首页 > 最新文献

2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)最新文献

英文 中文
The collaborative relevance in the distributed information retrieval 分布式信息检索中的协同关联
Adil Enaanai, Aziz Sdigui Doukkali, Ichrak Saif, Hicham Moutachaouik, M. Hain
Relevance is one of the most interesting topics in the information retrieval domain. In this paper, we introduce another method of relevance calculation. We propose to use the implicit opinion of users to calculate relevance. The Implicit judgment of users is injected to the documents by calculating different kinds of weighting. These latter touch several criteria like as user's weight in the query's words, user's profile, user's interest, document's content and the document popularity. In this method, each user is an active element of the system, he searches documents and he makes treatments to provide relevant information to other users in the Network. This is similar as the peer-to-peer systems; unlike that, an element (user) have to manage automatically his data by creating a short view model of his most visited documents, and calculates his relative relevance about each one. The relative relevance is variable according each user, so the final relevance is calculated by the averaging of the elementary relevance of all users. Hence, the name of collaborative relevance.
相关性是信息检索领域中最热门的话题之一。本文介绍了另一种相关性计算方法。我们建议使用用户的隐式意见来计算相关性。通过计算不同的权重,将用户的隐式判断注入到文档中。后者涉及几个标准,如用户在查询词中的权重,用户的个人资料,用户的兴趣,文档的内容和文档的流行程度。在这种方法中,每个用户都是系统的一个活动元素,他搜索文档并做出处理,为网络中的其他用户提供相关信息。这与点对点系统类似;与此不同的是,元素(用户)必须通过创建访问次数最多的文档的短视图模型来自动管理其数据,并计算每个文档的相对相关性。每个用户的相对相关性是不同的,因此最终相关性是通过对所有用户的基本相关性求平均值来计算的。因此,协作相关性的名称。
{"title":"The collaborative relevance in the distributed information retrieval","authors":"Adil Enaanai, Aziz Sdigui Doukkali, Ichrak Saif, Hicham Moutachaouik, M. Hain","doi":"10.1109/AICCSA.2016.7945827","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945827","url":null,"abstract":"Relevance is one of the most interesting topics in the information retrieval domain. In this paper, we introduce another method of relevance calculation. We propose to use the implicit opinion of users to calculate relevance. The Implicit judgment of users is injected to the documents by calculating different kinds of weighting. These latter touch several criteria like as user's weight in the query's words, user's profile, user's interest, document's content and the document popularity. In this method, each user is an active element of the system, he searches documents and he makes treatments to provide relevant information to other users in the Network. This is similar as the peer-to-peer systems; unlike that, an element (user) have to manage automatically his data by creating a short view model of his most visited documents, and calculates his relative relevance about each one. The relative relevance is variable according each user, so the final relevance is calculated by the averaging of the elementary relevance of all users. Hence, the name of collaborative relevance.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115028580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
More secure Internet of Things using robust encryption algorithms against side channel attacks 更安全的物联网使用强大的加密算法对抗侧信道攻击
L. Tawalbeh, T. Al-Somani
There are many recent revolutionary advances in information technology that include: wireless communication, the spread of mobile devices, and the Internet-of-Things (IoT). IoT will have an important role in connecting almost everything (mobile devices, cameras, home appliances, healthcare devices, military equipments, …, etc) to the Internet via different communication technologies such as Wi-Fi. This connection will have impact on many sectors of our life such as industry, economy, social life, and ICT sector. Moreover, there will be huge amounts of data (including financial and medical records for example) transmitted between those devices and the non-secure Internet. Some of these data might be very sensitive and their privacy and security must not be compromised. Here comes the need for Cryptographic systems to protect the vital data. There are many hardware and software implementations for the symmetric and asymmetric cryptographic algorithms such as AES, Elliptic Curve Cryptography, and RSA. And since we are talking about protecting physical devices connected to the Internet, we think that the hardware cryptosystems are more useful to be used in this case. In this paper, we introduce the IoT concept, applications, and challenges facing IoT. Then, we present the recent timing and fault Side Channel Attacks on cryptosystem implementations for the most secure encryption algorithms (AES, ECC, and RSA). Also, the countermeasures to protect these cryptosystems from such attacks are also presented.
