Skip to Content

Instrukcja korzystania z Biblioteki

Serwisy:

Ukryty Internet | Wyszukiwarki specjalistyczne tekstów i źródeł naukowych | Translatory online | Encyklopedie i słowniki online

Translator:

Kosmos
Astronomia Astrofizyka
Inne

Kultura
Sztuka dawna i współczesna, muzea i kolekcje

Metoda
Metodologia nauk, Matematyka, Filozofia, Miary i wagi, Pomiary

Materia
Substancje, reakcje, energia
Fizyka, chemia i inżynieria materiałowa

Człowiek
Antropologia kulturowa Socjologia Psychologia Zdrowie i medycyna

Wizje
Przewidywania Kosmologia Religie Ideologia Polityka

Ziemia
Geologia, geofizyka, geochemia, środowisko przyrodnicze

Życie
Biologia, biologia molekularna i genetyka

Cyberprzestrzeń
Technologia cyberprzestrzeni, cyberkultura, media i komunikacja

Działalność
Wiadomości | Gospodarka, biznes, zarządzanie, ekonomia

Technologie
Budownictwo, energetyka, transport, wytwarzanie, technologie informacyjne

Journal of Emerging Technologies in Web Intelligence

With advancement in technology, the process of question answering is the main field of research of text mining. In this process user is assigned a particular answers in place of number of text documents or paragraphs. It provides a way for obtaining appropriate and useful answers for questions of user put in native natural language instead of  formal query in that language. Hindi, Punjabi, Bengali, Kannada, Telugu and Marathi etc are main spoken languages in India. For these Indian languages, very less number of language resources is available and much of research is going on for developing basic language resources in these languages. This paper discusses a survey of different question answering techniques for Indian languages.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602165168 2014/06/12 - 15:05

With advancement in technology, the process of question answering is the main field of research of text mining. In this process user is assigned a particular answers in place of number of text documents or paragraphs. It provides a way for obtaining appropriate and useful answers for questions of user put in native natural language instead of  formal query in that language. Hindi, Punjabi, Bengali, Kannada, Telugu and Marathi etc are main spoken languages in India. For these Indian languages, very less number of language resources is available and much of research is going on for developing basic language resources in these languages. This paper discusses a survey of different question answering techniques for Indian languages.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602165168 2014/06/12 - 15:05

The traditional image retrieval approach allows users to create, share and comment media on a large scale. The large scale data not only promote users in sharing and organizing multimedia data, but provide useful information to develop multimedia retrieval in terms of text, images and all other forms. Numerous studies have been developed to effectively meet the user’s requirements for the past few decades. There are various ranking methods developed to deal with the image and text retrieval systems. A user’s request is taken to generate a rank list based on various features of text and images, including, content, texture, shape and color. The central contention is handled by a semantic search and by providing re-ranking procedure. In this survey, various approaches for retrieving text and images using various retrieval systems, semantic search and ranking based techniques are discussed.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602169173 2014/06/12 - 15:05

The traditional image retrieval approach allows users to create, share and comment media on a large scale. The large scale data not only promote users in sharing and organizing multimedia data, but provide useful information to develop multimedia retrieval in terms of text, images and all other forms. Numerous studies have been developed to effectively meet the user’s requirements for the past few decades. There are various ranking methods developed to deal with the image and text retrieval systems. A user’s request is taken to generate a rank list based on various features of text and images, including, content, texture, shape and color. The central contention is handled by a semantic search and by providing re-ranking procedure. In this survey, various approaches for retrieving text and images using various retrieval systems, semantic search and ranking based techniques are discussed.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602169173 2014/06/12 - 15:05

This paper presents an analysis of four online stream processing systems (MillWheel, S4, Spark Streaming and Storm) regarding the strategies they use for fault tolerance. We use this sort of system for processing of data streams that can come from different sources such as web sites, sensors, mobile phones or any set of devices that provide real-time high-speed data. Typically, these systems are concerned more with the throughput in data processing than on fault tolerance. However, depending on the type of application, we should consider fault tolerance as an important a feature. The work describes some of the main strategies for fault tolerance – replication components, upstream backup, checkpoint and recovery – and shows how each of the four systems uses these strategies. In the end, the paper discusses the advantages and disadvantages of the combination of the strategies for fault tolerance in these systems.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602174179 2014/06/12 - 15:05

