@article {Rhouas202255, title = {Avionic Software and Agile Development: A Systematic Mapping Study}, journal = {Lecture Notes in Networks and Systems}, volume = {469 LNNS}, year = {2022}, note = {cited By 0}, pages = {55-65}, abstract = {Background: The rapid increase in the use of agile development has raised the question whether of the aerospace industry can benefit from the application of agile approaches in the production of software for airborne systems and equipment. These systems are regulated by the standard DO-178 since there are hard constraints imposed on them. Additionally, the evolution of the avionics software increases the complexity of the software. Therefore, the approach to the feasibility of agile development for avionics software needs to be further understood. Objective: This study aims to examine the research publications on the agile development implemented in the lifecycle of the avionic software in order to found the trend of this mode of development. Method: We conducted systematic mapping study adopting the guideline offered by [1, 2] and classified the contributions research between 2001 and 2021 in the map. Conclusion: We selected 46 articles from 956 found in four electronic databases and based on the results, we conclude that over the past decade there has been a general increase in the number of studies concerning the agile development in different phases of the avionics software lifecycle. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-04819-7_6}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85131126083\&doi=10.1007\%2f978-3-031-04819-7_6\&partnerID=40\&md5=ef257557fa65d7783ca43e4a8999f5f5}, author = {Rhouas, I. and Nafil, K.} } @article {Tamir202273, title = {Conception of an Automatic Decision Support Platform Based on Cross-Sorting Methods and the Fuzzy Logic for General Use}, journal = {Lecture Notes in Networks and Systems}, volume = {489 LNNS}, year = {2022}, note = {cited By 0}, pages = {73-81}, abstract = {Problems related to the classification of a set of data (methods, tools{\textellipsis}), by using the opinions of a committee members, challenge the need for an effective treatment based on the theoretical methods developed through the literature. Indeed, this study was conducted to answer the need identified during the realization of a prioritization study of a graphic modeling methods set in order to develop it into a computing platform. This platform is based on Multi-Criteria Decision Analysis and is destined for practical and general use. The developed platform uses fuzzy pairwise comparisons and cross-sorting methods. It consists of the calculation of two main results: the overall weight of each data to be classified and the consistency index. Regarding the use of fuzzy logic for calculating weights, we opt for the triangular function in the extension of the principle of least-squares logarithmic regression for taking into account the inaccuracy. Finally, the calculation of the normalized weight values can generate an irrational ordering of fuzzy number elements. In our previous work, we have tried to find the conditions on pairwise comparisons values to get rational outcomes, but the calculation was very heavy with the Matlab software. In addition, the modifications to make on the comparisons are multiple, not automatic and depend on the user{\textquoteright}s appreciation. The present work gives a classification solution of results in order to keep only input data (comparisons) that respect the rational order of the weights values. Then, an optimization algorithm is programmed to maximize the consistency indexes of this part of results, by allowing a limited margin of modification without greatly altering the initial data. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-07969-6_6}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135093234\&doi=10.1007\%2f978-3-031-07969-6_6\&partnerID=40\&md5=c4b7ba813043a527b2117d440b4bfe8e}, author = {Tamir, M. and Chiheb, R. and Ouzayd, F. and Retmi, K.} } @article {Rguibi2022, title = {CXAI: Explaining Convolutional Neural Networks for Medical Imaging Diagnostic}, journal = {Electronics (Switzerland)}, volume = {11}, number = {11}, year = {2022}, note = {cited By 0}, abstract = {Deep learning models have been increasingly applied to medical images for tasks such as lesion detection, segmentation, and diagnosis. However, the field suffers from the lack of concrete definitions for usable explanations in different settings. To identify specific aspects of explainability that may catalyse building trust in deep learning models, we will use some techniques to demonstrate many aspects of explaining convolutional neural networks in a medical imaging context. One important factor influencing clinician{\textquoteright}s trust is how well a model can justify its predictions or outcomes. Clinicians need understandable explanations about why a machine-learned prediction was made so they can assess whether it is accurate and clinically useful. The provision of appropriate explanations has been generally understood to be critical for establishing trust in deep learning models. However, there lacks a clear understanding on what constitutes an explanation that is both understandable and useful across different domains such as medical image analysis, which hampers efforts towards developing explanatory tool sets specifically tailored towards these tasks. In this paper, we investigated two major directions for explaining convolutional neural networks: feature-based post hoc explanatory methods that try to explain already trained and fixed target models and preliminary analysis and choice of the model architecture with an accuracy of 98\% {\textpm} 0.156\% from 36 CNN architectures with different configurations. {\textcopyright} 2022 by the authors. Licensee MDPI, Basel, Switzerland.}, doi = {10.3390/electronics11111775}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85131637625\&doi=10.3390\%2felectronics11111775\&partnerID=40\&md5=27f0c0e64e6e5a8788f4515f49d6ad01}, author = {Rguibi, Z. and Hajami, A. and Zitouni, D. and Elqaraoui, A. and Bedraoui, A.} } @article {Abdelhafid2022186, title = {ECG Arrhythmia Classification Using Convolutional Neural Network}, journal = {International Journal of Emerging Technology and Advanced Engineering}, volume = {12}, number = {7}, year = {2022}, note = {cited By 0}, pages = {186-195}, abstract = {This study provides a thorough analysis of earlier DL techniques used to classify the ECG data. The large variability among individual patients and the high expense of labeling clinical ECG records are the main hurdles in automatically detecting arrhythmia by electrocardiogram (ECG). The classification of electrocardiogram (ECG) arrhythmias using a novel and more effective technique is presented in this research. A high-performance electrocardiogram (ECG)-based arrhythmic beats classification system is described in this research to develop a plan with an autonomous feature learning strategy and an effective optimization mechanism, based on the ECG heartbeat classification approach. We propose a method based on efficient 12-layer, the MIT-BIH Arrhythmia dataset{\textquoteright}s five micro-classes of heartbeat types and using the wavelet denoising technique. Compared to state-of-the-art approaches, the newly presented strategy enables considerable accuracy increase with quicker online retraining and less professional involvement. {\textcopyright} 2022 IJETAE Publication House. All rights reserved.}, doi = {10.46338/ijetae0722_19}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135368671\&doi=10.46338\%2fijetae0722_19\&partnerID=40\&md5=ffb72f915dc01aa63fb482762a1edeb3}, author = {Abdelhafid, E. and Aymane, E. and Benayad, N. and Abdelalim, S. and El, Y.A.M.H. and Rachid, O.H.T. and Brahim, B.} } @article {Rassam2022387, title = {Empirical Study: What is the Best N-Gram Graphical Indexing Technique}, journal = {Lecture Notes in Networks and Systems}, volume = {489 LNNS}, year = {2022}, note = {cited By 0}, pages = {387-398}, abstract = {Recent research shows that indexing techniques, such as n-gram models, are useful at a wide variety of software engineering tasks, e.g., data extraction, document indexing, etc. However, these models require some numerous parameters. Moreover, the different ways one can extract data essentially yield different models. In this paper, we focus on n-gram models and evaluate how the use different set of methods and n values impact the predicting ability of these models. Thus, we compare the use of multiple techniques and sets of different parameters (n values character gram and word gram) with the aim of identifying the most appropriate indexing technique. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-07969-6_29}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135074852\&doi=10.1007\%2f978-3-031-07969-6_29\&partnerID=40\&md5=76e738e6a8c5330d57d78e968047e57f}, author = {Rassam, L. and Zellou, A. and Rachad, T.} } @article {Derrouz20225561, title = {End-to-end quantum-inspired method for vehicle classification based on video stream}, journal = {Neural Computing and Applications}, volume = {34}, number = {7}, year = {2022}, note = {cited By 1}, pages = {5561-5576}, abstract = {Intelligent Transportation Systems (ITS) are the most widely used systems for road traffic management. The vehicle type classification (VTC) is a crucial ITS task due to its capability to gather valuable traffic information. However, designing a performant VTC method is challenging due to the considerable intra-class variation of vehicles. This paper presents a new quantum decision-based method for VTC applied to video streaming. This method allows for earlier decision-making by considering a few stream{\textquoteright}s images. Our method is threefold. First, the video stream is acquired and preprocessed following a specific pipeline. Second, we aim to detect and track vehicles. Therefore, we apply a deep learning-based model to detect vehicles, and then a vehicle tracking algorithm is used to track each detected vehicle. Third, we seek to classify the tracked vehicle according to six defined classes. Furthermore, we transform the tracked vehicles according to a pipeline, consisting of the histogram of oriented gradients (HOG), and principal component analysis (PCA) methods. Then, we estimate the vehicles{\textquoteright} probabilities of belonging to each class by training multilayer perceptron (MLP) classifier with the resulting features. To assign a class to a vehicle, we apply a quantum-inspired probability integrator that handles each frame{\textquoteright}s information flow. The unique characteristics of the work we propose, compared to the existing ones, are expressed in the decision-making process, since the former requires a sequence of frames of different sizes, compared to the image-based-decision made by the other methods. Our method outperformed the baseline methods with an accuracy up to 96\%. {\textcopyright} 2021, The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature.}, keywords = {Classification (of information), Decision making, Decisions makings, Deep learning, Early decision, Early decision making, End to end, Intelligent systems, Intelligent transportation systems, Intelligent vehicle highway systems, Pipelines, Principal component analysis, Quantum inspired algorithm, Tracked vehicles, Type classifications, Vehicle classification, Vehicle type classification, Vehicle types, Video streaming}, doi = {10.1007/s00521-021-06718-9}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85122251939\&doi=10.1007\%2fs00521-021-06718-9\&partnerID=40\&md5=8e1d19359f8245b2f82d8558670d4ba1}, author = {Derrouz, H. and Cabri, A. and Ait Abdelali, H. and Oulad Haj Thami, R. and Bourzeix, F. and Rovetta, S. and Masulli, F.} } @article {Daoui2022, title = {Environmental, Climatic, and Parasite Molecular Factors Impacting the Incidence of Cutaneous Leishmaniasis Due to Leishmania tropica in Three Moroccan Foci}, journal = {Microorganisms}, volume = {10}, number = {9}, year = {2022}, note = {cited By 0}, abstract = {{Cutaneous leishmaniasis (CL) occurring due to Leishmania tropica is a public health problem in Morocco. The distribution and incidence of this form of leishmaniasis have increased in an unusual way in the last decade, and the control measures put in place are struggling to slow down the epidemic. This study was designed to assess the impact of climatic and environmental factors on CL in L. tropica foci. The data collected included CL incidence and climatic and environmental factors across three Moroccan foci (Foum Jemaa, Imintanout, and Ouazzane) from 2000 to 2019. Statistical analyses were performed using the linear regression model. An association was found between the occurrence of CL in Imintanout and temperature and humidity (r2 = 0.6076}, doi = {10.3390/microorganisms10091712}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85138700280\&doi=10.3390\%2fmicroorganisms10091712\&partnerID=40\&md5=515be27b75ee2affaf29fb221f2aefe8}, author = {Daoui, O. and Bennaid, H. and Kbaich, M.A. and Mhaidi, I. and Aderdour, N. and Rhinane, H. and Bouhout, S. and Akarid, K. and Lemrani, M.} } @article {Radouane20221460, title = {Fusion of Gabor filter and steerable pyramid to improve iris recognition system}, journal = {IAES International Journal of Artificial Intelligence}, volume = {11}, number = {4}, year = {2022}, note = {cited By 0}, pages = {1460-1468}, abstract = {Iris recognition system is a technique of identifying people using their distinctive features. Generally, this technique is used in security, because it offers a good reliability. Different researchers have proposed new methods for iris recognition system to increase its effectiveness. In this paper, we propose a new method for iris recognition based on Gabor filter and steerable pyramid decomposition. It{\textquoteright}s an efficient and accurate linear multi-scale, multi-orientation image decomposition to capture texture details of an image. At first, the iris image is segmented, normalized and decomposed by Gabor filter and steerable pyramid method. Multiple sub-band are generated by applying steerable pyramid on the input image. High frequency sub-band is ignored to eliminate noise and increase the accuracy. The method was validated using Chinese Academy of Sciences Institute of Automation (CASIA-v4), Indian Institute of Technology Delhi (IITD) and University of Phoenix Online (UPOL) databases. The performance of the proposed method is better than the most methods in the literature. The proposed algorithm provides accuracy of 99.99\%. False acceptance rate (FAR), equal error rate (EER) and genuine acceptance rate (GAR) have also been improved. {\textcopyright} 2022, Institute of Advanced Engineering and Science. All rights reserved.}, doi = {10.11591/ijai.v11.i4.pp1460-1468}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85136268629\&doi=10.11591\%2fijai.v11.i4.pp1460-1468\&partnerID=40\&md5=54ad763c812d3874d3c1e97ff0cfc8f8}, author = {Radouane, M. and Zouggari, N.I. and Amraoui, A. and Amraoui, M.} } @conference {Rassam202278, title = {Fuzzy Logic-based N-gram Graph Technique for Evaluating Textual Documents Indexes}, booktitle = {2022 4th International Conference on Computer Communication and the Internet, ICCCI 2022}, year = {2022}, note = {cited By 0}, pages = {78-82}, abstract = {Fuzzy logic is a term that is used more and more often by researchers specialized in information retrieval and indexing. It is supposed to fill the gaps of the current domain by adding meaning to the information. In this article, the main goal is introducing the fuzzy logic approach in the field of the representation of a corpus of documents, more precisely in the proposal of a new method based on fuzzy functions that allow the evaluation of the generated indexes of a specific corpus.The evaluation is based on calculating the degrees of relevance of a term in relation to another whether it is in the same document of the corpus or in two or more completely different documents of the same corpus. {\textcopyright} 2022 IEEE.}, keywords = {{\textquoteright}current, Computer circuits, Degree of relevance, Fuzzy function, Fuzzy logic, Fuzzy logic approach, Fuzzy-Logic, Graph technique, Indexing, Indexing (of information), N-grams, Textual documents}, doi = {10.1109/ICCCI55554.2022.9850268}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137083735\&doi=10.1109\%2fICCCI55554.2022.9850268\&partnerID=40\&md5=3d771186a1a254dd249e3647a64918b2}, author = {Rassam, L. and Aldiebesghanem, C. and Zellou, A. and Lahmar, E.B.} } @article {Ounasser202245, title = {Generative and Autoencoder Models for Large-Scale Mutivariate Unsupervised Anomaly Detection}, journal = {Smart Innovation, Systems and Technologies}, volume = {237}, year = {2022}, note = {cited By 0}, pages = {45-58}, abstract = {Anomaly detection is a major problem that has been well studied in various fields of research and fields of application. In this paper, we present several methods that can be built on existing deep learning solutions for unsupervised anomaly detection, so that outliers can be separated from normal data in an efficient manner. We focus on approaches that use generative adversarial networks (GAN) and autoencoders for anomaly detection. By using these deep anomaly detection techniques, we can overcome the problem that we need to have a large-scale anomaly data in the learning phase of a detection system. So, we compared various methods of machine based and deep learning anomaly detection with its application in various fields. This article used seven available datasets. We report the results on anomaly detection datasets, using performance metrics, and discuss their performance on finding clustered and low density anomalies. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.}, keywords = {Anomaly detection, Auto encoders, Deep learning, Detection system, Generative adversarial networks, ITS applications, Large-scales, Learning phasis, Performance, Performance metrices, Unsupervised anomaly detection}, doi = {10.1007/978-981-16-3637-0_4}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85116885193\&doi=10.1007\%2f978-981-16-3637-0_4\&partnerID=40\&md5=d381663c0ba073f5139a00cbfe2819c8}, author = {Ounasser, N. and Rhanoui, M. and Mikram, M. and Asri, B.E.} } @article {Mikram2022167, title = {Hybrid Deep Learning Models for Diabetic Retinopathy Classification}, journal = {Lecture Notes in Networks and Systems}, volume = {489 LNNS}, year = {2022}, note = {cited By 0}, pages = {167-178}, abstract = {Diabetic retinopathy is a complication of diabetes in the eye. This disease is caused by the damage of the blood vessels of the back of eye (i.e., retina). Unfortunately, diabetic retinopathy can cause several symptoms, the most serious of which is complete vision loss. Indeed, the detection of diabetic retinopathy is a time-consuming manual process that requires a qualified clinician to examine and evaluate digital color photographs of the retina{\textquoteright}s fundus. Currently, several researches are looking to employ artificial intelligence techniques, especially the Deep Learning, to deal with this issue. In this paper, we study some hybrid models for diabetic retinopathy severity classification in distributed and non-distributed environments. The studied models perform two main tasks: deep feature extraction and then classification of diabetic retinopathy according to its severity. The models were trained and validated on a publicly available dataset of 80,000 images and they achieved an accuracy of 80.7\%. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-07969-6_13}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135078332\&doi=10.1007\%2f978-3-031-07969-6_13\&partnerID=40\&md5=bf1f98b5263465c335e38e77dda6ea10}, author = {Mikram, M. and Moujahdi, C. and Rhanoui, M. and Meddad, M. and Khallout, A.} } @article {Rhanoui20222809, title = {A hybrid recommender system for patron driven library acquisition and weeding}, journal = {Journal of King Saud University - Computer and Information Sciences}, volume = {34}, number = {6}, year = {2022}, note = {cited By 2}, pages = {2809-2819}, abstract = {Nowadays the explosion of information sources has shaped how library users access information and provide feedback on their preferences. Therefore, faced with this explosion and the blossoming of digital libraries, modern libraries must take up the challenge of meeting the needs of their users and considering their opinions and preferences in order to offer them adequate resources and henceforth eliminate those that are unsatisfactory. Almost all library recommender systems aim to provide users with items of interest to them. However, despite its definite interest, the staff-oriented adaptation and application of this revolutionary technique to the collection development process is still in an embryonic stage. We propose a patron-driven hybrid library recommender system that uses machine learning techniques to recommend and assist in the acquisition and weeding decision-making operations by extracting and analyzing users{\textquoteright} opinions and ratings. The recommender system is applied and validated in a real national library case using Amazon{\textquoteright}s digital library and the library{\textquoteright}s catalog as a data source. {\textcopyright} 2020 The Authors}, doi = {10.1016/j.jksuci.2020.10.017}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096428211\&doi=10.1016\%2fj.jksuci.2020.10.017\&partnerID=40\&md5=49af7074b1295a09ce952c01fd4c7f92}, author = {Rhanoui, M. and Mikram, M. and Yousfi, S. and Kasmi, A. and Zoubeidi, N.} } @conference {Sabiri2022428, title = {Impact of Hyperparameters on the Generative Adversarial Networks Behavior}, booktitle = {International Conference on Enterprise Information Systems, ICEIS - Proceedings}, volume = {1}, year = {2022}, note = {cited By 0}, pages = {428-438}, abstract = {Generative adversarial networks (GANs) have become a full-fledged branch of the most important neural network models for unsupervised machine learning. A multitude of loss functions have been developed to train the GAN discriminators and they all have a common structure: a sum of real and false losses which depend only on the real losses and generated data respectively. A challenge associated with an equally weighted sum of two losses is that the formation can benefit one loss but harm the other, which we show causes instability and mode collapse. In this article, we introduce a new family of discriminant loss functions which adopts a weighted sum of real and false parts. With the use the gradients of the real and false parts of the loss, we can adaptively choose weights to train the discriminator in the sense that benefits the stability of the GAN model. Our method can potentially be applied to any discriminator model with a loss which is a sum of the real and fake parts. Our method consists in adjusting the hyper-parameters appropriately in order to improve the training of the two antagonistic models Experiences validated the effectiveness of our loss functions on image generation tasks, improving the base results by a significant margin on dataset Celebdata. Copyright {\textcopyright} 2022 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.}, keywords = {Common structures, Computer vision, Deep learning, Generative adversarial networks, Hyper-parameter, Image enhancement, Learning systems, Loss functions, Machine-learning, Network behaviors, Neural network model, Neural-networks, Unsupervised machine learning, Weighted Sum}, doi = {10.5220/0011115100003179}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85140905402\&doi=10.5220\%2f0011115100003179\&partnerID=40\&md5=a465ab3cd8d0650f9e310edf8a94d422}, author = {Sabiri, B. and Asri, B. and Rhanoui, M.} } @conference {Sabiri2022418, title = {Mechanism of Overfitting Avoidance Techniques for Training Deep Neural Networks}, booktitle = {International Conference on Enterprise Information Systems, ICEIS - Proceedings}, volume = {1}, year = {2022}, note = {cited By 0}, pages = {418-427}, abstract = {The objective of a deep learning neural network is to have a final model that performs well both on the data used to train it and the new data on which the model will be used to make predictions. Overfitting refers to the fact that the predictive model produced by the machine learning algorithm adapts well to the training set. In this case, the predictive model will capture the generalizable correlations and the noise produced by the data and will be able to give very good predictions on the data of the training set, but it will predict badly on the data that it has not yet seen during his learning phase. This paper proposes two techniques among many others to reduce or prevent overfitting. Furthermore, by analyzing dynamics during training, we propose a consensus classification algorithm that avoids overfitting, we investigate the performance of these two types of techniques in convolutional neural network. Early stopping allowing to save the hyper-parameters of a model at the right time. And the dropout making the learning of the model harder allowing to gain up to more than 50\% by decreasing the loss rate of the model. Copyright {\textcopyright} 2022 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.}, keywords = {Computer vision, Convolution, Convolutional neural network, Convolutional neural networks, Data overfitting, Deep learning, Deep neural networks, Dropout, Early stopping, Forecasting, Learning algorithms, Learning systems, Machine-learning, Max-pooling, Overfitting, Predictive models, Training sets}, doi = {10.5220/0011114900003179}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85140895255\&doi=10.5220\%2f0011114900003179\&partnerID=40\&md5=286b687a1791aefc7394085755e790c8}, author = {Sabiri, B. and Asri, B.E. and Rhanoui, M.} } @conference {Clero2022, title = {Monitoring Of Geotechnical Instabilities at Deep Underground Mines, Case of Draa Sfar Mine, Morocco}, booktitle = {World Congress on Civil, Structural, and Environmental Engineering}, year = {2022}, note = {cited By 0}, abstract = {The scope of this paper concerns the identification of underground geotechnical instabilities and the analysis of the rock mass monitoring data at deep underground mines, taking as a study case Draa Sfar mine in Morocco. In fact, geotechnical conditions complexity increases in the mine{\textquoteright}s deeper levels. Therefore, rock mass behaviour analysis, on-site geotechnical instrumentation and continuous monitoring of the medium are strongly required to avoid geotechnical risks. In this context, this paper focuses on presenting, first, a general state of the art about the most frequent rock mass instabilities encountered in the underground media, their classification, and their monitoring methods. In the following section, this paper provides general information about Draa Sfar mine and presents its geotechnical monitoring data analysis. At the end, conclusions about the current monitoring results and perspectives about innovative instrumentation solutions are discussed. {\textcopyright} 2022, Avestia Publishing. All rights reserved.}, doi = {10.11159/icgre22.212}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85139066071\&doi=10.11159\%2ficgre22.212\&partnerID=40\&md5=58c00b8254f4f94cb74bf2d21ae22607}, author = {Clero, K. and Ed-Diny, S. and Soror, T. and Rziki, S. and Achalhi, M. and El Fkihi, S. and Boanarijesy, A.} } @conference {Rachidi202213, title = {Network intrusion detection using Machine Learning approach}, booktitle = {ACM International Conference Proceeding Series}, year = {2022}, note = {cited By 0}, pages = {13-17}, abstract = {Today, intrusion detection has become an active research area. Due to the rapidly increasing number of intrusion variants, intrusion detection system analyses and notifies the activities of users as normal (or) anomaly. In our paper, we built a model of intrusion detection system applied to the NSL-KDD data set using different supervised classifiers such as KNN and Na{\"\i}ve Bayes. We also proposed two algorithms for multi-classification based on the Random Forest (RF) which is an ensemble classifier and KNN. Then we used the K-folds method to evaluate and validate our model. To evaluate the performances, we realized experiments on NSL-KDD data set. The result shows that the second proposed algorithm is efficient with high accuracy and time optimization. {\textcopyright} 2022 ACM.}, keywords = {Barium compounds, Classification (of information), Computer crime, data set, Decision trees, Intrusion detection, Intrusion Detection Systems, Intrusion-Detection, Machine learning, Machine learning approaches, Multi-classification, Network intrusion detection, NSL-KDD, Random forests, Research areas, Sodium compounds, Supervised classifiers}, doi = {10.1145/3551690.3551693}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85139141127\&doi=10.1145\%2f3551690.3551693\&partnerID=40\&md5=e47a5f8038487b706673543f7fdf2de4}, author = {Rachidi, Z. and Chougdali, K. and Kobbane, A. and Ben-Othman, J.} } @conference {Ba{\"\i}na202273, title = {NEW INSIGHT OF DATA MINING-BASED FRAUD DETECTION IN FINANCIAL IT-SYSTEMS}, booktitle = {Proceedings of the 15th IADIS International Conference Information Systems 2022, IS 2022}, year = {2022}, note = {cited By 0}, pages = {73-80}, abstract = {Nowadays, money exchanges are oriented to be more digitized in order to reduce personal contacts and maintain safety from the pandemic covid-19. The most important aspect of any financial institute is to be secure and protected from any suspicious action that can harm the security system and be ready for any type of fraud that can happen such as money laundering, internet frauds, credit card frauds or any other financial fraud. In this paper we present a state of the art of the newest and the most efficient strategies that help financial institutes to be well secure, more reliable, starting from a state of the art of existing ML algorithms used and ending by a benchmark of those algorithms. {\textcopyright} 2022 CURRAN-CONFERENCE. All rights reserved.}, keywords = {Credit card frauds, Crime, Data mining, Efficient strategy, Finance, Financial fraud, Financial institutes, Fraud detection, Internet fraud, IT system, Laundering, Machine learning, Machine-learning, Personal contacts, State of the art}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137716391\&partnerID=40\&md5=e93045c4bdb15afeefea2672681ef6a3}, author = {Baina, S. and Rihi, A.} } @conference {Sardi2022435, title = {A Reusable Catalog of Requirements for Gamified Mobile Health Applications}, booktitle = {International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE - Proceedings}, year = {2022}, note = {cited By 0}, pages = {435-442}, abstract = {The new era of mobile technologies has revolutionized all fundamental human pursuits in that many sectors have been reshaped and tangibly improved, such as education, finance, and healthcare. Referred to as mHealth, the use of mobile technologies to track and improve health outcomes is a rapidly expanding trend. A plethora of mobile health applications (mHealth apps) are being constantly developed thanks to the rapid adoption of mobile devices. From basic exercise trackers to powerful self-management tools, mHealth apps play several roles towards the provision of better healthcare. To induce playful experiences and boost engagement, gamification has proven to be extremely effective with mHealth apps. This paper presents a catalog of reusable requirements for gamified mHealth apps in terms of gamification, functional suitability, usability, and security, Further improvements are intended to be made continuously to the catalog by adding additional requirements scattered from other standards and information sources. Copyright {\textcopyright} 2022 by SCITEPRESS {\textendash} Science and Technology Publications, Lda. All rights reserved.}, keywords = {Biomedical engineering, Catalog, Gamification, Health outcomes, ISO/IEC, ISO/IEC 25010, Management tool, mHealth, Mobile health application, Mobile Technology, Requirement, Self management}, doi = {10.5220/0011071700003176}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85140984297\&doi=10.5220\%2f0011071700003176\&partnerID=40\&md5=dc18bd51fe840506f2a31af133df9fb2}, author = {Sardi, L. and Idri, A. and Redman, L.M. and Alami, H. and Fernandez-Aleman, J.L.