最近在信息技术方面有许多革命性的进步,包括:无线通信、移动设备的普及和物联网(IoT)。物联网将在通过不同的通信技术(如Wi-Fi)将几乎所有东西(移动设备、相机、家用电器、医疗设备、军事设备等)连接到互联网方面发挥重要作用。这种连接将对我们生活的许多领域产生影响,如工业、经济、社会生活和信息通信技术领域。此外,在这些设备和不安全的互联网之间将传输大量数据(例如包括财务和医疗记录)。其中一些数据可能非常敏感,他们的隐私和安全绝不能受到损害。这就需要加密系统来保护重要数据。有许多硬件和软件实现对称和非对称加密算法,如AES、椭圆曲线加密和RSA。既然我们讨论的是保护连接到互联网的物理设备,我们认为硬件加密系统在这种情况下更有用。本文介绍了物联网的概念、应用以及物联网面临的挑战。然后,我们介绍了最近对最安全的加密算法(AES, ECC和RSA)的密码系统实现的定时和故障侧信道攻击。同时,提出了保护密码系统免受此类攻击的对策。
{"title":"More secure Internet of Things using robust encryption algorithms against side channel attacks","authors":"L. Tawalbeh, T. Al-Somani","doi":"10.1109/AICCSA.2016.7945813","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945813","url":null,"abstract":"There are many recent revolutionary advances in information technology that include: wireless communication, the spread of mobile devices, and the Internet-of-Things (IoT). IoT will have an important role in connecting almost everything (mobile devices, cameras, home appliances, healthcare devices, military equipments, …, etc) to the Internet via different communication technologies such as Wi-Fi. This connection will have impact on many sectors of our life such as industry, economy, social life, and ICT sector. Moreover, there will be huge amounts of data (including financial and medical records for example) transmitted between those devices and the non-secure Internet. Some of these data might be very sensitive and their privacy and security must not be compromised. Here comes the need for Cryptographic systems to protect the vital data. There are many hardware and software implementations for the symmetric and asymmetric cryptographic algorithms such as AES, Elliptic Curve Cryptography, and RSA. And since we are talking about protecting physical devices connected to the Internet, we think that the hardware cryptosystems are more useful to be used in this case. In this paper, we introduce the IoT concept, applications, and challenges facing IoT. Then, we present the recent timing and fault Side Channel Attacks on cryptosystem implementations for the most secure encryption algorithms (AES, ECC, and RSA). Also, the countermeasures to protect these cryptosystems from such attacks are also presented.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114163999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Moving object segmentation in video using spatiotemporal saliency and laplacian coordinates 基于时空显著性和拉普拉斯坐标的视频运动目标分割
Hiba Ramadan, H. Tairi
This paper presents a new algorithm for automatic segmentation of moving objects in video based on spatiotemporal saliency and laplacian coordinates (LC). Our algorithm exploits the saliency and the motion information to build a spatio-temporal saliency map, used to extract a moving region of interest (MRI). This region is used to provide automatically the seeds for the segmentation of the moving object using LC. Experiments show a good performance of our algorithm for moving objects segmentation in video without a user interaction, especially on Segtrack dataset.