This paper presents an analysis of four online stream processing systems (MillWheel, S4, Spark Streaming and Storm) regarding the strategies they use for fault tolerance. We use this sort of system for processing of data streams that can come from different sources such as web sites, sensors, mobile phones or any set of devices that provide real-time high-speed data. Typically, these systems are concerned more with the throughput in data processing than on fault tolerance. However, depending on the type of application, we should consider fault tolerance as an important a feature. The work describes some of the main strategies for fault tolerance – replication components, upstream backup, checkpoint and recovery – and shows how each of the four systems uses these strategies. In the end, the paper discusses the advantages and disadvantages of the combination of the strategies for fault tolerance in these systems.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602174179 2014/06/12 - 15:05

Sentiment Analysis is to identify and classify the opinions/emotions/sentiments in written text. Till date, English Language includes most of the research work in this area. In this paper, we discussed the various approaches used to accomplish the sentiment analysis and research work done for Indian Languages like Hindi, Bengali and Telugu. We proposed an algorithm by using subjective lexicon which is created by using Hindi Subjective Lexicon. Our approach proves good performance on the testing data. We compared the results with already existing approaches.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602180183 2014/06/12 - 15:05

Sentiment Analysis is to identify and classify the opinions/emotions/sentiments in written text. Till date, English Language includes most of the research work in this area. In this paper, we discussed the various approaches used to accomplish the sentiment analysis and research work done for Indian Languages like Hindi, Bengali and Telugu. We proposed an algorithm by using subjective lexicon which is created by using Hindi Subjective Lexicon. Our approach proves good performance on the testing data. We compared the results with already existing approaches.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602180183 2014/06/12 - 15:05

Online Social Network (ONS) is the easiest platform to connect with one another. There are many Online Social Networking websites exist to bring up the reliable communication among the users. Facebook, Orkut, Google+, Twitter, MySpace, etc are some of the Online Social Networking websites. All the social networking websites provide the interface formally known as profile, to share their willingness with others. The users of these websites could share their feelings, photos, text file and even whatever the user wishes to provide. All the Online Social Networking websites bring the friends, family members and relatives together to share their desires in a fast track manner, however still it lacks in security module. The shared photos and information are freely open access to all the users of social networking websites. When the photos are freely available, the unauthorized users can easily access the photos of others and download it. Once the photo is downloaded, that image can be misused widely such as creation of fake profile and the photo can be sold to other nuisance websites. This kind of data hacking activities in online social networks even leads the life to death. In this paper, data hacking in online social network is considered and a novel mechanism is presented to prevent the data hacking.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602184191 2014/06/12 - 15:05

Online Social Network (ONS) is the easiest platform to connect with one another. There are many Online Social Networking websites exist to bring up the reliable communication among the users. Facebook, Orkut, Google+, Twitter, MySpace, etc are some of the Online Social Networking websites. All the social networking websites provide the interface formally known as profile, to share their willingness with others. The users of these websites could share their feelings, photos, text file and even whatever the user wishes to provide. All the Online Social Networking websites bring the friends, family members and relatives together to share their desires in a fast track manner, however still it lacks in security module. The shared photos and information are freely open access to all the users of social networking websites. When the photos are freely available, the unauthorized users can easily access the photos of others and download it. Once the photo is downloaded, that image can be misused widely such as creation of fake profile and the photo can be sold to other nuisance websites. This kind of data hacking activities in online social networks even leads the life to death. In this paper, data hacking in online social network is considered and a novel mechanism is presented to prevent the data hacking.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602184191 2014/06/12 - 15:05

Cloud computing is a new development of grid, parallel, and distributed computing with visualization techniques. It is changing the IT industry in a prominent way. Cloud computing has grown due to its advantages like storage capacity, resources pooling and multi-tenancy. On the other hand, the cloud is an open environment and since all the services are offered over the Internet, there is a great deal of uncertainty about security and privacy at various levels. This paper aims to address security and privacy issues threatening the cloud computing adoption by end users. Cloud providers are mindful of cloud security and privacy issues and are working hardly to address them. Few of these threats have been addressed, but many more threats still unsolved.  This paper focused on cloud computing security and privacy threats, challenges, and issues. Furthermore, some of the countermeasures to these threats will be discussed and synthesized. Finally, possible solutions for each type of threats will be introduced before we end with conclusions and future work.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602192199 2014/06/12 - 15:05

Cloud computing is a new development of grid, parallel, and distributed computing with visualization techniques. It is changing the IT industry in a prominent way. Cloud computing has grown due to its advantages like storage capacity, resources pooling and multi-tenancy. On the other hand, the cloud is an open environment and since all the services are offered over the Internet, there is a great deal of uncertainty about security and privacy at various levels. This paper aims to address security and privacy issues threatening the cloud computing adoption by end users. Cloud providers are mindful of cloud security and privacy issues and are working hardly to address them. Few of these threats have been addressed, but many more threats still unsolved.  This paper focused on cloud computing security and privacy threats, challenges, and issues. Furthermore, some of the countermeasures to these threats will be discussed and synthesized. Finally, possible solutions for each type of threats will be introduced before we end with conclusions and future work.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602192199 2014/06/12 - 15:05

Web page classification has many applications and plays a vital role in web mining and semantic web. Web pages contain much irrelevant information that does not reflect their categories or topics, and operates as noise in the process of their classification, especially when using a text classifier. Thus, the use of information from related web pages can help to overcome the problem of noisy content and to get a better result after the classification. Web pages are linked either directly by hyperlinks or indirectly by user’s intuitive judgment. In this work, we suggest a post classification corrective method that uses the query-log to build an implicit neighborhood, and collectively propagate classes over web pages of that neighborhood. This collective propagation helps improving text classifier results by correcting wrongly assigned categories. Our technique operates in four steps. In the first step, it builds a weighted graph called initial graph, whose vertices are web pages and edges are implicit links. In the second step, it uses a text classifier to determine classes of all web pages represented by vertices in the initial graph. In the third step, it constructs clusters of web pages using Formal Concept Analysis. Then, it applies a first adjustment of classes called Internal Propagation of Categories (IPC). In the final step, it performs a second adjustment of classes called External Propagation of Categories (EPC). This adjustment leads to significant improvements of results provided by the text classifier. We conduct our experiments using five classifiers: SVM (Support Vector Machine), NB (Naïve Bayes), KNN (K Nearest Neighbors), ICA (Iterative classification algorithm) based on SVM and ICA based on NB, on four subsets of ODP (Open Directory Project). We also compare our approach to Classification using Linked Neighborhood (CLN) considered as the closest algorithm to EPC. Results show that: (1) when applied after SVM, NB, KNN or ICA classification, IPC followed by EPC help bringing improvements on results. (2) F1 scores provided by our approach with any of the five classifiers are significantly better than those obtained by CLN. (3) The performance provided by our proposed approach grows proportionally to the size of the query-log, and to the density of the weighted graph.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602200209 2014/06/12 - 15:05

Web page classification has many applications and plays a vital role in web mining and semantic web. Web pages contain much irrelevant information that does not reflect their categories or topics, and operates as noise in the process of their classification, especially when using a text classifier. Thus, the use of information from related web pages can help to overcome the problem of noisy content and to get a better result after the classification. Web pages are linked either directly by hyperlinks or indirectly by user’s intuitive judgment. In this work, we suggest a post classification corrective method that uses the query-log to build an implicit neighborhood, and collectively propagate classes over web pages of that neighborhood. This collective propagation helps improving text classifier results by correcting wrongly assigned categories. Our technique operates in four steps. In the first step, it builds a weighted graph called initial graph, whose vertices are web pages and edges are implicit links. In the second step, it uses a text classifier to determine classes of all web pages represented by vertices in the initial graph. In the third step, it constructs clusters of web pages using Formal Concept Analysis. Then, it applies a first adjustment of classes called Internal Propagation of Categories (IPC). In the final step, it performs a second adjustment of classes called External Propagation of Categories (EPC). This adjustment leads to significant improvements of results provided by the text classifier. We conduct our experiments using five classifiers: SVM (Support Vector Machine), NB (Naïve Bayes), KNN (K Nearest Neighbors), ICA (Iterative classification algorithm) based on SVM and ICA based on NB, on four subsets of ODP (Open Directory Project). We also compare our approach to Classification using Linked Neighborhood (CLN) considered as the closest algorithm to EPC. Results show that: (1) when applied after SVM, NB, KNN or ICA classification, IPC followed by EPC help bringing improvements on results. (2) F1 scores provided by our approach with any of the five classifiers are significantly better than those obtained by CLN. (3) The performance provided by our proposed approach grows proportionally to the size of the query-log, and to the density of the weighted graph.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602200209 2014/06/12 - 15:05

