@article {Tamir202273, title = {Conception of an Automatic Decision Support Platform Based on Cross-Sorting Methods and the Fuzzy Logic for General Use}, journal = {Lecture Notes in Networks and Systems}, volume = {489 LNNS}, year = {2022}, note = {cited By 0}, pages = {73-81}, abstract = {Problems related to the classification of a set of data (methods, tools{\textellipsis}), by using the opinions of a committee members, challenge the need for an effective treatment based on the theoretical methods developed through the literature. Indeed, this study was conducted to answer the need identified during the realization of a prioritization study of a graphic modeling methods set in order to develop it into a computing platform. This platform is based on Multi-Criteria Decision Analysis and is destined for practical and general use. The developed platform uses fuzzy pairwise comparisons and cross-sorting methods. It consists of the calculation of two main results: the overall weight of each data to be classified and the consistency index. Regarding the use of fuzzy logic for calculating weights, we opt for the triangular function in the extension of the principle of least-squares logarithmic regression for taking into account the inaccuracy. Finally, the calculation of the normalized weight values can generate an irrational ordering of fuzzy number elements. In our previous work, we have tried to find the conditions on pairwise comparisons values to get rational outcomes, but the calculation was very heavy with the Matlab software. In addition, the modifications to make on the comparisons are multiple, not automatic and depend on the user{\textquoteright}s appreciation. The present work gives a classification solution of results in order to keep only input data (comparisons) that respect the rational order of the weights values. Then, an optimization algorithm is programmed to maximize the consistency indexes of this part of results, by allowing a limited margin of modification without greatly altering the initial data. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-07969-6_6}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135093234\&doi=10.1007\%2f978-3-031-07969-6_6\&partnerID=40\&md5=c4b7ba813043a527b2117d440b4bfe8e}, author = {Tamir, M. and Chiheb, R. and Ouzayd, F. and Retmi, K.} } @book {AlAfandy2022127, title = {Deep learning}, series = {Approaches and Applications of Deep Learning in Virtual Medical Care}, year = {2022}, note = {cited By 0}, pages = {127-166}, abstract = {This chapter provides a comprehensive explanation of deep learning including an introduction to ANNs, improving the deep NNs, CNNs, classic networks, and some technical tricks for image classification using deep learning. ANNs, mathematical models for one node ANN, and multi-layers/multi-nodes ANNs are explained followed by the ANNs training algorithm followed by the loss function, the cost function, the activation function with its derivatives, and the back-propagation algorithm. This chapter also outlines the most common training problems with the most common solutions and ANNs improvements. CNNs are explained in this chapter with the convolution filters, pooling filters, stride, padding, and the CNNs mathematical models. This chapter explains the four most commonly used classic networks and ends with some technical tricks that can be used in CNNs model training. {\textcopyright} 2022 by IGI Global.}, doi = {10.4018/978-1-7998-8929-8.ch006}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85139678781\&doi=10.4018\%2f978-1-7998-8929-8.ch006\&partnerID=40\&md5=7ccf9fb39c61262036843028b0c808a6}, author = {Al Afandy, K.A. and Omara, H. and Lazaar, M. and Al Achhab, M.} } @article {AlAfandy2022739, title = {Efficient Classification of Remote Sensing Images Using Two Convolution Channels and SVM}, journal = {Computers, Materials and Continua}, volume = {72}, number = {1}, year = {2022}, note = {cited By 0}, pages = {739-753}, abstract = {Remote sensing image processing engaged researchers{\textquoteright} attentiveness in recent years, especially classification. The main problem in classification is the ratio of the correct predictions after training. Feature extraction is the foremost important step to build high-performance image classifiers. The convolution neural networks can extract images{\textquoteright} features that significantly improve the image classifiers{\textquoteright} accuracy. This paper proposes two efficient approaches for remote sensing images classification that utilizes the concatenation of two convolution channels{\textquoteright} outputs as a features extraction using two classic convolution models; these convolution models are the ResNet 50 and the DenseNet 169. These elicited features have been used by the fully connected neural network classifier and support vector machine classifier as input features. The results of the proposed methods are compared with other antecedent approaches in the same experimental environments. Evaluation is based on learning curves plotted during the training of the proposed classifier that is based on a fully connected neural network and measuring the overall accuracy for the both proposed classifiers. The proposed classifiers are used with their trained weights to predict a big remote sensing scene{\textquoteright}s classes for a developed test. Experimental results ensure that, compared with the other traditional classifiers, the proposed classifiers are further accurate. {\textcopyright} 2022 Tech Science Press. All rights reserved.}, keywords = {Classification (of information), Classification of remote sensing image, Convolution, Convolution model, Deep learning, Densenet, Extraction, Features extraction, Fully connected neural network, Image classification, Image Classifiers, Image enhancement, Remote sensing, Remote sensing images, Resnet, Support vector machines, SVM}, doi = {10.32604/cmc.2022.022457}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85125387732\&doi=10.32604\%2fcmc.2022.022457\&partnerID=40\&md5=d49f68f82164e31e29c0276c95a3c3ca}, author = {AlAfandy, K.A. and Omara, H. and El-Sayed, H.S. and Baz, M. and Lazaar, M. and Faragallah, O.S. and Al Achhab, M.} } @article {Ouatiti2022, title = {An empirical study on log level prediction for multi-component systems}, journal = {IEEE Transactions on Software Engineering}, year = {2022}, note = {cited By 0}, abstract = {Please find the revised abstract attached. IEEE}, keywords = {Computer software, Data structures, Empirical studies, Java, Java programming language, Learning systems, Log level prediction, Multicomponents systems, Predictive models, Software logging, Software-systems}, doi = {10.1109/TSE.2022.3154672}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85125313776\&doi=10.1109\%2fTSE.2022.3154672\&partnerID=40\&md5=c178439b3606759a34f8e163ece1ea35}, author = {Ouatiti, Y.E. and Sayagh, M. and Kerzazi, N. and Hassan, A.E.} } @article {Ounasser202245, title = {Generative and Autoencoder Models for Large-Scale Mutivariate Unsupervised Anomaly Detection}, journal = {Smart Innovation, Systems and Technologies}, volume = {237}, year = {2022}, note = {cited By 0}, pages = {45-58}, abstract = {Anomaly detection is a major problem that has been well studied in various fields of research and fields of application. In this paper, we present several methods that can be built on existing deep learning solutions for unsupervised anomaly detection, so that outliers can be separated from normal data in an efficient manner. We focus on approaches that use generative adversarial networks (GAN) and autoencoders for anomaly detection. By using these deep anomaly detection techniques, we can overcome the problem that we need to have a large-scale anomaly data in the learning phase of a detection system. So, we compared various methods of machine based and deep learning anomaly detection with its application in various fields. This article used seven available datasets. We report the results on anomaly detection datasets, using performance metrics, and discuss their performance on finding clustered and low density anomalies. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.}, keywords = {Anomaly detection, Auto encoders, Deep learning, Detection system, Generative adversarial networks, ITS applications, Large-scales, Learning phasis, Performance, Performance metrices, Unsupervised anomaly detection}, doi = {10.1007/978-981-16-3637-0_4}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85116885193\&doi=10.1007\%2f978-981-16-3637-0_4\&partnerID=40\&md5=d381663c0ba073f5139a00cbfe2819c8}, author = {Ounasser, N. and Rhanoui, M. and Mikram, M. and Asri, B.E.} } @article {Ouaddi2022205, title = {Heuristic based on iterative exact method for multi-tour dynamic vehicle routing problem with overtime}, journal = {International Journal of Logistics Systems and Management}, volume = {41}, number = {1-2}, year = {2022}, note = {cited By 0}, pages = {205-224}, abstract = {In the last two decades, the DVRP has received a very particular interest from researchers. Because of its great utility in modern transport systems, the DVRP is now a very motivating and still attractive line of research for new studies. The complexity of this problem comes from the fact that it belongs to the VRP family in addition to the dynamism of its components. In this article, a very little studied variant of the DVRP is dealt with. This is the multi-tour DVRP with overtime (MTDVRPOT). We treat this problem from a multi-objective point of view, based on a bi-objective mathematical modelling. The first objective is to minimise the total travelled distance, while the second objective is to minimise to maximal performed overtime. A heuristic based on the iterative exact method was proposed to solve this problem. Its principle is to divide the working day into time periods and resolve iteratively the mathematical models. Each mathematical model corresponds to one subproblem of one time period. Copyright {\textcopyright} 2022 Inderscience Enterprises Ltd.}, doi = {10.1504/IJLSM.2022.120999}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85125744703\&doi=10.1504\%2fIJLSM.2022.120999\&partnerID=40\&md5=57f923c1d5d485989c02ebc34053a4c1}, author = {Ouaddi, K. and Benadada, Y. and Mhada, F.-Z.} } @article {Afoudi2022543, title = {Improved Content Based Filtering Using Unsupervised Machine Learning on~Movie Recommendation}, journal = {Lecture Notes in Networks and Systems}, volume = {489 LNNS}, year = {2022}, note = {cited By 0}, pages = {543-555}, abstract = {In our world of massive entertainment options and with thousands of choices on every movie platform, the user found himself in the circle of confusion over which movie to choose. Here the solution is using the recommender systems to predict user{\textquoteright}s interests and recommend items most likely to interest them. Recommender systems are utilized in a variety of areas and are most commonly recognized as playlist generators for video and music services, product recommenders for online stores as AliExpress and Amazon.., or content recommenders for social media platforms and open web content recommenders. In this paper, we propose a new powerful recommender system that combines Content Based Filtering (CBF) with the popular unsupervised machine learning algorithm K-means clustering. To recommend items to an active user, K-means is then applied to the movie data to give each movie a specific cluster and after founding the cluster to which the user belongs, the content-based approach applies to all movies with the same cluster. The experimentation of well-known movies, we show that the proposed system satisfies the predictability of the Content-Based algorithm in GroupLens. In addition, our proposed system improves the performance and temporal response speed of the traditional collaborative filtering technique and the content-based technique. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-07969-6_41}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135063306\&doi=10.1007\%2f978-3-031-07969-6_41\&partnerID=40\&md5=56bc73a22c970a0c111f82484c887adb}, author = {Afoudi, Y. and Lazaar, M. and Al Achhab, M. and Omara, H.} } @article {Kharbouch2022, title = {Internet-of-Things Based Hardware-in-the-Loop Framework for Model-Predictive-Control of Smart Building Ventilation}, journal = {Sensors}, volume = {22}, number = {20}, year = {2022}, note = {cited By 0}, abstract = {In this work, a Hardware-In-the-Loop (HIL) framework is introduced for the implementation and the assessment of predictive control approaches in smart buildings. The framework combines recent Internet of Things (IoT) and big data platforms together with machine-learning algorithms and MATLAB-based Model Predictive Control (MPC) programs in order to enable HIL simulations. As a case study, the MPC algorithm was deployed for control of a standalone ventilation system (VS). The objective is to maintain the indoor Carbon Dioxide (CO2) concentration at the standard comfort range while enhancing energy efficiency in the building. The proposed framework has been tested and deployed in a real-case scenario of the EEBLab test site. The MPC controller has been implemented on MATLAB/Simulink and deployed in a Raspberry Pi (RPi) hardware. Contextual data are collected using the deployed IoT/big data platform and injected into the MPC and LSTM machine learning models. Occupants{\textquoteright} numbers were first forecasted and then sent to the MPC to predict the optimal ventilation flow rates. The performance of the MPC control over the HIL framework has been assessed and compared to an ON/OFF strategy. Results show the usefulness of the proposed approach and its effectiveness in reducing energy consumption by approximately 16\%, while maintaining good indoor air quality. {\textcopyright} 2022 by the authors.}, keywords = {Air conditioning, Air pollution, Building ventilations, Carbon dioxide, Control approach, Control program, Data platform, energy efficiency, Energy utilization, Hardware in the loops, Hardware-in-the-loop simulation, Hardwarein-the-loop simulations (HIL), Indoor, Indoor air pollution, Internet of things, Learning algorithms, Long short-term memory, Machine learning algorithms, Machine-learning, MATLAB, Model predictive control, Model-predictive control, Predictive control, procedures, Simulation platform, Synthetic apertures, Ventilation}, doi = {10.3390/s22207978}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85140844555\&doi=10.3390\%2fs22207978\&partnerID=40\&md5=85b1a27cdc872a2b2f27b188c17282c8}, author = {Kharbouch, A. and Berouine, A. and Elkhoukhi, H. and Berrabah, S. and Bakhouya, M. and El Ouadghiri, D. and Gaber, J.} } @article {Ouifak2022456, title = {Performance-Interpretability Tradeoff of Mamdani Neuro-Fuzzy Classifiers for Medical Data}, journal = {Lecture Notes in Networks and Systems}, volume = {468 LNNS}, year = {2022}, note = {cited By 0}, pages = {456-465}, abstract = {Neuro-fuzzy systems are models that incorporate the learning ability and performance of Artificial Neural Networks (ANNs) with the interpretable reasoning of fuzzy inference systems (FISs). An ANN can learn patterns from data and achieve high accuracy, while a FIS uses linguistic and interpretable rules to match inputs and outputs of the data. Two types of FISs are used the most in literature: Takagi-Sugeno-Kang (TSK) and Mamdani. The main focus of this paper is on the Mamdani neuro-fuzzy systems, notably the Hybrid Neuro-Fuzzy Inference System (HyFIS) and the Neuro-Fuzzy Classifier (NEFCLASS). It aims at evaluating and comparing the two classifiers over two medical datasets to study their performance-interpretability tradeoff. Results show that HyFIS is the best in terms of performance, while NEFCLASS is better in terms of interpretability. As for the performance-interpretability tradeoff, NEFCLASS has the best overall results; it achieves a good performance while being less complicated and more interpretable. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-04826-5_46}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130272925\&doi=10.1007\%2f978-3-031-04826-5_46\&partnerID=40\&md5=65dc74043fe03a59608e34846f4fd7db}, author = {Ouifak, H. and Idri, A. and Benbriqa, H. and Abnane, I.} } @article {Berouine20229127, title = {A predictive control approach for thermal energy management in buildings}, journal = {Energy Reports}, volume = {8}, year = {2022}, note = {cited By 2}, pages = {9127-9141}, abstract = {Building equipment accounts for almost 40\% of total global energy consumption. More than half of which is used by active systems, such as heating, ventilation and air conditioning (HVAC) systems. These latter are responsible for the occupants{\textquoteright} well-being and considered among the main consumers of electricity in buildings. In order to improve both occupants{\textquoteright} comfort and energy efficiency in buildings, optimal control oriented models, such as Model Predictive Control (MPC), have proven to be promising techniques for developing intelligent control strategies for building energy management systems. This paper presents a real-time predictive control approach of an air conditioning (AC) system for thermal regulation in a single-zone building using MPC control framework. The proposed approach takes into account the physical parameters of the building, weather predictions (i.e. ambient temperature and solar radiation) and time-varying thermal comfort constraints to maintain optimal energy consumption of the AC while enhancing occupants{\textquoteright} comfort. For this purpose, a control-oriented thermal model for a room integrated with AC system is first developed using physics-based (white box) technique and then used to design and develop the MPC controller model. A numerical case study has been investigated and simulation results show the effectiveness of the proposed approach in reducing the energy consumption by about 68\% while providing a significant indoor thermal improvement. A conventional On{\textendash}Off controller was used as a baseline reference to evaluate the system performance against the proposed approach. {\textcopyright} 2022}, keywords = {Building energy management systems, Building Thermal models, Buildings, Conditioning systems, Control approach, Controllers, energy efficiency, Energy management, Energy management systems, Energy utilization, Energy-consumption, Heating, Heating ventilation and air conditioning, HVAC, Model predictive control, Model-predictive control, Occupant comforts, Predictive control, Predictive control systems, Thermal energy, Thermography (temperature measurement), ventilation and air conditioning system}, doi = {10.1016/j.egyr.2022.07.037}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85134798712\&doi=10.1016\%2fj.egyr.2022.07.037\&partnerID=40\&md5=24dfba21dfceacb7c034ce19fec5ffec}, author = {Berouine, A. and Ouladsine, R. and Bakhouya, M. and Essaaidi, M.} } @article {Lamrhari2022, title = {A social CRM analytic framework for improving customer retention, acquisition, and conversion}, journal = {Technological Forecasting and Social Change}, volume = {174}, year = {2022}, note = {cited By 4}, abstract = {Social Customer Relationship Management (social CRM) has become one of the central points for many companies seeking to improve their customer experience. It comprises a set of processes that allows decision-makers to analyze customer data, in order to launch an efficient, customer-centric, and cost-effective marketing strategy. Nonetheless, the inclusion of social media data in CRM introduces new challenges, as it requires advanced analytical approaches to extract actionable insight from such a huge amount of data. Thus, in this paper, we propose a social CRM analytic framework, which includes various analytical approaches, aiming at improving customer retention, acquisition, and conversion. This framework has been tested on various datasets and extensively evaluated based on several performance metrics. The obtained results suggest that the proposed framework can effectively extract relevant information and support decision-making processes. From an academics perspective, the study contributes to an understanding of customers{\textquoteright} experiences throughout their engagement on social media and focuses on long-term relationships with customers. From a managerial perspective, companies should leverage the insight generated through every customer engagement on social media to drive effective marketing strategies. {\textcopyright} 2021}, keywords = {Acquisition, Conversion, Cost effectiveness, Customer acquisition, Customer conversion, Customer relationship management, Customer retention, Customer satisfaction, Customers{\textquoteright} satisfaction, Decision making, Digital storage, Machine learning, management, marketing, Public relations, Sales, Sentiment analysis, Social CRM, social media, Social networking (online), Strategic planning}, doi = {10.1016/j.techfore.2021.121275}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85118116967\&doi=10.1016\%2fj.techfore.2021.121275\&partnerID=40\&md5=10ffdb7f551bf1e135c01fb362d1a559}, author = {Lamrhari, S. and Ghazi, H.E. and Oubrich, M. and Faker, A.E.} } @article {ElJai2022, title = {Socio-economic analysis of short-term trends of COVID-19: modeling and data analytics}, journal = {BMC Public Health}, volume = {22}, number = {1}, year = {2022}, note = {cited By 0}, abstract = {Background: COVID-19 caused a worldwide outbreak leading the majority of human activities to a rough breakdown. Many stakeholders proposed multiple interventions to slow down the disease and number of papers were devoted to the understanding the pandemic, but to a less extend some were oriented socio-economic analysis. In this paper, a socio-economic analysis is proposed to investigate the early-age effect of socio-economic factors on COVID-19 spread. Methods: Fifty-two countries were selected for this study. A cascade algorithm was developed to extract the R0 number and the day J*; these latter should decrease as the pandemic flattens. Subsequently, R0 and J* were modeled according to socio-economic factors using multilinear stepwise-regression. Results: The findings demonstrated that low values of days before lockdown should flatten the pandemic by reducing J*. Hopefully, DBLD is only parameter to be tuned in the short-term; the other socio-economic parameters cannot easily be handled as they are annually updated. Furthermore, it was highlighted that the elderly is also a major influencing factor especially because it is involved in the interactions terms in R0 model. Simulations proved that the health care system could improve the pandemic damping for low elderly. In contrast, above a given elderly, the reproduction number R0 cannot be reduced even for developed countries (showing high HCI values), meaning that the disease{\textquoteright}s severity cannot be smoothed regardless the performance of the corresponding health care system; non-pharmaceutical interventions are then expected to be more efficient than corrective measures. Discussion: The relationship between the socio-economic factors and the pandemic parameters R0 and J* exhibits complex relations compared to the models that are proposed in the literature. The quadratic regression model proposed~here has discriminated the most influencing parameters within the following approximated order, DLBL, HCI, Elderly, Tav, CO2, and WC as first order, interaction, and second order terms. Conclusions: This modeling allowed the emergence of interaction terms that don{\textquoteright}t appear in similar studies; this led to emphasize more complex relationship between the infection spread and the socio-economic factors. Future works will focus on enriching the datasets and the optimization of the controlled parameters to short-term slowdown of similar pandemics. {\textcopyright} 2022, The Author(s).}, keywords = {aged, communicable disease control, COVID-19, Data Science, epidemiology, human, Humans, SARS-CoV-2, Socioeconomic Factors, socioeconomics}, doi = {10.1186/s12889-022-13788-4}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85136870489\&doi=10.1186\%2fs12889-022-13788-4\&partnerID=40\&md5=319bf3cc0bc571a1c7ddf78cab18333b}, author = {El Jai, M. and Zhar, M. and Ouazar, D. and Akhrif, I. and Saidou, N.} } @article {Niharmine20224164, title = {Tifinagh handwritten character recognition using optimized convolutional neural network}, journal = {International Journal of Electrical and Computer Engineering}, volume = {12}, number = {4}, year = {2022}, note = {cited By 1}, pages = {4164-4171}, abstract = {Tifinagh handwritten character recognition has been a challenging problem due to the similarity and variability of its alphabets. This paper proposes an optimized convolutional neural network (CNN) architecture for handwritten character recognition. The suggested model of CNN has a multi-layer feedforward neural network that gets features and properties directly from the input data images. It is based on the newest deep learning open-source Keras Python library. The novelty of the model is to optimize the optical character recognition (OCR) system in order to obtain best performance results in terms of accuracy and execution time. The new optical character recognition system is tested on a customized dataset generated from the amazigh handwritten character database. Experimental results show a good accuracy of the system (99.27\%) with an optimal execution time of the classification compared to the previous works. {\textcopyright} 2022 Institute of Advanced Engineering and Science. All rights reserved.}, doi = {10.11591/ijece.v12i4.pp4164-4171}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85129672744\&doi=10.11591\%2fijece.v12i4.pp4164-4171\&partnerID=40\&md5=052fc4046f2fd3194e9d1315bb43dc05}, author = {Niharmine, L. and Outtaj, B. and Azouaoui, A.} } @article {Fakhari2021867, title = {A Comparative Study Between the Most Usable Object Detection Methods Based on Deep Convolutional Neural Networks}, journal = {Lecture Notes in Networks and Systems}, volume = {183}, year = {2021}, note = {cited By 0}, pages = {867-876}, abstract = {Object detection is a computer vision technique that has been revolutionized by the rapid development of convolutional neural network architectures. These networks consist of powerful tools, able to learn and extract high-level features more complex. They are introduced to deal with the problems existing in traditional architectures, to find and characterize a large number of objects in an image. This technique has two types of detection: a simple detection that aims to identify a single object in an image, it is a classification problem. And multiple detections that aim not only to identify all the objects in the image but also to find the location of the objects. This article describes a simple summary of datasets and deep learning algorithms commonly used in object detection. {\textcopyright} 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-030-66840-2_66}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85102654084\&doi=10.1007\%2f978-3-030-66840-2_66\&partnerID=40\&md5=cd77d1e63cb0e5eb20f6c381c74915c4}, author = {Fakhari, A. and Lazaar, M. and Omara, H.} } @conference {Nejjari2021, title = {Conflict spectrum: An empirical study of geopolitical cyber threats from a social network perspective}, booktitle = {2021 8th International Conference on Social Network Analysis, Management and Security, SNAMS 2021}, year = {2021}, note = {cited By 0}, abstract = {The current evolution of the cyber-threat ecosystem shows that no state or organization is safe from cyber threats. It is therefore important to understand factors that may influence cyber risk. In this paper, we highlight the geopolitical context of cyber threats. The key idea is to verify the assumption that cyber threats are correlated to geopolitical events. We use social network techniques to model our problem as a network. We investigate the relationship between cyber threats and geopolitical events through the measure of similarity between two graphs using the QAP-correlation method. To verify this assumption empirically, we use data from the GDELT project. The results of QAP-correlation measure show a significant similarity between the cyber events graph and the geopolitical events graph in terms of graph isomorphism and structure. {\textcopyright} 2021 IEEE.}, keywords = {{\textquoteright}current, Cyber threats, Empirical studies, Event graphs, Geopolitical events, QAP-correlation, Similarity, Social Network Analysis, Spectra{\textquoteright}s, Use social networks}, doi = {10.1109/SNAMS53716.2021.9732155}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85127404986\&doi=10.1109\%2fSNAMS53716.2021.9732155\&partnerID=40\&md5=d81465c991f5d449e0db9613f3c31aa7}, author = {Nejjari, N. and Lahlou, S. and Fadi, O. and Zkik, K. and Oudani, M. and Benbrahim, H.} } @article {Mabrouk2021, title = {A cooperative game based mechanism for autonomous organization and ubiquitous connectivity in VANETs}, journal = {Simulation Modelling Practice and Theory}, volume = {107}, year = {2021}, note = {cited By 7}, abstract = {Vehicular communications in Vehicular Ad-hoc NETworks (VANETs) play an interesting role in improving traffic flow on the roads. In such wireless networks, the vehicles cooperate with each other or with the roadside infrastructure to disseminate the data. In this paper, we introduce a mechanism based on coalitional game theory to study the cooperative transmission in VANETs. Each vehicle tries to access the Internet via gateways that can be either fixed or mobile. However, these gateways help the vehicles to access the Internet by cooperatively relaying the vehicles{\textquoteright} messages. Thus, two notions to indicate the availability of transmission between vehicles and gateways are introduced. These notions are chosen to deal with the highly dynamic topology in VANETs, namely the notion of an encounter and the notion of a link{\textquoteright}s predicted lifetime. The problem is modelled as a non-transferable utility game. Then, an algorithm is proposed to dynamically form coalitions among the vehicles. Moreover, a probability of being active is set in terms of speed of the received vehicle. To evaluate the proposed solution, two scenarios are used: fixed gateways scenario and mobile gateways scenario. The numerical results show that the scenario of mobile gateways is more effective in terms of stimulating vehicles to regroup into coalitions. Hence, this helps the vehicles to access the Internet. {\textcopyright} 2020}, keywords = {Coalitional game theory, Cooperative game, Cooperative transmission, Dynamic topologies, Game theory, Gateways (Computer networks), Non-transferable utilities, Numerical results, Probability, Vehicle transmissions, Vehicular ad hoc networks, Vehicular Adhoc Networks (VANETs), Vehicular communications}, doi = {10.1016/j.simpat.2020.102213}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85093923113\&doi=10.1016\%2fj.simpat.2020.102213\&partnerID=40\&md5=3ede889d7bb9d063f8c8265857ff2ede}, author = {Mabrouk, A. and Naja, A. and Oualhaj, O.A. and Kobbane, A. and Boulmalf, M.} } @article {AitTemghart2021335, title = {Game Theoretic Approaches to Mitigate Cloud Security Risks: An Initial Insight}, journal = {Lecture Notes in Business Information Processing}, volume = {416 LNBIP}, year = {2021}, note = {cited By 1}, pages = {335-347}, abstract = {Cloud computing is one of the most promising innovations impacting data storage and processing. And with it, clients rely on the IT solutions offered by an external provider instead of on-premise applications. Despite its enormous impacts, customers are still reluctant to outsource their business processes because of security concerns. As data is typically stored and governed by cloud vendors, users need to deal with security issues linked to the loss of control over their sensitive data. Cloud providers need to implement the appropriate security measures that might attract more clients while making the minimum investment. While used in various disciplines, game theory has recently expanded to investigate the effect of the defenders{\textquoteright} and attackers{\textquoteright} behaviors on strategic decision-making. This study aims to develop insights into how game theory can develop better security policies in cloud computing. First, we perform threat modeling to identify the potential threats facing cloud. Second, we identify the limitations of existing game based solutions and then suggest an improved model define an adequate strategy that would figure out the right balance between the required security level and the profit margins. Besides, we present future directions that can be explored to build highly reliable and optimal strategies for cloud services. {\textcopyright} 2021, Springer Nature Switzerland AG.}, keywords = {Business Process, Cloud computing, Cloud securities, Computation theory, Computer games, Data privacy, Decision making, Decision theory, Digital storage, Game theory, Information analysis, Optimal strategies, Potential threats, Security issues, Security measure, Security policy, Strategic decision making}, doi = {10.1007/978-3-030-76508-8_24}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85111082922\&doi=10.1007\%2f978-3-030-76508-8_24\&partnerID=40\&md5=1619b858093bfb251eb24a3209534772}, author = {Ait Temghart, A. and Ait Omar, D. and Outanoute, M. and Marwan, M.} } @conference {ElOuassif2021352, title = {Homogeneous ensemble based support vector machine in breast cancer diagnosis}, booktitle = {HEALTHINF 2021 - 14th International Conference on Health Informatics; Part of the 14th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2021}, year = {2021}, note = {cited By 5}, pages = {352-360}, abstract = {Breast Cancer (BC) is one of the most common forms of cancer and one of the leading causes of mortality among women. Hence, detecting and accurately diagnosing BC at an early stage remain a major factor for women{\textquoteright}s long-term survival. To this aim, numerous single techniques have been proposed and evaluated for BC classification. However, none of them proved to be suitable in all situations. Currently, ensemble methods have been widely investigated to help diagnosis BC and consists on generating one classification model by combining more than one single technique by means of a combination rule. This paper evaluates homogeneous ensembles whose members are four variants of the Support Vector Machine (SVM) classifier. The four SVM variants used four different kernels: Linear Kernel, Normalized Polynomial Kernel, Radial Basis Function Kernel, and Pearson VII function based Universal Kernel. A Multilayer Perceptron (MLP) classifier is used for combining the outputs of the base classifiers to produce a final decision. Four well-known available BC datasets are used from online repositories. The findings of this study suggest that: (1) ensembles provided a very promising performance compared to its base, and (2) there is no SVM ensemble with a combination of kernels that have better performance in all datasets. Copyright {\textcopyright} 2021 by SCITEPRESS {\textendash} Science and Technology Publications, Lda. All rights reserved}, keywords = {Base classifiers, Biomedical engineering, Breast cancer diagnosis, Classification models, Combination rules, Computer aided diagnosis, Diseases, Medical informatics, Multilayer neural networks, Multilayer Perceptron (MLP) classifier, Online repositories, Polynomial kernels, Radial basis function kernels, Support vector machines}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85103824221\&partnerID=40\&md5=2340dec93a42872a9ece0b6f6b9fccbc}, author = {El Ouassif, B. and Idri, A. and Hosni, M.} } @conference {Ouardi2021790, title = {Hybrid Prototypical Networks Augmented by a Non-linear Classifier}, booktitle = {International Conference on Enterprise Information Systems, ICEIS - Proceedings}, volume = {1}, year = {2021}, note = {cited By 0}, pages = {790-794}, abstract = {Text classification is one of the most prolific domains in machine learning. Present in a raw format all around us in our daily life Starting from human to human communication mainly by the social networks apps, arriving at the human-machine interaction especially with chatbots, text is a rich source of information. However, despite the remarkable performances that deep learning achieves in this field, the cost in therm of the amount of data needed to train this model still considerably high, adding to that the need of retraining this model to learn every new task. Nevertheless, a new sub-field of machine learning has emerged, named meta-learning it targets the overcoming of those limitations, widely used for image-related tasks, it can also bring solutions to tasks associated with text. Starting from this perspective we proposed a hybrid architecture based on well-known prototypical networks consisting of adapting this model to text classification and augmenting it with a non-linear classifier. Copyright {\textcopyright} 2021 by SCITEPRESS {\textendash} Science and Technology Publications, Lda. All rights reserved.}, keywords = {Chatbots, Classification (of information), Daily lives, Deep learning, Few-shot learning, Human communications, Human machine interaction, Learning systems, Machine-learning, Metalearning, Nonlinear classifiers, Sources of informations, Text classification, Text processing}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137962135\&partnerID=40\&md5=8d0e3e181cd871cde23a9553ea783fb2}, author = {Ouardi, A.E. and Rhanoui, M. and Benlarabi, A. and Asri, B.E.