Recherche
Voici les éléments 1-10 de 67
A framework for Object Classification in Fareld Videos
(Springer, 2014-12)
Object classification in videos is an important step in many
applications such as abnormal event detection in video surveillance, traf-
fic analysis is urban scenes and behavior control in crowded locations.
In this ...
Prediction- based Localization for Mobile Wireless Sensor Networks
(IEEE, 2014-09)
In this paper, we propose two extensions of SDPL
(Speed and Direction Prediction-based Localization) method. The
first is called MA-SDPL (Multiple Anchors SDPL) which uses
multiple mobile anchors instead of only one. ...
Reliable mobile agents with transactional behaviour
(inderscience, 2014)
The mobile agent systems are well suited for certain types of real
world applications such as e-commerce and distributed transactions. However,
this technology is not being used by many applications. This is due to ...
Système de production de contenus pédagogiques multilingue
(2014-03-10)
Les recherches sur les environnements informatiques d’apprentissage humain portent sur les principes de conception, de développement et d'évaluation de systèmes informatiques qui permettent à des apprenants ...
Binarization of Degraded Historical Document Images
(CERIST, 2014)
Old document images often suffer from different types of degradation that render their binarization a challenging task. In this paper, a new binarization algorithm for degraded document images is presented. The method is ...
Inertial Measurement Unit: Evaluation for Indoor Positioning
(CERIST, 2014-05-17)
In this paper, we tackle the problem of indoor positioning, where the GPS signals are unavailable and the energy consumption of battery powered mobile devices should be carefully considered during the positioning process. ...
Un modèle de contrôle d’accès pour la protection des données personnelles dans le dossier médical partageable
(2014-10-15)
De simples défaillances dans la protection des données médicales, peuvent avoir des conséquences dramatiques sur la vie privée d’un patient. Dans cet article, nous nous concentrons principalement sur le
contrôle d’accès ...
Using tags Associated to Resources to Build Ontologies
(CERIST, 2014-06-18)
Social tagging has recently emerged in the collaborative web as a support shared resources organization allowing users to categorize these resources, that can be
web pages, video, or images, by associating them with ...
Parallel Rules Mining Using GPUs and Bees Behaviors
(2014-08)
This paper addresses the problem of association rules mining with large data sets using bees behaviors. The bees swarm optimization method have been successfully applied on small and medium data size. Nevertheless, when ...
Implementation of High Precision Synchronization Protocols in Wireless Sensor Networks
(IEEE, 2014-05)
Microsecond-level time synchronization is needed in
realtime applications of wireless sensor networks. While several
synchronization protocols have been proposed, most performance
evaluations have been limited to ...