Optical character recognition (OCR) is an important application in the field of pattern recognition. It extracts text from an image document and saves it in an editable form. Examples where OCR is used include library digitization and text searching in scanned documents. Web based applications are main tools for data processing over the net. However, implementing such applications in dedicated hardware systems would increase performance and reliability by many folds over software implementation. In this paper, we present a detailed hardware implementation of the features extraction and character matching units of an Arabic optical character recognition (AOCR) system. The hardware implementation of each of these two units is described in VerilogHDL and functionally tested using ISim from Xilinx. Furthermore, each implementation is synthesized using Xilinx ISE 13.1 targeting Xilinx Spartan6 FPGA family. Experimental results show significant speed up in the hardware implementations over software ones. We further, explore the possibility of accessing these systems over the Web. Thus, they are beneficial to wider range of people.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602210219 2014/06/12 - 15:05

Optical character recognition (OCR) is an important application in the field of pattern recognition. It extracts text from an image document and saves it in an editable form. Examples where OCR is used include library digitization and text searching in scanned documents. Web based applications are main tools for data processing over the net. However, implementing such applications in dedicated hardware systems would increase performance and reliability by many folds over software implementation. In this paper, we present a detailed hardware implementation of the features extraction and character matching units of an Arabic optical character recognition (AOCR) system. The hardware implementation of each of these two units is described in VerilogHDL and functionally tested using ISim from Xilinx. Furthermore, each implementation is synthesized using Xilinx ISE 13.1 targeting Xilinx Spartan6 FPGA family. Experimental results show significant speed up in the hardware implementations over software ones. We further, explore the possibility of accessing these systems over the Web. Thus, they are beneficial to wider range of people.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602210219 2014/06/12 - 15:05

E-Learning is the environment that supports the education field and provides the knowledge of a specific area in one place. Computer Science Education (CSE) is one area that uses the aspects of e-Learning to educate the learners and to distribute the knowledge to them. Several Learning Management Systems (LMSs) support many software tools to manage the theoretical materials of the CSE. However, the practical software tools that are needed by the Computer Science courses are ignored or simply not considered in most of the LMSs. To overcome the limitations of the LMSs towards the practical aspects of the CSE, this paper shows how to prepare the tools and make them available for use anytime through the LMS. For this to work, the authors of this paper take a step forward in discussing how to extend the LMSs functionality in general and Moodle as a special case. This extension involves adding the needed software tool as a component to the architectural structure of Moodle. Moreover, this paper introduces some literature that supports and implements these kinds of extensions.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602220225 2014/06/12 - 15:05

E-Learning is the environment that supports the education field and provides the knowledge of a specific area in one place. Computer Science Education (CSE) is one area that uses the aspects of e-Learning to educate the learners and to distribute the knowledge to them. Several Learning Management Systems (LMSs) support many software tools to manage the theoretical materials of the CSE. However, the practical software tools that are needed by the Computer Science courses are ignored or simply not considered in most of the LMSs. To overcome the limitations of the LMSs towards the practical aspects of the CSE, this paper shows how to prepare the tools and make them available for use anytime through the LMS. For this to work, the authors of this paper take a step forward in discussing how to extend the LMSs functionality in general and Moodle as a special case. This extension involves adding the needed software tool as a component to the architectural structure of Moodle. Moreover, this paper introduces some literature that supports and implements these kinds of extensions.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602220225 2014/06/12 - 15:05

 World Wide Web (WWW) is now a famous medium by which people all around the world can spread and gather information of all kind.  However, there is large amount of irrelevant redundant and information on web pages also. Such information makes various web mining tasks web page crawling, web page classification, link based ranking and topic distillation complex. Previously, the relevant content was extracted only from textual part of web pages. But now-a-days the content on web page is not only in the text form but also as an image, video or audio. This paper proposes an improved algorithm for extracting informative content from web pages i.e. it extracts the relevant content not only as text but also as images, videos, audios, adobe flash files and online games. Experiments were conducted on different real websites show that precision and recall values of our approach is superior to the previous Word to Leaf Ratio approach.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602226230 2014/06/12 - 15:05

 World Wide Web (WWW) is now a famous medium by which people all around the world can spread and gather information of all kind.  However, there is large amount of irrelevant redundant and information on web pages also. Such information makes various web mining tasks web page crawling, web page classification, link based ranking and topic distillation complex. Previously, the relevant content was extracted only from textual part of web pages. But now-a-days the content on web page is not only in the text form but also as an image, video or audio. This paper proposes an improved algorithm for extracting informative content from web pages i.e. it extracts the relevant content not only as text but also as images, videos, audios, adobe flash files and online games. Experiments were conducted on different real websites show that precision and recall values of our approach is superior to the previous Word to Leaf Ratio approach.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602226230 2014/06/12 - 15:05

