Mohamed Ridda LAOUAR
Table of contents:
Volume 3 issue 2 - Current Issue
- Richard Hacken.
Brigham Young University. Provo, USA
Big Data Challenges for Digital Libraries
Thanks to technological progress, thanks to the copious Internet, thanks to geometrically
burgeoning social media and to quickly proliferating sensors, the flood of data available to us is
surging larger and larger, faster and faster. Paradigms for management and analysis are at the
core of data-driven businesses and institutions, fueling the velocity of scientific research and
The phrase “Big Data” was itself coined by scientists as they manipulated exploding data masses
as a means of mapping the heavens on the astronomical scale and mapping the genome on the
human scale. Now we are finding myriad uses between the celestial and the personal. The
potential utility of Big Data in all fields of endeavor is as clear as are the challenges and
difficulties. The entire enterprise of dealing with Big Data is so new that the field is still full of
questions about the validity of the practice itself and the value of the means by which the data are
On the positive side, it is appropriate to point out how artifical intelligence may assist in
legitimizing and validating approaches to massaging and interpreting Big Data. It is likewise
relevant to point out how cloud computing (as series of widely interconnected digital repositories
or cooperative workshops) and the use of mobile applications, (above all as sensing organs) can
help us to put a human face on the computing power – a power which is not ultimately about
capturing and counting things, not about crunching numbers, but rather about improving society
and living conditions for the humans who live on the earth.
- Cihan Ulaş, Ulaş Aşık and Cantürk Karadeniz
TÜBİTAK BİLGEM, Kocaeli, Gebze
Analysis and Reconstruction of Laser Printer
Information Leakages in the Media of Electromagnetic
Radiation, Power, and Signal Lines
In this paper, the emissions of a laser printer, which may contain
classified information, are investigated in the media of electromagnetic radiation
(ER), Power Line Conductors (PLC), and Signal Line Conductors (SLC).
Analysis of modulated-type Compromising Emanations (CE) of printed data is
mainly divided into three parts. First, the candidate frequency points of CE are
examined in the frequency domain. Second, the emitted signal is AMdemodulated
with the proper bandwidth, and then sampled by a high storage
oscilloscope in these frequency points. Third, the collected data is converted to
2D image by applying signal and image processing techniques. In this study,
apart from the ER signals, the emissions obtained from the power and signal
line are also analyzed. In addition, this study introduces some practical measurement
methods to reveal the possible CEs of laser printers. Finally, the procedure
of the image reconstruction of CEs of the laser printer data is explained in
detail. Experimental studies show that one can reconstruct the printed data successfully
for the commercial printers.
- M. Rashid Hussain, Haris Ahmad Khan, Khurram Khurshid.
Military College of Signals, Rawalpindi, Pakistan.
Institute of Space technology, Islamabad Highway, Islamabad, Pakistan
COMAPARATIVE ANALYSIS OF BINARIZATION
TECHNIQUES ON DEGRADED DOCUMENT
IMAGES FOR INFORMATION RETRIEVAL USING
Preservation of historical documents is as
critical as the history itself. Cultural advancements and
modernization stems from lessons of history.
Documentation does exists for these historical events /
research, but owning to numerous factors like
degradation, poor quality, accessibility and consultation
makes this knowledge restricted, regional and
monopolized limiting research and analysis around the
globe. Researchers around the world have focused on
this very challenging area and new innovations like
word spotting have been introduced for document image
retrievals. OCR systems do digitize and make the
scanned images more readable yet they suffer from the
limitation that they work well for good quality images. In
any form of image retrieval techniques, binarization
plays a pivotal role and can be termed as foundation
stone for this framework. Lot of research has already
been done in this area, yet scope does exists in this field
which is evident from the fact that binarization
competitions are held every year in renowned
competitions like ICDAR. An effort has been made in
this paper to undertake comparative analysis of leading
document image binarization techniques with a view to
suggesting options for researchers to employ various
methods under different conditions. Diverse data set has
been used covering wide spectrum of scope for
Wided BAKARI, Patrice BELLOT and Mahmoud NEJI.
Faculty of Economics and Management, Sfax. Tunisia.
Aix-Marseille University, Marseille. France.
A Survey of State-of-the-Art Arabic Question-
Answering: Modeling, Generation, Experimentation
and performance analysis
This study provides a comparative study of Arabic question-answering
systems. It presents a review of the main approaches and emphasizes
the different experimentations in Arabic. It attempts to describe and
detail the recent increase in interest and progress in Arabic questionanswering
research. It compares already existing question-answering
systems for this language. It reviews the various categories of proposed
question-answering systems within a broader framework of several languages
and Arabic. It projects the actual trends of researches in this
area for improving the Arabic. Also, it suggests a performance analysis
providing an in-depth review of Arabic question-answering, by first
noting the characteristics of, and resources available for, Arabic proposed
systems and then reviewing the main Arabic question-answering
- Ali SH. Alkhalid, Raaed K. Ibraheem and Roula AJ. Kadhim
Electrical and Electronic Engineering Techniques. Baghdad, Iraq.
Anti-Collision Enhancement of a SHA-1 Digest Using AES
Encryption By LABVIEW
A series of latest papers have pretended collision attacks on publicly used hash functions, including the
widely published SHA-1 algorithm. To estimate this threat, the natural response has been to
strengthening the system to overcoming the weakness that make the system apt to collision.
The SHA-1 hash function used in many fields of security system such as digital signature, tamper
detection, password protection and so on. SHA-1 is very important algorithm for integrity and
authentication realization, SHA-1 is a one way algorithm to produce hash code of any message with 160
random hash bits, which cannot be reversible.
AES with SHA-1 algorithm produce encrypted code that can be reversible to achieve confidentiality.
From the implementation and simulation results of AES based on SHA-1 algorithm obtained in
LabVIEW project show simplicity in modelling hash function algorithm generating hash codes encrypted
by AES method.