首页 > 最新文献

2020 International Conference on Intelligent Systems and Computer Vision (ISCV)最新文献

英文 中文
Why implement continuity plans in Organizations? Approach of a prospective study based on ITIL 为什么要在组织中实施持续性计划?基于ITIL的前瞻性研究方法
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204335
R. Mónica, Quisnancela Henry, Macas Estela, Fierro Washington
The objective of the article is to determine the importance of the implementation of a business continuity plan. Initially, a brief study of continuity is presented, emphasizing its history and evolution. it chases and the life cycle. Finally, the stages for the implementation of a BCP based on ITIL V3 are presented, followed by critical and reflective conclusions about the importance of its implementation.
本文的目的是确定实现业务连续性计划的重要性。首先,简要介绍了连续性的研究,强调了它的历史和演变。它追逐和生命周期。最后,介绍了基于ITIL V3的BCP的实施阶段,随后给出了关于其实施重要性的批判性和反思性结论。
{"title":"Why implement continuity plans in Organizations? Approach of a prospective study based on ITIL","authors":"R. Mónica, Quisnancela Henry, Macas Estela, Fierro Washington","doi":"10.1109/ISCV49265.2020.9204335","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204335","url":null,"abstract":"The objective of the article is to determine the importance of the implementation of a business continuity plan. Initially, a brief study of continuity is presented, emphasizing its history and evolution. it chases and the life cycle. Finally, the stages for the implementation of a BCP based on ITIL V3 are presented, followed by critical and reflective conclusions about the importance of its implementation.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120848489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Markovian Segmentation Of Textured Color Images 纹理彩色图像的马尔可夫分割
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204066
M. Ameur, C. Daoui, N. Idrissi
This paper presents an application of textured color images segmentation using hidden Markov chain model. We propose two comparative studies, The first one is between EM(Expectation-Maximization) algorithm,SEM (Stochastic Expectation-Maximization) algorithm and ICE (Iterative Conditional Estimation) algorithm, these estimators are used to estimate the parameters of Hidden Markov Chain with Independent Noise. The second one is between MAP(Maximum a Posteriori) and MPM(Maximum Marginal Posteriori) algorithms. These strategies are used to estimate the resulted images of segmentation. The obtained results show that EM algorithm, SEM, and ICE algorithm give the same results of segmentation under MAP and MPM algorithms. But, MPM provides better segmentation results than MAP.
介绍了隐马尔可夫链模型在纹理彩色图像分割中的应用。我们提出了两个比较研究,首先是EM(Expectation-Maximization)算法、SEM (Stochastic Expectation-Maximization)算法和ICE (Iterative Conditional Estimation)算法,这些估计器用于估计具有独立噪声的隐马尔可夫链的参数。第二个是MAP(Maximum a Posteriori)和MPM(Maximum Marginal Posteriori)算法之间的问题。这些策略用于估计分割后的结果图像。结果表明,EM算法、SEM算法和ICE算法在MAP和MPM算法下的分割结果相同。但MPM的分割效果优于MAP。
{"title":"Markovian Segmentation Of Textured Color Images","authors":"M. Ameur, C. Daoui, N. Idrissi","doi":"10.1109/ISCV49265.2020.9204066","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204066","url":null,"abstract":"This paper presents an application of textured color images segmentation using hidden Markov chain model. We propose two comparative studies, The first one is between EM(Expectation-Maximization) algorithm,SEM (Stochastic Expectation-Maximization) algorithm and ICE (Iterative Conditional Estimation) algorithm, these estimators are used to estimate the parameters of Hidden Markov Chain with Independent Noise. The second one is between MAP(Maximum a Posteriori) and MPM(Maximum Marginal Posteriori) algorithms. These strategies are used to estimate the resulted images of segmentation. The obtained results show that EM algorithm, SEM, and ICE algorithm give the same results of segmentation under MAP and MPM algorithms. But, MPM provides better segmentation results than MAP.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134269670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Reconstruction and Compression of Large Size ECG Signal by Tchebichef Moments 基于切切夫矩的大容量心电信号的高效重构与压缩
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204132
A. Daoui, M. Yamni, H. Karmouni, O. E. Ogri, M. Sayyouri, H. Qjidaa
In this paper, we propose an efficient method for the compression and reconstruction of the large-size 1D electrocardiogram (ECG) signal. In this method, we use Thebichef moments calculated by the modified Gram-Schmidt ortho-normalization process with the use of a full large-sized signal (N=8000) in the reconstruction and compression process. The simulation results and the comparisons carried out show the efficiency and the superiority of the proposed compression and reconstruction methods in terms of the high quality of the compressed signals and in terms of the high compression ratio.
