@article {Haddad20222115, title = {1{\texttimes}16 Rectangular dielectric resonator antenna array for 24 Ghz automotive radar system}, journal = {Bulletin of Electrical Engineering and Informatics}, volume = {11}, number = {4}, year = {2022}, note = {cited By 0}, pages = {2115-2123}, abstract = {This paper presents the design of a 1{\texttimes}16-elements RDRA array for anti-collision radar SRR application at 24 GHz. A single RDRA with high dielectric constant of 41, fed by a simple microstrip line feeding technique, is initially designed to operate around 24 GHz. The RDRA element is further used within an array network structure made up of 16 linear antenna elements to cover the same frequency band. The simulated 1{\texttimes}16 RDRA array can reach a high gain, up to18.6 dB, very high radiation efficiency (97\%), and ensure enough directional radiation pattern properties for radar applications with a 3-dB angular beam width of 6{\textdegree}. To validate our design, RDRA array{\textquoteright} radiation pattern computed results are compared to an equivalent fabricated patch antenna array reported in the literature. {\textcopyright} 2022, Institute of Advanced Engineering and Science. All rights reserved.}, doi = {10.11591/eei.v11i4.3068}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85133448647\&doi=10.11591\%2feei.v11i4.3068\&partnerID=40\&md5=a0d9425608cbc6d17f3ea7aeb3718bdd}, author = {Haddad, A. and Aoutoul, M. and Essaaidi, M. and Sabri, K. and Khoukh, A. and Errami, Y. and Had, A. and El Moukhtafi, F. and Jouali, R.} } @article {Tougui2022210, title = {Machine Learning Smart System for Parkinson Disease Classification Using the Voice as a Biomarker}, journal = {Healthcare Informatics Research}, volume = {28}, number = {3}, year = {2022}, note = {cited By 1}, pages = {210-221}, abstract = {Objectives: This study presents PD Predict, a machine learning system for Parkinson disease classification using voice as a biomarker. Methods: We first created an original set of recordings from the mPower study, and then extracted several audio features, such as mel-frequency cepstral coefficient (MFCC) components and other classical speech features, using a windowing procedure. The generated dataset was then divided into training and holdout sets. The training set was used to train two machine learning pipelines, and their performance was estimated using a nested subject-wise cross-validation approach. The holdout set was used to assess the generalizability of the pipelines for unseen data. The final pipelines were implemented in PD Predict and accessed through a prediction endpoint developed using the Django REST Framework. PD Predict is a two-component system: a desktop application that records audio recordings, extracts audio features, and makes predictions; and a server-side web application that implements the machine learning pipelines and processes incoming requests with the extracted audio features to make predictions. Our system is deployed and accessible via the following link: https://pdpredict. herokuapp.com/. Results: Both machine learning pipelines showed moderate performance, between 65\% and 75\% using the nested subject-wise cross-validation approach. Furthermore, they generalized well to unseen data and they did not overfit the training set. Conclusions: The architecture of PD Predict is clear, and the performance of the implemented machine learning pipelines is promising and confirms the usability of smartphone microphones for capturing digital biomarkers of disease. {\textcopyright} 2022 The Korean Society of Medical Informatics.}, doi = {10.4258/hir.2022.28.3.210}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85136283086\&doi=10.4258\%2fhir.2022.28.3.210\&partnerID=40\&md5=fe558706024fa51b7b86f00ad98e6bc4}, author = {Tougui, I. and Jilbab, A. and El Mhamdi, J.} } @article {ElJai2022, title = {Socio-economic analysis of short-term trends of COVID-19: modeling and data analytics}, journal = {BMC Public Health}, volume = {22}, number = {1}, year = {2022}, note = {cited By 0}, abstract = {Background: COVID-19 caused a worldwide outbreak leading the majority of human activities to a rough breakdown. Many stakeholders proposed multiple interventions to slow down the disease and number of papers were devoted to the understanding the pandemic, but to a less extend some were oriented socio-economic analysis. In this paper, a socio-economic analysis is proposed to investigate the early-age effect of socio-economic factors on COVID-19 spread. Methods: Fifty-two countries were selected for this study. A cascade algorithm was developed to extract the R0 number and the day J*; these latter should decrease as the pandemic flattens. Subsequently, R0 and J* were modeled according to socio-economic factors using multilinear stepwise-regression. Results: The findings demonstrated that low values of days before lockdown should flatten the pandemic by reducing J*. Hopefully, DBLD is only parameter to be tuned in the short-term; the other socio-economic parameters cannot easily be handled as they are annually updated. Furthermore, it was highlighted that the elderly is also a major influencing factor especially because it is involved in the interactions terms in R0 model. Simulations proved that the health care system could improve the pandemic damping for low elderly. In contrast, above a given elderly, the reproduction number R0 cannot be reduced even for developed countries (showing high HCI values), meaning that the disease{\textquoteright}s severity cannot be smoothed regardless the performance of the corresponding health care system; non-pharmaceutical interventions are then expected to be more efficient than corrective measures. Discussion: The relationship between the socio-economic factors and the pandemic parameters R0 and J* exhibits complex relations compared to the models that are proposed in the literature. The quadratic regression model proposed~here has discriminated the most influencing parameters within the following approximated order, DLBL, HCI, Elderly, Tav, CO2, and WC as first order, interaction, and second order terms. Conclusions: This modeling allowed the emergence of interaction terms that don{\textquoteright}t appear in similar studies; this led to emphasize more complex relationship between the infection spread and the socio-economic factors. Future works will focus on enriching the datasets and the optimization of the controlled parameters to short-term slowdown of similar pandemics. {\textcopyright} 2022, The Author(s).}, keywords = {aged, communicable disease control, COVID-19, Data Science, epidemiology, human, Humans, SARS-CoV-2, Socioeconomic Factors, socioeconomics}, doi = {10.1186/s12889-022-13788-4}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85136870489\&doi=10.1186\%2fs12889-022-13788-4\&partnerID=40\&md5=319bf3cc0bc571a1c7ddf78cab18333b}, author = {El Jai, M. and Zhar, M. and Ouazar, D. and Akhrif, I. and Saidou, N.} } @article {Meshram2021131336, title = {IBOOST: A Lightweight Provably Secure Identity-Based Online/Offline Signature Technique Based on FCM for Massive Devices in 5G Wireless Sensor Networks}, journal = {IEEE Access}, volume = {9}, year = {2021}, note = {cited By 7}, pages = {131336-131347}, abstract = {The fifth-generation (5G) wireless network is commercialized. The need to integrate massive devices in 5G and wireless sensor networks (WSN) to provide several convenient services for network users becomes imperative. However, there are growing concerns that 5G-WSNs pose new security threats to sensitive user information. User authentication and key agreement have been provided for secure end-to-end communication. However, stricter security techniques are required as billions of massive devices are being networked to collect and process complex user data in real-time. Therefore, anonymous authentication and authorization are highly coveted for privacy preservation and prevention of unlawful exploitation of user data. However, guaranteeing data integrity, authentication, and non-repudiation require special-purpose identity-based signature techniques that are quite difficult to design in practice. In order to address this problem, this paper proposes a lightweight, provably secure identity-based online/offline signature technique (IBOOST) and its extension for massive devices in 5G-WSNs using fractional chaotic maps. The IBOOST scheme achieves multi-time use of offline storage at a lower processing time. Therefore, the signer can reuse the offline pre-stored information in a polynomial time. This makes our IBOOST superior to the existing online/offline signature techniques that allow only a single signature. Additionally, the new technique enables the pre-registration process with a secret key, and no secret key is required in the offline stage. Also, the proposed IBOOST proves to be secure in the random oracle unforgeability under the chosen message attack (UF-IBS-CMA). Finally, the IBOOST and its enhanced version (A-IBOOST) give the lowest computational costs compared to several contending techniques. Therefore, the proposed IBOOST shows superior security and performance with better computational overhead than the preliminary techniques. {\textcopyright} 2013 IEEE.}, keywords = {5G mobile communication systems, 5g wireless sensor network system, Authentication, Chaotic communications, Chaotic map, Chaotic systems, Communication system security, Cryptography, Digital storage, Fractional chaotic map, Identity-based signature scheme, Lyapunov methods, Network security, Offline signatures, Polynomial approximation, Provably secure, Secure communication, Security, Sensor network systems, Wireless sensor networks}, doi = {10.1109/ACCESS.2021.3114287}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85115720532\&doi=10.1109\%2fACCESS.2021.3114287\&partnerID=40\&md5=7998ce2d4092c9f49d84029f3c9d35cd}, author = {Meshram, C. and Imoize, A.L. and Elhassouny, A. and Aljaedi, A. and Alharbi, A.R. and Jamal, S.S.} } @article {Jeddi2021, title = {Machine learning for predicting the risk for childhood asthma using prenatal, perinatal, postnatal and environmental factors}, journal = {Healthcare (Switzerland)}, volume = {9}, number = {11}, year = {2021}, note = {cited By 3}, abstract = {The prevalence rate for childhood asthma and its associated risk factors vary significantly across countries and regions. In the case of Morocco, the scarcity of available medical data makes scientific research on diseases such as asthma very challenging. In this paper, we build machine learning models to predict the occurrence of childhood asthma using data from a prospective study of 202 children with and without asthma. The association between different factors and asthma diagnosis is first assessed using a Chi-squared test. Then, predictive models such as logistic regression analysis, decision trees, random forest and support vector machine are used to explore the relationship between childhood asthma and the various risk factors. First, data were pre-processed using a Chi-squared feature selection, 19 out of the 36 factors were found to be significantly associated (p-value < 0.05) with childhood asthma; these include: history of atopic diseases in the family, presence of mites, cold air, strong odors and mold in the child{\textquoteright}s environment, mode of birth, breastfeeding and early life habits and exposures. For asthma prediction, random forest yielded the best predictive performance (accuracy = 84.9\%), followed by logistic regression (accuracy = 82.57\%), support vector machine (accuracy = 82.5\%) and decision trees (accuracy = 75.19\%). The decision tree model has the advantage of being easily interpreted. This study identified important maternal and prenatal risk factors for childhood asthma, the majority of which are avoidable. Appropriate steps are needed to raise awareness about the prenatal risk factors. {\textcopyright} 2021 by the authors. Licensee MDPI, Basel, Switzerland.}, doi = {10.3390/healthcare9111464}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85118143874\&doi=10.3390\%2fhealthcare9111464\&partnerID=40\&md5=ed53157bb344c4ea98eaef10d4ade531}, author = {Jeddi, Z. and Gryech, I. and Ghogho, M. and Hammoumi, M.E.L. and Mahraoui, C.} } @article {Pefura-Yone2020297, title = {Atopic dermatitis in children and adults in Sub-saharan Africa and Maghreb [{\'E}tat des lieux de la dermatite atopique de l{\textquoteright}enfant et de l{\textquoteright}adulte en Afrique sub-saharienne et au Maghreb]}, journal = {Revue Francaise d{\textquoteright}Allergologie}, volume = {60}, number = {4}, year = {2020}, note = {cited By 0}, pages = {297-299}, abstract = {{Objective: To describe the demographic, clinical, paraclinical and therapeutic characteristics of patients with atopic dermatitis in Sub-Saharan Africa (SSA) and the Maghreb. Methods: The Medical Doctors members of the Federation Allergologie Internationale (FAI) working in SSA and the Maghreb were invited to participate in this cross-sectional study to consecutively including patients with atopic dermatitis (AD) seen in their consultations from September 2019 to January 2010 (5 months). Results: A total of 69 patients (53.6\% female) were included. The proportion of female subjects was higher among subjects included in SSA (69.7\% vs 38.9\%}, keywords = {adolescent, adult, Africa south of the Sahara, allergic rhinitis, asthma, Atopic dermatitis, bacterial skin disease, child, clinical assessment, clinical feature, consultation, cross-sectional study, daytime somnolence, disease association, female, food allergen, human, major clinical study, male, prevalence, prurigo, seborrheic dermatitis, Short Survey}, doi = {10.1016/j.reval.2020.02.014}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85081410340\&doi=10.1016\%2fj.reval.2020.02.014\&partnerID=40\&md5=f42b72ed95d78155dedf2d2b24439201}, author = {Pefura-Yone, E.W. and Jeddi, Z. and Kouotou, E.A. and Delimi, B. and El Gueddari, Y. and Karkar, R. and Kebe, M. and Diallo Chauvin, M. and Dumur, J.-P.} } @conference {Maqboul2020, title = {Contribution of Artificial Neural Network in Predicting Completeness Through the Impact and Complexity of its Improvement}, booktitle = {ACM International Conference Proceeding Series}, year = {2020}, note = {cited By 0}, abstract = {The technological evolution and the immensity of the data produced, circulated into company makes these data, the real capital of the companies to the detriment of the customers. The erroneous data put the knockout to relationships with customers, the company must address this problem and identify the quality projects on which it must make an effort. In this article, we will present an approach based on qualitative and quantitative analysis to help the decision-makers to target data by its impacts and complexities of process improvement. The Qualitative study will be a survey and a quantitative to learn from survey data to decide the prediction and the completeness of data. {\textcopyright} 2020 ACM.}, keywords = {Decision makers, Decision making, Erroneous datum, Information systems, Information use, Neural networks, Process Improvement, Qualitative and quantitative analysis, Qualitative study, Survey data, Surveys, Technological evolution}, doi = {10.1145/3386723.3387850}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85123040935\&doi=10.1145\%2f3386723.3387850\&partnerID=40\&md5=222e383506f6fed754588124c4a4be60}, author = {Maqboul, J. and Jaouad, B.B.} } @conference {Gad2020, title = {Crowd Density Estimation Method Using Reduced Features Set}, booktitle = {2020 International Conference on Electrical and Information Technologies, ICEIT 2020}, year = {2020}, note = {cited By 0}, abstract = {A new crowd density estimation method with reduced feature set is proposed that enhances both prediction errors and computational time in terms of feature extraction, training, and prediction times. Based on the filter, wrapper, and embedded approaches to feature selection, 9 different sets of selected features were generating. Features categories were ranked based on the number of features selected across all selection methods. Using each set of features, 7 different regression models got trained. Each model performance was assessed based on MSE, MAE, and MRE. Feature selection methods were ranked based on its robustness in reducing the prediction errors. Based on the experimental results, the proposed method outperforms the previous works. {\textcopyright} 2020 IEEE.}, keywords = {Computational time, Crowd density, Feature extraction, Feature selection methods, Features sets, Forecasting, Logistic regression, Model performance, Prediction errors, Regression model, Selection methods}, doi = {10.1109/ICEIT48248.2020.9113179}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85086903221\&doi=10.1109\%2fICEIT48248.2020.9113179\&partnerID=40\&md5=e227463adf229bd65938fec34f2f0d2b}, author = {Gad, A.F. and Ezzahra Jarmouni, F.} } @conference {Gad2020, title = {Cython for Speeding-up Genetic Algorithm}, booktitle = {2020 International Conference on Electrical and Information Technologies, ICEIT 2020}, year = {2020}, note = {cited By 0}, abstract = {This paper proposes a library for implementing the genetic algorithm using Python mainly in NumPy and speeding-up its execution using Cython. The preliminary Python implementation is inspected for possible optimizations. The 4 main changes include statically defining data types for the NumPy arrays, specifying the data type of the array elements in addition to the number of dimensions, using indexing for looping through the arrays, and finally disabling some unnecessary features in Cython. Using Cython, the NumPy array processing is 1250 times faster than CPython. The Cythonized version of the genetic algorithm is 18 times faster than the Python version. {\textcopyright} 2020 IEEE.}, keywords = {Array elements, Array processing, Data type, Genetic algorithms, High level languages}, doi = {10.1109/ICEIT48248.2020.9113210}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85086899207\&doi=10.1109\%2fICEIT48248.2020.9113210\&partnerID=40\&md5=2f21b7d3239af190e4a515e4e967104b}, author = {Gad, A.F. and Ezzahra Jarmouni, F.} } @article {PEFURAYONE2020297, title = {{\'E}tat des lieux de la dermatite atopique de l{\textquoteright}enfant et de l{\textquoteright}adulte en Afrique sub-saharienne et au Maghreb}, journal = {Revue Fran{\c c}aise d{\textquoteright}Allergologie}, volume = {60}, number = {4}, year = {2020}, note = {15{\`e}me Congr{\`e}s Francophone d{\textquoteright}Allergologie}, pages = {297-299}, abstract = {{R{\'e}sum{\'e} Objectif D{\'e}crire les caract{\'e}ristiques d{\'e}mographiques, cliniques, paracliniques et th{\'e}rapeutiques des patients ayant une dermatite atopique en Afrique sub-saharienne (SSA) et au Maghreb. M{\'e}thodes Les m{\'e}decins membres de la F{\'e}d{\'e}ration Allergologie Internationale travaillant en Afrique sub-saharienne et au Maghreb ont {\'e}t{\'e} invit{\'e}s {\`a} participer {\`a} cette {\'e}tude transversale en incluant de fa{\c c}on cons{\'e}cutive les patientsatteints de dermatite atopique (DA) vus dans leurs consultations de septembre 2019~{\`a} janvier 2010 (5~mois). R{\'e}sultats Au total, 69~patients (53,6~\% de sexe f{\'e}minin) ont {\'e}t{\'e} inclus. La proportion des sujets de sexe f{\'e}minin {\'e}tait plus {\'e}lev{\'e}e chez les sujets inclus en Afrique SSA (69,7~\% vs 38,9~\%}, keywords = {Allergie, Allergy, Atopic dermatitis, Atopic eczema, Dermatite atopique, Ecz{\'e}ma atopique, Inflammatory disease, Maladie inflammatoire}, issn = {1877-0320}, doi = {https://doi.org/10.1016/j.reval.2020.02.014}, url = {https://www.sciencedirect.com/science/article/pii/S1877032020300452}, author = {E.W. Pefura-Yone and Z. Jeddi and E.A. Kouotou and B. Delimi and Y. El Gueddari and R. Karkar and M. Kebe and M. Diallo Chauvin and J.-P. Dumur} } @article {Nassit2020, title = {A new analytical method for spherical thin shells{\textquoteright} axisymmetric vibrations}, journal = {Mathematical Problems in Engineering}, volume = {2020}, year = {2020}, note = {cited By 0}, abstract = {In order to improve the spherical thin shells{\textquoteright} vibrations analysis, we introduce a new analytical method. In this method, we take into consideration the terms of the inertial couples in the stress couples{\textquoteright} differential equations of motion. These inertial couples are omitted in the theories provided by Naghdi{\textendash}Kalnins and Kunieda. The results show that the current method can solve the axisymmetric vibrations{\textquoteright} equations of elastic thin spherical shells. In this paper, we focus on verifying the current method, particularly for free vibrations with free edge and clamped edge boundary conditions. To check the validity and accuracy of the current analytical method, the natural frequencies determined by this method are compared with those available in the literature and those obtained by a finite element calculation. Copyright {\textcopyright} 2020 Mariame Nassit et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.}, keywords = {Analytical method, Axisymmetric vibrations, Boundary conditions, Clamped edge, Equations of motion, Free edge, Free vibration, Spheres, Spherical shell, Thin shells, Vibration analysis, Vibrations analysis}, doi = {10.1155/2020/1074236}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097643702\&doi=10.1155\%2f2020\%2f1074236\&partnerID=40\&md5=8e15fa702076267daafa725beb1a50a0}, author = {Nassit, M. and Harif, A.E. and Berbia, H. and Janan, M.T.