Pub Date : 2020-06-01DOI: 10.1109/ISCV49265.2020.9204335
R. Mónica, Quisnancela Henry, Macas Estela, Fierro Washington
The objective of the article is to determine the importance of the implementation of a business continuity plan. Initially, a brief study of continuity is presented, emphasizing its history and evolution. it chases and the life cycle. Finally, the stages for the implementation of a BCP based on ITIL V3 are presented, followed by critical and reflective conclusions about the importance of its implementation.
{"title":"Why implement continuity plans in Organizations? Approach of a prospective study based on ITIL","authors":"R. Mónica, Quisnancela Henry, Macas Estela, Fierro Washington","doi":"10.1109/ISCV49265.2020.9204335","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204335","url":null,"abstract":"The objective of the article is to determine the importance of the implementation of a business continuity plan. Initially, a brief study of continuity is presented, emphasizing its history and evolution. it chases and the life cycle. Finally, the stages for the implementation of a BCP based on ITIL V3 are presented, followed by critical and reflective conclusions about the importance of its implementation.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120848489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ISCV49265.2020.9204066
M. Ameur, C. Daoui, N. Idrissi
This paper presents an application of textured color images segmentation using hidden Markov chain model. We propose two comparative studies, The first one is between EM(Expectation-Maximization) algorithm,SEM (Stochastic Expectation-Maximization) algorithm and ICE (Iterative Conditional Estimation) algorithm, these estimators are used to estimate the parameters of Hidden Markov Chain with Independent Noise. The second one is between MAP(Maximum a Posteriori) and MPM(Maximum Marginal Posteriori) algorithms. These strategies are used to estimate the resulted images of segmentation. The obtained results show that EM algorithm, SEM, and ICE algorithm give the same results of segmentation under MAP and MPM algorithms. But, MPM provides better segmentation results than MAP.
介绍了隐马尔可夫链模型在纹理彩色图像分割中的应用。我们提出了两个比较研究,首先是EM(Expectation-Maximization)算法、SEM (Stochastic Expectation-Maximization)算法和ICE (Iterative Conditional Estimation)算法,这些估计器用于估计具有独立噪声的隐马尔可夫链的参数。第二个是MAP(Maximum a Posteriori)和MPM(Maximum Marginal Posteriori)算法之间的问题。这些策略用于估计分割后的结果图像。结果表明,EM算法、SEM算法和ICE算法在MAP和MPM算法下的分割结果相同。但MPM的分割效果优于MAP。
{"title":"Markovian Segmentation Of Textured Color Images","authors":"M. Ameur, C. Daoui, N. Idrissi","doi":"10.1109/ISCV49265.2020.9204066","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204066","url":null,"abstract":"This paper presents an application of textured color images segmentation using hidden Markov chain model. We propose two comparative studies, The first one is between EM(Expectation-Maximization) algorithm,SEM (Stochastic Expectation-Maximization) algorithm and ICE (Iterative Conditional Estimation) algorithm, these estimators are used to estimate the parameters of Hidden Markov Chain with Independent Noise. The second one is between MAP(Maximum a Posteriori) and MPM(Maximum Marginal Posteriori) algorithms. These strategies are used to estimate the resulted images of segmentation. The obtained results show that EM algorithm, SEM, and ICE algorithm give the same results of segmentation under MAP and MPM algorithms. But, MPM provides better segmentation results than MAP.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134269670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ISCV49265.2020.9204132
A. Daoui, M. Yamni, H. Karmouni, O. E. Ogri, M. Sayyouri, H. Qjidaa
In this paper, we propose an efficient method for the compression and reconstruction of the large-size 1D electrocardiogram (ECG) signal. In this method, we use Thebichef moments calculated by the modified Gram-Schmidt ortho-normalization process with the use of a full large-sized signal (N=8000) in the reconstruction and compression process. The simulation results and the comparisons carried out show the efficiency and the superiority of the proposed compression and reconstruction methods in terms of the high quality of the compressed signals and in terms of the high compression ratio.
