@article {Haddad20222115, title = {1{\texttimes}16 Rectangular dielectric resonator antenna array for 24 Ghz automotive radar system}, journal = {Bulletin of Electrical Engineering and Informatics}, volume = {11}, number = {4}, year = {2022}, note = {cited By 0}, pages = {2115-2123}, abstract = {This paper presents the design of a 1{\texttimes}16-elements RDRA array for anti-collision radar SRR application at 24 GHz. A single RDRA with high dielectric constant of 41, fed by a simple microstrip line feeding technique, is initially designed to operate around 24 GHz. The RDRA element is further used within an array network structure made up of 16 linear antenna elements to cover the same frequency band. The simulated 1{\texttimes}16 RDRA array can reach a high gain, up to18.6 dB, very high radiation efficiency (97\%), and ensure enough directional radiation pattern properties for radar applications with a 3-dB angular beam width of 6{\textdegree}. To validate our design, RDRA array{\textquoteright} radiation pattern computed results are compared to an equivalent fabricated patch antenna array reported in the literature. {\textcopyright} 2022, Institute of Advanced Engineering and Science. All rights reserved.}, doi = {10.11591/eei.v11i4.3068}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85133448647\&doi=10.11591\%2feei.v11i4.3068\&partnerID=40\&md5=a0d9425608cbc6d17f3ea7aeb3718bdd}, author = {Haddad, A. and Aoutoul, M. and Essaaidi, M. and Sabri, K. and Khoukh, A. and Errami, Y. and Had, A. and El Moukhtafi, F. and Jouali, R.} } @article {Daoudi2022505, title = {Adaptive Enterprise Architecture: Complexity Metrics in a Mixed Evaluation Method}, journal = {Lecture Notes in Business Information Processing}, volume = {455 LNBIP}, year = {2022}, note = {cited By 0}, pages = {505-523}, abstract = {Classically, enterprises future is intertwined with the needs and demands of society. Nowadays, in addition to those two elements, challenges are becoming more and more numerous and unavoidable. Saying a few, global warming, social responsibilities, Covid 19, digital transformation{\textellipsis} We are living in a new era that is highly volatile and unpredictable. We don{\textquoteright}t have anymore the privilege to choose threats and opportunities that we want to adapt to. In fact adaptation becomes a necessity to survive in this highly competitive and dynamic environment. Factors coming from those challenges externally on top of internal ones can impact various parts of the enterprise in the form of changes. Thus, Adaptive Enterprise Architecture (EA) is leveraged to assist the continuous adaptation to the evolving transformation. On the other hand, one of the criteria of Adaptive EA is the ability to monitor and control the complexity of changes. In this paper, we suggest a mixed approach of EA complexity measurement based on quantitative and qualitative analysis. First, we begin with a recap of the criteria shaping our Adaptive Enterprise Architecture approach and we give an overview of the model that we worked on in previous work. Then we investigate related work about complexity and subjective measurement. Finally, we describe our mixed approach of assessment of complexity and we focus on the calculation of some objective and subjective metrics. {\textcopyright} 2022, Springer Nature Switzerland AG.}, keywords = {Adaptation, Adaptive enterprise, Complexity, Complexity measurement, Complexity metrics, Dynamic environments, enterprise architecture, Evaluation methods, Global warming, Memory architecture, Mixed approach, Social responsibilities}, doi = {10.1007/978-3-031-08965-7_26}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135013677\&doi=10.1007\%2f978-3-031-08965-7_26\&partnerID=40\&md5=0f86e1df30e1a710a67e90c0238de8f1}, author = {Daoudi, W. and Doumi, K. and Kjiri, L.} } @article {Sebbar2022251, title = {BDA-enabler Architecture Based on Cloud Manufacturing: the Case of Chemical Industry}, journal = {International Journal of Supply and Operations Management}, volume = {9}, number = {3}, year = {2022}, note = {cited By 0}, pages = {251-263}, abstract = {With the advent of cloud manufacturing (CM), alongside the maturity of specific development approaches and systems in the manufacturing industry, has led to the integration of these initiatives into Industry 4.0 to achieve higher performance. In fact, the implementation of Industry 4.0 is a real opportunity for the process industry around the world which is only at the very beginning of its deployment. However, the integration of cloud manufacturing requires the fully digitalization of industrial systems and the implementation of big data management process. Indeed, the lack of resources to handle the huge flows of data in transit and the lack of standards and interoperability is the biggest challenge to the large-scale adoption of smart manufacturing. To get around this problem, it is necessary to put in place management and analysis solutions for big data to facilitate data acquisition, process monitoring, anomaly detection and predictive and proactive maintenance. In addition, the implementation of a smart manufacturing architecture based on big data analytics (BDA) requires a lot of resources in terms of storage and computing power, which is not always available in an industrial context. Thus, it has become essential to offer suitable manufacturing models for the implementation of big data analysis services that meet the new requirements of the manufacturing sector. In this paper, a case study in one of the main African Phosphates Company will be presented. Thus, we will propose a BDA-enabler architecture based on Cloud manufacturing to identified digital opportunities and key benefits regarding performance management, production control and maintenance. The findings will help manufacturer to understand cloud manufacturing and big data analytics capabilities and take advantages from their potential and their digital opportunities to assess manufacturing process. {\textcopyright} 2022 Kharazmi University. All rights reserved.}, doi = {10.22034/ijsom.2021.109150.2208}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85140920905\&doi=10.22034\%2fijsom.2021.109150.2208\&partnerID=40\&md5=22cf4ece941e282c346700fda9fe056e}, author = {Sebbar, A. and Zkik, K. and Belhadi, A. and Benghalia, A. and Boulmalf, M. and Ech-Cherif El Kettani, M.D.} } @conference {Ennasar2022, title = {Concentration Measurements of Ethanol in Water Based on RFID-UHF Flexible Sensor for Sterilization Against SARS-CoV}, booktitle = {Mediterranean Microwave Symposium}, volume = {2022-May}, year = {2022}, note = {cited By 0}, abstract = {In this work, we present a UHF-RFID-based noninvasive sensor to measure the concentration of ethanol in water using the volume fraction of liquids in mixture solutions. The sensing system operates at the UHF band (860-928 MHz). The concentration of ethanol in water affects the dielectric properties of the solution and therefore the antenna sensitivity of the RFID tag. This sensor operates by measuring the change in permittivity of a solution because of the change in concentration of ethanol in water. We propose a flexible RFID-Tag sensor a low-cost alternative to identify the possible sensitivity of tag changes and is able to detect a variation of 25\% in ethanol in 9 ml of deionized water (DI-Water). The solution is useful in avoiding counterfeit ethanol solutions that may be toxic. The experimental setup is inexpensive, portable, quick, and contactless. We present results for ethanol solutions ranging from 25\% to 100\% in a small tube container. {\textcopyright} 2022 IEEE.}, keywords = {Concentration Measurement, Deionized water, Detection concertation, Ethanol, Ethanol solutions, Flexible sensor, Measurements of, Mobile antennas, Permittivity, Radio frequency identification (RFID), RFID-tag, RFID-UHF, SARS, SARS-covid, Sensitivity analysis, Volume fraction, Volume fraction ratio, Water based}, doi = {10.1109/MMS55062.2022.9825563}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135142263\&doi=10.1109\%2fMMS55062.2022.9825563\&partnerID=40\&md5=684556f603e3476c323fad8de626b806}, author = {Ennasar, M.A. and Essaaidi, M. and El Mrabet, O. and El Khamlichi, M.} } @article {Filali20222174, title = {Dynamic SDN-Based Radio Access Network Slicing With Deep Reinforcement Learning for URLLC and eMBB Services}, journal = {IEEE Transactions on Network Science and Engineering}, volume = {9}, number = {4}, year = {2022}, note = {cited By 3}, pages = {2174-2187}, abstract = {Radio access network (RAN) slicing is a key technology that enables 5G network to support heterogeneous requirements of generic services, namely ultra-reliable low-latency communication (URLLC) and enhanced mobile broadband (eMBB). In this paper, we propose a two time-scales RAN slicing mechanism to optimize the performance of URLLC and eMBB services. In a large time-scale, an SDN controller allocates radio resources to gNodeBs according to the requirements of the eMBB and URLLC services. In a short time-scale, each gNodeB allocates its available resources to its end-users and requests, if needed, additional resources from adjacent gNodeBs. We formulate this problem as a non-linear binary program and prove its NP-hardness. Next, for each time-scale, we model the problem as a Markov decision process (MDP), where the large-time scale is modeled as a single agent MDP whereas the shorter time-scale is modeled as a multi-agent MDP. We leverage the exponential-weight algorithm for exploration and exploitation (EXP3) to solve the single-agent MDP of the large time-scale MDP and the multi-agent deep Q-learning (DQL) algorithm to solve the multi-agent MDP of the short time-scale resource allocation. Extensive simulations show that our approach is efficient under different network parameters configuration and it outperforms recent benchmark solutions. {\textcopyright} 2013 IEEE.}, keywords = {5G mobile communication systems, Deep learning, EMBB, Heuristic algorithms, Heuristics algorithm, Learning algorithms, Low-latency communication, Markov processes, Multi agent systems, Network slicing, Optimisations, Optimization, Quality of service, Quality-of-service, Radio access networks, Reinforcement learning, Resource allocation, Resource Management, Software agents, Software defined networking, Software-defined networkings, Time measurement, Ultra reliable low latency communication, URLLC}, doi = {10.1109/TNSE.2022.3157274}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85126273319\&doi=10.1109\%2fTNSE.2022.3157274\&partnerID=40\&md5=44d6a41c3d7b8b6d8c4d6918856f36c5}, author = {Filali, A. and Mlika, Z. and Cherkaoui, S. and Kobbane, A.} } @article {Ouatiti2022, title = {An empirical study on log level prediction for multi-component systems}, journal = {IEEE Transactions on Software Engineering}, year = {2022}, note = {cited By 0}, abstract = {Please find the revised abstract attached. IEEE}, keywords = {Computer software, Data structures, Empirical studies, Java, Java programming language, Learning systems, Log level prediction, Multicomponents systems, Predictive models, Software logging, Software-systems}, doi = {10.1109/TSE.2022.3154672}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85125313776\&doi=10.1109\%2fTSE.2022.3154672\&partnerID=40\&md5=c178439b3606759a34f8e163ece1ea35}, author = {Ouatiti, Y.E. and Sayagh, M. and Kerzazi, N. and Hassan, A.E.} } @article {ElKarfi2022561, title = {An Ensemble of Arabic Transformer-based Models for Arabic Sentiment Analysis}, journal = {International Journal of Advanced Computer Science and Applications}, volume = {13}, number = {8}, year = {2022}, note = {cited By 0}, pages = {561-567}, abstract = {In recent years, sentiment analysis has gained momentum as a research area. This task aims at identifying the opinion that is expressed in a subjective statement. An opinion is a subjective expression describing personal thoughts and feelings. These thoughts and feelings can be assigned with a certain sentiment. The most studied sentiments are positive, negative, and neutral. Since the introduction of attention mechanism in machine learning, sentiment analysis techniques have evolved from recurrent neural networks to transformer models. Transformer-based models are encoder-decoder systems with attention. Attention mechanism has permitted models to consider only relevant parts of a given sequence. Making use of this feature in encoder-decoder architecture has impacted the performance of transformer models in several natural language processing tasks, including sentiment analysis. A significant number of Arabic transformer-based models have been pre-trained recently to perform Arabic sentiment analysis tasks. Most of these models are implemented based on Bidirectional Encoder Representations from Transformers (BERT) such as AraBERT, CAMeLBERT, Arabic ALBERT and GigaBERT. Recent studies have confirmed the effectiveness of this type of models in Arabic sentiment analysis. Thus, in this work, two transformer-based models, namely AraBERT and CAMeLBERT have been experimented. Furthermore, an ensemble model has been implemented to achieve more reasonable performance {\textcopyright} 2022, International Journal of Advanced Computer Science and Applications.All Rights Reserved.}, keywords = {Arabic sentiment analyse, Attention mechanisms, Bert, Decoding, Ensemble learning, Learning systems, Performance, Positive/negative, Recurrent neural networks, Research areas, Sentiment analysis, Signal encoding, Transformer, Transformer modeling}, doi = {10.14569/IJACSA.2022.0130865}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137156665\&doi=10.14569\%2fIJACSA.2022.0130865\&partnerID=40\&md5=927293fb0ea8e16df6981eecff917dd6}, author = {El Karfi, I. and El Fkihi, S.} } @article {Daoui2022, title = {Environmental, Climatic, and Parasite Molecular Factors Impacting the Incidence of Cutaneous Leishmaniasis Due to Leishmania tropica in Three Moroccan Foci}, journal = {Microorganisms}, volume = {10}, number = {9}, year = {2022}, note = {cited By 0}, abstract = {{Cutaneous leishmaniasis (CL) occurring due to Leishmania tropica is a public health problem in Morocco. The distribution and incidence of this form of leishmaniasis have increased in an unusual way in the last decade, and the control measures put in place are struggling to slow down the epidemic. This study was designed to assess the impact of climatic and environmental factors on CL in L. tropica foci. The data collected included CL incidence and climatic and environmental factors across three Moroccan foci (Foum Jemaa, Imintanout, and Ouazzane) from 2000 to 2019. Statistical analyses were performed using the linear regression model. An association was found between the occurrence of CL in Imintanout and temperature and humidity (r2 = 0.6076}, doi = {10.3390/microorganisms10091712}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85138700280\&doi=10.3390\%2fmicroorganisms10091712\&partnerID=40\&md5=515be27b75ee2affaf29fb221f2aefe8}, author = {Daoui, O. and Bennaid, H. and Kbaich, M.A. and Mhaidi, I. and Aderdour, N. and Rhinane, H. and Bouhout, S. and Akarid, K. and Lemrani, M.} } @article {Ahajjam2022, title = {Experimental investigation of variational mode decomposition and deep learning for short-term multi-horizon residential electric load forecasting}, journal = {Applied Energy}, volume = {326}, year = {2022}, note = {cited By 0}, abstract = {With the booming growth of advanced digital technologies, it has become possible for users as well as distributors of energy to obtain detailed and timely information about the electricity consumption of households. These technologies can also be used to forecast the household{\textquoteright}s electricity consumption (a.k.a. the load). In this paper, Variational Mode Decomposition and deep learning techniques are investigated as a way to improve the accuracy of the load forecasting problem. Although this problem has been studied in the literature, selecting an appropriate decomposition level and a deep learning technique providing better forecasting performance have garnered comparatively less attention. This study bridges this gap by studying the effect of six decomposition levels and five distinct deep learning networks. The raw load profiles are first decomposed into intrinsic mode functions using the Variational Mode Decomposition in order to mitigate their non-stationary aspect. Then, day, hour, and past electricity consumption data are fed as a three-dimensional input sequence to a four-level Wavelet Decomposition Network model. Finally, the forecast sequences related to the different intrinsic mode functions are combined to form the aggregate forecast sequence. The proposed method was assessed using load profiles of five Moroccan households from the Moroccan buildings{\textquoteright} electricity consumption dataset (MORED) and was benchmarked against state-of-the-art time-series models and a baseline persistence model. {\textcopyright} 2022 Elsevier Ltd}, keywords = {data set, decomposition, Decomposition level, Deep learning, Electric load forecasting, Electric power plant loads, Electric power utilization, electricity, electricity supply, Electricity-consumption, Experimental investigations, forecasting method, Housing, Intrinsic mode functions, learning, Learning algorithms, Learning systems, Learning techniques, Load profiles, Multi-horizon forecasting, Residential load forecasting, Short-term residential load forecasting, Variational mode decomposition, Wavelet decomposition}, doi = {10.1016/j.apenergy.2022.119963}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85138343844\&doi=10.1016\%2fj.apenergy.2022.119963\&partnerID=40\&md5=322ce14ee40d2de7bbdfa72a4aabc718}, author = {Ahajjam, M.A. and Bonilla Licea, D. and Ghogho, M. and Kobbane, A.} } @article {Gryech2022, title = {An Exploration of Features Impacting Respiratory Diseases in Urban Areas}, journal = {International Journal of Environmental Research and Public Health}, volume = {19}, number = {5}, year = {2022}, note = {cited By 3}, abstract = {Air pollution exposure has become ubiquitous and is increasingly detrimental to human health. Small Particulate matter (PM) is one of the most harmful forms of air pollution. It can easily infiltrate the lungs and trigger several respiratory diseases, especially in vulnerable populations such as children and elderly people. In this work, we start by leveraging a retrospective study of 416 children suffering from respiratory diseases. The study revealed that asthma prevalence was the most common among several respiratory diseases, and that most patients suffering from those diseases live in areas of high traffic, noise, and greenness. This paved the way to the construction of the MOREAIR dataset by combining feature abstraction and micro-level scale data collection. Unlike existing data sets, MOREAIR is rich in context-specific components, as it includes 52 temporal or geographical features, in addition to air-quality measurements. The use of Random Forest uncovered the most important features for the understanding of air-quality distribution in Moroccan urban areas. By linking the medical data and the MOREAIR dataset, we observed that the patients included in the medical study come mostly from neighborhoods that are characterized by either high average or high variations of pollution levels. {\textcopyright} 2022 by the authors. Licensee MDPI, Basel, Switzerland.}, keywords = {aged, air pollutant, Air Pollutants, Air pollution, Air quality, air quality control, Article, asthma, breathing disorder, child, controlled study, disease risk assessment, environmental exposure, environmental risk, exploratory research, geographic information system, GIS, health risk, human, Humans, major clinical study, Measurement, medical information, Moroccan, neighborhood, noise injury, Particulate Matter, prevalence, public health, random forest, Respiration Disorders, respiratory disease, respiratory tract disease, Retrospective Studies, retrospective study, Risk assessment, risk factor, traffic pollution, urban area}, doi = {10.3390/ijerph19053095}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85125596721\&doi=10.3390\%2fijerph19053095\&partnerID=40\&md5=011cdce4b84286477d86b54655147f71}, author = {Gryech, I. and Ghogho, M. and Mahraoui, C. and Kobbane, A.} } @article {Badaoui2022646, title = {Fuzzy Centrality Measures: A Survey}, journal = {Lecture Notes in Networks and Systems}, volume = {505 LNNS}, year = {2022}, note = {cited By 0}, pages = {646-654}, abstract = {Most real-world problems can be pictured as a set of connections and interactions between various entities. Together, these entities create a complex phenomenon investigated in the form of complex networks. Each of the entities in the network plays a particular role in the definition of the structure and the analysis of the studied problem. Several measures of centrality have been proposed in the literature to estimate the contribution and quantify the relevance of network entities. The most influential nodes are defined either locally, via the measurement of their connections with their directly related neighbors, or globally, via the measurement of the importance of their neighbors or their relevance in terms of contribution to the fast propagation of information based on the shortest paths. Due to the incompleteness of real-world data, crisp representations do not adequately describe the problem. Therefore, fuzzy graphs have been proposed to give more realistic representations by taking into account the uncertainties present in data. This paper proposes a state of the art of fuzzy centrality measures with a focus on proposed studies on urban traffic networks. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-09176-6_72}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135013682\&doi=10.1007\%2f978-3-031-09176-6_72\&partnerID=40\&md5=20f3763938d5a04e48899262e6cbc4e9}, author = {Badaoui, F.-E. and Boulmakoul, A. and Lbath, A. and Thami, R.O.H. and Cherradi, G. and Karim, L. and Bouziri, A.E.} } @article {Boulmakoul2022796, title = {Fuzzy Spatiotemporal Centrality for Urban Resilience}, journal = {Lecture Notes in Networks and Systems}, volume = {307}, year = {2022}, note = {cited By 1}, pages = {796-803}, abstract = {Traffic congestion is a growing concern in the world{\textquoteright}s most populated metropolitan areas. Over the past decades, several approaches have been developed to better understand and control urban traffic management, such as artificial intelligence, video streaming, fuzzy logic, and complex networks. In this study, we apply a combination of fuzzy logic and complex network analysis to better understand the dynamic structure of urban traffic networks. When studying the dynamic processes of transportation networks, the exploration of the critical entities plays a crucial role in exploring and analyzing the resilience and management of urban traffic systems. Therefore, we propose measures of flow and travel time variability as well as dynamic road saturation factors to develop fuzzy measures of dynamic centrality. Also, the fuzzy temporal spectral centrality is also considered for this purpose. Our proposal is a fundamental building component for intelligent traffic monitoring and provides real support for the resilience of urban networks. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-030-85626-7_92}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85115106508\&doi=10.1007\%2f978-3-030-85626-7_92\&partnerID=40\&md5=108179547a2b1145f934d448410890dd}, author = {Boulmakoul, A. and Badaoui, F.-E. and Karim, L. and Lbath, A. and Oulad Haj Thami, R.} } @article {Mikram2022167, title = {Hybrid Deep Learning Models for Diabetic Retinopathy Classification}, journal = {Lecture Notes in Networks and Systems}, volume = {489 LNNS}, year = {2022}, note = {cited By 0}, pages = {167-178}, abstract = {Diabetic retinopathy is a complication of diabetes in the eye. This disease is caused by the damage of the blood vessels of the back of eye (i.e., retina). Unfortunately, diabetic retinopathy can cause several symptoms, the most serious of which is complete vision loss. Indeed, the detection of diabetic retinopathy is a time-consuming manual process that requires a qualified clinician to examine and evaluate digital color photographs of the retina{\textquoteright}s fundus. Currently, several researches are looking to employ artificial intelligence techniques, especially the Deep Learning, to deal with this issue. In this paper, we study some hybrid models for diabetic retinopathy severity classification in distributed and non-distributed environments. The studied models perform two main tasks: deep feature extraction and then classification of diabetic retinopathy according to its severity. The models were trained and validated on a publicly available dataset of 80,000 images and they achieved an accuracy of 80.7\%. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-07969-6_13}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135078332\&doi=10.1007\%2f978-3-031-07969-6_13\&partnerID=40\&md5=bf1f98b5263465c335e38e77dda6ea10}, author = {Mikram, M. and Moujahdi, C. and Rhanoui, M. and Meddad, M. and Khallout, A.} } @article {Rhanoui20222809, title = {A hybrid recommender system for patron driven library acquisition and weeding}, journal = {Journal of King Saud University - Computer and Information Sciences}, volume = {34}, number = {6}, year = {2022}, note = {cited By 2}, pages = {2809-2819}, abstract = {Nowadays the explosion of information sources has shaped how library users access information and provide feedback on their preferences. Therefore, faced with this explosion and the blossoming of digital libraries, modern libraries must take up the challenge of meeting the needs of their users and considering their opinions and preferences in order to offer them adequate resources and henceforth eliminate those that are unsatisfactory. Almost all library recommender systems aim to provide users with items of interest to them. However, despite its definite interest, the staff-oriented adaptation and application of this revolutionary technique to the collection development process is still in an embryonic stage. We propose a patron-driven hybrid library recommender system that uses machine learning techniques to recommend and assist in the acquisition and weeding decision-making operations by extracting and analyzing users{\textquoteright} opinions and ratings. The recommender system is applied and validated in a real national library case using Amazon{\textquoteright}s digital library and the library{\textquoteright}s catalog as a data source. {\textcopyright} 2020 The Authors}, doi = {10.1016/j.jksuci.2020.10.017}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096428211\&doi=10.1016\%2fj.jksuci.2020.10.017\&partnerID=40\&md5=49af7074b1295a09ce952c01fd4c7f92}, author = {Rhanoui, M. and Mikram, M. and Yousfi, S. and Kasmi, A. and Zoubeidi, N.} } @article {Kharbouch2022, title = {Internet-of-Things Based Hardware-in-the-Loop Framework for Model-Predictive-Control of Smart Building Ventilation}, journal = {Sensors}, volume = {22}, number = {20}, year = {2022}, note = {cited By 0}, abstract = {In this work, a Hardware-In-the-Loop (HIL) framework is introduced for the implementation and the assessment of predictive control approaches in smart buildings. The framework combines recent Internet of Things (IoT) and big data platforms together with machine-learning algorithms and MATLAB-based Model Predictive Control (MPC) programs in order to enable HIL simulations. As a case study, the MPC algorithm was deployed for control of a standalone ventilation system (VS). The objective is to maintain the indoor Carbon Dioxide (CO2) concentration at the standard comfort range while enhancing energy efficiency in the building. The proposed framework has been tested and deployed in a real-case scenario of the EEBLab test site. The MPC controller has been implemented on MATLAB/Simulink and deployed in a Raspberry Pi (RPi) hardware. Contextual data are collected using the deployed IoT/big data platform and injected into the MPC and LSTM machine learning models. Occupants{\textquoteright} numbers were first forecasted and then sent to the MPC to predict the optimal ventilation flow rates. The performance of the MPC control over the HIL framework has been assessed and compared to an ON/OFF strategy. Results show the usefulness of the proposed approach and its effectiveness in reducing energy consumption by approximately 16\%, while maintaining good indoor air quality. {\textcopyright} 2022 by the authors.}, keywords = {Air conditioning, Air pollution, Building ventilations, Carbon dioxide, Control approach, Control program, Data platform, energy efficiency, Energy utilization, Hardware in the loops, Hardware-in-the-loop simulation, Hardwarein-the-loop simulations (HIL), Indoor, Indoor air pollution, Internet of things, Learning algorithms, Long short-term memory, Machine learning algorithms, Machine-learning, MATLAB, Model predictive control, Model-predictive control, Predictive control, procedures, Simulation platform, Synthetic apertures, Ventilation}, doi = {10.3390/s22207978}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85140844555\&doi=10.3390\%2fs22207978\&partnerID=40\&md5=85b1a27cdc872a2b2f27b188c17282c8}, author = {Kharbouch, A. and Berouine, A. and Elkhoukhi, H. and Berrabah, S. and Bakhouya, M. and El Ouadghiri, D. and Gaber, J.} } @conference {Rachidi202213, title = {Network intrusion detection using Machine Learning approach}, booktitle = {ACM International Conference Proceeding Series}, year = {2022}, note = {cited By 0}, pages = {13-17}, abstract = {Today, intrusion detection has become an active research area. Due to the rapidly increasing number of intrusion variants, intrusion detection system analyses and notifies the activities of users as normal (or) anomaly. In our paper, we built a model of intrusion detection system applied to the NSL-KDD data set using different supervised classifiers such as KNN and Na{\"\i}ve Bayes. We also proposed two algorithms for multi-classification based on the Random Forest (RF) which is an ensemble classifier and KNN. Then we used the K-folds method to evaluate and validate our model. To evaluate the performances, we realized experiments on NSL-KDD data set. The result shows that the second proposed algorithm is efficient with high accuracy and time optimization. {\textcopyright} 2022 ACM.}, keywords = {Barium compounds, Classification (of information), Computer crime, data set, Decision trees, Intrusion detection, Intrusion Detection Systems, Intrusion-Detection, Machine learning, Machine learning approaches, Multi-classification, Network intrusion detection, NSL-KDD, Random forests, Research areas, Sodium compounds, Supervised classifiers}, doi = {10.1145/3551690.3551693}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85139141127\&doi=10.1145\%2f3551690.3551693\&partnerID=40\&md5=e47a5f8038487b706673543f7fdf2de4}, author = {Rachidi, Z. and Chougdali, K. and Kobbane, A. and Ben-Othman, J.} } @article {Boughrous2022321, title = {The Pandemic Impact on Organizations Security and Resiliency: The Workflow Satisfiability Problem}, journal = {Lecture Notes in Networks and Systems}, volume = {420 LNNS}, year = {2022}, note = {cited By 0}, pages = {321-329}, abstract = {The new work model imposed during the pandemic impacted organizations badly, especially those with rigid business strategies. Therefore, they were forced to provide digital platforms for their clients and allow remote work for employees. The rapid shift to remote work increased cyberthreats and attack vectors. Thus, organizations had to enforce their security policy, apply security constraints for a safe and secure inter-organizational collaborations. Consequently, the absence of employees because of the pandemic and the rigid application of the security policy caused the unavailability of collaborating organizations. Thus, the execution of inter-organizational workflow may not be complete, which increases the possibility that the workflow satisfiability problem (WSP) occurs. In this paper, we present an approach to selecting an inter-organizational workflow assignment plan. It uses the multicriteria decision method and Bayesian inference to select organizations for collaboration. The approach aims to ensure resilient and secure inter-organizational workflow execution with a low probability for the WSP. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-030-96305-7_30}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85126376866\&doi=10.1007\%2f978-3-030-96305-7_30\&partnerID=40\&md5=15bd75caca2d063eff65da1b12210dba}, author = {Boughrous, M. and El Bakkali, H. and El Kandoussi, A.} } @article {Kharbouch2022, title = {Reviewing the features and functionalities of contraception mPHRs}, journal = {Health Policy and Technology}, volume = {11}, number = {3}, year = {2022}, note = {cited By 0}, abstract = {Background and objective. Women{\textquoteright}s circumstances and preferences tend to change over times signifying that accessing and choosing a contraceptive method during their reproductive life is crucial. By preventing unintended pregnancies and reducing the need for abortion, effective contraception ensures women{\textquoteright}s well-being and autonomy, improves their social and economic role, and enables them to fully participate in society while supporting the health and development of their communities. The use of mobile applications (apps) for contraception is considered a promising approach by which to facilitate access to a reproductive health service of this nature and spread awareness about contraception. The aim of this paper is, therefore, to assess the features and functionalities of the contraception mPHRs (Mobile Personal Health Records) that are available on both the Android and iOS platforms. Methods. In order to select, extract data from and evaluate the features and functionalities of existing contraception apps, an analysis process based on the well-known Systematic Literature Review (SLR) protocol was conducted for the contraception apps that are available on both the Android and iOS app platforms. The analysis and assessment of selected apps{\textquoteright} features were performed in accordance with a twenty-seven item assessment questionnaire. The latter was developed on the basis of the scientific literature concerning contraception, and a preliminary analysis of the contraception apps currently available. Results. A total of 54 contraception apps were selected, including 38 for Android, 4 for iOS, and 12 for crossed platform apps. The results showed that only 11\% of the apps selected do support the World Health Organization{\textquoteright}s (WHO) medical eligibility criteria for contraception (MEC), and that barely 43\% provide relevant information about contraceptive methods, their efficiency, risks, and contraindications. Conclusion. This study will help users, eHealth apps providers, and developers. Users on the one hand will be able to better select the most appropriate contraceptive apps. On the other hand, both eHealth application providers and developers can thereby: (1) identify the relevant features and functionalities implemented by the top-scoring contraceptive apps, and (2) distinguish contraception-related aspects that require further efforts to be properly addressed and improved. {\textcopyright} 2022}, keywords = {awareness, contraception, Data availability, female, human, information security, medical record, Monitoring, Preferred Reporting Items for Systematic Reviews and Meta-Analyses, questionnaire, recording, reminder system, reproductive health, Review, social support, Systematic Review}, doi = {10.1016/j.hlpt.2022.100633}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85132651990\&doi=10.1016\%2fj.hlpt.2022.100633\&partnerID=40\&md5=b101e386be125c92bddf8bf212de3a39}, author = {Kharbouch, M. and Idri, A. and Fernandez-Aleman, J.L. and Redman, L. and Toval, A. and Stelate, Y.} } @article {ElHaddouti2022575, title = {A Secure and Trusted Fog Computing Approach based on Blockchain and Identity Federation for a Granular Access Control in IoT Environments}, journal = {International Journal of Advanced Computer Science and Applications}, volume = {13}, number = {3}, year = {2022}, note = {cited By 0}, pages = {575-584}, abstract = {Fog computing is a new computing paradigm that is an extension of the standard cloud computing model, which can be adopted as a cost effective strategy for managing connected objects, by enabling real-time computing and communication for analytical and decision making. Nonetheless, even though Fog-based Internet of Things networks optimize the standard architecture by moving computing, storage, communication, and control decision closer to the edge network, the technology becomes open to malicious attackers and remains many business risks that are not yet resolved. In fact, access control, privacy as well as trust risks present major challenges in Internet of Things environments based on Fog computing due to the large scale distributed nature of devices at the Fog layer. In addition, the traditional authentication methods are not adequate in Fog-based Internet of Things contexts since they consume significantly more computation power and incur high latency. To deal with these gaps, we present in this paper a secure and trusted Fog Computing approach based on Blockchain and Identity Federation technologies for a granular access control in IoT environments. The proposed scheme uses Smart Contract concept and Attribute-Based Access Control model to ensure the level of security and scalability required for data integrity without resorting to a central authority to make an access decision {\textcopyright} 2022. International Journal of Advanced Computer Science and Applications.All Rights Reserved.}, keywords = {Access control, Block-chain, Cloud-computing, Computing model, Computing paradigm, Cost effective strategies, Cost effectiveness, Decision making, Decisions makings, Digital storage, Fog, Fog computing, Identity federation, Internet of things, IOT, Real-time communication, Real-time computing, Smart contract, Trusted computing}, doi = {10.14569/IJACSA.2022.0130368}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85129902962\&doi=10.14569\%2fIJACSA.2022.0130368\&partnerID=40\&md5=65966293c50d57a061513c913c7b5bb3}, author = {El Haddouti, S. and El Kettani, M.D.E.-C.} } @conference {Elhachimi2022, title = {Secure Internet of Thing using Blockchain Technology}, booktitle = {2022 7th International Conference on Smart and Sustainable Technologies, SpliTech 2022}, year = {2022}, note = {cited By 0}, abstract = {With their vast range of uses, Internet of things (IoT) and its applications are becoming more popular. However, the security and privacy of the IoT-based applications remains a worry. The majority of the privacy and security issues of the interconnected, diverse resource-constrained IoT devices are unable to be solved efficiently by traditional security protocols. Blockchain technology has emerged as a distributed ledger technology or data structure that can manage many intelligent IoT transactions and ensure greater security to data management. In this paper, we propose a light-weight authentication system based Blockchain approach that provides network and communication security. Due to Blockchain decentralized nature and transparency, the proposed approach ensures high-level data security, improves system operation efficiency and system performances. {\textcopyright} 2022 University of Split, FESB.}, keywords = {Authentication systems, Block-chain, Blockchain, Data privacy, Distributed ledger, Information management, Internet of thing security, Internet of things, ITS applications, Light weight, Network security, Privacy and security, Privacy issue, Security and privacy, Security issues, Security protocols}, doi = {10.23919/SpliTech55088.2022.9854376}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85138143921\&doi=10.23919\%2fSpliTech55088.2022.9854376\&partnerID=40\&md5=166e29d5aefdeeb4fac8936bf1150d04}, author = {Elhachimi, J. and Kobbane, A.} } @article {Abouaomar2022, title = {Service Function Chaining in MEC: A Mean-Field Game and Reinforcement Learning Approach}, journal = {IEEE Systems Journal}, year = {2022}, note = {cited By 0}, pages = {1-12}, abstract = {Multiaccess edge computing (MEC) and network virtualization technologies are important enablers for fifth generation networks to deliver diverse services. Services are often provided as fully connected virtual network functions (VNFs), through service function chaining (SFC). However, the problem of allocating SFC resources at the edge still faces many challenges related to the way VNFs are placed, chained, and scheduled. In this article, to solve these problems, we propose a game theory-based approach with the objective to reduce service latency in the context of SFC at the edge. The problem of allocating SFC resources can be divided into two subproblems: 1) the VNF placement and routing subproblem, and 2) the VNF scheduling subproblem. For the former subproblem, we formulate it as a mean-field game in which VNFs are contending over edge resources aiming at reducing the resource consumption of MEC nodes and reducing latency for users. We also propose a reinforcement learning-based technique, where the Ishikawa{\textendash}Mann learning algorithm is used. For the later subproblem, we formulate it as a matching game between VFNs and edge resources to find the execution order of the VNFs while reducing the latency. To efficiently solve it, we propose a modified version of the many-to-one deferred acceptance algorithm (DAA), called the enhanced multistep DAA. To illustrate the performance of the proposed approaches, we perform extensive simulations. The results show that the approaches achieve up to 40\% less resource consumption, and up to 38\% less latency than the benchmarked state-of-the-art methods. IEEE}, keywords = {Computation theory, Computer games, Edge computing, Game, Game theory, Learning algorithms, Network function virtualization, Problem solving, Processor scheduling, Reinforcement learning, Resource allocation, Resource allocation/provisioning, Resource Management, Resources allocation, Routings, Scheduling, Service function chaining, Service functions, Transfer functions, Virtual reality, Virtualizations}, doi = {10.1109/JSYST.2022.3171232}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85131721006\&doi=10.1109\%2fJSYST.2022.3171232\&partnerID=40\&md5=e7ecad4d011f9a66bf06f1e9f3f4d176}, author = {Abouaomar, A. and Cherkaoui, S. and Mlika, Z. and Kobbane, A.} } @article {Khaldi20221377, title = {TimeSpec4LULC: a global multispectral time series database for training LULC mapping models with machine learning}, journal = {Earth System Science Data}, volume = {14}, number = {3}, year = {2022}, note = {cited By 0}, pages = {1377-1411}, abstract = {Land use and land cover (LULC) mapping are of paramount importance to monitor and understand the structure and dynamics of the Earth system. One of the most promising ways to create accurate global LULC maps is by building good quality state-of-the-art machine learning models. Building such models requires large and global datasets of annotated time series of satellite images, which are not available yet. This paper presents TimeSpec4LULC 10.5281/zenodo.5913554;Currency sign, a smart open-source global dataset of multispectral time series for 29 LULC classes ready to train machine learning models. TimeSpec4LULC was built based on the seven spectral bands of the MODIS sensors at 500gh{\texteuro}{\textasciimacron}m resolution, from 2000 to 2021, and was annotated using spatial-temporal agreement across the 15 global LULC products available in Google Earth Engine (GEE). The 22-year monthly time series of the seven bands were created globally by (1) applying different spatial-temporal quality assessment filters on MODIS Terra and Aqua satellites; (2) aggregating their original 8gh{\texteuro}{\textasciimacron}d temporal granularity into monthly composites; (3) merging Terragh{\texteuro}{\textasciimacron}+gh{\texteuro}{\textasciimacron}Aqua data into a combined time series; and (4) extracting, at the pixel level, 6gh{\texteuro}{\textasciimacron}076gh{\texteuro}{\textasciimacron}531 time series of size 262 for the seven bands along with a set of metadata: geographic coordinates, country and departmental divisions, spatial-temporal consistency across LULC products, temporal data availability, and the global human modification index. A balanced subset of the original dataset was also provided by selecting 1000 evenly distributed samples from each class such that they are representative of the entire globe. To assess the annotation quality of the dataset, a sample of pixels, evenly distributed around the world from each LULC class, was selected and validated by experts using very high resolution images from both Google Earth and Bing Maps imagery. This smartly, pre-processed, and annotated dataset is targeted towards scientific users interested in developing various machine learning models, including deep learning networks, to perform global LULC mapping. {\textcopyright} 2022 Rohaifa Khaldi et al.}, keywords = {Land cover, Land use, Machine learning, MODIS, multispectral image, spatiotemporal analysis, Time series analysis}, doi = {10.5194/essd-14-1377-2022}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85127624906\&doi=10.5194\%2fessd-14-1377-2022\&partnerID=40\&md5=90f9e45c7b39e149ab387a54f4392d6a}, author = {Khaldi, R. and Alcaraz-Segura, D. and Guirado, E. and Benhammou, Y. and El Afia, A. and Herrera, F. and Tabik, S.} } @article {ElKaid2022, title = {Top-Down System for Multi-Person 3D Absolute Pose Estimation from Monocular Videos}, journal = {Sensors}, volume = {22}, number = {11}, year = {2022}, note = {cited By 2}, abstract = {Two-dimensional (2D) multi-person pose estimation and three-dimensional (3D) root-relative pose estimation from a monocular RGB camera have made significant progress recently. Yet, real-world applications require depth estimations and the ability to determine the distances between people in a scene. Therefore, it is necessary to recover the 3D absolute poses of several people. However, this is still a challenge when using cameras from single points of view. Furthermore, the previously proposed systems typically required a significant amount of resources and memory. To overcome these restrictions, we herein propose a real-time framework for multi-person 3D absolute pose estimation from a monocular camera, which integrates a human detector, a 2D pose estimator, a 3D root-relative pose reconstructor, and a root depth estimator in a top-down manner. The proposed system, called Root-GAST-Net, is based on modified versions of GAST-Net and RootNet networks. The efficiency of the proposed Root-GAST-Net system is demonstrated through quantitative and qualitative evaluations on two benchmark datasets, Human3.6M and MuPoTS-3D. On all evaluated metrics, our experimental results on the MuPoTS-3D dataset outperform the current state-of-the-art by a significant margin, and can run in real-time at 15 fps on the Nvidia GeForce GTX 1080. {\textcopyright} 2022 by the authors. Licensee MDPI, Basel, Switzerland.}, keywords = {3d multi-person pose estimation, Absolute pose, algorithm, Algorithms, Camera-centric coordinate, Cameras, Computer vision, Deep learning, Deep-learning, human, Humans, Imaging, Monocular video, Pose-estimation, procedures, Real- time, Relative pose, Three-Dimensional, Three-dimensional imaging, Topdown, Two-dimensional}, doi = {10.3390/s22114109}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130790166\&doi=10.3390\%2fs22114109\&partnerID=40\&md5=7009c9053fd9d12efcd40ade931932f7}, author = {El Kaid, A. and Brazey, D. and Barra, V. and Baina, K.} } @article {Korachi2022619, title = {Towards a Smart City Approach: A Comparative Study}, journal = {Smart Innovation, Systems and Technologies}, volume = {237}, year = {2022}, note = {cited By 0}, pages = {619-633}, abstract = {There are conflicts and ambiguity regarding smart city strategies. Some works present smart city processes with vague and inconsistent steps. While others propose smart city elements and dimensions, rather than providing a clear and holistic approach. The most of smart city strategy works overlap one another, which creates ambiguity for smart city leaders. To fill this gap and reduce this ambiguity, the current paper presents and describes the main components of a smart city strategy framework, which are: strategic vision, action plan, and management strategy. To evaluate the relevance of these elements, the present paper conducts a comparative study. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.}, keywords = {{\textquoteright}current, Action plan, Approach, Comparatives studies, Computer programming, Framework, Holistic approach, Management strategies, Smart city, Strategic vision, Strategy}, doi = {10.1007/978-981-16-3637-0_44}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85116864583\&doi=10.1007\%2f978-981-16-3637-0_44\&partnerID=40\&md5=048c5bb0571b63d5ec7153286ae7a8bc}, author = {Korachi, Z. and Bounabat, B.} } @conference {Ben-Aboud2021, title = {Acquisition and time-series analysis of electromagnetic pollution data}, booktitle = {2021 17th International Conference on Intelligent Environments, IE 2021 - Proceedings}, year = {2021}, note = {cited By 0}, abstract = {With the increasing use of wireless communication technologies, it is important to monitor electromagnetic exposure, ideally with high temporal and spatial resolutions. This paper presents our low-cost electro-smog measurement process, covering hardware selection, RF power measurement, and RF power correction. Then, a time series analysis is performed on the electromagnetic exposure data collected in the city of Sala Al Jadida - Morocco for seven days. The results show that the electro-smog exposure has a strong predictable pattern and a preliminary time series model is derived. {\textcopyright} 2021 IEEE.}, keywords = {Air pollution, Electro magnetic pollution, Electromagnetic exposure, Hardware selection, Harmonic analysis, Intelligent agents, Low costs, Measurement process, Temporal and spatial, Time series analysis, Time series modeling, Wireless communication technology}, doi = {10.1109/IE51775.2021.9486565}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85114504253\&doi=10.1109\%2fIE51775.2021.9486565\&partnerID=40\&md5=8958a981795705a145d39c5225a3dd66}, author = {Ben-Aboud, Y. and Ghogho, M. and Pollin, S. and Kobbane, A.} } @conference {Kawtar2021356, title = {Algorithms to analyze the impact of change on Enterprise Architecture}, booktitle = {Procedia Computer Science}, volume = {196}, year = {2021}, note = {cited By 0}, pages = {356-363}, abstract = {Currently, the organizations are constantly confronted with rapid and radical changes, making the company in turbulence that requires a transformation from a state to a target state. This turbulence needs agility on the part of companies, i.e. the ability to monitor their environment and be ready to react. Enterprise architecture needs transformation if its levels of abstraction are affected by its changes, so enterprise architecture needs to be agile to evolve over time. To measure the impact of change on the abstraction levels. This article proposes different algorithms to proceed to the change impact analysis in the different abstraction levels to be able to analyze the change impact of different projects on the elements of the enterprise architecture and to make it agile. {\textcopyright} 2021 Elsevier B.V. All rights reserved.}, keywords = {Abstracting, Abstraction level, Change, Change impact analysis, Change impacts, enterprise architecture, Impact analysis, Impact of changes, Target state, Turbulence}, doi = {10.1016/j.procs.2021.12.024}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85122850755\&doi=10.1016\%2fj.procs.2021.12.024\&partnerID=40\&md5=b2c3a2dc28e8214916f9d3aef066ddd4}, author = {Kawtar, I. and Karim, D. and Salah, B.} } @article {ElKoufi2021, title = {Asymptotic properties of a stochastic SIQR epidemic model with L{\'e}vy Jumps and Beddington-DeAngelis incidence rate}, journal = {Results in Physics}, volume = {27}, year = {2021}, note = {cited By 9}, abstract = {In this paper, we propose a stochastic SIQR model and discuss the impact of L{\'e}vy jumps and Beddington-DeAngelis incidence rate on the transmission of diseases. We prove that our proposed model admits a unique global positive solution and an invariant positive set. We establish sufficient conditions for the extinction and persistence of the disease in the population using some stochastic calculus background. We illustrate our theoretical results by numerical simulations. We infer that the white and L{\'e}vy noises influence the transmission dynamic of the system. {\textcopyright} 2021 The Author(s)}, doi = {10.1016/j.rinp.2021.104472}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85108866996\&doi=10.1016\%2fj.rinp.2021.104472\&partnerID=40\&md5=2fdb2ac81157617ad18abf5ecead509d}, author = {El Koufi, A. and Bennar, A. and El Koufi, N. and Yousfi, N.} } @article {ElKandoussi2021350, title = {Automated security driven solution for inter-organizational workflows}, journal = {Advances in Intelligent Systems and Computing}, volume = {1179 AISC}, year = {2021}, note = {cited By 0}, pages = {350-361}, abstract = {This paper presents a new solution to deal with security in dynamic Inter-Organizational Workflow (IOW) Systems. The IOW system aims to support the collaboration between distributed business processes running in several autonomous organizations in order to complete a set of common goals. In such dynamic environments, where participating organizations (partners) in the IOW are not known before its execution, many security breaches could arise. Thus, we propose a new automated security-driven solution based on i) partner selection ii) access control partner negotiation and policy conflict resolution. {\textcopyright} The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021.}, keywords = {Access control, Business Process, Dynamic environments, Intelligent systems, Inter-Organizational workflow, Inter-organizational workflows, Partner selection, Policy conflict, Running-in, Security breaches}, doi = {10.1007/978-3-030-49336-3_35}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089717314\&doi=10.1007\%2f978-3-030-49336-3_35\&partnerID=40\&md5=b0b03a78e31324087b3748ca67ca2c4d}, author = {El Kandoussi, A. and El Bakkali, H.} } @conference {Daoudi2021759, title = {Complexity and Adaptive Enterprise Architecture}, booktitle = {International Conference on Enterprise Information Systems, ICEIS - Proceedings}, volume = {2}, year = {2021}, note = {cited By 1}, pages = {759-767}, abstract = {In the current VUCA (Volatility, uncertainty, complexity and ambiguity) environment, enterprises are facing constant threats and opportunities due to internal and external factors. Those factors can impact various parts of the enterprise in the form of changes. Thus, Adaptive Enterprise Architecture (EA) is leveraged to assist the continuous adaptation to the evolving transformation. On the other hand, the complexity has been identified as one of the major challenges of the discipline of Enterprise Architecture. Moreover, one of the criteria of Adaptive EA is the ability to monitor and control the complexity of changes. Consequently, in this paper, we suggest a conceptualization of EA complexity measurement drilled down into factors and indicators. First, we begin with a brief summary of the criteria that we consider compulsory for Adaptive Enterprise Architecture and we give an overview of the model that we worked on in previous work. Then we investigate related work about complexity in a broader view. Finally, we describe our approach of assessment of complexity based on the proposed indicators. Copyright {\textcopyright} 2021 by SCITEPRESS - Science and Technology Publications, Lda.}, keywords = {{\textquoteright}current, Adaptation, Adaptive enterprise, Complexity, Dynamic environments, enterprise architecture, Enterprise IS, Information systems, Information use, Internal and external factors, Monitor and control, Volatility uncertainties}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135024780\&partnerID=40\&md5=2aaf626491ca37f943bcb904a81c8e4f}, author = {Daoudi, W. and Doumi, K. and Kjiri, L.} } @conference {Khannat2021768, title = {Configurable Process Mining: Semantic Variability in Event Logs}, booktitle = {International Conference on Enterprise Information Systems, ICEIS - Proceedings}, volume = {1}, year = {2021}, note = {cited By 0}, pages = {768-775}, abstract = {Configurable process model represents a reference model regrouping multiple business process variants. The configurable process models offer various benefits like reusability and more flexibility when compared to business process models. The challenges encountered while managing this type of models are related to the creation and the configuration. Recently, process mining offers techniques to discover, check conformance of models, and enhance configurable process models using a collection of event logs, that captures traces during the execution of process variants. However, existing works in configurable process discovery lack the incorporation of semantics in the resulting model. Historically, semantic process mining has been applied to event logs to improve process discovery with respect to semantic. Furthermore, from the best of our knowledge, configurable process mining approaches do not fully support semantics. In this paper, we propose a novel method to enrich the collection of event logs with configurable process ontology concepts by introducing semantic annotations that capture variability of elements present in the logs. This is a first step towards discovering a semantically enriched configurable process. Copyright {\textcopyright} 2021 by SCITEPRESS {\textendash} Science and Technology Publications, Lda. All rights reserved.}, keywords = {Business Process, Configurable process model discovery, Configurable process models, Data mining, Event logs, Information systems, Model discoveries, Ontology, Ontology{\textquoteright}s, Process Discovery, Process mining, Process variants, Reference modeling, Reusability, Semantics}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137949536\&partnerID=40\&md5=dd49bcf12987200729d1f5e491d2994b}, author = {Khannat, A. and Sba{\"\i}, H. and Kjiri, L.} } @article {Mabrouk2021, title = {A cooperative game based mechanism for autonomous organization and ubiquitous connectivity in VANETs}, journal = {Simulation Modelling Practice and Theory}, volume = {107}, year = {2021}, note = {cited By 7}, abstract = {Vehicular communications in Vehicular Ad-hoc NETworks (VANETs) play an interesting role in improving traffic flow on the roads. In such wireless networks, the vehicles cooperate with each other or with the roadside infrastructure to disseminate the data. In this paper, we introduce a mechanism based on coalitional game theory to study the cooperative transmission in VANETs. Each vehicle tries to access the Internet via gateways that can be either fixed or mobile. However, these gateways help the vehicles to access the Internet by cooperatively relaying the vehicles{\textquoteright} messages. Thus, two notions to indicate the availability of transmission between vehicles and gateways are introduced. These notions are chosen to deal with the highly dynamic topology in VANETs, namely the notion of an encounter and the notion of a link{\textquoteright}s predicted lifetime. The problem is modelled as a non-transferable utility game. Then, an algorithm is proposed to dynamically form coalitions among the vehicles. Moreover, a probability of being active is set in terms of speed of the received vehicle. To evaluate the proposed solution, two scenarios are used: fixed gateways scenario and mobile gateways scenario. The numerical results show that the scenario of mobile gateways is more effective in terms of stimulating vehicles to regroup into coalitions. Hence, this helps the vehicles to access the Internet. {\textcopyright} 2020}, keywords = {Coalitional game theory, Cooperative game, Cooperative transmission, Dynamic topologies, Game theory, Gateways (Computer networks), Non-transferable utilities, Numerical results, Probability, Vehicle transmissions, Vehicular ad hoc networks, Vehicular Adhoc Networks (VANETs), Vehicular communications}, doi = {10.1016/j.simpat.2020.102213}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85093923113\&doi=10.1016\%2fj.simpat.2020.102213\&partnerID=40\&md5=3ede889d7bb9d063f8c8265857ff2ede}, author = {Mabrouk, A. and Naja, A. and Oualhaj, O.A. and Kobbane, A. and Boulmalf, M.} } @conference {Abouaomar2021273, title = {A deep reinforcement learning approach for service migration in MEC-enabled vehicular networks}, booktitle = {Proceedings - Conference on Local Computer Networks, LCN}, volume = {2021-October}, year = {2021}, note = {cited By 4}, pages = {273-280}, abstract = {Multi-access edge computing (MEC) is a key enabler to reduce the latency of vehicular network. Due to the vehicles mobility, their requested services (e.g., infotainment services) should frequently be migrated across different MEC servers to guarantee their stringent quality of service requirements. In this paper, we study the problem of service migration in a MEC-enabled vehicular network in order to minimize the total service latency and migration cost. This problem is formulated as a nonlinear integer program and is linearized to help obtaining the optimal solution using off-the-shelf solvers. Then, to obtain an efficient solution, it is modeled as a multi-agent Markov decision process and solved by leveraging deep Q learning (DQL) algorithm. The proposed DQL scheme performs a proactive services migration while ensuring their continuity under high mobility constraints. Finally, simulations results show that the proposed DQL scheme achieves close-to-optimal performance. {\textcopyright} 2021 IEEE.}, keywords = {Deep learning, Edge computing, Infotainment, Integer programming, Learning schemes, Markov processes, Multi agent systems, Multi-access edge computing, Multiaccess, Q-learning, Quality of service, Reinforcement learning, Reinforcement learning approach, Service migration, Vehicle mobility, Vehicular networks}, doi = {10.1109/LCN52139.2021.9524882}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85118466383\&doi=10.1109\%2fLCN52139.2021.9524882\&partnerID=40\&md5=8e35dfee04f347da3f757f57f5d575c8}, author = {Abouaomar, A. and Mlika, Z. and Filali, A. and Cherkaoui, S. and Kobbane, A.} } @article {Ben-Aboud2021107149, title = {Electro-Smog Monitoring Using Low-Cost Software-Defined Radio Dongles}, journal = {IEEE Access}, volume = {9}, year = {2021}, note = {cited By 1}, pages = {107149-107158}, abstract = {With the increasing use of wireless communication technologies, it is important to monitor electromagnetic exposure (ideally with high temporal and spatial resolutions). In this paper, we explore the use of low-cost software-defined radio dongle for electro-smog measurements and more specifically for electro-magnetic fields power measurements and the estimation of the incident power density. We describe how the raw data is collected and then compute the average electromagnetic field power. We then compensate for the non-linearity of the amplifier and the antenna gain to get the corrected electromagnetic field power measurements. We use these measurements to estimate the incident power density which is the metric that we use to evaluate the electro-smog. The results show that the considered low-cost SDR dongle is stable and provides good quality power measurements. The estimation of the incident power density is shown to be accurate enough for monitoring the electro-smog. {\textcopyright} 2013 IEEE.}, keywords = {Air pollution, Analog circuits, Antenna gains, Antennas, Costs, Electromagnetic exposure, Electromagnetic fields, Incident power, Low costs, Radio, Radio receivers, Software radio, Software-defined radios, Temporal and spatial, Wireless communication technology}, doi = {10.1109/ACCESS.2021.3100773}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85112673496\&doi=10.1109\%2fACCESS.2021.3100773\&partnerID=40\&md5=b7b53e18cf471222f475a67fe957cbee}, author = {Ben-Aboud, Y. and Ghogho, M. and Pollin, S. and Kobbane, A.} } @article {ElAkrouchi2021, title = {End-to-end LDA-based automatic weak signal detection in web news}, journal = {Knowledge-Based Systems}, volume = {212}, year = {2021}, note = {cited By 9}, abstract = {An extremely competitive business environment requires every company to monitor its competitors and anticipate future opportunities and risks, creating a dire need for competitive intelligence. In response to this need, foresight study became a prominent field, especially the concept of weak signal detection. This research area has been widely studied for its utility, but it is limited by the need of human expert judgments on these signals. Moreover, the increase in the volume of information on the Internet through blogs and web news has made the detection process difficult, which has created a need for automation. Recent studies have attempted topic modeling techniques, specifically latent Dirichlet allocation (LDA), for automating the weak signal detection process; however, these approaches do not cover all parts of the process. In this study, we propose a fully automatic LDA-based weak signal detection method, consisting of two filtering functions: the weakness function aimed at filtering topics, which potentially contains weak signals, and the potential warning function, which helps to extract only early warning signs from the previously filtered topics. We took this approach with a famous daily web news dataset, and we could detect the risk of the COVID19 pandemic at an early stage. {\textcopyright} 2020 Elsevier B.V.}, keywords = {Competition, Competitive business, Competitive intelligence, Detection process, Early warning signs, Filtering functions, Latent dirichlet allocations, Signal detection, Statistics, Topic Modeling, Weak signal detection, Weak signals}, doi = {10.1016/j.knosys.2020.106650}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097573309\&doi=10.1016\%2fj.knosys.2020.106650\&partnerID=40\&md5=a491fca334a7b047c3a02e16ecb7b3f0}, author = {El Akrouchi, M. and Benbrahim, H. and Kassou, I.} } @article {ElKhamlichi20211078, title = {High-gain and broadband SIW cavity-backed slots antenna for X-band applications}, journal = {International Journal of Microwave and Wireless Technologies}, volume = {13}, number = {10}, year = {2021}, note = {cited By 1}, pages = {1078-1085}, abstract = {Substrate-integrated waveguide (SIW) technology has recently drawn attention to its benefits in the microwave field, such as integration in planar microwave circuits, low manufacturing cost, and high-quality factor compared to other technologies. In this paper, a broadband and high gain SIW cavity-backed L-shaped slot antenna structure has been designed and made for X-band applications. Three pairs of L-shaped half-wave resonators are placed on the lower wall of the cavity (backed-slots) to further expand bandwidth and improve gain. The final antenna designed operates on a band ranging from 9.4 to 10.5 GHz with a bandwidth of 11\%. Moreover, the gain reaches a value of 9.5 dBi. The final antenna is realized on a Rogers RT/Duroid 5870 substrate. The gain, the reflection coefficient, and the radiation patterns are measured and compared to the EM simulation results and a very good agreement is obtained. The proposed cavity-backed L-shaped slot antenna gives a good compromise between a high gain and a large bandwidth. Copyright {\textcopyright} The Author(s), 2021. Published by Cambridge University Press in association with the European Microwave Association.}, keywords = {Acoustic resonators, Antenna structures, Bandwidth, Directional patterns (antenna), EM simulations, Half-wave resonators, High quality factors, Manufacturing cost, Microwave antennas, Microwave circuits, Microwave field, Planar microwave circuits, Slot antennas, Substrate integrated waveguide technologies, Substrate integrated waveguides, Substrates}, doi = {10.1017/S1759078721000015}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85100754004\&doi=10.1017\%2fS1759078721000015\&partnerID=40\&md5=f9e06e14d006d43b263d853a79e4a96f}, author = {El Khamlichi, D. and Touhami, N.A. and Elhamadi, T. and Ali Ennasar, M.} } @conference {Trabelsi2021281, title = {Hybrid Recommendation Systems: A State of Art}, booktitle = {International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE - Proceedings}, volume = {2021-April}, year = {2021}, note = {cited By 0}, pages = {281-288}, abstract = {Recommendation systems have become more important and popular in many application areas such as music, movies, e-commerce, advertisement and social networks. Recommendation systems use either collaborative filtering, content-based filtering or hybrid filtering in order to propose items to users, and each type has its weaknesses and strengths. In this paper, we present the results of a literature review that focuses specifically on hybrid recommendation systems. The objective of this review is to identify the problems that hybrid filtering tends to solve and the different techniques used to this end. Copyright {\textcopyright} 2021 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved}, keywords = {Application area, Collaborative filtering, Content based filtering, E- commerces, Hybrid filtering, Hybrid recommendation, Literature reviews, Recommendation problem, Recommender Systems, State of art, System use}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137960955\&partnerID=40\&md5=eae4312d0264db7b508c80e8414023e3}, author = {Trabelsi, F.Z. and Khtira, A. and El Asri, B.} } @article {AitElHadj2021836, title = {A Log-Based Method to Detect and Resolve Efficiently Conflicts in Access Control Policies}, journal = {Advances in Intelligent Systems and Computing}, volume = {1383 AISC}, year = {2021}, note = {cited By 0}, pages = {836-846}, abstract = {Typically, a security audit is conducted to detect and track inappropriate activities, such as security policy misconfigurations and attacks. Practically, an audit can be done through the analysis and assessment of data in logs registering traces of queries according to predefined policies. In this paper, we present an auditing approach that detects and resolves efficiently conflicting rules of a security policy. Such efficiency translates into a reduction in the time it takes to detect and resolve conflicts. Such efficiency is a consequence of the fact that conflict detection is executed only among suspicious pairs of rules, instead of all pairs of rules. The idea of using suspicious pairs of rules has recently been applied to reduce the execution time of previous detection methods. The present study goes further by applying the idea not only for conflict detection, but also for reducing the resolution time of the detected conflicts. We present experimental results that illustrate the efficiency of the suggested method. {\textcopyright} 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, keywords = {Access control, Access control policies, conflict detection, Detection methods, Efficiency, Misconfigurations, Pattern recognition, Resolution time, Security audit, Security policy, Security systems, Soft computing}, doi = {10.1007/978-3-030-73689-7_79}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85105891237\&doi=10.1007\%2f978-3-030-73689-7_79\&partnerID=40\&md5=f0de7beea992beee027f768bafe5cf58}, author = {Ait El Hadj, M. and Khoumsi, A. and Benkaouz, Y. and Erradi, M.} } @conference {Abouaomar2021, title = {Mean-Field Game and Reinforcement Learning MEC Resource Provisioning for SFC}, booktitle = {2021 IEEE Global Communications Conference, GLOBECOM 2021 - Proceedings}, year = {2021}, note = {cited By 0}, abstract = {In this paper, we address the resource provisioning problem for service function chaining (SFC) in terms of the placement and chaining of virtual network functions (VNFs) within a multi-access edge computing (MEC) infrastructure to reduce service delay. We consider the VNFs as the main entities of the system and propose a mean-field game (MFG) framework to model their behavior for their placement and chaining. Then, to achieve the optimal resource provisioning policy without considering the system control parameters, we reduce the proposed MFG to a Markov decision process (MDP). In this way, we leverage reinforcement learning with an actor-critic approach for MEC nodes to learn complex placement and chaining policies. Simulation results show that our proposed approach outperforms benchmark state-of-the-art approaches. {\textcopyright} 2021 IEEE.}, keywords = {Computer games, Computing infrastructures, Computing resource, e-learning, Edge computing, Markov processes, Mean-field games, Multi-access edge computing, Multiaccess, Network function virtualization, Reinforcement learning, Reinforcement learnings, Resource provisioning, Service function chaining, Service functions, Transfer functions, Virtual addresses, Virtual reality}, doi = {10.1109/GLOBECOM46510.2021.9685236}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85124062107\&doi=10.1109\%2fGLOBECOM46510.2021.9685236\&partnerID=40\&md5=8319d7756843c2ccadb8f9de4bec7eff}, author = {Abouaomar, A. and Cherkaoui, S. and Mlika, Z. and Kobbane, A.} } @article {Elmouatamid2021571, title = {A MicroGrid System Infrastructure Implementing IoT/Big-Data Technologies for Efficient Energy Management in Buildings}, journal = {Green Energy and Technology}, year = {2021}, note = {cited By 4}, pages = {571-600}, abstract = {Recent studies showed that energy consumption in buildings could be efficiently reduced by including recent IoT (Internet of Things) and Big-Data technologies into microgrid systems. In fact, three major aspects could be further considered for reducing energy consumption while maintaining a suitable occupants{\textquoteright} comfort, (i) integrating renewable energy sources and storage devices, (ii) integrating programmable and less-energy-consuming equipment, and (iii) deploying innovative information and communication technologies. These aspects might contribute substantially to the improvement of winning and saving energy toward smart and energy-efficient buildings. In this chapter, a microgrid system infrastructure is developed together with a platform for data gathering, monitoring, and processing. We put more emphasis on microgrid systems as crucial infrastructures for leveraging energy-efficient and smart buildings by developing and deploying a holistic IoT/Big-Data platform in which sensing and actuation tasks are performed according to the actual contextual changes. Scenarios are presented in order to show the usefulness of this holistic platform for monitoring, data processing, and control in energy-efficient buildings. {\textcopyright} 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, keywords = {Data gathering, Data handling, Data technologies, energy efficiency, Energy efficient, Energy efficient building, Energy utilization, Information and Communication Technologies, Intelligent buildings, Internet of things, Micro-grid systems, Microgrids, Monitoring, Reducing energy consumption, Renewable energy resources, Renewable energy source, Virtual storage}, doi = {10.1007/978-3-030-64565-6_20}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85105764631\&doi=10.1007\%2f978-3-030-64565-6_20\&partnerID=40\&md5=b0a762b2a1e37fc93eff19c16f955daa}, author = {Elmouatamid, A. and NaitMalek, Y. and Ouladsine, R. and Bakhouya, M. and El kamoun, N. and Khaidar, M. and Zine-Dine, K.} } @article {Kharbouch2021, title = {Mobile Technology for Improved Contraceptive Care in Morocco}, journal = {Journal of Medical Systems}, volume = {45}, number = {2}, year = {2021}, note = {cited By 0}, abstract = {The fulfillment of unmet needs for contraception can help women reach their reproductive goals. Therefore, there is a growing concern worldwide about contraception and women{\textquoteright}s knowledge of making an advised choice about it. In this aspect, an outgrown number of apps are now available providing information concerning contraception whether it concerns natural contraception or modern contraception. However, vast amounts of these apps contain inaccurate sexual health facts and non-evidence-based information concerning contraception. On these bases, and in respect to: (1) the needs of women to effectively prevent unintended pregnancies while conducting a stress-free healthy lifestyle. (2) the World Health Organization (WHO) Medical Eligibility Criteria (MEC) for contraception{\textquoteright}s recommendations, and (3) the results/recommendations of a field study conducted in the reproductive health center {\textquoteleft}Les Orangers{\textquoteright} in Rabat to collect the app{\textquoteright}s requirements, we developed an evidence-based patient-centered contraceptive app referred to as {\textquoteleft}MyContraception{\textquoteright}. Thereafter, we conducted a set of functional tests to ensure that the MyContraception solution is performing as expected and is conform to the software functional requirements previously set before moving to non-functional requirements evaluation. Since customer{\textquoteright}s feedback is valuable to non-functional testing, we choose to evaluate potential users{\textquoteright} feedback. Moreover, giving that mobile app testing is a complex process involving different skill sets, we elaborated a rigorous experimental design to conduct an empirical evaluation of the MyContraception solution, which will exhaustively assess the overall quality of this solution and examine its effects on improving the quality of patient-centered contraception care. {\textcopyright} 2021, Springer Science+Business Media, LLC, part of Springer Nature.}, keywords = {adult, Article, awareness, contraception, contraceptive agent, Contraceptive Agents, contraceptive behavior, eligibility criteria, evidence based practice center, experimental design, female, female fertility, field study, health care quality, healthy lifestyle, human, Humans, injectable contraceptive agent, long-acting reversible contraception, luteinizing hormone, menstrual cycle, Methodology, mobile application, Mobile applications, Morocco, oral contraceptive agent, patient care, pill, pregnancy, prescription, Privacy, questionnaire, reliability, reproductive health, risk factor, sexual health, technology, unplanned pregnancy, women{\textquoteright}s health, World Health Organization}, doi = {10.1007/s10916-020-01684-6}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85099086862\&doi=10.1007\%2fs10916-020-01684-6\&partnerID=40\&md5=91a540c873cdd78725ec3f6987f5b90f}, author = {Kharbouch, M. and Idri, A. and Rachad, T. and Alami, H. and Redman, L. and Stelate, Y.} } @conference {Ahajjam2021, title = {On Multi-Label Classification for Non-Intrusive Load Identification using Low Sampling Frequency Datasets}, booktitle = {Conference Record - IEEE Instrumentation and Measurement Technology Conference}, volume = {2021-May}, year = {2021}, note = {cited By 0}, abstract = {Non-intrusive load monitoring (NILM) aims to infer information about the electric consumption of individual loads using the premises{\textquoteright} aggregate consumption. In this work, we target supervised multi-label classification for non-intrusive load identification. We describe how we have created a new dataset from Moroccan households using a low sampling frequency. Then, we analyze the performance of three machine learning models for NILM, and investigate the impact of signal input length on performance. {\textcopyright} 2021 IEEE.}, keywords = {Aggregate consumption, Classification (of information), Electric consumption, Load identification, Machine learning models, Measurement, Multi label classification, Non-intrusive, Nonintrusive load monitoring, Sampling frequencies}, doi = {10.1109/I2MTC50364.2021.9460059}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85113709883\&doi=10.1109\%2fI2MTC50364.2021.9460059\&partnerID=40\&md5=2f6ca1a0b8790dce2a085d0e0ff10cf4}, author = {Ahajjam, M.A. and Essayeh, C. and Ghogho, M. and Kobbane, A.} } @article {Fdaili2021, title = {Noncontrolled fault current limiter with reactive power support for transient stability improvement of DFIG-based variable speed wind generator during grid faults}, journal = {International Transactions on Electrical Energy Systems}, volume = {31}, number = {8}, year = {2021}, note = {cited By 0}, abstract = {According to the recent grid codes, wind turbine systems (WTSs) are required to stay connected to the grid during grid faults and provide reactive power to support the grid. Therefore, this paper proposes a noncontrolled fault current limiter (NCFCL) with reactive power support for transient stability improvement of DFIG-based WTSs under grid faults. The proposed NCFCL is based on a nonsuperconducting reactor located in the rotor side. The NCFCL considerably limits the rotor and stator overcurrents and improves the transient stability of the doubly fed induction generator (DIFG). In addition, the proposed strategy reduces DC-link overvoltage and electromagnetic torque oscillations and also provides reactive power to the grid to support the grid voltage recovery. In this way, the fault ride-through (FRT) requirements of the latest grid codes can be fulfilled without affecting the DFIG stability in normal operation. Simulation studies using MATLAB/Simulink-2019a are performed on a 2-MW DFIG-based WTS to confirm the effectiveness and feasibility of the proposed FRT strategy. Simulation results reveal that the proposed strategy provides better performance compared to the crowbar protection to improve the FRT capability. {\textcopyright} 2021 John Wiley \& Sons Ltd.}, keywords = {Asynchronous generators, Doubly fed induction generator (DFIG), Electric equipment protection, Electric power system stability, Electric power transmission networks, Electromagnetic torques, Fault current limiters, Fault ride-through (FRT), MATLAB, Power quality, Reactive power, Reactive power support, Simulation studies, Stability, Transient stability improvement, Transients, Variable speed wind generator, Wind turbine systems}, doi = {10.1002/2050-7038.12955}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85106339133\&doi=10.1002\%2f2050-7038.12955\&partnerID=40\&md5=0d56eb902eaedec23510576c443fc7a3}, author = {Fdaili, M. and Essadki, A. and Kharchouf, I. and Nasser, T.} } @conference {Remli2021328, title = {Reference Architecture for Efficient Computer Integrated Manufacturing}, booktitle = {International Conference on Enterprise Information Systems, ICEIS - Proceedings}, volume = {1}, year = {2021}, note = {cited By 0}, pages = {328-334}, abstract = {The technological progress combined with the rapidly changing customer demands are pushing for continuous changes in manufacturing environments. This led industrial companies into seeking the optimization of their processes through Computer Integrated Manufacturing (CIM). The main purpose of the latter is to link the shop floor systems to the high business layer ones. Based on a literature review that we have conducted earlier on CIM architectures, we have identified the different aspects related to CIM and detected the limitations of the existing approaches. With the aim of overcoming these limitations, we present in this paper a reference architecture for CIM based on the ISA-95 standard. We also explain how the proposed architecture was applied on a case study from the automotive industry. Copyright {\textcopyright} 2021 by SCITEPRESS {\textendash} Science and Technology Publications, Lda. All rights reserved.}, keywords = {Automotive industry, Computer integrated manufacturing, Computer-integrated manufacturing, Customer demands, Industrial companies, Manufacturing environments, Optimisations, Reference architecture, Shopfloors, Smart manufacturing, Systems architecture, Technological progress}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137946996\&partnerID=40\&md5=3dc1bfa95e09b3a460540e7f31304823}, author = {Remli, A. and Khtira, A. and El Asri, B.} } @conference {ElAkrouchi2021, title = {Review on adopting concept extraction in weak signals detection in competitive intelligence}, booktitle = {ACM International Conference Proceeding Series}, year = {2021}, note = {cited By 0}, abstract = {The dynamic nature of competition in the business environment makes a company{\textquoteright}s ability to secure future change more critical to its survival. Consequently, efficient exploitation of valuable intel is globally acknowledged as an essential foundation of competitive advantage, leading to Competitive Intelligence. Besides, one of the crucial keys to successful competitive information securing is studying the future. Thus, predicting what may happen in the uncertain future is a leading-edge technology leading to an extensive need for foresight analysis. Foresight study uses various methods to recognize future developments and make plans that anticipate possible future changes. One of the leading techniques used in foresight is detecting and understanding Weak Signals. But knowing the nature of these signals, automatically scanning them is still considered a difficult task. For this, we examine the Concept Extraction technique as a main step to detect weak signals from documents automatically. In this paper, we will explain the concept extraction methods used so far, and we present in detail all the main methods and approaches and their application in detecting weak signals. {\textcopyright} 2021 Association for Computing Machinery.}, keywords = {Business environments, Competition, Competitive advantage, Competitive intelligence, Concept extraction, Data mining, Dynamic nature, Extraction, Leading edge technology, Possible futures, Signal detection, Topic Modeling, Weak signal detection, Weak signals}, doi = {10.1145/3485557.3485560}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85121505750\&doi=10.1145\%2f3485557.3485560\&partnerID=40\&md5=01161f382ecb38a8faf2883a2bc37003}, author = {El Akrouchi, M. and Benbrahim, H. and Kassou, I.} } @article {Sebbar2021355, title = {Secure Data Sharing Framework Based on Supervised Machine Learning Detection System for Future SDN-Based Networks}, journal = {Studies in Computational Intelligence}, volume = {919}, year = {2021}, note = {cited By 2}, pages = {355-371}, abstract = {Securing Data-sharing mechanism between Software Defined Networks (SDN) nodes represent one of the biggest challenges in SDN context. In fact, attackers may steal or perturb flows in SDN by performing several types of attacks such as address resolution protocol poisoning, main in the middle and rogue nodes attacks. These attacks are very harm full to SDN networks as they can be performed easily and passively at all SDN layers. Furthermore, data-sharing permit to an attacker to gather all sensitive flows and data from SDN architecture. In this chapter, we will propose a framework for secure data sharing that detect and stop intrusions in SDN context while ensuring authentication and privacy. To do so, we propose a defense mechanism that detect and reduce the risk of attacks based on advanced machine learning techniques. The learning and data pre-processing steps was performed by using a constructed data set dedicated to SDN context. The simulation results show that our framework can effectively and efficiently address sniffing attacks that can be detected and stopped quickly. Finally, we observe high accuracy with a low false-positive for attack detection. {\textcopyright} 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-030-57024-8_16}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097909334\&doi=10.1007\%2f978-3-030-57024-8_16\&partnerID=40\&md5=0d3b5f0a3c85d400bc35313dfe6f3009}, author = {Sebbar, A. and Zkik, K. and Baddi, Y. and Boulmalf, M. and Ech-Cherif El Kettani, M.D.} } @conference {Gryech2021, title = {On spatial prediction of urban air pollution}, booktitle = {2021 17th International Conference on Intelligent Environments, IE 2021 - Proceedings}, year = {2021}, note = {cited By 0}, abstract = {Air pollution continues to draw global attention, and still causes adverse environmental issues and health effects. Questions about how air pollution evolves spatially are also still unsolved. Many air quality monitoring stations are deployed in several countries to give insight about air quality. However, it is quite frequent for these stations to go out of order during their long life time. These incidents may lead to a significant loss of pollution data. To mitigate this issue, we propose to leverage spatial correlation between pollution monitoring stations to predict the lost data. To reduce the complexity of the prediction model, for each monitoring station, we identify the best set of other stations to use in the prediction model. Correlation-based station selection is shown to outperform distance-based station selection and provides an R2 above 0.8 when applied to the Airparif datasets. {\textcopyright} 2021 IEEE.}, keywords = {Air quality, Air quality monitoring stations, Environmental issues, Forecasting, Intelligent agents, Monitoring stations, Pollution monitoring, Prediction model, Predictive analytics, Spatial correlations, Spatial prediction, Urban air pollution}, doi = {10.1109/IE51775.2021.9486618}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85114499832\&doi=10.1109\%2fIE51775.2021.9486618\&partnerID=40\&md5=10a04db251b0bca163abb4d34f0c721a}, author = {Gryech, I. and Ben-Aboud, Y. and Ghogho, M. and Kobbane, A.} } @article {Kishore20217232, title = {Sum Rate Analysis of Generalized Space Shift Keying-Aided MIMO-NOMA Systems}, journal = {IEEE Transactions on Vehicular Technology}, volume = {70}, number = {7}, year = {2021}, note = {cited By 1}, pages = {7232-7236}, abstract = {We investigate the sum rate performance of a generalized space shift keying (GSSK)-aided, non-orthogonal multiple access (NOMA) network. In particular, we consider a multiple-input multiple-output (MIMO) NOMA downlink channel, where the base station employs GSSK modulation to transmit additional information to the NOMA users. We present a novel energy-based maximum likelihood (ML) detection strategy at the NOMA users to decode the active antenna indices. We derive a closed-form expression for the average pairwise error probability of the energy-based ML strategy to find a union bound on the bit error probability. Further, we derive the expression for the overall sum rate of the proposed GSSK-aided MIMO-NOMA system. Through numerical evaluations, we show that the proposed system outperforms the conventional MIMO-NOMA system, in terms of spectral efficiency. {\textcopyright} 1967-2012 IEEE.}, keywords = {Antennas, Bit error probability, Bit error rate, Block codes, Closed-form expression, Downlink channels, Maximum likelihood, Maximum-likelihood detection, MIMO systems, Multiple access, Pair-wise error probability, Space-shift keying, Spectral efficiencies, Trellis codes}, doi = {10.1109/TVT.2021.3085415}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85107332896\&doi=10.1109\%2fTVT.2021.3085415\&partnerID=40\&md5=43ed806aa513f25c8c35a3c8a9b88af1}, author = {Kishore, R. and Gurugopinath, S. and Muhaidat, S. and Bouanani, F.E. and Dobre, O.A.} } @article {Khaouja2021118134, title = {A Survey on Skill Identification from Online Job Ads}, journal = {IEEE Access}, volume = {9}, year = {2021}, note = {cited By 8}, pages = {118134-118153}, abstract = {A changing job market, influenced by different factors such as globalization and demographic growth, urges close monitoring. The digitization of the job market has given the opportunity to researchers to better understand job market needs as job postings/ads become more accessible. However, such postings are submitted in unstructured text and need further processing to identify the required skills. The aim of this survey is to review current research on skill identification from job ads and to discuss possible future research directions. In this study, we systematically reviewed 108 research articles on the topic. In particular, we evaluated and classified the prior work aiming to identify the skill bases used for analyzing job market needs; the type of extracted skills; the skill identification methods; the studied sector and the skill identification granularity. Then, we categorized the existent applications and goals of skill identification. Finally, we present key challenges and discuss recent trends. {\textcopyright} 2013 IEEE.}, keywords = {Commerce, Demographic growth, Employment, Identification method, Job market, Job postings, Possible futures, Recent trends, Surveys, Unstructured texts}, doi = {10.1109/ACCESS.2021.3106120}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85113305279\&doi=10.1109\%2fACCESS.2021.3106120\&partnerID=40\&md5=95e3da9f3201c5b0ca744ba8d8af7012}, author = {Khaouja, I. and Kassou, I. and Ghogho, M.} } @conference {Trabelsi2021341, title = {Towards an Approach of Recommendation in Business Processes Using Decision Trees}, booktitle = {Proceedings - 2021 International Symposium on Computer Science and Intelligent Controls, ISCSIC 2021}, year = {2021}, note = {cited By 0}, pages = {341-347}, abstract = {A recommender system analyses users{\textquoteright} data in order to extract their interests and preferences and suggest them relevant items. The recommendation systems have shown their applicability in many domains, especially in business processes (BP). Business processes are defined as a set of tasks that are performed by an organization to achieve a business goal. Using recommendation techniques in business processes consists of proposing relevant tasks at a certain point, which helps managers making the right decisions. In this paper, we propose an approach of recommending in BPMN-based business processes. The recommendation technique that we considered in this approach is the decision trees. {\textcopyright} 2021 IEEE.}, keywords = {BPMN model, Business goals, Business Process, Decision trees, Forestry, Machine learning, Machine-learning, Recommendation techniques, Recommender Systems, User data}, doi = {10.1109/ISCSIC54682.2021.00068}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85124144617\&doi=10.1109\%2fISCSIC54682.2021.00068\&partnerID=40\&md5=aa31af21d6c3ad066ee71e9e9456ad84}, author = {Trabelsi, F.Z. and Khtira, A. and El Asri, B.} } @conference {Wissal2020557, title = {Adaptive Enterprise Architecture: Initiatives and Criteria}, booktitle = {7th International Conference on Control, Decision and Information Technologies, CoDIT 2020}, year = {2020}, note = {cited By 3}, pages = {557-562}, abstract = {Due mainly to digital transformation, enterprises are immersed in dynamic environments. They are dealing with internal and external changes (gradual or abrupt, frequent or occasional, in the short or long term) that impact various parts of their Enterprise Architecture. To cope with the requirements of this new digital era, agility and adaptation are compulsory. Though Enterprise Architecture (EA) was designed as a catalyst for change management, traditional Enterprise Architecture approaches do not rely on well-defined concepts, lack agility and are constrained by layered architecture (business layer, functional layer, deployment layer, etc.). Thus, a new generation of EA, allowing continuous self-improvement and proactive adaptation to better match the new conditions, is required. In this paper, we explore and investigate some approaches of EA that deal with change management. Then, we, particularly, note the various definitions of the notion of adaptive EA, according to literature. Finally, we suggest some criteria, regarding the adaptation of EA, to highlight the limitations of the approaches analyzed. {\textcopyright} 2020 IEEE.}, keywords = {Adaptive enterprise, Change management, Control engineering, Digital transformation, Dynamic environments, enterprise architecture, Functional layer, Layered architecture, Proactive adaptations}, doi = {10.1109/CoDIT49905.2020.9263891}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85098274425\&doi=10.1109\%2fCoDIT49905.2020.9263891\&partnerID=40\&md5=a1b2cd3899750d3829a4b6b9824d2970}, author = {Wissal, D. and Karim, D. and Laila, K.} } @conference {Daoudi2020, title = {Adaptive Enterprise Architecture: Towards a model}, booktitle = {ACM International Conference Proceeding Series}, year = {2020}, note = {cited By 0}, abstract = {Nowadays, enterprises are facing many changes due to digital transformation. So, they have to deal with new requirements that impact various parts of their Enterprise Architecture. To address the needs created by this new digital era, agility and adaptation are compulsory. Though Enterprise Architecture (EA) was designed as a catalyst for change management, traditional Enterprise Architecture approaches do not rely on well-defined concepts, lack agility and are constrained by layered architecture (business layer, functional layer, deployment layer, etc.). Thus, a new generation of EA, allowing continuous self-improvement and proactive adaptation to better match the new conditions, is required. In this paper, we highlighted some criteria, regarding the adaptation of EA and exploited them to show the limitations of the EA approaches analyzed. Then, we presented agile methods principles and discussed the mapping between them and the criteria that we proposed before. Finally, we proposed a simplified model based on Scrum for adaptive enterprise architecture. {\textcopyright} 2020 ACM.}, keywords = {Adaptive enterprise, Change management, Digital transformation, enterprise architecture, Functional layer, Information systems, Information use, Layered architecture, Model-based OPC, Proactive adaptations}, doi = {10.1145/3447568.3448539}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85103625235\&doi=10.1145\%2f3447568.3448539\&partnerID=40\&md5=4f7441d9a2cb09a9ffc18c39755d4958}, author = {Daoudi, W. and Doumi, K. and Kjiri, L.} } @conference {Kharchouf2020, title = {Adaptive Fuzzy-PI Control of Wind Energy Conversion System Based DFIG under Voltage Dip}, booktitle = {2020 International Conference on Electrical and Information Technologies, ICEIT 2020}, year = {2020}, note = {cited By 2}, abstract = {The Proportional-Integral (PI) and Fuzzy Logic Controllers (FLC) cannot deal accurately with the system variation. To overcome the drawbacks of PI and FLC regulators, the Adaptive Fuzzy-PI Controllers (AFPICs) are configured. This paper presents a comparison between three different controllers based control methodology for Variable Speed Wind Energy Conversion Systems (WECSs) by means of Doubly Fed Induction Generator (DFIG). Artificial Intelligence (AI) based FLCs is performed to improve the system efficiency and performance under Small Disturbance (SD) and Large Disturbance (LD) cases. To test the PI, FLC, and AFPIC robustness, simulations are done during abrupt wind speed variation (SD), and voltage dip fault (LD). The simulation results show that the proposed AFPIC delivers improved power control, better response rise time, reduced overshoot, undershoot, and settling time compared to classical PI and Fuzzy controllers. The proposed control is proved by simulation using Matlab/Simulink-R2016b. {\textcopyright} 2020 IEEE.}, keywords = {Adaptive control systems, Adaptive fuzzy-PI control, Asynchronous generators, Control methodology, Controllers, Doubly fed induction generators, Electric fault currents, Electric machine control, Energy conversion, Fuzzy logic, Fuzzy logic controllers, MATLAB, Power control, Proportional integral, Two term control systems, Variable speed wind energy conversion systems, Water craft, Wind, Wind energy conversion system, Wind power, Wind speed variations}, doi = {10.1109/ICEIT48248.2020.9113215}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85086889728\&doi=10.1109\%2fICEIT48248.2020.9113215\&partnerID=40\&md5=514df1b642398d6a25a07b76a59427bf}, author = {Kharchouf, I. and Nasser, T. and Essadki, A. and Fdaili, M.} } @conference {Naja2020, title = {Alert Message Dissemination using Graph-based Markov Decision Process Model in VANETs}, booktitle = {IEEE International Conference on Communications}, volume = {2020-June}, year = {2020}, note = {cited By 0}, abstract = {Vehicular Ad-hoc Networks (VANETs) have many promising applications such as improving vehicle driver{\textquoteright}s safety, and so, decreasing car deaths. In VANETs, the main communication way is broadcast. Such Broadcast needs to be done efficiently especially in congested areas to avoid the broadcast storm problem. A crashed vehicle disseminates a message about its incident to all nodes in the network. The vehicle nodes of the network have to disseminate in their turn the alert message carefully to maximize both reachability and saved rebroadcast (by reducing congestion) while minimizing the delay. This concern is demonstrated and modeled by decision hypothesis. In this paper, at first, we are keen on the Markov decision process (MDP), which is utilized to model and tackle such successive decision issues. We aim to optimize a utility for each vehicle relying upon an irregular domain and choices made by it. As the MDP formalism achieves its cutoff points when it is important to consider the cooperation between the several vehicles. We will begin utilizing the Graph-based MDP where the state and activity spaces are factorizable by factors. We then demonstrate that the transition functions and rewards are deteriorated into nearby functions, and the reliance relations between the vehicles are spoken to by a graph. To Figure the optimal strategy, we use Mean Field Approximation (MFA) for tackling GMDP issue. {\textcopyright} 2020 IEEE.}, keywords = {Accidents, Broadcast storm problem, Graphic methods, Markov decision process models, Markov Decision Processes, Markov processes, Mean field approximation, Message dissemination, Mobile telecommunication systems, Optimal strategies, Traffic congestion, Transition functions, Vehicles, Vehicular ad hoc networks, Vehicular Adhoc Networks (VANETs)}, doi = {10.1109/ICC40277.2020.9148997}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089436123\&doi=10.1109\%2fICC40277.2020.9148997\&partnerID=40\&md5=12d16adc7ab7a4b60d7ff52c15709c2c}, author = {Naja, A. and Oualhaj, O.A. and Boulmalf, M. and Essaaidi, M. and Kobbane, A.} } @conference {Daoudi2020738, title = {An approach for adaptive enterprise architecture}, booktitle = {ICEIS 2020 - Proceedings of the 22nd International Conference on Enterprise Information Systems}, volume = {2}, year = {2020}, note = {cited By 4}, pages = {738-745}, abstract = {Given the fast emergence of new technologies and the highly changing business demands, enterprises are confronted with the need to keep up with the evolving transformation. This one is subject to internal and external factors which make it very often in the form of disruptive changes. As a consequence, various parts of companies{\textquoteright} Enterprise Architecture are impacted. To address the new requirements of these increasingly dynamic environments, enterprises need to transition from heavy and document-centred Enterprise Architecture Frameworks to more agile and continuously adaptive approaches. On the other hand, Agile Software Development (ASD) are commonly used methods for IT development. They are mainly characterized by the high involvement of the requester and the rapid accommodation to development needs. This paper presents an Adaptive Enterprise Architecture model that is inspired from some ASD values. Thus, we begin with a brief summary of the criteria that we consider compulsory for Adaptive Enterprise Architecture. Then we present the related work and the connection between agile values and our criteria. Finally, we describe our model and illustrate it via a case study. Copyright {\textcopyright} 2020 by SCITEPRESS {\textendash} Science and Technology Publications, Lda. All rights reserved}, keywords = {Adaptive approach, Adaptive enterprise, Agile manufacturing systems, Agile software development, Business demands, Development needs, Dynamic environments, enterprise architecture, Information systems, Information use, Internal and external factors, Software design}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85091394601\&partnerID=40\&md5=47480aba028e3e923b145c862859135c}, author = {Daoudi, W. and Doumi, K. and Kjiri, L.