@article {Daoudi2022505, title = {Adaptive Enterprise Architecture: Complexity Metrics in a Mixed Evaluation Method}, journal = {Lecture Notes in Business Information Processing}, volume = {455 LNBIP}, year = {2022}, note = {cited By 0}, pages = {505-523}, abstract = {Classically, enterprises future is intertwined with the needs and demands of society. Nowadays, in addition to those two elements, challenges are becoming more and more numerous and unavoidable. Saying a few, global warming, social responsibilities, Covid 19, digital transformation{\textellipsis} We are living in a new era that is highly volatile and unpredictable. We don{\textquoteright}t have anymore the privilege to choose threats and opportunities that we want to adapt to. In fact adaptation becomes a necessity to survive in this highly competitive and dynamic environment. Factors coming from those challenges externally on top of internal ones can impact various parts of the enterprise in the form of changes. Thus, Adaptive Enterprise Architecture (EA) is leveraged to assist the continuous adaptation to the evolving transformation. On the other hand, one of the criteria of Adaptive EA is the ability to monitor and control the complexity of changes. In this paper, we suggest a mixed approach of EA complexity measurement based on quantitative and qualitative analysis. First, we begin with a recap of the criteria shaping our Adaptive Enterprise Architecture approach and we give an overview of the model that we worked on in previous work. Then we investigate related work about complexity and subjective measurement. Finally, we describe our mixed approach of assessment of complexity and we focus on the calculation of some objective and subjective metrics. {\textcopyright} 2022, Springer Nature Switzerland AG.}, keywords = {Adaptation, Adaptive enterprise, Complexity, Complexity measurement, Complexity metrics, Dynamic environments, enterprise architecture, Evaluation methods, Global warming, Memory architecture, Mixed approach, Social responsibilities}, doi = {10.1007/978-3-031-08965-7_26}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135013677\&doi=10.1007\%2f978-3-031-08965-7_26\&partnerID=40\&md5=0f86e1df30e1a710a67e90c0238de8f1}, author = {Daoudi, W. and Doumi, K. and Kjiri, L.} } @article {Didi2022427, title = {Design of a Security System Based on Raspberry Pi with Motion Detection}, journal = {Lecture Notes in Networks and Systems}, volume = {455 LNNS}, year = {2022}, note = {cited By 2}, pages = {427-434}, abstract = {Currently, the integration of IoT technology in various fields is very widely used, however, data security remains the essential point to be monitored especially in companies, and also in homes. To control and overcome security-related problems, we adopted Internet of Things technology based on a Raspberry pi4 as the main data processing element in this study. In this paper, we present a simple, efficient, and very reliable study for the monitoring of a video stream coming from a camera installed on a Raspberry pi4 which constitutes the essential element in our project. To reproduce this realization, we did not use a motion sensor, but we took advantage of the algorithm advantages of the Motion software integrated into the free operating system MotionEyeOs on a Raspberry pi4 to trigger motion detection by causing a beep to draw attention. On the other hand, our study was implemented without noticed difficulty, and with a great level of performance and stability which shows that our realization of the Video Stream Surveillance System is successful. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-02447-4_44}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130364762\&doi=10.1007\%2f978-3-031-02447-4_44\&partnerID=40\&md5=b04857d3a313f1841a7b503bccd21ff8}, author = {Didi, Z. and El Azami, I. and Boumait, E.M.} } @article {Elghomary202236, title = {Design of a Smart MOOC Trust Model: Towards a Dynamic Peer Recommendation to Foster Collaboration and Learner{\textquoteright}s Engagement}, journal = {International Journal of Emerging Technologies in Learning}, volume = {17}, number = {5}, year = {2022}, note = {cited By 2}, pages = {36-56}, abstract = {Recent evolutions in the Internet of Things (IoT) and Social IoT (SIoT) are facilitating collaboration as well as social interactions between entities in various environments, especially Smart Learning Ecosystems (SLEs). However, in these contexts, trust issues become more intense, learners feel suspicious and avoid collaborating with their peers, leading to their demotivation and disengagement. Hence, a Trust Management System (TMS) has become a crucial challenge to promote qualified collaboration and stimulate learners{\textquoteright} engagement. In the literature, several trust models were proposed in various domains, but rarely those that address trust issues in SLEs, especially in MOOCs. While these models exclusively rank the best nodes and fail to detect the untrustworthy ones. Therefore, in this paper, we propose Machine Learning-based trust evaluation model that considers social and dynamic trust parameters to quantify entities{\textquoteright} behaviors. It can distinguish trustworthy and untrustworthy behaviors in MOOCs to recommend benign peers while blocking malicious ones to build a dynamic trust-based peer recommendation in the future phase. Our model prevents learners from wasting their time in unprofitable interactions, protects them from malicious actions, and boosts their engagement. A simulation experiment using real-world SIoT datasets and encouraging results show the performance of our trust model {\textcopyright} 2022, International Journal of Emerging Technologies in Learning. All Rights Reserved.}, keywords = {Curricula, e-learning, Internet of things, Learning ecosystems, Machine learning, Massive open online course, Peer recommendation, Security of data, Smart education, Social internet of thing, Trust management system, Trust management systems, Trust models}, doi = {10.3991/ijet.v17i05.27705}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85127011761\&doi=10.3991\%2fijet.v17i05.27705\&partnerID=40\&md5=5d062bc0485ddb7b7d27830779b55330}, author = {Elghomary, K. and Bouzidi, D. and Daoudi, N.} } @conference {Ettahiri2022714, title = {Dynamic Enterprise Architecture planning using case-based reasoning and blockchain}, booktitle = {Procedia Computer Science}, volume = {204}, year = {2022}, note = {cited By 0}, pages = {714-721}, abstract = {Nowadays, Enterprises are aware that the only existing certainty, is a future of great uncertainty (Allen Paulos). Therefore, the potential drivers of change should be detected and the solutions or path to solutions should be prepared in advance. In our work we adopt, the concept of Enterprise architecture, as the tool ensuring the alignment strategy//business//IT. So, to implement any change, we propose using CBR for case-based reasoning to store a set of problems with their solutions, and then to use algorithms of similarity and adaptation to propose the most adapted solution to the problem. Our goal in this paper is to maximize experiences and enrich the knowledge base so that the reasoning mechanism and similarity process is as reliable as possible. Thus, we suggest, a sharing of knowledge bases between allied or contracted companies or subsidiaries. (Example national strategy to be implemented regionally on a case-by-case basis) to ensure reliable sharing, we suggest the use of blockchain technology. {\textcopyright} 2022 Elsevier B.V.. All rights reserved.}, keywords = {Block-chain, Blockchain, Business-IT, Case based reasoning, Casebased reasonings (CBR), Dynamic aspects, EA planning, enterprise architecture, Enterprise architecture planning, Enterprise IS, Knowledge based systems, Memory architecture, Nearest-neighbor algorithms, Uncertainty}, doi = {10.1016/j.procs.2022.08.086}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85142888032\&doi=10.1016\%2fj.procs.2022.08.086\&partnerID=40\&md5=86f11d0e65286d500617f34193f7c127}, author = {Ettahiri, I. and Doumi, K.} } @article {Douch202269264, title = {Edge Computing Technology Enablers: A Systematic Lecture Study}, journal = {IEEE Access}, volume = {10}, year = {2022}, note = {cited By 1}, pages = {69264-69302}, abstract = {With the increasing stringent QoS constraints (e.g., latency, bandwidth, jitter) imposed by novel applications (e.g., e-Health, autonomous vehicles, smart cities, etc.), as well as the rapidly increasing number of connected IoT (Internet of Things) devices, the core network is becoming increasingly congested. To cope with those constraints, Edge Computing (EC) is emerging as an innovative computing paradigm that leverages Cloud computing and brings it closer to the customer. {\textquoteright}EC{\textquoteright} refers to transferring computing power and intelligence from the central Cloud to the network{\textquoteright}s Edge. With that, EC promotes the idea of processing and caching data at the Edge, thus reducing network congestion and latency. This paper presents a detailed, thorough, and well-structured assessment of Edge Computing and its enabling technologies. Initially, we start by defining EC from the ground up, outlining its architectures and evolution from Cloudlets to Multi-Access Edge Computing. Next, we survey recent studies on the main cornerstones of an EC system, including resource management, computation offloading, data management, network management, etc. Besides, we emphasized EC technology enablers, starting with Edge Intelligence, the branch of Artificial Intelligence (AI) that integrates AI models at resource-constrained edge nodes with significant heterogeneity and mobility. Then, moving on to 5G and its empowering technologies, we explored how EC and 5G complement each other. After that, we studied virtualization and containerization as promising hosting runtime for edge applications. Further to that, we delineated a variety of EC use-case scenarios, e.g., smart cities, e-Health, military applications, etc. Finally, we concluded our survey by highlighting the role of EC integration with future concerns regarding green energy and standardization. {\textcopyright} 2013 IEEE.}, keywords = {5g, 5g mobile communication, 5G mobile communication systems, Cloud-computing, computation offloading, Containerization, Containers, Data handling, Edge computing, Edge intelligence, Fog computing, Information management, Internet of things, License, Military applications, Mobile communications, Multi-access edge computing, Multiaccess, Quality of service, Quality-of-service, Surveys}, doi = {10.1109/ACCESS.2022.3183634}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85132750947\&doi=10.1109\%2fACCESS.2022.3183634\&partnerID=40\&md5=88667ef450dd686759983878427de051}, author = {Douch, S. and Abid, M.R. and Zine-Dine, K. and Bouzidi, D. and Benhaddou, D.} } @article {Bourja2022994, title = {End-to-End Car Make and Model Classification using Compound Scaling and Transfer Learning}, journal = {International Journal of Advanced Computer Science and Applications}, volume = {13}, number = {5}, year = {2022}, note = {cited By 0}, pages = {994-1001}, abstract = {Recently, Morocco has started to invest in IoT systems to transform our cities into smart cities that will promote economic growth and make life easier for citizens. One of the most vital addition is intelligent transportation systems which represent the foundation of a smart city. However, the problem often faced in such systems is the recognition of entities, in our case, car and model makes. This paper proposes an approach that identifies makes and models for cars using transfer learning and a workflow that first enhances image quality and quantity by data augmentation and then feeds the newly generated data into a deep learning model with a scaling feature{\textendash}that is, compound scaling. In addition, we developed a web interface using the FLASK API to make real-time predictions. The results obtained were 80\% accuracy, fine-tuning it to an accuracy rate of 90\% on unseen data. Our framework is trained on the commonly used Stanford Cars dataset. {\textcopyright} 2022. International Journal of Advanced Computer Science and Applications. All Rights Reserved.}, keywords = {Application programming interfaces (API), Compound scaling, Deep learning, Economic growths, Economics, End to end, Image enhancement, Intelligent systems, Intelligent transportation systems, Internet of things, IOT, Model classification, Scalings, Smart city, Transfer learning, Vehicle classification}, doi = {10.14569/IJACSA.2022.01305111}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85131410221\&doi=10.14569\%2fIJACSA.2022.01305111\&partnerID=40\&md5=aeb1c5a894ab70005066f491ebf3623c}, author = {Bourja, O. and Maach, A. and Zannouti, Z. and Derrouz, H. and Mekhzoum, H. and Abdelali, H.A. and Thami, R.O.H. and Bourzeix, F.} } @article {Derrouz20225561, title = {End-to-end quantum-inspired method for vehicle classification based on video stream}, journal = {Neural Computing and Applications}, volume = {34}, number = {7}, year = {2022}, note = {cited By 1}, pages = {5561-5576}, abstract = {Intelligent Transportation Systems (ITS) are the most widely used systems for road traffic management. The vehicle type classification (VTC) is a crucial ITS task due to its capability to gather valuable traffic information. However, designing a performant VTC method is challenging due to the considerable intra-class variation of vehicles. This paper presents a new quantum decision-based method for VTC applied to video streaming. This method allows for earlier decision-making by considering a few stream{\textquoteright}s images. Our method is threefold. First, the video stream is acquired and preprocessed following a specific pipeline. Second, we aim to detect and track vehicles. Therefore, we apply a deep learning-based model to detect vehicles, and then a vehicle tracking algorithm is used to track each detected vehicle. Third, we seek to classify the tracked vehicle according to six defined classes. Furthermore, we transform the tracked vehicles according to a pipeline, consisting of the histogram of oriented gradients (HOG), and principal component analysis (PCA) methods. Then, we estimate the vehicles{\textquoteright} probabilities of belonging to each class by training multilayer perceptron (MLP) classifier with the resulting features. To assign a class to a vehicle, we apply a quantum-inspired probability integrator that handles each frame{\textquoteright}s information flow. The unique characteristics of the work we propose, compared to the existing ones, are expressed in the decision-making process, since the former requires a sequence of frames of different sizes, compared to the image-based-decision made by the other methods. Our method outperformed the baseline methods with an accuracy up to 96\%. {\textcopyright} 2021, The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature.}, keywords = {Classification (of information), Decision making, Decisions makings, Deep learning, Early decision, Early decision making, End to end, Intelligent systems, Intelligent transportation systems, Intelligent vehicle highway systems, Pipelines, Principal component analysis, Quantum inspired algorithm, Tracked vehicles, Type classifications, Vehicle classification, Vehicle type classification, Vehicle types, Video streaming}, doi = {10.1007/s00521-021-06718-9}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85122251939\&doi=10.1007\%2fs00521-021-06718-9\&partnerID=40\&md5=8e1d19359f8245b2f82d8558670d4ba1}, author = {Derrouz, H. and Cabri, A. and Ait Abdelali, H. and Oulad Haj Thami, R. and Bourzeix, F. and Rovetta, S. and Masulli, F.} } @article {Daoui2022, title = {Environmental, Climatic, and Parasite Molecular Factors Impacting the Incidence of Cutaneous Leishmaniasis Due to Leishmania tropica in Three Moroccan Foci}, journal = {Microorganisms}, volume = {10}, number = {9}, year = {2022}, note = {cited By 0}, abstract = {{Cutaneous leishmaniasis (CL) occurring due to Leishmania tropica is a public health problem in Morocco. The distribution and incidence of this form of leishmaniasis have increased in an unusual way in the last decade, and the control measures put in place are struggling to slow down the epidemic. This study was designed to assess the impact of climatic and environmental factors on CL in L. tropica foci. The data collected included CL incidence and climatic and environmental factors across three Moroccan foci (Foum Jemaa, Imintanout, and Ouazzane) from 2000 to 2019. Statistical analyses were performed using the linear regression model. An association was found between the occurrence of CL in Imintanout and temperature and humidity (r2 = 0.6076}, doi = {10.3390/microorganisms10091712}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85138700280\&doi=10.3390\%2fmicroorganisms10091712\&partnerID=40\&md5=515be27b75ee2affaf29fb221f2aefe8}, author = {Daoui, O. and Bennaid, H. and Kbaich, M.A. and Mhaidi, I. and Aderdour, N. and Rhinane, H. and Bouhout, S. and Akarid, K. and Lemrani, M.} } @article {Venegas2022, title = {Experimental evaluation of a new mini square channel air-cooled heat exchanger for an absorption chiller}, journal = {International Journal of Heat and Mass Transfer}, volume = {195}, year = {2022}, note = {cited By 0}, abstract = {A mini square channel air-cooled heat exchanger, operating as subcooler in the typical temperature range of absorption cooling systems, is experimentally evaluated. Working fluid flows along 82 square minichannels of 2 mm side and 11 cm length, manufactured on stainless-steel. Hot fluid flows downward through the channels and two cases are evaluated: natural and forced air convection. In the last case, ambient air flows in the upward direction. Two additional operating parameters are modified: the inlet fluid temperature, between 34.8 and 75.4 {\textdegree}C and the fluid mass flow rate, in the range from 5.7 to 29.1 kg/h. Inlet and outlet temperature and pressure for the fluid and ambient temperature are measured, while the air velocity is kept constant at 0.75 m/s. Results obtained for the approach temperature, pressure drops, heat transferred and heat transfer coefficients for the air-cooled subcooler are provided. Correlations are derived to predict the heat transfer coefficient and pressure drop of the subcooler. Integration of the air-cooled subcooler in a single-effect absorption cooling system is evaluated, showing a notable increase in the cooling power mainly in the case of using forced air flow. {\textcopyright} 2022}, keywords = {Absorption cooling systems, Air, Air flow, Air-cooled subcooler, Aircooled heat exchangers (ACHE), Approach temperature, Cooling systems, Drops, Experimental evaluation, Flow of fluids, Heat exchangers, Heat transfer co-efficients, Heat transfer coefficients, Pressure drop, Square channel, Square minichannel, Subcoolers, Thermoelectric equipment}, doi = {10.1016/j.ijheatmasstransfer.2022.123186}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85133787863\&doi=10.1016\%2fj.ijheatmasstransfer.2022.123186\&partnerID=40\&md5=894ec8d1103d7e76e4b4937ddbcefd03}, author = {Venegas, M. and Ghatos, S. and de Vega, M. and Garc{\'\i}a-Hernando, N.} } @conference {ElIdrissi2022, title = {On The Formalization of The TOGAF Content MetaModel Using Ontologies}, booktitle = {2022 International Conference on Intelligent Systems and Computer Vision, ISCV 2022}, year = {2022}, note = {cited By 0}, abstract = {Ontology, when well designed, provides a semantic model that facilitates human interpretation of models and reduces their ambiguity and complexity. A formal-based standards ontology can be processed automatically by computer programs, providing several benefits such as automatic knowledge discovery and inference, inconsistency detection, and interoperability. Several frameworks have been developed to control the complexity of the enterprise architecture. This paper focuses on the TOGAF framework and precisely on its content metamodel. It analyses and discusses the reported approaches to its formalization using ontologies. Additionally, it proposes some possible future directions to improve this work and enhance its adoption by the industrial world and academic communities. {\textcopyright} 2022 IEEE.}, keywords = {Automatic knowledge discoveries, enterprise architecture, formalisation, Inconsistency detection, Interpretation of models, Meta model, Ontology, Ontology{\textquoteright}s, Semantic modelling, Semantic Web, Semantic-Web, Togaf framework}, doi = {10.1109/ISCV54655.2022.9806063}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85134300854\&doi=10.1109\%2fISCV54655.2022.9806063\&partnerID=40\&md5=6066972d0de16301bf7195b5ec177385}, author = {El Idrissi, B. and Tetou, C. and Doumi, K.} } @article {Gong20222761, title = {Intelligent Reflecting Surface Aided Secure Communications for NOMA Networks}, journal = {IEEE Transactions on Vehicular Technology}, volume = {71}, number = {3}, year = {2022}, note = {cited By 2}, pages = {2761-2773}, abstract = {Intelligent reflecting surface (IRS) is deemed a promising technique for future wireless and mobile technologies due to its ability to reconfigure the radio propagation environment. In this paper, we analyze the physical layer security (PLS) of a downlink non-orthogonal multiple access (NOMA) network through an IRS intended for assisting the wireless transmission, taking into account the external and internal eavesdropping scenarios. Considering the hardware limitations, a 1-bit coding scheme is utilized to investigate the secrecy performance of the IRS-aided NOMA (IRS-NOMA) network. Exact and asymptotic expressions in terms of the secrecy outage probability (SOP) and the effective secrecy throughput (EST) are presented, which are in consideration of the imperfect successive interference cancellation (ipSIC) and perfect SIC (pSIC). Based on the analytical results, the secrecy diversity orders are related to the number of reflecting elements and EST ceilings are observed in the high SNR regime. Monte Carlo simulations are presented to corroborate the correctness of the analyses and illustrate that the IRS-NOMA scheme is superior in the secrecy outage performance to the IRS-aided orthogonal multiple access scheme. In addition, the SOP performance enhancement through the increased number of reflecting elements and the improvement of EST through proper target secrecy rate are also evidenced by the simulations. {\textcopyright} 1967-2012 IEEE.}, keywords = {Communication system security, Imperfect successive interference cancelation, Intelligent reflecting surface, Intelligent systems, Monte Carlo methods, Multiple access, Network layers, Network security, Non-orthogonal, Non-orthogonal multiple access, Physical layer security, Radio waves, Reflecting surface, Security, Security systems, Signal to noise ratio, Silicon carbide, Successive interference cancellations, Wireless communications}, doi = {10.1109/TVT.2021.3129075}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85120062177\&doi=10.1109\%2fTVT.2021.3129075\&partnerID=40\&md5=162cfe3aedcb6d973b10e9471ffd8b94}, author = {Gong, C. and Yue, X. and Wang, X. and Dai, X. and Zou, R. and Essaaidi, M.} } @conference {Ettahiri2022553, title = {A New Approach for a Dynamic Enterprise Architecture Model using Ontology and Case-based Reasoning}, booktitle = {International Conference on Enterprise Information Systems, ICEIS - Proceedings}, volume = {2}, year = {2022}, note = {cited By 0}, pages = {553-560}, abstract = {To meet the demands of a dynamic and constantly changing environment, (DRP) Disaster Recovery Plans, (BCP) Business Continuity Plans, change management, agile activities, and best practice guides are developed with the ultimate objective of providing enterprises with the tools to deal with change rapidly and flexibly. Starting from the premise that Enterprise architecture remains the instrument ensuring this alignment Strategy//business//IT, dynamic aspects should be present in the EA representation but also should be perceived in the reaction of enterprises managing the change. On the other hand, ontologies offer a formal and a shared representation of the domain studied; EA in our case. Once formalized, the representation became computable so, all the EA reactions became dynamic towards the triggers of change. To benefit from the previous experiences, Case-based reasoning is introduced in our approach allowing a problem resolution via similarity and adaptation of knowledge to the current context. Copyright {\textcopyright} 2022 by SCITEPRESS {\textendash} Science and Technology Publications, Lda. All rights reserved.}, keywords = {Business continuity plans, Case based reasoning, Casebased reasonings (CBR), Changing environment, Disaster recovery plan, enterprise architecture, Enterprise architecture modeling, Enterprise ontology, Memory architecture, New approaches, Ontology, Ontology{\textquoteright}s, Ontology-based}, doi = {10.5220/0011079400003179}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85140894102\&doi=10.5220\%2f0011079400003179\&partnerID=40\&md5=2fb612722e5a4402ee65bad0c47bf383}, author = {Ettahiri, I. and Doumi, K. and Falih, N.} } @article {Daosabah2022163, title = {PDDL Planning and Ontologies, a Tool for Automatic Composition of Intentional-Contextual Web Services}, journal = {EAI/Springer Innovations in Communication and Computing}, year = {2022}, note = {cited By 0}, pages = {163-190}, abstract = {Among the motivations of the related work on semantic Web services is to find optimal solutions for the composition of Web services in an automatic and adaptive way, whose main goal is to solve a given problem. To this end, several works have been implemented to provide solutions for service composition, and among these solutions, we find the use of artificial intelligence (AI) planning systems. The idea introduced in this paper is based on the presentation of our service composition approach guided by the user-intention and the context awareness, in addition to a Context-Intentional Service Composition Architecture (CISCA) for implementing this approach. In the same way, we will present an AI planning technique to solve a composition problem, namely, the Planning Domain Description Language (PDDL) and the basis for reciprocal transformation with the Web Ontology Language (OWL). {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, keywords = {Artificial intelligence planning, Automatic composition, Birds, Context- awareness, Intention, Ontology, Ontology{\textquoteright}s, OWL-S, Planning domain description languages, Quality of service, Related works, Semantic Web, Services composition, Web services, Webs services, Websites}, doi = {10.1007/978-3-030-77185-0_11}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85125907756\&doi=10.1007\%2f978-3-030-77185-0_11\&partnerID=40\&md5=16113b5121fd2ffdba8c9fed915dd4e8}, author = {Daosabah, A. and Guermah, H. and Nassar, M.} } @article {Naji2022832, title = {Psychological Behavior Prediction through Sentiment Analysis Technics: Transformers and ML Approach}, journal = {Journal of Computer Science}, volume = {18}, number = {9}, year = {2022}, note = {cited By 0}, pages = {832-840}, abstract = {In the era of the COVID-19 epidemic, governments have imposed nationwide lockdowns, which make a huge change to people{\textquoteright}s daily routines. This last impacts indirectly the well-being of people{\textquoteright}s mental health. And due to social media, many conversations about these phenomena occur online, especially those related to people{\textquoteright}s emotions. Which brought challenges and opportunities for sentiment analysis researchers. In this article, we are interested in extracting correlations between this epidemic and its psychological effects by analyzing users{\textquoteright} tweets through common Deep Learning and Machine Learning approaches used for text classification. This last goal is a crucial step to fulfill the main objective of our research: Developing an intelligent system that provides recommendations such as positive support and early alert to help people in case of specific needs particularly challenging mental states {\textcopyright} 2022 Maryame Naji, Najima Daoudi and Rachida Ajhoun}, doi = {10.3844/jcssp.2022.832.840}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85138207279\&doi=10.3844\%2fjcssp.2022.832.840\&partnerID=40\&md5=4450c45ecbc26b88d284f6d19b57a9bd}, author = {Naji, M. and Daoudi, N. and Ajhoun, R.} } @article {Boumait2022251, title = {Survey IOT Systems Security Based on Machine Learning}, journal = {Lecture Notes in Networks and Systems}, volume = {455 LNNS}, year = {2022}, note = {cited By 0}, pages = {251-258}, abstract = {IoT technologies are essential for creating a variety of smart applications in the real world that will improve people{\textquoteright}s lives. The focus of this study is on the security of IoT systems using machine learning. It{\textquoteright}s about a thorough examination of the security challenges and threats that applications face. It{\textquoteright}s a survey of machine learning techniques that can be utilized to boost IoT system confidence and security. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-02447-4_26}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130368202\&doi=10.1007\%2f978-3-031-02447-4_26\&partnerID=40\&md5=7e46544676b219af8cfdbafd0edc735a}, author = {Boumait, E.M. and Habbani, A. and Souidi, M. and Didi, Z.} } @conference {Daoudi2021759, title = {Complexity and Adaptive Enterprise Architecture}, booktitle = {International Conference on Enterprise Information Systems, ICEIS - Proceedings}, volume = {2}, year = {2021}, note = {cited By 1}, pages = {759-767}, abstract = {In the current VUCA (Volatility, uncertainty, complexity and ambiguity) environment, enterprises are facing constant threats and opportunities due to internal and external factors. Those factors can impact various parts of the enterprise in the form of changes. Thus, Adaptive Enterprise Architecture (EA) is leveraged to assist the continuous adaptation to the evolving transformation. On the other hand, the complexity has been identified as one of the major challenges of the discipline of Enterprise Architecture. Moreover, one of the criteria of Adaptive EA is the ability to monitor and control the complexity of changes. Consequently, in this paper, we suggest a conceptualization of EA complexity measurement drilled down into factors and indicators. First, we begin with a brief summary of the criteria that we consider compulsory for Adaptive Enterprise Architecture and we give an overview of the model that we worked on in previous work. Then we investigate related work about complexity in a broader view. Finally, we describe our approach of assessment of complexity based on the proposed indicators. Copyright {\textcopyright} 2021 by SCITEPRESS - Science and Technology Publications, Lda.}, keywords = {{\textquoteright}current, Adaptation, Adaptive enterprise, Complexity, Dynamic environments, enterprise architecture, Enterprise IS, Information systems, Information use, Internal and external factors, Monitor and control, Volatility uncertainties}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135024780\&partnerID=40\&md5=2aaf626491ca37f943bcb904a81c8e4f}, author = {Daoudi, W. and Doumi, K. and Kjiri, L.} } @conference {Choukri2021, title = {Context aware Hidden Markov Model for Intention process mining}, booktitle = {5th International Conference on Intelligent Computing in Data Sciences, ICDS 2021}, year = {2021}, note = {cited By 0}, abstract = {Nowadays, the omnipresence of digital devices and solutions in daily life made the digital footprints of individuals and the traces of their activities widely available. Smart devices generate a tremendous amount of data that and enables tracking their users{\textquoteright} activity. Extensive research has been conducted to produce generic process models based on the analysis of user{\textquoteright}s activity recorded during the enactment of operational processes. Unfortunately, these approaches considered only the relation between the observed activities and their sequences to infer the underlying process. Thus, ignoring the goal conditioning the user{\textquoteright}s behavior when triggering the actual process. Nevertheless, the same activity traces could serve to unhide the intention behind each process. This article will focus on presenting our approach to Contextual intention mining using Hidden Markov Model (HMM). This approach explores the close relationships between intention and context to construct the process model while ensuring consistency between observed context and actual intentions. {\textcopyright} 2021 IEEE.