} } @article {ElOuassif2021263, title = {Investigating Accuracy and Diversity in Heterogeneous Ensembles for Breast Cancer Classification}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {12950 LNCS}, year = {2021}, note = {cited By 2}, pages = {263-281}, abstract = {Breast Cancer (BC) is one of the most common forms of cancer among women. Detecting and accurately diagnosing breast cancer at an early phase increase the chances of women{\textquoteright}s survival. For this purpose, various single classification techniques have been investigated to diagnosis BC. Nevertheless, none of them proved to be accurate in all circumstances. Recently, a promising approach called ensemble classifiers have been widely used to assist physicians accurately diagnose BC. Ensemble classifiers consist on combining a set of single classifiers by means of an aggregation layer. The literature in general shows that ensemble techniques outperformed single ones when ensemble members are accurate (i.e. have the lowest percentage error) and diverse (i.e. the single classifiers make uncorrelated errors on new~instances). Hence, selecting ensemble members is often a crucial task since it can lead to the opposite: single techniques outperformed their ensemble. This paper evaluates and compares ensemble members{\textquoteright} selection based on accuracy and diversity with ensemble members{\textquoteright} selection based on accuracy only. A comparison with ensembles without member selection was also performed. Ensemble performance was assessed in terms of accuracy, F1-score. Q statistics diversity measure was used to calculate the classifiers diversity. The experiments were carried out on three well-known BC datasets available from online repositories. Seven single classifiers were used in our experiments. Skott Knott test and Borda Count voting system were used to assess the significance of the performance differences and rank ensembles according to theirs performances. The findings of this study suggest that: (1) Investigating both accuracy and diversity to select ensemble members often led to better performance, and (2) In general, selecting ensemble members using accuracy and/or diversity led to better ensemble performance than constructing ensembles without members{\textquoteright} selection. {\textcopyright} 2021, Springer Nature Switzerland AG.}, keywords = {Breast Cancer, Combining classifiers, Computer aided diagnosis, Diseases, Diversity measure, Ensemble members, Ensemble-classifier, Heterogeneous ensembles, Member selection, Performance, Selection based, Voting, Voting machines}, doi = {10.1007/978-3-030-86960-1_19}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85125278232\&doi=10.1007\%2f978-3-030-86960-1_19\&partnerID=40\&md5=58285ac3fe1b29564700bef136a94771}, author = {El Ouassif, B. and Idri, A. and Hosni, M.} } @article {Elmouatamid2021571, title = {A MicroGrid System Infrastructure Implementing IoT/Big-Data Technologies for Efficient Energy Management in Buildings}, journal = {Green Energy and Technology}, year = {2021}, note = {cited By 4}, pages = {571-600}, abstract = {Recent studies showed that energy consumption in buildings could be efficiently reduced by including recent IoT (Internet of Things) and Big-Data technologies into microgrid systems. In fact, three major aspects could be further considered for reducing energy consumption while maintaining a suitable occupants{\textquoteright} comfort, (i) integrating renewable energy sources and storage devices, (ii) integrating programmable and less-energy-consuming equipment, and (iii) deploying innovative information and communication technologies. These aspects might contribute substantially to the improvement of winning and saving energy toward smart and energy-efficient buildings. In this chapter, a microgrid system infrastructure is developed together with a platform for data gathering, monitoring, and processing. We put more emphasis on microgrid systems as crucial infrastructures for leveraging energy-efficient and smart buildings by developing and deploying a holistic IoT/Big-Data platform in which sensing and actuation tasks are performed according to the actual contextual changes. Scenarios are presented in order to show the usefulness of this holistic platform for monitoring, data processing, and control in energy-efficient buildings. {\textcopyright} 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, keywords = {Data gathering, Data handling, Data technologies, energy efficiency, Energy efficient, Energy efficient building, Energy utilization, Information and Communication Technologies, Intelligent buildings, Internet of things, Micro-grid systems, Microgrids, Monitoring, Reducing energy consumption, Renewable energy resources, Renewable energy source, Virtual storage}, doi = {10.1007/978-3-030-64565-6_20}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85105764631\&doi=10.1007\%2f978-3-030-64565-6_20\&partnerID=40\&md5=b0a762b2a1e37fc93eff19c16f955daa}, author = {Elmouatamid, A. and NaitMalek, Y. and Ouladsine, R. and Bakhouya, M. and El kamoun, N. and Khaidar, M. and Zine-Dine, K.} } @article {AitTemghart2021307, title = {Optimal Virtual Machine Provisioning in Cloud Computing Using Game Theory}, journal = {Lecture Notes in Business Information Processing}, volume = {416 LNBIP}, year = {2021}, note = {cited By 1}, pages = {307-321}, abstract = {Virtualization of resources on the cloud computing allow fast and easy scaling of infrastructure to achieve a specified QoS. This will undoubtedly improve the allocation efficiency of physical machines in large-scale data centers. In fact, virtualization technologies not only have a direct effect on the performance and energy consumption but also can reduce the operating costs considerably. As there is fierce competition among cloud providers, there is an urgent need to adopt an elastic resource management system and an optimal pricing strategy as well. Such a strategy is designed principally to satisfy the requirements of a given service and simultaneously increase its associated profit margins. This study highlights why game theory is a very useful tool to analyze the impact of both energy efficiency and response time on virtual machine (VM) provisioning. To this aim, we present a formal policy that ensures fairness in the resource sharing and also takes into account the reasonable expectations market participants. More precisely, we rely on a non-cooperative game model in choosing the right provisioning scheme, and then discuss its equilibrium and stability. In a duopoly market, we conduct some numerical experiments to illustrate the efficiency and performance of the proposed approach and its proof of convergence with a certain number of iterations. {\textcopyright} 2021, Springer Nature Switzerland AG.}, keywords = {Allocation efficiencies, Cloud computing, Commerce, Computation theory, Computer games, Efficiency and performance, energy efficiency, Energy utilization, Game theory, Information analysis, Market participants, Network security, Number of iterations, Numerical experiments, Operating costs, Provisioning schemes, Resource management systems, Virtual machine, Virtualization, Virtualization technologies}, doi = {10.1007/978-3-030-76508-8_22}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85111167293\&doi=10.1007\%2f978-3-030-76508-8_22\&partnerID=40\&md5=548cfc7c5207af40074c10c8be8d63a7}, author = {Ait Temghart, A. and Ait Omar, D. and Marwan, M.} } @book {ElOuazzani20211503, title = {Privacy Preserving in Digital Health: Main Issues, Technologies, and Solutions}, series = {Research Anthology on Privatizing and Securing Data}, year = {2021}, note = {cited By 1}, pages = {1503-1526}, abstract = {Recently, digital health solutions are taking advantage of recent advances in information and communication technologies. In this context, patients{\textquoteright} health data are shared with other stakeholders. Moreover, it{\textquoteright}s now easier to collect massive health data due to the rising use of connected sensors in the health sector. However, the sensitivity of this shared healthcare data related to patients may increase the risks of privacy violation. Therefore, healthcare-related data need robust security measurements to prevent its disclosure and preserve patients{\textquoteright} privacy. However, in order to make well-informed decisions, it is often necessary to allow more permissive security policies for healthcare organizations even without the consent of patients or against their preferences. The authors of this chapter concentrate on highlighting these challenging issues related to patient privacy and presenting some of the most significant privacy preserving approaches in the context of digital health. {\textcopyright} 2021, IGI Global.}, doi = {10.4018/978-1-7998-8954-0.ch072}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85127530934\&doi=10.4018\%2f978-1-7998-8954-0.ch072\&partnerID=40\&md5=79d0013c567793bf90816fc766b5c8c2}, author = {El Ouazzani, Z. and El Bakkali, H. and Sadki, S.} } @article {ElOuazzani2021, title = {Proximity Measurement for Hierarchical Categorical Attributes in Big Data}, journal = {Security and Communication Networks}, volume = {2021}, year = {2021}, note = {cited By 0}, abstract = {Nearly most of the organizations store massive amounts of data in large databases for research, statistics, and mining purposes. In most cases, much of the accumulated data contain sensitive information belonging to individuals which may breach privacy. Hence, ensuring privacy in big data is considered a very important issue. The concept of privacy aims to protect sensitive information from various attacks that may violate the identity of individuals. Anonymization techniques are considered the best way to ensure privacy in big data. Various works have been already realized, taking into account horizontal clustering. The L-diversity technique is one of those techniques dealing with sensitive numerical and categorical attributes. However, the majority of anonymization techniques using L-diversity principle for hierarchical data cannot resist the similarity attack and therefore cannot ensure privacy carefully. In order to prevent the similarity attack while preserving data utility, a hybrid technique dealing with categorical attributes is proposed in this paper. Furthermore, we highlighted all the steps of our proposed algorithm with detailed comments. Moreover, the algorithm is implemented and evaluated according to a well-known information loss-based criterion which is Normalized Certainty Penalty (NCP). The obtained results show a good balance between privacy and data utility. {\textcopyright} 2021 Zakariae El Ouazzani et al.}, keywords = {Big data, Categorical attributes, Data utilities, Hierarchical data, Hybrid techniques, Information loss, Large database, Privacy by design, Sensitive informations, Various attacks}, doi = {10.1155/2021/6612923}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85111105073\&doi=10.1155\%2f2021\%2f6612923\&partnerID=40\&md5=a1855aa8b73f4bcdebad1b181b25c7ac}, author = {El Ouazzani, Z. and Braeken, A. and El Bakkali, H.} } @conference {Retmi20211667, title = {Role of Digitalization in the Hospital Supply Chain Performance Improvement: Digitalization of Hospital Pharmacy}, booktitle = {Proceedings of the International Conference on Industrial Engineering and Operations Management}, year = {2021}, note = {cited By 0}, pages = {1667-1675}, abstract = {The hospital is a different supply chain made up of different structures and flows. Due to the Covid-19 pandemic, the hospital has overcome several major challenges in recent times, which have prompted it to accelerate the digitization of its supply chain to improve the quality of hospital care and services. This article looks at a specific point, that of performance in the hospital supply chain, and asks the following question: What is the role of digitalization in improving the performance of the hospital supply chain?. {\textcopyright} IEOM Society International.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85126203150\&partnerID=40\&md5=815020aadcba2907820de968a3beebd8}, author = {Retmi, K. and Tamir, M. and Ouzayd, F.} } @article {Drissi2021594, title = {A Systematic Literature Review on e-Mental Health Solutions to Assist Health Care Workers during COVID-19}, journal = {Telemedicine and e-Health}, volume = {27}, number = {6}, year = {2021}, note = {cited By 27}, pages = {594-602}, abstract = {Background: e-Mental health is an established field of exploiting information and communication technologies for mental health care. It offers different solutions and has shown effectiveness in managing many psychological issues. Introduction: The coronavirus disease 2019 (COVID-19) pandemic has critically influenced health care systems and health care workers (HCWs). HCWs are working under hard conditions, and are suffering from different psychological issues, including anxiety, stress, and depression. Consequently, there is an undeniable need of mental care interventions for HCWs. Under the circumstances caused by COVID-19, e-health interventions can be used as tools to assist HCWs with their mental health. These solutions can provide mental health care support remotely, respecting the recommended safety measures. Materials and Methods: This study aims to identify e-mental health interventions, reported in the literature, that are developed for HCWs during the COVID-19 pandemic. A systematic literature review was conducted following the PRISMA protocol by searching the following digital libraries: IEEE, ACM, ScienceDirect, Scopus, and PubMed. Results and Discussion: Eleven publications were selected. The identified e-mental health interventions consisted of social media platforms, e-learning content, online resources and mobile applications. Only 27\% of the studies included empirical evaluation of the reported interventions, 55\% listed challenges and limitations related to the adoption of the reported interventions. And 45\% presented interventions developed specifically for HCWs in China. The overall feedback on the identified interventions was positive, yet a lack of empirical evaluation was identified, especially regarding qualitative evidence. Conclusions: The COVID-19 pandemic has highlighted the importance and need for e-mental health solutions for HCWs. {\textcopyright} Copyright 2021, Mary Ann Liebert, Inc., publishers 2021.}, keywords = {China, COVID-19, Digital libraries, e-learning, E-learning contents, Empirical evaluations, Health care, health care personnel, Health care workers, Health Personnel, Health-care system, human, Humans, Information and Communication Technologies, Mental health, Mobile applications, pandemic, Pandemics, SARS-CoV-2, Social media platforms, Systematic literature review}, doi = {10.1089/tmj.2020.0287}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85108029620\&doi=10.1089\%2ftmj.2020.0287\&partnerID=40\&md5=abb17cd8cdd22c6edcf3e914fcc6e8e2}, author = {Drissi, N. and Ouhbi, S. and Marques, G. and De La Torre D{\'\i}ez, I. and Ghogho, M. and Janati Idrissi, M.A.} } @conference {Oumaima2021, title = {Vision-based fall detection and prevention for the elderly people: A review ongoing research}, booktitle = {5th International Conference on Intelligent Computing in Data Sciences, ICDS 2021}, year = {2021}, note = {cited By 0}, abstract = {Falls are the most leading cause of accidental injury deaths worldwide, therefore, it poses a real challenge for the prevention of life-threatening conditions in geriatrics. The most damaged community is the ever-growing aging population. For this reason, there are considerable demands to distinguish a dangerous posture such as fall in real-time. Here we provide a literature review of conducted work on elderly fall detection and prediction mentioning the main methods to recognize human posture including computer vision-based and wearable sensor-based. We approached these perspectives: sensor fusion, Datasets, approaches proposition. In conclusion, our survey summarizes the progress achieved in the five past years to help the researchers in this field to spot areas where further effort would be beneficial and innovative. {\textcopyright} 2021 IEEE.}, keywords = {Accident prevention, Accidental injuries, Computer vision, Dataset, Elderly, Elderly people, Fall detection, Fall prediction, Fall prevention, Life threatening conditions, Sensor, Vision based, Wearable sensors}, doi = {10.1109/ICDS53782.2021.9626736}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85123493902\&doi=10.1109\%2fICDS53782.2021.9626736\&partnerID=40\&md5=c99b20a9a8a522cc9440679b23da4ceb}, author = {Oumaima, G. and Hamd, A.A. and Youness, T. and Rachid, O.H.T. and Omar, B.} } @conference {Naja2020, title = {Alert Message Dissemination using Graph-based Markov Decision Process Model in VANETs}, booktitle = {IEEE International Conference on Communications}, volume = {2020-June}, year = {2020}, note = {cited By 0}, abstract = {Vehicular Ad-hoc Networks (VANETs) have many promising applications such as improving vehicle driver{\textquoteright}s safety, and so, decreasing car deaths. In VANETs, the main communication way is broadcast. Such Broadcast needs to be done efficiently especially in congested areas to avoid the broadcast storm problem. A crashed vehicle disseminates a message about its incident to all nodes in the network. The vehicle nodes of the network have to disseminate in their turn the alert message carefully to maximize both reachability and saved rebroadcast (by reducing congestion) while minimizing the delay. This concern is demonstrated and modeled by decision hypothesis. In this paper, at first, we are keen on the Markov decision process (MDP), which is utilized to model and tackle such successive decision issues. We aim to optimize a utility for each vehicle relying upon an irregular domain and choices made by it. As the MDP formalism achieves its cutoff points when it is important to consider the cooperation between the several vehicles. We will begin utilizing the Graph-based MDP where the state and activity spaces are factorizable by factors. We then demonstrate that the transition functions and rewards are deteriorated into nearby functions, and the reliance relations between the vehicles are spoken to by a graph. To Figure the optimal strategy, we use Mean Field Approximation (MFA) for tackling GMDP issue. {\textcopyright} 2020 IEEE.}, keywords = {Accidents, Broadcast storm problem, Graphic methods, Markov decision process models, Markov Decision Processes, Markov processes, Mean field approximation, Message dissemination, Mobile telecommunication systems, Optimal strategies, Traffic congestion, Transition functions, Vehicles, Vehicular ad hoc networks, Vehicular Adhoc Networks (VANETs)}, doi = {10.1109/ICC40277.2020.9148997}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089436123\&doi=10.1109\%2fICC40277.2020.9148997\&partnerID=40\&md5=12d16adc7ab7a4b60d7ff52c15709c2c}, author = {Naja, A. and Oualhaj, O.A. and Boulmalf, M. and Essaaidi, M. and Kobbane, A.} } @article {ElOuahabi20204261, title = {Analysis and design of a compact ultra-wideband antenna with WLAN and X-band satellite notch}, journal = {International Journal of Electrical and Computer Engineering}, volume = {10}, number = {4}, year = {2020}, note = {cited By 1}, pages = {4261-4269}, abstract = {A compact design of ultra-wideband (UWB) antenna with dual band-notched characteristics are investigated in this paper. The wider impedance bandwidth (from 2.73 to 11.34 GHz) is obtained by using two symmetrical slits in the radiating patch and another slit in the partial ground plane. The dual band-notch rejection at WLAN and X-band downlink satellite communication system are obtained by inserting a modified U-strip on the radiating patch at 5.5 GHz and embedding a pair of single rectangular split ring resonators (SR-SRR) on both sides of the microstrip feed line at 7.5 GHz, respectively. The proposed antenna is simulated and tested using CST MWS high frequency simulator and exhibits the advantages of compact size, simple design and each notched frequency band can be controlled independently by using the geometrical parameters of the corresponding resonator. Therefore, the parametric study is carried out to understand the mutual coupling between the dual band-notched elements. To validate simulation results of our design, a prototype is fabricated and good agreement is achieved between measurement and simulation. Furthermore, a radiation patterns, satisfactory gain, current distribution and VSWR result at the notched frequencies make the proposed antenna a suitable candidate for practical UWB applications. Copyright {\textcopyright} 2020 Institute of Advanced Engineering and Science. All rights reserved.}, doi = {10.11591/ijece.v10i4.pp4261-4269}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85083101617\&doi=10.11591\%2fijece.v10i4.pp4261-4269\&partnerID=40\&md5=6e35d351672ae49ebb932247c0e19472}, author = {El Ouahabi, M. and Dkiouak, A. and Zakriti, A. and Essaaidi, M. and Elftouh, H.} } @article {DRISSI2020104243, title = {An analysis on self-management and treatment-related functionality and characteristics of highly rated anxiety apps}, journal = {International Journal of Medical Informatics}, volume = {141}, year = {2020}, pages = {104243}, abstract = {Background and objective Anxiety is a common emotion that people often feel in certain situations. But when the feeling of anxiety is persistent and interferes with a person{\textquoteright}s day to day life then this may likely be an anxiety disorder. Anxiety disorders are a common issue worldwide and can fall under general anxiety, panic attacks, and social anxiety among others. They can be disabling and can impact all aspects of an individual{\textquoteright}s life, including work, education, and personal relationships. It is important that people with anxiety receive appropriate care, which in some cases may prove difficult due to mental health care delivery barriers such as cost, stigma, or distance from mental health services. A potential solution to this could be mobile mental health applications. These can serve as effective and promising tools to assist in the management of anxiety and to overcome some of the aforementioned barriers. The objective of this study is to provide an analysis of treatment and management-related functionality and characteristics of high-rated mobile applications (apps) for anxiety, which are available for Android and iOS systems. Method A broad search was performed in the Google Play Store and App Store following the Preferred Reporting Items for Systematic reviews and Meta-Analysis (PRISMA) protocol to identify existing apps for anxiety. A set of free and highly rated apps for anxiety were identified and the selected apps were then installed and analyzed according to a predefined data extraction strategy. Results A total of 167 anxiety apps were selected (123 Android apps and 44 iOS apps). Besides anxiety, the selected apps addressed several health issues including stress, depression, sleep issues, and eating disorders. The apps adopted various treatment and management approaches such as meditation, breathing exercises, mindfulness and cognitive behavioral therapy. Results also showed that 51\% of the selected apps used various gamification features to motivate users to keep using them, 32\% provided social features including chat, communication with others and links to sources of help; 46\% offered offline availability; and only 19\% reported involvement of mental health professionals in their design. Conclusions Anxiety apps incorporate various mental health care management methods and approaches. Apps can serve as promising tools to assist large numbers of people suffering from general anxiety or from anxiety disorders, anytime, anywhere, and particularly in the current COVID-19 pandemic.}, keywords = {Anxiety, M-health, Mental health, Mobile apps, Mobile mental health}, issn = {1386-5056}, doi = {https://doi.org/10.1016/j.ijmedinf.2020.104243}, url = {https://www.sciencedirect.com/science/article/pii/S1386505620305815}, author = {Nidal Drissi and Sofia Ouhbi and Mohammed Abdou Janati Idrissi and Mounir Ghogho} } @article {Drissi2020, title = {An analysis on self-management and treatment-related functionality and characteristics of highly rated anxiety apps}, journal = {International Journal of Medical Informatics}, volume = {141}, year = {2020}, note = {cited By 19}, abstract = {Background and objective: Anxiety is a common emotion that people often feel in certain situations. But when the feeling of anxiety is persistent and interferes with a person{\textquoteright}s day to day life then this may likely be an anxiety disorder. Anxiety disorders are a common issue worldwide and can fall under general anxiety, panic attacks, and social anxiety among others. They can be disabling and can impact all aspects of an individual{\textquoteright}s life, including work, education, and personal relationships. It is important that people with anxiety receive appropriate care, which in some cases may prove difficult due to mental health care delivery barriers such as cost, stigma, or distance from mental health services. A potential solution to this could be mobile mental health applications. These can serve as effective and promising tools to assist in the management of anxiety and to overcome some of the aforementioned barriers. The objective of this study is to provide an analysis of treatment and management-related functionality and characteristics of high-rated mobile applications (apps) for anxiety, which are available for Android and iOS systems. Method: A broad search was performed in the Google Play Store and App Store following the Preferred Reporting Items for Systematic reviews and Meta-Analysis (PRISMA) protocol to identify existing apps for anxiety. A set of free and highly rated apps for anxiety were identified and the selected apps were then installed and analyzed according to a predefined data extraction strategy. Results: A total of 167 anxiety apps were selected (123 Android apps and 44 iOS apps). Besides anxiety, the selected apps addressed several health issues including stress, depression, sleep issues, and eating disorders. The apps adopted various treatment and management approaches such as meditation, breathing exercises, mindfulness and cognitive behavioral therapy. Results also showed that 51\% of the selected apps used various gamification features to motivate users to keep using them, 32\% provided social features including chat, communication with others and links to sources of help; 46\% offered offline availability; and only 19\% reported involvement of mental health professionals in their design. Conclusions: Anxiety apps incorporate various mental health care management methods and approaches. Apps can serve as promising tools to assist large numbers of people suffering from general anxiety or from anxiety disorders, anytime, anywhere, and particularly in the current COVID-19 pandemic. {\textcopyright} 2020 Elsevier B.V.}, keywords = {Android (operating system), Anxiety, anxiety disorder, Betacoronavirus, breathing exercise, cognitive behavioral therapy, Cognitive-behavioral therapies, Coronavirus infection, Coronavirus Infections, data extraction, Disease Outbreaks, eating disorder, Eating disorders, epidemic, Health care, human, Humans, iOS (operating system), isolation and purification, language, Mental health, mental health care personnel, mental health service, Mental health services, mobile application, Mobile applications, organization and management, pandemic, Pandemics, Personal relationships, Pneumonia, priority journal, psychology, Review, self care, Self-Management, sleep, Social anxieties, stress, Systematic Review, telemedicine, therapy, Viral, virology, virus pneumonia}, doi = {10.1016/j.ijmedinf.2020.104243}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85088938984\&doi=10.1016\%2fj.ijmedinf.2020.104243\&partnerID=40\&md5=ec0c4f4cdf72007694d3cc8e8f50bb97}, author = {Drissi, N. and Ouhbi, S. and Janati Idrissi, M.A. and Ghogho, M.} } @conference {Ouarhim2020, title = {Business Process Modeling Notation Extension for Real Time Handling - Application to Novel Coronavirus (2019-nCoV) management process}, booktitle = {Proceedings of 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, CloudTech 2020}, year = {2020}, note = {cited By 0}, abstract = {The need of real-time enterprises increases according to our life style and customers{\textquoteright} satisfaction goal. Real-time business process is one of the important components of a real-time enterprise. For that, a formal definition of real-time concept and real-time process was indispensable. This work presents a formal definition of real-time concept, real-time ontology and a proposition of a real-time component with real-time attributes. This new dimension of time contains three components: latency time, acceptance interval and theoretical time. This definition gives a new vision of time, not just an ordinary vision as periods and calendar but as a response to our needs in real-time enterprises: real-time. Before the proposition of a real-time component for BPMN language, which we applicate to Novel Coronavirus (2019-nCoV) management process, as case study. {\textcopyright} 2020 IEEE.}, keywords = {Artificial intelligence, Business process modeling notations, Cloud computing, Customer satisfaction, Customers{\textquoteright} satisfaction, Formal definition, Management process, Real-time business, Real-time handling, Real-time process, Three component}, doi = {10.1109/CloudTech49835.2020.9365900}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85102630158\&doi=10.1109\%2fCloudTech49835.2020.9365900\&partnerID=40\&md5=efa760e4fe29ae0509729e730f662b56}, author = {Ouarhim, A. and Lakhrouit, J. and Baina, K.} } @article {ElOuazzani2020142, title = {A classification of non-cryptographic anonymization techniques ensuring privacy in big data}, journal = {International Journal of Communication Networks and Information Security}, volume = {12}, number = {1}, year = {2020}, note = {cited By 6}, pages = {142-152}, abstract = {Recently, Big Data processing becomes crucial to most enterprise and government applications due to the fast growth of the collected data. However, this data often includes private personal information that arise new security and privacy concerns. Moreover, it is widely agreed that the sheer scale of big data makes many privacy preserving techniques unavailing. Therefore, in order to ensure privacy in big data, anonymization is suggested as one of the most efficient approaches. In this paper, we will provide a new detailed classification of the most used non-cryptographic anonymization techniques related to big data including generalization and randomization approaches. Besides, the paper evaluates the presented techniques through integrity, confidentiality and credibility criteria. In addition, three relevant anonymization techniques including k-anonymity, l-diversity and t-closeness are tested on an extract of a huge real data set. {\textcopyright} 2020, Kohat University of Science and Technology.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85087292674\&partnerID=40\&md5=785b0ce48df310cdcdd67ad945490264}, author = {El Ouazzani, Z. and El Bakkali, H.} } @conference {Ouaddi2020, title = {A comparative study of three methods for solving the Mutli-Trip Dynamic Vehicle Routing Problem with Overtime (MTDVRPOT)}, booktitle = {Proceedings - 2020 5th International Conference on Logistics Operations Management, GOL 2020}, year = {2020}, note = {cited By 0}, abstract = {In recent years, the dynamic vehicle routing problem (DVRP) and its variants have been increasingly studied and several resolution approaches have been proposed. The objective of this study is to compare the results of three different approaches designed for the multi-trip dynamic vehicle routing problem with overtime (MTDVRPOT). The first approach is based on an exact method, the second is a hybrid ant colony system, while the third is a memetic algorithm. The tests are performed on small instances, and the results show the efficiency of the memetic algorithm. {\textcopyright} 2020 IEEE.}, keywords = {Ant colony optimization, Comparative studies, Dynamic vehicle routing problems, Exact methods, Hybrid ant colony systems, Memetic algorithms, Multi trips, Vehicle routing, Vehicles}, doi = {10.1109/GOL49479.2020.9314727}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85100211299\&doi=10.1109\%2fGOL49479.2020.9314727\&partnerID=40\&md5=b18f63526f7e1ac4b3feb37e42ce0faa}, author = {Ouaddi, K. and Mhada, F.-Z. and Benadada, Y.} } @article {Ohmaid2020429, title = {Comparison between svm and knn classifiers for iris recognition using a new unsupervised neural approach in segmentation}, journal = {IAES International Journal of Artificial Intelligence}, volume = {9}, number = {3}, year = {2020}, note = {cited By 7}, pages = {429-438}, abstract = {A biometric system of identification and authentication provides automatic recognition of an individual based on certain unique features or characteristics he or she possesses. Iris recognition is a biometric identification method that applies pattern recognition to images of the iris. Owing to the unique epigenetic patterns of the iris, iris recognition is considered one of the most accurate methods in the field of biometric identification. The segmentation algorithm proposed in this article starts with determining the regions of the eye using unsupervised neural approach, after the outline of the eye is found using the Canny edge, The Hough Transform is employed to determine the center and radius of the pupil and the iris. Then the normalization allows transforming the segmented circular iris region into a fixed-size rectangular shape using Daugman{\textquoteright}s rubber sheet model. A discrete wavelet transformation (DWT) is applied to the normalized iris to lower the size of iris models and to improve classifier accuracy. Finally, the URIBIS iris database is used for individual user verification by using the KNN classifier or support vector machine (SVM) which based on the analysis of iris code as feature extraction is discussed. {\textcopyright} 2020, Institute of Advanced Engineering and Science. All rights reserved.}, doi = {10.11591/ijai.v9.i3.pp429-438}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85086923257\&doi=10.11591\%2fijai.v9.i3.pp429-438\&partnerID=40\&md5=84bdd50bb2f61010088a298cbac7b2ee}, author = {Ohmaid, H. and Eddarouich, S. and Bourouhou, A. and Timouyas, M.} } @conference {Berradi2020367, title = {A comprehensive review of artificial intelligence techniques in financial market}, booktitle = {Colloquium in Information Science and Technology, CIST}, volume = {2020-June}, year = {2020}, note = {cited By 0}, pages = {367-371}, abstract = {Artificial intelligence is a vast and promising domain that helps improving people{\textquoteright}s lives in different areas such as, medicine, education, telecommunication, finance, and economy. The financial market is an important aspect of the economics of any country, by having a clear idea about how it functions, it helps to improve the economy of the country radically and, therefore, the people{\textquoteright}s lives. In this paper, we suggest giving the latest research of deep learning techniques applied on the financial market field that can help investors to make an accurate decision. This paper gathered all the recent articles related to deep learning techniques applied on forecasting the financial market, which includes stock market, stock index, commodity forecasting and Forex. The main goal is to find the most models used recently to solve the prediction problem using RNN, their characteristic and novelty. We will give all aspects that involve the process of forecasting beginning with preprocessing, the input features, the deep learning techniques, and the evaluation metrics employed. {\textcopyright} 2021 IEEE.}, keywords = {Artificial intelligence techniques, Commerce, Deep learning, Electronic trading, Evaluation metrics, Financial markets, Fintech, Forecasting, Input features, Investments, It functions, Learning systems, Learning techniques, Prediction problem, Stock indices}, doi = {10.1109/CiSt49399.2021.9357175}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85103852221\&doi=10.1109\%2fCiSt49399.2021.9357175\&partnerID=40\&md5=b8ae02858f3f66114efcfced0ae9f173}, author = {Berradi, Z. and Lazaar, M. and Mahboub, O. and Omara, H.} } @article {LHAZMIR2020102102, title = {A decision-making analysis in UAV-enabled wireless power transfer for IoT networks}, journal = {Simulation Modelling Practice and Theory}, volume = {103}, year = {2020}, pages = {102102}, abstract = {We consider an IoT network with energy-harvesting capabilities. To extend the network lifetime, we propose a novel unmanned aerial vehicle (UAV)- enabled wireless power transfer (WPT) system, where UAVs move among IoT devices and act as data aggregators and wireless power providers. This paper addresses the decision-making problem since the limited buffer and energy resources constrain all nodes. Each IoT node must decide on whether to request a data transmission, to ask for a wireless energy transfer or to abstain and not take any action. When a UAV receives a request from an IoT device, either for data reception or wireless energy transmission, it has to accept or decline. In this paper, we aim to find a proper packet delivery and energy transfer policy according to the system state that maximizes the data transmission efficiency of the system. We first formulate the problem as a Markov Decision Process (MDP) to tackle the successive decision issues, to optimize a utility for each node upon a casual environment. As the MDP formalism achieves its limits when the interactions between different nodes are considered, we formulate the problem as a Graph-based MDP (GMDP). The transition functions and rewards are then decomposed into local functions, and a graph illustrates the dependency{\textquoteright} relations among the nodes. To obtain the optimal policy despite the system{\textquoteright}s variations, Mean-Field Approximation (MFA) and Approximate linear-programming (ALP) algorithms were proposed to solve the GMDP problem.