{"title":"Efficient Reconstruction and Compression of Large Size ECG Signal by Tchebichef Moments","authors":"A. Daoui, M. Yamni, H. Karmouni, O. E. Ogri, M. Sayyouri, H. Qjidaa","doi":"10.1109/ISCV49265.2020.9204132","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204132","url":null,"abstract":"In this paper, we propose an efficient method for the compression and reconstruction of the large-size 1D electrocardiogram (ECG) signal. In this method, we use Thebichef moments calculated by the modified Gram-Schmidt ortho-normalization process with the use of a full large-sized signal (N=8000) in the reconstruction and compression process. The simulation results and the comparisons carried out show the efficiency and the superiority of the proposed compression and reconstruction methods in terms of the high quality of the compressed signals and in terms of the high compression ratio.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132689169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The majority of older persons are challenged by chronic illnesses, so more innovations are needed for geriatric care. Therefore, technological and modern techniques have been adopted to improve the elderly's health. Different computing solutions have been deployed to store and process the health data such as cloud computing which provides powerful computing resources. However, connecting different kind of things directly to the cloud is inefficient. Fortunately, fog computing has emerged as a new computing solution to complement cloud, it allows computation and data storage closer to the IoT devices. However, managing health data stored in fog computing presents a major issue. It is necessary to consider the importance of performance, availability, storage, and privacy of data in fog computing. In this paper, we propose architecture based on Fog to Cloud computing which is a novel solution and innovative approach that contribute to enhance the synergy between the cloud and fog computing to facilitate the management of elderly health data. To analyze the performance of our model in Fog to Cloud environment, FogWorkflowSim toolkit has been used.
大多数老年人受到慢性病的挑战,因此需要在老年护理方面进行更多创新。因此,科技和现代技术已被采用,以改善老年人的健康。已经部署了不同的计算解决方案来存储和处理健康数据,例如云计算,它提供了强大的计算资源。然而,将不同类型的东西直接连接到云是低效的。幸运的是,雾计算已经成为一种新的计算解决方案,以补充云计算,它允许计算和数据存储更接近物联网设备。然而,管理存储在雾计算中的健康数据是一个主要问题。在雾计算中,有必要考虑数据的性能、可用性、存储和隐私的重要性。本文提出了一种基于雾到云计算的架构,这是一种新的解决方案和创新方法,有助于增强云和雾计算之间的协同作用,从而促进老年人健康数据的管理。为了分析我们的模型在Fog To Cloud环境下的性能,使用了FogWorkflowSim工具包。
{"title":"Remote health monitoring system of elderly based on Fog to Cloud (F2C) computing","authors":"Hafida Saidi, Nabila Labraoui, Ado Adamou Abba Ari, Djelloul Bouida","doi":"10.1109/ISCV49265.2020.9204096","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204096","url":null,"abstract":"The majority of older persons are challenged by chronic illnesses, so more innovations are needed for geriatric care. Therefore, technological and modern techniques have been adopted to improve the elderly's health. Different computing solutions have been deployed to store and process the health data such as cloud computing which provides powerful computing resources. However, connecting different kind of things directly to the cloud is inefficient. Fortunately, fog computing has emerged as a new computing solution to complement cloud, it allows computation and data storage closer to the IoT devices. However, managing health data stored in fog computing presents a major issue. It is necessary to consider the importance of performance, availability, storage, and privacy of data in fog computing. In this paper, we propose architecture based on Fog to Cloud computing which is a novel solution and innovative approach that contribute to enhance the synergy between the cloud and fog computing to facilitate the management of elderly health data. To analyze the performance of our model in Fog to Cloud environment, FogWorkflowSim toolkit has been used.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134045454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ISCV49265.2020.9204322
El houssaine Hssayni, M. Ettaouil
Dropout has been introduced as a powerful regularization approach to preventing overfitting problem in deep neural networks, particularly in deep convolutional neural networks(DCNNs). A number of methods have been designed recently to improve and generalize the dropout technique. These methods include spectral dropout which achieves improved generalization and avoids overfitting by eliminating noisy and weak Fourier domain coefficients of the neural network activations. On the other hand, a pooling process plays a crucial role in deep convolutional neural networks, which serves to reduce the dimensionality of processed data for decreasing computational cost as well as for avoiding overfitting and enhancing the generalization capability of the network. For this reason, we focus on the pooling layer, and we propose a new pooling method called Spectral Dropout Pooling, by applying the Spectral dropout technique in the pooling region, in order to avoid overfitting problem, as well as to enhance the generalization ability of DCNNs. Experimental results on several image benchmarks show that Spectral Dropout Pooling outperforms the existing pooling methods in classification performance as well as is effective for improving the generalization ability of DCNNs. Moreover, we show that Spectral Dropout Pooling combined with other regularization methods, such as batch normalization, is competitive with other existing methods in classification performance.