} } @article {Pefura-Yone2020297, title = {Atopic dermatitis in children and adults in Sub-saharan Africa and Maghreb [{\'E}tat des lieux de la dermatite atopique de l{\textquoteright}enfant et de l{\textquoteright}adulte en Afrique sub-saharienne et au Maghreb]}, journal = {Revue Francaise d{\textquoteright}Allergologie}, volume = {60}, number = {4}, year = {2020}, note = {cited By 0}, pages = {297-299}, abstract = {{Objective: To describe the demographic, clinical, paraclinical and therapeutic characteristics of patients with atopic dermatitis in Sub-Saharan Africa (SSA) and the Maghreb. Methods: The Medical Doctors members of the Federation Allergologie Internationale (FAI) working in SSA and the Maghreb were invited to participate in this cross-sectional study to consecutively including patients with atopic dermatitis (AD) seen in their consultations from September 2019 to January 2010 (5 months). Results: A total of 69 patients (53.6\% female) were included. The proportion of female subjects was higher among subjects included in SSA (69.7\% vs 38.9\%}, keywords = {adolescent, adult, Africa south of the Sahara, allergic rhinitis, asthma, Atopic dermatitis, bacterial skin disease, child, clinical assessment, clinical feature, consultation, cross-sectional study, daytime somnolence, disease association, female, food allergen, human, major clinical study, male, prevalence, prurigo, seborrheic dermatitis, Short Survey}, doi = {10.1016/j.reval.2020.02.014}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85081410340\&doi=10.1016\%2fj.reval.2020.02.014\&partnerID=40\&md5=f42b72ed95d78155dedf2d2b24439201}, author = {Pefura-Yone, E.W. and Jeddi, Z. and Kouotou, E.A. and Delimi, B. and El Gueddari, Y. and Karkar, R. and Kebe, M. and Diallo Chauvin, M. and Dumur, J.-P.} } @conference {Ba{\"\i}na2020215, title = {Business Process Modelling Augmented: Model Driven transformation of User Stories to Processes}, booktitle = {ACM International Conference Proceeding Series}, year = {2020}, note = {cited By 0}, pages = {215-220}, abstract = {The Purpose of our paper is to present a lightweight efficient approach for analysing user stories backlog in order to generate a business process model. A review of literature has been conducted to study contributions in the domain of automatic business process extraction from textual requirements. We found that most of interesting approaches analysing user stories use natural language processing techniques for software projects requirements understanding and none of them target business process modeling automation. The Originality of our contribution is the proposition of a model driven based parsing of user stories backlog and transformations to generate a process model. This work thus contributes with a novel agile iterative methodology augmenting business process design phase with automation assistant transforming user stories textual requirements into a business process model. {\textcopyright} 2020 ACM.}, keywords = {Business Process, Business process design, Business process model, Business process modelling, Intelligent systems, Iterative methodology, Iterative methods, Modeling languages, NAtural language processing, Natural language processing systems, Process design, Process Modeling, Software project}, doi = {10.1145/3419604.3419793}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096411195\&doi=10.1145\%2f3419604.3419793\&partnerID=40\&md5=9c2213523602ada2a3463369b32c3d10}, author = {Baina, K. and El Hamlaoui, M. and Kabbaj, H.} } @conference {Bouroumi2020, title = {CBPM: An Approach for Contextual Business Process Modeling}, booktitle = {4th International Conference on Intelligent Computing in Data Sciences, ICDS 2020}, year = {2020}, note = {cited By 0}, abstract = {With the evolution of ubiquitous computing, the consideration of the context in applications became indispensable and this is the case for business process modeling. In recent years, several approaches have been proposed to introduce context into BP modeling. In this article, we will present an approach which allows to model business process while integrating context notion, we will propose a meta-model of context that allows to model the context in a generic way, and also a framework to gather this context meta-model with the BPMN model in order to elaborate a contextual business process. {\textcopyright} 2020 IEEE.}, keywords = {BP model, Business Process, Business process model, Data Science, Intelligent computing, Meta model, Process engineering, Ubiquitous computing}, doi = {10.1109/ICDS50568.2020.9268681}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85098655208\&doi=10.1109\%2fICDS50568.2020.9268681\&partnerID=40\&md5=0e9a0eeb9719d90ae6d359faa5759165}, author = {Bouroumi, J.E.L. and Guermah, H. and Nassar, M. and Kriouile, A.} } @conference {Boudagdigue2020, title = {Cluster-based certificate revocation in industrial IOT networks using Signaling game}, booktitle = {2020 IEEE Global Communications Conference, GLOBECOM 2020 - Proceedings}, year = {2020}, note = {cited By 1}, abstract = {Industrial IoT network (IIoT) is the result of integrating Internet of Things into the industrial processes to make manufacturers more efficient and reactive. This integration brings with it new security and privacy challenges because of the sensitive information exchanged between devices and the infrastructure. In order to prevent malicious nodes from abusing the IIoT system, this paper investigates a new distributed certificate revocation protocol. Hence, we propose cluster-based certificate revocation mechanism for IIoT network by using game theory. Indeed, our proposed signaling game allows to make a decision on a targeted node after evaluating its behaving. In this approach, we assume an IIoT network organized as a set of clusters called communities. Each community consists of a set of member nodes and a community leader who uses a multi-stage game to renew the certificate of well behaving member nodes and revoke the certificate of malicious member nodes. Based on the Perfect Bayesian Equilibrium, we describe a reactive algorithm implementing the certificates update mechanism. By simulations, we evaluate the convergence speed, the dynamic and the accuracy of the leader{\textquoteright}s posterior belief on nodes with different behaviors. {\textcopyright} 2020 IEEE.}, keywords = {Certificate revocation, Game theory, Industrial internet of things (IIoT), Industrial processs, Multi stage games, Perfect bayesian equilibriums, Privacy by design, Reactive algorithms, Security and privacy, Sensitive informations, Update mechanisms}, doi = {10.1109/GLOBECOM42002.2020.9322497}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85100398930\&doi=10.1109\%2fGLOBECOM42002.2020.9322497\&partnerID=40\&md5=8d905a0b2029ae303a74268527163a44}, author = {Boudagdigue, C. and Benslimane, A. and Kobbane, A.} } @article {Karbal2020157, title = {A Comparison of Different Machine Learning Algorithms for Intrusion Detection}, journal = {Communications in Computer and Information Science}, volume = {1264}, year = {2020}, note = {cited By 0}, pages = {157-169}, abstract = {With the rapid development of the internet, intrusion detection became one of the major research problems in computer security. Many Intrusion Detection Systems (IDS) use data mining algorithms for classifying network traffic data and detecting different security violations. In this paper, we present some of the datasets and methods employed with the focus on network anomaly detection. We compare different machine learning techniques used in the latest research carried out for developing network intrusion detection systems. We also present an overview of some deep learning methodologies and their application for IDS purposes. The primary objective of this survey is to provide with a researcher, the state of the artwork already performed in this field of research. {\textcopyright} 2020, Springer Nature Switzerland AG.}, keywords = {Anomaly detection, Classification (of information), Computer crime, Data communication systems, Data mining, Data mining algorithm, Deep learning, Intrusion detection, Intrusion Detection Systems, Learning algorithms, Learning systems, Machine learning techniques, Network anomaly detection, Network intrusion detection systems, Network security, Primary objective, Research problems, Security violations}, doi = {10.1007/978-3-030-61143-9_13}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097408678\&doi=10.1007\%2f978-3-030-61143-9_13\&partnerID=40\&md5=3725b891261e386c6df84eebcbc0e514}, author = {Karbal, B. and Romadi, R.} } @conference {Remli2020249, title = {Computer integrated manufacturing architecture: A literature review}, booktitle = {IC3K 2020 - Proceedings of the 12th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management}, volume = {3}, year = {2020}, note = {cited By 0}, pages = {249-256}, abstract = {The exponential technological revolution has had a positive impact on industrial companies, providing them with plenty of opportunities to improve their production flows and optimize their costs. This revolution has led to contemporary computer integrated manufacturing (CIM) that consists of linking the shop floor systems to the high business layer. And in order to do that, there has been some research to define a reference architecture to cover all the use cases. This paper presents a literature review of CIM architectures. The purpose of this review is to enumerate the different aspects covered by the different architectures in the literature and the approaches proposed to handle them. Copyright {\textcopyright} 2020 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.}, keywords = {Computer architecture, Computer integrated manufacturing, Industrial companies, Knowledge management, Literature reviews, Production flows, Reference architecture, Search engines, Shop floor, Technological revolution}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85107133186\&partnerID=40\&md5=5b2fbe31955f56e4cfd019808278476c}, author = {Remli, A. and Khtira, A. and Asri, B.E.} } @article {Sikal2020183, title = {Configurable process model: Discovery approach from event logs}, journal = {Advances in Science, Technology and Engineering Systems}, volume = {5}, number = {1}, year = {2020}, note = {cited By 0}, pages = {183-190}, abstract = {In the domain of business process management, the configurable process model is widely used to optimize time and cost of business process models design, which is known as the concept of "reuse". Using process mining techniques for process model discovery helps to provide a better view on processes and improve quality of models. The majority of existing configurable model discovery approaches work intensively on control flow discovery as main process perspective without considering other perspectives such as resources and data, and do not propose a detailed discovery of variability elements. In addition, the configurable process model creation is generally done by merging variant models not directly from event logs, which is not the optimal way to get a reliable configurable process model. This paper presents an overview of new multi-perspective variability discovery approach. The approach respects the variability of different process perspectives and allows users to create a configurable process model directly from event logs. {\textcopyright} 2020 ASTES Publishers. All rights reserved.}, doi = {10.25046/aj050124}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85081330401\&doi=10.25046\%2faj050124\&partnerID=40\&md5=716f2277e1926d108d92b8a313d3bac9}, author = {Sikal, R. and Sba{\"\i}, H. and Kjiri, L.} } @article {LHAZMIR2020102102, title = {A decision-making analysis in UAV-enabled wireless power transfer for IoT networks}, journal = {Simulation Modelling Practice and Theory}, volume = {103}, year = {2020}, pages = {102102}, abstract = {We consider an IoT network with energy-harvesting capabilities. To extend the network lifetime, we propose a novel unmanned aerial vehicle (UAV)- enabled wireless power transfer (WPT) system, where UAVs move among IoT devices and act as data aggregators and wireless power providers. This paper addresses the decision-making problem since the limited buffer and energy resources constrain all nodes. Each IoT node must decide on whether to request a data transmission, to ask for a wireless energy transfer or to abstain and not take any action. When a UAV receives a request from an IoT device, either for data reception or wireless energy transmission, it has to accept or decline. In this paper, we aim to find a proper packet delivery and energy transfer policy according to the system state that maximizes the data transmission efficiency of the system. We first formulate the problem as a Markov Decision Process (MDP) to tackle the successive decision issues, to optimize a utility for each node upon a casual environment. As the MDP formalism achieves its limits when the interactions between different nodes are considered, we formulate the problem as a Graph-based MDP (GMDP). The transition functions and rewards are then decomposed into local functions, and a graph illustrates the dependency{\textquoteright} relations among the nodes. To obtain the optimal policy despite the system{\textquoteright}s variations, Mean-Field Approximation (MFA) and Approximate linear-programming (ALP) algorithms were proposed to solve the GMDP problem.}, keywords = {GMDP, Internet of things, Unmanned aerial vehicle, Wireless energy transfer}, issn = {1569-190X}, doi = {https://doi.org/10.1016/j.simpat.2020.102102}, url = {https://www.sciencedirect.com/science/article/pii/S1569190X2030040X}, author = {Safae Lhazmir and Omar Ait Oualhaj and Abdellatif Kobbane and Lynda Mokdad} } @article {Lhazmir2020, title = {A decision-making analysis in UAV-enabled wireless power transfer for IoT networks}, journal = {Simulation Modelling Practice and Theory}, volume = {103}, year = {2020}, note = {cited By 8}, abstract = {We consider an IoT network with energy-harvesting capabilities. To extend the network lifetime, we propose a novel unmanned aerial vehicle (UAV)- enabled wireless power transfer (WPT) system, where UAVs move among IoT devices and act as data aggregators and wireless power providers. This paper addresses the decision-making problem since the limited buffer and energy resources constrain all nodes. Each IoT node must decide on whether to request a data transmission, to ask for a wireless energy transfer or to abstain and not take any action. When a UAV receives a request from an IoT device, either for data reception or wireless energy transmission, it has to accept or decline. In this paper, we aim to find a proper packet delivery and energy transfer policy according to the system state that maximizes the data transmission efficiency of the system. We first formulate the problem as a Markov Decision Process (MDP) to tackle the successive decision issues, to optimize a utility for each node upon a casual environment. As the MDP formalism achieves its limits when the interactions between different nodes are considered, we formulate the problem as a Graph-based MDP (GMDP). The transition functions and rewards are then decomposed into local functions, and a graph illustrates the dependency{\textquoteright} relations among the nodes. To obtain the optimal policy despite the system{\textquoteright}s variations, Mean-Field Approximation (MFA) and Approximate linear-programming (ALP) algorithms were proposed to solve the GMDP problem. {\textcopyright} 2020 Elsevier B.V.}, keywords = {Antennas, Approximate linear programming, Approximation algorithms, Behavioral research, Data communication systems, Data transfer, Data transmission efficiency, Decision making, Decision making analysis, Decision-making problem, Energy harvesting, Energy resources, Energy transfer, Graph theory, Graphic methods, Inductive power transmission, Internet of things, Linear programming, Markov Decision Processes, Markov processes, Mean field approximation, Unmanned aerial vehicles (UAV), Wireless energy transfers, Wireless power transfer (WPT)}, doi = {10.1016/j.simpat.2020.102102}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85084066274\&doi=10.1016\%2fj.simpat.2020.102102\&partnerID=40\&md5=6a1c9e107244a170a782e61d0f9755cc}, author = {Lhazmir, S. and Oualhaj, O.A. and Kobbane, A. and Mokdad, L.} } @conference {Ahajjam20201701, title = {Electric Power Quality Disturbances Classification based on Temporal-Spectral Images and Deep Convolutional Neural Networks}, booktitle = {2020 International Wireless Communications and Mobile Computing, IWCMC 2020}, year = {2020}, note = {cited By 7}, pages = {1701-1706}, abstract = {We propose a deep learning based technique for power quality disturbances (PQD) detection and identification that aims at mimicking the reasoning of human field experts. This technique consists of processing small-size images containing superimposed time and frequency representations of the electric signal. The classification of PQD is performed with a convolutional neural network (CNN) trained with synthetic signals containing various single and multiple PQDs. Simulation results show that our technique is able to detect and identify with a high accuracy, in addition to pure sinusoidal, eight single PQDs and 20 of their combinations (up to four PQDs in the same signal) even in the presence of noise. Features such as lower computational load and simplicity while maintaining high performance sets the proposed technique apart from previous ones. {\textcopyright} 2020 IEEE.}, keywords = {Computational loads, Convolution, Convolutional neural networks, Deep learning, Deep neural networks, Detection and identifications, Electric power quality disturbances, Electric signal, Image classification, Mobile computing, Power quality, Power quality disturbances, Spectral images, Spectroscopy, Synthetic signals, Time and frequencies}, doi = {10.1109/IWCMC48107.2020.9148438}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089652241\&doi=10.1109\%2fIWCMC48107.2020.9148438\&partnerID=40\&md5=a479607523102d68ad4d7d0188079ac8}, author = {Ahajjam, M.A. and Licea, D.B. and Ghogho, M. and Kobbane, A.} } @article {PEFURAYONE2020297, title = {{\'E}tat des lieux de la dermatite atopique de l{\textquoteright}enfant et de l{\textquoteright}adulte en Afrique sub-saharienne et au Maghreb}, journal = {Revue Fran{\c c}aise d{\textquoteright}Allergologie}, volume = {60}, number = {4}, year = {2020}, note = {15{\`e}me Congr{\`e}s Francophone d{\textquoteright}Allergologie}, pages = {297-299}, abstract = {{R{\'e}sum{\'e} Objectif D{\'e}crire les caract{\'e}ristiques d{\'e}mographiques, cliniques, paracliniques et th{\'e}rapeutiques des patients ayant une dermatite atopique en Afrique sub-saharienne (SSA) et au Maghreb. M{\'e}thodes Les m{\'e}decins membres de la F{\'e}d{\'e}ration Allergologie Internationale travaillant en Afrique sub-saharienne et au Maghreb ont {\'e}t{\'e} invit{\'e}s {\`a} participer {\`a} cette {\'e}tude transversale en incluant de fa{\c c}on cons{\'e}cutive les patientsatteints de dermatite atopique (DA) vus dans leurs consultations de septembre 2019~{\`a} janvier 2010 (5~mois). R{\'e}sultats Au total, 69~patients (53,6~\% de sexe f{\'e}minin) ont {\'e}t{\'e} inclus. La proportion des sujets de sexe f{\'e}minin {\'e}tait plus {\'e}lev{\'e}e chez les sujets inclus en Afrique SSA (69,7~\% vs 38,9~\%}, keywords = {Allergie, Allergy, Atopic dermatitis, Atopic eczema, Dermatite atopique, Ecz{\'e}ma atopique, Inflammatory disease, Maladie inflammatoire}, issn = {1877-0320}, doi = {https://doi.org/10.1016/j.reval.2020.02.014}, url = {https://www.sciencedirect.com/science/article/pii/S1877032020300452}, author = {E.W. Pefura-Yone and Z. Jeddi and E.A. Kouotou and B. Delimi and Y. El Gueddari and R. Karkar and M. Kebe and M. Diallo Chauvin and J.-P. Dumur} } @conference {Khannat2020139, title = {Event logs pre-processing for configurable process discovery: Ontology-based approach}, booktitle = {Colloquium in Information Science and Technology, CIST}, volume = {2020-June}, year = {2020}, note = {cited By 1}, pages = {139-144}, abstract = {Nowadays, process mining offers key tools for companies to discover and develop continuously their processes. Moreover, many research works focus on the application of process mining techniques to manage configurable process models. To provide configurable process models with high quality and less complexity using process mining techniques, the preparation of event logs before discovering processes is strongly required. Therefore, various approaches have introduced semantics to derive knowledge from process execution traces. Although, this knowledge is used for discovering variability rules or deriving process variants. However, existing works lack the discovery of semantically enriched configurable process models from event logs. Since event logs are usually combined with semantics and domain ontology for optimizing process mining applications, it seems to be important to introduce a new approach of semantically enriched configurable process discovery. It will be helpful during configuration, validation, and enhancement of configurable processes that are extracted from event logs. In this paper, we present a new framework for event logs preprocessing using ontologies. Our aim is to enrich a collection of event logs with concepts from ontologies as a first step towards discovering a semantically enriched configurable process. {\textcopyright} 2021 IEEE.}, keywords = {Configurable process models, Data mining, Domain ontologies, New approaches, Ontology, Pre-processing, Process Discovery, Process execution, Process mining, Process variants, Semantics}, doi = {10.1109/CiSt49399.2021.9357303}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85103812408\&doi=10.1109\%2fCiSt49399.2021.9357303\&partnerID=40\&md5=c1a3e5ace97f4f0e5deedd34b987c311}, author = {Khannat, A. and Sba{\"\i}, H. and Kjiri, L.} } @conference {Hafdi2020, title = {Formal Modeling and Validation of Micro Smart Grids Based on ReDy Architecture}, booktitle = {Proceedings of 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, CloudTech 2020}, year = {2020}, note = {cited By 0}, abstract = {Several cities in the world are moving from traditional power grid to Smart Grids. In order to set up Smart Grids, we should be able to face many challenges related to reliability, scalability, dynamism, technological solutions, security, etc. In this paper, we propose a case study where we model a micro Smart Grid according to the ReDy architecture, which is intended for IoT applications. The ReDy architecture provides a base to implement a scalable, reliable, and dynamic IoT network ready to meet Smart Grid needs. In order to prove those requirements, we opted for formal modeling and validation approach using model checking techniques. This formal analysis is carried out using the CADP toolbox. {\textcopyright} 2020 IEEE.}, keywords = {Artificial intelligence, Binary alloys, Cloud computing, Dysprosium alloys, Electric power transmission networks, Formal analysis, Formal model, Internet of things, IOT applications, IOT networks, Microgrids, Model checking, Model-checking techniques, Network architecture, Power grids, Rhenium alloys, Smart grid, Smart power grids, Technological solution}, doi = {10.1109/CloudTech49835.2020.9365923}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85102629868\&doi=10.1109\%2fCloudTech49835.2020.9365923\&partnerID=40\&md5=7c48017aaa6f8aa00a31f5ae27bd816c}, author = {Hafdi, K. and Kriouile, A.} } @conference {Hafaiedh2020, title = {Fuzzified Double Game for Qos-Aware LTE-U and Wifi Coexistence in 5Ghz Band}, booktitle = {2020 Global Information Infrastructure and Networking Symposium, GIIS 2020}, year = {2020}, note = {cited By 0}, abstract = {In the current decade, cellular networks are facing the challenge of meeting aggressive data demand with limited licensed spectrum and LTE over the unlicensed band (LTE-U) has come as an effective way to defeat this problem. Using LTE-U along with superior techniques such as carrier aggregation (CA), it became possible to boost the performance of existing cellular networks. However, LTE-Ucan potentially deteriorate the performance of coexisting WiFi systems operating over the unlicensed bands if not well managed. Mainly because of the LTE-U{\textquoteright}s selfish nature of using the resources without sharing. In this paper, an effective coexistence mechanism between LTE-U and WiFi systems is being investigated. The point is to facilitate the cellular networks to use LTE-U with CA to satisfy the quality-of-service (QoS) of the users while protecting WiFi users, considering multiple operators in a dense deployment scenario. To resolve this problem, a double cooperative game will be used. That game will be implemented, in addition to the fuzzy logic, which will help us in resource allocation for users QoS. {\textcopyright} 2020 IEEE.}, keywords = {Carrier aggregations, Cellular network, Cellular radio systems, Cooperative game, Deployment scenarios, Fuzzy logic, Mobile telecommunication systems, Multiple operator, QoS-aware, Quality of service, Superior technique, Wi-Fi, WiFi systems, Wireless local area networks (WLAN)}, doi = {10.1109/GIIS50753.2020.9248487}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097601439\&doi=10.1109\%2fGIIS50753.2020.9248487\&partnerID=40\&md5=ca56971766f975bae3c7b9a084c6b679}, author = {Hafaiedh, H. and El Korbi, I. and Langar, R. and Saidane, L.A. and Kobbane, A.} } @article {Korachi2020493, title = {General approach for formulating a digital transformation strategy}, journal = {Journal of Computer Science}, volume = {16}, number = {4}, year = {2020}, note = {cited By 8}, pages = {493-507}, abstract = {To take advantage of information technologies, organizations need to define a clear strategy. Numerous works have provided definitions and phases of digital strategies. Some of these strategies are context-specific, while others deal with the common elements of digital strategies regardless of the digital transformation context. However, these works do not address a holistic approach. This raises ambiguity regarding digital strategy definitions and approaches. To eliminate this ambiguity, the current research tries to take advantage of existing digital strategies to propose a general digital strategy definition and build a general digital transformation approach. This work analyses various digital transformation strategies, to extract and classify their common elements in order to build a general approach that frame and drive the formulation of digital transformation strategies. To define such a general approach, the current paper analyses the effects of IT Governance and Management Strategy on the Digital Transformation Maturity. This analysis identified how IT Governance and Management Strategy can contribute to formulating a digital transformation strategy. Partial Least Square (PLS) was adopted in this research to develop an empirical evaluation for the case of 30 digital strategies and frameworks. Based on this empirical study several results have been presented in this work, namely: determination of a digital strategy definition and identification of a digital strategy approach. The proposed approach is composed of the following building blocks: Strategic Awareness, Business Strategic Planning, IT Organizational Structure, Steering committee, IT Prioritization Process, IT Investment Decisions, IT Strategic Planning, IT Budgeting, IT Reporting, IT Reaction Capacity and Management Strategy. {\textcopyright} 2020 Korachi Zineb and Bounabat Bouchaib.}, doi = {10.3844/JCSSP.2020.493.507}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089215075\&doi=10.3844\%2fJCSSP.2020.493.507\&partnerID=40\&md5=f078fe7456a6e96038b70d205dddec3f}, author = {Korachi, Z. and Bounabat, B.} } @article {Guermah2020300, title = {How can reasoning improve ontology-based context-aware system?}, journal = {International Journal of Advanced Intelligence Paradigms}, volume = {15}, number = {3}, year = {2020}, note = {cited By 1}, pages = {300-316}, abstract = {Over the past two decades, the large evolution of software engineering, telecommunication and pervasive devices has lead to emergence of a new vision of development aiming at building systems to meet more complex and personalised needs known as context-aware systems. This type of systems is becoming the next computing paradigm in which infrastructure and services are sensitive to any change of the context, so that plays a crucial role to provide interactive intelligent environments. In parallel, contextual situation refers to a higher level of information inferred from different context data flow that can be extracted from physical and virtual sensors. The power of using situation is lies in their ability to provide a simple and comprehensible representation of context property, which preserve the services that manipulate them from the complexity of sensor readings, data transmission errors and inferencing activities. In this work, we aim to explore the added value of using ontology-based reasoning, focusing on first-order logic and fuzzy logic, to produce contextual situations. Copyright {\textcopyright} 2020 Inderscience Enterprises Ltd.}, doi = {10.1504/IJAIP.2020.105824}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85082202504\&doi=10.1504\%2fIJAIP.2020.105824\&partnerID=40\&md5=202a3b83c6a307a1c364213895e826ba}, author = {Guermah, H. and Fissaa, T. and Guermah, B. and Hafiddi, H. and Nassar, M. and Kriouile, A.} } @article {RHANOUI2020, title = {A hybrid recommender system for patron driven library acquisition and weeding}, journal = {Journal of King Saud University - Computer and Information Sciences}, year = {2020}, abstract = {Nowadays the explosion of information sources has shaped how library users access information and provide feedback on their preferences. Therefore, faced with this explosion and the blossoming of digital libraries, modern libraries must take up the challenge of meeting the needs of their users and considering their opinions and preferences in order to offer them adequate resources and henceforth eliminate those that are unsatisfactory. Almost all library recommender systems aim to provide users with items of interest to them. However, despite its definite interest, the staff-oriented adaptation and application of this revolutionary technique to the collection development process is still in an embryonic stage. We propose a patron-driven hybrid library recommender system that uses machine learning techniques to recommend and assist in the acquisition and weeding decision-making operations by extracting and analyzing users{\textquoteright} opinions and ratings. The recommender system is applied and validated in a real national library case using Amazon{\textquoteright}s digital library and the library{\textquoteright}s catalog as a data source.}, keywords = {Acquisition, Library Management, Machine learning, Recommender Systems, Weeding}, issn = {1319-1578}, doi = {https://doi.org/10.1016/j.jksuci.2020.10.017}, url = {https://www.sciencedirect.com/science/article/pii/S1319157820305103}, author = {Maryem Rhanoui and Mounia Mikram and Siham Yousfi and Ayoub Kasmi and Naoufel Zoubeidi} } @article {Kawtar2020495, title = {Impact of Change in Business IT Alignment: Evaluation with CBITA Tool}, journal = {International Journal of Advanced Computer Science and Applications}, volume = {11}, number = {10}, year = {2020}, note = {cited By 2}, pages = {495-504}, abstract = {Organizations introduce changes to adapt to an agile context in a turbulent environment. These change often have an impact on business and information technology. In most cases, the change impacts organizational elements that make the adaptation not well defined, leaving out elements that can lead to misalignment. The change is realized in this article as a project, which will impact all the Business-IT alignment elements. It is important to know the scope of the impact in order to make a complete adaptation. By reviewing the literature, we found that there is no work dealing with this aspect. To fill this gap, we determine the impact of the project on the organization by considering of Business-IT alignment and we proceed with a comparison of the AS IS model of the organization with the TO BE model which is the target to be implemented keeping the system aligned. Accordingly, we propose a metamodel for change by the impact of the project on the Business-IT alignment and a set of rules and algorithms to predict the impact and adaptation. To make these contributions operational, the implementation of Change Business-IT Alignment Tool and demonstrate its applicability through a case study of an urban agency. {\textcopyright} 2020. All rights reserved.}, keywords = {Agile contexts, Agility, Alignment elements, Business-IT alignment, Change, Change impacts, Impact of changes, Organisational, Project, Turbulent environments}, doi = {10.14569/IJACSA.2020.0111062}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85100186829\&doi=10.14569\%2fIJACSA.2020.0111062\&partnerID=40\&md5=b28820339849d2496e184e51521f3c5a}, author = {Kawtar, I. and Karim, D. and Salah, B.} } @article {Ahajjam2020, title = {IMPEC: An integrated system for monitoring and processing electricity consumption in buildings}, journal = {Sensors (Switzerland)}, volume = {20}, number = {4}, year = {2020}, note = {cited By 4}, abstract = {Non-intrusive Load Monitoring (NILM) systems aim at identifying and monitoring the power consumption of individual appliances using the aggregate electricity consumption. Many issues hinder their development. For example, due to the complexity of data acquisition and labeling, datasets are scarce; labeled datasets are essential for developing disaggregation and load prediction algorithms. In this paper, we introduce a new NILM system, called Integrated Monitoring and Processing Electricity Consumption (IMPEC). The main characteristics of the proposed system are flexibility, compactness, modularity, and advanced on-board processing capabilities. Both hardware and software parts of the system are described, along with several validation tests performed at residential and industrial settings. {\textcopyright} 2020 by the authors. Licensee MDPI, Basel, Switzerland.}, keywords = {Article, Data acquisition, Disaggregation, Electric load management, Electric power utilization, electricity, Electricity-consumption, Energy monitoring, Hardware and software, Industrial settings, Integrated monitoring, Labeled data, Monitoring, Nonintrusive load monitoring, On-board processing, software, Software testing}, doi = {10.3390/s20041048}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85079573681\&doi=10.3390\%2fs20041048\&partnerID=40\&md5=a145afa634dd9bf882c3c570823158c9}, author = {Ahajjam, M.A. and Licea, D.B. and Ghogho, M. and Kobbane, A.} } @article {Assila2020, title = {Improving caching resource management: A pricing economic approach using Cournot, Bertrand, and Stackelberg game models}, journal = {International Journal of Communication Systems}, year = {2020}, note = {cited By 3}, abstract = {Over-The-Top broadcasts a huge number of medias that mobile network operators have to manage efficiently before to deliver it to their subscribers. We propose an economic pricing approach to address caching resource management issues in the 5G wireless networks and to overcome limitations in terms of throughput, latency, and reliability. Moreover, we consider this approach based on an oligopolistic multi-market deducted from Cournot, Stackelberg, and Bertrand models. For simulation purpose, we consider the routing protocol (Ad-hoc On-Demand Distance Vector [AODV]) commonly used for the wireless network. We use the NS-2 package, and we analyze results in terms of End-to-End delay representing latency, throughput, packet delivery ratio, and normalized network load. {\textcopyright} 2020 John Wiley \& Sons, Ltd.}, keywords = {5G mobile communication systems, Ad hoc on demand distance vector, caching, Costs, Cournot, Economics, Mobile network operators, Mobile telecommunication systems, Natural resources management, Packet delivery ratio, Resource allocation, Resource Management, Stackelberg, Stackelberg Games, wireless networks}, doi = {10.1002/dac.4358}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85079387484\&doi=10.1002\%2fdac.4358\&partnerID=40\&md5=70ae8f696b34a21860572f8c3437dd46}, author = {Assila, B. and Kobbane, A. and Ben-Othman, J.} } @conference {Khaoula2020, title = {The integrated multi-plant production routing problem with simultaneous delivery and pickup}, booktitle = {Proceedings - 2020 5th International Conference on Logistics Operations Management, GOL 2020}, year = {2020}, note = {cited By 1}, abstract = {The Production Routing Problem (PRP) is concerned with coordinating the manufacturing, holding, distribution, and routing decisions to meet customer demands with an objective of minimizing the total operational costs for a defined period. The PRP can be expanded unaffectedly to concern reverse logistics and return flow processes, which typically consist on collecting used products or recyclable packaging from consumers to the depot or plant for a potential refurbishment, upgrading or recycling. Here, we will model and resolve to optimality the Multiple Plant Production Routing Problem in a Reverse Logistics context. {\textcopyright} 2020 IEEE.}, keywords = {Customer demands, Manufacture, Multi-plants, Plant production, Return flow, Reverse logistics, Routing decisions, Routing problems, Used product}, doi = {10.1109/GOL49479.2020.9314715}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85100174617\&doi=10.1109\%2fGOL49479.2020.9314715\&partnerID=40\&md5=439e942e353af832a22471f4c9ac7fb3}, author = {Khaoula, B. and Mohammed, E.A. and Youssef, B.} } @article {Kamri2020298, title = {Machine Learning Approach for Smart Self-diagnosing Autonomic Computing Systems}, journal = {Advances in Intelligent Systems and Computing}, volume = {1105 AISC}, year = {2020}, note = {cited By 0}, pages = {298-307}, abstract = {While modern systems and networks are continuously growing in size, complexity and diversity, the monitoring and diagnosing of such systems is becoming a real challenge. Technically and economically, more automation of the classical diagnosing tasks is needed. This has triggered a considerable research initiative, grouped under the terms self-management and Autonomic Computing. In this paper we propose a new model for smart self-diagnosing systems based on Autonomic Computing principles and Machine Learning techniques. {\textcopyright} 2020, Springer Nature Switzerland AG.}, keywords = {Autonomic Computing, Autonomic computing system, Diagnosing system, Intelligent systems, Learning systems, Machine learning, Machine learning approaches, Machine learning techniques, planning, Research initiatives, Self management, Self-diagnosing, Sustainable development, wireless networks}, doi = {10.1007/978-3-030-36674-2_31}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85080896883\&doi=10.1007\%2f978-3-030-36674-2_31\&partnerID=40\&md5=3dce8bc657338047166fb3ded16c10c8}, author = {Kamri, H. and Bounabat, B.} } @article {Gryech2020379, title = {Machine learning for air quality prediction using meteorological and traffic related features}, journal = {Journal of Ambient Intelligence and Smart Environments}, volume = {12}, number = {5}, year = {2020}, note = {cited By 4}, pages = {379-391}, abstract = {The presence of pollutants in the air has a direct impact on our health and causes detrimental changes to our environment. Air quality monitoring is therefore of paramount importance. The high cost of the acquisition and maintenance of accurate air quality stations implies that only a small number of these stations can be deployed in a country. To improve the spatial resolution of the air monitoring process, an interesting idea is to develop data-driven models to predict air quality based on readily available data. In this paper, we investigate the correlations between air pollutants concentrations and meteorological and road traffic data. Using machine learning, regression models are developed to predict pollutants concentration. Both linear and non-linear models are investigated in this paper. It is shown that non-linear models, namely Random Forest (RF) and Support Vector Regression (SVR), better describe the impact of traffic flows and meteorology on the concentrations of pollutants in the atmosphere. It is also shown that more accurate prediction models can be obtained when including some pollutants{\textquoteright} concentration as predictors. This may be used to infer the concentrations of some pollutants using those of other pollutants, thereby reducing the number of air pollution sensors. {\textcopyright} 2020 - IOS Press and the authors. All rights reserved.}, keywords = {Accurate prediction, Air quality, Air quality monitoring, Air quality prediction, Data-driven model, Decision trees, Forecasting, Machine learning, Non-linear model, Nonlinear systems, Pollution sensors, Predictive analytics, Spatial resolution, Support vector regression, Support vector regression (SVR)}, doi = {10.3233/AIS-200572}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85093821240\&doi=10.3233\%2fAIS-200572\&partnerID=40\&md5=f8b7d726f054f01a2be432560d359fc5}, author = {Gryech, I. and Ghogho, M. and Elhammouti, H. and Sbihi, N. and Kobbane, A.} } @article {Lhazmir2020973, title = {Matching Game with No-Regret Learning for IoT Energy-Efficient Associations with UAV}, journal = {IEEE Transactions on Green Communications and Networking}, volume = {4}, number = {4}, year = {2020}, note = {cited By 4}, pages = {973-981}, abstract = {Unmanned aerial vehicles (UAVs) are a promising technology to provide an energy-efficient and cost-effective solution for data collection from ground Internet of Things (IoT) network. In this paper, we analyze the UAV-IoT device associations that provide reliable connections with low communication power and load balance the traffic using analytical techniques from game theory. In particular, to maximize the IoT devices{\textquoteright} benefits, a novel framework is proposed to assign them the most suitable UAVs. We formulate the problem as a distributed algorithm that combines notions from matching theory and no-regret learning. First, we develop a many-to-one matching game where UAVs and IoT devices are the players. In this subgame, the players rank one another based on individual utility functions that capture their needs. Each IoT device aims to minimize its transmitting energy while meeting its signal-to-interference-plus-noise-ratio (SINR) requirements, and each UAV seeks to maximize the number of served IoT devices while respecting its energy constraints. Second, a non-cooperative game based on no-regret learning is used to determine each IoT device{\textquoteright}s regret. Then, UAVs open a window for transfers to the IoT devices. Simulation results show that the proposed approach provides a low average total transmit power, ensures fast data transmission and optimal utilization of the UAVs{\textquoteright} bandwidth. {\textcopyright} 2017 IEEE.}, keywords = {Antennas, Cost effectiveness, Cost-effective solutions, energy efficiency, Fast data transmission, Game theory, Internet of things, Internet of Things (IOT), Noncooperative game, Optimal utilization, Reliable connections, Signal interference, Signal to interference plus noise ratio, Signal to noise ratio, Total transmit power, Unmanned aerial vehicles (UAV)}, doi = {10.1109/TGCN.2020.3008992}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096697293\&doi=10.1109\%2fTGCN.2020.3008992\&partnerID=40\&md5=7f2e844f54122845029dfd8503c5eaf6}, author = {Lhazmir, S. and Oualhaj, O.A. and Kobbane, A. and Ben-Othman, J.} } @article {Sebbar20205875, title = {MitM detection and defense mechanism CBNA-RF based on machine learning for large-scale SDN context}, journal = {Journal of Ambient Intelligence and Humanized Computing}, volume = {11}, number = {12}, year = {2020}, note = {cited By 15}, pages = {5875-5894}, abstract = {Software defined network (SDN) is a promising new network abstraction that aims to improve and facilitate network management. Due to its centralized architecture and the lack of intelligence on the data plane, SDN suffers from many security issues that slows down its deployment. Man in the Middle (MitM) attack is considered as one of the most devastating attacks in an SDN context. In fact, MitM attack allows the attackers to capture, duplicate and spoof flows by targeting southbound interfaces and SDN nodes. Furthermore, it{\textquoteright}s very difficult to detect MitM attacks since it is performed passively at the SDN level. To reduce the impact of this attack, we generally set up security policies and authentication mechanisms. However, these techniques are not applicable for a large scale SDN architecture as they require complexes and static configurations and as they negatively influence on network performance. In this paper, we propose an intrusion detection and prevention framework by using machine learning techniques to detect and stop MitM attempts. To do so, we build a context-based node acceptance based on the random forest model (CBNA-RF), which helps to setting-up appropriate security policies and to automating defense operations on a large-scale SDN context. This mechanism can realize a quick and early detection of MitM attacks by automatically detecting malicious nodes without affecting performances. The evaluation of the proposed framework demonstrates that our model can correctly classify and detect malicious connections and nodes while keeping high accuracy and precision scores. {\textcopyright} 2020, Springer-Verlag GmbH Germany, part of Springer Nature.}, keywords = {Authentication mechanisms, Centralized architecture, Decision trees, Defense operations, Intrusion detection, Intrusion detection and prevention, Machine learning, Machine learning techniques, Man-In-The-Middle (MITM) Attack, Network abstractions, Network architecture, Network security, Random forest modeling, Security systems}, doi = {10.1007/s12652-020-02099-4}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085987877\&doi=10.1007\%2fs12652-020-02099-4\&partnerID=40\&md5=cf120767ba875958e97b87ce22203057}, author = {Sebbar, A. and Zkik, K. and Baddi, Y. and Boulmalf, M. and Kettani, M.D.E.-C.E.} } @conference {ElAkrouchi2020, title = {Monitoring Early Warning Signs Evolution through Time}, booktitle = {ACM International Conference Proceeding Series}, year = {2020}, note = {cited By 0}, abstract = {In excessive business competition, detecting weak signals is very important to anticipate future changes and events. The process of detecting weak signals is very challenging, and many techniques were proposed to automatize this challenge but still needs the intervention of experts{\textquoteright} opinion. Understanding those detected signals and their evolution in time is crucial to reveal the alertness of possible future events and warnings. For this reason, this paper proposes a new algorithm to strengthen weak signals into early warning signs. The proposed algorithm aims to monitor and track weak signals{\textquoteright} evolution within time. The output will be a list of early warning signs and visualization to illustrate their evolution in time. Finally, to adequately understand the early warning signs obtained and enhance their semantic alertness, we used Word2Vec modeling to provide semantically similar words to these warning signs and improve their contextual alertness. We tested this algorithm on a web news dataset of 2006-2007 to detect early warning signs related to the 2008 financial crisis ahead of time. We obtained prominent results in strengthening and monitoring the evolution of early warning signs related to this crisis. {\textcopyright} 2020 ACM.}, keywords = {Artificial intelligence, Business competition, Competition, Early warning signs, Financial crisis, Possible futures, Semantics, Signal detection, Warning signs, Weak signals}, doi = {10.1145/3446132.3446173}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85102970850\&doi=10.1145\%2f3446132.3446173\&partnerID=40\&md5=4f35fa04a194332457fca88ff3bec0d1}, author = {El Akrouchi, M. and Benbrahim, H. and Kassou, I.} } @article {Gryech2020, title = {Moreair: A low-cost urban air pollution monitoring system}, journal = {Sensors (Switzerland)}, volume = {20}, number = {4}, year = {2020}, note = {cited By 25}, abstract = {MoreAir is a low-cost and agile urban air pollution monitoring system. This paper describes the methodology used in the development of this system along with some preliminary data analysis results. A key feature of MoreAir is its innovative sensor deployment strategy which is based on mobile and nomadic sensors as well as on medical data collected at a children{\textquoteright}s hospital, used to identify urban areas of high prevalence of respiratory diseases. Another key feature is the use of machine learning to perform prediction. In this paper, Moroccan cities are taken as case studies. Using the agile deployment strategy of MoreAir, it is shown that in many Moroccan neighborhoods, road traffic has a smaller impact on the concentrations of particulate matters (PM) than other sources, such as public baths, public ovens, open-air street food vendors and thrift shops. A geographical information system has been developed to provide real-time information to the citizens about the air quality in different neighborhoods and thus raise awareness about urban pollution. {\textcopyright} 2020 by the authors. Licensee MDPI, Basel, Switzerland.}, keywords = {Agile deployments, Agile manufacturing systems, Air quality, Costs, Decision trees, Geographic information systems, Information systems, Information use, Learning systems, Machine learning, Mobile sensing, Monitoring, Particles (particulate matter), Particulate Matter, Pollution detection, Pollution monitoring, Random forests, Real-time information, Sensor deployment, Urban air pollution, Urban pollutions}, doi = {10.3390/s20040998}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85079609813\&doi=10.3390\%2fs20040998\&partnerID=40\&md5=dc90b4357fcdc64d82d12f57a45f971f}, author = {Gryech, I. and Ben-Aboud, Y. and Guermah, B. and Sbihi, N. and Ghogho, M. and Kobbane, A.} } @article {Ahajjam2020, title = {Mored: A moroccan buildings{\textquoteright} electricity consumption dataset}, journal = {Energies}, volume = {13}, number = {24}, year = {2020}, note = {cited By 6}, abstract = {This paper consists of two parts: An overview of existing open datasets of electricity consumption and a description of the Moroccan Buildings{\textquoteright} Electricity Consumption Dataset, a first of its kind, coined as MORED. The new dataset comprises electricity consumption data of various Moroccan premises. Unlike existing datasets, MORED provides three main data components: Whole premises (WP) electricity consumption, individual load (IL) ground-truth consumption, and fully labeled IL signatures, from affluent and disadvantaged neighborhoods. The WP consumption data were acquired at low rates (1/5 or 1/10 samples/s) from 12 households; the IL ground-truth data were acquired at similar rates from five households for extended durations; and IL signature data were acquired at high and low rates (50 k and 4 samples/s) from 37 different residential and industrial loads. In addition, the dataset encompasses non-intrusive load monitoring (NILM) metadata. {\textcopyright} 2020 by the authors.}, keywords = {Data components, Electric load management, Electric power utilization, Electricity-consumption, Ground truth, Ground truth data, Industrial loads, Low rates, Nonintrusive load monitoring, Signature data}, doi = {10.3390/en13246737}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85106664615\&doi=10.3390\%2fen13246737\&partnerID=40\&md5=2d7b881b6d24a1d21b672b26fa9ee62f}, author = {Ahajjam, M.A. and Licea, D.B. and Essayeh, C. and Ghogho, M. and Kobbane, A.} } @article {Baddi2020245, title = {Msnd: Multicast software defined network based solution to multicast tree construction}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {12293}, year = {2020}, note = {cited By 0}, pages = {245-256}, abstract = {Internet services provider propose increasingly numerous applications depend on multicast communication patterns, such as database synchronization, newsletter updates, video, and audio group streaming. In spite of, IP multicast is frequently suffered from scaling and instability, which causes internet provider administrators to avoid its utilization. While different multicast protocols in all layers, such as routing and switching, have been created by researchers and providers, through several years, to focus on security, congestion control, and scalability, our work aims to scale multicast regarding the number of supported multicast groups and sources in networks and multicast session. In this paper, we propose an SDN-based IP multicast tree construction module to support and deploy multicast communication-based services. To do so, we take advantage to compute multicast tree, in the centralized way, to achieve a dynamic tree construction algorithm that helps SDN controller to dynamically construct and adjust an optimal multicast tree in all multicast session. The experiments studies on the prototype and simulation system exhibit that our solution gives better performance contrasted with the traditional multicast tree construction algorithms, better also to SDN-based solution proposed in the literature, regarding multicast tree cost, delay, delay variation, and multicast tree construction delay. {\textcopyright} Springer Nature Switzerland AG 2020.}, keywords = {Database synchronization, Forestry, Internet protocols, Internet services providers, Multicast communication, Multicast protocol, Multicast sessions, Multicast software, Multicast tree construction, Multicasting, Network security, Overlay networks, Simulation systems, Software defined networking, Trees (mathematics), Ubiquitous computing}, doi = {10.1007/978-3-030-58008-7_20}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096412695\&doi=10.1007\%2f978-3-030-58008-7_20\&partnerID=40\&md5=f5004a1fb0f79381fe80ca313ad89b13}, author = {Baddi, Y. and Sebbar, A. and Zkik, K. and Boulmalf, M. and El Kettani, M.D.E.-C.} } @article {Filali2020197017, title = {Multi-access edge computing: A survey}, journal = {IEEE Access}, volume = {8}, year = {2020}, note = {cited By 49}, pages = {197017-197046}, abstract = {Multi-access Edge Computing (MEC) is a key solution that enables operators to open their networks to new services and IT ecosystems to leverage edge-cloud benefits in their networks and systems. Located in close proximity from the end users and connected devices, MEC provides extremely low latency and high bandwidth while always enabling applications to leverage cloud capabilities as necessary. In this article, we illustrate the integration of MEC into a current mobile networks{\textquoteright} architecture as well as the transition mechanisms to migrate into a standard 5G network architecture.We also discuss SDN, NFV, SFC and network slicing as MEC enablers. Then, we provide a state-of-the-art study on the different approaches that optimize the MEC resources and its QoS parameters. In this regard, we classify these approaches based on the optimized resources and QoS parameters (i.e., processing, storage, memory, bandwidth, energy and latency). Finally, we propose an architectural framework for a MEC-NFV environment based on the standard SDN architecture. {\textcopyright} 2020 Institute of Electrical and Electronics Engineers Inc.. All rights reserved.}, keywords = {5G mobile communication systems, Architectural frameworks, Bandwidth, Close proximity, Edge computing, Network function virtualization, Network slicing, Networks and systems, Optimized resources, QoS parameters, State of the art, Transition mechanism}, doi = {10.1109/ACCESS.2020.3034136}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85099901543\&doi=10.1109\%2fACCESS.2020.3034136\&partnerID=40\&md5=bc99db081ebbbf5eb6d188c020bb33a2}, author = {Filali, A. and Abouaomar, A. and Cherkaoui, S. and Kobbane, A. and Guizani, M.} } @article {Bourekkache2020255, title = {Multi-agent approach for collaborative authoring and indexing of pedagogical materials}, journal = {International Journal of Continuing Engineering Education and Life-Long Learning}, volume = {30}, number = {3}, year = {2020}, note = {cited By 1}, pages = {255-275}, abstract = {In e-learning environment, the learner may feel that he is isolated and disoriented because of the absence of the teacher and the huge number of materials. Moreover, the pedagogical documents have several characteristics so that we must offer the appropriate documents for each learner according to his level, characteristics, and preferences{\textellipsis}, etc. Consequently, the adaption of the learning content is an important technique. Creating materials, without additional information, makes the delivering of relevant material an impossible task. Consequently, one has to pay attention to the stage of creating of learning content using new technics. In addition, it may not be convenient if we haven{\textquoteright}t additional information about the learner and the learning material (learning objective, prerequisites, and learner background{\textellipsis}, etc.). Therefore, we develop a multi-agent system that supports a set of authors who create and index educational materials. The indexes are used to manipulate the learning content efficiently by the machine when choosing the appropriate content to satisfy the needs of heterogeneous learners. Copyright {\textcopyright} 2020 Inderscience Enterprises Ltd.}, keywords = {Collaborative authoring, Computer aided instruction, E-learning environment, Educational materials, Learning contents, Learning materials, Learning objectives, Multi agent systems, Multi-agent approach}, doi = {10.1504/IJCEELL.2020.108527}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85093856724\&doi=10.1504\%2fIJCEELL.2020.108527\&partnerID=40\&md5=5cd4fb75d55b6654a672036b17252936}, author = {Bourekkache, S. and Kazar, O. and Abik, M.} } @article {Kharbouch202086, title = {MyContraception: An Evidence-Based Contraception mPHR for Better Contraceptive Fit}, journal = {Advances in Intelligent Systems and Computing}, volume = {1161 AISC}, year = {2020}, note = {cited By 1}, pages = {86-94}, abstract = {The fulfillment of unmet needs for contraception can help women reach their reproductive goals. It was proven to have a significant impact on reducing the rates of unintended pregnancies, and thereby cut the number of morbidity and mortality resulting from these pregnancies, and improving the lives of women and children in general. Therefore, there is a growing concern worldwide about contraception and women{\textquoteright}s knowledge of making an advised-choice about it. In this aspect, an outgrown number of apps are now available providing clinical resources, digital guides, or educational information concerning contraception whether it concerns natural contraception or modern contraception. However, vast amounts of these apps contain inaccurate sexual health facts and non-evidence based information concerning contraception. On these bases, and in respect to the needs of women to effectively prevent unintended pregnancies while conducting a stress-free healthy lifestyle, the World Health Organization (WHO) Medical Eligibility Criteria (MEC) for contraception{\textquoteright}s recommendations, and the results and recommendations of a field study conducted in the reproductive health center Les Oranges in Rabat to collect the app{\textquoteright}s requirements, we developed an Android app named {\textquoteleft}MyContraception{\textquoteright}. Our solution is an evidence-based patient-centered contraceptive app that has been developed in an attempt to facilitate: (1) Seeking evidence-based information along with recommendations concerning the best contraceptive fit (according to one{\textquoteright}s medical characteristics, preferences and priorities) helping users make informed decisions about their contraceptive choices. (2) Monitoring one{\textquoteright}s own menstrual cycle, fertility window, contraceptive methods usage, and the correlation between these different elements and everyday symptoms in one app. (3) Keeping record of one{\textquoteright}s family medical history, medical appointments, analyses, diagnoses, procedures and notes within the same app. In future work, conducting an empirical evaluation of MyContraception solution is intended, to exhaustively examine the effects of this solution in improving the quality of patient-centered contraception care. {\textcopyright} 2020, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG.}, keywords = {Clinical resources, Diagnosis, Eligibility criterion, Empirical evaluations, Healthy lifestyles, Information concerning, Information systems, Information use, Informed decision, Obstetrics, reproductive health, World Health Organization}, doi = {10.1007/978-3-030-45697-9_9}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085491736\&doi=10.1007\%2f978-3-030-45697-9_9\&partnerID=40\&md5=18f9987c1855619561fe9cc080957ade}, author = {Kharbouch, M. and Idri, A. and Rachad, T. and Alami, H. and Redman, L. and Stelate, Y.} } @conference {Amine2020, title = {New Network Slicing Scheme for UE Association Solution in 5G Ultra Dense HetNets}, booktitle = {IEEE International Conference on Communications}, volume = {2020-June}, year = {2020}, note = {cited By 5}, abstract = {Network slicing (NS) will have an essential role to enhance the isolation and the flexibility of the future generation of cellular networks (5G) with heterogeneous capabilities, notably in ultra-dense (UD) urban zones. Thus, it may be the principal component necessary to respond to 5G UD heterogeneous networks (UD-HetNets) technical requirements. The aim of this paper is to propose a new NS architecture to resolve user equipment (UE)-association problem in 5G UD-HetNets. Accordingly, we formulated the problem as a one-to-many matching game based on matching theory, while exploiting the isolation character of slicing to eliminate interferences between pico-cells and those among macro-cell and pico-cells. Next, we proposed the UE-slice association algorithm (U-S.AA) to find the stable matching among user equipments (UEs) and different network slices. Numerical simulation results validate our theoretical model, and prove the efficient of the proposed user-slice association solution to enhance the global network performance, respecting the UEs quality of service (QoS), as well as improving the energy efficiency (EE) of UEs. {\textcopyright} 2020 IEEE.}, keywords = {5G mobile communication systems, Association algorithms, Cellular network, energy efficiency, Future generations, Heterogeneous networks, Matching theory, Network performance, Principal Components, Stable matching, Technical requirement, Theoretical modeling}, doi = {10.1109/ICC40277.2020.9148844}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089429385\&doi=10.1109\%2fICC40277.2020.9148844\&partnerID=40\&md5=1c1af15932312ae46b6294cfb76fd07d}, author = {Amine, M. and Kobbane, A. and Ben-Othman, J.} } @article {Bouanani2020145037, title = {New Tight Bounds for the Gaussian Q-Function and Applications}, journal = {IEEE Access}, volume = {8}, year = {2020}, note = {cited By 7}, pages = {145037-145055}, abstract = {The Gaussian Q-function (GQF) and its integer powers are quite versatile in various fields of science. In most applications, it is involved in intractable integrals for which closed-form expressions cannot be evaluated. In this paper, six new bounds for the GQF are presented and their tightness and simplicity are discussed compared to existing ones. As an application, these bounds can be efficiently used to evaluate in closed-form upper bounds for the average symbol error rate for various modulation schemes, in the presence of a generalized fading channel whose probability density function can be written as a summation of a particular Bivariate Fox{\textquoteright}s H-functions. α-μ, κ-μ shadowed, and M{\'a}laga distribution models have been considered as particular cases of such distribution. To gain more insight into the system reliability, asymptotic closed-form expressions for the system{\textquoteright}s ASER over the above fading models are further derived and interesting discussions on the key fading parameters{\textquoteright} impact are made. Numerical results and simulations reveal the tightness of the proposed bounds compared to previous ones, while they keep almost the same complexity. {\textcopyright} 2013 IEEE.}, keywords = {Average symbol error rate (SER), Closed-form expression, Distribution models, Fading channels, Fading parameters, Gaussian Q-function, Generalized fading channels, Modulation schemes, Probability density function, System reliability}, doi = {10.1109/ACCESS.2020.3015344}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85091875934\&doi=10.1109\%2fACCESS.2020.3015344\&partnerID=40\&md5=058cefb2e71342d56d628e22937a3318}, author = {Bouanani, F.E. and Mouchtak, Y. and Karagiannidis, G.K.} } @article {BOULMRHARJ2020101518, title = {Online battery state-of-charge estimation methods in micro-grid systems}, journal = {Journal of Energy Storage}, volume = {30}, year = {2020}, pages = {101518}, abstract = {Batteries have shown great potential for being integrated in Micro-Grid (MG) systems. However, their integration is not a trivial task and, therefore, requires extensive modeling and simulations in order to efficiently estimating their State-of-Charge (SoC) within MG systems. The work presented in this article focuses mainly on battery modeling for SoC estimation. We put more emphasize on battery system{\textquoteright}s characterization, modeling, SoC estimation and its integration into MG systems in order to study its performance. In fact, an instrumentation platform, composed of recent and low cost sensing and actuating equipment, is developed in order to identify the battery{\textquoteright}s parameters and then build the battery model. The simulation results show good agreement with the experimental results, and thus the battery model is validated in both charging and discharging processes. Then, the battery{\textquoteright}s SoC estimation in both charging and discharging processes is investigated by means of sophisticated methods, such as, Artificial Neural Network, Luenberger observer and Kalman Filter combined with Coulomb counting. The results of these methods are reported and compared to the SoC estimated using the Coulomb counting method in order to end up with the precise method. The modeled battery is afterwards integrated into an MG system, which is deployed into our EEBLab (Energy Efficient Building Laboratory) test-site, for simulation and experimental investigations. Finally, the four algorithms for SoC estimation are included into the instrumentation platform, which is connected to a Lead-acid battery already integrated into the MG system, in order to show and compare their performances and accuracy for online battery{\textquoteright}s SoC estimation.}, keywords = {Battery characterization, Battery modeling, MG systems, Online SOC estimation, Parameters identification, Performance assessment}, issn = {2352-152X}, doi = {https://doi.org/10.1016/j.est.2020.101518}, url = {https://www.sciencedirect.com/science/article/pii/S2352152X20303984}, author = {Sofia Boulmrharj and Radouane Ouladsine and Youssef NaitMalek and Mohamed Bakhouya and Khalid Zine-dine and Mohammed Khaidar and Mustapha Siniti} } @article {Boulmrharj2020, title = {Online battery state-of-charge estimation methods in micro-grid systems}, journal = {Journal of Energy Storage}, volume = {30}, year = {2020}, note = {cited By 30}, abstract = {Batteries have shown great potential for being integrated in Micro-Grid (MG) systems. However, their integration is not a trivial task and, therefore, requires extensive modeling and simulations in order to efficiently estimating their State-of-Charge (SoC) within MG systems. The work presented in this article focuses mainly on battery modeling for SoC estimation. We put more emphasize on battery system{\textquoteright}s characterization, modeling, SoC estimation and its integration into MG systems in order to study its performance. In fact, an instrumentation platform, composed of recent and low cost sensing and actuating equipment, is developed in order to identify the battery{\textquoteright}s parameters and then build the battery model. The simulation results show good agreement with the experimental results, and thus the battery model is validated in both charging and discharging processes. Then, the battery{\textquoteright}s SoC estimation in both charging and discharging processes is investigated by means of sophisticated methods, such as, Artificial Neural Network, Luenberger observer and Kalman Filter combined with Coulomb counting. The results of these methods are reported and compared to the SoC estimated using the Coulomb counting method in order to end up with the precise method. The modeled battery is afterwards integrated into an MG system, which is deployed into our EEBLab (Energy Efficient Building Laboratory) test-site, for simulation and experimental investigations. Finally, the four algorithms for SoC estimation are included into the instrumentation platform, which is connected to a Lead-acid battery already integrated into the MG system, in order to show and compare their performances and accuracy for online battery{\textquoteright}s SoC estimation. {\textcopyright} 2020 Elsevier Ltd}, keywords = {Battery management systems, Battery state of charge, Charging (batteries), Coulomb counting method, Discharging process, energy efficiency, Energy efficient building, Experimental investigations, Intelligent buildings, Lead acid batteries, Luenberger observers, Model and simulation, Neural networks, Online systems, Sensing and actuating}, doi = {10.1016/j.est.2020.101518}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085273724\&doi=10.1016\%2fj.est.2020.101518\&partnerID=40\&md5=f5d31d6e8a0f90e2bec4e1dd9d7da9d8}, author = {Boulmrharj, S. and Ouladsine, R. and NaitMalek, Y. and Bakhouya, M. and Zine-Dine, K. and Khaidar, M. and Siniti, M.} } @article {Koulou2020, title = {Optimization in collaborative information systems for an enhanced interoperability network}, journal = {International Journal for Simulation and Multidisciplinary Design Optimization}, volume = {11}, year = {2020}, note = {cited By 2}, abstract = {Today{\textquoteright}s constraints on collaborative enterprises are often directly reflected in the interoperability of their information systems. The goal is to improve and effectively evolve the global interoperability of collaboration by distributing the required effort in an optimal way on different information systems to achieve the target goal. This method of enhancement will be realized by applying an IMA (Interoperability Measurement Approach) to generate a ratio representing the degree of interoperability of an information system within the collaboration, as well as applying the heuristic optimization method PPSO (Paralleled Particle Swarm Optimization) to reach the optimal distribution of effort. {\textcopyright} A. Koulou et al.}, keywords = {Collaborative enterprise, Collaborative information systems, Heuristic methods, Heuristic optimization method, Information systems, Information use, interoperability, Optimal distributions, Particle swarm optimization (PSO)}, doi = {10.1051/smdo/2019021}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085511318\&doi=10.1051\%2fsmdo\%2f2019021\&partnerID=40\&md5=e1f020778ecbcca1fde01bc7eee029d3}, author = {Koulou, A. and Zemzami, M. and El Hami, N. and Elmir, A. and Hmina, N.} } @article {ElMahdi2020, title = {Optimized Scheme to Secure IoT Systems Based on Sharing Secret in Multipath Protocol}, journal = {Wireless Communications and Mobile Computing}, volume = {2020}, year = {2020}, note = {cited By 1}, abstract = {Internet of Things (IoT) is a hot and emerging topic nowadays. In the world of today, all kinds of devices are supposed to be connected and all types of information are exchanged. This makes human daily life easier and much more intelligent than before. However, this life mode is vulnerable to several security threats. In fact, the mobile networks, by nature, are more exposed to malicious attacks that may read confidential information and modify or even drop important data. This risk should be taken in consideration prior to any construction of mobile networks especially in the coming 5G technology. The present paper aims to provide a contribution in securing such kinds of environment by proposing a new protocol that can be implemented in ad hoc networks. {\textcopyright} 2020 Fatna El Mahdi et al.}, keywords = {5G mobile communication systems, ad hoc networks, Confidential information, Daily lives, Emerging topics, Internet of things, Internet of Things (IOT), Malicious attack, Mobile security, Mobile telecommunication systems, Multipath protocols, Network security, New protocol, Security threats}, doi = {10.1155/2020/1468976}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85083513010\&doi=10.1155\%2f2020\%2f1468976\&partnerID=40\&md5=a7326029a67a6d4fc68c90a958148708}, author = {El Mahdi, F. and Habbani, A. and Kartit, Z. and Bouamoud, B.} } @article {Elkhoukhi2020, title = {A platform architecture for occupancy detection using stream processing and machine learning approaches}, journal = {Concurrency and Computation: Practice and Experience}, volume = {32}, number = {17}, year = {2020}, note = {cited By 15}, abstract = {Context-awareness in energy-efficient buildings has been considered as a crucial fact for developing context-driven control approaches in which sensing and actuation tasks are performed according to the contextual changes. This could be done by including the presence of occupants, number, actions, and behaviors in up-to-date context, taking into account the complex interlinked elements, situations, processes, and their dynamics. However, many studies have shown that occupancy information is a major leading source of uncertainty when developing control approaches. Comprehensive and real-time fine-grained occupancy information has to be, therefore, integrated in order to improve the performance of occupancy-driven control approaches. The work presented in this paper is toward the development of a holistic platform that combines recent IoT and Big Data technologies for real-time occupancy detection in smart building. The purpose of this work focuses mainly on the presence of occupants by comparing both static and dynamic machine learning techniques. An open-access occupancy detection dataset was first used to assess the usefulness of the platform and the effectiveness of static machine learning strategies for data processing. This dataset is used for applications that follow the strategy aiming at storing data first and processing it later. However, many smart buildings{\textquoteright} applications, such as HVAC and ventilation control, require online data streams processing. Therefore, a distributed real-time machine learning framework was integrated into the platform and tested to show its effectiveness for this kind of applications. Experiments have been conducted for ventilation systems in energy-efficient building laboratory (EEBLab) and preliminary results show the effectiveness of this platform in detecting on-the-fly presence of occupants, which is required to either make ON or OFF the system and then activate the corresponding embedded control technique (eg, ON/OFF, PID, state-feedback). {\textcopyright} 2019 John Wiley \& Sons, Ltd.}, keywords = {Context- awareness, Data streams, Embedded systems, energy efficiency, Energy efficient building, Intelligent buildings, Internet of things, Learning systems, Machine learning, Machine learning approaches, Machine learning techniques, Occupancy detections, Platform architecture, Real-time data processing, State feedback, Ventilation, Ventilation control}, doi = {10.1002/cpe.5651}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85076920865\&doi=10.1002\%2fcpe.5651\&partnerID=40\&md5=f34bbe0cd8dadd04282227e1a5698c57}, author = {Elkhoukhi, H. and NaitMalek, Y. and Bakhouya, M. and Berouine, A. and Kharbouch, A. and Lachhab, F. and Hanifi, M. and El Ouadghiri, D. and Essaaidi, M.} } @conference {Jeddi20205531, title = {Practical Acoustic Energy-Based Estimation of Inhalation Flow Rate for Asthma Monitoring}, booktitle = {Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS}, volume = {2020-July}, year = {2020}, note = {cited By 1}, pages = {5531-5536}, abstract = {The estimation of inhalation flow rate (IFR) using acoustic devices has recently received attention. While existing work often assumes that the microphone is placed at a fixed distance from the acoustic device, this assumption does not hold in real settings. This leads to poor estimation of the IFR since the received acoustic energy varies significantly with the distance. Despite the fact that the acoustic source is passive and only one microphone is used, we show in this paper that the distance can be estimated by exploiting the inhaler actuation sound, generated when releasing the medication. Indeed, this sound is used as a reference acoustic signal which is leveraged to estimate the distance in real settings. The resulting IFR estimation is shown to be highly accurate (R2 = 80.3\%). {\textcopyright} 2020 IEEE.}, keywords = {Acoustic devices, Acoustic energy, Acoustic signals, Acoustic sources, Highly accurate, Microphones}, doi = {10.1109/EMBC44109.2020.9175314}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85091027116\&doi=10.1109\%2fEMBC44109.2020.9175314\&partnerID=40\&md5=33b9d02826be90a4bdc1aae587e1a8e3}, author = {Jeddi, Z. and Ghogho, M. and Bohr, A. and Boetker, J. and Li, Y. and Kassou, I.} } @article {Filali202015947, title = {Preemptive SDN Load Balancing with Machine Learning for Delay Sensitive Applications}, journal = {IEEE Transactions on Vehicular Technology}, volume = {69}, number = {12}, year = {2020}, note = {cited By 12}, pages = {15947-15963}, abstract = {SDN is a key-enabler to achieve scalability in 5G and Multi-access Edge Computing networks. To balance the load between distributed SDN controllers, the migration of the data plane components has been proposed. Different from most previous works which use reactive mechanisms, we propose to preemptively balance the load in the SDN control plane to support network flows that require low latency communications. First, we forecast the load of SDN controllers to prevent load imbalances and schedule data plane migrations in advance. Second, we optimize the migration operations to achieve better load balancing under delay constraints. Specifically, in the first step, we construct two prediction models based on Auto Regressive Integrated Moving Average (ARIMA) and Long Short-Term Memory (LSTM) approaches to forecast SDN controllers load. Then, we conduct a comparative study between these two models and calculate their accuracies and forecast errors. The results show that, in long-term predictions, the accuracy of LSTM model outperforms that of ARIMA by 55\% in terms of prediction errors. In the second step, to select which data plane components to migrate and where the migration should happen under delay constraints, we formulate the problem as a non-linear binary program, prove its NP-completeness and propose a reinforcement learning algorithm to solve it. The simulations show that the proposed algorithm performs close to optimal and outperforms recent benchmark algorithms from the literature. {\textcopyright} 1967-2012 IEEE.}, keywords = {5G mobile communication systems, Auto-regressive integrated moving average, Autoregressive moving average model, Balancing, Comparative studies, Controllers, Delay constraints, Delay-sensitive applications, Forecasting, Learning algorithms, Long short-term memory, Long-term prediction, Low-latency communication, Prediction errors, Predictive analytics, Reactive mechanism, Reinforcement learning}, doi = {10.1109/TVT.2020.3038918}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097173809\&doi=10.1109\%2fTVT.2020.3038918\&partnerID=40\&md5=4dc77968a74ba95fb61deec16c598fbb}, author = {Filali, A. and Mlika, Z. and Cherkaoui, S. and Kobbane, A.} } @conference {Ben-Aboud20201324, title = {A research-oriented low-cost air pollution monitoring IoT platform}, booktitle = {2020 International Wireless Communications and Mobile Computing, IWCMC 2020}, year = {2020}, note = {cited By 1}, pages = {1324-1329}, abstract = {This paper presents an IoT platform designed for air pollution monitoring. It aiming to facilitate the testing of different data collection strategies, to simplify the air quality monitoring process, to provide the citizens with real-time information about air pollution, to allow citizens to participate in the air quality monitoring process, and to help the authorities identify zones of high air pollution and take the most appropriate measures to improve air quality. The sensor nodes have been developed using low-cost off-the-shelf hardware. Both nomadic and mobile sensor nodes have been developed. A novel sensor management middleware has been designed and developed to have the flexibility to remotely control the operational settings of the sensor nodes and to reduce the volume of transmitted data. Finally, two applications have been developed and implemented for data visualization. The first is a mobile friendly air pollution meter. The second offers a spatial visualization of air pollution levels using a Geographic Information System (GIS). The developed platform has been tested in multiple measurement campaigns. The results of one of these campaigns (conducted in Hay Nahda II, Rabat, Morocco) is presented in this paper to showcase the platform. {\textcopyright} 2020 IEEE.}, keywords = {Air pollution monitoring, Air quality, Air quality monitoring, Costs, Data collection strategies, Data visualization, Information use, Internet of things, Middleware, Mobile computing, Mobile sensor node, Multiple measurements, Off-the-shelf hardwares, Pollution detection, Real-time information, Sensor nodes, Spatial visualization, Visualization}, doi = {10.1109/IWCMC48107.2020.9148176}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089690465\&doi=10.1109\%2fIWCMC48107.2020.9148176\&partnerID=40\&md5=6b9c355d625a664f7d5ac062470cf5f0}, author = {Ben-Aboud, Y. and Ghogho, M. and Kobbane, A.} } @article {Katkout2020, title = {Robust Multiobjective Model Predictive Control with Computation Delay Compensation for Electric Vehicle Applications Using PMSM with Multilevel Inverter}, journal = {Mathematical Problems in Engineering}, volume = {2020}, year = {2020}, note = {cited By 2}, abstract = {The Three-Level Neutral-Point-Clamped (3L-NPC) inverter fed Permanent Magnet Synchronous Motor (PMSM) drive is an attractive configuration for high performance Electric Vehicle (EV) applications. For such configuration, due to their high performances, the Finite-Control-Set Model Predictive Control (FCS-MPC) is a very attractive control solution. The FCS-MPC scheme is based on the prediction of the future behavior of the controlled variables using the dynamic model of PMSM and the discrete nature of the 3L-NPC inverter. However, the parametric uncertainties and time-varying parameters affect the FCS-MPC algorithm performances. In this paper, robust FCS-MPC controls based on "dynamic error correction" (DEC) and "modified revised prediction" (MRP) are proposed to improve the FCS-MPC robustness without affecting the controller performances and complexity. The proposed strategies are improved also by multiobjective (MO) algorithm optimization and computation delay compensation. The simulation results included prove the performance in robustness and efficiency of the proposed robust FCS-MPC-DEC. {\textcopyright} 2020 Abdiddaim Katkout et al.}, keywords = {Algorithm optimization, Controller performance, Electric inverters, Electric vehicles, Error correction, High performance electric vehicles, Model predictive control, Multi-objective modeling, Parametric uncertainties, Permanent magnet synchronous motor drives, Permanent magnets, Predictive control systems, Robustness (control systems), Synchronous motors, Three-level neutral point clamped, Time varying parameter}, doi = {10.1155/2020/7015865}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085550129\&doi=10.1155\%2f2020\%2f7015865\&partnerID=40\&md5=a8af2bbc90a7acb6f7216d05eda69e31}, author = {Katkout, A. and Nasser, T. and Essadki, A.} } @article {Sayagh2020646, title = {Software Configuration Engineering in Practice Interviews, Survey, and Systematic Literature Review}, journal = {IEEE Transactions on Software Engineering}, volume = {46}, number = {6}, year = {2020}, note = {cited By 12}, pages = {646-673}, abstract = {Modern software applications are adapted to different situations (e.g., memory limits, enabling/disabling features, database credentials) by changing the values of configuration options, without any source code modifications. According to several studies, this flexibility is expensive as configuration failures represent one of the most common types of software failures. They are also hard to debug and resolve as they require a lot of effort to detect which options are misconfigured among a large number of configuration options and values, while comprehension of the code also is hampered by sprinkling conditional checks of the values of configuration options. Although researchers have proposed various approaches to help debug or prevent configuration failures, especially from the end users{\textquoteright} perspective, this paper takes a step back to understand the process required by practitioners to engineer the run-time configuration options in their source code, the challenges they experience as well as best practices that they have or could adopt. By interviewing 14 software engineering experts, followed by a large survey on 229 Java software engineers, we identified 9 major activities related to configuration engineering, 22 challenges faced by developers, and 24 expert recommendations to improve software configuration quality. We complemented this study by a systematic literature review to enrich the experts{\textquoteright} recommendations, and to identify possible solutions discussed and evaluated by the research community for the developers{\textquoteright} problems and challenges. We find that developers face a variety of challenges for all nine configuration engineering activities, starting from the creation of options, which generally is not planned beforehand and increases the complexity of a software system, to the non-trivial comprehension and debugging of configurations, and ending with the risky maintenance of configuration options, since developers avoid touching and changing configuration options in a mature system. We also find that researchers thus far focus primarily on testing and debugging configuration failures, leaving a large range of opportunities for future work. {\textcopyright} 1976-2012 IEEE.}, keywords = {Application programs, Bibliographies, Codes (symbols), Errors, Facebook, Interviews, Program debugging, Software algorithms, Software systems, Surveys, Systematics}, doi = {10.1109/TSE.2018.2867847}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85052624554\&doi=10.1109\%2fTSE.2018.2867847\&partnerID=40\&md5=f1b2d51b59522e24e5c52f064a62d00b}, author = {Sayagh, M. and Kerzazi, N. and Adams, B. and Petrillo, F.} } @article {Kharbouch2020894, title = {Software Requirement Catalog on Acceptability, Usability, Internationalization and Sustainability for Contraception mPHRs}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {12252 LNCS}, year = {2020}, note = {cited By 0}, pages = {894-905}, abstract = {Contraception Mobile Personal Health Records (mPHRs) are efficient mobile health applications (apps) to increase awareness about fertility and contraception and to allow women to access, track, manage, and share their health data with healthcare providers. This paper aims to develop a requirements catalog, according to standards, guidelines, and relevant literature to e-health technology and psychology. The requirements covered by this catalog are Acceptability, Usability, Sustainability, and Internationalization (i18n). This catalog can be very useful for developing, evaluating, and auditing contraceptive apps, as well as helping stakeholders and developers identify potential requirements for their mPHRs to improve them. {\textcopyright} 2020, Springer Nature Switzerland AG.}, keywords = {Health, Health care providers, Health data, Mobile health application, Personal health record, Software requirements, Sustainable development}, doi = {10.1007/978-3-030-58811-3_63}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85092222585\&doi=10.1007\%2f978-3-030-58811-3_63\&partnerID=40\&md5=119f051c4582d8079abdb813399d89d1}, author = {Kharbouch, M. and Idri, A. and Redman, L. and Alami, H. and Fernandez-Aleman, J.L. and Toval, A.} } @conference {ElIdrissi2020337, title = {Strategies of multi-step-ahead forecasting for blood glucose level using LSTM neural networks: A comparative study}, booktitle = {HEALTHINF 2020 - 13th International Conference on Health Informatics, Proceedings; Part of 13th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2020}, year = {2020}, note = {cited By 3}, pages = {337-344}, abstract = {Predicting the blood glucose level (BGL) is crucial for self-management of Diabetes. In general, a BGL prediction is done based on the previous measurements of BGL, which can be taken either (manually) by using sticks or (automatically) by using continuous glucose monitoring (CGM) devices. To allow the diabetic patients to take appropriate actions, the BGL predictions should be done ahead of time; thus a multi-step ahead prediction is suitable. Therefore, many Multi-Step-ahead Forecasting (MSF) strategies have been developed and evaluated, and can be categorized in five types: Recursive, Direct, MIMO (for Multiple Input Multiple Output), DirMO (combining Direct and MIMO) and DirRec (combining Direct and Recursive). However, none of them is known to be the best strategy in all contexts. The present study aims at: 1) reviewing the MSF strategies, and 2) determining the best strategy to fit with a LSTM Neural Network model. Hence, we evaluated and compared in terms of two performance criteria: Root-Mean-Square Error (RMSE) and Mean Absolute Error (MAE), the five MSF strategies using a LSTM Neural Network with an horizon of 30 minutes. The results show that there is no strategy that significantly outperformed others when using the Wilcoxon statistical test. However, when using the Sum Ranking Differences method, MIMO is the best strategy for both RMSE and MAE criteria. {\textcopyright} 2020 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.}, keywords = {Biomedical engineering, Blood, Blood glucose level, Comparative studies, Continuous glucosemonitoring (CGM), Forecasting, Glucose, Long short-term memory, Mean absolute error, Mean square error, Medical informatics, MIMO systems, Multi-step-ahead predictions, Neural network model, Performance criterion, Root mean square errors}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85083722214\&partnerID=40\&md5=bd9e45a8538559492b02432e5567d10e}, author = {El Idrissi, T. and Idri, A. and Kadi, I. and Bakkoury, Z.} } @article {Kerzazi2020472, title = {Teaching Pedigree Analysis and Risk Calculation for Diagnosis Purposes of Genetic Disease}, journal = {Advances in Intelligent Systems and Computing}, volume = {1159 AISC}, year = {2020}, note = {cited By 0}, pages = {472-485}, abstract = {A Faculty of Medicine needs to respond appropriately to the rapid changes in medical education, to ensure that future geneticists are well trained to meet the challenges of medical practice. This paper presents five core requirements for a tool integrating new methodologies for teaching graduate-level a course of medical genetics. Our methodology presented here focuses on exploiting pedigree analysis in the field of medical genetics, particularly to explore them in the diagnosis of genetic diseases. Because of its important relevance as one of the skills that future medical practitioners must have, we designed this approach as a learning process supported by a tool. We also discuss an ongoing supported effort at utilizing common tools and IT resources to make it easier for the learners to reach their expected skill levels and provide them with a rich learning experience. We find that not only do our tool prototype has a positive impact on the learning process, practitioners also have expectations to feed a bio-bank of medical cases as inputs for future empirical studies. {\textcopyright} 2020, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG.}, keywords = {Chromosomes, Diagnosis, Empirical studies, Information systems, Information use, Learning process, Learning systems, Medical education, Medical genetics, Medical practice, Medical practitioner, Pathology, Pedigree analysis, Rich learning experiences, Risk analysis, Risk assessment, Risk calculation}, doi = {10.1007/978-3-030-45688-7_48}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085529134\&doi=10.1007\%2f978-3-030-45688-7_48\&partnerID=40\&md5=7e1e7a85185ad292f5e21b992eefe113}, author = {Kerzazi, N. and Tajir, M. and Boulouiz, R. and Bellaoui, M. and Azizi, M.} } @article {Korachi20201451, title = {Towards a Frame of Reference for Smart City Strategy Development and Governance}, journal = {Journal of Computer Science}, volume = {16}, number = {10}, year = {2020}, note = {cited By 6}, pages = {1451-1464}, abstract = {Despite the importance of the smart city concept, few works address how to define and implement smart cities in a clear manner. Furthermore, the smart city literature provides heterogeneous studies and solutions; this heterogeneity creates misunderstanding regarding the smart city definition and strategy. Moreover, stakeholders have multiple and conflicting interests and concerns, which also increase the ambiguity regarding the smart city concept and approach. To meet this challenge and fill this gap, a smart city frame of reference is needed to frame and guide smart city strategy formulation and implementation. In this perspective, the current research conducts a quantitative analysis of various smart city frameworks and strategies, in order to find and demonstrate the common building blocks of a smart city framework. Based on the quantitative analysis, this work proposes a clear and integrative smart city framework. This framework aims to reduce the misunderstanding and ambiguity regarding smart city definitions and strategies by providing a standard smart city approach that fits all smart city contexts. To this effect, the proposed framework considers all smart city concerns and it is composed of the following blocks: Strategic awareness, business strategic planning, IT investment decisions, IT organizational structure, steering committee, IT prioritization process, IT strategic planning, IT budgeting, marketing plan, IT reaction capacity, IT reporting and management strategy. {\textcopyright} 2020 {\textcopyright} 2020 Zineb Korachi and Bouchaib Bounabat. This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license.}, doi = {10.3844/jcssp.2020.1451.1464}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096687902\&doi=10.3844\%2fjcssp.2020.1451.1464\&partnerID=40\&md5=1a2829e1b8a6f1c4649b6a4f071f30b9}, author = {Korachi, Z. and Bounabat, B.} } @article {Korachi2020456, title = {Towards a Maturity Model for Digital Strategy Assessment}, journal = {Advances in Intelligent Systems and Computing}, volume = {1105 AISC}, year = {2020}, note = {cited By 7}, pages = {456-470}, abstract = {Information Technologies (ITs) lead to creativity and innovation in education, business, and management. Creativity and innovation improve the growth and profitability of organizations and the quality of their products and services. Many of today{\textquoteright}s social, business, economic and political problems can be solved using ITs. To take advantage of the digital revolution, there is a need for having a digital strategy and evaluation system of the digital transformation. Many works show that the strategic alignment between business and ITs is the key element for successful digital projects. This work presents a Maturity Model for Digital Strategy Assessment (MMDSA). MMDSA has been introduced as a guide and reference framework for digital transformation management within different industries and sectors. Its objective is to master and improve digital transformation processes and consequently to control the quality of the products and services resulting from these processes. The proposed model allows assessing IT-businesses alignment, helps organizations to determine where they stand in terms of their digital transformation and provides strategic components and guidelines to help organizations to move up from the current maturity level to the next one. The paper illustrates a software solution allowing to create customized maturity models to assess digital strategy progress and evaluate the business value of the digital transformation. {\textcopyright} 2020, Springer Nature Switzerland AG.}, keywords = {Digital strategies, Digital transformation, Growth and profitability, Innovation in educations, Intelligent systems, maturity model, planning, Products and services, Quality control, Reference frameworks, Strategic alignment, Sustainable development}, doi = {10.1007/978-3-030-36674-2_47}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85080925319\&doi=10.1007\%2f978-3-030-36674-2_47\&partnerID=40\&md5=7980842dc0e1d8c42164d36d653172cd}, author = {Korachi, Z. and Bounabat, B.} } @conference {Ouatiti20207, title = {Towards Amazon Fake Reviewers Detection: The Effect of Bulk Users}, booktitle = {ACM International Conference Proceeding Series}, year = {2020}, note = {cited By 0}, pages = {7-12}, abstract = {Online marketplaces such as Amazon allow people to share their experiences about purchased products using textual comments known as product reviews. These reviews have become a common tool that users rely on to get insights on the quality and functionality of products and services from online consumers. However, like any other online information, reviewers raise serious questions concerning the credibility and reliability, since anyone can post reviews, which might impact the reliability of the information. This paper tackles the phenomenon of Bulk reviewers. We first analyze a large dataset of reviews from Amazon aiming to spot bulk reviewers according to their behavior. We then apply a what-if analysis to assess the effect of bulk reviews on the online marketplaces using a metric called Net Promoter Score to measure the willingness of users to recommend products. Our Results reveal that bulk users (i.e., users that review multiple times) have same distribution of ratings as non-bulk users indicating that a bulk reviewer is not automatically a fake reviewer. Yet, we discover that bulk users do inflate NPS metric and thus contribute to overestimate the level of customer satisfaction. {\textcopyright} 2020 ACM.}, keywords = {Electronic assessment, Electronic commerce, Intelligent systems, Large dataset, On-line information, On-line marketplaces, Online consumers, Product reviews, Products and services, User experience, What-if Analysis}, doi = {10.1145/3419604.3419800}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096423765\&doi=10.1145\%2f3419604.3419800\&partnerID=40\&md5=1a79dcff298ad489f414ee1d7743d93c}, author = {Ouatiti, Y.E. and Kerzazi, N.} } @conference {Khannat202020, title = {Towards mining semantically enriched configurable process models}, booktitle = {ACM International Conference Proceeding Series}, year = {2020}, note = {cited By 0}, pages = {20-24}, abstract = {Providing configurable process model with high quality is a primary objective to derive process variants with better accuracy and facilitate process model reuse. For this purpose, many research works have been interested in configurable process mining techniques to discover and configure processes from event logs. Moreover, to use the knowledge captured by event logs when mining processes, the concept of semantic process mining is introduced. It allows for combining semantic technologies with process mining. Despite the diversity of works in mining and customizing configurable process models, the application of these techniques is still limited to use semantics in minimizing the complexity of discovered processes. However, it seems to be pertinent to discover semantically enriched configurable process models directly from event logs. Consequently, this can facilitate using semantic in configuring, verifying conformance or enhancing discovered configurable processes. In this paper, we present a comparative study of existing works that focus on mining configurable process models with respect to semantic technologies. Our aim is to propose a new framework to automatically discover semantically enriched configurable processes. {\textcopyright} 2020 ACM.}, keywords = {Comparative studies, Configurable process models, Data mining, Intelligent systems, Mining process, Primary objective, Process mining, Process Modeling, Process variants, Semantic technologies, Semantic Web, Semantics}, doi = {10.1145/3419604.3419797}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096408590\&doi=10.1145\%2f3419604.3419797\&partnerID=40\&md5=a77606eacf64646ccd3459e57f5cabdf}, author = {Khannat, A. and Sba{\"\i}, H. and Kjiri, L.} } @article {Boudagdigue20203667, title = {Trust Management in Industrial Internet of Things}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {15}, year = {2020}, note = {cited By 17}, pages = {3667-3682}, abstract = {Automobile manufacturers around the world are increasingly deploying Industrial Internet of Things (IIoT) devices in their factories to accompany the Industrial Revolution 4.0. Security and privacy are the main limitations to the integration of Internet of Things (IoT) into industrial processes. Therefore, it is necessary to protect industrial data contained in IIoT devices and keep them confidential. As a step towards this direction, in this paper, we propose a dynamic trust management model suitable for industrial environments. We propose also to change the traditional centralized architecture of IIoT networks in automotive plants into a hybrid architecture based on a set of new industrial relationship rules. The performance evaluation in this work is done in two parts. In the first part, we compare our proposed architecture with the traditional architecture of the plant{\textquoteright}s IIoT network. The results of this comparison show that our architecture is more suitable to simplify trust management of IIoT devices. In the second part, we demonstrated the ability, the adaptiveness and the resiliency of our proposed trust model against behavioral changes of IIoT nodes in malicious environments. {\textcopyright} 2005-2012 IEEE.}, keywords = {Automobile manufacture, Automobile manufacturers, Automotive industry, Centralized architecture, Dynamic trust managements, Industrial environments, Industrial internet of things (IIoT), Industrial relationship, Internet of Things (IOT), Network architecture, Proposed architectures, Traditional architecture, Trusted computing}, doi = {10.1109/TIFS.2020.2997179}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089186851\&doi=10.1109\%2fTIFS.2020.2997179\&partnerID=40\&md5=105acbd7042007978b04935eb0240170}, author = {Boudagdigue, C. and Benslimane, A. and Kobbane, A. and Liu, J.} } @article {Amine2020, title = {Two-sided matching framework for optimal user association in 5G multi-RAT UDNs}, journal = {International Journal of Communication Systems}, volume = {33}, number = {8}, year = {2020}, note = {cited By 2}, abstract = {Recently, academic and industrial research communities are paying more explicit attention to the 5G multiple radio access technology ultra-dense networks (5G multi-RAT UDNs) for boosting network capacity, especially in UD urban zones. To this aim, in this paper, we intend to tackle the user association problem in 5G multi-RAT UDNs. By considering the decoupled uplink/downlink access (DUDA), we divide our user association problem into two distinct subproblems representing, respectively, the uplink and the downlink channels. Next, we formulated each one as a nonlinear optimization problem with binary variables. Then, to solve them, we were restricted by the hard complexity, as well as the hard feasibility of centralized user association schemes. Thus, to resolve our user association problem in a reasonable time and distributed manner, we formulated each subproblem as a many-to-one matching game based on matching theory. Next, we provide two fully distributed association algorithms to compute the uplink and downlink stable matching among user equipments (UEs) and base stations (BSs). Simulation results corroborate our theoretical model and show the effectiveness and improvement of our achieved results in terms of the overall network performance, quality of service (QoS), and energy efficiency (EE) of UEs. {\textcopyright} 2020 John Wiley \& Sons, Ltd.