@conference { ISI:000366999600145, title = {Asymmetric and Dynamic Encryption for Routing Security in MANETs}, booktitle = {2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2014}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, MOROCCO, APR 14-16, 2014}, pages = {825-830}, abstract = {In mobile ad-hoc networks (MANETs), data transmission is usually performed between mobile entities in an environment without infrastructure. So, data security is a key issue in MANETs. In this paper, we propose a security solution for the routing protocol OLSR. Our system is based on a new approach of asymmetric and dynamic encryption. Our goal is to properly secure the traffic against potential attacks without decreasing network performances.}, isbn = {978-1-4799-3824-7}, author = {Echchaachoui, Adel and Choukri, Ali and Habbani, Ahmed and Elkoutbi, Mohamed} } @conference { ISI:000366999600180, title = {A new Middleware Architecture for the integration of RFID technology into information systems}, booktitle = {2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2014}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, MOROCCO, APR 14-16, 2014}, pages = {1025-1030}, abstract = {1980 marked the start of a boom in radiofrequency identification (RFID) technology, initially associated with a growing need for traceability. In view of the technological progress and lower costs, RFID{\textquoteright}s area of application became much broader and, today, multiple business sectors take advantage of this technology. But in order to achieve the maximum benefits of RFID technology, the RFID information collected should be useful, for this it is necessary that we can collect it and deliver it in the best conditions for the whole applications that have need of its exploitation, for that a dedicated middleware solution is required to ensure the collection of RFID information and their integration in an information systems. The issues and key points of this integration as the description of the RFID technology will be summarized in the present paper, with a new middleware architecture.}, isbn = {978-1-4799-3824-7}, author = {Bouhouche, Taib and El Khaddar, M. A. and Boulmalf, Mohammed and Bouya, Mohsine and Elkoutbi, Mohamed} } @conference { ISI:000255983000005, title = {Fuzzy radial basis function neural networks for web applications cost estimation}, booktitle = {2007 INNOVATIONS IN INFORMATION TECHNOLOGIES, VOLS 1 AND 2}, year = {2007}, note = {4th International Conference on Innovations in Information Technology, Dubai, U ARAB EMIRATES, NOV 18-20, 2007}, pages = {21+}, publisher = {IEEE}, organization = {IEEE}, abstract = {The Fuzzy Radial basis function Neural Networks (FRBFN) for software cost estimation is designed by integrating the principles of RBFN and the fuzzy C-means clustering algorithm. The architecture of the network is suitably modified at the hidden layer to realise a novel neural implementation of the fuzzy clustering algorithm. Fuzzy set-theoretic concepts are incorporated at the hidden layer, enabling the model to handle uncertain and imprecise data, which can improve greatly the accuracy of obtained estimates. MMRE and Pred are used as measures of prediction accuracy for this comparative study. The results show that an RBFN using fuzzy C-means performs better than an RBFN using hard C-means. This study uses data on web applications from the Tukutuku database.}, isbn = {978-1-4244-1840-4}, author = {Idri, Ali and Zakrani, Abdelali and Elkoutbi, Mohamed and Abran, Alain} } @conference { ISI:000255185000029, title = {Practical load distribution models for Web services based environments}, booktitle = {2008 INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES, PROCEEDINGS}, year = {2007}, note = {3rd International MCETECH Conference on e-Technologies, Montreal, CANADA, JAN 23-25, 2008}, pages = {258+}, publisher = {Univ Quebec; CGI; SAP; IEEE Comp Soc}, organization = {Univ Quebec; CGI; SAP; IEEE Comp Soc}, abstract = {Web services QoS management frameworks proposed in the literature deal essentially with issues such as QoS specification, QoS-based discovery and selection, and QoS monitoring of Web services. However, only few works have considered the issue of load distribution in a Web services context. In this paper, we investigate three models that might be used to achieve load distribution in a Web services environment. We focus on load distribution at the operation level by considering the assignment of methods execution to appropriate Web services according to some selection policies. The experiments we have conducted using the broker-oriented model have shown that better results are obtained using the random policy for Web service selection.}, isbn = {978-0-7695-3082-6}, doi = {10.1109/MCETECH.2008.21}, author = {Badidi, Elarbi and Serhani, M. Adel and Esmahi, Larbi and Elkoutbi, Mohamed}, editor = {Kropf, P and Benyoucef, M and Mili, H} } @conference { ISI:000245715700012, title = {WS-QoSM: A broker-based architecture for web services QoS management}, booktitle = {2006 Innovations in Information Technology}, year = {2006}, note = {Innovations in Information Technology Conference 2006, Dubai, U ARAB EMIRATES, NOV 19-21, 2006}, pages = {56-60}, publisher = {IEEE}, organization = {IEEE}, abstract = {QoS management has been extensively studied in network-based multimedia applications. However, its application to Web services is very recent In this paper, we present WS-QoSM, it Web services QoS management architecture capable of supporting at runtime the QoS management operations, QoS provisioning and assurance in delivering Web services. Our proposed architecture is based on the commonly used notion of QoS brokerage service to mediate between service requesters and service providers. Its responsibilities include performance monitoring of Web services, implementation of Web service selection policies, and negotiation of QoS. Besides, we present a server-oriented scheme for load distribution based on the sender-initiated and receiver-initiated strategies previously used in general distributed systems.}, isbn = {978-1-4244-0673-9}, author = {Badidi, Elarbi and Esmahi, Larbi and Serhani, M. Adel and Elkoutbi, Mohamed} }