{"title":"A Novel Pooling Method for Regularization of Deep Neural networks","authors":"El houssaine Hssayni, M. Ettaouil","doi":"10.1109/ISCV49265.2020.9204322","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204322","url":null,"abstract":"Dropout has been introduced as a powerful regularization approach to preventing overfitting problem in deep neural networks, particularly in deep convolutional neural networks(DCNNs). A number of methods have been designed recently to improve and generalize the dropout technique. These methods include spectral dropout which achieves improved generalization and avoids overfitting by eliminating noisy and weak Fourier domain coefficients of the neural network activations. On the other hand, a pooling process plays a crucial role in deep convolutional neural networks, which serves to reduce the dimensionality of processed data for decreasing computational cost as well as for avoiding overfitting and enhancing the generalization capability of the network. For this reason, we focus on the pooling layer, and we propose a new pooling method called Spectral Dropout Pooling, by applying the Spectral dropout technique in the pooling region, in order to avoid overfitting problem, as well as to enhance the generalization ability of DCNNs. Experimental results on several image benchmarks show that Spectral Dropout Pooling outperforms the existing pooling methods in classification performance as well as is effective for improving the generalization ability of DCNNs. Moreover, we show that Spectral Dropout Pooling combined with other regularization methods, such as batch normalization, is competitive with other existing methods in classification performance.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129806763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ISCV49265.2020.9204117
Zakariyaa Ait El Mouden, A. Jakimi
In machine learning, the power of an approach is measured by its capability to be adapted for different applications and using different formats of data. Spectral Clustering is an unsupervised method that can be adopted for many research fields in and beyond computer science. In this paper, we present and analyze the existing algorithms of spectral clustering, and based on their limits we propose our modified version to deal with the most common challenge in this context which is the dynamic estimation of the output number of clusters.
{"title":"k-eNSC: k-estimation for Normalized Spectral Clustering","authors":"Zakariyaa Ait El Mouden, A. Jakimi","doi":"10.1109/ISCV49265.2020.9204117","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204117","url":null,"abstract":"In machine learning, the power of an approach is measured by its capability to be adapted for different applications and using different formats of data. Spectral Clustering is an unsupervised method that can be adopted for many research fields in and beyond computer science. In this paper, we present and analyze the existing algorithms of spectral clustering, and based on their limits we propose our modified version to deal with the most common challenge in this context which is the dynamic estimation of the output number of clusters.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114397876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ISCV49265.2020.9204095
Hamza Touil, N. E. Akkad, K. Satori
Cryptography is a method of controlling and protecting communications, which has been used exclusively in areas that require confidentiality. Today it is undergoing a considerable evolution, and computer networks require a phase of cryptography as a fundamental mechanism to ensure the privacy of digital information. It was beginning with the first Cesar encryption algorithm or those that appeared just afterwards, such as mono-alphabetic substitution encryption, which has a weakness against statistical attacks. In this paper, we will present a hybridization of Vigenere and Hill encryption that belongs to this family. By exploiting the enhancements, they have already implemented in Hill encryption, to hide the weak point of the Vigenere algorithm, represented in the ease to detect the size of the key to start a statistical attack, as well as the weakness of the algorithm to encrypt two same letters located in the same place in different blocks. This cohesion between these two methods will provide us with a reliable hybrid algorithm, resistant to varying attacks, including statistical attacks.
{"title":"Text Encryption: Hybrid cryptographic method using Vigenere and Hill Ciphers.","authors":"Hamza Touil, N. E. Akkad, K. Satori","doi":"10.1109/ISCV49265.2020.9204095","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204095","url":null,"abstract":"Cryptography is a method of controlling and protecting communications, which has been used exclusively in areas that require confidentiality. Today it is undergoing a considerable evolution, and computer networks require a phase of cryptography as a fundamental mechanism to ensure the privacy of digital information. It was beginning with the first Cesar encryption algorithm or those that appeared just afterwards, such as mono-alphabetic substitution encryption, which has a weakness against statistical attacks. In this paper, we will present a hybridization of Vigenere and Hill encryption that belongs to this family. By exploiting the enhancements, they have already implemented in Hill encryption, to hide the weak point of the Vigenere algorithm, represented in the ease to detect the size of the key to start a statistical attack, as well as the weakness of the algorithm to encrypt two same letters located in the same place in different blocks. This cohesion between these two methods will provide us with a reliable hybrid algorithm, resistant to varying attacks, including statistical attacks.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134472334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ISCV49265.2020.9204058
Hadjer Messabih, Soheyb Ayad, L. Terrissa
After the spread of sensors deployment in different domains, the con-aware paradigm has emerged, it is basically based on sensors for data collecting process in order to generate a con that represent an information which characterize a real time situation of an entity. This paradigm has vastly improved the classic systems. Progress of technologies do not stopped in con-aware but was followed by the Internet of Things (IoT) concept, and the success appeared when combining the conaware paradigm and the IoT. In this paper, we survey conaware with IoT related works. At first we present the basic concepts of con-aware, and the principles techniques used in the life cycle of the con. In second, we illustrate taxonomy of recent works. After that, a comparison study of the studied works will be presented and discussed. Finally, we conclude with some points that can improve the future works.
{"title":"Context Aware for Internet of Things: A Survey","authors":"Hadjer Messabih, Soheyb Ayad, L. Terrissa","doi":"10.1109/ISCV49265.2020.9204058","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204058","url":null,"abstract":"After the spread of sensors deployment in different domains, the con-aware paradigm has emerged, it is basically based on sensors for data collecting process in order to generate a con that represent an information which characterize a real time situation of an entity. This paradigm has vastly improved the classic systems. Progress of technologies do not stopped in con-aware but was followed by the Internet of Things (IoT) concept, and the success appeared when combining the conaware paradigm and the IoT. In this paper, we survey conaware with IoT related works. At first we present the basic concepts of con-aware, and the principles techniques used in the life cycle of the con. In second, we illustrate taxonomy of recent works. After that, a comparison study of the studied works will be presented and discussed. Finally, we conclude with some points that can improve the future works.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125243308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The aim of this study was to validate an antistress program called “relaxation program” that will be included in the “stress-free” mobile app designed to help Moroccan university students to better manage their psychological stress. The study took place between November 2018 and February 2019 at Faculty of Medicine and Pharmacy of Fez (Morocco). 5th year Medical students were our target population in this study. At first, a cross sectional study was conducted in order to measure students’ baseline stress level by using Perceived Stress Scale 10 (PSS-10) and to assess to students’ acceptability of an antistress mobile application. Based on the results of this study, an interventional part was set up in collaboration with Psychiatric Service of University Hospital Center of Fez (Morocco). In this study, two groups have been created: “group test” who received the “relaxation program” and “group control” who did not receive any type of intervention. The baseline stress level had been qualified “moderate” or “high” for the two groups. The aim of this interventional part was to validate the “relaxation program” by both comparing stress level before and after receiving the “relaxation program” for “group test” and to confirm the stability of stress level for “group control”. 308 students, of whom 61.03% are female, co-operated and accepted to complete the baseline questionnaire. The mean age was 22.35 (SD = 1.22). The premeasurement of stress level showed that 115 (37.5%) of our population had a moderate stress level, and 6.5% had a high stress level. The idea of establishment of an anti-stress mobile application was well accepted by students as 73.37% of them ranged their opinion between “beneficial” and “very beneficial”. The interventional study showed the effectiveness and validity of “relaxation program” on reducing the stress level for “group test” by using the statistical t-test (Mean pre-measurement =26.14 vs. Mean post-measurement= 18.54; p =.000). This study highlights the statistical and clinical validity of “relaxation program”. Future studies will be planned in order to develop the adaptive design to this anti-stress program in order to incorporate it in the “stressfree” mobile application.