} } @conference {Jeddi20205531, title = {Practical Acoustic Energy-Based Estimation of Inhalation Flow Rate for Asthma Monitoring}, booktitle = {Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS}, volume = {2020-July}, year = {2020}, note = {cited By 1}, pages = {5531-5536}, abstract = {The estimation of inhalation flow rate (IFR) using acoustic devices has recently received attention. While existing work often assumes that the microphone is placed at a fixed distance from the acoustic device, this assumption does not hold in real settings. This leads to poor estimation of the IFR since the received acoustic energy varies significantly with the distance. Despite the fact that the acoustic source is passive and only one microphone is used, we show in this paper that the distance can be estimated by exploiting the inhaler actuation sound, generated when releasing the medication. Indeed, this sound is used as a reference acoustic signal which is leveraged to estimate the distance in real settings. The resulting IFR estimation is shown to be highly accurate (R2 = 80.3\%). {\textcopyright} 2020 IEEE.}, keywords = {Acoustic devices, Acoustic energy, Acoustic signals, Acoustic sources, Highly accurate, Microphones}, doi = {10.1109/EMBC44109.2020.9175314}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85091027116\&doi=10.1109\%2fEMBC44109.2020.9175314\&partnerID=40\&md5=33b9d02826be90a4bdc1aae587e1a8e3}, author = {Jeddi, Z. and Ghogho, M. and Bohr, A. and Boetker, J. and Li, Y. and Kassou, I.} } @conference {Haddad2019, title = {Efficient Stacked Cylindrical Dielectric Resonator Antenna for Anticollision Short Range Radar at 79GHz}, booktitle = {International Symposium on Advanced Electrical and Communication Technologies, ISAECT 2018 - Proceedings}, year = {2019}, note = {cited By 0}, doi = {10.1109/ISAECT.2018.8618833}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062468314\&doi=10.1109\%2fISAECT.2018.8618833\&partnerID=40\&md5=0e4f2684dccbbbf03196e55a1fa16de3}, author = {Haddad, A. and Aoutoul, M. and Rais, K. and Faqir, M. and Essaaidi, M. and Lakssir, B. and Moukhtafi, F.E. and Jouali, R.} } @article {Zarnoufi2019672, title = {Language identification for user generated content in social media}, journal = {Smart Innovation, Systems and Technologies}, volume = {111}, year = {2019}, note = {cited By 0}, pages = {672-678}, doi = {10.1007/978-3-030-03577-8_73}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85056449806\&doi=10.1007\%2f978-3-030-03577-8_73\&partnerID=40\&md5=0788a6d5259f75585d3c1d415a6c7300}, author = {Zarnoufi, R. and Jaafar, H. and Abik, M.} } @article {Baltzegar2018S81, title = {Anticipating complexity in the deployment of gene drive insects in agriculture}, journal = {Journal of Responsible Innovation}, volume = {5}, year = {2018}, pages = {S81-S97}, doi = {10.1080/23299460.2017.1407910}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85045066962\&doi=10.1080\%2f23299460.2017.1407910\&partnerID=40\&md5=b708d0e8dc54ba63bf7d1d406a3bad2f}, author = {Baltzegar, J. and Cavin Barnes, J. and Elsensohn, J.E. and Gutzmann, N. and Jones, M.S. and King, S. and Sudweeks, J.} } @book {O{\textquoteright}Hara2018116, title = {Building an Urban food system through UDC food hubs}, series = {Changing Urban Landscapes Through Public Higher Education}, year = {2018}, pages = {116-143}, doi = {10.4018/978-1-5225-3454-9.ch006}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046487411\&doi=10.4018\%2f978-1-5225-3454-9.ch006\&partnerID=40\&md5=b72e96b6d9f72215cfbb0f00948b4e48}, author = {O{\textquoteright}Hara, S. and Jones, D. and Trobman, H.B.} } @article {Avanzini2018379, title = {Evaluating perceived quality through sensory evaluation in the development process of new products: A case study of luxury market}, journal = {Advances in Intelligent Systems and Computing}, volume = {739}, year = {2018}, pages = {379-388}, doi = {10.1007/978-981-10-8612-0_40}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85044184043\&doi=10.1007\%2f978-981-10-8612-0_40\&partnerID=40\&md5=e0c2647850f1e2194831321ca22d7664}, author = {Avanzini, C. and Mantelet, F. and Aoussat, A. and Jeanningros, F. and Bouchard, C.} } @article {Emerson20181, title = {Soul of the City: The Depth of How "urban" Matters in the Sociology of Religion}, journal = {Sociology of Religion: A Quarterly Review}, volume = {79}, number = {1}, year = {2018}, pages = {1-19}, doi = {10.1093/socrel/srx056}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85043334602\&doi=10.1093\%2fsocrel\%2fsrx056\&partnerID=40\&md5=235227dab6bb6e508b6dc1ad75941175}, author = {Emerson, M.O. and Johnson, L.M.K.} } @article {ElAsri2017217, title = {From periphery to core: A temporal analysis of github contributors{\textquoteright} collaboration network}, journal = {IFIP Advances in Information and Communication Technology}, volume = {506}, year = {2017}, note = {cited By 0}, pages = {217-229}, abstract = {Open-source projects in GitHub exhibit rich temporal dynamics, and diverse contributors{\textquoteright} social interactions further intensify this process. In this paper, we analyze temporal patterns associated with Open Source Software (OSS) projects and how the contributor{\textquoteright}s notoriety grows and fades over time in a core-periphery structure. In order to explore the temporal dynamics of GitHub communities we formulate a time series clustering model using both Social Network Analysis (SNA) and technical metrics. By applying an adaptive time frame incremental approach to clustering, we locate contributors in different temporal networks. We demonstrate our approach on five long-lived OSS projects involving more than 700 contributors and found that there are three main temporal shapes of attention when contributors shift from periphery to core. Our analyses provide insights into common temporal patterns of the growing OSS communities on GitHub and broaden the understanding of the dynamics and motivation of open source contributors. {\textcopyright} IFIP International Federation for Information Processing 2017.}, doi = {10.1007/978-3-319-65151-4_21}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85029582330\&doi=10.1007\%2f978-3-319-65151-4_21\&partnerID=40\&md5=741b4dffe841d068e54b517f5b1966c8}, author = {El Asri, I. and Kerzazi, N. and Benhiba, L. and Janati, M.} } @article {Patel201792, title = {A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems}, journal = {Computers and Security}, volume = {64}, year = {2017}, note = {cited By 3}, pages = {92-109}, abstract = {Smart Grid (SG) systems are critical, intelligent infrastructure utility services connected through open networks that are potentially susceptible to cyber-attacks with very acute security risks of shutdown, loss of life, and loss of revenue. Traditional intrusion detection systems based on signature and anomaly techniques are no longer sufficient to protect SGs due to their new connectivity and management challenges, the ever-rapidly-evolving masquerades, and cyber criminality levied against them. SGs require cyber-security systems to render them resilient and protected through advanced Intrusion Detection and Prevention System (IDPS) techniques and mechanisms. This paper proposes a smart collaborative advanced IDPS to provide the best possible protection of SGs with a fully distributed management structure that supports the network and host based detections and the prevention of attacks. By facilitating a reliable, scalable, and flexible design, the specific requirements of IDPS for SGs can be more easily met via a fuzzy risk analyzer, an independent and ontology knowledge-based inference engine module. These can work collaboratively by managing functions across multiple IDPS domains. A set of extensive and intensive simulated experiments shows that with its smart advanced components incorporating soft computing machine-learning techniques and a rich ontology knowledge base with fuzzy logic analysis, it detects and prevents intrusions more efficiently. The multi-faceted results of the simulation also show that the proposed Collaborative Smart IDPS (CSIDPS) system increases the intrusion detection accuracy and decreases the false positive alarms when compared to traditional IDPSs. This is epitomized by the skillful use of the confusion matrix technique for organizing classifiers, visualizing their performance, and assessing their overall behavior. In the final analysis, the CSIDPS architecture is designed toward contributing to de facto norms for SG ecosystems. {\textcopyright} 2016 Elsevier Ltd}, doi = {10.1016/j.cose.2016.07.002}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84994874812\&doi=10.1016\%2fj.cose.2016.07.002\&partnerID=40\&md5=5f6f90e6647d272108664e9c5f43cf5e}, author = {Patel, A. and Alhussian, H. and Pedersen, J.M. and Bounabat, B. and J{\'u}nior, J.C. and Katsikas, S.} } @article { ISI:000389092100006, title = {A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems}, journal = {COMPUTERS \& SECURITY}, volume = {64}, year = {2017}, month = {JAN}, pages = {92-109}, abstract = {Smart Grid (SG) systems are critical, intelligent infrastructure utility services connected through open networks that are potentially susceptible to cyber-attacks with very acute security risks of shutdown, loss of life, and loss of revenue. Traditional intrusion detection systems based on signature and anomaly techniques are no longer sufficient to protect SGs due to their new connectivity and management challenges, the ever-rapidly-evolving masquerades, and cyber criminality levied against them. SGs require cyber-security systems to render them resilient and protected through advanced Intrusion Detection and Prevention System (IDPS) techniques and mechanisms. This paper proposes a smart collaborative advanced IDPS to provide the best possible protection of SGs with a fully distributed management structure that supports the network and host based detections and the prevention of attacks. By facilitating a reliable, scalable, and flexible design, the specific requirements of IDPS for SGs can be more easily met via a fuzzy risk analyzer, an independent and ontology knowledge based inference engine module. These can work collaboratively by managing functions across multiple IDPS domains. A set of extensive and intensive simulated experiments shows that with its smart advanced components incorporating soft computing machine-learning techniques and a rich ontology knowledge base with fuzzy logic analysis, it detects and prevents intrusions more efficiently. The multi-faceted results of the simulation also show that the proposed Collaborative Smart IDPS (CSIDPS) system increases the intrusion detection accuracy and decreases the false positive alarms when compared to traditional IDPSs. This is epitomized by the skillful use of the confusion matrix technique for organizing classifiers, visualizing their performance, and assessing their overall behavior. In the final analysis, the CSIDPS architecture is designed toward contributing to de facto norms for SG ecosystems. (C) 2016 Elsevier Ltd. All rights reserved.