}, keywords = {GMDP, Internet of things, Unmanned aerial vehicle, Wireless energy transfer}, issn = {1569-190X}, doi = {https://doi.org/10.1016/j.simpat.2020.102102}, url = {https://www.sciencedirect.com/science/article/pii/S1569190X2030040X}, author = {Safae Lhazmir and Omar Ait Oualhaj and Abdellatif Kobbane and Lynda Mokdad} } @article {Lhazmir2020, title = {A decision-making analysis in UAV-enabled wireless power transfer for IoT networks}, journal = {Simulation Modelling Practice and Theory}, volume = {103}, year = {2020}, note = {cited By 8}, abstract = {We consider an IoT network with energy-harvesting capabilities. To extend the network lifetime, we propose a novel unmanned aerial vehicle (UAV)- enabled wireless power transfer (WPT) system, where UAVs move among IoT devices and act as data aggregators and wireless power providers. This paper addresses the decision-making problem since the limited buffer and energy resources constrain all nodes. Each IoT node must decide on whether to request a data transmission, to ask for a wireless energy transfer or to abstain and not take any action. When a UAV receives a request from an IoT device, either for data reception or wireless energy transmission, it has to accept or decline. In this paper, we aim to find a proper packet delivery and energy transfer policy according to the system state that maximizes the data transmission efficiency of the system. We first formulate the problem as a Markov Decision Process (MDP) to tackle the successive decision issues, to optimize a utility for each node upon a casual environment. As the MDP formalism achieves its limits when the interactions between different nodes are considered, we formulate the problem as a Graph-based MDP (GMDP). The transition functions and rewards are then decomposed into local functions, and a graph illustrates the dependency{\textquoteright} relations among the nodes. To obtain the optimal policy despite the system{\textquoteright}s variations, Mean-Field Approximation (MFA) and Approximate linear-programming (ALP) algorithms were proposed to solve the GMDP problem. {\textcopyright} 2020 Elsevier B.V.}, keywords = {Antennas, Approximate linear programming, Approximation algorithms, Behavioral research, Data communication systems, Data transfer, Data transmission efficiency, Decision making, Decision making analysis, Decision-making problem, Energy harvesting, Energy resources, Energy transfer, Graph theory, Graphic methods, Inductive power transmission, Internet of things, Linear programming, Markov Decision Processes, Markov processes, Mean field approximation, Unmanned aerial vehicles (UAV), Wireless energy transfers, Wireless power transfer (WPT)}, doi = {10.1016/j.simpat.2020.102102}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85084066274\&doi=10.1016\%2fj.simpat.2020.102102\&partnerID=40\&md5=6a1c9e107244a170a782e61d0f9755cc}, author = {Lhazmir, S. and Oualhaj, O.A. and Kobbane, A. and Mokdad, L.} } @article {AlAfandy2020652, title = {Investment of classic deep CNNs and SVM for classifying remote sensing images}, journal = {Advances in Science, Technology and Engineering Systems}, volume = {5}, number = {5}, year = {2020}, note = {cited By 2}, pages = {652-659}, abstract = {Feature extraction is an important process in image classification for achieving an efficient accuracy for the classification learning models. One of these methods is using the convolution neural networks. The use of the trained classic deep convolution neural networks as features extraction gives a considerable results in the remote sensing images classification models. So, this paper proposes three classification approaches using the support vector machine where based on the use of the ImageNet pre-trained weights classic deep convolution neural networks as features extraction from the remote sensing images. There are three convolution models that used in this paper; the Densenet 169, the VGG 16, and the ResNet 50 models. A comparative study is done by extract features using the outputs of the mentioned ImageNet pre-trained weights convolution models after transfer learning, and then use these extracted features as input features for the support vector machine classifier. The used datasets in this paper are the UC Merced land use dataset and the SIRI-WHU dataset. The comparison is based on calculating the overall accuracy to assess the classification model performance. {\textcopyright} 2020 ASTES Publishers. All rights reserved.}, doi = {10.25046/AJ050580}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85095822116\&doi=10.25046\%2fAJ050580\&partnerID=40\&md5=45b769e14c4c2aabfb41baf3e92d7ae3}, author = {AlAfandy, K.A. and Omara, H. and Lazaar, M. and Achhab, M.A.} } @article {Ohmaid202058, title = {Iris segmentation using a new unsupervised neural approach}, journal = {IAES International Journal of Artificial Intelligence}, volume = {9}, number = {1}, year = {2020}, note = {cited By 9}, pages = {58-64}, abstract = {A biometric system of identification and authentication provides automatic recognition of an individual based on certain unique features or characteristic possessed by an individual. Iris recognition is a biometric identification method that uses pattern recognition on the images of the iris. Owing to the unique epigenetic patterns of the iris, Iris recognition is considered as one of the most accurate methods in the field of biometric identification. One of the crucial steps in the iris recognition system is the iris segmentation because it significantly affects the accuracy of the feature extraction the iris. The segmentation algorithm proposed in this article starts with determining the regions of the eye using unsupervised neural approach, after the outline of the eye is found using the Canny edge, The Hough Transform is employed to determine the center and radius of the pupil and the iris. {\textcopyright} 2020, Institute of Advanced Engineering and Science. All rights reserved.}, doi = {10.11591/ijai.v9.i1.pp58-64}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85080971993\&doi=10.11591\%2fijai.v9.i1.pp58-64\&partnerID=40\&md5=78c276e7037dd4b8ce337c5611a5f7b8}, author = {Ohmaid, H. and Eddarouich, S. and Bourouhou, A. and Timouyas, M.} } @article {Lhazmir2020973, title = {Matching Game with No-Regret Learning for IoT Energy-Efficient Associations with UAV}, journal = {IEEE Transactions on Green Communications and Networking}, volume = {4}, number = {4}, year = {2020}, note = {cited By 4}, pages = {973-981}, abstract = {Unmanned aerial vehicles (UAVs) are a promising technology to provide an energy-efficient and cost-effective solution for data collection from ground Internet of Things (IoT) network. In this paper, we analyze the UAV-IoT device associations that provide reliable connections with low communication power and load balance the traffic using analytical techniques from game theory. In particular, to maximize the IoT devices{\textquoteright} benefits, a novel framework is proposed to assign them the most suitable UAVs. We formulate the problem as a distributed algorithm that combines notions from matching theory and no-regret learning. First, we develop a many-to-one matching game where UAVs and IoT devices are the players. In this subgame, the players rank one another based on individual utility functions that capture their needs. Each IoT device aims to minimize its transmitting energy while meeting its signal-to-interference-plus-noise-ratio (SINR) requirements, and each UAV seeks to maximize the number of served IoT devices while respecting its energy constraints. Second, a non-cooperative game based on no-regret learning is used to determine each IoT device{\textquoteright}s regret. Then, UAVs open a window for transfers to the IoT devices. Simulation results show that the proposed approach provides a low average total transmit power, ensures fast data transmission and optimal utilization of the UAVs{\textquoteright} bandwidth. {\textcopyright} 2017 IEEE.}, keywords = {Antennas, Cost effectiveness, Cost-effective solutions, energy efficiency, Fast data transmission, Game theory, Internet of things, Internet of Things (IOT), Noncooperative game, Optimal utilization, Reliable connections, Signal interference, Signal to interference plus noise ratio, Signal to noise ratio, Total transmit power, Unmanned aerial vehicles (UAV)}, doi = {10.1109/TGCN.2020.3008992}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096697293\&doi=10.1109\%2fTGCN.2020.3008992\&partnerID=40\&md5=7f2e844f54122845029dfd8503c5eaf6}, author = {Lhazmir, S. and Oualhaj, O.A. and Kobbane, A. and Ben-Othman, J.} } @article {Ouaddi2020643, title = {Memetic algorithm for multi-tours dynamic vehicle routing problem with overtime (Mdvrpot)}, journal = {International Journal of Industrial Engineering Computations}, volume = {11}, number = {4}, year = {2020}, note = {cited By 8}, pages = {643-662}, abstract = {After three decades of its introduction, the dynamic vehicle routing problem (DVRP) remains a fertile field for new studies. The technological evolution, which continues to progress day by day, has allowed better communication between different actors of this model and a more encouraging execution time. This encouraged researchers to investigate new variants of the DVRP and use more complicated algorithms for the resolution. Among these variants is the multi-tour DVRP (MTDVRP) with overtime (MTDVRPOT), which is the subject of this article. This paper proposes an approach with a memetic algorithm (MA). The results obtained in this study are better than those of the ant colony system (ACS) applied to the same problem and published in an earlier paper. {\textcopyright} 2020 by the authors; licensee Growing Science, Canada.}, doi = {10.5267/j.ijiec.2020.4.001}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85090725004\&doi=10.5267\%2fj.ijiec.2020.4.001\&partnerID=40\&md5=d438b38f932a7acfddc0489585ccfa79}, author = {Ouaddi, K. and Mhada, F.-Z. and Benadada, Y.} } @article {ElAissaoui2020655, title = {Mining Learners{\textquoteright} Behaviors: An Approach Based on Educational Data Mining Techniques}, journal = {Advances in Intelligent Systems and Computing}, volume = {1076}, year = {2020}, note = {cited By 2}, pages = {655-670}, abstract = {Educational data mining is a research field that aims to apply data mining techniques in educational environments. Many data mining techniques such as clustering, classification, and prediction can be performed on educational data in order to analyze the learner behaviors. In this work, we have used the clustering and classification techniques to predict the learners{\textquoteright} learning styles. The students{\textquoteright} behaviors while using the e-learning system have been captured from the log file and given as an input of a clustering algorithm to group them into 16 clusters. The resulted clusters were labeled with learning styles combinations based on the Felder and Silverman learning style model. Then the labeled behaviors were given as input to four classifiers: naive Bayes, Cart, Id3, and C4.5 to compare their performance in predicting students{\textquoteright} learning styles. The four classifiers were performed using Weka data mining tool, and the obtained results showed that Id3 yielded better results than the other classifiers. {\textcopyright} Springer Nature Singapore Pte Ltd. 2020.}, keywords = {Artificial intelligence, Classification technique, Clustering algorithms, Data mining, Data-mining tools, Educational data mining, Educational environment, Embedded systems, Forecasting, Learning Style, Learning systems, Log file, Naive bayes, Research fields, Students}, doi = {10.1007/978-981-15-0947-6_62}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085173246\&doi=10.1007\%2f978-981-15-0947-6_62\&partnerID=40\&md5=0cb9665b2720bd9b06e011902e8708b5}, author = {El Aissaoui, O. and El Alami El Madani, Y. and Oughdir, L. and Dakkak, A. and El Allioui, Y.} } @article {ElAissaoui20209, title = {A Multiple Linear Regression-Based Approach to Predict Student Performance}, journal = {Advances in Intelligent Systems and Computing}, volume = {1102 AISC}, year = {2020}, note = {cited By 15}, pages = {9-23}, abstract = {Predicting students{\textquoteright} academic outcome is useful for any educational institution that aims to ameliorate students{\textquoteright} performance. Based on the resulted predictions, educators can provide support to students at risk of failure. Data mining and machine learning techniques were widely used to predict students{\textquoteright} performance. This process called Educational data mining. In this work, we have proposed a methodology to build a student{\textquoteright} performance prediction model using a supervised machine learning technique which is the multiple linear regression (MLR). Our methodology consists of three major steps, the first step aims to analyze and preprocess the students{\textquoteright} attributes/variables using a set of statistical analysis methods, and then the second step consists in selecting the most important variables using different methods. The third step aims to construct different MLR models based on the selected variables and compare their performance using the k-fold cross-validation technique. The obtained results show that the model built using the variables selected from the Multivariate Adaptive Regression Splines method (MARS), outperforms the other constructed models. {\textcopyright} Springer Nature Switzerland AG 2020.}, keywords = {Data mining, Education computing, Educational data mining, Forecasting, Intelligent systems, K fold cross validations, Learning systems, Linear regression, Machine learning techniques, Multiple linear regressions, Multivariate adaptive regression splines, Performance prediction models, planning, Predictive analytics, Statistical analysis methods, Students, Supervised learning, Supervised machine learning, Sustainable development}, doi = {10.1007/978-3-030-36653-7_2}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85078413089\&doi=10.1007\%2f978-3-030-36653-7_2\&partnerID=40\&md5=893772562739d5d20e6b6ae21ebae325}, author = {El Aissaoui, O. and El Alami El Madani, Y. and Oughdir, L. and Dakkak, A. and El Allioui, Y.} } @article {OUDOUAR2020102064, title = {A novel approach based on heuristics and a neural network to solve a capacitated location routing problem}, journal = {Simulation Modelling Practice and Theory}, volume = {100}, year = {2020}, pages = {102064}, abstract = {In this work, we describe a method to solve the capacitated location-routing problem (CLRP) to minimize the delivery distance for a vehicle. The CLRP consists of locating depots, assigning each customer to one depot, and determining routes. The objective is to minimize the cost (distance). In the locating problem, we use a self-organizing map (SOM) to determine the depots and assign customers to depots. The SOM is an unsupervised learning method with two layers and has proven effective in several research areas, such as clustering. In the routing problem, we use the Clarke and Wright technique to determine routes. In the present work, we propose an improvement of the capacitated self-organizing map (CSOM) to optimize the location of depots and the Or-Opt algorithm to ameliorate the routes obtained by Clarke and Write (CSOM\&CW). The numerical results show that the proposed method can meet many benchmarks of small and medium instances. Computational results assess the higher performance of our approach and demonstrate its efficiency in solving large-size instances.}, keywords = {Clustering, Location routing problem, Neural network, Optimization, Self-organizing map, Unsupervised learning}, issn = {1569-190X}, doi = {https://doi.org/10.1016/j.simpat.2019.102064}, url = {https://www.sciencedirect.com/science/article/pii/S1569190X19301959}, author = {Fadoua Oudouar and Mohamed Lazaar and Zaoui El Miloud} } @article {Oudouar2020, title = {A novel approach based on heuristics and a neural network to solve a capacitated location routing problem}, journal = {Simulation Modelling Practice and Theory}, volume = {100}, year = {2020}, note = {cited By 12}, abstract = {In this work, we describe a method to solve the capacitated location-routing problem (CLRP) to minimize the delivery distance for a vehicle. The CLRP consists of locating depots, assigning each customer to one depot, and determining routes. The objective is to minimize the cost (distance). In the locating problem, we use a self-organizing map (SOM) to determine the depots and assign customers to depots. The SOM is an unsupervised learning method with two layers and has proven effective in several research areas, such as clustering. In the routing problem, we use the Clarke and Wright technique to determine routes. In the present work, we propose an improvement of the capacitated self-organizing map (CSOM) to optimize the location of depots and the Or-Opt algorithm to ameliorate the routes obtained by Clarke and Write (CSOM\&CW). The numerical results show that the proposed method can meet many benchmarks of small and medium instances. Computational results assess the higher performance of our approach and demonstrate its efficiency in solving large-size instances. {\textcopyright} 2019 Elsevier B.V.}, keywords = {Capacitated location, Clustering, Computational results, Conformal mapping, Its efficiencies, Location, Location routing problem, Machine learning, Network routing, Neural networks, Numerical methods, Numerical results, Optimization, Routing problems, Self organizing maps, Unsupervised learning, Unsupervised learning method}, doi = {10.1016/j.simpat.2019.102064}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85077516665\&doi=10.1016\%2fj.simpat.2019.102064\&partnerID=40\&md5=a650efb5ef7f1f150f0e4f6f9af68e91}, author = {Oudouar, F. and Lazaar, M. and Miloud, Z.E.} } @conference {ElMrabtt2020, title = {Novel Convex Polyhedron Classifier for Sentiment Analysis}, booktitle = {Proceedings of 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, CloudTech 2020}, year = {2020}, note = {cited By 1}, abstract = {In this paper, we propose a Novel Convex Polyhedron classifier (NCPC) based on the geometric concept convex hull. NCPC is basically a linear piecewise classifier (LPC). It partitions linearly non-separable data into various linearly separable subsets. For each of these subset of data, a linear hyperplane is used to classify them. We evaluate the performance of this classifier by combining it with two feature selection methods (Chi-squared and Anova F-value). Using two datasets, the results indicate that our proposed classifier outperforms other LPC-based classifiers. {\textcopyright} 2020 IEEE.}, keywords = {Artificial intelligence, Chi-Squared, Classification (of information), Cloud computing, Convex hull, Convex polyhedrons, F values, Feature selection methods, Geometric concepts, Geometry, Linearly separable, Piece-wise, Sentiment analysis}, doi = {10.1109/CloudTech49835.2020.9365906}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85102620927\&doi=10.1109\%2fCloudTech49835.2020.9365906\&partnerID=40\&md5=143fd1c523fe8ae24563a9b0482f632c}, author = {El Mrabtt, S. and Lazaar, M. and Al Achhab, M. and Omara, H.} } @article {BOULMRHARJ2020101518, title = {Online battery state-of-charge estimation methods in micro-grid systems}, journal = {Journal of Energy Storage}, volume = {30}, year = {2020}, pages = {101518}, abstract = {Batteries have shown great potential for being integrated in Micro-Grid (MG) systems. However, their integration is not a trivial task and, therefore, requires extensive modeling and simulations in order to efficiently estimating their State-of-Charge (SoC) within MG systems. The work presented in this article focuses mainly on battery modeling for SoC estimation. We put more emphasize on battery system{\textquoteright}s characterization, modeling, SoC estimation and its integration into MG systems in order to study its performance. In fact, an instrumentation platform, composed of recent and low cost sensing and actuating equipment, is developed in order to identify the battery{\textquoteright}s parameters and then build the battery model. The simulation results show good agreement with the experimental results, and thus the battery model is validated in both charging and discharging processes. Then, the battery{\textquoteright}s SoC estimation in both charging and discharging processes is investigated by means of sophisticated methods, such as, Artificial Neural Network, Luenberger observer and Kalman Filter combined with Coulomb counting. The results of these methods are reported and compared to the SoC estimated using the Coulomb counting method in order to end up with the precise method. The modeled battery is afterwards integrated into an MG system, which is deployed into our EEBLab (Energy Efficient Building Laboratory) test-site, for simulation and experimental investigations. Finally, the four algorithms for SoC estimation are included into the instrumentation platform, which is connected to a Lead-acid battery already integrated into the MG system, in order to show and compare their performances and accuracy for online battery{\textquoteright}s SoC estimation.}, keywords = {Battery characterization, Battery modeling, MG systems, Online SOC estimation, Parameters identification, Performance assessment}, issn = {2352-152X}, doi = {https://doi.org/10.1016/j.est.2020.101518}, url = {https://www.sciencedirect.com/science/article/pii/S2352152X20303984}, author = {Sofia Boulmrharj and Radouane Ouladsine and Youssef NaitMalek and Mohamed Bakhouya and Khalid Zine-dine and Mohammed Khaidar and Mustapha Siniti} } @article {Boulmrharj2020, title = {Online battery state-of-charge estimation methods in micro-grid systems}, journal = {Journal of Energy Storage}, volume = {30}, year = {2020}, note = {cited By 30}, abstract = {Batteries have shown great potential for being integrated in Micro-Grid (MG) systems. However, their integration is not a trivial task and, therefore, requires extensive modeling and simulations in order to efficiently estimating their State-of-Charge (SoC) within MG systems. The work presented in this article focuses mainly on battery modeling for SoC estimation. We put more emphasize on battery system{\textquoteright}s characterization, modeling, SoC estimation and its integration into MG systems in order to study its performance. In fact, an instrumentation platform, composed of recent and low cost sensing and actuating equipment, is developed in order to identify the battery{\textquoteright}s parameters and then build the battery model. The simulation results show good agreement with the experimental results, and thus the battery model is validated in both charging and discharging processes. Then, the battery{\textquoteright}s SoC estimation in both charging and discharging processes is investigated by means of sophisticated methods, such as, Artificial Neural Network, Luenberger observer and Kalman Filter combined with Coulomb counting. The results of these methods are reported and compared to the SoC estimated using the Coulomb counting method in order to end up with the precise method. The modeled battery is afterwards integrated into an MG system, which is deployed into our EEBLab (Energy Efficient Building Laboratory) test-site, for simulation and experimental investigations. Finally, the four algorithms for SoC estimation are included into the instrumentation platform, which is connected to a Lead-acid battery already integrated into the MG system, in order to show and compare their performances and accuracy for online battery{\textquoteright}s SoC estimation. {\textcopyright} 2020 Elsevier Ltd}, keywords = {Battery management systems, Battery state of charge, Charging (batteries), Coulomb counting method, Discharging process, energy efficiency, Energy efficient building, Experimental investigations, Intelligent buildings, Lead acid batteries, Luenberger observers, Model and simulation, Neural networks, Online systems, Sensing and actuating}, doi = {10.1016/j.est.2020.101518}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085273724\&doi=10.1016\%2fj.est.2020.101518\&partnerID=40\&md5=f5d31d6e8a0f90e2bec4e1dd9d7da9d8}, author = {Boulmrharj, S. and Ouladsine, R. and NaitMalek, Y. and Bakhouya, M. and Zine-Dine, K. and Khaidar, M. and Siniti, M.} } @article {Elkhoukhi2020, title = {A platform architecture for occupancy detection using stream processing and machine learning approaches}, journal = {Concurrency and Computation: Practice and Experience}, volume = {32}, number = {17}, year = {2020}, note = {cited By 15}, abstract = {Context-awareness in energy-efficient buildings has been considered as a crucial fact for developing context-driven control approaches in which sensing and actuation tasks are performed according to the contextual changes. This could be done by including the presence of occupants, number, actions, and behaviors in up-to-date context, taking into account the complex interlinked elements, situations, processes, and their dynamics. However, many studies have shown that occupancy information is a major leading source of uncertainty when developing control approaches. Comprehensive and real-time fine-grained occupancy information has to be, therefore, integrated in order to improve the performance of occupancy-driven control approaches. The work presented in this paper is toward the development of a holistic platform that combines recent IoT and Big Data technologies for real-time occupancy detection in smart building. The purpose of this work focuses mainly on the presence of occupants by comparing both static and dynamic machine learning techniques. An open-access occupancy detection dataset was first used to assess the usefulness of the platform and the effectiveness of static machine learning strategies for data processing. This dataset is used for applications that follow the strategy aiming at storing data first and processing it later. However, many smart buildings{\textquoteright} applications, such as HVAC and ventilation control, require online data streams processing. Therefore, a distributed real-time machine learning framework was integrated into the platform and tested to show its effectiveness for this kind of applications. Experiments have been conducted for ventilation systems in energy-efficient building laboratory (EEBLab) and preliminary results show the effectiveness of this platform in detecting on-the-fly presence of occupants, which is required to either make ON or OFF the system and then activate the corresponding embedded control technique (eg, ON/OFF, PID, state-feedback). {\textcopyright} 2019 John Wiley \& Sons, Ltd.}, keywords = {Context- awareness, Data streams, Embedded systems, energy efficiency, Energy efficient building, Intelligent buildings, Internet of things, Learning systems, Machine learning, Machine learning approaches, Machine learning techniques, Occupancy detections, Platform architecture, Real-time data processing, State feedback, Ventilation, Ventilation control}, doi = {10.1002/cpe.5651}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85076920865\&doi=10.1002\%2fcpe.5651\&partnerID=40\&md5=f34bbe0cd8dadd04282227e1a5698c57}, author = {Elkhoukhi, H. and NaitMalek, Y. and Bakhouya, M. and Berouine, A. and Kharbouch, A. and Lachhab, F. and Hanifi, M. and El Ouadghiri, D. and Essaaidi, M.} } @conference {Essaaidi2020, title = {Preface}, booktitle = {Proceedings of 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, CloudTech 2020}, year = {2020}, note = {cited By 0}, doi = {10.1109/CloudTech49835.2020.9365910}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85102619681\&doi=10.1109\%2fCloudTech49835.2020.9365910\&partnerID=40\&md5=3c74b02844a103a62a82dab03f17563f}, author = {Essaaidi, M. and Zbakh, M. and Ouacha, A.} } @book {Ouazzani2020253, title = {Privacy preserving in digital health: Main issues, technologies, and solutions}, series = {Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies}, year = {2020}, note = {cited By 2}, pages = {253-276}, abstract = {Recently, digital health solutions are taking advantage of recent advances in information and communication technologies. In this context, patients{\textquoteright} health data are shared with other stakeholders. Moreover, it{\textquoteright}s now easier to collect massive health data due to the rising use of connected sensors in the health sector. However, the sensitivity of this shared healthcare data related to patients may increase the risks of privacy violation. Therefore, healthcare-related data need robust security measurements to prevent its disclosure and preserve patients{\textquoteright} privacy. However, in order to make well-informed decisions, it is often necessary to allow more permissive security policies for healthcare organizations even without the consent of patients or against their preferences. The authors of this chapter concentrate on highlighting these challenging issues related to patient privacy and presenting some of the most significant privacy preserving approaches in the context of digital health. {\textcopyright} 2021, IGI Global.}, doi = {10.4018/978-1-7998-3817-3.ch012}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85104245384\&doi=10.4018\%2f978-1-7998-3817-3.ch012\&partnerID=40\&md5=7b83c4da1344fd81d525a9eacdca6034}, author = {Ouazzani, Z.E. and Bakkali, H.E. and Sadki, S.} } @conference {Drissi2020593, title = {Sensor-based solutions for mental healthcare: A systematic literature review}, booktitle = {HEALTHINF 2020 - 13th International Conference on Health Informatics, Proceedings; Part of 13th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2020}, year = {2020}, note = {cited By 2}, pages = {593-600}, abstract = {Mental well-being is a crucial aspect of the person{\textquoteright}s general health, compromised mental health impairs the person{\textquoteright}s functioning, decreases the quality of life, and limits the person{\textquoteright}s contribution to society. The mental health industry is still facing some barriers to healthcare delivery such as costs, mental health illiteracy, and stigma. Incorporating technological interventions in the treatment and the diagnosis processes might help overcome these barriers. Sensors are devices that have been used for healthcare since the 1990s and have been incorporated into mental healthcare in different forms. In this study, we conducted a systematic literature review to identify and analyze sensor-based solutions for mental healthcare. 12 studies were identified and analyzed. The majority of the selected studies presented methods and models and were empirically evaluated and showed promising accuracy results. Different types of sensors were used to collect different types of data about the patient such as physical and behavioral information. The selected studies mainly addressed the use of sensors for common mental issues like stress and depression or the analysis of general mental status. Some studies reported some limitations mainly related to technological issues and lack of standards. {\textcopyright} 2020 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.}, keywords = {Biomedical engineering, Health care, Healthcare delivery, Medical informatics, Mental health, Quality of life, Systematic literature review, Well being}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85083705930\&partnerID=40\&md5=335f69fa969e09929802b364d7f6d696}, author = {Drissi, N. and Ouhbi, S. and Garc{\'\i}a-Bern{\'a}, J.A. and Idrissi, M.A.J. and Ghogho, M.} } @article {Aissaoui2020117, title = {Toward a hybrid machine learning approach for extracting and clustering learners{\textquoteright} behaviours in adaptive educational system}, journal = {International Journal of Computing Science and Mathematics}, volume = {12}, number = {2}, year = {2020}, note = {cited By 0}, pages = {117-131}, abstract = {The learning style is a vital learner{\textquoteright}s characteristic that must be considered while recommending learning materials. In this paper we have proposed an approach to identify learning styles automatically. The first step of the proposed approach aims to preprocess the data extracted from the log file of the E-learning environment and capture the learners{\textquoteright} sequences. The captured learners{\textquoteright} sequences were given as an input to the K-means clustering algorithm to group them into sixteen clusters according to the FSLSM. Then the naive Bayes classifier was used to predict the learning style of a student in real time. To perform our approach, we used a real dataset extracted from an e-learning system{\textquoteright}s log file, and in order to evaluate the performance of the used classifier, the confusion matrix method was used. The obtained results demonstrate that our approach yields excellent results. Copyright {\textcopyright} 2020 Inderscience Enterprises Ltd.}, keywords = {Adaptive systems, Classification (of information), Classifiers, Computer aided instruction, Confusion matrices, e-learning, E-learning environment, Educational systems, Hybrid machine learning, K-means clustering, Learning materials, Learning Style, Machine learning, Naive Bayes classifiers, Preprocess}, doi = {10.1504/IJCSM.2020.111113}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096034864\&doi=10.1504\%2fIJCSM.2020.111113\&partnerID=40\&md5=e39786511c32be21cc0fef5be68a0822}, author = {Aissaoui, O.E. and El Alami El Madani, Y. and Oughdir, L. and Dakkak, A. and El Allioui, Y.} } @article {Berouine2020, title = {Towards a real-time predictive management approach of indoor air quality in energy-efficient buildings}, journal = {Energies}, volume = {13}, number = {12}, year = {2020}, note = {cited By 6}, abstract = {Ventilation, heating and air conditioning systems are the main energy consumers in building sector. Improving the energy consumption of these systems, while satisfying the occupants{\textquoteright} comfort, is the major concern of control and automation designers and researchers. Model predictive control (MPC) methods have been widely studied in order to reduce the energy usage while enhancing the occupants{\textquoteright} comfort. In this paper, a generalized predictive control (GPC) algorithm based on controlled auto-regressive integrated moving average is investigated for standalone ventilation systems{\textquoteright} control. A building{\textquoteright}s ventilation system is first modeled together with the GPC and MPC controllers. Simulations have been conducted for validation purposes and are structured into two main parts. In the first part, we compare the MPC with two traditional controllers, while the second part is dedicated to the comparison of the MPC against the GPC controller. Simulation results show the effectiveness of the GPC in reducing the energy consumption by about 4.34\% while providing significant indoor air quality improvement. {\textcopyright} 2020 by the authors.}, keywords = {Air conditioning, Air quality, Auto-regressive integrated moving average, Control and automation, Controllers, Energy consumer, energy efficiency, Energy efficient building, Energy utilization, Generalized predictive control, Heating-and-air conditioning system, Indoor air pollution, Indoor air quality, Intelligent buildings, Model predictive control, Predictive control systems, Ventilation, Ventilation systems}, doi = {10.3390/en13123246}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089987718\&doi=10.3390\%2fen13123246\&partnerID=40\&md5=bdf8cea22143a02d8648fcb8c208a7b9}, author = {Berouine, A. and Ouladsine, R. and Bakhouya, M. and Essaaidi, M.} } @conference {Ouatiti20207, title = {Towards Amazon Fake Reviewers Detection: The Effect of Bulk Users}, booktitle = {ACM International Conference Proceeding Series}, year = {2020}, note = {cited By 0}, pages = {7-12}, abstract = {Online marketplaces such as Amazon allow people to share their experiences about purchased products using textual comments known as product reviews. These reviews have become a common tool that users rely on to get insights on the quality and functionality of products and services from online consumers. However, like any other online information, reviewers raise serious questions concerning the credibility and reliability, since anyone can post reviews, which might impact the reliability of the information. This paper tackles the phenomenon of Bulk reviewers. We first analyze a large dataset of reviews from Amazon aiming to spot bulk reviewers according to their behavior. We then apply a what-if analysis to assess the effect of bulk reviews on the online marketplaces using a metric called Net Promoter Score to measure the willingness of users to recommend products. Our Results reveal that bulk users (i.e., users that review multiple times) have same distribution of ratings as non-bulk users indicating that a bulk reviewer is not automatically a fake reviewer. Yet, we discover that bulk users do inflate NPS metric and thus contribute to overestimate the level of customer satisfaction. {\textcopyright} 2020 ACM.}, keywords = {Electronic assessment, Electronic commerce, Intelligent systems, Large dataset, On-line information, On-line marketplaces, Online consumers, Product reviews, Products and services, User experience, What-if Analysis}, doi = {10.1145/3419604.3419800}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096423765\&doi=10.1145\%2f3419604.3419800\&partnerID=40\&md5=1a79dcff298ad489f414ee1d7743d93c}, author = {Ouatiti, Y.E. and Kerzazi, N.} } @conference {Maha2020, title = {The Two Phases Method for operating rooms planning and scheduling}, booktitle = {2020 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2020}, year = {2020}, note = {cited By 2}, abstract = {Over the last three or four decades, there have been numerous optimization problems in Healthcare which have been approached by researchers. Hospital logistics which must be organized and structured in order to secure patient satisfaction in terms of quality, quantity, time, security and least cost, forms part of the quest for global performance.According to the literature review, the problem of operating rooms planning and scheduling involves different conflicting objectives while considering constraints on availability of rooms, patients and doctors. In this paper, we proposed the Two Phases Method (TPM), which is a general technique that is likely to solve multi-objective combinatorial optimization (MOCO) problems.As it is known, TPM has never been applied to solve operating room planning and scheduling problem. In this paper, we developed the TPM to resolve the cited issue, while focusing on optimizing both total completion time and patients{\textquoteright} waiting time. {\textcopyright} 2020 IEEE.}, keywords = {Combinatorial Optimization, Conflicting objectives, Constraint satisfaction problems, Decision making, Hospital logistics, Industrial management, Literature reviews, Multiobjective combinatorial optimization, Operating rooms, Optimization problems, Patient satisfaction, Planning and scheduling, Scheduling, Total completion time}, doi = {10.1109/ICTMOD49425.2020.9380584}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85103741668\&doi=10.1109\%2fICTMOD49425.2020.9380584\&partnerID=40\&md5=a5086170077f1fe352eb34de4e820aac}, author = {Maha, T. and Achchab, S. and Omar, S.} } @conference {Lhazmir2020, title = {UAV for Wireless Power Transfer in IoT Networks: A GMDP approach}, booktitle = {IEEE International Conference on Communications}, volume = {2020-June}, year = {2020}, note = {cited By 3}, abstract = {Unmanned aerial vehicles (UAVs) are a promising technology employed as moving aggregators and wireless power transmitters for IoT networks. In this paper, we consider an UAV-IoT wireless energy and data transmission system and the decision-making problem is investigated. We aim at optimizing the nodes{\textquoteright} utilities by defining a good packet delivery and energy transfer policy according to the system state. We formulate the problem as a Markov Decision Process (MDP) to tackle the successive decision issues. As the MDP formalism achieves its limits when the neighbors{\textquoteright} interactions are considered, we formulate the problem as a Graph-based MDP (GMDP). We then propose a Mean-Field Approximation (MFA) algorithm to find a solution. The simulation results show that our framework achieves a good analysis of the system behavior. {\textcopyright} 2020 IEEE.}, keywords = {Antennas, Approximation algorithms, Behavioral research, Decision making, Decision-making problem, Energy transfer, Graphic methods, Inductive power transmission, Internet of things, Markov Decision Processes, Markov processes, Mean field approximation, Packet Delivery, System behaviors, System state, Unmanned aerial vehicles (UAV), Wireless energy, Wireless power}, doi = {10.1109/ICC40277.2020.9148956}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089418365\&doi=10.1109\%2fICC40277.2020.9148956\&partnerID=40\&md5=a3d1ed58b9a7436f2191be8372102f51}, author = {Lhazmir, S. and Oualhaj, O.A. and Kobbane, A. and Amlioud, E.M. and Ben-Othman, J.} } @article {AlAfandy2020770, title = {Using classic networks for classifying remote sensing images: Comparative study}, journal = {Advances in Science, Technology and Engineering Systems}, volume = {5}, number = {5}, year = {2020}, note = {cited By 3}, pages = {770-780}, abstract = {This paper presents a comparative study for using the deep classic convolution networks in remote sensing images classification. There are four deep convolution models that used in this comparative study; the DenseNet 196, the NASNet Mobile, the VGG 16, and the ResNet 50 models. These learning convolution models are based on the use of the ImageNet pre-trained weights, transfer learning, and then adding a full connected layer that compatible with the used dataset classes. There are two datasets are used in this comparison; the UC Merced land use dataset and the SIRI-WHU dataset. This comparison is based on the inspection of the learning curves to determine how well the training model is and calculating the overall accuracy that determines the model performance. This comparison illustrates that the use of the ResNet 50 model has the highest overall accuracy and the use of the NASNet Mobile model has the lowest overall accuracy in this study. The DenseNet 169 model has little higher overall accuracy than the VGG 16 model. {\textcopyright} 2020 ASTES Publishers. All rights reserved.}, doi = {10.25046/AJ050594}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85095877228\&doi=10.25046\%2fAJ050594\&partnerID=40\&md5=763c007cae5730097994ccc641ce3f60}, author = {AlAfandy, K.A. and Omara, H. and Lazaar, M. and Achhab, M.A.} } @conference {ElOuahabi2019, title = {Bandwidth Enhancement of Complementary Split Ring Based Antenna}, booktitle = {International Symposium on Advanced Electrical and Communication Technologies, ISAECT 2018 - Proceedings}, year = {2019}, note = {cited By 0}, doi = {10.1109/ISAECT.2018.8618820}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062440605\&doi=10.1109\%2fISAECT.2018.8618820\&partnerID=40\&md5=40529d3f58aa8740187c10d6c4f1f5f5}, author = {El Ouahabi, K. and Roky, K. and El Mrabet, O. and Aznabet, M. and Ennasar, M.A.} } @conference {Aissaoui201987, title = {Combining supervised and unsupervised machine learning algorithms to predict the learners{\textquoteright} learning styles}, booktitle = {Procedia Computer Science}, volume = {148}, year = {2019}, note = {cited By 0}, pages = {87-96}, doi = {10.1016/j.procs.2019.01.012}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062675875\&doi=10.1016\%2fj.procs.2019.01.012\&partnerID=40\&md5=bac9366951ce3839b307d3270ef38ae2}, author = {Aissaoui, O.E. and El Madani, Y.E.A. and Oughdir, L. and Allioui, Y.E.} } @article {Lachhab2019276, title = {Context-driven monitoring and control of buildings ventilation systems using big data and Internet of Things{\textendash}based technologies}, journal = {Proceedings of the Institution of Mechanical Engineers. Part I: Journal of Systems and Control Engineering}, volume = {233}, number = {3}, year = {2019}, note = {cited By 0}, pages = {276-288}, doi = {10.1177/0959651818791406}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85052604424\&doi=10.1177\%2f0959651818791406\&partnerID=40\&md5=489ec0e147a47ea73d56d67443e20f71}, author = {Lachhab, F. and Bakhouya, M. and Ouladsine, R. and Essaaidi, M.} } @article {Lachhab2019, title = {A context-driven platform using Internet of things and data stream processing for heating, ventilation and air conditioning systems control}, journal = {Proceedings of the Institution of Mechanical Engineers. Part I: Journal of Systems and Control Engineering}, year = {2019}, note = {cited By 0}, doi = {10.1177/0959651819841534}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85064252643\&doi=10.1177\%2f0959651819841534\&partnerID=40\&md5=ce7ac91656b86854112d39b244314bab}, author = {Lachhab, F. and Bakhouya, M. and Ouladsine, R. and Essaaidi, M.} } @article {ElOuazzani2019125, title = {Privacy in big data through variable t-closeness for MSN attributes}, journal = {Lecture Notes in Networks and Systems}, volume = {49}, year = {2019}, note = {cited By 0}, pages = {125-141}, doi = {10.1007/978-3-319-97719-5_9}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85063295369\&doi=10.1007\%2f978-3-319-97719-5_9\&partnerID=40\&md5=04a9a65601ac043a62f9401a6b64015f}, author = {El Ouazzani, Z. and El Bakkali, H.} } @conference {Ouarhim2019580, title = {Towards a real-time business processes validation algorithm}, booktitle = {Procedia Computer Science}, volume = {148}, year = {2019}, note = {cited By 0}, pages = {580-589}, doi = {10.1016/j.procs.2019.01.031}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062658605\&doi=10.1016\%2fj.procs.2019.01.031\&partnerID=40\&md5=a9f2730aabf731331f2000943034f0bc}, author = {Ouarhim, A. and Baina, K.} } @article {Ouaddi2018306, title = {Ant colony system for dynamic vehicle routing problem with overtime}, journal = {International Journal of Advanced Computer Science and Applications}, volume = {9}, number = {6}, year = {2018}, pages = {306-315}, doi = {10.14569/IJACSA.2018.090644}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85049537762\&doi=10.14569\%2fIJACSA.2018.090644\&partnerID=40\&md5=05f62f74b7943a59ae4ebc2b7d73e82e}, author = {Ouaddi, K. and Benadada, Y. and Mhada, F.-Z.} } @conference {Boulmrharj201856, title = {Approach for dimensioning stand-alone photovoltaic systems}, booktitle = {Energy Procedia}, volume = {153}, year = {2018}, pages = {56-61}, doi = {10.1016/j.egypro.2018.10.058}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85057433465\&doi=10.1016\%2fj.egypro.2018.10.058\&partnerID=40\&md5=b03f45460b45700ebfe92eb2f1b70e53}, author = {Boulmrharj, S. and NaitMalek, Y. and Elmouatamid, A. and Bakhouya, M. and Ouladsine, R. and Zine-Dine, K. and Khaidar, M. and Abid, R.} } @book {O{\textquoteright}Hara2018116, title = {Building an Urban food system through UDC food hubs}, series = {Changing Urban Landscapes Through Public Higher Education}, year = {2018}, pages = {116-143}, doi = {10.4018/978-1-5225-3454-9.ch006}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046487411\&doi=10.4018\%2f978-1-5225-3454-9.ch006\&partnerID=40\&md5=b72e96b6d9f72215cfbb0f00948b4e48}, author = {O{\textquoteright}Hara, S. and Jones, D. and Trobman, H.B.} } @conference {Lachhab2018694, title = {A Context-Driven Approach using IoT and Big Data Technologies for Controlling HVAC Systems}, booktitle = {2018 5th International Conference on Control, Decision and Information Technologies, CoDIT 2018}, year = {2018}, pages = {694-699}, doi = {10.1109/CoDIT.2018.8394823}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050181848\&doi=10.1109\%2fCoDIT.2018.8394823\&partnerID=40\&md5=ff44ab22f61f614bb2aa03515fbbcdf9}, author = {Lachhab, F. and Malek, Y.N. and Bakhouya, M. and Ouladsine, R. and Essaaidi, M.} } @conference {Oualahj2018, title = {A Decentralized Control of Autonomous Delay Tolerant Networks: Multi Agents Markov Decision Processes Framework}, booktitle = {IEEE International Conference on Communications}, volume = {2018-May}, year = {2018}, doi = {10.1109/ICC.2018.8422718}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051430605\&doi=10.1109\%2fICC.2018.8422718\&partnerID=40\&md5=ea20d47bd369c11fe0555f1224db09f3}, author = {Oualahj, O.A. and Kobbane, A. and Ben-Othman, J.} } @article {Tamir2018475, title = {A decision support platform based on cross-sorting methods for the selection of modeling methods: Case of the hospital supply chain performance analysis}, journal = {International Journal of Advanced Computer Science and Applications}, volume = {9}, number = {10}, year = {2018}, pages = {475-484}, doi = {10.14569/IJACSA.2018.091058}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85057264376\&doi=10.14569\%2fIJACSA.2018.091058\&partnerID=40\&md5=86e7cd3123ccc3b5399a68fccad72235}, author = {Tamir, M. and Chiheb, R. and Ouzayd, F.} } @conference {Oussidi20181, title = {Deep generative models: Survey}, booktitle = {2018 International Conference on Intelligent Systems and Computer Vision, ISCV 2018}, volume = {2018-May}, year = {2018}, pages = {1-8}, doi = {10.1109/ISACV.2018.8354080}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050964855\&doi=10.1109\%2fISACV.2018.8354080\&partnerID=40\&md5=cd609163d931e7f6f77c9850ecabcf2c}, author = {Oussidi, A. and Elhassouny, A.} } @conference {Lachhab2018, title = {An Energy-Efficient Approach for Controlling Heating and Air-Conditioning Systems}, booktitle = {Proceedings of 2017 International Renewable and Sustainable Energy Conference, IRSEC 2017}, year = {2018}, doi = {10.1109/IRSEC.2017.8477265}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85055866497\&doi=10.1109\%2fIRSEC.2017.8477265\&partnerID=40\&md5=ac2371ef07ae8fac3360b71a0343720f}, author = {Lachhab, F. and Ouladsine, R. and Bakhouya, M. and Essaaidi, M.} } @conference {Ez-Zahout20181, title = {A framework for big data analytics in secure network of video surveillance systems based on images indexation}, booktitle = {Proceedings of 2017 International Conference of Cloud Computing Technologies and Applications, CloudTech 2017}, volume = {2018-January}, year = {2018}, pages = {1-5}, doi = {10.1109/CloudTech.2017.8284726}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046693133\&doi=10.1109\%2fCloudTech.2017.8284726\&partnerID=40\&md5=1e3132548460d4f572c3a61328d08451}, author = {Ez-Zahout, A. and Oubaha, J.} } @conference {Oualhaj20181, title = {Graph-Based MDP to Mobile Source with Energy Harvesting in Delay Tolerant Networks System}, booktitle = {2017 IEEE Global Communications Conference, GLOBECOM 2017 - Proceedings}, volume = {2018-January}, year = {2018}, pages = {1-6}, doi = {10.1109/GLOCOM.2017.8253948}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046359869\&doi=10.1109\%2fGLOCOM.2017.8253948\&partnerID=40\&md5=ad621053c85f2d4d1fe75a91423a6718}, author = {Oualhaj, O.A. and Elmachkour, M. and Kobbane, A. and Ben-Othman, J.} } @article {Oufkir201872, title = {Measuring knowledge management project performance}, journal = {Advances in Intelligent Systems and Computing}, volume = {745}, year = {2018}, pages = {72-81}, doi = {10.1007/978-3-319-77703-0_7}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85045131625\&doi=10.1007\%2f978-3-319-77703-0_7\&partnerID=40\&md5=5e015ad9e8b84a851af4a4705e149472}, author = {Oufkir, L. and Kassou, I.} } @article {AitOualhaj2018, title = {Mobile delay-tolerant networks with energy-harvesting and wireless energy transfer cooperation}, journal = {Concurrency Computation}, year = {2018}, doi = {10.1002/cpe.5112}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85059067813\&doi=10.1002\%2fcpe.5112\&partnerID=40\&md5=4d5955405a79b55e86781f7a65a66687}, author = {Ait Oualhaj, O. and Kobbane, A. and Ben-Othman, J.} } @article {Ouzayd2018433, title = {Monitoring vaccine cold chain model with coloured Petri net}, journal = {International Journal of Advanced Computer Science and Applications}, volume = {9}, number = {5}, year = {2018}, pages = {433-438}, doi = {10.14569/IJACSA.2018.090556}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85049502237\&doi=10.14569\%2fIJACSA.2018.090556\&partnerID=40\&md5=e1b01d6274c2d762e344e2b45167d60f}, author = {Ouzayd, F. and Mansouri, H. and Tamir, M. and Chiheb, R. and Benhouma, Z.} } @conference {ElOuazzani201852, title = {A new technique ensuring privacy in big data: K-Anonymity without prior value of the threshold k}, booktitle = {Procedia Computer Science}, volume = {127}, year = {2018}, pages = {52-59}, doi = {10.1016/j.procs.2018.01.097}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85045639418\&doi=10.1016\%2fj.procs.2018.01.097\&partnerID=40\&md5=7faf56ed974b78a28fd943ceddc84f39}, author = {El Ouazzani, Z. and El Bakkali, H.} } @conference {Ouazzani20181, title = {A new technique ensuring privacy in big data: Variable t-closeness for sensitive numerical attributes}, booktitle = {Proceedings of 2017 International Conference of Cloud Computing Technologies and Applications, CloudTech 2017}, volume = {2018-January}, year = {2018}, pages = {1-6}, doi = {10.1109/CloudTech.2017.8284733}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046690216\&doi=10.1109\%2fCloudTech.2017.8284733\&partnerID=40\&md5=da2dc42ce72099f81271a2cf94c7e2b9}, author = {Ouazzani, Z.E. and Bakkali, H.E.} } @article {Ouzineb201890, title = {Optimal planning of buffer sizes and inspection station positions}, journal = {Production and Manufacturing Research}, volume = {6}, number = {1}, year = {2018}, note = {cited By 0}, pages = {90-112}, abstract = {The problem of buffer sizing and inspection stations positioning in unreliable production lines is a complex mixed integer nonlinear optimization problem. In this problem, we have a production line with n machines and n fixed-size (storage) buffers in series. The machines produce parts that are either conforming or nonconforming, and the line includes inspection stations that reject the nonconforming pats. The goal is to find the optimal buffer sizes, the number and positions of the inspection stations, and satisfy the customer demand on conforming parts while minimizing the total cost. We present in this paper an exact method to solve this complex manufacturing problem. We also present new theoretical results on buffer-size bounds, stationarity, and cost function convexity permitting to significantly reduce the problem complexity. These theoretical and algorithmic developments allow solving to optimality instances with up to 30 machines tools developed previously cannot solve. {\textcopyright} 2018, $\#$x00A9; 2018 The Author(s). Published by Informa UK Limited, trading as Taylor \& Francis Group.}, doi = {10.1080/21693277.2017.1422812}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85041726865\&doi=10.1080\%2f21693277.2017.1422812\&partnerID=40\&md5=49f1f20a27abf3c2e90db1cffa1a2c3e}, author = {Ouzineb, M. and Mhada, F.Z. and Pellerin, R. and El Hallaoui, I.} } @article {Ouzineb201890, title = {Optimal planning of buffer sizes and inspection station positions}, journal = {Production and Manufacturing Research}, volume = {6}, number = {1}, year = {2018}, pages = {90-112}, doi = {10.1080/21693277.2017.1422812}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85041726865\&doi=10.1080\%2f21693277.2017.1422812\&partnerID=40\&md5=49f1f20a27abf3c2e90db1cffa1a2c3e}, author = {Ouzineb, M. and Mhada, F.Z. and Pellerin, R. and El Hallaoui, I.} } @article {Ouhbi2018, title = {Sustainability requirements for connected health applications}, journal = {Journal of Software: Evolution and Process}, volume = {30}, number = {7}, year = {2018}, doi = {10.1002/smr.1922}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050354987\&doi=10.1002\%2fsmr.1922\&partnerID=40\&md5=70c90bb949fb18d52004aec275734df0}, author = {Ouhbi, S. and Fernandez-Aleman, J.L. and Toval, A. and Rivera~Pozo, J. and Idri, A.} } @conference {Idri2018, title = {A systematic map of data analytics in breast cancer}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3167918.3167930}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85044739616\&doi=10.1145\%2f3167918.3167930\&partnerID=40\&md5=4cfbf5c917bfa294988a996c72ff2234}, author = {Idri, A. and Chlioui, I. and El Ouassif, B.} } @conference {Niharmine20181, title = {Tifinagh handwritten character recognition using genetic algorithms}, booktitle = {Proceedings - 2018 International Conference on Advanced Communication Technologies and Networking, CommNet 2018}, year = {2018}, pages = {1-6}, doi = {10.1109/COMMNET.2018.8360267}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85048318442\&doi=10.1109\%2fCOMMNET.2018.8360267\&partnerID=40\&md5=5073236df8a21a7f3797ced0a0d435ec}, author = {Niharmine, L. and Outtaj, B. and Azouaoui, A.} } @conference {Boulmrharj2018, title = {Towards a battery characterization methodology for performance evaluation of micro-grid systems}, booktitle = {2018 International Conference on Smart Energy Systems and Technologies, SEST 2018 - Proceedings}, year = {2018}, doi = {10.1109/SEST.2018.8495829}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85056492547\&doi=10.1109\%2fSEST.2018.8495829\&partnerID=40\&md5=f25a82d795aa6991c23f1064013cde45}, author = {Boulmrharj, S. and NaitMalek, Y. and Mouatamid, A.E. and Ouladsine, R. and Bakhouya, M. and Ouldmoussa, M. and Zine-Dine, K. and Khaidar, M. and Abid, R.} } @conference {Elmouatamid2018984, title = {Towards a Demand/Response Control Approach for Micro-grid Systems}, booktitle = {2018 5th International Conference on Control, Decision and Information Technologies, CoDIT 2018}, year = {2018}, pages = {984-988}, doi = {10.1109/CoDIT.2018.8394951}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050227456\&doi=10.1109\%2fCoDIT.2018.8394951\&partnerID=40\&md5=97a6b224a481de8a0d5d91a46b76b895}, author = {Elmouatamid, A. and NaitMalek, Y. and Ouladsine, R. and Bakhouya, M. and Elkamoun, N. and Zine-Dine, K. and Khaidar, M. and Abid, R.} } @conference {Lachhab2018926, title = {Towards an Intelligent Approach for Ventilation Systems Control using IoT and Big Data Technologies}, booktitle = {Procedia Computer Science}, volume = {130}, year = {2018}, pages = {926-931}, doi = {10.1016/j.procs.2018.04.091}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051268549\&doi=10.1016\%2fj.procs.2018.04.091\&partnerID=40\&md5=7c925e4f04388d1fe39f849c5b0c02f1}, author = {Lachhab, F. and Bakhouya, M. and Ouladsine, R. and Essaaidi, M.} } @article {ElOuahabi2018537, title = {A very compact design of a triple-band bandstop filter based on a complementary split ring resonator}, journal = {International Journal of Microwave and Optical Technology}, volume = {13}, number = {6}, year = {2018}, pages = {537-543}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85057379564\&partnerID=40\&md5=a6c46510eb0891ee5de2a97ba4dc3343}, author = {El Ouahabi, M. and Zakriti, A. and Essaaidi, M. and Dkiouak, A.} } @conference {Ouaddi2017, title = {Ant colony system approach for dynamic vehicles routing problem multi tours}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F129474}, year = {2017}, note = {cited By 0}, abstract = {In reality, many transport companies give the possibility to use an overtime to complete the service. However, this concept is less treated in the literature of the VRP in general and of the DVRP in particular. This paper presents an approach, based on the ant colony system, which treats this concept for multi-tours DVRP. A mathematical model of this variable is then proposed. Computational results are given in a version without overtime in addition to some first results of the version with overtime. {\textcopyright} 2017 Association for Computing Machinery.}, doi = {10.1145/3090354.3090466}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028464197\&doi=10.1145\%2f3090354.3090466\&partnerID=40\&md5=8544fa68e8eb6ee3c79230c16618f329}, author = {Ouaddi, K. and Benadada, Y. and Mhada, F.Z.} } @conference {Zouina20171615, title = {An aspiring solution to the MITM bootstrap vulnerability}, booktitle = {Proceedings of the 29th International Business Information Management Association Conference - Education Excellence and Innovation Management through Vision 2020: From Regional Development Sustainability to Global Economic Growth}, year = {2017}, note = {cited By 0}, pages = {1615-1622}, abstract = {The proposed work falls within the context of improving data security for m-commerce (mobile commerce) systems. In this context we have placed under the light some flaws encountered in HTTPS (Hypertext Transfer Protocol Secure) the most used m-commerce protocol, particularly the man in the middle attack, shortly MITM. The man in the middle attack is an active listening attack; the idea of this attack is to target the handshake phase of the HTTPS protocol which is the transition from a non-secure connection to a secure connection in our case HTTP (Hypertext Transfer Protocol) to HTTPS. This paper proposes a solution to fix those flaws based on the upgrade of HSTS (HTTP Strict Transport Security) standard handshake sequence using the DNSSEC standard (Domain Name System Security Extensions).}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85029759601\&partnerID=40\&md5=963ec95920c1fef56bbbb9224b5f2501}, author = {Zouina, M. and Outtaj, B.} } @conference {Kamal201799, title = {Car recognition using the bag of features method}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2017}, note = {cited By 0}, pages = {99-102}, abstract = {In this paper, we apply the bag of features method to the car make and model recognition problem. In our implementation of the method, we use the LARS algorithm to optimize the quadratic problem known as the Lasso and by doing so we generate the dictionary of words. That dictionary is then used in conjuction to an image database to obtain a feature vector (each image yields one feature vector), said feature vector is then fed to an supervised classification algorithm (in our case an SVM). {\textcopyright} 2016 IEEE.}, doi = {10.1109/ICMCS.2016.7905554}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019159309\&doi=10.1109\%2fICMCS.2016.7905554\&partnerID=40\&md5=7fed66861fc86215dbdbd5a09e4f7f6b}, author = {Kamal, I. and Oubaha, J.} } @article {Achchab2017226, title = {A combination of regression techniques and cuckoo search algorithm for FOREX speculation}, journal = {Advances in Intelligent Systems and Computing}, volume = {569}, year = {2017}, note = {cited By 0}, pages = {226-235}, abstract = {This paper describes a hybrid model formed by a mixture of regression techniques and Cuckoo Search algorithm to speculate USD/EUR variations. Inspired by ARMA model we propose a dataset composed of historical data of USD/EUR and (JYN, EUR and BRP) variations. The dataset is used to train four regression algorithms: Multiple linear regression, Support vector regression, Partial Least Squares regression and CRT regression tree; the generated regression weights of these algorithms will be used as inputs to Cuckoo Search algorithm. The effectiveness of the proposed system against classical regression algorithms is confirmed by experiments on exchange rate prediction within the period from January 2014 to January 2016. {\textcopyright} Springer International Publishing AG 2017.}, doi = {10.1007/978-3-319-56535-4_23}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85018486816\&doi=10.1007\%2f978-3-319-56535-4_23\&partnerID=40\&md5=8ec7dbda07a48707f78a6b186721c9bf}, author = {Achchab, S. and Bencharef, O. and Ouaarab, A.} } @article {Ouhbi2017181, title = {Editorial}, journal = {Journal of Mobile Multimedia}, volume = {13}, number = {3-4}, year = {2017}, note = {cited By 0}, pages = {181-182}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85040221877\&partnerID=40\&md5=0aafa6f210492195dfab7b876d509c51}, author = {Ouhbi, B. and Berqia, A.} } @article {Ouhbi201749, title = {E-health internationalization requirements for audit purposes}, journal = {Computer Methods and Programs in Biomedicine}, volume = {144}, year = {2017}, note = {cited By 1}, pages = {49-60}, abstract = {Background and objective: In the 21st century, e-health is proving to be one of the strongest drivers for the global transformation of the health care industry. Health information is currently truly ubiquitous and widespread, but in order to guarantee that everyone can appropriately access and understand this information, regardless of their origin, it is essential to bridge the international gap. The diversity of health information seekers languages and cultures signifies that e-health applications must be adapted to satisfy their needs. Methods: In order to achieve this objective, current and future e-health programs should take into account the internationalization aspects. This paper presents an internationalization requirements specification in the form of a reusable requirements catalog, obtained from the principal related standards, and describes the key methodological elements needed to perform an e-health software audit by using the internationalization knowledge previously gathered. Results: S Health, a relevant, well-known Android application that has more than 150 million users in over 130 countries, was selected as a target for the e-health internationalization audit method and requirements specification presented above. This application example helped us to put into practice the proposal and show that the procedure is realistic and effective. Conclusions: The approach presented in this study is subject to continuous improvement through the incorporation of new knowledge originating from additional information sources, such as other standards or stakeholders. The application example is useful for early evaluation and serves to assess the applicability of the internationalization catalog and audit methodology, and to improve them. It would be advisable to develop of an automated tool with which to carry out the audit method. {\textcopyright} 2017 Elsevier B.V.}, doi = {10.1016/j.cmpb.2017.03.014}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85016069397\&doi=10.1016\%2fj.cmpb.2017.03.014\&partnerID=40\&md5=4cdb24852f0764dc64c9ed73f5614eda}, author = {Ouhbi, S. and Fernandez-Aleman, J.L. and Carrillo-De-Gea, J.M. and Toval, A. and Idri, A.} } @conference {Azougaghe2017, title = {Many-to-one matching game towards secure virtual machines migration in cloud computing}, booktitle = {2016 International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 - Proceedings}, year = {2017}, note = {cited By 0}, abstract = {Virtual machine migration represents a new topic of research last years. In this context, we present a new system based on matching game theory to design efficient and practical migration algorithms that work well with huge numbers of VMs and servers. This strategy solves VM migration, resources managements and load balancing problems in cloud computing environment. The experimental results show that our algorithm not only obtains multi-resource load balancing performance but also improves the cloud security services and gets a gain of resources consummation on all servers. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ACOSIS.2016.7843922}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85015191060\&doi=10.1109\%2fACOSIS.2016.7843922\&partnerID=40\&md5=6b59b3295f8598830c0771717fb9a86b}, author = {Azougaghe, A. and Oualhaj, O.A. and Hedabou, M. and Belkasmi, M. and Kobbane, A.} } @article {Zouina2017, title = {A novel lightweight URL phishing detection system using SVM and similarity index}, journal = {Human-centric Computing and Information Sciences}, volume = {7}, number = {1}, year = {2017}, note = {cited By 1}, abstract = {The phishing is a technique used by cyber-criminals to impersonate legitimate websites in order to obtain personal information. This paper presents a novel lightweight phishing detection approach completely based on the URL (uniform resource locator). The mentioned system produces a very satisfying recognition rate which is 95.80\%. This system, is an SVM (support vector machine) tested on a 2000 records data-set consisting of 1000 legitimate and 1000 phishing URLs records. In the literature, several works tackled the phishing attack. However those systems are not optimal to smartphones and other embed devices because of their complex computing and their high battery usage. The proposed system uses only six URL features to perform the recognition. The mentioned features are the URL size, the number of hyphens, the number of dots, the number of numeric characters plus a discrete variable that correspond to the presence of an IP address in the URL and finally the similarity index. Proven by the results of this study the similarity index, the feature we introduce for the first time as input to the phishing detection systems improves the overall recognition rate by 21.8\%. {\textcopyright} 2017, The Author(s).}, doi = {10.1186/s13673-017-0098-1}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85020465562\&doi=10.1186\%2fs13673-017-0098-1\&partnerID=40\&md5=8781f2d95cd57e8104c9158ba92a38dd}, author = {Zouina, M. and Outtaj, B.} } @conference {Lachhab201764, title = {Performance evaluation of CEP engines for stream data processing}, booktitle = {Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016}, year = {2017}, note = {cited By 2}, pages = {64-69}, abstract = {The easy deployment of wireless sensors allows the development of context-aware applications that could react to the environment changes and users{\textquoteright} preferences. For example, information extracted from data gathered using mobile phones and embedded computers in buses and taxis could be used to understand city dynamics in real-time and therefore take mitigation actions. However, gathering and real-time processing of relevant information is still a challenging task. Complex-event processing (CEP) techniques and predictive analytics have been recently proposed for analyzing streaming data in real-time in order to generate fast insights and then take suitable actions according to the environment changes. The work presented in this paper focuses mainly on the performance evaluation of three CEP engines widely used by researchers for semantic and physical streaming data processing. Experiments have been conducted using existing benchmark tools and results are reported to shed more light on the performance these engines for stream data processing. {\textcopyright} 2016 IEEE.}, doi = {10.1109/CloudTech.2016.7847726}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85013751287\&doi=10.1109\%2fCloudTech.2016.7847726\&partnerID=40\&md5=35e83758caf7164a4e2826c267fb217b}, author = {Lachhab, F. and Bakhouya, M. and Ouladsine, R. and Essaaidi, M.} } @conference {Kadi2017, title = {Quality evaluation of cardiac decision support systems using ISO 25010 standard}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, year = {2017}, note = {cited By 0}, abstract = {Clinical decision support system (CDSS) is a technology designed to assist physicians and medical stuff with clinical decision-making tasks. It aims to better the safety and quality of patient care, improve patient care treatments and outcomes, decrease the dependence on memory, lower error rates, and decrease response time. CDSS is not intended to replace clinician judgment, but it supports users with the detection and prevention of possible risks to patient safety and encouraging the appropriate usage of evidence-based practice and guidelines. The benefits of the CDSSs contribute in increasing the number of e-health applications in recent years. Cardiology healthcare institutions are adopting such systems in their departments in order to assist cardiologists when making their decisions. This study proposes a set of cardiac DSS requirements and measures the influence of these requirements on software product quality using the ISO/IEC 25010 software quality model. A checklist of cardiac DSS requirements is also presented. As a result, Functional suitability, Reliability, Performance efficiency and Operability external characteristics were identified as the most influenced by cardiac DSS requirements. {\textcopyright} 2016 IEEE.}, doi = {10.1109/AICCSA.2016.7945657}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85021912425\&doi=10.1109\%2fAICCSA.2016.7945657\&partnerID=40\&md5=92b7b2292f1248fc9c7033b5d5bfe20e}, author = {Kadi, I. and Idri, A. and Ouhbi, S.} } @article {Niharmine20173087, title = {Recognition of handwritten tifinagh characters using gradient direction features}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {95}, number = {13}, year = {2017}, note = {cited By 0}, pages = {3087-3095}, abstract = {Optical Character Recognition system goal is to convert handwritten characters input images to an editable text. Many OCR techniques have been developed by researchers for Latin and Arabic languages. Amazigh language still have few works in this area. This paper emphasizes a new methodology to recognize the Tifinagh characters using zoning gradient features with a high accuracy and recognition rate. The new methodology is based on gradient direction as features and artificial neural networks as a classifier. The novelty of the new proposed system is the high accuracy and the training time which is very small compared with other classifiers. {\textcopyright} 2005 {\textendash} ongoing JATIT \& LLS.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85024366252\&partnerID=40\&md5=012b6056b533d3ac46e12de7824b5b98}, author = {Niharmine, L. and Outtaj, B. and Azouaoui, A.} } @conference {Ouhbi2017557, title = {Requirements for a mobile personal health record to improve cardiovascular healthcare services}, booktitle = {Proceedings of the ACM Symposium on Applied Computing}, volume = {Part F128005}, year = {2017}, note = {cited By 1}, pages = {557-562}, abstract = {Analyzing health records of patients suffering from chronic diseases such as cardiovascular disease can help understanding their conditions and therefore improving healthcare services offered to them. To improve the cardiology healthcare quality and efficiency in the Autonomic Nervous System centre in Avicenne Hospital in Rabat in Morocco, a mobile personal health record (mPHR) along with an electronic health record have been developed. This paper presents our mPHR{\textquoteright}s functional requirements used in the product development. It also presents some aspects of quality evaluation of the mPHR. An experiment has been conducted to assess and improve the mPHR{\textquoteright}s quality using the ISO/IEC 25010 standard. Copyright 2017 ACM.}, doi = {10.1145/3019612.3019725}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85020871426\&doi=10.1145\%2f3019612.3019725\&partnerID=40\&md5=6cf797c1b1a37c7309de64935405f2e8}, author = {Ouhbi, S. and Idri, A. and Hakmi, R. and Benjelloun, H. and Fernandez-Aleman, J.L. and Toval, A.} } @conference {Ouhbi2017285, title = {A reusable requirements catalog for internationalized and sustainable blood donation apps}, booktitle = {ENASE 2017 - Proceedings of the 12th International Conference on Evaluation of Novel Approaches to Software Engineering}, year = {2017}, note = {cited By 0}, pages = {285-292}, abstract = {Blood donation mobile applications are efficient tools to increase awareness about the importance of blood donation acts and to attract blood donors. The aim of this paper is to define a reusable requirements repository (catalog) for blood donation applications based on the main related software engineering standards, e-health technology standards and literature. The catalog contains requirements regarding internationalization to bridge the cultural and language barriers among blood donors. It includes also requirements for sustainable blood donation applications which cover the individual, social, environmental, and technical dimensions of sustainability. This catalog can be very useful to develop, evaluate and audit blood donation applications and it can be adapted to other m-health applications. {\textcopyright} 2017 by SCITEPRESS - Science and Technology Publications, Lda. All Rights Reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85025445810\&partnerID=40\&md5=b3c2b8763e5f5a729522529e5ca3e148}, author = {Ouhbi, S. and Fernandez-Aleman, J.L. and Idri, A. and Toval, A. and Pozo, J.R. and Bajta, M.E.} } @conference {Bernatchou2017177, title = {Towards a simulation model of an outpatient chemotherapy unit}, booktitle = {2017 International Colloquium on Logistics and Supply Chain Management: Competitiveness and Innovation in Automobile and Aeronautics Industries, LOGISTIQUA 2017}, year = {2017}, note = {cited By 0}, pages = {177-182}, abstract = {This paper presents a case study of a cancer center. A discrete event simulation model with ARENA software was developed to model and analyze the patient flow and evaluate performance through the outpatient chemotherapy unit. Simulation results determine where over-utilization of resources and long waiting times of patient per process. {\textcopyright} 2017 IEEE.}, doi = {10.1109/LOGISTIQUA.2017.7962894}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85026682297\&doi=10.1109\%2fLOGISTIQUA.2017.7962894\&partnerID=40\&md5=a537f15fa482d1d24fe1c3a65dcc4707}, author = {Bernatchou, M. and Ouzayd, F. and Bellabdaoui, A. and Hamdaoui, M.} } @conference { ISI:000386851600006, title = {A College Admissions Game for Content Caching in Heterogeneous Delay Tolerant Networks}, booktitle = {2016 23RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT)}, year = {2016}, note = {23rd International Conference on Telecommunications (ICT), Thessaloniki, GREECE, MAY 16-18, 2016}, abstract = {In recent years, Delay Tolerant Networks (DTNs) have been successfully presented as a possible extension of the Internet architecture in order to provide communication support to existing networks. However, these networks have a major issue which is the coordination among relays. In this paper, we propose a novel mechanism source-relay association approach for heterogeneous DTNs that exploits the information about the history and predictability of the relay nodes while also we focus on the source packet dissemination to a destination using tow-hop relaying scheme, considering network resource constraints: the relay buffer, the packet life time, and the energy consumption according to the mobile technologies. We formulate the problem as a college admissions game in which a number of colleges, i.e., data source seek to recruit a number of students, i.e., relays nodes. In this game, the data source and relays nodes rank one another based on preference functions that capture the data sources need to optimize their utilities which are functions of packet success rate and delay. We propose a novel distributed algorithm that leads to a stable matching among data sources and relays nodes. We show that the proposed approach can yields the better performance improvement of the traffic among the source and destination node.}, isbn = {978-1-5090-1990-8}, author = {Oualhaj, Omar Ait and Sabir, Essaid and Kobbane, Abdellatif and Ben-Othman, Jalel and El Koutbi, Mohammed} } @conference {Oualhaj2016, title = {A college admissions game for content caching in heterogeneous delay tolerant networks}, booktitle = {2016 23rd International Conference on Telecommunications, ICT 2016}, year = {2016}, note = {cited By 0}, abstract = {In recent years, Delay Tolerant Networks (DTNs) have been successfully presented as a possible extension of the Internet architecture in order to provide communication support to existing networks. However, these networks have a major issue which is the coordination among relays. In this paper, we propose a novel mechanism source-relay association approach for heterogeneous DTNs that exploits the information about the history and predictability of the relay nodes while also we focus on the source packet dissemination to a destination using tow-hop relaying scheme, considering network resource constraints: the relay buffer, the packet life time, and the energy consumption according to the mobile technologies. We formulate the problem as a college admissions game in which a number of colleges, i.e., data source seek to recruit a number of students, i.e., relays nodes. In this game, the data source and relays nodes rank one another based on preference functions that capture the data sources need to optimize their utilities which are functions of packet success rate and delay. We propose a novel distributed algorithm that leads to a stable matching among data sources and relays nodes. We show that the proposed approach can yields the better performance improvement of the traffic among the source and destination node. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ICT.2016.7500348}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979210767\&doi=10.1109\%2fICT.2016.7500348\&partnerID=40\&md5=641b2fc904d804463ca747bb6dedfe63}, author = {Oualhaj, O.A.a and Sabir, E.b and Kobbane, A.a c and Ben-Othman, J.c and Koutbi, M.E.a} } @article { ISI:000372921700003, title = {Co-located and distributed natural-language requirements specification: traditional versus reuse-based techniques}, journal = {JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS}, volume = {28}, number = {3}, year = {2016}, month = {MAR}, pages = {205-227}, abstract = {{Requirements Engineering (RE) includes processes intended to elicit, analyse, specify and validate systems and software requirements throughout the software life cycle. Mastering the principles of RE is key to achieving the goals of better, cheaper and quicker systems and software development projects. It is also important to be prepared to work with remote teammates, as distributed and global projects are becoming more common. This paper presents an experiment with a total of 31 students from two universities in Spain and Morocco who were assigned to either a co-located or a distributed team. Both traditional and reuse-based requirements specification techniques were applied by the participants to produce requirements documents. Their outcomes were then analysed, and the approaches were compared from the point of view of their effect on a set of performance-based and perception-based variables in co-located and distributed settings. We found significant differences in only productivity (Z=-2.320}, issn = {2047-7473}, doi = {10.1002/smr.1772}, author = {Carrillo de Gea, Juan M. and Nicolas, Joaquin and Fernandez Aleman, Jose L. and Toval, Ambrosio and Ouhbi, Sofia and Idri, Ali} } @article {CarrilloDeGea2016205, title = {Co-located and distributed natural-language requirements specification: Traditional versus reuse-based techniques}, journal = {Journal of Software: Evolution and Process}, volume = {28}, number = {3}, year = {2016}, note = {cited By 1}, pages = {205-227}, abstract = {{Requirements Engineering (RE) includes processes intended to elicit, analyse, specify and validate systems and software requirements throughout the software life cycle. Mastering the principles of RE is key to achieving the goals of better, cheaper and quicker systems and software development projects. It is also important to be prepared to work with remote teammates, as distributed and global projects are becoming more common. This paper presents an experiment with a total of 31 students from two universities in Spain and Morocco who were assigned to either a co-located or a distributed team. Both traditional and reuse-based requirements specification techniques were applied by the participants to produce requirements documents. Their outcomes were then analysed, and the approaches were compared from the point of view of their effect on a set of performance-based and perception-based variables in co-located and distributed settings. We found significant differences in only productivity (Z = -2.320}, doi = {10.1002/smr.1772}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84977867180\&doi=10.1002\%2fsmr.1772\&partnerID=40\&md5=8d208a58af8dc0f155d3918e16591c20}, author = {Carrillo de Gea, J.M.a and Nicol{\~A}{\textexclamdown}s, J.a and Fern{\~A}{\textexclamdown}ndez Alem{\~A}{\textexclamdown}n, J.L.a and Toval, A.a and Ouhbi, S.b and Idri, A.b} } @article {11390487420160301, title = {Co-located and distributed natural-language requirements specification: traditional versus reuse-based techniques.}, journal = {Journal of Software: Evolution \& Process}, volume = {28}, number = {3}, year = {2016}, pages = {205 - 227}, abstract = {Requirements Engineering (RE) includes processes intended to elicit, analyse, specify and validate systems and software requirements throughout the software life cycle. Mastering the principles of RE is key to achieving the goals of better, cheaper and quicker systems and software development projects. It is also important to be prepared to work with remote teammates, as distributed and global projects are becoming more common. This paper presents an experiment with a total of 31 students from two universities in Spain and Morocco who were assigned to either a co-located or a distributed team. Both traditional and reuse-based requirements specification techniques were applied by the participants to produce requirements documents. Their outcomes were then analysed, and the approaches were compared from the point of view of their effect on a set of performance-based and perception-based variables in co-located and distributed settings. We found significant differences in only productivi}, keywords = {Computer software, Computer software development, experiment, global software development, internationalisation, Requirements engineering, requirements reuse, requirements specification, Software engineering, software engineering education, Specifications}, issn = {20477473}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=113904874\&site=ehost-live}, author = {de Gea, Juan M. Carrillo and Nicolas, Joaquin and Fernandez Aleman, Jose L. and Toval, Ambrosio and Ouhbi, Sofia and Idri, Ali} } @conference { ISI:000385280000048, title = {On the Deployment Quality for Multi-intrusion Detection in Wireless Sensor Networks}, booktitle = {PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION \& COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2}, series = {Lecture Notes in Electrical Engineering}, volume = {381}, year = {2016}, note = {Mediterranean Conference on Information and Communication Technologies (MedCT), Saidia, MOROCCO, MAY 07-09, 2015}, pages = {469-478}, abstract = {The intrusion detection in a Wireless Sensor Network is defined as a mechanism to monitor and detect any intruder in a sensing area. The sensor deployment quality is a critical issue since it reflects the cost and detection capability of a wireless sensor network. When the random deployment is required, which sensor nodes are uniformly randomly distributed over on surface area, determining the deployment quality becomes challenging. In the intrusion detection application, it is necessary to define more precise measures of sensing range and node density that impact overall system performance. To enhance the detection quality for single/multi intrusion, a probabilistic intrusion detection models are adopted, called single and multi sensing probability detection and the deployment quality issue is surveyed and analysed in term of coverage.}, isbn = {978-3-319-30298-0; 978-3-319-30296-6}, issn = {1876-1100}, doi = {10.1007/978-3-319-30298-0\_48}, author = {Assad, Noureddine and Elbhiri, Brahim and Faqihi, My Ahmed and Ouadou, Mohamed and Aboutajdine, Driss}, editor = {ElOualkadi, A and Choubani, F and ElMoussati, A} } @article {Assad2016469, title = {On the deployment quality for multi-intrusion detection in wireless sensor networks}, journal = {Lecture Notes in Electrical Engineering}, volume = {381}, year = {2016}, note = {cited By 0}, pages = {469-478}, abstract = {The intrusion detection in a Wireless Sensor Network is defined as a mechanism to monitor and detect any intruder in a sensing area. The sensor deployment quality is a critical issue since it reflects the cost and detection capability of a wireless sensor network. When the random deployment is required, which sensor nodes are uniformly randomly distributed over on surface area, determining the deployment quality becomes challenging. In the intrusion detection application, it is necessary to define more precise measures of sensing range and node density that impact overall system performance. To enhance the detection quality for single/multi intrusion, a probabilistic intrusion detection models are adopted, called single and multi sensing probability detection and the deployment quality issue is surveyed and analysed in term of coverage. {\textcopyright} Springer International Publishing Switzerland 2016.}, doi = {10.1007/978-3-319-30298-0_48}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84964066188\&doi=10.1007\%2f978-3-319-30298-0_48\&partnerID=40\&md5=5dca2bc944d09de42dd56334a955161e}, author = {Assad, N.a and Elbhiri, B.b and Faqihi, M.A.c and Ouadou, M.a and Aboutajdine, D.a} } @article {Ouahabi201658, title = {Dual-band band stop filter based on complementary split ring resonator}, journal = {International Journal of Microwave and Optical Technology}, volume = {11}, number = {1}, year = {2016}, note = {cited By 0}, pages = {58-63}, abstract = {This paper describes the design of dual-band band stop filter (DBBSF). This architecture use complementary split ring resonator to tune the band stop frequencies and the filter characteristics are improved using three open stubs. The CSRR is used to reject two frequency responses at 2.45GHz and 5.8GHz, operating in the Industrial Scientific Medical (ISM), and the open stubs are employed to improve the return loss between the two frequency responses. To validate the design concept, a prototype of DBBSF was fabricated and evaluated. The measured frequency responses agree well with the simulation results, validating our proposed design. {\textcopyright} 2016 IAMOT.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84957795026\&partnerID=40\&md5=812924442f8aa6943b13515c0beae228}, author = {Ouahabi, M.E.a and Zakriti, A.b and Essaaidi, M.c and Touhami, N.A.a} } @article {11387931120160401, title = {Efficient deployment quality analysis for intrusion detection in wireless sensor networks.}, journal = {Wireless Networks (10220038)}, volume = {22}, number = {3}, year = {2016}, pages = {991 - 1006}, abstract = {The intrusion detection in a Wireless Sensor Network is defined as a mechanism to monitor and detect any intruder in a sensing area. The sensor deployment quality is a critical issue since it reflects the cost and detection capability of a wireless sensor network. The quality of deterministic deployment can be determined sufficiently by a rigorous analysis before the deployment. However, when random deployment is required, determining the deployment quality becomes challenging. In the intrusion detection application, it is necessary to define more precise measures of sensing range, transmission range, and node density that impact overall system performance. The major question is centred around the quality of intrusion detection in WSN, how we can guarantee that each point of the sensing area is covered by at least one sensor node, and what a sufficient condition to guarantee the network connectivity? In this paper, we propose an appropriate probabilistic model which provides the cover}, keywords = {Graph theory, Integer programming, Intrusion detection probability, Intrusion detection systems (Computer security), Multiple access protocols (Computer network protocols), Network connectivity, Network coverage, Quality of service, Sensing range, Transmission range, Wireless sensor networks}, issn = {10220038}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=113879311\&site=ehost-live}, author = {Assad, Noureddine and Elbhiri, Brahim and Faqihi, Moulay and Ouadou, Mohamed and Aboutajdine, Driss} } @article { ISI:000372921300019, title = {Efficient deployment quality analysis for intrusion detection in wireless sensor networks}, journal = {WIRELESS NETWORKS}, volume = {22}, number = {3}, year = {2016}, month = {APR}, pages = {991-1006}, abstract = {The intrusion detection in a Wireless Sensor Network is defined as a mechanism to monitor and detect any intruder in a sensing area. The sensor deployment quality is a critical issue since it reflects the cost and detection capability of a wireless sensor network. The quality of deterministic deployment can be determined sufficiently by a rigorous analysis before the deployment. However, when random deployment is required, determining the deployment quality becomes challenging. In the intrusion detection application, it is necessary to define more precise measures of sensing range, transmission range, and node density that impact overall system performance. The major question is centred around the quality of intrusion detection in WSN, how we can guarantee that each point of the sensing area is covered by at least one sensor node, and what a sufficient condition to guarantee the network connectivity? In this paper, we propose an appropriate probabilistic model which provides the coverage and connectivity in k-sensing detection of a wireless sensor network. We have proved the capability of our approach using a geometric analysis and a probabilistic model.}, issn = {1022-0038}, doi = {10.1007/s11276-015-1015-z}, author = {Assad, Noureddine and Elbhiri, Brahim and Faqihi, Moulay Ahmed and Ouadou, Mohamed and Aboutajdine, Driss} } @article {Assad2016991, title = {Efficient deployment quality analysis for intrusion detection in wireless sensor networks}, journal = {Wireless Networks}, volume = {22}, number = {3}, year = {2016}, note = {cited By 0}, pages = {991-1006}, abstract = {The intrusion detection in a Wireless Sensor Network is defined as a mechanism to monitor and detect any intruder in a sensing area. The sensor deployment quality is a critical issue since it reflects the cost and detection capability of a wireless sensor network. The quality of deterministic deployment can be determined sufficiently by a rigorous analysis before the deployment. However, when random deployment is required, determining the deployment quality becomes challenging. In the intrusion detection application, it is necessary to define more precise measures of sensing range, transmission range, and node density that impact overall system performance. The major question is centred around the quality of intrusion detection in WSN, how we can guarantee that each point of the sensing area is covered by at least one sensor node, and what a sufficient condition to guarantee the network connectivity? In this paper, we propose an appropriate probabilistic model which provides the coverage and connectivity in k-sensing detection of a wireless sensor network. We have proved the capability of our approach using a geometric analysis and a probabilistic model. {\textcopyright} 2015, Springer Science+Business Media New York.}, doi = {10.1007/s11276-015-1015-z}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962534941\&doi=10.1007\%2fs11276-015-1015-z\&partnerID=40\&md5=6a1fff96c40ee0d1aa4f74e4d9c1a592}, author = {Assad, N.a and Elbhiri, B.b and Faqihi, M.A.c and Ouadou, M.a and Aboutajdine, D.a} } @article {Oufkir2016242, title = {Knowledge management performance measurement: A generic framework}, journal = {Communications in Computer and Information Science}, volume = {615}, year = {2016}, note = {cited By 0}, pages = {242-254}, abstract = {This theoretical article aims to propose a generic framework for measuring performance of Knowledge Management (KM) projects based on critical literature review. The proposed framework fills the existing gap on KM performance measurement in two points: (i) it provides a generic tool that is able to assess all kinds of KM project as well as the overall organization KM, (ii) it assesses KM projects according to KM objectives in a generic manner. Our framework (GKMPM) relies on a process reference model that provides a KM common understanding in a process based view. It is based on a goal-oriented measurement approach and considers that KM performance dimensions are stakeholder{\textquoteright}s objectives. The framework application follows a procedural approach that begins with the KM project modelling, followed by the objectives prioritization. The next step consists of collecting and analysing data for pre-designed measures, and produces a set of key performance indicators (KPIs) related to the KM project processes and in accordance with its objectives. {\textcopyright} Springer International Publishing Switzerland 2016.}, doi = {10.1007/978-3-319-40180-5_17}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979022041\&doi=10.1007\%2f978-3-319-40180-5_17\&partnerID=40\&md5=7353ebf3c020ba8a9bc9458832afda06}, author = {Oufkir, L. and Fredj, M. and Kassou, I.} } @conference { ISI:000389806000017, title = {Knowledge Management Performance Measurement: A Generic Framework}, booktitle = {DATABASES AND INFORMATION SYSTEMS, DB\&IS 2016}, series = {Communications in Computer and Information Science}, volume = {615}, year = {2016}, note = {12th International Baltic Conference on Databases and Information Systems (DB and IS), Riga, LATVIA, JUL 04-06, 2016}, pages = {242-254}, publisher = {Univ Latvia, Fac Comp; Exigen Serv Latvia; IEEE; Springer}, organization = {Univ Latvia, Fac Comp; Exigen Serv Latvia; IEEE; Springer}, abstract = {This theoretical article aims to propose a generic framework for measuring performance of Knowledge Management (KM) projects based on critical literature review. The proposed framework fills the existing gap on KM performance measurement in two points: (i) it provides a generic tool that is able to assess all kinds of KM project as well as the overall organization KM, (ii) it assesses KM projects according to KM objectives in a generic manner. Our framework (GKMPM) relies on a process reference model that provides a KM common understanding in a process based view. It is based on a goal-oriented measurement approach and considers that KM performance dimensions are stakeholder{\textquoteright}s objectives. The framework application follows a procedural approach that begins with the KM project modelling, followed by the objectives prioritization. The next step consists of collecting and analysing data for pre-designed measures, and produces a set of key performance indicators (KPIs) related to the KM project processes and in accordance with its objectives.}, isbn = {978-3-319-40180-5; 978-3-319-40179-9}, issn = {1865-0929}, doi = {10.1007/978-3-319-40180-5\_17}, author = {Oufkir, Latifa and Fredj, Mounia and Kassou, Ismail}, editor = {Arnicans, G and Arnicane, V and Borzovs, J and Niedrite, L} } @conference {DBLP:conf/balt/OufkirFK16, title = {Knowledge Management Performance Measurement: {A} Generic Framework}, booktitle = {Databases and Information Systems - 12th International Baltic Conference, DB{\&}IS 2016, Riga, Latvia, July 4-6, 2016, Proceedings}, year = {2016}, pages = {242{\textendash}254}, doi = {10.1007/978-3-319-40180-5_17}, url = {http://dx.doi.org/10.1007/978-3-319-40180-5_17}, author = {Latifa Oufkir and Mounia Fredj and Ismail Kassou} } @conference {Amine2016133, title = {Matching game for green uplink in hyper dense LTE HeTNets}, booktitle = {Proceedings - 2016 International Conference on Wireless Networks and Mobile Communications, WINCOM 2016: Green Communications and Networking}, year = {2016}, note = {cited By 0}, pages = {133-139}, abstract = {In this paper, we aim to improve the energy efficiency of cellular users located in hyper-dense co-channel deployments of LTE small cell Networks (SCNs), randomly distributed within LTE macro cell networks (MCNs). Avoiding the severe cross-Tier interferences at the small base stations (SBSs) levels caused by the uplink transmissions between the macro indoor users (which are inside the SBS coverage area) and the macro base station (MBS), ensuring load balancing, and improving energy efficiency are critical technical challenges in hyper-dense co-channel LTE SCNs deployments. As a solution, we formulate our problem as a matching game, then we propose the deferred acceptance algorithm to compute the optimal stable matching consisting of assigning each macro indoor user to the most suitable SBS and vice versa. Simulation results validate our solution, and show how it can effectively improve the energy efficiency of cellular users in hyper-dense LTE HetNets compared to the default Max-SINR association scheme. {\textcopyright} 2016 IEEE.}, doi = {10.1109/WINCOM.2016.7777204}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85010465149\&doi=10.1109\%2fWINCOM.2016.7777204\&partnerID=40\&md5=cfdd0315adeb3a468a5382cae7b1ed26}, author = {Amine, M. and Walid, A. and Oualhaj, O.A. and Kobbane, A.} } @conference { ISI:000391420400024, title = {Matching Game for Green Uplink in Hyper Dense LTE HeTNets}, booktitle = {2016 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM)}, year = {2016}, note = {International Conference on Wireless Networks and Mobile Communications (WINCOM), Fez, MOROCCO, OCT 26-29, 2016}, pages = {P133-P139}, publisher = {Univ Sidi Mohamed Ben Abdellah; FST FES; MobiTic; IEEE; IEEE Commun Soc; FSDM; ENSIAS; FST Mohammedia; CLusMed; TICSM Res Pole; Master Tec; CNRST; EBSA Fez; Mobit Assoc}, organization = {Univ Sidi Mohamed Ben Abdellah; FST FES; MobiTic; IEEE; IEEE Commun Soc; FSDM; ENSIAS; FST Mohammedia; CLusMed; TICSM Res Pole; Master Tec; CNRST; EBSA Fez; Mobit Assoc}, abstract = {In this paper, we aim to improve the energy efficiency of cellular users located in hyper-dense co-channel deployments of LTE small cell Networks (SCNs), randomly distributed within LTE macro cell networks (MCNs). Avoiding the severe cross-tier interferences at the small base stations (SBSs) levels caused by the uplink transmissions between the macro indoor users (which are inside the SBS coverage area) and the macro base station (MBS), ensuring load balancing, and improving energy efficiency are critical technical challenges in hyper-dense co-channel LTE SCNs deployments. As a solution, we formulate our problem as a matching game, then we propose the deferred acceptance algorithm to compute the optimal stable matching consisting of assigning each macro indoor user to the most suitable SBS and vice versa. Simulation results validate our solution, and show how it can effectively improve the energy efficiency of cellular users in hyper-dense LTE HetNets compared to the default Max-SINR association scheme.}, isbn = {978-1-5090-3837-4}, author = {Amine, Mariame and Walid, Abdellaziz and Ait Oualhaj, Omar and Kobbane, Abdellatif}, editor = {ElKamili, M and Berrada, I and Badri, A and Ghennioui, H} } @conference {Ouaddi2016, title = {Multi period dynamic vehicles routing problem: Literature review, modelization and resolution}, booktitle = {Proceedings of the 3rd IEEE International Conference on Logistics Operations Management, GOL 2016}, year = {2016}, note = {cited By 0}, abstract = {Being member of the VRP family, the Dynamic VRP (DVRP) has been a topic of interest in the realm of research, especially in the last decade. The steps of resolution were based on various approaches, ranging from the exact meta-heuristic to customized methods. This paper presents a literature review of the DVRP by classifying relevant studies according to the adopted approach of resolution. The dynamic extension of a version already present in the literature of the turned VRP multi classical is described then. A mathematical modeling is proposed for this extension. For the resolution of our problem, we adopted an approach based on the system of the colony of ants. {\textcopyright} 2016 IEEE.}, doi = {10.1109/GOL.2016.7731706}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85001930738\&doi=10.1109\%2fGOL.2016.7731706\&partnerID=40\&md5=a7ddfd023d856f524eb379bb4ae1805a}, author = {Ouaddi, K. and Benadada, Y. and Mhada, F.-Z.} } @conference { ISI:000392439200048, title = {Multi period dynamic vehicles routing problem: literature review, modelization and resolution}, booktitle = {PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL CONFERENCE ON LOGISTICS OPERATIONS MANAGEMENT (GOL{\textquoteright}16)}, year = {2016}, note = {3rd IEEE International Conference on Logistics Operations Management (GOL), Fes, MOROCCO, MAY 23-25, 2016}, publisher = {Sidi Mohammed Ben Abdellah Univ Fes, Fac Sci \& Technol; Mohammed V Univ Rabat, ENSIAS Sch; Univ Havre; IEEE}, organization = {Sidi Mohammed Ben Abdellah Univ Fes, Fac Sci \& Technol; Mohammed V Univ Rabat, ENSIAS Sch; Univ Havre; IEEE}, abstract = {Being member of the VRP family, the Dynamic VRP (DVRP) has been a topic of interest in the realm of research, especially in the last decade. The steps of resolution were based on various approaches, ranging from the exact meta-heuristic to customized methods. This paper presents a literature review of the DVRP by classifying relevant studies according to the adopted approach of resolution. The dynamic extension of a version already present in the literature of the turned VRP multi classical is described then. A mathematical modeling is proposed for this extension. For the resolution of our problem, we adopted an approach based on the system of the colony of ants.}, isbn = {978-1-4673-8571-8}, author = {Ouaddi, Khaoula and Benadada, Youssef and Mhada, Fatima-Zahra}, editor = {Alaoui, AE and Benadada, Y and Boukachour, J} } @article { ISI:000391831100003, title = {Multilevel hybrid method for optimal buffer sizing and inspection stations positioning}, journal = {SPRINGERPLUS}, volume = {5}, year = {2016}, month = {NOV 30}, abstract = {Designing competitive manufacturing systems with high levels of productivity and quality at a reasonable cost is a complex task. Decision makers must face numerous decision variables which involve multiple and iterative analysis of the estimated cost, quality and productivity of each design alternative. This paper adresses this issue by providing a fast algorithm for solving the buffer sizing and inspection positioning problem of large production lines by combining heuristic and exact algorithms. We develop a multilevel hybrid search method combining a genetic algorithm and tabu search to identify promising locations for the inspection stations and an exact method that optimizes rapidly (in polynomial time) the buffers{\textquoteright} sizes for each location. Our method gives valuable insights into the problem, and its solution time is a small fraction of that required by the exact method on production lines with 10-30 machines.}, issn = {2193-1801}, doi = {10.1186/s40064-016-3756-2}, author = {Mhada, Fatima Zahra and Ouzineb, Mohamed and Pellerin, Robert and El Hallaoui, Issmail} } @article {Mhada2016, title = {Multilevel hybrid method for optimal buffer sizing and inspection stations positioning}, journal = {SpringerPlus}, volume = {5}, number = {1}, year = {2016}, note = {cited By 0}, abstract = {Designing competitive manufacturing systems with high levels of productivity and quality at a reasonable cost is a complex task. Decision makers must face numerous decision variables which involve multiple and iterative analysis of the estimated cost, quality and productivity of each design alternative. This paper adresses this issue by providing a fast algorithm for solving the buffer sizing and inspection positioning problem of large production lines by combining heuristic and exact algorithms. We develop a multilevel hybrid search method combining a genetic algorithm and tabu search to identify promising locations for the inspection stations and an exact method that optimizes rapidly (in polynomial time) the buffers{\textquoteright} sizes for each location. Our method gives valuable insights into the problem, and its solution time is a small fraction of that required by the exact method on production lines with 10{\textendash}30 machines. {\textcopyright} 2016, The Author(s).}, doi = {10.1186/s40064-016-3756-2}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85000578231\&doi=10.1186\%2fs40064-016-3756-2\&partnerID=40\&md5=135ff08d6855c8cc393cf2f8c4a44f7c}, author = {Mhada, F.Z.a and Ouzineb, M.b and Pellerin, R.c and El Hallaoui, I.d} } @conference { ISI:000392439200033, title = {Proposal of a modeling approach and a set of KPI to the drug supply chain within the hospital}, booktitle = {PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL CONFERENCE ON LOGISTICS OPERATIONS MANAGEMENT (GOL{\textquoteright}16)}, year = {2016}, note = {3rd IEEE International Conference on Logistics Operations Management (GOL), Fes, MOROCCO, MAY 23-25, 2016}, publisher = {Sidi Mohammed Ben Abdellah Univ Fes, Fac Sci \& Technol; Mohammed V Univ Rabat, ENSIAS Sch; Univ Havre; IEEE}, organization = {Sidi Mohammed Ben Abdellah Univ Fes, Fac Sci \& Technol; Mohammed V Univ Rabat, ENSIAS Sch; Univ Havre; IEEE}, abstract = {The hospital is a complex system where many actors are involved; The challenges that this environment is facing justify the focus on this research subject. The contribution of the paper includes a proposition of a four-level model, that describes the hospital drug supply chain, based on the combination of the Supply Chain Operation Reference (SCOR) and Business Process Modelling Notation (BPMN), and the identification of a set of key performance indicators (KPI) that assess how well the drugs management process within the hospital are effective and efficient and how to improve them.}, isbn = {978-1-4673-8571-8}, author = {Mezouar, Houda and El Afia, Abdellatif and Chiheb, Radouane and Ouzayd, Fatima}, editor = {Alaoui, AE and Benadada, Y and Boukachour, J} } @conference {Mezouar2016, title = {Proposal of a modeling approach and a set of KPI to the drug supply chain within the hospital}, booktitle = {Proceedings of the 3rd IEEE International Conference on Logistics Operations Management, GOL 2016}, year = {2016}, note = {cited By 0}, abstract = {The hospital is a complex system where many actors are involved; The challenges that this environment is facing justify the focus on this research subject. The contribution of the paper includes a proposition of a four-level model, that describes the hospital drug supply chain, based on the combination of the Supply Chain Operation Reference (SCOR) and Business Process Modelling Notation (BPMN), and the identification of a set of key performance indicators (KPI) that assess how well the drugs management process within the hospital are effective and efficient and how to improve them. {\textcopyright} 2016 IEEE.}, doi = {10.1109/GOL.2016.7731691}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85002170892\&doi=10.1109\%2fGOL.2016.7731691\&partnerID=40\&md5=21c51e9ea093480cdc5817205e47fe61}, author = {Mezouar, H. and Elafia, A. and Chiheb, R. and Ouzayd, F.} } @conference { ISI:000391420300054, title = {Requirements Specification of an e-Health Solution to Improve Cardiovascular Healthcare Services in Morocco}, booktitle = {2016 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, series = {International Conference on Intelligent Systems, Theories and Applications}, year = {2016}, note = {11th International Conference on Intelligent Systems - Theories and Applications (SITA), Mohammedia, MOROCCO, OCT 19-20, 2016}, publisher = {IEEE; Univ Hassan Casablanca; IEEE Morocco Sect; Fac Sci Tech Mohammedia}, organization = {IEEE; Univ Hassan Casablanca; IEEE Morocco Sect; Fac Sci Tech Mohammedia}, abstract = {Cardiovascular disease is the leading cause of deaths in the world. By analyzing data from health records this chronic disease can be better understood. This paper presents the software requirements specification (SRS) of an e-health solution to improve the cardiology healthcare quality and efficiency in Morocco. Based on this SRS, a mobile personal health record along with an electronic health record have been developed for the Autonomic Nervous System centre in Avicenne Hospital in Rabat. Requirements and characteristics of the mobile solution are detailed in this study. Moreover, an empirical evaluation has been conducted to assess and improve the quality of the mobile personal health record using the ISO/IEC 25010 standard.}, isbn = {978-1-5090-5781-8}, issn = {2378-2528}, author = {Ouhbi, Sofia and Idri, Ali and Hakmi, Rachid and Benjelloun, Halima and Luis Fernandez-Aleman, Jose and Toval, Ambrosio} } @conference {Ouhbi2016, title = {Requirements specification of an e-health solution to improve cardiovascular healthcare services in Morocco}, booktitle = {SITA 2016 - 11th International Conference on Intelligent Systems: Theories and Applications}, year = {2016}, note = {cited By 0}, abstract = {Cardiovascular disease is the leading cause of deaths in the world. By analyzing data from health records this chronic disease can be better understood. This paper presents the software requirements specification (SRS) of an e-health solution to improve the cardiology healthcare quality and efficiency in Morocco. Based on this SRS, a mobile personal health record along with an electronic health record have been developed for the Autonomic Nervous System centre in Avicenne Hospital in Rabat. Requirements and characteristics of the mobile solution are detailed in this study. Moreover, an empirical evaluation has been conducted to assess and improve the quality of the mobile personal health record using the ISO/IEC 25010 standard. {\textcopyright} 2016 IEEE.}, doi = {10.1109/SITA.2016.7772309}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85010407980\&doi=10.1109\%2fSITA.2016.7772309\&partnerID=40\&md5=005f49eb037586504f1262f955f907b1}, author = {Ouhbi, S.a and Idri, A.a and Hakmi, R.a and Benjelloun, H.b and Fernandez-Aleman, J.L.c and Toval, A.c} } @conference { ISI:000389590600130, title = {Towards a Context-aware Platform for Complex and. Stream Event Processing}, booktitle = {2016 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING \& SIMULATION (HPCS 2016)}, year = {2016}, note = {14th International Conference on High Performance Computing \& Simulation (HPCS), Innsbruck, AUSTRIA, JUL 18-22, 2016}, pages = {961-966}, publisher = {Assoc Comp Machinery; IEEE; Int Federation Informat Proc; ACM SIGACT; ACM SIGAPP; ACM SIGARCH; ACM SIGMICRO; ACM SIGMOD; ACM SIGSIM; IEEE Austria Sect; IEEE Dayton Sect; Altair PBS Works; E4 Comp Engn; European Grid Infrastructure; HUAWEI Technologies Co }, organization = {Assoc Comp Machinery; IEEE; Int Federation Informat Proc; ACM SIGACT; ACM SIGAPP; ACM SIGARCH; ACM SIGMICRO; ACM SIGMOD; ACM SIGSIM; IEEE Austria Sect; IEEE Dayton Sect; Altair PBS Works; E4 Comp Engn; European Grid Infrastructure; HUAWEI Technologies Co }, abstract = {With rapid expansion of wireless ad hoc networks and their interactions with wired networks together with the use of location-based services and the deployment of mobile and wearable sensor devices, it is now possible to develop context aware applications such as those in healthcare and transportation. These applications could react to the environment changes and users{\textquoteright} preference with the main aim is to make their life more comfortable according to their locations, current time and situations. However, handling context changes according to current data and events is a difficult task without supporting tools. Therefore, a platform that includes real-time event/data acquisition and processing is required. In this paper, we first survey existing work related to event processing and big data technologies by highlighting current challenges related to real-time data processing. We then introduce a context-aware platform that merges different technologies such as service oriented architecture, complex-event processing (CEP) tools, and big data technologies. A sample context-aware application for energy efficient buildings control is presented to highlight the different components of the platform and their interactions.}, isbn = {978-1-5090-2088-1}, author = {Lachhab, Fadwa and Essaaidi, Mohammed and Bakhouya, Mohamed and Ouladsine, Radouane}, editor = {Smari, WW} } @conference {Oufkir20162744, title = {Towards a reference model for Knowledge Management performance measurement}, booktitle = {Proceedings of the 27th International Business Information Management Association Conference - Innovation Management and Education Excellence Vision 2020: From Regional Development Sustainability to Global Economic Growth, IBIMA 2016}, year = {2016}, note = {cited By 0}, pages = {2744-2755}, abstract = {Knowledge Management (KM) projects are socio-technical systems that enable knowledge activities and ensure that the right knowledge gets to the right person at the right time. The growing number of KM applications confirms the need for a performance measurement model able to assess the diversity of KM initiatives in order to rationalize their usage. To the best of our knowledge, a generic KM model for performance measurement fitting any kind of KM projects is missing in the literature. Instead, existing approaches are specific to a particular KM project or assess the overall KM of the organization. In this paper, we propose a KM model for performance measurement that is built on existing KM models literature and enhanced with theoretical findings. It also follows the reference modelling design process in view of producing a high quality model. Copyright {\textcopyright} 2016 International Business Information Management Association}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84984611689\&partnerID=40\&md5=6ee42ddfe7a2a3ce0b1f2f99f09aa05b}, author = {Oufkir, L. and Fredj, M. and Kassou, I.} } @conference { ISI:000381172301090, title = {Towards A Reference Model for Knowledge Management Performance Measurement}, booktitle = {INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI}, year = {2016}, note = {27th International Business Information Management Association Conference, Milan, ITALY, MAY 04-05, 2016}, pages = {2744-2755}, abstract = {Knowledge Management (KM) projects are socio-technical systems that enable knowledge activities and ensure that the right knowledge gets to the right person at the right time. The growing number of KM applications confirms the need for a performance measurement model able to assess the diversity of KM initiatives in order to rationalize their usage. To the best of our knowledge, a generic KM model for performance measurement fitting any kind of KM projects is missing in the literature. Instead, existing approaches are specific to a particular KM project or assess the overall KM of the organization. In this paper, we propose a KM model for performance measurement that is built on existing KM models literature and enhanced with theoretical findings. It also follows the reference modelling design process in view of producing a high quality model.}, isbn = {978-0-9860419-6-9}, author = {Oufkir, Latifa and Fredj, Mounia and Kassou, Ismail}, editor = {Soliman, KS} } @article { ISI:000362267900001, title = {Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks}, journal = {JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS}, year = {2015}, abstract = {The intrusion detection application in a homogeneous wireless sensor network is defined as a mechanism to detect unauthorized intrusions or anomalous moving attackers in a field of interest. The quality of deterministic sensor nodes deployment can be determined sufficiently by a rigorous analysis before the deployment. However, when random deployment is required, determining the deployment quality becomes challenging. An area may require that multiple nodes monitor each point from the sensing area; this constraint is known as k-coverage where k is the number of nodes. The deployment quality of sensor nodes depends directly on node density and sensing range; mainly a random sensor nodes deployment is required. The major question is centred around the problem of network coverage, how can we guarantee that each point of the sensing area is covered by the required number of sensor nodes and what a sufficient condition to guarantee the network coverage? To deal with this, probabilistic intrusion detection models are adopted, called single/multi-sensing detection, and the deployment quality issue is surveyed and analysed in terms of coverage. We evaluate the capability of our probabilistic model in homogeneous wireless sensor network, in terms of sensing range, node density, and intrusion distance.}, issn = {2090-7141}, doi = {10.1155/2015/812613}, author = {Assad, Noureddine and Elbhiri, Brahim and Faqihi, Moulay Ahmed and Ouadou, Mohamed and Aboutajdine, Driss} } @article {10906318320150205, title = {Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks.}, journal = {Journal of Computer Networks \& Communications}, volume = {2015}, year = {2015}, pages = {1 - 7}, abstract = {The intrusion detection application in a homogeneous wireless sensor network is defined as a mechanism to detect unauthorized intrusions or anomalous moving attackers in a field of interest. The quality of deterministic sensor nodes deployment can be determined sufficiently by a rigorous analysis before the deployment. However, when random deployment is required, determining the deployment quality becomes challenging. An area may require that multiple nodes monitor each point from the sensing area; this constraint is known as k-coverage where k is the number of nodes. The deployment quality of sensor nodes depends directly on node density and sensing range; mainly a random sensor nodes deployment is required. The major question is centred around the problem of network coverage, how can we guarantee that each point of the sensing area is covered by the required number of sensor nodes and what a sufficient condition to guarantee the network coverage? To deal with this, probabilistic int}, keywords = {Intrusion detection systems (Computer security), Mathematical models, Probability theory, Wireless sensor networks, Wireless sensor nodes}, issn = {20907141}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=109063183\&site=ehost-live}, author = {Assad, Noureddine and Elbhiri, Brahim and Faqihi, Moulay Ahmed and Ouadou, Mohamed and Aboutajdine, Driss} } @article {Assad2015, title = {Analysis of the deployment quality for intrusion detection in wireless sensor networks}, journal = {Journal of Computer Networks and Communications}, volume = {2015}, year = {2015}, note = {cited By 0}, abstract = {The intrusion detection application in a homogeneous wireless sensor network is defined as a mechanism to detect unauthorized intrusions or anomalous moving attackers in a field of interest. The quality of deterministic sensor nodes deployment can be determined sufficiently by a rigorous analysis before the deployment. However, when random deployment is required, determining the deployment quality becomes challenging. An area may require that multiple nodes monitor each point from the sensing area; this constraint is known as k-coverage where k is the number of nodes. The deployment quality of sensor nodes depends directly on node density and sensing range; mainly a random sensor nodes deployment is required. The major question is centred around the problem of network coverage, how can we guarantee that each point of the sensing area is covered by the required number of sensor nodes and what a sufficient condition to guarantee the network coverage? To deal with this, probabilistic intrusion detection models are adopted, called single/multi-sensing detection, and the deployment quality issue is surveyed and analysed in terms of coverage. We evaluate the capability of our probabilistic model in homogeneous wireless sensor network, in terms of sensing range, node density, and intrusion distance. {\textcopyright} 2015 Noureddine Assad et al.}, doi = {10.1155/2015/812613}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84923884883\&doi=10.1155\%2f2015\%2f812613\&partnerID=40\&md5=ad555667d0db7cbc297aef916a17e0f5}, author = {Assad, N.a and Elbhiri, B.b and Faqihi, M.A.c and Ouadou, M.a and Aboutajdine, D.a} } @conference {Ouhbi2015405, title = {Applying ISO/IEC 25010 on mobile personal health records}, booktitle = {HEALTHINF 2015 - 8th International Conference on Health Informatics, Proceedings; Part of 8th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2015}, year = {2015}, note = {cited By 7}, pages = {405-412}, abstract = {Software product quality requirements reflect the stockholders{\textquoteright} needs in terms of quality. They play a central role in the success of the system and the software product quality. This paper lists mobile personal health record (mPHR) requirements extracted from literature and identifies the requirements which should be included in the mPHR quality evaluation. Moreover, the ISO/IEC 25010 software product quality model is used to present a checklist with which to calculate the influence of the mPHR requirements on software product quality. Furthermore, the degrees of influence of mPHR requirements on software product quality are calculated and analyzed. A set of recommendations for mPHRs developers and stakeholders is provided.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84938873168\&partnerID=40\&md5=6b335b7b09b476b23c9c36f26f7b5bdc}, author = {Ouhbi, S.a and Idri, A.a and Fern{\'a}ndez-Alem{\'a}n, J.L.b and Toval, A.b and Benjelloun, H.c} } @conference {Ouhbi2015, title = {Are mobile blood donation applications green?}, booktitle = {2015 10th International Conference on Intelligent Systems: Theories and Applications, SITA 2015}, year = {2015}, note = {cited By 0}, abstract = {On a global scale, software sustainability is attracting more and more attention. The term green software often refers to environmental sustainability applied to software systems, however, it is impacted by the different dimensions of sustainability. Green software can be divided into green by software and green in software. Blood donation mobile applications are more and more used by smartphone users. They represent an alternative way to attract volunteers and increase awareness about the importance of blood donation acts. The aim of this paper is to assess the greenability of seventy-two free blood donation applications using individual, social, environmental and technical dimensions of sustainability. The type, functionality and energy consumption of each app are identified and analyzed. Results have shown that the type of the BD app has a great impact on its level of greenability. {\textcopyright} 2015 IEEE.}, doi = {10.1109/SITA.2015.7358377}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962393996\&doi=10.1109\%2fSITA.2015.7358377\&partnerID=40\&md5=20b20223f3a907b755a5d37229297a5d}, author = {Ouhbi, S.a and Fern{\'a}ndez-Alem{\'a}n, J.L.a and Idri, A.b and Pozo, J.R.c} } @conference { ISI:000380409500003, title = {Are Mobile Blood Donation Applications Green?}, booktitle = {2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, year = {2015}, note = {10th International Conference on Intelligent Systems - Theories and Applications (SITA), ENSIAS, Rabat, MOROCCO, OCT 20-21, 2015}, publisher = {IEEE}, organization = {IEEE}, abstract = {On a global scale, software sustainability is attracting more and more attention. The term green software often refers to environmental sustainability applied to software systems, however, it is impacted by the different dimensions of sustainability. Green software can be divided into green by software and green in software. Blood donation mobile applications are more and more used by smartphone users. They represent an alternative way to attract volunteers and increase awareness about the importance of blood donation acts. The aim of this paper is to assess the greenability of seventy-two free blood donation applications using individual, social, environmental and technical dimensions of sustainability. The type, functionality and energy consumption of each app are identified and analyzed. Results have shown that the type of the BD app has a great impact on its level of greenability.}, isbn = {978-1-5090-0220-7}, author = {Ouhbi, Sofia and Luis Fernandez-Aleman, Jose and Idri, Ali and Rivera Pozo, Jose} } @conference {Oualhaj2015987, title = {A coalitional-game-based incentive mechanism for content caching in heterogeneous Delay Tolerant Networks}, booktitle = {IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference}, year = {2015}, note = {cited By 1}, pages = {987-992}, abstract = {In recent years, Delay Tolerant Networks (DTNs) have successfully presented as a possible extension of the Internet architecture in order to provide communication support to existing networks. However, these networks have a major issue which is the coordination among relays. In this work, we study the cooperative transmission for DTNs using coalitional game theory. We design a new incentive mechanism for heterogeneous system to induce coordination among DTN relays. In particular, we focus on the source packet dissemination to a destination using tow-hop relaying scheme, considering networks resource constraints: the relay buffer, the packet life time, and the energy consumption according to the mobile technologies. Rational mobiles are organized into separate coalition structures to meet a trade off between the source reward and the energy conservation. We discus the Nash equilibria for our game and the stable strategy state in which no mobile can get a higher payoff through changing unilaterally its coalition. Then, we use the distributed imitative Boltzmann-Gibbs learning algorithm enabling relays to learn the Nash equilibrium strategy; grand coalition. The improvement of the global system performance is examined, and a comparison between different inter-node collaboration states is presented. {\textcopyright} 2015 IEEE.}, doi = {10.1109/IWCMC.2015.7289217}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84949490492\&doi=10.1109\%2fIWCMC.2015.7289217\&partnerID=40\&md5=743073fbd086e6b2dc5623cb07de9531}, author = {Oualhaj, O.A.a and Kobbane, A.a b and Elmachkour, M.a and Sabir, E.c and Ben-Othman, J.b} } @conference { ISI:000381477900169, title = {A Coalitional-Game-Based Incentive Mechanism for Content Caching in Heterogeneous Delay Tolerant Networks}, booktitle = {2015 INTERNATIONAL WIRELESS COMMUNICATIONS \& MOBILE COMPUTING CONFERENCE (IWCMC)}, series = {International Wireless Communications and Mobile Computing Conference}, year = {2015}, note = {11th IEEE International Wireless Communications and Mobile Computing Conference (IEEE IWCMC), Dubrovnik, CROATIA, AUG 24-25, 2015}, pages = {987-992}, publisher = {IEEE; IEEE Croatia Sect; Univ Dubrovnik}, organization = {IEEE; IEEE Croatia Sect; Univ Dubrovnik}, abstract = {In recent years, Delay Tolerant Networks (DTNs) have successfully presented as a possible extension of the Internet architecture in order to provide communication support to existing networks. However, these networks have a major issue which is the coordination among relays. In this work, we study the cooperative transmission for DTNs using coalitional game theory. We design a new incentive mechanism for heterogeneous system to induce coordination among DTN relays. In particular, we focus on the source packet dissemination to a destination using tow-hop relaying scheme, considering networks resource constraints: the relay buffer, the packet life time, and the energy consumption according to the mobile technologies. Rational mobiles are organized into separate coalition structures to meet a trade off between the source reward and the energy conservation. We discus the Nash equilibria for our game and the stable strategy state in which no mobile can get a higher payoff through changing unilaterally its coalition. Then, we use the distributed imitative Boltzmann-Gibbs learning algorithm enabling relays to learn the Nash equilibrium strategy; grand coalition. The improvement of the global system performance is examined, and a comparison between different inter-node collaboration states is presented.}, isbn = {978-1-4799-5344-8}, issn = {2376-6492}, author = {Oualhaj, Omar Ait and Kobbane, Abdellatif and Elmachkour, Mouna and Sabir, Essaid and Ben-Othman, Jalel} } @article { ISI:000356162200002, title = {Compliance of Blood Donation Apps with Mobile OS Usability Guidelines}, journal = {JOURNAL OF MEDICAL SYSTEMS}, volume = {39}, number = {6}, year = {2015}, month = {JUN}, abstract = {The aim of this paper is to employ the guidelines of Android, iOS, Blackberry and Windows Phone to analyze the usability compliance of free blood donation (BD) apps. An analysis process based on a systematic review protocol is used to select free BD apps. An assessment is conducted using a questionnaire composed of 13 questions concerning the compliance of free BD apps with Android, Blackberry, iOS and Windows Phone usability guidelines. A total of 133 free BD apps have been selected from the 188 BD apps identified. Around 63 \% of the free BD apps selected have a good compliance with mobile OS usability recommendations. Around 72 \% of Android, 57 \% of Windows Phone, 33 \% of iOS and 33 \% of Blackberry BD apps have a high usability score. The aspect of BD app behavior should be improved along with some style components: the use of pictures to explain ideas and the adaptation of the app to both horizontal and vertical orientations. Structure patterns should also be used to improve the structure aspect of a BD app. Usability is a quality aspect that should be improved in current BD apps. Our study provides smartphone users with a list of usable free BD apps and BD app developers with recommendations.}, issn = {0148-5598}, doi = {10.1007/s10916-015-0243-1}, author = {Ouhbi, Sofia and Luis Fernandez-Aleman, Jose and Rivera Pozo, Jose and El Bajta, Manal and Toval, Ambrosio and Idri, Ali} } @article {Ouhbi2015, title = {Compliance of Blood Donation Apps with Mobile OS Usability Guidelines}, journal = {Journal of Medical Systems}, volume = {39}, number = {6}, year = {2015}, note = {cited By 10}, abstract = {The aim of this paper is to employ the guidelines of Android, iOS, Blackberry and Windows Phone to analyze the usability compliance of free blood donation (BD) apps. An analysis process based on a systematic review protocol is used to select free BD apps. An assessment is conducted using a questionnaire composed of 13 questions concerning the compliance of free BD apps with Android, Blackberry, iOS and Windows Phone usability guidelines. A total of 133 free BD apps have been selected from the 188 BD apps identified. Around 63 \% of the free BD apps selected have a good compliance with mobile OS usability recommendations. Around 72 \% of Android, 57 \% of Windows Phone, 33 \% of iOS and 33 \% of Blackberry BD apps have a high usability score. The aspect of BD app behavior should be improved along with some style components: the use of pictures to explain ideas and the adaptation of the app to both horizontal and vertical orientations. Structure patterns should also be used to improve the structure aspect of a BD app. Usability is a quality aspect that should be improved in current BD apps. Our study provides smartphone users with a list of usable free BD apps and BD app developers with recommendations. {\textcopyright} 2015, Springer Science+Business Media New York.}, doi = {10.1007/s10916-015-0243-1}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84927595740\&doi=10.1007\%2fs10916-015-0243-1\&partnerID=40\&md5=c023ade3c0fdf215297c09380aabc9de}, author = {Ouhbi, S.a and Fern{\'a}ndez-Alem{\'a}n, J.L.a and Pozo, J.R.b and Bajta, M.E.c and Toval, A.a and Idri, A.c} } @article {AitOualhaj2015126, title = {A ferry-assisted solution for forwarding function in Wireless Sensor Networks}, journal = {Pervasive and Mobile Computing}, volume = {22}, year = {2015}, note = {cited By 2}, pages = {126-135}, abstract = {For sure, Wireless Sensor Networks (WSNs) are becoming an ultimate part of next generation mobile networks. They are a master piece for Ubiquitous computing. Indeed, they sustain development of numerous paradigms/ technologies such as distributed ambient intelligence, context-awareness and future mobile networking (e.g., B4G and 5G). Battery life remains one of the crucial problems to handle. In this article we propose an infrastructure-based topology using mobile ferries (mobile micro-base stations). In real life, a ferry could be robot, bus, tram, train or any other engine scrutinizing periodically a given area. Yet, message ferries are moving along concentric annulus and may collect data generated by the static sensors (could be classic sensors, smart meters, wearable devices, etc.) randomly distributed on given area. Next, transmissions are performed in a ferry-to-ferry forwarding scheme till arriving at the sink. Considered ferries could sense themselves data and therefore behave as mobile sensors allowing better awareness on the area state [1-3]. Our scheme could also assist Machine-to-Machine communications to increase the network lifetime, with potentially some cognitive-radio capabilities and opportunistic detection and access. Our proposal can easily be integrated in a smart-city for better interaction and green communications. Next, we present a queueing model (queues with finite capacity) to handle the generated traffic and to analyze the behavior of mobile ferries. We provided a close-form expression for both end-to-end throughput and end-to-end delay. The main objective of this work is to improve the energy efficiency of the cognitive sensors by asking cognitive sensors to not care about forwarding data of each other except for urgent data, this latter point is out of the scope of the paper. These static sensors will only care about data sensing, which will reduce their individual energy consumption. {\textcopyright} 2015 Elsevier B.V.}, doi = {10.1016/j.pmcj.2015.05.003}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84941024588\&doi=10.1016\%2fj.pmcj.2015.05.003\&partnerID=40\&md5=83a85e8d64da3c3ac9458a4eba519a14}, author = {Ait Oualhaj, O.a and Kobbane, A.b and Sabir, E.c and Ben-Othman, J.d and Erradi, M.a} } @article { ISI:000360910900010, title = {A ferry-assisted solution for forwarding function in Wireless Sensor Networks}, journal = {PERVASIVE AND MOBILE COMPUTING}, volume = {22}, number = {SI}, year = {2015}, month = {SEP}, pages = {126-135}, abstract = {For sure, Wireless Sensor Networks (WSNs) are becoming an ultimate part of next generation mobile networks. They are a master piece for Ubiquitous computing. Indeed, they sustain development of numerous paradigms/ technologies such as distributed ambient intelligence, context-awareness and future mobile networking (e.g., B4G and 5G). Battery life remains one of the crucial problems to handle. In this article we propose an infrastructure-based topology using mobile ferries (mobile micro-base stations). In real life, a ferry could be robot, bus, tram, train or any other engine scrutinizing periodically a given area. Yet, message ferries are moving along concentric annulus and may collect data generated by the static sensors (could be classic sensors, smart meters, wearable devices, etc.) randomly distributed on given area. Next, transmissions are performed in a ferry-to-ferry forwarding scheme till arriving at the sink. Considered ferries could sense themselves data and therefore behave as mobile sensors allowing better awareness on the area state {[}1-3]. Our scheme could also assist Machine-to-Machine communications to increase the network lifetime, with potentially some cognitive-radio capabilities and opportunistic detection and access. Our proposal can easily be integrated in a smart-city for better interaction and green communications. Next, we present a queueing model (queues with finite capacity) to handle the generated traffic and to analyze the behavior of mobile ferries. We provided a close-form expression for both end-to-end throughput and end-to-end delay. The main objective of this work is to improve the energy efficiency of the cognitive sensors by asking cognitive sensors to not care about forwarding data of each other except for urgent data, this latter point is out of the scope of the paper. These static sensors will only care about data sensing, which will reduce their individual energy consumption. (C) 2015 Elsevier B.V. All rights reserved.}, issn = {1574-1192}, doi = {10.1016/j.pmcj.2015.05.003}, author = {Oualhaj, Omar Ait and Kobbane, Abdellatif and Sabir, Essaid and Ben-Othman, Jalel and Erradi, Mohammed} } @article { ISI:000352821900011, title = {Free Blood Donation Mobile Applications}, journal = {JOURNAL OF MEDICAL SYSTEMS}, volume = {39}, number = {5}, year = {2015}, month = {MAY}, abstract = {Blood donation (BD) is a noble act and mobile applications (apps) can help increase awareness about it. This paper analyzes and assesses the characteristics of free apps for BD as regards features and functionality. A search in Google Play, Apple Apps store, Blackberry App World and Windows Mobile App store was carried out to select 169 free BD apps from the 188 apps identified. The results presented in this paper show that the majority of the apps selected have been developed for the Android operating system. Moreover, most of the apps selected are available to help users search for donors. Few of the apps could not be installed and/or accessed. Of those that could be installed: half of them do not require any kind of authentication; a few of them are available in more than one language; half of them have a geographical restriction; around 60 \% of them do not notify the user of BD events and requests; one, which is available for Android and iOS, can connect with a laboratory; around 45 \% of them allow users to share information via social networks, and the majority of them do not provide BD recommendations. These results are used as a basis to provide app developers with certain recommendations. There is a need for better BD apps with more features in order to increase the number of volunteer donors.}, issn = {0148-5598}, doi = {10.1007/s10916-015-0228-0}, author = {Ouhbi, Sofia and Luis Fernandez-Aleman, Jose and Toval, Ambrosio and Idri, Ali and Rivera Pozo, Jose} } @article {Ouhbi20151, title = {Free Blood Donation Mobile Applications}, journal = {Journal of Medical Systems}, volume = {39}, number = {5}, year = {2015}, note = {cited By 8}, pages = {1-20}, abstract = {Blood donation (BD) is a noble act and mobile applications (apps) can help increase awareness about it. This paper analyzes and assesses the characteristics of free apps for BD as regards features and functionality. A search in Google Play, Apple Apps store, Blackberry App World and Windows Mobile App store was carried out to select 169 free BD apps from the 188 apps identified. The results presented in this paper show that the majority of the apps selected have been developed for the Android operating system. Moreover, most of the apps selected are available to help users search for donors. Few of the apps could not be installed and/or accessed. Of those that could be installed: half of them do not require any kind of authentication; a few of them are available in more than one language; half of them have a geographical restriction; around 60 \% of them do not notify the user of BD events and requests; one, which is available for Android and iOS, can connect with a laboratory; around 45 \% of them allow users to share information via social networks, and the majority of them do not provide BD recommendations. These results are used as a basis to provide app developers with certain recommendations. There is a need for better BD apps with more features in order to increase the number of volunteer donors. {\textcopyright} 2015, Springer Science+Business Media New York.}, doi = {10.1007/s10916-015-0228-0}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84924066427\&doi=10.1007\%2fs10916-015-0228-0\&partnerID=40\&md5=0b81a39c8b99408d80fa8b2c470bf493}, author = {Ouhbi, S.a and Fern{\'a}ndez-Alem{\'a}n, J.L.a and Toval, A.a and Idri, A.b and Pozo, J.R.c} } @conference {Ouhbi2015, title = {Mobile personal health records for cardiovascular patients}, booktitle = {Proceedings of 2015 IEEE World Conference on Complex Systems, WCCS 2015}, year = {2015}, note = {cited By 0}, abstract = {Monitoring the heart rate and keeping track of the pulse are important actions in the prevention and the treatment of many diseases, particularly heart diseases. A mobile personal health record (mPHR) offers users with cardiovascular problems the possibility to improve the management of their heart rate along with other health data. A large number of apps have been developed to provide users with the opportunity to choose mPHRs within a mobile platform proposing different functionalities. This paper identifies the current list of free mPHRs available in Android platform for smartphone users with cardiovascular problems. This paper also assesses the specifications of the mPHRs selected. The result of this study may assist mPHR seekers to monitor heart rate in their tasks. {\textcopyright} 2015 IEEE.}, doi = {10.1109/ICoCS.2015.7483226}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84978401610\&doi=10.1109\%2fICoCS.2015.7483226\&partnerID=40\&md5=548310db175feeb3c9b3ec02d9ed625a}, author = {Ouhbi, S.a and Idri, A.a and Fern{\'a}ndez-Alem{\'a}n, J.L.b and Toval, A.b} } @article {Lakki20151070, title = {Multi-objective dynamic metric and QoS in networks manets}, journal = {Research Journal of Applied Sciences, Engineering and Technology}, volume = {10}, number = {9}, year = {2015}, note = {cited By 0}, pages = {1070-1081}, abstract = {The aim of this study is to find a Intelligent parameter which is based on mobility and Clustering. This metric will be integrate in the selection process of MPRs to improve QoS in Manets networks. The unpredictable mobility and the large quantity of generated traffic by each node interface make communication in network increasingly difficult to manage. Thus, routing protocols need to be adapted to such conditions. In order to make OLSR protocol more robust, piercing and more adaptable to the conditions dictated by the environment of each node, this study proposes a polymorphic metric that changes depending on the network behavior. This metric aims to make the OLSR protocol best suited to each zone. Many simulations would be undergone by NS2 to test and prove the validity of this new metric in environments with high mobility and quantity of traffic. {\textcopyright} Maxwell Scientific Organization, 2015.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84940775201\&partnerID=40\&md5=be882576c747f7d2d3d54cd08dc7dc91}, author = {Lakki, N.a and Ouacha, A.a and Habbani, A.a b and El Abbadi, J.a} } @article {Ouhbi2015547, title = {Predicting software product quality: A systematic mapping study}, journal = {Computacion y Sistemas}, volume = {19}, number = {3}, year = {2015}, note = {cited By 1}, pages = {547-562}, abstract = {Predicting software product quality (SPQ) is becoming a permanent concern during software life cycle phases. In this paper, a systematic mapping study was performed to summarize the existing SPQ prediction (SPQP) approaches in literature and to organize the selected studies according to seven classification criteria: SPQP approaches, research types, empirical types, data sets used in the empirical evaluation of these studies, artifacts, SQ models, and SQ characteristics. Publication channels and trends were also identified. After identifying 182 documents in ACM Digital Library, IEEE Xplore, ScienceDirect, SpringerLink, and Google scholar, 69 papers were selected. The results show that the main publication source of the papers identified was conference. Data mining techniques are the most frequently SPQP approaches reported in literature. Solution proposal was the main research type identified. The majority of the papers selected were history-based evaluations using existing data which were mainly obtained from open source software projects and domain specific projects. Source code was the main artifact concerned with SPQP approaches. Well-known SQ models were hardly mentioned and reliability is the SQ characteristic through which SPQP was mainly achieved. SPQP-related subject seems to need more investigation from researchers and practitioners. Moreover, SQ models and standards need to be considered more in future SPQP research.}, doi = {10.13053/CyS-19-3-1960}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84943600627\&doi=10.13053\%2fCyS-19-3-1960\&partnerID=40\&md5=caa3593757dd9685bb38aa7309228c08}, author = {Ouhbi, S.a and Idri, A.a and Fern{\'a}ndez-Alem{\'a}n, J.L.b and Toval, A.b} } @article { ISI:000357593500001, title = {Requirements engineering education: a systematic mapping study}, journal = {REQUIREMENTS ENGINEERING}, volume = {20}, number = {2}, year = {2015}, month = {JUN}, pages = {119-138}, abstract = {Requirements engineering (RE) has attracted a great deal of attention from researchers and practitioners in recent years. Requirements engineering education (REE) is therefore an important undertaking if the field is to have professionals who are capable of successfully accomplishing software projects. This increasing interest demands that academia should provide software engineering students with a solid foundation in the subject matter. This paper aims to identify and to present the current research on REE that is available at present, and to select useful approaches and needs for future research. A systematic mapping study was therefore performed to classify the selected studies into five classification criteria: research type, empirical type, contribution type, RE activity, and curricula. A total of 79 papers were selected and classified according to these criteria. The results of this systematic mapping study are discussed, and a list of advice obtained from the REE literature for instructors is provided.}, issn = {0947-3602}, doi = {10.1007/s00766-013-0192-5}, author = {Ouhbi, Sofia and Idri, Ali and Luis Fernandez-Aleman, Jose and Toval, Ambrosio} } @article {Ouhbi2015119, title = {Requirements engineering education: a systematic mapping study}, journal = {Requirements Engineering}, volume = {20}, number = {2}, year = {2015}, note = {cited By 9}, pages = {119-138}, abstract = {Requirements engineering (RE) has attracted a great deal of attention from researchers and practitioners in recent years. Requirements engineering education (REE) is therefore an important undertaking if the field is to have professionals who are capable of successfully accomplishing software projects. This increasing interest demands that academia should provide software engineering students with a solid foundation in the subject matter. This paper aims to identify and to present the current research on REE that is available at present, and to select useful approaches and needs for future research. A systematic mapping study was therefore performed to classify the selected studies into five classification criteria: research type, empirical type, contribution type, RE activity, and curricula. A total of 79 papers were selected and classified according to these criteria. The results of this systematic mapping study are discussed, and a list of advice obtained from the REE literature for instructors is provided. {\textcopyright} 2013, Springer-Verlag London.}, doi = {10.1007/s00766-013-0192-5}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84929521157\&doi=10.1007\%2fs00766-013-0192-5\&partnerID=40\&md5=f7fd57be932075ffb64b6bcab6101843}, author = {Ouhbi, S.a and Idri, A.a and Fern{\'a}ndez-Alem{\'a}n, J.L.b and Toval, A.b} } @article {10260344020150601, title = {Requirements engineering education: a systematic mapping study.}, journal = {Requirements Engineering}, volume = {20}, number = {2}, year = {2015}, pages = {119 - 138}, abstract = {Requirements engineering (RE) has attracted a great deal of attention from researchers and practitioners in recent years. Requirements engineering education (REE) is therefore an important undertaking if the field is to have professionals who are capable of successfully accomplishing software projects. This increasing interest demands that academia should provide software engineering students with a solid foundation in the subject matter. This paper aims to identify and to present the current research on REE that is available at present, and to select useful approaches and needs for future research. A systematic mapping study was therefore performed to classify the selected studies into five classification criteria: research type, empirical type, contribution type, RE activity, and curricula. A total of 79 papers were selected and classified according to these criteria. The results of this systematic mapping study are discussed, and a list of advice obtained from the REE literature fo}, keywords = {Computer software, education, Engineering {\textendash} Study \& teaching, Mappings (Mathematics), Requirements engineering, Software engineering, Software requirements, Systematic mapping study}, issn = {09473602}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=102603440\&site=ehost-live}, author = {Ouhbi, Sofia and Idri, Ali and Fern{\'a}ndez-Alem{\'a}n, Jos{\'e} and Toval, Ambrosio} } @conference {Lachhab2015, title = {A state-feedback approach for controlling ventilation systems in energy efficient buildings}, booktitle = {Proceedings of 2015 IEEE International Renewable and Sustainable Energy Conference, IRSEC 2015}, year = {2015}, note = {cited By 0}, abstract = {On the fast actual demographic trend and increasing comfort level, consumers are becoming more and more demanding in the areas of heating, cooling, ventilation, air conditioning, and lighting. Heating, Ventilating and Air Conditioning (HVAC) is one of most studied systems in energy efficient buildings within the aim to keep occupants{\textquoteright} comfort with desired temperature ranges, a suitable level of humidity, and good air quality. Recent studies showed that using information and communication technologies will have a significant impact on improving energy efficiency in real buildings. The main aim of these studies is to develop energy control approaches to improve energy performance and occupant comfort in buildings. In this paper, a CO2-based strategy using a state feedback technique for controlling mechanical ventilation systems in energy-efficient building is proposed. The principal objective of the developed controller is to improve optimal balance between energy efficiency and indoor air quality by maintaining the indoor CO2 concentration at the comfort set point with an efficient ventilation rate while reducing energy consumption. The ventilation system is analysed, modeled, and simulated. The simulation results are reported to show the efficiency of the proposed control approach compared to the traditional On/Off and the PI ventilation control. {\textcopyright} 2015 IEEE.}, doi = {10.1109/IRSEC.2015.7454986}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84968698110\&doi=10.1109\%2fIRSEC.2015.7454986\&partnerID=40\&md5=0d48ca55b85b4622262ec6f0a5b868d2}, author = {Lachhab, F.a and Essaaidi, M.a and Bakhouya, M.b and Ouladsine, R.b} } @conference { ISI:000382162300064, title = {A State-Feedback Approach for Controlling Ventilation Systems in Energy Efficient Buildings}, booktitle = {PROCEEDINGS OF 2015 3RD IEEE INTERNATIONAL RENEWABLE AND SUSTAINABLE ENERGY CONFERENCE (IRSEC{\textquoteright}15)}, year = {2015}, note = {3rd IEEE International Renewable and Sustainable Energy Conference (IRSEC), Marrakech, MOROCCO, DEC 10-13, 2015}, pages = {665-670}, publisher = {IEEE}, organization = {IEEE}, abstract = {On the fast actual demographic trend and increasing comfort level, consumers are becoming more and more demanding in the areas of heating, cooling, ventilation, air conditioning, and lighting. Heating, Ventilating and Air Conditioning (HVAC) is one of most studied systems in energy efficient buildings within the aim to keep occupants{\textquoteright} comfort with desired temperature ranges, a suitable level of humidity, and good air quality. Recent studies showed that using information and communication technologies will have a significant impact on improving energy efficiency in real buildings. The main aim of these studies is to develop energy control approaches to improve energy performance and occupant comfort in buildings. In this paper, a CO2-based strategy using a state feedback technique for controlling mechanical ventilation systems in energy-efficient building is proposed. The principal objective of the developed controller is to improve optimal balance between energy efficiency and indoor air quality by maintaining the indoor CO2 concentration at the comfort set point with an efficient ventilation rate while reducing energy consumption. The ventilation system is analysed, modeled, and simulated. The simulation results are reported to show the efficiency of the proposed control approach compared to the traditional On/Off and the PI ventilation control.}, isbn = {978-1-4673-7894-9}, author = {Lachhab, Fadwa and Essaaidi, Mohammed and Bakhouya, Mohamed and Ouladsine, Radouane}, editor = {Essaaidi, M and Zaz, Y} } @conference { ISI:000380409500004, title = {User profile model: a user dimension based classification}, booktitle = {2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, year = {2015}, note = {10th International Conference on Intelligent Systems - Theories and Applications (SITA), ENSIAS, Rabat, MOROCCO, OCT 20-21, 2015}, publisher = {IEEE}, organization = {IEEE}, abstract = {As the amount of information offered by information systems is increasing exponentially, the need of personalized approaches for information access increases. This work discusses user profiles designed for providing personalized information access. We first present a general classification of research directions on adaptive systems, followed by a state-of-the-art study about user profiling. We propose then a new classification approach of user profile model. This classification is based on the user dimensions considered to build the user profile.}, isbn = {978-1-5090-0220-7}, author = {Ouaftouh, Sara and Zellou, Ahmed and Idri, Ali} } @conference {Ouaftouh2015, title = {User profile model: A user dimension based classification}, booktitle = {2015 10th International Conference on Intelligent Systems: Theories and Applications, SITA 2015}, year = {2015}, note = {cited By 0}, abstract = {As the amount of information offered by information systems is increasing exponentially, the need of personalized approaches for information access increases. This work discusses user profiles designed for providing personalized information access. We first present a general classification of research directions on adaptive systems, followed by a state-of-the-art study about user profiling. We propose then a new classification approach of user profile model. This classification is based on the user dimensions considered to build the user profile. {\textcopyright} 2015 IEEE.}, doi = {10.1109/SITA.2015.7358378}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962408714\&doi=10.1109\%2fSITA.2015.7358378\&partnerID=40\&md5=ca06e7ab84ba76c5e6dfa5355f6faed2}, author = {Ouaftouh, S. and Zellou, A. and Idri, A.} } @conference {Ouaskou2015, title = {A variant of HB protocols based on permutation for low-cost RFID}, booktitle = {International Conference on Wireless Networks and Mobile Communications, WINCOM 2015}, year = {2015}, note = {cited By 0}, abstract = {The security issues of RFID technology have been subject of a large number of research documents for over a decade. Several protocols have been developed to ensure reliable access control, namely a family of lightweight authentication protocols since Hopper and Blum proposed the HB protocol in 2001. Taking into account security and performance aspects, we present a new protocol derived from HB+ in which we add the permutation function, providing more effective resistant execution environment of active attacks and with roughly the same complexity. {\textcopyright} 2015 IEEE.}, doi = {10.1109/WINCOM.2015.7381322}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84965047054\&doi=10.1109\%2fWINCOM.2015.7381322\&partnerID=40\&md5=b58c88a2c45f92717f77780586fa9e13}, author = {Ouaskou, M. and Lahmer, M. and Belkasmi, M.} } @conference { ISI:000380509200025, title = {A Variant of HB Protocols Based on Permutation for Low-cost RFID}, booktitle = {2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM)}, year = {2015}, note = {International conference on wireless networks and mobile communications, Marrakech, MOROCCO, OCT 20-23, 2015}, pages = {145-148}, abstract = {The security issues of RFID technology have been subject of a large number of research documents for over a decade. Several protocols have been developed to ensure reliable access control, namely a family of lightweight authentication protocols since Hopper and Blum proposed the HB protocol in 2001. Taking into account security and performance aspects, we present a new protocol derived from HB+ in which we add the permutation function, providing more effective resistant execution environment of active attacks and with roughly the same complexity.}, isbn = {978-1-4673-8224-3}, author = {Ouaskou, Mohamed and Lahmer, Mohammed and Belkasmi, Mostafa} } @conference { ISI:000346142800010, title = {Detection and recognition of road signs in a video stream based on the shape of the panels.}, booktitle = {2014 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA{\textquoteright}14)}, year = {2014}, note = {9th International Conference on Intelligent Systems - Theories and Applications (SITA), Inst Natl Postes \& Telecommunicat, Rabat, MOROCCO, MAY 07-08, 2014}, publisher = {IEEE; IEEE Morocco}, organization = {IEEE; IEEE Morocco}, abstract = {In this paper, we present a robust approach of automatic detection and recognition of road signs in national roads, starting from the images resulting from a video stream taken by a camera embarked on a vehicle. Our approach is composed of three main phases: the first phase is to extract video stream images containing a circle or a triangle. This extraction is performed respectively by Hough transformation and Ramer-Douglas-Peucker filter, the second phase consists of extraction areas of the calculated image, in the previous phase. In the third and last phase, we proceed to a matching of the extracted image areas with signs of reference by comparison of interest points extracted by the SURF method and the matching method FLANN.}, isbn = {978-1-4799-3566-6}, author = {Romadi, Mohammed and Oulahhajthami, Rachid and Romadi, Rahal and Chiheb, Raddouane} } @conference { ISI:000350044701087, title = {Electronic Health Records for Cardiovascular Medicine}, booktitle = {2014 36TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC)}, series = {IEEE Engineering in Medicine and Biology Society Conference Proceedings}, year = {2014}, note = {36th Annual International Conference of the IEEE-Engineering-in-Medicine-and-Biology-Society (EMBC), Chicago, IL, AUG 26-30, 2014}, pages = {1354-1357}, publisher = {IEEE Engn Medicine \& Biol Soc}, organization = {IEEE Engn Medicine \& Biol Soc}, abstract = {Nowadays, many cardiology health care centers and hospitals adopt new technologies to improve interaction with their patients. The Electronic Health Records (EHR) offer health care centers and institutions the possibility to improve the management of their patients{\textquoteright} health data. Currently, many physicians are using EHRs to improve health care quality and efficiency. A large number of companies have emerged to provide hospitals with the opportunity to adopt EHRs within a health care platform proposing different functionalities and services which achieve certain certification criteria. This paper identifies the current list of certified EHRs for cardiovascular medicine and assesses the specifications of the EHRs selected. The result of this paper may assist EHR seekers for cardiovascular medicine in their tasks.}, isbn = {978-1-4244-7929-0}, issn = {1557-170X}, author = {Ouhbi, Sofia and Idri, Ali and Fernandez-Aleman, Jose Luis and Toval, Ambrosio and Benjelloun, Halima} } @conference {Ouhbi20141354, title = {Electronic health records for cardiovascular medicine}, booktitle = {2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2014}, year = {2014}, note = {cited By 3}, pages = {1354-1357}, abstract = {Nowadays, many cardiology health care centers and hospitals adopt new technologies to improve interaction with their patients. The Electronic Health Records (EHR) offer health care centers and institutions the possibility to improve the management of their patients{\textquoteright} health data. Currently, many physicians are using EHRs to improve health care quality and efficiency. A large number of companies have emerged to provide hospitals with the opportunity to adopt EHRs within a health care platform proposing different functionalities and services which achieve certain certification criteria. This paper identifies the current list of certified EHRs for cardiovascular medicine and assesses the specifications of the EHRs selected. The result of this paper may assist EHR seekers for cardiovascular medicine in their tasks. {\textcopyright} 2014 IEEE.}, doi = {10.1109/EMBC.2014.6943850}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84924056019\&doi=10.1109\%2fEMBC.2014.6943850\&partnerID=40\&md5=f5528e1d7fdbcce3d4a4e0d8d0e2dad1}, author = {Ouhbi, S.a and Idri, A.a and Fern{\'a}ndez-Alem{\'a}n, J.L.b and Toval, A.b and Benjelloun, H.c} } @conference {Ouhbi2014141, title = {Evaluating software product quality: A systematic mapping study}, booktitle = {Proceedings - 2014 Joint Conference of the International Workshop on Software Measurement, IWSM 2014 and the International Conference on Software Process and Product Measurement, Mensura 2014}, year = {2014}, note = {cited By 5}, pages = {141-151}, abstract = {Evaluating software product quality (SPQ) is an important task to ensure the quality of software products. In this paper a systematic mapping study was performed to summarize the existing SPQ evaluation (SPQE) approaches in literature and to classify the selected studies according to seven classification criteria: SPQE approaches, research types, empirical types, data sets used in the empirical evaluation of these studies, artifacts, SQ models, and SQ characteristics. Publication channels and trends were also identified. 57 papers were selected. The results show that the main publication sources of the papers identified were journals. Data mining techniques are the most frequently approaches reported in literature. Solution proposals were the main research type identified. The majority of the selected papers were history-based evaluations using existing data, which were mainly obtained from open source software projects and domain specific projects. Source code was the main artifacts used by SPQE approaches. Well-known SQ models were mentioned by half of the selected papers and reliability is the SQ characteristic through which SPQE was mainly achieved. SPQE-related subjects seem to attract more interest from researchers since the past years. {\textcopyright} 2014 IEEE.}, doi = {10.1109/IWSM.Mensura.2014.30}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84924054129\&doi=10.1109\%2fIWSM.Mensura.2014.30\&partnerID=40\&md5=dde0c90f7da7b7c14764aae521798235}, author = {Ouhbi, S.a and Idri, A.a and Aleman, J.L.F.b and Toval, A.b} } @conference {Omar2014, title = {A ferry-assisted solution for forwarding function in Wireless Sensor Networks}, booktitle = {Proceedings - International Symposium on Computers and Communications}, volume = {Workshops}, year = {2014}, note = {cited By 0}, abstract = {To ensure connectivity in highly sparse Wireless Sensor Networks (WSNs), we consider a Ferry-assisted Wireless Sensor Network(FWSN). In our FWSN, message ferries moving along concentric annulus collect the static sensors generated packets and propagate them throughout a ferry-to-ferry forwarding schema to the sink. In this paper we present a queueing model to study and analyze the FWSN behavior. We will adapt a queuing model with finite queues which will allow us to analyze the network behavior in tens of packet loss using an analytic model. The objective of this work is to provide a way to optimize the energy consumption for each individual sensor. In our approach we consider a sensor Ferry, which is a mobile sensor with the capacity to provide the control operation upon the other fixed sensors within to network. Therefor, these fixed sensors will have to perform less control operations which will reduce their individual energy consumption. By doing so, this will automatically impact positively on to the lifetime of the network. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ISCC.2014.6912648}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84908132136\&doi=10.1109\%2fISCC.2014.6912648\&partnerID=40\&md5=5d5c3b3309f7b9a5ed0c66f13985600c}, author = {Omar, A.O.a and Kobbane, A.a and Sabir, E.a b and Erradi, M.a and Ben-Othman, J.c} } @conference { ISI:000360095400010, title = {A Formal Modeling Approach for Emergency Crisis Response in Health during Catastrophic Situation}, booktitle = {INFORMATION SYSTEMS FOR CRISIS RESPONSE AND MANAGEMENT IN MEDITERRANEAN COUNTRIES}, series = {Lecture Notes in Business Information Processing}, volume = {196}, year = {2014}, note = {1st International Conference on Information Systems for Crisis Response and Management in Mediterranean Countries (ISCRAM-Med), Toulouse, FRANCE, OCT 15-17, 2014}, pages = {112-119}, publisher = {ISCRAM Assoc; IRIT Lab Toulouse; Univ Toulouse; Univ Lorraine; Ecole Mines Albi Carmaux}, organization = {ISCRAM Assoc; IRIT Lab Toulouse; Univ Toulouse; Univ Lorraine; Ecole Mines Albi Carmaux}, abstract = {The EMS (Emergency Medical Services: {\textquoteleft}{\textquoteleft}SAMU{{\textquoteright}{\textquoteright}}), which is affiliated to the Moroccan Ministry of Health, is normally dedicated to coordinate, regulate and carry the sick and road casualty to the most suitable hospital facilities. In times of crisis, the EMS (SAMU) collaborates and coordinates with other stakeholders namely Civil Protection and Military health services by setting up advanced Medical positions (PMA). In this work we will focus mainly on the collaborative work between doctors and the EMS (SAMU) in order to provide a remote diagnosis during emergency situations. One objective of this paper is to formally specify the behavior of different components of a collaborative system architecture in telemedicine. The objective of these formal specifications is to increase the confidence in the collaborative architecture and to verify the consistency of the components assembly. This is important towards building a robust system free from specification errors and inconsistencies.}, isbn = {978-3-319-11817-8}, issn = {1865-1348}, author = {Ouzzif, Mohammed and Hamdani, Marouane and Mountassir, Hassan and Erradi, Mohammed}, editor = {Hanachi, C and Benaben, F and Charoy, F} } @article {Ouzzif2014112, title = {A formal modeling approach for emergency crisis response in health during catastrophic situation}, journal = {Lecture Notes in Business Information Processing}, volume = {196}, year = {2014}, note = {cited By 0}, pages = {112-119}, abstract = {The EMS (Emergency Medical Services: {\textquotedblleft}SAMU{\textquotedblright}), which is affiliated to the Moroccan Ministry of Health, is normally dedicated to coordinate, regulate and carry the sick and road casualty to the most suitable hospital facilities. In times of crisis, the EMS (SAMU) collaborates and coordinates with other stakeholders namely Civil Protection and Military health services by setting up advanced Medical positions (PMA). In this work we will focus mainly on the collaborative work between doctors and the EMS (SAMU) in order to provide a remote diagnosis during emergency situations. One objective of this paper is to formally specify the behavior of different components of a collaborative system architecture in telemedicine. The objective of these formal specifications is to increase the confidence in the collaborative architecture and to verify the consistency of the components assembly. This is important towards building a robust system free from specification errors and inconsistencies. {\textcopyright} Springer International Publishing Switzerland 2014.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84922058564\&partnerID=40\&md5=087f0ea4e2612716e343a7b43f7bdebe}, author = {Ouzzif, M.a and Hamdani, M.b and Mountassir, H.c and Erradi, M.d} } @article {Belghiti20141705, title = {Green cognitive radio networks by using coalitional game approach in partition form}, journal = {International Review on Computers and Software}, volume = {9}, number = {10}, year = {2014}, note = {cited By 1}, pages = {1705-1711}, abstract = {Green energy in cognitive radio (CR) network is capable of liberating the networkfrom energy constraints, the energy is lost when CR users sense and utilize the unused spectrum for data communications. Green energy in CR increases the network availability and so prolongs developing network applications. The CR network performances seriously based on exploiting the available spectrum without losing energy and wasting time. In our work, a coalitional game approach is applied to enhance system performances, we study the coalitional formation process in partition form with transferable utility (TU). In our paper a new coalition value formula is proposed based on the data transmission rate and energy efficiency. Our approach uses the Shapley value to evaluate the users utilities in coalitions. We use a strategic learning algorithm to learn the Nash equilibrium, a theoretical proof of convergence is defined. Finally, we provide numerical results to validate the proposed approach. Coalitional game tool improves secondary users battery life and network performances. {\textcopyright} 2014 Praise Worthy Prize S.r.l. - All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84918782340\&partnerID=40\&md5=2dcb30a3548e9b41ff19878909e32377}, author = {Belghiti, I.D.a and Elmachkour, M.b and Berrada, I.a and Omari, L.a} } @article {Ouzineb2014156, title = {A Hybrid Method for Solving Buffer Sizing and Inspection Stations Allocation}, journal = {IFIP Advances in Information and Communication Technology}, volume = {440}, number = {PART 3}, year = {2014}, note = {cited By 0}, pages = {156-166}, abstract = {The buffer sizing problem in unreliable production lines is an important, indeed, complex combinatorial optimization problem with many industrial applications. These applications include quality, logistics and manufacturing production systems. In the formulation of the problem, the system consists of n machines, n fixed-size buffers and m inspection station in series. The objective is to minimize a combined storage and shortage costs, and also specifying the optimal location of inspection stations in the system. The present paper aims at optimizing a generalization of the model previously proposed in (Mhada et al., 2014) using a novel approach. In this approach, we combine Tabu Search (TS) and Genetic Algorithm (GA) to identify search regions with promising locations of inspection stations and an exact method to optimize the assignment of buffer sizes for each location. This approach provides a balance between diversification and intensification. Numerical results on test problems from previous research are reported. Using this approach, we can reduce the solution time by more than 97\% in some cases. {\textcopyright} IFIP International Federation for Information Processing 2014.}, doi = {10.1007/978-3-662-44733-8_20}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84906923939\&doi=10.1007\%2f978-3-662-44733-8_20\&partnerID=40\&md5=b5f75772fc70897fe5981f687a616751}, author = {Ouzineb, M.a and Mhada, F.-Z.b and Pellerin, R.c and El Hallaoui, I.c} } @conference { ISI:000360158500020, title = {A Hybrid Method for Solving Buffer Sizing and Inspection Stations Allocation}, booktitle = {ADVANCES IN PRODUCTION MANAGEMENT SYSTEMS: INNOVATIVE AND KNOWLEDGE-BASED PRODUCTION MANAGEMENT IN A GLOBAL-LOCAL WORLD, APMS 2014, PT III}, series = {IFIP Advances in Information and Communication Technology}, volume = {440}, year = {2014}, note = {IFIP WG 5.7 International Conference on Advances in Production Management Systems (APSM), Ajaccio, FRANCE, SEP 20-24, 2014}, pages = {156-166}, publisher = {IFIP WG 5 7 Advances Prod Management Syst; Res Federat Distributed Org Engn; CNRS Res Grp Modelling \& Anal Complex Syst; Res Inst Transports Energy \& Soc}, organization = {IFIP WG 5 7 Advances Prod Management Syst; Res Federat Distributed Org Engn; CNRS Res Grp Modelling \& Anal Complex Syst; Res Inst Transports Energy \& Soc}, abstract = {The buffer sizing problem in unreliable production lines is an important, indeed, complex combinatorial optimization problem with many industrial applications. These applications include quality, logistics and manufacturing production systems. In the formulation of the problem, the system consists of n machines, n fixed-size buffers and m inspection station in series. The objective is to minimize a combined storage and shortage costs, and also specifying the optimal location of inspection stations in the system. The present paper aims at optimizing a generalization of the model previously proposed in (Mhada et al., 2014) using a novel approach. In this approach, we combine Tabu Search (TS) and Genetic Algorithm (GA) to identify search regions with promising locations of inspection stations and an exact method to optimize the assignment of buffer sizes for each location. This approach provides a balance between diversification and intensification. Numerical results on test problems from previous research are reported. Using this approach, we can reduce the solution time by more than 97\% in some cases.}, isbn = {978-3-662-44732-1}, issn = {1868-4238}, author = {Ouzineb, Mohamed and Mhada, Fatima-Zahra and Pellerin, Robert and El Hallaoui, Issmail}, editor = {Grabot, B and Vallespir, B and Gomes, S and Bouras, A and Kiritsis, D} } @article {Mahieddine2014273, title = {Object serialization white framework in J2ME and its refactoring in black framework}, journal = {Journal of Mobile Multimedia}, volume = {9}, number = {3-4}, year = {2014}, note = {cited By 0}, pages = {273-285}, abstract = {J2ME mobile agents developers are very soon confronted with the problem of objects transfer over the communication flows (streams) provided by J2ME which, by themselves, take into account only the primitive types or simple String objects of JAVA. Serialization is the process of saving the state of an object on a flow of communication, transferring it in the net, and restoring its equivalent from this flow. Unfortunately J2ME software development cannot be used as standard JAVA because it has many strong restrictions, which greatly restricts its use relatively to JAVA. For example, in the case of mobile agent software development, J2ME does not provide tools for the serialization of objects. This research addresses the lack of a standard development environment for mobile agents under J2ME. In this work we propose a pattern-based white-box application framework, in order to achieve the serialization of complex JAVA Objects and its re-factoring into a black-box application framework. {\textcopyright} 2014 Rinton Press.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84893769484\&partnerID=40\&md5=1726097fa7ccff4e0055f5e1bc414883}, author = {Mahieddine, M.a and El-Khaddar, M.A.b and Oukid, S.a} } @conference {Rahmouni201494, title = {Optimal buffer management policies in DTNs: A POMDP approach}, booktitle = {2014 IEEE International Conference on Communications, ICC 2014}, year = {2014}, note = {cited By 0}, pages = {94-99}, abstract = {Using Delay Tolerant Networks (DTNs) would facilitate the connection of devices and areas across the world that are under-served by current networks. The DTNs are based on the concept of store-carry-and-forward protocols. A node may store a message in its buffer and carry it for a short or a long period of time, until an appropriate forwarding opportunity arises. A critical challenge is to determine routes through the network without even having an end-to-end connection. In order to increase the probability of message delivery, a known approach is implemented using epidemic message replication. This combination of long-term storage and message replication imposes a high storage and bandwidth overhead. Thus, efficient scheduling and dropping policies are necessary to decide which messages should be discarded when nodes{\textquoteright} buffers operate close to their capacity. If a relay buffer is full and needs to store a new packet, it has to decide either to keep the current message or to drop it. This decision depends on the number of transmissions of the message in its buffer and the message which has just arrived. In this paper, a Partially Observed Markov Decision Process (POMDP) framework is proposed to solve the problem of buffer management in DTNs. This modeling technique predicts some properties of the optimal buffer management policy. In addition, numerical examples are presented to illustrate the findings. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICC.2014.6883301}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84906995806\&doi=10.1109\%2fICC.2014.6883301\&partnerID=40\&md5=382f58d0b8f3dc6541db001ac2f98769}, author = {Rahmouni, I.a and Kamili, M.E.a and Fenni, M.R.E.b and Omari, L.a and Kobbane, A.c} } @conference { ISI:000366666800017, title = {Optimal Buffer Management Policies in DTNs: A POMDP Approach}, booktitle = {2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)}, series = {IEEE International Conference on Communications}, year = {2014}, note = {IEEE International Conference on Communications (ICC), Sydney, AUSTRALIA, JUN 10-14, 2014}, pages = {94-99}, publisher = {IEEE}, organization = {IEEE}, abstract = {Using Delay Tolerant Networks (DTNs) would facilitate the connection of devices and areas across the world that are under-served by current networks. The DTNs are based on the concept of store-carry-and-forward protocols. A node may store a message in its buffer and carry it for a short or a long period of time, until an appropriate forwarding opportunity arises. A critical challenge is to determine routes through the network without even having an end-to-end connection. In order to increase the probability of message delivery, a known approach is implemented using epidemic message replication. This combination of long-term storage and message replication imposes a high storage and bandwidth overhead. Thus, efficient scheduling and dropping policies are necessary to decide which messages should be discarded when nodes{\textquoteright} buffers operate close to their capacity. If a relay buffer is full and needs to store a new packet, it has to decide either to keep the current message or to drop it. This decision depends on the number of transmissions of the message in its buffer and the message which has just arrived. In this paper, a Partially Observed Markov Decision Process (POMDP) framework is proposed to solve the problem of buffer management in DTNs. This modeling technique predicts some properties of the optimal buffer management policy. In addition, numerical examples are presented to illustrate the findings.}, isbn = {978-1-4799-2003-7}, issn = {1550-3607}, author = {Rahmouni, Imane and El Kamili, Mohamed and El Fenni, Mohammed Raiss and Omari, Lahcen and Kobbane, Abdellatif}, editor = {Jamalipour, A and Deng, DJ} } @article {Assad2014324, title = {Short: Intrusion detection quality analysis for homogeneous wireless sensor networks}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {8593 LNCS}, year = {2014}, note = {cited By 0}, pages = {324-329}, abstract = {In this paper we analyze the intrusion detection in a homogeneous Wireless Sensor Network that is defined as a mechanism to monitor and detect unauthorized intrusions or anomalous moving attackers in area of interest. The quality of deterministic deployment can be determined sufficiently by analysis, before the deployment. However, when random deployment is required, determining the deployment quality becomes challenging and depends directly on node density. The major question is centered on the network coverage problem, how can we guarantee that each point of the region is covered by the required number of sensors? To deal with this, probabilistic intrusion detection models are adopted, called single and multi sensing probability detection and the deployment quality issue is surveyed and analyzed in terms of coverage. We evaluate our probabilistic model in homogeneous wireless sensor network, in term of sensing range, node density, and intrusion distance. {\textcopyright} 2014 Springer International Publishing.}, doi = {10.1007/978-3-319-09581-3_24}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84905899551\&doi=10.1007\%2f978-3-319-09581-3_24\&partnerID=40\&md5=e868b83abeca52460109a066d8ddde51}, author = {Assad, N.a and Elbhiri, B.b and El Fkihi, S.c and Faqihi, M.A.c and Ouadou, M.a and Aboutajdine, D.a} } @article { ISI:000337796300003, title = {Buffer dimensioning and control stations positioning with a space partitioning-tabu search approach}, journal = {INFOR}, volume = {51}, number = {1, SI}, year = {2013}, month = {FEB}, pages = {15-22}, abstract = {We propose an efficient heuristic method based on Space Partitioning (SP) and Tabu Search (TS) to solve the buffer sizing problem in unreliable production lines with several inspection stations. In such problem, we have an unreliable production line consisting of a certain number of machines and fixed-size buffers. These machines produce a single part with two different quality levels: conforming and non-conforming parts. The production line may contain inspection stations whose job is to reject the non-conforming parts from the line. The production line must meet a constant rate of demand for the conforming finished parts. The objective is to minimize the average long term combined storage and shortage costs, while also specifying the optimal location of inspection stations. This design problem is a difficult mixed integer nonlinear program. Solving even a small instance of 10 machines and one inspection station using a direct dynamic programming method takes hours. If we especially increase the number of machines or the inspection stations, the dynamic programming approach becomes drastically inefficient. The method we propose divides the search space into a set of disjoint subspaces using a space partitioning technique. Tabu search is used to intensify the search in the selected subspaces. This combined method finds optimal solutions for small instances in a fraction of dynamic programming time. For the largest instances (up to 20 machines) the dynamic programming approach was unable to solve, our method finds high-quality solutions in reasonable times.}, issn = {0315-5986}, doi = {10.3138/infor.51.1.15}, author = {Ouzineb, Mohamed and Mhada, Fatima and El Hallaoui, Issmail} } @article {9434372220130201, title = {Buffer dimensioning and control stations positioning with a space partitioning-tabu search approach.}, journal = {INFOR}, volume = {51}, number = {1}, year = {2013}, pages = {15 - 22}, abstract = {We propose an efficient heuristic method based on Space Partitioning (SP) and Tabu Search (TS) to solve the buffer sizing problem in unreliable production lines with several inspection stations. In such problem, we have an unreliable production line consisting of a certain number of machines and fixed-size buffers. These machines produce a single part with two different quality levels: conforming and non-conforming parts. The production line may contain inspection stations whose job is to reject the non-conforming parts from the line. The production line must meet a constant rate of demand for the conforming finished parts. The objective is to minimize the average long term combined storage and shortage costs, while also specifying the optimal location of inspection stations. This design problem is a difficult mixed integer nonlinear program. Solving even a small instance of 10 machines and one inspection station using a direct dynamic programming method takes hours. If we especially}, keywords = {Buffer storage (Computer science), Combinatorial Optimization, Dynamic programming, Heuristic algorithms, Inspection, Machine theory, Meta-heuristics, Production lines, Quality, Tabu search algorithm, Topology}, issn = {03155986}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=bth\&AN=94343722\&site=ehost-live}, author = {Ouzineb, Mohamed and Mhada, Fatima and El Hallaoui, Issmail} } @conference {Ouahed201333, title = {A discovery service for automatic composition of web services oriented-agent}, booktitle = {Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE}, year = {2013}, note = {cited By 1}, pages = {33-35}, abstract = {In this paper we present an approach for automatic web service composition. The process of composition considered includes two layers; the discovery layer which aims to generate a composition schema, and the execution layer which uses a multi-agent system to select web services and execute the composite service. The main focus of this work is on the discovery layer where we propose an approach to optimize the search of the composite service. Firstly, a dependency graph is created by matching the I/O parameters of request and all available web services in register. Then a backward search is performed on this graph to choose the composition schema. The principle used for choosing services is based on the proportion of input and output parameters. Services with the highest proportion are preferred, allowing us to minimize the number of services participating in the solution. Experimentation and performance evaluation of the suggested approach are given at the end of this paper. {\textcopyright} 2013 IEEE.