在本文中,我们提出了一种有效的大尺寸一维心电图信号的压缩和重建方法。在该方法中,我们使用改进的Gram-Schmidt正交归一化过程计算的Thebichef矩,在重建和压缩过程中使用一个完整的大尺寸信号(N=8000)。仿真结果和对比表明了所提出的压缩重构方法在压缩信号质量高、压缩比高等方面的有效性和优越性。
{"title":"Efficient Reconstruction and Compression of Large Size ECG Signal by Tchebichef Moments","authors":"A. Daoui, M. Yamni, H. Karmouni, O. E. Ogri, M. Sayyouri, H. Qjidaa","doi":"10.1109/ISCV49265.2020.9204132","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204132","url":null,"abstract":"In this paper, we propose an efficient method for the compression and reconstruction of the large-size 1D electrocardiogram (ECG) signal. In this method, we use Thebichef moments calculated by the modified Gram-Schmidt ortho-normalization process with the use of a full large-sized signal (N=8000) in the reconstruction and compression process. The simulation results and the comparisons carried out show the efficiency and the superiority of the proposed compression and reconstruction methods in terms of the high quality of the compressed signals and in terms of the high compression ratio.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132689169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Remote health monitoring system of elderly based on Fog to Cloud (F2C) computing 基于雾到云(F2C)计算的老年人远程健康监测系统
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204096
Hafida Saidi, Nabila Labraoui, Ado Adamou Abba Ari, Djelloul Bouida
The majority of older persons are challenged by chronic illnesses, so more innovations are needed for geriatric care. Therefore, technological and modern techniques have been adopted to improve the elderly's health. Different computing solutions have been deployed to store and process the health data such as cloud computing which provides powerful computing resources. However, connecting different kind of things directly to the cloud is inefficient. Fortunately, fog computing has emerged as a new computing solution to complement cloud, it allows computation and data storage closer to the IoT devices. However, managing health data stored in fog computing presents a major issue. It is necessary to consider the importance of performance, availability, storage, and privacy of data in fog computing. In this paper, we propose architecture based on Fog to Cloud computing which is a novel solution and innovative approach that contribute to enhance the synergy between the cloud and fog computing to facilitate the management of elderly health data. To analyze the performance of our model in Fog to Cloud environment, FogWorkflowSim toolkit has been used.