}, issn = {0167-4048}, doi = {10.1016/j.cose.2016.07.002}, author = {Patel, Ahmed and Alhussian, Hitham and Pedersen, Jens Myrup and Bounabat, Bouchaib and Celestino Junior, Joaquim and Katsikas, Sokratis} } @article {Patel201792, title = {A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems}, journal = {Computers and Security}, volume = {64}, year = {2017}, note = {cited By 0}, pages = {92-109}, abstract = {Smart Grid (SG) systems are critical, intelligent infrastructure utility services connected through open networks that are potentially susceptible to cyber-attacks with very acute security risks of shutdown, loss of life, and loss of revenue. Traditional intrusion detection systems based on signature and anomaly techniques are no longer sufficient to protect SGs due to their new connectivity and management challenges, the ever-rapidly-evolving masquerades, and cyber criminality levied against them. SGs require cyber-security systems to render them resilient and protected through advanced Intrusion Detection and Prevention System (IDPS) techniques and mechanisms. This paper proposes a smart collaborative advanced IDPS to provide the best possible protection of SGs with a fully distributed management structure that supports the network and host based detections and the prevention of attacks. By facilitating a reliable, scalable, and flexible design, the specific requirements of IDPS for SGs can be more easily met via a fuzzy risk analyzer, an independent and ontology knowledge-based inference engine module. These can work collaboratively by managing functions across multiple IDPS domains. A set of extensive and intensive simulated experiments shows that with its smart advanced components incorporating soft computing machine-learning techniques and a rich ontology knowledge base with fuzzy logic analysis, it detects and prevents intrusions more efficiently. The multi-faceted results of the simulation also show that the proposed Collaborative Smart IDPS (CSIDPS) system increases the intrusion detection accuracy and decreases the false positive alarms when compared to traditional IDPSs. This is epitomized by the skillful use of the confusion matrix technique for organizing classifiers, visualizing their performance, and assessing their overall behavior. In the final analysis, the CSIDPS architecture is designed toward contributing to de facto norms for SG ecosystems. {\textcopyright} 2016 Elsevier Ltd}, doi = {10.1016/j.cose.2016.07.002}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84994874812\&doi=10.1016\%2fj.cose.2016.07.002\&partnerID=40\&md5=5f6f90e6647d272108664e9c5f43cf5e}, author = {Patel, A.a b and Alhussian, H.c and Pedersen, J.M.d and Bounabat, B.e and J{\'u}nior, J.C.a and Katsikas, S.f} } @conference {ElHamlaoui201618, title = {Alignment of viewpoint heterogeneous design models: "Emergency Department" Case Study}, booktitle = {CEUR Workshop Proceedings}, volume = {1731}, year = {2016}, note = {cited By 0}, pages = {18-27}, abstract = {Generally, various models can be used to describe a given application domain on different aspects and thus give rise to several views. To have a complete view of the application domain, heterogeneous models need to be unified, which is a hard task to do. To tackle this problem, we have proposed a method to relate partial models without combining them in a single model. In our approach, partial models are organized as a network of models through a virtual global model called M1C (Model of correspondences between models) which conforms to a ubiquitous language based on a Meta-Model of Correspondences (MMC). This paper presents an application of our method to an "Emergency Department" case study. It has been performed as a collaborative process involving model designers and a supervisor. The focus is put on the building of the M1C model from 3 partial models.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84999098977\&partnerID=40\&md5=f0512c94d99ecc99fcd8fc9336ce1668}, author = {El Hamlaoui, M.a b and Coulette, B.b and Ebersold, S.b and Bennani, S.a and Nassar, M.a and Anwar, A.e and Beugnard, A.c and Bach, J.C.c and Jamoussi, Y.d and Tran, H.N.b} } @conference { ISI:000385280000027, title = {Multi-hop Clustering Algorithm Based on Spectral Classification for Wireless Sensor Network}, booktitle = {PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION \& COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2}, series = {Lecture Notes in Electrical Engineering}, volume = {381}, year = {2016}, note = {Mediterranean Conference on Information and Communication Technologies (MedCT), Saidia, MOROCCO, MAY 07-09, 2015}, pages = {255-264}, abstract = {A Wireless Sensor Network (WSN) is composed of a large number of autonomous and compact devices called sensor nodes. This network can be an effective tool for gathering data in a variety of environments. However, these sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Clustering is a kind of a technique which is used to reduce energy consumption and to extend network lifetime. Hence, multi-hop communication is often required when the communication range of the sensor nodes is limited or the number of sensor nodes is very large in a network. In this paper, we propose a multi-hop spectral clustering algorithm to organize the sensor nodes in a WSN into clusters. Simulation results show that the proposed algorithm performs better in reducing the energy consumption of sensors and effectively improves the WSN lifetime.}, isbn = {978-3-319-30298-0; 978-3-319-30296-6}, issn = {1876-1100}, doi = {10.1007/978-3-319-30298-0\_27}, author = {Jorio, Ali and El Fkihi, Sanaa and Elbhiri, Brahim and Aboutajdine, Driss}, editor = {ElOualkadi, A and Choubani, F and ElMoussati, A} } @article {Jorio2016255, title = {Multi-hop clustering algorithm based on spectral classification for wireless sensor network}, journal = {Lecture Notes in Electrical Engineering}, volume = {381}, year = {2016}, note = {cited By 0}, pages = {255-264}, abstract = {A Wireless Sensor Network (WSN) is composed of a large number of autonomous and compact devices called sensor nodes. This network can be an effective tool for gathering data in a variety of environments. However, these sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Clustering is a kind of a technique which is used to reduce energy consumption and to extend network lifetime. Hence, multi-hop communication is often required when the communication range of the sensor nodes is limited or the number of sensor nodes is very large in a network. In this paper, we propose a multi-hop spectral clustering algorithm to organize the sensor nodes in a WSN into clusters. Simulation results show that the proposed algorithm performs better in reducing the energy consumption of sensors and effectively improves the WSN lifetime. {\textcopyright} Springer International Publishing Switzerland 2016.}, doi = {10.1007/978-3-319-30298-0_27}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84964091516\&doi=10.1007\%2f978-3-319-30298-0_27\&partnerID=40\&md5=9978fe8f8eb166334a20f4b43e48bf35}, author = {Jorio, A.a and Fkihi, S.E.b and Elbhiri, B.c and Aboutajdine, D.a} } @article {Nouh2016742, title = {New efficient scheme based on reduction of the dimension in the multiple impulse method to find the minimum distance of linear codes}, journal = {International Review on Computers and Software}, volume = {11}, number = {9}, year = {2016}, note = {cited By 0}, pages = {742-751}, abstract = {In order to find a minimum weight codeword in a linear code, the Multiple Impulse Method uses the Ordered Statistics Decoder of order 3 having a complexity which increases with the code dimension. This paper presents an important improvement of this method by finding a sub code of C of small dimension containing a lowest weight codeword. In the case of Binary Extended Quadratic Residue codes, the proposed technique consists on finding a self invertible permutation σ from the projective special linear group and searching a codeword having the minimum weight in the sub code fixed by σ. The proposed technique gives the exact value of the minimum distance for all binary quadratic residue codes of length less than 223 by using the Multiple Impulse Method on the sub codes in less than one second. For lengths more than 223, the obtained results prove the height capacity of the proposed technique to find the lowest weight in less time. The proposed idea is generalized for BCH codes and it has permits to find the true value of the minimum distance for some codes of lengths 1023 and 2047. The proposed methods performed very well in comparison to previously known results. {\textcopyright} 2016 Praise Worthy Prize S.r.l. - All rights reserved.}, doi = {10.15866/irecos.v11i9.9702}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85006717110\&doi=10.15866\%2firecos.v11i9.9702\&partnerID=40\&md5=0cb2c7691fda83c0ef9764a93095e64c}, author = {Nouh, S.a and Joundan, I.A.a and Aylaj, B.b and Belkasmi, M.c and Namir, A.a} } @conference {Jouhari2016388, title = {New greedy forwarding strategy for UWSNs geographic routing protocols}, booktitle = {2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016}, year = {2016}, note = {cited By 0}, pages = {388-393}, abstract = {Recently Underwater wireless Sensor Networks (UWSNs) have been suggested as a powerful technology for many civilian and military applications, such that tactical surveillance. Geographic routing that uses the position information of nodes to route the packet toward a destination is preferable for UWSNs. In this paper, we propose a New Greedy Forwarding (NGF) strategy using splitting mechanism based on Chinese remainder theorem(CRT) for UWSNs. In the approach, source node reduced the number of bits transmitted using the proposed splitting mechanism based on CRT if there are more than two nodes participate in the forwarding of one packet. This strategy distribute the forwarding task between more nodes instead of selecting one node as next-hop, that reduce the energy consumption per node and maintain node communication for a long time. Thus resulting the increase of network life time and decrease the number of isolated/void nodes. We use topology control through depth adjustment to cope with the problem of isolated and void nodes appeared in geographic routing protocols. Simulation results shows that with the anycast greedy forwarding strategy the network life time is about 500 rounds whereas it is about 1000 rounds using the new greedy forwarding strategy, which means the new strategy increase the network life time and increase the network performance in energy saving. {\textcopyright} 2016 IEEE.