}, keywords = {Behavioral research, Context, Data mining, Digital devices, Event logs, Goal mining, Goal models, Hidden Markov models, Information systems, Information use, Intention-oriented process modeling, Intentional process modeling, Machine learning, Markov modeling, Oriented process, Process Discovery, Process engineering, Process mining, Process recommendation, Process-aware information systems, Process-models, Supervised learning, Unsupervised learning, User profile}, doi = {10.1109/ICDS53782.2021.9626765}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85123483088\&doi=10.1109\%2fICDS53782.2021.9626765\&partnerID=40\&md5=d61fab7bfc96ede4658a8984da68ef3f}, author = {Choukri, I. and Guermah, H. and Daosabah, A. and Nassar, M.} } @article {Daosabah2021324, title = {Dynamic composition of services: an approach driven by the user{\textquoteright}s intention and context}, journal = {International Journal of Web Engineering and Technology}, volume = {16}, number = {4}, year = {2021}, note = {cited By 1}, pages = {324-354}, abstract = {With the continuous development of services in ubiquitous systems, service orientation is becoming increasingly important in its structuring. As a result, the design and the development of applications are gradually migrating from a traditional model to a service-oriented model. In this regard, we propose through this work an approach for web service (WS) composition guided by the context and the intention, by which we suggest an architecture for service composition that reduces the complexity of the generated artificial intelligence (AI) planning problem and to ensure the interoperability of any system independently of the domain planners. The general idea of this approach is to conceive an intentional-contextual metamodel that will be transformed into an OWL model using OMG standards, which will be used to map the WS composition problem into AI planning problems. This article describes the architectural, conceptual, and strategic aspects to deal with the WS composition problem. {\textcopyright} 2021 Inderscience Enterprises Ltd.}, keywords = {Artificial intelligence, Birds, Context- awareness, Intention, interoperability, Object management, Object management group, OMG, Ontology{\textquoteright}s, OWL-S, Quality of service, Services composition, Spring cloud framework, Web service composition, Web services}, doi = {10.1504/IJWET.2021.122768}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85124011575\&doi=10.1504\%2fIJWET.2021.122768\&partnerID=40\&md5=f9387d7a26ae641892da27f98947542d}, author = {Daosabah, A. and Guermah, H. and Nassar, M.} } @article {L{\'o}pez-Jim{\'e}nez2021, title = {Effects of gamification on the benefits of student response systems in learning of human anatomy: Three experimental studies}, journal = {International Journal of Environmental Research and Public Health}, volume = {18}, number = {24}, year = {2021}, note = {cited By 2}, abstract = {{This paper presents three experiments to assess the impact of gamifying an audience response system on the perceptions and educational performance of students. An audience response system called SIDRA (Immediate Audience Response System in Spanish) and two audience response systems with gamification features, R-G-SIDRA (gamified SIDRA with ranking) and RB-G-SIDRA (gamified SIDRA with ranking and badges), were used in a General and Descriptive Human Anatomy course. Students participated in an empirical study. In the academic year 2019{\textendash}2020, a total of 90 students used RB-G-SIDRA, 90 students employed R-G-SIDRA in the academic year 2018{\textendash}2019, and 92 students used SIDRA in the academic year 2017{\textendash}2018. Statistically significant differences were found between final exam grades obtained by using RB-G-SIDRA and SIDRA}, keywords = {academic achievement, academic performance, anatomy, experiment, Gamification, human, Humans, learning, motivation, perception, student, Students}, doi = {10.3390/ijerph182413210}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85121118668\&doi=10.3390\%2fijerph182413210\&partnerID=40\&md5=29b9263d7b8db439936394c1f2826a10}, author = {L{\'o}pez-Jim{\'e}nez, J.J. and Fernandez-Aleman, J.L. and Garc{\'\i}a-Bern{\'a}, J.A. and Gonz{\'a}lez, L.L. and Sequeros, O.G. and Ros, J.N. and Carrillo de Gea, J.M. and Idri, A. and Toval, A.} } @article {Alaoui2021, title = {Fall detection of elderly people using the manifold of positive semidefinite matrices}, journal = {Journal of Imaging}, volume = {7}, number = {7}, year = {2021}, note = {cited By 3}, abstract = {Falls are one of the most critical health care risks for elderly people, being, in some adverse circumstances, an indirect cause of death. Furthermore, demographic forecasts for the future show a growing elderly population worldwide. In this context, models for automatic fall detection and prediction are of paramount relevance, especially AI applications that use ambient, sensors or computer vision. In this paper, we present an approach for fall detection using computer vision techniques. Video sequences of a person in a closed environment are used as inputs to our algorithm. In our approach, we first apply the V2V-PoseNet model to detect 2D body skeleton in every frame. Specifically, our approach involves four steps: (1) the body skeleton is detected by V2V-PoseNet in each frame; (2) joints of skeleton are first mapped into the Riemannian manifold of positive semidefinite matrices of fixed-rank 2 to build time-parameterized trajectories; (3) a temporal warping is performed on the trajectories, providing a (dis-)similarity measure between them; (4) finally, a pairwise proximity function SVM is used to classify them into fall or non-fall, incorporating the (dis-)similarity measure into the kernel function. We evaluated our approach on two publicly available datasets URFD and Charfi. The results of the proposed approach are competitive with respect to state-of-the-art methods, while only involving 2D body skeletons. {\textcopyright} 2021 by the authors. Licensee MDPI, Basel, Switzerland.}, keywords = {Causes of death, Computer vision, Dynamic time warping, Elderly people, Elderly populations, Fall detection, Gram matrices, Health care, Health risks, Healthcare, Musculoskeletal system, Positive semidefinite matrices, Riemann Manifold, Similarity measure, Support vector machines}, doi = {10.3390/jimaging7070109}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85111011519\&doi=10.3390\%2fjimaging7070109\&partnerID=40\&md5=fe18155309e5ff7e5a54dff191d8c05e}, author = {Alaoui, A.Y. and Tabii, Y. and Thami, R.O.H. and Daoudi, M. and Berretti, S. and Pala, P.} } @conference {Daosabah2021, title = {Integrating Context and Intention for Optimal Semantic Web Service Composition Using AI Planning}, booktitle = {Proceedings - 4th International Conference on Advanced Communication Technologies and Networking, CommNet 2021}, year = {2021}, note = {cited By 0}, abstract = {This paper deals with an approach for the dynamic composition of web service (WS) based on the user{\textquoteright}s intention and context. Our idea to implement this approach is based on the combination of artificial intelligence (AI) planning techniques and the semantic aspect describing the web service that will be composed. To this end, we will transform the web service composition problem into an AI planning problem. First, conversion of web service semantically described in OWL and OWL-S to an alternative problem and domain description specified in the planning domain description language (PDDL) is made. Then, a planner (AI Planner) using the Genetic Algorithm (GA) features will be invoked, by adapting the PDDL planning language actions to the GA rules, in order to generate the most optimal composition plan (sequence of PDDL actions), which solves the conceived service composition problem, having a goal to achieve (the intention) according to the problem domain description (context). {\textcopyright} 2021 IEEE.}, keywords = {And OWL, Artificial intelligence, Artificial intelligence planning, Birds, Composition problem, Domain description, Genetic algorithms, Ontology{\textquoteright}s, OWL-S, Planning domain description languages, Quality of service, Semantic Web, Semantic web service compositions, Services composition, Web services, Webs services, Websites}, doi = {10.1109/CommNet52204.2021.9641912}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85123984789\&doi=10.1109\%2fCommNet52204.2021.9641912\&partnerID=40\&md5=582b92b4fd74d9de0d27f804898dee05}, author = {Daosabah, A. and Guermah, H. and Choukri, I. and Nassar, M.} } @article {Bariah20215129, title = {Large intelligent surface-assisted nonorthogonal multiple access for 6G networks: Performance analysis}, journal = {IEEE Internet of Things Journal}, volume = {8}, number = {7}, year = {2021}, note = {cited By 17}, pages = {5129-5140}, abstract = {Large intelligent surface (LIS) has recently emerged as a potential enabling technology for 6G networks, offering extended coverage and enhanced energy and spectral efficiency. In this work, motivated by its promising potentials, we investigate the error rate performance of LIS-assisted nonorthogonal multiple access (NOMA) networks. Specifically, we consider a downlink NOMA system, in which data transmission between a base station (BS) and L NOMA users is assisted by an LIS comprising M reflective elements (REs). First, we derive the probability density function (PDF) of the end-to-end wireless fading channels between the BS and NOMA users. Then, by leveraging the obtained results, we derive an approximate expression for the pairwise error probability (PEP) of NOMA users under the assumption of imperfect successive interference cancellation. Furthermore, accurate expressions for the PEP for M = 1 and large M values ( M > 10 ) are presented in closed-form. To gain further insights into the system performance, an asymptotic expression for PEP in high signal-to-noise ratio regime, asymptotic diversity order, and tight union bound on the bit error rate are provided. Finally, numerical and simulation results are presented to validate the derived mathematical results. {\textcopyright} 2014 IEEE.}, keywords = {Approximate expressions, Asymptotic diversity order, Asymptotic expressions, Bit error rate, Block codes, Error rate performance, Errors, Fading channels, High signal-to-noise ratio, Mobile telecommunication systems, Pair-wise error probability, Probability density function, Queueing networks, Signal to noise ratio, Successive interference cancellations, Trellis codes, Wireless fading channels}, doi = {10.1109/JIOT.2021.3057416}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85100835822\&doi=10.1109\%2fJIOT.2021.3057416\&partnerID=40\&md5=ea0b361b970ee551c343f99d24bae108}, author = {Bariah, L. and Muhaidat, S. and Sofotasios, P.C. and Bouanani, F.E. and Dobre, O.A. and Hamouda, W.} } @article {Hamlaoui20211, title = {Model-driven Approach To Align Heterogeneous Models Of A Complex System}, journal = {Journal of Object Technology}, volume = {20}, number = {2}, year = {2021}, note = {cited By 0}, pages = {1-24}, abstract = {To understand and manipulate a complex system, it is necessary to apply the separation of concerns and produce separate models, called viewpoints models. These models represent views on the system that correspond to distinct business domains. They are generally heterogeneous, i.e. conform to different meta-models. The management of the system{\textquoteright}s global model (a complete view of the system) requires the identification of the existing correspondences among the viewpoints models. However, in practice these correspondences are either incompletely identified or not sufficiently formalized to be maintained when models evolve. This restricts their use and does not allow their full exploitation for managing the global model. To fix this issue, we propose AHM (Alignment of Heterogeneous Models), an approach to organize the source models as a network of models through a virtual global model called M1C (Model of correspondences between models) that conforms to a Meta-Model of Correspondences (MMC). AHM proposes also a process, allowing for both the creation of the global model, and its consistency control. Partial automation of this process is done through a refining mechanism supported by a semantics expression described in a Domain Specific Language (DSL). The application of AHM is illustrated by the example of a conference management system. A prototype of a tool called Heterogeneous Matching and Consistency management Suite (HMCS) has been developed to support this approach. {\textcopyright} 2021. All Rights Reserved.}, doi = {10.5381/JOT.2021.20.2.A2}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85111507313\&doi=10.5381\%2fJOT.2021.20.2.A2\&partnerID=40\&md5=606f7cf84d332b83818bec57d20a3d0b}, author = {Hamlaoui, M.E. and Ebersold, S. and Bennani, S. and Anwar, A. and Dkaki, T. and Nassar, M. and Coulette, B.} } @article {Baddi2021373, title = {MSDN-GKM: Software Defined Networks Based Solution for Multicast Transmission with Group Key Management}, journal = {Studies in Computational Intelligence}, volume = {919}, year = {2021}, note = {cited By 0}, pages = {373-396}, abstract = {Multicast communication is an important requirement to support many types of applications, such as, IPTV, videoconferencing, group games. Recently this multicast applications type emerges fast, in one side more application provider proposed many applications, in other side Internet research community has proposed many different multicast routing protocols to support efficient multicast application. Therefore, the necessity of secure mechanism to provide the confidentiality and privacy of communications are more and more insistent. In current standardized IP multicast architecture, any host can join a multicast group, as source or receiver, without authentication, because no host identification information is maintained by routers, this situation leads clearly to many security risks issues. For security enhancement in multicast communication, in this paper an SDN based multicast solution with Group Key Management (GKM) approach was introduced. Our proposal solution, MSDN-GKM, includes many SDN modules to support multicast functions, group key generation, Group key exchange, storage, use, and keys replacement if any multicast group membership occurs. To prove the efficiency of our proposal solution a prototype is implemented in our SDN platform. The test-bed result proves that our proposal solution is greater to the traditional IP multicast proposed in the literature, which is reflected in two aspects: firstly, multicast metrics performance in terms of end-to-end delay, tree construction delay and delay variation. Secondly, the multicast group key management performance in terms of storage overhead and time processing. {\textcopyright} 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-030-57024-8_17}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097877454\&doi=10.1007\%2f978-3-030-57024-8_17\&partnerID=40\&md5=90fd04903bd123b46bd5571b000609a6}, author = {Baddi, Y. and Anass, S. and Zkik, K. and Maleh, Y. and Mohammed, B. and El Kettani Mohamed Dafir, E.-C.} } @article {Abdelali2021164282, title = {Multiple hypothesis detection and tracking using deep learning for video traffic surveillance}, journal = {IEEE Access}, volume = {9}, year = {2021}, note = {cited By 3}, pages = {164282-164291}, abstract = {Moroccan Intelligent Transport System is the first Moroccan system that uses the latest advances in computer vision, machine learning and deep learning techniques to manage Moroccan traffic and road violations.In this paper, we propose a fully automatic approach to Multiple Hypothesis Detection and Tracking (MHDT) for video traffic surveillance.The proposed framework combines Kalman filter and data association-based tracking methods using YOLO detection approach, to robustly track vehicles in complex traffic surveillance scenes.Experimental results demonstrate that the proposed approach is robust to detect and track the trajectory of the vehicles in different situations such as scale variation, stopped vehicles, rotation, varying illumination and occlusion.The proposed approach shows a competitive results (detection: 94.10\% accuracy, tracking: 92.50\% accuracy) compared to the state-of-the-art approaches. {\textcopyright} 2021 Institute of Electrical and Electronics Engineers Inc.. All rights reserved.}, keywords = {Bandpass filters, Computer vision, Convolutional neural network, Data association, Deep learning, Deep neural networks, Detection, Intelligent systems, Intelligent vehicle highway systems, Kalman filters, Monitoring, Multiple hypothesis tracking, Object detection, Occlusion handling, Predictive models, Security systems, Target tracking, Targets tracking, Traffic control, Traffic surveillance, Vehicles, Video sequences}, doi = {10.1109/ACCESS.2021.3133529}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85121370415\&doi=10.1109\%2fACCESS.2021.3133529\&partnerID=40\&md5=84b2a2537c16a7db00901d13c8b6eb5c}, author = {Abdelali, H.A.I.T. and Derrouz, H. and Zennayi, Y. and Thami, R.O.H. and Bourzeix, F.} } @article {Dari2021112, title = {A novel approach for COVID-19 outbreak spread monitoring and control using smart grid technology}, journal = {International Journal of Security and Networks}, volume = {16}, number = {2}, year = {2021}, note = {cited By 0}, pages = {112-116}, abstract = {The novel coronavirus SARS-COV-2 was discovered in November 2019, in China. On March, 2020, the WHO announced that COVID-19 could be characterised as a pandemic (WHO, 2020a). Then, it was rapidly spread from China to others countries. Coronavirus disease, COVID-19, is a viral infection that generates a severe acute respiratory syndrome with serious clinical symptoms given by such as fever, dry cough, and pneumonia (Kucharski et al., 2020). In addition, this virus is so widespread among people and it is difficult to control. To fight the rapid spread of new diseases like COVID-19, the support of technologies such as AI, big data, and IoT has proved to be very useful and provides better pandemic spread control tools. In this paper, we propose to leverage smart grid technology to detect COVID-19 cases clusters, to accelerate pandemic remote monitoring, and to predict probable virus future spread by collecting and analysing retrieved data. Copyright {\textcopyright} 2021 Inderscience Enterprises Ltd.}, keywords = {Clinical symptoms, Computer viruses, Control tools, Coronaviruses, Disease control, Diseases, Electric power transmission networks, Monitoring and control, Remote monitoring, Severe acute respiratory syndrome, Smart Grid technologies, Smart power grids, Viral infections, Viruses}, doi = {10.1504/IJSN.2021.116776}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85112096964\&doi=10.1504\%2fIJSN.2021.116776\&partnerID=40\&md5=ce1f09dff4843caf87477ad80438183b}, author = {Dari, E.Y. and Bendahmane, A. and Essaaidi, M.} } @conference {Btissam202116, title = {Partially Connected Neural Networks for an Efficient Classification of Traffic Signs}, booktitle = {Conference of Open Innovation Association, FRUCT}, volume = {2021-October}, year = {2021}, note = {cited By 0}, pages = {16-23}, abstract = {Road signs recognition plays an important role in improving traffic safety for both drivers and pedestrians. To ensure this recognition, many approaches are proposed by researchers. To overcome the limitations of the existing methods, Deep Learning approaches are used. This type of approaches achieves high recognition performances, and is also less sensitive to real world adverse conditions. However, they are in contrast very computationally expensive due essentially to three main factors, which are more precisely, the size of input images, the type of used layers, and the number of used parameters. From this perspective, the objective of this work is to adopt an approach that aims to reduce this computational complexity, in order to ensure a fast and efficient classification of traffic signs, especially for low and limited resources environments. The adopted approach reaches good classification accuracies, and that by using BTSCD dataset. {\textcopyright} 2021 FRUCT.}, keywords = {Classification (of information), Classification of traffic signs, Condition, Deep learning, Input image, Learning approach, Partially connected neural network, Pedestrian safety, Performance, Real-world, Resources environments, Road signs recognition, Traffic safety, Traffic signs}, doi = {10.23919/FRUCT53335.2021.9599985}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85122993528\&doi=10.23919\%2fFRUCT53335.2021.9599985\&partnerID=40\&md5=7d1a5ba2a41b8715c681e1ec9bd10687}, author = {Btissam, B. and Driss, B.} } @article {Badarneh2021926, title = {Performance Analysis of FSO Communications over F Turbulence Channels with Pointing Errors}, journal = {IEEE Communications Letters}, volume = {25}, number = {3}, year = {2021}, note = {cited By 21}, pages = {926-930}, abstract = {Recently, the Fisher-Snedecor F distribution was proposed to model the turbulence in free-space optical (FSO) communications. However, the existing model does not consider pointing error impairment. To fill this gap, in this letter, we derive novel closed-form expressions for the probability density function (PDF) and cumulative distribution function (CDF) for irradiance fluctuations in the presence of pointing error impairments. Subsequently, the PDF and CDF of the received signal-to-noise ratio (SNR) are derived and employed to obtain novel closed-form expressions for the outage probability, average bit error rate, and average ergodic capacity. To gain more insight into the impact of system and turbulence channel parameters, simple and accurate asymptotic expressions are further derived. Our analytical results are supported by Monte-Carlo simulations to validate the analysis. {\textcopyright} 1997-2012 IEEE.}, keywords = {Asymptotic expressions, Average bit-error rates, Average ergodic capacities, Bit error rate, Closed-form expression, Cumulative distribution function, Distribution functions, Errors, Free Space Optical communication, Monte Carlo methods, Optical communication, Performance analysis, Probability density function, Probability density function (PDF), Signal to noise ratio, Turbulence}, doi = {10.1109/LCOMM.2020.3042489}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097943147\&doi=10.1109\%2fLCOMM.2020.3042489\&partnerID=40\&md5=d5175f79c64955ba088a76dbd3e88c91}, author = {Badarneh, O.S. and Derbas, R. and Almehmadi, F.S. and El Bouanani, F. and Muhaidat, S.} } @article {Bouanani2021793, title = {Performance Analysis of Intelligent Reflecting Surface Aided Wireless Networks with Wireless Power Transfer}, journal = {IEEE Communications Letters}, volume = {25}, number = {3}, year = {2021}, note = {cited By 9}, pages = {793-797}, abstract = {The low efficiency of wireless power transfer (WPT) poses a key challenge for energy-constrained wireless networks. To address this issue, in this letter, the integration of intelligent reflecting surface (IRS) into a WPT network is investigated. To this end, an accurate approximation for the probability density function of the end-to-end cascaded fading channel is presented. By leveraging the derived result, accurate closed-form expressions of the outage probability (OP) and average symbol error probability (ASER) are derived for the proposed IRS-aided WPT system. To gain further insight into the system performance, asymptotic closed-form expressions for the ASER and OP are further derived and interesting observations are reported. Particularly, our asymptotic analysis reveals that the achievable diversity in the underlying scenario is independent of the reflective elements of the IRS. The analytical derivations, corroborated by simulation results, demonstrate that IRSs can be promising candidates for the realization of a highly efficient power transfer enabled wireless network. {\textcopyright} 1997-2012 IEEE.}, keywords = {Asymptotic analysis, Cascaded fading channels, Closed-form expression, Energy transfer, Energy-constrained, Fading channels, Inductive power transmission, Outage probability, Performance analysis, Probability, Probability density function, Reflecting surface, Symbol error probabilities (SEP), wireless networks, Wireless power transfer (WPT)}, doi = {10.1109/LCOMM.2020.3036534}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85102847338\&doi=10.1109\%2fLCOMM.2020.3036534\&partnerID=40\&md5=8e9607afdd0ae2ed054c25ab61820b03}, author = {Bouanani, F.E. and Muhaidat, S. and Sofotasios, P.C. and Dobre, O.A. and Badarneh, O.S.} } @article {Illi202190, title = {Physical Layer Security of a Dual-Hop Regenerative Mixed RF/UOW System}, journal = {IEEE Transactions on Sustainable Computing}, volume = {6}, number = {1}, year = {2021}, note = {cited By 15}, pages = {90-104}, abstract = {Ensuring physical layer security is a crucial task in conventional and emerging communication systems, which are typically characterized by stringent quality of service and security requirements. This also accounts for wireless technologies in the context of the Internet of Things paradigm, which are expected to exhibit considerably increased computational complexity. Based on this, the present contribution investigates the secrecy outage performance of a dual-hop decode-and-forward (DF) mixed radio-frequency/underwater optical wireless communication (RF/UOWC) system. Such wireless network configurations are particularly useful in efficient and demanding scenarios, such as military communications. Therefore, our analysis considers one single-antenna source node (SS) communicating with one legitimate destination node (DD) via a DF relay node (RR) equipped with multiple antennas for reception. Particularly, the relay receives the incoming signal from SS via an RF link, applies selection-combining (SC) technique, fully decodes it, re-encodes it, and then forwards it to the destination via a UOWC link. The communication is performed under the eavesdropper{\textquoteright}s attempt to intercept the S-RS-R hop (RF side). In this context, a closed-form expression for the secrecy outage probability is derived along with a thorough asymptotic analysis in the high SNR regime, based on which the achievable diversity order is provided. The offered results provide useful insights on the impact of some key system and channel parameters on the secrecy outage performance, such as the number of eavesdroppers, the number of relay antennas, fading severity parameters of RF links, and water turbulence severity of the UOWC link. The conducted analysis shows that the secrecy outage probability is dominated only by the RR-DD link in the high SNR regime, regardless of the SS-RR parameters, such as the number of relay antennas and the average SNR at the relay branches. The offered analytic results are corroborated with respective results from computer simulations. Since these parameters are closely related with the computational complexity at the involved terminals, the offered insights are useful for the design and computationally sustainable operation of such systems. {\textcopyright} 2016 IEEE.}, keywords = {Antenna sources, Antennas, Asymptotic analysis, Complex networks, Computational complexity, Cooperative communication, Decoding, Dual-hop relaying, Fading channels, Military communications, Network layers, Optical communication, Performances analysis, Physical layer security, Probability, Quality of service, Secrecy outage probabilities, Secrecy outages, Selection combining, Signal to noise ratio, Single antenna, Source nodes, Underwater optical wireless communication}, doi = {10.1109/TSUSC.2019.2906545}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85098369882\&doi=10.1109\%2fTSUSC.2019.2906545\&partnerID=40\&md5=3021a37f73c102416a7e51dd6c971930}, author = {Illi, E. and Bouanani, F.E. and Da Costa, D.B. and Sofotasios, P.C. and Ayoub, F. and Mezher, K. and Muhaidat, S.} } @article {Bourja2021915, title = {Real Time Vehicle Detection, Tracking, and Inter-vehicle Distance Estimation based on Stereovision and Deep Learning using Yolov3}, journal = {International Journal of Advanced Computer Science and Applications}, volume = {12}, number = {8}, year = {2021}, note = {cited By 1}, pages = {915-923}, abstract = {Abstract{\textemdash}In this paper, we propose a robust real-time vehicle tracking and inter-vehicle distance estimation algorithm based on stereovision. Traffic images are captured by a stereoscopic system installed on the road, and then we detect moving vehicles with the YOLO V3 Deep Neural Network algorithm. Thus, the real-time video goes through an algorithm for stereoscopy-based measurement in order to estimate distance between detected vehicles. However, detecting the real-time objects have always been a challenging task because of occlusion, scale, illumination etc. Thus, many convolutional neural network models based on object detection were developed in recent years. But they cannot be used for real-time object analysis because of slow speed of recognition. The model which is performing excellent currently is the unified object detection model which is You Only Look Once (YOLO). But in our experiment, we have found that despite of having a very good detection precision, YOLO still has some limitations. YOLO processes every image separately even in a continuous video or frames. Because of this much important identification can be lost. So, after the vehicle detection and tracking, inter-vehicle distance estimation is done. {\textcopyright} 2021. International Journal of Advanced Computer Science and Applications. All Rights Reserved.}, keywords = {Bounding-box, Convolution, Convolutional neural network, Convolutional neural networks, Deep neural networks, Distance estimation, Estimation algorithm, Object detection, Object recognition, Real- time, Stereo image processing, Stereoimages, Stereovision, Tracking, Vehicles, Vehicles detection, YOLOv3 deep neural network}, doi = {10.14569/IJACSA.2021.01208101}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85118990281\&doi=10.14569\%2fIJACSA.2021.01208101\&partnerID=40\&md5=225926d9445a4fed55a125a55e519b2f}, author = {Bourja, O. and Derrouz, H. and Abdelali, H.A. and Maach, A. and Thami, R.O.H. and Bourzeix, F.} } @article {Kishore20217232, title = {Sum Rate Analysis of Generalized Space Shift Keying-Aided MIMO-NOMA Systems}, journal = {IEEE Transactions on Vehicular Technology}, volume = {70}, number = {7}, year = {2021}, note = {cited By 1}, pages = {7232-7236}, abstract = {We investigate the sum rate performance of a generalized space shift keying (GSSK)-aided, non-orthogonal multiple access (NOMA) network. In particular, we consider a multiple-input multiple-output (MIMO) NOMA downlink channel, where the base station employs GSSK modulation to transmit additional information to the NOMA users. We present a novel energy-based maximum likelihood (ML) detection strategy at the NOMA users to decode the active antenna indices. We derive a closed-form expression for the average pairwise error probability of the energy-based ML strategy to find a union bound on the bit error probability. Further, we derive the expression for the overall sum rate of the proposed GSSK-aided MIMO-NOMA system. Through numerical evaluations, we show that the proposed system outperforms the conventional MIMO-NOMA system, in terms of spectral efficiency. {\textcopyright} 1967-2012 IEEE.}, keywords = {Antennas, Bit error probability, Bit error rate, Block codes, Closed-form expression, Downlink channels, Maximum likelihood, Maximum-likelihood detection, MIMO systems, Multiple access, Pair-wise error probability, Space-shift keying, Spectral efficiencies, Trellis codes}, doi = {10.1109/TVT.2021.3085415}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85107332896\&doi=10.1109\%2fTVT.2021.3085415\&partnerID=40\&md5=43ed806aa513f25c8c35a3c8a9b88af1}, author = {Kishore, R. and Gurugopinath, S. and Muhaidat, S. and Bouanani, F.E. and Dobre, O.A.