Nowadays, cloud computing has become the center of attention in the IT world. It provides powerful computing services to individuals and organizations via the Internet, and enables them to access a pool of shared resources such as storage servers and applications. Businesses of all sizes are adopting cloud computing at an increasing rate as it provides them with great benefits like cost efficiency, since they do not actually have to buy the hardware and software resources, but simply pay per use. The cloud architecture consists of different levels in which each level gives the user additional control. Furthermore, a good operating system is crucial, and traditional operating systems cannot attain all the requirements of the cloud. For this reason, special operating systems need to be designed that can handle the demands of the cloud. This paper will discuss the cloud architecture and operating system.
{"title":"Cloud Computing: Architecture and Operating System","authors":"Hodan M. Musse, Lama A. Alamro","doi":"10.1109/GSCIT.2016.7","DOIUrl":"https://doi.org/10.1109/GSCIT.2016.7","url":null,"abstract":"Nowadays, cloud computing has become the center of attention in the IT world. It provides powerful computing services to individuals and organizations via the Internet, and enables them to access a pool of shared resources such as storage servers and applications. Businesses of all sizes are adopting cloud computing at an increasing rate as it provides them with great benefits like cost efficiency, since they do not actually have to buy the hardware and software resources, but simply pay per use. The cloud architecture consists of different levels in which each level gives the user additional control. Furthermore, a good operating system is crucial, and traditional operating systems cannot attain all the requirements of the cloud. For this reason, special operating systems need to be designed that can handle the demands of the cloud. This paper will discuss the cloud architecture and operating system.","PeriodicalId":295398,"journal":{"name":"2016 Global Summit on Computer & Information Technology (GSCIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114598822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Afef Salhi, Yacine Moresly, F. Ghozzi, Ameni Yengui, A. Fakhfakh
This paper describes an implementation system tracking and detection object and multi-object. We trait the different tracking algorithms of moving objects in video sequences. The tracking a particular precise object, robust, efficient, reliable and fast is a difficult problem to solve. Hence, it is a very essential for computer vision applications. For this reason, tracking objects in video sequences is a very active area of research since the 1970. It has attracted many people in the area of research for use in a variety of applications. The tracking is often the first step in an analysis of the activities, detection, behavior, interactions and relationships between objects of interest. Many methods of tracking objects have been proposed and developed. Tracking is the estimation and analysis of the trajectories of an object in the frame plane by moving in an frame where video sequence. Most of the motion objects tracking algorithms take input frames captured by a fixed camera to give at output a video sequence. However, there are other algorithms that take as input a video sequence to provide a video at output containing the tracked objects. These algorithms perform a first step of the detection objects in order to determine which of the pixels of the current frame which belong to the background of the sequence and which represent the motion objects. The problem of object tracking can be expressed in terms of detection of the object in each frame of the video sequence. The set of applications (security systems, military systems, intelligent transportation systems, video conferencing, surveillance, etc.) can be addressed. So, the lightness of the systems also lets you open recent applications such as human-machine interface and/or the human-robot interface, where the sensors can be embedded on a mobile robot. This usually requires the exploitation of object tracking techniques and algorithms in motion that will register and implement on FPGA targets that are introduced in these interfaces. We can cite as an example then the main existing algorithms in the literature as the block-matching, the KLT, the Kalman filter, the Meanshift and the Camshift.