}, doi = {10.1109/IWCMC.2016.7577089}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84994166915\&doi=10.1109\%2fIWCMC.2016.7577089\&partnerID=40\&md5=e43d0d319dbeeaa82e6ac9c64cee322d}, author = {Jouhari, M.a and Ibrahimi, K.a and Benattou, M.b and Kobbane, A.c} } @conference { ISI:000387181100066, title = {New Greedy Forwarding Strategy for UWSNs Geographic Routing Protocols}, booktitle = {2016 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC)}, series = {International Wireless Communications and Mobile Computing Conference}, year = {2016}, note = {12th International Wireless Communications \& Mobile Computing Conference (IWCMC), Paphos, CYPRUS, SEP 05-09, 2016}, pages = {388-393}, publisher = {IEEE; IEEE Cyprus Sect; Frederick Univ}, organization = {IEEE; IEEE Cyprus Sect; Frederick Univ}, abstract = {Recently Underwater wireless Sensor Networks (UWSNs) have been suggested as a powerful technology for many civilian and military applications, such that tactical surveillance. Geographic routing that uses the position information of nodes to route the packet toward a destination is preferable for UWSNs. In this paper, we propose a New Greedy Forwarding (NGF) strategy using splitting mechanism based on Chinese remainder theorem(CRT) for UWSNs. In the approach, source node reduced the number of bits transmitted using the proposed splitting mechanism based on CRT if there are more than two nodes participate in the forwarding of one packet. This strategy distribute the forwarding task between more nodes instead of selecting one node as next-hop, that reduce the energy consumption per node and maintain node communication for a long time. Thus resulting the increase of network life time and decrease the number of isolated/void nodes. We use topology control through depth adjustment to cope with the problem of isolated and void nodes appeared in geographic routing protocols. Simulation results shows that with the anycast greedy forwarding strategy the network life time is about 500 rounds whereas it is about 1000 rounds using the new greedy forwarding strategy, which means the new strategy increase the network life time and increase the network performance in energy saving.}, isbn = {978-1-5090-0304-4}, issn = {2376-6492}, author = {Jouhari, Mohammed and Ibrahimi, Khalil and Benattou, Mohammed and Kobbane, Abdellatif} } @article { ISI:000362266900001, title = {An Energy-Efficient Clustering Routing Algorithm Based on Geographic Position and Residual Energy for Wireless Sensor Network}, journal = {JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS}, year = {2015}, abstract = {Recently wireless sensor network (WSN) has become one of the most interesting networking technologies, since it can be deployed without communication infrastructures. A sensor network is composed of a large number of sensor nodes; these nodes are responsible for supervision of the physical phenomenon and transmission of the periodical results to the base station. Therefore, improving the energy efficiency and maximizing the networking lifetime are the major challenges in this kind of networks. To deal with this, a hierarchical clustering scheme, called Location-Energy Spectral Cluster Algorithm (LESCA), is proposed in this paper. LESCA determines automatically the number of clusters in a network. It is based on spectral classification and considers both the residual energy and some properties of nodes. In fact, our approach uses the K-ways algorithm and proposes new features of the network nodes such as average energy, distance to BS, and distance to clusters centers in order to determine the clusters and to elect the cluster{\textquoteright}s heads of a WSN. The simulation results show that if the clusters are not constructed in an optimal way and/or the number of the clusters is greater or less than the optimal number of clusters, the total consumed energy of the sensor network per round is increased exponentially.}, issn = {2090-7141}, doi = {10.1155/2015/170138}, author = {Jorio, Ali and El Fkihi, Sanaa and Elbhiri, Brahim and Aboutajdine, Driss} } @article {Jorio2015, title = {An energy-efficient clustering routing algorithm based on geographic position and residual energy for wireless sensor network}, journal = {Journal of Computer Networks and Communications}, volume = {2015}, year = {2015}, note = {cited By 4}, abstract = {Recently wireless sensor network (WSN) has become one of the most interesting networking technologies, since it can be deployed without communication infrastructures. A sensor network is composed of a large number of sensor nodes; these nodes are responsible for supervision of the physical phenomenon and transmission of the periodical results to the base station. Therefore, improving the energy efficiency and maximizing the networking lifetime are the major challenges in this kind of networks. To deal with this, a hierarchical clustering scheme, called Location-Energy Spectral Cluster Algorithm (LESCA), is proposed in this paper. LESCA determines automatically the number of clusters in a network. It is based on spectral classification and considers both the residual energy and some properties of nodes. In fact, our approach uses the K-ways algorithm and proposes new features of the network nodes such as average energy, distance to BS, and distance to clusters centers in order to determine the clusters and to elect the cluster{\textquoteright}s heads of a WSN. The simulation results show that if the clusters are not constructed in an optimal way and/or the number of the clusters is greater or less than the optimal number of clusters, the total consumed energy of the sensor network per round is increased exponentially. {\textcopyright} 2015 Ali Jorio et al.}, doi = {10.1155/2015/170138}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84924190502\&doi=10.1155\%2f2015\%2f170138\&partnerID=40\&md5=52a0eb2501890a83a608347ccdb9e158}, author = {Jorio, A.a and El Fkihi, S.b and Elbhiri, B.c and Aboutajdine, D.a} } @article {10906318420150210, title = {An Energy-Efficient Clustering Routing Algorithm Based on Geographic Position and Residual Energy for Wireless Sensor Network.}, journal = {Journal of Computer Networks \& Communications}, volume = {2015}, year = {2015}, pages = {1 - 11}, abstract = {Recently wireless sensor network (WSN) has become one of the most interesting networking technologies, since it can be deployed without communication infrastructures. A sensor network is composed of a large number of sensor nodes; these nodes are responsible for supervision of the physical phenomenon and transmission of the periodical results to the base station. Therefore, improving the energy efficiency and maximizing the networking lifetime are the major challenges in this kind of networks. To deal with this, a hierarchical clustering scheme, called Location-Energy Spectral Cluster Algorithm (LESCA), is proposed in this paper. LESCA determines automatically the number of clusters in a network. It is based on spectral classification and considers both the residual energy and some properties of nodes. In fact, our approach uses the K-ways algorithm and proposes new features of the network nodes such as average energy, distance to BS, and distance to clusters centers in order to deter}, keywords = {Data transmission systems, Energy consumption, Routing algorithms, Wireless sensor networks, Wireless sensor nodes}, issn = {20907141}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=109063184\&site=ehost-live}, author = {Jorio, Ali and El Fkihi, Sanaa and Elbhiri, Brahim and Aboutajdine, Driss} } @conference {Mezouary2015, title = {PRoPHET-RAIP5: A new approach to secure routing in wireless sensor networks}, booktitle = {International Conference on Wireless Networks and Mobile Communications, WINCOM 2015}, year = {2015}, note = {cited By 0}, abstract = {Probabilistic routing in wireless sensor network (WSNs) use the mobility history when making a forwarding decision. This type of routing provides a very rapid development and new perspectives in WSNs. However, there are several constraints and challenges to overcome the security problems. In this paper, we propose a security solution based on the RAID5 technology and a multi-path routing, to develop a protective mechanism against the various attacks in mobile WSNs. To demonstrate our concept, we have implemented this solution on Probabilistic Routing Protocol using History of Encounters and Transitivity (PRoPHET). We have compared our new protocol (PRoPHET-RAIP5) with standard PRoPHET to enhance security parameters. {\textcopyright} 2015 IEEE.}, doi = {10.1109/WINCOM.2015.7381307}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84965029803\&doi=10.1109\%2fWINCOM.2015.7381307\&partnerID=40\&md5=f34a0e46149201d4fc9429b7732f9c7b}, author = {Mezouary, R.E. and Houmz, A. and Jalil, J. and Koutbi, M.E.} } @conference { ISI:000380509200010, title = {PRoPHET-RAIP5: A New Approach to Secure Routing in Wireless Sensor Networks}, booktitle = {2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM)}, year = {2015}, note = {International conference on wireless networks and mobile communications, Marrakech, MOROCCO, OCT 20-23, 2015}, pages = {52-57}, abstract = {Probabilistic routing in wireless sensor network (WSNs) use the mobility history when making a forwarding decision. This type of routing provides a very rapid development and new perspectives in WSNs. However, there are several constraints and challenges to overcome the security problems. In this paper, we propose a security solution based on the RAID5 technology and a multi-path routing, to develop a protective mechanism against the various attacks in mobile WSNs. To demonstrate our concept, we have implemented this solution on Probabilistic Routing Protocol using History of Encounters and Transitivity (PRoPHET). We have compared our new protocol (PRoPHET-RAIP5) with standard PRoPHET to enhance security parameters.}, isbn = {978-1-4673-8224-3}, author = {El Mezouary, Ridouane and Houmz, Abdellah and Jalil, Jamila and El Koutbi, Mohammed} } @conference {Jadda2015, title = {Strategic Alignment and Information System project portfolio optimization model}, booktitle = {2015 10th International Conference on Intelligent Systems: Theories and Applications, SITA 2015}, year = {2015}, note = {cited By 0}, abstract = {With the evolution of Information and Communication Technology (ICT), Information Systems (IS) have become complex and difficult to control in the absence of definite necessary accompanying measures and lack of adherence of all stakeholders. Thus, a serious problem has faced organizations: how to develop Information Systems that provide both a better alignment with the organization{\textquoteright}s business strategy and a better added value? In this paper, we propose an optimization model that addresses this problem by providing a strategic alignment (SA) approach of IS projects while maximizing the value of projects. Strategic alignment is evaluated according to a well defined process that determines strategic axes, operational objectives, processes and functions of the information system to be developed according to a target of functional architecture. The project value is calculated according to criteria that each organization could define (estimated financial benefit, risk control, environmental efficiency, etc.). The model allows for determining IS project portfolio by taking into account the synergy created by projects that are located in the same portfolio, the constraints related to projects and resources. {\textcopyright} 2015 IEEE.