By Topic

Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 2004.

19-23 April 2004

Filter Results

Displaying Results 1 - 25 of 397
  • A new paradigm of interaction for human controlled technical systems

    Publication Year: 2004, Page(s):527 - 528
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    This work will present the state of development and use of multimodal interactive user interfaces. Advanced human-to-process communication uses virtual- and augmented-reality-Systems to achieve intuitive process control again. Hypermedia learning systems, catalogs and simulators improve operator skills. All this leads to a new paradigm of human computer interaction. In order to achieve simple and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reinforcement learning for parameter control of text detection in images from video sequences

    Publication Year: 2004, Page(s):517 - 518
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    This work presents a generalized framework for approaching the problem of optimizing parameters for a multistep computer vision algorithm using reinforcement learning (RL) agent. We then focus on the specific task of text detection in images taken from video sequences for semantic indexing. Employing the fuzzy ARTMAP ANN is an effective way to manage and predict large state and action spaces. Imag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The state of the art of e-Government in Europe: an outline

    Publication Year: 2004, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Government is key to modernizing public administration and to reorient public governance. So administrative work itself is coming under scrutiny. e-Government can transform and improve the entire scope of administrative action and the political processes. So e-Government is both, vision of a future Government and the reality we have to live in today. We present the conclusions of the e-Europe Awar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Retrieving multimedia presentations from multimedia server

    Publication Year: 2004, Page(s):515 - 516
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    We present the delivery of multimedia presentation from multimedia server. More precisely, we focus on admission control and buffer management. We propose two approaches to optimize the delivery schedules. The first approach optimizes the server workload when the second optimizes the presentation response time. Both of the proposed approaches exploit the presentation flexibilities. In face of pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mediating the Semantic Web

    Publication Year: 2004, Page(s): LXI
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    This paper introduces an extension of a mediator-wrapper architecture to integrate the semantic Web. The extensions are implemented in XLive, an XML mediator developed at PRiSM in the context of the WebSI European project. XLive is decomposing global XQuery to local ones according to source capabilities. After a short description of XLive and some recalls on the Semantic Web, an architecture encom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mathematical formulation for the secure and versatile integration of biometric data into a cryptographic framework

    Publication Year: 2004, Page(s):411 - 412
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    This paper presents the mathematical formulation for the secure and versatile integration of biometric data into a cryptographic framework. The use of Shamir polynomial thresholding to further stabilise bitstrings derived from token-and (*)-biometric inputs, resulting in zero-uncertainty cryptographic keystrings is described. This enables direct biometric applicability in cryptographic protocols. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Noncentralized information systems management in research centers

    Publication Year: 2004, Page(s):507 - 508
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    This work presents the design, implementation, and utilization of HR & technical information system used by AECS will be highlighted. Reporting capabilities based on custom-made queries, preplanned reports, and graphics illustrations served as an indispensable aid to decision making process at the top management and boards. This work was carried out and is managed by scientific and management info... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of ATM network techniques to new naval combat systems

    Publication Year: 2004, Page(s):309 - 310
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Military naval on-board communications, COTS technologies are now commonly used for both nonoperational software communications and operational software communications. In this paper application of ATM network techniques to new naval combat systems is studied. The concept of an extended combat system naval force and coast based sensors networks and to keep end-to-end QoS through heterogeneous inte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The effect of anisotropy implementation on components of optical transmission lines

    Publication Year: 2004, Page(s):175 - 176
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    This work describes the fiber optics, which study the propagation of electromagnetic waves in anisotropic media and use these effects as key components for analyzing the state of polarization. The devices and the various optical waveguides which depend on the anisotropy of optical properties and which are connected with the mechanical voltage in them have been used widely in the basic components o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overview of road traffic control strategies

    Publication Year: 2004, Page(s):LIX - LLX
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    An overview of advanced traffic control strategies for urban road networks and freeway networks, as well as for route guidance and information systems is presented in this paper. Fixed-time techniques that use historical data to set up strategies for specific time-of-day control is discussed, but the main focus of the paper is on traffic control strategies that determine control inputs in real tim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent soundex function for Arabic names

    Publication Year: 2004, Page(s):407 - 408
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    This paper, attempts to explain new and useful search function, which are used in searching and retrieving names written in Arabic language, which can be stored in a database of digital library. We called this function Arabic Soundex Function (ASF), and we present the steps of its algorithm. ASF was designed by using fuzzy logic to determine the 'degree of closeness' between the compared names, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GSM-based wireless home appliances monitoring & control system

    Publication Year: 2004, Page(s):237 - 238
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    This paper presents the emerging applications of the GSM technology. Using the public GSM networks, a home automation system has been proposed, designed, implemented and tested. The design of a stand-alone embedded system that can monitor and control home appliances locally using built-in input and output peripherals is presented. Remotely, the system allows the homeowner monitoring and controllin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GenoMEDIA: a middleware platform for distributed genomic information

    Publication Year: 2004, Page(s):505 - 506
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    This work presents the problem of integrating heterogeneous software tools and databases in a generic distributed platform focused on genomic applications. A new system concept, named GenoMEDIA is presented. This platform allows users to access in a uniform and transparent manner these heterogeneous data and tools. The user submits both data and goal to a generic query point of GenoMEDIA, which de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study and development of CRM information system for small and medium businesses

    Publication Year: 2004, Page(s):503 - 504
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB) | HTML iconHTML

    Companies are realizing that one of the necessary components of an effective business model is customer relationship management (CRM) strategy and its associated information system. This work presents a modified CRM information system for small and medium size businesses. Also, the paper examines the impact of applying CRM strategies on business entities. The developed CRM is tested at a real exam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reduced order modelling of linear interval systems using multipoint continued fraction expansion

    Publication Year: 2004, Page(s):303 - 304
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    Due to the fact that the overall geometry sizes of electronic structure in general becomes smaller and the frequencies of the signals used by these structures is increasing, many electromagnetic effects are tending to influence the behavior of the whole electronic structures. These effects do not only take place in very small features sizes in chips, but also on PCB's scale these effects are obser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Arabic/Persian cursive signature recognition and verification using line segment distribution

    Publication Year: 2004, Page(s):475 - 476
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    This work proposes a fast method for line segment extraction based on chain code differentiation. It is applied to cursive signature recognition of Arabic/Persian. The evaluation method is introduced to obtain a quantitative value for the recognition rate. The comparative results show the existing differences among the methods in recognition, building time and searching time criteria. The two meth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-government from theory to application

    Publication Year: 2004, Page(s):17 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    Almost all developed countries as well some of the developing ones - are in a big race to apply e-government, which is the outcome of the latest achievements of ICT. This paper gives the meaning of e-government and the main concepts included in this term. We present the importance of applying e-government and the most important suggestions necessary for launching e-government in Syria. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy interfaces & collective interfaces knowledge acquisition & new production tools

    Publication Year: 2004, Page(s):379 - 380
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    In this article, we define a new type of information exchange interface between an individual and the collective intelligence. The fuzzy interfaces make a specific class of collective interfaces allowing, particularly, the management of information overload, which our information society is currently confronted to. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizations of 980 nm aged pump laser by using electrical and optical noise for telecommunication systems

    Publication Year: 2004, Page(s):173 - 174
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    The knowledge of the noise levels is important for pump laser diodes as it allows to study and to locate the noise sources and their origin. 980 nm fresh and aged pump laser have been characterized by using electrical and optical noise measurements. In this work, we present the electrical and optical noises at low - mid frequency for fresh pump laser diodes emitting at 980 nm (reference laser), an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigation of network issues for distributed haptic virtual environment applications

    Publication Year: 2004, Page(s):677 - 678
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    This paper describes the effects of network on the performance of distributed haptic virtual environments (DHVE) and an experimental platform design for this purpose. On this platform, a network infrastructure (Gigabit-Ethernet-based) is installed for developing DHVEs and conducting experiments for evaluation purposes. This is part of an on-going project, which develops technologies to support mul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technical challenges and trends in broadband wireless access at frequencies between 2 and 11 GHz

    Publication Year: 2004, Page(s): LVII
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    Broadband wireless access (BWA) is a promising technology for new operators without an existing infrastructure to reach the end users. There is a wide spectrum for BWA at millimeter-wave frequencies (above 20 GHz), but the technology is not mature enough to make these systems cost-effective for residential applications. Therefore, there is currently a strong interest in BWA at microwave frequencie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concepts approximation for information retrieval from databases and pragmatic OLAP

    Publication Year: 2004, Page(s):401 - 402
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    This paper presents rough SQL, which is a prototype, based on an extension of the SQL algebra by introducing concepts approximation operators. This extension uses mainly the lower and the upper approximations of the Rough Set Theory (RST). The SQL algebra is a powerful tool to extract explicit information stored in databases. This extension is then used to support flexible querying of multidimensi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time- and energy-efficient organization of objects in a broadcast environment

    Publication Year: 2004, Page(s):235 - 236
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    Retrieving related objects from the air channel has two requirements: minimizing the overall response time at the mobile unit; minimizing the amount of power consumed in the retrieval process at the mobile unit. In this paper proper time, energy efficient organization and retrieval techniques for the objects in an effort to meet both requirements in a broadcast environment is proposed and analyzed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel neural network half adder

    Publication Year: 2004, Page(s):427 - 428
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    This paper focuses upon the design of neural network to produce good solution to multiple-valued logic circuits. The theoretical basis for applying neural networks to multiple-valued logic algebra called neuro-algebra is proposed. This research also studies the design of a single artificial neural network model for half adders of binary, ternary, quaternary and quinary systems. The model has prove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Employing mobile agents to secure local networks

    Publication Year: 2004, Page(s):501 - 502
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    We present a hybrid scheme based on mobile agents, which automates the task of network monitoring and applies security policies. The scheme consists of a policy manager agent, responsible for managing security policies and responding to network attacks. This task is assisted by a variety of mobile agents running on a mobile agent platform, which help applying configurations locally. The agents dev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.