{"title":"Modeling from an Object and Multi-object Tracking System","authors":"Afef Salhi, Yacine Moresly, F. Ghozzi, Ameni Yengui, A. Fakhfakh","doi":"10.1109/GSCIT.2016.20","DOIUrl":"https://doi.org/10.1109/GSCIT.2016.20","url":null,"abstract":"This paper describes an implementation system tracking and detection object and multi-object. We trait the different tracking algorithms of moving objects in video sequences. The tracking a particular precise object, robust, efficient, reliable and fast is a difficult problem to solve. Hence, it is a very essential for computer vision applications. For this reason, tracking objects in video sequences is a very active area of research since the 1970. It has attracted many people in the area of research for use in a variety of applications. The tracking is often the first step in an analysis of the activities, detection, behavior, interactions and relationships between objects of interest. Many methods of tracking objects have been proposed and developed. Tracking is the estimation and analysis of the trajectories of an object in the frame plane by moving in an frame where video sequence. Most of the motion objects tracking algorithms take input frames captured by a fixed camera to give at output a video sequence. However, there are other algorithms that take as input a video sequence to provide a video at output containing the tracked objects. These algorithms perform a first step of the detection objects in order to determine which of the pixels of the current frame which belong to the background of the sequence and which represent the motion objects. The problem of object tracking can be expressed in terms of detection of the object in each frame of the video sequence. The set of applications (security systems, military systems, intelligent transportation systems, video conferencing, surveillance, etc.) can be addressed. So, the lightness of the systems also lets you open recent applications such as human-machine interface and/or the human-robot interface, where the sensors can be embedded on a mobile robot. This usually requires the exploitation of object tracking techniques and algorithms in motion that will register and implement on FPGA targets that are introduced in these interfaces. We can cite as an example then the main existing algorithms in the literature as the block-matching, the KLT, the Kalman filter, the Meanshift and the Camshift.","PeriodicalId":295398,"journal":{"name":"2016 Global Summit on Computer & Information Technology (GSCIT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127041891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing is a distributed computing modelwhich enables developers to automatically deploy applicationsduring task allocation and storage distribution. Cloud computingintends to share a pool of virtualized computer resources andequipment's of computation, storage and information. In cloudcomputing environment, task scheduling is a key problem whichneeds to consider various factors restricting the user tasks and isresponsible for selecting the most suitable resources of cloudcomputing for user task. Task scheduling algorithm is an NPcompleteproblem which places an important role in cloudcomputing. This article surveys the literature on job schedulingalgorithms as they apply to cloud computing environment. Itsummarizes keys of performance of each algorithm in different loadstates from conducted simulation.
{"title":"A Survey on Cloud Computing Scheduling Algorithms","authors":"Essaies Meriam, N. Tabbane","doi":"10.1109/GSCIT.2016.6","DOIUrl":"https://doi.org/10.1109/GSCIT.2016.6","url":null,"abstract":"Cloud computing is a distributed computing modelwhich enables developers to automatically deploy applicationsduring task allocation and storage distribution. Cloud computingintends to share a pool of virtualized computer resources andequipment's of computation, storage and information. In cloudcomputing environment, task scheduling is a key problem whichneeds to consider various factors restricting the user tasks and isresponsible for selecting the most suitable resources of cloudcomputing for user task. Task scheduling algorithm is an NPcompleteproblem which places an important role in cloudcomputing. This article surveys the literature on job schedulingalgorithms as they apply to cloud computing environment. Itsummarizes keys of performance of each algorithm in different loadstates from conducted simulation.","PeriodicalId":295398,"journal":{"name":"2016 Global Summit on Computer & Information Technology (GSCIT)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129583330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Technologies change our life. Out of many emerging technologies, Internet of Things (IoT), also known as machine to-machine (M2M) (where smart devices that collect data, relay information to one another. While current information technology enables people to carry out their business virtually at any time in any place. The fact that the personal information can be collected, stored and used without any consent or awareness creates fear for privacy violation for many people. Personal data should be handled under control of individuals to restore the necessary confidence. This paper attempts to put forward architecture to M2M called plug M2M which would address these new threats.
{"title":"Privacy in the Age of Internet of Things: Challenges and Prospects","authors":"Amira Ayadi, S. Sassi","doi":"10.1109/GSCIT.2016.22","DOIUrl":"https://doi.org/10.1109/GSCIT.2016.22","url":null,"abstract":"Technologies change our life. Out of many emerging technologies, Internet of Things (IoT), also known as machine to-machine (M2M) (where smart devices that collect data, relay information to one another. While current information technology enables people to carry out their business virtually at any time in any place. The fact that the personal information can be collected, stored and used without any consent or awareness creates fear for privacy violation for many people. Personal data should be handled under control of individuals to restore the necessary confidence. This paper attempts to put forward architecture to M2M called plug M2M which would address these new threats.","PeriodicalId":295398,"journal":{"name":"2016 Global Summit on Computer & Information Technology (GSCIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129681625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In a world of interdependent economies, the numberof threats imposed on the information system of companies andorganizations is steadily increasing. Companies need more thanever to prepare for major crises and organize to be able toensure continuity of its critical IT activities through theestablishment of a Disaster Recovery Plan. For manycompanies, the establishment of such plan was considered avery difficult task to achieve. The development of cloudcomputing offerings and their adoption within companies opensup new practices. One of them is the rescue of the informationsystem in the cloud. In this paper, we focus on presenting thisnew solution known as Disaster Recovery as a Service as well asgood practices in planning for a company to succeed such aproject. Our work was based on a comparative study betweentraditional IT strategies and DRaaS solution and arguedthrough the enumeration of some research works as well as thereturn to experience of some companies.