{"title":"“Stress-free” mobile app for Moroccan university students: “relaxation program” validation","authors":"Elmadani Hakima, Baya Maryem, Yazghich Ikrame, Taoufiq Imane, Aarab Chadya, B. Mohamed","doi":"10.1109/ISCV49265.2020.9204232","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204232","url":null,"abstract":"The aim of this study was to validate an antistress program called “relaxation program” that will be included in the “stress-free” mobile app designed to help Moroccan university students to better manage their psychological stress. The study took place between November 2018 and February 2019 at Faculty of Medicine and Pharmacy of Fez (Morocco). 5th year Medical students were our target population in this study. At first, a cross sectional study was conducted in order to measure students’ baseline stress level by using Perceived Stress Scale 10 (PSS-10) and to assess to students’ acceptability of an antistress mobile application. Based on the results of this study, an interventional part was set up in collaboration with Psychiatric Service of University Hospital Center of Fez (Morocco). In this study, two groups have been created: “group test” who received the “relaxation program” and “group control” who did not receive any type of intervention. The baseline stress level had been qualified “moderate” or “high” for the two groups. The aim of this interventional part was to validate the “relaxation program” by both comparing stress level before and after receiving the “relaxation program” for “group test” and to confirm the stability of stress level for “group control”. 308 students, of whom 61.03% are female, co-operated and accepted to complete the baseline questionnaire. The mean age was 22.35 (SD = 1.22). The premeasurement of stress level showed that 115 (37.5%) of our population had a moderate stress level, and 6.5% had a high stress level. The idea of establishment of an anti-stress mobile application was well accepted by students as 73.37% of them ranged their opinion between “beneficial” and “very beneficial”. The interventional study showed the effectiveness and validity of “relaxation program” on reducing the stress level for “group test” by using the statistical t-test (Mean pre-measurement =26.14 vs. Mean post-measurement= 18.54; p =.000). This study highlights the statistical and clinical validity of “relaxation program”. Future studies will be planned in order to develop the adaptive design to this anti-stress program in order to incorporate it in the “stressfree” mobile application.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124794928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ISCV49265.2020.9204314
Azeddine Wahbi, Anas El Habti El Idrissi, Mohamed Elghayyaty, A. Hadjoudja, B. Bensassi, L. Hlou
Coding corrector of errors is one of the most vital and emerged system in telecommunication field.In this paper, we propose an efficient new embedded Chien Search block for RS decoder. However, it adopts a factorization of error locator polynomial. The proposed design is developed by using hardware description language (HDL), after that, simulated and verified Quartus development software.To test the performances of the new developed design, minimization rate (Number of minimized logic gates) and BER criteria were used.Simulation results show the effectiveness of the proposed design than the basic. First, because it minimizes the number of logic gates and hardware resources. Therefore, a reduction of the power consumption with a minimization’s rate that can attain approximately 40 % compared to the basic algorithm. Further, because it reaches a lower bit error rate.
{"title":"A New Embedded Chien Search Block for Reed- Solomon (RS) Codes based on Factorization of Error Locator Polynomial","authors":"Azeddine Wahbi, Anas El Habti El Idrissi, Mohamed Elghayyaty, A. Hadjoudja, B. Bensassi, L. Hlou","doi":"10.1109/ISCV49265.2020.9204314","DOIUrl":"https://doi.org/10.1109/ISCV49265.2020.9204314","url":null,"abstract":"Coding corrector of errors is one of the most vital and emerged system in telecommunication field.In this paper, we propose an efficient new embedded Chien Search block for RS decoder. However, it adopts a factorization of error locator polynomial. The proposed design is developed by using hardware description language (HDL), after that, simulated and verified Quartus development software.To test the performances of the new developed design, minimization rate (Number of minimized logic gates) and BER criteria were used.Simulation results show the effectiveness of the proposed design than the basic. First, because it minimizes the number of logic gates and hardware resources. Therefore, a reduction of the power consumption with a minimization’s rate that can attain approximately 40 % compared to the basic algorithm. Further, because it reaches a lower bit error rate.","PeriodicalId":313743,"journal":{"name":"2020 International Conference on Intelligent Systems and Computer Vision (ISCV)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123413827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}