大多数老年人受到慢性病的挑战,因此需要在老年护理方面进行更多创新。因此,科技和现代技术已被采用,以改善老年人的健康。已经部署了不同的计算解决方案来存储和处理健康数据,例如云计算,它提供了强大的计算资源。然而,将不同类型的东西直接连接到云是低效的。幸运的是,雾计算已经成为一种新的计算解决方案,以补充云计算,它允许计算和数据存储更接近物联网设备。然而,管理存储在雾计算中的健康数据是一个主要问题。在雾计算中,有必要考虑数据的性能、可用性、存储和隐私的重要性。本文提出了一种基于雾到云计算的架构,这是一种新的解决方案和创新方法,有助于增强云和雾计算之间的协同作用,从而促进老年人健康数据的管理。为了分析我们的模型在Fog To Cloud环境下的性能,使用了FogWorkflowSim工具包。
{"title":"Remote health monitoring system of elderly based on Fog to Cloud (F2C) computing","authors":"Hafida Saidi, Nabila Labraoui, Ado Adamou Abba Ari, Djelloul Bouida","doi":"10.1109/ISCV49265.2020.9204096","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204096","url":null,"abstract":"The majority of older persons are challenged by chronic illnesses, so more innovations are needed for geriatric care. Therefore, technological and modern techniques have been adopted to improve the elderly's health. Different computing solutions have been deployed to store and process the health data such as cloud computing which provides powerful computing resources. However, connecting different kind of things directly to the cloud is inefficient. Fortunately, fog computing has emerged as a new computing solution to complement cloud, it allows computation and data storage closer to the IoT devices. However, managing health data stored in fog computing presents a major issue. It is necessary to consider the importance of performance, availability, storage, and privacy of data in fog computing. In this paper, we propose architecture based on Fog to Cloud computing which is a novel solution and innovative approach that contribute to enhance the synergy between the cloud and fog computing to facilitate the management of elderly health data. To analyze the performance of our model in Fog to Cloud environment, FogWorkflowSim toolkit has been used.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134045454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Novel Pooling Method for Regularization of Deep Neural networks 一种新的深度神经网络正则化池化方法
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204322
El houssaine Hssayni, M. Ettaouil
Dropout has been introduced as a powerful regularization approach to preventing overfitting problem in deep neural networks, particularly in deep convolutional neural networks(DCNNs). A number of methods have been designed recently to improve and generalize the dropout technique. These methods include spectral dropout which achieves improved generalization and avoids overfitting by eliminating noisy and weak Fourier domain coefficients of the neural network activations. On the other hand, a pooling process plays a crucial role in deep convolutional neural networks, which serves to reduce the dimensionality of processed data for decreasing computational cost as well as for avoiding overfitting and enhancing the generalization capability of the network. For this reason, we focus on the pooling layer, and we propose a new pooling method called Spectral Dropout Pooling, by applying the Spectral dropout technique in the pooling region, in order to avoid overfitting problem, as well as to enhance the generalization ability of DCNNs. Experimental results on several image benchmarks show that Spectral Dropout Pooling outperforms the existing pooling methods in classification performance as well as is effective for improving the generalization ability of DCNNs. Moreover, we show that Spectral Dropout Pooling combined with other regularization methods, such as batch normalization, is competitive with other existing methods in classification performance.
Dropout作为一种有效的正则化方法被引入深度神经网络,特别是深度卷积神经网络(DCNNs)中,以防止过拟合问题。最近已经设计了许多方法来改进和推广dropout技术。这些方法包括谱dropout,它通过消除神经网络激活的噪声和弱傅立叶域系数来实现改进的泛化和避免过拟合。另一方面,池化过程在深度卷积神经网络中起着至关重要的作用,它可以降低处理数据的维数,从而降低计算成本,避免过拟合,增强网络的泛化能力。为此,我们着眼于池化层,提出了一种新的池化方法——谱Dropout池化,通过在池化区域应用谱Dropout技术,避免了过拟合问题,同时增强了DCNNs的泛化能力。在多个图像基准上的实验结果表明,谱Dropout池化方法在分类性能上优于现有的池化方法,能够有效地提高DCNNs的泛化能力。此外,我们还表明,谱Dropout池与其他正则化方法(如批归一化)相结合,在分类性能上与其他现有方法具有竞争力。
{"title":"A Novel Pooling Method for Regularization of Deep Neural networks","authors":"El houssaine Hssayni, M. Ettaouil","doi":"10.1109/ISCV49265.2020.9204322","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204322","url":null,"abstract":"Dropout has been introduced as a powerful regularization approach to preventing overfitting problem in deep neural networks, particularly in deep convolutional neural networks(DCNNs). A number of methods have been designed recently to improve and generalize the dropout technique. These methods include spectral dropout which achieves improved generalization and avoids overfitting by eliminating noisy and weak Fourier domain coefficients of the neural network activations. On the other hand, a pooling process plays a crucial role in deep convolutional neural networks, which serves to reduce the dimensionality of processed data for decreasing computational cost as well as for avoiding overfitting and enhancing the generalization capability of the network. For this reason, we focus on the pooling layer, and we propose a new pooling method called Spectral Dropout Pooling, by applying the Spectral dropout technique in the pooling region, in order to avoid overfitting problem, as well as to enhance the generalization ability of DCNNs. Experimental results on several image benchmarks show that Spectral Dropout Pooling outperforms the existing pooling methods in classification performance as well as is effective for improving the generalization ability of DCNNs. Moreover, we show that Spectral Dropout Pooling combined with other regularization methods, such as batch normalization, is competitive with other existing methods in classification performance.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129806763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
k-eNSC: k-estimation for Normalized Spectral Clustering k- enc:归一化谱聚类的k估计
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204117
Zakariyaa Ait El Mouden, A. Jakimi
In machine learning, the power of an approach is measured by its capability to be adapted for different applications and using different formats of data. Spectral Clustering is an unsupervised method that can be adopted for many research fields in and beyond computer science. In this paper, we present and analyze the existing algorithms of spectral clustering, and based on their limits we propose our modified version to deal with the most common challenge in this context which is the dynamic estimation of the output number of clusters.
