@article {Haddad20222115, title = {1{\texttimes}16 Rectangular dielectric resonator antenna array for 24 Ghz automotive radar system}, journal = {Bulletin of Electrical Engineering and Informatics}, volume = {11}, number = {4}, year = {2022}, note = {cited By 0}, pages = {2115-2123}, abstract = {This paper presents the design of a 1{\texttimes}16-elements RDRA array for anti-collision radar SRR application at 24 GHz. A single RDRA with high dielectric constant of 41, fed by a simple microstrip line feeding technique, is initially designed to operate around 24 GHz. The RDRA element is further used within an array network structure made up of 16 linear antenna elements to cover the same frequency band. The simulated 1{\texttimes}16 RDRA array can reach a high gain, up to18.6 dB, very high radiation efficiency (97\%), and ensure enough directional radiation pattern properties for radar applications with a 3-dB angular beam width of 6{\textdegree}. To validate our design, RDRA array{\textquoteright} radiation pattern computed results are compared to an equivalent fabricated patch antenna array reported in the literature. {\textcopyright} 2022, Institute of Advanced Engineering and Science. All rights reserved.}, doi = {10.11591/eei.v11i4.3068}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85133448647\&doi=10.11591\%2feei.v11i4.3068\&partnerID=40\&md5=a0d9425608cbc6d17f3ea7aeb3718bdd}, author = {Haddad, A. and Aoutoul, M. and Essaaidi, M. and Sabri, K. and Khoukh, A. and Errami, Y. and Had, A. and El Moukhtafi, F. and Jouali, R.} } @article {Chaouni2022251, title = {Alignment of Software System Level with Business Process Level: Resolving Syntactic and Semantic Conflicts}, journal = {International Journal of Advanced Computer Science and Applications}, volume = {13}, number = {7}, year = {2022}, note = {cited By 0}, pages = {251-262}, abstract = {Information systems help organizations manage their entities with innovative technologies. These entities are often very different in nature. In this paper, we consider a business process level based on a set of Business Process Model and Notation (BPMN) models and a software system level based on a Unified Modeling Language (UML) class diagram. The differences between these entities make them difficult to align. In addition, an organization{\textquoteright}s BPMN models may be designed by different teams, which can cause syntactic and semantic heterogeneities. We present the first step of our proposed approach for aligning a software system level with a business process level without conflict (redundancy and lost information). Syntactic and semantic rules based on ontologies and other resources for comparing BPMN models are described, as well as a process for transforming BPMN models into UML model. {\textcopyright} 2022. International Journal of Advanced Computer Science and Applications.All Rights Reserved}, keywords = {Business Process, Business process model and notation, Business process modeling, Class diagrams, Computer software, Information management, Information system alignment, Information systems, Information use, Ontology, Ontology{\textquoteright}s, Semantic aspect, Semantics, Software-systems, Syntactics, Systems alignments, Unified Modeling Language}, doi = {10.14569/IJACSA.2022.0130733}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135807702\&doi=10.14569\%2fIJACSA.2022.0130733\&partnerID=40\&md5=c926fa84b9a85ef4d8f825d949952fb0}, author = {Chaouni, S.B. and Habba, M. and Fredj, M.} } @conference {Hmami2022, title = {Applying change tree method in configurable process mining}, booktitle = {2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology, IRASET 2022}, year = {2022}, note = {cited By 0}, abstract = {Changes are unexpected events that can be visualized on the logs of each business process. By analysing these logs, particularly change logs ones, we can provide valuable information about changes that occurred during the process{\textquoteright}s execution phases. In this paper we propose to apply a new version of the change tree method to analyse change logs of a configurable process model obtained through configurable process mining approaches, especially change mining ones. The configurable process model is a model that describes a family of business processes. By representing changes related to configurable models, managers can easily detect and retrieve information about changes and obtain answers to questions such as when the change occurs and how long it takes, and which elements are affected by those changes. This information will not be restricted to a single business process but to a collection of process variants. {\textcopyright} 2022 IEEE.}, keywords = {Business Process, Change logs, Change mining, Change tree method, Component, Configurable process mining, Configurable process models, Data mining, Forestry, Process mining, Tree method, Unexpected events}, doi = {10.1109/IRASET52964.2022.9738005}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85127982693\&doi=10.1109\%2fIRASET52964.2022.9738005\&partnerID=40\&md5=2c6cd5ffd83ee6a993a4045f7235ecdc}, author = {Hmami, A. and Sba{\"\i}, H. and Fredj, M.} } @article {Rguibi2022, title = {CXAI: Explaining Convolutional Neural Networks for Medical Imaging Diagnostic}, journal = {Electronics (Switzerland)}, volume = {11}, number = {11}, year = {2022}, note = {cited By 0}, abstract = {Deep learning models have been increasingly applied to medical images for tasks such as lesion detection, segmentation, and diagnosis. However, the field suffers from the lack of concrete definitions for usable explanations in different settings. To identify specific aspects of explainability that may catalyse building trust in deep learning models, we will use some techniques to demonstrate many aspects of explaining convolutional neural networks in a medical imaging context. One important factor influencing clinician{\textquoteright}s trust is how well a model can justify its predictions or outcomes. Clinicians need understandable explanations about why a machine-learned prediction was made so they can assess whether it is accurate and clinically useful. The provision of appropriate explanations has been generally understood to be critical for establishing trust in deep learning models. However, there lacks a clear understanding on what constitutes an explanation that is both understandable and useful across different domains such as medical image analysis, which hampers efforts towards developing explanatory tool sets specifically tailored towards these tasks. In this paper, we investigated two major directions for explaining convolutional neural networks: feature-based post hoc explanatory methods that try to explain already trained and fixed target models and preliminary analysis and choice of the model architecture with an accuracy of 98\% {\textpm} 0.156\% from 36 CNN architectures with different configurations. {\textcopyright} 2022 by the authors. Licensee MDPI, Basel, Switzerland.}, doi = {10.3390/electronics11111775}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85131637625\&doi=10.3390\%2felectronics11111775\&partnerID=40\&md5=27f0c0e64e6e5a8788f4515f49d6ad01}, author = {Rguibi, Z. and Hajami, A. and Zitouni, D. and Elqaraoui, A. and Bedraoui, A.} } @article {Ettazi2022117, title = {Design patterns for building context-aware transactional services in PaaS-enabled systems}, journal = {International Journal of Web Engineering and Technology}, volume = {17}, number = {2}, year = {2022}, note = {cited By 0}, pages = {117-143}, abstract = {Pervasive computing is characterised by a key feature that affects the operating environment of services and users. It places more emphasis on dynamic environments where available resources continuously vary without prior knowledge of their availability, while in static environments the services provided to users are determined in advance. At the same time, cloud computing paradigm introduced flexibility of use according to the user{\textquoteright}s profile and needs. In this paper, we aimed to provide context-aware transactional service (CATS) applications with solutions so that it can be integrated and invoked like any service in the digital ecosystem. The motivation in this paper is to offer design patterns that will guarantee short reaction times and minimal human intervention. Our proposal includes a cloud service model by developing a PaaS service that allows CATS adaptation. A new specification for the validation of CATS model has been also introduced using the ACTA formalism. Copyright {\textcopyright} 2022 Inderscience Enterprises Ltd.}, keywords = {ACTA, Cloud service models, Context- awareness, Context-Aware, Design Patterns, Distributed database systems, Key feature, ON dynamics, Operating environment, Paa, Platform as a Service (PaaS), Transactional service, Ubiquitous computing}, doi = {10.1504/IJWET.2022.125651}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85140992267\&doi=10.1504\%2fIJWET.2022.125651\&partnerID=40\&md5=60e1ee1cdbc8c6f1ce2d9b93a7d6fa0f}, author = {Ettazi, W. and Hafiddi, H. and Nassar, M.} } @conference {Habibi2022462, title = {Effect of Features Extraction and Selection on the Evaluation of Machine Learning Models}, booktitle = {IFAC-PapersOnLine}, volume = {55}, number = {12}, year = {2022}, note = {cited By 0}, pages = {462-467}, abstract = {The exponential growth of sophisticated malware attacks against computer systems, has alerted IT security experts on the shortcomings of traditional protection tools because, they became unable to detect new families of malware that are more advanced and use advanced tools such as polymorphism, metamorphism, and obfuscation tools. Nowadays, machine learning is widely used in several IT fields; and also in cybersecurity, and can be an essential tool for malware detection, moreover, it can go beyond the limits of classic malware detection methods, such as the signature-based method, the anomaly-based method and the hybrid-based method, etc. The purpose of this study is to analyze the feature selection and extraction effects on the performance of malware classification model using machine learning. The results show that reducing dimensionality of datasets can help to improve the efficiency of security models in restricted time but with high performance, Random Forest using chi-square achieves an accuracy of 99.51\%. {\textcopyright} 2022 Elsevier B.V.. All rights reserved.}, keywords = {ANN, Cybersecurity, Decision trees, Extraction, Feature extraction, Features extraction, KNN, Logistic regression, Logistics regressions, Machine-learning, Malware, Malware detection, Network security, Performance, random forest, Random forests}, doi = {10.1016/j.ifacol.2022.07.355}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137165053\&doi=10.1016\%2fj.ifacol.2022.07.355\&partnerID=40\&md5=b3575cc26a69761120b672e3d94e63c0}, author = {Habibi, O. and Chemmakha, M. and Lazaar, M.} } @article {Ouatiti2022, title = {An empirical study on log level prediction for multi-component systems}, journal = {IEEE Transactions on Software Engineering}, year = {2022}, note = {cited By 0}, abstract = {Please find the revised abstract attached. IEEE}, keywords = {Computer software, Data structures, Empirical studies, Java, Java programming language, Learning systems, Log level prediction, Multicomponents systems, Predictive models, Software logging, Software-systems}, doi = {10.1109/TSE.2022.3154672}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85125313776\&doi=10.1109\%2fTSE.2022.3154672\&partnerID=40\&md5=c178439b3606759a34f8e163ece1ea35}, author = {Ouatiti, Y.E. and Sayagh, M. and Kerzazi, N. and Hassan, A.E.} } @article {Wadghiri2022, title = {Ensemble blood glucose prediction in diabetes mellitus: A review}, journal = {Computers in Biology and Medicine}, volume = {147}, year = {2022}, note = {cited By 0}, abstract = {Considering the complexity of blood glucose dynamics, the adoption of a single model to predict blood glucose level does not always capture the inter- and intra-patients{\textquoteright} context changes. Ensembles are a set of machine learning techniques combining multiple single learners to find a better variance/bias trade-off and hence improve the prediction accuracy. The present paper aims to review the state of the art in predicting blood glucose using ensemble methods with regard to 8 criteria: publication year and sources, datasets used to train/evaluate the models, types of ensembles used, single learners involved to construct ensembles, combination schemes used to aggregate the base learners, metrics and validation methods adopted to assess the performance of ensembles, reported overall performance of the predictors and accuracy comparison of ensemble techniques with single models. A systematic literature review has been conducted in order to analyze and synthetize primary studies published between 2000 and 2020 in six digital libraries. A total of 32 primary papers were selected and reviewed with regard to eight review questions. The results show that ensembles have gained wider interest during the last years and improved in general the performance compared with other single models. However, multiple gaps have been identified concerning the ensembles construction process and the performance metrics used. Several recommendations have been made in this regard to design accurate ensembles for blood glucose level prediction. {\textcopyright} 2022 Elsevier Ltd}, keywords = {algorithm, Algorithms, Blood, Blood glucose, Blood glucose level, Data mining, Diabetes mellitus, Digital libraries, Economic and social effects, Ensemble methods, Forecasting, Glucose, glucose blood level, Glucose dynamics, human, Humans, Machine learning, Machine learning techniques, Machine-learning, Performance, Single models, Trade off}, doi = {10.1016/j.compbiomed.2022.105674}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85132341147\&doi=10.1016\%2fj.compbiomed.2022.105674\&partnerID=40\&md5=05bd59c3726654494a4be346e4e6a682}, author = {Wadghiri, M.Z. and Idri, A. and El Idrissi, T. and Hakkoum, H.} } @conference {Chemmakha2022771, title = {Improving Machine Learning Models for Malware Detection Using Embedded Feature Selection Method}, booktitle = {IFAC-PapersOnLine}, volume = {55}, number = {12}, year = {2022}, note = {cited By 0}, pages = {771-776}, abstract = {Machine learning performance always rely on relevant phase of pre-processing, that includes dataset cleaning, cleansing and extraction. Feature selection (FS) is a crucial phase too, because it is intended to increase the efficiency of Machine Learning (ML) models in terms of predictiveness, by assigning a representative value to the most important features in a dataset of malware. In this study, we focus on feature selection using embedded-based methods in order to minimize computational time and complexity of ML models. Embedded-based methods combine advantages of both filter-based and wrapped-based methods, in terms of studying the importance of features while executing the model and their reduced time of execution. Applying ML models shows a high stability of models will selecting 10 most relevant features from the dataset, with an accuracy that achieve 99.47\%, 99.02\% for respectively Random Forest (RF) and XGBoost (XGB). {\textcopyright} 2022 Elsevier B.V.. All rights reserved.}, keywords = {ANN, Decision trees, feature selection, Features selection, Lightgbm, Machine learning models, Machine-learning, Malware, Malware detection, Random forests, support vector machine, Support vector machines, Support vectors machine, Xgboost}, doi = {10.1016/j.ifacol.2022.07.406}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137157154\&doi=10.1016\%2fj.ifacol.2022.07.406\&partnerID=40\&md5=4c66048ed61a71abdde00c73a3839bbc}, author = {Chemmakha, M. and Habibi, O. and Lazaar, M.} } @article {Hakkoum2022, title = {Interpretability in the medical field: A systematic mapping and review study}, journal = {Applied Soft Computing}, volume = {117}, year = {2022}, note = {cited By 4}, abstract = {Context: Recently, the machine learning (ML) field has been rapidly growing, mainly owing to the availability of historical datasets and advanced computational power. This growth is still facing a set of challenges, such as the interpretability of ML models. In particular, in the medical field, interpretability is a real bottleneck to the use of ML by physicians. Therefore, numerous interpretability techniques have been proposed and evaluated to help ML gain the trust of its users. Methods: This review was carried out according to the well-known systematic map and review process to analyze the literature on interpretability techniques when applied in the medical field with regard to different aspects: publication venues and publication year, contribution and empirical types, medical and ML disciplines and objectives, ML black-box techniques interpreted, interpretability techniques investigated, their performance and the best performing techniques, and lastly, the datasets used when evaluating interpretability techniques. Results: A total of 179 articles (1994{\textendash}2020) were selected from six digital libraries: ScienceDirect, IEEE Xplore, ACM Digital Library, SpringerLink, Wiley, and Google Scholar. The results showed that the number of studies dealing with interpretability increased over the years with a dominance of solution proposals and experiment-based empirical type. Diagnosis, oncology, and classification were the most frequent medical task, discipline, and ML objective studied, respectively. Artificial neural networks were the most widely used ML black-box techniques investigated for interpretability. Additionally, global interpretability techniques focusing on a specific black-box model, such as rules, were the dominant explanation types, and most of the metrics used to evaluate interpretability were accuracy, fidelity, and number of rules. Moreover, the variety of the techniques used by the selected papers did not allow categorization at the technique level, and the high number of the sum of evaluations (671) of the articles raised a suspicion of subjectivity. Datasets that contained numerical and categorical attributes were the most frequently used in the selected studies. Conclusions: Further effort is needed in disciplines other than diagnosis and classification. Global techniques such as rules are the most used because of their comprehensibility to doctors, but new local techniques should be explored more in the medical field to gain more insights into the model{\textquoteright}s behavior. More experiments and comparisons against existing techniques are encouraged to determine the best performing techniques. Lastly, quantitative evaluation of interpretability and physicians{\textquoteright} implications in interpretability techniques evaluation is highly recommended to evaluate how the techniques will perform in real-world scenarios. It can ensure the soundness of the techniques and help gain trust in black-box models in medical environments. {\textcopyright} 2022 Elsevier B.V.}, keywords = {Black box modelling, Black boxes, Computational power, Computer aided diagnosis, Digital libraries, Explainability, Historical dataset, Interpretability, Machine learning, Medical fields, Neural networks, Systematic mapping, Systematic Review, XAI}, doi = {10.1016/j.asoc.2021.108391}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85122624142\&doi=10.1016\%2fj.asoc.2021.108391\&partnerID=40\&md5=38db4d1f5c417a07d0a3204639e157a2}, author = {Hakkoum, H. and Abnane, I. and Idri, A.} } @article {Yousfi2022205, title = {The Large Annotated Corpus for the Arabic Language (LACAL)}, journal = {Studies in Computational Intelligence}, volume = {1061}, year = {2022}, note = {cited By 0}, pages = {205-219}, abstract = {Annotated corpora has an important role in the NLP field. They are used in almost all NLP applications: automatic dictionary construction, text analysis, information retrieval, machine translation, etc. Annotated corpora are the basis for training operation in NLP systems. Without these corpora, it is difficult to build an efficient system that takes into account all variations and linguistic phenomena. In this paper, we present the annotated corpus we developed. This corpus contains more than 12 million different words labeled by different types of labels: syntactic, morphological, and semantic. This large corpus adds value to the Arabic NLP field, and will certainly improve the quality of the training phase of Arabic NLP systems. Moreover it can be a suitable corpus to test and evaluate the quality of these systems. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-14748-7_12}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85139393388\&doi=10.1007\%2f978-3-031-14748-7_12\&partnerID=40\&md5=5e4ea0e7df29b510ad4dae099d9f1725}, author = {Yousfi, A. and Boumehdi, A. and Laaroussi, S. and Makoudi, R. and Aouragh, S.L. and Gueddah, H. and Habibi, B. and Nejja, M. and Said, I.} } @conference {ElHamlaoui2022424, title = {A Model Based Approach for Generating Modular Manufacturing Control Systems Software}, booktitle = {Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE}, year = {2022}, note = {cited By 0}, pages = {424-427}, abstract = {Digitalization is transforming manufacturing systems to become more agile and smart thanks to the integration of sensors and connection technologies that help capture data at all phases of a product{\textquoteright}s life cycle. Digitalization promises to improve manufacturing flexibility, quality, productivity, and reliability. However, there is still a significant need of effective methods to develop models that could enhance the capabilities of manufacturing systems. Formal methods and tools are becoming essential to achieve this objective. Within this context, this paper introduces a formal software solution for the automatic generation of modular manufacturing control systems software. The proposed solution leverages software Model-Based Design (MBD) techniques to reduce development effort, time, and human error by automating several manual steps. {\textcopyright} 2022 Knowledge Systems Institute Graduate School. All rights reserved.}, keywords = {All phase, Component, Control system software, Control systems, Cybe-physical manufacturing, Cyber Physical System, Cyber physicals, Digital subscriber lines, Embedded systems, formal methods, Grafcet, Industry 4.0, Life cycle, Manufacturing control systems, MDE, Metadata, Model based approach, Modulars}, doi = {10.18293/SEKE2022-151}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137161158\&doi=10.18293\%2fSEKE2022-151\&partnerID=40\&md5=3784648e72d7591498aa74fb97896480}, author = {El Hamlaoui, M. and Qamsane, Y. and Laghouaouta, Y. and Mishra, A.} } @article {Benabbes202261, title = {New Automatic Hybrid Approach for Tracking Learner Comprehension Progress in the LMS}, journal = {International Journal of Interactive Mobile Technologies}, volume = {16}, number = {19}, year = {2022}, note = {cited By 0}, pages = {61-80}, abstract = {Learning style is a significant learner-difference factor. Each learner has a preferred learning style and a different way of processing and understanding the novelty. In this paper, a new approach that automatically identifies learners learning styles based on their interaction with the Learning Management System (LMS) is introduced. To implement this approach, the traces of 920 enrolled learners in three agronomy courses were exploited using an unsupervised clustering method to group learners according to their degree of engagement. The decision tree classification algorithm relies on the decision rules construction, which is widely adopted to identify the accurate learning style. As the lack of good decision rules would lead to learning style misclassification, the Felder-Silverman Learning Style Model (FSLSM) is used as it is among the most adopted models in the technology of quality improvement process. The results of this research highlight that most learners prefer the global learning style {\textcopyright} 2022, International Journal of Interactive Mobile Technologies.All Rights Reserved.}, doi = {10.3991/ijim.v16i19.33733}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85140748669\&doi=10.3991\%2fijim.v16i19.33733\&partnerID=40\&md5=4c17d51043684f46667ce010388153ce}, author = {Benabbes, K. and Hmedna, B. and Housni, K. and Zellou, A. and El Mezouary, A.} } @article {Benjbara2022, title = {New Multipath OLSR Protocol Version for Heterogeneous Ad Hoc Networks}, journal = {Journal of Sensor and Actuator Networks}, volume = {11}, number = {1}, year = {2022}, note = {cited By 2}, abstract = {From a basic refrigerator to a self-driving car, emerging technologies are increasingly involving various facets of our daily lives. These bring together many regularly used devices, each with its own characteristics, to communicate and collaborate within the same system. Computer network experts regard this so-called structure as a heterogeneous network made up of several connected objects that do not speak the same language. Communication is therefore ensured by additional types of nodes, such as gateways or converters. In this case, we can detect an increased complexity and a decreased level of security. And thus, the need to adopt a common slang for these kinds of networks has been brought to life. In this work, we compare two different routing protocols: optimized link-state routing (OLSR) and the multipath heterogeneous ad hoc network OLSR (MHAR-OLSR). The latter is an OLSR extension with new functionalities: nodes identification, paths calculation, paths classification, and paths choice that we designed for heterogeneous ad hoc networks composed of MANET, VANET, and FANET devices; it ensures direct communication between these diverse components. We verify and explain all the elements of our solution using colored Petri nets. We also present a global evaluation of Packet Delivery Ratio (PDR), End-To-End Delay, and energy consumption as QoS measures with different numbers of nodes in a heterogeneous scenario. To do this, we use NS-3 and BonnMotion as a tool-set of simulation. Experimental results show improvement in performance when compared to the classical routing protocol. {\textcopyright} 2021 by the authors. Licensee MDPI, Basel, Switzerland.}, doi = {10.3390/jsan11010003}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85123433811\&doi=10.3390\%2fjsan11010003\&partnerID=40\&md5=33b170f6ff565a7280552166245f00f6}, author = {Benjbara, C. and Habbani, A. and Mouchfiq, N.} } @article {Mouchfiq2022128, title = {An Overview of~Security in~Vehicular Ad Hoc Networks}, journal = {Lecture Notes in Networks and Systems}, volume = {489 LNNS}, year = {2022}, note = {cited By 0}, pages = {128-140}, abstract = {In recent decades, the importance of security has increased more and more especially in the field of research dealing with the Internet of Things (IoT) and implicitly ad hoc networks since they are part of it, considering they undergo several changes and that following these changes this area is exposed to several risks. Many researchers have shed light on different techniques to ensure the security of this intelligent universe. In this study, we identify the risks to which Vehicular ad hoc networks (VANETs) are exposed according to several criteria and metrics. For this purpose, we do bench-marking by carrying out research on the types of attacks that harm VANETs, after that we study the solutions proposed to ensure a high level of security in this type of network and finally we discuss these solutions to find out one that is most adapted to our teamwork and which is based on a relevant and recent technology. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-07969-6_10}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135087175\&doi=10.1007\%2f978-3-031-07969-6_10\&partnerID=40\&md5=8cad0a611223b0af69336b1e9d2121d2}, author = {Mouchfiq, N. and Habbani, A. and Benjbara, C. and Berradi, H.} } @article {Benabbes20221017, title = {Recommendation System Issues, Approaches and Challenges Based on User Reviews}, journal = {Journal of Web Engineering}, volume = {21}, number = {4}, year = {2022}, note = {cited By 0}, pages = {1017-1054}, abstract = {With the ever-increasing volume of online information, recommender systems have been effective as a strategy to overcome information overload. They have a wide range of applications in many fields, including e-learning, e-commerce, e-government and scientific research. Recommender systems are search engines that are based on the user{\textquoteright}s browsing history to suggest a product that expresses their interests. Being usually in the form of textual comments and ratings, such reviews are a valuable source of information about users{\textquoteright} perceptions. Recommender systems (RSs) apply various approaches to predict users{\textquoteright} interest on information, products and services among a huge amount of available items. In this paper, we will describe the recommender system, discuss ongoing research in this field, and address the challenges, limitations and the techniques adopted. This paper also discusses how review texts are interpreted to solve some of the major problems with traditional recommendation techniques. To assess the value of a recommender system, qualitative evaluation measures are discussed as well in this research. Based on a series of selected articles published between 2008 and 2020, the study allowed us to conclude that the efficiency of RSs is strongly centered on the control of information context, the operated exploration algorithm, the method, and the type of processed data in addition to the information on users{\textquoteright} trust. {\textcopyright} 2022 River Publishers. All rights reserved.}, doi = {10.13052/jwe1540-9589.2143}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85131073458\&doi=10.13052\%2fjwe1540-9589.2143\&partnerID=40\&md5=56b7da2c9aa6d4c44328fa667db5ef0a}, author = {Benabbes, K. and Housni, K. and El Mezouary, A. and Zellou, A.} } @article {ElMejjatti2022, title = {Regression analysis-based identification model of key impactful parameters on buried antennas}, journal = {International Journal of Communication Systems}, volume = {35}, number = {4}, year = {2022}, note = {cited By 1}, abstract = {The antenna{\textquoteright}s bandwidth is strongly dependent on its physical properties and the environment where it is located. Nevertheless, for transmitting devices embedded permanently in the soil, the propagation medium{\textquoteright}s properties are unstable due to dielectric permittivity{\textquoteright}s spatial and temporal changes. Relying on soil parameters values, we present three new multivariable regression models allowing a good fit to the dataset curves with antenna{\textquoteright}s resonant frequency variations prediction of about 98\%. Precisely, such models have been obtained with the help of the multiple linear regression analysis method. Additionally, the results revealed that amongst four considered parameters (i.e., volumetric moisture, bulk density, specific density, and temperature), volumetric moisture is the most influencing factor on the antenna operating frequency band with a correlation coefficient of -0.989, whereas it equals 0.04, -0.035, and -0.002 for the temperature, bulk density, and specific density, respectively. {\textcopyright} 2021 John Wiley \& Sons Ltd.}, keywords = {\%moisture, Antenna bandwidth, Antennas, Bulk density, Identification modeling, Internet of underground thing, Linear regression, Moisture, Moisture determination, Multiple linear regression analyses (MLRA), Natural frequencies, Permittivity, Propagation media, Volumetrics, Wireless communications, Wireless underground sensor networks}, doi = {10.1002/dac.5051}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85119955862\&doi=10.1002\%2fdac.5051\&partnerID=40\&md5=551c7d444e649e1e52b647125dd3e638}, author = {El Mejjatti, M. and Habbani, A. and El Bouanani, F.} } @article {ElHaddouti2022575, title = {A Secure and Trusted Fog Computing Approach based on Blockchain and Identity Federation for a Granular Access Control in IoT Environments}, journal = {International Journal of Advanced Computer Science and Applications}, volume = {13}, number = {3}, year = {2022}, note = {cited By 0}, pages = {575-584}, abstract = {Fog computing is a new computing paradigm that is an extension of the standard cloud computing model, which can be adopted as a cost effective strategy for managing connected objects, by enabling real-time computing and communication for analytical and decision making. Nonetheless, even though Fog-based Internet of Things networks optimize the standard architecture by moving computing, storage, communication, and control decision closer to the edge network, the technology becomes open to malicious attackers and remains many business risks that are not yet resolved. In fact, access control, privacy as well as trust risks present major challenges in Internet of Things environments based on Fog computing due to the large scale distributed nature of devices at the Fog layer. In addition, the traditional authentication methods are not adequate in Fog-based Internet of Things contexts since they consume significantly more computation power and incur high latency. To deal with these gaps, we present in this paper a secure and trusted Fog Computing approach based on Blockchain and Identity Federation technologies for a granular access control in IoT environments. The proposed scheme uses Smart Contract concept and Attribute-Based Access Control model to ensure the level of security and scalability required for data integrity without resorting to a central authority to make an access decision {\textcopyright} 2022. International Journal of Advanced Computer Science and Applications.All Rights Reserved.}, keywords = {Access control, Block-chain, Cloud-computing, Computing model, Computing paradigm, Cost effective strategies, Cost effectiveness, Decision making, Decisions makings, Digital storage, Fog, Fog computing, Identity federation, Internet of things, IOT, Real-time communication, Real-time computing, Smart contract, Trusted computing}, doi = {10.14569/IJACSA.2022.0130368}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85129902962\&doi=10.14569\%2fIJACSA.2022.0130368\&partnerID=40\&md5=65966293c50d57a061513c913c7b5bb3}, author = {El Haddouti, S. and El Kettani, M.D.E.-C.} } @article {ElHaddaoui2022529, title = {On the Sensitivity of LSTMs to Hyperparameters and Word Embeddings in the Context of Sentiment Analysis}, journal = {Lecture Notes in Networks and Systems}, volume = {489 LNNS}, year = {2022}, note = {cited By 0}, pages = {529-542}, abstract = {Recurrent neural networks are still providing excellent results in sentiment analysis tasks, variants such as LSTM and Bidirectional LSTM have become a reference for building fast and accurate predictive models. However, such performance is difficult to obtain due to the complexity of the models and the hyperparameters choice. LSTM based models can easily overfit to the studied domain, and tuning the hyperparameters to get the desired model is the keystone of the training process. In this work, we provide a study on the sensitivity of a selection of LSTM based models to various hyperparameters and we highlight important aspects to consider while using similar models in the context of sentiment analysis. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-07969-6_40}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135093996\&doi=10.1007\%2f978-3-031-07969-6_40\&partnerID=40\&md5=695a2003d02e28d6d72df06cca749381}, author = {El Haddaoui, B. and Chiheb, R. and Faizi, R. and El Afia, A.} } @article {Hammouchi2022, title = {STRisk: A Socio-Technical Approach to Assess Hacking Breaches Risk}, journal = {IEEE Transactions on Dependable and Secure Computing}, year = {2022}, note = {cited By 0}, abstract = {Data breaches have begun to take on new dimensions and their prediction is becoming of great importance to organizations. Prior work has addressed this issue mainly from a technical perspective and neglected other interfering aspects such as the social media dimension. To fill this gap, we propose a STRisk predictive system where we expand the scope of the prediction task by bringing into play the social media dimension. We study over 3800 US organizations including both victim and non-victim organizations. For each organization, we design a profile composed of a variety of externally measured technical indicators and social factors. In addition, to account for unreported incidents, we consider the non-victim sample to be noisy and propose a noise correction approach to correct mislabeled organizations. We then build several machine learning models to predict whether an organization is exposed to experience a hacking breach. By exploiting both technical and social features, we achieve an Area Under Curve (AUC) score exceeding 98\%, which is 12\% higher than the AUC achieved using only technical features. Furthermore, our feature importance analysis reveals that open ports and expired certificates are the best technical predictors, while spreadability and agreeability are the best social predictors. IEEE}, keywords = {Blogs, Cybe risk assessment, Cybe risk prediction, Data breach, Forecasting, Hacking breach, Learning systems, Malware, Noise measurements, Personal computing, Predictive models, Risk assessment, Risk predictions, Risks assessments, Security, Social networking (online)}, doi = {10.1109/TDSC.2022.3149208}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85124712380\&doi=10.1109\%2fTDSC.2022.3149208\&partnerID=40\&md5=f6b798bf0fc97476d3214d3efbc3597a}, author = {Hammouchi, H. and Nejjari, N. and Mezzour, G. and Ghogho, M. and Benbrahim, H.} } @article {Boumait2022251, title = {Survey IOT Systems Security Based on Machine Learning}, journal = {Lecture Notes in Networks and Systems}, volume = {455 LNNS}, year = {2022}, note = {cited By 0}, pages = {251-258}, abstract = {IoT technologies are essential for creating a variety of smart applications in the real world that will improve people{\textquoteright}s lives. The focus of this study is on the security of IoT systems using machine learning. It{\textquoteright}s about a thorough examination of the security challenges and threats that applications face. It{\textquoteright}s a survey of machine learning techniques that can be utilized to boost IoT system confidence and security. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-02447-4_26}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130368202\&doi=10.1007\%2f978-3-031-02447-4_26\&partnerID=40\&md5=7e46544676b219af8cfdbafd0edc735a}, author = {Boumait, E.M. and Habbani, A. and Souidi, M. and Didi, Z.} } @article {Khaldi20221377, title = {TimeSpec4LULC: a global multispectral time series database for training LULC mapping models with machine learning}, journal = {Earth System Science Data}, volume = {14}, number = {3}, year = {2022}, note = {cited By 0}, pages = {1377-1411}, abstract = {Land use and land cover (LULC) mapping are of paramount importance to monitor and understand the structure and dynamics of the Earth system. One of the most promising ways to create accurate global LULC maps is by building good quality state-of-the-art machine learning models. Building such models requires large and global datasets of annotated time series of satellite images, which are not available yet. This paper presents TimeSpec4LULC 10.5281/zenodo.5913554;Currency sign, a smart open-source global dataset of multispectral time series for 29 LULC classes ready to train machine learning models. TimeSpec4LULC was built based on the seven spectral bands of the MODIS sensors at 500gh{\texteuro}{\textasciimacron}m resolution, from 2000 to 2021, and was annotated using spatial-temporal agreement across the 15 global LULC products available in Google Earth Engine (GEE). The 22-year monthly time series of the seven bands were created globally by (1) applying different spatial-temporal quality assessment filters on MODIS Terra and Aqua satellites; (2) aggregating their original 8gh{\texteuro}{\textasciimacron}d temporal granularity into monthly composites; (3) merging Terragh{\texteuro}{\textasciimacron}+gh{\texteuro}{\textasciimacron}Aqua data into a combined time series; and (4) extracting, at the pixel level, 6gh{\texteuro}{\textasciimacron}076gh{\texteuro}{\textasciimacron}531 time series of size 262 for the seven bands along with a set of metadata: geographic coordinates, country and departmental divisions, spatial-temporal consistency across LULC products, temporal data availability, and the global human modification index. A balanced subset of the original dataset was also provided by selecting 1000 evenly distributed samples from each class such that they are representative of the entire globe. To assess the annotation quality of the dataset, a sample of pixels, evenly distributed around the world from each LULC class, was selected and validated by experts using very high resolution images from both Google Earth and Bing Maps imagery. This smartly, pre-processed, and annotated dataset is targeted towards scientific users interested in developing various machine learning models, including deep learning networks, to perform global LULC mapping. {\textcopyright} 2022 Rohaifa Khaldi et al.}, keywords = {Land cover, Land use, Machine learning, MODIS, multispectral image, spatiotemporal analysis, Time series analysis}, doi = {10.5194/essd-14-1377-2022}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85127624906\&doi=10.5194\%2fessd-14-1377-2022\&partnerID=40\&md5=90f9e45c7b39e149ab387a54f4392d6a}, author = {Khaldi, R. and Alcaraz-Segura, D. and Guirado, E. and Benhammou, Y. and El Afia, A. and Herrera, F. and Tabik, S.} } @article {Ajallouda2022466, title = {Toward a New Process for Candidate Key-Phrases Extraction}, journal = {Lecture Notes in Networks and Systems}, volume = {455 LNNS}, year = {2022}, note = {cited By 3}, pages = {466-474}, abstract = {Key-phrases in a document are the terms that allow us to have or know an idea of its content without having to read it. They can be used in many Natural Language Processing (NLP) applications, such as text summarization, machine translation, and text classification. These phrases are selected from a set of terms in the document called candidate key-phrases. Thus, any flaws that may arise during the selection of candidate phrases may affect the automatic key-phrase extraction (AKE). Despite the importance of identifying candidate key-phrases in the AKE process, we found a very limited number of researchers interested in identifying their features in the document. In this paper, we will present the features that will allow the identification of candidate key-phrases, based on the study and analysis of the features of 60,000 key-phrases manually selected from five different datasets. To improve the performance of AKE approaches. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-02447-4_48}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130348254\&doi=10.1007\%2f978-3-031-02447-4_48\&partnerID=40\&md5=7bc1168842009b4c70c8fea6cc905514}, author = {Ajallouda, L. and Hourrane, O. and Zellou, A. and Benlahmar, E.H.} } @article {Benhar2022791, title = {Univariate and Multivariate Filter Feature Selection for Heart Disease Classification}, journal = {Journal of Information Science and Engineering}, volume = {38}, number = {4}, year = {2022}, note = {cited By 0}, pages = {791-803}, abstract = {Feature selection (FS) is a data preprocessing task that can be applied before the classification phase, and aims at improving the performance and interpretability of classifiers by finding only a few highly informative features. The present study aims at evaluating and comparing the performances of six univariate and two multivariate filter FS techniques for heart disease classification. The FS techniques were evaluated with two white-box and two black-box classification techniques using five heart disease datasets. Furthermore, this study deals with the setting of the hyperparameters{\textquoteright} values of the four classifiers. This study evaluates 600 variants of classifiers. Results show that white-box classification techniques such as K-Nearest Neighbors and Decision Trees can be very competitive with black-box ones when hyperparameters{\textquoteright} optimization and feature selection were applied. {\textcopyright} 2022 Institute of Information Science. All rights reserved.}, keywords = {Black boxes, Cardiology, Classification (of information), Data preprocessing, Decision trees, disease classification, Diseases, feature selection, Features selection, Filter, Heart, heart disease, Nearest neighbor search, Performance, Selection techniques, Univariate, White box}, doi = {10.6688/JISE.202207_38(4).0006}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137170374\&doi=10.6688\%2fJISE.202207_38\%284\%29.0006\&partnerID=40\&md5=f75bca8ff78e6782d4c11e88d338784f}, author = {Benhar, H. and Hosni, M. and Idri, A.} } @article {Hebroune2022581, title = {User-Enriched Embedding for Fake News Detection on Social Media}, journal = {Lecture Notes in Networks and Systems}, volume = {489 LNNS}, year = {2022}, note = {cited By 1}, pages = {581-599}, abstract = {Recent political, pandemic, and social turmoil events have led to an increase in the popularity and spread of misinformation. As demonstrated by the widespread effects of the large onset of fake news, humans are inconsistent if not outright poor detectors of fake news. Thereby, many efforts are being made to automate the process of fake news detection. The most popular of these approaches include blacklisting sources and authors that are unreliable. While these tools are useful, in order to create a more complete end to end solution, we need to account for more difficult cases where reliable sources and authors release fake news. As such, the goal of this paper is to propose an approach for detecting the language and behavioral patterns that characterize fake and real news through the use of social network analysis and natural language processing techniques. We have built a model that catches many intuitive indications of real and fake news using users and submissions attributes, and thus laid the foundation for an approach that concatenates multiple embeddings for better fake news detection on social media. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-07969-6_44}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135051740\&doi=10.1007\%2f978-3-031-07969-6_44\&partnerID=40\&md5=d606f2faefcf64892e7ecc776b39da96}, author = {Hebroune, O. and Benhiba, L.} } @article {Habba2021174, title = {Aligning Software System Level with Business Process Level through Model-Driven Architecture}, journal = {International Journal of Advanced Computer Science and Applications}, volume = {12}, number = {10}, year = {2021}, note = {cited By 1}, pages = {174-183}, abstract = {Information systems are intended to provide organisations with a new way of sustaining themselves, by helping them manage their activities using innovative technologies. Information systems require aligned levels for maximum effectiveness. In this context, business and information technology (IT) alignment is an important issue for the success of organisations. This paper presents the first step of the proposed approach to align the software system level, modelled by a Unified Modeling Language (UML) class diagram, with the business process level, modelled by the Business Process Model and Notation (BPMN) model. A model-driven architecture approach is proposed as a means to transform a set of BPMN models into a UML class diagram. A set of transformation rules is proposed, followed by guidelines that help apply those rules. {\textcopyright} 2021}, keywords = {Business Process, Business process model and notation (BPMN), Computer software, Information management, Information systems, Information use, Innovative technology, Model driven architectures, Model-driven architecture approaches, Software architecture, Software design, Transformation rules, UML class diagrams, Unified Modeling Language, Unified modeling language class diagrams}, doi = {10.14569/IJACSA.2021.0121020}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85119658852\&doi=10.14569\%2fIJACSA.2021.0121020\&partnerID=40\&md5=dcda8435272d6d8736ff7112ffa683f0}, author = {Habba, M. and Fredj, M. and Chaouni, S.B.} } @article {Hakkoum2021587, title = {Assessing and Comparing Interpretability Techniques for Artificial Neural Networks Breast Cancer Classification}, journal = {Computer Methods in Biomechanics and Biomedical Engineering: Imaging and Visualization}, volume = {9}, number = {6}, year = {2021}, note = {cited By 11}, pages = {587-599}, abstract = {Breast cancer is the most common type of cancer among women. Thankfully, early detection and treatment improvements helped decrease the number of deaths. Data Mining techniques have always assisted BC tasks whether it is screening, diagnosis, prognosis, treatment, monitoring, and/or management. Nowadays, the use of Data Mining is witnessing a new era. In fact, the main objective is no longer to replace humans but to enhance their capabilities, which is why Artificial Intelligence is now referred to as Intelligence Augmentation. In this context, interpretability is used to help domain experts learn new patterns and machine learning experts debug their models. This paper aims to investigate three black-boxes interpretation techniques: Feature Importance, Partial Dependence Plot, and LIME when applied to two types of feed-forward Artificial Neural Networks: Multilayer perceptrons, and Radial Basis Function Network, trained on the Wisconsin Original dataset for breast cancer diagnosis. Results showed that local LIME explanations were instance-level interpretations that came in line with the global interpretations of the other two techniques. Global/local interpretability techniques can thus be combined to define the trustworthiness of a black-box model. {\textcopyright} 2021 Informa UK Limited, trading as Taylor \& Francis Group.}, keywords = {Article, Artificial intelligence, artificial neural network, Breast Cancer, Breast cancer classifications, cancer diagnosis, Computer aided diagnosis, cross validation, Data mining, Data-mining techniques, Diseases, Domain experts, early diagnosis, entropy, Explainability, Feature importance, Interpretability, Learn+, learning, learning algorithm, Lime, Machine learning, Multilayer neural networks, nerve cell, nonhuman, Partial dependence plot, perceptron, prediction, prognosis, Radial basis function networks, Treatment monitoring}, doi = {10.1080/21681163.2021.1901784}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85103249025\&doi=10.1080\%2f21681163.2021.1901784\&partnerID=40\&md5=78e1e57a62692bab2b39984182af7904}, author = {Hakkoum, H. and Idri, A. and Abnane, I.} } @conference {Mouchfiq2021, title = {Blockchain-based Model Against selfish Attacks in Mobile ad hoc Networks}, booktitle = {Proceedings - 4th International Conference on Advanced Communication Technologies and Networking, CommNet 2021}, year = {2021}, note = {cited By 0}, abstract = {Over the past several decades, the importance of security has been increasing, in particular in the area of research addressing the Internet of Things (IoT) and, implicitly, ad hoc networks since they are part of it. Researchers have adopted blockchain as an interesting and trendy research topic in the wireless ad hoc environment. Due to its strong characteristics, such as consensus, immutability, finality and provenance, it{\textquoteright}s used not only as a secure data storage for critical data, but also as a platform that facilitates trustless data exchange between independent parties. However, the main challenge of applying blockchain in an ad hoc network is what kind of nodes should be involved in the validation process and how to adopt the heavy computational complexity of block validation in an appropriate way while maintaining its authentic characteristics. In this paper, we propose a new blockchain-based model against selfish attacks in ad hoc networks and optimize it in this context, to this end, we investigate the presence of MPR nodes to adapt and integrate the blockchain principle in MANETs and based on this we conduct a security analysis to evaluate our model by discussing the ability of our model to meet major security issues related to confidentiality, integrity, availability, non-repudiation, and vulnerability to attacks. {\textcopyright} 2021 IEEE.}, keywords = {Ad hoc environment, Ad-hoc networks, Block-chain, Blockchain, Digital storage, Electronic data interchange, Internet of things, Mobile ad hoc networks, Mobile ad-hoc networks, Mobile security, MPR, Network security, Research topics, Secure data storage, Security, Selfish attack, Wireless ad hoc}, doi = {10.1109/CommNet52204.2021.9641959}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85124026049\&doi=10.1109\%2fCommNet52204.2021.9641959\&partnerID=40\&md5=83605288b49be75af72d459c6e278bdd}, author = {Mouchfiq, N. and Habbani, A. and Benjbara, C. and Berradi, H.} } @article {Zerouaoui2021186, title = {Breast Fine Needle Cytological Classification Using Deep Hybrid Architectures}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {12950 LNCS}, year = {2021}, note = {cited By 6}, pages = {186-202}, abstract = {Diagnosis of breast cancer in the early stages allows to significantly decrease the mortality rate by allowing to choose the adequate treatment. This paper develops and evaluates twenty-eight hybrid architectures combining seven recent deep learning techniques for feature extraction (DenseNet 201, Inception V3, Inception ReseNet V2, MobileNet V2, ResNet 50, VGG16 and VGG19), and four classifiers (MLP, SVM, DT and KNN) for binary classification of breast cytological images over the FNAC dataset. To evaluate the designed architectures, we used: (1) four classification performance criterias (accuracy, precision, recall and F1-score), (1) Scott Knott (SK) statistical test to cluster the developed architectures and identify the best cluster of the outperforming architectures, and (2) Borda Count voting method to rank the best performing architectures. Results showed the potential of combining deep learning techniques for feature extraction and classical classifiers to classify breast cancer in malignant and benign tumors. The hybrid architectures using MLP classifier and DenseNet 201 for feature extraction were the top performing architectures with a higher accuracy value reaching 99\% over the FNAC dataset. As results, the findings of this study recommend the use of the hybrid architectures using DenseNet 201 for the feature extraction of the breast cancer cytological images since it gave the best results for the FNAC data images, especially if combined with the MLP classifier. {\textcopyright} 2021, Springer Nature Switzerland AG.}, keywords = {Binary classification, Breast Cancer, Classification (of information), Classification performance, Cluster computing, Clustering algorithms, Computer aided diagnosis, Computer architecture, Convolutional neural networks, Deep neural networks, Diseases, Extraction, Feature extraction, Features extraction, Histological images, Hybrid architectures, Image classification, Images processing, Learning algorithms, Learning techniques, Medical imaging, MLP classifiers, Mortality rate, Network architecture, Support vector machines}, doi = {10.1007/978-3-030-86960-1_14}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85125258661\&doi=10.1007\%2f978-3-030-86960-1_14\&partnerID=40\&md5=a4535504f03d3143ae1648f7edeb152c}, author = {Zerouaoui, H. and Idri, A. and Nakach, F.Z. and Hadri, R.E.} } @article {ElOuassif202150, title = {Classification techniques in breast cancer diagnosis: A systematic literature review}, journal = {Computer Methods in Biomechanics and Biomedical Engineering: Imaging and Visualization}, volume = {9}, number = {1}, year = {2021}, note = {cited By 12}, pages = {50-77}, abstract = {Data mining (DM) consists in analysing a~set of observations to find unsuspected relationships and then summarising the data in new ways that are both understandable and useful. It has become widely used in various medical fields including breast cancer (BC), which is the most common cancer and the leading cause of death among women~worldwide.~BC diagnosis is a~challenging medical task and many studies have attempted to apply classification techniques to it. The objective of the present study is to identify studies on classification techniques~in~BC diagnosis and to analyse them from~three perspectives: classification techniques used, accuracy of the classifiers, and comparison of performance. We performed a~systematic literature review (SLR) of 176 selected studies published between January~2000 and November~2018. The results show that, of the nine classification techniques investigated, artificial neural networks, support vector machines and decision trees were the most frequently used. Moreover, artificial neural networks, support vector machines and ensemble classifiers performed better than the other techniques, with median accuracy values of 95\%, 95\% and 96\% respectively. Most of the selected studies (57.4\%) used datasets containing different types of images such as mammographic, ultrasound, and microarray images. {\textcopyright} 2021 Informa UK Limited, trading as Taylor \& Francis Group.}, keywords = {Article, Artificial intelligence, artificial neural network, Breast Cancer, Breast cancer diagnosis, cancer diagnosis, cause of death, Causes of death, Classification (of information), Classification technique, Comparison of performance, Computer aided diagnosis, data extraction, Data mining, data synthesis, decision tree, Decision trees, Diseases, human, k nearest neighbor, Machine learning, Medical fields, Medical informatics, Network support, Neural networks, publication, qualitative research, Quality control, support vector machine, Support vector machine classifiers, Support vector machines, Support vectors machine, Systematic literature review, Systematic Review, validity}, doi = {10.1080/21681163.2020.1811159}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85098842973\&doi=10.1080\%2f21681163.2020.1811159\&partnerID=40\&md5=9a48998b1c44d263863efcfb25f9920f}, author = {ElOuassif, B. and Idri, A. and Hosni, M. and Abran, A.} } @conference {Bouamama2021560, title = {Cloud key management using trusted execution environment}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021}, year = {2021}, note = {cited By 0}, pages = {560-567}, abstract = {Cloud storage represents a primordial component in most information technology infrastructures. Using cloud instead of on-premise storage raises several security issues, especially when secret keys are stored on the cloud. In such a setting, a robust cloud key management system is a must. Using traditional key management systems (KMS) in the cloud suffers from performance and scalability limitations. This paper, proposes an efficient and secure cloud KMS based on Trusted Execution Environment, precisely Intel SGX. The suggested system (KMSGX), while being deployed on the cloud, is fully controlled by the end-user. Therefore, KMSGX allows running on-premise software key management securely on the cloud provider side, protecting the exchanged and stored data. The security properties of the suggested design have been formalized using the Applied Pi Calculus and proved with ProVerif. The experimental results have demonstrated the system{\textquoteright}s high performance in terms of the upload and download durations and the limited overhead compared to the plain design. Copyright {\textcopyright} 2021 by SCITEPRESS {\textendash} Science and Technology Publications, Lda. All rights reserved}, keywords = {Applied pi calculus, Calculations, Cloud providers, Cryptography, Digital storage, Information technology infrastructure, Key management systems, Performance and scalabilities, Security issues, Security properties, Trusted computing, Trusted execution environments}, doi = {10.5220/0010558905600567}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85111807187\&doi=10.5220\%2f0010558905600567\&partnerID=40\&md5=2745b5f1ad6970111bb700c309eea488}, author = {Bouamama, J. and Hedabou, M. and Erradi, M.} } @article {Fissaa2021151, title = {Combining planning and learning for context aware service composition}, journal = {International Journal of Data Analysis Techniques and Strategies}, volume = {13}, number = {1-2}, year = {2021}, note = {cited By 0}, pages = {151-169}, abstract = {Computing vision introduced by Mark Weiser in the early {\textquoteright}90s has defined the basis of what is called now ubiquitous computing. This new discipline results from the convergence of powerful, small and affordable computing devices with networking technologies that connect them all together. Thus, ubiquitous computing has brought a new generation of service-oriented architectures (SOA) based on context-aware services. These architectures provide users with personalised and adapted behaviours by composing multiple services according to their contexts. In this context, the objective of this paper is to propose an approach for context-aware semantic-based services composition. Our contributions are built around following axes: 1) a semantic-based context modelling and context-aware semantic composite service specification; 2) an architecture for context-aware semantic-based services composition using artificial intelligence planning; 3) an intelligent mechanism based on reinforcement learning for context-aware selection in order to deal with dynamicity and uncertain character of modern ubiquitous environment. Copyright {\textcopyright} 2021 Inderscience Enterprises Ltd.