提出了一种基于时空显著性和拉普拉斯坐标的视频运动目标自动分割算法。我们的算法利用显著性和运动信息来构建时空显著性图,用于提取运动感兴趣区域(MRI)。该区域用于自动提供种子,用于使用LC对运动物体进行分割。实验表明,该算法在无用户交互的视频中具有良好的运动目标分割效果,特别是在Segtrack数据集上。
{"title":"Moving object segmentation in video using spatiotemporal saliency and laplacian coordinates","authors":"Hiba Ramadan, H. Tairi","doi":"10.1109/AICCSA.2016.7945726","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945726","url":null,"abstract":"This paper presents a new algorithm for automatic segmentation of moving objects in video based on spatiotemporal saliency and laplacian coordinates (LC). Our algorithm exploits the saliency and the motion information to build a spatio-temporal saliency map, used to extract a moving region of interest (MRI). This region is used to provide automatically the seeds for the segmentation of the moving object using LC. Experiments show a good performance of our algorithm for moving objects segmentation in video without a user interaction, especially on Segtrack dataset.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"58 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116228625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Auto-tuning TRSM with an asynchronous task assignment model on multicore, multi-GPU and coprocessor systems 基于多核、多gpu和协处理器系统的异步任务分配模型的自动调优TRSM
Clícia Pinto, Marcos E. Barreto, M. Boratto
The increasing need for computing power today justifies the continuous search for techniques that decrease the time to answer usual computational problems. To take advantage of new hybrid parallel architectures composed by multithreading and multiprocessor hardware, our current efforts involve the design and validation of highly parallel algorithms that efficently explore the characteristics of such architectures. In this paper, we propose an automatic tuning methodology to easily exploit multicore, multi-GPU and coprocessor systems. We present an optimization of an algorithm for solving triangular systems (TRSM), based on block decomposition and asynchronous task assignment, and discuss some results.
当今对计算能力日益增长的需求证明了不断寻找能够减少回答通常计算问题所需时间的技术是正确的。为了利用由多线程和多处理器硬件组成的新型混合并行架构,我们目前的工作涉及设计和验证高度并行的算法,以有效地探索这种架构的特征。在本文中,我们提出了一种自动调优方法,以方便地利用多核,多gpu和协处理器系统。提出了一种基于分块分解和异步任务分配的三角系统(TRSM)求解算法的优化,并讨论了一些结果。
{"title":"Auto-tuning TRSM with an asynchronous task assignment model on multicore, multi-GPU and coprocessor systems","authors":"Clícia Pinto, Marcos E. Barreto, M. Boratto","doi":"10.1109/AICCSA.2016.7945637","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945637","url":null,"abstract":"The increasing need for computing power today justifies the continuous search for techniques that decrease the time to answer usual computational problems. To take advantage of new hybrid parallel architectures composed by multithreading and multiprocessor hardware, our current efforts involve the design and validation of highly parallel algorithms that efficently explore the characteristics of such architectures. In this paper, we propose an automatic tuning methodology to easily exploit multicore, multi-GPU and coprocessor systems. We present an optimization of an algorithm for solving triangular systems (TRSM), based on block decomposition and asynchronous task assignment, and discuss some results.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123071645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data placement strategy for massive data applications based on FCA approach 基于FCA方法的海量数据应用的数据放置策略
Zaki Brahmi, Sahar Mili, Rihab Derouiche
Massive data applications such as E-science applications are characterized by complex treatments on large amounts of data which need to be stored in distributed data centers. In fact, when one task needs several datasets from different data centers, moving these data may cost a lot of time and cause energy's high consumption. Moreover, when the number of the data centers involved in the execution of tasks is high, the total data movement and the execution time increase dramatically and become a bottleneck, since the data centers have a limited bandwidth. Thus, we need a good data placement strategy to minimise the data movement between data centers and reduce the energy consumed. Indeed, many researches are concerned with data placement strategy that distributes data in ways that are advantageous for application execution. In this paper, our data placement strategy aims at grouping the maximum of data and of tasks in a minimal number of data centers. It is based on the Formal Concept Analysis approach (FCA) because its notion of a concept respects our idea since it faithfully represents a group of tasks and data that are required for their execution. It is based on four steps: 1) Hierarchical organization of tasks using Formal Concepts Analysis approach, 2) Selection of candidate concepts, 3) Assigning data in the appropriate data centers and 4) Data replication. Simulations show that our strategy can effectively reduce the data movement and the average query spans compared to the genetic approach.