Since the past few years, the network domains and mobile agent technology has been the fastest growing and emerging trend as well. But it has to undergo certain challenges and problems, in order to meet the bandwidth requirements. Moreover, it suffers from issues related to reliability like security and fault tolerance. During the agent migration in an itinerary from one server to other common issue is server crash or agent crash. The parameters used for the evaluation of various techniques are agent centric, system centric, fault type, coordination performance analysis, central management and adaptive. Advantages of each mechanism are also described.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602231236 2014/06/12 - 15:05

Since the past few years, the network domains and mobile agent technology has been the fastest growing and emerging trend as well. But it has to undergo certain challenges and problems, in order to meet the bandwidth requirements. Moreover, it suffers from issues related to reliability like security and fault tolerance. During the agent migration in an itinerary from one server to other common issue is server crash or agent crash. The parameters used for the evaluation of various techniques are agent centric, system centric, fault type, coordination performance analysis, central management and adaptive. Advantages of each mechanism are also described.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602231236 2014/06/12 - 15:05

Steganography is a word derived from two Greek words i.e. Stegno and Graphy. Stegno means cover and graphy means writing. It is an important branch of information security which protects the secret information from eavesdropper. Steganography hides the existence of secret information in order to protect it. In this paper we are dealing with image steganography, in which images are used to hide the information in them. Number of image steganography techniques has been proposed so far to achieve the goals of steganography i.e. high payload, less imperceptibility and more robustness. In this paper a new steganography technique for colored image (i.e. RGB images) is introduced. This new introduced technique makes the use of features to hide more information than in other areas of image. As features are considered to be the function of edges therefore in this technique we are using hybrid edge detector to extract the features. In this technique a combination of Canny and fuzzy edge detector is used to detect the optimal edges. After detecting edges 1 bit of red, 4 bits of green and 8 bits of blue channel are used for hiding the secret message bits. For smooth areas an adaptive least significant bit based scheme is used. The newly introduced scheme achieves all the three goals of steganography appropriately. 

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602237242 2014/06/12 - 15:05

Steganography is a word derived from two Greek words i.e. Stegno and Graphy. Stegno means cover and graphy means writing. It is an important branch of information security which protects the secret information from eavesdropper. Steganography hides the existence of secret information in order to protect it. In this paper we are dealing with image steganography, in which images are used to hide the information in them. Number of image steganography techniques has been proposed so far to achieve the goals of steganography i.e. high payload, less imperceptibility and more robustness. In this paper a new steganography technique for colored image (i.e. RGB images) is introduced. This new introduced technique makes the use of features to hide more information than in other areas of image. As features are considered to be the function of edges therefore in this technique we are using hybrid edge detector to extract the features. In this technique a combination of Canny and fuzzy edge detector is used to detect the optimal edges. After detecting edges 1 bit of red, 4 bits of green and 8 bits of blue channel are used for hiding the secret message bits. For smooth areas an adaptive least significant bit based scheme is used. The newly introduced scheme achieves all the three goals of steganography appropriately. 

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602237242 2014/06/12 - 15:05

Area of iris recognition for human identification is very growing in this industrial era. Today, almost in every field iris recognition systems have been installed for various purposes like attendance systems, human verification systems for security reasons and access control at premises. A great research has been done in this area for constrained environment. However those systems do not work efficiently for unconstrained environment. For unconstrained environment many constraints need to be kept in mind for proper and accurate functioning of the system. Unconstrained iris recognition plays a vital role in identification system for real life applications and thus a great amount of research is going on in this area. In this paper a novel approach for human identification in an unconstrained environment is given. 

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602243246 2014/06/12 - 15:05

Area of iris recognition for human identification is very growing in this industrial era. Today, almost in every field iris recognition systems have been installed for various purposes like attendance systems, human verification systems for security reasons and access control at premises. A great research has been done in this area for constrained environment. However those systems do not work efficiently for unconstrained environment. For unconstrained environment many constraints need to be kept in mind for proper and accurate functioning of the system. Unconstrained iris recognition plays a vital role in identification system for real life applications and thus a great amount of research is going on in this area. In this paper a novel approach for human identification in an unconstrained environment is given. 