{"title":"Disaster Recovery as a Service: A Disaster Recovery Plan in the Cloud for SMEs","authors":"Hassen Ben Rebah, H. Sta","doi":"10.1109/GSCIT.2016.9","DOIUrl":"https://doi.org/10.1109/GSCIT.2016.9","url":null,"abstract":"In a world of interdependent economies, the numberof threats imposed on the information system of companies andorganizations is steadily increasing. Companies need more thanever to prepare for major crises and organize to be able toensure continuity of its critical IT activities through theestablishment of a Disaster Recovery Plan. For manycompanies, the establishment of such plan was considered avery difficult task to achieve. The development of cloudcomputing offerings and their adoption within companies opensup new practices. One of them is the rescue of the informationsystem in the cloud. In this paper, we focus on presenting thisnew solution known as Disaster Recovery as a Service as well asgood practices in planning for a company to succeed such aproject. Our work was based on a comparative study betweentraditional IT strategies and DRaaS solution and arguedthrough the enumeration of some research works as well as thereturn to experience of some companies.","PeriodicalId":295398,"journal":{"name":"2016 Global Summit on Computer & Information Technology (GSCIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127899450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The major problem in the use of the Web is that of searching for relevant information that meets the expectations of a user. This problem increases every day and especially with the emergence of web 2.0 or social web. Our paper, therefore, ignores the disadvantage of social web and operates it to rich user profile.
{"title":"Semantic Approach for the Building of User Profile for Recommender System","authors":"Sara Alaoui, R. Ajhoun, Y. Idrissi","doi":"10.1109/GSCIT.2016.27","DOIUrl":"https://doi.org/10.1109/GSCIT.2016.27","url":null,"abstract":"The major problem in the use of the Web is that of searching for relevant information that meets the expectations of a user. This problem increases every day and especially with the emergence of web 2.0 or social web. Our paper, therefore, ignores the disadvantage of social web and operates it to rich user profile.","PeriodicalId":295398,"journal":{"name":"2016 Global Summit on Computer & Information Technology (GSCIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123583766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Experience has shown that the traditional query languages do not provide user-friendly means for a casual user. In addition, no mechanism is provided to guide him in the process of understanding the information contained in the database. The work carried out in the context of this paper is therefore based on a central issue: assisting an occasional user in the database management process. Indeed, faced with the complexity of traditional query languages, it becomes important to propose ways of friendly interaction that help the nonprofessional user in different databases management exercises, which are adapted to its needs and its daily use. Our graphical query language is based on a generic three-tier architecture. It is based on four basic components: The Graphical Data Meta-Model that provides a meta-modeling of the data model of this language. The Graphical Manipulation Language and the primitives associated therewith. And finally, the prototype of validation that is based primarily on an iconic query-composition interface, and a visualization interface of the query results.
{"title":"Visual Query Manager: A Query Manager for Visual Management of Semantic Databases","authors":"S. Sassi, A. Dridi, Anis Tissaoui","doi":"10.1109/GSCIT.2016.19","DOIUrl":"https://doi.org/10.1109/GSCIT.2016.19","url":null,"abstract":"Experience has shown that the traditional query languages do not provide user-friendly means for a casual user. In addition, no mechanism is provided to guide him in the process of understanding the information contained in the database. The work carried out in the context of this paper is therefore based on a central issue: assisting an occasional user in the database management process. Indeed, faced with the complexity of traditional query languages, it becomes important to propose ways of friendly interaction that help the nonprofessional user in different databases management exercises, which are adapted to its needs and its daily use. Our graphical query language is based on a generic three-tier architecture. It is based on four basic components: The Graphical Data Meta-Model that provides a meta-modeling of the data model of this language. The Graphical Manipulation Language and the primitives associated therewith. And finally, the prototype of validation that is based primarily on an iconic query-composition interface, and a visualization interface of the query results.","PeriodicalId":295398,"journal":{"name":"2016 Global Summit on Computer & Information Technology (GSCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127437111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Diab, Bassam Moslem, R. Alkhatib, C. Corbier, M. Mohamed el Badaoui
Signal is a physical quantity we can measure like gait vertical ground reaction force. However, the latter are such non- stationary signals require a deep understanding of their instantaneous amplitude, phase and frequency. From this, one can model its stationary and non- stationary part and approximate the noise. In addition, one can practice such features for inter-subject classification of the vertical ground reaction force signals like between normal and pathological. Not to add, one objective could also concentrate in intra-subject classification like between usual gait and gait associated with cognitive tasks for the same subject as this paper mainly concerns. For that purpose, Synchrosqueezing of time-frequency representation is being used to spot its power in non-stationary signal analysis and classification. This technique also helped in developing an accurate detection of outliers within such time series signal like when subjects encounter turning points during walking. All this would help in a correct assessing treatment effectiveness and précising the stage of disease. In addition, this would be a starting point for having accurate parameters in elderly fall detection.