}, doi = {10.1109/WETICE.2013.16}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883530751\&doi=10.1109\%2fWETICE.2013.16\&partnerID=40\&md5=58ccbaef94e0989981dec058cdee4e71}, author = {Ouahed, A.K.E.a and Erradi, M.b and Azzoune, H.c} } @conference { ISI:000352386800113, title = {An exact method for solving the buffer sizing and inspection stations allocations problem}, booktitle = {PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND SYSTEMS MANAGEMENT (IEEE-IESM 2013)}, year = {2013}, note = {5th International Conference on Industrial Engineering and Systems Management (IEEE IESM), Mohammadia Sch Engn, Rabat, MOROCCO, OCT 28-30, 2013}, pages = {775-780}, publisher = {IEEE; IEEE Morocco Sect; I4e2; Univ Valenciennes Hannaut Cambresis; Univ Mohammed V Agdal Rabat; CNRST; CISIT; ENIM; ESITH; GDR MACS; LAMIH CNRS; IFSTTAR; IRT RAILENIUM; TEMPO}, organization = {IEEE; IEEE Morocco Sect; I4e2; Univ Valenciennes Hannaut Cambresis; Univ Mohammed V Agdal Rabat; CNRST; CISIT; ENIM; ESITH; GDR MACS; LAMIH CNRS; IFSTTAR; IRT RAILENIUM; TEMPO}, abstract = {An unreliable single part type transfer line with fixed inter machine buffer sizes is considered. In general, imperfect machines operating with imperfect raw material, or partially processed raw material, will result in the production of a mix of conforming and non conforming parts. The problem of optimal joint assignment of buffer sizes and inspection station positions is here considered where we assume that defective parts are scrapped upon detection. The performance measure to be optimized is a combination of work in process storage and parts inspection costs, with an eye to determining the adequate number of inspection stations. We propose an exact method for solving this problem and large-scale numerical experiments are provided to demonstrate the efficiency of the proposed algorithm. Interesting properties of the problem are also denoted based on our empirical results.}, isbn = {978-2-9600532-4-1}, author = {Ouzineb, Mohammed and Mhada, Fatima and El Hallaoui, Issmail and Pellerin, Robert}, editor = {Aboutajdine, D and Skalli, A and Benchekroun, B and Artiba, A} } @conference {Ouzineb2013, title = {An exact method for solving the buffer sizing and inspection stations allocations problem}, booktitle = {Proceedings of 2013 International Conference on Industrial Engineering and Systems Management, IEEE - IESM 2013}, year = {2013}, note = {cited By 1}, abstract = {An unreliable single part type transfer line with fixed inter machine buffer sizes is considered. In general, imperfect machines operating with imperfect raw material, or partially processed raw material, will result in the production of a mix of conforming and non conforming parts. The problem of optimal joint assignment of buffer sizes and inspection station positions is here considered where we assume that defective parts are scrapped upon detection. The performance measure to be optimized is a combination of work in process storage and parts inspection costs, with an eye to determining the adequate number of inspection stations. We propose an exact method for solving this problem and large-scale numerical experiments are provided to demonstrate the efficiency of the proposed algorithm. Interesting properties of the problem are also denoted based on our empirical results. {\textcopyright} 2013 International Institute for Innovation, Industrial Engineering and Entrepreneurship - I4e2.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84899126497\&partnerID=40\&md5=cfe72f4685a6a787a74df5be3b83db8f}, author = {Ouzineb, M.a and Mhada, F.b and El Hallaoui, I.c and Pellerin, R.c} } @conference {Oufkir2013, title = {Linking knowledge management valuation to intellectual capital: A conceptual study}, booktitle = {2013 3rd International Symposium ISKO-Maghreb}, year = {2013}, note = {cited By 0}, abstract = {Knowledge management (KM) and intellectual capital (IC) are two big research questions in nowadays management topics. In fact, the relation between these two subjects varies from analogy to complementarity. Defining these concepts remains for long years a controversy, because both topics imply different disciplines. And despite the multidisciplinary of the field, it is agreed that KM treats both knowledge as an object, and management as a set of tools and techniques. The association between these two aspects is the essence of KM. Whereas with the IC, the focus is much on the effect and value generated by the intellectual asset, which implies a notion of valuation and measurement. The relationship between concepts of IC and KM needs to be redefined in view of field progress. In our paper, we assume that {\textquoteright}IC is suited to KM valuation and performance measurement{\textquoteright}: a conceptual review of the literature within this work should give foundation to this hypothesis. Further foreseen analytical verification may empower it to be a basic rule on the design of future KM valuation indicators. {\textcopyright} 2013 IEEE.}, doi = {10.1109/ISKO-Maghreb.2013.6728169}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84894168406\&doi=10.1109\%2fISKO-Maghreb.2013.6728169\&partnerID=40\&md5=3992beae3e503b5072db3383bfbbc6e8}, author = {Oufkir, L.a and Fredj, M.b and Kassou, I.b} } @conference { ISI:000350287800033, title = {Linking Knowledge Management Valuation to Intellectual Capital: a conceptual study}, booktitle = {2013 3RD INTERNATIONAL SYMPOSIUM ISKO-MAGHREB}, year = {2013}, note = {ISKO-Maghreb 3rd International Symposium, Marrakech, MOROCCO, NOV 08-09, 2013}, publisher = {ISKO}, organization = {ISKO}, abstract = {Knowledge management (KM) and intellectual capital (IC) are two big research questions in nowadays management topics. In fact, the relation between these two subjects varies from analogy to complementarity. Defining these concepts remains for long years a controversy, because both topics imply different disciplines. And despite the multidisciplinary of the field, it is agreed that KM treats both knowledge as an object, and management as a set of tools and techniques. The association between these two aspects is the essence of KM. Whereas with the IC, the focus is much on the effect and value generated by the intellectual asset, which implies a notion of valuation and measurement. The relationship between concepts of IC and KM needs to be redefined in view of field progress. In our paper, we assume that {\textquoteleft}{\textquoteleft}IC is suited to KM valuation and performance measurement{{\textquoteright}{\textquoteright}}: a conceptual review of the literature within this work should give foundation to this hypothesis. Further foreseen analytical verification may empower it to be a basic rule on the design of future KM valuation indicators.}, isbn = {978-1-4799-3392-1}, author = {Oufkir, Latifa and Fredj, Mounia and Kassou, Ismail} } @article {Ghallali2013354, title = {Mobile security: Designing a new framework limiting malware spread in the mobile cloud computing}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {57}, number = {3}, year = {2013}, note = {cited By 2}, pages = {354-366}, abstract = {Our study is primarily interested in limiting the spread of malwares via SMS/MMS, and Emails. It describes the steps leading to identify, analyze and secure traffic in mobile networks. For this purpose, a Framework MPSS has been used to be part of the network of the mobile network operator. MPSS aims to increase the level of information security across the telecom provider network in order to resolve the problems of the limited hardware and software resources on those mobiles devices. Finally, a new study based on MPSS Framework limitations, has driven a designing of a new Framework called MPSS2 based in the private Mobile Cloud Computing of the ISP. In addition, with the approach of MCC, the proposed security takes the form of a service provided by the mobile network operator (SaaS: Security as a Service). Therefore MPSS2 has the main objective to limit the risk of losses of personal and professional user{\textquoteright}s data. {\textcopyright} 2005 - 2013 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84888787936\&partnerID=40\&md5=10138227661d7367aea360980a41d9b5}, author = {Ghallali, M.a and El Mir, A.b and El Ouahidi, B.a and Bounabat, B.b and El Hami, N.c and Elmir, B.b} } @conference {Ouacha2013, title = {Proactive routing based distributed energy consumption}, booktitle = {2013 8th International Conference on Intelligent Systems: Theories and Applications, SITA 2013}, year = {2013}, note = {cited By 0}, abstract = {Energy consumption in mobile network might be excessive for some nodes acting as relays in OLSR network than others. This might have a considerable consequence on the network lifetime. Our approach is presented in the EDCR protocol. It is an extended version of OLSR which aims to increase the residual energy of the network by distributing forwarding tasks between MPRs. For that, we change the MPR procedure selection in order to favor nodes with the largest number of MPR-selector. Our hypothesis is experienced under NS2 and effectively results on less energy consumption {\textcopyright} 2013 IEEE.}, doi = {10.1109/SITA.2013.6560785}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883057326\&doi=10.1109\%2fSITA.2013.6560785\&partnerID=40\&md5=2831baa796bde04305344dd6b1643db1}, author = {Ouacha, A.a and El Abbadi, J.a and Habbani, A.b and Bouamoud, B.b} } @conference { ISI:000358736600029, title = {Software Quality Requirements: a systematic mapping study}, booktitle = {2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 1}, series = {Asia-Pacific Software Engineering Conference}, year = {2013}, note = {20th Asia-Pacific Software Engineering Conference (APSEC), Chulalongkorn Univ, Fac Engn, Dept Comp Engn, Bangkok, THAILAND, DEC 02-05, 2013}, pages = {231-238}, publisher = {Prov Elect Author; Metropolitan Elect Author; Thailand Convent \& Exhibit Bur; IEEE Comp Soc}, organization = {Prov Elect Author; Metropolitan Elect Author; Thailand Convent \& Exhibit Bur; IEEE Comp Soc}, abstract = {Software quality requirements (SQR) play a central role in software quality (SQ) success. The importance of mastering SQR can be seen as obvious; however, when it comes to customer satisfaction, end-users are often dissatisfied with SQ. In this paper, a systematic mapping study aims to summarize SQR research by answering nine mapping questions. In total, 51 articles were selected and classified according to multiple criteria: publication source, publication year, research type, research approach, contribution type of SQR literature, requirements engineering activity, well-known SQ model, software artifact and SQR type. The results show an increased interest in SQR research in recent years and reveal that conferences are the main SQR publication target. Most SQR research has used case studies. The dominant contribution type of SQR research is method while specification is the main requirements engineering activity identified. SQ models need to be more used for SQR identification. Design module and requirements documentation are the principal artifacts reported in SQR literature. External and internal SQR were the main SQR types addressed in literature. Identifying empirical solutions to address SQR is a promising research direction for researchers.}, isbn = {978-1-4799-2143-0}, issn = {1530-1362}, doi = {10.1109/APSEC.2013.40}, author = {Ouhbi, Sofia and Idri, Ali and Luis Fernandez-Aleman, Jose and Toval, Ambrosio}, editor = {Muenchaisri, P and Rothermel, G} } @conference {Ouhbi2013231, title = {Software quality requirements: A systematic mapping study}, booktitle = {Proceedings - Asia-Pacific Software Engineering Conference, APSEC}, volume = {1}, year = {2013}, note = {cited By 3}, pages = {231-238}, abstract = {Software quality requirements (SQR) play a central role in software quality (SQ) success. The importance of mastering SQR can be seen as obvious; however, when it comes to customer satisfaction, end-users are often dissatisfied with SQ. In this paper, a systematic mapping study aims to summarize SQR research by answering nine mapping questions. In total, 51 articles were selected and classified according to multiple criteria: publication source, publication year, research type, research approach, contribution type of SQR literature, requirements engineering activity, well-known SQ model, software artifact and SQR type. The results show an increased interest in SQR research in recent years and reveal that conferences are the main SQR publication target. Most SQR research has used case studies. The dominant contribution type of SQR research is method while specification is the main requirements engineering activity identified. SQ models need to be more used for SQR identification. Design module and requirements documentation are the principal artifacts reported in SQR literature. External and internal SQR were the main SQR types addressed in literature. Identifying empirical solutions to address SQR is a promising research direction for researchers. {\textcopyright} 2013 IEEE.}, doi = {10.1109/APSEC.2013.40}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84933501221\&doi=10.1109\%2fAPSEC.2013.40\&partnerID=40\&md5=f81ca9b922dd0cab1200996357d49459}, author = {Ouhbi, S.a and Idri, A.a and Fern{\'a}ndez-Alem{\'a}n, J.L.b and Toval, A.b} } @conference { ISI:000353639700241, title = {Using lexicometry and vocabulary analysis techniques to detect a signature for web profile}, booktitle = {2013 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM)}, year = {2013}, note = {IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Niagara Falls, CANADA, AUG 25-28, 2013}, pages = {1494-1498}, publisher = {IEEE; Assoc Comp Machinery; Assoc Comp Machinery SIGKDD; IEEE Comp Soc; IEEE TCDE; Global Univ; Hellen American Univ; Springer; Microsoft; EXtra; Springer Verlag; Assoc Comp Machinery SIGMOD}, organization = {IEEE; Assoc Comp Machinery; Assoc Comp Machinery SIGKDD; IEEE Comp Soc; IEEE TCDE; Global Univ; Hellen American Univ; Springer; Microsoft; EXtra; Springer Verlag; Assoc Comp Machinery SIGMOD}, abstract = {Our research theme is evolving around the concept of computer profiling. The aim of our work is to propose an approach that will detect web profiles in a unique way and to model a print web for each profile. Our main concern is to find this signature from text messages in the forums, by analyzing the vocabulary used by each user. Also we will focus here on presenting our approach and our future work in a way that will allow us to detect the {\textquoteleft}{\textquoteleft}Specific Vocabulary{{\textquoteright}{\textquoteright}} for each web profile.}, isbn = {978-1-4503-2240-9}, author = {El Bouanani, Sara El Manar and Kassou, Ismail}, editor = {Ozyer, T and Carrington, P} } @conference { ISI:000310353000129, title = {A Dynamic Proxy for Lightweight Web Service Composition}, booktitle = {2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2012}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Tangiers, MOROCCO, MAY 10-12, 2012}, pages = {699-704}, publisher = {Morocco Sect MTT/AP Joint Chapter}, organization = {Morocco Sect MTT/AP Joint Chapter}, abstract = {Web Services (WS) enable access to remote applications over the Internet. Composition thereof gives rise to more complex services by integrating applications over borders of companies, institutions, and countries. But such compositions fail if they cannot dynamically adapt to change in such an ever changing environment. Unfortunately web compositions today are still implemented in a static way. Implementing invocations of web services is too verbose and heavy-weight. It requires manual extraction of each service{\textquoteright}s information from interface descriptions and because of the missing transparency in composition languages, developers repetitively have to write low-level invocation code. This paper proposes a light-weight approach for automatic and transparent web service compositions, supporting standard SOAP-based web services. We provide a proof-of-concept as a scripting language. The benefit is that our web services composition approach makes compositions simpler and more transparent, because invoking a web service is no more complicated than invoking a local method.}, isbn = {978-1-4673-1520-3}, author = {Najam, Sara and Dinkelaker, Tom and Erradi, Mohamed and Ouzzif, Mohamed}, editor = {Essaaidi, M and Zaz, Y} } @article {Lakki2012217, title = {The integration ofthe speedof mobilityin the selection OFMPR to improve theqosin ad hoc networks}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {36}, number = {2}, year = {2012}, note = {cited By 1}, pages = {217-226}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84857970125\&partnerID=40\&md5=23ad0cf075d2275f629e3d075e1d94f5}, author = {Lakki, N. and Ouacha, A. and Habbani, A. and El Abbadi, J.} } @conference {Ouacha2012305, title = {New mobility metric based on MultiPoint Relay life duration}, booktitle = {SIGMAP 2012, WINSYS 2012 - Proceedings of the International Conference on Signal Processing and Multimedia Applications and Wireless Information Networks and Systems}, year = {2012}, note = {cited By 0}, pages = {305-309}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84867639975\&partnerID=40\&md5=e94005ced33c5ad754bab9aa88330260}, author = {Ouacha, A. and Lakki, N. and Habbani, A. and El Abbadi, J.} } @article {Mahieddine2012131, title = {Object serialization white framework in J2ME and its refactoring in black framework}, journal = {International Conference on Next Generation Networks and Services, NGNS}, year = {2012}, note = {cited By 0}, pages = {131-136}, doi = {10.1109/NGNS.2012.6656090}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84894208690\&doi=10.1109\%2fNGNS.2012.6656090\&partnerID=40\&md5=8c8da3facba1758b014b2622d3ec45f6}, author = {Mahieddine, M. and El-Khaddar, M.A. and Oukid, S.} } @conference {ElKalam2012, title = {Preface [Preface]}, booktitle = {Proceedings of the 2nd National Days of Network Security and Systems, JNS2 2012}, year = {2012}, note = {cited By 0}, doi = {10.1109/JNS2.2012.6249227}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84866688620\&doi=10.1109\%2fJNS2.2012.6249227\&partnerID=40\&md5=7fd94ebf5742b98414b8aca656a1701c}, author = {El Kalam, A.A. and El Bakkali, H. and Ouadghiri, D.} } @article {Ouacha2011607, title = {Energy consumption of mobile intelligent system}, journal = {International Review on Computers and Software}, volume = {6}, number = {4}, year = {2011}, note = {cited By 1}, pages = {607-614}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-81255192184\&partnerID=40\&md5=b26045da71d43042643a0b6b4648f535}, author = {Ouacha, A. and Lakki, N. and Habbani, A. and Oubaha, J. and Elkoutbi, M. and Abbadi, J.E.} } @conference {Oubaha2011, title = {New approach: Mapping of 802.11e into MPLS domains}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2011}, note = {cited By 2}, doi = {10.1109/ICMCS.2011.5945692}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79961236232\&doi=10.1109\%2fICMCS.2011.5945692\&partnerID=40\&md5=29b437172dc2f468633f19d9746c8f92}, author = {Oubaha, J. and Habbani, A. and Elkoutbi, M.} } @conference { ISI:000303188300041, title = {New Method: Mapping of 802.11e into MPLS Domains, Conception and Experimentation}, booktitle = {DIGITAL INFORMATION PROCESSING AND COMMUNICATIONS, PT 2}, series = {Communications in Computer and Information Science}, volume = {189}, year = {2011}, note = {International Conference on Digital Information Processing and Communications (ICDIPC 2011), VSB Tech Univ Ostrava, Ostrava, CZECH REPUBLIC, JUL 07-09, 2011}, pages = {470-483}, publisher = {Springer; VSB Tech Univ Ostrava; Soc Digital Informat \& Wireless Commun}, organization = {Springer; VSB Tech Univ Ostrava; Soc Digital Informat \& Wireless Commun}, abstract = {Mapping between two heterogeneous networks, Multi Protocol Label Switching (MPLS) and IEEE 802.11e is choice of future technology as it has ability to perform traffic engineering and create the corresponds between LSP (Label Switch Path) and AC (Access Category). This paper discusses the mapping between IEEE 802.11 MPLS integration to achieve quality of service on MPLS networks. MPLS and 802.11e is very useful approach for today{\textquoteright}s internet to ensure the Quality of service the end to end. It talks about different approaches to map 802.11 e Access Categories (AC) to Label Switched Path (LSP) and their advantages. It then introduces the concept of encapsulated LSPs to achieve future QoS, which requires further study to examine its practicability.}, isbn = {978-3-642-22409-6}, issn = {1865-0929}, author = {Oubaha, Jawad and Echchaachoui, Adel and Ouacha, Ali and Elkoutbi, Mohammed}, editor = {Snasel, V and Platos, J and ElQawasmeh, E} } @article {Oubaha2011470, title = {New method: Mapping of 802.11e into MPLS domains, conception and experimentation}, journal = {Communications in Computer and Information Science}, volume = {189 CCIS}, number = {PART 2}, year = {2011}, note = {cited By 1}, pages = {470-483}, doi = {10.1007/978-3-642-22410-2_41}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79960314840\&doi=10.1007\%2f978-3-642-22410-2_41\&partnerID=40\&md5=bcede67baa306a12241511a09bbdf24c}, author = {Oubaha, J. and Echchaachoui, A. and Ouacha, A. and Elkoutbi, M.} } @article { ISI:000290083400007, title = {Traceability and management of dispersed product knowledge during design and manufacturing}, journal = {COMPUTER-AIDED DESIGN}, volume = {43}, number = {5, SI}, year = {2011}, month = {MAY}, pages = {546-562}, abstract = {Product development processes comprise highly creative and knowledge-intensive tasks that involve extensive information exchange and communication among geographically distributed teams. Due to the geographical and institutional separation between the different systems involved in the product lifecycle, product knowledge sharing is becoming a key issue in the information systems of extended enterprises. This paper addresses the issue and challenges of product knowledge traceability during the product development. The aim of this research effort is to enhance the sharing and use of product knowledge acquired during the development process using traceability information. A standardized approach is proposed to trace and share product knowledge and key constructs to support traceability during the product development process are identified and formalized. This research effort is based on the premise that an important step towards achieving product knowledge sharing is providing traceability across various product knowledge elements that are used in product development phases, i.e. design and manufacturing. Two disjointed but complementary case studies illustrating the benefit of traceability are presented. The potential role of traceability is described, first to support the decision making process during engineering change management (ECM), and second to support product-oriented modelling for knowledge sharing and exchanging to meet the quality requirements. The proposed approach has been implemented using the MEGA Suite tool and applied to each of the case studies and could be integrated to PLM systems currently in use. (C) 2010 Elsevier Ltd. All rights reserved.}, issn = {0010-4485}, doi = {10.1016/j.cad.2010.03.006}, author = {Ouertani, M. Z. and Baina, S. and Gzara, L. and Morel, G.} } @article {Ouertani2011546, title = {Traceability and management of dispersed product knowledge during design and manufacturing}, journal = {CAD Computer Aided Design}, volume = {43}, number = {5}, year = {2011}, note = {cited By 28}, pages = {546-562}, doi = {10.1016/j.cad.2010.03.006}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79953746928\&doi=10.1016\%2fj.cad.2010.03.006\&partnerID=40\&md5=90f98063e9359cba6bbf629c25a6ff40}, author = {Ouertani, M.Z. and Baina, S. and Gzara, L. and Morel, G.} } @conference {Oubaha2010, title = {Multi-criteria path optimization in MPLS networks}, booktitle = {2010 5th International Symposium on I/V Communications and Mobile Networks, ISIVC 2010}, year = {2010}, note = {cited By 0}, doi = {10.1109/ISVC.2010.5656215}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-78651476901\&doi=10.1109\%2fISVC.2010.5656215\&partnerID=40\&md5=80d2db09aa1ec387e76a137bf94a9e0f}, author = {Oubaha, J. and Habbani, A. and Elkoutbi, M.} } @conference {Oudidi2010165, title = {QoS routing using OLSR protocol}, booktitle = {International Conference on Communications - Proceedings}, year = {2010}, note = {cited By 1}, pages = {165-171}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79958704229\&partnerID=40\&md5=b671b4b4cac801b42c9f9164a18f99ea}, author = {Oudidi, K. and Hajami, A. and Koutbi, M.} } @conference { ISI:000290179300057, title = {Highlights{\textquoteright} Recognition and Learning in Soccer Video by Using Hidden Markov Models and the Bayesian Theorem}, booktitle = {2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS 2009)}, year = {2009}, note = {International Conference on Multimedia Computing and Systems, Ouarzazate, MOROCCO, APR 02-04, 2009}, pages = {304-308}, abstract = {Our paper presents a new approach for the recognition of highlights in soccer video. Our contribution consists of the combination of Bayesian theorem inferences and Hidden Markov Models (HMMs). We build HMMs to calculate probabilities that a test video segment belongs to highlight and non highlight classes. Then, we apply the Bayesian theorem on the two previous probabilities. Our system has achieved an accuracy of 95.6\% which is a good result of highlights detection in comparison with other methods.}, isbn = {978-1-4244-3756-6}, doi = {10.1109/MMCS.2009.5256682}, author = {El Ouazzani, Rajae and Thami, Rachid Oulad Haj} } @conference {Oudidi200911, title = {A mobility based metric for QoS in mobile ad hoc netwoks}, booktitle = {Proceedings of the 9th IASTED International Conference on Wireless and Optical Communications, WOC 2009}, year = {2009}, note = {cited By 1}, pages = {11-18}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-74549200833\&partnerID=40\&md5=0b96245d706ab90e109dba937687a115}, author = {Oudidi, K. and Elkoutbi, M.} } @article {4562825420091002, title = {Resource Optimization of Mobile Intelligent System With Heart MPLS Network.}, journal = {International Journal of Interactive Mobile Technologies}, volume = {3}, number = {S2}, year = {2009}, pages = {58 - 64}, abstract = {In this paper, we introduce the original Mobile Intelligent System (MIS) in embedded FPGA architecture. This node will allow the construction of autonomous mobile network units which can move in unknowns, inaccessible or hostile environment for human beings, in order to collect data by various sensors and transmits them by routing to a unit of distant process. For the sake of improving the performance of transmission, we propose a global schema of QoS management using DiffServ/MPLS backbones. We provide an evaluation of several scenarios for combining QoS IP networks with MIS access network. We conclude with a study on interoperability between QoS patterns in access and backbone networks. [ABSTRACT FROM AUTHOR]}, keywords = {Artificial intelligence, Computer architecture, DiffServ and MPLS, Information networks, intelligent sensors, Mobile communication systems, Quality of service, Routing (Computer network management) {\textendash} Equipment \& supplies, wireless sensor network}, issn = {18657923}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=45628254\&site=ehost-live}, author = {Oubaha, Jawad and Habbani, Ahmed and Elkoutbi, Mohammed} } @article {4562825020091002, title = {Using Mobility to Enhance Routing Process in MIS System.}, journal = {International Journal of Interactive Mobile Technologies}, volume = {3}, number = {S2}, year = {2009}, pages = {24 - 32}, abstract = {This paper introduces the original Mobile Intelligent System (MIS) in an embedded Field-Programmable Gate Array (FPGA) architecture. This would allow the construction of autonomous mobile network units which can move in environments that are unknown, inaccessible or hostile for human beings, in order to collect data by various sensors and route it to a distant processing unit. To have a better performing routing process, we propose a new mobility measure. Each node measures its own mobility in the network, based on its neighbors{\textquoteright} information. This measure has no unit and is calculated by quantification in regular time intervals. [ABSTRACT FROM AUTHOR]}, keywords = {ad hoc networks, Computer architecture, Information systems embedded application, Intelligent agents (Computer software), intelligent sensors, Mobile communication systems, multipoint relays, node mobility and mobility quantification, OLSR protocol, Routers (Computer networks), Routing (Computer network management) {\textendash} Equipment \& supplies, wireless sensor network}, issn = {18657923}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=45628250\&site=ehost-live}, author = {Oudidi, K. and Habbani, A. and Elkoutbi, M.} } @conference {Oubaha2008, title = {802.11 Mobile networks combined to QoS IP networks}, booktitle = {2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA}, year = {2008}, note = {cited By 0}, doi = {10.1109/ICTTA.2008.4530207}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-49149091439\&doi=10.1109\%2fICTTA.2008.4530207\&partnerID=40\&md5=cc7a1092940a0c44e4c4587dd32329f4}, author = {Oubaha, J. and Elkoutbi, M.} } @conference { ISI:000261578001102, title = {802.11 Mobile Networks Combined to QoS IP Networks}, booktitle = {2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5}, year = {2008}, note = {3rd International Conference on Information and Communication Technologies, Damascus, SYRIA, APR 07-11, 2008}, pages = {2176-2180}, abstract = {In Internet user{\textquoteright}s traffic crosses several areas. Increasingly, users are demanding quality of service (QoS) from beginning to end. Therefore, it is necessary to have a global schema of differentiation not only in the areas which make up the network backbone, but also in access networks that are also often bottlenecks. In this paper, we propose a global schema of QoS management Using DiffServ/MPLS backbones and 802.11 wireless access networks. We provide an evaluation of several scenarios for combining QoS IP networks with 802.11 access network. We conclude with a study on interoperability between QoS patterns in access and backbone networks.}, isbn = {978-1-4244-1751-3}, author = {Oubaha, Jawad and Elkoutbi, Mohammed} } @article { ISI:000256710200013, title = {Description of a teleconferencing floor control protocol and its implementation}, journal = {ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE}, volume = {21}, number = {3}, year = {2008}, note = {6th Conference on Modelling and Simulation, Rabat, MOROCCO, 2006}, month = {APR}, pages = {430-441}, abstract = {In this paper, we present a formal specification of a teleconferencing floor control protocol and its implementation. The services provided by this protocol are described within the SCCP IETF document (Simple Conference Control Protocol). Finite state machines are used to model services behaviours part of this protocol. Temporal properties are defined as constraints of the teleconferencing system using SCCP protocol. The dynamic properties are described by the LTL logic (Linear Temporal Logic) and verified using the model-checker Spin/Promela. A prototype of a multimedia teleconferencing system is implemented and it is based on the specified protocol. This implementation uses UML notation and is developed with JMF (Java Media Framework) API. (C) 2007 Elsevier Ltd. All rights reserved.}, issn = {0952-1976}, doi = {10.1016/j.engappai.2007.11.003}, author = {Ouzzif, Mohammed and Erradi, Mohammed and Mountassir, Hassan} } @conference { ISI:000259601400196, title = {Network mobility in ad hoc networks}, booktitle = {2008 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING, VOLS 1-3}, year = {2008}, note = {International Conference on Computer and Communication Engineering, Kuala Lumpur, MALAYSIA, MAY 13-15, 2008}, pages = {969-973}, publisher = {Int Islam Univ Malaysia, Fac Engn}, organization = {Int Islam Univ Malaysia, Fac Engn}, abstract = {The performance of routing protocols in a Mobile Ad hoc Network (MANET) is related to the network topology and nodes mobility. In order to ensure good performances of routing protocols in MANET, it is necessary to take into account the mobility criterion when choosing best routes in the network. In this paper, we propose a new measure of the network mobility which is relative and lightweight. Relative because it is directly dependent on neighboring and link state changes, and lightweight because it does not consume enough resources in memory and CPU. Each node estimates its relative mobility, based on changes of the links in its neighboring. This measure of mobility has no unit, it is independent of any existing mobility models and it is calculated at regular time intervals.}, isbn = {978-1-4244-2357-6}, doi = {10.1109/ICCCE.2008.4580751}, author = {Enneya, N. and Oudidi, K. and Elkoutbi, M.} } @conference { ISI:000184848600019, title = {Modeling and tracking of the cardiac left ventricular motion by a state space harmonic model in MRI sequence}, booktitle = {FUNCTIONAL IMAGING AND MODELING OF THE HEART, PROCEEDINGS}, series = {LECTURE NOTES IN COMPUTER SCIENCE}, volume = {2674}, year = {2003}, note = {2nd International Workshop on Functional Imaging and Modeling of the Heart (FIMH2003), LYON, FRANCE, JUN 05-06, 2003}, pages = {184-193}, publisher = {Inst Natl Sci Appl Lyon; Helsinki Univ Technol; French Finnish Assoc Sci Tech Res; French Natl Ctr Sci Res; Sci Acad Finland, Grad Sch, Funct Res Med; French Embassy Helsinki, Sci Dept; French Biomed Engn Soc; Joint Incent Act Beating Heart ISIS Res Grp; }, organization = {Inst Natl Sci Appl Lyon; Helsinki Univ Technol; French Finnish Assoc Sci Tech Res; French Natl Ctr Sci Res; Sci Acad Finland, Grad Sch, Funct Res Med; French Embassy Helsinki, Sci Dept; French Biomed Engn Soc; Joint Incent Act Beating Heart ISIS Res Grp; }, abstract = {We present a new method for modeling the left ventricular motion of the heart from a magnetic resonance imaging (MRI) sequence. We propose to model the 3D time-space trajectory of the points of the endocardial regions of the left ventricle (LV) using an harmonic model of movement, which is linear and describes the dynamics of the left ventricle throughout the cardiac cycle. This new state space model is based on the assumption of quasi-periodicity of the cardiac cycle. We describe our method to obtain the state canonical vector and the corresponding state equations of the harmonic state model (HSM). A Kalman filter is used on this harmonic state model as an estimation tool of the filtered trajectory of the LV. It allows to obtain a robust estimation of the state vector which contains the measured parameter and its derivatives. Thus, a robust estimation of the instantaneous velocity of the LV region is computed using the whole information of the sequence included in the harmonic model. The model is validated on real cardiac sequences. We detail how to get the 3D time-space trajectories of the LV edge points. The results obtained are particularly interesting because they demonstrate the capability of our method to understand and discriminate normal cases from pathological cases.}, isbn = {3-540-40262-4}, issn = {0302-9743}, author = {Oumsis, M and Pham, QC and Sdigui, AD and Neyran, B and Magnin, IE}, editor = {Magnin, IE and Clarysse, P and Katila, T and Montagnat, J and Nenonen, J} } @conference { ISI:000088420800047, title = {Performance evaluation of {\textquoteleft}{\textquoteleft}kernel based tree{{\textquoteright}{\textquoteright}} protocol}, booktitle = {PROCEEDINGS OF 1999 SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS}, year = {1999}, note = {Symposium on Performance Evaluations of Computer and Telecommunications Systems (SPECTS 99), CHICAGO, IL, JUL 11-15, 1999}, pages = {318-325}, publisher = {Soc Comp Simulat Int}, organization = {Soc Comp Simulat Int}, abstract = {Multicasting messages to group members is now allowed thanks to many network level multicast routing protocols. Actually, current multicast routing protocols suffer from inflexibility in relation to their environment resources, and inappropriateness towards dynamic properties of group members. Thus, proposing implementations of new protocols in order to evaluate their performance is a costly issue, and it is better to simulate their behaviour before deciding whether they are efficient or not. We present a global {\textquoteleft}{\textquoteleft}adaptive multicast routing protocol{{\textquoteright}{\textquoteright}}, based on a special multicast tree, KBT (Kernel Based Tree). This strategy may lead to a new {\textquoteleft}{\textquoteleft}QoS multicast routing protocol{{\textquoteright}{\textquoteright}}. Our approach is based on the choice of a {\textquoteleft}{\textquoteleft}kernel{{\textquoteright}{\textquoteright}} of {\textquoteleft}{\textquoteleft}interception points{{\textquoteright}{\textquoteright}} in the initial multicast tree. As part of our work, we present in this paper the architecture, properties, and the main functionalities of our protocol. We finally evaluate the performance of our adaptive protocol through comparisons with classical current multicast routing protocols in the Internet, and show the enhancements provided by our solution.}, isbn = {1-56555-174-5}, author = {El Kettani, MDEC and Souissi, Y}, editor = {Obaidat, MS and Marsan, MA} }