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602243246 2014/06/12 - 15:05

VANET is a subclass of MANET that faces plenty of research challenges in terms of security. The existing risk and security analysis approach of VANET may not work well as it is purely based on the ideological beliefs, and it does not reflect any realistic conditions. In this research work, we have done the systematic study of the various algorithms which are used to find the inflection points of equilibrium that further reflects a trade-off between the attacker and the defender‘s gain or loss payoff for pursuing their pursuit. This paper explores and discusses the usage of game theory and fuzzy logic in analysis of the attack and defense equilibrium. After doing this research work we have also recommended the future directives for doing research in this area.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602247252 2014/06/12 - 15:05

VANET is a subclass of MANET that faces plenty of research challenges in terms of security. The existing risk and security analysis approach of VANET may not work well as it is purely based on the ideological beliefs, and it does not reflect any realistic conditions. In this research work, we have done the systematic study of the various algorithms which are used to find the inflection points of equilibrium that further reflects a trade-off between the attacker and the defender‘s gain or loss payoff for pursuing their pursuit. This paper explores and discusses the usage of game theory and fuzzy logic in analysis of the attack and defense equilibrium. After doing this research work we have also recommended the future directives for doing research in this area.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602247252 2014/06/12 - 15:05

Pattern design plays a vital role in establishing network communication in Ad-hoc network scenario. The real challenge to the researchers is designing the communication architecture to vehicular network. Vehicular network architecture design is difficult, since the movement of the vehicle speed is high. The existing vehicular network architecture forms the network communication but the communication is not reliable and the message transmission time is high. However a new architecture design is required to establish fair network communication among vehicles. This paper presents a novel cluster based vehicular network architecture for Manhattan Mobility Model and the proposed model is analyzed with various routing protocols. The result and analysis of the proposed model show clearly that the Cluster based Manhattan Mobility Model produces reliable communication. The proposed Cluster scheme reduces the message transmission time obviously.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602253261 2014/06/12 - 15:05

Pattern design plays a vital role in establishing network communication in Ad-hoc network scenario. The real challenge to the researchers is designing the communication architecture to vehicular network. Vehicular network architecture design is difficult, since the movement of the vehicle speed is high. The existing vehicular network architecture forms the network communication but the communication is not reliable and the message transmission time is high. However a new architecture design is required to establish fair network communication among vehicles. This paper presents a novel cluster based vehicular network architecture for Manhattan Mobility Model and the proposed model is analyzed with various routing protocols. The result and analysis of the proposed model show clearly that the Cluster based Manhattan Mobility Model produces reliable communication. The proposed Cluster scheme reduces the message transmission time obviously.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi0602253261 2014/06/12 - 15:05

The International Conference on Intelligent Information and Network Technology (IC2INT) 2013 was held in Faculty of Sciences and Technology Settat Morocco, 13-14 November 2013. IC2INT is an international forum for discussions on recent advances in the fields of intelligent information and network technology specially related to the design, development, modeling, and how to use the information systems in organizations with multidisciplinary perspective. It also serves to foster communication  leading academic scientists, scholars and practitioners to exchange and share their experiences and research results about all aspects of Computer Science and Information Engineering.In response to the call for papers, we received 130 submissions. After an initial screening, 11 submissions were declared “out of scope” (or with inappropriate technical content) and the remaining 119 were sent to reviewers. All manuscripts underwent a very rigorous peer review process. We finally selected 78 full papers, 11 Poster and 19 technical notes for this special issue substantiallty validated and evaluated.The full papers in this issue can be broadly organized into three main categoriesOntologies Engineering, Artificial IntelligenceMobile & Wireless Technology, Network TelecommunicationInformation Systems & Natural Language ProcessingThe papers were selected on the basis of Novelty and Originality of the contribution as well as their Technical Content. 

  • Reasoning on Hybrid Ontology Using Extended SWRL Rules

Souad Bouaicha, Zizette Boufaida

  • Fuzzy Ontology Evolution: Classification of a New Individual

Djellal Asma and  Boufaida zizette

  • Semantic Technologies Applying to Data Warehouses Federation

MOUHNI Naoual, ELKALAY Abderrafiaa

  • Vocabulary Persona by using Ontologies

 GAOU Salma, EL KADIRI Kamal Eddine

  • Unified Approach for Building Heterogeneous Artifacts and Consistency Rules

Mounir ZEKKAOUI, Abdelhadi FENNAN

  • Crypto-Security Contribution in WSNs

Nourreddine Mitta, Rachid Gouri, Hlou Lamari, Brahim Moalige

  • MGI-LEACH : Multi Group LEACH Improved an Efficient Routing Algorithm for Wireless Sensor Networks

Alami Chaibrassou, Ahmed Mouhsen

  • A WIFI Antenna Radiation Effects on Human Head in the ISM Band

Radouane KARLI, Hassan AMMOR

  • Development of a New Slit-Slotted Shaped Microstrip Antenna Array for Rectenna Application