{"title":"Synchrosqueezing Characterize Non-stationary Signals: Application on Gait-Vertical Ground Reaction Force","authors":"M. Diab, Bassam Moslem, R. Alkhatib, C. Corbier, M. Mohamed el Badaoui","doi":"10.1109/GSCIT.2016.28","DOIUrl":"https://doi.org/10.1109/GSCIT.2016.28","url":null,"abstract":"Signal is a physical quantity we can measure like gait vertical ground reaction force. However, the latter are such non- stationary signals require a deep understanding of their instantaneous amplitude, phase and frequency. From this, one can model its stationary and non- stationary part and approximate the noise. In addition, one can practice such features for inter-subject classification of the vertical ground reaction force signals like between normal and pathological. Not to add, one objective could also concentrate in intra-subject classification like between usual gait and gait associated with cognitive tasks for the same subject as this paper mainly concerns. For that purpose, Synchrosqueezing of time-frequency representation is being used to spot its power in non-stationary signal analysis and classification. This technique also helped in developing an accurate detection of outliers within such time series signal like when subjects encounter turning points during walking. All this would help in a correct assessing treatment effectiveness and précising the stage of disease. In addition, this would be a starting point for having accurate parameters in elderly fall detection.","PeriodicalId":295398,"journal":{"name":"2016 Global Summit on Computer & Information Technology (GSCIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123868662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Extreme value theory assumes that random variables are independent and identically distributed. This assumption cannot occur in time series analysis. In this paper, we investigate the extremal behavior of a stationary Gaussian autoregressive model. The Kolmogorov-Smirnov goodness of fit test shows that block maxima data converges in probability to a Gumbel distribution, so the introduction of dependence assumption doesn’t affect the extreme values distribution type.
{"title":"Extreme Value Theory for Univariate Stationary Processes","authors":"Samia Ayari, M. Boutahar","doi":"10.1109/GSCIT.2016.24","DOIUrl":"https://doi.org/10.1109/GSCIT.2016.24","url":null,"abstract":"Extreme value theory assumes that random variables are independent and identically distributed. This assumption cannot occur in time series analysis. In this paper, we investigate the extremal behavior of a stationary Gaussian autoregressive model. The Kolmogorov-Smirnov goodness of fit test shows that block maxima data converges in probability to a Gumbel distribution, so the introduction of dependence assumption doesn’t affect the extreme values distribution type.","PeriodicalId":295398,"journal":{"name":"2016 Global Summit on Computer & Information Technology (GSCIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132790175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Group recommender systems are usually built around a property that characterizes the groups (e.g., the size or the cohesion). However, the performance a system always measures how accurate the produced recommendations are and no study shows if the properties that characterize a group have an impact on the accuracy of the system (e.g., if more cohesive groups lead to more accurate recommendations). This paper presents a novel study of the correlation between the properties that characterize a group and the accuracy of the system for that group. This local analysis helps understanding which properties of a group have an impact on the accuracy. Thanks to this study, the design of a group recommender systems can be improved, by tailoring the recommendations on the characteristics of the groups. Experimental results show that the properties that affect the performance of a system are those related to the cohesiveness of a group.
{"title":"Analysis of the Properties that Affect the Accuracy of a Group Recommender System","authors":"Ludovico Boratto, S. Carta, G. Fenu","doi":"10.1109/GSCIT.2016.16","DOIUrl":"https://doi.org/10.1109/GSCIT.2016.16","url":null,"abstract":"Group recommender systems are usually built around a property that characterizes the groups (e.g., the size or the cohesion). However, the performance a system always measures how accurate the produced recommendations are and no study shows if the properties that characterize a group have an impact on the accuracy of the system (e.g., if more cohesive groups lead to more accurate recommendations). This paper presents a novel study of the correlation between the properties that characterize a group and the accuracy of the system for that group. This local analysis helps understanding which properties of a group have an impact on the accuracy. Thanks to this study, the design of a group recommender systems can be improved, by tailoring the recommendations on the characteristics of the groups. Experimental results show that the properties that affect the performance of a system are those related to the cohesiveness of a group.","PeriodicalId":295398,"journal":{"name":"2016 Global Summit on Computer & Information Technology (GSCIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125093009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}