}, doi = {10.1109/SITA.2015.7358385}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962467704\&doi=10.1109\%2fSITA.2015.7358385\&partnerID=40\&md5=6edfeae3235041e1db4422fa70da3d8d}, author = {Jadda, S. and Janati Idrissi, M.A.} } @conference { ISI:000380409500011, title = {Strategic Alignment and Information System project portfolio optimization model}, booktitle = {2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, year = {2015}, note = {10th International Conference on Intelligent Systems - Theories and Applications (SITA), ENSIAS, Rabat, MOROCCO, OCT 20-21, 2015}, publisher = {IEEE}, organization = {IEEE}, abstract = {With the evolution of Information and Communication Technology (ICT), Information Systems (IS) have become complex and difficult to control in the absence of definite necessary accompanying measures and lack of adherence of all stakeholders. Thus, a serious problem has faced organizations: how to develop Information Systems that provide both a better alignment with the organization{\textquoteright}s business strategy and a better added value? In this paper, we propose an optimization model that addresses this problem by providing a strategic alignment (SA) approach of IS projects while maximizing the value of projects. Strategic alignment is evaluated according to a well defined process that determines strategic axes, operational objectives, processes and functions of the information system to be developed according to a target of functional architecture. The project value is calculated according to criteria that each organization could define (estimated financial benefit, risk control, environmental efficiency, etc.). The model allows for determining IS project portfolio by taking into account the synergy created by projects that are located in the same portfolio, the constraints related to projects and resources.}, isbn = {978-1-5090-0220-7}, author = {Jadda, Salah and Janati Idrissi, Mohammed Abdou} } @conference { ISI:000360829800037, title = {Automata-Based Approach to Design and Analyze Security Policies}, booktitle = {2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST)}, year = {2014}, note = {12th Annual International Conference on Privacy, Security and Trust (PST), Ryerson Univ, Toronto, CANADA, JUL 23-24, 2014}, pages = {306-313}, abstract = {Information systems must be controlled by security policies to protect them from undue accesses. Security policies are often designed by rules expressed using informal text, which implies ambiguities and inconsistencies in security rules. Our objective in this paper is to develop a formal approach to design and analyze security policies. We propose a procedure that synthesizes an automaton which implements a given security policy. Our automata-based approach can be a common basis to analyze several aspects of security policies. We use our automata-based approach to develop three analysis procedures to: verify completeness of a security policy, detect anomalies in a security policy, and detect functional discrepancies between several implementations of a security policy. We illustrate our approach using examples of security policies for a firewall.}, isbn = {978-1-4799-3503-1}, author = {Krombi, Wadie and Erradi, Mohammed and Khoumsi, Ahmed}, editor = {Miri, A and Hengartner, U and Huang, NF and Josang, A and GarciaAlfaro, J} } @conference { ISI:000366666805090, title = {Green Opportunistic Access for Cognitive Radio Networks: A Minority Game Approach}, booktitle = {2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)}, series = {IEEE International Conference on Communications}, year = {2014}, note = {IEEE International Conference on Communications (ICC), Sydney, AUSTRALIA, JUN 10-14, 2014}, pages = {5372-5377}, publisher = {IEEE}, organization = {IEEE}, abstract = {We investigate energy conservation and system performance of decentralized resource allocation scheme in cognitive radio networks thoroughly based on secondary users competitive behavior. Indeed, the contention on data channel unoccupied by licensed user leads to a single winner, but also involves a loss of energy of all nodes. In this paper, we apply minority game (MG) to the most important phase from the opportunistic spectrum access (OSA) process: the sensing phase. We attempt to carry out a cooperation in a non-cooperative environment with no information exchange. We study the Nash equilibrium solution for pure and fully mixed strategies, and we use distributed learning algorithms enabling cognitive users to learn the Nash equilibrium. Finally, we provide numerical results to validate the proposed approach. The resource allocation based on minority game approach improves secondary users battery life and the performance of the network.}, isbn = {978-1-4799-2003-7}, issn = {1550-3607}, author = {Elmachkour, Mouna and Daha, Imane and Sabir, Essaid and Kobbane, Abdellatif and Ben-Othman, Jalel}, editor = {Jamalipour, A and Deng, DJ} } @conference {Jorio2014861, title = {A hierarchical clustering algorithm based on spectral classification for Wireless Sensor Networks}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2014}, note = {cited By 1}, pages = {861-866}, abstract = {A Wireless Sensor Network (WSN) is composed of a large number of autonomous and compact devices called sensor nodes. This network can be an effective tool for gathering data in a variety of enviornments. However, These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Therefor, saving energy and, thus extending the WSN lifetime entails great challenges. In order to prolong the lifetime of WSN, this study presents a hierarchical clustering algorithm based on spectral classification (HCA-SC). First, to overcome the ideal distribution of clusters, HCA-SC partition the network by spectral classification algorithm. Second, for each cluster, HCA-SC selects a node as a cluster head with regard residual energy and distance from base station. Simulation results showed that our algorithm performs better in reducing the energy consumption of sensor nodes and effectively improves the lifetime of wireless sensor networks. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICMCS.2014.6911354}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84928732445\&doi=10.1109\%2fICMCS.2014.6911354\&partnerID=40\&md5=2070584e9f01d9b450a2a4a005ba6a08}, author = {Jorio, A.a and El Fkihi, S.b and Elbhiri, B.c and Aboutajdine, D.a} } @conference { ISI:000366999600151, title = {A Hierarchical Clustering Algorithm based on Spectral Classification for Wireless Sensor Networks}, booktitle = {2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2014}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, MOROCCO, APR 14-16, 2014}, pages = {861-866}, abstract = {A Wireless Sensor Network (WSN) is composed of a large number of autonomous and compact devices called sensor nodes. This network can be an effective tool for gathering data in a variety of enviornments. However, These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Therefor, saving energy and, thus extending the WSN lifetime entails great challenges. In order to prolong the lifetime of WSN, this study presents a hierarchical clustering algorithm based on spectral classification (HCA-SC). First, to overcome the ideal distribution of clusters, HCA-SC partition the network by spectral classification algorithm. Second, for each cluster, HCA-SC selects a node as a cluster head with regard residual energy and distance from base station. Simulation results showed that our algorithm performs better in reducing the energy consumption of sensor nodes and effectively improves the lifetime of wireless sensor networks.}, isbn = {978-1-4799-3824-7}, author = {Jorio, Ali and El Fkihi, Sanaa and Elbhiri, Brahim and Aboutajdine, Driss} } @conference { ISI:000366666800017, title = {Optimal Buffer Management Policies in DTNs: A POMDP Approach}, booktitle = {2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)}, series = {IEEE International Conference on Communications}, year = {2014}, note = {IEEE International Conference on Communications (ICC), Sydney, AUSTRALIA, JUN 10-14, 2014}, pages = {94-99}, publisher = {IEEE}, organization = {IEEE}, abstract = {Using Delay Tolerant Networks (DTNs) would facilitate the connection of devices and areas across the world that are under-served by current networks. The DTNs are based on the concept of store-carry-and-forward protocols. A node may store a message in its buffer and carry it for a short or a long period of time, until an appropriate forwarding opportunity arises. A critical challenge is to determine routes through the network without even having an end-to-end connection. In order to increase the probability of message delivery, a known approach is implemented using epidemic message replication. This combination of long-term storage and message replication imposes a high storage and bandwidth overhead. Thus, efficient scheduling and dropping policies are necessary to decide which messages should be discarded when nodes{\textquoteright} buffers operate close to their capacity. If a relay buffer is full and needs to store a new packet, it has to decide either to keep the current message or to drop it. This decision depends on the number of transmissions of the message in its buffer and the message which has just arrived. In this paper, a Partially Observed Markov Decision Process (POMDP) framework is proposed to solve the problem of buffer management in DTNs. This modeling technique predicts some properties of the optimal buffer management policy. In addition, numerical examples are presented to illustrate the findings.}, isbn = {978-1-4799-2003-7}, issn = {1550-3607}, author = {Rahmouni, Imane and El Kamili, Mohamed and El Fenni, Mohammed Raiss and Omari, Lahcen and Kobbane, Abdellatif}, editor = {Jamalipour, A and Deng, DJ} } @conference { ISI:000366666801147, title = {POMDP Game Framework for Service Providers Inciting Mobile Users}, booktitle = {2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)}, series = {IEEE International Conference on Communications}, year = {2014}, note = {IEEE International Conference on Communications (ICC), Sydney, AUSTRALIA, JUN 10-14, 2014}, pages = {1742-1747}, publisher = {IEEE}, organization = {IEEE}, abstract = {The trend today is to access Internet through mobile devices, and people start using smartphones more than computers. This kind of services requires frequent updates through small messages from editors like in social networks. Although the use of such applications is subject to fees and consumes energy from limited batteries of smartphones. If a user activates his mobile device and has a useful contact opportunity with an access point, an update is received at the expense of monetary and energy costs. Thus, users face a tradeoff between such costs and their utilities. The goal of this paper is to show how a user can cope with such a tradeoff, by deriving a threshold policies. We consider the multi-user case, where each user try to maximize its reward based on a bonus given by the provider. We study the optimal policy in the Nash equilibrium. An optimal policy consists of deciding, based on the age of the last message received and the availability of access points whether to activate the mobile device or not. We model our problem using a POMDP with an average reward criterion. The accuracy of our model is illustrated through simulations.