Mohamed Adel SENNOUNI, Jamal ZBITOU, Abboud Benaissa, Abdelwahed TRIBAK, Mohamed Latrach

  • Performance Evaluation of WideMac Compared to ALOHA in term of Energy Consumption for IR-UWB based WSN

Anouar Darif, Rachid Saadane, Driss Aboutajdine

  • Euclidean 3D Reconstruction of Unknown Objects from Multiple Images

Soulaiman El hazzat, Abderrahim Saaidi, Khalid Satori

  • Comparative Study of PCA, ICA, LDA using SVM Classifier

 Anissa Bouzalmat, Jamal Kharroubi, Arsalane Zarghili

  • SVM Classification of High Resolution Urban Satellites Images Using Composite Kernels and Haralick Features

Aissam Bekkari, Soufiane Idbraim, Driss Mammass and Mostafa El yassa, Danielle Ducrot

  • 3D Normalization Based on the Barycentric Coordinates

El Mostafa RAJAALLAH, Lahcen MOUMOUN, Taoufiq GADI

  • Optimization of the Organized KOHONEN Map by a New Model of Preprocessing Phase and Application in Clustering

Es-safi Abdelatif, Harchli Fidae, Ettaouil Mohamed

  • Adaptive Learning

Soumaya EL MAMOUNE, Loubna CHERRAT, Omar KASSARA, Marouane EL MABROUK, Ahmed Hadioui, Mostafa EZZIYANI

  • A Comparative Study between the Pseudo Zernike and Krawtchouk Invariants Moments for Printed Arabic Characters Recognition    

 R. SALOUAN,  S. SAFI,  B. BOUIKHALENE

  • People Tracking using Color Control Points and Skin Color

K.LAAROUSSI, A.SAAIDI, K.SATORI

  • Fuzzy Control System for Autonomous Navigation of Thymio II Mobile Robots

Fatma BOUFERA, Fatima DEBBAT, Francesco MONDADA, M. Faycal KHELFI We hope you enjoy these papers. We would like to thank the authors for their contributions.Special thanks to the organizing committee members, program committee members as well as  the  reviewers contributing so richly to the scientific ambiance.We are indebted to Editor-in-Chief, Simon Fong for offering us this opportunity and for patiently waiting the completion of the special issue. 

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi06010102 2014/03/06 - 13:51

In this paper we present the principal steps to create a semantic rule which integrates Object Oriented Techniques to the comportment of the concepts.The set of rules obtained from the extension of SWRL rules will be posted to Jess Engine using rewrite meta-rules. The reasoning on this combination allows inferring new knowledge and stores it in the knowledge base. We propose an implementation of the method of extending SWRL rules with the adaptation of the different Object Oriented Techniques. The engine executes the transformation of these techniques to the Jess model. Our demonstration clarifies the importance of this kind of reasoning. We use a case study inherent to interpret a check up in preventive medicine.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi06010308 2014/03/06 - 13:51

Ontologies help to conceive the real world with its semantic constraints. But this world has several uncertainties and imperfections that we cannot conceive using traditional ontologies. In our work, we are mainly interested in the imprecise knowledge representation problem. We believe that the most appropriate way is to use fuzzy logic in order to build ontologies called "Fuzzy ontologies". Even if there are several researches revolve around handling imprecise knowledge, however, there are still some issues to be further studied; one of them is the evolution problem which is still a tedious field. In this paper, and as a first step in the problem of fuzzy ontology evolution, we are interested in the classification of new individuals; for this reason, we use the classificatory reasoning mechanism to enable the classification of new individuals in a fuzzy hierarchy.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi06010914 2014/03/06 - 13:51

Business intelligence is based on the existence of main components including : data warehouses .The data warehouse is a specialized database which main task is to provide quick access to data in analysis objective. But in some cases it is necessary to use a set of data warehouses to provide a complete information . This structure is what we  call federation, and even if the components are physically separated, they are logically seen as a single component. Generally, these items are heterogeneous which make it difficult to create the logical federation schema ,and the execution of user queries a complicated mission. In this paper,  we will fill this gap by proposing a model for logical federation schema creation based on ontology, in order to treat different schema types (star , snow flack) including the treatment of hierarchies dimension too.   

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi06011519 2014/03/06 - 13:51

Semantic Web add to all these resources that allow computer systems to "understand" the meaning by accessing structured collections of information and inference rules that can be used to drive reasoning automated to better satisfy user requirements. Standard description of Web resources proposed by the W3C, as the name implies, RDF (Resource Description Framework) is a meta-data used to guide the description of resources, to make it more "structured" information necessary for engines research and, more generally, to all necessary computer automated tool for analyzing web pages. The web is a new web sematique or all Web resources are described by metadata, which allows machines better use of these resources. Considering as a foundation specification FOAF (Friend Of A Friend), we use semantic structures (RDFa) to create an ontology and technologies in which it is implemented.Create a conceptual model (eg, an ontology) for personas and their uses in the context of human-computer interaction we will present some screenshots of execution of application.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi06012025 2014/03/06 - 13:51

It has become increasingly difficult to ensure consistency between all artifacts in complex software applications, and manage the impact of their development throughout the development process. Computer assistance in detecting and resolving inconsistency issues can help improve the quality of designs and development of software. In this article, we propose a unified approach to representation of different heterogeneous artifacts and a uniform formalism to express methodological consistency rules based on traces of construction and we validated our approach by building a check engine in order to detect inconsistency.  

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi06012631 2014/03/06 - 13:51

Securing a wireless communication has generally a vital importance, particularly when this communication is in a hostile environment like in wireless sensor networks (WSNs). The problem is how to create cryptographic keys between sensor nodes to ensure secure communications. Limited resources of sensor nodes make a public key cryptosystem such as RSA not feasible. So, most solutions rely on a symmetric cryptosystem. In this paper, we propose a new key mana-gement scheme based on symmetric cryptography which is well adapted to the specific properties of WSNs. The evalu-ation of our solution shows that it minimizes memory occupation, ensures scalability, and resists against the hardest attack: com-promised nodes.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi06013239 2014/03/06 - 13:51

The wireless sensor networks (WSN) are composed by a large number of micro sensors that are randomly deployed in an area of ​​interest to supervise or monitor various phenomena (temperature, pressure, humidity ..). The wireless sensor nodes are typically powered by non-rechargeable batteries which makes them constrained in terms of energy. As communication energy represents the largest part of the energy consumed in sensor nodes [1], so energy efficient routing is one of the main issues to prolong lifetime of wireless sensors networks. This paper proposes a hierarchical routing protocol called MGI-LEACH for homogeneous wireless sensor networks  based upon the framework of  LEACH such as the network is divided into multi groups to prevent the concentration of cluster head in a particular area of ​​the network, and the cluster head selection is based on high residual energy and a short distance from the base station (BS) in each communication round, which minimizes the communication energy of wireless sensor nodes, and hence, increases lifetime of the whole network. Simulations using MATLAB software show improved lifetime in different levels of Grouping compared to the classical algorithm LEACH.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi06014044 2014/03/06 - 13:51

This article describes in the first, the design of a new microstrip patch antenna for WIFI/WLAN applications (IEEE 802.11 b/g/n). Secondly, the article presents the effect of electromagnetic waves on a model of the human head exposed to the antenna designed in the ISM2450 band. By adopting a model tissue to seven layers of an adult. The objective is to evaluate the specific absorption rate (SAR) due to the propagation of electromagnetic waves along a human head for different antenna-head distances in simulation anatomic based model of the human head at a frequency of 2450MHz. All results, reflection coefficient, VSWR, radiation pattern, SAR and field distributions are presented. The simulation analysis was performed using the HFSS software.  MGI-L�z<s�8$�/span> for homogeneous wireless sensor networks  based upon the framework of  LEACH such as the network is divided into multi groups to prevent the concentration of cluster head in a particular area of ​​the network, and the cluster head selection is based on high residual energy and a short distance from the base station (BS) in each communication round, which minimizes the communication energy of wireless sensor nodes, and hence, increases lifetime of the whole network.  Simulations using MATLAB software show improved lifetime in different levels of Grouping compared to the classical algorithm LEACH.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi06014548 2014/03/06 - 13:51

These paper presents a new 3X3 array design  using a microstrip patch array antenna to operate at 2.45GHz. The aim of this antenna array construction is to obtain high directivity. The element of the array is microstrip square patch antenna using V-shaped symmetric-slit along with rectangular slot in diagonal direction at the centre of square patch radiator to achieve the circularly polarized radiation and each element is fed by inset feed. The size and feed position of the single microstrip square patch is determined through the theoretical design and CST microwave studio software simulation. Based on which an array of six elements with equal sizes and equal spacing is designed on a planar substrate. The simulation results in this paper can be used as design reference for the practical design of the rectenna.

http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi06014953 2014/03/06 - 13:51