在机器学习中,一种方法的能力是通过它适应不同应用程序和使用不同格式数据的能力来衡量的。谱聚类是一种无监督的聚类方法,可以应用于计算机科学以外的许多研究领域。在本文中,我们介绍和分析了现有的谱聚类算法,并根据它们的局限性提出了改进的谱聚类算法,以解决在这种情况下最常见的挑战,即动态估计输出的簇数。
{"title":"k-eNSC: k-estimation for Normalized Spectral Clustering","authors":"Zakariyaa Ait El Mouden, A. Jakimi","doi":"10.1109/ISCV49265.2020.9204117","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204117","url":null,"abstract":"In machine learning, the power of an approach is measured by its capability to be adapted for different applications and using different formats of data. Spectral Clustering is an unsupervised method that can be adopted for many research fields in and beyond computer science. In this paper, we present and analyze the existing algorithms of spectral clustering, and based on their limits we propose our modified version to deal with the most common challenge in this context which is the dynamic estimation of the output number of clusters.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114397876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Text Encryption: Hybrid cryptographic method using Vigenere and Hill Ciphers. 文本加密:使用Vigenere和Hill密码的混合加密方法。
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204095
Hamza Touil, N. E. Akkad, K. Satori
Cryptography is a method of controlling and protecting communications, which has been used exclusively in areas that require confidentiality. Today it is undergoing a considerable evolution, and computer networks require a phase of cryptography as a fundamental mechanism to ensure the privacy of digital information. It was beginning with the first Cesar encryption algorithm or those that appeared just afterwards, such as mono-alphabetic substitution encryption, which has a weakness against statistical attacks. In this paper, we will present a hybridization of Vigenere and Hill encryption that belongs to this family. By exploiting the enhancements, they have already implemented in Hill encryption, to hide the weak point of the Vigenere algorithm, represented in the ease to detect the size of the key to start a statistical attack, as well as the weakness of the algorithm to encrypt two same letters located in the same place in different blocks. This cohesion between these two methods will provide us with a reliable hybrid algorithm, resistant to varying attacks, including statistical attacks.