}, isbn = {978-1-4799-2003-7}, issn = {1550-3607}, author = {Raiss-el-Fenni, Mohammed and El-Kamili, Mohamed and Ben-Othman, Jalel and Kobbane, Abdellatif}, editor = {Jamalipour, A and Deng, DJ} } @conference {Jamoussi2014293, title = {Track report of conference on collaborative software process (CSP 2014)}, booktitle = {Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE}, year = {2014}, note = {cited By 0}, pages = {293}, abstract = {Building complex and trustworthy software systems in the shortest time-to-market remains the challenging objective that competitive companies are facing constantly, and mastering the development process is a key issue towards this objective.Companies need to be able to formalize their development processes in order to analyze them, to enact them, and to assess them for quality measurement and efficiency improvement. In the context of complex software and systems development, there are many actors involved in the development who use different tools and heterogeneous modeling languages. So we can say that resulting processes are highly collaborative and must be described and enacted as such. {\textcopyright} 2014 IEEE.}, doi = {10.1109/WETICE.2014.92}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84908408744\&doi=10.1109\%2fWETICE.2014.92\&partnerID=40\&md5=fa8f8421794c76aad5438ff06ead15d0}, author = {Jamoussi, Y.a and Coulette, B.b and Nassar, M.c} } @conference { ISI:000352498700056, title = {Track Report of CSP Track of WETICE-2014}, booktitle = {2014 IEEE 23RD INTERNATIONAL WETICE CONFERENCE (WETICE)}, year = {2014}, note = {23rd IEEE International Conference on Enabling Technologies, Infrastructure for Collaborative Enterprises (WETICE), Parma, ITALY, JUN 23-25, 2014}, pages = {293}, publisher = {IEEE; IEEE Comp Soc; W Virginia Univ; FoCAS EU FP7; IEEE Syst Man \& Cybernet Soc Italian Chapter}, organization = {IEEE; IEEE Comp Soc; W Virginia Univ; FoCAS EU FP7; IEEE Syst Man \& Cybernet Soc Italian Chapter}, isbn = {978-1-4799-4249-7}, author = {Jamoussi, Yassine and Coulette, Bernard and Nassar, Mahmoud}, editor = {Reddy, SM} } @conference {Bouirouga2013422, title = {Neural network adult videos recognition using jointly face shape and skin feature extraction}, booktitle = {VISAPP 2013 - Proceedings of the International Conference on Computer Vision Theory and Applications}, volume = {1}, year = {2013}, note = {cited By 0}, pages = {422-425}, abstract = {This paper presents a novel approach for video adult detection using face shape, skin threshold technique and neural network. The goal of employing skin-color information is to select the appropriate color model that allows verifying pixels under different lighting conditions and other variations. Then, the output videos are classified by neural network. The simulation shows that this system achieved 95.4\% of the true rate.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84878245129\&partnerID=40\&md5=efe58b6bdb1387e7884a28b2a0f6f0bb}, author = {Bouirouga, H.a and Elfkihi, S.b and Jilbab, A.c and Aboutajdine, D.a} } @article {Jorio2013717, title = {A new clustering algorithm for wireless sensor networks}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {49}, number = {3}, year = {2013}, note = {cited By 1}, pages = {717-724}, abstract = {Wireless sensor networks have recently become an attractive research area. However, saving energy and, thus, extending the wireless sensor network lifetime entails great challenges. For this reason, clustering techniques are largely made use of. In this paper we propose a new algorithm based on the principle of spectral clustering methods. Especially, we use the K-ways spectral clustering algorithm. The main characteristic of our proposal is that it defines the optimal number of clusters and dynamically changes the election probabilities of the cluster heads based on their residual energy. Up on analyzing the impact of node density on the robustness of the proposed algorithm as well as on its energy and lifetime gains, simulation results show that the approach actually improves the lifetime of a whole network and presents more energy efficiency distribution compared to Low-Energy Adaptive Clustering Hierarch, Centralized Low-Energy Adaptive Clustering Hierarch, and Distance-Energy Cluster Structure approaches. {\textcopyright} 2005 - 2013 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84875692769\&partnerID=40\&md5=ea5125d9aa1b9b5f0b4c870cfad69e2e}, author = {Jorio, A.a and Fkihi, S.E.b and Elbhiri, B.c and Aboutajdine, D.a} } @conference {Elbhiri2013, title = {A new spectral classification for robust clustering in wireless sensor networks}, booktitle = {Proceedings of 2013 6th Joint IFIP Wireless and Mobile Networking Conference, WMNC 2013}, year = {2013}, note = {cited By 1}, abstract = {Wireless sensor network has recently become an area of attractive research interest. It consists of low-cost, low power, and energy-constrained sensors responsible for monitoring a physical phenomenon and reporting to sink node where the end-user can access the data. Saving energy and therefore extending the wireless sensor network lifetime, involves great challenges. For these purposes, clustering techniques are largely used. Using many empirical successes of spectral clustering methods, we propose a new algorithm that we called Spectral Classification for Robust Clustering in Wireless Sensor Networks (SCRC-WSN). This protocol is a spectral partitioning method using graph theory technics with the aim to separate the network in a fixed optimal number of clusters. The cluster{\textquoteright}s nodes communicate with an elected node called cluster head, and then the cluster heads communicate the information to the base station. Defining the optimal number of clusters and changing dynamically the cluster head election probability are the SCRC-WSN strongest characteristics. In addition our proposed protocol is a centralized one witch take into account the node{\textquoteright}s residual energy to define the cluster heads. We studied the impact of node density on the robustness of the SCRC-WSN algorithm as well as its energy and its lifetime gains. Simulation results show that the proposed algorithm increases the lifetime of a whole network and presents more energy efficiency distribution compared to the Low-Energy Adaptive Clustering Hierarchy (LEACH) approach and the Centralized LEACH (LEACH-C)one. {\textcopyright} 2013 IEEE.}, doi = {10.1109/WMNC.2013.6548982}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84881393741\&doi=10.1109\%2fWMNC.2013.6548982\&partnerID=40\&md5=648ff469917070df5c7f54337dfa592b}, author = {Elbhiri, B.a b and Fkihi, S.E.b c and Saadane, R.b d and Lasaad, N.b and Jorio, A.b and Aboutajdine, D.b} } @article {Khaled20132477, title = {SEVALERPS a new EX-ANTE multi-criteria method for ERP selection}, journal = {International Review on Computers and Software}, volume = {8}, number = {10}, year = {2013}, note = {cited By 1}, pages = {2477-2485}, abstract = {Selecting the right ERP system is one of the most risky, tedious and complex decision making activity for any organization. This paper develops a new multi-criteria method for ERP systems evaluation and selection, which addresses some of the most important shortcomings relating to the methods found in the literature. The proposed method serves mainly twofold objectives; firstly it introduces a new systematic evaluation process that considers ERP tailoring and mismatch handling as the corner stone of the evaluation activity. Secondly, it presents a semi-structured evaluation model that helps the selection team to voice out its preferences. The evaluation model relies on many mathematical techniques to handle the various aspects of the evaluation: 0-1 linear programming systems to define the anticipated functional coverage of ERP candidates, MACBETH cardinal scales to represent, in an interactive way, the selection team{\textquoteright}s preferences, and the Choquet integral to address interdependencies among evaluation criteria. {\textcopyright} 2013 Praise Worthy Prize S.r.l. - All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84891532111\&partnerID=40\&md5=7c529f2d8b2248d12908e7ac15da5fe7}, author = {Khaled, A. and Janati-Idrissi, M.A.} } @article {Anoual201227, title = {A novel texture-based algorithm for localizing vehicle license plates}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {45}, number = {1}, year = {2012}, note = {cited By 1}, pages = {27-32}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84874531292\&partnerID=40\&md5=58ad16d91d008ad97e88e70a9234486f}, author = {Anoual, H. and Fkihi, S.E. and Jilbab, A. and Aboutajdine, D.} } @conference {Zoubairi2011, title = {Dynamic QoS management in mobile services framework}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2011}, note = {cited By 0}, doi = {10.1109/ICMCS.2011.5945691}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79961242339\&doi=10.1109\%2fICMCS.2011.5945691\&partnerID=40\&md5=dc02a4eb28cdfcfae12bca1fa64efde3}, author = {Zoubairi, R. and Jarir, Z. and Erradi, M.} } @conference { ISI:000300256400069, title = {Maturity Models Transition from eGovernment Interoperability to T-Government: Restyling Dynamic Public Services Through Integrated Transformation of Service Delivery}, booktitle = {PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON EGOVERNMENT}, year = {2011}, note = {11th European Conference on e-Government (ECEG), Univ Ljubljana, Fac Adm, Ljubljana, SLOVENIA, JUN 16-17, 2011}, pages = {591-602}, abstract = {Transforming public services through a global, common, measurable, achievable vision and clear objectives, the use of Information and Communication Technology and referral to services focused on the citizens needs have an important effect on economic, social and cultural life across the country that extends globally. The aim of this paper is to outline the part of the transformation of government services by defining the guidelines for implementation and monitoring procedures necessary to support any model of maturity to ensure the successful transformation of public services in a safe flexible and adaptable. The model we seek to build is based on best practices in service management, governance, enterprise architecture, and implementation of Information Technology.