} } @article {Kharbouch2022, title = {Reviewing the features and functionalities of contraception mPHRs}, journal = {Health Policy and Technology}, volume = {11}, number = {3}, year = {2022}, note = {cited By 0}, abstract = {Background and objective. Women{\textquoteright}s circumstances and preferences tend to change over times signifying that accessing and choosing a contraceptive method during their reproductive life is crucial. By preventing unintended pregnancies and reducing the need for abortion, effective contraception ensures women{\textquoteright}s well-being and autonomy, improves their social and economic role, and enables them to fully participate in society while supporting the health and development of their communities. The use of mobile applications (apps) for contraception is considered a promising approach by which to facilitate access to a reproductive health service of this nature and spread awareness about contraception. The aim of this paper is, therefore, to assess the features and functionalities of the contraception mPHRs (Mobile Personal Health Records) that are available on both the Android and iOS platforms. Methods. In order to select, extract data from and evaluate the features and functionalities of existing contraception apps, an analysis process based on the well-known Systematic Literature Review (SLR) protocol was conducted for the contraception apps that are available on both the Android and iOS app platforms. The analysis and assessment of selected apps{\textquoteright} features were performed in accordance with a twenty-seven item assessment questionnaire. The latter was developed on the basis of the scientific literature concerning contraception, and a preliminary analysis of the contraception apps currently available. Results. A total of 54 contraception apps were selected, including 38 for Android, 4 for iOS, and 12 for crossed platform apps. The results showed that only 11\% of the apps selected do support the World Health Organization{\textquoteright}s (WHO) medical eligibility criteria for contraception (MEC), and that barely 43\% provide relevant information about contraceptive methods, their efficiency, risks, and contraindications. Conclusion. This study will help users, eHealth apps providers, and developers. Users on the one hand will be able to better select the most appropriate contraceptive apps. On the other hand, both eHealth application providers and developers can thereby: (1) identify the relevant features and functionalities implemented by the top-scoring contraceptive apps, and (2) distinguish contraception-related aspects that require further efforts to be properly addressed and improved. {\textcopyright} 2022}, keywords = {awareness, contraception, Data availability, female, human, information security, medical record, Monitoring, Preferred Reporting Items for Systematic Reviews and Meta-Analyses, questionnaire, recording, reminder system, reproductive health, Review, social support, Systematic Review}, doi = {10.1016/j.hlpt.2022.100633}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85132651990\&doi=10.1016\%2fj.hlpt.2022.100633\&partnerID=40\&md5=b101e386be125c92bddf8bf212de3a39}, author = {Kharbouch, M. and Idri, A. and Fernandez-Aleman, J.L. and Redman, L. and Toval, A. and Stelate, Y.} } @article {Radouane20223507, title = {A ROBUST WATERMARKING SCHEME BASED ON DCT, IWT and SVD WITH OPTIMAL BLOCK}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {100}, number = {11}, year = {2022}, note = {cited By 0}, pages = {3507-3521}, abstract = {Signal processing{\textquoteright}s impact on development of digital media technologies have become a hot topic. The increased of computer network and the growth of the Internet have facilitated the production and distribution of unauthorized copies of multimedia information (text, image, sound, and video). To ensure multimedia security, researchers are focusing on digital image watermarking. With this new concept, the watermark is not just hiding in an image, but it{\textquoteright}s marked indelibly. In this paper a robust method of digital images watermarking based on combination of DCT, IWT and SVD is proposed. At first, Visual cryptography is used to encrypt the watermark image. Then DCT is applied to it and to the host image. IWT and SVD are applied on DCT coefficients of both watermark and host images. After that, the watermarking process is done by embedding singular values of watermark image to the singular values of host image. Moreover, the obtained watermarked images are subjected to different attacks to improve the robustness of the proposed scheme. Finally, the extraction process is based on watermarked image and the reverse method of embedding process to reconstruct the original watermark. The performance is evaluated under various attacks and experimental results show that our algorithm provides a high level of robustness and imperceptibility than the state-of-the-art methods. {\textcopyright} 2022 Little Lion Scientific.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85133519929\&partnerID=40\&md5=7957ed0e26c3399d0ba554b9a2f98aa5}, author = {Radouane, M. and Zouggari, N.I. and Amraoui, A. and Amraoui, M.} } @article {Rachih202243, title = {Simulation optimization of an inventory control model for a reverse logistics system}, journal = {Decision Science Letters}, volume = {11}, number = {1}, year = {2022}, note = {cited By 3}, pages = {43-54}, abstract = {Nowadays, companies are recognizing their primordial roles and responsibilities towards the protection of the environment and save the natural resources. They are focusing on some contemporary activities such as Reverse Logistics which is economically and environmentally viable. However, the integration of such an initiative needs flows restructuring and supply chain management in order to increase sustainability and maximize profits. Under this background, this paper addresses an inventory control model for a reverse logistics system that deals with two separated types of demand, for new products and remanufactured products, with different selling prices. The model consists of a single shared machine between production and remanufacturing operations, while the machine is subject to random failures and repairs. Three stock points respectively for returns, new products and remanufactured products are investigated. Meanwhile, in this paper, a modeling of the problem with Discrete-Event simulation using Arena{\textregistered} was conducted. Regarding the purpose of finding, a near-optimal inventory control policy that minimizes the total cost, an optimization of the model based on Tabu Search and Genetic Algorithms was established. Computational examples and sensitivity analysis were performed in order to compare the results and the robustness of each proposed algorithm. Then the results of the two methods were compared with those of OptQuest{\textregistered} optimization tool. {\textcopyright} 2022 by the authors; doi:.}, doi = {10.5267/j.dsl.2021.9.001}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85122133768\&doi=10.5267\%2fj.dsl.2021.9.001\&partnerID=40\&md5=d46c9884d1a5aa28b8b6d404febf6820}, author = {Rachih, H. and Mhada, F.Z. and Chiheb, R.} } @article {Yousfi2022, title = {Smart big data framework for insight discovery}, journal = {Journal of King Saud University - Computer and Information Sciences}, year = {2022}, note = {cited By 2}, abstract = {Big Data deal with new challenges such as data variety, data veracity (correct, incorrect, misleading, etc.) and data completeness (provide a single part of the overall information.). In fact, the knowledge discovered from a single source that can offer incorrect or incomplete data, may have a negative impact on the quality of decisions based on it. Therefore, integrating data coming from multiple sources allows verifying the veracity and ensuring the completeness of the results and thus improving the quality of analysis and enhancing business decisions. In this paper, we present a smart framework that falls within the Big Data value chain process and aims to improve the quality of analytical results by focusing two main concerns regarding Big Data Integration; data completeness and data veracity. The framework integrates Big Data in order to build a complete global and correct insight from heterogeneous sources. The paper presents two implementations of the framework in the context of urban and highway traffic management systems. {\textcopyright} 2021}, doi = {10.1016/j.jksuci.2021.12.009}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85122932927\&doi=10.1016\%2fj.jksuci.2021.12.009\&partnerID=40\&md5=16742da4bfac0205224464c7c43d3855}, author = {Yousfi, S. and Chiadmi, D. and Rhanoui, M.} } @conference {Reda2022, title = {SMDQM-Social Media Data Quality Assessment Model}, booktitle = {2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology, IRASET 2022}, year = {2022}, note = {cited By 0}, abstract = {Social media has taken a dominant place in people{\textquoteright}s lives since it become more than just a mode of communication between individuals. They regularly share their daily activities, experiences, and exchange interests and opinions on social media sites, leading to a flood of information that can be used by consumers. However, the reduced posting barriers, no operational costs and easy-to-use interactive interfaces have combined to create a variety of data quality issues in social media, making it difficult to obtain relevant, timely and accurate data. Given the increasing use of social media by users to obtain news and information first hand, they are required to filter a significant volume of data to reach the most satisfying to their request, therefore we can say that the process is more qualitative than quantitative. This paper proposes a new classification of data quality dimensions towards a social media data quality model called SMDQM(Social Media Data Quality Model), for this the quality of social media data is discussed, then we present the steps involved to create our model SMDQM. This attempt will be established by considering and discussing a state of the art in the field of social media and data quality. {\textcopyright} 2022 IEEE.}, keywords = {Assessment, Daily activity, data quality, Data quality assessment, Data quality models, Data reduction, Interactive interfaces, Quality assessment model, Quality modeling, social media, Social media datum, Social networking (online)}, doi = {10.1109/IRASET52964.2022.9738330}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85127964567\&doi=10.1109\%2fIRASET52964.2022.9738330\&partnerID=40\&md5=566d4361e0b4742bd3c69530f2eaf99f}, author = {Reda, O. and Zellou, A.} } @article {Benlakhdar20221599, title = {Statistical modeling of directional data using a robust hierarchical von mises distribution model: perspectives for wind energy}, journal = {Computational Statistics}, volume = {37}, number = {4}, year = {2022}, note = {cited By 0}, pages = {1599-1619}, abstract = {For describing wind direction, a variety of statistical distributions has been suggested that provides information about the wind regime at a particular location and aids the development of efficient wind energy generation. In this paper a systematic approach for data classification putting a special emphasis on the von Mises mixtures is presented. A von Mises mixture model is broad enough to cover, on one hand, symmetry and asymmetry, on the other hand, unimodality and multimodality of circular data. We developed an improved mathematical model of the classical von Mises mixture method, rests on number of principles which gives its internal coherence and originality. In principle, our hierarchical model of von Mises distributions is flexible to precisely modeled complex directional data sets. We define a new specific expectation{\textendash}maximization (S-EM) algorithm for estimating the parameters of the model. The simulation showed that satisfactory fit of complex directional data could be obtained (error generally < 1\%). Furthermore, the Bayesian Information Criterion is used to judge the goodness of fit and the suitability for this model versus common distributions found in the literature. The findings prove that our hierarchical model of von Mises distributions is relevant for modeling the complex directional data with several modes and/or prevailing data directions. {\textcopyright} 2021, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.}, doi = {10.1007/s00180-021-01173-5}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85122431362\&doi=10.1007\%2fs00180-021-01173-5\&partnerID=40\&md5=1983e074fcfeb1ae4f99796700245614}, author = {Benlakhdar, S. and Rziza, M. and Thami, R.O.H.} } @article {Rima202244, title = {Systematic Literature Review on Open Educational Resources Recommender Systems}, journal = {International Journal of Interactive Mobile Technologies}, volume = {16}, number = {18}, year = {2022}, note = {cited By 0}, pages = {44-77}, abstract = {In recent years, open educational resources (OER) gained in popularity among education and learning stakeholders. These resources are widely available on the internet, and recommender systems (RS) are commonly utilized to overcome the abundance of OER. This study aims to evaluate the advances in OER recommenders to identify the frequently used recommendation approaches, explore the technical background, highlight gaps in the existing research, and position our future research alongside the current studies. This paper comprises 413 papers published between 2005 and 2022. It is a systematic literature review with a deductive approach using the grounded theory technique, combining quantitative and qualitative analysis by adopting open coding (inductive and deductive) for content analysis. We employed Google Scholar as a search engine to crawl data, and findings are presented according to the (Bernard, H. Russell.2000) process. The review constitutes a reference for researchers in this field and the future developers of OER recommender systems. It reveals an emerging interest in the area; nevertheless, studies have not yet covered hybrid interactive recommendation systems, Chabot-based, teacher and course creators oriented. Further and future research is needed {\textcopyright} 2022, International Journal of Interactive Mobile Technologies.All Rights Reserved.}, doi = {10.3991/ijim.v16i18.32197}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85140018978\&doi=10.3991\%2fijim.v16i18.32197\&partnerID=40\&md5=25930ac249e8251c64164a00f3801ad1}, author = {Rima, S. and Meriem, H. and Najima, D. and Rachida, A.} } @article {L{\'o}pez-Jim{\'e}nez2021, title = {Effects of gamification on the benefits of student response systems in learning of human anatomy: Three experimental studies}, journal = {International Journal of Environmental Research and Public Health}, volume = {18}, number = {24}, year = {2021}, note = {cited By 2}, abstract = {{This paper presents three experiments to assess the impact of gamifying an audience response system on the perceptions and educational performance of students. An audience response system called SIDRA (Immediate Audience Response System in Spanish) and two audience response systems with gamification features, R-G-SIDRA (gamified SIDRA with ranking) and RB-G-SIDRA (gamified SIDRA with ranking and badges), were used in a General and Descriptive Human Anatomy course. Students participated in an empirical study. In the academic year 2019{\textendash}2020, a total of 90 students used RB-G-SIDRA, 90 students employed R-G-SIDRA in the academic year 2018{\textendash}2019, and 92 students used SIDRA in the academic year 2017{\textendash}2018. Statistically significant differences were found between final exam grades obtained by using RB-G-SIDRA and SIDRA}, keywords = {academic achievement, academic performance, anatomy, experiment, Gamification, human, Humans, learning, motivation, perception, student, Students}, doi = {10.3390/ijerph182413210}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85121118668\&doi=10.3390\%2fijerph182413210\&partnerID=40\&md5=29b9263d7b8db439936394c1f2826a10}, author = {L{\'o}pez-Jim{\'e}nez, J.J. and Fernandez-Aleman, J.L. and Garc{\'\i}a-Bern{\'a}, J.A. and Gonz{\'a}lez, L.L. and Sequeros, O.G. and Ros, J.N. and Carrillo de Gea, J.M. and Idri, A. and Toval, A.} } @article {Iazzi2021, title = {Fall detection system-based posture-recognition for indoor environments}, journal = {Journal of Imaging}, volume = {7}, number = {3}, year = {2021}, note = {cited By 7}, abstract = {The majority of the senior population lives alone at home. Falls can cause serious injuries, such as fractures or head injuries. These injuries can be an obstacle for a person to move around and normally practice his daily activities. Some of these injuries can lead to a risk of death if not handled urgently. In this paper, we propose a fall detection system for elderly people based on their postures. The postures are recognized from the human silhouette which is an advantage to preserve the privacy of the elderly. The effectiveness of our approach is demonstrated on two well-known datasets for human posture classification and three public datasets for fall detection, using a Support-Vector Machine (SVM) classifier. The experimental results show that our method can not only achieves a high fall detection rate but also a low false detection. Copyright: {\textcopyright} 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/ 4.0/).}, keywords = {Background subtraction, Classification (of information), Detection system, Fall detection, Features extraction, Head injuries, Human posture recognition, Indoor environment, Posture recognition, Serious injuries, Support vector machines, Video surveillance}, doi = {10.3390/jimaging7030042}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85104580792\&doi=10.3390\%2fjimaging7030042\&partnerID=40\&md5=cb6ec76b0560734c5d22b49662b3876b}, author = {Iazzi, A. and Rziza, M. and Haj Thami, R.O.} } @article {ElHafidy2021, title = {Gamified mobile applications for improving driving behavior: A systematic mapping study}, journal = {Mobile Information Systems}, volume = {2021}, year = {2021}, note = {cited By 4}, abstract = {Many research works and official reports approve that irresponsible driving behavior on the road is the main cause of accidents. Consequently, responsible driving behavior can significantly reduce accidents{\textquoteright} number and severity. Therefore, in the research area as well as in the industrial area, mobile technologies are widely exploited in assisting drivers in reducing accident rates and preventing accidents. For instance, several mobile apps are provided to assist drivers in improving their driving behavior. Recently and thanks to mobile cloud computing, smartphones can benefit from the computing power of servers in the cloud for executing machine learning algorithms. Therefore, many mobile applications of driving assistance and control are based on machine learning techniques to adjust their functioning automatically to driver history, context, and profile. Additionally, gamification is a key element in the design of these mobile applications that allow drivers to develop their engagement and motivation to improve their driving behavior. To have an overview concerning existing mobile apps that improve driving behavior, we have chosen to conduct a systematic mapping study about driving behavior mobile apps that exist in the most common mobile apps repositories or that were published as research works in digital libraries. In particular, we should explore their functionalities, the kinds of collected data, the used gamification elements, and the used machine learning techniques and algorithms. We have successfully identified 220 mobile apps that help to improve driving behavior. In this work, we will extract all the data that seem to be useful for the classification and analysis of the functionalities offered by these applications. {\textcopyright} 2021 Abderrahim El hafidy et al.}, keywords = {Accidents, Computing power, Digital libraries, Driving assistance, Driving behavior, Gamification, Industrial area, Industrial research, Learning algorithms, Machine learning, Machine learning techniques, Mapping, Mobile applications, Mobile cloud computing, Mobile computing, Mobile Technology, Systematic mapping studies}, doi = {10.1155/2021/6677075}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85114117887\&doi=10.1155\%2f2021\%2f6677075\&partnerID=40\&md5=6ad1b624deabb49917039716eb133f13}, author = {El Hafidy, A. and Rachad, T. and Idri, A. and Zellou, A.} } @article {Faizi2021548, title = {Higher Education Students{\textquoteright} Perceptions Towards Using Facebook as a Learning Platform}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {13117 LNCS}, year = {2021}, note = {cited By 1}, pages = {548-554}, abstract = {Given the ongoing debate among educators regarding the effect of social networks on education, our aim in this article is to explore the perceptions of students towards using Facebook as a learning environment. In this vein, on the basis of the survey we carried out among university students, it was revealed that 87.4\% of the informants resort to this Web-based community to improve their learning. Facebook has, actually, been reported to provide students with an ideal opportunity to access a plethora of learning resources and all class-related information and activities. It also allows them to discuss different topics with classmates and peers and enables them to seek help on learning problems they encounter. Despite the significant role that Facebook plays in boosting students{\textquoteright} learning experience, 72.3\% of the subjects noted that no interaction occurs with teachers on this platform. Facebook might, thus, be considered to be more useful for informal rather than formal learning. {\textcopyright} 2021, Springer Nature Switzerland AG.}, keywords = {Computer aided instruction, e-learning, Facebook, High educations, Higher education students, Learning environments, Learning platform, Learning problem, Learning resource, Online systems, Social networking (online), Student perceptions, Students, Surveys, University students, Web-based communities}, doi = {10.1007/978-3-030-91540-7_56}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85121624980\&doi=10.1007\%2f978-3-030-91540-7_56\&partnerID=40\&md5=90703fa8bfd08b30f2af977163ab4fc8}, author = {Faizi, R. and Rudneva, M.} } @conference {Ouardi2021790, title = {Hybrid Prototypical Networks Augmented by a Non-linear Classifier}, booktitle = {International Conference on Enterprise Information Systems, ICEIS - Proceedings}, volume = {1}, year = {2021}, note = {cited By 0}, pages = {790-794}, abstract = {Text classification is one of the most prolific domains in machine learning. Present in a raw format all around us in our daily life Starting from human to human communication mainly by the social networks apps, arriving at the human-machine interaction especially with chatbots, text is a rich source of information. However, despite the remarkable performances that deep learning achieves in this field, the cost in therm of the amount of data needed to train this model still considerably high, adding to that the need of retraining this model to learn every new task. Nevertheless, a new sub-field of machine learning has emerged, named meta-learning it targets the overcoming of those limitations, widely used for image-related tasks, it can also bring solutions to tasks associated with text. Starting from this perspective we proposed a hybrid architecture based on well-known prototypical networks consisting of adapting this model to text classification and augmenting it with a non-linear classifier. Copyright {\textcopyright} 2021 by SCITEPRESS {\textendash} Science and Technology Publications, Lda. All rights reserved.}, keywords = {Chatbots, Classification (of information), Daily lives, Deep learning, Few-shot learning, Human communications, Human machine interaction, Learning systems, Machine-learning, Metalearning, Nonlinear classifiers, Sources of informations, Text classification, Text processing}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137962135\&partnerID=40\&md5=8d0e3e181cd871cde23a9553ea783fb2}, author = {Ouardi, A.E. and Rhanoui, M. and Benlarabi, A. and Asri, B.E.} } @article {Kharbouch2021, title = {Mobile Technology for Improved Contraceptive Care in Morocco}, journal = {Journal of Medical Systems}, volume = {45}, number = {2}, year = {2021}, note = {cited By 0}, abstract = {The fulfillment of unmet needs for contraception can help women reach their reproductive goals. Therefore, there is a growing concern worldwide about contraception and women{\textquoteright}s knowledge of making an advised choice about it. In this aspect, an outgrown number of apps are now available providing information concerning contraception whether it concerns natural contraception or modern contraception. However, vast amounts of these apps contain inaccurate sexual health facts and non-evidence-based information concerning contraception. On these bases, and in respect to: (1) the needs of women to effectively prevent unintended pregnancies while conducting a stress-free healthy lifestyle. (2) the World Health Organization (WHO) Medical Eligibility Criteria (MEC) for contraception{\textquoteright}s recommendations, and (3) the results/recommendations of a field study conducted in the reproductive health center {\textquoteleft}Les Orangers{\textquoteright} in Rabat to collect the app{\textquoteright}s requirements, we developed an evidence-based patient-centered contraceptive app referred to as {\textquoteleft}MyContraception{\textquoteright}. Thereafter, we conducted a set of functional tests to ensure that the MyContraception solution is performing as expected and is conform to the software functional requirements previously set before moving to non-functional requirements evaluation. Since customer{\textquoteright}s feedback is valuable to non-functional testing, we choose to evaluate potential users{\textquoteright} feedback. Moreover, giving that mobile app testing is a complex process involving different skill sets, we elaborated a rigorous experimental design to conduct an empirical evaluation of the MyContraception solution, which will exhaustively assess the overall quality of this solution and examine its effects on improving the quality of patient-centered contraception care. {\textcopyright} 2021, Springer Science+Business Media, LLC, part of Springer Nature.}, keywords = {adult, Article, awareness, contraception, contraceptive agent, Contraceptive Agents, contraceptive behavior, eligibility criteria, evidence based practice center, experimental design, female, female fertility, field study, health care quality, healthy lifestyle, human, Humans, injectable contraceptive agent, long-acting reversible contraception, luteinizing hormone, menstrual cycle, Methodology, mobile application, Mobile applications, Morocco, oral contraceptive agent, patient care, pill, pregnancy, prescription, Privacy, questionnaire, reliability, reproductive health, risk factor, sexual health, technology, unplanned pregnancy, women{\textquoteright}s health, World Health Organization}, doi = {10.1007/s10916-020-01684-6}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85099086862\&doi=10.1007\%2fs10916-020-01684-6\&partnerID=40\&md5=91a540c873cdd78725ec3f6987f5b90f}, author = {Kharbouch, M. and Idri, A. and Rachad, T. and Alami, H. and Redman, L. and Stelate, Y.} } @article {Benamri2021, title = {An overview of genes and mutations associated with Chlamydiae species{\textquoteright} resistance to antibiotics}, journal = {Annals of Clinical Microbiology and Antimicrobials}, volume = {20}, number = {1}, year = {2021}, note = {cited By 4}, abstract = {Background: Chlamydiae are intracellular bacteria that cause various severe diseases in humans and animals. The common treatment for chlamydia infections are antibiotics. However, when antibiotics are misused (overuse or self-medication), this may lead to resistance of a number of chlamydia species, causing a real public health problem worldwide. Materials and methods: In the present work, a comprehensive literature search was conducted in the following databases: PubMed, Google Scholar, Cochrane Library, Science direct and Web of Science. The primary purpose is to analyse a set of data describing the genes and mutations involved in Chlamydiae resistance to antibiotic mechanisms. In addition, we proceeded to a filtration process among 704 retrieved articles, then finished by focusing on 24 studies to extract data that met our requirements. Results: The present study revealed that Chlamydia trachomatis may develop resistance to macrolides via mutations in the 23S rRNA, rplD, rplV genes, to rifamycins via mutations in the rpoB gene, to fluoroquinolones via mutations in the gyrA, parC and ygeD genes, to tetracyclines via mutations in the rpoB gene, to fosfomycin via mutations in the murA gene, to MDQA via mutations in the secY gene. Whereas, Chlamydia pneumoniae may develop resistance to rifamycins via mutations in the rpoB gene, to fluoroquinolones via mutations in the gyrA gene. Furthermore, the extracted data revealed that Chlamydia psittaci may develop resistance to aminoglycosides via mutations in the 16S rRNA and rpoB genes, to macrolides via mutations in the 23S rRNA gene. Moreover, Chlamydia suis can become resistance to tetracyclines via mutations in the tet(C) gene. In addition, Chlamydia caviae may develop resistance to macrolides via variations in the 23S rRNA gene. The associated mechanisms of resistance are generally: the inhibition of bacteria{\textquoteright}s protein synthesis, the inhibition of bacterial enzymes{\textquoteright} action and the inhibition of bacterial transcription process. Conclusion: This literature review revealed the existence of diverse mutations associated with resistance to antibiotics using molecular tools and targeting chlamydia species{\textquoteright} genes. Furthermore, these mutations were shown to be associated with different mechanisms that led to resistance. In that regards, more mutations and information can be shown by a deep investigation using the whole genome sequencing. Certainly, this can help improving to handle chlamydia infections and healthcare improvement by decreasing diseases complications and medical costs. {\textcopyright} 2021, The Author(s).}, keywords = {16S, 23S, aminoglycoside antibiotic agent, Anti-Bacterial Agents, antibiotic agent, antibiotic resistance, antiinfective agent, bacterial gene, bacterial genetics, bacterial protein, Chlamydia, Chlamydia caviae, Chlamydia Infections, Chlamydia pneumoniae, Chlamydia psittaci, Chlamydia suis, Chlamydia trachomatis, chlamydiasis, drug effect, enzyme inhibition, Fluoroquinolones, gene mutation, genetics, gyrA gene, health care cost, health care system, human, Humans, isolation and purification, macrolide, Macrolides, murA gene, mutation, nonhuman, parC gene, protein synthesis, quinoline derived antiinfective agent, quinolone derivative, Review, Ribosomal, rifamycin, Rifamycins, RNA, RNA 16S, RNA 23S, rplD gene, rplV gene, rpoB gene, secY gene, tetracycline, tetracycline derivative, Tetracyclines, whole genome sequencing, ygeD gene}, doi = {10.1186/s12941-021-00465-4}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85114291851\&doi=10.1186\%2fs12941-021-00465-4\&partnerID=40\&md5=47741d00acddab5c642ac657b207e205}, author = {Benamri, I. and Azzouzi, M. and Sanak, K. and Moussa, A. and Radouani, F.} } @conference {Remli2021328, title = {Reference Architecture for Efficient Computer Integrated Manufacturing}, booktitle = {International Conference on Enterprise Information Systems, ICEIS - Proceedings}, volume = {1}, year = {2021}, note = {cited By 0}, pages = {328-334}, abstract = {The technological progress combined with the rapidly changing customer demands are pushing for continuous changes in manufacturing environments. This led industrial companies into seeking the optimization of their processes through Computer Integrated Manufacturing (CIM). The main purpose of the latter is to link the shop floor systems to the high business layer ones. Based on a literature review that we have conducted earlier on CIM architectures, we have identified the different aspects related to CIM and detected the limitations of the existing approaches. With the aim of overcoming these limitations, we present in this paper a reference architecture for CIM based on the ISA-95 standard. We also explain how the proposed architecture was applied on a case study from the automotive industry. Copyright {\textcopyright} 2021 by SCITEPRESS {\textendash} Science and Technology Publications, Lda. All rights reserved.}, keywords = {Automotive industry, Computer integrated manufacturing, Computer-integrated manufacturing, Customer demands, Industrial companies, Manufacturing environments, Optimisations, Reference architecture, Shopfloors, Smart manufacturing, Systems architecture, Technological progress}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137946996\&partnerID=40\&md5=3dc1bfa95e09b3a460540e7f31304823}, author = {Remli, A. and Khtira, A. and El Asri, B.} } @conference {Retmi20211667, title = {Role of Digitalization in the Hospital Supply Chain Performance Improvement: Digitalization of Hospital Pharmacy}, booktitle = {Proceedings of the International Conference on Industrial Engineering and Operations Management}, year = {2021}, note = {cited By 0}, pages = {1667-1675}, abstract = {The hospital is a different supply chain made up of different structures and flows. Due to the Covid-19 pandemic, the hospital has overcome several major challenges in recent times, which have prompted it to accelerate the digitization of its supply chain to improve the quality of hospital care and services. This article looks at a specific point, that of performance in the hospital supply chain, and asks the following question: What is the role of digitalization in improving the performance of the hospital supply chain?. {\textcopyright} IEOM Society International.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85126203150\&partnerID=40\&md5=815020aadcba2907820de968a3beebd8}, author = {Retmi, K. and Tamir, M. and Ouzayd, F.} } @conference {Lahrichi2021322, title = {Toward a multimodal multitask model for neurodegenerative diseases diagnosis and progression prediction}, booktitle = {Proceedings of the 10th International Conference on Data Science, Technology and Applications, DATA 2021}, year = {2021}, note = {cited By 1}, pages = {322-328}, abstract = {Recent studies on modelling the progression of Alzheimer{\textquoteright}s disease use a single modality for their predictions while ignoring the time dimension. However, the nature of patient data is heterogeneous and time dependent which requires models that value these factors in order to achieve a reliable diagnosis, as well as making it possible to track and detect changes in the progression of patients{\textquoteright} condition at an early stage. This article overviews various categories of models used for Alzheimer{\textquoteright}s disease prediction with their respective learning methods, by establishing a comparative study of early prediction and detection Alzheimer{\textquoteright}s disease progression. Finally, a robust and precise detection model is proposed. Copyright {\textcopyright} 2021 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved}, keywords = {Alzheimer{\textquoteright}s disease, Comparative studies, Data Science, Detection models, Diagnosis, Early prediction, Forecasting, Hospital data processing, Learning methods, Learning systems, Multi-task model, Neurodegenerative diseases, Patients{\textquoteright} conditions, Time dependent}, doi = {10.5220/0010600003220328}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85111735908\&doi=10.5220\%2f0010600003220328\&partnerID=40\&md5=1f255250606020cc06dfdc4c73cc29c0}, author = {Lahrichi, S. and Rhanoui, M. and Mikram, M. and Asri, B.E.} } @conference {Oumaima2021, title = {Vision-based fall detection and prevention for the elderly people: A review ongoing research}, booktitle = {5th International Conference on Intelligent Computing in Data Sciences, ICDS 2021}, year = {2021}, note = {cited By 0}, abstract = {Falls are the most leading cause of accidental injury deaths worldwide, therefore, it poses a real challenge for the prevention of life-threatening conditions in geriatrics. The most damaged community is the ever-growing aging population. For this reason, there are considerable demands to distinguish a dangerous posture such as fall in real-time. Here we provide a literature review of conducted work on elderly fall detection and prediction mentioning the main methods to recognize human posture including computer vision-based and wearable sensor-based. We approached these perspectives: sensor fusion, Datasets, approaches proposition. In conclusion, our survey summarizes the progress achieved in the five past years to help the researchers in this field to spot areas where further effort would be beneficial and innovative. {\textcopyright} 2021 IEEE.}, keywords = {Accident prevention, Accidental injuries, Computer vision, Dataset, Elderly, Elderly people, Fall detection, Fall prediction, Fall prevention, Life threatening conditions, Sensor, Vision based, Wearable sensors}, doi = {10.1109/ICDS53782.2021.9626736}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85123493902\&doi=10.1109\%2fICDS53782.2021.9626736\&partnerID=40\&md5=c99b20a9a8a522cc9440679b23da4ceb}, author = {Oumaima, G. and Hamd, A.A. and Youness, T. and Rachid, O.H.T. and Omar, B.} } @article {Yousfi202050, title = {Comparative study of cnn and lstm for opinion mining in long text}, journal = {Journal of Automation, Mobile Robotics and Intelligent Systems}, volume = {14}, number = {3}, year = {2020}, note = {cited By 0}, pages = {50-55}, abstract = {The digital revolution has encouraged many companies to set up new strategic and operational mechanisms to supervise the flow of information published about them on the Web. Press coverage analysis is a part of sentiment analysis that allows companies to discover the opinion of the media concerning their activities, products and services. It is an important research area, since it involves the opinion of informed public such as journalists, who may influence the opinion of their readers. However, from an implementation perspective, the analysis of the opinion from media coverage encounters many challenges. In fact, unlike social networks, the Media coverage is a set of large textual documents written in natural language. The training base being huge, it is necessary to adopt large-scale processing techniques like Deep Learning to analyze their content. To guide researchers to choose between one of the most commonly used models CNN and LSTM, we compare and apply both models for opinion mining from long text documents using real datasets. {\textcopyright} 2020, Industrial Research Institute for Automation and Measurements. All rights reserved.}, doi = {10.14313/JAMRIS/3-2020/34}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85100520263\&doi=10.14313\%2fJAMRIS\%2f3-2020\%2f34\&partnerID=40\&md5=fc9c41966d823ca1951c9f01e3fa341c}, author = {Yousfi, S. and Rhanoui, M. and Mikram, M.} } @article {Karbal2020157, title = {A Comparison of Different Machine Learning Algorithms for Intrusion Detection}, journal = {Communications in Computer and Information Science}, volume = {1264}, year = {2020}, note = {cited By 0}, pages = {157-169}, abstract = {With the rapid development of the internet, intrusion detection became one of the major research problems in computer security. Many Intrusion Detection Systems (IDS) use data mining algorithms for classifying network traffic data and detecting different security violations. In this paper, we present some of the datasets and methods employed with the focus on network anomaly detection. We compare different machine learning techniques used in the latest research carried out for developing network intrusion detection systems. We also present an overview of some deep learning methodologies and their application for IDS purposes. The primary objective of this survey is to provide with a researcher, the state of the artwork already performed in this field of research. {\textcopyright} 2020, Springer Nature Switzerland AG.}, keywords = {Anomaly detection, Classification (of information), Computer crime, Data communication systems, Data mining, Data mining algorithm, Deep learning, Intrusion detection, Intrusion Detection Systems, Learning algorithms, Learning systems, Machine learning techniques, Network anomaly detection, Network intrusion detection systems, Network security, Primary objective, Research problems, Security violations}, doi = {10.1007/978-3-030-61143-9_13}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097408678\&doi=10.1007\%2f978-3-030-61143-9_13\&partnerID=40\&md5=3725b891261e386c6df84eebcbc0e514}, author = {Karbal, B. and Romadi, R.} } @article {Bachiri202036, title = {A Complete Prenatal Solution for a Reproductive Health Unit in Morocco}, journal = {Advances in Intelligent Systems and Computing}, volume = {1161 AISC}, year = {2020}, note = {cited By 0}, pages = {36-43}, abstract = {A prenatal mobile Personal Health Records (mPHR), along with an Electronic Health Records (EHR) are, respectively, exploited in order to permit both the pregnant women and gynecologists or obstetricians monitor the pregnancy progress in the best conditions. For this intent, a complete solution consisting of a prenatal mPHR and an EHR were developed for the maternity {\textquotedblleft}Les Orangers{\textquotedblright} of the Avicenne University Hospital in Rabat. The complete solution provides the main functionalities of a prenatal service. Thereafter, the solution will be validated by conducting an experiment for quality and potential assessment. Hence, a recruitment process has been determined to identify the eligibility criteria to enroll participants (pregnant women and gynecologists), in addition to planning the course of the experiment. {\textcopyright} 2020, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG.}, keywords = {Complete solutions, electronic health record, Eligibility criterion, Health, Information systems, Information use, Personal health record, Pregnant woman, Recruitment process, reproductive health}, doi = {10.1007/978-3-030-45697-9_4}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085481969\&doi=10.1007\%2f978-3-030-45697-9_4\&partnerID=40\&md5=e3d4adffd953495adbfb14b0d483c067}, author = {Bachiri, M. and Idri, A. and Rachad, T. and Alami, H. and Redman, L.M.} } @conference {Remli2020249, title = {Computer integrated manufacturing architecture: A literature review}, booktitle = {IC3K 2020 - Proceedings of the 12th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management}, volume = {3}, year = {2020}, note = {cited By 0}, pages = {249-256}, abstract = {The exponential technological revolution has had a positive impact on industrial companies, providing them with plenty of opportunities to improve their production flows and optimize their costs. This revolution has led to contemporary computer integrated manufacturing (CIM) that consists of linking the shop floor systems to the high business layer. And in order to do that, there has been some research to define a reference architecture to cover all the use cases. This paper presents a literature review of CIM architectures. The purpose of this review is to enumerate the different aspects covered by the different architectures in the literature and the approaches proposed to handle them. Copyright {\textcopyright} 2020 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.}, keywords = {Computer architecture, Computer integrated manufacturing, Industrial companies, Knowledge management, Literature reviews, Production flows, Reference architecture, Search engines, Shop floor, Technological revolution}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85107133186\&partnerID=40\&md5=5b2fbe31955f56e4cfd019808278476c}, author = {Remli, A. and Khtira, A. and Asri, B.E.} } @article {Iazzi2020247, title = {Efficient fall activity recognition by combining shape and motion features}, journal = {Computational Visual Media}, volume = {6}, number = {3}, year = {2020}, note = {cited By 2}, pages = {247-263}, abstract = {This paper presents a vision-based system for recognizing when elderly adults fall. A fall is characterized by shape deformation and high motion. We represent shape variation using three features, the aspect ratio of the bounding box, the orientation of an ellipse representing the body, and the aspect ratio of the projection histogram. For motion variation, we extract several features from three blocks corresponding to the head, center of the body, and feet using optical flow. For each block, we compute the speed and the direction of motion. Each activity is represented by a feature vector constructed from variations in shape and motion features for a set of frames. A support vector machine is used to classify fall and non-fall activities. Experiments on three different datasets show the effectiveness of our proposed method. {\textcopyright} 2020, The Author(s).}, keywords = {Activity recognition, Aspect ratio, Direction of motion, Feature vectors, Motion variation, Optical flows, Projection histograms, Shape deformation, Shape variations, Support vector machines, Vision based system}, doi = {10.1007/s41095-020-0183-7}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85090864771\&doi=10.1007\%2fs41095-020-0183-7\&partnerID=40\&md5=21fcdf876b091c6b30486427e7cd9bff}, author = {Iazzi, A. and Rziza, M. and Thami, R.O.H.} } @article {Sardi2020931, title = {Gamified e-Health Solution to Promote Postnatal Care in Morocco}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {12252 LNCS}, year = {2020}, note = {cited By 0}, pages = {931-946}, abstract = {The postnatal period is a critical phase in both the lives of the mothers and the newborns. Due to all the inherent changes that occur during this period, quality care is crucial during this period to enhance the wellbeing of the mothers and the newborns. In Morocco, the neglection of postnatal care services are often associated to poor communication, financial difficulties and cultural barriers. Mobile technology constitutes therefore a promising approach to bridge this gap and promote postnatal care. In order to improve the effectiveness of mobile technology, gamification has become a powerful feature to boost motivation and induce fun and interactivity into the mobile solutions{\textquoteright} tasks. Based on a previous review on mobile applications for postnatal care available in app repositories, a set of requirements have been identified to build a comprehensive mobile solution that cater the needs of both the mothers and the newborns. These requirements have, then, been enriched with real needs elicited at maternity Les orangers that belongs to the University Hospital Avicenne of Rabat. Along with the functional and non-functional requirements, gamification aspects have been also analyzed. After the analysis and design phases, a pilot version of the solution called {\textquoteleft}Mamma\&Baby{\textquoteright} has been implemented using android framework. {\textquoteleft}Mamma\&Baby{\textquoteright} is a mobile solution dedicated to assist new mothers during their postnatal period. As future work, it is expected to fully integrate the gamification elements into the solution and conduct an empirical evaluation of the overall quality and the potential of the solution with real puerperal women. {\textcopyright} 2020, Springer Nature Switzerland AG.}, keywords = {E-health solutions, Empirical evaluations, Financial difficulties, Gamification, Mobile applications, Mobile solutions, Mobile Technology, Non-functional requirements, Overall quality, Quality control, Telecommunication equipment}, doi = {10.1007/978-3-030-58811-3_66}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85092252943\&doi=10.1007\%2f978-3-030-58811-3_66\&partnerID=40\&md5=2a3490959b88f98611929a0ad0efd78b}, author = {Sardi, L. and Idri, A. and Rachad, T. and Redman, L. and Alami, H.} } @article {RHANOUI2020, title = {A hybrid recommender system for patron driven library acquisition and weeding}, journal = {Journal of King Saud University - Computer and Information Sciences}, year = {2020}, abstract = {Nowadays the explosion of information sources has shaped how library users access information and provide feedback on their preferences. Therefore, faced with this explosion and the blossoming of digital libraries, modern libraries must take up the challenge of meeting the needs of their users and considering their opinions and preferences in order to offer them adequate resources and henceforth eliminate those that are unsatisfactory. Almost all library recommender systems aim to provide users with items of interest to them. However, despite its definite interest, the staff-oriented adaptation and application of this revolutionary technique to the collection development process is still in an embryonic stage. We propose a patron-driven hybrid library recommender system that uses machine learning techniques to recommend and assist in the acquisition and weeding decision-making operations by extracting and analyzing users{\textquoteright} opinions and ratings. The recommender system is applied and validated in a real national library case using Amazon{\textquoteright}s digital library and the library{\textquoteright}s catalog as a data source.}, keywords = {Acquisition, Library Management, Machine learning, Recommender Systems, Weeding}, issn = {1319-1578}, doi = {https://doi.org/10.1016/j.jksuci.2020.10.017}, url = {https://www.sciencedirect.com/science/article/pii/S1319157820305103}, author = {Maryem Rhanoui and Mounia Mikram and Siham Yousfi and Ayoub Kasmi and Naoufel Zoubeidi} } @article {Rachad2020, title = {Intelligent Mobile Applications: A Systematic Mapping Study}, journal = {Mobile Information Systems}, volume = {2020}, year = {2020}, note = {cited By 3}, abstract = {Smart mobiles as the most affordable and practical ubiquitous devices participate heavily in the enhancement of our daily life by the use of many convenient applications. However, the significant number of mobile users in addition to their heterogeneity (different profiles and contexts) obligates developers to enhance the quality of their apps by making them more intelligent and more flexible. This is realized mainly by analyzing mobile user{\textquoteright}s data. Machine learning (ML) technology provides the methodology and techniques needed to extract knowledge from data to facilitate decision-making. Therefore, both developers and researchers affirm the benefits of combining ML techniques and mobile technology in several application fields as e-health, e-learning, e-commerce, and e-coaching. Thus, the purpose of this paper is to have an overview of the use of ML techniques in the design and development of mobile applications. Therefore, we performed a systematic mapping study of papers published on this subject in the period between 1 January 2007 and 31 December 2019. A total number of 71 papers were selected, studied, and analyzed according to the following criteria, year, sources and channel of publication, research type, and methods, kind of collected data, and finally adopted ML models, tasks, and techniques. {\textcopyright} 2020 Taoufik Rachad and Ali Idri.}, keywords = {Application fields, Decision making, Design and Development, Mapping, Methodology and techniques, Mobile applications, Mobile commerce, Mobile computing, Mobile Technology, Mobile users, Systematic mapping studies, Ubiquitous devices}, doi = {10.1155/2020/6715363}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85083095554\&doi=10.1155\%2f2020\%2f6715363\&partnerID=40\&md5=d474ab3cece2179d34f54fa7087a4cfb}, author = {Rachad, T. and Idri, A.} } @article {Sanak2020203, title = {MARCO Gene Variations and Their Association with Cardiovascular Diseases Development: An In-Silico Analysis}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {12108 LNBI}, year = {2020}, note = {cited By 0}, pages = {203-212}, abstract = {Cardiovascular diseases (CVDs) represent the leading cause of morbidity and mortality in both developed and developing countries. They have complex etiology, influenced by several risk factors including the genetic component. The genetic variations were shown to be highly associated with different CVD forms, in this objective we proceeded to analyze the Macrophage Receptor with Collagen structure gene (MARCO), we performed an in-silico study with a genomic functional analysis, to evaluate the mutations{\textquoteright} effects on the proteins{\textquoteright} structures and functionalities. Indeed, we used dbSNP to retrieve single nucleotide polymorphisms (SNPs) of MARCO gene. We proceeded then to a filtration and a stability analysis using several bioinformatics tools to evaluate the most deleterious variations. Moreover we predicted the 3D structures of the encoded proteins by MARCO gene, which was validated using PROCHECK. Then we analyzed and visualize the proteins{\textquoteright} 3D structures. The extraction of the human MARCO gene SNPs revealed that dbSNP contains more than 14000 SNPs. The filtration process revealed the variations G241V and G262W to be the most deleterious SNPs, indeed, I-Mutant and DUET showed decreased protein stability. The validation using PROCHECK revealed a total of 89.9\% MARCO protein residues to be in the favored region. As conclusion, our results let suggesting that G241V and G262W variations can cause alteration in the proteins{\textquoteright} structures and functions. Hence, to improve the health management, screening precariously these variants, can be useful as model for CVD diagnosis and helpful in pharmacogenomics. {\textcopyright} Springer Nature Switzerland AG 2020.}, keywords = {Bioinformatics, Bioinformatics tools, Biomedical engineering, Cardio-vascular disease, Cardiology, Collagen structure, Developing countries, Diagnosis, Diseases, Filtration process, Genes, Genetic components, Genetic variation, Health management, Proteins, Single nucleotide polymorphisms}, doi = {10.1007/978-3-030-45385-5_19}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085196738\&doi=10.1007\%2f978-3-030-45385-5_19\&partnerID=40\&md5=1df531cdc3510e8747834a13a996b1b1}, author = {Sanak, K. and Azzouzi, M. and Abik, M. and Radouani, F.} } @article {Sardi2020, title = {Mobile health applications for postnatal care: Review and analysis of functionalities and technical features}, journal = {Computer Methods and Programs in Biomedicine}, volume = {184}, year = {2020}, note = {cited By 19}, abstract = {Background: Providing a continuum of care from antenatal, childbirth and postnatal period results in reduced maternal and neonatal morbidity and mortality. Timely, high quality postnatal care is crucial for maximizing maternal and newborn health. In this vein, the use of postnatal mobile applications constitutes a promising strategy. Methods: A Systematic Literature Review (SLR) protocol was adopted to perform the selection, data extraction and functional evaluation of the available postnatal apps on iOS and Android platforms. The analysis of the functionalities and technical features of the apps selected was performed according to a 37-items assessment questionnaire developed on the basis of the scientific literature of postnatal care and a preliminary analysis of available postnatal apps Results: A total of 48 postnatal apps were retrieved from the app repositories of the iOS and Android platforms. The results of the functional content analysis show that the postnatal apps selected relatively achieved low scores owing to the complexity and the ramification of the postnatal care. Conclusions: The present study helps in identifying areas related to the postnatal care that require further endeavors to be properly addressed. It also provides directions for developers to leverage the advancement and innovation on mobile technology to build complete and well-suited postnatal apps {\textcopyright} 2019}, keywords = {Android (operating system), Application programs, Article, childbirth, content analysis, data extraction, evaluation study, female, Functional evaluation, Functionality, human, Humans, Infant, iOS (operating system), mHealth, mobile application, Mobile applications, Mobile health application, newborn, newborn morbidity, perinatal period, Postnatal care, Postpartum Period, pregnancy, Preliminary analysis, procedures, puerperium, questionnaire, Scientific literature, Systematic literature review (SLR), Systematic Review, telemedicine}, doi = {10.1016/j.cmpb.2019.105114}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85073719026\&doi=10.1016\%2fj.cmpb.2019.105114\&partnerID=40\&md5=df137ca63d506f88c53e16c63f3e0c65}, author = {Sardi, L. and Idri, A. and Readman, L.M. and Alami, H. and Bezad, R. and Fernandez-Aleman, J.L.} } @article {SARDI2020105114, title = {Mobile health applications for postnatal care: Review and analysis of functionalities and technical features}, journal = {Computer Methods and Programs in Biomedicine}, volume = {184}, year = {2020}, pages = {105114}, abstract = {Background Providing a continuum of care from antenatal, childbirth and postnatal period results in reduced maternal and neonatal morbidity and mortality. Timely, high quality postnatal care is crucial for maximizing maternal and newborn health. In this vein, the use of postnatal mobile applications constitutes a promising strategy. Methods A Systematic Literature Review (SLR) protocol was adopted to perform the selection, data extraction and functional evaluation of the available postnatal apps on iOS and Android platforms. The analysis of the functionalities and technical features of the apps selected was performed according to a 37-items assessment questionnaire developed on the basis of the scientific literature of postnatal care and a preliminary analysis of available postnatal apps Results A total of 48 postnatal apps were retrieved from the app repositories of the iOS and Android platforms. The results of the functional content analysis show that the postnatal apps selected relatively achieved low scores owing to the complexity and the ramification of the postnatal care. Conclusions The present study helps in identifying areas related to the postnatal care that require further endeavors to be properly addressed. It also provides directions for developers to leverage the advancement and innovation on mobile technology to build complete and well-suited postnatal apps}, keywords = {Apps, Functionality, Mobile health, Postnatal care}, issn = {0169-2607}, doi = {https://doi.org/10.1016/j.cmpb.2019.105114}, url = {https://www.sciencedirect.com/science/article/pii/S0169260719304559}, author = {Lamyae Sardi and Ali Idri and Leanne M. Redman and Hassan Alami and Rachid Bezad and Jos{\'e} Luis Fern{\'a}ndez-Alem{\'a}n} } @article {Kharbouch202086, title = {MyContraception: An Evidence-Based Contraception mPHR for Better Contraceptive Fit}, journal = {Advances in Intelligent Systems and Computing}, volume = {1161 AISC}, year = {2020}, note = {cited By 1}, pages = {86-94}, abstract = {The fulfillment of unmet needs for contraception can help women reach their reproductive goals. It was proven to have a significant impact on reducing the rates of unintended pregnancies, and thereby cut the number of morbidity and mortality resulting from these pregnancies, and improving the lives of women and children in general. Therefore, there is a growing concern worldwide about contraception and women{\textquoteright}s knowledge of making an advised-choice about it. In this aspect, an outgrown number of apps are now available providing clinical resources, digital guides, or educational information concerning contraception whether it concerns natural contraception or modern contraception. However, vast amounts of these apps contain inaccurate sexual health facts and non-evidence based information concerning contraception. On these bases, and in respect to the needs of women to effectively prevent unintended pregnancies while conducting a stress-free healthy lifestyle, the World Health Organization (WHO) Medical Eligibility Criteria (MEC) for contraception{\textquoteright}s recommendations, and the results and recommendations of a field study conducted in the reproductive health center Les Oranges in Rabat to collect the app{\textquoteright}s requirements, we developed an Android app named {\textquoteleft}MyContraception{\textquoteright}. Our solution is an evidence-based patient-centered contraceptive app that has been developed in an attempt to facilitate: (1) Seeking evidence-based information along with recommendations concerning the best contraceptive fit (according to one{\textquoteright}s medical characteristics, preferences and priorities) helping users make informed decisions about their contraceptive choices. (2) Monitoring one{\textquoteright}s own menstrual cycle, fertility window, contraceptive methods usage, and the correlation between these different elements and everyday symptoms in one app. (3) Keeping record of one{\textquoteright}s family medical history, medical appointments, analyses, diagnoses, procedures and notes within the same app. In future work, conducting an empirical evaluation of MyContraception solution is intended, to exhaustively examine the effects of this solution in improving the quality of patient-centered contraception care. {\textcopyright} 2020, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG.}, keywords = {Clinical resources, Diagnosis, Eligibility criterion, Empirical evaluations, Healthy lifestyles, Information concerning, Information systems, Information use, Informed decision, Obstetrics, reproductive health, World Health Organization}, doi = {10.1007/978-3-030-45697-9_9}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085491736\&doi=10.1007\%2f978-3-030-45697-9_9\&partnerID=40\&md5=18f9987c1855619561fe9cc080957ade}, author = {Kharbouch, M. and Idri, A. and Rachad, T. and Alami, H. and Redman, L. and Stelate, Y.} } @conference {Razouk2020, title = {New approach for solving the internal truck containers transfert problem}, booktitle = {Proceedings - 2020 5th International Conference on Logistics Operations Management, GOL 2020}, year = {2020}, note = {cited By 0}, abstract = {International maritime transport has becoming an important and interesting way comparing to the land and the rail transport. This improvement have mainly reduced the travel time and the expected delivery time, except sometimes in difficult weather conditions where actual times may be slightly longer than expected. Containers terminals are considered as an interface between different maritime actors: ship owner, freight forwarder, consignee, containers terminal and port authority. In this paper, we focus our work on a part of the marine transportation, which is the transfer of containers by internal trucks inside a containers terminal. We solve this problem by proposing a new mathematical model and new resolution methods, the obtained results prove the effectiveness of the proposed approach, which help to improve the port efficiency. {\textcopyright} 2020 IEEE.}, keywords = {Containers, Freight forwarders, Marine transportation, Maritime transport, New mathematical model, Port authorities, Port efficiency, Rail transport, Resolution methods, Travel time, Trucks, Waterway transportation}, doi = {10.1109/GOL49479.2020.9314736}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85100172721\&doi=10.1109\%2fGOL49479.2020.9314736\&partnerID=40\&md5=d68f021c8823c097541b215b8fd58eaf}, author = {Razouk, C. and Benadada, Y. and Boukachour, J.} } @article {Benlakhdar20201659, title = {A robust model using SIFT and gamma mixture model for texture images classification: Perspectives for medical applications}, journal = {Biomedical and Pharmacology Journal}, volume = {13}, number = {4}, year = {2020}, note = {cited By 0}, pages = {1659-1669}, abstract = {The texture analysis of medical images is a powerful calculation tool for the discrimination between pathological and healthy tissue in different organs in medical images. Our paper proposes a novel approach named, GGD-GMM, based on statistical modeling in wavelet domain to describe texture images. Firstly, we propose a robust algorithm based on the combination of the wavelet transform and Scale Invariant Feature Transform (SIFT). Secondly, we implement the aforementioned algorithm and fit the result by using the finite Gamma Mixture Model (GMM). The results, obtained for two benchmark datasets, show that our proposed algorithm has a good relevance as it provides higher classification accuracy compared to some other well known models. Moreover, it displays others advantages relied to Noise-resistant and rotation invariant. Our algorithm could be useful for the analysis of several medical issues. {\textcopyright} 2020 This is an Open Access article licensed under a Creative Commons license: Attribution 4.0 International (CC-BY). Published by Oriental Scientific Publishing Company}, keywords = {Article, curvelet transform, human, human experiment, noise, rotation, scale invariant feature transform}, doi = {10.13005/BPJ/2041}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85100517546\&doi=10.13005\%2fBPJ\%2f2041\&partnerID=40\&md5=8997e98fae845d62807a15ca1c749766}, author = {Benlakhdar, S. and Rziza, M. and Thami, R.O.H.} } @conference {Rabia2020, title = {Simulation as a decision-making tool in a business analytics environment}, booktitle = {Proceedings - 2020 5th International Conference on Logistics Operations Management, GOL 2020}, year = {2020}, note = {cited By 0}, abstract = {Nowadays, Business Intelligence (BI) plays a key role in the decision-making chain because of what it offers in terms of data availability, structuring, analysis and presentation in the form of dashboards or Key Performance Indicators (KPI) to assist decision-making. Despite its advantages in terms of historicizing the company{\textquoteright}s activity, traditional BI tools do not allow us to project our business into the future and evaluate the impact of a decision on the entire activity of a company. Given this consideration, What-if analysis positions itself as a data-intensive simulation to examine the impact of a decision. In this article, we intend to highlight the role that simulation techniques can play in prescriptive analysis. Then, we present the different architectures that combine the use of simulation in an analytical environment. Finally, we also provide an idea of the future perspectives and challenges in simulation-based analytics. {\textcopyright} 2020 IEEE.}, keywords = {Advanced Analytics, Benchmarking, Business analytics, Data availability, Data intensive, Decision making, Decision making tool, Future perspectives, Key performance indicators, Simulation technique, What-if Analysis}, doi = {10.1109/GOL49479.2020.9314725}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85100164050\&doi=10.1109\%2fGOL49479.2020.9314725\&partnerID=40\&md5=03afaf905e87539e719dc12b27acd09d}, author = {Rabia, M.A.B. and Bellabdaoui, A.} } @article {Kharbouch2020894, title = {Software Requirement Catalog on Acceptability, Usability, Internationalization and Sustainability for Contraception mPHRs}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {12252 LNCS}, year = {2020}, note = {cited By 0}, pages = {894-905}, abstract = {Contraception Mobile Personal Health Records (mPHRs) are efficient mobile health applications (apps) to increase awareness about fertility and contraception and to allow women to access, track, manage, and share their health data with healthcare providers. This paper aims to develop a requirements catalog, according to standards, guidelines, and relevant literature to e-health technology and psychology. The requirements covered by this catalog are Acceptability, Usability, Sustainability, and Internationalization (i18n). This catalog can be very useful for developing, evaluating, and auditing contraceptive apps, as well as helping stakeholders and developers identify potential requirements for their mPHRs to improve them. {\textcopyright} 2020, Springer Nature Switzerland AG.}, keywords = {Health, Health care providers, Health data, Mobile health application, Personal health record, Software requirements, Sustainable development}, doi = {10.1007/978-3-030-58811-3_63}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85092222585\&doi=10.1007\%2f978-3-030-58811-3_63\&partnerID=40\&md5=119f051c4582d8079abdb813399d89d1}, author = {Kharbouch, M. and Idri, A. and Redman, L. and Alami, H. and Fernandez-Aleman, J.L. and Toval, A.} } @article {Maryame2020441, title = {State of the Art of Deep Learning Applications in Sentiment Analysis: Psychological Behavior Prediction}, journal = {Advances in Intelligent Systems and Computing}, volume = {1076}, year = {2020}, note = {cited By 3}, pages = {441-451}, abstract = {With the explosion of web 2.0, we are witnessing a sharp increase in Internet users such as a vertiginous evolution of social media. These media constitute a source of rich and varied information for researchers in sentiment analyses. This paper describes a tool for sifting through and synthesizing reviews by identifying the main deep learning techniques applied for sentiment analysis especially when it comes to psychological behavior prediction. {\textcopyright} Springer Nature Singapore Pte Ltd. 2020.}, keywords = {Behavior prediction, Behavioral research, Deep learning, Embedded systems, Internet users, Learning techniques, Sentiment analysis, Sharp increase, social media, State of the art, Web 2.0}, doi = {10.1007/978-981-15-0947-6_42}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085169691\&doi=10.1007\%2f978-981-15-0947-6_42\&partnerID=40\&md5=dcac33ec68694f08b6258ea4a477f755}, author = {Maryame, N. and Najima, D. and Hasnae, R. and Rachida, A.} } @conference {Reda202091, title = {Towards a data quality assessment in big data}, booktitle = {ACM International Conference Proceeding Series}, year = {2020}, note = {cited By 4}, pages = {91-96}, abstract = {In recent years, as more and more data sources have become available and the volumes of data potentially accessible have increased, the assessment of data quality has taken a central role whether at the academic, professional or any other sector. Given that users are often concerned with the need to filter a large amount of data to better satisfy their requirements and needs, and that data analysis can be based on inaccurate, incomplete, ambiguous, duplicated and of poor quality, it makes everyone wonder what the results of these analyses will really be like. However, there is a very complex process involved in the identification of new, valid, potentially useful and meaningful data from a large data collection and various information systems, and is critically dependent on a number of measures to be developed to ensure data quality. To this end, the main objective of this paper is to introduce a general study on data quality related with big data, by providing what other researchers came up with on that subject. The paper will be finalized by a comparative study between the different existing data quality models. {\textcopyright} 2020 ACM.}, keywords = {Big data, Comparative studies, Complex Processes, data quality, Data quality assessment, Data quality models, Data reduction, Data-sources, Intelligent systems, Large amounts, Large data}, doi = {10.1145/3419604.3419803}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096426287\&doi=10.1145\%2f3419604.3419803\&partnerID=40\&md5=7542ef0e44f4d94b808c64ce466a5eca}, author = {Reda, O. and Sassi, I. and Zellou, A. and Anter, S.} } @article {Mikram202071, title = {Unit load devices (Uld) demand forecasting in the air cargo fooptimal cost management}, journal = {Journal of Automation, Mobile Robotics and Intelligent Systems}, volume = {14}, number = {3}, year = {2020}, note = {cited By 0}, pages = {71-80}, abstract = {In recent decades, the airline industry has become very competitive. With the advent of large aircraft in service, unit load devices (ULD) have become an essential element for efficient air transport. They can load a large amount of baggage, cargo or mail using only one unit. Since this results in fewer units to load, saving time and efforts of ground crews and helping to avoid delayed flights. However, a deficient loading of the units causes operating irregularities, costing the company and contributing to the dissatisfaction of the customers. In contrast, an excess load of containers is at the expense of cargo. In this paper we propose an approach to predict the demand for baggage in order to optimize the management of its ULD flow. Specifically, we build prediction models: ARIMA following the BOX-JENKINS approach and exponential smoothing methods, in order to obtain more accurate forecasts. The approach is tested using the operational data of flight processing and the results are compared with four benchmark method (SES, DES, Holt-Winters and Naive prediction) using different performance indicators: MAE, MSE, MAPE, WAPE, RMSE, SMPE. The results obtained with the exponential smoothing methods surpass the benchmarks by providing more accurate forecasts. {\textcopyright} 2020, Industrial Research Institute for Automation and Measurements. All rights reserved.}, doi = {10.14313/JAMRIS/3-2020/37}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85100524740\&doi=10.14313\%2fJAMRIS\%2f3-2020\%2f37\&partnerID=40\&md5=2a7b355fdf9b83161cf3d7a9c85f19b8}, author = {Mikram, M. and Rhanoui, M. and Yousfi, S. and Briwa, H.} } @article {Razouk2019137, title = {Adapted Bin-Packing Algorithm for the Yard Optimization Problem}, journal = {Studies in Computational Intelligence}, volume = {774}, year = {2019}, note = {cited By 0}, pages = {137-152}, doi = {10.1007/978-3-319-95104-1_9}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053038995\&doi=10.1007\%2f978-3-319-95104-1_9\&partnerID=40\&md5=b1986e4ea5ae05f20b92c72d4cc55fac}, author = {Razouk, C. and Benadada, Y. and Boukachour, J.} } @conference {ElOuahabi2019, title = {Bandwidth Enhancement of Complementary Split Ring Based Antenna}, booktitle = {International Symposium on Advanced Electrical and Communication Technologies, ISAECT 2018 - Proceedings}, year = {2019}, note = {cited By 0}, doi = {10.1109/ISAECT.2018.8618820}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062440605\&doi=10.1109\%2fISAECT.2018.8618820\&partnerID=40\&md5=40529d3f58aa8740187c10d6c4f1f5f5}, author = {El Ouahabi, K. and Roky, K. and El Mrabet, O. and Aznabet, M. and Ennasar, M.A.} } @conference {Haddad2019, title = {Efficient Stacked Cylindrical Dielectric Resonator Antenna for Anticollision Short Range Radar at 79GHz}, booktitle = {International Symposium on Advanced Electrical and Communication Technologies, ISAECT 2018 - Proceedings}, year = {2019}, note = {cited By 0}, doi = {10.1109/ISAECT.2018.8618833}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062468314\&doi=10.1109\%2fISAECT.2018.8618833\&partnerID=40\&md5=0e4f2684dccbbbf03196e55a1fa16de3}, author = {Haddad, A. and Aoutoul, M. and Rais, K. and Faqir, M. and Essaaidi, M. and Lakssir, B. and Moukhtafi, F.E. and Jouali, R.} } @article {Rachih201945, title = {Meta-heuristics for reverse logistics: A literature review and perspectives}, journal = {Computers and Industrial Engineering}, volume = {127}, year = {2019}, note = {cited By 0}, pages = {45-62}, doi = {10.1016/j.cie.2018.11.058}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85057829016\&doi=10.1016\%2fj.cie.2018.11.058\&partnerID=40\&md5=f54213def0a5cf5c548b7574f8063804}, author = {Rachih, H. and Mhada, F.Z. and Chiheb, R.} } @article {Yousfi201979, title = {Mixed-Profiling Recommender Systems for Big Data Environment}, journal = {Advances in Intelligent Systems and Computing}, volume = {756}, year = {2019}, note = {cited By 0}, pages = {79-89}, doi = {10.1007/978-3-319-91337-7_8}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85047301457\&doi=10.1007\%2f978-3-319-91337-7_8\&partnerID=40\&md5=95ad0c9dc701ce47a8fefa5d66452387}, author = {Yousfi, S. and Rhanoui, M. and Chiadmi, D.} } @article {Rkizat2019168, title = {A New Quasi-Cyclic Majority Logic Codes Constructed from Disjoint Difference Sets by Genetic Algorithm}, journal = {Advances in Intelligent Systems and Computing}, volume = {756}, year = {2019}, note = {cited By 0}, pages = {168-177}, doi = {10.1007/978-3-319-91337-7_16}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85047321606\&doi=10.1007\%2f978-3-319-91337-7_16\&partnerID=40\&md5=c0583078d7ef801071c2f7c605348789}, author = {Rkizat, K. and Nouh, S. and Lahmer, M. and Belkasmi, M.} } @article {Yousfi2019207, title = {Towards a generic multimodal architecture for batch and streaming Big Data integration}, journal = {Journal of Computer Science}, volume = {15}, number = {1}, year = {2019}, note = {cited By 0}, pages = {207-220}, doi = {10.3844/jcssp.2019.207.220}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85061562274\&doi=10.3844\%2fjcssp.2019.207.220\&partnerID=40\&md5=5e332b31353f824de4847e4a59a0d84a}, author = {Yousfi, S. and Rhanoui, M. and Chiadmi, D.} } @article {Almorabeti2018508, title = {2X2 circular polarized antenna array for RF energy harvesting system to a UAV}, journal = {International Journal of Microwave and Optical Technology}, volume = {13}, number = {6}, year = {2018}, pages = {508-516}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85057379019\&partnerID=40\&md5=9520b64bbb9f545c406e032984728a7c}, author = {Almorabeti, S. and Rifi, M. and Terchoune, H. and Tizyi, H. and Afyf, A. and Latrach, M.} } @article {Rezzouqi20181145, title = {Analyzing the accuracy of historical average for urban traffic forecasting using google maps}, journal = {Advances in Intelligent Systems and Computing}, volume = {868}, year = {2018}, pages = {1145-1156}, doi = {10.1007/978-3-030-01054-6_79}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85057079293\&doi=10.1007\%2f978-3-030-01054-6_79\&partnerID=40\&md5=5c985c898807cd5eb68ed52c62ea6335}, author = {Rezzouqi, H. and Gryech, I. and Sbihi, N. and Ghogho, M. and Benbrahim, H.} } @article {Hassen2018, title = {Assessment of genetic diversity and bioremediation potential of pseudomonads isolated from pesticide-contaminated artichoke farm soils}, journal = {3 Biotech}, volume = {8}, number = {6}, year = {2018}, doi = {10.1007/s13205-018-1256-5}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85047222547\&doi=10.1007\%2fs13205-018-1256-5\&partnerID=40\&md5=214af9fe1c89045eedc77e9e648d892e}, author = {Hassen, W. and Neifar, M. and Cherif, H. and Mahjoubi, M. and Souissi, Y. and Raddadi, N. and Fava, F. and Cherif, A.} } @conference {Melaouene20181, title = {A cloud-based RFID for VANET access filtering}, booktitle = {Proceedings of 2017 International Conference of Cloud Computing Technologies and Applications, CloudTech 2017}, volume = {2018-January}, year = {2018}, pages = {1-6}, doi = {10.1109/CloudTech.2017.8284709}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046655464\&doi=10.1109\%2fCloudTech.2017.8284709\&partnerID=40\&md5=4f425d897a5aec1ca99f40c3d813a294}, author = {Melaouene, N. and Elmakfalji, C. and Romadi, R.} } @article {Badidi2018369, title = {A DaaS Based Framework for IoT Data Provisioning}, journal = {Advances in Intelligent Systems and Computing}, volume = {661}, year = {2018}, pages = {369-379}, doi = {10.1007/978-3-319-67618-0_34}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85029599349\&doi=10.1007\%2f978-3-319-67618-0_34\&partnerID=40\&md5=e76f069dc00af29313bd86f85b4adfb8}, author = {Badidi, E. and Routaib, H.} } @article {Badidi2018369, title = {A DaaS Based Framework for IoT Data Provisioning}, journal = {Advances in Intelligent Systems and Computing}, volume = {661}, year = {2018}, note = {cited By 0}, pages = {369-379}, abstract = {As a result of the remarkable advances in sensing and digital communication technologies, massive amounts of data are generated by Internet of Things (IoT) devices. In this paper, we propose a framework for data provisioning that relies on the Data-as-a-Service (DaaS) cloud delivery model. IoT Data is processed and aggregated at the edge of where it is generated, then, it is stored in the cloud. Since smart connected devices are proliferating at an unprecedented pace, we anticipate that the number of DaaS providers will also grow at the same rate. Therefore, data consumers will seek to find suitable DaaS providers that can provide them with high-quality data. DaaS Brokers will emerge to mediate between data providers and data consumers and help data consumers find appropriate DaaS providers using different ranking algorithms. We propose an algorithm to evaluate the offers of potential DaaS providers based on the quality-of-data (QoD) requirements of the data consumer and using fitness functions associated with each QoD dimension. {\textcopyright} 2018, Springer International Publishing AG.}, doi = {10.1007/978-3-319-67618-0_34}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85029599349\&doi=10.1007\%2f978-3-319-67618-0_34\&partnerID=40\&md5=e76f069dc00af29313bd86f85b4adfb8}, author = {Badidi, E. and Routaib, H.} } @article {Haddad201812, title = {Design of high gain novel dielectric resonator antenna array for 24 GHz short range radar systems}, journal = {Advanced Electromagnetics}, volume = {7}, number = {4}, year = {2018}, pages = {12-18}, doi = {10.7716/aem.v7i4.874}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85052828658\&doi=10.7716\%2faem.v7i4.874\&partnerID=40\&md5=f03b09d177b785f22ce0d744b8db6f72}, author = {Haddad, A. and Aoutoul, M. and Rais, K. and Essaaidi, M. and Faqir, M. and Bouya, M.} } @conference {Iazzi20181, title = {Fall detection based on posture analysis and support vector machine}, booktitle = {2018 4th International Conference on Advanced Technologies for Signal and Image Processing, ATSIP 2018}, year = {2018}, pages = {1-6}, doi = {10.1109/ATSIP.2018.8364462}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85048484597\&doi=10.1109\%2fATSIP.2018.8364462\&partnerID=40\&md5=d873ad85d14aac2034c2de8077860920}, author = {Iazzi, A. and Rziza, M. and Thami, R.O.H.} } @conference {Riane20181, title = {A graph-based approach for composite infrastructure service deployment in multi-cloud environment}, booktitle = {Proceedings - 2018 International Conference on Advanced Communication Technologies and Networking, CommNet 2018}, year = {2018}, pages = {1-7}, doi = {10.1109/COMMNET.2018.8360254}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85048314837\&doi=10.1109\%2fCOMMNET.2018.8360254\&partnerID=40\&md5=2b424ac7a7629c17066d7393e375e846}, author = {Riane, D. and Ettalbi, A.} } @conference {Houari20181, title = {Hybrid big data warehouse for on-demand decision needs}, booktitle = {Proceedings of 2017 International Conference on Electrical and Information Technologies, ICEIT 2017}, volume = {2018-January}, year = {2018}, pages = {1-6}, doi = {10.1109/EITech.2017.8255261}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85047477758\&doi=10.1109\%2fEITech.2017.8255261\&partnerID=40\&md5=f88360d6e054f43cc33c4593431fa891}, author = {Houari, M.E. and Rhanoui, M. and Asri, B.E.} } @article {Landrigan2018462, title = {The Lancet Commission on pollution and health}, journal = {The Lancet}, volume = {391}, number = {10119}, year = {2018}, pages = {462-512}, doi = {10.1016/S0140-6736(17)32345-0}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85031763844\&doi=10.1016\%2fS0140-6736\%2817\%2932345-0\&partnerID=40\&md5=a37689cb0e79594159ee6f8afc55fae1}, author = {Landrigan, P.J. and Fuller, R. and Acosta, N.J.R. and Adeyi, O. and Arnold, R. and Basu, N.N. and Bald{\'e}, A.B. and Bertollini, R. and Bose-O{\textquoteright}Reilly, S. and Boufford, J.I. and Breysse, P.N. and Chiles, T. and Mahidol, C. and Coll-Seck, A.M. and Cropper, M.L. and Fobil, J. and Fuster, V. and Greenstone, M. and Haines, A. and Hanrahan, D. and Hunter, D. and Khare, M. and Krupnick, A. and Lanphear, B. and Lohani, B. and Martin, K. and Mathiasen, K.V. and McTeer, M.A. and Murray, C.J.L. and Ndahimananjara, J.D. and Perera, F. and Poto{\v c}nik, J. and Preker, A.S. and Ramesh, J. and Rockstr{\"o}m, J. and Salinas, C. and Samson, L.D. and Sandilya, K. and Sly, P.D. and Smith, K.R. and Steiner, A. and Stewart, R.B. and Suk, W.A. and van Schayck, O.C.P. and Yadama, G.N. and Yumkella, K. and Zhong, M.} } @conference {Kang2018338, title = {Mitigation of cyber warfare in space through reed solomon codes}, booktitle = {Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018}, volume = {2018-March}, year = {2018}, pages = {338-342}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051749454\&partnerID=40\&md5=5851d0b3ae972c35fd8ae206b957820d}, author = {Kang, M. and Hopkinson, K. and Betances, A. and Reith, M.} } @conference {Rosencrans2018, title = {Proposing values and practices for a culture of organizational ingenuity: Hacking systems thinking to pursue the preposterous and produce the impossible}, booktitle = {Proceedings of the 60th Annual Meeting of the International Society for the Systems Sciences, ISSS 2016}, year = {2018}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85040314698\&partnerID=40\&md5=6cf2d6b258541bba8e3c969a129e38c4}, author = {Rosencrans, K.} } @conference {Rhazale2018, title = {A review of the governement information systems of organizational interoperability}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3230905.3230939}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053484486\&doi=10.1145\%2f3230905.3230939\&partnerID=40\&md5=a7a4b006fcc1fd6825835b97c2fd6b67}, author = {Rhazale, A. and Bounabat, B.} } @article {Bajta2018690, title = {Software project management approaches for global software development: A systematic mapping study}, journal = {Tsinghua Science and Technology}, volume = {23}, number = {6}, year = {2018}, pages = {690-714}, doi = {10.26599/TST.2018.9010029}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85055661732\&doi=10.26599\%2fTST.2018.9010029\&partnerID=40\&md5=7601769b8094dafca96fea06d11fd3db}, author = {Bajta, M.E. and Idri, A. and Ros, J.N. and Fernandez-Aleman, J.L. and de Gea, J.M.C. and Garc{\'\i}a, F. and Toval, A.} } @conference {Mannane20181, title = {Survey: Risk assessment models for cloud computing: Evaluation criteria}, booktitle = {Proceedings of 2017 International Conference of Cloud Computing Technologies and Applications, CloudTech 2017}, volume = {2018-January}, year = {2018}, pages = {1-5}, doi = {10.1109/CloudTech.2017.8284712}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046637347\&doi=10.1109\%2fCloudTech.2017.8284712\&partnerID=40\&md5=cf795cd6320ca19385451ed39a5973b6}, author = {Mannane, N. and Bencharhi, Y. and Boulafdour, B. and Regragui, B.} } @conference {Bahadi201842, title = {Towards efficient big data: Hadoop data placing and processing}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, pages = {42-47}, doi = {10.1145/3289100.3289108}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85058656669\&doi=10.1145\%2f3289100.3289108\&partnerID=40\&md5=52e6fda5215333977a9413c6cb1ff547}, author = {Bahadi, J. and Asri, B.E. and Courtine, M. and Rhanoui, M. and Kergosien, Y.} } @conference {Routaib2017732, title = {An asymmetrical nash bargaining for adaptive and automated context negotiation in pervasive environments}, booktitle = {2017 14th IEEE Annual Consumer Communications and Networking Conference, CCNC 2017}, year = {2017}, note = {cited By 0}, pages = {732-736}, abstract = {To cope with the energy performance concern of pervasive and Internet-of-Thing (IoT) devices, current pervasive systems require intelligent algorithms that can change the behavior of the devices and the overall network. Making the devices aware of their states and able to adjust their operative modes using context information has the potential to achieve better energy performance. Context information is typically obtained from environmental sensors, device sensors, and from external sources. In this work, we study the marketing of context-aware services through an adaptive context negotiation model. The negotiation process between context consumers and one or several context providers aims to satisfy the preferences of each the negotiating party concerning the quality-of-context (QoC) levels required by the context consumer. The proposed negotiation model uses an asymmetrical {\textquoteright}Power Bargaining{\textquoteright} model in which each negotiating party can influence the other party. It implements a learning algorithm for a symmetrical bargaining model. Numerical evaluation of the model shows the convergence of the Nash Bargaining Solution (NBS) by using a learning algorithm. {\textcopyright} 2017 IEEE.}, doi = {10.1109/CCNC.2017.7983225}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027412664\&doi=10.1109\%2fCCNC.2017.7983225\&partnerID=40\&md5=70dd3b4a091642d07bcfa73b03f0fd96}, author = {Routaib, H. and Badidi, E. and Sabir, E. and Elkoutbi, M.} } @conference {Rkizat2017, title = {Construction and iterative threshold decoding for low rates Quasi-Cyclic One Step Majority logic decodable codes}, booktitle = {2016 International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 - Proceedings}, year = {2017}, note = {cited By 0}, abstract = {This paper investigates the construction and iterative threshold decoding of low rate Quasi-Cyclic One Step Majority logic codes based on combinatorial designs. These codes are constructed with two type of difference family: cyclic disjoint difference sets and cyclic disjoint difference family. They can be encoded with low complexity, and perform very well when decoded with the Iterative threshold decoding (ITD) algorithm. We present an amelioration of ITD algorithm for decoding these codes. This algorithm modification can be applicable for every code rate. The performances of this algorithm for decoding these codes on Additive White Gaussian Noise (AWGN) channel, is investigated. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ACOSIS.2016.7843944}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85015226293\&doi=10.1109\%2fACOSIS.2016.7843944\&partnerID=40\&md5=c6afb690075fcd98594cbdf6ea4475be}, author = {Rkizat, K. and Lahmer, M. and Belkasmi, M. and Nouh, S.} } @conference {Benlakhdar2017, title = {Directional data classification using a hierarchical model of von Mises distribution}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F129474}, year = {2017}, note = {cited By 0}, abstract = {The von Mises distribution1 VM -pdf is a continuous probability distribution on the circle used in directional statistics. A mixture model of von Mises distribution, which is broad enough to cover symmetry as well as asymmetry, unimodality as well as multimodality of circular data. In this paper we use a model comprised of a hierarchical von Mises mixture distribution mode HmvM- pdf where we consider each class is itself the result of a mixture of subclasses. The parameters of our model are estimated using the expectation maximization algorithm EM modified. The HmvM- pdf model achieves higher accuracy than the mvM model and offer a rich modeling. The suitability of the distributions is judged from the coefficient of determination R2. {\textcopyright} 2017 Association for Computing Machinery.}, doi = {10.1145/3090354.3090425}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028459799\&doi=10.1145\%2f3090354.3090425\&partnerID=40\&md5=ce3dab33a54f11b997bc9f8f24999c78}, author = {Benlakhdar, S. and Rziza, M. and Thami, R.O.H.} } @conference {Chaimae2017200, title = {ECC certificate for authentication in cloud-based RFID}, booktitle = {Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016}, year = {2017}, note = {cited By 0}, pages = {200-203}, abstract = {Cloud computing is the access via internet to shared resources and services. Merging this technology with RFID enabled the improvement of the latter such as data storage and processing, and both allow to have intelligent environments and access services anytime and anywhere. But this fusion is the subject of some criticism concerning the data security and privacy. In this article we are interested in the authentication of tag/reader to the cloud interface and we propose a protocol using elliptic curve cryptography (ECC) to verify the identity of readers before issuing the certificate which authenticates the reader to tag, and then lets them access the cloud interface. {\"\i}{\textquestiondown}{\textonehalf} 2016 IEEE.}, doi = {10.1109/CloudTech.2016.7847699}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85013847389\&doi=10.1109\%2fCloudTech.2016.7847699\&partnerID=40\&md5=98054382849319c9204046d0edee3677}, author = {Chaimae, E. and Romadi, R. and Abdellatif, E.A.} } @conference {Khtira2017, title = {From data to big data: Moroccan public sector}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F129474}, year = {2017}, note = {cited By 0}, abstract = {Digitalization, interconnection, open data, and the use of internet and social media by governments and citizens have consequently leaded to an enormous growth of data in the public sector. As government data available increases, many big data initiatives have been launched by governments in order to derive insights and create new value in many areas. This paper details some concepts related to government data specifically open data and big data in order to draw the relationships between them and show its potential value. The article also brings into light the impact of digital progress, made so far in the Moroccan Administration, on the growth of data in the public sector, and presents first steps taken by the government toward big data era. In particular, we focus on social media, open government data and e-government initiatives. In addition, the paper showcases examples of applying advanced analytics in the public finances specifically in Tax Administration to uncover insights and make better decisions from large datasets. This article also overviews some challenges facing future big data initiatives in the Moroccan public sector and proposes recommendations to address them. {\textcopyright} 2017 Association for Computing Machinery.}, doi = {10.1145/3090354.3090401}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028471176\&doi=10.1145\%2f3090354.3090401\&partnerID=40\&md5=2637a68edcc8418376431b149ac707fe}, author = {Khtira, R. and Elasri, B. and Rhanoui, M.} } @conference {Haddad2017484, title = {A high gain Novel Dielectric Resonator Antenna (NDRA) for anti-collision short range radar (SRR) application}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2017}, note = {cited By 0}, pages = {484-486}, abstract = {This paper presents the design of Novel Dielectric Resonator Antenna (NDRA) feed by a micro-strip line for anti-collision radar SRR application at 24 GHz. The proposed NDRA operates at a frequency of 24 GHz with a dielectric constant of 18. The simulated NDRA has a high gain (12.24 dB) and a high radiation efficiency (94 \%). The return loss, radiation pattern and gain of the proposed antenna are evaluated. The simulation process was carried out using Computer Simulation Technology (CST) Microwave Studio. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ICMCS.2016.7905582}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019154107\&doi=10.1109\%2fICMCS.2016.7905582\&partnerID=40\&md5=5e26a28411e91981e44e0fd02ad0dda4}, author = {Haddad, A. and Aoutoul, M. and Rais, K. and Essaaidi, M.} } @conference {Rachih2017, title = {Metaheuristics applied in remanufacturing and reverse logistics: A review}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F129474}, year = {2017}, note = {cited By 0}, abstract = {Due to growing environmental concerns, a large number of companies and organizations in the world give importance to reverse logistics and remanufacturing. Remanufacturing which aims is to take care of used or damaged product in the purpose of returning it like new product, lead many researchers to study the integration of this reverse flow in the process of the forward supply chain. The resulting models are difficult and complex to solve and optimize, hence the need to integrate a strong and efficient method such as Metaheuristics to solve those complex optimization problems. The purpose of this study is to review the published literature on the issues of reverse logistics and remanufacturing, and classified these papers by the type of metaheuristic used. Also, it aims to outline some future opportunities for research based on research gap analysis. {\textcopyright} 2017 Association for Computing Machinery.}, doi = {10.1145/3090354.3090462}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028474536\&doi=10.1145\%2f3090354.3090462\&partnerID=40\&md5=c4408470ba292c01841b6cf733c3b036}, author = {Rachih, H. and Mhada, F.Z. and Chiheb, R.} } @conference {Bensitel20171, title = {Secure data storage in the cloud with homomorphic encryption}, booktitle = {Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016}, year = {2017}, note = {cited By 0}, pages = {1-6}, abstract = {The adoption of cloud computing is accelerating among health care providers, as they realize the limitations of traditional systems of computerized medical file. Many obstacles must be overcome, however, with regard to respect for privacy and patient safety. In order to ensure the respect for privacy, an encryption of data is required. An encryption that allows to compute over encrypted data without having to decrypt. In this paper we focus on cloud computing and its adoption in different domain, we describe the role of homomorphic encryption scheme for preserving privacy data sharing in the cloud and propose a system that ensures confidentiality of data by using partial homomorphic encryption algorithms. {\textcopyright} 2016 IEEE.}, doi = {10.1109/CloudTech.2016.7847680}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85013782447\&doi=10.1109\%2fCloudTech.2016.7847680\&partnerID=40\&md5=041a6f63be066f6469ebdd53e8351cce}, author = {Bensitel, Y. and Romadi, R.} } @article {Badidi2017611, title = {Towards data-as-a-service provisioning with high-quality data}, journal = {Lecture Notes in Electrical Engineering}, volume = {397}, year = {2017}, note = {cited By 0}, pages = {611-623}, abstract = {Given the large amount of sensed data by IoT devices and various wireless sensor networks, traditional data services lack the necessary resources to store and process that data, as well as to disseminate high-quality data to a variety of potential consumers. In this paper, we propose a framework for Data as a Service (DaaS) provisioning, which relies on deploying DaaS services on the cloud and using a DaaS agency to mediate between data consumers and DaaS services using a publish/subscribe model. Furthermore, we describe a decision algorithm for the selection of appropriate DaaS services that can fulfill consumers{\textquoteright} requests for high-quality data. One of the benefits of the proposed approach is the elasticity of the cloud resources used by DaaS services. Moreover, the selection algorithm allows ranking DaaS services by matching their quality-of-data (QoD) offers against the QoD needs of the data consumer. {\textcopyright} Springer Science+Business Media Singapore 2017.}, doi = {10.1007/978-981-10-1627-1_48}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84996995662\&doi=10.1007\%2f978-981-10-1627-1_48\&partnerID=40\&md5=3699ddd8367859bcdb3853679e370f5f}, author = {Badidi, E.a and Routaib, H.b and El Koutbi, M.b} } @article {Badidi2017611, title = {Towards data-as-a-service provisioning with high-quality data}, journal = {Lecture Notes in Electrical Engineering}, volume = {397}, year = {2017}, note = {cited By 0}, pages = {611-623}, abstract = {Given the large amount of sensed data by IoT devices and various wireless sensor networks, traditional data services lack the necessary resources to store and process that data, as well as to disseminate high-quality data to a variety of potential consumers. In this paper, we propose a framework for Data as a Service (DaaS) provisioning, which relies on deploying DaaS services on the cloud and using a DaaS agency to mediate between data consumers and DaaS services using a publish/subscribe model. Furthermore, we describe a decision algorithm for the selection of appropriate DaaS services that can fulfill consumers{\textquoteright} requests for high-quality data. One of the benefits of the proposed approach is the elasticity of the cloud resources used by DaaS services. Moreover, the selection algorithm allows ranking DaaS services by matching their quality-of-data (QoD) offers against the QoD needs of the data consumer. {\textcopyright} Springer Science+Business Media Singapore 2017.}, doi = {10.1007/978-981-10-1627-1_48}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84996995662\&doi=10.1007\%2f978-981-10-1627-1_48\&partnerID=40\&md5=3699ddd8367859bcdb3853679e370f5f}, author = {Badidi, E. and Routaib, H. and El Koutbi, M.} } @conference { ISI:000381755100008, title = {A Bargaining Nash Game Based Adaptive Negotiation of Context Level Agreements for Pervasive Systems}, booktitle = {ADVANCES IN UBIQUITOUS NETWORKING}, series = {Lecture Notes in Electrical Engineering}, volume = {366}, year = {2016}, note = {International Symposium on Ubiquitous Networking (UNet), Casablanca, MOROCCO, SEP 08-10, 2015}, pages = {91-104}, abstract = {With the growing popularity of Internet-enabled devices, the impressive progress in sensing technology, and the adoption of cloud computing for provisioning services, users increasingly demand services that can adapt to their recent context. In this paper, we propose, a multi-attributes and adaptive approach for Context Level Agreements (CLAs) negotiation between a context provider and a context consumer using a context broker. The approach employs a Nash bargaining model and evaluates the global utility of each party as a linear function of normalized Quality of Context (QoC) attributes during the rounds of negotiation. The ultimate goal is to improve context-based adaptation of context-aware applications and services. One of the advantages of this approach is that it permits to resolve conflicts of interests between the context provider and the context consumer when the global utility of each party reaches a Pareto optimum.}, isbn = {978-981-287-990-5; 978-981-287-989-9}, issn = {1876-1100}, doi = {10.1007/978-981-287-990-5\_8}, author = {Routaib, Hayat and Badidi, Elarbi and Sabir, Essaid and Elkoutbi, Mohammed}, editor = {Sabir, E and Medromi, H and Sadik, M} } @article {Routaib201691, title = {A bargaining nash game based adaptive negotiation of context level agreements for pervasive systems}, journal = {Lecture Notes in Electrical Engineering}, volume = {366}, year = {2016}, note = {cited By 0}, pages = {91-104}, abstract = {With the growing popularity of Internet-enabled devices, the impressive progress in sensing technology, and the adoption of cloud computing for provisioning services, users increasingly demand services that can adapt to their recent context. In this paper, we propose a multi-attributes and adaptive approach for Context Level Agreements (CLAs) negotiation between a context provider and a context consumer using a context broker. The approach employs a Nash bargainingmodel and evaluates the global utility of each party as a linear function of normalized Quality of Context (QoC) attributes during the rounds of negotiation. The ultimate goal is to improve context-based adaptation of context-aware applications and services. One of the advantages of this approach is that it permits to resolve conflicts of interests between the context provider and the context consumer when the global utility of each party reaches a Pareto optimum. {\textcopyright} Springer Science+Business Media Singapore 2016.}, doi = {10.1007/978-981-287-990-5_8}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84959119600\&doi=10.1007\%2f978-981-287-990-5_8\&partnerID=40\&md5=ed4610375cc000b9197b7923d9434dd5}, author = {Routaib, H.a and Badidi, E.b and Sabir, E.c and Elkoutbi, M.a} } @conference {Rabii201693, title = {Comparison of e-readiness composite indicators}, booktitle = {International Conference on Intelligent Systems Design and Applications, ISDA}, volume = {2016-June}, year = {2016}, note = {cited By 0}, pages = {93-97}, abstract = {The e-readiness is an assessment tool designed to measure and analyse the level of ICT integration in development of country. Several tools of e-readiness using composite indicators approach to calculate the final index that characterizes the purpose of the e-readiness study. Based on selected individual indicators, composites can provide a way to benchmark and gauge the level of the countries{\textquoteright} economic progress. The main goal of this paper is to present a comparative study of the best-known e-readiness composite indicators based on some criteria such as: the estimation of missing data, normalization, weighting, and index calculation. {\textcopyright} 2015 IEEE.}, doi = {10.1109/ISDA.2015.7489207}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84978413865\&doi=10.1109\%2fISDA.2015.7489207\&partnerID=40\&md5=52bb4d0700b64cc2c3a5891d658ae5f3}, author = {Rabii, L. and Abdelaziz, D.} } @article {Fern{\'a}ndez-Alem{\'a}n2016105, title = {Effects of Using Requirements Catalogs on Effectiveness and Productivity of Requirements Specification in a Software Project Management Course}, journal = {IEEE Transactions on Education}, volume = {59}, number = {2}, year = {2016}, note = {cited By 2}, pages = {105-118}, abstract = {{This paper presents the results of two educational experiments carried out to determine whether the process of specifying requirements (catalog-based reuse as opposed to conventional specification) has an impact on effectiveness and productivity in co-located and distributed software development environments. The participants in the experiments were 76 students enrolled in three courses on project management for software development at the University of Murcia, Spain, and the Mohammed V University of Rabat, Morocco. The results of a fixed effects meta-analysis (Hedges{\textquoteright} g) obtained a medium effect (-0.495}, doi = {10.1109/TE.2015.2454472}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84938513136\&doi=10.1109\%2fTE.2015.2454472\&partnerID=40\&md5=b0869dc6ab42c4703c94727e3de076c7}, author = {Fern{\'a}ndez-Alem{\'a}n, J.L.a and Carrillo-De-Gea, J.M.a and Vidal Meca, J.a and Nicol{\'a}s Ros, J.a and Toval, A.a and Idri, A.b} } @conference { ISI:000389502600037, title = {Hybrid Homomorphic Encryption for Cloud Privacy}, booktitle = {Networked Systems, NETYS 2016}, series = {Lecture Notes in Computer Science}, volume = {9944}, year = {2016}, note = {4th International Conference on Networked Systems (NETYS), Marrakech, MOROCCO, MAY 18-20, 2016}, pages = {380}, isbn = {978-3-319-46140-3; 978-3-319-46139-7}, issn = {0302-9743}, author = {Bensitel, Yasmina and Rahal, Romadi}, editor = {Abdulla, PA and DelporteGallet, C} } @article {Romadi2016100, title = {IDS in cloud computing a novel multi-agent specification method}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {88}, number = {1}, year = {2016}, note = {cited By 0}, pages = {100-106}, abstract = {Intrusion detection systems (IDS) are most efficient way of defending against network-based attacks aimed at computer systems. These systems are used in almost all large-scale IT infrastructures. As part of the migration to cloud services, the situation is even more complex because of the characteristics of cloud, everything is virtual. The number of virtual machines (VM) changes dynamically according to the resource requirement of the requested processing and can be of the order of thousands to tens of thousands. Each VM has an IDS adapted to its services (web server, mail server, ftp server, etc.) and to increase the performance we can use different types of IDS (signature-based IDS, anomaly-based IDS) in one machine. Due to their complex nature, IDS in a cloud environment are extremely difficult to specify and validate. In this paper, we propose a new formal model for the specification and the validation of such systems. This approach considers these Systems as a Multi-Agent System consisting of concurrent reactive agents that cooperate with each other to achieve the desired functionality. In addition, this approach uses formal synchronous specification and verification tools in order to specify and to verify the systems behaviors. {\textcopyright} 2005-2016 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84973544414\&partnerID=40\&md5=fb9f54ba3f318610459aba246599c215}, author = {Romadi, R. and Eddahmani, S. and Bounabat, B.} } @conference { ISI:000390313000030, title = {Integrating SysML with simulation environments (Simulink) by model transformation approach}, booktitle = {2016 IEEE 25TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE)}, year = {2016}, note = {25th IEEE International Conference on Enabling Technologies - Infrastructure for Collaborative Enterprises (WETICE), Paris, FRANCE, JUN 13-15, 2016}, pages = {148-150}, publisher = {IEEE; IEEE Comp Soc Techl Council Software Engn; West Virginia Univ, CERC; Paris Sch Business; CNRS Samovar Res Lab; Telecom SudParis, Inst Mines Telecom; Paris Sch Business Res Lab; Olab Dynam; eFrei Groupe}, organization = {IEEE; IEEE Comp Soc Techl Council Software Engn; West Virginia Univ, CERC; Paris Sch Business; CNRS Samovar Res Lab; Telecom SudParis, Inst Mines Telecom; Paris Sch Business Res Lab; Olab Dynam; eFrei Groupe}, abstract = {In system-level design, descriptive system models seem to be insufficient in order to perform a system verification which fulfils various stakeholders requirements. This fact is accentuated by the increasing complexity of system engineering projects and, as a consequence, the difficulties to deal with both their coordination and traceability. Even if SysML (System Modeling Language) is considered as a flexible and standard tool for system engineering, using only descriptive models are insufficient for system behavior verifications. To deal with this concern, simulation environments (i.e. MATLAB/Simulink) allow verifying if the system preliminary design satisfies requirements or not. As a consequence, various research works have been centered on combining the potential of both SysML modeling and simulation tools. This paper proposes an integration approach based on metamodeling and model transformations to generate Simulink models from SysML diagrams. This approach is handled by models and modern techniques of MDE (ModelDriven Engineering).}, isbn = {978-1-5090-1663-1}, doi = {10.1109/WETICE.2016.39}, author = {Chabibi, Bassim and Douche, Abdelilah and Anwar, Adil and Nassar, Mahmoud}, editor = {Reddy, SM and Gaaloul, W} } @article { ISI:000377221300068, title = {Iterative Threshold Decoding Of High Rates Quasi-Cyclic OSMLD Codes}, journal = {INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS}, volume = {7}, number = {4}, year = {2016}, month = {APR}, pages = {518-528}, abstract = {Majority logic decoding (MLD) codes are very powerful thanks to the simplicity of the decoder. Nevertheless, to find constructive families of these codes has been recognized to be a hard job. Also, the majority of known MLD codes are cyclic which are limited in the range of the rates. In this paper a new adaptation of the Iterative threshold decoding algorithm is considered, for decoding Quasi-Cyclic One Step Majority logic codes (QC-OSMLD) codes of high rates. We present the construction of QC-OSMLD codes based on Singer difference sets of rate 1/2, and codes of high rates based on Steiner triple system which allows to have a large choice of codes with different lengths and rates. The performances of this algorithm for decoding these codes on both Additive White Gaussian Noise (AWGN) channel and Rayleigh fading channel, to check its applicability in wireless environment, is investigated.}, issn = {2158-107X}, author = {Rkizat, Karim and Yatribi, Anouar and Lahmer, Mohammed and Belkasmi, Mostafa} } @conference {Razouk2016, title = {New approaches for solving the container stacking problem}, booktitle = {Proceedings of the 3rd IEEE International Conference on Logistics Operations Management, GOL 2016}, year = {2016}, note = {cited By 0}, abstract = {Containers shipment has grown very fast during the last ten years, in Tanger Med port for example, 3Millions containers (80\% in transshipment) TEUs (Twenty feet equivalent unit) has been changed during 2015 (Tanger Med Port authority {\textquoteright}TMPA{\textquoteright} study March{\textquoteright}2016 [1]), which correspond to an increase of 40\% comparing with the last study made in 2012. Thus, our study will deal with the port management and the improvement of the operations processes. The aim of this paper is to define a new strategies to solve the container stacking problem (CSP) using an approach of optimization. Thus we define a new MIP (Mathematical Integer Program) to deal with the operational tasks in a containers terminal. In which we optimize the number of the stacks used to store a given number of inbound containers and also we minimize the related cost of the traveling distance for inbound containers between the sea side and the yard side. This paper is organized as follow: we introduce and locate first our problem, then we present the literature review of the CSP. The problem definition and the MIP introduction will be the subject of the next section, and we finish by presenting the findings and the future perspectives. As a proposed resolution approach for our MIP, we propose a developed genetic algorithm strategy (DGAS) as a metaheuristic and the Branch \& Cut (B\&C) as an exact method. Our main objective is to avoid reshuffles and to find out the best yard configuration to store inbound containers. The DGAS will be applied to an existing instances in the literature, and the obtained numerical results is compared with the Cplex results (B\&C). The main inputs for our proposed framework are the height, weight, destination, type containers \& yard bays, and the expected departure time (EDT). Our objective at the end is to have an optimized guide to the planners to easily define the unloading plan and the storage position for each container, giving an initial stacking state and a container demand. {\textcopyright} 2016 IEEE.}, doi = {10.1109/GOL.2016.7731679}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85001976354\&doi=10.1109\%2fGOL.2016.7731679\&partnerID=40\&md5=423d4fb53e049a2ad56b99740b466821}, author = {Razouk, C.a and Benadada, Y.a and Boukachour, J.b} } @conference { ISI:000392439200021, title = {New approaches for solving the container stacking problem}, booktitle = {PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL CONFERENCE ON LOGISTICS OPERATIONS MANAGEMENT (GOL{\textquoteright}16)}, year = {2016}, note = {3rd IEEE International Conference on Logistics Operations Management (GOL), Fes, MOROCCO, MAY 23-25, 2016}, publisher = {Sidi Mohammed Ben Abdellah Univ Fes, Fac Sci \& Technol; Mohammed V Univ Rabat, ENSIAS Sch; Univ Havre; IEEE}, organization = {Sidi Mohammed Ben Abdellah Univ Fes, Fac Sci \& Technol; Mohammed V Univ Rabat, ENSIAS Sch; Univ Havre; IEEE}, abstract = {Containers shipment has grown very fast during the last ten years, in Tanger Med port for example, 3Millions containers (80\% in transshipment) TEUs (Twenty feet equivalent unit) has been changed during 2015 (Tanger Med Port authority {\textquoteleft}{\textquoteleft}TMPA{{\textquoteright}{\textquoteright}} study March{\textquoteright} 2016 {[} 1]), which correspond to an increase of 40\% comparing with the last study made in 2012. Thus, our study will deal with the port management and the improvement of the operations processes. The aim of this paper is to define a new strategies to solve the container stacking problem (CSP) using an approach of optimization. Thus we define a new MIP (Mathematical Integer Program) to deal with the operational tasks in a containers terminal. In which we optimize the number of the stacks used to store a given number of inbound containers and also we minimize the related cost of the traveling distance for inbound containers between the sea side and the yard side. This paper is organized as follow: we introduce and locate first our problem, then we present the literature review of the CSP. The problem definition and the MIP introduction will be the subject of the next section, and we finish by presenting the findings and the future perspectives. As a proposed resolution approach for our MIP, we propose a developed genetic algorithm strategy (DGAS) as a metaheuristic and the Branch \& Cut (B\&C) as an exact method. Our main objective is to avoid reshuffles and to find out the best yard configuration to store inbound containers. The DGAS will be applied to an existing instances in the literature, and the obtained numerical results is compared with the Cplex results (B\&C). The main inputs for our proposed framework are the height, weight, destination, type containers \& yard bays, and the expected departure time (EDT). Our objective at the end is to have an optimized guide to the planners to easily define the unloading plan and the storage position for each container, giving an initial stacking state and a container demand.}, isbn = {978-1-4673-8571-8}, author = {Razouk, Chafik and Benadada, Youssef and Boukachour, Jaouad}, editor = {Alaoui, AE and Benadada, Y and Boukachour, J} } @article {Iazzi2016156, title = {A new method for fall detection of elderly based on human shape and motion variation}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {10073 LNCS}, year = {2016}, note = {cited By 0}, pages = {156-167}, abstract = {Fall detection for elderly and patient has been an active research topic due to the great demand for products and technology of fall detection in the healthcare industry. Computer vision provides a promising solution to analyze personal behavior and detect certain unusual events such as falls. In this paper, we present a new method for fall detection based on the variation of shape and motion. First, we use the CodeBook method to extract the person silhouette from the video. Then, information of rectangle, ellipse and histogram projection are used to provide features to analyze the person shape. In addition, we represent the person shape by three blocks extracted from rectangle. Then, we use optical flow to analyze the person motion within each blocks. Finally, falls are detected from normal activities using thresholding-based method. All experiments show that our fall detection system achieves very good performances in accuracy and error rate. {\textcopyright} Springer International Publishing AG 2016.}, doi = {10.1007/978-3-319-50832-0_16}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85007364688\&doi=10.1007\%2f978-3-319-50832-0_16\&partnerID=40\&md5=4ed27ef63754e531149224bda59c8227}, author = {Iazzi, A.a and Rziza, M.a and Thami, R.O.H.a b and Aboutajdine, D.a} } @conference {Iazzi2016, title = {A novel approach to improve background subtraction method for fall detection system}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, volume = {2016-July}, year = {2016}, note = {cited By 0}, abstract = {The fall detection system composed in general from three models, the first is a detection moving object, the second is tracking moving object and the third is recognition person{\textquoteright}s behavior. In this paper, we will deal out the first module which is the main unit in the fall detection system, because it is where we detect the person in the image. There are a lot of approaches in this way, but their results are not perfect due to the change of the background model. Many works propose to improve those results, but these approaches are not satisfied in some states. In this way, we propose a novel approach by using the optical flow which can improve The result to extract the foreground human body without errors. {\textcopyright} 2015 IEEE.}, doi = {10.1109/AICCSA.2015.7507220}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84980390523\&doi=10.1109\%2fAICCSA.2015.7507220\&partnerID=40\&md5=8a677cb3da204800552f0e9ce8de7158}, author = {Iazzi, A.a and Thami, R.O.H.b and Rziza, M.a} } @conference {Haddad2016237, title = {Rectangular Dielectric Resonator Antenna (RDRA) for anti-collision short range radar (SRR) application}, booktitle = {Proceedings of 2016 International Conference on Electrical and Information Technologies, ICEIT 2016}, year = {2016}, note = {cited By 0}, pages = {237-239}, abstract = {This paper presents the design of Rectangular Dielectric Resonator Antenna (RDRA) feed by a micro-strip line for anti-collision radar SRR application at 24 GHz. The proposed RDRA operates at a frequency of 24 GHz with a high dielectric constant of 41. The simulated RDRA has a high radiation efficiency (88.4 \%). The return loss, radiation pattern and gain of the proposed antenna are evaluated. The simulation process was carried out using Computer Simulation Technology (CST) Microwave Studio. {\textcopyright} 2016 IEEE.}, doi = {10.1109/EITech.2016.7519597}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84992188168\&doi=10.1109\%2fEITech.2016.7519597\&partnerID=40\&md5=459bdb70786bf969bb54ead0761fd18e}, author = {Haddad, A.a and Aoutoul, M.b and Rais, K.a and Essaaidi, M.c} } @conference { ISI:000391354500040, title = {Rectangular Dielectric Resonator Antenna (RDRA) for Anti-collision Short Range Radar (SRR) Application}, booktitle = {2016 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT)}, year = {2016}, note = {2nd International Conference on Electrical and Information Technologies (ICEIT), Tangier, MOROCCO, MAY 04-07, 2016}, pages = {237-239}, abstract = {This paper presents the design of Rectangular Dielectric Resonator Antenna (RDRA) feed by a micro-strip line for anti-collision radar SRR application at 24 GHz. The proposed RDRA operates at a frequency of 24 GHz with a high dielectric constant of 41. The simulated RDRA has a high radiation efficiency (88.4 \%). The return loss, radiation pattern and gain of the proposed antenna are evaluated. The simulation process was carried out using Computer Simulation Technology (CST) Microwave Studio.}, isbn = {978-1-4673-8469-8}, author = {Haddad, Abderrahim and Aoutoul, Mohssin and Rais, Khalid and Essaaidi, Mohamed}, editor = {Essaaidi, M and ElHani, S} } @article { ISI:000391824800005, title = {Software project management tools in global software development: a systematic mapping study}, journal = {SPRINGERPLUS}, volume = {5}, year = {2016}, month = {NOV 24}, abstract = {Global software development (GSD) which is a growing trend in the software industry is characterized by a highly distributed environment. Performing software project management (SPM) in such conditions implies the need to overcome new limitations resulting from cultural, temporal and geographic separation. The aim of this research is to discover and classify the various tools mentioned in literature that provide GSD project managers with support and to identify in what way they support group interaction. A systematic mapping study has been performed by means of automatic searches in five sources. We have then synthesized the data extracted and presented the results of this study. A total of 102 tools were identified as being used in SPM activities in GSD. We have classified these tools, according to the software life cycle process on which they focus and how they support the 3C collaboration model (communication, coordination and cooperation). The majority of the tools found are standalone tools (77\%). A small number of platforms (8\%) also offer a set of interacting tools that cover the software development lifecycle. Results also indicate that SPM areas in GSD are not adequately supported by corresponding tools and deserve more attention from tool builders.}, issn = {2193-1801}, doi = {10.1186/s40064-016-3670-7}, author = {Yasser Chadli, Saad and Idri, Ali and Nicolas Ros, Joaquin and Luis Fernandez-Aleman, Jose and Carrillo de Gea, Juan M. and Toval, Ambrosio} } @article {Chadli2016, title = {Software project management tools in global software development: a systematic mapping study}, journal = {SpringerPlus}, volume = {5}, number = {1}, year = {2016}, note = {cited By 0}, abstract = {Global software development (GSD) which is a growing trend in the software industry is characterized by a highly distributed environment. Performing software project management (SPM) in such conditions implies the need to overcome new limitations resulting from cultural, temporal and geographic separation. The aim of this research is to discover and classify the various tools mentioned in literature that provide GSD project managers with support and to identify in what way they support group interaction. A systematic mapping study has been performed by means of automatic searches in five sources. We have then synthesized the data extracted and presented the results of this study. A total of 102 tools were identified as being used in SPM activities in GSD. We have classified these tools, according to the software life cycle process on which they focus and how they support the 3C collaboration model (communication, coordination and cooperation). The majority of the tools found are standalone tools (77\%). A small number of platforms (8\%) also offer a set of interacting tools that cover the software development lifecycle. Results also indicate that SPM areas in GSD are not adequately supported by corresponding tools and deserve more attention from tool builders. {\textcopyright} 2016, The Author(s).}, doi = {10.1186/s40064-016-3670-7}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84996484137\&doi=10.1186\%2fs40064-016-3670-7\&partnerID=40\&md5=303aaf83e70281377e2a1497382f7f9f}, author = {Chadli, S.Y.a and Idri, A.a and Ros, J.N.b and Fern{\'a}ndez-Alem{\'a}n, J.L.b and de Gea, J.M.C.b and Toval, A.b} } @conference { ISI:000383221800027, title = {Big Data: Measuring How Information Technology Can Improve the Economic Growth and Better Life}, booktitle = {PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT)}, year = {2015}, note = {5th World Congress on Information and Communication Technologies (WICT), Marrakesh, MOROCCO, DEC 14-16, 2015}, pages = {152-159}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, abstract = {Today data are equivalent of oil or gold, but Succeeding with big data requires more than just data. Data-based value creation requires the identification of a framework from which predictions can be deducted and decisions can be made. Lot of index has been developed to measure the state of development of countries whether economic growth, ICT penetration or Human development. The purpose of the measuring was to assess policy implications and economic growth around the globe as well as share best practices. In this paper we are going to compare the most wildly tools of measurement of economic competiveness, Network readiness, Human development and world press freedom. Those four domains are judged to be the pillars of well-being and good live of a Human. In the second part of this paper, we examine the hypothesis that ICT penetration has positive effects on economic growth, well-being and a better life of a Human. We use the system Generalized Method of Moment for dynamic panel data analysis to extract the causal link between ICT penetration and growth.}, isbn = {978-1-4673-8712-5}, author = {Nouinou, Soumaya and Razafimampianina, Rindra M. and Regragui, Boubker and Doukkali, Abdelaziz S.}, editor = {Abrahim, A and Alimi, AM and Haqiq, A and Karray, H and Mousannif, H and BenHalima, M and Choo, YH and Ma, K} } @conference {Nouinou2015152, title = {Big data: Measuring how information technology can improve the economic growth and better life}, booktitle = {Proceedings of the 2015 5th World Congress on Information and Communication Technologies, WICT 2015}, year = {2015}, note = {cited By 0}, pages = {152-159}, abstract = {Today data are equivalent of oil or gold, but Succeeding with big data requires more than just data. Data-based value creation requires the identification of a framework from which predictions can be deducted and decisions can be made. Lot of index has been developed to measure the state of development of countries whether economic growth, ICT penetration or Human development. The purpose of the measuring was to assess policy implications and economic growth around the globe as well as share best practices. In this paper we are going to compare the most wildly tools of measurement of economic competiveness, Network readiness, Human development and world press freedom. Those four domains are judged to be the pillars of well-being and good live of a Human. In the second part of this paper, we examine the hypothesis that ICT penetration has positive effects on economic growth, well-being and a better life of a Human. We use the system Generalized Method of Moment for dynamic panel data analysis to extract the causal link between ICT penetration and growth. {\textcopyright} 2015 IEEE.}, doi = {10.1109/WICT.2015.7489663}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979738903\&doi=10.1109\%2fWICT.2015.7489663\&partnerID=40\&md5=e0578db8132db6f390ffd1046c772f60}, author = {Nouinou, S. and Razafimampianina, R.M. and Regragui, B. and Doukkali, A.S.} } @article {Rahimi2015189, title = {CIOSOS: Combined idiomatic-ontology based sentiment orientation system for trust reputation in E-commerce}, journal = {Advances in Intelligent Systems and Computing}, volume = {369}, year = {2015}, note = {cited By 1}, pages = {189-200}, abstract = {Due to the abundant amount of Customer{\textquoteright}s Reviews available in E-commerce platforms, Trust Reputation Systems remain reliable means to determine, circulate and restore the credibility and reputation of reviewers and their provided reviews. In fact before starting the process of Reputation score{\textquoteright}s calculation,we need to develop an accurate Sentiment orientation System able to extract opinion expressions, analyze them and determine the sentiment orientation of the Review and then classify it into positive, negative and objective. In this paper, we propose a novel semi-supervised approach which is a Combined Idiomatic-Ontology based Sentiment Orientation System (CIOSOS) that realizes a domain-dependent sentiment analysis of reviews. The main contribution of the system is to expand the general opinion lexicon SentiWordNet to a custom-made opinion lexicon (SentiWordNet++) with domain-dependent {\textquotedblleft}opinion indicators{\textquotedblright} as well as {\textquotedblleft}idiomatic expressions{\textquotedblright}. The system relies also on a semi-supervised learning method that uses the general lexicon WordNet to identify synonyms or antonyms of the expanded terms and get their polarities from SentiWordNet and then store them in SentiWordNet++. The Sentiment polarity and the classification of the review provided by the CIOSOS is used as an input of our Reputation Algorithm proposed in previous papers in order to generate the Reputation score of the reviewer.We also provide an improvement in calculation method used to generate a {\textquotedblleft}granular{\textquotedblright} reputation score of a feature or subfeature of the product. {\textcopyright} Springer International Publishing Switzerland 2015.}, doi = {10.1007/978-3-319-19713-5_17}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84946722849\&doi=10.1007\%2f978-3-319-19713-5_17\&partnerID=40\&md5=b9fc17e2f3c7a22987b8921b5e4e7f40}, author = {Rahimi, H. and Bakkali, H.E.} } @conference { ISI:000365128500017, title = {CIOSOS: Combined Idiomatic-Ontology Based Sentiment Orientation System for Trust Reputation in E-commerce}, booktitle = {INTERNATIONAL JOINT CONFERENCE: CISIS{\textquoteright}15 AND ICEUTE{\textquoteright}15}, series = {Advances in Intelligent Systems and Computing}, volume = {369}, year = {2015}, note = {8th International Conference on Computational Intelligence in Security for Information Systems (CISIS) / 6th International Conference on EUropean Transnational Education (ICEUTE), Burgos, SPAIN, JUN, 2015}, pages = {189-200}, publisher = {IEEE Spain Sect; IEEE Syst, Man \& Cybernet Spanish Chapter; Int Federat Computat Log}, organization = {IEEE Spain Sect; IEEE Syst, Man \& Cybernet Spanish Chapter; Int Federat Computat Log}, abstract = {Due to the abundant amount of Customer{\textquoteright}s Reviews available in E-commerce platforms, Trust Reputation Systems remain reliable means to determine, circulate and restore the credibility and reputation of reviewers and their provided reviews. In fact before starting the process of Reputation score{\textquoteright}s calculation, we need to develop an accurate Sentiment orientation System able to extract opinion expressions, analyze them and determine the sentiment orientation of the Review and then classify it into positive, negative and objective. In this paper, we propose a novel semi-supervised approach which is a Combined Idiomatic-Ontology based Sentiment Orientation System (CIOSOS) that realizes a domain-dependent sentiment analysis of reviews. The main contribution of the system is to expand the general opinion lexicon SentiWordNet to a custom-made opinion lexicon (SentiWordNet++) with domain-dependent {\textquoteleft}{\textquoteleft}opinion indicators{{\textquoteright}{\textquoteright}} as well as {\textquoteleft}{\textquoteleft}idiomatic expressions{{\textquoteright}{\textquoteright}}. The system relies also on a semi-supervised learning method that uses the general lexicon WordNet to identify synonyms or antonyms of the expanded terms and get their polarities from SentiWordNet and then store them in SentiWordNet++. The Sentiment polarity and the classification of the review provided by the CIOSOS is used as an input of our Reputation Algorithm proposed in previous papers in order to generate the Reputation score of the reviewer. We also provide an improvement in calculation method used to generate a {\textquoteleft}{\textquoteleft}granular{{\textquoteright}{\textquoteright}} reputation score of a feature or subfeature of the product.}, isbn = {978-3-319-19713-5; 978-3-319-19712-8}, issn = {2194-5357}, doi = {10.1007/978-3-319-19713-5\_17}, author = {Rahimi, Hasnae and El Bakkali, Hanan}, editor = {Herrero, A and Baruque, B and Sedano, J and Quintian, H and Corchado, E} } @conference { ISI:000380407100031, title = {A Conceptual Framework for Personalization of Mobile Cloud Services}, booktitle = {2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15)}, year = {2015}, note = {International Conference on Cloud Computing Technologies and Applications (CloudTech), Marrakech, MOROCCO, JUN 02-04, 2015}, pages = {238-244}, abstract = {Over the last few years, we are witnessing the proliferation of mobile Internet devices (MIDs) and the wide spread adoption of cloud computing for both personal and corporate usages. These technologies are converging in what is known as mobile cloud computing (MCC) paradigm. This paradigm aims at addressing resource poverty of mobile devices. Several works investigated the challenges of mobile cloud computing. With the growing heterogeneity of mobile devices, personalization of services remains a challenging issue. In this paper, we propose a conceptual framework to address the issue of personalization in a mobile cloud computing environment. It aims at satisfying the mobile user needs and preferences for service provisioning. The mobile cloud service provider composes its service from a set of in-house services and from third party services using a composition plan, which adapts services by taking into account the user{\textquoteright}s profile and preferences.}, isbn = {978-1-4673-8149-9}, author = {Badidi, Elarbi and Routaib, Hayat} } @conference {Badidi2015, title = {A conceptual framework for personalization of mobile cloud services}, booktitle = {Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015}, year = {2015}, note = {cited By 0}, abstract = {Over the last few years, we are witnessing the proliferation of mobile Internet devices (MIDs) and the wide spread adoption of cloud computing for both personal and corporate usages. These technologies are converging in what is known as mobile cloud computing (MCC) paradigm. This paradigm aims at addressing resource poverty of mobile devices. Several works investigated the challenges of mobile cloud computing. With the growing heterogeneity of mobile devices, personalization of services remains a challenging issue. In this paper, we propose a conceptual framework to address the issue of personalization in a mobile cloud computing environment. It aims at satisfying the mobile user needs and preferences for service provisioning. The mobile cloud service provider composes its service from a set of in-house services and from third party services using a composition plan, which adapts services by taking into account the user{\textquoteright}s profile and preferences. {\textcopyright} 2015 IEEE.}, doi = {10.1109/CloudTech.2015.7336992}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962800116\&doi=10.1109\%2fCloudTech.2015.7336992\&partnerID=40\&md5=73919960cdf33c891c21d772aed41219}, author = {Badidi, E.a and Routaib, H.b} } @conference { ISI:000380408200011, title = {Flexible Miniaturized UWB CPW II-shaped Slot Antenna for Wireless Body Area Network (WBAN) Applications}, booktitle = {2015 THIRD INTERNATIONAL WORKSHOP ON RFID AND ADAPTIVE WIRELESS SENSOR NETWORKS (RAWSN)}, year = {2015}, note = {3rd International Workshop on RFID and Adaptive Wireless Sensor Networks (RAWSN), Agadir, MOROCCO, MAY 13-15, 2015}, pages = {52-56}, publisher = {FST FES; IEEE Morocco Sect; CNRST; MobiTic; Laboratoire Signaux Systemes Composants; LiMs Laboratoire}, organization = {FST FES; IEEE Morocco Sect; CNRST; MobiTic; Laboratoire Signaux Systemes Composants; LiMs Laboratoire}, abstract = {A flexible microstrip antenna printed on a Kapton Polymide substrate, excited by a CPW feed line, and operated in S-band at 3.5GHz, is successfully validated. Unlike previous flexible antennas, this structure offers a very thin thickness (0.16mm) with overall dimensions of 36x25 mm(2) that assure an easy integration into clothes and wireless body area network (WBAN) systems. Modeling and performance evaluation of the proposed antenna in term of return loss, voltage standing wave ratio, radiation pattern, and current distribution have been carried out using CST-MW STUDIO Software.}, isbn = {978-1-4673-8096-6}, author = {Afyf, Amal and Bellarbi, Larbi and Riouch, Fatima and Achour, Anouar and Errachid, Abdelhamid and Sennouni, Mohamed. Adel}, editor = {Berrada, I and Ghennioui, H} } @conference {Afyf201552, title = {Flexible miniaturized UWB CPW Π-shaped slot antenna for wireless body area network (WBAN) applications}, booktitle = {Proceedings - 2015 3rd International Workshop on RFID and Adaptive Wireless Sensor Networks, RAWSN 2015 - In conjunction with the International Conference on NETworked sYStems, NETYS 2015}, year = {2015}, note = {cited By 0}, pages = {52-56}, abstract = {A flexible microstrip antenna printed on a Kapton Polymide substrate, excited by a CPW feed line, and operated in S-band at 3.5GHz, is successfully validated. Unlike previous flexible antennas, this structure offers a very thin thickness (0.16mm) with overall dimensions of 36{\texttimes}25 mm2 that assure an easy integration into clothes and wireless body area network (WBAN) systems. Modeling and performance evaluation of the proposed antenna in term of return loss, voltage standing wave ratio, radiation pattern, and current distribution have been carried out using CST-MW STUDIO Software. {\textcopyright} 2015 IEEE.}, doi = {10.1109/RAWSN.2015.7173279}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84966552820\&doi=10.1109\%2fRAWSN.2015.7173279\&partnerID=40\&md5=66469dbc403cd2c742ec86e139da851b}, author = {Afyf, A.a and Bellarbi, L.a and Riouch, F.b and Achour, A.a and Errachid, A.c and Sennouni, M.A.d} } @conference {ElHouari2015, title = {From Big Data to Big Knowledge: The art of making Big Data alive}, booktitle = {Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015}, year = {2015}, note = {cited By 0}, abstract = {Nowadays Big Data becomes one of the biggest buzz concepts in IT world especially with the vertiginous development driving the increase of data encouraged by the emergence of high technologies of storage like cloud computing. Big Data can create efficient challenging solutions in health, security, government and more; and usher in a new era of analytics and decisions. Knowledge Management comprises a set of strategies and practices used to identify, create, represent, distribute, and enable creating experience that can constitute a real immaterial capital. However, to bring significant meaning to the perpetual tsunami of data and manage them, Big Data needs Knowledge Management. In the same way, to broaden the scope of its targeted analyzes, Knowledge Management requires Big Data. Thus, there is a complementary relation between these two major concepts. This paper presents a state of art where we try to explore Big Data within the context of Knowledge Management. We discuss the bi-directional relationship linking this two fundamental concepts and their strategic utility in making analytics valuable especially with the combination of their interactions which create an effective Big Knowledge to build experience. {\textcopyright} 2015 IEEE.}, doi = {10.1109/CloudTech.2015.7337001}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962850767\&doi=10.1109\%2fCloudTech.2015.7337001\&partnerID=40\&md5=44ddf094080e112ff052b4be166062e8}, author = {El Houari, M. and Rhanoui, M. and El Asri, B.} } @conference { ISI:000380407100040, title = {From Big Data to Big Knowledge: The Art of making Big Data Alive}, booktitle = {2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15)}, year = {2015}, note = {International Conference on Cloud Computing Technologies and Applications (CloudTech), Marrakech, MOROCCO, JUN 02-04, 2015}, pages = {289-294}, abstract = {Nowadays Big Data becomes one of the biggest buzz concepts in IT world especially with the vertiginous development driving the increase of data encouraged by the emergence of high technologies of storage like cloud computing. Big Data can create efficient challenging solutions in health, security, government and more; and usher in a new era of analytics and decisions. Knowledge Management comprises a set of strategies and practices used to identify, create, represent, distribute, and enable creating experience that can constitute a real immaterial capital. However, to bring significant meaning to the perpetual tsunami of data and manage them, Big Data needs Knowledge Management. In the same way, to broaden the scope of its targeted analyzes, Knowledge Management requires Big Data. Thus, there is a complementary relation between these two major concepts. This paper presents a state of art where we try to explore Big Data within the context of Knowledge Management. We discuss the bi-directional relationship linking this two fundamental concepts and their strategic utility in making analytics valuable especially with the combination of their interactions which create an effective Big Knowledge to build experience.}, isbn = {978-1-4673-8149-9}, author = {El Houari, Meryeme and Rhanoui, Maryem and El Asri, Bouchra} } @conference { ISI:000361005100095, title = {The impact of data accuracy on user-perceived business service{\textquoteright}s quality}, booktitle = {PROCEEDINGS OF THE 2015 10TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2015)}, year = {2015}, note = {10th Iberian Conference on Information Systems and Technologies (CISTI), Univ Aveiro, Sch Technol \& Agueda Management, Agueda, PORTUGAL, JUN 17-20, 2015}, publisher = {Iberian Assoc Syst Informat Technol}, organization = {Iberian Assoc Syst Informat Technol}, abstract = {As business processes have become increasingly automated, data quality becomes the limiting and penalizing factor in the business service{\textquoteright}s overall quality, and thus impacts customer satisfaction, whether it is an end-user, an institutional partner or a regulatory authority. The available research that is related to business services{\textquoteright} quality paid very little attention to the impact of poor data quality on good services delivery and customer satisfaction, and to the calculation of the optimal level of data quality. The aim of this paper is to present a customer-oriented approach that will help to understand and analyze how an organization business service{\textquoteright}s overall quality is linked to the quality of upstream business processes and of data objects in use. This paper also introduces a calculation framework that allows the identification of an optimal level of data quality - data accuracy dimension in the case of this paper - taking into account the business processes{\textquoteright} execution accuracy and data accuracy.}, author = {Belhiah, Meryam and Bounabat, Bouchaib and Achchab, Said}, editor = {Rocha, A and Dias, GP and Martins, A and Reis, LP and Cota, MP} } @conference { ISI:000380620300095, title = {The impact of data accuracy on user-perceived business service{\textquoteright}s quality}, booktitle = {2015 10TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI)}, series = {Iberian Conference on Information Systems and Technologies}, year = {2015}, note = {10th Iberian Conference on Information Systems and Technologies (CISTI), Univ Aveiro, Sch Technol \& Agueda Management, Agueda, PORTUGAL, JUN 17-20, 2015}, publisher = {Iberian Assoc Syst Informat Technol}, organization = {Iberian Assoc Syst Informat Technol}, abstract = {As business processes have become increasingly automated, data quality becomes the limiting and penalizing factor in the business service{\textquoteright}s overall quality, and thus impacts customer satisfaction, whether it is an end-user, an institutional partner or a regulatory authority. The available research that is related to business services{\textquoteright} quality paid very little attention to the impact of poor data quality on good services delivery and customer satisfaction, and to the calculation of the optimal level of data quality. The aim of this paper is to present a customer-oriented approach that will help to understand and analyze how an organization business service{\textquoteright}s overall quality is linked to the quality of upstream business processes and of data objects in use. This paper also introduces a calculation framework that allows the identification of an optimal level of data quality - data accuracy dimension in the case of this paper - taking into account the business processes{\textquoteright} execution accuracy and data accuracy.}, isbn = {978-1-4799-8330-8}, issn = {2166-0727}, author = {Belhiah, Meryam and Bounabat, Bouchaib and Achchab, Said}, editor = {Rocha, A and Dias, GP and Martins, A and Reis, LP and Cota, MP} } @conference { ISI:000383221800021, title = {Iterative Threshold Decoding of Quasi-Cyclic One Step Majority Logic Decodable Codes}, booktitle = {PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT)}, year = {2015}, note = {5th World Congress on Information and Communication Technologies (WICT), Marrakesh, MOROCCO, DEC 14-16, 2015}, pages = {117-122}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, abstract = {This paper presents a new class of Quasi-Cyclic One Step Majority logic codes of 1/2 rate constructed from perfect difference set. Theses codes can be encoded with low complexity, and perform very well when decoded with the Iterative threshold decoding algorithm. Much of these codes is a subfamily of the LDPC codes and can be decoded using belief propagation algorithm. A comparison between our results and those for LDPC code in terms of BER performance are presented.}, isbn = {978-1-4673-8712-5}, author = {Rkizat, Karim and Lahmer, Mohammed and Belkasmi, Mostafa}, editor = {Abrahim, A and Alimi, AM and Haqiq, A and Karray, H and Mousannif, H and BenHalima, M and Choo, YH and Ma, K} } @conference {Rkizat2015117, title = {Iterative threshold decoding of Quasi-Cyclic One Step Majority logic decodable codes}, booktitle = {Proceedings of the 2015 5th World Congress on Information and Communication Technologies, WICT 2015}, year = {2015}, note = {cited By 0}, pages = {117-122}, abstract = {This paper presents a new class of Quasi-Cyclic One Step Majority logic codes of 1/2 rate constructed from perfect difference set. Theses codes can be encoded with low complexity, and perform very well when decoded with the Iterative threshold decoding algorithm. Much of these codes is a subfamily of the LDPC codes and can be decoded using belief propagation algorithm. A comparison between our results and those for LDPC code in terms of BER performance are presented. {\textcopyright} 2015 IEEE.}, doi = {10.1109/WICT.2015.7489656}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979763400\&doi=10.1109\%2fWICT.2015.7489656\&partnerID=40\&md5=c9fdc4ec618d801dc53c49b1b5cec0f5}, author = {Rkizat, K. and Lahmer, M. and Belkasmi, M.} } @conference {Rida2015, title = {Multiview SOA: Extending SOA using a private cloud computing as SaaS}, booktitle = {Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015}, year = {2015}, note = {cited By 0}, abstract = {This work is based on two major areas, the Multiview Service Oriented Architecture and the combination between the computing cloud and MVSOA. Thus, it is suggested to extend firstly the service oriented architecture (SOA) into an architecture called MVSOA by adding two components, the Multiview service generator, whose role is to transform the classic service into Multiview service, and the data base, this component seeks to stock all of consumer service information. It is also suggested to combine the computing cloud and Multiview Service Oriented Architecture MV-SOA. To reach such combination, the MV-SOA architecture was taken and we added to the client-side a private cloud in SAAS. {\textcopyright} 2015 IEEE.}, doi = {10.1109/CloudTech.2015.7337016}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962858639\&doi=10.1109\%2fCloudTech.2015.7337016\&partnerID=40\&md5=c6f0e0302d236375153f48610841c06e}, author = {Rida, B. and Ahmed, E.} } @article {Chaimae201581, title = {New way of passive rfid deployment for smart grid}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {82}, number = {1}, year = {2015}, note = {cited By 0}, pages = {81-84}, abstract = {This article focuses on RFID technology over Power line for smart grid using exclusively passive tags, that operate in the low frequency bands 125 kHz and high frequency bands 13.56 KHz, passive tags are the most common, least expensive, and they have a virtually unlimited life. This solution for Smart grid is secure; it presents a new way of automatic identification with low voltage, low deployment costs and high reliability. This Smart RFID for Smart Grid helps to monitor and control electricity consumption. It can be used in many applications such as ticketing and Payment and charge energy for electric vehicles in smart home appliances such as the smart refrigerators and residential door keys. {\textcopyright} 2005 - 2015 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84949508486\&partnerID=40\&md5=cfb5dffe47fab90aedf3b8aacd0c5781}, author = {Chaimae, E. and Rahal, R.} } @conference { ISI:000383221800017, title = {A preliminary study on indicator framework for enterprise, based on COBIT 5 processes and SOA approach}, booktitle = {PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT)}, year = {2015}, note = {5th World Congress on Information and Communication Technologies (WICT), Marrakesh, MOROCCO, DEC 14-16, 2015}, pages = {95-100}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; Lab Res Grp Intelligent Machines; MIR Labs}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; Lab Res Grp Intelligent Machines; MIR Labs}, abstract = {Organizations become dependent on Information Technology (IT) to fulfill their corporate aims, meet their business needs and deliver value to customers. For effective and efficient utilization of IT, we intend to contribute to the alignment between IT and organizational strategies. The challenge is to make the enterprise and its Information System (IS) as responsive as possible within the regard to changes in enterprise while taking into account the enterprise operational performance. When a change happens or a new opportunity comes, organizations do not know which assets are linked to which business processes and which services, especially IT services, to bring up first and which can wait until later. Our principal aim is to propose an indicator framework to track and control business-IT alignment. However, this paper is a preliminary study on this framework. We are inspired by COBIT 5 processes as indicators and believe that the Service-Oriented Architecture (SOA) applied to these processes interlinks and can interact well the different processes. The validity and applicability of our theoretical study will be evaluated for future work.}, isbn = {978-1-4673-8712-5}, author = {Razafimampianina, Rindra M. and Nouinou, Soumaya and Doukkali, Abdelaziz S. and Regragui, Boubker}, editor = {Abrahim, A and Alimi, AM and Haqiq, A and Karray, H and Mousannif, H and BenHalima, M and Choo, YH and Ma, K} } @conference {Razafimampianina201595, title = {A preliminary study on indicator framework for enterprise, based on COBIT 5 processes and SOA approach}, booktitle = {Proceedings of the 2015 5th World Congress on Information and Communication Technologies, WICT 2015}, year = {2015}, note = {cited By 0}, pages = {95-100}, abstract = {Organizations become dependent on Information Technology (IT) to fulfill their corporate aims, meet their business needs and deliver value to customers. For effective and efficient utilization of IT, we intend to contribute to the alignment between IT and organizational strategies. The challenge is to make the enterprise and its Information System (IS) as responsive as possible within the regard to changes in enterprise while taking into account the enterprise operational performance. When a change happens or a new opportunity comes, organizations do not know which assets are linked to which business processes and which services, especially IT services, to bring up first and which can wait until later. Our principal aim is to propose an indicator framework to track and control business-IT alignment. However, this paper is a preliminary study on this framework. We are inspired by COBIT 5 processes as indicators and believe that the Service-Oriented Architecture (SOA) applied to these processes interlinks and can interact well the different processes. The validity and applicability of our theoretical study will be evaluated for future work. {\textcopyright} 2015 IEEE.}, doi = {10.1109/WICT.2015.7489652}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979761850\&doi=10.1109\%2fWICT.2015.7489652\&partnerID=40\&md5=1edfd0e5a575bd0443e4ef7a8c81b06a}, author = {Razafimampianina, R.M. and Nouinou, S. and Doukkali, A.S. and Regragui, B.} } @article {Bensitel2015206, title = {Secure data in cloud computing using homomorphic encryption}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {82}, number = {2}, year = {2015}, note = {cited By 0}, pages = {206-211}, abstract = {The emergence of cloud computing and cyber-physical systems made of security in processing data a major challenge. In order to ensure privacy and confidentiality of the data being manipulated, the use of cryptography is widely used today. In 2009, C. Gentry proposed the first fully homomorphic cryptosystem, to perform calculations on data previously encrypted without having to decrypt. This progress has allowed the opening of many industrial and research perspectives. However, despite recent progress, many limitations remain today on the lack of performance of these systems and their strong memory requirements. In this paper we focus on cloud computing along with its various security and privacy issues, we describe the role of homomorphic encryption scheme for ensuring data privacy and compare its types based on different characteristics. {\textcopyright} 2005-2015 JATIT \& LLS.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84950315880\&partnerID=40\&md5=62cb74290f6540e4888cf8b681e3cc9c}, author = {Bensitel, Y.a and Romadi, R.b} } @conference {ElBajta2015197, title = {Software cost estimation for global software development: A systematic map and review study}, booktitle = {ENASE 2015 - Proceedings of the 10th International Conference on Evaluation of Novel Approaches to Software Engineering}, year = {2015}, note = {cited By 1}, pages = {197-206}, abstract = {Software cost estimation plays a central role in the success of software project management in the context of global software development (GSD). The importance of mastering software cost estimation may appear to be obvious. However, as regards the issue of customer satisfaction, end-users are often unsatisfied with software project management results. In this paper, a systematic mapping study (SMS) is carried out with the aim of summarising software cost estimation in the context of GSD research by answering nine mapping questions. A total, of 16 articles were selected and classified according to nine criteria: publication source, publication year, research type, research approach, contribution type, software cost estimation techniques, software cost estimation activity, cost drivers and cost estimation performances for GSD projects. The results show that the interest in estimating software cost for GSD projects has increased in recent years and reveal that conferences are the most frequently targeted publications. Most software cost estimation for GSD research has focused on theory. The dominant contribution type of software cost estimation for GSD research is that of models, while the predominant activity was identified as being software development cost. Identifying empirical solutions to address software cost estimation for GSD is a promising direction for researchers.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84933555636\&partnerID=40\&md5=3e6ff23ed380cdb81d078b9b47e09964}, author = {El Bajta, M.a and Idri, A.a and Fern{\'a}ndez-Alem{\'a}n, J.L.b and Ros, J.N.b and Toval, A.b} } @conference { ISI:000380403000023, title = {Software Cost Estimation for Global Software Development A Systematic Map and Review Study}, booktitle = {ENASE 2015 - PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING}, year = {2015}, note = {10th International Conference on Evaluation of Novel Approaches to Software Engineering, Barcelona, SPAIN, APR 29-30, 2015}, pages = {197-206}, publisher = {Inst Syst \& Technol Information, Control \& Commun; Tech Council Software Engn; IEEE Comp Soc}, organization = {Inst Syst \& Technol Information, Control \& Commun; Tech Council Software Engn; IEEE Comp Soc}, abstract = {Software cost estimation plays a central role in the success of software project management in the context of global software development (GSD). The importance of mastering software cost estimation may appear to be obvious. However, as regards the issue of customer satisfaction, end-users are often unsatisfied with software project management results. In this paper, a systematic mapping study (SMS) is carried out with the aim of summarising software cost estimation in the context of GSD research by answering nine mapping questions. A total, of 16 articles were selected and classified according to nine criteria: publication source, publication year, research type, research approach, contribution type, software cost estimation techniques, software cost estimation activity, cost drivers and cost estimation performances for GSD projects. The results show that the interest in estimating software cost for GSD projects has increased in recent years and reveal that conferences are the most frequently targeted publications. Most software cost estimation for GSD research has focused on theory. The dominant contribution type of software cost estimation for GSD research is that of models, while the predominant activity was identified as being software development cost. Identifying empirical solutions to address software cost estimation for GSD is a promising direction for researchers.}, isbn = {978-9-8975-8143-4}, author = {El Bajta, Manal and Idri, Ali and Luis Fernandez-Aleman, Jose and Nicolas Ros, Joaquin and Toval, Ambrosio}, editor = {Filipe, J and Maciaszek, L} } @conference {Razouk2014, title = {Container stacking problem - Mathematic model and resolution}, booktitle = {ILS 2014 - 5th International Conference on Information Systems, Logistics and Supply Chain}, year = {2014}, note = {cited By 0}, abstract = {Terminals are the intersection point of the different transportation modes such a s: Marine, Road, rail, so it has a crucial role in optimizing the flow of containers. Efficient container handling at terminals is important in reducing transportation costs an d keeping shipping schedules [Henesey 2008]. In this paper, we will present different container terminals problems which be divide d on three level (strategic, Tactics, operational), the composition of a container terminal, and then we will introduce and resolve the container stacking problem (CSP) in the storage yards of terminals. We present the mathematical formulation to the CSP as a general modelization including the leave time of each container, the type of the storage goods and their weight. Which will be enriching later either by the problems related to the storage yard such as rehandling problems, interference between yard cranes or by other problems related to the other component of a container terminal such as internal transportation, loading/unloadin g containers from vessel, berth allocation. Those problems are related to all the resources in terminal operations, including quay cranes, yard cranes, storage space, an d terminals trucks. We try to define the different component on the terminal basing to Steenken and al [Steenken 04], Stahlbock and Vob [Stahlbock 08] and Yuxuan [Yuxuan 05]. We define a mathematical model for the CSP including some new constraints. Then we t ry to solve the problem by using a separation and evaluation method. For each one, the problem is formulated as a mathematical programming model. At the first level, the total number of containers to be placed in each storage block is set to three. The second level determines the number of containers, the number of stack, the percentage of the free positions associated with each vessel. Numerical runs show that with small and me dium instance the proposal method significantly reduces the total distance to transport the containers between their storage blocks and the vessel berthing locations. Once we will have the optimized solution, it can be the input of simulator software. So it can be reviewed and presented by this last, in order to see the implementation of this in reality.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84983165322\&partnerID=40\&md5=31107288e38643ed68e1eb90aaa0e2e0}, author = {Razouk, C.a and Benadada, Y.b and Boukachour, J.c} } @conference {Romadi2014, title = {Detection and recognition of road signs in a video stream based on the shape of the panels}, booktitle = {2014 9th International Conference on Intelligent Systems: Theories and Applications, SITA 2014}, year = {2014}, note = {cited By 0}, abstract = {In this paper, we present a robust approach of automatic detection and recognition of road signs in national roads, starting from the images resulting from a video stream taken by a camera embarked on a vehicle. Our approach is composed of three main phases: the first phase is to extract video stream images containing a circle or a triangle. This extraction is performed respectively by Hough transformation and Ramer-Douglas-Peucker filter, the second phase consists of extraction areas of the calculated image, in the previous phase. In the third and last phase, we proceed to a matching of the extracted image areas with signs of reference by comparison of interest points extracted by the SURF method and the matching method FLANN. {\textcopyright} 2014 IEEE.}, doi = {10.1109/SITA.2014.6847285}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84904598231\&doi=10.1109\%2fSITA.2014.6847285\&partnerID=40\&md5=62713d5791e141de32775236f194bb72}, author = {Romadi, M. and Oulah Haj Thami, R. and Romadi, R. and Chiheb, R.} } @conference { ISI:000346142800010, title = {Detection and recognition of road signs in a video stream based on the shape of the panels.}, booktitle = {2014 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA{\textquoteright}14)}, year = {2014}, note = {9th International Conference on Intelligent Systems - Theories and Applications (SITA), Inst Natl Postes \& Telecommunicat, Rabat, MOROCCO, MAY 07-08, 2014}, publisher = {IEEE; IEEE Morocco}, organization = {IEEE; IEEE Morocco}, abstract = {In this paper, we present a robust approach of automatic detection and recognition of road signs in national roads, starting from the images resulting from a video stream taken by a camera embarked on a vehicle. Our approach is composed of three main phases: the first phase is to extract video stream images containing a circle or a triangle. This extraction is performed respectively by Hough transformation and Ramer-Douglas-Peucker filter, the second phase consists of extraction areas of the calculated image, in the previous phase. In the third and last phase, we proceed to a matching of the extracted image areas with signs of reference by comparison of interest points extracted by the SURF method and the matching method FLANN.}, isbn = {978-1-4799-3566-6}, author = {Romadi, Mohammed and Oulahhajthami, Rachid and Romadi, Rahal and Chiheb, Raddouane} } @article {Zoukkari2014617, title = {E-readiness: A novel approach for indicators measurements estimation and prediction}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {69}, number = {3}, year = {2014}, note = {cited By 0}, pages = {617-631}, abstract = {E-Readiness is an assessment process for the ICT (Information and Communication Technologies) availability and use in a country. It consists in the calculation of a composite indicator based on a conceptual framework related to ICT aspects. The assessment report is used in E-Strategy to formulate action plans for e-Readiness index development. Several approaches are used for e-Readiness since the end of nineties; these approaches lack flexibility and require frequent and precise measurements. Thus, two issues are addressed in this paper: the missing measurements estimation problem and the lack of e-Strategy formulation assistance and simulation tools and approaches. Indeed, we propose in this paper an approach to define the transition matrix of the e-Readiness state equation based on a layered model. This construction leads to a state model related to the e-Readiness dynamic system and then is used with KALMAN Filter to cover the two addressed issues. Indeed, the commands variables are indicators that can be manipulated by e-Strategy stakeholder and the KALMAN filter estimation and prediction functions are used as a simulator. For validation, we constructed a model based on the I2010 e-Readiness initiative and we tested the convergence of the model and its prediction function. Results are encouraging since the tested model prediction function converges in 24 cases out of 27 (89\%). {\textcopyright} 2005 - 2014 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84914147680\&partnerID=40\&md5=1dff7bf1d6cdfbb8714e6ace7d43746d}, author = {Zoukkari, N.B.a and Doukkali, A.b and Regragui, B.b} } @conference { ISI:000354299300007, title = {Model and Application Architecture Indicators of Evaluation the Enterprise Architecture}, booktitle = {NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2}, series = {Advances in Intelligent Systems and Computing}, volume = {276}, year = {2014}, note = {World Conference on Information Systems and Technologies (WorldCIST), Funchal, PORTUGAL, APR 15-18, 2014}, pages = {63-71}, abstract = {Enterprise Architecture EA provides a {\textquoteleft}{\textquoteleft}knowledge base and support for decision making within the enterprise and it serves as the blueprint of current situation and strategy for future directions of the enterprise{{\textquoteright}{\textquoteright}}. The planning and modeling aspect of EA is already fairly well covered in the literature, while the evaluation and the attributes of EA quality have attracted less interest and yet enterprise architecture quality has been perceived as a prerequisite for realizing its benefits {[}6]. The principle goals of EA evaluation are to document the significance of the EA to decision makers, and to identify the development needs of the EA. However it is very difficult to find a complete method of evaluation in term of indicators of evaluation and which ensures the follow-up of all the stages of development of the architecture of company. This article presents a generic model of evaluation enterprise architecture. We do not want to use attributes directly because the model definition could vary in different organizations. Therefore, we introduce this artifact as an intermediate layer as not to limit the flexibility of evaluation.}, isbn = {978-3-319-05948-8; 978-3-319-05947-1}, issn = {2194-5357}, doi = {10.1007/978-3-319-05948-8\_7}, author = {Lakhrouit, Jihane and Baina, Karim and Benali, Khalid}, editor = {Rocha, A and Correia, AM and Tan, FB and Stroetmann, KA} } @conference {Routaib2014, title = {Modeling and evaluating a cloudlet-based architecture for Mobile Cloud Computing}, booktitle = {2014 9th International Conference on Intelligent Systems: Theories and Applications, SITA 2014}, year = {2014}, note = {cited By 0}, abstract = {With the rising popularity of Internet-enabled mobile devices, users are increasingly demanding better quality of service (QoS). However, the resources of these devices and their connectivity levels remain insufficient, even though they are improving, for offering acceptable levels of QoS to users. Cloud computing infrastructures offer large and scalable resources that allow shifting the physical location of computation and storage to the cloud. Nevertheless, the integration of mobile computing with cloud computing would not guarantee adequate levels of service for mobile users. It rather delivers scalability at the cost of higher delay and higher power consumption on the mobile device. Instead, using local resources based on users geographical locations has the potential to improve the performance and QoS for mobile users. In this paper, we present and study a centralized architecture that relies on the concept of local clouds, cloudlets, to leverage the geographical proximity of resources to mobile users and offer them a better user experience. We use a continuous time Markov-chain (CTMC) to model the different nodes of the architecture: user nodes, cloudlets, and the main cloud. We estimate the delay incurred in the proposed architecture by simulating search engine queries generated by mobile users using the CTMC state models. Initial simulation results show that the usage of a cloudlet-based architecture especially centralized architecture has an efficient gains in terms of latency delay and synchronisation mechanisms. {\textcopyright} 2014 IEEE.}, doi = {10.1109/SITA.2014.6847290}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84904645627\&doi=10.1109\%2fSITA.2014.6847290\&partnerID=40\&md5=54ed4186648b2b2f3a5de1747850ad4d}, author = {Routaib, H.a and Badidi, E.b and Elmachkour, M.a and Sabir, E.c and Elkoutbi, M.a} } @conference { ISI:000346142800015, title = {Modeling and Evaluating a Cloudlet-based Architecture for Mobile Cloud Computing}, booktitle = {2014 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA{\textquoteright}14)}, year = {2014}, note = {9th International Conference on Intelligent Systems - Theories and Applications (SITA), Inst Natl Postes \& Telecommunicat, Rabat, MOROCCO, MAY 07-08, 2014}, publisher = {IEEE; IEEE Morocco}, organization = {IEEE; IEEE Morocco}, abstract = {With the rising popularity of Internet-enabled mobile devices, users are increasingly demanding better quality of service (QoS). However, the resources of these devices and their connectivity levels remain insufficient, even though they are improving, for offering acceptable levels of QoS to users. Cloud computing infrastructures offer large and scalable resources that allow shifting the physical location of computation and storage to the cloud. Nevertheless, the integration of mobile computing with cloud computing would not guarantee adequate levels of service for mobile users. It rather delivers scalability at the cost of higher delay and higher power consumption on the mobile device. Instead, using local resources based on users geographical locations has the potential to improve the performance and QoS for mobile users. In this paper, we present and study a centralized architecture that relies on the concept of local clouds, cloudlets, to leverage the geographical proximity of resources to mobile users and offer them a better user experience. We use a continuous time Markov-chain (CTMC) to model the different nodes of the architecture: user nodes, cloudlets, and the main cloud. We estimate the delay incurred in the proposed architecture by simulating search engine queries generated by mobile users using the CTMC state models. Initial simulation results show that the usage of a cloudlet-based architecture especially centralized architecture has an efficient gains in terms of latency delay and synchronisation mechanisms.}, isbn = {978-1-4799-3566-6}, author = {Routaib, Hayat and Elmachkour, Mouna and Sabir, Essaid and Badidi, Elarbi and Elkoutbi, Mohammed} } @conference {Rhanoui2014, title = {A multilevel contract model for dependable Feature-Oriented components}, booktitle = {2014 9th International Conference on Intelligent Systems: Theories and Applications, SITA 2014}, year = {2014}, note = {cited By 0}, abstract = {Feature-Oriented System Development is a promising and recent approach for developing domain-specific component-based systems. To be adopted in a safety-critical environment it must handle dependability requirements and offer mechanisms to ensure the reliability level of the components and the system. For this purpose, the contract-based approach is a lightweight formal method for designing and specifying systems{\textquoteright} requirements, it can be introduced in an early stage during the design phase. In this paper, we present a multilevel contract model and a domain-specific modeling language that aims to address reliability and quality issues for component-based systems by expressing and specifying a set of its properties and constraints. {\textcopyright} 2014 IEEE.}, doi = {10.1109/SITA.2014.6847278}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84904596650\&doi=10.1109\%2fSITA.2014.6847278\&partnerID=40\&md5=6f574de296778d6b1ed4ff898fc66eb1}, author = {Rhanoui, M. and El Asri, B.} } @conference { ISI:000346142800003, title = {A Multilevel Contract Model for Dependable Feature-Oriented Components}, booktitle = {2014 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA{\textquoteright}14)}, year = {2014}, note = {9th International Conference on Intelligent Systems - Theories and Applications (SITA), Inst Natl Postes \& Telecommunicat, Rabat, MOROCCO, MAY 07-08, 2014}, publisher = {IEEE; IEEE Morocco}, organization = {IEEE; IEEE Morocco}, abstract = {Feature-Oriented System Development is a promising and recent approach for developing domain-specific component-based systems. To be adopted in a safety-critical environment it must handle dependability requirements and offer mechanisms to ensure the reliability level of the components and the system. For this purpose, the contract-based approach is a lightweight formal method for designing and specifying systems{\textquoteright} requirements, it can be introduced in an early stage during the design phase. In this paper, we present a multilevel contract model and a domain-specific modeling language that aims to address reliability and quality issues for component-based systems by expressing and specifying a set of its properties and constraints.}, isbn = {978-1-4799-3566-6}, author = {Rhanoui, Maryem and El Asri, Bouchra} } @conference { ISI:000366666800017, title = {Optimal Buffer Management Policies in DTNs: A POMDP Approach}, booktitle = {2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)}, series = {IEEE International Conference on Communications}, year = {2014}, note = {IEEE International Conference on Communications (ICC), Sydney, AUSTRALIA, JUN 10-14, 2014}, pages = {94-99}, publisher = {IEEE}, organization = {IEEE}, abstract = {Using Delay Tolerant Networks (DTNs) would facilitate the connection of devices and areas across the world that are under-served by current networks. The DTNs are based on the concept of store-carry-and-forward protocols. A node may store a message in its buffer and carry it for a short or a long period of time, until an appropriate forwarding opportunity arises. A critical challenge is to determine routes through the network without even having an end-to-end connection. In order to increase the probability of message delivery, a known approach is implemented using epidemic message replication. This combination of long-term storage and message replication imposes a high storage and bandwidth overhead. Thus, efficient scheduling and dropping policies are necessary to decide which messages should be discarded when nodes{\textquoteright} buffers operate close to their capacity. If a relay buffer is full and needs to store a new packet, it has to decide either to keep the current message or to drop it. This decision depends on the number of transmissions of the message in its buffer and the message which has just arrived. In this paper, a Partially Observed Markov Decision Process (POMDP) framework is proposed to solve the problem of buffer management in DTNs. This modeling technique predicts some properties of the optimal buffer management policy. In addition, numerical examples are presented to illustrate the findings.}, isbn = {978-1-4799-2003-7}, issn = {1550-3607}, author = {Rahmouni, Imane and El Kamili, Mohamed and El Fenni, Mohammed Raiss and Omari, Lahcen and Kobbane, Abdellatif}, editor = {Jamalipour, A and Deng, DJ} } @conference {Rahmouni201494, title = {Optimal buffer management policies in DTNs: A POMDP approach}, booktitle = {2014 IEEE International Conference on Communications, ICC 2014}, year = {2014}, note = {cited By 0}, pages = {94-99}, abstract = {Using Delay Tolerant Networks (DTNs) would facilitate the connection of devices and areas across the world that are under-served by current networks. The DTNs are based on the concept of store-carry-and-forward protocols. A node may store a message in its buffer and carry it for a short or a long period of time, until an appropriate forwarding opportunity arises. A critical challenge is to determine routes through the network without even having an end-to-end connection. In order to increase the probability of message delivery, a known approach is implemented using epidemic message replication. This combination of long-term storage and message replication imposes a high storage and bandwidth overhead. Thus, efficient scheduling and dropping policies are necessary to decide which messages should be discarded when nodes{\textquoteright} buffers operate close to their capacity. If a relay buffer is full and needs to store a new packet, it has to decide either to keep the current message or to drop it. This decision depends on the number of transmissions of the message in its buffer and the message which has just arrived. In this paper, a Partially Observed Markov Decision Process (POMDP) framework is proposed to solve the problem of buffer management in DTNs. This modeling technique predicts some properties of the optimal buffer management policy. In addition, numerical examples are presented to illustrate the findings. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICC.2014.6883301}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84906995806\&doi=10.1109\%2fICC.2014.6883301\&partnerID=40\&md5=382f58d0b8f3dc6541db001ac2f98769}, author = {Rahmouni, I.a and Kamili, M.E.a and Fenni, M.R.E.b and Omari, L.a and Kobbane, A.c} } @conference {Raiss-El-Fenni20141742, title = {POMDP game framework for service providers inciting mobile users}, booktitle = {2014 IEEE International Conference on Communications, ICC 2014}, year = {2014}, note = {cited By 1}, pages = {1742-1747}, abstract = {The trend today is to access Internet through mobile devices, and people start using smartphones more than computers. This kind of services requires frequent updates through small messages from editors like in social networks. Although the use of such applications is subject to fees and consumes energy from limited batteries of smartphones. If a user activates his mobile device and has a useful contact opportunity with an access point, an update is received at the expense of monetary and energy costs. Thus, users face a tradeoff between such costs and their utilities. The goal of this paper is to show how a user can cope with such a tradeoff, by deriving a threshold policies. We consider the multi-user case, where each user try to maximize its reward based on a bonus given by the provider. We study the optimal policy in the Nash equilibrium. An optimal policy consists of deciding, based on the age of the last message received and the availability of access points whether to activate the mobile device or not. We model our problem using a POMDP with an average reward criterion. The accuracy of our model is illustrated through simulations. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICC.2014.6883574}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84906996789\&doi=10.1109\%2fICC.2014.6883574\&partnerID=40\&md5=d80a5db4123fdf313b32fe7931b128c4}, author = {Raiss-El-Fenni, M.a and El-Kamili, M.a and Ben-Othman, J.b and Kobbane, A.c} } @conference { ISI:000366666801147, title = {POMDP Game Framework for Service Providers Inciting Mobile Users}, booktitle = {2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)}, series = {IEEE International Conference on Communications}, year = {2014}, note = {IEEE International Conference on Communications (ICC), Sydney, AUSTRALIA, JUN 10-14, 2014}, pages = {1742-1747}, publisher = {IEEE}, organization = {IEEE}, abstract = {The trend today is to access Internet through mobile devices, and people start using smartphones more than computers. This kind of services requires frequent updates through small messages from editors like in social networks. Although the use of such applications is subject to fees and consumes energy from limited batteries of smartphones. If a user activates his mobile device and has a useful contact opportunity with an access point, an update is received at the expense of monetary and energy costs. Thus, users face a tradeoff between such costs and their utilities. The goal of this paper is to show how a user can cope with such a tradeoff, by deriving a threshold policies. We consider the multi-user case, where each user try to maximize its reward based on a bonus given by the provider. We study the optimal policy in the Nash equilibrium. An optimal policy consists of deciding, based on the age of the last message received and the availability of access points whether to activate the mobile device or not. We model our problem using a POMDP with an average reward criterion. The accuracy of our model is illustrated through simulations.}, isbn = {978-1-4799-2003-7}, issn = {1550-3607}, author = {Raiss-el-Fenni, Mohammed and El-Kamili, Mohamed and Ben-Othman, Jalel and Kobbane, Abdellatif}, editor = {Jamalipour, A and Deng, DJ} } @article {9898253620141001, title = {Supporting collaborative development using process models: a tooled integration-focused approach.}, journal = {Journal of Software: Evolution \& Process}, volume = {26}, number = {10}, year = {2014}, pages = {890 - 909}, abstract = {ABSTRACT Collaboration in software engineering projects is usually intensive and requires adequate support by well-integrated tools. However, process-centered software engineering environments (PSEE) have traditionally been designed to exploit integration facilities in other tools, while offering themselves little to no such facilities. This is in line with the vision of the PSEE as the central orchestrator of project support tools. We argue that this view has hindered the widespread adoption of process-based collaboration support tools by incurring too much adoption and switching costs. We propose a new process-based collaboration support architecture, backed by a process metamodel, that can easily be integrated with existing tools. The proposed architecture revolves around the central concepts of {\textquoteright}deep links{\textquoteright} and {\textquoteright}hooks{\textquoteright}. Our approach is validated by analyzing a collection of open-source projects, and integration utilities based on the implemented process model server have been deve}, keywords = {Client/server computing, collaboration, Computer software, Computer software development, process-support, Software architecture, Software engineering, Switching costs, tool integration}, issn = {20477473}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=98982536\&site=ehost-live}, author = {Kedji, Komlan Akp{\'e}dj{\'e} and Lbath, Redouane and Coulette, Bernard and Nassar, Mahmoud and Baresse, Laurent and Racaru, Florin} } @conference { ISI:000380387700115, title = {Towards a Variable Non-Functional Requirements Integration for Component-Based Product Line}, booktitle = {2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS)}, year = {2014}, note = {2014 Second World Conference on Complex Systems (WCCS), Agadir, MOROCCO, NOV 10-12, 2014}, pages = {146-151}, publisher = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, organization = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, abstract = {Software Product Line and Component-Based Software Engineering are two expanding paradigms for developing critical and complex systems. Therefore, these two paradigms seem have complementary strengths. So, significant benefits can be gained from their integration. Despite the fact that Non-Functional Requirements (such as security, performance and reliability) are critical to software systems, and they must be taken into account at early stage of software development life cycle and should be explicitly specified as well as functional requirements; these NFR are overlooked in Software Product line and Component-Based Software Development Processes. So, our main objective is to discuss some recent approaches in the field and to propose a new extension to Software Product Line processes that supports Component-Based Approaches, and integrates Non-Functional Requirement in domain requirements stage.}, isbn = {978-1-4799-4647-1}, author = {Hammani, Fatima Zahra and Rhanoui, Maryem and El Asri, Bouchra} } @conference {Hammani2014146, title = {Towards a variable non-functional requirements integration for component-based product line: A generic approach}, booktitle = {2014 2nd World Conference on Complex Systems, WCCS 2014}, year = {2014}, note = {cited By 0}, pages = {146-151}, abstract = {Software Product Line and Component-Based Software Engineering are two expanding paradigms for developing critical and complex systems. Therefore, these two paradigms seem have complementary strengths. So, significant benefits can be gained from their integration. Despite the fact that Non-Functional Requirements (such as security, performance and reliability) are critical to software systems, and they must be taken into account at early stage of software development life cycle and should be explicitly specified as well as functional requirements; these NFR are overlooked in Software Product line and Component-Based Software Development Processes. So, our main objective is to discuss some recent approaches in the field and to propose a new extension to Software Product Line processes that supports Component-Based Approaches, and integrates Non-Functional Requirement in domain requirements stage. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICoCS.2014.7060992}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84988286060\&doi=10.1109\%2fICoCS.2014.7060992\&partnerID=40\&md5=3c43beb6d08dd3ee03dc69958f9d5ee7}, author = {Hammani, F.Z. and Rhanoui, M. and El Asri, B.} } @conference { ISI:000352498700056, title = {Track Report of CSP Track of WETICE-2014}, booktitle = {2014 IEEE 23RD INTERNATIONAL WETICE CONFERENCE (WETICE)}, year = {2014}, note = {23rd IEEE International Conference on Enabling Technologies, Infrastructure for Collaborative Enterprises (WETICE), Parma, ITALY, JUN 23-25, 2014}, pages = {293}, publisher = {IEEE; IEEE Comp Soc; W Virginia Univ; FoCAS EU FP7; IEEE Syst Man \& Cybernet Soc Italian Chapter}, organization = {IEEE; IEEE Comp Soc; W Virginia Univ; FoCAS EU FP7; IEEE Syst Man \& Cybernet Soc Italian Chapter}, isbn = {978-1-4799-4249-7}, author = {Jamoussi, Yassine and Coulette, Bernard and Nassar, Mahmoud}, editor = {Reddy, SM} } @conference { ISI:000345780300021, title = {Automatic Generation of Ontology from Data Models: A Practical Evaluation of Existing Approaches}, booktitle = {2013 IEEE SEVENTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS)}, series = {International Conference on Research Challenges in Information Science}, year = {2013}, note = {7th IEEE International Conference on Research Challenges in Information Science (RCIS), Paris, FRANCE, MAY 29-31, 2013}, publisher = {IEEE; Univ Paris 1; Ctr Rech \& Informatique; IEEE French Sect; Cyrius Consulting; IEEE French CS Joint Chapter}, organization = {IEEE; Univ Paris 1; Ctr Rech \& Informatique; IEEE French Sect; Cyrius Consulting; IEEE French CS Joint Chapter}, abstract = {Nowadays, ontology as a knowledge sharing approach plays an important role in semantic interoperability of enterprise applications (EAs). However, the manual process of ontology construction requires deep understanding of the domain. This approach is difficult, expensive and time-consuming. To overcome the knowledge acquisition bottleneck, ontology learning field aims to provide automatic and semi-automatic approaches for ontology generation. Several approaches have been emerged for this purpose. In this paper, we present a practical study of methods that take data models as input to the learning process. The main contributions of this work are: (i) the evaluation of the availability of existing approaches for (semi-)automatic generation of ontology from data models; (ii) the evaluation of tools according to their operability; and (iii) the evaluation of the resulting ontologies to assess their quality in supporting semantic interoperability. Our goal through this study is to find a response to the question: Is there a tool that extracts (semi-) automatically an application ontology from data models, intended for use in semantic interoperability?.}, isbn = {978-1-4673-2912-5}, issn = {2151-1349}, author = {El Idrissi, Bouchra and Baina, Salah and Baina, Karim}, editor = {Wieringa, R and Nurcan, S and Rolland, C and Cavarero, JL} } @article {Bendriss2013307, title = {Automatic selection of filtering devices in a distributed intrusion prevension system}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {53}, number = {2}, year = {2013}, note = {cited By 0}, pages = {307-311}, abstract = {We presented in a previous article [1] a distributed intrusion prevention system based on honeypots for collecting malicious data. Among important questions to handle there is the choice of filtering device on which a filtering rule has to be applied. In this paper we propose a solution which will allow automatic selection of filtering device in the distributed IPMS platform. These devices will be configured to block unauthorized traffic. This solution must ensure full integration with the IPMS architecture. {\textcopyright} 2005 - 2013 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84880649114\&partnerID=40\&md5=65a999baae635cb70cfb3cfd71d7a506}, author = {Bendriss, E. and Regragui, B.} } @conference { ISI:000350287800020, title = {Detection and Recognition of Road Signs}, booktitle = {2013 3RD INTERNATIONAL SYMPOSIUM ISKO-MAGHREB}, year = {2013}, note = {ISKO-Maghreb 3rd International Symposium, Marrakech, MOROCCO, NOV 08-09, 2013}, publisher = {ISKO}, organization = {ISKO}, abstract = {In this paper, we present an application for the detection and recognition of Moroccan road signs together with their positions in video sequences taken by a mobile scanning vehicle in rural areas. Our approach is based on processing the operations of pictures: morphology, segmentation, edge detection and object recognition. The application runs on an algorithm which consists of five main steps: input (pre-recording video stream), processing of video keyframes, edge detection, detection of geometric shapes known panels, recognizing the meaning and the position of the panel detected.}, isbn = {978-1-4799-3392-1}, author = {Romadi, Mohammed and Oulad Haj Thami, Rachid and Chiheb, Raddouane and Romadi, Rahal} } @conference {Romadi2013, title = {Detection and recognition of road signs}, booktitle = {2013 3rd International Symposium ISKO-Maghreb}, year = {2013}, note = {cited By 0}, abstract = {In this paper, w e present a n application for t h e detection and recognition of Moroccan road signs together with their positions in video sequences taken by a mobile scanning vehicle in rural areas. Our approach is based on processing t h e operations of pictures: morphology, segmentation, edge detection and object recognition. The application runs on an algorithm which consists of five main steps: input (pre-recording video stream), processing of video keyframes, edge detection, detection of geometric shapes known panels, recognizing the meaning and the position of the panel detected. {\textcopyright} 2013 IEEE.}, doi = {10.1109/ISKO-Maghreb.2013.6728127}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84894208510\&doi=10.1109\%2fISKO-Maghreb.2013.6728127\&partnerID=40\&md5=1c3a22fd74b253e4957628821128d02c}, author = {Romadi, M. and Haj Thami, R.O. and Chiheb, R. and Romadi, R.} } @article {Bendriss2013792, title = {Honeypot based intrusion management system: From a passive architecture to an ips system}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {47}, number = {2}, year = {2013}, note = {cited By 1}, pages = {792-797}, abstract = {In this paper, we are presenting an Intrusion Prevention System (IPS) based on multiple sensors in the network. These sensors are in fact honeypots built using honeyd. Honeyd is a high level honeypot which is very light and which is offering a lot of possibilities to get the most of information gathered about attackers in general. In fact, we are presenting a solution to go from passive and isolated sensors to a collaborative platform to help prevent intrusions by analyzing all collected data. To be able to do this, honeyd2db module was developed to enable honeyd to log its data into a database instead of a local file to the sensor. This aggregation of data from all sensors give us the possibility to analyze all collected logs as a hole and come out with a decision (deny network traffic on a firewall for example) using any of the known methods of data analysis. {\textcopyright} 2005 - 2013 JATIT \& LLS.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84872851179\&partnerID=40\&md5=64123c156efa34310464200f371b9f29}, author = {Bendriss, E. and Regragui, B.} } @article {10115338520131101, title = {A New Feedback-Analysis based Reputation Algorithm for E-Commerce Communities.}, journal = {E-Ti: E-Review in Technologies Information}, number = {7}, year = {2013}, pages = {46 - 58}, abstract = {Dealing with the ever-growing content generated by users in the e-commerce applications, Trust Reputation Systems (TRS) are widely used online to provide the trust reputation of each product using the customers{\textquoteright} ratings. However, there is also a good number of online customer reviews and feedback that must be used by the TRS. As a result, we propose in this work a new architecture for TRS in e-commerce application which includes feedback{\textquoteright} mining in order to calculate reputation scores. This architecture is based on an intelligent layer that proposes to each user (i.e. {\guillemotleft}feedback provider{\guillemotright}) who has already given his recommendation, a collection of prefabricated feedback to like or dislike. Then the proposed reputation algorithm calculates the trust degree of the user, the feedback{\textquoteright}s trustworthiness and generates the global reputation score of the product according to his {\guillemotleft}likes{\guillemotright} and {\guillemotleft}dislikes{\guillemotright}. In this work, we present also a state of the art of text mining tools and algorithms that can}, keywords = {Algorithms, analyse de sentiment, e-commerce, Electronic commerce, La confiance, le e-commerce, le textmining, les feedback textuels, les syst{\`e}mes de r{\'e}putation, Reliability (Personality trait), Sentiment analysis, text mining, Text mining (Information retrieval), textual feedback, Trust, Trust Reputation Systems, Virtual communities}, issn = {11148802}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=101153385\&site=ehost-live}, author = {Rahimi, Hasnae and El Bakkali, Hanan} } @conference { ISI:000327787500003, title = {A New Reputation Algorithm for Evaluating Trustworthiness in E-Commerce Context}, booktitle = {2013 NATIONAL SECURITY DAYS (JNS3)}, year = {2013}, note = {3rd National Security Days (JNS), Mohammed V Souissi Unvi, Rabat, MOROCCO, APR 26-27, 2013}, publisher = {Assoc Marocaine ConfiAnace Numerique; Ecole Nationale Superieure Informatique \& Analyse Syst; Informat Secur Res Team; IEEE Morocco Sect; Bank Al Maghrib; Natl Ctr Sci \& Technol Res}, organization = {Assoc Marocaine ConfiAnace Numerique; Ecole Nationale Superieure Informatique \& Analyse Syst; Informat Secur Res Team; IEEE Morocco Sect; Bank Al Maghrib; Natl Ctr Sci \& Technol Res}, abstract = {Thanks to their ability to detect fraud, poor quality and ill-intentioned feedbacks and scores in online environments, robust Trust Reputation Systems (TRS) provide actionable information to support relying parties taking the right decision in any electronic transaction. In fact, as security providers in e-services, TRS have to faithfully calculate the most trustworthy score for a targeted product or service. Thus, TRS must rely on a robust architecture and suitable algorithms that are able to select, store, generate and classify scores and feedbacks. In this work, we propose a new architecture for TRS in e-commerce application which includes feedbacks{\textquoteright} analysis in its treatment of scores. In fact, this architecture is based on an intelligent layer that proposes to each user (i.e. {\textquoteleft}{\textquoteleft}feedback provider{{\textquoteright}{\textquoteright}}) who has already given his recommendation, a collection of prefabricated feedbacks summarizing other users{\textquoteright} textual feedbacks. A proposed algorithm is used by this architecture in order to calculate the trust degree of the user, the feedback{\textquoteright}s trustworthiness and generates the global reputation score of the product.}, isbn = {978-1-4799-0324-5}, author = {Rahimi, Hasnae and El Bakkali, Hanan} } @conference {Rahimi2013, title = {A new reputation algorithm for evaluating trustworthiness in e-commerce context}, booktitle = {2013 National Security Days - 3eme Edition Des Journees Nationales de Securite, JNS3}, year = {2013}, note = {cited By 3}, abstract = {Thanks to their ability to detect fraud, poor quality and ill-intentioned feedbacks and scores in online environments, robust Trust Reputation Systems (TRS) provide actionable information to support relying parties taking the right decision in any electronic transaction. In fact, as security providers in e-services, TRS have to faithfully calculate the most trustworthy score for a targeted product or service. Thus, TRS must rely on a robust architecture and suitable algorithms that are able to select, store, generate and classify scores and feedbacks. In this work, we propose a new architecture for TRS in e-commerce application which includes feedbacks{\textquoteright} analysis in its treatment of scores. In fact, this architecture is based on an intelligent layer that proposes to each user (i.e. {\textquoteright}feedback provider{\textquoteright}) who has already given his recommendation, a collection of prefabricated feedbacks summarizing other users{\textquoteright} textual feedbacks. A proposed algorithm is used by this architecture in order to calculate the trust degree of the user, the feedback{\textquoteright}s trustworthiness and generates the global reputation score of the product. {\textcopyright} 2013 IEEE.