海量数据应用(如电子科学应用)的特点是需要对大量数据进行复杂的处理,这些数据需要存储在分布式数据中心中。事实上,当一个任务需要来自不同数据中心的多个数据集时,移动这些数据可能会花费大量的时间和能源消耗。此外,当任务执行涉及的数据中心数量较多时,由于数据中心的带宽有限,数据移动总量和执行时间急剧增加,成为瓶颈。因此,我们需要一个好的数据放置策略,以尽量减少数据中心之间的数据移动,并减少能源消耗。实际上,许多研究都关注数据放置策略,该策略以有利于应用程序执行的方式分发数据。在本文中,我们的数据放置策略旨在将最大的数据和任务分组在最少数量的数据中心中。它基于形式概念分析方法(FCA),因为它的概念概念尊重我们的想法,因为它忠实地代表了执行所需的一组任务和数据。它基于四个步骤:1)使用正式概念分析方法对任务进行分层组织,2)选择候选概念,3)在适当的数据中心分配数据,4)数据复制。仿真结果表明,与遗传方法相比,该策略可以有效地减少数据移动和平均查询跨度。
{"title":"Data placement strategy for massive data applications based on FCA approach","authors":"Zaki Brahmi, Sahar Mili, Rihab Derouiche","doi":"10.1109/AICCSA.2016.7945616","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945616","url":null,"abstract":"Massive data applications such as E-science applications are characterized by complex treatments on large amounts of data which need to be stored in distributed data centers. In fact, when one task needs several datasets from different data centers, moving these data may cost a lot of time and cause energy's high consumption. Moreover, when the number of the data centers involved in the execution of tasks is high, the total data movement and the execution time increase dramatically and become a bottleneck, since the data centers have a limited bandwidth. Thus, we need a good data placement strategy to minimise the data movement between data centers and reduce the energy consumed. Indeed, many researches are concerned with data placement strategy that distributes data in ways that are advantageous for application execution. In this paper, our data placement strategy aims at grouping the maximum of data and of tasks in a minimal number of data centers. It is based on the Formal Concept Analysis approach (FCA) because its notion of a concept respects our idea since it faithfully represents a group of tasks and data that are required for their execution. It is based on four steps: 1) Hierarchical organization of tasks using Formal Concepts Analysis approach, 2) Selection of candidate concepts, 3) Assigning data in the appropriate data centers and 4) Data replication. Simulations show that our strategy can effectively reduce the data movement and the average query spans compared to the genetic approach.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123221622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Towards a dynamic and polarity-aware social user profile modeling 朝着动态和极性感知的社交用户档案建模
Abir Gorrab, Ferihane Kboubi, H. Ghézala, B. L. Grand
The emergence of social networks and the communication facilities they offer have generated an enormous informational mass. This social content is used in several research and industrial works and has had a great impact in different processes. In this paper, we present an overview of social information use in Information Retrieval (IR) and Recommendation systems. We first describe several user profile models using social information. A special attention is given to the following points: the analysis of the different user profiling models incorporating social content in Information Retrieval (IR) and in social recommendation methods. We distinguish between the models using social signals and relations, and the models using temporal information. We also present current and future challenges and research directions to enhance IR and recommendation process. We then describe our proposed model of social polarized and temporal user profile building and use in social recommendation context. Our proposal tries to address open challenges and establish a new model of user profile that fits information needs in recommender systems.