密码学是一种控制和保护通信的方法,专门用于需要保密的领域。今天,它正经历着相当大的演变,计算机网络需要一个阶段的密码学作为一种基本机制来确保数字信息的隐私。它始于第一个Cesar加密算法或之后出现的那些算法,比如单字母替换加密,它在抵御统计攻击方面存在弱点。在本文中,我们将提出一个属于这个家族的Vigenere和Hill加密的杂交。通过利用这些增强,他们已经在Hill加密中实现了,以隐藏Vigenere算法的弱点,即易于检测密钥的大小以启动统计攻击,以及该算法加密位于不同块中相同位置的两个相同字母的弱点。这两种方法之间的内聚性将为我们提供一种可靠的混合算法,可以抵抗各种攻击,包括统计攻击。
{"title":"Text Encryption: Hybrid cryptographic method using Vigenere and Hill Ciphers.","authors":"Hamza Touil, N. E. Akkad, K. Satori","doi":"10.1109/ISCV49265.2020.9204095","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204095","url":null,"abstract":"Cryptography is a method of controlling and protecting communications, which has been used exclusively in areas that require confidentiality. Today it is undergoing a considerable evolution, and computer networks require a phase of cryptography as a fundamental mechanism to ensure the privacy of digital information. It was beginning with the first Cesar encryption algorithm or those that appeared just afterwards, such as mono-alphabetic substitution encryption, which has a weakness against statistical attacks. In this paper, we will present a hybridization of Vigenere and Hill encryption that belongs to this family. By exploiting the enhancements, they have already implemented in Hill encryption, to hide the weak point of the Vigenere algorithm, represented in the ease to detect the size of the key to start a statistical attack, as well as the weakness of the algorithm to encrypt two same letters located in the same place in different blocks. This cohesion between these two methods will provide us with a reliable hybrid algorithm, resistant to varying attacks, including statistical attacks.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134472334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Context Aware for Internet of Things: A Survey 物联网环境感知:一项调查
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204058
Hadjer Messabih, Soheyb Ayad, L. Terrissa
After the spread of sensors deployment in different domains, the con-aware paradigm has emerged, it is basically based on sensors for data collecting process in order to generate a con that represent an information which characterize a real time situation of an entity. This paradigm has vastly improved the classic systems. Progress of technologies do not stopped in con-aware but was followed by the Internet of Things (IoT) concept, and the success appeared when combining the conaware paradigm and the IoT. In this paper, we survey conaware with IoT related works. At first we present the basic concepts of con-aware, and the principles techniques used in the life cycle of the con. In second, we illustrate taxonomy of recent works. After that, a comparison study of the studied works will be presented and discussed. Finally, we conclude with some points that can improve the future works.
随着传感器在不同领域的广泛部署,感知模式应运而生,它基本上是基于传感器进行数据收集过程,以生成表征实体实时情况的信息的感知模式。这种范式极大地改进了经典系统。技术的进步并没有止步于意识,而是随之而来的是物联网(IoT)概念,而成功的出现是在意识范式与物联网相结合的时候。在本文中,我们概述了意识与物联网相关的工作。首先,我们介绍了con-aware的基本概念,以及在con的生命周期中使用的原理技术。其次,我们说明了最近工作的分类。之后,将对所研究的作品进行比较研究和讨论。最后,对今后的工作提出了改进意见。
{"title":"Context Aware for Internet of Things: A Survey","authors":"Hadjer Messabih, Soheyb Ayad, L. Terrissa","doi":"10.1109/ISCV49265.2020.9204058","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204058","url":null,"abstract":"After the spread of sensors deployment in different domains, the con-aware paradigm has emerged, it is basically based on sensors for data collecting process in order to generate a con that represent an information which characterize a real time situation of an entity. This paradigm has vastly improved the classic systems. Progress of technologies do not stopped in con-aware but was followed by the Internet of Things (IoT) concept, and the success appeared when combining the conaware paradigm and the IoT. In this paper, we survey conaware with IoT related works. At first we present the basic concepts of con-aware, and the principles techniques used in the life cycle of the con. In second, we illustrate taxonomy of recent works. After that, a comparison study of the studied works will be presented and discussed. Finally, we conclude with some points that can improve the future works.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125243308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