}, keywords = {5G mobile communication systems, 5G multi-RAT UDNs, Association algorithms, decoupled uplink/downlink access (DUDA), energy efficiency, Game theory, Industrial research, Matching game, Matching theory, Network performance, Nonlinear programming, Optimization, Quality of service, Rats, Stable matching}, doi = {10.1002/dac.4346}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85078931379\&doi=10.1002\%2fdac.4346\&partnerID=40\&md5=159a3a40021d6b340c2873e4db73e2ac}, author = {Amine, M. and Kobbane, A. and Ben-Othman, J. and Walid, A.} } @conference {Lhazmir2020, title = {UAV for Wireless Power Transfer in IoT Networks: A GMDP approach}, booktitle = {IEEE International Conference on Communications}, volume = {2020-June}, year = {2020}, note = {cited By 3}, abstract = {Unmanned aerial vehicles (UAVs) are a promising technology employed as moving aggregators and wireless power transmitters for IoT networks. In this paper, we consider an UAV-IoT wireless energy and data transmission system and the decision-making problem is investigated. We aim at optimizing the nodes{\textquoteright} utilities by defining a good packet delivery and energy transfer policy according to the system state. We formulate the problem as a Markov Decision Process (MDP) to tackle the successive decision issues. As the MDP formalism achieves its limits when the neighbors{\textquoteright} interactions are considered, we formulate the problem as a Graph-based MDP (GMDP). We then propose a Mean-Field Approximation (MFA) algorithm to find a solution. The simulation results show that our framework achieves a good analysis of the system behavior. {\textcopyright} 2020 IEEE.}, keywords = {Antennas, Approximation algorithms, Behavioral research, Decision making, Decision-making problem, Energy transfer, Graphic methods, Inductive power transmission, Internet of things, Markov Decision Processes, Markov processes, Mean field approximation, Packet Delivery, System behaviors, System state, Unmanned aerial vehicles (UAV), Wireless energy, Wireless power}, doi = {10.1109/ICC40277.2020.9148956}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089418365\&doi=10.1109\%2fICC40277.2020.9148956\&partnerID=40\&md5=a3d1ed58b9a7436f2191be8372102f51}, author = {Lhazmir, S. and Oualhaj, O.A. and Kobbane, A. and Amlioud, E.M. and Ben-Othman, J.} } @article {Sayagh20201259, title = {What should your run-time configuration framework do to help developers?}, journal = {Empirical Software Engineering}, volume = {25}, number = {2}, year = {2020}, note = {cited By 2}, pages = {1259-1293}, abstract = {The users or deployment engineers of a software system can adapt such a system to a wide range of deployment and usage scenarios by changing the value of configuration options, for example by disabling unnecessary features, tweaking performance-related parameters or specifying GUI preferences. However, the literature agrees that the flexibility of such options comes at a price: misconfigured options can lead a software system to crash in the production environment, while even in the absence of such configuration errors, a large number of configuration options makes a software system more complicated to deploy and use. In earlier work, we also found that developers who intend to make their application configurable face 22 challenges that impact their configuration engineering activities, ranging from technical to management-related or even inherent to the domain of configuration engineering. In this paper, we use a prototyping approach to derive and empirically evaluate requirements for tool support able to deal with 13 (primarily technical) configuration engineering challenges. In particular, via a set of interviews with domain experts, we identify four requirements by soliciting feedback on an incrementally evolving prototype. The resulting {\textquotedblleft}Config2Code{\textquotedblright} prototype, which implements the four requirements, is then empirically evaluated via a user study involving 55 participants that comprises 10 typical configuration engineering tasks, ranging from the creation, comprehension, refactoring, and reviewing of configuration options to the quality assurance of options and debugging of configuration failures. A configuration framework satisfying the four requirements enables developers to perform more accurately and more swiftly in 70\% and 60\% (respectively) of the configuration engineering tasks than a state-of-the-practice framework not satisfying the requirements. Furthermore, such a framework allows to reduce the time taken for these tasks by up to 94.62\%, being slower for only one task. {\textcopyright} 2020, Springer Science+Business Media, LLC, part of Springer Nature.}, keywords = {Computer software, Empirical studies, Engineering activities, Engineering challenges, Production environments, Quality assurance, Quality control, Run-time configuration, Run-time software, State of the practice, User study}, doi = {10.1007/s10664-019-09790-x}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85078290351\&doi=10.1007\%2fs10664-019-09790-x\&partnerID=40\&md5=16acb880be24429edc0728ccce2169e2}, author = {Sayagh, M. and Kerzazi, N. and Petrillo, F. and Bennani, K. and Adams, B.} } @article {Khoumsi2019343, title = {Automata-based bottom-up design of conflict-free security policies specified as policy expressions}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {11028 LNCS}, year = {2019}, note = {cited By 0}, pages = {343-357}, doi = {10.1007/978-3-030-05529-5_23}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85059958782\&doi=10.1007\%2f978-3-030-05529-5_23\&partnerID=40\&md5=903c5a9fdf6f9a84edd470778038befc}, author = {Khoumsi, A. and Erradi, M.} } @conference {Assila2019, title = {Caching as a Service in 5G Networks: Intelligent Transport and Video on Demand Scenarios}, booktitle = {2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings}, year = {2019}, note = {cited By 0}, doi = {10.1109/GLOCOM.2018.8648110}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85063521486\&doi=10.1109\%2fGLOCOM.2018.8648110\&partnerID=40\&md5=b7935edacd24dfb7acbd2e5dbe0daed6}, author = {Assila, B. and Kobbane, A. and El Koutbi, M. and Ben-Othman, J. and Mokdad, L.} } @article {ElKoutbi2019, title = {Empirical evaluation of an entropy-based approach to estimation variation of software development effort}, journal = {Journal of Software: Evolution and Process}, volume = {31}, number = {3}, year = {2019}, note = {cited By 0}, doi = {10.1002/smr.2149}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85063377815\&doi=10.1002\%2fsmr.2149\&partnerID=40\&md5=f8f11d4ac305f27600a3f8dec5af170c}, author = {El Koutbi, S. and Idri, A. and Abran, A.} } @conference {Khaldi2019532, title = {Forecasting of weekly patient visits to emergency department: Real case study}, booktitle = {Procedia Computer Science}, volume = {148}, year = {2019}, note = {cited By 0}, pages = {532-541}, doi = {10.1016/j.procs.2019.01.026}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062671151\&doi=10.1016\%2fj.procs.2019.01.026\&partnerID=40\&md5=2d1d746e66e3334ab894f34b3566ecf8}, author = {Khaldi, R. and Afia, A.E. and Chiheb, R.} } @article {Boumkheld2019203, title = {Intrusion detection system based on a deterministic finite automaton for smart grid systems}, journal = {Advances in Intelligent Systems and Computing}, volume = {887}, year = {2019}, note = {cited By 0}, pages = {203-211}, doi = {10.1007/978-3-030-03405-4_13}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85059320815\&doi=10.1007\%2f978-3-030-03405-4_13\&partnerID=40\&md5=fbc7e73f3daac4bfba4238453eb832f4}, author = {Boumkheld, N. and El Koutbi, M.} } @article {Kerzazi2019775, title = {Localizing Inconsistencies into Software Process Models at a Conceptual Level}, journal = {Advances in Intelligent Systems and Computing}, volume = {930}, year = {2019}, note = {cited By 0}, pages = {775-788}, doi = {10.1007/978-3-030-16181-1_73}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85064861394\&doi=10.1007\%2f978-3-030-16181-1_73\&partnerID=40\&md5=ac6cb9e4ccd1b51cac89ab1da7150a72}, author = {Kerzazi, N.} } @conference {Abouaomar2019, title = {Matching-Game for User-Fog Assignment}, booktitle = {2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings}, year = {2019}, note = {cited By 0}, doi = {10.1109/GLOCOM.2018.8647545}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85063543941\&doi=10.1109\%2fGLOCOM.2018.8647545\&partnerID=40\&md5=2e86072aa15d3175de06d25bff61c79f}, author = {Abouaomar, A. and Kobbane, A. and Cherkaoui, S.} } @conference {Brihi2019, title = {A New Profile-QoS Aware User Association Scheme for 5G Ultra-Dense W HetNets}, booktitle = {2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings}, year = {2019}, note = {cited By 0}, doi = {10.1109/GLOCOM.2018.8647695}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85063550006\&doi=10.1109\%2fGLOCOM.2018.8647695\&partnerID=40\&md5=a6cded91d78a47e09a4f9c639843c2d9}, author = {Brihi, S. and Walid, A. and Ben-Othman, J. and El Koutbi, M.} } @conference {Bekali2019415, title = {A Novel Design of Multi-Band Microstrip Patch Antenna for Wireless Communications}, booktitle = {Mediterranean Microwave Symposium}, volume = {2018-October}, year = {2019}, note = {cited By 0}, pages = {415-418}, doi = {10.1109/MMS.2018.8612041}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85061786483\&doi=10.1109\%2fMMS.2018.8612041\&partnerID=40\&md5=500f4918e9ef6cab4ffdad3501ba1f62}, author = {Bekali, Y.K. and Zugari, A. and Essaaidi, M. and Khalladi, M.} } @conference {Kabli201934, title = {Optical OFDM (O-OFDM) for Intensity Modulated/Direct Detection Optical Systems}, booktitle = {2018 IEEE International Conference on Communication, Networks and Satellite, Comnetsat 2018 - Proceedings}, year = {2019}, note = {cited By 0}, pages = {34-38}, doi = {10.1109/COMNETSAT.2018.8684118}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85064746220\&doi=10.1109\%2fCOMNETSAT.2018.8684118\&partnerID=40\&md5=cbe0395a7c53b386ca8ea8c91ca1da98}, author = {Kabli, A.E. and Ahmed Faqihi, M.} } @article {El-Yahyaoui2019150, title = {Optimizations in fully homomorphic encryption}, journal = {Lecture Notes in Networks and Systems}, volume = {49}, year = {2019}, note = {cited By 0}, pages = {150-166}, doi = {10.1007/978-3-319-97719-5_11}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85063268513\&doi=10.1007\%2f978-3-319-97719-5_11\&partnerID=40\&md5=d99d4c66a9844c9bde0bf03273bef13b}, author = {El-Yahyaoui, A. and Ech-Cherif El Kettani, M.D.} } @article {Baddi2019255, title = {OSM-GKM optimal shared multicast-based solution for group key management in mobile IPv6}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {11028 LNCS}, year = {2019}, note = {cited By 0}, pages = {255-269}, doi = {10.1007/978-3-030-05529-5_17}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85059959185\&doi=10.1007\%2f978-3-030-05529-5_17\&partnerID=40\&md5=2810614cfac2d08a325d997402510437}, author = {Baddi, Y. and El Kettani, M.D.E.-C.} } @article {Kasmi2019318, title = {Performance analysis of preconditioned conjugate gradient solver on heterogeneous (multi-CPUs/multi-GPUs) architecture}, journal = {Lecture Notes in Networks and Systems}, volume = {49}, year = {2019}, note = {cited By 0}, pages = {318-336}, doi = {10.1007/978-3-319-97719-5_20}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85063287241\&doi=10.1007\%2f978-3-319-97719-5_20\&partnerID=40\&md5=09a40ccb61d934f094c1b14975bae2b4}, author = {Kasmi, N. and Zbakh, M. and Haouari, A.} } @conference {ElKaid20192, title = {Reduce False Positive Alerts for Elderly Person Fall Video-Detection Algorithm by convolutional neural network model}, booktitle = {Procedia Computer Science}, volume = {148}, year = {2019}, note = {cited By 0}, pages = {2-11}, doi = {10.1016/j.procs.2019.01.004}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062654984\&doi=10.1016\%2fj.procs.2019.01.004\&partnerID=40\&md5=a3f2ec1800bb3b810f23558c22f75095}, author = {El Kaid, A. and Baina, K. and Ba{\"\i}na, J.} } @conference {ElHadj20195330, title = {Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach}, booktitle = {Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018}, year = {2019}, note = {cited By 0}, pages = {5330-5332}, doi = {10.1109/BigData.2018.8622610}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062588205\&doi=10.1109\%2fBigData.2018.8622610\&partnerID=40\&md5=7c1e7e5b141f9f63ccf2ad00a318664f}, author = {El Hadj, M.A. and Erradi, M. and Khoumsi, A. and Benkaouz, Y.} } @article {AitElHadj2018298, title = {Access domain-based approach for anomaly detection and resolution in XACML policies}, journal = {Advances in Intelligent Systems and Computing}, volume = {735}, year = {2018}, pages = {298-308}, doi = {10.1007/978-3-319-76354-5_27}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85044049486\&doi=10.1007\%2f978-3-319-76354-5_27\&partnerID=40\&md5=6c7c85cfacd3e4e948ef85d2df40ee3f}, author = {Ait El Hadj, M. and Benkaouz, Y. and Khoumsi, A. and Erradi, M.} } @conference {Assila2018213, title = {Achieving low-energy consumption in fog computing environment: A matching game approach}, booktitle = {19th IEEE Mediterranean Eletrotechnical Conference, MELECON 2018 - Proceedings}, year = {2018}, pages = {213-218}, doi = {10.1109/MELCON.2018.8379096}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050157229\&doi=10.1109\%2fMELCON.2018.8379096\&partnerID=40\&md5=0250d5d03e5322d270460ae3af21ca94}, author = {Assila, B. and Kobbane, A. and Walid, A. and El Koutbi, M.} } @conference {Cherqi201879, title = {Analysis of hacking related trade in the darkweb}, booktitle = {2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018}, year = {2018}, pages = {79-84}, doi = {10.1109/ISI.2018.8587311}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85061056307\&doi=10.1109\%2fISI.2018.8587311\&partnerID=40\&md5=3f2dbe2fc3377bce7e35dd18dfb3710f}, author = {Cherqi, O. and Mezzour, G. and Ghogho, M. and El Koutbi, M.} } @article {Baltzegar2018S81, title = {Anticipating complexity in the deployment of gene drive insects in agriculture}, journal = {Journal of Responsible Innovation}, volume = {5}, year = {2018}, pages = {S81-S97}, doi = {10.1080/23299460.2017.1407910}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85045066962\&doi=10.1080\%2f23299460.2017.1407910\&partnerID=40\&md5=b708d0e8dc54ba63bf7d1d406a3bad2f}, author = {Baltzegar, J. and Cavin Barnes, J. and Elsensohn, J.E. and Gutzmann, N. and Jones, M.S. and King, S. and Sudweeks, J.} } @conference {Boulmrharj201856, title = {Approach for dimensioning stand-alone photovoltaic systems}, booktitle = {Energy Procedia}, volume = {153}, year = {2018}, pages = {56-61}, doi = {10.1016/j.egypro.2018.10.058}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85057433465\&doi=10.1016\%2fj.egypro.2018.10.058\&partnerID=40\&md5=b03f45460b45700ebfe92eb2f1b70e53}, author = {Boulmrharj, S. and NaitMalek, Y. and Elmouatamid, A. and Bakhouya, M. and Ouladsine, R. and Zine-Dine, K. and Khaidar, M. and Abid, R.} } @conference {Assila20181193, title = {Caching as a Service for 5G Networks: A Matching Game Approach for CaaS Resource Allocation}, booktitle = {Proceedings - IEEE Symposium on Computers and Communications}, volume = {2018-June}, year = {2018}, pages = {1193-1198}, doi = {10.1109/ISCC.2018.8538661}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85059217607\&doi=10.1109\%2fISCC.2018.8538661\&partnerID=40\&md5=d33d4f8d2f2cd79a86990bb8aeeaed3a}, author = {Assila, B. and Kobbane, A. and Ben-Othman, J. and Koutbi, M.E.} } @article {Mourchid2018, title = {CGAM: A community and geography aware mobility model}, journal = {International Journal of Communication Systems}, volume = {31}, number = {1}, year = {2018}, note = {cited By 0}, abstract = {The advances of localization-enabled technologies have led to huge volumes of large-scale human mobility data collected from Call Data Records (CDR), Global Positioning System (GPS) tracking systems, and Location Based Social networks (LBSN). These location data that encompass mobility patterns could generate an important value for building accurate and realistic mobility models and hence important value for fields of application including context-aware advertising, city-wide sensing applications, urban planning, and more. In this paper, we investigate the underlying spatio-temporal and structural properties for human mobility patterns, and propose the Community and Geography Aware Mobility (CGAM) model, which characterizes user mobility knowledge through several properties such as home location distribution, community members{\textquoteright} distribution, and radius of gyration. We validate the CGAM synthetic traces against real-world GPS traces and against the traces generated by the baseline mobility model SMOOTH and assess that CGAM is accurate in predicting the performance of flooding-based and community-based routing protocols. Copyright {\textcopyright} 2017 John Wiley \& Sons, Ltd.}, doi = {10.1002/dac.3432}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85030319469\&doi=10.1002\%2fdac.3432\&partnerID=40\&md5=9e90e1af7674bce27f60e78c6d502044}, author = {Mourchid, F. and Kobbane, A. and Ben Othman, J. and El Koutbi, M.} } @article {Mourchid2018, title = {CGAM: A community and geography aware mobility model}, journal = {International Journal of Communication Systems}, volume = {31}, number = {1}, year = {2018}, doi = {10.1002/dac.3432}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85030319469\&doi=10.1002\%2fdac.3432\&partnerID=40\&md5=9e90e1af7674bce27f60e78c6d502044}, author = {Mourchid, F. and Kobbane, A. and Ben Othman, J. and El Koutbi, M.} } @conference {Lhazmir2018322, title = {Channel Assignment for D2D communication : A Regret Matching Based Approach}, booktitle = {2018 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018}, year = {2018}, pages = {322-327}, doi = {10.1109/IWCMC.2018.8450520}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053868247\&doi=10.1109\%2fIWCMC.2018.8450520\&partnerID=40\&md5=627b0b881ea4d1310141874723652d7b}, author = {Lhazmir, S. and Kobbane, A. and Ben-Othman, J.} } @conference {MacHhour2018206, title = {Concatenate text embeddings for text classification}, booktitle = {2017 International Conference on Internet of Things, Embedded Systems and Communications, IINTEC 2017 - Proceedings}, volume = {2018-January}, year = {2018}, pages = {206-210}, doi = {10.1109/IINTEC.2017.8325940}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050606189\&doi=10.1109\%2fIINTEC.2017.8325940\&partnerID=40\&md5=e76a80bf8a9cdf04c98aa3a746c22d4c}, author = {Machhour, H. and Kassou, I.} } @conference {Sikal20181, title = {Configurable process mining: A comparative study}, booktitle = {Proceedings of the 2018 International Conference on Optimization and Applications, ICOA 2018}, year = {2018}, pages = {1-6}, doi = {10.1109/ICOA.2018.8370585}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85048784383\&doi=10.1109\%2fICOA.2018.8370585\&partnerID=40\&md5=7c94107c941b68ce4932aa663659b32d}, author = {Sikal, R. and Sba{\"\i}, H. and Kjiri, L.} } @conference {Sikal2018137, title = {Configurable Process Mining: Variability Discovery Approach}, booktitle = {Colloquium in Information Science and Technology, CIST}, volume = {2018-October}, year = {2018}, pages = {137-142}, doi = {10.1109/CIST.2018.8596526}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85061447388\&doi=10.1109\%2fCIST.2018.8596526\&partnerID=40\&md5=74eec99e91001d7dee97e25a580cf92e}, author = {Sikal, R. and Sba{\"\i}, H. and Kjiri, L.} } @conference {Assila20181345, title = {A Cournot Economic Pricing Model for Caching Resource Management in 5G Wireless Networks}, booktitle = {2018 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018}, year = {2018}, pages = {1345-1350}, doi = {10.1109/IWCMC.2018.8450538}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053888603\&doi=10.1109\%2fIWCMC.2018.8450538\&partnerID=40\&md5=7f9917ffc8d0c6f0be1c40a7bb027e30}, author = {Assila, B. and Kobbane, A. and El Koutbi, M.} } @conference {Korachi2018140, title = {Data driven maturity model for assessing smart cities}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, pages = {140-147}, doi = {10.1145/3289100.3289123}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85058660258\&doi=10.1145\%2f3289100.3289123\&partnerID=40\&md5=8908e2ab946a4871a6ec1101872def02}, author = {Korachi, Z. and Bounabat, B.} } @conference {Oualahj2018, title = {A Decentralized Control of Autonomous Delay Tolerant Networks: Multi Agents Markov Decision Processes Framework}, booktitle = {IEEE International Conference on Communications}, volume = {2018-May}, year = {2018}, doi = {10.1109/ICC.2018.8422718}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051430605\&doi=10.1109\%2fICC.2018.8422718\&partnerID=40\&md5=ea20d47bd369c11fe0555f1224db09f3}, author = {Oualahj, O.A. and Kobbane, A. and Ben-Othman, J.} } @conference {Sebbar2018583, title = {Detection MITM Attack in Multi-SDN Controller}, booktitle = {Colloquium in Information Science and Technology, CIST}, volume = {2018-October}, year = {2018}, pages = {583-587}, doi = {10.1109/CIST.2018.8596479}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85061446244\&doi=10.1109\%2fCIST.2018.8596479\&partnerID=40\&md5=04ea13257b17af4ec26de2fe0c9aeba7}, author = {Sebbar, A. and Boulmalf, M. and Dafir Ech-Cherif El Kettani, M. and Badd, Y.} } @conference {Boudagdigue2018, title = {A Distributed Advanced Analytical Trust Model for IoT}, booktitle = {IEEE International Conference on Communications}, volume = {2018-May}, year = {2018}, doi = {10.1109/ICC.2018.8422726}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051430306\&doi=10.1109\%2fICC.2018.8422726\&partnerID=40\&md5=8907401b5d112341154ed5ed64157168}, author = {Boudagdigue, C. and Benslimane, A. and Kobbane, A. and Elmachkour, M.} } @conference {El-Yahyaoui20181, title = {Evaluating and gates over encrypted data in cloud computing}, booktitle = {Proceedings - 2018 International Conference on Advanced Communication Technologies and Networking, CommNet 2018}, year = {2018}, pages = {1-8}, doi = {10.1109/COMMNET.2018.8360255}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85048328547\&doi=10.1109\%2fCOMMNET.2018.8360255\&partnerID=40\&md5=09228d71a4faa4f19cc5b91d7453e450}, author = {El-Yahyaoui, A. and El Kettani, M.D.E.-C.} } @conference {Zakroum2018175, title = {Exploratory data analysis of a network telescope traffic and prediction of port probing rates}, booktitle = {2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018}, year = {2018}, pages = {175-180}, doi = {10.1109/ISI.2018.8587323}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85061067648\&doi=10.1109\%2fISI.2018.8587323\&partnerID=40\&md5=76f77a31025e393df1d23b123bcb8dee}, author = {Zakroum, M. and Houmz, A. and Ghogho, M. and Mezzour, G. and Lahmadi, A. and Francois, J. and Koutbi, M.E.} } @conference {Lhazmir20181, title = {Feature extraction based on principal component analysis for text categorization}, booktitle = {PEMWN 2017 - 6th IFIP International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks}, volume = {2018-January}, year = {2018}, pages = {1-6}, doi = {10.23919/PEMWN.2017.8308030}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85047773608\&doi=10.23919\%2fPEMWN.2017.8308030\&partnerID=40\&md5=6289e35e09bfba42463a76d9788407ed}, author = {Lhazmir, S. and Moudden, I.E. and Kobbane, A.} } @conference {Khaldi2018, title = {Feedforward and recurrent neural networks for time series forecasting: Comparative study}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3230905.3230946}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053485247\&doi=10.1145\%2f3230905.3230946\&partnerID=40\&md5=6fb59f2f8ddf603c98e96d68b1a47ee4}, author = {Khaldi, R. and Chiheb, R. and Afia, A.E.} } @conference {Khaldi2018, title = {Forecasting of bitcoin daily returns with eemd-elman based model}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3230905.3230948}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053484904\&doi=10.1145\%2f3230905.3230948\&partnerID=40\&md5=0f2e4191d42a3eaf7857e8a6821b5f27}, author = {Khaldi, R. and Afia, A.E. and Chiheb, R. and Faizi, R.} } @article {Khoumsi201851, title = {A formal basis for the design and analysis of firewall security policies}, journal = {Journal of King Saud University - Computer and Information Sciences}, volume = {30}, number = {1}, year = {2018}, note = {cited By 0}, pages = {51-66}, abstract = {A firewall is the core of a well defined network security policy. This paper presents an automata-based method to study firewall security policies. We first propose a procedure that synthesizes an automaton that describes a security policy given as a table of rules. The synthesis procedure is then used to develop procedures to detect: incompleteness, anomalies and discrepancies in security policies. A method is developed to represent the automaton by a policy qualified as mixable and that has practical utilities, such as ease to determine the whitelist and the blacklist of the policy. The developed procedures have been deeply evaluated in terms of time and space complexities. Then, a real case study has been investigated. The obtained results confirm that the developed procedures have reasonable complexities and that their actual execution times are of the order of seconds. Finally, proofs of all results are provided. {\textcopyright} 2016 King Saud University}, doi = {10.1016/j.jksuci.2016.11.008}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85008234846\&doi=10.1016\%2fj.jksuci.2016.11.008\&partnerID=40\&md5=07a25a70cda473802a697eff8dbb8dec}, author = {Khoumsi, A. and Erradi, M. and Krombi, W.} } @article {Khoumsi201851, title = {A formal basis for the design and analysis of firewall security policies}, journal = {Journal of King Saud University - Computer and Information Sciences}, volume = {30}, number = {1}, year = {2018}, pages = {51-66}, doi = {10.1016/j.jksuci.2016.11.008}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85008234846\&doi=10.1016\%2fj.jksuci.2016.11.008\&partnerID=40\&md5=07a25a70cda473802a697eff8dbb8dec}, author = {Khoumsi, A. and Erradi, M. and Krombi, W.} } @conference {Oualhaj20181, title = {Graph-Based MDP to Mobile Source with Energy Harvesting in Delay Tolerant Networks System}, booktitle = {2017 IEEE Global Communications Conference, GLOBECOM 2017 - Proceedings}, volume = {2018-January}, year = {2018}, pages = {1-6}, doi = {10.1109/GLOCOM.2017.8253948}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046359869\&doi=10.1109\%2fGLOCOM.2017.8253948\&partnerID=40\&md5=ad621053c85f2d4d1fe75a91423a6718}, author = {Oualhaj, O.A. and Elmachkour, M. and Kobbane, A. and Ben-Othman, J.} } @conference {Lhazmir20181, title = {Green opportunistic access for cognitive radio networks: A regret matching based approach}, booktitle = {Proceedings - 2018 International Conference on Advanced Communication Technologies and Networking, CommNet 2018}, year = {2018}, pages = {1-6}, doi = {10.1109/COMMNET.2018.8360261}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85048334349\&doi=10.1109\%2fCOMMNET.2018.8360261\&partnerID=40\&md5=74465a0ecf291e5fb7822c88709e0c5b}, author = {Lhazmir, S. and Elmachkour, M. and Kobbane, A.} } @article {Landrigan2018462, title = {The Lancet Commission on pollution and health}, journal = {The Lancet}, volume = {391}, number = {10119}, year = {2018}, pages = {462-512}, doi = {10.1016/S0140-6736(17)32345-0}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85031763844\&doi=10.1016\%2fS0140-6736\%2817\%2932345-0\&partnerID=40\&md5=a37689cb0e79594159ee6f8afc55fae1}, author = {Landrigan, P.J. and Fuller, R. and Acosta, N.J.R. and Adeyi, O. and Arnold, R. and Basu, N.N. and Bald{\'e}, A.B. and Bertollini, R. and Bose-O{\textquoteright}Reilly, S. and Boufford, J.I. and Breysse, P.N. and Chiles, T. and Mahidol, C. and Coll-Seck, A.M. and Cropper, M.L. and Fobil, J. and Fuster, V. and Greenstone, M. and Haines, A. and Hanrahan, D. and Hunter, D. and Khare, M. and Krupnick, A. and Lanphear, B. and Lohani, B. and Martin, K. and Mathiasen, K.V. and McTeer, M.A. and Murray, C.J.L. and Ndahimananjara, J.D. and Perera, F. and Poto{\v c}nik, J. and Preker, A.S. and Ramesh, J. and Rockstr{\"o}m, J. and Salinas, C. and Samson, L.D. and Sandilya, K. and Sly, P.D. and Smith, K.R. and Steiner, A. and Stewart, R.B. and Suk, W.A. and van Schayck, O.C.P. and Yadama, G.N. and Yumkella, K. and Zhong, M.} } @conference {BenHafaiedh20181, title = {LTE-U and WiFi coexistence in the 5 GHz unlicensed spectrum: A survey}, booktitle = {PEMWN 2017 - 6th IFIP International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks}, volume = {2018-January}, year = {2018}, pages = {1-7}, doi = {10.23919/PEMWN.2017.8308025}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85047727398\&doi=10.23919\%2fPEMWN.2017.8308025\&partnerID=40\&md5=65a02857c329a81d3574c38db67a7f92}, author = {Ben Hafaiedh, H. and El Korbi, I. and Saidane, L.A. and Kobbane, A.} } @conference {Assila20181, title = {A Many-To-One Matching Game Approach to Achieve Low-Latency Exploiting Fogs and Caching}, booktitle = {2018 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018 - Proceedings}, volume = {2018-January}, year = {2018}, pages = {1-2}, doi = {10.1109/NTMS.2018.8328671}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051102582\&doi=10.1109\%2fNTMS.2018.8328671\&partnerID=40\&md5=93f51b2e077f7f00d3d0e5e5a8123950}, author = {Assila, B. and Kobbane, A. and El Koutbi, M.} } @conference {Merabet201856, title = {Measuring human comfort for smart building application: Experimental set-up using WSN}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, pages = {56-63}, doi = {10.1145/3289100.3289110}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85058667464\&doi=10.1145\%2f3289100.3289110\&partnerID=40\&md5=a0709450c09d2f88eed91fc91471f264}, author = {Merabet, G.H. and Essaaidi, M. and Benhaddou, D. and Khalil, N. and Chilela, J.} } @article {Oufkir201872, title = {Measuring knowledge management project performance}, journal = {Advances in Intelligent Systems and Computing}, volume = {745}, year = {2018}, pages = {72-81}, doi = {10.1007/978-3-319-77703-0_7}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85045131625\&doi=10.1007\%2f978-3-319-77703-0_7\&partnerID=40\&md5=5e015ad9e8b84a851af4a4705e149472}, author = {Oufkir, L. and Kassou, I.} } @conference {Kang2018338, title = {Mitigation of cyber warfare in space through reed solomon codes}, booktitle = {Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018}, volume = {2018-March}, year = {2018}, pages = {338-342}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051749454\&partnerID=40\&md5=5851d0b3ae972c35fd8ae206b957820d}, author = {Kang, M. and Hopkinson, K. and Betances, A. and Reith, M.} } @article {AitOualhaj2018, title = {Mobile delay-tolerant networks with energy-harvesting and wireless energy transfer cooperation}, journal = {Concurrency Computation}, year = {2018}, doi = {10.1002/cpe.5112}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85059067813\&doi=10.1002\%2fcpe.5112\&partnerID=40\&md5=4d5955405a79b55e86781f7a65a66687}, author = {Ait Oualhaj, O. and Kobbane, A. and Ben-Othman, J.} } @conference {Kabbaj2018, title = {Model selection for learning branch-and-cut strategies}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3230905.3230908}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053484527\&doi=10.1145\%2f3230905.3230908\&partnerID=40\&md5=1245860bc8014f28cf4be5f9a62a81ef}, author = {Kabbaj, M.M. and El Afia, A.} } @conference {Kharchouf2018, title = {Modeling and PI Control Strategy of DFIG Based Wind Energy Conversion Systems}, booktitle = {Proceedings of 2017 International Renewable and Sustainable Energy Conference, IRSEC 2017}, year = {2018}, doi = {10.1109/IRSEC.2017.8477348}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85055863270\&doi=10.1109\%2fIRSEC.2017.8477348\&partnerID=40\&md5=32eba764430e8a533e635724d68c48b5}, author = {Kharchouf, I. and Essadki, A. and Arbaoui, M. and Nasser, T.} } @conference {Bourja2018502, title = {MoVITS: Moroccan Video Intelligent Transport System}, booktitle = {Colloquium in Information Science and Technology, CIST}, volume = {2018-October}, year = {2018}, pages = {502-507}, doi = {10.1109/CIST.2018.8596566}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85061428090\&doi=10.1109\%2fCIST.2018.8596566\&partnerID=40\&md5=d3b7baffb731883e8897b8cc5356e33e}, author = {Bourja, O. and Kabbaj, K. and Derrouz, H. and El Bouziady, A. and Thami, R.O.H. and Zennayi, Y. and Bourzeix, F.} } @article {Bouabdellah201840, title = {Network layer attacks and countermeasures in cognitive radio networks: A survey}, journal = {Journal of Information Security and Applications}, volume = {38}, year = {2018}, pages = {40-49}, doi = {10.1016/j.jisa.2017.11.010}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85037523873\&doi=10.1016\%2fj.jisa.2017.11.010\&partnerID=40\&md5=e932d332e0495cc6658b35adcd2ea4a4}, author = {Bouabdellah, M. and Kaabouch, N. and El Bouanani, F. and Ben-Azza, H.} } @article {Bouabdellah201840, title = {Network layer attacks and countermeasures in cognitive radio networks: A survey}, journal = {Journal of Information Security and Applications}, volume = {38}, year = {2018}, note = {cited By 0}, pages = {40-49}, abstract = {Spectrum scarcity is the principal motivation behind the development of cognitive radio. This technology introduces new functionalities at the physical, medium access control, and network layers of the TCP/IP protocol stack. These functionalities can be subject to new security threats. Most of the existing works in cognitive radio focused on the security issues in both the physical and medium access control layers. However, threats related to the network layer have not been studied despite its importance in establishing communication between different users in cognitive radio networks. In this paper, we classify and give an overview of attacks that target the network layer functionalities of cognitive radio networks. We discuss the existing detection techniques and countermeasures and highlight the main security challenges for such networks. {\textcopyright} 2017 Elsevier Ltd}, doi = {10.1016/j.jisa.2017.11.010}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85037523873\&doi=10.1016\%2fj.jisa.2017.11.010\&partnerID=40\&md5=e932d332e0495cc6658b35adcd2ea4a4}, author = {Bouabdellah, M. and Kaabouch, N. and El Bouanani, F. and Ben-Azza, H.} } @conference {El-Yahyaoui20181, title = {A new cryptographic method for cloud computing}, booktitle = {Proceedings of 2017 International Conference of Cloud Computing Technologies and Applications, CloudTech 2017}, volume = {2018-January}, year = {2018}, pages = {1-8}, doi = {10.1109/CloudTech.2017.8284705}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046662752\&doi=10.1109\%2fCloudTech.2017.8284705\&partnerID=40\&md5=64b47be3d219a15b30f943cb0b474165}, author = {El-Yahyaoui, A. and El Kettani, M.D.E.-C.} } @article {Gmira20181436, title = {A New Energy Efficiency/Spectrum Efficiency Model for Cooperative Cognitive Radio Network}, journal = {Mobile Networks and Applications}, volume = {23}, number = {5}, year = {2018}, pages = {1436-1448}, doi = {10.1007/s11036-018-1078-z}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85055932107\&doi=10.1007\%2fs11036-018-1078-z\&partnerID=40\&md5=2a9aa8fcbffa8cca76f1910b052525eb}, author = {Gmira, S. and Kobbane, A. and Ben-Othman, J. and El Machkour, M.} } @article {Gmira2018405, title = {A new model for cooperative cognitive radio network using coalitional game}, journal = {Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST}, volume = {230}, year = {2018}, pages = {405-415}, doi = {10.1007/978-3-319-90802-1_36}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85048046108\&doi=10.1007\%2f978-3-319-90802-1_36\&partnerID=40\&md5=aecbb539131a30d55d9c7252d88f268a}, author = {Gmira, S. and Kobbane, A. and Machkour, M.E. and Ben-Othman, J.} } @conference {Arbaoui2018, title = {A New Robust Control by Active Disturbance Rejection Control Applied on Wind Turbine System Based on Doubly Fed Induction Generator DFIG}, booktitle = {Proceedings of 2017 International Renewable and Sustainable Energy Conference, IRSEC 2017}, year = {2018}, doi = {10.1109/IRSEC.2017.8477245}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85055879902\&doi=10.1109\%2fIRSEC.2017.8477245\&partnerID=40\&md5=6afbcf7b5f6cadf726b9ad8f5f892989}, author = {Arbaoui, M. and Essadki, A. and Kharchouf, I. and Nasser, T.} } @conference {Amine2018, title = {New user association scheme based on multi-objective optimization for 5G ultra-dense multi-RAT HetNets}, booktitle = {IEEE International Conference on Communications}, volume = {2018-May}, year = {2018}, doi = {10.1109/ICC.2018.8422154}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051424239\&doi=10.1109\%2fICC.2018.8422154\&partnerID=40\&md5=3572d774ac502ed9eb6c557554de3420}, author = {Amine, M. and Walid, A. and Kobbane, A. and Ben-Othman, J.} } @conference {Kandoussi2018345, title = {Novel Access Control Approach for Inter-organizational Workflows}, booktitle = {ICISSP 2018 - Proceedings of the 4th International Conference on Information Systems Security and Privacy}, volume = {2018-January}, year = {2018}, pages = {345-352}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85052019761\&partnerID=40\&md5=9c30efc7c6d3b16fc05971865cc45c1a}, author = {Kandoussi, A.E. and Bakkali, H.E.} } @article {Kale201825, title = {Novel threshold formulation for energy detection method to efficient spectrum sensing in cognitive radio}, journal = {Advances in Intelligent Systems and Computing}, volume = {651}, year = {2018}, note = {cited By 0}, pages = {25-35}, abstract = {Cognitive radio (CR) is an upcoming technology in wireless communications. Available spectrum used by licensed user is called as primary user (PU). Unused licensed spectrum is called spectrum hole. CR i.e., unlicensed user is called as secondary user (SU). The important task to the CR is to efficiently use the available spectrum without disturbing PU. The success of CR depends on spectrum sensing efficiency. In energy detection method, we have compared the energy of the samples with threshold (denoted as λ). If the sample energy is greater than the threshold, we say the signal is present; otherwise, the signal is absent. This method does not require any prior information of the signal, so energy detection is a popular sensing method due to its simplicity. Through this paper, we would like to propose a novel threshold formulation for energy detection method to efficient spectrum sensing in cognitive radio. Proposed formulation avoids Q inverse function; also, this formulation is independent of number of samples. With rigorous analysis of the proposed formulation for different SNRs, it gives better results compared to other systems. {\textcopyright} 2018, Springer Nature Singapore Pte Ltd.}, doi = {10.1007/978-981-10-6614-6_3}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85031409782\&doi=10.1007\%2f978-981-10-6614-6_3\&partnerID=40\&md5=95f99171fea31131b236024675f2c5d8}, author = {Kale, R.S. and Wadhai, V.M. and Helonde, J.B.} } @conference {Baddi2018567, title = {Optimal Shared Multicast Tree Based Solution for Group Key Management in Mobile IPv6}, booktitle = {Colloquium in Information Science and Technology, CIST}, volume = {2018-October}, year = {2018}, pages = {567-572}, doi = {10.1109/CIST.2018.8596622}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85061457715\&doi=10.1109\%2fCIST.2018.8596622\&partnerID=40\&md5=31bd74e9c9cd03787a33a8016a62e2ce}, author = {Baddi, Y. and Kettani, M.D.E.-C.E.} } @conference {Kasmi20181, title = {Performance evaluation of StarPU schedulers with preconditioned conjugate gradient solver on heterogeneous (multi-CPUs/multi-GPUs) architecture}, booktitle = {Proceedings of 2017 International Conference of Cloud Computing Technologies and Applications, CloudTech 2017}, volume = {2018-January}, year = {2018}, pages = {1-6}, doi = {10.1109/CloudTech.2017.8284742}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046664197\&doi=10.1109\%2fCloudTech.2017.8284742\&partnerID=40\&md5=15d1bacdcdc6b413b42b5bc9c3059bfb}, author = {Kasmi, N. and Zbakh, M. and Samadi, Y. and Cherkaoui, R. and Haouari, A.} } @conference {Kerzazi2018, title = {Release engineering: From structural to functional view}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3289402.3289547}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062787123\&doi=10.1145\%2f3289402.3289547\&partnerID=40\&md5=9cbe63a1729a1e49aae60abf735872b1}, author = {Kerzazi, N. and El Asri, I.} } @conference {Filali2018, title = {SDN Controller Assignment and Load Balancing with Minimum Quota of Processing Capacity}, booktitle = {IEEE International Conference on Communications}, volume = {2018-May}, year = {2018}, doi = {10.1109/ICC.2018.8422750}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051428081\&doi=10.1109\%2fICC.2018.8422750\&partnerID=40\&md5=950211c49ab90c21d84d57b5ecf8c58f}, author = {Filali, A. and Kobbane, A. and Elmachkour, M. and Cherkaoui, S.} } @conference {Mabrouk2018495, title = {Signaling game-based approach to improve security in vehicular networks}, booktitle = {VEHITS 2018 - Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems}, volume = {2018-March}, year = {2018}, pages = {495-500}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051947337\&partnerID=40\&md5=fd17d3ff35b56253285bf7d433abcfa8}, author = {Mabrouk, A. and Kobbane, A. and El Koutbi, M.} } @article {Sayagh2018, title = {Software Configuration Engineering in Practice: Interviews, Survey, and Systematic Literature Review}, journal = {IEEE Transactions on Software Engineering}, year = {2018}, doi = {10.1109/TSE.2018.2867847}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85052624554\&doi=10.1109\%2fTSE.2018.2867847\&partnerID=40\&md5=f1b2d51b59522e24e5c52f064a62d00b}, author = {Sayagh, M. and Kerzazi, N. and Adams, B. and Petrillo, F.} } @conference {ElKarfi201859, title = {A spectral clustering-based approach for sentiment classification in modern standard Arabic}, booktitle = {MCCSIS 2018 - Multi Conference on Computer Science and Information Systems; Proceedings of the International Conferences on Big Data Analytics, Data Mining and Computational Intelligence 2018, Theory and Practice in Modern Computing 2018 and Connected Sma}, year = {2018}, pages = {59-65}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85054167622\&partnerID=40\&md5=101982324dd788664f052d2919012106}, author = {El Karfi, I. and El Fkihi, S. and Faizi, R.} } @article {Idri201869, title = {A systematic map of medical data preprocessing in knowledge discovery}, journal = {Computer Methods and Programs in Biomedicine}, volume = {162}, year = {2018}, pages = {69-85}, doi = {10.1016/j.cmpb.2018.05.007}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046706780\&doi=10.1016\%2fj.cmpb.2018.05.007\&partnerID=40\&md5=30324a8f7b2702347d51c7c56b55b294}, author = {Idri, A. and Benhar, H. and Fernandez-Aleman, J.L. and Kadi, I.} } @conference {Lahlou201864, title = {Textual context aware factorization machines: Improving recommendation by leveraging users{\textquoteright} reviews}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, pages = {64-69}, doi = {10.1145/3289100.3289111}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85058629650\&doi=10.1145\%2f3289100.3289111\&partnerID=40\&md5=c2869c20ec04d08f675efb27e1536863}, author = {Lahlou, F.Z. and Benbrahim, H. and Kassou, I.} } @conference {Boulmrharj2018, title = {Towards a battery characterization methodology for performance evaluation of micro-grid systems}, booktitle = {2018 International Conference on Smart Energy Systems and Technologies, SEST 2018 - Proceedings}, year = {2018}, doi = {10.1109/SEST.2018.8495829}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85056492547\&doi=10.1109\%2fSEST.2018.8495829\&partnerID=40\&md5=f25a82d795aa6991c23f1064013cde45}, author = {Boulmrharj, S. and NaitMalek, Y. and Mouatamid, A.E. and Ouladsine, R. and Bakhouya, M. and Ouldmoussa, M. and Zine-Dine, K. and Khaidar, M. and Abid, R.} } @conference {Elmouatamid2018984, title = {Towards a Demand/Response Control Approach for Micro-grid Systems}, booktitle = {2018 5th International Conference on Control, Decision and Information Technologies, CoDIT 2018}, year = {2018}, pages = {984-988}, doi = {10.1109/CoDIT.2018.8394951}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050227456\&doi=10.1109\%2fCoDIT.2018.8394951\&partnerID=40\&md5=97a6b224a481de8a0d5d91a46b76b895}, author = {Elmouatamid, A. and NaitMalek, Y. and Ouladsine, R. and Bakhouya, M. and Elkamoun, N. and Zine-Dine, K. and Khaidar, M. and Abid, R.} } @conference {Bahadi201842, title = {Towards efficient big data: Hadoop data placing and processing}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, pages = {42-47}, doi = {10.1145/3289100.3289108}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85058656669\&doi=10.1145\%2f3289100.3289108\&partnerID=40\&md5=52e6fda5215333977a9413c6cb1ff547}, author = {Bahadi, J. and Asri, B.E. and Courtine, M. and Rhanoui, M. and Kergosien, Y.} } @conference {Abouaomar201814, title = {Users-Fogs association within a cache context in 5G networks:Coalition game model}, booktitle = {Proceedings - IEEE Symposium on Computers and Communications}, volume = {2018-June}, year = {2018}, pages = {14-19}, doi = {10.1109/ISCC.2018.8538500}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85059221795\&doi=10.1109\%2fISCC.2018.8538500\&partnerID=40\&md5=e324f3454d662cef58a9c78528c68a60}, author = {Abouaomar, A. and Elmachkour, M. and Kobbane, A. and Tembine, H. and Ayaida, M.} } @article {Elorriaga2018, title = {Variation in mutation spectra among CRISPR/Cas9 mutagenized poplars}, journal = {Frontiers in Plant Science}, volume = {9}, year = {2018}, doi = {10.3389/fpls.2018.00594}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046905354\&doi=10.3389\%2ffpls.2018.00594\&partnerID=40\&md5=5813c348dfca604f8eb5bf9c4e3ac76f}, author = {Elorriaga, E. and Klocko, A.L. and Ma, C. and Strauss, S.H.} } @article {ElKandoussi2018350, title = {Weighted access control policies cohabitation in distributed systems}, journal = {Advances in Intelligent Systems and Computing}, volume = {735}, year = {2018}, pages = {350-360}, doi = {10.1007/978-3-319-76354-5_32}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85044043345\&doi=10.1007\%2f978-3-319-76354-5_32\&partnerID=40\&md5=4518ef85bbd3fa0aece3d49d4340bf97}, author = {El Kandoussi, A. and El Bakkali, H.} } @article {Gould2018728, title = {Wicked evolution: Can we address the sociobiological dilemma of pesticide resistance?}, journal = {Science}, volume = {360}, number = {6390}, year = {2018}, pages = {728-732}, doi = {10.1126/science.aar3780}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85049719493\&doi=10.1126\%2fscience.aar3780\&partnerID=40\&md5=f631747a4d243a56bdba22ab5c8a9284}, author = {Gould, F. and Brown, Z.S. and Kuzma, J.} } @conference {Khelifa2017211, title = {An accurate HSMM-based system for Arabic phonemes recognition}, booktitle = {9th International Conference on Advanced Computational Intelligence, ICACI 2017}, year = {2017}, note = {cited By 1}, pages = {211-216}, abstract = {The majority of successful automatic speech recognition (ASR) systems utilize a probabilistic modeling of the speech signal via hidden Markov models (HMMs). In a standard HMM model, state duration probabilities decrease exponentially with time, which fails to satisfactorily describe the temporal structure of speech. Incorporating explicit state durational probability distribution functions (pdf) into the HMM is a famous solution to overcome this feebleness. This way is well-known as a hidden semi-Markov model (HSMM). Previous papers have confirmed that using HSMM models instead of the standard HMMs have enhanced the recognition accuracy in many targeted languages. This paper addresses an important stage of our on-going work which aims to construct an accurate Arabic recognizer for teaching and learning purposes. It presents an implementation of an HSMM model whose principal goal is improving the classical HMM{\textquoteright}s durational behavior. In this implementation, the Gaussian distribution is used for modeling state durations. Experiments have been carried out on a particular Arabic speech corpus collected from recitations of the Holy Quran. Results show an increase in recognition accuracy by around 1\% We confirmed via these results that such a system outperforms the baseline HTK when the Gaussian distribution is integrated into the HTK{\textquoteright}s recognizer back-end. {\textcopyright} 2017 IEEE.}, doi = {10.1109/ICACI.2017.7974511}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027464290\&doi=10.1109\%2fICACI.2017.7974511\&partnerID=40\&md5=169e067b67861858798f016d82e0e080}, author = {Khelifa, M.O.M. and Belkasmi, M. and Abdellah, Y. and Elhadj, Y.O.M.} } @conference {Elmagrouni2017183, title = {Approach for building Services-Oriented systems adaptable}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2017}, note = {cited By 0}, pages = {183-188}, abstract = {the idea of Service-Oriented Computing (SOC) is to understand users{\textquoteright} requirements for Service-Based Applications (SBAs). We propose an adaptation-centric approach which allows: (i) modeling users{\textquoteright} requirements for Service-Oriented System with the MAP formalism using an Intentional Service Model (ISM); (ii) ontology and the aspect according to the contextual changes in order to inject it in the process BPEL; and (iii) provides architecture for a support tool. We validate our approach by performing experiments on an e-tourism application. The result is an adaptation framework that can guide software engineers in developing adaptable service-based applications. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ICMCS.2016.7905656}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019081198\&doi=10.1109\%2fICMCS.2016.7905656\&partnerID=40\&md5=b1e0b0e89c0b7830843863427a849a52}, author = {Elmagrouni, I. and Lethrech, M. and Kenzi, A. and Kriouile, A.} } @conference {Khaldi2017, title = {Artificial neural network based approach for blood demand forecasting: Fez transfusion blood center case study}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F129474}, year = {2017}, note = {cited By 0}, abstract = {Blood demand and supply management are considered one of the major components of a healthcare supply chain, since blood is a vital element in preserving patient{\textquoteright}s life. However, forecasting it faces several challenges including frequent shortages, and possible expiration caused by demand uncertainty of hospitals. This uncertainty is mainly due to high variability in the number of emergency cases. Thereupon, this investigation presents a real case study of forecasting monthly demand of three blood components, using Artificial Neural Networks (ANNs). The demand of the three blood components (red blood cells (RBC), plasma (CP) and platelets (PFC)) and other observations are obtained from a central transfusion blood center and a University Hospital. Experiments are carried out using three networks to forecast each blood component separately. Last, the presented model is compared with ARIMA to evaluate its performance in prediction. The results of this study depict that ANN models overcomes ARIMA models in demand forecasting. Thus high ANN models can be considered as a promising approach in forecasting monthly blood demand. {\textcopyright} 2017 Association for Computing Machinery.}, doi = {10.1145/3090354.3090415}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028449243\&doi=10.1145\%2f3090354.3090415\&partnerID=40\&md5=7ab92ea6ba7c2f5837ee88fcb2a91ffc}, author = {Khaldi, R. and El Afia, A. and Chiheb, R. and Faizi, R.} } @article {Ayache2017166, title = {Aspect-oriented state machines for resolving conflicts in XACML policies}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {10299 LNCS}, year = {2017}, note = {cited By 0}, pages = {166-171}, abstract = {Authorizationin collaborativesystemsisdefinedbyaglobal policy that represents the combination of the collaborators{\textquoteright} access policies. However, the enforcement of such a global policy may create conflicting authorization decisions. In this paper, we categorize two types of conflicts that may occur in such policies. Furthermore, to resolve these conflicts and to reach a unique decision for an access request, we present an approach that uses XACML policy combining algorithms and considers the category of the detected conflicts. The approach is implemented using aspect-oriented finite state machines. {\textcopyright} Springer International Publishing AG 2017.}, doi = {10.1007/978-3-319-59647-1_13}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019731058\&doi=10.1007\%2f978-3-319-59647-1_13\&partnerID=40\&md5=917cf51c38e853e2423ad411ec1ecadb}, author = {Ayache, M. and Erradi, M. and Freisleben, B. and Khoumsi, A.} } @article {Aznabet2017137, title = {A broadband modified T-shaped planar dipole antenna for UHF RFID tag applications}, journal = {Progress In Electromagnetics Research C}, volume = {73}, year = {2017}, note = {cited By 0}, pages = {137-144}, abstract = {In this paper, we report a single layer modified T-shaped dipole antenna for UHF-RFID tag applications. The designed RFID tag antenna consists of a pair of T-shaped dipole strips loaded with four half discs patches and a tag chip placed in the center. The antenna{\textquoteright}s size is 80 {\texttimes} 40 {\texttimes} 1.6 mm3. Performance of the proposed design was investigated with simulations and measurements. The main feature of this design is that the RFID tag antenna can operate effectively at 868 MHz and 915 MHz frequency bands which make it broadband. The maximum reading range measured in an anechoic chamber is 4.25 m and 5.27 m at 915 MHz and 867.5 MHz, respectively. Furthermore, the RFID tag antenna can work on metallic plates when inserting a foam spacer between them. The final result has a simple configuration, low profile and can be suitable for practical applications dealing with free-space and metallic objects. {\textcopyright} 2017, Electromagnetics Academy. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85018499025\&partnerID=40\&md5=fc169608c0f9d2ca9edc6935cc6a53e4}, author = {Aznabet, I. and Ennasar, M.A. and El Mrabet, O. and Andia Vera, G. and Khalladi, M. and Tedjni, S.} } @conference {Abouaomar2017, title = {Caching, device-to-device and fog computing in 5th cellular networks generation: Survey}, booktitle = {Proceedings - 2017 International Conference on Wireless Networks and Mobile Communications, WINCOM 2017}, year = {2017}, note = {cited By 0}, abstract = {Many researches and standardization work on the challenges that 5th networks generation raised from the radio perspective while employing advanced techniques such as massive MIMO (Multiple-Input-Multiple-Output) and CoMP (Cooperative Multi-points Processes). However the backhaul problems such as bottlenecks has emerged due to the deployment of ultradense and heavy traffic that should be connected to the core networks. In this paper we investigate the caching as a promising solution to deal with the backhaul problems and the offload of the network. By caching the content near the users, at the base stations or at the device side via device-to-device communications or in advanced architecture of the cloud (In the Fog) is a promising solution to bring the interesting content closer to the users. Caching techniques are many, in this paper we grouped the most interesting ones with regard to different architectures, considering the cases and the quality of the solutions. {\textcopyright} 2017 IEEE.}, doi = {10.1109/WINCOM.2017.8238174}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85041450036\&doi=10.1109\%2fWINCOM.2017.8238174\&partnerID=40\&md5=08c633efad0f6759f14c9373be0f0b07}, author = {Abouaomar, A. and Filali, A. and Kobbane, A.} } @conference {Kamal201799, title = {Car recognition using the bag of features method}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2017}, note = {cited By 0}, pages = {99-102}, abstract = {In this paper, we apply the bag of features method to the car make and model recognition problem. In our implementation of the method, we use the LARS algorithm to optimize the quadratic problem known as the Lasso and by doing so we generate the dictionary of words. That dictionary is then used in conjuction to an image database to obtain a feature vector (each image yields one feature vector), said feature vector is then fed to an supervised classification algorithm (in our case an SVM). {\textcopyright} 2016 IEEE.}, doi = {10.1109/ICMCS.2016.7905554}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019159309\&doi=10.1109\%2fICMCS.2016.7905554\&partnerID=40\&md5=7fed66861fc86215dbdbd5a09e4f7f6b}, author = {Kamal, I. and Oubaha, J.} } @conference {ElHadj2017548, title = {Clustering-based approach for anomaly detection in XACML policies}, booktitle = {ICETE 2017 - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications}, volume = {4}, year = {2017}, note = {cited By 0}, pages = {548-553}, abstract = {The development of distributed applications arises multiple security issues such as access control. Attribute-Based Access Control has been proposed as a generic access control model, which provides more flexibility and promotes information and security sharing. eXtensible Access Control Markup Language (XACML) is the most convenient way to express ABAC policies. However, in distributed environments, XACML policies become more complex and hard to manage. In fact, an XACML policy in distributed applications may be aggregated from multiple parties and can be managed by more than one administrator. Therefore, it may contain several anomalies such as conflicts and redundancies, which may affect the performance of the policy execution. In this paper, we propose an anomaly detection method based on the decomposition of a policy into clusters before searching anomalies within each cluster. Our evaluation results demonstrate the efficiency of the suggested approach. Copyright {\textcopyright} 2017 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85029414026\&partnerID=40\&md5=133521fca6a95f8238cfc3b777dd3534}, author = {El Hadj, M.A. and Ayache, M. and Benkaouz, Y. and Khoumsi, A. and Erradi, M.} } @article {Khelifa2017937, title = {Constructing accurate and robust HMM/GMM models for an Arabic speech recognition system}, journal = {International Journal of Speech Technology}, volume = {20}, number = {4}, year = {2017}, note = {cited By 0}, pages = {937-949}, abstract = {Conventional Hidden Markov Model (HMM) based Automatic Speech Recognition (ASR) systems generally utilize cepstral features as acoustic observation and phonemes as basic linguistic units. Some of the most powerful features currently used in ASR systems are Mel-Frequency Cepstral Coefficients (MFCCs). Speech recognition is inherently complicated due to the variability in the speech signal which includes within- and across-speaker variability. This leads to several kinds of mismatch between acoustic features and acoustic models and hence degrades the system performance. The sensitivity of MFCCs to speech signal variability motivates many researchers to investigate the use of a new set of speech feature parameters in order to make the acoustic models more robust to this variability and thus improve the system performance. The combination of diverse acoustic feature sets has great potential to enhance the performance of ASR systems. This paper is a part of ongoing research efforts aspiring to build an accurate Arabic ASR system for teaching and learning purposes. It addresses the integration of complementary features into standard HMMs for the purpose to make them more robust and thus improve their recognition accuracies. The complementary features which have been investigated in this work are voiced formants and Pitch in combination with conventional MFCC features. A series of experimentations under various combination strategies were performed to determine which of these integrated features can significantly improve systems performance. The Cambridge HTK tools were used as a development environment of the system and experimental results showed that the error rate was successfully decreased, the achieved results seem very promising, even without using language models. {\textcopyright} 2017, Springer Science+Business Media, LLC.}, doi = {10.1007/s10772-017-9456-7}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85029588089\&doi=10.1007\%2fs10772-017-9456-7\&partnerID=40\&md5=2479bd9e84585d976f41dd5488eb12c2}, author = {Khelifa, M.O.M. and Elhadj, Y.M. and Abdellah, Y. and Belkasmi, M.} } @conference {Sayagh2017255, title = {On cross-stack configuration errors}, booktitle = {Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017}, year = {2017}, note = {cited By 0}, pages = {255-265}, abstract = {Today{\textquoteright}s web applications are deployed on powerful software stacks such as MEAN (JavaScript) or LAMP (PHP), which consist of multiple layers such as an operating system, web server, database, execution engine and application framework, each of which provide resources to the layer just above it. These powerful software stacks unfortunately are plagued by so-called cross-stack configuration errors (CsCEs), where a higher layer in the stack suddenly starts to behave incorrectly or even crash due to incorrect configuration choices in lower layers. Due to differences in programming languages and lack of explicit links between configuration options of different layers, sysadmins and developers have a hard time identifying the cause of a CsCE, which is why this paper (1) performs a qualitative analysis of 1,082 configuration errors to understand the impact, effort and complexity of dealing with CsCEs, then (2) proposes a modular approach that plugs existing source code analysis (slicing) techniques, in order to recommend the culprit configuration option. Empirical evaluation of this approach on 36 real CsCEs of the top 3 LAMP stack layers shows that our approach reports the misconfigured option with an average rank of 2.18 for 32 of the CsCEs, and takes only few minutes, making it practically useful. {\textcopyright} 2017 IEEE.}, doi = {10.1109/ICSE.2017.31}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027717403\&doi=10.1109\%2fICSE.2017.31\&partnerID=40\&md5=fa56524dafc8d93876ecd8c56f396da3}, author = {Sayagh, M. and Kerzazi, N. and Adams, B.} } @conference {Idri2017245, title = {A Data Mining-Based Approach for Cardiovascular Dysautonomias Diagnosis and Treatment}, booktitle = {IEEE CIT 2017 - 17th IEEE International Conference on Computer and Information Technology}, year = {2017}, note = {cited By 0}, pages = {245-252}, abstract = {Autonomic nervous system (ANS) is a control system that acts largely unconsciously and regulates bodily functions. An autonomic malfunction can lead to serious problems related to blood pressure, heart, swallowing, breathing and others. A set of dynamic tests are therefore adopted in ANS units to diagnose and treat patients with cardiovascular dysautonomias. These tests generate big amount of data which are very well suited to be processed using data mining techniques. The purpose of this study is to develop a cardiovascular dysautonomias prediction system to identify the appropriate diagnosis and treatment for patients with cardiovascular dysautonomias using a dataset extracted from the ANS unit of the university hospital Avicenne in Morocco. Classification techniques and association rules were used for the diagnosis and treatment stages respectively. In fact, K-nearest neighbors, C4.5 decision tree algorithm, Random forest, Na{\"\i}ve bayes and Support vector machine were applied to generate the diagnosis classification models and Apriori algorithm was used for generating the association rules. The results obtained for each classifier were analyzed and compared to identify the most efficient one. {\textcopyright} 2017 IEEE.}, doi = {10.1109/CIT.2017.28}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85032340028\&doi=10.1109\%2fCIT.2017.28\&partnerID=40\&md5=8c8a9ba277b01051d8429283af6bb318}, author = {Idri, A. and Kadi, I.} } @conference {ElHaloui2017192, title = {A decision-support model enabling a proactive vision of Cloud Computing adoption}, booktitle = {Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016}, year = {2017}, note = {cited By 0}, pages = {192-198}, abstract = {Market competitiveness and technological evolution encourage companies to seek IT solutions enabling to save costs, increase productivity, and focus on high value-added activities. Outsourcing and cloud computing activities become increasingly adopted choices. That is why, decision makers need to look for decision support tools helping them for the adoption of new solutions and services such as Cloud Computing. This article presents a maturity assessment model of a functional block information system in order to outsource it to Cloud. Basing on the enterprise architecture point of view, best practices repositories, basic criteria of activities outsourcing, and the cloud computing adoption requirements, this model is built around four modules: the block scope identification, the outsourcing opportunity, the cloud computing architectural requirements, and governance and control. Thus, this model will provide new benefits for opened Enterprise Architectures to cloud computing. {\textcopyright} 2016 IEEE.}, doi = {10.1109/CloudTech.2016.7847698}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85013765957\&doi=10.1109\%2fCloudTech.2016.7847698\&partnerID=40\&md5=2afd11beb0ac88d120610b32d6878cb2}, author = {El Haloui, M. and Kriouile, A.} } @conference {Harbouche2017, title = {Dynamic coalitional matching game approach for fair and swift data-gathering in wireless body sensor networks}, booktitle = {Proceedings - 2017 International Conference on Wireless Networks and Mobile Communications, WINCOM 2017}, year = {2017}, note = {cited By 0}, abstract = {Wireless Sensor Networks are deployed in different fields of application to gather data on the monitored environment. The Wireless Body Sensor Network (WBSN) is a wireless sensor network designed to monitor a human body vital and environment parameters. The design and development of such WBSN systems for health monitoring have been motivated by costly healthcare and propelled by the development of miniature health monitoring devices. This paper presents the architecture design of a preventive health care monitoring system. This architecture is designed for monitoring multiple patients in a hospital. It is based on a set of mobile data collectors and static sensors for analysis of various patient{\textquoteright}s parameters. The data collectors need to cooperate together in order to gather the data from the sensor nodes. The point of this paper is how to dynamically and effectively appoint and deploy several data collectors in the hospital to gather the measured data in minimal time. We formulate the problem as a coalitional matching game between patients and data collectors, and we propose a patientdata collector association algorithm that ensures fairness and minimum total course in the stable matchings. {\textcopyright} 2017 IEEE.}, doi = {10.1109/WINCOM.2017.8238179}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85041451720\&doi=10.1109\%2fWINCOM.2017.8238179\&partnerID=40\&md5=44ef24b18e66b8fb24573d73db99025f}, author = {Harbouche, A. and Elmachkour, M. and Djedi, N. and Erradi, M. and Kobbane, A.} } @conference {Assila2017, title = {A dynamic Stackelberg-Cournot game for competitive content caching in 5G networks}, booktitle = {Proceedings - 2017 International Conference on Wireless Networks and Mobile Communications, WINCOM 2017}, year = {2017}, note = {cited By 0}, abstract = {The main concept behind 5G mobile network is to expand the idea of small cell network (SCN) to create a cooperative network able to cache data in active nodes inside radio access and Core network. Caching technique is a workaround to deal with bottleneck in the Back-haul, as the capacity of the wireless links could not support the increasing demand for rich multimedia. In this perspective multiple contents providers are in competition for caching space of network operator base stations. In fact, the caching space is a limited resource due to the exponential traffic of mobile data and video consumption. It is in this perspective that mobile operators and contents providers find themselves linked in this market profit generating, and consequently linked also in the allocating cache and setting price issues. In this paper we propose a multi-Stackelberg game between multiple MNOs (leaders) and several CPs (followers) computing under the Cournot-Nash assumption. In the first step a multi-leader Stackelberg game between Multiple MNO, considered as the leaders, aims to define the price they charges the CPs to maximize their profit. In the second step a multi-follower Cournot game between the CPs, considered as the followers, compete to increase the space quantity they cache at the MNOs small base stations (SBS) to maximize also their profit and to improve the quality of service (QoS) of their users. Our goal is to find the price the MNOs will set and the quantity of contents that each CP will cache. In the pricing game, each MNO first sets the price. Then the CPs react with proposed quantities of Space to cache. Then after the MNO sets again an optimal price according to the prediction of each CP0s optimal strategies. Numerical results describe the structure of the Nash equilibrium and the optimal prices resulting from the MNOs and CPs optimal strategies. {\textcopyright} 2017 IEEE.}, doi = {10.1109/WINCOM.2017.8238184}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85041439197\&doi=10.1109\%2fWINCOM.2017.8238184\&partnerID=40\&md5=36792f2ffea42a36227d37ccdf8af78b}, author = {Assila, B. and Kobbaney, A. and Elmachkourz, M. and El Koutbi, M.} } @conference {Koutbi2017195, title = {Entropy-based framework dealing with error in software development effort estimation}, booktitle = {ENASE 2017 - Proceedings of the 12th International Conference on Evaluation of Novel Approaches to Software Engineering}, year = {2017}, note = {cited By 0}, pages = {195-202}, abstract = {Software engineering community often investigates the error concerning software development effort estimation as a part, and sometimes, as an improvement of an effort estimation technique. The aim of this paper is to propose an approach dealing with both model and attributes measurement error sources whatever the effort estimation technique used. To do that, we explore the concepts of entropy and fuzzy clustering to propose a new framework to cope with both error sources. The proposed framework has been evaluated with the COCOMO{\textquoteright}81 dataset and the Fuzzy Analogy effort estimation technique. The results are promising since the actual confidence interval percentages are closer to those proposed by the framework. {\textcopyright} 2017 by SCITEPRESS - Science and Technology Publications, Lda. All Rights Reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85025448467\&partnerID=40\&md5=59f6479705cc067ea76a34a1d85422dd}, author = {Koutbi, S.E. and Idri, A.} } @conference {Kobbane2017, title = {Foreword}, booktitle = {Proceedings - 2017 International Conference on Wireless Networks and Mobile Communications, WINCOM 2017}, year = {2017}, note = {cited By 0}, doi = {10.1109/WINCOM.2017.8238019}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85041601748\&doi=10.1109\%2fWINCOM.2017.8238019\&partnerID=40\&md5=b17c0b90bf6d6ab4bc5cb5be61f70c8c}, author = {Kobbane, A. and Ibrahimi, K.} } @conference {Khtira2017, title = {From data to big data: Moroccan public sector}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F129474}, year = {2017}, note = {cited By 0}, abstract = {Digitalization, interconnection, open data, and the use of internet and social media by governments and citizens have consequently leaded to an enormous growth of data in the public sector. As government data available increases, many big data initiatives have been launched by governments in order to derive insights and create new value in many areas. This paper details some concepts related to government data specifically open data and big data in order to draw the relationships between them and show its potential value. The article also brings into light the impact of digital progress, made so far in the Moroccan Administration, on the growth of data in the public sector, and presents first steps taken by the government toward big data era. In particular, we focus on social media, open government data and e-government initiatives. In addition, the paper showcases examples of applying advanced analytics in the public finances specifically in Tax Administration to uncover insights and make better decisions from large datasets. This article also overviews some challenges facing future big data initiatives in the Moroccan public sector and proposes recommendations to address them. {\textcopyright} 2017 Association for Computing Machinery.}, doi = {10.1145/3090354.3090401}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028471176\&doi=10.1145\%2f3090354.3090401\&partnerID=40\&md5=2637a68edcc8418376431b149ac707fe}, author = {Khtira, R. and Elasri, B. and Rhanoui, M.} } @article {ElAsri2017217, title = {From periphery to core: A temporal analysis of github contributors{\textquoteright} collaboration network}, journal = {IFIP Advances in Information and Communication Technology}, volume = {506}, year = {2017}, note = {cited By 0}, pages = {217-229}, abstract = {Open-source projects in GitHub exhibit rich temporal dynamics, and diverse contributors{\textquoteright} social interactions further intensify this process. In this paper, we analyze temporal patterns associated with Open Source Software (OSS) projects and how the contributor{\textquoteright}s notoriety grows and fades over time in a core-periphery structure. In order to explore the temporal dynamics of GitHub communities we formulate a time series clustering model using both Social Network Analysis (SNA) and technical metrics. By applying an adaptive time frame incremental approach to clustering, we locate contributors in different temporal networks. We demonstrate our approach on five long-lived OSS projects involving more than 700 contributors and found that there are three main temporal shapes of attention when contributors shift from periphery to core. Our analyses provide insights into common temporal patterns of the growing OSS communities on GitHub and broaden the understanding of the dynamics and motivation of open source contributors. {\textcopyright} IFIP International Federation for Information Processing 2017.}, doi = {10.1007/978-3-319-65151-4_21}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85029582330\&doi=10.1007\%2f978-3-319-65151-4_21\&partnerID=40\&md5=741b4dffe841d068e54b517f5b1966c8}, author = {El Asri, I. and Kerzazi, N. and Benhiba, L. and Janati, M.} } @conference {El-Yahyaoui2017, title = {Fully homomorphic encryption: Searching over encrypted cloud data}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F129474}, year = {2017}, note = {cited By 0}, abstract = {Searching over encrypted data is a very important property that can offer some encryption schemes. It means performing queries on encrypted data in the absence of purpose to decryption, which permits to preserve confidentiality of sensitive data. Private Information Retrieval (PIR) is an essential protocol when selected information from remote databases is wanted to be done in secrecy. Fully homomorphic encryption is a revolutionary domain of cryptography that allows processing encrypted data without the need of any prior decryption, thus generating an encrypted result that corresponds the result of operations performed on the plaintext. In this paper we will exploit the important property that can offer the powerful fully homomorphic encryption to show how to realize a PIR protocol and how to search over encrypted data in a cloud context. {\textcopyright} 2017 Association for Computing Machinery.}, doi = {10.1145/3090354.3090364}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028468174\&doi=10.1145\%2f3090354.3090364\&partnerID=40\&md5=05718b11465e15a17c5d7408aa836911}, author = {El-Yahyaoui, A. and Ec-Chrif El Kettani, M.D.} } @conference {Mourchid20171315, title = {A game-theoretic approach for non-overlapping communities detection}, booktitle = {2017 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017}, year = {2017}, note = {cited By 1}, pages = {1315-1320}, abstract = {In this paper, we propose a game-theoretic approach to find the community structure in complex networks based on a non-cooperative game. This approach optimizes a node-based modularity for non-overlapping communities. Experiments show that our approach is effective to discover non-overlapping communities and obtain high values of modularity and Normalized Mutual Information (NMI) for real-world and synthetic networks in a reasonable time. {\textcopyright} 2017 IEEE.}, doi = {10.1109/IWCMC.2017.7986475}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027835444\&doi=10.1109\%2fIWCMC.2017.7986475\&partnerID=40\&md5=b0751b99b8a2552e780d327bef409ddf}, author = {Mourchid, F. and Kobbane, A. and Ben Othman, J. and El Koutbi, M.} } @article {Abderrahman2017210, title = {A hybrid algorithm for vehicle routing problem with time windows and target time}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {95}, number = {1}, year = {2017}, note = {cited By 0}, pages = {210-219}, abstract = {The routing of a fleet of vehicles to service a set of customers is important in the field of goods distribution. Vehicle routing problem with time windows (VRPTW) is a well-known combinatorial problem. This article aims at studying the vehicle routing problem with time windows and target time (VRPTWTT). VRPTWTT involves the routing of a set of vehicles with limited capacity from a central depot to a set of geographically dispersed customers with known demands and predefined time windows as well as a target time. There are penalties associated with servicing either earlier or later than this target servicing time. The goal is to minimize the costs of transport and penalties of delay and ahead of time. Although VRPTWTT is a new variant of the VRP with time windows, the problem is not easy to solve, and it is also NP-hard. To solve the VRPTWTT, we propose a hybrid method combining Neighborhood search with Ant Colony Optimization Algorithm (ACO). Furthermore, when ACO is close to current optimal solution, neighborhood search is used to maintain the diversity of ACO and explore new solutions. First, we present a description of the hybrid method followed by computational results and the conclusion. {\textcopyright} 2005 - 2017 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85010188946\&partnerID=40\&md5=ab0a6c69de17f1da6b246486211ec193}, author = {Abderrahman, A.a and Karim, E.B.b and Ahmed, E.H.A.a and Adil, B.b} } @article {ElFachtali2017154, title = {Improved vertical handover decision algorithm using ants{\textquoteright} colonies with adaptive pheromone evaporation rate for 4th generation heterogeneous wireless networks}, journal = {International Journal of Wireless and Mobile Computing}, volume = {12}, number = {2}, year = {2017}, note = {cited By 0}, pages = {154-165}, abstract = {ACOR (Ant Colony Optimisation for Continuous Domains) has been proved to be able to adapt to vertical handoff mechanism. Adaptation capabilities of ACO are due to the pheromone evaporation, where the rate is usually fixed as it is done for vertical handover decision algorithm using ant colonies for 4G heterogeneous wireless networks. An adaptive pheromone evaporation rate (PER) is more suitable. High PER will eliminate the high intensity of pheromone trails that represent bad solutions from previous environments, while low PER may be more interesting when we have stagnation behaviours to minimise power consumption. In this paper, an update version of vertical handover decision algorithm using ant colonies for 4G heterogeneous wireless networks is proposed to vary the evaporation rate at different stages of the optimisation process. Simulation results show that ACOR with adaptive pheromone evaporation rate (ACOR APER) achieves promising results, when compared to the original ACOR and ACOR LPER (ACOR with low pheromone evaporation rate) with a fixed pheromone evaporation rate. Copyright {\textcopyright} 2017 Inderscience Enterprises Ltd.}, doi = {10.1504/IJWMC.2017.084181}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019724918\&doi=10.1504\%2fIJWMC.2017.084181\&partnerID=40\&md5=e6d37478e0a2f4e257a4dd563e20dd01}, author = {El Fachtali, I. and Saadane, R. and El Koutbi, M.} } @article {Kadi201712, title = {Knowledge discovery in cardiology: A systematic literature review}, journal = {International Journal of Medical Informatics}, volume = {97}, year = {2017}, note = {cited By 0}, pages = {12-32}, abstract = {Context Data mining (DM) provides the methodology and technology needed to transform huge amounts of data into useful information for decision making. It is a powerful process employed to extract knowledge and discover new patterns embedded in large data sets. Data mining has been increasingly used in medicine, particularly in cardiology. In fact, DM applications can greatly benefit all those involved in cardiology, such as patients, cardiologists and nurses. Objective The purpose of this paper is to review papers concerning the application of DM techniques in cardiology so as to summarize and analyze evidence regarding: (1) the DM techniques most frequently used in cardiology; (2) the performance of DM models in cardiology; (3) comparisons of the performance of different DM models in cardiology. Method We performed a systematic literature review of empirical studies on the application of DM techniques in cardiology published in the period between 1 January 2000 and 31 December 2015. Results A total of 149 articles published between 2000 and 2015 were selected, studied and analyzed according to the following criteria: DM techniques and performance of the approaches developed. The results obtained showed that a significant number of the studies selected used classification and prediction techniques when developing DM models. Neural networks, decision trees and support vector machines were identified as being the techniques most frequently employed when developing DM models in cardiology. Moreover, neural networks and support vector machines achieved the highest accuracy rates and were proved to be more efficient than other techniques. {\textcopyright} 2016 Elsevier Ireland Ltd}, doi = {10.1016/j.ijmedinf.2016.09.005}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84988689033\&doi=10.1016\%2fj.ijmedinf.2016.09.005\&partnerID=40\&md5=9bd4f89bacb9b8dea94dd1f7eefef431}, author = {Kadi, I.a and Idri, A.b and Fern{\'a}ndez-Alem{\'a}n, J.L.b} } @article { ISI:000390485500002, title = {Knowledge discovery in cardiology: A systematic literature review}, journal = {INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS}, volume = {97}, year = {2017}, month = {JAN}, pages = {12-32}, abstract = {Context: Data mining (DM) provides the methodology and technology needed to transform huge amounts of data into useful information for decision making. It is a powerful process employed to extract knowledge and discover new patterns embedded in large data sets. Data mining has been increasingly used in medicine, particularly in cardiology. In fact, DM applications can greatly benefit all those involved in cardiology, such as patients, cardiologists and nurses. Objective: The purpose of this paper is to review papers concerning the application of DM techniques in cardiology so as to summarize and analyze evidence regarding: (1) the DM techniques most frequently used in cardiology; (2) the performance of DM models in cardiology; (3) comparisons of the performance of different DM models in cardiology. Method: We performed a systematic literature review of empirical studies on the application of DM techniques in cardiology published in the period between 1 January 2000 and 31 December 2015. Results: A total of 149 articles published between 2000 and 2015 were selected, studied and analyzed according to the following criteria: DM techniques and performance of the approaches developed. The results obtained showed that a significant number of the studies selected used classification and prediction techniques when developing DM models. Neural networks, decision trees and support vector machines were identified as being the techniques most frequently employed when developing DM models in cardiology. Moreover, neural networks and support vector machines achieved the highest accuracy rates and were proved to be more efficient than other techniques. (C) 2016 Elsevier Ireland Ltd. All rights reserved.}, issn = {1386-5056}, doi = {10.1016/j.ijmedinf.2016.09.005}, author = {Kadi, I. and Idri, A. and Fernandez-Aleman, J. L.} } @article {Kadi201712, title = {Knowledge discovery in cardiology: A systematic literature review}, journal = {International Journal of Medical Informatics}, volume = {97}, year = {2017}, note = {cited By 6}, pages = {12-32}, abstract = {Context Data mining (DM) provides the methodology and technology needed to transform huge amounts of data into useful information for decision making. It is a powerful process employed to extract knowledge and discover new patterns embedded in large data sets. Data mining has been increasingly used in medicine, particularly in cardiology. In fact, DM applications can greatly benefit all those involved in cardiology, such as patients, cardiologists and nurses. Objective The purpose of this paper is to review papers concerning the application of DM techniques in cardiology so as to summarize and analyze evidence regarding: (1) the DM techniques most frequently used in cardiology; (2) the performance of DM models in cardiology; (3) comparisons of the performance of different DM models in cardiology. Method We performed a systematic literature review of empirical studies on the application of DM techniques in cardiology published in the period between 1 January 2000 and 31 December 2015. Results A total of 149 articles published between 2000 and 2015 were selected, studied and analyzed according to the following criteria: DM techniques and performance of the approaches developed. The results obtained showed that a significant number of the studies selected used classification and prediction techniques when developing DM models. Neural networks, decision trees and support vector machines were identified as being the techniques most frequently employed when developing DM models in cardiology. Moreover, neural networks and support vector machines achieved the highest accuracy rates and were proved to be more efficient than other techniques. {\textcopyright} 2016 Elsevier Ireland Ltd}, doi = {10.1016/j.ijmedinf.2016.09.005}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84988689033\&doi=10.1016\%2fj.ijmedinf.2016.09.005\&partnerID=40\&md5=9bd4f89bacb9b8dea94dd1f7eefef431}, author = {Kadi, I. and Idri, A. and Fernandez-Aleman, J.L.} } @article {Kerzazi2017247, title = {Knowledge flows within open source software projects: A social network perspective}, journal = {Lecture Notes in Electrical Engineering}, volume = {397}, year = {2017}, note = {cited By 0}, pages = {247-258}, abstract = {Developing software is knowledge-intensive activity, requiring extensive technical knowledge and awareness. The abstract part of development is the social interactions that drive knowledge flows between contributors, especially for Open Source Software (OSS). This study investigated knowledge sharing and propagation from social perspective using social network analysis (SNA). We mined and analyzed the issue and review histories of three OSS from GitHub. Particular attention has been paid to the socio-interactions through comments from contributors on reviews. We aim at explaining the propagation and density of knowledge flows within contributor networks. The results show that review requests flow from the core contributors toward peripheral contributors and comments on reviews are in a continuous loop from the core teams to the peripherals and back; and the core contributors leverage on their awareness and technical knowledge to increase their notoriety by playing the role of communication brokers supported by comments on work items. {\textcopyright} Springer Science+Business Media Singapore 2017.}, doi = {10.1007/978-981-10-1627-1_19}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84996606731\&doi=10.1007\%2f978-981-10-1627-1_19\&partnerID=40\&md5=a2da5970c55b3e81dc2e09bda67e1649}, author = {Kerzazi, N. and El Asri, I.} } @conference {Amine20171245, title = {A many-to-many matching game in ultra-dense LTE HetNets}, booktitle = {2017 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017}, year = {2017}, note = {cited By 0}, pages = {1245-1250}, abstract = {In this work, we focus our study to improving the energy efficiency of mobile cellular users in ultra-dense LTE HetNets. The hyper-dense co-channel deployment of indoor LTE small cell networks (SCNs) within LTE macro cell networks (MCNs) will aggravate the effect of cross-tier interferences caused by the uplink transmissions of macro-indoor users located inside the overlapping zones of small base station (SBS) coverage areas. Hence, degrading the uplink performance at the level of SBSs adopting closed access policy. In order to eliminate the severe cross-tier interferences, each SBS attempts to open the access for macro-indoor users that accept only the SBS with Max-SINR offer. This will lead to network congestion problems in several SCNs. Wherefore, we formulate our problem as a many-to-many matching game. Then, we introduce an algorithm that computes the optimal many-to-many stable matching which consist of assigning each macro-indoor user with multi-homing capabilities to the most suitable set of SBSs and vice versa based on their preference profiles. With regard to the conventional Max-SINR association scheme, our solution can effectively improve the energy efficiency of cellular users. Moreover, it can ensure load balancing in ultra-dense LTE HetNets. {\textcopyright} 2017 IEEE.}, doi = {10.1109/IWCMC.2017.7986463}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027886532\&doi=10.1109\%2fIWCMC.2017.7986463\&partnerID=40\&md5=a4a95449b5ea20b54454dcf7b7bd1e59}, author = {Amine, M. and Walid, A. and Kobbane, A. and Cherkaoui, S.} } @conference {Azougaghe2017, title = {Many-to-one matching game towards secure virtual machines migration in cloud computing}, booktitle = {2016 International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 - Proceedings}, year = {2017}, note = {cited By 0}, abstract = {Virtual machine migration represents a new topic of research last years. In this context, we present a new system based on matching game theory to design efficient and practical migration algorithms that work well with huge numbers of VMs and servers. This strategy solves VM migration, resources managements and load balancing problems in cloud computing environment. The experimental results show that our algorithm not only obtains multi-resource load balancing performance but also improves the cloud security services and gets a gain of resources consummation on all servers. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ACOSIS.2016.7843922}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85015191060\&doi=10.1109\%2fACOSIS.2016.7843922\&partnerID=40\&md5=6b59b3295f8598830c0771717fb9a86b}, author = {Azougaghe, A. and Oualhaj, O.A. and Hedabou, M. and Belkasmi, M. and Kobbane, A.} } @conference {Aznabet2017757, title = {Meander-line UHF RFID tag antenna loaded with split ring rersonator}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2017}, note = {cited By 0}, pages = {757-759}, abstract = {In this paper, a new meander line UHF RFID tag antenna loaded with split ring resonator is presented. The antenna has a simple structure and low profile with only one layer of FR4 dielectric substrate and metallization. To achieve a good and impedance matching, the antenna has been loaded with a metamaterial structure (SRR). The obtained impedance bandwidth covers the American band (900-928 MHz). The proposed design provided quasi omnidirectional radiation pattern and radiation efficiency near to 90\% in the operating band. The calculated reading range was 4.36 m at center frequency band. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ICMCS.2016.7905576}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019056816\&doi=10.1109\%2fICMCS.2016.7905576\&partnerID=40\&md5=b094791a81d82959bf07b08b899c289d}, author = {Aznabet, I. and Ennasar, M. and El Mrabet, O. and Tedjini, S. and Khalladi, M.} } @article {Harbouche20171339, title = {Model driven flexible design of a wireless body sensor network for health monitoring}, journal = {Computer Networks}, volume = {129}, year = {2017}, note = {cited By 1}, pages = {1339-1351}, abstract = {The Wireless Body Sensor Network (WBSN) is a wireless network that is designed to allow communication among sensor nodes that are attached to a human body to monitor the body{\textquoteright}s vital parameters and environment. The design and development of such WBSN systems for health monitoring have received a large amount of attention recently, in research studies and in industry. This attention is mainly motivated by costly health care and by recent advances in the development of miniature health monitoring devices as well as emerging technologies, such as the Internet of Things (IoT), which contribute to the main challenges of 5G. The existence of an explicit approach to address the required software design and verification should be very beneficial for the construction and maintenance of such systems. This paper presents a preventive health care system that has a flexible design. The proposed system is based on an architecture that has heterogeneous nodes and provides both daily continuous monitoring as well as specific controls. We defined a model to describe the WBSN{\textquoteright}s global behavior. An important aspect of this work is that we propose a model-driven engineering (MDE) approach to address the derivation of each node{\textquoteright}s behavior in the WBSN from the WBSN global behavior. This approach allows developers to obtain a system design from the global specification of its requirement. To ensure the conformance of this design to its specification, the derived behaviors should be validated and verified before their deployment. In fact, formal methods are powerful tools for software engineers to verify the logical correctness of concurrent software at different levels of its life cycle. Model checking is one of the most powerful formal methods for verifying the logical correctness of such concurrent systems. In this work, we make use of a model checking approach that is based on a model transformation to validate the automatically derived behavior of a WBSN for health monitoring. This model-driven approach will check whether the derived system behaves correctly according to its global specification, while the objective is to increase the system{\textquoteright}s performance and QoS. This approach allows the developer to reason about a model of the global system rather than about the system itself. {\textcopyright} 2017 Elsevier B.V.}, doi = {10.1016/j.comnet.2017.06.014}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85022027303\&doi=10.1016\%2fj.comnet.2017.06.014\&partnerID=40\&md5=3d665e7ff240e8a6d9564857abf695da}, author = {Harbouche, A. and Djedi, N. and Erradi, M. and Ben-Othman, J. and Kobbane, A.} } @article {Patel201792, title = {A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems}, journal = {Computers and Security}, volume = {64}, year = {2017}, note = {cited By 3}, pages = {92-109}, abstract = {Smart Grid (SG) systems are critical, intelligent infrastructure utility services connected through open networks that are potentially susceptible to cyber-attacks with very acute security risks of shutdown, loss of life, and loss of revenue. Traditional intrusion detection systems based on signature and anomaly techniques are no longer sufficient to protect SGs due to their new connectivity and management challenges, the ever-rapidly-evolving masquerades, and cyber criminality levied against them. SGs require cyber-security systems to render them resilient and protected through advanced Intrusion Detection and Prevention System (IDPS) techniques and mechanisms. This paper proposes a smart collaborative advanced IDPS to provide the best possible protection of SGs with a fully distributed management structure that supports the network and host based detections and the prevention of attacks. By facilitating a reliable, scalable, and flexible design, the specific requirements of IDPS for SGs can be more easily met via a fuzzy risk analyzer, an independent and ontology knowledge-based inference engine module. These can work collaboratively by managing functions across multiple IDPS domains. A set of extensive and intensive simulated experiments shows that with its smart advanced components incorporating soft computing machine-learning techniques and a rich ontology knowledge base with fuzzy logic analysis, it detects and prevents intrusions more efficiently. The multi-faceted results of the simulation also show that the proposed Collaborative Smart IDPS (CSIDPS) system increases the intrusion detection accuracy and decreases the false positive alarms when compared to traditional IDPSs. This is epitomized by the skillful use of the confusion matrix technique for organizing classifiers, visualizing their performance, and assessing their overall behavior. In the final analysis, the CSIDPS architecture is designed toward contributing to de facto norms for SG ecosystems. {\textcopyright} 2016 Elsevier Ltd}, doi = {10.1016/j.cose.2016.07.002}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84994874812\&doi=10.1016\%2fj.cose.2016.07.002\&partnerID=40\&md5=5f6f90e6647d272108664e9c5f43cf5e}, author = {Patel, A. and Alhussian, H. and Pedersen, J.M. and Bounabat, B. and J{\'u}nior, J.C. and Katsikas, S.} } @article { ISI:000389092100006, title = {A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems}, journal = {COMPUTERS \& SECURITY}, volume = {64}, year = {2017}, month = {JAN}, pages = {92-109}, abstract = {Smart Grid (SG) systems are critical, intelligent infrastructure utility services connected through open networks that are potentially susceptible to cyber-attacks with very acute security risks of shutdown, loss of life, and loss of revenue. Traditional intrusion detection systems based on signature and anomaly techniques are no longer sufficient to protect SGs due to their new connectivity and management challenges, the ever-rapidly-evolving masquerades, and cyber criminality levied against them. SGs require cyber-security systems to render them resilient and protected through advanced Intrusion Detection and Prevention System (IDPS) techniques and mechanisms. This paper proposes a smart collaborative advanced IDPS to provide the best possible protection of SGs with a fully distributed management structure that supports the network and host based detections and the prevention of attacks. By facilitating a reliable, scalable, and flexible design, the specific requirements of IDPS for SGs can be more easily met via a fuzzy risk analyzer, an independent and ontology knowledge based inference engine module. These can work collaboratively by managing functions across multiple IDPS domains. A set of extensive and intensive simulated experiments shows that with its smart advanced components incorporating soft computing machine-learning techniques and a rich ontology knowledge base with fuzzy logic analysis, it detects and prevents intrusions more efficiently. The multi-faceted results of the simulation also show that the proposed Collaborative Smart IDPS (CSIDPS) system increases the intrusion detection accuracy and decreases the false positive alarms when compared to traditional IDPSs. This is epitomized by the skillful use of the confusion matrix technique for organizing classifiers, visualizing their performance, and assessing their overall behavior. In the final analysis, the CSIDPS architecture is designed toward contributing to de facto norms for SG ecosystems. (C) 2016 Elsevier Ltd. All rights reserved.}, issn = {0167-4048}, doi = {10.1016/j.cose.2016.07.002}, author = {Patel, Ahmed and Alhussian, Hitham and Pedersen, Jens Myrup and Bounabat, Bouchaib and Celestino Junior, Joaquim and Katsikas, Sokratis} } @article {Patel201792, title = {A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems}, journal = {Computers and Security}, volume = {64}, year = {2017}, note = {cited By 0}, pages = {92-109}, abstract = {Smart Grid (SG) systems are critical, intelligent infrastructure utility services connected through open networks that are potentially susceptible to cyber-attacks with very acute security risks of shutdown, loss of life, and loss of revenue. Traditional intrusion detection systems based on signature and anomaly techniques are no longer sufficient to protect SGs due to their new connectivity and management challenges, the ever-rapidly-evolving masquerades, and cyber criminality levied against them. SGs require cyber-security systems to render them resilient and protected through advanced Intrusion Detection and Prevention System (IDPS) techniques and mechanisms. This paper proposes a smart collaborative advanced IDPS to provide the best possible protection of SGs with a fully distributed management structure that supports the network and host based detections and the prevention of attacks. By facilitating a reliable, scalable, and flexible design, the specific requirements of IDPS for SGs can be more easily met via a fuzzy risk analyzer, an independent and ontology knowledge-based inference engine module. These can work collaboratively by managing functions across multiple IDPS domains. A set of extensive and intensive simulated experiments shows that with its smart advanced components incorporating soft computing machine-learning techniques and a rich ontology knowledge base with fuzzy logic analysis, it detects and prevents intrusions more efficiently. The multi-faceted results of the simulation also show that the proposed Collaborative Smart IDPS (CSIDPS) system increases the intrusion detection accuracy and decreases the false positive alarms when compared to traditional IDPSs. This is epitomized by the skillful use of the confusion matrix technique for organizing classifiers, visualizing their performance, and assessing their overall behavior. In the final analysis, the CSIDPS architecture is designed toward contributing to de facto norms for SG ecosystems. {\textcopyright} 2016 Elsevier Ltd}, doi = {10.1016/j.cose.2016.07.002}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84994874812\&doi=10.1016\%2fj.cose.2016.07.002\&partnerID=40\&md5=5f6f90e6647d272108664e9c5f43cf5e}, author = {Patel, A.a b and Alhussian, H.c and Pedersen, J.M.d and Bounabat, B.e and J{\'u}nior, J.C.a and Katsikas, S.f} } @conference {Koulou2017665, title = {A novel approach IMA of interoperability measurement}, booktitle = {Colloquium in Information Science and Technology, CIST}, year = {2017}, note = {cited By 0}, pages = {665-669}, abstract = {Developing inter organizational collaboration implies that the degree of interoperability is periodically evaluated and improved. This paper aims initially at presenting the basic concepts relating to the measurement of interoperability degree. In a second stage, it proposes a novel approach for interoperability assessment. This approach takes into account all the significant aspects such potentiality, compatibility and operational performance. {\textcopyright} 2016 IEEE.}, doi = {10.1109/CIST.2016.7804969}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85010192497\&doi=10.1109\%2fCIST.2016.7804969\&partnerID=40\&md5=63cac73dbc8956031f87a0fdc4d25f97}, author = {Koulou, A.a and El Hami, N.a and Hmina, N.a and Elmir, A.b and Bounabat, B.b} } @conference {Koulou2017665, title = {A novel approach IMA of interoperability measurement}, booktitle = {Colloquium in Information Science and Technology, CIST}, year = {2017}, note = {cited By 0}, pages = {665-669}, abstract = {Developing inter organizational collaboration implies that the degree of interoperability is periodically evaluated and improved. This paper aims initially at presenting the basic concepts relating to the measurement of interoperability degree. In a second stage, it proposes a novel approach for interoperability assessment. This approach takes into account all the significant aspects such potentiality, compatibility and operational performance. {\textcopyright} 2016 IEEE.}, doi = {10.1109/CIST.2016.7804969}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85010192497\&doi=10.1109\%2fCIST.2016.7804969\&partnerID=40\&md5=63cac73dbc8956031f87a0fdc4d25f97}, author = {Koulou, A. and El Hami, N. and Hmina, N. and Elmir, A. and Bounabat, B.} } @conference {Khoufi2017, title = {Path planning of mobile sinks in charge of data gathering: A coalitional game theory approach}, booktitle = {2016 IEEE 35th International Performance Computing and Communications Conference, IPCCC 2016}, year = {2017}, note = {cited By 0}, abstract = {Game theory is often used to find equilibria where no player can unilaterally increase its own payoff by changing its strategy without changing the strategies of other players. In this paper, we propose to use coalition formation to compute the optimized tours of mobile sinks in charge of collecting data from static wireless sensor nodes. Mobile sinks constitute a very attractive solution for wireless sensor networks, WSNs, where the application requirements in terms of node autonomy are very strong unlike the requirement in terms of latency. Mobile sinks allow wireless sensor nodes to save energy The associated coalition formation problem has a stable solution given by the final partition obtained. However, the order in which the players play has a major impact on the final result. We determine the best order to minimize the number of mobile sinks needed. We evaluate the complexity of this coalitional game as well as the impact of the number of collect points per surface unit on the number of mobile sinks needed and on the maximum tour duration of these mobile sinks. In addition, we show how to extend the coalitional game to support different latencies for different types of data. Finally, we formalize our problem as an optimization problem and we perform a comparative evaluation. {\textcopyright} 2016 IEEE.}, doi = {10.1109/PCCC.2016.7820637}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85013413857\&doi=10.1109\%2fPCCC.2016.7820637\&partnerID=40\&md5=3c4a3fe9d6f76ca57b380ffcb337856d}, author = {Khoufi, I. and Minet, P. and Koulali, M.-A. and Kobbane, A.} } @conference {ElFachtali2017824, title = {Power-optimized vertical handover scheme for 4th generation heterogeneous wireless network}, booktitle = {Colloquium in Information Science and Technology, CIST}, year = {2017}, note = {cited By 0}, pages = {824-829}, abstract = {Minimizing the total power consumption required for vertical handovers in 4th generation heterogeneous wireless networks is as important as providing users with the best QoS(Quality of Service) continuously. This letter proposes a vertical handover scheme to minimize the total power consumption required for a vertical handover in 4th generation heterogeneous wireless networks, while guaranteeing a particular QoS. The proposed scheme is based on an updated Tabu-search scheme, which helps to efficiently explore the network in order to find an optimal solution and to provide a service performance that adheres to predefined service level agreements (SLA). Simulation results show that the proposed scheme can lead to lower total power consumption compared to the RSS (Received Signal Strength) based scheme. The proposed method can achieve promising results in terms of bandwidth, security and cost of service, while minimizing the power consumption. {\"\i}{\textquestiondown}{\textonehalf} 2016 IEEE.}, doi = {10.1109/CIST.2016.7805001}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85010224341\&doi=10.1109\%2fCIST.2016.7805001\&partnerID=40\&md5=34fca482e3ee5b9533ec0539843e2bb7}, author = {El Fachtali, I. and Saadane, R. and El Koutbi, M. and Chaibi, H.} } @conference {ElFachtali2017824, title = {Power-optimized vertical handover scheme for 4th generation heterogeneous wireless network}, booktitle = {Colloquium in Information Science and Technology, CIST}, year = {2017}, note = {cited By 0}, pages = {824-829}, abstract = {Minimizing the total power consumption required for vertical handovers in 4th generation heterogeneous wireless networks is as important as providing users with the best QoS(Quality of Service) continuously. This letter proposes a vertical handover scheme to minimize the total power consumption required for a vertical handover in 4th generation heterogeneous wireless networks, while guaranteeing a particular QoS. The proposed scheme is based on an updated Tabu-search scheme, which helps to efficiently explore the network in order to find an optimal solution and to provide a service performance that adheres to predefined service level agreements (SLA). Simulation results show that the proposed scheme can lead to lower total power consumption compared to the RSS (Received Signal Strength) based scheme. The proposed method can achieve promising results in terms of bandwidth, security and cost of service, while minimizing the power consumption. {\textcopyright} 2016 IEEE.}, doi = {10.1109/CIST.2016.7805001}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85010224341\&doi=10.1109\%2fCIST.2016.7805001\&partnerID=40\&md5=34fca482e3ee5b9533ec0539843e2bb7}, author = {El Fachtali, I.a and Saadane, R.b and El Koutbi, M.a and Chaibi, H.a} } @conference {Khaldi2017, title = {Prediction of supplier performance: A novel DEA-ANFIS based approach}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F129474}, year = {2017}, note = {cited By 0}, abstract = {The focus of this paper is on investigating the feasibility of using ANFIS combined with DEA for supplier{\textquoteright}s post-evaluation. The proposed framework aims at modeling performance measurement, and forecasting of a selected hospital{\textquoteright}s drug suppliers. Even though it is broadly employed as a benchmarking tool to evaluate DMUs efficiency, DEA can hardly be used to predict the performance of unseen DMUs. For this reason, ANFIS model has been integrated to DEA due to its nonlinear mapping, strong generalization capabilities and pattern prediction functionalities. DEA based BCC model is used to evaluate the efficiency scores of a set of suppliers, then ANFIS intervenes to learn DEA patterns and to forecast the performance of new suppliers. The results of this research highlight the prediction power of the proposed model in a new scope. They present it as an efficient benchmarking tool and a promising decision support system applied at the operational level. {\textcopyright} 2017 Association for Computing Machinery.}, doi = {10.1145/3090354.3090416}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028459962\&doi=10.1145\%2f3090354.3090416\&partnerID=40\&md5=da01d9720d77f4831205623526bfc9d9}, author = {Khaldi, R. and Chiheb, R. and El Afia, A. and Akaaboune, A. and Faizi, R.} } @conference {Kadi2017, title = {Quality evaluation of cardiac decision support systems using ISO 25010 standard}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, year = {2017}, note = {cited By 0}, abstract = {Clinical decision support system (CDSS) is a technology designed to assist physicians and medical stuff with clinical decision-making tasks. It aims to better the safety and quality of patient care, improve patient care treatments and outcomes, decrease the dependence on memory, lower error rates, and decrease response time. CDSS is not intended to replace clinician judgment, but it supports users with the detection and prevention of possible risks to patient safety and encouraging the appropriate usage of evidence-based practice and guidelines. The benefits of the CDSSs contribute in increasing the number of e-health applications in recent years. Cardiology healthcare institutions are adopting such systems in their departments in order to assist cardiologists when making their decisions. This study proposes a set of cardiac DSS requirements and measures the influence of these requirements on software product quality using the ISO/IEC 25010 software quality model. A checklist of cardiac DSS requirements is also presented. As a result, Functional suitability, Reliability, Performance efficiency and Operability external characteristics were identified as the most influenced by cardiac DSS requirements. {\textcopyright} 2016 IEEE.}, doi = {10.1109/AICCSA.2016.7945657}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85021912425\&doi=10.1109\%2fAICCSA.2016.7945657\&partnerID=40\&md5=92b7b2292f1248fc9c7033b5d5bfe20e}, author = {Kadi, I. and Idri, A. and Ouhbi, S.} } @conference {Mourchid2017, title = {Random walk based co-occurrence prediction in location-based social networks}, booktitle = {IEEE International Conference on Communications}, year = {2017}, note = {cited By 0}, abstract = {In this paper, we propose a new version of the LBRW (Learning based Random Walk), LBRW-Co, for predicting users co-occurrence based on mobility homophily and social links. More precisely, we analyze and mine jointly spatio-temporal and social features with the aim to predict and rank users co-occurrences. Experiments are performed on the Foursquare LBSN with accurate and refined measurements. Experimental results demonstrate that our LBRW-Co model have substantial advantages over baseline approaches in predicting and ranking co-occurrence interactions. {\textcopyright} 2017 IEEE.}, doi = {10.1109/ICC.2017.7997209}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028326862\&doi=10.1109\%2fICC.2017.7997209\&partnerID=40\&md5=f865adbae7afd91e045cf307bb52ae7f}, author = {Mourchid, F. and Kobbane, A. and Ben Othman, J. and El Koutbi, M.} } @conference {ElAfia2017, title = {Supervised learning in branch-and-cut strategies}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F129474}, year = {2017}, note = {cited By 0}, abstract = {Branch-and-Cut is a powerful algorithm used for solving MILP problems. It involves two main sub-algorithms: branch-and-bound and cutting plane. On the one hand, the branch-and-bound algorithm comprises two strategies that are node selection strategy and branching strategy. These two strategies in literature don{\textquoteright}t exploit information of each other,and variable branching strategy tryto find compromise between minimizing the number of processed nodes and minimizing solving time. On the other hand, cutting plane algorithmallow tightening bounds and reducing the number of processing nodes. Whereas the learning literature has been focused in dealing with just one strategy on the same time, we design a two-in-one strategy of branch-and-bound algorithm regarding the fact thatare intuitively dependent. In this perspective, we apply the well-known Support Vector Machine (SVM)algorithm to the well-known set of problems MIPLIB to learn the mentioned strategy that can be used to speed up the basic branch-and-bound algorithm. We use also cutting plane to speed up the algorithm. {\textcopyright} 2017 Association for Computing Machinery.}, doi = {10.1145/3090354.3090474}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028470798\&doi=10.1145\%2f3090354.3090474\&partnerID=40\&md5=bf88dbeb883a772c23ba54d4a017ef96}, author = {El Afia, A. and Kabbaj, M.M.} } @conference {Aitfares2017113, title = {Suspicious behavior detection of people by monitoring camera}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2017}, note = {cited By 0}, pages = {113-117}, abstract = {The analytic video is a very challenging area of research in computer vision. Ensure a high level of security in a public space monitored by a surveillance camera is a difficult task in recent years. Understanding people behaviors in real time allows the surveillance systems to analyze unusual events through the video frames. In this paper, we propose a new approach for detecting suspicious behavior of moving people. We are not interested in a simple motion detection of a moving object, but we analyze the trajectory of this latter; relying on the object motion vector. Once a suspicious behavior suddenly occurs in this trajectory, we segment and track this object during its motion within the camera{\textquoteright}s field of view. Experiments with real-world images validate the efficiency of the proposed approach. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ICMCS.2016.7905601}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019074005\&doi=10.1109\%2fICMCS.2016.7905601\&partnerID=40\&md5=72fbf7b2e7ea117ae6bf2217a9fdc658}, author = {Aitfares, W. and Kobbane, A. and Kriouile, A.} } @article {Walid201756, title = {Toward Eco-Friendly Smart Mobile Devices for Smart Cities}, journal = {IEEE Communications Magazine}, volume = {55}, number = {5}, year = {2017}, note = {cited By 0}, pages = {56-61}, abstract = {It is expected that the incessant use of SBSs by indoor mobile users to achieve high data rate and high energy efficiency for their smart mobile devices will drive ultra dense deployment of SCNs within MCNs, specifically in future smart cities. However, SCN densification has a hard effect on the deterioration of the energy efficiency and QoS throughput of mobile users equipped with smart mobile devices like smartphones, laptops, PDAs, and tablets. This degradation is due to the severe cross-tier interferences occurring in ultra dense co-channel deployments of SCNs within MCNs. The present article intends to study the energy efficiency of mobile users for better battery life management of their smart mobile devices through minimal energy consumption during their uplink transmissions. The proposed solution, based on a fully decentralized algorithm for sharing time access executed by SBSs and multi-homing capabilities of macrocellular users, improves the energy efficiency of mobile users for better battery life, and keeps their QoS throughput requirements. Therefore, it leads to the eco-friendly smart mobile devices required in future smart cities. The results validate our proposed solution and show the improvement achieved compared to the conventional access control mechanisms. Furthermore, our scheme requires no coordination among SBSs and macro base stations, which reduces the huge signaling overhead when using cooperative schemes. {\textcopyright} 2017 IEEE.}, doi = {10.1109/MCOM.2017.1600271}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019660063\&doi=10.1109\%2fMCOM.2017.1600271\&partnerID=40\&md5=72802ad5f91b7f2273d0c16e81e53251}, author = {Walid, A. and Kobbane, A. and Ben-Othman, J. and El Koutbi, M.} } @article {Badidi2017611, title = {Towards data-as-a-service provisioning with high-quality data}, journal = {Lecture Notes in Electrical Engineering}, volume = {397}, year = {2017}, note = {cited By 0}, pages = {611-623}, abstract = {Given the large amount of sensed data by IoT devices and various wireless sensor networks, traditional data services lack the necessary resources to store and process that data, as well as to disseminate high-quality data to a variety of potential consumers. In this paper, we propose a framework for Data as a Service (DaaS) provisioning, which relies on deploying DaaS services on the cloud and using a DaaS agency to mediate between data consumers and DaaS services using a publish/subscribe model. Furthermore, we describe a decision algorithm for the selection of appropriate DaaS services that can fulfill consumers{\textquoteright} requests for high-quality data. One of the benefits of the proposed approach is the elasticity of the cloud resources used by DaaS services. Moreover, the selection algorithm allows ranking DaaS services by matching their quality-of-data (QoD) offers against the QoD needs of the data consumer. {\textcopyright} Springer Science+Business Media Singapore 2017.}, doi = {10.1007/978-981-10-1627-1_48}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84996995662\&doi=10.1007\%2f978-981-10-1627-1_48\&partnerID=40\&md5=3699ddd8367859bcdb3853679e370f5f}, author = {Badidi, E.a and Routaib, H.b and El Koutbi, M.b} } @article {Badidi2017611, title = {Towards data-as-a-service provisioning with high-quality data}, journal = {Lecture Notes in Electrical Engineering}, volume = {397}, year = {2017}, note = {cited By 0}, pages = {611-623}, abstract = {Given the large amount of sensed data by IoT devices and various wireless sensor networks, traditional data services lack the necessary resources to store and process that data, as well as to disseminate high-quality data to a variety of potential consumers. In this paper, we propose a framework for Data as a Service (DaaS) provisioning, which relies on deploying DaaS services on the cloud and using a DaaS agency to mediate between data consumers and DaaS services using a publish/subscribe model. Furthermore, we describe a decision algorithm for the selection of appropriate DaaS services that can fulfill consumers{\textquoteright} requests for high-quality data. One of the benefits of the proposed approach is the elasticity of the cloud resources used by DaaS services. Moreover, the selection algorithm allows ranking DaaS services by matching their quality-of-data (QoD) offers against the QoD needs of the data consumer. {\textcopyright} Springer Science+Business Media Singapore 2017.}, doi = {10.1007/978-981-10-1627-1_48}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84996995662\&doi=10.1007\%2f978-981-10-1627-1_48\&partnerID=40\&md5=3699ddd8367859bcdb3853679e370f5f}, author = {Badidi, E. and Routaib, H. and El Koutbi, M.} } @conference {Kabbaj2017621, title = {Towards learning integral strategy of branch and bound}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2017}, note = {cited By 1}, pages = {621-626}, abstract = {Branch and bound is the preferred algorithm used for solving MILP problems. It involves two fundamental strategies that are node selection strategy and branching strategy. Whereas the learning literature has been focused in dealing with just one strategy on the same time, we design a two-in-one strategy of branch and bound algorithm regarding the fact that are intuitively dependent. To do so, we apply the well-known SVM algorithm to the well-known set of problems MIPLIP. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ICMCS.2016.7905626}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019169526\&doi=10.1109\%2fICMCS.2016.7905626\&partnerID=40\&md5=8e62cf880e3eed29131a425775a7fa21}, author = {Kabbaj, M.M. and El Afia, A.} } @conference {El-Yahyaoui2017, title = {A verifiable fully homomorphic encryption scheme to secure big data in cloud computing}, booktitle = {Proceedings - 2017 International Conference on Wireless Networks and Mobile Communications, WINCOM 2017}, year = {2017}, note = {cited By 0}, abstract = {Performing smart computations in a context of cloud computing and big data is highly appreciated today. Fully homomorphic encryption (FHE) is a smart category of encryption schemes that allows working with the data in its encrypted form. It permits us to preserve confidentiality of our sensible data and to benefit from cloud computing powers. Currently, it has been demonstrated by many existing schemes that the theory is feasible but the efficiency needs to be dramatically improved in order to make it usable for real applications. One subtle difficulty is how to efficiently handle the noise. This paper aims to introduce an efficient and verifiable FHE based on a new mathematic structure that is noise free. {\textcopyright}2017 IEEE.}, doi = {10.1109/WINCOM.2017.8238186}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85041451124\&doi=10.1109\%2fWINCOM.2017.8238186\&partnerID=40\&md5=1fa52d884b4c793832bb38dddfe4a232}, author = {El-Yahyaoui, A. and Ech-Chrif El Kettani, M.D.} } @article {Elhadjv20163239, title = {An accurate recognizer for basic Arabic sounds}, journal = {ARPN Journal of Engineering and Applied Sciences}, volume = {11}, number = {5}, year = {2016}, note = {cited By 0}, pages = {3239-3243}, abstract = {This paper is part of an ongoing work aiming to build an accurate Arabic sounds recognizer for teaching and learning purposes. Early phases of this work were dedicated to the development of a particular sound database from recitations of the Holy Quran to cover classical Arabic sounds; speech signals of this sound database were manually segmented and labelled on three levels: Word, phoneme, and allophone. Next, two baseline recognizers were built to validate the speech segmentation on both phoneme and allophone levels and also to test the feasibility of the sounds{\textquoteright} recognition intended target. This current phase considers the development of an elaborated recognizer, by considering the basic sounds and looking for their distinctive features (e.g. duration, energy, etc.) to determine which ones will be particularly helpful to identify the phonological variation of the basic sound. Here, we present the first results of the basic sounds recognition obtained so far. {\textcopyright} 2006-2016 Asian Research Publishing Network (ARPN).}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84961680252\&partnerID=40\&md5=b6050206ac83191694490b10877629ec}, author = {Elhadjv, Y.O.M.a b and Khelifa, M.O.M.c and Abdellah, Y.d and Belkasmi, M.c} } @article {Bennani20161, title = {Achieving QoS in Virtual MIMO systems: a satisfaction equilibrium analysis}, journal = {Eurasip Journal on Wireless Communications and Networking}, volume = {2016}, number = {1}, year = {2016}, note = {cited By 0}, pages = {1-13}, abstract = {This paper presents a game theoretic framework to analyze a cellular-WLAN heterogeneous network from a virtual multiple-input multiple-output (VMIMO) perspective. Namely, we restrict to the uplink case and consider a non-cooperative game where each user seeks to meet some quality of service (QoS). Moreover, mobile users are allowed to re-inject, through their WLAN interfaces, a part of their throughput in the induced game. Thus, the interaction among users defines a distributed VMIMO with a possibly throughput exchange. This mechanism will help all users to meet their respective QoS expressed by the perceived average throughput. The average throughput is considered to be the utility function used in this framework. Now, each mobile user experiences a certain throughput composed of two parts: (1) the throughput received from cellular subsystem and (2) the throughput received from WLAN subsystem. Naturally, we use the concept of satisfaction equilibrium to predict the behavior of the network. Indeed, we provided a sufficient condition for the existence of such an equilibrium. Next, we prove the uniqueness of the equilibrium and compute it explicitly. Afterward, we propose a fully distributed algorithm inspired from the well-known Banach-Picard learning algorithm. Our scheme has many good features facilitating its implementation and usability. Indeed, it accurately converges to the equilibrium (if exists), it is very fast, and it requires no external information. Simulation results validate the algorithm and show its robustness and illustrate numerically the proposed learning scheme for quality-of-service management in such a heterogeneous network. {\textcopyright} 2016, Bennani et al.}, doi = {10.1186/s13638-016-0612-6}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84966280664\&doi=10.1186\%2fs13638-016-0612-6\&partnerID=40\&md5=e67ac437a619c2d9ac7539dace4426e6}, author = {Bennani, H.a and Sabir, E.b and Kobbane, A.a and Ben-Othman, J.c and El-koutbi, M.a} } @article {11515935620160506, title = {Achieving QoS in Virtual MIMO systems: a satisfaction equilibrium analysis.}, journal = {EURASIP Journal on Wireless Communications \& Networking}, volume = {2016}, number = {1}, year = {2016}, pages = {1 - 13}, abstract = {This paper presents a game theoretic framework to analyze a cellular-WLAN heterogeneous network from a virtual multiple-input multiple-output (VMIMO) perspective. Namely, we restrict to the uplink case and consider a non-cooperative game where each user seeks to meet some quality of service (QoS). Moreover, mobile users are allowed to re-inject, through their WLAN interfaces, a part of their throughput in the induced game. Thus, the interaction among users defines a distributed VMIMO with a possibly throughput exchange. This mechanism will help all users to meet their respective QoS expressed by the perceived average throughput. The average throughput is considered to be the utility function used in this framework. Now, each mobile user experiences a certain throughput composed of two parts: (1) the throughput received from cellular subsystem and (2) the throughput received from WLAN subsystem. Naturally, we use the concept of satisfaction equilibrium to predict the behavior of the ne}, keywords = {Cellular/WLAN heterogeneous network, Equilibrium {\textendash} Research, Game theory, Game theory {\textendash} Research, MIMO systems {\textendash} Research, Quality of service, Quality of service {\textendash} Research, Satisfaction equilibrium, Virtual multiple input multiple output, Wireless LANs {\textendash} Research}, issn = {16871472}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=115159356\&site=ehost-live}, author = {Bennani, Hassan and Sabir, Essaid and Kobbane, Abdellatif and Ben-Othman, Jalel and El-Koutbi, Mohamed} } @article { ISI:000375569000001, title = {Achieving QoS in Virtual MIMO systems: a satisfaction equilibrium analysis}, journal = {EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING}, year = {2016}, month = {MAY 6}, abstract = {This paper presents a game theoretic framework to analyze a cellular-WLAN heterogeneous network from a virtual multiple-input multiple-output (VMIMO) perspective. Namely, we restrict to the uplink case and consider a non-cooperative game where each user seeks to meet some quality of service (QoS). Moreover, mobile users are allowed to re-inject, through their WLAN interfaces, a part of their throughput in the induced game. Thus, the interaction among users defines a distributed VMIMO with a possibly throughput exchange. This mechanism will help all users to meet their respective QoS expressed by the perceived average throughput. The average throughput is considered to be the utility function used in this framework. Now, each mobile user experiences a certain throughput composed of two parts: (1) the throughput received from cellular subsystem and (2) the throughput received from WLAN subsystem. Naturally, we use the concept of satisfaction equilibrium to predict the behavior of the network. Indeed, we provided a sufficient condition for the existence of such an equilibrium. Next, we prove the uniqueness of the equilibrium and compute it explicitly. Afterward, we propose a fully distributed algorithm inspired from the well-known Banach-Picard learning algorithm. Our scheme has many good features facilitating its implementation and usability. Indeed, it accurately converges to the equilibrium (if exists), it is very fast, and it requires no external information. Simulation results validate the algorithm and show its robustness and illustrate numerically the proposed learning scheme for quality-of-service management in such a heterogeneous network.}, issn = {1687-1499}, doi = {10.1186/s13638-016-0612-6}, author = {Bennani, Hassan and Sabir, Essaid and Kobbane, Abdellatif and Ben-Othman, Jalel and El-Koutbi, Mohamed} } @conference {Elmagrouni2016223, title = {Adaptation services-oriented systems lifecycle}, booktitle = {ICEIS 2016 - Proceedings of the 18th International Conference on Enterprise Information Systems}, volume = {1}, year = {2016}, note = {cited By 0}, pages = {223-231}, abstract = {This work presents the approach of the Development of adaptable Services-oriented Systems. Not the only adaptability is important for the survival and success of Services-oriented Systems, but it is also important for the rapid changes in technology, organizational structure, human perception and needs. This paper discusses the shortcomings of current solutions for adaptive service-oriented System. To address those shortcomings, some techniques are used to build and evolve proactive Services-oriented Systems. Using those techniques in an integrated way is described along the phases of the service lifecycle. Copyright {\textcopyright} 2016 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979595897\&partnerID=40\&md5=1993aed0e5aeac8391f702bdf1abe443}, author = {Elmagrouni, I.a and Kenzi, A.b and Lethrech, M.a and Kriouile, A.a} } @article { ISI:000389146000004, title = {ANALYSIS AND VERIFICATION OF XACML POLICIES IN A MEDICAL CLOUD ENVIRONMENT}, journal = {Scalable Computing-Practice and Experience}, volume = {17}, number = {3, SI}, year = {2016}, month = {SEP}, pages = {189-205}, abstract = {The connectivity of devices, machines and people via Cloud infrastructure can support collaborations among doctors and specialists from different medical organisations. Such collaborations may lead to data sharing and joint tasks and activities. Hence, the collaborating organisations are responsible for managing and protecting data they share. Therefore, they should define a set of access control policies regulating the exchange of data they own. However, existing Cloud services do not offer tools to analyse these policies. In this paper, we propose a Cloud Policy Verification Service (CPVS) for the analysis and the verification of access control policies specified using XACML. The analysis process detects anomalies at two policy levels: a) intra-policy: detects discrepancies between rules within a single security policy (conflicting rules and redundancies), and b) inter policies: detects anomalies between several security policies such as inconsistency and similarity. The verification process consists in verifying the completeness property which guarantees that each access request is either accepted or denied by the access control policy. In order to demonstrate the efficiency of our method, we also provide the time and space complexities. Finally, we present the implementation of our method and demonstrate how efficiently our approach can detect policy anomalies.}, issn = {1895-1767}, doi = {10.12694/scpe.v17i3.1180}, author = {Ayache, Meryeme and Erradi, Mohammed and Khoumsi, Ahmed and Freisleben, Bernd} } @article {Ayache2016189, title = {Analysis and verification of XACML policies in a medical cloud environment}, journal = {Scalable Computing}, volume = {17}, number = {3}, year = {2016}, note = {cited By 2}, pages = {189-205}, abstract = {The connectivity of devices, machines and people via Cloud infrastructure can support collaborations among doctors and specialists from different medical organisations. Such collaborations may lead to data sharing and joint tasks and activities. Hence, the collaborating organisations are responsible for managing and protecting data they share. Therefore, they should define a set of access control policies regulating the exchange of data they own. However, existing Cloud services do not offer tools to analyse these policies. In this paper, we propose a Cloud Policy Verification Service (CPVS) for the analysis and the verification of access control policies specified using XACML. The analysis process detects anomalies at two policy levels: a) intra-policy: detects discrepancies between rules within a single security policy (conflicting rules and redundancies), and b) interpolicies: detects anomalies between several security policies such as inconsistency and similarity. The verification process consists in verifying the completeness property which guarantees that each access request is either accepted or denied by the access control policy. In order to demonstrate the efficiency of our method, we also provide the time and space complexities. Finally, we present the implementation of our method and demonstrate how efficiently our approach can detect policy anomalies. {\textcopyright} 2016 SCPE.}, doi = {10.12694/scpe.v17i3.1180}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84986332574\&doi=10.12694\%2fscpe.v17i3.1180\&partnerID=40\&md5=86b782c01a2231027ed2e7308e178385}, author = {Ayache, M.a and Erradi, M.a and Khoumsi, A.b and Freisleben, B.c} } @article {11714990120160901, title = {ANALYSIS AND VERIFICATION OF XACML POLICIES IN A MEDICAL CLOUD ENVIRONMENT.}, journal = {Scalable Computing: Practice \& Experience}, volume = {17}, number = {3}, year = {2016}, pages = {189 - 205}, abstract = {The connectivity of devices, machines and people via Cloud infrastructure can support collaborations among doctors and specialists from different medical organisations. Such collaborations may lead to data sharing and joint tasks and activities. Hence, the collaborating organisations are responsible for managing and protecting data they share. Therefore, they should define a set of access control policies regulating the exchange of data they own. However, existing Cloud services do not offer tools to analyse these policies. In this paper, we propose a Cloud Policy Verification Service (CPVS) for the analysis and the verification of access control policies specified using XACML. The analysis process detects anomalies at two policy levels: a) intra-policy: detects discrepancies between rules within a single security policy (conflicting rules and redundancies), and b) interpolicies: detects anomalies between several security policies such as inconsistency and similarity. The verification}, keywords = {Automata, Cloud computing, Completeness, Data security, Formal Verification, Information storage \& retrieval systems {\textendash} Medical care, Security Anomaly Detection, XACML Policies}, issn = {18951767}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=117149901\&site=ehost-live}, author = {Ayache, Meryeme and Erradi, Mohammed and Khoumsi, Ahmed and Freisleben, Bernd} } @article {Kartit2016141, title = {Applying encryption algorithm for data security in cloud storage}, journal = {Lecture Notes in Electrical Engineering}, volume = {366}, year = {2016}, note = {cited By 0}, pages = {141-154}, abstract = {This paper proposes a simple, secure, and privacy-preserving architecture for inter-Cloud data sharing based on an encryption/decryption algorithm which aims to protect the data stored in the cloud from the unauthorized access. {\textcopyright} Springer Science+Business Media Singapore 2016.}, doi = {10.1007/978-981-287-990-5_12}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84959117395\&doi=10.1007\%2f978-981-287-990-5_12\&partnerID=40\&md5=5e4a7f778a62fb9bb090db998cc47f86}, author = {Kartit, Z.a and Azougaghe, A.b and Idrissi, H.K.a and Marraki, M.E.a and Hedabou, M.c and Belkasmi, M.b and Kartit, A.d} } @conference { ISI:000381755100012, title = {Applying Encryption Algorithm for Data Security in Cloud Storage}, booktitle = {ADVANCES IN UBIQUITOUS NETWORKING}, series = {Lecture Notes in Electrical Engineering}, volume = {366}, year = {2016}, note = {International Symposium on Ubiquitous Networking (UNet), Casablanca, MOROCCO, SEP 08-10, 2015}, pages = {141-154}, abstract = {This paper proposes a simple, secure, and privacy-preserving architecture for inter-Cloud data sharing based on an encryption/decryption algorithm which aims to protect the data stored in the cloud from the unauthorized access.}, isbn = {978-981-287-990-5; 978-981-287-989-9}, issn = {1876-1100}, doi = {10.1007/978-981-287-990-5\_12}, author = {Kartit, Zaid and Azougaghe, Ali and Kamal Idrissi, H. and El Marraki, M. and Hedabou, M. and Belkasmi, M. and Kartit, A.}, editor = {Sabir, E and Medromi, H and Sadik, M} } @conference { ISI:000389502600019, title = {An Approach to Resolve NP-Hard Problems of Firewalls}, booktitle = {Networked Systems, NETYS 2016}, series = {Lecture Notes in Computer Science}, volume = {9944}, year = {2016}, note = {4th International Conference on Networked Systems (NETYS), Marrakech, MOROCCO, MAY 18-20, 2016}, pages = {229-243}, abstract = {Firewalls are a common solution to protect information systems from intrusions. In this paper, we apply an automata-based methodology to resolve several NP-Hard problems which have been shown in the literature to be fundamental for the study of firewall security policies. We also compute space and time complexities of our resolution methods.}, isbn = {978-3-319-46140-3; 978-3-319-46139-7}, issn = {0302-9743}, doi = {10.1007/978-3-319-46140-3\_19}, author = {Khoumsi, Ahmed and Erradi, Mohamed and Ayache, Meryeme and Krombi, Wadie}, editor = {Abdulla, PA and DelporteGallet, C} } @article {Khoumsi2016229, title = {An approach to resolve NP-hard problems of firewalls}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {9944 LNCS}, year = {2016}, note = {cited By 0}, pages = {229-243}, abstract = {Firewalls are a common solution to protect information systems from intrusions. In this paper, we apply an automata-based methodology to resolve several NP-Hard problems which have been shown in the literature to be fundamental for the study of firewall security policies. We also compute space and time complexities of our resolution methods. {\textcopyright} Springer International Publishing AG 2016.}, doi = {10.1007/978-3-319-46140-3_19}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84990038429\&doi=10.1007\%2f978-3-319-46140-3_19\&partnerID=40\&md5=cd031e8992745830e08b31671e0e3416}, author = {Khoumsi, A.a and Erradi, M.b and Ayache, M.b and Krombi, W.b} } @conference { ISI:000382672700052, title = {Botched Releases: Do we Need to Roll Back? Empirical Study on a Commercial Web App}, booktitle = {2016 IEEE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), VOL 1}, year = {2016}, note = {23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER), Osaka, JAPAN, MAR 14-18, 2016}, pages = {574-583}, publisher = {IEEE; IEEE Comp Soc; IPA; Reengineering Forum; Informat Proc Soc Japan, Special Interest Grp Software Engn; Japan Soc Software Sci \& Technol, Special Interest Grp Fdn Software Engn; Osaka Univ, Grad Sch Informat Sci \& Technol; Mitsubishi Elect; Microsoft;}, organization = {IEEE; IEEE Comp Soc; IPA; Reengineering Forum; Informat Proc Soc Japan, Special Interest Grp Software Engn; Japan Soc Software Sci \& Technol, Special Interest Grp Fdn Software Engn; Osaka Univ, Grad Sch Informat Sci \& Technol; Mitsubishi Elect; Microsoft;}, abstract = {Few minutes after a web-based software release, the release team might encounter log traces showing the new system crashing, hanging, or having poor performance. This is the start of the most nerve-wrecking moments of a product{\textquoteright}s release cycle, i.e., should one run the risk of not doing anything and users losing precious data, or of prematurely engaging the tedious (and costly) roll-back procedure towards the previous release? Thus far, only little attention has been paid by researchers to these so-called {\textquoteleft}{\textquoteleft}botched releases{{\textquoteright}{\textquoteright}}, partly because of lack of release log data. This paper studies 345 releases of a large e-commerce web app over a period of 1.5 years, in which we identified 17 recurrent root causes of botched releases, classified into four major categories. We then build explanatory models to understand which root causes are the most important, and to explore the factors leading to botched releases.}, isbn = {978-1-5090-1855-0}, doi = {10.1109/SANER.2016.114}, author = {Kerzazi, Noureddine and Adams, Bram} } @conference { ISI:000385791400001, title = {Cardiovascular Dysautonomias Diagnosis Using Crisp and Fuzzy Decision Tree: A Comparative Study}, booktitle = {HEALTH INFORMATICS MEETS EHEALTH}, series = {Studies in Health Technology and Informatics}, volume = {223}, year = {2016}, note = {10th eHealth Conference on Predictive Modeling in Healthcare - From Prediction to Prevention, Vienna, AUSTRIA, MAY 24-25, 2016}, pages = {1-8}, abstract = {Decision trees (DTs) are one of the most popular techniques for learning classification systems, especially when it comes to learning from discrete examples. In real world, many data occurred in a fuzzy form. Hence a DT must be able to deal with such fuzzy data. In fact, integrating fuzzy logic when dealing with imprecise and uncertain data allows reducing uncertainty and providing the ability to model fine knowledge details. In this paper, a fuzzy decision tree (FDT) algorithm was applied on a dataset extracted from the ANS (Autonomic Nervous System) unit of the Moroccan university hospital Avicenne. This unit is specialized on performing several dynamic tests to diagnose patients with autonomic disorder and suggest them the appropriate treatment. A set of fuzzy classifiers were generated using FID 3.4. The error rates of the generated FDTs were calculated to measure their performances. Moreover, a comparison between the error rates obtained using crisp and FDTs was carried out and has proved that the results of FDTs were better than those obtained using crisp DTs.}, isbn = {978-1-61499-645-3; 978-1-61499-644-6}, issn = {0926-9630}, doi = {10.3233/978-1-61499-645-3-1}, author = {Kadi, Ilham and Idri, Ali}, editor = {Schreier, G and Ammenwerth, E and Horbst, A and Hayn, D} } @article {Kadi20161, title = {Cardiovascular dysautonomias diagnosis using crisp and fuzzy decision tree: A comparative study}, journal = {Studies in Health Technology and Informatics}, volume = {223}, year = {2016}, note = {cited By 1}, pages = {1-8}, abstract = {Decision trees (DTs) are one of the most popular techniques for learning classification systems, especially when it comes to learning from discrete examples. In real world, many data occurred in a fuzzy form. Hence a DT must be able to deal with such fuzzy data. In fact, integrating fuzzy logic when dealing with imprecise and uncertain data allows reducing uncertainty and providing the ability to model fine knowledge details. In this paper, a fuzzy decision tree (FDT) algorithm was applied on a dataset extracted from the ANS (Autonomic Nervous System) unit of the Moroccan university hospital Avicenne. This unit is specialized on performing several dynamic tests to diagnose patients with autonomic disorder and suggest them the appropriate treatment. A set of fuzzy classifiers were generated using FID 3.4. The error rates of the generated FDTs were calculated to measure their performances. Moreover, a comparison between the error rates obtained using crisp and FDTs was carried out and has proved that the results of FDTs were better than those obtained using crisp DTs. {\textcopyright} 2016 The authors and IOS Press.}, doi = {10.3233/978-1-61499-645-3-1}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84971622111\&doi=10.3233\%2f978-1-61499-645-3-1\&partnerID=40\&md5=cfdd88b310ce0f50679c1d487f776be3}, author = {Kadi, I. and Idri, A.} } @article {KamalIdrissi201642, title = {CKMSA: An anomaly detection process based on K-means and simulated annealing algorithms}, journal = {International Review on Computers and Software}, volume = {11}, number = {1}, year = {2016}, note = {cited By 0}, pages = {42-48}, abstract = {In modern years, countless researchers are interested in anomaly detection techniques for building intrusion detection systems (IDS). Intrusion detection is a process of recognizing attacks and intrusions. The IDS key purpose is to classify the Regular and Intrusive activities. Anomaly based IDS are built on an approach including first training a system with data in order to establish a certain view of normality and then use the determined profile on actual data to flag non-conformities. However, those kinds of IDS are highly vulnerable to mistaken alerts and present at the same time a very low detection rate when the learning is performed on misclassified data. Therefore, the need for an underlying clustering algorithm, which can process optimally the data grouping, is on agenda. In our paper, we combined two methods of clustering and optimization, namely K-means and Simulated Annealing, in order to achieve a global optimum classification for the data subject to learning and consequently avoid being limited to local optimum solutions. The K-Means in this work is used in its semi-supervised variant in order to lessen the number of times that the algorithm is applied and thus keep our work likely to be used in real time context. The developed algorithm has produced satisfactory results when applied on NSL-KDD data set, the tests reveal this method can enhance the detection and misdetection rates of intrusion detection systems. {\textcopyright} 2016 Praise Worthy Prize S.r.l. - All rights reserved.}, doi = {10.15866/irecos.v11i1.8272}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84964303661\&doi=10.15866\%2firecos.v11i1.8272\&partnerID=40\&md5=513c0be5ae8455ca16c42fff3214e690}, author = {Kamal Idrissi, H. and Kartit, Z. and Kartit, A. and El Marraki, M.} } @conference {Benali2016, title = {Cloud environment assignment: A context-aware and Dynamic Software Product Lines-based approach}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, volume = {2016-July}, year = {2016}, note = {cited By 0}, abstract = {With the increase in number of mobile devices deployed in cloud computing, the demand of context-aware services to assign increases. Indeed, Information about the user{\textquoteright}s environment exposes new challenges to cloud computing in terms of location-aware, time-aware, device-aware and personalized applications to cope with the constraints of mobile devices in matters of interaction abilities and communication restrictions. In addition, the user also needs context information about services provided by the provider. For instance, the user can check the availability of service, the response time of service, the cost, quality of the service and quality of context information. This paper proposes a software framework which supports context-awareness behavior to assign services to Consumers and especially mobile users. This framework is based on Dynamic Software Product Line approach to handle this variability and adaptation in context at runtime. In fact, changes can occur in the application context requiring the cloud environment to be reconfigured, for instance, non-functional requirements like response-time, availability or pricing are violated. {\textcopyright} 2015 IEEE.}, doi = {10.1109/AICCSA.2015.7507225}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84980328145\&doi=10.1109\%2fAICCSA.2015.7507225\&partnerID=40\&md5=79647337f4c5ee7fcb4c6e501857840d}, author = {Benali, A. and El Asri, B. and Kriouile, H.} } @article { ISI:000384105900002, title = {Coalitional game-based behavior analysis for spectrum access in cognitive radios}, journal = {WIRELESS COMMUNICATIONS \& MOBILE COMPUTING}, volume = {16}, number = {14}, year = {2016}, month = {OCT 10}, pages = {1910-1921}, abstract = {The core of cognitive radio paradigm is to introduce cognitive devices able to opportunistically access the licensed radio bands. The coexistence of licensed and unlicensed users prescribes an effective spectrum hole-detection and a non-interfering sharing of those frequencies. Collaborative resource allocation and spectrum information exchange are required but often costly in terms of energy and delay. In this paper, each secondary user (SU) can achieve spectrum sensing and data transmission through a coalitional game-based mechanism. SUs are called upon to report their sensing results to the elected coalition head, which properly decides on the channel state and the transmitter in each time slot according to a proposed algorithm. The goal of this paper is to provide a more holistic view on the spectrum and enhance the cognitive system performance through SUs behavior analysis. We formulate the problem as a coalitional game in partition form with non-transferable utility, and we investigate on the impact of both coalition formation and the combining reports costs. We discuss the Nash Equilibrium solution for our coalitional game and propose a distributed strategic learning algorithm to illustrate a concrete case of coalition formation and the SUs competitive and cooperative behaviors inter-coalitions and intra-coalitions. We show through simulations that cognitive network performances, the energy consumption and transmission delay, improve evidently with the proposed scheme. Copyright (c) 2016 John Wiley \& Sons, Ltd.}, issn = {1530-8669}, doi = {10.1002/wcm.2658}, author = {Belghiti, Imane Daha and Elmachkour, Mouna and Berrada, Ismail and Kobbane, Abdellatif and Ben-Othman, Jalel} } @conference { ISI:000386851600006, title = {A College Admissions Game for Content Caching in Heterogeneous Delay Tolerant Networks}, booktitle = {2016 23RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT)}, year = {2016}, note = {23rd International Conference on Telecommunications (ICT), Thessaloniki, GREECE, MAY 16-18, 2016}, abstract = {In recent years, Delay Tolerant Networks (DTNs) have been successfully presented as a possible extension of the Internet architecture in order to provide communication support to existing networks. However, these networks have a major issue which is the coordination among relays. In this paper, we propose a novel mechanism source-relay association approach for heterogeneous DTNs that exploits the information about the history and predictability of the relay nodes while also we focus on the source packet dissemination to a destination using tow-hop relaying scheme, considering network resource constraints: the relay buffer, the packet life time, and the energy consumption according to the mobile technologies. We formulate the problem as a college admissions game in which a number of colleges, i.e., data source seek to recruit a number of students, i.e., relays nodes. In this game, the data source and relays nodes rank one another based on preference functions that capture the data sources need to optimize their utilities which are functions of packet success rate and delay. We propose a novel distributed algorithm that leads to a stable matching among data sources and relays nodes. We show that the proposed approach can yields the better performance improvement of the traffic among the source and destination node.}, isbn = {978-1-5090-1990-8}, author = {Oualhaj, Omar Ait and Sabir, Essaid and Kobbane, Abdellatif and Ben-Othman, Jalel and El Koutbi, Mohammed} } @conference {Oualhaj2016, title = {A college admissions game for content caching in heterogeneous delay tolerant networks}, booktitle = {2016 23rd International Conference on Telecommunications, ICT 2016}, year = {2016}, note = {cited By 0}, abstract = {In recent years, Delay Tolerant Networks (DTNs) have been successfully presented as a possible extension of the Internet architecture in order to provide communication support to existing networks. However, these networks have a major issue which is the coordination among relays. In this paper, we propose a novel mechanism source-relay association approach for heterogeneous DTNs that exploits the information about the history and predictability of the relay nodes while also we focus on the source packet dissemination to a destination using tow-hop relaying scheme, considering network resource constraints: the relay buffer, the packet life time, and the energy consumption according to the mobile technologies. We formulate the problem as a college admissions game in which a number of colleges, i.e., data source seek to recruit a number of students, i.e., relays nodes. In this game, the data source and relays nodes rank one another based on preference functions that capture the data sources need to optimize their utilities which are functions of packet success rate and delay. We propose a novel distributed algorithm that leads to a stable matching among data sources and relays nodes. We show that the proposed approach can yields the better performance improvement of the traffic among the source and destination node. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ICT.2016.7500348}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979210767\&doi=10.1109\%2fICT.2016.7500348\&partnerID=40\&md5=641b2fc904d804463ca747bb6dedfe63}, author = {Oualhaj, O.A.a and Sabir, E.b and Kobbane, A.a c and Ben-Othman, J.c and Koutbi, M.E.a} } @conference {Azougaghe2016421, title = {An efficient algorithm for data security in Cloud storage}, booktitle = {International Conference on Intelligent Systems Design and Applications, ISDA}, volume = {2016-June}, year = {2016}, note = {cited By 0}, pages = {421-427}, abstract = {Cloud computing has now become a major trend, it is a new data hosting technology that is Very popular in recent years thanks to the amortization of costs it induces to companies. In this paper we present the major security issues in cloud computing and we also propose a simple, secure, and privacy-preserving architecture for inter-Cloud data sharing based on an encryption/decryption algorithm which aims to protect the data stored in the cloud from the unauthorized access. {\textcopyright} 2015 IEEE.}, doi = {10.1109/ISDA.2015.7489267}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84978374763\&doi=10.1109\%2fISDA.2015.7489267\&partnerID=40\&md5=eb13454b1c8384bc8bc11182c4419af5}, author = {Azougaghe, A.a and Kartit, Z.b and Hedabou, M.a and Belkasmi, M.a and El Marraki, M.b} } @article {Mezouary2016325, title = {An energy-aware clustering approach based on the k-means method for wireless sensor networks}, journal = {Lecture Notes in Electrical Engineering}, volume = {366}, year = {2016}, note = {cited By 0}, pages = {325-337}, abstract = {This paper describes a new approach to build energy aware clusters for Wireless Sensor Networks (WSN). The algorithm behind is based on the k-means method which is well known as a clustering technique and widely used in several fields of engineering and research. K-means clustering tends to find clusters of comparable spatial extent (density clustering). We try to enhance the clustering process by selecting nodes as clusters that are centric and have a high level of energy. This will give the same QoS results as given by the K-means approach with a reduction of energy consumption and a prolongation of the lifetime of the sensor network. For the simulation purposes, we have implemented our approach on the OLSR routing protocol which has been selected by our research team as a test bed routing protocol. We have compared our new approach (OLSR-Kmeans-Energy) with a previous work we developed and where we use a Max-Min heuristic (OLSR-MaxMin-Energy) to enhance QoS parameters and the lifetime of the WSN. Our new approach seems to give better results than the MaxMin approach. {\textcopyright} Springer Science+Business Media Singapore 2016.}, doi = {10.1007/978-981-287-990-5_26}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84959098093\&doi=10.1007\%2f978-981-287-990-5_26\&partnerID=40\&md5=bcd3d9d29b98420d13c95f74f11a93c6}, author = {Mezouary, R.E. and Choukri, A. and Kobbane, A. and Koutbi, M.E.} } @conference { ISI:000381755100026, title = {An Energy-Aware Clustering Approach Based on the K-Means Method forWireless Sensor Networks}, booktitle = {ADVANCES IN UBIQUITOUS NETWORKING}, series = {Lecture Notes in Electrical Engineering}, volume = {366}, year = {2016}, note = {International Symposium on Ubiquitous Networking (UNet), Casablanca, MOROCCO, SEP 08-10, 2015}, pages = {325-337}, abstract = {This paper describes a new approach to build energy aware clusters for Wireless Sensor Networks (WSN). The algorithm behind is based on the k-means method which is well known as a clustering technique and widely used in several fields of engineering and research. K-means clustering tends to find clusters of comparable spatial extent (density clustering). We try to enhance the clustering process by selecting nodes as clusters that are centric and have a high level of energy. This will give the same QoS results as given by the K-means approach with a reduction of energy consumption and a prolongation of the lifetime of the sensor network. For the simulation purposes, we have implemented our approach on the OLSR routing protocol which has been selected by our research team as a test bed routing protocol. We have compared our new approach (OLSR-Kmeans-Energy) with a previous work we developed and where we use a Max-Min heuristic (OLSR-MaxMin-Energy) to enhance QoS parameters and the lifetime of the WSN. Our new approach seems to give better results than the MaxMin approach.}, isbn = {978-981-287-990-5; 978-981-287-989-9}, issn = {1876-1100}, doi = {10.1007/978-981-287-990-5\_26}, author = {El Mezouary, Ridouane and Choukri, Ali and Kobbane, Abdellatif and El Koutbi, Mohammed}, editor = {Sabir, E and Medromi, H and Sadik, M} } @article { ISI:000368878600009, title = {Evaluating a decision making system for cardiovascular dysautonomias diagnosis}, journal = {SPRINGERPLUS}, volume = {5}, year = {2016}, month = {JAN 26}, abstract = {Autonomic nervous system (ANS) is the part of the nervous system that is involved in homeostasis of the whole body functions. A malfunction in this system can lead to a cardiovascular dysautonomias. Hence, a set of dynamic tests are adopted in ANS units to diagnose and treat patients with cardiovascular dysautonomias. The purpose of this study is to develop and evaluate a decision tree based cardiovascular dysautonomias prediction system on a dataset collected from the ANS unit of the Moroccan university hospital Avicenne. We collected a dataset of 263 records from the ANS unit of the Avicenne hospital. This dataset was split into three subsets: training set (123 records), test set (55 records) and validation set (85 records). C4.5 decision tree algorithm was used in this study to develop the prediction system. Moreover, Java Enterprise Edition platform was used to implement a prototype of the developed system which was deployed in the Avicenne ANS unit so as to be clinically validated. The performance of the decision tree-based prediction system was evaluated by means of the error rate criterion. The error rates were measured for each classifier and have achieved an average value of 1.46, 2.24 and 0.89 \% in training, test, and validation sets respectively. The results obtained were encouraging but further replicated studies are still needed to be performed in order to confirm the findings of this study.}, issn = {2193-1801}, doi = {10.1186/s40064-016-1730-7}, author = {Idri, Ali and Kadi, Ilham} } @article {Idri20161, title = {Evaluating a decision making system for cardiovascular dysautonomias diagnosis}, journal = {SpringerPlus}, volume = {5}, number = {1}, year = {2016}, note = {cited By 1}, pages = {1-17}, abstract = {Autonomic nervous system (ANS) is the part of the nervous system that is involved in homeostasis of the whole body functions. A malfunction in this system can lead to a cardiovascular dysautonomias. Hence, a set of dynamic tests are adopted in ANS units to diagnose and treat patients with cardiovascular dysautonomias. The purpose of this study is to develop and evaluate a decision tree based cardiovascular dysautonomias prediction system on a dataset collected from the ANS unit of the Moroccan university hospital Avicenne. We collected a dataset of 263 records from the ANS unit of the Avicenne hospital. This dataset was split into three subsets: training set (123 records), test set (55 records) and validation set (85 records). C4.5 decision tree algorithm was used in this study to develop the prediction system. Moreover, Java Enterprise Edition platform was used to implement a prototype of the developed system which was deployed in the Avicenne ANS unit so as to be clinically validated. The performance of the decision tree-based prediction system was evaluated by means of the error rate criterion. The error rates were measured for each classifier and have achieved an average value of 1.46, 2.24 and 0.89~\% in training, test, and validation sets respectively. The results obtained were encouraging but further replicated studies are still needed to be performed in order to confirm the findings of this study. {\textcopyright} 2016, Idri and Kadi.}, doi = {10.1186/s40064-016-1730-7}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84955586605\&doi=10.1186\%2fs40064-016-1730-7\&partnerID=40\&md5=0c9525bf9e5c6b03de358df01c579172}, author = {Idri, A. and Kadi, I.} } @conference {Benbrahim20163263, title = {An example of a big data solution implementation}, booktitle = {Proceedings of the 27th International Business Information Management Association Conference - Innovation Management and Education Excellence Vision 2020: From Regional Development Sustainability to Global Economic Growth, IBIMA 2016}, year = {2016}, note = {cited By 0}, pages = {3263-3265}, abstract = {Over the last decade, digital data has known an incredible growth. Several businesses have taken advantage of this data abundance, and have moved their decision making strategy from hypothesis driven to data driven approaches. Therefore, new solutions are needed to store and access this big data, then infer knowledge out of it and make it available to managers. In this paper, we will discuss briefly the different issues that should be taken into consideration for implementing a Big Data framework in companies. Then a solution implementation for a Middle East gas and oil distribution company will be presented. Copyright {\textcopyright} 2016 International Business Information Management Association}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84984612015\&partnerID=40\&md5=b3cb0d0dbee2f4fa0d7dda3c4b8f57aa}, author = {Benbrahim, H.a and Khalaf, I.b and Kassou, I.a} } @conference { ISI:000381172301147, title = {An Example of a Big Data Solution Implementation}, booktitle = {INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI}, year = {2016}, note = {27th International Business Information Management Association Conference, Milan, ITALY, MAY 04-05, 2016}, pages = {3263-3265}, abstract = {Over the last decade, digital data has known an incredible growth. Several businesses have taken advantage of this data abundance, and have moved their decision making strategy from hypothesis driven to data driven approaches. Therefore, new solutions are needed to store and access this big data, then infer knowledge out of it and make it available to managers. In this paper, we will discuss briefly the different issues that should be taken into consideration for implementing a Big Data framework in companies. Then a solution implementation for a Middle East gas and oil distribution company will be presented.}, isbn = {978-0-9860419-6-9}, author = {Benbrahim, Houda and Khalaf, Ilias and Kassou, Ismail}, editor = {Soliman, KS} } @conference { ISI:000388603102099, title = {Exploiting Multi-homing in Hyper Dense LTE Small-Cells Deployments}, booktitle = {2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE}, series = {IEEE Wireless Communications and Networking Conference}, year = {2016}, note = {IEEE Wireless Communications and Networking Conference (WCNC), Doha, QATAR, APR 03-07, 2016}, publisher = {IEEE; IEEE Commun Soc}, organization = {IEEE; IEEE Commun Soc}, abstract = {It is expected that in two-tier LTE heterogeneous networks, an extensive deployment of small cell networks (SCNs) will take place in the near future, especially in dense urban zones; hence a hyper density of SCNs randomly distributed within macro cell networks (MCNs) will emerge with many overlapping zones of neighboring SCNs. Therefore, the problems of interferences in co-channel deployment will be more complicated and then the overall throughput of downlink will substantially decrease. In order to mitigate the effect of interferences in a hyper density of SCNs scenarios, a solution based on a fully distributed algorithm for sharing time access to SCNs and multi-homing capabilities of macro cellular users is proposed to improve the overall data rate of downlink and at the same time to satisfy QoS throughput requirements of macro and home cellular users. Our tentative scheme will also reduce the signaling overhead due to the absence of coordination among small base stations (SBSs) and macro base station (MBS). Results validate our solution and show the improvement attained in a hyper density of SCNs within MCNs compared to open, closed and shared time access mechanisms based on single network selection.}, isbn = {978-1-4673-9814-5}, issn = {1525-3511}, author = {Walid, Abdellaziz and Sabir, Essaid and Kobbane, Abdellatif and Taleb, Tarik and El Koutbi, Mohammed} } @conference {Walid2016, title = {Exploiting multi-homing in hyper dense LTE small-cells deployments}, booktitle = {IEEE Wireless Communications and Networking Conference, WCNC}, volume = {2016-September}, year = {2016}, note = {cited By 0}, abstract = {It is expected that in two-Tier LTE heterogeneous networks, an extensive deployment of small cell networks (SCNs) will take place in the near future, especially in dense urban zones; hence a hyper density of SCNs randomly distributed within macro cell networks (MCNs) will emerge with many overlapping zones of neighboring SCNs. Therefore, the problems of interferences in co-channel deployment will be more complicated and then the overall throughput of downlink will substantially decrease. In order to mitigate the effect of interferences in a hyper density of SCNs scenarios, a solution based on a fully distributed algorithm for sharing time access to SCNs and multi-homing capabilities of macro cellular users is proposed to improve the overall data rate of downlink and at the same time to satisfy QoS throughput requirements of macro and home cellular users. Our tentative scheme will also reduce the signaling overhead due to the absence of coordination among small base stations (SBSs) and macro base station (MBS). Results validate our solution and show the improvement attained in a hyper density of SCNs within MCNs compared to open, closed and shared time access mechanisms based on single network selection. {\textcopyright} 2016 IEEE.}, doi = {10.1109/WCNC.2016.7565055}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84989854253\&doi=10.1109\%2fWCNC.2016.7565055\&partnerID=40\&md5=36cda03e307b208f10f73e923e3e5b77}, author = {Walid, A.a and Sabir, E.b and Kobbane, A.a and Taleb, T.c and Koutbi, M.E.a} } @article {Khoumsi2016, title = {A formal basis for the design and analysis of firewall security policies}, journal = {Journal of King Saud University - Computer and Information Sciences}, year = {2016}, note = {cited By 0; Article in Press}, abstract = {A firewall is the core of a well defined network security policy. This paper presents an automata-based method to study firewall security policies. We first propose a procedure that synthesizes an automaton that describes a security policy given as a table of rules. The synthesis procedure is then used to develop procedures to detect: incompleteness, anomalies and discrepancies in security policies. A method is developed to represent the automaton by a policy qualified as mixable and that has practical utilities, such as ease to determine the whitelist and the blacklist of the policy. The developed procedures have been deeply evaluated in terms of time and space complexities. Then, a real case study has been investigated. The obtained results confirm that the developed procedures have reasonable complexities and that their actual execution times are of the order of seconds. Finally, proofs of all results are provided. {\textcopyright} 2016 King Saud University.}, doi = {10.1016/j.jksuci.2016.11.008}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85008234846\&doi=10.1016\%2fj.jksuci.2016.11.008\&partnerID=40\&md5=07a25a70cda473802a697eff8dbb8dec}, author = {Khoumsi, A.a and Erradi, M.b and Krombi, W.b} } @conference {ElHaloui2016630, title = {From enterprise architecture to cloud computing: A decision-support model for functional block outsourcing}, booktitle = {ICEIS 2016 - Proceedings of the 18th International Conference on Enterprise Information Systems}, volume = {2}, year = {2016}, note = {cited By 0}, pages = {630-635}, abstract = {The Information Systems opening to the cloud computing has become a strategic choice for enterprises. In fact, the rapid evolution of competitiveness and innovation and the diversity of technologic offers incite IT decision makers to look for decision support tools helping them for the adoption of new solutions and services such as Cloud Computing. This article introduces a maturity assessment model of an information system architecture functional block that can be outsourced to the Cloud. Based on the best practices of enterprise architecture and information systems governance, the basic criteria of activities outsourcing, and the cloud computing adoption requirements, this model is built around four modules: the block scope identification, the outsourcing opportunity, the cloud computing architectural requirements, and governance and control. Thus, this model will provides new benefits for opened Enterprise Architectures to new technologies. Copyright {\textcopyright} 2016 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979555053\&partnerID=40\&md5=c6f1149e57b13984ee8435b68630f5de}, author = {El Haloui, M. and Kriouile, A.} } @article {Saidi20164615, title = {The functional of a mobile agent system to enhance DoS and DDoS detection in cloud}, journal = {International Journal of Applied Engineering Research}, volume = {11}, number = {6}, year = {2016}, note = {cited By 0}, pages = {4615-4617}, abstract = {The availability of services is one of the metrics that affect the attractiveness of Cloud providers. Gartner has published on its website Cloud Harmony a summary of outages underwent by 75 american Cloud providers in 2014; Amazon and Google were particularly noticed with respectively 2 and 3,46 hours of outage of their PaaS platform named respectively EC2 and Compute Engine [1]. In this paper, we propose a mobile agent system to detect the first signs of DoS/DDoS flooding attacks on Cloud environment. {\textcopyright} 2016, Research India Publications.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84963690593\&partnerID=40\&md5=6d7de81bac9a3eb60b84f8b6178b5316}, author = {Saidi, A.a and Kartit, A.b and Bendriss, E.c and El Marraki, M.a} } @conference { ISI:000390993202059, title = {A Game Theoretic Approach for an Hybrid Overlay-Underlay Spectrum Access Mode}, booktitle = {2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)}, series = {IEEE International Conference on Communications}, year = {2016}, note = {IEEE International Conference on Communications (ICC), Kuala Lumpur, MALAYSIA, MAY 22-27, 2016}, publisher = {IEEE}, organization = {IEEE}, abstract = {Cognitive radio is emerging as a promising technique to improve the utilization of the radio frequency spectrum in wireless networks. In this paper, we propose a hybrid CR (cognitive radio) system where underlay and overlay CR approaches are combined under SINR (Signal to Interference plus Noise Ratio) constraints. This new access type allows to optimize the spectrum sensing time with throughput improvement. The goal of this paper is to provide a new access mode in order to enhance the cognitive system performance while reducing the power spent for detecting the presence of the primary user and the spectrum holes. We consider the problem of spectrum sharing among primary (or {\textquoteleft}{\textquoteleft}licensed{{\textquoteright}{\textquoteright}}) users (PUs) and secondary (or {\textquoteleft}{\textquoteleft}unlicensed{{\textquoteright}{\textquoteright}}) users (SUs). In this scheme, the spectrum allocation problem is modeled as a non cooperative game, with each CR user acting as a player. Nash equilibrium is considered as the solution of this game.}, isbn = {978-1-4799-6664-6}, issn = {1550-3607}, author = {Gmira, Sara and Kobbane, Abdellatif and Sabir, Essaid and Ben-Othman, Jalel} } @conference {Gmira2016, title = {A game theoretic approach for an hybrid overlay-underlay spectrum access mode}, booktitle = {2016 IEEE International Conference on Communications, ICC 2016}, year = {2016}, note = {cited By 0}, abstract = {Cognitive radio is emerging as a promising technique to improve the utilization of the radio frequency spectrum in wireless networks. In this paper, we propose a hybrid CR (cognitive radio) system where underlay and overlay CR approaches are combined under SINR (Signal to Interference plus Noise Ratio) constraints. This new access type allows to optimize the spectrum sensing time with throughput improvement. The goal of this paper is to provide a new access mode in order to enhance the cognitive system performance while reducing the power spent for detecting the presence of the primary user and the spectrum holes. We consider the problem of spectrum sharing among primary (or licensed) users (PUs) and secondary (or unlicensed) users (SUs). In this scheme, the spectrum allocation problem is modeled as a non cooperative game, with each CR user acting as a player. Nash equilibrium is considered as the solution of this game. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ICC.2016.7511026}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84981337899\&doi=10.1109\%2fICC.2016.7511026\&partnerID=40\&md5=b33c0dff4da1e3292042d7b39a65c27e}, author = {Gmira, S.a and Kobbane, A.a and Sabir, E.b and Ben-Othman, J.c} } @article { ISI:000379694400006, title = {Group vertical handoff management in heterogeneous networks}, journal = {WIRELESS COMMUNICATIONS \& MOBILE COMPUTING}, volume = {16}, number = {10}, year = {2016}, month = {JUL}, pages = {1256-1270}, abstract = {Traditional vertical handover schemes postulate that vertical handovers (VHOs) of users come on an individual basis. This enables users to know previously the decision already made by other users, and then the choice will be accordingly made. However, in case of group mobility, almost all VHO decisions of all users, in a given group (e.g., passengers on board a bus or a train equipped with smart phones or laptops), will be made at the same time. This concept is called group vertical handover (GVHO). When all VHO decisions of a large number of users are made at the same time, the system performance may degrade and network congestion may occur. In this paper, we propose two fully decentralized algorithms for network access selection, and that is based on the concept of congestion game to resolve the problem of network congestion in group mobility scenarios. Two learning algorithms, dubbed Sastry Algorithm and Q-Learning Algorithm, are envisioned. Each one of these algorithms helps mobile users in a group to reach the nash equilibrium in a stochastic environment. The nash equilibrium represents a fair and efficient solution according to which each mobile user is connected to a single network and has no intention to change his decision to improve his throughput. This shall help resolve the problem of network congestion caused by GVHO. Simulation results validate the proposed algorithms and show their efficiency in achieving convergence, even at a slower pace. To achieve fast convergence, we also propose a heuristic method inspired from simulated annealing and incorporated in a hybrid learning algorithm to speed up convergence time and maintain efficient solutions. The simulation results also show the adaptability of our hybrid algorithm with decreasing step size-simulated annealing (DSS-SA) for high mobility group scenario. Copyright (c) 2015 John Wiley \& Sons, Ltd.}, issn = {1530-8669}, doi = {10.1002/wcm.2599}, author = {Walid, Abdellaziz and Kobbane, Abdellatif and Mabrouk, Abdelfettah and Sabir, Essaid and Taleb, Tarik and El Koutbi, Mohammed} } @article {Walid20161256, title = {Group vertical handoff management in heterogeneous networks}, journal = {Wireless Communications and Mobile Computing}, volume = {16}, number = {10}, year = {2016}, note = {cited By 0}, pages = {1256-1270}, abstract = {Traditional vertical handover schemes postulate that vertical handovers (VHOs) of users come on an individual basis. This enables users to know previously the decision already made by other users, and then the choice will be accordingly made. However, in case of group mobility, almost all VHO decisions of all users, in a given group (e.g., passengers on board a bus or a train equipped with smart phones or laptops), will be made at the same time. This concept is called group vertical handover (GVHO). When all VHO decisions of a large number of users are made at the same time, the system performance may degrade and network congestion may occur. In this paper, we propose two fully decentralized algorithms for network access selection, and that is based on the concept of congestion game to resolve the problem of network congestion in group mobility scenarios. Two learning algorithms, dubbed Sastry Algorithm and Q-Learning Algorithm, are envisioned. Each one of these algorithms helps mobile users in a group to reach the nash equilibrium in a stochastic environment. The nash equilibrium represents a fair and efficient solution according to which each mobile user is connected to a single network and has no intention to change his decision to improve his throughput. This shall help resolve the problem of network congestion caused by GVHO. Simulation results validate the proposed algorithms and show their efficiency in achieving convergence, even at a slower pace. To achieve fast convergence, we also propose a heuristic method inspired from simulated annealing and incorporated in a hybrid learning algorithm to speed up convergence time and maintain efficient solutions. The simulation results also show the adaptability of our hybrid algorithm with decreasing step size-simulated annealing (DSS-SA) for high mobility group scenario. Copyright {\textcopyright} 2015 John Wiley \& Sons, Ltd. Copyright {\textcopyright} 2015 John Wiley \& Sons, Ltd.}, doi = {10.1002/wcm.2599}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84930151466\&doi=10.1002\%2fwcm.2599\&partnerID=40\&md5=a91b7ce3e8af4694e732a00f04f01d95}, author = {Walid, A.a and Kobbane, A.a and Mabrouk, A.a and Sabir, E.b and Taleb, T.c and El Koutbi, M.a} } @conference {Lahlou20163312, title = {Improving recommendations using context from users{\textquoteright} reviews}, booktitle = {Proceedings of the 27th International Business Information Management Association Conference - Innovation Management and Education Excellence Vision 2020: From Regional Development Sustainability to Global Economic Growth, IBIMA 2016}, year = {2016}, note = {cited By 0}, pages = {3312-3315}, abstract = {Recommender systems enable E-commerce websites to improve their sales by suggesting relevant items to customers. If considering the context of buying situations, more accurate recommendations can be computed. In this paper, we discuss the issue of using the contextual information contained in users{\textquoteright} reviews in order to improve recommendation. Copyright {\textcopyright} 2016 International Business Information Management Association}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84984653667\&partnerID=40\&md5=a03c657d3c2b4702850bc5f2e897eb3a}, author = {Lahlou, F.Z. and Benbrahim, H. and Kassou, I.} } @conference { ISI:000381172301152, title = {Improving Recommendations Using Context from Users{\textquoteright} Reviews}, booktitle = {INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI}, year = {2016}, note = {27th International Business Information Management Association Conference, Milan, ITALY, MAY 04-05, 2016}, pages = {3312-3315}, abstract = {Recommender systems enable E-commerce websites to improve their sales by suggesting relevant items to customers. If considering the context of buying situations, more accurate recommendations can be computed. In this paper, we discuss the issue of using the contextual information contained in users{\textquoteright} reviews in order to improve recommendation.}, isbn = {978-0-9860419-6-9}, author = {Zahra Lahlou, Fatima and Benbrahim, Houda and Kassou, Ismail}, editor = {Soliman, KS} } @conference {Amarouche20162876, title = {Introduction to competitive intelligence: Process, applications and tools}, booktitle = {Proceedings of the 27th International Business Information Management Association Conference - Innovation Management and Education Excellence Vision 2020: From Regional Development Sustainability to Global Economic Growth, IBIMA 2016}, year = {2016}, note = {cited By 0}, pages = {2876-2885}, abstract = {In the world of excessive business competitiveness, almost every company tries to monitor its environment to exceed the competitors. Getting knowledge about competitors is the basic principal of what is called Competitive Intelligence (CI). Many applications of Competitive Intelligence can be used like Opinion Mining and Foresight studies and the process of obtaining such intelligence differs according to the company{\textquoteright}s needs. In this paper, we will present in more details the definitions of CI and a general process grouping the most used steps in conducting such study. In the end we will present some tools useful in CI. Copyright {\textcopyright} 2016 International Business Information Management Association}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84984646253\&partnerID=40\&md5=1c66c097dc1b53d274daa126d36a743f}, author = {Amarouche, K. and El Akrouchi, M. and Benbrahim, H. and Kassou, I.} } @conference { ISI:000381172301104, title = {Introduction to Competitive Intelligence: Process, Applications and Tools}, booktitle = {INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI}, year = {2016}, note = {27th International Business Information Management Association Conference, Milan, ITALY, MAY 04-05, 2016}, pages = {2876-2885}, abstract = {In the world of excessive business competitiveness, almost every company tries to monitor its environment to exceed the competitors. Getting knowledge about competitors is the basic principal of what is called Competitive Intelligence (CI). Many applications of Competitive Intelligence can be used like Opinion Mining and Foresight studies and the process of obtaining such intelligence differs according to the company{\textquoteright}s needs. In this paper, we will present in more details the definitions of CI and a general process grouping the most used steps in conducting such study. In the end we will present some tools useful in CI.}, isbn = {978-0-9860419-6-9}, author = {Amarouche, Kamal and El Akrouchi, Manal and Benbrahim, Houda and Kassou, Ismail}, editor = {Soliman, KS} } @conference {Boumkheld2016108, title = {Intrusion detection system for the detection of blackhole attacks in a smart grid}, booktitle = {2016 4th International Symposium on Computational and Business Intelligence, ISCBI 2016}, year = {2016}, note = {cited By 0}, pages = {108-111}, abstract = {Smart grid is the new electrical grid that will change forever the way we use energy, thanks to the deployment of sensing and communication technologies. It allows consumers to become more aware and in control of their energy consumption. However, the pervasive communication infrastructure deployed inside the smart grid makes it a target to different types of attacks, which is why security is an essential element in building a robust grid. In this article we develop an Intrusion Detection System (IDS) that uses data mining techniques for the detection of a Denial of service (DOS) attack in a smart grid, the so called blackhole attack. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ISCBI.2016.7743267}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85005943412\&doi=10.1109\%2fISCBI.2016.7743267\&partnerID=40\&md5=5c0ce5fd5e8c611326382b2cf80da730}, author = {Boumkheld, N. and Ghogho, M. and El Koutbi, M.} } @conference { ISI:000390683500018, title = {Intrusion Detection System for the Detection of Blackhole Attacks in a Smart Grid}, booktitle = {2016 4TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI)}, year = {2016}, note = {4th International Symposium on Computational and Business Intelligence (ISCBI), Olten, SWITZERLAND, SEP 05-07, 2016}, pages = {108-111}, publisher = {IEEE; INNS India Reg Chapter; IEEE Computat Intelligence Soc; Fachhochschule Nordwestschweiz}, organization = {IEEE; INNS India Reg Chapter; IEEE Computat Intelligence Soc; Fachhochschule Nordwestschweiz}, abstract = {Smart grid is the new electrical grid that will change forever the way we use energy, thanks to the deployment of sensing and communication technologies. It allows consumers to become more aware and in control of their energy consumption. However, the pervasive communication infrastructure deployed inside the smart grid makes it a target to different types of attacks, which is why security is an essential element in building a robust grid. In this article we develop an Intrusion Detection System (IDS) that uses data mining techniques for the detection of a Denial of service (DOS) attack in a smart grid, the so called blackhole attack.}, isbn = {978-1-5090-3488-8}, author = {Boumkheld, Nadia and Ghogho, Mounir and El Koutbi, Mohammed} } @article {Oufkir2016242, title = {Knowledge management performance measurement: A generic framework}, journal = {Communications in Computer and Information Science}, volume = {615}, year = {2016}, note = {cited By 0}, pages = {242-254}, abstract = {This theoretical article aims to propose a generic framework for measuring performance of Knowledge Management (KM) projects based on critical literature review. The proposed framework fills the existing gap on KM performance measurement in two points: (i) it provides a generic tool that is able to assess all kinds of KM project as well as the overall organization KM, (ii) it assesses KM projects according to KM objectives in a generic manner. Our framework (GKMPM) relies on a process reference model that provides a KM common understanding in a process based view. It is based on a goal-oriented measurement approach and considers that KM performance dimensions are stakeholder{\textquoteright}s objectives. The framework application follows a procedural approach that begins with the KM project modelling, followed by the objectives prioritization. The next step consists of collecting and analysing data for pre-designed measures, and produces a set of key performance indicators (KPIs) related to the KM project processes and in accordance with its objectives. {\textcopyright} Springer International Publishing Switzerland 2016.}, doi = {10.1007/978-3-319-40180-5_17}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979022041\&doi=10.1007\%2f978-3-319-40180-5_17\&partnerID=40\&md5=7353ebf3c020ba8a9bc9458832afda06}, author = {Oufkir, L. and Fredj, M. and Kassou, I.} } @conference { ISI:000389806000017, title = {Knowledge Management Performance Measurement: A Generic Framework}, booktitle = {DATABASES AND INFORMATION SYSTEMS, DB\&IS 2016}, series = {Communications in Computer and Information Science}, volume = {615}, year = {2016}, note = {12th International Baltic Conference on Databases and Information Systems (DB and IS), Riga, LATVIA, JUL 04-06, 2016}, pages = {242-254}, publisher = {Univ Latvia, Fac Comp; Exigen Serv Latvia; IEEE; Springer}, organization = {Univ Latvia, Fac Comp; Exigen Serv Latvia; IEEE; Springer}, abstract = {This theoretical article aims to propose a generic framework for measuring performance of Knowledge Management (KM) projects based on critical literature review. The proposed framework fills the existing gap on KM performance measurement in two points: (i) it provides a generic tool that is able to assess all kinds of KM project as well as the overall organization KM, (ii) it assesses KM projects according to KM objectives in a generic manner. Our framework (GKMPM) relies on a process reference model that provides a KM common understanding in a process based view. It is based on a goal-oriented measurement approach and considers that KM performance dimensions are stakeholder{\textquoteright}s objectives. The framework application follows a procedural approach that begins with the KM project modelling, followed by the objectives prioritization. The next step consists of collecting and analysing data for pre-designed measures, and produces a set of key performance indicators (KPIs) related to the KM project processes and in accordance with its objectives.}, isbn = {978-3-319-40180-5; 978-3-319-40179-9}, issn = {1865-0929}, doi = {10.1007/978-3-319-40180-5\_17}, author = {Oufkir, Latifa and Fredj, Mounia and Kassou, Ismail}, editor = {Arnicans, G and Arnicane, V and Borzovs, J and Niedrite, L} } @conference {DBLP:conf/balt/OufkirFK16, title = {Knowledge Management Performance Measurement: {A} Generic Framework}, booktitle = {Databases and Information Systems - 12th International Baltic Conference, DB{\&}IS 2016, Riga, Latvia, July 4-6, 2016, Proceedings}, year = {2016}, pages = {242{\textendash}254}, doi = {10.1007/978-3-319-40180-5_17}, url = {http://dx.doi.org/10.1007/978-3-319-40180-5_17}, author = {Latifa Oufkir and Mounia Fredj and Ismail Kassou} } @conference { ISI:000391420400024, title = {Matching Game for Green Uplink in Hyper Dense LTE HeTNets}, booktitle = {2016 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM)}, year = {2016}, note = {International Conference on Wireless Networks and Mobile Communications (WINCOM), Fez, MOROCCO, OCT 26-29, 2016}, pages = {P133-P139}, publisher = {Univ Sidi Mohamed Ben Abdellah; FST FES; MobiTic; IEEE; IEEE Commun Soc; FSDM; ENSIAS; FST Mohammedia; CLusMed; TICSM Res Pole; Master Tec; CNRST; EBSA Fez; Mobit Assoc}, organization = {Univ Sidi Mohamed Ben Abdellah; FST FES; MobiTic; IEEE; IEEE Commun Soc; FSDM; ENSIAS; FST Mohammedia; CLusMed; TICSM Res Pole; Master Tec; CNRST; EBSA Fez; Mobit Assoc}, abstract = {In this paper, we aim to improve the energy efficiency of cellular users located in hyper-dense co-channel deployments of LTE small cell Networks (SCNs), randomly distributed within LTE macro cell networks (MCNs). Avoiding the severe cross-tier interferences at the small base stations (SBSs) levels caused by the uplink transmissions between the macro indoor users (which are inside the SBS coverage area) and the macro base station (MBS), ensuring load balancing, and improving energy efficiency are critical technical challenges in hyper-dense co-channel LTE SCNs deployments. As a solution, we formulate our problem as a matching game, then we propose the deferred acceptance algorithm to compute the optimal stable matching consisting of assigning each macro indoor user to the most suitable SBS and vice versa. Simulation results validate our solution, and show how it can effectively improve the energy efficiency of cellular users in hyper-dense LTE HetNets compared to the default Max-SINR association scheme.}, isbn = {978-1-5090-3837-4}, author = {Amine, Mariame and Walid, Abdellaziz and Ait Oualhaj, Omar and Kobbane, Abdellatif}, editor = {ElKamili, M and Berrada, I and Badri, A and Ghennioui, H} } @conference {Amine2016133, title = {Matching game for green uplink in hyper dense LTE HeTNets}, booktitle = {Proceedings - 2016 International Conference on Wireless Networks and Mobile Communications, WINCOM 2016: Green Communications and Networking}, year = {2016}, note = {cited By 0}, pages = {133-139}, abstract = {In this paper, we aim to improve the energy efficiency of cellular users located in hyper-dense co-channel deployments of LTE small cell Networks (SCNs), randomly distributed within LTE macro cell networks (MCNs). Avoiding the severe cross-Tier interferences at the small base stations (SBSs) levels caused by the uplink transmissions between the macro indoor users (which are inside the SBS coverage area) and the macro base station (MBS), ensuring load balancing, and improving energy efficiency are critical technical challenges in hyper-dense co-channel LTE SCNs deployments. As a solution, we formulate our problem as a matching game, then we propose the deferred acceptance algorithm to compute the optimal stable matching consisting of assigning each macro indoor user to the most suitable SBS and vice versa. Simulation results validate our solution, and show how it can effectively improve the energy efficiency of cellular users in hyper-dense LTE HetNets compared to the default Max-SINR association scheme. {\textcopyright} 2016 IEEE.}, doi = {10.1109/WINCOM.2016.7777204}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85010465149\&doi=10.1109\%2fWINCOM.2016.7777204\&partnerID=40\&md5=cfdd0315adeb3a468a5382cae7b1ed26}, author = {Amine, M. and Walid, A. and Oualhaj, O.A. and Kobbane, A.} } @article {Mabrouk20161, title = {Meeting Always-Best-Connected paradigm in heterogeneous vehicular networks: A graph theory and a signaling game analysis}, journal = {Vehicular Communications}, volume = {5}, year = {2016}, note = {cited By 0}, pages = {1-8}, abstract = {Due to the high mobility of vehicles and the dynamic topology changes of vehicular networks, it is difficult to satisfy drivers needs through a single wireless network. Consequently, by integrating different wireless access networks such as LTE and IEEE 802.11p, the vehicular network is expected to be a good platform called Heterogeneous Vehicular Network that can meet various vehicular user requirements. In such networks, vehicles need to have mechanisms in place to decide which access network is the most suitable for every application that the vehicular user requires. Always-Best-Connected is considered as a special concept to allow users getting connected to Internet using the access network that best suits their needs or profile at any point in time. Clearly, this concept provides multiple access networks simultaneous for mobile users moving in heterogeneous access network environment. In this paper, we propose two approaches called graph theory-based approach, and signaling game-based approach. The first approach is based on graph theory while the second one based on signaling game theory to compute the suitable path which provides Always-Best-Connected service for a smart vehicle moving in vehicular networks. {\textcopyright} 2016 Elsevier Inc.}, doi = {10.1016/j.vehcom.2016.04.002}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84968902365\&doi=10.1016\%2fj.vehcom.2016.04.002\&partnerID=40\&md5=ba6b2fdee947b78c1a40f384b52a26b6}, author = {Mabrouk, A.a and Kobbane, A.a and Sabir, E.b and Ben-Othman, J.c and El Koutbi, M.a} } @article {Benkaouz201648, title = {Nearest neighbors graph construction: Peer sampling to the rescue}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {9944 LNCS}, year = {2016}, note = {cited By 0}, pages = {48-62}, abstract = {In this paper, we propose an efficient KNN service, called KPS (KNN-Peer-Sampling). The KPS service can be used in various contexts e.g. recommendation systems, information retrieval and data mining. KPS borrows concepts from P2P gossip-based clustering protocols to provide a localized and efficient KNN computation in large-scale systems. KPS is a sampling-based iterative approach, combining randomness, to provide serendipity and avoid local minimum, and clustering, to ensure fast convergence. We compare KPS against the state of the art KNN centralized computation algorithm NNDescent, on multiple datasets. The experiments confirm the efficiency of KPS over NNDescent: KPS improves significantly on the computational cost while converging quickly to a close to optimal KNN graph. For instance, the cost, expressed in number of pairwise similarity computations, is reduced by ≈23\% and ≈49\% to construct high quality KNN graphs for Jester and MovieLens datasets, respectively. In addition, the randomized nature of KPS ensures eventual convergence, not always achieved with NNDescent. {\textcopyright} Springer International Publishing AG 2016.}, doi = {10.1007/978-3-319-46140-3_4}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84990068831\&doi=10.1007\%2f978-3-319-46140-3_4\&partnerID=40\&md5=001c7ac565106835cc5cd7a01e01a3c4}, author = {Benkaouz, Y.a and Erradi, M.a and Kermarrec, A.-M.b} } @conference { ISI:000389502600004, title = {Nearest Neighbors Graph Construction: Peer Sampling to the Rescue}, booktitle = {Networked Systems, NETYS 2016}, series = {Lecture Notes in Computer Science}, volume = {9944}, year = {2016}, note = {4th International Conference on Networked Systems (NETYS), Marrakech, MOROCCO, MAY 18-20, 2016}, pages = {48-62}, abstract = {In this paper, we propose an efficient KNN service, called KPS (KNN-Peer-Sampling). The KPS service can be used in various contexts e.g. recommendation systems, information retrieval and data mining. KPS borrows concepts from P2P gossip-based clustering protocols to provide a localized and efficient KNN computation in large-scale systems. KPS is a sampling-based iterative approach, combining randomness, to provide serendipity and avoid local minimum, and clustering, to ensure fast convergence. We compare KPS against the state of the art KNN centralized computation algorithm NNDescent, on multiple datasets. The experiments confirm the efficiency of KPS over NNDescent: KPS improves significantly on the computational cost while converging quickly to a close to optimal KNN graph. For instance, the cost, expressed in number of pairwise similarity computations, is reduced by approximate to 23\% and approximate to 49\% to construct high quality KNN graphs for Jester and MovieLens datasets, respectively. In addition, the randomized nature of KPS ensures eventual convergence, not always achieved with NNDescent.}, isbn = {978-3-319-46140-3; 978-3-319-46139-7}, issn = {0302-9743}, doi = {10.1007/978-3-319-46140-3\_4}, author = {Benkaouz, Yahya and Erradi, Mohammed and Kermarrec, Anne-Marie}, editor = {Abdulla, PA and DelporteGallet, C} } @conference {Jouhari2016388, title = {New greedy forwarding strategy for UWSNs geographic routing protocols}, booktitle = {2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016}, year = {2016}, note = {cited By 0}, pages = {388-393}, abstract = {Recently Underwater wireless Sensor Networks (UWSNs) have been suggested as a powerful technology for many civilian and military applications, such that tactical surveillance. Geographic routing that uses the position information of nodes to route the packet toward a destination is preferable for UWSNs. In this paper, we propose a New Greedy Forwarding (NGF) strategy using splitting mechanism based on Chinese remainder theorem(CRT) for UWSNs. In the approach, source node reduced the number of bits transmitted using the proposed splitting mechanism based on CRT if there are more than two nodes participate in the forwarding of one packet. This strategy distribute the forwarding task between more nodes instead of selecting one node as next-hop, that reduce the energy consumption per node and maintain node communication for a long time. Thus resulting the increase of network life time and decrease the number of isolated/void nodes. We use topology control through depth adjustment to cope with the problem of isolated and void nodes appeared in geographic routing protocols. Simulation results shows that with the anycast greedy forwarding strategy the network life time is about 500 rounds whereas it is about 1000 rounds using the new greedy forwarding strategy, which means the new strategy increase the network life time and increase the network performance in energy saving. {\textcopyright} 2016 IEEE.}, doi = {10.1109/IWCMC.2016.7577089}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84994166915\&doi=10.1109\%2fIWCMC.2016.7577089\&partnerID=40\&md5=e43d0d319dbeeaa82e6ac9c64cee322d}, author = {Jouhari, M.a and Ibrahimi, K.a and Benattou, M.b and Kobbane, A.c} } @conference { ISI:000387181100066, title = {New Greedy Forwarding Strategy for UWSNs Geographic Routing Protocols}, booktitle = {2016 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC)}, series = {International Wireless Communications and Mobile Computing Conference}, year = {2016}, note = {12th International Wireless Communications \& Mobile Computing Conference (IWCMC), Paphos, CYPRUS, SEP 05-09, 2016}, pages = {388-393}, publisher = {IEEE; IEEE Cyprus Sect; Frederick Univ}, organization = {IEEE; IEEE Cyprus Sect; Frederick Univ}, abstract = {Recently Underwater wireless Sensor Networks (UWSNs) have been suggested as a powerful technology for many civilian and military applications, such that tactical surveillance. Geographic routing that uses the position information of nodes to route the packet toward a destination is preferable for UWSNs. In this paper, we propose a New Greedy Forwarding (NGF) strategy using splitting mechanism based on Chinese remainder theorem(CRT) for UWSNs. In the approach, source node reduced the number of bits transmitted using the proposed splitting mechanism based on CRT if there are more than two nodes participate in the forwarding of one packet. This strategy distribute the forwarding task between more nodes instead of selecting one node as next-hop, that reduce the energy consumption per node and maintain node communication for a long time. Thus resulting the increase of network life time and decrease the number of isolated/void nodes. We use topology control through depth adjustment to cope with the problem of isolated and void nodes appeared in geographic routing protocols. Simulation results shows that with the anycast greedy forwarding strategy the network life time is about 500 rounds whereas it is about 1000 rounds using the new greedy forwarding strategy, which means the new strategy increase the network life time and increase the network performance in energy saving.}, isbn = {978-1-5090-0304-4}, issn = {2376-6492}, author = {Jouhari, Mohammed and Ibrahimi, Khalil and Benattou, Mohammed and Kobbane, Abdellatif} } @conference {Khoufi2016, title = {Path planning of mobile sinks in charge of data gathering: A coalitional game theory approach}, booktitle = {2016 IEEE 35th International Performance Computing and Communications Conference, IPCCC 2016}, year = {2016}, note = {cited By 0}, abstract = {Game theory is often used to find equilibria where no player can unilaterally increase its own payoff by changing its strategy without changing the strategies of other players. In this paper, we propose to use coalition formation to compute the optimized tours of mobile sinks in charge of collecting data from static wireless sensor nodes. Mobile sinks constitute a very attractive solution for wireless sensor networks, WSNs, where the application requirements in terms of node autonomy are very strong unlike the requirement in terms of latency. Mobile sinks allow wireless sensor nodes to save energy The associated coalition formation problem has a stable solution given by the final partition obtained. However, the order in which the players play has a major impact on the final result. We determine the best order to minimize the number of mobile sinks needed. We evaluate the complexity of this coalitional game as well as the impact of the number of collect points per surface unit on the number of mobile sinks needed and on the maximum tour duration of these mobile sinks. In addition, we show how to extend the coalitional game to support different latencies for different types of data. Finally, we formalize our problem as an optimization problem and we perform a comparative evaluation. {\textcopyright} 2016 IEEE.}, doi = {10.1109/PCCC.2016.7820637}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85013413857\&doi=10.1109\%2fPCCC.2016.7820637\&partnerID=40\&md5=3c4a3fe9d6f76ca57b380ffcb337856d}, author = {Khoufi, I.a and Minet, P.a and Koulali, M.-A.b and Kobbane, A.c} } @conference { ISI:000389502600045, title = {SNA: Detecting Influencers over Social Networks}, booktitle = {Networked Systems, NETYS 2016}, series = {Lecture Notes in Computer Science}, volume = {9944}, year = {2016}, note = {4th International Conference on Networked Systems (NETYS), Marrakech, MOROCCO, MAY 18-20, 2016}, pages = {388}, isbn = {978-3-319-46140-3; 978-3-319-46139-7}, issn = {0302-9743}, author = {Aghmadi, Ali and Erradi, Mohammed and Kobbane, Abdellatif}, editor = {Abdulla, PA and DelporteGallet, C} } @conference { ISI:000387181100093, title = {Strategic Data Gathering in Wireless Sensor Networks}, booktitle = {2016 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC)}, series = {International Wireless Communications and Mobile Computing Conference}, year = {2016}, note = {12th International Wireless Communications \& Mobile Computing Conference (IWCMC), Paphos, CYPRUS, SEP 05-09, 2016}, pages = {547-552}, publisher = {IEEE; IEEE Cyprus Sect; Frederick Univ}, organization = {IEEE; IEEE Cyprus Sect; Frederick Univ}, abstract = {Prolonging the network lifetime is a challenging problem in wireless sensor networks. Using additional mobile agents able to gather data from static sensor nodes reveals to be one of the convenient solutions in order to conserve static sensor nodes energy. In this paper, we focus on a conflictual situation between two Data Collectors (DCs) tending to gather maximum sensed data and deliver them to a sink node before a required deadline. A non-cooperative game is used to model this behavior and evaluate the performance of the gathering scheme when two DCs are competing with each other to gain more sensed data. Under this scheme, aggressive behavior is discouraged since each data gathering operation incurs sensor nodes energy decrease and data delivery delay increase.}, isbn = {978-1-5090-0304-4}, issn = {2376-6492}, author = {Brinis, Nour and Koulali, Mohamed-Amine and Saidane, Leila Azouz and Minet, Pascale and Kobbane, Abdellatif} } @conference {Brinis2016547, title = {Strategic data gathering in wireless sensor networks}, booktitle = {2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016}, year = {2016}, note = {cited By 0}, pages = {547-552}, abstract = {Prolonging the network lifetime is a challenging problem in wireless sensor networks. Using additional mobile agents able to gather data from static sensor nodes reveals to be one of the convenient solutions in order to conserve static sensor nodes energy. In this paper, we focus on a conflictual situation between two Data Collectors (DCs) tending to gather maximum sensed data and deliver them to a sink node before a required deadline. A non-cooperative game is used to model this behavior and evaluate the performance of the gathering scheme when two DCs are competing with each other to gain more sensed data. Under this scheme, aggressive behavior is discouraged since each data gathering operation incurs sensor nodes energy decrease and data delivery delay increase. {\textcopyright} 2016 IEEE.}, doi = {10.1109/IWCMC.2016.7577116}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84994137830\&doi=10.1109\%2fIWCMC.2016.7577116\&partnerID=40\&md5=9c385bde486970ab7cb87df7e747837e}, author = {Brinis, N.a and Koulali, M.-A.b and Saidane, L.A.a and Minet, P.c and Kobbane, A.d} } @conference { ISI:000386649000023, title = {Systematic Mapping Study of Dealing with Error in Software Development Effort Estimation}, booktitle = {2016 42ND EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA)}, year = {2016}, note = {42nd Euromicro Conference Series on Software Engineering and Advanced Applications (SEAA), Limassol, CYPRUS, AUG 31-SEP 02, 2016}, pages = {140-147}, publisher = {Univ Cyprus; Technolog Educ Inst Western Greece}, organization = {Univ Cyprus; Technolog Educ Inst Western Greece}, abstract = {Over the last decades, the software engineering community has investigated new techniques for software development effort estimation. Unfortunately, the estimates were not always accurate. Error approaches are then, an interesting track for improving the projects running performances and their financial profitability. The aim of this systematic mapping study is to summarize and synthesize the existing studies dealing with effort estimation error and uncertainty and to classify them based on research approaches, contribution types, accuracy criteria, datasets, error approaches and effort estimation techniques used. In total 19 papers published between 1990 and 2015 were selected. We observed a balance between the managerial approaches and the technical ones. Furthermore, the proposed error techniques and frameworks improve in general the accuracy of effort estimation techniques. Fuzzy logic, bootstrapping and risk analysis are promising avenues that could be combined with various estimation techniques.}, isbn = {978-1-5090-2819-1}, doi = {10.1109/SEAA.2016.39}, author = {El Koutbi, Salma and Idri, Ali and Abran, Alain} } @conference { ISI:000381172301090, title = {Towards A Reference Model for Knowledge Management Performance Measurement}, booktitle = {INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI}, year = {2016}, note = {27th International Business Information Management Association Conference, Milan, ITALY, MAY 04-05, 2016}, pages = {2744-2755}, abstract = {Knowledge Management (KM) projects are socio-technical systems that enable knowledge activities and ensure that the right knowledge gets to the right person at the right time. The growing number of KM applications confirms the need for a performance measurement model able to assess the diversity of KM initiatives in order to rationalize their usage. To the best of our knowledge, a generic KM model for performance measurement fitting any kind of KM projects is missing in the literature. Instead, existing approaches are specific to a particular KM project or assess the overall KM of the organization. In this paper, we propose a KM model for performance measurement that is built on existing KM models literature and enhanced with theoretical findings. It also follows the reference modelling design process in view of producing a high quality model.}, isbn = {978-0-9860419-6-9}, author = {Oufkir, Latifa and Fredj, Mounia and Kassou, Ismail}, editor = {Soliman, KS} } @conference {Oufkir20162744, title = {Towards a reference model for Knowledge Management performance measurement}, booktitle = {Proceedings of the 27th International Business Information Management Association Conference - Innovation Management and Education Excellence Vision 2020: From Regional Development Sustainability to Global Economic Growth, IBIMA 2016}, year = {2016}, note = {cited By 0}, pages = {2744-2755}, abstract = {Knowledge Management (KM) projects are socio-technical systems that enable knowledge activities and ensure that the right knowledge gets to the right person at the right time. The growing number of KM applications confirms the need for a performance measurement model able to assess the diversity of KM initiatives in order to rationalize their usage. To the best of our knowledge, a generic KM model for performance measurement fitting any kind of KM projects is missing in the literature. Instead, existing approaches are specific to a particular KM project or assess the overall KM of the organization. In this paper, we propose a KM model for performance measurement that is built on existing KM models literature and enhanced with theoretical findings. It also follows the reference modelling design process in view of producing a high quality model. Copyright {\textcopyright} 2016 International Business Information Management Association}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84984611689\&partnerID=40\&md5=6ee42ddfe7a2a3ce0b1f2f99f09aa05b}, author = {Oufkir, L. and Fredj, M. and Kassou, I.} } @conference { ISI:000390888900008, title = {Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments}, booktitle = {CCSW{\textquoteright}16: PROCEEDINGS OF THE 2016 ACM CLOUD COMPUTING SECURITY WORKSHOP}, year = {2016}, note = {8th ACM Cloud Computing Security Workshop (CCSW), Vienna, AUSTRIA, OCT 28, 2016}, pages = {55-59}, publisher = {ACM SIGSAC; ACM}, organization = {ACM SIGSAC; ACM}, abstract = {Cloud computing offers most of its services under multi-tenancy environments. To satisfy security requirements among collaborating tenants, each tenant may define a set of access control policies to secure access to shared data. Several cloud solutions make use of XACML to specify such policies. However, existing implementations of XACML perform a brute force search to compare a request to all existing rules in a given XACML policy. This decreases the decision process (i.e., policy evaluation) performance especially for policies with a large number of rules. In this paper, we propose an automata-based approach for an efficient XACML policy evaluation. We implemented our approach in a cloud policy engine called X2Automata. The engine first converts both XACML policies and access requests to automata. Second, it combines the two automata by a synchronous product. Third, it applies an evaluation procedure to the resulting automaton to decide whether an access request is granted or not. To highlight the efficiency of X2Automata, we compare its performance, based on the OpenStack cloud environment, with the XACML implementation named Balana.}, isbn = {978-1-4503-4572-9}, doi = {10.1145/2996429.2996431}, author = {Ayache, Meryeme and Erradi, Mohammed and Freisleben, Bernd and Khoumsi, Ahmed} } @conference {Ayache201655, title = {Towards an efficient policy evaluation process in multi-tenancy cloud environments}, booktitle = {CCSW 2016 - Proceedings of the 2016 ACM Cloud Computing Security Workshop, co-located with CCS 2016}, year = {2016}, note = {cited By 0}, pages = {55-59}, abstract = {Cloud computing offers most of its services under multi-tenancy environments. To satisfy security requirements among collaborating tenants, each tenant may define a set of access control policies to secure access to shared data. Several cloud solutions make use of XACML to specify such policies. However, existing implementations of XACML perform a brute force search to compare a request to all existing rules in a given XACML policy. This decreases the decision process (i.e., policy evaluation) performance especially for policies with a large number of rules. In this paper, we propose an automata-based approach for an efficient XACML policy evaluation. We implemented our approach in a cloud policy engine called X2Automata. The engine first converts both XACML policies and access requests to automata. Second, it combines the two automata by a synchronous product. Third, it applies an evaluation procedure to the resulting automaton to decide whether an access request is granted or not. To highlight the efficiency of X2Automata, we compare its performance, based on the OpenStack cloud environment, with the XACML implementation named Balana. {\textcopyright} 2016 ACM.}, doi = {10.1145/2996429.2996431}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85001655008\&doi=10.1145\%2f2996429.2996431\&partnerID=40\&md5=8259d7215d88c0a1a7a94d837b9564a3}, author = {Ayache, M.a and Erradi, M.a and Freisleben, B.b and Khoumsi, A.c} } @article {Kerzazi2016289, title = {Who can help to review this piece of code?}, journal = {IFIP Advances in Information and Communication Technology}, volume = {480}, year = {2016}, note = {cited By 0}, pages = {289-301}, abstract = {Successful software projects require collaboration between team members. Efficient collaboration relies on both technical and social linkages. In this paper, we investigate whether a socio-technical analysis can support software contributors in identifying experts helping to review their source code. We mined the histories of five open source projects (OSS) from GitHub and examined both technical and socio-technical interactions based on Social Network Analysis (SNA). Mapping communication network to files co-edition network shows the existence of collaboration patterns between core teams and peripherals in the studied OSS projects. Our main contribution is the construction and mapping of three sources of social networks, in which contributors interact by co-editing, commenting or reviewing. We were able to identify behavioral patterns between core teams and peripherals related to the activity of code review. Our findings have implications on improving collaboration between contributors within virtual OSS communities witch drive teams{\textquoteright} performance and software products quality. {\textcopyright} IFIP International Federation for Information Processing 2016.}, doi = {10.1007/978-3-319-45390-3_25}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84989818867\&doi=10.1007\%2f978-3-319-45390-3_25\&partnerID=40\&md5=b8f6fddd6f538b75db5950c892ceceb0}, author = {Kerzazi, N. and El Asri, I.} } @conference { ISI:000392265300025, title = {Who Can Help to Review This Piece of Code?}, booktitle = {COLLABORATION IN A HYPERCONNECTED WORLD}, series = {IFIP Advances in Information and Communication Technology}, volume = {480}, year = {2016}, note = {17th IFIP WG 5.5 Working Conference on Virtual Enterprises (PRO-VE), Porto, PORTUGAL, OCT 03-05, 2016}, pages = {289-301}, publisher = {IFIP WG 5 5 Co Operat Infrastructure Virtual Enterprises \& Elect Business; Soc Collaborat Networks; U Porto; INESCTEC; Univ Amsterdam; Nova Univ Lisbon; UNINOVA}, organization = {IFIP WG 5 5 Co Operat Infrastructure Virtual Enterprises \& Elect Business; Soc Collaborat Networks; U Porto; INESCTEC; Univ Amsterdam; Nova Univ Lisbon; UNINOVA}, abstract = {Successful software projects require collaboration between team members. Efficient collaboration relies on both technical and social linkages. In this paper, we investigate whether a socio-technical analysis can support software contributors in identifying experts helping to review their source code. We mined the histories of five open source projects (OSS) from GitHub and examined both technical and socio-technical interactions based on Social Network Analysis (SNA). Mapping communication network to files co-edition network shows the existence of collaboration patterns between core teams and peripherals in the studied OSS projects. Our main contribution is the construction and mapping of three sources of social networks, in which contributors interact by co-editing, commenting or reviewing. We were able to identify behavioral patterns between core teams and peripherals related to the activity of code review. Our findings have implications on improving collaboration between contributors within virtual OSS communities witch drive teams{\textquoteright} performance and software products quality.}, isbn = {978-3-319-45390-3; 978-3-319-45389-7}, issn = {1868-4238}, doi = {10.1007/978-3-319-45390-3\_25}, author = {Kerzazi, Noureddine and El Asri, Ikram}, editor = {Afsarmanesh, H and CamarinhaMatos, LM and Soares, AL} } @conference {Kerzazi201677, title = {Who needs release and DevOps engineers, and why?}, booktitle = {Proceedings - International Workshop on Continuous Software Evolution and Delivery, CSED 2016}, year = {2016}, note = {cited By 1}, pages = {77-83}, abstract = {The recent surge in interest in continuous delivery has opened up the job market for release and DevOps engineers. However, despite an increasing number of conferences and publications on continuous delivery, smaller companies and startups still have a hard time determining the core tasks their future release and DevOps engineers should be responsible for (and what the differences between those two roles are), while universities are not sure what essential techniques and skills they should teach to their students. This paper performs an empirical analysis of online job postings to determine and compare the main tasks of release and DevOps engineers, globally and across countries. Our qualitative analysis shows that automation is the most important activity across the three roles, as articulated in job posting description data, and that the release engineer role combines the top activities of the DevOps and more traditional build engineer roles. Finally, different countries have a moderate degree of similarity between their ads, although each country has its specific focus. {\textcopyright} 2016 ACM.}, doi = {10.1145/2896941.2896957}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84984645277\&doi=10.1145\%2f2896941.2896957\&partnerID=40\&md5=2c7371a5581be3d091448050ed74c353}, author = {Kerzazi, N.a and Adams, B.b} } @conference { ISI:000382224200013, title = {Who Needs Release and DevOps Engineers, and Why?}, booktitle = {INTERNATIONAL WORKSHOP ON CONTINUOUS SOFTWARE EVOLUTION AND DELIVERY, CSED 2016}, year = {2016}, note = {1st International Workshop on Continuous Software Evolution and Delivery (CSED), Austin, TX, MAY 14-15, 2016}, pages = {77-83}, publisher = {Assoc Comp Machinery; IEEE Comp Soc; IEEE Tech Council Software Engn; ACM Special Interest Grp Software Engn}, organization = {Assoc Comp Machinery; IEEE Comp Soc; IEEE Tech Council Software Engn; ACM Special Interest Grp Software Engn}, abstract = {The recent surge in interest in continuous delivery has opened up the job market for release and DevOps engineers. However, despite an increasing number of conferences and publications on continuous delivery, smaller companies and start-ups still have a hard time determining the core tasks their future release and DevOps engineers should be responsible for (and what the differences between those two roles are), while universities are not sure what essential techniques and skills they should teach to their students. This paper performs an empirical analysis of online job postings to determine and compare the main tasks of release and DevOps engineers, globally and across countries. Our qualitative analysis shows that automation is the most important activity across the three roles, as articulated in job posting description data, and that the release engineer role combines the top activities of the DevOps and more traditional build engineer roles. Finally, different countries have a moderate degree of similarity between their ads, although each country has its specific focus.}, isbn = {978-1-4503-4157-8}, doi = {10.1145/2896941.2896957}, author = {Kerzazi, Noureddine and Adams, Bram} } @conference { ISI:000383221800012, title = {ACTOR NETWORK THEORY AS A COLLABORATIVE MODE: THE CONTRIBUTION OF GAME THEORY IN THE INTERESSEMENT PHASE}, booktitle = {PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT)}, year = {2015}, note = {5th World Congress on Information and Communication Technologies (WICT), Marrakesh, MOROCCO, DEC 14-16, 2015}, pages = {67-72}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, abstract = {Global Governance of projects requires cooperation between several actors. In general, such cooperation is ensured by building network collaboration between entities who want to collaborate. In spite of the existence of a number of works interested in collaboration network, only few of them were focused on how to construct a network. In this paper, we address this topic through Actor Network Theory. In particular way, we analyze interessement phase of ANT from a cooperative game point of view. Indeed, it{\textquoteright}s about negotiations between actors involved in business project. Our objective is to propose an approach of network establishment, by inciting actors through cost savings. For that, we use Shapley Value to answer the question: Which coalitions are likely to form in order to ensure best cost-saving objectives in ANT mode of collaboration? We propose also a graphical tool for visualizing networks and simulating their evolution.}, isbn = {978-1-4673-8712-5}, author = {Benqatla, Mohammed Salim and Dikra, Chikhaoui and Bounabat, Bouchaib}, editor = {Abrahim, A and Alimi, AM and Haqiq, A and Karray, H and Mousannif, H and BenHalima, M and Choo, YH and Ma, K} } @article {Benlarabi2015550, title = {Analyzing trends in software product lines evolution using a cladistics based approach}, journal = {Information (Switzerland)}, volume = {6}, number = {3}, year = {2015}, note = {cited By 1}, pages = {550-563}, abstract = {Abstract: A software product line is a complex system the aim of which is to provide a platform dedicated to large reuse. It necessitates a great investment. Thus, its ability to cope with customers{\textquoteright} ever-changing requirements is among its key success factors. Great effort has been made to deal with the software product line evolution. In our previous works, we carried out a classification of these works to provide an overview of the used techniques. We also identified the following key challenges of software product lines evolution: the ability to predict future changes, the ability to define the impact of a change easily and the improvement in understanding the change. We have already tackled the second and the third challenges. The objective of this paper is to deal with the first challenge. We use the cladistics classification which was used in biology to understand the evolution of organisms sharing the same ancestor and their process of descent at the aim of predicting their future changes. By analogy, we consider a population of applications for media management on mobile devices derived from the same platform and we use cladistics to construct their evolutionary tree. We conducted an analysis to show how to identify the evolution trends of the case study products and to predict future changes. {\textcopyright} 2015 by the authors.}, doi = {10.3390/info6030550}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84943561816\&doi=10.3390\%2finfo6030550\&partnerID=40\&md5=892c17009c76fbae807d486836450566}, author = {Benlarabi, A. and Khtira, A. and El Asri, B.} } @conference { ISI:000383221800027, title = {Big Data: Measuring How Information Technology Can Improve the Economic Growth and Better Life}, booktitle = {PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT)}, year = {2015}, note = {5th World Congress on Information and Communication Technologies (WICT), Marrakesh, MOROCCO, DEC 14-16, 2015}, pages = {152-159}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, abstract = {Today data are equivalent of oil or gold, but Succeeding with big data requires more than just data. Data-based value creation requires the identification of a framework from which predictions can be deducted and decisions can be made. Lot of index has been developed to measure the state of development of countries whether economic growth, ICT penetration or Human development. The purpose of the measuring was to assess policy implications and economic growth around the globe as well as share best practices. In this paper we are going to compare the most wildly tools of measurement of economic competiveness, Network readiness, Human development and world press freedom. Those four domains are judged to be the pillars of well-being and good live of a Human. In the second part of this paper, we examine the hypothesis that ICT penetration has positive effects on economic growth, well-being and a better life of a Human. We use the system Generalized Method of Moment for dynamic panel data analysis to extract the causal link between ICT penetration and growth.}, isbn = {978-1-4673-8712-5}, author = {Nouinou, Soumaya and Razafimampianina, Rindra M. and Regragui, Boubker and Doukkali, Abdelaziz S.}, editor = {Abrahim, A and Alimi, AM and Haqiq, A and Karray, H and Mousannif, H and BenHalima, M and Choo, YH and Ma, K} } @article {Lethrech2015236, title = {CADSSO: A development approach for contextaware service oriented systems}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {78}, number = {2}, year = {2015}, note = {cited By 1}, pages = {236-252}, abstract = {In this paper, we present our development approach named CADSSO (Context-Aware, Domain Specific and Service Oriented) for Context aware Service oriented Systems. CADSSO is organized in two stages: the modeling stage and the code generation stage. It is essentially based on the Domain Specific Modeling (DSM) approach. Indeed, the creation of the five models of the modeling stage is done using Domain Specific Languages (DSLs). The first model is Domain Specific Context Model, it represents the service execution context. The second is Domain Specific Service Model, it allows the services modeling. We also have the Service Variability Model which is used in the service variability modeling. The bond between Service Variability Model and Domain Specific Service Model is provided by Adaptation rules model. Finally, specific domain business modeling is done via domain specific business model. At code generation stage, a specific code generator transform all these models to final source code using a framework specifically designed for a given target platform. {\textcopyright} 2005 - 2015 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84939474505\&partnerID=40\&md5=2681fd4bda999019fd2fd938db150448}, author = {Lethrech, M.a and Kenzi, A.b and Elmagrouni, I.a and Nassar, M.a and Kriouile, A.a} } @conference { ISI:000380407100057, title = {A Cloud Service Template for Enabling Accurate Cloud Adoption and Migration}, booktitle = {2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15)}, year = {2015}, note = {International Conference on Cloud Computing Technologies and Applications (CloudTech), Marrakech, MOROCCO, JUN 02-04, 2015}, pages = {44-49}, abstract = {Since the cloud services are increasing exponentially, discover, filter, select and eventually migrate to the appropriate service is becoming a challenging mission. In the literature, several Service Template initiatives are proposed to deal with service description, topology and even portability, but they fail to emphasis the integration of consumer concerns and the migration feasibility checking before decision making. To fill the gap, the paper introduce a cloud service template that structured in three parts with a dedicated migration one. Also, a weight concept is added to service parameters in order to enforce importance and priority. Additionally, a context awareness mechanism is introduced for enabling automated service template adaptation.}, isbn = {978-1-4673-8149-9}, author = {El Houssaini, Charafeddine and Nassar, Mahmoud and Kriouile, Abdelaziz} } @conference {ElHoussaini2015, title = {A cloud service template for enabling accurate cloud adoption and migration}, booktitle = {Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015}, year = {2015}, note = {cited By 0}, abstract = {Since the cloud services are increasing exponentially, discover, filter, select and eventually migrate to the appropriate service is becoming a challenging mission. In the literature, several Service Template initiatives are proposed to deal with service description, topology and even portability, but they fail to emphasis the integration of consumer concerns and the migration feasibility checking before decision making. To fill the gap, the paper introduce a cloud service template that structured in three parts with a dedicated migration one. Also, a weight concept is added to service parameters in order to enforce importance and priority. Additionally, a context awareness mechanism is introduced for enabling automated service template adaptation. {\textcopyright} 2015 IEEE.}, doi = {10.1109/CloudTech.2015.7337018}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962784529\&doi=10.1109\%2fCloudTech.2015.7337018\&partnerID=40\&md5=c3c5532dba0fd60abea784ec21a685a7}, author = {El Houssaini, C. and Nassar, M. and Kriouile, A.} } @article {Mabrouk2015490, title = {Coalitional game theory for cooperative transmission in VANET: Internet access via fixed and mobile gateways}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {9466}, year = {2015}, note = {cited By 0}, pages = {490-495}, abstract = {In Vehicular Ad-hoc Networks (VANETs), vehicles need to cooperate with each other or with a roadside infrastructure to transmit data. In this work, we study the cooperative transmission for VANETs using coalitional game theory. Each vehicle has a desire to access Internet via gateways that can be either fixed or mobiles. The gateways can enhance the vehicles{\textquoteright} transmissions by cooperatively relaying the vehicles{\textquoteright} data. Moreover, due to the mobility of the vehicles, we introduce the notion of encounter and predicted lifetime to indicate the availability of forwarding between the vehicle and gateway. We model the problem as a coalition formation game with non-transferable utility and we propose an algorithm for forming coalitions among the vehicles. To evaluate the proposed solution, we present and discuss the numerical results under two scenarios: fixed gateways scenario and mobile gateways scenario. The numerical results show that mobile gateways scenario is more effective than fixed gateways scenario in term of cooperative transmission. {\textcopyright} Springer International Publishing Switzerland 2015.}, doi = {10.1007/978-3-319-26850-7_37}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84961155786\&doi=10.1007\%2f978-3-319-26850-7_37\&partnerID=40\&md5=1f9337ab54e8c5b7eedf4f0a81a41473}, author = {Mabrouk, A.a and Kobbane, A.a and Sabir, E.b and El Koutbi, M.a} } @conference {Oualhaj2015987, title = {A coalitional-game-based incentive mechanism for content caching in heterogeneous Delay Tolerant Networks}, booktitle = {IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference}, year = {2015}, note = {cited By 1}, pages = {987-992}, abstract = {In recent years, Delay Tolerant Networks (DTNs) have successfully presented as a possible extension of the Internet architecture in order to provide communication support to existing networks. However, these networks have a major issue which is the coordination among relays. In this work, we study the cooperative transmission for DTNs using coalitional game theory. We design a new incentive mechanism for heterogeneous system to induce coordination among DTN relays. In particular, we focus on the source packet dissemination to a destination using tow-hop relaying scheme, considering networks resource constraints: the relay buffer, the packet life time, and the energy consumption according to the mobile technologies. Rational mobiles are organized into separate coalition structures to meet a trade off between the source reward and the energy conservation. We discus the Nash equilibria for our game and the stable strategy state in which no mobile can get a higher payoff through changing unilaterally its coalition. Then, we use the distributed imitative Boltzmann-Gibbs learning algorithm enabling relays to learn the Nash equilibrium strategy; grand coalition. The improvement of the global system performance is examined, and a comparison between different inter-node collaboration states is presented. {\textcopyright} 2015 IEEE.}, doi = {10.1109/IWCMC.2015.7289217}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84949490492\&doi=10.1109\%2fIWCMC.2015.7289217\&partnerID=40\&md5=743073fbd086e6b2dc5623cb07de9531}, author = {Oualhaj, O.A.a and Kobbane, A.a b and Elmachkour, M.a and Sabir, E.c and Ben-Othman, J.b} } @conference { ISI:000381477900169, title = {A Coalitional-Game-Based Incentive Mechanism for Content Caching in Heterogeneous Delay Tolerant Networks}, booktitle = {2015 INTERNATIONAL WIRELESS COMMUNICATIONS \& MOBILE COMPUTING CONFERENCE (IWCMC)}, series = {International Wireless Communications and Mobile Computing Conference}, year = {2015}, note = {11th IEEE International Wireless Communications and Mobile Computing Conference (IEEE IWCMC), Dubrovnik, CROATIA, AUG 24-25, 2015}, pages = {987-992}, publisher = {IEEE; IEEE Croatia Sect; Univ Dubrovnik}, organization = {IEEE; IEEE Croatia Sect; Univ Dubrovnik}, abstract = {In recent years, Delay Tolerant Networks (DTNs) have successfully presented as a possible extension of the Internet architecture in order to provide communication support to existing networks. However, these networks have a major issue which is the coordination among relays. In this work, we study the cooperative transmission for DTNs using coalitional game theory. We design a new incentive mechanism for heterogeneous system to induce coordination among DTN relays. In particular, we focus on the source packet dissemination to a destination using tow-hop relaying scheme, considering networks resource constraints: the relay buffer, the packet life time, and the energy consumption according to the mobile technologies. Rational mobiles are organized into separate coalition structures to meet a trade off between the source reward and the energy conservation. We discus the Nash equilibria for our game and the stable strategy state in which no mobile can get a higher payoff through changing unilaterally its coalition. Then, we use the distributed imitative Boltzmann-Gibbs learning algorithm enabling relays to learn the Nash equilibrium strategy; grand coalition. The improvement of the global system performance is examined, and a comparison between different inter-node collaboration states is presented.}, isbn = {978-1-4799-5344-8}, issn = {2376-6492}, author = {Oualhaj, Omar Ait and Kobbane, Abdellatif and Elmachkour, Mouna and Sabir, Essaid and Ben-Othman, Jalel} } @conference { ISI:000380403000032, title = {Co-evolution Analysis for Software Product Lines}, booktitle = {ENASE 2015 - PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING}, year = {2015}, note = {10th International Conference on Evaluation of Novel Approaches to Software Engineering, Barcelona, SPAIN, APR 29-30, 2015}, pages = {263-269}, publisher = {Inst Syst \& Technol Information, Control \& Commun; Tech Council Software Engn; IEEE Comp Soc}, organization = {Inst Syst \& Technol Information, Control \& Commun; Tech Council Software Engn; IEEE Comp Soc}, abstract = {The purpose of our approach is to study the co-evolution of the platform and the products of software product lines. Because the platform must be able to derive all the family products, products are not allowed to evolve independently from the plateform, thus the propagation of the products changes must be managed efficiently. Instead of focusing on the change impact analysis we propose an approach to compare the evolution histories of the products and the platform illustrated through evolutionary trees built using the biological technique cladistics. This comparison yields important results concerning the change propagation. In this paper, we introduce the use of cladistics for software product lines to build evolutionary trees for platform and products, then we elaborate a mathematical analysis to compare these trees, afterwards we validate this work through a case study (mobile media software product lines). We also provide the design of an automated tool.}, isbn = {978-9-8975-8143-4}, author = {Benlarabi, Anissa and Khtira, Amal and El Asri, Bouchra}, editor = {Filipe, J and Maciaszek, L} } @conference {Kerzazi2015, title = {Conceptual alignment between SPEM-based processes and CMMI}, booktitle = {2015 10th International Conference on Intelligent Systems: Theories and Applications, SITA 2015}, year = {2015}, note = {cited By 0}, abstract = {In the course of process improvement, software organizations attempt to concurrently implement practices that originate from different models, extracting the best from each. Issues of integration and compliance are raised due to missing conceptual view. This paper presents a new method for an explicit alignment between SPEM-based software process modeling and CMMI corpus of best practices. The alignment of process activities with CMMI goes beyond the maturity assessment; it sustains the conceptualization of introducing new software engineering practices at the process-level and open a new topic of combining conceptually parts of different process models. Our method extends the SPEM Meta-model by introducing new interface to CMMI Meta-data. This extension allows visualization of the practices{\textquoteright} intentions within the activity breakdown structure. In addition, it offers a conceptual assessment of process maturity level according to CMMI scales. The method has been fully implemented in a process modeling tool and applied in both academic and industrial contexts to justify improvement opportunities through meaningful dashboards. {\textcopyright} 2015 IEEE.}, doi = {10.1109/SITA.2015.7358391}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962382985\&doi=10.1109\%2fSITA.2015.7358391\&partnerID=40\&md5=295cf9082ebffdc61c89150812bed4d4}, author = {Kerzazi, N.} } @conference { ISI:000380409500017, title = {Conceptual Alignment Between SPEM-Based Processes and CMMI}, booktitle = {2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, year = {2015}, note = {10th International Conference on Intelligent Systems - Theories and Applications (SITA), ENSIAS, Rabat, MOROCCO, OCT 20-21, 2015}, publisher = {IEEE}, organization = {IEEE}, abstract = {In the course of process improvement, software organizations attempt to concurrently implement practices that originate from different models, extracting the best from each. Issues of integration and compliance are raised due to missing conceptual view. This paper presents a new method for an explicit alignment between SPEM-based software process modeling and CMMI corpus of best practices. The alignment of process activities with CMMI goes beyond the maturity assessment; it sustains the conceptualization of introducing new software engineering practices at the process-level and open a new topic of combining conceptually parts of different process models. Our method extends the SPEM Meta-model by introducing new interface to CMMI Meta-data. This extension allows visualization of the practices{\textquoteright} intentions within the activity breakdown structure. In addition, it offers a conceptual assessment of process maturity level according to CMMI scales. The method has been fully implemented in a process modeling tool and applied in both academic and industrial contexts to justify improvement opportunities through meaningful dashboards.}, isbn = {978-1-5090-0220-7}, author = {Kerzazi, Noureddine} } @article { ISI:000351605500008, title = {Data traffic-based analysis of delay and energy consumption in cognitive radio networks with and without resource reservation}, journal = {INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS}, volume = {28}, number = {7}, year = {2015}, month = {MAY 10}, pages = {1316-1328}, abstract = {A new opportunistic cross-layer MAC protocol involving channel allocation and packet scheduling for cognitive radio networks is proposed. Cognitive radio allows secondary users (SUs) to exploit the available portions of the licensed spectrum bands without interfering with primary users. In particular, we consider a cognitive radio system, where SUs are equipped with two transceivers: a control transceiver and a software-defined radio transceiver. Data traffic characteristics of SUs are considered to ameliorate system performance. So, we propose a mechanism of resource reservation to improve QoS requirements that favors successful SUs to transmit data during x time slots without interfering with primary users. The key novelty of this paper is giving priority for SUs with important data traffic and which frequently solicits data channels to transmit for the remaining time of the ongoing time slot and for the next time slots directly after checking the channel availability. We develop a new analytical model to evaluate delay parameter for two scenarios with and without resource reservation and we then investigate the impact of those scenarios on the energy consumption. We show through simulations that cognitive radio performances increase noticeably with the proposed scheme. Copyright (c) 2014 John Wiley \& Sons, Ltd.}, issn = {1074-5351}, doi = {10.1002/dac.2764}, author = {Elmachkour, Mouna and Kobbane, Abdellatif and Sabir, Essaid and Ben-Othman, Jalel and El Koutbi, Mohammed} } @article {Elmachkour20151316, title = {Data traffic-based analysis of delay and energy consumption in cognitive radio networks with and without resource reservation}, journal = {International Journal of Communication Systems}, volume = {28}, number = {7}, year = {2015}, note = {cited By 6}, pages = {1316-1328}, abstract = {A new opportunistic cross-layer MAC protocol involving channel allocation and packet scheduling for cognitive radio networks is proposed. Cognitive radio allows secondary users (SUs) to exploit the available portions of the licensed spectrum bands without interfering with primary users. In particular, we consider a cognitive radio system, where SUs are equipped with two transceivers: a control transceiver and a software-defined radio transceiver. Data traffic characteristics of SUs are considered to ameliorate system performance. So, we propose a mechanism of resource reservation to improve QoS requirements that favors successful SUs to transmit data during x time slots without interfering with primary users. The key novelty of this paper is giving priority for SUs with important data traffic and which frequently solicits data channels to transmit for the remaining time of the ongoing time slot and for the next time slots directly after checking the channel availability. We develop a new analytical model to evaluate delay parameter for two scenarios with and without resource reservation and we then investigate the impact of those scenarios on the energy consumption. We show through simulations that cognitive radio performances increase noticeably with the proposed scheme. Copyright {\textcopyright} 2014 John Wiley \& Sons, Ltd.}, doi = {10.1002/dac.2764}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84925355761\&doi=10.1002\%2fdac.2764\&partnerID=40\&md5=ecf737b718373c4b7731373c0afd1200}, author = {Elmachkour, M.a and Kobbane, A.a c and Sabir, E.b and Ben-Othman, J.c and El Koutbi, M.a} } @conference { ISI:000380431500113, title = {A decision tree-based approach for cardiovascular dysautonomias diagnosis}, booktitle = {2015 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI)}, year = {2015}, note = {IEEE Symposium Series Computational Intelligence, Cape Town, SOUTH AFRICA, DEC 07-10, 2015}, pages = {816-823}, publisher = {IEEE; IEEE Computational Intelligence Soc; IEEE BigData}, organization = {IEEE; IEEE Computational Intelligence Soc; IEEE BigData}, abstract = {Terms as knowledge Discovery from Databases (KDD), Data Mining (DM) and Machine Learning (ML), gain from day to day, an increasing significance in medical data analysis. They permit the identification, evaluation, and quantification of some less visible, intuitively unpredictable, by using generally large sets of data. Researchers have long been concerned with applying DM tools to improve data analysis on large data sets. DM has been increasingly used in medicine, particularly in cardiology. In fact, data mining applications can greatly benefits all parts involved in cardiology. Autonomic nervous system (ANS) is the part of the nervous system that is involved in homeostasis of the whole body functions. A malfunction in this system can lead to a cardiovascular dysautonomias. Thereby, a set of dynamic tests are adopted in ANS units to diagnose and treat patients with cardiovascular dysautonomias. In this paper, a case study was performed in order to construct a cardiovascular dysautonomias prediction system using data mining techniques and a dataset collected from an ANS unit of the Moroccan university hospital Avicenne. The prediction system is a decision tree-based classifier that was developed using C4.5 decision tree algorithm to automate the analysis procedure of ANS{\textquoteright}s test results and make it easier for specialists. The performance of the generated decision trees was evaluated and the results obtained achieved high accuracy rates which were very promising. In addition, a clinical validation of the developed system was carried out on new patients. In fact, a prototype of the developed system was implemented on JEE platform and deployed in the ANS unit so as to be validated clinically. The results were analyzed and thus the prototype was approved to be highly accurate, interpretable, time saving and easy to use.}, isbn = {978-1-4799-7560-0}, doi = {10.1109/SSCI.2015.121}, author = {Kadi, Ilham and Idri, Ali} } @conference {Kadi2015816, title = {A decision tree-based approach for cardiovascular dysautonomias diagnosis: A case study}, booktitle = {Proceedings - 2015 IEEE Symposium Series on Computational Intelligence, SSCI 2015}, year = {2015}, note = {cited By 1}, pages = {816-823}, abstract = {Terms as knowledge Discovery from Databases (KDD), Data Mining (DM) and Machine Learning (ML), gain from day to day, an increasing significance in medical data analysis. They permit the identification, evaluation, and quantification of some less visible, intuitively unpredictable, by using generally large sets of data. Researchers have long been concerned with applying DM tools to improve data analysis on large data sets. DM has been increasingly used in medicine, particularly in cardiology. In fact, data mining applications can greatly benefits all parts involved in cardiology. Autonomic nervous system (ANS) is the part of the nervous system that is involved in homeostasis of the whole body functions. A malfunction in this system can lead to a cardiovascular dysautonomias. Thereby, a set of dynamic tests are adopted in ANS units to diagnose and treat patients with cardiovascular dysautonomias. In this paper, a case study was performed in order to construct a cardiovascular dysautonomias prediction system using data mining techniques and a dataset collected from an ANS unit of the Moroccan university hospital Avicenne. The prediction system is a decision tree-based classifier that was developed using C4.5 decision tree algorithm to automate the analysis procedure of ANS{\textquoteright}s test results and make it easier for specialists. The performance of the generated decision trees was evaluated and the results obtained achieved high accuracy rates which were very promising. In addition, a clinical validation of the developed system was carried out on new patients. In fact, a prototype of the developed system was implemented on JEE platform and deployed in the ANS unit so as to be validated clinically. The results were analyzed and thus the prototype was approved to be highly accurate, interpretable, time saving and easy to use. {\textcopyright} 2015 IEEE.}, doi = {10.1109/SSCI.2015.121}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84964940639\&doi=10.1109\%2fSSCI.2015.121\&partnerID=40\&md5=f0d227a9f5e18f21b2c5aebad30b41f8}, author = {Kadi, I. and Idri, A.} } @conference {Hafdi2015331, title = {Designing ReDy distributed systems}, booktitle = {Proceedings - IEEE International Conference on Autonomic Computing, ICAC 2015}, year = {2015}, note = {cited By 0}, pages = {331-336}, abstract = {Distributed systems are largely present and deployed in recent applications. Several systems have common basic requirements, which motivates to adapt reusable solutions for each family of systems. In this paper, we focus on distributed systems designed for large-scale applications requiring a high degree of Reliability and Dynamicity (ReDy distributed systems). We propose a basic architecture for this family of systems and a design solution to guarantee the scalability of the system, the fault tolerance, and a highly dynamic membership management. The studied systems range from hybrid architecture, on which we combine centralized and decentralized solutions. {\textcopyright} 2015 IEEE.}, doi = {10.1109/ICAC.2015.63}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84961839190\&doi=10.1109\%2fICAC.2015.63\&partnerID=40\&md5=f4847babbee4e85fc1f3d4aa04d701f1}, author = {Hafdi, K. and Kriouile, A.} } @conference { ISI:000380570700061, title = {Designing ReDy Distributed Systems}, booktitle = {2015 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING}, year = {2015}, note = {IEEE International Conference on Autonomic Computing, Grenoble, FRANCE, JUL 07-10, 2015}, pages = {331-336}, publisher = {IEEE; usenix; Univ Joseph Fourier; Telecom ParisTech; Spec; GRENOBLE ALPLES METROPOLE; VILLE CRENOBOLE; MINALOGIC; CPS; IEEE COMPUTER SOC; hp; Google; orange; FOCAS; INRIA INVENTORS DIGITAL WORLD}, organization = {IEEE; usenix; Univ Joseph Fourier; Telecom ParisTech; Spec; GRENOBLE ALPLES METROPOLE; VILLE CRENOBOLE; MINALOGIC; CPS; IEEE COMPUTER SOC; hp; Google; orange; FOCAS; INRIA INVENTORS DIGITAL WORLD}, abstract = {Distributed systems are largely present and deployed in recent applications. Several systems have common basic requirements, which motivates to adapt reusable solutions for each family of systems. In this paper, we focus on distributed systems designed for large-scale applications requiring a high degree of Reliability and Dynamicity (ReDy distributed systems). We propose a basic architecture for this family of systems and a design solution to guarantee the scalability of the system, the fault tolerance, and a highly dynamic membership management. The studied systems range from hybrid architecture, on which we combine centralized and decentralized solutions.}, isbn = {978-1-4673-6971-8}, doi = {10.1109/ICAC.2015.63}, author = {Hafdi, Kaoutar and Kriouile, Abdelaziz}, editor = {Lalanda, P and Diaconescu, A and Cherkasova, L and Kounev, S} } @conference { ISI:000380403000031, title = {Detecting Feature Duplication in Natural Language Specifications when Evolving Software Product Lines}, booktitle = {ENASE 2015 - PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING}, year = {2015}, note = {10th International Conference on Evaluation of Novel Approaches to Software Engineering, Barcelona, SPAIN, APR 29-30, 2015}, pages = {257-262}, publisher = {Inst Syst \& Technol Information, Control \& Commun; Tech Council Software Engn; IEEE Comp Soc}, organization = {Inst Syst \& Technol Information, Control \& Commun; Tech Council Software Engn; IEEE Comp Soc}, abstract = {Software product lines are dynamic systems that need to evolve continuously to meet new customer requirements. This evolution impacts both the core platform of the product line and its derived products. For several reasons, the most common way to express requirements by customers is natural language. However, the experience has shown that this communication channel does not give the possibility to detect system defects such as inconsistency and duplication. The objective of this paper is to propose a method to transform textual requirements into the XML format used by some Feature-oriented software development tools, in order to facilitate the detection of features duplication.}, isbn = {978-9-8975-8143-4}, author = {Khtira, Amal and Benlarabi, Anissa and El Asri, Bouchra}, editor = {Filipe, J and Maciaszek, L} } @article {Elmagrouni2015773, title = {A development process for adaptable services-oriented systems}, journal = {International Review on Computers and Software}, volume = {10}, number = {7}, year = {2015}, note = {cited By 1}, pages = {773-783}, abstract = {In this work, we present our approach for the Development of adaptable Servicesoriented Systems. The process consists of four phases (Preparation, Elaboration, Construction and transition).It is based on the Rational Unified Process (RUP) and component-oriented development process modelling (BPM: Business Process Modelling).We discuss the shortcomings of current solutions for adaptive service-oriented System. To address those shortcomings, we introduce techniques that can be used to build and evolve proactive Services-oriented Systems. The use of those techniques in an integrated way is described along the phases of the service lifecycle. A lightweight WSDL extension of the standard WSDL (Web Service Description Language)is used to describe the service functionalities. The extension is carried out as a metamodel transformation, according to principles and standards recommended by the Model Driven Architecture (MDA). {\textcopyright} 2015 Praise Worthy Prize S.r.l. - All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84943801868\&partnerID=40\&md5=b46057e08465b42d2d72b19a6ed13121}, author = {Elmagrouni, I.a and Kenzi, A.b and Lethrech, M.a and Kriouile, A.a} } @conference { ISI:000381477900056, title = {A Distributed Open-Close Access for Small-Cell Networks: A Random Matrix Game Analysis}, booktitle = {2015 INTERNATIONAL WIRELESS COMMUNICATIONS \& MOBILE COMPUTING CONFERENCE (IWCMC)}, series = {International Wireless Communications and Mobile Computing Conference}, year = {2015}, note = {11th IEEE International Wireless Communications and Mobile Computing Conference (IEEE IWCMC), Dubrovnik, CROATIA, AUG 24-25, 2015}, pages = {320-325}, publisher = {IEEE; IEEE Croatia Sect; Univ Dubrovnik}, organization = {IEEE; IEEE Croatia Sect; Univ Dubrovnik}, abstract = {Nowadays, Small-Cells are widely being deployed to assist and improve performance of mobile networks. Indeed, they are a promising solution to improve coverage and to offload data traffic in mobile networks. In this paper, we propose a signaling-less architecture of the heterogeneous network composed of one single Macro Base Station and a Single Small-Cell. First, we construct a game theoretic framework for channel-state independent interaction. We present many conditions for the existence of Pure Nash equilibrium. Next, and in order to capture the continuous change of the channel state, we build a random matrix game where the channel state is considered to be random (potentially ruled by some given distribution). A characterization of Nash equilibrium is provided in terms of pure strategies and mixed strategies. Convergence to Nash equilibrium is furthermore guaranteed using a variant of the well-known Combined fully distributed payoff and strategy learning. Our algorithm converges faster (only 10-20 iterations are required to converge to Nash equilibrium) and only need a limited amount of local information. This is quite promising since it says that our scheme is almost applicable for all environments (fast fading included).}, isbn = {978-1-4799-5344-8}, issn = {2376-6492}, author = {Ben Chekroun, Samia and Sabir, Essaid and Kobbane, Abdellatif and Tembine, Hamidou and Bouyakhf, El-Houssine and Ibrahimi, Khalil} } @conference {BenChekroun2015320, title = {A distributed open-close access for Small-Cell networks: A random matrix game analysis}, booktitle = {IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference}, year = {2015}, note = {cited By 0}, pages = {320-325}, abstract = {Nowadays, Small-Cells are widely being deployed to assist and improve performance of mobile networks. Indeed, they are a promising solution to improve coverage and to offload data traffic in mobile networks. In this paper, we propose a signaling-less architecture of the heterogeneous network composed of one single Macro Base Station and a Single Small-Cell. First, we construct a game theoretic framework for channel-state independent interaction. We present many conditions for the existence of Pure Nash equilibrium. Next, and in order to capture the continuous change of the channel state, we build a random matrix game where the channel state is considered to be random (potentially ruled by some given distribution). A characterization of Nash equilibrium is provided in terms of pure strategies and mixed strategies. Convergence to Nash equilibrium is furthermore guaranteed using a variant of the well-known Combined fully distributed payoff and strategy learning. Our algorithm converges faster (only 10-20 iterations are required to converge to Nash equilibrium) and only need a limited amount of local information. This is quite promising since it says that our scheme is almost applicable for all environments (fast fading included). {\textcopyright} 2015 IEEE.}, doi = {10.1109/IWCMC.2015.7289103}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84949516312\&doi=10.1109\%2fIWCMC.2015.7289103\&partnerID=40\&md5=09ea6932ff0311a5cea7e0dc62597821}, author = {Ben Chekroun, S.a and Sabir, E.b and Kobbane, A.c and Tembine, H.d and Bouyakhf, E.-H.a and Ibrahimi, K.e} } @article {Khtira2015592, title = {Duplication detection when evolving feature models of software product lines}, journal = {Information (Switzerland)}, volume = {6}, number = {4}, year = {2015}, note = {cited By 1}, pages = {592-612}, abstract = {After the derivation of specific applications from a software product line, the applications keep evolving with respect to new customer{\textquoteright}s requirements. In general, evolutions in most industrial projects are expressed using natural language, because it is the easiest and the most flexible way for customers to express their needs. However, the use of this means of communication has shown its limits in detecting defects, such as inconsistency and duplication, when evolving the existing models of the software product line. The aim of this paper is to transform the natural language specifications of new evolutions into a more formal representation using natural language processing. Then, an algorithm is proposed to automatically detect duplication between these specifications and the existing product line feature models. In order to instantiate the proposed solution, a tool is developed to automatize the two operations. {\textcopyright} 2015 by the authors.}, doi = {10.3390/info6040592}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84952314845\&doi=10.3390\%2finfo6040592\&partnerID=40\&md5=0661de379421d5877cc91927d0c41731}, author = {Khtira, A. and Benlarabi, A. and El Asri, B.} } @conference { ISI:000360508700103, title = {Early Warning Signs Detection in Competitive Intelligence}, booktitle = {INNOVATION VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOL I-VI}, year = {2015}, note = {25th International-Business-Information-Management-Association Conference, Amsterdam, NETHERLANDS, MAY 07-08, 2015}, pages = {1014-1024}, publisher = {Int Business Informat Management Assoc}, organization = {Int Business Informat Management Assoc}, abstract = {In a world of excessive competitiveness in the business environment, the competitive intelligence activities are widely used to monitor the competitors. Many techniques are used like opinion mining, event detection and foresight studies. Foresight allows studying the future and tries to predict and anticipate future actions. We can find diverse concepts and methodologies with numerous challenging research topics: trends, weak signals, wild cards... This paper will focus on weak signal detection in which we try to find the early warning signs in a performed quantitative and automatic way. It will present a literature review regarding the weak signals analysis terminology along with the processes to detect these signals, techniques, methods and approaches used.}, isbn = {978-0-9860419-4-5}, author = {El Akrouchi, Manal and Benbrahim, Houda and Kassou, Ismail}, editor = {Soliman, KS} } @article {ElQacimym20151120, title = {An efficient segmentation algorithm for handwritten arabic words}, journal = {International Review on Computers and Software}, volume = {10}, number = {11}, year = {2015}, note = {cited By 0}, pages = {1120-1126}, abstract = {Segmentation is an essential step for many Arabic handwritten Text recognition systems. It has a direct impact on the efficiency of subsequent steps in the recognition process such as feature extraction and classification, which strongly affects overall recognition performance. This paper presents a novel algorithm for off-line handwritten Arabic word segmentation into subwords. This approach is based on vertical projection and a novel algorithm taking into consideration the characteristics of Arabic script. The proposed method has been successfully tested on the IFN/ENIT database and the results show the effectiveness of our approach in segmenting and isolating sub-words efficiently. {\textcopyright} 2015 Praise Worthy Prize S.r.l. -All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84956884338\&partnerID=40\&md5=713325a3fa28f76f89fa8249c846e146}, author = {El Qacimym, B.a b and Ait Kerroum, M.c d and Hammouch, A.e f g h} } @article {Boumkheld2015116, title = {Energy consumption scheduling in a smart grid including uding renewable energy}, journal = {Journal of Information Processing Systems}, volume = {11}, number = {1}, year = {2015}, note = {cited By 3}, pages = {116-124}, abstract = {Smart grids propose new solutions for electricity consumers as a means to help them use energy in an efficient way. In this paper, we consider the demand-side management issue that exists for a group of consumers (houses) that are equipped with renewable energy (wind turbines) and storage units (battery), and we try to find the optimal scheduling for their home appliances, in order to reduce their electricity bills. Our simulation results prove the effectiveness of our approach, as they show a significant reduction in electricity costs when using renewable energy and battery storage. {\textcopyright} 2015 KIPS.}, doi = {10.3745/JIPS.03.0022}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84928578762\&doi=10.3745\%2fJIPS.03.0022\&partnerID=40\&md5=502083b45ef8166915475a2b54dfb0c8}, author = {Boumkheld, N.a b and Ghogho, M.b c and Koutbi, M.E.a} } @conference { ISI:000380521600041, title = {Exponentially Tapered Antipodal Vivaldi Antenna for Breast Cancer Detection}, booktitle = {2015 IEEE 15th Mediterranean Microwave Symposium (MMS)}, year = {2015}, note = {2015 IEEE 15th Mediterranean Microwave Symposium (MMS), Lecce, ITALY, NOV 30-DEC 02, 2015}, abstract = {In this paper a new UWB antipodal Vivaldi antenna for breast cancer detection is presented. It is found that by inserting exponential slots into both patches of the antipodal Vivaldi antenna a good matching can be achieved, specially for the lower bandwidth limit, without degradation of the other performances of the proposed antenna. The characteristics of this antenna have been studied numerically using a commercial simulator CST microwave studio.}, isbn = {978-1-4673-7602-0}, author = {Kanjaa, M. and EL Mrabee, O. and Khalladi, M. and Essaaidi, M.} } @conference {Kanjaa2015, title = {Exponentially tapered antipodal Vivaldi antenna for breast cancer detection}, booktitle = {Mediterranean Microwave Symposium}, volume = {2016-January}, year = {2015}, note = {cited By 0}, abstract = {In this paper a new UWB antipodal Vivaldi antenna for breast cancer detection is presented. It is found that by inserting exponential slots into both patches of the antipodal Vivaldi antenna a good matching can be achieved , specially for the lower bandwidth limit , without degradation of the other performances of the proposed antenna. The characteristics of this antenna have been studied numerically using a commercial simulator CST microwave studio. {\textcopyright} 2015 IEEE.}, doi = {10.1109/MMS.2015.7375409}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962780456\&doi=10.1109\%2fMMS.2015.7375409\&partnerID=40\&md5=7d6fdac191d73d49643dba34c374cba9}, author = {Kanjaa, M.a and El Mrabet, O.a and Khalladi, M.a and Essaaidi, M.a b} } @article { ISI:000360910900010, title = {A ferry-assisted solution for forwarding function in Wireless Sensor Networks}, journal = {PERVASIVE AND MOBILE COMPUTING}, volume = {22}, number = {SI}, year = {2015}, month = {SEP}, pages = {126-135}, abstract = {For sure, Wireless Sensor Networks (WSNs) are becoming an ultimate part of next generation mobile networks. They are a master piece for Ubiquitous computing. Indeed, they sustain development of numerous paradigms/ technologies such as distributed ambient intelligence, context-awareness and future mobile networking (e.g., B4G and 5G). Battery life remains one of the crucial problems to handle. In this article we propose an infrastructure-based topology using mobile ferries (mobile micro-base stations). In real life, a ferry could be robot, bus, tram, train or any other engine scrutinizing periodically a given area. Yet, message ferries are moving along concentric annulus and may collect data generated by the static sensors (could be classic sensors, smart meters, wearable devices, etc.) randomly distributed on given area. Next, transmissions are performed in a ferry-to-ferry forwarding scheme till arriving at the sink. Considered ferries could sense themselves data and therefore behave as mobile sensors allowing better awareness on the area state {[}1-3]. Our scheme could also assist Machine-to-Machine communications to increase the network lifetime, with potentially some cognitive-radio capabilities and opportunistic detection and access. Our proposal can easily be integrated in a smart-city for better interaction and green communications. Next, we present a queueing model (queues with finite capacity) to handle the generated traffic and to analyze the behavior of mobile ferries. We provided a close-form expression for both end-to-end throughput and end-to-end delay. The main objective of this work is to improve the energy efficiency of the cognitive sensors by asking cognitive sensors to not care about forwarding data of each other except for urgent data, this latter point is out of the scope of the paper. These static sensors will only care about data sensing, which will reduce their individual energy consumption. (C) 2015 Elsevier B.V. All rights reserved.}, issn = {1574-1192}, doi = {10.1016/j.pmcj.2015.05.003}, author = {Oualhaj, Omar Ait and Kobbane, Abdellatif and Sabir, Essaid and Ben-Othman, Jalel and Erradi, Mohammed} } @article {AitOualhaj2015126, title = {A ferry-assisted solution for forwarding function in Wireless Sensor Networks}, journal = {Pervasive and Mobile Computing}, volume = {22}, year = {2015}, note = {cited By 2}, pages = {126-135}, abstract = {For sure, Wireless Sensor Networks (WSNs) are becoming an ultimate part of next generation mobile networks. They are a master piece for Ubiquitous computing. Indeed, they sustain development of numerous paradigms/ technologies such as distributed ambient intelligence, context-awareness and future mobile networking (e.g., B4G and 5G). Battery life remains one of the crucial problems to handle. In this article we propose an infrastructure-based topology using mobile ferries (mobile micro-base stations). In real life, a ferry could be robot, bus, tram, train or any other engine scrutinizing periodically a given area. Yet, message ferries are moving along concentric annulus and may collect data generated by the static sensors (could be classic sensors, smart meters, wearable devices, etc.) randomly distributed on given area. Next, transmissions are performed in a ferry-to-ferry forwarding scheme till arriving at the sink. Considered ferries could sense themselves data and therefore behave as mobile sensors allowing better awareness on the area state [1-3]. Our scheme could also assist Machine-to-Machine communications to increase the network lifetime, with potentially some cognitive-radio capabilities and opportunistic detection and access. Our proposal can easily be integrated in a smart-city for better interaction and green communications. Next, we present a queueing model (queues with finite capacity) to handle the generated traffic and to analyze the behavior of mobile ferries. We provided a close-form expression for both end-to-end throughput and end-to-end delay. The main objective of this work is to improve the energy efficiency of the cognitive sensors by asking cognitive sensors to not care about forwarding data of each other except for urgent data, this latter point is out of the scope of the paper. These static sensors will only care about data sensing, which will reduce their individual energy consumption. {\textcopyright} 2015 Elsevier B.V.}, doi = {10.1016/j.pmcj.2015.05.003}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84941024588\&doi=10.1016\%2fj.pmcj.2015.05.003\&partnerID=40\&md5=83a85e8d64da3c3ac9458a4eba519a14}, author = {Ait Oualhaj, O.a and Kobbane, A.b and Sabir, E.c and Ben-Othman, J.d and Erradi, M.a} } @conference { ISI:000354859800032, title = {FGAV (Fuzzy Global as Views)}, booktitle = {INTERNATIONAL CONFERENCE ON INTEGRATED INFORMATION (IC-ININFO 2014)}, series = {AIP Conference Proceedings}, volume = {1644}, year = {2015}, note = {4th International Conference on Integrated Information (IC-ININFO), Madrid, SPAIN, SEP 05-08, 2014}, pages = {236-243}, publisher = {Univ Peloponnese; Linnaeus Univ; Aberystwyth Univ; Technol \& Educ Inst Athens; Univ Complutense Madrid, Fac Ciencias Documentac; Inst Disseminat Arts \& Sci}, organization = {Univ Peloponnese; Linnaeus Univ; Aberystwyth Univ; Technol \& Educ Inst Athens; Univ Complutense Madrid, Fac Ciencias Documentac; Inst Disseminat Arts \& Sci}, abstract = {The mediation is an approach of integration, which allows to integrate different heterogeneous, autonomous and scalable sources of information, it provide to the user an uniform access, while hiding the peculiarities of each sources. In this paper, we presenting an approach of mapping for mediation systems, an operation that is used to define and describe all the links between the elements of global schema and those of local schemas. To this end, we firstly presenting our approach to mapping that consist to defining and associates for each link between two elements the weight that reflects the degree of its existence by using an analysis of two components: syntactic and semantic. On the other hand, we integrate a set of functionality for source schemas with elements of complex types.}, isbn = {978-0-7354-1283-5}, issn = {0094-243X}, doi = {10.1063/1.4907842}, author = {El Yazidi, Moulay Hafid and Zellou, Ahmed and Idri, Ali}, editor = {Giannakopoulos, G and Sakas, DP and KyriakiManessi, D} } @article {Khoumsi2015221, title = {A formal approach to verify completeness and detect anomalies in firewall security policies}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {8930}, year = {2015}, note = {cited By 1}, pages = {221-236}, abstract = {Security policies are a relevant solution to protect information systems from undue accesses. In this paper, we develop a formal and rigorous automata-based approach to design and analyze security policies. The interest of our approach is that it can be used as a common basis for analyzing several aspects of security policies, instead of using a distinct approach and formalism for studying each aspect. We first develop a procedure that synthesizes automatically an automaton which implements a given security policy. Then, we apply this synthesis procedure to verify completeness of security policies and detect several types of anomalies in security policies. We also study space and time complexities of the developed procedures. {\textcopyright} Springer International Publishing Switzerland 2015.}, doi = {10.1007/978-3-319-17040-4_14}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84928524690\&doi=10.1007\%2f978-3-319-17040-4_14\&partnerID=40\&md5=af206fc0108d0632a452dcb6750e1fd1}, author = {Khoumsi, A.a and Krombi, W.b and Erradi, M.b} } @conference { ISI:000361756400014, title = {A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies}, booktitle = {FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014)}, series = {Lecture Notes in Computer Science}, volume = {8930}, year = {2015}, note = {7th International Symposium on Foundations and Practice of Security (FPS), Concordia Univ, Montreal, CANADA, NOV 03-05, 2014}, pages = {221-236}, abstract = {Security policies are a relevant solution to protect information systems from undue accesses. In this paper, we develop a formal and rigorous automata-based approach to design and analyze security policies. The interest of our approach is that it can be used as a common basis for analyzing several aspects of security policies, instead of using a distinct approach and formalism for studying each aspect. We first develop a procedure that synthesizes automatically an automaton which implements a given security policy. Then, we apply this synthesis procedure to verify completeness of security policies and detect several types of anomalies in security policies. We also study space and time complexities of the developed procedures.}, isbn = {978-3-319-17040-4; 978-3-319-17039-8}, issn = {0302-9743}, doi = {10.1007/978-3-319-17040-4\_14}, author = {Khoumsi, Ahmed and Krombi, Wadie and Erradi, Mohammed}, editor = {Cuppens, F and GarciaAlfaro, J and Heywood, NZ and Fong, PWL} } @conference {Khoufi2015557, title = {A game theory-based approach for robots deploying wireless sensor nodes}, booktitle = {IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference}, year = {2015}, note = {cited By 1}, pages = {557-562}, abstract = {Wireless Sensor Networks (WSNs) are deployed in many fields of application. Depending on the application requirements, sensor nodes can either be mobile and autonomous or static. In both cases, they are able to cooperate together in order to monitor a given area or some given Points of Interest (PoIs). Static sensor nodes need one or several agent(s) (humans or robots) to deploy them. In this paper, we focus on the deployment of static sensor nodes in an area containing obstacles, using two mobile robots. We want to minimize the time needed by the two robots to deploy all the sensor nodes and to return to their starting position. We require that each sensor node is placed at a PoI position, no PoI position is empty and no PoI position is occupied by more than one sensor node. The problem consists in determining the best strategy for each robot in order to meet these constraints. We adopt a game theory approach to solve this problem. {\textcopyright} 2015 IEEE.}, doi = {10.1109/IWCMC.2015.7289144}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84949491266\&doi=10.1109\%2fIWCMC.2015.7289144\&partnerID=40\&md5=1f85f3af906970d1ae54fbb89ee6ec33}, author = {Khoufi, I.a and Minet, P.a and Koulali, M.-A.b and Erradi, M.c} } @conference { ISI:000381477900097, title = {A Game Theory-Based Approach for Robots Deploying Wireless Sensor Nodes}, booktitle = {2015 INTERNATIONAL WIRELESS COMMUNICATIONS \& MOBILE COMPUTING CONFERENCE (IWCMC)}, series = {International Wireless Communications and Mobile Computing Conference}, year = {2015}, note = {11th IEEE International Wireless Communications and Mobile Computing Conference (IEEE IWCMC), Dubrovnik, CROATIA, AUG 24-25, 2015}, pages = {557-562}, publisher = {IEEE; IEEE Croatia Sect; Univ Dubrovnik}, organization = {IEEE; IEEE Croatia Sect; Univ Dubrovnik}, abstract = {Wireless Sensor Networks (WSNs) are deployed in many fields of application. Depending on the application requirements, sensor nodes can either be mobile and autonomous or static. In both cases, they are able to cooperate together in order to monitor a given area or some given Points of Interest (PoIs). Static sensor nodes need one or several agent(s) (humans or robots) to deploy them. In this paper, we focus on the deployment of static sensor nodes in an area containing obstacles, using two mobile robots. We want to minimize the time needed by the two robots to deploy all the sensor nodes and to return to their starting position. We require that each sensor node is placed at a PoI position, no PoI position is empty and no PoI position is occupied by more than one sensor node. The problem consists in determining the best strategy for each robot in order to meet these constraints. We adopt a game theory approach to solve this problem.}, isbn = {978-1-4799-5344-8}, issn = {2376-6492}, author = {Khoufi, Ines and Minet, Pascale and Koulali, Mohamed-Amine and Erradi, Mohammed} } @conference {Belghiti2015425, title = {Green opportunistic access for CRN with selfish users using coalitional game approach in partition form}, booktitle = {Colloquium in Information Science and Technology, CIST}, volume = {2015-January}, number = {January}, year = {2015}, note = {cited By 2}, pages = {425-429}, abstract = {We study energy conservation and system performance of decentralized cognitive radio network with cognitive users. Every cognitive radio (CR) user needs to sense the channel to send data, if the channel is unoccupied by a licensed user only one winner transmits its data. Hence, all other users waste their energy in sensing the licensed bands and in negotiating the resource access without managing to transmit data packets. We formulate the sensing-energy tradeoff problem for distributed cognitive radio network as a coalition formation game. Our contribution is to apply the coalitional game design to the most important phases of cognitive radio network (CRN): sensing and data transmission. The concept of coalitional game may enforce the cooperative behavior of CR users in order to improve the system performance (energy and delay.). The network is modeled using a coalitional game in partition form with non transferable utility (NTU). After forming coalitions, no CR user in those coalitions aim to change its position. Indeed, the members of this coalition will cooperate both in sensing and access phases to improve system performance. The selfish behavior becomes evident when the cognitive users are constrained to send their data in a short delay and with a minimum of energy consumption. Our proposed algorithm explains how the selfish atittude of the cognitive user leds to join the coalition that increases its individual gain, and tacitly to improve the performance of the entire system. {\textcopyright} 2014 IEEE.}, doi = {10.1109/CIST.2014.7016658}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84938054783\&doi=10.1109\%2fCIST.2014.7016658\&partnerID=40\&md5=c2614efbd91a53116fb15f05bc9c369d}, author = {Belghiti, I.D.a and Elmachkour, M.b and Berrada, I.a and Kobbane, A.b} } @conference {Idri2015397, title = {Heart disease diagnosis using C4.5 algorithms: A case study}, booktitle = {HEALTHINF 2015 - 8th International Conference on Health Informatics, Proceedings; Part of 8th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2015}, year = {2015}, note = {cited By 2}, pages = {397-404}, abstract = {Data mining (DM) is a powerful process to extract knowledge and discover new patterns embedded in large data sets. DM has been increasingly used in medicine, particularly in cardiology. In fact, data mining applications can greatly benefits all parts involved in cardiology such as patients, cardiologists and nurses. Among the various units of a cardiology department, Autonomic Nervous System (ANS) is one of the most important and active unit. Thus, the aim of this study is to build a decision tree-based classifier using a data set collected from an ANS unit of the Moroccan university hospital Avicenne. The decision tree construction algorithm used in this study is C4.5. The classifier obtained presented a high level of accuracy measured in terms of error rate.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84938830011\&partnerID=40\&md5=4a5834cb70e23bacb28e8679fda98b89}, author = {Idri, A.a and Kadi, I.a and Benjelloun, H.b} } @conference { ISI:000380450300017, title = {Hybrid approach for project portfolio selection based on the business strategy and the scoring model}, booktitle = {FIFTH INTERNATIONAL CONFERENCE ON THE INNOVATIVE COMPUTING TECHNOLOGY (INTECH 2015)}, year = {2015}, note = {International Conference on the Innovative Computing Technology (INTECH), Galicia, SPAIN, MAY 20-22, 2015}, pages = {106-111}, abstract = {From among numerous opportunities, organizations must select the projects they decide to pursue. The consequences of poor decisions can be extremely expensive. This is why many methods and models for project portfolio selection have been developed. In this paper, we propose a project portfolio selection approach that combines a business strategy method with a scoring model. The proposed hybrid approach also includes recommendations on the selection criteria provided. Two criteria are identified: the value and risk, the third is at the option of the organization for more flexibility.}, isbn = {978-1-4673-7551-1}, author = {Benaija, Khadija and Kjiri, Laila} } @conference {Benaija2015106, title = {Hybrid approach for project portfolio selection based on the business strategy and the scoring model}, booktitle = {5th International Conference on Innovative Computing Technology, INTECH 2015}, year = {2015}, note = {cited By 0}, pages = {106-111}, abstract = {From among numerous opportunities, organizations must select the projects they decide to pursue. The consequences of poor decisions can be extremely expensive. This is why many methods and models for project portfolio selection have been developed. In this paper, we propose a project portfolio selection approach that combines a business strategy method with a scoring model. The proposed hybrid approach also includes recommendations on the selection criteria provided. Two criteria are identified: the value and risk, the third is at the option of the organization for more flexibility. {\textcopyright} 2015 IEEE.}, doi = {10.1109/INTECH.2015.7173476}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84946572345\&doi=10.1109\%2fINTECH.2015.7173476\&partnerID=40\&md5=f2ea1bca34b1f93bcefcb7a3b9557da1}, author = {Benaija, K. and Kjiri, L.} } @article {11273146620151201, title = {Hybrid Approach for Project Portfolio Selection Taking Account of Resources Management and Interactions between Projects.}, journal = {Journal of Digital Information Management}, volume = {13}, number = {6}, year = {2015}, pages = {451 - 461}, abstract = {From among numerous opportunities, organizations must select the projects they decide to pursue. The consequences of poor decisions can be extremely expensive. This is why many methods and models for project portfolio selection have been developed. In this paper, we propose a project portfolio selection approach that combines essentially a business strategy method with a scoring model. The financial method is also present of the fact that the scoring model considers the financial value as an important criterion. The proposed hybrid approach also includes recommendations on the selection criteria provided. Two criteria are identified: the value and risk, the third is at the option of the organization for more flexibility. The approach provides a phase control on two elements: the management of resources and interactions between projects. [ABSTRACT FROM AUTHOR]}, keywords = {Blended learning, Financial management, Portfolio management (Investments), Project Portfolio Management, Resource Management, Resource management {\textendash} Research, Simulation, Strategic planning}, issn = {09727272}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=112731466\&site=ehost-live}, author = {Benaija, Khadija and Kjiri, Laila} } @article {Benaija2015451, title = {Hybrid approach for project portfolio selection taking account of resources management and interactions between projects}, journal = {Journal of Digital Information Management}, volume = {13}, number = {6}, year = {2015}, note = {cited By 0}, pages = {451-461}, abstract = {From among numerous opportunities, organizations must select the projects they decide to pursue. The consequences of poor decisions can be extremely expensive. This is why many methods and models for project portfolio selection have been developed. In this paper, we propose a project portfolio selection approach that combines essentially a business strategy method with a scoring model. The financial method is also present of the fact that the scoring model considers the financial value as an important criterion. The proposed hybrid approach also includes recommendations on the selection criteria provided. Two criteria are identified: the value and risk, the third is at the option of the organization for more flexibility. The approach provides a phase control on two elements: the management of resources and interactions between projects.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84959232725\&partnerID=40\&md5=dfb8c730a2a801c9e09550897ae0f3d3}, author = {Benaija, K. and Kjiri, L.} } @conference { ISI:000381477900200, title = {On Improving Network Capacity for Downlink and Uplink of Two-Tier LTE-FDD Networks}, booktitle = {2015 INTERNATIONAL WIRELESS COMMUNICATIONS \& MOBILE COMPUTING CONFERENCE (IWCMC)}, series = {International Wireless Communications and Mobile Computing Conference}, year = {2015}, note = {11th IEEE International Wireless Communications and Mobile Computing Conference (IEEE IWCMC), Dubrovnik, CROATIA, AUG 24-25, 2015}, pages = {1168-1173}, publisher = {IEEE; IEEE Croatia Sect; Univ Dubrovnik}, organization = {IEEE; IEEE Croatia Sect; Univ Dubrovnik}, abstract = {A Long Term Evolution-Frequency Division Duplexing (LTE-FDD) small cell is one of the promising solutions for improving service quality and data rate in both the uplink and downlink of home users. Small cell (e.g., femtocell, picocell, microcell) is short range, low cost and low power base station installed by the indoor consumers. However, the avoidance of interferences is still an issue that needs to be addressed for successful deployment of small base stations (SBS) within existing macro cell networks mainly in co-channel deployment. Moreover, interferences are strongly dependent on the type of access control of small cells. Closed and open access are in conflict interests for macro users and home users in the uplink and downlink. To mitigate this conflict, we propose a fully distributed algorithm based on the shared time access and executed by LTE-FDD small cells, in order to reduce the effect of interferences, improve QoS of users, and maximize the overall capacity of downlink and uplink in two-tier LTE networks when small cells are deployed randomly. Simulation results validate our algorithm and show the improvement attained in offloading macro cell and satisfying QoS requirements of home users compared to the closed and open access mechanisms in both the uplink and downlink.}, isbn = {978-1-4799-5344-8}, issn = {2376-6492}, author = {Walid, Abdellaziz and Sabir, Essaid and Kobbane, Abdellatif and Taleb, Tarik and El Koutbi, Mohammed} } @conference {Walid20151168, title = {On improving network capacity for downlink and uplink of two-tier LTE-FDD networks}, booktitle = {IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference}, year = {2015}, note = {cited By 0}, pages = {1168-1173}, abstract = {A Long Term Evolution-Frequency Division Duplexing (LTE-FDD) small cell is one of the promising solutions for improving service quality and data rate in both the uplink and downlink of home users. Small cell (e.g., femtocell, picocell, microcell) is short range, low cost and low power base station installed by the indoor consumers. However, the avoidance of interferences is still an issue that needs to be addressed for successful deployment of small base stations (SBS) within existing macro cell networks mainly in co-channel deployment. Moreover, interferences are strongly dependent on the type of access control of small cells. Closed and open access are in conflict interests for macro users and home users in the uplink and downlink. To mitigate this conflict, we propose a fully distributed algorithm based on the shared time access and executed by LTE-FDD small cells, in order to reduce the effect of interferences, improve QoS of users, and maximize the overall capacity of downlink and uplink in two-tier LTE networks when small cells are deployed randomly. Simulation results validate our algorithm and show the improvement attained in offloading macro cell and satisfying QoS requirements of home users compared to the closed and open access mechanisms in both the uplink and downlink. {\textcopyright} 2015 IEEE.}, doi = {10.1109/IWCMC.2015.7289248}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84949503704\&doi=10.1109\%2fIWCMC.2015.7289248\&partnerID=40\&md5=3c58a33b86b3de8e31215575eda6ba0a}, author = {Walid, A.a and Sabir, E.b and Kobbane, A.a and Taleb, T.c and El Koutbi, M.a} } @conference { ISI:000380409500070, title = {Integrated enterprise system selection based on a fuzzy MCDM approach}, booktitle = {2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, year = {2015}, note = {10th International Conference on Intelligent Systems - Theories and Applications (SITA), ENSIAS, Rabat, MOROCCO, OCT 20-21, 2015}, publisher = {IEEE}, organization = {IEEE}, abstract = {An integrated enterprise system (IES) is essential to keep an enterprise growing and improving its productivity. Previous research relating to IES selection generally deals only with ERP solutions. The aim of this paper is to propose a fuzzy multi criteria decision making (MCDM) approach that could be followed to enable a given enterprise to select the most appropriate IES among the existing ones (Proprietary ERP, Open source ERP, In-house software, Best of Breed, ASP). Firstly, this paper analyses and synthetizes many criteria used in previous research works and proposes new ones to sort out the most relevant into nine dimensions for our problematic. Secondly, it presents a selection process which combines two fuzzy methods: Fuzzy Decision-Making Trial and Evaluation Laboratory (FDEMATEL) and fuzzy Analytic Network Process (FANP).}, isbn = {978-1-5090-0220-7}, author = {Setti, Meryem and Janati Idrissi, Mohammed Abdou and Khaled, Abdelilah} } @conference {Setti2015, title = {Integrated enterprise system selection based on a fuzzy MCDM approach}, booktitle = {2015 10th International Conference on Intelligent Systems: Theories and Applications, SITA 2015}, year = {2015}, note = {cited By 0}, abstract = {An integrated enterprise system (IES) is essential to keep an enterprise growing and improving its productivity. Previous research relating to IES selection generally deals only with ERP solutions. The aim of this paper is to propose a fuzzy multi criteria decision making (MCDM) approach that could be followed to enable a given enterprise to select the most appropriate IES among the existing ones (Proprietary ERP, Open source ERP, In-house software, Best of Breed, ASP). Firstly, this paper analyses and synthetizes many criteria used in previous research works and proposes new ones to sort out the most relevant into nine dimensions for our problematic. Secondly, it presents a selection process which combines two fuzzy methods: Fuzzy Decision-Making Trial and Evaluation Laboratory (FDEMATEL) and fuzzy Analytic Network Process (FANP). {\textcopyright} 2015 IEEE.}, doi = {10.1109/SITA.2015.7393656}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962422567\&doi=10.1109\%2fSITA.2015.7393656\&partnerID=40\&md5=8ed6d970310ca34150ca18d54c5a83f3}, author = {Setti, M. and Janati Idrissi, M.A. and Khaled, A.} } @conference {Guilavogui201543, title = {Integrating linked sensor data for on-line analytical processing on-the-fly}, booktitle = {Colloquium in Information Science and Technology, CIST}, volume = {2015-January}, number = {January}, year = {2015}, note = {cited By 0}, pages = {43-47}, abstract = {Sensor networks are gaining more and more attention in the current technology landscape. It is undeniable that their use allows a better monitoring of events that occur in the real world. Many sensors have been deployed for monitoring applications such as environmental monitoring, and traffic monitoring. A number of governments, corporates, and academic organizations or agencies hold independently sensor systems that generate a large amount of dynamic information from data sources with various formats of schemas and data. They are making this sensor data openly accessible by publishing it as Linked Sensor Data (LSD) on the Linked Open Data (LOD) cloud. LSD is the concept that defines the publication of public or private organization sensor data without restrictions. This is achieved by transforming raw sensor observations to RDF format and by linking it with other datasets on the LOD cloud. The seamless integration of LSD sources from multiple providers is a great challenge. In this paper, we investigate the possibility of integrating diverse LSD sources using the hybrid ontology approach for on-line analytical processing (OLAP) on-the-fly. With such an ontology-based integration framework, organizations or individuals will have greater opportunity to make their respective analysis based on a large amount of sensor data openly accessible on the Web. {\textcopyright} 2014 IEEE.}, doi = {10.1109/CIST.2014.7016592}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84938083080\&doi=10.1109\%2fCIST.2014.7016592\&partnerID=40\&md5=b7cd435ce00931bc4db7cd93a4aeaa1b}, author = {Guilavogui, K. and Kjiri, L. and Fredj, M.} } @conference { ISI:000383221800021, title = {Iterative Threshold Decoding of Quasi-Cyclic One Step Majority Logic Decodable Codes}, booktitle = {PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT)}, year = {2015}, note = {5th World Congress on Information and Communication Technologies (WICT), Marrakesh, MOROCCO, DEC 14-16, 2015}, pages = {117-122}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, abstract = {This paper presents a new class of Quasi-Cyclic One Step Majority logic codes of 1/2 rate constructed from perfect difference set. Theses codes can be encoded with low complexity, and perform very well when decoded with the Iterative threshold decoding algorithm. Much of these codes is a subfamily of the LDPC codes and can be decoded using belief propagation algorithm. A comparison between our results and those for LDPC code in terms of BER performance are presented.}, isbn = {978-1-4673-8712-5}, author = {Rkizat, Karim and Lahmer, Mohammed and Belkasmi, Mostafa}, editor = {Abrahim, A and Alimi, AM and Haqiq, A and Karray, H and Mousannif, H and BenHalima, M and Choo, YH and Ma, K} } @conference {McHarfi2015192, title = {Measuring the impact of traceability on the cost of Software Product Lines using COPLIMO}, booktitle = {Proceedings of 2015 International Conference on Electrical and Information Technologies, ICEIT 2015}, year = {2015}, note = {cited By 0}, pages = {192-197}, abstract = {Tracing helps assuring product quality, especially in large and complex systems such as Software Product Lines, where numerous artifacts and documents need to be linked and managed. Unfortunately, engineers and project managers rarely accord sufficient attention and importance to this approach, and adopt a traceability implementation strategy. This is due to its complexity and to the difficulties faced when implementing trace links especially costs that tracing can generates in short term. As we strongly believe that a quantitative estimation of the impact of traceability on Software Product Line{\textquoteright}s cost can help better understanding its usefulness, we present in this paper an analysis of this issue based on COPLIMO cost estimation model. The analysis shows that implementing trace links while developing the Software Product Line generates additional costs, but helps reducing them as the Product Line is used. {\textcopyright} 2015 IEEE.}, doi = {10.1109/EITech.2015.7162966}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84945277932\&doi=10.1109\%2fEITech.2015.7162966\&partnerID=40\&md5=6b5da17de43106300a775fd869ed064e}, author = {Mcharfi, Z. and El Asri, B. and Dehmouch, I. and Kriouile, A.} } @conference { ISI:000375089700036, title = {Measuring the Impact of Traceability on the Cost of Software Product Lines Using COPLIMO}, booktitle = {PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT 2015)}, year = {2015}, note = {1st International Conference on Electrical and Information Technologies (ICEIT), Marrakech, MOROCCO, MAR 25-27, 2015}, pages = {192-197}, abstract = {Tracing helps assuring product quality, especially in large and complex systems such as Software Product Lines, where numerous artifacts and documents need to be linked and managed. Unfortunately, engineers and project managers rarely accord sufficient attention and importance to this approach, and adopt a traceability implementation strategy. This is due to its complexity and to the difficulties faced when implementing trace links especially costs that tracing can generates in short term. As we strongly believe that a quantitative estimation of the impact of traceability on Software Product Line{\textquoteright}s cost can help better understanding its usefulness, we present in this paper an analysis of this issue based on COPLIMO cost estimation model. The analysis shows that implementing trace links while developing the Software Product Line generates additional costs, but helps reducing them as the Product Line is used.}, isbn = {978-1-4799-7479-5}, author = {Mcharfi, Zineb and El Asri, Bouchra and Dehmouch, Ram and Kriouile, Abdelaziz}, editor = {Essaaidi, M and ElHani, S} } @conference {Mourchid2015213, title = {Mining user patterns for location prediction in mobile social networks}, booktitle = {Colloquium in Information Science and Technology, CIST}, volume = {2015-January}, number = {January}, year = {2015}, note = {cited By 1}, pages = {213-218}, abstract = {Understanding human mobility dynamics is of an essential importance to today mobile applications, including context-aware advertising and city wide sensing applications. Recently, Location-based social networks (LBSNs) have attracted important researchers{\textquoteright} efforts, to investigate spatial, temporal and social aspects of user patterns. LBSNs allow users to {\textquoteright}check-in{\textquoteright} at geographical locations and share this information with friends. In this paper, analysis of check-ins data provided by Foursquare, the online location-based social network, allows us to construct a set of features that capture: spatial, temporal and similarity characteristics of user mobility. We apply this knowledge to location prediction problem, and combine these features in supervised learning for future location prediction. We find that the supervised classifier based on the combination of multiple features offers reasonable accuracy. {\textcopyright} 2014 IEEE.}, doi = {10.1109/CIST.2014.7016621}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84938084658\&doi=10.1109\%2fCIST.2014.7016621\&partnerID=40\&md5=86ede8ff82b4095f9bf55be3eaa192e2}, author = {Mourchid, F.a and Habbani, A.a b and Koutbi, M.E.a} } @conference { ISI:000380409500024, title = {Modelling Intelligent and Reliable Ferry Routes in Wireless Sensor Networks using Polling Systems Theory}, booktitle = {2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, year = {2015}, note = {10th International Conference on Intelligent Systems - Theories and Applications (SITA), ENSIAS, Rabat, MOROCCO, OCT 20-21, 2015}, publisher = {IEEE}, organization = {IEEE}, abstract = {This paper proposes a new model for finding intelligent and reliable ferry routes using a continuous polling system to ensure a better transportation of messages between wireless nodes and the corresponding sink. We consider that the Wireless Sensor Network (WSN) is composed by wireless static sensor nodes and several mobile ferries that collect information from all the sensors in the network. We have used a pure birth process to model the reliability aspect of the nodes in the network. We have considered several cases: with one ferry and N ferries moving in the same area. We have studied the impact of nodes density and the faulty rate occurrence to find the best and reliable path for the mobile ferry to cover all the nodes of the WSN.}, isbn = {978-1-5090-0220-7}, author = {El Mezouary, Ridouane and Amine Koulali, Mohammed and Kobbane, Abdellatif and El Koutbi, Mohammed} } @conference {ElMezouary2015, title = {Modelling intelligent and reliable ferry routes in Wireless Sensor Networks using polling systems theory}, booktitle = {2015 10th International Conference on Intelligent Systems: Theories and Applications, SITA 2015}, year = {2015}, note = {cited By 0}, abstract = {This paper proposes a new model for finding intelligent and reliable ferry routes using a continuous polling system to ensure a better transportation of messages between wireless nodes and the corresponding sink. We consider that the Wireless Sensor Network (WSN) is composed by wireless static sensor nodes and several mobile ferries that collect information from all the sensors in the network. We have used a pure birth process to model the reliability aspect of the nodes in the network. We have considered several cases: with one ferry and N ferries moving in the same area. We have studied the impact of nodes density and the faulty rate occurrence to find the best and reliable path for the mobile ferry to cover all the nodes of the WSN. {\textcopyright} 2015 IEEE.}, doi = {10.1109/SITA.2015.7358398}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962346090\&doi=10.1109\%2fSITA.2015.7358398\&partnerID=40\&md5=11e2db6bc8819a75b44989d3aa7dec48}, author = {El Mezouary, R.a and Koulali, M.A.b and Kobbane, A.a and El Koutbi, M.a} } @conference {Aghmadi2015, title = {A MTC traffic generation and QCI priority-first scheduling algorithm over LTE}, booktitle = {International Conference on Wireless Networks and Mobile Communications, WINCOM 2015}, year = {2015}, note = {cited By 0}, abstract = {As (M2M) Machine-To-Machine, communication continues to grow rapidly, a full study on overload control approach to manage the data and signaling of H2H traffic from massive MTC devices is required. In this paper, a new M2M resource-scheduling algorithm for Long Term Evolution (LTE) is proposed. It provides Quality of Service (QoS) guarantee to Guaranteed Bit Rate (GBR) services, we set priorities for the critical M2M services to guarantee the transportation of GBR services, which have high QoS needs. Additionally, we simulate and compare different methods and offer further observations on the solution design. {\textcopyright} 2015 IEEE.}, doi = {10.1109/WINCOM.2015.7381300}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84965013567\&doi=10.1109\%2fWINCOM.2015.7381300\&partnerID=40\&md5=1b75863c24d1fb98bed904b8c7096d6b}, author = {Aghmadi, A.a and Bouksim, I.a and Kobbane, A.a and Taleb, T.b} } @conference { ISI:000380509200003, title = {A MTC Traffic Generation and QCI Priority-First Scheduling Algorithm over LTE}, booktitle = {2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM)}, year = {2015}, note = {International conference on wireless networks and mobile communications, Marrakech, MOROCCO, OCT 20-23, 2015}, pages = {11-16}, abstract = {As (M2M) Machine-To-Machine, communication continues to grow rapidly, a full study on overload control approach to manage the data and signaling of H2H traffic from massive MTC devices is required. In this paper, a new M2M resource-scheduling algorithm for Long Term Evolution (LTE) is proposed. It provides Quality of Service (QoS) guarantee to Guaranteed Bit Rate (GBR) services, we set priorities for the critical M2M services to guarantee the transportation of GBR services, which have high QoS needs. Additionally, we simulate and compare different methods and offer further observations on the solution design.}, isbn = {978-1-4673-8224-3}, author = {Aghmadi, Ali and Bouksim, Iliass and Kobbane, Abdellatif and Taleb, Tarik} } @conference {Baddi2015378, title = {Multiple active cores-based shared multicast tree for mobile IPv6 environment}, booktitle = {Colloquium in Information Science and Technology, CIST}, volume = {2015-January}, number = {January}, year = {2015}, note = {cited By 0}, pages = {378-383}, abstract = {Due to the progress of network multimedia technology, internet research community proposed many different multicast routing protocols to support efficient realtime multimedia application such as, IPTV, videoconferencing, group games. These applications require a multicast routing protocol in which packets arrive to multicast receivers with minimum delay and delay variation. These applications are more important with arrival of mobile IPv6 protocol with mobile receivers and sources with continuous access. Nevertheless, the design of multicast protocols does not take into account that group members may be mobile. Dynamic group members and sources can rapidly affect quality of both routing protocol scheme and multicast tree used. The key idea of this work is to make the handover of multicast members transparent and a quick recovery mechanism to maintain an optimal multicast tree, by using MACT-MIPv6 architecture based on multicast routing protocol with Shared Multiple Active Cores Multicast Tree to hide the mobility of mobile multicast members from the main multicast delivery tree. Simulation results show that good performance is achieved in terms of handoff latency, end-to-end delay, tree construction delay and others metrics. {\textcopyright} 2014 IEEE.}, doi = {10.1109/CIST.2014.7016650}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84938069619\&doi=10.1109\%2fCIST.2014.7016650\&partnerID=40\&md5=c3eb443475201dc517bf26deec394308}, author = {Baddi, Y. and Ech-Cherif El Kettani, M.D.} } @conference { ISI:000380509200017, title = {A New Optimal Hybrid Spectrum Access in Cognitive Radio: Overlay-Underlay Mode}, booktitle = {2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM)}, year = {2015}, note = {International conference on wireless networks and mobile communications, Marrakech, MOROCCO, OCT 20-23, 2015}, pages = {92-98}, abstract = {In this paper, we propose a hybrid cognitive radio (CR) system where underlay and overlay CR approaches are combined under SIRN constraints. This new access type allows to optimize the spectrum sensing time with throughput improvement. Our proposed access type is based on a merger of these two modes depending on the number of secondary users (SU) in the Underlay Mode and on the access probabilities for these two modes. The number of all users in the Underlay access mode should not exceed a certain number of users. When a new SU arrives and if the number of SUs in Underlay mode is already equal to the predifined max number, the SU decides to switch to the Overlay mode to access the canal using this method. The SU states will be modeled with a Markov chain, the aim of this work is attempting to show that this new method allows to increase the throughput of the SU with energy optimization. The exact outage probability of secondary system is also derived for this model. Simulation results show that the performance, especiallay the throughput can be significantly increased by the proposed hybrid system.}, isbn = {978-1-4673-8224-3}, author = {Gmira, Sara and Kobbane, Abdellatif and Sabir, Essaid} } @conference {Gmira2015, title = {A new optimal hybrid spectrum access in cognitive radio: Overlay-underlay mode}, booktitle = {International Conference on Wireless Networks and Mobile Communications, WINCOM 2015}, year = {2015}, note = {cited By 2}, abstract = {In this paper, we propose a hybrid cognitive radio (CR) system where underlay and overlay CR approaches are combined under SIRN constraints. This new access type allows to optimize the spectrum sensing time with throughput improvement. Our proposed access type is based on a merger of these two modes depending on the number of secondary users (SU) in the Underlay Mode and on the access probabilities for these two modes. The number of all users in the Underlay access mode should not exceed a certain number of users. When a new SU arrives and if the number of SUs in Underlay mode is already equal to the predifined max number, the SU decides to switch to the Overlay mode to access the canal using this method. The SU states will be modeled with a Markov chain, the aim of this work is attempting to show that this new method allows to increase the throughput of the SU with energy optimization. The exact outage probability of secondary system is also derived for this model. Simulation results show that the performance, especiallay the throughput can be significantly increased by the proposed hybrid system. {\textcopyright} 2015 IEEE.}, doi = {10.1109/WINCOM.2015.7381314}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84965043094\&doi=10.1109\%2fWINCOM.2015.7381314\&partnerID=40\&md5=5d077bbb24ef8194362f761a7665f204}, author = {Gmira, S.a and Kobbane, A.a and Sabir, E.b} } @conference { ISI:000380409500023, title = {A New Trust Model to secure Routing Protocols against DoS attacks in MANETs}, booktitle = {2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, year = {2015}, note = {10th International Conference on Intelligent Systems - Theories and Applications (SITA), ENSIAS, Rabat, MOROCCO, OCT 20-21, 2015}, publisher = {IEEE}, organization = {IEEE}, abstract = {In mobile Ad hoc networks, data is transmitted in airspace between mobile entities without any centralized control. This environment offers many and very important services for mobile users. However, the level of security in this kind of network has not yet reached a significant level of maturity against the ferocious attacks. In this work, we present a new model to trust routing protocols communications in MANETs against DoS attacks. We have used the box plot theory to define accurately the threshold to detect a DoS attack and to reduce the number of false positives.}, isbn = {978-1-5090-0220-7}, author = {Echchaachoui, Adel and Kobbane, Abdellatif and Elkoutbi, Mohammed} } @conference { ISI:000373729000021, title = {Ontology Learning from Relational Database: How to Label the Relationships Between Concepts?}, booktitle = {BEYOND DATABASES, ARCHITECTURES AND STRUCTURES, BDAS 2015}, series = {Communications in Computer and Information Science}, volume = {521}, year = {2015}, note = {11th International Conference on Beyond Databases, Architectures and Structures (BDAS), Ustron, POLAND, MAY 26-29, 2015}, pages = {235-244}, publisher = {IEEE Poland Sect; Silesian Univ Technol, Inst Informat}, organization = {IEEE Poland Sect; Silesian Univ Technol, Inst Informat}, abstract = {Developing ontology for modeling the universe of a Relational Database (RDB) is a key success for many RDB related domains, including semantic-query of RDB, Linked Data and semantic interoperability of information systems. However, the manual development of ontology is a tedious task, error-prone and requires much time. The research field of ontology learning aims to provide (semi-) automatic approaches for building ontology. However, one big challenge in the automatic transformation, is how to label the relationships between concepts. This challenge depends heavily on the correct extraction of the relationship types. In fact, the RDB model does not store the meaning of relationships between entities, it only indicates the existence of a link between them. This paper suggests a solution consisting of a meta-model for the semantic enrichment of the RDB model and of a classification of relationships. A case study shows the effectiveness of our approach.}, isbn = {978-3-319-18422-7; 978-3-319-18421-0}, issn = {1865-0929}, doi = {10.1007/978-3-319-18422-7\_21}, author = {El Idrissi, Bouchra and Baina, Salah and Baina, Karim}, editor = {Kozielski, S and Mrozek, D and Kasprowski, P and MalysiakMrozek, B and Kostrzewa, D} } @conference {Benali2015, title = {A pareto-based Artificial Bee Colony and product line for optimizing scheduling of VM on cloud computing}, booktitle = {Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015}, year = {2015}, note = {cited By 0}, abstract = {In this paper, we present a task scheduling management based on the utility model which is used in economics to represent the needs of both the client and the provider. Indeed, our work copes with two man parameters that affect the broker, the cost of virtual machine instances and their response time. Minimizing those two objectives give the best quality of service to the customers and offer the broker an important profit. In fact, we consider the virtual machines as a product line and use the feature models to represent the virtual machines configurations to select the efficient resources that suit customer requirements and try at same time to minimize virtual machine cost. An efficient task scheduling mechanism can not only fit client{\textquoteright}s requirements, but also improve the resource utilization, be aware of the changing environment and intends to try to balance the system. Thus, our work is based on Artificial Bee Colony to optimize the scheduling of tasks on virtual machine in cloud computing by analyzing the difference of virtual machine load balancing algorithm. {\textcopyright} 2015 IEEE.}, doi = {10.1109/CloudTech.2015.7336980}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962909836\&doi=10.1109\%2fCloudTech.2015.7336980\&partnerID=40\&md5=2a3ad1b3ec1a9d144ab4537c9de687dd}, author = {Benali, A. and El Asri, B. and Kriouile, H.} } @conference { ISI:000380407100019, title = {A pareto-based Artificial Bee Colony and Product Line for Optimizing Scheduling of VM on Cloud Computing}, booktitle = {2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15)}, year = {2015}, note = {International Conference on Cloud Computing Technologies and Applications (CloudTech), Marrakech, MOROCCO, JUN 02-04, 2015}, pages = {159-165}, abstract = {In this paper, we present a task scheduling management based on the utility model which is used in economics to represent the needs of both the client and the provider. Indeed, our work copes with two man parameters that affect the broker, the cost of virtual machine instances and their response time. Minimizing those two objectives give the best quality of service to the customers and offer the broker an important profit. In fact, we consider the virtual machines as a product line and use the feature models to represent the virtual machines configurations to select the efficient resources that suit customer requirements and try at same time to minimize virtual machine cost. An efficient task scheduling mechanism can not only fit client{\textquoteright}s requirements, but also improve the resource utilization, be aware of the changing environment and intends to try to balance the system. Thus, our work is based on Artificial Bee Colony to optimize the scheduling of tasks on virtual machine in cloud computing by analyzing the difference of virtual machine load balancing algorithm.}, isbn = {978-1-4673-8149-9}, author = {Benali, Asmae and El Asri, Bouchra and Kriouile, Houda} } @article {ElKhaddar201543, title = {A policy-based middleware for context-aware pervasive computing}, journal = {International Journal of Pervasive Computing and Communications}, volume = {11}, number = {1}, year = {2015}, note = {cited By 1}, pages = {43-68}, abstract = {Purpose {\textendash} This paper aims to demonstrate that a policy-based middleware solution which facilitates the development of context-aware applications and the integration of the heterogeneous devices should be provided for ubiquitous computing environments. Ubiquitous computing targets the provision of seamless services and applications by providing an environment that involves a variety of devices having different capabilities. These applications help transforming the physical spaces into computationally active and smart environments. The design of applications in these environments needs to consider the heterogeneous devices, applications preferences and rapidly changing contexts. The applications, therefore, need to be context-aware so that they can adapt to different situations in real-time. Design/methodology/approach {\textendash} In this paper, we argue that a policy-based middleware solution that facilitates the development of context-aware applications and the integration of the heterogeneous devices should be provided for ubiquitous computing environments. The middleware allows applications to track items and acquire contextual information about them easily, reason about this information captured using different logics and then adapt to changing contexts. A key issue in these environments is to allow heterogeneous applications to express their business rules once, and get the preferred data once they are captured by the middleware without any intervention from the application side. Findings {\textendash} Our middleware tackles this problem by using policies to define the different applications{\textquoteright} rules and preferences. These policies can specify rules about the middleware services to be used, type of data captured, devices used, user roles, context information and any other type of conditions. Originality/value {\textendash} In this paper, we propose the design of a flexible and performant ubiquitous computing, and context-aware middleware called FlexRFID along with its evaluation results. {\textcopyright} Emerald Group Publishing Limited.}, doi = {10.1108/IJPCC-07-2014-0039}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84928536703\&doi=10.1108\%2fIJPCC-07-2014-0039\&partnerID=40\&md5=1ea1a116178cb05d7fea8c54743c528b}, author = {El Khaddar, M.A.a and Chraibi, M.b and Harroud, H.b and Boulmalf, M.c and Elkoutbi, M.a and Maach, A.d} } @conference { ISI:000383221800017, title = {A preliminary study on indicator framework for enterprise, based on COBIT 5 processes and SOA approach}, booktitle = {PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT)}, year = {2015}, note = {5th World Congress on Information and Communication Technologies (WICT), Marrakesh, MOROCCO, DEC 14-16, 2015}, pages = {95-100}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; Lab Res Grp Intelligent Machines; MIR Labs}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; Lab Res Grp Intelligent Machines; MIR Labs}, abstract = {Organizations become dependent on Information Technology (IT) to fulfill their corporate aims, meet their business needs and deliver value to customers. For effective and efficient utilization of IT, we intend to contribute to the alignment between IT and organizational strategies. The challenge is to make the enterprise and its Information System (IS) as responsive as possible within the regard to changes in enterprise while taking into account the enterprise operational performance. When a change happens or a new opportunity comes, organizations do not know which assets are linked to which business processes and which services, especially IT services, to bring up first and which can wait until later. Our principal aim is to propose an indicator framework to track and control business-IT alignment. However, this paper is a preliminary study on this framework. We are inspired by COBIT 5 processes as indicators and believe that the Service-Oriented Architecture (SOA) applied to these processes interlinks and can interact well the different processes. The validity and applicability of our theoretical study will be evaluated for future work.}, isbn = {978-1-4673-8712-5}, author = {Razafimampianina, Rindra M. and Nouinou, Soumaya and Doukkali, Abdelaziz S. and Regragui, Boubker}, editor = {Abrahim, A and Alimi, AM and Haqiq, A and Karray, H and Mousannif, H and BenHalima, M and Choo, YH and Ma, K} } @conference {Lethrech2015, title = {A process definition for domain specific software development}, booktitle = {Proceedings of 2015 IEEE World Conference on Complex Systems, WCCS 2015}, year = {2015}, note = {cited By 0}, abstract = {Although the DSM approach was already present in the industrial world since the 90s, these last years it knows a growing interest from the research community. Domain Specific Modeling approach is essentially characterized by raising the level of abstraction and full code generation. In fact, a Domain Specific Language is semantically strong since it directly uses concepts and rules from a specific problem domain. In addition, concentrating on a narrow domain increases considerably the ability to automate the generation of the final solution from the domain-specific models. Throughout our research we have noticed a formalism lack of Domain Specific Software Development (DSSD) process. We propose in this paper a DSSD process formalism to guide the development of domain specific solutions. This process defines the phases, artifacts and roles required to specify and implement domain specific solutions. {\textcopyright} 2015 IEEE.}, doi = {10.1109/ICoCS.2015.7483261}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84978429646\&doi=10.1109\%2fICoCS.2015.7483261\&partnerID=40\&md5=18f92498127c2996db4f6cbafbf121cb}, author = {Lethrech, M.a and Kenzi, A.b and Elmagrouni, I.a and Nassar, M.a and Kriouile, A.a} } @conference {Amarouche2015358, title = {Product Opinion Mining for Competitive Intelligence}, booktitle = {Procedia Computer Science}, volume = {73}, year = {2015}, note = {cited By 1}, pages = {358-365}, abstract = {Competitive Intelligence is one of the keys of companies Risk Management. It provides the company with a permanent lighting to its competitive environment. The increasingly frequent use of Information and Communication Technologies (ICT); including (namely) online shopping sites, blogs, social network sites, forums, provides incentives for companies check their advantages over their competitors. This information presents a new source that helps and leads the company to identify, analyze and manage the various risks associated with its business/products. Nowadays, a good use of these data helps the company to improve its products/services. In this paper, an overview of opinion mining for competitive intelligence will be presented. We{\textquoteright}ll try to synthesize the major research done for the different steps of product opinion mining. {\textcopyright} 2015 The Authors.}, doi = {10.1016/j.procs.2015.12.004}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962678879\&doi=10.1016\%2fj.procs.2015.12.004\&partnerID=40\&md5=6d1bc9b3ded99bfaf39408391296ee1d}, author = {Amarouche, K. and Benbrahim, H. and Kassou, I.} } @conference { ISI:000373736100045, title = {Product Opinion Mining for Competitive Intelligence}, booktitle = {INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015)}, series = {Procedia Computer Science}, volume = {73}, year = {2015}, note = {International Conference on Advanced Wireless Information and Communication Technologies (AWICT), Natl Sch Engineers Sousse, TUNISIA, OCT 05-07, 2015}, pages = {358-365}, abstract = {Competitive Intelligence is one of the keys of companies Risk Management. It provides the company with a permanent lighting to its competitive environment. The increasingly frequent use of Information and Communication Technologies (ICT); including (namely) online shopping sites, blogs, social network sites, forums, provides incentives for companies check their advantages over their competitors. This information presents a new source that helps and leads the company to identify, analyze and manage the various risks associated with its business/products. Nowadays, a good use of these data helps the company to improve its products/services. In this paper, an overview of opinion mining for competitive intelligence will be presented. We{\textquoteright}ll try to synthesize the major research done for the different steps of product opinion mining. (C) 2015 The Authors. Published by Elsevier B.V.}, issn = {1877-0509}, doi = {10.1016/j.procs.2015.12.004}, author = {Amarouche, Kamal and Benbrahim, Houda and Kassou, Ismail}, editor = {Boubiche, DE and Hidoussi, F and Cruz, HT} } @conference {Mezouary2015, title = {PRoPHET-RAIP5: A new approach to secure routing in wireless sensor networks}, booktitle = {International Conference on Wireless Networks and Mobile Communications, WINCOM 2015}, year = {2015}, note = {cited By 0}, abstract = {Probabilistic routing in wireless sensor network (WSNs) use the mobility history when making a forwarding decision. This type of routing provides a very rapid development and new perspectives in WSNs. However, there are several constraints and challenges to overcome the security problems. In this paper, we propose a security solution based on the RAID5 technology and a multi-path routing, to develop a protective mechanism against the various attacks in mobile WSNs. To demonstrate our concept, we have implemented this solution on Probabilistic Routing Protocol using History of Encounters and Transitivity (PRoPHET). We have compared our new protocol (PRoPHET-RAIP5) with standard PRoPHET to enhance security parameters. {\textcopyright} 2015 IEEE.}, doi = {10.1109/WINCOM.2015.7381307}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84965029803\&doi=10.1109\%2fWINCOM.2015.7381307\&partnerID=40\&md5=f34a0e46149201d4fc9429b7732f9c7b}, author = {Mezouary, R.E. and Houmz, A. and Jalil, J. and Koutbi, M.E.} } @conference { ISI:000380509200010, title = {PRoPHET-RAIP5: A New Approach to Secure Routing in Wireless Sensor Networks}, booktitle = {2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM)}, year = {2015}, note = {International conference on wireless networks and mobile communications, Marrakech, MOROCCO, OCT 20-23, 2015}, pages = {52-57}, abstract = {Probabilistic routing in wireless sensor network (WSNs) use the mobility history when making a forwarding decision. This type of routing provides a very rapid development and new perspectives in WSNs. However, there are several constraints and challenges to overcome the security problems. In this paper, we propose a security solution based on the RAID5 technology and a multi-path routing, to develop a protective mechanism against the various attacks in mobile WSNs. To demonstrate our concept, we have implemented this solution on Probabilistic Routing Protocol using History of Encounters and Transitivity (PRoPHET). We have compared our new protocol (PRoPHET-RAIP5) with standard PRoPHET to enhance security parameters.}, isbn = {978-1-4673-8224-3}, author = {El Mezouary, Ridouane and Houmz, Abdellah and Jalil, Jamila and El Koutbi, Mohammed} } @article {11810056420151101, title = {Proposition of a new ex-ante evaluation method for adapting and selecting ERP solutions.}, journal = {E-Ti: E-Review in Technologies Information}, number = {8}, year = {2015}, pages = {34 - 47}, abstract = {Acquiring an ERP system is one of the most risky, tedious and complex decision making activities for any organization. It has been widely reported that selecting an inappropriate ERP is one of the major reasons for its implementation failure. In this paper, we will develop a new ex-ante evaluation method for ERP system tailoring and selection. The proposed method, called SEVALERPS (Systematic Evaluation of ERP Systems), is basically elaborated to help organizations, especially large ones, to better customize and evaluate the potential ERP solutions in order to choose the ones that meet their best requirements{\textquoteright} tradeoff. SEVALERPS relies on many sound mathematical techniques to handle various evaluation aspects: 0-1 linear programming to choose the best ERP tailoring scenarios, MACBETH to express the preferences of the selection team in both a qualitative and quantitative way, and the discrete Choquet integral to address interdependencies that might exist among evaluation criteria. (En}, keywords = {0-1 linear Programing, Adaptation ERP, Choquet Integral, Couverture fonctionnelle, Enterprise resource planning, ERP Evaluation, ERP Functional coverage, ERP Selection, ERP Tailoring, {\'E}valuation ERP, Int{\'e}grale de Choquet, Linear programming, MACBETH, Programmation lin{\'e}aire {\`a} variables binaires, S{\'e}lection ERP}, issn = {11148802}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=118100564\&site=ehost-live}, author = {Khaled, Abdelilah and Janati Idrissi, Mohammed Abdou} } @conference { ISI:000354859800033, title = {Pure P2P Mediation System: A Mappings Discovery Approach}, booktitle = {INTERNATIONAL CONFERENCE ON INTEGRATED INFORMATION (IC-ININFO 2014)}, series = {AIP Conference Proceedings}, volume = {1644}, year = {2015}, note = {4th International Conference on Integrated Information (IC-ININFO), Madrid, SPAIN, SEP 05-08, 2014}, pages = {244-251}, publisher = {Univ Peloponnese; Linnaeus Univ; Aberystwyth Univ; Technol \& Educ Inst Athens; Univ Complutense Madrid, Fac Ciencias Documentac; Inst Disseminat Arts \& Sci}, organization = {Univ Peloponnese; Linnaeus Univ; Aberystwyth Univ; Technol \& Educ Inst Athens; Univ Complutense Madrid, Fac Ciencias Documentac; Inst Disseminat Arts \& Sci}, abstract = {The information integration systems consist in offering a uniform interface to provide access to a set of autonomous and distributed information sources. The most important advantage of this system is that it allows users to specify what they want, rather than thinking about how to get the responses. The works realized in this area have particular leads to two major classes of integration systems: the mediation systems based on the paradigm mediator / adapter and peer to peer systems (P2P). The combination of both systems has led to a third type; is the mediation P2P systems. The P2P systems are large-scale systems, self-organized and distributed. They allow the resource management in a completely decentralized way. However, the integration of structured information sources, heterogeneous and distributed proves to be a complex problem. The objective of this work is to propose an approach to resolve conflicts and establish a mapping between the heterogeneous elements. This approach is based on clustering; the latter is to group similar Peers that share common information in the same subnet. Thus, to facilitate the heterogeneity, we introduced three additional layers of our hierarchy of peers: internal schema, external schema and Schema directory peer. We used linguistic techniques, and precisely the name correspondence technique, that is based on the similarity of names to propose a correspondence.}, isbn = {978-0-7354-1283-5}, issn = {0094-243X}, doi = {10.1063/1.4907843}, author = {Selma, El Yahyaoui El Idrissi and Zellou, Ahmed and Idri, Ali}, editor = {Giannakopoulos, G and Sakas, DP and KyriakiManessi, D} } @conference {Mcharfi2015463, title = {Return on investment of software product line traceability in the short, mid and long term}, booktitle = {ICEIS 2015 - 17th International Conference on Enterprise Information Systems, Proceedings}, volume = {2}, year = {2015}, note = {cited By 1}, pages = {463-468}, abstract = {Several works discuss tracing in Software Product Lines from a technical and architectural points of view, by proposing methods to implement traceability in the system. However, before discussing this field of traceability, we first need to prove the profitability of integrating such approach in the Product Line. Therefore, we bring in this paper a quantitative analysis on how traceability can impact the Return on Investment of a Software Product Line, and in which conditions, in terms of number of products and SPL phase, can tracing be profitable. We compare the results of a generic Software Product Line estimation model, COPLIMO, and our model METra-SPL. Our analysis shows that introducing traceability costs when constructing the Product Line, but can be profit making in the long term, especially in maintenance phase, starting from 2 products to generate. Copyright {\textcopyright} 2015 SCITEPRESS - Science and Technology Publications.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84939540877\&partnerID=40\&md5=096733b1c1fcce03456eb2b99341140b}, author = {Mcharfi, Z. and El Asri, B. and Dehmouch, I. and Baya, A. and Kriouile, A.} } @conference {Mabrouk2015, title = {A signaling game-based mechanism to meet always best connected service in VANETs}, booktitle = {2015 IEEE Global Communications Conference, GLOBECOM 2015}, year = {2015}, note = {cited By 0}, abstract = {In heterogeneous network environments, users need to have mechanisms in place to decide which network is the most suitable at each moment in time for every application that the user requires. Always Best Connected is considered as a special concept to allow users to get connected to Internet using the access technology that best suits their needs or profile at any point in time. Clearly, this concept provides multiple access simultaneously for mobile users moving in heterogeneous access network environment. In this paper, we introduce a signaling game approach to achieve an always best connected service in vehicular networks. Under the considered scenario, we consider two smart vehicles named player 1 and player 2 moving in a road network area equipped with heterogeneous access networks. We assume that player 1 (super player) only has complete information on the road network, whilst player 2 has not any information. Player 1 plays first and sends a signal to player 2 which can be accurate or distorted. Based on the received signal and his belief about that signal, player 2 chooses its own action: it computes its suitable path which provides it an always best connected service. {\textcopyright} 2015 IEEE.}, doi = {10.1109/GLOCOM.2014.7417000}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84964825756\&doi=10.1109\%2fGLOCOM.2014.7417000\&partnerID=40\&md5=0828f76d9a6461e859d500b7196f2452}, author = {Mabrouk, A.a and Kobbane, A.a and Sabir, E.b and Ben-Othman, J.c and El Koutbi, M.a} } @conference { ISI:000382389300061, title = {A Signaling Game-based Mechanism to Meet Always Best Connected Service in VANETs}, booktitle = {2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)}, series = {IEEE Global Communications Conference}, year = {2015}, note = {IEEE Global Communications Conference (GLOBECOM), San Diego, CA, DEC 06-10, 2015}, publisher = {IEEE; QUALCOMM; Keysight Technologies; Huawei; Natl Instruments; Intel; InterDigital; LG Elect; IEEE Big Data; IEEE Stand Assoc; ViaSat; IEEE Commun Soc}, organization = {IEEE; QUALCOMM; Keysight Technologies; Huawei; Natl Instruments; Intel; InterDigital; LG Elect; IEEE Big Data; IEEE Stand Assoc; ViaSat; IEEE Commun Soc}, abstract = {In heterogeneous network environments, users need to have mechanisms in place to decide which network is the most suitable at each moment in time for every application that the user requires. Always Best Connected is considered as a special concept to allow users to get connected to Internet using the access technology that best suits their needs or profile at any point in time. Clearly, this concept provides multiple access simultaneously for mobile users moving in heterogeneous access network environment. In this paper, we introduce a signaling game approach to achieve an always best connected service in vehicular networks. Under the considered scenario, we consider two smart vehicles named player 1 and player 2 moving in a road network area equipped with heterogeneous access networks. We assume that player 1 (super player) only has complete information on the road network, whilst player 2 has not any information. Player 1 plays first and sends a signal to player 2 which can be accurate or distorted. Based on the received signal and his belief about that signal, player 2 chooses its own action: it computes its suitable path which provides it an always best connected service.}, isbn = {978-1-4799-5952-5}, issn = {2334-0983}, author = {Mabrouk, Abdelfettah and Kobbane, Abdellatif and Sabir, Essaid and Ben-Othman, Jalel and El Koutbi, Mohammed} } @conference { ISI:000382162300171, title = {Smart Campus Microgrid: Advantages and the Main Architectural Components}, booktitle = {PROCEEDINGS OF 2015 3RD IEEE INTERNATIONAL RENEWABLE AND SUSTAINABLE ENERGY CONFERENCE (IRSEC{\textquoteright}15)}, year = {2015}, note = {3rd IEEE International Renewable and Sustainable Energy Conference (IRSEC), Marrakech, MOROCCO, DEC 10-13, 2015}, pages = {810-816}, publisher = {IEEE}, organization = {IEEE}, abstract = {With a world wild increase in electricity demand, smart grids emerged as a solution for various problems within the current electrical grid. Some novel aspects about smart grids are the use renewable energy sources, energy storage and also allowing the user to take some decisions to control energy use. Microgrids are building blocks of smart grids and given that academic campuses are very good contributors to energy consumption, their energy consumption can be efficiently controlled by using an energy management system. This paper focuses on the importance of smart campuses with an emphasis on the importance of an energy management system.}, isbn = {978-1-4673-7894-9}, author = {Talei, Hanaa and Zizi, Badr and Abid, Mohamed Riduan and Essaaidi, Mohamed and Benhaddou, Driss and Khalil, Nacer}, editor = {Essaaidi, M and Zaz, Y} } @conference {Talei2015, title = {Smart campus microgrid: Advantages and the main architectural components}, booktitle = {Proceedings of 2015 IEEE International Renewable and Sustainable Energy Conference, IRSEC 2015}, year = {2015}, note = {cited By 0}, abstract = {With a world wild increase in electricity demand, smart grids emerged as a solution for various problems within the current electrical grid. Some novel aspects about smart grids are the use renewable energy sources, energy storage and also allowing the user to take some decisions to control energy use. Microgrids are building blocks of smart grids and given that academic campuses are very good contributors to energy consumption, their energy consumption can be efficiently controlled by using an energy management system. This paper focuses on the importance of smart campuses with an emphasis on the importance of an energy management system. {\textcopyright} 2015 IEEE.}, doi = {10.1109/IRSEC.2015.7455093}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84968584100\&doi=10.1109\%2fIRSEC.2015.7455093\&partnerID=40\&md5=0b0289ab22afeb7da6d364c794b3c54a}, author = {Talei, H.a and Zizi, B.a and Abid, M.R.a and Essaaidi, M.b and Benhaddou, D.c and Khalil, N.c} } @conference { ISI:000380409500022, title = {A Strategic Release Planning model from TPM point of view}, booktitle = {2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, year = {2015}, note = {10th International Conference on Intelligent Systems - Theories and Applications (SITA), ENSIAS, Rabat, MOROCCO, OCT 20-21, 2015}, publisher = {IEEE}, organization = {IEEE}, abstract = {Release planning is a tedious task, especially within the context of Third Party Application Maintenance (TPM). Software engineering fields acknowledge multiple methods and techniques applied to solve problems of release planning. However, few of them propose a pragmatic and decision support dedicated to TPM managers. This research attempts to apply theory and methods Search-based software engineering (SBSE) area such as meta-heuristic techniques to solve complex release planning problems faced by TPM organizations. The aim of this paper is to introduce a strategic release planning model based on several TPM factors and constraints, allowing the TPM manager to carry out an effective roadmap and industrialize the planning process of software maintenance.}, isbn = {978-1-5090-0220-7}, author = {Naciri, Samia and Janati Idrissi, Mohammed Abdou and Kerzazi, Noureddine} } @conference {Naciri2015, title = {A strategic release planning model from TPM point of view}, booktitle = {2015 10th International Conference on Intelligent Systems: Theories and Applications, SITA 2015}, year = {2015}, note = {cited By 0}, abstract = {Release planning is a tedious task, especially within the context of Third Party Application Maintenance (TPM). Software engineering fields acknowledge multiple methods and techniques applied to solve problems of release planning. However, few of them propose a pragmatic and decision support dedicated to TPM managers. This research attempts to apply theory and methods Searchbased software engineering (SBSE) area such as meta-heuristic techniques to solve complex release planning problems faced by TPM organizations. The aim of this paper is to introduce a strategic release planning model based on several TPM factors and constraints, allowing the TPM manager to carry out an effective roadmap and industrialize the planning process of software maintenance. {\textcopyright} 2015 IEEE.}, doi = {10.1109/SITA.2015.7358396}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962468901\&doi=10.1109\%2fSITA.2015.7358396\&partnerID=40\&md5=bbfbc768cb33ef2e5678536a26d6e8ca}, author = {Naciri, S. and Janati Idrissi, M.A. and Kerzazi, N.} } @conference {Kasmi2015, title = {Taking advantage of GPU/CPU architectures for sparse Conjugate Gradient solver computation}, booktitle = {Proceedings of 2015 IEEE World Conference on Complex Systems, WCCS 2015}, year = {2015}, note = {cited By 0}, abstract = {Solving large sparse linear systems is a time and energy consuming process. This paper presents an efficient exploitation of graphic processing units (GPUs) for accelerating Conjugate Gradient iterative solver (CG). We use the high-level software library PARALUTION for sparse linear algebra on multi/many-core systems, which supports GPU (with CUDA and OpenCL) and Multi-CPU implementations of CG method using different storage formats. We discuss and compare performance using three platforms. {\textcopyright} 2015 IEEE.}, doi = {10.1109/ICoCS.2015.7483268}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84978427957\&doi=10.1109\%2fICoCS.2015.7483268\&partnerID=40\&md5=af973d4adddb0778d096c29e4a71e051}, author = {Kasmi, N.a and Zbakh, M.a and Mahmoudi, S.A.b and Manneback, P.b} } @conference {Khtira201565, title = {Towards a framework for feature deduplication during software product lines evolution}, booktitle = {CEUR Workshop Proceedings}, volume = {1415}, year = {2015}, note = {cited By 0}, pages = {65-73}, abstract = {Software product lines are long-living systems that evolve continuously over time to satisfy the new requirements of customers. This evolution consists of adding or modifying features in the core platform of the product line or in derived products. As a result of this change, many model defects can occur, such as inconsistency and duplication. In this paper, we describe our work which proposes a framework to manage the software product line evolutions. The aim of the framework is to formalize the representation of the software product line models and the specifications of the new evolutions. Then, a set of algorithms are provided which enable the detection of feature duplication.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84940069445\&partnerID=40\&md5=916d28b784901d554c163352785b8fdd}, author = {Khtira, A.} } @conference {Kriouile2015674, title = {Towards a high configurable SaaS: To deploy and bind auser-aware tenancy of the SaaS}, booktitle = {ICEIS 2015 - 17th International Conference on Enterprise Information Systems, Proceedings}, volume = {2}, year = {2015}, note = {cited By 0}, pages = {674-679}, abstract = {User-aware tenancy approach integrates the flexibility of the Rich-Variant Component with the high configurability of multi-tenant applications. Multi-tenancy is the notion of sharing instances among a large group of customers, called tenants. Multi-tenancy is a key enabler to exploit economies of scale for Software as a Service (SaaS) approaches. However, the ability of a SaaS application to be adapted to individual tenant{\textquoteright}s needs seem to be a major requirement. Thus, our approach proposes a more flexible and reusable SaaS system for Multi-tenant SaaS application using Rich-Variant Components. The approach consists in a user-aware tenancy for SaaS environments. In this paper, an algorithm is established to derive the necessary instances of Rich-Variant Components building the application and access to them in a scalable and performing manner. The algorithm is based on fundamental concepts from the graph theory. Copyright {\textcopyright} 2015 SCITEPRESS - Science and Technology Publications.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84939531130\&partnerID=40\&md5=0bb15c00d81573f066c0bc43f469a26f}, author = {Kriouile, H. and Mcharfi, Z. and El Asri, B.} } @article {Kartit201537403, title = {Towards a secure electronic voting in cloud computing environment using homomorphic encryption algorithm}, journal = {International Journal of Applied Engineering Research}, volume = {10}, number = {16}, year = {2015}, note = {cited By 0}, pages = {37403-37408}, abstract = {Cloud computing is the most envisioned paradigm shift in the computing world. In this context, it becomes necessary to properly protect the data from different risks and dangers that are born with cloud computing. In recent years, Storage in Cloud gained popularity among both companies and private users. However, data privacy, security, reliability and interoperability issues still have to be adequately faced and solved. But the most important between them is security and how cloud provider assures it. In this paper we present an electronic voting system based on Homomorphic encryption. Our proposal offers all the advantages of the additively homomorphic encryption scheme. {\textcopyright} Research India Publications.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84942041969\&partnerID=40\&md5=d7c7f2b6010ffb0011789f148b1fb2ed}, author = {Kartit, Z.a and El Marraki, M.a and Azougaghe, A.b and Belkasmi, M.b} } @conference {Kriouile2015, title = {Towards deployment of a user-aware tenancy using rich-variant components for SaaS applications}, booktitle = {Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015}, year = {2015}, note = {cited By 0}, abstract = {The approach of User-Aware Tenancy integrates the high configurability of multi-tenant applications with the flexibility and the functional variability of Rich-Variant Component use. Multi-tenancy concept consists in sharing instances among a large group of customers, called tenants. Multi-tenancy is a tool to exploit economies of scale widely promoted by Software as a Service (SaaS) models. However, the ability of a SaaS application to be adapted to individual tenant{\textquoteright}s needs seem to be a major requirement. Thus, our approach focuses on more flexibility and more reusability for Multi-tenant SaaS application using the multiview notion of Rich-Variant Components. The approach consists in a user-aware tenancy for SaaS. In this paper, we provide an application of an algorithm deriving the necessary instances of Rich-Variant Components building the application in a scalable and performing manner. The algorithm is based on fundamental concepts from the graph theory, and is accompanied by a reduced school management application as an illustrating example. {\textcopyright} 2015 IEEE.}, doi = {10.1109/CloudTech.2015.7337019}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962798426\&doi=10.1109\%2fCloudTech.2015.7337019\&partnerID=40\&md5=1097c82a9d464b18b102f40d386e959a}, author = {Kriouile, H. and El Asri, B. and El Haloui, M. and Benali, A.} } @conference { ISI:000380407100058, title = {Towards Deployment of a User-Aware Tenancy Using Rich-Variant Components for SaaS Applications}, booktitle = {2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15)}, year = {2015}, note = {International Conference on Cloud Computing Technologies and Applications (CloudTech), Marrakech, MOROCCO, JUN 02-04, 2015}, pages = {50-55}, abstract = {The approach of User-Aware Tenancy integrates the high configurability of multi-tenant applications with the flexibility and the functional variability of Rich-Variant Component use. Multi-tenancy concept consists in sharing instances among a large group of customers, called tenants. Multi-tenancy is a tool to exploit economies of scale widely promoted by Software as a Service (SaaS) models. However, the ability of a SaaS application to be adapted to individual tenant{\textquoteright}s needs seem to be a major requirement. Thus, our approach focuses on more flexibility and more reusability for Multi-tenant SaaS application using the multiview notion of Rich-Variant Components. The approach consists in a user-aware tenancy for SaaS. In this paper, we provide an application of an algorithm deriving the necessary instances of Rich-Variant Components building the application in a scalable and performing manner. The algorithm is based on fundamental concepts from the graph theory, and is accompanied by a reduced school management application as an illustrating example.}, isbn = {978-1-4673-8149-9}, author = {Kriouile, Houda and El Asri, Bouchra and El Haloui, M{\textquoteright}barek and Benali, Asmae} } @article { ISI:000358592700006, title = {Towards Services-Based Enterprise Architecture for Cloud Computing-Opened Information Systems}, journal = {JOURNAL OF COMPUTERS}, volume = {10}, number = {3}, year = {2015}, month = {MAY}, pages = {195-202}, abstract = {With the development of cloud computing technologies and the multiplication of enterprise architecture reference frameworks, the industrials are encouraged to take into account the new concepts of cloud service in the evolution of their information system strategies. The present paper starts by presenting background concepts and the state of the art of the enterprise architecture, in order to propose a maturity model that helps enterprises to build and evaluate a functional component of their Information System architecture and allow them to qualify its externalization to the Cloud Computing as well as its monitoring.}, issn = {1796-203X}, author = {El Haloui, M{\textquoteright}barek and Kriouile, Houda and Kriouile, Abdelaziz} } @conference { ISI:000383221800006, title = {Using Cloud SaaS to ensure interoperability and standardization in heterogeneous Cloud based environment}, booktitle = {PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT)}, year = {2015}, note = {5th World Congress on Information and Communication Technologies (WICT), Marrakesh, MOROCCO, DEC 14-16, 2015}, pages = {29-34}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, abstract = {During the last years, because of the evolution of Cloud applications and the attractive advantages given to consumers, many companies outsource their data and Information Technology (IT) system to the Cloud based technology. With the growth in the number of Cloud Service Providers, many enterprises and organizations can use and associate services from multiple providers. There may be many Internet protocols for service access standards that are used to ensure interoperability between users browser and Web server, such as Representational State Transfer (REST) and Simple Object Access Protocol (SOAP). Each service has its specific characteristics such as authentication and security requirements. Hence, Cloud providers attempt to lock customers into proprietary interfaces so consumers can find themselves at not expects inevitable vendor lock-in. Therefore, the focus of our paper is to propose a solution to this problem by using Cloud intermediate between Cloud providers and consumer in heterogeneous Cloud environments interfaces. This is to achieve benefits such as standardization and interoperability, minimizing lock-in of Cloud providers. To reach such benefits, we propose a Cloud SaaS based on two interfaces and an interne component. These interfaces are used in Cloud Consumer and Provider sides and therefore guarantee communication between Cloud Consumer and Provider using different Internet protocols for Web service access such as REST and SOAP. Our approach guarantees interoperability and standardization in heterogeneous Cloud based environments because in this case Cloud Consumer and Provider using REST interface can communicate easily with Cloud Provider and Consumer using SOAP interface.}, isbn = {978-1-4673-8712-5}, author = {Majda, Elhozmari and Ahmed, Ettalbi}, editor = {Abrahim, A and Alimi, AM and Haqiq, A and Karray, H and Mousannif, H and BenHalima, M and Choo, YH and Ma, K} } @conference {Koutbi2015, title = {Welcome message from the general chairs}, booktitle = {International Conference on Wireless Networks and Mobile Communications, WINCOM 2015}, year = {2015}, note = {cited By 0}, doi = {10.1109/WINCOM.2015.7381347}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84965066083\&doi=10.1109\%2fWINCOM.2015.7381347\&partnerID=40\&md5=3b663be9ac57f7c5675e1e314ab6fa14}, author = {Koutbi, M.E.a and Ben-Othman, J.b and Kobbane, A.c} } @conference {Essadraoui2015, title = {Wireless sensor node{\textquoteright}s authentication scheme based on Multivariate Quadratic Quasi-groups}, booktitle = {Proceedings of 2015 IEEE World Conference on Complex Systems, WCCS 2015}, year = {2015}, note = {cited By 0}, abstract = {Wireless sensor networks (WSN) are widely used in different fields (military, environment, .. ) and they can be connected to the Internet using the IP protocol, this connection will form the Internet of Things (IoT). Real deployment of WSNs needs keeping in mind serious security considerations. RSA or DSA are heavy protocols to be used on resource constrained devices, they contain complex computation. MQQ is computationally more efficient than classical cryptosystems like RSA and Diffie-Hellman. In this paper we focus on the authentication problem. We propose an authentication approach based on Multivariate Quadratic Quasi-groups (MQQ) for WSN, sensor nodes will do mutual authentication. {\textcopyright} 2015 IEEE.}, doi = {10.1109/ICoCS.2015.7483320}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84978379625\&doi=10.1109\%2fICoCS.2015.7483320\&partnerID=40\&md5=963b8c2d57065d60a5341626d08c9c84}, author = {Essadraoui, Y. and El Kettani, M.D.E.-C.} } @conference {Merabet20141088, title = {Applications of multi-Agent systems in smart grids: A survey}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2014}, note = {cited By 1}, pages = {1088-1094}, abstract = {The Smart Grids (SGs) are regarded as the new generation of electric power systems, combining the development of Information Technology (IT), distributed systems and Artificial Intelligence (AI) for more features on the real-time monitoring of the Demand /Response (DR) and the energy consumption. An approach based on the use of Multi-Agent Systems (MAS) to study the management of distribution systems, simulating the characteristics of SG. This paper presents the different platforms used for the implementation of MAS for the control and operation of smart grids. The MAS{\textquoteright} applications in SG available in the literature are also developed in this paper. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICMCS.2014.6911384}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84928741215\&doi=10.1109\%2fICMCS.2014.6911384\&partnerID=40\&md5=0552200ad62f47930e0a666d76aa763d}, author = {Merabet, G.H.a and Essaaidi, M.a and Talei, H.b and Abid, M.R.b and Khalil, N.c and Madkour, M.c and Benhaddou, D.c} } @conference { ISI:000366999600191, title = {Applications of Multi-Agent Systems in Smart Grids: A Survey}, booktitle = {2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2014}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, MOROCCO, APR 14-16, 2014}, pages = {1088-1094}, abstract = {The Smart Grids (SGs) are regarded as the new generation of electric power systems, combining the development of Information Technology (IT), distributed systems and Artificial Intelligence (AI) for more features on the real-time monitoring of the Demand / Response (DR) and the energy consumption. An approach based on the use of Multi-Agent Systems (MAS) to study the management of distribution systems, simulating the characteristics of SG. This paper presents the different platforms used for the implementation of MAS for the control and operation of smart grids. The MAS{\textquoteright} applications in SG available in the literature are also developed in this paper.}, isbn = {978-1-4799-3824-7}, author = {Merabet, Ghezlane Halhoul and Essaaidi, Mohammed and Talei, Hanaa and Abid, Mohamed Riduan and Khalil, Nacer and Madkour, Mohcine and Benhaddou, Driss} } @conference { ISI:000360829800037, title = {Automata-Based Approach to Design and Analyze Security Policies}, booktitle = {2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST)}, year = {2014}, note = {12th Annual International Conference on Privacy, Security and Trust (PST), Ryerson Univ, Toronto, CANADA, JUL 23-24, 2014}, pages = {306-313}, abstract = {Information systems must be controlled by security policies to protect them from undue accesses. Security policies are often designed by rules expressed using informal text, which implies ambiguities and inconsistencies in security rules. Our objective in this paper is to develop a formal approach to design and analyze security policies. We propose a procedure that synthesizes an automaton which implements a given security policy. Our automata-based approach can be a common basis to analyze several aspects of security policies. We use our automata-based approach to develop three analysis procedures to: verify completeness of a security policy, detect anomalies in a security policy, and detect functional discrepancies between several implementations of a security policy. We illustrate our approach using examples of security policies for a firewall.}, isbn = {978-1-4799-3503-1}, author = {Krombi, Wadie and Erradi, Mohammed and Khoumsi, Ahmed}, editor = {Miri, A and Hengartner, U and Huang, NF and Josang, A and GarciaAlfaro, J} } @conference {Krombi2014306, title = {Automata-based approach to design and analyze security policies}, booktitle = {2014 12th Annual Conference on Privacy, Security and Trust, PST 2014}, year = {2014}, note = {cited By 2}, pages = {306-313}, abstract = {Information systems must be controlled by security policies to protect them from undue accesses. Security policies are often designed by rules expressed using informal text, which implies ambiguities and inconsistencies in security rules. Our objective in this paper is to develop a formal approach to design and analyze security policies. We propose a procedure that synthesizes an automaton which implements a given security policy. Our automata-based approach can be a common basis to analyze several aspects of security policies. We use our automata-based approach to develop three analysis procedures to: verify completeness of a security policy, detect anomalies in a security policy, and detect functional discrepancies between several implementations of a security policy. We illustrate our approach using examples of security policies for a firewall. {\textcopyright} 2014 IEEE.}, doi = {10.1109/PST.2014.6890953}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84910095793\&doi=10.1109\%2fPST.2014.6890953\&partnerID=40\&md5=c203c3363442208f90fb65f844c4a72b}, author = {Krombi, W.a and Erradi, M.a and Khoumsi, A.b} } @conference { ISI:000380387700114, title = {A Co-evolution Model for Software Product Lines: an Approach Based on Evolutionary Trees}, booktitle = {2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS)}, year = {2014}, note = {2014 Second World Conference on Complex Systems (WCCS), Agadir, MOROCCO, NOV 10-12, 2014}, pages = {140-145}, publisher = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, organization = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, abstract = {Software product line engineering allows for the development of common reference assets that can be reused in the development of a set of products of a particular market, the purpose of such large scale reuse is the improvement of time to market and the reduction of costs. This goal can only be achieved if the software product line assets are continuously evolved to cope with changes of user requirements. In this paper we present a co-evolution model for checking the integrity of the software product line during its evolution. The model is established using cladistics and trees reconciliation that are used in biology to analyze the co-evolution between organisms. This model shows the divergent co-evolution which represents a difference between the evolutionary trees of the software product line and a derived product. The model helps to find out changes of products that were not propagated to the reference assets and to anticipate the future development to be done on these reference assets to cope with products evolution. By its application we protect software product lines from the aging phenomenon.}, isbn = {978-1-4799-4647-1}, author = {Benlarabi, Anissa and El Asri, Bouchra and Khtira, Amal} } @conference {Benlarabi2014140, title = {A co-evolution model for software product lines: An approach based on evolutionary trees}, booktitle = {2014 2nd World Conference on Complex Systems, WCCS 2014}, year = {2014}, note = {cited By 3}, pages = {140-145}, abstract = {Software product line engineering allows for the development of common reference assets that can be reused in the development of a set of products of a particular market, the purpose of such large scale reuse is the improvement of time to market and the reduction of costs. This goal can only be achieved if the software product line assets are continuously evolved to cope with changes of user requirements. In this paper we present a co-evolution model for checking the integrity of the software product line during its evolution. The model is established using cladistics and trees reconciliation that are used in biology to analyze the co-evolution between organisms. This model shows the divergent co-evolution which represents a difference between the evolutionary trees of the software product line and a derived product. The model helps to find out changes of products that were not propagated to the reference assets and to anticipate the future development to be done on these reference assets to cope with products evolution. By its application we protect software product lines from the aging phenomenon. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICoCS.2014.7060991}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84929164049\&doi=10.1109\%2fICoCS.2014.7060991\&partnerID=40\&md5=8647fe4ff84bea2b02dd50b90e0d9bb9}, author = {Benlarabi, A. and El Asri, B. and Khtira, A.} } @conference {Mabrouk2014672, title = {A congestion game-based routing algorithm for communicating VANETs}, booktitle = {IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference}, year = {2014}, note = {cited By 2}, pages = {672-677}, abstract = {Vehicular Ad Hoc Network (VANET) is considered as a special application of Mobile Ad Hoc Networks (MANETs) in road traffic, which can autonomously organize networks without infrastructure. VANETs enable vehicles on the road to communicate with each other and with road infrastructure using wireless capabilities. In the last few years, extensive research has been performed to extend Internet connectivity to VANETs. Indeed, several routing protocols have been proposed to determine routes between vehicles and gateways. In this paper, we propose a routing algorithm which is based on the Congestion Game to resolve the problem of network congestion in VANET and to provide the optimal Internet access paths. The simulation results show that the proposed routing algorithm has better feasibility and effectiveness for communicating VANETs. {\textcopyright} 2014 IEEE.}, doi = {10.1109/IWCMC.2014.6906436}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84908611637\&doi=10.1109\%2fIWCMC.2014.6906436\&partnerID=40\&md5=c4ef74c689e207df64ad7a4808f8c773}, author = {Mabrouk, A.a and Senhadji, M.a and Kobbane, A.a and Walid, A.a and Sabir, E.b and El Koutbi, M.a} } @conference { ISI:000361140000114, title = {A Congestion Game-based Routing Algorithm for Communicating VANETs}, booktitle = {2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC)}, series = {International Wireless Communications and Mobile Computing Conference}, year = {2014}, note = {10th International Wireless Communications \& Mobile Computing Conference (IWCMC), Nicosia, CYPRUS, AUG 04-08, 2014}, pages = {672-677}, publisher = {IEEE; IEEE Cyprus Sect; Frederick Univ}, organization = {IEEE; IEEE Cyprus Sect; Frederick Univ}, abstract = {Vehicular Ad Hoc Network (VANET) is considered as a special application of Mobile Ad Hoc Networks (MANETs) in road traffic, which can autonomously organize networks without infrastructure. VANETs enable vehicles on the road to communicate with each other and with road infrastructure using wireless capabilities. In the last few years, extensive research has been performed to extend Internet connectivity to VANETs. Indeed, several routing protocols have been proposed to determine routes between vehicles and gateways. In this paper, we propose a routing algorithm which is based on the Congestion Game to resolve the problem of network congestion in VANET and to provide the optimal Internet access paths. The simulation results show that the proposed routing algorithm has better feasibility and effectiveness for communicating VANETs.}, isbn = {978-1-4799-0959-9}, issn = {2376-6492}, author = {Mabrouk, Abdelfettah and Senhadji, Mohamed and Kobbane, Abdellatif and Walid, Abdellaziz and Sabir, Essaid and Koutbi, Mohammed E. L.} } @conference {ElMezouary2014843, title = {A cross-layer architecture for service differentiation in Wireless Sensor Networks with multiple sinks}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2014}, note = {cited By 0}, pages = {843-848}, abstract = {In this paper, we are interested in the description of a cross-layer architecture that supports service differentiation for real-time and best-effort traffics in Wireless Sensor Networks (WSN). We present our mathematical model that combines parameters from network and MAC layers. We aim to estimate and to enhance the throughput of multi-hop WSNs and the stability of the forwarding queues used for real-time and besteffort traffics. We suppose at the first step that we have a wireless sensor network with a single sink then we suppose that we have the same wireless sensor network with two sinks. We study the impact of transmitting real-time and best-effort traffics on the system throughput; and we also study the impact of adding a second sink on the throughput. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICMCS.2014.6911279}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84928710067\&doi=10.1109\%2fICMCS.2014.6911279\&partnerID=40\&md5=3469ccd3f0921f3eaae4a04888e98a91}, author = {El Mezouary, R. and Loutfi, A. and El Koutbi, M.} } @conference { ISI:000366999600148, title = {A Cross-layer Architecture for Service Differentiation in Wireless Sensor Networks With Multiple Sinks}, booktitle = {2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2014}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, MOROCCO, APR 14-16, 2014}, pages = {843-848}, abstract = {In this paper, we are interested in the description of a cross-layer architecture that supports service differentiation for real-time and best-effort traffics in Wireless Sensor Networks (WSN). We present our mathematical model that combines parameters from network and MAC layers. We aim to estimate and to enhance the throughput of multi-hop WSNs and the stability of the forwarding queues used for real-time and best-effort traffics. We suppose at the first step that we have a wireless sensor network with a single sink then we suppose that we have the same wireless sensor network with two sinks. We study the impact of transmitting real-time and best-effort traffics on the system throughput; and we also study the impact of adding a second sink on the throughput.}, isbn = {978-1-4799-3824-7}, author = {El Mezouary, Ridouane and Loutfi, Ahmed and El koutbi, Mohamed} } @conference {Walid20142817, title = {A decentralized network selection algorithm for group vertical handover in heterogeneous networks}, booktitle = {IEEE Wireless Communications and Networking Conference, WCNC}, year = {2014}, note = {cited By 5}, pages = {2817-2821}, abstract = {The traditional vertical handover schemes postulate that vertical handover of each user comes on an individual basis. This enables the users to know previously the decision already made by other users, and then the choice will be made accordingly. However, in the case of a group vertical handover, almost all the VHO decisions - which will certainly choose the best network, will be made at the same time which will lead to system performance degradation or network congestion. In this paper, we propose a totally decentralized algorithm for network selection which based on the Congestion Game to resolve the problem of network congestion in GVHO. Therefore, the proposed algorithm named Fully Decentralized Nash Learning Algorithm with incomplete information is a prediction done by each mobile in the group that helps them to reach the Nash equilibrium. Simulation results validate the algorithm and show its robustness under two scenarios. In the first one, we examine the algorithm with a fixed number of mobiles in group to evaluate the mixed strategy and the average perceived throughput of mobiles in WIMAX and HSDPA on the basis of iteration. In the second one, we examine the algorithm with different number of mobiles in group for testing the average number of iterations needed to reach the Nash equilibrium. We also compare it with the traditional vertical handover algorithm. {\textcopyright} 2014 IEEE.}, doi = {10.1109/WCNC.2014.6952895}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84912123155\&doi=10.1109\%2fWCNC.2014.6952895\&partnerID=40\&md5=35a46d7aee23563018fc6f10fc8506ab}, author = {Walid, A.a and El Kamili, M.b and Kobbane, A.a and Mabrouk, A.a and Sabir, E.c and El Koutbi, M.a} } @conference { ISI:000366999600103, title = {Domain Specific Modeling Approach for Context-Aware Service Oriented Systems}, booktitle = {2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2014}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, MOROCCO, APR 14-16, 2014}, pages = {581-587}, abstract = {Domain Specific Modeling (DSM) has gained a lot of research attention, especially concerning costs/time optimization and code quality aspects. On the other hand, CAC (Context Aware Computing) has recently emerged as a new computing paradigm promising adaptable systems development. DSM approach for Context aware service oriented systems (SOS) raises many challenges. Particularly, the challenge of engineering such systems, which consists of the definition of modeling approaches, processes, techniques and tools to facilitate construction of these systems. In this paper, we propose a DSM approach for adaptable service oriented systems named CADSSO (Context Aware, Domain Specific and Service Oriented) modeling approach. Our modeling approach is based on five models: domain specific services model (conforms to a domain specific services meta-model) which is a representation of the domain specific services; service variability model (conforms to our service variability meta-model), it formulates services forms of adaptation; domain specific context model (conforms to our context meta-model), symbolize the services context of use; adaptation rules model, which is the joint between service variability model and context model; and domain specific business rules model, used to model domain specific business.}, isbn = {978-1-4799-3824-7}, author = {Lethrech, Mohammed and Elmagrouni, Issam and Nassar, Mahmoud and Kriouile, Abdelaziz and Kenzi, Adil} } @conference {Lethrech2014575, title = {Domain Specific Modeling approach for context-aware service oriented systems}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2014}, note = {cited By 3}, pages = {575-581}, abstract = {Domain Specific Modeling (DSM) has gained a lot of research attention, especially concerning costs/time optimization and code quality aspects. On the other hand, CAC (Context Aware Computing) has recently emerged as a new computing paradigm promising adaptable systems development. DSM approach for Context aware service oriented systems (SOS) raises many challenges. Particularly, the challenge of engineering such systems, which consists of the definition of modeling approaches, processes, techniques and tools to facilitate construction of these systems. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICMCS.2014.6911149}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84928731012\&doi=10.1109\%2fICMCS.2014.6911149\&partnerID=40\&md5=a5e0f0216c0e3d951b6072f33fe1e997}, author = {Lethrech, M.a and Elmagrouni, I.a and Nassar, M.a and Kriouile, A.a and Kenzi, A.b} } @article {Loutfi2014201, title = {An energy aware algorithm for OLSR clustering}, journal = {Annales des Telecommunications/Annals of Telecommunications}, volume = {69}, number = {3-4}, year = {2014}, note = {cited By 4}, pages = {201-207}, abstract = {One of the important aspects of a mobile ad hoc network (MANET) is the limitation of the amount of available energy and the network lifetime. The tremendous amount of using mobile nodes in wireless communication medium makes energy efficiency a fundamental requirement for MANETs. In this paper, we propose a novel energy aware clustering algorithm for the optimized link state routing (OLSR) routing protocol. This algorithm takes into account the node density and mobility and gives major improvements regarding the number of elected cluster heads. Our objective is to elect a reasonable number of cluster heads that will serve for hierarchical routing based on OLSR. The proposed algorithm aims to increase the network lifetime by considering the ad hoc residual energy while taking routing decisions. It also optimizes the delay of carried flows by adopting a selective forwarding approach based on a hierarchical routing model. {\textcopyright} 2013 Institut Mines-T{\'e}l{\'e}com and Springer-Verlag France.}, doi = {10.1007/s12243-013-0411-6}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84897978699\&doi=10.1007\%2fs12243-013-0411-6\&partnerID=40\&md5=445ac6eebfe9e46232eb0ea4478df327}, author = {Loutfi, A.a and Elkoutbi, M.a and Benothman, J.b and Kobbane, A.a} } @article { ISI:000334054800007, title = {An energy aware algorithm for OLSR clustering}, journal = {ANNALS OF TELECOMMUNICATIONS-ANNALES DES TELECOMMUNICATIONS}, volume = {69}, number = {3-4}, year = {2014}, month = {APR}, pages = {201-207}, abstract = {One of the important aspects of a mobile ad hoc network (MANET) is the limitation of the amount of available energy and the network lifetime. The tremendous amount of using mobile nodes in wireless communication medium makes energy efficiency a fundamental requirement for MANETs. In this paper, we propose a novel energy aware clustering algorithm for the optimized link state routing (OLSR) routing protocol. This algorithm takes into account the node density and mobility and gives major improvements regarding the number of elected cluster heads. Our objective is to elect a reasonable number of cluster heads that will serve for hierarchical routing based on OLSR. The proposed algorithm aims to increase the network lifetime by considering the ad hoc residual energy while taking routing decisions. It also optimizes the delay of carried flows by adopting a selective forwarding approach based on a hierarchical routing model.}, issn = {0003-4347}, doi = {10.1007/s12243-013-0411-6}, author = {Loutfi, Ahmed and Elkoutbi, Mohammed and BenOthman, Jalel and Kobbane, Abdellatif} } @conference { ISI:000366999600144, title = {An Energy Efficient Clustering Algorithm for MANETs}, booktitle = {2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2014}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, MOROCCO, APR 14-16, 2014}, pages = {819-824}, abstract = {This paper describes a routing system for a communication network constituted by several ad hoc mobile nodes. This system optimizes energy consumption. It divides the network into clusters. Thereafter it detects the best way in terms of energy to be taken by a stream of data. This consists to calculate the energy required for each available path and select the optimal gateways. Each cluster is identified by a cluster-head which is elected according to its position and its residual energy by using a clustering algorithm. The main objective of this paper is to optimize the number of live nodes by assigning to each network task the appropriate nodes.}, isbn = {978-1-4799-3824-7}, author = {Choukri, Ali and Habbani, Ahmed and El koutbi, Mohamed} } @conference {Baddi2014106, title = {A fast dynamic multicast tree adjustment protocol for mobile IPv6}, booktitle = {International Conference on Next Generation Networks and Services, NGNS}, year = {2014}, note = {cited By 0}, pages = {106-113}, abstract = {Internet research community has proposed many Different multicast routing protocols to support efficient multimedia application such as, IPTV, videoconferencing, group games. Nevertheless, these protocols have not been designed for mobile roaming members and sources, and has not been tested in wireless and mobile environment since they were developed for multicast parties whose members and sources are topologically stationary. Recently, as the performance of mobile hosts rapidly improves and the bandwidth of wireless access networks grows up, the expectation for mobile multimedia communication services including many-to-many communications such as video-conferencing begins a big necessary. Studying and solving multicast issues in the stationary multicast infrastructure has been largely studied in the literature. However, fewer efforts have been spent in the specific problems of mobile members and sources caused by the frequent change of membership and point of attachment. This paper addresses the issue of mobile Multicast routing by presenting a Fast Dynamic Multicast Tree Adjustment Protocol for Mobile IPv6 (FDMTA-MIPv6), an optimized multicast tree protocol is proposed to transform multicast tree into an optimal shared multicast tree routed at a selected RP. To estimate and evaluate our scheme, we implement simulation based in many metrics, simulation results show that good performance is achieved in terms of handoff latency, end-to-end delay, tree construction delay and others metrics. {\textcopyright} 2014 IEEE.}, doi = {10.1109/NGNS.2014.6990237}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84920023844\&doi=10.1109\%2fNGNS.2014.6990237\&partnerID=40\&md5=c0f4b32fad87f7e72e0ca4fce3e955c0}, author = {Baddi, Y. and Ech-Chrif El Kettani, M.D.} } @conference {Omar2014, title = {A ferry-assisted solution for forwarding function in Wireless Sensor Networks}, booktitle = {Proceedings - International Symposium on Computers and Communications}, volume = {Workshops}, year = {2014}, note = {cited By 0}, abstract = {To ensure connectivity in highly sparse Wireless Sensor Networks (WSNs), we consider a Ferry-assisted Wireless Sensor Network(FWSN). In our FWSN, message ferries moving along concentric annulus collect the static sensors generated packets and propagate them throughout a ferry-to-ferry forwarding schema to the sink. In this paper we present a queueing model to study and analyze the FWSN behavior. We will adapt a queuing model with finite queues which will allow us to analyze the network behavior in tens of packet loss using an analytic model. The objective of this work is to provide a way to optimize the energy consumption for each individual sensor. In our approach we consider a sensor Ferry, which is a mobile sensor with the capacity to provide the control operation upon the other fixed sensors within to network. Therefor, these fixed sensors will have to perform less control operations which will reduce their individual energy consumption. By doing so, this will automatically impact positively on to the lifetime of the network. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ISCC.2014.6912648}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84908132136\&doi=10.1109\%2fISCC.2014.6912648\&partnerID=40\&md5=5d5c3b3309f7b9a5ed0c66f13985600c}, author = {Omar, A.O.a and Kobbane, A.a and Sabir, E.a b and Erradi, M.a and Ben-Othman, J.c} } @conference { ISI:000361140000144, title = {Ferry-based Architecture for Participatory sensing}, booktitle = {2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC)}, series = {International Wireless Communications and Mobile Computing Conference}, year = {2014}, note = {10th International Wireless Communications \& Mobile Computing Conference (IWCMC), Nicosia, CYPRUS, AUG 04-08, 2014}, pages = {845-849}, publisher = {IEEE; IEEE Cyprus Sect; Frederick Univ}, organization = {IEEE; IEEE Cyprus Sect; Frederick Univ}, abstract = {The concept of Participatory Sensing is centered on individuals that collect data using their smart phones (or other dedicated devices) to track the evolution of their work/living places. The main objective is to use the gathered data in order to enhance the offered quality of life. To maximize people involvement in this process we propose a ferry based architecture to leverage the contributors from charges associated with accessing service providers infrastructure to forward collected data. Opportunistic contact with message ferries will be exploited to gather data that will be carried from ferry-to-ferry till it reaches a centralized processing and decision-taking authority. We provide a closed formula for the End-to-End throughput of the proposed gathering network architecture.}, isbn = {978-1-4799-0959-9}, issn = {2376-6492}, author = {Koulali, Sara and Sabir, Essaid and Kobbane, Abdellatif and Azizi, Mostafa} } @conference {Koulali2014845, title = {Ferry-based architecture for Participatory Sensing}, booktitle = {IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference}, year = {2014}, note = {cited By 0}, pages = {845-849}, abstract = {The concept of Participatory Sensing is centered on individuals that collect data using their smart phones (or other dedicated devices) to track the evolution of their work/living places. The main objective is to use the gathered data in order to enhance the offered quality of life. To maximize people involvement in this process we propose a ferry based architecture to leverage the contributors from charges associated with accessing service providers infrastructure to forward collected data. Opportunistic contact with message ferries will be exploited to gather data that will be carried from ferry-To-ferry till it reaches a centralized processing and decision-Taking authority. We provide a closed formula for the End-To-End throughput of the proposed gathering network architecture. {\textcopyright} 2014 IEEE.}, doi = {10.1109/IWCMC.2014.6906466}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84908610867\&doi=10.1109\%2fIWCMC.2014.6906466\&partnerID=40\&md5=20f82b554230199456e13e347b4ecbe0}, author = {Koulali, S.a and Sabir, E.b and Kobbane, A.c and Azizi, M.a} } @conference {Badidi2014601, title = {A framework for automated SLAs management in service-oriented environments}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2014}, note = {cited By 0}, pages = {601-606}, abstract = {To meet their business goals, organizations are increasingly demanding services that can meet their functional and quality-of-service (QoS) requirements. In this paper, we propose a framework for service provisioning, which relies on brokered Service Level agreements (SLAs) between service consumers and service providers. The framework aims at providing support for automated SLA negotiation and management. The Service Broker of the framework carries out SLA negotiation, on behalf of service consumers, with selected service providers in multi-rounds of negotiations until an agreement or a timeout is reached. In each round, multiple SLA parameters are negotiated and both parties try to maximize their global utility functions. SLA compliance monitoring relies on the monitoring infrastructure, which provides support for independent monitoring of services by third party measurement services. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICMCS.2014.6911351}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84928746951\&doi=10.1109\%2fICMCS.2014.6911351\&partnerID=40\&md5=c66351ac0a2c12a5dc7d1e8211f5cb48}, author = {Badidi, E.a and El Koutbi, M.b} } @conference { ISI:000366999600107, title = {A Framework for Automated SLAs Management in Service-oriented Environments}, booktitle = {2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2014}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, MOROCCO, APR 14-16, 2014}, pages = {607-612}, abstract = {To meet their business goals, organizations are increasingly demanding services that can meet their functional and quality-of-service (QoS) requirements. In this paper, we propose a framework for service provisioning, which relies on brokered Service Level agreements (SLAs) between service consumers and service providers. The framework aims at providing support for automated SLA negotiation and management. The Service Broker of the framework carries out SLA negotiation, on behalf of service consumers, with selected service providers in multi-rounds of negotiations until an agreement or a timeout is reached. In each round, multiple SLA parameters are negotiated and both parties try to maximize their global utility functions. SLA compliance monitoring relies on the monitoring infrastructure, which provides support for independent monitoring of services by third party measurement services.}, isbn = {978-1-4799-3824-7}, author = {Badidi, Elarbi and El koutbi, Mohamed} } @article {Mabrouk20141417, title = {Gateways{\textquoteright} mobility increases the capacity of communication in VANETs: Routing algorithm based on congestion game}, journal = {International Review on Computers and Software}, volume = {9}, number = {8}, year = {2014}, note = {cited By 2}, pages = {1417-1425}, abstract = {Vehicular Ad Hoc Network (VANET) is considered as a special application of Mobile Ad Hoc Networks in road traffic, which can autonomously organize networks without infrastructure. VANETs enable vehicles on the road to communicate with each other and with road infrastructure using wireless capabilities. In the last few years, extensive research provided several routing algorithms to extend Internet connectivity to VANETs through fixed gateways installed along the road. However, most of these algorithms have not been effective because of the high mobility of vehicles in the road. In this paper, we propose a routing algorithm which based both on the congestion game to resolve the problem of network congestion and on mobile gateways to resolve the problem of high mobility in VANET. Therefore, the proposed algorithm is a prediction done by each node in the network that helps them to reach the optimal route to access Internet. Simulation results validate the algorithm and show its robustness under two scenarios. In the first one, we examine the algorithm with fixed gateways installed along the road to validate the connectivity to the Internet. Whilst in the second scenario, we examine the algorithm with mobile gateways to show the effectiveness of gateways{\textquoteright} mobility on the capacity of communication and the Internet access in VANETs. {\textcopyright} 2014 Praise Worthy Prize S.r.l. - All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84908347271\&partnerID=40\&md5=359209fd84ed425637bce48a01410d6b}, author = {Mabrouk, A.a and Senhadji, M.b and Walid, A.a and Kobbane, A.b and El Koutbi, M.a} } @conference {Koudougnon2014118, title = {A Genetic Algorithms based detector for MIMO STBC systems}, booktitle = {WCCCS 2014 - Proceedings; 2014 5th Workshop on Codes, Cryptography and Communication Systems}, year = {2014}, note = {cited By 0}, pages = {118-123}, abstract = {This paper proposes a new STBC MIMO detector based on Genetic Algorithms (GA) that can approach the performances of an optimal detector based on the maximum likekihood dtector (MLD). This detector is a hybridization between the GA and a linear detector such as ZF or MMSE detector. The optimization of the parameters of the GA can significantly improve performances. Our detector was compared with other equivalent detectors. The results show that our proposed algorithm gives better performance. {\textcopyright} 2014 IEEE.}, doi = {10.1109/WCCCS.2014.7107906}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84983119233\&doi=10.1109\%2fWCCCS.2014.7107906\&partnerID=40\&md5=a83799f8aa9373bdc7b5106c86a7ddc0}, author = {Koudougnon, H. and Azouaoui, A. and Belkasmi, M.} } @conference { ISI:000366666805090, title = {Green Opportunistic Access for Cognitive Radio Networks: A Minority Game Approach}, booktitle = {2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)}, series = {IEEE International Conference on Communications}, year = {2014}, note = {IEEE International Conference on Communications (ICC), Sydney, AUSTRALIA, JUN 10-14, 2014}, pages = {5372-5377}, publisher = {IEEE}, organization = {IEEE}, abstract = {We investigate energy conservation and system performance of decentralized resource allocation scheme in cognitive radio networks thoroughly based on secondary users competitive behavior. Indeed, the contention on data channel unoccupied by licensed user leads to a single winner, but also involves a loss of energy of all nodes. In this paper, we apply minority game (MG) to the most important phase from the opportunistic spectrum access (OSA) process: the sensing phase. We attempt to carry out a cooperation in a non-cooperative environment with no information exchange. We study the Nash equilibrium solution for pure and fully mixed strategies, and we use distributed learning algorithms enabling cognitive users to learn the Nash equilibrium. Finally, we provide numerical results to validate the proposed approach. The resource allocation based on minority game approach improves secondary users battery life and the performance of the network.}, isbn = {978-1-4799-2003-7}, issn = {1550-3607}, author = {Elmachkour, Mouna and Daha, Imane and Sabir, Essaid and Kobbane, Abdellatif and Ben-Othman, Jalel}, editor = {Jamalipour, A and Deng, DJ} } @conference {Elmachkour20145372, title = {Green opportunistic access for cognitive radio networks: A minority game approach}, booktitle = {2014 IEEE International Conference on Communications, ICC 2014}, year = {2014}, note = {cited By 6}, pages = {5372-5377}, abstract = {We investigate energy conservation and system performance of decentralized resource allocation scheme in cognitive radio networks thoroughly based on secondary users competitive behavior. Indeed, the contention on data channel unoccupied by licensed user leads to a single winner, but also involves a loss of energy of all nodes. In this paper, we apply minority game (MG) to the most important phase from the opportunistic spectrum access (OSA) process: the sensing phase. We attempt to carry out a cooperation in a non-cooperative environment with no information exchange. We study the Nash equilibrium solution for pure and fully mixed strategies, and we use distributed learning algorithms enabling cognitive users to learn the Nash equilibrium. Finally, we provide numerical results to validate the proposed approach. The resource allocation based on minority game approach improves secondary users battery life and the performance of the network. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICC.2014.6884175}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84907000432\&doi=10.1109\%2fICC.2014.6884175\&partnerID=40\&md5=13fd149d57c8c1d76ace2aecdcd1d08a}, author = {Elmachkour, M.a and Daha, I.b and Sabir, E.c and Kobbane, A.a d and Ben-Othman, J.d} } @conference { ISI:000371484600074, title = {Green opportunistic access for CRN with selfish users using Coalitional game Approach in partition form}, booktitle = {2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}14)}, series = {Colloquium in Information Science and Technology}, year = {2014}, note = {3rd IEEE International Colloquium on Information Science and Technology (CIST), Tetouan, MOROCCO, OCT 20-22, 2014}, pages = {425-429}, publisher = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, organization = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, abstract = {We study energy conservation and system performance of decentralized cognitive radio network with cognitive users. Every cognitive radio (CR) user needs to sense the channel to send data, if the channel is unoccupied by a licensed user only one winner transmits its data. Hence, all other users waste their energy in sensing the licensed bands and in negotiating the resource access without managing to transmit data packets. We formulate the sensing-energy tradeoff problem for distributed cognitive radio network as a coalition formation game. Our contribution is to apply the coalitional game design to the most important phases of cognitive radio network (CRN): sensing and data transmission. The concept of coalitional game may enforce the cooperative behavior of CR users in order to improve the system performance (energy and delay..). The network is modeled using a coalitional game in partition form with non transferable utility (NTU). After forming coalitions, no CR user in those coalitions aim to change its position. Indeed, the members of this coalition will cooperate both in sensing and access phases to improve system performance. The selfish behavior becomes evident when the cognitive users are constrained to send their data in a short delay and with a minimum of energy consumption. Our proposed algorithm explains how the selfish atittude of the cognitive user leds to join the coalition that increases its individual gain, and tacitly to improve the performance of the entire system.}, isbn = {978-1-4799-5979-2}, issn = {2327-185X}, author = {Belghiti, Imane Daha and Elmachkour, Mouna and Berrada, Ismail and Kobbane, Abdellatif}, editor = {ElMohajir, M and AlAchhab, M and Chahhou, M} } @article { ISI:000348218400023, title = {The Greening of Spectrum Sensing: A Minority Game-Based Mechanism Design}, journal = {IEEE COMMUNICATIONS MAGAZINE}, volume = {52}, number = {12}, year = {2014}, month = {DEC}, pages = {150-156}, abstract = {Cognitive radio technology allows the reuse of the underutilized frequency spectrum on an opportunistic and non-interfering basis by means of introducing, besides the legitimate primary users of the spectrum, a new kind of users called cognitive or secondary users. Thus, reliable spectrum sensing is critical to dynamically detect available licensed frequency bands and mitigate the primary signals, but it remains realistically difficult to carry out. In fact, although distributed collaborative sensing has turned out to be fruitful for the cognitive radio environment, its accuracy is often affected by the selfish and autonomous behavior of users. In this article, we model distributed spectrum sensing and channel allocation as a non-cooperative game, and apply the minority game to bring forth and study the cooperative behavior of users. The novelty brought by our study consists of alleviating the number of users contending for primary channels by giving them the opportunity to choose between the two, either sensing the channel or being inactive during the time slot. To address the trade-off faced by the SUs, we evaluate the performance of two secondary systems in a green communications context: energy consumption and transmission delay.}, issn = {0163-6804}, author = {Elmachkour, Mouna and Sabir, Essaid and Kobbane, Abdellatif and Ben-Othman, Jalel and El Koutbi, Mohammed} } @article {Elmachkour2014150, title = {The greening of spectrum sensing: A minority game-based mechanism design}, journal = {IEEE Communications Magazine}, volume = {52}, number = {12}, year = {2014}, note = {cited By 5}, pages = {150-156}, abstract = {Cognitive radio technology allows the reuse of the underutilized frequency spectrum on an opportunistic and non-interfering basis by means of introducing, besides the legitimate primary users of the spectrum, a new kind of users called cognitive or secondary users. Thus, reliable spectrum sensing is critical to dynamically detect available licensed frequency bands and mitigate the primary signals, but it remains realistically difficult to carry out. In fact, although distributed collaborative sensing has turned out to be fruitful for the cognitive radio environment, its accuracy is often affected by the selfish and autonomous behavior of users. In this article, we model distributed spectrum sensing and channel allocation as a non-cooperative game, and apply the minority game to bring forth and study the cooperative behavior of users. The novelty brought by our study consists of alleviating the number of users contending for primary channels by giving them the opportunity to choose between the two, either sensing the channel or being inactive during the time slot. To address the trade-off faced by the SUs, we evaluate the performance of two secondary systems in a green communications context: energy consumption and transmission delay. {\textcopyright} 2014 IEEE.}, doi = {10.1109/MCOM.2014.6979967}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84919712749\&doi=10.1109\%2fMCOM.2014.6979967\&partnerID=40\&md5=72e3daa3f2e577d4633668e3bd67f25a}, author = {Elmachkour, M.a and Sabir, E.b and Kobbane, A.a and Ben-Othman, J.c and El Koutbi, M.a} } @conference { ISI:000360158500020, title = {A Hybrid Method for Solving Buffer Sizing and Inspection Stations Allocation}, booktitle = {ADVANCES IN PRODUCTION MANAGEMENT SYSTEMS: INNOVATIVE AND KNOWLEDGE-BASED PRODUCTION MANAGEMENT IN A GLOBAL-LOCAL WORLD, APMS 2014, PT III}, series = {IFIP Advances in Information and Communication Technology}, volume = {440}, year = {2014}, note = {IFIP WG 5.7 International Conference on Advances in Production Management Systems (APSM), Ajaccio, FRANCE, SEP 20-24, 2014}, pages = {156-166}, publisher = {IFIP WG 5 7 Advances Prod Management Syst; Res Federat Distributed Org Engn; CNRS Res Grp Modelling \& Anal Complex Syst; Res Inst Transports Energy \& Soc}, organization = {IFIP WG 5 7 Advances Prod Management Syst; Res Federat Distributed Org Engn; CNRS Res Grp Modelling \& Anal Complex Syst; Res Inst Transports Energy \& Soc}, abstract = {The buffer sizing problem in unreliable production lines is an important, indeed, complex combinatorial optimization problem with many industrial applications. These applications include quality, logistics and manufacturing production systems. In the formulation of the problem, the system consists of n machines, n fixed-size buffers and m inspection station in series. The objective is to minimize a combined storage and shortage costs, and also specifying the optimal location of inspection stations in the system. The present paper aims at optimizing a generalization of the model previously proposed in (Mhada et al., 2014) using a novel approach. In this approach, we combine Tabu Search (TS) and Genetic Algorithm (GA) to identify search regions with promising locations of inspection stations and an exact method to optimize the assignment of buffer sizes for each location. This approach provides a balance between diversification and intensification. Numerical results on test problems from previous research are reported. Using this approach, we can reduce the solution time by more than 97\% in some cases.}, isbn = {978-3-662-44732-1}, issn = {1868-4238}, author = {Ouzineb, Mohamed and Mhada, Fatima-Zahra and Pellerin, Robert and El Hallaoui, Issmail}, editor = {Grabot, B and Vallespir, B and Gomes, S and Bouras, A and Kiritsis, D} } @conference {Guilavogui2014281, title = {A hybrid strategy for integrating sensor information}, booktitle = {ICEIS 2014 - Proceedings of the 16th International Conference on Enterprise Information Systems}, volume = {1}, year = {2014}, note = {cited By 0}, pages = {281-286}, abstract = {The combination of sensor networks with databases has led to a large amount of real-time data to be managed, and this trend will still increase in the next coming years. With this data explosion, current integration systems have to adapt. One of the main challenges is the integration of information coming from autonomously deployed sensor networks, with different geographical scales, but also with the combination of such information with other sources, such as legacy systems. Two main approaches for integrating sensor information are generally used: virtual and warehousing approaches. In the virtual approach, sensor devices are considered as data sources and data are managed locally. In contrast, in the warehousing approach, sensor data are stored in a central database and queries are performed on it. However, these solutions turn out to be difficult to exploit in the current technology landscape. This paper focuses on the issue of integrating multiple heterogeneous sensor information and puts forward a framework for decision making process.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84902319248\&partnerID=40\&md5=eed05f56f6af14fa6195619f958c6b85}, author = {Guilavogui, K. and Kjiri, L. and Fredj, M.} } @conference { ISI:000371484600008, title = {Integrating Linked Sensor Data for On-line Analytical Processing On-The-Fly}, booktitle = {2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}14)}, series = {Colloquium in Information Science and Technology}, year = {2014}, note = {3rd IEEE International Colloquium on Information Science and Technology (CIST), Tetouan, MOROCCO, OCT 20-22, 2014}, pages = {43-47}, publisher = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, organization = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, abstract = {Sensor networks are gaining more and more attention in the current technology landscape. It is undeniable that their use allows a better monitoring of events that occur in the real world. Many sensors have been deployed for monitoring applications such as environmental monitoring, and traffic monitoring. A number of governments, corporates, and academic organizations or agencies hold independently sensor systems that generate a large amount of dynamic information from data sources with various formats of schemas and data. They are making this sensor data openly accessible by publishing it as Linked Sensor Data (LSD) on the Linked Open Data (LOD) cloud. LSD is the concept that defines the publication of public or private organization sensor data without restrictions. This is achieved by transforming raw sensor observations to RDF format and by linking it with other datasets on the LOD cloud. The seamless integration of LSD sources from multiple providers is a great challenge. In this paper, we investigate the possibility of integrating diverse LSD sources using the hybrid ontology approach for on-line analytical processing (OLAP) on-the-fly. With such an ontology-based integration framework, organizations or individuals will have greater opportunity to make their respective analysis based on a large amount of sensor data openly accessible on the Web.}, isbn = {978-1-4799-5979-2}, issn = {2327-185X}, author = {Guilavogui, Koly and Kjiri, Laila and Fredj, Mounia}, editor = {ElMohajir, M and AlAchhab, M and Chahhou, M} } @conference { ISI:000380387700057, title = {On managing evolution of configurable services based on configurable processes}, booktitle = {2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS)}, year = {2014}, note = {2014 Second World Conference on Complex Systems (WCCS), Agadir, MOROCCO, NOV 10-12, 2014}, pages = {616-621}, publisher = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, organization = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, abstract = {Today, SOA is the most dominant and broadly adopted architecture style by enterprises. It defines how to use services to achieve business goals, and allows interoperability with multiple customers within different business domains. The growing use of SOA has increased research interest on how to improve the reuse of services. Hence, managing services variability was introduced by many approaches as a new leading edge concept for improving reuse. Indeed, variability refers to the characteristic of a system to adapt, specialize and configure itself with the context of use. Several proposals have been made in this respect. However, none of these seem to deal with the evolution of these configurable services. In service oriented systems, the evolution of services is usually introduced by the evolution of the associated business process. Therefore, if a configurable process model (CPM for short) should evolve in reaction to changing business needs, the associated configurable services (CS for short) are also impacted by this change. In our previous work, we proposed a complete methodology for managing evolution in configurable process models. In this paper, we extend our proposed approach to develop an evolution process for managing the changes of configurable services (variable services) caused by changing the associated configurable process model.}, isbn = {978-1-4799-4647-1}, author = {Sbai, Hanae and Fredj, Mounia and Chakir, Boutaina and Kjiri, Laila} } @conference {Sbai2014616, title = {On managing evolution of configurable services based on configurable processes}, booktitle = {2014 2nd World Conference on Complex Systems, WCCS 2014}, year = {2014}, note = {cited By 0}, pages = {616-621}, abstract = {Today, SOA is the most dominant and broadly adopted architecture style by enterprises. It defines how to use services to achieve business goals, and allows interoperability with multiple customers within different business domains. The growing use of SOA has increased research interest on how to improve the reuse of services. Hence, managing services variability was introduced by many approaches as a new leading edge concept for improving reuse. Indeed, variability refers to the characteristic of a system to adapt, specialize and configure itself with the context of use. Several proposals have been made in this respect. However, none of these seem to deal with the evolution of these configurable services. In service oriented systems, the evolution of services is usually introduced by the evolution of the associated business process. Therefore, if a configurable process model (CPM for short) should evolve in reaction to changing business needs, the associated configurable services (CS for short) are also impacted by this change. In our previous work, we proposed a complete methodology for managing evolution in configurable process models. In this paper, we extend our proposed approach to develop an evolution process for managing the changes of configurable services (variable services) caused by changing the associated configurable process model. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICoCS.2014.7060934}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84988220675\&doi=10.1109\%2fICoCS.2014.7060934\&partnerID=40\&md5=371668ec9f07b988342b6b176b8c7d7e}, author = {Sba{\"\i}, H. and Fredj, M. and Chakir, B. and Kjiri, L.} } @conference { ISI:000371484600037, title = {MINING USER PATTERNS FOR LOCATION PREDICTION IN MOBILE SOCIAL NETWORKS}, booktitle = {2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}14)}, series = {Colloquium in Information Science and Technology}, year = {2014}, note = {3rd IEEE International Colloquium on Information Science and Technology (CIST), Tetouan, MOROCCO, OCT 20-22, 2014}, pages = {213-218}, publisher = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, organization = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, abstract = {Understanding human mobility dynamics is of an essential importance to today mobile applications, including context-aware advertising and city wide sensing applications. Recently, Location-based social networks (LBSNs) have attracted important researchers{\textquoteright} efforts, to investigate spatial, temporal and social aspects of user patterns. LBSNs allow users to {\textquoteleft}{\textquoteleft}check-in{{\textquoteright}{\textquoteright}} at geographical locations and share this information with friends. In this paper, analysis of check-ins data provided by Foursquare, the online location-based social network, allows us to construct a set of features that capture: spatial, temporal and similarity characteristics of user mobility. We apply this knowledge to location prediction problem, and combine these features in supervised learning for future location prediction. We find that the supervised classifier based on the combination of multiple features offers reasonable accuracy.}, isbn = {978-1-4799-5979-2}, issn = {2327-185X}, author = {Mourchid, Fatima and Habbani, Ahmed and El koutbi, Mohamed}, editor = {ElMohajir, M and AlAchhab, M and Chahhou, M} } @conference { ISI:000367072600061, title = {Modeling and Enforcing Security and Service Control Policies using FlexRFID Middleware Healthcare Scenarios}, booktitle = {2014 SCIENCE AND INFORMATION CONFERENCE (SAI)}, year = {2014}, note = {Science and Information Conference (SAI), Sci \& Informat Org, London, ENGLAND, AUG 27-29, 2014}, pages = {461-467}, publisher = {Microsoft; RK Trans2Cloud; Springer; IEEE Comp Soc, UKRI Sect; IEEE Computat Intelligence Soc, UKRI Sect; IEEE}, organization = {Microsoft; RK Trans2Cloud; Springer; IEEE Comp Soc, UKRI Sect; IEEE Computat Intelligence Soc, UKRI Sect; IEEE}, abstract = {RFID and WSN technologies are widely used in today{\textquoteright}s pervasive computing. In Wireless Sensor Networks, sensor nodes sense the physical environment and send the sensed data to the sink by multi-hops. WSN are used in many applications such as military and environment monitoring. In Radio Frequency Identification, a unique ID is assigned to a RFID tag which is associated with a real world object. RFID applications cover many areas such as Supply Chain Management (SCM), healthcare, library management, automatic toll collection, etc. The integration of both technologies will bring many advantages in the future of ubiquitous computing, through the provision of real-world tracking and context information about the objects. This will increase considerably the automation of an information system. In order to process the large volume of data captured by sensors and RFID readers in real time, a middleware solution is needed. This middleware should be designed in a way to allow the aggregation, filtering and grouping of the data captured by the hardware devices before sending them to the backend applications. In this paper we demonstrate how our middleware solution called FlexRFID handles large amount of RFID and sensor scan data, and executes applications{\textquoteright} business rules in real time through its policy-based Business Rules layer. The FlexRFID middleware provides easy addition and removal of hardware devices that capture data, as well as uses the business rules of the applications to control all its services. We demonstrate how the middleware controls some defined healthcare scenarios, and deals with the access control security concern to sensitive healthcare data through the use of policies.}, isbn = {978-0-9893193-1-7}, author = {El Khaddar, Mehdia Ajana and Chraibi, Mhammed and Harroud, Hamid and Boulmalf, Mohammed and Elkoutbi, Mohammed and Maach, Abdelilah} } @conference {ElKhaddar2014461, title = {Modeling and enforcing security and service control policies using FlexRFID middleware: Healthcare scenarios}, booktitle = {Proceedings of 2014 Science and Information Conference, SAI 2014}, year = {2014}, note = {cited By 0}, pages = {461-467}, abstract = {RFID and WSN technologies are widely used in today{\textquoteright}s pervasive computing. In Wireless Sensor Networks, sensor nodes sense the physical environment and send the sensed data to the sink by multi-hops. WSN are used in many applications such as military and environment monitoring. In Radio Frequency Identification, a unique ID is assigned to a RFID tag which is associated with a real world object. RFID applications cover many areas such as Supply Chain Management (SCM), healthcare, library management, automatic toll collection, etc. The integration of both technologies will bring many advantages in the future of ubiquitous computing, through the provision of real-world tracking and context information about the objects. This will increase considerably the automation of an information system. In order to process the large volume of data captured by sensors and RFID readers in real time, a middleware solution is needed. This middleware should be designed in a way to allow the aggregation, filtering and grouping of the data captured by the hardware devices before sending them to the backend applications. In this paper we demonstrate how our middleware solution called FlexRFID handles large amount of RFID and sensor scan data, and executes applications{\textquoteright} business rules in real time through its policy-based Business Rules layer. The FlexRFID middleware provides easy addition and removal of hardware devices that capture data, as well as uses the business rules of the applications to control all its services. We demonstrate how the middleware controls some defined healthcare scenarios, and deals with the access control security concern to sensitive healthcare data through the use of policies. {\textcopyright} 2014 The Science and Information (SAI) Organization.}, doi = {10.1109/SAI.2014.6918228}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84909619846\&doi=10.1109\%2fSAI.2014.6918228\&partnerID=40\&md5=14f713233106cde74364d97b68b0b9ad}, author = {El Khaddar, M.A.a and Chraibi, M.b and Harroud, H.c and Boulmalf, M.d and Elkoutbi, M.a and Maach, A.b} } @conference { ISI:000371484600066, title = {Multiple Active Cores-based Shared Multicast Tree for mobile IPv6 environment}, booktitle = {2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}14)}, series = {Colloquium in Information Science and Technology}, year = {2014}, note = {3rd IEEE International Colloquium on Information Science and Technology (CIST), Tetouan, MOROCCO, OCT 20-22, 2014}, pages = {378-383}, publisher = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, organization = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, abstract = {Due to the progress of network multimedia technology, internet research community proposed many different multicast routing protocols to support efficient real-time multimedia application such as, IPTV, videoconferencing, group games. These applications require a multicast routing protocol in which packets arrive to multicast receivers with minimum delay and delay variation. These applications are more important with arrival of mobile IPv6 protocol with mobile receivers and sources with continuous access. Nevertheless, the design of multicast protocols does not take into account that group members may be mobile. Dynamic group members and sources can rapidly affect quality of both routing protocol scheme and multicast tree used. The key idea of this work is to make the handover of multicast members transparent and a quick recovery mechanism to maintain an optimal multicast tree, by using MACT-MIPv6 architecture based on multicast routing protocol with Shared Multiple Active Cores Multicast Tree to hide the mobility of mobile multicast members from the main multicast delivery tree. Simulation results show that good performance is achieved in terms of handoff latency, end-to-end delay, tree construction delay and others metrics.}, isbn = {978-1-4799-5979-2}, issn = {2327-185X}, author = {Baddi, Youssef and El Kettani, Mohamed Dafir Ech-Cherif}, editor = {ElMohajir, M and AlAchhab, M and Chahhou, M} } @conference { ISI:000366999600180, title = {A new Middleware Architecture for the integration of RFID technology into information systems}, booktitle = {2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2014}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, MOROCCO, APR 14-16, 2014}, pages = {1025-1030}, abstract = {1980 marked the start of a boom in radiofrequency identification (RFID) technology, initially associated with a growing need for traceability. In view of the technological progress and lower costs, RFID{\textquoteright}s area of application became much broader and, today, multiple business sectors take advantage of this technology. But in order to achieve the maximum benefits of RFID technology, the RFID information collected should be useful, for this it is necessary that we can collect it and deliver it in the best conditions for the whole applications that have need of its exploitation, for that a dedicated middleware solution is required to ensure the collection of RFID information and their integration in an information systems. The issues and key points of this integration as the description of the RFID technology will be summarized in the present paper, with a new middleware architecture.}, isbn = {978-1-4799-3824-7}, author = {Bouhouche, Taib and El Khaddar, M. A. and Boulmalf, Mohammed and Bouya, Mohsine and Elkoutbi, Mohamed} } @conference {Bouhouche20141025, title = {A new middleware architecture for the integration of RFID technology into information systems}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2014}, note = {cited By 0}, pages = {1025-1030}, abstract = {1980 marked the start of a boom in radiofrequency identification (RFID) technology, initially associated with a growing need for traceability. In view of the technological progress and lower costs, RFID{\textquoteright}s area of application became much broader and, today, multiple business sectors take advantage of this technology. But in order to achieve the maximum benefits of RFID technology, the RFID information collected should be useful, for this it is necessary that we can collect it and deliver it in the best conditions for the whole applications that have need of its exploitation, for that a dedicated middleware solution is required to ensure the collection of RFID information and their integration in an information systems. The issues and key points of this integration as the description of the RFID technology will be summarized in the present paper, with a new middleware architecture. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICMCS.2014.6911314}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84928747866\&doi=10.1109\%2fICMCS.2014.6911314\&partnerID=40\&md5=2633c52241f89748a57aec99c69c2043}, author = {Bouhouche, T.a b and El Khaddar, M.A.a and Boulmalf, M.a and Bouya, M.a and Elkoutbi, M.b} } @conference {Rahmouni201494, title = {Optimal buffer management policies in DTNs: A POMDP approach}, booktitle = {2014 IEEE International Conference on Communications, ICC 2014}, year = {2014}, note = {cited By 0}, pages = {94-99}, abstract = {Using Delay Tolerant Networks (DTNs) would facilitate the connection of devices and areas across the world that are under-served by current networks. The DTNs are based on the concept of store-carry-and-forward protocols. A node may store a message in its buffer and carry it for a short or a long period of time, until an appropriate forwarding opportunity arises. A critical challenge is to determine routes through the network without even having an end-to-end connection. In order to increase the probability of message delivery, a known approach is implemented using epidemic message replication. This combination of long-term storage and message replication imposes a high storage and bandwidth overhead. Thus, efficient scheduling and dropping policies are necessary to decide which messages should be discarded when nodes{\textquoteright} buffers operate close to their capacity. If a relay buffer is full and needs to store a new packet, it has to decide either to keep the current message or to drop it. This decision depends on the number of transmissions of the message in its buffer and the message which has just arrived. In this paper, a Partially Observed Markov Decision Process (POMDP) framework is proposed to solve the problem of buffer management in DTNs. This modeling technique predicts some properties of the optimal buffer management policy. In addition, numerical examples are presented to illustrate the findings. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICC.2014.6883301}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84906995806\&doi=10.1109\%2fICC.2014.6883301\&partnerID=40\&md5=382f58d0b8f3dc6541db001ac2f98769}, author = {Rahmouni, I.a and Kamili, M.E.a and Fenni, M.R.E.b and Omari, L.a and Kobbane, A.c} } @conference { ISI:000366666800017, title = {Optimal Buffer Management Policies in DTNs: A POMDP Approach}, booktitle = {2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)}, series = {IEEE International Conference on Communications}, year = {2014}, note = {IEEE International Conference on Communications (ICC), Sydney, AUSTRALIA, JUN 10-14, 2014}, pages = {94-99}, publisher = {IEEE}, organization = {IEEE}, abstract = {Using Delay Tolerant Networks (DTNs) would facilitate the connection of devices and areas across the world that are under-served by current networks. The DTNs are based on the concept of store-carry-and-forward protocols. A node may store a message in its buffer and carry it for a short or a long period of time, until an appropriate forwarding opportunity arises. A critical challenge is to determine routes through the network without even having an end-to-end connection. In order to increase the probability of message delivery, a known approach is implemented using epidemic message replication. This combination of long-term storage and message replication imposes a high storage and bandwidth overhead. Thus, efficient scheduling and dropping policies are necessary to decide which messages should be discarded when nodes{\textquoteright} buffers operate close to their capacity. If a relay buffer is full and needs to store a new packet, it has to decide either to keep the current message or to drop it. This decision depends on the number of transmissions of the message in its buffer and the message which has just arrived. In this paper, a Partially Observed Markov Decision Process (POMDP) framework is proposed to solve the problem of buffer management in DTNs. This modeling technique predicts some properties of the optimal buffer management policy. In addition, numerical examples are presented to illustrate the findings.}, isbn = {978-1-4799-2003-7}, issn = {1550-3607}, author = {Rahmouni, Imane and El Kamili, Mohamed and El Fenni, Mohammed Raiss and Omari, Lahcen and Kobbane, Abdellatif}, editor = {Jamalipour, A and Deng, DJ} } @conference {Kasmi201423, title = {Performance evaluation of sparse matrix-vector product (SpMV) computation on GPU architecture}, booktitle = {2014 2nd World Conference on Complex Systems, WCCS 2014}, year = {2014}, note = {cited By 1}, pages = {23-27}, abstract = {Sparse matrices are entailed in many linear algebra problems such as linear systems resolution, matrix eigen-values/vectors computation and partial differential equations, wherefore sparse matrix vector product (SpMV) constitutes a basic kernel for solving many scientific and engineering applications problems. With the appearance of Graphics Processing Units (GPUs) as platforms that provides important acceleration factors, the optimization of SpMV on GPUs and its implementation has been a subject of broad research for the last few years. In this work we present a comparative evaluation of sparse matrix vector product (SpMV) on different platforms. We use Cusp library on CUDA architecture GPUs and MKL Intel library as reference on CPUs. Experimental results have been conducted using a set of matrices from matrix market repository1, comparing performance between GPU-based Cusp2 and CPU-based MKL3 libraries. The results showed a global speedup, obtained with GPU, ranging from 1.1 x to 4.6 x compared to CPU implementations. An analysis and evaluation of these results is discussed. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICoCS.2014.7060964}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84929179718\&doi=10.1109\%2fICoCS.2014.7060964\&partnerID=40\&md5=5a761f6d02607bb6f754f683b3a7878f}, author = {Kasmi, N.a and Mahmoudi, S.A.b and Zbakh, M.a and Manneback, P.b} } @conference { ISI:000380387700087, title = {Performance evaluation of sparse matrix-vector product (SpMV) computation on GPU architecture}, booktitle = {2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS)}, year = {2014}, note = {2014 Second World Conference on Complex Systems (WCCS), Agadir, MOROCCO, NOV 10-12, 2014}, pages = {23-27}, publisher = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, organization = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, abstract = {Sparse matrices are entailed in many linear algebra problems such as linear systems resolution, matrix eigenvalues/vectors computation and partial differential equations, wherefore sparse matrix vector product (SpMV) constitutes a basic kernel for solving many scientific and engineering applications problems. With the appearance of Graphics Processing Units (GPUs) as platforms that provides important acceleration factors, the optimization of SpMV on GPUs and its implementation has been a subject of broad research for the last few years. In this work we present a comparative evaluation of sparse matrix vector product (SpMV) on different platforms. We use Cusp library on CUDA architecture GPUs and MKL Intel library as reference on CPUs. Experimental results have been conducted using a set of matrices from matrix market repositoryi, comparing performance between GPU-based Cusp(2)and CPU-based MKL(3)libraries. The results showed a global speedup, obtained with GPU, ranging from 1.1 x to 4.6 x compared to CPU implementations. An analysis and evaluation of these results is discussed.}, isbn = {978-1-4799-4647-1}, author = {Kasmi, Najlae and Mahmoudi, Sidi Ahmed and Zbakh, Mostapha and Manneback, Pierre} } @article {Baddi2014253, title = {PIM-SM protocol with GRASP-RP selection algorithm based architecture to transparent mobile sources in multicast mobile IPv6 diffusion}, journal = {Journal of Mobile Multimedia}, volume = {9}, number = {3-4}, year = {2014}, note = {cited By 1}, pages = {253-272}, abstract = {Due to the progress of network multimedia technology, Internet research community has proposed many Different multicast routing protocols to support efficient real-time multimedia application such as, IPTV, videoconferencing, group games. These applications require a multicast routing protocol in which packets arrive to multicast receptors within a minimum delay and delay variation. Nevertheless, these protocols does not take into account that group members may be mobile and have not been designed for mobile members and roaming sources, and has not been tested in wireless and mobile environment since they were developed for multicast parties whose members and sources are topologically stationary. Recently, as the performance of mobile hosts rapidly improves and the bandwidth of wireless access networks grows up, the expectation for mobile multimedia communication services including many-to-many communications begins a big necessary. Studying and solving multicast issues in the stationary multicast infrastructure has been largely studied in the literature. However, fewer efforts have been spent in the specific problems of mobile members and sources caused by the frequent change of membership and point of attachment. The main problematic of the multicast IP protocols in a Mobile IP environment is the frequent change of membership and members location, this can rapidly affect quality of both routing protocol scheme and multicast tree used, especially, the scenario of handover where a mobile source moves from attachment point in one sub-network to another one in another sub-network is challenging. A multicast source is identified by its Home Address HA. Since IP mobility implies acquisition of a new topologically Care-of-Address CoA at each handoff resulting in a change of identity of the multicast source, however, the established multicast routing states are always based on the home address of the mobile source. This paper addresses the issue of mobile Multicast routing by presenting a PIM-SM based architecture with a GRASP-RP selection algorithm. The key idea of this work is to make the handover of multicast sources transparent and avoid the reconstruction of the entire multicast-based tree, by using an architecture based in PIM-SM multicast distribution trees to hide the mobility of a mobile multicast source from the main multicast delivery tree. To estimate and evaluate our scheme, we implement simulation based in many metrics, simulation results show that good performance is achieved in terms of handoff latency, end-to-end delay, tree construction delay and others metrics. {\textcopyright} 2014 Rinton Press.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84893725131\&partnerID=40\&md5=829e43ba7bb7aaf0bc54f08635084c12}, author = {Baddi, Y. and El Kettani, M.D.E.-C.} } @conference {Chraibi2014322, title = {Policy based security middleware as a service}, booktitle = {Proceedings - 2014 International Conference on Future Internet of Things and Cloud, FiCloud 2014}, year = {2014}, note = {cited By 0}, pages = {322-327}, abstract = {Cloud computing is amongst the major topics researched in Computer Science. Cloud computing security is at the heart of the topic. The reason behind this is that, as a technology, cloud computing is a great alternative that allows companies to outsource the management of their computing resources. However, due to the security issues, the cloud technology is not reaching its full potential. In this paper we present a system that allows the enforcement of privacy, accountability, integrity, and availability in each one of cloud computing levels using software policies. We present and describe the architecture of the Policy-Based Security Middleware as a Service. {\textcopyright} 2014 IEEE.}, doi = {10.1109/FiCloud.2014.57}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84922575142\&doi=10.1109\%2fFiCloud.2014.57\&partnerID=40\&md5=e2e0e77c31b6b215de057602faa575bd}, author = {Chraibi, M.a and Khaddar, M.A.E.b and Harroud, H.a and Maach, A.c and Elkoutbi, M.b} } @conference { ISI:000378641000047, title = {Policy Based Security Middleware as a Service}, booktitle = {2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD)}, year = {2014}, note = {2nd International Conference on Future Internet of Things and Cloud (FiCloud), Barcelona, SPAIN, AUG 27-29, 2014}, pages = {322-327}, publisher = {IEEE Comp Soc, Tech Comm Internet; IEEE Comp Soc}, organization = {IEEE Comp Soc, Tech Comm Internet; IEEE Comp Soc}, abstract = {Cloud computing is amongst the major topics researched in Computer Science. Cloud computing security is at the heart of the topic. The reason behind this is that, as a technology, cloud computing is a great alternative that allows companies to outsource the management of their computing resources. However, due to the security issues, the cloud technology is not reaching its full potential. In this paper we present a system that allows the enforcement of privacy, accountability, integrity, and availability in each one of cloud computing levels using software policies. We present and describe the architecture of the Policy-Based Security Middleware as a Service.}, isbn = {978-1-4799-4357-9}, doi = {10.1109/FiCloud.2014.57}, author = {Chraibi, Mhammed and Harroud, Hamid and El Khaddar, Mehdia Ajana and Elkoutbi, Mohammed and Maach, Abdelilah} } @conference { ISI:000366666801147, title = {POMDP Game Framework for Service Providers Inciting Mobile Users}, booktitle = {2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)}, series = {IEEE International Conference on Communications}, year = {2014}, note = {IEEE International Conference on Communications (ICC), Sydney, AUSTRALIA, JUN 10-14, 2014}, pages = {1742-1747}, publisher = {IEEE}, organization = {IEEE}, abstract = {The trend today is to access Internet through mobile devices, and people start using smartphones more than computers. This kind of services requires frequent updates through small messages from editors like in social networks. Although the use of such applications is subject to fees and consumes energy from limited batteries of smartphones. If a user activates his mobile device and has a useful contact opportunity with an access point, an update is received at the expense of monetary and energy costs. Thus, users face a tradeoff between such costs and their utilities. The goal of this paper is to show how a user can cope with such a tradeoff, by deriving a threshold policies. We consider the multi-user case, where each user try to maximize its reward based on a bonus given by the provider. We study the optimal policy in the Nash equilibrium. An optimal policy consists of deciding, based on the age of the last message received and the availability of access points whether to activate the mobile device or not. We model our problem using a POMDP with an average reward criterion. The accuracy of our model is illustrated through simulations.}, isbn = {978-1-4799-2003-7}, issn = {1550-3607}, author = {Raiss-el-Fenni, Mohammed and El-Kamili, Mohamed and Ben-Othman, Jalel and Kobbane, Abdellatif}, editor = {Jamalipour, A and Deng, DJ} } @conference {Raiss-El-Fenni20141742, title = {POMDP game framework for service providers inciting mobile users}, booktitle = {2014 IEEE International Conference on Communications, ICC 2014}, year = {2014}, note = {cited By 1}, pages = {1742-1747}, abstract = {The trend today is to access Internet through mobile devices, and people start using smartphones more than computers. This kind of services requires frequent updates through small messages from editors like in social networks. Although the use of such applications is subject to fees and consumes energy from limited batteries of smartphones. If a user activates his mobile device and has a useful contact opportunity with an access point, an update is received at the expense of monetary and energy costs. Thus, users face a tradeoff between such costs and their utilities. The goal of this paper is to show how a user can cope with such a tradeoff, by deriving a threshold policies. We consider the multi-user case, where each user try to maximize its reward based on a bonus given by the provider. We study the optimal policy in the Nash equilibrium. An optimal policy consists of deciding, based on the age of the last message received and the availability of access points whether to activate the mobile device or not. We model our problem using a POMDP with an average reward criterion. The accuracy of our model is illustrated through simulations. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICC.2014.6883574}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84906996789\&doi=10.1109\%2fICC.2014.6883574\&partnerID=40\&md5=d80a5db4123fdf313b32fe7931b128c4}, author = {Raiss-El-Fenni, M.a and El-Kamili, M.a and Ben-Othman, J.b and Kobbane, A.c} } @conference { ISI:000380438500019, title = {Providing Always Best Connected Service in VANET with Complete and Partial Information}, booktitle = {3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES ACSAT 2014}, series = {International Conference on Advanced Computer Science Applications and Technologies}, year = {2014}, note = {3rd International Conference on Advanced Computer Science Applications and Technologies (ACSAT), Amman, JORDAN, DEC 29-30, 2014}, pages = {108-112}, publisher = {Design Sci Renaissance; Unitech; Philadelphia Univ; Patrons Peoamp; Ittihad Univ; Univ Siswa Bangsa Int}, organization = {Design Sci Renaissance; Unitech; Philadelphia Univ; Patrons Peoamp; Ittihad Univ; Univ Siswa Bangsa Int}, abstract = {Mobile communication has become the preferred choice of personal communication today. With the rapid proliferation of wireless network technologies, heterogeneous wireless network environments increase more and more. Such environments provide multiple access networks simultaneously for mobile users. Each mobile user wishes to get connected to Internet using the access technology that best suits his needs at any point in time. Always Best Connected is considered as a special concept for mobile users to select their suitable access networks. In this paper, we have presented two scenarios which are based on Always Best Connected concept to provide, for a smart vehicle moving in a road network installed with multiple access technologies, an always best connected service at any point in time. In the first scenario, we assume that the mobile user (vehicle) has complete information on the road network (all access technologies installed in the road network). Whilst the second scenario is the same as the first one except that the mobile user periodically receives a partial information on the road network (only the access technologies installed in the edges which are immediately accessible by mobile user). For both scenarios, we have proposed a graph model to characterize the observed mobility pattern. Also, two algorithms are proposed to find the optimal path that provides always best connected service for vehicles in both scenarios.}, isbn = {978-1-4799-1845-4}, issn = {2379-7738}, doi = {10.1109/ACSAT.2014.26}, author = {Mabrouk, Abdelfettah and Kobbane, Abdellatif and El Koutbi, Mohammed and Sabir, Essaid} } @article {Baddi20141271, title = {Qos-based parallel GRASP algorithm for RP selection in PIM-SM multicast routing and mobile IPV6}, journal = {International Review on Computers and Software}, volume = {9}, number = {7}, year = {2014}, note = {cited By 2}, pages = {1271-1281}, abstract = {On account the progress of network multimedia technology, more and more real-time multimedia applications arrive with the need to transmit information using multicast IP communication. These applications are more important with arrival of mobile IPv6 protocol with mobile members and require a multicast routing protocol which has packets arriving to members within a specified QoS guaranteed and a quick recovery mechanism. Multicast IP is a bandwidth-conserving technology that reduces traffic by simultaneously delivering a single stream of information to a group members. Internet research community has proposed many multicast routing protocols to support efficient multimedia application, expect that they were developed for multicast parties whose members are topologically stationary. The mobility of multicast receivers or senders may lead to serious problems, when a receiver or sender moves, the quality of full multicast tree may degrade hens multicast datagrams cannot be forwarded efficiently.D2V-RPM (delay and delay variation RP Manager) problem consist of choosing an optimal multicast router in the network as the root of the Shared RP Tree within a specified delay and delay variation bound, and recovering this RP if it{\textquoteright}s off optimal. This NP hard problem needs to be solved through a heuristic algorithm. In this paper we propose a new RP Management algorithm based on PGRAS Procedure. 2DV-PGRASP-RPM selects and recovers the RP by considering cost, delay and delay variation functions and can be easily integrated to bootstrap RP protocol used by PIM-SM protocol. Simulation results show that good performance is achieved in multicast cost. {\textcopyright} 2014 Praise Worthy Prize S.r.l. - All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84907817361\&partnerID=40\&md5=16f80129246fa69d8478a5ac9a1b72fb}, author = {Baddi, Y. and El Kettani, M.D.E.-C.} } @article {Baddi20141, title = {QoS-VNS-CS: QoS constraints core selection algorithm based on variable neighborhood search algorithm}, journal = {International Journal of Communication Networks and Information Security}, volume = {6}, number = {1}, year = {2014}, note = {cited By 0}, pages = {1-10}, abstract = {Within the development of network multimedia technology, more and more real-time multimedia applications arrive with the need to transmit information using multicast communication. Multicast IP routing is an important topic, covering both theoretical and practical interest in different networks layers. In network layer, there are several multicast routing protocols using multicast routing trees different in the literature. However PIM-SM and CBT protocols remain the most used multicast routing protocols; they propose to use a shared Core-based Tree CBT. This kind of tree provides efficient management of multicast path in changing group memberships, scalability and performance. The main problem concerning the construction of a shared tree is to determine the best position of the core. QoS-CS{\textquoteright}s problem (QoS constraints core Selection) consists in choosing an optimal multicast router in the network as core of the Shared multicast Tree (CBT), within specified associated QoS constraints. The choice of this specific router, called RP in PIM-SM protocol and core in CBT protocol, affects the structure of multicast routing tree, and therefore influences performances of both multicast session and routing scheme. QoS-CS is an NP complete problem which needs to be solved through a heuristic algorithm: in this paper, we propose a new core Selection algorithm based on Variable Neighborhood Search algorithm and a new CMP fitness function. Simulation results show that good performance is achieved in multicast cost, end-to-end delay, tree construction delay and others metrics.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84897534138\&partnerID=40\&md5=73da3067effb4bd61ade543527622d12}, author = {Baddi, Y. and Kettani, M.D.-C.E.} } @conference { ISI:000349979900075, title = {A Semantic Approach for Service Adaptation in Context-Aware Environment}, booktitle = {9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC{\textquoteright}14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC{\textquoteright}14) / AFFILIATED WORKSHOPS}, series = {Procedia Computer Science}, volume = {34}, year = {2014}, note = {9th International Conference on Future Networks and Communications (FNC), Niagara Falls, CANADA, AUG 17-20, 2014}, pages = {587-592}, abstract = {With pervasive computing, Service oriented architectures become more mobile and distributed and are executed in varying contexts. Context is understood as any information about the user needs and operating environment which vary dynamically and have an impact on design choices. Context aware Services oriented systems have emerged as an underlying design and development paradigm. An important challenge in such systems is context modeling, reasoning and adaptating services behavior. Using ontologies and semantic web services to deal with context aware services has attracted a lot of interest. In this paper, we present an architecture for the development of context aware services based on ontologies. We highlight our context metamodel and discuss about reasoning process. we also present our semantic approach for service adaptation in context aware environment. (c) 2014 Elsevier B.V.}, issn = {1877-0509}, doi = {10.1016/j.procs.2014.07.077}, author = {Guermah, Hatim and Fissaa, Tarik and Hafiddi, Hatim and Nassar, Mahmoud and Kriouile, Abdelaziz}, editor = {Shakshuki, EM} } @conference { ISI:000346582400027, title = {Stochastic Model Predictive Control for costs optimization in a supply chain under a stochastic demand}, booktitle = {PROCEEDINGS OF 2014 2ND IEEE INTERNATIONAL CONFERENCE ON LOGISTICS AND OPERATIONS MANAGEMENT (GOL 2014)}, year = {2014}, note = {2nd IEEE International Conference on Logistics Operations Management (GOL), Rabat, MOROCCO, JUN 05-07, 2014}, pages = {172-175}, publisher = {IEEE; Mohammed VI Souissi Univ, ENSIAS Sch; Univ Le Havre; Sidi Mohamed Ben Abdellah Univ, FST}, organization = {IEEE; Mohammed VI Souissi Univ, ENSIAS Sch; Univ Le Havre; Sidi Mohamed Ben Abdellah Univ, FST}, abstract = {This paper aims to present a Stochastic Model Predictive Control to optimize the costs of shipping and storage in a supply chain. The goal is to minimize the objective function of the combined costs in a multi-stage and a multi-level supply chain responding to a stochastic multi-product demand. The simulation using Matlab provides a comparison between classical models and the proposed model, and shows that the Affine Recourse Stochastic Model Predictive Control - AR SMPC offers better results.}, isbn = {978-1-4799-4650-1}, author = {Kawtar, Tikito and Said, Achchab and Youssef, Benadada}, editor = {Benadada, Y} } @conference {Kawtar2014171, title = {Stochastic Model Predictive Control for costs optimization in a supply chain under a stochastic demand}, booktitle = {Proceedings of 2nd IEEE International Conference on Logistics Operations Management, GOL 2014}, year = {2014}, note = {cited By 1}, pages = {171-175}, abstract = {This paper aims to present a Stochastic Model Predictive Control to optimize the costs of shipping and storage in a supply chain. The goal is to minimize the objective function of the combined costs in a multi-stage and a multi-level supply chain responding to a stochastic multi-product demand. The simulation using Matlab provides a comparison between classical models and the proposed model, and shows that the Affine Recourse Stochastic Model Predictive Control - AR SMPC offers better results. {\textcopyright} 2014 IEEE.}, doi = {10.1109/GOL.2014.6887436}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84908611786\&doi=10.1109\%2fGOL.2014.6887436\&partnerID=40\&md5=4a6eec4c578041a83cf910609deb9598}, author = {Kawtar, T. and Said, A. and Youssef, B.} } @conference {Sbai20141082, title = {Support for resources changes in configurable process models}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2014}, note = {cited By 1}, pages = {1082-1087}, abstract = {Today, researches on business process models reuse are interested in configurable process modeling which is an important approach for reusing and customizing business process models with a set of process variants. However, enterprises are involved in a competitive environment which imposes them to often evolve their configurable process models in terms of activity, data and resource. So, creating configurable process models becomes insufficient since the configurable process models should evolve to meet new needs. To address this issue, we propose a reusable process patterns system for guiding designers in managing changes and evolution of configurable process models. In this paper, we focus on how to manage resources changes. We present one pattern of our proposed system, the variation point resource insertion process pattern. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICMCS.2014.6911319}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84928751275\&doi=10.1109\%2fICMCS.2014.6911319\&partnerID=40\&md5=c8fd1066a03aedd1bcdb5fedc72a9dec}, author = {Sba{\"\i}, H. and Fredj, M. and Kjiri, L.} } @conference { ISI:000366999600190, title = {Support for resources changes in configurable process models}, booktitle = {2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2014}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, MOROCCO, APR 14-16, 2014}, pages = {1082-1087}, abstract = {Today, researches on business process models reuse are interested in configurable process modeling which is an important approach for reusing and customizing business process models with a set of process variants. However, enterprises are involved in a competitive environment which imposes them to often evolve their configurable process models in terms of activity, data and resource. So, creating configurable process models becomes insufficient since the configurable process models should evolve to meet new needs. To address this issue, we propose a reusable process patterns system for guiding designers in managing changes and evolution of configurable process models. In this paper, we focus on how to manage resources changes. We present one pattern of our proposed system, the variation point resource insertion process pattern.}, isbn = {978-1-4799-3824-7}, author = {Sbai, Hanae and Fredj, Mounia and Kjiri, Laila} } @article {9898253620141001, title = {Supporting collaborative development using process models: a tooled integration-focused approach.}, journal = {Journal of Software: Evolution \& Process}, volume = {26}, number = {10}, year = {2014}, pages = {890 - 909}, abstract = {ABSTRACT Collaboration in software engineering projects is usually intensive and requires adequate support by well-integrated tools. However, process-centered software engineering environments (PSEE) have traditionally been designed to exploit integration facilities in other tools, while offering themselves little to no such facilities. This is in line with the vision of the PSEE as the central orchestrator of project support tools. We argue that this view has hindered the widespread adoption of process-based collaboration support tools by incurring too much adoption and switching costs. We propose a new process-based collaboration support architecture, backed by a process metamodel, that can easily be integrated with existing tools. The proposed architecture revolves around the central concepts of {\textquoteright}deep links{\textquoteright} and {\textquoteright}hooks{\textquoteright}. Our approach is validated by analyzing a collection of open-source projects, and integration utilities based on the implemented process model server have been deve}, keywords = {Client/server computing, collaboration, Computer software, Computer software development, process-support, Software architecture, Software engineering, Switching costs, tool integration}, issn = {20477473}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=98982536\&site=ehost-live}, author = {Kedji, Komlan Akp{\'e}dj{\'e} and Lbath, Redouane and Coulette, Bernard and Nassar, Mahmoud and Baresse, Laurent and Racaru, Florin} } @conference {Bennani201456, title = {A tax-inspired mechanism design to achieve QoS in VMIMO systems: Give to receive!}, booktitle = {IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference}, year = {2014}, note = {cited By 0}, pages = {56-62}, abstract = {In this paper, we model a Virtual MIMO system using a game-theoretic approach. We are interested in the uplink, considering a non-coopertive game, where each user try to satisfy a quality of service. The uplink of a direct-sequence code division multiple access (DS-CDMA) data network is considered and a non-cooperative game is proposed in which users are allowed to choose their uplink receivers as well as to satisfy their quality of service. The utility function used in this framework is defined so that the throughput used by the user is divided into two components: the throughput received from cellular Network, and throughput received from Virtual MIMO System. In addition, this framework is used to study a constrained Nash equilibrium for the proposed game, and the impact of the interaction among users. {\textcopyright} 2014 IEEE.}, doi = {10.1109/IWCMC.2014.6906332}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84908622993\&doi=10.1109\%2fIWCMC.2014.6906332\&partnerID=40\&md5=8f8afb3e0c78e9a74a2e145125d111ac}, author = {Bennani, H.a and Sabir, E.b and Kobbane, A.a and Walid, A.a and Ben-Othman, J.c} } @conference { ISI:000361140000010, title = {A Tax-inspired Mechanism Design to Achieve QoS in VMIMO Systems : Give to Receive !}, booktitle = {2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC)}, series = {International Wireless Communications and Mobile Computing Conference}, year = {2014}, note = {10th International Wireless Communications \& Mobile Computing Conference (IWCMC), Nicosia, CYPRUS, AUG 04-08, 2014}, pages = {56-62}, publisher = {IEEE; IEEE Cyprus Sect; Frederick Univ}, organization = {IEEE; IEEE Cyprus Sect; Frederick Univ}, abstract = {In this paper, we model a Virtual MIMO system using a game-theoretic approach. We are interested in the uplink, considering a non-coopertive game, where each user try to satisfy a quality of service. The uplink of a direct-sequence code division multiple access (DS-CDMA) data network is considered and a non-cooperative game is proposed in which users are allowed to choose their uplink receivers as well as to satisfy their quality of service. The utility function used in this framework is defined so that the throughput used by the user is divided into two components : the throughput received from cellular Network, and throughput received from Virtual MIMO System. In addition, this framework is used to study a constrained Nash equilibrium for the proposed game, and the impact of the interaction among users.}, isbn = {978-1-4799-0959-9}, issn = {2376-6492}, author = {Bennani, Hassan and Sabir, Essaid and Kobbane, Abdellatif and Walid, Abdellaziz and Ben-Othman, Jalel} } @conference {Khtira2014152, title = {Towards a requirement-based approach to support early decisions in software product line engineering}, booktitle = {2014 2nd World Conference on Complex Systems, WCCS 2014}, year = {2014}, note = {cited By 0}, pages = {152-157}, abstract = {During the creation of a software product, the stakeholders have to take a lot of decisions. These decisions are related to the product scope, requirements priority, architecture assumptions, technological issues, etc. In the domain of Software Product Lines, many studies have dealt with decisions taken during the lifetime of the product, but a little attention has been given to the pre-project decisions. The aim of this paper is to propose a requirement-based framework that capitalizes on the specific products already derived from the product line, in order to support the benchmarking of the possible solutions that respond to a customer{\textquoteright}s needs, and to help the stakeholders of a product take decisions concerning the scope of the product and the requirements to implement. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICoCS.2014.7060993}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84988286512\&doi=10.1109\%2fICoCS.2014.7060993\&partnerID=40\&md5=d227ca52b5793a11500365eb9248052c}, author = {Khtira, A. and Benlarabi, A. and El Asri, B.} } @conference { ISI:000380387700116, title = {Towards a Requirement-Based Approach to Support Early Decisions in Software Product Line Engineering}, booktitle = {2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS)}, year = {2014}, note = {2014 Second World Conference on Complex Systems (WCCS), Agadir, MOROCCO, NOV 10-12, 2014}, pages = {152-157}, publisher = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, organization = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, abstract = {During the creation of a software product, the stakeholders have to take a lot of decisions. These decisions are related to the product scope, requirements priority, architecture assumptions, technological issues, etc. In the domain of Software Product Lines, many studies have dealt with decisions taken during the lifetime of the product, but a little attention has been given to the pre-project decisions. The aim of this paper is to propose a requirement-based framework that capitalizes on the specific products already derived from the product line, in order to support the benchmarking of the possible solutions that respond to a customer{\textquoteright}s needs, and to help the stakeholders of a product take decisions concerning the scope of the product and the requirements to implement.}, isbn = {978-1-4799-4647-1}, author = {Khtira, Amal and Benlarabi, Anissa and El Asri, Bouchra} } @conference { ISI:000366999600174, title = {Towards an Ontology based Architecture for Context-Aware Services Composition}, booktitle = {2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2014}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, MOROCCO, APR 14-16, 2014}, pages = {990-995}, abstract = {An important challenge in pervasive computing environments is to automatically enable software applications by dynamically composing services. Service composition is a way to plan a business process to fulfill business goals that cannot be achieved by individual business services. Given a representation of services in OWL-S, service composition can be modeled as an Artificial Intelligence planning (AI planning) problem. Based on the initial context and the goal context, planning-based service composition launches a goal-oriented composition procedure to generate a plan for the service composition. In this paper, we present an overview of the architecture for the composition of context aware services based on ontologies, we also present our Composition Planner that allows to generate a plan corresponding to the request of the users according to their context.}, isbn = {978-1-4799-3824-7}, author = {Fissaa, Tarik and Guermah, Hatim and Hafiddi, Hatim and Nassar, Mahmoud and Kriouile, Abdelaziz} } @conference { ISI:000380387700080, title = {Towards Flexible and Reusable SaaS for Multi-tenancy To design, implement and bind multi-functional variability for Rich-Variant services}, booktitle = {2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS)}, year = {2014}, note = {2014 Second World Conference on Complex Systems (WCCS), Agadir, MOROCCO, NOV 10-12, 2014}, pages = {164-170}, publisher = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, organization = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, abstract = {Software-as-a-Service (SaaS) is a new delivery model, that involves providing applications to the customer on demand over the Internet. SaaS promotes multi-tenancy as a tool to exploit economies of scale. However, the flexibility of an application to be adapted to individual tenant{\textquoteright}s needs is a major requirement. Thus, we initiate in this paper to an approach proposing a more flexible and reusable SaaS system for multitenancy. This approach consist on integrating a functional variability using Rich-Variant Components with a deployment variability enabling the customers to choose with which others tenants they want or don{\textquoteright}t want to share instances. The approach presented enables exploiting the economies of scale while avoiding the problem of customers{\textquoteright} hesitation about sharing with other tenants.}, isbn = {978-1-4799-4647-1}, author = {Kriouile, Houda and El Asri, Bouchra and El Haloui, M{\textquoteright}barek} } @conference {Benaija2014447, title = {Trade off between risk management, value creation and strategic alignment in project portfolio management}, booktitle = {ICEIS 2014 - Proceedings of the 16th International Conference on Enterprise Information Systems}, volume = {3}, year = {2014}, note = {cited By 0}, pages = {447-452}, abstract = {Projects portfolio management allows the company to select, prioritize, integrate, manage and check its projects in a multi project context. In this paper, we consider a very important part of the projects portfolio management namely the selection of projects. Indeed, the greatest challenge for managers today is to be sure that the projects initiated achieve the strategic and financial objectives of the company. Our paper proposes a framework for project selection based on three main criteria: value creation, risk management and alignment with the business strategy. After a brief review of the literature regarding the basic concepts used, we propose bivariate analyses: risk-value, risk-alignment and value-alignment. Our contribution in this paper is to design a framework that realizes the trade-off between the three criteria.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84902322001\&partnerID=40\&md5=92cfe2c0cd837f2b4a950d074a5e671a}, author = {Benaija, K. and Kjiri, L.} } @conference {Bennani201477, title = {Virtual MIMO systems: A game theoretical approach}, booktitle = {WCCCS 2014 - Proceedings; 2014 5th Workshop on Codes, Cryptography and Communication Systems}, year = {2014}, note = {cited By 0}, pages = {77-80}, abstract = {In this work, we present a new game theoretic approach in order to build a Virtual MIMO system. The utility function used in this framework is defined so that the user throughput is divided into two components: the real, received by the base station, and the virtual throughput received by the neighboring users. A non-cooperative game is proposed where each user are allowed to choose its uplink receiver as well as to maximize its utility function. Simulation results validate our model and and illustrate numerically the proposed scheme under different scenarios. {\textcopyright} 2014 IEEE.}, doi = {10.1109/WCCCS.2014.7107924}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84983134494\&doi=10.1109\%2fWCCCS.2014.7107924\&partnerID=40\&md5=7908ed0bd120abe099e5dea1bce6962f}, author = {Bennani, H.a and Sabir, E.b and Kobbane, A.a and El Koutbi, M.a} } @conference { ISI:000350287800023, title = {An approach using Intertextual Distance to detect Web Messages Authors}, booktitle = {2013 3RD INTERNATIONAL SYMPOSIUM ISKO-MAGHREB}, year = {2013}, note = {ISKO-Maghreb 3rd International Symposium, Marrakech, MOROCCO, NOV 08-09, 2013}, publisher = {ISKO}, organization = {ISKO}, abstract = {Our objective in this paper is to propose an approach capable of detecting authors of web messages based on specific vocabulary and Intertextual distance. Focus in the present work is on comparing the most popular distances using in the field of authorship detection namely Delta Rule, chi-square distance and Kullback-Leibler Divergence.}, isbn = {978-1-4799-3392-1}, author = {El Manar El Bouanani, Sara and Kassou, Ismail} } @conference {ManarElBouanani2013, title = {An approach using intertextual distance to detect web messages authors}, booktitle = {2013 3rd International Symposium ISKO-Maghreb}, year = {2013}, note = {cited By 0}, abstract = {Our objective in this paper is to propose an approach capable of detecting authors of web messages based on specific vocabulary and Intertextual distance. Focus in the present work is on comparing the most popular distances using in the field of authorship detection namely Delta Rule, chi-square distance and Kullback-Leibler Divergence. {\textcopyright} 2013 IEEE.}, doi = {10.1109/ISKO-Maghreb.2013.6728130}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84894116721\&doi=10.1109\%2fISKO-Maghreb.2013.6728130\&partnerID=40\&md5=8d06efee89428887463c60388b59a295}, author = {Manar El Bouanani, S.E. and Kassou, I.} } @conference { ISI:000341079600096, title = {Context Extraction from Reviews for Context Aware Recommendation Using Text Classification Techniques}, booktitle = {2013 ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA)}, year = {2013}, note = {IEEE and Arab-Computing-Society (ACS) International Conference on Computer Systems and Applications (AICCSA), Al Akhawayn Univ, Ifrane, MOROCCO, MAY 27-30, 2013}, publisher = {IEEE; Arab Comp Soc}, organization = {IEEE; Arab Comp Soc}, abstract = {In this paper, we investigate the use of Text Classification techniques to extract contextual information from user reviews for Context Aware Recommendation. We conduct several experiments to identify the best Text Representation settings and the best classification algorithm for our dataset. We carry out our experiments on hotel reviews. We focus on extracting the trip type, as contextual information, from these reviews. Results show that the Naive Bayes classifier yields the best results with up to 72.2\% in terms of F1-measure. To extract context from user reviews with text classification techniques, we recommend to use raw text rather than employing stemming, to use the normalized frequency based weighting rather than the presence based one, to remove terms that occur once in the data set, and to combine unigrams, bigrams and trigrams.}, isbn = {978-1-4799-0792-2}, author = {Lahlou, Fatima Zahra and Benbrahimand, Houda and Mountassir, Asmaa and Kassou, Ismail} } @conference {Lahlou2013, title = {Context extraction from reviews for Context Aware Recommendation using Text Classification techniques}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, year = {2013}, note = {cited By 0}, abstract = {In this paper, we investigate the use of Text Classification techniques to extract contextual information from user reviews for Context Aware Recommendation. We conduct several experiments to identify the best Text Representation settings and the best classification algorithm for our dataset. We carry out our experiments on hotel reviews. We focus on extracting the trip type, as contextual information, from these reviews. Results show that the Na{\"\i}ve Bayes classifier yields the best results with up to 72.2\% in terms of F1-measure. To extract context from user reviews with text classification techniques, we recommend to use raw text rather than employing stemming, to use the normalized frequency based weighting rather than the presence based one, to remove terms that occur once in the data set, and to combine unigrams, bigrams and trigrams. {\textcopyright} 2013 IEEE.}, doi = {10.1109/AICCSA.2013.6616512}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84887248381\&doi=10.1109\%2fAICCSA.2013.6616512\&partnerID=40\&md5=efcaf96161103c978184c9ad286a22cd}, author = {Lahlou, F.Z. and Benbrahimand, H. and Mountassir, A. and Kassou, I.} } @conference {Guermah2013, title = {Context modeling and reasoning for building context aware services}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, year = {2013}, note = {cited By 1}, abstract = {The rapid evolution of software paradigms, wireless technologies and mobile devices induced the emergence of new applications called context-aware services oriented applications. Such applications provide appropriate services or relevant information to the user or other applications to perform a specific task. An important challenge in such applications development process is context modeling and reasoning. Ontology based models presents the most promising instrument for context modeling and offers possibility of applying ontology reasoning techniques. the aim of context reasoning is converting low-level context to highlevel context in order to provide costumized services to users. In this paper, we present an architecture for the development of context aware services based on ontologies. We also highlight our context metamodel and discuss about reasoning process for e-health systems. {\textcopyright} 2013 IEEE.}, doi = {10.1109/AICCSA.2013.6616439}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84887225025\&doi=10.1109\%2fAICCSA.2013.6616439\&partnerID=40\&md5=7ca7da696e2d53b254ab9b4b909c71e7}, author = {Guermah, H.a and Fissaa, T.a and Hafiddi, H.a b and Nassar, M.a and Kriouile, A.a} } @conference { ISI:000341079600025, title = {Context Modeling and Reasoning for building Context Aware Services}, booktitle = {2013 ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA)}, year = {2013}, note = {IEEE and Arab-Computing-Society (ACS) International Conference on Computer Systems and Applications (AICCSA), Al Akhawayn Univ, Ifrane, MOROCCO, MAY 27-30, 2013}, publisher = {IEEE; Arab Comp Soc}, organization = {IEEE; Arab Comp Soc}, abstract = {The rapid evolution of software paradigms, wireless technologies and mobile devices induced the emergence of new applications called context-aware services oriented applications. Such applications provide appropriate services or relevant information to the user or other applications to perform a specific task. An important challenge in such applications development process is context modeling and reasoning. Ontology based models presents the most promising instrument for context modeling and offers possibility of applying ontology reasoning techniques. the aim of context reasoning is converting low-level context to high-level context in order to provide costumized services to users. In this paper, we present an architecture for the development of context aware services based on ontologies. We also highlight our context metamodel and discuss about reasoning process for e-health systems.}, isbn = {978-1-4799-0792-2}, author = {Guermah, Hatim and Fissaa, Tarik and Hafiddi, Hatim and Nassar, Mahmoud and Kriouile, Abdelaziz} } @conference {Sabir2013, title = {Design of an annular ring Ferry-assisted topology for Wireless Sensor Networks}, booktitle = {Proceedings of 2013 6th Joint IFIP Wireless and Mobile Networking Conference, WMNC 2013}, year = {2013}, note = {cited By 0}, abstract = {To ensure connectivity in highly sparse Wireless Sensor Networks (WSNs), we consider a Ferry-assisted Wireless Sensor Network (FWSN). In our FWSN, message ferries moving along concentric annulus collect the static sensors generated packets and propagate them throughout a ferry-to-ferry forwarding schema to the sink. Moreover, a ferry may embed a sensor and then could be assimilated to a mobile sensor node generating its own data. We provide a mathematical framework based on queuing theory to model the network and analyze its performances in terms of end-to-end throughput. Some of our findings are the characterization of the forwarding queues{\textquoteright} stability and the average end-to-end throughput as well. At stability, we notice a special feature where the average end-to-end throughput becomes independent of the choice of the weighted fair queuing. {\textcopyright} 2013 IEEE.}, doi = {10.1109/WMNC.2013.6548984}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84881399979\&doi=10.1109\%2fWMNC.2013.6548984\&partnerID=40\&md5=db7991dded90e289f75582cf59d1e214}, author = {Sabir, E.a and Kobbane, A.b and Koulali, M.-A.c and Erradi, M.b} } @conference {Machhour2013, title = {Dynamic text classifier based on search engine features}, booktitle = {2013 3rd International Symposium ISKO-Maghreb}, year = {2013}, note = {cited By 0}, abstract = {Search engines and text categorization are two research areas almost inseparable. Where one is studied, the other is referred sooner or later. Automatic text categorization became more important with the enormous increase of the online information, and text classifiers are often there to help search engines classify indexed documents. The main idea presented in this paper consists of using a search engine as a text classifier. A search engine can take advantage of its scoring performances to categorize a new document without requiring building and using other categorization model. K Nearest Neighbors (KNN) principal based on search engine score as similarity measure was used. This approach is highly dependent on the scoring quality of the used search engine. It is a simple approach but can be competitive to other more complex categorization models. Also, this method is useful as a kind of categorization on the fly when indexing a new document. Through its evolving index, the search engine becomes a dynamic classifier of the fact that any document, recently joining the index, participate in the categorization of other new documents. {\textcopyright} 2013 IEEE.}, doi = {10.1109/ISKO-Maghreb.2013.6728125}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84894172340\&doi=10.1109\%2fISKO-Maghreb.2013.6728125\&partnerID=40\&md5=234e95731bc6177558b03187a1c03083}, author = {Machhour, H. and Kassou, I.} } @conference { ISI:000350287800019, title = {Dynamic Text Classifier based on Search Engine Features}, booktitle = {2013 3RD INTERNATIONAL SYMPOSIUM ISKO-MAGHREB}, year = {2013}, note = {ISKO-Maghreb 3rd International Symposium, Marrakech, MOROCCO, NOV 08-09, 2013}, publisher = {ISKO}, organization = {ISKO}, abstract = {Search engines and text categorization are two research areas almost inseparable. Where one is studied, the other is referred sooner or later. Automatic text categorization became more important with the enormous increase of the online information, and text classifiers are often there to help search engines classify indexed documents. The main idea presented in this paper consists of using a search engine as a text classifier. A search engine can take advantage of its scoring performances to categorize a new document without requiring building and using other categorization model. K Nearest Neighbors (KNN) principal based on search engine score as similarity measure was used. This approach is highly dependent on the scoring quality of the used search engine. It is a simple approach but can be competitive to other more complex categorization models. Also, this method is useful as a kind of categorization on the fly when indexing a new document. Through its evolving index, the search engine becomes a dynamic classifier of the fact that any document, recently joining the index, participate in the categorization of other new documents.}, isbn = {978-1-4799-3392-1}, author = {Machhour, Hamid and Kassou, Ismail} } @article {Choukri2013, title = {Efficient heuristic based on clustering approach for OLSR}, journal = {Journal of Computer Networks and Communications}, volume = {2013}, year = {2013}, note = {cited By 2}, abstract = {Due to the dynamic nature of mobile ad hoc network (MANET), the quality of service (QoS) requires several improvements. The present papercomeswithin the framework of research to optimize QoS in MANET. In this paper, we propose a novel version of OLSR based on the clustering approach which is inspired from Lin and Chu heuristic and adapted to beimplemented inOLSR. We studied its stability and we compared its performances to those of standard OLSR. The metrics we used in evaluating network performances were average end-to-end delay, control routing overhead, and packet delivery ratio. Experimental results show that our alternative significantly reduces the traffic reserved to monitoring the network, which positively influences other performances such as throughput, delay, and loss. {\textcopyright} 2013 Ali Choukri et al.}, doi = {10.1155/2013/597461}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84877308430\&doi=10.1155\%2f2013\%2f597461\&partnerID=40\&md5=3aa67a9fc125b4b786e82c243f57c7bc}, author = {Choukri, A.a and Habbani, A.a b and El Koutbi, M.a} } @article {9467097620130101, title = {Efficient Heuristic Based on Clustering Approach for OLSR.}, journal = {Journal of Computer Networks \& Communications}, year = {2013}, pages = {1 - 7}, abstract = {Due to the dynamic nature of mobile ad hoc network (MANET), the quality of service (QoS) requires several improvements. The present paper comes within the framework of research to optimize QoS in MANET. In this paper, we propose a novel version of OLSR based on the clustering approach which is inspired from Lin and Chu heuristic and adapted to be implemented in OLSR. We studied its stability and we compared its performances to those of standard OLSR. The metrics we used in evaluating network performances were average end-to-end delay, control routing overhead, and packet delivery ratio. Experimental results show that our alternative significantly reduces the traffic reserved to monitoring the network, which positively influences other performances such as throughput, delay, and loss. [ABSTRACT FROM AUTHOR]}, keywords = {Ad hoc networks (Computer networks), Document clustering, Heuristic algorithms, Internet traffic, Performance evaluation, Quality of service, Routing (Computer network management)}, issn = {20907141}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=94670976\&site=ehost-live}, author = {Choukri, Ali and Habbani, Ahmed and Koutbi, Mohamed El.} } @conference {Harbouche201344, title = {A flexible wireless body sensor network system for health monitoring}, booktitle = {Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE}, year = {2013}, note = {cited By 3}, pages = {44-49}, abstract = {The Wireless Body Sensor Network (WBSN) is a wireless network used for communication among sensor nodes operating on or inside the human body in order to monitor vital body parameters and movements. The design and the development of such systems for health monitoring have gained a lot of attention recently in both the research and the industry. Mainly motivated by the increasing of healthcare costs and propelled by the recent advances in the development of miniature health monitoring devices. This paper presents a preventive health care system with a flexible design. By using sensors nodes in combination with a mobile data collector, both daily continuous monitoring as well as specific controls are provided. In this work, we propose a system based on an architecture with heterogeneous nodes to provide continuous monitoring. A model has been defined to describe the system global behavior. An important aspect of this work is that we propose a model driven (MDE) approach to derive the behavior of each node in the network from the system global behavior. The derived behaviors include the synchronization messages to ensure the global coordination among the system components. {\textcopyright} 2013 IEEE.}, doi = {10.1109/WETICE.2013.17}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883508266\&doi=10.1109\%2fWETICE.2013.17\&partnerID=40\&md5=1a5fad127161b3ce2aa9c892e0441504}, author = {Harbouche, A.a and Erradi, M.b and Kobbane, A.b} } @conference {Lethrech2013, title = {A generic metamodel for adaptable service oriented systems modeling using DSM approach}, booktitle = {2013 3rd International Symposium ISKO-Maghreb}, year = {2013}, note = {cited By 0}, abstract = {CAC (context aware computing) has recently emerged as a new computing paradigm promising adaptable systems development. Context awareness for services oriented systems (SOS) raises many challenges. Particularly, the challenge of engineering such systems which consists of the definition of modeling approaches, processes, techniques and tools to facilitate construction of these systems. In this paper, we propose a generic metamodel for Adaptable, Domain Specific and Service Oriented Systems. Our metamodel aims to facilitate the creation of Domain Specific Language (DSL) for adaptable and service oriented architecture. For a specific domain the language developer must produce their specific service metamodel based on our generic service metamodel. {\textcopyright} 2013 IEEE.}, doi = {10.1109/ISKO-Maghreb.2013.6728120}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84894115518\&doi=10.1109\%2fISKO-Maghreb.2013.6728120\&partnerID=40\&md5=b73bcb5b1c16fdba7c60512808a95537}, author = {Lethrech, M.a and Elmagrouni, I.a and Nassar, M.a and Kriouile, A.a and Kenzi, A.b} } @conference { ISI:000350287800014, title = {A Generic Metamodel for Adaptable Service Oriented Systems Modeling using DSM Approach}, booktitle = {2013 3RD INTERNATIONAL SYMPOSIUM ISKO-MAGHREB}, year = {2013}, note = {ISKO-Maghreb 3rd International Symposium, Marrakech, MOROCCO, NOV 08-09, 2013}, publisher = {ISKO}, organization = {ISKO}, abstract = {CAC (context aware computing) has recently emerged as a new computing paradigm promising adaptable systems development. Context awareness for services oriented systems (SOS) raises many challenges. Particularly, the challenge of engineering such systems which consists of the definition of modeling approaches, processes, techniques and tools to facilitate construction of these systems. In this paper, we propose a generic metamodel for Adaptable, Domain Specific and Service Oriented Systems. Our metamodel aims to facilitate the creation of Domain Specific Language (DSL) for adaptable and service oriented architecture. For a specific domain the language developer must produce their specific service metamodel based on our generic service metamodel.}, isbn = {978-1-4799-3392-1}, author = {Lethrech, M. and Elmagrouni, I. and Nassar, M. and Kriouile, A. and Kenzi, A.} } @article {Loutfi20131793, title = {Impact of mobility and density on a cross-layer architecture for wireless sensor networks}, journal = {International Review on Computers and Software}, volume = {8}, number = {8}, year = {2013}, note = {cited By 2}, pages = {1793-1800}, abstract = {In this paper, we are interested in the service differentiation for real-time and besteffort traffics in wireless sensor networks. We present a new model that takes into account a random access in the MAC layer and a forwarding probability formulation at the network layer. We propose an approach (based on transmissions cycle) to derive the throughput of multi-hop routes and to estimate the stability of forwarding queues for real-time and best-effort traffics. We study the impact of some metric parameters: density, hop count, time, velocity and Mobility Models on the quality of service (QoS) of the studied system. In this paper, we have studied the impact these parameters on the QoS of a Wireless Sensor Network (WSN) where all nodes have a single destination (sink node). As results, we notice that the transmission probability Pi of the realtime and best-effort traffics have a great impact on the average throughput and we have also shown the correlation between the throughput and all metrics studied except for the hop count metric of best-effort streams. {\textcopyright} 2013 Praise Worthy Prize S.r.l. - All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84885905918\&partnerID=40\&md5=f268623b57af67104dfe63c50ea5413d}, author = {Loutfi, A. and El Koutbi, M.} } @conference {Machhour201367, title = {Improving text categorization: A fully automated ontology based approach}, booktitle = {2013 3rd International Conference on Communications and Information Technology, ICCIT 2013}, year = {2013}, note = {cited By 1}, pages = {67-72}, abstract = {This paper presents an improvement of text categorization models by document annotation with previously imported ontologies. A fully automated algorithm will be introduced to annotate plain text documents. Simple strategies combining annotation results with the categorization models are also presented and experienced. Conducted experiments present an improvement of tested categorization models when mixed with the annotation results. {\textcopyright} 2013 IEEE.}, doi = {10.1109/ICCITechnology.2013.6579524}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883898536\&doi=10.1109\%2fICCITechnology.2013.6579524\&partnerID=40\&md5=2216baabb84bdd7324b7ec625a4eba68}, author = {Machhour, H. and Kassou, I.} } @conference { ISI:000331269900013, title = {Improving text categorization A fully automated ontology based approach}, booktitle = {2013 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND INFORMATION TECHNOLOGY (ICCIT)}, series = {International Conference on Communications and Information Technology}, year = {2013}, note = {3rd International Conference on Communications and Information Technology (ICCIT), Beirut, LEBANON, JUN 19-21, 2013}, pages = {67-72}, abstract = {This paper presents an improvement of text categorization models by document annotation with previously imported ontologies. A fully automated algorithm will be introduced to annotate plain text documents. Simple strategies combining annotation results with the categorization models are also presented and experienced. Conducted experiments present an improvement of tested categorization models when mixed with the annotation results.}, isbn = {978-1-4673-5307-6; 978-1-4673-5306-9}, issn = {2329-6372}, author = {Machhour, Hamid and Kassou, Ismail} } @conference {Baddi2013, title = {Key management for secure multicast communication: A survey}, booktitle = {2013 National Security Days - 3eme Edition Des Journees Nationales de Securite, JNS3}, year = {2013}, note = {cited By 0}, abstract = {Multicast IP communication is increasingly used as an efficient large-scale communication mechanism for one-to-many and many-to-many communication applications on the Internet. Success of such communication mode has required the development and integration of security mechanisms. The main problem in securing a multicast session is the key management group. Membership in a multicast group is dynamic, allowing hosts to enter and leave the multicast session without the permission or knowledge of other hosts making it susceptible to attack unless they are secured. This paper addresses issues relevant to implementing security for IP multicast networks including issues of group membership and key distribution, and principally, several keying architectures are evaluated and compared to determine their strengths and weaknesses. {\textcopyright} 2013 IEEE.}, doi = {10.1109/JNS3.2013.6595453}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84884767620\&doi=10.1109\%2fJNS3.2013.6595453\&partnerID=40\&md5=f1f8418f0f0372885a1ac69ef47bb7f2}, author = {Baddi, Y. and Ech-Cherif El Kettani, M.D.} } @conference { ISI:000327787500001, title = {Key Management for Secure Multicast Communication: A Survey}, booktitle = {2013 NATIONAL SECURITY DAYS (JNS3)}, year = {2013}, note = {3rd National Security Days (JNS), Mohammed V Souissi Unvi, Rabat, MOROCCO, APR 26-27, 2013}, publisher = {Assoc Marocaine ConfiAnace Numerique; Ecole Nationale Superieure Informatique \& Analyse Syst; Informat Secur Res Team; IEEE Morocco Sect; Bank Al Maghrib; Natl Ctr Sci \& Technol Res}, organization = {Assoc Marocaine ConfiAnace Numerique; Ecole Nationale Superieure Informatique \& Analyse Syst; Informat Secur Res Team; IEEE Morocco Sect; Bank Al Maghrib; Natl Ctr Sci \& Technol Res}, abstract = {Multicast IP communication is increasingly used as an efficient large-scale communication mechanism for one-to-many and many-to-many communication applications on the Internet. Success of such communication mode has required the development and integration of security mechanisms. The main problem in securing a multicast session is the key management group. Membership in a multicast group is dynamic, allowing hosts to enter and leave the multicast session without the permission or knowledge of other hosts making it susceptible to attack unless they are secured. This paper addresses issues relevant to implementing security for IP multicast networks including issues of group membership and key distribution, and principally, several keying architectures are evaluated and compared to determine their strengths and weaknesses.}, isbn = {978-1-4799-0324-5}, author = {Baddi, Youssef and Ech-Cherif El Kettani, Mohamed Dafir} } @conference {Oufkir2013, title = {Linking knowledge management valuation to intellectual capital: A conceptual study}, booktitle = {2013 3rd International Symposium ISKO-Maghreb}, year = {2013}, note = {cited By 0}, abstract = {Knowledge management (KM) and intellectual capital (IC) are two big research questions in nowadays management topics. In fact, the relation between these two subjects varies from analogy to complementarity. Defining these concepts remains for long years a controversy, because both topics imply different disciplines. And despite the multidisciplinary of the field, it is agreed that KM treats both knowledge as an object, and management as a set of tools and techniques. The association between these two aspects is the essence of KM. Whereas with the IC, the focus is much on the effect and value generated by the intellectual asset, which implies a notion of valuation and measurement. The relationship between concepts of IC and KM needs to be redefined in view of field progress. In our paper, we assume that {\textquoteright}IC is suited to KM valuation and performance measurement{\textquoteright}: a conceptual review of the literature within this work should give foundation to this hypothesis. Further foreseen analytical verification may empower it to be a basic rule on the design of future KM valuation indicators. {\textcopyright} 2013 IEEE.}, doi = {10.1109/ISKO-Maghreb.2013.6728169}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84894168406\&doi=10.1109\%2fISKO-Maghreb.2013.6728169\&partnerID=40\&md5=3992beae3e503b5072db3383bfbbc6e8}, author = {Oufkir, L.a and Fredj, M.b and Kassou, I.b} } @conference { ISI:000350287800033, title = {Linking Knowledge Management Valuation to Intellectual Capital: a conceptual study}, booktitle = {2013 3RD INTERNATIONAL SYMPOSIUM ISKO-MAGHREB}, year = {2013}, note = {ISKO-Maghreb 3rd International Symposium, Marrakech, MOROCCO, NOV 08-09, 2013}, publisher = {ISKO}, organization = {ISKO}, abstract = {Knowledge management (KM) and intellectual capital (IC) are two big research questions in nowadays management topics. In fact, the relation between these two subjects varies from analogy to complementarity. Defining these concepts remains for long years a controversy, because both topics imply different disciplines. And despite the multidisciplinary of the field, it is agreed that KM treats both knowledge as an object, and management as a set of tools and techniques. The association between these two aspects is the essence of KM. Whereas with the IC, the focus is much on the effect and value generated by the intellectual asset, which implies a notion of valuation and measurement. The relationship between concepts of IC and KM needs to be redefined in view of field progress. In our paper, we assume that {\textquoteleft}{\textquoteleft}IC is suited to KM valuation and performance measurement{{\textquoteright}{\textquoteright}}: a conceptual review of the literature within this work should give foundation to this hypothesis. Further foreseen analytical verification may empower it to be a basic rule on the design of future KM valuation indicators.}, isbn = {978-1-4799-3392-1}, author = {Oufkir, Latifa and Fredj, Mounia and Kassou, Ismail} } @conference { ISI:000327787500016, title = {Mean field game among cloud computing end users}, booktitle = {2013 NATIONAL SECURITY DAYS (JNS3)}, year = {2013}, note = {3rd National Security Days (JNS), Mohammed V Souissi Unvi, Rabat, MOROCCO, APR 26-27, 2013}, publisher = {Assoc Marocaine ConfiAnace Numerique; Ecole Nationale Superieure Informatique \& Analyse Syst; Informat Secur Res Team; IEEE Morocco Sect; Bank Al Maghrib; Natl Ctr Sci \& Technol Res}, organization = {Assoc Marocaine ConfiAnace Numerique; Ecole Nationale Superieure Informatique \& Analyse Syst; Informat Secur Res Team; IEEE Morocco Sect; Bank Al Maghrib; Natl Ctr Sci \& Technol Res}, abstract = {The rapid development of Internet has given birth to a new business model: Cloud Computing. This new paradigm has experienced a fantastic rise in recent years and is in constat growth. The cloud computing is large distributed systems that employ distributed resources to deliver a service to end users using several technologies. the cloud commputing has become increasingly complex by the fact that it is uses several techiques. In this paper we propose a game theoretic framework for cloud computing end usere which interact through the response time provided by the system and decide willingly to regulate their load to act in steady state. Because the users of a such system generally large, the game will be studied in the scope of mean field game.}, isbn = {978-1-4799-0324-5}, author = {Khiyaita, A. and Zbakh, M.} } @conference {Khiyaita2013, title = {Mean field game among cloud computing end users}, booktitle = {2013 National Security Days - 3eme Edition Des Journees Nationales de Securite, JNS3}, year = {2013}, note = {cited By 0}, abstract = {The rapid development of Internet has given birth to a new business model: Cloud Computing. This new paradigm has experienced a fantastic rise in recent years and is in constant growth. The cloud computing is large distributed systems that employ distributed resources to deliver a service to end users using several technologies. the cloud computing has become increasingly complex by the fact that it uses several techniques. In this paper we propose a game theoretic framework for cloud computing end users which interact through the response time provided by the system and decide willingly to regulate their load to act in steady state. Because the users of a such system generally large, the game will be studied in the scope of mean field game. {\textcopyright} 2013 IEEE.}, doi = {10.1109/JNS3.2013.6595472}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84884809764\&doi=10.1109\%2fJNS3.2013.6595472\&partnerID=40\&md5=4d4fa525285c9e3e02014b71dd044004}, author = {Khiyaita, A. and Zbakh, M.} } @conference { ISI:000351846000018, title = {A new Cross layer Architecture for Service Differentiation in Wireless Sensor Networks}, booktitle = {2013 IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS (MICC)}, year = {2013}, note = {IEEE 11th Malaysia International Conference on Communications (MICC), Kuala Lumpur, MALAYSIA, NOV 26-28, 2013}, pages = {92-97}, publisher = {IEEE}, organization = {IEEE}, abstract = {This paper describes a new cross-layer architecture that supports service differentiation in Wireless Sensor Networks (WSN). In WSNs, sensor nodes are supposed to communicate using a random access method. We propose a mathematical model that combines parameters form network and MAC layers. We aim to estimate and to enhance the throughput of multi-hop WSNs and the stability of the forwarding queues used for real-time and best-effort traffic. We suppose in this paper that we have one single sink in the WSN and we study the impact of the probability of transmitting (real-time and best-effort traffic), density of sensor and hop count on the end-to-end throughput.}, isbn = {978-1-4799-1532-3}, author = {Loutfi, Ahmed and Mohamed, Senhadji and Sabir, Essaid and Kobbane, Abdellatif and El Koutbi, Mohammed} } @conference { ISI:000350287800027, title = {Ontology based Context Aware e-Learning System}, booktitle = {2013 3RD INTERNATIONAL SYMPOSIUM ISKO-MAGHREB}, year = {2013}, note = {ISKO-Maghreb 3rd International Symposium, Marrakech, MOROCCO, NOV 08-09, 2013}, publisher = {ISKO}, organization = {ISKO}, abstract = {With the fast development of e-services and the necessity to use information provided by users and their operating environments, Context-Aware Service (CAS) has emerged as a new paradigm of software engineering to dynamically respond to every change in the status of the user{\textquoteright}s context. Context-aware Service can dynamically capture a range of information from its environment and this information represents a context, the application adapts its execution according to this context. An important challenge in ubiquitous computing is context modeling. Ontology based models presents a suitbale instrument for context modeling. In this paper, we provide an architecture for the development of context aware services for an e-learning system, we also present our context metamodel and how the use of ODM (Ontology Definition Metamodel) can be beneficial for ontology modeling.}, isbn = {978-1-4799-3392-1}, author = {Guermah, Hatim and Fissaa, Tarik and Hafiddi, Hatim and Nassar, Mahmoud and Kriouile, Abdelaziz} } @conference { ISI:000345618100007, title = {Ontology based Context Modeler for Context-Aware Systems}, booktitle = {2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED COMPUTING AND APPLICATIONS (SOCA)}, year = {2013}, note = {6th IEEE International Conference on Service-Oriented Computing and Applications (SOCA), Kauai, HI, DEC 16-18, 2013}, pages = {43-47}, publisher = {IEEE; Intel NTU Connected Context Comp Ctr; Tongji Univ; IEEE Comp Soc Tech Comm Business Informat \& Syst}, organization = {IEEE; Intel NTU Connected Context Comp Ctr; Tongji Univ; IEEE Comp Soc Tech Comm Business Informat \& Syst}, abstract = {In ubiquitous computing, context-aware service oriented systems refer to applications that use so-called contextual information to provide appropriate services or relevant information to the user or other applications to perform a specific task. An important challenge in such applications is context modeling, using ontologies to model context information and to reason about context at a semantic level has attracted a lot of interest in the research community. However, most of the presented approaches do not usually take into account any software engineering method. Therefore, employing standard approaches to formulate the development process becomes of importance. In this paper, we present an overview of the architecture for the development of context aware services based on ontologies, we also present our context modeler based on ODM (Ontology Definition Metamodel) and model transformations that allows to generate an OWL ontology representing context information.}, isbn = {978-1-4799-2701-2}, doi = {10.1109/SOCA.2013.58}, author = {Fissaa, Tarik and Guermah, Hatim and Hafiddi, Hatim and Nassar, Mahmoud and Kriouile, Abdelaziz} } @conference {Fissaa201343, title = {Ontology based context modeler for context-aware systems}, booktitle = {Proceedings - IEEE 6th International Conference on Service-Oriented Computing and Applications, SOCA 2013}, year = {2013}, note = {cited By 0}, pages = {43-47}, abstract = {In ubiquitous computing, context-aware service oriented systems refer to applications that use so-called contextual information to provide appropriate services or relevant information to the user or other applications to perform a specific task. An important challenge in such applications is context modeling, using ontologies to model context information and to reason about context at a semantic level has attracted a lot of interest in the research community. However, most of the presented approaches do not usually take into account any software engineering method. Therefore, employing standard approaches to formulate the development process becomes of importance. In this paper, we present an overview of the architecture for the development of context aware services based on ontologies, we also present our context modeler based on ODM (Ontology Definition Metamodel) and model transformations that allows to generate an OWL ontology representing context information. {\textcopyright} 2013 IEEE.}, doi = {10.1109/SOCA.2013.58}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84894175652\&doi=10.1109\%2fSOCA.2013.58\&partnerID=40\&md5=7f367b0af0c55bcbc35014d583c37455}, author = {Fissaa, T.a and Guermah, H.a and Hafiddi, H.a b and Nassar, M.a and Kriouile, A.a} } @conference {Kobbane20132949, title = {Packet dropping for real-time applications in wireless networks}, booktitle = {IEEE International Conference on Communications}, year = {2013}, note = {cited By 2}, pages = {2949-2953}, abstract = {In this paper, we consider a multimedia data transmission system over a wireless channel, where packets are queued at the transmitter. Multimedia data transmission over wireless networks often suffers from delay, jitter and packet loss. The main problem to implement a wireless network is the high and variable bit error rate in the radio link (fading, shadowing etc). Among the most important performance measures for real time applications are the packet loss probability. In order to improve the radio link, one often retransmits packets that have not been well received (using the Automatic Retransmission reQuest). This however may lead to queuing phenomena and increased delay due to retransmissions, and to losses of packets due to buffer overflow. In this paper, we allow that the number of retransmission is finite. We model the system state by a three-dimensional Markov chain which represents the evolution the radio link state, the number of packets in the buffer and the number of transmission of a packet in the service. We use an advanced approach based on the theory of singular perturbation in order to compute some performance of interest. {\textcopyright} 2013 IEEE.}, doi = {10.1109/ICC.2013.6654990}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84891363277\&doi=10.1109\%2fICC.2013.6654990\&partnerID=40\&md5=51aa5757d77f2d32f9bb86c4d220b891}, author = {Kobbane, A.a and Ben-Othman, J.b and Koutbi, M.E.a} } @conference { ISI:000349673802062, title = {Packet dropping for Real-Time Applications in Wireless Networks}, booktitle = {2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)}, series = {IEEE International Conference on Communications}, year = {2013}, note = {IEEE International Conference on Communications (ICC), Budapest, HUNGARY, JUN 09-13, 2013}, pages = {2949-2953}, publisher = {IEEE}, organization = {IEEE}, abstract = {In this paper, we consider a multimedia data transmission system over a wireless channel, where packets are queued at the transmitter. Multimedia data transmission over wireless networks often suffers from delay, jitter and packet loss. The main problem to implement a wireless network is the high and variable bit error rate in the radio link (fading, shadowing etc). Among the most important performance measures for real time applications are the packet loss probability. In order to improve the radio link, one often retransmits packets that have not been well received (using the Automatic Retransmission reQuest). This however may lead to queuing phenomena and increased delay due to retransmissions, and to losses of packets due to buffer overflow. In this paper, we allow that the number of retransmission is finite. We model the system state by a three-dimensional Markov chain which represents the evolution the radio link state, the number of packets in the buffer and the number of transmission of a packet in the service. We use an advanced approach based on the theory of singular perturbation in order to compute some performance of interest.}, isbn = {978-1-4673-3122-7}, issn = {1550-3607}, author = {Kobbane, A. and Ben-Othman, J. and El Koutbi, M.} } @conference {Baddi2013227, title = {Parallel GRASP algorithm with delay and delay variation for core selection in shared tree based multicast routing protocols}, booktitle = {2013 3rd International Conference on Innovative Computing Technology, INTECH 2013}, year = {2013}, note = {cited By 0}, pages = {227-232}, abstract = {Many multicast routing protocols has proposed to support efficient multimedia application, PIM-SM and CBT protocols remain the most used multicast routing protocol; they propose using a Shared Tree ST to forward multicast packets. The prime problem concerning ST construction is to determine an optimal multicast router in the network as root; this problem is called Core selection. This problem influences the multicast routing tree structure, and therefore influences performances of the multicast session and multicast routing scheme. Determination of a best core position is an NP complete problem, first proposed by Wall, which needs to be solved with a heuristic algorithm. In this paper we propose a new Core selection algorithm based on Parallel GRAS Procedure and new CMP fitness function. 2DV-PGRASP-CR selects Core by considering cost, delay and delay variation functions and can be easily integrated to bootstrap RP protocol used by PIM-SM and CBT. Simulation results show that good performance is achieved in multicast cost. {\textcopyright} 2013 IEEE.}, doi = {10.1109/INTECH.2013.6653696}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84891138368\&doi=10.1109\%2fINTECH.2013.6653696\&partnerID=40\&md5=9b341b57a58b4588d41f81c4d3e960a7}, author = {Baddi, Y. and Ech-Cherif El Kettani, M.D.} } @article {Baddi2013235, title = {Parallel GRASP algorithm with delay and delay variation for Rendezvous Point selection in PIM-SM multicast routing}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {57}, number = {2}, year = {2013}, note = {cited By 2}, pages = {235-243}, abstract = {Many multicast routing protocols has proposed to support efficient multimedia application, PIM-SM protocol remains the most used multicast routing protocol; they propose using a Shared Rendezvous Point Tree SRPT to forward multicast packets. The prime problem concerning SRPT construction is to determine an optimal multicast router in the network as root; this problem is called RP selection. This problem influences the multicast routing tree structure, and therefore influences performances of the multicast session and multicast routing scheme. Determination of a best RP position is an NP complete problem, first proposed by Wall, which needs to be solved with a heuristic algorithm. In this paper we propose a new RP selection algorithm based on Parallel GRAS Procedure. 2DV-PGRASP-RP selects RP by considering cost, delay and delay variation functions and can be easily integrated to bootstrap RP protocol used by PIM-SM. Simulation results show that good performance is achieved in multicast cost. {\textcopyright} 2005 - 2013 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84888107680\&partnerID=40\&md5=d338159536c87e716e7f7a98c0232757}, author = {Baddi, Y. and El Kettani, M.D.E.-C.} } @conference { ISI:000331174400078, title = {Parallel Greedy Randomized Adaptive Search Procedure with Delay and Delay Variation for RP Selection in PIM-SM Multicast Routing}, booktitle = {2013 EIGHTH INTERNATIONAL CONFERENCE ON BROADBAND, WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2013)}, year = {2013}, note = {8th IEEE International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA), Univ Technol Compiegne, Compiegne, FRANCE, OCT 28-30, 2013}, pages = {481-487}, publisher = {IEEE; IEEE Comp Soc}, organization = {IEEE; IEEE Comp Soc}, abstract = {Multicast IP is a Green Technology; it{\textquoteright}s a bandwidth-conserving technology that reduces traffic by simultaneously delivering a single stream of information to multicast group members. Internet research community has proposed many Different multicast routing protocols to support efficient multimedia application, PIM-SM protocol remains the most used multicast routing protocol; they propose using a Shared Rendezvous Point Tree SRPT to forward multicast packets. The prime problem concerning SRPT construction is to determine an optimal multicast router in the network as a root; this problem is called Rendezvous point RP selection. This selection influences the form of the multicast routing tree, and therefore influences performances of the multicast session and multicast routing scheme. Determination of a best position of the Rendezvous Point is an NP complete problem, first proposed by Wall, which needs to be solved with a heuristic algorithm. In this paper we propose a new RP selection algorithm based on Parallel Greedy Randomized Adaptive Search Procedure. 2DV-PGRASP-RP selects RP by considering cost, delay and delay variation functions and can be easily integrated to bootstrap RP protocol used by PIM-SM. Simulation results show that good performance is achieved in multicast cost.}, isbn = {978-0-7695-5093-0}, doi = {10.1109/BWCCA.2013.84}, author = {Baddi, Youssef and Dafir, Mohamed and El Kettani, Ech-Cherif}, editor = {Barolli, L and Xhafa, F and Nace, D and Bouabdallah, A and Enokido, T and Yeo, SS} } @conference {Baddi2013481, title = {Parallel greedy randomized adaptive search procedure with delay and delay variation for RP selection in PIM-SM multicast routing}, booktitle = {Proceedings - 2013 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013}, year = {2013}, note = {cited By 0}, pages = {481-487}, abstract = {Multicast IP is a Green Technology; it{\textquoteright}s a bandwidth-conserving technology that reduces traffic by simultaneously delivering a single stream of information to multicast group members Internet research community has proposed many Different multicast routing protocols to support efficient multimedia application, PIM-SM protocol remains the most used multicast routing protocol; they propose using a Shared Rendezvous Point Tree SRPT to forward multicast packets. The prime problem concerning SRPT construction is to determine an optimal multicast router in the network as a root; this problem is called Rendezvous point RP selection. This selection influences the form of the multicast routing tree, and therefore influences performances of the multicast session and multicast routing scheme. Determination of a best position of the Rendezvous Point is an NP complete problem, first proposed by Wall, which needs to be solved with a heuristic algorithm. In this paper we propose a new RP selection algorithm based on Parallel Greedy Randomized Adaptive Search Procedure. 2DV-PGRASP-RP selects RP by considering cost, delay and delay variation functions and can be easily integrated to bootstrap RP protocol used by PIM-SM. Simulation results show that good performance is achieved in multicast cost. {\textcopyright} 2013 IEEE.}, doi = {10.1109/BWCCA.2013.84}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84893319627\&doi=10.1109\%2fBWCCA.2013.84\&partnerID=40\&md5=1231676fd3d0433f293d5cb3f587e98f}, author = {Baddi, Y. and Ech-Cherif El Kettani, M.D.} } @conference { ISI:000350287800032, title = {Process 3TUP}, booktitle = {2013 3RD INTERNATIONAL SYMPOSIUM ISKO-MAGHREB}, year = {2013}, note = {ISKO-Maghreb 3rd International Symposium, Marrakech, MOROCCO, NOV 08-09, 2013}, publisher = {ISKO}, organization = {ISKO}, abstract = {The software engineering is marked by the emergence of two paradigms: SOC (Service Oriented Computing) and CAC (Context-Aware Computing). The SOC paradigm aims to deal with the problems of interoperability. The CAC paradigm aims to challenge the adaptability of IS contexts. The adoption of these two paradigms, has raised the challenge of the development process Oriented Systems Services (SOS) adaptable to the context. The purpose of this paper is to propose the development process 3TUP Services-Oriented Systems adaptable to contexts of users. To streamline and guide the development of SOS adapted from business requirements.}, isbn = {978-1-4799-3392-1}, author = {Elmagrouni, Issam and Lethrech, Mohammed and Kenzi, Adil and Kriouile, Abdelaziz} } @book {Khaled2013166, title = {A semi-structured methodology for ERP system selection based on MACBETH and choquet integral applied to small and medium sized enterprises}, series = {Modern Entrepreneurship and E-Business Innovations}, year = {2013}, note = {cited By 1}, pages = {166-185}, abstract = {Historically, Enterprise Resource Planning (ERP) systems were initially destined to large companies in order to standardize and streamline their key business processes. Recently, they have been increasingly adopted by Small and Medium Enterprises (SMEs). However, making strategic tradeoffs among the various marketplace solutions is a troublesome balance task for SMEs without the rescue of systematic multicriteria decision approaches. This paper addresses the question of how to choose an ERP solution that best suits a given SME. It serves twofold objectives; firstly it defines a set of selection criteria related to SMEs{\textquoteright} context. Secondly, it presents a selection methodology based on the construction of an induced decision model through capturing the decision maker{\textquoteright}s preferences. The key contribution of this paper is the introduction of a new iterative learning based approach destined to make enlightened decisions through the consideration of interdependencies among the adopted selection criteria thanks to the Choquet Integral. {\textcopyright} 2013 by IGI Global. All rights reserved.}, doi = {10.4018/978-1-4666-2946-2.ch012}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84944072492\&doi=10.4018\%2f978-1-4666-2946-2.ch012\&partnerID=40\&md5=f8329adbf7b7c52fdb6edb6d35746c09}, author = {Khaled, A. and Idrissi, M.A.J.} } @article {Khaled20132477, title = {SEVALERPS a new EX-ANTE multi-criteria method for ERP selection}, journal = {International Review on Computers and Software}, volume = {8}, number = {10}, year = {2013}, note = {cited By 1}, pages = {2477-2485}, abstract = {Selecting the right ERP system is one of the most risky, tedious and complex decision making activity for any organization. This paper develops a new multi-criteria method for ERP systems evaluation and selection, which addresses some of the most important shortcomings relating to the methods found in the literature. The proposed method serves mainly twofold objectives; firstly it introduces a new systematic evaluation process that considers ERP tailoring and mismatch handling as the corner stone of the evaluation activity. Secondly, it presents a semi-structured evaluation model that helps the selection team to voice out its preferences. The evaluation model relies on many mathematical techniques to handle the various aspects of the evaluation: 0-1 linear programming systems to define the anticipated functional coverage of ERP candidates, MACBETH cardinal scales to represent, in an interactive way, the selection team{\textquoteright}s preferences, and the Choquet integral to address interdependencies among evaluation criteria. {\textcopyright} 2013 Praise Worthy Prize S.r.l. - All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84891532111\&partnerID=40\&md5=7c529f2d8b2248d12908e7ac15da5fe7}, author = {Khaled, A. and Janati-Idrissi, M.A.} } @conference { ISI:000326649800021, title = {A Text Classification Based Method for Context Extraction from Online Reviews}, booktitle = {2013 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, year = {2013}, note = {8th International Conference on Intelligent Systems - Theories and Applications (SITA), Ecole Mohammadia Ingenieurs, Rabat, MOROCCO, MAY 08-09, 2013}, publisher = {IEEE; IEEE Morocco Sect; Univ Mohammed V Agdal}, organization = {IEEE; IEEE Morocco Sect; Univ Mohammed V Agdal}, abstract = {Recommender systems are systems that filter information depending on users{\textquoteright} profiles and suggest items that might match their preferences. While the majority of existing researches compute recommendation by considering only users and items, Context Aware Recommendation Systems (CARS) consider, in addition to users and items, others features related to the context. A first issue in CARS studies is to identify the contextual features. In this paper, we investigate the use of Text Classification techniques to extract contextual features from users{\textquoteright} reviews. We conduct experiments to identify the best classification algorithm for our dataset. We evaluate our approach on hotel reviews. We focus on extracting the trip type, as contextual information, from these reviews. Results show that the Multinomial Naive Bayes performs best in our dataset, with a F1 score of 60.1\%. Since contextual information are not always provided in the reviews, we think that our results are promising. We conclude that this research area needs deeper studies.}, isbn = {978-1-4799-0299-6}, author = {Zahra Lahlou, Fatima and Mountassir, Asmaa and Benbrahim, Houda and Kassou, Ismail} } @conference {Lahlou2013, title = {A Text Classification based method for context extraction from online reviews}, booktitle = {2013 8th International Conference on Intelligent Systems: Theories and Applications, SITA 2013}, year = {2013}, note = {cited By 1}, abstract = {Recommender systems are systems that filter information depending on users{\textquoteright} profiles and suggest items that might match their preferences. While the majority of existing researches compute recommendation by considering only users and items, Context Aware Recommendation Systems (CARS) consider, in addition to users and items, others features related to the context. A first issue in CARS studies is to identify the contextual features. In this paper, we investigate the use of Text Classification techniques to extract contextual features from users{\textquoteright} reviews. We conduct experiments to identify the best classification algorithm for our dataset. We evaluate our approach on hotel reviews. We focus on extracting the trip type, as contextual information, from these reviews. Results show that the Multinomial Na{\"\i}ve Bayes performs best in our dataset, with a F1 score of 60.1\%. Since contextual information are not always provided in the reviews, we think that our results are promising. We conclude that this research area needs deeper studies. {\textcopyright} 2013 IEEE.}, doi = {10.1109/SITA.2013.6560804}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883074857\&doi=10.1109\%2fSITA.2013.6560804\&partnerID=40\&md5=440fb81da26cacbb428c326c7dc6cf50}, author = {Lahlou, F.Z. and Mountassir, A. and Benbrahim, H. and Kassou, I.} } @conference { ISI:000341079600060, title = {To trace and guide evolution in configurable process models}, booktitle = {2013 ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA)}, year = {2013}, note = {IEEE and Arab-Computing-Society (ACS) International Conference on Computer Systems and Applications (AICCSA), Al Akhawayn Univ, Ifrane, MOROCCO, MAY 27-30, 2013}, publisher = {IEEE; Arab Comp Soc}, organization = {IEEE; Arab Comp Soc}, abstract = {Today, research on business process management (BPM) outlines the importance of business process reuse through reference process models which are interested in capturing common practices of organizations. Consequently, reusing these reference process models stresses the necessity of managing a set of process variants. In this context, configurable process model solutions have been developed to facilitate customization of business process in a specific scenario. However, configurable process model should evolve in order to meet new business requirements. To address this issue, we propose a process patterns based approach for leading configurable process model evolution. For supporting traceability of the transition from a given version of a configurable process model to another, an evolution metamodel has been defined. In this paper, we present i) only one pattern of our proposed patterns system, the Activity substitution process pattern, and ii) a proposition of the evolution metamodel.}, isbn = {978-1-4799-0792-2}, author = {Sbai, Hanae and Fredj, Mounia and Kjiri, Laila} } @conference {Sbai2013382, title = {Towards a process patterns based approach for promoting adaptability in configurable process models}, booktitle = {ICEIS 2013 - Proceedings of the 15th International Conference on Enterprise Information Systems}, volume = {3}, year = {2013}, note = {cited By 3}, pages = {382-387}, abstract = {Reference process modeling approach has been proposed in order to provide a generic solution for reuse in business process management. These models are intended to be adapted by different organizations to respond to new requirements. As a result of this adaptation, a set of variants of the reference process model must be managed. In this context, configurable solutions have been developed to manage variability by integrating all possible configurations. However, enterprises are involved in competitive and complex environments which impose them to often adapt their configurable process models to deal with the increasing globalisation. Therefore, configurable process models should evolve over time in terms of activities, resources and data to meet new needs. In this paper, we propose a process patterns based approach to guide designers in evolving configurable process models at design time as a first step of our contribution to provide an automated support for evolving configurable process models. The presentation of our process patterns system is limited in this paper to the Activity Insertion Process Pattern.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84887716124\&partnerID=40\&md5=f45ed794bc8aa6fa44256d12d21c58e4}, author = {Sba{\"\i}, H. and Fredj, M. and Kjiri, L.} } @conference { ISI:000386615500047, title = {Towards a Process Patterns based Approach for Promoting Adaptability in Configurable Process Models}, booktitle = {ICEIS: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 3}, year = {2013}, note = {15th International Conference on Enterprise Information Systems (ICEIS), Angers, FRANCE, JUL 04-07, 2013}, pages = {382-387}, publisher = {ESEO Grp; Inst Syst \& Technologies Informat, Control \& Commun; Assoc Advancement Artificial Intelligence; IEICE Special Interest Grp Software Interprise Modelling; ACM Special Interest Grp Management Informat Syst; ACM Special Interest Grp Comp Human Inte}, organization = {ESEO Grp; Inst Syst \& Technologies Informat, Control \& Commun; Assoc Advancement Artificial Intelligence; IEICE Special Interest Grp Software Interprise Modelling; ACM Special Interest Grp Management Informat Syst; ACM Special Interest Grp Comp Human Inte}, abstract = {Reference process modeling approach has been proposed in order to provide a generic solution for reuse in business process management. These models are intended to be adapted by different organizations to respond to new requirements. As a result of this adaptation, a set of variants of the reference process model must be managed. In this context, configurable solutions have been developed to manage variability by integrating all possible configurations. However, enterprises are involved in competitive and complex environments which impose them to often adapt their configurable process models to deal with the increasing globalisation. Therefore, configurable process models should evolve over time in terms of activities, resources and data to meet new needs. In this paper, we propose a process patterns based approach to guide designers in evolving configurable process models at design time as a first step of our contribution to provide an automated support for evolving configurable process models. The presentation of our process patterns system is limited in this paper to the Activity Insertion Process Pattern.}, isbn = {978-989-8565-61-7}, doi = {10.5220/0004565503820387}, author = {Sbai, Hanae and Fredj, Mounia and Kjiri, Laila}, editor = {Hammoudi, S and Maciaszek, L and Cordeiro, J and Dietz, J} } @conference {ElBouanani20131494, title = {Using lexicometry and vocabulary analysis techniques to detect a signature for web profile}, booktitle = {Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013}, year = {2013}, note = {cited By 0}, pages = {1494-1498}, abstract = {Our research theme is evolving around the concept of computer profiling. The aim of our work is to propose an approach that will detect web profiles in a unique way and to model a print web for each profile. Our main concern is to find this signature from text messages in the forums, by analyzing the vocabulary used by each user. Also we will focus here on presenting our approach and our future work in a way that will allow us to detect the "Specific Vocabulary" for each web profile. Copyright 2013 ACM.}, doi = {10.1145/2492517.2558568}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84893246694\&doi=10.1145\%2f2492517.2558568\&partnerID=40\&md5=d3d6a325ab8fd941a07351e2044dc572}, author = {El Bouanani, S.E.M. and Kassou, I.} } @conference { ISI:000353639700241, title = {Using lexicometry and vocabulary analysis techniques to detect a signature for web profile}, booktitle = {2013 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM)}, year = {2013}, note = {IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Niagara Falls, CANADA, AUG 25-28, 2013}, pages = {1494-1498}, publisher = {IEEE; Assoc Comp Machinery; Assoc Comp Machinery SIGKDD; IEEE Comp Soc; IEEE TCDE; Global Univ; Hellen American Univ; Springer; Microsoft; EXtra; Springer Verlag; Assoc Comp Machinery SIGMOD}, organization = {IEEE; Assoc Comp Machinery; Assoc Comp Machinery SIGKDD; IEEE Comp Soc; IEEE TCDE; Global Univ; Hellen American Univ; Springer; Microsoft; EXtra; Springer Verlag; Assoc Comp Machinery SIGMOD}, abstract = {Our research theme is evolving around the concept of computer profiling. The aim of our work is to propose an approach that will detect web profiles in a unique way and to model a print web for each profile. Our main concern is to find this signature from text messages in the forums, by analyzing the vocabulary used by each user. Also we will focus here on presenting our approach and our future work in a way that will allow us to detect the {\textquoteleft}{\textquoteleft}Specific Vocabulary{{\textquoteright}{\textquoteright}} for each web profile.}, isbn = {978-1-4503-2240-9}, author = {El Bouanani, Sara El Manar and Kassou, Ismail}, editor = {Ozyer, T and Carrington, P} } @article {10115338220131101, title = {Vers une approche d{\textquoteright}analyse des besoins m{\'e}tier d{\textquoteright}un Syst{\`e}me d{\textquoteright}Information D{\'e}cisionnel.}, journal = {E-Ti: E-Review in Technologies Information}, number = {7}, year = {2013}, pages = {59 - 79}, abstract = {The field of Decisional Information Systems (DIS) analysis and design is highly applying new techniques and methods to promote the success of the decision process and to minimize the time of design. A comparative study conducted on different approaches for analyzing decisional requirements, raises a series of problems. These problems are coming generally from the nature of the applied requirements analysis process, the difficulties in expressing requirements and the insufficient quality of documents. To face these problems, we propose in this paper a method for analyzing decisional requirements, qualified Decisional Business Intelligence (DBI), as a process and models that support the discovery, specification, negotiation and validation requirements. This approach aims to guide and orient analysts designers throughout the DBI process. (English) [ABSTRACT FROM AUTHOR]}, keywords = {Business requirements Engineering, Decisional Information Systems (DIS), Formalisme P-SIGMA, Ing{\'e}nierie des Besoins M{\'e}tier, P-Sigma formalism, Patron processus, Process pattern, Reuse, R{\'e}utilisation, Syst{\`e}me d{\textquoteright}Information D{\'e}cisionnel (SID)}, issn = {11148802}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=101153382\&site=ehost-live}, author = {Sabri, Aziza and Kjiri, Laila} } @conference {Kamal2012328, title = {Car recognition for multiple data sets based on histogram of oriented gradients and support vector machines}, booktitle = {Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012}, year = {2012}, note = {cited By 0}, pages = {328-332}, doi = {10.1109/ICMCS.2012.6320284}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869773259\&doi=10.1109\%2fICMCS.2012.6320284\&partnerID=40\&md5=0ad45a3469271b13bbe401f5b9aca330}, author = {Kamal, I.} } @conference { ISI:000310353000061, title = {Car recognition for multiple data sets based on Histogram of Oriented Gradients and Support Vector Machines}, booktitle = {2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2012}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Tangiers, MOROCCO, MAY 10-12, 2012}, pages = {329-333}, publisher = {Morocco Sect MTT/AP Joint Chapter}, organization = {Morocco Sect MTT/AP Joint Chapter}, abstract = {In this paper we implement a soft margin support vector machine (SVM) using linear and nonlinerar kernels for image classification. The sequential minimal optimization (SMO) method will be used to find the optimal separating hyperplane between the training data that consist of a multidimensional histogram of oriented gradient (HOG) features vectors extracted from multiple data sets.}, isbn = {978-1-4673-1520-3}, author = {Kamal, Iias}, editor = {Essaaidi, M and Zaz, Y} } @conference { ISI:000312146500145, title = {Channel Allocation Strategies in Opportunistic-based Cognitive Networks}, booktitle = {2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC)}, series = {International Wireless Communications and Mobile Computing Conference}, year = {2012}, note = {8th IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), Limassol, CYPRUS, AUG 27-31, 2012}, pages = {872-877}, publisher = {IEEE; IEEE Cyprus Sect; Frederick Univ}, organization = {IEEE; IEEE Cyprus Sect; Frederick Univ}, abstract = {The idea to allow unlicensed users to utilize licensed bands whenever it would not cause any interference is one of the fundaments of cognitive radio. In this paper we propose some allocation channel strategies to provide more QoS for unlicensed users. We assume that one channel is dedicated for unlicensed users that can eventually use licensed users channels if idle. The first allocation channel strategy reconsiders, in case of unavailable licensed users{\textquoteright}s channels, the request of unlicensed users to be processed by the dedicated channel. The second strategy doesn{\textquoteright}t reconsider it and simply reject it. QoS performances of the two patterns are evaluated and discussed using analytical models and simulations. For the first communication strategy, we based our model on the work of Habachi and Hayel which we enhance. We proceed to some corrections of mathematical and formulations errors. Analytical and simulation results show that the performances offered by the primary channels to secondary user are better than performances offered by the dedicated channel, however, the performance offered by the primary channels are negatively impacted by the cost of sensing.}, isbn = {978-1-4577-1379-8}, issn = {2376-6492}, author = {Belkasmi, Yassin and Kobbane, Abdellatif and El Koutbi, Mohammed and Ben-Othman, Jalel} } @conference {Belkasmi2012872, title = {Channel allocation strategies in opportunistic-based cognitive networks}, booktitle = {IWCMC 2012 - 8th International Wireless Communications and Mobile Computing Conference}, year = {2012}, note = {cited By 4}, pages = {872-877}, doi = {10.1109/IWCMC.2012.6314319}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869167181\&doi=10.1109\%2fIWCMC.2012.6314319\&partnerID=40\&md5=8168e16ee34fac24497d20951170d54e}, author = {Belkasmi, Y. and Kobbane, A. and Koutbi, M.E. and Ben-Othman, J.} } @conference { ISI:000324984400066, title = {D2V-VNS-RPS: Delay and Delay Variation Constrained Algorithm based on Variable Neighborhood Search Algorithm for RP Selection Problem in PIM-SM Protocol}, booktitle = {PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12)}, year = {2012}, note = {1st International Conference on Complex Systems (ICCS), Agadir, MOROCCO, NOV 05-06, 2012}, pages = {387-392}, abstract = {Due to the progress of network multimedia technology, a majority of real-time multimedia applications need multicast communication to transmit information. These applications require a multicast routing protocol in which packets arrive to multicast receptors within a specified QOS guaranteed. D2V-RPS{\textquoteright}s problem (delay and delay variation RP Selection) consists in choosing an optimal multicast router in the network as the root of the Shared multicast Tree (ST) within a specified delay and delay variation associated. The choice of this specific router, called RP in PIM-SM protocol, is the main problem concerning the construction of multicast tree; this choice affects the structure of multicast routing tree, and therefore influences performances of both multicast session and routing scheme. The determination of a best position of the RP within a specified delay and delay variation associated is an NP complete problem: it needs to be solved through a heuristic algorithm. In this paper, we propose a new RP Selection algorithm based on Variable Neighborhood Search algorithm, which based on a systematic neighborhood changing. D2V-VNS-RPS algorithm selects the RP router by considering tree cost, delay and delay variation. Simulation results show that good performance is achieved.}, isbn = {978-1-4673-4766-2}, author = {Baddi, Youssef and Ech-Cherif El Kettani, Mohamed Dafir}, editor = {Essaaidi, M and Nemiche, M} } @conference {Baddi2012, title = {D2V-VNS-RPS: Delay and delay variation constrained algorithm based on Variable Neighborhood Search algorithm for RP Selection problem in PIM-SM protocol}, booktitle = {Proceedings of 2012 International Conference on Complex Systems, ICCS 2012}, year = {2012}, note = {cited By 0}, doi = {10.1109/ICoCS.2012.6458559}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84874481974\&doi=10.1109\%2fICoCS.2012.6458559\&partnerID=40\&md5=8b28eeceffbaa5aff332a7611a7e3207}, author = {Baddi, Y. and El Kettani, M.D.E.-C.} } @article {Koulali2012, title = {Dynamic power control for energy harvesting wireless multimedia sensor networks}, journal = {Eurasip Journal on Wireless Communications and Networking}, volume = {2012}, year = {2012}, note = {cited By 3}, doi = {10.1186/1687-1499-2012-158}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84872869198\&doi=10.1186\%2f1687-1499-2012-158\&partnerID=40\&md5=2b0c34f9aac01ae9f865a22159e62779}, author = {Koulali, M.-A. and Kobbane, A. and Koutbi, M.E. and Tembine, H. and Ben-Othman, J.} } @article { ISI:000305225200001, title = {Dynamic power control for energy harvesting wireless multimedia sensor networks}, journal = {EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING}, year = {2012}, abstract = {Optimization of energy usage in wireless sensor networks (WSN) has been an active research field for the last decades and various approaches have been explored. In fact, A well designed energy consumption model is the foundation for developing and evaluating a power management scheme in network of energy constrained devices such as: WSN. We are interested in developing optimal centralized power control policies for energy harvesting wireless multimedia sensor networks (WMSN) equipped with photovoltaic cells. We propose a new complete information Markov decision process model to characterize sensor{\textquoteright}s battery discharge/recharge process and inspect the structural properties of optimal transmit policies.}, issn = {1687-1499}, doi = {10.1186/1687-1499-2012-158}, author = {Koulali, Mohammed-Amine and Kobbane, Abdellatif and El Koutbi, Mohammed and Tembine, Hamidou and Ben-Othman, Jalel} } @conference {Kobbane2012518, title = {Dynamic power control with energy constraint for Multimedia Wireless Sensor Networks}, booktitle = {IEEE International Conference on Communications}, year = {2012}, note = {cited By 2}, pages = {518-522}, doi = {10.1109/ICC.2012.6363971}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84871981947\&doi=10.1109\%2fICC.2012.6363971\&partnerID=40\&md5=2e71bfe8b840a119435a1fb89dd122f0}, author = {Kobbane, A. and Koulali, M.-A. and Tembine, H. and Koutbi, M.E. and Ben-Othman, J.} } @conference { ISI:000312855700097, title = {Dynamic Power Control with Energy Constraint for Multimedia Wireless Sensor Networks}, booktitle = {2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)}, series = {IEEE International Conference on Communications}, year = {2012}, note = {IEEE International Conference on Communications (ICC), Ottawa, CANADA, JUN 10-15, 2012}, publisher = {IEEE}, organization = {IEEE}, abstract = {In recent years, many approaches and techniques have been explored for the optimization of energy usage in Wireless Sensor Networks (WSN). It is well recognized that a proper energy consumption model is the foundation for developing and evaluating a power management scheme in WSN. In this paper, we propose a new complete information Markov Decision Process (MDP) model to characterize sensors energy levels. We also propose and compare several centralized power control policies to select the more efficient policy that optimizes throughput and energy consumption.}, isbn = {978-1-4577-2053-6}, issn = {1550-3607}, author = {Kobbane, A. and Koulali, M. -A. and Tembine, H. and El Koutbi, M. and Ben-Othman, J.} } @conference { ISI:000310353000082, title = {Emerging Wireless Technologies In E-Health}, booktitle = {2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2012}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Tangiers, MOROCCO, MAY 10-12, 2012}, pages = {440-445}, publisher = {Morocco Sect MTT/AP Joint Chapter}, organization = {Morocco Sect MTT/AP Joint Chapter}, abstract = {In healthcare the importance of obtaining the right information, at the right time, irrespective of time and location dependency is very critical. Healthcare personnel need to access real-time medical data such as patient clinical histories, laboratory results, treatments, chronic diseases, medication, and insurance information. Therefore, healthcare is the most apt domain for the application of ubiquitous technologies. Ubiquitous health care aims at creating an environment where healthcare is available to everyone, everywhere through the use of technologies that would not only be pervasive but also be assimilated flawlessly in the daily lives. With large-scale wireless networks and mobile computing solutions, such as cellular 3G, Wi-Fi mesh, WiMAX, Bluetooth, RFID, and Wireless Sensor Networks, health care personnel can tap into vital information anywhere and at any time within the health care networks. Ubiquitous healthcare, although promising, there are myriad challenges associated with realizing its vision. This paper highlights some snapshots of current uses and future trends of various wireless communications in the healthcare domains, addresses their applications for e-health, states the challenges faced in a ubiquitous healthcare environment equipped with different wireless technologies, and how the resulting issues might be addressed by developing a framework that provides a flexible and convenient medical monitoring, consultation, and healthcare.}, isbn = {978-1-4673-1520-3}, author = {El Khaddar, Mehdia Ajana and Harroud, Hamid and Boulmalf, Mohammed and Elkoutbi, Mohammed and Habbani, Ahmed}, editor = {Essaaidi, M and Zaz, Y} } @conference {ElKhaddar2012440, title = {Emerging wireless technologies in e-health: Trends, challenges, and framework design issues}, booktitle = {Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012}, year = {2012}, note = {cited By 20}, pages = {440-445}, doi = {10.1109/ICMCS.2012.6320276}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869803375\&doi=10.1109\%2fICMCS.2012.6320276\&partnerID=40\&md5=3f8a7111cfa37918453a942aa23762f3}, author = {El Khaddar, M.A. and Harroud, H. and Boulmalf, M. and Elkoutbi, M. and Habbani, A.} } @conference {Saadane201262, title = {Evaluation of hybrid geo-location based on UMTS and GPS technologies}, booktitle = {Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012}, year = {2012}, note = {cited By 0}, pages = {62-66}, doi = {10.1109/ICMCS.2012.6320310}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869822901\&doi=10.1109\%2fICMCS.2012.6320310\&partnerID=40\&md5=98c5dfaf44a4e8614b501104ada67870}, author = {Saadane, R. and Belkasmi, M. and El Koutbi, M. and Dadda, M.R.} } @conference { ISI:000310353000012, title = {Evaluation of Hybrid Geo-location based on UMTS and OPS Technologies}, booktitle = {2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2012}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Tangiers, MOROCCO, MAY 10-12, 2012}, pages = {63-67}, publisher = {Morocco Sect MTT/AP Joint Chapter}, organization = {Morocco Sect MTT/AP Joint Chapter}, abstract = {The degree of accuracy and availability of service make a distinction between the two main methods of geolocation that areGPS and UMTS. GPS provides good performances in terms of location in open area, but performances degrade to a significant manner when we go into an enclosed area. While the UMTS offers good results in urban areas, we can note a complementarity between these two techniques. In this paper we present a hybrid algorithm that combines these two techniques and takes best advantage of each of them with two approaches one simple and another advanced.}, isbn = {978-1-4673-1520-3}, author = {Saadane, Rachid and Belkasmi, Mostafa and El Koutbi, Mohammed and Dadda, Mohamed Rachid}, editor = {Essaaidi, M and Zaz, Y} } @conference {Sabraoui2012, title = {GUI code generation for Android applications using a MDA approach}, booktitle = {Proceedings of 2012 International Conference on Complex Systems, ICCS 2012}, year = {2012}, note = {cited By 0}, doi = {10.1109/ICoCS.2012.6458567}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84874457236\&doi=10.1109\%2fICoCS.2012.6458567\&partnerID=40\&md5=a1e6336bcd6c0c33f76c4ff1126d0517}, author = {Sabraoui, A. and Koutbi, M.E. and Khriss, I.} } @conference { ISI:000324984400067, title = {GUI Code Generation for Android Applications Using a MDA Approach}, booktitle = {PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12)}, year = {2012}, note = {1st International Conference on Complex Systems (ICCS), Agadir, MOROCCO, NOV 05-06, 2012}, pages = {393-398}, abstract = {Developing applications for mobile platforms is a compound task, due to variability of mobile OSs and the number of different devices that need to be supported. Model-Driven Architecture (MDA) approach could provide a possible solution to provide an automated way to generate a Graphical User Interface (GUI) for such applications. In this paper, we propose an approach based on MDA, to generate GUI for mobile applications on smartphones. The adopted approach consists of three main steps (i) analyzing and modeling the GUI under UML; (ii) transforming the obtained diagrams to a simplified XMI schema using JDOM API; and (iii) generating the GUI based on MDA. Our method has the advantages to generate automatically GUI for several platforms, and gives a graphical way for designing in UML.}, isbn = {978-1-4673-4766-2}, author = {Sabraoui, Ayoub and El Koutbi, Mohammed and Khriss, Ismail}, editor = {Essaaidi, M and Nemiche, M} } @article {8999329020120801, title = {Ing{\'e}nierie des exigences de la s{\'e}curit{\'e} informatique: Revue de travaux de recherche de l{\textquoteright}{\'e}licitation {\`a} la sp{\'e}cification.}, journal = {E-Ti: E-Review in Technologies Information}, number = {6}, year = {2012}, pages = {17 - 31}, abstract = {Nowadays Security plays an important role in the development of applications because of network expansion on one side and of the importance of information on the other side. However, security requirements have long been relegated to second place compared to the functional requirements which can cause some damage to the applications. One of the challenges of current research in the area of requirement engineering is to develop simple, expressive, reliable and costless methods for expressing and modelling security requirements. One of the challenges of current research in the area of requirement engineering is to develop simple, expressive, reliable and costless methods for expressing and modelling security requirements. (English) [ABSTRACT FROM AUTHOR]}, keywords = {Computer networks, Computer security, Computer software development, Elicitation, Formal Specification, Framework de mod{\'e}lisation, Information theory, Ing{\'e}nierie des exigences, Modelling framework, Requirement Engineering, Requirements engineering, S{\'e}curit{\'e}, Security, Sp{\'e}cification formelle}, issn = {11148802}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=89993290\&site=ehost-live}, author = {Kassou, Meryem and Kjiri, Laila} } @conference {Khiyaita2012106, title = {Load balancing cloud computing: State of art}, booktitle = {Proceedings of the 2nd National Days of Network Security and Systems, JNS2 2012}, year = {2012}, note = {cited By 21}, pages = {106-109}, doi = {10.1109/JNS2.2012.6249253}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84866649932\&doi=10.1109\%2fJNS2.2012.6249253\&partnerID=40\&md5=9ec95312041c7ba61c0949ea4dc038cd}, author = {Khiyaita, A. and Bakkali, H.E. and Zbakh, M. and Kettani, D.E.} } @conference {Kassou20127, title = {A maturity metric based approach for eliciting SOA security requirements}, booktitle = {Proceedings of the 2nd National Days of Network Security and Systems, JNS2 2012}, year = {2012}, note = {cited By 2}, pages = {7-11}, doi = {10.1109/JNS2.2012.6249231}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84866706527\&doi=10.1109\%2fJNS2.2012.6249231\&partnerID=40\&md5=29a045d11fe306523cb377c5fea1d6ac}, author = {Kassou, M. and Kjiri, L.} } @conference { ISI:000325229700005, title = {MC-PIM-SM: multicast routing protocol PIM-SM with Multiple Cores Shared Tree for mobile IPv6 environment}, booktitle = {2012 SECOND INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH)}, year = {2012}, note = {2nd International Conference on Innovative Computing Technology (INTECH), Casablanca, MOROCCO, SEP 18-20, 2012}, pages = {21-26}, publisher = {IEEE UK \& RI Consumer Elect Chapter; IEEE Broadcast Technol Chapter; IEEE}, organization = {IEEE UK \& RI Consumer Elect Chapter; IEEE Broadcast Technol Chapter; IEEE}, abstract = {Internet research community has proposed many different multicast routing protocols to support efficient multimedia application such as, IPTV, videoconferencing, group games. Nevertheless, the design of all these protocols does not take into account that group members may be mobile. Indeed, with the arrival of Mobile IPv6 by IETF providing mobile users with continuous access, group members in the network are very dynamic affecting on the quality of both routing protocol scheme and multicast tree used. The key idea of this work is to make the handover of multicast members transparent and avoid the reconstruction of the entire multicast-based tree, by using an architecture MC-PIM-SM based in PIM-SM multicast routing protocol with Multiple Cores Shared Multicast Tree to hide the mobility of mobile multicast members from the main multicast delivery tree. Simulation results show that good performance is achieved in terms of handoff latency, end-to-end delay, tree construction delay and others metrics.}, isbn = {978-1-4673-2679-7}, author = {Baddi, Youssef and Ech-Chrif El Kettani, Mohamed Dafir} } @conference {Baddi201221, title = {MC-PIM-SM: Multicast routing protocol PIM-SM with Multiple Cores Shared tree for mobile IPv6 environment}, booktitle = {2nd International Conference on Innovative Computing Technology, INTECH 2012}, year = {2012}, note = {cited By 0}, pages = {21-26}, doi = {10.1109/INTECH.2012.6457753}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84874453066\&doi=10.1109\%2fINTECH.2012.6457753\&partnerID=40\&md5=a220ba5d044562a1477822f4ee24446d}, author = {Baddi, Y. and El Kettani, M.D.E.-C.} } @conference {Sabraoui2012306, title = {An MDA-based approach for WS composition using UML scenarios}, booktitle = {Proceedings of the 9th International Conference on Information Technology, ITNG 2012}, year = {2012}, note = {cited By 1}, pages = {306-313}, doi = {10.1109/ITNG.2012.52}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84863974926\&doi=10.1109\%2fITNG.2012.52\&partnerID=40\&md5=83b43893cc2ec11a345c5cce3c077cec}, author = {Sabraoui, A. and Ennouaary, A. and Khriss, I. and El Koutbi, M.} } @conference {ElHassani201258, title = {Measure of fuzzy presence of descriptors on Arabic Text Mining}, booktitle = {CiSt 2012 - Proceedings: 2012 Colloquium in Information Science and Technology}, year = {2012}, note = {cited By 1}, pages = {58-63}, doi = {10.1109/CIST.2012.6388063}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84872519138\&doi=10.1109\%2fCIST.2012.6388063\&partnerID=40\&md5=3d4374b821fb0c303b9e4ba014855fc0}, author = {El Hassani, I. and Kriouile, A. and Benghabrit, Y.} } @conference {Baidouri2012245, title = {A mediator architecture for context-aware composition in SOA}, booktitle = {ICEIS 2012 - Proceedings of the 14th International Conference on Enterprise Information Systems}, volume = {2 ISAS}, number = {SAIC/-}, year = {2012}, note = {cited By 0}, pages = {245-251}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84865742206\&partnerID=40\&md5=623beaed8eff00089a3ea879a48d8a02}, author = {Baidouri, H. and Hafiddi, H. and Nassar, M. and Kriouile, A.} } @conference {Elmaallam201216, title = {Model ISR3M for assessing maturity of IS risk management process: Case study}, booktitle = {CiSt 2012 - Proceedings: 2012 Colloquium in Information Science and Technology}, year = {2012}, note = {cited By 0}, pages = {16-21}, doi = {10.1109/CIST.2012.6388056}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84872504803\&doi=10.1109\%2fCIST.2012.6388056\&partnerID=40\&md5=16d41c2e10aaca6ab6f5cdb4f0956ec3}, author = {Elmaallam, M. and Kriouile, A.} } @conference {Baidouri2012693, title = {A model-driven approach for Context-Aware services composition}, booktitle = {Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012}, year = {2012}, note = {cited By 0}, pages = {693-698}, doi = {10.1109/ICMCS.2012.6320249}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869817305\&doi=10.1109\%2fICMCS.2012.6320249\&partnerID=40\&md5=160c7120f790d139419072f766aad3b7}, author = {Baidouri, H. and Hafiddi, H. and Nassar, M. and Kriouile, A.} } @conference { ISI:000310353000128, title = {A Model-driven Approach for Context-Aware Services Composition}, booktitle = {2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2012}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Tangiers, MOROCCO, MAY 10-12, 2012}, pages = {693-698}, publisher = {Morocco Sect MTT/AP Joint Chapter}, organization = {Morocco Sect MTT/AP Joint Chapter}, abstract = {With the emergence of service-oriented architecture (SOA), the provision of business-to-business as well as user-centric services becomes increasingly simple and fluent. Also, the design, development and deployment of services - either elementary or composite - have constantly gained ground. However, the user{\textquoteright}s context must constitute an essential aspect of such services in order to improve the end-user experience. As observed from the literature, several researches focuses mainly on context-aware service design and modeling, but few study had worked on the composition of this new kind of service to provide more complicated features. In this paper, we aim to present our proposal of adapting service composition by the integration of context during the composition process. This dynamic context-aware composition of services is realized through our Context-Aware Composition Builder tool.}, isbn = {978-1-4673-1520-3}, author = {Baidouri, Hicham and Hafiddi, Hatim and Nassar, Mahmoud and Kriouile, Abdelaziz}, editor = {Essaaidi, M and Zaz, Y} } @conference { ISI:000312146500012, title = {New Insights from a Delay Analysis for Cognitive Radio Networks with and without Reservation}, booktitle = {2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC)}, series = {International Wireless Communications and Mobile Computing Conference}, year = {2012}, note = {8th IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), Limassol, CYPRUS, AUG 27-31, 2012}, pages = {65-70}, publisher = {IEEE; IEEE Cyprus Sect; Frederick Univ}, organization = {IEEE; IEEE Cyprus Sect; Frederick Univ}, abstract = {In wireless communication systems, the delay remains a crucial factor. In this work, we focus on the design of a new opportunistic cross-layer MAC protocol involving channels allocation and packet scheduling for cognitive networks in order to optimize system performance. Cognitive radio provides the opportunity for secondary users (unlicensed users) to use available portions of the licensed spectrum bands without interfering with primary users (licensed users). We consider that each secondary user is equipped with two transceivers. The role of the first transceiver is to obtain and exchange channels information on the control channel. The second transceiver is devoted to periodically detect and dynamically use the available data channels. The paper deals with channel allocation considering traffic characteristics of secondary users. So, we propose a mechanism of resource reservation to improve Quality of Service (QoS) requirements that favors successful secondary users to transmit data during x time slots without interfering with primary users. We develop a new analytical model, while taking into account the backoff mechanism. We analyze delay parameter for two scenarios with and without resource reservation. We show through simulations that our approach guarantees an optimal response delay.}, isbn = {978-1-4577-1379-8}, issn = {2376-6492}, author = {Elmachkour, Mouna and Kobbane, Abdellatif and Sabir, Essaid and El Koutbi, Mohammed} } @conference {Elmachkour201265, title = {New insights from a delay analysis for cognitive radio networks with and without reservation}, booktitle = {IWCMC 2012 - 8th International Wireless Communications and Mobile Computing Conference}, year = {2012}, note = {cited By 5}, pages = {65-70}, doi = {10.1109/IWCMC.2012.6314179}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869156676\&doi=10.1109\%2fIWCMC.2012.6314179\&partnerID=40\&md5=9cfed6da1f67007546e0b300b3572406}, author = {Elmachkour, M. and Kobbane, A. and Sabir, E. and Koutbi, M.E.} } @conference { ISI:000322375100023, title = {Optimal Distributed Relay Selection for Duty-Cycling Wireless Sensor Networks}, booktitle = {2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)}, series = {IEEE Global Communications Conference}, year = {2012}, note = {IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, DEC 03-07, 2012}, pages = {145-150}, publisher = {IEEE}, organization = {IEEE}, abstract = {Recent advances in localization technologies and algorithms for Wireless Sensor Networks (WSN) motivate the exploitation of location information in routing protocols. In this paper we consider the geographic forwarding of sporadically generated alarm messages. Our objective is to optimize sensor{\textquoteright}s energy consumption while respecting QoS constraints on transmission delay. For instance, we propose an optimal distributed relay selection policy for WSN with duty-cycling sensors based on a Markov Decision Process (MDP) with complete information. Also, we establish sufficient conditions for optimality of threshold policies. Then, end-to-end performances for a heuristic multi-hop relay selection strategy are established. Finally, we extend our model to account for queuing capabilities at sensor level.}, isbn = {978-1-4673-0921-9; 978-1-4673-0920-2}, issn = {2334-0983}, author = {Koulali, M. -A. and Kobbane, A. and El Koutbi, M. and Ben-Othman, J.} } @conference {Koulali2012145, title = {Optimal distributed relay selection for duty-cycling Wireless Sensor Networks}, booktitle = {GLOBECOM - IEEE Global Telecommunications Conference}, year = {2012}, note = {cited By 5}, pages = {145-150}, doi = {10.1109/GLOCOM.2012.6503104}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84877653430\&doi=10.1109\%2fGLOCOM.2012.6503104\&partnerID=40\&md5=96b3bdee645f0fc14aed4cb197e85ce0}, author = {Koulali, M.-A. and Kobbane, A. and El Koutbi, M. and Ben-Othman, J.} } @article {Baddi2012123, title = {PIM-SM protocol based architecture to transparent mobile sources in multicast mobile IPv6 diffusion}, journal = {International Conference on Next Generation Networks and Services, NGNS}, year = {2012}, note = {cited By 0}, pages = {123-130}, doi = {10.1109/NGNS.2012.6656079}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84894112218\&doi=10.1109\%2fNGNS.2012.6656079\&partnerID=40\&md5=d2105618aac81d52762377471c23d4e0}, author = {Baddi, Y. and Ech-Chrif El Kettani, M.D.} } @conference {ElKalam2012, title = {Preface [Preface]}, booktitle = {Proceedings of the 2nd National Days of Network Security and Systems, JNS2 2012}, year = {2012}, note = {cited By 0}, doi = {10.1109/JNS2.2012.6249227}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84866688620\&doi=10.1109\%2fJNS2.2012.6249227\&partnerID=40\&md5=7fd94ebf5742b98414b8aca656a1701c}, author = {El Kalam, A.A. and El Bakkali, H. and Ouadghiri, D.} } @conference {Sbai201222, title = {A process pattern for managing evolution of configurable reference process models}, booktitle = {CiSt 2012 - Proceedings: 2012 Colloquium in Information Science and Technology}, year = {2012}, note = {cited By 1}, pages = {22-25}, doi = {10.1109/CIST.2012.6388057}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84872551237\&doi=10.1109\%2fCIST.2012.6388057\&partnerID=40\&md5=631ccb9b68bc1ab1c8ad1eb6e57c7078}, author = {Sba{\"\i}, H. and Fredj, M. and Kjiri, L.} } @conference { ISI:000310353000009, title = {QDGRP : A Hybrid QoS Distributed Genetic Routing Protocol for Wireless Sensor Networks}, booktitle = {2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2012}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Tangiers, MOROCCO, MAY 10-12, 2012}, pages = {47-52}, publisher = {Morocco Sect MTT/AP Joint Chapter}, organization = {Morocco Sect MTT/AP Joint Chapter}, abstract = {Nature-inspired routing protocols have been subject to a great research activity. Their decentralized nature and low requirements make them highly suitable for Wireless Sensor Networks (WSN) where individual nodes operate without central control and without global overview of the network status to achieve global tasks. This paper proposes a hybrid QoS routing protocol for WSN based on a customized Distributed Genetic Algorithm (DGA) that accounts for delay and energy constraints. The proposed protocol (QDGRP) is compared to AODV w.r.t several performance metrics : end-to-end delay, throughput, packet delivery ratio and energy efficiency. The realized simulations show that QDGRP outperforms AODV and manages to achieve very good performances for various deployment scenarios.}, isbn = {978-1-4673-1520-3}, author = {Koulali, Mohammed-Amine and Kobbane, Abdellatif and El Koutbi, Mohammed and Azizi, Mostafa}, editor = {Essaaidi, M and Zaz, Y} } @conference {Koulali201247, title = {QDGRP: A hybrid QoS Distributed Genetic routing protocol for Wireless Sensor Networks}, booktitle = {Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012}, year = {2012}, note = {cited By 2}, pages = {47-52}, doi = {10.1109/ICMCS.2012.6320271}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869852900\&doi=10.1109\%2fICMCS.2012.6320271\&partnerID=40\&md5=d66a629d14ff4cf85a93e8ce6708dbb9}, author = {Koulali, M.-A. and Kobbane, A. and El Koutbi, M. and Azizi, M.} } @conference { ISI:000310353000165, title = {SOASMM: a Novel Service Oriented Architecture Security Maturity Model}, booktitle = {2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2012}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Tangiers, MOROCCO, MAY 10-12, 2012}, pages = {911-917}, publisher = {Morocco Sect MTT/AP Joint Chapter}, organization = {Morocco Sect MTT/AP Joint Chapter}, abstract = {Ensuring SOA developed applications security has become crucial to protect against potential damage and is a sign of confidence for companies that would like to start collaboration based on SOA services. The aim of the present paper is to present the principles of a novel tool that supports the assessment of SOA security maturity of organizations: the SOASMM (SOA Security Maturity Model). This model was defined by incorporating information security best practice approaches in the paradigm of service-oriented architecture using an argued approach and mapping models. Security Indicators deduced in our study denote the complexity of security controls as SOA maturity levels get higher. Besides, as the model that we proposed is based on security standards and best practices, it can be further developed to support organizations to evaluate and adjust their security practices according to their SOA migration plan.}, isbn = {978-1-4673-1520-3}, author = {Kassou, Meryem and Kjiri, Laila}, editor = {Essaaidi, M and Zaz, Y} } @conference {Kassou2012912, title = {SOASMM: A novel service oriented architecture Security Maturity Model}, booktitle = {Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012}, year = {2012}, note = {cited By 2}, pages = {912-918}, doi = {10.1109/ICMCS.2012.6320279}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869852204\&doi=10.1109\%2fICMCS.2012.6320279\&partnerID=40\&md5=906b15ed80beeb81f8012097b9a6bb6f}, author = {Kassou, M. and Kjiri, L.} } @conference { ISI:000338165600142, title = {SOFTWARE COST ESTIMATION BY FUZZY ANALOGY FOR ISBSG REPOSITORY}, booktitle = {UNCERTAINTY MODELING IN KNOWLEDGE ENGINEERING AND DECISION MAKING}, series = {World Scientific Proceedings Series on Computer Engineering and Information Science}, volume = {7}, year = {2012}, note = {10th International Conference on Fuzzy Logic and Intelligent Technologies in Nuclear Science (FLINS), Istanbul, TURKEY, AUG 26-29, 2012}, pages = {863-868}, publisher = {Istanbul Tech Univ; Bahcesehir Univ; Belgian Nucl Res Ctr; Ghent Univ}, organization = {Istanbul Tech Univ; Bahcesehir Univ; Belgian Nucl Res Ctr; Ghent Univ}, abstract = {Software cost estimation is one of the most important and complex tasks in software project management. As a result, several techniques for estimating development effort have been suggested. Fuzzy Analogy is one of these techniques suggested to estimate project effort when it is described either by linguistic or numerical values. Based on reasoning by analogy and fuzzy logic, this technique uses fuzzy representation of software project attributes by using expert knowledge or clustering techniques. From this work, we evaluate the accuracy of this approach to estimate the software effort using the International Software Benchmarking Standards Group (ISBSG) repository.}, isbn = {978-981-4417-73-0}, author = {Idri, Ali and Amazal, Fatima Azzahra}, editor = {Kahraman, C and Kerre, EE and Bozbura, FT} } @conference {Salah2012314, title = {Strategies for applying rules in OWL entailment regimes}, booktitle = {Innovation Vision 2020: Sustainable growth, Entrepreneurship, and Economic Development - Proceedings of the 19th International Business Information Management Association Conference}, volume = {1}, year = {2012}, note = {cited By 0}, pages = {314-324}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84896326867\&partnerID=40\&md5=7b168c4068f656c83a4db115af183fb6}, author = {Salah, A. and El Koutbi, M. and Khriss, I.} } @conference {Khriss2012, title = {Towards change and verification support in collaborative business processes}, booktitle = {Proceedings of 2012 International Conference on Complex Systems, ICCS 2012}, year = {2012}, note = {cited By 0}, doi = {10.1109/ICoCS.2012.6458609}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84874477474\&doi=10.1109\%2fICoCS.2012.6458609\&partnerID=40\&md5=1a5d790aa35e802b38ff94d7d8259d28}, author = {Khriss, I. and Koutbi, M.E. and Dkiouak, Y.} } @article {Baddi2012429, title = {VND-CS: A Variable Neighborhood Descent Algorithm for Core Selection Problem in Multicast Routing Protocol}, journal = {Communications in Computer and Information Science}, volume = {293 PART 1}, year = {2012}, note = {cited By 0}, pages = {429-443}, doi = {10.1007/978-3-642-30507-8_37}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84880475720\&doi=10.1007\%2f978-3-642-30507-8_37\&partnerID=40\&md5=e5e720a0f5591de6f04960b82124be10}, author = {Baddi, Y. and El Kettani, M.D.E.-C.} } @conference { ISI:000310353000111, title = {VNS-RP algorithm for RP selection in multicast routing protocol PIM-SM}, booktitle = {2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2012}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Tangiers, MOROCCO, MAY 10-12, 2012}, pages = {595-600}, publisher = {Morocco Sect MTT/AP Joint Chapter}, organization = {Morocco Sect MTT/AP Joint Chapter}, abstract = {Covering both theoretical and practical interest in different networks layers, multicast routing remains an important topic. In network layer, there are several multicast routing protocols using different multicast routing trees in the literature. However PIM-SM and CBT protocols remains the most used multicast routing protocols; they propose using a shared tree (ST). This kind of tree provides efficient management of multicast path in changing group memberships, scalability and performance. The main problem concerning the construction of a shared tree is to determine the best position of the root. Selection of the core (in CBT protocol) or Rendezvous Point RP (in PIM-SM protocol) affects directly both structure of multicast tree and routing scheme performances of multicast session accordingly. This paper proposes a multicast RP selection algorithm based on VNS search. This algorithm selects the RP router with systematic change of arbitrarily chosen neighborhoods by considering both cost and delay functions. Simulation results show that good performance is achieved in terms of multicast cost, end-to-end delay, tree construction delay and others metrics.}, isbn = {978-1-4673-1520-3}, author = {Baddi, Youssef and Ech-Chrif El Kettani, Mohamed Dafir}, editor = {Essaaidi, M and Zaz, Y} } @conference {Baddi2012595, title = {VNS-RP algorithm for RP selection in multicast routing protocol PIM-SM}, booktitle = {Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012}, year = {2012}, note = {cited By 1}, pages = {595-600}, doi = {10.1109/ICMCS.2012.6320123}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869860517\&doi=10.1109\%2fICMCS.2012.6320123\&partnerID=40\&md5=4f285c9563e66243e62944313c2621c7}, author = {Baddi, Y. and Ech-Chrif El Kettani, M.D.} } @conference {Hafiddi2011176, title = {A context-aware service centric approach for service oriented architectures}, booktitle = {ICEIS 2011 - Proceedings of the 13th International Conference on Enterprise Information Systems}, volume = {3 ISAS}, year = {2011}, note = {cited By 4}, pages = {176-183}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84865112643\&partnerID=40\&md5=2dc55c40ac4f93da3355ed544dba2d19}, author = {Hafiddi, H. and Nassar, M. and Baidouri, H. and El Asri, B. and Kriouile, A.} } @article {Tembine20111529, title = {Dynamic robust power allocation games under channel uncertainty and time delays}, journal = {Computer Communications}, volume = {34}, number = {12}, year = {2011}, note = {cited By 1}, pages = {1529-1537}, doi = {10.1016/j.comcom.2011.02.009}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79959380843\&doi=10.1016\%2fj.comcom.2011.02.009\&partnerID=40\&md5=5103dd198356953b3e6cf4a1d9c94519}, author = {Tembine, H. and Kobbane, A. and Koutbi, M.E.} } @article { ISI:000293491800013, title = {Dynamic robust power allocation games under channel uncertainty and time delays}, journal = {COMPUTER COMMUNICATIONS}, volume = {34}, number = {12}, year = {2011}, month = {AUG 2}, pages = {1529-1537}, abstract = {In this paper, we study dynamic robust power allocation strategies under the imperfectness of the channel state information at the transmitters. Considering unknown payoff functions at the transmitters, we propose an heterogeneous Delayed COmbined fully Distributed Payoff and Strategy Reinforcement Learning (Delayed-CODIPAS-RL) in which each transmitter learns its payoff function as well as its associated optimal strategies in the long-term. We show that equilibrium power allocations can be obtained using the multiplicative weighted imitative CODIPAS-RLs and Bush-Mosteller based CODIPAS-RL. We also show almost sure convergence to the set of global optima for specific scenarios. (C) 2011 Elsevier B.V. All rights reserved.}, issn = {0140-3664}, doi = {10.1016/j.comcom.2011.02.009}, author = {Tembine, Hamidou and Kobbane, Abdellatif and El koutbi, Mohamed} } @conference {Khaled2011339, title = {A framework for ERP evaluation and selection using macbeth technique}, booktitle = {ICEIS 2011 - Proceedings of the 13th International Conference on Enterprise Information Systems}, volume = {1 DISI}, year = {2011}, note = {cited By 2}, pages = {339-342}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84865136975\&partnerID=40\&md5=f049cbf45902225041bc1a10dec72db9}, author = {Khaled, A. and Idrissi, M.A.J.} } @conference {Hafiddi201155, title = {How can service oriented systems make beneficial use of model driven architecture and aspect paradigm?}, booktitle = {Proceedings - 6th IEEE International Symposium on Service-Oriented System Engineering, SOSE 2011}, year = {2011}, note = {cited By 2}, pages = {55-60}, doi = {10.1109/SOSE.2011.6139092}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84857282312\&doi=10.1109\%2fSOSE.2011.6139092\&partnerID=40\&md5=a9c0605ada6c82e935b293777442d55d}, author = {Hafiddi, H. and Nassar, M. and Kriouile, A.} } @conference { ISI:000307329300033, title = {A Learning Driven Model for ERP Software Selection Based on the Choquet Integral: Small and Medium Enterprises Context}, booktitle = {DIGITAL ENTERPRISE AND INFORMATION SYSTEMS}, series = {Communications in Computer and Information Science}, volume = {194}, year = {2011}, note = {International Conference on Digital Enterprise and Information Systems, London Metropolitan Univ, London, ENGLAND, JUL 20-22, 2011}, pages = {358-371}, publisher = {Springer}, organization = {Springer}, abstract = {Historically, Enterprise Resource Planning (ERP) systems were initially destined to large companies in order to standardize and streamline their key business processes. Recently, they have been increasingly adopted by Small and Medium Enterprises (SMEs). However, making strategic tradeoffs among the various marketplace solutions is a troublesome balance task for SMEs without the rescue of systematic decision approaches. This paper addresses the question of how to choose an ERP solution that best suits a given SME. It serves twofold objectives; firstly it defines a set of selection criteria related to SMEs{\textquoteright} context. Secondly. it presents a selection methodology based on the construction of an induced decision model through capturing the decision maker{\textquoteright}s preferences. The key contribution of this paper is the introduction of a new iterative learning based approach destined to make enlightened decisions through the consideration of interdependencies among the adopted selection criteria thanks to the Choquet integral.}, isbn = {978-3-642-22602-1}, issn = {1865-0929}, author = {Khaled, Abdelilah and Idrissi, Mohammed Abdou Janati}, editor = {Ariwa, E and ElQawasmeh, E} } @article {Khaled2011358, title = {A learning driven model for ERP software selection based on the Choquet integral: Small and medium enterprises context}, journal = {Communications in Computer and Information Science}, volume = {194 CCIS}, year = {2011}, note = {cited By 0}, pages = {358-371}, doi = {10.1007/978-3-642-22603-8_33}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-80052149005\&doi=10.1007\%2f978-3-642-22603-8_33\&partnerID=40\&md5=951af2141b5b67ed938f10012b97b61f}, author = {Khaled, A. and Abdou Janati Idrissi, M.} } @conference { ISI:000300256400069, title = {Maturity Models Transition from eGovernment Interoperability to T-Government: Restyling Dynamic Public Services Through Integrated Transformation of Service Delivery}, booktitle = {PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON EGOVERNMENT}, year = {2011}, note = {11th European Conference on e-Government (ECEG), Univ Ljubljana, Fac Adm, Ljubljana, SLOVENIA, JUN 16-17, 2011}, pages = {591-602}, abstract = {Transforming public services through a global, common, measurable, achievable vision and clear objectives, the use of Information and Communication Technology and referral to services focused on the citizens needs have an important effect on economic, social and cultural life across the country that extends globally. The aim of this paper is to outline the part of the transformation of government services by defining the guidelines for implementation and monitoring procedures necessary to support any model of maturity to ensure the successful transformation of public services in a safe flexible and adaptable. The model we seek to build is based on best practices in service management, governance, enterprise architecture, and implementation of Information Technology.}, isbn = {978-1-908272-00-3}, author = {El Aichi, Mohamed Mohyi Eddine and El Kettani, Mohamed Dafir Ech-Cherif}, editor = {Klun, M and Decman, M and Jukic, T} } @conference {ElAichi2011591, title = {Maturity models transition from eGovernment interoperability to t-government: Restyling dynamic public services through integrated transformation of service delivery}, booktitle = {Proceedings of the European Conference on e-Government, ECEG}, year = {2011}, note = {cited By 0}, pages = {591-602}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84870934201\&partnerID=40\&md5=325c84d83665729bf6b3ba713949b9f2}, author = {El Aichi, M.M.E. and El Kettani, M.D.E.-C.} } @conference { ISI:000371495900010, title = {Measure of Fuzzy Presence of Descriptors on Arabic Text Mining}, booktitle = {2012 COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}12)}, series = {Colloquium in Information Science and Technology}, year = {2011}, note = {IEEE Colloquium on Information Science and Technology (CIST), Fez, MOROCCO, OCT 22-24, 2012}, pages = {58-63}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; USMBA IEEE Student Branch; Faculty of Sciences Dhar Mahraz; Faculty of Technical Sciences of Fez; IEEE Comp Soc; IEEE Commun Soc}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; USMBA IEEE Student Branch; Faculty of Sciences Dhar Mahraz; Faculty of Technical Sciences of Fez; IEEE Comp Soc; IEEE Commun Soc}, abstract = {In the present work, we propose a new model of radical descriptors in Arabic Text Mining. This model will be based on the addition of lexical information contained in the morphological pattern of the Arabic word. We developed a statistical model by Hidden Markov Chain to disambiguate the morphological analysis of corpora, and we propose a new method to measure the relationship between descriptors based on a notion of {\textquoteleft}{\textquoteleft}fuzzy measure of the presence{{\textquoteright}{\textquoteright}} and we adapt the traditional statistical measures to this context, and we outline the key measures of similarity and distances used in Text Mining.}, isbn = {978-1-4673-2725-1}, issn = {2327-185X}, author = {El Hassani, Ibtissam and Kriouile, Abdelaziz and Benghabrit, Youssef}, editor = {ElMohajir, M and Begdouri, A and ElMohajir, BE and Zarghili, A} } @conference {Machach2011325, title = {Mining social network data for decision support purposes in a teaching context}, booktitle = {Proceedings of the IADIS International Conference Information Systems 2011, IS 2011}, year = {2011}, note = {cited By 0}, pages = {325-329}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84944034507\&partnerID=40\&md5=93b2a6856fcbb2ea953d1baa0ab4f50e}, author = {Machach, S. and Chiheb, R. and Kassou, I.} } @conference {Hafiddi2011, title = {A model driven approach for context-aware services development}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2011}, note = {cited By 6}, doi = {10.1109/ICMCS.2011.5945628}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79961237316\&doi=10.1109\%2fICMCS.2011.5945628\&partnerID=40\&md5=b09e1287fcbf49b9b8cc1fb6ff702c95}, author = {Hafiddi, H. and Baidouri, H. and Nassar, M. and Asri, B.E. and Kriouile, A.} } @conference { ISI:000371495900003, title = {Model ISR3M for assessing maturity of IS risk management process Case study}, booktitle = {2012 COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}12)}, series = {Colloquium in Information Science and Technology}, year = {2011}, note = {IEEE Colloquium on Information Science and Technology (CIST), Fez, MOROCCO, OCT 22-24, 2012}, pages = {16-21}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; USMBA IEEE Student Branch; Faculty of Sciences Dhar Mahraz; Faculty of Technical Sciences of Fez; IEEE Comp Soc; IEEE Commun Soc}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; USMBA IEEE Student Branch; Faculty of Sciences Dhar Mahraz; Faculty of Technical Sciences of Fez; IEEE Comp Soc; IEEE Commun Soc}, abstract = {We aim through this article to contribute to the development of information system (IS) governance and more specifically of IS risk management (RM). We then propose a maturity model for IS risk management and we implement it on a case study following all the steps in the model designed. Those steps are: defining the list of information systems of the organization, measuring the maturity for each of those IS taking into account the evolution in its life cycle, measuring the consolidated maturity of IS risk management process for the organization.}, isbn = {978-1-4673-2725-1}, issn = {2327-185X}, author = {Elmaallam, Mina and Kriouile, Abdelaziz}, editor = {ElMohajir, M and Begdouri, A and ElMohajir, BE and Zarghili, A} } @conference { ISI:000371495900004, title = {A process pattern for managing evolution of configurable reference process models}, booktitle = {2012 COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}12)}, series = {Colloquium in Information Science and Technology}, year = {2011}, note = {IEEE Colloquium on Information Science and Technology (CIST), Fez, MOROCCO, OCT 22-24, 2012}, pages = {22-25}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; USMBA IEEE Student Branch; Faculty of Sciences Dhar Mahraz; Faculty of Technical Sciences of Fez; IEEE Comp Soc; IEEE Commun Soc}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; USMBA IEEE Student Branch; Faculty of Sciences Dhar Mahraz; Faculty of Technical Sciences of Fez; IEEE Comp Soc; IEEE Commun Soc}, abstract = {During the last years, reference process modeling becomes an efficient approach for reuse in business process modeling (BPM). Many BPM tools provide mechanisms to adapt reference process models in order to meet new needs. However, this adaptation results in a set of variants which have to be managed. One of the most proposed solutions is the configurable process model. Therefore, evolving this configurable process model in terms of activities, a data flows and resources changes becomes a crucial issue. In this paper, we propose a process pattern which guides designers for managing evolution of configurable reference process models.}, isbn = {978-1-4673-2725-1}, issn = {2327-185X}, author = {Sbai, Hanae and Fredj, Mounia and Kjiri, Laila}, editor = {ElMohajir, M and Begdouri, A and ElMohajir, BE and Zarghili, A} } @conference {Benamar2011, title = {Reducing dogleg routing in mobile IPv6 by the enhancement of home agents deployment}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2011}, note = {cited By 0}, doi = {10.1109/ICMCS.2011.5945668}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79961225679\&doi=10.1109\%2fICMCS.2011.5945668\&partnerID=40\&md5=34e5208800d44416aca76bbb4db54727}, author = {Benamar, M. and Koutbi, M.E. and Benamar, N. and Mezrioui, A.} } @conference {Koudougnon2011, title = {Sphere decoding based on QR decomposition in STBC}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2011}, note = {cited By 1}, doi = {10.1109/ICMCS.2011.5945624}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79961243030\&doi=10.1109\%2fICMCS.2011.5945624\&partnerID=40\&md5=909487fa6b86a92432568997aba2bdb6}, author = {Koudougnon, H. and Saadane, R. and Belkasmi, M.} } @article {Zbakh201115, title = {A tasks allocation algorithm for distributed systems}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {33}, number = {1}, year = {2011}, note = {cited By 2}, pages = {15-21}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-81455136743\&partnerID=40\&md5=0f511f4a564ca12a8b453b80d6074f6a}, author = {Zbakh, M. and El Kettani, M.D.} } @conference {Kedji2011414, title = {Towards a tool-supported approach for collaborative process modeling and enactment}, booktitle = {Proceedings - Asia-Pacific Software Engineering Conference, APSEC}, year = {2011}, note = {cited By 0}, pages = {414-421}, doi = {10.1109/APSEC.2011.54}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84856603255\&doi=10.1109\%2fAPSEC.2011.54\&partnerID=40\&md5=4e34de77b1aba838e25b7d14ae3ebd02}, author = {Kedji, K.A. and That, M.T.T. and Coulette, B. and Lbath, R. and Tran, H.N. and Nassar, M.} } @article {En-Nasry201156, title = {Towards an open framework for mobile digital identity management through strong authentication methods}, journal = {Communications in Computer and Information Science}, volume = {187 CCIS}, year = {2011}, note = {cited By 0}, pages = {56-63}, doi = {10.1007/978-3-642-22365-5_8}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79960202116\&doi=10.1007\%2f978-3-642-22365-5_8\&partnerID=40\&md5=2a1d54bd46e051959cb768e04590638c}, author = {En-Nasry, B. and Dafir Ech-Cherif El Kettani, M.} } @conference { ISI:000307083000008, title = {Towards an Open Framework for Mobile Digital Identity Management through Strong Authentication Methods}, booktitle = {SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS}, series = {Communications in Computer and Information Science}, volume = {187}, year = {2011}, note = {International Workshop on Convergence Security in Pervasive Environments, (IWCS 2011)/International Workshop on Security on Security and Trust for Applications in Virtualized Environments, (STAVE 2011), Loutraki, GREECE, JUN 28-30, 2011}, pages = {56-63}, abstract = {Mobile computing becoming a widespread working tool, and a large scale deployed technology, it should be strong enough to meet basic security expectations. Privacy in a mobile environment should be driven by the choice of appropriate identity management mechanisms, that will have a large impact on different aspects of daily life. But people being unable to spend all their time administering their digital identities, the implementation of mobile identity management technologies has become a top priority for involved companies, in order to protect their customers against fraudsters. Today. identity management and strong authentication are converging, since provided solutions encompass user access, signing and verification of users and transactions, through strong authentication: Although, simply using strong authentication will not resolve all mobile digital identity requirements from a security viewpoint; our objective is to propose an extensible protocol based on an independent architectural model that provides a foundation for user-centric identity management.}, isbn = {978-3-642-22364-8}, issn = {1865-0929}, author = {En-Nasry, Brahim and El Kettani, Mohamed Dafir Ech-Cherif}, editor = {Lee, C and Seigneur, JM and Park, JJ and Wagner, RR} } @conference {Koudougnon2010, title = {PAPR reduction using block coding combined with companding}, booktitle = {2010 5th International Symposium on I/V Communications and Mobile Networks, ISIVC 2010}, year = {2010}, note = {cited By 0}, doi = {10.1109/ISVC.2010.5656195}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-78651484205\&doi=10.1109\%2fISVC.2010.5656195\&partnerID=40\&md5=15b061fa94450a6529ed579ef2147ee8}, author = {Koudougnon, H. and Chana, I. and Saadane, R. and Belkasmi, M.} } @conference {Oudidi2010165, title = {QoS routing using OLSR protocol}, booktitle = {International Conference on Communications - Proceedings}, year = {2010}, note = {cited By 1}, pages = {165-171}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79958704229\&partnerID=40\&md5=b671b4b4cac801b42c9f9164a18f99ea}, author = {Oudidi, K. and Hajami, A. and Koutbi, M.} } @conference {Tembine2010, title = {Robust power allocation games under channel uncertainty and time delays}, booktitle = {2010 IFIP Wireless Days, WD 2010}, year = {2010}, note = {cited By 0}, doi = {10.1109/WD.2010.5657740}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-78751549432\&doi=10.1109\%2fWD.2010.5657740\&partnerID=40\&md5=d221e9e9441f6d59228be21fe99203da}, author = {Tembine, H. and Kobbane, A. and El Koutbi, M.} } @article {5099547320100301, title = {The Uplink Capacity Evaluation of Wireless Networks: Spectral Analysis Approach.}, journal = {Journal of Computing \& Information Technology}, volume = {18}, number = {1}, year = {2010}, pages = {1 - 17}, abstract = {In this paper we study the capacity of wireless cellular network, in particular the uplink of WCDMA system by using the two dimensional continuous-time Markov chain (CTMC) technique. Considering two types of calls: real-time (RT) calls characterized by a quasi fixed transmission rate, and best-effort (BE) calls which do not require strict demand but need some reliability conditions, we develop an approach based on the spectral analysis for evaluating the cell capacity. We explicitly obtain the simultaneous distribution of the number of RT connections and the number of BE connections in the steady-state. This analysis allows us to simplify the computation of the performance measures including expected delay and throughput of BE traffic. These performances are obtained explicitly in both cases (finite and infinite) of BE calls as function of system parameters like arrival rate of BE and RT calls, service rate of BE and RT calls. These results allow the operator to evaluate the cell capa}, keywords = {call admission control, Data transmission systems, Markov processes, Matrix-Geometric method, Mobile communication systems, spectral analysis approach, Spectrum analysis, Telecommunication systems, Wireless communication systems, wireless networks}, issn = {13301136}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=50995473\&site=ehost-live}, author = {Kobbane, Abdellatif and El-Azouzi, Rachid and Ibrahimi, Khalil and Samanta, Sujit Kumar and Bouyakhf, El-Houssine} } @conference {DeBarros200937, title = {AQM applications in MAODV ad hoc network}, booktitle = {16th International Conference on Telecommunications, ICT 2009}, year = {2009}, note = {cited By 0}, pages = {37-40}, doi = {10.1109/ICTEL.2009.5158615}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-77950670401\&doi=10.1109\%2fICTEL.2009.5158615\&partnerID=40\&md5=670f14dd45610aa5cd5640d6936ca1da}, author = {De Barros, M.A.P. and El Koutbi, M.} } @conference { ISI:000274539400007, title = {AQM applications in MAODV ad hoc network}, booktitle = {2009 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT)}, year = {2009}, note = {16th International Conference on Telecommunications (ICT), Marrakech, MOROCCO, MAY 25-27, 2009}, pages = {37-40}, abstract = {Disaster relief, education, and military are common situations where nodes need to communicate in areas without any preexisting infrastructure. In these situations, ad-hoc networks are used. Active Queue Management (AQM) has been successfully demonstrated as a solution to the global synchronization problem in the context of wired networks. To the best of our knowledge there is limited research work on the effect of queuing mechanisms in these networks (multicast in particular). We provided performance comparisons of Priority Queuing (PriQ), Drop Tail (DT) and Deficit Round Robin (DRR) which are some queues mechanisms, in ad-hoc network using MAODV protocol.}, isbn = {978-1-4244-2936-3}, doi = {10.1109/ICTEL.2009.5158615}, author = {de Barros, Manuel A. P. and El Koutbi, Mohammed} } @conference {Nassar2009412, title = {Code generation in VUML profile: A model driven approach}, booktitle = {2009 IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009}, year = {2009}, note = {cited By 4}, pages = {412-419}, doi = {10.1109/AICCSA.2009.5069358}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-70349911813\&doi=10.1109\%2fAICCSA.2009.5069358\&partnerID=40\&md5=e4b947f9a88ea213061c85e81691b486}, author = {Nassar, M. and Anwar, A. and Ebersold, S. and Elasri, B. and Coulette, B. and Kriouile, A.} } @conference { ISI:000271458300071, title = {Code Generation in VUML Profile: A Model Driven Approach}, booktitle = {2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2}, year = {2009}, note = {7th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-09), Rabat, MOROCCO, MAY 10-OCT 13, 2009}, pages = {412-419}, publisher = {ACS; IEEE}, organization = {ACS; IEEE}, abstract = {VUML is a view-based analysis/design method offering a formalism (UML profile) and a process to model software systems through objects and views. The main extension to UML is the multiview class whose goal is to store and deliver information according to the user{\textquoteright}s viewpoint. VUML supports the dynamic change of viewpoints and offers mechanisms to describe view dependencies. On the semantics side, the VUML meta-model extends the UML one with OCL rules. VUML proposes also a generic implementation pattern to generate the object code corresponding to a VUML class diagram. The proposed pattern uses delegation, handle technique and polymorphism. to implement views. In this paper, we present a model driven implementation of this pattern, which integrates the multi-user aspect and supports Java language. We propose a code generation technique that respects the pattern and uses the MDA approach. We specify transformations as a collection of rules implemented in ATL. The proposal is illustrated by a simple example.}, isbn = {978-1-4244-3807-5}, doi = {10.1109/AICCSA.2009.5069358}, author = {Nassar, Mahmoud and Anwar, Adil and Ebersold, Sophie and Elasri, Bouchra and Coulette, Bernard and Kriouile, Abdelaziz} } @conference {Kenzi20099, title = {Engineering adaptable service oriented systems: A model driven approach}, booktitle = {IEEE International Conference on Service-Oriented Computing and Applications, SOCA{\textquoteright} 09}, year = {2009}, note = {cited By 0}, pages = {9-16}, doi = {10.1109/SOCA.2009.5410473}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-77950275155\&doi=10.1109\%2fSOCA.2009.5410473\&partnerID=40\&md5=3623db8d3a57913ef5e70a14c4782c49}, author = {Kenzi, A. and El Asri, B. and Nassar, M. and Kriouile, A.} } @conference { ISI:000289870300013, title = {GDCoS: A Group Dedicated Class of Service for QoS Multicast Provisioning in ISP Communication Networks}, booktitle = {2009 FIRST INTERNATIONAL CONFERENCE ON EVOLVING INTERNET (INTERNET 2009)}, year = {2009}, note = {1st International Conference on Evolving Internet, Cannes, FRANCE, AUG 23-29, 2009}, pages = {77-82}, abstract = {Offering new Multicast Services supporting Quality of Service becomes essential for an Internet Service Provider at the worldwide level. The {\textquoteleft}{\textquoteleft}IP Multicasr technology is stable, but scalability of {\textquoteleft}{\textquoteleft}Quality of Service multicast{{\textquoteright}{\textquoteright}} is further from being solved, since scalability problems appear with the increasing number of concurrently active multicast groups. In this paper, we propose a framework that offers Quality of Service enabled multicast. We start with discussing the drawbacks of Quality of Service policies that are currently adopted by Service Providers, and point out their real needs from a multicast view point. In our approach, a Service Provider will propose an independent Class of Service dedicated to multicast applications. We describe the properties of this {\textquoteleft}{\textquoteleft}Dedicated Class of Service{{\textquoteright}{\textquoteright}}, and associate {\textquoteleft}{\textquoteleft}Admission Control{{\textquoteright}{\textquoteright}} mechanisms. We discuss the advantages of our approach, based on multicast extensions and adaptations of Diffserv model. Implementation issues are also presented in an MPIS environment. We conclude, through a case study, that it is possible to dedicate a class of service for multicast traffic.}, isbn = {978-1-4244-4718-3}, author = {El Kettani, Mohamed Dafir Ech-Cherif and Khatib, AbdelAli}, editor = {Borcoci, E and McKee, S and Bogliolo, A and Dini, O} } @conference {Ech-CherifElKettani200977, title = {GDCoS: A Group Dedicated Class of Service for QoS multicast provisioning in ISP communication networks}, booktitle = {1st International Conference on Evolving Internet, INTERNET 2009}, year = {2009}, note = {cited By 1}, pages = {77-82}, doi = {10.1109/INTERNET.2009.19}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-71249105711\&doi=10.1109\%2fINTERNET.2009.19\&partnerID=40\&md5=dea3436aa5651978833ac72fb615248e}, author = {Ech-Cherif El Kettani, M.D. and Khatib, A.} } @article {Khafaji200923, title = {Impact of human bodies on millimetric bands propagation using ray tracing technique}, journal = {Physical and Chemical News}, volume = {50}, year = {2009}, note = {cited By 0}, pages = {23-31}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-76749122475\&partnerID=40\&md5=b6be17acabeae92674dae2050eac6732}, author = {Khafaji, A. and Saadane, R. and El Abbadi, J. and Belkasmi, M. and Farchi, A.} } @conference {Kenzi2009404, title = {A model driven framework for multiview service oriented system development}, booktitle = {2009 IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009}, year = {2009}, note = {cited By 6}, pages = {404-411}, doi = {10.1109/AICCSA.2009.5069357}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-70349932401\&doi=10.1109\%2fAICCSA.2009.5069357\&partnerID=40\&md5=a9cadf073eddaaf45fb3c1676e6acd84}, author = {Kenzi, A. and El Asri, B. and Nassar, M. and Kriouile, A.} } @conference { ISI:000271458300070, title = {A model driven framework for multiview service oriented system development}, booktitle = {2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2}, year = {2009}, note = {7th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-09), Rabat, MOROCCO, MAY 10-OCT 13, 2009}, pages = {404-411}, publisher = {ACS; IEEE}, organization = {ACS; IEEE}, abstract = {The challenge in the development of complex systems is to cope with the dynamic nature of the user{\textquoteright}s profile, especially when such systems are exposed to the large public through the Internet. In Service oriented computing (SOC), a service may interact with several types of service clients. The central problem is, therefore, how to model the multidimensional aspect of service clients{\textquoteright} needs and requirements. To tackle this problem, we propose in this paper the concept of the multiview service as a first class modeling entity that permits the representation of the needs and requirements of end-users by separating their concerns. Such adaptable services must carefully be analyzed and designed. However, current works on service oriented analysis and design (SOAD) largely focus on defining processes to develop business processes and services without considering user-aware variability. In the present paper we present an MDA framework for a muliview SOAD process for the development of highly adaptable services. We specify transformations as a collection of rules implemented in ATL. The proposal is illustrated by a simple example.}, isbn = {978-1-4244-3807-5}, doi = {10.1109/AICCSA.2009.5069357}, author = {Kenzi, Adil and El Asri, Bouchra and Nassar, Mahmoud and Kriouile, Abdelaziz} } @conference { ISI:000267425300017, title = {Multiview Components for User-Aware Web Services}, booktitle = {ENTERPRISE INFORMATION SYSTEMS-BK}, series = {Lecture Notes in Business Information Processing}, volume = {24}, year = {2009}, note = {11th International Conference on Enterprise Information Systems, Milan, ITALY, MAY 06-10, 2009}, pages = {196-207}, publisher = {Inst Syst \& Technol Informat, Control \& Commun; AAAI; ACM SIGMIS; Japanese IEICE SWIM; Workflow Management Coalit}, organization = {Inst Syst \& Technol Informat, Control \& Commun; AAAI; ACM SIGMIS; Japanese IEICE SWIM; Workflow Management Coalit}, abstract = {Component based software (CBS) intends to meet the need of reusability and productivity. Web service technology leads to systems interoperability. This work addresses the development of CBS using web services technology. Undeniably, web service may interact with several types of service clients. The central problem is, therefore, how to handle the multidimensional aspect of service clients{\textquoteright} needs and requirements. To tackle this problem, we propose the concept of multiview component as a first class modelling entity that allows the capture of the various needs of service clients by separating their functional concerns. In this paper, we propose a model driven approach for the development of user-aware web services on the basis of the multiview component concept. So, we describe how multiview component based PIM are transformed into two PSMs for the purpose of the automatic generation of both the user-aware web services description and implementation. We specify transformations as a collection of transformation rules implemented using ATL as a model transformation language.}, isbn = {978-3-642-01346-1}, issn = {1865-1348}, author = {El Asri, Bouchra and Kenzi, Adil and Nassar, Mahmoud and Kriouile, Abdelaziz and Barrahmoune, Abdelaziz}, editor = {Filipe, J and Cordeiro, J} } @article {ElAsri2009196, title = {Multiview components for user-aware web services}, journal = {Lecture Notes in Business Information Processing}, volume = {24 LNBIP}, year = {2009}, note = {cited By 3}, pages = {196-207}, doi = {10.1007/978-3-642-01347-8_17}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-65949111093\&doi=10.1007\%2f978-3-642-01347-8_17\&partnerID=40\&md5=fa55771c0bc928fcc7a332af2abc8afc}, author = {El Asri, B. and Kenzi, A. and Nassar, M. and Kriouile, A. and Barrahmoune, A.} } @conference {ElKettani2009236, title = {NCSecMM: A national cyber security maturity model for an interoperable "National cyber security" framework}, booktitle = {Proceedings of the European Conference on e-Government, ECEG}, year = {2009}, note = {cited By 2}, pages = {236-247}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84871878180\&partnerID=40\&md5=5b922df54e6a4812752ad717ef5a6b95}, author = {El Kettani, M.D.E.-C. and Debbagh, T.} } @conference { ISI:000274084500026, title = {NCSecMM: A National Cyber Security Maturity Model for an Interoperable {\textquoteleft}{\textquoteleft}National Cyber Security{{\textquoteright}{\textquoteright}} Framework}, booktitle = {9TH EUROPEAN CONFERENCE ON E-GOVERNMENT, PROCEEDINGS}, year = {2009}, note = {9th European Conference on e-Government, Univ Westminister Business Sch, London, ENGLAND, JUN 29-30, 2009}, pages = {236-247}, abstract = {Security Maturity Model is a systematic approach that replaces traditional security metrics. There is more than one Security Maturity Model (SMM, COBIT, CERT/CSO, ISM3), and each of them has only five levels of maturity, providing the blueprint for a complete security program, telling management the order in which to implement security elements (ISM3 Consortium 2007), and leading toward the use of best practice standards (e.g., BS 17799). But none of them is dedicated to National Cybersecurity. We propose in this paper a {\textquoteleft}{\textquoteleft}National CyberSecurity Maturity Model{{\textquoteright}{\textquoteright}}, that will make it possible to evaluate the security of a country or a whole region, making thus comparisons between them, and pointing out its forces and threats.}, isbn = {978-1-906638-33-7}, author = {El Kettani, Mohamed Dafir Ech-Cherif and Debbagh, Taieb}, editor = {Hahamis, P and Remenyi, D} } @conference {ElAsri20091, title = {Vers une architecture MVSOA pour la mise en oeuvre des composants multivue}, booktitle = {CAL 2009 - 3rd Conference Francophone sur les Architectures Logicielles}, year = {2009}, note = {cited By 0}, pages = {1-16}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84874262952\&partnerID=40\&md5=259ee2685304602210abdadb34836420}, author = {El Asri, B. and Kenzi, A. and Nassar, M. and Kriouile, A.} } @conference {Kenzi2008, title = {Multi-functional service oriented system development for user-driven adaptability}, booktitle = {2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA}, year = {2008}, note = {cited By 1}, doi = {10.1109/ICTTA.2008.4530324}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-49149094527\&doi=10.1109\%2fICTTA.2008.4530324\&partnerID=40\&md5=b8973d451157200b212f00e1175dfa0a}, author = {Kenzi, A. and El Asri, B. and Nassar, M. and Kriouile, A.} } @conference { ISI:000261578000263, title = {Multi-functional service oriented system development for user-driven adaptability}, booktitle = {2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5}, year = {2008}, note = {3rd International Conference on Information and Communication Technologies, Damascus, SYRIA, APR 07-11, 2008}, pages = {1431-1437}, abstract = {Modern enterprises need to respond effectively and pertinently to users need in a competitive markets. In order to cope with the dynamic nature of user profiles, we propose, in this paper, a Multi-Functional Service oriented system development. While the concept of a service is not new on itself, the multifunctional one provides a convenient new concept which addresses separate properties that cope to different user business domain respecting information pertinence and access right definition. So we focus on a user-driven adaptability of services components. Thus, we present multi-functional service concept; we give a process to identify services common and specific interest according to different user through use cases. We continue our process so to design and deploy such services in the context of the model driven architecture.}, isbn = {978-1-4244-1751-3}, author = {Kenzi, Adil and El Asri, Bouchra and Nassar, Mahmoud and Kriouile, Abdelaziz} } @conference {Kenzi200838, title = {The multiview service : A new concept for the development of adaptable Service Oriented systems}, booktitle = {Proceedings of the 4th IEEE International Symposium on Service-Oriented System Engineering, SOSE 2008}, year = {2008}, note = {cited By 2}, pages = {38-43}, doi = {10.1109/SOSE.2008.31}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-62249157099\&doi=10.1109\%2fSOSE.2008.31\&partnerID=40\&md5=1e64b5ddf0ad5ddb3c8491f8544409a9}, author = {Kenzi, A. and Asri, B.E. and Nassar, M. and Kriouile, A.} } @conference {ElKettani2008373, title = {NCSec-A national Cyber security Referential for the development of a code of practice in national Cyber security management}, booktitle = {ACM International Conference Proceeding Series}, volume = {351}, year = {2008}, note = {cited By 1}, pages = {373-380}, doi = {10.1145/1509096.1509174}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-70349154613\&doi=10.1145\%2f1509096.1509174\&partnerID=40\&md5=472b2d57a810d6024f9a4b02047a233d}, author = {El Kettani, M.D.E.-C. and Debbagh, T.} } @conference { ISI:000262046500010, title = {A New Artificial Immune System for the Detection of Abnormal Behaviour}, booktitle = {SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING}, series = {Studies in Computational Intelligence}, volume = {149}, year = {2008}, note = {9th International Conference on Software Engineering Artificial Intelligence, Networking and Parallel/Distributed Computing, Phuket, THAILAND, AUG 06-08, 2008}, pages = {113-122}, publisher = {Int Assoc Comp \& Informat Sci; IEEE; IEEE Comp Soc; UniNet; Thailand Convent \& Exhibit Bureau}, organization = {Int Assoc Comp \& Informat Sci; IEEE; IEEE Comp Soc; UniNet; Thailand Convent \& Exhibit Bureau}, abstract = {We propose in this paper a new Artificial Immune System (AIS) named NK system, for the detection of abnormal behaviour with an unsupervised approach. Its originality resides in the unsupervised detection based on the mechanism of NK cell (Natural Killer cell) contrary to the existing AIS that use supervised approaches based on the mechanisms of the T and B cells. The NK cells develop the capacity to recognize the molecules of self-MHC through a unique class of receptors that can inhibit or activate its natural mechanism of the antigens elimination. In this paper, the NK system is applied to the detection of fraud in mobile phone. The experimental results axe very satisfactory instead of the very weak proportion of the fraudulent operations in our sample.}, isbn = {978-3-540-70559-8}, issn = {1860-949X}, doi = {10.1007/978-3-540-70560-4\_10}, author = {Elmeziane, Rachid and Berrada, Ilham and Kassou, Ismail}, editor = {Lee, R} } @article {Elmeziane2008113, title = {A new artificial immune system for the detection of abnormal behaviour}, journal = {Studies in Computational Intelligence}, volume = {149}, year = {2008}, note = {cited By 1}, pages = {113-122}, doi = {10.1007/978-3-540-70560-4_10}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-52049089233\&doi=10.1007\%2f978-3-540-70560-4_10\&partnerID=40\&md5=d907d2de93d5249a4ec8aa418b36c4a9}, author = {Elmeziane, R. and Berrada, I. and Kassou, I.} } @conference {Anwar2008360, title = {A QVT-based approach for model composition application to the VUML profile}, booktitle = {ICEIS 2008 - Proceedings of the 10th International Conference on Enterprise Information Systems}, volume = {2 ISAS}, year = {2008}, note = {cited By 3}, pages = {360-367}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-55849113397\&partnerID=40\&md5=5f1c1fa60105fdd355ccff73f9eb30e4}, author = {Anwar, A. and Ebersold, S. and Nassar, M. and Coulette, B. and Kriouile, A.} } @conference {Anwar200883, title = {Towards a generic approach for model composition}, booktitle = {Proceedings - The 3rd International Conference on Software Engineering Advances, ICSEA 2008, Includes ENTISY 2008: International Workshop on Enterprise Information Systems}, year = {2008}, note = {cited By 2}, pages = {83-90}, doi = {10.1109/ICSEA.2008.38}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-57649211986\&doi=10.1109\%2fICSEA.2008.38\&partnerID=40\&md5=2fddbb103e8241a60cdfcc637896b79e}, author = {Anwar, A. and Ebersold, S. and Nassar, M. and Coulette, B. and Kriouile, A.} } @conference {Jakimi2008521, title = {Use cases and scenarios engineering}, booktitle = {Innovations{\textquoteright}07: 4th International Conference on Innovations in Information Technology, IIT}, year = {2008}, note = {cited By 0}, pages = {521-525}, doi = {10.1109/IIT.2007.4430418}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-50249112803\&doi=10.1109\%2fIIT.2007.4430418\&partnerID=40\&md5=82fe395e89ce2d783684d6544100e69f}, author = {Jakimi, A. and Sabraoui, A. and Badidi, E. and Idri, A. and El Koutbi, M.} } @conference { ISI:000259601400195, title = {Using UAM scenarios in B2B systems}, booktitle = {2008 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING, VOLS 1-3}, year = {2008}, note = {International Conference on Computer and Communication Engineering, Kuala Lumpur, MALAYSIA, MAY 13-15, 2008}, pages = {964+}, publisher = {Int Islam Univ Malaysia, Fac Engn}, organization = {Int Islam Univ Malaysia, Fac Engn}, abstract = {Over the past years, scenarios have received significant attention and have been used for different purposes such as understanding requirements, human computer interaction analysis, and object-oriented analysis and design. In this paper, we suggest to apply the scenario approach to B2B systems (Business to Business). We propose, to develop B2B systems as a three activities process deriving formal specifications and code skeletons from UML scenarios. Activities of this proposed process are generally automatic and are supported by a set of developed algorithms and tools.}, isbn = {978-1-4244-2357-6}, doi = {10.1109/ICCCE.2008.4580750}, author = {Jakimi, A. and Sabraoui, A. and Salah, A. and El Koutbi, M.} } @conference { ISI:000255185000029, title = {Practical load distribution models for Web services based environments}, booktitle = {2008 INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES, PROCEEDINGS}, year = {2007}, note = {3rd International MCETECH Conference on e-Technologies, Montreal, CANADA, JAN 23-25, 2008}, pages = {258+}, publisher = {Univ Quebec; CGI; SAP; IEEE Comp Soc}, organization = {Univ Quebec; CGI; SAP; IEEE Comp Soc}, abstract = {Web services QoS management frameworks proposed in the literature deal essentially with issues such as QoS specification, QoS-based discovery and selection, and QoS monitoring of Web services. However, only few works have considered the issue of load distribution in a Web services context. In this paper, we investigate three models that might be used to achieve load distribution in a Web services environment. We focus on load distribution at the operation level by considering the assignment of methods execution to appropriate Web services according to some selection policies. The experiments we have conducted using the broker-oriented model have shown that better results are obtained using the random policy for Web service selection.}, isbn = {978-0-7695-3082-6}, doi = {10.1109/MCETECH.2008.21}, author = {Badidi, Elarbi and Serhani, M. Adel and Esmahi, Larbi and Elkoutbi, Mohamed}, editor = {Kropf, P and Benyoucef, M and Mili, H} } @conference { ISI:000255983000056, title = {Use cases and scenarios engineering}, booktitle = {2007 INNOVATIONS IN INFORMATION TECHNOLOGIES, VOLS 1 AND 2}, year = {2007}, note = {4th International Conference on Innovations in Information Technology, Dubai, U ARAB EMIRATES, NOV 18-20, 2007}, pages = {274+}, publisher = {IEEE}, organization = {IEEE}, abstract = {\textbackslash{} In this paper, we suggest a requirement engineering process that composes (merge) use cases/scenarios and yields a formal specification of the system in form of a high-level Petri net. Use cases and scenarios are acquired in form of diagrams as defined by the Unified Modeling Language (UML). These diagrams are composed and transformed into Petri net specifications and merged to obtain a global Petri net specification capturing the behavior of the entire system. From the global specification, a system prototype can be generated and embedded in a user interface builder environment for further refinement. Based on end user feedback, the use cases and the input scenarios may be iteratively refined. The result of the overall process is a specification consisting of a global Petri net, together with the generated and refined prototype. This paper discusses some activities of this process.}, isbn = {978-1-4244-1840-4}, author = {Jakimi, A. and Sabraoui, A. and Badidi, E. and Idri, A. and El Koutbi, M.} } @conference { ISI:000241553600078, title = {Fundamental region based indexing and classification of Islamic star pattern images}, booktitle = {IMAGE ANALYSIS AND RECOGNITION, PT 2}, series = {Lecture Notes in Computer Science}, volume = {4142}, year = {2006}, note = {3rd International Conference on Image Analysis and Recognition, Povoa de Varzim, PORTUGAL, SEP 18-20, 2006}, pages = {865-876}, abstract = {In this paper, we propose a new method for the indexing and classification of Islamic Stars Pattern (ISP) images based on rotational symmetry information. A computational model for the extraction of rotational symmetry features is proposed. This model is based on the three following steps. First, we detect the rotation center of the ISP image, then we complete the image structure by using symmetry information. Second, we compute the angle of rotation and number of folds. Finally, we extract the fundamental region, a representative region in the image from which the whole image can be regenerated. A method is also proposed for indexing and classifying ISP images on the basis of the extracted features. The classification algorithm is based on the number of folds. We characterize an image by its fundamental region and by its class which is defined in the classification step. Experiments show promising results either for ISP images classification or indexing. Efforts for the subsequent task of repeated pattern images classification can be significantly reduced.}, isbn = {3-540-44894-2}, issn = {0302-9743}, author = {Djibril, Mohamed Ould and Hadi, Youssef and Thami, Rachid Oulad Haj}, editor = {Campilho, A and Kamel, M} } @conference { ISI:000184848600019, title = {Modeling and tracking of the cardiac left ventricular motion by a state space harmonic model in MRI sequence}, booktitle = {FUNCTIONAL IMAGING AND MODELING OF THE HEART, PROCEEDINGS}, series = {LECTURE NOTES IN COMPUTER SCIENCE}, volume = {2674}, year = {2003}, note = {2nd International Workshop on Functional Imaging and Modeling of the Heart (FIMH2003), LYON, FRANCE, JUN 05-06, 2003}, pages = {184-193}, publisher = {Inst Natl Sci Appl Lyon; Helsinki Univ Technol; French Finnish Assoc Sci Tech Res; French Natl Ctr Sci Res; Sci Acad Finland, Grad Sch, Funct Res Med; French Embassy Helsinki, Sci Dept; French Biomed Engn Soc; Joint Incent Act Beating Heart ISIS Res Grp; }, organization = {Inst Natl Sci Appl Lyon; Helsinki Univ Technol; French Finnish Assoc Sci Tech Res; French Natl Ctr Sci Res; Sci Acad Finland, Grad Sch, Funct Res Med; French Embassy Helsinki, Sci Dept; French Biomed Engn Soc; Joint Incent Act Beating Heart ISIS Res Grp; }, abstract = {We present a new method for modeling the left ventricular motion of the heart from a magnetic resonance imaging (MRI) sequence. We propose to model the 3D time-space trajectory of the points of the endocardial regions of the left ventricle (LV) using an harmonic model of movement, which is linear and describes the dynamics of the left ventricle throughout the cardiac cycle. This new state space model is based on the assumption of quasi-periodicity of the cardiac cycle. We describe our method to obtain the state canonical vector and the corresponding state equations of the harmonic state model (HSM). A Kalman filter is used on this harmonic state model as an estimation tool of the filtered trajectory of the LV. It allows to obtain a robust estimation of the state vector which contains the measured parameter and its derivatives. Thus, a robust estimation of the instantaneous velocity of the LV region is computed using the whole information of the sequence included in the harmonic model. The model is validated on real cardiac sequences. We detail how to get the 3D time-space trajectories of the LV edge points. The results obtained are particularly interesting because they demonstrate the capability of our method to understand and discriminate normal cases from pathological cases.}, isbn = {3-540-40262-4}, issn = {0302-9743}, author = {Oumsis, M and Pham, QC and Sdigui, AD and Neyran, B and Magnin, IE}, editor = {Magnin, IE and Clarysse, P and Katila, T and Montagnat, J and Nenonen, J} } @conference { ISI:000176683300003, title = {Estimating software project effort by analogy based on linguistic values}, booktitle = {EIGHTH IEEE SYMPOSIUM ON SOFTWARE METRICS, PROCEEDINGS}, year = {2002}, note = {8th IEEE Symposium on Software Metrics, OTTAWA, CANADA, JUN 04-07, 2002}, pages = {21-30}, publisher = {IEEE Comp Soc; ALC TEL; CISTEL; Metric Ctr; Carleton Univ; Natl Res Council Canada}, organization = {IEEE Comp Soc; ALC TEL; CISTEL; Metric Ctr; Carleton Univ; Natl Res Council Canada}, abstract = {Estimation models in software engineering are used to predict some important attributes of future entities such as software development effort, software reliability and programmers productivity. Among these models, those estimating software effort have motivated considerable research in recent years. The prediction procedure used by these software-effort models can be based on a mathematical function or other techniques such as analogy based reasoning, neural networks, regression trees, and rule induction models. Estimation by analogy is one of the most attractive techniques in the software effort estimation field. However, the procedure used in estimation by analogy is not yet able to handle correctly linguistic values (categorical data) such as {\textquoteleft}very low{\textquoteright}, {\textquoteleft}low{\textquoteright} and {\textquoteleft}high{\textquoteright}. In this paper, we propose a new approach based on reasoning by analogy, fuzzy logic and linguistic quantifiers to estimate software project effort when it is described either by numerical or linguistic values; this approach is referred to as Fuzzy Analogy. This paper also presents an empirical validation of our approach based on the COCOMO{\textquoteright}81 dataset.}, isbn = {0-7695-1339-5}, doi = {10.1109/METRIC.2002.1011322}, author = {Idri, A and Abran, A and Khoshgoftaar, TM} } @article { ISI:000180261100004, title = {Investigating soft computing in case-based reasoning for software cost estimation}, journal = {ENGINEERING INTELLIGENT SYSTEMS FOR ELECTRICAL ENGINEERING AND COMMUNICATIONS}, volume = {10}, number = {3}, year = {2002}, month = {SEP}, pages = {147-157}, abstract = {Software cost estimation has been the subject of intensive investigations in the field of software engineering. As a result, numerous software cost estimation techniques have been proposed and investigated. To our knowledge, currently there are no cost estimation techniques that can incorporate and/or tolerate the aspects of imprecision, vagueness, and uncertainty into their predictions. However, software projects are often described by vague information. Furthermore, an estimate is only a probabilistic assessment of a future condition. Consequently, cost estimation models must be able to deal with imprecision and uncertainty, the two principal components of soft computing. To estimate the cost of software projects when they are described by vague and imprecise attributes, in an earlier study we have proposed an innovative approach referred to as Fuzzy Analogy. In this paper, we investigate the uncertainty of cost estimates generated by the Fuzzy Analogy approach. The primary aim is to generate a set of possible values for the actual software development cost. This set can then be used to deduce, for practical purposes, a point estimate for the cost, and for analyzing the risks associated with all possible estimates.}, issn = {0969-1170}, author = {Idri, A and Khoshgoftaar, TM and Abran, A} } @conference { ISI:000088420800047, title = {Performance evaluation of {\textquoteleft}{\textquoteleft}kernel based tree{{\textquoteright}{\textquoteright}} protocol}, booktitle = {PROCEEDINGS OF 1999 SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS}, year = {1999}, note = {Symposium on Performance Evaluations of Computer and Telecommunications Systems (SPECTS 99), CHICAGO, IL, JUL 11-15, 1999}, pages = {318-325}, publisher = {Soc Comp Simulat Int}, organization = {Soc Comp Simulat Int}, abstract = {Multicasting messages to group members is now allowed thanks to many network level multicast routing protocols. Actually, current multicast routing protocols suffer from inflexibility in relation to their environment resources, and inappropriateness towards dynamic properties of group members. Thus, proposing implementations of new protocols in order to evaluate their performance is a costly issue, and it is better to simulate their behaviour before deciding whether they are efficient or not. We present a global {\textquoteleft}{\textquoteleft}adaptive multicast routing protocol{{\textquoteright}{\textquoteright}}, based on a special multicast tree, KBT (Kernel Based Tree). This strategy may lead to a new {\textquoteleft}{\textquoteleft}QoS multicast routing protocol{{\textquoteright}{\textquoteright}}. Our approach is based on the choice of a {\textquoteleft}{\textquoteleft}kernel{{\textquoteright}{\textquoteright}} of {\textquoteleft}{\textquoteleft}interception points{{\textquoteright}{\textquoteright}} in the initial multicast tree. As part of our work, we present in this paper the architecture, properties, and the main functionalities of our protocol. We finally evaluate the performance of our adaptive protocol through comparisons with classical current multicast routing protocols in the Internet, and show the enhancements provided by our solution.}, isbn = {1-56555-174-5}, author = {El Kettani, MDEC and Souissi, Y}, editor = {Obaidat, MS and Marsan, MA} } @conference { ISI:000077262500041, title = {EDILE: Exam distance learning environment}, booktitle = {KNOWLEDGE REVOLUTION, THE IMPACT OF TECHNOLOGY ON LEARNING, PROCEEDINGS}, year = {1998}, note = {7th World Conference on Continuing Engineering Education: the Knowledge Revolution - the Impact of New Technologies o n Learning, TURIN, ITALY, MAY 10-13, 1998}, pages = {195-199}, publisher = {IACEE; UNESCO; Minist Labour; Minist Univ \& Sci \& Technol Res; Reg Piemonte; Provincia Torino; Torino Chamber Commerce; Politecn Torino; FIAT; Telecom Italia; Ind Assoc Torino; API Small Enterprises Assoc Torino; Fdn CRT; ENEA}, organization = {IACEE; UNESCO; Minist Labour; Minist Univ \& Sci \& Technol Res; Reg Piemonte; Provincia Torino; Torino Chamber Commerce; Politecn Torino; FIAT; Telecom Italia; Ind Assoc Torino; API Small Enterprises Assoc Torino; Fdn CRT; ENEA}, abstract = {Evaluation is an important stage in the learning process, however when dealing with distance learning the evaluation becomes complicated. Hence, our research objective is to design and implement an exam distance learning environment (EDILE). The EDILE covers all stages of the assessment process, beginning from the edition of the exam until the correction of the student answers and the display of their grades. The major challenge that EDILE has to deal with is distance and security. Actually six different institutes are concerned by EDILE and we have to prevent from any fraud before during and after exams. This paper presents EDILE specifications which type of questions it handles, how the exam structure is defined and the questions scheduled Some security issues are also discussed.}, author = {Mrabet, R and El Kettani, WDE} } @conference { ISI:000082482800093, title = {On the influence of the orthogonalization scheme on the parallel performance of GMRES}, booktitle = {EURO-PAR {\textquoteleft}98 PARALLEL PROCESSING}, series = {Lecture Notes in Computer Science}, volume = {1470}, year = {1998}, note = {4th International Euro-Par Conference on Parallel Processing, SOUTHAMPTON, ENGLAND, SEP 01-04, 1998}, pages = {751-762}, publisher = {Univ Southampton, Dept Electron \& Comp Sci, Concurrent Computat Grp}, organization = {Univ Southampton, Dept Electron \& Comp Sci, Concurrent Computat Grp}, abstract = {In Krylov-based iterative methods, the computation of an orthonormal basis of the Krylov space is a key issue in the algorithms because the many scalar products are often a bottleneck in parallel distributed environments. Using GMRES, we present a comparison of four variants of the Gram-Schmidt process on distributed memory machines. Our experiments are carried on an application in astrophysics and on a convection-diffusion example. We show that the iterative classical Gram-Schmidt method overcomes its three competitors in speed and in parallel scalability while keeping robust numerical properties.}, isbn = {3-540-64952-2}, issn = {0302-9743}, author = {Fraysse, V and Giraud, L and Kharraz-Aroussi, H}, editor = {Pritchard, D and Reeve, J} }