社交网络的出现及其提供的通讯设施产生了大量的信息。这一社会内容在若干研究和工业作品中使用,并在不同的过程中产生了很大的影响。在本文中,我们概述了社会信息在信息检索(IR)和推荐系统中的应用。我们首先描述了使用社会信息的几个用户概要模型。特别关注以下几点:分析了信息检索(IR)和社交推荐方法中包含社交内容的不同用户特征模型。我们区分了使用社会信号和关系的模型和使用时间信息的模型。提出了当前和未来的挑战和研究方向,以加强IR和推荐过程。然后,我们描述了我们提出的社会极化模型和在社会推荐背景下建立和使用时间用户档案。我们的建议试图解决开放的挑战,并建立一个新的用户档案模型,以适应推荐系统的信息需求。
{"title":"Towards a dynamic and polarity-aware social user profile modeling","authors":"Abir Gorrab, Ferihane Kboubi, H. Ghézala, B. L. Grand","doi":"10.1109/AICCSA.2016.7945626","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945626","url":null,"abstract":"The emergence of social networks and the communication facilities they offer have generated an enormous informational mass. This social content is used in several research and industrial works and has had a great impact in different processes. In this paper, we present an overview of social information use in Information Retrieval (IR) and Recommendation systems. We first describe several user profile models using social information. A special attention is given to the following points: the analysis of the different user profiling models incorporating social content in Information Retrieval (IR) and in social recommendation methods. We distinguish between the models using social signals and relations, and the models using temporal information. We also present current and future challenges and research directions to enhance IR and recommendation process. We then describe our proposed model of social polarized and temporal user profile building and use in social recommendation context. Our proposal tries to address open challenges and establish a new model of user profile that fits information needs in recommender systems.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122030605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient image search system with multi-scale database using profile-based pre-selection and coarse matching 基于轮廓预选和粗匹配的多尺度数据库高效图像搜索系统
Kaoru Uchida
Artifact-metrics technology is gaining more research interests, along with the expansion of its applications. One of its challenges is an efficient image search, in which a match is to be identified in a large multi-scale image database with a given, possibly distorted, query image having unknown location, orientation, and scale. To approach this computational efficiency problem of image database search, we conducted a preliminary feasibility study focused specifically on aerial photo search problem. We propose a highly efficient image search system to find a match in the multi-layered database of images with multiple magnitudes. The system first pre-selects matching candidates based on comparison results of image profiles such as frequency spectra, so that the following matching stages focus on the appropriate scale layer to accelerate search. Then in the coarse matching stage, the down-sampled query image is compared with images in a lower-magnitude layer using a scale-invariant matcher based on local feature descriptors. This paper outlines our interim proposed approach and discusses its feasibility and performance based on the experimental results from our ongoing research work.
人工度量技术随着其应用的扩展,正在获得越来越多的研究兴趣。它面临的挑战之一是有效的图像搜索,其中需要在大型多尺度图像数据库中使用给定的、可能失真的、具有未知位置、方向和尺度的查询图像来识别匹配。为了解决图像数据库搜索的计算效率问题,我们针对航空照片搜索问题进行了初步的可行性研究。我们提出了一种高效的图像搜索系统,用于在多层图像数据库中寻找匹配的图像。系统首先根据频谱等图像轮廓的比较结果预先选择匹配候选者,以便后续匹配阶段集中在合适的尺度层上加速搜索。然后在粗匹配阶段,使用基于局部特征描述符的比例不变匹配器将下采样查询图像与低量级层的图像进行比较。本文概述了我们临时提出的方法,并根据我们正在进行的研究工作的实验结果讨论了其可行性和性能。
{"title":"Efficient image search system with multi-scale database using profile-based pre-selection and coarse matching","authors":"Kaoru Uchida","doi":"10.1109/AICCSA.2016.7945646","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945646","url":null,"abstract":"Artifact-metrics technology is gaining more research interests, along with the expansion of its applications. One of its challenges is an efficient image search, in which a match is to be identified in a large multi-scale image database with a given, possibly distorted, query image having unknown location, orientation, and scale. To approach this computational efficiency problem of image database search, we conducted a preliminary feasibility study focused specifically on aerial photo search problem. We propose a highly efficient image search system to find a match in the multi-layered database of images with multiple magnitudes. The system first pre-selects matching candidates based on comparison results of image profiles such as frequency spectra, so that the following matching stages focus on the appropriate scale layer to accelerate search. Then in the coarse matching stage, the down-sampled query image is compared with images in a lower-magnitude layer using a scale-invariant matcher based on local feature descriptors. This paper outlines our interim proposed approach and discusses its feasibility and performance based on the experimental results from our ongoing research work.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122521483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reconfigurable function blocks: Extension to the standard IEC 61499 可重构功能块:扩展到标准IEC 61499
S. Guellouz, Adel Benzina, M. Khalgui, Georg Frey
This paper presents an extension to the IEC 61499 standard called Reconfigurable Function Block. The major goal is to optimize the design of a network of Function Blocks by encapsulating several reconfiguration scenarios in one function block. We define the events triggering the reconfiguration and we attach a probability to each event to express its uncertainty. In order to verify the system and to evaluate its performances, we model it with a class of Petri nets. The proposed approach is applied to a medical platform BROS as a case study throughout a developed software tool called ZiZo v3.