“Stress-free” mobile app for Moroccan university students: “relaxation program” validation 摩洛哥大学生“无压力”手机应用:“放松程序”验证
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204232
Elmadani Hakima, Baya Maryem, Yazghich Ikrame, Taoufiq Imane, Aarab Chadya, B. Mohamed
The aim of this study was to validate an antistress program called “relaxation program” that will be included in the “stress-free” mobile app designed to help Moroccan university students to better manage their psychological stress. The study took place between November 2018 and February 2019 at Faculty of Medicine and Pharmacy of Fez (Morocco). 5th year Medical students were our target population in this study. At first, a cross sectional study was conducted in order to measure students’ baseline stress level by using Perceived Stress Scale 10 (PSS-10) and to assess to students’ acceptability of an antistress mobile application. Based on the results of this study, an interventional part was set up in collaboration with Psychiatric Service of University Hospital Center of Fez (Morocco). In this study, two groups have been created: “group test” who received the “relaxation program” and “group control” who did not receive any type of intervention. The baseline stress level had been qualified “moderate” or “high” for the two groups. The aim of this interventional part was to validate the “relaxation program” by both comparing stress level before and after receiving the “relaxation program” for “group test” and to confirm the stability of stress level for “group control”. 308 students, of whom 61.03% are female, co-operated and accepted to complete the baseline questionnaire. The mean age was 22.35 (SD = 1.22). The premeasurement of stress level showed that 115 (37.5%) of our population had a moderate stress level, and 6.5% had a high stress level. The idea of establishment of an anti-stress mobile application was well accepted by students as 73.37% of them ranged their opinion between “beneficial” and “very beneficial”. The interventional study showed the effectiveness and validity of “relaxation program” on reducing the stress level for “group test” by using the statistical t-test (Mean pre-measurement =26.14 vs. Mean post-measurement= 18.54; p =.000). This study highlights the statistical and clinical validity of “relaxation program”. Future studies will be planned in order to develop the adaptive design to this anti-stress program in order to incorporate it in the “stressfree” mobile application.
这项研究的目的是验证一个名为“放松计划”的抗压力计划,该计划将被纳入“无压力”移动应用程序,旨在帮助摩洛哥大学生更好地管理他们的心理压力。该研究于2018年11月至2019年2月在摩洛哥非斯医学院和药学院进行。五年级医学生是本研究的目标人群。首先,采用感知压力量表10 (PSS-10)测量学生的基线压力水平,并评估学生对抗压力移动应用程序的可接受性。根据这项研究的结果,与非斯大学医院中心(摩洛哥)精神科合作建立了介入部分。在这项研究中,已经创建了两组:接受“放松程序”的“组测试”和不接受任何干预的“组控制”。两组的基线压力水平被限定为“中等”或“高”。本介入部分的目的是通过比较“组试”接受“放松方案”前后的压力水平来验证“放松方案”,并确认“组控”的压力水平的稳定性。308名学生(其中61.03%为女性)配合并接受了基线问卷的填写。平均年龄22.35岁(SD = 1.22)。压力水平预测结果显示,115人(37.5%)处于中等压力水平,6.5%的人处于高压力水平。建立抗压力手机应用的想法得到了学生的认可,73.37%的学生认为“有益”和“非常有益”。介入研究采用统计学t检验显示“放松程序”对降低“组检验”应激水平的有效性和效度(测前均值=26.14 vs测后均值= 18.54;p =组织)。本研究强调了“放松程序”的统计和临床有效性。未来的研究将计划,以开发自适应设计,这一抗压力程序,以将其纳入“无压力”的移动应用程序。
{"title":"“Stress-free” mobile app for Moroccan university students: “relaxation program” validation","authors":"Elmadani Hakima, Baya Maryem, Yazghich Ikrame, Taoufiq Imane, Aarab Chadya, B. Mohamed","doi":"10.1109/ISCV49265.2020.9204232","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204232","url":null,"abstract":"The aim of this study was to validate an antistress program called “relaxation program” that will be included in the “stress-free” mobile app designed to help Moroccan university students to better manage their psychological stress. The study took place between November 2018 and February 2019 at Faculty of Medicine and Pharmacy of Fez (Morocco). 5th year Medical students were our target population in this study. At first, a cross sectional study was conducted in order to measure students’ baseline stress level by using Perceived Stress Scale 10 (PSS-10) and to assess to students’ acceptability of an antistress mobile application. Based on the results of this study, an interventional part was set up in collaboration with Psychiatric Service of University Hospital Center of Fez (Morocco). In this study, two groups have been created: “group test” who received the “relaxation program” and “group control” who did not receive any type of intervention. The baseline stress level had been qualified “moderate” or “high” for the two groups. The aim of this interventional part was to validate the “relaxation program” by both comparing stress level before and after receiving the “relaxation program” for “group test” and to confirm the stability of stress level for “group control”. 