}, doi = {10.1109/JNS3.2013.6595455}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84884781815\&doi=10.1109\%2fJNS3.2013.6595455\&partnerID=40\&md5=ff700df7b3d03e86df3086edf016669d}, author = {Rahimi, H. and El Bakkali, H.} } @conference { ISI:000328097500045, title = {ROLE OF MODEL OF EXCELLENCE TO IMPROVE D-LEARNING PROJECTS}, booktitle = {QUALITY AND EFFICIENCY IN E-LEARNING, VOL 1}, series = {eLearning and Software for Education}, year = {2013}, note = {9th International Conference eLearning and Software for Education, Bucharest, ROMANIA, APR 25-26, 2013}, pages = {284-290}, publisher = {Games \& Learn Alliance; intuitext Grup SOFTWIN; ASCENDIA DESIGN; SAP; INSOFT Dev \& Consult; MAGUAY; Adv Technol Syst; PLAGIAT}, organization = {Games \& Learn Alliance; intuitext Grup SOFTWIN; ASCENDIA DESIGN; SAP; INSOFT Dev \& Consult; MAGUAY; Adv Technol Syst; PLAGIAT}, abstract = {Learning has always been a fertile ground for research aiming at facilitating access to information and content sharing, with the view towards knowledge, know-how and self-management skills. To this end, researchers interested in learning have striven to use technological innovation for the benefit of learning, we believe that the D-learning-project, added to the technological and pedagogical components involved, must take into account the guiding principles of Project Management as an unequivocally proven managerial practice. However, it is also possible to explore other niches that can ensure the success of this type of project. Total Quality Management (TQM) as a practice seems to be a managerial practice whose foundations are perfectly compatible with the characteristics of a D-learning project.}, issn = {2066-026X}, author = {Daoudi, Najima and Lemsalmi, Ikram}, editor = {Roceanu, I and Beligan, D and Ciolan, L and Radu, C} } @conference { ISI:000358736600029, title = {Software Quality Requirements: a systematic mapping study}, booktitle = {2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 1}, series = {Asia-Pacific Software Engineering Conference}, year = {2013}, note = {20th Asia-Pacific Software Engineering Conference (APSEC), Chulalongkorn Univ, Fac Engn, Dept Comp Engn, Bangkok, THAILAND, DEC 02-05, 2013}, pages = {231-238}, publisher = {Prov Elect Author; Metropolitan Elect Author; Thailand Convent \& Exhibit Bur; IEEE Comp Soc}, organization = {Prov Elect Author; Metropolitan Elect Author; Thailand Convent \& Exhibit Bur; IEEE Comp Soc}, abstract = {Software quality requirements (SQR) play a central role in software quality (SQ) success. The importance of mastering SQR can be seen as obvious; however, when it comes to customer satisfaction, end-users are often dissatisfied with SQ. In this paper, a systematic mapping study aims to summarize SQR research by answering nine mapping questions. In total, 51 articles were selected and classified according to multiple criteria: publication source, publication year, research type, research approach, contribution type of SQR literature, requirements engineering activity, well-known SQ model, software artifact and SQR type. The results show an increased interest in SQR research in recent years and reveal that conferences are the main SQR publication target. Most SQR research has used case studies. The dominant contribution type of SQR research is method while specification is the main requirements engineering activity identified. SQ models need to be more used for SQR identification. Design module and requirements documentation are the principal artifacts reported in SQR literature. External and internal SQR were the main SQR types addressed in literature. Identifying empirical solutions to address SQR is a promising research direction for researchers.}, isbn = {978-1-4799-2143-0}, issn = {1530-1362}, doi = {10.1109/APSEC.2013.40}, author = {Ouhbi, Sofia and Idri, Ali and Luis Fernandez-Aleman, Jose and Toval, Ambrosio}, editor = {Muenchaisri, P and Rothermel, G} } @conference { ISI:000326649800018, title = {Tracking multiple people in real time based on their trajectory}, booktitle = {2013 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, year = {2013}, note = {8th International Conference on Intelligent Systems - Theories and Applications (SITA), Ecole Mohammadia Ingenieurs, Rabat, MOROCCO, MAY 08-09, 2013}, publisher = {IEEE; IEEE Morocco Sect; Univ Mohammed V Agdal}, organization = {IEEE; IEEE Morocco Sect; Univ Mohammed V Agdal}, abstract = {In this article, we present a new method which allows tracking multiple people in real-time in a closed environment from their trajectory. The trajectory of each person is determined by his/her position occupied at each time t in order to trace the trajectory in real time. This method has the advantage of keeping track of people based on the combination of the method of the analysis of connected components and the points of interest detected by the method of Harris {[}6]. The position of these points in relation to the connected components can make the correspondence between the tracked people and connected components detected by subtracting the background. Then, the trajectory traversed by each person is determined from tracking the position of the center of gravity of the points of interest of each person.}, isbn = {978-1-4799-0299-6}, author = {Boutaina, Hdioud and Raj, Oulad and Rachid, Thami and Tirari Mohammed, El Raj} } @conference {Boutaina2013, title = {Tracking multiple people in real time based on their trajectory}, booktitle = {2013 8th International Conference on Intelligent Systems: Theories and Applications, SITA 2013}, year = {2013}, note = {cited By 0}, abstract = {In this article, we present a new method which allows tracking multiple people in real-time in a closed environment from their trajectory. The trajectory of each person is determined by his/her position occupied at each time t in order to trace the trajectory in real time. This method has the advantage of keeping track of people based on the combination of the method of the analysis of connected components and the points of interest detected by the method of Harris [6]. The position of these points in relation to the connected components can make the correspondence between the tracked people and connected components detected by subtracting the background. Then, the trajectory traversed by each person is determined from tracking the position of the center of gravity of the points of interest of each person. {\textcopyright} 2013 IEEE.}, doi = {10.1109/SITA.2013.6560801}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883056107\&doi=10.1109\%2fSITA.2013.6560801\&partnerID=40\&md5=13dab0da04760c12c97fabf6ab3d6bb3}, author = {Boutaina, H. and Rachid, O.H.T. and Mohammed, E.H.T.} } @conference { ISI:000358736600001, title = {On the Use of Software Quality Standard ISO/IEC9126 in Mobile Environments}, booktitle = {2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 1}, series = {Asia-Pacific Software Engineering Conference}, year = {2013}, note = {20th Asia-Pacific Software Engineering Conference (APSEC), Chulalongkorn Univ, Fac Engn, Dept Comp Engn, Bangkok, THAILAND, DEC 02-05, 2013}, pages = {1-8}, publisher = {Prov Elect Author; Metropolitan Elect Author; Thailand Convent \& Exhibit Bur; IEEE Comp Soc}, organization = {Prov Elect Author; Metropolitan Elect Author; Thailand Convent \& Exhibit Bur; IEEE Comp Soc}, abstract = {The capabilities and resources offered by mobile technologies are still far from those provided by fixed environments, and this poses serious challenges, in terms of evaluating the quality of applications operating in mobile environments. This article presents a study to help quality managers apply the ISO 9126 standard on software quality, particularly the External Quality model, to mobile environments. The influence of the limitations of mobile technologies are evaluated for each software quality characteristic, based on the coverage rates of its external metrics, which are themselves influenced by these limitations. The degrees of this influence are discussed and aggregated to provide useful recommendations to quality managers for their evaluation of quality characteristics in mobile environments. These recommendations are intended for mobile software in general and aren{\textquoteright}t targeted a specific ones. The External Quality model is especially valuable for assessing the Reliability, Usability, and Efficiency characteristics, and illustrates very well the conclusive nature of the recommendations of this study. However, more study is needed on the other quality characteristics, in order to determine the relevance of evaluating them in mobile environments.}, isbn = {978-1-4799-2143-0}, issn = {1530-1362}, doi = {10.1109/APSEC.2013.12}, author = {Idri, Ali and Moumane, Karima and Abran, Alain}, editor = {Muenchaisri, P and Rothermel, G} } @article {Zoukkari2012101, title = {E-Strategy formulation: A new approach based on a layered model}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {36}, number = {1}, year = {2012}, note = {cited By 1}, pages = {101-112}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84857185235\&partnerID=40\&md5=6ec655c0ef7c04077fd3b70d54e7b0ae}, author = {Zoukkari, N.B. and Doukkali, A. and Regragui, B.} } @conference {Bahtit20121, title = {Modeling of the process of ISO 27005 standard [Mod{\'e}lisation des processus de la norme ISO 27005]}, booktitle = {Proceedings of the 2nd National Days of Network Security and Systems, JNS2 2012}, year = {2012}, note = {cited By 0}, pages = {1-6}, doi = {10.1109/JNS2.2012.6249230}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84867093388\&doi=10.1109\%2fJNS2.2012.6249230\&partnerID=40\&md5=def7bdc4e881050b7aa353a371ee8ea5}, author = {Bahtit, H. and Regragui, B.} } @article {Enaanai2012113, title = {Noise abatement in the Arabic IRS results by applying a sentences morphosemantic filter (gene filter method)}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {42}, number = {1}, year = {2012}, note = {cited By 0}, pages = {113-121}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84867512204\&partnerID=40\&md5=2851a8dedc46b911edc6276bfd005dfe}, author = {Enaanai, A. and Doukkali, A. and Regragui, B.} } @conference {Rahimi201218, title = {State of the art of reputation systems in e-commerce [Etat de l{\textquoteright}art des syst{\`e}mes de r{\'e}putation en e-commerce]}, booktitle = {Proceedings of the 2nd National Days of Network Security and Systems, JNS2 2012}, year = {2012}, note = {cited By 0}, pages = {18-23}, doi = {10.1109/JNS2.2012.6249233}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84867055626\&doi=10.1109\%2fJNS2.2012.6249233\&partnerID=40\&md5=368c130ee772a86590d0ca7515f35412}, author = {Rahimi, H. and El Bakkali, H.} } @conference {Rahimi2012943, title = {Towards a new design for trust reputation system}, booktitle = {Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012}, year = {2012}, note = {cited By 0}, pages = {943-948}, doi = {10.1109/ICMCS.2012.6320285}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869784869\&doi=10.1109\%2fICMCS.2012.6320285\&partnerID=40\&md5=fe02a8d96505fdaaba1b2e568460d8f7}, author = {Rahimi, H. and El Bakkali, H.} } @conference { ISI:000310353000171, title = {Towards a New Design for Trust Reputation System}, booktitle = {2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2012}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Tangiers, MOROCCO, MAY 10-12, 2012}, pages = {943-948}, publisher = {Morocco Sect MTT/AP Joint Chapter}, organization = {Morocco Sect MTT/AP Joint Chapter}, abstract = {Trust is indispensible for any user of an e-service in order to make a decision before dealing with any transaction. That{\textquoteright}s the reason why, users and service providers need various and functional methods to build on-line trust reputation systems. This paper discusses the use of trust management and reputation systems in electronic transactions and particularly in e-commerce applications. It presents a survey of some existing trust reputation systems used in e-commerce applications. This survey proposes a new design for trust reputation systems (TRS) that focuses on the use of semantic feedbacks in order to calculate users{\textquoteright} recommendation weights and to classify them according to these weights. This paper highlights the importance of making the distinction between trustful feedbacks or ratings and distrustful ones. It proposes also some methods to follow and to put in practice in order to give the right weight to the right recommendations.}, isbn = {978-1-4673-1520-3}, author = {Rahimi, Hasnae and El Bakkali, Hanane}, editor = {Essaaidi, M and Zaz, Y} } @conference {Rhanoui2012377, title = {Towards contract-based approach for quality-driven Service Component Architecture}, booktitle = {2nd International Conference on Innovative Computing Technology, INTECH 2012}, year = {2012}, note = {cited By 0}, pages = {377-384}, doi = {10.1109/INTECH.2012.6457754}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84874497855\&doi=10.1109\%2fINTECH.2012.6457754\&partnerID=40\&md5=b34258865186cc7e811056d11b5ead41}, author = {Rhanoui, M. and Asri, B.E.} } @conference { ISI:000325229700068, title = {Towards Contract-Based Approach for Quality-Driven Service Component Architecture}, booktitle = {2012 SECOND INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH)}, year = {2012}, note = {2nd International Conference on Innovative Computing Technology (INTECH), Casablanca, MOROCCO, SEP 18-20, 2012}, pages = {377-384}, publisher = {IEEE UK \& RI Consumer Elect Chapter; IEEE Broadcast Technol Chapter; IEEE}, organization = {IEEE UK \& RI Consumer Elect Chapter; IEEE Broadcast Technol Chapter; IEEE}, abstract = {Service Component Architecture (SCA) is a recent approach and an industry standard for developing complex and distributed systems. Despite the growing research work it still lacks a formal basis for handling trust and reliability of quality-driven systems. In this paper we present main techniques and models for assuring quality and trustworthiness of component-based systems in general, and then we present and justify the choice of the design by contract approach that we adopted for the following of our research about SCA-based systems. Design by Contract is an approach of software design that aims to address reliability and quality issues in software development by expressing a set of its properties and constraints.}, isbn = {978-1-4673-2679-7}, author = {Rhanoui, Maryem and El Asri, Bouchra} } @article {Berbia201135, title = {Genetic Algorithm for decoding linear codes over awgn and fading channels}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {30}, number = {1}, year = {2011}, note = {cited By 0}, pages = {35-41}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84860407864\&partnerID=40\&md5=032b7cf7b41aa626071a6c25b09716cf}, author = {Berbia, H. and Elbouanani, F. and Romadi, R. and Benazza, H. and Belkasmi, M.} } @conference { ISI:000298603900010, title = {Interactive ontology evolution management using mutli-agent system A proposal for sustainability of semantic interoperability in SOA}, booktitle = {2011 20TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE)}, series = {IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises Proceedings}, year = {2011}, note = {20th IEEE International Workshops on Enabling Technologies - Infrastructure for Collaborative Enterprises (WETICE), Paris, FRANCE, JUN 27-29, 2011}, pages = {41-46}, publisher = {IEEE; IEEE Comp Soc Tech Comm Data Engn; W Virginia Univ, CERC; Telecom SudParis; IEEE Comp Soc; Samovar; Institut Telecom}, organization = {IEEE; IEEE Comp Soc Tech Comm Data Engn; W Virginia Univ, CERC; Telecom SudParis; IEEE Comp Soc; Samovar; Institut Telecom}, abstract = {this paper discusses a new approach towards ontology evolution management framework and relates it to the sustainability of semantic interoperability in SOA. Indeed, when the semantic representation of the service evolves, the interpretation of queries may change. Thus, it{\textquoteright}s often challenging to evaluate the results of the query. Sources of this problem include the lack of support for semantic evolution management in ontology-based service oriented systems, and the static nature of the mappings between ontologies in this environment. To address these issues, we have developed P(2)OManager, an interactive tool for ontology evolution management. This system allows the users to automatically create an ontology agent manager. This agent manages evolution on both ontology and mappings and communicates with other ontology agents to take them aware of all changes which may affect exchanges with their services. Examples illustrate how P(2)OManager can provide valuable support for ontology evolution management, when specific changes are provided.}, isbn = {978-0-7695-4410-6}, issn = {1524-4547}, doi = {10.1109/WETICE.2011.15}, author = {Slimani, Soumaya and Baina, Salah and Baina, Karim}, editor = {Reddy, S and Tata, S} } @conference {Elbhiri2010, title = {Developed Distributed Energy-Efficient Clustering (DDEEC) for heterogeneous wireless sensor networks}, booktitle = {2010 5th International Symposium on I/V Communications and Mobile Networks, ISIVC 2010}, year = {2010}, note = {cited By 2}, doi = {10.1109/ISVC.2010.5656252}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-78651495359\&doi=10.1109\%2fISVC.2010.5656252\&partnerID=40\&md5=04c6f29644071a785006aab6b93c9c27}, author = {Elbhiri, B. and Rachid, S. and El Fkihi, S. and Aboutajdine, D.} } @conference {Najima20101691, title = {MADAR learning: An interoperable environment for E\&M learning}, booktitle = {2010 IEEE Education Engineering Conference, EDUCON 2010}, year = {2010}, note = {cited By 0}, pages = {1691-1696}, doi = {10.1109/EDUCON.2010.5492405}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-77954894545\&doi=10.1109\%2fEDUCON.2010.5492405\&partnerID=40\&md5=e8086bc9bad243dfa3e8365a727850c3}, author = {Najima, D. and Rachida, A.} } @conference {Rouijel2010, title = {A new approach for wireless communication systems based on IDMA technique}, booktitle = {2010 5th International Symposium on I/V Communications and Mobile Networks, ISIVC 2010}, year = {2010}, note = {cited By 0}, doi = {10.1109/ISVC.2010.5656727}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-78651500725\&doi=10.1109\%2fISVC.2010.5656727\&partnerID=40\&md5=b456d23b9a760f866b87f12544c1ba42}, author = {Rouijel, A. and Nsiri, B. and Faqihi, A. and Aboutajdine, D.} } @conference { ISI:000289216200022, title = {A New Task Engineering Approach for Workflow Access Control}, booktitle = {COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS 2010}, series = {Advances in Intelligent and Soft Computing}, volume = {85}, year = {2010}, note = {3rd International Conference on Computational Intelligence in Security for Information Systems, Leon, SPAIN, NOV 11-12, 2010}, pages = {203-212}, publisher = {Junta Castilla Leon; Supercomputing Ctr Castilla Leon; Univ Leon; IEEE SECCION ESPANA; IEEE Syst Man \& Cybernet Spanish Chapter; MIR Lab; Int Fed Comp Logic}, organization = {Junta Castilla Leon; Supercomputing Ctr Castilla Leon; Univ Leon; IEEE SECCION ESPANA; IEEE Syst Man \& Cybernet Spanish Chapter; MIR Lab; Int Fed Comp Logic}, abstract = {Security and particularly Access control is a crucial issue for workflow management systems (WFMS). RBAC (Role based Access Control) model seems to be suitable for enforcing access control policies in such systems. However, without an effective role engineering process -at administration time- that aims to reduce conflicting situations. using RBAC could be more complex and less useful. Additionally to role engineering, a {\textquoteleft}task engineering{\textquoteright} process at run time- could be useful to allow the satisfaction of access control constraints in even critical situations. In this paper, we identify task engineering as a process to examine the granularity of each workflow{\textquoteright}s task in a way to meet at run time- the main workflow access control requirements, precisely the least privilege and separation of duties principles. Then, we propose an approach of task engineering to improve security enforcement in WFMS. This approach uses an intelligent method namely the Constraints Satisfaction Problem (CSP) formulation and resolution method.}, isbn = {978-3-642-16625-9}, issn = {1867-5662}, author = {El Bakkali, Hanan and Hatim, Hamid and Berrada, Ilham}, editor = {Herrero, A and Corchado, E and Redondo, C and Alonso, A} } @conference {Saidi2009165, title = {Component-based development: extension with business component reuse}, booktitle = {Proceedings of the 2009 3rd International Conference on Research Challenges in Information Science, RCIS 2009}, year = {2009}, note = {cited By 4}, pages = {165-176}, doi = {10.1109/RCIS.2009.5089280}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-70349443666\&doi=10.1109\%2fRCIS.2009.5089280\&partnerID=40\&md5=6523b0f43c33b8e1ceafc58fa7995adc}, author = {Saidi, R. and Front, A. and Rieu, D. and Fredj, M. and Mouline, S.} } @conference {Belkhayat2009, title = {Dynamic model of the E-Strategy inspired from the information systems{\textquoteright} urbanization [Mod{\`e}le dynamique de la E-Strat{\'e}gie inspir{\'e} de l{\textquoteright}urbanisation des syst{\`e}mes d{\textquoteright}information]}, booktitle = {14th International Conference of the Association Information and Management 2009, AIM 2009}, year = {2009}, note = {cited By 0}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84870450763\&partnerID=40\&md5=56a318e3533b30a19d6f426c63bda333}, author = {Belkhayat, N. and Doukkali, P.A. and Regragui, P.B.} } @conference { ISI:000274084500026, title = {NCSecMM: A National Cyber Security Maturity Model for an Interoperable {\textquoteleft}{\textquoteleft}National Cyber Security{{\textquoteright}{\textquoteright}} Framework}, booktitle = {9TH EUROPEAN CONFERENCE ON E-GOVERNMENT, PROCEEDINGS}, year = {2009}, note = {9th European Conference on e-Government, Univ Westminister Business Sch, London, ENGLAND, JUN 29-30, 2009}, pages = {236-247}, abstract = {Security Maturity Model is a systematic approach that replaces traditional security metrics. There is more than one Security Maturity Model (SMM, COBIT, CERT/CSO, ISM3), and each of them has only five levels of maturity, providing the blueprint for a complete security program, telling management the order in which to implement security elements (ISM3 Consortium 2007), and leading toward the use of best practice standards (e.g., BS 17799). But none of them is dedicated to National Cybersecurity. We propose in this paper a {\textquoteleft}{\textquoteleft}National CyberSecurity Maturity Model{{\textquoteright}{\textquoteright}}, that will make it possible to evaluate the security of a country or a whole region, making thus comparisons between them, and pointing out its forces and threats.}, isbn = {978-1-906638-33-7}, author = {El Kettani, Mohamed Dafir Ech-Cherif and Debbagh, Taieb}, editor = {Hahamis, P and Remenyi, D} } @article {3318641920080701, title = {An Adaptation of E-learning Standards to M-learning.}, journal = {International Journal of Interactive Mobile Technologies}, volume = {2}, number = {3}, year = {2008}, pages = {11 - 16}, abstract = {The exploitation of technological advances in learning has result in an exponential progress in this field through e-learning applications in the last decade, and currently through the emergence of a new concept called m-learning. M-learning is defined as the use of mobile technologies for learning; m-learning must benefit from e-learning technological advances in order to avoid reinventing the wheel. Nevertheless, m-learning, which is characterized by the use of mobile devices, permits, for example, the learners{\textquoteright} mobility during their learning, and, as opposed to e-learning, allows a continuous change of the context. Moreover, m-learning faces some constraints caused by the use of its mobile technologies such as the limited screen size, reduced energy, resolution capacity and location change during an activity. Yet, there is an agreement among most research laboratories interested in e- and m- learning on the parallel use of these two learning environments. Therefore, it would be mor}, keywords = {Computer assisted instruction, e-learning, IMS LD, Internet in education, interoperability, LOM, m-learning, Mobile communication systems in education, Online data processing, Online information services, Technological innovations, Telecommunication {\textendash} Study \& teaching, Web-based instruction, Wireless communication systems}, issn = {18657923}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=33186419\&site=ehost-live}, author = {Najima, Daoudi and Rachida, Ajhoun} } @conference {Berbia2008, title = {An enhanced genetic algorithm based decoder for linear codes}, booktitle = {2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA}, year = {2008}, note = {cited By 0}, doi = {10.1109/ICTTA.2008.4530229}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-49249093162\&doi=10.1109\%2fICTTA.2008.4530229\&partnerID=40\&md5=47847c552034bd508efbf07221f66c70}, author = {Berbia, H. and Elbouanani, F. and Belkasmi, M. and Romadi, R.} } @conference {Saidi200834, title = {From a business component to a functional component using a multi-view variability modelling}, booktitle = {CEUR Workshop Proceedings}, volume = {341}, year = {2008}, note = {cited By 0}, pages = {34-45}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84880270864\&partnerID=40\&md5=a41f8a90d0ebc85278fb768842e390fe}, author = {Saidi, R. and Front, A. and Rieu, D. and Fredj, M. and Mouline, S.} } @conference {Saidi200853, title = {Specification of business components: An approach by multi-view variability expression [Sp{\'e}cification de composants m{\'e}tier: Une approche par expression de variabilit{\'e} multi-vue]}, booktitle = {XXVIeme Congres INFORSID 2008}, year = {2008}, note = {cited By 0}, pages = {53-68}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84884667023\&partnerID=40\&md5=c280035ed6b4033e34d9900b70598566}, author = {Saidi, R. and Fredj, M. and Mouline, S. and Front, A. and Rieu, D.} } @article {Reyne200854, title = {Thoughts on automotive construction: Opportunities for thermoplastic composities}, journal = {JEC Composites Magazine}, volume = {45}, number = {45}, year = {2008}, note = {cited By 0}, pages = {54-55}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-56549123476\&partnerID=40\&md5=c713c1f7fd24dfe471b97d9236225ea3}, author = {Reyne, M.} } @conference { ISI:000261359800058, title = {Variability Modeling for Business Component Customization}, booktitle = {2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3}, series = {IEEE Symposium on Computers and Communications ISCC}, year = {2008}, note = {13th IEEE Symposium on Computers and Communications, Marrakech, MOROCCO, JUL 06-09, 2008}, pages = {370+}, publisher = {IEEE Comp Soc; IEEE; IEEE Commun Soc; hps; Ctr Natl Rech Sci \& Tech}, organization = {IEEE Comp Soc; IEEE; IEEE Commun Soc; hps; Ctr Natl Rech Sci \& Tech}, abstract = {Since a component-based information system has different requirements, components customization for various constraints is needed. Thus, the ability of reusable components to be varied and appropriate to different information systems requirements is a key property in reusable component development, especially in Business Component (BC) development. In this paper, a BC customization approach is presented. In order to do this, we focus on the variability concept, which is defined as the ability of a software artefact to be changed or customized to be reused in multiple contexts. Hence, the objective of this work is to specify business components with the consideration of commonality and variability in a business domain, in order to increase their reusability and applicability.}, isbn = {978-1-4244-2702-4}, issn = {1530-1346}, author = {Saidi, Rajaa and Fredj, Mounia and Mouline, Salma and Front, Agnes and Rieu, Dominique} } @conference {Saidi2008730, title = {Variability modeling for Business Component customization}, booktitle = {Proceedings - IEEE Symposium on Computers and Communications}, year = {2008}, note = {cited By 3}, pages = {730-735}, doi = {10.1109/ISCC.2008.4625644}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-55849092557\&doi=10.1109\%2fISCC.2008.4625644\&partnerID=40\&md5=04315f0e284ab3996e6302eee0e4e6fd}, author = {Saidi, R. and Fredj, M. and Mouline, S. and Front, A. and Rieu, D.} } @conference { ISI:000250559700098, title = {Towards managing variability across business component development}, booktitle = {IRI 2007: PROCEEDINGS OF THE 2007 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION}, year = {2007}, note = {IEEE International Conference on Information Reuse and Integration (IRI-2007), Las Vegas, NV, AUG 13-15, 2007}, pages = {594+}, publisher = {IEEE; SMC Soc}, organization = {IEEE; SMC Soc}, abstract = {Reusing components, which are specifically set up to suit enterprises requirements, becomes a key element of their software engineering strategy. Consequently, the ability of reusable components to be varied and appropriate to different re-users requirements is a key property in reusable component development. From this need, the concept of variability has emerged. It is defined as the ability of a software artefact to be changed or customized to be used in multiple contexts. The objective of our research is to outline variability issues through reusable component development, and in particular, in the requirements phase of a Business Component (BC) development. The main ideas of this research are (a) to address variability issues through the requirements phase of a BC development and (b) to propose a metamodel to describe variability concepts that must be classified and designed to manage this variability.}, isbn = {978-1-4244-1499-4}, doi = {10.1109/IRI.2007.4296685}, author = {Saidil, Rajaa and Fredj, Mounia and Mouline, Salma and Front, Agnes and Rieu, Dominique}, editor = {Chang, W and Joshi, JBD} } @article { ISI:000183893900014, title = {A multi-level generic model for content image retrieval}, journal = {ANNALS OF TELECOMMUNICATIONS-ANNALES DES TELECOMMUNICATIONS}, volume = {58}, number = {3-4}, year = {2003}, month = {MAR-APR}, pages = {630-655}, abstract = {In this paper we propose a generic model for content image modelling. The model is based on several levels of information. Each level is called view and relates to a class of information. We distinguish three types of views : the concept, relation and interpretation views. The view concept or relation makes it possible to define respectively the concepts or the calculable relations automatically that do not require any particular interpretation. The view interpretation relates to the interpretation of the contents of the image. The number, the nature and the contents of each view are adaptable and can vary according to the type of application. The operational model is based on the nested conceptual graphs which we extended. The model is implemented and operational and the results obtained are very encouraging.}, issn = {0003-4347}, author = {Thami, ROH and Chaarani, H and Daoudi, M and Rachik, M} } @conference { ISI:000082482800093, title = {On the influence of the orthogonalization scheme on the parallel performance of GMRES}, booktitle = {EURO-PAR {\textquoteleft}98 PARALLEL PROCESSING}, series = {Lecture Notes in Computer Science}, volume = {1470}, year = {1998}, note = {4th International Euro-Par Conference on Parallel Processing, SOUTHAMPTON, ENGLAND, SEP 01-04, 1998}, pages = {751-762}, publisher = {Univ Southampton, Dept Electron \& Comp Sci, Concurrent Computat Grp}, organization = {Univ Southampton, Dept Electron \& Comp Sci, Concurrent Computat Grp}, abstract = {In Krylov-based iterative methods, the computation of an orthonormal basis of the Krylov space is a key issue in the algorithms because the many scalar products are often a bottleneck in parallel distributed environments. Using GMRES, we present a comparison of four variants of the Gram-Schmidt process on distributed memory machines. Our experiments are carried on an application in astrophysics and on a convection-diffusion example. We show that the iterative classical Gram-Schmidt method overcomes its three competitors in speed and in parallel scalability while keeping robust numerical properties.}, isbn = {3-540-64952-2}, issn = {0302-9743}, author = {Fraysse, V and Giraud, L and Kharraz-Aroussi, H}, editor = {Pritchard, D and Reeve, J} }