. Abubakar
A face can be sketch by freehand based on the evidence of an eyewitness description which is necessary for the Detectives to tract the looks of the offender. This process is slow; moreover there are some factors which cannot be assumed by the artist, including weight, hair color and length, and eye color. However, if this process is conducted correctly, the result should bear a striking resemblance to the individual. As with composite drawings, an image of the resulting face can then be distributed among law enforcement personnel or to the general public. The reconstructed face should be photographed in such a way that there is no perspective distortion. This paper presents Face Reconstruction for Identification that approach is relatively same with the sketching by freehand. However, this system will reconstruction and generate the face automatically. This will create an effectiveness and efficiency in identifying and recognize the offender.
{"title":"Automatic Face Reconstruction system","authors":"Nur Nazihah Rahim, Nur Azrin Abd Malek, A. Zeki, Adamu I. Abubakar","doi":"10.1109/CSIT.2014.6806002","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6806002","url":null,"abstract":"A face can be sketch by freehand based on the evidence of an eyewitness description which is necessary for the Detectives to tract the looks of the offender. This process is slow; moreover there are some factors which cannot be assumed by the artist, including weight, hair color and length, and eye color. However, if this process is conducted correctly, the result should bear a striking resemblance to the individual. As with composite drawings, an image of the resulting face can then be distributed among law enforcement personnel or to the general public. The reconstructed face should be photographed in such a way that there is no perspective distortion. This paper presents Face Reconstruction for Identification that approach is relatively same with the sketching by freehand. However, this system will reconstruction and generate the face automatically. This will create an effectiveness and efficiency in identifying and recognize the offender.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127176588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-26DOI: 10.1109/CSIT.2014.6805987
A. Boudhief, M. Maraoui, M. Zrigui
In this paper we carried out a bibliographic research concerning distance learning, pedagogical indexing and integration of accessibility in e-Learning platforms. Then, to achieve the goals we have chosen “IMS AccessForALL” as standard to realize our model. The model that we realized is consistent with the standard followed. We also taken into consideration the guidelines of the WAI (Web accessibility Initiative) presented in WCAG. Finally, for the step of indexing, we started with the creation of the XML schema, then the indexation of resources in the true sense of the term.
{"title":"Elaboration of a model for an indexed base for teaching Arabic language to disabled people","authors":"A. Boudhief, M. Maraoui, M. Zrigui","doi":"10.1109/CSIT.2014.6805987","DOIUrl":"https://doi.org/10.1109/CSIT.2014.6805987","url":null,"abstract":"In this paper we carried out a bibliographic research concerning distance learning, pedagogical indexing and integration of accessibility in e-Learning platforms. Then, to achieve the goals we have chosen “IMS AccessForALL” as standard to realize our model. The model that we realized is consistent with the standard followed. We also taken into consideration the guidelines of the WAI (Web accessibility Initiative) presented in WCAG. Finally, for the step of indexing, we started with the creation of the XML schema, then the indexation of resources in the true sense of the term.","PeriodicalId":278806,"journal":{"name":"2014 6th International Conference on Computer Science and Information Technology (CSIT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}