Entity

Time filter

Source Type


Sahar G.,High Institute of Computer Science and Multimedia | Turki M.,High Institute of Computer Science and Multimedia | Turki M.,Higher Institute of Technological Studies | Faiez G.,High Institute of Computer Science and Multimedia
2013 4th International Conference on Information and Communication Technology and Accessibility, ICTA 2013 | Year: 2013

We propose in this paper a new approach for knowledge cartography which aims to visualize knowledge of the organization among a clear representation. On the one hand, knowledge cartography approach identifies knowledge and evaluates it on the other hand. Moreover, it aims to visualize this knowledge through an understandable graphical representation. This approach has been tested in the organization of protection of motor-disabled of Sfax-Tunisia (ASHMS). © 2013 IEEE. Source


Mnif A.,University of Sfax | Cheikhrouhou O.,Higher Institute of Technological Studies | Cheikhrouhou O.,University of Sfax | Ben Jemaa M.,University of Sfax
Proceedings of the International Conference on Microelectronics, ICM | Year: 2011

The explosive growth in the use of mobile and wireless devices demands a new generation of remote user authentication schemes that has to accommodate limitations on power and bandwidth, at the same time, to provide an adequate level of security for transferred data in wireless networks. In this paper, we present a new method of access control adapted to constrained Wireless Sensor Networks (WSNs), that's provide access to legitimate users and deny access to illegitimate ones. Our scheme is based on the ID-based techniques and the Elliptic Curve Cryptography (ECC). The proposed protocol provides mutual authentication and key establishment between the user and a gateway node in the WSN. © 2011 IEEE. Source


Mliki H.,University of Sfax | Fourati N.,University of Sfax | Smaoui S.,Higher Institute of Technological Studies | Hammami M.,University of Sfax
Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA | Year: 2013

Over the last two decades, the advances in computer vision and pattern recognition power have opened the door to new opportunity of automatic facial expression recognition system In this work, we have introduced a new feature-based approach for facial expressions recognition. The proposed approach provides full automatic solution to identify human expressions as well as overcoming facial expressions variation and intensity problems. Facial features component were automatically detected and segmented. Then, we have detected facial feature points which go with facial expression deformations. Afterwards, distances between these points were computed and used through Data mining technique to generate a set of relevant prediction rules able to classify facial expressions. We took into account the intensity of JOY expression. Thus, we have defined SMILE expression as the lowest intensity of JOY. Seven facial expression classes were defined: JOY, SMILE, SURPRISE, DISGUST, ANGER, SADNESS, and FEAR We have appraised experimental study to evaluate the performance of the proposed solution. © 2013 IEEE. Source


Jerbi W.,Higher Institute of Technological Studies | Guermazi A.,Higher Institute of Technological Studies | Trabelsi H.,University of Sfax
International Journal of Business Data Communications and Networking | Year: 2015

The optimum use of coverage in wireless sensor networks (WSNs) is very important. The hierarchical routing protocol LEACH (Low Energy Adaptive Clustering Hierarchy) is referred to as the basic algorithm of distributed clustering protocols. LEACH allows clusters formation. Each cluster has a leader called Cluster Head (CH). The selection of CHs is made with a probabilistic calculation. It is supposed that each non-CH node join a cluster and becomes a cluster member. Nevertheless, some CHs can be concentrated in a specific part of the network. Thus several sensor nodes cannot reach any CH. As a result, the remaining part of the controlled field will not be covered; some sensor nodes will be outside the network. To solve this problem, the authors propose O-LEACH (Orphan Low Energy Adaptive Clustering Hierarchy), a routing protocol that takes into account the orphan nodes. O-LEACH presents two scenarios, a gateway and sub cluster that allow the joining of orphan nodes. © Copyright 2015 IGI Global. Source


Chandoul B.,Higher Institute of Technological Studies | Zouari I.,Higher Institute of Technological Studies | Bellagi A.,ENIM
International Journal of Applied Engineering Research | Year: 2012

This work presents a theoretical analysis and experimental pressing process of Kraft paper. In this paper, an analytical model of pressing paper was developed and validated against data obtained in experiments on Kraft paper 70 g / m 2 produced by the paper machine PM2 at the Tunisian Industrial Paper and board (SOTIPAPIER). This model assumes that the process consists of pressing an operation of external heating followed by isothermal compression and that the paper used to behave during this process, as a spring that is compressed. The predictions of this model indicate a good fit with the experimental results. It shows that for greater dryness at the exit of the press section, it is advisable to work at higher temperatures and stronger constraints. © Research India Publications. Source

Discover hidden collaborations