By Topic

2011 Colloquium in Information Science and Technology

Date 11-12 May 2011

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (999 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • CIST'11 Committees

    Publication Year: 2011, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • CIST'11 partners

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • Technical sessions

    Publication Year: 2011, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Keynote talk data warehouses: Construction, exploitation and personnalisation

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (41 KB) | HTML iconHTML

    With the development of Internet and Intranets, the exchange and sharing of the enormous amount of information from various data sources scattered across the Web and in different organizations have become crucial issue. To meet these needs, integration solutions have been proposed by offering uniform interface to end users. These solutions concerns three main dimensions: data integration, applicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote talk basic research at universities and its impact on innovation processes and industry

    Publication Year: 2011, Page(s): 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (37 KB) | HTML iconHTML

    Very often people and in particular politicians and leaders in industry blame universities to disregard innovation processes and entrepreneurship. Mostly these critics are based on the (historic) “linear model” of innovation which starts with an idea and, finally, leading directly to an (industrial) product on the market which will be a guaranty for jobs and competitiveness. In this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creation of Al Mabsout Moroccan fonts format

    Publication Year: 2011, Page(s):3 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (122 KB) | HTML iconHTML

    The Moroccan calligraphy is an original and civilizational cultural heritage, which it is necessary to protect, byits introduction to the everyday life whether it is in the architecture, the advertising or still in multimedia. The majority of attempts to digitize the Moroccan writings led to fonts which does not respect artistic and aesthetic specificities of Moroccan calligraphy. Hence the need t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ontology-based approach for web information extraction

    Publication Year: 2011, Page(s): 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (39 KB) | HTML iconHTML

    Extracting structured information from pages published on the worldwide web is a problem with many facets that has gained growing interest in recent years. We propose a novel ontology-based approach that can achieve both the extraction and the semantic description of data contained in a web page. Existing methods addressing these issues range from pure manual methods based on rules to systems that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An oriented service architecture and model for GIS health management: Case of cancer in Morocco

    Publication Year: 2011, Page(s): 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (42 KB) | HTML iconHTML

    Summary form only given. In Morocco, the prevalence of cancer cases has increased and has become ranked as the second leading cause of death. Therefore, forming a cancer control program and putting strategic action plans into practice became an important matter for the health industry. The correlation of variations in different societies and environmental factors should be examined spatially with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Telecom datawarehouse prototype for bandwidth and network throughput monitoring and analysis

    Publication Year: 2011, Page(s): 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (41 KB) | HTML iconHTML

    Summary form only given. Telecommunication companies have developed very large, heterogeneous and complex technical infrastructures to support the variety of services they offer like landline calls, mobile calls, ADSL, and WiMax. Efficient monitoring and maintenance of operational stability of these infrastructures are critical for delivering high quality services to the end users. The management ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Color facial authentication system based on neural network

    Publication Year: 2011, Page(s): 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (43 KB) | HTML iconHTML

    Summary form only give. Face recognition can be defined as the ability of a system to classify or describe a human face. The motivation for such system is to enable computers to do things like humans do and to apply computers to solve problems that involve analysis and classification. Face recognition systems require less user cooperation than systems based on other biometrics (e.g. fingerprints a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System of indexing, annotation and search in the old Arabic manuscripts

    Publication Year: 2011, Page(s): 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (43 KB) | HTML iconHTML

    Ancient manuscripts constitute a heritage to preserve for future generations and make it accessible to a wider audience. This heritage is unfortunately consulted by a minority of experts and researchers because of the lack of information on the existence of this national heritage. The problem is partly due to the fact that this manuscript heritage is stocked in libraries scattered around the count... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Search engine of ancient Arabic manuscripts based on metadata and XML annotations

    Publication Year: 2011, Page(s): 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (46 KB) | HTML iconHTML

    The old manuscripts kept in libraries are a part of the richest cultural heritage and legacy of civilizations. Digitalization is a solution for the preservation of this cultural and historical heritage, which is very difficult to handle for users. The automatic or manual transcription of old Arabic manuscripts is an inevitable stage for the indexing and the diffusion of the contents of these manus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The quality process in a professional context: Software industry case

    Publication Year: 2011, Page(s): 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (42 KB) | HTML iconHTML

    In the current context of the software's market, the stress is laid on the cost, the calendar and the functionalities. In order to ensure these criteria, the implementation of a step quality ISO 9001:2008 is necessary. The quality of a developed product is influenced by the quality of the production process. This is important in software development as some product quality attributes are hard to a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reference model for an improved collaborative business processing in a Moroccan governmental administration

    Publication Year: 2011, Page(s): 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (50 KB) | HTML iconHTML

    The aim of this work is to construct a reference model for application processing in a Moroccan public administration. We used the Zachman framework for enterprise architecture. The chosen case study is the “Economics service and police administration” in the Agdal district of the city of Fez. First, we built the actor diagram that represents the different actor's domain and their go... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The quality integrating data mining with Case Based Reasoning for personalized adaptation of context-aware applications in pervasive environments

    Publication Year: 2011, Page(s):13 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (43 KB)

    Pervasive computing (also referred to as ubiquitous computing or ambient intelligence) aims to create environments where computers are invisibly and seamlessly integrated and connected into our everyday environment. Pervasive computing applications are often interaction transparent, context aware, and experience capture and reuse capable. Interaction transparency means that the human user is not a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Graphical specification and formal verification of the Workflow Petri Nets properties in a business process context

    Publication Year: 2011, Page(s): 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (42 KB) | HTML iconHTML

    Summary form only given. State of the art organizations produce models of their business processes to ensure continuous improvement of their activities which help to achieve high revenue performance. They also use these models to build up quality and preserve knowledge. Business processes are determined according to the organization's function and they consist of a completely closed, timely and lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2011, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE