Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 2004.

19-23 April 2004

Filter Results

Displaying Results 1 - 25 of 397
  • Simulation optimization of a supply chain with globally shared inventory profiles

    Publication Year: 2004, Page(s):93 - 94
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (279 KB) | HTML iconHTML

    We develop a discrete-event simulation model a three-stage supply chain consisting of a single product, a retailer, a distributor, and a factory. The factory it gets raw materials from an outside supplier, which is not included in this current model. Demand at the retailer follows a random distribution. The retailer carries inventory and replenishes his stock from the distributor according to a (s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile information and consultation support system (MICSS): a new m-business service

    Publication Year: 2004, Page(s):91 - 92
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (255 KB) | HTML iconHTML

    Decision support systems (DSS) and expert systems (ES), have joined other human beings interactive auxiliary systems. Decision support systems and expert systems usually work on a relatively limited-in comparison with a huge data base-knowledge base (KB) rather than a data base (DB) and have relatively large processing operations. These systems have the capability of self-inserting and self-correc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operating systems and dynamic trust in a delocalized environment

    Publication Year: 2004, Page(s):571 - 572
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (282 KB) | HTML iconHTML

    The availability of Internet, the increase in the quality of service and the increase in the network output through the use of large bandwidth technology, even on the telephone lines, gives rise, for usual applications, to new modes of conception and run time settings for the usual public programs. In a usual setting the operating system checks authorizations associated with files at the beginning... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model for knowledge representation and manipulation (inference), in knowledge base systems

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (204 KB)

    In artificial intelligence field, choosing the right knowledge representation and manipulation methodologies are considered the most crucial keys of developing a successful knowledge base system. In fact, logic in general and resolution method specifically have been the dominant tools for representing and manipulating knowledge. This led for forming a gap between the knowledge area and the informa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive active network control and management system (AANCMS)

    Publication Year: 2004, Page(s):669 - 670
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (242 KB) | HTML iconHTML

    An adaptive active network control and management system (AANCMS) are proposed. The architecture is designed to actively control, monitor and manage both conventional and active networks and be incrementally deployed in existing networks. AANCMS is focused on an active monitoring and control infrastructure that can be used to manage networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Input impedance of a circular microstrip antenna: evolution as function of the thickness

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (209 KB) | HTML iconHTML

    In an earlier study of microstrip antennas excited by a probe-fed, an interesting physical phenomenon had been observed: the presence of a fixed point through which input impedance curves pass, when the thickness was the only parameter varied. We propose an analytical model giving the characteristics of this fixed point and the input impedance of a circular microstrip antenna. This model valid for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OpenSST based clearing mechanism for e-business

    Publication Year: 2004, Page(s):89 - 90
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (334 KB)

    This article presents an experimental prototype of the OpenSST protocol within the framework of electronic transactions and is focused on the development of a clearing mechanism based on an open source protocol. The experimentation is based on an e-business architecture around which a component is graft in charge of executing authorization requests for electronic payments. This architecture is alr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy interfaces & collective interfaces knowledge acquisition & new production tools

    Publication Year: 2004, Page(s):379 - 380
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (304 KB) | HTML iconHTML

    In this article, we define a new type of information exchange interface between an individual and the collective intelligence. The fuzzy interfaces make a specific class of collective interfaces allowing, particularly, the management of information overload, which our information society is currently confronted to. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependency in software watermarking

    Publication Year: 2004, Page(s):569 - 570
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (309 KB) | HTML iconHTML

    The advent of bytecode languages such as Java and advances in decompilation tools has made it easier to infringe the copyright of software. This presents a serious challenge to the software industry, as modern Internet software is highly distributed and the potential for software piracy is immense. Software watermarking has been proposed as one means of protecting the intellectual property in soft... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategic decision support systems design: integration approach between expert knowledge and historical data

    Publication Year: 2004, Page(s):553 - 554
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (294 KB)

    The design of strategic decision support systems passes by the organization of sources of knowledge: problems of multiplicity of the sources, therefore of heterogeneity of the supports and techniques, aggregation of knowledge and cooperation. We focus on the aggregated methods and more particularly the KDD (knowledge discovery from databases) method and datawarehousing. We show that KDD and datawa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-DHCP: extended dynamic host configuration protocol

    Publication Year: 2004, Page(s):667 - 668
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (297 KB) | HTML iconHTML

    This paper proposes an extension to DHCP protocol, called E-DHCP (extended-dynamic host configuration protocol). This protocol is based on two principles. The first is the definition of a new DHCP option (RFC 2489) that provides simultaneously the authentication of entities and the authentication of DHCP message. The technique used by this option is based mainly on the use of asymmetric public key... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences from 3G rollout in the UK

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (214 KB)

    This work presents a detailed study of the rollout of 3G in the United Kingdom. It elaborates the aspects of network technology, the various consumer mobile terminals in use, service models, and pricing structures and describes the means through which users are made aware of the differences between 2G/2.5G and 3G, the methods whereby business models are changed and the efforts being made to increa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The characteristic mode theory of the field penetration into a cylindrical waveguide through a rectangular aperture, TE case

    Publication Year: 2004, Page(s):239 - 240
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (291 KB) | HTML iconHTML

    This paper presents the characteristic mode theory method to solve the aperture problem for a cylindrical conducting guide coupled to open half space through a rectangular aperture. The equivalence principle is used to divide the problem into two equivalent regions. The decoupling of these two regions is done by short-circuiting the aperture and introducing magnetic currents of different signs on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New development on integrated intelligent speed adaptation system

    Publication Year: 2004, Page(s):57 - 58
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (257 KB) | HTML iconHTML

    We start with an overview of speed impact on road transport. We discuss present speeds and speed management measures on road. A new integrated ISA system is presented in this paper. The system involves GPS/DGPS (Global Positioning System/differential GPS) based location and navigation, DSRC (dedicated short-range communications) beacon, vehicle wireless communication, traffic and travel informatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of rate compatible punctured turbo codes over AWGN channels

    Publication Year: 2004, Page(s):287 - 288
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (243 KB) | HTML iconHTML

    In this paper, the performance of turbo codes in speech transmission over AWGN channels is presented. Turbo codes of short block sizes suitable for real time communication systems have drawn attention recently. Embedded channel coding is used which means permitting rate variability using a single encoder/decoder. Puncturing patterns that minimize the BER were implemented and tested. The puncturing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A profile approach for Internet service pricing

    Publication Year: 2004, Page(s):87 - 88
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (258 KB) | HTML iconHTML

    Nowadays the proposed pricing strategies in the Internet are not efficient because they don't take affect the end-users behavior and thus network resources are efficiently allocated. In order to build a competitive market pricing strategy, we propose a new approach that takes into account users and services profiles. This paper shows how to introduce these profiles in the Internet pricing strategy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote laboratories: new technology and standard based architecture

    Publication Year: 2004, Page(s):101 - 102
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (284 KB) | HTML iconHTML

    E-Laboratories development appears to be more complex than other e-learning contexts such as online courses, virtual classrooms, e-projects, role-playing, etc. However, this kind of training is essential for scientific and technical disciplines and fits a real need. Recently we initiated a project [A. Leleve et al., (2003)] whose main goal is to build a complete remote laboratory system with an op... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unsupervised classification of polarimetric SAR images using neural nets

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (207 KB) | HTML iconHTML

    Classification of earth terrain components using fully polarimetric SAR images is one of many important application of radar polarimetry. In this paper, we are interested in unsupervised classification method because of their rapidity, automatic criterion and their independency on the images to be classified. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An image processing-based aid approach applied in minimal invasive surgery application

    Publication Year: 2004, Page(s):327 - 328
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (290 KB) | HTML iconHTML

    In this paper, an image processing-based aid approach applied in minimal invasive surgery application is presented. In the framework of the abdominal aneurysm pathology treatment specially the positioning of the endovascular prothesis, we are working in developing an image processing approach to assist the endovascular prothesis positioning. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Weak keys of graph cryptography

    Publication Year: 2004, Page(s):419 - 420
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (267 KB) | HTML iconHTML

    This paper presents two families of weak keys, which can be combined to build a family of very weak keys. The detection algorithm of weak keys is introduced. Graph cryptography relics on the fact that a path in a directed graph can he expressed using the vertices or the edges. The main idea is to represent the encryption of any symbol with Markov chains. This is possible because the encryption of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of permanent magnet synchronous motor using artificial neural network for electric vehicles

    Publication Year: 2004, Page(s):143 - 144
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (243 KB) | HTML iconHTML

    This work presents a modern approach of speed control for permanent magnet synchronous motor (PMSM) using online artificial neural network (ANN). The overall system will be simulated under various operating conditions. The use of ANN as a controller makes the drive robust, with faster dynamic response higher accuracy and insensitive to load variation. Online training of the ANN is carried out and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization in genetically evolved fuzzy cognitive maps supporting decision-making: the limit cycle case

    Publication Year: 2004, Page(s):377 - 378
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (322 KB) | HTML iconHTML

    This paper proposes an extension of genetically evolved fuzzy cognitive maps (GEFCMs) aiming at increasing their reliability by overcoming its weakness appearing in cases of a limit cycle behavior. FCMs use notions borrowed from artificial intelligence and neural networks to combine concepts and causal relationships, aimed at creating dynamic models that describe a given cognitive setting. The act... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A proposal of a decision-maker problem to for a better understanding of information needs

    Publication Year: 2004, Page(s):551 - 552
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (256 KB) | HTML iconHTML

    This work presents a model of the decision-maker's problem in the economic intelligence context. Our goal is to describe the decision-maker's problem as explicitly as possible in order to help the watcher understand the real information need of the decision-maker. Our model takes into account three data categories: the environmental data, the organizational data and the personal data. In fact, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimized arbitrary size networks

    Publication Year: 2004, Page(s):665 - 666
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (293 KB) | HTML iconHTML

    This paper proposes a rearrangeable nonblocking network with reduced switching elements. The reduction of the SEs is achieved by eliminating SEs, which is not going to be used by the routing algorithm. The Benes network is rearrangeable nonblocking network, which can realize any arbitrary permutation. Arbitrary size Benes (AS-Benes) network is an extended version of Benes model with the ability to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Future Evolution of 3G networks

    Publication Year: 2004, Page(s):219 - 220
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (267 KB)

    This work provides an overview of the UMTS network and the initial phase of enhancements. It provides in depth discussions on the challenges, proposals and benefits of the main features on the radio network that are being studied for the second phase like enhanced uplink, MBMS, distributed UTRAN architecture, network sharing, push to talk, etc. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.