本文提出了IEC 61499标准的扩展,称为可重构功能块。主要目标是通过在一个功能块中封装多个重新配置场景来优化功能块网络的设计。我们定义了触发重构的事件,并为每个事件附加了一个概率来表示其不确定性。为了验证该系统并评价其性能,我们用一类Petri网对其建模。所提出的方法应用于医疗平台BROS,作为开发的软件工具ZiZo v3的案例研究。
{"title":"Reconfigurable function blocks: Extension to the standard IEC 61499","authors":"S. Guellouz, Adel Benzina, M. Khalgui, Georg Frey","doi":"10.1109/AICCSA.2016.7945784","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945784","url":null,"abstract":"This paper presents an extension to the IEC 61499 standard called Reconfigurable Function Block. The major goal is to optimize the design of a network of Function Blocks by encapsulating several reconfiguration scenarios in one function block. We define the events triggering the reconfiguration and we attach a probability to each event to express its uncertainty. In order to verify the system and to evaluate its performances, we model it with a class of Petri nets. The proposed approach is applied to a medical platform BROS as a case study throughout a developed software tool called ZiZo v3.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123860546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Universal metadata repository for document analysis and recognition 用于文档分析和识别的通用元数据存储库
Hassanin M. Al-Barhamtoshy, Maher Khemakhem, K. Jambi, F. Essa, A. Fattouh, A. Al-Ghamdi
Document Analysis and Recognition (DAR) has two main objectives, first the analysis of the physical structure of the input image of the document, which should lead to the correct identification of the corresponding different homogeneous components and their boundaries in terms of XY coordinates. Second, each of these homogeneous components should be recognized in such a way that, if it is a text image, consequently this image should be recognized and translated into an intelligible text. DAR remains one of the most challenging topics in pattern recognition. Indeed, despite the diversity of the proposed approaches, techniques and methods, results remain very weak and away from expectations especially for several categories of documents such as complex, low quality, handwritten and historical documents. The complex structure and/or morphology of such documents are behind the weakness of results of these proposed approaches, techniques and methods. One of the challenging problems related to this topic is the creation of standard datasets that can be used by all stakeholders of this topic such as system developers, expert evaluators, and users. In addition, another challenging problem is how one could take advantages of all existing datasets that unfortunately are dispersed around the world without knowing, most of the times, any information about their locations and the way to reach them. As an attempt to solve the two mentioned above problems, we propose in this paper a Universal Datasets Repository for Document Analysis and Recognition (UMDAR) that has, in fact, a twofold advantage. First, it can help dataset creators to standardize their datasets and making them accessible to the research community once published on the proposed repository. Second, it can be used as a central which bridges in a smart manner between datasets and all DAR stakeholders.