} } @article {Drissi2021594, title = {A Systematic Literature Review on e-Mental Health Solutions to Assist Health Care Workers during COVID-19}, journal = {Telemedicine and e-Health}, volume = {27}, number = {6}, year = {2021}, note = {cited By 27}, pages = {594-602}, abstract = {Background: e-Mental health is an established field of exploiting information and communication technologies for mental health care. It offers different solutions and has shown effectiveness in managing many psychological issues. Introduction: The coronavirus disease 2019 (COVID-19) pandemic has critically influenced health care systems and health care workers (HCWs). HCWs are working under hard conditions, and are suffering from different psychological issues, including anxiety, stress, and depression. Consequently, there is an undeniable need of mental care interventions for HCWs. Under the circumstances caused by COVID-19, e-health interventions can be used as tools to assist HCWs with their mental health. These solutions can provide mental health care support remotely, respecting the recommended safety measures. Materials and Methods: This study aims to identify e-mental health interventions, reported in the literature, that are developed for HCWs during the COVID-19 pandemic. A systematic literature review was conducted following the PRISMA protocol by searching the following digital libraries: IEEE, ACM, ScienceDirect, Scopus, and PubMed. Results and Discussion: Eleven publications were selected. The identified e-mental health interventions consisted of social media platforms, e-learning content, online resources and mobile applications. Only 27\% of the studies included empirical evaluation of the reported interventions, 55\% listed challenges and limitations related to the adoption of the reported interventions. And 45\% presented interventions developed specifically for HCWs in China. The overall feedback on the identified interventions was positive, yet a lack of empirical evaluation was identified, especially regarding qualitative evidence. Conclusions: The COVID-19 pandemic has highlighted the importance and need for e-mental health solutions for HCWs. {\textcopyright} Copyright 2021, Mary Ann Liebert, Inc., publishers 2021.}, keywords = {China, COVID-19, Digital libraries, e-learning, E-learning contents, Empirical evaluations, Health care, health care personnel, Health care workers, Health Personnel, Health-care system, human, Humans, Information and Communication Technologies, Mental health, Mobile applications, pandemic, Pandemics, SARS-CoV-2, Social media platforms, Systematic literature review}, doi = {10.1089/tmj.2020.0287}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85108029620\&doi=10.1089\%2ftmj.2020.0287\&partnerID=40\&md5=abb17cd8cdd22c6edcf3e914fcc6e8e2}, author = {Drissi, N. and Ouhbi, S. and Marques, G. and De La Torre D{\'\i}ez, I. and Ghogho, M. and Janati Idrissi, M.A.} } @article {Hosni20212827, title = {A systematic mapping study for ensemble classification methods in cardiovascular disease}, journal = {Artificial Intelligence Review}, volume = {54}, number = {4}, year = {2021}, note = {cited By 5}, pages = {2827-2861}, abstract = {Ensemble methods overcome the limitations of single machine learning techniques by combining different techniques, and are employed in the quest to achieve a high level of accuracy. This approach has been investigated in various fields, one of them being that of bioinformatics. One of the most frequent applications of ensemble techniques involves research into cardiovascular diseases, which are considered the leading cause of death worldwide. The purpose of this research work is to identify the papers that investigate ensemble classification techniques applied to cardiology diseases, and to analyse them according to nine aspects: their publication venues, the medical tasks tackled, the empirical and research types adopted, the types of ensembles proposed, the single techniques used to construct the ensembles, the validation frameworks adopted to evaluate the proposed ensembles, the tools used to build the ensembles, and the optimization methods employed for the single techniques. This paper reports the carrying out of a systematic mapping study. An extensive automatic search in four digital libraries: IEEE Xplore, ACM Digital Library, PubMed, and Scopus, followed by a study selection process, resulted in the identification of 351 papers that were used to address our mapping questions. This study found that the papers selected had been published in a large number of different resources. The medical task addressed most frequently by the selected studies was diagnosis. In addition, the experiment-based empirical type and evaluation-based research type were the most dominant approaches adopted by the selected studies. Homogeneous ensembles were the ensemble type that was developed most often in literature, while decision trees, artificial neural networks and Bayesian classifiers were the single techniques used most frequently to develop ensemble classification methods. The weighted majority and majority voting rules were adopted to obtain the final decision of the ensembles developed. With regard to evaluation frameworks, the datasets obtained from the UCI and PhysioBank repositories were those used most often to evaluate the ensemble methods, while the k-fold cross-validation method was the most frequently-employed validation technique. Several tools with which to build ensemble classifiers were identified, and the type of software adopted with the greatest frequency was open source. Finally, only a few researchers took into account the optimization of the parameter settings of either single or meta ensemble classifiers. This mapping study attempts to provide a greater insight into the application of ensemble classification methods in cardiovascular diseases. The majority of the selected papers reported positive feedback as regards the ability of ensemble methods to perform better than single methods. Further analysis is required to aggregate the evidence reported in literature. {\textcopyright} 2020, Springer Nature B.V.}, keywords = {Bayesian networks, Cardio-vascular disease, Cardiology, Decision trees, Diagnosis, Digital libraries, Diseases, Ensemble classification, Ensemble classifiers, Evaluation framework, K fold cross validations, Learning systems, Majority voting rules, Mapping, Open source software, Open systems, Optimization method, Systematic mapping studies}, doi = {10.1007/s10462-020-09914-6}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85091735819\&doi=10.1007\%2fs10462-020-09914-6\&partnerID=40\&md5=69ea4b02de420c3ec6a85e1f3c7dddaf}, author = {Hosni, M. and Carrillo de Gea, J.M. and Idri, A. and El Bajta, M. and Fern{\'a}ndez Alem{\'a}n, J.L. and Garc{\'\i}a-Mateos, G. and Abnane, I.} } @article {Widad20215158, title = {Towards a context-driven transactional service selection mechanism in ubiquitous and pervasive environments}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {99}, number = {21}, year = {2021}, note = {cited By 0}, pages = {5158-5171}, abstract = {Most prominent techniques and selection algorithms only support QoS settings for application services. However, the software, hardware, and network infrastructures underlying services and users application have a significant impact on the validation of transactional services. Additionally, users may have varying transactional requirements throughout the lifecycle of a service composition. Therefore, selection algorithms must take into account the context requirements and users transactional needs when selecting services. This has led us to explore the trail of a service selection mechanism based on a service description enriched by functional and transactional requirements, and context information. We propose a context-driven selection of transactional services by introducing a new selection algorithm CT2S based on a semantic matching mechanism. More precisely, we are interested in studying the response time of our CT2S algorithm vis-a-vis the rapidity requirements in pervasive environments. {\textcopyright} 2021 Little Lion Scientific}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85119263108\&partnerID=40\&md5=b02c257d675200678a14907a65f6413a}, author = {Widad, E. and Driss, R. and Mahmoud, N.} } @article {Dari20211, title = {Verification-based data integrity mechanism in smart grid network}, journal = {International Journal of Security and Networks}, volume = {16}, number = {1}, year = {2021}, note = {cited By 1}, pages = {1-11}, abstract = {The integration of open communication infrastructures and bidirectional communication between smart metres and utilities in smart grids is very important to support vast amounts of data exchange. It also increases the openness and opportunity of resource sharing across smart grid users, which makes the network vulnerable to several cyber-attacks. These cyber-attacks target smart metres data integrity through several known threats. The most known threats are false data injection (FDI) attacks that manipulate, modify or destroy data by some malicious users. Therefore, these attacks make the smart metres behave maliciously to return false data and to sabotage the system functions. In this paper, we propose a new approach to improve the integrity of data generated by smart metres in a smart grid, namely, verificationbased data integrity mechanism (VBDIM). The performance of our approach is evaluated through simulation to investigate the effects of collusive smart metres on the correctness of their generated data. The obtained results show that our approach achieves a lower blacklisting error and error-rate, and better performance in terms of overhead and slowdown. {\textcopyright} 2021 Inderscience Enterprises Ltd.. All rights reserved.}, keywords = {Bi-directional communication, Computer crime, Crime, Data integrity, Electric power transmission networks, Electronic data interchange, False data injection, Network security, New approaches, Open communication, Resource sharing, Smart grid networks, Smart power grids, System functions}, doi = {10.1504/IJSN.2021.112835}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85100632953\&doi=10.1504\%2fIJSN.2021.112835\&partnerID=40\&md5=a38922b80a6dd1fbf545482cb986f641}, author = {Dari, E.Y. and Bendahmane, A. and Essaaidi, M.} } @article {AitAbdelali2021517, title = {Visual Vehicle Tracking via Deep Learning and Particle Filter}, journal = {Advances in Intelligent Systems and Computing}, volume = {1188}, year = {2021}, note = {cited By 2}, pages = {517-526}, abstract = {Visual vehicle tracking is one of the most challenging research topics in computer vision. In this paper, we propose a novel and efficient approach based on the particle filter technique and deep learning for multiple vehicle tracking, where the main focus is to associate vehicles efficiently for online and real-time applications. Experimental results illustrate the effectiveness of the system we are proposing. {\textcopyright} 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.}, keywords = {Deep learning, Monte Carlo methods, Particle filter, Real-time application, Research topics, Soft computing, Vehicles}, doi = {10.1007/978-981-15-6048-4_45}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096559933\&doi=10.1007\%2f978-981-15-6048-4_45\&partnerID=40\&md5=51a9b5456004a8cdb4bc0a5256e17dc9}, author = {Ait Abdelali, H. and Bourja, O. and Haouari, R. and Derrouz, H. and Zennayi, Y. and Bourzex, F. and Oulad Haj Thami, R.} } @conference {Daoudi2020, title = {Adaptive Enterprise Architecture: Towards a model}, booktitle = {ACM International Conference Proceeding Series}, year = {2020}, note = {cited By 0}, abstract = {Nowadays, enterprises are facing many changes due to digital transformation. So, they have to deal with new requirements that impact various parts of their Enterprise Architecture. To address the needs created by this new digital era, agility and adaptation are compulsory. Though Enterprise Architecture (EA) was designed as a catalyst for change management, traditional Enterprise Architecture approaches do not rely on well-defined concepts, lack agility and are constrained by layered architecture (business layer, functional layer, deployment layer, etc.). Thus, a new generation of EA, allowing continuous self-improvement and proactive adaptation to better match the new conditions, is required. In this paper, we highlighted some criteria, regarding the adaptation of EA and exploited them to show the limitations of the EA approaches analyzed. Then, we presented agile methods principles and discussed the mapping between them and the criteria that we proposed before. Finally, we proposed a simplified model based on Scrum for adaptive enterprise architecture. {\textcopyright} 2020 ACM.}, keywords = {Adaptive enterprise, Change management, Digital transformation, enterprise architecture, Functional layer, Information systems, Information use, Layered architecture, Model-based OPC, Proactive adaptations}, doi = {10.1145/3447568.3448539}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85103625235\&doi=10.1145\%2f3447568.3448539\&partnerID=40\&md5=4f7441d9a2cb09a9ffc18c39755d4958}, author = {Daoudi, W. and Doumi, K. and Kjiri, L.} } @conference {Imgharene2020662, title = {Agility metrics model for Business IT Alignment}, booktitle = {7th International Conference on Control, Decision and Information Technologies, CoDIT 2020}, year = {2020}, note = {cited By 1}, pages = {662-667}, abstract = {Enterprises are facing rapid and radical changes in a turbulent environment. This turbulence requires companies to be agile, i.e. to keep an overview of their environment and to be ready to react. Alignment Businesses IT is constantly being affected if levels of abstraction are affected by the change. The changes in companies must necessarily be accompanied by a (re)alignment of Business IT. In order to measure the impact of change on Business-IT alignment, this paper reviews the literature on agility metrics in different domains, by filtering them to focus on the context of Business-IT alignment, and then matching the metrics to the model that defines the impact of change on Business-IT alignment. {\textcopyright} 2020 IEEE.}, keywords = {Alignment, Business - IT alignments, Business-IT, Control engineering, Different domains, Impact of changes, Levels of abstraction, Metrics models, Turbulent environments}, doi = {10.1109/CoDIT49905.2020.9263839}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85098240037\&doi=10.1109\%2fCoDIT49905.2020.9263839\&partnerID=40\&md5=821e8e127bf8d6c8fed3eb27359a6c73}, author = {Imgharene, K. and Doumi, K. and Baina, S.} } @article {ElOuahabi20204261, title = {Analysis and design of a compact ultra-wideband antenna with WLAN and X-band satellite notch}, journal = {International Journal of Electrical and Computer Engineering}, volume = {10}, number = {4}, year = {2020}, note = {cited By 1}, pages = {4261-4269}, abstract = {A compact design of ultra-wideband (UWB) antenna with dual band-notched characteristics are investigated in this paper. The wider impedance bandwidth (from 2.73 to 11.34 GHz) is obtained by using two symmetrical slits in the radiating patch and another slit in the partial ground plane. The dual band-notch rejection at WLAN and X-band downlink satellite communication system are obtained by inserting a modified U-strip on the radiating patch at 5.5 GHz and embedding a pair of single rectangular split ring resonators (SR-SRR) on both sides of the microstrip feed line at 7.5 GHz, respectively. The proposed antenna is simulated and tested using CST MWS high frequency simulator and exhibits the advantages of compact size, simple design and each notched frequency band can be controlled independently by using the geometrical parameters of the corresponding resonator. Therefore, the parametric study is carried out to understand the mutual coupling between the dual band-notched elements. To validate simulation results of our design, a prototype is fabricated and good agreement is achieved between measurement and simulation. Furthermore, a radiation patterns, satisfactory gain, current distribution and VSWR result at the notched frequencies make the proposed antenna a suitable candidate for practical UWB applications. Copyright {\textcopyright} 2020 Institute of Advanced Engineering and Science. All rights reserved.}, doi = {10.11591/ijece.v10i4.pp4261-4269}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85083101617\&doi=10.11591\%2fijece.v10i4.pp4261-4269\&partnerID=40\&md5=6e35d351672ae49ebb932247c0e19472}, author = {El Ouahabi, M. and Dkiouak, A. and Zakriti, A. and Essaaidi, M. and Elftouh, H.} } @article {DRISSI2020104243, title = {An analysis on self-management and treatment-related functionality and characteristics of highly rated anxiety apps}, journal = {International Journal of Medical Informatics}, volume = {141}, year = {2020}, pages = {104243}, abstract = {Background and objective Anxiety is a common emotion that people often feel in certain situations. But when the feeling of anxiety is persistent and interferes with a person{\textquoteright}s day to day life then this may likely be an anxiety disorder. Anxiety disorders are a common issue worldwide and can fall under general anxiety, panic attacks, and social anxiety among others. They can be disabling and can impact all aspects of an individual{\textquoteright}s life, including work, education, and personal relationships. It is important that people with anxiety receive appropriate care, which in some cases may prove difficult due to mental health care delivery barriers such as cost, stigma, or distance from mental health services. A potential solution to this could be mobile mental health applications. These can serve as effective and promising tools to assist in the management of anxiety and to overcome some of the aforementioned barriers. The objective of this study is to provide an analysis of treatment and management-related functionality and characteristics of high-rated mobile applications (apps) for anxiety, which are available for Android and iOS systems. Method A broad search was performed in the Google Play Store and App Store following the Preferred Reporting Items for Systematic reviews and Meta-Analysis (PRISMA) protocol to identify existing apps for anxiety. A set of free and highly rated apps for anxiety were identified and the selected apps were then installed and analyzed according to a predefined data extraction strategy. Results A total of 167 anxiety apps were selected (123 Android apps and 44 iOS apps). Besides anxiety, the selected apps addressed several health issues including stress, depression, sleep issues, and eating disorders. The apps adopted various treatment and management approaches such as meditation, breathing exercises, mindfulness and cognitive behavioral therapy. Results also showed that 51\% of the selected apps used various gamification features to motivate users to keep using them, 32\% provided social features including chat, communication with others and links to sources of help; 46\% offered offline availability; and only 19\% reported involvement of mental health professionals in their design. Conclusions Anxiety apps incorporate various mental health care management methods and approaches. Apps can serve as promising tools to assist large numbers of people suffering from general anxiety or from anxiety disorders, anytime, anywhere, and particularly in the current COVID-19 pandemic.}, keywords = {Anxiety, M-health, Mental health, Mobile apps, Mobile mental health}, issn = {1386-5056}, doi = {https://doi.org/10.1016/j.ijmedinf.2020.104243}, url = {https://www.sciencedirect.com/science/article/pii/S1386505620305815}, author = {Nidal Drissi and Sofia Ouhbi and Mohammed Abdou Janati Idrissi and Mounir Ghogho} } @article {Drissi2020, title = {An analysis on self-management and treatment-related functionality and characteristics of highly rated anxiety apps}, journal = {International Journal of Medical Informatics}, volume = {141}, year = {2020}, note = {cited By 19}, abstract = {Background and objective: Anxiety is a common emotion that people often feel in certain situations. But when the feeling of anxiety is persistent and interferes with a person{\textquoteright}s day to day life then this may likely be an anxiety disorder. Anxiety disorders are a common issue worldwide and can fall under general anxiety, panic attacks, and social anxiety among others. They can be disabling and can impact all aspects of an individual{\textquoteright}s life, including work, education, and personal relationships. It is important that people with anxiety receive appropriate care, which in some cases may prove difficult due to mental health care delivery barriers such as cost, stigma, or distance from mental health services. A potential solution to this could be mobile mental health applications. These can serve as effective and promising tools to assist in the management of anxiety and to overcome some of the aforementioned barriers. The objective of this study is to provide an analysis of treatment and management-related functionality and characteristics of high-rated mobile applications (apps) for anxiety, which are available for Android and iOS systems. Method: A broad search was performed in the Google Play Store and App Store following the Preferred Reporting Items for Systematic reviews and Meta-Analysis (PRISMA) protocol to identify existing apps for anxiety. A set of free and highly rated apps for anxiety were identified and the selected apps were then installed and analyzed according to a predefined data extraction strategy. Results: A total of 167 anxiety apps were selected (123 Android apps and 44 iOS apps). Besides anxiety, the selected apps addressed several health issues including stress, depression, sleep issues, and eating disorders. The apps adopted various treatment and management approaches such as meditation, breathing exercises, mindfulness and cognitive behavioral therapy. Results also showed that 51\% of the selected apps used various gamification features to motivate users to keep using them, 32\% provided social features including chat, communication with others and links to sources of help; 46\% offered offline availability; and only 19\% reported involvement of mental health professionals in their design. Conclusions: Anxiety apps incorporate various mental health care management methods and approaches. Apps can serve as promising tools to assist large numbers of people suffering from general anxiety or from anxiety disorders, anytime, anywhere, and particularly in the current COVID-19 pandemic. {\textcopyright} 2020 Elsevier B.V.}, keywords = {Android (operating system), Anxiety, anxiety disorder, Betacoronavirus, breathing exercise, cognitive behavioral therapy, Cognitive-behavioral therapies, Coronavirus infection, Coronavirus Infections, data extraction, Disease Outbreaks, eating disorder, Eating disorders, epidemic, Health care, human, Humans, iOS (operating system), isolation and purification, language, Mental health, mental health care personnel, mental health service, Mental health services, mobile application, Mobile applications, organization and management, pandemic, Pandemics, Personal relationships, Pneumonia, priority journal, psychology, Review, self care, Self-Management, sleep, Social anxieties, stress, Systematic Review, telemedicine, therapy, Viral, virology, virus pneumonia}, doi = {10.1016/j.ijmedinf.2020.104243}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85088938984\&doi=10.1016\%2fj.ijmedinf.2020.104243\&partnerID=40\&md5=ec0c4f4cdf72007694d3cc8e8f50bb97}, author = {Drissi, N. and Ouhbi, S. and Janati Idrissi, M.A. and Ghogho, M.} } @conference {Daoudi2020738, title = {An approach for adaptive enterprise architecture}, booktitle = {ICEIS 2020 - Proceedings of the 22nd International Conference on Enterprise Information Systems}, volume = {2}, year = {2020}, note = {cited By 4}, pages = {738-745}, abstract = {Given the fast emergence of new technologies and the highly changing business demands, enterprises are confronted with the need to keep up with the evolving transformation. This one is subject to internal and external factors which make it very often in the form of disruptive changes. As a consequence, various parts of companies{\textquoteright} Enterprise Architecture are impacted. To address the new requirements of these increasingly dynamic environments, enterprises need to transition from heavy and document-centred Enterprise Architecture Frameworks to more agile and continuously adaptive approaches. On the other hand, Agile Software Development (ASD) are commonly used methods for IT development. They are mainly characterized by the high involvement of the requester and the rapid accommodation to development needs. This paper presents an Adaptive Enterprise Architecture model that is inspired from some ASD values. Thus, we begin with a brief summary of the criteria that we consider compulsory for Adaptive Enterprise Architecture. Then we present the related work and the connection between agile values and our criteria. Finally, we describe our model and illustrate it via a case study. Copyright {\textcopyright} 2020 by SCITEPRESS {\textendash} Science and Technology Publications, Lda. All rights reserved}, keywords = {Adaptive approach, Adaptive enterprise, Agile manufacturing systems, Agile software development, Business demands, Development needs, Dynamic environments, enterprise architecture, Information systems, Information use, Internal and external factors, Software design}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85091394601\&partnerID=40\&md5=47480aba028e3e923b145c862859135c}, author = {Daoudi, W. and Doumi, K. and Kjiri, L.} } @article {Pefura-Yone2020297, title = {Atopic dermatitis in children and adults in Sub-saharan Africa and Maghreb [{\'E}tat des lieux de la dermatite atopique de l{\textquoteright}enfant et de l{\textquoteright}adulte en Afrique sub-saharienne et au Maghreb]}, journal = {Revue Francaise d{\textquoteright}Allergologie}, volume = {60}, number = {4}, year = {2020}, note = {cited By 0}, pages = {297-299}, abstract = {{Objective: To describe the demographic, clinical, paraclinical and therapeutic characteristics of patients with atopic dermatitis in Sub-Saharan Africa (SSA) and the Maghreb. Methods: The Medical Doctors members of the Federation Allergologie Internationale (FAI) working in SSA and the Maghreb were invited to participate in this cross-sectional study to consecutively including patients with atopic dermatitis (AD) seen in their consultations from September 2019 to January 2010 (5 months). Results: A total of 69 patients (53.6\% female) were included. The proportion of female subjects was higher among subjects included in SSA (69.7\% vs 38.9\%}, keywords = {adolescent, adult, Africa south of the Sahara, allergic rhinitis, asthma, Atopic dermatitis, bacterial skin disease, child, clinical assessment, clinical feature, consultation, cross-sectional study, daytime somnolence, disease association, female, food allergen, human, major clinical study, male, prevalence, prurigo, seborrheic dermatitis, Short Survey}, doi = {10.1016/j.reval.2020.02.014}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85081410340\&doi=10.1016\%2fj.reval.2020.02.014\&partnerID=40\&md5=f42b72ed95d78155dedf2d2b24439201}, author = {Pefura-Yone, E.W. and Jeddi, Z. and Kouotou, E.A. and Delimi, B. and El Gueddari, Y. and Karkar, R. and Kebe, M. and Diallo Chauvin, M. and Dumur, J.-P.} } @article {Mrhar202072, title = {A dropout predictor system in moocs based on neural networks}, journal = {Journal of Automation, Mobile Robotics and Intelligent Systems}, volume = {14}, number = {4}, year = {2020}, note = {cited By 2}, pages = {72-80}, abstract = {Massive open online courses, MOOCs, are a recent phenomenon that has achieved a tremendous media attention in the online education world. Certainly, the MOOCs have brought interest among the learners (given the number of enrolled learners in these courses). Nevertheless, the rate of dropout in MOOCs is very important. Indeed, a limited number of the enrolled learners complete their courses. The high dropout rate in MOOCs is perceived by the educator{\textquoteright}s community as one of the most important problems. It{\textquoteright}s related to diverse aspects, such as the motivation of the learners, their expectations and the lack of social interactions. However, to solve this problem, it is necessary to predict the likelihood of dropout in order to propose an appropriate intervention for learners at-risk of dropping out their courses. In this paper, we present a dropout predictor model based on a neural network algorithm and sentiment analysis feature that used the clickstream log and forum post data. Our model achieved an average AUC (Area under the curve) as high as 90\% and the model with the feature of the learner{\textquoteright}s sentiments analysis attained average increase in AUC of 0.5\%. {\textcopyright} 2020, Industrial Research Institute for Automation and Measurements. All rights reserved.}, doi = {10.14313/JAMRIS/4-2020/48}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85102757989\&doi=10.14313\%2fJAMRIS\%2f4-2020\%2f48\&partnerID=40\&md5=4cbaa0f7f458ce320541450af5ff8a46}, author = {Mrhar, K. and Douimi, O. and Abik, M.} } @article {PEFURAYONE2020297, title = {{\'E}tat des lieux de la dermatite atopique de l{\textquoteright}enfant et de l{\textquoteright}adulte en Afrique sub-saharienne et au Maghreb}, journal = {Revue Fran{\c c}aise d{\textquoteright}Allergologie}, volume = {60}, number = {4}, year = {2020}, note = {15{\`e}me Congr{\`e}s Francophone d{\textquoteright}Allergologie}, pages = {297-299}, abstract = {{R{\'e}sum{\'e} Objectif D{\'e}crire les caract{\'e}ristiques d{\'e}mographiques, cliniques, paracliniques et th{\'e}rapeutiques des patients ayant une dermatite atopique en Afrique sub-saharienne (SSA) et au Maghreb. M{\'e}thodes Les m{\'e}decins membres de la F{\'e}d{\'e}ration Allergologie Internationale travaillant en Afrique sub-saharienne et au Maghreb ont {\'e}t{\'e} invit{\'e}s {\`a} participer {\`a} cette {\'e}tude transversale en incluant de fa{\c c}on cons{\'e}cutive les patientsatteints de dermatite atopique (DA) vus dans leurs consultations de septembre 2019~{\`a} janvier 2010 (5~mois). R{\'e}sultats Au total, 69~patients (53,6~\% de sexe f{\'e}minin) ont {\'e}t{\'e} inclus. La proportion des sujets de sexe f{\'e}minin {\'e}tait plus {\'e}lev{\'e}e chez les sujets inclus en Afrique SSA (69,7~\% vs 38,9~\%}, keywords = {Allergie, Allergy, Atopic dermatitis, Atopic eczema, Dermatite atopique, Ecz{\'e}ma atopique, Inflammatory disease, Maladie inflammatoire}, issn = {1877-0320}, doi = {https://doi.org/10.1016/j.reval.2020.02.014}, url = {https://www.sciencedirect.com/science/article/pii/S1877032020300452}, author = {E.W. Pefura-Yone and Z. Jeddi and E.A. Kouotou and B. Delimi and Y. El Gueddari and R. Karkar and M. Kebe and M. Diallo Chauvin and J.-P. Dumur} } @article {Assami2020390, title = {Learning actor ontology for a personalised recommendation in massive open online courses}, journal = {International Journal of Technology Enhanced Learning}, volume = {12}, number = {4}, year = {2020}, note = {cited By 4}, pages = {390-410}, abstract = {Massive Open Online Courses revolutionised online learning and instigated research on information and communication technologies for learning to enhance the learner experience and increase his engagement level. In earlier research, we identified the recommendation criteria that could be used to recommend suitable MOOCs for the learner{\textquoteright}s needs and motivations. Thus, criteria like the level of knowledge, competences and the pace of learning introduced by MOOCs and preferred by learners will be matched by a personalised recommender system. In this paper, we model the Learning Actor ontology to be used for this matching process. It is a domain ontology that was developed by following the phases of the on-to-knowledge methodology: feasibility study, kickoff phase, refinement phase, evaluation and validation phase and, finally, the maintenance phase. At last, we obtained the learning ontology that describes the {\textquotedblleft}learning actor{\textquotedblright} major class by using a complex definition of characteristics and their relationship and range of values. Copyright {\textcopyright} 2020 Inderscience Enterprises Ltd.