}, isbn = {978-1-908272-00-3}, author = {El Aichi, Mohamed Mohyi Eddine and El Kettani, Mohamed Dafir Ech-Cherif}, editor = {Klun, M and Decman, M and Jukic, T} } @conference { ISI:000298749600093, title = {Metamodels for models complete integration}, booktitle = {2011 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI)}, year = {2011}, note = {12th IEEE International Conference on Information Reuse and Integration (IRI)/1st International Workshop on Issues and Challenges in Social Computing (WICSOC), Las Vegas, NV, AUG 03-05, 2011}, pages = {496-499}, publisher = {IEEE Syst, Man \& Cybernet Soc (IEEE SMC); Soc Informat Reuse \& Integrat (SIRI); IEEE}, organization = {IEEE Syst, Man \& Cybernet Soc (IEEE SMC); Soc Informat Reuse \& Integrat (SIRI); IEEE}, abstract = {Problems occur in the models integration and particularly, in the comparison phase of the integration. Previous approaches have not correctly handled the semantic integration. We propose a complete approach for integrating of UML models. First, we provide a comparison approach incorporating syntactic, structural and semantic aspects in order to detect any correspondence between the models to compare, and secondly, a semantic approach to integrate the compared models. For this purpose, we use domain ontology. In this paper, our contribution is the proposition of the different metamodels needed in the comparison and the integration phases.}, isbn = {978-1-4577-0966-1}, author = {Benabdellah Chaouni, Samia and Fredj, Mounia and Mouline, Salma}, editor = {Alhajj, R and Joshi, J and Shyu, ML} } @conference {Bouirouga2011, title = {Recognition of adult video by combining skin detection features with motion information}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2011}, note = {cited By 1}, doi = {10.1109/ICMCS.2011.5945570}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79961239374\&doi=10.1109\%2fICMCS.2011.5945570\&partnerID=40\&md5=96e36065eca2afa2f2e3a18e0d2b4fe5}, author = {Bouirouga, H. and Lrit, S.E. and Jilbab, A. and Aboutajdine, D.} } @conference {Anoual2011, title = {Vehicle license plate detection in images}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2011}, note = {cited By 3}, doi = {10.1109/ICMCS.2011.5945680}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79961227182\&doi=10.1109\%2fICMCS.2011.5945680\&partnerID=40\&md5=0640cc288461c0ff15b817b0c5d2a10b}, author = {Anoual, H. and Fkihi, S.E. and Jilbab, A. and Aboutajdine, D.} } @conference {Bouirouga2010, title = {A comparison of skin detection techniques for objectionable videos}, booktitle = {2010 5th International Symposium on I/V Communications and Mobile Networks, ISIVC 2010}, year = {2010}, note = {cited By 0}, doi = {10.1109/ISVC.2010.5656278}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-78651520179\&doi=10.1109\%2fISVC.2010.5656278\&partnerID=40\&md5=cbf0bdbe507be5b0297aaf80e2b30d25}, author = {Bouirouga, H. and El Fkihi, S. and Jilbab, A. and Bakrim, M.} } @conference {Anoual2010, title = {Features extraction for text detection and localization}, booktitle = {2010 5th International Symposium on I/V Communications and Mobile Networks, ISIVC 2010}, year = {2010}, note = {cited By 1}, doi = {10.1109/ISVC.2010.5656284}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-78651516449\&doi=10.1109\%2fISVC.2010.5656284\&partnerID=40\&md5=7432f9409c4d2e3bd7a3aa3a78c5865a}, author = {Anoual, H. and Aboutajdine, D. and Elfkihi, S. and Jilbab, A.} } @article {Anoual2010157, title = {New approach based on texture and geometric features for text detection}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {6134 LNCS}, year = {2010}, note = {cited By 0}, pages = {157-164}, doi = {10.1007/978-3-642-13681-8_19}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79956278929\&doi=10.1007\%2f978-3-642-13681-8_19\&partnerID=40\&md5=c16c63472198a6944f7f472697a0cc7c}, author = {Anoual, H. and El Fkihi, S. and Jilbab, A. and Aboutajdine, D.} } @conference {Zoubairi2009, title = {Quality of service in MAQAME architecture}, booktitle = {2009 Mediterrannean Microwave Symposium, MMS 2009}, year = {2009}, note = {cited By 0}, doi = {10.1109/MMS.2009.5409836}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-77950325416\&doi=10.1109\%2fMMS.2009.5409836\&partnerID=40\&md5=57718766b57322c34964257ba47d6ded}, author = {Zoubairi, R. and Jarir, Z. and Erradi, M.} } @conference {Jarir2008, title = {A meta-level architecture for QoS awareness in a mobile environment}, booktitle = {Proceedings - The 8th International Conference on New Technologies in Distributed Systems, NOTERE 2008}, year = {2008}, note = {cited By 2}, doi = {10.1145/1416729.1416742}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-70349131226\&doi=10.1145\%2f1416729.1416742\&partnerID=40\&md5=73c5c53df3a2c82cd1331152f2192eae}, author = {Jarir, Z. and Erradi, M.} } @conference {Jakimi2008521, title = {Use cases and scenarios engineering}, booktitle = {Innovations{\textquoteright}07: 4th International Conference on Innovations in Information Technology, IIT}, year = {2008}, note = {cited By 0}, pages = {521-525}, doi = {10.1109/IIT.2007.4430418}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-50249112803\&doi=10.1109\%2fIIT.2007.4430418\&partnerID=40\&md5=82fe395e89ce2d783684d6544100e69f}, author = {Jakimi, A. and Sabraoui, A. and Badidi, E. and Idri, A. and El Koutbi, M.} } @conference { ISI:000259601400195, title = {Using UAM scenarios in B2B systems}, booktitle = {2008 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING, VOLS 1-3}, year = {2008}, note = {International Conference on Computer and Communication Engineering, Kuala Lumpur, MALAYSIA, MAY 13-15, 2008}, pages = {964+}, publisher = {Int Islam Univ Malaysia, Fac Engn}, organization = {Int Islam Univ Malaysia, Fac Engn}, abstract = {Over the past years, scenarios have received significant attention and have been used for different purposes such as understanding requirements, human computer interaction analysis, and object-oriented analysis and design. In this paper, we suggest to apply the scenario approach to B2B systems (Business to Business). We propose, to develop B2B systems as a three activities process deriving formal specifications and code skeletons from UML scenarios. Activities of this proposed process are generally automatic and are supported by a set of developed algorithms and tools.}, isbn = {978-1-4244-2357-6}, doi = {10.1109/ICCCE.2008.4580750}, author = {Jakimi, A. and Sabraoui, A. and Salah, A. and El Koutbi, M.} } @conference { ISI:000250559700098, title = {Towards managing variability across business component development}, booktitle = {IRI 2007: PROCEEDINGS OF THE 2007 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION}, year = {2007}, note = {IEEE International Conference on Information Reuse and Integration (IRI-2007), Las Vegas, NV, AUG 13-15, 2007}, pages = {594+}, publisher = {IEEE; SMC Soc}, organization = {IEEE; SMC Soc}, abstract = {Reusing components, which are specifically set up to suit enterprises requirements, becomes a key element of their software engineering strategy. Consequently, the ability of reusable components to be varied and appropriate to different re-users requirements is a key property in reusable component development. From this need, the concept of variability has emerged. It is defined as the ability of a software artefact to be changed or customized to be used in multiple contexts. The objective of our research is to outline variability issues through reusable component development, and in particular, in the requirements phase of a Business Component (BC) development. The main ideas of this research are (a) to address variability issues through the requirements phase of a BC development and (b) to propose a metamodel to describe variability concepts that must be classified and designed to manage this variability.}, isbn = {978-1-4244-1499-4}, doi = {10.1109/IRI.2007.4296685}, author = {Saidil, Rajaa and Fredj, Mounia and Mouline, Salma and Front, Agnes and Rieu, Dominique}, editor = {Chang, W and Joshi, JBD} } @conference { ISI:000255983000056, title = {Use cases and scenarios engineering}, booktitle = {2007 INNOVATIONS IN INFORMATION TECHNOLOGIES, VOLS 1 AND 2}, year = {2007}, note = {4th International Conference on Innovations in Information Technology, Dubai, U ARAB EMIRATES, NOV 18-20, 2007}, pages = {274+}, publisher = {IEEE}, organization = {IEEE}, abstract = {\textbackslash{} In this paper, we suggest a requirement engineering process that composes (merge) use cases/scenarios and yields a formal specification of the system in form of a high-level Petri net. Use cases and scenarios are acquired in form of diagrams as defined by the Unified Modeling Language (UML). These diagrams are composed and transformed into Petri net specifications and merged to obtain a global Petri net specification capturing the behavior of the entire system. From the global specification, a system prototype can be generated and embedded in a user interface builder environment for further refinement. Based on end user feedback, the use cases and the input scenarios may be iteratively refined. The result of the overall process is a specification consisting of a global Petri net, together with the generated and refined prototype. This paper discusses some activities of this process.}, isbn = {978-1-4244-1840-4}, author = {Jakimi, A. and Sabraoui, A. and Badidi, E. and Idri, A. and El Koutbi, M.} } @conference { ISI:000241429800054, title = {Galois{\textquoteright} lattice for video navigation in a DBMS}, booktitle = {MULTIMEDIA CONTENT REPRESENTATION, CLASSIFICATION AND SECURITY}, series = {LECTURE NOTES IN COMPUTER SCIENCE}, volume = {4105}, year = {2006}, note = {International Workshop on Multimedia Content Representation, Classification and Security (MRCS 2006), Istanbul, TURKEY, SEP 11-13, 2006}, pages = {418-425}, publisher = {Int Assoc Pattern Recognit; Istanbul Tech Univ; TUBITAK}, organization = {Int Assoc Pattern Recognit; Istanbul Tech Univ; TUBITAK}, abstract = {Digital visual media encounters many problems related to storage, representation, querying and visual presentation. In this paper, we propose a technique for the retrieval of video from a database on the basis of video shots classified by a Galois{\textquoteright} lattice. The result is a kind of hypermedia that combines both classification and visualization properties in order to navigate between key frames and video segments.}, isbn = {3-540-39392-7}, issn = {0302-9743}, author = {Mbaye, Ibrahima and Martinez, Jose and Thami, Rachid Oulad Haj}, editor = {Gunsel, B and Jain, AK and Tekalp, AM and Sankur, B} } @conference { ISI:000086483900037, title = {Towards an adaptation of the COCOMO cost model to the software measurement theory}, booktitle = {SOFTWARE ENGINEERING - ESEC/FSE {\textquoteleft}97}, series = {LECTURE NOTES IN COMPUTER SCIENCE}, volume = {1301}, year = {1997}, note = {Joint Meeting of the 6th European Software Engineering Conference / 5th ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 97), ZURICH, SWITZERLAND, SEP 22-25, 1997}, pages = {525-526}, publisher = {ESEC; ACM SIGSOFT; Fdn Software Engn}, organization = {ESEC; ACM SIGSOFT; Fdn Software Engn}, isbn = {3-540-63531-9}, issn = {0302-9743}, author = {Idri, A and Griech, B and El Iraki, A}, editor = {Jazayeri, M and Schauer, H} }