文档分析与识别(Document Analysis and Recognition, DAR)有两个主要目标,首先是对文档输入图像的物理结构进行分析,从而正确识别相应的不同同构分量及其在XY坐标下的边界。其次,每一个同质成分都应该以这样一种方式被识别,如果它是一个文本图像,那么这个图像应该被识别并翻译成可理解的文本。DAR仍然是模式识别中最具挑战性的课题之一。事实上,尽管所提议的方法、技术和方法多种多样,但结果仍然非常薄弱,与预期相差甚远,特别是对于复杂、低质量、手写和历史文件等几类文件。这些文件的复杂结构和/或形态是这些提出的方法、技术和方法的结果薄弱的原因。与该主题相关的一个具有挑战性的问题是创建可由该主题的所有利益相关者(如系统开发人员、专家评估人员和用户)使用的标准数据集。此外,另一个具有挑战性的问题是,人们如何利用所有现有的数据集,不幸的是,这些数据集分散在世界各地,大多数时候,人们不知道它们的位置和到达它们的方式的任何信息。作为解决上述两个问题的尝试,我们在本文中提出了一个用于文档分析和识别的通用数据集存储库(UMDAR),它实际上具有双重优势。首先,它可以帮助数据集创建者标准化他们的数据集,并且一旦在建议的存储库上发布,研究社区就可以访问它们。其次,它可以作为一个中心,以智能的方式在数据集和所有DAR利益相关者之间架起桥梁。
{"title":"Universal metadata repository for document analysis and recognition","authors":"Hassanin M. Al-Barhamtoshy, Maher Khemakhem, K. Jambi, F. Essa, A. Fattouh, A. Al-Ghamdi","doi":"10.1109/AICCSA.2016.7945622","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945622","url":null,"abstract":"Document Analysis and Recognition (DAR) has two main objectives, first the analysis of the physical structure of the input image of the document, which should lead to the correct identification of the corresponding different homogeneous components and their boundaries in terms of XY coordinates. Second, each of these homogeneous components should be recognized in such a way that, if it is a text image, consequently this image should be recognized and translated into an intelligible text. DAR remains one of the most challenging topics in pattern recognition. Indeed, despite the diversity of the proposed approaches, techniques and methods, results remain very weak and away from expectations especially for several categories of documents such as complex, low quality, handwritten and historical documents. The complex structure and/or morphology of such documents are behind the weakness of results of these proposed approaches, techniques and methods. One of the challenging problems related to this topic is the creation of standard datasets that can be used by all stakeholders of this topic such as system developers, expert evaluators, and users. In addition, another challenging problem is how one could take advantages of all existing datasets that unfortunately are dispersed around the world without knowing, most of the times, any information about their locations and the way to reach them. As an attempt to solve the two mentioned above problems, we propose in this paper a Universal Datasets Repository for Document Analysis and Recognition (UMDAR) that has, in fact, a twofold advantage. First, it can help dataset creators to standardize their datasets and making them accessible to the research community once published on the proposed repository. Second, it can be used as a central which bridges in a smart manner between datasets and all DAR stakeholders.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124147011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An improved Arabic handwritten recognition system using embedded training based on HMMs 基于hmm的嵌入式训练改进的阿拉伯语手写识别系统
M. AMROUCH, M. Rabi, D. Mammass
In this paper we present a system for offline recognition cursive Arabic handwritten text based on Hidden Markov Models (HMMs). The system is analytical without explicit segmentation used embedded training to perform and enhance the character models. Extraction features preceded by baseline estimation are statistical and geometric to integrate both the peculiarities of the text and the pixel distribution characteristics in the word image. These features are modelled using hidden Markov models and trained by embedded training. The experiments on images of the benchmark IFN/ENIT database show that the proposed system improves recognition.
本文提出了一种基于隐马尔可夫模型(hmm)的阿拉伯手写体文本离线识别系统。该系统是分析性的,没有明确的分割,使用嵌入式训练来执行和增强字符模型。在基线估计之前的提取特征是统计特征和几何特征,以综合文本的特性和单词图像中的像素分布特征。这些特征使用隐马尔可夫模型建模,并通过嵌入式训练进行训练。在IFN/ENIT基准数据库的图像上进行的实验表明,该系统提高了识别能力。
{"title":"An improved Arabic handwritten recognition system using embedded training based on HMMs","authors":"M. AMROUCH, M. Rabi, D. Mammass","doi":"10.1109/AICCSA.2016.7945773","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945773","url":null,"abstract":"In this paper we present a system for offline recognition cursive Arabic handwritten text based on Hidden Markov Models (HMMs). The system is analytical without explicit segmentation used embedded training to perform and enhance the character models. Extraction features preceded by baseline estimation are statistical and geometric to integrate both the peculiarities of the text and the pixel distribution characteristics in the word image. These features are modelled using hidden Markov models and trained by embedded training. The experiments on images of the benchmark IFN/ENIT database show that the proposed system improves recognition.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125381388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1