}, doi = {10.1504/IJTEL.2020.110048}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85092666488\&doi=10.1504\%2fIJTEL.2020.110048\&partnerID=40\&md5=100979a3e3eab5e76ce2172142db2700}, author = {Assami, S. and Daoudi, N. and Ajhoun, R.} } @article {ElAissaoui2020655, title = {Mining Learners{\textquoteright} Behaviors: An Approach Based on Educational Data Mining Techniques}, journal = {Advances in Intelligent Systems and Computing}, volume = {1076}, year = {2020}, note = {cited By 2}, pages = {655-670}, abstract = {Educational data mining is a research field that aims to apply data mining techniques in educational environments. Many data mining techniques such as clustering, classification, and prediction can be performed on educational data in order to analyze the learner behaviors. In this work, we have used the clustering and classification techniques to predict the learners{\textquoteright} learning styles. The students{\textquoteright} behaviors while using the e-learning system have been captured from the log file and given as an input of a clustering algorithm to group them into 16 clusters. The resulted clusters were labeled with learning styles combinations based on the Felder and Silverman learning style model. Then the labeled behaviors were given as input to four classifiers: naive Bayes, Cart, Id3, and C4.5 to compare their performance in predicting students{\textquoteright} learning styles. The four classifiers were performed using Weka data mining tool, and the obtained results showed that Id3 yielded better results than the other classifiers. {\textcopyright} Springer Nature Singapore Pte Ltd. 2020.}, keywords = {Artificial intelligence, Classification technique, Clustering algorithms, Data mining, Data-mining tools, Educational data mining, Educational environment, Embedded systems, Forecasting, Learning Style, Learning systems, Log file, Naive bayes, Research fields, Students}, doi = {10.1007/978-981-15-0947-6_62}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085173246\&doi=10.1007\%2f978-981-15-0947-6_62\&partnerID=40\&md5=0cb9665b2720bd9b06e011902e8708b5}, author = {El Aissaoui, O. and El Alami El Madani, Y. and Oughdir, L. and Dakkak, A. and El Allioui, Y.} } @article {ElAissaoui20209, title = {A Multiple Linear Regression-Based Approach to Predict Student Performance}, journal = {Advances in Intelligent Systems and Computing}, volume = {1102 AISC}, year = {2020}, note = {cited By 15}, pages = {9-23}, abstract = {Predicting students{\textquoteright} academic outcome is useful for any educational institution that aims to ameliorate students{\textquoteright} performance. Based on the resulted predictions, educators can provide support to students at risk of failure. Data mining and machine learning techniques were widely used to predict students{\textquoteright} performance. This process called Educational data mining. In this work, we have proposed a methodology to build a student{\textquoteright} performance prediction model using a supervised machine learning technique which is the multiple linear regression (MLR). Our methodology consists of three major steps, the first step aims to analyze and preprocess the students{\textquoteright} attributes/variables using a set of statistical analysis methods, and then the second step consists in selecting the most important variables using different methods. The third step aims to construct different MLR models based on the selected variables and compare their performance using the k-fold cross-validation technique. The obtained results show that the model built using the variables selected from the Multivariate Adaptive Regression Splines method (MARS), outperforms the other constructed models. {\textcopyright} Springer Nature Switzerland AG 2020.}, keywords = {Data mining, Education computing, Educational data mining, Forecasting, Intelligent systems, K fold cross validations, Learning systems, Linear regression, Machine learning techniques, Multiple linear regressions, Multivariate adaptive regression splines, Performance prediction models, planning, Predictive analytics, Statistical analysis methods, Students, Supervised learning, Supervised machine learning, Sustainable development}, doi = {10.1007/978-3-030-36653-7_2}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85078413089\&doi=10.1007\%2f978-3-030-36653-7_2\&partnerID=40\&md5=893772562739d5d20e6b6ae21ebae325}, author = {El Aissaoui, O. and El Alami El Madani, Y. and Oughdir, L. and Dakkak, A. and El Allioui, Y.} } @article {Lamriq20203666, title = {New weighting system for e-readiness indicators based on indicator importance measurement by the random forest algorithm}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {98}, number = {23}, year = {2020}, note = {cited By 0}, pages = {3666-3677}, abstract = {Weighting the indicators was always a difficult step in building the composite indicators. In the e-readiness assessment approaches, where there are several indicators of different categories, the weighting methods used are not effective enough to assess the importance and the real priority of the indicators. In this article, we have presented two contributions: the first consists in combining subjective weighting with objective weighting to build a complete and optimal weighting system. the second contribution aims to propose a new statistical method based on the random forest algorithm to measure the importance of indicators and calculate objective weighting. A case study on the Internet Inclusive Index of 2019 is illustrated to assess the effect of the new weighting system on the scores and ranking of 100 countries. {\textcopyright} 2005 - ongoing JATIT \& LLS}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097751092\&partnerID=40\&md5=917629c715427ec2f1423becca0274f2}, author = {Lamriq, R. and Doukkali, A. and Belkhayat, N.} } @article {Dari2020237, title = {Optimal method for detecting collusive saboteur smart meters in smart grid}, journal = {Journal of Cyber Security and Mobility}, volume = {9}, number = {2}, year = {2020}, note = {cited By 1}, pages = {237-264}, abstract = {Smart grid is a system in which it is possible to use voting-based techniques to resist sabotage of several cyber-attacks. The adaptation of these techniques can be difficult and useless in the case when the malicious resources (i.e., smart meters) of this system can return wrong data in same time; however, the collusion problem is triggered. To detect and resolve the collusive issue, spot-checking technique has been proposed by sending randomly certain number of spotter queries to chosen resources with known correct data in order to estimate resource credibility based on the returned data. This work proposes an original method that resist against collusion attacks by using probability to solving a new spot-checking optimization problem for smart grid systems, with the objective to minimize probability of accepting wrong data (PAWD) while respecting an expected overhead constraint. The proposed solution contains an optimal combination of several parameters, the number of spotter queries sent, the number of resources tested by each spotter query, and the number of resources assigned to run the genuine query. The optimization procedure includes a new method for evaluating performance metrics of PAWD and expected overhead in terms of the total number of query assignments. To demonstrate the proposed optimization problem and solution procedure, we have provided several illustrative examples. {\textcopyright} 2020 the Author(s).}, doi = {10.13052/JCSM2245-1439.923}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85087053509\&doi=10.13052\%2fJCSM2245-1439.923\&partnerID=40\&md5=9a7e9e5d83a2d3e2e23041adf21fcaaa}, author = {Dari, E.Y. and Bendahmane, A. and Essaaidi, M.} } @conference {Drissi2020593, title = {Sensor-based solutions for mental healthcare: A systematic literature review}, booktitle = {HEALTHINF 2020 - 13th International Conference on Health Informatics, Proceedings; Part of 13th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2020}, year = {2020}, note = {cited By 2}, pages = {593-600}, abstract = {Mental well-being is a crucial aspect of the person{\textquoteright}s general health, compromised mental health impairs the person{\textquoteright}s functioning, decreases the quality of life, and limits the person{\textquoteright}s contribution to society. The mental health industry is still facing some barriers to healthcare delivery such as costs, mental health illiteracy, and stigma. Incorporating technological interventions in the treatment and the diagnosis processes might help overcome these barriers. Sensors are devices that have been used for healthcare since the 1990s and have been incorporated into mental healthcare in different forms. In this study, we conducted a systematic literature review to identify and analyze sensor-based solutions for mental healthcare. 12 studies were identified and analyzed. The majority of the selected studies presented methods and models and were empirically evaluated and showed promising accuracy results. Different types of sensors were used to collect different types of data about the patient such as physical and behavioral information. The selected studies mainly addressed the use of sensors for common mental issues like stress and depression or the analysis of general mental status. Some studies reported some limitations mainly related to technological issues and lack of standards. {\textcopyright} 2020 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.}, keywords = {Biomedical engineering, Health care, Healthcare delivery, Medical informatics, Mental health, Quality of life, Systematic literature review, Well being}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85083705930\&partnerID=40\&md5=335f69fa969e09929802b364d7f6d696}, author = {Drissi, N. and Ouhbi, S. and Garc{\'\i}a-Bern{\'a}, J.A. and Idrissi, M.A.J. and Ghogho, M.} } @article {Aissaoui2020117, title = {Toward a hybrid machine learning approach for extracting and clustering learners{\textquoteright} behaviours in adaptive educational system}, journal = {International Journal of Computing Science and Mathematics}, volume = {12}, number = {2}, year = {2020}, note = {cited By 0}, pages = {117-131}, abstract = {The learning style is a vital learner{\textquoteright}s characteristic that must be considered while recommending learning materials. In this paper we have proposed an approach to identify learning styles automatically. The first step of the proposed approach aims to preprocess the data extracted from the log file of the E-learning environment and capture the learners{\textquoteright} sequences. The captured learners{\textquoteright} sequences were given as an input to the K-means clustering algorithm to group them into sixteen clusters according to the FSLSM. Then the naive Bayes classifier was used to predict the learning style of a student in real time. To perform our approach, we used a real dataset extracted from an e-learning system{\textquoteright}s log file, and in order to evaluate the performance of the used classifier, the confusion matrix method was used. The obtained results demonstrate that our approach yields excellent results. Copyright {\textcopyright} 2020 Inderscience Enterprises Ltd.}, keywords = {Adaptive systems, Classification (of information), Classifiers, Computer aided instruction, Confusion matrices, e-learning, E-learning environment, Educational systems, Hybrid machine learning, K-means clustering, Learning materials, Learning Style, Machine learning, Naive Bayes classifiers, Preprocess}, doi = {10.1504/IJCSM.2020.111113}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096034864\&doi=10.1504\%2fIJCSM.2020.111113\&partnerID=40\&md5=e39786511c32be21cc0fef5be68a0822}, author = {Aissaoui, O.E. and El Alami El Madani, Y. and Oughdir, L. and Dakkak, A. and El Allioui, Y.} } @article {Mrhar2020535, title = {Towards a semantic integration of data from learning platforms}, journal = {IAES International Journal of Artificial Intelligence}, volume = {9}, number = {3}, year = {2020}, note = {cited By 2}, pages = {535-544}, abstract = {Nowadays, there is a huge production of Massive Open Online Courses MOOCs from universities around the world. The enrolled learners in MOOCs skyrocketed along with the number of the offered online courses. Of late, several universities scrambled to integrate MOOCs in their learning strategy. However, the majority of the universities are facing two major issues: firstly, because of the heterogeneity of the platforms used (e-learning and MOOC platforms), they are unable to establish a communication between the formal and non-formal system; secondly, they are incapable to exploit the feedbacks of the learners in a non-formal learning to personalize the learning according to the learner{\textquoteright}s profile. Indeed, the educational platforms contain an extremely large number of data that are stored in different formats and in different places. In order to have an overview of all data related to their students from various educational heterogeneous platforms, the collection and integration of these heterogeneous data in a formal consolidated system is needed. The principal core of this system is the integration layer which is the purpose of this paper. In this paper, a semantic integration system is proposed. It allows us to extract, map and integrate data from heterogeneous learning platforms {\textquotedblleft}MOOCs platforms, e-learning platforms{\textquotedblright} by solving all semantic conflicts existing between these sources. Besides, we use different learning algorithms (Long short-term memory LSTM, Conditional Random Field CRF) to learn and recognize the mapping between data source and domain ontology. {\textcopyright} 2020, Institute of Advanced Engineering and Science. All rights reserved.}, doi = {10.11591/ijai.v9.i3.pp535-544}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85090554399\&doi=10.11591\%2fijai.v9.i3.pp535-544\&partnerID=40\&md5=786ffdd85ffa5b0112c0728e4bb50266}, author = {Mrhar, K. and Douimi, O. and Abik, M. and Benabdellah, N.C.} } @article {Doumi20191211, title = {Evolution of business it alignment: Gap analysis}, journal = {Journal of Engineering and Applied Sciences}, volume = {14}, number = {4}, year = {2019}, note = {cited By 0}, pages = {1211-1218}, doi = {10.3923/jeasci.2019.1211.1218}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85060996331\&doi=10.3923\%2fjeasci.2019.1211.1218\&partnerID=40\&md5=e65b463344579d9492c2924128317a72}, author = {Doumi, K.} } @article {Assami201921, title = {Ontology-based modeling for a personalized mooc recommender system}, journal = {Smart Innovation, Systems and Technologies}, volume = {111}, year = {2019}, note = {cited By 0}, pages = {21-28}, doi = {10.1007/978-3-030-03577-8_3}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85056482148\&doi=10.1007\%2f978-3-030-03577-8_3\&partnerID=40\&md5=38ab9ecb20bd621f80b6f281454278f1}, author = {Assami, S. and Daoudi, N. and Ajhoun, R.} } @conference {Illi2019, title = {On the Secrecy Performance of Mixed RF/UOW Communication System}, booktitle = {2018 IEEE Globecom Workshops, GC Wkshps 2018 - Proceedings}, year = {2019}, note = {cited By 1}, doi = {10.1109/GLOCOMW.2018.8644314}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85055381999\&doi=10.1109\%2fGLOCOMW.2018.8644314\&partnerID=40\&md5=fc4e23b9414d6feaac033c613bdfb08f}, author = {Illi, E. and Bouanani, F.E. and Da Costa, D.B. and Ayoub, F. and Dias, U.S.} } @conference {Imgharene2018905, title = {Continuous Alignment Business IT by factor agility}, booktitle = {2018 5th International Conference on Control, Decision and Information Technologies, CoDIT 2018}, year = {2018}, pages = {905-909}, doi = {10.1109/CoDIT.2018.8394952}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050204853\&doi=10.1109\%2fCoDIT.2018.8394952\&partnerID=40\&md5=e1841a28744a82a487258a0972849f18}, author = {Imgharene, K. and Doumi, K. and Baina, S.} } @article {Bustos-Vanegas2018839, title = {Developing predictive models for determining physical properties of coffee beans during the roasting process}, journal = {Industrial Crops and Products}, volume = {112}, year = {2018}, pages = {839-845}, doi = {10.1016/j.indcrop.2017.12.015}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85039453221\&doi=10.1016\%2fj.indcrop.2017.12.015\&partnerID=40\&md5=b7818900c7e9d5412b48bb3e994b0da4}, author = {Bustos-Vanegas, J.D. and Corr{\^e}a, P.C. and Martins, M.A. and Baptestini, F.M. and Campos, R.C. and de Oliveira, G.H.H. and Nunes, E.H.M.} } @article {Illi201855345, title = {Dual-hop mixed RF-UOW communication system: A PHY Security Analysis}, journal = {IEEE Access}, volume = {6}, year = {2018}, pages = {55345-55360}, doi = {10.1109/ACCESS.2018.2870344}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85054276852\&doi=10.1109\%2fACCESS.2018.2870344\&partnerID=40\&md5=3402dea4c38b8cc6d781800616c3f6e5}, author = {Illi, E. and El Bouanani, F. and Da Costa, D.B. and Ayoub, F. and Dias, U.S.} } @conference {Bourja2018502, title = {MoVITS: Moroccan Video Intelligent Transport System}, booktitle = {Colloquium in Information Science and Technology, CIST}, volume = {2018-October}, year = {2018}, pages = {502-507}, doi = {10.1109/CIST.2018.8596566}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85061428090\&doi=10.1109\%2fCIST.2018.8596566\&partnerID=40\&md5=d3b7baffb731883e8897b8cc5356e33e}, author = {Bourja, O. and Kabbaj, K. and Derrouz, H. and El Bouziady, A. and Thami, R.O.H. and Zennayi, Y. and Bourzeix, F.} } @conference {Assami20181265, title = {Personalization criteria for enhancing learner engagement in MOOC platforms}, booktitle = {IEEE Global Engineering Education Conference, EDUCON}, volume = {2018-April}, year = {2018}, pages = {1265-1272}, doi = {10.1109/EDUCON.2018.8363375}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85048130321\&doi=10.1109\%2fEDUCON.2018.8363375\&partnerID=40\&md5=9cfaeac7fd7536644d73cb99c9cbaefc}, author = {Assami, S. and Daoudi, N. and Ajhoun, R.} } @article {Dauvergne2018579, title = {The power of environmental norms: marine plastic pollution and the politics of microbeads}, journal = {Environmental Politics}, volume = {27}, number = {4}, year = {2018}, pages = {579-597}, doi = {10.1080/09644016.2018.1449090}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85043498034\&doi=10.1080\%2f09644016.2018.1449090\&partnerID=40\&md5=81ff3eb09ea7b2f6094e17b4331220c5}, author = {Dauvergne, P.} } @article {Bajta2018690, title = {Software project management approaches for global software development: A systematic mapping study}, journal = {Tsinghua Science and Technology}, volume = {23}, number = {6}, year = {2018}, pages = {690-714}, doi = {10.26599/TST.2018.9010029}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85055661732\&doi=10.26599\%2fTST.2018.9010029\&partnerID=40\&md5=7601769b8094dafca96fea06d11fd3db}, author = {Bajta, M.E. and Idri, A. and Ros, J.N. and Fernandez-Aleman, J.L. and de Gea, J.M.C. and Garc{\'\i}a, F. and Toval, A.} } @conference {Saidi2018, title = {Translation of heterogeneous requirements meta-models through a pivot meta-model}, booktitle = {ENASE 2018 - Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering}, volume = {2018-January}, year = {2018}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85056807026\&partnerID=40\&md5=f8a470ca9cd9874928c91f4110c79259}, author = {Saidi, I.E. and El Hamlaoui, M. and Dkaki, T. and Zarour, N.E. and Charrel, P.-J.} } @article {ElOuahabi2018537, title = {A very compact design of a triple-band bandstop filter based on a complementary split ring resonator}, journal = {International Journal of Microwave and Optical Technology}, volume = {13}, number = {6}, year = {2018}, pages = {537-543}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85057379564\&partnerID=40\&md5=a6c46510eb0891ee5de2a97ba4dc3343}, author = {El Ouahabi, M. and Zakriti, A. and Essaaidi, M. and Dkiouak, A.} } @article {Dauvergne201822, title = {Why is the global governance of plastic failing the oceans?}, journal = {Global Environmental Change}, volume = {51}, year = {2018}, pages = {22-31}, doi = {10.1016/j.gloenvcha.2018.05.002}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046717809\&doi=10.1016\%2fj.gloenvcha.2018.05.002\&partnerID=40\&md5=9d3c31e951655c2229bca2f523fb23f0}, author = {Dauvergne, P.} } @conference {Enaanai2017, title = {The collaborative relevance in the distributed information retrieval}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, year = {2017}, note = {cited By 0}, abstract = {Relevance is one of the most interesting topics in the information retrieval domain. In this paper, we introduce another method of relevance calculation. We propose to use the implicit opinion of users to calculate relevance. The Implicit judgment of users is injected to the documents by calculating different kinds of weighting. These latter touch several criteria like as user{\textquoteright}s weight in the query{\textquoteright}s words, user{\textquoteright}s profile, user{\textquoteright}s interest, document{\textquoteright}s content and the document popularity. In this method, each user is an active element of the system, he searches documents and he makes treatments to provide relevant information to other users in the Network. This is similar as the peer-to-peer systems; unlike that, an element (user) have to manage automatically his data by creating a short view model of his most visited documents, and calculates his relative relevance about each one. The relative relevance is variable according each user, so the final relevance is calculated by the averaging of the elementary relevance of all users. Hence, the name of collaborative relevance. {\textcopyright} 2016 IEEE.}, doi = {10.1109/AICCSA.2016.7945827}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85021875857\&doi=10.1109\%2fAICCSA.2016.7945827\&partnerID=40\&md5=24987a90a9345c06f11af61bc9d9e4c3}, author = {Enaanai, A. and Doukkali, A.S. and Saif, I. and Moutachaouik, H. and Hain, M.} } @conference {Harbouche2017, title = {Dynamic coalitional matching game approach for fair and swift data-gathering in wireless body sensor networks}, booktitle = {Proceedings - 2017 International Conference on Wireless Networks and Mobile Communications, WINCOM 2017}, year = {2017}, note = {cited By 0}, abstract = {Wireless Sensor Networks are deployed in different fields of application to gather data on the monitored environment. The Wireless Body Sensor Network (WBSN) is a wireless sensor network designed to monitor a human body vital and environment parameters. The design and development of such WBSN systems for health monitoring have been motivated by costly healthcare and propelled by the development of miniature health monitoring devices. This paper presents the architecture design of a preventive health care monitoring system. This architecture is designed for monitoring multiple patients in a hospital. It is based on a set of mobile data collectors and static sensors for analysis of various patient{\textquoteright}s parameters. The data collectors need to cooperate together in order to gather the data from the sensor nodes. The point of this paper is how to dynamically and effectively appoint and deploy several data collectors in the hospital to gather the measured data in minimal time. We formulate the problem as a coalitional matching game between patients and data collectors, and we propose a patientdata collector association algorithm that ensures fairness and minimum total course in the stable matchings. {\textcopyright} 2017 IEEE.}, doi = {10.1109/WINCOM.2017.8238179}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85041451720\&doi=10.1109\%2fWINCOM.2017.8238179\&partnerID=40\&md5=44ef24b18e66b8fb24573d73db99025f}, author = {Harbouche, A. and Elmachkour, M. and Djedi, N. and Erradi, M. and Kobbane, A.} } @article {Saif2017210, title = {GENAUM: New semantic distributed search engine}, journal = {Journal of Mobile Multimedia}, volume = {13}, number = {3-4}, year = {2017}, note = {cited By 0}, pages = {210-221}, abstract = {The rapid development of services based on distributed architectures is now emerging as important items that transform mode of communication, and the exponential growth of the Web makes a strong pressure on technologies, for a regular improvement of performance, so it{\textquoteright}s irresistible to use distributed architectures and techniques for the search and information retrieval on the Web, to provide more relevant search result, in minimum possible time. This paper discuss some solutions researchers are working on, to make search engines more faster and more intelligent, specifically by considering the semantic context of users and documents, and the use of distributed architectures. This paper also presents the overall architecture of GENAUM; the collaborative, semantic and distributed search engine, based on a network of agents, which is the core part of the system. The functionality of GENAUM is spread across multiple agents, to fulfill user{\textquoteright}s performance expectations. At the end of this paper, some preliminary experimental results are presented, that attempts to test the user modeling process of GENAUM, using reference ontology. {\textcopyright} Rinton Press.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85040242169\&partnerID=40\&md5=21e9c1f654b188cfb9b0bcd523769494}, author = {Saif, I. and Doukkali, A.S. and Enaanai, A. and Benlahmar, E.H.} } @conference {Imgharene2017233, title = {Impact of agility on the business IT alignment}, booktitle = {BMSD 2017 - Proceedings of the 7th International Symposium on Business Modeling and Software Design}, year = {2017}, note = {cited By 0}, pages = {233-237}, abstract = {A strategic alignment with a strictly constant rhythm assumes stability. There are several factors that influence this stability. The strategic alignment must be evolutionary, long-term, and dynamic in spite of those factors. In our case we opted for the agility. Agility has a global impact on the internal and external environment of an organization. Agility concerns the future of the organization/company. It is this concept which became a standard for business models since the rhythm of the change in companies accelerates. The current article reflects this idea, by describing the nature of the relation between the factor of agility and the strategic alignment in the determination of various types of agility. Furthermore, we try to establish in this article if an aligned system can stay so, by transforming the company into an agile one. A transformation on all the levels of abstraction is going to maintain the alignment on the long term and will give an added value, and a way the changes can be detected in reality and be gradually integrated within the framework of the strategic alignment.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85032965360\&partnerID=40\&md5=34fa0b11e75ce25c1c8b110817e4bb83}, author = {Imgharene, K. and Doumi, K. and Baina, S.} } @article {Harbouche20171339, title = {Model driven flexible design of a wireless body sensor network for health monitoring}, journal = {Computer Networks}, volume = {129}, year = {2017}, note = {cited By 1}, pages = {1339-1351}, abstract = {The Wireless Body Sensor Network (WBSN) is a wireless network that is designed to allow communication among sensor nodes that are attached to a human body to monitor the body{\textquoteright}s vital parameters and environment. The design and development of such WBSN systems for health monitoring have received a large amount of attention recently, in research studies and in industry. This attention is mainly motivated by costly health care and by recent advances in the development of miniature health monitoring devices as well as emerging technologies, such as the Internet of Things (IoT), which contribute to the main challenges of 5G. The existence of an explicit approach to address the required software design and verification should be very beneficial for the construction and maintenance of such systems. This paper presents a preventive health care system that has a flexible design. The proposed system is based on an architecture that has heterogeneous nodes and provides both daily continuous monitoring as well as specific controls. We defined a model to describe the WBSN{\textquoteright}s global behavior. An important aspect of this work is that we propose a model-driven engineering (MDE) approach to address the derivation of each node{\textquoteright}s behavior in the WBSN from the WBSN global behavior. This approach allows developers to obtain a system design from the global specification of its requirement. To ensure the conformance of this design to its specification, the derived behaviors should be validated and verified before their deployment. In fact, formal methods are powerful tools for software engineers to verify the logical correctness of concurrent software at different levels of its life cycle. Model checking is one of the most powerful formal methods for verifying the logical correctness of such concurrent systems. In this work, we make use of a model checking approach that is based on a model transformation to validate the automatically derived behavior of a WBSN for health monitoring. This model-driven approach will check whether the derived system behaves correctly according to its global specification, while the objective is to increase the system{\textquoteright}s performance and QoS. This approach allows the developer to reason about a model of the global system rather than about the system itself. {\textcopyright} 2017 Elsevier B.V.}, doi = {10.1016/j.comnet.2017.06.014}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85022027303\&doi=10.1016\%2fj.comnet.2017.06.014\&partnerID=40\&md5=3d665e7ff240e8a6d9564857abf695da}, author = {Harbouche, A. and Djedi, N. and Erradi, M. and Ben-Othman, J. and Kobbane, A.} } @conference {Fezeu2017, title = {Safe and irrefutable decentralized communication: Bringing non-repudiation to mesh networks}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F129474}, year = {2017}, note = {cited By 0}, abstract = {Securing digital communications is a major preoccupation for industry and academia, and a great number of techniques have been successfully developed to achieve that goal. The predominant model for digital communication is that which relies on trusted third-parties, either as local servers or as cloud services. Meanwhile, emerging technologies such as internet-of-things are set to broadcast growing amounts of potentially sensitive information thereby making centralized architectures problematic for privacy and performance reasons and making decentralized networks ever more relevant. However, these third-parties play an important role in securing brokered communications and are essential in providing Authentication and Non-Repudiation according to current models. Clearly, such an approach cannot be used in peer-to-peer networks and there is need for a simple model applicable in fully decentralized networks to provide Non-Repudiation. This document proposes such a model, presents an implementation and discusses its application, particularly pertaining to implementing irrefutable trustless transaction mechanisms - similar to blockchain - in the realm of limited resources. {\textcopyright} 2017 Copyright is held by the owner/author(s). Publication rights licensed to ACM.}, doi = {10.1145/3090354.3090392}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028463840\&doi=10.1145\%2f3090354.3090392\&partnerID=40\&md5=00d345b203cd99bd20f6b7401577a263}, author = {Fezeu, H.K. and Djotio, T. and Thami, R.O.H.} } @conference { ISI:000389502600042, title = {ABAC Model for Collaborative Cloud Services}, booktitle = {Networked Systems, NETYS 2016}, series = {Lecture Notes in Computer Science}, volume = {9944}, year = {2016}, note = {4th International Conference on Networked Systems (NETYS), Marrakech, MOROCCO, MAY 18-20, 2016}, pages = {385}, isbn = {978-3-319-46140-3; 978-3-319-46139-7}, issn = {0302-9743}, author = {Madani, Mohamed Amine and Erradi, Mohammed}, editor = {Abdulla, PA and DelporteGallet, C} } @conference { ISI:000389502600019, title = {An Approach to Resolve NP-Hard Problems of Firewalls}, booktitle = {Networked Systems, NETYS 2016}, series = {Lecture Notes in Computer Science}, volume = {9944}, year = {2016}, note = {4th International Conference on Networked Systems (NETYS), Marrakech, MOROCCO, MAY 18-20, 2016}, pages = {229-243}, abstract = {Firewalls are a common solution to protect information systems from intrusions. In this paper, we apply an automata-based methodology to resolve several NP-Hard problems which have been shown in the literature to be fundamental for the study of firewall security policies. We also compute space and time complexities of our resolution methods.