308 students, of whom 61.03% are female, co-operated and accepted to complete the baseline questionnaire. The mean age was 22.35 (SD = 1.22). The premeasurement of stress level showed that 115 (37.5%) of our population had a moderate stress level, and 6.5% had a high stress level. The idea of establishment of an anti-stress mobile application was well accepted by students as 73.37% of them ranged their opinion between “beneficial” and “very beneficial”. The interventional study showed the effectiveness and validity of “relaxation program” on reducing the stress level for “group test” by using the statistical t-test (Mean pre-measurement =26.14 vs. Mean post-measurement= 18.54; p =.000). This study highlights the statistical and clinical validity of “relaxation program”. Future studies will be planned in order to develop the adaptive design to this anti-stress program in order to incorporate it in the “stressfree” mobile application.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124794928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Embedded Chien Search Block for Reed- Solomon (RS) Codes based on Factorization of Error Locator Polynomial 一种基于误差定位多项式分解的RS码嵌入式搜索块
Pub Date : 2020-06-01 DOI: 10.1109/ISCV49265.2020.9204314
Azeddine Wahbi, Anas El Habti El Idrissi, Mohamed Elghayyaty, A. Hadjoudja, B. Bensassi, L. Hlou
Coding corrector of errors is one of the most vital and emerged system in telecommunication field.In this paper, we propose an efficient new embedded Chien Search block for RS decoder. However, it adopts a factorization of error locator polynomial. The proposed design is developed by using hardware description language (HDL), after that, simulated and verified Quartus development software.To test the performances of the new developed design, minimization rate (Number of minimized logic gates) and BER criteria were used.Simulation results show the effectiveness of the proposed design than the basic. First, because it minimizes the number of logic gates and hardware resources. Therefore, a reduction of the power consumption with a minimization’s rate that can attain approximately 40 % compared to the basic algorithm. Further, because it reaches a lower bit error rate.
编码纠错是通信领域中最重要和新兴的系统之一。在本文中,我们提出了一种高效的RS译码器嵌入式搜索块。然而,它采用了误差定位多项式的因式分解。采用硬件描述语言(HDL)对设计方案进行了开发,并对Quartus开发软件进行了仿真验证。为了测试新设计的性能,使用了最小化率(最小化逻辑门数)和误码率准则。仿真结果表明,所提设计比基本设计更有效。首先,因为它最小化了逻辑门和硬件资源的数量。因此,与基本算法相比,降低功耗的最小化率可以达到大约40%。此外,因为它达到了较低的误码率。
{"title":"A New Embedded Chien Search Block for Reed- Solomon (RS) Codes based on Factorization of Error Locator Polynomial","authors":"Azeddine Wahbi, Anas El Habti El Idrissi, Mohamed Elghayyaty, A. Hadjoudja, B. Bensassi, L. Hlou","doi":"10.1109/ISCV49265.2020.9204314","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204314","url":null,"abstract":"Coding corrector of errors is one of the most vital and emerged system in telecommunication field.In this paper, we propose an efficient new embedded Chien Search block for RS decoder. However, it adopts a factorization of error locator polynomial. The proposed design is developed by using hardware description language (HDL), after that, simulated and verified Quartus development software.To test the performances of the new developed design, minimization rate (Number of minimized logic gates) and BER criteria were used.Simulation results show the effectiveness of the proposed design than the basic. First, because it minimizes the number of logic gates and hardware resources. Therefore, a reduction of the power consumption with a minimization’s rate that can attain approximately 40 % compared to the basic algorithm. Further, because it reaches a lower bit error rate.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123413827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 International Conference on Intelligent Systems and Computer Vision (ISCV)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1