}, doi = {10.1504/IJDATS.2021.114673}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85105363779\&doi=10.1504\%2fIJDATS.2021.114673\&partnerID=40\&md5=a71041d2e85a5cf3407180fb5cff29b2}, author = {Fissaa, T. and El Hamlaoui, M. and Guermah, H. and Hafiddi, H. and Nassar, M.} } @article {HalhoulMerabet2021, title = {Corrigendum to {\textquotedblleft}Intelligent building control systems for thermal comfort and energy-efficiency: A systematic review of artificial intelligence-assisted techniques{\textquotedblright} (Renewable and Sustainable Energy Reviews (2021) 144, (11096), (S1364032121002616), (10}, journal = {Renewable and Sustainable Energy Reviews}, volume = {145}, year = {2021}, note = {cited By 0}, abstract = {The authors of the paper referred to in the title of this Corrigendum report a typo that slipped in the title of the third column in tables 3, 4, 5, 6, 7, 8, and 9, namely, {\textquotedblleft}Underlying AL/ML Tools{\textquotedblright} which should be corrected to {\textquotedblleft}Underlying AI/ML Tools{\textquotedblright}. We apologize for any confusion or inconvenience this typo may have caused. {\textcopyright} 2021 Elsevier Ltd}, doi = {10.1016/j.rser.2021.111116}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85104661544\&doi=10.1016\%2fj.rser.2021.111116\&partnerID=40\&md5=69c87a9ef7a2e1028872941094f56ec9}, author = {Halhoul Merabet, G. and Essaaidi, M. and Haddou, M.B. and Qolomany, B. and Qadir, J. and Anan, M. and Al-Fuqaha, A. and Abid, M.R. and Benhaddou, D.} } @article {Guermah2021110, title = {Dealing with context awareness for service-oriented systems: An ontology-based approach}, journal = {International Journal of Service Science, Management, Engineering, and Technology}, volume = {12}, number = {4}, year = {2021}, note = {cited By 1}, pages = {110-131}, abstract = {In recent years, rapid advances in the enabling technologies for mobile and ubiquitous computing, software paradigms, embedded sensor technologies, and wide range of wired and wireless protocols have been witnessed. Specifically, context-aware services-oriented applications are emerging as the next computing paradigm in which infrastructure and services are seamlessly available. Contextawareness, being an important ingredient, plays a vital role in enabling such interactive smart environments. More recently, the increasing popularity of ontologies has led to new ontology-based models of context because of their potential to support sophisticated ontology-based reasoning methods. This paper presents an architecture for the development of context-aware services based on ontologies. The authors highlight the context metamodel and discuss about reasoning process. This research also presents the semantic approach for service adaptation in context aware environment. Copyright {\textcopyright} 2021, IGI Global.}, doi = {10.4018/IJSSMET.2021070107}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85108948717\&doi=10.4018\%2fIJSSMET.2021070107\&partnerID=40\&md5=57712a52da5717426a70263e22f08eea}, author = {Guermah, H. and Guermah, B. and Fissaa, T. and Hafiddi, H. and Nassar, M.} } @article {Houmz2021, title = {Detecting the impact of software vulnerability on attacks: A case study of network telescope scans}, journal = {Journal of Network and Computer Applications}, volume = {195}, year = {2021}, note = {cited By 1}, abstract = {Network scanning is one of the first steps in gathering information about a target before launching attacks. It is used to scan for vulnerable devices and exposed services in order to exploit them. Such exploits can result in data breaches or network disruption, which can be very costly for organizations. There are many factors, including technical and non-technical, affecting the volume of scanning activities. In this paper, we study the impact of vulnerability disclosure on the volume of scans over time and propose a machine learning-based approach to predict this impact. We conducted a comprehensive data collection of network scans from two network telescopes hosted in different countries, as well as the disclosed vulnerabilities from 2014 to 2019. We then designed a set of features to characterize the disclosed vulnerabilities and used several classifiers to predict whether a vulnerability will impact the volume of daily scans. The resulting classifier achieves over 85\% accuracy in predicting the impact. In addition, we performed an analysis of the key characteristics of vulnerabilities that directly affect scanning activities. Our findings show that this approach is able to classify vulnerabilities that have an impact on network scans. The implementation of our model and validation tests proved the efficiency of the selected features, as well as the robustness of our model to classify vulnerabilities{\textquoteright} impact on scans. {\textcopyright} 2021 Elsevier Ltd}, keywords = {Case-studies, Classification algorithm, CVE, Forecasting, Machine learning, Network scan, Network scanning, Network security, Network telescopes, NVD, OR-networks, Scanning, Software vulnerabilities, Telescopes, Times series}, doi = {10.1016/j.jnca.2021.103230}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85116335984\&doi=10.1016\%2fj.jnca.2021.103230\&partnerID=40\&md5=1d7f8d5d4111761b27fc93badc70f925}, author = {Houmz, A. and Mezzour, G. and Zkik, K. and Ghogho, M. and Benbrahim, H.} } @conference {Hmami2021, title = {Enhancing change mining from a collection of event logs: Merging and Filtering approaches}, booktitle = {Journal of Physics: Conference Series}, volume = {1743}, number = {1}, year = {2021}, note = {cited By 3}, abstract = {An event log is the key element of all change mining and process mining approaches. Those approaches bridge the gap between conventional business process management and data analysis techniques such as machine learning and data mining. In this day, companies and business organizations usually use a family of business processes that may face different variations and adjustments. Still, those processes are widely identical, with a slight difference in specific points. Consequently, performing a process mining or a change mining for each process will be a redundant task. The use of a configurable process model is a practical solution for redundancy problem. Thus, the process mining areas such as discovering verifying the conformity of a business process and enhancing processes, are reduced considerably. However, the configurable process models and the variability concept are rarely introduced in change mining approaches. The existing methods that analyse and manage event logs do not then consider the variability issue. Therefore, the fact of using a collection of event log becomes a challenging task. Our proposed approach is to merge and filter a collection of event logs from the same family with respect to variability. Our goal is to enhance change mining from a collection of event logs and detect changes in variable fragments of the obtained event log. {\textcopyright} Published under licence by IOP Publishing Ltd.}, keywords = {Business organizations, Business Process, Business process management, Configurable process models, Data analysis techniques, Data mining, Data Science, Enterprise resource management, Filtration, Practical solutions, Redundancy problems, Variable fragment}, doi = {10.1088/1742-6596/1743/1/012020}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85101766097\&doi=10.1088\%2f1742-6596\%2f1743\%2f1\%2f012020\&partnerID=40\&md5=b0f4b6f1485dd0ca46c497f084c56c74}, author = {Hmami, A. and Sba{\"\i}, H. and Fredj, M.} } @article {Li20212522, title = {Error Rate Analysis of Non-Orthogonal Multiple Access with Residual Hardware Impairments}, journal = {IEEE Communications Letters}, volume = {25}, number = {8}, year = {2021}, note = {cited By 3}, pages = {2522-2526}, abstract = {In this letter, the impact of residual hardware impairment (RHI) on the performance of non-orthogonal multiple access (NOMA) is investigated by taking into account the effect of imperfect successive interference cancellation (ipSIC). The new exact and asymptotic pairwise error probability (PEP) expressions with RHI under ipSIC are derived over Rayleigh fading channels. The asymptotic PEP expression is subsequently utilized to quantify the diversity orders achieved by NOMA users in the presence of RHI. In particular, we show that the effective diversity order of each NOMA user equals to user{\textquoteright}s order for both ideal and non-ideal (RHI) scenarios. Leveraging the derived PEP, the union bound on the bit error rate of NOMA users are further evaluated. We demonstrate that the impact of RHI with ipSIC on each user{\textquoteright}s error rate performance is negligible. In contrast, when perfect SIC is considered, such effects are significant. Numerical and Monte Carlo simulation results are presented to corroborate the analysis. {\textcopyright} 1997-2012 IEEE.}, keywords = {Bit error rate, Block codes, Diversity order, Error rate analysis, Error rate performance, Errors, Fading channels, Monte Carlo methods, Multiple access, Multiple access interference, Non-orthogonal, Pair-wise error probability, Rayleigh fading, Successive interference cancellations, Trellis codes, Union bounds}, doi = {10.1109/LCOMM.2021.3075064}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85105057184\&doi=10.1109\%2fLCOMM.2021.3075064\&partnerID=40\&md5=1e766a8345ee4978c94bd28545d8aaee}, author = {Li, M. and Bouanani, F.E. and Tian, L. and Chen, W. and Han, Z. and Muhaidat, S.} } @article {ElHafidy2021, title = {Gamified mobile applications for improving driving behavior: A systematic mapping study}, journal = {Mobile Information Systems}, volume = {2021}, year = {2021}, note = {cited By 4}, abstract = {Many research works and official reports approve that irresponsible driving behavior on the road is the main cause of accidents. Consequently, responsible driving behavior can significantly reduce accidents{\textquoteright} number and severity. Therefore, in the research area as well as in the industrial area, mobile technologies are widely exploited in assisting drivers in reducing accident rates and preventing accidents. For instance, several mobile apps are provided to assist drivers in improving their driving behavior. Recently and thanks to mobile cloud computing, smartphones can benefit from the computing power of servers in the cloud for executing machine learning algorithms. Therefore, many mobile applications of driving assistance and control are based on machine learning techniques to adjust their functioning automatically to driver history, context, and profile. Additionally, gamification is a key element in the design of these mobile applications that allow drivers to develop their engagement and motivation to improve their driving behavior. To have an overview concerning existing mobile apps that improve driving behavior, we have chosen to conduct a systematic mapping study about driving behavior mobile apps that exist in the most common mobile apps repositories or that were published as research works in digital libraries. In particular, we should explore their functionalities, the kinds of collected data, the used gamification elements, and the used machine learning techniques and algorithms. We have successfully identified 220 mobile apps that help to improve driving behavior. In this work, we will extract all the data that seem to be useful for the classification and analysis of the functionalities offered by these applications. {\textcopyright} 2021 Abderrahim El hafidy et al.}, keywords = {Accidents, Computing power, Digital libraries, Driving assistance, Driving behavior, Gamification, Industrial area, Industrial research, Learning algorithms, Machine learning, Machine learning techniques, Mapping, Mobile applications, Mobile cloud computing, Mobile computing, Mobile Technology, Systematic mapping studies}, doi = {10.1155/2021/6677075}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85114117887\&doi=10.1155\%2f2021\%2f6677075\&partnerID=40\&md5=6ad1b624deabb49917039716eb133f13}, author = {El Hafidy, A. and Rachad, T. and Idri, A. and Zellou, A.} } @article {Hmami2021632, title = {Handling Sudden and Recurrent Changes in Business Process Variability: Change Mining based Approach}, journal = {International Journal of Advanced Computer Science and Applications}, volume = {12}, number = {4}, year = {2021}, note = {cited By 1}, pages = {632-640}, abstract = {Changes are random and unavoidable actions in business processes, and they are frequently overlooked by managers, especially when managers need to deal with a collection of process variants. Because they must manage every single business process variant separately which is a timeconsuming task. They exist many approaches to manage a collection of business process and deal with variability. Such as process mining approaches, that can discover configurable business process models, enhancing them and verify conformity automatically. However, those approaches do not cover changes and concept drift that occur over time. This paper presents a novel change mining approach that discovers changes in a collection of event logs and reports them on a change log. This change log can be analyzed to determine whether the changes are sudden or recurrent and recommend afterward some improvement to the configurable process model. {\textcopyright} 2021. All Rights Reserved.}, keywords = {Business Process, Change logs, Change mining, Component, Concept drifts, Configurable process models, Data mining, Managers, Process mining, Process variants, Sudden change, Variability}, doi = {10.14569/IJACSA.2021.0120479}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85105804608\&doi=10.14569\%2fIJACSA.2021.0120479\&partnerID=40\&md5=826c6a1f82674abf6a9a671f65401022}, author = {Hmami, A. and Fredj, M. and Sba{\"\i}, H.} } @conference {Abnane20211, title = {Heterogeneous ensemble imputation for software development effort estimation}, booktitle = {PROMISE 2021 - Proceedings of the 17th International Conference on Predictive Models and Data Analytics in Software Engineering, co-located with ESEC/FSE 2021}, year = {2021}, note = {cited By 1}, pages = {1-10}, abstract = {Choosing the appropriate Missing Data (MD) imputation technique for a given Software development effort estimation (SDEE) technique is not a trivial task. In fact, the impact of the MD imputation on the estimation output depends on the dataset and the SDEE technique used and there is no best imputation technique in all contexts. Thus, an attractive solution is to use more than one single imputation technique and combine their results for a final imputation outcome. This concept is called ensemble imputation and can help to significantly improve the estimation accuracy. This paper develops and evaluates a heterogeneous ensemble imputation whose members were the four single imputation techniques: K-Nearest Neighbors (KNN), Expectation Maximization (EM), Support Vector Regression (SVR), and Decision Trees (DT). The impact of the ensemble imputation was evaluated and compared with those of the four single imputation techniques on the accuracy measured in terms of the standardized accuracy criterion of four SDEE techniques: Case Based Reasoning (CBR), Multi-Layers Perceptron (MLP), Support Vector Regression (SVR) and Reduced Error Pruning Tree (REPTree). The Wilcoxon statistical test was also performed in order to assess whether the results are significant. All the empirical evaluations were carried out over the six datasets, namely, ISBSG, China, COCOMO81, Desharnais, Kemerer, and Miyazaki. Results show that the use of heterogeneous ensemble-based imputation instead single imputation significantly improved the accuracy of the four SDEE techniques. Indeed, the ensemble imputation technique was ranked either first or second in all contexts. {\textcopyright} 2021 ACM.}, keywords = {Case based reasoning, Casebased reasonings (CBR), Decision trees, Empirical evaluations, Expectation Maximization, Forestry, Heterogeneous ensembles, Imputation techniques, K nearest neighbor (KNN), Maximum principle, Multilayer neural networks, Nearest neighbor search, Predictive analytics, Software design, Software development effort, Support vector regression, Support vector regression (SVR)}, doi = {10.1145/3475960.3475984}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85113586361\&doi=10.1145\%2f3475960.3475984\&partnerID=40\&md5=7bd6bbfb801a84cd7694e3713d2d0081}, author = {Abnane, I. and Idri, A. and Hosni, M. and Abran, A.} } @conference {ElOuassif2021352, title = {Homogeneous ensemble based support vector machine in breast cancer diagnosis}, booktitle = {HEALTHINF 2021 - 14th International Conference on Health Informatics; Part of the 14th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2021}, year = {2021}, note = {cited By 5}, pages = {352-360}, abstract = {Breast Cancer (BC) is one of the most common forms of cancer and one of the leading causes of mortality among women. Hence, detecting and accurately diagnosing BC at an early stage remain a major factor for women{\textquoteright}s long-term survival. To this aim, numerous single techniques have been proposed and evaluated for BC classification. However, none of them proved to be suitable in all situations. Currently, ensemble methods have been widely investigated to help diagnosis BC and consists on generating one classification model by combining more than one single technique by means of a combination rule. This paper evaluates homogeneous ensembles whose members are four variants of the Support Vector Machine (SVM) classifier. The four SVM variants used four different kernels: Linear Kernel, Normalized Polynomial Kernel, Radial Basis Function Kernel, and Pearson VII function based Universal Kernel. A Multilayer Perceptron (MLP) classifier is used for combining the outputs of the base classifiers to produce a final decision. Four well-known available BC datasets are used from online repositories. The findings of this study suggest that: (1) ensembles provided a very promising performance compared to its base, and (2) there is no SVM ensemble with a combination of kernels that have better performance in all datasets. Copyright {\textcopyright} 2021 by SCITEPRESS {\textendash} Science and Technology Publications, Lda. All rights reserved}, keywords = {Base classifiers, Biomedical engineering, Breast cancer diagnosis, Classification models, Combination rules, Computer aided diagnosis, Diseases, Medical informatics, Multilayer neural networks, Multilayer Perceptron (MLP) classifier, Online repositories, Polynomial kernels, Radial basis function kernels, Support vector machines}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85103824221\&partnerID=40\&md5=2340dec93a42872a9ece0b6f6b9fccbc}, author = {El Ouassif, B. and Idri, A. and Hosni, M.} } @article {ElOuassif2021263, title = {Investigating Accuracy and Diversity in Heterogeneous Ensembles for Breast Cancer Classification}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {12950 LNCS}, year = {2021}, note = {cited By 2}, pages = {263-281}, abstract = {Breast Cancer (BC) is one of the most common forms of cancer among women. Detecting and accurately diagnosing breast cancer at an early phase increase the chances of women{\textquoteright}s survival. For this purpose, various single classification techniques have been investigated to diagnosis BC. Nevertheless, none of them proved to be accurate in all circumstances. Recently, a promising approach called ensemble classifiers have been widely used to assist physicians accurately diagnose BC. Ensemble classifiers consist on combining a set of single classifiers by means of an aggregation layer. The literature in general shows that ensemble techniques outperformed single ones when ensemble members are accurate (i.e. have the lowest percentage error) and diverse (i.e. the single classifiers make uncorrelated errors on new~instances). Hence, selecting ensemble members is often a crucial task since it can lead to the opposite: single techniques outperformed their ensemble. This paper evaluates and compares ensemble members{\textquoteright} selection based on accuracy and diversity with ensemble members{\textquoteright} selection based on accuracy only. A comparison with ensembles without member selection was also performed. Ensemble performance was assessed in terms of accuracy, F1-score. Q statistics diversity measure was used to calculate the classifiers diversity. The experiments were carried out on three well-known BC datasets available from online repositories. Seven single classifiers were used in our experiments. Skott Knott test and Borda Count voting system were used to assess the significance of the performance differences and rank ensembles according to theirs performances. The findings of this study suggest that: (1) Investigating both accuracy and diversity to select ensemble members often led to better performance, and (2) In general, selecting ensemble members using accuracy and/or diversity led to better ensemble performance than constructing ensembles without members{\textquoteright} selection. {\textcopyright} 2021, Springer Nature Switzerland AG.}, keywords = {Breast Cancer, Combining classifiers, Computer aided diagnosis, Diseases, Diversity measure, Ensemble members, Ensemble-classifier, Heterogeneous ensembles, Member selection, Performance, Selection based, Voting, Voting machines}, doi = {10.1007/978-3-030-86960-1_19}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85125278232\&doi=10.1007\%2f978-3-030-86960-1_19\&partnerID=40\&md5=58285ac3fe1b29564700bef136a94771}, author = {El Ouassif, B. and Idri, A. and Hosni, M.} } @article {Hamyani2021118051, title = {Jamming-Assisted Multi-User Multi-Eavesdropper Broadcast Network: PHY Layer Security Analysis}, journal = {IEEE Access}, volume = {9}, year = {2021}, note = {cited By 0}, pages = {118051-118064}, abstract = {In this paper, the physical layer security of a multi-user jamming-assisted broadcast network in the presence of multiple eavesdroppers is investigated. Specifically, a base station (BS) is broadcasting data to multiple end-users via direct links in the presence of multiple passive wiretappers, while both the legitimate users and the eavesdroppers use a maximal-ratio combining scheme to achieve high spatial diversity gain. Furthermore, the BS is broadcasting a jamming signal that cannot be canceled by the eavesdroppers to increase their decoding failure rates. All links are subject to Nakagami- $m$ fading models. Relying on the upper incomplete moment-generating function of the combined Signal-to-interference-plus-noise ratio (SINR) at each wiretapper{\textquoteright}s MRC output, tight approximate and asymptotic expressions for the secrecy outage probability (SOP) are derived considering two different scenarios, i.e., (i) absence and (ii) presence of the broadcasted artificial noise. The impact of the jamming signal level, severity fading parameter, and the number of MRC branches are examined, while the most influential parameter on the system{\textquoteright}s security is retrieved. Numerical results and simulations reveal the accuracy of the obtained analytical expressions and gain more useful insights into the system{\textquoteright}s secrecy. {\textcopyright} 2013 IEEE.}, keywords = {Analytical expressions, Asymptotic expressions, Broadcasting, Failure analysis, Jamming, Maximal ratio combining (MRC), Moment generating function, Network layers, Network security, Physical layer, Physical layer security, Secrecy outage probabilities, Signal interference, Signal to interference plus noise ratio, Signal to noise ratio, Spatial diversity gain}, doi = {10.1109/ACCESS.2021.3106114}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85113200613\&doi=10.1109\%2fACCESS.2021.3106114\&partnerID=40\&md5=4d535aca9a35155770c21fd933b7909b}, author = {Hamyani, A. and Bouanani, F.E. and Miftah, Y.} } @article {Bariah20215129, title = {Large intelligent surface-assisted nonorthogonal multiple access for 6G networks: Performance analysis}, journal = {IEEE Internet of Things Journal}, volume = {8}, number = {7}, year = {2021}, note = {cited By 17}, pages = {5129-5140}, abstract = {Large intelligent surface (LIS) has recently emerged as a potential enabling technology for 6G networks, offering extended coverage and enhanced energy and spectral efficiency. In this work, motivated by its promising potentials, we investigate the error rate performance of LIS-assisted nonorthogonal multiple access (NOMA) networks. Specifically, we consider a downlink NOMA system, in which data transmission between a base station (BS) and L NOMA users is assisted by an LIS comprising M reflective elements (REs). First, we derive the probability density function (PDF) of the end-to-end wireless fading channels between the BS and NOMA users. Then, by leveraging the obtained results, we derive an approximate expression for the pairwise error probability (PEP) of NOMA users under the assumption of imperfect successive interference cancellation. Furthermore, accurate expressions for the PEP for M = 1 and large M values ( M > 10 ) are presented in closed-form. To gain further insights into the system performance, an asymptotic expression for PEP in high signal-to-noise ratio regime, asymptotic diversity order, and tight union bound on the bit error rate are provided. Finally, numerical and simulation results are presented to validate the derived mathematical results. {\textcopyright} 2014 IEEE.}, keywords = {Approximate expressions, Asymptotic diversity order, Asymptotic expressions, Bit error rate, Block codes, Error rate performance, Errors, Fading channels, High signal-to-noise ratio, Mobile telecommunication systems, Pair-wise error probability, Probability density function, Queueing networks, Signal to noise ratio, Successive interference cancellations, Trellis codes, Wireless fading channels}, doi = {10.1109/JIOT.2021.3057416}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85100835822\&doi=10.1109\%2fJIOT.2021.3057416\&partnerID=40\&md5=ea0b361b970ee551c343f99d24bae108}, author = {Bariah, L. and Muhaidat, S. and Sofotasios, P.C. and Bouanani, F.E. and Dobre, O.A. and Hamouda, W.} } @conference {Cherqi2021, title = {Leveraging Open Threat Exchange (OTX) to Understand Spatiooral Trends of Cyber Threats: Covid-19 Case Study}, booktitle = {Proceedings - 2021 IEEE International Conference on Intelligence and Security Informatics, ISI 2021}, year = {2021}, note = {cited By 0}, abstract = {Understanding the properties exhibited by Spatialoral evolution of cyber attacks improve cyber threat intelligence. In addition, better understanding on threats patterns is a key feature for cyber threats prevention, detection, and management and for enhancing defenses. In this work, we study different aspects of emerging threats in the wild shared by 160,000 global participants form all industries. First, we perform an exploratory data analysis of the collected cyber threats. We investigate the most targeted countries, most common malwares and the distribution of attacks frequency by localisation. Second, we extract attacks{\textquoteright} spreading patterns at country level. We model these behaviors using transition graphs decorated with probabilities of switching from a country to another. Finally, we analyse the extent to which cyber threats have been affected by the COVID-19 outbreak and sanitary measures imposed by governments to prevent the virus from spreading. {\textcopyright} 2021 IEEE.}, keywords = {Attack analysis, Case-studies, Computer viruses, COVID-19, Crime, Cybe attack analyse, Cybe threat forecasting, Cyber attacks, Cyber threats, Cyber-attacks, Cyber-crimes, Information analysis, Network security, Spatialoral data analyse for cybe-crime analyse, Threat intelligence, Viruses}, doi = {10.1109/ISI53945.2021.9624677}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85123484404\&doi=10.1109\%2fISI53945.2021.9624677\&partnerID=40\&md5=729113fca1f2d9817bbaa46a6f5d0036}, author = {Cherqi, O. and Hammouchi, H. and Ghogho, M. and Benbrahim, H.} } @article {AitElHadj2021836, title = {A Log-Based Method to Detect and Resolve Efficiently Conflicts in Access Control Policies}, journal = {Advances in Intelligent Systems and Computing}, volume = {1383 AISC}, year = {2021}, note = {cited By 0}, pages = {836-846}, abstract = {Typically, a security audit is conducted to detect and track inappropriate activities, such as security policy misconfigurations and attacks. Practically, an audit can be done through the analysis and assessment of data in logs registering traces of queries according to predefined policies. In this paper, we present an auditing approach that detects and resolves efficiently conflicting rules of a security policy. Such efficiency translates into a reduction in the time it takes to detect and resolve conflicts. Such efficiency is a consequence of the fact that conflict detection is executed only among suspicious pairs of rules, instead of all pairs of rules. The idea of using suspicious pairs of rules has recently been applied to reduce the execution time of previous detection methods. The present study goes further by applying the idea not only for conflict detection, but also for reducing the resolution time of the detected conflicts. We present experimental results that illustrate the efficiency of the suggested method. {\textcopyright} 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, keywords = {Access control, Access control policies, conflict detection, Detection methods, Efficiency, Misconfigurations, Pattern recognition, Resolution time, Security audit, Security policy, Security systems, Soft computing}, doi = {10.1007/978-3-030-73689-7_79}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85105891237\&doi=10.1007\%2f978-3-030-73689-7_79\&partnerID=40\&md5=f0de7beea992beee027f768bafe5cf58}, author = {Ait El Hadj, M. and Khoumsi, A. and Benkaouz, Y. and Erradi, M.} } @article {Jeddi2021, title = {Machine learning for predicting the risk for childhood asthma using prenatal, perinatal, postnatal and environmental factors}, journal = {Healthcare (Switzerland)}, volume = {9}, number = {11}, year = {2021}, note = {cited By 3}, abstract = {The prevalence rate for childhood asthma and its associated risk factors vary significantly across countries and regions. In the case of Morocco, the scarcity of available medical data makes scientific research on diseases such as asthma very challenging. In this paper, we build machine learning models to predict the occurrence of childhood asthma using data from a prospective study of 202 children with and without asthma. The association between different factors and asthma diagnosis is first assessed using a Chi-squared test. Then, predictive models such as logistic regression analysis, decision trees, random forest and support vector machine are used to explore the relationship between childhood asthma and the various risk factors. First, data were pre-processed using a Chi-squared feature selection, 19 out of the 36 factors were found to be significantly associated (p-value < 0.05) with childhood asthma; these include: history of atopic diseases in the family, presence of mites, cold air, strong odors and mold in the child{\textquoteright}s environment, mode of birth, breastfeeding and early life habits and exposures. For asthma prediction, random forest yielded the best predictive performance (accuracy = 84.9\%), followed by logistic regression (accuracy = 82.57\%), support vector machine (accuracy = 82.5\%) and decision trees (accuracy = 75.19\%). The decision tree model has the advantage of being easily interpreted. This study identified important maternal and prenatal risk factors for childhood asthma, the majority of which are avoidable. Appropriate steps are needed to raise awareness about the prenatal risk factors. {\textcopyright} 2021 by the authors. Licensee MDPI, Basel, Switzerland.}, doi = {10.3390/healthcare9111464}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85118143874\&doi=10.3390\%2fhealthcare9111464\&partnerID=40\&md5=ed53157bb344c4ea98eaef10d4ade531}, author = {Jeddi, Z. and Gryech, I. and Ghogho, M. and Hammoumi, M.E.L. and Mahraoui, C.} } @conference {ElMejjatti2021, title = {A Magnetic Coupling-Based Technique for Buried Antenna{\textquoteright}s Frequency Adjustment in Wet Soil}, booktitle = {Proceedings - 4th International Conference on Advanced Communication Technologies and Networking, CommNet 2021}, year = {2021}, note = {cited By 0}, abstract = {Wireless Underground Sensor Networks for precision agriculture applications consist of wirelessly connected underground sensor nodes that communicate through the soil. Thus, the resonant frequency of the buried antenna depends on the soil{\textquoteright}s dielectric permittivity. In addition, the soil{\textquoteright}s volumetric water content in nature can vary unpredictably due to the weather conditions and irrigation, causing permittivity fluctuations and hence, frequency instability of deployed antennas. In this paper, we propose an inductive coupling-based technique allowing the self-adjustment of the buried loop antenna{\textquoteright}s resonant frequency subject to a wet soil environment. {\textcopyright} 2021 IEEE.}, keywords = {Agriculture applications, Antennae frequency, Dielectric permittivities, Electromagnetic coupling, Electromagnetic induction, Frequency adjustment, Inductive couplings, Inductive sensors, Loop antennas, Natural frequencies, Permittivity, Precision agriculture, Rectangular loop antenna, Sensor nodes, Soil volumetric water contents, Soils, Wet soil, Wireless underground sensor networks}, doi = {10.1109/CommNet52204.2021.9641968}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85124041273\&doi=10.1109\%2fCommNet52204.2021.9641968\&partnerID=40\&md5=45b6350d107ec8b65d5a9b1750c72d69}, author = {El Mejjatti, M. and Habbani, A. and El Bouanani, F.} } @article {Hamlaoui20211, title = {Model-driven Approach To Align Heterogeneous Models Of A Complex System}, journal = {Journal of Object Technology}, volume = {20}, number = {2}, year = {2021}, note = {cited By 0}, pages = {1-24}, abstract = {To understand and manipulate a complex system, it is necessary to apply the separation of concerns and produce separate models, called viewpoints models. These models represent views on the system that correspond to distinct business domains. They are generally heterogeneous, i.e. conform to different meta-models. The management of the system{\textquoteright}s global model (a complete view of the system) requires the identification of the existing correspondences among the viewpoints models. However, in practice these correspondences are either incompletely identified or not sufficiently formalized to be maintained when models evolve. This restricts their use and does not allow their full exploitation for managing the global model. To fix this issue, we propose AHM (Alignment of Heterogeneous Models), an approach to organize the source models as a network of models through a virtual global model called M1C (Model of correspondences between models) that conforms to a Meta-Model of Correspondences (MMC). AHM proposes also a process, allowing for both the creation of the global model, and its consistency control. Partial automation of this process is done through a refining mechanism supported by a semantics expression described in a Domain Specific Language (DSL). The application of AHM is illustrated by the example of a conference management system. A prototype of a tool called Heterogeneous Matching and Consistency management Suite (HMCS) has been developed to support this approach. {\textcopyright} 2021. All Rights Reserved.}, doi = {10.5381/JOT.2021.20.2.A2}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85111507313\&doi=10.5381\%2fJOT.2021.20.2.A2\&partnerID=40\&md5=606f7cf84d332b83818bec57d20a3d0b}, author = {Hamlaoui, M.E. and Ebersold, S. and Bennani, S. and Anwar, A. and Dkaki, T. and Nassar, M. and Coulette, B.} } @article {Benjbara2021270, title = {Multipathing communication in heterogeneous ad hoc network}, journal = {Advances in Intelligent Systems and Computing}, volume = {1184}, year = {2021}, note = {cited By 1}, pages = {270-278}, abstract = {Multipath routing is a solution that meets the requirements of existing systems (security, bandwidth, network lifetime, etc.). Currently, several studies are trying to apply and adapt the principle of multipath in several types of networks for benefiting from its advantages. The wireless network without infrastructure (ad hoc network) is more flexible and less expensive compared to other networks and uses in its turn the multipath routing in the communication between the devices to enhance its strengths. The ad hoc network regroups several categories of network, and each one has its own node characteristics and communication protocol. In most application areas based on new technologies, such as smart cities, precision agriculture, medicine, and others, we can find different types of ad hoc networks in the same architecture constituting a heterogeneous network. So, the heterogeneous ad hoc network (HAdN) appears and brings with it a new line of research concerning the common and compatible routing protocols inside this type of network. This article proposes a new multipath routing protocol version based on the OLSR standard ensuring the direct communication between the various HAdN components. The new protocol will initially be implemented in a specific network architecture consisting of MANET, VANET, and FANET. {\textcopyright} The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2021.}, keywords = {Agricultural robots, Application area, Direct communications, Existing systems, Heterogeneous ad-hoc networks, Heterogeneous networks, Internet protocols, Multi path routing, Multipath routing protocols, Network architecture, Network lifetime, Network routing, New protocol, Routing protocols, Vehicular ad hoc networks}, doi = {10.1007/978-981-15-5859-7_26}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85091906004\&doi=10.1007\%2f978-981-15-5859-7_26\&partnerID=40\&md5=6a83b101716d6edd1c858d6c7475f899}, author = {Benjbara, C. and Mouchfiq, N. and Habbani, A.} } @article {Mouchfiq2021288, title = {Security issues in manets: A survey}, journal = {Advances in Intelligent Systems and Computing}, volume = {1184}, year = {2021}, note = {cited By 2}, pages = {288-295}, abstract = {Recently, the notion of security has become increasingly important to research on wireless networks, later the Internet of things (IoT) and ad hoc networks that are a part of IoT environment. The various changes in the digital environment, as it must identify the different changes in the digital environment, are namely the protection of the personal and professional data of this intelligent world. In the work already done, there are several methods and levels of security. In this study, we identify that security aggression MANETs are facing with the security services to provide in each layer. In order to reach our target, we did a literature search gathering information on different types of attacks and solutions, as well as the latest security work. Then, we discuss the proposed solutions to ensure a high level of security in networks by recalling the latest work of our team. Finally, we propose a method of security better adapted to our needs based on blockchain technology. {\textcopyright} The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2021.}, keywords = {Digital environment, In networks, Internet of thing (IOT), Internet of things, Literature search, Mobile ad hoc networks, Network security, Security issues, Security services}, doi = {10.1007/978-981-15-5859-7_28}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85091934292\&doi=10.1007\%2f978-981-15-5859-7_28\&partnerID=40\&md5=94af6860a11351f3307ffc8d94ae12a3}, author = {Mouchfiq, N. and Habbani, A. and Benjbara, C.} } @article {ElHaddaoui2021336, title = {Sentiment analysis: A review and framework foundations}, journal = {International Journal of Data Analysis Techniques and Strategies}, volume = {13}, number = {4}, year = {2021}, note = {cited By 0}, pages = {336-355}, abstract = {The rise of social media as a platform for opinion expression and social interactions motivated the need for an automated data analysis technique for business value extraction with optimal investment considerations. In this respect, sentiment analysis (SA) becomes the de facto approach to investigate generated data and retrieve information such as sentiments and emotions, discussed topics, etc., via traditional machine learning and modern neural network-based algorithms. The current techniques achieve reasonable accuracy scores but their performance evolution is depending on the context of application, also most implementations are complex and non-reusable components. Our literature review shows a lack in research studies to unify existing systems under a common framework for SA tasks. This paper also highlights the rending movement of neural networks approaches and pinpoint recent research studies for SA sub tasks. A SA framework design proposition is presented based on key research projects and enhanced with other promising works. {\textcopyright} 2021 Inderscience Publishers. All rights reserved.}, doi = {10.1504/IJDATS.2021.120112}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85122875189\&doi=10.1504\%2fIJDATS.2021.120112\&partnerID=40\&md5=e3d2033b898f101c2ec5d087fdf6472e}, author = {El Haddaoui, B. and Chiheb, R. and Faizi, R. and El Afia, A.} } @article {Hosni20212827, title = {A systematic mapping study for ensemble classification methods in cardiovascular disease}, journal = {Artificial Intelligence Review}, volume = {54}, number = {4}, year = {2021}, note = {cited By 5}, pages = {2827-2861}, abstract = {Ensemble methods overcome the limitations of single machine learning techniques by combining different techniques, and are employed in the quest to achieve a high level of accuracy. This approach has been investigated in various fields, one of them being that of bioinformatics. One of the most frequent applications of ensemble techniques involves research into cardiovascular diseases, which are considered the leading cause of death worldwide. The purpose of this research work is to identify the papers that investigate ensemble classification techniques applied to cardiology diseases, and to analyse them according to nine aspects: their publication venues, the medical tasks tackled, the empirical and research types adopted, the types of ensembles proposed, the single techniques used to construct the ensembles, the validation frameworks adopted to evaluate the proposed ensembles, the tools used to build the ensembles, and the optimization methods employed for the single techniques. This paper reports the carrying out of a systematic mapping study. An extensive automatic search in four digital libraries: IEEE Xplore, ACM Digital Library, PubMed, and Scopus, followed by a study selection process, resulted in the identification of 351 papers that were used to address our mapping questions. This study found that the papers selected had been published in a large number of different resources. The medical task addressed most frequently by the selected studies was diagnosis. In addition, the experiment-based empirical type and evaluation-based research type were the most dominant approaches adopted by the selected studies. Homogeneous ensembles were the ensemble type that was developed most often in literature, while decision trees, artificial neural networks and Bayesian classifiers were the single techniques used most frequently to develop ensemble classification methods. The weighted majority and majority voting rules were adopted to obtain the final decision of the ensembles developed. With regard to evaluation frameworks, the datasets obtained from the UCI and PhysioBank repositories were those used most often to evaluate the ensemble methods, while the k-fold cross-validation method was the most frequently-employed validation technique. Several tools with which to build ensemble classifiers were identified, and the type of software adopted with the greatest frequency was open source. Finally, only a few researchers took into account the optimization of the parameter settings of either single or meta ensemble classifiers. This mapping study attempts to provide a greater insight into the application of ensemble classification methods in cardiovascular diseases. The majority of the selected papers reported positive feedback as regards the ability of ensemble methods to perform better than single methods. Further analysis is required to aggregate the evidence reported in literature. {\textcopyright} 2020, Springer Nature B.V.}, keywords = {Bayesian networks, Cardio-vascular disease, Cardiology, Decision trees, Diagnosis, Digital libraries, Diseases, Ensemble classification, Ensemble classifiers, Evaluation framework, K fold cross validations, Learning systems, Majority voting rules, Mapping, Open source software, Open systems, Optimization method, Systematic mapping studies}, doi = {10.1007/s10462-020-09914-6}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85091735819\&doi=10.1007\%2fs10462-020-09914-6\&partnerID=40\&md5=69ea4b02de420c3ec6a85e1f3c7dddaf}, author = {Hosni, M. and Carrillo de Gea, J.M. and Idri, A. and El Bajta, M. and Fern{\'a}ndez Alem{\'a}n, J.L. and Garc{\'\i}a-Mateos, G. and Abnane, I.} } @article {Hosni2021, title = {On the value of filter feature selection techniques in homogeneous ensembles effort estimation}, journal = {Journal of Software: Evolution and Process}, volume = {33}, number = {6}, year = {2021}, note = {cited By 1}, abstract = {Software development effort estimation (SDEE) remains as the principal activity in software project management planning. Over the past four decades, several methods have been proposed to estimate the effort required to develop a software system, including more recently machine learning (ML) techniques. Because ML performance accuracy depends on the features that feed the ML technique, selecting the appropriate features in the preprocessing data step is important. This paper investigates three filter feature selection techniques to check the predictive capability of four single ML techniques: K-nearest neighbor, support vector regression, multilayer perceptron, and decision trees and their homogeneous ensembles over six well-known datasets. Furthermore, the single and ensembles techniques were optimized using the grid search optimization method. The results suggest that the three filter feature selection techniques investigated improve the reasonability and the accuracy performance of the four single techniques. Moreover, the homogeneous ensembles are statistically more accurate than the single techniques. Finally, adopting a random process (i.e., random subspace method) to select the inputs feature for ML technique is not always effective to generate an accurate homogeneous ensemble. {\textcopyright} 2021 John Wiley \& Sons, Ltd.}, keywords = {Decision trees, Effort Estimation, Feature extraction, K-nearest neighbors, Multilayer neural networks, Nearest neighbor search, Object oriented programming, Predictive capabilities, Project management, Random processes, Random subspace method, Selection techniques, Software design, Software development effort, Software project management, Software systems, Support vector regression}, doi = {10.1002/smr.2343}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85103402056\&doi=10.1002\%2fsmr.2343\&partnerID=40\&md5=0f4c04b547f3d628d6db8d65b74912e5}, author = {Hosni, M. and Idri, A. and Abran, A.} } @conference {Oumaima2021, title = {Vision-based fall detection and prevention for the elderly people: A review ongoing research}, booktitle = {5th International Conference on Intelligent Computing in Data Sciences, ICDS 2021}, year = {2021}, note = {cited By 0}, abstract = {Falls are the most leading cause of accidental injury deaths worldwide, therefore, it poses a real challenge for the prevention of life-threatening conditions in geriatrics. The most damaged community is the ever-growing aging population. For this reason, there are considerable demands to distinguish a dangerous posture such as fall in real-time. Here we provide a literature review of conducted work on elderly fall detection and prediction mentioning the main methods to recognize human posture including computer vision-based and wearable sensor-based. We approached these perspectives: sensor fusion, Datasets, approaches proposition. In conclusion, our survey summarizes the progress achieved in the five past years to help the researchers in this field to spot areas where further effort would be beneficial and innovative. {\textcopyright} 2021 IEEE.}, keywords = {Accident prevention, Accidental injuries, Computer vision, Dataset, Elderly, Elderly people, Fall detection, Fall prediction, Fall prevention, Life threatening conditions, Sensor, Vision based, Wearable sensors}, doi = {10.1109/ICDS53782.2021.9626736}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85123493902\&doi=10.1109\%2fICDS53782.2021.9626736\&partnerID=40\&md5=c99b20a9a8a522cc9440679b23da4ceb}, author = {Oumaima, G. and Hamd, A.A. and Youness, T. and Rachid, O.H.T. and Omar, B.} } @article {AitAbdelali2021517, title = {Visual Vehicle Tracking via Deep Learning and Particle Filter}, journal = {Advances in Intelligent Systems and Computing}, volume = {1188}, year = {2021}, note = {cited By 2}, pages = {517-526}, abstract = {Visual vehicle tracking is one of the most challenging research topics in computer vision. In this paper, we propose a novel and efficient approach based on the particle filter technique and deep learning for multiple vehicle tracking, where the main focus is to associate vehicles efficiently for online and real-time applications. Experimental results illustrate the effectiveness of the system we are proposing. {\textcopyright} 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.}, keywords = {Deep learning, Monte Carlo methods, Particle filter, Real-time application, Research topics, Soft computing, Vehicles}, doi = {10.1007/978-981-15-6048-4_45}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096559933\&doi=10.1007\%2f978-981-15-6048-4_45\&partnerID=40\&md5=51a9b5456004a8cdb4bc0a5256e17dc9}, author = {Ait Abdelali, H. and Bourja, O. and Haouari, R. and Derrouz, H. and Zennayi, Y. and Bourzex, F. and Oulad Haj Thami, R.} } @article {Haitam202013, title = {Advanced modified direct torque control with space vector modulation based on active disturbance rejection control for induction motor sensorless drive}, journal = {International Journal of Mechanical Engineering and Robotics Research}, volume = {9}, number = {1}, year = {2020}, note = {cited By 2}, pages = {13-19}, abstract = {This work addresses the problems inherent in the disturbances affected to the operation of electrical motor drives, a modified direct torque control which is among the excellent method of torque control of an induction motor that provide a decoupled control of flux and torque is implemented with a novel controller of active disturbance rejection controller to cancel the drawbacks of flux ripples, high torque at start-up and also variable switching frequency associated in the classical DTC. In the other side, an advanced estimator for rotor speed is used in order to rectify the problem of sensors. The proposed control strategy, implementation data, and simulations with MDTC are presented and discussed. It is concluded that MDTC-SVM proposed control topology offers high performance in steady-state operation despite the existence of the internal and external disturbances. {\textcopyright} 2020 by the authors.}, doi = {10.18178/ijmerr.9.1.13-19}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85081411340\&doi=10.18178\%2fijmerr.9.1.13-19\&partnerID=40\&md5=c5c6e74c1aa49a6e9a869fb6152a5a1d}, author = {Haitam, C. and Ahmed, E. and Tamou, N.} } @article {Hakkoum202015, title = {Artificial Neural Networks Interpretation Using LIME for Breast Cancer Diagnosis}, journal = {Advances in Intelligent Systems and Computing}, volume = {1161 AISC}, year = {2020}, note = {cited By 6}, pages = {15-24}, abstract = {Breast Cancer (BC) is the most common type of cancer among women. Thankfully early detection and treatment improvements helped decrease its number of deaths. Data Mining techniques (DM), which discover hidden and potentially useful patterns from data, particularly for breast cancer diagnosis, are witnessing a new era, where the main objective is no longer replacing humans or just assisting them in their tasks but enhancing and augmenting their capabilities and this is where interpretability comes into play. This paper aims to investigate the Local Interpretable Model-agnostic Explanations (LIME) technique to interpret a Multilayer perceptron (MLP) trained on the Wisconsin Original Data-set. The results show that LIME explanations are a sort of real-time interpretation that helps understanding how the constructed neural network {\textquotedblleft}thinks{\textquotedblright} and thus can increase trust and help oncologists, as the domain experts, learn new patterns. {\textcopyright} 2020, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG.}, keywords = {Breast Cancer, Breast cancer diagnosis, Data mining, Diseases, Domain experts, Information systems, Information use, Interpretability, Lime, Multi layer perceptron, Neural networks, Real time, Useful patterns, WISCONSIN}, doi = {10.1007/978-3-030-45697-9_2}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085506923\&doi=10.1007\%2f978-3-030-45697-9_2\&partnerID=40\&md5=cf809f0c6b9c95cd37d48038f1dfa79a}, author = {Hakkoum, H. and Idri, A. and Abnane, I.} } @article {Idri20201239, title = {Assessing the impact of parameters tuning in ensemble based breast Cancer classification}, journal = {Health and Technology}, volume = {10}, number = {5}, year = {2020}, note = {cited By 12}, pages = {1239-1255}, abstract = {Breast cancer is one of the major causes of death among women. Different decision support systems were proposed to assist oncologists to accurately diagnose their patients. These decision support systems mainly used classification techniques to categorize the diagnosis into Malign or Benign tumors. Given that no consensus has been reached on the classifier that can perform best in all circumstances, ensemble-based classification, which classifies patients by combining more than one single classification technique, has recently been investigated. In this paper, heterogeneous ensembles based on three well-known machine learning techniques (support vector machines, multilayer perceptron, and decision trees) were developed and evaluated by investigating the impact of parameter values of the ensemble members on classification performance. In particular, we investigate three parameters tuning techniques: Grid Search (GS), Particle Swarm Optimization (PSO) and the default parameters of the Weka Tool to evaluate whether setting ensemble parameters permits more accurate classification in breast cancer over four datasets obtained from the Machine Learning repository. The heterogeneous ensembles of this study were built using the majority voting technique as a combination rule. The overall results obtained suggest that: (1) Using GS or PSO techniques for single techniques provide more accurate classification; (2) In general, ensembles generate more accurate classification than their single techniques regardless of the optimization techniques used. (3) Heterogeneous ensembles based on optimized single classifiers generate better results than the Uniform Configuration of Weka (UC-WEKA) ensembles, and (4) PSO and GS slightly have the same impact on the performances of ensembles. {\textcopyright} 2020, IUPESM and Springer-Verlag GmbH Germany, part of Springer Nature.}, keywords = {accuracy, Article, Breast Cancer, cancer classification, classifier, decision tree, experimental design, grid search, human, multilayer perceptron, particle swarm optimization, recall, support vector machine}, doi = {10.1007/s12553-020-00453-2}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85087361107\&doi=10.1007\%2fs12553-020-00453-2\&partnerID=40\&md5=7398903f3007d71e535b12c2ef9a90a6}, author = {Idri, A. and Bouchra, E.O. and Hosni, M. and Abnane, I.} } @conference {Ba{\"\i}na2020215, title = {Business Process Modelling Augmented: Model Driven transformation of User Stories to Processes}, booktitle = {ACM International Conference Proceeding Series}, year = {2020}, note = {cited By 0}, pages = {215-220}, abstract = {The Purpose of our paper is to present a lightweight efficient approach for analysing user stories backlog in order to generate a business process model. A review of literature has been conducted to study contributions in the domain of automatic business process extraction from textual requirements. We found that most of interesting approaches analysing user stories use natural language processing techniques for software projects requirements understanding and none of them target business process modeling automation. The Originality of our contribution is the proposition of a model driven based parsing of user stories backlog and transformations to generate a process model. This work thus contributes with a novel agile iterative methodology augmenting business process design phase with automation assistant transforming user stories textual requirements into a business process model. {\textcopyright} 2020 ACM.}, keywords = {Business Process, Business process design, Business process model, Business process modelling, Intelligent systems, Iterative methodology, Iterative methods, Modeling languages, NAtural language processing, Natural language processing systems, Process design, Process Modeling, Software project}, doi = {10.1145/3419604.3419793}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096411195\&doi=10.1145\%2f3419604.3419793\&partnerID=40\&md5=9c2213523602ada2a3463369b32c3d10}, author = {Baina, K. and El Hamlaoui, M. and Kabbaj, H.} } @article {Ettazi202040, title = {CATS-CAE reflective middleware framework for adapting context-aware transactional services: Using a hybrid policy-based approach}, journal = {International Journal of Web Services Research}, volume = {17}, number = {2}, year = {2020}, note = {cited By 2}, pages = {40-58}, abstract = {Pervasive environments are characterized by limited computing resources and wireless connectivity. In parallel, current application domains have variable transactional requirements that do not fit the traditional ACID model. As a result, the pervasive environment characteristics are compelling and cannot be supported by conventional solutions that are typically dedicated to a specific application domain and support a limited set of context parameters. This article aims at providing a complete solution that addresses the challenges of the adaptability of context-aware transactional services {\textquotedblleft}CATS{\textquotedblright} in pervasive environments. Thus, a new framework CATS-CAE was designed, which offers a comprehensive structure of multiple component chains. The adaptation strategy in CATS-CAE is based on a hybrid approach combining the use of adaptation policies, alternative strategy and behavioral adaptation of composite services through the {\textquotedblleft}Profiled Task Class{\textquotedblright} concept. A probabilistic model is also presented to support the efficiency of the proposed approach. Copyright {\textcopyright} 2020, IGI Global.}, keywords = {ACID properties, Alternative strategy, Applications domains, Behavioral adaptation, Behavioral research, Context- awareness, Context-Aware, Middleware, Middleware frameworks, Pervasive environments, Reflective middleware, Transactional service}, doi = {10.4018/IJWSR.2020040103}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85116856218\&doi=10.4018\%2fIJWSR.2020040103\&partnerID=40\&md5=c368678a98b60e19ddac01a758494320}, author = {Ettazi, W. and Nassar, M. and Hafiddi, H.} } @article {Talbi2020448, title = {A cloud broker architecture for cloud service selection based on multi-criteria decision making and rough set theory}, journal = {International Journal of Computer Aided Engineering and Technology}, volume = {13}, number = {4}, year = {2020}, note = {cited By 2}, pages = {448-464}, abstract = {Cloud computing is a rising field providing computation resources. It represents a new paradigm of utility computing and enormously growing phenomenon in the present IT industry and economy hype. The companies which provide services to customers are called as cloud service providers. The cloud users (CUs) increase and require secure, reliable and trustworthy cloud service providers (CSPs) from the market. So, it{\textquoteright}s a challenge for a new user to choose the best provider. In this paper, we propose cloud broker architecture to help a new customer to find out the best CP. This architecture is based on a combination of rough set theory and multi-criteria analysis of some parameters related to the quality of service of the available providers. A mathematical model is used to do this analysis; it integrates multi-Agent systems to present an intelligent, distributed and collaborative method in order to add assistance to each actor in cloud computing environment. {\textcopyright} 2020 Inderscience Enterprises Ltd.. All rights reserved.}, doi = {10.1504/IJCAET.2020.110481}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85094668160\&doi=10.1504\%2fIJCAET.2020.110481\&partnerID=40\&md5=648ac741f4e3dd89be572212f2de2586}, author = {Talbi, J. and Haqiq, A.} } @conference {Boumahdi2020603, title = {Crisis management systems: Big data and machine learning approach}, booktitle = {ENASE 2020 - Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering}, year = {2020}, note = {cited By 0}, pages = {603-610}, abstract = {A crisis is defined as an event that, by its nature or its consequences, poses a threat to the vital national interests or the basic needs of the population, encourages rapid decision making, and requires coordination between the various departments and agencies. Hence the need and importance of crisis and disaster management systems. These crisis and disaster management systems have several phases and techniques, and require many resources and tactics and needs. Among the needs of these systems are useful and necessary information that can be used to improve the making of good decisions, such as data on past and current crises. The application of machine learning and big data technologies in data processing of crises and disasters can yield important results in this area. In this document, we address in the first part the crisis management systems, and the tools of big data and machine learning that can be used. Then in the second part, we have established a literature review that includes a state of the art, and a discussion. Then we established a machine learning and big data approach for crisis management systems, with a description and experimentation, as well as a discussion of results and future work. {\textcopyright} Copyright 2020 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.}, keywords = {Big data, Crisis management systems, Data handling, Data technologies, Decision making, Disaster management, Disaster prevention, Disasters, Information management, Literature reviews, Machine learning, Machine learning approaches, Software engineering, State of the art}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85088381343\&partnerID=40\&md5=b90b38f94e34455a12781472d1aba3ab}, author = {Boumahdi, A. and El Hamlaoui, M. and Nassar, M.} } @conference {Hafdi2020, title = {Formal Modeling and Validation of Micro Smart Grids Based on ReDy Architecture}, booktitle = {Proceedings of 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, CloudTech 2020}, year = {2020}, note = {cited By 0}, abstract = {Several cities in the world are moving from traditional power grid to Smart Grids. In order to set up Smart Grids, we should be able to face many challenges related to reliability, scalability, dynamism, technological solutions, security, etc. In this paper, we propose a case study where we model a micro Smart Grid according to the ReDy architecture, which is intended for IoT applications. The ReDy architecture provides a base to implement a scalable, reliable, and dynamic IoT network ready to meet Smart Grid needs. In order to prove those requirements, we opted for formal modeling and validation approach using model checking techniques. This formal analysis is carried out using the CADP toolbox. {\textcopyright} 2020 IEEE.}, keywords = {Artificial intelligence, Binary alloys, Cloud computing, Dysprosium alloys, Electric power transmission networks, Formal analysis, Formal model, Internet of things, IOT applications, IOT networks, Microgrids, Model checking, Model-checking techniques, Network architecture, Power grids, Rhenium alloys, Smart grid, Smart power grids, Technological solution}, doi = {10.1109/CloudTech49835.2020.9365923}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85102629868\&doi=10.1109\%2fCloudTech49835.2020.9365923\&partnerID=40\&md5=7c48017aaa6f8aa00a31f5ae27bd816c}, author = {Hafdi, K. and Kriouile, A.} } @conference {Hafaiedh2020, title = {Fuzzified Double Game for Qos-Aware LTE-U and Wifi Coexistence in 5Ghz Band}, booktitle = {2020 Global Information Infrastructure and Networking Symposium, GIIS 2020}, year = {2020}, note = {cited By 0}, abstract = {In the current decade, cellular networks are facing the challenge of meeting aggressive data demand with limited licensed spectrum and LTE over the unlicensed band (LTE-U) has come as an effective way to defeat this problem. Using LTE-U along with superior techniques such as carrier aggregation (CA), it became possible to boost the performance of existing cellular networks. However, LTE-Ucan potentially deteriorate the performance of coexisting WiFi systems operating over the unlicensed bands if not well managed. Mainly because of the LTE-U{\textquoteright}s selfish nature of using the resources without sharing. In this paper, an effective coexistence mechanism between LTE-U and WiFi systems is being investigated. The point is to facilitate the cellular networks to use LTE-U with CA to satisfy the quality-of-service (QoS) of the users while protecting WiFi users, considering multiple operators in a dense deployment scenario. To resolve this problem, a double cooperative game will be used. That game will be implemented, in addition to the fuzzy logic, which will help us in resource allocation for users QoS. {\textcopyright} 2020 IEEE.}, keywords = {Carrier aggregations, Cellular network, Cellular radio systems, Cooperative game, Deployment scenarios, Fuzzy logic, Mobile telecommunication systems, Multiple operator, QoS-aware, Quality of service, Superior technique, Wi-Fi, WiFi systems, Wireless local area networks (WLAN)}, doi = {10.1109/GIIS50753.2020.9248487}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097601439\&doi=10.1109\%2fGIIS50753.2020.9248487\&partnerID=40\&md5=ca56971766f975bae3c7b9a084c6b679}, author = {Hafaiedh, H. and El Korbi, I. and Langar, R. and Saidane, L.A. and Kobbane, A.} } @article {Guermah2020300, title = {How can reasoning improve ontology-based context-aware system?}, journal = {International Journal of Advanced Intelligence Paradigms}, volume = {15}, number = {3}, year = {2020}, note = {cited By 1}, pages = {300-316}, abstract = {Over the past two decades, the large evolution of software engineering, telecommunication and pervasive devices has lead to emergence of a new vision of development aiming at building systems to meet more complex and personalised needs known as context-aware systems. This type of systems is becoming the next computing paradigm in which infrastructure and services are sensitive to any change of the context, so that plays a crucial role to provide interactive intelligent environments. In parallel, contextual situation refers to a higher level of information inferred from different context data flow that can be extracted from physical and virtual sensors. The power of using situation is lies in their ability to provide a simple and comprehensible representation of context property, which preserve the services that manipulate them from the complexity of sensor readings, data transmission errors and inferencing activities. In this work, we aim to explore the added value of using ontology-based reasoning, focusing on first-order logic and fuzzy logic, to produce contextual situations. Copyright {\textcopyright} 2020 Inderscience Enterprises Ltd.}, doi = {10.1504/IJAIP.2020.105824}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85082202504\&doi=10.1504\%2fIJAIP.2020.105824\&partnerID=40\&md5=202a3b83c6a307a1c364213895e826ba}, author = {Guermah, H. and Fissaa, T. and Guermah, B. and Hafiddi, H. and Nassar, M. and Kriouile, A.} } @article {Hba2020165, title = {ICT sustainable management: Towards a better alignment with the sustainable development strategy}, journal = {International Journal of Advanced Technology and Engineering Exploration}, volume = {7}, number = {71}, year = {2020}, note = {cited By 1}, pages = {165-181}, abstract = {The impact of Information and Communication Technologies (ICT) in terms of Sustainable Development (SD) has led to a great transformation in business management, which positions innovation as an essential element of differentiation for the new market conquest. These ICT, that are particularly adapted, allow creating value for the company in a sustainable way and more aligned with the global SD strategy while ensuring to bring competitive advantage and anticipate new economic, social and environmental problems. To implement an innovation approach that gives organizations the means to develop sustainable management strategies, allowing them to increase overall performance, we proposed the "ICT Sustainable Management" model which is designed according to a Green IT (GIT) and Corporate Social Responsibility (CSR) concepts in order to seek new transition ways for management serving SD. Our model constitutes a first research step to lead reflection on next-generation SD-oriented management models. For this reason, we consider it more appropriate to approve the validity of our model through its application on different categories of companies that use ICT. Analysis of the results of this application test has demonstrated the validity of our model at the scale of five companies. This initial validation will be supported by improvements and new tests that will be extremely useful to improve the model and to advance knowledge in this new field of research. {\textcopyright} 2020, Accent Social and Welfare Society. All rights reserved.}, doi = {10.19101/IJATEE.2020.762062}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097425123\&doi=10.19101\%2fIJATEE.2020.762062\&partnerID=40\&md5=53e6edd0ff8af3389d0e1148a4431567}, author = {Hba, R. and Idrissi, M.A.J. and El Ghaib, M.K. and El Manouar, A.} } @conference {Benhar2020391, title = {Impact of threshold values for filter-based univariate feature selection in heart disease classification}, booktitle = {HEALTHINF 2020 - 13th International Conference on Health Informatics, Proceedings; Part of 13th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2020}, year = {2020}, note = {cited By 2}, pages = {391-398}, abstract = {In the last decade, feature selection (FS), was one of the most investigated preprocessing tasks for heart disease prediction. Determining the optimal features which contribute more towards the diagnosis of heart disease can reduce the number of clinical tests needed to be taken by a patient, decrease the model cost, reduce the storage requirements and improve the comprehensibility of the induced model. In this study a comparison of three filter feature ranking methods was carried out. Feature ranking methods need to set a threshold (i.e. the percentage of the number of relevant features to be selected) in order to select the final subset of features. Thus, the aim of this study is to investigate if there is a threshold value which is an optimal choice for three different feature ranking methods and four classifiers used for heart disease classification in four heart disease datasets. The used feature ranking methods and selection thresholds resulted in optimal classification performance for one or more classifiers over small and large heart disease datasets. The size of the dataset takes an important role in the choice of the selection threshold. {\textcopyright} 2020 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.}, keywords = {Biomedical engineering, Cardiology, Classification (of information), Clinical tests, Diagnosis, Diseases, Feature extraction, Feature ranking, Heart, heart disease, Large dataset, Medical informatics, Optimal choice, Optimal classification, Relevant features, Storage requirements, Threshold-value}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85083712586\&partnerID=40\&md5=4656d8b952f7c60387d4495c737c5a6d}, author = {Benhar, H. and Idri, A. and Hosni, M.} } @article {Elhassouni202093, title = {The implementation of credit risk scorecard using ontology design patterns and BCBS 239}, journal = {Cybernetics and Information Technologies}, volume = {20}, number = {2}, year = {2020}, note = {cited By 4}, pages = {93-104}, abstract = {Nowadays information and communication technologies are playing a decisive role in helping the financial institutions to deal with the management of credit risk. There have been significant advances in scorecard model for credit risk management. Practitioners and policy makers have invested in implementing and exploring a variety of new models individually. Coordinating and sharing information groups, however, achieved less progress. One of several causes of the 2008 financial crisis was in data architecture and information technology infrastructure. To remedy this problem the Basel Committee on Banking Supervision (BCBS) outlined a set of principles called BCBS 239. Using Ontology Design Patterns (ODPs) and BCBS 239, credit risk scorecard and applicant ontologies are proposed to improve the decision making process in credit loan. Both ontologies were validated, distributed in Ontology Web Language (OWL) files and checked in the test cases using SPARQL. Thus, making their (re)usability and expandability easier in financial institutions. These ontologies will also make sharing data more effective and less costly. {\textcopyright} 2020 Sciendo. All rights reserved.}, doi = {10.2478/cait-2020-0019}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85091363101\&doi=10.2478\%2fcait-2020-0019\&partnerID=40\&md5=abed4b96951571c6e4dccfb2dbd8e8e2}, author = {Elhassouni, J. and El Qadi, A. and El Madani El Alami, Y. and El Haziti, M.} } @article {Berradi2020551, title = {Improvement of olsr protocol using the hello message scheme based on neighbors mobility}, journal = {Journal of Communications}, volume = {15}, number = {7}, year = {2020}, note = {cited By 3}, pages = {551-557}, abstract = {The main idea behind the routing protocols based on multi-hop is to find the required path from the source node to the destination. Since those protocols do not consider the node mobility in their mechanism, we propose to enhance the routing protocols benefiting from localization node and predict the time needed for neighbors to go out of range for a node to increase the robustness of the protocols with the mobility. Firstly, we propose an efficient scheme to predict the time needed for the node to quite the neighbor range. Secondly, we conduct a set of simulations to compare the performance of our proposal against OLSR standard. {\textcopyright} 2020 Journal of Communications.}, doi = {10.12720/jcm.15.7.551-557}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85090682888\&doi=10.12720\%2fjcm.15.7.551-557\&partnerID=40\&md5=d5420787a7e221baaea54685cd83c661}, author = {Berradi, H. and Habbani, A. and Mouchfiq, N. and Souidi, M.} } @article {Zemrane2020101, title = {Internet of Things Smart Home Ecosystem}, journal = {Studies in Systems, Decision and Control}, volume = {242}, year = {2020}, note = {cited By 15}, pages = {101-125}, abstract = {Internet of things is perceived today as a key opportunity for commercial development in different sectors of activities, the new IoT Smart home ecosystem, is based on a lot of sensors and actuators that can make life in the home more pleasant and more safety for its occupant, in this article we distinguish the communication protocols used in this IoT ecosystem, their modes of operation, and we analyze their performance. {\textcopyright} 2020, Springer Nature Switzerland AG.}, doi = {10.1007/978-3-030-22773-9_8}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85069766578\&doi=10.1007\%2f978-3-030-22773-9_8\&partnerID=40\&md5=8934d759b7be1ff526b641115522498d}, author = {Zemrane, H. and Baddi, Y. and Hasbi, A.} } @article {Hosni20202177, title = {A mapping study of ensemble classification methods in lung cancer decision support systems}, journal = {Medical and Biological Engineering and Computing}, volume = {58}, number = {10}, year = {2020}, note = {cited By 8}, pages = {2177-2193}, abstract = {Achieving a high level of classification accuracy in medical datasets is a capital need for researchers to provide effective decision systems to assist doctors in work. In many domains of artificial intelligence, ensemble classification methods are able to improve the performance of single classifiers. This paper reports the state of the art of ensemble classification methods in lung cancer detection. We have performed a systematic mapping study to identify the most interesting papers concerning this topic. A total of 65 papers published between 2000 and 2018 were selected after an automatic search in four digital libraries and a careful selection process. As a result, it was observed that diagnosis was the task most commonly studied; homogeneous ensembles and decision trees were the most frequently adopted for constructing ensembles; and the majority voting rule was the predominant combination rule. Few studies considered the parameter tuning of the techniques used. These findings open several perspectives for researchers to enhance lung cancer research by addressing the identified gaps, such as investigating different classification methods, proposing other heterogeneous ensemble methods, and using new combination rules. [Figure not available: see fulltext.] {\textcopyright} 2020, International Federation for Medical and Biological Engineering.}, keywords = {Artificial intelligence, Automatic searches, Biological organs, cancer classification, Classification (of information), Classification accuracy, Classification methods, classifier, decision support system, Decision support systems, decision tree, Decision trees, Diagnosis, Digital libraries, Diseases, Ensemble classification, Heterogeneous ensembles, human, lung cancer, Lung cancer detections, Majority voting rules, Mapping, priority journal, Review, Systematic mapping studies}, doi = {10.1007/s11517-020-02223-8}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85087501825\&doi=10.1007\%2fs11517-020-02223-8\&partnerID=40\&md5=bdb2bd3f923da33ea3b564a0bd6e739e}, author = {Hosni, M. and Garc{\'\i}a-Mateos, G. and Carrillo-De-Gea, J.M. and Idri, A. and Fernandez-Aleman, J.L.} } @article {Nassit2020, title = {A new analytical method for spherical thin shells{\textquoteright} axisymmetric vibrations}, journal = {Mathematical Problems in Engineering}, volume = {2020}, year = {2020}, note = {cited By 0}, abstract = {In order to improve the spherical thin shells{\textquoteright} vibrations analysis, we introduce a new analytical method. In this method, we take into consideration the terms of the inertial couples in the stress couples{\textquoteright} differential equations of motion. These inertial couples are omitted in the theories provided by Naghdi{\textendash}Kalnins and Kunieda. The results show that the current method can solve the axisymmetric vibrations{\textquoteright} equations of elastic thin spherical shells. In this paper, we focus on verifying the current method, particularly for free vibrations with free edge and clamped edge boundary conditions. To check the validity and accuracy of the current analytical method, the natural frequencies determined by this method are compared with those available in the literature and those obtained by a finite element calculation. Copyright {\textcopyright} 2020 Mariame Nassit et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.}, keywords = {Analytical method, Axisymmetric vibrations, Boundary conditions, Clamped edge, Equations of motion, Free edge, Free vibration, Spheres, Spherical shell, Thin shells, Vibration analysis, Vibrations analysis}, doi = {10.1155/2020/1074236}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097643702\&doi=10.1155\%2f2020\%2f1074236\&partnerID=40\&md5=8e15fa702076267daafa725beb1a50a0}, author = {Nassit, M. and Harif, A.E. and Berbia, H. and Janan, M.T.} } @conference {Hmami2020, title = {A new Framework to improve Change Mining in Configurable Process}, booktitle = {ACM International Conference Proceeding Series}, year = {2020}, note = {cited By 1}, abstract = {The configurable process model is an important approach to reduce the redundancy involved in modeling, reengineering, and adapting a business process with its environment. While process mining approaches aim to discover and, verify conformance and enhance a process, connecting configurable processes and process mining shows considerable improvements, especially in terms of time and cost. However, the configurable process has rarely been applied in change mining. Our goal in this paper is to highlight the importance of using variability to improve change mining from a collection of event logs. We propose a framework that can detect and recommend changes, by mining changes from a collection of event logs. The main purpose is to allow engineers and business process designers to easily adjust business process with the environment changes. {\textcopyright} 2020 ACM.}, keywords = {Business Process, Change mining, Configurable process models, Data mining, Environment change, Event logs, Information systems, Information use, Process mining}, doi = {10.1145/3386723.3387853}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85123042985\&doi=10.1145\%2f3386723.3387853\&partnerID=40\&md5=cbdd186e5e2298cef0babe5bb443e4d0}, author = {Hmami, A. and Sba{\"\i}, H. and Fredj, M.} } @article {Koulou2020, title = {Optimization in collaborative information systems for an enhanced interoperability network}, journal = {International Journal for Simulation and Multidisciplinary Design Optimization}, volume = {11}, year = {2020}, note = {cited By 2}, abstract = {Today{\textquoteright}s constraints on collaborative enterprises are often directly reflected in the interoperability of their information systems. The goal is to improve and effectively evolve the global interoperability of collaboration by distributing the required effort in an optimal way on different information systems to achieve the target goal. This method of enhancement will be realized by applying an IMA (Interoperability Measurement Approach) to generate a ratio representing the degree of interoperability of an information system within the collaboration, as well as applying the heuristic optimization method PPSO (Paralleled Particle Swarm Optimization) to reach the optimal distribution of effort. {\textcopyright} A. Koulou et al.}, keywords = {Collaborative enterprise, Collaborative information systems, Heuristic methods, Heuristic optimization method, Information systems, Information use, interoperability, Optimal distributions, Particle swarm optimization (PSO)}, doi = {10.1051/smdo/2019021}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085511318\&doi=10.1051\%2fsmdo\%2f2019021\&partnerID=40\&md5=e1f020778ecbcca1fde01bc7eee029d3}, author = {Koulou, A. and Zemzami, M. and El Hami, N. and Elmir, A. and Hmina, N.} } @conference {Berradi2020, title = {Optimize the QoS Metrics in Smart Mobile Communication using Multi-Objective Function}, booktitle = {3rd International Conference on Advanced Communication Technologies and Networking, CommNet 2020}, year = {2020}, note = {cited By 1}, abstract = {The impact of mobility is a major factor that can have an influence on the stability of network behaviour in mobile ad-hoc networks (MANET). The selection of paths having stability, security and an extended network lifetime is one of the crucial issues in the design of routing protocols. In this paper, the authors propose an enhanced algorithm relying on a multipurpose function according to three metrics, mobility, energy and reputation levels to improve the routing decision-making process. The main goal is to identify better performing Multipoint relays (MPRs) which are used to relay messages between nodes. They are also necessary for routing and selecting the appropriate route from any source to any destination node. The identification of the most efficient MPRs can upgrade the network performing even in the most challenging conditions of the dynamic environment. The authors implement the advanced algorithm in the OLSR and get the performance result by using a network simulator (NS3) running under the mobility model of the Manhattan network. The achieved results show important performance compared to the default version. In addition, the proposed model can be employed to improve network efficiency for proactive protocols in ad-hoc networks. {\textcopyright} 2020 IEEE.}, keywords = {Decision making, Destination nodes, Dynamic environments, Internet protocols, Manhattan networks, Mobile ad hoc networks, Mobile communications, Mobile telecommunication systems, Multi-objective functions, Network efficiency, Network security, Network simulators, Proactive protocol}, doi = {10.1109/CommNet49926.2020.9199632}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85093653757\&doi=10.1109\%2fCommNet49926.2020.9199632\&partnerID=40\&md5=83e6a0c98ac8386acb6e6aad76a531ec}, author = {Berradi, H. and Habbani, A. and Souidi, M. and Elmahdi, F. and Mouchfiq, N.} } @article {ElMahdi2020, title = {Optimized Scheme to Secure IoT Systems Based on Sharing Secret in Multipath Protocol}, journal = {Wireless Communications and Mobile Computing}, volume = {2020}, year = {2020}, note = {cited By 1}, abstract = {Internet of Things (IoT) is a hot and emerging topic nowadays. In the world of today, all kinds of devices are supposed to be connected and all types of information are exchanged. This makes human daily life easier and much more intelligent than before. However, this life mode is vulnerable to several security threats. In fact, the mobile networks, by nature, are more exposed to malicious attacks that may read confidential information and modify or even drop important data. This risk should be taken in consideration prior to any construction of mobile networks especially in the coming 5G technology. The present paper aims to provide a contribution in securing such kinds of environment by proposing a new protocol that can be implemented in ad hoc networks. {\textcopyright} 2020 Fatna El Mahdi et al.}, keywords = {5G mobile communication systems, ad hoc networks, Confidential information, Daily lives, Emerging topics, Internet of things, Internet of Things (IOT), Malicious attack, Mobile security, Mobile telecommunication systems, Multipath protocols, Network security, New protocol, Security threats}, doi = {10.1155/2020/1468976}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85083513010\&doi=10.1155\%2f2020\%2f1468976\&partnerID=40\&md5=a7326029a67a6d4fc68c90a958148708}, author = {El Mahdi, F. and Habbani, A. and Kartit, Z. and Bouamoud, B.} } @article {Souidi202043, title = {Performance Comparison of Zoning Techniques in Geographic Forwarding Rules for Ad Hoc Networks}, journal = {EAI/Springer Innovations in Communication and Computing}, year = {2020}, note = {cited By 0}, pages = {43-54}, abstract = {Mobile Ad Hoc Network (MANET) is a set of devices communicating directly with each other without the aid of an infrastructure. They exchange broadcast messages to detect links between nodes and to create routing tables. However, the broadcasting leads to the multiplication of redundant retransmissions. These retransmissions decrease the performance of the network. The Geographic Forwarding Rules (GFRs) are a technique that allows to scale down the ripple effects of broadcasting in order to increase the reliability of the network. They have been used in the context of the Optimized Link State Routing protocol (OLSR) and have reduced the useless transmissions of topology control (TC) messages. The GFRs use the location of the originator of the TC message to split nodes into virtual groups called the propagation zones. The algorithm freely advertises TC messages inside each zone and avoids redundant retransmissions between them. The authors of GFR presented several zoning techniques. However, they have studied only one method. In this paper, we draw analysis of different techniques to compute the propagation zones. We compare, by simulations, the improvement provided by the GFR algorithm on OLSR protocol using different partitioning methods. {\textcopyright} 2020, Springer Science and Business Media Deutschland GmbH. All rights reserved.}, keywords = {Ad-hoc networks, Broadcast messages, Broadcasting, Control messages, Geographic forwarding, Mobile ad hoc networks, Mobile ad-hoc networks, Optimized link state routing protocols, Performance comparison, Retransmissions, Topology control, Zoning, Zoning techniques}, doi = {10.1007/978-3-030-30911-4_4}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85134349769\&doi=10.1007\%2f978-3-030-30911-4_4\&partnerID=40\&md5=0f69976ebbd29ca5dc9e70fd2c18ed5e}, author = {Souidi, M. and Habbani, A.} } @article {Elkhoukhi2020, title = {A platform architecture for occupancy detection using stream processing and machine learning approaches}, journal = {Concurrency and Computation: Practice and Experience}, volume = {32}, number = {17}, year = {2020}, note = {cited By 15}, abstract = {Context-awareness in energy-efficient buildings has been considered as a crucial fact for developing context-driven control approaches in which sensing and actuation tasks are performed according to the contextual changes. This could be done by including the presence of occupants, number, actions, and behaviors in up-to-date context, taking into account the complex interlinked elements, situations, processes, and their dynamics. However, many studies have shown that occupancy information is a major leading source of uncertainty when developing control approaches. Comprehensive and real-time fine-grained occupancy information has to be, therefore, integrated in order to improve the performance of occupancy-driven control approaches. The work presented in this paper is toward the development of a holistic platform that combines recent IoT and Big Data technologies for real-time occupancy detection in smart building. The purpose of this work focuses mainly on the presence of occupants by comparing both static and dynamic machine learning techniques. An open-access occupancy detection dataset was first used to assess the usefulness of the platform and the effectiveness of static machine learning strategies for data processing. This dataset is used for applications that follow the strategy aiming at storing data first and processing it later. However, many smart buildings{\textquoteright} applications, such as HVAC and ventilation control, require online data streams processing. Therefore, a distributed real-time machine learning framework was integrated into the platform and tested to show its effectiveness for this kind of applications. Experiments have been conducted for ventilation systems in energy-efficient building laboratory (EEBLab) and preliminary results show the effectiveness of this platform in detecting on-the-fly presence of occupants, which is required to either make ON or OFF the system and then activate the corresponding embedded control technique (eg, ON/OFF, PID, state-feedback). {\textcopyright} 2019 John Wiley \& Sons, Ltd.}, keywords = {Context- awareness, Data streams, Embedded systems, energy efficiency, Energy efficient building, Intelligent buildings, Internet of things, Learning systems, Machine learning, Machine learning approaches, Machine learning techniques, Occupancy detections, Platform architecture, Real-time data processing, State feedback, Ventilation, Ventilation control}, doi = {10.1002/cpe.5651}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85076920865\&doi=10.1002\%2fcpe.5651\&partnerID=40\&md5=f34bbe0cd8dadd04282227e1a5698c57}, author = {Elkhoukhi, H. and NaitMalek, Y. and Bakhouya, M. and Berouine, A. and Kharbouch, A. and Lachhab, F. and Hanifi, M. and El Ouadghiri, D. and Essaaidi, M.} } @article {Mouchfiq2020219, title = {Security in MANETs: The Blockchain Issue}, journal = {Communications in Computer and Information Science}, volume = {1264}, year = {2020}, note = {cited By 2}, pages = {219-232}, abstract = {With the emergence of the IoT (Internet of Things) technology, security features must take into account the developments and possible uses. The blockchain is considered as a new technology devoted to data sharing, it allows to guarantee the integrity of data by IoT devices thanks to intelligent contracts allowing to verify and enforce the conditions of the monitored goods during their processing. In our work, we will address the security of Blockchain-based systems and networks to improve and simplify the communication of messages and informations, using the most innovative and sophisticated processes and a form of device independent control. In order to do so, we will analyse the solutions advanced by researchers from all over the world who are dedicated to guaranteeing a good state of security on these networks. Finally, our manuscript will present an approach to enhance security which is founded on the Blockchain principle and which we have entitled {\textquotedblleft}MPR Blockchain{\textquotedblright}. This solution proves to be the most appropriate to our requirements and expectations as a team working within IoT systems and especially ad hoc networks. {\textcopyright} 2020, Springer Nature Switzerland AG.}, keywords = {Blockchain, Data communication systems, Data Sharing, Independent control, Internet of things, Mobile ad hoc networks, Mobile security, Network security, Security features, Team working}, doi = {10.1007/978-3-030-61143-9_18}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097368928\&doi=10.1007\%2f978-3-030-61143-9_18\&partnerID=40\&md5=d277597a52117999b5b738db40aa811f}, author = {Mouchfiq, N. and Benjbara, C. and Habbani, A.} } @article {Zakrani202072, title = {Software Effort Estimation Using an Optimal Trees Ensemble: An Empirical Comparative Study}, journal = {Smart Innovation, Systems and Technologies}, volume = {146}, year = {2020}, note = {cited By 0}, pages = {72-82}, abstract = {Since information systems have become the heartbeat of many organizations, the investment in software is growing rapidly and consuming then a significant portion of the company budget. In this context, both the software engineering practitioners and researchers are more interested than ever about accurately estimating the effort and the quality of software product under development. Accurate estimates are desirable but no technique has demonstrated to be successful at effectively and reliably estimating software development effort. In this paper, we propose the use of an optimal trees ensemble (OTE) to predict the software development effort. The ensemble employed is built by combining only the top ranked trees, one by one, from a set of random forests. Each included tree must decrease the unexplained variance of the ensemble for software development effort estimation (SDEE). The effectiveness of the OTE model is compared with other techniques such as regression trees, random forest, RBF neural networks, support vector regression and multiple linear regression in terms of the mean magnitude relative error (MMRE), MdMRE and Pred(l) obtained on five well known datasets namely: ISBSG R8, COCOMO, Tukutuku, Desharnais and Albrecht. According to the results obtained from the experiments, it is shown that the proposed ensemble of optimal trees outperformed almost all the other techniques. Also, OTE model outperformed statistically the other techniques at least in one dataset. {\textcopyright} 2020, Springer Nature Switzerland AG.}, keywords = {Accuracy evaluation, Budget control, Decision trees, Forestry, Linear regression, Multiple linear regressions, Optimal trees ensemble, Radial basis function networks, Random forests, RBF Neural Network, Regression trees, Software design, Software development effort, Support vector regression (SVR)}, doi = {10.1007/978-3-030-21005-2_7}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85069482179\&doi=10.1007\%2f978-3-030-21005-2_7\&partnerID=40\&md5=8d9d107d9b52c20f6cd93bb86477a6a0}, author = {Zakrani, A. and Idri, A. and Hain, M.} } @article {ABDELLAH2020568, title = {Spelling correction for the Arabic language space deletion errors-}, journal = {Procedia Computer Science}, volume = {177}, year = {2020}, note = {The 11th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2020) / The 10th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2020) / Affiliated Workshops}, pages = {568-574}, abstract = {The automatic correction of spelling errors is one of the most used disciplines in different automatic language processing systems, therefore we are dealing in this article the space deletion errors. This type of error was not taken into consideration in the classical Levenshtein algorithm. In this paper, we propose a new approach for the correction of this spelling errors type. This new approach uses an adapted version of the Levenshtein distance to correct this error. For the evaluation of our new approach we used a lexicon extracted from Al Watane newspaper articles. The results showed the importance of our approach.}, keywords = {Arabic language, Levenshtein distance, space deletion errors, spelling errors}, issn = {1877-0509}, doi = {https://doi.org/10.1016/j.procs.2020.10.080}, url = {https://www.sciencedirect.com/science/article/pii/S1877050920323504}, author = {Yousfi Abdellah and Aouragh Si Lhoussain and Gueddah Hicham and Nejja Mohamed} } @conference {Abdellah2020568, title = {Spelling correction for the Arabic language-space deletion errors}, booktitle = {Procedia Computer Science}, volume = {177}, year = {2020}, note = {cited By 5}, pages = {568-574}, abstract = {The automatic correction of spelling errors is one of the most used disciplines in different automatic language processing systems, therefore we are dealing in this article the space deletion errors. This type of error was not taken into consideration in the classical Levenshtein algorithm. In this paper, we propose a new approach for the correction of this spelling errors type. This new approach uses an adapted version of the Levenshtein distance to correct this error. For the evaluation of our new approach we used a lexicon extracted from Al Watane newspaper articles. The results showed the importance of our approach. {\textcopyright} 2020 The Authors. Published by Elsevier B.V.}, keywords = {Arabic languages, Automatic corrections, Computer science, Computers, Errors, Language processing systems, Levenshtein distance, New approaches, space deletion errors, Spelling correction, spelling errors}, doi = {10.1016/j.procs.2020.10.080}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85099878597\&doi=10.1016\%2fj.procs.2020.10.080\&partnerID=40\&md5=696fa31a7debf0be7759cbf273e88803}, author = {Abdellah, Y. and Lhoussain, A.S. and Hicham, G. and Mohamed, N.} } @article {Maryame2020441, title = {State of the Art of Deep Learning Applications in Sentiment Analysis: Psychological Behavior Prediction}, journal = {Advances in Intelligent Systems and Computing}, volume = {1076}, year = {2020}, note = {cited By 3}, pages = {441-451}, abstract = {With the explosion of web 2.0, we are witnessing a sharp increase in Internet users such as a vertiginous evolution of social media. These media constitute a source of rich and varied information for researchers in sentiment analyses. This paper describes a tool for sifting through and synthesizing reviews by identifying the main deep learning techniques applied for sentiment analysis especially when it comes to psychological behavior prediction. {\textcopyright} Springer Nature Singapore Pte Ltd. 2020.}, keywords = {Behavior prediction, Behavioral research, Deep learning, Embedded systems, Internet users, Learning techniques, Sentiment analysis, Sharp increase, social media, State of the art, Web 2.0}, doi = {10.1007/978-981-15-0947-6_42}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085169691\&doi=10.1007\%2f978-981-15-0947-6_42\&partnerID=40\&md5=dcac33ec68694f08b6258ea4a477f755}, author = {Maryame, N. and Najima, D. and Hasnae, R. and Rachida, A.} } @article {Berradi2020677, title = {Wireless network stability enhancement based on spatial dependency}, journal = {Lecture Notes in Electrical Engineering}, volume = {684 LNEE}, year = {2020}, note = {cited By 0}, pages = {677-686}, abstract = {The Ad hoc network is a part of the IoT environment, including several types of networks like MANET. It uses different categories of routing protocol, but the OLSR routing protocol is the best one for MANET. The mobility concept has an impact on the evolution of network performances. In the OLSR routing protocol, this mobility influences on the choice of the MultiPoint Relay (MPR). In this paper, the main objective is to develop an algorithm enhancing MPR selection process in such networks. This algorithm based on Average Spatial Dependency metric {\textquotedblleft}ASD{\textquotedblright} linked to the average Relative Speed {\textquotedblleft}RS{\textquotedblright} and the average Relative Acceleration {\textquotedblleft}RA{\textquotedblright}. Each node shares these values with its neighbors using the messages of OLSR routing protocol (Hello and TC messages). Furthermore, if the nodes have equal reachability, the highest ASD value will be selected as a criterion of the choice of their MPR set. In the simulation, we have applicated the Manhattan mobility model in the MANET network, and we have used the NS3 simulator. The results of this simulation have shown that the mobility concept could change network performances in terms of packet loss, end-to-end delay, and Throughput. {\textcopyright} The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2020.}, keywords = {End to end delay, Manhattan mobility models, Mobile ad hoc networks, Mpr selections, multipoint relays, Network performance, Network stability, Relative acceleration, Relative speed, Routing protocols, Spatial dependencies}, doi = {10.1007/978-3-030-53187-4_74}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089717007\&doi=10.1007\%2f978-3-030-53187-4_74\&partnerID=40\&md5=845455db1c85cc5d0e34104203afb7ba}, author = {Berradi, H. and Habbani, A. and Benjbara, C. and Mouchfiq, N. and Amraoui, H.} } @conference {Ennya2019, title = {Computing Tasks Distribution in Fog Computing: Coalition Game Model}, booktitle = {Proceedings - 2018 International Conference on Wireless Networks and Mobile Communications, WINCOM 2018}, year = {2019}, note = {cited By 0}, doi = {10.1109/WINCOM.2018.8629587}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062835283\&doi=10.1109\%2fWINCOM.2018.8629587\&partnerID=40\&md5=6f05637837203320cf2f7daa8f8c242d}, author = {Ennya, Z. and Hadi, M.Y. and Abouaomar, A.} } @conference {Haddad2019, title = {Efficient Stacked Cylindrical Dielectric Resonator Antenna for Anticollision Short Range Radar at 79GHz}, booktitle = {International Symposium on Advanced Electrical and Communication Technologies, ISAECT 2018 - Proceedings}, year = {2019}, note = {cited By 0}, doi = {10.1109/ISAECT.2018.8618833}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062468314\&doi=10.1109\%2fISAECT.2018.8618833\&partnerID=40\&md5=0e4f2684dccbbbf03196e55a1fa16de3}, author = {Haddad, A. and Aoutoul, M. and Rais, K. and Faqir, M. and Essaaidi, M. and Lakssir, B. and Moukhtafi, F.E. and Jouali, R.} } @article {Hosni2019, title = {Evaluating filter fuzzy analogy homogenous ensembles for software development effort estimation}, journal = {Journal of Software: Evolution and Process}, volume = {31}, number = {2}, year = {2019}, note = {cited By 0}, doi = {10.1002/smr.2117}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85061585023\&doi=10.1002\%2fsmr.2117\&partnerID=40\&md5=72983b70d540ccb14da59885e96cc4ab}, author = {Hosni, M. and Idri, A. and Abran, A.} } @article {Kasmi2019318, title = {Performance analysis of preconditioned conjugate gradient solver on heterogeneous (multi-CPUs/multi-GPUs) architecture}, journal = {Lecture Notes in Networks and Systems}, volume = {49}, year = {2019}, note = {cited By 0}, pages = {318-336}, doi = {10.1007/978-3-319-97719-5_20}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85063287241\&doi=10.1007\%2f978-3-319-97719-5_20\&partnerID=40\&md5=09a40ccb61d934f094c1b14975bae2b4}, author = {Kasmi, N. and Zbakh, M. and Haouari, A.} } @article {Hayat20191040, title = {A signaling game-based approach for Data-as-a-Service provisioning in IoT-Cloud}, journal = {Future Generation Computer Systems}, volume = {92}, year = {2019}, note = {cited By 1}, pages = {1040-1050}, doi = {10.1016/j.future.2017.10.001}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85034971596\&doi=10.1016\%2fj.future.2017.10.001\&partnerID=40\&md5=da16debd38f36b3509fc36e9edb8e561}, author = {Hayat, R. and Sabir, E. and Badidi, E. and Elkoutbi, M.} } @article {ElHamlaoui2019167, title = {Support cloud SLA establishment using MDE}, journal = {Lecture Notes in Networks and Systems}, volume = {49}, year = {2019}, note = {cited By 0}, pages = {167-184}, doi = {10.1007/978-3-319-97719-5_12}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85063299209\&doi=10.1007\%2f978-3-319-97719-5_12\&partnerID=40\&md5=78747c9999533ac370999a8301a4f99f}, author = {El Hamlaoui, M. and Fissaa, T. and Laghouaouta, Y. and Nassar, M.} } @article {Bounagui201998, title = {Toward a unified framework for Cloud Computing governance: An approach for evaluating and integrating IT management and governance models}, journal = {Computer Standards and Interfaces}, volume = {62}, year = {2019}, note = {cited By 0}, pages = {98-118}, doi = {10.1016/j.csi.2018.09.001}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85054138270\&doi=10.1016\%2fj.csi.2018.09.001\&partnerID=40\&md5=81f638246225675985bb72491ec902d1}, author = {Bounagui, Y. and Mezrioui, A. and Hafiddi, H.} } @conference {ElHadj20195330, title = {Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach}, booktitle = {Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018}, year = {2019}, note = {cited By 0}, pages = {5330-5332}, doi = {10.1109/BigData.2018.8622610}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062588205\&doi=10.1109\%2fBigData.2018.8622610\&partnerID=40\&md5=7c1e7e5b141f9f63ccf2ad00a318664f}, author = {El Hadj, M.A. and Erradi, M. and Khoumsi, A. and Benkaouz, Y.} } @article {AitElHadj2018298, title = {Access domain-based approach for anomaly detection and resolution in XACML policies}, journal = {Advances in Intelligent Systems and Computing}, volume = {735}, year = {2018}, pages = {298-308}, doi = {10.1007/978-3-319-76354-5_27}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85044049486\&doi=10.1007\%2f978-3-319-76354-5_27\&partnerID=40\&md5=6c7c85cfacd3e4e948ef85d2df40ee3f}, author = {Ait El Hadj, M. and Benkaouz, Y. and Khoumsi, A. and Erradi, M.} } @article {Hassen2018, title = {Assessment of genetic diversity and bioremediation potential of pseudomonads isolated from pesticide-contaminated artichoke farm soils}, journal = {3 Biotech}, volume = {8}, number = {6}, year = {2018}, doi = {10.1007/s13205-018-1256-5}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85047222547\&doi=10.1007\%2fs13205-018-1256-5\&partnerID=40\&md5=214af9fe1c89045eedc77e9e648d892e}, author = {Hassen, W. and Neifar, M. and Cherif, H. and Mahjoubi, M. and Souissi, Y. and Raddadi, N. and Fava, F. and Cherif, A.} } @article {Sahnoun201826, title = {A coalition-formation game model for energy-efficient routing in mobile Ad-hoc network}, journal = {International Journal of Electrical and Computer Engineering}, volume = {8}, number = {1}, year = {2018}, note = {cited By 0}, pages = {26-33}, abstract = {One of the most routing problems in Mobile Ad-hoc Network is the node{\textquoteright}s selfishness. Nodes are generally selfish and try to maximize their own benefit; hence these nodes refuse to forward packet on behalf of others to preserve their limited energy resources. This selfishness may lead to a low efficiency of routing. Therefore, it is important to study mechanisms which can be used encourage cooperation among nodes, to maintain the network efficiency. In this paper, we propose a cooperative game theoretic model to support more energy-aware and available bandwidth routing in MANET. We introduce a novel framework from coalitional-formation game theory, called hedonic coalition-formation game. We integrate this model to OLSR protocol that is an optimization over the classical link state protocol for the MANETs. Within each coalition, a coalition coordinator acts as a special MPR node to improve the energy efficient and the packet success rate of the transmission. Simulation results show how the proposed algorithm improve the performance in terms of the percentage of selected MPR nodes in the network, the percentage of alive nodes by time, and the Packet Delivery Ratio. Which prove that our proposed model leads, to better results compared to the classical OLSR. {\textcopyright} 2018 Institute of Advanced Engineering and Science.}, doi = {10.11591/ijece.v8i1.pp26-33}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85042920602\&doi=10.11591\%2fijece.v8i1.pp26-33\&partnerID=40\&md5=b4b2c8c95ff6ea605c6d376020831a06}, author = {Sahnoun, A. and Habbani, A. and El Abbadi, J.} } @article {Sahnoun201826, title = {A coalition-formation game model for energy-efficient routing in mobile Ad-hoc network}, journal = {International Journal of Electrical and Computer Engineering}, volume = {8}, number = {1}, year = {2018}, pages = {26-33}, doi = {10.11591/ijece.v8i1.pp26-33}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85042920602\&doi=10.11591\%2fijece.v8i1.pp26-33\&partnerID=40\&md5=b4b2c8c95ff6ea605c6d376020831a06}, author = {Sahnoun, A. and Habbani, A. and El Abbadi, J.} } @conference {Bennani2018152, title = {Collaborative model-based matching of heterogeneous models}, booktitle = {Proceedings of the 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design, CSCWD 2018}, year = {2018}, pages = {152-157}, doi = {10.1109/CSCWD.2018.8465228}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85054369642\&doi=10.1109\%2fCSCWD.2018.8465228\&partnerID=40\&md5=5c36a33efe1da810c568cd8ac7f96749}, author = {Bennani, S. and El Hamlaoui, M. and Nassar, M. and Ebersold, S. and Coulette, B.} } @conference {Salah-Eddine2018130, title = {Computerised method of coping with technostress in organizational situation}, booktitle = {2018 International Conference on Information Management and Processing, ICIMP 2018}, volume = {2018-January}, year = {2018}, pages = {130-134}, doi = {10.1109/ICIMP1.2018.8325854}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051020956\&doi=10.1109\%2fICIMP1.2018.8325854\&partnerID=40\&md5=edfd6f6dbd98a85dea77c6b85c7adbe3}, author = {Salah-Eddine, M. and El Hamlaoui, M. and Belaissaoui, M.} } @article {Haddad201812, title = {Design of high gain novel dielectric resonator antenna array for 24 GHz short range radar systems}, journal = {Advanced Electromagnetics}, volume = {7}, number = {4}, year = {2018}, pages = {12-18}, doi = {10.7716/aem.v7i4.874}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85052828658\&doi=10.7716\%2faem.v7i4.874\&partnerID=40\&md5=f03b09d177b785f22ce0d744b8db6f72}, author = {Haddad, A. and Aoutoul, M. and Rais, K. and Essaaidi, M. and Faqir, M. and Bouya, M.} } @article {Hdioud201870, title = {Detecting and shadows in the HSV color space using dynamic thresholds}, journal = {Bulletin of Electrical Engineering and Informatics}, volume = {7}, number = {1}, year = {2018}, pages = {70-79}, doi = {10.11591/eei.v7i1.893}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85045525834\&doi=10.11591\%2feei.v7i1.893\&partnerID=40\&md5=ca79c66bd666526ee7849c304d10f7ef}, author = {Hdioud, B. and El Haj Tirari, M. and Oulad Haj Thami, R. and Faizi, R.} } @conference {Souidi2018, title = {Energy performance of zoning techniques for broadcast processing with reduced redundancy in MANETS}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3289402.3289507}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062792171\&doi=10.1145\%2f3289402.3289507\&partnerID=40\&md5=1d25490445c2ab5f8978761851a98837}, author = {Souidi, M. and Berradi, H. and Habbani, A. and Elmahdi, F.} } @conference {Guermah2018398, title = {Exploiting semantic web services in the development of context-Aware systems}, booktitle = {Procedia Computer Science}, volume = {127}, year = {2018}, pages = {398-407}, doi = {10.1016/j.procs.2018.01.137}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85045686942\&doi=10.1016\%2fj.procs.2018.01.137\&partnerID=40\&md5=dbaaaeb79a87c39b06e634b35eb64baf}, author = {Guermah, H. and Fissaa, T. and Hafiddi, H. and Nassar, M.} } @conference {Zakroum2018175, title = {Exploratory data analysis of a network telescope traffic and prediction of port probing rates}, booktitle = {2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018}, year = {2018}, pages = {175-180}, doi = {10.1109/ISI.2018.8587323}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85061067648\&doi=10.1109\%2fISI.2018.8587323\&partnerID=40\&md5=76f77a31025e393df1d23b123bcb8dee}, author = {Zakroum, M. and Houmz, A. and Ghogho, M. and Mezzour, G. and Lahmadi, A. and Francois, J. and Koutbi, M.E.} } @article {Amraoui20186945, title = {A Forwarding Game Approach for Reducing Topology Control Traffic in MANETs}, journal = {Arabian Journal for Science and Engineering}, volume = {43}, number = {12}, year = {2018}, pages = {6945-6961}, doi = {10.1007/s13369-017-2910-7}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85056214456\&doi=10.1007\%2fs13369-017-2910-7\&partnerID=40\&md5=1dfa43ead71bc316da85208bc3a3c893}, author = {Amraoui, H. and Habbani, A. and Hajami, A.} } @article {Souidi20181, title = {Geographic forwarding rules to reduce broadcast redundancy in mobile ad hoc wireless networks}, journal = {Personal and Ubiquitous Computing}, year = {2018}, pages = {1-11}, doi = {10.1007/s00779-018-1137-2}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046544087\&doi=10.1007\%2fs00779-018-1137-2\&partnerID=40\&md5=6c36decf0a636de5c2e0472ac7d6cf4e}, author = {Souidi, M. and Habbani, A. and Berradi, H. and El Mahdi, F.} } @conference {Hamlaoui20181695, title = {Heterogeneous design models alignment: From matching to consistency management}, booktitle = {Proceedings of the ACM Symposium on Applied Computing}, year = {2018}, pages = {1695-1697}, doi = {10.1145/3167132.3167425}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050549845\&doi=10.1145\%2f3167132.3167425\&partnerID=40\&md5=e3979910149360a200e2cb9730a3469b}, author = {Hamlaoui, M.E. and Bennani, S. and Nassar, M. and Ebersold, S. and Coulette, B.} } @conference {Houari20181, title = {Hybrid big data warehouse for on-demand decision needs}, booktitle = {Proceedings of 2017 International Conference on Electrical and Information Technologies, ICEIT 2017}, volume = {2018-January}, year = {2018}, pages = {1-6}, doi = {10.1109/EITech.2017.8255261}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85047477758\&doi=10.1109\%2fEITech.2017.8255261\&partnerID=40\&md5=f88360d6e054f43cc33c4593431fa891}, author = {Houari, M.E. and Rhanoui, M. and Asri, B.E.} } @article {Hba2018137, title = {ICT green alignment: Towards a new generation managerial model based on green IT and corporate social responsibility}, journal = {International Journal of Advanced Computer Research}, volume = {8}, number = {36}, year = {2018}, pages = {137-147}, doi = {10.19101/IJACR.2018.836018}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85049530379\&doi=10.19101\%2fIJACR.2018.836018\&partnerID=40\&md5=7ae04b8c823bb73411d46c0ba496f8e6}, author = {Hba, R. and El Manouar, A.} } @conference {Fissaa2018, title = {An intelligent approach for context-aware service selection using machine learning}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3230905.3230938}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053485269\&doi=10.1145\%2f3230905.3230938\&partnerID=40\&md5=9a122db8fcb1e41bf5f54261c361ce7a}, author = {Fissaa, T. and Guermah, H. and Hamlaoui, M.E.L. and Hafiddi, H. and Nassar, M.} } @article {Landrigan2018462, title = {The Lancet Commission on pollution and health}, journal = {The Lancet}, volume = {391}, number = {10119}, year = {2018}, pages = {462-512}, doi = {10.1016/S0140-6736(17)32345-0}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85031763844\&doi=10.1016\%2fS0140-6736\%2817\%2932345-0\&partnerID=40\&md5=a37689cb0e79594159ee6f8afc55fae1}, author = {Landrigan, P.J. and Fuller, R. and Acosta, N.J.R. and Adeyi, O. and Arnold, R. and Basu, N.N. and Bald{\'e}, A.B. and Bertollini, R. and Bose-O{\textquoteright}Reilly, S. and Boufford, J.I. and Breysse, P.N. and Chiles, T. and Mahidol, C. and Coll-Seck, A.M. and Cropper, M.L. and Fobil, J. and Fuster, V. and Greenstone, M. and Haines, A. and Hanrahan, D. and Hunter, D. and Khare, M. and Krupnick, A. and Lanphear, B. and Lohani, B. and Martin, K. and Mathiasen, K.V. and McTeer, M.A. and Murray, C.J.L. and Ndahimananjara, J.D. and Perera, F. and Poto{\v c}nik, J. and Preker, A.S. and Ramesh, J. and Rockstr{\"o}m, J. and Salinas, C. and Samson, L.D. and Sandilya, K. and Sly, P.D. and Smith, K.R. and Steiner, A. and Stewart, R.B. and Suk, W.A. and van Schayck, O.C.P. and Yadama, G.N. and Yumkella, K. and Zhong, M.} } @conference {Hamlaoui2018180, title = {A MDE approach for heterogeneous models consistency}, booktitle = {ENASE 2018 - Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering}, volume = {2018-March}, year = {2018}, pages = {180-191}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051955560\&partnerID=40\&md5=e6d1a80051313eed4ea88ae038ac6010}, author = {Hamlaoui, M.E. and Bennani, S. and Nassar, M. and Ebersold, S. and Coulette, B.} } @conference {Kang2018338, title = {Mitigation of cyber warfare in space through reed solomon codes}, booktitle = {Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018}, volume = {2018-March}, year = {2018}, pages = {338-342}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051749454\&partnerID=40\&md5=5851d0b3ae972c35fd8ae206b957820d}, author = {Kang, M. and Hopkinson, K. and Betances, A. and Reith, M.} } @article {Kale201825, title = {Novel threshold formulation for energy detection method to efficient spectrum sensing in cognitive radio}, journal = {Advances in Intelligent Systems and Computing}, volume = {651}, year = {2018}, note = {cited By 0}, pages = {25-35}, abstract = {Cognitive radio (CR) is an upcoming technology in wireless communications. Available spectrum used by licensed user is called as primary user (PU). Unused licensed spectrum is called spectrum hole. CR i.e., unlicensed user is called as secondary user (SU). The important task to the CR is to efficiently use the available spectrum without disturbing PU. The success of CR depends on spectrum sensing efficiency. In energy detection method, we have compared the energy of the samples with threshold (denoted as λ). If the sample energy is greater than the threshold, we say the signal is present; otherwise, the signal is absent. This method does not require any prior information of the signal, so energy detection is a popular sensing method due to its simplicity. Through this paper, we would like to propose a novel threshold formulation for energy detection method to efficient spectrum sensing in cognitive radio. Proposed formulation avoids Q inverse function; also, this formulation is independent of number of samples. With rigorous analysis of the proposed formulation for different SNRs, it gives better results compared to other systems. {\textcopyright} 2018, Springer Nature Singapore Pte Ltd.}, doi = {10.1007/978-981-10-6614-6_3}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85031409782\&doi=10.1007\%2f978-981-10-6614-6_3\&partnerID=40\&md5=95f99171fea31131b236024675f2c5d8}, author = {Kale, R.S. and Wadhai, V.M. and Helonde, J.B.} } @article {Ouzineb201890, title = {Optimal planning of buffer sizes and inspection station positions}, journal = {Production and Manufacturing Research}, volume = {6}, number = {1}, year = {2018}, pages = {90-112}, doi = {10.1080/21693277.2017.1422812}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85041726865\&doi=10.1080\%2f21693277.2017.1422812\&partnerID=40\&md5=49f1f20a27abf3c2e90db1cffa1a2c3e}, author = {Ouzineb, M. and Mhada, F.Z. and Pellerin, R. and El Hallaoui, I.} } @article {Ouzineb201890, title = {Optimal planning of buffer sizes and inspection station positions}, journal = {Production and Manufacturing Research}, volume = {6}, number = {1}, year = {2018}, note = {cited By 0}, pages = {90-112}, abstract = {The problem of buffer sizing and inspection stations positioning in unreliable production lines is a complex mixed integer nonlinear optimization problem. In this problem, we have a production line with n machines and n fixed-size (storage) buffers in series. The machines produce parts that are either conforming or nonconforming, and the line includes inspection stations that reject the nonconforming pats. The goal is to find the optimal buffer sizes, the number and positions of the inspection stations, and satisfy the customer demand on conforming parts while minimizing the total cost. We present in this paper an exact method to solve this complex manufacturing problem. We also present new theoretical results on buffer-size bounds, stationarity, and cost function convexity permitting to significantly reduce the problem complexity. These theoretical and algorithmic developments allow solving to optimality instances with up to 30 machines tools developed previously cannot solve. {\textcopyright} 2018, $\#$x00A9; 2018 The Author(s). Published by Informa UK Limited, trading as Taylor \& Francis Group.}, doi = {10.1080/21693277.2017.1422812}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85041726865\&doi=10.1080\%2f21693277.2017.1422812\&partnerID=40\&md5=49f1f20a27abf3c2e90db1cffa1a2c3e}, author = {Ouzineb, M. and Mhada, F.Z. and Pellerin, R. and El Hallaoui, I.} } @conference {Kasmi20181, title = {Performance evaluation of StarPU schedulers with preconditioned conjugate gradient solver on heterogeneous (multi-CPUs/multi-GPUs) architecture}, booktitle = {Proceedings of 2017 International Conference of Cloud Computing Technologies and Applications, CloudTech 2017}, volume = {2018-January}, year = {2018}, pages = {1-6}, doi = {10.1109/CloudTech.2017.8284742}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046664197\&doi=10.1109\%2fCloudTech.2017.8284742\&partnerID=40\&md5=15d1bacdcdc6b413b42b5bc9c3059bfb}, author = {Kasmi, N. and Zbakh, M. and Samadi, Y. and Cherkaoui, R. and Haouari, A.} } @article {Haarhoff20181819, title = {Plant population and maize grain yield: A global systematic review of rainfed trials}, journal = {Crop Science}, volume = {58}, number = {5}, year = {2018}, pages = {1819-1829}, doi = {10.2135/cropsci2018.01.0003}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85052382932\&doi=10.2135\%2fcropsci2018.01.0003\&partnerID=40\&md5=ae7e4a2754ea799249ee90004df63de8}, author = {Haarhoff, S.J. and Swanepoel, P.A.} } @conference {Amraoui20181, title = {Reducing network topology over smart digital mobile environment using linear programming approach}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, pages = {1-8}, doi = {10.1145/3289100.3289101}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85058617163\&doi=10.1145\%2f3289100.3289101\&partnerID=40\&md5=2611403282d988e759c8721f91c739e5}, author = {Amraoui, H. and Habbani, A. and Hajami, A.} } @conference {Amraoui20181, title = {Security \& cooperation mechanisms over mobile ad hoc networks: A survey and challenges}, booktitle = {Proceedings of 2017 International Conference on Electrical and Information Technologies, ICEIT 2017}, volume = {2018-January}, year = {2018}, pages = {1-6}, doi = {10.1109/EITech.2017.8255313}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85047364198\&doi=10.1109\%2fEITech.2017.8255313\&partnerID=40\&md5=16f5590d7460c7a1606e951c65b604b4}, author = {Amraoui, H. and Habbani, A. and Hajami, A. and Bilal, E.} } @article {Niharmine20181174, title = {Simulated annealing decoder for linear block codes}, journal = {Journal of Computer Science}, volume = {14}, number = {8}, year = {2018}, pages = {1174-1189}, doi = {10.3844/jcssp.2018.1174.1189}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85052851664\&doi=10.3844\%2fjcssp.2018.1174.1189\&partnerID=40\&md5=fe2215ebe454f68d001cef85f5f26095}, author = {Niharmine, L. and Bouzkraoui, H. and Azouaoui, A. and Hadi, Y.} } @conference {ElHilali2018, title = {Smart companies: How to reach sustainability during a digital transformation}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3286606.3286812}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85059910187\&doi=10.1145\%2f3286606.3286812\&partnerID=40\&md5=ff10f75c6ceb0a068fd7069eec7d6a49}, author = {El Hilali, W. and El Manouar, A.} } @article {Bouzkraoui20183994, title = {Soft decision decoding of linear block codes using memetic algorithms}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {96}, number = {13}, year = {2018}, pages = {3994-4003}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050164403\&partnerID=40\&md5=a229b49e1f514877e8d3bf865c806ede}, author = {Bouzkraoui, H. and Azouaoui, A. and Hadi, Y. and Niharmine, L.} } @conference {ElHaddaoui2018, title = {Toward a sentiment analysis framework for social media}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3230905.3230919}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053484908\&doi=10.1145\%2f3230905.3230919\&partnerID=40\&md5=c602c6dc79537942d4d5ac0b9e4a0197}, author = {El Haddaoui, B. and Chiheb, R. and Faizi, R. and Afia, A.E.} } @conference {Haqiq2018264, title = {Towards integration of fault tolerance in agent-based systems}, booktitle = {Procedia Computer Science}, volume = {127}, year = {2018}, pages = {264-273}, doi = {10.1016/j.procs.2018.01.122}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85045687698\&doi=10.1016\%2fj.procs.2018.01.122\&partnerID=40\&md5=45d788bfaa02c77cfb9b21c35098cf5d}, author = {Haqiq, A. and Bounabat, B.} } @conference {Hdioud2018, title = {Trajectories modeling and clustering}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3230905.3230918}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053484322\&doi=10.1145\%2f3230905.3230918\&partnerID=40\&md5=1613a1dada41f3fc707505b5dd9dd690}, author = {Hdioud, B. and Tirari, M.E.H. and Thami, R.O.H.} } @conference {Saidi2018, title = {Translation of heterogeneous requirements meta-models through a pivot meta-model}, booktitle = {ENASE 2018 - Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering}, volume = {2018-January}, year = {2018}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85056807026\&partnerID=40\&md5=f8a470ca9cd9874928c91f4110c79259}, author = {Saidi, I.E. and El Hamlaoui, M. and Dkaki, T. and Zarour, N.E. and Charrel, P.-J.} } @conference {Guermah2018, title = {Using context ontology and linear SVM for chronic kidney disease prediction}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3230905.3230941}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053485109\&doi=10.1145\%2f3230905.3230941\&partnerID=40\&md5=41a05c4c09330c364082c52d6546e08f}, author = {Guermah, H. and Fissaa, T. and Guermah, B. and Hafiddi, H. and Nassar, M.} } @article {Hosni20185977, title = {On the value of parameter tuning in heterogeneous ensembles effort estimation}, journal = {Soft Computing}, volume = {22}, number = {18}, year = {2018}, pages = {5977-6010}, doi = {10.1007/s00500-017-2945-4}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85035807309\&doi=10.1007\%2fs00500-017-2945-4\&partnerID=40\&md5=83d094f56b80a21295cf4230621f445d}, author = {Hosni, M. and Idri, A. and Abran, A. and Nassif, A.B.} } @conference {Essaaidi2018, title = {Welcome message from the conference general co-chairs}, booktitle = {Proceedings of 2017 International Conference on Electrical and Information Technologies, ICEIT 2017}, volume = {2018-January}, year = {2018}, doi = {10.1109/EITech.2017.8255210}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85047374371\&doi=10.1109\%2fEITech.2017.8255210\&partnerID=40\&md5=8d383a8cbc804433c3beb1193f447dcf}, author = {Essaaidi, M. and El Hani, S.} } @article {ElHadj201786, title = {ABAC rule reduction via similarity computation}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {10299 LNCS}, year = {2017}, note = {cited By 0}, pages = {86-100}, abstract = {Attribute-based access control (ABAC) represents a generic model of access control that provides a high level of flexibility and promotes information and security sharing. Since ABAC considers a large set of attributes for access decisions, using it might get very complicated for large systems. Hence, it is interesting to offer techniques to reduce the number of rules in ABAC policies without affecting the final decision. In this paper, we present an approach based on K-nearest neighbors algorithms for clustering ABAC policies. To the best of our knowledge, it is the first approach that aims to reduce the number of policy rules based on similarity computations. Our evaluation results demonstrate the efficiency of the suggested approach. For instance, the reduction rate can reach up to 10\% for an ABAC policy with more than 9000 rules. {\textcopyright} Springer International Publishing AG 2017.}, doi = {10.1007/978-3-319-59647-1_7}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019735144\&doi=10.1007\%2f978-3-319-59647-1_7\&partnerID=40\&md5=948de8bee1016664b63163965c4e41fa}, author = {El Hadj, M.A. and Benkaouz, Y. and Freisleben, B. and Erradi, M.} } @conference {Er-Rady2017, title = {Automatic sign language recognition: A survey}, booktitle = {Proceedings - 3rd International Conference on Advanced Technologies for Signal and Image Processing, ATSIP 2017}, year = {2017}, note = {cited By 0}, abstract = {Sign Language, which is a fully visual language with its own grammar, differs largely from that of spoken languages [21]. After nearly 30 years of research, SL recognition still in its infancy when compared to Automatic Speech Recognition. When producing Sign language (SL), different body parts are involved. Most importantly the hands, but also facial expressions and body movements/postures. The recognition of SL is still one of the most challenging problems in gesture recognition. In this survey, we are going to discuss the advancement of sign language recognition through the last decade. In this paper, we provide a review of the state-of-the-art building blocks of Automatic Sign Language Recognition (ASLR) system, from feature extraction up to sign. {\textcopyright} 2017 IEEE.}, doi = {10.1109/ATSIP.2017.8075561}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85035355057\&doi=10.1109\%2fATSIP.2017.8075561\&partnerID=40\&md5=2dda585a2de8f963b1f1f0cc678e01d3}, author = {Er-Rady, A. and Faizi, R. and Thami, R.O.H. and Housni, H.} } @conference {ElHadj2017548, title = {Clustering-based approach for anomaly detection in XACML policies}, booktitle = {ICETE 2017 - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications}, volume = {4}, year = {2017}, note = {cited By 0}, pages = {548-553}, abstract = {The development of distributed applications arises multiple security issues such as access control. Attribute-Based Access Control has been proposed as a generic access control model, which provides more flexibility and promotes information and security sharing. eXtensible Access Control Markup Language (XACML) is the most convenient way to express ABAC policies. However, in distributed environments, XACML policies become more complex and hard to manage. In fact, an XACML policy in distributed applications may be aggregated from multiple parties and can be managed by more than one administrator. Therefore, it may contain several anomalies such as conflicts and redundancies, which may affect the performance of the policy execution. In this paper, we propose an anomaly detection method based on the decomposition of a policy into clusters before searching anomalies within each cluster. Our evaluation results demonstrate the efficiency of the suggested approach. Copyright {\textcopyright} 2017 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85029414026\&partnerID=40\&md5=133521fca6a95f8238cfc3b777dd3534}, author = {El Hadj, M.A. and Ayache, M. and Benkaouz, Y. and Khoumsi, A. and Erradi, M.} } @conference {Enaanai2017, title = {The collaborative relevance in the distributed information retrieval}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, year = {2017}, note = {cited By 0}, abstract = {Relevance is one of the most interesting topics in the information retrieval domain. In this paper, we introduce another method of relevance calculation. We propose to use the implicit opinion of users to calculate relevance. The Implicit judgment of users is injected to the documents by calculating different kinds of weighting. These latter touch several criteria like as user{\textquoteright}s weight in the query{\textquoteright}s words, user{\textquoteright}s profile, user{\textquoteright}s interest, document{\textquoteright}s content and the document popularity. In this method, each user is an active element of the system, he searches documents and he makes treatments to provide relevant information to other users in the Network. This is similar as the peer-to-peer systems; unlike that, an element (user) have to manage automatically his data by creating a short view model of his most visited documents, and calculates his relative relevance about each one. The relative relevance is variable according each user, so the final relevance is calculated by the averaging of the elementary relevance of all users. Hence, the name of collaborative relevance. {\textcopyright} 2016 IEEE.}, doi = {10.1109/AICCSA.2016.7945827}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85021875857\&doi=10.1109\%2fAICCSA.2016.7945827\&partnerID=40\&md5=24987a90a9345c06f11af61bc9d9e4c3}, author = {Enaanai, A. and Doukkali, A.S. and Saif, I. and Moutachaouik, H. and Hain, M.} } @conference {ElHaloui2017192, title = {A decision-support model enabling a proactive vision of Cloud Computing adoption}, booktitle = {Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016}, year = {2017}, note = {cited By 0}, pages = {192-198}, abstract = {Market competitiveness and technological evolution encourage companies to seek IT solutions enabling to save costs, increase productivity, and focus on high value-added activities. Outsourcing and cloud computing activities become increasingly adopted choices. That is why, decision makers need to look for decision support tools helping them for the adoption of new solutions and services such as Cloud Computing. This article presents a maturity assessment model of a functional block information system in order to outsource it to Cloud. Basing on the enterprise architecture point of view, best practices repositories, basic criteria of activities outsourcing, and the cloud computing adoption requirements, this model is built around four modules: the block scope identification, the outsourcing opportunity, the cloud computing architectural requirements, and governance and control. Thus, this model will provide new benefits for opened Enterprise Architectures to cloud computing. {\textcopyright} 2016 IEEE.}, doi = {10.1109/CloudTech.2016.7847698}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85013765957\&doi=10.1109\%2fCloudTech.2016.7847698\&partnerID=40\&md5=2afd11beb0ac88d120610b32d6878cb2}, author = {El Haloui, M. and Kriouile, A.} } @conference {Harbouche2017, title = {Dynamic coalitional matching game approach for fair and swift data-gathering in wireless body sensor networks}, booktitle = {Proceedings - 2017 International Conference on Wireless Networks and Mobile Communications, WINCOM 2017}, year = {2017}, note = {cited By 0}, abstract = {Wireless Sensor Networks are deployed in different fields of application to gather data on the monitored environment. The Wireless Body Sensor Network (WBSN) is a wireless sensor network designed to monitor a human body vital and environment parameters. The design and development of such WBSN systems for health monitoring have been motivated by costly healthcare and propelled by the development of miniature health monitoring devices. This paper presents the architecture design of a preventive health care monitoring system. This architecture is designed for monitoring multiple patients in a hospital. It is based on a set of mobile data collectors and static sensors for analysis of various patient{\textquoteright}s parameters. The data collectors need to cooperate together in order to gather the data from the sensor nodes. The point of this paper is how to dynamically and effectively appoint and deploy several data collectors in the hospital to gather the measured data in minimal time. We formulate the problem as a coalitional matching game between patients and data collectors, and we propose a patientdata collector association algorithm that ensures fairness and minimum total course in the stable matchings. {\textcopyright} 2017 IEEE.}, doi = {10.1109/WINCOM.2017.8238179}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85041451720\&doi=10.1109\%2fWINCOM.2017.8238179\&partnerID=40\&md5=44ef24b18e66b8fb24573d73db99025f}, author = {Harbouche, A. and Elmachkour, M. and Djedi, N. and Erradi, M. and Kobbane, A.} } @article {Sahnoun201722, title = {EEPR-OLSR: An energy efficient and path reliability protocol for proactive mobile Ad-hoc network routing}, journal = {International Journal of Communication Networks and Information Security}, volume = {9}, number = {1}, year = {2017}, note = {cited By 2}, pages = {22-29}, abstract = {Routing in Mobile Ad-hoc Networks has received a lot of attention due to the challenges posed by the self-organizing nature of the network, the dynamic topology, and the unreliable wireless medium. One of the most critical issues for MANETs is how to increase network lifetime, since nodes are typically battery powered. In this paper we consider the proactive MANET protocol OLSR to improve the network lifetime, we propose a novel multiple metric routing scheme for MANET, based on energy efficient and path reliability metrics, integrating it to standard OLSR, named Energy Efficient and Path Reliability OLSR (EEPR-OLSR), in which we investigate cross layer parameters that effect the network lifetime and a prediction-based link availability estimation is introduced. Simulation results, by NS3 simulator, show that the proposed EEPR-OLSR provides significant performance gains in both the network lifetime and packet delivery ration (PDR), compared to the standard OLSR.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85017133726\&partnerID=40\&md5=b9c4bae42e6e2af86bcd792df9345d07}, author = {Sahnoun, A. and Habbani, A. and El Abbadi, J.} } @article {Sahnoun2017399, title = {An energy-efficient proactive routing scheme for MANET: Game theoretical approach of forwarding with selfish nodes}, journal = {International Journal of Electronics and Telecommunications}, volume = {63}, number = {4}, year = {2017}, note = {cited By 0}, pages = {399-404}, abstract = {In Mobile Ad-hoc Networks, nodes exchange packets with each other using intermediate nodes as relays. Since nodes in MANETs are battery powered, energy conservation is a crucial issue. Accepting relay all request may not be in the best interest of a node. But if many nodes prefer not to consume energy in relaying packets on behalf of others, the overall performance of routing in network will be influenced. In this paper we address the energy-efficient routing problem in MANETs with selfish nodes. We modeled this problem as a game-theoretic constraint optimization; we defined the utility of each node as a weighted difference between a performance metric and some transmission costs. A motivate mechanism is proposed in order to induce nodes to forwarding cooperation. Each node independently implements the optimal equilibrium strategy under the given constraints. Simulation results by NS3 simulator show that our proposed approach can improve system performance in network lifetime and packet delivery ratio. {\textcopyright} 2017 De Gruyter Open Ltd. All rights reserved.}, doi = {10.1515/eletel-2017-0055}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85042877707\&doi=10.1515\%2feletel-2017-0055\&partnerID=40\&md5=62e06e5bfb6b7ad51299584d89bc9a68}, author = {Sahnoun, A. and Habbani, A. and El Abbadi, J.} } @conference {ElBassiti20171097, title = {Generic innovation designing -GenID- Framework: Towards a more systematic approach to innovation management}, booktitle = {Proceedings of the European Conference on Knowledge Management, ECKM}, volume = {2}, year = {2017}, note = {cited By 0}, pages = {1097-1106}, abstract = {To achieve sustainable success in the global market, modern organizations need to be flexible and fast in their reaction to change, which depends on their ability to innovate, not just occasionally but systematically. Despite countless efforts and spending, many organizations feel they are not making the most of their innovation potential and resources and don{\textquoteright}t generate desirable profit. This problem does not lie in a lack of ideas, but more in a structured approach to innovation. Believing that most pressing problems organizations face today are characterized by unprecedented levels of complexity and interdependence leads to breakdown the conventional problem-solving paradigm. However, a structured approach to innovation management could be criticized as it may lead to rigidity and hamper creativity. Thus, there is a need to allow a trade-off between granting conditions for creativity, so new ideas can flourish, and at the same time keeping a systematic approach to smooth social cohesion, facilitate the pool of resources and promote the creation of a collaborative community. From the exploration of the distinguishing characteristics of the new economy and the new millenary, this paper provides the foundation of a systematic framework to innovation management. Based on the complexity and structuration theories, the concept "Innovation" has been formalized in two generic models: (1) Innovation Activities Model providing an integrated view of interactions involved within an innovation context, (2) Innovation Lifecycle Model portraying the major milestones over an innovation journey. These constructs has been assessed through an online survey designed to gather qualitative data. {\textcopyright} The Authors, 2017.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85035206916\&partnerID=40\&md5=2b32e9c5fe0b744d39d7f634493360b5}, author = {El Bassiti, L. and El Haiba, M. and Ajhoun, R.} } @article {Haoues2017886, title = {A guideline for software architecture selection based on ISO 25010 quality related characteristics}, journal = {International Journal of Systems Assurance Engineering and Management}, volume = {8}, year = {2017}, note = {cited By 0}, pages = {886-909}, abstract = {As the complexity of software increases, the choice of the appropriate software architecture becomes a critical task. This paper provides a guideline for selecting the appropriate software architecture based on pertinent ISO 25010 quality characteristics. The guideline was established through an analytical survey of 113 papers published from 2010 to 2014. Through this survey, we first identified a set of commonly used software architectures in the software engineering literature. Secondly, we applied the Formal Concept Analysis technique to classify each one of these architectures according to ISO 25010 quality characteristics. Finally, we identified the relationships among ISO 25010 quality characteristics, which in turn helped us to develop a guideline on how to select the appropriate software architecture with respect to ISO 25010 quality characteristics. In order to make sure about the validation of the proposed guideline, a survey with industrial experts is in progress. Data were collected from two companies working in the software development field (ST2i and Telnet). {\textcopyright} 2016, The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden.}, doi = {10.1007/s13198-016-0546-8}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85034990679\&doi=10.1007\%2fs13198-016-0546-8\&partnerID=40\&md5=180857479792ea94cf87783efc8285da}, author = {Haoues, M. and Sellami, A. and Ben-Abdallah, H. and Cheikhi, L.} } @conference {Hosni2017174, title = {Heterogeneous Ensembles for Software Development Effort Estimation}, booktitle = {Proceedings - 2016 3rd International Conference on Soft Computing and Machine Intelligence, ISCMI 2016}, year = {2017}, note = {cited By 0}, pages = {174-178}, abstract = {Software effort estimation influences almost all the process of software development such as: bidding, planning, and budgeting. Hence, delivering an accurate estimation in early stages of the software life cycle may be the key of success of any project. To this aim, many solo techniques have been proposed to predict the effort required to develop a software system. Nevertheless, none of them proved to be suitable in all circumstances. Recently, Ensemble Effort Estimation has been investigated to estimate software effort and consists on generating the software effort by combining more than one solo estimation technique by means of a combination rule. In this study, a heterogeneous EEE based on four machine learning techniques was investigated using three linear rules and two well-known datasets. The results of this study suggest that the proposed heterogeneous EEE yields a very promising performance and there is no best combiner rule that can be recommended. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ISCMI.2016.15}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85034656098\&doi=10.1109\%2fISCMI.2016.15\&partnerID=40\&md5=86bd61c4459af4a3491046df1925ab2c}, author = {Hosni, M. and Idri, A. and Nassif, A.B. and Abran, A.} } @conference {Haddad2017484, title = {A high gain Novel Dielectric Resonator Antenna (NDRA) for anti-collision short range radar (SRR) application}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2017}, note = {cited By 0}, pages = {484-486}, abstract = {This paper presents the design of Novel Dielectric Resonator Antenna (NDRA) feed by a micro-strip line for anti-collision radar SRR application at 24 GHz. The proposed NDRA operates at a frequency of 24 GHz with a dielectric constant of 18. The simulated NDRA has a high gain (12.24 dB) and a high radiation efficiency (94 \%). The return loss, radiation pattern and gain of the proposed antenna are evaluated. The simulation process was carried out using Computer Simulation Technology (CST) Microwave Studio. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ICMCS.2016.7905582}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019154107\&doi=10.1109\%2fICMCS.2016.7905582\&partnerID=40\&md5=5e26a28411e91981e44e0fd02ad0dda4}, author = {Haddad, A. and Aoutoul, M. and Rais, K. and Essaaidi, M.} } @conference {YoussfiAlaoui2017, title = {Human fall detection using von mises distribution and motion vectors of interest points}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F129474}, year = {2017}, note = {cited By 0}, abstract = {In the field of public health care, fall detection is one of the major problem, especially for elderly persons. For that, an effective surveillance system is a necessity to reduce injuries caused by falls. Our article presents a new method to detect falls. In fact, we used optical flow to calculate motion vectors and statistical distribution named von Mises. {\textcopyright} 2017 Association for computing machinery.}, doi = {10.1145/3090354.3090438}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028462198\&doi=10.1145\%2f3090354.3090438\&partnerID=40\&md5=f0c8dbfd8b6a8894a4a085817ad5ebe6}, author = {Youssfi Alaoui, A. and El Hassouny, A. and Oulad Haj Thami, R. and Tairi, H.} } @conference {Hamada20172084, title = {A hybrid approach for a strategic planning problem represented by a three-echelon logistics network}, booktitle = {Proceedings of the International Conference on Industrial Engineering and Operations Management}, year = {2017}, note = {cited By 0}, pages = {2084-2085}, abstract = {This article aims to elaborate a strategic plan allowing to decision makers to take right decisions (Selecting suppliers, Selecting plants that can produce a specific product,..) in the right moment in order to minimize the generated costs It is in this context that our work is being taken. The objective is to model and solve a strategic planning problem at three levels which are: supplier-plant, plant-plant and plant-customer. The costs taken into effect in this model are: the supply costs, production costs and transport costs. The problem belongs to the CFLP Family (Capacitated Facility Location Problem) with a NPhard complexity. The objective of our MIP problem is to maximize a production company benefits through minimizing costs mentioned above. Given the limitations of exact methods and the optimum local problem when we used a heuristic method like a LNS (Large Neighborhood Search), we proposed to solve this problem using hybridization between two heuristics: LNS \& Genetic Algorithm This hybridization will give us more opportunities to find better solution when a local optimum is reached. {\textcopyright} IEOM Society International.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85018996488\&partnerID=40\&md5=986399337bcb183f863d9133bfa92170}, author = {Hamada, Y. and Benadada, Y. and Gendron, B.} } @conference {Hamlili2017201, title = {Intelligibility of Erd{\"o}s-R{\'e}nyi random graphs and time varying social network modeling}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F130526}, year = {2017}, note = {cited By 0}, pages = {201-206}, abstract = {The concept of social networks has been widely studied for different classic (socio-economic problems, trade networks, etc) and contemporary (World Wide Web, cell phone networks, smart city networks, IoT, etc.) settings. People, organizations, intelligent vehicles, mobile robots, wearable and embedded devices, all can be connected by means of appropriate information and communication technologies. In recent years, the area of social networks became very popular mainly through the development of social media and Internet social websites such as Facebook, Twitter, LinkedIn, ResearchGate, and many others. Graph theory offers suitable mathematical representations for social networking models. We describe in this paper some enumerative, stochastic and statistical tools allowing the analysis of time-varying social networks. Indeed, the study of social networks through the theory of random graphs and dynamic network analysis has enabled us to develop probabilistic and statistical approaches to calculate some indices and measures that characterize the dynamic behavior of such the networks through time. {\textcopyright} 2017 Association for Computing Machinery.}, doi = {10.1145/3128128.3128159}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85030308815\&doi=10.1145\%2f3128128.3128159\&partnerID=40\&md5=4b7daac8f2e70082e4a3121413de54c2}, author = {Hamlili, A.} } @conference {Azougaghe2017, title = {Many-to-one matching game towards secure virtual machines migration in cloud computing}, booktitle = {2016 International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 - Proceedings}, year = {2017}, note = {cited By 0}, abstract = {Virtual machine migration represents a new topic of research last years. In this context, we present a new system based on matching game theory to design efficient and practical migration algorithms that work well with huge numbers of VMs and servers. This strategy solves VM migration, resources managements and load balancing problems in cloud computing environment. The experimental results show that our algorithm not only obtains multi-resource load balancing performance but also improves the cloud security services and gets a gain of resources consummation on all servers. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ACOSIS.2016.7843922}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85015191060\&doi=10.1109\%2fACOSIS.2016.7843922\&partnerID=40\&md5=6b59b3295f8598830c0771717fb9a86b}, author = {Azougaghe, A. and Oualhaj, O.A. and Hedabou, M. and Belkasmi, M. and Kobbane, A.} } @conference {Amraoui2017278, title = {Mobility quantification for MultiPoint Relays selection algorithm in Mobile Ad hoc Networks}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2017}, note = {cited By 0}, pages = {278-283}, abstract = {In Mobile Ad hoc Networks (MANETs), with Optimized Link State Routing Protocol (OLSR) the mobility concept is an essential element which can result in the evolution of network performances. In this paper, the main objective is to develop an algorithm to improve the MultiPoint Relay (MPR) selection process in such networks. This algorithm is based on the Mobility Rate (MR) which in turn is relied on the relative velocity of nodes. Additionally, in this algorithm, each node keeps a mobility rate record of other nodes. Moreover, this mobility value will be exchanged between nodes using OLSR messages (HELLO and Topology control (TC)). Furthermore, this value will be used as a criterion when a node chooses their MPR set. In addition, the simulation results using Network Simulator 3 (NS3) have shown that the mobility concept could improve network performances in terms of the throughput, packet received, packet loss, packet delivery ratio and packet forwarded. Moreover, and through this paper the proposed algorithm can be used as a functional mobility mechanism to improve network performances in MANETs. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ICMCS.2016.7905672}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019077851\&doi=10.1109\%2fICMCS.2016.7905672\&partnerID=40\&md5=72838ebe1c1b4730920daf92d4fc133c}, author = {Amraoui, H. and Habbani, A. and Hajami, A.} } @article {Harbouche20171339, title = {Model driven flexible design of a wireless body sensor network for health monitoring}, journal = {Computer Networks}, volume = {129}, year = {2017}, note = {cited By 1}, pages = {1339-1351}, abstract = {The Wireless Body Sensor Network (WBSN) is a wireless network that is designed to allow communication among sensor nodes that are attached to a human body to monitor the body{\textquoteright}s vital parameters and environment. The design and development of such WBSN systems for health monitoring have received a large amount of attention recently, in research studies and in industry. This attention is mainly motivated by costly health care and by recent advances in the development of miniature health monitoring devices as well as emerging technologies, such as the Internet of Things (IoT), which contribute to the main challenges of 5G. The existence of an explicit approach to address the required software design and verification should be very beneficial for the construction and maintenance of such systems. This paper presents a preventive health care system that has a flexible design. The proposed system is based on an architecture that has heterogeneous nodes and provides both daily continuous monitoring as well as specific controls. We defined a model to describe the WBSN{\textquoteright}s global behavior. An important aspect of this work is that we propose a model-driven engineering (MDE) approach to address the derivation of each node{\textquoteright}s behavior in the WBSN from the WBSN global behavior. This approach allows developers to obtain a system design from the global specification of its requirement. To ensure the conformance of this design to its specification, the derived behaviors should be validated and verified before their deployment. In fact, formal methods are powerful tools for software engineers to verify the logical correctness of concurrent software at different levels of its life cycle. Model checking is one of the most powerful formal methods for verifying the logical correctness of such concurrent systems. In this work, we make use of a model checking approach that is based on a model transformation to validate the automatically derived behavior of a WBSN for health monitoring. This model-driven approach will check whether the derived system behaves correctly according to its global specification, while the objective is to increase the system{\textquoteright}s performance and QoS. This approach allows the developer to reason about a model of the global system rather than about the system itself. {\textcopyright} 2017 Elsevier B.V.}, doi = {10.1016/j.comnet.2017.06.014}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85022027303\&doi=10.1016\%2fj.comnet.2017.06.014\&partnerID=40\&md5=3d665e7ff240e8a6d9564857abf695da}, author = {Harbouche, A. and Djedi, N. and Erradi, M. and Ben-Othman, J. and Kobbane, A.} } @conference {ElMejjatti201764, title = {Moisture vulnerability of antenna operation in UHF band}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F130526}, year = {2017}, note = {cited By 0}, pages = {64-68}, abstract = {Behavior of the propagation medium in reaction with electromagnetic fields is described by its dielectric permittivity; this electric property is a function of the physical characteristics of the medium and those of the propagating wave. Among the parameters, which considerably affect the dielectric permittivity of a medium, its water content. In fact, when the snow wetness varies from 0 to 50\% in the melting layer, real part of the mixture permittivity varies from 1.47 to 5.86. Similarly, when soil moisture varies from 0 to 40\% real and imaginary parts of effective permittivity of soil, air and water mixture vary from 4.13 to 24.85 and from 0 to 3.44 respectively. This dynamism in the permittivity as a function of the humidity is able to alter the efficiency of the antenna within the application. In this paper, we propose a study to analyze the impact of wetness on the performance of a dipole antenna with central frequency of 900 MHz. The study was carried out by simulating the behavior of the dipole antenna model in Finite Element Method (FEM) full wave simulator with different values of the water content of two propagation mediums: melting layer and soil. Simulation results concerning the resonant frequency, bandwidth, directivity are presented through paragraphs of the paper. {\textcopyright} 2017 Association for Computing Machinery.}, doi = {10.1145/3128128.3128138}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85030317231\&doi=10.1145\%2f3128128.3128138\&partnerID=40\&md5=e989fe7cf53281bbd496b02834b4ced0}, author = {El Mejjatti, M. and Habbani, A. and Essaid, B. and Amraoui, H.} } @conference {Benjbara201714, title = {Multi-path routing protocol in the Smart Digital Environment}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F130526}, year = {2017}, note = {cited By 0}, pages = {14-18}, abstract = {During the last decade, the smart digital environment has become one of the most scientific challenges that occupy scientists and researchers. This new environment consists basically of smart connected products including three main parts: the physical mechanical/electrical product, the smart part of the product made from embedded software and human machine interface, and finally the connectivity part including antennas and routing protocols insuring the wired/wireless communication with other products, from our side, we are involved in the implementation of the latter part by developing a routing protocol that will meet the increasingly demanding requirements of today{\textquoteright}s systems (security, bandwidth, network lifetime, ...). Based on the researches carried out in other fields of application such as MANETS, multi-path routing fulfills our expectations. In this article, the MPOLSR protocol was chosen as an example, comparing its standard version and its improvements in order to choose the best solution that can be applied in the smart digital environment. {\textcopyright} 2017 Association for Computing Machinery.}, doi = {10.1145/3128128.31281311}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85030312348\&doi=10.1145\%2f3128128.31281311\&partnerID=40\&md5=b5569466aa21263fd475715c608fad74}, author = {Benjbara, C. and Habbani, A. and El Mahdi, F. and Essaid, B.} } @conference {Souidi20178, title = {Node localization to optimize the MPR selection in smart mobile communication}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F130526}, year = {2017}, note = {cited By 0}, pages = {8-13}, abstract = {Nowadays, we are converging more and more towards smart environments like smart cars, drones, unmanned airplanes, internet of things and connected homes... These new gadgets are in need to communicate and interact with each other for their proper functioning. Due to their easy implementation, the mobile ad hoc networks constitute the fastest and the most efficient way to establish connection in smart environments. However, in proactive ad hoc routing protocol, like the Optimized Link State Routing, maintaining the topology increases the overhead and consumes a considerable energy power. In smart environments, some terminals are battery powered. Designing efficient communication protocols is crucial to decrease the interferences, to enhance the performance of the network and to reduce the consumption of energy. In this paper, we use the node localization in the context of OLSR to select dispersive Multi-Point Relays responsible of broadcasting the topology into the entire network. We divide the environment into several virtual zones. Then we try to elect forwarders at different partitions to cover the maximum surface area in order to reach the greater number of devices. The simulations show that our proposal reduces at certain extent, the amount of traffic overhead, improves the network capacity and lets more bandwidth for the smart environment{\textquoteright}s applications. {\textcopyright} 2017 Association for Computing Machinery.}, doi = {10.1145/3128128.3128130}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85030308988\&doi=10.1145\%2f3128128.3128130\&partnerID=40\&md5=36496d536836e72b4534a55afef580a7}, author = {Souidi, M. and Habbani, A. and Berradi, H. and Essaid, B.} } @conference {Koulou2017665, title = {A novel approach IMA of interoperability measurement}, booktitle = {Colloquium in Information Science and Technology, CIST}, year = {2017}, note = {cited By 0}, pages = {665-669}, abstract = {Developing inter organizational collaboration implies that the degree of interoperability is periodically evaluated and improved. This paper aims initially at presenting the basic concepts relating to the measurement of interoperability degree. In a second stage, it proposes a novel approach for interoperability assessment. This approach takes into account all the significant aspects such potentiality, compatibility and operational performance. {\textcopyright} 2016 IEEE.}, doi = {10.1109/CIST.2016.7804969}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85010192497\&doi=10.1109\%2fCIST.2016.7804969\&partnerID=40\&md5=63cac73dbc8956031f87a0fdc4d25f97}, author = {Koulou, A.a and El Hami, N.a and Hmina, N.a and Elmir, A.b and Bounabat, B.b} } @conference {Koulou2017665, title = {A novel approach IMA of interoperability measurement}, booktitle = {Colloquium in Information Science and Technology, CIST}, year = {2017}, note = {cited By 0}, pages = {665-669}, abstract = {Developing inter organizational collaboration implies that the degree of interoperability is periodically evaluated and improved. This paper aims initially at presenting the basic concepts relating to the measurement of interoperability degree. In a second stage, it proposes a novel approach for interoperability assessment. This approach takes into account all the significant aspects such potentiality, compatibility and operational performance. {\textcopyright} 2016 IEEE.}, doi = {10.1109/CIST.2016.7804969}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85010192497\&doi=10.1109\%2fCIST.2016.7804969\&partnerID=40\&md5=63cac73dbc8956031f87a0fdc4d25f97}, author = {Koulou, A. and El Hami, N. and Hmina, N. and Elmir, A. and Bounabat, B.} } @article {Aoutoul2017125, title = {A novel interconnection technique using zero-degree phase shifting microstrip TL for RF QFN package at S-band}, journal = {Progress in Electromagnetics Research Letters}, volume = {67}, year = {2017}, note = {cited By 0}, pages = {125-130}, abstract = {In this paper, we propose a novel interconnection technique for a flip-chip quad flat no-lead (FC QFN) package which can decrease the amount of the transmission line (TL) phase shift. The RF die inputs and outputs (I/O) are connected to the package lead fingers by a small size, 1000 {\textmu}m length, microstrip line having a gap capacitor consisting of staked plates (fingers) where the space in between is filled by a ceramic material of 10.2 dielectric constant value. This technique can reduce the effect of transmission line inductance and makes the novel package interconnection behaving as a composite left right handed (CLRH) TL; hence, one can set the TL phase shift to zero degree at the desired operating frequency band (i.e., S-band) by just tuning geometrical and/or physical interconnection structure parameters. {\textcopyright} 2017, Electromagnetics Academy. All rights reserved.}, doi = {10.2528/PIERL17031301}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019546909\&doi=10.2528\%2fPIERL17031301\&partnerID=40\&md5=4be55e2571c969bc93a364b5554f37fc}, author = {Aoutoul, M. and Haddad, A. and Essaaidi, M. and Faqir, M.} } @conference {Sahnoun2017726, title = {Path reliability metric for proactive MANET routing}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2017}, note = {cited By 0}, pages = {726-730}, abstract = {One critical issue for routing in Mobile Ad-hoc Networks (MANET) is how to select reliable paths that can last as long as possible, The reliability of a path depends on the number of links and the reliability of each link constituting the path. In this paper we developed efficient routing metric prediction methods by predicting link stability using a probabilistic computation based on the normal-like distributions of the link lifetimes in typical MANET mobility scenarios, integrating it to proactive MANET routing OLSR, named Path Reliability OLSR (PR-OLSR). We show by simulation that PR-OLSR is more adaptive to the network dynamics and therefore is able to improve performance significantly on packet delivery ratio and prolonged network energy lifetime. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ICMCS.2016.7905622}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019101373\&doi=10.1109\%2fICMCS.2016.7905622\&partnerID=40\&md5=e6eeb0abb95c8eee7c04dea7ae26a2ac}, author = {Sahnoun, A. and El Abbadi, J. and Habbani, A.} } @conference {Hajji2017, title = {Performance analysis of mixed Weibull and Gamma-Gamma dual-hop RF/FSO transmission systems}, booktitle = {Proceedings - 2017 International Conference on Wireless Networks and Mobile Communications, WINCOM 2017}, year = {2017}, note = {cited By 0}, abstract = {In this paper, we study the performance of a dualhop amplify-and-forward (AF) communication system over asymmetric links composed of Radio-Frequency (RF) and Free-Space- Optical (FSO) links in the presence of atmospheric turbulence as well as pointing error impairments under both heterodyne detection and intensity modulation with direct detection (IM/DD) techniques. The RF link is assumed to operate under Weibull fading, while the FSO channel undergoes Gamma-Gamma (GG) fading. Using a Channel-State-Information (CSI)-assisted relaying, we derive closed-form expressions for the cumulative distribution function (CDF) and the probability density function (PDF) of the end-to-end signal-to-noise ratio (SNR) for the considered system in terms of the Meijer G-function. Based on these results, a novel closed-form expression of the average symbol error rate (ASER) in terms of the bivariate Fox Hfunction is derived. Finally, numerical results are presented to validate the analytical expressions. {\textcopyright} 2017 IEEE.}, doi = {10.1109/WINCOM.2017.8238201}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85041443126\&doi=10.1109\%2fWINCOM.2017.8238201\&partnerID=40\&md5=7dcd13992ed3c88bd3b52b45e5c9ee66}, author = {Hajji, M. and El Bouanani, F.} } @conference {Ouhbi2017557, title = {Requirements for a mobile personal health record to improve cardiovascular healthcare services}, booktitle = {Proceedings of the ACM Symposium on Applied Computing}, volume = {Part F128005}, year = {2017}, note = {cited By 1}, pages = {557-562}, abstract = {Analyzing health records of patients suffering from chronic diseases such as cardiovascular disease can help understanding their conditions and therefore improving healthcare services offered to them. To improve the cardiology healthcare quality and efficiency in the Autonomic Nervous System centre in Avicenne Hospital in Rabat in Morocco, a mobile personal health record (mPHR) along with an electronic health record have been developed. This paper presents our mPHR{\textquoteright}s functional requirements used in the product development. It also presents some aspects of quality evaluation of the mPHR. An experiment has been conducted to assess and improve the mPHR{\textquoteright}s quality using the ISO/IEC 25010 standard. Copyright 2017 ACM.}, doi = {10.1145/3019612.3019725}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85020871426\&doi=10.1145\%2f3019612.3019725\&partnerID=40\&md5=6cf797c1b1a37c7309de64935405f2e8}, author = {Ouhbi, S. and Idri, A. and Hakmi, R. and Benjelloun, H. and Fernandez-Aleman, J.L. and Toval, A.} } @article {Hayat2017, title = {A signaling game-based approach for Data-as-a-Service provisioning in IoT-Cloud}, journal = {Future Generation Computer Systems}, year = {2017}, note = {cited By 0; Article in Press}, abstract = {The impressive progress in sensing technology over the last few years has contributed to the proliferation and popularity of the Internet of Things (IoT) paradigm and to the adoption of Sensor Clouds for provisioning smart ubiquitous services. Also, the massive amount of data generated by sensors and smart objects led to a new kind of services known as Data-as-a-Service (DaaS). The quality of these services is highly dependent on the quality of sensed data (QoD), which is characterized by a number of quality attributes. DaaS provisioning is typically governed by a Service Level Agreement (SLA) between data consumers and DaaS providers. In this work, we propose a game-based approach for DaaS Provisioning, which relies on signaling based model for the negotiation of several QoD attributes between DaaS providers and data consumers. We consider that these entities are adaptive, rational, and able to negotiate the QoD offering even in the case of incomplete information about the other party. We use in the negotiation between the two parties a Q-learning algorithm for the signaling model and a Multi Attributes Decision Making (MADM) model to select the best signal. Moreover, we empirically validate the MADM model using Shannon{\textquoteright}s entropy. The results obtained in the case of a multi-stages negotiation scenario show the convergence towards the pooling equilibrium. {\textcopyright} 2017.}, doi = {10.1016/j.future.2017.10.001}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85034971596\&doi=10.1016\%2fj.future.2017.10.001\&partnerID=40\&md5=da16debd38f36b3509fc36e9edb8e561}, author = {Hayat, R. and Sabir, E. and Badidi, E. and Elkoutbi, M.} } @conference {Hosni20171251, title = {Software effort estimation using classical analogy ensembles based on random subspace}, booktitle = {Proceedings of the ACM Symposium on Applied Computing}, volume = {Part F128005}, year = {2017}, note = {cited By 1}, pages = {1251-1258}, abstract = {Software effort estimation is one of the important and complex tasks in software project management. It influences almost all the process of software development such as: bidding, planning, and budgeting. Hence, estimating the software project effort in early stages of the software life cycle is considered the key of success of any project. To this goal, many techniques have been proposed to predict the effort required to develop a software system. Unfortunately, there is no consensus about the single best technique. Recently, Ensemble Effort Estimation has been investigated to estimate software effort and consists on generating the software effort by combining more than one solo estimation technique by means of a combination rule. In this paper, we have developed different homogeneous ensembles based on combination of Random Subspace method and Classical Analogy technique using two linear rules over seven datasets. The results confirm that the Random Space ensembles outperform the solo Classical Analogy regardless of the dataset used and that the median rule generates better estimation than the average one. {\textcopyright} 2017 ACM.}, doi = {10.1145/3019612.3019784}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85020917571\&doi=10.1145\%2f3019612.3019784\&partnerID=40\&md5=8b1b6f9ac3cb26187929f17a78dd5669}, author = {Hosni, M. and Idri, A.} } @conference {Harraz2017230, title = {Study of an adaptive approach for a Cloud system implementation}, booktitle = {Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016}, year = {2017}, note = {cited By 0}, pages = {230-236}, abstract = {In the few recent years a new paradigm has emerged, with the onward steps that revolutionized the internet and the machines interconnected over it. This has lead the modern technological world to be considered as a virtual sphere interconnecting things using internet, being called the Cloud Computing where any object can communicate with any other object using a network such as the internet. The Cloud Computing makes it possible for end users to profit from the high speed and high performance of remote machines, and deploys a business where internet providers can implement distributed resources and services based on modern technologies to address the needs of the end users. In such paradigm, all components should work in a fashion to provide the best response time possible, one way of doing that is through load balancing algorithms. In this paper we propose a cloud load balancing algorithm that relates to the stochastic and random behavior of any networking system, we show as a result that we can achieve a game theoretic load balancing policy based on the samples of the load in time. {\textcopyright} 2016 IEEE.}, doi = {10.1109/CloudTech.2016.7847704}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85013764269\&doi=10.1109\%2fCloudTech.2016.7847704\&partnerID=40\&md5=34d05b50f0f8af7eb7ee1964533a0ebd}, author = {Harraz, A. and Bissiriou, C. and Cherkaoui, R. and Zbakh, M.} } @conference {ElMahdi2017220, title = {Study of security in MANETs and evaluation of network performance using ETX metric}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F130526}, year = {2017}, note = {cited By 0}, pages = {220-228}, abstract = {Today, we witness the emergence of smart environments, where devices are able to connect independently without human-intervention. Mobile ad hoc networks are an example of smart environments that are widely deployed in public spaces. They offer great services and features compared with wired systems. However, these networks are more sensitive to malicious attacks because of the lack of infrastructure and the self-organizing nature of devices. Thus, communication between nodes is much more exposed to various security risks, than other networks. In this paper, we will present a synthetic study on security concept for MANETs, and then we will introduce a contribution based on evaluating link quality, using ETX metric, to enhance network availability. {\textcopyright} 2017 Association for Computing Machinery.}, doi = {10.1145/3128128.3128162}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85030328629\&doi=10.1145\%2f3128128.3128162\&partnerID=40\&md5=07c3afc88f0628598193c141135dba27}, author = {El Mahdi, F. and Habbani, A. and Mouchfiq, N. and Essaid, B.} } @conference {Bernatchou2017177, title = {Towards a simulation model of an outpatient chemotherapy unit}, booktitle = {2017 International Colloquium on Logistics and Supply Chain Management: Competitiveness and Innovation in Automobile and Aeronautics Industries, LOGISTIQUA 2017}, year = {2017}, note = {cited By 0}, pages = {177-182}, abstract = {This paper presents a case study of a cancer center. A discrete event simulation model with ARENA software was developed to model and analyze the patient flow and evaluate performance through the outpatient chemotherapy unit. Simulation results determine where over-utilization of resources and long waiting times of patient per process. {\textcopyright} 2017 IEEE.}, doi = {10.1109/LOGISTIQUA.2017.7962894}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85026682297\&doi=10.1109\%2fLOGISTIQUA.2017.7962894\&partnerID=40\&md5=a537f15fa482d1d24fe1c3a65dcc4707}, author = {Bernatchou, M. and Ouzayd, F. and Bellabdaoui, A. and Hamdaoui, M.} } @conference {Haqiq201742, title = {Using BECAMEDA method to specify and verify a smart home system}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F130526}, year = {2017}, note = {cited By 0}, pages = {42-47}, abstract = {Designing a correct model for smart systems requires an accurate specification and verification prior to development. This paper proposes the use of BECAMEDA (Behavioral SpEcification and VerifiCAtion of RMAS based on E-MDRA) method, which helps the designer predicting the system behaviour, and verifying the relevant behaviour of the system properties. BECAMEDA method is based on Multi-Agent concept and formal method, and it proposes an iterative process consisted of four phases: identification, definition, modelling and verification, to help understanding the system starting from goals identification that captures the system needs, and ending with a formal verification of the system properties. The proposed method is illustrated with an example of a Smart Home System1. {\textcopyright} 2017 Copyright is held by the owner/author(s).}, doi = {10.1145/3128128.3128135}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85030309106\&doi=10.1145\%2f3128128.3128135\&partnerID=40\&md5=41be1e2c80793b0eb4a66d538b1df778}, author = {Haqiq, A. and Bounabat, B.} } @article {Hosni20171, title = {On the value of parameter tuning in heterogeneous ensembles effort estimation}, journal = {Soft Computing}, year = {2017}, note = {cited By 0; Article in Press}, pages = {1-34}, abstract = {Accurate estimation of software development effort estimation (SDEE) is fundamental for efficient management of software development projects as it assists software managers to efficiently manage their human resources. Over the last four decades, while software engineering researchers have used several effort estimation techniques, including those based on statistical and machine learning methods, no consensus has been reached on the technique that can perform best in all circumstances. To tackle this challenge, Ensemble Effort Estimation, which predicts software development effort by combining more than one solo estimation technique, has recently been investigated. In this paper, heterogeneous ensembles based on four well-known machine learning techniques (K-nearest neighbor, support vector regression, multilayer perceptron and decision trees) were developed and evaluated by investigating the impact of parameter values of the ensemble members on estimation accuracy. In particular, this paper evaluates whether setting ensemble parameters using two optimization techniques (e.g., grid search optimization and particle swarm) permits more accurate estimates of SDEE. The heterogeneous ensembles of this study were built using three combination rules (mean, median and inverse ranked weighted mean) over seven datasets. The results obtained suggest that: (1) Optimized single techniques using grid search or particle swarm optimization provide more accurate estimation; (2) in general ensembles achieve higher accuracy than their single techniques whatever the optimization technique used, even though ensembles do not dominate over all single techniques; (3) heterogeneous ensembles based on optimized single techniques provide more accurate estimation; and (4) generally, particle swarm optimization and grid search techniques generate ensembles with the same predictive capability. {\textcopyright} 2017 Springer-Verlag GmbH Germany, part of Springer Nature}, doi = {10.1007/s00500-017-2945-4}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85035807309\&doi=10.1007\%2fs00500-017-2945-4\&partnerID=40\&md5=83d094f56b80a21295cf4230621f445d}, author = {Hosni, M. and Idri, A. and Abran, A. and Nassif, A.B.} } @conference {ElHamlaoui201618, title = {Alignment of viewpoint heterogeneous design models: "Emergency Department" Case Study}, booktitle = {CEUR Workshop Proceedings}, volume = {1731}, year = {2016}, note = {cited By 0}, pages = {18-27}, abstract = {Generally, various models can be used to describe a given application domain on different aspects and thus give rise to several views. To have a complete view of the application domain, heterogeneous models need to be unified, which is a hard task to do. To tackle this problem, we have proposed a method to relate partial models without combining them in a single model. In our approach, partial models are organized as a network of models through a virtual global model called M1C (Model of correspondences between models) which conforms to a ubiquitous language based on a Meta-Model of Correspondences (MMC). This paper presents an application of our method to an "Emergency Department" case study. It has been performed as a collaborative process involving model designers and a supervisor. The focus is put on the building of the M1C model from 3 partial models.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84999098977\&partnerID=40\&md5=f0512c94d99ecc99fcd8fc9336ce1668}, author = {El Hamlaoui, M.a b and Coulette, B.b and Ebersold, S.b and Bennani, S.a and Nassar, M.a and Anwar, A.e and Beugnard, A.c and Bach, J.C.c and Jamoussi, Y.d and Tran, H.N.b} } @article {Kartit2016141, title = {Applying encryption algorithm for data security in cloud storage}, journal = {Lecture Notes in Electrical Engineering}, volume = {366}, year = {2016}, note = {cited By 0}, pages = {141-154}, abstract = {This paper proposes a simple, secure, and privacy-preserving architecture for inter-Cloud data sharing based on an encryption/decryption algorithm which aims to protect the data stored in the cloud from the unauthorized access. {\textcopyright} Springer Science+Business Media Singapore 2016.}, doi = {10.1007/978-981-287-990-5_12}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84959117395\&doi=10.1007\%2f978-981-287-990-5_12\&partnerID=40\&md5=5e4a7f778a62fb9bb090db998cc47f86}, author = {Kartit, Z.a and Azougaghe, A.b and Idrissi, H.K.a and Marraki, M.E.a and Hedabou, M.c and Belkasmi, M.b and Kartit, A.d} } @conference { ISI:000381755100012, title = {Applying Encryption Algorithm for Data Security in Cloud Storage}, booktitle = {ADVANCES IN UBIQUITOUS NETWORKING}, series = {Lecture Notes in Electrical Engineering}, volume = {366}, year = {2016}, note = {International Symposium on Ubiquitous Networking (UNet), Casablanca, MOROCCO, SEP 08-10, 2015}, pages = {141-154}, abstract = {This paper proposes a simple, secure, and privacy-preserving architecture for inter-Cloud data sharing based on an encryption/decryption algorithm which aims to protect the data stored in the cloud from the unauthorized access.}, isbn = {978-981-287-990-5; 978-981-287-989-9}, issn = {1876-1100}, doi = {10.1007/978-981-287-990-5\_12}, author = {Kartit, Zaid and Azougaghe, Ali and Kamal Idrissi, H. and El Marraki, M. and Hedabou, M. and Belkasmi, M. and Kartit, A.}, editor = {Sabir, E and Medromi, H and Sadik, M} } @conference { ISI:000385791400001, title = {Cardiovascular Dysautonomias Diagnosis Using Crisp and Fuzzy Decision Tree: A Comparative Study}, booktitle = {HEALTH INFORMATICS MEETS EHEALTH}, series = {Studies in Health Technology and Informatics}, volume = {223}, year = {2016}, note = {10th eHealth Conference on Predictive Modeling in Healthcare - From Prediction to Prevention, Vienna, AUSTRIA, MAY 24-25, 2016}, pages = {1-8}, abstract = {Decision trees (DTs) are one of the most popular techniques for learning classification systems, especially when it comes to learning from discrete examples. In real world, many data occurred in a fuzzy form. Hence a DT must be able to deal with such fuzzy data. In fact, integrating fuzzy logic when dealing with imprecise and uncertain data allows reducing uncertainty and providing the ability to model fine knowledge details. In this paper, a fuzzy decision tree (FDT) algorithm was applied on a dataset extracted from the ANS (Autonomic Nervous System) unit of the Moroccan university hospital Avicenne. This unit is specialized on performing several dynamic tests to diagnose patients with autonomic disorder and suggest them the appropriate treatment. A set of fuzzy classifiers were generated using FID 3.4. The error rates of the generated FDTs were calculated to measure their performances. Moreover, a comparison between the error rates obtained using crisp and FDTs was carried out and has proved that the results of FDTs were better than those obtained using crisp DTs.}, isbn = {978-1-61499-645-3; 978-1-61499-644-6}, issn = {0926-9630}, doi = {10.3233/978-1-61499-645-3-1}, author = {Kadi, Ilham and Idri, Ali}, editor = {Schreier, G and Ammenwerth, E and Horbst, A and Hayn, D} } @conference {Azougaghe2016421, title = {An efficient algorithm for data security in Cloud storage}, booktitle = {International Conference on Intelligent Systems Design and Applications, ISDA}, volume = {2016-June}, year = {2016}, note = {cited By 0}, pages = {421-427}, abstract = {Cloud computing has now become a major trend, it is a new data hosting technology that is Very popular in recent years thanks to the amortization of costs it induces to companies. In this paper we present the major security issues in cloud computing and we also propose a simple, secure, and privacy-preserving architecture for inter-Cloud data sharing based on an encryption/decryption algorithm which aims to protect the data stored in the cloud from the unauthorized access. {\textcopyright} 2015 IEEE.}, doi = {10.1109/ISDA.2015.7489267}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84978374763\&doi=10.1109\%2fISDA.2015.7489267\&partnerID=40\&md5=eb13454b1c8384bc8bc11182c4419af5}, author = {Azougaghe, A.a and Kartit, Z.b and Hedabou, M.a and Belkasmi, M.a and El Marraki, M.b} } @conference {Haqiq2016329, title = {An extended approach for the behavioral and temporal constraints specification of reactive agent}, booktitle = {International Conference on Intelligent Systems Design and Applications, ISDA}, volume = {2016-June}, year = {2016}, note = {cited By 1}, pages = {329-334}, abstract = {Reactive Muti-Agent System (RMAS) provides efficient mechanism for modeling, decision-making and problem solving for complex systems. However, there is a crucial lack concerning building a specification method facilitating the designer to take into account the fundamental properties of reactive systems, which are concurrency, temporal constraints and reliability. This paper proposes to extend the Multi Decisional Reactive Agent (MDRA) approach, which is mainly focusing on reactive system, by providing mechanisms to specify temporal constraints as well as three operations mode in agent behavior, namely, normal, degraded and full-fault tolerance. {\textcopyright} 2015 IEEE.}, doi = {10.1109/ISDA.2015.7489249}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84978405415\&doi=10.1109\%2fISDA.2015.7489249\&partnerID=40\&md5=897235a75cd05f7bf6894f33057a8343}, author = {Haqiq, A. and Bounabat, B.} } @conference {ElHaloui2016630, title = {From enterprise architecture to cloud computing: A decision-support model for functional block outsourcing}, booktitle = {ICEIS 2016 - Proceedings of the 18th International Conference on Enterprise Information Systems}, volume = {2}, year = {2016}, note = {cited By 0}, pages = {630-635}, abstract = {The Information Systems opening to the cloud computing has become a strategic choice for enterprises. In fact, the rapid evolution of competitiveness and innovation and the diversity of technologic offers incite IT decision makers to look for decision support tools helping them for the adoption of new solutions and services such as Cloud Computing. This article introduces a maturity assessment model of an information system architecture functional block that can be outsourced to the Cloud. Based on the best practices of enterprise architecture and information systems governance, the basic criteria of activities outsourcing, and the cloud computing adoption requirements, this model is built around four modules: the block scope identification, the outsourcing opportunity, the cloud computing architectural requirements, and governance and control. Thus, this model will provides new benefits for opened Enterprise Architectures to new technologies. Copyright {\textcopyright} 2016 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979555053\&partnerID=40\&md5=c6f1149e57b13984ee8435b68630f5de}, author = {El Haloui, M. and Kriouile, A.} } @article {Idri2016990, title = {Improved estimation of software development effort using Classical and Fuzzy Analogy ensembles}, journal = {Applied Soft Computing Journal}, volume = {49}, year = {2016}, note = {cited By 1}, pages = {990-1019}, abstract = {Delivering an accurate estimate of software development effort plays a decisive role in successful management of a software project. Therefore, several effort estimation techniques have been proposed including analogy based techniques. However, despite the large number of proposed techniques, none has outperformed the others in all circumstances and previous studies have recommended generating estimation from ensembles of various single techniques rather than using only one solo technique. Hence, this paper proposes two types of homogeneous ensembles based on single Classical Analogy or single Fuzzy Analogy for the first time. To evaluate this proposal, we conducted an empirical study with 100/60 variants of Classical/Fuzzy Analogy techniques respectively. These variants were assessed using standardized accuracy and effect size criteria over seven datasets. Thereafter, these variants were clustered using the Scott-Knott statistical test and ranked using four unbiased errors measures. Moreover, three linear combiners were used to combine the single estimates. The results show that there is no best single Classical/Fuzzy Analogy technique across all datasets, and the constructed ensembles (Classical/Fuzzy Analogy ensembles) are often ranked first and their performances are, in general, higher than the single techniques. Furthermore, Fuzzy Analogy ensembles achieve better performance than Classical Analogy ensembles and there is no best Classical/Fuzzy ensemble across all datasets and no evidence concerning the best combiner. {\textcopyright} 2016 Elsevier B.V.}, doi = {10.1016/j.asoc.2016.08.012}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84997417515\&doi=10.1016\%2fj.asoc.2016.08.012\&partnerID=40\&md5=b29d5f00b8c137b8fef1ba5d0c2a68a1}, author = {Idri, A.a and Hosni, M.a and Abran, A.b} } @article { ISI:000392285600072, title = {Improved estimation of software development effort using Classical and Fuzzy Analogy ensembles}, journal = {APPLIED SOFT COMPUTING}, volume = {49}, year = {2016}, month = {DEC}, pages = {990-1019}, abstract = {Delivering an accurate estimate of software development effort plays a decisive role in successful management of a software project. Therefore, several effort estimation techniques have been proposed including analogy based techniques. However, despite the large number of proposed techniques, none has outperformed the others in all circumstances and previous studies have recommended generating estimation from ensembles of various single techniques rather than using only one solo technique. Hence, this paper proposes two types of homogeneous ensembles based on single Classical Analogy or single Fuzzy Analogy for the first time. To evaluate this proposal, we conducted an empirical study with 100/60 variants of Classical/Fuzzy Analogy techniques respectively. These variants were assessed using standardized accuracy and effect size criteria over seven datasets. Thereafter, these variants were clustered using the Scott-Knott statistical test and ranked using four unbiased errors measures. Moreover, three linear combiners were used to combine the single estimates. The results show that there is no best single Classical/Fuzzy Analogy technique across all datasets, and the constructed ensembles (Classical/Fuzzy Analogy ensembles) are often ranked first and their performances are, in general, higher than the single techniques. Furthermore, Fuzzy Analogy ensembles achieve better performance than Classical Analogy ensembles and there is no best Classical/Fuzzy ensemble across all datasets and no evidence concerning the best combiner. (C) 2016 Elsevier B.V. All rights reserved.}, issn = {1568-4946}, doi = {10.1016/j.asoc.2016.08.012}, author = {Idri, Ali and Hosni, Mohamed and Abran, Alain} } @conference { ISI:000382702400019, title = {Increasing network lifetime by energy-efficient routing scheme for OLSR protocol}, booktitle = {2016 INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS AND COMPUTER SYSTEMS (CIICS)}, year = {2016}, note = {2nd IEEE International Conference on Industrial Informatics and Computer Systems (CIICS), Sharjah, U ARAB EMIRATES, MAR 13-15, 2016}, publisher = {IEEE}, organization = {IEEE}, abstract = {One of the main considerations in designing routing protocols for Mobile Ad-Hoc Network (MANET) is to increase network lifetime by minimizing nodes{\textquoteright} energy consumption, since nodes are typically battery powered. Many proposals have been addressed to this problem; however, few papers consider a proactive protocol like Optimized Link State Routing Protocol (OLSR) to better manage the energy consumption. Some of them have explored modifications to the MPRs selection mechanism, whereas others have investigated multiple cross layer parameters to increase the network lifetime. In this paper, we explored both modification to MPR selection and integrating appropriate routing metrics in the routing decision scheme to lessen effects of reason that lead to more energy consumption. Our power-aware version of OLSR is proven by simulations in NS3 under a range of different mobile scenarios. Significant performance gains of 20\% are obtained in network lifetime for our modified OLSR and little to no performance gains in term of Packet Delivery Ratio (PDR).}, isbn = {978-1-4673-8743-9}, author = {Sahnoun, Abdelkabir and El Abbadi, Jamal and Habbani, Ahmed} } @conference {Sahnoun2016, title = {Increasing network lifetime by energy-efficient routing scheme for OLSR protocol}, booktitle = {2016 International Conference on Industrial Informatics and Computer Systems, CIICS 2016}, year = {2016}, note = {cited By 0}, abstract = {One of the main considerations in designing routing protocols for Mobile Ad-Hoc Network (MANET) is to increase network lifetime by minimizing nodes{\textquoteright} energy consumption, since nodes are typically battery powered. Many proposals have been addressed to this problem; however, few papers consider a proactive protocol like Optimized Link State Routing Protocol (OLSR) to better manage the energy consumption. Some of them have explored modifications to the MPRs selection mechanism, whereas others have investigated multiple cross layer parameters to increase the network lifetime. In this paper, we explored both modification to MPR selection and integrating appropriate routing metrics in the routing decision scheme to lessen effects of reason that lead to more energy consumption. Our power-aware version of OLSR is proven by simulations in NS3 under a range of different mobile scenarios. Significant performance gains of 20\% are obtained in network lifetime for our modified OLSR and little to no performance gains in term of Packet Delivery Ratio (PDR). {\textcopyright} 2016 IEEE.}, doi = {10.1109/ICCSII.2016.7462412}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84969508612\&doi=10.1109\%2fICCSII.2016.7462412\&partnerID=40\&md5=79f4d2f9a4b515d335715ca23943ceac}, author = {Sahnoun, A.a and Abbadi, J.E.a and Habbani, A.b} } @article {Mhada2016, title = {Multilevel hybrid method for optimal buffer sizing and inspection stations positioning}, journal = {SpringerPlus}, volume = {5}, number = {1}, year = {2016}, note = {cited By 0}, abstract = {Designing competitive manufacturing systems with high levels of productivity and quality at a reasonable cost is a complex task. Decision makers must face numerous decision variables which involve multiple and iterative analysis of the estimated cost, quality and productivity of each design alternative. This paper adresses this issue by providing a fast algorithm for solving the buffer sizing and inspection positioning problem of large production lines by combining heuristic and exact algorithms. We develop a multilevel hybrid search method combining a genetic algorithm and tabu search to identify promising locations for the inspection stations and an exact method that optimizes rapidly (in polynomial time) the buffers{\textquoteright} sizes for each location. Our method gives valuable insights into the problem, and its solution time is a small fraction of that required by the exact method on production lines with 10{\textendash}30 machines. {\textcopyright} 2016, The Author(s).}, doi = {10.1186/s40064-016-3756-2}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85000578231\&doi=10.1186\%2fs40064-016-3756-2\&partnerID=40\&md5=135ff08d6855c8cc393cf2f8c4a44f7c}, author = {Mhada, F.Z.a and Ouzineb, M.b and Pellerin, R.c and El Hallaoui, I.d} } @article { ISI:000391831100003, title = {Multilevel hybrid method for optimal buffer sizing and inspection stations positioning}, journal = {SPRINGERPLUS}, volume = {5}, year = {2016}, month = {NOV 30}, abstract = {Designing competitive manufacturing systems with high levels of productivity and quality at a reasonable cost is a complex task. Decision makers must face numerous decision variables which involve multiple and iterative analysis of the estimated cost, quality and productivity of each design alternative. This paper adresses this issue by providing a fast algorithm for solving the buffer sizing and inspection positioning problem of large production lines by combining heuristic and exact algorithms. We develop a multilevel hybrid search method combining a genetic algorithm and tabu search to identify promising locations for the inspection stations and an exact method that optimizes rapidly (in polynomial time) the buffers{\textquoteright} sizes for each location. Our method gives valuable insights into the problem, and its solution time is a small fraction of that required by the exact method on production lines with 10-30 machines.}, issn = {2193-1801}, doi = {10.1186/s40064-016-3756-2}, author = {Mhada, Fatima Zahra and Ouzineb, Mohamed and Pellerin, Robert and El Hallaoui, Issmail} } @conference {Chanyour201647, title = {Network Coding for energy optimization and throughput enhancement of WideMac for IR-UWB based WSN}, booktitle = {Proceedings of the International Conference on Microelectronics, ICM}, volume = {2016-March}, year = {2016}, note = {cited By 0}, pages = {47-50}, abstract = {Energy and throughput optimization occupies an important place in the research area of Wireless Sensor Networks (WSNs). These networks are a class of useful but challenging networks. Combining Network Coding (NC) and efficient scheduling in the MAC layer of such networks gives more efficiency and copes with the problem of energy waste and inefficiency management as well as transmission{\textquoteright}s lose and collision. Our work{\textquoteright}s concern is to assess the contribution of the network coding technique{\textquoteright}s introduction to improve the efficiency and optimize the energy consumption in the MAC layer of IR-UWB based WSNs. Therefore, we tested this new technique using WideMac Protocol; which is a relevant MAC protocols dedicated to WSNs based on IR-UWB. Furthermore, we used XOR coding to fit low computational capabilities requirement in such networks. The obtained results are very encouraging and the proposed MAC scheme{\textquoteright}s improvements have demonstrated the positive impact of using NC in terms of both used metrics. {\textcopyright} 2015 IEEE.}, doi = {10.1109/ICM.2015.7437984}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84965066384\&doi=10.1109\%2fICM.2015.7437984\&partnerID=40\&md5=8c2c1b23487843900560d8f9e1d858dd}, author = {Chanyour, T.a and Chergui Hali, H.b and Saadane, R.c} } @conference { ISI:000391354500040, title = {Rectangular Dielectric Resonator Antenna (RDRA) for Anti-collision Short Range Radar (SRR) Application}, booktitle = {2016 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT)}, year = {2016}, note = {2nd International Conference on Electrical and Information Technologies (ICEIT), Tangier, MOROCCO, MAY 04-07, 2016}, pages = {237-239}, abstract = {This paper presents the design of Rectangular Dielectric Resonator Antenna (RDRA) feed by a micro-strip line for anti-collision radar SRR application at 24 GHz. The proposed RDRA operates at a frequency of 24 GHz with a high dielectric constant of 41. The simulated RDRA has a high radiation efficiency (88.4 \%). The return loss, radiation pattern and gain of the proposed antenna are evaluated. The simulation process was carried out using Computer Simulation Technology (CST) Microwave Studio.}, isbn = {978-1-4673-8469-8}, author = {Haddad, Abderrahim and Aoutoul, Mohssin and Rais, Khalid and Essaaidi, Mohamed}, editor = {Essaaidi, M and ElHani, S} } @conference {Haddad2016237, title = {Rectangular Dielectric Resonator Antenna (RDRA) for anti-collision short range radar (SRR) application}, booktitle = {Proceedings of 2016 International Conference on Electrical and Information Technologies, ICEIT 2016}, year = {2016}, note = {cited By 0}, pages = {237-239}, abstract = {This paper presents the design of Rectangular Dielectric Resonator Antenna (RDRA) feed by a micro-strip line for anti-collision radar SRR application at 24 GHz. The proposed RDRA operates at a frequency of 24 GHz with a high dielectric constant of 41. The simulated RDRA has a high radiation efficiency (88.4 \%). The return loss, radiation pattern and gain of the proposed antenna are evaluated. The simulation process was carried out using Computer Simulation Technology (CST) Microwave Studio. {\textcopyright} 2016 IEEE.}, doi = {10.1109/EITech.2016.7519597}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84992188168\&doi=10.1109\%2fEITech.2016.7519597\&partnerID=40\&md5=459bdb70786bf969bb54ead0761fd18e}, author = {Haddad, A.a and Aoutoul, M.b and Rais, K.a and Essaaidi, M.c} } @conference {Bounagui2016, title = {Requirements definition for a holistic approach of cloud computing governance}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, volume = {2016-July}, year = {2016}, note = {cited By 0}, abstract = {With the appearance of virtualization, the spread of internet, the development of broadband networks, and also the advent of externalization and application rental; cloud computing (CC) has emerged as being the next generation of distributed computing paradigm. Based on {\textquoteright}pay-for-what-you-use{\textquoteright} model, CC offers significant benefits including costs reduction, on demand provisioning, rapid elasticity, resources pooling, etc. But despite all its potential gains, the model also introduces many challenges from which the major concern that hampers its adoption is the lack of an integrated approach for CC governance. With regard to this matter, the main contributions of this paper is first, to analyze the existing standards and research works considering different aspects of IT governance; and second, to identify, analyze, and organize the main CC governance requirements that constitute the cornerstone for the development of an integrated approach for CC governance. {\textcopyright} 2015 IEEE.}, doi = {10.1109/AICCSA.2015.7507245}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84980328080\&doi=10.1109\%2fAICCSA.2015.7507245\&partnerID=40\&md5=abde0b8a81646802c167b52fb4e581d1}, author = {Bounagui, Y.a and Hafiddi, H.a b and Mezrioui, A.a} } @conference { ISI:000391420300054, title = {Requirements Specification of an e-Health Solution to Improve Cardiovascular Healthcare Services in Morocco}, booktitle = {2016 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, series = {International Conference on Intelligent Systems, Theories and Applications}, year = {2016}, note = {11th International Conference on Intelligent Systems - Theories and Applications (SITA), Mohammedia, MOROCCO, OCT 19-20, 2016}, publisher = {IEEE; Univ Hassan Casablanca; IEEE Morocco Sect; Fac Sci Tech Mohammedia}, organization = {IEEE; Univ Hassan Casablanca; IEEE Morocco Sect; Fac Sci Tech Mohammedia}, abstract = {Cardiovascular disease is the leading cause of deaths in the world. By analyzing data from health records this chronic disease can be better understood. This paper presents the software requirements specification (SRS) of an e-health solution to improve the cardiology healthcare quality and efficiency in Morocco. Based on this SRS, a mobile personal health record along with an electronic health record have been developed for the Autonomic Nervous System centre in Avicenne Hospital in Rabat. Requirements and characteristics of the mobile solution are detailed in this study. Moreover, an empirical evaluation has been conducted to assess and improve the quality of the mobile personal health record using the ISO/IEC 25010 standard.}, isbn = {978-1-5090-5781-8}, issn = {2378-2528}, author = {Ouhbi, Sofia and Idri, Ali and Hakmi, Rachid and Benjelloun, Halima and Luis Fernandez-Aleman, Jose and Toval, Ambrosio} } @conference {Ouhbi2016, title = {Requirements specification of an e-health solution to improve cardiovascular healthcare services in Morocco}, booktitle = {SITA 2016 - 11th International Conference on Intelligent Systems: Theories and Applications}, year = {2016}, note = {cited By 0}, abstract = {Cardiovascular disease is the leading cause of deaths in the world. By analyzing data from health records this chronic disease can be better understood. This paper presents the software requirements specification (SRS) of an e-health solution to improve the cardiology healthcare quality and efficiency in Morocco. Based on this SRS, a mobile personal health record along with an electronic health record have been developed for the Autonomic Nervous System centre in Avicenne Hospital in Rabat. Requirements and characteristics of the mobile solution are detailed in this study. Moreover, an empirical evaluation has been conducted to assess and improve the quality of the mobile personal health record using the ISO/IEC 25010 standard. {\textcopyright} 2016 IEEE.}, doi = {10.1109/SITA.2016.7772309}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85010407980\&doi=10.1109\%2fSITA.2016.7772309\&partnerID=40\&md5=005f49eb037586504f1262f955f907b1}, author = {Ouhbi, S.a and Idri, A.a and Hakmi, R.a and Benjelloun, H.b and Fernandez-Aleman, J.L.c and Toval, A.c} } @article {Amraoui2016, title = {Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model}, journal = {Mobile Information Systems}, volume = {2016}, year = {2016}, note = {cited By 0}, abstract = {Game theory may offer a useful mechanism to address many problems in mobile ad hoc networks (MANETs). One of the key concepts in the research field of such networks with Optimized Link State Routing Protocol (OLSR) is the security problem. Relying on applying game theory to study this problem, we consider two strategies during this suggested model: cooperate and not-cooperate. However, in such networks, it is not easy to identify different actions of players. In this paper, we have essentially been inspired from recent advances provided in game theory to propose a new model for security in MANETs. Our proposal presents a powerful tool with a large number of players where interactions are played multiple times. Moreover, each node keeps a cooperation rate (CR) record of other nodes to cope with the behaviors and mitigate aggregate effect of other malicious devices. Additionally, our suggested security mechanism does not only take into consideration security requirements, but also take into account system resources and network performances. The simulation results using Network Simulator 3 are presented to illustrate the effectiveness of the proposal. {\textcopyright} 2016 Hicham Amraoui et al.}, doi = {10.1155/2016/5653010}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85008883716\&doi=10.1155\%2f2016\%2f5653010\&partnerID=40\&md5=5aaffd8b2d52f8958a3f2543444109fe}, author = {Amraoui, H.a and Habbani, A.a b and Hajami, A.c and Bilal, E.d} } @article { ISI:000390576800001, title = {Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model}, journal = {MOBILE INFORMATION SYSTEMS}, year = {2016}, abstract = {Game theory may offer a useful mechanism to address many problems in mobile ad hoc networks (MANETs). One of the key concepts in the research field of such networks with Optimized Link State Routing Protocol (OLSR) is the security problem. Relying on applying game theory to study this problem, we consider two strategies during this suggested model: cooperate and not-cooperate. However, in such networks, it is not easy to identify different actions of players. In this paper, we have essentially been inspired from recent advances provided in game theory to propose a new model for security in MANETs. Our proposal presents a powerful tool with a large number of players where interactions are played multiple times. Moreover, each node keeps a cooperation rate (CR) record of other nodes to cope with the behaviors and mitigate aggregate effect of other malicious devices. Additionally, our suggested security mechanism does not only take into consideration security requirements, but also take into account system resources and network performances. The simulation results using Network Simulator 3 are presented to illustrate the effectiveness of the proposal.}, issn = {1574-017X}, doi = {10.1155/2016/5653010}, author = {Amraoui, Hicham and Habbani, Ahmed and Hajami, Abdelmajid and Bilal, Essaid} } @article {Ayoub20162179, title = {Serially concatenated OSMLD codes: Design and iterative decoding}, journal = {Applied Mathematical Sciences}, volume = {10}, number = {41-44}, year = {2016}, note = {cited By 0}, pages = {2179-2188}, abstract = {In this paper, the performance of serially concatenated one-step ma- jority logic decodable (SC-OSMLD) codes is investigated. The iterative decoding process uses a soft-input soft-output threshold decoding algo- rithm [1] as component decoder with our proposed connection scheme [2]. The effect of various components codes, interleaver size (Number of sub-blocks), and the number of iterations are investigated. Simulation results for SC-OSMLD codes transmitted over Additive White Gaussian Noise channel(AWGN) are provided. The simulation result will show that the slope of curves and coding gain are improved by increasing the number of decoder iterations and/or the interleaver size. {\textcopyright} 2016 Fouad Ayoub et al.}, doi = {10.12988/ams.2016.6387}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84983503792\&doi=10.12988\%2fams.2016.6387\&partnerID=40\&md5=46efa596ad7d8a871fc411883576d89c}, author = {Ayoub, F.a and Farchane, A.b and Mohamed, A.c and Belkasmi, M.c and Himmi, M.M.d} } @conference {Hamada2016, title = {Strategic planning problem represented by a three-echelon logistics network-modeling and solving}, booktitle = {Proceedings of the 3rd IEEE International Conference on Logistics Operations Management, GOL 2016}, year = {2016}, note = {cited By 0}, abstract = {This article aims to elaborate a strategic plan allowing to decision makers to take right decisions (Selecting suppliers, Selecting plants that can produce a specific product,...) in the right moment in order to minimize the generated costs. Our work consists, then to optimize a multi-scales and multi-periods location-distribution problem. The problem belongs to the FLNP family with a complexity of order of NP-difficult. The objective of our problem MIP is to maximize the incomes of a production company via the minimization of costs: the cost of supplying, the cost of producing and the cost of transportation. Several aspects would be treated in this subject: the horizon of planning-multi-periods and the structure of network (multi-echelons). Based on the limits of exact methods, we have proposed to resolve this problem on the basis of a heuristic method, the choice which seems to be the most adequate for our problem is LNS (Large Neighborhood Search). It is in this perspective that we have reformulated our model [12] in order to be represented under the form of a logistic network based on paths before the application of LNS. {\textcopyright} 2016 IEEE.}, doi = {10.1109/GOL.2016.7731666}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85001967788\&doi=10.1109\%2fGOL.2016.7731666\&partnerID=40\&md5=f27cc09ffbc35696dbe95da6401b9d4f}, author = {Hamada, Y.a and Benadada, Y.b and Gendron, B.c} } @conference { ISI:000392439200008, title = {Strategic planning problem represented by a three-echelon logistics network-modeling and solving}, booktitle = {PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL CONFERENCE ON LOGISTICS OPERATIONS MANAGEMENT (GOL{\textquoteright}16)}, year = {2016}, note = {3rd IEEE International Conference on Logistics Operations Management (GOL), Fes, MOROCCO, MAY 23-25, 2016}, publisher = {Sidi Mohammed Ben Abdellah Univ Fes, Fac Sci \& Technol; Mohammed V Univ Rabat, ENSIAS Sch; Univ Havre; IEEE}, organization = {Sidi Mohammed Ben Abdellah Univ Fes, Fac Sci \& Technol; Mohammed V Univ Rabat, ENSIAS Sch; Univ Havre; IEEE}, abstract = {This article aims to elaborate a strategic plan allowing to decision makers to take right decisions (Selecting suppliers, Selecting plants that can produce a specific product, ..) in the right moment in order to minimize the generated costs. Our work consists, then to optimize a multi-scales and multi-periods location-distribution problem. The problem belongs to the FLNP family with a complexity of order of NP-difficult. The objective of our problem MIP is to maximize the incomes of a production company via the minimization of costs: the cost of supplying, the cost of producing and the cost of transportation. Several aspects would be treated in this subject: the horizon of planning -multi-periods and the structure of network (multi-echelons). Based on the limits of exact methods, we have proposed to resolve this problem on the basis of a heuristic method, the choice which seems to be the most adequate for our problem is LNS (Large Neighborhood Search). It is in this perspective that we have reformulated our model {[}12] in order to be represented under the form of a logistic network based on paths before the application of LNS.}, isbn = {978-1-4673-8571-8}, author = {Hamada, Yahya and Benadada, Youssef and Gendron, Bernard}, editor = {Alaoui, AE and Benadada, Y and Boukachour, J} } @article { ISI:000378664500010, title = {Systematic literature review of ensemble effort estimation}, journal = {JOURNAL OF SYSTEMS AND SOFTWARE}, volume = {118}, year = {2016}, month = {AUG}, pages = {151-175}, abstract = {The need to overcome the weaknesses of single estimation techniques for prediction tasks has given rise to ensemble methods in software development effort estimation (SDEE). An ensemble effort estimation (EEE) technique combines several of the single/classical models found in the SDEE literature. However, to the best of our knowledge, no systematic review has yet been performed with a focus on the use of EEE techniques in SDEE. The purpose of this review is to analyze EEE techniques from six viewpoints: single models used to construct ensembles, ensemble estimation accuracy, rules used to combine single estimates, accuracy comparison of EEE techniques with single models, accuracy comparison between EEE techniques and methodologies used to construct ensemble methods. We performed a systematic review of EEE studies published between 2000 and 2016, and we selected 24 of them to address the questions raised in this review. We found that EEE techniques may be separated into two types: homogeneous and heterogeneous, and that the machine learning single models are the most frequently employed in constructing EEE techniques. We also found that EEE techniques usually yield acceptable estimation accuracy, and in fact are more accurate than single models. (C) 2016 Elsevier Inc. All rights reserved.}, issn = {0164-1212}, doi = {10.1016/j.jss.2016.05.016}, author = {Idri, Ali and Hosni, Mohamed and Abran, Alain} } @article {Idri2016151, title = {Systematic literature review of ensemble effort estimation}, journal = {Journal of Systems and Software}, volume = {118}, year = {2016}, note = {cited By 1}, pages = {151-175}, abstract = {The need to overcome the weaknesses of single estimation techniques for prediction tasks has given rise to ensemble methods in software development effort estimation (SDEE). An ensemble effort estimation (EEE) technique combines several of the single/classical models found in the SDEE literature. However, to the best of our knowledge, no systematic review has yet been performed with a focus on the use of EEE techniques in SDEE. The purpose of this review is to analyze EEE techniques from six viewpoints: single models used to construct ensembles, ensemble estimation accuracy, rules used to combine single estimates, accuracy comparison of EEE techniques with single models, accuracy comparison between EEE techniques and methodologies used to construct ensemble methods. We performed a systematic review of EEE studies published between 2000 and 2016, and we selected 24 of them to address the questions raised in this review. We found that EEE techniques may be separated into two types: homogeneous and heterogeneous, and that the machine learning single models are the most frequently employed in constructing EEE techniques. We also found that EEE techniques usually yield acceptable estimation accuracy, and in fact are more accurate than single models. {\textcopyright} 2016 Elsevier Inc. All rights reserved.}, doi = {10.1016/j.jss.2016.05.016}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84969531836\&doi=10.1016\%2fj.jss.2016.05.016\&partnerID=40\&md5=4217c2107911348615a692540959501e}, author = {Idri, A.a and Hosni, M.a and Abran, A.b} } @conference {Idri2016132, title = {Systematic mapping study of ensemble effort estimation}, booktitle = {ENASE 2016 - Proceedings of the 11th International Conference on Evaluation of Novel Software Approaches to Software Engineering}, year = {2016}, note = {cited By 0}, pages = {132-139}, abstract = {Ensemble methods have been used recently for prediction in data mining area in order to overcome the weaknesses of single estimation techniques. This approach consists on combining more than one single technique to predict a dependent variable and has attracted the attention of the software development effort estimation (SDEE) community. An ensemble effort estimation (EEE) technique combines several existing single/classical models. In this study, a systematic mapping study was carried out to identify the papers based on EEE techniques published in the period 2000-2015 and classified them according to five classification criteria: research type, research approach, EEE type, single models used to construct EEE techniques, and rule used the combine single estimates into an EEE technique. Publication channels and trends were also identified. Within the 16 studies selected, homogeneous EEE techniques were the most investigated. Furthermore, the machine learning single models were the most frequently employed to construct EEE techniques and two types of combiner (linear and non-linear) have been used to get the prediction value of an ensemble. Copyright {\textcopyright} 2016 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979496940\&partnerID=40\&md5=8108d3f05a4d4c689c6237a0019141b7}, author = {Idri, A.a and Hosni, M.a and Abran, A.b} } @conference { ISI:000391107900013, title = {Systematic Mapping Study of Ensemble Effort Estimation}, booktitle = {ENASE: PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL SOFTWARE APPROACHES TO SOFTWARE ENGINEERING}, year = {2016}, note = {11th International Conference on Evaluation of Novel Software Approaches to Software Engineering, Rome, ITALY, APR 27-28, 2016}, pages = {132-139}, abstract = {Ensemble methods have been used recently for prediction in data mining area in order to overcome the weaknesses of single estimation techniques. This approach consists on combining more than one single technique to predict a dependent variable and has attracted the attention of the software development effort estimation (SDEE) community. An ensemble effort estimation (EEE) technique combines several existing single/classical models. In this study, a systematic mapping study was carried out to identify the papers based on EEE techniques published in the period 2000-2015 and classified them according to five classification criteria: research type, research approach, EEE type, single models used to construct EEE techniques, and rule used the combine single estimates into an EEE technique. Publication channels and trends were also identified. Within the 16 studies selected, homogeneous EEE techniques were the most investigated. Furthermore, the machine learning single models were the most frequently employed to construct EEE techniques and two types of combiner (linear and non-linear) have been used to get the prediction value of an ensemble.}, isbn = {978-989-758-189-2}, doi = {10.5220/0005822701320139}, author = {Idri, Ali and Hosni, Mohamed and Abran, Alain}, editor = {Maciaszek, L and Filipe, J} } @conference {Fissaa2016, title = {Towards a semantic approach for discovering context aware services}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, volume = {2016-July}, year = {2016}, note = {cited By 0}, abstract = {The current service discovery mechanisms are syntactic methods that often offer poor quality results. By researching this area we are able to identify issues that limit the quality of the result with these traditional service mechanisms. To overcome this issue we use ontologies to enable semantic matchmaking. By reasoning on concepts and relations, our approach can derive matches that syntactically would not match. Additionaly, by introducing contextual information in the service discovery process, the quality of the service discovery result may improve. In this paper, we present an overview of the architecture for the discovery of context aware services by using ontologies, we also present our context aware semantic service by extending OWL-S with context properties. {\textcopyright} 2015 IEEE.}, doi = {10.1109/AICCSA.2015.7507223}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84980335938\&doi=10.1109\%2fAICCSA.2015.7507223\&partnerID=40\&md5=4b536162f82df5902d0c9e87e0681fa3}, author = {Fissaa, T.a and Guermah, H.a and Hafiddi, H.a b and Nassar, M.a} } @conference {Essaaidi2016, title = {Welcome message from the conference general co-chairs}, booktitle = {Proceedings of 2016 International Conference on Electrical and Information Technologies, ICEIT 2016}, year = {2016}, note = {cited By 0}, doi = {10.1109/EITech.2016.7519561}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84992187636\&doi=10.1109\%2fEITech.2016.7519561\&partnerID=40\&md5=6b8e62a8e6eddc3944c19d069d89afa1}, author = {Essaaidi, M.a and El Hani, S.b} } @conference { ISI:000383221800012, title = {ACTOR NETWORK THEORY AS A COLLABORATIVE MODE: THE CONTRIBUTION OF GAME THEORY IN THE INTERESSEMENT PHASE}, booktitle = {PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT)}, year = {2015}, note = {5th World Congress on Information and Communication Technologies (WICT), Marrakesh, MOROCCO, DEC 14-16, 2015}, pages = {67-72}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, abstract = {Global Governance of projects requires cooperation between several actors. In general, such cooperation is ensured by building network collaboration between entities who want to collaborate. In spite of the existence of a number of works interested in collaboration network, only few of them were focused on how to construct a network. In this paper, we address this topic through Actor Network Theory. In particular way, we analyze interessement phase of ANT from a cooperative game point of view. Indeed, it{\textquoteright}s about negotiations between actors involved in business project. Our objective is to propose an approach of network establishment, by inciting actors through cost savings. For that, we use Shapley Value to answer the question: Which coalitions are likely to form in order to ensure best cost-saving objectives in ANT mode of collaboration? We propose also a graphical tool for visualizing networks and simulating their evolution.}, isbn = {978-1-4673-8712-5}, author = {Benqatla, Mohammed Salim and Dikra, Chikhaoui and Bounabat, Bouchaib}, editor = {Abrahim, A and Alimi, AM and Haqiq, A and Karray, H and Mousannif, H and BenHalima, M and Choo, YH and Ma, K} } @article {Lhoussain2015127, title = {Adaptating the levenshtein distance to contextual spelling correction}, journal = {International Journal of Computer Science and Applications}, volume = {12}, number = {1}, year = {2015}, note = {cited By 1}, pages = {127-133}, abstract = {In the last few years, computing environments for human learning have rapidly evolved due to the development of information and communication technologies. However, the use of information technology in automatic correction of spelling errors has become increasingly essential. In this context, we have developed a system for correcting spelling errors in the Arabic language based on language models and Levenshtein algorithm. The metric distance returned by the Levenshtein algorithm is often the same for multiple solutions in correcting a wrong word. To overcome this limitation we have added a weighting based on language models. This combination has helped us to screen and refine the results obtained in advance by the Levenshtein algorithm, and applied to the errors of Arabic words. The results are encouraging and demonstrate the value of this approach. {\textcopyright} Technomathematics Research Foundation.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84925438223\&partnerID=40\&md5=d40d9b32ebd59c63f8fed1f88ff15e47}, author = {Lhoussain, A.S.a and Hicham, G.b and Abdellah, Y.c} } @conference { ISI:000383221800027, title = {Big Data: Measuring How Information Technology Can Improve the Economic Growth and Better Life}, booktitle = {PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT)}, year = {2015}, note = {5th World Congress on Information and Communication Technologies (WICT), Marrakesh, MOROCCO, DEC 14-16, 2015}, pages = {152-159}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, abstract = {Today data are equivalent of oil or gold, but Succeeding with big data requires more than just data. Data-based value creation requires the identification of a framework from which predictions can be deducted and decisions can be made. Lot of index has been developed to measure the state of development of countries whether economic growth, ICT penetration or Human development. The purpose of the measuring was to assess policy implications and economic growth around the globe as well as share best practices. In this paper we are going to compare the most wildly tools of measurement of economic competiveness, Network readiness, Human development and world press freedom. Those four domains are judged to be the pillars of well-being and good live of a Human. In the second part of this paper, we examine the hypothesis that ICT penetration has positive effects on economic growth, well-being and a better life of a Human. We use the system Generalized Method of Moment for dynamic panel data analysis to extract the causal link between ICT penetration and growth.}, isbn = {978-1-4673-8712-5}, author = {Nouinou, Soumaya and Razafimampianina, Rindra M. and Regragui, Boubker and Doukkali, Abdelaziz S.}, editor = {Abrahim, A and Alimi, AM and Haqiq, A and Karray, H and Mousannif, H and BenHalima, M and Choo, YH and Ma, K} } @conference { ISI:000373736100043, title = {Building rich user profile based on intentional perspective}, booktitle = {INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015)}, series = {Procedia Computer Science}, volume = {73}, year = {2015}, note = {International Conference on Advanced Wireless Information and Communication Technologies (AWICT), Natl Sch Engineers Sousse, TUNISIA, OCT 05-07, 2015}, pages = {342-349}, abstract = {Internet technologies evolution, from Web 1.0 to web 2.0 and web 3.0, has led us towards the definition of new requirements to be considered in the design and development of new application. It is important to note that depending solely on the request to satisfy user need is not effective. Indeed, the emergence of many researches related to the study of user behaviour has enhanced the retrieval information effectiveness. Typically, the context and the user profile are the main elements to characterize the user. Hence, we aim through this contribution to build a rich profile and to provide him suitable services. (C) 2015 The Authors. Published by Elsevier B.V.}, issn = {1877-0509}, doi = {10.1016/j.procs.2015.12.002}, author = {Alaoui, Sara and El Idrissi, Younes El Bouzekri and Ajhoun, Rachida}, editor = {Boubiche, DE and Hidoussi, F and Cruz, HT} } @conference { ISI:000365128500017, title = {CIOSOS: Combined Idiomatic-Ontology Based Sentiment Orientation System for Trust Reputation in E-commerce}, booktitle = {INTERNATIONAL JOINT CONFERENCE: CISIS{\textquoteright}15 AND ICEUTE{\textquoteright}15}, series = {Advances in Intelligent Systems and Computing}, volume = {369}, year = {2015}, note = {8th International Conference on Computational Intelligence in Security for Information Systems (CISIS) / 6th International Conference on EUropean Transnational Education (ICEUTE), Burgos, SPAIN, JUN, 2015}, pages = {189-200}, publisher = {IEEE Spain Sect; IEEE Syst, Man \& Cybernet Spanish Chapter; Int Federat Computat Log}, organization = {IEEE Spain Sect; IEEE Syst, Man \& Cybernet Spanish Chapter; Int Federat Computat Log}, abstract = {Due to the abundant amount of Customer{\textquoteright}s Reviews available in E-commerce platforms, Trust Reputation Systems remain reliable means to determine, circulate and restore the credibility and reputation of reviewers and their provided reviews. In fact before starting the process of Reputation score{\textquoteright}s calculation, we need to develop an accurate Sentiment orientation System able to extract opinion expressions, analyze them and determine the sentiment orientation of the Review and then classify it into positive, negative and objective. In this paper, we propose a novel semi-supervised approach which is a Combined Idiomatic-Ontology based Sentiment Orientation System (CIOSOS) that realizes a domain-dependent sentiment analysis of reviews. The main contribution of the system is to expand the general opinion lexicon SentiWordNet to a custom-made opinion lexicon (SentiWordNet++) with domain-dependent {\textquoteleft}{\textquoteleft}opinion indicators{{\textquoteright}{\textquoteright}} as well as {\textquoteleft}{\textquoteleft}idiomatic expressions{{\textquoteright}{\textquoteright}}. The system relies also on a semi-supervised learning method that uses the general lexicon WordNet to identify synonyms or antonyms of the expanded terms and get their polarities from SentiWordNet and then store them in SentiWordNet++. The Sentiment polarity and the classification of the review provided by the CIOSOS is used as an input of our Reputation Algorithm proposed in previous papers in order to generate the Reputation score of the reviewer. We also provide an improvement in calculation method used to generate a {\textquoteleft}{\textquoteleft}granular{{\textquoteright}{\textquoteright}} reputation score of a feature or subfeature of the product.}, isbn = {978-3-319-19713-5; 978-3-319-19712-8}, issn = {2194-5357}, doi = {10.1007/978-3-319-19713-5\_17}, author = {Rahimi, Hasnae and El Bakkali, Hanan}, editor = {Herrero, A and Baruque, B and Sedano, J and Quintian, H and Corchado, E} } @conference { ISI:000380407100057, title = {A Cloud Service Template for Enabling Accurate Cloud Adoption and Migration}, booktitle = {2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15)}, year = {2015}, note = {International Conference on Cloud Computing Technologies and Applications (CloudTech), Marrakech, MOROCCO, JUN 02-04, 2015}, pages = {44-49}, abstract = {Since the cloud services are increasing exponentially, discover, filter, select and eventually migrate to the appropriate service is becoming a challenging mission. In the literature, several Service Template initiatives are proposed to deal with service description, topology and even portability, but they fail to emphasis the integration of consumer concerns and the migration feasibility checking before decision making. To fill the gap, the paper introduce a cloud service template that structured in three parts with a dedicated migration one. Also, a weight concept is added to service parameters in order to enforce importance and priority. Additionally, a context awareness mechanism is introduced for enabling automated service template adaptation.}, isbn = {978-1-4673-8149-9}, author = {El Houssaini, Charafeddine and Nassar, Mahmoud and Kriouile, Abdelaziz} } @conference {ElHoussaini2015, title = {A cloud service template for enabling accurate cloud adoption and migration}, booktitle = {Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015}, year = {2015}, note = {cited By 0}, abstract = {Since the cloud services are increasing exponentially, discover, filter, select and eventually migrate to the appropriate service is becoming a challenging mission. In the literature, several Service Template initiatives are proposed to deal with service description, topology and even portability, but they fail to emphasis the integration of consumer concerns and the migration feasibility checking before decision making. To fill the gap, the paper introduce a cloud service template that structured in three parts with a dedicated migration one. Also, a weight concept is added to service parameters in order to enforce importance and priority. Additionally, a context awareness mechanism is introduced for enabling automated service template adaptation. {\textcopyright} 2015 IEEE.}, doi = {10.1109/CloudTech.2015.7337018}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962784529\&doi=10.1109\%2fCloudTech.2015.7337018\&partnerID=40\&md5=c3c5532dba0fd60abea784ec21a685a7}, author = {El Houssaini, C. and Nassar, M. and Kriouile, A.} } @conference {Ettazi2015, title = {A cloud-based architecture for transactional services adaptation}, booktitle = {Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015}, year = {2015}, note = {cited By 0}, abstract = {Advances in wireless communications and mobility have increased the use of smart mobile applications. As a result of the remarkable increase of mobile devices and the pervasive wireless networks, a large number of mobile users are requiring personalization services customized to their context. The mobile cloud-computing paradigm from a context-aware perspective aims to find effective ways to make cloud services aware of the context of their customers and applications. Another major challenge for context-aware cloud services is to exploit the benefits of cloud computing to manage transaction processing throughout the life cycle of a service. In this paper, we focused on the need of loosely coupled context-supporting components that work with a transaction-aware service infrastructure to adapt services to the context of the user and his mobile device. We propose a cloud-based middleware for transactional service adaptation (CM4TSA) by adding the "Adaptation as a Service" layer into basic cloud architecture, to perform the correct execution of transactional service according to the user context. {\textcopyright} 2015 IEEE.}, doi = {10.1109/CloudTech.2015.7336966}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962915570\&doi=10.1109\%2fCloudTech.2015.7336966\&partnerID=40\&md5=3023f7d2f3c981e241c1581a30e547c6}, author = {Ettazi, W.a and Hafiddi, H.a b and Nassar, M.a and Ebersold, S.c} } @conference { ISI:000380407100005, title = {A Cloud-Based Architecture for Transactional Services Adaptation}, booktitle = {2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15)}, year = {2015}, note = {International Conference on Cloud Computing Technologies and Applications (CloudTech), Marrakech, MOROCCO, JUN 02-04, 2015}, pages = {81-86}, abstract = {Advances in wireless communications and mobility have increased the use of smart mobile applications. As a result of the remarkable increase of mobile devices and the pervasive wireless networks, a large number of mobile users are requiring personalization services customized to their context. The mobile cloud-computing paradigm from a context-aware perspective aims to find effective ways to make cloud services aware of the context of their customers and applications. Another major challenge for context-aware cloud services is to exploit the benefits of cloud computing to manage transaction processing throughout the life cycle of a service. In this paper, we focused on the need of loosely coupled context-supporting components that work with a transaction-aware service infrastructure to adapt services to the context of the user and his mobile device. We propose a cloud-based middleware for transactional service adaptation (CM4TSA) by adding the {\textquoteleft}{\textquoteleft}Adaptation as a Service{{\textquoteright}{\textquoteright}} layer into basic cloud architecture, to perform the correct execution of transactional service according to the user context.}, isbn = {978-1-4673-8149-9}, author = {Ettazi, Widad and Hafiddi, Hatim and Nassar, Mahmoud and Ebersold, Sophie} } @conference {Maarouf2015, title = {Combining multi-agent systems and MDE approach for monitoring SLA violations in the Cloud Computing}, booktitle = {Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015}, year = {2015}, note = {cited By 0}, abstract = {A Service Level Agreement (SLA) is a legal contract between parties to ensure the Quality of Service (QoS). It specifies one or more service level objectives (SLO), to ensure that the QoS delivered has met customer expectations. However, It becomes hard to guarantee QoS levels and detect SLA violations. Therefore, we propose to use MDE (Model Driven Engineering) to express the SLA contract requirements. This latter, created with a specific modeling language (DSML), will be used harmonically with a Multi-agent systems (MASs) in order to monitor SLA violations in real-time. Indeed, MASs are suitable tools for self-detection of failures and self-monitoring of cloud operations and services, QoS negotiation and SLA management. They are designed to operate in a dynamically changing environment. Our main motivation is firstly to use MDE technology for the creation of the SLA contract and then to integrate MASs in order to control the quality of service contract and guarantee transparency and symmetry with respect to the SLA contract between prospective signatories. {\textcopyright} 2015 IEEE.}, doi = {10.1109/CloudTech.2015.7336975}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962812614\&doi=10.1109\%2fCloudTech.2015.7336975\&partnerID=40\&md5=e4242d4209fb9950851bcad787c901fa}, author = {Maarouf, A.a and El Hamlaoui, M.b and Marzouk, A.a and Haqiq, A.a} } @conference { ISI:000380407100014, title = {Combining Multi-agent systems and MDE approach for Monitoring SLA violations in the Cloud Computing}, booktitle = {2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15)}, year = {2015}, note = {International Conference on Cloud Computing Technologies and Applications (CloudTech), Marrakech, MOROCCO, JUN 02-04, 2015}, pages = {132-137}, abstract = {A Service Level Agreement (SLA) is a legal contract between parties to ensure the Quality of Service (QoS). It specifies one or more service level objectives (SLO), to ensure that the QoS delivered has met customer expectations. However, It becomes hard to guarantee QoS levels and detect SLA violations. Therefore, we propose to use MDE (Model Driven Engineering) to express the SLA contract requirements. This latter, created with a specific modeling language (DSML), will be used harmonically with a Multi-agent systems (MASs) in order to monitor SLA violations in real-time. Indeed, MASs are suitable tools for self-detection of failures and self-monitoring of cloud operations and services, QoS negotiation and SLA management. They are designed to operate in a dynamically changing environment. Our main motivation is firstly to use MDE technology for the creation of the SLA contract and then to integrate MASs in order to control the quality of service contract and guarantee transparency and symmetry with respect to the SLA contract between prospective signatories.}, isbn = {978-1-4673-8149-9}, author = {Maarouf, Adil and El Hamlaoui, Mahmoud and Marzouk, Abderrahim and Haqiq, Abdelkrim} } @conference { ISI:000373736100013, title = {The context in automatic spell correction}, booktitle = {INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015)}, series = {Procedia Computer Science}, volume = {73}, year = {2015}, note = {International Conference on Advanced Wireless Information and Communication Technologies (AWICT), Natl Sch Engineers Sousse, TUNISIA, OCT 05-07, 2015}, pages = {109-114}, abstract = {Automatic spell checker systems aim to verify and correct erroneous words through a suggested set of words that are the nearest lexically to the erroneous ones. However, the main disadvantage of those systems is that the wanted solution may bethe most distant lexically but the most appropriate in context. To correctly sort these solutions, the corrector must have some information about the general context of the text; the paragraph or the neighboring words of the misspelled word. In this paper, we will present an automatic spell checking method according to the context. This method is based on a learning corpus containing a distribution of the appearance probability of a word in different contexts. It combines the lexical correction via the Levenstein algorithm and the context based correction through a well definedlearning corpus which is composed of documents collected from the internet. This approach has proven efficiency and the obtained results are much more improved and satisfactory.}, issn = {1877-0509}, doi = {10.1016/j.procs.2015.12.055}, author = {Nejja, Mohammed and Yousfi, Abdellah}, editor = {Boubiche, DE and Hidoussi, F and Cruz, HT} } @conference { ISI:000380570700061, title = {Designing ReDy Distributed Systems}, booktitle = {2015 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING}, year = {2015}, note = {IEEE International Conference on Autonomic Computing, Grenoble, FRANCE, JUL 07-10, 2015}, pages = {331-336}, publisher = {IEEE; usenix; Univ Joseph Fourier; Telecom ParisTech; Spec; GRENOBLE ALPLES METROPOLE; VILLE CRENOBOLE; MINALOGIC; CPS; IEEE COMPUTER SOC; hp; Google; orange; FOCAS; INRIA INVENTORS DIGITAL WORLD}, organization = {IEEE; usenix; Univ Joseph Fourier; Telecom ParisTech; Spec; GRENOBLE ALPLES METROPOLE; VILLE CRENOBOLE; MINALOGIC; CPS; IEEE COMPUTER SOC; hp; Google; orange; FOCAS; INRIA INVENTORS DIGITAL WORLD}, abstract = {Distributed systems are largely present and deployed in recent applications. Several systems have common basic requirements, which motivates to adapt reusable solutions for each family of systems. In this paper, we focus on distributed systems designed for large-scale applications requiring a high degree of Reliability and Dynamicity (ReDy distributed systems). We propose a basic architecture for this family of systems and a design solution to guarantee the scalability of the system, the fault tolerance, and a highly dynamic membership management. The studied systems range from hybrid architecture, on which we combine centralized and decentralized solutions.}, isbn = {978-1-4673-6971-8}, doi = {10.1109/ICAC.2015.63}, author = {Hafdi, Kaoutar and Kriouile, Abdelaziz}, editor = {Lalanda, P and Diaconescu, A and Cherkasova, L and Kounev, S} } @conference {Hafdi2015331, title = {Designing ReDy distributed systems}, booktitle = {Proceedings - IEEE International Conference on Autonomic Computing, ICAC 2015}, year = {2015}, note = {cited By 0}, pages = {331-336}, abstract = {Distributed systems are largely present and deployed in recent applications. Several systems have common basic requirements, which motivates to adapt reusable solutions for each family of systems. In this paper, we focus on distributed systems designed for large-scale applications requiring a high degree of Reliability and Dynamicity (ReDy distributed systems). We propose a basic architecture for this family of systems and a design solution to guarantee the scalability of the system, the fault tolerance, and a highly dynamic membership management. The studied systems range from hybrid architecture, on which we combine centralized and decentralized solutions. {\textcopyright} 2015 IEEE.}, doi = {10.1109/ICAC.2015.63}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84961839190\&doi=10.1109\%2fICAC.2015.63\&partnerID=40\&md5=f4847babbee4e85fc1f3d4aa04d701f1}, author = {Hafdi, K. and Kriouile, A.} } @article {ElQacimym20151120, title = {An efficient segmentation algorithm for handwritten arabic words}, journal = {International Review on Computers and Software}, volume = {10}, number = {11}, year = {2015}, note = {cited By 0}, pages = {1120-1126}, abstract = {Segmentation is an essential step for many Arabic handwritten Text recognition systems. It has a direct impact on the efficiency of subsequent steps in the recognition process such as feature extraction and classification, which strongly affects overall recognition performance. This paper presents a novel algorithm for off-line handwritten Arabic word segmentation into subwords. This approach is based on vertical projection and a novel algorithm taking into consideration the characteristics of Arabic script. The proposed method has been successfully tested on the IFN/ENIT database and the results show the effectiveness of our approach in segmenting and isolating sub-words efficiently. {\textcopyright} 2015 Praise Worthy Prize S.r.l. -All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84956884338\&partnerID=40\&md5=713325a3fa28f76f89fa8249c846e146}, author = {El Qacimym, B.a b and Ait Kerroum, M.c d and Hammouch, A.e f g h} } @conference {Azougaghe2015140, title = {An electronic voting system based on homomorphic encryption and prime numbers}, booktitle = {Proceedings of the 2015 11th International Conference on Information Assurance and Security, IAS 2015}, year = {2015}, note = {cited By 1}, pages = {140-145}, abstract = {In this paper we present an electronic voting system based on homomorphic encryption to ensure privacy, confidentiality in the voting. Our proposal offers all the advantages of the multiplicatively homomorphic encryption cryptosystems. The proposed voting scheme is suitable for multi-candidate elections as well as for elections in which contains neutral votes. {\textcopyright} 2015 IEEE.}, doi = {10.1109/ISIAS.2015.7492759}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979503097\&doi=10.1109\%2fISIAS.2015.7492759\&partnerID=40\&md5=a062b12e4631c6978b161d42deb41a74}, author = {Azougaghe, A. and Hedabou, M. and Belkasmi, M.} } @conference { ISI:000361756400014, title = {A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies}, booktitle = {FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014)}, series = {Lecture Notes in Computer Science}, volume = {8930}, year = {2015}, note = {7th International Symposium on Foundations and Practice of Security (FPS), Concordia Univ, Montreal, CANADA, NOV 03-05, 2014}, pages = {221-236}, abstract = {Security policies are a relevant solution to protect information systems from undue accesses. In this paper, we develop a formal and rigorous automata-based approach to design and analyze security policies. The interest of our approach is that it can be used as a common basis for analyzing several aspects of security policies, instead of using a distinct approach and formalism for studying each aspect. We first develop a procedure that synthesizes automatically an automaton which implements a given security policy. Then, we apply this synthesis procedure to verify completeness of security policies and detect several types of anomalies in security policies. We also study space and time complexities of the developed procedures.}, isbn = {978-3-319-17040-4; 978-3-319-17039-8}, issn = {0302-9743}, doi = {10.1007/978-3-319-17040-4\_14}, author = {Khoumsi, Ahmed and Krombi, Wadie and Erradi, Mohammed}, editor = {Cuppens, F and GarciaAlfaro, J and Heywood, NZ and Fong, PWL} } @conference {ElHouari2015, title = {From Big Data to Big Knowledge: The art of making Big Data alive}, booktitle = {Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015}, year = {2015}, note = {cited By 0}, abstract = {Nowadays Big Data becomes one of the biggest buzz concepts in IT world especially with the vertiginous development driving the increase of data encouraged by the emergence of high technologies of storage like cloud computing. Big Data can create efficient challenging solutions in health, security, government and more; and usher in a new era of analytics and decisions. Knowledge Management comprises a set of strategies and practices used to identify, create, represent, distribute, and enable creating experience that can constitute a real immaterial capital. However, to bring significant meaning to the perpetual tsunami of data and manage them, Big Data needs Knowledge Management. In the same way, to broaden the scope of its targeted analyzes, Knowledge Management requires Big Data. Thus, there is a complementary relation between these two major concepts. This paper presents a state of art where we try to explore Big Data within the context of Knowledge Management. We discuss the bi-directional relationship linking this two fundamental concepts and their strategic utility in making analytics valuable especially with the combination of their interactions which create an effective Big Knowledge to build experience. {\textcopyright} 2015 IEEE.}, doi = {10.1109/CloudTech.2015.7337001}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962850767\&doi=10.1109\%2fCloudTech.2015.7337001\&partnerID=40\&md5=44ddf094080e112ff052b4be166062e8}, author = {El Houari, M. and Rhanoui, M. and El Asri, B.} } @conference { ISI:000380407100040, title = {From Big Data to Big Knowledge: The Art of making Big Data Alive}, booktitle = {2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15)}, year = {2015}, note = {International Conference on Cloud Computing Technologies and Applications (CloudTech), Marrakech, MOROCCO, JUN 02-04, 2015}, pages = {289-294}, abstract = {Nowadays Big Data becomes one of the biggest buzz concepts in IT world especially with the vertiginous development driving the increase of data encouraged by the emergence of high technologies of storage like cloud computing. Big Data can create efficient challenging solutions in health, security, government and more; and usher in a new era of analytics and decisions. Knowledge Management comprises a set of strategies and practices used to identify, create, represent, distribute, and enable creating experience that can constitute a real immaterial capital. However, to bring significant meaning to the perpetual tsunami of data and manage them, Big Data needs Knowledge Management. In the same way, to broaden the scope of its targeted analyzes, Knowledge Management requires Big Data. Thus, there is a complementary relation between these two major concepts. This paper presents a state of art where we try to explore Big Data within the context of Knowledge Management. We discuss the bi-directional relationship linking this two fundamental concepts and their strategic utility in making analytics valuable especially with the combination of their interactions which create an effective Big Knowledge to build experience.}, isbn = {978-1-4673-8149-9}, author = {El Houari, Meryeme and Rhanoui, Maryem and El Asri, Bouchra} } @conference {Fissaa2015640, title = {How can semantics and context awareness enhance the composition of context-aware services?}, booktitle = {ICEIS 2015 - 17th International Conference on Enterprise Information Systems, Proceedings}, volume = {2}, year = {2015}, note = {cited By 0}, pages = {640-647}, abstract = {The context-aware services refers to applications that use so-called contextual information to provide appropriate services or relevant information to the user or other applications to perform a specific task. An important challenge in context-aware service oriented systems is the creation of a new service on demand to carry out more complex tasks through the composition of existing services. In this work, we aim to propose a semantic based architecture for the development of context aware services composition using Artificial Intelligence (AI) planning. The straightforward translation between AI planning through PDDL and Semantic web services via OWL-S allows to automate the composition process. Thus planning based service composition launches a goal-oriented composition procedure to generate a plan of composite service corresponding to the user request. Copyright {\textcopyright} 2015 SCITEPRESS - Science and Technology Publications.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84939560458\&partnerID=40\&md5=0a9e2c87038f1d032ffe405577e99b17}, author = {Fissaa, T.a and Guermah, H.a and Hafiddi, H.a b and Nassar, M.a} } @conference { ISI:000383221800021, title = {Iterative Threshold Decoding of Quasi-Cyclic One Step Majority Logic Decodable Codes}, booktitle = {PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT)}, year = {2015}, note = {5th World Congress on Information and Communication Technologies (WICT), Marrakesh, MOROCCO, DEC 14-16, 2015}, pages = {117-122}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, abstract = {This paper presents a new class of Quasi-Cyclic One Step Majority logic codes of 1/2 rate constructed from perfect difference set. Theses codes can be encoded with low complexity, and perform very well when decoded with the Iterative threshold decoding algorithm. Much of these codes is a subfamily of the LDPC codes and can be decoded using belief propagation algorithm. A comparison between our results and those for LDPC code in terms of BER performance are presented.}, isbn = {978-1-4673-8712-5}, author = {Rkizat, Karim and Lahmer, Mohammed and Belkasmi, Mostafa}, editor = {Abrahim, A and Alimi, AM and Haqiq, A and Karray, H and Mousannif, H and BenHalima, M and Choo, YH and Ma, K} } @article {Maarouf20151, title = {MDE approach for the establishment of a service level agreements monitoring by trusted third party in the cloud computing}, journal = {International Journal of Grid and High Performance Computing}, volume = {7}, number = {4}, year = {2015}, note = {cited By 0}, pages = {1-20}, abstract = {Establishing and monitoring SLA violations in real-Time has become a critical issue for Cloud Computing. In this paper the authors investigate this issue and propose a model to express the SLA contract requirements using Model Driven Engineering (MDE), as a mean for establishing service level agreements between a cloud provider and cloud customer in the context of a particular service provision. The participation of a Trusted Third Party (TTP) may be necessary in order to resolve conflicts between prospective signatories, likewise to monitor SLA violations in real-Time in the goal to ensure online monitoring cloud services and provide better than best-effort behavior for clouds. The main focus of this work is firstly to use MDE technology for the creation of the SLA contract and then to integrate TTP that should be able to apply an advanced penalty model that guarantees the performance and the reliability of the Cloud. Copyright {\textcopyright} 2015, IGI Global.}, doi = {10.4018/IJGHPC.2015100101}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84954316996\&doi=10.4018\%2fIJGHPC.2015100101\&partnerID=40\&md5=dd0f1e349394c1928d0e7fcc3859f313}, author = {Maarouf, A.a and Hamlaoui, M.E.b and Haqiq, A.c} } @conference { ISI:000377500700024, title = {MiCATS: Middleware for Context-Aware Transactional Services}, booktitle = {ENTERPRISE INFORMATION SYSTEMS (ICEIS 2015)}, series = {Lecture Notes in Business Information Processing}, volume = {241}, year = {2015}, note = {17th International Conference on Enterprise Information Systems (ICEIS), Barcelona, SPAIN, APR 27-30, 2015}, pages = {496-512}, publisher = {Inst Syst \& Technol Informat Control \& Commun; Assoc Advancement Artificial Intelligence; IEICE Special Interest Grp Software Enterprise Modelling; ACM Special Interest Grp Management Informat Syst; ACM Special Interest Grp Artificial Intelligence; Asocia}, organization = {Inst Syst \& Technol Informat Control \& Commun; Assoc Advancement Artificial Intelligence; IEICE Special Interest Grp Software Enterprise Modelling; ACM Special Interest Grp Management Informat Syst; ACM Special Interest Grp Artificial Intelligence; Asocia}, abstract = {In context-aware service-based environments, fulfilling user{\textquoteright}s recommendations bring about several challenges that are mainly due to the dynamic nature and limited underlying resources of these environments. In this paper, we mainly focus on the transactional aspects of context-aware services. To cope with the aforementioned issues, we opt for a middleware-based solution (MiCATS). We therefore present our novel approach for managing context-aware transactions which allows for adaptation to the requirements of applications and mobile context in terms of transactional properties. Then, we introduce our context-aware transactional service model (CATSM) and a context-aware architecture based on adaptation policies. The proposed contributions are implemented within a middleware platform.}, isbn = {978-3-319-29133-8; 978-3-319-29132-1}, issn = {1865-1348}, doi = {10.1007/978-3-319-29133-8\_24}, author = {Ettazi, Widad and Hafiddi, Hatim and Nassar, Mahmoud and Ebersold, Sophie}, editor = {Hammoudi, S and Maciaszek, L and Teniente, E and Camp, O and Cordeiro, J} } @article {Ettazi2015496, title = {Micats: Middleware for context-aware transactional services}, journal = {Lecture Notes in Business Information Processing}, volume = {241}, year = {2015}, note = {cited By 0}, pages = {496-512}, abstract = {In context-aware service-based environments, fulfilling user{\textquoteright}s recommendations bring about several challenges that are mainly due to the dynamic nature and limited underlying resources of these environments. In this paper, we mainly focus on the transactional aspects of context-aware services. To cope with the aforementioned issues, we opt for a middleware-based solution (MiCATS). We therefore present our novel approach for managing context-aware transactions which allows for adaptation to the requirements of applications and mobile context in terms of transactional properties. Then, we introduce our context-aware transactional service model (CATSM) and a context-aware architecture based on adaptation policies. The proposed contributions are implemented within a middleware platform. {\textcopyright} Springer International Publishing Switzerland 2015.}, doi = {10.1007/978-3-319-29133-8_24}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84959010651\&doi=10.1007\%2f978-3-319-29133-8_24\&partnerID=40\&md5=c56c8ed710503318e5bb541d36315897}, author = {Ettazi, W.a and Hafiddi, H.a b and Nassar, M.a and Ebersold, S.c} } @conference {Mourchid2015213, title = {Mining user patterns for location prediction in mobile social networks}, booktitle = {Colloquium in Information Science and Technology, CIST}, volume = {2015-January}, number = {January}, year = {2015}, note = {cited By 1}, pages = {213-218}, abstract = {Understanding human mobility dynamics is of an essential importance to today mobile applications, including context-aware advertising and city wide sensing applications. Recently, Location-based social networks (LBSNs) have attracted important researchers{\textquoteright} efforts, to investigate spatial, temporal and social aspects of user patterns. LBSNs allow users to {\textquoteright}check-in{\textquoteright} at geographical locations and share this information with friends. In this paper, analysis of check-ins data provided by Foursquare, the online location-based social network, allows us to construct a set of features that capture: spatial, temporal and similarity characteristics of user mobility. We apply this knowledge to location prediction problem, and combine these features in supervised learning for future location prediction. We find that the supervised classifier based on the combination of multiple features offers reasonable accuracy. {\textcopyright} 2014 IEEE.}, doi = {10.1109/CIST.2014.7016621}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84938084658\&doi=10.1109\%2fCIST.2014.7016621\&partnerID=40\&md5=86ede8ff82b4095f9bf55be3eaa192e2}, author = {Mourchid, F.a and Habbani, A.a b and Koutbi, M.E.a} } @article {Lakki20151070, title = {Multi-objective dynamic metric and QoS in networks manets}, journal = {Research Journal of Applied Sciences, Engineering and Technology}, volume = {10}, number = {9}, year = {2015}, note = {cited By 0}, pages = {1070-1081}, abstract = {The aim of this study is to find a Intelligent parameter which is based on mobility and Clustering. This metric will be integrate in the selection process of MPRs to improve QoS in Manets networks. The unpredictable mobility and the large quantity of generated traffic by each node interface make communication in network increasingly difficult to manage. Thus, routing protocols need to be adapted to such conditions. In order to make OLSR protocol more robust, piercing and more adaptable to the conditions dictated by the environment of each node, this study proposes a polymorphic metric that changes depending on the network behavior. This metric aims to make the OLSR protocol best suited to each zone. Many simulations would be undergone by NS2 to test and prove the validity of this new metric in environments with high mobility and quantity of traffic. {\textcopyright} Maxwell Scientific Organization, 2015.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84940775201\&partnerID=40\&md5=be882576c747f7d2d3d54cd08dc7dc91}, author = {Lakki, N.a and Ouacha, A.a and Habbani, A.a b and El Abbadi, J.a} } @conference { ISI:000380432600013, title = {Network Coding for Energy Optimization and Throughput Enhancement of WideMac for IR-UWB based WSN}, booktitle = {2015 27TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM)}, series = {International Conference on Microelectronics-ICM}, year = {2015}, note = {27th International Conference on Microelectronics (ICM), Casablanca, MOROCCO, DEC 20-23, 2015}, pages = {47-50}, abstract = {Energy and throughput optimization occupies an important place in the research area of Wireless Sensor Networks (WSNs). These networks are a class of useful but challenging networks. Combining Network Coding (NC) and efficient scheduling in the MAC layer of such networks gives more efficiency and copes with the problem of energy waste and inefficiency management as well as transmission{\textquoteright}s lose and collision. Our work{\textquoteright}s concern is to assess the contribution of the network coding technique{\textquoteright}s introduction to improve the efficiency and optimize the energy consumption in the MAC layer of IR-UWB based WSNs. Therefore, we tested this new technique using WideMac Protocol; which is a relevant MAC protocols dedicated to WSNs based on IR-UWB. Furthermore, we used XOR coding to fit low computational capabilities requirement in such networks. The obtained results are very encouraging and the proposed MAC scheme{\textquoteright}s improvements have demonstrated the positive impact of using NC in terms of both used metrics.}, isbn = {978-1-4673-8759-0}, issn = {2159-1679}, author = {Chanyour, Tarik and Chergui Hali, Hanane and Saadane, Rachid} } @conference {Aouzal2015, title = {An overview of variability management in cloud services}, booktitle = {Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015}, year = {2015}, note = {cited By 0}, abstract = {The Cloud Computing paradigm has enabled the multi-tenancy architectural approach in Cloud applications. In a multi-tenant application, one single instance is shared by many tenants (users). Since each client has its own and particular requirements and context, that are exposed to change in time, the process of realizing customizable and adaptable services becomes complex and difficult to handle. Handling variability has been subject of many research works in the domain of Service Oriented Computing, while less interest was given to variability in Cloud services. Therefore, managing variability in Cloud applications can take benefit from related works in service-oriented computing. In this paper, we present an overview of variability management in Cloud applications, in order to assess the pertinence of the different approaches proposed to tackle this issue. {\textcopyright} 2015 IEEE.}, doi = {10.1109/CloudTech.2015.7336976}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962861131\&doi=10.1109\%2fCloudTech.2015.7336976\&partnerID=40\&md5=08685792a476e627b2fe63ca5f3f1d63}, author = {Aouzal, K.a and Hafiddi, H.a b and Dahchour, M.a} } @conference { ISI:000380407100015, title = {An Overview of Variability Management in Cloud Services}, booktitle = {2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15)}, year = {2015}, note = {International Conference on Cloud Computing Technologies and Applications (CloudTech), Marrakech, MOROCCO, JUN 02-04, 2015}, pages = {138-142}, abstract = {The Cloud Computing paradigm has enabled the multitenancy architectural approach in Cloud applications. In a multitenant application, one single instance is shared by many tenants (users). Since each client has its own and particular requirements and context, that are exposed to change in time, the process of realizing customizable and adaptable services becomes complex and difficult to handle. Handling variability has been subject of many research works in the domain of Service Oriented Computing, while less interest was given to variability in Cloud services. Therefore, managing variability in Cloud applications can take benefit from related works in service-oriented computing. In this paper, we present an overview of variability management in Cloud applications, in order to assess the pertinence of the different approaches proposed to tackle this issue.}, isbn = {978-1-4673-8149-9}, author = {Aouzal, Khadija and Hafiddi, Hatim and Dahchour, Mohamed} } @article {ElKhaddar201543, title = {A policy-based middleware for context-aware pervasive computing}, journal = {International Journal of Pervasive Computing and Communications}, volume = {11}, number = {1}, year = {2015}, note = {cited By 1}, pages = {43-68}, abstract = {Purpose {\textendash} This paper aims to demonstrate that a policy-based middleware solution which facilitates the development of context-aware applications and the integration of the heterogeneous devices should be provided for ubiquitous computing environments. Ubiquitous computing targets the provision of seamless services and applications by providing an environment that involves a variety of devices having different capabilities. These applications help transforming the physical spaces into computationally active and smart environments. The design of applications in these environments needs to consider the heterogeneous devices, applications preferences and rapidly changing contexts. The applications, therefore, need to be context-aware so that they can adapt to different situations in real-time. Design/methodology/approach {\textendash} In this paper, we argue that a policy-based middleware solution that facilitates the development of context-aware applications and the integration of the heterogeneous devices should be provided for ubiquitous computing environments. The middleware allows applications to track items and acquire contextual information about them easily, reason about this information captured using different logics and then adapt to changing contexts. A key issue in these environments is to allow heterogeneous applications to express their business rules once, and get the preferred data once they are captured by the middleware without any intervention from the application side. Findings {\textendash} Our middleware tackles this problem by using policies to define the different applications{\textquoteright} rules and preferences. These policies can specify rules about the middleware services to be used, type of data captured, devices used, user roles, context information and any other type of conditions. Originality/value {\textendash} In this paper, we propose the design of a flexible and performant ubiquitous computing, and context-aware middleware called FlexRFID along with its evaluation results. {\textcopyright} Emerald Group Publishing Limited.}, doi = {10.1108/IJPCC-07-2014-0039}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84928536703\&doi=10.1108\%2fIJPCC-07-2014-0039\&partnerID=40\&md5=1ea1a116178cb05d7fea8c54743c528b}, author = {El Khaddar, M.A.a and Chraibi, M.b and Harroud, H.b and Boulmalf, M.c and Elkoutbi, M.a and Maach, A.d} } @conference {Essaaidi2015, title = {Preface}, booktitle = {Proceedings of 2015 International Conference on Electrical and Information Technologies, ICEIT 2015}, year = {2015}, note = {cited By 0}, doi = {10.1109/EITech.2015.7162928}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84945246533\&doi=10.1109\%2fEITech.2015.7162928\&partnerID=40\&md5=4994a9197178463f2f921f3e62068cd5}, author = {Essaaidi, M.a and El Hani, S.b} } @conference { ISI:000383221800017, title = {A preliminary study on indicator framework for enterprise, based on COBIT 5 processes and SOA approach}, booktitle = {PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT)}, year = {2015}, note = {5th World Congress on Information and Communication Technologies (WICT), Marrakesh, MOROCCO, DEC 14-16, 2015}, pages = {95-100}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; Lab Res Grp Intelligent Machines; MIR Labs}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; Lab Res Grp Intelligent Machines; MIR Labs}, abstract = {Organizations become dependent on Information Technology (IT) to fulfill their corporate aims, meet their business needs and deliver value to customers. For effective and efficient utilization of IT, we intend to contribute to the alignment between IT and organizational strategies. The challenge is to make the enterprise and its Information System (IS) as responsive as possible within the regard to changes in enterprise while taking into account the enterprise operational performance. When a change happens or a new opportunity comes, organizations do not know which assets are linked to which business processes and which services, especially IT services, to bring up first and which can wait until later. Our principal aim is to propose an indicator framework to track and control business-IT alignment. However, this paper is a preliminary study on this framework. We are inspired by COBIT 5 processes as indicators and believe that the Service-Oriented Architecture (SOA) applied to these processes interlinks and can interact well the different processes. The validity and applicability of our theoretical study will be evaluated for future work.}, isbn = {978-1-4673-8712-5}, author = {Razafimampianina, Rindra M. and Nouinou, Soumaya and Doukkali, Abdelaziz S. and Regragui, Boubker}, editor = {Abrahim, A and Alimi, AM and Haqiq, A and Karray, H and Mousannif, H and BenHalima, M and Choo, YH and Ma, K} } @conference { ISI:000373736100045, title = {Product Opinion Mining for Competitive Intelligence}, booktitle = {INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015)}, series = {Procedia Computer Science}, volume = {73}, year = {2015}, note = {International Conference on Advanced Wireless Information and Communication Technologies (AWICT), Natl Sch Engineers Sousse, TUNISIA, OCT 05-07, 2015}, pages = {358-365}, abstract = {Competitive Intelligence is one of the keys of companies Risk Management. It provides the company with a permanent lighting to its competitive environment. The increasingly frequent use of Information and Communication Technologies (ICT); including (namely) online shopping sites, blogs, social network sites, forums, provides incentives for companies check their advantages over their competitors. This information presents a new source that helps and leads the company to identify, analyze and manage the various risks associated with its business/products. Nowadays, a good use of these data helps the company to improve its products/services. In this paper, an overview of opinion mining for competitive intelligence will be presented. We{\textquoteright}ll try to synthesize the major research done for the different steps of product opinion mining. (C) 2015 The Authors. Published by Elsevier B.V.}, issn = {1877-0509}, doi = {10.1016/j.procs.2015.12.004}, author = {Amarouche, Kamal and Benbrahim, Houda and Kassou, Ismail}, editor = {Boubiche, DE and Hidoussi, F and Cruz, HT} } @conference {Mezouary2015, title = {PRoPHET-RAIP5: A new approach to secure routing in wireless sensor networks}, booktitle = {International Conference on Wireless Networks and Mobile Communications, WINCOM 2015}, year = {2015}, note = {cited By 0}, abstract = {Probabilistic routing in wireless sensor network (WSNs) use the mobility history when making a forwarding decision. This type of routing provides a very rapid development and new perspectives in WSNs. However, there are several constraints and challenges to overcome the security problems. In this paper, we propose a security solution based on the RAID5 technology and a multi-path routing, to develop a protective mechanism against the various attacks in mobile WSNs. To demonstrate our concept, we have implemented this solution on Probabilistic Routing Protocol using History of Encounters and Transitivity (PRoPHET). We have compared our new protocol (PRoPHET-RAIP5) with standard PRoPHET to enhance security parameters. {\textcopyright} 2015 IEEE.}, doi = {10.1109/WINCOM.2015.7381307}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84965029803\&doi=10.1109\%2fWINCOM.2015.7381307\&partnerID=40\&md5=f34a0e46149201d4fc9429b7732f9c7b}, author = {Mezouary, R.E. and Houmz, A. and Jalil, J. and Koutbi, M.E.} } @conference { ISI:000380509200010, title = {PRoPHET-RAIP5: A New Approach to Secure Routing in Wireless Sensor Networks}, booktitle = {2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM)}, year = {2015}, note = {International conference on wireless networks and mobile communications, Marrakech, MOROCCO, OCT 20-23, 2015}, pages = {52-57}, abstract = {Probabilistic routing in wireless sensor network (WSNs) use the mobility history when making a forwarding decision. This type of routing provides a very rapid development and new perspectives in WSNs. However, there are several constraints and challenges to overcome the security problems. In this paper, we propose a security solution based on the RAID5 technology and a multi-path routing, to develop a protective mechanism against the various attacks in mobile WSNs. To demonstrate our concept, we have implemented this solution on Probabilistic Routing Protocol using History of Encounters and Transitivity (PRoPHET). We have compared our new protocol (PRoPHET-RAIP5) with standard PRoPHET to enhance security parameters.}, isbn = {978-1-4673-8224-3}, author = {El Mezouary, Ridouane and Houmz, Abdellah and Jalil, Jamila and El Koutbi, Mohammed} } @conference {Idri2015976, title = {RBFN network based models for estimating software development effort: A cross-validation study}, booktitle = {Proceedings - 2015 IEEE Symposium Series on Computational Intelligence, SSCI 2015}, year = {2015}, note = {cited By 0}, pages = {976-983}, abstract = {Software effort estimation is very crucial and there is always a need to improve its accuracy as much as possible. Several estimation techniques have been developed in this regard and it is difficult to determine which model gives more accurate estimation on which dataset. Among all proposed methods, the Radial Basis Function Neural (RBFN) networks models have presented promising results in software effort estimation. The main objective of this research is to evaluate the RBFN networks construction based on both hard and fuzzy C-means clustering algorithms using cross-validation approach. The objective of this replication study is to investigate if the RBFN-based models learned from the training data are able to estimate accurately the efforts of yet unseen data. This evaluation uses two historical datasets, namely COCOMO81 and ISBSG R8. {\textcopyright} 2015 IEEE.}, doi = {10.1109/SSCI.2015.142}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84964949962\&doi=10.1109\%2fSSCI.2015.142\&partnerID=40\&md5=af0dde3af393745967961e241dd05385}, author = {Idri, A.a and Hassani, A.a and Abran, A.b} } @conference { ISI:000380431500135, title = {RBFN Networks-based Models for Estimating Software Development Effort: A Cross-validation Study}, booktitle = {2015 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI)}, year = {2015}, note = {IEEE Symposium Series Computational Intelligence, Cape Town, SOUTH AFRICA, DEC 07-10, 2015}, pages = {976-983}, publisher = {IEEE; IEEE Computational Intelligence Soc; IEEE BigData}, organization = {IEEE; IEEE Computational Intelligence Soc; IEEE BigData}, abstract = {Software effort estimation is very crucial and there is always a need to improve its accuracy as much as possible. Several estimation techniques have been developed in this regard and it is difficult to determine which model gives more accurate estimation on which dataset. Among all proposed methods, the Radial Basis Function Neural (RBFN) networks models have presented promising results in software effort estimation. The main objective of this research is to evaluate the RBFN networks construction based on both hard and fuzzy C-means clustering algorithms using cross-validation approach. The objective of this replication study is to investigate if the RBFN-based models learned from the training data are able to estimate accurately the efforts of yet unseen data. This evaluation uses two historical datasets, namely COCOMO81 and ISBSG R8.}, isbn = {978-1-4799-7560-0}, doi = {10.1109/SSCI.2015.142}, author = {Idri, Ali and Hassani, Aya and Abran, Alain} } @conference {Idri2015925, title = {RBFN networks-based models for estimating software development effort: A cross-validation study}, booktitle = {Proceedings - 2015 IEEE Symposium Series on Computational Intelligence, SSCI 2015}, year = {2015}, note = {cited By 0}, pages = {925-932}, abstract = {Software effort estimation is very crucial and there is always a need to improve its accuracy as much as possible. Several estimation techniques have been developed in this regard and it is difficult to determine which model gives more accurate estimation on which dataset. Among all proposed methods, the Radial Basis Function Neural (RBFN) networks models have presented promising results in software effort estimation. The main objective of this research is to evaluate the RBFN networks construction based on both hard and fuzzy C-means clustering algorithms using cross-validation approach. The objective of this replication study is to investigate if the RBFN-based models learned from the training data are able to estimate accurately the efforts of yet unseen data. This evaluation uses two historical datasets, namely COCOMO81 and ISBSG R8. {\textcopyright} 2015 IEEE.}, doi = {10.1109/SSCI.2015.136}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84964998599\&doi=10.1109\%2fSSCI.2015.136\&partnerID=40\&md5=ff08a732a997a0619f3c654c70abf5eb}, author = {Idri, A.a and Hassani, A.b and Abran, A.a} } @conference { ISI:000380431500128, title = {RBFN Networks-based Models for Estimating Software Development Effort: A Cross-validation Study}, booktitle = {2015 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI)}, year = {2015}, note = {IEEE Symposium Series Computational Intelligence, Cape Town, SOUTH AFRICA, DEC 07-10, 2015}, pages = {925-932}, publisher = {IEEE; IEEE Computational Intelligence Soc; IEEE BigData}, organization = {IEEE; IEEE Computational Intelligence Soc; IEEE BigData}, abstract = {Software effort estimation is very crucial and there is always a need to improve its accuracy as much as possible. Several estimation techniques have been developed in this regard and it is difficult to determine which model gives more accurate estimation on which dataset. Among all proposed methods, the Radial Basis Function Neural (RBFN) networks models have presented promising results in software effort estimation. The main objective of this research is to evaluate the RBFN networks construction based on both hard and fuzzy C-means clustering algorithms using cross-validation approach. The objective of this replication study is to investigate if the RBFN-based models learned from the training data are able to estimate accurately the efforts of yet unseen data. This evaluation uses two historical datasets, namely COCOMO81 and ISBSG R8.}, isbn = {978-1-4799-7560-0}, doi = {10.1109/SSCI.2015.136}, author = {Idri, Ali and Hassani, Aya and Abran, Alain} } @conference { ISI:000373736100014, title = {Segmentation of Arabic handwritten text to lines}, booktitle = {INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015)}, series = {Procedia Computer Science}, volume = {73}, year = {2015}, note = {International Conference on Advanced Wireless Information and Communication Technologies (AWICT), Natl Sch Engineers Sousse, TUNISIA, OCT 05-07, 2015}, pages = {115-121}, abstract = {Automatic recognition of writing is among the most important axes in the NLP (Natural language processing). Several entities of different areas demonstrated the need in recognition of handwritten Arabic characters; particularly banks check processing, post office for the automation of mail sorting, the insurance for the treatment of forms and many other industries. One of the most important operations in a handwriting recognition system is segmentation. Segmentation of handwritten text is a necessary step in the development of a system of automatic writing recognition. Its goal is to try to extract all areas of the lines of the text, and this operation is made difficult in the case of handwriting, by the presence of irregular gaps or overlap between lines and fluctuations of the guidance of scripture to the horizontal. In this paper, we have developed three approaches of handwritten Arabic text segmentation, then we compared between these three approaches.}, issn = {1877-0509}, doi = {10.1016/j.procs.2015.12.056}, author = {Mokhtari, Younes and Yousfi, Abdellah}, editor = {Boubiche, DE and Hidoussi, F and Cruz, HT} } @conference {Ettazi2015553, title = {Towards a context-aware adaptation approach for transactional services}, booktitle = {ICEIS 2015 - 17th International Conference on Enterprise Information Systems, Proceedings}, volume = {2}, year = {2015}, note = {cited By 0}, pages = {553-562}, abstract = {One goal of ubiquitous computing is to enable users to access and perform transactions from any location, at any time and from any device. In a context-aware environment, transaction management is a critical task that requires a dynamic adaptation to the changing context in order to provide service reliability and data consistency. In this paper, we propose a new approach for managing context-aware transactional services. Then we discuss the various researches that have addressed this issue. Finally, we propose a new model for the adaptability of context-aware transactional services called CATSM (Context-Aware Transactional Service Model) and the adaptation mechanisms to implement this model. Copyright {\textcopyright} 2015 SCITEPRESS - Science and Technology Publications.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84939533791\&partnerID=40\&md5=c938ca86129c8fc5a5d5f6d0b73d993e}, author = {Ettazi, W.a and Hafiddi, H.a b and Nassar, M.a and Ebersold, S.c} } @conference { ISI:000380450100053, title = {Towards an approach for behavioral specification of Reactive Multi-Agent system}, booktitle = {2015 5TH INTERNATIONAL CONFERENCE ON INFORMATION \& COMMUNICATION TECHNOLOGY AND ACCESSIBILITY (ICTA)}, year = {2015}, note = {5th International Conference on Information and Communication Technology and Accessbility (ICTA), Marrakech, MOROCCO, DEC 21-23, 2015}, abstract = {Reactive Multi-Agent system (RMAS) has emerged as an attractive technology for the design and implementation of distributed and cooperative systems. The RMAS main challenge is how to clearly identify its local and global behavior. Several approaches have been introduced to deal with behavioral specification of RMAS. However, there is a lack in the specification and verification process that facilitates understanding the system from goals identification that the system expects to achieve to formal verification of system properties. In this paper, we are interested to the specification problem of Reactive Multi-Agent System (RMAS) for both individual and collective behavior by taking into account two modes of specification: normal mode and fault-tolerance mode. To do so, we propose a method called BECAMEDA (Behavioral SpEcification and VerifiCAtion of RMAS based on E-MDRA) for the specification and verification of reactive Multi-agent system based on the MDRA (Multi-Decisional Reactive Agent) models. The MDRA specifies the reactive agent behavior by highlighting the decisional aspect of the agent. The BECAMEDA method will be described throughout an example of Car Crisis Management.}, author = {Haqiq, Abdelhay and Bounabat, Bouchaib} } @conference {Haqiq2015, title = {Towards an approach for behavioral specification of reactive multi-agent system}, booktitle = {2015 5th International Conference on Information and Communication Technology and Accessibility, ICTA 2015}, year = {2015}, note = {cited By 0}, abstract = {Reactive Multi-Agent system (RMAS) has emerged as an attractive technology for the design and implementation of distributed and cooperative systems. The RMAS main challenge is how to clearly identify its local and global behavior. Several approaches have been introduced to deal with behavioral specification of RMAS. However, there is a lack in the specification and verification process that facilitates understanding the system from goals identification that the system expects to achieve to formal verification of system properties. In this paper, we are interested to the specification problem of Reactive Multi-Agent System (RMAS) for both individual and collective behavior by taking into account two modes of specification: normal mode and fault-tolerance mode. To do so, we propose a method called BECAMEDA (Behavioral SpEcification and VerifiCAtion of RMAS based on E-MDRA) for the specification and verification of reactive Multi-agent system based on the MDRA (Multi-Decisional Reactive Agent) models. The MDRA specifies the reactive agent behavior by highlighting the decisional aspect of the agent. The BECAMEDA method will be described throughout an example of Car Crisis Management. {\textcopyright} 2015 IEEE.}, doi = {10.1109/ICTA.2015.7426924}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84988311281\&doi=10.1109\%2fICTA.2015.7426924\&partnerID=40\&md5=b90071d788aab87fd79309f12b99b1bf}, author = {Haqiq, A. and Bounabat, B.} } @conference { ISI:000380407100058, title = {Towards Deployment of a User-Aware Tenancy Using Rich-Variant Components for SaaS Applications}, booktitle = {2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15)}, year = {2015}, note = {International Conference on Cloud Computing Technologies and Applications (CloudTech), Marrakech, MOROCCO, JUN 02-04, 2015}, pages = {50-55}, abstract = {The approach of User-Aware Tenancy integrates the high configurability of multi-tenant applications with the flexibility and the functional variability of Rich-Variant Component use. Multi-tenancy concept consists in sharing instances among a large group of customers, called tenants. Multi-tenancy is a tool to exploit economies of scale widely promoted by Software as a Service (SaaS) models. However, the ability of a SaaS application to be adapted to individual tenant{\textquoteright}s needs seem to be a major requirement. Thus, our approach focuses on more flexibility and more reusability for Multi-tenant SaaS application using the multiview notion of Rich-Variant Components. The approach consists in a user-aware tenancy for SaaS. In this paper, we provide an application of an algorithm deriving the necessary instances of Rich-Variant Components building the application in a scalable and performing manner. The algorithm is based on fundamental concepts from the graph theory, and is accompanied by a reduced school management application as an illustrating example.}, isbn = {978-1-4673-8149-9}, author = {Kriouile, Houda and El Asri, Bouchra and El Haloui, M{\textquoteright}barek and Benali, Asmae} } @conference {Kriouile2015, title = {Towards deployment of a user-aware tenancy using rich-variant components for SaaS applications}, booktitle = {Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015}, year = {2015}, note = {cited By 0}, abstract = {The approach of User-Aware Tenancy integrates the high configurability of multi-tenant applications with the flexibility and the functional variability of Rich-Variant Component use. Multi-tenancy concept consists in sharing instances among a large group of customers, called tenants. Multi-tenancy is a tool to exploit economies of scale widely promoted by Software as a Service (SaaS) models. However, the ability of a SaaS application to be adapted to individual tenant{\textquoteright}s needs seem to be a major requirement. Thus, our approach focuses on more flexibility and more reusability for Multi-tenant SaaS application using the multiview notion of Rich-Variant Components. The approach consists in a user-aware tenancy for SaaS. In this paper, we provide an application of an algorithm deriving the necessary instances of Rich-Variant Components building the application in a scalable and performing manner. The algorithm is based on fundamental concepts from the graph theory, and is accompanied by a reduced school management application as an illustrating example. {\textcopyright} 2015 IEEE.}, doi = {10.1109/CloudTech.2015.7337019}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962798426\&doi=10.1109\%2fCloudTech.2015.7337019\&partnerID=40\&md5=1097c82a9d464b18b102f40d386e959a}, author = {Kriouile, H. and El Asri, B. and El Haloui, M. and Benali, A.} } @article { ISI:000358592700006, title = {Towards Services-Based Enterprise Architecture for Cloud Computing-Opened Information Systems}, journal = {JOURNAL OF COMPUTERS}, volume = {10}, number = {3}, year = {2015}, month = {MAY}, pages = {195-202}, abstract = {With the development of cloud computing technologies and the multiplication of enterprise architecture reference frameworks, the industrials are encouraged to take into account the new concepts of cloud service in the evolution of their information system strategies. The present paper starts by presenting background concepts and the state of the art of the enterprise architecture, in order to propose a maturity model that helps enterprises to build and evaluate a functional component of their Information System architecture and allow them to qualify its externalization to the Cloud Computing as well as its monitoring.}, issn = {1796-203X}, author = {El Haloui, M{\textquoteright}barek and Kriouile, Houda and Kriouile, Abdelaziz} } @article {Ettazi2015479, title = {A user centered design approach for transactional service adaptation in context aware environment}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {9466}, year = {2015}, note = {cited By 0}, pages = {479-484}, abstract = {Today, information systems are radically marked by considerable progress in the areas of software engineering, telecommunications and ubiquitous computing. This has led to the development of new interaction pattern where the service oriented architecture is the de facto pattern. In this article, we are particularly interested in transactional services. We position our approach in the context of a user-centered model driven engineering (MDE) approach in order to move from one perspective where models were contemplative artifacts to a perspective where they become productive artifacts. For this, we first present our approach for managing context-aware transactional services (CATS). Then, we propose a CATS specification and metamodel. The adaptation mechanism is also detailed in this paper. {\textcopyright} Springer International Publishing Switzerland 2015.}, doi = {10.1007/978-3-319-26850-7_35}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84961168931\&doi=10.1007\%2f978-3-319-26850-7_35\&partnerID=40\&md5=161ddb896204ff4729d19420302d0566}, author = {Ettazi, W.a and Hafiddi, H.a b and Nassar, M.a} } @conference { ISI:000383221800006, title = {Using Cloud SaaS to ensure interoperability and standardization in heterogeneous Cloud based environment}, booktitle = {PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT)}, year = {2015}, note = {5th World Congress on Information and Communication Technologies (WICT), Marrakesh, MOROCCO, DEC 14-16, 2015}, pages = {29-34}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, abstract = {During the last years, because of the evolution of Cloud applications and the attractive advantages given to consumers, many companies outsource their data and Information Technology (IT) system to the Cloud based technology. With the growth in the number of Cloud Service Providers, many enterprises and organizations can use and associate services from multiple providers. There may be many Internet protocols for service access standards that are used to ensure interoperability between users browser and Web server, such as Representational State Transfer (REST) and Simple Object Access Protocol (SOAP). Each service has its specific characteristics such as authentication and security requirements. Hence, Cloud providers attempt to lock customers into proprietary interfaces so consumers can find themselves at not expects inevitable vendor lock-in. Therefore, the focus of our paper is to propose a solution to this problem by using Cloud intermediate between Cloud providers and consumer in heterogeneous Cloud environments interfaces. This is to achieve benefits such as standardization and interoperability, minimizing lock-in of Cloud providers. To reach such benefits, we propose a Cloud SaaS based on two interfaces and an interne component. These interfaces are used in Cloud Consumer and Provider sides and therefore guarantee communication between Cloud Consumer and Provider using different Internet protocols for Web service access such as REST and SOAP. Our approach guarantees interoperability and standardization in heterogeneous Cloud based environments because in this case Cloud Consumer and Provider using REST interface can communicate easily with Cloud Provider and Consumer using SOAP interface.}, isbn = {978-1-4673-8712-5}, author = {Majda, Elhozmari and Ahmed, Ettalbi}, editor = {Abrahim, A and Alimi, AM and Haqiq, A and Karray, H and Mousannif, H and BenHalima, M and Choo, YH and Ma, K} } @conference { ISI:000366999600145, title = {Asymmetric and Dynamic Encryption for Routing Security in MANETs}, booktitle = {2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2014}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, MOROCCO, APR 14-16, 2014}, pages = {825-830}, abstract = {In mobile ad-hoc networks (MANETs), data transmission is usually performed between mobile entities in an environment without infrastructure. So, data security is a key issue in MANETs. In this paper, we propose a security solution for the routing protocol OLSR. Our system is based on a new approach of asymmetric and dynamic encryption. Our goal is to properly secure the traffic against potential attacks without decreasing network performances.}, isbn = {978-1-4799-3824-7}, author = {Echchaachoui, Adel and Choukri, Ali and Habbani, Ahmed and Elkoutbi, Mohamed} } @conference { ISI:000360829800037, title = {Automata-Based Approach to Design and Analyze Security Policies}, booktitle = {2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST)}, year = {2014}, note = {12th Annual International Conference on Privacy, Security and Trust (PST), Ryerson Univ, Toronto, CANADA, JUL 23-24, 2014}, pages = {306-313}, abstract = {Information systems must be controlled by security policies to protect them from undue accesses. Security policies are often designed by rules expressed using informal text, which implies ambiguities and inconsistencies in security rules. Our objective in this paper is to develop a formal approach to design and analyze security policies. We propose a procedure that synthesizes an automaton which implements a given security policy. Our automata-based approach can be a common basis to analyze several aspects of security policies. We use our automata-based approach to develop three analysis procedures to: verify completeness of a security policy, detect anomalies in a security policy, and detect functional discrepancies between several implementations of a security policy. We illustrate our approach using examples of security policies for a firewall.}, isbn = {978-1-4799-3503-1}, author = {Krombi, Wadie and Erradi, Mohammed and Khoumsi, Ahmed}, editor = {Miri, A and Hengartner, U and Huang, NF and Josang, A and GarciaAlfaro, J} } @conference {Amraoui2014326, title = {CCS: A Correct Cooperation Strategy based on game theory for MANETS}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, volume = {2014}, year = {2014}, note = {cited By 1}, pages = {326-332}, abstract = {Mobile ad hoc networks (MANETs) is a multihop wireless communication network supporting mobile users (nodes) without any existing infrastructure and depend of the individual behavior of the nodes. This nature of MANETs imposes the cooperation among nodes to improve quality of service and security especially that mobility and energy are the most important criteria in MANETs. In such networks, devices can have different configurations, and should cooperate to ensure the existence of such networks. Cooperation enforcement mechanism do not provide strong authentication of entities. However, cooperation may be more difficult to apply in MANETS than infrastructure based networks due to many reasons already mentioned. In this paper we{\textquoteright}ll present a correct strategy based on cooperation rate (CR) to enforce cooperation and communication between nodes in MANET using OLSR routing protocol. The concept of this strategy based on game theory is focused on track keeps by each nodes and calculate the CR of other nodes. The CR is calculated based on various types of OLSR messages (HELLO, TC, MID and HNA) sent among nodes, and also based on different network processing (forwarding and routing). {\textcopyright} 2014 IEEE.}, doi = {10.1109/AICCSA.2014.7073216}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84988269680\&doi=10.1109\%2fAICCSA.2014.7073216\&partnerID=40\&md5=bc6ef75e71388636784417f4f74c2910}, author = {Amraoui, H.a and Habbani, A.a b and Hajami, A.c} } @conference {Bounagui2014, title = {Challenges for IT based cloud computing governance}, booktitle = {2014 9th International Conference on Intelligent Systems: Theories and Applications, SITA 2014}, year = {2014}, note = {cited By 0}, abstract = {For some years now, the concept of Cloud Computing (CC) is presented as the new revolution of information technology. It presents not only a technical innovation for better IT system flexibility, improvement of working methods and cost control, but also a new economic model, built around the concept of IT Services that are identifiable, classifiable and countable for end users, who can benefit by paying for use without having to make huge investments. In this paper, we show that despite these advantages, the implementation of such a concept has an impact on the enterprise stakeholders (IT Direction, Business Direction, Suppliers Direction, etc.). Many aspects must be managed differently from traditional systems. Availability, security, privacy and compliance are just some of the aspects that must be monitored and managed more effectively. Thus, the IT based CC governance is a necessity in terms of defining good management practices, especially because there is a lack of an adapted Governance Framework. The current IT governance practices/standards (ITIL, COBIT, ISO2700x, etc.) still have many limitations: they are far from covering an {\textquoteright}end-to-end{\textquoteright} governance; they are difficult to use and to maintain and have many overlapping points. It becomes mandatory for companies to address these challenges and control the capabilities offered by the CC, develop cloud oriented policies that reflect their exact needs and to have a flexible, coherent and global IT based CC Governance Framework. {\textcopyright} 2014 IEEE.}, doi = {10.1109/SITA.2014.6847289}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84904638805\&doi=10.1109\%2fSITA.2014.6847289\&partnerID=40\&md5=de0dd2a4210b805d1ae83c7e790998e6}, author = {Bounagui, Y.a and Hafiddi, H.a b and Mezrioui, A.a} } @conference { ISI:000358381600012, title = {Effect of selfish behaviour on OLSR and AODV Routing Protocols in MANETs}, booktitle = {2014 GLOBAL SUMMIT ON COMPUTER \& INFORMATION TECHNOLOGY (GSCIT)}, year = {2014}, note = {Global Summit on Computer and Information Technology (GSCIT), Sousse, TUNISIA, JUN 14-16, 2014}, publisher = {IEEE Tunisia Sect; IEEE; Future Technologies \& Innovat}, organization = {IEEE Tunisia Sect; IEEE; Future Technologies \& Innovat}, abstract = {In this paper, we{\textquoteright}ll try to discuss the cooperation of nodes representing one of the important factors in improving the quality of service (QoS) and security in mobile ad hoc networks (MANETs). The routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. In such networks, the Selfish behaviour is among the big challenges and can lead to the degradation of the network performance. We{\textquoteright}ll introduce this behaviour and. We{\textquoteright}ll propose a new profile to assess the impact on the performance of MANETs: energy, end-to-end delay, routing packets and the packets rate. The Results of simulations using OLSR and AODV protocols have shown that energy-based selfishness is a big problem and could affect the performance in MANETS depending on the mobility of nodes, size and density of the network. We{\textquoteright}ll try to prove that the selfish behaviour can be used to impact quality of service (QoS) and security in MANETS. Therefore, we need a comprehensive mechanism to cope with this behaviour to isolate selfishness nodes and we have planned to publish it in the future work as a new strategy based on game theory to encourage nodes to cooperate.}, isbn = {978-1-4799-5627-2}, author = {Amraoui, Hicham and Habbani, Ahmed and Hajami, Abdelmajid} } @conference { ISI:000366999600144, title = {An Energy Efficient Clustering Algorithm for MANETs}, booktitle = {2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2014}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, MOROCCO, APR 14-16, 2014}, pages = {819-824}, abstract = {This paper describes a routing system for a communication network constituted by several ad hoc mobile nodes. This system optimizes energy consumption. It divides the network into clusters. Thereafter it detects the best way in terms of energy to be taken by a stream of data. This consists to calculate the energy required for each available path and select the optimal gateways. Each cluster is identified by a cluster-head which is elected according to its position and its residual energy by using a clustering algorithm. The main objective of this paper is to optimize the number of live nodes by assigning to each network task the appropriate nodes.}, isbn = {978-1-4799-3824-7}, author = {Choukri, Ali and Habbani, Ahmed and El koutbi, Mohamed} } @conference { ISI:000360095400010, title = {A Formal Modeling Approach for Emergency Crisis Response in Health during Catastrophic Situation}, booktitle = {INFORMATION SYSTEMS FOR CRISIS RESPONSE AND MANAGEMENT IN MEDITERRANEAN COUNTRIES}, series = {Lecture Notes in Business Information Processing}, volume = {196}, year = {2014}, note = {1st International Conference on Information Systems for Crisis Response and Management in Mediterranean Countries (ISCRAM-Med), Toulouse, FRANCE, OCT 15-17, 2014}, pages = {112-119}, publisher = {ISCRAM Assoc; IRIT Lab Toulouse; Univ Toulouse; Univ Lorraine; Ecole Mines Albi Carmaux}, organization = {ISCRAM Assoc; IRIT Lab Toulouse; Univ Toulouse; Univ Lorraine; Ecole Mines Albi Carmaux}, abstract = {The EMS (Emergency Medical Services: {\textquoteleft}{\textquoteleft}SAMU{{\textquoteright}{\textquoteright}}), which is affiliated to the Moroccan Ministry of Health, is normally dedicated to coordinate, regulate and carry the sick and road casualty to the most suitable hospital facilities. In times of crisis, the EMS (SAMU) collaborates and coordinates with other stakeholders namely Civil Protection and Military health services by setting up advanced Medical positions (PMA). In this work we will focus mainly on the collaborative work between doctors and the EMS (SAMU) in order to provide a remote diagnosis during emergency situations. One objective of this paper is to formally specify the behavior of different components of a collaborative system architecture in telemedicine. The objective of these formal specifications is to increase the confidence in the collaborative architecture and to verify the consistency of the components assembly. This is important towards building a robust system free from specification errors and inconsistencies.}, isbn = {978-3-319-11817-8}, issn = {1865-1348}, author = {Ouzzif, Mohammed and Hamdani, Marouane and Mountassir, Hassan and Erradi, Mohammed}, editor = {Hanachi, C and Benaben, F and Charoy, F} } @article {Ouzzif2014112, title = {A formal modeling approach for emergency crisis response in health during catastrophic situation}, journal = {Lecture Notes in Business Information Processing}, volume = {196}, year = {2014}, note = {cited By 0}, pages = {112-119}, abstract = {The EMS (Emergency Medical Services: {\textquotedblleft}SAMU{\textquotedblright}), which is affiliated to the Moroccan Ministry of Health, is normally dedicated to coordinate, regulate and carry the sick and road casualty to the most suitable hospital facilities. In times of crisis, the EMS (SAMU) collaborates and coordinates with other stakeholders namely Civil Protection and Military health services by setting up advanced Medical positions (PMA). In this work we will focus mainly on the collaborative work between doctors and the EMS (SAMU) in order to provide a remote diagnosis during emergency situations. One objective of this paper is to formally specify the behavior of different components of a collaborative system architecture in telemedicine. The objective of these formal specifications is to increase the confidence in the collaborative architecture and to verify the consistency of the components assembly. This is important towards building a robust system free from specification errors and inconsistencies. {\textcopyright} Springer International Publishing Switzerland 2014.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84922058564\&partnerID=40\&md5=087f0ea4e2612716e343a7b43f7bdebe}, author = {Ouzzif, M.a and Hamdani, M.b and Mountassir, H.c and Erradi, M.d} } @conference {ElHamlaoui2014, title = {Heterogeneous models matching for consistency management}, booktitle = {Proceedings - International Conference on Research Challenges in Information Science}, year = {2014}, note = {cited By 2}, abstract = {This work is situated in the context of the application of Model Driven Engineering to complex systems view-based modelling. In fact, view-based models - called also partial models - are manipulated by different actors (designers), and are thus generally heterogeneous, that is, described with different DSLs (Domain Specific Languages). Instead of building a single global model, which is not realistic, we propose to organize the different partial models as a network of related models, which provides a global view of the system through a correspondence model. As models are modelled separately by different designers, they also evolve separately that induces a problem of consistency. To solve it, we propose a semi-automatic process based on the correspondence model allowing detecting changes, calculating their impacts, and proposing modifications to maintain the consistency among them. The approach is supported by a tool chain and illustrated by the example of a Bug Tracking System. {\textcopyright} 2014 IEEE.}, doi = {10.1109/RCIS.2014.6861074}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84906751582\&doi=10.1109\%2fRCIS.2014.6861074\&partnerID=40\&md5=24df7be74c52394ea7231715c49b9680}, author = {El Hamlaoui, M.a b and Ebersold, S.a and Coulette, B.a and Nassar, M.b and Anwar, A.c} } @conference { ISI:000360158500020, title = {A Hybrid Method for Solving Buffer Sizing and Inspection Stations Allocation}, booktitle = {ADVANCES IN PRODUCTION MANAGEMENT SYSTEMS: INNOVATIVE AND KNOWLEDGE-BASED PRODUCTION MANAGEMENT IN A GLOBAL-LOCAL WORLD, APMS 2014, PT III}, series = {IFIP Advances in Information and Communication Technology}, volume = {440}, year = {2014}, note = {IFIP WG 5.7 International Conference on Advances in Production Management Systems (APSM), Ajaccio, FRANCE, SEP 20-24, 2014}, pages = {156-166}, publisher = {IFIP WG 5 7 Advances Prod Management Syst; Res Federat Distributed Org Engn; CNRS Res Grp Modelling \& Anal Complex Syst; Res Inst Transports Energy \& Soc}, organization = {IFIP WG 5 7 Advances Prod Management Syst; Res Federat Distributed Org Engn; CNRS Res Grp Modelling \& Anal Complex Syst; Res Inst Transports Energy \& Soc}, abstract = {The buffer sizing problem in unreliable production lines is an important, indeed, complex combinatorial optimization problem with many industrial applications. These applications include quality, logistics and manufacturing production systems. In the formulation of the problem, the system consists of n machines, n fixed-size buffers and m inspection station in series. The objective is to minimize a combined storage and shortage costs, and also specifying the optimal location of inspection stations in the system. The present paper aims at optimizing a generalization of the model previously proposed in (Mhada et al., 2014) using a novel approach. In this approach, we combine Tabu Search (TS) and Genetic Algorithm (GA) to identify search regions with promising locations of inspection stations and an exact method to optimize the assignment of buffer sizes for each location. This approach provides a balance between diversification and intensification. Numerical results on test problems from previous research are reported. Using this approach, we can reduce the solution time by more than 97\% in some cases.}, isbn = {978-3-662-44732-1}, issn = {1868-4238}, author = {Ouzineb, Mohamed and Mhada, Fatima-Zahra and Pellerin, Robert and El Hallaoui, Issmail}, editor = {Grabot, B and Vallespir, B and Gomes, S and Bouras, A and Kiritsis, D} } @article {Ouzineb2014156, title = {A Hybrid Method for Solving Buffer Sizing and Inspection Stations Allocation}, journal = {IFIP Advances in Information and Communication Technology}, volume = {440}, number = {PART 3}, year = {2014}, note = {cited By 0}, pages = {156-166}, abstract = {The buffer sizing problem in unreliable production lines is an important, indeed, complex combinatorial optimization problem with many industrial applications. These applications include quality, logistics and manufacturing production systems. In the formulation of the problem, the system consists of n machines, n fixed-size buffers and m inspection station in series. The objective is to minimize a combined storage and shortage costs, and also specifying the optimal location of inspection stations in the system. The present paper aims at optimizing a generalization of the model previously proposed in (Mhada et al., 2014) using a novel approach. In this approach, we combine Tabu Search (TS) and Genetic Algorithm (GA) to identify search regions with promising locations of inspection stations and an exact method to optimize the assignment of buffer sizes for each location. This approach provides a balance between diversification and intensification. Numerical results on test problems from previous research are reported. Using this approach, we can reduce the solution time by more than 97\% in some cases. {\textcopyright} IFIP International Federation for Information Processing 2014.}, doi = {10.1007/978-3-662-44733-8_20}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84906923939\&doi=10.1007\%2f978-3-662-44733-8_20\&partnerID=40\&md5=b5f75772fc70897fe5981f687a616751}, author = {Ouzineb, M.a and Mhada, F.-Z.b and Pellerin, R.c and El Hallaoui, I.c} } @conference { ISI:000371484600037, title = {MINING USER PATTERNS FOR LOCATION PREDICTION IN MOBILE SOCIAL NETWORKS}, booktitle = {2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}14)}, series = {Colloquium in Information Science and Technology}, year = {2014}, note = {3rd IEEE International Colloquium on Information Science and Technology (CIST), Tetouan, MOROCCO, OCT 20-22, 2014}, pages = {213-218}, publisher = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, organization = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, abstract = {Understanding human mobility dynamics is of an essential importance to today mobile applications, including context-aware advertising and city wide sensing applications. Recently, Location-based social networks (LBSNs) have attracted important researchers{\textquoteright} efforts, to investigate spatial, temporal and social aspects of user patterns. LBSNs allow users to {\textquoteleft}{\textquoteleft}check-in{{\textquoteright}{\textquoteright}} at geographical locations and share this information with friends. In this paper, analysis of check-ins data provided by Foursquare, the online location-based social network, allows us to construct a set of features that capture: spatial, temporal and similarity characteristics of user mobility. We apply this knowledge to location prediction problem, and combine these features in supervised learning for future location prediction. We find that the supervised classifier based on the combination of multiple features offers reasonable accuracy.}, isbn = {978-1-4799-5979-2}, issn = {2327-185X}, author = {Mourchid, Fatima and Habbani, Ahmed and El koutbi, Mohamed}, editor = {ElMohajir, M and AlAchhab, M and Chahhou, M} } @conference {ElKhaddar2014461, title = {Modeling and enforcing security and service control policies using FlexRFID middleware: Healthcare scenarios}, booktitle = {Proceedings of 2014 Science and Information Conference, SAI 2014}, year = {2014}, note = {cited By 0}, pages = {461-467}, abstract = {RFID and WSN technologies are widely used in today{\textquoteright}s pervasive computing. In Wireless Sensor Networks, sensor nodes sense the physical environment and send the sensed data to the sink by multi-hops. WSN are used in many applications such as military and environment monitoring. In Radio Frequency Identification, a unique ID is assigned to a RFID tag which is associated with a real world object. RFID applications cover many areas such as Supply Chain Management (SCM), healthcare, library management, automatic toll collection, etc. The integration of both technologies will bring many advantages in the future of ubiquitous computing, through the provision of real-world tracking and context information about the objects. This will increase considerably the automation of an information system. In order to process the large volume of data captured by sensors and RFID readers in real time, a middleware solution is needed. This middleware should be designed in a way to allow the aggregation, filtering and grouping of the data captured by the hardware devices before sending them to the backend applications. In this paper we demonstrate how our middleware solution called FlexRFID handles large amount of RFID and sensor scan data, and executes applications{\textquoteright} business rules in real time through its policy-based Business Rules layer. The FlexRFID middleware provides easy addition and removal of hardware devices that capture data, as well as uses the business rules of the applications to control all its services. We demonstrate how the middleware controls some defined healthcare scenarios, and deals with the access control security concern to sensitive healthcare data through the use of policies. {\textcopyright} 2014 The Science and Information (SAI) Organization.}, doi = {10.1109/SAI.2014.6918228}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84909619846\&doi=10.1109\%2fSAI.2014.6918228\&partnerID=40\&md5=14f713233106cde74364d97b68b0b9ad}, author = {El Khaddar, M.A.a and Chraibi, M.b and Harroud, H.c and Boulmalf, M.d and Elkoutbi, M.a and Maach, A.b} } @conference { ISI:000367072600061, title = {Modeling and Enforcing Security and Service Control Policies using FlexRFID Middleware Healthcare Scenarios}, booktitle = {2014 SCIENCE AND INFORMATION CONFERENCE (SAI)}, year = {2014}, note = {Science and Information Conference (SAI), Sci \& Informat Org, London, ENGLAND, AUG 27-29, 2014}, pages = {461-467}, publisher = {Microsoft; RK Trans2Cloud; Springer; IEEE Comp Soc, UKRI Sect; IEEE Computat Intelligence Soc, UKRI Sect; IEEE}, organization = {Microsoft; RK Trans2Cloud; Springer; IEEE Comp Soc, UKRI Sect; IEEE Computat Intelligence Soc, UKRI Sect; IEEE}, abstract = {RFID and WSN technologies are widely used in today{\textquoteright}s pervasive computing. In Wireless Sensor Networks, sensor nodes sense the physical environment and send the sensed data to the sink by multi-hops. WSN are used in many applications such as military and environment monitoring. In Radio Frequency Identification, a unique ID is assigned to a RFID tag which is associated with a real world object. RFID applications cover many areas such as Supply Chain Management (SCM), healthcare, library management, automatic toll collection, etc. The integration of both technologies will bring many advantages in the future of ubiquitous computing, through the provision of real-world tracking and context information about the objects. This will increase considerably the automation of an information system. In order to process the large volume of data captured by sensors and RFID readers in real time, a middleware solution is needed. This middleware should be designed in a way to allow the aggregation, filtering and grouping of the data captured by the hardware devices before sending them to the backend applications. In this paper we demonstrate how our middleware solution called FlexRFID handles large amount of RFID and sensor scan data, and executes applications{\textquoteright} business rules in real time through its policy-based Business Rules layer. The FlexRFID middleware provides easy addition and removal of hardware devices that capture data, as well as uses the business rules of the applications to control all its services. We demonstrate how the middleware controls some defined healthcare scenarios, and deals with the access control security concern to sensitive healthcare data through the use of policies.}, isbn = {978-0-9893193-1-7}, author = {El Khaddar, Mehdia Ajana and Chraibi, Mhammed and Harroud, Hamid and Boulmalf, Mohammed and Elkoutbi, Mohammed and Maach, Abdelilah} } @article {Elmir201452, title = {Multiobjective optimization of information system quality enhancement}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {70}, number = {1}, year = {2014}, note = {cited By 0}, pages = {52-61}, abstract = {Organizations have to efficiently manage efforts they deploy in order to enhance and ensure information system quality. Unlike other research works addressing this issue, the present proposal handle quality characteristics, such interoperability and security, by taking into account the subsisting complementarity between the different quality factors, their interactions and mutual effects. This paper considers the use of multiobjective optimization techniques in order to plan effectively quality evolution in inter organizational context. To ensure this effectiveness goal, this paper proposes initially a model to represent quality evolution and planning. Quality degrees are evaluated using ratio metrics taking into account all operational assessment aspects. In a second stage, a Multi Objective Particle Swarm optimization (MOPSO) algorithm is used as a heuristic optimization technique to obtain the best efforts distribution in collaborative networks. {\textcopyright} 2005 - 2014 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84919789201\&partnerID=40\&md5=da36d7c226dd836d764f69c35231ced2}, author = {Elmir, A.a and El Hami, N.b and Elmir, B.a and Bounabat, B.a and Ellaia, R.c and Itmi, M.d} } @conference {Boukhriss2014124, title = {New technique of localization a targeted Virtual Machine in a Cloud platform}, booktitle = {WCCCS 2014 - Proceedings; 2014 5th Workshop on Codes, Cryptography and Communication Systems}, year = {2014}, note = {cited By 0}, pages = {124-127}, abstract = {Cloud computing gives another meaning to the word {\textquoteright}sharing{\textquoteright} in the world of networks. However, it gives rise to serious security problems. One of the techniques used by the attackers is the {\textquoteright}Cloud cartography{\textquoteright} which aims to locate a Virtual Machine in the cloud and launch a side channel attack. In this paper we propose a new technique for locating a virtual machine in a cloud environment. For this purpose, we will first trace the gateway of the cloud and then locate the target amongst the thousands of machines hosted in the cloud. Our attack is based on a new command TRACECL that can reach up to 100 routers, and we propose a method to locate the target Virtual Machine in a Cloud environment. {\textcopyright} 2014 IEEE.}, doi = {10.1109/WCCCS.2014.7107907}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84949928318\&doi=10.1109\%2fWCCCS.2014.7107907\&partnerID=40\&md5=f2f286ec3f7af4547eec12ede767ec25}, author = {Boukhriss, H.a and Azougaghe, A.b and Hedabou, M.a} } @conference { ISI:000378641000047, title = {Policy Based Security Middleware as a Service}, booktitle = {2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD)}, year = {2014}, note = {2nd International Conference on Future Internet of Things and Cloud (FiCloud), Barcelona, SPAIN, AUG 27-29, 2014}, pages = {322-327}, publisher = {IEEE Comp Soc, Tech Comm Internet; IEEE Comp Soc}, organization = {IEEE Comp Soc, Tech Comm Internet; IEEE Comp Soc}, abstract = {Cloud computing is amongst the major topics researched in Computer Science. Cloud computing security is at the heart of the topic. The reason behind this is that, as a technology, cloud computing is a great alternative that allows companies to outsource the management of their computing resources. However, due to the security issues, the cloud technology is not reaching its full potential. In this paper we present a system that allows the enforcement of privacy, accountability, integrity, and availability in each one of cloud computing levels using software policies. We present and describe the architecture of the Policy-Based Security Middleware as a Service.}, isbn = {978-1-4799-4357-9}, doi = {10.1109/FiCloud.2014.57}, author = {Chraibi, Mhammed and Harroud, Hamid and El Khaddar, Mehdia Ajana and Elkoutbi, Mohammed and Maach, Abdelilah} } @conference {Chraibi2014322, title = {Policy based security middleware as a service}, booktitle = {Proceedings - 2014 International Conference on Future Internet of Things and Cloud, FiCloud 2014}, year = {2014}, note = {cited By 0}, pages = {322-327}, abstract = {Cloud computing is amongst the major topics researched in Computer Science. Cloud computing security is at the heart of the topic. The reason behind this is that, as a technology, cloud computing is a great alternative that allows companies to outsource the management of their computing resources. However, due to the security issues, the cloud technology is not reaching its full potential. In this paper we present a system that allows the enforcement of privacy, accountability, integrity, and availability in each one of cloud computing levels using software policies. We present and describe the architecture of the Policy-Based Security Middleware as a Service. {\textcopyright} 2014 IEEE.}, doi = {10.1109/FiCloud.2014.57}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84922575142\&doi=10.1109\%2fFiCloud.2014.57\&partnerID=40\&md5=e2e0e77c31b6b215de057602faa575bd}, author = {Chraibi, M.a and Khaddar, M.A.E.b and Harroud, H.a and Maach, A.c and Elkoutbi, M.b} } @article {Lakki20141, title = {QoS and energy with clustering in MANETs}, journal = {Far East Journal of Electronics and Communications}, volume = {13}, number = {1}, year = {2014}, note = {cited By 1}, pages = {1-16}, abstract = {In the prior works, there are several works that address the problem of clustering in MANETs (ad hoc network). To form clusters and select cluster headers, each solution has a different criterion. In our case, it is based on the density of HELLO messages. In other words, we propose a clustering mechanism represented by a density parameter HELLO message for each cluster. This new metric we will consider in the selection process of multipoint relays to improve quality of service in mobile ad hoc networks, it gives a new version of the protocol OLSR named clustering OLSR. The NS2 simulation shows that this new version of OLSR protocol is better than the standard version. Performance indicators of our version of OLSR protocol improve the standard version. {\textcopyright} 2014 Pushpa Publishing House.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84907849019\&partnerID=40\&md5=898c8acc3b1d84502c48ccb07f7a78ab}, author = {Lakki, N.a and Habbani, A.a b and El Abbadi, J.a} } @conference { ISI:000349979900075, title = {A Semantic Approach for Service Adaptation in Context-Aware Environment}, booktitle = {9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC{\textquoteright}14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC{\textquoteright}14) / AFFILIATED WORKSHOPS}, series = {Procedia Computer Science}, volume = {34}, year = {2014}, note = {9th International Conference on Future Networks and Communications (FNC), Niagara Falls, CANADA, AUG 17-20, 2014}, pages = {587-592}, abstract = {With pervasive computing, Service oriented architectures become more mobile and distributed and are executed in varying contexts. Context is understood as any information about the user needs and operating environment which vary dynamically and have an impact on design choices. Context aware Services oriented systems have emerged as an underlying design and development paradigm. An important challenge in such systems is context modeling, reasoning and adaptating services behavior. Using ontologies and semantic web services to deal with context aware services has attracted a lot of interest. In this paper, we present an architecture for the development of context aware services based on ontologies. We highlight our context metamodel and discuss about reasoning process. we also present our semantic approach for service adaptation in context aware environment. (c) 2014 Elsevier B.V.}, issn = {1877-0509}, doi = {10.1016/j.procs.2014.07.077}, author = {Guermah, Hatim and Fissaa, Tarik and Hafiddi, Hatim and Nassar, Mahmoud and Kriouile, Abdelaziz}, editor = {Shakshuki, EM} } @conference { ISI:000345780700059, title = {Survey of Non-Functional Requirements Modeling and Verification of Software Product Lines}, booktitle = {2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS)}, series = {International Conference on Research Challenges in Information Science}, year = {2014}, note = {IEEE 8th International Conference on Research Challenges in Information Science (RCIS), Marrakesh, MOROCCO, MAY 28-30, 2014}, publisher = {IEEE; IEEE Morocco Sect; EMSI; Lab Math Informatique \& Applicat}, organization = {IEEE; IEEE Morocco Sect; EMSI; Lab Math Informatique \& Applicat}, abstract = {Undoubtedly, Non-Functional Requirements (NFR) such as security, performance and reliability are critical to software systems as there is a growing demand on a higher quality of software. Simultaneously, the increasing pressure to develop software in less time and at lower costs drives software industry towards the promising paradigm of Software Product Line (SPL). However, different approaches have been advanced for modeling NFR of the traditional individual products and few approaches focused on a family of products. On the other hand, as a product line contains several products, it is impracticable and not feasible to verify NFR for each possible product. Therefore, there is a major need for verification approaches specific to product lines. In this paper, we present and analyze the main NFR modeling and verification approaches of SPL.}, isbn = {978-1-4799-2393-9}, issn = {2151-1349}, author = {Hammani, Fatima Zahra}, editor = {Bajec, M and Collard, M and Deneckere, R} } @article {Hamlaoui2014132, title = {Towards a framework for heterogeneous models matching}, journal = {Journal of Software Engineering}, volume = {8}, number = {3}, year = {2014}, note = {cited By 2}, pages = {132-151}, abstract = {The overall goal of our approach is to relate models of a given domain that are created by different actors and thus are generally heterogeneous that is, described in different DSL (Domain Specific Languages). Instead of building a single global model, we propose to organize the different source models as a network of models which provides a global view of the system through a virtual global model. The matching of these models is done in a shared model of correspondences. We focus in this study on the elaboration of the model of correspondences, through a transformation called "refine" . The approach is illustrated by a representative use case (a Bug Tracking System) and supported by a modeling tool called HMS (Heterogeneous Matching Suite). {\textcopyright} 2014 Academic Journals Inc.}, doi = {10.3923/jse.2014.132.151}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84899886336\&doi=10.3923\%2fjse.2014.132.151\&partnerID=40\&md5=2803984c51fbf1cde93310f1e0f01e33}, author = {Hamlaoui, M.E.a b and Ebersold, S.a and Anwar, A.c and Coulette, B.a and Nassar, M.b} } @conference {Maarouf2014715, title = {Towards a MDE approach for the establishment of a contract service level monitoring by third party in the cloud computing}, booktitle = {Proceedings - 10th International Conference on Signal-Image Technology and Internet-Based Systems, SITIS 2014}, year = {2014}, note = {cited By 5}, pages = {715-720}, abstract = {Cloud Computing (CC) marks a new step towards IT infrastructure dematerialization. Cloud provides IT resources, software and hardware, remotely accessible, as a service. The adoption of this model raises a number of challenges, particularly with regard to Quality of the provided services. To cope with a highly dynamic environment such as the CC, it is essential to determine in real time Quality of Service (QoS) to meet consumer{\textquoteright}s SLA (Service Level Agreements) specifications. In this context, agreements (contract) service level form an appropriate solution to specify these QoS guarantees. It specifies one or more service level objectives (SLO), to guarantee that the delivered QoS satisfies the consumer expectations. Monitoring these QoS agreements for the management of the relationships, between, cloud providers and their services customers is an area that attracts the attention of many researchers and industrialists in the cloud. In our work we introduce the concept of monitoring and respect of the QoS, then we present a third party service provider that ensures the respect of the Quality of Service in real-time to guarantee the performance and the reliability of the Cloud. {\textcopyright} 2014 IEEE.}, doi = {10.1109/SITIS.2014.30}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84928525608\&doi=10.1109\%2fSITIS.2014.30\&partnerID=40\&md5=44f801e0316e4b438967a94b6d2e2f32}, author = {Maarouf, A.a and Marzouk, A.a and Haqiq, A.a and El Hamlaoui, M.b} } @conference { ISI:000380564200105, title = {Towards a MDE approach for the establishment of a Contract Service Level Monitoring by Third Party in the Cloud Computing}, booktitle = {10TH INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY AND INTERNET-BASED SYSTEMS SITIS 2014}, year = {2014}, note = {International Conference on Signal-Image Technology and Internet-Based Systems SITIS, Marrakesh, MOROCCO, NOV 23-27, 2014}, pages = {715-720}, abstract = {Cloud Computing (CC) marks a new step towards IT infrastructure dematerialization. Cloud provides IT resources, software and hardware, remotely accessible, as a service. The adoption of this model raises a number of challenges, particularly with regard to Quality of the provided services. To cope with a highly dynamic environment such as the CC, it is essential to determine in real time Quality of Service (QoS) to meet consumer{\textquoteright}s SLA (Service Level Agreements) specifications. In this context, agreements contract) service level form an appropriate solution to specify these QoS guarantees. It specifies one or more service level objectives (SLO), to guarantee that the delivered QoS satisfies the consumer expectations. Monitoring these QoS agreements for the management of the relationships, between, cloud providers and their services customers is an area that attracts the attention of many researchers and industrialists in the cloud. In our work we introduce the concept of monitoring and respect of the QoS, then we present a third party service provider that ensures the respect of the Quality of Service in real-time to guarantee the performance and the reliability of the Cloud.}, isbn = {978-1-4799-7978-3}, doi = {10.1109/SITIS.2014.30}, author = {Maarouf, Adil and Marzouk, Abderrahim and Haqiq, Abdelkrim and El Hamlaoui, Mahmoud}, editor = {Yetongnon, K and Dipanda, A and Chbeir, R} } @conference {Hammani2014146, title = {Towards a variable non-functional requirements integration for component-based product line: A generic approach}, booktitle = {2014 2nd World Conference on Complex Systems, WCCS 2014}, year = {2014}, note = {cited By 0}, pages = {146-151}, abstract = {Software Product Line and Component-Based Software Engineering are two expanding paradigms for developing critical and complex systems. Therefore, these two paradigms seem have complementary strengths. So, significant benefits can be gained from their integration. Despite the fact that Non-Functional Requirements (such as security, performance and reliability) are critical to software systems, and they must be taken into account at early stage of software development life cycle and should be explicitly specified as well as functional requirements; these NFR are overlooked in Software Product line and Component-Based Software Development Processes. So, our main objective is to discuss some recent approaches in the field and to propose a new extension to Software Product Line processes that supports Component-Based Approaches, and integrates Non-Functional Requirement in domain requirements stage. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICoCS.2014.7060992}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84988286060\&doi=10.1109\%2fICoCS.2014.7060992\&partnerID=40\&md5=3c43beb6d08dd3ee03dc69958f9d5ee7}, author = {Hammani, F.Z. and Rhanoui, M. and El Asri, B.} } @conference { ISI:000380387700115, title = {Towards a Variable Non-Functional Requirements Integration for Component-Based Product Line}, booktitle = {2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS)}, year = {2014}, note = {2014 Second World Conference on Complex Systems (WCCS), Agadir, MOROCCO, NOV 10-12, 2014}, pages = {146-151}, publisher = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, organization = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, abstract = {Software Product Line and Component-Based Software Engineering are two expanding paradigms for developing critical and complex systems. Therefore, these two paradigms seem have complementary strengths. So, significant benefits can be gained from their integration. Despite the fact that Non-Functional Requirements (such as security, performance and reliability) are critical to software systems, and they must be taken into account at early stage of software development life cycle and should be explicitly specified as well as functional requirements; these NFR are overlooked in Software Product line and Component-Based Software Development Processes. So, our main objective is to discuss some recent approaches in the field and to propose a new extension to Software Product Line processes that supports Component-Based Approaches, and integrates Non-Functional Requirement in domain requirements stage.}, isbn = {978-1-4799-4647-1}, author = {Hammani, Fatima Zahra and Rhanoui, Maryem and El Asri, Bouchra} } @conference { ISI:000366999600174, title = {Towards an Ontology based Architecture for Context-Aware Services Composition}, booktitle = {2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2014}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, MOROCCO, APR 14-16, 2014}, pages = {990-995}, abstract = {An important challenge in pervasive computing environments is to automatically enable software applications by dynamically composing services. Service composition is a way to plan a business process to fulfill business goals that cannot be achieved by individual business services. Given a representation of services in OWL-S, service composition can be modeled as an Artificial Intelligence planning (AI planning) problem. Based on the initial context and the goal context, planning-based service composition launches a goal-oriented composition procedure to generate a plan for the service composition. In this paper, we present an overview of the architecture for the composition of context aware services based on ontologies, we also present our Composition Planner that allows to generate a plan corresponding to the request of the users according to their context.}, isbn = {978-1-4799-3824-7}, author = {Fissaa, Tarik and Guermah, Hatim and Hafiddi, Hatim and Nassar, Mahmoud and Kriouile, Abdelaziz} } @conference {ElHamlaoui201453, title = {Towards an ontology-based approach for heterogeneous model matching}, booktitle = {CEUR Workshop Proceedings}, volume = {1236}, year = {2014}, note = {cited By 0}, pages = {53-62}, abstract = {The overall goal of our approach is to relate models - of a given domain - that are designed by different actors in different Domain Specific Languages, and thus are heterogeneous. Instead of building a single global model, we propose to organize the different source models as a network of models, which provides a global view of the system through a correspondence model. This latter, conform to a correspondence meta-model is built via a manual matching process. In this paper we explore the possibility of representing models as ontologies and take advantage of an automated process to match them.in order to enhance the automation of the matching process.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84911940557\&partnerID=40\&md5=3968ced6860eb6d70c7f0d5c78a95a83}, author = {El Hamlaoui, M.a b and Trojahn, C.a and Ebersold, S.a and Coulette, B.a} } @conference { ISI:000380387700080, title = {Towards Flexible and Reusable SaaS for Multi-tenancy To design, implement and bind multi-functional variability for Rich-Variant services}, booktitle = {2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS)}, year = {2014}, note = {2014 Second World Conference on Complex Systems (WCCS), Agadir, MOROCCO, NOV 10-12, 2014}, pages = {164-170}, publisher = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, organization = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, abstract = {Software-as-a-Service (SaaS) is a new delivery model, that involves providing applications to the customer on demand over the Internet. SaaS promotes multi-tenancy as a tool to exploit economies of scale. However, the flexibility of an application to be adapted to individual tenant{\textquoteright}s needs is a major requirement. Thus, we initiate in this paper to an approach proposing a more flexible and reusable SaaS system for multitenancy. This approach consist on integrating a functional variability using Rich-Variant Components with a deployment variability enabling the customers to choose with which others tenants they want or don{\textquoteright}t want to share instances. The approach presented enables exploiting the economies of scale while avoiding the problem of customers{\textquoteright} hesitation about sharing with other tenants.}, isbn = {978-1-4799-4647-1}, author = {Kriouile, Houda and El Asri, Bouchra and El Haloui, M{\textquoteright}barek} } @article {Hdioud2014495, title = {Video surveillance: Analyzing people{\textquoteright}s movements in a closed environment}, journal = {International Review on Computers and Software}, volume = {9}, number = {3}, year = {2014}, note = {cited By 1}, pages = {495-501}, abstract = {In this paper, we developed a method for tracking multiple people in a closed environment based on the feed of a surveillance camera. Monitoring the evolution of the position of people in real time has enabled us to get information on areas occupied by each person in a scene. In addition, to consolidate the trajectories obtained in homogeneous classes, we proposed a new algorithm which allows to adapt the hierarchical classification technique (CHA) and the KMeans technique in cases of similarity measures between trajectories. {\textcopyright} 2014 Praise Worthy Prize S.r.l. - All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84901056262\&partnerID=40\&md5=6dbe9ab0e6c6e8ac8f7c70924419b152}, author = {Hdioud, B.a and Tirari, M.E.H.b and Thami, R.O.H.a} } @conference {Idri2013483, title = {Assessing RBFN-based software cost estimation models}, booktitle = {Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE}, volume = {2013-January}, number = {January}, year = {2013}, note = {cited By 2}, pages = {483-487}, abstract = {This paper is concerned with the design of the neural networks approach, especially Radial Basis Function Neural (RBFN) networks, for software effort estimation models. The study firstly focuses on the construction of the RBFN middle layer composed of receptive fields, using two clustering techniques: hard C-means and fuzzy C-means. Thereafter, we evaluate and compare the performance of effort estimation models that use an RBFN construction-based either on hard or fuzzy C-means. This study uses the ISBSG dataset and confirms the usefulness of an RBFN-based on fuzzy C-means for software effort estimation. Copyright {\textcopyright} 2013 by Knowledge Systems Institute Graduate School.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84937716255\&partnerID=40\&md5=26b8de65f7c08367f5351ab898bf97a8}, author = {Idri, A.a and Hassani, A.a and Abran, A.b} } @article { ISI:000337796300003, title = {Buffer dimensioning and control stations positioning with a space partitioning-tabu search approach}, journal = {INFOR}, volume = {51}, number = {1, SI}, year = {2013}, month = {FEB}, pages = {15-22}, abstract = {We propose an efficient heuristic method based on Space Partitioning (SP) and Tabu Search (TS) to solve the buffer sizing problem in unreliable production lines with several inspection stations. In such problem, we have an unreliable production line consisting of a certain number of machines and fixed-size buffers. These machines produce a single part with two different quality levels: conforming and non-conforming parts. The production line may contain inspection stations whose job is to reject the non-conforming parts from the line. The production line must meet a constant rate of demand for the conforming finished parts. The objective is to minimize the average long term combined storage and shortage costs, while also specifying the optimal location of inspection stations. This design problem is a difficult mixed integer nonlinear program. Solving even a small instance of 10 machines and one inspection station using a direct dynamic programming method takes hours. If we especially increase the number of machines or the inspection stations, the dynamic programming approach becomes drastically inefficient. The method we propose divides the search space into a set of disjoint subspaces using a space partitioning technique. Tabu search is used to intensify the search in the selected subspaces. This combined method finds optimal solutions for small instances in a fraction of dynamic programming time. For the largest instances (up to 20 machines) the dynamic programming approach was unable to solve, our method finds high-quality solutions in reasonable times.}, issn = {0315-5986}, doi = {10.3138/infor.51.1.15}, author = {Ouzineb, Mohamed and Mhada, Fatima and El Hallaoui, Issmail} } @article {9434372220130201, title = {Buffer dimensioning and control stations positioning with a space partitioning-tabu search approach.}, journal = {INFOR}, volume = {51}, number = {1}, year = {2013}, pages = {15 - 22}, abstract = {We propose an efficient heuristic method based on Space Partitioning (SP) and Tabu Search (TS) to solve the buffer sizing problem in unreliable production lines with several inspection stations. In such problem, we have an unreliable production line consisting of a certain number of machines and fixed-size buffers. These machines produce a single part with two different quality levels: conforming and non-conforming parts. The production line may contain inspection stations whose job is to reject the non-conforming parts from the line. The production line must meet a constant rate of demand for the conforming finished parts. The objective is to minimize the average long term combined storage and shortage costs, while also specifying the optimal location of inspection stations. This design problem is a difficult mixed integer nonlinear program. Solving even a small instance of 10 machines and one inspection station using a direct dynamic programming method takes hours. If we especially}, keywords = {Buffer storage (Computer science), Combinatorial Optimization, Dynamic programming, Heuristic algorithms, Inspection, Machine theory, Meta-heuristics, Production lines, Quality, Tabu search algorithm, Topology}, issn = {03155986}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=bth\&AN=94343722\&site=ehost-live}, author = {Ouzineb, Mohamed and Mhada, Fatima and El Hallaoui, Issmail} } @conference {Guermah2013, title = {Context modeling and reasoning for building context aware services}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, year = {2013}, note = {cited By 1}, abstract = {The rapid evolution of software paradigms, wireless technologies and mobile devices induced the emergence of new applications called context-aware services oriented applications. Such applications provide appropriate services or relevant information to the user or other applications to perform a specific task. An important challenge in such applications development process is context modeling and reasoning. Ontology based models presents the most promising instrument for context modeling and offers possibility of applying ontology reasoning techniques. the aim of context reasoning is converting low-level context to highlevel context in order to provide costumized services to users. In this paper, we present an architecture for the development of context aware services based on ontologies. We also highlight our context metamodel and discuss about reasoning process for e-health systems. {\textcopyright} 2013 IEEE.}, doi = {10.1109/AICCSA.2013.6616439}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84887225025\&doi=10.1109\%2fAICCSA.2013.6616439\&partnerID=40\&md5=7ca7da696e2d53b254ab9b4b909c71e7}, author = {Guermah, H.a and Fissaa, T.a and Hafiddi, H.a b and Nassar, M.a and Kriouile, A.a} } @conference { ISI:000341079600025, title = {Context Modeling and Reasoning for building Context Aware Services}, booktitle = {2013 ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA)}, year = {2013}, note = {IEEE and Arab-Computing-Society (ACS) International Conference on Computer Systems and Applications (AICCSA), Al Akhawayn Univ, Ifrane, MOROCCO, MAY 27-30, 2013}, publisher = {IEEE; Arab Comp Soc}, organization = {IEEE; Arab Comp Soc}, abstract = {The rapid evolution of software paradigms, wireless technologies and mobile devices induced the emergence of new applications called context-aware services oriented applications. Such applications provide appropriate services or relevant information to the user or other applications to perform a specific task. An important challenge in such applications development process is context modeling and reasoning. Ontology based models presents the most promising instrument for context modeling and offers possibility of applying ontology reasoning techniques. the aim of context reasoning is converting low-level context to high-level context in order to provide costumized services to users. In this paper, we present an architecture for the development of context aware services based on ontologies. We also highlight our context metamodel and discuss about reasoning process for e-health systems.}, isbn = {978-1-4799-0792-2}, author = {Guermah, Hatim and Fissaa, Tarik and Hafiddi, Hatim and Nassar, Mahmoud and Kriouile, Abdelaziz} } @article {Harbouche2013137, title = {Deriving multi-agent system behavior}, journal = {International Journal of Software Engineering and its Applications}, volume = {7}, number = {4}, year = {2013}, note = {cited By 1}, pages = {137-156}, abstract = {The multi-agent systems (MAS) have become a very powerful paradigm in the development of complex computer systems. The modeling of these systems can reduce this complexity during the development phases. The Model-Driven Architecture (MDA) approach can be used to resolve this problem. It allows designers to model their systems at different abstraction levels, providing them with automatic model transformations to incrementally refine abstract models into concrete ones. This paper presents a MDA approach to develop multi-agent system with the derivation of the behavior of a given system agent from its global requirements. The suggested approach is based on the definition of an appropriate requirements meta-model (Computational Independent Meta-Model CIMM) and the definition of a target design meta-model (Platform Independent Meta-model PIMM). The CIM models are specified using UML activity diagram extended with collaborations to describe the system global behavior. The agent{\textquoteright}s behavior model (PIM) is in the form of distributed UML state machines. Automatic model transformations between these two models have been designed in order to govern the derivation process. A real application of telediagnosis in neuroscience has been developed using this approach.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84884544209\&partnerID=40\&md5=b50eb063699a17d3e7b5f71c9c8137ae}, author = {Harbouche, A.a and Erradi, M.b and Mokhtari, A.c} } @article {Choukri2013, title = {Efficient heuristic based on clustering approach for OLSR}, journal = {Journal of Computer Networks and Communications}, volume = {2013}, year = {2013}, note = {cited By 2}, abstract = {Due to the dynamic nature of mobile ad hoc network (MANET), the quality of service (QoS) requires several improvements. The present papercomeswithin the framework of research to optimize QoS in MANET. In this paper, we propose a novel version of OLSR based on the clustering approach which is inspired from Lin and Chu heuristic and adapted to beimplemented inOLSR. We studied its stability and we compared its performances to those of standard OLSR. The metrics we used in evaluating network performances were average end-to-end delay, control routing overhead, and packet delivery ratio. Experimental results show that our alternative significantly reduces the traffic reserved to monitoring the network, which positively influences other performances such as throughput, delay, and loss. {\textcopyright} 2013 Ali Choukri et al.}, doi = {10.1155/2013/597461}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84877308430\&doi=10.1155\%2f2013\%2f597461\&partnerID=40\&md5=3aa67a9fc125b4b786e82c243f57c7bc}, author = {Choukri, A.a and Habbani, A.a b and El Koutbi, M.a} } @article {9467097620130101, title = {Efficient Heuristic Based on Clustering Approach for OLSR.}, journal = {Journal of Computer Networks \& Communications}, year = {2013}, pages = {1 - 7}, abstract = {Due to the dynamic nature of mobile ad hoc network (MANET), the quality of service (QoS) requires several improvements. The present paper comes within the framework of research to optimize QoS in MANET. In this paper, we propose a novel version of OLSR based on the clustering approach which is inspired from Lin and Chu heuristic and adapted to be implemented in OLSR. We studied its stability and we compared its performances to those of standard OLSR. The metrics we used in evaluating network performances were average end-to-end delay, control routing overhead, and packet delivery ratio. Experimental results show that our alternative significantly reduces the traffic reserved to monitoring the network, which positively influences other performances such as throughput, delay, and loss. [ABSTRACT FROM AUTHOR]}, keywords = {Ad hoc networks (Computer networks), Document clustering, Heuristic algorithms, Internet traffic, Performance evaluation, Quality of service, Routing (Computer network management)}, issn = {20907141}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=94670976\&site=ehost-live}, author = {Choukri, Ali and Habbani, Ahmed and Koutbi, Mohamed El.} } @article {Ezzahout20139, title = {An efficient people tracking system using the FFT-Correlation and Optimized SAD}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {48}, number = {1}, year = {2013}, note = {cited By 1}, pages = {9-14}, abstract = {The research questions which this study addresses are resumed in obtaining the picks of Optimized SAD and FFT-Correlation function. These values allow us to detect and track the blocs corresponding to the moving person. This Bloc-Matching system of our tracked bloc 8x8, simplify the process of detecting and tracking all the representative matrix of foreground. Practically, in this correspondence, we propose an implementation technique for detection and tracking system which detect and track people{\textquoteright}s in motion using a fixed single camera. These bi-techniques simplify the process of people tracking and give a new way for people tracking. Moreover, in this system we choose to detect moving people with the more robust algorithm (Gaussian Mixture Model) in term of misclassified pixels. Thereafter, we track a bloc 8x8 from the bounding box containing the moving person by returning the position of the similar bloc in the next frame. This bloc position is detected by maximization of the Fast Fourier Transform-Correlation (FFT-Corr) and minimizing the error: optimized Sum of Absolute Difference (OSAD) between the bloc reference and the similar bloc. {\textcopyright} 2005 - 2013 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84876021321\&partnerID=40\&md5=cfb2300d8d0e312b0c77d271b683b278}, author = {Ezzahout, A.a and Hadi, M.Y.b and Thami, R.O.H.a} } @conference {Ouzineb2013, title = {An exact method for solving the buffer sizing and inspection stations allocations problem}, booktitle = {Proceedings of 2013 International Conference on Industrial Engineering and Systems Management, IEEE - IESM 2013}, year = {2013}, note = {cited By 1}, abstract = {An unreliable single part type transfer line with fixed inter machine buffer sizes is considered. In general, imperfect machines operating with imperfect raw material, or partially processed raw material, will result in the production of a mix of conforming and non conforming parts. The problem of optimal joint assignment of buffer sizes and inspection station positions is here considered where we assume that defective parts are scrapped upon detection. The performance measure to be optimized is a combination of work in process storage and parts inspection costs, with an eye to determining the adequate number of inspection stations. We propose an exact method for solving this problem and large-scale numerical experiments are provided to demonstrate the efficiency of the proposed algorithm. Interesting properties of the problem are also denoted based on our empirical results. {\textcopyright} 2013 International Institute for Innovation, Industrial Engineering and Entrepreneurship - I4e2.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84899126497\&partnerID=40\&md5=cfe72f4685a6a787a74df5be3b83db8f}, author = {Ouzineb, M.a and Mhada, F.b and El Hallaoui, I.c and Pellerin, R.c} } @conference { ISI:000352386800113, title = {An exact method for solving the buffer sizing and inspection stations allocations problem}, booktitle = {PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND SYSTEMS MANAGEMENT (IEEE-IESM 2013)}, year = {2013}, note = {5th International Conference on Industrial Engineering and Systems Management (IEEE IESM), Mohammadia Sch Engn, Rabat, MOROCCO, OCT 28-30, 2013}, pages = {775-780}, publisher = {IEEE; IEEE Morocco Sect; I4e2; Univ Valenciennes Hannaut Cambresis; Univ Mohammed V Agdal Rabat; CNRST; CISIT; ENIM; ESITH; GDR MACS; LAMIH CNRS; IFSTTAR; IRT RAILENIUM; TEMPO}, organization = {IEEE; IEEE Morocco Sect; I4e2; Univ Valenciennes Hannaut Cambresis; Univ Mohammed V Agdal Rabat; CNRST; CISIT; ENIM; ESITH; GDR MACS; LAMIH CNRS; IFSTTAR; IRT RAILENIUM; TEMPO}, abstract = {An unreliable single part type transfer line with fixed inter machine buffer sizes is considered. In general, imperfect machines operating with imperfect raw material, or partially processed raw material, will result in the production of a mix of conforming and non conforming parts. The problem of optimal joint assignment of buffer sizes and inspection station positions is here considered where we assume that defective parts are scrapped upon detection. The performance measure to be optimized is a combination of work in process storage and parts inspection costs, with an eye to determining the adequate number of inspection stations. We propose an exact method for solving this problem and large-scale numerical experiments are provided to demonstrate the efficiency of the proposed algorithm. Interesting properties of the problem are also denoted based on our empirical results.}, isbn = {978-2-9600532-4-1}, author = {Ouzineb, Mohammed and Mhada, Fatima and El Hallaoui, Issmail and Pellerin, Robert}, editor = {Aboutajdine, D and Skalli, A and Benchekroun, B and Artiba, A} } @conference {Harbouche201344, title = {A flexible wireless body sensor network system for health monitoring}, booktitle = {Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE}, year = {2013}, note = {cited By 3}, pages = {44-49}, abstract = {The Wireless Body Sensor Network (WBSN) is a wireless network used for communication among sensor nodes operating on or inside the human body in order to monitor vital body parameters and movements. The design and the development of such systems for health monitoring have gained a lot of attention recently in both the research and the industry. Mainly motivated by the increasing of healthcare costs and propelled by the recent advances in the development of miniature health monitoring devices. This paper presents a preventive health care system with a flexible design. By using sensors nodes in combination with a mobile data collector, both daily continuous monitoring as well as specific controls are provided. In this work, we propose a system based on an architecture with heterogeneous nodes to provide continuous monitoring. A model has been defined to describe the system global behavior. An important aspect of this work is that we propose a model driven (MDE) approach to derive the behavior of each node in the network from the system global behavior. The derived behaviors include the synchronization messages to ensure the global coordination among the system components. {\textcopyright} 2013 IEEE.}, doi = {10.1109/WETICE.2013.17}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883508266\&doi=10.1109\%2fWETICE.2013.17\&partnerID=40\&md5=1a5fad127161b3ce2aa9c892e0441504}, author = {Harbouche, A.a and Erradi, M.b and Kobbane, A.b} } @conference { ISI:000386611100055, title = {Formalization of the User Centric SOA Approach Implementation and End User Satisfaction Evaluation}, booktitle = {ICEIS: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 2}, year = {2013}, note = {15th International Conference on Enterprise Information Systems (ICEIS), Angers, FRANCE, JUL 04-07, 2013}, pages = {481-488}, publisher = {ESEO Grp; Inst Syst \& Technologies Informat, Control \& Commun; Assoc Advancement Artificial Intelligence; IEICE Special Interest Grp Software Interprise Modelling; ACM Special Interest Grp Management Informat Syst; ACM Special Interest Grp Comp Human Inte}, organization = {ESEO Grp; Inst Syst \& Technologies Informat, Control \& Commun; Assoc Advancement Artificial Intelligence; IEICE Special Interest Grp Software Interprise Modelling; ACM Special Interest Grp Management Informat Syst; ACM Special Interest Grp Comp Human Inte}, abstract = {User-centric SOA is a new paradigm allowing unskilled end users to compose services to create new one. Mashups represent new agile and quick ways to compose and integrate structured and unstructured resources, from different types existing on the web. Mashups emerged as a new way to democratize the SOA and realize the user-centric SOA; However, Mashups are emerging applications, and thus consist of immature, non intuitive and non formalized area. In this paper, we formalize the user-centric SOA development by proposing a new cloud-based architecture for user-centric SOA platforms, and by introducing a new rich integration language based on the advanced Enterprise Integration Patterns (EIPS). We also propose a new intuitive and self-explanatory semantic methodology and interaction model for end users services integration. Through these contributions, we give the promise of realizing the user-centric SOA.}, isbn = {978-989-8565-60-0}, doi = {10.5220/0004446304810488}, author = {Benhaddi, Meriem and Baina, Karim and Abdelwahed, El Hassan}, editor = {Hammoudi, S and Maciaszek, L and Cordeiro, J and Dietz, J} } @conference {Hadi2013248, title = {Fulvis: New approach for selecting views to materialize in hybrid information integration}, booktitle = {2013 5th International Conference on Computer Science and Information Technology, CSIT 2013 - Proceedings}, year = {2013}, note = {cited By 0}, pages = {248-255}, abstract = {The most important disadvantage of the hybrid approach of information integration is the complexity of selecting the data to materialize, in particular if the data sources are changing and numerous. Several approaches have been proposed to make this task easier. In this paper, we show the shortcomings of the existing ones and we propose to cure this by offering a new flexible approach, we named Fulvis, based on fuzzy logic. {\textcopyright} 2013 IEEE.}, doi = {10.1109/CSIT.2013.6588788}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84884966295\&doi=10.1109\%2fCSIT.2013.6588788\&partnerID=40\&md5=925b6fbdf8e08181bbe621665960b1e6}, author = {Hadi, W. and Zellou, A. and Bounabat, B.} } @conference { ISI:000332960400040, title = {Fulvis: New approach for selecting views to materialize in Hybrid Information Integration}, booktitle = {2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT)}, series = {International Conference on Computer Science and Information Technology}, year = {2013}, note = {5th International Conference on Computer Science and Information Technology (CSIT), Appl Sci Private Univ, Amman, JORDAN, MAR 27-28, 2013}, pages = {248-255}, publisher = {Appl Sci Private Univ, Fac Informat Technol}, organization = {Appl Sci Private Univ, Fac Informat Technol}, abstract = {The most important disadvantage of the hybrid approach of information integration is the complexity of selecting the data to materialize, in particular if the data sources are changing and numerous. Several approaches have been proposed to make this task easier. In this paper, we show the shortcomings of the existing ones and we propose to cure this by offering a new flexible approach, we named Fulvis, based on fuzzy logic.}, isbn = {978-1-4673-5825-5}, issn = {2381-3458}, author = {Hadi, Wadii and Zellou, Ahmed and Bounabat, Bouchaib} } @article {Hadi2013489, title = {A fuzzy logic based method for selecting information to materialize in hybrid information integration system}, journal = {International Review on Computers and Software}, volume = {8}, number = {2}, year = {2013}, note = {cited By 3}, pages = {489-499}, abstract = {The virtual approach of information integration, called mediation, suffers from the slowness response to user queries and the risk of sources unavailability. To cure these problems, some information may be stored at the mediator level. However, the success of this solution depends on selecting the right set of information to materialize. This task should be automated when the collection of data sources is large and evolving. Existing methods for the selection of information to materialize have some drawbacks and do not always give feasible or optimal results. Therefore, we propose a new approach based on fuzzy logic, which we call FULVIS. {\textcopyright} 2013 Praise Worthy Prize S.r.l. - All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84877313961\&partnerID=40\&md5=a400492f4866ce7ca21892765d7e9433}, author = {Hadi, W. and Zellou, A. and Bounabat, B.} } @conference {ElHamlaoui2013181, title = {Heterogeneous models matching for consistency management}, booktitle = {ENASE 2013 - Proceedings of the 8th International Conference on Evaluation of Novel Approaches to Software Engineering}, year = {2013}, note = {cited By 1}, pages = {181-188}, abstract = {The overall goal of our approach is to relate models of a given domain. Those models are manipulated by different actors, and are thus generally heterogeneous, that is, described with different DSLs (Domain Specific Languages). Instead of building a single global model, we propose to organize the different source models as a network of models, which provides a global view of the system through a virtual global model. The matching of these models is done in a unique correspondence model composed of relationships that are instantiated from a correspondence meta-model. This meta-model is composed of a generic part - common to all the domains - And of a specific part which depends on the specific domain modelled. In this paper, we focus on the elaboration of the correspondence model based on a correspondence meta-model, through a vertical relationship named "refine". The approach is illustrated on a representative use case (a Bug Tracking System). Copyright {\textcopyright} 2013 SCITEPRESS.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84887115653\&partnerID=40\&md5=a72804a8195b6d08e4fbdcb715cfd079}, author = {El Hamlaoui, M.a b and Ebersold, S.a and Coulette, B.a and Anwar, A.c and Nassar, M.b} } @article {Choukri20131739, title = {A hierarchical version of OLSR for MANET}, journal = {World Applied Sciences Journal}, volume = {21}, number = {12}, year = {2013}, note = {cited By 4}, pages = {1739-1747}, abstract = {Due to the dynamic nature of Mobile Ad Hoc Network (MANET) the Quality of Service (QoS) requires several improvements. In this paper, we propose a novel hierarchical routing protocol based on clustering approach inspired on the heuristic Max-Min D-Cluster that we have improved and implemented on standard OLSR. In order to validate this new release named OLSR-MaxMin2C we studied its stability and we compared its performances to those of other alternatives. The metrics we used in evaluating the performance of networks were Average end-to-end Delay, Control Routing Overhead and Packet Delivery Ratio according to VBR traffic (H.264) in addition to CBR traffic. Experimental results show that the control traffic is highly reduced and the improvement in the network performances is gained. {\textcopyright} IDOSI Publications, 2013.}, doi = {10.5829/idosi.wasj.2013.21.12.154}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84876000474\&doi=10.5829\%2fidosi.wasj.2013.21.12.154\&partnerID=40\&md5=d2b2f8cacb2542b846aaada949f18e72}, author = {Choukri, A.a and Habbani, A.a b and Elkoutbi, M.a} } @article {Ghallali2013354, title = {Mobile security: Designing a new framework limiting malware spread in the mobile cloud computing}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {57}, number = {3}, year = {2013}, note = {cited By 2}, pages = {354-366}, abstract = {Our study is primarily interested in limiting the spread of malwares via SMS/MMS, and Emails. It describes the steps leading to identify, analyze and secure traffic in mobile networks. For this purpose, a Framework MPSS has been used to be part of the network of the mobile network operator. MPSS aims to increase the level of information security across the telecom provider network in order to resolve the problems of the limited hardware and software resources on those mobiles devices. Finally, a new study based on MPSS Framework limitations, has driven a designing of a new Framework called MPSS2 based in the private Mobile Cloud Computing of the ISP. In addition, with the approach of MCC, the proposed security takes the form of a service provided by the mobile network operator (SaaS: Security as a Service). Therefore MPSS2 has the main objective to limit the risk of losses of personal and professional user{\textquoteright}s data. {\textcopyright} 2005 - 2013 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84888787936\&partnerID=40\&md5=10138227661d7367aea360980a41d9b5}, author = {Ghallali, M.a and El Mir, A.b and El Ouahidi, B.a and Bounabat, B.b and El Hami, N.c and Elmir, B.b} } @book {Hanini201386, title = {Multicriteria queuing model to improve intra-user multi-flow qos in wireless cellular networks}, series = {Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing}, year = {2013}, note = {cited By 0}, pages = {86-106}, abstract = {This chapter tackles the challenging task of QoS evaluation and improvement in cellular networks. Initially, the authors provide a classification based on four criteria of the queuing models used in the literature. In a second step, an analysis of technologies shows that combining queue management and scheduling mechanisms may lead to improvement in QoS. Hence, the authors propose design of queuing models that meet all the classification criteria, with the goal of improving the various QoS parameters required by the different classes of flows (real time and non-real time) transmitted to an end user in a cell. These models have been mathematically and numerically analyzed, and their impact on end-to-end QoS in a mobile cellular network has been proved. {\textcopyright} 2014, IGI Global.}, doi = {10.4018/978-1-4666-4715-2.ch006}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84956847540\&doi=10.4018\%2f978-1-4666-4715-2.ch006\&partnerID=40\&md5=b3a14d776d6926009b4dcf2af2a30891}, author = {Hanini, M.a and Haqiq, A.b c d and Berqia, A.e} } @conference { ISI:000350287800027, title = {Ontology based Context Aware e-Learning System}, booktitle = {2013 3RD INTERNATIONAL SYMPOSIUM ISKO-MAGHREB}, year = {2013}, note = {ISKO-Maghreb 3rd International Symposium, Marrakech, MOROCCO, NOV 08-09, 2013}, publisher = {ISKO}, organization = {ISKO}, abstract = {With the fast development of e-services and the necessity to use information provided by users and their operating environments, Context-Aware Service (CAS) has emerged as a new paradigm of software engineering to dynamically respond to every change in the status of the user{\textquoteright}s context. Context-aware Service can dynamically capture a range of information from its environment and this information represents a context, the application adapts its execution according to this context. An important challenge in ubiquitous computing is context modeling. Ontology based models presents a suitbale instrument for context modeling. In this paper, we provide an architecture for the development of context aware services for an e-learning system, we also present our context metamodel and how the use of ODM (Ontology Definition Metamodel) can be beneficial for ontology modeling.}, isbn = {978-1-4799-3392-1}, author = {Guermah, Hatim and Fissaa, Tarik and Hafiddi, Hatim and Nassar, Mahmoud and Kriouile, Abdelaziz} } @conference { ISI:000345618100007, title = {Ontology based Context Modeler for Context-Aware Systems}, booktitle = {2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED COMPUTING AND APPLICATIONS (SOCA)}, year = {2013}, note = {6th IEEE International Conference on Service-Oriented Computing and Applications (SOCA), Kauai, HI, DEC 16-18, 2013}, pages = {43-47}, publisher = {IEEE; Intel NTU Connected Context Comp Ctr; Tongji Univ; IEEE Comp Soc Tech Comm Business Informat \& Syst}, organization = {IEEE; Intel NTU Connected Context Comp Ctr; Tongji Univ; IEEE Comp Soc Tech Comm Business Informat \& Syst}, abstract = {In ubiquitous computing, context-aware service oriented systems refer to applications that use so-called contextual information to provide appropriate services or relevant information to the user or other applications to perform a specific task. An important challenge in such applications is context modeling, using ontologies to model context information and to reason about context at a semantic level has attracted a lot of interest in the research community. However, most of the presented approaches do not usually take into account any software engineering method. Therefore, employing standard approaches to formulate the development process becomes of importance. In this paper, we present an overview of the architecture for the development of context aware services based on ontologies, we also present our context modeler based on ODM (Ontology Definition Metamodel) and model transformations that allows to generate an OWL ontology representing context information.}, isbn = {978-1-4799-2701-2}, doi = {10.1109/SOCA.2013.58}, author = {Fissaa, Tarik and Guermah, Hatim and Hafiddi, Hatim and Nassar, Mahmoud and Kriouile, Abdelaziz} } @conference {Fissaa201343, title = {Ontology based context modeler for context-aware systems}, booktitle = {Proceedings - IEEE 6th International Conference on Service-Oriented Computing and Applications, SOCA 2013}, year = {2013}, note = {cited By 0}, pages = {43-47}, abstract = {In ubiquitous computing, context-aware service oriented systems refer to applications that use so-called contextual information to provide appropriate services or relevant information to the user or other applications to perform a specific task. An important challenge in such applications is context modeling, using ontologies to model context information and to reason about context at a semantic level has attracted a lot of interest in the research community. However, most of the presented approaches do not usually take into account any software engineering method. Therefore, employing standard approaches to formulate the development process becomes of importance. In this paper, we present an overview of the architecture for the development of context aware services based on ontologies, we also present our context modeler based on ODM (Ontology Definition Metamodel) and model transformations that allows to generate an OWL ontology representing context information. {\textcopyright} 2013 IEEE.}, doi = {10.1109/SOCA.2013.58}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84894175652\&doi=10.1109\%2fSOCA.2013.58\&partnerID=40\&md5=7f367b0af0c55bcbc35014d583c37455}, author = {Fissaa, T.a and Guermah, H.a and Hafiddi, H.a b and Nassar, M.a and Kriouile, A.a} } @conference {Ouacha2013, title = {Proactive routing based distributed energy consumption}, booktitle = {2013 8th International Conference on Intelligent Systems: Theories and Applications, SITA 2013}, year = {2013}, note = {cited By 0}, abstract = {Energy consumption in mobile network might be excessive for some nodes acting as relays in OLSR network than others. This might have a considerable consequence on the network lifetime. Our approach is presented in the EDCR protocol. It is an extended version of OLSR which aims to increase the residual energy of the network by distributing forwarding tasks between MPRs. For that, we change the MPR procedure selection in order to favor nodes with the largest number of MPR-selector. Our hypothesis is experienced under NS2 and effectively results on less energy consumption {\textcopyright} 2013 IEEE.}, doi = {10.1109/SITA.2013.6560785}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883057326\&doi=10.1109\%2fSITA.2013.6560785\&partnerID=40\&md5=2831baa796bde04305344dd6b1643db1}, author = {Ouacha, A.a and El Abbadi, J.a and Habbani, A.b and Bouamoud, B.b} } @conference {ElHamlaoui2013, title = {A process for maintaining heterogeneous models consistency through change synchronization}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, year = {2013}, note = {cited By 0}, abstract = {This paper falls into the context of modeling complex systems according to various viewpoints. More precisely, it presents an iterative process of heterogeneous models consistency management - by taking into account various types of evolution - based on building a correspondence model. In the case of models evolution, this process is intended to capture changes in the models, to list modifications to be made in the impacted models and finally to update the correspondence model for a future iteration. {\textcopyright} 2013 IEEE.}, doi = {10.1109/AICCSA.2013.6616433}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84887221398\&doi=10.1109\%2fAICCSA.2013.6616433\&partnerID=40\&md5=6948de7ad7e858c47c2ada2eea43e134}, author = {El Hamlaoui, M.a b and Ebersold, S.a and Anwar, A.c and Nassar, M.b and Coulette, B.a} } @conference { ISI:000324871900083, title = {A Real-Time People Tracking System Based on Trajectory Estimation Using Single Field of Camera View}, booktitle = {2013 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS TECHNOLOGY (ICCAT)}, year = {2013}, note = {International Conference on Computer Applications Technology (ICCAT), Sousse, TUNISIA, JAN 20-22, 2013}, publisher = {IEEE Tunisia Sect; Dar Al Uloom Univ; N\&N Global Technologies; Future Technologies \& Innovat}, organization = {IEEE Tunisia Sect; Dar Al Uloom Univ; N\&N Global Technologies; Future Technologies \& Innovat}, abstract = {Object detection is a crucial step for video surveillance systems. In this paper, we propose to detect moving objects in video sequences. Under the assumption that our camera is fixed, we use first subtracting the background to extract moving objects. From the detected foreground we applied the Harris corner detector to identify points of interest on the moving object. The analysis of connected components detected by subtracting the background allows grouped the pixels of moving objects in order to extract the center of gravity to draw the trajectory of the objects present in the scene.}, isbn = {978-1-4673-5285-7}, author = {Hdioud, Boutaina and Ezzahout, Abderrahmane and Hadi, Youssef and Haj, Rachid Oulad and Thami} } @conference {Hdioud2013, title = {A real-time people tracking system based on trajectory estimation using single field of camera view}, booktitle = {International Conference on Computer Applications Technology, ICCAT 2013}, year = {2013}, note = {cited By 1}, abstract = {Object detection is a crucial step for video surveillance systems. In this paper, we propose to detect moving objects in video sequences. Under the assumption that our camera is fixed, we use first subtracting the background to extract moving objects. From the detected foreground we applied the Harris corner detector to identify points of interest on the moving object. The analysis of connected components detected by subtracting the background allows grouped the pixels of moving objects in order to extract the center of gravity to draw the trajectory of the objects present in the scene. {\textcopyright} 2013 IEEE.}, doi = {10.1109/ICCAT.2013.6522038}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84879848181\&doi=10.1109\%2fICCAT.2013.6522038\&partnerID=40\&md5=2a15bc75e155d914dfa1c1ff16398266}, author = {Hdioud, B.a and Ezzahout, A.a and Hadi, Y.a b and Haj Thami, R.O.a} } @article {ElHami2013348, title = {Simulation and optimization of interoperability planning}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {52}, number = {3}, year = {2013}, note = {cited By 0}, pages = {348-356}, abstract = {Optimizing Resource allocation and effort dispatching of interoperability enhancement is a key requirement to effectively setup, develop and evolve intra and inter organizational collaboration. To ensure this obiective of effectiveness, this paper proposes initially an approach for representation of interoperability evolution and planning. Interoperability degree is assessed using a ratio metric taking into account all the significant aspects such as potentiality, compatibility and operational performance. In a second stage, a Modified Particle Swarm optimization (MPSO) algorithm is used as a heuristic optimization method to find the best distribution of effort needed in collaborative networks. {\textcopyright} 2005 - 2013 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84879575390\&partnerID=40\&md5=405b39b0db0b22739a5cce1480c2eff8}, author = {El Hami, N.a and Elmir, A.b and Elmir, B.b and Ellaia, R.a and Itmi, M.c and Bounabat, B.b} } @article {Belaoud2013357, title = {Survey of SIP authentication mechanisms}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {58}, number = {2}, year = {2013}, note = {cited By 0}, pages = {357-365}, abstract = {In recent years Voice over Internet Protocol (VoIP) has become a popular NGN (Next Generation Network) technology. As this technology is built on internet protocol it is affected by a critical security problems. The Session Initiation Protocol (SIP) is considered as the most used signaling protocol for calls over the Internet for establishing, maintaining and terminating VoIP calls. The security of SIP is becoming more and more important. The prime security service required by SIP is authentication. This paper focuses on the SIP security mechanisms of authentication. We survey the newly proposed methods of authentication then we proceed to evaluate these methods in view of security efficiency and computational cost. {\textcopyright} 2005 - 2013 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84890889665\&partnerID=40\&md5=350ed13308e43f7e4915fd0fd863b414}, author = {Belaoud, H.a and El Abbadi, J.a and Habbani, A.b} } @conference { ISI:000386615500047, title = {Towards a Process Patterns based Approach for Promoting Adaptability in Configurable Process Models}, booktitle = {ICEIS: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 3}, year = {2013}, note = {15th International Conference on Enterprise Information Systems (ICEIS), Angers, FRANCE, JUL 04-07, 2013}, pages = {382-387}, publisher = {ESEO Grp; Inst Syst \& Technologies Informat, Control \& Commun; Assoc Advancement Artificial Intelligence; IEICE Special Interest Grp Software Interprise Modelling; ACM Special Interest Grp Management Informat Syst; ACM Special Interest Grp Comp Human Inte}, organization = {ESEO Grp; Inst Syst \& Technologies Informat, Control \& Commun; Assoc Advancement Artificial Intelligence; IEICE Special Interest Grp Software Interprise Modelling; ACM Special Interest Grp Management Informat Syst; ACM Special Interest Grp Comp Human Inte}, abstract = {Reference process modeling approach has been proposed in order to provide a generic solution for reuse in business process management. These models are intended to be adapted by different organizations to respond to new requirements. As a result of this adaptation, a set of variants of the reference process model must be managed. In this context, configurable solutions have been developed to manage variability by integrating all possible configurations. However, enterprises are involved in competitive and complex environments which impose them to often adapt their configurable process models to deal with the increasing globalisation. Therefore, configurable process models should evolve over time in terms of activities, resources and data to meet new needs. In this paper, we propose a process patterns based approach to guide designers in evolving configurable process models at design time as a first step of our contribution to provide an automated support for evolving configurable process models. The presentation of our process patterns system is limited in this paper to the Activity Insertion Process Pattern.}, isbn = {978-989-8565-61-7}, doi = {10.5220/0004565503820387}, author = {Sbai, Hanae and Fredj, Mounia and Kjiri, Laila}, editor = {Hammoudi, S and Maciaszek, L and Cordeiro, J and Dietz, J} } @conference { ISI:000326649800036, title = {Tracking People Through Selected Blocks Using Correlation and Optimized Similarity Measure OSSD}, booktitle = {2013 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, year = {2013}, note = {8th International Conference on Intelligent Systems - Theories and Applications (SITA), Ecole Mohammadia Ingenieurs, Rabat, MOROCCO, MAY 08-09, 2013}, publisher = {IEEE; IEEE Morocco Sect; Univ Mohammed V Agdal}, organization = {IEEE; IEEE Morocco Sect; Univ Mohammed V Agdal}, abstract = {This letter correspondence exposes results of a simple and appropriate technique for tracking a moving person in a stream captured and stored in a suitable memory. This method is based on research of similar block only in the next frame or on the range of frames in the video sequence in question. The proposed process of tracking people in a single view from one static camera starts like any video surveillance system with background subtraction. Then, a Minimal Boundary Rectangle is used to surround the moving people in each frame. A selected block of 8x8 sizes is used to calculate the values of their entire joint blocks component in the following frames of the used video sequence. Finally, we search the similarity measure: The minimal of the Optimized Sum of Squared Difference and the Fast Fourier Transform Correlation. The same blocks are correlated in the posterior frames corresponding to the minimum error.}, isbn = {978-1-4799-0299-6}, author = {Ezzahout, Abderrahmane and Thami, Rachid Oulad Haj and Hadi, Youssef} } @conference {Ezzahout2013, title = {Tracking people through selected blocks using correlation and optimized similarity measure OSSD}, booktitle = {2013 8th International Conference on Intelligent Systems: Theories and Applications, SITA 2013}, year = {2013}, note = {cited By 0}, abstract = {This letter correspondence exposes results of a simple and appropriate technique for tracking a moving person in a stream captured and stored in a suitable memory. This method is based on research of similar block only in the next frame or on the range of frames in the video sequence in question. The proposed process of tracking people in a single view from one static camera starts like any video surveillance system with background subtraction. Then, a Minimal Boundary Rectangle is used to surround the moving people in each frame. A selected block of 8{\texttimes}8 sizes is used to calculate the values of their entire joint blocks component in the following frames of the used video sequence. Finally, we search the similarity measure: The minimal of the Optimized Sum of Squared Difference and the Fast Fourier Transform Correlation. The same blocks are correlated in the posterior frames corresponding to the minimum error. {\textcopyright} 2013 IEEE.}, doi = {10.1109/SITA.2013.6560819}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883122358\&doi=10.1109\%2fSITA.2013.6560819\&partnerID=40\&md5=468ac280d95dbcf4a9a4d89921e21168}, author = {Ezzahout, A. and Thami, R.O.H. and Hadi, Y.} } @conference {Haqiq2013, title = {Verification of multi decisional reactive agent using SMV model checker}, booktitle = {2013 8th IEEE Design and Test Symposium, IDT 2013}, year = {2013}, note = {cited By 0}, abstract = {On account of the evolution of technology, more complicated software arrives with the need to be verified to prevent the errors occurrence in a system which could generate fatal accidents and economic loss. These errors must be detected in an early stage during the development process to reduce redesign costs and faults. To ensure the correctness of software systems, formal verification provides an alternative approach to verify that an implementation of the expected system fulfills its specification. This paper focuses on the verification of reactive system behaviors specified by the Multi Decisional Reactive Agent (MDRA) and modeled using MDRA Profile. The objective in this paper is to use the Model Checking technique for MDRA Profile verification through the Model Checker SMV (Symbolic Model Verifier) to automatically verify the system properties expressed in temporal logic. The SMV mainly focusing on reactive systems provides a modular hierarchical descriptions and definition of reusable components. Besides, the expression of system properties is more described through both Computational Tree Logic (CTL) and Linear Temporal Logic (LTL). {\textcopyright} 2013 IEEE.}, doi = {10.1109/IDT.2013.6727075}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84894438200\&doi=10.1109\%2fIDT.2013.6727075\&partnerID=40\&md5=f9d391f76523ab3cbdb7727b864f5e91}, author = {Haqiq, A. and Bounabat, B.} } @conference { ISI:000345773800002, title = {Verification of Multi Decisional Reactive Agent using SMV Model Checker}, booktitle = {2013 8TH INTERNATIONAL DESIGN AND TEST SYMPOSIUM (IDT)}, series = {International Design and Test Symposium}, year = {2013}, note = {8th IEEE International Design and Test Symposium (IDT), Marrakesh, MOROCCO, DEC 16-18, 2013}, publisher = {IEEE}, organization = {IEEE}, abstract = {On account of the evolution of technology, more complicated software arrives with the need to be verified to prevent the errors occurrence in a system which could generate fatal accidents and economic loss. These errors must be detected in an early stage during the development process to reduce redesign costs and faults. To ensure the correctness of software systems, formal verification provides an alternative approach to verify that an implementation of the expected system fulfills its specification. This paper focuses on the verification of reactive system behaviors specified by the Multi Decisional Reactive Agent (MDRA) and modeled using MDRA Profile. The objective in this paper is to use the Model Checking technique for MDRA Profile verification through the Model Checker SMV (Symbolic Model Verifier) to automatically verify the system properties expressed in temporal logic. The SMV mainly focusing on reactive systems provides a modular hierarchical descriptions and definition of reusable components. Besides, the expression of system properties is more described through both Computational Tree Logic (CTL) and Linear Temporal Logic (LTL).}, isbn = {978-1-4799-3525-3}, issn = {2162-061X}, author = {Haqiq, Abdelhay and Bounabat, Bouchaib} } @article {Hdioud2013523, title = {Video-surveillance system for tracking a person by estimating the trajectory}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {57}, number = {3}, year = {2013}, note = {cited By 0}, pages = {523-529}, abstract = {This paper we propose a simple and efficient video surveillance system which detects and tracks a person in a video stream. Object detection is the most important and crucial step for any video surveillance system. In this paper, we separate foreground and background by using the statistical model of Gaussian Mixture (GMM). Interests points are identified in the detected regions (foreground) using the Harris detector. The analysis of connected components detected by subtracting the background allows grouped the pixels of moving objects in order to extract the center of gravity. Then, a boundary box is used to limit the area of connected components in order to detect the coordinates of the gravity center of the moving person. Finally, by projection in Euclidean plan we can get the trajectory of the person in motion and compute the Euclidean distance crossed in the scene. {\textcopyright} 2005 - 2013 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84888801523\&partnerID=40\&md5=747018a467afddec5afee50655417479}, author = {Hdioud, B.a and Oulad Haj Thami, R.a and El Haj Tirari, M.b} } @article {Choukri20122121, title = {AODV protocol behavior based on H.264 multiservice traffic}, journal = {International Review on Computers and Software}, volume = {7}, number = {5}, year = {2012}, note = {cited By 2}, pages = {2121-2125}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84873308095\&partnerID=40\&md5=a7d603a75c0b90d10b0e6ac5e06924fe}, author = {Choukri, A. and Amnai, M. and Habbani, A. and Elkoutbi, M.} } @article {Choukri2012208, title = {Behavior of ad hoc routing protocols in multi service traffic}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {43}, number = {2}, year = {2012}, note = {cited By 1}, pages = {208-213}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84867186214\&partnerID=40\&md5=af5b22cc20366d5220d91fac8886944e}, author = {Choukri, A. and Habbani, A. and Elkoutbi, M.} } @conference { ISI:000310353000082, title = {Emerging Wireless Technologies In E-Health}, booktitle = {2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2012}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Tangiers, MOROCCO, MAY 10-12, 2012}, pages = {440-445}, publisher = {Morocco Sect MTT/AP Joint Chapter}, organization = {Morocco Sect MTT/AP Joint Chapter}, abstract = {In healthcare the importance of obtaining the right information, at the right time, irrespective of time and location dependency is very critical. Healthcare personnel need to access real-time medical data such as patient clinical histories, laboratory results, treatments, chronic diseases, medication, and insurance information. Therefore, healthcare is the most apt domain for the application of ubiquitous technologies. Ubiquitous health care aims at creating an environment where healthcare is available to everyone, everywhere through the use of technologies that would not only be pervasive but also be assimilated flawlessly in the daily lives. With large-scale wireless networks and mobile computing solutions, such as cellular 3G, Wi-Fi mesh, WiMAX, Bluetooth, RFID, and Wireless Sensor Networks, health care personnel can tap into vital information anywhere and at any time within the health care networks. Ubiquitous healthcare, although promising, there are myriad challenges associated with realizing its vision. This paper highlights some snapshots of current uses and future trends of various wireless communications in the healthcare domains, addresses their applications for e-health, states the challenges faced in a ubiquitous healthcare environment equipped with different wireless technologies, and how the resulting issues might be addressed by developing a framework that provides a flexible and convenient medical monitoring, consultation, and healthcare.}, isbn = {978-1-4673-1520-3}, author = {El Khaddar, Mehdia Ajana and Harroud, Hamid and Boulmalf, Mohammed and Elkoutbi, Mohammed and Habbani, Ahmed}, editor = {Essaaidi, M and Zaz, Y} } @conference {ElKhaddar2012440, title = {Emerging wireless technologies in e-health: Trends, challenges, and framework design issues}, booktitle = {Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012}, year = {2012}, note = {cited By 20}, pages = {440-445}, doi = {10.1109/ICMCS.2012.6320276}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869803375\&doi=10.1109\%2fICMCS.2012.6320276\&partnerID=40\&md5=3f8a7111cfa37918453a942aa23762f3}, author = {El Khaddar, M.A. and Harroud, H. and Boulmalf, M. and Elkoutbi, M. and Habbani, A.} } @article {Hatim201255, title = {Enforcing access control in workflow systems with a task engineering approach}, journal = {International Journal of Internet Technology and Secured Transactions}, volume = {4}, number = {1}, year = {2012}, note = {cited By 0}, pages = {55-70}, doi = {10.1504/IJITST.2012.045150}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84878790425\&doi=10.1504\%2fIJITST.2012.045150\&partnerID=40\&md5=102c11f59819a6eff35467ade49c1d55}, author = {Hatim, H. and Bakkali, H.E. and Berrada, I.} } @article {Lakki2012217, title = {The integration ofthe speedof mobilityin the selection OFMPR to improve theqosin ad hoc networks}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {36}, number = {2}, year = {2012}, note = {cited By 1}, pages = {217-226}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84857970125\&partnerID=40\&md5=23ad0cf075d2275f629e3d075e1d94f5}, author = {Lakki, N. and Ouacha, A. and Habbani, A. and El Abbadi, J.} } @article { ISI:000311773200010, title = {Interoperability optimization in healthcare collaboration networks}, journal = {BIOMEDICAL ENGINEERING-BIOMEDIZINISCHE TECHNIK}, volume = {57}, number = {5}, year = {2012}, pages = {403-411}, abstract = {Interoperability is one of the most challenging concerns that face healthcare information system (HIS) actors. Interoperability implementation in this context may be a data exchange interfacing, a service oriented interaction or even a composition of new composite healthcare processes. In fact, optimizing efforts of interoperability achievement is a key requirement to effectively setup, develop and evolve intra- and inter-organizational collaboration. To ensure interoperability project effectiveness, this paper proposes a modeling representation of health processes interoperability evolution. Interoperability degrees of involved automated processes are assessed using a ratio metric, taking into account all significant aspects, such as potentiality, compatibility and operational performance. Then, a particle swarm optimization algorithm (PSO) is used as a heuristic optimization method to find the best distribution of effort needed to establish an efficient healthcare collaborative network.}, issn = {0013-5585}, doi = {10.1515/bmt-2011-0118}, author = {Alrajeh, Nabil A. and Elmir, Badr and Bounabat, Bouchaib and El Hami, Norelislam} } @article {Alrajeh2012403, title = {Interoperability optimization in healthcare collaboration networks}, journal = {Biomedizinische Technik}, volume = {57}, number = {5}, year = {2012}, note = {cited By 0}, pages = {403-411}, doi = {10.1515/bmt-2011-0118}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84867797852\&doi=10.1515\%2fbmt-2011-0118\&partnerID=40\&md5=f6e8a6471b8d3fa0b5c770ac7ea27b80}, author = {Alrajeh, N.A. and Elmir, B. and Bounabat, B. and Hami, N.E.} } @conference {ElHassani201258, title = {Measure of fuzzy presence of descriptors on Arabic Text Mining}, booktitle = {CiSt 2012 - Proceedings: 2012 Colloquium in Information Science and Technology}, year = {2012}, note = {cited By 1}, pages = {58-63}, doi = {10.1109/CIST.2012.6388063}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84872519138\&doi=10.1109\%2fCIST.2012.6388063\&partnerID=40\&md5=3d4374b821fb0c303b9e4ba014855fc0}, author = {El Hassani, I. and Kriouile, A. and Benghabrit, Y.} } @conference {Baidouri2012245, title = {A mediator architecture for context-aware composition in SOA}, booktitle = {ICEIS 2012 - Proceedings of the 14th International Conference on Enterprise Information Systems}, volume = {2 ISAS}, number = {SAIC/-}, year = {2012}, note = {cited By 0}, pages = {245-251}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84865742206\&partnerID=40\&md5=623beaed8eff00089a3ea879a48d8a02}, author = {Baidouri, H. and Hafiddi, H. and Nassar, M. and Kriouile, A.} } @article {Belaoud201285, title = {Mobile networks migration towards NGN}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {36}, number = {1}, year = {2012}, note = {cited By 0}, pages = {85-91}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84857179051\&partnerID=40\&md5=e4d7df56d5dbc346177de55798050977}, author = {Belaoud, H. and Habbani, A. and El Abbadi, J.} } @article {Daoui2012137, title = {Mobility prediction and location management based on data mining}, journal = {International Conference on Next Generation Networks and Services, NGNS}, year = {2012}, note = {cited By 1}, pages = {137-140}, doi = {10.1109/NGNS.2012.6656095}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84894186087\&doi=10.1109\%2fNGNS.2012.6656095\&partnerID=40\&md5=5539050c158dd348e89a347da6abd380}, author = {Daoui, M. and Belkadi, M. and Chamek, L. and Lalam, M. and Hamrioui, S. and Berqia, A.} } @conference { ISI:000310353000128, title = {A Model-driven Approach for Context-Aware Services Composition}, booktitle = {2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2012}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Tangiers, MOROCCO, MAY 10-12, 2012}, pages = {693-698}, publisher = {Morocco Sect MTT/AP Joint Chapter}, organization = {Morocco Sect MTT/AP Joint Chapter}, abstract = {With the emergence of service-oriented architecture (SOA), the provision of business-to-business as well as user-centric services becomes increasingly simple and fluent. Also, the design, development and deployment of services - either elementary or composite - have constantly gained ground. However, the user{\textquoteright}s context must constitute an essential aspect of such services in order to improve the end-user experience. As observed from the literature, several researches focuses mainly on context-aware service design and modeling, but few study had worked on the composition of this new kind of service to provide more complicated features. In this paper, we aim to present our proposal of adapting service composition by the integration of context during the composition process. This dynamic context-aware composition of services is realized through our Context-Aware Composition Builder tool.}, isbn = {978-1-4673-1520-3}, author = {Baidouri, Hicham and Hafiddi, Hatim and Nassar, Mahmoud and Kriouile, Abdelaziz}, editor = {Essaaidi, M and Zaz, Y} } @conference {Baidouri2012693, title = {A model-driven approach for Context-Aware services composition}, booktitle = {Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012}, year = {2012}, note = {cited By 0}, pages = {693-698}, doi = {10.1109/ICMCS.2012.6320249}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869817305\&doi=10.1109\%2fICMCS.2012.6320249\&partnerID=40\&md5=160c7120f790d139419072f766aad3b7}, author = {Baidouri, H. and Hafiddi, H. and Nassar, M. and Kriouile, A.} } @conference {Ouacha2012305, title = {New mobility metric based on MultiPoint Relay life duration}, booktitle = {SIGMAP 2012, WINSYS 2012 - Proceedings of the International Conference on Signal Processing and Multimedia Applications and Wireless Information Networks and Systems}, year = {2012}, note = {cited By 0}, pages = {305-309}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84867639975\&partnerID=40\&md5=e94005ced33c5ad754bab9aa88330260}, author = {Ouacha, A. and Lakki, N. and Habbani, A. and El Abbadi, J.} } @conference {Lachhab2012, title = {Real time context-independent phone recognition using a simplified statistical training algorithm}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, volume = {2012-May}, year = {2012}, note = {cited By 0}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85004001398\&partnerID=40\&md5=f2cac6c3a94f59b2c63be47cbfb16359}, author = {Lachhab, O. and Di Martino, J. and Elhaj, E.H.I. and Hammouch, A.} } @conference {Hiba2012948, title = {An SNA-based evaluation framework for virtual Teams}, booktitle = {Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2012}, year = {2012}, note = {cited By 0}, pages = {948-953}, doi = {10.1109/ASONAM.2012.241}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84874267883\&doi=10.1109\%2fASONAM.2012.241\&partnerID=40\&md5=097bf8b3528b33dec79c30e080e98ebe}, author = {Hiba, L.B. and Idrissi, M.A.J.} } @conference {Hamlili2012, title = {A topology-based approach to the predictive analysis of intelligent transportation systems dynamics}, booktitle = {2012 5th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2012 Conference and Workshops}, year = {2012}, note = {cited By 0}, doi = {10.1109/NTMS.2012.6208736}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84863958654\&doi=10.1109\%2fNTMS.2012.6208736\&partnerID=40\&md5=911c57b1f6379fef33a95a7a71a705a6}, author = {Hamlili, A.} } @conference {Hafiddi2011176, title = {A context-aware service centric approach for service oriented architectures}, booktitle = {ICEIS 2011 - Proceedings of the 13th International Conference on Enterprise Information Systems}, volume = {3 ISAS}, year = {2011}, note = {cited By 4}, pages = {176-183}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84865112643\&partnerID=40\&md5=2dc55c40ac4f93da3355ed544dba2d19}, author = {Hafiddi, H. and Nassar, M. and Baidouri, H. and El Asri, B. and Kriouile, A.} } @article {Ouacha2011607, title = {Energy consumption of mobile intelligent system}, journal = {International Review on Computers and Software}, volume = {6}, number = {4}, year = {2011}, note = {cited By 1}, pages = {607-614}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-81255192184\&partnerID=40\&md5=b26045da71d43042643a0b6b4648f535}, author = {Ouacha, A. and Lakki, N. and Habbani, A. and Oubaha, J. and Elkoutbi, M. and Abbadi, J.E.} } @article {Haddadi201187, title = {Establishment and application of competitive intelligence system in mobile devices}, journal = {Journal of Intelligence Studies in Business}, volume = {1}, number = {1}, year = {2011}, note = {cited By 3}, pages = {87-96}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84905686627\&partnerID=40\&md5=96b43d91e158a53a8db2a6ea889e14a9}, author = {Haddadi, A.E. and Dousset, B. and Berrada, I.} } @article {Ajana201119, title = {FlexRFID middleware in the supply chain: Strategic values and challenges}, journal = {International Journal of Mobile Computing and Multimedia Communications}, volume = {3}, number = {2}, year = {2011}, note = {cited By 0}, pages = {19-32}, doi = {10.4018/jmcmc.2011040102}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-80052879454\&doi=10.4018\%2fjmcmc.2011040102\&partnerID=40\&md5=3256e261ddc2de34d29749a6b36fe5bf}, author = {Ajana, M.E. and Harroud, H. and Boulmalf, M. and Elkoutbi, M.} } @conference {Hafiddi201155, title = {How can service oriented systems make beneficial use of model driven architecture and aspect paradigm?}, booktitle = {Proceedings - 6th IEEE International Symposium on Service-Oriented System Engineering, SOSE 2011}, year = {2011}, note = {cited By 2}, pages = {55-60}, doi = {10.1109/SOSE.2011.6139092}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84857282312\&doi=10.1109\%2fSOSE.2011.6139092\&partnerID=40\&md5=a9c0605ada6c82e935b293777442d55d}, author = {Hafiddi, H. and Nassar, M. and Kriouile, A.} } @conference { ISI:000371495900010, title = {Measure of Fuzzy Presence of Descriptors on Arabic Text Mining}, booktitle = {2012 COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}12)}, series = {Colloquium in Information Science and Technology}, year = {2011}, note = {IEEE Colloquium on Information Science and Technology (CIST), Fez, MOROCCO, OCT 22-24, 2012}, pages = {58-63}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; USMBA IEEE Student Branch; Faculty of Sciences Dhar Mahraz; Faculty of Technical Sciences of Fez; IEEE Comp Soc; IEEE Commun Soc}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; USMBA IEEE Student Branch; Faculty of Sciences Dhar Mahraz; Faculty of Technical Sciences of Fez; IEEE Comp Soc; IEEE Commun Soc}, abstract = {In the present work, we propose a new model of radical descriptors in Arabic Text Mining. This model will be based on the addition of lexical information contained in the morphological pattern of the Arabic word. We developed a statistical model by Hidden Markov Chain to disambiguate the morphological analysis of corpora, and we propose a new method to measure the relationship between descriptors based on a notion of {\textquoteleft}{\textquoteleft}fuzzy measure of the presence{{\textquoteright}{\textquoteright}} and we adapt the traditional statistical measures to this context, and we outline the key measures of similarity and distances used in Text Mining.}, isbn = {978-1-4673-2725-1}, issn = {2327-185X}, author = {El Hassani, Ibtissam and Kriouile, Abdelaziz and Benghabrit, Youssef}, editor = {ElMohajir, M and Begdouri, A and ElMohajir, BE and Zarghili, A} } @conference {Hafiddi2011, title = {A model driven approach for context-aware services development}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2011}, note = {cited By 6}, doi = {10.1109/ICMCS.2011.5945628}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79961237316\&doi=10.1109\%2fICMCS.2011.5945628\&partnerID=40\&md5=b09e1287fcbf49b9b8cc1fb6ff702c95}, author = {Hafiddi, H. and Baidouri, H. and Nassar, M. and Asri, B.E. and Kriouile, A.} } @conference {Oubaha2011, title = {New approach: Mapping of 802.11e into MPLS domains}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2011}, note = {cited By 2}, doi = {10.1109/ICMCS.2011.5945692}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79961236232\&doi=10.1109\%2fICMCS.2011.5945692\&partnerID=40\&md5=29b437172dc2f468633f19d9746c8f92}, author = {Oubaha, J. and Habbani, A. and Elkoutbi, M.} } @conference {ElHaroussi2011, title = {VHDL design and FPGA implementation of weighted majority logic decoders}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2011}, note = {cited By 0}, doi = {10.1109/ICMCS.2011.5945599}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79961233273\&doi=10.1109\%2fICMCS.2011.5945599\&partnerID=40\&md5=07df2e3fcbba980a7e899b84c1e869ff}, author = {El Haroussi, M. and Ayoub, F. and Belkasmi, M.} } @conference {Haddadi2011, title = {Xplor Everywhere - The competitive intelligence system for mobile}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2011}, note = {cited By 0}, doi = {10.1109/ICMCS.2011.5945635}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79961229104\&doi=10.1109\%2fICMCS.2011.5945635\&partnerID=40\&md5=855b957db3f0a95be0b4115a594521fa}, author = {Haddadi, A.E. and Dousset, B. and Berrada, I.} } @conference {Hamlili2010, title = {Adaptive schemes for estimating random graph parameters in mobile wireless ad hoc network{\textquoteright}s modeling}, booktitle = {2010 IFIP Wireless Days, WD 2010}, year = {2010}, note = {cited By 0}, doi = {10.1109/WD.2010.5657716}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-78751502819\&doi=10.1109\%2fWD.2010.5657716\&partnerID=40\&md5=055d128d041a7d668ab8a796c8d30dd4}, author = {Hamlili, A.} } @conference {Oubaha2010, title = {Multi-criteria path optimization in MPLS networks}, booktitle = {2010 5th International Symposium on I/V Communications and Mobile Networks, ISIVC 2010}, year = {2010}, note = {cited By 0}, doi = {10.1109/ISVC.2010.5656215}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-78651476901\&doi=10.1109\%2fISVC.2010.5656215\&partnerID=40\&md5=80d2db09aa1ec387e76a137bf94a9e0f}, author = {Oubaha, J. and Habbani, A. and Elkoutbi, M.} } @article {ElBakkali2010203, title = {A new task engineering approach for workflow access control}, journal = {Advances in Intelligent and Soft Computing}, volume = {85}, year = {2010}, note = {cited By 1}, pages = {203-212}, doi = {10.1007/978-3-642-16626-6_22}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-80053005691\&doi=10.1007\%2f978-3-642-16626-6_22\&partnerID=40\&md5=b9d1f4d19bd722e72574f0bef90c7cff}, author = {El Bakkali, H. and Hatim, H. and Berrada, I.} } @conference { ISI:000289216200022, title = {A New Task Engineering Approach for Workflow Access Control}, booktitle = {COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS 2010}, series = {Advances in Intelligent and Soft Computing}, volume = {85}, year = {2010}, note = {3rd International Conference on Computational Intelligence in Security for Information Systems, Leon, SPAIN, NOV 11-12, 2010}, pages = {203-212}, publisher = {Junta Castilla Leon; Supercomputing Ctr Castilla Leon; Univ Leon; IEEE SECCION ESPANA; IEEE Syst Man \& Cybernet Spanish Chapter; MIR Lab; Int Fed Comp Logic}, organization = {Junta Castilla Leon; Supercomputing Ctr Castilla Leon; Univ Leon; IEEE SECCION ESPANA; IEEE Syst Man \& Cybernet Spanish Chapter; MIR Lab; Int Fed Comp Logic}, abstract = {Security and particularly Access control is a crucial issue for workflow management systems (WFMS). RBAC (Role based Access Control) model seems to be suitable for enforcing access control policies in such systems. However, without an effective role engineering process -at administration time- that aims to reduce conflicting situations. using RBAC could be more complex and less useful. Additionally to role engineering, a {\textquoteleft}task engineering{\textquoteright} process at run time- could be useful to allow the satisfaction of access control constraints in even critical situations. In this paper, we identify task engineering as a process to examine the granularity of each workflow{\textquoteright}s task in a way to meet at run time- the main workflow access control requirements, precisely the least privilege and separation of duties principles. Then, we propose an approach of task engineering to improve security enforcement in WFMS. This approach uses an intelligent method namely the Constraints Satisfaction Problem (CSP) formulation and resolution method.}, isbn = {978-3-642-16625-9}, issn = {1867-5662}, author = {El Bakkali, Hanan and Hatim, Hamid and Berrada, Ilham}, editor = {Herrero, A and Corchado, E and Redondo, C and Alonso, A} } @conference {Slimani2010449, title = {An ontology change management system - An experiment on a health care case study}, booktitle = {KEOD 2010 - Proceedings of the International Conference on Knowledge Engineering and Ontology Development}, year = {2010}, note = {cited By 0}, pages = {449-452}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-78651412575\&partnerID=40\&md5=738d5124f67747d28ceea6fc60784dc6}, author = {Slimani, S. and Baina, K. and Baina, S. and Henkel, M. and Perjons, E.} } @conference { ISI:000392778800068, title = {AN ONTOLOGY CHANGE MANAGEMENT SYSTEM An Experiment on a Health Care Case Study}, booktitle = {KEOD 2010: Proceedings of the International Conference on Knowledge Engineering and Ontology Development}, year = {2010}, note = {International Conference on Knowledge Engineering and Ontology Development (KEOD 2010), Valencia, SPAIN, OCT 25-28, 2010}, pages = {449-452}, publisher = {Inst Syst \& Technol Informat Control \& Commun}, organization = {Inst Syst \& Technol Informat Control \& Commun}, abstract = {Numerous ontologies have been developed for life science domains. These ontologies are continuously changing. Thus, it is becoming profitable to study and to manage these ontologies change in order to keep all dependent ontologies and their related mappings consistent. The aim of this paper is to propose an agent based approach enabling not only ontology and ontology mapping evolution analysis but also to manage their changes. An experiment in health care illustrates the benefits of our approach. We apply our algorithm, and implementation prototype p(2)OEManager to eye specialist ontology (ESO) and primary health care ontology (PCO), and particularly, we use our ontology agent model, and prototype to manage some significant changes in the ESO ontology.}, isbn = {978-989-8425-29-4}, author = {Slimani, Soumaya and Baina, Karim and Baina, Salah and Henkel, Martin and Perjons, Erik}, editor = {Filipe, J and Dietz, JLG} } @conference {Oudidi2010165, title = {QoS routing using OLSR protocol}, booktitle = {International Conference on Communications - Proceedings}, year = {2010}, note = {cited By 1}, pages = {165-171}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79958704229\&partnerID=40\&md5=b671b4b4cac801b42c9f9164a18f99ea}, author = {Oudidi, K. and Hajami, A. and Koutbi, M.} } @article {Zbakh2010110, title = {Tasks allocation problem as a non - cooperative game}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {16}, number = {2}, year = {2010}, note = {cited By 4}, pages = {110-115}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-78650273415\&partnerID=40\&md5=51d3ad81f886ee25480506eb5dbe999c}, author = {Zbakh, M. and Hajji, S.E.} } @conference {ElHaroussi2010, title = {VHDL design and FPGA implementation of a fully parallel BCH SISO decoder}, booktitle = {2010 5th International Symposium on I/V Communications and Mobile Networks, ISIVC 2010}, year = {2010}, note = {cited By 0}, doi = {10.1109/ISVC.2010.5656415}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-78651477175\&doi=10.1109\%2fISVC.2010.5656415\&partnerID=40\&md5=4ef5d844fa95aea85bc6781b1524b50e}, author = {El Haroussi, M. and Chana, I. and Belkasmi, M.} } @conference {Hatim2010, title = {Workflow access control: From role engineering to task engineering}, booktitle = {2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010}, year = {2010}, note = {cited By 0}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79951499002\&partnerID=40\&md5=bf2b2a62594c1dd42d3dd1bbef261de3}, author = {Hatim, H. and El Bakkali, H. and Berrada, I.} } @conference {Dya2009889, title = {Comparative study of fractal technics for digital compressing images}, booktitle = {Proceedings of the 2009 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2009}, volume = {2}, year = {2009}, note = {cited By 0}, pages = {889-894}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84864947398\&partnerID=40\&md5=55c98dc1493218a0d97c614b1f26e88e}, author = {Dya, Z. and Badri, A. and Sahel, A. and Hajami, A.} } @conference { ISI:000274084500026, title = {NCSecMM: A National Cyber Security Maturity Model for an Interoperable {\textquoteleft}{\textquoteleft}National Cyber Security{{\textquoteright}{\textquoteright}} Framework}, booktitle = {9TH EUROPEAN CONFERENCE ON E-GOVERNMENT, PROCEEDINGS}, year = {2009}, note = {9th European Conference on e-Government, Univ Westminister Business Sch, London, ENGLAND, JUN 29-30, 2009}, pages = {236-247}, abstract = {Security Maturity Model is a systematic approach that replaces traditional security metrics. There is more than one Security Maturity Model (SMM, COBIT, CERT/CSO, ISM3), and each of them has only five levels of maturity, providing the blueprint for a complete security program, telling management the order in which to implement security elements (ISM3 Consortium 2007), and leading toward the use of best practice standards (e.g., BS 17799). But none of them is dedicated to National Cybersecurity. We propose in this paper a {\textquoteleft}{\textquoteleft}National CyberSecurity Maturity Model{{\textquoteright}{\textquoteright}}, that will make it possible to evaluate the security of a country or a whole region, making thus comparisons between them, and pointing out its forces and threats.}, isbn = {978-1-906638-33-7}, author = {El Kettani, Mohamed Dafir Ech-Cherif and Debbagh, Taieb}, editor = {Hahamis, P and Remenyi, D} } @conference { ISI:000276165000044, title = {Performance Evaluation for Competing High-Speed TCP Protocols}, booktitle = {2009 GLOBAL INFORMATION INFRASTRUCTURE SYMPOSIUM (GIIS 2009)}, year = {2009}, note = {2nd International Global Information Infrastructure Symposium, Hammamet, TUNISIA, JUN 22-26, 2009}, pages = {286-289}, publisher = {IEEE Comp Soc}, organization = {IEEE Comp Soc}, abstract = {TCP constitutes the principal protocol of the TCP/IP model transport stack. Today, TCP-Reno is the mainly deployed transport protocol on Internet. It defines a method of controlling congestion in networks with packet switching and particularly the Internet. In spite of the efforts made to resolve the congestion problem, this protocol continues to meet numerous of troubles in particular in networks where the Bandwidth Delay Product (BOP) is high. Mainly, this paper compares the behaviors of the six most distinguished high speed TCP versions using simulations. In particular, it compares the intra protocol fairness of these variants and their behavior in the presence of a standard TCP traffic by examining the resulting unfairness and packet losses.}, isbn = {978-1-4244-4623-0}, author = {Hamlili, Ali} } @conference {Hanane2009637, title = {RB-WAC: New approach for access control in workflows}, booktitle = {2009 IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009}, year = {2009}, note = {cited By 1}, pages = {637-640}, doi = {10.1109/AICCSA.2009.5069394}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-70349918261\&doi=10.1109\%2fAICCSA.2009.5069394\&partnerID=40\&md5=df22dca791291829c2a2c925799f6c97}, author = {Hanane, E.B. and Hamid, H.} } @conference { ISI:000271458300107, title = {RB-WAC: New Approach for Access Control in Workflows}, booktitle = {2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2}, year = {2009}, note = {7th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-09), Rabat, MOROCCO, MAY 10-OCT 13, 2009}, pages = {637-640}, publisher = {ACS; IEEE}, organization = {ACS; IEEE}, abstract = {Today, workflow systems which aim the automation of a business process involving the coordinated execution of multiple tasks performed by different entities have experienced an increase use. Unfortunately, little Workflow Management Systems (WFMS) take into account access control constraints such as Separation of Duties (SoD). In this paper, we present a new approach, RB-WAC (Role-based Workflow Access Control), to participate in amending the above shortcomings. This approach which is based on the standard of access control RBAC, introduces new rules to detect potential conflicts related to a workflow instance and also suggests the use of the concept of priority in order to resolve these conflicts.}, isbn = {978-1-4244-3807-5}, author = {Hanane, El Bakkali and Hamid, Hatim} } @article {4562825420091002, title = {Resource Optimization of Mobile Intelligent System With Heart MPLS Network.}, journal = {International Journal of Interactive Mobile Technologies}, volume = {3}, number = {S2}, year = {2009}, pages = {58 - 64}, abstract = {In this paper, we introduce the original Mobile Intelligent System (MIS) in embedded FPGA architecture. This node will allow the construction of autonomous mobile network units which can move in unknowns, inaccessible or hostile environment for human beings, in order to collect data by various sensors and transmits them by routing to a unit of distant process. For the sake of improving the performance of transmission, we propose a global schema of QoS management using DiffServ/MPLS backbones. We provide an evaluation of several scenarios for combining QoS IP networks with MIS access network. We conclude with a study on interoperability between QoS patterns in access and backbone networks. [ABSTRACT FROM AUTHOR]}, keywords = {Artificial intelligence, Computer architecture, DiffServ and MPLS, Information networks, intelligent sensors, Mobile communication systems, Quality of service, Routing (Computer network management) {\textendash} Equipment \& supplies, wireless sensor network}, issn = {18657923}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=45628254\&site=ehost-live}, author = {Oubaha, Jawad and Habbani, Ahmed and Elkoutbi, Mohammed} } @article {4562825020091002, title = {Using Mobility to Enhance Routing Process in MIS System.}, journal = {International Journal of Interactive Mobile Technologies}, volume = {3}, number = {S2}, year = {2009}, pages = {24 - 32}, abstract = {This paper introduces the original Mobile Intelligent System (MIS) in an embedded Field-Programmable Gate Array (FPGA) architecture. This would allow the construction of autonomous mobile network units which can move in environments that are unknown, inaccessible or hostile for human beings, in order to collect data by various sensors and route it to a distant processing unit. To have a better performing routing process, we propose a new mobility measure. Each node measures its own mobility in the network, based on its neighbors{\textquoteright} information. This measure has no unit and is calculated by quantification in regular time intervals. [ABSTRACT FROM AUTHOR]}, keywords = {ad hoc networks, Computer architecture, Information systems embedded application, Intelligent agents (Computer software), intelligent sensors, Mobile communication systems, multipoint relays, node mobility and mobility quantification, OLSR protocol, Routers (Computer networks), Routing (Computer network management) {\textendash} Equipment \& supplies, wireless sensor network}, issn = {18657923}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=45628250\&site=ehost-live}, author = {Oudidi, K. and Habbani, A. and Elkoutbi, M.} } @conference { ISI:000241553600078, title = {Fundamental region based indexing and classification of Islamic star pattern images}, booktitle = {IMAGE ANALYSIS AND RECOGNITION, PT 2}, series = {Lecture Notes in Computer Science}, volume = {4142}, year = {2006}, note = {3rd International Conference on Image Analysis and Recognition, Povoa de Varzim, PORTUGAL, SEP 18-20, 2006}, pages = {865-876}, abstract = {In this paper, we propose a new method for the indexing and classification of Islamic Stars Pattern (ISP) images based on rotational symmetry information. A computational model for the extraction of rotational symmetry features is proposed. This model is based on the three following steps. First, we detect the rotation center of the ISP image, then we complete the image structure by using symmetry information. Second, we compute the angle of rotation and number of folds. Finally, we extract the fundamental region, a representative region in the image from which the whole image can be regenerated. A method is also proposed for indexing and classifying ISP images on the basis of the extracted features. The classification algorithm is based on the number of folds. We characterize an image by its fundamental region and by its class which is defined in the classification step. Experiments show promising results either for ISP images classification or indexing. Efforts for the subsequent task of repeated pattern images classification can be significantly reduced.}, isbn = {3-540-44894-2}, issn = {0302-9743}, author = {Djibril, Mohamed Ould and Hadi, Youssef and Thami, Rachid Oulad Haj}, editor = {Campilho, A and Kamel, M} }