}, isbn = {978-3-319-46140-3; 978-3-319-46139-7}, issn = {0302-9743}, doi = {10.1007/978-3-319-46140-3\_19}, author = {Khoumsi, Ahmed and Erradi, Mohamed and Ayache, Meryeme and Krombi, Wadie}, editor = {Abdulla, PA and DelporteGallet, C} } @article {CarrillodeGea2016, title = {Are the expected benefits of requirements reuse hampered by distance? An experiment}, journal = {SpringerPlus}, volume = {5}, number = {1}, year = {2016}, note = {cited By 0}, abstract = {Background: Software development processes are often performed by distributed teams which may be separated by great distances. Global software development (GSD) has undergone a significant growth in recent years. The challenges concerning GSD are especially relevant to requirements engineering (RE). Stakeholders need to share a common ground, but there are many difficulties as regards the potentially variable interpretation of the requirements in different contexts. We posit that the application of requirements reuse techniques could alleviate this problem through the diminution of the number of requirements open to misinterpretation. Results: This paper presents a reuse-based approach with which to address RE in GSD, with special emphasis on specification techniques, namely parameterised requirements and traceability relationships. An experiment was carried out with the participation of 29 university students enrolled on a Computer Science and Engineering course. Two main scenarios that represented co-localisation and distribution in software development were portrayed by participants from Spain and Morocco. The global teams achieved a slightly better performance than the co-located teams as regards effectiveness, which could be a result of the worse productivity of the global teams in comparison to the co-located teams. Subjective perceptions were generally more positive in the case of the distributed teams (difficulty, speed and understanding), with the exception of quality. Conclusions: A theoretical model has been proposed as an evaluation framework with which to analyse, from the point of view of the factor of distance, the effect of requirements specification techniques on a set of performance and perception-based variables. The experiment utilised a new internationalisation requirements catalogue. None of the differences found between co-located and distributed teams were significant according to the outcome of our statistical tests. The well-known benefits of requirements reuse in traditional co-located projects could, therefore, also be expected in GSD projects. {\textcopyright} 2016, The Author(s).}, doi = {10.1186/s40064-016-3782-0}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85006395692\&doi=10.1186\%2fs40064-016-3782-0\&partnerID=40\&md5=9460f4e677fce457e990913a04d0898d}, author = {Carrillo de Gea, J.M.a and Nicol{\'a}s, J.a and Fern{\'a}ndez-Alem{\'a}n, J.L.a and Toval, A.a and Idri, A.b} } @article { ISI:000391839700001, title = {Are the expected benefits of requirements reuse hampered by distance? An experiment}, journal = {SPRINGERPLUS}, volume = {5}, year = {2016}, month = {DEC 20}, abstract = {Background: Software development processes are often performed by distributed teams which may be separated by great distances. Global software development (GSD) has undergone a significant growth in recent years. The challenges concerning GSD are especially relevant to requirements engineering (RE). Stakeholders need to share a common ground, but there are many difficulties as regards the potentially variable interpretation of the requirements in different contexts. We posit that the application of requirements reuse techniques could alleviate this problem through the diminution of the number of requirements open to misinterpretation. Results: This paper presents a reuse-based approach with which to address RE in GSD, with special emphasis on specification techniques, namely parameterised requirements and traceability relationships. An experiment was carried out with the participation of 29 university students enrolled on a Computer Science and Engineering course. Two main scenarios that represented co-localisation and distribution in software development were portrayed by participants from Spain and Morocco. The global teams achieved a slightly better performance than the co-located teams as regards effectiveness, which could be a result of the worse productivity of the global teams in comparison to the co-located teams. Subjective perceptions were generally more positive in the case of the distributed teams (difficulty, speed and understanding), with the exception of quality. Conclusions: A theoretical model has been proposed as an evaluation framework with which to analyse, from the point of view of the factor of distance, the effect of requirements specification techniques on a set of performance and perception-based variables. The experiment utilised a new internationalisation requirements catalogue. None of the differences found between co-located and distributed teams were significant according to the outcome of our statistical tests. The well-known benefits of requirements reuse in traditional co-located projects could, therefore, also be expected in GSD projects.}, issn = {2193-1801}, doi = {10.1186/s40064-016-3782-0}, author = {Carrillo de Gea, Juan M. and Nicolas, Joaquin and Fernandez-Aleman, Jose L. and Toval, Ambrosio and Idri, Ali} } @article { ISI:000372921700003, title = {Co-located and distributed natural-language requirements specification: traditional versus reuse-based techniques}, journal = {JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS}, volume = {28}, number = {3}, year = {2016}, month = {MAR}, pages = {205-227}, abstract = {{Requirements Engineering (RE) includes processes intended to elicit, analyse, specify and validate systems and software requirements throughout the software life cycle. Mastering the principles of RE is key to achieving the goals of better, cheaper and quicker systems and software development projects. It is also important to be prepared to work with remote teammates, as distributed and global projects are becoming more common. This paper presents an experiment with a total of 31 students from two universities in Spain and Morocco who were assigned to either a co-located or a distributed team. Both traditional and reuse-based requirements specification techniques were applied by the participants to produce requirements documents. Their outcomes were then analysed, and the approaches were compared from the point of view of their effect on a set of performance-based and perception-based variables in co-located and distributed settings. We found significant differences in only productivity (Z=-2.320}, issn = {2047-7473}, doi = {10.1002/smr.1772}, author = {Carrillo de Gea, Juan M. and Nicolas, Joaquin and Fernandez Aleman, Jose L. and Toval, Ambrosio and Ouhbi, Sofia and Idri, Ali} } @article {CarrilloDeGea2016205, title = {Co-located and distributed natural-language requirements specification: Traditional versus reuse-based techniques}, journal = {Journal of Software: Evolution and Process}, volume = {28}, number = {3}, year = {2016}, note = {cited By 1}, pages = {205-227}, abstract = {{Requirements Engineering (RE) includes processes intended to elicit, analyse, specify and validate systems and software requirements throughout the software life cycle. Mastering the principles of RE is key to achieving the goals of better, cheaper and quicker systems and software development projects. It is also important to be prepared to work with remote teammates, as distributed and global projects are becoming more common. This paper presents an experiment with a total of 31 students from two universities in Spain and Morocco who were assigned to either a co-located or a distributed team. Both traditional and reuse-based requirements specification techniques were applied by the participants to produce requirements documents. Their outcomes were then analysed, and the approaches were compared from the point of view of their effect on a set of performance-based and perception-based variables in co-located and distributed settings. We found significant differences in only productivity (Z = -2.320}, doi = {10.1002/smr.1772}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84977867180\&doi=10.1002\%2fsmr.1772\&partnerID=40\&md5=8d208a58af8dc0f155d3918e16591c20}, author = {Carrillo de Gea, J.M.a and Nicol{\~A}{\textexclamdown}s, J.a and Fern{\~A}{\textexclamdown}ndez Alem{\~A}{\textexclamdown}n, J.L.a and Toval, A.a and Ouhbi, S.b and Idri, A.b} } @article {11390487420160301, title = {Co-located and distributed natural-language requirements specification: traditional versus reuse-based techniques.}, journal = {Journal of Software: Evolution \& Process}, volume = {28}, number = {3}, year = {2016}, pages = {205 - 227}, abstract = {Requirements Engineering (RE) includes processes intended to elicit, analyse, specify and validate systems and software requirements throughout the software life cycle. Mastering the principles of RE is key to achieving the goals of better, cheaper and quicker systems and software development projects. It is also important to be prepared to work with remote teammates, as distributed and global projects are becoming more common. This paper presents an experiment with a total of 31 students from two universities in Spain and Morocco who were assigned to either a co-located or a distributed team. Both traditional and reuse-based requirements specification techniques were applied by the participants to produce requirements documents. Their outcomes were then analysed, and the approaches were compared from the point of view of their effect on a set of performance-based and perception-based variables in co-located and distributed settings. We found significant differences in only productivi}, keywords = {Computer software, Computer software development, experiment, global software development, internationalisation, Requirements engineering, requirements reuse, requirements specification, Software engineering, software engineering education, Specifications}, issn = {20477473}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=113904874\&site=ehost-live}, author = {de Gea, Juan M. Carrillo and Nicolas, Joaquin and Fernandez Aleman, Jose L. and Toval, Ambrosio and Ouhbi, Sofia and Idri, Ali} } @conference { ISI:000389502600039, title = {Deep Neural Networks for Medical Images}, booktitle = {Networked Systems, NETYS 2016}, series = {Lecture Notes in Computer Science}, volume = {9944}, year = {2016}, note = {4th International Conference on Networked Systems (NETYS), Marrakech, MOROCCO, MAY 18-20, 2016}, pages = {382}, isbn = {978-3-319-46140-3; 978-3-319-46139-7}, issn = {0302-9743}, author = {Elaalyani, Issam and Erradi, Mohammed}, editor = {Abdulla, PA and DelporteGallet, C} } @conference { ISI:000389502600020, title = {Hybrid Encryption Approach Using Dynamic Key Generation and Symmetric Key Algorithm for RFID Systems}, booktitle = {Networked Systems, NETYS 2016}, series = {Lecture Notes in Computer Science}, volume = {9944}, year = {2016}, note = {4th International Conference on Networked Systems (NETYS), Marrakech, MOROCCO, MAY 18-20, 2016}, pages = {244-249}, abstract = {The security of RFID systems become an important subject especially for low cost RFID tags. A lot of Cryptographic algorithms were proposed to insure the security and in the same time meet the resource limitations. In this paper, we proposed a hybrid cryptographic approach as symmetric key encryption technique which generate the key dynamically, together with integrity check parameters. The generation of key stream follows the chained approach, beginning from the initial key pre-shared. As a result, the computational complexity will be reduced as well as increase performance.}, isbn = {978-3-319-46140-3; 978-3-319-46139-7}, issn = {0302-9743}, doi = {10.1007/978-3-319-46140-3\_20}, author = {Labbi, Zouheir and Maarof, Ahmed and Senhadji, Mohamed and Belkasmi, Mostafa}, editor = {Abdulla, PA and DelporteGallet, C} } @conference { ISI:000389502600037, title = {Hybrid Homomorphic Encryption for Cloud Privacy}, booktitle = {Networked Systems, NETYS 2016}, series = {Lecture Notes in Computer Science}, volume = {9944}, year = {2016}, note = {4th International Conference on Networked Systems (NETYS), Marrakech, MOROCCO, MAY 18-20, 2016}, pages = {380}, isbn = {978-3-319-46140-3; 978-3-319-46139-7}, issn = {0302-9743}, author = {Bensitel, Yasmina and Rahal, Romadi}, editor = {Abdulla, PA and DelporteGallet, C} } @conference { ISI:000390313000030, title = {Integrating SysML with simulation environments (Simulink) by model transformation approach}, booktitle = {2016 IEEE 25TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE)}, year = {2016}, note = {25th IEEE International Conference on Enabling Technologies - Infrastructure for Collaborative Enterprises (WETICE), Paris, FRANCE, JUN 13-15, 2016}, pages = {148-150}, publisher = {IEEE; IEEE Comp Soc Techl Council Software Engn; West Virginia Univ, CERC; Paris Sch Business; CNRS Samovar Res Lab; Telecom SudParis, Inst Mines Telecom; Paris Sch Business Res Lab; Olab Dynam; eFrei Groupe}, organization = {IEEE; IEEE Comp Soc Techl Council Software Engn; West Virginia Univ, CERC; Paris Sch Business; CNRS Samovar Res Lab; Telecom SudParis, Inst Mines Telecom; Paris Sch Business Res Lab; Olab Dynam; eFrei Groupe}, abstract = {In system-level design, descriptive system models seem to be insufficient in order to perform a system verification which fulfils various stakeholders requirements. This fact is accentuated by the increasing complexity of system engineering projects and, as a consequence, the difficulties to deal with both their coordination and traceability. Even if SysML (System Modeling Language) is considered as a flexible and standard tool for system engineering, using only descriptive models are insufficient for system behavior verifications. To deal with this concern, simulation environments (i.e. MATLAB/Simulink) allow verifying if the system preliminary design satisfies requirements or not. As a consequence, various research works have been centered on combining the potential of both SysML modeling and simulation tools. This paper proposes an integration approach based on metamodeling and model transformations to generate Simulink models from SysML diagrams. This approach is handled by models and modern techniques of MDE (ModelDriven Engineering).}, isbn = {978-1-5090-1663-1}, doi = {10.1109/WETICE.2016.39}, author = {Chabibi, Bassim and Douche, Abdelilah and Anwar, Adil and Nassar, Mahmoud}, editor = {Reddy, SM and Gaaloul, W} } @conference {Chabibi2016148, title = {Integrating SysML with simulation environments (Simulink) by model transformation approach}, booktitle = {Proceedings - 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2016}, year = {2016}, note = {cited By 0}, pages = {148-150}, abstract = {In system-level design, descriptive system models seem to be insufficient in order to perform a system verification which fulfils various stakeholders0 requirements. This fact is accentuated by the increasing complexity of system engineering projects and, as a consequence, the difficulties to deal with both their coordination and trace ability. Even if SysML (System Modeling Language) is considered as a flexible and standard tool for system engineering, using only descriptive models are insufficient for system behavior verifications. To deal with this concern, simulation environments (i.e. MATLAB/Simulink) allow verifying if the system preliminary design satisfies requirements or not. As a consequence, various research works have been centered on combining the potential of both SysML modeling and simulation tools. This paper proposes an integration approach based on metamodeling and model transformations to generate Simulink models from SysML diagrams. This approach is handled by models and modern techniques of MDE (Model-Driven Engineering). {\textcopyright} 2016 IEEE.}, doi = {10.1109/WETICE.2016.39}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84983801501\&doi=10.1109\%2fWETICE.2016.39\&partnerID=40\&md5=52ebc18a65b73155173099045a8b3ee2}, author = {Chabibi, B.a and Douche, A.b and Anwar, A.b and Nassar, M.a} } @conference { ISI:000389502600004, title = {Nearest Neighbors Graph Construction: Peer Sampling to the Rescue}, booktitle = {Networked Systems, NETYS 2016}, series = {Lecture Notes in Computer Science}, volume = {9944}, year = {2016}, note = {4th International Conference on Networked Systems (NETYS), Marrakech, MOROCCO, MAY 18-20, 2016}, pages = {48-62}, abstract = {In this paper, we propose an efficient KNN service, called KPS (KNN-Peer-Sampling). The KPS service can be used in various contexts e.g. recommendation systems, information retrieval and data mining. KPS borrows concepts from P2P gossip-based clustering protocols to provide a localized and efficient KNN computation in large-scale systems. KPS is a sampling-based iterative approach, combining randomness, to provide serendipity and avoid local minimum, and clustering, to ensure fast convergence. We compare KPS against the state of the art KNN centralized computation algorithm NNDescent, on multiple datasets. The experiments confirm the efficiency of KPS over NNDescent: KPS improves significantly on the computational cost while converging quickly to a close to optimal KNN graph. For instance, the cost, expressed in number of pairwise similarity computations, is reduced by approximate to 23\% and approximate to 49\% to construct high quality KNN graphs for Jester and MovieLens datasets, respectively. In addition, the randomized nature of KPS ensures eventual convergence, not always achieved with NNDescent.}, isbn = {978-3-319-46140-3; 978-3-319-46139-7}, issn = {0302-9743}, doi = {10.1007/978-3-319-46140-3\_4}, author = {Benkaouz, Yahya and Erradi, Mohammed and Kermarrec, Anne-Marie}, editor = {Abdulla, PA and DelporteGallet, C} } @conference { ISI:000389502600045, title = {SNA: Detecting Influencers over Social Networks}, booktitle = {Networked Systems, NETYS 2016}, series = {Lecture Notes in Computer Science}, volume = {9944}, year = {2016}, note = {4th International Conference on Networked Systems (NETYS), Marrakech, MOROCCO, MAY 18-20, 2016}, pages = {388}, isbn = {978-3-319-46140-3; 978-3-319-46139-7}, issn = {0302-9743}, author = {Aghmadi, Ali and Erradi, Mohammed and Kobbane, Abdellatif}, editor = {Abdulla, PA and DelporteGallet, C} } @article { ISI:000391824800005, title = {Software project management tools in global software development: a systematic mapping study}, journal = {SPRINGERPLUS}, volume = {5}, year = {2016}, month = {NOV 24}, abstract = {Global software development (GSD) which is a growing trend in the software industry is characterized by a highly distributed environment. Performing software project management (SPM) in such conditions implies the need to overcome new limitations resulting from cultural, temporal and geographic separation. The aim of this research is to discover and classify the various tools mentioned in literature that provide GSD project managers with support and to identify in what way they support group interaction. A systematic mapping study has been performed by means of automatic searches in five sources. We have then synthesized the data extracted and presented the results of this study. A total of 102 tools were identified as being used in SPM activities in GSD. We have classified these tools, according to the software life cycle process on which they focus and how they support the 3C collaboration model (communication, coordination and cooperation). The majority of the tools found are standalone tools (77\%). A small number of platforms (8\%) also offer a set of interacting tools that cover the software development lifecycle. Results also indicate that SPM areas in GSD are not adequately supported by corresponding tools and deserve more attention from tool builders.}, issn = {2193-1801}, doi = {10.1186/s40064-016-3670-7}, author = {Yasser Chadli, Saad and Idri, Ali and Nicolas Ros, Joaquin and Luis Fernandez-Aleman, Jose and Carrillo de Gea, Juan M. and Toval, Ambrosio} } @article {Chadli2016, title = {Software project management tools in global software development: a systematic mapping study}, journal = {SpringerPlus}, volume = {5}, number = {1}, year = {2016}, note = {cited By 0}, abstract = {Global software development (GSD) which is a growing trend in the software industry is characterized by a highly distributed environment. Performing software project management (SPM) in such conditions implies the need to overcome new limitations resulting from cultural, temporal and geographic separation. The aim of this research is to discover and classify the various tools mentioned in literature that provide GSD project managers with support and to identify in what way they support group interaction. A systematic mapping study has been performed by means of automatic searches in five sources. We have then synthesized the data extracted and presented the results of this study. A total of 102 tools were identified as being used in SPM activities in GSD. We have classified these tools, according to the software life cycle process on which they focus and how they support the 3C collaboration model (communication, coordination and cooperation). The majority of the tools found are standalone tools (77\%). A small number of platforms (8\%) also offer a set of interacting tools that cover the software development lifecycle. Results also indicate that SPM areas in GSD are not adequately supported by corresponding tools and deserve more attention from tool builders. {\textcopyright} 2016, The Author(s).}, doi = {10.1186/s40064-016-3670-7}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84996484137\&doi=10.1186\%2fs40064-016-3670-7\&partnerID=40\&md5=303aaf83e70281377e2a1497382f7f9f}, author = {Chadli, S.Y.a and Idri, A.a and Ros, J.N.b and Fern{\'a}ndez-Alem{\'a}n, J.L.b and de Gea, J.M.C.b and Toval, A.b} } @article {Faqihi2016215, title = {Toward a new treatment approach of learning content in cloud era}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {83}, number = {2}, year = {2016}, note = {cited By 0}, pages = {215-226}, abstract = {Nowadays, Technological development of human beings is extremely related to information. This is proved on the manners and areas that life was computerized such as in trade, government services, medicine, education, learning etc.Nevertheless, the fast development of designing information systems has created several sub-systems in multiple contexts which are conceived by different communities and totally dispersed geographically but all undertaking the same area. Neither contents nor services that these subsystems are made are certainly in the same technology environments. In our research, the learning field goes through many key steps. Actually, new revolutionized practices were implemented due to technology innovation, so transition from classical learning towards distance learning or d-learning is more than possible, it{\textquoteright}s desired. Consequently, this phenomenon has created more opportunities for learners and teachers but also several challenges; in many cases, the multitude of standards hinders the learner migration from a learning environment to another, so it hampers its learning development.In this paper, we will propose a framework of interoperability based on three levels. Since we are interested in semantic level, we propose a process of interoperability of learning content in the cloud era based on a global ontology. Like recommendation systems, we will start our process by acquisition, then validation and finally structuration of the learning content. This structuration way will give to both actors of learning environment a certain flexibility and access to other resources in Cloud environment. The basic principle is to collect content, to enrich it and to make it interoperable by using unified approach in star based on a comprehensive ontology. Our work is a part of MADAR project which is {\textquotedblleft}Learning Architecture Adapted to Mobile Technology{\textquotedblright}. {\textcopyright} 2005 - 2015 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84955166049\&partnerID=40\&md5=211c373530d79c2ab171cd1f8c4a6833}, author = {Faqihi, B. and Daoudi, N. and Ajhoun, R.} } @conference {Benqatla201567, title = {Actor network theory as a collaborative mode: The contribution of game theory in the interessement phase}, booktitle = {Proceedings of the 2015 5th World Congress on Information and Communication Technologies, WICT 2015}, year = {2015}, note = {cited By 0}, pages = {67-72}, abstract = {Global Governance of projects requires cooperation between several actors. In general, such cooperation is ensured by building network collaboration between entities who want to collaborate. In spite of the existence of a number of works interested in collaboration network, only few of them were focused on how to construct a network. In this paper, we address this topic through Actor Network Theory. In particular way, we analyze interessement phase of ANT from a cooperative game point of view. Indeed, it{\textquoteright}s about negotiations between actors involved in business project. Our objective is to propose an approach of network establishment, by inciting actors through cost savings. For that, we use Shapley Value to answer the question: Which coalitions are likely to form in order to ensure best cost-saving objectives in ANT mode of collaboration? We propose also a graphical tool for visualizing networks and simulating their evolution. {\textcopyright} 2015 IEEE.}, doi = {10.1109/WICT.2015.7489646}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979763394\&doi=10.1109\%2fWICT.2015.7489646\&partnerID=40\&md5=653e269295ade9b28ddb4c4a020e5290}, author = {Benqatla, M.S. and Dikra, C. and Bounabat, B.} } @conference { ISI:000383221800012, title = {ACTOR NETWORK THEORY AS A COLLABORATIVE MODE: THE CONTRIBUTION OF GAME THEORY IN THE INTERESSEMENT PHASE}, booktitle = {PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT)}, year = {2015}, note = {5th World Congress on Information and Communication Technologies (WICT), Marrakesh, MOROCCO, DEC 14-16, 2015}, pages = {67-72}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, abstract = {Global Governance of projects requires cooperation between several actors. In general, such cooperation is ensured by building network collaboration between entities who want to collaborate. In spite of the existence of a number of works interested in collaboration network, only few of them were focused on how to construct a network. In this paper, we address this topic through Actor Network Theory. In particular way, we analyze interessement phase of ANT from a cooperative game point of view. Indeed, it{\textquoteright}s about negotiations between actors involved in business project. Our objective is to propose an approach of network establishment, by inciting actors through cost savings. For that, we use Shapley Value to answer the question: Which coalitions are likely to form in order to ensure best cost-saving objectives in ANT mode of collaboration? We propose also a graphical tool for visualizing networks and simulating their evolution.}, isbn = {978-1-4673-8712-5}, author = {Benqatla, Mohammed Salim and Dikra, Chikhaoui and Bounabat, Bouchaib}, editor = {Abrahim, A and Alimi, AM and Haqiq, A and Karray, H and Mousannif, H and BenHalima, M and Choo, YH and Ma, K} } @conference {Nouinou2015152, title = {Big data: Measuring how information technology can improve the economic growth and better life}, booktitle = {Proceedings of the 2015 5th World Congress on Information and Communication Technologies, WICT 2015}, year = {2015}, note = {cited By 0}, pages = {152-159}, abstract = {Today data are equivalent of oil or gold, but Succeeding with big data requires more than just data. Data-based value creation requires the identification of a framework from which predictions can be deducted and decisions can be made. Lot of index has been developed to measure the state of development of countries whether economic growth, ICT penetration or Human development. The purpose of the measuring was to assess policy implications and economic growth around the globe as well as share best practices. In this paper we are going to compare the most wildly tools of measurement of economic competiveness, Network readiness, Human development and world press freedom. Those four domains are judged to be the pillars of well-being and good live of a Human. In the second part of this paper, we examine the hypothesis that ICT penetration has positive effects on economic growth, well-being and a better life of a Human. We use the system Generalized Method of Moment for dynamic panel data analysis to extract the causal link between ICT penetration and growth. {\textcopyright} 2015 IEEE.}, doi = {10.1109/WICT.2015.7489663}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979738903\&doi=10.1109\%2fWICT.2015.7489663\&partnerID=40\&md5=e0578db8132db6f390ffd1046c772f60}, author = {Nouinou, S. and Razafimampianina, R.M. and Regragui, B. and Doukkali, A.S.} } @conference { ISI:000383221800027, title = {Big Data: Measuring How Information Technology Can Improve the Economic Growth and Better Life}, booktitle = {PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT)}, year = {2015}, note = {5th World Congress on Information and Communication Technologies (WICT), Marrakesh, MOROCCO, DEC 14-16, 2015}, pages = {152-159}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, abstract = {Today data are equivalent of oil or gold, but Succeeding with big data requires more than just data. Data-based value creation requires the identification of a framework from which predictions can be deducted and decisions can be made. Lot of index has been developed to measure the state of development of countries whether economic growth, ICT penetration or Human development. The purpose of the measuring was to assess policy implications and economic growth around the globe as well as share best practices. In this paper we are going to compare the most wildly tools of measurement of economic competiveness, Network readiness, Human development and world press freedom. Those four domains are judged to be the pillars of well-being and good live of a Human. In the second part of this paper, we examine the hypothesis that ICT penetration has positive effects on economic growth, well-being and a better life of a Human. We use the system Generalized Method of Moment for dynamic panel data analysis to extract the causal link between ICT penetration and growth.}, isbn = {978-1-4673-8712-5}, author = {Nouinou, Soumaya and Razafimampianina, Rindra M. and Regragui, Boubker and Doukkali, Abdelaziz S.}, editor = {Abrahim, A and Alimi, AM and Haqiq, A and Karray, H and Mousannif, H and BenHalima, M and Choo, YH and Ma, K} } @conference { ISI:000380570700061, title = {Designing ReDy Distributed Systems}, booktitle = {2015 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING}, year = {2015}, note = {IEEE International Conference on Autonomic Computing, Grenoble, FRANCE, JUL 07-10, 2015}, pages = {331-336}, publisher = {IEEE; usenix; Univ Joseph Fourier; Telecom ParisTech; Spec; GRENOBLE ALPLES METROPOLE; VILLE CRENOBOLE; MINALOGIC; CPS; IEEE COMPUTER SOC; hp; Google; orange; FOCAS; INRIA INVENTORS DIGITAL WORLD}, organization = {IEEE; usenix; Univ Joseph Fourier; Telecom ParisTech; Spec; GRENOBLE ALPLES METROPOLE; VILLE CRENOBOLE; MINALOGIC; CPS; IEEE COMPUTER SOC; hp; Google; orange; FOCAS; INRIA INVENTORS DIGITAL WORLD}, abstract = {Distributed systems are largely present and deployed in recent applications. Several systems have common basic requirements, which motivates to adapt reusable solutions for each family of systems. In this paper, we focus on distributed systems designed for large-scale applications requiring a high degree of Reliability and Dynamicity (ReDy distributed systems). We propose a basic architecture for this family of systems and a design solution to guarantee the scalability of the system, the fault tolerance, and a highly dynamic membership management. The studied systems range from hybrid architecture, on which we combine centralized and decentralized solutions.}, isbn = {978-1-4673-6971-8}, doi = {10.1109/ICAC.2015.63}, author = {Hafdi, Kaoutar and Kriouile, Abdelaziz}, editor = {Lalanda, P and Diaconescu, A and Cherkasova, L and Kounev, S} } @conference {Baya2015439, title = {Dynamic large scale product lines through modularization approach}, booktitle = {ICEIS 2015 - 17th International Conference on Enterprise Information Systems, Proceedings}, volume = {2}, year = {2015}, note = {cited By 0}, pages = {439-444}, abstract = {Software product line (SPL) now faces major scalability problems because of technical advances of the past decades. However, using traditional approaches of software engineering to deal with this increasing scalability is not feasible. Therefore, new techniques must be provided in order to resolve scalability issues. For such a purpose, we propose through this paper a modularization approach according to two dimensions: In the first dimension we use Island algorithm in order to obtain structural modules. In the second dimension we decompose obtained modules according to features binding time so as to obtain dynamic submodules. Copyright {\textcopyright} 2015 SCITEPRESS - Science and Technology Publications.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84939529035\&partnerID=40\&md5=1e1405f89ebaaff933ee12e07dcfc995}, author = {Baya, A. and El Asri, B. and Dehmouch, I. and Mcharfi, Z.} } @conference { ISI:000361005100095, title = {The impact of data accuracy on user-perceived business service{\textquoteright}s quality}, booktitle = {PROCEEDINGS OF THE 2015 10TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2015)}, year = {2015}, note = {10th Iberian Conference on Information Systems and Technologies (CISTI), Univ Aveiro, Sch Technol \& Agueda Management, Agueda, PORTUGAL, JUN 17-20, 2015}, publisher = {Iberian Assoc Syst Informat Technol}, organization = {Iberian Assoc Syst Informat Technol}, abstract = {As business processes have become increasingly automated, data quality becomes the limiting and penalizing factor in the business service{\textquoteright}s overall quality, and thus impacts customer satisfaction, whether it is an end-user, an institutional partner or a regulatory authority. The available research that is related to business services{\textquoteright} quality paid very little attention to the impact of poor data quality on good services delivery and customer satisfaction, and to the calculation of the optimal level of data quality. The aim of this paper is to present a customer-oriented approach that will help to understand and analyze how an organization business service{\textquoteright}s overall quality is linked to the quality of upstream business processes and of data objects in use. This paper also introduces a calculation framework that allows the identification of an optimal level of data quality - data accuracy dimension in the case of this paper - taking into account the business processes{\textquoteright} execution accuracy and data accuracy.}, author = {Belhiah, Meryam and Bounabat, Bouchaib and Achchab, Said}, editor = {Rocha, A and Dias, GP and Martins, A and Reis, LP and Cota, MP} } @conference { ISI:000380620300095, title = {The impact of data accuracy on user-perceived business service{\textquoteright}s quality}, booktitle = {2015 10TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI)}, series = {Iberian Conference on Information Systems and Technologies}, year = {2015}, note = {10th Iberian Conference on Information Systems and Technologies (CISTI), Univ Aveiro, Sch Technol \& Agueda Management, Agueda, PORTUGAL, JUN 17-20, 2015}, publisher = {Iberian Assoc Syst Informat Technol}, organization = {Iberian Assoc Syst Informat Technol}, abstract = {As business processes have become increasingly automated, data quality becomes the limiting and penalizing factor in the business service{\textquoteright}s overall quality, and thus impacts customer satisfaction, whether it is an end-user, an institutional partner or a regulatory authority. The available research that is related to business services{\textquoteright} quality paid very little attention to the impact of poor data quality on good services delivery and customer satisfaction, and to the calculation of the optimal level of data quality. The aim of this paper is to present a customer-oriented approach that will help to understand and analyze how an organization business service{\textquoteright}s overall quality is linked to the quality of upstream business processes and of data objects in use. This paper also introduces a calculation framework that allows the identification of an optimal level of data quality - data accuracy dimension in the case of this paper - taking into account the business processes{\textquoteright} execution accuracy and data accuracy.}, isbn = {978-1-4799-8330-8}, issn = {2166-0727}, author = {Belhiah, Meryam and Bounabat, Bouchaib and Achchab, Said}, editor = {Rocha, A and Dias, GP and Martins, A and Reis, LP and Cota, MP} } @conference { ISI:000375089700036, title = {Measuring the Impact of Traceability on the Cost of Software Product Lines Using COPLIMO}, booktitle = {PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT 2015)}, year = {2015}, note = {1st International Conference on Electrical and Information Technologies (ICEIT), Marrakech, MOROCCO, MAR 25-27, 2015}, pages = {192-197}, abstract = {Tracing helps assuring product quality, especially in large and complex systems such as Software Product Lines, where numerous artifacts and documents need to be linked and managed. Unfortunately, engineers and project managers rarely accord sufficient attention and importance to this approach, and adopt a traceability implementation strategy. This is due to its complexity and to the difficulties faced when implementing trace links especially costs that tracing can generates in short term. As we strongly believe that a quantitative estimation of the impact of traceability on Software Product Line{\textquoteright}s cost can help better understanding its usefulness, we present in this paper an analysis of this issue based on COPLIMO cost estimation model. The analysis shows that implementing trace links while developing the Software Product Line generates additional costs, but helps reducing them as the Product Line is used.}, isbn = {978-1-4799-7479-5}, author = {Mcharfi, Zineb and El Asri, Bouchra and Dehmouch, Ram and Kriouile, Abdelaziz}, editor = {Essaaidi, M and ElHani, S} } @conference {McHarfi2015192, title = {Measuring the impact of traceability on the cost of Software Product Lines using COPLIMO}, booktitle = {Proceedings of 2015 International Conference on Electrical and Information Technologies, ICEIT 2015}, year = {2015}, note = {cited By 0}, pages = {192-197}, abstract = {Tracing helps assuring product quality, especially in large and complex systems such as Software Product Lines, where numerous artifacts and documents need to be linked and managed. Unfortunately, engineers and project managers rarely accord sufficient attention and importance to this approach, and adopt a traceability implementation strategy. This is due to its complexity and to the difficulties faced when implementing trace links especially costs that tracing can generates in short term. As we strongly believe that a quantitative estimation of the impact of traceability on Software Product Line{\textquoteright}s cost can help better understanding its usefulness, we present in this paper an analysis of this issue based on COPLIMO cost estimation model. The analysis shows that implementing trace links while developing the Software Product Line generates additional costs, but helps reducing them as the Product Line is used. {\textcopyright} 2015 IEEE.}, doi = {10.1109/EITech.2015.7162966}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84945277932\&doi=10.1109\%2fEITech.2015.7162966\&partnerID=40\&md5=6b5da17de43106300a775fd869ed064e}, author = {Mcharfi, Z. and El Asri, B. and Dehmouch, I. and Kriouile, A.} } @conference {Dari2015, title = {An overview of smart grid cyber-security state of the art study}, booktitle = {Proceedings of 2015 IEEE International Renewable and Sustainable Energy Conference, IRSEC 2015}, year = {2015}, note = {cited By 0}, abstract = {Smart Grid is the most outstanding engineering achievement of the 21st century in power systems. This is an emerging technology that is revolutionizing the conventional electric grid by providing new services based mainly on information Communication technology (ICT), which is considered to be its main enabler. Besides the different opportunities and advantages offered by ICT, Smart Grid suffers from its inherent challenges, especially, at the level of cyber-security. Consequently, there are several security threats that may affect Smart Grid. These can be divided into three categories, namely, people and policy threats, platform threats and network threats. To address these threats several approaches and mechanisms were developed based on cryptographic methods, authentication protocols and firewalls. This paper is dedicated to an overview study on Smart Grid Cyber-security challenges and to the different approaches available to address the different security threats. {\textcopyright} 2015 IEEE.}, doi = {10.1109/IRSEC.2015.7455097}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84968561580\&doi=10.1109\%2fIRSEC.2015.7455097\&partnerID=40\&md5=e6da9a053a127977dfb75b7241de4cb0}, author = {Dari, E.Y.a and Essaaidi, M.b} } @conference { ISI:000382162300175, title = {An Overview of Smart Grid Cyber-Security State of The Art Study}, booktitle = {PROCEEDINGS OF 2015 3RD IEEE INTERNATIONAL RENEWABLE AND SUSTAINABLE ENERGY CONFERENCE (IRSEC{\textquoteright}15)}, year = {2015}, note = {3rd IEEE International Renewable and Sustainable Energy Conference (IRSEC), Marrakech, MOROCCO, DEC 10-13, 2015}, pages = {817-823}, publisher = {IEEE}, organization = {IEEE}, abstract = {Smart Grid is the most outstanding engineering achievement of the 21st century in power systems. This is an emerging technology that is revolutionizing the conventional electric grid by providing new services based mainly on information Communication technology (ICT), which is considered to be its main enabler. Besides the different opportunities and advantages offered by ICT, Smart Grid suffers from its inherent challenges, especially, at the level of cyber-security. Consequently, there are several security threats that may affect Smart Grid. These can be divided into three categories, namely, people and policy threats, platform threats and network threats. To address these threats several approaches and mechanisms were developed based on cryptographic methods, authentication protocols and firewalls. This paper is dedicated to an overview study on Smart Grid Cyber-security challenges and to the different approaches available to address the different security threats.}, isbn = {978-1-4673-7894-9}, author = {Dari, El Yazid and Essaaidi, Mohamed}, editor = {Essaaidi, M and Zaz, Y} } @conference { ISI:000380407100015, title = {An Overview of Variability Management in Cloud Services}, booktitle = {2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15)}, year = {2015}, note = {International Conference on Cloud Computing Technologies and Applications (CloudTech), Marrakech, MOROCCO, JUN 02-04, 2015}, pages = {138-142}, abstract = {The Cloud Computing paradigm has enabled the multitenancy architectural approach in Cloud applications. In a multitenant application, one single instance is shared by many tenants (users). Since each client has its own and particular requirements and context, that are exposed to change in time, the process of realizing customizable and adaptable services becomes complex and difficult to handle. Handling variability has been subject of many research works in the domain of Service Oriented Computing, while less interest was given to variability in Cloud services. Therefore, managing variability in Cloud applications can take benefit from related works in service-oriented computing. In this paper, we present an overview of variability management in Cloud applications, in order to assess the pertinence of the different approaches proposed to tackle this issue.}, isbn = {978-1-4673-8149-9}, author = {Aouzal, Khadija and Hafiddi, Hatim and Dahchour, Mohamed} } @conference {Aouzal2015, title = {An overview of variability management in cloud services}, booktitle = {Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015}, year = {2015}, note = {cited By 0}, abstract = {The Cloud Computing paradigm has enabled the multi-tenancy architectural approach in Cloud applications. In a multi-tenant application, one single instance is shared by many tenants (users). Since each client has its own and particular requirements and context, that are exposed to change in time, the process of realizing customizable and adaptable services becomes complex and difficult to handle. Handling variability has been subject of many research works in the domain of Service Oriented Computing, while less interest was given to variability in Cloud services. Therefore, managing variability in Cloud applications can take benefit from related works in service-oriented computing. In this paper, we present an overview of variability management in Cloud applications, in order to assess the pertinence of the different approaches proposed to tackle this issue. {\textcopyright} 2015 IEEE.}, doi = {10.1109/CloudTech.2015.7336976}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962861131\&doi=10.1109\%2fCloudTech.2015.7336976\&partnerID=40\&md5=08685792a476e627b2fe63ca5f3f1d63}, author = {Aouzal, K.a and Hafiddi, H.a b and Dahchour, M.a} } @conference { ISI:000383221800017, title = {A preliminary study on indicator framework for enterprise, based on COBIT 5 processes and SOA approach}, booktitle = {PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT)}, year = {2015}, note = {5th World Congress on Information and Communication Technologies (WICT), Marrakesh, MOROCCO, DEC 14-16, 2015}, pages = {95-100}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; Lab Res Grp Intelligent Machines; MIR Labs}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; Lab Res Grp Intelligent Machines; MIR Labs}, abstract = {Organizations become dependent on Information Technology (IT) to fulfill their corporate aims, meet their business needs and deliver value to customers. For effective and efficient utilization of IT, we intend to contribute to the alignment between IT and organizational strategies. The challenge is to make the enterprise and its Information System (IS) as responsive as possible within the regard to changes in enterprise while taking into account the enterprise operational performance. When a change happens or a new opportunity comes, organizations do not know which assets are linked to which business processes and which services, especially IT services, to bring up first and which can wait until later. Our principal aim is to propose an indicator framework to track and control business-IT alignment. However, this paper is a preliminary study on this framework. We are inspired by COBIT 5 processes as indicators and believe that the Service-Oriented Architecture (SOA) applied to these processes interlinks and can interact well the different processes. The validity and applicability of our theoretical study will be evaluated for future work.}, isbn = {978-1-4673-8712-5}, author = {Razafimampianina, Rindra M. and Nouinou, Soumaya and Doukkali, Abdelaziz S. and Regragui, Boubker}, editor = {Abrahim, A and Alimi, AM and Haqiq, A and Karray, H and Mousannif, H and BenHalima, M and Choo, YH and Ma, K} } @conference {Razafimampianina201595, title = {A preliminary study on indicator framework for enterprise, based on COBIT 5 processes and SOA approach}, booktitle = {Proceedings of the 2015 5th World Congress on Information and Communication Technologies, WICT 2015}, year = {2015}, note = {cited By 0}, pages = {95-100}, abstract = {Organizations become dependent on Information Technology (IT) to fulfill their corporate aims, meet their business needs and deliver value to customers. For effective and efficient utilization of IT, we intend to contribute to the alignment between IT and organizational strategies. The challenge is to make the enterprise and its Information System (IS) as responsive as possible within the regard to changes in enterprise while taking into account the enterprise operational performance. When a change happens or a new opportunity comes, organizations do not know which assets are linked to which business processes and which services, especially IT services, to bring up first and which can wait until later. Our principal aim is to propose an indicator framework to track and control business-IT alignment. However, this paper is a preliminary study on this framework. We are inspired by COBIT 5 processes as indicators and believe that the Service-Oriented Architecture (SOA) applied to these processes interlinks and can interact well the different processes. The validity and applicability of our theoretical study will be evaluated for future work. {\textcopyright} 2015 IEEE.}, doi = {10.1109/WICT.2015.7489652}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979761850\&doi=10.1109\%2fWICT.2015.7489652\&partnerID=40\&md5=1edfd0e5a575bd0443e4ef7a8c81b06a}, author = {Razafimampianina, R.M. and Nouinou, S. and Doukkali, A.S. and Regragui, B.} } @conference {Mcharfi2015463, title = {Return on investment of software product line traceability in the short, mid and long term}, booktitle = {ICEIS 2015 - 17th International Conference on Enterprise Information Systems, Proceedings}, volume = {2}, year = {2015}, note = {cited By 1}, pages = {463-468}, abstract = {Several works discuss tracing in Software Product Lines from a technical and architectural points of view, by proposing methods to implement traceability in the system. However, before discussing this field of traceability, we first need to prove the profitability of integrating such approach in the Product Line. Therefore, we bring in this paper a quantitative analysis on how traceability can impact the Return on Investment of a Software Product Line, and in which conditions, in terms of number of products and SPL phase, can tracing be profitable. We compare the results of a generic Software Product Line estimation model, COPLIMO, and our model METra-SPL. Our analysis shows that introducing traceability costs when constructing the Product Line, but can be profit making in the long term, especially in maintenance phase, starting from 2 products to generate. Copyright {\textcopyright} 2015 SCITEPRESS - Science and Technology Publications.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84939540877\&partnerID=40\&md5=096733b1c1fcce03456eb2b99341140b}, author = {Mcharfi, Z. and El Asri, B. and Dehmouch, I. and Baya, A. and Kriouile, A.} } @article { ISI:000348881600008, title = {Visual contact with catadioptric cameras}, journal = {ROBOTICS AND AUTONOMOUS SYSTEMS}, volume = {64}, year = {2015}, month = {FEB}, pages = {100-119}, abstract = {Time to contact or time to collision (TTC) is utmost important information for animals as well as for mobile robots because it enables them to avoid obstacles; it is a convenient way to analyze the surrounding environment. The problem of TTC estimation is largely discussed in perspective images. Although a lot of works have shown the interest of omnidirectional camera for robotic applications such as localization, motion, monitoring, few works use omnidirectional images to compute the TTC. In this paper, we show that TTC can be also estimated on catadioptric images. We present two approaches for TTC estimation using directly or indirectly the optical flow based on de-rotation strategy. The first, called {\textquoteleft}{\textquoteleft}gradient based TTC{{\textquoteright}{\textquoteright}}, is simple, fast and it does not need an explicit estimation of the optical flow. Nevertheless, this method cannot provide a TTC on each pixel, valid only for para-catadioptric sensors and requires an initial segmentation of the obstacle. The second method, called {\textquoteleft}{\textquoteleft}TTC map estimation based on optical flow{{\textquoteright}{\textquoteright}}, estimates TTC on each point on the image and provides the depth map of the environment for any obstacle in any direction and is valid for all central catadioptric sensors. Some results and comparisons in synthetic and real images will be given. (C) 2014 Elsevier B.V. All rights reserved.}, issn = {0921-8890}, doi = {10.1016/j.robot.2014.09.036}, author = {Benamar, F. and Elfkihi, S. and Demonceaux, C. and Mouaddib, E. and Aboutajdine, D.} } @article {Benamar2015100, title = {Visual contact with catadioptric cameras}, journal = {Robotics and Autonomous Systems}, volume = {64}, year = {2015}, note = {cited By 0}, pages = {100-119}, abstract = {Time to contact or time to collision (TTC) is utmost important information for animals as well as for mobile robots because it enables them to avoid obstacles; it is a convenient way to analyze the surrounding environment. The problem of TTC estimation is largely discussed in perspective images. Although a lot of works have shown the interest of omnidirectional camera for robotic applications such as localization, motion, monitoring, few works use omnidirectional images to compute the TTC. In this paper, we show that TTC can be also estimated on catadioptric images. We present two approaches for TTC estimation using directly or indirectly the optical flow based on de-rotation strategy. The first, called "gradient based TTC", is simple, fast and it does not need an explicit estimation of the optical flow. Nevertheless, this method cannot provide a TTC on each pixel, valid only for para-catadioptric sensors and requires an initial segmentation of the obstacle. The second method, called "TTC map estimation based on optical flow", estimates TTC on each point on the image and provides the depth map of the environment for any obstacle in any direction and is valid for all central catadioptric sensors. Some results and comparisons in synthetic and real images will be given. {\textcopyright} 2014 Elsevier B.V. All rights reserved.}, doi = {10.1016/j.robot.2014.09.036}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84926140754\&doi=10.1016\%2fj.robot.2014.09.036\&partnerID=40\&md5=30948376e9b031a913a35e2c865a9513}, author = {Benamar, F.a b and Elfkihi, S.a c and Demonceaux, C.d and Mouaddib, E.b and Aboutajdine, D.a} } @article {Zoukkari2014617, title = {E-readiness: A novel approach for indicators measurements estimation and prediction}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {69}, number = {3}, year = {2014}, note = {cited By 0}, pages = {617-631}, abstract = {E-Readiness is an assessment process for the ICT (Information and Communication Technologies) availability and use in a country. It consists in the calculation of a composite indicator based on a conceptual framework related to ICT aspects. The assessment report is used in E-Strategy to formulate action plans for e-Readiness index development. Several approaches are used for e-Readiness since the end of nineties; these approaches lack flexibility and require frequent and precise measurements. Thus, two issues are addressed in this paper: the missing measurements estimation problem and the lack of e-Strategy formulation assistance and simulation tools and approaches. Indeed, we propose in this paper an approach to define the transition matrix of the e-Readiness state equation based on a layered model. This construction leads to a state model related to the e-Readiness dynamic system and then is used with KALMAN Filter to cover the two addressed issues. Indeed, the commands variables are indicators that can be manipulated by e-Strategy stakeholder and the KALMAN filter estimation and prediction functions are used as a simulator. For validation, we constructed a model based on the I2010 e-Readiness initiative and we tested the convergence of the model and its prediction function. Results are encouraging since the tested model prediction function converges in 24 cases out of 27 (89\%). {\textcopyright} 2005 - 2014 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84914147680\&partnerID=40\&md5=1dff7bf1d6cdfbb8714e6ace7d43746d}, author = {Zoukkari, N.B.a and Doukkali, A.b and Regragui, B.b} } @article { ISI:000339687600009, title = {Estimation of time card of collision (TTC) based on the optical flot in para-cadioptric vision}, journal = {TRAITEMENT DU SIGNAL}, volume = {31}, number = {1-2}, year = {2014}, month = {JAN-JUN}, pages = {197-219}, issn = {0765-0019}, author = {Benamar, Fatima Zahra and El Fkihi, Sanaa and Demonceaux, Cedric and Mouaddib, El Mustapha and Aboutajdine, Driss} } @conference { ISI:000366666805090, title = {Green Opportunistic Access for Cognitive Radio Networks: A Minority Game Approach}, booktitle = {2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)}, series = {IEEE International Conference on Communications}, year = {2014}, note = {IEEE International Conference on Communications (ICC), Sydney, AUSTRALIA, JUN 10-14, 2014}, pages = {5372-5377}, publisher = {IEEE}, organization = {IEEE}, abstract = {We investigate energy conservation and system performance of decentralized resource allocation scheme in cognitive radio networks thoroughly based on secondary users competitive behavior. Indeed, the contention on data channel unoccupied by licensed user leads to a single winner, but also involves a loss of energy of all nodes. In this paper, we apply minority game (MG) to the most important phase from the opportunistic spectrum access (OSA) process: the sensing phase. We attempt to carry out a cooperation in a non-cooperative environment with no information exchange. We study the Nash equilibrium solution for pure and fully mixed strategies, and we use distributed learning algorithms enabling cognitive users to learn the Nash equilibrium. Finally, we provide numerical results to validate the proposed approach. The resource allocation based on minority game approach improves secondary users battery life and the performance of the network.}, isbn = {978-1-4799-2003-7}, issn = {1550-3607}, author = {Elmachkour, Mouna and Daha, Imane and Sabir, Essaid and Kobbane, Abdellatif and Ben-Othman, Jalel}, editor = {Jamalipour, A and Deng, DJ} } @conference {Elmachkour20145372, title = {Green opportunistic access for cognitive radio networks: A minority game approach}, booktitle = {2014 IEEE International Conference on Communications, ICC 2014}, year = {2014}, note = {cited By 6}, pages = {5372-5377}, abstract = {We investigate energy conservation and system performance of decentralized resource allocation scheme in cognitive radio networks thoroughly based on secondary users competitive behavior. Indeed, the contention on data channel unoccupied by licensed user leads to a single winner, but also involves a loss of energy of all nodes. In this paper, we apply minority game (MG) to the most important phase from the opportunistic spectrum access (OSA) process: the sensing phase. We attempt to carry out a cooperation in a non-cooperative environment with no information exchange. We study the Nash equilibrium solution for pure and fully mixed strategies, and we use distributed learning algorithms enabling cognitive users to learn the Nash equilibrium. Finally, we provide numerical results to validate the proposed approach. The resource allocation based on minority game approach improves secondary users battery life and the performance of the network. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICC.2014.6884175}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84907000432\&doi=10.1109\%2fICC.2014.6884175\&partnerID=40\&md5=13fd149d57c8c1d76ace2aecdcd1d08a}, author = {Elmachkour, M.a and Daha, I.b and Sabir, E.c and Kobbane, A.a d and Ben-Othman, J.d} } @conference { ISI:000366666800017, title = {Optimal Buffer Management Policies in DTNs: A POMDP Approach}, booktitle = {2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)}, series = {IEEE International Conference on Communications}, year = {2014}, note = {IEEE International Conference on Communications (ICC), Sydney, AUSTRALIA, JUN 10-14, 2014}, pages = {94-99}, publisher = {IEEE}, organization = {IEEE}, abstract = {Using Delay Tolerant Networks (DTNs) would facilitate the connection of devices and areas across the world that are under-served by current networks. The DTNs are based on the concept of store-carry-and-forward protocols. A node may store a message in its buffer and carry it for a short or a long period of time, until an appropriate forwarding opportunity arises. A critical challenge is to determine routes through the network without even having an end-to-end connection. In order to increase the probability of message delivery, a known approach is implemented using epidemic message replication. This combination of long-term storage and message replication imposes a high storage and bandwidth overhead. Thus, efficient scheduling and dropping policies are necessary to decide which messages should be discarded when nodes{\textquoteright} buffers operate close to their capacity. If a relay buffer is full and needs to store a new packet, it has to decide either to keep the current message or to drop it. This decision depends on the number of transmissions of the message in its buffer and the message which has just arrived. In this paper, a Partially Observed Markov Decision Process (POMDP) framework is proposed to solve the problem of buffer management in DTNs. This modeling technique predicts some properties of the optimal buffer management policy. In addition, numerical examples are presented to illustrate the findings.}, isbn = {978-1-4799-2003-7}, issn = {1550-3607}, author = {Rahmouni, Imane and El Kamili, Mohamed and El Fenni, Mohammed Raiss and Omari, Lahcen and Kobbane, Abdellatif}, editor = {Jamalipour, A and Deng, DJ} } @conference { ISI:000366666801147, title = {POMDP Game Framework for Service Providers Inciting Mobile Users}, booktitle = {2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)}, series = {IEEE International Conference on Communications}, year = {2014}, note = {IEEE International Conference on Communications (ICC), Sydney, AUSTRALIA, JUN 10-14, 2014}, pages = {1742-1747}, publisher = {IEEE}, organization = {IEEE}, abstract = {The trend today is to access Internet through mobile devices, and people start using smartphones more than computers. This kind of services requires frequent updates through small messages from editors like in social networks. Although the use of such applications is subject to fees and consumes energy from limited batteries of smartphones. If a user activates his mobile device and has a useful contact opportunity with an access point, an update is received at the expense of monetary and energy costs. Thus, users face a tradeoff between such costs and their utilities. The goal of this paper is to show how a user can cope with such a tradeoff, by deriving a threshold policies. We consider the multi-user case, where each user try to maximize its reward based on a bonus given by the provider. We study the optimal policy in the Nash equilibrium. An optimal policy consists of deciding, based on the age of the last message received and the availability of access points whether to activate the mobile device or not. We model our problem using a POMDP with an average reward criterion. The accuracy of our model is illustrated through simulations.}, isbn = {978-1-4799-2003-7}, issn = {1550-3607}, author = {Raiss-el-Fenni, Mohammed and El-Kamili, Mohamed and Ben-Othman, Jalel and Kobbane, Abdellatif}, editor = {Jamalipour, A and Deng, DJ} } @conference { ISI:000366999600115, title = {A Support Model for Tutoring to Facilitate and Automate Tutoring Interventions}, booktitle = {2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2014}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, MOROCCO, APR 14-16, 2014}, pages = {652-657}, abstract = {Several approaches have been used to improve online learning systems and make training more attractive and beneficial for learners. One of a prominent approach is to the e-Tutoring that can provide a personalized and continuous support aiming to increase learners{\textquoteright} motivation, reduce feelings of isolation and avoid failure and abandonment in training. We offer in our work a support model for tutoring supporting the tutor{\textquoteright}s actions; this model collects and organize the majority of tutoring interventions to be exploited by a tutor agent in order to (1) facilitate the work of human tutor in the reuse of recorded interventions and in the choice of the most suitable to learning context and learner{\textquoteright}s learning profile, and (2) automate certain procedures for alleviate the work of human tutor of repetitive tasks, simple but boring, and for assist him in order to cope with the important number of learners requiring personalized support.}, isbn = {978-1-4799-3824-7}, author = {Fatima-Zahra, Ammor and Driss, Bouzidi and Amina, Elomri} } @conference { ISI:000345780700059, title = {Survey of Non-Functional Requirements Modeling and Verification of Software Product Lines}, booktitle = {2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS)}, series = {International Conference on Research Challenges in Information Science}, year = {2014}, note = {IEEE 8th International Conference on Research Challenges in Information Science (RCIS), Marrakesh, MOROCCO, MAY 28-30, 2014}, publisher = {IEEE; IEEE Morocco Sect; EMSI; Lab Math Informatique \& Applicat}, organization = {IEEE; IEEE Morocco Sect; EMSI; Lab Math Informatique \& Applicat}, abstract = {Undoubtedly, Non-Functional Requirements (NFR) such as security, performance and reliability are critical to software systems as there is a growing demand on a higher quality of software. Simultaneously, the increasing pressure to develop software in less time and at lower costs drives software industry towards the promising paradigm of Software Product Line (SPL). However, different approaches have been advanced for modeling NFR of the traditional individual products and few approaches focused on a family of products. On the other hand, as a product line contains several products, it is impracticable and not feasible to verify NFR for each possible product. Therefore, there is a major need for verification approaches specific to product lines. In this paper, we present and analyze the main NFR modeling and verification approaches of SPL.}, isbn = {978-1-4799-2393-9}, issn = {2151-1349}, author = {Hammani, Fatima Zahra}, editor = {Bajec, M and Collard, M and Deneckere, R} } @article {Benamar2014197, title = {Time to collision (TTC) estimation maps based on optical flow in paracatadioptric vision [Estimation des cartes du temps de collision (TTC) bas{\'e}e sur le flot optique en vision para-catadioptrique]}, journal = {Traitement du Signal}, volume = {31}, number = {1-2}, year = {2014}, note = {cited By 0}, pages = {197-219}, abstract = {The present paper deals with time to collision (TTC) for a mobile robot equipped with a catadioptric camera. This type of cameras is very useful in robotics because it provides a panoramic view field. The time to collision has been extensively studied in the case of perspective cameras. Nevertheless, the methods used are not directly applicable due to strong distortions in the images produced by the omnidirectional camera and they, therefore, need to be adapted. In this work, we propose to compute the TTC thanks to the estimation of the optical flow on omnidirectional images between the robot and the obstacle. We see that the double projection of a 3D point on the mirror and then on the camera plane leads to a new formulation of the TTC for catadioptric cameras. This formulation enables us to know, at each moment and at each pixel of the image, the TTC from the optical flow at this point. Our approach is validated on synthetic data and real experiments. Finally, we show that this calculation can detect obstacles in the motion direction of the robot. {\textcopyright} 2014 Lovoisier.}, doi = {10.3166/ts.31.197-219}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84930250224\&doi=10.3166\%2fts.31.197-219\&partnerID=40\&md5=1ed78d09cceb5f059e5db87be3aa812f}, author = {Benamar, F.Z.a d and Fkihi, S.E.b and Demonceaux, C.c and Mouaddib, E.M.d and Aboutajdine, D.a} } @conference { ISI:000345780700058, title = {Towards a Co-evolution Model for Software Product Lines Based on Cladistics}, booktitle = {2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS)}, series = {International Conference on Research Challenges in Information Science}, year = {2014}, note = {IEEE 8th International Conference on Research Challenges in Information Science (RCIS), Marrakesh, MOROCCO, MAY 28-30, 2014}, publisher = {IEEE; IEEE Morocco Sect; EMSI; Lab Math Informatique \& Applicat}, organization = {IEEE; IEEE Morocco Sect; EMSI; Lab Math Informatique \& Applicat}, abstract = {The evolution of a software product line is more challenging than the evolution of a single product, because its artifacts depend on many products. If a change is not well studied, it can break the integrity of the reference architecture of the software product line and all the derived products. Hence, when dealing with evolution, the understanding of change and its impact must be the most important activity. Biology is the science which studied evolution the most. Therefore it was necessary for us to understand evolution in biology in order to handle evolution in software product lines. This paper presents our approach to deal with change understanding in software product line using co-evolution analysis which was used in biology to understand how organisms influence each other during their evolution over time. Similarly to biological co-evolution, the co-evolution of artifacts of a software product line consists on analyzing how the evolution of an artifact influences the evolution of the others. The input data used in our approach are extracted from the history of changes that happened to each version of the software product. Our objective is to establish a co-evolution model for software product lines using Cladistics classification which illustrates the evolution of a population through an evolutionary tree.}, isbn = {978-1-4799-2393-9}, issn = {2151-1349}, author = {Benlarabi, Anissa}, editor = {Bajec, M and Collard, M and Deneckere, R} } @conference { ISI:000380564200105, title = {Towards a MDE approach for the establishment of a Contract Service Level Monitoring by Third Party in the Cloud Computing}, booktitle = {10TH INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY AND INTERNET-BASED SYSTEMS SITIS 2014}, year = {2014}, note = {International Conference on Signal-Image Technology and Internet-Based Systems SITIS, Marrakesh, MOROCCO, NOV 23-27, 2014}, pages = {715-720}, abstract = {Cloud Computing (CC) marks a new step towards IT infrastructure dematerialization. Cloud provides IT resources, software and hardware, remotely accessible, as a service. The adoption of this model raises a number of challenges, particularly with regard to Quality of the provided services. To cope with a highly dynamic environment such as the CC, it is essential to determine in real time Quality of Service (QoS) to meet consumer{\textquoteright}s SLA (Service Level Agreements) specifications. In this context, agreements contract) service level form an appropriate solution to specify these QoS guarantees. It specifies one or more service level objectives (SLO), to guarantee that the delivered QoS satisfies the consumer expectations. Monitoring these QoS agreements for the management of the relationships, between, cloud providers and their services customers is an area that attracts the attention of many researchers and industrialists in the cloud. In our work we introduce the concept of monitoring and respect of the QoS, then we present a third party service provider that ensures the respect of the Quality of Service in real-time to guarantee the performance and the reliability of the Cloud.}, isbn = {978-1-4799-7978-3}, doi = {10.1109/SITIS.2014.30}, author = {Maarouf, Adil and Marzouk, Abderrahim and Haqiq, Abdelkrim and El Hamlaoui, Mahmoud}, editor = {Yetongnon, K and Dipanda, A and Chbeir, R} } @conference { ISI:000345780700060, title = {Towards an Agile Feature Composition for a Large Scale Software Product Lines}, booktitle = {2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS)}, series = {International Conference on Research Challenges in Information Science}, year = {2014}, note = {IEEE 8th International Conference on Research Challenges in Information Science (RCIS), Marrakesh, MOROCCO, MAY 28-30, 2014}, publisher = {IEEE; IEEE Morocco Sect; EMSI; Lab Math Informatique \& Applicat}, organization = {IEEE; IEEE Morocco Sect; EMSI; Lab Math Informatique \& Applicat}, abstract = {Modern applications tend to be cross-industry and to cover simultaneously different domains. Feature models need then to be composed in order to build domains with much larger scopes. Many approaches have been proposed by researchers to address this composition issue. Though, an overview of these compositional approaches shows that there are several areas for improvement especially in terms of automation tool support and agility. Our proposal in this doctoral paper is to discuss the feasibility of bringing the agility and the dynamism of software oriented computing techniques to the feature models composition relevant to different domains throughout a mashing up of their cooperating services.}, isbn = {978-1-4799-2393-9}, issn = {2151-1349}, author = {Dehmouch, Ikram}, editor = {Bajec, M and Collard, M and Deneckere, R} } @conference { ISI:000386611100055, title = {Formalization of the User Centric SOA Approach Implementation and End User Satisfaction Evaluation}, booktitle = {ICEIS: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 2}, year = {2013}, note = {15th International Conference on Enterprise Information Systems (ICEIS), Angers, FRANCE, JUL 04-07, 2013}, pages = {481-488}, publisher = {ESEO Grp; Inst Syst \& Technologies Informat, Control \& Commun; Assoc Advancement Artificial Intelligence; IEICE Special Interest Grp Software Interprise Modelling; ACM Special Interest Grp Management Informat Syst; ACM Special Interest Grp Comp Human Inte}, organization = {ESEO Grp; Inst Syst \& Technologies Informat, Control \& Commun; Assoc Advancement Artificial Intelligence; IEICE Special Interest Grp Software Interprise Modelling; ACM Special Interest Grp Management Informat Syst; ACM Special Interest Grp Comp Human Inte}, abstract = {User-centric SOA is a new paradigm allowing unskilled end users to compose services to create new one. Mashups represent new agile and quick ways to compose and integrate structured and unstructured resources, from different types existing on the web. Mashups emerged as a new way to democratize the SOA and realize the user-centric SOA; However, Mashups are emerging applications, and thus consist of immature, non intuitive and non formalized area. In this paper, we formalize the user-centric SOA development by proposing a new cloud-based architecture for user-centric SOA platforms, and by introducing a new rich integration language based on the advanced Enterprise Integration Patterns (EIPS). We also propose a new intuitive and self-explanatory semantic methodology and interaction model for end users services integration. Through these contributions, we give the promise of realizing the user-centric SOA.}, isbn = {978-989-8565-60-0}, doi = {10.5220/0004446304810488}, author = {Benhaddi, Meriem and Baina, Karim and Abdelwahed, El Hassan}, editor = {Hammoudi, S and Maciaszek, L and Cordeiro, J and Dietz, J} } @conference { ISI:000351597600002, title = {GRADIENT-BASED TIME TO CONTACT ON PARACATADIOPTRIC CAMERA}, booktitle = {2013 20TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2013)}, series = {IEEE International Conference on Image Processing ICIP}, year = {2013}, note = {20th IEEE International Conference on Image Processing (ICIP), Melbourne, AUSTRALIA, SEP 15-18, 2013}, pages = {5-9}, publisher = {Inst Elect \& Elect Engineers; IEEE Signal Proc Soc}, organization = {Inst Elect \& Elect Engineers; IEEE Signal Proc Soc}, abstract = {The problem of time to contact or time to collision (TTC) estimation is largely discussed in perspective images. However, a few works have dealt with images of catadioptric sensors despite of their utility in robotics applications. The objective of this paper is to develop a novel model for estimating TTC with catadioptric images relative to a planar surface, and to demonstrate that TTC can be estimated only with derivative brightness and image coordinates. This model, called {\textquoteleft}{\textquoteleft}gradient based time to contact{{\textquoteright}{\textquoteright}}, does not need high processing such as explicit estimation of optical flow and feature detection and/or tracking. The proposed method allows to estimate TTC and gives additional information about the orientation of planar surface. It was tested on simulated and real datasets.}, isbn = {978-1-4799-2341-0}, issn = {1522-4880}, author = {Benamar, F. and El Fkihi, S. and Demonceaux, C. and Mouaddib, E. and Aboutajdine, D.} } @conference {Benamar20135, title = {Gradient-based time to contact on paracatadioptric camera}, booktitle = {2013 IEEE International Conference on Image Processing, ICIP 2013 - Proceedings}, year = {2013}, note = {cited By 2}, pages = {5-9}, abstract = {The problem of time to contact or time to collision (TTC) estimation is largely discussed in perspective images. However, a few works have dealt with images of catadioptric sensors despite of their utility in robotics applications. The objective of this paper is to develop a novel model for estimating TTC with catadioptric images relative to a planar surface, and to demonstrate that TTC can be estimated only with derivative brightness and image coordinates. This model, called {\textquoteright}gradient based time to contact{\textquoteright}, does not need high processing such as explicit estimation of optical flow and feature detection and/or tracking. The proposed method allows to estimate TTC and gives additional information about the orientation of planar surface. It was tested on simulated and real datasets. {\textcopyright} 2013 IEEE.}, doi = {10.1109/ICIP.2013.6738002}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84897697160\&doi=10.1109\%2fICIP.2013.6738002\&partnerID=40\&md5=2d096a6f98a59c3c442f3c24ffca4bbc}, author = {Benamar, F.a d and El Fkihi, S.a b and Demonceaux, C.c and Mouaddib, E.d and Aboutajdine, D.a} } @conference { ISI:000331174400078, title = {Parallel Greedy Randomized Adaptive Search Procedure with Delay and Delay Variation for RP Selection in PIM-SM Multicast Routing}, booktitle = {2013 EIGHTH INTERNATIONAL CONFERENCE ON BROADBAND, WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2013)}, year = {2013}, note = {8th IEEE International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA), Univ Technol Compiegne, Compiegne, FRANCE, OCT 28-30, 2013}, pages = {481-487}, publisher = {IEEE; IEEE Comp Soc}, organization = {IEEE; IEEE Comp Soc}, abstract = {Multicast IP is a Green Technology; it{\textquoteright}s a bandwidth-conserving technology that reduces traffic by simultaneously delivering a single stream of information to multicast group members. Internet research community has proposed many Different multicast routing protocols to support efficient multimedia application, PIM-SM protocol remains the most used multicast routing protocol; they propose using a Shared Rendezvous Point Tree SRPT to forward multicast packets. The prime problem concerning SRPT construction is to determine an optimal multicast router in the network as a root; this problem is called Rendezvous point RP selection. This selection influences the form of the multicast routing tree, and therefore influences performances of the multicast session and multicast routing scheme. Determination of a best position of the Rendezvous Point is an NP complete problem, first proposed by Wall, which needs to be solved with a heuristic algorithm. In this paper we propose a new RP selection algorithm based on Parallel Greedy Randomized Adaptive Search Procedure. 2DV-PGRASP-RP selects RP by considering cost, delay and delay variation functions and can be easily integrated to bootstrap RP protocol used by PIM-SM. Simulation results show that good performance is achieved in multicast cost.}, isbn = {978-0-7695-5093-0}, doi = {10.1109/BWCCA.2013.84}, author = {Baddi, Youssef and Dafir, Mohamed and El Kettani, Ech-Cherif}, editor = {Barolli, L and Xhafa, F and Nace, D and Bouabdallah, A and Enokido, T and Yeo, SS} } @conference { ISI:000328097500045, title = {ROLE OF MODEL OF EXCELLENCE TO IMPROVE D-LEARNING PROJECTS}, booktitle = {QUALITY AND EFFICIENCY IN E-LEARNING, VOL 1}, series = {eLearning and Software for Education}, year = {2013}, note = {9th International Conference eLearning and Software for Education, Bucharest, ROMANIA, APR 25-26, 2013}, pages = {284-290}, publisher = {Games \& Learn Alliance; intuitext Grup SOFTWIN; ASCENDIA DESIGN; SAP; INSOFT Dev \& Consult; MAGUAY; Adv Technol Syst; PLAGIAT}, organization = {Games \& Learn Alliance; intuitext Grup SOFTWIN; ASCENDIA DESIGN; SAP; INSOFT Dev \& Consult; MAGUAY; Adv Technol Syst; PLAGIAT}, abstract = {Learning has always been a fertile ground for research aiming at facilitating access to information and content sharing, with the view towards knowledge, know-how and self-management skills. To this end, researchers interested in learning have striven to use technological innovation for the benefit of learning, we believe that the D-learning-project, added to the technological and pedagogical components involved, must take into account the guiding principles of Project Management as an unequivocally proven managerial practice. However, it is also possible to explore other niches that can ensure the success of this type of project. Total Quality Management (TQM) as a practice seems to be a managerial practice whose foundations are perfectly compatible with the characteristics of a D-learning project.}, issn = {2066-026X}, author = {Daoudi, Najima and Lemsalmi, Ikram}, editor = {Roceanu, I and Beligan, D and Ciolan, L and Radu, C} } @conference {Faqihi201356, title = {Semantic Interoperability in the d-learning in the era of cloud computing: Simplicity or complexity}, booktitle = {2013 International Conference on Interactive Collaborative Learning, ICL 2013}, year = {2013}, note = {cited By 3}, pages = {56-60}, abstract = {Since traditional computing of the 60s, to the innovations of the 80s, passing by emergence of internet, the virtualization advances, the concept of cloud computing have a promising future. Certainly much remains to be done especially for interoperability but also the establishment of norms and standards that will allow to build a set of heterogeneous systems. {\textcopyright} 2013 IEEE.}, doi = {10.1109/ICL.2013.6644536}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84898656730\&doi=10.1109\%2fICL.2013.6644536\&partnerID=40\&md5=761c2a496eee37edd0f6c37413f7ff35}, author = {Faqihi, B.a and Daoudi, N.b and Ajhoun, R.a} } @article {Doumi201341, title = {Strategic business and IT alignment: Representation and evaluation}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {47}, number = {1}, year = {2013}, note = {cited By 1}, pages = {41-52}, abstract = {Nowadays, business IT alignment has become a priority in most large organization. It is a question of aligning the information system on the business strategies of the organization. This step is aimed at increasing the practical value of the information system and makes it a strategic asset for the organization. Many works showed the importance of documentation, the analysis and the evaluation of business IT alignment, but few proposed solutions applicable to the strategic and functional level. This paper aims has to fill this gap by proposing a simple approach for modeling and evaluate enterprise strategy in the context of strategic alignment. This approach is illustrated by case study of a real project in a Moroccan public administration. {\textcopyright} 2005 - 2013 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84872399122\&partnerID=40\&md5=e21d6bf8d4eafc95c0d36f5a777618e3}, author = {Doumi, K. and Baina, S. and Baina, K.} } @conference { ISI:000386615500047, title = {Towards a Process Patterns based Approach for Promoting Adaptability in Configurable Process Models}, booktitle = {ICEIS: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 3}, year = {2013}, note = {15th International Conference on Enterprise Information Systems (ICEIS), Angers, FRANCE, JUL 04-07, 2013}, pages = {382-387}, publisher = {ESEO Grp; Inst Syst \& Technologies Informat, Control \& Commun; Assoc Advancement Artificial Intelligence; IEICE Special Interest Grp Software Interprise Modelling; ACM Special Interest Grp Management Informat Syst; ACM Special Interest Grp Comp Human Inte}, organization = {ESEO Grp; Inst Syst \& Technologies Informat, Control \& Commun; Assoc Advancement Artificial Intelligence; IEICE Special Interest Grp Software Interprise Modelling; ACM Special Interest Grp Management Informat Syst; ACM Special Interest Grp Comp Human Inte}, abstract = {Reference process modeling approach has been proposed in order to provide a generic solution for reuse in business process management. These models are intended to be adapted by different organizations to respond to new requirements. As a result of this adaptation, a set of variants of the reference process model must be managed. In this context, configurable solutions have been developed to manage variability by integrating all possible configurations. However, enterprises are involved in competitive and complex environments which impose them to often adapt their configurable process models to deal with the increasing globalisation. Therefore, configurable process models should evolve over time in terms of activities, resources and data to meet new needs. In this paper, we propose a process patterns based approach to guide designers in evolving configurable process models at design time as a first step of our contribution to provide an automated support for evolving configurable process models. The presentation of our process patterns system is limited in this paper to the Activity Insertion Process Pattern.}, isbn = {978-989-8565-61-7}, doi = {10.5220/0004565503820387}, author = {Sbai, Hanae and Fredj, Mounia and Kjiri, Laila}, editor = {Hammoudi, S and Maciaszek, L and Cordeiro, J and Dietz, J} } @conference { ISI:000310353000129, title = {A Dynamic Proxy for Lightweight Web Service Composition}, booktitle = {2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2012}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Tangiers, MOROCCO, MAY 10-12, 2012}, pages = {699-704}, publisher = {Morocco Sect MTT/AP Joint Chapter}, organization = {Morocco Sect MTT/AP Joint Chapter}, abstract = {Web Services (WS) enable access to remote applications over the Internet. Composition thereof gives rise to more complex services by integrating applications over borders of companies, institutions, and countries. But such compositions fail if they cannot dynamically adapt to change in such an ever changing environment. Unfortunately web compositions today are still implemented in a static way. Implementing invocations of web services is too verbose and heavy-weight. It requires manual extraction of each service{\textquoteright}s information from interface descriptions and because of the missing transparency in composition languages, developers repetitively have to write low-level invocation code. This paper proposes a light-weight approach for automatic and transparent web service compositions, supporting standard SOAP-based web services. We provide a proof-of-concept as a scripting language. The benefit is that our web services composition approach makes compositions simpler and more transparent, because invoking a web service is no more complicated than invoking a local method.}, isbn = {978-1-4673-1520-3}, author = {Najam, Sara and Dinkelaker, Tom and Erradi, Mohamed and Ouzzif, Mohamed}, editor = {Essaaidi, M and Zaz, Y} } @article {Zoukkari2012101, title = {E-Strategy formulation: A new approach based on a layered model}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {36}, number = {1}, year = {2012}, note = {cited By 1}, pages = {101-112}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84857185235\&partnerID=40\&md5=6ec655c0ef7c04077fd3b70d54e7b0ae}, author = {Zoukkari, N.B. and Doukkali, A. and Regragui, B.} } @conference {Saadane201262, title = {Evaluation of hybrid geo-location based on UMTS and GPS technologies}, booktitle = {Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012}, year = {2012}, note = {cited By 0}, pages = {62-66}, doi = {10.1109/ICMCS.2012.6320310}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869822901\&doi=10.1109\%2fICMCS.2012.6320310\&partnerID=40\&md5=98c5dfaf44a4e8614b501104ada67870}, author = {Saadane, R. and Belkasmi, M. and El Koutbi, M. and Dadda, M.R.} } @conference { ISI:000310353000012, title = {Evaluation of Hybrid Geo-location based on UMTS and OPS Technologies}, booktitle = {2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2012}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Tangiers, MOROCCO, MAY 10-12, 2012}, pages = {63-67}, publisher = {Morocco Sect MTT/AP Joint Chapter}, organization = {Morocco Sect MTT/AP Joint Chapter}, abstract = {The degree of accuracy and availability of service make a distinction between the two main methods of geolocation that areGPS and UMTS. GPS provides good performances in terms of location in open area, but performances degrade to a significant manner when we go into an enclosed area. While the UMTS offers good results in urban areas, we can note a complementarity between these two techniques. In this paper we present a hybrid algorithm that combines these two techniques and takes best advantage of each of them with two approaches one simple and another advanced.}, isbn = {978-1-4673-1520-3}, author = {Saadane, Rachid and Belkasmi, Mostafa and El Koutbi, Mohammed and Dadda, Mohamed Rachid}, editor = {Essaaidi, M and Zaz, Y} } @article {Daoui2012137, title = {Mobility prediction and location management based on data mining}, journal = {International Conference on Next Generation Networks and Services, NGNS}, year = {2012}, note = {cited By 1}, pages = {137-140}, doi = {10.1109/NGNS.2012.6656095}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84894186087\&doi=10.1109\%2fNGNS.2012.6656095\&partnerID=40\&md5=5539050c158dd348e89a347da6abd380}, author = {Daoui, M. and Belkadi, M. and Chamek, L. and Lalam, M. and Hamrioui, S. and Berqia, A.} } @article {Enaanai2012113, title = {Noise abatement in the Arabic IRS results by applying a sentences morphosemantic filter (gene filter method)}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {42}, number = {1}, year = {2012}, note = {cited By 0}, pages = {113-121}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84867512204\&partnerID=40\&md5=2851a8dedc46b911edc6276bfd005dfe}, author = {Enaanai, A. and Doukkali, A. and Regragui, B.} } @conference {Lachhab2012, title = {Real time context-independent phone recognition using a simplified statistical training algorithm}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, volume = {2012-May}, year = {2012}, note = {cited By 0}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85004001398\&partnerID=40\&md5=f2cac6c3a94f59b2c63be47cbfb16359}, author = {Lachhab, O. and Di Martino, J. and Elhaj, E.H.I. and Hammouch, A.} } @conference {Benamar20123602, title = {Time to contact estimation on paracatadioptric cameras}, booktitle = {Proceedings - International Conference on Pattern Recognition}, year = {2012}, note = {cited By 2}, pages = {3602-3605}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84874558961\&partnerID=40\&md5=ed024edcf33e2e2b82c2adf2ecc505f3}, author = {Benamar, F. and Demonceaux, C. and Fkihi, S.E. and Mouaddib, E. and Aboutajdine, D.} } @conference {Khriss2012, title = {Towards change and verification support in collaborative business processes}, booktitle = {Proceedings of 2012 International Conference on Complex Systems, ICCS 2012}, year = {2012}, note = {cited By 0}, doi = {10.1109/ICoCS.2012.6458609}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84874477474\&doi=10.1109\%2fICoCS.2012.6458609\&partnerID=40\&md5=1a5d790aa35e802b38ff94d7d8259d28}, author = {Khriss, I. and Koutbi, M.E. and Dkiouak, Y.} } @conference {Faqihi2012134, title = {Towards the implementation of semantic interoperability of information systems via technique of matching: Issue and prospective}, booktitle = {2012 International Conference on Interactive Mobile and Computer Aided Learning, IMCL 2012}, year = {2012}, note = {cited By 0}, pages = {134-140}, doi = {10.1109/IMCL.2012.6396464}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84873168694\&doi=10.1109\%2fIMCL.2012.6396464\&partnerID=40\&md5=fc312da1cafe93b0fe3d989cfbcc537c}, author = {Faqihi, B. and Daoudi, N. and Ajhoun, R.} } @conference { ISI:000315346700024, title = {Towards the implementation of semantic interoperability of information systems via technique of matching: Issue and prospective}, booktitle = {2012 INTERNATIONAL CONFERENCE ON INTERACTIVE MOBILE AND COMPUTER AIDED LEARNING (IMCL)}, year = {2012}, note = {International Conference on Interactive Mobile and Computer Aided Learning (IMCL), Princess Sumaya Univ Technol (PSUT), Amman, JORDAN, NOV 06-08, 2012}, pages = {134-140}, publisher = {IEEE; Carinthia Tech Inst; IAOE; IELA; IGIP; Online Journals}, organization = {IEEE; Carinthia Tech Inst; IAOE; IELA; IGIP; Online Journals}, abstract = {It is very important first to state that the emergence of the e-commerce and e-government or the electronic libraries perform a necessity to have an access to multiple resources of information. Otherwise, these sources are not necessarily homogenous, either on the syntactic or semantic standard. For the semantic component, the conflicts appear when the systems don{\textquoteright}t have the some interpretation of exchanged information. Let me give you example which I think bring out what I mean by this, the existing systems are completely heterogeneous, geographically remote and developed under different platforms in the field of E-learning yet, they need to collaborate, exchange, and re-use the data and services by keeping the same meaning. In other words, the user (learner) must have transparent way in all these resources and information in which he is in need although He belongs to other difference. Despite the fact that these resources and information{\textquoteright}s interpretations don{\textquoteright}t change on system to another, this issue is well-known by semantic interoperability in the research field of information. This concept in identified by the ability to interpret and use exchanged data not only the content but also in the meaning. {[}01] Many solutions can be suggested by relying on semantic web approach and basing on ontology. These are instances by which we can describe the structure, semantic content and system{\textquoteright}s objective. This detailed description permits the systems to understand the semantic of exchanged data, to facilitate their localization and to ensure their integration. {[}03] Our direction in this research aimed at finding on approach which responds to semantic issue in domain of learning at the moment the exchange of the information of each interpreted system. And analyze the shared content in its own ontology and treat it in coherent manner without losing its meaning. The major challenge of this approach is how to compare and identify the correspondence among concepts of different ontology systems. There are three major approaches; we can state them as follow: integrated approach, the federated approach and the unified approach. {[}03] Our article is intended to elaborate a comparative study between these approaches, to study the benefits and limits of each approach and perform hosed choice. This technique might permit to a good response to the problem of semantic interoperability.}, isbn = {978-1-4673-4924-6}, author = {Faqihi, B. and Daoudi, N. and Ajhoun, R.} } @article { ISI:000309649500004, title = {Using Aspect-Oriented State Machines for Detecting and Resolving Feature Interactions}, journal = {COMPUTER SCIENCE AND INFORMATION SYSTEMS}, volume = {9}, number = {3, SI}, year = {2012}, month = {SEP}, pages = {1045-1074}, abstract = {Composing different features in a software system may lead to conflicting situations. The presence of one feature may interfere with the correct functionality of another feature, resulting in an incorrect behavior of the system. In this work we present an approach to manage feature interactions. A formal model, using Finite State Machines (FSM) and Aspect-Oriented (AO) technology, is used to specify, detect and resolve features interactions. In fact aspects can resolve interactions by intercepting the events which causes troubleshoot. Also a Domain-Specific Language (DSL) was developed to handle Finite State Machines using a pattern matching technique.}, issn = {1820-0214}, doi = {10.2298/CSIS111216033D}, author = {Dinkelaker, Tom and Erradi, Mohammed and Ayache, Meryeme} } @article {8885929720120901, title = {Using Aspect-Oriented State Machines for Detecting and Resolving Feature Interactions.}, journal = {Computer Science \& Information Systems}, volume = {9}, number = {3}, year = {2012}, pages = {1046 - 1074}, abstract = {The article focuses on the use of aspect-oriented state machines that helps in detecting feature interactions. It mentions that domain- specific language (DSL) is introduced to manage Finite State Machines with pattern matching technique. It mentions that in software product-line (SPL) engineers divides a software system into functional features through feature model.}, keywords = {aspect interactions, Aspect-oriented programming, Computer hardware description languages, Computer software, conflict detection, conflict resolution, domain-specific aspect languages, feature interactions, Finite state machines (Computer science), formal methods, Image registration, object-oriented programming, state machines}, issn = {18200214}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=88859297\&site=ehost-live}, author = {Dinkelaker, Tom and Erradi, Mohammed and Ayache, Meryeme} } @article {Dinkelaker20121045, title = {Using aspect-oriented state machines for detecting and resolving feature interactions}, journal = {Computer Science and Information Systems}, volume = {9}, number = {3}, year = {2012}, note = {cited By 2}, pages = {1045-1074}, doi = {10.2298/CSIS111216033D}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84867471411\&doi=10.2298\%2fCSIS111216033D\&partnerID=40\&md5=a033e4838afaf44fbd961002569f0da2}, author = {Dinkelaker, T. and Erradi, M. and Ayache, M.} } @conference {Doumi2011493, title = {Business IT alignment: A survey}, booktitle = {ICEIS 2011 - Proceedings of the 13th International Conference on Enterprise Information Systems}, volume = {4 SAIC}, number = {HCI/-}, year = {2011}, note = {cited By 2}, pages = {493-499}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84865118286\&partnerID=40\&md5=9330c9b2c9e569fed47526169bd318a3}, author = {Doumi, K. and Baina, S. and Baina, K.} } @conference {Douiri20111456, title = {Direct electromagnetic torque control of induction motors powered by high power PWM inverters for two levels or three levels}, booktitle = {Progress in Electromagnetics Research Symposium}, year = {2011}, note = {cited By 0}, pages = {1456-1460}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84055183048\&partnerID=40\&md5=8b40b36f592e36d14b3b967fe852960f}, author = {Douiri, M.R. and Cherkaoui, M. and Nasser, T. and Essadki, A.} } @conference {Douiri2011, title = {Direct torque fuzzy controlled induction machine drive using an optimized extended Kalman filter}, booktitle = {2011 International Conference on Communications, Computing and Control Applications, CCCA 2011}, year = {2011}, note = {cited By 0}, doi = {10.1109/CCCA.2011.6031399}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-80054799287\&doi=10.1109\%2fCCCA.2011.6031399\&partnerID=40\&md5=0f26ab2338a09b165f1925dc6916cb9c}, author = {Douiri, M.R. and Cherkaoui, M. and Nasser, T. and Essadki, A.} } @conference { ISI:000310937500040, title = {A Dynamic Timestamp Discrepancy against Replay Attacks in MANET}, booktitle = {INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT IV}, series = {Communications in Computer and Information Science}, volume = {254}, year = {2011}, note = {International Conference on Informatics Engineering and Information Science (ICIEIS 2011), Univ Teknol Malaysia, Kuala Lumpur, MALAYSIA, NOV 14-16, 2011}, pages = {479+}, publisher = {Springer}, organization = {Springer}, abstract = {Mobile Ad hoc NETworks (MANETs), like traditional networks, are vulnerable to a wide range of Denial-of-Service (DoS) attacks. A Replay attack is one of them that degrade severely the MANET performance. A replay attacker performs this attack by interception and retransmission of the valid signed messages. The validation of signed messages is verified by a timestamp discrepancy fixed by sender and receiver nodes. In this paper, we propose an enhancement of the timestamp concept, to avoid replay attack, characterized by two properties. The first is dynamic because it depends on the communication duration between sender and receiver nodes. The second is rigid because it estimates approximately the maximum date when the signed message should arrive to receive node.}, isbn = {978-3-642-25482-6; 978-3-642-25483-3}, issn = {1865-0929}, author = {Enneya, Nourddine and Baayer, Aziz and Elkoutbi, Mohammed}, editor = {AbdManaf, A and Sahibuddin, S and Ahmad, R and Daud, SM and ElQawasmeh, E} } @article {Haddadi201187, title = {Establishment and application of competitive intelligence system in mobile devices}, journal = {Journal of Intelligence Studies in Business}, volume = {1}, number = {1}, year = {2011}, note = {cited By 3}, pages = {87-96}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84905686627\&partnerID=40\&md5=96b43d91e158a53a8db2a6ea889e14a9}, author = {Haddadi, A.E. and Dousset, B. and Berrada, I.} } @conference { ISI:000309893900036, title = {Experimenting a Modeling Approach for Modeling Enterprise Strategy in the Context of Strategic Alignment}, booktitle = {ENTERPRISE INFORMATION SYSTEMS, PT 2}, series = {Communications in Computer and Information Science}, volume = {220}, year = {2011}, note = {International Conference on Enterprise Information Systems, Vilamoura, PORTUGAL, OCT 05-07, 2011}, pages = {356-368}, publisher = {Polytechn Inst Cavado \& Ave; Univ Tras os Montes \& Alto Douro}, organization = {Polytechn Inst Cavado \& Ave; Univ Tras os Montes \& Alto Douro}, abstract = {Nowadays, the business IT alignment has become a priority in most large organizations. It is a question of aligning the information system on the business strategies of the organization. This step is aimed at increasing the practical value of the information system and makes it a strategic asset for the organization. Many works showed the importance of documentation, the analysis and the evaluation of business IT alignment, but few proposed solutions applicable to the strategic and functional level. This paper aims has to fill this gap by proposing a simple approach for modeling enterprise strategy in the context of strategic alignment. This approach is illustrated by case study of a real project in a Moroccan public administration.}, isbn = {978-3-642-24354-7}, issn = {1865-0929}, author = {Doumi, Karim and Baina, Salah and Baina, Karim}, editor = {CruzCunha, MM and Varajao, J and Powell, P and Martinho, R} } @article {Doumi2011356, title = {Experimenting a modeling approach for modeling enterprise strategy in the context of strategic alignment}, journal = {Communications in Computer and Information Science}, volume = {220 CCIS}, number = {PART 2}, year = {2011}, note = {cited By 0}, pages = {356-368}, doi = {10.1007/978-3-642-24355-4_36}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-80054054156\&doi=10.1007\%2f978-3-642-24355-4_36\&partnerID=40\&md5=85026bfe1d388de68af9bb967863c609}, author = {Doumi, K. and Baina, S. and Baina, K.} } @conference {Anwar2011188, title = {A formal approach to model composition applied to VUML}, booktitle = {Proceedings - 2011 16th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2011}, year = {2011}, note = {cited By 7}, pages = {188-197}, doi = {10.1109/ICECCS.2011.26}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79960496037\&doi=10.1109\%2fICECCS.2011.26\&partnerID=40\&md5=90c65ef43cd980578796730f38a6b5dd}, author = {Anwar, A. and Dkaki, T. and Ebersold, S. and Coulette, B. and Nassar, M.} } @conference { ISI:000298664200019, title = {A Formal Approach to Model Composition Applied to VUML}, booktitle = {2011 16TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS)}, year = {2011}, note = {IEEE Int Conf/Workshops on Engineering of Autonomic and Autonomous Systems/Int Conf on the Engineering of Computer-Based Systems/Int Conf on the Engineering of Complex Computer Systems, Las Vegas, NV, APR 27-29, 2011}, pages = {188-197}, publisher = {IEEE; IEEE Comp Soc Tech Comm Engn Autonomous \& Autonom Syst (TC-AAS); IEEE Comp Soc}, organization = {IEEE; IEEE Comp Soc Tech Comm Engn Autonomous \& Autonom Syst (TC-AAS); IEEE Comp Soc}, abstract = {Several approaches adopted by the software engineering community rely on the principle of multi-modeling which allows to separate concerns and to model a system as a set of less complex sub-models. Model composition is a crucial activity in Model Driven Engineering (MDE). It is particularly useful when adopting a multi-modeling approach to analyze and design software systems. In previous work, we have defined a view-based UML profile called VUML. In this paper, we describe a formal approach for model composition in which we consider the composition as an algebraic operator on the set of UML-compliant models. We specify the semantics of our composition operator by means of graph transformations. Furthermore, we present a composition scheme interpreted by a two-steps composition process based on two strategies of correspondence and merging. To illustrate our approach, we apply it to the composition of UML class models diagrams into one VUML model class diagram.}, isbn = {978-0-7695-4381-9}, doi = {10.1109/ICECCS.2011.26}, author = {Anwar, Adil and Dkaki, Taoufiq and Ebersold, Sophie and Coulette, Bernard and Anwar, Adil and Nassar, Mahmoud}, editor = {Perseil, I and Breitman, K and Sterritt, R} } @conference { ISI:000300256400069, title = {Maturity Models Transition from eGovernment Interoperability to T-Government: Restyling Dynamic Public Services Through Integrated Transformation of Service Delivery}, booktitle = {PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON EGOVERNMENT}, year = {2011}, note = {11th European Conference on e-Government (ECEG), Univ Ljubljana, Fac Adm, Ljubljana, SLOVENIA, JUN 16-17, 2011}, pages = {591-602}, abstract = {Transforming public services through a global, common, measurable, achievable vision and clear objectives, the use of Information and Communication Technology and referral to services focused on the citizens needs have an important effect on economic, social and cultural life across the country that extends globally. The aim of this paper is to outline the part of the transformation of government services by defining the guidelines for implementation and monitoring procedures necessary to support any model of maturity to ensure the successful transformation of public services in a safe flexible and adaptable. The model we seek to build is based on best practices in service management, governance, enterprise architecture, and implementation of Information Technology.}, isbn = {978-1-908272-00-3}, author = {El Aichi, Mohamed Mohyi Eddine and El Kettani, Mohamed Dafir Ech-Cherif}, editor = {Klun, M and Decman, M and Jukic, T} } @conference {Doumi2011457, title = {Modeling approach for business it alignment}, booktitle = {ICEIS 2011 - Proceedings of the 13th International Conference on Enterprise Information Systems}, volume = {4 SAIC}, number = {HCI/-}, year = {2011}, note = {cited By 2}, pages = {457-464}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84865128172\&partnerID=40\&md5=2c6058798444cb39db861db8361fae7f}, author = {Doumi, K. and Baina, S. and Baina, K.} } @conference { ISI:000306352400026, title = {Modeling Approach Using Goal Modeling and Enterprise Architecture for Business IT Alignment}, booktitle = {MODEL AND DATA ENGINEERING}, series = {Lecture Notes in Computer Science}, volume = {6918}, year = {2011}, note = {1st International Conference on Model and Data Engineering (MEDI 2011), Obidos, PORTUGAL, SEP 28-30, 2011}, pages = {249-261}, abstract = {Nowadays, the business IT alignment has become a priority in most large organizations. It is a question of aligning the information system on the business strategies of the organization. This step is aimed at increasing the practical value of the information system and makes it a strategic asset for the organization. Many works showed the importance of documentation, the analysis and the evaluation of business IT alignment, but few proposed solutions applicable to the strategic and functional level. This paper aims has to fill this gap by proposing a simple approach for modeling enterprise strategy in the context of strategic alignment. This approach is illustrated by case study of a real project in a Moroccan public administration.}, isbn = {978-3-642-24442-1; 978-3-642-24443-8}, issn = {0302-9743}, author = {Doumi, Karim and Baiem, Salah and Baiena, Karim}, editor = {Bellatreche, L and Pinto, FM} } @article {Doumi2011249, title = {Modeling approach using goal modeling and enterprise architecture for business IT alignment}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {6918 LNCS}, year = {2011}, note = {cited By 0}, pages = {249-261}, doi = {10.1007/978-3-642-24443-8_26}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-80054802483\&doi=10.1007\%2f978-3-642-24443-8_26\&partnerID=40\&md5=9a03a0bdb84fdc08fb9db21e66467f80}, author = {Doumi, K. and Baina, S. and Baina, K.} } @conference {Douiri2011, title = {A neuro fuzzy PI controller used for speed control of a direct torque to twelve sectors controlled induction machine drive}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2011}, note = {cited By 4}, doi = {10.1109/ICMCS.2011.5945686}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79961222052\&doi=10.1109\%2fICMCS.2011.5945686\&partnerID=40\&md5=14b83e291be8c3d053a918bfeceefbcd}, author = {Douiri, M.R. and Cherkaoui, M. and Nasser, T. and Essadki, A.} } @conference { ISI:000309893900035, title = {Strategic Alignment: Comparison of Approaches}, booktitle = {ENTERPRISE INFORMATION SYSTEMS, PT 2}, series = {Communications in Computer and Information Science}, volume = {220}, year = {2011}, note = {International Conference on Enterprise Information Systems, Vilamoura, PORTUGAL, OCT 05-07, 2011}, pages = {345-355}, publisher = {Polytechn Inst Cavado \& Ave; Univ Tras os Montes \& Alto Douro}, organization = {Polytechn Inst Cavado \& Ave; Univ Tras os Montes \& Alto Douro}, abstract = {Nowadays, the strategic alignment of information systems has become a priority in most large organizations. It is a question of aligning the information system on the business strategies of the organization. This step is aimed at increasing the practical value of the information system and makes it a strategic asset for the organization. In the literature several approaches have been developed to solve the problem of alignment. For example the approach of alignment between architecture and the business context, the approach needs oriented, approach alignment between process and information system ... etc. In this paper we propose a detailed study of each approach (benefits and limitation) and we propose a comparison between these different approaches.}, isbn = {978-3-642-24354-7}, issn = {1865-0929}, author = {Doumi, Karim and Baina, Salah and Baina, Karim}, editor = {CruzCunha, MM and Varajao, J and Powell, P and Martinho, R} } @article {Doumi2011345, title = {Strategic alignment: Comparison of approaches}, journal = {Communications in Computer and Information Science}, volume = {220 CCIS}, number = {PART 2}, year = {2011}, note = {cited By 1}, pages = {345-355}, doi = {10.1007/978-3-642-24355-4_35}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-80054072370\&doi=10.1007\%2f978-3-642-24355-4_35\&partnerID=40\&md5=ecff31b0d65253fbf27c7a3a20d8f462}, author = {Doumi, K. and Baina, S. and Baina, K.} } @conference {Haddadi2011, title = {Xplor Everywhere - The competitive intelligence system for mobile}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2011}, note = {cited By 0}, doi = {10.1109/ICMCS.2011.5945635}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79961229104\&doi=10.1109\%2fICMCS.2011.5945635\&partnerID=40\&md5=855b957db3f0a95be0b4115a594521fa}, author = {Haddadi, A.E. and Dousset, B. and Berrada, I.} } @conference { ISI:000392778800068, title = {AN ONTOLOGY CHANGE MANAGEMENT SYSTEM An Experiment on a Health Care Case Study}, booktitle = {KEOD 2010: Proceedings of the International Conference on Knowledge Engineering and Ontology Development}, year = {2010}, note = {International Conference on Knowledge Engineering and Ontology Development (KEOD 2010), Valencia, SPAIN, OCT 25-28, 2010}, pages = {449-452}, publisher = {Inst Syst \& Technol Informat Control \& Commun}, organization = {Inst Syst \& Technol Informat Control \& Commun}, abstract = {Numerous ontologies have been developed for life science domains. These ontologies are continuously changing. Thus, it is becoming profitable to study and to manage these ontologies change in order to keep all dependent ontologies and their related mappings consistent. The aim of this paper is to propose an agent based approach enabling not only ontology and ontology mapping evolution analysis but also to manage their changes. An experiment in health care illustrates the benefits of our approach. We apply our algorithm, and implementation prototype p(2)OEManager to eye specialist ontology (ESO) and primary health care ontology (PCO), and particularly, we use our ontology agent model, and prototype to manage some significant changes in the ESO ontology.}, isbn = {978-989-8425-29-4}, author = {Slimani, Soumaya and Baina, Karim and Baina, Salah and Henkel, Martin and Perjons, Erik}, editor = {Filipe, J and Dietz, JLG} } @conference { ISI:000274539400007, title = {AQM applications in MAODV ad hoc network}, booktitle = {2009 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT)}, year = {2009}, note = {16th International Conference on Telecommunications (ICT), Marrakech, MOROCCO, MAY 25-27, 2009}, pages = {37-40}, abstract = {Disaster relief, education, and military are common situations where nodes need to communicate in areas without any preexisting infrastructure. In these situations, ad-hoc networks are used. Active Queue Management (AQM) has been successfully demonstrated as a solution to the global synchronization problem in the context of wired networks. To the best of our knowledge there is limited research work on the effect of queuing mechanisms in these networks (multicast in particular). We provided performance comparisons of Priority Queuing (PriQ), Drop Tail (DT) and Deficit Round Robin (DRR) which are some queues mechanisms, in ad-hoc network using MAODV protocol.}, isbn = {978-1-4244-2936-3}, doi = {10.1109/ICTEL.2009.5158615}, author = {de Barros, Manuel A. P. and El Koutbi, Mohammed} } @conference {DeBarros200937, title = {AQM applications in MAODV ad hoc network}, booktitle = {16th International Conference on Telecommunications, ICT 2009}, year = {2009}, note = {cited By 0}, pages = {37-40}, doi = {10.1109/ICTEL.2009.5158615}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-77950670401\&doi=10.1109\%2fICTEL.2009.5158615\&partnerID=40\&md5=670f14dd45610aa5cd5640d6936ca1da}, author = {De Barros, M.A.P. and El Koutbi, M.} } @conference {Dya2009889, title = {Comparative study of fractal technics for digital compressing images}, booktitle = {Proceedings of the 2009 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2009}, volume = {2}, year = {2009}, note = {cited By 0}, pages = {889-894}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84864947398\&partnerID=40\&md5=55c98dc1493218a0d97c614b1f26e88e}, author = {Dya, Z. and Badri, A. and Sahel, A. and Hajami, A.} } @conference {Belkhayat2009, title = {Dynamic model of the E-Strategy inspired from the information systems{\textquoteright} urbanization [Mod{\`e}le dynamique de la E-Strat{\'e}gie inspir{\'e} de l{\textquoteright}urbanisation des syst{\`e}mes d{\textquoteright}information]}, booktitle = {14th International Conference of the Association Information and Management 2009, AIM 2009}, year = {2009}, note = {cited By 0}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84870450763\&partnerID=40\&md5=56a318e3533b30a19d6f426c63bda333}, author = {Belkhayat, N. and Doukkali, P.A. and Regragui, P.B.} } @conference { ISI:000289870300013, title = {GDCoS: A Group Dedicated Class of Service for QoS Multicast Provisioning in ISP Communication Networks}, booktitle = {2009 FIRST INTERNATIONAL CONFERENCE ON EVOLVING INTERNET (INTERNET 2009)}, year = {2009}, note = {1st International Conference on Evolving Internet, Cannes, FRANCE, AUG 23-29, 2009}, pages = {77-82}, abstract = {Offering new Multicast Services supporting Quality of Service becomes essential for an Internet Service Provider at the worldwide level. The {\textquoteleft}{\textquoteleft}IP Multicasr technology is stable, but scalability of {\textquoteleft}{\textquoteleft}Quality of Service multicast{{\textquoteright}{\textquoteright}} is further from being solved, since scalability problems appear with the increasing number of concurrently active multicast groups. In this paper, we propose a framework that offers Quality of Service enabled multicast. We start with discussing the drawbacks of Quality of Service policies that are currently adopted by Service Providers, and point out their real needs from a multicast view point. In our approach, a Service Provider will propose an independent Class of Service dedicated to multicast applications. We describe the properties of this {\textquoteleft}{\textquoteleft}Dedicated Class of Service{{\textquoteright}{\textquoteright}}, and associate {\textquoteleft}{\textquoteleft}Admission Control{{\textquoteright}{\textquoteright}} mechanisms. We discuss the advantages of our approach, based on multicast extensions and adaptations of Diffserv model. Implementation issues are also presented in an MPIS environment. We conclude, through a case study, that it is possible to dedicate a class of service for multicast traffic.}, isbn = {978-1-4244-4718-3}, author = {El Kettani, Mohamed Dafir Ech-Cherif and Khatib, AbdelAli}, editor = {Borcoci, E and McKee, S and Bogliolo, A and Dini, O} } @conference { ISI:000274084500026, title = {NCSecMM: A National Cyber Security Maturity Model for an Interoperable {\textquoteleft}{\textquoteleft}National Cyber Security{{\textquoteright}{\textquoteright}} Framework}, booktitle = {9TH EUROPEAN CONFERENCE ON E-GOVERNMENT, PROCEEDINGS}, year = {2009}, note = {9th European Conference on e-Government, Univ Westminister Business Sch, London, ENGLAND, JUN 29-30, 2009}, pages = {236-247}, abstract = {Security Maturity Model is a systematic approach that replaces traditional security metrics. There is more than one Security Maturity Model (SMM, COBIT, CERT/CSO, ISM3), and each of them has only five levels of maturity, providing the blueprint for a complete security program, telling management the order in which to implement security elements (ISM3 Consortium 2007), and leading toward the use of best practice standards (e.g., BS 17799). But none of them is dedicated to National Cybersecurity. We propose in this paper a {\textquoteleft}{\textquoteleft}National CyberSecurity Maturity Model{{\textquoteright}{\textquoteright}}, that will make it possible to evaluate the security of a country or a whole region, making thus comparisons between them, and pointing out its forces and threats.}, isbn = {978-1-906638-33-7}, author = {El Kettani, Mohamed Dafir Ech-Cherif and Debbagh, Taieb}, editor = {Hahamis, P and Remenyi, D} } @conference {ElKettani2009236, title = {NCSecMM: A national cyber security maturity model for an interoperable "National cyber security" framework}, booktitle = {Proceedings of the European Conference on e-Government, ECEG}, year = {2009}, note = {cited By 2}, pages = {236-247}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84871878180\&partnerID=40\&md5=5b922df54e6a4812752ad717ef5a6b95}, author = {El Kettani, M.D.E.-C. and Debbagh, T.} } @article {ElAfia2008157, title = {Asymptotic analysis of the trajectories of the logarithmic barrier algorithm without constraint qualifications}, journal = {RAIRO - Operations Research}, volume = {42}, number = {2}, year = {2008}, note = {cited By 0}, pages = {157-198}, doi = {10.1051/ro:2008008}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-44349158950\&doi=10.1051\%2fro\%3a2008008\&partnerID=40\&md5=85dc093209f6926a9de375305dc031bc}, author = {El Afia, A. and Benchakroun, A. and Dussault, J.-P. and El Yassini, K.} } @article { ISI:000255967900006, title = {Asymptotic analysis of the trajectories of the logarithmic barrier algorithm without constraint qualifications}, journal = {RAIRO-OPERATIONS RESEARCH}, volume = {42}, number = {2}, year = {2008}, note = {4th International Conference on Operational Research, Cadi Ayyad Univ, Marrakech, MOROCCO, MAY 22-26, 2005}, month = {APR-JUN}, pages = {157-198}, abstract = {In this paper, we study the differentiability of the trajectories of the logarithmic barrier algorithm for a nonlinear program when the set Lambda{*} of the Karush-Kuhn-Tuckermultiplier vectors is empty owing to the fact that the constraint qualifications are not satisfied.}, issn = {0399-0559}, doi = {10.1051/ro:2008008}, author = {El Afia, A. and Benchakroun, A. and Dussault, J. -P. and El Yassini, K.} } @conference {Berqia200816, title = {Fairness and QoS in ad-hoc networks}, booktitle = {IEEE Vehicular Technology Conference}, year = {2008}, note = {cited By 2}, pages = {16-20}, doi = {10.1109/VETECS.2008.16}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-47749084749\&doi=10.1109\%2fVETECS.2008.16\&partnerID=40\&md5=4f700df4d5db788cc77adca79f873bb9}, author = {Berqia, A. and Angoma, B. and Mikou, N. and Dehbi, Y.} } @conference {ElKettani2008373, title = {NCSec-A national Cyber security Referential for the development of a code of practice in national Cyber security management}, booktitle = {ACM International Conference Proceeding Series}, volume = {351}, year = {2008}, note = {cited By 1}, pages = {373-380}, doi = {10.1145/1509096.1509174}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-70349154613\&doi=10.1145\%2f1509096.1509174\&partnerID=40\&md5=472b2d57a810d6024f9a4b02047a233d}, author = {El Kettani, M.D.E.-C. and Debbagh, T.} } @conference { ISI:000259298600002, title = {Software cost estimation models using Radial Basis Function Neural Networks}, booktitle = {SOFTWARE PROCESS AND PRODUCT MEASUREMENT}, series = {Lecture Notes in Computer Science}, volume = {4895}, year = {2008}, note = {Joint Meeting of the International Workshop on Software Measurement (IWSM)/International Conference on Software Process and Product Measurement (MENSURA), Palma de Mallorca, SPAIN, NOV 05-07, 2007}, pages = {21+}, abstract = {Radial Basis Function Neural Networks (RBFN) have been recently studied due to their qualification as an universal function approximation. This paper investigates the use of RBF neural networks for software cost estimation, The focus of this study is on the design of these networks, especially their middle layer composed of receptive fields, using two clustering techniques: the C-means and the APC-III algorithms. A comparison between a RBFN using C-means and a RBFN using APC-III, in terms of estimates accuracy, is hence presented. This study uses the COCOMO{\textquoteright}81 dataset and data on Web applications from the Tukutuku database.}, isbn = {978-3-540-85552-1}, issn = {0302-9743}, author = {Idri, Ali and Zahi, Azeddine and Mendes, Emilia and Zakrani, Abdelali}, editor = {CuadradoGallego, JJ and Braungarten, R and Dumke, RR and Abran, A} } @conference { ISI:000241553600078, title = {Fundamental region based indexing and classification of Islamic star pattern images}, booktitle = {IMAGE ANALYSIS AND RECOGNITION, PT 2}, series = {Lecture Notes in Computer Science}, volume = {4142}, year = {2006}, note = {3rd International Conference on Image Analysis and Recognition, Povoa de Varzim, PORTUGAL, SEP 18-20, 2006}, pages = {865-876}, abstract = {In this paper, we propose a new method for the indexing and classification of Islamic Stars Pattern (ISP) images based on rotational symmetry information. A computational model for the extraction of rotational symmetry features is proposed. This model is based on the three following steps. First, we detect the rotation center of the ISP image, then we complete the image structure by using symmetry information. Second, we compute the angle of rotation and number of folds. Finally, we extract the fundamental region, a representative region in the image from which the whole image can be regenerated. A method is also proposed for indexing and classifying ISP images on the basis of the extracted features. The classification algorithm is based on the number of folds. We characterize an image by its fundamental region and by its class which is defined in the classification step. Experiments show promising results either for ISP images classification or indexing. Efforts for the subsequent task of repeated pattern images classification can be significantly reduced.}, isbn = {3-540-44894-2}, issn = {0302-9743}, author = {Djibril, Mohamed Ould and Hadi, Youssef and Thami, Rachid Oulad Haj}, editor = {Campilho, A and Kamel, M} } @conference { ISI:000231849800003, title = {Towards mining structural workflow patterns}, booktitle = {DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS}, series = {LECTURE NOTES IN COMPUTER SCIENCE}, volume = {3588}, year = {2005}, note = {16th International Workshop on Database and Expert Systems Applications, Copenhagen Business Sch, Copenhagen, DENMARK, AUG 22-26, 2005}, pages = {24-33}, publisher = {Danish Minist Sci, Technol \& Innov; DEXA Assoc; Austrian Comp Soc; Res Inst Appl Knowledge Proc; FAW Software Engn GmbH}, organization = {Danish Minist Sci, Technol \& Innov; DEXA Assoc; Austrian Comp Soc; Res Inst Appl Knowledge Proc; FAW Software Engn GmbH}, abstract = {Collaborative information systems are becoming more and more complex, involving numerous interacting business objects within considerable processes. Analysing the interaction structure of those complex systems will enable them to be well understood and controlled. The work described in this paper is a contribution to these problems for workflow based process applications. In fact, we discover workflow patterns from traces of workflow events based on a workflow mining technique. Workflow mining proposes techniques to acquire a workflow model from a workflow log. Mining of workflow patterns is done by a statistical analysis of log-based event. Our approach is characterised by a {\textquoteleft}{\textquoteleft}local{{\textquoteright}{\textquoteright}} workflow patterns discovery that allows to cover partial results and a dynamic technique dealing with concurrency.}, isbn = {3-540-28566-0}, issn = {0302-9743}, author = {Gaaloul, W and Baina, K and Godart, C}, editor = {Andersen, KV and Debenham, J and Wagner, R} } @article { ISI:000183893900014, title = {A multi-level generic model for content image retrieval}, journal = {ANNALS OF TELECOMMUNICATIONS-ANNALES DES TELECOMMUNICATIONS}, volume = {58}, number = {3-4}, year = {2003}, month = {MAR-APR}, pages = {630-655}, abstract = {In this paper we propose a generic model for content image modelling. The model is based on several levels of information. Each level is called view and relates to a class of information. We distinguish three types of views : the concept, relation and interpretation views. The view concept or relation makes it possible to define respectively the concepts or the calculable relations automatically that do not require any particular interpretation. The view interpretation relates to the interpretation of the contents of the image. The number, the nature and the contents of each view are adaptable and can vary according to the type of application. The operational model is based on the nested conceptual graphs which we extended. The model is implemented and operational and the results obtained are very encouraging.}, issn = {0003-4347}, author = {Thami, ROH and Chaarani, H and Daoudi, M and Rachik, M} }